The Cyber-War on Wikileaks

By

Source: CounterPunch

When the ruling class is in panic, their first reaction is to hide the panic.

They react out of cynicism: when their masks are revealed, instead of running around naked, they usually point the finger at the mask they wear. These days the whole world could witness a postmodern version of the infamous quote “Let them eat cake”, attributed to Marie-Antoinette, queen of France during the French Revolution.

As a reaction to WikiLeaks publishing his emails, John Podesta, the man behind Hillary Clinton’s campaign, posted a photo of a dinner preparation, saying “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”.

A similar version of vulgar cynicism emerged earlier this month when Hillary Clinton reacted to the claim that she reportedly wanted to “drone” WikiLeaks founder Julian Assange (“Can’t we just drone this guy?”) when she was the US Secretary of State. Instead of denying her comments, Clinton said that she doesn’t recall any such joke, “It would have been a joke if it had been said, but I don’t recall that”.

One doesn’t have to read between the lines to understand that if Hillary Clinton had said that, she would have considered it a joke. But when emperors joke, it usually has dire consequences for those who are the objects of their “humor.”

Cyber-war Not with Russia…but WikiLeaks

During the last few months I have visited Julian Assange in the Ecuadorian Embassy in London several times and each time I came out of the Embassy, where he is spending his fifth year in political asylum under legitimate fear he might be extradited to the US, my thought was the following one: although he lives, without his family, in a postmodern version of solitary confinement (even prisoners are allowed to walk for up to one hour a day), although he has no access to fresh air or sunlight for more than 2000 days, although the UK government recently denied him safe passage to a hospital for an MRI scan, if his access to the internet would be cut off this would be the most severe attack on his physical and mental freedom.

The last time I saw him, which was only two weeks ago, he expressed the fear that, because he had already published leaks concerning US elections and with more to come, the US might find various ways to silence him, including pressuring Ecuador or even shutting down the internet.

What seemed a distant possibility only two weeks ago, soon became a self-fulfilling prophecy.

When the Obama administration recently announced that it is, as Biden said, planing an “unprecedented cyber covert action against Russia”, the first victim was not Putin, but precisely Julian Assange whose internet was cut off just a day after Biden’s self-contradictory proclamation.

No wonder Edward Snowden reacted immediately by saying that “nobody told Joe Biden what ‘covert operation’ means.

According to the U.S. Department of Defense’s Dictionary of Military and Associated Terms, a covert operation is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.”

It is no secret anymore that the Ecuadorian government has come under extreme pressure since Assange leaked the Democratic National Committee email database. We don’t know yet whether the US pressured Ecuador to shut down the internet, but it is clear that the present US government and the government to come is fighting a war with WikiLeaks which is all but “covert”. Is it really a coincidence that Julian Assange’s internet access was cut off shortly after publication of Clinton’s Goldman Sachs speeches?

If at the beginning we still had a “soft” version of postmodern McCarthyism, with Hillary calling everyone opposed to her campaign a Russian spy (not only Assange, but also Donald Trump and Jill Stein), then with Obama’s recent intervention it became more serious.

With Obama’s threat of a cyber-war, the “soft” McCarthyism didn’t only acquire geopolitical significance, but at the same time a new mask was revealed: Obama is obviously trying to cement the public debate and make the Russian threat “real”, or at least to use it as a weapon in order to help Clinton to get elected. Moreover, this new twist in something that has already become much more than only US elections (US elections are never only US elections!), shows not only how Obama is ready to strengthen Hillary’s campaign, but it also reveals that a cyber war is already in the making.

It is not a cyber war with Russia, but with WikiLeaks.

And it is not the first time.

What would Clausewitz say?

In 2010, when the Collateral Murder video was published, the Afghan and Iraq war logs were released, and we witnessed one of the most sinister attacks on freedom of speech in recent history. VISA, Mastercard, Diners, American Express and Paypal imposed a banking blockade on WikiLeaks, although WikiLeaks had not been charged with any crime at either state, federal or international level. So if the US government successfully convinced payment companies representing more than 97% of the global market to shut down an independent publisher, why wouldn’t they pressure Ecuador or any other state or company to cut off the internet?

The US is not only rhetorically trying to “get” Assange (it is worth to check out the Assassinate Assange video for evidence of the verbal masturbation of US officials), he poses a serious threat to the major elite factions in the US to remain in power. No wonder panic is rising in the US, which is now going even so far that a 16-year-old boy in Britain has been arrested on criminal charges related to the alleged hacking of email accounts used by CIA director John Brennan, which WikiLeaks published in October 2016.

What WikiLeaks obviously successfully challenged–and maybe one day (“history is written by the victors”, remember?) it will be learned in military strategy– is what the Prussian general and military theorist Carl von Clausewitz would call the “centre of gravity” (Schwerpunkt), which is the “central feature of the enemy’s power”.

Instead of speaking about the Russians, we should start speaking about the Schwerpunkt of the actual leaks, their real essence. Just take the following quotes by Hillary Clinton exposed by WikiLeaks, which reveal her true nature and the politics behind her campaign: “We are going to ring China with missile defence”, “I want to defend fracking” and climate change environmentalists “should get a life”, “you need both a public and a private position”, “my dream is a hemispheric common market, with open trade and open borders”.

What WikiLeaks has shown is not only that Hillary is a hawkish war-monger, first it was Libya (over 1,700 of the 33,000 Clinton emails published by WikiLeaks reference Libya), then it was Syria (at a Goldman Sachs conference she explicitly stated she would like to intervene in Syria), tomorrow it will be another war.

