How Government and Media Are Prepping America for a Failed 2020 Election

FILE – In this May 6, 2019, file photo Microsoft CEO Satya Nadella delivers the keynote address at Build, the company’s annual conference for software developers in Seattle. Microsoft says it has detected more than 740 infiltration attempts by nation-state actors in the past year targeting U.S.-based political parties, campaigns and other democracy-focused organizations including think tanks and other non-profits. (AP Photo/Elaine Thompson, File)

Russia, China and Iran are already being blamed for using tech to undermine the 2020 election. Yet, the very technologies they are allegedly using were created by a web of companies with deep ties to Israeli intelligence.

By Whitney Webb

Source: Mint Press News

As World War II drew to a close in Europe, British philosopher Bertrand Russell wrote that “neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of a great fear.”

Though numerous examples in the post-World War II era have proven Russell’s point, perhaps one of the best examples was the U.S. public’s willingness to swallow lie after lie about Saddam Hussein’s Iraq due to the climate of fear that followed the September 11 attacks. Those lies, propagated by dubious intelligence, government officials and a compliant media, resulted in catastrophes – large and small, both abroad and at home.

Today, an analogous narrative is being crafted by many of the same players – both in media and government – yet it has avoided scrutiny, even from independent media.

Over the past several months and with a renewed zeal in just the last few weeks, anonymous intelligence officials, dubious “experts” and establishment media outlets have crafted a narrative about the coming “chaos” of the 2020 election, months before it takes place. Per that narrative, certain state actors will use specific technologies to target the “American mind” in order to undermine the coming presidential election. The narrative holds that those efforts will be so successful that the U.S. will never recover as a democracy.

Though these anonymous government sources and their stenographers have already named the countries who will be responsible and the technologies they will use, they also admit that no evidence yet exists to back up these claims, meaning they are — at best — pure speculation.

Headlines such as “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” “Basically Every US National Security Leader Is Warning About Foreign Interference In The 2020 Election,” and “U.S. intel agencies: Russia and China plotting to interfere in 2020 election” have become increasingly common, despite no available evidence, as have warnings that the American public is defenseless against the old scourge of “fake news” and the new scourge of “deep fakes.” Some media reports have gone so far to say that actual foreign meddling isn’t even necessary as merely the fear of foreign meddling could be enough to upend the American political system beyond repair.

Historically, the goal of such fear-inducing narratives has been the trading of civil liberties for increased security, or rather, the appearance of increased security. Yet, when the need for security is felt due to a fear that is based on government-driven speculation and not on evidence, the goal of that narrative is not about protecting the public from a real, tangible threat but instead about the consolidation of power by the very groups responsible for crafting it — in this case, the intelligence community and other key players in the national security state.

However, what is particularly odd about this narrative surrounding imminent “chaos” and meddling in the upcoming 2020 election is the fact that, not only have the instruments of said meddling been named and described in detail, but their use in the election was recently simulated by a company with deep ties to both U.S. and Israeli intelligence. That simulation, organized and run by the Israeli-American company Cybereason, ended with scores of Americans dead, the cancellation of the 2020 election, the imposition of martial law and a spike in fear among the American populace.

Many of the technologies used to create that chaotic and horrific scenario in the Cybereason simulation are the very same technologies that U.S. federal officials and corporate media outlets have promoted as the core of the very toolkit that they claim will be used to undermine the coming election, such as deep fakes and hacks of critical infrastructure, consumer devices and even vehicles.

While the narrative in place has already laid the blame at the feet of U.S. rival states China, Russia and Iran, these very technologies are instead dominated by companies that are tied to the very same intelligence agencies as Cybereason, specifically Israeli military intelligence.

With intelligence agencies in the U.S. and Israel not only crafting the narrative about 2020 foreign meddling, but also dominating these technologies and simulating their use to upend the coming election, it becomes crucial to consider the motivations behind this narrative and if these intelligence agencies have ulterior motives in promoting and simulating such outcomes that would effectively end American democracy and hand almost total power to the national security state.

 

Media, intelligence foreshadow tech-powered doom for 2020

Even though the 2020 U.S. election is still months away, a plethora of media reports over the past six months (and even before then) have been raising concern after concern about how the U.S. election is still so vulnerable to foreign meddling that such meddling is essentially an inevitability.

Part of the reason for the recent pick-up in fear mongering appears to have been the release of a joint statement issued by key members of the Trump administration last November. That statement, authored by Attorney General Bill Barr, Defense Secretary Mark Esper, acting DHS Secretary Kevin McAleenan, acting Director of National Intelligence Joseph Maguire, FBI Director Christopher Wray, NSA Director Gen. Paul Nakasone, and Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs, claimed that foreign interference in 2020 was imminent despite admitting that there is no evidence of interference having taken place:

Our adversaries want to undermine our democratic institutions, influence public sentiment and affect government policies. Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions. Adversaries may try to accomplish their goals through a variety of means, including social media campaigns, directing disinformation operations or conducting disruptive or destructive cyber-attacks on state and local infrastructure.

While at this time we have no evidence of a compromise or disruption to election infrastructure that would enable adversaries to prevent voting, change vote counts or disrupt the ability to tally votes, we continue to vigilantly monitor any threats to U.S. elections (emphasis added).”

Despite the key caveat of there being no evidence at the time the statement was issued, media reports used the statement to claim that foreign interference in 2020 was imminent, such as in these reports from BuzzFeed, ABC News, and Newsweek.

In addition to the reports that have cast the involvement of state actors — namely Russia, Iran and China — as assured despite no evidence, other reports have made the claim that this allegedly imminent interference will inevitably be successful, largely due to claims that the tactics used will rely heavily on technology that the U.S. can’t hope to successfully counter. CSO Online, an online news outlets that provides news, analysis and research on security and risk management, recently warned that “fixing America’s voting and election infrastructure problems is a long-term proposition, one that won’t be fixed in time for the election in November” while the New York Times warned of imminent chaos and that “stealthier” malevolent foreign actors had already created the foundation for “an ugly campaign season marred by hacking and disinformation.” Wired claimed last year that U.S. election security “is still hurting at every level.”

In another example, Rolling Stone published an article earlier this month with the headline “Hackers Are Coming for the 2020 Election — And We’re Not Ready,” which claims that “the reality is that: “We’ve made progress since the last election — but we’re much less secure than we should be.” The article goes on to say that claim that the goal isn’t necessarily to hack voting machines or change results, but “to merely create the impression of an attack as a way to undermine our faith in the electoral process.”

It continues:

The target is the minds of the American people,” says Joshua Geltzer, a former counterterrorism director on the National Security Council. “In some ways, we’re less vulnerable than we were in 2016. In other ways, it’s more.” Nearly every expert agrees on this: The worst-case scenario, the one we need to prepare for, is a situation that causes Americans to question the bedrock of our democracy — free and fair elections.”

Well before this type of rhetoric made its way into the U.S. media, Israeli intelligence-linked tech firm Cybereason claiming in a release on its website that “messing with a voter’s mind” would have a bigger impact than changing vote totals, even before the 2016 election. That release, published by Cybereason prior to the last presidential election, was authored by the company’s CEO, Lior Div, who used to lead offensive hacking operations against nation-states for Israeli military intelligence.

Notably, of all of these media reports, there is a clear consensus that one of the main tactics that will soon be used to meddle in the coming U.S. election will be the use of so-called “deep fakes.” Deriving its name from a combination of “deep learning” and “fake,” deep fakes involve video and audio that has been manipulated using artificial intelligence (AI) to create media that appears to be authentic, but is not. Concern about its use in the upcoming election has spurred not only a wealth of media reports on the matter but has prompted both the U.S. military and Congress to take action to limit its potential misuse.

One thing that stands out about the media narrative regarding election meddling and deep fakes is that several news organizations have published articles that state that deep fakes will be used to undermine the 2020 election, as opposed to stating that they could be used or that they are a phenomenon worthy of attention (though some reports have taken this more measured approach).

The reason for this level of confidence may owe to statements made by prominent U.S. intelligence officials last year, including those made by Dan Coats, the former Director of National Intelligence (DNI), who claimed in the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community that deep fakes and other hi-tech forms of fake media would be used to disrupt the 2020 election. Coats specifically stated:

Adversaries and strategic competitors probably will attempt to use deep fakes or similar machine-learning technologies to create convincing—but false—image, audio, and video files to augment influence campaigns directed against the United States and our allies and partners.”

Since Coats made the warning, numerous media reports have promoted the concern with little scrutiny, representing just one of the numerous times in U.S. history where narratives first authored by U.S. intelligence are subsequently promoted heavily by U.S. media, even when the claim made by intelligence officials is speculative, as it is in this case. Indeed, the narratives being promoted with respect to the 2020 election involve many of the same intelligence agencies (American and Israeli) and media outlets who promoted claims that were later proven false about “weapons of mass destruction” in Iraq prior to the 2003 invasion, among other pertinent examples.

Notably, deep fakes figured prominently and was the tool most used by malevolent hackers in Cybereason’s 2020 election simulation, which saw both video and audio-only deep fakes used to spread misinformation on national and local TV channels in order to impersonate police officers and election officials and to create fake bomb threats by posing as the terror group Daesh (ISIS). Cybereason also happens to be a partner of the organization funding the most well-known creator and producer of deep fakes in the world, an organization that — much like Cybereason itself — is openly tied to Israeli intelligence.

Aside from deep fakes, other technologies weaponized in Cybereason’s election simulation have also been the subject of several media reports, such as the hacking of Internet of Things (IoT) devices and appliances and even the hacking of vehicles that have some form of internet connectivity.  In the Cybereason simulation, IoT hacks were used to cut power to polling stations and disseminate disinformation while vehicles were hacked to conduct terror attacks against civilians waiting in line to vote, killing several and injuring hundreds.

Most media reports have claimed that these technologies will be part of the coming “explosion” in cyber warfare in 2020 and do not specifically link them to imminent election meddling. Others, however, have made the link to the election explicit.

 

Naming the culprits in advance

In addition to the apparent consensus on how foreign meddling will occur during the 2020 election, there is also agreement regarding which countries will be responsible. Again, this is largely based on statements made by U.S. national security officials. For instance, the joint statement issued last November by the DOJ, DOD, DHS, DNI, FBI, NSA, and CISA regarding 2020 election security, states that “Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions” before adding “at this time we have no evidence.”

Similarly, the 2019 Worldwide Threat Assessment for the U.S. Intelligence Community, written by then-Director of National Intelligence Dan Coats, names these same three countries in relation to imminent 2020 election interference and states that their interference in the 2020 election is “almost certain.” The assessment adds the following about each nation:

  • Russia: “Russia’s social media efforts will continue to focus on aggravating social and racial tensions, undermining trust in authorities, and criticizing perceived anti-Russia politicians.”
  • China: “China will continue to use legal, political, and economic levers—such as the lure of Chinese markets—to shape the information environment. It is also capable of using cyber attacks against systems in the United States to censor or suppress viewpoints it deems politically sensitive.”
  • Iran: “Iran, which has used social media campaigns to target audiences in both the United States and allied nations with messages aligned with Iranian interests, will continue to use online influence operations to try to advance its interests.”

Coats’ assessment was enough to spawn numerous stories on the imminent threat that these three nations pose to the 2020 election, with headlines such as “U.S. intel agencies: Russia and China plotting to interfere in 2020 election.”

The vast majority of warnings regarding future election interference have come from U.S. intelligence officials with a dubious record of trustworthiness and a history of using the media to spread propaganda and disinformation, most famously through Operation Mockingbird. Most — if not all — of the recent and numerous articles on imminent interference rely heavily on claims made by the two aforementioned government documents, documents crafted by U.S. intelligence agencies for public consumption, as well as claims made by anonymous U.S. officials.

A recent New York Times article, for example, titled “Chaos Is the Point’: Russian Hackers and Trolls Grow Stealthier in 2020,” is based almost entirely on “interviews with dozens of officials and experts,” though the only government official named in the article is Shelby Pierson, the intelligence community’s election threats executive. The most quoted experts named in the article are Ben Nimmo, formerly of the hawkish, NATO-funded Atlantic Council and now with Graphika, and Laura Rosenberger, director of the neoconservative-created Alliance for Securing Democracy. The article nonetheless cites “American officials” and “current and former officials” several times to make claims about imminent election interference that paint a bleak picture of the current election season.

A recent article from The Hill relies on the acting head of DHS, Chad Wolf, as its only source, citing Wolf’s claim that “we fully expect Russia to attempt to interfere in the 2020 elections to sow public discord and undermine our democratic institutions” amid other warnings that Wolf gave about Chinese and Iranian cyber threats to U.S. elections. Other articles, including one titled “Russia, China plan to adjust their tactics to hack, influence 2020 elections” cite only Shelby Pierson of the U.S. intelligence community as its source for that headline’s claim. Another titled “Russia isn’t the only threat to 2020 elections, says U.S. intel” cites only anonymous U.S. intelligence officials, as the headline suggests.

