Ecuador Has Been Hit by 40 Million Cyber Attacks Since Assange’s Arrest

By Elias Marat

Source: The Mind Unleashed

The government of Ecuador claims that the country has come under a broad and concerted cyber attack, with approximately 40 million attempts to compromise web portals connected to public institutions ever since the controversial decision to allow UK police to forcibly remove Wikileaks founder Julian Assange from their London Embassy.

Deputy Minister of Information and Communication Technologies Patricio Real told reporters that the wave of attacks began shortly after last Thursday’s arrest of Assange by British authorities. Real said that the attacks “principally come from the United States, Brazil, Holland, Germany, Romania, France, Austria and the United Kingdom, and also from here, from our territory.”

On April 11, Ecuadorian President Lenin Moreno revoked the diplomatic asylum extended to Asange by the South American nation in 2012. In a legally dubious move, Quito also revoked the Ecuadorian nationality granted to Assange in 2017.

Ecuador’s El Comercio reported that the telecommunications ministry’s undersecretary of electronic government, Javier Jara, claimed that following “threats received by these groups related to Julian Assange”–such as the shadowy network Anonymous–the country began suffering “volumetric attacks.

Volumetric attacks are a type of distributed denial of service (DDoS) attack in which servers are flooded with requests in an attempt to overload them with traffic, thus preventing users from accessing the network.

According to AFP, the targets included the foreign ministry, central bank, tax authorities, the office of the president, and a number of other government agencies’ websites. None of the attacks succeeded in destroying or stealing data.

The attacks also come amid the Ecuadorian government’s detention of Ola Bini, a Swedish national and software developer allegedly tied to Wikileaks who was detained last Thursday as he attempted to attend a martial arts event in Japan. Bini, as well as two unidentified Russian “hackers,” are being held for their alleged role in a “hackers’ network” based in the country. Bini, who is accused of having met with Assange 12 times, has also just been accused of playing a role in blackmail attempts targeting President Moreno.

Since 2017, Assange’s relationship with his Ecuadorean hosts sharply deteriorated amid President Lenin Moreno’s attempts to curry favor with international creditors and wealthy governments in the north such as the United States, the United Kingdom and Spain. Moreno began referring to Assange on various occasions as a “miserable hacker,” an “irritant,” and a “stone in the shoe” of his government.

Last year, the London embassy cut off his access to the internet for alleged political meddling following requests by Quito that he stop commenting on affairs in other countries.

Relations took a strong turn for the worse in March following the release of a batch of documents known as the “INA Papers,” which implicated the president in alleged corruption, including money-laundering, offshore bank accounts and a shell company named INA Investment Corporation that is based in Panama and was used by President Moreno’s family to procure furniture, property, and luxury goods.

It is widely speculated that while Wikileaks has still not been directly tied to the release of the INA Papers, President Moreno was enraged after personal photographs were released showing his opulent private life, including photos of the president enjoying lavish lobster breakfast-in-bed and lobster dinners–imagery considered damning by Ecuador’s electorate especially given Moreno’s prior boasting of a poverty diet of eggs and white rice, which he claimed to regularly eat as he rammed through austerity measures that led to thousands of layoffs in the poor yet resource-rich South American country.

Within Ecuador, opinions have been evenly split about Assange, with the country’s right-wing and centrists supporting the decision to end his asylum while the left and supporters of former President Rafael Correa have considered the move a scandalous act of outright prostration before the “imperialists” of the Global North.

As such, social media reactions to the government’s complaints of “cyber attacks” have provoked both outrage and mockery from the Ecuadorian public, with some social media users thanking Assange for releasing the INA Papers and others claiming that the attacks will serve as a convenient smokescreen for the country’s authorities to further plunder the public coffers of the South American country.

The Second Phase of the propaganda Fake News War: Economic Strangulation. What Comes Next?

index

Frustrated and outraged at how reality has turned out, the ruling class denizens of Hillary Clinton’s failed presidential tent are lashing out at truth-tellers. “Fake news” is whatever contradicts their lies, and Russia is their all-purpose boogeyman. “Google and Facebook have joined theri corporate media compatriots in an attempt to limit the public’s access to alternative news analysis and independent investigative reporting.”

By Dr. Marsha Adebayo

Source: Black Agenda Report

The public has determined that the corporate media is actually the purveyor of “fake news” and turned to media organizations, such as BAR, Truthout and other outlets for information.”

Within the last 14 days, two phases of the “fake news” strategy has been rolled out for public consumption.  Phase I of the fake news strategy was to demonize news organizations, such as Black Agenda Report (BAR) through McCarthy-era red-baiting and intimidation that included government officials pondering whether the FBI should investigate alternative media on “the list” or hinting that such organizations could be subject to legal prosecution under foreign espionage laws.  The corporate media’s thinly veiled intimidation tactics are intended to depress readership of “fake” news organizations and to link these media outlets with an alleged Russian strategy to elect Donald Trump president of the US.

Corporate media gatekeepers determine which stories are labeled fake news dependent upon which stories serve US foreign and domestic interests and which stories expose US corruption. The corporate media obsession with “fake news” would be laughable if not for the individuals committed to truth-telling who will be sacrificed in the process. Where was the corporate news obsession with fake news when Secretary of State (General) Colin Powell beat the war drums for America’s war adventures in Iraq based on fictitious intelligence that Iraq had weapons of mass destruction?

However, anyone familiar with duopoly propaganda strategy against progressive news organizations would expect an escalation in their intimidation tactics. A covert strategy that would move from a campaign of mere words to direct and consequential actions with corporate coalition members poised to play their part.  Phase 2 of this strategy would exact a higher cost to the intended progressive media targets and by extension to their supporters.

