The Deepening Deep State

cia-deep-state-inside-washingtons-shadowy-power-elite

By James Howard Kunstler

Source: Clusterfuck Nation

One amusing angle on the news media broadside about Russia “hacking” the US election is the failure to mention — or even imagine! — that the US incessantly and continually runs propaganda psy-ops against every other country in the world. And I’m not even including the venerable, old, out-in-the-open propaganda organs like Voice of America and Radio Free Europe (reminder: the Iron Curtain came down a quarter century ago). Do you suppose that nobody at Langley, or the Pentagon, or the NSA’s sprawling 1.5 million square foot Utah Data Center is laboring night and day to sow confusion among other societies to push our various agendas?

The main offensive started with The Washington Post’s publication on Nov 26 of “The List,” a story calling out dozens of blogs and web news-sites as purveyors of “fake news” fronting for Russian disinformation forces. The list included Zero Hedge, Naked Capitalism, and David Stockman’s blog. There were several whack-job sites mixed in the list for seasoning — The Daily Stormer (Nazis), Endtime.com (Evangelical apocalyptic), GalacticConnection (UFO shit). The rest range between tabloid-silly and genuine, valuable news commentary. What else would you expect in a society with an Internet AND a completely incoherent consensus about reality?

Pretty obviously, the struggle between mainstream news and Web news climaxed over the election, with the mainstream overwhelmingly pimping for Hillary, and then having a nervous breakdown when she lost. Desperate to explain the loss, the two leading old-line newspapers, The New York Times and The Washington Post, ran with the Russia-Hacks-Election story — because only Satanic intervention could explain the fall of Ms. It’s-My-Turn / I’m-With-Her. Thus, the story went, Russia hacked the Democratic National Committee (DNC), gave the hacked emails to Wikileaks, and sabotaged not only Hillary herself but the livelihoods of every myrmidon in the American Deep State termite mound, an unforgivable act.

Also interestingly, these newspapers and their handmaidens on TV, were far less concerned as to whether the leaked information was true or not — e.g. the Clinton Foundation donors’ influence-peddling around arms deals made in the State Department; the DNC’s campaign to undermine Bernie Sanders in the primaries; DNC temporary chair (and CNN employee) Donna Brazille conveying debate questions to HRC; the content of HRC’s quarter-million-dollar speeches to Wall Street banks. All of that turned out to be true, of course.

Then, a few weeks after the election, the US House of Representatives passed H.R. 6393, the Intelligence Authorization Act for Fiscal Year 2017. Blogger Ronald Thomas West reports:

Section 501 calls for the government to “counter active measures by Russia to exert covert influence … carried out in coordination with, or at the behest of, political leaders or the security services of the Russian Federation and the role of the Russian Federation has been hidden or not acknowledged publicly.”

The measure has not been passed by the Senate or signed into law yet, and the holiday recess may prevent that. But it is easy to see how it would empower the Deep State to shut down whichever websites they happened to not like. My reference to the Deep State might even imply to some readers that I’m infected by the paranoia virus. But I’m simply talking about the massive “security” and surveillance matrix that has unquestionably expanded since the 9/11 airplane attacks, creating a gigantic NSA superstructure above and beyond the Central Intelligence Agency, the Department of Defense’s DIA, and the hoary old FBI.

A little paranoia about the growing fascist behavior of the US government is a useful corrective to trends that citizens ought to be concerned about — for instance, the militarization of police; the outrageous “civil forfeiture” scam that allows police to steal citizens cash and property without any due process of law; the preferential application of law as seen in the handling of the Clinton Foundation activities and the misconduct of banking executives; the attempt to impose a “cashless society” that would herd all citizens into a financial surveillance hub and eliminate their economic liberty.

These matters are especially crucial as the nation stumbles into the next financial crisis and the Deep State becomes desperate to harvest every nickel it can to rescue itself plus the cast of “systemically important” (Too-Big-To-Fail) banks and related institutions like Fannie Mae and Freddie Mac, which are about to once again be left holding colossal bags of worthless non-performing mortgages, not to mention the pension funds and insurance companies that will also founder in the Great Unwind that is likely to commence as Trump hangs his golden logo over the White House portico.

‘What It Takes to Be President of the American Police State: Anti-Big Money, Anti-War, Pro-Constitution, Freedom-Loving Candidates Need Not Apply’

imageedit_4850_9701377216

By John W. Whitehead

Source: A Government of Wolves

“The qualifications for president seem to be that one is willing to commit mass murder one minute and hand presidential medals of freedom to other war criminals in the next. One need only apply if one has very loose, flexible, or non-existent morality.”—Author and activist Cindy Sheehan

Long gone are the days when the path to the White House was open to anyone who met the Constitution’s bare minimum requirements of being a natural born citizen, a resident of the United States for 14 years, and 35 years of age or older.

Today’s presidential hopefuls must jump through a series of hoops aimed at selecting the candidates best suited to serve the interests of the American police state. Candidates who are anti-war, anti-militarization, anti-Big Money, pro-Constitution, pro-individual freedom and unabashed advocates for the citizenry need not apply.

The carefully crafted spectacle of the presidential election with its nail-biting primaries, mud-slinging debates, caucuses, super-delegates, popular votes and electoral colleges has become a fool-proof exercise in how to persuade a gullible citizenry into believing that their votes matter.

Yet no matter how many Americans go to the polls on November 8, “we the people” will not be selecting the nation’s next president.

While voters might care about where a candidate stands on healthcare, Social Security, abortion and immigration—hot-button issues that are guaranteed to stir up the masses, secure campaign contributions and turn any election into a circus free-for-all—those aren’t the issues that will decide the outcome of this presidential election.

What decides elections are money and power.

We’ve been hoodwinked into believing that our votes count, that we live in a democracy, that elections make a difference, that it matters whether we vote Republican or Democrat, and that our elected officials are looking out for our best interests. Truth be told, we live in an oligarchy, and politicians represent only the profit motives of the corporate state, whose leaders know all too well that there is no discernible difference between red and blue politics, because there is only one color that matters in politics—green.

As much as the Republicans and Democrats like to act as if there’s a huge difference between them and their policies, they are part of the same big, brawling, noisy, semi-incestuous clan. Watch them interact at social events—hugging and kissing and nudging and joking and hobnobbing with each other—and it quickly becomes clear that they are not sworn enemies but partners in crime, united in a common goal, which is to maintain the status quo.

The powers-that-be will not allow anyone to be elected to the White House who does not answer to them.

Who are the powers-that-be, you might ask?

As I point out in my book Battlefield America: The War on the American People, the powers-that-be are the individuals and corporations who profit from America’s endless wars abroad and make their fortunes many times over by turning America’s homeland into a war zone. They are the agents and employees of the military-industrial complex, the security-industrial complex, and the surveillance-industrial complex. They are the fat cats on Wall Street who view the American citizenry as economic units to be bought, sold and traded on a moment’s notice. They are the monied elite from the defense and technology sectors, Hollywood, and Corporate America who believe their money makes them better suited to decide the nation’s future. They are the foreign nationals to whom America is trillions of dollars in debt.

One thing is for certain: the powers-that-be are not you and me.

In this way, the presidential race is just an exaggerated farce of political theater intended to dazzle, distract and divide us, all the while the police state marches steadily forward.

It’s a straight-forward equation: the candidate who wins the White House will be the one who can do the best job of ensuring that the powers-that-be keep raking in the money and acquiring ever greater powers. In other words, for any viable presidential candidate to get elected today that person must be willing to kill, lie, cheat, steal, be bought and sold and made to dance to the tune of his or her corporate overlords.

The following are just some of the necessary qualifications for anyone hoping to be appointed president of the American police state. Candidates must:

Help grow the militaryindustrial complex: Fifty-five years after President Dwight D. Eisenhower warned about the growth of the “military-industrial complex” in his farewell address, the partnership between the government, the military and private corporations has resulted in the permanent militarization of America. From militarized police and the explosive growth of SWAT teams to endless wars abroad, the expansion of private sector contractors, and never-ending blowback from our foreign occupations, we have become a nation permanently at war. As the New York Times pointed out, “themilitary is the true ‘third rail’ of American politics.” The military-industrial complex understands the value of buying the presidency, and has profited from the incessant warmongering of Obama and his predecessors. If money is any indicator of who the defense industry expects to win this November, thus far, Hillary Clinton is winning the money race, having collected more campaign contributions from employees with the 50 largest military contractors.

