Why You Should Oppose The Censorship Of David Icke (Hint: It’s Got Nothing To Do With Icke)

By Caitlin Johnstone

Source: Waking Times

Within 48 hours both Facebook and then Youtube have deleted the accounts of David Icke for posting “content that disputes the existence and transmission of Covid-19 as described by the WHO and the NHS.” Other platforms may soon fall in suit, as they did with Alex Jones in 2018.

This article is not about David Icke. I will say it again in italics for the especially dense: this article is not about David Icke. This article is about why we shouldn’t be okay with monopolistic billionaire-owned Silicon Valley tech giants with extensive ties to US government agencies controlling human communication.

I know next to nothing about David Icke, and I have done exactly zero research into his views for this article; for all I know he’s every bit the raving lunatic the narrative managers say he is. It doesn’t matter. What matters is that we’re seeing a consistent and accelerating pattern of powerful plutocratic institutions collaborating with the US-centralized empire to control what ideas people around the world are permitted to share with each other, and it’s a very unsafe trajectory. Making this conversation about Icke and his views distracts from the very important topic we need to actually focus on discussing.

Journalist Matt Taibbi recently wrote an excellent essay about the dangers inherent in the increased demand we’ve been seeing for more censorship and deplatforming during the coronavirus pandemic, correctly arguing that more authoritarian control over the ideas people are allowed to discuss is vastly more dangerous than the ideas themselves.

“The people who want to add a censorship regime to a health crisis are more dangerous and more stupid by leaps and bounds than a president who tells people to inject disinfectant,” Taibbi writes. “It’s astonishing that they don’t see this.”

“Instead of asking calmly if hydroxychloroquine works, or if the less restrictive Swedish crisis response has merit, or questioning why certain statistical assumptions about the seriousness of the crisis might have been off, we’re denouncing the questions themselves as infamous,” says Taibbi.

Taibbi argues against the increasingly normalized trend of elevating “authoritative” content while silencing content which does not wear that magical label in an attempt to fight disinformation. If you examine which content is considered “authoritative”, you’ll find a bunch of outlets who have consistently lied to the world about war after war, who spent years promoting the baseless conspiracy theory that Vladimir Putin had infiltrated and secured control over the executive branch of the US government, who consistently normalize a status quo which is wholly incompatible with the surviving and thriving of life on this planet.

Google, who owns Youtube, has been financially intertwined with US intelligence agencies since its very inception when it received research grants from the CIA and NSA for mass surveillance. Facebook’s Mark Zuckerberg has called on the government to take “a more active role” in regulating “harmful content”, and has been actively collaborating with government agencies and government-funded think tanks to decide what content to remove. Social media executives are now routinely called before government hearings and lectured about the need to increase censorship under the implicit threat of antitrust cases being brought to bear. These massive corporations now consistently censor with an extreme bias against governments which refuse to bow to the demands of the US government and its allies.

In 2017, representatives of Facebook, Twitter, and Google were instructed on the US Senate floor that it is their responsibility to “quell information rebellions” and adopt a “mission statement” expressing their commitment to “prevent the fomenting of discord.”

“Civil wars don’t start with gunshots, they start with words,” the representatives were told. “America’s war with itself has already begun. We all must act now on the social media battlefield to quell information rebellions that can quickly lead to violent confrontations and easily transform us into the Divided States of America.”

Whenever anyone objects to censorship on these massive platforms they’re always told that those platforms are private companies who are free to do what they like on their private property, but how “private” is a corporation that is interlaced with government power with increasing inseparability? The reality is that in a corporatist system of government with vanishingly few meaningful distinctions between corporate power and state power, corporate censorship is state censorship.

Proponents of increased internet censorship have already openly conceded this point. A recent Atlantic article by two legal professors subtitled “In the debate over freedom versus control of the global network, China was largely correct, and the U.S. was wrong”, the case is made that western internet censorship will necessarily involve a collaboration with “private” corporations and government power.

“As surprising as it may sound, digital surveillance and speech control in the United States already show many similarities to what one finds in authoritarian states such as China,” the article’s authors favorably argue. “Constitutional and cultural differences mean that the private sector, rather than the federal and state governments, currently takes the lead in these practices, which further values and address threats different from those in China. But the trend toward greater surveillance and speech control here, and toward the growing involvement of government, is undeniable and likely inexorable.”

Apart from the fact that they are here claiming that increasingly authoritarian speech control is good and necessary, these two bootlickers are absolutely correct. Human communication is indeed being controlled using the so-called “private sector” to circumvent constitutional limitations which prohibit the government from censoring speech directly.

These Silicon Valley tech corporations have ensured their continued monopolistic dominance by demonstrating their willingness to collaborate with establishment power structures, so there are no platforms of anywhere near the same size and influence that people can move to if they don’t feel like letting government-tied plutocrats police what thoughts are permitted to enter into their minds. This has given this corporate-government alliance the ability to control the thoughts that people are allowed to share, discuss and think about in the same way totalitarian governments can, with the false mask of freedom plastered over it.

A truly free being does not need an alliance of plutocrats and government agencies to protect their mind from David Icke. A truly free being does not want an alliance of plutocrats and government agencies to exert any control whatsoever over what ideas they are permitted to share and what thoughts they are permitted to think. A truly free being opposes with all their might any attempt to lock in a paradigm where human communication (and thereby thought) is controlled by vast unaccountable power structures which benefit from the absence of dissent.

Be a truly free being. Oppose this intrusion into your mental sovereignty.

The Elite’s COVID-19 Coup Against a Terrified Humanity: Resisting Powerfully

By Robert J. Burrowes

I have previously explained how the COVID-19 infection is being used to frighten us into submitting powerlessly to the global elite’s latest move to take much greater control of our lives and how those who can perceive this, and wish to resist it, can do so effectively. See ‘Observing Elites Manipulate Our Fear: COVID-19, Propaganda and Knowledge’ and ‘Defending Humanity Against the Elite Coup’.

In this article I want to document a sample of the rapidly increasing evidence of how this coup is taking shape and to reiterate a strategy for defeating it.

The coup was designed to take immediate measures to ensure that fundamental rights and freedoms, only ‘won’ (in name at least) after many centuries of struggle, were stripped away from us and to do it in such a way that people would fearfully accept it. This is why the idea of a virus ‘pandemic’ was quite clever. Because the fear of contracting the virus (and its possibly deadly consequences) could be grotesquely magnified by inflating the figures, constant harping on it by the World Health Organization, the medical industry (in league with the pharmaceutical industry) and governments, and then magnified by the corporate media – with one outlet laughably suggesting COVID-19 could be worse than the flu outbreak in 1918 (falsely attributed to Spain): see ‘COVID-19 has the potential to become as severe as the Spanish flu’ – it made virtually all people submissive to any measure taken, or order given, ostensibly to prevent the spread of the virus.

Fear manipulated by propaganda defeats knowledge and evidence every time, as history has endlessly demonstrated. Just ask Joseph Goebbels how they did it in Nazi Germany. Play on the fear, play on the fear….

But if you are not too scared to seek out the evidence, you get an utterly different picture of what is taking place.

So, for example, US physician Dr. Annie Bukacek observes that ‘The real number of COVID-19 deaths are not what most people are told and what they then think. How many people actually died from COVID-19 is anyone’s guess. … Based on inaccurate, incomplete data, people are being terrorized by fear-mongers into relinquishing freedoms.’ See ‘Montana physician Dr. Annie Bukacek discusses how COVID 19 death certificates are being manipulated’.

If you would like to read a wider sample of the literature and videos discussing how the infection and death rates from COVID-19 have been deliberately misinterpreted, inflated and presented in a way that induces fear, and hence willing submission to elite control, see the daily updates on ‘A Swiss Doctor on Covid-19’ and the articles/videos ‘Corona: creating the illusion of a pandemic through diagnostic tests’, ‘12 Experts Questioning the Coronavirus Panic’, ‘Can We Trust the WHO?’, ‘How deadly is the coronavirus? It’s still far from clear’, ‘Perspectives on the Pandemic II: A Conversation with Dr. Knut Wittkowski’, ‘Never Has So Little Done So Much Harm to So Many: The Latest Coronavirus Attack Is A Cover for Restricting Our Health Freedoms’, ‘Covid19 Death Figures “A Substantial Over-Estimate”’ and ‘Dr Scott Jensen Reveals “Ridiculous” Covid19 Guidance’.

As a result of this pandemic of fear, the human rights to privacy (Article 12), freedom of movement (Article 13.1) and freedom of assembly (Article 20.1), for example, which are enshrined in the Universal Declaration of Human Rights proclaimed by the United Nations General Assembly in Paris on 10 December 1948 (but not necessarily legislated into law by individual countries and routinely violated by governments in any case) have now been publicly and completely eviscerated in one fell swoop with bans on gatherings, legal requirements for ‘social distancing’ and even greater surveillance of our private activities with barely a murmur of protest. For a comprehensive global summary, which monitors individual government responses to the pandemic that affect civic freedoms and human rights focusing on emergency laws, see the ‘COVID-19 Civic Freedom Tracker’.

Denied these fundamental rights, others – including those preventing arbitrary arrest or detention (Article 9), entitlement to a fair and public hearing by an independent and impartial tribunal in response to any criminal charge (Article 10), to make a living in the manner of our choosing (Article 23), to adequate healthcare irrespective of personal circumstances (Article 25.1) and to have some say in how we are governed (Article 21) – have, if they previously existed in practice, largely disappeared as many governments around the world have used a variety of illegal and sometimes unconstitutional measures – ranging from ‘lockdowns’ and curfews to martial law and suspensions of parliaments in favour of dictatorships – to usurp more complete control of national societies.

For just a brief taste of what is taking place in some countries, see ‘Denmark rushes through emergency coronavirus law’, ‘DOJ seeks new emergency powers amid coronavirus pandemic’, ‘For Autocrats, and Others, Coronavirus Is a Chance to Grab Even More Power’, ‘Suspending the Constitution: Police State Uses Crises to Expand Its Lockdown Powers’, ‘Hungary’s Leader Grabbed Powers to Fight the Virus. Some Fear Other Motives’, ‘Americans Beware: Trump Could Emulate Netanyahu’s Coronavirus Coup’ and ‘The Coronavirus State: New Zealand and Authoritarian Rumblings’.

In addition, by deliberately crashing national economies it was easy to conceal the fact that they were on the brink of crashing anyway. In the words of Scott C. Tips: ‘As the American and other economies falter from major structural problems, out-of-control debt, reckless spending, and government stupidity in shuttering businesses, the blame for markets crashing and economies tanking is borne by the conveniently available COVID-19 disease.’ See ‘Never Has So Little Done So Much Harm to So Many: The Latest Coronavirus Attack Is A Cover for Restricting Our Health Freedoms’.

In this way, the elite has rapidly and vastly expanded the number of people who live a precarious economic existence, due to the exploitative functioning of the global economy – see ‘Who Profits From the Pandemic?’ – while also giving vast sums of money to wealthy corporations via government bailouts. See ‘Trump Signs Corporate Bailout Bill: A Measure That Will Live in Infamy’.

Moreover, adverse outcomes from the use of COVID-19 to wreak this economic destruction will multiply rapidly but the underlying corporate dysfunctionality will now escape the blame from most observers just as COVID-19 will help to obscure the elite’s true purpose in precipitating this crisis. See, for example, ‘Coronavirus pandemic will inevitably cause food crisis’, ‘10 Signs the U.S. Is Heading for a Depression’, ‘After the Lockdown: A Global Coronavirus Vaccination Program…’, ‘COVID-19. The Unspoken Truth. The Most Serious Global Crisis in Modern History’, ‘The worst economic collapse ever?’ and ‘Coronavirus – The Aftermath. A Coming Mega-Depression…’.

But apart from these more obvious encroachments on our rights, freedoms and economic well-being, there is a vast range of encroachments happening either outside or on the periphery of public view, given the phenomenal corporate media attention focused on COVID-19 to distract us.

Talking about US government surveillance in 2014, former Technical Director of the NSA, William ‘Bill’ Binney, explained that the NSA sought ‘total population control’. See ‘Whistleblower: NSA Goal Is “Total Population Control”’.

Six years later it is clear that the global elite is now making another push in its ongoing and longstanding effort to achieve total control. Will this be the final push?

As you consider this question, here is another small sample of those encroachments and devastating impacts that are happening while our attention is elsewhere:

  1. The public acceptance of surveillance technology to spy on us in the interests of our ‘health’ is facilitating elite efforts to rapidly expand its monitoring capacities in this regard. See, for example, ‘To Track Coronavirus, Israel Moves to Tap Secret Trove of Cellphone Data’ and ‘For Autocrats, and Others, Coronavirus Is a Chance to Grab Even More Power’.
  2. The deluge of propaganda is convincing us that compulsory vaccination will be necessary to ensure our ‘health and well-being’. However, apart from the conclusively and extensively documented harm from vaccinations – for one brief article just touching on this, see ‘Vaccines and the Liberal Mind’ – there is extensive evidence that any such vaccination program will be the trojan horse for implementing an electronic identification program that uses generalized vaccination as a platform for launching a scheme to give everyone ‘a portable and persistent biometrically-linked digital identity’. See ‘The Coronavirus COVID-19 Pandemic: The Real Danger is “Agenda ID2020”’, ‘After the Lockdown: A Global Coronavirus Vaccination Program…’, ‘Coronavirus: Biometric IDs could be “gamechanger” for tests, vaccines’ and ‘COVID-19: Perfect Cover for Mandatory Biometric ID’.

If you think this is fairyland stuff, check out the website of the elite agents advocating it: ‘The need for good digital ID is universal: The ability to prove who you are is a fundamental and universal human right. Because we live in a digital era, we need a trusted and reliable way to do that both in the physical world and online.’ See ‘The Need for Good Digital ID is Universal’.

Without thinking too hard, I can list a few ‘fundamental and universal human rights’ that I would nominate before I got too excited about my digital identity. I wonder if these people are concerned about whether I have enough to eat, whether I am clothed and housed…. Of course, I know they have no interest in my privacy given that digital ID and the surveillance that goes with it will make that non-existent.

  1. The deployment of the highly dangerous 5G which, under the guise of improving internet speed and capacity, will vastly expand everyone’s exposure to electromagnetic radiation with its long list of seriously adverse health impacts. For a taste of the extensive documentation on this point, see the ‘International Appeal to Stop 5G on Earth and in Space’.
  2. A dramatic increase in the violence inflicted within the family home, especially by men and women against children – see ‘Why Violence?’ – and by the more usually acknowledged men against women, during the lockdown. See ‘UN chief calls for domestic violence “ceasefire” amid “horrifying global surge”’.
  3. Intensified efforts to overthrow governments in Iran and Venezuela. See ‘COVID-19: Cover for Military Attack on Iran and Iraq? Trump ignores Iraqi demand US occupation forces leave the country’, ‘Not letting Covid-19 crisis go to waste? US ramps up war on drugs… focusing on Venezuela’s Maduro’, ‘Trump sends gun boats to Venezuela while the world partners to fight a deadly pandemic’ and ‘NATO in Arms to “Fight Coronavirus”’.

The background framework to what is happening regarding Venezuela has been exposed by its President Nicolás Maduro. See ‘Letter from President Nicolás Maduro to the People of the United States’.

  1. No end to the many ongoing wars involving the United States – see, for example, ‘U.S. Confirms Deployment Of Patriot Missiles In Iraq. Iran Prepares For Conflict In Straight Of Hormuz’ and ‘US Empire Exploits COVID-19 For More War’ – although a pause in some wars in which the US is not a party – for an overview, see ‘UN Ceasefire Defines War As a Non-Essential Activity’ – as a result of an appeal by the UN Secretary-General for warring nations to desist until the effort to contain COVID-19 is won. See ‘The fury of the virus illustrates the folly of war’.

Unfortunately, this appeal, unlike the Secretary-General’s appeal for a ceasefire on domestic violence which attracted no significant public endorsement, quickly drew in many others equally devoid of any analysis of what is actually taking place and thus happy to help distract people from the core issue. See, for example, ‘COVID-19: Sign the Call for Global Ceasefire!’, ‘Global Ceasefire: Running List of Countries Committed’ and ‘Global Ceasefire Now!’

Obviously, I am heartily in favour of ending war. But this is only going to happen when we campaign strategically to do so and provided we have sufficient political freedom to do it. See ‘Strategic Aims’ (for ending war).

As an aside and displaying its usual projected fear of threats, when some US military personnel became infected with COVID-19 – see ‘Request for Assistance in Response to COVID-19 Pandemic’ – the Pentagon issued a suppression order on further reporting of COVID-19 in the US military. See ‘Pentagon orders all installations to stop reporting COVID-19 infections and deaths’.

  1. Ongoing economic sanctions by the United States directed against a variety of countries, notably including Iran and Venezuela, are complicating efforts to address COVID-19 effectively. In contrast, countries such as Cuba, China and Russia are leading the international effort to support other countries dealing with a higher level of infection. See ‘US Continues Sanctions Against Venezuela And Cuba During COVID-19 Pandemic – Analysis’ and ‘Expert: US sanctions on Iran, Venezuela during pandemic could be genocidal’.
  2. A variety of actions, including legal manoeuvres and false flag attacks, undertaken to inflict greater repression in some contexts, particularly against indigenous peoples and those engaged in national liberation struggles. See ‘Mashpee Wampanoag Tribe Threatened with Land Disestablishment, Tribal Leaders Step in to Address Ongoing Land Issues and Threats to Sovereignty’, ‘Media advisory notice on alleged shooting near Freeport mine in Timika’ and ‘During the Coronavirus crisis, Israel confiscates tents designated for clinic in the Northern West Bank’.
  3. Dramatic increases in absolute impoverishment among marginalized individuals and communities throughout the Global South who barely survive day-to-day under their usual, difficult economic circumstances. As one Asian NGO network, engaged in attempting to secure emergency relief to assist those most adversely impacted, has just reported: ‘We are receiving alarming reports that ADB and AIIB project-affected communities across Asia, especially South Asia and South East Asia are in an absolute state of crisis. Due to the enforced lockdown, they have no work or access to sanitizers and food supplies. Leaving them completely exposed and vulnerable to the COVID-19 pandemic. The state responses are slow and in some cases non-existent.’ See ‘COVID-19 Community Emergency Fund’.

And Arundhati Roy wrote an evocative account of how the Indian government’s lockdown exposed the ‘brutal, structural, social and economic inequality’ in that country and the government’s ‘callous indifference to suffering’ as the lockdown caused employers and landlords in cities and towns to drive out millions of impoverished, homeless and hungry workers to walk the hundreds of kilometres to their villages. Many have died along the way, but not of COVID-19. See ‘Social Devastation and Despair. How Coronavirus Threatens India’.

  1. No pause in the economic exploitation of countries in the Global South with, for example, the International Monetary Fund (IMF) quick to offer ‘emergency finance’ to some 80 of these countries that have requested it. See ‘IMF Managing Director Kristalina Georgieva’s Statement Following a G20 Ministerial Call on the Coronavirus Emergency’.

What Ms. Georgieva didn’t mention is that these loans will no doubt be done on the usual highly conditional and exploitative basis for which the IMF has built its reputation for destroying the lives of ordinary local people by opening the door for corrupt or naive governments to accept corporate exploitation of their people and natural resources while building unsustainable levels of national debt trying to pay back the loans and interest to the IMF. For more detail on how this exploitation works, see the many Global Justice Now reports on the IMF and the book The New Confessions of an Economic Hit Man.

In contrast, World Bank President David Malpass was not so coy, clearly declaring that COVID-19 would be used to further exploit poorer countries by making any funding conditional on a willingness to make such exploitation easier in future: ‘Countries will need to implement structural reforms to help shorten the time to recovery and create confidence that the recovery can be strong. For those countries that have excessive regulations, subsidies, licensing regimes, trade protection or litigiousness as obstacles, we will work with them to foster markets, choice and faster growth prospects during the recovery.’ See ‘Remarks by World Bank Group President David Malpass on G20 Finance Ministers Conference Call on COVID-19’.

To reiterate: The World Bank will help existing heavily exploited countries with some funding for short-term health measures directed at containing COVID-19 provided the country removes laws that would make it difficult to exploit it indefinitely thereafter.

  1. No pause in environmentally destructive activities, ranging from the ongoing use of health-destroying poisons, such as glyphosate, used to contaminate our food – see ‘Locked Down and Locking in the New Global Order’ – which cause vastly more deaths than COVID-19 will cause, to the ongoing destruction of pristine rainforests to create, among other possibilities, more palm oil plantations. See ‘New player starts clearing rainforest in world’s biggest oil palm project’.

And while there has been a short-term reduced negative impact on the climate as a result of the slowdown in industrial activity and the use of fossil fuel-powered vehicles, the ongoing COVID-19 coup has been used to destroy whatever momentum has been achieved by the climate and environment movements in recent years.

