FTX and the Corruption of America

By Charles Hugh Smith

Source: Of Two Minds

Thanks to the FTX swindle, we now know the cost of a get out of jail free card in America: $40 million, paid to political elites. It seems even get out of jail free cards have suffered from inflation.

With hefty “donations” (heh) to elites, all wrong-doing is swept under a very capacious carpet. Jeffrey Epstein sprinkled a few million on the elites of Harvard, and he was ushered into this elite circle as an intimate pal. The fact that he was a rapacious predator of children was of no concern. A few million showered on the right people and causes makes evil and criminality disappear.

If a financier looter showers $40 million on “the right people,” mouths the “correct” phrases and issues empty promises to give away his looted billions, he becomes an instant golden boy of the right elites who have the power to protect him from consequences.

This is how America works now: in-your-face corruption is not just accepted, it’s glorified. Let’s score America’s wealth and power elites, regardless of party or political persuasion:

Integrity: zero.

Austerity: zero.

Restraint: zero.

Humility: zero.

Responsibility: zero.

Accountability: zero.

Sacrifice for the common good: zero.

Thrift: zero.

A society whose elites are so self-serving, corrupt, unaccountable and devoid of any sense of good and evil is doomed.
 Consider the bleatings of America’s power elite on the FTX swindle. Let’s have congressional hearings on this remarkable “financial event” that caught everyone by surprise, etc.

Translation: let’s stage some political theater to cloak the fact that the looters are being protected from consequences. We all know what happens if you’re caught selling a nickel bag on the street: you get a tenner in a hellhole prison.

But if you bribed the right people, you can swindle billions of dollars and walk free as an insincerely apologetic victim of your own success. Golly gee, I don’t understand what happened to all that money, even though I’m not exactly shy about declaring my own genius.

For reasons lost on the rest of us, investigations by the Securities and Exchange Commission (SEC) and the U.S. Department of Justice (DOJ) always come up empty. Gee, the looting was complicated and we can’t figure out who might have broken the laws against fraud, collusion, embezzlement, malfeasance, etc., so we’re letting everyone off the hook.

Or some sleazy, unaccountable intelligence agency is referenced in whispers that the looters are “assets” and therefore untouchable. Where exactly is the rule of law in a society where bribes, political pressure and having knowledge of elites’ skeletons in the closet melt away accountability and consequences?

The rule of law in America is an illusion, a useful myth promoted by PR hacks to cover the tracks of their employers. Corporate wrong-doing–swindles, collusion, fraud, embezzlement, malfeasance–is off the charts, but nobody is responsible. The criminal corporations are duly fined, a tiny clawback of their looting that’s written off as a cost of doing business.

Consider this data base of 6,300 major corporate fines and settlements from the early 1990s to 2015 compiled by Jon Morse. Nobody paid any personal fines or served any prison time for any of these thousands of violations.

There are two systems of “justice” in America: one which grants elites freedom from consequences of their toxic criminality and another one for the rest of us that imprisons hundreds of thousands in the War on Drugs Gulag.

What all the entrenched insiders in America’s parasitic, predatory elites and institutions don’t dare admit is that to protect themselves from consequence, we’ve had to sacrifice everything else. Having stripped the nation of the essential foundation of a just, enduring social order–accountability, consequence, rule of law and a grasp of the difference between good and evil–there’s nothing left but sound and fury, as if they’re hoping the endless political circuses and trails of bread crumbs will forever distract us from their plunder and the injustices of the irredeemably corrupt America they’ve fashioned to protect their wealth and power.

To paraphrase Lao Tzu, if one insists on an extreme of corruption and injustice, that extreme will not dwell long.

The American Kleptocracy: A Government of Liars, Thieves and Lawbreakers

By John & Nisha Whitehead

Source: The Rutherford Institute

“The most dangerous man to any government is the man who is able to think things out for himself, without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane and intolerable.”—H. L. Mencken

The American kleptocracy (a government ruled by thieves) continues to suck the American people down a rabbit hole into a parallel universe in which the Constitution is meaningless, the government is all-powerful, and the citizenry is powerless to defend itself against government agents who steal, spy, lie, plunder, kill, abuse and generally inflict mayhem and sow madness on everyone and everything in their sphere.

Think about it.

Almost every tyranny being perpetrated by the U.S. government against the citizenry—purportedly to keep us safe and the nation secure—has come about as a result of some threat manufactured in one way or another by our own government.

Cyberwarfare. Terrorism. Bio-chemical attacks. The nuclear arms race. Surveillance. The drug wars. Domestic extremism. The COVID-19 pandemic.

In almost every instance, the U.S. government (often spearheaded by the FBI) has in its typical Machiavellian fashion sown the seeds of terror domestically and internationally in order to expand its own totalitarian powers.

Who is the biggest black market buyer and stockpiler of cyberweapons (weaponized malware that can be used to hack into computer systems, spy on citizens, and destabilize vast computer networks)? The U.S. government.

Who is the largest weapons manufacturer and exporter in the world, such that they are literally arming the world? The U.S. government.

Which country has a history of secretly testing out dangerous weapons and technologies on its own citizens? The U.S. government.

Which country has conducted secret experiments on an unsuspecting populace—citizens and noncitizens alike—making healthy people sick by spraying them with chemicals, injecting them with infectious diseases and exposing them to airborne toxins? The U.S. government.

What country has a pattern and practice of entrapment that involves targeting vulnerable individuals, feeding them with the propaganda, know-how and weapons intended to turn them into terrorists, and then arresting them as part of an elaborately orchestrated counterterrorism sting? The U.S. government.

Are you getting the picture yet?

The U.S. government isn’t protecting us from terrorism.

The U.S. government is creating the terror. It is, in fact, the source of the terror.

Consider that this very same government has taken every bit of technology sold to us as being in our best interests—GPS devices, surveillance, nonlethal weapons, etc.—and used it against us, to track, control and trap us.

So why is the government doing this? Money, power and total domination.

We’re not dealing with a government that exists to serve its people, protect their liberties and ensure their happiness. Rather, these are the diabolical machinations of a make-works program carried out on an epic scale whose only purpose is to keep the powers-that-be permanently (and profitably) employed.

Case in point: the FBI.

The government’s henchmen have become the embodiment of how power, once acquired, can be so easily corrupted and abused. Indeed, far from being tough on crime, FBI agents are also among the nation’s most notorious lawbreakers.

Whether the FBI is planting undercover agents in churches, synagogues and mosques; issuing fake emergency letters to gain access to Americans’ phone records; using intimidation tactics to silence Americans who are critical of the government, or persuading impressionable individuals to plot acts of terror and then entrapping them, the overall impression of the nation’s secret police force is that of a well-dressed thug, flexing its muscles and doing the boss’ dirty work.

It’s a diabolical plot with far-reaching consequences for every segment of the population, no matter what one’s political leanings.

As Rozina Ali writes for The New York Times Magazine, “The government’s approach to counterterrorism erodes constitutional protections for everyone, by blurring the lines between speech and action and by broadening the scope of who is classified as a threat.”

This is not an agency that appears to understand, let alone respect, the limits of the Constitution.

For instance, the FBI has been secretly carrying out an entrapment scheme in which it used a front company, ANOM, to sell purportedly hack-proof phones to organized crime syndicates and then used those phones to spy on them as they planned illegal drug shipments, plotted robberies and put out contracts for killings using those boobytrapped phones.

All told, the FBI intercepted 27 million messages over the course of 18 months.

What this means is that the FBI was also illegally spying on individuals using those encrypted phones who may not have been involved in any criminal activity whatsoever.

Even reading a newspaper article is now enough to get you flagged for surveillance by the FBI. The agency served a subpoena on USA Today / Gannett to provide the internet addresses and mobile phone information for everyone who read a news story online on a particular day and time about the deadly shooting of FBI agents.

This is the danger of allowing the government to carry out widespread surveillance, sting and entrapment operations using dubious tactics that sidestep the rule of law: “we the people” become suspects and potential criminals, while government agents, empowered to fight crime using all means at their disposal, become indistinguishable from the corrupt forces they seek to vanquish.  

To go after terrorists, they become terrorists. To go after drug smugglers, they become drug smugglers. To go after thieves, they become thieves.

It’s hard to say whether we’re dealing with a kleptocracy (a government ruled by thieves), a kakistocracy (a government run by unprincipled career politicians, corporations and thieves that panders to the worst vices in our nature and has little regard for the rights of American citizens), or if we’ve gone straight to an idiocracy

This certainly isn’t a constitutional republic, however.

Some days, it feels like the government is running its own crime syndicate complete with mob rule and mafia-style justice.

In addition to creating certain crimes in order to then “solve” them, the FBI—the government’s law enforcement agency—also gives certain informants permission to break the law, “including everything from buying and selling illegal drugs to bribing government officials and plotting robberies,” in exchange for their cooperation on other fronts.

USA Today estimates that government agents have authorized criminals to engage in as many as 15 crimes a day (5600 crimes a year). Some of these informants are getting paid astronomical sums: one particularly unsavory fellow, later arrested for attempting to run over a police officer, was actually paid $85,000 for his help laying the trap for an entrapment scheme.

In addition to procedural misconduct, trespassing, enabling criminal activity, and damaging private property, the FBI’s laundry list of crimes against the American people includes surveillance, disinformation, blackmail, entrapment, intimidation tactics, and harassment.

For example, the Associated Press lodged a complaint with the Dept. of Justice after learning that FBI agents created a fake AP news story and emailed it, along with a clickable link, to a bomb threat suspect in order to implant tracking technology onto his computer and identify his location. Lambasting the agency, AP attorney Karen Kaiser railed, “The FBI may have intended this false story as a trap for only one person. However, the individual could easily have reposted this story to social networks, distributing to thousands of people, under our name, what was essentially a piece of government disinformation.”

Then again, to those familiar with COINTELPRO, an FBI program created to “disrupt, misdirect, discredit, and neutralize” groups and individuals the government considers politically objectionable, it should come as no surprise that the agency has mastered the art of government disinformation.

The FBI has been particularly criticized in the wake of the 9/11 terrorist attacks for targeting vulnerable individuals and not only luring them into fake terror plots but actually equipping them with the organization, money, weapons and motivation to carry out the plots—entrapment—and then jailing them for their so-called terrorist plotting. This is what the FBI characterizes as “forward leaning—preventative—prosecutions.”

Another fallout from 9/11, National Security Letters, one of the many illicit powers authorized by the USA Patriot Act, allows the FBI to secretly demand that banks, phone companies, and other businesses provide them with customer information and not disclose the demands. An internal audit of the agency found that the FBI practice of issuing tens of thousands of NSLs every year for sensitive information such as phone and financial records, often in non-emergency cases, is riddled with widespread violations.