Though Russia and China have consistently been named as the most likely election meddlers, reports have also been drumming up the likelihood that Iran will emerge as 2020’s foreign meddler of choice, especially in the months prior to and weeks after the killing of Iranian General Qassem Soleimani by the Trump administration. A recent “informal poll” conducted by the Washington Post asked hawkish think tank fellows, employees at companies like Raytheon and current and former federal officials if Iran would likely retaliate against the U.S. via cyberattack. The Post ran the results of the poll under the headline “Get ready for serious cyberattacks from Iran, experts say.”

Despite the media’s numerous warnings of imminent and “serious” cyber-retaliation from Iran, the only cyberattack attributed to the country after Soleimani’s death was the vandalism of the Federal Depository Library Program website, a rather benign act that was nevertheless blasted across headlines such as “US government website hacked with pro-Iranian messages, image of bloodied Trump.” The U.S. government is quoted in that article as saying that “At this time, there is no confirmation that this was the action of Iranian state-sponsored actors.”

Also notably absent from media reports is the fact that WikiLeaks revealed in 2017 that the CIA had stockpiled a library of “stolen” cyberattack techniques produced in other nations, including Russia and Iran. Those revelations, part of the Vault 7 release, revealed that the CIA’s UMBRAGE group was capable of “misdirect[ing] attribution [for cyberattacks actually done by the CIA] by leaving behind the ‘fingerprints’ of the groups that the attack techniques were stolen from.” In other words, the CIA was more than capable of conducting “false flag” cyber attacks and blaming them on foreign actors.

Notably, one of the viruses being blamed on Iran for cyberattacks targeting the U.S. ahead of the 2020 election — called Shamoon — was “stolen” by the CIA’s UMBRAGE and cited in the WikiLeaks release.

 

Conflict of interest-ridden Microsoft “defends democracy”

Last year saw the tech behemoth Microsoft join the effort to blame foreign state actors, specifically Iran, for cyberattacks against the U.S. This helped to bolster assertions that had largely originated with a handful of U.S. intelligence officials and hawkish, neoconservative-aligned think tanks as media reports on Microsoft’s related claims treated the company as an independent private sector observer.

Yet, as MintPress investigations have revealed, Microsoft has clear conflicts of interest with respect to election interference. Its “Defending Democracy” program has spawned tools like “NewsGuard” and “ElectionGuard” that it claims will help protect U.S. democracy, but — upon closer examination — instead have the opposite effect.

Last January, MintPress exposed NewsGuard’s neoconservative backers and how special interest groups were backing the program in an effort to censor independent journalism under the guise of the fight against “fake news.” Subsequent investigations revealed the risk that Microsoft’s ElectionGuard poses to U.S. voting machines, which it claims to make more secure and how the platform was developed by companies closely tied to the Pentagon’s infamous research branch DARPA and Israeli military intelligence Unit 8200.

ElecionGuard software has since been adopted by numerous voting machine manufacturers and is slated to be used in some Democratic Primary votes. Notably, the push for the adoption of ElectionGuard software has been spearheaded by the recently created Cybersecurity and Infrastructure Security Agency (CISA), which is the federal agency tasked with overseeing election security and is headed by Christopher Krebs, a former high level Microsoft executive.

In recent months, Microsoft has also been at the center of claims that Iran attempted to hack U.S. presidential campaigns ahead of 2020 as well as claims that Iran plans to target the U.S. power grid and other critical infrastructure with cyberattacks.

Last October, Microsoft penned a blog post discussing a “threat group” it named Phosphorus that they “believe originates from Iran and is linked to the Iranian government.” The post went on to claim that Phosphorus attempted to target a U.S. presidential campaign, which later media reports claimed was President Trump’s re-election campaign. Microsoft concluded that the attempt was “not technically sophisticated” and ultimately unsuccessful, but felt compelled to disclose it and link it to Iran’s government.

Though it provided no evidence for the hack or its reasons for “believing” that the attack originated from Iran, media reports treated Microsoft’s declaration as proof that Iran had begun actively meddling in the 2020 election. Headlines such as “Iranian Hackers Target Trump Campaign as 2020 Threats Mount,” “Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says”, “Microsoft: Iran government-linked hacker targeted 2020 presidential campaign” and “Microsoft Says Iranians Tried To Hack U.S. Presidential Campaign,” were blasted across the front pages of American media. None of the reports scrutinized Microsoft’s claims or noted the clear conflict of interest Microsoft had in making such claims due to its efforts to see its own ElectionGuard Software adopted nationwide.

Media reports also left out the fact that Microsoft is a major government contractor for the U.S. intelligence community and the Pentagon. Notably, the Trump campaign, which Microsoft said was the target of this attack, was later identified as the only major presidential campaign using Microsoft’s “AccountGuard” software, part of its dubious “Defending Democracy” program that also spawned NewsGuard and ElectionGuard. AccountGuard claims to protect campaign-linked emails and data from hackers.

Microsoft surfaced not long after, again claiming that Iran was maliciously targeting the United States’ civilian infrastructure. This subsequent claim was first published by Wired and later covered by other outlets. Those reports cite a single person, Microsoft security researcher Ned Moran, who claimed that an Iran-backed hacking group called APT33 was targeting the U.S. “physical control systems used in electric utilities, manufacturing, and oil refineries.”

“They’re trying to deliver messages to their adversaries and trying to compel and change their adversaries’ behavior,” Moran told Wired. Moran also stated that “Microsoft hasn’t seen direct evidence of APT33 carrying out a disruptive cyberattack rather than mere espionage or reconnaissance, it’s seen incidents where the group has at least laid the groundwork for those attacks (emphasis added).”

 

Cybereason helps craft the narrative

While U.S. intelligence officials and media outlets alike have been largely responsible for setting the narrative that imminent meddling will be conducted by Russia, China and Iran, key components of that narrative, particularly with respect to China and Iran, have been laid by Cybereason, a company that recently ran 2020 doomsday election simulations and that has close ties to the intelligence communities of both the U.S. and Israel.

Shortly after the killing of Iranian General Qassem Soleimani earlier this month, an operation conducted in concert with Israeli intelligence, Cybereason warned that Iran could imminently retaliate with a cyber threat and quoted its own employees who explained what and how Iran would likely target in retaliation. Cybereason’s CSO Sam Curry, who actively participated in the firm’s 2020 doomsday election simulations, stated:

 This means that Iran’s “forceful revenge” response is likely to be less about the flash and all about the bang. If you have connected systems that are responsible for kinetic world effects, like ICS systems and critical infrastructure around water, energy or vital services, it’s time to pay attention. Iran and the US are engaged in Cyber brinksmanship, which means that the gloves are off as Iran picks it’s targets (emphasis added).”

Cybereason also quoted visiting fellow for the National Security Institute and former advisor to the U.S. Secret Service (which participated in Cyberaeson’s election simulations), Anne Marie Zettlemoyer, who claimed that Iran could soon target Wall Street and critical U.S. infrastructure like the power grid:

 An attack against the financial systems can be devastating economically and weaken the confidence and viability of markets. However, we cannot ignore the physical consequences and manifestations that can come from a cyberattack, particularly against critical infrastructure like energy and industry control systems.”

Cybereason’s claims regarding Iran’s interest in “critical infrastructure” systems likely originated with Microsoft, the claims were then parroted by the media in several reports, many of which quoted Cybereason’s Sam Curry. Curry is also a contributor to major news outlets like Forbes where he writes about Iran’s cyber warfare capabilities. 

Notably, in Cybereason’s recent allegations against Iran, it states that “it’s clear that Iran has been preparing for future geopolitical conflict by gaining access to critical infrastructure and other important operations in the United States.” It backs these claims by citing an article authored by Curry for Forbes. Following Soleimani’s death, numerous media reports, including in the UK’s The Independent and ABC News, have cited Curry as an “expert” source in claiming that Iran would retaliate with cyberattacks.

Microsoft’s claims about foreign hackers and meddling — the evidence for which have never been made public but has been parroted as fact nonetheless — are frequently supported by Cybereason.

Last August, Microsoft claimed to have foiled Russian attempts at hacking two Republican-affiliated think tanks and, despite providing no evidence, Cybereason’s then-senior director of intelligence services Ross Rustici was quoted as an expert in several media reports as saying that such behavior was to be expected from Russia. In one such report, Rustici stated:

We’re very good at fighting the last war, but the Russians are very good at evolving their game. I suspect if they’re going to do a psychological operation around the elections, the way they do it will be different than what they did in 2016. How effective the defenses we’ve built for what they did in 2016 will be for those attacks is yet to be seen.”

None of the media reports quoting Rustici mentioned Cybereason’s ties to Israeli intelligence, referring to tech firms only a “Boston-based cybersecurity company” and similar variants. Cybereason’s Intelligence Group is stuffed with former and active members of U.S. and Israeli intelligence services and has released several reports about nation-state hacking with a focus on Russia and China.

Cybereason has also been at the forefront of claims that China has been engaged in aggressive cyberattacks against multinational companies that have also seen widespread coverage in U.S. media, despite the untransparent nature of the evidence for Cybereason’s claims.

In a story that received major coverage from outlets such as Fox News, Reuters, CNBC and others, Cybereason unveiled what it called “Operation Soft Cell,” an operation that stole mass troves of data from several global telecommunications companies. In each story, Cybereason is the sole source of the claim and declined to provide the name or location of any of the affected companies. The firm also claimed to have determined that the attack was likely perpetrated by someone “backed by a nation state, and is affiliated with China.” It further claimed to have debriefed and coordinated responses with U.S. intelligence.

In an article for Reuters, Cybereason stated that “this time as opposed to in the past we are sure enough to say that the attack originated in China” while Cybereason separately told CyberScoop that it had “found hacking tools such as a modified web shell and a remote access trojan that are commonly associated with, but not unique to, Chinese hackers.” Despite the incongruity, media reports laid the blame squarely on China, as seen in headlines such as “Chinese spies have been sucking up call records at multinational telecoms, researchers say.”

Prior to uncovering Operation Soft Cell, Cybereason had warned on its blogs in the months and years prior that China would imminently target U.S. companies. The revelation of Operation Soft Cell — which originated exclusively with Cybereason — has been used to build the case that China is openly engaged in cyberwarfare against its rival states, like the United States, and targeting “democracy itself.”

 

Best Known Deep Fake Creator is Funded by Israeli Intelligence

While the media, and even Cybereason itself, have helped lay the foundation to blame specific state actors for 2020 election meddling well ahead of the fact, it is worth revisiting Cybereason’s “Operation Blackout” election simulation and the tactics used by the “bad actors” in that scenario.

That simulation, discussed in detail in the first installment of this series, saw the weaponization of specific technologies, namely deep fakes, hacks of Internet of Things (IoT) devices and hacks of vehicles, in order to target the 2020 U.S. election, resulting in the cancellation of the election and the imposition of martial law.

Given the current narrative regarding what state actors are likely to meddle in the 2020 election — namely Russia, China and Iran — and the tactics they will allegedly use, it is important to explore the sources of the technologies weaponized per that narrative as well as in “Operation Blackout.”

Indeed, if there is any clear overlap between the creators of those technologies and the state actors being blamed in advance for their imminent use, it would certainly lend credibility to the claims promoted by U.S. intelligence, the media and companies like Microsoft and Cybereason.

Yet, upon closer examination, it becomes clear that the companies and state actors most involved in developing these technologies are the very ones claiming that Russia, China and Iran will use them to undermine the 2020 election.

Take for instance the use of deep fakes. Not only have numerous media reports focused on how deep fakes will be used to meddle in the 2020 elections, but Cybereason’s doomsday election simulation saw “bad actors” rely heavily on their use to spread disinformation and even make fake bomb threats. While much has been said of the coming election and deep fakes, remarkably few reports have bothered to look at the company best known for creating viral deep fakes.