  1. While COVID-19 is causing problems for the 100,000 skilled technicians responsible for controlling, maintaining and fuel loading/unloading of the 96 remaining nuclear power plants in the USA, given the confined space in which the technicians work which make ‘social distancing’ virtually impossible, ‘The industry is now using the Coronavirus Pandemic to rush through a wide range of deregulation demands. Among them is a move to allow radioactive waste to be dumped into municipal landfills.’ See ‘Terrified Atomic Workers Warn That the COVID-19 Pandemic May Threaten Nuclear Reactor Disaster’.
  2. Long intent on dominating Space both militarily and industrially – see the US Space Command’s ‘Vision for 2020’ – in violation of the Outer Space Treaty of 1967 which declared ‘The exploration and use of outer space, including the moon and other celestial bodies, shall be carried out for the benefit and in the interests of all countries… and shall be the province of all mankind’ – see ‘Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space, including the Moon and Other Celestial Bodies’ – US president Trump has just signed an executive order to allow corporations and ‘citizens’ (that is, billionaires) to begin mining the moon. The elite also wants to use nuclear reactors to fuel spacecraft so they can mine Mars in the future. See ‘Trump Signs Executive Order to Mine the Moon’.

If you are a US citizen and wondering how the ‘largest industrial project in the history of the planet’ will be financed, look in your own purse or wallet and wonder how much more will be taken from you so that, as usual, you pay the upfront costs associated with the vast profits they plan to make. Of course, you will also pay with budget cuts to health, education and social security funding.

The 13-point list above is actually very short – and confined to readily observable ‘moves’ – but, hopefully, it gives you some idea of what is taking place behind the elite’s barrage of COVID-19 fear-mongering. Needless to say, it is the ‘moves’ that we do not know about that are, no doubt, even more troubling.

So what can we do in response to this fear-mongering and the coup it is being used to disguise?

Resisting the Elite Coup Powerfully

I have previously outlined this nonviolent strategy, identifying its political purpose – obviously ‘To defend humanity against a political/military coup conducted by the global elite’ – and I have set out a basic list of 26 strategic goals, of which eleven are as follows:

(1) To cause people and groups all around the world to join the resistance strategy by wearing a global symbol of human solidarity, such as an image of several people of different genders/races/religions/abilities/classes holding hands.

(2) To cause people and groups all around the world to join the resistance strategy by boycotting all corporate media outlets (television, radio, newspapers, Facebook, Twitter…) and by seeking news from progressive news outlets committed to telling the truth.

(3) To cause people and groups all around the world to join the resistance strategy by withdrawing all funds from the corporate banks that are supporting the coup and to deposit their money in local community banks or credit unions.

(4) To cause people and groups all around the world to join the resistance strategy by boycotting the medical and pharmaceutical industries – including by conscientiously refusing to submit to vaccination – and by seeking health advice and treatment from natural therapists. (If you are unfamiliar with the different philosophies underpinning these approaches, and hence why many natural therapies are so much more effective, there is a straightforward explanation here: ‘Pasteur vs. Bechamp: An Alternative View of Infectious Disease’.)

(5) To cause people and groups all around the world to join the resistance strategy by boycotting corporate supermarkets and by supporting small and family businesses, and local markets.

(6) To cause people and groups all around the world to join the resistance strategy by participating in other locally relevant nonviolent action(s)/campaign(s) and/or constructive program activities. For this item and many subsequent, see the list of possible nonviolent actions in the document ‘198 Tactics of Nonviolent Action’.

(7) To cause the workers [in trade unions or labor organizations T1, T2, T…] all around the world to join the resistance strategy by participating in locally relevant nonviolent action(s)/campaign(s) and/or constructive program activities. For example, this might include withdrawing labor from an elite-controlled bank, media, pharmaceutical or other corporation operating in your country.

(8) To cause the small farmers and farmworkers [in organizations F1, F2, F…] all around the world to join the resistance strategy by participating in locally relevant nonviolent action(s)/campaign(s) and/or constructive program activities. For example, this might include distributing farm produce through (existing or created) grassroots networks to small and family businesses as well as local markets rather than through corporate supply chains.

(9) To cause the indigenous peoples [in organizations IP1,IP2, IP…] all around the world to join the resistance strategy by participating in locally relevant nonviolent action(s)/campaign(s) and/or constructive program activities. For example, this might include utilizing indigenous knowledge to improve local self-reliance in food production and in other ways.

(10) To cause the soldiers and military police [in army units AU1, AU2, AU… and MP1, MP2, MP…], wherever stationed around the world, to refuse to obey orders from the global elite and its agents to arrest, assault, torture and shoot nonviolent activists and the other citizens of [your country].

(11) To cause the police [in police units P1, P2, P…], wherever stationed around the world, to refuse to obey orders from the global elite and its agents to arrest, assault, torture and shoot nonviolent activists and the other citizens of [your country].

Rather than detail all 26 strategic goals here, you can read the ‘Strategic goals for defeating a political/military coup conducted by the global elite against humanity’ by scrolling down the page at ‘Strategic Aims’.

Remaining pages on the website fully explain the twelve components of the strategy, as illustrated by the Nonviolent Strategy Wheel. These include the need to provide leadership and mutual aid at local levels, which are already happening in many places, as part of the overall effort.

The website also has articles and videos explaining all of the vital points of strategy and tactics, including articles to help you understand ‘Nonviolent Action: Why and How it Works’, the difference between ‘The Political Objective and Strategic Goal of Nonviolent Actions’ and how to prepare, frame and conduct any nonviolent action to minimize the risk of violent repression. See ‘Nonviolent Action: Minimizing the Risk of Violent Repression’.

It is worth emphasizing that, in some contexts, there is a place for large public nonviolent actions for those who are inclined to plan and conduct them. And the article just referenced will assist you to conduct them with minimal risk of violent repression. However, because the bans on public gatherings are being implemented widely, I have concentrated on providing tactical options in the examples above that do not depend on gathering in one place.

Nevertheless, as more people become aware of the coup and the energy to resist it gathers pace, it will be worthwhile to choose a locally significant date on which as many people who are willing to do so act to ‘End the Lockdown’ in that country. Using a locally relevant focus, or perhaps several, for which many people would traditionally be together – a cultural or sporting event, a community activity such as working to establish a community garden to increase local self-reliance, a birthday celebration and/or a return to work – we can mobilize people to collectively resist the coup that is taking place. Because the actions taken will be dispersed with large numbers of people responding in a vast number of locations, it will be impossible for police and military forces to inflict violent repression against everyone, particularly if local organizers have implemented the points in ‘Nonviolent Action: Minimizing the Risk of Violent Repression’.

Equally importantly to any of the points above, particularly given the pressing threat of human extinction – see ‘Human Extinction Now Imminent and Inevitable? A Report on the State of Planet Earth’ – but also because becoming more self-reliant is vital to our ongoing capacity to resist elite encroachments on our rights, freedom and economic security, consider joining those participating in ‘The Flame Tree Project to Save Life on Earth’. This project also explains how to take full advantage of non-monetary forms of community where goods and services are exchanged directly, without money as a medium of exchange. Money only has value in certain types of economy and these types of economy must be superseded if humans are to survive.

And given the enormous pressure on children at the moment, as their lives are upended, it would be useful to spend time listening to them. Of course, if you know an adult who is having trouble coping, it will help them enormously as well if you listen while giving them the opportunity to talk about, and focus on feeling, their own emotional reactions to what is taking place. See ‘Nisteling: The Art of Deep Listening’. If you do not have anyone who can listen to you, try ‘Putting Feelings First’.

Moreover, because the foundation of this entire elite-controlled world, and the coup it is now implementing, is the submissively obedient individual, the world can only be rebuilt as we might like it if we stop terrorizing children into being submissive. So I would start by parenting and educating children so that they become powerful. See ‘My Promise to Children’ and ‘Do We Want School or Education?’

In addition, if you would like to better understand the origin, identity and behaviour of the global elite and why it is insane, see the section headed ‘How the World Works’ in ‘Why Activists Fail’ and the articles ‘Exposing the Giants: The Global Power Elite’ and ‘The Global Elite is Insane Revisited’ and the many references cited in these documents. For a deeper understanding of why elite and other human violence is so pervasive, see ‘Why Violence?’ and ‘Fearless Psychology and Fearful Psychology: Principles and Practice’.

Finally, as touched on above, apart from the ongoing elite coup the Earth is under siege from our assaults on a vast range of fronts. See ‘Human Extinction Now Imminent and Inevitable? A Report on the State of Planet Earth’. So if we are serious about tackling this crisis too, we must be willing to consider committing to:

The Earth Pledge

Out of love for the Earth and all of its creatures, and my respect for their needs, from this day onwards I pledge that:

  1. I will listen deeply to children (see explanation above)
  2. I will not travel by plane
  3. I will not travel by car
  4. I will not eat meat and fish
  5. I will only eat organically/biodynamically grown food
  6. I will minimize the amount of fresh water I use, including by minimizing my ownership and use of electronic devices
  7. I will not buy rainforest timber
  8. I will not buy or use single-use plastic, such as bags, bottles, containers, cups and straws
  9. I will not use banks, superannuation (pension) funds or insurance companies that provide any service to corporations involved in fossil fuels, nuclear power and/or weapons
  10. I will not accept employment from, or invest in, any organization that supports or participates in the exploitation of fellow human beings or profits from killing and/or destruction of the biosphere
  11. I will not get news from the corporate media (mainstream newspapers, television, radio, Google, Facebook, Twitter…)
  12. I will make the effort to learn a skill, such as food gardening or sewing, that makes me more self-reliant
  13. I will gently encourage my family and friends to consider signing this pledge.

Conclusion

Given that the statistics clearly show that the COVID-19 ‘pandemic’ is already fading in most places where it previously had serious impact, it is possible that the global elite will not complete its execution of this coup against humanity in the near future. It will be content with the demonstration of its phenomenal power to manipulate populations into passively submitting to its bidding and defer its final putsch for a short time.

If that is the case, the damage wrought by this socalled pandemic – on our rights, freedoms, economic security, opportunities, democratic governance, the global economy and the environment – will be irreparable and it would take many years to even restore a partial version of what we thought we had while knowing that they can be taken away, again, at any time just as they were on this occasion.

But, quite frankly, if I was a member of the global elite and had witnessed the remarkably submissive manner in which even activists were deceived by the COVID-19 coup, I would advocate for completing the coup now and lock us down, force-vaccinate us with our own unique digital ID and surveillance chip, and promptly implement all of the measures necessary to take final control of the prison planet previously known as Earth.

However, because I am not a member of the global elite, I will continue to draw attention to what is taking place and encourage people to resist in the strategic ways I have outlined above. And then do what I can to ensure that as many people as possible, who are powerful enough to do so, respond before it is too late.

I would rather act sooner, while we still have some room to move, rather than later, when we might have much less.

 

Biodata: Robert J. Burrowes has a lifetime commitment to understanding and ending human violence. He has done extensive research since 1966 in an effort to understand why human beings are violent and has been a nonviolent activist since 1981. He is the author of ‘Why Violence?’ His email address is flametree@riseup.net and his website is here.

How Government and Media Are Prepping America for a Failed 2020 Election

FILE – In this May 6, 2019, file photo Microsoft CEO Satya Nadella delivers the keynote address at Build, the company’s annual conference for software developers in Seattle. Microsoft says it has detected more than 740 infiltration attempts by nation-state actors in the past year targeting U.S.-based political parties, campaigns and other democracy-focused organizations including think tanks and other non-profits. (AP Photo/Elaine Thompson, File)

Russia, China and Iran are already being blamed for using tech to undermine the 2020 election. Yet, the very technologies they are allegedly using were created by a web of companies with deep ties to Israeli intelligence.

By Whitney Webb

Source: Mint Press News

As World War II drew to a close in Europe, British philosopher Bertrand Russell wrote that “neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of a great fear.”

Though numerous examples in the post-World War II era have proven Russell’s point, perhaps one of the best examples was the U.S. public’s willingness to swallow lie after lie about Saddam Hussein’s Iraq due to the climate of fear that followed the September 11 attacks. Those lies, propagated by dubious intelligence, government officials and a compliant media, resulted in catastrophes – large and small, both abroad and at home.

Today, an analogous narrative is being crafted by many of the same players – both in media and government – yet it has avoided scrutiny, even from independent media.

Over the past several months and with a renewed zeal in just the last few weeks, anonymous intelligence officials, dubious “experts” and establishment media outlets have crafted a narrative about the coming “chaos” of the 2020 election, months before it takes place. Per that narrative, certain state actors will use specific technologies to target the “American mind” in order to undermine the coming presidential election. The narrative holds that those efforts will be so successful that the U.S. will never recover as a democracy.

Though these anonymous government sources and their stenographers have already named the countries who will be responsible and the technologies they will use, they also admit that no evidence yet exists to back up these claims, meaning they are — at best — pure speculation.

Headlines such as “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” “Basically Every US National Security Leader Is Warning About Foreign Interference In The 2020 Election,” and “U.S. intel agencies: Russia and China plotting to interfere in 2020 election” have become increasingly common, despite no available evidence, as have warnings that the American public is defenseless against the old scourge of “fake news” and the new scourge of “deep fakes.” Some media reports have gone so far to say that actual foreign meddling isn’t even necessary as merely the fear of foreign meddling could be enough to upend the American political system beyond repair.

Historically, the goal of such fear-inducing narratives has been the trading of civil liberties for increased security, or rather, the appearance of increased security. Yet, when the need for security is felt due to a fear that is based on government-driven speculation and not on evidence, the goal of that narrative is not about protecting the public from a real, tangible threat but instead about the consolidation of power by the very groups responsible for crafting it — in this case, the intelligence community and other key players in the national security state.

However, what is particularly odd about this narrative surrounding imminent “chaos” and meddling in the upcoming 2020 election is the fact that, not only have the instruments of said meddling been named and described in detail, but their use in the election was recently simulated by a company with deep ties to both U.S. and Israeli intelligence. That simulation, organized and run by the Israeli-American company Cybereason, ended with scores of Americans dead, the cancellation of the 2020 election, the imposition of martial law and a spike in fear among the American populace.

Many of the technologies used to create that chaotic and horrific scenario in the Cybereason simulation are the very same technologies that U.S. federal officials and corporate media outlets have promoted as the core of the very toolkit that they claim will be used to undermine the coming election, such as deep fakes and hacks of critical infrastructure, consumer devices and even vehicles.

While the narrative in place has already laid the blame at the feet of U.S. rival states China, Russia and Iran, these very technologies are instead dominated by companies that are tied to the very same intelligence agencies as Cybereason, specifically Israeli military intelligence.

With intelligence agencies in the U.S. and Israel not only crafting the narrative about 2020 foreign meddling, but also dominating these technologies and simulating their use to upend the coming election, it becomes crucial to consider the motivations behind this narrative and if these intelligence agencies have ulterior motives in promoting and simulating such outcomes that would effectively end American democracy and hand almost total power to the national security state.

 

Media, intelligence foreshadow tech-powered doom for 2020

Even though the 2020 U.S. election is still months away, a plethora of media reports over the past six months (and even before then) have been raising concern after concern about how the U.S. election is still so vulnerable to foreign meddling that such meddling is essentially an inevitability.

Part of the reason for the recent pick-up in fear mongering appears to have been the release of a joint statement issued by key members of the Trump administration last November. That statement, authored by Attorney General Bill Barr, Defense Secretary Mark Esper, acting DHS Secretary Kevin McAleenan, acting Director of National Intelligence Joseph Maguire, FBI Director Christopher Wray, NSA Director Gen. Paul Nakasone, and Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs, claimed that foreign interference in 2020 was imminent despite admitting that there is no evidence of interference having taken place:

Our adversaries want to undermine our democratic institutions, influence public sentiment and affect government policies. Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions. Adversaries may try to accomplish their goals through a variety of means, including social media campaigns, directing disinformation operations or conducting disruptive or destructive cyber-attacks on state and local infrastructure.

While at this time we have no evidence of a compromise or disruption to election infrastructure that would enable adversaries to prevent voting, change vote counts or disrupt the ability to tally votes, we continue to vigilantly monitor any threats to U.S. elections (emphasis added).”

Despite the key caveat of there being no evidence at the time the statement was issued, media reports used the statement to claim that foreign interference in 2020 was imminent, such as in these reports from BuzzFeed, ABC News, and Newsweek.

In addition to the reports that have cast the involvement of state actors — namely Russia, Iran and China — as assured despite no evidence, other reports have made the claim that this allegedly imminent interference will inevitably be successful, largely due to claims that the tactics used will rely heavily on technology that the U.S. can’t hope to successfully counter. CSO Online, an online news outlets that provides news, analysis and research on security and risk management, recently warned that “fixing America’s voting and election infrastructure problems is a long-term proposition, one that won’t be fixed in time for the election in November” while the New York Times warned of imminent chaos and that “stealthier” malevolent foreign actors had already created the foundation for “an ugly campaign season marred by hacking and disinformation.” Wired claimed last year that U.S. election security “is still hurting at every level.”

In another example, Rolling Stone published an article earlier this month with the headline “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” which claims that “the reality is that: “We’ve made progress since the last election — but we’re much less secure than we should be.” The article goes on to say that claim that the goal isn’t necessarily to hack voting machines or change results, but “to merely create the impression of an attack as a way to undermine our faith in the electoral process.”

It continues:

The target is the minds of the American people,” says Joshua Geltzer, a former counterterrorism director on the National Security Council. “In some ways, we’re less vulnerable than we were in 2016. In other ways, it’s more.” Nearly every expert agrees on this: The worst-case scenario, the one we need to prepare for, is a situation that causes Americans to question the bedrock of our democracy — free and fair elections.”

Well before this type of rhetoric made its way into the U.S. media, Israeli intelligence-linked tech firm Cybereason claiming in a release on its website that “messing with a voter’s mind” would have a bigger impact than changing vote totals, even before the 2016 election. That release, published by Cybereason prior to the last presidential election, was authored by the company’s CEO, Lior Div, who used to lead offensive hacking operations against nation-states for Israeli military intelligence.

Notably, of all of these media reports, there is a clear consensus that one of the main tactics that will soon be used to meddle in the coming U.S. election will be the use of so-called “deep fakes.” Deriving its name from a combination of “deep learning” and “fake,” deep fakes involve video and audio that has been manipulated using artificial intelligence (AI) to create media that appears to be authentic, but is not. Concern about its use in the upcoming election has spurred not only a wealth of media reports on the matter but has prompted both the U.S. military and Congress to take action to limit its potential misuse.

One thing that stands out about the media narrative regarding election meddling and deep fakes is that several news organizations have published articles that state that deep fakes will be used to undermine the 2020 election, as opposed to stating that they could be used or that they are a phenomenon worthy of attention (though some reports have taken this more measured approach).

The reason for this level of confidence may owe to statements made by prominent U.S. intelligence officials last year, including those made by Dan Coats, the former Director of National Intelligence (DNI), who claimed in the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community that deep fakes and other hi-tech forms of fake media would be used to disrupt the 2020 election. Coats specifically stated:

Adversaries and strategic competitors probably will attempt to use deep fakes or similar machine-learning technologies to create convincing—but false—image, audio, and video files to augment influence campaigns directed against the United States and our allies and partners.”

Since Coats made the warning, numerous media reports have promoted the concern with little scrutiny, representing just one of the numerous times in U.S. history where narratives first authored by U.S. intelligence are subsequently promoted heavily by U.S. media, even when the claim made by intelligence officials is speculative, as it is in this case. Indeed, the narratives being promoted with respect to the 2020 election involve many of the same intelligence agencies (American and Israeli) and media outlets who promoted claims that were later proven false about “weapons of mass destruction” in Iraq prior to the 2003 invasion, among other pertinent examples.

Notably, deep fakes figured prominently and was the tool most used by malevolent hackers in Cybereason’s 2020 election simulation, which saw both video and audio-only deep fakes used to spread misinformation on national and local TV channels in order to impersonate police officers and election officials and to create fake bomb threats by posing as the terror group Daesh (ISIS). Cybereason also happens to be a partner of the organization funding the most well-known creator and producer of deep fakes in the world, an organization that — much like Cybereason itself — is openly tied to Israeli intelligence.

Aside from deep fakes, other technologies weaponized in Cybereason’s election simulation have also been the subject of several media reports, such as the hacking of Internet of Things (IoT) devices and appliances and even the hacking of vehicles that have some form of internet connectivity.  In the Cybereason simulation, IoT hacks were used to cut power to polling stations and disseminate disinformation while vehicles were hacked to conduct terror attacks against civilians waiting in line to vote, killing several and injuring hundreds.

Most media reports have claimed that these technologies will be part of the coming “explosion” in cyber warfare in 2020 and do not specifically link them to imminent election meddling. Others, however, have made the link to the election explicit.

 

Naming the culprits in advance

In addition to the apparent consensus on how foreign meddling will occur during the 2020 election, there is also agreement regarding which countries will be responsible. Again, this is largely based on statements made by U.S. national security officials. For instance, the joint statement issued last November by the DOJ, DOD, DHS, DNI, FBI, NSA, and CISA regarding 2020 election security, states that “Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions” before adding “at this time we have no evidence.”