The FBI’s surveillance capabilities, on a par with the National Security Agency, boast a nasty collection of spy tools ranging from Stingray devices that can track the location of cell phones to Triggerfish devices which allow agents to eavesdrop on phone calls. 

In one case, the FBI actually managed to remotely reprogram a “suspect’s” wireless internet card so that it would send “real-time cell-site location data to Verizon, which forwarded the data to the FBI.”

The FBI has also repeatedly sought to expand its invasive hacking powers to allow agents to hack into any computer, anywhere in the world.

Indeed, for years now, the U.S. government has been creating what one intelligence insider referred to as a cyber-army capable of offensive attacks. As part of this cyberweapons programs, government agencies such as the NSA have been stockpiling all kinds of nasty malware, viruses and hacking tools that can “steal financial account passwords, turn an iPhone into a listening device, or, in the case of Stuxnet, sabotage a nuclear facility.”

In fact, the NSA was responsible for the threat posed by the “WannaCry” or “Wanna Decryptor” malware worm which—as a result of hackers accessing the government’s arsenal—hijacked more than 57,000 computers and crippled health care, communications infrastructure, logistics, and government entities in more than 70 countries.

Mind you, the government was repeatedly warned about the dangers of using criminal tactics to wage its own cyberwars. It was warned about the consequences of blowback should its cyberweapons get into the wrong hands.

The government chose to ignore the warnings.

That’s exactly how the 9/11 attacks unfolded.

First, the government helped to create the menace that was al-Qaida and then, when bin Laden had left the nation reeling in shock (despite countless warnings that fell on tone-deaf ears), it demanded—and was given—immense new powers in the form of the USA Patriot Act in order to fight the very danger it had created.

This has become the shadow government’s modus operandi regardless of which party controls the White House: the government creates a menace—knowing full well the ramifications such a danger might pose to the public—then without ever owning up to the part it played in unleashing that particular menace on an unsuspecting populace, it demands additional powers in order to protect “we the people” from the threat.

Yet the powers-that-be don’t really want us to feel safe.

They want us cowering and afraid and willing to relinquish every last one of our freedoms in exchange for their phantom promises of security.

As a result, it’s the American people who pay the price for the government’s insatiable greed and quest for power.

Suffice it to say that when and if a true history of the United States is ever written, it will not only track the rise of the American police state but it will also chart the decline of freedom in America: how a nation that once abided by the rule of law and held the government accountable for its actions has steadily devolved into a police state where justice is one-sided, a corporate elite runs the show, representative government is a mockery, police are extensions of the military, surveillance is rampant, privacy is extinct, and the law is little more than a tool for the government to browbeat the people into compliance.

Somewhere over the course of the past 240-plus years, democracy has given way to kleptocracy, and representative government has been rejected in favor of rule by career politicians, corporations and thieves—individuals and entities with little regard for the rights of American citizens.

This dissolution of that sacred covenant between the citizenry and the government—establishing “we the people” as the masters and the government as the servant—didn’t happen overnight. It didn’t happen because of one particular incident or one particular president. It is a process, one that began long ago and continues in the present day, aided and abetted by politicians who have mastered the polarizing art of how to “divide and conquer.”

As I point out in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, our freedoms have become casualties in an all-out war on the American people.

America, Meet Your New Dictator-in-Chief: The President’s Secret, Unchecked Powers

By John W. Whitehead & Nisha Whitehead

Source: The Rutherford Institute

“Life, liberty, and the pursuit of happiness have given way to permanent crisis management: to policing the planet and fighting preventative wars of ideological containment, usually on terrain chosen by, and favorable to, our enemies. Limited government and constitutional accountability have been shouldered aside by the kind of imperial presidency our constitutional system was explicitly designed to prevent.”— David C. Unger, The Emergency State: America’s Pursuit of Absolute Security at All Costs

America, meet your new dictator-in-chief.

As the New York Times reports, “Newly disclosed documents have shed a crack of light on secret executive branch plans for apocalyptic scenarios—like the aftermath of a nuclear attack—when the president may activate wartime powers for national security emergencies.”

The problem, of course, is that we have become a nation in a permanent state of emergency.

Power-hungry and lawless, the government has weaponized one national crisis after another in order to expand its powers and justify all manner of government tyranny in the so-called name of national security.

The seeds of this present madness were sown almost two decades ago when George W. Bush stealthily issued two presidential directives that granted the president the power to unilaterally declare a national emergency, which is loosely defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government functions.

Comprising the country’s Continuity of Government (COG) plan, these directives (National Security Presidential Directive 51 and Homeland Security Presidential Directive 20) provide a skeletal outline of the actions the president will take in the event of a “national emergency.”

Just what sort of actions the president will take once he declares a national emergency can barely be discerned from the barebones directives. However, one thing is clear: in the event of a national emergency, the COG directives give unchecked executive, legislative and judicial power to the president.

The country would then be subjected to martial law by default, and the Constitution and the Bill of Rights would be suspended.

Essentially, the president would become a dictator for life.

It has happened already.

As we have witnessed in recent years, that national emergency can take any form, can be manipulated for any purpose and can be used to justify any end goal—all on the say so of the president.

The emergency powers that we know about which presidents might claim during such states of emergency are vast, ranging from imposing martial law and suspending habeas corpus to shutting down all forms of communications, including implementing an internet kill switch, and restricting travel.

Yet according to documents recently obtained by the Brennan Center, there may be many more secret powers that presidents may institute in times of so-called crisis without oversight from Congress, the courts, or the public.

It doesn’t even matter what the nature of the crisis might be—civil unrest, the national emergencies, “unforeseen economic collapse, loss of functioning political and legal order, purposeful domestic resistance or insurgency, pervasive public health emergencies, and catastrophic natural and human disasters”—as long as it allows the government to justify all manner of government tyranny in the name of so-called national security.

The war on COVID-19, the war on terror, the war on drugs, the war on illegal immigration: all of these programs started out as responses to pressing national concerns and have since become weapons of compliance and control in the police state’s hands.

Deploying the same strategy it used with 9/11 to acquire greater powers under the USA Patriot Act, the police state—a.k.a. the shadow government, a.k.a. the Deep State—has been planning and preparing for such crises for years now, quietly assembling a wish list of presidential lockdown powers that could be trotted out and approved at a moment’s notice.

Indeed, the Trump Administration even asked Congress to allow it to suspend parts of the Constitution whenever it deems it necessary during the COVID-19 crisis and “other” emergencies. The Department of Justice (DOJ) went so far as to quietly trot out and test a long laundry list of terrifying powers that override the Constitution.

We’re talking about lockdown powers (at both the federal and state level): the ability to suspend the Constitution, indefinitely detain American citizens, bypass the courts, quarantine whole communities or segments of the population, override the First Amendment by outlawing religious gatherings and assemblies of more than a few people, shut down entire industries and manipulate the economy, muzzle dissidents, “stop and seize any plane, train or automobile to stymie the spread of contagious disease,” reshape financial markets, create a digital currency (and thus further restrict the use of cash), determine who should live or die.

These are powers the police state would desperately like to make permanent.

In such a climate, the American president becomes dictator with permanent powers: imperial, unaccountable and unconstitutional.

Bear in mind that the powers the government officially asked Congress to recognize and authorize barely scratch the surface of the far-reaching powers the government has already unilaterally claimed for itself.

Unofficially, the police state with the president at its helm has been riding roughshod over the rule of law for years now without any pretense of being reined in or restricted in its power grabs by Congress, the courts or the citizenry.

Although the Constitution invests the President with very specific, limited powers, in recent years, American presidents have claimed the power to completely and almost unilaterally alter the landscape of this country for good or for ill.

The powers amassed by each successive president through the negligence of Congress and the courts—powers which add up to a toolbox of terror for an imperial ruler—empower whoever occupies the Oval Office to act as a dictator, above the law and beyond any real accountability.

As law professor William P. Marshall explains, “every extraordinary use of power by one President expands the availability of executive branch power for use by future Presidents.”

Moreover, it doesn’t even matter whether other presidents have chosen not to take advantage of any particular power, because “it is a President’s action in using power, rather than forsaking its use, that has the precedential significance.”

In other words, each successive president continues to add to his office’s list of extraordinary orders and directives, expanding the reach and power of the presidency and granting him- or herself near dictatorial powers.

All of the imperial powers amassed by Barack Obama and George W. Bush—to kill American citizens without due process, to detain suspects indefinitely, to strip Americans of their citizenship rights, to carry out mass surveillance on Americans without probable cause, to suspend laws during wartime, to disregard laws with which he might disagree, to conduct secret wars and convene secret courts, to sanction torture, to sidestep the legislatures and courts with executive orders and signing statements, to direct the military to operate beyond the reach of the law, to operate a shadow government, and to act as a dictator and a tyrant, above the law and beyond any real accountability—were inherited by Donald Trump and passed along to Joe Biden.

These presidential powers—acquired through the use of executive orders, decrees, memorandums, proclamations, national security directives and legislative signing statements and which can be activated by any sitting president—enable past, president and future presidents to operate above the law and beyond the reach of the Constitution.

These are the powers that continue to be passed along to each successive heir to the Oval Office, the Constitution be damned.

This is what you might call a stealthy, creeping, silent, slow-motion coup d’état.

From Clinton to Bush, Obama to Trump, and now Biden, it’s as if we’ve been caught in a time loop, forced to re-live the same abuses over and over again: the same assaults on our freedoms, the same disregard for the rule of law, the same subservience to the Deep State, and the same corrupt, self-serving government that exists only to amass power, enrich its shareholders and ensure its continued domination.

We’ve been losing our freedoms so incrementally for so long—sold to us in the name of national security and global peace, maintained by way of martial law disguised as law and order, and enforced by a standing army of militarized police and a political elite determined to maintain their powers at all costs—that it’s hard to pinpoint exactly when it all started going downhill, but “we the people” are paying the price for it now.

We are paying the price every day that we allow the government to continue to wage its war on the American People, a war that is being fought on many fronts: with bullets and tasers, with surveillance cameras and license readers, with intimidation and propaganda, with court rulings and legislation, with the collusion of every bureaucrat who dances to the tune of corporate handouts while on the government’s payroll, and most effectively of all, with the complicity of the American people, who continue to allow themselves to be easily manipulated by their politics, distracted by their pastimes, and acclimated to a world in which government corruption is the norm.