It is now clear – and this is the real “centre of gravity” where we should focus our attention – that the future Clinton cabinet may already been filled with Wall Street people like Obama’s was. No wonder WikiLeaks revelations create utter panic not only in the Democratic Party itself but also the Obama administration.

One question remains, isn’t WikiLeaks, by leaking all these dirty secrets, influencing the US elections? Yes, it certainly is, but the current criticism misses its point: isn’t the very point of organisations such as WikiLeaks to publish the material they have and to influence public opinion?

The question should finally be turned around: isn’t the US mainstream media the one influencing the US elections? And isn’t Obama, by announcing a cyber-war with Russia, influencing the elections?

WikiLeaks is not only influencing the US elections, but transforming the US elections – as they should have been from the very beginning – into a global debate with serious geopolitical consequences at stake. What WikiLeaks is doing is revealing this brutal fight for power, but, as the old saying goes, “when a wise man points at the Moon, the idiot looks at the finger”. Instead of looking at the finger pointing to Russia, we should take a look at the leaks themselves.

If democracy and transparency means anything today, we should say: let them leak!

 

Srećko Horvat is a philosopher and activist. He is co-author, with Slavoj Žižek, of What Does Europe Want? (Columbia University Press, 2014) and author of The Radicality of Love (Polity Press, 2015). Together with Yanis Varoufakis he co-created the movement DiEM 25. https://diem25.org/

The Odor of Desperation

screen-shot-2016-10-18-at-8-59-54-pm

By James Howard Kunstler

Source: Kunstler.com

It must be obvious even to nine-year-old casual observers of the scene that the US national election is hacking itself. It doesn’t require hacking assistance from any other entity. The two major parties could not have found worse candidates for president, and the struggle between them has turned into the most sordid public spectacle in US electoral history.

Of course, the Russian hacking blame-game story emanates from the security apparatus controlled by a Democratic Party executive establishment desperate to preserve its perks and privileges . (I write as a still-registered-but-disaffected Democrat). The reams of released emails from Clinton campaign chairman John Podesta, and other figures in HRC’s employ, depict a record of tactical mendacity, a gleeful eagerness to lie to the public, and a disregard for the world’s opinion that are plenty bad enough on their own. And Trump’s own fantastic gift for blunder could hardly be improved on by a meddling foreign power. The US political system is blowing itself to pieces.

I say this with the understanding that political systems are emergent phenomena with the primary goal of maintaining their control on the agencies of power at all costs. That is, it’s natural for a polity to fight for its own survival. But the fact that the US polity now so desperately has to fight for survival shows how frail its legitimacy is. It wouldn’t take much to shove it off a precipice into a new kind of civil war much more confusing and irresolvable than the one we went through in the 1860s.

Events and circumstances are driving the US insane literally. We can’t construct a coherent consensus about what is happening to us and therefore we can’t form a set of coherent plans for doing anything about it. The main event is that our debt has far exceeded our ability to produce enough new wealth to service the debt, and our attempts to work around it with Federal Reserve accounting fraud only makes the problem worse day by day and hour by hour. All of it tends to undermine both national morale and living standards, while it shoves us into the crisis I call the long emergency.

It’s hard to see how Russia benefits from America becoming the Mad Bull of a floundering global economy. Rather, the Evil Russia meme seems a projection of our country’s own insecurities and contradictions. For instance, we seem to think that keeping Syria viciously destabilized is preferable to allowing its legitimate government to restore some kind of order there. Russia has been on the scene attempting to prop up the Assad government while we are on the scene there doing everything possible to keep a variety of contestants in a state of incessant war. US policy in Syria has been both incoherent and tragically damaging to the Syrians.

The Russians stood aside while the US smashed up Iraq, Afghanistan, and Libya. We demonstrated adequately that shoving sovereign nations into civic failure is not the best way to resolve geopolitical tensions. Why would it be such a bad thing for the US to stand aside in Syria and see if the Russians can rescue that country from failure? Because they might keep a naval base there on the Mediterranean? We have scores of military bases around the region.

It’s actually pretty easy to understand why the Russians might be paranoid about America’s intentions. We use NATO to run threatening military maneuvers near Russia’s borders. We provoked Ukraine — formerly a province of the Soviet state — to become a nearly failed state, and then we complained foolishly about the Russian annexation of Crimea — also a former territory of the Soviet state and of imperial Russia going back centuries. We slapped sanctions on Russia, making it difficult for them to participate in international banking and commerce.

What’s really comical is the idea that Russia is using the Internet to mess with our affairs — as if the USA has no cyber-warfare ambitions or ongoing operations against them (and others, such as hacking Angela Merkel’s personal phone). News flash: every country with access to the Internet is in full hacking mode around the clock against every other country so engaged. Everybody’s doing it. It is perhaps a projection of America’s ongoing rape hysteria that we think we’re special victims of this universal activity.

 

Related Article:

Update from Craig Murray: “I can tell you with 100% certainty that it is not any Russian state actor or proxy that gave the Democratic National Committee and Podesta material to WikiLeaks.”

Hillary and the Clinton Foundation: Exemplars of America’s Political Rot

Clinton

By Eric Draitser

Source: CounterPunch

Hillary Clinton may be enjoying a comfortable lead in national polls, but she is far from enjoying a comfortable night’s sleep given the ever-widening maelstrom of scandals engulfing her presidential bid.  And while Clinton delights in bloviating about a decades-long “vast, right wing conspiracy” against her, the fact is that it’s the Clinton political machine’s long and storied track record of criminality, duplicity, and corruption that haunts her like Lincoln’s ghost silently skulking through White House bedrooms.

The latest in a string of embarrassing scandals is centered on the powerful Clinton Foundation, and the obvious impropriety of its acceptance of large donations from foreign governments (and wealthy individuals connected to them), especially those governments universally recognized as oppressive dictatorships whose foreign policy orientation places them squarely in the US orbit.

