New York Times Propagates Russia Hacking Conspiracy Theory

The New York Times reports as fact that Russia hacked the 2016 US presidential election despite failing to present any evidence to support this claim.

By Jeremy R. Hammond

Source: Foreign Policy Journal

In late 2002 and early 2003, those of us who were warning that the US government was lying, that there was no evidence that Iraq still possessed stockpiles of weapons of mass destruction (WMD), much less active WMD manufacturing programs, were frequently dismissed as “conspiracy theorists”.

Of course, in reality, it was the US mainstream media that was propagating the government’s unfounded conspiracy theory that Saddam Hussein had such weapons and, further, had a cooperative relationship with Al-Qaeda, the terrorist organization held responsible for the attacks of September 11, 2001.

The New York Times served the government in its campaign of deception by spearheading the media’s dissemination of the lies out to the public, thus manufacturing Americans’ consent for this illegal war of aggression.

Spreading government propaganda is a function the Times never ceases to serve well — the lesson from its own reporting during the run-up to the Iraq war, and from the mainstream media’s reporting in general, having been dutifully disregarded.

One of the latest government conspiracy theories the Times is helping to propagate, by serving effectively as the political establishment’s very own public relations firm, is the claim that the government of Russia was responsible for hacking into computers of the Democratic National Committee (DNC) and email accounts of John Podesta, who was then chairman of Hillary Clinton’s presidential campaign.

In a report published September 1, 2017, the Times elaborated on this conspiracy theory under the headline “Russian Election Hacking Efforts, Wider Than Previously Known, Draw Little Scrutiny”.

In it, the Times reports as fact that Russia was responsible not only for hacking the DNC and Podesta’s email account, but also for hacking directly into the US election system itself. All that’s old news, however, so the Times‘ new spin is that Russia’s efforts to hack state electoral systems were much more extensive than previously thought.

However, the Times presents not one shred of evidence to support the underlying claim that Russia hacked these systems, much less that this alleged hacking was much more widespread than previously reported.

To the scrutinous reader who is familiar with the propaganda techniques mainstream media use in order to manufacture consent for various government policies, the total lack of evidence is apparent. In fact, the Times actually acknowledges that there is no evidence to support the claim it is making in the headline. Yet, through obfuscation, use of deceptive language, and various other techniques, the Times leads the general reader to believe that its headline is true.

An examination of the article is useful to see just how the Times manages to lead readers to the conclusion the Russia hacking is a demonstrated fact when, in reality, it remains just another conspiracy theory originating from the government that the Times is all too happy to help propagate.

The Alleged Russian Hacking of US Electoral Systems

The first thing to note about this New York Times piece is its title. The headline makes two claims: 1) it’s a fact that Russia tried to hack the US election, and this fact has been known publicly for some time; and 2) the Times has new information showing not only that US election systems were hacked and that Russia was responsible, but also that Russia’s hacking efforts even more widespread than previously known.

The story begins with the case of Durham county, North Carolina, where, we learn, various irregularities occurred at polling stations on election day last November (bold emphasis added throughout):

Dozens were told they were ineligible to vote and were turned away at the polls, even when they displayed current registration cards. Others were sent from one polling place to another, only to be rejected. Scores of voters were incorrectly told they had cast ballots days earlier. In one precinct, voting halted for two hours.

Susan Greenhalgh, a troubleshooter at a nonpartisan election monitoring group, was alarmed. Most of the complaints came from Durham, a blue-leaning county in a swing state [North Carolina]. The problems involved electronic poll books — tablets and laptops, loaded with check-in software, that have increasingly replaced the thick binders of paper used to verify voters’ identities and registration status. She knew that the company that provided Durham’s software, VR Systems, had been penetrated by Russian hackers months before.

“It felt like tampering, or some kind of cyberattack,” Ms. Greenhalgh said about the voting troubles in Durham.

Note that the Times does not say that Ms. Greenhalgh “believed” or “had heard” that Russian hackers were responsible for earlier hacking VR Systems, but that she “knew” this was so. With this verb choice, the Times is asserting that this claim is a proven fact.

The purpose of this assertion is to establish credibility in the mind of the reader that its headline is true, that the evidence shows that Russian hacking efforts were more widespread than previously known. If it is a fact that Russia hacked US election systems, then it is not hard to believe that its hacking was more extensive than previously thought.

But what evidence does the Times present to support its assertion that this earlier Russian hacking of VR Systems occurred?

Well, to answer that question, let’s first look at how Ms. Greenhalgh “knew” that Russians had hacked VR Systems. Much further into the article, more than halfway through, the Times tells us:

As the problems mounted, The Charlotte Observer reported that Durham’s e-poll book vendor was Florida-based VR Systems, which Ms. Greenhalgh knew from a CNN report had been hacked earlier by Russians. “Chills went through my spine,” she recalled.

So there were irregularities at the Durham county polling stations, and Durham county used VR Systems for its polling system, which Ms. Greenhalgh “knew” Russians had hacked because she’d heard it on CNN.

Mid-article, however, the Times also quotes Ms. Greenhalgh acknowledging, with respect to the specific case of Durham county, “We still don’t know if Russian hackers did this.”

If we don’t know whether Russian hacking was responsible for the supposed irregularities in Durham county’s polling station, why is the Times using it as an example to support the claim made in its headline that this hacking was more extensive than previously thought? If there are cases where there is evidence, why not feature one of those, instead?

The answer is that no such evidence exists; the Times has no evidence to support that claim in its headline. In fact, it acknowledges this in several other places in the article. What the Times is trying to do is to build the case that we can safely assume that what happened in Durham county was a consequence of Russian hacking. After all, if Russia hacked VR Systems, that certainly could explain those election-day irregularities, right?

But how solid is the Times‘ premise that Russia hacked VR Systems in the first place?

The Times doesn’t attempt to support this premise solely with hearsay about something CNN reported. It exerts slightly greater effort to convince the reader. Nine paragraphs into the article, we read:

Beyond VR Systems, hackers breached at least two other providers of critical election services well ahead of the 2016 voting, said current and former intelligence officials, speaking on condition of anonymity because the information is classified. The officials would not disclose the names of the companies.

Note here that the Times is once again acknowledging that it doesn’t actually have any evidence to support the claim that Russia hacked other companies in addition to VR Systems, which it is using to support the claim made in its headline that the Russian hacking was more widespread than previously thought. The Times is simply parroting government officials who’ve made this claim.

The Times‘ case crumbles even further the deeper one reads into the article. With respect to the Durham county irregularities, the Times next notes:

There are plenty of other reasons for such breakdowns — local officials blamed human error and software malfunctions — and no clear-cut evidence of digital sabotage has emerged, much less a Russian role in it. Despite the disruptions, a record number of votes were cast in Durham, following a pattern there of overwhelming support for Democratic presidential candidates, this time Hillary Clinton.

But months later, for Ms. Greenhalgh, other election security experts and some state officials, questions still linger about what happened that day in Durham as well as other counties in North Carolina, Virginia, Georgia and Arizona.

So keep in mind as we proceed that the Times is here once again acknowledging that no evidence exists to support the suspicion that the Durham county irregularities were due to Russian hacking. Yet it attempts to lead readers to that conclusion by suggesting that Russians did hack states’ electoral systems:

After a presidential campaign scarred by Russian meddling, local, state and federal agencies have conducted little of the type of digital forensic investigation required to assess the impact, if any, on voting in at least 21 states whose election systems were targeted by Russian hackers, according to interviews with nearly two dozen national security and state officials and election technology specialists.

Note that here the Times is attributing the claim that Russia hacked into states’ electoral systems to various sources. In its next paragraph, however, the Times does away with attribution and transforms this claiminto an ostensibly verified fact:

The assaults on the vast back-end election apparatus — voter-registration operations, state and local election databases, e-poll books and other equipment — have received far less attention than other aspects of the Russian interference, such as the hacking of Democratic emails and spreading of false or damaging information about Mrs. Clinton. Yet the hacking of electoral systems was more extensive than previously disclosed, The New York Times found.

Here we see that the Times is back to asserting as fact that the Russian hacking was more extensive than previously reported, even though it has admittedly not yet provided even a single piece of supporting evidence! How can it do that? Well, transparently, what is important to the Times is that its readers believe that its headline is true, not to actually demonstrate it. Whether it is actually true does not matter; it is just the belief that the Times is aiming to instill.

This is the nature of propaganda.

Turning to the premise, note that the Times is here claiming as fact that, one, US electoral systems were extensively hacked, and, two, Russia was responsible.

It continues:

Intelligence officials in January reassured Americans that there was no indication that Russian hackers had altered the vote count on Election Day, the bottom-line outcome. But the assurances stopped there.

Government officials said that they intentionally did not address the security of the back-end election systems, whose disruption could prevent voters from even casting ballots.

That’s partly because states control elections; they have fewer resources than the federal government but have long been loath to allow even cursory federal intrusions into the voting process.

That, along with legal constraints on intelligence agencies’ involvement in domestic issues, has hobbled any broad examination of Russian efforts to compromise American election systems. Those attempts include combing through voter databases, scanning for vulnerabilities or seeking to alter data, which have been identified in multiple states. Current congressional inquiries and the special counsel’s Russia investigation have not focused on the matter.

Note here how the Times is explaining that the federal government has not really focused much on investigating US election systems irregularities even while continuing to assert as fact that there were Russian efforts to compromise those systems! Further:

“We don’t know if any of the problems were an accident, or the random problems you get with computer systems, or whether it was a local hacker, or actual malfeasance by a sovereign nation-state,” said Michael Daniel, who served as the cybersecurity coordinator in the Obama White House. “If you really want to know what happened, you’d have to do a lot of forensics, a lot of research and investigation, and you may not find out even then.”

In interviews, academic and private election security experts acknowledged the challenges of such diagnostics but argued that the effort is necessary. They warned about what could come, perhaps as soon as next year’s midterm elections, if the existing mix of outdated voting equipment, haphazard election-verification procedures and array of outside vendors is not improved to build an effective defense against Russian or other hackers.

So, again, the Times is acknowledging that the kind of forensic investigation that would be required to determine whether US election systems were hacked have not actually been conducted. How, therefore, can the Times report as fact not only that such hacking occurred, but that Russia was responsible?

It gets worse. The Times at this point in the article has already acknowledged that there could be perfectly benign explanations for what happened in Durham county. As we continue reading, we learn that the those supposedly alarming irregularities the Times opened the article with were not actually all that irregular (and hence not all that alarming). To the contrary:

Still, some of the incidents reported in North Carolina occur in every election, said Charles Stewart III, a political scientist at the Massachusetts Institute of Technology and an expert on election administration.

“Election officials and advocates and reporters who were watching most closely came away saying this was an amazingly quiet election,” he said, playing down the notion of tampering.

The Times next quotes Ms. Greenhalgh’s admission that there’s no evidence hackers got into Durham county’s system (much less that Russia was responsible).

Keep in mind that the claim the government and media have been making is that Russia interfered in the US election to throw the vote to Donald Trump. Yet, in the case of Durham county, the result was that, as the Times informs, “Hillary Clinton won 78 percent of the 156,000 votes”. This is a strange outcome if we are to assume that Russia hacked the system to tamper with the election!

But the Times is not unskilled in the art of propaganda, so it has an explanation ready for us: Russia tried to hack the system there, but was just unsuccessful! It continues:

Details of the breach did not emerge until June, in a classified National Security Agency [NSA] report leaked to The Intercept, a national security news site. That report found that hackers from Russia’s military intelligence agency, the G.R.U., had penetrated the company’s computer systems as early as August 2016, then sent “spear-phishing” emails from a fake VR Systems account to 122 state and local election jurisdictions. The emails sought to trick election officials into downloading malicious software to take over their computers.

The N.S.A. analysis did not say whether the hackers had sabotaged voter data. “It is unknown,” the agency concluded, whether Russian phishing “successfully compromised the intended victims, and what potential data could have been accessed.”

VR Systems’ chief operating officer, Ben Martin, said he did not believe Russian hackers were successful. He acknowledged that the vendor was a “juicy target,” given that its systems are used in battleground states including North Carolina, Florida and Virginia. But he said that the company blocked access from its systems to local databases, and employs security protocols to bar intruders and digital triggers that sound alerts if its software is manipulated.

Take note again of the Times choice of verb: the NSA report “found” that hackers working for Russian intelligence had penetrated VR Systems’ computer systems. Through this choice of verb, the Times is communicating that it is a verified fact that Russia hacked VR Systems. But is it? To answer that, let’s turn to the Times‘ source.

The Intercept reported on this alleged hack much earlier, on June 5, 2017. Unlike the Times, however, The Intercept provided the following important caveat:

While the document provides a rare window into the NSA’s understanding of the mechanics of Russian hacking, it does not show the underlying “raw” intelligence on which the analysis is based. A U.S. intelligence officer who declined to be identified cautioned against drawing too big a conclusion from the document because a single analysis is not necessarily definitive.

To reiterate, the supposed evidence that exists proving that Russia hacked VR Systems is classified and still unknown to either the public or the media, including The Intercept and New York Times.

As The Intercept notes, the NSA report “states unequivocally in its summary statement that it was Russian military intelligence, specifically the Russian General Staff Main Intelligence Directorate, or GRU, that conducted the cyber attacks described in the document.”

But upon what actual evidence is that unequivocal statement based?

The Intercept, like the Times, proceeds to accept this unequivocal summary statement as fact despite its acknowledged lack of access to the evidence supposedly supporting this claim:

The NSA has now learned, however, that Russian government hackers, part of a team with a “cyber espionage mandate specifically directed at U.S. and foreign elections,” focused on parts of the system directly connected to the voter registration process, including a private sector manufacturer of devices that maintain and verify the voter rolls.

Here The Intercept is being as disingenuous with its readers as the Times. Note again the deceptive verb choice. The NSA had not actually “learned” that Russia tried to hack US electoral systems; it had rather assessed that this was so. As the manufactured “intelligence” about Iraq’s WMDs should have taught us, those are far from the same thing.

Conveniently, The Intercept provides a graphic image from the NSA report illustrating the point:

The key element of this chart to note is in the left column, where it identifies the “Operators” responsible sending Phishing emails — emails designed to trick the recipient into giving away login credentials for whatever system the hackers were trying to get into. Note that, according to the NSA, these “Operators” were “Probably within” the GRU.

“Probably”.

So, does the NSA know that the Russian government was responsible for these Phishing emails?

No.

The NSA is claiming this is so. But the supposed evidence it is basing this claim upon has not been shown to even exist.

Now, perhaps the NSA has solid reasoning to arrive at this conclusion. Perhaps it has solid, though not definitive, evidence to back this up.

But the New York Times ought to be properly informing its readers that the Russian hacking of VR Systems is an allegation. It ought to be including the caveat with this information that this is according to the government, but that it has not yet been proven. Moreover, the Times ought to be informing its readers that the evidence supposedly supporting this conclusion has not been made public, and, further, that nobody at the Times has been able to verify it even exists.