Unless something changes in the way we deal with these ongoing, egregious abuses of power, the predators of the police state will continue to wreak havoc on our freedoms, our communities, and our lives.

If we continue down this road, there can be no surprise about what awaits us at the end.

After all, it is a tale that has been told time and again throughout history about how easy it is for freedom to fall and tyranny to rise, and it often begins with one small, seemingly inconsequential willingness on the part of the people to compromise their principles and undermine the rule of law in exchange for a dubious assurance of safety, prosperity and a life without care.

Unfortunately, the process of unseating a dictator and limiting the powers of the presidency is far from simple but at a minimum, it must start with “we the people.”

For starters, as I make clear in my book Battlefield America: The War on the American People and in its fictional counterpart The Erik Blair Diaries, we must recalibrate the balance of power.

Start locally—in your own communities, in your schools, at your city council meetings, in newspaper editorials, at protests—by pushing back against laws that are unjust, police departments that overreach, politicians that don’t listen to their constituents, and a system of government that grows more tyrannical by the day.

What we desperately need is a concerted, collective commitment to the Constitution’s principles of limited government, a system of checks and balances, and a recognition that they—the president, Congress, the courts, the military, the police, the technocrats and plutocrats and bureaucrats—answer to and are accountable to “we the people.”

This will mean that Americans will have to stop letting their personal politics and party allegiances blind them to government misconduct and power grabs.

It will mean holding all three branches of government accountable to the Constitution (i.e., vote them out of office if they abuse their powers).

And it will mean calling on Congress to put an end to the use of presidential executive orders, decrees, memorandums, proclamations, national security directives and legislative signing statements as a means of getting around Congress and the courts.

In other words, we’ve got to start making both the president and the police state play by the rules of the Constitution.

Falsehood Rules

By James Howard Kunstler

Source: Kunstler.com

Who knew that reality could become such a squishy thing in the USA? But such are the agonies of a collapsing society that it becomes ever harder to know what’s real, especially with factions in power intent on gaslighting, manipulating, obfuscating, and coercing the raw material of public opinion, which is: what has actually happened in the past and what is happening now.

When I wrote The Long Emergency, I expected we would be living through a period of confusion and disorder, but I didn’t know what it would feel like to go through it: a nauseating existential disorientation, like being seasick on dry land… like living in a German expressionist horror movie of the 1920s (and we know what that led to)… like being held prisoner inside Franz Kafka’s castle: an immersion in totalizing falsehood.

The collapse of authority is especially striking and disturbing now because ground zero for it is the US Department of Justice (DOJ), the very place that is charged with determining what is true and what is false, what is real and what is unreal, and especially what is okay, and what is not okay.

The collapse of authority at DOJ got sickening traction after the election of 2016, when FBI Director James Comey and his underlings, along with many high officials at its parent agency, DOJ, undertook a campaign to disable and expel the winner of that election, starting before his inauguration. The Russia Collusion operation was the epitome of falsehood concocted in bad faith, and the actions taken in it were never adjudicated — though an ectoplasm named John Durham is floating somewhere out in the national ether still delegated to make cases. Leaving all that hanging this long has been a grievous injury to the country’s identity as a place on this earth where fair play was supposed to be normal.

The Mueller Investigation was another insult to the public interest, devised to distract and cover up the all the previous seditious bad faith of Comey & Company, and the C-suite at DOJ — and, of course, the Special Counsel came up with absolutely nothing actionable, which was stunning considering the resources behind it, and the time spent. At a Senate hearing about it in 2018, Robert Mueller himself claimed to be unacquainted with key characters in his own investigation and key pieces of evidence. His performance was worse than not reassuring — he appeared to be lying or incompetent, or pretending to be incompetent, and since that moment he has gone-to-ground… untouchable.

Impeachment No. 1 was supposedly about a phone call that the President made to his counterpart in Ukraine, Mr. Zelensky, regarding suspicious activity of one Hunter Biden receiving large sums of money from a gas company there while his father was Vice-president. At the time, the FBI (and the DOJ) did not disclose their possession of a laptop computer owned by Hunter Biden containing hundreds of memoranda and emails detailing the Biden family’s lucrative business dealings in Ukraine and several other foreign countries, involving sums of money far greater than the Burisma Company of Ukraine was paying Joe Biden’s son, and how the income was split between the family members. In other words, evidence that then-Vice-president Joe Biden himself was on the take from foreign countries, including companies linked directly with the communist party of China. Not important, you think? Not germane to the impeachment?

Why was that information not turned over to the president’s lawyers during the initial hearings and then the impeachment trial itself? That has never been adequately addressed, not even a little, and largely because the mainstream media does not want to know, and didn’t ask, while the alt.media does not have access to ask the officials who might know — and Congress, under Mrs. Pelosi and Chuck Schumer certainly didn’t want to ask or know. Do you appreciate how damaging this act of institutional dishonesty was.

Then there was the election of 2020, held under the Covid-19 emergency, with new rules about mail-in voting that lent themselves to fraud — or so declared former President Jimmy Carter and former Secretary of State James Baker, who ran a commission on election reform in 2005 — and that appears to be exactly what happened. The specious and dishonest claim is made by the putative winners that the matter was completely settled in the courts post-election. That is simply not true. The actual evidence was not entertained, most particularly not by the Supreme Court, which declined on the basis of “standing,” a mere point of procedure.

Now there is one official forensic audit of the 2020 election underway in Maricopa County, Arizona, (the Phoenix metro area), ordered by the State Senate, and some conclusions from phase one, involving the paper ballots, are due to be released this week, with additional phases to come concerning the Dominion voting machines. Many other state legislatures sent delegations to Arizona to learn the ins-and-outs of conducting a forensic audit, and they are making noises about actually doing it.

So, in stepped Attorney General Merrick Garland. At the start of the Arizona audit, he sent a letter to the Arizona State Senate threatening to use the Civil Rights Division of the DOJ to halt the audit on the basis of depriving voters of their civil rights. Arizona responded by promising to jail any federal officials who laid their hands on any ballots. That was the end of that gambit for now — they may try it again in phase two.

In the meantime, a county judge in Georgia (one Brian Amero) has ruled that 147,000-odd ballots alleged to have chain-of-custody problems must be made available for inspection, and also that five members of the Fulton County (Atlanta Metro Area) Board of Elections are now individually parties to the lawsuit brought by nine Georgia voters, and may be subject to deposition (being questioned under oath). That is believed to be the beginning of an effort to conduct a full audit in Georgia.

So, again, in steps Attorney General Merrick Garland with his Civil Rights Division, led by political activist Kristen Clarke, bringing a lawsuit against the Georgia election reform act passed earlier this year — a shot over Georgia’s bow, shall we say. Ms. Clarke happens to be a colleague of Georgia activist Stacey Abrams, a former Democratic candidate for governor. Ms. Abrams is also a part-owner of a company, NOWAccount, that does payroll for a private company called Happy Faces, which furnished dozens of poll workers to tally the 2020 election in Georgia, as well as the 2021 US Senate runoff election that put two Democrats, Jon Ossoff and Raphael Warnock, in office.

Elections are supposed to be conducted by public officials, not by private entities. Supposedly, the Georgia election officials turned to Happy Faces because it was a way to avoid hiring workers for less than 30 hours-a-week, which would have otherwise required providing them with health care under ObamaCare, the ACA Act. Was that legal? It has not been adjudicated.

Nor has the much bigger scandal of a private Chicago-based non-profit called the Center for Tech and Civic Life, which received $350-million from Facebook’s CEO Mark Zuckerberg to arrange grants targeted at swing districts in Democratic strongholds such as Milwaukee, Detroit, Philadelphia, and Atlanta, for the purpose of hiring ballot harvesters, among other activities. Mr. Zuckerberg met with Kristen Clarke, Stacey Abrams, Al Sharpton, and other Democratic activists at a dinner in 2019, at which he promised to help. Did his help cross any legal boundaries? It has not been investigated, nor has the use of the company he runs, Facebook, in its campaign to influence public opinion by blocking news and deleting accounts of non-Democrats exclusively.

Assistant AG Kristen Clarke’s DOJ lawsuit against Georgia’s election reform act alleges that it “imposes substantial fines on third-party organizations, churches, and advocacy groups that send follow up absentee ballot applications, and requires new and unnecessarily stringent identification requirements to obtain an absentee ballot.”  In other words, the Georgia law seeks to restrict the activities of private, non-official entities — such as the Center for Tech and Civic Life — sprinkling gargantuan sums of money over key election districts to influence the outcome. Or for companies such as Happy Faces to supply activists for counting votes. That is how disingenuous Merrick Garland’s DOJ is, now a strictly political operation.

We haven’t nearly seen the end to any of this, nor the reaction that it is liable to provoke among citizens who have had enough of being played by their own government. Think about all  that while you make plans to celebrate the Fourth of July, a holiday that commemorates an earlier time when the people of this land had enough of being played by their rulers.

How Government and Media Are Prepping America for a Failed 2020 Election

FILE – In this May 6, 2019, file photo Microsoft CEO Satya Nadella delivers the keynote address at Build, the company’s annual conference for software developers in Seattle. Microsoft says it has detected more than 740 infiltration attempts by nation-state actors in the past year targeting U.S.-based political parties, campaigns and other democracy-focused organizations including think tanks and other non-profits. (AP Photo/Elaine Thompson, File)

Russia, China and Iran are already being blamed for using tech to undermine the 2020 election. Yet, the very technologies they are allegedly using were created by a web of companies with deep ties to Israeli intelligence.

By Whitney Webb

Source: Mint Press News

As World War II drew to a close in Europe, British philosopher Bertrand Russell wrote that “neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of a great fear.”

Though numerous examples in the post-World War II era have proven Russell’s point, perhaps one of the best examples was the U.S. public’s willingness to swallow lie after lie about Saddam Hussein’s Iraq due to the climate of fear that followed the September 11 attacks. Those lies, propagated by dubious intelligence, government officials and a compliant media, resulted in catastrophes – large and small, both abroad and at home.

Today, an analogous narrative is being crafted by many of the same players – both in media and government – yet it has avoided scrutiny, even from independent media.

Over the past several months and with a renewed zeal in just the last few weeks, anonymous intelligence officials, dubious “experts” and establishment media outlets have crafted a narrative about the coming “chaos” of the 2020 election, months before it takes place. Per that narrative, certain state actors will use specific technologies to target the “American mind” in order to undermine the coming presidential election. The narrative holds that those efforts will be so successful that the U.S. will never recover as a democracy.

Though these anonymous government sources and their stenographers have already named the countries who will be responsible and the technologies they will use, they also admit that no evidence yet exists to back up these claims, meaning they are — at best — pure speculation.