Of particular note are the Gulf monarchies such as Saudi Arabia and Qatar whose massive donations belie the fact that their oppression of women runs contradictory to Clinton’s self-styled ‘feminism’ and belief “that the rights of women and girls is the unfinished business of the 21st Century.”  Is collaborating with feudal monarchies whose subjugation of women is the stuff of infamy really Clinton’s idea of feminism?  Or, is it rather that Clinton merely uses issues such as women’s rights as a dog whistle for loyal liberals while groveling before the high councilors of the imperial priesthood?

What the Clinton Foundation hullabaloo really demonstrates is that Clinton’s will to power is single-minded, entirely simpatico with the corruption of the military-industrial-financial-surveillance complex; that she is a handmaiden for, and member of, the ruling establishment; that Clinton represents the marriage of all the worst aspects of the political class.  In short, Clinton is more than just corrupt, she is corruption personified.

Clinton’s Dirty Dealing and Even Dirtier Laundry

In a hilariously pig-headed, but rather telling, statement, former President Bill Clinton responded to allegations of impropriety with the Clinton Foundation by saying, “We’re trying to do good things…If there’s something wrong with creating jobs and saving lives, I don’t know what it is. The people who gave the money knew exactly what they were doing. I have nothing to say about it except that I’m really proud.”

Leaving aside the fact that such an arrogant comment demonstrates Bill Clinton’s complete contempt for ethics and the basic standards of proper conduct, the salient point is that the argument from the Clintons is that the foundation is inherently good, that it helps people around the world, and that, as such, it can’t possibly be corrupt and unethical.  Where there’s smoke, there’s fire – except when it comes to the Clintons who stand proudly enveloped in billowing clouds of smoke swearing up and down that not only is there no fire, but anyone who mentions the existence of flames is both a sexist and Trump-loving Putin stooge.

But indeed there is a fire, and it is raging on the American political scene.  And nowhere is the heat more palpable than in the deserts of the Middle East where wealthy benefactors write massive checks for access to America’s 21st Century Queen of Mean (apologies to Leona Helmsley).

Consider the 2011 sale of $29 billion worth of advanced fighter jets to Saudi Arabia, a gargantuan deal that made the feudal monarchy into an overnight air power.  Were there any doubts as to the uses of the hardware, look no further than the humanitarian nightmare that is Yemen, a country under relentless air war carried out by the Saudis.  And, lo and behold, the Saudis had been major contributors to the Clinton Foundation in the years leading up to the sale. And it should be equally unsurprising that just weeks before the deal was finalized, Boeing, the manufacturer of the F-15 jets that were the centerpiece of the massive arms deal, donated $900,000 to the Foundation.

Of course, according to Bubba and Hil, it’s all conspiracy theory to suggest that the Clinton Foundation is essentially a pay-for-play scheme in which large sums of money translate into access to the uppermost echelons of state power in the US.  As the International Business Times noted:

The Saudi deal was one of dozens of arms sales approved by Hillary Clinton’s State Department that placed weapons in the hands of governments that had also donated money to the Clinton family philanthropic empire…Under Clinton’s leadership, the State Department approved $165 billion worth of commercial arms sales to 20 nations whose governments have given money to the Clinton Foundation…That figure — derived from the three full fiscal years of Clinton’s term as Secretary of State (from October 2010 to September 2012) — represented nearly double the value of American arms sales made to the those countries and approved by the State Department during the same period of President George W. Bush’s second term.

The Clinton-led State Department also authorized $151 billion of separate Pentagon-brokered deals for 16 of the countries that donated to the Clinton Foundation, resulting in a 143 percent increase in completed sales to those nations over the same time frame during the Bush administration. These extra sales were part of a broad increase in American military exports that accompanied Obama’s arrival in the White House. The 143 percent increase in U.S. arms sales to Clinton Foundation donors compares to an 80 percent increase in such sales to all countries over the same time period.

Additionally, as Glenn Greenwald explained earlier this year,

The Saudi regime by itself has donated between $10 million and $25 million to the Clinton Foundation, with donations coming as late as 2014, as she prepared her presidential run. A group called “Friends of Saudi Arabia,” co-founded “by a Saudi Prince,” gave an additional amount between $1 million and $5 million. The Clinton Foundation says that between $1 million and $5 million was also donated by “the State of Qatar,” the United Arab Emirates, and the government of Brunei. “The State of Kuwait” has donated between $5 million and $10 million.

The sheer dollar amounts are staggering.  Perhaps then it comes as no surprise just why nearly every single influential figure in the military-industrial-financial-surveillance complex – from General John Allen to death squad coordinator extraordinaire John Negroponte, from neocon tapeworms such as Max Boot, Robert Kagan, and Eliot Cohen to billionaire barbarocrats like the Koch Brothers, George Soros, and Warren Buffett – is backing Hillary Clinton.  Not only is she good for Empire, she’s good for business.  And ultimately, that’s what this is all about, isn’t it?

But of course, Hillary’s devotion to the oil oligarchs of Saudi Arabia and the Gulf goes much deeper than simply an exchange of money for weapons.  In fact, Hillary is deeply committed to the Saudi royal family’s foreign policy outlook and tactics, in particular the weaponization of terrorism as a means of achieving strategic objectives.

Libya provides perhaps the paragon of Clintonian-Saudi strategy: regime change by terrorism.  Using terror groups linked to Al Qaeda and backed by Saudi Arabia, Clinton’s State Department and the Obama Administration managed to topple the government of Muammar Gaddafi, thereby throwing the former “jewel of Africa” into turmoil and political, economic, and social devastation.   To be fair, it was not the Saudis alone involved in fomenting war in Libya, as Hillary’s brothers-from-other-mothers in Qatar and the United Arab Emirates were also directly involved in sowing the seeds of the current chaos in the country.