Similarly, the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community, written by then-Director of National Intelligence Dan Coats, names these same three countries in relation to imminent 2020 election interference and states that their interference in the 2020 election is “almost certain.” The assessment adds the following about each nation:

  • Russia: “Russia’s social media efforts will continue to focus on aggravating social and racial tensions, undermining trust in authorities, and criticizing perceived anti-Russia politicians.”
  • China: “China will continue to use legal, political, and economic levers—such as the lure of Chinese markets—to shape the information environment. It is also capable of using cyber attacks against systems in the United States to censor or suppress viewpoints it deems politically sensitive.”
  • Iran: “Iran, which has used social media campaigns to target audiences in both the United States and allied nations with messages aligned with Iranian interests, will continue to use online influence operations to try to advance its interests.”

Coats’ assessment was enough to spawn numerous stories on the imminent threat that these three nations pose to the 2020 election, with headlines such as “U.S. intel agencies: Russia and China plotting to interfere in 2020 election.”

The vast majority of warnings regarding future election interference have come from U.S. intelligence officials with a dubious record of trustworthiness and a history of using the media to spread propaganda and disinformation, most famously through Operation Mockingbird. Most — if not all — of the recent and numerous articles on imminent interference rely heavily on claims made by the two aforementioned government documents, documents crafted by U.S. intelligence agencies for public consumption, as well as claims made by anonymous U.S. officials.

A recent New York Times article, for example, titled “Chaos Is the Point’: Russian Hackers and Trolls Grow Stealthier in 2020,” is based almost entirely on “interviews with dozens of officials and experts,” though the only government official named in the article is Shelby Pierson, the intelligence community’s election threats executive. The most quoted experts named in the article are Ben Nimmo, formerly of the hawkish, NATO-funded Atlantic Council and now with Graphika, and Laura Rosenberger, director of the neoconservative-created Alliance for Securing Democracy. The article nonetheless cites “American officials” and “current and former officials” several times to make claims about imminent election interference that paint a bleak picture of the current election season.

A recent article from The Hill relies on the acting head of DHS, Chad Wolf, as its only source, citing Wolf’s claim that “we fully expect Russia to attempt to interfere in the 2020 elections to sow public discord and undermine our democratic institutions” amid other warnings that Wolf gave about Chinese and Iranian cyber threats to U.S. elections. Other articles, including one titled “Russia, China plan to adjust their tactics to hack, influence 2020 elections” cite only Shelby Pierson of the U.S. intelligence community as its source for that headline’s claim. Another titled “Russia isn’t the only threat to 2020 elections, says U.S. intel” cites only anonymous U.S. intelligence officials, as the headline suggests.

Though Russia and China have consistently been named as the most likely election meddlers, reports have also been drumming up the likelihood that Iran will emerge as 2020’s foreign meddler of choice, especially in the months prior to and weeks after the killing of Iranian General Qassem Soleimani by the Trump administration. A recent “informal poll” conducted by the Washington Post asked hawkish think tank fellows, employees at companies like Raytheon and current and former federal officials if Iran would likely retaliate against the U.S. via cyberattack. The Post ran the results of the poll under the headline “Get ready for serious cyberattacks from Iran, experts say.”

Despite the media’s numerous warnings of imminent and “serious” cyber-retaliation from Iran, the only cyberattack attributed to the country after Soleimani’s death was the vandalism of the Federal Depository Library Program website, a rather benign act that was nevertheless blasted across headlines such as “US government website hacked with pro-Iranian messages, image of bloodied Trump.” The U.S. government is quoted in that article as saying that “At this time, there is no confirmation that this was the action of Iranian state-sponsored actors.”

Also notably absent from media reports is the fact that WikiLeaks revealed in 2017 that the CIA had stockpiled a library of “stolen” cyberattack techniques produced in other nations, including Russia and Iran. Those revelations, part of the Vault 7 release, revealed that the CIA’s UMBRAGE group was capable of “misdirect[ing] attribution [for cyberattacks actually done by the CIA] by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.” In other words, the CIA was more than capable of conducting “false flag” cyber attacks and blaming them on foreign actors.

Notably, one of the viruses being blamed on Iran for cyberattacks targeting the U.S. ahead of the 2020 election — called Shamoon — was “stolen” by the CIA’s UMBRAGE and cited in the WikiLeaks release.

 

Conflict of interest-ridden Microsoft “defends democracy”

Last year saw the tech behemoth Microsoft join the effort to blame foreign state actors, specifically Iran, for cyberattacks against the U.S. This helped to bolster assertions that had largely originated with a handful of U.S. intelligence officials and hawkish, neoconservative-aligned think tanks as media reports on Microsoft’s related claims treated the company as an independent private sector observer.

Yet, as MintPress investigations have revealed, Microsoft has clear conflicts of interest with respect to election interference. Its “Defending Democracy” program has spawned tools like “NewsGuard” and “ElectionGuard” that it claims will help protect U.S. democracy, but — upon closer examination — instead have the opposite effect.

Last January, MintPress exposed NewsGuard’s neoconservative backers and how special interest groups were backing the program in an effort to censor independent journalism under the guise of the fight against “fake news.” Subsequent investigations revealed the risk that Microsoft’s ElectionGuard poses to U.S. voting machines, which it claims to make more secure and how the platform was developed by companies closely tied to the Pentagon’s infamous research branch DARPA and Israeli military intelligence Unit 8200.

ElecionGuard software has since been adopted by numerous voting machine manufacturers and is slated to be used in some Democratic Primary votes. Notably, the push for the adoption of ElectionGuard software has been spearheaded by the recently created Cybersecurity and Infrastructure Security Agency (CISA), which is the federal agency tasked with overseeing election security and is headed by Christopher Krebs, a former high level Microsoft executive.

In recent months, Microsoft has also been at the center of claims that Iran attempted to hack U.S. presidential campaigns ahead of 2020 as well as claims that Iran plans to target the U.S. power grid and other critical infrastructure with cyberattacks.

Last October, Microsoft penned a blog post discussing a “threat group” it named Phosphorus that they “believe originates from Iran and is linked to the Iranian government.” The post went on to claim that Phosphorus attempted to target a U.S. presidential campaign, which later media reports claimed was President Trump’s re-election campaign. Microsoft concluded that the attempt was “not technically sophisticated” and ultimately unsuccessful, but felt compelled to disclose it and link it to Iran’s government.

Though it provided no evidence for the hack or its reasons for “believing” that the attack originated from Iran, media reports treated Microsoft’s declaration as proof that Iran had begun actively meddling in the 2020 election. Headlines such as “Iranian Hackers Target Trump Campaign as 2020 Threats Mount,” “Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says”, “Microsoft: Iran government-linked hacker targeted 2020 presidential campaign” and “Microsoft Says Iranians Tried To Hack U.S. Presidential Campaign,” were blasted across the front pages of American media. None of the reports scrutinized Microsoft’s claims or noted the clear conflict of interest Microsoft had in making such claims due to its efforts to see its own ElectionGuard Software adopted nationwide.

Media reports also left out the fact that Microsoft is a major government contractor for the U.S. intelligence community and the Pentagon. Notably, the Trump campaign, which Microsoft said was the target of this attack, was later identified as the only major presidential campaign using Microsoft’s “AccountGuard” software, part of its dubious “Defending Democracy” program that also spawned NewsGuard and ElectionGuard. AccountGuard claims to protect campaign-linked emails and data from hackers.

Microsoft surfaced not long after, again claiming that Iran was maliciously targeting the United States’ civilian infrastructure. This subsequent claim was first published by Wired and later covered by other outlets. Those reports cite a single person, Microsoft security researcher Ned Moran, who claimed that an Iran-backed hacking group called APT33 was targeting the U.S. “physical control systems used in electric utilities, manufacturing, and oil refineries.”

“They’re trying to deliver messages to their adversaries and trying to compel and change their adversaries’ behavior,” Moran told Wired. Moran also stated that “Microsoft hasn’t seen direct evidence of APT33 carrying out a disruptive cyberattack rather than mere espionage or reconnaissance, it’s seen incidents where the group has at least laid the groundwork for those attacks (emphasis added).”

 

Cybereason helps craft the narrative

While U.S. intelligence officials and media outlets alike have been largely responsible for setting the narrative that imminent meddling will be conducted by Russia, China and Iran, key components of that narrative, particularly with respect to China and Iran, have been laid by Cybereason, a company that recently ran 2020 doomsday election simulations and that has close ties to the intelligence communities of both the U.S. and Israel.

Shortly after the killing of Iranian General Qassem Soleimani earlier this month, an operation conducted in concert with Israeli intelligence, Cybereason warned that Iran could imminently retaliate with a cyber threat and quoted its own employees who explained what and how Iran would likely target in retaliation. Cybereason’s CSO Sam Curry, who actively participated in the firm’s 2020 doomsday election simulations, stated:

 This means that Iran’s “forceful revenge” response is likely to be less about the flash and all about the bang. If you have connected systems that are responsible for kinetic world effects, like ICS systems and critical infrastructure around water, energy or vital services, it’s time to pay attention. Iran and the US are engaged in Cyber brinksmanship, which means that the gloves are off as Iran picks it’s targets (emphasis added).”

Cybereason also quoted visiting fellow for the National Security Institute and former advisor to the U.S. Secret Service (which participated in Cyberaeson’s election simulations), Anne Marie Zettlemoyer, who claimed that Iran could soon target Wall Street and critical U.S. infrastructure like the power grid:

 An attack against the financial systems can be devastating economically and weaken the confidence and viability of markets. However, we cannot ignore the physical consequences and manifestations that can come from a cyberattack, particularly against critical infrastructure like energy and industry control systems.”

Cybereason’s claims regarding Iran’s interest in “critical infrastructure” systems likely originated with Microsoft, the claims were then parroted by the media in several reports, many of which quoted Cybereason’s Sam Curry. Curry is also a contributor to major news outlets like Forbes where he writes about Iran’s cyber warfare capabilities. 

Notably, in Cybereason’s recent allegations against Iran, it states that “it’s clear that Iran has been preparing for future geopolitical conflict by gaining access to critical infrastructure and other important operations in the United States.” It backs these claims by citing an article authored by Curry for Forbes. Following Soleimani’s death, numerous media reports, including in the UK’s The Independent and ABC News, have cited Curry as an “expert” source in claiming that Iran would retaliate with cyberattacks.

Microsoft’s claims about foreign hackers and meddling — the evidence for which have never been made public but has been parroted as fact nonetheless — are frequently supported by Cybereason.

Last August, Microsoft claimed to have foiled Russian attempts at hacking two Republican-affiliated think tanks and, despite providing no evidence, Cybereason’s then-senior director of intelligence services Ross Rustici was quoted as an expert in several media reports as saying that such behavior was to be expected from Russia. In one such report, Rustici stated:

We’re very good at fighting the last war, but the Russians are very good at evolving their game. I suspect if they’re going to do a psychological operation around the elections, the way they do it will be different than what they did in 2016. How effective the defenses we’ve built for what they did in 2016 will be for those attacks is yet to be seen.”

None of the media reports quoting Rustici mentioned Cybereason’s ties to Israeli intelligence, referring to tech firms only a “Boston-based cybersecurity company” and similar variants. Cybereason’s Intelligence Group is stuffed with former and active members of U.S. and Israeli intelligence services and has released several reports about nation-state hacking with a focus on Russia and China.

Cybereason has also been at the forefront of claims that China has been engaged in aggressive cyberattacks against multinational companies that have also seen widespread coverage in U.S. media, despite the untransparent nature of the evidence for Cybereason’s claims.

In a story that received major coverage from outlets such as Fox News, Reuters, CNBC and others, Cybereason unveiled what it called “Operation Soft Cell,” an operation that stole mass troves of data from several global telecommunications companies. In each story, Cybereason is the sole source of the claim and declined to provide the name or location of any of the affected companies. The firm also claimed to have determined that the attack was likely perpetrated by someone “backed by a nation state, and is affiliated with China.” It further claimed to have debriefed and coordinated responses with U.S. intelligence.

In an article for Reuters, Cybereason stated that “this time as opposed to in the past we are sure enough to say that the attack originated in China” while Cybereason separately told CyberScoop that it had “found hacking tools such as a modified web shell and a remote access trojan that are commonly associated with, but not unique to, Chinese hackers.” Despite the incongruity, media reports laid the blame squarely on China, as seen in headlines such as “Chinese spies have been sucking up call records at multinational telecoms, researchers say.”

Prior to uncovering Operation Soft Cell, Cybereason had warned on its blogs in the months and years prior that China would imminently target U.S. companies. The revelation of Operation Soft Cell — which originated exclusively with Cybereason — has been used to build the case that China is openly engaged in cyberwarfare against its rival states, like the United States, and targeting “democracy itself.”

 

Best Known Deep Fake Creator is Funded by Israeli Intelligence

While the media, and even Cybereason itself, have helped lay the foundation to blame specific state actors for 2020 election meddling well ahead of the fact, it is worth revisiting Cybereason’s “Operation Blackout” election simulation and the tactics used by the “bad actors” in that scenario.

That simulation, discussed in detail in the first installment of this series, saw the weaponization of specific technologies, namely deep fakes, hacks of Internet of Things (IoT) devices and hacks of vehicles, in order to target the 2020 U.S. election, resulting in the cancellation of the election and the imposition of martial law.

Given the current narrative regarding what state actors are likely to meddle in the 2020 election — namely Russia, China and Iran — and the tactics they will allegedly use, it is important to explore the sources of the technologies weaponized per that narrative as well as in “Operation Blackout.”

Indeed, if there is any clear overlap between the creators of those technologies and the state actors being blamed in advance for their imminent use, it would certainly lend credibility to the claims promoted by U.S. intelligence, the media and companies like Microsoft and Cybereason.

Yet, upon closer examination, it becomes clear that the companies and state actors most involved in developing these technologies are the very ones claiming that Russia, China and Iran will use them to undermine the 2020 election.

Take for instance the use of deep fakes. Not only have numerous media reports focused on how deep fakes will be used to meddle in the 2020 elections, but Cybereason’s doomsday election simulation saw “bad actors” rely heavily on their use to spread disinformation and even make fake bomb threats. While much has been said of the coming election and deep fakes, remarkably few reports have bothered to look at the company best known for creating viral deep fakes.

Canny AI has garnered considerable media attention over the past few years for its persuasive deep fake videos that have frequently gone viral. In the last year alone, the tech firm’s viral deep fakes have included a controversial video of Mark Zuckerberg where the Facebook co-founder appears to be saying “Imagine this for a second: One man, with total control of billions of people’s stolen data, all their secrets, their lives, their futures,” as well as a video showing Richard Nixon giving a speech he never actually gave. More recently, Canny AI was behind the viral videos immediately prior to the 2019 U.K. general election that appeared to show Jeremy Corbyn and his rival Boris Johnson endorsing each other and another video that showed world leaders singing John Lennon’s “Imagine”:

Oddly, many of the media reports that discuss these viral videos fail to mention the role of Canny AI in creating these viral deep fakes and instead only mention the organization or artists with whom Canny AI partnered to create them. For instance, the Corbyn-Johnson videos were reported to have been produced by the group Future Advocacy and artist Bill Posters, but it was actually Canny AI that created those videos for that group. Similarly, the Nixon Speech deep fake was reported by several outlets as having been solely created by MIT’s Center for Advanced Virtuality. However, the Boston Globe noted that “the [MIT] team worked with Canny AI, an Israeli company that does Video Dialogue Replacement, and Respeecher, a Ukrainian startup specializing in speech-to-speech synthetic voice production” to create the video.

The Zuckerberg deep fake that Canny AI created led to lots of positive press for the company, with several media reports dubbing them as the company using “deep fakes for good” and that uses the controversial technology “responsibly.” The Zuckerberg deep fake has been cited as one of the main drivers behind Facebook’s new “deep fake” policy, which only bans some deep fake videos and has been criticized by U.S. lawmakers as insufficient. Notably, neither Facebook nor Facebook-owned Instagram ever took down Canny AI’s deep fake of Zuckerburg.

Given the concern over deep fakes in relation to the coming election and Canny AI standing out as the main producer of deep fakes that have gone viral over the past year, it is important to point out that Canny AI has ties to a state actor with a history of election meddling: the state of Israel.

Indeed, Canny AI is 100 percent funded by an Israeli start-up accelerator called Xcelerator, a joint venture between Tel Aviv University and Israeli intelligence agency Shin Bet (sometimes called Shabak). According to Start Up Nation Central, the Paul Singer-created organization that promotes Israeli technology start ups, Xcelerator-funded “start-ups participating in the program benefit from close mentoring from content and technology experts from the Shabak, experts from Tel Aviv University, and industry leaders. The connection to the Shabak also provides the entrepreneurs with ways to test the capabilities of their technologies and cooperation opportunities (emphasis added).”

In addition, Xcelerator is partnered not only with Israeli intelligence directly, but also with Cybereason, the very company that explored the use of deep fakes in the 2020 U.S. presidential election that saw the election cancelled and martial law declared as well as a company that itself has deep ties to Israeli intelligence. Other notable partners of Xcelerator include NEC Corp, which has intimate ties to top Cybereason investor Softbank; Check Point Technologies, which has ties to Israeli military intelligence Unit 8200; and the Israeli start-up accelerator Team8. In previous reports published by MintPress, Team8 was discussed in detail, particularly their recent hire of former director of the NSA and former head of U.S. Cyber Command Mike Rogers, and their close ties to Paul Singer’s Start Up Nation Central, which itself has deep ties to U.S. neoconservatives.

It is also worth noting that Xcelerator also backs an “anti-fake news” start-up called Cyabra, which has direct ties to Israel’s Mossad and offers its AI-driven “disinformation protection” to government agencies as well as politicians, particularly during election seasons. Two of Cyabra’s co-founders previously co-founded Psy-Group, which attempted to interfere in the 2016 U.S. election by weaponizing “fake news” and social media and later closed down its operations after U.S. government scrutiny into its activities began as part of the Mueller investigation.

Psy-Group also engaged in doxxing campaigns targeting Palesintian rights activists in the U.S. which were planned in conjunction with Ram Ben-Barak, the former deputy director of the Mossad who now advises Cyabra. Given that much of the concern ahead of the next election is related not only to deep fakes but also “fake news,” Cyabra’s rise and its clear ties to Mossad and the now defunct Psy-Group are important to note.

Furthermore, in examining the other technologies weaponized during Cybereason’s 2020 election simulation and cited in the aforementioned media narrative regarding 2020 meddling, a pattern similar to that of Canny AI emerges.

Indeed, the other technologies linked to these “bad actors” and foreign meddlers — namely hacking IoT devices and hacking vehicles — are also pioneered by companies with deep ties to Israeli military intelligence, specifically Unit 8200, and Israeli tech companies that have aggressively spied on U.S. government institutions in collusion with Israeli intelligence in the past, namely Comverse (now Verint) and Amdocs.

 

Hacking the Internet of Things

In Cybereason’s doomsday election simulation, another of the tactics used was the hacking of devices and appliances connected to the internet, often referred to as the Internet of Things (IoT) and which includes everything from smartphones to power grid infrastructure to city traffic lights.

While most reports on IoT hacks to date have focused on “lone wolf” or non-state-aligned actors, one company has stood out for its efforts to create a tool that would allow governments and intelligence agencies to hack these devices with ease. That company, called Toka, announced in 2018 that it planned to offer “a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain,” with “a special focus on [hacking] the so-called Internet of Things (IoT), covering tech like Amazon Echo, Nest connected home products, as well as connected fridges, thermostats and alarms.”

The Israel-based company, which raised $12.5 million within months of launching, has since been busy marketing its services to governments around the world, most recently France where it described its product portfolio as “empower[ing] governments, Intelligence, and law enforcement agencies to enhance Homeland Security with groundbreaking cyber-intelligence and operational capabilities” during an exposition in Paris last November.

Even though Toka openly markets the ability to hack private consumer devices to governments and law enforcement agencies around the world, the clear threat to privacy has gone ignored by media outlets as the company has garnered nearly no media attention since it launched nearly two years ago.

Yet, Toka is not only notable for what it offers but also for its founders and investors. Indeed, the co-founders of Toka have been described as an “all-star” team, largely because of the role of former Israeli Prime Minister and former head of Israeli military intelligence, Ehud Barak. Barak, in addition to co-founding the company, serves as its director and is also the chairman of the board of the controversial Israeli company Carbyne911, which markets software to emergency call centers in the United States. Interestingly, Cybereason’s 2020 doomsday election simulation also dealt with the hacking and weaponization of 911 call centers. Also of note is the fact that another of Carbyne911’s leadership team, former Unit 8200 commander Pinchas Buchris, is an adviser to Cybereason.

Toka’s top brass is a who’s who of former Israeli military and intelligence officials

In addition to Barak, Toka was co-founded by retired Brigadier General Yaron Rosen, former Chief of the IDF’s cyber staff, where he was “the lead architect of all [IDF] cyber activities” including those executed by Israeli military intelligence Unit 8200. Rosen, who now serves as Toka’s CEO, has stated that Toka’s technology will only be sold to countries allied with the U.S. and Israel, telling Forbes that “Russia, China and ‘other enemy countries’ would never be customers.”

Toka’s leadership and software architects are similarly tied into Israel’s national security state. Several — including the “architect” of its hacking software — previously worked for Israel’s Prime Minister’s Office and developed “offensive technologies” for Israel’s head of state and other top Toka employees and executives share numerous connections to Unit 8200, other divisions of Israeli military intelligence and Unit 8200-connected tech companies like Check Point Technologies.