This week, it was revealed that the escalation to Phase 2 will be economic sanctions or economic strangulation. This will be the pressure point in an attempt to force progressive news organizations to heel.  Two of the largest internet companies have joined their counterparts in government to squeeze legitimate investigative reporting into compliance.

Google was the first media giant to announce that it would ban websites that “peddle fake news” from using its online advertising service. In other words, media organizations, such as BAR, Truthout, Truthdig, etc could no longer advertise on Google in order to reach a larger audience or raise funds.

Hours later, Facebook, the social network, updated its policy and announced that “it will not display ads in sites that contains content considered by the duopoly as “fake news” according to corporate news gatekeepers.

The Facebook statement asserted:

“We have updated the policy to explicitly clarify that this applies to fake news…Our team will continue to closely vet all prospective publishers and monitor existing ones to ensure compliance.”

What was “explicitly” clear was that Google and Facebook have joined their corporate media compatriots in an attempt to limit the public’s access to alternative news analysis and independent investigative reporting.

The bait and switch corporate media/government strategy recognizes that the public no longer trusts corporate media, such as the Washington Post and New York Times, to investigate government corruption. There is a growing public recognition that a conflict of interest exists between corporate media investigating government since these two groups are inextricably linked by class and economic interests.  The public has determined that the corporate media is actually the purveyor of “fake news” and turned to media organizations, such as BAR, Truthout and other outlets for information.

This is not the first time corporate power has joined with the political duopoly to undermine the media’s ability to engage in truth-telling.  Julian Assange accused right-wing US politicians of imposing a “death penalty’ on WikiLeaks after major US credit cards blocked its card holders from making contributions to the organization. Assange asserted that six US payment firms blocked WikiLeaks from receiving contributions at a cost of £30 million.

Visa and Mastercard started the financial stranglehold after WikiLleaks published some 250,000 secret State Department cables in December 2010.  WikiLeaks presented documents that proved these financial decisions were made at the instigation of “right-wing” members of Congress. This attack against WikiLeaks forced the staff to take a 40% pay cut.  However, the financial “war” was just the beginning. The unforeseen Phase III of this attack would eventually find Assange and Chelsea Manning incarcerated; Assange taking refuge in an Ecuadorian Embassy in London and Manning sentenced to serve time at Ft. Leavenworth in Kansas.

This is the time to support BAR, Truthout and other progressive media organizations under attack by forces that attempt to obfuscate and distort US domestic and foreign policy. Frederick Douglass during his 1857 address on “West India Emancipation” at Canandaigua, New York, on the 23rd anniversary of the event said:

“The general sentiment of mankind is that a man who will not fight for himself, when he has the means of doing so, is not worth being fought for by others, and this sentiment is just. For a man who does not value freedom for himself will never value it for others, or put himself to any inconvenience to gain it for others.”

Phases I and II forebode a challenging Phase III for truth-tellers in the current iteration of a corporate “fake news” strategy.  This is our time to fight for press freedom and the right to blow the whistle on government corruption. The future of our families and our planet depend on our uncompromising passion for justice.

Dr. Marsha Adebayo is the author of the Pulitzer Prize nominated: No FEAR: A Whistleblowers Triumph over Corruption and Retaliation at the EPA. She worked at the EPA for 18 years and blew the whistle on a US multinational corporation that endangered South African vanadium mine workers. Marsha’s successful lawsuit led to the introduction and passage of the first civil rights and whistleblower law of the 21st century: the Notification of Federal Employees Anti-discrimination and Retaliation Act of 2002 (No FEAR Act). She is Director of Transparency and Accountability for the Green Shadow Cabinet and serves on the Advisory Board of ExposeFacts.com.

 

Related Video:

Washington moves to silence WikiLeaks

germanywikileaks-12d90

By Bill Van Auken

Source: WSWS.org

The cutting off of Internet access for Julian Assange, the founder of WikiLeaks, is one more ugly episode in a US presidential election campaign that has plumbed the depths of political degradation.

Effectively imprisoned in the Ecuadorian embassy in London for over four years, Assange now is faced with a further limitation on his contact with the outside world.

On Tuesday, the Foreign Ministry of Ecuador confirmed WikiLeaks’ charge that Ecuador itself had ordered the severing of Assange’s Internet connection under pressure from the US government. In a statement, the ministry said that WikiLeaks had “published a wealth of documents impacting on the US election campaign,” adding that the government of Ecuador “respects the principle of non-intervention in the internal affairs of other states” and “does not interfere in external electoral processes.” On that grounds, the statement claimed, the Ecuadorian government decided to “restrict access” to the communications network at its London embassy.

This statement from the bourgeois government of Ecuadorian President Rafael Correa is a study in hypocrisy and cowardice. By abetting the US government’s suppression of WikiLeaks, Quito has intervened in the US elections on the side of the ruling establishment and against the rights of the American people. If Correa expects that his professed sensitivity toward the “principle of non-intervention” will be reciprocated, he should recall the fate of Honduran President Manuel Zelaya, who was toppled in a coup orchestrated by then-Secretary of State Hillary Clinton in 2009.

WikiLeaks cited reports that Secretary of State John Kerry had demanded that the government of Ecuador carry out the action “on the sidelines of the negotiations” surrounding the abortive Colombian peace accord last month in Bogota. The US government intervened to prevent any further exposures that could damage the campaign of Clinton, who has emerged as the clear favorite of the US military and intelligence complex as well as the Wall Street banks.

Whether the State Department was the only entity placing pressure on Ecuador on behalf of the Clinton campaign, or whether Wall Street also intervened directly, is unclear. The timing of the Internet cutoff, in the immediate aftermath of the release of Clinton’s Goldman Sachs speeches, may be more than coincidental.