And of course, this strategic partnership between Clinton and the Gangsters of the Gulf extends far beyond Libya.  In Syria, Clinton’s stated policies of regime change and war are aligned with those of Riyadh, Doha, and Abu Dhabi.  And, of course, it was during Clinton’s tenure at the State Department that US intelligence was involved in funneling weapons and fighters into Syria in hopes of doing to Syria what had already been done to Libya.

Huma Abedin: Clinton’s Woman in Riyadh

Just in case all the political and financial ties between Clinton and the Gulf monarchies wasn’t enough to make people stop being #WithHer, perhaps the role of her closest adviser might do the trick.  Huma Abedin, Clinton’s campaign chief of staff, has long-standing ties to Saudi Arabia, the country where Huma spent her childhood from the age of two.  As a Vanity Fair exposé revealed earlier this year:

When Abedin was two years old, the family moved to Jidda, Saudi Arabia, where, with the backing of Abdullah Omar Nasseef, then the president of King Abdulaziz University, her father founded the Institute of Muslim Minority Affairs, a think tank, and became the first editor of its Journal of Muslim Minority Affairs…After [Abedin’s father] Syed died, in 1993, his wife succeeded him as director of the institute and editor of the Journal, positions she still holds… Abdullah Omar Nasseef, the man who set up the Abedins in Jidda…is a high-ranking insider in the Saudi government and sits on the king’s Shura Council, there are claims that Nasseef once had ties to Osama bin Laden and al-Qaeda—a charge that he has denied through a spokesman—and that he remains a “major” figure in the Muslim Brotherhood. In his early years as the patron of the Abedins’ journal, Nasseef was the secretary-general of the Muslim World League, which Andrew McCarthy, the former assistant U.S. attorney who prosecuted the “Blind Sheik,” Omar Abdel Rahman, in the wake of the 1993 World Trade Center bombing, claims “has long been the Muslim Brotherhood’s principal vehicle for the international propagation of Islamic supremacist ideology.”

Consider the implications of this information: Clinton’s closest adviser comes from a family connected at the highest levels with the Saudi royal family as well as the Muslim Brotherhood.  While right wing pundits portray the Muslim Brotherhood as some sort of straightforward international terror organization, the reality is much more complex as the Brotherhood is more an international political movement whose tentacles stretch into nearly every corner of the Muslim world. Its vast reserves of cash and political influence, backed by Gulf monarchies such as Qatar, allows the Brotherhood to peddle influence throughout the West, while also being connected to more radical salafist elements.  An obvious two-for-one for Clinton.

In effect then, Abedin represents a bridge connecting Hillary with both the ruling elites in Riyadh, as well as influential clerics, businesspeople, and political leaders throughout the Middle East. Perhaps then it makes sense why Abedin, in contravention of every standard of ethics, was employed by Teneo Holdings – a pro-Clinton consultancy founded by former Clinton aide Doug Band – while also working for the State Department.  Such ethical violations are as instinctive for Hillary as breathing, or calling children superpredators.

Trump, Assange, Putin, and Clinton’s Sleight of Hand

Despite being embroiled in multiple scandals, any one of which being enough to sink the campaign of most other candidates, Clinton and her army of fawning corporate media sycophants, have attempted to deflect attention away from her own misdeeds, corruption, and nefarious ties by instead portraying everyone who opposes them as puppets, stooges, and useful idiots.

Let’s begin with Republican nominee and gasbag deluxe, Donald Trump, who Clinton trolls have attempted to portray as a stooge of Russian President Putin.   While it’s indeed quite likely that the Kremlin sees Trump as far less of a threat to Russia’s interests than Clinton – just look at Clinton’s roster of neocon psychopath supporters to see that Putin has a point – the notion that Trump is somehow a creation of Putin, or at the very least is working for him is utterly absurd.

And the “evidence”? Trump’s connections with wealthy Russian oligarchs.  I suppose those who have made their homes under rocks these last 25 years might not know this, but nearly every billionaire investor has gone to Russia in that time, forged ties with influential Russians, and attempted to make money by stripping clean the bones of what was once the Soviet Union.  Sorry Naomi Klein, I guess the Clintonistas expect no one to have read Shock Doctrine which details the sort of disaster capitalism run amok that took place in Russia in the 1990s.

And then, of course, there’s that great confabulator Julian Assange who has also been smeared as a Putin puppet by the #ImWithHer media somnambulists.  I guess the lords of corporate capital didn’t like the fact that Assange and WikiLeaks have managed to expose countless dirty deeds by Clinton’s Tammany Hall of the 21stCentury.  From using the DNC as a political appendage of the Clinton campaign (as revealed by the WikiLeaks dump of DNC emails) to his recent promise to make public the “most interesting and serious” dirt on Hillary, Assange has become a thorn in the side – or thumb in the eye, as it were – for Hillary.

And what would a rundown of the specters haunting Clinton’s dreams be without mention of the rabid bear of Russia, big bad Vlad?  Clinton recently referred to Putin as the “grand godfather of this global brand of extreme nationalism.”  Leaving aside the asinine phraseology, Clinton’s attacks on Putin reveal the weakness of the Democratic nominee, the hollowness of her arguments, and the unmitigated gall of a hypocrite for whom casting stones in glass houses is second nature.