Though Toka’s leadership team makes its ties to Israeli military intelligence abundantly clear, important connections also appear in examining Toka’s investors. One of the major investors in Toka is Dell technologies, one of the world’s largest technology companies that was founded by Michael Dell, a well-known pro-Israel partisan who has donated millions of dollars to the Friends of the IDF and one of the top supporters of the so-called “anti-BDS” bills that prevent publicly employed individuals or public institutions from supporting non-violent boycotts of Israel, even on humanitarian grounds. It goes without saying that a major technology company investing in a company that markets the hacking of that very technology (computers, IoT, smartphones, etc.) should be a red flag.

With a major foot in the door through its connections to Dell, whose products are used by the private and public sectors around the world, other investors in Toka again reveal its ties to Israel’s military intelligence and the same controversial Israeli tech companies that have aggressively spied on the U.S. government in the past — Amdocs and Comverse. For instance, Entrèe Capital, a venture capital fund that is one of Toka’s main investors, is managed by Aviad Eyal and Ran Achituv. The latter, who manages Entrée’s investment in Toka and sits on Toka’s board of directors, is the founder of the IDF’s satellite-based signals intelligence unit and also a former senior Vice President at both Amdocs and Comverse Infosys (Verint).

Another notable investor in Toka is the venture capital firm Andreesen Horowitz, which is advised by former Secretary of the Treasury Larry Summers, a close friend of the infamous pedophile Jeffery Epstein, whose own ties to Israeli military intelligence have been discussed in several MintPress reports. Epstein was also a close friend of Ehud Barak, co-founder and director of Toka, and invested at least $1 million in another company with close ties to Barak, Carbyne911. The remaining investors in Toka are Launch Capital, which is deeply tied to the Pritzker family — one of the wealthiest families in the U.S. with close ties to the Clintons and Obamas as well as the U.S.’ pro-Israel lobby, and Ray Rothrock, a venture capitalist who spent nearly three decades at VenRock, the Rockefeller family venture capital fund.

 

Unit 8200 – From Hacking Cars to Protecting Them?

Arguably the most disturbing aspect of Cybereason’s “Operation Blackout” election simulation was the hacking of vehicles that were then rammed into civilians waiting in line to vote at polling stations. In the simulation, this led to scores of dead Americans and hundreds of injuries.

As was the case with other technologies used to undermine the 2020 election in the simulation, this technology — the hacking of vehicles — is the bread and butter of an Israeli cybersecurity firm called Upstream Security that specializes in automobiles and boasts deep ties to the country’s military intelligence service.

Though vehicle hacking seemed out of left field when the 2020 election simulation took place last November, media reports about the imminent dangers of “car hacking” began to emerge just a month after the exercise took place, most of which cited a December 2019 report created by Upstream. Some of those reports have warned that car hacking could be used to undermine the coming U.S. election.

One report titled “Car Hacking Hits the Streets,” cites only Upstream’s report to claim that “In 2020, the connected-car market will reach a tipping point, with the majority of vehicles already connected to the Internet when sold in the United States, representing a large base of potential targets for attacks.” Another report, titled “New study shows just how bad vehicle hacking has gotten,” uses Upstream’s report (i.e. study) to claim that hacks of regular vehicles have exploded since 2016 and that most of the cars on U.S. roads today are vulnerable to hackers and that over 80 percent of those hacks occur remotely.

Neither report noted Upstream’s ties to Israeli military intelligence. Equally notable is the fact that both reports that covered the Upstream-written study say that only manufacturers can address the problem by partnering with a company like Upstream.

Lucky for Upstream, they have already partnered with a slew of auto manufacturers, including Hyundai, Volvo, Renault and even U.S. auto insurance giants like Nationwide, who now number among Upstream’s most important investors. The company’s original investors are Charles River Ventures, one of Cybereason’s first investors, and Israeli venture capital firm Glilot Capital.

Glilot Capital’s interest in Upstream is telling given the firm’s deep ties to Israel’s Unit 8200. Glilot was founded by two former Israeli military intelligence officers and has “a heavy focus on the cyber sector and the entrepreneurs who emerge from the elite Unit 8200,” according to the Jerusalem Post. Even the name of the firm is an homage to Unit 8200, as the unit’s main base is located in Glilot, near Herzliya.

“It’s as if Americans called a VC Fort Meade Capital [the US Army base in Maryland where the National Security Agency and the United States Cyber Command are headquartered], some VC names are meant to be symbolic, as in our case. Glilot is the home of several of the best intelligence and technology units in the IDF, it’s where we came from and it is where we find our best entrepreneurs,” Glilot Capital co-founder Arik Kleinstein told the Jerusalem Post in 2016.

Upstream is certainly the type of company that Glilot Capital is used to investing in. It was founded by two Israelis who both served in the IDF, with one of them serving in an elite intelligence unit. Upstream’s co-founders, Yoav Levy and Yonathan Appel, met while working at Check Point Technologies, the Unit 8200 alumni-founded company with deep ties to Israel’s military intelligence and military-industrial complex as well as the IoT hacking company Toka. Notably, Upstream recently partnered with the Japanese company Fujitsu, a longtime partner with Softbank — Cybereason’s main investor.

Softbank has also invested heavily in another Unit 8200-founded vehicle security start-up called Argus Cyber Security, a firm known for its numerous demonstrations showing how easy it is to hack vehicles. Argus is also backed by Nadav Zafrir, the former Unit 8200 commander who now runs Team8. Argus’ CEO Ofer Ben-Noon, a former captain in Unit 8200, told Forbes in 2014 that “Everything will be hacked in every single [car] brand. It will take time, it might be weeks, months, or a couple of years, but eventually it will happen.”

Since then, Unit 8200 alumni from Argus, Upstream and other Israeli automobile cybersecurity firms have shown media outlets around the world how much easier hacking vehicles has become in the years since Ben-Noon first made the claim. One such report from VICE includes a vehicle hacking demonstration, courtesy of a Unit 8200 alumni, and notes that “most cars today are susceptible to hacker attacks.”

Of course, Unit 8200 isn’t the only intelligence agency known to be experts at hacking vehicles. Indeed, in 2017, WikiLeaks revealed that the CIA was capable of hacking vehicles and exploring their use in committing “undetectable assassinations.”

 

“Bring down nations to their knees”

At the Tel Aviv Cybertech Conference in 2017, Israeli Prime Minister Benjamin Netanyahu stated the following:

Today warfare has changed dramatically…With a click of a button, you can bring down nations to their knees very rapidly if you so desire and if you’re willing to take the risks, because every system can be hacked. Our hospitals, our airplanes, our cars, our banks. The most important word here is our data banks, they can be hacked.”

Media reports and even members of the Israeli public and private sector have openly acknowledged that Israel’s intelligence apparatus — from Unit 8200 to the Mossad — remains directly linked to many of the private technology companies founded by its former members, especially in the field of cybersecurity. Though reports on the matter often praise this merging of Israel’s public and private spheres, they rarely acknowledge the documented corruption within Unit 8200, the unit’s dark past in recruiting felons and even pedophiles to join its ranks, or the danger posed by having companies directly linked to foreign intelligence being given access to the U.S. government’s most classified and sensitive systems and data.

The last omission is particularly troubling given that Israeli intelligence has not only been caught aggressively using private tech companies to spy on U.S. federal agencies and networks, but also intercepting the private communications of at least two U.S. presidents and using a notorious pedophile to sexually blackmail American politicians.

As was mentioned in the first installment of this series, Cybereason’s CEO Lior Div offers a clear example of this worrisome bridge between Israel’s public and private sector, as Div has openly stated that he views his work at Cybereason as a “continuation” of his service to Israeli military intelligence, where he led offensive cyberattacks against other nations.

Given Div’s past statements and his company’s clear ties to both Israeli and U.S. intelligence, Cybereason’s simulation of the 2020 U.S. election — which involved terrorist attacks and led to the election’s cancellation and the imposition of martial law — is highly concerning. This is particularly so considering that Cybereason’s investors have direct ties to individuals who would benefit from the election’s cancellation and also considering the clear narrative that has emerged in recent months regarding how the coming election will inevitably fall victim to tech-driven “chaos” in coming months.

The clear overlap between Cybereason’s simulation and the intelligence-driven media narrative is clear cause for concern, especially considering that the technologies that they highlight as ultimately upending the election are dominated by the very same intelligence agencies simulating and crafting that narrative.

The keyword that has been used to describe the end result of both Cybereason’s simulation and the prevailing media narrative regarding the 2020 election is “chaos,” chaos so imminent, widespread and unruly that it will shake American democracy to its core.

What has been left unsaid, however, is that a government’s solution to “chaos” is always the imposition of “order.” This means that — whatever “chaos” ultimately ensues prior to or on election day — will result in a government response that will do much more to crush freedom and undermine democracy than any act of foreign meddling has, be it real or imagined.

Minority Report (2002) Esoteric Analysis

By Jay Dyer

Source: Jay’s Analysis

Spielberg’s Minority Report is now an important film to revisit.  Based on the short story by visionary science fiction author Phillip K. Dick, Spielberg’s film version implements an important number of predictive programming elements not found in Dick.  Both are worth a look, but the film is important for JaysAnalysis, since now 13 years later, we are actually seeing the implementation of the total technocratic takeover, including pre-crime tracking systems.

Although the film and the short story present the precognition as a metaphysical mystery by telepathic individuals who can see into the aether, the real pre-crime systems are based on A.I. and the digitizing of all records under total information awareness.  And as I’ve said, this was DARPA’s plan for the Internet all along.

In fact, a good friend of mine worked for a few years digitizing mass medical records, and while most are aware of Google’s attempts to digitize all books, most do not know why.  I’ve warned for several years now the end goal of all this digitization is not for “efficiency” and trendy techy cool iWatches to monitor heart rates and location.  The ultimate goal is total mind control, loss of free will and the complete rewrite of all past reality.

Consider, for example, the power the system will wield with the ability to “delete” all past versions of literature – religious texts, Shakespeare, 1984, nothing will be sacred and unable to be “revised.”  Remember that in 2009 Amazon erased Orwell’s 1984.  Your own past may even be deleted, subject to revision or altered to make you the next villain!  All this is revealed in detail in Minority Report.  Thus, while the public adopts “Kindles,” print itself is assigned the doom of the kindled fire – like Farenheit 451, as Richard Grove has said.

Minority Report’s setting is a 2055 dystopic D.C., where Agent John Anderton (Tom Cruise) is framed for two murders from within his own PreCrime Corporation ranks by the CEO, Lamar Burgess (Max Von Sydow). (Note: The existing system appears to be a merger of private and government sectors.)   I’m sure most readers have seen the film, so I’ll spare you detailed plot recaps and hit the highlights for the sake of our purposes.

The film’s PreCrime alerts a private corporation to a predetermined murder event ahead of time, giving the Agents of the corporation time to save victims.  Hailed as a perfect system, the infallibility of PreCrime has made D.C. the safest city in the world, with no murders for several years.  As a result, the PreCrime test requires a total surveillance society, something akin to complete panopticism.  In fact, the advertising in D.C. is user specific, targeting pedestrian’s personal desires based on retina scans – and all travel requires retinal scanning and mass microchipping.

We are now on the verge of the implementation of retinal scanning, as the U.S. military has engaged in retinal scanning in occupied territories for several years now.  It is important to understand that the action of the military abroad are often a test ground for the implementation of such surveillance and tracking technology at “home.”  In October 2010, the Guardian reported of U.S. troops stationed in Afghanistan:

“With each iris and fingertip scanned, the device gave the operator a steadily rising percentage chance that the goat herder was on an electronic “watch list” of suspects. Although it never reached 100%, it was enough for the man to be taken to the nearest US outpost for interrogation.

Since the Guardian witnessed that incident, which occurred near the southern city of Kandahar earlier this year, US soldiers have been dramatically increasing the vast database of biometric information collected from Afghans living in the most war-torn parts of southern and eastern Afghanistan. The US army now has information on 800,000 people, while another database developed by the country’s interior ministry has records on 250,000 people.”

Wired Magazine reported millions were the goal.  The goal is not millions, but the entire globe, where any and all information is now currency for “big data.”  This is exactly the world Minority Report foresaw, and for those curious about Phillip K. Dick, whispers are his foresight was due to being well-connected with the Silicon Valley elites.  This is how Ubik foresaw the “Internet of Things” I’ve written about many times, and probably in part why Dick went insane (or was targeted).  Slate writes of Ubik:

“Samsung, the world’s largest manufacturer of televisions, tells customers in its privacy policy that “personal or other sensitive” conversations “will be among the data captured and transmitted to a third party” through the TV’s voice-recognition software. Welcome to the Internet of Things.

Sci-fi great Philip K. Dick warned us about this decades ago. In his classic 1969 novel Ubik, the characters have to negotiate the way they move and how they communicate with inanimate objects that monitor them, lock them out, and force payments.”

Just as the predictive algorithm in Asimov’s Foundation was able to track mass movements, so now the same algorithmic tracking is in place across the “web of things” that are capable of being recorded and tracked – and that’s most things.  The Pentagon has a virtual “you” in a realtime 3D interface that updates its data consistently from everything done on the web.  The Register reported in 2009 about this simulated warfare and predictive software:

“Defense analysts can understand the repercussions of their proposed recommendations for policy options or military actions by interacting with a virtual world environment,” write the researchers.

“They can propose a policy option and walk skeptical commanders through a virtual world where the commander can literally ‘see’ how things might play out. This process gives the commander a view of the most likely strengths and weaknesses of any particular course of action.”

It’s not telepathic Samantha Morton’s in a tub of goo, it’s Google and DARPA developing highly advanced technology along the lines of what William Binney exposed, as a former NSA employee.  Think here of War Games (1983), where the A.I. bot was able to war game future scenarios of global thermonuclear war, but thankfully Ferris Bueller was there to save us.  If this was displayed in 1983 in pop culture, imagine how far that technology has come 30 years later.  Lest anyone think the “precrime” is merely for security and weekend Xbox enjoyment, recall what I wrote two years back:

“Capitalism, communism, nationalism, 401ks, blah blah blah, all of these things are basically obsolete. Why?  Because of the nature of the real secret high-tech and plans for mega SmartCities that are to come.  You see, you think you are getting ahead and climbing the scum social ladder, and you aren’t even aware that the CEO of IBM Ginni Rommety gives lectures about SmartCities where everything you do will be rationed, tracked and traced by the central supercomputers, with pre-crime determining whether you are guilty of crimethink.  So everything you are trusting in is already obsolete.  You think I’m exaggerating?  On the contrary, you and your children’s futures are determined (you don’t have a future), and if you are allowed to live past the great culling, you will essentially be boxed into a giant WalmartTargetGameStopUniversity City that will literally be run by a supercomputer. Watch for yourself:”

And lest anyone think PreCrime is a thing of the future, consider that it has been used for two years in the U.K.  The New Scientist and 21stCenturyWire report:

“That’s the hope of police in the US, who have begun using advanced software to analyse crime data in conjunction with emails, text messages, chat files and CCTV recordings acquired by law enforcement. The system, developed by Wynyard, a firm based in Auckland, New Zealand, could even look at social media in real time in an attempt to predict where the gang might strike next.

“We’re trying to get to the source of the mastermind behind the criminal activity, that’s why we’re setting up a database so everybody can provide the necessary information and help us get higher up the chain,” says Craig Blanton of the Marion County Sheriff’s Office in Indiana. Because Felony Lane Gang members move from state to state to stay one step ahead, the centralised database is primed to aggregate historical information on the group and search for patterns in their movements, Blanton says.

“We know where they’ve been, where they are currently and where they may go in the future,” he says. “I think had we not taken on this challenge, we along with the other 110 impacted agencies would be doing our own thing without better knowledge of how this group operates.”

It’s not the only system that police forces have at their disposal. PredPol, which was developed by mathematician George Mohler at Santa Clara University in California, has been widely adopted in the US and the UK. The software analyses recorded crimes based on date, place and category of offence. It then generates daily suggestions for locations that should be patrolled by officers, depending on where it calculates criminal activity is most likely to occur.”

Returning to the film, an interesting tidbit occurs about three times that I noticed.  Any time Anderton or his fellow Agents access the “Temple,” the holding site of the telepathic PreCogs, the sound made is distinctly the iPhone power on sound.  The first iPod premiered in 2001, so I’m assuming it’s the same sound for turning on, but readers can correct me.  I find it curious if not, since the sound would likely be chosen for a reason. This puts the infamous 1984 Apple ad in a new, ominous light.

If you’ve seen the important Spike Jonze film, Her, you’ll see why.  In Her, lead character Theodore (Joaquin Phoenix) falls in love with an iOS – his operating system.  The iOS of his future is an intelligent software system with capability for learning (like the A.I. in War Games), and ultimately transcends its own limitations.

I bring this up because Minority Report is distinctly dominated by eye imagery.  While seemingly insignificant, it is my opinion that Siri and Apple in particular are crucial in the implementation of the coming new order.  Apple ads have contained a distinctly esoteric and significant cultural referent.  This is not to say Microsoft or any of the other tech giants are insignificant, on the contrary, I believe they are all arms of one entity and the appearance of competition is largely illusory.

There is only one military industrial complex, and DARPA and Google and Apple and Microsoft are all its children.  The façade of competition is enough to advance the technology by the tech nerds that serve it, but in the end, it all serves the same system.  My point here is that the iPhone is much more than an iPhone. It is actually an EYEphone, functioning as the eye of Sauron himself, as A.I. reconnaissance before the takeover.

I have mentioned before the whispers are the iPhone of the next few years will contain a Siri that communicates with you like a personal assistant.  I have finally found an article on this here, which describes it directly in connection to Her, like I said here.  “Viv” will do the following:

“On the other hand, not only will Viv recognize disparate requests, she will also be able to put them together. Basically, Viv is Siri with the ability to learn. The project is being kept heavily under wraps, but the guys at Viv have hinted that they’re working towards creating a “global brain,” a shared source of artificial intelligence that’s as readily accessible as heat or electricity.  It’s unclear how soon a breakthrough of this magnitude can happen. But if this team made Siri, you can bet their next project is going to blow the tech world to pieces.”

In order to endear the public to that idea, a prototype Siri had to be offered.  While this may be a rumor, it will eventually come.  And the dystopic scenario presented in Her will meet the nightmare of Minority Report.  For now, it all seems harmless (though we are seeing a generation of youth destroyed by screens and pads – Steve Jobs didn’t let his own kids play with an iPad!), but the end goal I assure is nefarious.

The dominant ideology of these tech giants is pure and total dysgenics (not eugenics).  In order for the total rewrite to come, the existing structure must be destroyed.  The “old way” of doing things will be scapegoated as the technocracy replaces it, offering utopia and salvation, but the synthetic rewrite is a Trojan horse.  Humanity will be enslaved in the same virtual Matrix Anderton is enslaved in, in the film.

The film’s tag line, which pops up numerous times in the story, is about running.  “Everybody runs,” and John spends most of the film on the run from the very system he operated.  The film asks the question multiple times, “Can you see?” and when we think of this on a deeper level in terms of predictive programming, I think we are intended to look beyond the immediate narrative.  There are also numerous hat tips to Blade Runner, where again the “running” imagery comes to the fore.  Can we run from the panopticon?  Do we have eyes to see the iEYES that are “infallibly” surveilling us perpetually?

How the CIA, Mossad and “the Epstein Network” are Exploiting Mass Shootings to Create an Orwellian Nightmare

Graphic by Claudio Cabrera

By Whitney Webb

Source: Mint Press News

Following the arrest and subsequent death in prison of alleged child sex trafficker Jeffrey Epstein, a little-known Israeli tech company began to receive increased publicity, but for all the wrong reasons. Not long after Epstein’s arrest, and his relationships and finances came under scrutiny, it was revealed that the Israeli company Carbyne911 had received substantial funding from Jeffrey Epstein as well as Epstein’s close associate and former Prime Minister of Israel Ehud Barak, and Silicon Valley venture capitalist and prominent Trump backer Peter Thiel.

Carbyne911, or simply Carbyne, develops call-handling and identification capabilities for emergency response services in countries around the world, including the United States, where it has already been implemented in several U.S. counties and has partnered with major U.S. tech companies like Google. It specifically markets its product as a way of mitigating mass shootings in the United States without having to change existing U.S. gun laws.

Yet, Carbyne is no ordinary tech company, as it is deeply connected to the elite Israeli military intelligence division, Unit 8200, whose “alumni” often go on to create tech companies — Carbyne among them — that frequently maintain their ties to Israeli intelligence and, according to Israeli media reports and former employees, often “blur the line” between their service to Israel’s defense/intelligence apparatus and their commercial activity. As this report will reveal, Carbyne is but one of several Israeli tech companies marketing themselves as a technological solution to mass shootings that has direct ties to Israeli intelligence agencies.