But continuing in its propaganda effort, the Times reminds us that, “In an assessment of Russian cyberattacks released in January, intelligence agencies said Kremlin spy services had been collecting information on election processes, technology and equipment in the United States since early 2014.”

But that was just another example of the government making a claim for which no evidence has actually been provided. Each of these claims simply builds upon those that preceded it. In the next manifestation, the New York Times claim that Russia’s supposed hacking was even more extensive than previously known will likewise be presented as fact, and the acknowledgments about the lack of supporting evidence will be omitted, just as the Times omitted that important caveat from The Intercept.

Of course, to write and publish this kind of story requires extreme cognitive dissonance on the part of journalists and editors at the Times. This psychological phenomenon of holding two fundamentally contradictory beliefs at the same time is palpable throughout the piece. Once more, even while reporting its headlined claim as fact, the Times acknowledges that it has no evidence to support it:

Beginning in 2015, the American officials said, Russian hackers focused instead on other internet-accessible targets: computers at the Democratic National Committee, state and local voter databases, election websites, e-poll book vendors and other back-end election services.

Apart from the Russian influence campaign intended to undermine Mrs. Clinton and other Democratic officials, the impact of the quieter Russian hacking efforts at the state and county level has not been widely studied. Federal officials have been so tight-lipped that not even many election officials in the 21 states the hackers assaulted know whether their systems were compromised, in part because they have not been granted security clearances to examine the classified evidence.

Of course, nobody at the New York Times has seen that evidence, either, to be able to verify that it even exists.

The Times closes by noting that, unlike Ms. Greenhalgh, Durham county officials “have rejected any notion that an intruder sought to alter the election outcome.” Nevertheless, the county has turned over computers to the North Carolina State Board of Elections and Ethics Enforcement in order for the matter to be investigated.

Of course, the Times‘ purpose with this piece, rather than being to properly inform the public, is to lead readers into the belief that, regardless of whether it happened in Durham county, there were extensive efforts by the government of Russia to hack into state electoral systems.

Never mind that the Times presents not one shred of actual evidence to support either of the two claims it makes in its headline.

Conclusion

We can again recall how the media, including the New York Times, piled lie upon lie in order to manufacture consent for the US’s war of aggression against Iraq.

Here, again, the political establishment has an agenda. Donald Trump campaigned on a platform of seeking improved relations with Russia, a deescalation of tensions, and greater cooperation with Moscow. The so-called “Deep State” was upset by Hillary Clinton’s loss. In order for the national security state to retain the authoritarian powers it has assumed supposedly in order to keep Americans safe, it needs to convince Americans that they need protecting. Russia has been selected to serve as a useful “enemy” to that end.

Framing Russia as an enemy of the United States also serves the interests of the military/security complex and the goal of maintaining and expanding US hegemony across the globe. This narrative has been used, for example, to prevent Trump from deescalating in Syria and increasing cooperation with Russia there. Trump had indicated that he would shift US policy away from the Obama administration’s goal of seeking regime change in Syria and only focus on combating the so-called “Islamic State” (a.k.a., ISIS, ISIL, or Daesh). The national security state has maneuvered rather to ensure that relations between the US and Russia remain tense and that US policy remains effectively to prolong the violence.

Whatever the motives for the propaganda campaign, we can observe that this propaganda campaign is occurring. Members of the establishment media have not only failed to learn the relevant lesson from their reporting about Iraqi WMD, but refusing to do so almost seems a job prerequisite.

News consumers should not make the same mistake.

Scrutinize. Question. Think.

If we want the mainstream media to change its behavior and actually do its job of properly informing the public, then news consumers need to change their behavior. Ever news consumers knows the old adage that you can’t believe everything you read in the newspaper. Nevertheless, all too habitually, that is precisely what they do — just as the journalists and editors they are relying on for information all too habitually accept claims from government officials as fact.

It is supposed to be the job of news media to analyze information, assess the veracity of sources, question government claims, and reveal the truth. Yet the establishment media not only fail to do so, but actively serve to propagate conspiracy theories originating from the government, and thus to manufacture consent for various government policies and the private agendas of the politically and financially powerful.

In light of how the mainstream media serve this function, it is critical for the consumers to develop the analytic skills necessary to determine the truth for themselves and be able to identify state propaganda when they see it.

Hopefully, this exercise has provided some useful insights into how to do just that.

Unaccounted Power is Dragging Global Society Into An Orwellian Dystopia

By Dr Nozomi Hayase

WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents, that have come from the top secret security network at the Cyber Intelligence Center.

Long before the Edward Snowden revelations, Julian Assange noted how “The Internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen.” He decried the militarisation of the Internet with the penetration by the intelligence agencies like NSA and GCHQ, which created “a military occupation of civilian space”.

Now, WikiLeaks’ latest disclosures shed further light on this cyber-warfare, exposing the role of the CIA.

At a recent press conference from the Ecuadorian embassy in London, Assange explained how the CIA developed its own cyber-weapons arsenal and lost it after storing it all in one place. What is alarming is that the CIA became aware of this loss and didn’t warn the public about it. As a result, this pervasive technology that was designed to hide all traces, can now be used by cyber-mafias, foreign agents, hackers and by anyone for malicious purposes.

Part one of this WikiLeaks publication dubbed “Year Zero”, revealed the CIA’s global hacking force from 2013 to 2016. The thousands of documents released contain visceral revelations of the CIA’s own version of an NSA. With an ability to hack any Android or iPhone, as well as Samsung TVs and even cars, they spy on citizens, bypassing encrypted messaging apps like Signal and Telegram. The Vault 7 leaks that exposed the CIA’s excessive power is of great importance from a point of view of security for individual privacy. But it has larger significance tied to the mission of WikiLeaks.

Opening Government into the Deep State

Describing itself on its site as “a multi-national media organisation and associated library”, WikiLeaks aims to open governments in order to bring justice. In the speech at the SWSX conference in Texas, delivered via Skype in 2014, Assange described the particular environment that spawned the culture of disclosure this organisation helped to create.

He noted how “we were living in some fictitious representation of what we thought was the world” and that the “true history of the world” is “all obscured by some kind of fog”. This founder and editor in chief of innovative journalism explained how disclosures made though their publications break this fog.

The magnitude of this Vault 7 cache, which some say may be bigger than the Snowden revelations, perhaps lies in its effect of clearing the fog to let people around the world see the ground upon which the narratives of true history are written.

Since coming online in 2007, WikiLeaks has published more than 10 million documents. Each groundbreaking disclosure got us closer to where the real power of the world resides. In 2010, WikiLeaks rose to prominence with the publication of the Collateral Murder video. With the release of documents concerning U.S. Wars in Iraq and Afghanistan, they hit on the nerves of the Pentagon —the central nervous system of the Military Industrial Complex. With the release of the U.S. Diplomatic Cables, they angered the State Department and came head to head with this global superpower.

Last year, this unprecedented publisher with its perfect record of document authentication, began to blow the cover off American democracy a step further to clear the fog. WikiLeaks played an important role in the 2016 U.S. Presidential election. The DNC leaks disrupted the prescribed script of corporate sponsored lesser of two evils charade politics. The publication of the Podesta emails that revealed internal workings of the Clinton campaign, gave the American people an opportunity to learn in real time about the function of the electoral arena as a mechanism of control.

With the demise of the Democratic Party, led by its own internal corruption, the cracks in this façade widened, unveiling the existence of a government within a government.

People are beginning to glimpse those who seek to control behind the scenes – anonymous unelected actors who exercise enduring power in Washington by manipulating public perception.

This unraveling that has been slowly unfolding, appeared to have reached a peak last month when Trump’s former National Security Adviser, Michael Flynn resigned. He was forced to do this on the grounds that leaked classified information revealed he was lying about his phone conversation discussing sanctions with the Russian Ambassador.

WikiLeaks now entered its 10th year. The momentum continues, bringing us to a new pinnacle of disclosure. At the end of last year, in anticipation of this new release, WikiLeaks tweeted, “If you thought 2016 was a big WikiLeaks year, 2017 will blow you away.” During the dramatic takedown of General Flynn, the media created a frenzy around unconfirmed claims that Russia was meddling with the U.S. election and Putin’s alleged ties with Trump, creating another fog of obfuscation. It was in this climate that WikiLeaks published documents showing CIA espionage in the last French presidential election.

History Awakening

The idea of a shadow government has been the focus of political activists, while it has also been a subject of ridicule as conspiracy theories. Now, WikiLeaks’ pristine documents provide irrefutable evidence about this hidden sector of society. The term ‘deep state’ that is referenced in the mainstream media, first hit the major airwaves in 2014, in Bill Moyers’ interview with Mike Lofgren. This former congressional staff member discussed his essay titled “Anatomy of the Deep State” and explained it as the congruence of power emerging as a “hybrid of corporate America and national security state”.

We are now watching a deep state sword-fight against the elected Caesar of American plutocracy in this gladiator ring, surrounded by the cheers of liberal intelligentsia, who are maddened with McCarthy era hysteria. As the Republic is falling with its crumbling infrastructure and anemic debt economy, far away from the coliseum, crazed with the out-of-tune national anthem, the silent pulse of hope begins to whisper.

WikiLeaks unlocked the vaults that had swallowed the stolen past. As the doors open into this hidden America, history awakens with dripping blood that runs deep inside the castle. As part of the release of this encrypted treasure-trove of documents, WikiLeaks posted on Twitter the following passphrase; “SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds.” These were actually words spoken by President John F. Kennedy, a month before his assassination. His exact words wereI will splinter the CIA into a thousands pieces and scatter it into the wind” – which shows his attitude toward the CIA as an arm of the deep state and what many believe to be the real reason for his assassination.

The secret stream of history continues, taking control over every aspect of civil life and infecting the heart of democracy. The U.S. has long since lost its way. We have been living in a fictitious representation of the flag and the White House. It is not judicial boundaries drawn by the Constitution or even the enlightenment ideals that once inspired the founders of this country that now guide the course of our lives. Tyranny of the old world casts its shadow, binding Congress, the Supreme Court and the President into a rule of oligarchy. CIA documents revealed that the U.S. Consulate in Frankfurt was used as a covert hacking base, while CIA officers work under the cover of the State Department to penetrate with these intelligence operations. The Wall Street Journal now reports that President Trump has given the CIA expanded authority to carry out drone attacks, which was power that prior to that had only been given to the Pentagon.

Decisions that radically alter the direction of our society are not made in a fair democratic election, a public hearing or the senate floor. They are made in the FISA Court and secret grand juries, bypassing judicial warrants and democratic accountability. This hidden network of power that exists above the law entangles legislators, judges and the press into a web of deception through dirty money and corrupt influence. It controls perception of the past, present and future.

The Internet Generation

As the deep state comes to the surface, we are able to see the real battle on the horizon. What is revealed here is a clash of values and two radically different visions of a future civilization. In his response to the Vault 7 publication, Michael Hayden, the former CIA director was quick to lay blame on the millennials. He said, “This group of millennials and related groups simply have different understandings of the words loyalty, secrecy and transparency than certainly my generation did”. To him, these young people are the problem, as if their different cultural approach and instincts must be tempered and indoctrinated into this hierarchical system, so they know who their masters are.

Who are these people that are treated as a plague on society? This is the Internet generation, immersed with the culture of the free-net, freedom of speech and association. They believe in privacy for individuals, while demanding transparency for those in power. Peter Ludlow, a philosopher who writes under the pseudonym Urizenus Sklar, shared his observation of a cultural shift that happened in 2011. He noted that WikiLeaks had become a catalyst for an underground subculture of hackers that burst into the mainstream as a vital political force.

Assange recognised this development in recent years as a “politicisation of the youth connected to Internet” and acknowledged it as “the most significant thing that happened in the world since the 1960s”.

This new generation ran into the deep state and those who confront it are met with intense hostility. Despite his promise of becoming the most transparent government, Obama engaged in unprecedented persecution of whistleblowers. Now this dark legacy seems to be continuing with the present administration. Vice president Mike Pence vowed to “use the full force of the law” to hunt down those who released the Intelligence Agency’s secret material.

As these conflicts heat up, resistance continues in the Internet that has now become a battleground. Despite crackdowns on truthtellers, these whistleblowers won’t go away. From Manning to Snowden, people inside institutions who have come to see subversion of government toward insidious control and want change, have shown extraordinary courage.

According to a statement given to WikiLeaks, the source behind the CIA documents is following the steps of these predecessors. They want this information to be publicly debated and for people to understand the fact that the CIA created its own NSA without any oversight. The CIA claims its mission is to “aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries”. With these documents that have now been brought back to the historical archive, the public can examine whether this agency has itself lost control and whose interests they truly serve.

The Future of Civilisation

As the world’s first stateless 4th estate, WikiLeaks has opened up new territory where people can touch the ground of uncensored reality and claim creative power to participate in the history that is happening. In a press conference on Periscope, Assange made reference to a statement by the President of Microsoft, who called for the creation of a digital Geneva Convention to provide protection against nation-states and cyber-attacks. He then affirmed WikiLeaks’s role as a neutral digital Switzerland for people all over the world.

WikiLeaks is taking the first step toward this vision. After they carefully redacted the actual codes of CIA hacking tools, anonymised names and email addresses that were targeted, they announced that they will work with tech companies by giving them some exclusive access to the material. Assange explained that this could help them understand vulnerabilities and produce security fixes, to create a possible antidote to the CIA’s breach of security and offer countermeasures. WikiLeaks tweeted notifying the public that they now have contacted Apple, Microsoft, Google, Mozilla and MicroTik to help protect users against CIA malware.

The Internet unleashed the beast that grows its force in the dark. Unaccounted power is dragging global society down into an Orwellian dystopia. Yet, from this same Internet, a new force is arising. Courage of the common people is breaking through the firewall of secrecy, creating a fortress that becomes ever more resilient, as the network of people around the world fighting for freedom expands.

When democracy dies in darkness, it can be reborn in the light of transparency. The deep state stretches across borders, sucking people into an abyss of totalitarian control. At the same time, the epic publication of Vault 7 that has just begun, reminds us that the greatness in each of us can awaken to take back the power of emancipation and participate in this battle for democracy, the outcome of which could not only determine the future of the Internet, but of our civilisation.

 

Nozomi Hayase, Ph.D., a native of Japan, is a columnist, researcher, and the First Amendment advocate. She is member of The Indicter‘s Editorial Board and a former contributing writer to WL Central and has been covering issues of free speech, transparency and the vital role of whistleblowers in global society.

From Russia, with Panic

Cozy bears, unsourced hacks—and a Silicon Valley shakedown

By Yasha Levine

Source: The Baffler

The Russians hacked America.