Canny AI has garnered considerable media attention over the past few years for its persuasive deep fake videos that have frequently gone viral. In the last year alone, the tech firm’s viral deep fakes have included a controversial video of Mark Zuckerberg where the Facebook co-founder appears to be saying “Imagine this for a second: One man, with total control of billions of people’s stolen data, all their secrets, their lives, their futures,” as well as a video showing Richard Nixon giving a speech he never actually gave. More recently, Canny AI was behind the viral videos immediately prior to the 2019 U.K. general election that appeared to show Jeremy Corbyn and his rival Boris Johnson endorsing each other and another video that showed world leaders singing John Lennon’s “Imagine”:

Oddly, many of the media reports that discuss these viral videos fail to mention the role of Canny AI in creating these viral deep fakes and instead only mention the organization or artists with whom Canny AI partnered to create them. For instance, the Corbyn-Johnson videos were reported to have been produced by the group Future Advocacy and artist Bill Posters, but it was actually Canny AI that created those videos for that group. Similarly, the Nixon Speech deep fake was reported by several outlets as having been solely created by MIT’s Center for Advanced Virtuality. However, the Boston Globe noted that “the [MIT] team worked with Canny AI, an Israeli company that does Video Dialogue Replacement, and Respeecher, a Ukrainian startup specializing in speech-to-speech synthetic voice production” to create the video.

The Zuckerberg deep fake that Canny AI created led to lots of positive press for the company, with several media reports dubbing them as the company using “deep fakes for good” and that uses the controversial technology “responsibly.” The Zuckerberg deep fake has been cited as one of the main drivers behind Facebook’s new “deep fake” policy, which only bans some deep fake videos and has been criticized by U.S. lawmakers as insufficient. Notably, neither Facebook nor Facebook-owned Instagram ever took down Canny AI’s deep fake of Zuckerburg.

Given the concern over deep fakes in relation to the coming election and Canny AI standing out as the main producer of deep fakes that have gone viral over the past year, it is important to point out that Canny AI has ties to a state actor with a history of election meddling: the state of Israel.

Indeed, Canny AI is 100 percent funded by an Israeli start-up accelerator called Xcelerator, a joint venture between Tel Aviv University and Israeli intelligence agency Shin Bet (sometimes called Shabak). According to Start Up Nation Central, the Paul Singer-created organization that promotes Israeli technology start ups, Xcelerator-funded “start-ups participating in the program benefit from close mentoring from content and technology experts from the Shabak, experts from Tel Aviv University, and industry leaders. The connection to the Shabak also provides the entrepreneurs with ways to test the capabilities of their technologies and cooperation opportunities (emphasis added).”

In addition, Xcelerator is partnered not only with Israeli intelligence directly, but also with Cybereason, the very company that explored the use of deep fakes in the 2020 U.S. presidential election that saw the election cancelled and martial law declared as well as a company that itself has deep ties to Israeli intelligence. Other notable partners of Xcelerator include NEC Corp, which has intimate ties to top Cybereason investor Softbank; Check Point Technologies, which has ties to Israeli military intelligence Unit 8200; and the Israeli start-up accelerator Team8. In previous reports published by MintPress, Team8 was discussed in detail, particularly their recent hire of former director of the NSA and former head of U.S. Cyber Command Mike Rogers, and their close ties to Paul Singer’s Start Up Nation Central, which itself has deep ties to U.S. neoconservatives.

It is also worth noting that Xcelerator also backs an “anti-fake news” start-up called Cyabra, which has direct ties to Israel’s Mossad and offers its AI-driven “disinformation protection” to government agencies as well as politicians, particularly during election seasons. Two of Cyabra’s co-founders previously co-founded Psy-Group, which attempted to interfere in the 2016 U.S. election by weaponizing “fake news” and social media and later closed down its operations after U.S. government scrutiny into its activities began as part of the Mueller investigation.

Psy-Group also engaged in doxxing campaigns targeting Palesintian rights activists in the U.S. which were planned in conjunction with Ram Ben-Barak, the former deputy director of the Mossad who now advises Cyabra. Given that much of the concern ahead of the next election is related not only to deep fakes but also “fake news,” Cyabra’s rise and its clear ties to Mossad and the now defunct Psy-Group are important to note.

Furthermore, in examining the other technologies weaponized during Cybereason’s 2020 election simulation and cited in the aforementioned media narrative regarding 2020 meddling, a pattern similar to that of Canny AI emerges.

Indeed, the other technologies linked to these “bad actors” and foreign meddlers — namely hacking IoT devices and hacking vehicles — are also pioneered by companies with deep ties to Israeli military intelligence, specifically Unit 8200, and Israeli tech companies that have aggressively spied on U.S. government institutions in collusion with Israeli intelligence in the past, namely Comverse (now Verint) and Amdocs.

 

Hacking the Internet of Things

In Cybereason’s doomsday election simulation, another of the tactics used was the hacking of devices and appliances connected to the internet, often referred to as the Internet of Things (IoT) and which includes everything from smartphones to power grid infrastructure to city traffic lights.

While most reports on IoT hacks to date have focused on “lone wolf” or non-state-aligned actors, one company has stood out for its efforts to create a tool that would allow governments and intelligence agencies to hack these devices with ease. That company, called Toka, announced in 2018 that it planned to offer “a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain,” with “a special focus on [hacking] the so-called Internet of Things (IoT), covering tech like Amazon Echo, Nest connected home products, as well as connected fridges, thermostats and alarms.”

The Israel-based company, which raised $12.5 million within months of launching, has since been busy marketing its services to governments around the world, most recently France where it described its product portfolio as “empower[ing] governments, Intelligence, and law enforcement agencies to enhance Homeland Security with groundbreaking cyber-intelligence and operational capabilities” during an exposition in Paris last November.

Even though Toka openly markets the ability to hack private consumer devices to governments and law enforcement agencies around the world, the clear threat to privacy has gone ignored by media outlets as the company has garnered nearly no media attention since it launched nearly two years ago.

Yet, Toka is not only notable for what it offers but also for its founders and investors. Indeed, the co-founders of Toka have been described as an “all-star” team, largely because of the role of former Israeli Prime Minister and former head of Israeli military intelligence, Ehud Barak. Barak, in addition to co-founding the company, serves as its director and is also the chairman of the board of the controversial Israeli company Carbyne911, which markets software to emergency call centers in the United States. Interestingly, Cybereason’s 2020 doomsday election simulation also dealt with the hacking and weaponization of 911 call centers. Also of note is the fact that another of Carbyne911’s leadership team, former Unit 8200 commander Pinchas Buchris, is an adviser to Cybereason.

Toka’s top brass is a who’s who of former Israeli military and intelligence officials

In addition to Barak, Toka was co-founded by retired Brigadier General Yaron Rosen, former Chief of the IDF’s cyber staff, where he was “the lead architect of all [IDF] cyber activities” including those executed by Israeli military intelligence Unit 8200. Rosen, who now serves as Toka’s CEO, has stated that Toka’s technology will only be sold to countries allied with the U.S. and Israel, telling Forbes that “Russia, China and ‘other enemy countries’ would never be customers.”

Toka’s leadership and software architects are similarly tied into Israel’s national security state. Several — including the “architect” of its hacking software — previously worked for Israel’s Prime Minister’s Office and developed “offensive technologies” for Israel’s head of state and other top Toka employees and executives share numerous connections to Unit 8200, other divisions of Israeli military intelligence and Unit 8200-connected tech companies like Check Point Technologies.

Though Toka’s leadership team makes its ties to Israeli military intelligence abundantly clear, important connections also appear in examining Toka’s investors. One of the major investors in Toka is Dell technologies, one of the world’s largest technology companies that was founded by Michael Dell, a well-known pro-Israel partisan who has donated millions of dollars to the Friends of the IDF and one of the top supporters of the so-called “anti-BDS” bills that prevent publicly employed individuals or public institutions from supporting non-violent boycotts of Israel, even on humanitarian grounds. It goes without saying that a major technology company investing in a company that markets the hacking of that very technology (computers, IoT, smartphones, etc.) should be a red flag.

With a major foot in the door through its connections to Dell, whose products are used by the private and public sectors around the world, other investors in Toka again reveal its ties to Israel’s military intelligence and the same controversial Israeli tech companies that have aggressively spied on the U.S. government in the past — Amdocs and Comverse. For instance, Entrèe Capital, a venture capital fund that is one of Toka’s main investors, is managed by Aviad Eyal and Ran Achituv. The latter, who manages Entrée’s investment in Toka and sits on Toka’s board of directors, is the founder of the IDF’s satellite-based signals intelligence unit and also a former senior Vice President at both Amdocs and Comverse Infosys (Verint).

Another notable investor in Toka is the venture capital firm Andreesen Horowitz, which is advised by former Secretary of the Treasury Larry Summers, a close friend of the infamous pedophile Jeffery Epstein, whose own ties to Israeli military intelligence have been discussed in several MintPress reports. Epstein was also a close friend of Ehud Barak, co-founder and director of Toka, and invested at least $1 million in another company with close ties to Barak, Carbyne911. The remaining investors in Toka are Launch Capital, which is deeply tied to the Pritzker family — one of the wealthiest families in the U.S. with close ties to the Clintons and Obamas as well as the U.S.’ pro-Israel lobby, and Ray Rothrock, a venture capitalist who spent nearly three decades at VenRock, the Rockefeller family venture capital fund.

 

Unit 8200 – From Hacking Cars to Protecting Them?

Arguably the most disturbing aspect of Cybereason’s “Operation Blackout” election simulation was the hacking of vehicles that were then rammed into civilians waiting in line to vote at polling stations. In the simulation, this led to scores of dead Americans and hundreds of injuries.

As was the case with other technologies used to undermine the 2020 election in the simulation, this technology — the hacking of vehicles — is the bread and butter of an Israeli cybersecurity firm called Upstream Security that specializes in automobiles and boasts deep ties to the country’s military intelligence service.

Though vehicle hacking seemed out of left field when the 2020 election simulation took place last November, media reports about the imminent dangers of “car hacking” began to emerge just a month after the exercise took place, most of which cited a December 2019 report created by Upstream. Some of those reports have warned that car hacking could be used to undermine the coming U.S. election.

One report titled “Car Hacking Hits the Streets,” cites only Upstream’s report to claim that “In 2020, the connected-car market will reach a tipping point, with the majority of vehicles already connected to the Internet when sold in the United States, representing a large base of potential targets for attacks.” Another report, titled “New study shows just how bad vehicle hacking has gotten,” uses Upstream’s report (i.e. study) to claim that hacks of regular vehicles have exploded since 2016 and that most of the cars on U.S. roads today are vulnerable to hackers and that over 80 percent of those hacks occur remotely.

Neither report noted Upstream’s ties to Israeli military intelligence. Equally notable is the fact that both reports that covered the Upstream-written study say that only manufacturers can address the problem by partnering with a company like Upstream.

Lucky for Upstream, they have already partnered with a slew of auto manufacturers, including Hyundai, Volvo, Renault and even U.S. auto insurance giants like Nationwide, who now number among Upstream’s most important investors. The company’s original investors are Charles River Ventures, one of Cybereason’s first investors, and Israeli venture capital firm Glilot Capital.

Glilot Capital’s interest in Upstream is telling given the firm’s deep ties to Israel’s Unit 8200. Glilot was founded by two former Israeli military intelligence officers and has “a heavy focus on the cyber sector and the entrepreneurs who emerge from the elite Unit 8200,” according to the Jerusalem Post. Even the name of the firm is an homage to Unit 8200, as the unit’s main base is located in Glilot, near Herzliya.

“It’s as if Americans called a VC Fort Meade Capital [the US Army base in Maryland where the National Security Agency and the United States Cyber Command are headquartered], some VC names are meant to be symbolic, as in our case. Glilot is the home of several of the best intelligence and technology units in the IDF, it’s where we came from and it is where we find our best entrepreneurs,” Glilot Capital co-founder Arik Kleinstein told the Jerusalem Post in 2016.

Upstream is certainly the type of company that Glilot Capital is used to investing in. It was founded by two Israelis who both served in the IDF, with one of them serving in an elite intelligence unit. Upstream’s co-founders, Yoav Levy and Yonathan Appel, met while working at Check Point Technologies, the Unit 8200 alumni-founded company with deep ties to Israel’s military intelligence and military-industrial complex as well as the IoT hacking company Toka. Notably, Upstream recently partnered with the Japanese company Fujitsu, a longtime partner with Softbank — Cybereason’s main investor.

Softbank has also invested heavily in another Unit 8200-founded vehicle security start-up called Argus Cyber Security, a firm known for its numerous demonstrations showing how easy it is to hack vehicles. Argus is also backed by Nadav Zafrir, the former Unit 8200 commander who now runs Team8. Argus’ CEO Ofer Ben-Noon, a former captain in Unit 8200, told Forbes in 2014 that “Everything will be hacked in every single [car] brand. It will take time, it might be weeks, months, or a couple of years, but eventually it will happen.”

Since then, Unit 8200 alumni from Argus, Upstream and other Israeli automobile cybersecurity firms have shown media outlets around the world how much easier hacking vehicles has become in the years since Ben-Noon first made the claim. One such report from VICE includes a vehicle hacking demonstration, courtesy of a Unit 8200 alumni, and notes that “most cars today are susceptible to hacker attacks.”