In each case, these companies’ products are built in such a way that they can easily be used to illegally surveil the governments, institutions and civilians that use them, a troubling fact given Unit 8200’s documented prowess in surveillance as a means of obtaining blackmail and Israel’s history of using tech companies to aggressively spy on the U.S. government. This is further compounded by the fact that Unit 8200-linked tech companies have previously received U.S. government contracts to place “backdoors” into the U.S.’ entire telecommunications system as well as into the popular products of major American tech companies including Google, Microsoft and Facebook, many of whose key managers and executives are now former Unit 8200 officers.

Israeli Prime Minister Benjamin Netanyahu has made it no secret that placing Unit 8200 members in top positions in multinational tech companies is a “deliberate policy” meant to ensure Israel’s role as the dominant global “cyber power”, while also combating non-violent boycott movements targeting Israel’s violations of international law and stifling the United Nations’ criticisms of Israeli government policy and military operations abroad.

As Jeffrey Epstein’s links to intelligence in both the United States and Israel — the subject of a recent four-part series exclusive to MintPress — began to be revealed in full, his financing of Carbyne came under scrutiny, particularly for the company’s deep ties to Israeli intelligence as well as to certain Americans with known connections to U.S. intelligence. Ehud Barak’s own role as both financier and chairman of Carbyne has also added to that concern, given his long history of involvement in covert intelligence operations for Israel and his long-standing ties to Israeli military intelligence.

Another funder of Carbyne, Peter Thiel, has his own company that, like Carbyne, is set to profit from the Trump administration’s proposed hi-tech solutions to mass shootings. Indeed, after the recent shooting in El Paso, Texas, President Trump — who received political donations from and has been advised by Thiel following his election — asked tech companies to “detect mass shooters before they strike,” a service already perfected by Thiel’s company Palantir, which has developed “pre-crime software” already in use throughout the country. Palantir is also a contractor for the U.S. intelligence community and also has a branch based in Israel.

Perhaps most disturbing of all, whatever technological solution is adopted by the Trump administration, it is set to use a controversial database first developed as part of a secretive U.S. government program that involved notorious Iran-Contra figures like Oliver North as a means of tracking and flagging potential American dissidents for increased surveillance and detention in the event of a vaguely defined “national emergency.”

As this report will reveal, this database — often referred to as “Main Core” — was created with the involvement of Israeli intelligence and Israel remained involved years after it was developed, and potentially to the present. It was also used by at least one former CIA official on President Reagan’s National Security Council to blackmail members of Congress, Congressional staffers and journalists, among others.

Given recent reports on the Trump administration’s plan to create a new government agency to use “advanced technology” to identify “neurobehavioral signs” of “someone headed toward a violent explosive act” using data collected by consumer electronic devices, the picture painted by the technology currently being promoted and implemented under the guise of “keeping Americans safe” is deeply Orwellian. In fact, it points directly to the genesis of a far-reaching surveillance state far more extensive than anything yet seen in American history and it is being jointly developed by individuals connected to both American and Israeli intelligence.

 

Demystifying Carbyne

Carbyne911, which will be referred to simply as Carbyne in this report, is an Israeli tech-startup that promises to revolutionize how calls are handled by emergency service providers, as well as by governments, corporations and educational institutions. Not long after it was founded in 2014 by veterans of Israeli military intelligence, Carbyne began to be specifically marketed as a solution to mass shootings in the United States that goes “beyond the gun debate” and improves the “intelligence that armed emergency responders receive before entering an armed shooter situation” by providing video-streaming and acoustic input from civilian smartphones and other devices connected to the Carbyne network.

Prior to Jeffrey Epstein’s arrest in July, Carbyne had been receiving high praise from U.S. and Israeli media, with Fox News hailing the company’s services as the answer to the U.S.’ “aging 911 systems” and the Jerusalem Post writing that the company’s platform offers “hi-tech protection to social workers and school principals.” Other reports claimed that Carbyne’s services result in “a 65% reduction in time-to-dispatch.”

Carbyne’s call-handling/crisis management platform has already been implemented in several U.S. counties and the company has offices not only in the U.S. but also in Mexico, Ukraine and Israel. Carbyne’s expansion to more emergency service provider networks in the U.S. is likely, given that federal legislation seeks to offer grants to upgrade 911 call centers throughout the country with the very technology of which Carbyne is the leading provider. One of the main lobby groups promoting this legislation, the National Emergency Number Association (NENA), has a “strong relationship” with Carbyne, according to Carbyne’s website. In addition, Carbyne has also begun marketing its platform for non-emergency calls to governments, educational institutions and corporations.

Yet, what seemed like the inevitability of Carbyne’s widespread adoption in the U.S. hit a snag following the recent arrest and subsequent death of sex trafficker and pedophile Jeffrey Epstein, who exploited underage girls for the purpose of obtaining “blackmail” on the rich and poweful, an operation that had clear ties to intelligence. Epstein, after his first arrest and light sentence for soliciting sex from a minor in 2007, was tapped by former Israeli Prime Minister and former head of Israeli military intelligence Ehud Barak, to become a key financial backer of Carbyne.

As a result of increased scrutiny of Epstein’s business activities and his ties to Israel, particularly to Barak, Epstein’s connection to Carbyne was revealed and extensively reported on by the independent media outlet Narativ, whose exposé on Carbyne revealed not only some of the key intelligence connections of the start-up company but also how the architecture of Carbyne’s product itself raises “serious privacy concerns.”

MintPress detailed many of Carbyne’s main intelligence connections in Part III of the investigative series “Inside the Jeffrey Epstein Scandal: Too Big to Fail.” In addition to Barak — former Israeli prime minister and former head of Israeli military intelligence — serving as Carbyne’s chairman and a key financer, the company’s executive team are all former members of Israeli intelligence, including the elite military intelligence unit, Unit 8200, which is often compared to the U.S. National Security Agency (NSA).

Carbyne’s current CEO, Amir Elichai, served in Unit 8200 and tapped former Unit 8200 commander and current board member of AIPAC Pinchas Buchris to serve as the company’s director and on its board. In addition to Elichai, another Carbyne co-founder, Lital Leshem, also served in Unit 8200 and later worked for Israeli private spy company Black Cube. The only Carbyne co-founder that didn’t serve in Unit 8200 is Alex Dizengof, who previously worked for Israel’s Prime Minister’s office.

As MintPress noted in a past report detailing Israeli military intelligence’s deep ties to American tech giant Microsoft, Unit 8200 is an elite unit of the Israeli Intelligence corps that is part of the IDF’s Directorate of Military Intelligence and is involved mainly in signal intelligence (i.e., surveillance), cyberwarfare and code decryption. It is frequently described as the Israeli equivalent of the NSA and Peter Roberts, senior research fellow at Britain’s Royal United Services Institute, characterized the unit in an interview with the Financial Times as “probably the foremost technical intelligence agency in the world and stand[ing] on a par with the NSA in everything except scale.”

Notably, the NSA and Unit 8200 have collaborated on numerous projects, most infamously on the Stuxnet virus as well as the Duqu malware. In addition, the NSA is known to work with veterans of Unit 8200 in the private sector, such as when the NSA hired two Israeli companies, to create backdoors into all the major U.S. telecommunications systems and major tech companies, including Facebook, Microsoft and Google. Both of those companies, Verint and Narus, have top executives with ties to Israeli intelligence and one of those companies, Verint (formerly Comverse Infosys), has a history of aggressively spying on U.S. government facilities. Unit 8200 is also known for spying on civilians in the occupied Palestinian territories for “coercion purposes” — i.e., gathering info for blackmail — and also for spying on Palestinian-Americans via an intelligence-sharing agreement with the NSA.

Unlike many other Unit 8200-linked start-ups, Carbyne also boasts several tie-ins to the Trump administration, including Palantir founder and Trump ally Peter Thiel — another investor in Carbyne. In addition, Carbyne’s board of advisers includes former Palantir employee Trae Stephens, who was a member of the Trump transition team, as well as former Secretary of Homeland Security Michael Chertoff. Trump donor and New York real-estate developer Eliot Tawill is also on Carbyne’s board, alongside Ehud Barak and Pinchas Buchris.

Yet, privacy concerns with Carbyne go beyond the company’s ties to Israeli intelligence and U.S. intelligence contractors like Peter Thiel. For instance, Carbyne’s smartphone app extracts the following information from the phones on which it is installed:

Device location, video live-streamed from the smartphone to the call center, text messages in a two-way chat window, any data from a user’s phone if they have the Carbyne app and ESInet, and any information that comes over a data link, which Carbyne opens in case the caller’s voice link drops out.” (emphasis added)

According to Carbyne’s website, this same information can also be obtained from any smartphone, even if it does not have Carbyne’s app installed, if that phone calls a 911 call center that uses Carbyne or merely any other number connected to Carbyne’s network.

Carbyne is a Next-Generation 9-11 (NG911) platform and the explicit goal of NG911 is for all 911 systems nationwide to become interconnected. Thus, even if Carbyne is not used by all 911 call centers using an NG911 platform, Carbyne will ostensibly have access to the data used by all emergency service providers and devices connected to those networks. This guiding principle of NG911 also makes it likely that one platform will be favored at the federal level to foster such interconnectivity and, given that it has already been adopted by several counties and has ties to the Trump administration, Carbyne is the logical choice.

Another cause for concern is how other countries have used platforms like Carbyne, which were first marketed as emergency response tools, for the purpose of mass surveillance. Narativ noted the following in its investigation of Carbyne:

In May, Human Rights Watch revealed Chinese authorities use a platform not unlike Carbyne to illegally surveil Uyghurs. China’s Integrated Joint Operations Platform brings in a much bigger data-set and sources of video, which includes an app on people’s phones. Like Carbyne, the platform was designed to report emergencies. Chinese authorities have turned it into a tool of mass surveillance.

Human Rights Watch reverse-engineered the app. The group discovered the app automatically profiles a user under 36 “person types” including “followers of Six Lines” which is the term used to identify Uyghurs. Another term refers to “Hajj,” the annual Islamic pilgrimage to Mecca. The app monitors every aspect of a user’s life, including personal conversations [and] power usage, and tracks a user’s movement.”

Such technology is currently used by Israeli military intelligence and Israel’s domestic intelligence agency Shin Bet to justify “pre-crime” detentions of Palestinians in the occupied West Bank. As will be noted in greater detail later in this report, Palestinians’ comments on social media are tracked by artificial intelligence algorithms that flag them for indefinite detention if they write social media posts that contain “tripwire” phrases such as “the sword of Allah.”

Carbyne’s platform has its own “pre-crime” elements, such as it’s c-Records component, which stores and analyzes information on past calls and events that pass through its network. This information “enables decision makers to accurately analyze the past and present behavior of their callers, react accordingly, and in time predict future patterns.” (emphasis added)

Concerns have recently been raised that “pre-crime” technology may soon become more widely adopted in the U.S., after President Trump stated that one of his planned solutions to mass shootings in the wake of the recent tragedy in El Paso was for big tech companies to detect potential shooters before they strike.

 

Israeli intelligence, Blackmail and Silicon Valley

Though many of the individuals involved in funding or managing Carbyne have proven ties to intelligence, a closer look into several of these players reveals even deeper connections to both Israeli and U.S. intelligence.

One of Carbyne’s clearest connections to Israeli intelligence is through its chairman and one of its funders, Ehud Barak. Though Barak is best known for being a former prime minister of Israel, he is also a former minister of defense and the former head of Israeli military intelligence. He oversaw Unit 8200’s operations, as well as other units of Israeli military intelligence, in all three of those positions. For most of his military and later political career, Barak has been closely associated with covert operations.

Prior to the public scrutiny of Barak’s relationship to Jeffrey Epstein, following the latter’s arrest this past July and subsequent death, Barak had come under fire for his ties to disgraced film mogul Harvey Weinstein. Indeed, it was Ehud Barak who put Weinstein in contact with the Israeli private intelligence outfit Black Cube, which employs former Mossad agents and Israeli military intelligence operatives, as Weinstein sought to intimidate the women who had accused him of sexual assault and sexual harassment. Former Mossad director Meir Dagan led Black Cube’s board until his death in 2016 and Carbyne co-founder Lital Leshem is Black Cube’s former director of marketing.

After Barak put him in contact with Black Cube’s leadership, Weinstein, according to The New Yorker, used the private spy firm to “‘target,’ or collect information on, dozens of individuals, and compile psychological profiles that sometimes focused on their personal or sexual histories.” In addition, The New Yorker noted that “Weinstein monitored the progress of the investigations personally” and “also enlisted former employees from his film enterprises to join in the effort, collecting names and placing calls that, according to some sources who received them, felt intimidating.”

Yet, more recently, it has been Barak’s close relationship to Epstein that has raised eyebrows and opened him up to political attacks from his rivals. Epstein and Barak were first introduced by former Israeli Prime Minister Shimon Peres in 2002, a time when Epstein’s pedophile blackmail and sex trafficking operation was in full swing.

Barak was a frequent visitor to Epstein’s residences in New York, so often that The Daily Beast reported that numerous residents of an apartment building linked to Epstein “had seen Barak in the building multiple times over the last few years, and nearly half a dozen more described running into his security detail,” adding that “the building is majority-owned by Epstein’s younger brother, Mark, and has been tied to the financier’s alleged New York trafficking ring.” Specifically, several apartments in the building were “being used to house underage girls from South America, Europe and the former Soviet Union,” according to a former bookkeeper employed by one of Epstein’s main procurers of underage girls, Jean Luc Brunel.

Barak is also known to have spent the night at one of Epstein’s residences at least once, was photographed leaving Epstein’s residence as recently as 2016, and has admitted to visiting Epstein’s island, which has sported nicknames including “Pedo Island,” “Lolita Island” and “Orgy Island.” In 2004, Barak received $2.5 million from Leslie Wexner’s Wexner Foundation, where Epstein was a trustee as well as one of the foundation’s top donors, officially for unspecified “consulting services” and “research” on the foundation’s behalf.

In 2015, Barak formed a limited partnership company in Israel for the explicit purpose of investing in Carbyne (then known as Reporty) and invested millions of dollars in the company, quickly becoming a major shareholder and subsequently the company’s public face and the chairman of its board. At least $1 million of the money invested in this Barak-created company that was later used to invest in Carbyne came from the Southern Trust Company, which was owned by Jeffrey Epstein.

In July, Bloomberg reported that Epstein’s Southern Trust Company is identified in U.S. Virgin Islands filings as “a DNA database and data mining” company. Given Carbyne’s clear potential for data-mining and civilian profiling, Epstein’s investment in Carbyne using this specific company suggests that Carbyne’s investors have long been aware of this little advertised aspect of Carbyne’s product.

In a statement to the Israeli newspaper Haaretz, Barak asserted:

I saw the business opportunity and registered a partnership in my control in Israel. A small number of people I know invest in it…Since these are private investments, it wouldn’t be proper or right for me to expose the investors’ details.”

However, Barak later admitted that Epstein had been one of the investors.

MintPress’ recent series on the Jeffrey Epstein scandal noted in detail Epstein’s ties to CIA/Mossad intelligence assets, such as Adnan Khashoggi; CIA front companies, such as Southern Air Transport; and organized crime, through his close association with Leslie Wexner. In addition, Epstein’s long-time “girlfriend” and alleged madam, Ghislaine Maxwell, has family links to Israeli intelligence through her father, Robert Maxwell. While it appears that Epstein may have been working for more than one intelligence agency, Zev Shalev, former executive producer for CBS News and journalist at Narativ, recently stated that he had independently confirmed with two unconnected sources “closely connected to the Epstein story and in a position to know” that Epstein had “worked for Israeli military intelligence.”

Notably, Epstein, who was known for his interest in obtaining blackmail through the sexual abuse of the underaged girls he exploited, also claimed to have “damaging information” on prominent figures in Silicon Valley. In a conversation last year with New York Times reporter James Stewart, Epstein claimed to have “potentially damaging or embarrassing” information on Silicon Valley’s elite and told Stewart that these top figures in the American tech industry “were hedonistic and regular users of recreational drugs.” Epstein also told Stewart that he had “witnessed prominent tech figures taking drugs and arranging for sex” and claimed to know “details about their supposed sexual proclivities.”

In the lead-up to his recent arrest, Jeffrey Epstein appeared to have been attempting to rebrand as a “tech investor,” as he had done interviews with several journalists including Stewart about technology investing in the months before he was hit with federal sex trafficking charges.

Jessica Lessin, editor-in-chief of The Information, told Business Insider that a journalist working for The Information had interviewed Epstein a month before his recent arrest because “he was believed to be an investor in venture capital funds.” However, Lessin claimed that the interview was not “newsworthy” and said the site had no plans to publish its contents. Business Insider claimed that the way the interviews with Epstein had been arranged “suggests that someone in Silicon Valley may have been trying to help Epstein connect with reporters.”

Though it is unknown exactly which Silicon Valley figures were most connected to Epstein and which tech executives were potentially being blackmailed by Epstein, it is known that Epstein associated with several prominent tech executives, including Google co-founder Sergey Brin, Facebook co-founder Mark Zuckerberg, Tesla CEO Elon Musk, Microsoft co-founder Bill Gates, and LinkedIn co-founder Reid Hoffman.

Last year, Epstein claimed to be advising Tesla and Elon Musk, who had been previously photographed with Epstein’s alleged madam Ghislaine Maxwell. A few years ago, Epstein also attended a dinner hosted by LinkedIn’s Reid Hoffman, where Musk had allegedly introduced Epstein to Mark Zuckerberg. Google’s Sergey Brin is known to have attended a dinner hosted by Epstein at his New York residence where Donald Trump was also in attendance.

Elon Musk with Epstein’s alleged madam Ghislaine Maxwell at an Oscars after-party on March 2, 2014. Kevin Mazur | VF14

These associations suggest that the person in Silicon Valley who was trying to boost Epstein’s image as a tech investor before his arrest may have been Peter Thiel, whose Founders Fund had also invested in Carbyne. Thiel was an early investor in Facebook and is still on its board, connecting him to Zuckerberg; he is also a funder of Elon Musk’s SpaceX and a former colleague of Musk’s through PayPal. In addition, Thiel has ties to Reid Hoffman and both Thiel and Hoffman are prominent backers of Facebook.

It is unknown whether Epstein’s “damaging information” and apparent blackmail on notable individuals in the American technology industry were used to advance the objectives of Carbyne, which recently partnered with tech giants Google and Cisco Systems — and, more broadly, the expansion of Israeli intelligence-linked tech companies into the American tech sector, particularly through the acquisition of Israeli tech start-ups linked to Unit 8200 by major U.S. tech companies.

The latter seems increasingly likely given that the father of Ghislaine Maxwell — one of Epstein’s chief co-conspirators in his intelligence-linked sexual blackmail operation involving minors — was a Mossad operative who helped sell software that had been bugged by Israeli intelligence to government agencies and sensitive facilities around the world, including in the United States.

As will be noted later in this report, Israel’s Prime Minister Benjamin Netanyahu — to whom all of Israel’s intelligence agencies answer by virtue of his position — has stated on more than one occasion that the acquisition of Israeli intelligence-linked start-ups by foreign tech giants, especially in Silicon Valley, is a current and “deliberate policy” of the state of Israel.

 

Carbyne’s ties to U.S. intelligence

While Epstein and Barak are the two financiers of Carbyne whose ties to intelligence are clearest, another funder of Carbyne, Peter Thiel, has ties to U.S. intelligence and a history of investing in other companies founded by former members of Unit 8200. Thiel co-founded and still owns a controlling stake in the company Palantir, which was initially funded with a $2 million investment from the CIA’s venture capital fund In-Q-Tel and quickly thereafter became a contractor for the CIA.

After the success of its contract with the CIA, Palantir became a contractor for a variety of federal agencies, including the FBI, the Defense Intelligence Agency (DIA), the National Security Agency (NSA), the Department of Homeland Security(DHS) and the military’s Special Operations Command, among others. Last year, it won a contract to create a new battlefield intelligence system for the U.S. Army. Palantir is also in demand for its “pre-crime technology,” which has been used by several U.S. police departments. According to the Guardian, “Palantir tracks everyone from potential terrorist suspects to corporate fraudsters, child traffickers and what they refer to as ‘subversives’… it is all done using prediction.”

Thiel has gained attention in recent years for his support of President Trump and for becoming an adviser to Trump following the 2016 election, when he was “a major force in the transition,” according to Politico, and “helped fill positions in the Trump administration with former staff.” One of those former staffers was Trae Stephens, who is also on Carbyne’s board of advisers. Thiel also has business ties to Trump’s son-in-law and influential adviser, Jared Kushner, as well as to Kushner’s brother Josh. A senior Trump campaign aide told Politico in 2017 that “Thiel is immensely powerful within the administration through his connection to Jared.”

Thiel has also backed some prominent Israeli tech start-ups connected to Unit 8200, such as BillGuard, which Thiel funded along with former Google CEO Eric Schmidt and other investors. BillGuard was founded by Raphael Ouzan, a former officer in Unit 8200, who serves on the board of directors of Start-Up Nation Central (SUNC) alongside neoconservative American hedge fund manager Paul Singer, neoconservative political operative and adviser Dan Senor, and Terry Kassel, who works for Singer at his hedge fund, Elliott Management.