Headlines such as “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” “Basically Every US National Security Leader Is Warning About Foreign Interference In The 2020 Election,” and “U.S. intel agencies: Russia and China plotting to interfere in 2020 election” have become increasingly common, despite no available evidence, as have warnings that the American public is defenseless against the old scourge of “fake news” and the new scourge of “deep fakes.” Some media reports have gone so far to say that actual foreign meddling isn’t even necessary as merely the fear of foreign meddling could be enough to upend the American political system beyond repair.

Historically, the goal of such fear-inducing narratives has been the trading of civil liberties for increased security, or rather, the appearance of increased security. Yet, when the need for security is felt due to a fear that is based on government-driven speculation and not on evidence, the goal of that narrative is not about protecting the public from a real, tangible threat but instead about the consolidation of power by the very groups responsible for crafting it — in this case, the intelligence community and other key players in the national security state.

However, what is particularly odd about this narrative surrounding imminent “chaos” and meddling in the upcoming 2020 election is the fact that, not only have the instruments of said meddling been named and described in detail, but their use in the election was recently simulated by a company with deep ties to both U.S. and Israeli intelligence. That simulation, organized and run by the Israeli-American company Cybereason, ended with scores of Americans dead, the cancellation of the 2020 election, the imposition of martial law and a spike in fear among the American populace.

Many of the technologies used to create that chaotic and horrific scenario in the Cybereason simulation are the very same technologies that U.S. federal officials and corporate media outlets have promoted as the core of the very toolkit that they claim will be used to undermine the coming election, such as deep fakes and hacks of critical infrastructure, consumer devices and even vehicles.

While the narrative in place has already laid the blame at the feet of U.S. rival states China, Russia and Iran, these very technologies are instead dominated by companies that are tied to the very same intelligence agencies as Cybereason, specifically Israeli military intelligence.

With intelligence agencies in the U.S. and Israel not only crafting the narrative about 2020 foreign meddling, but also dominating these technologies and simulating their use to upend the coming election, it becomes crucial to consider the motivations behind this narrative and if these intelligence agencies have ulterior motives in promoting and simulating such outcomes that would effectively end American democracy and hand almost total power to the national security state.

 

Media, intelligence foreshadow tech-powered doom for 2020

Even though the 2020 U.S. election is still months away, a plethora of media reports over the past six months (and even before then) have been raising concern after concern about how the U.S. election is still so vulnerable to foreign meddling that such meddling is essentially an inevitability.

Part of the reason for the recent pick-up in fear mongering appears to have been the release of a joint statement issued by key members of the Trump administration last November. That statement, authored by Attorney General Bill Barr, Defense Secretary Mark Esper, acting DHS Secretary Kevin McAleenan, acting Director of National Intelligence Joseph Maguire, FBI Director Christopher Wray, NSA Director Gen. Paul Nakasone, and Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs, claimed that foreign interference in 2020 was imminent despite admitting that there is no evidence of interference having taken place:

Our adversaries want to undermine our democratic institutions, influence public sentiment and affect government policies. Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions. Adversaries may try to accomplish their goals through a variety of means, including social media campaigns, directing disinformation operations or conducting disruptive or destructive cyber-attacks on state and local infrastructure.

While at this time we have no evidence of a compromise or disruption to election infrastructure that would enable adversaries to prevent voting, change vote counts or disrupt the ability to tally votes, we continue to vigilantly monitor any threats to U.S. elections (emphasis added).”

Despite the key caveat of there being no evidence at the time the statement was issued, media reports used the statement to claim that foreign interference in 2020 was imminent, such as in these reports from BuzzFeed, ABC News, and Newsweek.

In addition to the reports that have cast the involvement of state actors — namely Russia, Iran and China — as assured despite no evidence, other reports have made the claim that this allegedly imminent interference will inevitably be successful, largely due to claims that the tactics used will rely heavily on technology that the U.S. can’t hope to successfully counter. CSO Online, an online news outlets that provides news, analysis and research on security and risk management, recently warned that “fixing America’s voting and election infrastructure problems is a long-term proposition, one that won’t be fixed in time for the election in November” while the New York Times warned of imminent chaos and that “stealthier” malevolent foreign actors had already created the foundation for “an ugly campaign season marred by hacking and disinformation.” Wired claimed last year that U.S. election security “is still hurting at every level.”

In another example, Rolling Stone published an article earlier this month with the headline “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” which claims that “the reality is that: “We’ve made progress since the last election — but we’re much less secure than we should be.” The article goes on to say that claim that the goal isn’t necessarily to hack voting machines or change results, but “to merely create the impression of an attack as a way to undermine our faith in the electoral process.”

It continues:

The target is the minds of the American people,” says Joshua Geltzer, a former counterterrorism director on the National Security Council. “In some ways, we’re less vulnerable than we were in 2016. In other ways, it’s more.” Nearly every expert agrees on this: The worst-case scenario, the one we need to prepare for, is a situation that causes Americans to question the bedrock of our democracy — free and fair elections.”

Well before this type of rhetoric made its way into the U.S. media, Israeli intelligence-linked tech firm Cybereason claiming in a release on its website that “messing with a voter’s mind” would have a bigger impact than changing vote totals, even before the 2016 election. That release, published by Cybereason prior to the last presidential election, was authored by the company’s CEO, Lior Div, who used to lead offensive hacking operations against nation-states for Israeli military intelligence.

Notably, of all of these media reports, there is a clear consensus that one of the main tactics that will soon be used to meddle in the coming U.S. election will be the use of so-called “deep fakes.” Deriving its name from a combination of “deep learning” and “fake,” deep fakes involve video and audio that has been manipulated using artificial intelligence (AI) to create media that appears to be authentic, but is not. Concern about its use in the upcoming election has spurred not only a wealth of media reports on the matter but has prompted both the U.S. military and Congress to take action to limit its potential misuse.

One thing that stands out about the media narrative regarding election meddling and deep fakes is that several news organizations have published articles that state that deep fakes will be used to undermine the 2020 election, as opposed to stating that they could be used or that they are a phenomenon worthy of attention (though some reports have taken this more measured approach).

The reason for this level of confidence may owe to statements made by prominent U.S. intelligence officials last year, including those made by Dan Coats, the former Director of National Intelligence (DNI), who claimed in the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community that deep fakes and other hi-tech forms of fake media would be used to disrupt the 2020 election. Coats specifically stated:

Adversaries and strategic competitors probably will attempt to use deep fakes or similar machine-learning technologies to create convincing—but false—image, audio, and video files to augment influence campaigns directed against the United States and our allies and partners.”

Since Coats made the warning, numerous media reports have promoted the concern with little scrutiny, representing just one of the numerous times in U.S. history where narratives first authored by U.S. intelligence are subsequently promoted heavily by U.S. media, even when the claim made by intelligence officials is speculative, as it is in this case. Indeed, the narratives being promoted with respect to the 2020 election involve many of the same intelligence agencies (American and Israeli) and media outlets who promoted claims that were later proven false about “weapons of mass destruction” in Iraq prior to the 2003 invasion, among other pertinent examples.

Notably, deep fakes figured prominently and was the tool most used by malevolent hackers in Cybereason’s 2020 election simulation, which saw both video and audio-only deep fakes used to spread misinformation on national and local TV channels in order to impersonate police officers and election officials and to create fake bomb threats by posing as the terror group Daesh (ISIS). Cybereason also happens to be a partner of the organization funding the most well-known creator and producer of deep fakes in the world, an organization that — much like Cybereason itself — is openly tied to Israeli intelligence.

Aside from deep fakes, other technologies weaponized in Cybereason’s election simulation have also been the subject of several media reports, such as the hacking of Internet of Things (IoT) devices and appliances and even the hacking of vehicles that have some form of internet connectivity.  In the Cybereason simulation, IoT hacks were used to cut power to polling stations and disseminate disinformation while vehicles were hacked to conduct terror attacks against civilians waiting in line to vote, killing several and injuring hundreds.

Most media reports have claimed that these technologies will be part of the coming “explosion” in cyber warfare in 2020 and do not specifically link them to imminent election meddling. Others, however, have made the link to the election explicit.

 

Naming the culprits in advance

In addition to the apparent consensus on how foreign meddling will occur during the 2020 election, there is also agreement regarding which countries will be responsible. Again, this is largely based on statements made by U.S. national security officials. For instance, the joint statement issued last November by the DOJ, DOD, DHS, DNI, FBI, NSA, and CISA regarding 2020 election security, states that “Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions” before adding “at this time we have no evidence.”

Similarly, the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community, written by then-Director of National Intelligence Dan Coats, names these same three countries in relation to imminent 2020 election interference and states that their interference in the 2020 election is “almost certain.” The assessment adds the following about each nation:

  • Russia: “Russia’s social media efforts will continue to focus on aggravating social and racial tensions, undermining trust in authorities, and criticizing perceived anti-Russia politicians.”
  • China: “China will continue to use legal, political, and economic levers—such as the lure of Chinese markets—to shape the information environment. It is also capable of using cyber attacks against systems in the United States to censor or suppress viewpoints it deems politically sensitive.”
  • Iran: “Iran, which has used social media campaigns to target audiences in both the United States and allied nations with messages aligned with Iranian interests, will continue to use online influence operations to try to advance its interests.”

Coats’ assessment was enough to spawn numerous stories on the imminent threat that these three nations pose to the 2020 election, with headlines such as “U.S. intel agencies: Russia and China plotting to interfere in 2020 election.”

The vast majority of warnings regarding future election interference have come from U.S. intelligence officials with a dubious record of trustworthiness and a history of using the media to spread propaganda and disinformation, most famously through Operation Mockingbird. Most — if not all — of the recent and numerous articles on imminent interference rely heavily on claims made by the two aforementioned government documents, documents crafted by U.S. intelligence agencies for public consumption, as well as claims made by anonymous U.S. officials.

A recent New York Times article, for example, titled “Chaos Is the Point’: Russian Hackers and Trolls Grow Stealthier in 2020,” is based almost entirely on “interviews with dozens of officials and experts,” though the only government official named in the article is Shelby Pierson, the intelligence community’s election threats executive. The most quoted experts named in the article are Ben Nimmo, formerly of the hawkish, NATO-funded Atlantic Council and now with Graphika, and Laura Rosenberger, director of the neoconservative-created Alliance for Securing Democracy. The article nonetheless cites “American officials” and “current and former officials” several times to make claims about imminent election interference that paint a bleak picture of the current election season.