After Donald Trump’s surprise victory in November, these four words reverberated across the nation. Democratic Party insiders, liberal pundits, economists, members of Congress, spies, Hollywood celebrities, and neocons of every stripe and classification level—all these worthy souls reeled in horror at the horribly compromised new American electoral order. In unison, the centers of responsible opinion concurred that Vladimir Putin carried off a brazen and successful plan to throw the most important election in the most powerful democracy in the world to a candidate of his choosing.

It seemed like a plotline from a vintage James Bond film. From his Moscow lair, Vladimir Putin struck up an alliance with Julian Assange to mount a massive cyber-offensive to discredit Hillary Clinton and her retinue of loyal Democratic Party operatives in the eyes of the American public.

The plot was full of twists and turns and hair-raising tangents, including tales of Russian-American retiree-agents sunning in Miami while collecting payoffs from Russia’s impoverished pension system. But the central ruse, it appears, was to enter the email server of the Democratic National Committee and then tap into the Gmail account belonging to John Podesta, founder of the Center for American Progress and premier D.C. Democratic insider.

As the long 2016 general election campaign unwound, WikiLeaks released a steady stream of embarrassing revelations from the DNC—though the disclosures were no more compromising than what you’d find in the correspondence of any mid-sized private-sector company: dumb boardroom gossip, petty press intrigues, and sleazy attempts to undermine a well-placed executive rival (namely Bernie Sanders). Truly, it would have been astonishing to learn that the DNC went about its business in any other way. But the sheer fact of the data breach was dispositive in the eyes of Democratic operatives and their many defenders in the liberal press. After all, WikiLeaks also reportedly collected data from the Republican National Committee, and did nothing with it. Clearly this was cyber-espionage of the most sophisticated variety.

On the Trump side of the ledger, things were murkier. Trump’s political advisers indeed had ties to Russia and Ukraine—but this was hardly surprising given the authoritarian-friendly lobbying climate within Washington. During the campaign the GOP nominee was disinclined to say anything critical about Putin. Indeed, breaking with decades of Republican tradition, Trump openly praised the Russian leader as a powerful, charismatic figure who got things done. But since the candidate also refused to disclose his tax returns, a commercial alliance with the Russian autocrat was necessarily a matter of conjecture. That didn’t stop theories from running wild, culminating in January with the titillating report from BuzzFeed that U.S. intelligence agencies believed that Putin had compromising footage of Trump cavorting with prostitutes at a Moscow hotel previously patronized by Barack and Michelle Obama. Not only was the Yank stooge defiling the very room where the first couple had stayed, but he allegedly had his rented amorous companions urinate in the bed. Behold, virtuous American republic, the degradation Vladimir Putin has in store for you!

Taking the Piss

The dossier published by BuzzFeed had been circulating for a while; on closer inspection, it appeared to be repurposed opposition research from the doomed Jeb Bush campaign. Its author was a former British intelligence operative apparently overeager to market salacious speculation. By the end of this latest lurid installment of the Russian hacking saga, no one knew anything more than they had when the heavy-breathing allegations first began to make their way through the political press. Nevertheless, the Obama White House had expelled Russian diplomats and expanded sanctions against Putin’s regime, while the FBI continued to investigate reported contacts between Trump campaign officials and Russian intelligence operatives during the campaign.

This latter development doesn’t exactly inspire confidence. As allegations of Russian responsibility for the DNC hack flew fast and furious, we learned that the FBI never actually carried out an independent investigation of the claims. Instead, agency officials carelessly signed off on the findings of CrowdStrike, a private cybersecurity firm retained by the Democratic National Committee. Far from establishing an airtight case for Russian espionage, CrowdStrike made a point of telling its DNC clients what it already knew they wanted to hear: after a cursory probe, it pronounced the Russians the culprits. Mainstream press outlets, primed for any faint whiff of great-power scandal and poorly versed in online threat detection, likewise treated the CrowdStrike report as all but incontrovertible.

Other intelligence players haven’t fared much better. The Director of National Intelligence produced a risible account of an alleged Russian disinformation campaign to disrupt the 2016 presidential process, which hinged on such revelations as the state-sponsored TV news outlet Russia Today airing uncomplimentary reports on the Clinton campaign and reporting critically on the controversial U.S. oil-industry practice of fracking as a diabolical plot to expand the market for Russian natural gas exports. In a frustratingly vague statement to Congress on the report, then-DNI director James Clapper hinted at deeper and more definitive findings that proved serious and rampant Russian interference in America’s presidential balloting—but insisted that all this underlying proof must remain classified. For observers of the D.C. intelligence scene, Clapper’s performance harkened back to his role in touting definitive proof of the imminent threat of Saddam Hussein’s WMD arsenal in the run-up to the U.S. invasion of Iraq.

It’s been easy, amid the accusations and counteraccusations, to lose sight of the underlying seriousness of the charges. If the hacking claims are true, we are looking at a truly dangerous crisis that puts America’s democratic system at risk.

The gravity of the allegation calls for a calm, measured, meticulously documented inquiry—pretty much the opposite of what we’ve seen so far. The level of wild assertion has gotten to the point that some of the most respected pro-Western voices in Russia’s opposition have expressed alarm. As much as they despise Putin, they don’t buy the bungled investigations. “In the real world outside of soap operas and spy novels . . . any conclusions concerning the hackers’ identity, motives and goals need to be based on solid, demonstrable evidence,” wrote Leonid Bershidsky. “At this point, it’s inadequate. This is particularly unfortunate given that the DNC hacks were among the defining events of the raging propaganda wars of 2016.”

The lack of credible evidence, the opaque nature of cyber attacks, the partisan squabbles and smears, and the national-security fearmongering have all made this particular scandal very difficult to navigate. It may be years before we find out what really happened. Meanwhile, I’d like to tell a cautionary tale. It’s a story about the last time American and European cyber experts accused Russia of launching an attack against another country—and nearly provoked a war with a nuclear power. The moral of the tale is that cyberwarfare is a fraught and high-stakes theater of conflict, in which the uncertain nature of cyber-attack attribution can be exploited to support any politicized version of events that one chooses.

All Georgians Now

On August 8, 2008, war broke out between Georgia and Russia. Backed up by heavy artillery, truck-mounted Grad rockets, and tanks, Georgia launched a surprise invasion of South Ossetia, a tiny mountainous breakaway republic on its northern flank that had been at the center of a long-simmering regional territorial dispute. A prolonged artillery barrage reduced parts of Tskhinvali, South Ossetia’s capital, to rubble. Civilians were given no warning—those not killed in the initial assault hid in basements or fled on foot. A Russian peacekeeping force, which had been stationed in South Ossetia under an Organization for Security and Cooperation in Europe agreement since 1992, was targeted in the attack. By the end of the first day, Georgian troops were on the verge of taking the whole city.

Mikheil Saakashvili, Georgia’s charismatic nationalist president, had campaigned on a nationalistic platform, promising to reabsorb the country’s breakaway regions. His initial success did not last long. Russian jets pounded Georgian military command posts and communications, while Russian troops streamed into South Ossetia. By the end of day two, the tide had turned: Georgian forces began retreating. By day five, Russian forces had control over South Ossetia and huge swaths of northern Georgia. Tanks and infantry entered several northern towns and moved around unimpeded just an hour away from Tbilisi, Georgia’s capital, where euphoria and jubilation turned to sickly fear. News footage showed Saakashvili cowering as Russian jets flew overhead. He appeared on television nervously chewing his tie, prompting the BBC to ask wryly: “The Georgian president chews over his next move. Is he weaker or stronger than before?”

Weaker, definitely. But in the war’s aftermath, Russia and Georgia were each determined to claim victim status. Russia pointed out that Georgia had started the war; Georgia blamed Russia for launching a full-scale invasion. President Saakashvili appealed to the United States, hoping it would intervene militarily on Georgia’s behalf.

The Bush White House was firmly aligned with Georgia. For years, Georgia had been an important neocon project in a grander scheme to peel away former Soviet Republics from Moscow’s influence. American NGOs and soft-power outfits like USAID backed Saakashvili’s rise to power during the country’s “Rose Revolution.” Since 2004, the Bush administration had lavished military aid on Saakashvili’s government, outfitted its army, and trained its soldiers. John McCain and Hillary Clinton jointly nominated Saakashvili for the Nobel Peace Prize in 2005. Support for Georgia was bipartisan and continued right up to Georgia’s attack on South Ossetia; more than a thousand American troops held a joint exercise with Georgia near the South Ossetian border in July.

As a complement to the Georgia PR offensive, the Bush White House continued to hammer away at its stable of anti-Putin talking points. For years, the United States had portrayed Vladimir Putin as a strongman leader bent on world domination. The invasion of Georgia seemed to confirm the official narrative: Russia would stop at nothing to crush the democratic aspirations of its neighbors.

It was a dangerous moment. Vice president Dick Cheney pushed for directly engaging the Russians in “limited military options”—including aerial bombardment to seal the Roki Tunnel linking North Ossetia and South Ossetia that was being used to transport reinforcements. Luckily, president George W. Bush, who had a street in Tbilisi named after him, wavered, sensibly fearing a real war with Russia.

The episode occurred during a U.S. presidential election. Senator John McCain used the conflict to showcase his hawkish foreign policy bona fides, arguing that America needed to intervene to protect Georgia’s budding democratic society from the authoritarian Putin. Claiming that “today, we are all Georgians,” McCain called for NATO forces to be deployed against Russia, which would have triggered a war with a nuclear power.

I was in Moscow at the time, reporting on the war. Those who had covered the region understood that Georgia was no innocent. The ethnic conflict between Ossetians and Georgians has old, festering roots—indeed, Georgia’s invasion of South Ossetia was centuries in the making. The Ossetians consider the territory of South Ossetia to be native lands they have occupied for centuries, while Georgians view Ossetians as relatively recent interlopers. When South Ossetia declared its independence after the breakup of the Soviet Union, Georgia’s ultra-nationalistic first president attempted to quash the independence movement by force. After a short war, South Ossetia stood its ground—and Georgia and South Ossetia squared off in an uneasy peace administered by Russian, Georgian, and South Ossetian peacekeepers. Two-thirds of the breakaway republic were ethnic Ossetians. They feared Georgia and favored Russia as a military bulwark. Russia handed out Russian passports to South Ossetians and provided military protection, making the territory a de facto member of the Russian Federation.

Seasoned observers of the region’s tangled geopolitics understood that Russia shared amply in the blame but that the fault lay primarily with President Saakashvili. When he came to power, he took on the mantle of a medieval Georgian king who had unified the country. “Today Georgia is split and humiliated. We should unite to restore Georgia’s territorial integrity. Georgia has existed and will exist. Georgia will become a united strong country,” he declared in 2004. With deteriorating political support at home, Saakashvili was itching for a popular war. Skirmishes increased along Georgia’s border with Abkhazia and South Ossetia; finally, Georgia fired the first shot.

Suddenly, America found itself at the edge of a precipice: a war over a complex sectarian conflict in a remote part of the world. American policymakers wanted a simple explanation, and conveniently, they were offered one: cyber-aggression.

The Sites Go Out in Georgia

When war broke out, a slew of Georgian websites came under attack. The Central Bank of Georgia was hacked, according to Russian reports. Its internal networks were not penetrated, but the hackers tinkered with the homepage to give the Georgian unit of currency, the lari, a less than favorable exchange rate, forcing the government to issue an order that suspended all electronic banking services. Georgia’s Ministry of Foreign Affairs was hacked, its homepage replaced with a slideshow depicting Mikhail Saakashvili as Hitler. “And he will suffer the same fate,” read an ominous message beside it.

A Russian-language forum called “Stop Georgia” suddenly came online, hosted in, of all places, the United States. Against a green camouflage-inspired background, its creators decried Georgia’s propaganda war against Russia. “We, as representatives of the Russian hacker-underground, will not tolerate provocations from Georgia.” The forum was crude and looked like it had been put together in a few hours. Its primary function was to distribute a simple, easily available program permitting anyone with a computer and an internet connection to become part of a denial-of-service attack swarm. The forum conveniently provided a list of Georgian target websites and helped organize and direct the cyber-mob action.

Georgian officials proclaimed these cyber attacks a strategic maneuver by the Russian military designed to take out the country’s communication system, facilitating the Russians’ armed invasion. The coordinated nature of the attacks, they insisted, showed that Russia had planned the invasion long in advance. “The opening shots of the Russian invasion of Georgia were fired over the Internet, proving Russian online aggression predated Georgian actions,” declared an official report by the Georgian government. The government called the people behind the attack “cyber terrorists.”

Cybersecurity experts came out of the woodwork to confirm and expand on Georgia’s allegations. Some implicated a shadowy cybercrime group from St. Petersburg that analysts had dubbed the “Russian Business Network” and linked it to the FSB, Russia’s secret police. Others claimed that Nashi, a Kremlin-backed young nationalist group, was involved. American military officials weighed in, agreeing that Russia had used cyber attacks to confuse and disorient the Georgian government. “The Russians just shot down the government command nets so they could cover their incursion,” Michael Wynne, former U.S. Air Force Secretary, told the AP on August 13.

One hack in particular became a sort of poster action for the sinister Russian cyber-offensive and conveniently doubled as a warning signal for greater Russian-authored threats ahead. In July, just after secretary of state Condoleezza Rice had visited Georgia and reaffirmed America’s support for the country’s desire to exit Russia’s sphere of influence, President Saakashvili’s site had been taken down by a stream of junk requests with a string of text that read: “win+love+in+Rusia.”

What did it all mean? The war had barely ended, but John Markoff, longtime technology reporter for the New York Times, offered an answer: “As it turns out, the July attack may have been a dress rehearsal for an all-out cyberwar once the shooting started between Georgia and Russia. According to Internet technical experts, it was the first time a known cyber attack had coincided with a shooting war.” Other journalists chimed in as well: the Wall Street Journal, CNN, the Washington Post. The consensus, according to cyber experts, was that Russia was indeed behind the attacks—and the rhetoric was getting more and more belligerent.

And so, within the space of a news cycle or two, internet analysts turned into warmongers and cyber-hawks, comparing rudimentary internet attacks to atomic weapons. “These attacks in effect had the same effect that a military attack would have. That suddenly means that in cyberspace anyone can build an A-bomb,” Rafal Rohozinski, a respected cyber analyst with Citizen Lab, told the Washington Post. The Financial Times concurred: “The crisis in Georgia has not only stoked fears of a belligerent Russia. It has also served as a reminder that a new style of warfare—potentially as devastating as those that terrified previous generations—is almost upon us: cyberwar.”

That’s right: defacing a government website with a repetitive string of crude slogans was now the twenty-first-century equivalent of a nuclear first strike. The hysteria sloshed around and spilled over into fears that America was defenseless against similar attacks from Russia. “It’s a grave concern be the same thing could happen here in America,” CNN host John Roberts exclaimed.