Of course, Unit 8200 isn’t the only intelligence agency known to be experts at hacking vehicles. Indeed, in 2017, WikiLeaks revealed that the CIA was capable of hacking vehicles and exploring their use in committing “undetectable assassinations.”

 

“Bring down nations to their knees”

At the Tel Aviv Cybertech Conference in 2017, Israeli Prime Minister Benjamin Netanyahu stated the following:

Today warfare has changed dramatically…With a click of a button, you can bring down nations to their knees very rapidly if you so desire and if you’re willing to take the risks, because every system can be hacked. Our hospitals, our airplanes, our cars, our banks. The most important word here is our data banks, they can be hacked.”

Media reports and even members of the Israeli public and private sector have openly acknowledged that Israel’s intelligence apparatus — from Unit 8200 to the Mossad — remains directly linked to many of the private technology companies founded by its former members, especially in the field of cybersecurity. Though reports on the matter often praise this merging of Israel’s public and private spheres, they rarely acknowledge the documented corruption within Unit 8200, the unit’s dark past in recruiting felons and even pedophiles to join its ranks, or the danger posed by having companies directly linked to foreign intelligence being given access to the U.S. government’s most classified and sensitive systems and data.

The last omission is particularly troubling given that Israeli intelligence has not only been caught aggressively using private tech companies to spy on U.S. federal agencies and networks, but also intercepting the private communications of at least two U.S. presidents and using a notorious pedophile to sexually blackmail American politicians.

As was mentioned in the first installment of this series, Cybereason’s CEO Lior Div offers a clear example of this worrisome bridge between Israel’s public and private sector, as Div has openly stated that he views his work at Cybereason as a “continuation” of his service to Israeli military intelligence, where he led offensive cyberattacks against other nations.

Given Div’s past statements and his company’s clear ties to both Israeli and U.S. intelligence, Cybereason’s simulation of the 2020 U.S. election — which involved terrorist attacks and led to the election’s cancellation and the imposition of martial law — is highly concerning. This is particularly so considering that Cybereason’s investors have direct ties to individuals who would benefit from the election’s cancellation and also considering the clear narrative that has emerged in recent months regarding how the coming election will inevitably fall victim to tech-driven “chaos” in coming months.

The clear overlap between Cybereason’s simulation and the intelligence-driven media narrative is clear cause for concern, especially considering that the technologies that they highlight as ultimately upending the election are dominated by the very same intelligence agencies simulating and crafting that narrative.

The keyword that has been used to describe the end result of both Cybereason’s simulation and the prevailing media narrative regarding the 2020 election is “chaos,” chaos so imminent, widespread and unruly that it will shake American democracy to its core.

What has been left unsaid, however, is that a government’s solution to “chaos” is always the imposition of “order.” This means that — whatever “chaos” ultimately ensues prior to or on election day — will result in a government response that will do much more to crush freedom and undermine democracy than any act of foreign meddling has, be it real or imagined.

Distrust of 2016’s Hackable Election Is a Media Landslide With Just One Solution: Hand-counted Paper Ballots

jf-7

By Bob Fitrakis and Harvey Wasserman

Source: FreePress.org

Finally, the major for-profit media is approaching consensus that it’s easy to hack U.S. political elections. Even candidates Hillary Clinton and Donald Trump are raising unprecedented doubts – from very different directions – about the reliability of the upcoming vote count.

Ultimately, there is just one solution: universal hand-counted paper ballots, with carefully protected voter registration rolls, and a transparent chain of custody.

The corporate media and the Democrats are obsessed with the “Russians.” Donald Trump rants about a mythological army of voters voting multiple times.

But the real threat to our election system comes from private for-profit corporations that register voters, control voter databases, then count and report the vote with secret proprietary software and zero transparency, accountability, or recourse.

After ignoring or attacking the reportage since Florida 2000 of Bev Harris, Greg Palast, freepress.org and numerous others, the corporate media seems finally to be getting the message: under the current system, any American election – even the one for president – can be stripped and flipped by a tiny handful of electronic hackers working anywhere from the Kremlin to a party HQ to a state governor’s office to a teenager’s garage.

Here is some of what the mainstream media is finally admitting. In an article posted on July 28, 2016, NBC News pointed out that our elections are vulnerable to hacking because they “are not part of the vast ‘critical infrastructure protection’ safety net set up by the Department of Homeland Security.”

CBS News wrote August 10, 2016, about “the hackers at Symantec Security Response” who demonstrated how “Election Day results could be manipulated by an affordable device you can find online.”

Former national coordinator for counter-terrorism Richard Clarke, reporting for ABC News on August 19, 2016, analyzed the particular security problems related to battleground states like Ohio and Florida: “In 2000 and 2004, there were only a handful of battleground states that determined which presidential candidate had enough Electoral College votes to win. A slight alteration of the vote in some swing precincts in swing states might not raise suspicion. Smart malware can be programmed to switch only a small percentage of votes from what the voters intended. That may be all that is needed, and that malware can also be programmed to erase itself after it does its job, so there might be no trace it ever happened.” Clarke was on the White House National Security Council during both Bill Clinton’s and George W. Bush’s administrations.

Zeynep Tufekci, an associate professor at the North Carolina School of Information and Library Science, in his August 12, 2016 New York Times op-ed “The Election Won’t Be Rigged but It Could Be Hacked,” wrote: “The mere existence of this discussion is cause for alarm. The United States needs to return, as soon as possible, to a paper-based, auditable voting system in all jurisdictions that still use electronic-only, unverifiable voting machines.”

On August 30, 2016, the Washington Post wrote: “Deleting or altering data on voter rolls could cause mayhem on Election Day disenfranchising some voters. Many voting machines themselves also are vulnerable, especially touch-screen systems that do not create a paper record as a guard against fraud or manipulation.” The Post also supplied a list of the 15 states with the most vulnerable voting systems.

The list of those now admitting the obvious includes the Boston Globe, The Atlantic, USA Today, The Guardian, Mother Jones, and Politico, some of which have previously mocked those of us reporting on this issue. Most important has been the highly influential The Hill, which weighed in on May 2, 2016 with “Election fraud feared as hackers target voter records.” The lede was straightforward: “A series of data breaches overseas are spurring concerns that hackers could manipulate elections in the United States.”

Trump advisor Roger Stone wrote a column in The Hill with the headline: “Can the 2016 Elections Be Rigged? You Bet.” He also referred to our latest summary volume, “The Strip & Flip Selection of 2016: Five Jim Crows & Electronic Election Theft,” as “a must-read book on the strip and flip techniques used to rig these machines.”

But in the 2016 primary election, there are other must-reads as well. Perhaps the most important is Election Justice USA’s report entitled “Democracy Lost: A Report on the Fatally Flawed 2016 Democratic Primaries.” This report cites six major areas of election irregularities in this year’s 26 primary elections:

1) Targeting voter suppression

2) Registration tampering

3) Illegal voter purges

4) Exit poll discrepancies

5) Evidence for voting machine tampering

6) The security (or lack thereof) of various voting machines types.

In their 96-page report, Election Justice researchers documented how Hillary Clinton’s campaign benefited from these “various types of fraud.” Their conclusion: “Based on this work, Election Justice USA has established an upper estimate of 184 pledged delegates lost by Senator Bernie Sanders as a consequence of specific irregularities and instances of fraud.”

Election Justice’s well-documented estimate that Sanders lost 184 delegates means that if the election had been conducted fairly, the Senator from Vermont would now be the Democratic nominee.

Another document essential to understanding election irregularities that allowed Hillary Clinton to capture the Democratic Party nomination is a paper co-authored by Axel Geijsel of Tilburg University in the Netherlands and Rodolfo Cortes Barragan of Stanford University. Their analysis found that primary election results in states with the most vulnerable and hackable voting machines and without a paper trail overwhelmingly favored Hillary Clinton 65 percent to 35 percent. Sanders led Clinton 51 percent to 49 percent in states where the vote count could be verified with a paper trail.

The correlation between the increased Clinton vote and the increased vulnerability of the voting machines has been avoided like the plague by the corporate media.

Equally important to read is mathematician Richard Charnin’s blog. Charnin is a man the mainstream media often attacks – but not with mathematical formulas to rebut Charnin’s detailed analysis. Rather they attack him because, like the vast majority of Americans, he believes that John F. Kennedy was not killed by a lone gunman. In 2016, official Democratic primary vote counts compared to exit poll results were significantly outside the margin of error in 12 of 26 states. Charnin concluded that the probability of those official vote tallies being correct are one in 78 billion. There were no such discrepancies in this year’s Republican primaries.

Now 16 years after the theft of the presidency in Florida 2000, and a dozen since it was done again in Ohio 2004, the corporate media are approaching consensus that it is indeed very easy to strip millions of legitimate citizens from the voting rolls, and then to hack electronic voting machines and computerized central tabulators to flip the official final outcome.

The threat to this year’s election does not come from non-existent armies of mythological hordes voting multiple times. It comes from the private partisan companies with their secret proprietary software that control the voter rolls, the electronic machines, and ultimately the final outcome at all levels of government. The mega-corporations are the ones that flipped George W. Bush into the White House and Hillary Clinton into the Democratic nomination, not to mention manipulating countless Senate, House, and state and local elections along the way.

For a hopelessly vulnerable electronic election system which is flawed, hackable and riggable from top to bottom, there is just one solution: transparent unhackable voter rolls, and universal hand-counted paper ballots open to public scrutiny from the precinct level to the final official tallies, as dutifully reported by our slowly awakening corporate media.

 

Bob Fitrakis & Harvey Wasserman are co-authors of The Strip & Flip Selection of 2016: Five Jim Crows & Electronic Election Theft, available at www.freepress.org and www.solartopia.org, where Bob’s Fitrakis Files and Harvey’s Solartopia! can also be found.

The Media Can’t Get Its Story Straight on Election Hacking

obamariggedelections

By Dan Engelke

Source: Who.What.Why.

In August, the corporate media was falling all over itself with breathless coverage on how Russia is interfering in the US election. Back then, stories citing experts suggested that voting machines were vulnerable to tampering that could change the outcome of the vote. A month later, something curious happened.

By September, government officials were doing all they could to tamp down those concerns, and the media duly reported their reassurances.

Should the public be comforted that election mischief will be homegrown?

The articles, usually citing active government officials, serve a dual purpose in reassuring the public: First, there is no way Russia can hack the election, despite cyber hacks in the Illinois and Arizona voter registration banks. Meanwhile, the message is also to insist Russian President Vladimir Putin is still giving orders to disrupt US cyberspace. This latter message culminated in the Obama administration publicly blaming the Russian government for trying to influence the election in early October.

Voter System vs Election System

The Washington Post began the trend on August 31 with the definitive headline “There’s Almost No Chance Our Elections Can Be Hacked by the Russians. Here’s why.”

The Post cites two major obstacles for potential (Russian) disruption of our election. One is the difference between the “voter system” and the “election system.” The voter system involves registered voter databases throughout the country, while the election system refers to voting machines and paper ballots.

According to executive director Merle King of the state-funded Center for Election Systems in Georgia, the public conflates these two issues about the election, and that leads to a lot of confusion.

The second hindrance for potential hackers is the decentralized voting process, the Post reported. A major positive for vote security, according to the Post, is that local jurisdictions set their own rules for how votes will be counted.

This claim is buttressed by a letter sent by state election officials to Florida voters which notes the public safeguards already in place for our voting process — including (1) layers of encryption for voting machines, (2) thumb drive backups of votes, (3) lack of internet connection to voting machines, and (4) a review of votes after an election.

The Los Angeles Times followed on September 8 with a report titled “Could Russian Hackers Mess with the US Election Results? It Wouldn’t Be Easy; Here’s Why.”

The Times also highlights the decentralized nature of the voting system as a safeguard against tampering. However, while the Post viewed the system as sophisticated, the Times saw the state-run and community-monitored systems as too cumbersome to be susceptible to any hacking.

Quoted again is Merle King, along with Connecticut Secretary of State Denise Merrill, and FBI Director James Comey. Pamela Smith of Verified Voting — an organization that highlights the susceptibility to election rigging — is also sourced to reassure readers that the upcoming election is safe, thanks to an uptick in paper ballot usage.

Russia’s Goal Not Hacking — But Scandal

On September 10, Washington, D.C.-based political newspaper The Hill worked the same dual agenda with “Hacking the Election is Nearly Impossible. But that’s not Russia’s Goal.”

Like the previous articles in the Washington Post and LA Times, The Hill presents the decentralized process of US elections as an impenetrable obstacle to Russian hacking. Bolstering the claims of election security in the piece are Florida’s Secretary of State Ken Detzner, Colorado’s Secretary of Wayne Williams, Pennsylvania Department of State spokesperson Wanda Murren, and Wisconsin’s Administrator of State Elections Division Michael Hass. The only non-governmental official quoted is Chris Porter, an administrator of strategic intelligence at cybersecurity firm FireEye Horizons.