For, at the very moment that she takes rhetorical swipes at Putin, Clinton herself is implicated in a worldwide network of extremism that promotes terrorism, rains death and destruction on millions of innocent civilians, and moves the world closer to global conflict.  If Putin represents the éminence grise of a “global brand of extreme nationalism,” then Clinton is the fairy godmother of global extremism and terror.  It’s a good thing she has access to the best personal grooming products Goldman Sachs money can buy as it is not easy to wash decades-worth of blood off your hands.

And so, the quadrennial danse macabre that is the US presidential election has turned into an embarrassing sideshow of dull-witted infantilism.  But amid the idiocy there is wanton criminality and corruption to be exposed before the world.  For while Trump is undoubtedly the bearded lady of America’s freak show, Hillary is the carnival barker.

She knows the ring toss and other games are rigged, but she coaxes the feeble-minded to play nonetheless.  She knows the carnies are drunk and reckless, but she urges the children to pay for another ride anyway.  She understands that her job is to sell a rigged game, and to call security when someone challenges her lies. And, unfortunately, whether you want it or not, the Hillary Roadshow is coming to a town, or country, near you.

Eric Draitser is the founder of StopImperialism.org and host of CounterPunch Radio. He is an independent geopolitical analyst based in New York City. You can reach him at ericdraitser@gmail.com.

Stripping the veneer off America’s propaganda menagerie

qefgtrhy

By Wayne Madsen

Source: Intrepid Report

National Security Agency whistleblower Edward Snowden and WikiLeaks founder Julian Assange have doubled down recently on the games being played in cyberspace by America’s cyberwarriors. Snowden suggests that many of NSA’s most damaging malware programs are now in the hands of America’s opponents, thanks to enterprising foreign counterintelligence hackers known as the Shadow Brokers. Snowden believes that the malware, including destructive programs such as Stuxnet, are being auctioned off, via Bitcoin payments, by the Shadow Brokers. Snowden stated that the malware was obtained through hacking from a murky NSA operation called the “Equation Group.”

Assange, fearful that a new Ecuadorian president will hand him over to a Clinton administration in 2017, claims to have more hacked bombshells to drop on Team Clinton, courtesy of weak security in Democratic National Committee and Clinton campaign computer systems.

We have entered a new phase of cyberwarfare, one in which America’s (and Israel’s) most damaging computer hacking and disruption programs are available to anyone willing to pay in Bitcoins on the cyberblack market. The Democratic Party’s leaked emails, coupled with the leaked State Department cables, has Hillary Clinton in an outrage. These disclosures, along with the Snowden disclosures that illustrate how America spies on friend and foe, have stripped the veneer off of America’s propaganda menagerie. Two of the three culprits Mrs. Clinton would like to see in prison for the rest of their lives are, for the time being, outside of Gulag America. Snowden is enjoying political asylum in Russia and Assange has asylum at the Ecuadorian embassy in London. The third, Chelsea Manning, is serving a 35-year prison term at Fort Leavenworth in Kansas and allegedly recently attempted suicide.

Paul Ceglia, who claims to have been the co-founder of Facebook, says he is on the run from the CIA after he filed suit against Facebook and its owner Mark Zuckerberg. Although Zuckerberg admits to having a past business relationship with Ceglia, the US Justice Department criminally charged Ceglia for trying to defraud Facebook after the former associate of Zuckerberg brought a civil suit in federal court in Buffalo against the company. Interestingly, Facebook has donated more money to Hillary Clinton than any other presidential candidate. But what is really at issue in the bizarre case is that Ceglia claims that Facebook’s seed money came from the CIA’s venture capital firm IN-Q-TEL, a charge to which WMR can attest after compiling a massive list of CIA front companies and proprietaries in the soon-to-be-published book: “The Almost Classified Guide to CIA Front Companies, Proprietaries and Contractors.”

The CIA and its partners at Facebook, Google, Yahoo, Microsoft, and other social media firms have striven to control the new media in the same manner that the CIA controlled the “old media” through operations like MOCKINGBIRD. During the Cold War era, the CIA claimed that all the world’s ills were due to Communist front organizations that influenced the media. The truth is that the so-called “fronts” often provided actual accounts of the misdeeds of the CIA and other Western intelligence agencies. However, with U.S. newspapers, magazines, and broadcast networks carrying the water for the CIA, it was Langley’s interpretation of the news that made Western headlines. The “Communist” reports were relegated to the nether regions of “Soviet disinformation” campaigns and “active measures.” The CIA laughably put out a periodical report on such “disinformation” tactics. In reality, what was called “disinformation” was actually bona fide news.

Today, when the CIA wants to debase a news article, it uses such operations as Snopes.com and Wikipedia to engage in CIA disinformation tactics. Uncomfortable truthful news items are quickly dispatched with the term “conspiracy theory.” There is little doubt that Facebook, Wikipedia, and Snopes are part of a “new MOCKINGBIRD” designed for the digital age. Like them or not, Snowden, Assange, Manning, Ceglia, and others have pulled the veil off of the new MOCKINGBIRD.

A formerly secret February 1987 CIA report on Soviet disinformation tactics illustrates that what was described then as “propaganda” was, in fact, the truth.