In the spring of 2014, the government of Ecuador agreed to transfer more than half of its gold reserves to Goldman Sachs Group Inc. for three years, in an attempt to raise cash to cover a growing deficit brought on by the collapse in oil prices. It reportedly sent 466,000 ounces of gold to Goldman Sachs, worth about $580 million at the time, in return for “high security” financial instruments and an anticipated profit on its investment. It is hardly a stretch of the imagination to believe that such a relationship would give Goldman Sachs considerable leverage in relation to the Ecuadorian government.

In any case, it is evident that the US ruling establishment is growing increasingly desperate to stanch the flow of previously secret emails and documents that are exposing the real character not only of Clinton, but of capitalist politics as a whole. While WikiLeaks has released over 17,000 emails from the account of Clinton campaign manager and top establishment Democrat John Podesta, it is believed that there are more than 33,000 still to come.

The transcripts of Clinton’s speeches to Goldman Sachs and other top banks and employers’ groups, for which she was paid on average $200,000 per appearance, are the most incriminating. They expose the workings of the oligarchy that rules America and the thinking and actions of a politician prepared to do anything to advance the interests of this ruling stratum, while simultaneously accruing ever greater riches and power for herself.

While on the campaign trail, Clinton has postured as a “progressive,” determined to hold Wall Street’s feet to the fire. But in her speeches to Goldman Sachs, she made clear her unconditional defense of the banks and financial houses. Under conditions of popular outrage against the bankers and their role in dragging millions into crisis in the financial meltdown of 2008, Clinton gave speeches praising the Wall Street financiers and insisting that they were best equipped to regulate themselves. She apologized to them for supporting the toothless Dodd-Frank financial regulatory law, saying that it had to be enacted for “political reasons.”

In front of her Wall Street audiences, Clinton made clear she had no inhibitions about ordering mass slaughter abroad. While telling her public audiences that she supports a “no-fly zone” in Syria as a humanitarian measure to save lives, she confidentially acknowledged to her Goldman Sachs audience that such an action is “going to kill a lot of Syrians” and become “an American and NATO involvement where you take a lot of civilians.” In the same speech she declared her willingness to bomb Iran.

The emails have laid bare the nexus of corrupt connections between the State Department, the Clinton Foundation, her various campaigns and her network of financial and corporate donors, which together constitute a quasi-criminal influence-peddling enterprise that could best be described as “Clinton, Inc.”

The revelations contained in the WikiLeaks material have been ignored or downplayed by the corporate media, which instead has focused unrelentingly on the charges of sexual misconduct leveled against Clinton’s Republican rival, Donald Trump.

The Clinton camp itself has sought to deflect any questions regarding what the candidate said in her speeches or the corrupt operations of her campaign by claiming, with no evidence whatsoever, that the material released by WikiLeaks had been hacked by the Russian government and therefore cannot be trusted.

This line of argumentation serves not only to divert attention from the WikiLeaks material, but also to further the Clinton campaign’s neo-McCarthyite claims of Kremlin intervention on behalf of Trump and advance a propaganda campaign aimed at preparing popular opinion for a direct military confrontation with Russia.

There is an air of desperation in the attempt to quash the WikiLeaks material. CNN news anchor Chris Cuomo, an open supporter of Clinton, went so far as to lie to his audience, claiming it was illegal for them to access the emails and insisting they could obtain any information on them only through the filter of the corporate media.

Well before the release of documents related to the Democratic Party, the determination of ruling circles to suppress WikiLeaks had found repeated and violent expression. State Department officials have come forward with a report that in 2010, in the midst of WikiLeaks’ mass release of State Department cables exposing US imperialist operations around the world, Clinton, then secretary of state, asked subordinates, “Can’t we just drone this guy?” She recently said she could not remember the remark, but if she made it, it was a joke.

During the same period, however, Clinton supporter and longtime Democratic campaign operative Bob Beckel declared in a television interview in relation to Assange: “A dead man can’t leak stuff. This guy’s a traitor, he’s treasonous, and he has broken every law of the United States… there’s only one way to do it: illegally shoot the son of a bitch.”

To this point, the American ruling class has limited itself to judicial frame-ups and character assassination, counting on the help of its servants within both the media and the pseudo-left, large sections of which have either joined the witch-hunt against Assange or downplayed his victimization.

The principal vehicle for this campaign of persecution had been fabricated allegations of sexual misconduct pursued by Swedish authorities acting in league with the US and British governments. Earlier this year, the UN’s Working Group on Arbitrary Detention issued findings that Assange had been “deprived of his liberty in an arbitrary manner,” meaning the body had reached the conclusion that the Swedish case constituted a politically motivated frame-up.

In the midst of the current attempt to silence Assange, an even more bizarre and filthy frame-up has been concocted, attempting to smear the WikiLeaks founder with charges of taking Russian money as well as pedophilia.

At the center of these allegations is a little known online dating service, Toddandclare.com, which first attempted to lure Assange into a supposed deal to film an ad for the site, for which he supposedly would be paid $1 million, to be provided by the Russian government. When WikiLeaks rejected this preposterous provocation, the same site claimed that Assange had been charged with inappropriate contact through the site with an eight-year-old Canadian child visiting the Bahamas. This accusation was then invoked in an attempt to pressure the UN to drop its demand for an end to the persecution of Assange.

Even a cursory investigation makes clear that these allegations constitute a grotesque fabrication. Bahamian police have stated that there are no charges or any case whatsoever against Assange. The dating service has no business address, working phone number or corporate presence anywhere in the US, having all the earmarks of a dummy company created by US intelligence for the purpose of hounding Assange.