Point, Click, Panic

I began investigating the cyberwar as soon as it erupted. I knew something about the way computers, websites, and the internet worked, having spent two years studying computer science at UC Berkeley, and I had serious doubts about the cyber dimension of the Russia-Georgia War. The hacks and attacks all seemed rather crude and for the most part targeted non-critical cyber portals: ceremonial government websites, several news sites, the public-facing website of a central bank. This was hardly the ruinous infrastructure offensive that cybersecurity experts were warning people about. As I got deeper into the story—interrogating my contacts in Moscow, traveling to Georgia, interviewing hackers, politicians, and cyber experts in Europe, Russia, and the United States—the cyberwar battle cries sounded more and more like ideologically manufactured hysteria.

To be sure, the assaults were troubling. Hacks against Georgian websites took place, they were in some way connected to the war, and Russia’s cyber criminal world had ties to the country’s security establishment. But it was an enormous—and dangerous—leap to interpret these attacks as a pre-planned Russian intelligence operation, possibly justifying an American military response. What’s more, it seemed clear that most of the people doing the investigating were working backward. They started from the premise that Russia started the war and then proceeded to show that the cyber attacks were an element of this premeditated invasion.

Living in Moscow, I saw a striking split-screen effect taking hold around the Georgia crisis. America was freaking out about the danger of Russian cyber attacks, while people I talked to in Russia mocked the hysteria. Looking at my reporting notes from that time, I can’t find a single Russian source who took it seriously. Nikita Kislitsin, former editor of Russia’s Hacker magazine, laughed at Western cybersecurity experts who suggested that the Georgian attacks were the entering wedge of a sophisticated plan for complete Russian takeover, explaining that hackers can have all sorts of unconventional motives for taking part in a political web war. One regular contributor to his magazine’s how-to break-in section, for example, had hacked into a few Georgian sites just so he had something to write—and brag—about. Kris Kaspersky, a well-known Russian hacker and security expert, also ridiculed the notion that the Georgia hacks were hatched as part of a military intelligence campaign. “A prepubescent kid could have carried out the attacks,” Kaspersky told me. “A well-funded organization like the FSB can pull off much more effective Web site attacks.” Bringing down a few rinky-dink government and newspaper websites is a far cry from network warfare, Kaspersky argued. Indeed, it was at least as plausible that the hacks could have been self-inflicted: “In these kinds of conflicts, you have to look at who benefits,” he said. “If I was Georgia, I would attack myself.”

The Fog of the Data Log

There was a second, underreported side to the conflict: the cyber attacks went in both directions.

Even before the war broke out in August, South Ossetian websites came under attack. A few days before the shelling of South Ossetia began, someone skillfully broke into the website of the Republic’s television station, replacing news items on the number of Georgian troops killed in a shootout with South Ossetian troops with ones that claimed Russian mercenary fighters were among the casualties. As Georgian tanks rolled across the border, other South Ossetian news sites—some of which were hosted in Moscow—came under cyber attack. The website of South Ossetia’s Ministry of Information, a clearinghouse for South Ossetian news, buckled under a denial-of-service attack. At the same time, Russian news sites—including the Kremlin-funded Russia Today—were hit and suffered downtime during the war.

If you squinted at the conflict and looked at it from Russia’s and South Ossetia’s perspective, you could use the cyber attacks to prove the opposite of what Georgia and Western cyber experts were claiming: the cyber attacks proved that Georgia had planned its military invasion. And that was exactly what the South Ossetians were telling me. “They hoped that a media blackout of the atrocities they were committing against a civilian population would reduce resistance to the invasion, both locally and globally,” Yuri Beteyev, the founder and editor in chief of OsInform, South Ossetia’s only news agency, told me. He had been in Tskhinvali when Georgia’s heavy artillery rolled into town.

I traveled to Tbilisi, looking for evidence of the alleged Russian attack. I had scheduled interviews with newspapers, government agencies, and internet service providers. They all made grand claims about Russian cyber attacks, all of them short on specific evidence. Caucasus Online, one of Georgia’s largest ISPs, claimed the attacks started the day before the military action—which served in the company’s view as undeniable proof that the Russian government was coordinating them. But ISP officials could not provide any supporting data, and when I requested a sample of their logs from that day, company spokesmen claimed the data had been deleted.

I was shown a former Soviet government compound in the center of Tbilisi. The building was a modernist fortress: a slab of granite and concrete perched at the top of a steep hill. The seventh floor housed Georgia’s National Security Council, the coordinating body for the country’s military and intelligence agencies. In this ultrasecure location, Georgian officials spun a series of talking points about how the cyberwar proved Russian aggression. “For a small country like ours, information is the most powerful tool with which you can protect yourself. The Russians knew this,” Security Council director Alexander Lomaia told me. “One day, we find out that we are cut off from the world. All major websites—including government and media—were attacked. Their aim was to limit our ability to electronically communicate, and they succeeded.”

But Georgia is a poor, largely rural country with low internet connectivity outside the capital. Its level of cyber-activity ranked below that of countries like Nigeria, Bangladesh, Bolivia, and El Salvador. You could hardly launch a real cyber attack if you wanted too, since few Georgians outside Tbilisi used the internet at all, let alone for anything important. It was all hype and bluster—and very superficial.

Indeed, as in Moscow, critical journalists and techies in Georgia dismissed much of the hype. Yes, there were cyber attacks. Yes, they could have been directed by the Russian government. But they were so amateur and inconsequential that they had little effect. Their biggest contribution, in fact, was to bolster Georgian counter-propaganda claims, as each little hack was taken up by the Georgian government and broadcast as proof of Russian aggression. One journalist told me his colleagues had cheered news of Georgia-based cyber attacks against Russia. “A wave of jubilation spread through the forum when they managed to take down Russia Today for a few hours.” Patriotic hackers doing their part to fight Russia? This is exactly what cyber experts accused Russian security services of orchestrating against Georgia as part of the military invasion.

Following the Money

By the time I left Georgia in October, the cyberwar story was no longer obsessing political leaders and media producers in the West. Congress had voted to bail out Wall Street. The Georgia-Russia War dropped out of America’s collective memory almost as quickly as it had appeared, eclipsed by a scarier and much more direct threat to America: the meltdown of our financial system and the threat of a new Great Depression.

A year later, a European Union commission issued a detailed report that showed just how empty all the talk about cyber attacks and premeditated Russian war really was. The report put the blame for starting the war squarely on Georgia. But by then the Georgia-Russia War was ancient news. No one cared, and the report barely got a mention in the press. But Silicon Valley noticed.

While the financial industry was teetering on the brink of oblivion, another industry was being born: the cybersecurity complex. By now it is a multibillion-dollar boondoggle, employing shoddy forensic techniques and politicized investigations. But it is highly profitable. The boom has been driven by the grim leaky reality of our digital world. Not a month goes by without some huge corporation or government agency getting hacked, its data splattered across the internet or siphoned off for the exclusive use of scammers, corporate spies, and intelligence agencies.

Cybersecurity firms have stepped up to the challenge. They’ve attracted funding from the biggest and most powerful venture capital houses: Sequoia, Google Capital, and the like. Not surprisingly, the CIA’s in-house VC outfit, In-Q-Tel, has been a leading investor in this space. All these firms position themselves as objective forensic investigators, patiently sifting through the evidence to find the guilty party and then figuring out how to defend against it. They have been involved with diagnosing and attributing big hacks for shamefaced clients like Target, J.P. Morgan, and Sony Pictures. Investors and intelligence agencies sing the praises of the critical services these outfits offer in an online environment teeming with hostile threats.

But in private conversations, as well as little-noticed public discussions, security professionals take a dimmer view of the cybersecurity complex. And the more I’ve looked at the hysteria surrounding Russia’s supposed hacking of our elections, the more I’ve come to see it as a case study of everything wrong and dangerous about the cyber-attribution business.

Fancy Bears, Cozy Bears—Oh My!

Take CrowdStrike, the hottest cybersecurity firm operating today. Based in Irvine, California, CrowdStrike was launched in 2012 by two veterans of the cyber-attribution business: George Kurtz and Dmitri Alperovitch. Both previously worked for McAfee, an antivirus-turned-massive-cybersecurity firm now partially owned by Intel. But Kurtz and Alperovitch saw a market opportunity for a new boutique type of cyber-defense outfit and decided to strike out on their own. They also brought on board Shawn Henry, a top FBI official who had been in charge of running the agency’s worldwide cyber investigations.

CrowdStrike positioned itself as a next-generation full-service cybersecurity firm. Company officials argued that cybersecurity was no longer just about defense—there was too much data and too many ways of getting at it to protect everything all the time. You had to know your attacker. “Knowing their capabilities, objectives, and the way they go about executing on them is the missing piece of the puzzle in today’s defensive security technologies,” wrote CrowdStrike cofounder George Kurtz. “By identifying the adversary . . . we can hit them where it counts.”

CrowdStrike hit the big time in 2015 with a $100 million infusion from Google Capital (now Capital G), Google’s first-ever investment in a cybersecurity company. It was good timing, because CrowdStrike was about to be catapulted into the front ranks of cyber-threat assessors. Sometime in April or May, CrowdStrike got a call from the Democratic National Committee to investigate a possible intrusion into their servers. The company’s investigators worked with surprising efficiency. As one DNC insider explained to the New York Times, the company was able to make a definite attribution within a day. There was no doubt, CrowdStrike told its DNC clients—the Russian government did it.

The results of CrowdStrike’s investigation were first broken by the Washington Post and then followed up in greater detail by CrowdStrike itself. In a post entitled “Bears in the Midst,” Dmitri Alperovitch attributed the hack to two distinct and very nefarious “Russian espionage” groups: Cozy Bear and Fancy Bear, among the most sophisticated cyber-operators CrowdStrike had ever come across. “In fact, our team considers them some of the best adversaries out of all the numerous nation-state, criminal and hacktivist/terrorist groups we encounter on a daily basis,” he wrote. “Their tradecraft is superb, operational security second to none and the extensive usage of ‘living-off-the-land’ techniques enables them to easily bypass many security solutions they encounter.”

These cyberspooks were allegedly behind a string of recent attacks on American corporations and think tanks, as well as recent penetrations of the unclassified networks of the State Department, the White House, and the U.S. Joint Chiefs of Staff. According to CrowdStrike, Cozy Bear was most likely the FSB, while Fancy Bear was linked to the “GRU, Russia’s premier military intelligence service.”

Here, the cyber experts were telling us, was conclusive evidence that both the FSB and the GRU targeted the central apparatus of the Democratic Party. CrowdStrike’s findings didn’t just cause a sensation; they carpet-bombed the news cycle. Reports that Vladimir Putin had tried to hack America’s democratic process raced around the world, making newspaper front pages and setting off nonstop cable news chatter.

The story got even hotter after a hacker who called himself Guccifer 2.0 suddenly appeared. He took credit for the DNC hack, called CrowdStrike’s investigation a fraud, and began leaking select documents pilfered from the DNC—including a spreadsheet containing names and addresses of the DNC’s biggest donors. The story finally started going nuclear when WikiLeaks somehow got hold of the entire DNC email archive and began dribbling the data out to the public.

A Terrible System

CrowdStrike stuck to its guns, and other cybersecurity firms and experts likewise clamored to confirm its findings: Russia was behind the attack. Most journalists took these security savants at their word, not bothering to investigate or vet their forensic methods or look at the way CrowdStrike arrived at its conclusions. And how could they? They were the experts. If you couldn’t trust CrowdStrike and company, who could you trust?

Unfortunately, there were big problems with CrowdStrike’s account. For one thing, the names of the two Russian espionage groups that CrowdStrike supposedly caught, Cozy Bear and Fancy Bear, were a fiction. Cozy Bear and Fancy Bear are what cyber monitors call “Advanced Persistent Threats,” or APTs. When investigators analyze an intrusion, they look at the tools and methods that the hackers used to get inside: source code, language settings, compiler times, time zones, IP settings, and so on. They then compare all these things against a database of previously recorded hacks that is shared among cyber professionals. If the attack fits an old profile, they assign it to an existing APT. If they find something new, they create a group and give it an official name (say, APT911) and then a cooler moniker they can throw around in their reports (say, TrumpDump).

CrowdStrike followed the protocols for existing APTs. Its investigation of DNC servers turned up two known threat actor groups: APT28 and APT29. Depending on the cybersecurity firm doing the analysis, these two APTs have been called by all sorts of names: Pawn Storm, Sofacy, Sednit, CozyCar, The Dukes, CozyDuke, Office Monkeys. Neither of them has ever been linked by any cybersecurity firm to the Russian government with certainty. Some firms have tried—most notably FireEye, CrowdStrike’s bigger and wealthier competitor. But FireEye’s evidence was ridiculously thin and inferential—in nearly any other industry, it would have been an embarrassment. Consider, for example, FireEye’s report on APT29:

We suspect the Russian government sponsors the group because of the organizations it targets and the data it steals. Additionally, APT29 appeared to cease operations on Russian holidays, and their work hours seem to align with the UTC +3 time zone, which contains cities such as Moscow and St. Petersburg.

Or consider FireEye’s report on APT28—which, among other things, attributes this attack group to a Russian intelligence unit active in Russia’s “invasion of Georgia,” an invasion that we know never took place.

They compile malware samples with Russian language settings during working hours consistent with the time zone of Russia’s major cities, including Moscow and St. Petersburg.While we don’t have pictures of a building, personas to reveal, or a government agency to name, what we do have is evidence of long-standing, focused operations that indicate a government sponsor—specifically, a government based in Moscow.

So, FireEye knows that these two APTs are run by the Russian government because a few language settings are in Russian and because of the telltale timestamps on the hackers’ activity? First off, what kind of hacker—especially a sophisticated Russian spy hacker—keeps to standard 9-to-5 working hours and observes official state holidays? Second, just what other locations are in Moscow’s time zone and full of Russians? Let’s see: Israel, Belarus, Estonia, Latvia, Moldova, Romania, Lithuania, Ukraine. If non-Russian-speaking countries are included (after all, language settings could easily be switched as a decoy tactic), that list grows longer still: Greece, Finland, Turkey, Jordan, Lebanon, Syria, Iraq, Saudi Arabia, Somalia, Yemen, Ethiopia, Kenya—the countries go on and on.

The flimsiness of this evidence didn’t stop CrowdStrike. Its analysts matched some of the tools and methods used in the DNC hack to APT28 and APT29, slapped a couple of Russian-sounding names with “bear” in them on their report, and claimed that the FSB and GRU did it. And most journalists covering this beat ate it all up without gagging.

“You don’t know there is anybody there. It’s not like it’s a club and everyone has a membership card that says Fancy Bear on it. It’s just a made-up name for a group of attacks and techniques and technical indicators associated with these attacks,” author and cybersecurity expert Jeffrey Carr told me. “There is rarely if ever any confirmation that these groups even exist or that the claim was proven as correct.”