A recent article from The Hill relies on the acting head of DHS, Chad Wolf, as its only source, citing Wolf’s claim that “we fully expect Russia to attempt to interfere in the 2020 elections to sow public discord and undermine our democratic institutions” amid other warnings that Wolf gave about Chinese and Iranian cyber threats to U.S. elections. Other articles, including one titled “Russia, China plan to adjust their tactics to hack, influence 2020 elections” cite only Shelby Pierson of the U.S. intelligence community as its source for that headline’s claim. Another titled “Russia isn’t the only threat to 2020 elections, says U.S. intel” cites only anonymous U.S. intelligence officials, as the headline suggests.

Though Russia and China have consistently been named as the most likely election meddlers, reports have also been drumming up the likelihood that Iran will emerge as 2020’s foreign meddler of choice, especially in the months prior to and weeks after the killing of Iranian General Qassem Soleimani by the Trump administration. A recent “informal poll” conducted by the Washington Post asked hawkish think tank fellows, employees at companies like Raytheon and current and former federal officials if Iran would likely retaliate against the U.S. via cyberattack. The Post ran the results of the poll under the headline “Get ready for serious cyberattacks from Iran, experts say.”

Despite the media’s numerous warnings of imminent and “serious” cyber-retaliation from Iran, the only cyberattack attributed to the country after Soleimani’s death was the vandalism of the Federal Depository Library Program website, a rather benign act that was nevertheless blasted across headlines such as “US government website hacked with pro-Iranian messages, image of bloodied Trump.” The U.S. government is quoted in that article as saying that “At this time, there is no confirmation that this was the action of Iranian state-sponsored actors.”

Also notably absent from media reports is the fact that WikiLeaks revealed in 2017 that the CIA had stockpiled a library of “stolen” cyberattack techniques produced in other nations, including Russia and Iran. Those revelations, part of the Vault 7 release, revealed that the CIA’s UMBRAGE group was capable of “misdirect[ing] attribution [for cyberattacks actually done by the CIA] by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.” In other words, the CIA was more than capable of conducting “false flag” cyber attacks and blaming them on foreign actors.

Notably, one of the viruses being blamed on Iran for cyberattacks targeting the U.S. ahead of the 2020 election — called Shamoon — was “stolen” by the CIA’s UMBRAGE and cited in the WikiLeaks release.

 

Conflict of interest-ridden Microsoft “defends democracy”

Last year saw the tech behemoth Microsoft join the effort to blame foreign state actors, specifically Iran, for cyberattacks against the U.S. This helped to bolster assertions that had largely originated with a handful of U.S. intelligence officials and hawkish, neoconservative-aligned think tanks as media reports on Microsoft’s related claims treated the company as an independent private sector observer.

Yet, as MintPress investigations have revealed, Microsoft has clear conflicts of interest with respect to election interference. Its “Defending Democracy” program has spawned tools like “NewsGuard” and “ElectionGuard” that it claims will help protect U.S. democracy, but — upon closer examination — instead have the opposite effect.

Last January, MintPress exposed NewsGuard’s neoconservative backers and how special interest groups were backing the program in an effort to censor independent journalism under the guise of the fight against “fake news.” Subsequent investigations revealed the risk that Microsoft’s ElectionGuard poses to U.S. voting machines, which it claims to make more secure and how the platform was developed by companies closely tied to the Pentagon’s infamous research branch DARPA and Israeli military intelligence Unit 8200.

ElecionGuard software has since been adopted by numerous voting machine manufacturers and is slated to be used in some Democratic Primary votes. Notably, the push for the adoption of ElectionGuard software has been spearheaded by the recently created Cybersecurity and Infrastructure Security Agency (CISA), which is the federal agency tasked with overseeing election security and is headed by Christopher Krebs, a former high level Microsoft executive.

In recent months, Microsoft has also been at the center of claims that Iran attempted to hack U.S. presidential campaigns ahead of 2020 as well as claims that Iran plans to target the U.S. power grid and other critical infrastructure with cyberattacks.

Last October, Microsoft penned a blog post discussing a “threat group” it named Phosphorus that they “believe originates from Iran and is linked to the Iranian government.” The post went on to claim that Phosphorus attempted to target a U.S. presidential campaign, which later media reports claimed was President Trump’s re-election campaign. Microsoft concluded that the attempt was “not technically sophisticated” and ultimately unsuccessful, but felt compelled to disclose it and link it to Iran’s government.

Though it provided no evidence for the hack or its reasons for “believing” that the attack originated from Iran, media reports treated Microsoft’s declaration as proof that Iran had begun actively meddling in the 2020 election. Headlines such as “Iranian Hackers Target Trump Campaign as 2020 Threats Mount,” “Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says”, “Microsoft: Iran government-linked hacker targeted 2020 presidential campaign” and “Microsoft Says Iranians Tried To Hack U.S. Presidential Campaign,” were blasted across the front pages of American media. None of the reports scrutinized Microsoft’s claims or noted the clear conflict of interest Microsoft had in making such claims due to its efforts to see its own ElectionGuard Software adopted nationwide.

Media reports also left out the fact that Microsoft is a major government contractor for the U.S. intelligence community and the Pentagon. Notably, the Trump campaign, which Microsoft said was the target of this attack, was later identified as the only major presidential campaign using Microsoft’s “AccountGuard” software, part of its dubious “Defending Democracy” program that also spawned NewsGuard and ElectionGuard. AccountGuard claims to protect campaign-linked emails and data from hackers.

Microsoft surfaced not long after, again claiming that Iran was maliciously targeting the United States’ civilian infrastructure. This subsequent claim was first published by Wired and later covered by other outlets. Those reports cite a single person, Microsoft security researcher Ned Moran, who claimed that an Iran-backed hacking group called APT33 was targeting the U.S. “physical control systems used in electric utilities, manufacturing, and oil refineries.”

“They’re trying to deliver messages to their adversaries and trying to compel and change their adversaries’ behavior,” Moran told Wired. Moran also stated that “Microsoft hasn’t seen direct evidence of APT33 carrying out a disruptive cyberattack rather than mere espionage or reconnaissance, it’s seen incidents where the group has at least laid the groundwork for those attacks (emphasis added).”

 

Cybereason helps craft the narrative

While U.S. intelligence officials and media outlets alike have been largely responsible for setting the narrative that imminent meddling will be conducted by Russia, China and Iran, key components of that narrative, particularly with respect to China and Iran, have been laid by Cybereason, a company that recently ran 2020 doomsday election simulations and that has close ties to the intelligence communities of both the U.S. and Israel.

Shortly after the killing of Iranian General Qassem Soleimani earlier this month, an operation conducted in concert with Israeli intelligence, Cybereason warned that Iran could imminently retaliate with a cyber threat and quoted its own employees who explained what and how Iran would likely target in retaliation. Cybereason’s CSO Sam Curry, who actively participated in the firm’s 2020 doomsday election simulations, stated:

 This means that Iran’s “forceful revenge” response is likely to be less about the flash and all about the bang. If you have connected systems that are responsible for kinetic world effects, like ICS systems and critical infrastructure around water, energy or vital services, it’s time to pay attention. Iran and the US are engaged in Cyber brinksmanship, which means that the gloves are off as Iran picks it’s targets (emphasis added).”

Cybereason also quoted visiting fellow for the National Security Institute and former advisor to the U.S. Secret Service (which participated in Cyberaeson’s election simulations), Anne Marie Zettlemoyer, who claimed that Iran could soon target Wall Street and critical U.S. infrastructure like the power grid:

 An attack against the financial systems can be devastating economically and weaken the confidence and viability of markets. However, we cannot ignore the physical consequences and manifestations that can come from a cyberattack, particularly against critical infrastructure like energy and industry control systems.”

Cybereason’s claims regarding Iran’s interest in “critical infrastructure” systems likely originated with Microsoft, the claims were then parroted by the media in several reports, many of which quoted Cybereason’s Sam Curry. Curry is also a contributor to major news outlets like Forbes where he writes about Iran’s cyber warfare capabilities. 

Notably, in Cybereason’s recent allegations against Iran, it states that “it’s clear that Iran has been preparing for future geopolitical conflict by gaining access to critical infrastructure and other important operations in the United States.” It backs these claims by citing an article authored by Curry for Forbes. Following Soleimani’s death, numerous media reports, including in the UK’s The Independent and ABC News, have cited Curry as an “expert” source in claiming that Iran would retaliate with cyberattacks.

Microsoft’s claims about foreign hackers and meddling — the evidence for which have never been made public but has been parroted as fact nonetheless — are frequently supported by Cybereason.

Last August, Microsoft claimed to have foiled Russian attempts at hacking two Republican-affiliated think tanks and, despite providing no evidence, Cybereason’s then-senior director of intelligence services Ross Rustici was quoted as an expert in several media reports as saying that such behavior was to be expected from Russia. In one such report, Rustici stated:

We’re very good at fighting the last war, but the Russians are very good at evolving their game. I suspect if they’re going to do a psychological operation around the elections, the way they do it will be different than what they did in 2016. How effective the defenses we’ve built for what they did in 2016 will be for those attacks is yet to be seen.”

None of the media reports quoting Rustici mentioned Cybereason’s ties to Israeli intelligence, referring to tech firms only a “Boston-based cybersecurity company” and similar variants. Cybereason’s Intelligence Group is stuffed with former and active members of U.S. and Israeli intelligence services and has released several reports about nation-state hacking with a focus on Russia and China.

Cybereason has also been at the forefront of claims that China has been engaged in aggressive cyberattacks against multinational companies that have also seen widespread coverage in U.S. media, despite the untransparent nature of the evidence for Cybereason’s claims.

In a story that received major coverage from outlets such as Fox News, Reuters, CNBC and others, Cybereason unveiled what it called “Operation Soft Cell,” an operation that stole mass troves of data from several global telecommunications companies. In each story, Cybereason is the sole source of the claim and declined to provide the name or location of any of the affected companies. The firm also claimed to have determined that the attack was likely perpetrated by someone “backed by a nation state, and is affiliated with China.” It further claimed to have debriefed and coordinated responses with U.S. intelligence.

In an article for Reuters, Cybereason stated that “this time as opposed to in the past we are sure enough to say that the attack originated in China” while Cybereason separately told CyberScoop that it had “found hacking tools such as a modified web shell and a remote access trojan that are commonly associated with, but not unique to, Chinese hackers.” Despite the incongruity, media reports laid the blame squarely on China, as seen in headlines such as “Chinese spies have been sucking up call records at multinational telecoms, researchers say.”