The use of such tactics is a measure of how terrified the US ruling class has become in the face of growing mass hostility to both major political parties and their two abhorrent candidates. Their fear is that the relentless exposure of the inner workings of a government of the rich, by the rich and for the rich is robbing the existing political setup of what little legitimacy it had left within the population, and creating the conditions for a political radicalization within the working class and social upheavals, whoever is elected on November 8.

 

Related Article:

Real Reason Trump’s Being Treated Like He’s Crazy for Refusing to Accept Election Results by Rob Kall

The Cyber-War on Wikileaks

By

Source: CounterPunch

When the ruling class is in panic, their first reaction is to hide the panic.

They react out of cynicism: when their masks are revealed, instead of running around naked, they usually point the finger at the mask they wear. These days the whole world could witness a postmodern version of the infamous quote “Let them eat cake”, attributed to Marie-Antoinette, queen of France during the French Revolution.

As a reaction to WikiLeaks publishing his emails, John Podesta, the man behind Hillary Clinton’s campaign, posted a photo of a dinner preparation, saying “I bet the lobster risotto is better than the food at the Ecuadorian Embassy”.

A similar version of vulgar cynicism emerged earlier this month when Hillary Clinton reacted to the claim that she reportedly wanted to “drone” WikiLeaks founder Julian Assange (“Can’t we just drone this guy?”) when she was the US Secretary of State. Instead of denying her comments, Clinton said that she doesn’t recall any such joke, “It would have been a joke if it had been said, but I don’t recall that”.

One doesn’t have to read between the lines to understand that if Hillary Clinton had said that, she would have considered it a joke. But when emperors joke, it usually has dire consequences for those who are the objects of their “humor.”

Cyber-war Not with Russia…but WikiLeaks

During the last few months I have visited Julian Assange in the Ecuadorian Embassy in London several times and each time I came out of the Embassy, where he is spending his fifth year in political asylum under legitimate fear he might be extradited to the US, my thought was the following one: although he lives, without his family, in a postmodern version of solitary confinement (even prisoners are allowed to walk for up to one hour a day), although he has no access to fresh air or sunlight for more than 2000 days, although the UK government recently denied him safe passage to a hospital for an MRI scan, if his access to the internet would be cut off this would be the most severe attack on his physical and mental freedom.

The last time I saw him, which was only two weeks ago, he expressed the fear that, because he had already published leaks concerning US elections and with more to come, the US might find various ways to silence him, including pressuring Ecuador or even shutting down the internet.

What seemed a distant possibility only two weeks ago, soon became a self-fulfilling prophecy.

When the Obama administration recently announced that it is, as Biden said, planing an “unprecedented cyber covert action against Russia”, the first victim was not Putin, but precisely Julian Assange whose internet was cut off just a day after Biden’s self-contradictory proclamation.

No wonder Edward Snowden reacted immediately by saying that “nobody told Joe Biden what ‘covert operation’ means.

According to the U.S. Department of Defense’s Dictionary of Military and Associated Terms, a covert operation is “an operation that is so planned and executed as to conceal the identity of or permit plausible denial by the sponsor.”

It is no secret anymore that the Ecuadorian government has come under extreme pressure since Assange leaked the Democratic National Committee email database. We don’t know yet whether the US pressured Ecuador to shut down the internet, but it is clear that the present US government and the government to come is fighting a war with WikiLeaks which is all but “covert”. Is it really a coincidence that Julian Assange’s internet access was cut off shortly after publication of Clinton’s Goldman Sachs speeches?

If at the beginning we still had a “soft” version of postmodern McCarthyism, with Hillary calling everyone opposed to her campaign a Russian spy (not only Assange, but also Donald Trump and Jill Stein), then with Obama’s recent intervention it became more serious.

With Obama’s threat of a cyber-war, the “soft” McCarthyism didn’t only acquire geopolitical significance, but at the same time a new mask was revealed: Obama is obviously trying to cement the public debate and make the Russian threat “real”, or at least to use it as a weapon in order to help Clinton to get elected. Moreover, this new twist in something that has already become much more than only US elections (US elections are never only US elections!), shows not only how Obama is ready to strengthen Hillary’s campaign, but it also reveals that a cyber war is already in the making.

It is not a cyber war with Russia, but with WikiLeaks.

And it is not the first time.

What would Clausewitz say?

In 2010, when the Collateral Murder video was published, the Afghan and Iraq war logs were released, and we witnessed one of the most sinister attacks on freedom of speech in recent history. VISA, Mastercard, Diners, American Express and Paypal imposed a banking blockade on WikiLeaks, although WikiLeaks had not been charged with any crime at either state, federal or international level. So if the US government successfully convinced payment companies representing more than 97% of the global market to shut down an independent publisher, why wouldn’t they pressure Ecuador or any other state or company to cut off the internet?

The US is not only rhetorically trying to “get” Assange (it is worth to check out the Assassinate Assange video for evidence of the verbal masturbation of US officials), he poses a serious threat to the major elite factions in the US to remain in power. No wonder panic is rising in the US, which is now going even so far that a 16-year-old boy in Britain has been arrested on criminal charges related to the alleged hacking of email accounts used by CIA director John Brennan, which WikiLeaks published in October 2016.

What WikiLeaks obviously successfully challenged–and maybe one day (“history is written by the victors”, remember?) it will be learned in military strategy– is what the Prussian general and military theorist Carl von Clausewitz would call the “centre of gravity” (Schwerpunkt), which is the “central feature of the enemy’s power”.

Instead of speaking about the Russians, we should start speaking about the Schwerpunkt of the actual leaks, their real essence. Just take the following quotes by Hillary Clinton exposed by WikiLeaks, which reveal her true nature and the politics behind her campaign: “We are going to ring China with missile defence”, “I want to defend fracking” and climate change environmentalists “should get a life”, “you need both a public and a private position”, “my dream is a hemispheric common market, with open trade and open borders”.