  • The CIA called baseless charges in a Soviet book that Jonestown, Guyana was a CIA behavioral control operation. It was.
  • The Soviets accused Ronald Reagan’s Strategic Defense Initiative (SDI) of having the goal of weaponizing outer space. Not only was that the goal then, but it remains the goal of present incarnations of SDI.
  • The Soviets and the Afghan president, Najibullah of the Afghan Communist Party, said that they reached out to 50,000 Afghan mujaheddin in Afghanistan and Pakistan, who agreed to lay down their arms and join a coalition government, with eight opposition parties joining the Communists. The CIA and Western media called the news bogus. It was true with television footage of Afghan refugees returning to their homeland from India. The Soviets wanted an internationally-guaranteed neutral Afghanistan before withdrawing their troops. The CIA wanted a radical Islamic Afghanistan from which to launch attacks on the southern Soviet Union. That decision came back to bite the United States on September 11, 2001.
  • The CIA accused the Sandinista government of Nicaragua and the Soviets of being behind the Christian “Evangelical Committee for Development Aid” as a Communist front group. If so, it would have been the first time Communists and Christian evangelicals broke bread together. The CIA’s charge was fatuously false.
  • The Soviets accused the U.S. of using Africans as test subjects for a new AIDS vaccine. This charge has been proven with Africans being used as “guinea pigs” for various new vaccines in programs funded by the Bill and Melinda Gates Foundation, the Clinton Global Initiative, Pfizer Corporation, and other entities linked to CIA biological and genetic warfare operations.
  • Articles in two Bolivian newspapers that stated that the U.S. Information Service in La Paz was trying to recruit Bolivian journalists to write pro-Pentagon articles were deemed by the CIA to be bogus. The CIA charge was false and it included smearing the Federation of Bolivian Press Workers as a Communist front. That is the usual practice by the CIA when it’s caught red-handed.
  • The Soviet news agency Novosti was accused of running a false article, titled “The Relationship Between Journalists and the CIA: Hundreds of Them in International Press.” The article was spot on.
  • The CIA charged as Soviet disinformation charges that the CIA killed nine nonaligned leaders, including Indian Prime Ministers Indira and Rajiv Gandhi. In fact, the CIA has killed many more than nine nonaligned leaders.

In the digital world of YouTube, Facebook, Google, and other social and news media sites, the CIA continues its game of disinformation while accusing others of conducting the same game plan. Some three decades after the Cold War, the CIA’s charges of Soviet disinformation can now be seen as disinformation in their own right.

 

Wayne Madsen is a Washington, DC-based investigative journalist and nationally-distributed columnist. He is the editor and publisher of the Wayne Madsen Report (subscription required).

BREAKING: Leaked FBI Alert Admits Hackers Penetrated US Election Systems

jf-7

By Matt Agorist

Source: The Free Thought Project

On Monday, an official FBI alert from August 18 was leaked to Yahoo News. The alert stated the FBI had uncovered evidence showing that at least two state election systems were penetrated by hackers in recent weeks. The FBI quickly issued warnings to election officials across the country to ramp up security on their systems.

It appears from the Flash Alert that the public was not supposed to know about it.

This FLASH has been released TLP: AMBER: The information in this product is only for members of their own organization and those with DIRECT NEED TO KNOW. This information is NOT to be forwarded on beyond NEED TO KNOW recipients.

The FBI then goes on to describe the nature of the attack and lists the IP addresses associated with the intrusion.

Summary

The FBI received information of an additional IP address, 5.149.249.172, which was detected in the July 2016 compromise of a state’s Board of Election Web site. Additionally, in August 2016 attempted intrusion activities into another state’s Board of Election system identified the IP address, 185.104.9.39 used in the aforementioned compromise.

Technical Details

The following information was released by the MS-ISAC on 1 August 2016, which was derived through the course of the investigation. In late June 2016, an unknown actor scanned a state’s Board of Election website for vulnerabilities using Acunetix, and after identifying a Structured Query Language (SQL) injection (SQLi) vulnerability, used SQLmap to target the state website. The majority of the data exfiltration occurred in mid-July. There were 7 suspicious IPs and penetration testing tools Acunetix, SQLMap, and DirBuster used by the actor, detailed in the indicators section below.

“This is a big deal,” said Rich Barger, chief intelligence officer for ThreatConnect, a cybersecurity firm, who reviewed the FBI alert at the request of Yahoo News. “Two state election boards have been popped, and data has been taken. This certainly should be concerning to the common American voter.”

According to the FBI, the hack is the work of a ‘foreign entity.’ However, they have not named the country of origin. This has not stopped other officials from quickly blaming the Russians.

Also absent from the alert are the names of the states involved in the hack.

According to the report from Yahoo News:

The bulletin does not identify the states in question, but sources familiar with the document say it refers to the targeting by suspected foreign hackers of voter registration databases in Arizona and Illinois. In the Illinois case, officials were forced to shut down the state’s voter registration system for ten days in late July, after the hackers managed to download personal data on up to 200,000 state voters, Ken Menzel, the general counsel of the Illinois Board of Elections, said in an interview. The Arizona attack was more limited, involving malicious software that was introduced into its voter registration system but no successful exfiltration of data, a state official said.

“The FBI is requesting that states contact their Board of Elections and determine if any similar activity to their logs, both inbound and outbound, has been detected,” the alert reads. “Attempts should not be made to touch or ping the IP addresses directly.”

While the alert lists the IP addresses from which the attacks originated, it is highly unlikely that the hackers would use any traceable address.

“This is a wake-up call for other states to look at their systems,” said Tom Hicks, chairman of the federal Election Assistance Commission.

This news comes on the heels of a report earlier this month in which a professor from Princeton University and a graduate student proved electronic voting machines in the U.S. remain astonishingly vulnerable to hackers — and they did it in under eight minutes.

Professor Andrew Appel, a Princeton University computer science professor who has studied election security, and grad student Alex Halderman took just seven minutes to break into the authentic Sequoia AVC Advantage electronic voting machine Appel purchased for $82 online — one of the oldest models, but still used in Louisiana, Pennsylvania, New Jersey, and Virginia.

Appel notes that the only “reasonably safe” voting method is paper ballots as they can be counted alongside the electronic tally. However, crucial swing states, as Appel notes, rely on more vulnerable paperless touchscreen voting which does not back up any of the numbers.