Peter Thiel Netanyahu
Peter Thiel greets Netanyahu during a 2017 meeting in Israel. Photo | Israel PM

SUNC is an organization founded by Paul Singer, who has donated heavily to both President Trump and Israeli Prime Minister Netanyahu. Since it was founded in 2012, SUNC has sought to integrate Unit 8200-connected Israeli tech start-ups into foreign companies, primarily American companies, and has helped oversee the shift of thousands of high-paying tech jobs from the U.S. to Israel.

Another Carbyne-connected individual worth noting is the former head of the Department of Homeland Security, Michael Chertoff, who serves on Carbyne’s board of advisers. In addition to Chertoff’s ties to DHS, Chertoff’s company, The Chertoff Group, employees several prominent former members of the U.S. intelligence community as principals, including Michael Hayden, former director of the CIA and former director of the NSA; and Charles Allen, former assistant director of Central Intelligence for Collection at the CIA, who worked at the agency for over 40 years.

The Chertoff Group has a long-standing and lucrative contract with the company OSI Systems, which produces full-body scanners and markets itself as a solution to mass shootings and crisis events, not unlike Carbyne. While Chertoff’s company was advising OSI Systems, Chertoff went on a media blitz to promote the widespread use of the machines produced by OSI Systems and even called on Congress to “fund a large-scale deployment of next-generation systems.” Chertoff did not disclose his conflict of interest while publicly promoting OSI’s full-body scanners.

Some have also alleged that Chertoff’s mother, Livia Eisen, had links to Israeli intelligence. According to her 1998 obituary, cited by both researcher/author Christopher Bollyn and journalist Jonathan Cook, Eisen participated in the Mossad operation code-named “Magic Carpet” while working for Israel’s El Al Airlines. Both Bollyn and Cook have suggested that Eisen’s participation in this covert Israeli intelligence operation strongly indicates that she had ties to the Mossad.

 

Melding into Silicon Valley

Beyond its troubling connections to Silicon Valley oligarchs, Israeli military intelligence and the U.S.-military industrial complex, Carbyne’s recent partnerships with two specific technology companies — Google and Cisco Systems — raise even more red flags.

Carbyne announced its partnership with Cisco Systems this past April, with the latter announcing that it would begin “aligning its unified call manager with Carbyne’s call-handling platform, allowing emergency call centers to collect data from both 911 callers and nearby government-owned IoT [Internet of Things] devices.” A report on the partnership published by Government Technology magazine stated that “Carbyne’s platform will be integrated into Cisco Kinetic for Cities, an IoT data platform that shares data across community infrastructure, smart city solutions, applications and connected devices.” The report also noted that “Carbyne will also be the only 911 solution in the Cisco Marketplace.”

As part of the partnership, Carbyne’s President of North American Operations Paul Tatro told Government Technology that the Carbyne platform would combine the data it obtains from smartphones and other Carbyne-connected devices with “what’s available through nearby Cisco-connected road cameras, roadside sensors, smart streetlamps, smart parking meters or other devices.” Tatro further asserted that “Carbyne can also analyze data that’s being collected by Cisco IoT devices … and alert 911 automatically, without any person making a phone call, if there appears to be a worthy problem,” and expressed his view that soon most emergency calls will not be made by human beings but “by smart cars, telematics or other smart city devices.”

A few months after partnering with Cisco Systems, Carbyne announced its partnership with Google on July 10, just three days after Carbyne funder Jeffrey Epstein was arrested in New York on federal sex trafficking charges. Carbyne’s press release of the partnership described how the company and Google would be teaming up in Mexico “to offer advanced mobile location to emergency communications centers (ECCs) throughout Mexico” following the conclusion of a successful four-week pilot program between Carbyne and Google in the Central American nation.

Netanyahu Eric Schmidt
Google Executive Chairman Eric Schmidt meets Netanyahu at his Jerusalem office. Israel PM | YouTube

The press release also stated:

Carbyne will provide Google’s Android ELS (Emergency Location Service) in real time from emergency calls made on AndroidTM devices. Deployment for any ECC in the country won’t require any integration, with Carbyne providing numerous options for connection to their secure ELS Gateway once an ECC is approved. The Carbyne automated platform, requiring no human interaction, has the potential to save thousands of lives each year throughout Mexico.”

The reason Carybne’s partnerships with Cisco Systems and Google are significant lies in the role that Cisco and former Google CEO Eric Schmidt have played in the creation of a controversial “incubator” for Israeli tech start-ups with deep ties to Israeli military intelligence, American neoconservative donor Paul Singer, and the U.S.’ National Security Agency (NSA).

This company, called Team8, is an Israeli company-creation platform whose CEO and co-founder is Nadav Zafrir, former commander of Unit 8200. Two of the company’s other three co-founders are also “alumni” of Unit 8200. Among Team8’s top investors is Schmidt, the former CEO of Google, who also joined Peter Thiel in funding the Unit 8200-linked BillGuard, as well as major tech companies including Cisco Systems and Microsoft.

Last year, Team8 controversially hired the former head of the NSA and U.S. Cyber Command, Retired Admiral Mike Rogers, and Zafrir stated that his interest in hiring Rogers was that Rogers would be “instrumental in helping strategize” Team8’s expansion in the United States. Jake Williams, a veteran of NSA’s Tailored Access Operations (TAO) hacking unit, told CyberScoop:

Rogers is not being brought into this role because of his technical experience. …It’s purely because of his knowledge of classified operations and his ability to influence many in the U.S. government and private-sector contractors.”

Team8 has also been heavily promoted by Start-Up Nation Central (SUNC). SUNC prominently features Team8 and Zafrir on the cybersecurity section of its website and also sponsored a talk by Zafrir and an Israeli government economist at the World Economic Forum, often referred to as “Davos,” that was attended personally by Paul Singer.

SUNC itself has deep ties to Israeli military intelligence, with former Unit 8200 officer Raphael Ouzan serving on its board of directors. Another example of SUNC-Unit 8200 ties can be seen with Inbal Arieli, who served as SUNC’s Vice President of Strategic Partnerships from 2014 to 2017 and continues to serve as a senior adviser to the organization. Arieli, a former lieutenant in Unit 8200, is the founder and head of the 8200 Entrepreneurship and Innovation Support Program (EISP), which was the first start-up accelerator in Israel aimed at harnessing “the vast network and entrepreneurial DNA of [Unit] 8200 alumni” and is currently one of the top company accelerators in Israel, alongside Team8. Arieli was the top executive at 8200 EISP while working at SUNC and several other top SUNC staffers are also connected to Israeli military intelligence.

Thus, Google and Cisco’s connections to Team8 suggests that their partnerships with another Israeli military intelligence-connected firm like Carbyne is a deepening of those two companies’ links to the growing bi-national security state that is uniting key players in the U.S. military-industrial complex and Israeli intelligence.

 

Mossad-backed Panic Buttons, coming to a school near you

Carbyne is hardly the only Israeli intelligence-linked tech company marketing itself in the United States as a solution to mass shootings. Another Israeli start-up, known as Gabriel, was founded in 2016 in response to a shooting in Tel Aviv and the Pulse Nightclub shooting in the United States, which took place just days apart.

Created by Israeli-American Yoni Sherizen and Israeli citizen Asaf Adler, Gabriel is similar to Carbyne in the sense that elements of its crisis response platform require installation on civilian smartphones as well as devices used by crisis responders. The main difference is that Gabriel also installs one or a series of physical “panic buttons,” depending on the size of the building to be secured, that also double as video and audio communication devices connected to the Gabriel network.

As with Carbyne, the ties between Gabriel and Israeli intelligence are obvious. Indeed, Gabriel’s four-person advisory board includes Ram Ben-Barak, former deputy director of the Mossad and former director-general of Israel’s intelligence ministry; Yohanan Danino, former chief of police for the state of Israel; and Kobi Mor, former director of overseas missions for the Israeli intelligence agency Shin Bet. The only American on the advisory board is Ryan Petty, the father of a Parkland shooting victim and friend of former Florida Governor Rick Scott.

Gabriel’s only disclosed funder is U.S.-based MassChallenge, a start-up accelerator non-profit. Gabriel is funded by MassChallenge’s Israel branch, which was opened six months prior to Gabriel’s creation and is partnered with the Israeli government and the Kraft Group. The Kraft Group is managed by Robert Kraft, who is currently embroiled in a prostitution scandal and is also a close friend of President Trump.

Notably, one of MassChallenge Israel’s featured experts is Wendy Singer, the executive director of SUNC, the organization created and funded by neoconservative Trump backer Paul Singer with the explicit purpose of promoting Israel’s tech start-ups and their integration into foreign, chiefly American, businesses. As was noted in a recent MintPress report on SUNC, Wendy Singer is the sister of neoconservative political operative Dan Senor, who founded the now-defunct Foreign Policy Initiative with Robert Kagan and Bill Kristol, and was previously the director of AIPAC’s Israel office for 16 years.

Gabriel’s founders have been quite upfront about the fact that the uptick in shootings in the U.S. has greatly aided their company’s growth and success. Last November, Sherizen told The Jerusalem Post that new mass shootings in the U.S. not only increased U.S. demand for his company’s product but also were opportunities to show the effectiveness of Gabriel’s approach:

Unfortunately every month there seems to be another high-profile event of this nature. After the Vegas shooting, we were able to show [that] our system would have managed to identify the location of the shooter much quicker.”

The Jerusalem Post noted that Gabriel is set to make considerable profits if concern over mass shootings continues to build in the U.S., writing:

With more than 475,000 soft targets across the US and amid increasing security fears, the potential market for Gabriel is huge. The company could gain revenues of almost $1 billion if only 10% of soft targets were to invest around $20,000 in its alert systems.”

Sherizen told the Jerusalem Post:

Our starter kit costs $10,000. Depending on the size and makeup of the community building, it would cost between $20-30,000 to fully outfit the location. We have made it very affordable. This is a game-changer for the lock-down and active shooter drills that are now a standard part of any child’s upbringing in the States.”

 

Much more than just a start-up

While it is certainly possible that numerous former officials and commanders of elite Israeli intelligence agencies may have no ulterior motive in advising or founding technology start-up companies, it is worth pointing out that top figures in Israel’s military intelligence agencies and the Mossad don’t see it that way.

Last March, Israeli media outlet Calcalist Tech published a report entitled “Israel Blurs the Line Between Defense Apparatus and Local Cybersecurity Hub,” which noted that “since 2012, cyber-related and intelligence projects that were previously carried out in-house in the Israeli military and Israel’s main intelligence arms are transferred to companies that in some cases were built for this exact purpose.” (emphasis added)

The article notes that beginning in 2012, Israel’s intelligence and military intelligence agencies began to outsource “activities that were previously managed in-house, with a focus on software and cyber technologies.” (emphasis added)

It continues:

In some cases, managers of development projects in the Israeli military and intelligence arms were encouraged to form their own companies, which then took over the project,’ an Israeli venture capitalist familiar with the matter told Calcalist Tech.”

Notably, Calcalist Tech states that the controversial company Black Cube was created this way and that Black Cube had been contracted, and is likely still contracted, by Israel’s Ministry of Defense. The private security agency Black Cube is known to have two separate divisions for corporations and governments. The firm was recently caught attempting to undermine the Iran nuclear deal — then also a top political objective of Israeli Prime Minister Benjamin Netanyahu — by attempting to obtain information on the “financial or sexual impropriety” (i.e., blackmail) of top U.S. officials involved in drafting the accord. NBC News noted last year that “Black Cube’s political work frequently intersects with Israel’s foreign policy priorities.” As previously mentioned, one of Carbyne’s co-founders — Lital Leshem, also a veteran of Unit 8200 — worked for Black Cube prior to starting Carbyne.

One of the main companies profiled in the Calcalist Tech report appeared to be a front for Israeli intelligence, as its registered owner was found not to exist: even high-level employees at the company had never heard of him; his registered addresses were for nonexistent locations in Israel’s capital of Tel Aviv; and the three people with that name in Tel Aviv denied any association with the business.

This company — which Calcalist Tech was unable to name after the Israeli military censor determined that doing so could negatively impact Israeli “national security” — was deliberately created to service the Israeli military and Israeli intelligence. It is also “focused on cyber technologies with expertise in research and development of advanced products and applications suitable for defense and commercial entities.” (emphases added) In addition, the company’s management consists largely of “veterans of Israeli military technology units.”

Notably, a former employee of this company told Calcalist Tech that “crossing the lines between military service and employment at the commercial outfit was ‘commonplace’ while he was working at the company.”

It’s not exactly clear why Israel’s military intelligence and other intelligence agencies decided to begin outsourcing its operations in 2012, though Calcalist Tech suggests the reasoning was related to the difference in wages between the private sector and the public sector, with pay being much higher in the former. However, it is notable that 2012 was also the year that Paul Singer — together with Netanyahu’s long-time economic adviser and former chair of the Israeli National Economic Council, Eugene Kandel — decided to create Start-Up Nation Central.

As MintPress noted earlier this year, SUNC was founded as part of a deliberate Israeli government effort to counter the nonviolent Boycott, Divest and Sanctions (BDS) movement and to make Israel the dominant global “cyber power.” This policy is aimed at increasing Israel’s diplomatic power and specifically undermining BDS as well as the United Nations, which has repeatedly condemned Israel’s government for war crimes and violations of international law in relation to the Palestinians.

Last year, Netanyahu was asked by Fox News host Mark Levin whether the large growth seen in recent years in Israel’s technology sector, specifically tech start-ups, was part of Netanyahu’s plan. Netanyahu responded, “That’s very much my plan … It’s a very deliberate policy.” He later added that “Israel had technology because the military, especially military intelligence, produced a lot of capabilities. These incredibly gifted young men and women who come out of the military or the Mossad, they want to start their start-ups.”

Netanyahu again outlined this policy at the 2019 Cybertech Conference in Tel Aviv, where he stated that Israel’s emergence as one of the top five “cyber powers” had “required allowing this combination of military intelligence, academia and industry to converge in one place” and that this further required allowing “our graduates of our military and intelligence units to merge into companies with local partners and foreign partners.”

The direct tie-ins of SUNC to Israel’s government and the successful effort led by SUNC and other companies and organizations to place former military intelligence and intelligence operatives in strategic positions in major multinational technology companies reveal that this “deliberate policy” has had a major and undeniable impact on the global tech industry, especially in Silicon Valley.

 

Mossad gets its own In-Q-Tel

This “deliberate policy” of Netanyahu’s also recently resulted in the creation of a Mossad-run venture capital fund that is specifically focused on financing Israeli tech start-ups. The venture capital fund, called Libertad, was first announced by Israel’s Prime Minister’s Office and was created with the explicit purpose of “increasing the Israeli intelligence agency’s knowledge base and fostering collaboration with Israel’s vibrant startup scene” It was modeled after the CIA’s venture capital fund In-Q-Tel, which invested in several Silicon Valley companies turned government and intelligence contractors — including Google and Palantir — with a similar goal in mind.

Libertad declines to reveal the recipients of its funding, but announced last December that it had chosen five companies in the fields of robotics, energy, encryption, web intelligence, and natural language processing and text analysis. In regard to its interest in web intelligence, a Mossad employee told the Jerusalem Post that the intelligence agency was specifically interested in “innovative technologies for [the] automatic identification of personality characteristics – personality profiling – based on online behavior and activity, using methods based on statistics, machine learning, and other areas.” (emphasis added)

According to Libertad’s website, in return for its investment, now set at NIS 2 million (~$580,000) per year per company, “the Mossad will receive access to the IP [initial product] developed during R&D [Research and Development] while under contract, and a non-commercial, non-exclusive license to use it. Libertad’s contract with the company will not provide it with any additional rights.” In an interview with Calcalist Tech, Mossad Director Yossi Cohen told the paper that the Mossad’s partnership with civilian companies in Israel is “excellent” and that the agency will continue to strengthen those ties.

Israeli intelligence has a documented history in placing “backdoors” into technology products for the purpose of surveillance, with one well-known case being Israel’s repurposing of the PROMIS software, discussed in Part III of MintPress’ series on Jeffrey Epstein. Furthermore, given that U.S. intelligence, specifically the NSA, had “backdoors” placed into the products of major Silicon Valley companies (a service performed by Israeli intelligence-linked tech companies no less), Mossad may very well plan on doing the same with the technology products of companies it backs through Libertad.

Tim Shorrock, investigative journalist and author of Spies For Hire: The Secret World of Intelligence Outsourcing, told MintPress that the Mossad’s continuation of such practices through Libertad was definitely plausible, especially given what Shorrock described as the “unusual” choice of Libertad choosing not to release the identities of the companies in which it invests.

“The Mossad is trying to hide what they are investing in,” Shorrock stated, adding that Libertad’s secrecy “raises a lot of questions” particularly given that it was modeled after the CIA’s In-Q-Tel. Shorrock noted that In-Q-Tel and other venture capital funds with ties to U.S. intelligence or the U.S. military rarely, if ever, hide the identities of the companies they finance.

However, Libertad is merely the latest and most public expression of the Mossad’s interest in Israeli tech start-ups, the lion’s share of which are created by veterans of Unit 8200 or other Israeli intelligence agencies. Indeed, former Mossad Director Tamir Pardo stated in 2017 that “everyone” in the Israeli cybertechnology sector is an “alumni” of either Israeli intelligence, like the Mossad, or Israeli military intelligence, like Unit 8200. Pardo even went as far as to say that the Mossad itself is “like a start-up.”

Pardo himself, after leaving his post as Mossad director in 2016, dove straight into the world of Israeli tech start-ups, becoming chairman of Sepio Systems, whose two CEOs are former Unit 8200 officers. Sepio Systems’ advisory board includes the former chief information security officer of the CIA, Robert Bigman; former member of the U.S. Military’s Joint Special Operations Command (JSOC), Geoff Hancock; and former head of the Israel National Cyber Bureau and veteran of Israeli military intelligence, Rami Efrati. Sepio Systems’ cybersecurity software has been adopted by several banks, telecom and insurance companies, including in the U.S. and Brazil.

Pardo is not the only prominent figure in Israel’s intelligence community to compare Israeli intelligence agencies to tech start-ups. Shin Bet Director Nadav Argaman described Israel’s domestic spy agency in similar terms. “The Shin Bet is like an evolving start-up, with unmatched strength,” Argaman stated in a June 2017 speech, as he extolled the agency’s use of “pre-crime” technology to detain Palestinians based on their social media activity.

Argaman, at the time, claimed that more than 2,000 Palestinians, whom he described as “potential lone-wolf terrorists,” had been arrested as a result of these “breakthrough technological advances” that use artificial-intelligence algorithms to monitor the social media accounts of Palestinians, especially younger Palestinians, for the use of “tripwire” phrases that have been used by Palestinians who later committed acts of violence. In the case of those who use such terms, “their phones are tracked to see if they meet other suspects, or leave their districts to move towards potential Israeli targets. In such cases, security forces detain the suspect,” according to a 2017 report on the practice by The Economist.

 

The road to fascism, paved by a corrupted PROMIS

Though Israeli intelligence’s interest in tech companies goes back several years, there is a well-documented history of Israeli intelligence using bugged software to surveil and gain “backdoor” access to government databases around the world, particularly in the United States.

As was mentioned in Part III of MintPress’ Epstein series, a sinister yet cunning plan was executed to place a backdoor for Israeli intelligence into the Prosecutor’s Management Information System (PROMIS) software, which was then being used by the U.S. Department of Justice and was the envy of government agencies, particularly intelligence agencies, around the world. This bugged version of PROMIS — born out of the collusion between Earl Brian, Ronald Reagan’s then-envoy to Iran, and Rafi Eitan, then-director of the now-defunct Israeli intelligence agency Lekem — was seeded around the world by Brian’s company Hadron as well as by Mossad-linked media mogul Robert Maxwell, father of Jeffrey Epstein’s long-time girlfriend and alleged madam, Ghislaine Maxwell.

After this first PROMIS “backdoor” was discovered, Israel would again gain access to sensitive U.S. government communications, as well as civilian communications, thanks to the collusion between Israeli intelligence and Israeli telecom and tech companies, especially Amdocs and Comverse Infosys (now Verint), that were operating throughout the United States. Today, Unit 8200-linked start-ups appear to have taken up the torch.

While the PROMIS software is perhaps best known for offering Israeli intelligence a backdoor into as many as 80 intelligence agencies and other sensitive locations around the world for nearly a decade, it was also used for a very different purpose by prominent officials linked to Iran-Contra.

One key Iran-Contra figure — Lt. Col. Oliver North, then serving on the National Security Council — decided to use PROMIS neither for espionage nor for foreign policy. Instead, North turned PROMIS’ power against Americans, particularly perceived dissidents, a fact that remained unknown for years.

Beginning in 1982, as part of the highly classified Continuity of Government (COG) program, North used the PROMIS software at a 6,100-square-foot “command center” in the Department of Justice, as well as at a smaller operations room at the White House, to compile a list of American dissidents and “potential troublemakers” if the COG protocol was ever invoked.

According to a senior government official with a high-ranking security clearance and service in five presidential administrations who spoke to Radar in 2008, this was:

A database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.”

In 1993, Wired described North’s use of PROMIS in compiling this database as follows:

Using PROMIS, sources point out, North could have drawn up lists of anyone ever arrested for a political protest, for example, or anyone who had ever refused to pay their taxes. Compared to PROMIS, Richard Nixon’s enemies list or Sen. Joe McCarthy’s blacklist look downright crude.”