What WikiLeaks has shown is not only that Hillary is a hawkish war-monger, first it was Libya (over 1,700 of the 33,000 Clinton emails published by WikiLeaks reference Libya), then it was Syria (at a Goldman Sachs conference she explicitly stated she would like to intervene in Syria), tomorrow it will be another war.

It is now clear – and this is the real “centre of gravity” where we should focus our attention – that the future Clinton cabinet may already been filled with Wall Street people like Obama’s was. No wonder WikiLeaks revelations create utter panic not only in the Democratic Party itself but also the Obama administration.

One question remains, isn’t WikiLeaks, by leaking all these dirty secrets, influencing the US elections? Yes, it certainly is, but the current criticism misses its point: isn’t the very point of organisations such as WikiLeaks to publish the material they have and to influence public opinion?

The question should finally be turned around: isn’t the US mainstream media the one influencing the US elections? And isn’t Obama, by announcing a cyber-war with Russia, influencing the elections?

WikiLeaks is not only influencing the US elections, but transforming the US elections – as they should have been from the very beginning – into a global debate with serious geopolitical consequences at stake. What WikiLeaks is doing is revealing this brutal fight for power, but, as the old saying goes, “when a wise man points at the Moon, the idiot looks at the finger”. Instead of looking at the finger pointing to Russia, we should take a look at the leaks themselves.

If democracy and transparency means anything today, we should say: let them leak!

 

Srećko Horvat is a philosopher and activist. He is co-author, with Slavoj Žižek, of What Does Europe Want? (Columbia University Press, 2014) and author of The Radicality of Love (Polity Press, 2015). Together with Yanis Varoufakis he co-created the movement DiEM 25. https://diem25.org/

Stripping the veneer off America’s propaganda menagerie

qefgtrhy

By Wayne Madsen

Source: Intrepid Report

National Security Agency whistleblower Edward Snowden and WikiLeaks founder Julian Assange have doubled down recently on the games being played in cyberspace by America’s cyberwarriors. Snowden suggests that many of NSA’s most damaging malware programs are now in the hands of America’s opponents, thanks to enterprising foreign counterintelligence hackers known as the Shadow Brokers. Snowden believes that the malware, including destructive programs such as Stuxnet, are being auctioned off, via Bitcoin payments, by the Shadow Brokers. Snowden stated that the malware was obtained through hacking from a murky NSA operation called the “Equation Group.”

Assange, fearful that a new Ecuadorian president will hand him over to a Clinton administration in 2017, claims to have more hacked bombshells to drop on Team Clinton, courtesy of weak security in Democratic National Committee and Clinton campaign computer systems.

We have entered a new phase of cyberwarfare, one in which America’s (and Israel’s) most damaging computer hacking and disruption programs are available to anyone willing to pay in Bitcoins on the cyberblack market. The Democratic Party’s leaked emails, coupled with the leaked State Department cables, has Hillary Clinton in an outrage. These disclosures, along with the Snowden disclosures that illustrate how America spies on friend and foe, have stripped the veneer off of America’s propaganda menagerie. Two of the three culprits Mrs. Clinton would like to see in prison for the rest of their lives are, for the time being, outside of Gulag America. Snowden is enjoying political asylum in Russia and Assange has asylum at the Ecuadorian embassy in London. The third, Chelsea Manning, is serving a 35-year prison term at Fort Leavenworth in Kansas and allegedly recently attempted suicide.

Paul Ceglia, who claims to have been the co-founder of Facebook, says he is on the run from the CIA after he filed suit against Facebook and its owner Mark Zuckerberg. Although Zuckerberg admits to having a past business relationship with Ceglia, the US Justice Department criminally charged Ceglia for trying to defraud Facebook after the former associate of Zuckerberg brought a civil suit in federal court in Buffalo against the company. Interestingly, Facebook has donated more money to Hillary Clinton than any other presidential candidate. But what is really at issue in the bizarre case is that Ceglia claims that Facebook’s seed money came from the CIA’s venture capital firm IN-Q-TEL, a charge to which WMR can attest after compiling a massive list of CIA front companies and proprietaries in the soon-to-be-published book: “The Almost Classified Guide to CIA Front Companies, Proprietaries and Contractors.”

The CIA and its partners at Facebook, Google, Yahoo, Microsoft, and other social media firms have striven to control the new media in the same manner that the CIA controlled the “old media” through operations like MOCKINGBIRD. During the Cold War era, the CIA claimed that all the world’s ills were due to Communist front organizations that influenced the media. The truth is that the so-called “fronts” often provided actual accounts of the misdeeds of the CIA and other Western intelligence agencies. However, with U.S. newspapers, magazines, and broadcast networks carrying the water for the CIA, it was Langley’s interpretation of the news that made Western headlines. The “Communist” reports were relegated to the nether regions of “Soviet disinformation” campaigns and “active measures.” The CIA laughably put out a periodical report on such “disinformation” tactics. In reality, what was called “disinformation” was actually bona fide news.

Today, when the CIA wants to debase a news article, it uses such operations as Snopes.com and Wikipedia to engage in CIA disinformation tactics. Uncomfortable truthful news items are quickly dispatched with the term “conspiracy theory.” There is little doubt that Facebook, Wikipedia, and Snopes are part of a “new MOCKINGBIRD” designed for the digital age. Like them or not, Snowden, Assange, Manning, Ceglia, and others have pulled the veil off of the new MOCKINGBIRD.

A formerly secret February 1987 CIA report on Soviet disinformation tactics illustrates that what was described then as “propaganda” was, in fact, the truth.