Police the rest of the world using U.S. troops: The U.S. military empire’s determination to police the rest of the world has resulted in more than 1.3 million U.S. troops being stationed at roughly 1000 military bases in over 150 countriesaround the world, including 48,000 in Japan, 37,000 in Germany, 27,000 in South Korea and 9800 in Afghanistan. That doesn’t include the number of private contractors pulling in hefty salaries at taxpayer expense. In Afghanistan, for example, private contractors outnumber U.S. troops three to one. Now comes the news that the U.S. is preparing to sendtroops to Libya on a long-term mission to fight ISIS.

Sow seeds of discord and foment wars among other nations under the guise of democracy: It’s not enough for the commander-in-chief to lead the United States into endless wars abroad. Any successful presidential candidate also needs to be adept at stirring up strife within other nations under the guise of spreading democracy. The real motive, of course, is creating new markets for the nation’s #1 export: weapons. In this way, the U.S. is constantly arming so-called “allies” with deadly weapons, only to later wage war against these same nations for possessing weapons of mass destruction. It happened in Iraq when the U.S. sold Saddam Hussein weapons to build his war machine. It happened in Syria when the U.S. provided rebel fighters with military equipment and munitions, only to have them seized by ISIS and used against us. Now comes the news that President Obama has agreed to sell weapons to Vietnam, lifting a decades-long embargo against the nation whose civil war claimed the lives of more than 90,000 Americans.

Speak of peace while slaughtering innocent civilians: Barack Obama’s campaign and subsequent presidency illustrates this principle perfectly. The first black American to become president, Obama was awarded the Nobel Peace Prize long before he had done anything to truly deserve it. He has rewarded the Nobel committee’s faith in him by becoming one of the most hawkish war presidents to lead the nation, overseeing a targeted-killing drone campaign that has resulted in thousands of civilian casualties and deaths. Ironically, while Obama has made no significant effort to de-escalate government-inflicted violence or de-weaponize militarized police, he has gone to great lengths to denounce and derail private gun ownership by American citizens.

Prioritize surveillance in the name of security over privacy: Since 9/11, the Surveillance State has undergone a dramatic boom, thanks largely to the passage of the USA Patriot Act and so-called “secret” interpretations of the mammoth law allowing the NSA and other government agencies to spy on Americans’ electronic communications. What began as a government-driven program under George W. Bush has grown under Obama into a mass surveillance private sector that makes its money by spying on American citizens. As Fortune reports, “In response to security concerns after 9/11, Americans witnessed the growth of a massive domestic security apparatus, fueled by federal largesse.” That profit-incentive has opened up a multi-billion dollar video surveillance industry that is blanketing the country with surveillance cameras—both governmental and private—which can be accessed by law enforcement at a moment’s notice.

Promote the interests of Corporate America and Big Money over the rights of the citizenry: Almost every major government program hailed as benefiting Americans—affordable healthcare, the war on terror, airport security, police-worn body cameras—has proven to be a Trojan Horse aimed at enriching Corporate America while leaving Americans poorer, less secure and less free. For instance, the so-called “affordable” health care mandated by Congress has become yet another costly line item in already strained household budgets for millions of Americans.

Expand the powers of the imperial president while repeatedly undermining the rule of law: George W. Bush assumed near-absolute power soon after the September 11, 2001, attacks. Unfettered by Congress or the Constitution, Bush led the “war on terror” abroad and championed both the USA Patriot Act and Homeland Security Department domestically. This, of course, led to the Bush Administration’s demand that presidential wartime powers permit the President to assume complete control over any and all aspects of an international war on terrorism. Such control included establishing military tribunals and eliminating basic rights long recognized under American law.

When Barack Obama ascended to the presidency in 2008, there was a sense, at least among those who voted for him, that the country might change for the better. Those who watched in awe as President Bush chipped away at our civil liberties over the course of his two terms as president thought that perhaps the young, charismatic Senator from Illinois would reverse course and put an end to some of the Bush administration’s worst transgressions—the indefinite detention of suspected terrorists, the torture, the black site prisons, and the never-ending wars that have drained our resources, to name just a few. As we near the end of Obama’s two terms in office, that fantasy has proven to be just that: a fantasy. Indeed, President Obama has not only carried on the Bush legacy, but has taken it to its logical conclusion. Obama has gone beyond Guantanamo Bay, gone beyond spying on Americans’ emails and phone calls, and gone beyond bombing countries without Congressional authorization. As journalist Amy Goodman warned, “the recent excesses of U.S. presidential power are not transient aberrations, but the creation of a frightening new normal, where drone strikes, warrantless surveillance, assassination and indefinite detention are conducted with arrogance and impunity, shielded by secrecy and beyond the reach of law.”

Act as if the work of the presidency is a hardship while enjoying all the perks: The race for the White House is an expensive, grueling horse race: candidates must have at a minimum $200 or $300 million or more just to get to the starting line. The total cost for this year’s election is estimated to exceed $5 billion and could go as high as $10 billion. However, for the winner, life in the White House is an endless series of star-studded dinner parties, lavish vacations and perks the likes of which the average American will never enjoy. The grand prize winner will rake in a $400,000 annual salary (not including $100,000 a year for travel expenses, $19,000 for entertaining, $50,000 for “general” expenses and last but not least, $1,000,000 for “unanticipated” expenses), live rent-free in a deluxe, 6-storey, 55,000 square foot mansion that comes complete with its own movie theater and bowling alley, round-the-clock staff, florists, valets and butlers. Upon leaving the White House, presidents are gifted with hefty pensions, paid staff and office space, travel allowances and lifetime medical care. Ex-presidents can also expand upon their largesse by writing books and giving speeches (Bill Clinton was given a $15 million advance for his memoir and routinely makes upwards of $100,000 per speech).

Clearly, it doesn’t matter where a candidate claims to stand on an issue as long as he or she is prepared to obey the dictates of the architects, movers and shakers, and shareholders of the police state once in office.

So here we are once again, preparing to embark upon yet another delusional, reassurance ritual of voting in order to sustain the illusion that we have a democratic republic when, in fact, what we have is a dictatorship without tears. Once again, we are left feeling helpless in the face of a well-funded, heavily armed propaganda machine that is busily spinning political webs with which the candidates can lure voters. And once again we are being urged to vote for the lesser of two evils.

Railing against a political choice that offers no real choice, gonzo journalist Hunter S. Thompson snarled, “How many more of these stinking, double-downer sideshows will we have to go through before we can get ourselves straight enough to put together some kind of national election that will give me and the at least 20 million people I tend to agree with a chance to vote for something, instead of always being faced with that old familiar choice between the lesser of two evils?”

Remember, the lesser of two evils is still evil.

Stripping the veneer off America’s propaganda menagerie

qefgtrhy

By Wayne Madsen

Source: Intrepid Report

National Security Agency whistleblower Edward Snowden and WikiLeaks founder Julian Assange have doubled down recently on the games being played in cyberspace by America’s cyberwarriors. Snowden suggests that many of NSA’s most damaging malware programs are now in the hands of America’s opponents, thanks to enterprising foreign counterintelligence hackers known as the Shadow Brokers. Snowden believes that the malware, including destructive programs such as Stuxnet, are being auctioned off, via Bitcoin payments, by the Shadow Brokers. Snowden stated that the malware was obtained through hacking from a murky NSA operation called the “Equation Group.”

Assange, fearful that a new Ecuadorian president will hand him over to a Clinton administration in 2017, claims to have more hacked bombshells to drop on Team Clinton, courtesy of weak security in Democratic National Committee and Clinton campaign computer systems.

We have entered a new phase of cyberwarfare, one in which America’s (and Israel’s) most damaging computer hacking and disruption programs are available to anyone willing to pay in Bitcoins on the cyberblack market. The Democratic Party’s leaked emails, coupled with the leaked State Department cables, has Hillary Clinton in an outrage. These disclosures, along with the Snowden disclosures that illustrate how America spies on friend and foe, have stripped the veneer off of America’s propaganda menagerie. Two of the three culprits Mrs. Clinton would like to see in prison for the rest of their lives are, for the time being, outside of Gulag America. Snowden is enjoying political asylum in Russia and Assange has asylum at the Ecuadorian embassy in London. The third, Chelsea Manning, is serving a 35-year prison term at Fort Leavenworth in Kansas and allegedly recently attempted suicide.