“Then whatever numbers the voting computer says at the close of the polls are completely under the control of the computer program in there,” Appel wrote in a recent blog post entitled “Security Against Election Hacking.” “If the computer is hacked, then the hacker gets to decide what numbers are reported. … All DRE (paperless touchscreen) voting computers are susceptible to this kind of hacking. This is our biggest problem.”

The fact that the FBI is now admitting to the vulnerability of the election should raise serious concern for Americans. Before 2016, talk of vote rigging, or hacking elections, remained on the fringe — in spite of whistleblowers showing the easily provable insecure nature of electronic voting machines.

As the famous quote, often attributed to Joseph Stalin, notes:

The people who cast the votes don’t decide an election, the people who count the votes do.

And now, with electronic voting and this news of how easily hackable it is, even the vote counters may not decide.

Evidence points to another Snowden at the NSA

NSA-CIA-Edward-Snowden

By James Bamford

Source: Reuters

In the summer of 1972, state-of-the-art campaign spying consisted of amateur burglars, armed with duct tape and microphones, penetrating the headquarters of the Democratic National Committee. Today, amateur burglars have been replaced by cyberspies, who penetrated the DNC armed with computers and sophisticated hacking tools.

Where the Watergate burglars came away empty-handed and in handcuffs, the modern- day cyber thieves walked away with tens of thousands of sensitive political documents and are still unidentified.

Now, in the latest twist, hacking tools themselves, likely stolen from the National Security Agency, are on the digital auction block. Once again, the usual suspects start with Russia – though there seems little evidence backing up the accusation.

In addition, if Russia had stolen the hacking tools, it would be senseless to publicize the theft, let alone put them up for sale. It would be like a safecracker stealing the combination to a bank vault and putting it on Facebook. Once revealed, companies and governments would patch their firewalls, just as the bank would change its combination.

A more logical explanation could also be insider theft. If that’s the case, it’s one more reason to question the usefulness of an agency that secretly collects private information on millions of Americans but can’t keep its most valuable data from being stolen, or as it appears in this case, being used against us.

In what appeared more like a Saturday Night Live skit than an act of cybercrime, a group calling itself the Shadow Brokers put up for bid on the Internet what it called a “full state-sponsored toolset” of “cyberweapons.” “!!! Attention government sponsors of cyberwarfare and those who profit from it !!!! How much would you pay for enemies cyberweapons?” said the announcement.

The group said it was releasing some NSA files for “free” and promised “better” ones to the highest bidder. However, those with loosing bids “Lose Lose,” it said, because they would not receive their money back. And should the total sum of the bids, in bitcoins, reach the equivalent of half a billion dollars, the group would make the whole lot public.

While the “auction” seemed tongue in cheek, more like hacktivists than Russian high command, the sample documents were almost certainly real. The draft of a top-secret NSA manual for implanting offensive malware, released by Edward Snowden, contains code for a program codenamed SECONDDATE. That same 16-character string of numbers and characters is in the code released by the Shadow Brokers. The details from the manual were first released by The Intercept last Friday.

The authenticity of the NSA hacking tools were also confirmed by several ex-NSA officials who spoke to the media, including former members of the agency’s Tailored Access Operations (TAO) unit, the home of hacking specialists.

“Without a doubt, they’re the keys to the kingdom,” one former TAO employee told the Washington Post. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.” Another added, “From what I saw, there was no doubt in my mind that it was legitimate.”

Like a bank robber’s tool kit for breaking into a vault, cyber exploitation tools, with codenames like EPICBANANA and BUZZDIRECTION, are designed to break into computer systems and networks. Just as the bank robber hopes to find a crack in the vault that has never been discovered, hackers search for digital cracks, or “exploits,” in computer programs like Windows.

The most valuable are “zero day” exploits, meaning there have been zero days since Windows has discovered the “crack” in their programs. Through this crack, the hacker would be able to get into a system and exploit it, by stealing information, until the breach is eventually discovered and patched. According to the former NSA officials who viewed the Shadow Broker files, they contained a number of exploits, including zero-day exploits that the NSA often pays thousands of dollars for to private hacking groups.

The reasons given for laying the blame on Russia appear less convincing, however. “This is probably some Russian mind game, down to the bogus accent,” James A. Lewis, a computer expert at the Center for Strategic and International Studies, a Washington think tank, told the New York Times. Why the Russians would engage in such a mind game, he never explained.

Rather than the NSA hacking tools being snatched as a result of a sophisticated cyber operation by Russia or some other nation, it seems more likely that an employee stole them. Experts who have analyzed the files suspect that they date to October 2013, five months after Edward Snowden left his contractor position with the NSA and fled to Hong Kong carrying flash drives containing hundreds of thousands of pages of NSA documents.

So, if Snowden could not have stolen the hacking tools, there are indications that after he departed in May 2013, someone else did, possibly someone assigned to the agency’s highly sensitive Tailored Access Operations.

In December 2013, another highly secret NSA document quietly became public. It was a top secret TAO catalog of NSA hacking tools. Known as the Advanced Network Technology (ANT) catalog, it consisted of 50 pages of extensive pictures, diagrams and descriptions of tools for every kind of hack, mostly targeted at devices manufactured by U.S. companies, including Apple, Cisco, Dell and many others.

Like the hacking tools, the catalog used similar codenames. Among the tools targeting Apple was one codenamed DROPOUTJEEP, which gives NSA total control of iPhones. “A software implant for the Apple iPhone,” says the ANT catalog, “includes the ability to remotely push/pull files from the device. SMS retrieval, contact-list retrieval, voicemail, geolocation, hot mic, camera capture, cell-tower location, etc.”