  • The CIA called baseless charges in a Soviet book that Jonestown, Guyana was a CIA behavioral control operation. It was.
  • The Soviets accused Ronald Reagan’s Strategic Defense Initiative (SDI) of having the goal of weaponizing outer space. Not only was that the goal then, but it remains the goal of present incarnations of SDI.
  • The Soviets and the Afghan president, Najibullah of the Afghan Communist Party, said that they reached out to 50,000 Afghan mujaheddin in Afghanistan and Pakistan, who agreed to lay down their arms and join a coalition government, with eight opposition parties joining the Communists. The CIA and Western media called the news bogus. It was true with television footage of Afghan refugees returning to their homeland from India. The Soviets wanted an internationally-guaranteed neutral Afghanistan before withdrawing their troops. The CIA wanted a radical Islamic Afghanistan from which to launch attacks on the southern Soviet Union. That decision came back to bite the United States on September 11, 2001.
  • The CIA accused the Sandinista government of Nicaragua and the Soviets of being behind the Christian “Evangelical Committee for Development Aid” as a Communist front group. If so, it would have been the first time Communists and Christian evangelicals broke bread together. The CIA’s charge was fatuously false.
  • The Soviets accused the U.S. of using Africans as test subjects for a new AIDS vaccine. This charge has been proven with Africans being used as “guinea pigs” for various new vaccines in programs funded by the Bill and Melinda Gates Foundation, the Clinton Global Initiative, Pfizer Corporation, and other entities linked to CIA biological and genetic warfare operations.
  • Articles in two Bolivian newspapers that stated that the U.S. Information Service in La Paz was trying to recruit Bolivian journalists to write pro-Pentagon articles were deemed by the CIA to be bogus. The CIA charge was false and it included smearing the Federation of Bolivian Press Workers as a Communist front. That is the usual practice by the CIA when it’s caught red-handed.
  • The Soviet news agency Novosti was accused of running a false article, titled “The Relationship Between Journalists and the CIA: Hundreds of Them in International Press.” The article was spot on.
  • The CIA charged as Soviet disinformation charges that the CIA killed nine nonaligned leaders, including Indian Prime Ministers Indira and Rajiv Gandhi. In fact, the CIA has killed many more than nine nonaligned leaders.

In the digital world of YouTube, Facebook, Google, and other social and news media sites, the CIA continues its game of disinformation while accusing others of conducting the same game plan. Some three decades after the Cold War, the CIA’s charges of Soviet disinformation can now be seen as disinformation in their own right.

 

Wayne Madsen is a Washington, DC-based investigative journalist and nationally-distributed columnist. He is the editor and publisher of the Wayne Madsen Report (subscription required).

Evidence points to another Snowden at the NSA

NSA-CIA-Edward-Snowden

By James Bamford

Source: Reuters

In the summer of 1972, state-of-the-art campaign spying consisted of amateur burglars, armed with duct tape and microphones, penetrating the headquarters of the Democratic National Committee. Today, amateur burglars have been replaced by cyberspies, who penetrated the DNC armed with computers and sophisticated hacking tools.

Where the Watergate burglars came away empty-handed and in handcuffs, the modern- day cyber thieves walked away with tens of thousands of sensitive political documents and are still unidentified.

Now, in the latest twist, hacking tools themselves, likely stolen from the National Security Agency, are on the digital auction block. Once again, the usual suspects start with Russia – though there seems little evidence backing up the accusation.

In addition, if Russia had stolen the hacking tools, it would be senseless to publicize the theft, let alone put them up for sale. It would be like a safecracker stealing the combination to a bank vault and putting it on Facebook. Once revealed, companies and governments would patch their firewalls, just as the bank would change its combination.

A more logical explanation could also be insider theft. If that’s the case, it’s one more reason to question the usefulness of an agency that secretly collects private information on millions of Americans but can’t keep its most valuable data from being stolen, or as it appears in this case, being used against us.

In what appeared more like a Saturday Night Live skit than an act of cybercrime, a group calling itself the Shadow Brokers put up for bid on the Internet what it called a “full state-sponsored toolset” of “cyberweapons.” “!!! Attention government sponsors of cyberwarfare and those who profit from it !!!! How much would you pay for enemies cyberweapons?” said the announcement.

The group said it was releasing some NSA files for “free” and promised “better” ones to the highest bidder. However, those with loosing bids “Lose Lose,” it said, because they would not receive their money back. And should the total sum of the bids, in bitcoins, reach the equivalent of half a billion dollars, the group would make the whole lot public.

While the “auction” seemed tongue in cheek, more like hacktivists than Russian high command, the sample documents were almost certainly real. The draft of a top-secret NSA manual for implanting offensive malware, released by Edward Snowden, contains code for a program codenamed SECONDDATE. That same 16-character string of numbers and characters is in the code released by the Shadow Brokers. The details from the manual were first released by The Intercept last Friday.

The authenticity of the NSA hacking tools were also confirmed by several ex-NSA officials who spoke to the media, including former members of the agency’s Tailored Access Operations (TAO) unit, the home of hacking specialists.

“Without a doubt, they’re the keys to the kingdom,” one former TAO employee told the Washington Post. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.” Another added, “From what I saw, there was no doubt in my mind that it was legitimate.”

Like a bank robber’s tool kit for breaking into a vault, cyber exploitation tools, with codenames like EPICBANANA and BUZZDIRECTION, are designed to break into computer systems and networks. Just as the bank robber hopes to find a crack in the vault that has never been discovered, hackers search for digital cracks, or “exploits,” in computer programs like Windows.