Paul Ceglia, who claims to have been the co-founder of Facebook, says he is on the run from the CIA after he filed suit against Facebook and its owner Mark Zuckerberg. Although Zuckerberg admits to having a past business relationship with Ceglia, the US Justice Department criminally charged Ceglia for trying to defraud Facebook after the former associate of Zuckerberg brought a civil suit in federal court in Buffalo against the company. Interestingly, Facebook has donated more money to Hillary Clinton than any other presidential candidate. But what is really at issue in the bizarre case is that Ceglia claims that Facebook’s seed money came from the CIA’s venture capital firm IN-Q-TEL, a charge to which WMR can attest after compiling a massive list of CIA front companies and proprietaries in the soon-to-be-published book: “The Almost Classified Guide to CIA Front Companies, Proprietaries and Contractors.”

The CIA and its partners at Facebook, Google, Yahoo, Microsoft, and other social media firms have striven to control the new media in the same manner that the CIA controlled the “old media” through operations like MOCKINGBIRD. During the Cold War era, the CIA claimed that all the world’s ills were due to Communist front organizations that influenced the media. The truth is that the so-called “fronts” often provided actual accounts of the misdeeds of the CIA and other Western intelligence agencies. However, with U.S. newspapers, magazines, and broadcast networks carrying the water for the CIA, it was Langley’s interpretation of the news that made Western headlines. The “Communist” reports were relegated to the nether regions of “Soviet disinformation” campaigns and “active measures.” The CIA laughably put out a periodical report on such “disinformation” tactics. In reality, what was called “disinformation” was actually bona fide news.

Today, when the CIA wants to debase a news article, it uses such operations as Snopes.com and Wikipedia to engage in CIA disinformation tactics. Uncomfortable truthful news items are quickly dispatched with the term “conspiracy theory.” There is little doubt that Facebook, Wikipedia, and Snopes are part of a “new MOCKINGBIRD” designed for the digital age. Like them or not, Snowden, Assange, Manning, Ceglia, and others have pulled the veil off of the new MOCKINGBIRD.

A formerly secret February 1987 CIA report on Soviet disinformation tactics illustrates that what was described then as “propaganda” was, in fact, the truth.

  • The CIA called baseless charges in a Soviet book that Jonestown, Guyana was a CIA behavioral control operation. It was.
  • The Soviets accused Ronald Reagan’s Strategic Defense Initiative (SDI) of having the goal of weaponizing outer space. Not only was that the goal then, but it remains the goal of present incarnations of SDI.
  • The Soviets and the Afghan president, Najibullah of the Afghan Communist Party, said that they reached out to 50,000 Afghan mujaheddin in Afghanistan and Pakistan, who agreed to lay down their arms and join a coalition government, with eight opposition parties joining the Communists. The CIA and Western media called the news bogus. It was true with television footage of Afghan refugees returning to their homeland from India. The Soviets wanted an internationally-guaranteed neutral Afghanistan before withdrawing their troops. The CIA wanted a radical Islamic Afghanistan from which to launch attacks on the southern Soviet Union. That decision came back to bite the United States on September 11, 2001.
  • The CIA accused the Sandinista government of Nicaragua and the Soviets of being behind the Christian “Evangelical Committee for Development Aid” as a Communist front group. If so, it would have been the first time Communists and Christian evangelicals broke bread together. The CIA’s charge was fatuously false.
  • The Soviets accused the U.S. of using Africans as test subjects for a new AIDS vaccine. This charge has been proven with Africans being used as “guinea pigs” for various new vaccines in programs funded by the Bill and Melinda Gates Foundation, the Clinton Global Initiative, Pfizer Corporation, and other entities linked to CIA biological and genetic warfare operations.
  • Articles in two Bolivian newspapers that stated that the U.S. Information Service in La Paz was trying to recruit Bolivian journalists to write pro-Pentagon articles were deemed by the CIA to be bogus. The CIA charge was false and it included smearing the Federation of Bolivian Press Workers as a Communist front. That is the usual practice by the CIA when it’s caught red-handed.
  • The Soviet news agency Novosti was accused of running a false article, titled “The Relationship Between Journalists and the CIA: Hundreds of Them in International Press.” The article was spot on.
  • The CIA charged as Soviet disinformation charges that the CIA killed nine nonaligned leaders, including Indian Prime Ministers Indira and Rajiv Gandhi. In fact, the CIA has killed many more than nine nonaligned leaders.

In the digital world of YouTube, Facebook, Google, and other social and news media sites, the CIA continues its game of disinformation while accusing others of conducting the same game plan. Some three decades after the Cold War, the CIA’s charges of Soviet disinformation can now be seen as disinformation in their own right.

 

Wayne Madsen is a Washington, DC-based investigative journalist and nationally-distributed columnist. He is the editor and publisher of the Wayne Madsen Report (subscription required).

Evidence points to another Snowden at the NSA

NSA-CIA-Edward-Snowden

By James Bamford

Source: Reuters

In the summer of 1972, state-of-the-art campaign spying consisted of amateur burglars, armed with duct tape and microphones, penetrating the headquarters of the Democratic National Committee. Today, amateur burglars have been replaced by cyberspies, who penetrated the DNC armed with computers and sophisticated hacking tools.

Where the Watergate burglars came away empty-handed and in handcuffs, the modern- day cyber thieves walked away with tens of thousands of sensitive political documents and are still unidentified.

Now, in the latest twist, hacking tools themselves, likely stolen from the National Security Agency, are on the digital auction block. Once again, the usual suspects start with Russia – though there seems little evidence backing up the accusation.

In addition, if Russia had stolen the hacking tools, it would be senseless to publicize the theft, let alone put them up for sale. It would be like a safecracker stealing the combination to a bank vault and putting it on Facebook. Once revealed, companies and governments would patch their firewalls, just as the bank would change its combination.

A more logical explanation could also be insider theft. If that’s the case, it’s one more reason to question the usefulness of an agency that secretly collects private information on millions of Americans but can’t keep its most valuable data from being stolen, or as it appears in this case, being used against us.

In what appeared more like a Saturday Night Live skit than an act of cybercrime, a group calling itself the Shadow Brokers put up for bid on the Internet what it called a “full state-sponsored toolset” of “cyberweapons.” “!!! Attention government sponsors of cyberwarfare and those who profit from it !!!! How much would you pay for enemies cyberweapons?” said the announcement.

The group said it was releasing some NSA files for “free” and promised “better” ones to the highest bidder. However, those with loosing bids “Lose Lose,” it said, because they would not receive their money back. And should the total sum of the bids, in bitcoins, reach the equivalent of half a billion dollars, the group would make the whole lot public.

While the “auction” seemed tongue in cheek, more like hacktivists than Russian high command, the sample documents were almost certainly real. The draft of a top-secret NSA manual for implanting offensive malware, released by Edward Snowden, contains code for a program codenamed SECONDDATE. That same 16-character string of numbers and characters is in the code released by the Shadow Brokers. The details from the manual were first released by The Intercept last Friday.

The authenticity of the NSA hacking tools were also confirmed by several ex-NSA officials who spoke to the media, including former members of the agency’s Tailored Access Operations (TAO) unit, the home of hacking specialists.

“Without a doubt, they’re the keys to the kingdom,” one former TAO employee told the Washington Post. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.” Another added, “From what I saw, there was no doubt in my mind that it was legitimate.”

Like a bank robber’s tool kit for breaking into a vault, cyber exploitation tools, with codenames like EPICBANANA and BUZZDIRECTION, are designed to break into computer systems and networks. Just as the bank robber hopes to find a crack in the vault that has never been discovered, hackers search for digital cracks, or “exploits,” in computer programs like Windows.

The most valuable are “zero day” exploits, meaning there have been zero days since Windows has discovered the “crack” in their programs. Through this crack, the hacker would be able to get into a system and exploit it, by stealing information, until the breach is eventually discovered and patched. According to the former NSA officials who viewed the Shadow Broker files, they contained a number of exploits, including zero-day exploits that the NSA often pays thousands of dollars for to private hacking groups.