The COG program defined this “time of panic” as “a national crisis, such as nuclear war, violent and widespread internal dissent, or national opposition to a US military invasion abroad,” whereby the government would suspend the Constitution, declare martial law, and incarcerate perceived dissidents and other “unfriendlies” in order to prevent the government’s (or then-serving administration’s) overthrow.

This secretive database has often been referred to as “Main Core” by government insiders and, most troubling of all, it still exists today. Journalist Christ Ketcham, citing senior government officials, reported in 2008 that, at that time, Main Core was believed to contain the names of as many as 8 million Americans. Eleven years later, it is highly likely that the number of Americans included in the Main Core database has grown considerably.

Author and investigative journalist Tim Shorrock also covered other disturbing aspects of the evolution of Main Core back in 2008 for Salon. At the time, Shorrock reported that the George W. Bush administration was believed to have used Main Core to guide its domestic surveillance activities following the September 11 attacks.

Citing “several former U.S. government officials with extensive knowledge of intelligence operations,” Shorrock further noted that Main Core — as it was 11 years ago at the time his report was published — was said to contain “a vast amount of personal data on Americans, including NSA intercepts of bank and credit card transactions and the results of surveillance efforts by the FBI, the CIA and other agencies.”

Bill Hamilton, former NSA intelligence officer and the original creator of the PROMIS software, told Shorrock at the time that he believed that “U.S. intelligence uses PROMIS as the primary software for searching the Main Core database” and had been told as much by an intelligence official in 1992 and an NSA official in 1995. Dan Murphy, former deputy director at the CIA, had told Hamilton that the NSA’s use of PROMIS was “so seriously wrong that money alone cannot cure the problem.” “I believe in retrospect that Murphy was alluding to Main Core,” Hamilton had told Shorrock.

Though most reporting on Main Core, from the time its existence was first revealed to the present, has treated the database as something used by the U.S. government and U.S. intelligence for domestic purposes, MintPress has learned that Israeli intelligence was also involved with the creation of the Main Core database. According to a former U.S. intelligence official with direct knowledge of the U.S. intelligence community’s use of PROMIS and Main Core from the 1980s to 2000s, Israeli intelligence played a role in the U.S. government’s deployment of PROMIS as the software used for the Main Core domestic surveillance database system.

Israeli intelligence remained involved with Main Core at the time of the August 1991 death of journalist Danny Casolaro, who was investigating not only the government’s misuse of the stolen PROMIS software but also the Main Core database. This same official, who chose to remain anonymous, told MintPress that, shortly before his death, Casolaro had obtained copies of computer printouts from the PROMIS-based Main Core domestic surveillance database system from NSA whistleblower Alan Standorf, who was found murdered a few months before Casolaro’s lifeless body would be found in a West Virginia hotel room.

The source also stated that Main Core’s contents had been used for the political blackmail of members of Congress and their staff, journalists, and others by Walter Raymond, a senior CIA covert operator in psyops and disinformation who served on President Reagan’s National Security Council during and after Main Core’s creation. If used for this purpose by Raymond in the 1980s, Main Core has also likely been used by other individuals with access to the database for blackmailing purposes in the years since.

Given that Israeli intelligence was known to have placed a backdoor into the PROMIS software, before it was marketed and sold around the world by Earl Brian and Robert Maxwell, its role in the U.S. government’s decision to use PROMIS in the creation of Main Core suggests that Israeli intelligence likely advocated for the version of PROMIS containing this backdoor, thereby giving Israeli intelligence access to Main Core. Given that Reagan aides and officials colluded with Israeli “spymaster” Rafi Eitan in his efforts to create a backdoor into the software for Israeli military intelligence, the use of this version of PROMIS in the Main Core database is certainly plausible.

Furthermore, the fact that Israeli intelligence was known to be involved in Main Core nearly a decade after its creation suggests that Israeli intelligence may have played a role in certain aspects of the database, such as the criteria used to flag Americans as “unfriendly,” and — like Walter Raymond — may have used information in the database to blackmail Americans. In addition, the fact that the cooperation between U.S. and Israeli intelligence, particularly between Unit 8200 and the NSA, has only grown since 1991 further suggests that Israeli involvement in Main Core continues to the present.

While Main Core’s very existence is troubling for many reasons, the alleged involvement of a foreign intelligence service in the creation, expansion and maintenance of a database with personal details and potentially damaging information on millions of Americans targeted for detention or increased surveillance in times of crisis is chilling. It is especially so considering that the Trump administration’s latest proposals to prevent mass shootings before they occur are likely to use Main Core to flag certain Americans for increased surveillance or potentially detention, as was done by the George W. Bush administration following the September 11 attacks.

It appears that Main Core serves a dual purpose; first as a mass targeted surveillance system to crush dissent during times of “national crisis” — whether spontaneous or engineered — and, second, as a massive blackmail database used to keep every potential opponent in line during non-emergencies.

 

Peter Thiel’s Seeing Stone

As was mentioned earlier in this report, Palantir — the company co-founded by Peter Thiel — is set to profit handsomely from the Trump administration’s plans to use its “pre-crime” technology, which is already used by police departments throughout the country and also used to track Americans based on the company’s integrative data-mining approach. Palantir, named for the “seeing stones” in the Lord of the Rings novels, also markets software to foreign (and domestic) intelligence agencies that predicts the likelihood that an individual will commit an act of terrorism or violence.

Aside from its “pre-crime” products, Palantir has come under fire in recent years as a result of the company’s contracts with Immigration and Customs Enforcement (ICE), where it created an intelligence system known as Investigative Case Management (ICM). The IB Times described ICM as “a vast ‘ecosystem’ of data to help immigration officials in identifying targets and creating cases against them” and also “provides ICE agents with access to databases managed by other federal agencies.” ICM further gives ICE access to “targets’ personal and sensitive information, such as background on schooling, employment, family relationships, phone records, immigration history, biometrics data, criminal records as well as home and work addresses.” In other words, Palantir’s ICM is essentially a “Main Core” for immigrants.

Notably, part of Oliver North’s original intentions in “Main Core” was to track immigrants then coming from Central America as well as Americans who opposed Reagan era policy with respect to Central America. At that time, Main Core was believed to be controlled by the Federal Emergency Management Administration (FEMA), which is now part of the Department of Homeland Security (DHS).

VICE News reported in July that the Northern California Regional Intelligence Center, which is run by DHS, “serves around 300 communities in northern California and is what is known as a ‘fusion center,’ a Department of Homeland Security intelligence center that aggregates and investigates information from state, local, and federal agencies, as well as some private entities, into large databases that can be searched using software like Palantir. “ VICE further noted that this center alone used Palantir to surveil as many as 8 million Ameicans. There are many more such DHS “fusion centers” throughout the United States.

If the Trump administration moves forward with its proposal of employing technology to detect potential mass shooters before they strike, Palantir’s technology is set to be used, given that it has already been used by U.S. law enforcement and U.S. intelligence to determine which people run “the highest risk of being involved in gun violence,” according to an investigation of Palantir by The Verge. Furthermore, Palantir’s close ties to the Trump administration make the company’s role in a future nationwide “pre-crime” prevention system based on technology appear inevitable.

Apple CEO Tim Cook, right, and PayPal founder Peter Thiel, center, listen as President-elect Donald Trump speaks during a meeting with technology industry leaders at Trump Tower in New York, Wednesday, Dec. 14, 2016. (AP Photo/Evan Vucci)

Worse still is the apparent overlap between Palantir and Main Core. Palantir — which has obvious similarities to PROMIS — is already known to use its software to track potential terror threats, including domestic terror threats, and a category of people it refers to as “subversives.” Palantir’s tracking of these individuals “is all done using prediction.” Palantir’s close ties to the U.S. intelligence community suggest that Palantir may already have access to the Main Core database. Tim Shorrock told MintPress that Palantir’s use of Main Core is “certainly possible,” particularly in light of the company’s use of the term “subversive” to describe a category of people that its software tracks.

Palantir also has alleged ties to Israeli intelligence, as there have long been suspicions that Israeli intelligence has used Palantir as part of its AI “pre-crime” algorithms targeting Palestinians after Palantir opened a research and development (R&D) center in Israel in 2013. The current head of Palantir Israel, Hamultal Meridor, previously founded a brain-machine interface organization and was senior director of web intelligence at Verint (formerly Comverse Infosys), which has deep connections to Unit 8200, a history of espionage in the United States and was one of the two companies contracted by the NSA to insert a “backdoor” into the U.S. telecommunications system and popular products of major American tech companies.

Given the above, Peter Thiel’s 2018 decision to fund Carbyne, the Unit 8200-linked start-up that markets itself as a technological solution to mass shootings in the U.S., strongly suggests that Thiel has been anticipating for some time the now-public efforts of the Trump administration to employ “pre-crime” technology to track and target Americans who show signs of “mental illness” and “violent tendencies.”

 

A nightmare even Orwell could not have predicted

In early August, in the wake of the shooting at an El Paso Walmart, President Trump called on big tech companies to collaborate with the Justice Department in the creation of software that “stops mass murders before they start” by detecting potential mass shooters before they cnm act. Though Trump’s ideas were short on specifics, there is now a new proposal that would create a new government agency that will use data gathered from civilian electronic devices to identify “neurobehavioral” warning signs, thereby flagging “potential shooters” for increased surveillance and potentially detention.

This new agency, as proposed by the foundation led by former NBC Universal president and vice chairman of General Electric Robert Wright, would be known as the Health Advanced Research Projects Agency (HARPA) and would be modeled after the Defense Advanced Research Projects Agency (DARPA). Per the proposal, recently detailed by the Washington Post, the flagship program of HARPA would be “Safe Home” (Stopping Aberrant Fatal Events by Helping Overcome Mental Extremes), which would use “breakthrough technologies with high specificity and sensitivity for early diagnosis of neuropsychiatric violence,” specifically “advanced analytical tools based on artificial intelligence and machine learning.”

The program would cost an estimated $60 million over four years and would use data from “Apple Watches, Fitbits, Amazon Echo and Google Home” and other consumer electronic devices, as well as information provided by health-care providers to identify who may be a threat.

The Washington Post reported that President Trump has reacted “very positively” to the proposal and that he was “sold on the concept.” The Post also noted that Wright sees the president’s daughter, Ivanka, as “the most effective champion of the proposal and has previously briefed her on HARPA himself.” Ivanka has previously been cited as a driving force behind some of her father’s policy decisions, including his decision to bomb Syria after an alleged chemical weapons attack in 2017.

Liz Fed — president of the Susan Wright Foundation, which is led by Robert Wright and created the proposal for HARPA and “Safe Home” — told The Post that the proposal emulated DARPA because “DARPA is a brilliant model that works. They have developed the most transformational capabilities in the world for national security…We’re not leveraging the tools and technologies available to us to improve and save lives.” Fed further asserted that DARPA’s technological approach had yet to be applied to the field of healthcare.

For anyone familiar with DARPA, such claims should immediately sound loud alarm bells, especially since DARPA is already developing its own solution to “mental health” issues in the form of a “brain-machine interface” as part of its N3 program. That program, according to reports, involves “noninvasive and ‘minutely’ invasive neural interfaces to both read and write into the brain,” help distance soldiers “from the emotional guilt of warfare” by “clouding their perception” and “to program artificial memories of fear, desire, and experiences directly into the brain.” Though N3 is intended to improve the prowess of American soldiers, it is also set to be used as a means of pursuing DARPA’s Systems-Based Neurotechnology for Emerging Therapies (SUBNETS) project, which aims to “to develop a tiny, implanted chip in the skull to treat psychiatric disorders such as anxiety, PTSD and major depression.”

Given that HARPA’s lead scientific adviser is Dr. Geoffrey Ling, former director and founder of DARPA’s Biological Technologies Office (BTO), which “merges biology, engineering, and computer science to harness the power of natural systems for national security,” it seems likely that DARPA’s neurological-focused research programs, like SUBNETS and N3, would be folded into HARPA’s portfolio, making the proposed agency’s approach to mental health very questionable indeed.

Aside from the dystopian nature of both DARPA and potentially HARPA’s approach to mental health, there is grave cause for concern regarding the Trump administration’s moves to address U.S. mass shooting events by implementing pre-crime technology based on artificial intelligence, data-mining and mass surveillance, technologies already laying in wait thanks to companies like Palantir and numerous Israeli tech start-ups led by former Unit 8200 officers.

With companies like Carbyne — with its ties to both the Trump administration and to Israeli intelligence — and the Mossad-linked Gabriel also marketing themselves as “technological” solutions to mass shootings while also doubling as covert tools for mass data collection and extraction, the end result is a massive surveillance system so complete and so dystopian that even George Orwell himself could not have predicted it.

Following another catastrophic mass shooting or crisis event, aggressive efforts will likely follow to foist these “solutions” on a frightened American public by the very network connected, not only to Jeffrey Epstein, but to a litany of crimes and a frightening history of plans to crush internal dissent and would-be dissenters in the United States.

Feature photo | Graphic by Claudio Cabrera

Whitney Webb is a MintPress News journalist based in Chile. She has contributed to several independent media outlets including Global Research, EcoWatch, the Ron Paul Institute and 21st Century Wire, among others. She has made several radio and television appearances and is the 2019 winner of the Serena Shim Award for Uncompromised Integrity in Journalism.

 

American Apocalypse: The Government’s Plot to Destabilize the Nation Is Working

 

 

By John W. Whitehead

Source: The Rutherford Institute

“The most dangerous man to any government is the man who is able to think things out … without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane, intolerable.” — H. L. Mencken

The U.S. government is working hard to destabilize the nation.

No, this is not another conspiracy theory.

Although it is certainly not far-fetched to suggest that the government might be engaged in nefarious activities that run counter to the best interests of the American people, doing so will likely brand me a domestic terrorist under the FBI’s new classification system.

Observe for yourself what is happening right before our eyes.

Domestic terrorism fueled by government entrapment schemes. Civil unrest stoked to dangerous levels by polarizing political rhetoric. A growing intolerance for dissent that challenges the government’s power grabs. Police brutality tacitly encouraged by the executive branch, conveniently overlooked by the legislatures, and granted qualified immunity by the courts. A weakening economy exacerbated by government schemes that favor none but a select few. An overt embrace of domestic surveillance tactics if Congress goes along with the Trump Administration’s request to permanently re-authorize the NSA’s de-activated call records program. Heightened foreign tensions and blowback due to the military industrial complex’s profit-driven quest to police and occupy the globe.

The seeds of chaos are being sown, and it’s the U.S. government that will reap the harvest.

Mark my words, there’s trouble brewing.

Better yet, take a look at “Megacities: Urban Future, the Emerging Complexity,” a Pentagon training video created by the Army for U.S. Special Operations Command.

The training video is only five minutes long, but it says a lot about the government’s mindset, the way its views the citizenry, and the so-called “problems” that the government must be prepared to address in the near future through the use of martial law.

Even more troubling, however, is what this military video doesn’t say about the Constitution, about the rights of the citizenry, and about the dangers of locking down the nation and using the military to address political and social problems.

The training video anticipates that all hell will break loose by 2030—that’s barely ten short years away—but the future is here ahead of schedule.

We’re already witnessing a breakdown of society on virtually every front.

By waging endless wars abroad, by bringing the instruments of war home, by transforming police into extensions of the military, by turning a free society into a suspect society, by treating American citizens like enemy combatants, by discouraging and criminalizing a free exchange of ideas, by making violence its calling card through SWAT team raids and militarized police, by fomenting division and strife among the citizenry, by acclimating the citizenry to the sights and sounds of war, and by generally making peaceful revolution all but impossible, the government has engineered an environment in which domestic violence is becoming almost inevitable.

The danger signs are screaming out a message

The government is anticipating trouble (read: civil unrest), which is code for anything that challenges the government’s authority, wealth and power.

According to the Pentagon training video created by the Army for U.S. Special Operations Command, the U.S. government is grooming its armed forces to solve future domestic political and social problems.

What they’re really talking about is martial law, packaged as a well-meaning and overriding concern for the nation’s security.

The chilling five-minute training video, obtained by The Intercept through a FOIA request and made available online, paints an ominous picture of the future—a future the military is preparing for—bedeviled by “criminal networks,” “substandard infrastructure,” “religious and ethnic tensions,” “impoverishment, slums,” “open landfills, over-burdened sewers,” a “growing mass of unemployed,” and an urban landscape in which the prosperous economic elite must be protected from the impoverishment of the have nots.

And then comes the kicker.

Three-and-a-half minutes into the Pentagon’s dystopian vision of “a world of Robert Kaplan-esque urban hellscapes — brutal and anarchic supercities filled with gangs of youth-gone-wild, a restive underclass, criminal syndicates, and bands of malicious hackers,” the ominous voice of the narrator speaks of a need to “drain the swamps.”

Drain the swamps.

Surely, we’ve heard that phrase before?

Ah yes.

Emblazoned on t-shirts and signs, shouted at rallies, and used as a rallying cry among Trump supporters, “drain the swamp” became one of Donald Trump’s most-used campaign slogans.

Far from draining the politically corrupt swamps of Washington DC of lobbyists and special interest groups, however, the Trump Administration has further mired us in a sweltering bog of corruption and self-serving tactics.

Funny how the more things change, the more they stay the same.

Now the government has adopted its own plans for swamp-draining, only it wants to use the military to drain the swamps of futuristic urban American cities of “noncombatants and engage the remaining adversaries in high intensity conflict within.”

And who are these noncombatants, a military term that refers to civilians who are not engaged in fighting?

They are, according to the Pentagon, “adversaries.”

They are “threats.”

They are the “enemy.”

They are people who don’t support the government, people who live in fast-growing urban communities, people who may be less well-off economically than the government and corporate elite, people who engage in protests, people who are unemployed, people who engage in crime (in keeping with the government’s fast-growing, overly broad definition of what constitutes a crime).

In other words, in the eyes of the U.S. military, noncombatants are American citizens a.k.a. domestic extremists a.k.a. enemy combatants who must be identified, targeted, detained, contained and, if necessary, eliminated.

In the future imagined by the Pentagon, any walls and prisons that are built will be used to protect the societal elite—the haves—from the have-nots.

If you haven’t figured it out already, we the people are the have-nots.

Suddenly it all begins to make sense.

The events of recent years: the invasive surveillance, the extremism reports, the civil unrest, the protests, the shootings, the bombings, the military exercises and active shooter drills, the color-coded alerts and threat assessments, the fusion centers, the transformation of local police into extensions of the military, the distribution of military equipment and weapons to local police forces, the government databases containing the names of dissidents and potential troublemakers.

The government is systematically locking down the nation and shifting us into martial law.

This is how you prepare a populace to accept a police state willingly, even gratefully.

You don’t scare them by making dramatic changes. Rather, you acclimate them slowly to their prison walls.

Persuade the citizenry that their prison walls are merely intended to keep them safe and danger out. Desensitize them to violence, acclimate them to a military presence in their communities, and persuade them that there is nothing they can do to alter the seemingly hopeless trajectory of the nation.

Before long, no one will even notice the floundering economy, the blowback arising from military occupations abroad, the police shootings, the nation’s deteriorating infrastructure and all of the other mounting concerns.

It’s happening already.

The sight of police clad in body armor and gas masks, wielding semiautomatic rifles and escorting an armored vehicle through a crowded street, a scene likened to “a military patrol through a hostile city,” no longer causes alarm among the general populace.

Few seem to care about the government’s endless wars abroad that leave communities shattered, families devastated and our national security at greater risk of blowback.

The Deep State’s tactics are working.

We’ve allowed ourselves to be acclimated to the occasional lockdown of government buildings, Jade Helm military drills in small towns so that special operations forces can get “realistic military training” in “hostile” territory, and  Live Active Shooter Drill training exercises, carried out at schools, in shopping malls, and on public transit, which can and do fool law enforcement officials, students, teachers and bystanders into thinking it’s a real crisis.

Still, you can’t say we weren’t warned about the government’s nefarious schemes to lock down the nation.

Back in 2008, an Army War College report revealed that “widespread civil violence inside the United States would force the defense establishment to reorient priorities in extremis to defend basic domestic order and human security.” The 44-page report went on to warn that potential causes for such civil unrest could include another terrorist attack, “unforeseen economic collapse, loss of functioning political and legal order, purposeful domestic resistance or insurgency, pervasive public health emergencies, and catastrophic natural and human disasters.”

In 2009, reports by the Department of Homeland Security surfaced that labelled right-wing and left-wing activists and military veterans as extremists (a.k.a. terrorists) and called on the government to subject such targeted individuals to full-fledged pre-crime surveillance. Almost a decade later, after spending billions to fight terrorism, the DHS concluded that the greater threat is not ISIS but domestic right-wing extremism.

Meanwhile, the government has been amassing an arsenal of military weapons for use domestically and equipping and training their “troops” for war. Even government agencies with largely administrative functions such as the Food and Drug Administration, Department of Veterans Affairs, and the Smithsonian have been acquiring body armor, riot helmets and shields, cannon launchers and police firearms and ammunition. In fact, there are now at least 120,000 armed federal agents carrying such weapons who possess the power to arrest.