The most valuable are “zero day” exploits, meaning there have been zero days since Windows has discovered the “crack” in their programs. Through this crack, the hacker would be able to get into a system and exploit it, by stealing information, until the breach is eventually discovered and patched. According to the former NSA officials who viewed the Shadow Broker files, they contained a number of exploits, including zero-day exploits that the NSA often pays thousands of dollars for to private hacking groups.

The reasons given for laying the blame on Russia appear less convincing, however. “This is probably some Russian mind game, down to the bogus accent,” James A. Lewis, a computer expert at the Center for Strategic and International Studies, a Washington think tank, told the New York Times. Why the Russians would engage in such a mind game, he never explained.

Rather than the NSA hacking tools being snatched as a result of a sophisticated cyber operation by Russia or some other nation, it seems more likely that an employee stole them. Experts who have analyzed the files suspect that they date to October 2013, five months after Edward Snowden left his contractor position with the NSA and fled to Hong Kong carrying flash drives containing hundreds of thousands of pages of NSA documents.

So, if Snowden could not have stolen the hacking tools, there are indications that after he departed in May 2013, someone else did, possibly someone assigned to the agency’s highly sensitive Tailored Access Operations.

In December 2013, another highly secret NSA document quietly became public. It was a top secret TAO catalog of NSA hacking tools. Known as the Advanced Network Technology (ANT) catalog, it consisted of 50 pages of extensive pictures, diagrams and descriptions of tools for every kind of hack, mostly targeted at devices manufactured by U.S. companies, including Apple, Cisco, Dell and many others.

Like the hacking tools, the catalog used similar codenames. Among the tools targeting Apple was one codenamed DROPOUTJEEP, which gives NSA total control of iPhones. “A software implant for the Apple iPhone,” says the ANT catalog, “includes the ability to remotely push/pull files from the device. SMS retrieval, contact-list retrieval, voicemail, geolocation, hot mic, camera capture, cell-tower location, etc.”

Another, codenamed IRATEMONK, is, “Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, Samsung, Seagate and Western Digital.”

In 2014, I spent three days in Moscow with Snowden for a magazine assignment and a PBS documentary. During our on-the-record conversations, he would not talk about the ANT catalog, perhaps not wanting to bring attention to another possible NSA whistleblower.

I was, however, given unrestricted access to his cache of documents. These included both the entire British, or GCHQ, files and the entire NSA files.

But going through this archive using a sophisticated digital search tool, I could not find a single reference to the ANT catalog. This confirmed for me that it had likely been released by a second leaker. And if that person could have downloaded and removed the catalog of hacking tools, it’s also likely he or she could have also downloaded and removed the digital tools now being leaked.

In fact, a number of the same hacking implants and tools released by the Shadow Brokers are also in the ANT catalog, including those with codenames BANANAGLEE and JETPLOW. These can be used to create “a persistent back-door capability” into widely used Cisco firewalls, says the catalog.

Consisting of about 300 megabytes of code, the tools could easily and quickly be transferred to a flash drive. But unlike the catalog, the tools themselves – thousands of ones and zeros – would have been useless if leaked to a publication. This could be one reason why they have not emerged until now.

Enter WikiLeaks. Just two days after the first Shadow Brokers message, Julian Assange, the founder of WikiLeaks, sent out a Twitter message. “We had already obtained the archive of NSA cyberweapons released earlier today,” Assange wrote, “and will release our own pristine copy in due course.”

The month before, Assange was responsible for releasing the tens of thousands of hacked DNC emails that led to the resignation of the four top committee officials.

There also seems to be a link between Assange and the leaker who stole the ANT catalog, and the possible hacking tools. Among Assange’s close associates is Jacob Appelbaum, a celebrated hacktivist and the only publicly known WikiLeaks staffer in the United States – until he moved to Berlin in 2013 in what he called a “political exile” because of what he said was repeated harassment by U.S. law enforcement personnel. In 2010, a Rolling Stone magazine profile labeled him “the most dangerous man in cyberspace.”

In December 2013, Appelbaum was the first person to reveal the existence of the ANT catalog, at a conference in Berlin, without identifying the source. That same month he said he suspected the U.S. government of breaking into his Berlin apartment. He also co-wrote an article about the catalog in Der Spiegel. But again, he never named a source, which led many to assume, mistakenly, that it was Snowden.

In addition to WikiLeaks, for years Appelbaum worked for Tor, an organization focused on providing its customers anonymity on the Internet. But last May, he stepped down as a result of “serious, public allegations of sexual mistreatment” made by unnamed victims, according to a statement put out by Tor. Appelbaum has denied the charges.

Shortly thereafter, he turned his attention to Hillary Clinton. At a screening of a documentary about Assange in Cannes, France, Appelbaum accused her of having a grudge against him and Assange, and that if she were elected president, she would make their lives difficult. “It’s a situation that will possibly get worse” if she is elected to the White House, he said, according to Yahoo News.

It was only a few months later that Assange released the 20,000 DNC emails. Intelligence agencies have again pointed the finger at Russia for hacking into these emails.

Yet there has been no explanation as to how Assange obtained them. He told NBC News, “There is no proof whatsoever” that he obtained the emails from Russian intelligence. Moscow has also denied involvement.

There are, of course, many sophisticated hackers in Russia, some with close government ties and some without. And planting false and misleading indicators in messages is an old trick. Now Assange has promised to release many more emails before the election, while apparently ignoring email involving Trump. (Trump opposition research was also stolen.)

In hacktivist style, and in what appears to be phony broken English, this new release of cyberweapons also seems to be targeting Clinton. It ends with a long and angry “final message” against “Wealthy Elites . . . breaking laws” but “Elites top friends announce, no law broken, no crime commit[ed]. . . Then Elites run for president. Why run for president when already control country like dictatorship?”