The reasons given for laying the blame on Russia appear less convincing, however. “This is probably some Russian mind game, down to the bogus accent,” James A. Lewis, a computer expert at the Center for Strategic and International Studies, a Washington think tank, told the New York Times. Why the Russians would engage in such a mind game, he never explained.

Rather than the NSA hacking tools being snatched as a result of a sophisticated cyber operation by Russia or some other nation, it seems more likely that an employee stole them. Experts who have analyzed the files suspect that they date to October 2013, five months after Edward Snowden left his contractor position with the NSA and fled to Hong Kong carrying flash drives containing hundreds of thousands of pages of NSA documents.

So, if Snowden could not have stolen the hacking tools, there are indications that after he departed in May 2013, someone else did, possibly someone assigned to the agency’s highly sensitive Tailored Access Operations.

In December 2013, another highly secret NSA document quietly became public. It was a top secret TAO catalog of NSA hacking tools. Known as the Advanced Network Technology (ANT) catalog, it consisted of 50 pages of extensive pictures, diagrams and descriptions of tools for every kind of hack, mostly targeted at devices manufactured by U.S. companies, including Apple, Cisco, Dell and many others.

Like the hacking tools, the catalog used similar codenames. Among the tools targeting Apple was one codenamed DROPOUTJEEP, which gives NSA total control of iPhones. “A software implant for the Apple iPhone,” says the ANT catalog, “includes the ability to remotely push/pull files from the device. SMS retrieval, contact-list retrieval, voicemail, geolocation, hot mic, camera capture, cell-tower location, etc.”

Another, codenamed IRATEMONK, is, “Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, Samsung, Seagate and Western Digital.”

In 2014, I spent three days in Moscow with Snowden for a magazine assignment and a PBS documentary. During our on-the-record conversations, he would not talk about the ANT catalog, perhaps not wanting to bring attention to another possible NSA whistleblower.

I was, however, given unrestricted access to his cache of documents. These included both the entire British, or GCHQ, files and the entire NSA files.

But going through this archive using a sophisticated digital search tool, I could not find a single reference to the ANT catalog. This confirmed for me that it had likely been released by a second leaker. And if that person could have downloaded and removed the catalog of hacking tools, it’s also likely he or she could have also downloaded and removed the digital tools now being leaked.

In fact, a number of the same hacking implants and tools released by the Shadow Brokers are also in the ANT catalog, including those with codenames BANANAGLEE and JETPLOW. These can be used to create “a persistent back-door capability” into widely used Cisco firewalls, says the catalog.

Consisting of about 300 megabytes of code, the tools could easily and quickly be transferred to a flash drive. But unlike the catalog, the tools themselves – thousands of ones and zeros – would have been useless if leaked to a publication. This could be one reason why they have not emerged until now.

Enter WikiLeaks. Just two days after the first Shadow Brokers message, Julian Assange, the founder of WikiLeaks, sent out a Twitter message. “We had already obtained the archive of NSA cyberweapons released earlier today,” Assange wrote, “and will release our own pristine copy in due course.”

The month before, Assange was responsible for releasing the tens of thousands of hacked DNC emails that led to the resignation of the four top committee officials.

There also seems to be a link between Assange and the leaker who stole the ANT catalog, and the possible hacking tools. Among Assange’s close associates is Jacob Appelbaum, a celebrated hacktivist and the only publicly known WikiLeaks staffer in the United States – until he moved to Berlin in 2013 in what he called a “political exile” because of what he said was repeated harassment by U.S. law enforcement personnel. In 2010, a Rolling Stone magazine profile labeled him “the most dangerous man in cyberspace.”

In December 2013, Appelbaum was the first person to reveal the existence of the ANT catalog, at a conference in Berlin, without identifying the source. That same month he said he suspected the U.S. government of breaking into his Berlin apartment. He also co-wrote an article about the catalog in Der Spiegel. But again, he never named a source, which led many to assume, mistakenly, that it was Snowden.

In addition to WikiLeaks, for years Appelbaum worked for Tor, an organization focused on providing its customers anonymity on the Internet. But last May, he stepped down as a result of “serious, public allegations of sexual mistreatment” made by unnamed victims, according to a statement put out by Tor. Appelbaum has denied the charges.

Shortly thereafter, he turned his attention to Hillary Clinton. At a screening of a documentary about Assange in Cannes, France, Appelbaum accused her of having a grudge against him and Assange, and that if she were elected president, she would make their lives difficult. “It’s a situation that will possibly get worse” if she is elected to the White House, he said, according to Yahoo News.

It was only a few months later that Assange released the 20,000 DNC emails. Intelligence agencies have again pointed the finger at Russia for hacking into these emails.

Yet there has been no explanation as to how Assange obtained them. He told NBC News, “There is no proof whatsoever” that he obtained the emails from Russian intelligence. Moscow has also denied involvement.

There are, of course, many sophisticated hackers in Russia, some with close government ties and some without. And planting false and misleading indicators in messages is an old trick. Now Assange has promised to release many more emails before the election, while apparently ignoring email involving Trump. (Trump opposition research was also stolen.)

In hacktivist style, and in what appears to be phony broken English, this new release of cyberweapons also seems to be targeting Clinton. It ends with a long and angry “final message” against “Wealthy Elites . . . breaking laws” but “Elites top friends announce, no law broken, no crime commit[ed]. . . Then Elites run for president. Why run for president when already control country like dictatorship?”

Then after what they call the “fun Cyber Weapons Auction” comes the real message, a serious threat. “We want make sure Wealthy Elite recognizes the danger [of] cyberweapons. Let us spell out for Elites. Your wealth and control depends on electronic data.” Now, they warned, they have control of the NSA’s cyber hacking tools that can take that wealth away. “You see attacks on banks and SWIFT [a worldwide network for financial services] in news. If electronic data go bye-bye where leave Wealthy Elites? Maybe with dumb cattle?”

Snowden’s leaks served a public good. He alerted Americans to illegal eavesdropping on their telephone records and other privacy violations, and Congress changed the law as a result. The DNC leaks exposed corrupt policies within the Democratic Party.

But we now have entered a period many have warned about, when NSA’s cyber weapons could be stolen like loose nukes and used against us. It opens the door to criminal hackers, cyber anarchists and hostile foreign governments that can use the tools to gain access to thousands of computers in order to steal data, plant malware and cause chaos.

It’s one more reason why NSA may prove to be one of Washington’s greatest liabilities rather than assets.

 

About the Author

James Bamford is the author of The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America. He is a columnist for Foreign Policy magazine.

 

Hillary Clinton and American Empire

1015636467

By

Source: CounterPunch

Despite the lack of evidence linking Orlando mass murderer Omar Mateen to Daesh (ISIS) in any operational (direct) sense, the first inclination of U.S. Presidential hopeful Hillary Clinton was to renew American bombing of Syria, Iraq and Libya— the very nations that were destroyed by U.S. bombs directed by Mrs. Clinton and from whence Daesh arose. In so doing Mrs. Clinton made it evident that she is an unrepentant militarist whose bloodlust, combined with her longstanding interest in promoting American business interests, ties her to the U.S. imperial project of the last century and one-half. The precise moral difference between mass murders for personal and state reasons depends on a theory of the state at odds with this imperial project.

The company that employed Omar Mateen, G4S, is a British-based ‘security’ company that operates in 120 countries and as a ‘private’ supplier of public services to the Department of Homeland Security, the U.S. Army and to the very same State Department that Mrs. Clinton led as Secretary of State. The company advertises itself capable of ‘mitigating liability’ for the U.S. government— the ruse used by the CIA and other clandestine and quasi-clandestine government agencies to circumvent civil prohibitions on their activities by employing ‘private’ companies to carry them out. The NSA’s domestic surveillance programs tie to those of the FBI, DEA and CIA through this legalistic dodge. And ‘private contractors’ were behind some of the more grotesque slaughters in recent American wars.

The classical liberal separation of economic from political interests used to legitimate state violence is one that the Clintons have spent their ‘public’ careers undermining. As leading proponents of neoliberalism, the Clintons have spent three decades conflating ‘private’ interests with the public interest. In history this tie of U.S. business interests to U.S. military incursions runs from residual European imperialism, including genocide against the indigenous population and slavery, to direct wars, proxy wars, coups, assassinations, murders and particularly odious ‘wars of attrition.’ What is corruption in the liberal worldview is the nature of the capitalist-state acting in / on imperial interests in a Marxian frame. If this corruption is ‘solvable,’ such has yet to be demonstrated in the U.S.