Rounding out this profit-driven campaign to turn American citizens into enemy combatants (and America into a battlefield) is a technology sector that has been colluding with the government to create a Big Brother that is all-knowing, all-seeing and inescapable. It’s not just the drones, fusion centers, license plate readers, stingray devices and the NSA that you have to worry about. You’re also being tracked by the black boxes in your cars, your cell phone, smart devices in your home, grocery loyalty cards, social media accounts, credit cards, streaming services such as Netflix, Amazon, and e-book reader accounts.

All of this has taken place right under our noses, funded with our taxpayer dollars and carried out in broad daylight without so much as a general outcry from the citizenry.

And then you have the government’s Machiavellian schemes for unleashing all manner of dangers on an unsuspecting populace, then demanding additional powers in order to protect “we the people” from the threats.

Seriously, think about it.

The government claims to be protecting us from cyberterrorism, but who is the biggest black market buyer and stockpiler of cyberweapons (weaponized malware that can be used to hack into computer systems, spy on citizens, and destabilize vast computer networks)? The U.S. government.

The government claims to be protecting us from weapons of mass destruction, but what country has one the deadliest arsenals of weapons of mass destruction and has a history of using them on the rest of the world? The U.S. government. Indeed, which country has a history of secretly testing out dangerous weapons and technologies on its own citizens? The U.S. government.

The government claims to be protecting us from foreign armed threats, but who is the largest weapons manufacturer and exporter in the world, such that they are literally arming the world? The U.S. government. For that matter, where did ISIS get many of their deadliest weapons, including assault rifles and tanks to anti-missile defenses? From the U.S. government.

The government claims to be protecting the world from the menace of foreign strongmen, but how did Saddam Hussein build Iraq’s massive arsenal of tanks, planes, missiles, and chemical weapons during the 1980s? With help from the U.S. government. And who gave Osama bin Laden and al-Qaida “access to a fortune in covert funding and top-level combat weaponry”? The U.S. government.

The government claims to be protecting us from terrorist plots, but what country has a pattern and practice of entrapment that involves targeting vulnerable individuals, feeding them with the propaganda, know-how and weapons intended to turn them into terrorists, and then arresting them as part of an elaborately orchestrated counterterrorism sting? The U.S. government.

For that matter, the government claims to be protecting us from nuclear threats, but which is the only country to ever use a nuclear weapon in wartime? The United States.

Are you getting the picture yet?

The U.S. government isn’t protecting us from terrorism.

The U.S. government is creating the terror. It is, in fact, the source of the terror.

Just think about it for a minute: Cyberwarfare. Terrorism. Bio-chemical attacks. The nuclear arms race. Surveillance. The drug wars.

Almost every national security threat that the government has claimed greater powers in order to fight—all the while undermining the liberties of the American citizenry—has been manufactured in one way or another by the government.

Did I say Machiavellian? This is downright evil.

We’re not dealing with a government that exists to serve its people, protect their liberties and ensure their happiness. Rather, these are the diabolical machinations of a make-works program carried out on an epic scale whose only purpose is to keep the powers-that-be permanently (and profitably) employed.

It’s time to wake up and stop being deceived by government propaganda.

Mind you, by “government,” I’m not referring to the highly partisan, two-party bureaucracy of the Republicans and Democrats.

I’m referring to “government” with a capital “G,” the entrenched Deep State that is unaffected by elections, unaltered by populist movements, and has set itself beyond the reach of the law.

I’m referring to the corporatized, militarized, entrenched bureaucracy that is fully operational and staffed by unelected officials who are, in essence, running the country and calling the shots in Washington DC, no matter who sits in the White House.

Be warned: in the future envisioned by the government, we will not be viewed as Republicans or Democrats. Rather, “we the people” will be enemies of the state.

For years, the government has been warning against the dangers of domestic terrorism, erecting surveillance systems to monitor its own citizens, creating classification systems to label any viewpoints that challenge the status quo as extremist, and training law enforcement agencies to equate anyone possessing anti-government views as a domestic terrorist.

What the government failed to explain was that the domestic terrorists would be of the government’s own making, and that “we the people” would become enemy #1.

As I make clear in my book, Battlefield America: The War on the American People, we’re already enemies of the state.

You want to change things? Start by rejecting the political labels and the polarizing rhetoric and the “us vs. them” tactics that reduce the mass power of the populace to puny, powerless factions.

Find common ground with your fellow citizens and push back against the government’s brutality, inhumanity, greed, corruption and power grabs.

Be dangerous in the best way possible: by thinking for yourself, by refusing to be silenced, by choosing sensible solutions over political expediency and bureaucracy.

When all is said and done, the solution to what ails this country is really not that complicated: decency, compassion, common sense, generosity balanced by fiscal responsibility, fairness, a commitment to freedom principles, and a firm rejection of the craven, partisan politics of the Beltway elites who have laid the groundwork for the government’s authoritarian coup d’etat.

Let the revolution begin.

 

The Real Big Brother

By Eric Zuesse

Source: Consortium News

Jeff Bezos is the owner of The Washington Post, which leads America’s news-media in their almost 100 percent support and promotion of neoconservatism, American imperialism and wars. This includes sanctions, coups, and military invasions against countries that America’s billionaires want to control but don’t yet control — such as Venezuela, Syria, Iran, Russia, Libya, and China.

These are aggressive wars against countries which have never aggressed against the United States. They are not, at all, defensive, but the exact opposite. It’s not necessarily endless war (even Hitler hadn’t planned that), but war until the entire planet has come under the control of the U.S. Government, a government that is itself controlled by America’s billionaires, the funders of neoconservatism and imperialism — in both major American political parties, think tanks, newspapers, TV networks, etcetera.

Bezos has been a crucial part of neoconservatism, ever since, at the June 6-9 2013 Bilderberg meeting, he arranged with Donald Graham, the Washington Post’s owner, to buy that newspaper, for $250 million. Bezos had already negotiated, in March of that same year, with the neoconservative CIA Director, John Brennan, for a  $600 million ten-year cloud computing contract that transformed Amazon corporation, from being a reliable money-loser, into a reliably profitable firm.

That caused Bezos’s net worth to soar even more (and at a sharper rate of rising) than it had been doing while it had been losing money. He became the most influential salesman not only for books, but for the CIA, and for such mega-corporations as Lockheed Martin. Imperialism has supercharged his wealth, but it didn’t alone cause it. Bezos might be the most ferociously gifted business-person on the planet.

Some of America’s billionaires don’t care about international conquest as much as he does, but all of them at least accept neoconservatism; none of them, for example, establishes and donates large sums to, anti-imperialistic organizations; none of America’s billionaires is determined to end the reign of neoconservatism, nor even to help the fight to end it, or at least to end its grip over the U.S. government. None. Not even a single one of them does.

Plutocrat Bezos at the Pentagon with then Defense Secretary Ash Carter, May 2016. (Wikimedia Commons)

But many of them establish and donate large sums to neoconservative organizations, or run neocon organs such as The Washington Post.  That’s the way billionaires are, at least in the United States. All of them are imperialists. They sponsor it; they promote it and hire people who do, and demote or get rid of people who don’t. Expanding an empire is extremely profitable for its aristocrats, and always has been, even before the Roman Empire.

Bezos wants to privatize everything around the world that can become privatized, such as education, highways, health care, and pensions. The more that billionaires control those things, the less that everyone else does; and preventing control by the public helps to protect billionaires against democracy that would increase their taxes and government regulations that would reduce their profits by increasing their corporations’ expenses. So, billionaires control the government in order to increase their takings from the public.

With the help of the war promotion of  The Washington Post, Bezos is one of the world’s top personal sellers to the U.S. military-industrial complex. He controls and is the biggest investor in Amazon corporation, whose Web Services division supplies all cloud-computing services to the Pentagon, CIA and NSA. (He’s leading the charge in the most advanced facial recognition technology too.)

In April there was a headline, “CIA Considering Cloud Contract Worth ‘Tens of Billions’,” which contract could soar Bezos’s personal wealth even higher into the stratosphere, especially if he wins all of it (as he previously did).

He also globally dominates, and is constantly increasing his control over the promotion and sale of books and films, because his Amazon is the world’s largest retailer (and now also one of the largest publishers, producers and distributors.) That, too, can have a huge impact upon politics and government, indirectly, by promoting the most neocon works helping to shape intellectual discourse (and voters’ votes) in the country.

Bezos is crushing millions of retailers by his unmatched brilliance at controlling one market after another as Amazon or as an essential middleman for — and often even a controller of — Amazon’s retail competitors.

He is a strong believer in “the free market”, which he has mastered perhaps better than anyone. This means that Bezos supports the unencumbered ability of billionaires, by means of their money, to control and eventually absorb all who are less powerful than they.

Because he is so enormously gifted himself at amassing wealth, he has thus-far been able to rise to the global top, as being one of the world’s most powerful individuals. The wealthiest of all is King Salman— the owner of Saudi Arabia, whose Aramco (the world’s largest oil company) is, alone, worth over a trillion dollars. (Forbes and Bloomberg exclude monarchs from their wealth-rankings.)

In fact, Bloomberg is even so fraudulent about it as to have headlined on Aug. 10, “The 25 wealthiest dynasties on the planet control $1.4 trillion” and violated their tradition by including on their list one monarch, King Salman, whom they ranked at #4 as owning only $100 million, a ludicrously low ‘estimate’, which brazenly excluded not just Aramco but any of the net worth of Saudi Arabia.

Bloomberg didn’t even try to justify their wacky methodology, but merely presumed the gullibility of their readers for its acceptance. That King, therefore, is at least seven times as rich as Bezos is. He might possibly be as powerful as Bezos is. The supreme heir is lots wealthier even than the supreme self-made billionaire or “entrepreneur” is.

Certainly, both men are among the giants who bestride the world in our era. And both men are libertarians — champions of the belief that property rights (of which, billionaires have so much) are the basis of all rights, and so they believe that the wealthiest people possess the most rights of all, and that the poorest people have the least, and that all persons whose net worths are negative (having more debts than assets) possess no rights except what richer people might donate to or otherwise grant to them, out of kindness or otherwise (such as familial connections).

This — privatization of everything — is what libertarianism is: a person’s worth is his or her “net worth” — nothing else. That belief is pure libertarianism. It’s a belief that many if not most billionaires hold. Billionaires are imperialistic because they seek to maximize the freedom of the super-rich, regardless of whether this means increasing their takings from, or ultimately impoverishing, everyone who isn’t super-rich. They have a coherent ideology. It’s based on wealth. The public instead believes in myths that billionaires enable to be promulgated.

Like any billionaire, Bezos hires and retains employees and other agents who do what he/she wants them to do. This is their direct power. But billionaires also possess enormous indirect power by means of their interdependencies upon one-another, as each large corporation is contractually involved with other corporations, especially with large ones such as they; and, so, whatever power any particular billionaire possesses is actually a shared power, along with the others. (An example was the deal Bezos made with Graham.)

Collectively, they network together, even with ones they might never even have met personally, but only through their representatives, and even with their own major economic competitors. This is collective power which billionaires possess in addition to their individual power as hirers of employees and other agents.

Whereas Winston Smith, in the prophetic allegorical novel 1984, asked his superior and torturer O’Brien, “Does Big Brother exist?”

“‘Of course he exists. The Party exists. Big Brother is the embodiment of the Party.’

‘Does he exist in the same way as I exist?’

‘You do not exist,’ said O’Brien.”

This collective power is embodied by Bezos as well as any billionaire does.  A few of the others may embody it too, such as Bill Gates, Warren Buffett, Larry Ellison, Mark Zuckerberg, Charles Koch, Sergey Brin, Michael Bloomberg, George Soros,  and Jack Dorsey.  They compete against each other, and therefore have different priorities for the U.S. government; but, all of them agree much more than they disagree in regards to what the Government “should” do (especially that the U.S. military should be expanded — at taxpayer’s expense, of course, not their own).

Basically, Big Brother, in the real world is remarkably coherent and unified — far more so than the public is — and this is one of the reasons why they control Government, bypassing the public.

Here is how all of this plays out, in terms of what Bezos’s agents have been doing:

His Amazon pays low to no federal taxes because the Federal Government has written the tax-laws to encourage companies to do the types of things that Bezos has always wanted Amazon to do.

The U.S. government consequently encourages mega-corporations through taxes and regulations to crush small firms by making it harder for them to grow. That somewhat locks-in the existing aristocracy to be less self-made (as Bezos himself was, but his children won’t be).

Elected politicians overwhelmingly support this because most of their campaign funds were donated by super-rich individuals and their employees and other agents. It’s a self-reinforcing system. Super-wealth controls the government, which (along with the super-wealthy and their corporations) controls the public, which reduces economic opportunity for them. The end-result is institutionally reinforced extreme wealth-inequality, becoming more extreme all the time.

The billionaires are the real Big Brothers. And Bezos is the biggest of them all.

Russiagate: The Miserable Truth

in Washington, DC on April 14, 2004. Robert Mueller named special prosecutor for Russia probe, Washington DC, USA – 17 May 2017 (Rex Features via AP Images)

By Barry Kissin

Source: OpEdNews.com

Introductory Disclaimer: I have never voted Republican for Federal office and I deplore most of what Fox News has to offer. I am currently registered Democrat in order to vote in the Presidential primary for either Bernie Sanders or Tulsi Gabbard.

Going on three years ago, on Nov. 12, 2016, my local newspaper, the Frederick News-Post, published my letter that stated: “Hillary Clinton was a terrible candidate. In an effort to deflect attention from the DNC rigging of her primary contest with Bernie Sanders, she resorted to somehow blaming the Russians. This was part of a pathological pattern, whose ultimate purpose was and is to remove the main obstacle (Russia under Putin) to neo-con schemes for global domination.”

We do not want to further demonize Russia (or Iran). This is unwarranted and dangerous to human survival. Its purpose is to aggressively assert American Empire against all limitations and to justify the astronomical sums we spend on war and weapons.

Hillary touted that all of our 17 intelligence agencies concluded with “high confidence” that the Russians meddled in our election for Trump’s benefit. False. The assessor was John Brennan, then spy-in-chief, who put together a secret panel of his choices from FBI, CIA and NSA in order to produce his miserable invention of the who, how and why the Russians did their dastardly meddling.

See Washington Post, June 23, 2017: “CIA Director John Brennan first alerts the White House in early August [2016] that Russian President Vladimir Putin had ordered an operation to defeat or at least damage Hillary Clinton and help elect her opponent, Donald Trump” based on what Brennan claimed was some source “deep inside the Russian government that detailed Russian President Vladimir Putin’s direct involvement in a cyber campaign”. Which source had supplied “Putin’s specific instructions on the operation’s audacious objectives”? No evidence has ever been produced backing up any of this.

Enter Mueller, a “deep state” hack if there ever was one. It bears mentioning that Mueller is the grandnephew of Richard Bissel, second in command at the CIA when JFK fired him after the Bay of Pigs fiasco. Mueller is married to the granddaughter of General Charles Cabell, third in command at the CIA, also fired by JFK; Mueller’s wife is also a grandniece of Earl Cabell, Mayor of Dallas when JFK was assassinated there, who was recently uncovered to have been a CIA asset. Small world.

Mueller’s career is replete with the production of disinformation and cover-ups. My community, home of Fort Detrick, got a dose of Mueller at work in the Amerithrax investigation. That investigation is the one in which Mueller framed Detrick scientist Bruce Ivins for sending the anthrax letters in order to cover up that the weaponization of the anthrax attack was a unique CIA technology.

On behalf of his current handlers, Mueller sang and danced his way into various indictments, most of which truly had nothing to do with Russiagate, but he couldn’t pull off even trying to nail Trump for collusion.

Of course, this isn’t the end of it. Pathetically, Democrats are pretending that Russiagate was nevertheless worthwhile (thus compounding the stupidity) on the basis that Trump obstructed justice, and also that we now know we have to protect our precious Presidential election from the Russians.

Obstructed what? Obstructed an investigation into the fabricated charge of collusion? Mueller just testified (on July 24) that whatever Trump did, it neither curtailed nor hindered his investigation, which after more than two years could neither find nor manufacture any evidence of collusion.

But now let’s drill down into this mantra of Russian meddling. According to the Mueller report, there were two facets: 1.) hacking of the DNC emails then sourcing to Wikileaks; and 2.) social media campaign. The social media campaign is a joke. The hacking story is more serious.

According to Mueller, it was the Russian company Internet Research Agency (IRA) that on behalf of the Russian government conducted the Facebook campaign. At page 25 of Vol. 1, Mueller informs us that this Russian company purchased 3,500 ads for a total expenditure of $100,000, which I ask you to compare to the $81 million spent on Facebook ads by the Trump and Clinton campaigns.

It’s sillier than that. According to Facebook’s testimony before Congress, most of the ads the IRA purchased were after the election and most said nothing about either Hillary or Trump. But they tended to promote “divisiveness” according to Mueller. Absurd!

We also now have a recently unsealed ruling by the U.S. District Court for D.C. that ordered Mueller to cease and desist from claiming that IRA was acting on behalf of the Kremlin – his linchpin claim — supported by no substantive evidence.

The most credible analyst of the hacking story has been completely (and deliberately) ignored by mainstream media. The implications of his analysis are so unsettling (dangerous) that even most alternative media avoid acknowledging him. But I believe “unsettling” is necessary to the process of waking up from the fairy tales Americans rely on, so I will lay out the truth about the stolen emails. This truth is simple and clear and unsettling.

The “most credible analyst” is named William Binney. He is a 32-year veteran of the NSA who, when he left the NSA in 2001, was the “Technical Leader” for intelligence, the senior technical analyst at the NSA. Binney resigned and blew the whistle when he discovered that his surveillance program was being used to spy on Americans without probable cause. Binney went on to co-found Veteran Intelligence Professionals for Sanity (VIPS) comprised of our smartest and bravest intelligence veterans whose very first effort in Feb., 2003 was to debunk Colin Powell’s UN presentation and to warn against “a war [upon Iraq] for which we see no compelling reason and from which we believe the unintended consequences are likely to be catastrophic.”

The VIPS forensic analysis of the hacking story in all of its painstaking detail can be accessed at ConsortiumNews.com. Here is a takeaway: On July 5, 2016, the intrusion into the DNC emails transferred data at an average speed of 22.7 megabytes per second, a speed that far exceeded the capability of the Internet as of July 2016. The speed of that data transfer corresponds with the speed of copying to a thumb drive (memory stick). Thus, there was no hack via the internet; it was a leak by someone with physical access to a DNC computer or server, most probably an insider.

We know who that insider was. His name, Seth Rich; a 27-year old DNC staffer who supported Bernie Sanders, and who was murdered in Washington, D.C on July 10, 2016. Two gun shots in the back. D.C. police said Rich was the victim of a “random burglary,” but nothing was taken, not his expensive watch, nor his money, nor his credit cards, nor his cell phone.

On August 9, 2016, Julian Assange was interviewed on Dutch TV in a segment available on YouTube at https://www.youtube.com/watch?v=Kp7FkLBRpKg Without violating the Wikileaks cardinal rule of never revealing sources, Assange came as close as he could to identifying Seth Rich as the source of the DNC emails. On that same date, Wikileaks offered a $20,000 reward for information leading to the conviction of Rich’s killer or killers.

William Binney informs us that in response to a FOIA request seeking records of communications between Seth Rich and others including Julian Assange, the NSA revealed that it has 15 documents, 32 pages of relevant records, but that it is all classified.

Next witness, Seymour Hersh. Wikipedia: “Hersh first gained recognition in 1969 for exposing the My Lai Massacre and its cover-up during the Vietnam War, for which he received the 1970 Pulitzer Prize for International Reporting. During the 1970s, Hersh covered Watergate for The New York Times and revealed the clandestine bombing of Cambodia. In 2004, he reported on the US military’s mistreatment of detainees at Abu Ghraib prison. He has won two National Magazine Awards and five George Polk Awards. In 2004, he received the George Orwell Award. More recently, Hersh uncovered that Obama, and Trump in 2017, blamed chemical attacks in Syria on Assad as a pretext for bombing Syria when in fact the chemical attacks were staged by the “rebels” we support.

In Nov. 2016, when Hersh did not realize he was being recorded, the recording became available months later on youtube at https://www.youtube.com/watch?v=rwMKFnzLoxQ , here’s what Hersh said: “All I know comes off an FBI report”. Paraphrasing : The D.C. police got a warrant to search Rich’s apartment. They seized his computer and turned it over to the FBI’s cyber unit. What the [FBI] report says is that sometime in late spring/early summer, [Seth Rich] makes contact with Wikileaks. That’s in his computer; [Rich]; had submitted some juicy emails from the DNC. He offered an extensive sample”, and said, “I want money; anyway Wikileaks got access.

Hersh goes on to say: “Brennan’s an a**hole. I’ve known all these people for years. I have somebody on the inside who will go and read a file for me. This person is unbelievably accurate and careful. He’s a very high level guy. It’s a Brennan operation. [Russiagate] was an American disinformation operation.”

Seth Rich had to be eliminated before Russiagate could be perpetrated.