Then after what they call the “fun Cyber Weapons Auction” comes the real message, a serious threat. “We want make sure Wealthy Elite recognizes the danger [of] cyberweapons. Let us spell out for Elites. Your wealth and control depends on electronic data.” Now, they warned, they have control of the NSA’s cyber hacking tools that can take that wealth away. “You see attacks on banks and SWIFT [a worldwide network for financial services] in news. If electronic data go bye-bye where leave Wealthy Elites? Maybe with dumb cattle?”

Snowden’s leaks served a public good. He alerted Americans to illegal eavesdropping on their telephone records and other privacy violations, and Congress changed the law as a result. The DNC leaks exposed corrupt policies within the Democratic Party.

But we now have entered a period many have warned about, when NSA’s cyber weapons could be stolen like loose nukes and used against us. It opens the door to criminal hackers, cyber anarchists and hostile foreign governments that can use the tools to gain access to thousands of computers in order to steal data, plant malware and cause chaos.

It’s one more reason why NSA may prove to be one of Washington’s greatest liabilities rather than assets.

 

About the Author

James Bamford is the author of The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America. He is a columnist for Foreign Policy magazine.

 

Hacker Leaks Secret DNC Master Files on Hillary Clinton & Foundation

shutterstock_251313145-650

Long before Clinton declared candidacy, the DNC researched her “vulnerabilities”—including speaking fees, private jets, and high-rolling Clinton Foundation donors

By Nika Knight

Source: CommonDreams.org

The anonymous hacker calling themselves Guccifer 2.0 released a second trove of internal documents from Democratic National Committee (DNC) servers on Tuesday, including a hefty 113-page file titled “Hillary Clinton Master Doc” that includes research the party performed on behalf of Clinton’s candidacy—months before she declared an intention to run.

The documents reveal that the DNC was particularly worried about Clinton’s speaking fees, her book advance, and her somewhat exacting luxury travel requirements for appearances.

As the Daily Beast summarized:

Several documents leaked […] show that DNC researchers, whose annotated notes can still be seen in the electronic files, looked for the tiniest potential infraction or questionable item in Clinton’s travel expenses, for instance, asking why one trip from New York to Washington, D.C., aboard a Bank of America jet cost just $45.75, an amount that a researcher called “weirdly low.”

A whole section in the “Master Doc” is devoted to questions and criticism about the money Clinton made from her book advance, book tour, and her public speeches, which generally ran around $250,000 per appearance and required the host to provide first-class travel and accommodations. In Clinton’s defense, the DNC cites articles stressing that fees went to the Clinton Foundation, and characterizing the work that the former secretary did in her private life not as an attempt to enrich herself, but to benefit her and her husband’s charitable work.

Also in the dossier were documents gathered by the DNC related to Clinton’s sky-high speaking fees, including an email from her booking agency that contradicts Clinton’s defense that she merely accepted “what they offered” when she was paid over $200,000 per speech—a claim that reporters have previously critiqued.

As journalist Shaun King observed on Twitter:

[tweet https://twitter.com/ShaunKing/status/745444019556081664 ]

The Smoking Gun notes the other amenities Clinton required in her speaking contracts:

In addition to a “standard” $225,000 fee, Clinton required a “chartered roundtrip private jet” that needed to be a Gulfstream 450 or a larger aircraft. Depending on its outfitting, the Gulfstream jet, which costs upwards of $40 million, can seat 19 passengers and “sleeps up to six.” Clinton’s contract also stipulated that speech hosts had to pay for separate first class or business airfare for three of her aides.

As for lodging, Clinton required “a presidential suite” and up to “three (3) adjoining or contiguous rooms for her travel aides” and up to two extra rooms for advance staff. The host was also responsible for the Clinton travel party’s ground transportation, meals, and “phone charges/cell phones.”

Additionally, the host also had to pay “a flat fee of $1000” for a stenographer to create “an immediate transcript of Secretary Clinton’s remarks.” The contract adds, however, “We will be unable to share a copy of the transcript following the event.”

Moreover, the DNC appeared particularly worried about the “vulnerabilities” of the Clinton Foundation, such as its acceptance of million-dollar plus donations from private corporations and foreign governments, its veiled finances, and its record in Haiti.

One file (pdf) titled “Clinton Foundation Donors $25K+” documents the high-rolling donors to the Clinton Foundation, including the Kingdom of Saudi Arabia (in the $10-$25 million column), the Saudi Arabian construction magnate Sheikh Mohammed H. Al-Amoudi ($5-$10 million), Barclays Capital ($1-$5 million), ExxonMobil ($1-$5 million), and Chevron ($500,000-$1 million), among many other private corporations—including healthcare, oil and gas, and media giants—and foreign governments.

In a master file called “Clinton Foundation Master Doc,” DNC researchers appear to have gathered reporting spanning years on the “vulnerabilities” of the Clinton Foundation’s record and finances, revealing a particular point of anxiety for the party:

The documents, most of which appear to be dated from the spring of 2015, reveal a party entirely focused on propping up its establishment candidate, critics contend, while failing to support or even predict the success of outsider candidate Bernie Sanders.

Indeed, much of the “opposition research” on other Democratic candidates focused on Lincoln Chafee, Martin O’Malley, Jim Webb, and even Vice President Joe Biden, who never declared an intention to run.

Some argue that these leaks lend more weight to accusations that the primary was “rigged” in favor of the former secretary of state.

And whoever Guccifer 2.0 may be, they appear to be taking a more active role in the leaks—saying they’re now willing to speak to the press via Twitter—supporting whistleblower Edward Snowden’s statement that such hacktivists are “now demonstrating intent—and capability—to influence elections.”

Related Article: Judicial Watch: New Clinton Emails Produced by State Department; Clinton Email Shows She Was Concerned About Records (6.27.16)