Porter cited examples of Russian election tampering in the Ukraine and efforts to “create scandal,” despite their inability to hack the election.

The Chicago Tribune got its turn on September 14, quoting Assistant to the President for Homeland Security and Counterterrorism Lisa Monaco, who reiterated the safety of the election thanks to the decentralization of the voting process.

These assertions of election security and passive blame on Russia culminated in early October with the Obama administration publicly accusing “senior-most officials in Russia” of tampering with the election, despite their claimed inability to do so.

Taking a Screwdriver to the Election

Let’s go back to August to see why certain experts said that elections could indeed be tampered with.

Princeton professor Andrew Appel made headlines in August after hacking the Sequoia AVC Advantage electronic voting machine in seven minutes. Such machines are used in Louisiana, New Jersey, Virginia and Pennsylvania.

“[Appel] summoned a graduate student named Alex Halderman, who could pick the machine’s lock in seven seconds. Clutching a screwdriver, he deftly wedged out the four ROM chips — they weren’t soldered into the circuit board, as sense might dictate — making it simple to replace them with one of his own: A version of modified firmware that could throw off the machine’s results, subtly altering the tally of votes, never to betray a hint to the voter. The attack was concluded in minutes.”

Former government officials working in the cyber sphere have also warned of election tampering. Former White House counterterrorism czar Richard Clarke asserted: “Yes, It’s Possible to Hack the Election” on August 18.

“I have had three jobs that together [under Bill Clinton, George W. Bush, and Barack Obama] taught me at least one thing: If it’s a computer, it can be hacked.”

Special Interests and the Machines

Clarke sees the decentralized election system as the access point for potential tampering —rather than a potential safeguard. While there are safeguards, such as the voter tabulation through paper ballots, almost no state exclusively uses paper ballots. Instead, voting machines — even allowing votes from home — produce no paper ballot record and thus no way to ensure the “correct” vote was cast.

Furthermore, Clark argues paper ballot receipts from the voting machines are only used in the case of a recount — something today’s sophisticated hackers are aware of and would seek to avoid.

“My first reaction to all this government reassurance was ‘are you kidding me?’” Dr. Jonathan Simon of the Election Defense Alliance told WhoWhatWhy. “There is all this concern about outside hacking, but absolutely no talk of internal rigging.”

While Simon points out that there are many election safeguards, connections to special interests by those that control voting machines provides easy access to election rigging.

“Anyone who could stand to profit off certain policies — the Koch brothers, for example — have a better chance of rigging the election due to their connections to voting systems like Dominion, SES and their satellite companies,” Simon explained. “Russia, China, nor any terrorist group in the Middle East have a connection like that.”

Despite encryption and the lack of an Internet connection, Simon claims that there are other ways to change voting results.

“In a memory card, which is used in optical scanner-verified voting, three lines of code to flip votes one way or another can be entered into 7,000 or 8,000 lines of code virtually without detection. Multiple memory cards can be manipulated like this at the push of a button.”

Why Overlook Potential Domestic Hacking?

With articles by outside experts in August claiming the election could be hacked, followed in September with articles by government officials claiming it could not be — by Russia — it raises the question: why overlook domestic tampering?

“These are relatively unsophisticated and simple ways to rig the election,” Simon concluded.

Killing Democracy by a Thousand Cuts

illusionofvote

By Jim Heddle and Mary Beth Brangan

Source: FreePress.org

How are our votes being stolen? Let us count the ways…

Electoral Proctology

As the fateful June 7 primary election day approached in 6 states, including California, a stellar group of election protection luminaries gathered on Memorial Day weekend in a private home in Santa Monica with about 100 of their closest friends.  Their purpose, as that great American philosopher W.C. Fields once advised, was ‘to seize the bull by the tail and stare the situation squarely in the face.’

[ See videos of the meeting: Don’t Let Them Steal Your Vote –  Part 1https://youtu.be/Pax4z8AuGTU

Part 2  https://youtu.be/jF0Eab9wKQc  ]

Not a Pretty Picture

Chaired by movie star and long-time political activist Mimi Kennedy, a panel including Harvey Wasserman, Bob Fitrakis, Greg Palast, Bev Harris and John Blakey compared notes on the myriad methods their investigations have uncovered that are destroying the validity of U.S. elections. Facing these facts is the first step in the daunting task of restoring election integrity in America’s very broken electoral system.

In this year’s primary season alone we have seen:

·         Massive disenfranchisement caused by arbitrarily changing voters’ assigned precincts and then giving incorrect information on the changes.

·         Chaos caused in predominately minority districts by reducing the number of precincts  – and the number of machines per precinct – causing long lines and hours-long waits which turned away many voters with jobs or other time commitments.

·         Arcane regulations which instructed poll workers to give unprecedented numbers of voters ‘provisional ballots,’ which are rarely counted.

·         For example, in California, voters who registered ‘NPP’ for No Party Preference and were mailed a ballot, were not permitted to vote in the Democratic primary unless they took both the ballot and its envelope to a polling place and said the magic words, “I surrender this ballot and request a cross-over ballot.” Without those exact words, poll workers were instructed not to supply a ‘cross-over’ ballot AND not to inform the voter of the rule.

·         Media outlets prematurely calling elections before all ballots are counted – or, in some cases, even cast.

·         As of this writing, 2.6 million ballots yet to be counted for the California primary

But it gets worse.

Strip & Flip

The theme of the Santa Monica panel was set by a hot-off-the-press book just published by Fitrakis and Wasserman titled ‘The Strip & Flip Selection of 2016: The Five Jim Crows & Electronic Election Theft.’  [ Get it here: http://freepress.org/store.php ] This is the latest in a string of books the team has written in the last decade.  They have had a ringside seat to both observe – and also fight against – the increasing corruption of the U.S. electoral system, based, as they are in Columbus, Ohio, capitol of a key swing state.  In 2012, Fitrakis’s threatened lawsuit in Ohio state court prevented the planned electronic theft of the election and saved Obama’s election victory.

[See “Swing State: How the Fix Was Nixed in Ohio 2012”   https://www.youtube.com/watch?v=10qwtBlHeTY ]

Election Theft, as American as Apple Pie

Intentional disenfranchisement of potential voters in order to favor selected demographic sectors is simple in concept, if complex in means. It has been a part of the American electoral landscape from the git-go.  Eliminating legitimate voters from the voter rolls by various tactics – that’s the ‘strip’ part.  Skewing the ballot count in order to produce desired outcome percentages – that’s the ‘flip’ part – also achieved by multiple mechanisms, as we shall see.

“Not every conspiracy is a theory.”

The ad slogan for the current thriller ‘Money Monsters’ actually gets it right. Though poo-pooed as ‘conspiracy theory’ by pundits and vote fraud denialists across the political spectrum, Bob & Harvey’s work – in combination with the work of many other investigator/activists including co-panel members Bev Harris, Greg Palast,, Mimi Kennedy and John Blakey – has incontrovertibly revealed the plethora of means by which America’s electoral system has now been stripped of the last vestiges of whatever trustworthiness it may have ever actually possessed.

A short run down follows – to be expanded upon below – of issues discussed by the panel.

But, keep in mind that, for brevity, the list does not include additional key related issues, such as: unlimited campaign spending by anonymous persons and non-voting corporate entities and their surrogates – even from foreign states or agents; mainstream media’s biased reporting; manipulations by party officials; ‘super delegate’ and ‘contested convention’ schemes; the counter-democracy Electoral College; or the ‘gerrymandering-on-steroids’ REDMAP redistricting process carried out by Republicans following the 2010 election, which left them in control of the House of Representatives and many key state legislatures until at least 2020, when the next census-based re-districting is scheduled.  The latter major ploy is well documented in David Daley’s recent book “Rat F**ked: The True Story Behind the Secret Plan to Steal America’s Democracy.”)

Here’s the short list from the Santa Monica panel presentations:

·         Massive electronic purging of legitimate voters from voter rolls across the country

·         Massive vote suppression and disenfranchisement by myriad means on a national scale

·         Virtually decisive control of voter rolls without detection; vote counting and reporting by privately owned, secret, electronic devices and computer programs specifically designed to steal elections through cyber chicanery.

The Five Jim Crows

It all started with the constitution, Wasserman explained, a document drafted in secret, behind closed doors by a tiny elite of propertied white men, and rammed through to ratification by the states through electoral manipulation.   It denied voting rights to women and to males without property, but contained the “3/5ths clause” that gave slave owners congressional representation for their slaves despite the fact that the slaves themselves couldn’t vote.

The so-called Three-Fifths Compromise is in Article 1, Section 2, Paragraph 3 of the United States Constitution:

Representatives and direct Taxes shall be apportioned among the several States which may be included within this Union, according to their respective Numbers, which shall be determined by adding to the whole Number of free Persons, including those bound to Service for a Term of Years, and excluding Indians not taxed, three fifths of all other Persons.

The effect, according to Wikipedia, “was to give the southern states a third more seats in Congress and a third more electoral votes than if slaves had been ignored, but fewer than if slaves and free persons had been counted equally, allowing the slaveholder interests to largely dominate the government of the United States until 1861.”  https://en.wikipedia.org/wiki/Three-Fifths_Compromise

It was also a divide-and-conquer strategy to make sure black and white laborers would never again unite in revolting as they did in Virginia in 1675 in what’s called Bacon’s Rebellion.

Fitrakis and Wasserman call that ‘the First Jim Crow.’  After the Civil War and emancipation, they explain, Supreme Court rulings, KuKluxKlan terror, black lynchings, literacy tests and other apartheid strategies established the ‘Second Jim Crow,’ that “again guaranteed that blacks in the South (and parts of the North) would not be allowed to vote, and that they would be carefully divided from whites by caste as well as class.”

The Third Jim Crow was/is the ‘War on Drugs’ initiated by Richard Nixon to combat the liberalization of the southern Democratic Party, the anti-war movement and the rise of the Black Power movement.  As Nixon administration official John Erlichman recently explained to Harper’s interviewer Dan Blum,

“The Nixon campaign in 1968, and the Nixon White House after that, had two enemies: the antiwar left and black people. You understand what I’m saying? We knew we couldn’t make it illegal to be either against the war or black, but by getting the public to associate the hippies with marijuana and blacks with heroin, and then criminalizing both heavily, we could disrupt those communities. We could arrest their leaders, raid their homes, break up their meetings, and vilify them night after night on the evening news. Did we know we were lying about the drugs? Of course we did.”  https://harpers.org/archive/2016/04/legalize-it-all/

Young, left-leaning Latinos were also caught up in the Drug War dragnet.  Now, 45 years later, 41 million (mostly people of color) have been jailed for pot and other controlled substances, making private corporate prisons a growth industry, and giving the U.S. the highest prison population in the world.  Though having no significant impact on drug use, the Drug War has disenfranchised millions of potential voters, and continues to do so today.  Michelle Alexander’s recent book The New Jim Crow: Mass Incarceration in the Age of Colorblindnessshows how one system of race-based disenfranchisement has been replaced by another.  http://newjimcrow.com/

The Fourth Jim Crow, explain the authors, was born of America’s push to establish what they call “a race-based global empire” with a long series of foreign interventions – also continuing today – which “involved the white-ruled US interfering with the political systems of non-white nations.”

The impact of these interventions on our own political system, say Wasserman and Fitrakis, has been catastrophic. “They’ve established the US as a corporate-ruled race-based empire, fueling the growth of a military whose intrinsic power overshadows our entire electoral process…and set the stage for…the Fifth Jim Crow – the electronic flipping of our elections.”

Engineering Vote Fraud Abroad Comes Home to Roost

Manipulation of election outcomes in other countries has been developed into a high art by such US agencies as the CIA, USAID and other so-called ‘democracy promotion’ projects fielded abroad by both the Republican and Democratic parties.

Note the authors, “Overseas, the CIA began to apply advanced electronics to the art and science of election theft.  By the 1970’s, in front of the Church Committee, the Agency admitted to already having manipulated countless Third World elections to protect America’s corporate and ‘national security’ interests.”  They trace the subsequent development of electronic voting technology techniques, corporations and institutions up to the present day, when up to 80% of US votes in the coming presidential election will be electronically mediated.  In line with the adage that ‘what goes around, comes around,’ American expertise in foreign nations’ electronic vote rigging has now come home to compromise the integrity and validity of our own system, big time.