Prior to uncovering Operation Soft Cell, Cybereason had warned on its blogs in the months and years prior that China would imminently target U.S. companies. The revelation of Operation Soft Cell — which originated exclusively with Cybereason — has been used to build the case that China is openly engaged in cyberwarfare against its rival states, like the United States, and targeting “democracy itself.”

 

Best Known Deep Fake Creator is Funded by Israeli Intelligence

While the media, and even Cybereason itself, have helped lay the foundation to blame specific state actors for 2020 election meddling well ahead of the fact, it is worth revisiting Cybereason’s “Operation Blackout” election simulation and the tactics used by the “bad actors” in that scenario.

That simulation, discussed in detail in the first installment of this series, saw the weaponization of specific technologies, namely deep fakes, hacks of Internet of Things (IoT) devices and hacks of vehicles, in order to target the 2020 U.S. election, resulting in the cancellation of the election and the imposition of martial law.

Given the current narrative regarding what state actors are likely to meddle in the 2020 election — namely Russia, China and Iran — and the tactics they will allegedly use, it is important to explore the sources of the technologies weaponized per that narrative as well as in “Operation Blackout.”

Indeed, if there is any clear overlap between the creators of those technologies and the state actors being blamed in advance for their imminent use, it would certainly lend credibility to the claims promoted by U.S. intelligence, the media and companies like Microsoft and Cybereason.

Yet, upon closer examination, it becomes clear that the companies and state actors most involved in developing these technologies are the very ones claiming that Russia, China and Iran will use them to undermine the 2020 election.

Take for instance the use of deep fakes. Not only have numerous media reports focused on how deep fakes will be used to meddle in the 2020 elections, but Cybereason’s doomsday election simulation saw “bad actors” rely heavily on their use to spread disinformation and even make fake bomb threats. While much has been said of the coming election and deep fakes, remarkably few reports have bothered to look at the company best known for creating viral deep fakes.

Canny AI has garnered considerable media attention over the past few years for its persuasive deep fake videos that have frequently gone viral. In the last year alone, the tech firm’s viral deep fakes have included a controversial video of Mark Zuckerberg where the Facebook co-founder appears to be saying “Imagine this for a second: One man, with total control of billions of people’s stolen data, all their secrets, their lives, their futures,” as well as a video showing Richard Nixon giving a speech he never actually gave. More recently, Canny AI was behind the viral videos immediately prior to the 2019 U.K. general election that appeared to show Jeremy Corbyn and his rival Boris Johnson endorsing each other and another video that showed world leaders singing John Lennon’s “Imagine”:

Oddly, many of the media reports that discuss these viral videos fail to mention the role of Canny AI in creating these viral deep fakes and instead only mention the organization or artists with whom Canny AI partnered to create them. For instance, the Corbyn-Johnson videos were reported to have been produced by the group Future Advocacy and artist Bill Posters, but it was actually Canny AI that created those videos for that group. Similarly, the Nixon Speech deep fake was reported by several outlets as having been solely created by MIT’s Center for Advanced Virtuality. However, the Boston Globe noted that “the [MIT] team worked with Canny AI, an Israeli company that does Video Dialogue Replacement, and Respeecher, a Ukrainian startup specializing in speech-to-speech synthetic voice production” to create the video.

The Zuckerberg deep fake that Canny AI created led to lots of positive press for the company, with several media reports dubbing them as the company using “deep fakes for good” and that uses the controversial technology “responsibly.” The Zuckerberg deep fake has been cited as one of the main drivers behind Facebook’s new “deep fake” policy, which only bans some deep fake videos and has been criticized by U.S. lawmakers as insufficient. Notably, neither Facebook nor Facebook-owned Instagram ever took down Canny AI’s deep fake of Zuckerburg.

Given the concern over deep fakes in relation to the coming election and Canny AI standing out as the main producer of deep fakes that have gone viral over the past year, it is important to point out that Canny AI has ties to a state actor with a history of election meddling: the state of Israel.

Indeed, Canny AI is 100 percent funded by an Israeli start-up accelerator called Xcelerator, a joint venture between Tel Aviv University and Israeli intelligence agency Shin Bet (sometimes called Shabak). According to Start Up Nation Central, the Paul Singer-created organization that promotes Israeli technology start ups, Xcelerator-funded “start-ups participating in the program benefit from close mentoring from content and technology experts from the Shabak, experts from Tel Aviv University, and industry leaders. The connection to the Shabak also provides the entrepreneurs with ways to test the capabilities of their technologies and cooperation opportunities (emphasis added).”

In addition, Xcelerator is partnered not only with Israeli intelligence directly, but also with Cybereason, the very company that explored the use of deep fakes in the 2020 U.S. presidential election that saw the election cancelled and martial law declared as well as a company that itself has deep ties to Israeli intelligence. Other notable partners of Xcelerator include NEC Corp, which has intimate ties to top Cybereason investor Softbank; Check Point Technologies, which has ties to Israeli military intelligence Unit 8200; and the Israeli start-up accelerator Team8. In previous reports published by MintPress, Team8 was discussed in detail, particularly their recent hire of former director of the NSA and former head of U.S. Cyber Command Mike Rogers, and their close ties to Paul Singer’s Start Up Nation Central, which itself has deep ties to U.S. neoconservatives.

It is also worth noting that Xcelerator also backs an “anti-fake news” start-up called Cyabra, which has direct ties to Israel’s Mossad and offers its AI-driven “disinformation protection” to government agencies as well as politicians, particularly during election seasons. Two of Cyabra’s co-founders previously co-founded Psy-Group, which attempted to interfere in the 2016 U.S. election by weaponizing “fake news” and social media and later closed down its operations after U.S. government scrutiny into its activities began as part of the Mueller investigation.

Psy-Group also engaged in doxxing campaigns targeting Palesintian rights activists in the U.S. which were planned in conjunction with Ram Ben-Barak, the former deputy director of the Mossad who now advises Cyabra. Given that much of the concern ahead of the next election is related not only to deep fakes but also “fake news,” Cyabra’s rise and its clear ties to Mossad and the now defunct Psy-Group are important to note.

Furthermore, in examining the other technologies weaponized during Cybereason’s 2020 election simulation and cited in the aforementioned media narrative regarding 2020 meddling, a pattern similar to that of Canny AI emerges.

Indeed, the other technologies linked to these “bad actors” and foreign meddlers — namely hacking IoT devices and hacking vehicles — are also pioneered by companies with deep ties to Israeli military intelligence, specifically Unit 8200, and Israeli tech companies that have aggressively spied on U.S. government institutions in collusion with Israeli intelligence in the past, namely Comverse (now Verint) and Amdocs.

 

Hacking the Internet of Things

In Cybereason’s doomsday election simulation, another of the tactics used was the hacking of devices and appliances connected to the internet, often referred to as the Internet of Things (IoT) and which includes everything from smartphones to power grid infrastructure to city traffic lights.

While most reports on IoT hacks to date have focused on “lone wolf” or non-state-aligned actors, one company has stood out for its efforts to create a tool that would allow governments and intelligence agencies to hack these devices with ease. That company, called Toka, announced in 2018 that it planned to offer “a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain,” with “a special focus on [hacking] the so-called Internet of Things (IoT), covering tech like Amazon Echo, Nest connected home products, as well as connected fridges, thermostats and alarms.”

The Israel-based company, which raised $12.5 million within months of launching, has since been busy marketing its services to governments around the world, most recently France where it described its product portfolio as “empower[ing] governments, Intelligence, and law enforcement agencies to enhance Homeland Security with groundbreaking cyber-intelligence and operational capabilities” during an exposition in Paris last November.

Even though Toka openly markets the ability to hack private consumer devices to governments and law enforcement agencies around the world, the clear threat to privacy has gone ignored by media outlets as the company has garnered nearly no media attention since it launched nearly two years ago.

Yet, Toka is not only notable for what it offers but also for its founders and investors. Indeed, the co-founders of Toka have been described as an “all-star” team, largely because of the role of former Israeli Prime Minister and former head of Israeli military intelligence, Ehud Barak. Barak, in addition to co-founding the company, serves as its director and is also the chairman of the board of the controversial Israeli company Carbyne911, which markets software to emergency call centers in the United States. Interestingly, Cybereason’s 2020 doomsday election simulation also dealt with the hacking and weaponization of 911 call centers. Also of note is the fact that another of Carbyne911’s leadership team, former Unit 8200 commander Pinchas Buchris, is an adviser to Cybereason.

Toka’s top brass is a who’s who of former Israeli military and intelligence officials

In addition to Barak, Toka was co-founded by retired Brigadier General Yaron Rosen, former Chief of the IDF’s cyber staff, where he was “the lead architect of all [IDF] cyber activities” including those executed by Israeli military intelligence Unit 8200. Rosen, who now serves as Toka’s CEO, has stated that Toka’s technology will only be sold to countries allied with the U.S. and Israel, telling Forbes that “Russia, China and ‘other enemy countries’ would never be customers.”

Toka’s leadership and software architects are similarly tied into Israel’s national security state. Several — including the “architect” of its hacking software — previously worked for Israel’s Prime Minister’s Office and developed “offensive technologies” for Israel’s head of state and other top Toka employees and executives share numerous connections to Unit 8200, other divisions of Israeli military intelligence and Unit 8200-connected tech companies like Check Point Technologies.

Though Toka’s leadership team makes its ties to Israeli military intelligence abundantly clear, important connections also appear in examining Toka’s investors. One of the major investors in Toka is Dell technologies, one of the world’s largest technology companies that was founded by Michael Dell, a well-known pro-Israel partisan who has donated millions of dollars to the Friends of the IDF and one of the top supporters of the so-called “anti-BDS” bills that prevent publicly employed individuals or public institutions from supporting non-violent boycotts of Israel, even on humanitarian grounds. It goes without saying that a major technology company investing in a company that markets the hacking of that very technology (computers, IoT, smartphones, etc.) should be a red flag.

With a major foot in the door through its connections to Dell, whose products are used by the private and public sectors around the world, other investors in Toka again reveal its ties to Israel’s military intelligence and the same controversial Israeli tech companies that have aggressively spied on the U.S. government in the past — Amdocs and Comverse. For instance, Entrèe Capital, a venture capital fund that is one of Toka’s main investors, is managed by Aviad Eyal and Ran Achituv. The latter, who manages Entrée’s investment in Toka and sits on Toka’s board of directors, is the founder of the IDF’s satellite-based signals intelligence unit and also a former senior Vice President at both Amdocs and Comverse Infosys (Verint).