Hillary Clinton’s use of the horrific crime in Orlando to instigate further crimes against untold innocents abroad is hidden behind manufactured fears of a lunatic and craven enemy (ISIS) that is in fact both a product of earlier U.S. atrocities across the Middle East and but a pale ghost of the savagery of combined U.S. actions in the region. The American leadership’s practice of creating crises that it must then ‘respond’ to led the way to the sequential slaughters, disruptions and dislocations that now finds substantial portions of the Middle East in ruins and millions of refugees flooding an increasingly xenophobic Europe. That this leadership never seems to learn from its ‘mistakes’ suggests motivations at work other than those presented at press conferences.

Where G4S, Omar Mateen’s employer, fits in is that Mr. Mateen was in many respects the perfect mercenary— ‘our psychopath’ if we were paying for his services. Murdering 49 people and wounding 50 more is, in addition to being an atrocity, a crime and a moral calamity, a complicated logistical feat. In 2004 U.S. Colonel James Steele was brought to Iraq, in a war that Bill Clinton publicly supported and Hillary Clinton voted for, to engineer like atrocities. Mr. Mateen’s crimes would have been business-as-usual in U.S. led slaughters of innocent civilians in Nicaragua and El Salvador in the 1980s and in Iraq in the 2000s. And G4S is precisely the type of ‘public-private partnership’ favored by the Clintons to ‘mitigate liability’ behind a veil of ‘private’ actions.

This isn’t to suggest that Hillary Clinton had any part in the murders carried out by Mr. Mateen. It is to suggest that in any human and / or moral sense she is congenitally unfit for public office. The most generous explanation of her support for George W. Bush’s criminal slaughter in Iraq is that she was misled by the manufactured evidence proffered by the Bush administration. That the war tied through history to the Clinton’s own sanctions against Iraq that resulted in half a million innocents dying from privation and to eight years of bombing that left much of the country in ruins suggests that Mrs. Clinton probably well understood that Iraq posed no threat to the U.S. in 2001. That the war was coincidentally a boon to Western business interests was / is as grotesque as it was predictable.

If conceptual clarity around these issues seems wanting here— that is the point. Neoliberalism as some unified theory of political economy ties through history to the Washington Consensus that in turn ties to American imperial history. Western imperialism— state-corporatism as division of the global economic spoils through insertion / assertion of ‘national’ interests, has five centuries of reasonably well defined history behind it. In this regard Donald Trump’s relative rhetorical reticence to use military force as a first choice is a threat to this imperial order whereas Hillary Clinton’s willingness to destroy an entire region of the world on a whim to benefit Exxon Mobil and Goldman Sachs makes her the ‘safe’ choice from the institutional perspective.

Washington Consensus precepts are:

*Fiscal discipline

*A redirection of public expenditure priorities toward fields offering both high economic returns and the potential to improve income distribution, such as primary health care, primary education, and infrastructure

*Tax reform (to lower marginal rates and broaden the tax base)

*Interest rate liberalization

*A competitive exchange rate

*Trade liberalization

*Liberalization of inflows of foreign direct investment

*Privatization

*Deregulation (to abolish barriers to entry and exit)

*Secure property rights

Against this imperial history the U.S. view that national elections are an internal matter places U.S. voters as the nominal ‘choosers’ of political economy for much of the world. In political terms, the 800+ military bases that the U.S. keeps around the globe serve as quasi-private security forces to assure repatriation of ‘profits’ for multi-national corporations in the form of resources, plentiful, cheap labor and the broader economy of imperial conquest. In fact, as opposed to theory, these profits are the reciprocal of the death, misery, subjugation and immiseration inevitably put forward by Western economists and politicians as the result of ‘free-choice’ by those on the losing end of American imperial fortune. That increasing numbers of Americans are on this losing end helps explain current (and heretofore slight) political unrest and its reciprocal in establishment support for Mrs. Clinton.

Hillary Clinton’s toxic jargon that “America never stopped being great” poses a seeming conundrum for her supporters who aren’t dedicated sociopaths. If U.S. wars in Southeast Asia, Central America, the Middle East and Northern Africa are evidence of this greatness, then what are the moral and political bases of such a judgment? Mrs. Clinton’s nostalgia for the days of alleged national unity following the attacks of September 11, 2001 is apparently for the erasure of the history that led to the attacks and not for unity per se. Conversely, given the absence of any operational link to Daesh, Omar Mateen could just as well have claimed that his crimes were motivated by Napoleon Bonaparte or Jesus Christ were ISIS not such a well-implanted foe.

Externally, and in contradiction of to the exceptionalists, the democratists and Western neoliberals, the U.S. is broadly considered the greatest threat to world peace on the planet. Brought to the fore in the current Presidential election cycle is that Western elites— inherited wealth, bailout-dependent bankers, the corporate lootocracy dependent on wildly goosed (by the Federal Reserve) asset prices and various and sundry agents, functionaries and court pleaders, are now well-understood to have interests diametrically opposed to those of the vast majority of Americans. The conceptual leap not yet taken by the American electorate is the international nature of this class divide.

bipartychart

Chart: the bi-Party system of electoral control in the U.S. is put forward as representing majority political views when combined it represents less than one-third of voting-age political affiliation. In terms of global political reach, the American political leadership represents such a small minority’s interests that even relatively minor rebellions could quickly overwhelm it. Source: Gallup, Pew Research.

This international ‘footprint’ is fact regardless of whether or not Americans consider it when voting. Internal economic dislocations, such as jobs lost and stagnant wages from trade agreements, find their reciprocals in indigenous economies destroyed, in ‘developing market’ industries shut out through subsidized ‘competition,’ in IMF ‘workouts’ that place ownership of developing industries in Western hands and through commodification and expropriation of millennia of accumulated knowledge to be put back as alien product against the peoples and cultures that developed it. In this respect, the ‘Clinton model’ of sweatshop labor as economic development joins the ‘Obama model’ of subverting civil law in the interests of corporate-state plutocrats.

Calls to unify behind Hillary Clinton in her bid to become President pose the heavily engineered outcome of the Democratic primaries as the popular will. In this sense they are roughly analogous to the calls to unite behind George W. Bush following the Bush v. Gore Supreme Court decision in 2000. The Clintons paved the way for Mr. Bush’s brutal militarism much as Barack Obama maintained the institutional infrastructure of the ‘unitary Presidency’ and the capacity for launching criminal wars of opportunity. Between Hillary Clinton and Donald Trump, it is Mrs. Clinton who has the proven record as guardian of empire and imperial prerogative. Her unbridled militarism is an expression of this prerogative.

The question for Democrats is how evil can someone be to still be worthy of voting for? Alleged stark differences between Hillary Clinton and George W. Bush find very high degrees of synchronicity between their actual policies (and those of Barack Obama). And lest this be unclear, it is the Democratic establishment that chose Mrs. Clinton as its candidate (chart above), and not the politically and economically dispossessed electorate. The grift that American elections reflect the popular will, and therefore confer political legitimacy, contrasts with the facts that the dominant Parties are largely and increasingly unpopular and that the popular will bears no relation to the policies decided upon and enacted by the American political establishment.

Rob Urie is an artist and political economist. His book Zen Economics is published by CounterPunch Books.

Hillary Clinton’s Damning Emails

shutterstock_405351559

By Ray McGovern

Source: Consortium News

A few weeks after leaving office, former Secretary of State Hillary Clinton may have breathed a sigh of relief and reassurance when Director of National Intelligence James Clapper denied reports of the National Security Agency eavesdropping on Americans. After all, Clinton had been handling official business at the State Department like many Americans do with their personal business, on an unsecured server.

In sworn testimony before the Senate Intelligence Committee on March 12, 2013, Clapper said the NSA was not collecting, wittingly, “any type of data at all on millions or hundreds of millions of Americans,” which presumably would have covered Clinton’s unsecured emails.

But NSA contractor Edward Snowden’s revelations — starting on June 5, 2013 — gave the lie to Clapper’s testimony, which Clapper then retracted on June 21 – coincidentally, Snowden’s 30th birthday – when Clapper sent a letter to the Senators to whom he had, well, lied. Clapper admitted his “response was clearly erroneous – for which I apologize.”  (On the chance you are wondering what became of Clapper, he is still DNI.)