The New Jim Crow – “Interstate Crosscheck”

Panel member investigative journalist Greg Palast has been researching and reporting on this process for going on two decades for such outlets abroad as the BBC and the Guardian news paper.  Still, like the proverbial ‘prophet without honor in his own country,’ Palast states with deep frustration that he still has a hell of a time getting American so-called ‘mainstream’ media to pay any attention to his explosive exposes. http://www.gregpalast.com/

Now reporting for Rolling Stone, he is also using crowd funding to produce a forth-coming documentary titled, The Best Democracy Money Can Buy: A Tale of Billionaires and Ballot Bandits https://www.youtube.com/watch?v=kg2gCgFMBOg

In his presentation in Santa Monica Palast debunked claims by Donald Trump and others that ‘millions of people’ are committing ‘voter fraud’ by ‘voting more than once.’  Describing what he calls ‘the next, or Sixth Jim Crow,’  he reported that 29 state election officials across the country have announced the creation of what they call ‘The Interstate Crosscheck.’  Touted as a defense against mythical individual ‘voter fraud’ the system purports to identify people who are voting more than once, sometimes in multiple states, and purge them from polling lists.

In actuality, in violation of the Voting Rights Act, says Palast, the program uses census data to identify African American voters – tagged ‘BLA’ for black– with similar common names and fraudulently remove them from voter lists.

In the history of the South, when slaves were finally freed, they were often registered by their masters’ surnames.  As a result, to this day, many black persons carry the same or similar names, thus facilitating the “Interstate Crosscheck” scam.

Based on his findings, Palast says, “We expect 1 million voters – almost all of them voters of color – to lose their right to vote in 29 Republican-controlled states before the November election.”

But, he is quick to point out, it isn’t just Republicans who regularly mess with elections.  As questionable outcomes in this primary suggest, “the Democrats are dirty,” Palast says, pointing out that Democrats invented Jim Crow, which Nixon just adopted for his so-called ‘southern strategy.’

Palast admits to being tired of being a ‘reporter in exile,’ and hopes that, now that he is reporting for Rolling Stone, he can finally come home and report his investigative findings to his own countrymen “who need to know this stuff!”

“Fraction Magic” – A Digital Thumb on the Scale: Fractionalization & Decimalization of Votes

Harking back to the infamous “3/5ths clause” described above, what if you were hired to write a vote-counting program that could assign various arbitrary decimal or fractional values to each and all of the votes counted and come up with desired percentages for every candidate and contest?

To use a simple-minded butcher’s scale analogy: What if your program assigned a vote for Hillary the arbitrary ‘weight’ of 2 pounds, and assigned a Bernie vote just a weight of 1 pound?

Then, in a given race, Bernie got 200 votes and Hillary got 150 votes.

If you just added up the total votes for each candidate, you would call the election for Bernie with a 50-vote lead.

But, if your private, proprietary, secret counting program totaled their votes by the artificial ‘weights’ it arbitrarily assigned to them, you would announce Hillary the winner with a 300 to 200-vote lead.

That, ladies and gentlemen, is the intentionally programed ‘glitch’ that BlackBoxVoting.org founder Bev Harris and her colleague, IT expert Bennie Smith have discovered in a significant number of America’s vote counting systems. It is achieved via ‘fractionalization’ or ‘decimalization.’

They explain that it works like this: “Instead of “1” the vote is allowed to be 1/2,  or 1+7/8, or any other value that is not a whole number.”

That allows ‘weighting’ of selected electoral contests. “Weighting a race removes the principle of ‘one person-one vote’ to allow some votes to be counted as less than one or more than one. Regardless of what the real votes are, candidates can receive a set percentage of votes. Results can be controlled. For example, Candidate A can be assigned 44% of the votes, Candidate B 51%, and Candidate C the rest.”

On her excellent webite BlackBoxVoting.org, Harris and Smith report,

…the results of our review of the GEMS election management system, which counts approximately 25 percent of all votes in the United States. The results of this study demonstrate that a fractional vote feature is embedded in each GEMS application which can be used to invisibly, yet radically, alter election outcomes by pre-setting desired vote percentages to redistribute votes. This tampering is not visible to election observers, even if they are standing in the room and watching the computer. Use of the decimalized vote feature is unlikely to be detected by auditing or canvass procedures, and can be applied across large jurisdictions in less than 60 seconds.  http://blackboxvoting.org/

“GEMS vote-counting systems are and have been operated under five trade names: Global Election Systems, Diebold Election Systems, Premier Election Systems, Dominion Voting Systems, and Election Systems & Software, in addition to a number of private regional subcontractors. At the time of this writing, this system is used statewide in Alaska, Connecticut, Georgia, Mississippi, New Hampshire, Utah and Vermont, and for counties in Arizona, California, Colorado, Florida, Illinois, Indiana, Iowa, Kansas, Kentucky, Massachusetts, Michigan, Missouri, Ohio, Pennsylvania, Tennessee, Texas, Virginia, Washington, Wisconsin and Wyoming. It is also used in Canada.”

Read more: http://blackboxvoting.org/fraction-magic-1/

Adjusted Exit Polls

Around the world, so-called exit polls – which ask a sampling of exiting voters how they voted – are viewed as the Gold Standard for checking the accuracy of the ballot count.  In most countries, if the ballot count and the exit poll numbers don’t match, there is either a recount or the election is declared ‘not free and fair.’

Not so in America.  Here, as Jonathan Simon documents in his book Code Red: Computerized Election Theft and The New American Century, the exit poll numbers are instead adjusted to match the official vote count.

In the US, the exit pollster of record has been Edison/Mitofsky http://www.edisonresearch.com/election-polling/ working for a consortium of news organizations that comprise the National Election Pool (NEP): ABC, CBS, CNN, Fox, NBC and the Associated Press.  As Wasserman relates, when election researcher and statistician Dr. Steve Freeman called the late Warren Mitofsky personally to request the raw data from the 2004 exit polls, the response was “Go f**k  yourself.”

[ See also: Analysis of the 2004 Presidential Election Exit Poll Discrepancies

http://www.verifiedvoting.org/wp-content/uploads/downloads/Exit_Polls_2004_Edison-Mitofsky.pdf

Maybe that’s why respected international election observer Former President Jimmy Carter can say the USA “is not a functioning democracy.”  Maybe that’s why, as Fitrakis and Wasserman point out:

In March 2015, the Harvard Electoral Integrity Project reported that over fourteen hundred international election experts gathered data the year before and pronounced the United States was 45th in election integrity among the world’s long-standing democracies. The Project reported that on a 100-point scale, the U.S. received an integrity rating of 69.3% – one notch ahead of the narco-drug state Columbia….

What this means in practice is revealed in a recent study of three decades of data by liberal mainstream political scientists Martin Gilens of Princeton, and Benjamin Page of Northwestern. Their analysis confirmed that the U.S. political system has become “an oligarchy” – as Carter himself has said – where wealthy elites and their corporations “rule,” regardless of which party is in Congress and the White House.

“The central point that emerges from our research,” Gilens and Page wrote, “is that economic elites and organized groups representing business interests have substantial independent impacts on U.S. government policy, while mass-based interest groups and average citizens have little or no independent influence.”

As Gilens explained in an interview, “ordinary citizens have virtually no influence over what their government does in the United States.”

Citizen Exit Polls

Edison Research was scheduled to do exit polling for the NEP media consortium in the California primary.  But when Ohio election protection attorney Cliff Arnebeck gave notice that he intended to sue for the raw data, the California exit poll was canceled.

Into the breach jumped California activist/funder Lori Grace and her Institute for American Democracy and Election Integrity (www.trustvote.org), engaging professional pollsters to sample selected districts in Northern and Southern California.  The results will be forthcoming at TrustVote.org. http://trustvote.org/

Already the site reports:

In other eleven states besides California, there has been noted a significant difference between the Edison Research exit polls and the electronic vote totals presented on the morning after the primaries. These totals do not include anything from California. These differences show votes appear to be shifted from Bernie Sanders to Hillary Clinton. The chances of this kind of shift happening are considered to be statistically impossible between Tuesday night and Wednesday morning in these eleven states….

…In addition, some people may have concerns that [private election system or voting machine] companies like Scytl/SOE and ES&S which managed the votes in Kentucky, New York and Arizona, have directors who are also on the boards of other companies involved in wire-tapping, the defense industry and military interrogations.

A System Designed for Cheating

Corroborating the findings of the other Santa Monica presenters with his own recent experience, John Blakey of Audit Arizona reported that, in this very primary, in Maricopa County, domain of infamous Sherrif Joe Arpaio, 150,000 voters appear to have been ‘suppressed.’  Possibly that’s because 85% of Arizona voters use vote-by-mail ballots, which, extensive evidence shows, rarely get counted.

Blakey is suing the State of Arizona for access to records. “We have the right language for it now,” Blakey says, thanks to the work of the other panel members. “It’s not ‘voter fraud,’ it’s vote fraud.  It is a system designed for cheating.”

STD – Software Transmitted Disease

Well-known actor Mimi Kennedy is a fierce, long-term election protection activist in private life.  In this election she received poll worker training that has taken her into the heart of California’s election system.  She says her friend Bev Harris’ ‘fraction magic’ findings show how deeply what she calls “STD, Software Transmitted Disease” has infected our electoral system.  She explains, “There are seven thousand small voting jurisdictions all over America.  State law controls elections.  Seven thousand jurisdictions within and among those states can have some say in process, procedure, choice of private contractors, common servicer software and hardware.  Outside IT ‘experts’ are hired who may or may not be honest or bright. That means that fraud capacity is there.  People ask me ‘Who are the ‘them’ that may be stealing our votes?’  I tell them, ‘someone in any of those jurisdictions who can.’”

The Ohio Plan, ‘How to Nix the Fix’

Wasserman and Fitrakis admit that, “as we approach the 2016 election, the prospects for a truly democratic outcome are grim.”

However, lest we despair in the face of all these discouraging revelations, they insist that the fixes in our badly compromised electoral system CAN be nixed.

“The only cure,” they conclude, “is a bottom-up revolution in human consciousness and action.”  They hope their work “will help inform and motivate an energized grassroots uprising” based on what they call The Ohio Plan.

The Ohio Plan:

1.      Universal, automatic, same-day voter registration.

2.      A four-day national voting holiday.

3.      Votes counted by students & elders, paid the minimum wage.

4.      Universal use of hand-counted paper ballots.

5.      A universal automatic recount.

May it be so.

============

Mary Beth Brangan and James Heddle co-direct EON, The Ecological Options Network.  Since 2004, they have produced many video reports in cooperation with FreePress.org and the Columbus Institute for Contemporary Journalism which can be viewed on the EON’s YouTube channel Election Protection & Deep Democracy playlist  https://www.youtube.com/playlist?list=PLF06C90E53E4D6919  They are currently at work on a new documentary SHUTDOWN: The California-Fukushima Connection.  http://www.shutdowndoc.tv/   

America, the World’s Most Dangerous Dictatorship

american-imperialism-39-638

By Gordon Duff

Source: New Eastern Outlook

Though Russia doesn’t consider herself a superpower, other than the US, and just perhaps China, Russia is as close as we come. A very real problem is that Russia has a very poor understanding of America, how politics work, what Americans think and, more than anything else, Russia still thinks America is a democracy.

You see, at the same time America was tearing the Soviet Union apart, the same thing was being done to America. Neither nation survived, it wasn’t just the Soviet Union that fell to the New World Order, it was America as well. Let me explain as succinctly as possible.

During the Clinton years, powerful Nazi inspired elements in America plotted what has been the successful overthrow of America’s constitution. The movement was led by rogue “industrialist” John Mellon Scaife and lawyers Antonio Scalia and Newt Gingrich. Financing them all was the Rothschild owned and controlled Federal Reserve Corporation.

A secret society hidden in plain sight was set up called the Federalist Society. This Nazi controlled group, backed by the powerful Israel lobby, moved into every law school in America, recruiting top candidates based on skill sets needed.

This program was devised by the CIA and recruited thousands of budding sociopathic personality types, recruiting them into the Federalist Society and channeling them into top law firms or government agencies.

Adding to these recruits were senior lawyers with ties to organized and corporate crime, thousands of them in a major CIA operation.

There, they were pushed forward and after a decade ran the US Department of Justice, nearly every court in the nation, controlled the law schools, controlled the American Bar Association, the FBI and had put over 150 of their members into the Congress of the United States.

They also controlled every regulatory agency, environment, banking and finance, food and drug safety, you can see where this is going.

They also controlled 5 justices of the Supreme Court of the United States.

During the Clinton Administration, they managed to temporarily get control of the US House of Representatives through the help of the Contract with America and Newt Gingrich, financed by Zionist “black propaganda” moneyman Rupert Murdoch. In payment for this, “Newt” gave Murdoch an American broadcast network, Fox, though illegal. You see, non-Americans can’t control networks, or couldn’t. That’s ok, Gingrich eventually gave Murdoch illegal American citizenship as well.