Another notable investor in Toka is the venture capital firm Andreesen Horowitz, which is advised by former Secretary of the Treasury Larry Summers, a close friend of the infamous pedophile Jeffery Epstein, whose own ties to Israeli military intelligence have been discussed in several MintPress reports. Epstein was also a close friend of Ehud Barak, co-founder and director of Toka, and invested at least $1 million in another company with close ties to Barak, Carbyne911. The remaining investors in Toka are Launch Capital, which is deeply tied to the Pritzker family — one of the wealthiest families in the U.S. with close ties to the Clintons and Obamas as well as the U.S.’ pro-Israel lobby, and Ray Rothrock, a venture capitalist who spent nearly three decades at VenRock, the Rockefeller family venture capital fund.

 

Unit 8200 – From Hacking Cars to Protecting Them?

Arguably the most disturbing aspect of Cybereason’s “Operation Blackout” election simulation was the hacking of vehicles that were then rammed into civilians waiting in line to vote at polling stations. In the simulation, this led to scores of dead Americans and hundreds of injuries.

As was the case with other technologies used to undermine the 2020 election in the simulation, this technology — the hacking of vehicles — is the bread and butter of an Israeli cybersecurity firm called Upstream Security that specializes in automobiles and boasts deep ties to the country’s military intelligence service.

Though vehicle hacking seemed out of left field when the 2020 election simulation took place last November, media reports about the imminent dangers of “car hacking” began to emerge just a month after the exercise took place, most of which cited a December 2019 report created by Upstream. Some of those reports have warned that car hacking could be used to undermine the coming U.S. election.

One report titled “Car Hacking Hits the Streets,” cites only Upstream’s report to claim that “In 2020, the connected-car market will reach a tipping point, with the majority of vehicles already connected to the Internet when sold in the United States, representing a large base of potential targets for attacks.” Another report, titled “New study shows just how bad vehicle hacking has gotten,” uses Upstream’s report (i.e. study) to claim that hacks of regular vehicles have exploded since 2016 and that most of the cars on U.S. roads today are vulnerable to hackers and that over 80 percent of those hacks occur remotely.

Neither report noted Upstream’s ties to Israeli military intelligence. Equally notable is the fact that both reports that covered the Upstream-written study say that only manufacturers can address the problem by partnering with a company like Upstream.

Lucky for Upstream, they have already partnered with a slew of auto manufacturers, including Hyundai, Volvo, Renault and even U.S. auto insurance giants like Nationwide, who now number among Upstream’s most important investors. The company’s original investors are Charles River Ventures, one of Cybereason’s first investors, and Israeli venture capital firm Glilot Capital.

Glilot Capital’s interest in Upstream is telling given the firm’s deep ties to Israel’s Unit 8200. Glilot was founded by two former Israeli military intelligence officers and has “a heavy focus on the cyber sector and the entrepreneurs who emerge from the elite Unit 8200,” according to the Jerusalem Post. Even the name of the firm is an homage to Unit 8200, as the unit’s main base is located in Glilot, near Herzliya.

“It’s as if Americans called a VC Fort Meade Capital [the US Army base in Maryland where the National Security Agency and the United States Cyber Command are headquartered], some VC names are meant to be symbolic, as in our case. Glilot is the home of several of the best intelligence and technology units in the IDF, it’s where we came from and it is where we find our best entrepreneurs,” Glilot Capital co-founder Arik Kleinstein told the Jerusalem Post in 2016.

Upstream is certainly the type of company that Glilot Capital is used to investing in. It was founded by two Israelis who both served in the IDF, with one of them serving in an elite intelligence unit. Upstream’s co-founders, Yoav Levy and Yonathan Appel, met while working at Check Point Technologies, the Unit 8200 alumni-founded company with deep ties to Israel’s military intelligence and military-industrial complex as well as the IoT hacking company Toka. Notably, Upstream recently partnered with the Japanese company Fujitsu, a longtime partner with Softbank — Cybereason’s main investor.

Softbank has also invested heavily in another Unit 8200-founded vehicle security start-up called Argus Cyber Security, a firm known for its numerous demonstrations showing how easy it is to hack vehicles. Argus is also backed by Nadav Zafrir, the former Unit 8200 commander who now runs Team8. Argus’ CEO Ofer Ben-Noon, a former captain in Unit 8200, told Forbes in 2014 that “Everything will be hacked in every single [car] brand. It will take time, it might be weeks, months, or a couple of years, but eventually it will happen.”

Since then, Unit 8200 alumni from Argus, Upstream and other Israeli automobile cybersecurity firms have shown media outlets around the world how much easier hacking vehicles has become in the years since Ben-Noon first made the claim. One such report from VICE includes a vehicle hacking demonstration, courtesy of a Unit 8200 alumni, and notes that “most cars today are susceptible to hacker attacks.”

Of course, Unit 8200 isn’t the only intelligence agency known to be experts at hacking vehicles. Indeed, in 2017, WikiLeaks revealed that the CIA was capable of hacking vehicles and exploring their use in committing “undetectable assassinations.”

 

“Bring down nations to their knees”

At the Tel Aviv Cybertech Conference in 2017, Israeli Prime Minister Benjamin Netanyahu stated the following:

Today warfare has changed dramatically…With a click of a button, you can bring down nations to their knees very rapidly if you so desire and if you’re willing to take the risks, because every system can be hacked. Our hospitals, our airplanes, our cars, our banks. The most important word here is our data banks, they can be hacked.”

Media reports and even members of the Israeli public and private sector have openly acknowledged that Israel’s intelligence apparatus — from Unit 8200 to the Mossad — remains directly linked to many of the private technology companies founded by its former members, especially in the field of cybersecurity. Though reports on the matter often praise this merging of Israel’s public and private spheres, they rarely acknowledge the documented corruption within Unit 8200, the unit’s dark past in recruiting felons and even pedophiles to join its ranks, or the danger posed by having companies directly linked to foreign intelligence being given access to the U.S. government’s most classified and sensitive systems and data.

The last omission is particularly troubling given that Israeli intelligence has not only been caught aggressively using private tech companies to spy on U.S. federal agencies and networks, but also intercepting the private communications of at least two U.S. presidents and using a notorious pedophile to sexually blackmail American politicians.

As was mentioned in the first installment of this series, Cybereason’s CEO Lior Div offers a clear example of this worrisome bridge between Israel’s public and private sector, as Div has openly stated that he views his work at Cybereason as a “continuation” of his service to Israeli military intelligence, where he led offensive cyberattacks against other nations.

Given Div’s past statements and his company’s clear ties to both Israeli and U.S. intelligence, Cybereason’s simulation of the 2020 U.S. election — which involved terrorist attacks and led to the election’s cancellation and the imposition of martial law — is highly concerning. This is particularly so considering that Cybereason’s investors have direct ties to individuals who would benefit from the election’s cancellation and also considering the clear narrative that has emerged in recent months regarding how the coming election will inevitably fall victim to tech-driven “chaos” in coming months.

The clear overlap between Cybereason’s simulation and the intelligence-driven media narrative is clear cause for concern, especially considering that the technologies that they highlight as ultimately upending the election are dominated by the very same intelligence agencies simulating and crafting that narrative.

The keyword that has been used to describe the end result of both Cybereason’s simulation and the prevailing media narrative regarding the 2020 election is “chaos,” chaos so imminent, widespread and unruly that it will shake American democracy to its core.

What has been left unsaid, however, is that a government’s solution to “chaos” is always the imposition of “order.” This means that — whatever “chaos” ultimately ensues prior to or on election day — will result in a government response that will do much more to crush freedom and undermine democracy than any act of foreign meddling has, be it real or imagined.

How Far Will They Go?

By James Howard Kunstler

Source: Kunstler.com

CBS-News carried another bucket of muddy water for the coup team Sunday night with a lead 60 Minutes agit-prop story on Maria Butina, an ambitious Russian cutie who worked the American NRA circuit in the most public manner imaginable to make herself into a sex-bomb celebrity at the exact moment in history when the US Deep State wished to reinforce the fantasy, as Lesley Stahl put it, that “Russia was interfering in our electoral process.”

Of course, Ms. Stahl and her shifty producers left out half the story: how Maria Butina was manipulated by her FBI-handler and sometime-boyfriend, Patrick Byrne, the former Overstock.com CEO who had been employed by the Bureau over the years on other undercover assignments. They didn’t mention him or seek to understand his role in the operation. But they gave plenty of air-time to the DOJ lawyer, John C Demers, who prosecuted Ms. Butina, and never bothered to ask Demers why Butina was not charged with espionage — perhaps because nothing remotely like that occurred.

How media giants like Ms. Stahl can keep mouthing this malarkey designed to stoke a new cold war is one of the great mysteries of our national psychology these days. You’d think they’d learned something from the train wreck of the Mueller Investigation, the Brett Kavanaugh fiasco, and the current debacle of Adam Schiff’s imploding Ukraine whistleblower caper — namely, that spouting lies will eventually get you found-out and disgraced.

But the coup team is now dangerously stuck tripling and quadrupling down on its fairy tale narrative as the reckoning of its dark deeds approaches and its star players await their turns on the witness stand. Half the country has been waiting patiently for authorities-of-standing to put an end to this Hitchcockian campaign of seditious fog that has driven us close to the brink of a second civil war. That half of the country has actually been reading the evidence of this treason and sedition — underwritten by Hillary Clinton and her allies — on the back-channels of the Internet. None of that evidence has been posted through the main media outlets wholly owned by the coup team, gospel to the other half of America, and soon millions of credulous bystanders who got high on three years of CIA-issued RussiaGate Kool-Aid will get the surprise of their lives when they discover how deeply they were played.

The CIA and the FBI are in a fight for their lives now. The evidence shows pretty clearly that these rogue agencies conducted all the election “meddling” of 2016 and that the RussiaGate hysteria was an engineered smokescreen to hide their tracks and cover their asses when the certainty of a Hillary election triumph nauseatingly resolved unfavorably in the cold, gray dawn of 11/8/16. Despite the chatter about an “insurance policy,” they were quite unprepared for the exposure that loomed.

They also badly underestimated the resources of what is now a very sturdy alt.media which has managed to weave the real story of what happened over the past three years into a shocking tapestry of massive subversion and treachery. A big part of the true story is how amazingly incompetent the RussiaGate coupsters were. Did they really believe they could conceal the ties between their agencies and Glenn Simpson’s Fusion GPS operation, and its feckless front man, British ex-spy Christopher Steele, and the whole outfit’s connection to Hillary Clinton and the Democratic National Committee? Did they suppose they could pass off Stephan Halper and Joseph Mifsud as Russian agents when the two have consorted with US and allied intelligence for decades? The US Department of Defense even holds Mr. Halper’s million-dollar pay stubs and Mr. Mifsud appears in photographs of every Western cloak-and-dagger cocktail get-together of spook officialdom for the last twenty years.