Carr has been in the industry a long time. During the Russia-Georgia war, he led an open-source intelligence effort—backed by Palantir—in an attempt to attribute and understand the actors behind the cyberwar. I read his reports on the conflict back then and, even though I disagreed with some of his conclusions, I found his analysis nuanced and informative. His findings at the time tracked with those of the general cybersecurity industry and bent toward implicating the Russian government in the cyber attacks on Georgia. But these days Carr has broken with the cyberworld consensus:

Any time a cyber attack occurs nowadays you have cybersecurity companies looking back and seeing a historical record and seeing assignments on responsibility and attribution and they just keep plowing ahead. Whether they are right or wrong, nobody knows, and probably will never know. That’s how it works. It’s a terrible system.

This is forensic science in reverse: first you decide on the guilty party, then you find the evidence that confirms your belief.

Not for Attribution

Over time, bad evidence was piled on top of unsubstantiated claims and giant inductive leaps of logic to the point that, if you tried to figure out what was actually happening, you’d lose all sense of direction.

Matt Tait, a former GCHQ analyst and founder of Capital Alpha Security who blogs under the influential Twitter handle @pwnallthethings, found a Word document pilfered from the DNC and leaked by Guccifer 2.0. As he examined its data signatures, he discovered that it had been edited by Felix Edmundovich—a.k.a. Felix Dzerzhinsky, founder of the Cheka. To him, it was proof that Guccifer 2.0 was part of the same Russian intelligence operation. He really believed that the super sophisticated spy group trying to hide its Russian ties would register its Microsoft Word processor in the name of the leader of the infamously brutal Soviet security service.

Meanwhile, Thomas Rid, a cyber expert based in London, drew a straight line from the DNC hacks to the attempted hacking of the Germans and TV5 to attacks on Georgia and Baltic States—even though on closer inspection none of those efforts had been linked to the Russian government.

John Podesta’s Gmail account was hacked with a rudimentary spear-phishing attack that tricked him into entering his password with a fake Google login page. His emails ended up on WikiLeaks, too. All sorts of people linked this to Russian military intelligence, with no concrete evidence to speak of.

Sensing its moment had arrived, CrowdStrike went into frenetic PR mode. The company released a series of cyber-attribution reports illustrated with sexy communist robots wearing fur hats, using visual marketing techniques in lieu of solid evidence.

After Donald Trump won the presidency, all these outlandish claims were accepted as unassailable truth. The “hacking” of the 2016 presidential election was the ultimate damning conclusion that cybersecurity experts were now working backward from. Just as Georgia’s compromised net infrastructure provided conclusive proof of Russia’s concerted plan to invade Georgia, Trump’s improbably successful presidential run demonstrated that Russian subterfuge, rather than the collapse of American political institutions, had elected a dangerous outsider president.

Watching this new round of cyber-attribution hysteria, I got a queasy feeling. Even Dmitri Alperovitch’s name sounded familiar. I looked through my notes and remembered why: he was one of the minor online voices supporting the idea that the cyber attacks against Georgia were some kind of Russian plot. Back then, he was in charge of intelligence analysis at Secure Computing Corporation, a cybersecurity company that also made censorship tools used by countries like Saudi Arabia. He was now not only running his own big shop, but also playing a central role in a dangerous geopolitical game.

In other words, the election-hacking panic was a stateside extension of the battle first joined on the ISP frontiers of the Georgia-Russia war. Impressionable journalists and Democratic party hacks who ignore this background do so at their peril—and ours.

WAPO Hires John Podesta as a Columnist, Flushing Last Remaining Credibility Down the Toilet

 john-podesta-2016-election-hillary-clinton-e1476298459966

By Lily Dane

Source: The Daily Sheeple

It’s almost like The Washington Post is trying to become as in-your-face corrupt and biased as possible and is determined to lose any shred of credibility it may have left.

Last Thursday, the paper announced that John Podesta, the scandal-plagued chairman of Hillary Clinton’s 2016 scandal-plagued presidential campaign, has joined their team:

Podesta, former chairman of the 2016 Hillary Clinton campaign, will provide commentary and analysis on the intersection of politics and policy, the Trump administration and the future of the Democratic Party.

“No one knows more about how Washington works, how the White House operates, and how policy ideas are translated into reality than John Podesta,” said Editorial Page Editor Fred Hiatt. “His long experience in Congress, inside two Democratic White Houses and on the front lines of numerous presidential campaigns, will offer readers vital insight into Washington and politics at the start of a new era.”

As of the time of this writing, there were only a few reader comments on the announcement on the news outlet’s website, but all expressed disapproval. Here is a sampling:

“I would just like to thank the Washington Post for dropping all pretense and proving they are now just as willing as Fox News to invite questionable sources to contribute.”

“A mistake. We want agents of change, not those who cling to the past. Podesta’s a proven failure and uninteresting.”

“Not a good choice. Time for new voices, come on, WaPo, you can do much better.”

“John Podesta, friend of Dennis Hastert the child molester. Many people complain the the Russians hacked the DNC, but Podesta gave them his gmail account on a silver platter. Podesta’s password was the word password, not very creative. Read his emails and you find some strange code words, lots of talk about pizza and hotdogs which has caused a buzz on the internet dubbed pizzagate. I am sure Podesta knows his way around DC, maybe the wrong parts of DC.”

“Yeah democracy among the libs is very dark. More dark is how Compost has made a deal with devil by hiring this Satanist. You will reap what you sow.”

If WAPO wanted to choose a more controversial figure to write for their outlet, it would be difficult. Podesta was the central figure of a massive email scandal in late 2016 when WikiLeaks published 58,375 emails from his private Gmail account. Many of the emails contained material regarding Clinton’s positions and campaign strategy, her collusion with the mainstream media, her cozy relationship with bankers, pay-to-play schemes, hints of Podesta’s possible involvement in a nefarious-sounding activity called “Spirit Cooking”, and of course, the infamous #Pizzagate scandal.

Earlier Democratic National Committee (DNC) email leaks exposed a plot to sabotage Bernie Sanders and documents on Hillary Clinton and the Clinton Foundation. Those leaks led to the resignation of at least four DNC officials, including former chair Debbie Wasserman Schultz. They also revealed that interim DNC chair Donna Brazile obtained questions to a Bernie Sanders vs. Hillary CNN/TV One town hall and fed them to Hillary’s campaign people in advance.

Like the DNC and Podesta, The Washington Post isn’t a stranger to scandal.

In the article LIST: Washington Post’s Josh Rogin Has a BIG Fake News Problem, John Nolte explains how Washington Post reporter Josh Rogin recently blew three major stories in grand fashion.

Last week, WAPO, owned by Jeff (Bilderberger, CIA Contractor, and owner of Amazon), stated it is their mission to “defend democracy,” and adopted a dramatic new slogan which it claims was not in any way inspired by President Trump: “Democracy Dies in Darkness”.

In January, the paper was forced to retract an unfounded story scaremongering that Russian hackers penetrated the US electric grid.

Late last year, WAPO cited a list of over 200 supposed Russian propaganda sites (The Daily Sheeple was included on the list) produced by the shadowy PropOrNot organization in a report titled, “Russian propaganda effort helped spread ‘fake news’ during election, experts say.” Melissa Dykes reported on this back in November:

Washington Post wrote a hit piece on all the sites included on ProporNot’s list, claiming the site is literally run by “experts” — without any due diligence or a shred of proof other than the site’s own claims.

Titled, “Russian propaganda effort helped spread ‘fake news’ during election, experts say,” the WAPO story not only upholds the claims of a random, anonymous, and relatively new website, but a website that is formally calling on the FBI to investigate us and other alt news sites on the list for espionage.

In early December, after facing unprecedented blowback for its ridiculous report, WAPO added a lengthy editor’s note to the top of the original article in which the editor not only distances the paper from the “experts” quoted in the original article whose “work” served as the basis for the entire article, but also admits the Post could not “vouch for the validity of PropOrNot’s finding regarding any individual media outlet.”

Podesta, his political party, and WAPO have something significant in common. All seem to be in denial about the huge mistakes they have made which greatly contributed to their loss of credibility. They will likely repeat those mistakes. Perhaps this new relationship is appropriate after all.

Oh, and a bit of friendly advice for WAPO: Be sure to give Podesta a very, very secure email account.

Twitter users had quite a bit to say about Podesta’s new job.

https://twitter.com/correctthemedia/status/834815653857095681

https://twitter.com/zachhaller/status/834855115521552384

https://twitter.com/55true4u/status/835662006879420417

https://twitter.com/HAGOODMANAUTHOR/status/835640562904506368

https://twitter.com/HAGOODMANAUTHOR/status/834927633972371456

Foxes Guard Facebook Henhouse

hqdefault

By F. William Engdahl

Source: New Eastern Outlook

The latest mantra of CIA-linked media since the “Pizzagate” leaks of data alleging that Hillary Clinton Campaign Manager John Podesta and other highly influential political persons in Washington were connected to an unusual pizza place near the White House run by a 41-year old James Achilles Alefantis called Comet Ping Pong, is the need to crack down (i.e. censorship) on what is being called “Fake News.” The latest step in this internet censorship drive is a decision by the murky social media organization called Facebook to hire special organizations to determine if Facebook messages are pushing Fake News or not. Now it comes out that the “fact check” private organizations used by Facebook are tied to the CIA and CIA-related NGO’s including George Soros’ Open Society Foundations.

In the last weeks of the US Presidential campaign, Wikileaks released a huge number of emails linked to Clinton Campaign Manager, John Podesta. The contents of thousands of emails revealed detailed exchanges between Podesta and the oddly-influential Comet Ping Pong pizza place owner, Alefantis, as well as the Clinton campaign, which held fundraisers at Comet Ping Pong.

The Pizzagate scandal exploded in the final weeks of the US campaign as teams of private researchers documented and posted Facebook, Instagram and other data suggesting that Alefantis and Comet Ping Pong were at the heart of a pedophilia ring that implicated some of the most prominent politicians in Washington and beyond.

The New York Times and Washington Post moved swiftly to assert that the Pizzagate revelations were Fake News, quoting “anonymous sources” who supposedly said the CIA “believed” Russia was behind hackers who exposed emails and documents from the Democratic National Committee (DNC) and Hillary Clinton’s campaign chair John Podesta. Former NSA senior intelligence expert William Binney claimed the Podesta and Clinton campaign data were leaked, not hacked. The NSA, he pointed out, would immediately identify a hack, especially a foreign hack, and they have remained silent.

The uncovering and release to Wikileaks of the Podesta emails were immediately blamed on Russian intelligence by the CIA, and now by the US President, with not a shred of proof, and despite the fact that NSA. Wikipedia, whose content is often manipulated by US intelligence agencies, rapidly posted a page with the curious title, “Pizzagate (Conspiracy Theory).”

To make certain the neutral interested reader gets the message, the first line reads, “Pizzagate is a debunked conspiracy theory which emerged during the 2016 United States presidential election cycle, alleging that John Podesta’s emails, which were leaked by WikiLeaks, contain coded messages referring to human trafficking, and connecting a number of pizzerias in Washington, D.C. and members of the Democratic Party to a child-sex ring.”

‘Fake News’ Mantra Begins

My purpose in mentioning Pizzagate details is not to demonstrate the authenticity of the Pizzagate allegations. That others are doing with far more resources. Rather, it is to point out the time synchronicity of the explosive Pizzagate email releases by Julian Assange’s Wikileaks web blog, with the launch of a massive mainstream media and political campaign against what is now being called “Fake News.”

The cited New York Times article that Wikipedia cites as “debunking” the Pizzagate allegations states, “None of it was true. While Mr. Alefantis has some prominent Democratic friends in Washington and was a supporter of Mrs. Clinton, he has never met her, does not sell or abuse children, and is not being investigated by law enforcement for any of these claims. He and his 40 employees had unwittingly become real people caught in the middle of a storm of fake news.” The article contains not one concrete proof that the allegations are false, merely quoting Alefantis as the poor victim of malicious Fake News.

That New York Times story was accompanied by a series of articles such as “How Fake News Goes Viral: A Case Study.” Another headline reads, “Obama, With Angela Merkel in Berlin, Assails Spread of Fake News.” Then on November 19, strong Clinton supporter, Facebook billionaire Mark Zuckerberg is quoted in a prominent article titled, “Facebook Considering Ways to Combat Fake News, Mark Zuckerberg Says.”

Facebook uses CIA Censors

Zuckerberg, CEO and founder of the world-leading social media site, Facebook.com, the world’s 5th wealthiest man at an estimated $50 billion, has now established a network of “Third Party Fact Checkers” whose job is to red flag any Facebook message of the estimated one billion people using the site, with a prominent warning that reads, “Disputed by Third-Party Fact Checkers.”

Facebook has announced that it is taking its censorship ques from something called The International Fact-Checking Network (IFCN). This IFCN, a new creation, has drafted a code of five principles for news websites to accept, and Facebook will work with “third-party fact checking organizations” that are signatories to that code of principles.

If we search under the name International Fact-Checking Network, we find ourselves at the homepage of something called the Poynter Institute for Media Studies in St. Petersburg, Florida.

OK. If we look a bit deeper we find that the Poynter Institute’s International Fact-Checking Network in turn, as its website states, gets money from the Bill & Melinda Gates Foundation, Google, the National Endowment for Democracy, the Omidyar Network, the Open Society Foundations of George Soros.

Oh my, oh my! Bill & Melinda Gates Foundation who partners with Soros in numerous nasty projects such as convincing African countries to accept Genetically Modified or GMO seeds? Google, whose origins date back to funding by the CIA and NSA as what intelligence researcher Nafeez Ahmed describes as a “plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority‘ “?

The Omidyar Foundation is the foundation of eBay founder and multi billionaire, Pierre Omidyar, which finances among other projects the online digital publication, The Intercept, launched in 2014 by Glenn Greenwald, Laura Poitras and Jeremy Scahill.

And the National Endowment for Democracy (NED), the US Government-financed “private” NGO behind every Color Revolution CIA regime change from the Ukraine Color Revolutions to the Arab Spring? The NED was a CIA project created in the 1980’s during the Reagan Administration as part of privatizing US intelligence dirty operations, to do, as Allen Weinstein, who drafted the Congressional legislation to establish the NED, noted in a candid 1991 Washington Post interview, “A lot of what we do today was done covertly 25 years ago by the CIA.”

And if we dig even deeper we find, lo and behold, the name George Soros, convicted hedge fund insider trader, tax-exempt philanthropist and giga-billionaire who seems to fund not only Hillary Clinton and virtually every CIA and US State Department Color Revolution from Russia to China to Iran through his network of Open Society Foundations including the 1990’s Jeffrey Sachs Shock Therapy plunder of Russia and most of former Communist East Europe.