Murdoch only had to publish Newt’s useless books and give his wife, and Newt traded them in with regularity, a highly paid “do nothing job” as a bribe.

Where things really paid off was 2000. During the Clinton administration, Scaife hired lawyer Ken Starr to investigate Clinton and get himself nominated as Special Prosecutor. Scaife paid Starr by naming him President of Pepperdine University, which Scaife controlled, for those who care about facts.

Clinton backer George Soros hired a former CIA agent named Steve Kangas to get dirt on Scaife. Kangas amassed enough evidence on Scaife and his deal with Starr to send them both to the electric chair. Scaife, Scalia and the Federalists had Kangas kidnapped and murdered in order to save Ken Starr who had been promised a seat on the US Supreme Court. Look into it.

The deal really came to life in 2000. The CIA and Diebold Corporation had contracted with a computer guru named Michael Connell who developed software that would simply flip votes done on electronic voting machines. Targeted would be the states of Ohio, Florida and Virginia only, piling up votes in key precincts just enough to guarantee control of the Electoral College.

Without this it is impossible for the Republican Party to get a president elected without staging an international incident such as the kidnapping of US diplomats in Tehran. We aren’t going to say the Ayatollah was an MI6 agent and was sent to Iran for exactly this purpose, even though it is true and we can prove it.

In 2000, even with millions of votes flipped, exit polls support Bush losing by 5 million votes, the election couldn’t be saved. Here, the Federalists stepped in and had their 5 Supreme Court justices step in and overthrow both the areas of equal protection and states’ rights of the US Constitution to place Bush in office.

2000 was important. This was a presidential election that also took place on a census year. You see, the census is a rationale for redistricting the US House of Representatives using State legislatures, which were largely taken over by the Federalist Society. Bribes and payoffs at state level are hard to control and organized crime easily got control of enough states to allow redistricting.

Here, the CIA developed a program for designing odd shaped congressional districts that would pile union workers and minorities into bizarre and often discontiguous shapes, taking districts away from democrats by joining them together and creating new republican only districts, often with almost no people living in them.

Additionally, problem representatives like Ohio’s Dennis Kucinich were eliminated entirely, their districts were simply erased, all of this, and it is called gerrymandering, is illegal.

By 2004 there were no more free elections for the House of Representatives, giving this house free rein to investigate anyone, any time and to quell any investigation as well, such as 9/11.

By 2005, by a 5/4 vote, the Supreme Court in the Citizens United case overturned for all time limitations on foreign and corporate spending on American elections, citing an end to democracy in America.

Mike Connell, GOP “guru” died in a mysterious plane crash in Ohio just before testifying about his role in CIA “vote flipping.”

This is as short and sweet as it could be put. For those who fail to understand the Federalist Society and the hold organized crime through the Republican Party has gained over American government, the new Cold War and the threat of a hot war as well is a total surprise.

For those who pay attention, we saw it coming all along.

BREAKING: Leaked FBI Alert Admits Hackers Penetrated US Election Systems

jf-7

By Matt Agorist

Source: The Free Thought Project

On Monday, an official FBI alert from August 18 was leaked to Yahoo News. The alert stated the FBI had uncovered evidence showing that at least two state election systems were penetrated by hackers in recent weeks. The FBI quickly issued warnings to election officials across the country to ramp up security on their systems.

It appears from the Flash Alert that the public was not supposed to know about it.

This FLASH has been released TLP: AMBER: The information in this product is only for members of their own organization and those with DIRECT NEED TO KNOW. This information is NOT to be forwarded on beyond NEED TO KNOW recipients.

The FBI then goes on to describe the nature of the attack and lists the IP addresses associated with the intrusion.

Summary

The FBI received information of an additional IP address, 5.149.249.172, which was detected in the July 2016 compromise of a state’s Board of Election Web site. Additionally, in August 2016 attempted intrusion activities into another state’s Board of Election system identified the IP address, 185.104.9.39 used in the aforementioned compromise.

Technical Details

The following information was released by the MS-ISAC on 1 August 2016, which was derived through the course of the investigation. In late June 2016, an unknown actor scanned a state’s Board of Election website for vulnerabilities using Acunetix, and after identifying a Structured Query Language (SQL) injection (SQLi) vulnerability, used SQLmap to target the state website. The majority of the data exfiltration occurred in mid-July. There were 7 suspicious IPs and penetration testing tools Acunetix, SQLMap, and DirBuster used by the actor, detailed in the indicators section below.

“This is a big deal,” said Rich Barger, chief intelligence officer for ThreatConnect, a cybersecurity firm, who reviewed the FBI alert at the request of Yahoo News. “Two state election boards have been popped, and data has been taken. This certainly should be concerning to the common American voter.”

According to the FBI, the hack is the work of a ‘foreign entity.’ However, they have not named the country of origin. This has not stopped other officials from quickly blaming the Russians.

Also absent from the alert are the names of the states involved in the hack.

According to the report from Yahoo News:

The bulletin does not identify the states in question, but sources familiar with the document say it refers to the targeting by suspected foreign hackers of voter registration databases in Arizona and Illinois. In the Illinois case, officials were forced to shut down the state’s voter registration system for ten days in late July, after the hackers managed to download personal data on up to 200,000 state voters, Ken Menzel, the general counsel of the Illinois Board of Elections, said in an interview. The Arizona attack was more limited, involving malicious software that was introduced into its voter registration system but no successful exfiltration of data, a state official said.

“The FBI is requesting that states contact their Board of Elections and determine if any similar activity to their logs, both inbound and outbound, has been detected,” the alert reads. “Attempts should not be made to touch or ping the IP addresses directly.”

While the alert lists the IP addresses from which the attacks originated, it is highly unlikely that the hackers would use any traceable address.

“This is a wake-up call for other states to look at their systems,” said Tom Hicks, chairman of the federal Election Assistance Commission.

This news comes on the heels of a report earlier this month in which a professor from Princeton University and a graduate student proved electronic voting machines in the U.S. remain astonishingly vulnerable to hackers — and they did it in under eight minutes.

Professor Andrew Appel, a Princeton University computer science professor who has studied election security, and grad student Alex Halderman took just seven minutes to break into the authentic Sequoia AVC Advantage electronic voting machine Appel purchased for $82 online — one of the oldest models, but still used in Louisiana, Pennsylvania, New Jersey, and Virginia.

Appel notes that the only “reasonably safe” voting method is paper ballots as they can be counted alongside the electronic tally. However, crucial swing states, as Appel notes, rely on more vulnerable paperless touchscreen voting which does not back up any of the numbers.

“Then whatever numbers the voting computer says at the close of the polls are completely under the control of the computer program in there,” Appel wrote in a recent blog post entitled “Security Against Election Hacking.” “If the computer is hacked, then the hacker gets to decide what numbers are reported. … All DRE (paperless touchscreen) voting computers are susceptible to this kind of hacking. This is our biggest problem.”

The fact that the FBI is now admitting to the vulnerability of the election should raise serious concern for Americans. Before 2016, talk of vote rigging, or hacking elections, remained on the fringe — in spite of whistleblowers showing the easily provable insecure nature of electronic voting machines.

As the famous quote, often attributed to Joseph Stalin, notes:

The people who cast the votes don’t decide an election, the people who count the votes do.

And now, with electronic voting and this news of how easily hackable it is, even the vote counters may not decide.

Placebo Ballots: Stealing California from Bernie Using an old GOP vote-snatching trick

Rall-VoteSpoilage-BBB-Palast

By Greg Palast with Dennis J Bernstein

Source: GregPalast.com

Woop!  Woop!  Alert!  Some California poll workers have been told to give “provisional” ballots to all independent voters in Tuesday’s Democratic Party.

That’s wrong.  That’s evil.  That’s sick and illegal.

Here’s the 411.  If you’re registered as an independent voter in California, you have the right to vote in the Democratic Presidential Primary.  Just ask for the ballot.

But look out!  Reports out of Orange County are that some poll workers have been told to give “No Party Preference” (NPP), that is, an independent voter, a PROVISIONAL ballot, as opposed to a regular ballot.

Do NOT accept a provisional ballot. As one poll worker told me, “They simply don’t get counted.”

Who would benefit from this switcheroo from legal ballot to “provisional” ballot?  It’s just a stone cold fact that independent voters favor Senator Bernie Sanders. Among voters who describe themselves as having “no party preference,” Sanders leads Sec. Hillary Clinton by a humongous 40 points—though Hillary is hugely ahead among registered Democrats.

So one way to steal the election is to make sure those independent voters’ ballots end up in the garbage, uncounted.

Two million “Placebo Ballots” not counted

And for our readers in the other 49 states:  you can bet that the GOP will be shunting voters to these placebo provisional ballots in November.  In the last presidential election, over two MILLION voters, overwhelmingly  voters of color, were shifted to these rarely-counted ballots.  Two million voters could have justwritten their votes on bubbles.  That’s how they steal elections.

No, I’m not promoting Bernie nor my uncle Ernie, nor anyone.  I’m promoting democracy.  Let’s make sure your vote counts.
What is a “Provisional” ballot?  “Provisional” ballots were created by George Bush and Karl Rove as part of the Help America Vote Act (HAVA) after they swiped Florida in 2000.

The original idea of provisional balloting was sound: The Congressional Black Caucus was very upset that African-Americans were not able to vote in 2000 in Florida because they were falsely removed from the voter roles for all kinds of cockamamie reasons. So the Black Caucus proposed that, if your name is not on the voter roles, you should still be able to vote provisionally. The state can then check the records and count your vote later.

The Black Caucus won the right to a provisional ballot, but didn’t win the right to have them counted. They rarely are.

Say you are tagged an “inactive” voter, you CANNOT get your provisional ballot counted even if you were wrongly listed as “inactive.”  You’ve been removed from the register.  So, it’s a Catch-22.  You get a provisional ballot because you were wrongly left off the voter roll, but it can’t be counted because, well, you’re not on the voter roll.

And that’s why I call provisional ballots “Placebo” ballots.   They let you feel like you voted, but you haven’t.  It’s ridiculously easy to challenge a provisional ballot – so in a tight race, it’s just tossed out.

California Reamin’
I am currently reporting from Southern California, and I got a tip from Ashley Beck, a poll worker in conservative Orange County . Listen to her story.  She was being trained with other poll workers, and they were given some very strange information.

“I was told that all NPP [independent] voters are to be given provisional ballots. I was bothered by that, because I was always told that NPP voters in California can vote for Democrats and their vote would be counted.  I was a little worried that he was telling all 18 of us poll workers to give all NPP voters provisional ballots. We all know what happens most of the time with provisional ballots. They are not being counted.”

Provisionally Black

Who gets these placebo ballots?

I was on a book tour in Palm Springs—with an audience of about 200. I asked, “Has anyone here ever gotten a provisional ballot?” The only two Black people in the room both raised their hands, and that was it.

Black people know what provisional ballots are, and they probably know that if they fill one out, the chance of it getting counted is slim.

With the attempt to steal votes by giving independent voters provisional ballots; a lot of white people are being treated as if they turned Black. So to Bernie voters experiencing vote suppression for the first, welcome to the United States of Apartheid voting.

 

Related Podcast:

Greg Palast on the Rob Kall Bottom Up Radio Show

Hillary Clinton is an Astrological Plague (Gonzo & Conjure ’16)

wr

By Dr. Bones

Source: Disinfo.com

“He talked about luck and fate and numbers coming up, yet he never ventured a nickel at the casinos because he knew the house had all the percentages. And beneath his pessimism, his bleak conviction that all the machinery was rigged against him, at the bottom of his soul was a faith that he was going to outwit it, that by carefully watching the signs he was going to know when to dodge and be spared. It was fatalism with a loophole, and all you had to do to make it work was never miss a sign. Survival by coordination, as it were. The race is not to the swift, nor the battle to the strong, but to those who can see it coming and jump aside. Like a frog evading a shillelagh in a midnight marsh.”- Hunter S. Thompson


There are times when the entire cosmos turns against humanity for whatever reason. Perhaps the gods are fickle or better yet intent on keeping humanity’s collective nose in the dirt. The cosmic explosion of Mars, Mercury, and Pluto joining Saturn and Jupiter in a massive retrograde has devastated nearly everyone I know. People have been murdered, jobs lost, houses caught fire, infectious diseases caught, and my own car took a shit and died an hour outside of where I live.

And Hillary fucking Clinton, the horse-thief and reptilian creature from the swamps of D.C., seems to be soaking in the malignant energy and using it to power her own nefarious schemes.

