In the midst of journalism’s “Sunshine Week” – during which the Associated Press and other news organizations are valiantly proclaiming the public’s “right to know” – AP insists on conducting its own activities in the dark, and refuses to answer even the simplest questions about its system of international news reporting.
Most of all, it refuses to explain why it erased footage of an Israeli soldier intentionally shooting a Palestinian boy.
AP, according to its website, is the world’s oldest and largest news organization. It is the behemoth of news reporting, providing what its editors determine is the news to a billion people each day. Through its feeds to thousands of newspapers, radio and television stations, AP is a major determinant in what Americans read, hear and see – and what they don’t.
What they don’t is profoundly important. I investigated one such omission when I was in the Palestinian Territories last year working on a documentary with my colleague (and daughter), who was filming our interviews.
On Oct. 17, 2004 Israeli military forces invaded Balata, a dense, poverty-stricken community deep in Palestine’s West Bank (Israel frequently invades this area and others). According to witnesses, the vehicles stayed for about twenty minutes, the military asserting its power over the Palestinian population. The witnesses state that there was no Palestinian resistance – no “clash,” no “crossfire.” At one point, after most of the vehicles had finally driven away, an Israeli soldier stuck his gun out of his armored vehicle, aimed at a pre-pubescent boy nearby, and pulled the trigger.
We went to the hospital and interviewed the boy, Ahmad, his doctors, family, and others. Ahmad had bandages around his lower abdomen, where surgeons had operated on his bladder. He said he was afraid of Israeli soldiers, and pulled up his pants leg to show where he had been shot previously.
In the hospital there was a second boy, this one with a shattered femur; and a third boy, this one in critical condition with a bullet hole in his lung. A fourth boy, not a patient, was visiting a friend. He showed us a scarred lip and missing teeth from when Israeli soldiers had shot him in the mouth.
This was not an unusual situation. When I had visited Palestinian hospitals on a previous trip, I had seen many such victims; some with worse injuries. Yet, very few Americans know this is going on. AP’s actions in regard to Ahmad’s shooting may explain why.
We discovered that an AP cameraman had filmed the entire incident. This cameraman had then followed what apparently is the usual routine. He sent his video – an extremely valuable commodity, since it contained documentary evidence of a war crime – to the AP control bureau for the region. This bureau is in Israel.
What happened next is unfathomable. Did AP broadcast it? No. Did AP place the video in safe-keeping, available for an investigation of this crime? No.
According to its cameraman, AP erased it.
We were astounded. We traveled to AP’s control bureau in Israel. With our own video camera out and running, we asked bureau chief Steve Gutkin about this incident. Was the information we had been told correct, or did he have a different version? Did the bureau have the video, or had they indeed erased it. If so, why?
Gutkin, repeatedly looking at the camera and visibly flustered, told us that AP did not allow its journalists to give interviews. He told us that all questions must go to Corporate Communications, located in New York. He explained that they were on deadline and couldn’t talk. I said I understood deadline pressure, and sat down to wait until they were done. When he called Israeli police to arrest us, we left.
Back in the US later, I phoned Corporate Communications and reached Director of Media Relations Jack Stokes, AP’s public relations spokesman. I had conversed with Stokes before.
Over the past several years I have noticed disturbing flaws in AP coverage of Israel-Palestine: newsworthy stories not being covered, reports sent to international newspapers but not to American ones, stories omitting or misreporting significant facts, critical sentences being removed from updated reports.
I would phone AP with the appropriate correction or news alert. One time this resulted in a flawed news story being slightly corrected in updates. In a few cases stories were then covered that had been neglected. In many cases, however, I was told that I needed to speak to Corporate Communications. I would phone Corporate Communications, leave a message, and wait for a response. Most often, none came.
Several times, however, I was able to have long conversations with AP spokesman Stokes. None of these conversations, however, ever ended with AP taking any action. Some typical responses:
The omitted story was “not newsworthy.”