I would guess that Clapper’s confession may have come as a shock to then ex-Secretary Clinton, as she became aware that her own emails might be among the trillions of communications that NSA was vacuuming up. Nevertheless, she found Snowden’s truth-telling a safer target for her fury than Clapper’s dishonesty and NSA’s dragnet.

In April 2014, Clinton suggested that Snowden had helped terrorists by giving “all kinds of information, not only to big countries, but to networks and terrorist groups and the like.” Clinton was particularly hard on Snowden for going to China (Hong Kong) and Russia to escape a vengeful prosecution by the U.S. government.

Clinton even explained what extraordinary lengths she and her people went to in safeguarding government secrets: “When I would go to China or would go to Russia, we would leave all my electronic equipment on the plane with the batteries out, because … they’re trying to find out not just about what we do in our government, they’re … going after the personal emails of people who worked in the State Department.” Yes, she said that. (emphasis added)

Hoisted on Her Own Petard

Alas, nearly a year later, in March 2015, it became known that during her tenure as Secretary of State she had not been as diligent as she led the American people to believe. She had used a private server for official communications, rather than the usual official State Department email accounts maintained on federal servers. Thousands of those emails would retroactively be marked classified – some at the TOP SECRET/Codeword level – by the department.

During an interview last September, Snowden was asked to respond to the revelations about highly classified material showing up on Clinton’s personal server: “When the unclassified systems of the United States government, which has a full-time information security staff, regularly gets hacked, the idea that someone keeping a private server in the renovated bathroom of a server farm in Colorado is more secure is completely ridiculous.”

Asked if Clinton “intentionally endangered US international security by being so careless with her email,” Snowden said it was not his place to say. Nor, it would seem, is it President Barack Obama’s place to say, especially considering that the FBI is actively investigating Clinton’s security breach. But Obama has said it anyway.

“She would never intentionally put America in any kind of jeopardy,” the President said on April 10. In the same interview, Obama told Chris Wallace, “I guarantee that there is no political influence in any investigation conducted by the Justice Department, or the FBI – not just in this case, but in any case. Full stop. Period.”

But, although a former professor of Constitutional law, the President sports a checkered history when it comes to prejudicing investigations and even trials, conducted by those ultimately reporting to him. For example, more than two years before Bradley (Chelsea) Manning was brought to trial, the President stated publicly: “We are a nation of laws. We don’t let individuals make decisions about how the law operates. He [Bradley Manning] broke the law!”

Not surprisingly, the ensuing court martial found Manning guilty, just as the Commander in Chief had predicted. Though Manning’s purpose in disclosing mostly low-level classified information was to alert the American public about war crimes and other abuses by the U.S. government, Manning was sentenced to 35 years in prison.

On March 9, when presidential candidate Clinton was asked, impertinently during a debate, whether she would withdraw from the race if she were indicted for her cavalier handling of government secrets, she offered her own certain prediction: “Oh, for goodness sake! It’s not going to happen. I’m not even answering that question.”

Prosecutorial Double Standards

Merited or not, there is, sadly, some precedent for Clinton’s supreme confidence. Retired General and ex-CIA Director David Petraeus, after all, lied to the FBI (a felony for “lesser” folks) about giving his mistress/biographer highly classified information and got off with a slap on the wrist, a misdemeanor fine and probation, no jail time – a deal that Obama’s first Attorney General Eric Holder did on his way out the door.

We are likely to learn shortly whether Attorney General Loretta Lynch is as malleable as Holder or whether she will allow FBI Director James Comey, who held his nose in letting Petraeus cop a plea, to conduct an unfettered investigation this time – or simply whether Comey will be compelled to enforce Clinton’s assurance that “it’s not going to happen.”

Last week, Fox News TV legal commentator Andrew Napolitano said the FBI is in the final stages of its investigation into Clinton and her private email server. His sources tell him that “the evidence of her guilt is overwhelming,” and that the FBI has enough evidence to indict and convict.

Whether Napolitano has it right or not, it seems likely that Clinton is reading President Obama correctly – no profile in courage is he. Nor is Obama likely to kill the political fortunes of the now presumptive Democratic presidential nominee. Yet, if he orders Lynch and Comey not to hold Hillary Clinton accountable for what – in my opinion and that of most other veteran intelligence officials whom I’ve consulted – amounts to at least criminal negligence, another noxious precedent will be set.

Knowing Too Much

This time, however, the equities and interests of the powerful, secretive NSA, as well as the FBI and Justice, are deeply involved. And by now all of them know “where the bodies are buried,” as the smart folks inside the Beltway like to say. So the question becomes would a future President Hillary Clinton have total freedom of maneuver if she were beholden to those all well aware of her past infractions and the harm they have done to this country.

One very important, though as yet unmentioned, question is whether security lapses involving Clinton and her emails contributed to what Clinton has deemed her worst moment as Secretary of State, the killing of Ambassador Christopher Stevens and three other U.S. personnel at the lightly guarded U.S. “mission” (a very small, idiosyncratic, consulate-type complex not performing any consular affairs) in Benghazi, Libya, on Sept. 11, 2012.

Somehow the terrorists who mounted the assault were aware of the absence of meaningful security at the facility, though obviously there were other means for them to have made that determination, including the State Department’s reliance on unreliable local militias who might well have shared that inside information with the attackers.

However, if there is any indication that Clinton’s belatedly classified emails contained information about internal State Department discussions regarding the consulate’s security shortcomings, questions may be raised about whether that information was somehow compromised by a foreign intelligence agency and shared with the attackers.

We know that State Department bureaucrats under Secretary Clinton overruled repeated requests for additional security in Benghazi. We also know that Clinton disregarded NSA’s repeated warnings against the use of unencrypted communications. One of NSA’s core missions, after all, is to create and maintain secure communications for military, diplomatic, and other government users.

Clinton’s flouting of the rules, in NSA’s face, would have created additional incentive for NSA to keep an especially close watch on her emails and telephone calls. The NSA also might know whether some intelligence service successfully hacked into Clinton’s server, but there’s no reason to think that the NSA would share that sort of information with the FBI, given the NSA’s history of not sharing its data with other federal agencies even when doing so makes sense.

The NSA arrogates to itself the prerogative of deciding what information to keep within NSA walls and what to share with the other intelligence and law enforcement agencies like the FBI. (One bitter consequence of this jealously guarded parochialism was the NSA’s failure to share very precise information that could have thwarted the attacks of 9/11, as former NSA insiders have revealed.)

It is altogether likely that Gen. Keith Alexander, head of NSA from 2005 to 2014, neglected to tell the Secretary of State of NSA’s “collect it all” dragnet collection that included the emails and telephone calls of Americans – including Clinton’s. This need not have been simply the result of Alexander’s pique at her disdain for communications security requirements, but rather mostly a consequence of NSA’s modus operandi.

With the mindset at NSA, one could readily argue that the Secretary of State – and perhaps the President himself – had no “need-to-know.” And, needless to say, the fewer briefed on the NSA’s flagrant disregard for Fourth Amendment protections against unreasonable searches and seizures the better.

So, if there is something incriminating – or at least politically damaging – in Clinton’s emails, it’s a safe bet that at least the NSA and maybe the FBI, as well, knows. And that could make life difficult for a Clinton-45 presidency. Inside the Beltway, we don’t say the word “blackmail,” but the potential will be there. The whole thing needs to be cleaned up now before the choices for the next President are locked in.

 

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington.  He served as a CIA analyst for 27 years, during which he prepared and briefed the morning President’s Daily Brief for Presidents Nixon, Ford, and Reagan.

FBI Tracked Chattanooga Shooter’s Family for Years

150716130834-bullet-holes-photo-chattanooga-shooting-lv-00000000-large-169

By Tony Cartalucci

Source: Land Destroyer

Once again, another convenient shooting has helped supercharge anger, hatred, fear, and division across the Western World after an alleged “Islamist extremist” opened fire on and killed 4 US Marines at a recruiting station in Chattanooga, Tennessee.