The latest, and most desperate gambit is the UkraineGate whistleblower, a CIA employee blatantly playing errand-boy for his mentor John Brennan and deeply tied to 2016 election shenanigans emanating from Ukraine, featuring his former employer, ex-Vice-President Joe Biden. This shadowy figure, pegged as Eric Ciaramella, 33, may shortly find himself in a grand jury chamber answering for his role in this charade. Ciaramella has just been hung out to dry by his sponsor, Rep. Adam Schiff in a desperate attempt to dissociate himself from the huggermugger within his House Intel Committee that preceded the falsely blown whistle.

It’s not an overstatement to say that many of the figures behind this gigantic web of lies and deceit ought to answer charges up to and including treason. The question is whether Messers Barr & Durham have the cojones to cater the banquet of consequences that this huge cast of characters should be made to feast from. Another question is whether these desperate characters and the agencies they represent will go all the way now and attempt to enlist the military brass in an outright overthrow of the executive. There are already intimations of this. It would be answered by the kind of civil violence that has broken out in other parts of world where other Deep States have worn out their welcome — and their legitimacy.

Slow-Motion US/UK Killing of Julian Assange

By Stephen Lendmen

Source: StephenLendmen.org

Establishment media are in cahoots with US/UK ruling regimes against Assange for the “crime” of truth-telling journalism abhorred in the West — totalitarian rule where these societies are heading.

In mid-October, UN special rapporteur on torture Nils Melzer denounced Assange’s judicial lynching and egregious mistreatment, saying the following:

“What has the man done? He has disclosed an enormous amount of information that governments want to remain secret, most infamously the ‘Collateral Murder’ video, which, in my view, is evidence for war crimes.”

“What is the scandal in this case is that everyone focuses on Julian Assange. Here is someone who exposes evidence for war crimes, including torture and murder, and he is under this constant pressure.”

“I am absolutely convinced he will not receive a fair trial in Virginia, and he will remain in prison under inhumane conditions for the rest of his life.”

Tulsi Gabbard is the only US presidential aspirant expressing support for journalist Assange, as well as whistleblowers Chelsea Manning, Edward Snowden, and others like them, opposing their “prosecution like criminals.”

If elected president, she’d drop charges against them, she said, calling for greater “protect(ion) (of) our civil liberties,” adding:

Assange’s arrest in Britain “poses a great threat to our freedom of the press and to our freedom of speech” — the same true about how Chelsea Manning, Snowden, and other whistleblowers are mistreated.

What happened to them “could happen to you. It could happen to any of us,” she stressed.

Bipartisan politicians in the US and UK, along with establishment media, refuse to support Assange’s struggle for justice.

On Monday, he appeared in London’s Westminster Magistrates Court. Showing the effects of egregious mistreatment since unlawfully dragged from the city’s Ecuadorian embassy and imprisoned under harsh conditions, he was too physically and emotionally shattered to participate in his defense.

He’s an investigative journalist/whistleblower, publishing material supplied by sources believed to be credible, unidentified for their protection.

WikiLeaks is not an intelligence operation. Nor it it connected to Russia or any other country. Claims otherwise are fabricated.

Assange earlier explained that WikiLeaks has the right “to publish newsworthy content. Consistent with the US Constitution, we publish material that we can confirm to be true,” he stressed.

US charges against him are fabricated and malicious, what no legitimate tribunal would accept.

Justice Department lawyer James Lewis falsely accused him of “spying,” lied saying he’s “not a journalist,” turned truth on its head claiming his actions were “criminal in both the US and UK” — the above Big Lies how all fascist police states operate.

Assange attorney Mark Summers called for dismissal of Washington’s illegitimate extradition request, saying:

According to the 2003 UK/US extradition treaty, it “shall not be granted if the offense for which extradition is requested is a political offense,” adding:

The unjustifiable persecution of Assange and Chelsea Manning is “part of an avowed war on whistleblowers to include investigative journalists and publishers.”

Summers requested a three-month delay of Assange’s February 25 extradition hearing because “we need more time” to prepare a proper defense, given the “enormity” of issues involved, requiring “evidence gathering that would test most lawyers.”

Operating as an imperial tool, judge Vanessa Baraitser denied the request, saying the extradition hearing will proceed as schedule on February 25 at Woolwich Magistrates Court near Belmarsh Prison.

Its public gallery has three seats, assuring Assange’s judicial lynching will be virtually closed to public scrutiny.

Barely able to stand and speak after months of barbaric mistreatment, when asked if there’s “anything (he) would like to say, he replied barely audibly that he doesn’t “understand how this is equitable,” adding:

Imperial USA “had 10 years to prepare (its judicial lynching). I can’t remember anything. I can’t access any of my written work.”

“It’s very difficult to do anything with such limited resources against a superpower intent on” an illegitimate crucifixion. “I can’t think properly” from the barbaric ordeal he’s endured.

Baraitser dismissively replied that “conditions of your detainment are not the subject of this court.”

Following the hearing, WikiLeaks editor-in-chief Kristinn Hrafnsson called for the case against Assange to “be thrown out immediately,” adding:

“Not only is it illegal on the face of the (extradition) treaty, the US has conducted illegal operations against Assange and his lawyers which are the subject of a major investigation in Spain.”

John Pilger witnessed Monday’s spectacle, saying “(t)he whole thing is a grotesque absurdity. There is an extradition law between this country and the United States.”

“It states specifically that someone cannot be extradited if the offenses are political.”

“The source of this is a rogue (US) state — a state that ignores its own laws and international laws and the laws of this country.”

Summers called Assange’s crucifixion “a political attempt to signal to journalists the consequences of publishing information” ruling regimes want suppressed.

“It’s legally unprecedented…part of an avowed war on (truth-telling) whistleblowers to include investigative journalists and publishers.”

In cahoots with the Trump regime, police state Britain is killing Assange slowly, wanting him, whistleblowers like Chelsea Manning, and other truth-tellers silenced.

What’s going on is the hallmark of totalitarian rule – controlling the message, eliminating what conflicts with it, notably on major geopolitical issues.

Losing the right of free expression endangers all others. When truth-telling and dissent are considered threats to national security, free and open societies no longer exist – the slippery slope America and other Western societies are heading on.

Jeffrey Epstein Dies Of “Suicide”

By Caitlin Johnstone

Source: CaitlinJohnstone.com

Disappointing everyone yet surprising no one, accused sex trafficker and alleged billionaire Jeffrey Epstein has “committed” “suicide”. Details are muddled and conflicting, with CNN reporting that Epstein “was taken from New York’s Metropolitan Correctional Center at 3:30 a.m. Saturday in cardiac arrest and died at an area hospital” and the New York Times reporting that “Mr. Epstein hung himself and his body was found this morning at roughly 7:30.”

Some reports claim that Epstein has been on suicide watch due to a prior alleged suicide attempt three weeks ago when he was found unconscious with bruising on his neck, others deny it. If he wasn’t it’s weird because he obviously should have been, and if he was it’s weird because it failed. Prisons vary greatly in how they implement suicide watch protocol, but at bare minimum it should mean that unsafe objects have been removed from the prisoner’s cell and monitoring has been greatly increased. Stockton University criminal justice professor Christine Tartaro told CNN in an interview on the subject in 2017 that on suicide watch “there should be constant, one-on-one eyes on (suicidal) inmates.”

Following Epstein’s arrest last month on federal sex trafficking charges, many people predicted that exactly this would happen, some half-jokingly and some not. This is because, as Whitney Webb of Mint Press News documented in a recent article titled “Mega Group, Maxwells and Mossad: The Spy Story at the Heart of the Jeffrey Epstein Scandal”, Epstein appears to have been involved in a complex Mossad-tied sexual blackmail operation and had close ties with many powerful people, including Donald Trump and the Clintons. The narrative that the Clintons have a penchant for “suiciding” their enemies was already a viral idea in right-wing conspiracy circles, and many of the early prognostications of Epstein’s fate came from that side of the political aisle.

But those voicing skepticism about Epstein’s death today come from all across the political spectrum, from left to right and from fringe to mainstream.

“People close to Epstein fear he was murdered… as Epstein told authorities someone tried to kill him in a previous incident weeks earlier. He was described as being in good spirits in recent days,” claims The Washington Post‘s Carol Leonnig.

“Bill Clinton, Donald Trump, various billionaire wall st. goons, hollywood elites and royal family creeps breathe a sigh of relief. He happens to have dirt on every powerful scumbag alive, how mighty convenient!” tweeted Secular Talk‘s Kyle Kulinski.

“If Epstein’s death is still under investigation, and no one can explain yet how he killed himself, why is mainstream media reporting it definitively as a suicide? Even the FBI is calling it an ‘apparent suicide’,” tweeted journalist Max Blumenthal.

“How was Epstein not on the most intensive suicide watch protocol available???” tweeted journalist Michael Tracey.

“Scandalous. I supervised jail suicide investigations at DOJ. Experts will tell you that it’s essentially always true that jail inmate suicides are preventable, so when one happens it represents a major failure on the part of the jail,” tweeted human rights lawyer Sam Bagenstos.

“Something about this whole situation stinks,” legal analyst Rikki Klieman told CBS today. “What you have is someone who attempted suicide and now is on a suicide watch, and in the midst of the suicide watch manages to commit suicide? There are gonna be heads that will roll from the Bureau of Prisons looking at the [Metropolitan Correctional Center], because this is the type of situation where you do not know if it’s a suicide or you do not know if it is something else.”

https://twitter.com/JoeNBC/status/1160184410588758018

Others, of course, have been bleating about Russia for no reason.

“A guy who had information that would have destroyed rich and powerful men’s lives ends up dead in his jail cell. How predictably…Russian,” tweeted MSNBC’s Joe Scarborough to thousands of retweets and tens of thousands of likes.

This story is nuts. I personally am on record disagreeing with those on both sides of the aisle who’ve been claiming that the Epstein scandal was going to lead to mass arrests of extremely powerful people in Washington, because the swamp protects itself. We see that today clearer than ever. Whatever happened in that prison cell today, it made some nasty swamp monsters very happy.

“Jeffrey Epstein’s suicide ends the criminal case against him because no one else was charged in the indictment,” tweeted former federal prosecutor Renato Mariotti, adding, “Epstein’s death means that there won’t be a public trial or other proceedings that could reveal evidence of his wrongdoing. Evidence collected via grand jury subpoena won’t be released to the public.”