The story deemed by AP editors to be newsworthy to the rest of the world – e.g. Israel’s brutal imprisonment of over 300 Palestinian youths – was not newsworthy in the US (Israel’s major ally).
Burying a report of Israeli forces shooting a four-year-old Palestinian girl in the mouth was justified.
Misreporting an incident in which an Israeli officer riddled a 13-year-old girl at close range with bullets was unimportant.
Despite this unresponsive pattern, when I learned firsthand of an AP bureau erasing footage of an atrocity, I again phoned Corporate Communications. I no longer had much expectation that AP would take any corrective action, but I did expect to receive some information. I gave spokesperson Stokes the numerous details about this incident that we had gathered on the scene and asked him the same questions I had asked Gutkin. He said he would look into this and get back to me.
After several days he had not gotten back to me, so I again phoned him. He said that he had looked into this incident, and that AP had determined that this was “an internal matter” and that they would give no response.
Footage of this boy being intentionally shot by an Israeli soldier was erased by the Associated Press. Photo: Reuters
While I should have known better, I was again astounded. AP was blatantly violating fundamental journalistic norms of ethical behavior, and clearly felt it had the power to get away with it.
Journalism, according to the Statement of Principles of the American Society of Newspaper Editors, is a “sacred trust.” It is the bulwark of a free society and is so essential to the functioning of a democracy that our forefathers affirmed its primacy in the very first amendment of the Bill of Rights.
According to the Society of Professional Journalists, one of the four major pillars of journalistic ethics is to “Be Accountable.” According to the SPJ’s Code of Ethics:
“Journalists are accountable to their readers, listeners, viewers and each other.
“Journalists should:
Clarify and explain news coverage and invite dialogue with the public over journalistic conduct.
Encourage the public to voice grievances against the news media.
Admit mistakes and correct them promptly.
Expose unethical practices of journalists and the news media.
Abide by the same high standards to which they hold others.”
Finally, this week, on deadline with a chapter about media coverage of Israel-Palestine, I again tried to confirm some of my facts with AP. Certainly, I felt, during “Sunshine Week” AP would respond. As part of the Sunshine campaign, AP’s CEO and President Tom Curley is traveling the country giving speeches on the necessity of transparency and accountability (for government) and emphasizing “the openness that effective democracy requires.”
“The trend toward secrecy,” AP’s President has correctly been pointing out, “is the greatest threat to democracy.”
I emailed my questions to AP, talked to Stokes by phone, and again was told he would get back to me. Again, I got back to him. Then, in a surreal exchange, he conveyed AP’s reply: “The official response is we decline to respond.” As I asked question after question, many as simple as a confirmation of the number of bureaus AP has in Israel-Palestine, the response was silence or a repetition of: “The official response is we decline to respond.”
The next day I tried phoning AP’s President Curley directly. I was unable to reach him, since he was on the road giving his Sunshine Week speeches (“Secrecy,” Curley says, “is for losers”), but I left a message for him with an assistant. She said someone would respond.
I am still waiting.
It is clearly time to go to AP’s superiors. The fact is, AP is a cooperative. It is not owned by Corporate Communications spokespeople or by its CEO or even by its board of directors. It is owned by the thousands of newspapers and broadcast stations around the United States that use AP reports. These newspapers, radio and television stations are the true directors of AP, and bear the responsibility for its coverage.
In the end, it appears, the only way that Americans will receive full, unbiased reporting from AP on Israel-Palestine will be when these member-owners demand such coverage from their employees in the Middle East and in New York. As long as AP’s owners remain too busy or too negligent to ensure the quality and accuracy of their Israel-Palestine coverage, the handful of people within AP who are distorting its news reporting on this tragic, life-and-death, globally destabilizing issue will quite likely continue to do so.