Without any knowledge of how the US has in fact created Al Qaeda and its many global affiliates, including vicious terrorist groups plaguing Southeast Asia, and the most notorious to date, the so-called “Islamic State” (ISIS), the American public will predictably react in a manner that will simply further justify America’s meddling across the globe amid its self-created and perpetuated “War on Terror.” It will also help in efforts to further tighten control over the American public itself, with increased justifications for expanding police state measures and future pushes to disarm the American people.

Yahoo News would report in their article, “Shootings at Chattanooga military facilities leave 4 Marines, gunman dead; act called ‘domestic terrorism‘,” that:

A U.S. official told the Associated Press that Abdulazeez had not been on the radar of federal law enforcement before Thursday’s shooting. 

But also added:

His father had been investigated several years ago for “possible ties to a foreign terrorist organization” and added to the U.S. terrorist watch list, according to a report in the New York Times, but that probe did not surface information about Abdulazeez, the paper said.

This means that yet another case of “domestic terror” has involved someone either investigated by the FBI, entrapped by an active FBI operation where FBI investigators posed as terrorist leaders and walked a patsy through every step of a terrorist attack before arresting them and thus “foiling” the attack, or linked directly to someone the FBI was investigating.

Ironically, the immense omnipresent police state the West has erected to combat the so-called “terrorist” threat, including the total surveillance of all communications online and across all telecommunication networks, at home and abroad under the National Security Agency (NSA) will only expand, despite it once again apparently failing, and despite attempts by special interests on Wall Street and in Washington to claim this latest attack “again” somehow circumvented these already sweeping measures.

Meanwhile, The US Continues Supporting Extremists Abroad

And while this latest attack is passed off as a “domestic terrorist attack” and the result of “Islamic extremists,” rather than a false flag event, the US continues to openly support the very “terrorists” it claims threatens its homeland and has inspired these sort of attacks.

Just recently, the Washington Post literally allowed a spokesman of Al Qaeda to defend his faction’s role in the fighting in Syria, and his condemnation of the United States for not rendering more aid for the cause of overrunning and destroying the Syrian nation – a goal the US itself is likewise pursuing.

Labib Al Nahhas, “head of foreign political relations” for terrorist organization Ahrar al-Sham, wrote in his Washington Post op-ed titled, “The deadly consequences of mislabeling Syria’s revolutionaries,” that:

Stuck inside their own bubble, White House policymakers have allocated millions of U.S. taxpayer dollars to support failed CIA efforts to support so-called “moderate” forces in Syria. But these “moderate” groups have proved to be a disappointment on nearly every count, not least of all in confronting the Islamic State.

He also states:

That question should prompt Washington to admit that the Islamic State’s extremist ideology can be defeated only through a homegrown Sunni alternative — with the term “moderate” defined not by CIA handlers but by Syrians themselves.

Essentially, the Washington Post afforded a terrorist organization space to make an appeal to the American public for military support. Ahrar al-Sham regularly coordinates with and fights within operations led by Al Qaeda’s Al Nusra Front, a US State Department designated terrorist organization from which ISIS itself sprung.

Al Nusra and Ahrar al-Sham are described as the “closest” of allies by Western think-tanks and media reports. It is also revealed that Ahrar al-Sham worked along side ISIS itself.

A Stanford University report under “Mapping Militant Organizations” explained (emphasis added):

Ahrar al-Sham quickly became one of the largest military organizations operating in Syria, and it has been active in efforts to unite the Islamist opposition under a single banner. It rejects the idea of Western intervention but sometimes works alongside Free Syrian Army brigades. It routinely cooperates with al-Nusra and, until relations soured in 2013, also worked with ISIS. In February 2014, the U.S. Director of National Intelligence called Ahrar al-Sham one of the three most effective rebel groups in Syria.

The Washington Post isn’t the only voice in the Western media promoting Al Qaeda. Foreign Policy in 2012 abhorrently proclaimed, “Two Cheers for Syrian Islamists: So the rebels aren’t secular Jeffersonians. As far as America is concerned, it doesn’t much matter.” As much as an admission that the US is backing what is essentially terrorism in Syria, the Foreign Policy article attempted even then to promote the alleged “pragmatism” of supporting Al Qaeda to eliminate America’s foreign enemies.

And while Foreign Policy and terrorists writing in the pages of the Washington Post demand more weapons and support from the West, it is already a documented fact that immense and constantly flowing supply convoys are streaming out of both NATO-member Turkey and US-ally Jordan’s territory, into Syria and Iraq, for the purpose of resupplying ISIS. This explains ISIS’ otherwise inexplicable ability to not only maintain its impressive fighting capacity as it simultaneously wages war against both the Syrian and Iraqi armies, but to expand its fighting to all fronts opposed to US regional hegemony.

This includes Yemen, Libya, and even Egypt where ISIS most recently managed to hit an Egyptian naval vessel with a missile. Foreign Policy would again weigh in. Their article, “Islamic State Sinai Affiliate Claims to Have Hit Egyptian Ship With Missile,” states:

The use of a guided missile to strike an Egyptian ship represents a higher level of technological sophistication than what has been previously observed in Sinai attacks. It is unclear, however, exactly what kind of missile was used in the attack, beyond the militant group’s claim that it was a guided munition.

Militant groups in the region have in the past used guided missiles to attack government ships in the Mediterranean. During the 2006 war between Israel and Hezbollah, an Iranian anti-ship missile fired by the militant group struck the Israeli warship Hanit, badly damaging the vessel and killing four crew members.

Of course, Foreign Policy and others across the Western media will be quick to point out that Hezbollah is a state-sponsored militant organization which receives its weapons from Syria and Iran. The question then becomes how ISIS replicated this level of “technological sophistication,” and which state-sponsors put the missiles into their hands.

The US supporting Al Qaeda is not really news. Al Qaeda was initially a joint US-Saudi venture to create a mercenary army to fight the Soviets in Afghanistan during the 1980’s. This mercenary army would again fight Russian interests in Serbia and Chechnya before eventually being used as the pretext for US invasions and occupations of both Afghanistan and Iraq from 2001 onward. In 2007, it was revealed that the US, Saudi Arabia, and Israel sought to use the terrorist organization to raise a proxy military front to overthrow Syria and Iran. The resulting bloodbath in Syria beginning in 2011 is the operational execution of this documented conspiracy.

Al Qaeda and its various affiliates serve both as a proxy mercenary front to strike where Western forces cannot, and a pretext to invade abroad. It also serves as a constant justification for increased tyranny at home. With the most recent shooting carried out by yet another target of the FBI’s “investigations,” and the predictable divisive backlash that will follow, it is assured that the American public will be further blinded to the fact that this so-called “Islamic extremism” was born in Washington and on Wall Street, in Riyadh and Tel Aviv, not in a mosque or springing forth from the pages of the Qu’ran.

In fact, the vast majority of the world’s Islamic people are locked in mortal combat with the West’s mercenary terrorist forces, with tens of thousands of them having shed their blood fighting Al Qaeda everywhere from Libya to Egypt, to Iraq and Syria. While the US attempts to pose as the leading power in the fight against extremism, its token airstrikes deep within Syrian territory are quickly undone by the torrent of supplies it itself oversees flooding into Syrian territory. For every fighter killed by a US airstrike, 10 more are being trafficked in through US and NATO-run networks stretching as far afield as Xinjiang, China.

The US presence in Iraq and Syria serves simply as one of several planned stepping stones to eventually and directly intervene militarily in toppling either or both governments, before moving on to Tehran.

The “War on Terror” is a fraud, and each “terrorist attack” a carefully orchestrated means of further perpetuating that fraud.

Welcome to the Matrix: Enslaved by Technology and the Internet of Things

m2m-graphic1-2013-01-564x317_contentfullwidth

By John W. Whitehead

Source: The Rutherford Institute

“There will come a time when it isn’t ‘They’re spying on me through my phone’ anymore. Eventually, it will be ‘My phone is spying on me.’” ― Philip K. Dick

If ever Americans sell their birthright, it will be for the promise of expediency and comfort delivered by way of blazingly fast Internet, cell phone signals that never drop a call, thermostats that keep us at the perfect temperature without our having to raise a finger, and entertainment that can be simultaneously streamed to our TVs, tablets and cell phones.

Likewise, if ever we find ourselves in bondage, we will have only ourselves to blame for having forged the chains through our own lassitude, laziness and abject reliance on internet-connected gadgets and gizmos that render us wholly irrelevant.