Another one of the media working with Zuckerberg’s Facebook censorship of Fake News is the Washington Post, today owned by Amazon billionaire founder Jeff Bezos. Bezos is a major media business partner of….The US Central Intelligence Agency, a fact he omitted to inform about after taking over ownership of the most important newspaper in Washington.

Bezos’ Washington Post recently published a bizarre list of 200 websites it claimed generated Fake News. It refused to identify who gave them the list. Veteran Washington investigative reporter, Wayne Madsen, exposed the source of the McCarthy-style taboo list of so-called Fake News. It was a “website called PropOrNot.com that has links to the CIA and George Soros.”

It’s not merely the Pizzagate revelations that have triggered such a massive attack on independent Internet websites. It seems that back in January 2014 at the Davos World Economic Forum control of information on the Internet was a top item of discussion. At the time, Madsen noted, “With the impending demise of World Wide Web ‘net neutrality,’ which has afforded equal access for website operators to the Internet, the one percent of billionaire investors are busy positioning themselves to take over total control of news reporting on the Internet.”

It’s not even the foxes who are guarding the Internet Henhouse. It’s the werewolves of CIA and US Government censorship. Whether the explosive Pizzagate Podesta revelations merely triggered a dramatic acceleration in the timetable for the CIA’s planned “Fake News” operation as the successor to their 1980’s “Conspiracy Theory” linguistic discrediting operation, it’s clear this is no unbiased, objective, transparent public service to protect the Internet public from harmful content.

And, besides, who are they to tell me or you what you are allowed to read, digest and form your independent ideas about? This is a 21st Century reincarnation of the Spanish Inquisition, one by the real fake newsmakers–Washington Post, AP, ABCNews, Snopes.com, FactCheck.org, the CIA and friends. I would say it’s an alarming development of cyber warfare, not by Russia, but by those CIA-run networks that are fomenting Fake News to demonize any and everyone who opposes Washington intelligence propaganda.

 

F. William Engdahl is strategic risk consultant and lecturer, he holds a degree in politics from Princeton University and is a best-selling author on oil and geopolitics, exclusively for the online magazine “New Eastern Outlook.” 

 

Understanding Evil: From Globalism To Pizzagate

2350633195_d69a16ab76

By Brandon Smith

Source: Alt-Market.com

I have spent the better part of the last 10 years working diligently to investigate and relate information on economics and geopolitical discourse for the liberty movement. However, long before I delved into these subjects my primary interests of study were the human mind and the human “soul” (yes, I’m using a spiritual term).

My fascination with economics and sociopolitical events has always been rooted in the human element. That is to say, while economics is often treated as a mathematical and statistical field, it is also driven by psychology. To know the behavior of man is to know the future of all his endeavors, good or evil.

Evil is what we are specifically here to discuss. I have touched on the issue in various articles in the past including Are Globalists Evil Or Just Misunderstood, but with extreme tensions taking shape this year in light of the U.S. election as well as the exploding online community investigation of “Pizzagate,” I am compelled to examine it once again.

I will not be grappling with this issue from a particularly religious perspective. Evil applies to everyone regardless of their belief system, or even their lack of belief. Evil is secular in its influence.

The first and most important thing to understand is this — evil is NOT simply a social or religious construct, it is an inherent element of the human psyche. Carl Gustav Jung was one of the few psychologists in history to dare write extensively on the issue of evil from a scientific perspective as well as a metaphysical perspective.  I highly recommend a book of his collected works on this subject titled ‘Jung On Evil’, edited by Murray Stein, for those who are interested in a deeper view.

To summarize, Jung found that much of the foundations of human behavior are rooted in inborn psychological contents or “archetypes.”  Contrary to the position of Sigmund Freud, Jung argued that while our environment may affect our behavior to a certain extent, it does not make us who we are. Rather, we are born with our own individual personality and grow into our inherent characteristics over time. Jung also found that there are universally present elements of human psychology. That is to say, almost every human being on the planet shares certain truths and certain natural predilections.

The concepts of good and evil, moral and immoral, are present in us from birth and are mostly the same regardless of where we are born, what time in history we are born and to what culture we are born. Good and evil are shared subjective experiences.  It is this observable psychological fact (among others) that leads me to believe in the idea of a creative design — a god.  Again, though, elaborating on god is beyond the scope of this article.

To me, this should be rather comforting to people, even atheists.  For if there is observable evidence of creative design, then it would follow that there may very well be a reason for all the trials and horrors that we experience as a species.  Our lives, our failures and our accomplishments are not random and meaningless.  We are striving toward something, whether we recognize it or not.  It may be beyond our comprehension at this time, but it is there.

Evil does not exist in a vacuum; with evil there is always good, if one looks for it in the right places.

Most people are readily equipped to recognize evil when they see it directly.  What they are not equipped for and must learn from environment is how to recognize evil disguised as righteousness.  The most heinous acts in history are almost always presented as a moral obligation — a path towards some “greater good.”  Inherent conscience, though, IS the greater good, and any ideology that steps away from the boundaries of conscience will inevitably lead to disaster.

The concept of globalism is one of these ideologies that crosses the line of conscience and pontificates to us about a “superior method” of living.  It relies on taboo, rather than moral compass, and there is a big difference between the two.

When we pursue a “greater good” as individuals or as a society, the means are just as vital as the ends.  The ends NEVER justify the means.  Never.  For if we abandon our core principles and commit atrocities in the name of “peace,” safety or survival, then we have forsaken the very things which make us worthy of peace and safety and survival.  A monster that devours in the name of peace is still a monster.

Globalism tells us that the collective is more important than the individual, that the individual owes society a debt and that fealty to society in every respect is the payment for that debt.  But inherent archetypes and conscience tell us differently.  They tell us that society is only ever as healthy as the individuals within it, that society is only as free and vibrant as the participants.  As the individual is demeaned and enslaved, the collective crumbles into mediocrity.

Globalism also tells us that humanity’s greatest potential cannot be reached without collectivism and centralization.  The assertion is that the more single-minded a society is in its pursuits the more likely it is to effectively achieve its goals.  To this end, globalism seeks to erase all sovereignty. For now its proponents claim they only wish to remove nations and borders from the social equation, but such collectivism never stops there.  Eventually, they will tell us that individualism represents another nefarious “border” that prevents the group from becoming fully realized.

At the heart of collectivism is the idea that human beings are “blank slates;” that we are born empty and are completely dependent on our environment in order to learn what is right and wrong and how to be good people or good citizens.  The environment becomes the arbiter of decency, rather than conscience, and whoever controls the environment, by extension, becomes god.

If the masses are convinced of this narrative then moral relativity is only a short step away. It is the abandonment of inborn conscience that ultimately results in evil. In my view, this is exactly why the so called “elites” are pressing for globalism in the first place. Their end game is not just centralization of all power into a one world edifice, but the suppression and eradication of conscience, and thus, all that is good.

To see where this leads we must look at the behaviors of the elites themselves, which brings us to “Pizzagate.”

The exposure by Wikileaks during the election cycle of what appear to be coded emails sent between John Podesta and friends has created a burning undercurrent in the alternative media. The emails consistently use odd and out of context “pizza” references, and independent investigations have discovered a wide array connections between political elites like Hillary Clinton and John Podesta to James Alefantis, the owner of a pizza parlor in Washington D.C. called Comet Ping Pong. Alefantis, for reasons that make little sense to me, is listed as number 49 on GQ’s Most Powerful People In Washington list.

The assertion according to circumstantial evidence including the disturbing child and cannibalism artwork collections of the Podestas has been that Comet Ping Pong is somehow at the center of a child pedophilia network serving the politically connected. Both Comet Ping Pong and a pizza establishment two doors down called Besta Pizza use symbols in their logos and menus that are listed on the FBI’s unclassified documentation on pedophilia symbolism, which does not help matters.

Some of the best documentation of the Pizzagate scandal that I have seen so far has been done by David Seaman, a former mainstream journalist gone rogue. Here is his YouTube page.

I do recommend everyone at least look at the evidence he and others present. I went into the issue rather skeptical, but was surprised by the sheer amount of weirdness and evidence regarding Comet Pizza.  There is a problem with Pizzagate that is difficult to overcome, however; namely the fact that to my knowledge no victims have come forward.  This is not to say there has been no crime, but anyone hoping to convince the general public of wrong-doing in this kind of scenario is going to have a very hard time without a victim to reference.

The problem is doubly difficult now that an armed man was arrested on the premises of Comet Ping Pong while “researching” the claims of child trafficking.  Undoubtedly, the mainstream media will declare the very investigation “dangerous conspiracy theory.”  Whether this will persuade the public to ignore it, or compel them to look into it, remains to be seen.

I fully realize the amount of confusion surrounding Pizzagate and the assertions by some that it is a “pysop” designed to undermine the alternative media.  This is a foolish notion, in my view.  The mainstream media is dying, this is unavoidable.  The alternative media is a network of sources based on the power of choice and cemented in the concept of investigative research.  The reader participates in the alternative media by learning all available information and positions and deciding for himself what is the most valid conclusion, if there is any conclusion to be had.  The mainstream media simply tells its readers what to think and feel based on cherry picked data.

The elites will never be able to deconstruct that kind of movement with something like a faked “pizzagate”; rather, they would be more inclined to try to co-opt and direct the alternative media as they do most institutions.  And, if elitists are using Pizzagate as fodder to trick the alternative media into looking ridiculous, then why allow elitist run social media outlets like Facebook and Reddit to shut down discussion on the issue?

The reason I am more convinced than skeptical at this stage is because this has happened before; and in past scandals of pedophilia in Washington and other political hotbeds, some victims DID come forward.

I would first reference the events of the Franklin Scandal between 1988 and 1991. The Discovery Channel even produced a documentary on it complete with interviews of alleged child victims peddled to Washington elites for the purpose of favors and blackmail.  Meant to air in 1994, the documentary was quashed before it was ever shown to the public. The only reason it can now be found is because an original copy was released without permission by parties unknown.

I would also reference the highly evidenced Westminster Pedophile Ring in the U.K., in which the U.K. government lost or destroyed at least 114 files related to the investigation.

Finally, it is disconcerting to me that the criminal enterprises of former Bear Sterns financier and convicted pedophile Jeffrey Epstein and his “Lolita Express” are mainstream knowledge, yet the public remains largely oblivious.  Bill Clinton is shown on flight logs to have flown on Epstein’s private jet at least a 26 times; the same jet that he used to procure child victims as young as 12 to entertain celebrities and billionaires on his 72 acre island called “Little Saint James”.  The fact that Donald Trump was also close friends with Epstein should raise some eyebrows – funny how the mainstream media attacked Trump on every cosmetic issue under the sun but for some reason backed away from pursuing the Epstein angle.

Where is the vast federal investigation into the people who frequented Epstein’s wretched parties?  There is none, and Epstein, though convicted of molesting a 14 year old girl and selling her into prostitution, was only slapped on the wrist with a 13 month sentence.

Accusations of pedophilia seem to follow the globalists and elitist politicians wherever they go. This does not surprise me. They often exhibit characteristics of narcissism and psychopathy, but their ideology of moral relativity is what would lead to such horrible crimes.

Evil often stems from people who are empty. When one abandons conscience, one also in many respects abandons empathy and love.  Without these elements of our psyche there is no happiness. Without them, there is nothing left but desire and gluttony.

Narcissists in particular are prone to use other people as forms of entertainment and fulfillment without concern for their humanity.  They can be vicious in nature, and when taken to the level of psychopathy, they are prone to target and abuse the most helpless of victims in order to generate a feeling of personal power.

Add in sexual addiction and aggression and narcissists become predatory in the extreme. Nothing ever truly satisfies them. When they grow tired of the normal, they quickly turn to the abnormal and eventually the criminal.  I would say that pedophilia is a natural progression of the elitist mindset; for children are the easiest and most innocent victim source, not to mention the most aberrant and forbidden, and thus the most desirable for a psychopathic deviant embracing evil impulses.

Beyond this is the even more disturbing prospect of cultism. It is not that the globalists are simply evil as individuals; if that were the case then they would present far less of a threat. The greater terror is that they are also organized. When one confronts the problem of evil head on, one quickly realizes that evil is within us all. There will always be an internal battle in every individual. Organized evil, though, is in fact the ultimate danger, and it is organized evil that must be eradicated.

For organized evil to be defeated, there must be organized good. I believe the liberty movement in particular is that good; existing in early stages, not yet complete, but good none the less.  Our championing of the non-aggression principle and individual liberty is conducive to respect for privacy, property and life.  Conscience is a core tenet of the liberty ideal, and the exact counter to organized elitism based on moral relativity.

Recognize and take solace that though we live in dark times, and evil men roam free, we are also here. We are the proper response to evil, and we have been placed here at this time for a reason. Call it fate, call it destiny, call it coincidence, call it god, call it whatever you want, but the answer to evil is us.

The Top 10 Most Damaging WikiLeaks (so far)

57e27123c3618807398b4687

From MostDamagingWikileaks.com

1. Obama lied: he knew about Hillary’s secret server and wrote to her using a pseudonym, cover-up happened (intent to destroy evidence)

  • I cannot state how huge this is, it’s a cover-up involving the President of the United States. There are a lot of emails implying this, but this email states it very clearly so anyone can understand.  The email proves obstruction of justice and shows how they lied to the FBI, and likely perjury of Congress. This at the very least proves intent by her Chief of Staff.

  • Obama used executive privilege in their correspondence. Cheryl Mills (who was given immunity) states they need to “clean up” the Clinton/Obama e-mails because they lacked state.gov.

  • Additionally, Obama on video publicly denied knowing about the server. He also claimed on video that he learned about the secret server through the news like everyone else. The corruption goes all the way to the top! Obama is lying to the American public.

  • Hillary Clinton set up her private server to hide her pay to play deals discovered throughout these leaks, and to prevent FOIA (Freedom of Information Act) requests.

  • Paul Combetta was hired to modify the email headers that referred to a VERY VERY VIP individual, i.e. change the name of who it was from. If you read Stonetear/Combetta story, it’s easy to see this is exactly what he was attempting. He wanted to change header information on already sent mail to show “state.gov” instead of Hillary’s private email address. Multiple people informed him of the infeasibility (and illegality) of it, so somewhere in the next 6 days, it was decided that simply eradicating them was the only option left.

  • The FBI said they could find no intent to break the law, therefore no recommendation of prosecution.  This email proves, in plain language, that there was intention, and knowingly broke the law.

  • Ask yourselves: Why would they both be communicating on a secret server to each other? Why not through normal proper channels? What were they hiding? We may soon find out.

 

2. Hillary Clinton dreams of completely “open borders”

  • This was stated at one of her $225,000 paid secret speeches to Wall Street that she has tried desperately to hide. This email contains those speeches in those attachments.