Another, codenamed IRATEMONK, is, “Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, Samsung, Seagate and Western Digital.”

In 2014, I spent three days in Moscow with Snowden for a magazine assignment and a PBS documentary. During our on-the-record conversations, he would not talk about the ANT catalog, perhaps not wanting to bring attention to another possible NSA whistleblower.

I was, however, given unrestricted access to his cache of documents. These included both the entire British, or GCHQ, files and the entire NSA files.

But going through this archive using a sophisticated digital search tool, I could not find a single reference to the ANT catalog. This confirmed for me that it had likely been released by a second leaker. And if that person could have downloaded and removed the catalog of hacking tools, it’s also likely he or she could have also downloaded and removed the digital tools now being leaked.

In fact, a number of the same hacking implants and tools released by the Shadow Brokers are also in the ANT catalog, including those with codenames BANANAGLEE and JETPLOW. These can be used to create “a persistent back-door capability” into widely used Cisco firewalls, says the catalog.

Consisting of about 300 megabytes of code, the tools could easily and quickly be transferred to a flash drive. But unlike the catalog, the tools themselves – thousands of ones and zeros – would have been useless if leaked to a publication. This could be one reason why they have not emerged until now.

Enter WikiLeaks. Just two days after the first Shadow Brokers message, Julian Assange, the founder of WikiLeaks, sent out a Twitter message. “We had already obtained the archive of NSA cyberweapons released earlier today,” Assange wrote, “and will release our own pristine copy in due course.”

The month before, Assange was responsible for releasing the tens of thousands of hacked DNC emails that led to the resignation of the four top committee officials.

There also seems to be a link between Assange and the leaker who stole the ANT catalog, and the possible hacking tools. Among Assange’s close associates is Jacob Appelbaum, a celebrated hacktivist and the only publicly known WikiLeaks staffer in the United States – until he moved to Berlin in 2013 in what he called a “political exile” because of what he said was repeated harassment by U.S. law enforcement personnel. In 2010, a Rolling Stone magazine profile labeled him “the most dangerous man in cyberspace.”

In December 2013, Appelbaum was the first person to reveal the existence of the ANT catalog, at a conference in Berlin, without identifying the source. That same month he said he suspected the U.S. government of breaking into his Berlin apartment. He also co-wrote an article about the catalog in Der Spiegel. But again, he never named a source, which led many to assume, mistakenly, that it was Snowden.

In addition to WikiLeaks, for years Appelbaum worked for Tor, an organization focused on providing its customers anonymity on the Internet. But last May, he stepped down as a result of “serious, public allegations of sexual mistreatment” made by unnamed victims, according to a statement put out by Tor. Appelbaum has denied the charges.

Shortly thereafter, he turned his attention to Hillary Clinton. At a screening of a documentary about Assange in Cannes, France, Appelbaum accused her of having a grudge against him and Assange, and that if she were elected president, she would make their lives difficult. “It’s a situation that will possibly get worse” if she is elected to the White House, he said, according to Yahoo News.

It was only a few months later that Assange released the 20,000 DNC emails. Intelligence agencies have again pointed the finger at Russia for hacking into these emails.

Yet there has been no explanation as to how Assange obtained them. He told NBC News, “There is no proof whatsoever” that he obtained the emails from Russian intelligence. Moscow has also denied involvement.

There are, of course, many sophisticated hackers in Russia, some with close government ties and some without. And planting false and misleading indicators in messages is an old trick. Now Assange has promised to release many more emails before the election, while apparently ignoring email involving Trump. (Trump opposition research was also stolen.)

In hacktivist style, and in what appears to be phony broken English, this new release of cyberweapons also seems to be targeting Clinton. It ends with a long and angry “final message” against “Wealthy Elites . . . breaking laws” but “Elites top friends announce, no law broken, no crime commit[ed]. . . Then Elites run for president. Why run for president when already control country like dictatorship?”

Then after what they call the “fun Cyber Weapons Auction” comes the real message, a serious threat. “We want make sure Wealthy Elite recognizes the danger [of] cyberweapons. Let us spell out for Elites. Your wealth and control depends on electronic data.” Now, they warned, they have control of the NSA’s cyber hacking tools that can take that wealth away. “You see attacks on banks and SWIFT [a worldwide network for financial services] in news. If electronic data go bye-bye where leave Wealthy Elites? Maybe with dumb cattle?”

Snowden’s leaks served a public good. He alerted Americans to illegal eavesdropping on their telephone records and other privacy violations, and Congress changed the law as a result. The DNC leaks exposed corrupt policies within the Democratic Party.

But we now have entered a period many have warned about, when NSA’s cyber weapons could be stolen like loose nukes and used against us. It opens the door to criminal hackers, cyber anarchists and hostile foreign governments that can use the tools to gain access to thousands of computers in order to steal data, plant malware and cause chaos.

It’s one more reason why NSA may prove to be one of Washington’s greatest liabilities rather than assets.

 

About the Author

James Bamford is the author of The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America. He is a columnist for Foreign Policy magazine.

 

Saturday Matinee: Sleep Dealer

sleep-dealer-work

“Sleep Dealer” (2008) is a dystopian parable directed and co-written by Alex Rivera. Luis Fernando Peña stars as Memo, a hacker who also works as a type of virtual migrant worker. It’s revealed through flashback how his situation was a result of a drone attack on his family and homestead. While trying to find work, Memo meets Luz (Leonor Varela), a fellow hacker who, with additional assistance from a repentant drone pilot in the US, helps him strike a blow against the system.

Note: may not play on some portable devices.

http://www.hulu.com/watch/703496