In the final analysis, therefore, it is up to us – members of the public – to step in. Everyone who believes that Americans have the right and the need to receive full, undistorted information on all issues, including Israel-Palestine, must take action. We must require our news media to fulfill their profoundly important obligation, and we must ourselves distribute the critical information our media are leaving out.
Cambodians are responding with outrage to the U.S. government’s demand that the country repay a nearly 50-year-old loan to Cambodia’s brutal Lon Nol government, which came to power through a U.S.-backed coup and spent much of its foreign funds purchasing arms to kill its own citizens, according to Cambodia’s current prime minister Hun Sen.
While the U.S. was backing the Lon Nol government, it was also strafing the Cambodian countryside with bombs—a carpet-bombing campaign that would eventually see over 500,000 tons of explosives dropped on the small Asian country, killing hundreds of thousands of civilians and leaving a legacy of unexploded ordnance.
“[The U.S.] dropped bombs on our heads and then they ask us to repay. When we do not repay, they tell the IMF [International Monetary Fund] not to lend us money,” Hun Sen said at an Asia-Pacific regional conference earlier this month.
“At the same time the U.S. was giving weapons to Lon Nol, it was bombing the Cambodian countryside into oblivion and creating millions of refugees fleeing into Phnom Penh and destroying all political fabric and civil life in the country,” former Australian ambassador to Cambodia Tony Kevin told Australia’s ABC.
“And all of this was simply to stop the supplies coming down to South Vietnam, as it was then, from the north,” Kevin added. “So the United States created a desert in Cambodia in those years, and Americans know this.”
Hun Sen has argued that the U.S. has no right to demand repayment of its “blood-stained” funds.
“Cambodia does not owe even a brass farthing to the U.S. for help in destroying its people, its wild animals, its rice fields, and forest cover,” wrote former Reuters correspondent James Pringle for The Cambodia Daily.
In fact, during his tenure as prime minister Hun Sen has asked the U.S. to drop the “dirty debt” several times, but American leaders have refused.
“[The] U.S. would not drop it. It would have been so easy to forgive the repayment, it would have been easy to refinance it for education like they did in Vietnam,” the reporter Elizabeth Becker, who covered the Cambodian genocide in the 1970s, toldAl Jazeera.
“The U.S. intervention in Cambodia was easily the most controversial that we had in that era,” Becker said. “[The U.S.] dragged Cambodia into the Vietnam War for hopes that by expanding it they could win, the complications now are that even 50 years later, the Khmer Rouge legacy is horrible.”
“The U.S. owes Cambodia much more in war debts that can be repaid in cash,” Becker argued to The Cambodia Daily.
It is the leakiest of times in the Executive Branch. Last week, Wikileaks published a massive and, by all accounts genuine, trove of documents revealing that the CIA has been stockpiling, and lost control of, hacking tools it uses against targets. Particularly noteworthy were the revelations that the CIA developed a tool to hack Samsung TVs and turn them into recording devices and that the CIA worked to infiltrate both Apple and Google smart phone operating systems since it could not break encryption. No one in government has challenged the authenticity of the documents disclosed.
We do not know the identity of the source or sources, nor can we be 100% certain of his or her motivations. Wikileaks writes that the source sent a statement that policy questions “urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency” and that the source “wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyber-weapons.”
The FBI has already begun hunting down the source as part of a criminal leak investigation. Historically, the criminal justice system has been a particularly inept judge of who is a whistleblower. Moreover, it has allowed the use of the pernicious Espionage Act—an arcane law meant to go after spies—to go after whistleblowers who reveal information the public interest. My client, former NSA senior official Thomas Drake, was prosecuted under the Espionage Act, only to later be widely recognized as a whistleblower. There is no public interest defense to Espionage Act charges, and courts have ruled that a whistleblower’s motive, however salutary, is irrelevant to determining guilt.