  • Border protection is important. Borders add safety and sovereignty to a country. Borders help prevent illegal immigration, which limits crime, drugs, human/sex trafficking across the border and allows more Americans (including African Americans and Latinos) to get jobs. It also costs the working class an exorbitant amount of money in higher taxes and leads to higher national debt. Mexico protects their southern border (with the help of $75 million from Obama).

  • During the 3rd debate, Hillary tried to pivot away from this damning topic by stating she only meant energy. Read the quote for yourself, energy is just one aspect of her open borders policy.

 

3. Hillary Clinton received money from and supported nations that she KNEW funded ISIS and terrorists

  • Hillary’s Chief of Staff admits in the 2nd link that foreign interests sway Hillary to do what they want her to do (money for mandatory appearances).  She also admits that the “Friend of Hillary” list is available and rentable to people who want to influence, but that it’s too sensitive to talk in email.

  • This leak shows Hillary knows Saudis and Qatar are funding ISIS, which is an enemy of the state.  After knowing this, Hillary accepted tens of millions in donations from these terrorist-funding governments (of course they are getting something back in return). She also supported arms deals to them.

  • Saudi Arabia and Qatar commit horrible acts under Sharia law, including throwing gay people off of buildings, persecuting Christians, Jews, and atheists, and making it legal to rape and beat women. They are the leading funders of Hillary and her campaign through the Clinton Foundation.

 

4. Hillary has public positions on policy and her private ones

  • https://wikileaks.org/podesta-emails/emailid/927

  • “But If Everybody’s Watching, You Know, All Of The Back Room Discussions And The Deals, You Know, Then People Get A Little Nervous, To Say The Least. So, You Need Both A Public And A Private Position.”

  • This leak is a big one because anything she tells us that she will do can and should be considered questionable. Whenever Hillary tells the public a position, a goal, or what she will do for America, there is no way we can be sure if she has an opposite, private position.

  • This was one of her private paid $225,000 speeches to Wall Street. Behind closed doors she is telling her Wall Street donors one thing, and the American people another thing.  Think about that for a moment…

 

5. Paying people to incite violence and unrest at Trump rallies

  • https://wikileaks.org/podesta-emails/emailid/3833

  • https://wikileaks.org/podesta-emails/emailid/31335

  • “Engage immigrant rights organizations. DREAMers have been bird dogging Republican presidential candidates on DACA/DAPA, but they’ve learned to respond. There’s an opportunity to bird dog and record questions about Trump’s comments and connect it to the policy.”

  • “It doesn’t matter what the friggin’ legal and ethics people say, we need to win this motherfucker” (from video below)

  • “I mean honestly, it is not hard to get some of these ass holes to pop off, it’s a matter of showing up, to want to get into the rally, in a Planned Parenthood t-shirt. Or, Trump is a Nazi, you know? You can message to draw them out, and draw them to punch you.”

  • This video is the proof, please watch it!

  • “Bird-dogging” is a term coined by high level Clinton staffers who openly talk about it in the video.  They boast about inciting violence at Trump rallies, paying for every “protest”, manipulating Americans through the media to think that Trump is dangerous, and tricking people into thinking Trump supporters are violent and bad.

  • They laugh about paying off mentally ill and homeless people for years to incite violence against conservatives.  Truly despicable.  And they pretended to be Bernie supporters while they were “protesting”.

  • They admit to starting the Chicago riot where police were seriously hurt, and admit to shutting down the freeway in Arizona, partnering with Black Lives Matter. We even have proof that Hillary paid people to shut down the Chicago rally.

  • Inciting a riot is illegal under 18 US Code § 2102.

  • They also think 50% of people in Iowa and Wisconsin are racists, as they state in the video.

  • Robby Mook, Clinton Campaign Manager, mentions the Priorities SuperPAC in a leak, which is implicated in the video.

  • Bob Creamer (who was fired) claims in the video that the campaign knew about everything.  Bob Creamer visited the White House 340 times and personally met with Obama 45 times.

 

6. Hillary’s campaign wants “unaware” and “compliant” citizens

  • https://wikileaks.org/podesta-emails/emailid/3599

  • “And as I’ve mentioned, we’ve all been quite content to demean government, drop civics and in general conspire to produce an unaware and compliant citizenry. The unawareness remains strong but compliance is obviously fading rapidly. This problem demands some serious, serious thinking – and not just poll driven, demographically-inspired messaging.”

  • The Clinton campaign is literally conspiring to keep the population unaware of what is going on, and they admitted it in this email. Very scary ‘1984’ level thinking (group-think). If Hillary is the right choice for president and the truth is on her side, they should encourage their supporters to be aware and do research on both candidates.

  • Watch this video about it.

 

7. Top Hillary aides mock Catholics for their faith

  • Top Clinton aides, John Halpin and Jennifer Palmieri mock Catholics for their faith. They complain about the large number of Catholics in prominent positions.

  • This was one of the few emails to actually make it to the mainstream media (FOX) and Palmieri when confronted about this revelation didn’t apologize.

  • Brian Burch, CatholicVote.org president released a statement proclaiming, “Hillary Clinton has already called half of her opponents’ supporters ‘a basket of deplorables’ and ‘irredeemable,’ and now it comes out that her campaign spokeswoman dismissively question[ed] the sincerity of Catholic Americans’ faith. Had Palmieri spoken this way about other groups, she [would be] dismissed. Palmieri must resign immediately or be fired.”

  • This revelation was brought up at the Al Smith dinner for Catholics.

 

8. Hillary deleted her incriminating emails. State covered it up. Asked about using White House executive privilege to hide from Congress.

  • https://wikileaks.org/podesta-emails/emailid/9272#efmBI2BOJ

  • https://wikileaks.org/podesta-emails/emailid/9545

  • https://wikileaks.org/podesta-emails/emailid/34370

  • https://wikileaks.org/podesta-emails/emailid/32007

  • “They do not plan to release anything publicly, so no posting online or anything public-facing, just to the committee.”

  • “That of course includes the emails Sid turned over that HRC didn’t, which will make clear to them that she didn’t have them in the first place, deleted them, or didn’t turn them over. It also includes emails that HRC had that Sid didn’t.”

  • “Think we should hold emails to and from potus? That’s the heart of his exec privilege. We could get them to ask for that. They may not care, but I seems like they will.”

  • “We brought up the existence of emails in reserach this summer but were told that everything was taken care of.”

  • “That of course includes the emails Sid turned over that HRC didn’t, which will make clear to them that she didn’t have them in the first place, deleted them, or didn’t turn them over.”

  • The State Department was:

    • (1) Coordinating with the Clinton political campaign.

    • (2) Colluding with the press to spin it positively.

    • (3) Doing so BEFORE they released it to AN EQUAL BRANCH OF GOVERNMENT. The Clinton campaign was always a step ahead of the committee investigating them. Shameful.

  • Nick states “Just spoke to State” He goes on to reveal that State colluded with him about which emails are being revealed to committee and that the State plans to plant a story with AP.

  • Shows intent to withhold emails from the subpoena.

 

9. Bribery: King of Morocco gave Clinton Foundation $12 million for a meeting with Hillary, 6 months later Morocco gets weapons

  • This is AFTER her candidacy announcement!

  • Very important e-mail in that it demonstrates Hillary’s poor judgement (her idea) in the face of influence money and foreshadows how a Clinton Administration would be indebted to bad actors and criminal regimes.

  • The “same issues we discussed” mentioned by Robbie Mook in this email is a veiled reference to Morocco’s many human rights abuses.

  • Her campaign staff is rightly concerned about the optics of the Clinton Foundation/Clinton Global Initiative accepting huge sums of money from a regime that so frequently violates international law and acts in a way that you’d expect the Clinton Foundation to publicly rebuke.

  • It seems $12 million is just too much money to allow morals, ethics, and the best interests and values of American citizens to intervene.

  • The Intercept explores how Morocco is exploiting Hillary’s weakness for huge donations, and her desire to be President, to support their own geopolitical interests.

 

10. “Spirit Cooking” (Warning: satanic/extremely graphic)

  • The email is from Marina Abramovic and John Podesta’s brother Tony, asking John to come “to the Spirit Cooking dinner”. It is safe to assume that John knows who Marina Abramovic is, as his brother refers to only her first name. John also invited Marina Abramovic to Hillary’s campaign launch.

  • Here’s where it gets graphic: Marina Abramovic has a webpage that shows the graphical book she created, which goes over what “Spirit Cooking” is.

  • And here is a video on what Spirit Cooking actually is.  Not for the faint of heart (satanic/occult).  Hillary’s team (potential future leaders of our country) are into some really messed up stuff.

  • Note: they will try to claim it is just “art” but than the invitation for “Spirit Cooking dinner” would seem out of place. Additionally, she also had a Reddit AMA (Ask Me Anything) where she states, “If you are doing the occult magic in the context of art or in a gallery, then it is the art. If you are doing it in different context, in spiritual circles or private house or on TV shows, it is not art.”

  • Abramovic’s Twitter username is AbramovicM666 as well.

  • There are photos of her cradling a decapitated goat head, and that is on the tame side considering her other actions.

  • At a Hillary concert, Jay Z (a Hillary endorser) has been photographed with the Spirit Cooker herself, who appears to be motivating him before the concert.

  • Here is Lady Gaga (a Hillary endorser) in an EXTREMELY graphic photo with Abramovic participating in a Spirit Cooking dinner.

  • Is Hillary involved with these satanic rituals? All we know is that in recently released State Department emails, Hillary asks if Marina is coming to an event. The Clinton Foundation gave $10,000 (p. 66) to Marina Abramovic.  According to CNN, Hillary has been written about participating in rituals to contact dead people such as Eleanor Roosevelt and Mahatma Gandhi. Bill Clinton’s book describes how he and Hillary would partake in voodoo rituals in Haiti. Hillary’s mentor is Saul Alinski, who praises Lucifer in his book Rules for Radicals. No concrete evidence, just circumstantial.

  • John Podesta also has incredibly deranged artwork inside his house as documented by the Washington Post.  Once this Spirit Cooking story broke, it sppread like wildfire over social media, and the Washington Post (who has been proven in the leaks to be in Hillary’s pocket) deleted the art

  • This video sums up this incredibly bizarre and disturbing story.  This picture includes even more info.

Pizzagate Update 11/22: Does Norway Pedo Ring Bust Have Clinton Connections?

12592374_1071945539495049_6906094024427978920_n-0

Last Sunday, as reported by the Associated Press and a variety of both independent and corporate news sources, a large pedophile ring involving 51 people was busted in Norway, leading to the arrest of 20 people, three convictions and a search for the others in different parts of the country. One of the most detailed reports so far came from Turkey’s Daily Sabah, reposted below:

Norway launches probe on pedophile network involving 51 people, 20 arrested

By DAILY SABAH WITH ASSOCIATED PRESS

Norwegian police said on Sunday they are investigating a grotesque pedophilia ring suspected of involvement in the abuse of at least 51 people, which includes the abuse of infants and at least one case of a suspect acknowledging abusing his own children. The latest incident is considered one of the largest child sexual abuse cases in the country’s history.

Deputy Police Chief Gunnar Floystad said that in they have arrested 20 men so far, with three convictions, in western Norway. The 31 other suspects are from other regions in Norway. Those facing charges are to receive a maximum penalty of up to 15 years in prison.

Floystad told reporters Sunday that many of the suspects are highly educated, and include lawyers and politicians. Two current or former elected officials, one teacher and a lawyer are allegedly among the accused. He said he could not reveal more details pending the conclusion of the investigation, known as “Dark Room,” which began in 2015. Prosecutors said the perpetrators met in the dark web, using encryption and anonymity to hide their tracks.

“We have the clear perception that like-minded individuals met with each other in the so-called dark net, where they could talk with one another and cultivate their interest in children in peace,” Hilde Reikrås, the head of Operation Dark Room, said at a press conference on Sunday, the Local Norway reported.

“There are several highly educated [individuals] with high IT skills. They’ve used encryption and anonymity to hide their tracks,” head police prosecutor Janne Ringset Heltne said at the Sunday press conference, adding that all of the perpetrators involved are allegedly men.

“The material shows the abuse of children of all ages, including infants,” Reikrås said. She also gave examples of the scope of the horrific abuse.

Coincidentally (or perhaps not), on the same day this story broke, another story involving Norway was widely reported among mostly independent and alternative sites. The following example is from The Daily Caller:

Norway Donations To Clinton Foundation To Fall Nearly 90% Off Peak

By Chuck Ross                                                     9:39 AM 11/20/2016

The Norwegian government’s planned contribution to the Clinton Foundation next year will be nearly 90 percent off its peak, news outlets in Norway are reporting.

Norway will donate 35.9 million kroner this year — or around $5.1 million — to the Clinton Health Access Initiative, a subsidiary of the Clinton Foundation, according to the Norwegian news outlet, Hegnar.

The Scandinavian nation will slash its donations by 36 percent next year to 23 million kroner. That marks a 87 percent decline from the 2015 peak.

The drastic cut could be a signal that other longtime Clinton Foundation donors will reduce donations in the wake of Hillary Clinton’s presidential loss.

Hegnar reported that Norway gave an average of 40 million kroner each year between 2007 and 2013. That jumped to 129 million kroner in 2014 and 174 million kroner — or $25 million — last year.

Norway’s ministry of foreign affairs said that it has not renewed pledges it had with the Clinton Foundation which ended in 2015.

“Norway has signed several agreements which aimed to help reduce maternal and child mortality in countries with high mortality burden to ensure progress on the [Millennium Development Goals],” Guri Solberg, the communications adviser for the Ministry of Foreign Affairs, told Finansavisen.

“Most of the agreements expired in 2015, in parallel with completion of the [Millennium Development Goals]. This is why the payments were particularly high in 2014 and 2015.”

Of course the reasoning behind this decision could be based on Clinton’s defeat and fears that the Trump administration might possibly investigate the pay-to-play scandal, but the timing coinciding with the pedophile bust is suspicious. What if, rather than being an outcome of Clinton’s defeat, the recent news from Norway are late-breaking indicators of what may have caused her defeat?

It’s no longer a secret that the U.S. electoral system is highly corrupt and susceptible to tampering. Both major parties are reluctant to change the status quo because both take advantage of it in varying degrees to retain a duopoly and for greater control over primary, general and local elections. The Trump victory was an anomaly because he didn’t seem to have support from the Republican establishment while Clinton had the backing of the neocons and the majority of corporate interests. Clinton was primed to win, and the fact that she didn’t (and is not directly challenging the results) is reasonable cause to suspect she may have been forced to stand down. The fact that earlier today Trump announced he would not be investigating Clinton gives further credence to the notion she was offered a “deal” (or ultimatum) by higher-ups.