Indeed, while most of us are consumed with our selfies and trying to keep up with what our so-called friends are posting on Facebook, the megacorporation Google has been busily partnering with the National Security Agency (NSA), the Pentagon, and other governmental agencies to develop a new “human” species, so to speak.

In other words, Google—a neural network that approximates a global brain—is fusing with the human mind in a phenomenon that is called “singularity,” and they’ve hired transhumanist scientist Ray Kurzweil to do just that. Google will know the answer to your question before you have asked it, Kurzweil said. “It will have read every email you will ever have written, every document, every idle thought you’ve ever tapped into a search-engine box. It will know you better than your intimate partner does. Better, perhaps, than even yourself.”

But here’s the catch: the NSA and all other government agencies will also know you better than yourself. As William Binney, one of the highest-level whistleblowers to ever emerge from the NSA said, “The ultimate goal of the NSA is total population control.”

Science fiction, thus, has become fact.

We’re fast approaching Philip K. Dick’s vision of the future as depicted in the film Minority Report. There, police agencies apprehend criminals before they can commit a crime, driverless cars populate the highways, and a person’s biometrics are constantly scanned and used to track their movements, target them for advertising, and keep them under perpetual surveillance.

Cue the dawning of the Age of the Internet of Things, in which internet-connected “things” will monitor your home, your health and your habits in order to keep your pantry stocked, your utilities regulated and your life under control and relatively worry-free.

The key word here, however, is control.

In the not-too-distant future, “just about every device you have — and even products like chairs, that you don’t normally expect to see technology in — will be connected and talking to each other.”

By 2018, it is estimated there will be 112 million wearable devices such as smartwatches, keeping users connected it real time to their phones, emails, text messages and the Internet. By 2020, there will be 152 million cars connected to the Internet and 100 million Internet-connected bulbs and lamps. By 2022, there will be 1.1 billion smart meters installed in homes, reporting real-time usage to utility companies and other interested parties.

This “connected” industry—estimated to add more than $14 trillion to the economy by 2020—is about to be the next big thing in terms of societal transformations, right up there with the Industrial Revolution, a watershed moment in technology and culture.

Between driverless cars that completely lacking a steering wheel, accelerator, or brake pedal, and smart pills embedded with computer chips, sensors, cameras and robots, we are poised to outpace the imaginations of science fiction writers such as Philip K. Dick and Isaac Asimov. By the way, there is no such thing as a driverless car. Someone or something will be driving, but it won’t be you.

The 2015 Consumer Electronics Show in Las Vegas is a glittering showcase for such Internet-connected techno gadgets as smart light bulbs that discourage burglars by making your house look occupied, smart thermostats that regulate the temperature of your home based on your activities, and smart doorbells that let you see who is at your front door without leaving the comfort of your couch.

Nest, Google’s $3 billion acquisition, has been at the forefront of the “connected” industry, with such technologically savvy conveniences as a smart lock that tells your thermostat who is home, what temperatures they like, and when your home is unoccupied; a home phone service system that interacts with your connected devices to “learn when you come and go” and alert you if your kids don’t come home; and a sleep system that will monitor when you fall asleep, when you wake up, and keep the house noises and temperature in a sleep-conducive state.

The aim of these internet-connected devices, as Nest proclaims, is to make “your house a more thoughtful and conscious home.” For example, your car can signal ahead that you’re on your way home, while Hue lights can flash on and off to get your attention if Nest Protect senses something’s wrong. Your coffeemaker, relying on data from fitness and sleep sensors, will brew a stronger pot of coffee for you if you’ve had a restless night.

It’s not just our homes that are being reordered and reimagined in this connected age: it’s our workplaces, our health systems, our government and our very bodies that are being plugged into a matrix over which we have no real control.

Moreover, given the speed and trajectory at which these technologies are developing, it won’t be long before these devices are operating entirely independent of their human creators, which poses a whole new set of worries. As technology expert Nicholas Carr notes, “As soon as you allow robots, or software programs, to act freely in the world, they’re going to run up against ethically fraught situations and face hard choices that can’t be resolved through statistical models. That will be true of self-driving cars, self-flying drones, and battlefield robots, just as it’s already true, on a lesser scale, with automated vacuum cleaners and lawnmowers.”

For instance, just as the robotic vacuum, Roomba, “makes no distinction between a dust bunny and an insect,” weaponized drones—poised to take to the skies en masse this year—will be incapable of distinguishing between a fleeing criminal and someone merely jogging down a street. For that matter, how do you defend yourself against a robotic cop—such as the Atlas android being developed by the Pentagon—that has been programmed to respond to any perceived threat with violence?

Unfortunately, in our race to the future, we have failed to consider what such dependence on technology might mean for our humanity, not to mention our freedoms.

Ingestible or implantable chips are a good example of how unprepared we are, morally and otherwise, to navigate this uncharted terrain. Hailed as revolutionary for their ability to access, analyze and manipulate your body from the inside, these smart pills can remind you to take your medication, search for cancer, and even send an alert to your doctor warning of an impending heart attack.

Sure, the technology could save lives, but is that all we need to know? Have we done our due diligence in asking all the questions that need to be asked before unleashing such awesome technology on an unsuspecting populace?

For example, asks Washington Post reporter Ariana Eunjung Cha:

What kind of warnings should users receive about the risks of implanting chip technology inside a body, for instance? How will patients be assured that the technology won’t be used to compel them to take medications they don’t really want to take? Could law enforcement obtain data that would reveal which individuals abuse drugs or sell them on the black market? Could what started as a voluntary experiment be turned into a compulsory government identification program that could erode civil liberties?

Let me put it another way. If you were shocked by Edward Snowden’s revelations about how NSA agents have used surveillance to spy on Americans’ phone calls, emails and text messages, can you imagine what unscrupulous government agents could do with access to your internet-connected car, home and medications? Imagine what a SWAT team could do with the ability to access, monitor and control your internet-connected home—locking you in, turning off the lights, activating alarms, etc.

Thus far, the public response to concerns about government surveillance has amounted to a collective shrug. After all, who cares if the government can track your whereabouts on your GPS-enabled device so long as it helps you find the fastest route from Point A to Point B? Who cares if the NSA is listening in on your phone calls and downloading your emails so long as you can get your phone calls and emails on the go and get lightning fast Internet on the fly? Who cares if the government can monitor your activities in your home by tapping into your internet-connected devices—thermostat, water, lights—so long as you can control those things with the flick of a finger, whether you’re across the house or across the country?

As for those still reeling from a year of police shootings of unarmed citizens, SWAT team raids, and community uprisings, the menace of government surveillance can’t begin to compare to bullet-riddled bodies, devastated survivors and traumatized children. However, both approaches are just as lethal to our freedoms if left unchecked.

Control is the key here. As I make clear in my book A Government of Wolves: The Emerging American Police State, total control over every aspect of our lives, right down to our inner thoughts, is the objective of any totalitarian regime.

George Orwell understood this. His masterpiece, 1984, portrays a global society of total control in which people are not allowed to have thoughts that in any way disagree with the corporate state. There is no personal freedom, and advanced technology has become the driving force behind a surveillance-driven society. Snitches and cameras are everywhere. And people are subject to the Thought Police, who deal with anyone guilty of thought crimes. The government, or “Party,” is headed by Big Brother, who appears on posters everywhere with the words: “Big Brother is watching you.”

Make no mistake: the Internet of Things is just Big Brother in a more appealing disguise.

Even so, I’m not suggesting we all become Luddites. However, we need to be aware of how quickly a helpful device that makes our lives easier can become a harmful weapon that enslaves us.

This was the underlying lesson of The Matrix, the Wachowski brothers’ futuristic thriller about human beings enslaved by autonomous technological beings that call the shots. As Morpheus, one of the characters in The Matrix, explains:

The Matrix is everywhere. It is all around us. Even now, in this very room. You can see it when you look out your window or when you turn on your television. You can feel it when you go to work… when you go to church… when you pay your taxes. It is the world that has been pulled over your eyes to blind you from the truth.

“What truth?” asks Neo.

Morpheus leans in closer to Neo: “That you are a slave, Neo. Like everyone else you were born into bondage. Born into a prison that you cannot smell or taste or touch. A prison for your mind.”