I had missed a week of reporting, the widespread panic and disasters leading to an uptick in people seeking answers and magical aid. Between peering into the realm of probability and haggling with spirits I had very little time for the National Cataclysm Affairs desk here at Disinfo. I hadn’t just been working but studying, picking up a copy of Hadean Press’ Conjure Codex, a fascinating little journal blending old school grimoires and demonology with New World traditions like my beloved Hoodoo as well as Quimbunda, Vodoun, and many others. Ole’ Bones was adding new techniques and allies to his repertoire(check my facebook for more on that).

I was studying a stolen borrowed copy of Jake Stratton-Kent’s superb edition of The True Grimoire, contemplating how the demon Surgat might help in road opening work when the editors at Disinfo called me.

“Yes?”

“Hey, Bones! It’s XXXXXXXX over at Disinfo. What are you up to?”

“Me?” I peered over to the altar, a jar of graveyard dirt along with 13 different roots and herbs empowering the spirit of a dead soldier I needed for a case. “N-nothing in particular. Just uh….the usual.

Why are you calling me? Are you going to start paying me?”

“Uh….” The man on the line coughed, trying to distract from the question, “….hey, uh, noticed you haven’t posted in awhile. Everything alright?”

“Alright? No, everything is not alright. Between my car fucking blowing up and Mars deciding to take a fucking piss on humanity I would say it’s safe to assume nothing is alright. I’m knee deep in case work here, you know: clients, i.e. people that give me money for my services. D-do you know how much shit I need to get done before the moon starts to wane, let alone before the mansions of Al-Jubana and Iklil Al-Jabhah pass?”

“I uh…”

“Jesus CHRIST, your just walking around in all this aren’t you? Don’t you understand the very HEAVENS are against us?!? You’re letting your KIDS go UNPROTECTED through all this madness??? Y-y-y-you want them to be eaten alive by a pack of wild dingoes, or maybe even shot dead by some shitty cop with a chip on his-”

“BONES!” His shout came tinged with fear. When the wizards of the world start to board up their windows for a storm you can’t see the wise are quick to follow. “Look man, just…just email me whatever you think I should do. But I need another piece.”

Truth be told I had one bumping around in my head, for just as surely as the fortunes of my clients faded as Mars dropped ever out of sight, so too the American “people” seemed doomed in the truest, most poetic sense of the word.

Hillary is that doom.

It’s should come as no surprise that American elections are rigged. Everybody who isn’t completely braindead (so of course we’re speaking about a minority here) gets that uneasy feeling in the stomach about electoral politics. Like someone trying to sell you a car radio in front of a liquor store it seems shady as all hell.

That’s because it is.

First let’s recall that while you may be free to vote in whoever the hell you want, the actual lawmaking part is out of the hands of both you and your “representative.” Take for example ALEC, the massive corporate lobbying machine, merely one stinky carp in the cesspool that is American politics. They simply offer “ideas” on bills to be submitted to congress that heavily favor corporate interests and they pay their lapdogs well. Most may be voted down, but consider that while a success rate of 9% may not seem like alot, less than 2% of introduced bills passed the 112th session of the U.S. Congress. That means that bills based on ALEC policies have a survival rate nearly 5 times that of the average bill in Congress.

Or, to put it in the vernacular “shit walks, money talks.”

Corrupt is one thing. Hell, even the Vatican Bank launders drug money. Corrupt is no surprise. Even stolen elections are no surprise, but at least they never did it in plain sight.

This Hillary thing is a new beast entirely. Let’s recall that this thing all started less like a campaign and more like a mafia.

“In August 2015, at the Democratic Party convention in Minneapolis, 33 democratic state parties made deals with the Hillary Clinton campaign and a joint fundraising entity called The Hillary Victory Fund. The deal allowed many of her core billionaire and inner circle individual donors to run the maximum amounts of money allowed through those state parties to the Hillary Victory Fund in New York and the DNC in Washington.

The idea was to increase how much one could personally donate to Hillary by taking advantage of the Supreme Court ruling 2014, McCutcheon v FEC, that knocked down a cap on aggregate limits as to how much a donor could give to a federal campaign in a year. It thus eliminated the ceiling on amounts spent by a single donor to a presidential candidate.

In other words, a single donor, by giving $10,000 a year to each signatory state could legally give an extra $330,000 a year for two years to the Hillary Victory Fund.  For each donor, this raised their individual legal cap on the Presidential campaign to $660,000 if given in both 2015 and 2016. And to one million, three hundred and 20 thousand dollars if an equal amount were also donated in their spouse’s name.

From these large amounts of money being transferred from state coffers to the Hillary Victory Fund in Washington, the Clinton campaign got the first $2,700, the DNC was to get the next $33,400, and the remainder was to be split among the 33 signatory states. With this scheme, the Hillary Victory Fund raised over $26 million for the Clinton Campaign by the end of 2015.”

The classic you-scratch-my-back-and-I-scratch-your’s.

And scratch they have.

In Iowa:

“It’s been reported that Hillary Clinton instructed her staff in Iowa to rig the caucus voting by falsely standing in the O’Malley corner of the room when the final precinct hand counts are tallied…

Mega-giant corporation Microsoft founder Bill Gates is now in charge of counting both the Democratic and Republican votes in this year’s state primary elections…the fact is the Gates Foundation along with Microsoft employees have literally donated millions of dollars to Hillary and the Clinton Foundation…

Both CNN and The Blaze reported that the final tally was missing votes from 90 Iowa precincts

C-SPAN actually captured on video at the Polk County precinct the caucus chair and the Clinton precinct captain not even bothering to conduct a final count of the caucus voters and then the Clinton precinct captain caught lying to the Sanders precinct captain…

This week in Iowa is that the results were determined by six coin tosses in a row all favoring Hillary to ultimately decide the winner. After six county precincts ended up in dead ties between Clinton and Sanders, by state protocol those six precincts did a coin toss to determine the winner and in all six counties we’re supposed to actually believe that Hillary’s tails won. Though Clinton’s known for telling fish tales, it shouldn’t have overturned the virtually impossible statistical odds of just 1.56%.”

In Arizona:

“The Arizona Democratic Party has officially announced that it will be investigating multiple accusations of election fraud across the state’s Democratic primary vote Tuesday, where voters who claimed to have previously registered as Democrats say their party affiliation was unknowingly changed to independent– and therefore, they weren’t allowed to cast ballots in the closed primary.”

In Nevada:

“The Nevada Democratic Convention…began with a highly debated decision to change the Convention rules despite not getting the needed majority of vocal votes. But at the end of the night, when a motion was made to recount the delegates, the chair of the Convention closed out the meeting without even giving the delegates’ a chance to say “nay”…The Convention is not reconvening tomorrow, it was announced. Instead, protesters will have to pursue legal avenues.”

In New York:

Multiple investigations were launched and a top election official was suspended this week after tens of thousands of registered voters were found to be missing from the rolls during Tuesday’s Democratic primary in New York….Entire blocks and buildings of voters in some districts were purged from the voter rolls, de Blasio said.

In Kentucky:

WKYT, a local news station in Kentucky, was told by the Pike County Clerk’s office that there were issues with one of their card readers, which caused a delay in the numbers. AP then erased the votes, pushing Hillary to the lead by over 4,000 votes….It was later reported that 31 counties in Kentucky reported election fraud on Tuesday.

Oregon alone seems untouched, mainly due to the automatic registration of all it’s citizens to vote, but that doesn’t stop the corporate owned media from howling about how “vulnerable” THAT system is; it’s quite telling that the one state possibly impervious to the Hillary Mafia is the only one they seem so concerned about, everybody else simply getting a shrug of the shoulders and almost no airtime.

The sheer audacity, the open contempt for the electoral system so plain for all to see not only hints that Hillary has been chosen as the next heir to the Imperium but that the Powers That Be couldn’t even bother to hide it from you.

That’s how little power you have, that’s how much “democracy” exists in the United States: Uncle Sam is literally ignoring your pleas and if he does hear you he spits in your face and simply says “what the fuck you going to do about it?”

All this during the election! She doesn’t even wear the drone-encrusted crown yet! What kind of madness might we expect when she sits upon the Throne of Skulls?

Ask our friends in Haiti.

“In June 2009, the Haitian Parliament unanimously passed a law requiring that the minimum wage be raised to $0.61 an hour, or $5 a day. (The average cost of living is estimated to be the equivalent of about $23 a day.) This pay raise was staunchly opposed by foreign manufacturers who had set up shop in the country, and the United States Department of State and the U.S. Agency for International Development backed those manufacturers. After Haiti’s government mandated the raise, the United States aggressively (and successfully) pushed Haiti’s president to lower the minimum wage for garment workers to what factory owners were willing to pay: the equivalent of about $0.31 an hour (or $2.50 per eight-hour day).

In 2011, WikiLeaks released a set of previously-secret diplomatic cables. The American publication The Nation partnered with Haitian news organization Haïti Liberté to cover them, finding (among other things) how strongly the United States had opposed the minimum wage hike”

Haiti, a nation that has been harassed and abused by the criminal Imperium of the United States since day-fucking-1, has become the playground for wealthy capitalists looking for a captive population to exploit. And the one leading the way for all the plunder is none other than the Clinton Foundation.

“Less than 1% of this amount(the $10 billion in aid) made it to the Haitian government. Bill Clinton had total control of the balance,” Dantò claimed.

She added, “Hillary and Bill Clinton ‘opened Haiti’ as their private asset to liquidate. They used the resources of the World Bank, the State Department, USAID, the UN, the private military security contractors, the US military, and the Fed’s passport and visa issuance capabilities. They got kickbacks called ‘donations’ from anyone who wished to buy from them a piece of Haiti lands, oil, iridium, uranium or gold. The Clintons have used governmental power to conduct their private business and called it ‘helping poor Haitians.’”

How much of a scum-sucking, evil, predatory reptile do you have to be to profit off of the earthquake that devastated Haiti? The Clinton Foundation not only sent toxic trailers to the homeless but mysteriously “misplaced” millions in aid and awarded building contracts to mostly non-Haitian companies.

It’s fucking Batista’s Cuba all over again, expect this time we made sure to import an Imperium-style police state, regardless if it was “needed:”

“The U.S. moved aggressively to beef up the Haitian police (PNH), giving police chief Mario Andrésol“command and control advice and mentoring” from Drug Enforcement Agency (DEA) and FBI agents while trying to ensure that Haitian police officers were paid and well-equipped. The DEA advisor was Darrel Paskett, whose first post-quake priority was directing his “well-armed” bulletproof-vested DEA agents to guard the U.S. Embassy from “huge crowds” of desperate Haitians that might overrun it, FOX News reported. The crowds never materialized.”

Taken all together what does Hillary mean for the American electorate?

It means that the gods themselves have conspired against us, that the United States has finally taken it’s dark turn from Empire to barbaric Thralldom; it means an openly criminal “government” that exists on a network of dirty money, whispered memos, secret handshakes, and backroom deals; it means human beings demoted to mere walking sources of profit, expendable livestock for Capitalists to fund million-dollar vacations and mansions in countries where the common folk eat on less than a dollar a day.

Hillary IS the wrath of heaven, a plague upon a nation of sinners that made it possible for such an invertebrate to even come into being; the Kingdom of Mole Rats has birthed a bloodthirsty creature hellbent on devouring as many souls as possible while she reshapes the face of the planet for her Neo-Liberal masters.

Buckle in comrades: a darkness not thus seen is slowly spreading across the savannah, propelled onwards by international finance and warmongers hungry for profit. The stars have aligned against the free-spirits; I write this from a Florida ER room, my wife having slipped into toxic shock mid-article. Like I said: bad shit is happening everywhere. Hillary is just a symptom. The stars and unseen hands toy with humanity and invisible currents shift the tides of the luck plane.

In this age of scavengers the jackals seek to capture the rotting throne for no other reason than to keep the tides of blood flowing, vampires seeking to drain us down to the very last drop. The stars smile upon the senseless bloodletting and those that would bring us holocaust are going to get what they can while the getting is good.

But, as we know, their best efforts are all for naught. Mars will return to it’s proper place, and the forces of death will in turn be feasted upon. The stars are never set, and even the moon must change in her courses; nothing can withstand the forces of entropy, even entropy itself. After the offending appendix is torn out of my wife her body will heal; just as the “body politic” is eaten and polluted by Hillary and her reptiles so too shall the time come when even her tyrannical efforts shall fail and she in turn is feasted on. This we have foreseen. Welcome to the motherfucking jungle that is modern living.

Hillary’s desperation only hints that things are far worse off then we can even imagine, and her crimes, though blatant, can only slow the inevitable. We Hyenas shall wait with bared fangs for the inevitable collapse.

The stars may not be right today, but they drift ever further in our favor.