Given what we’ve learned already from the Podesta emails, it’s not beyond the realm of possibility that powerful elites in the U.S. had strong motivation to prevent four years of Clinton and Podesta in the spotlight. Any political figure connected to pedophilia, human trafficking or a host of other crimes can be easily controlled and manipulated through blackmail, but once the secret gets out they’re no longer effective salespuppets. Meanwhile, elites in Norway could be attempting to distance themselves from the Clinton Foundation for the same reasons. More information is needed to solidify this possible connection which is why the ongoing open-source investigation by multiple internet communities is essential.

 

Updates from DC Pizzagate:

UPDATE 11/21 – SMOKING GUN FOUND. Anonymous member 0hour found multiple Twitter accounts with ACTUAL child porn posted. Please remember that Twitter has banned people like Milo for ‘saying mean things’, yet somehow these accounts remained. Before being banned, 0hour had linked to one username saying it was an FBI account. People in the comments confirmed there was a baby with an adult male penis being inserted into its mouth and other videos. The account was eventually suspended. People ended up finding 100’s of pedophile/child porn accounts by looking through the followers of the username 0hour posted. THANK YOU FOR YOUR SERVICE 0HOUR!

I also read that 2GB of child porn was obtained by Anon from WeThePizza’s website. I have not seen confirmation of this yet, though. Quite frankly, I hope not to. This entire experience has shaken me to the core.

If you would like further information, please visit

 https://www.reddit.com/r/pizzagate/comments/5da0kp/comet_ping_pong_pizzagate_summary/

for a comprehensive review of connections and links by this amazing, now international crowd-sourced investigation.

20:46 Update 11/21 DON’T WORRY FOLKS, NYTIMES SAYS IT’S FAKE AND WE SHOULD FEEL BAD FOR THE PEDOS https://www.google.com/amp/mobile.nytimes.com/2016/11/21/technology/fact-check-this-pizzeria-is-not-a-child-trafficking-site.amp.html?client=safari

UPDATE 11/22 – The powers that be just shut down the sub Reddit r/pizzagate, but they let r/pedofriends exist. THINK ABOUT THAT FOR A MINUTE. 1984 is real, folks. Deleting subreddits and 4chan threads surely just SCREAMS innocent, right?? They claimed our crowd-sourced investigation is a “witch hunt”. LOL at admitting your Satanists. It’s not OUR fault Alefantis post incriminating photos sexualizing infants to the internet publicly. Too many mothers, fathers, and concerned citizens have seen the pictures to just let this all go as “fake news”.

UPDATE 11/23 – We are being bombarded by trolls continually gaslighting the accounts talking about PizzaGate online. Who pays these people? Only ad hominem attacks, nothing of real merit. Trust me, I do NOT want all this to be true, but until someone can explain the code talk, the Instagram pictures, the bands and businesses with all the pedophile symbols, I have to assume this is AT MINIMUM very important to look into. I keep reading the same robotic talking points, “This is a 4chan hoax!”. In response, I say Wikileaks emails are 100% accurate. The screenshots of James Alefantis’ Instagram are 100% genuine (I saw them personally before he went private). All other information is available online to confirm for yourself, please DO YOUR RESEARCH BEFORE SPREADING DISINFORMATION THAT THIS BLOG CONTAINS FAKE NEWS. The only thing I can not 100% verify the source from is the Obama picture. Some Anon posted it on 4chan and I haven’t seen any other sites reference it. Was it FBIAnon helping us out?

And if you still are not convinced, I challenge you to do your own fact checking and research. Basically the connections are so vast, there is no way to accurately summarize it in an essay meant to capture the immediate attention of the public. FBIAnon was right… It is like a spiderweb; it connects to powerful people not just around America but around the entire globe. Norway and Australia both recently exposed pedophile rings in high places. Soon it will be our turn to finally bring justice to some of the most heinous of crimes (and I use justice loosely, because there is NOTHING that will ever help these poor children to live a normal life after what they’ve been exposed to).

UPDATE 11/24 – Reddit CEO, username spez, admits to EDITING user comments without admin permission. Suspected Media Matters (connected to Alefantis’ ex-lover David Brock) disinformation talking points identified and seem to be taken straight from Saul Alinsky’s playbook which is dedicated to Lucifer:

  1. Accuse the accusers of what you are guilty of
  2. Gaslighting (making one question one’s sanity)
  3. Discredit source: 4chan hoax, autistic troll, obsessed with pedophiles, conspiracy theorist, alt-right, internet sleuths, psyop to false flag for fake news suppression etc.
  4. Do not acknowledge evidence, EVER
  5. THEY JUST LIKE PIZZA OKAY?

Please take this knowledge with you when on social media. Do not engage the trolls – just block them, otherwise they SUCCEED BY DISTRACTING YOU FROM INFORMING REAL PEOPLE. #PizzaGate #PedoFiles #Pedosta Highjack trending tags.

Go to your local independent media. Keep addressing the issue until they’re forced to acknowledge it. Go to the church. Angry Christians will unite to make their voices heard. If everybody tells only three people, we can multiply our forces exponentially. The more people that know, the more likely law enforcement will be forced into making arrests.

UPDATE 11/27 – Twitter has started locking my account for posting about #PizzaGate. I was forced to delete a jimmycomet’s Instagram pic due to “child sexual exploitation”. Does that count as solid evidence? Fox News and NPR join the list of pedophile protectors today. Below is a collective list of MSM which has completely distorted the facts of this investigation in attempt to slander us as tin-foil hat conspiracy theorists.

OFFICIAL THOUGHT POLICE:

  • New York Times
  • Washington Post
  • Bloomberg
  • Zero Hedge
  • Fox News
  • Veterans Today
  • NPR
  • Snopes
  • Yahoo
  • BBC
  • RT America
  • Independent
  • Guardian
  • Seattle Times
  • Globe and Mail
  • CNN
  • CBS
  • Sky News
  • Mashable
  • Daily Kos
  • TIME
  • Colbert Report
  • Business Insider
  • YouTube, Google, Twitter, FB, Reddit, 4chan in the form of censorship

We will not forget. We are the media now. Please comment other MSM sources I have missed attempting to silence us through the “fake news” narrative.

UPDATE 11/28 – New York Times CEO Mark Thompson accused of concealing evidence about notorious pedophile Jimmy Savile; now conceals evidence of #PizzaGate.

markthompsonNYT.PNG

UPDATE 11/29 – I was contacted by a producer at The Daily Show for interview. I responded with an email address which presents my real name, so if I stop updating soon then RIP me. Feel free to voice opinions on the matter in the comments. I honestly don’t know if I’m better off revealing myself (because the government already has my IP address, duh) and therefore it would look shady if I died suddenly… or I am better off as simply Anon.

UPDATE 12/01 – BBC joins pedo protectors and runs #PizzaGate hit-piece. It is worth mentioning James Alefantis has now professed on multiple platforms that Comet “doesn’t even have a basement”, yet just last year in an interview with Metro Weekly, he specifically said “Like our sauce — we harvest a whole crop of organic tomatoes — 10 tons of tomatoes every year. Can them all, store them in the basement…”. Ask a police officer whether lying is indication of guilt.😉

I also would like to mention I Google Maps searched Lovettsville in further investigation of the Tamera Luzzatto email to John Podesta which references a “farm in Lovettsville” and children for entertainment. It turns out only one Lovettsville exists and it is in Virginia – only one hour and five minutes away from D.C. in driving time. There are not many farms in this town. That’s why it stood out when Quarter Branch farm had something called the Fazenda Burity located on what looks to be pretty much the same property. The Google Maps description calls the Fazenda Burity a farm, but yet it has photos of a long building with many doors, people dining in an outside gathering area, a pool, and other photos which do not look anything like a farm. Even stranger still, the website listed on Google Maps for this location sends you to a site with a .br (Brazil) extension in Portuguese. Something does not seem right. Hai FBI, I know you’re probably reading this blog. PLEASE INVESTIGATE THIS SHIT.

12/03 – Strong evidence Facebook is censoring (or at least suppressing) #PizzaGate:

fbcensors(

All those tags just magically happen to be at 1k? Get real. And I know a lot of us are losing stamina… Feeling helpless because we all know arrests can’t happen now or Obama will just pardon them. I received this email two days ago; at first I didn’t think much of it but it is unlike any other email I’ve received thus far – it featured a lot of extra code, so it has piqued my curiosity. Here it is:

cryptic

It is cryptic. “You aren’t alone. Friends on the other side, will provide.” I hope it is true.

12/05 – FALSE FLAG ALERT! Many people suspect the supposed gunman yesterday was a false flag meant to be used to scrub PizzaGate from the internet in a way less obvious than the Orwellian route. Why do we think so? Number 1) They released his name as “Edgar Maddison Welch”. Edgar is a failed ACTOR; here’s his IMDB. Number 2) Just last month, the same Edgar Maddison Welch ran over a 13-year-old with his car. This leads to speculation the Comet “shooting” may have been part of a sweetheart deal. Number 3) Somebody moved the street camera which originally faced Comet Pizza so that it’s mostly blocked by a pole when viewed online through the city’s site. Check out this tweet from December 3rd, a day before the Comet incident: Thomas Bernpaine Sees the Future

Take all these odd circumstances into consideration, and you still may not be convinced. The biggest thing that sealed the deal in my mind is the reaction by the mainstream media. Instantly the biggest DNC shills, Jake Tapper etc. begin tweeting about the “dangerous consequences” of “fake news”. A verified account of some unknown-to-me Guardian/Huffington Post/Vice journalist by the name of @karengeier on Twitter begs WordPress to take down MY BLOG because “this is where a lot of them are getting information from” and “why have something even Reddit didn’t want”. CENSORSHIP ALERT, RESISTANCE IS FUTILE. Later at night, I began to see a call from journalists to SUE people like me. Folks, please ask yourselves this – if #PizzaGate were not real, would they have needed to delete 4chan threads and subreddits and now attempt to DELETE AND SUE A PERSONAL BLOG to hide something that is so obviously fake, in their opinion? I must ask why James Alefantis has not contacted me once either to A) clear his name and provide the rational explanation to all this or B) send a letter threatening defamation/libel if I do not take down this article. A friend who is a lawyer told me it is unlikely they would risk the investigation of a defamation suit due to things such as discovery depositions which they open themselves up to. I will provide update if any of the people in this blog contact me, which they can easily do through the contact link on this page… But alas, not a single communication has been made by the whole lot of them. What would be your first course of action if suddenly the internet [wrongly] thought you were a human trafficking pedophile?

12/08 – CENSORSHIP ALERT! Just as many had suspected, the powers that be have now begun the process of removing PizzaGate from the internet. As we speak, YouTube is deleting HUNDREDS of videos which display the evidence presented against those accused. I find this incredibly shocking and appalling because 99% of the information gathered in this investigation has been legally and publicly obtained through Wikileaks, search engine results and James Alefantis’ once PUBLIC Instagram (which has since been archived). I honestly feel I have awoke to find myself in a bad nightmare; I see the difference between North Korea and America is more arbitrary than previously conceived. During the first days of the investigation, this blog was on the first page of Google search results. Even just a week ago when I searched, dcpizzgate.wordpress.com was on the third page of search results. I searched last night and when simply typing in “pizzagate”, this blog no longer appears in any of the 20 pages of filtered results. That tells me this blog is effective in changing opinions, and it is therefore dangerous. Knowledge is power. Knowledge is a weapon. And that’s why they fear the spreading of this information. For weeks I have been looking at posts including my blog through Twitter search, but suddenly today the “all tweets” section yields “zero results”, even though the “top tweets” still displays results. Just yesterday, former State Dept. official Steve Pieczenik shared my blog on his Twitter. He has long spoken out about pedophilia within American government. Thank you for your dedication to exposing the truth – you’re a true hero.

Since the false flag event, I have been getting some threats… Calling me a sick fuck, saying I should give out my address so people kind find me, etc. Undoubtedly the majority of the emails I have received have been “thank you for exposing this” and people claiming to be somehow knowledgeable of the inside all saying that everything presented here is true and it goes even deeper. This blog is not meant to present all the evidence gathered; it is simply a red pill for normies.

12/09 – On December 1st, I updated about a farm in Lovettsville (a reference from the Tamera Luzzatto email to John Podesta about kids in the pool as entertainment) I found called Quarter Branch Farm. On December 7th, Quarter Branch posted on Facebook that they are closing permanently. Coincidence or guilty as sin? Thanks to the reader who sent me this tip.

Other points of interest:

For those who are unconvinced such powerful people could sexually abuse children and get away with it:

  1. Banned documentary Conspiracy of Silence CoS on YouTube
  2. The Franklin Cover-up FranklinScandal.com
  3. Boys for Sale BfS YouTube
  4. Johnny Gosch’s mother interview Noreen Gosch
  5. Hollywood’s Documented PizzaGate YouTube

If you would like to continue the research and help the global, crowd-sourced investigation to save the children from these horrific, unimaginably evil abuses, many say this is a good place: Voat Pizzagate Thread

Video Responses to PizzaGate:

Message from Anonymous

Titus Frost PizzaGate Intro

PressResetEarth Washington DC Elite Pedophile Ring FULLY EXPOSED

James Alefantis Answers to Angry Protestors

Activist Angel Promotes PizzaGate on Seattle TV Show

Response to ‘Fake News’ MSM Hit-piece

Besta Pizza Employee Admits their Logo was Pedophile Symbol

Payday Monsanto Calls the FBI to Report PizzaGate

Grown Man Teary-eyed Over PizzaGate

PizzaGate en Espanol

PizzaGate in Polish

PizzaGate in Finnish

PizzaGate in German

PizzaGate in Greek

Sign off note: Dear MSM, I voted for Bernie then third party. Stop smearing everyone investigating this as alt-right, Trump-supporting internet sleuths! This goes beyond politics; we are all merely concerned citizens and I believe rightfully so. If even 4chan is nauseated by this stuff, it must be pretty bad. Edit: In regards to criticism of the Satanic considerations – I don’t even believe in Jesus or Satan, but I’m calling it like I see it; these people think it’s fun to worship Satan, whatever that may be in reality. I simply think of it as evil and sociopathology.

Disclaimer: I do not condone or support the harassment or any sort of violence against the people listed or referenced in this blog. I do however condone peaceful protest and civil investigation, along with the death penalty for convicted pedophiles🙂 Maybe after some prolonged, otherwise unethical medical experimentation and living tissue brain research?

The Opperman Report 11.26.16

UnSpun 046 – “Pizzagate” 11.24.16

UnSpun 047 – “#Pizzagate Essential Update: NY Times, Podestas, Olson Twins, Miley Cyrus, Amanda Kleinman”11.30.16

UnSpun 049 #PizzaGate to Date w/ Titus Frost” 11.15.16

Our Interesting Times – Joe Atwill on Pizzagate and the Secret Society 12.08.16

The Opperman Report 01.10.17

https://www.youtube.com/watch?v=HTRewHDOr90