The Intelligence Community is an equally bad judge of who is a whistleblower, and has a vested interest in giving no positive reinforcement to those who air its dirty laundry. The Intelligence Community reflexively claims that anyone who makes public secret information is not a whistleblower. Former NSA and CIA Director General Michael V. Hayden speculated that the recent leaks are to be blamed on young millennials harboring some disrespect for the venerable intelligence agencies responsible for mass surveillance and torture. Not only is his speculation speculative, but it’s proven wrong by the fact that whistleblowers who go to the press span the generational spectrum from Pentagon Papers whistleblower Daniel Ellsberg to mid-career and senior level public servants like CIA torture whistleblower John Kiriakou and NSA whistleblower Thomas Drake to early-career millennials like Army whistleblower Chelsea Manning and NSA whistleblower Edward Snowden. The lawbreaker does not get to decide who is a whistleblower.
Not all leaks of information are whistleblowing, and the word “whistleblower” is a loaded term, so whether or not the Vault 7 source conceives of him or herself as a whistleblower is not a particularly pertinent inquiry. The label “whistleblower” does not convey some mythical power or goodness, or some “moral narcissism,” a term used to describe me when I blew the whistle. Rather, whether an action is whistleblowing depends on whether or not the information disclosed is in the public interest and reveals fraud, waste, abuse, illegality or dangers to public health and safety. Even if some of the information revealed does not qualify, it should be remembered that whistleblowers are often faulted with being over- or under-inclusive with their disclosures. Again, it is the quality of the information, not the quantity, nor the character of the source.
Already, the information in the Vault 7 documents revealed that the Intelligence Community has misled the American people. In the wake of Snowden’s revelations, the Intelligence Community committed to avoid the stockpiling of technological vulnerabilities, publicly claiming that its bias was toward “disclosing them” so as to better protect everyone’s privacy. However, the Vault 7 documents reveal just the opposite: not only has the CIA been stockpiling exploits, it has been aggressively working to undermine our Internet security. Even assuming the CIA is using its hacking tools against the right targets, a pause-worthy presumption given the agency’s checkered history, the CIA has empowered the rest of the hacker world and foreign adversaries by hoarding vulnerabilities, and thereby undermined the privacy rights of all Americans and millions of innocent people around the world. Democracy depends on an informed citizenry, and journalistic sources—whether they call themselves whistleblowers or not—are a critical component when the government uses national security as justification to keep so much of its activities hidden from public view.
As we learn more about the Vault 7 source and the disclosures, our focus should be on the substance of the disclosures. Historically, the government’s reflexive instinct is to shoot the messenger, pathologize the whistleblower, and drill down on his or her motives, while the transparency community holds its breath that he or she will turn out to be pure as the driven snow. But that’s all deflection from plumbing the much more difficult questions, which are: Should the CIA be allowed to conduct these activities, and should it be doing so in secret without any public oversight?
These are questions we would not even be asking without the Vault 7 source.
Jesselyn Radack is a national security and human rights attorney who heads the “Whistleblower & Source Protection” project at ExposeFacts. Twitter: @jesselynradack
A few months back, Europhysics News, the science journal that published the new study “On the Physics of High Rise Building Collapse”, by Jones et al (republished here on OffG), published an interesting range of follow up letters to the editor. Less widely publicised has been an announcement in the same edition from its editors that reads like a declaration of political censorship.
The small collection of “letters to the editor” published in a recent edition of Europhysics Newsas a follow-up to the Jones et al paper “On the Physics of High Rise Building Collapse” is revelatory on several levels. Not only for the range of views expressed, but also, and perhaps most significantly, as a statement on the level of censorship and self-censorhip currently deemed acceptable in academia.
The letter that received most attention in the alt media is from a “member of the NIST technical staff during the period 1997 – 2011,” and alleging “the more I investigated, the more apparent it became that NIST had reached a predetermined conclusion by ignoring, dismissing, and denying the evidence.” He calls on NIST to “openly share all evidence, data, models, computations, and other relevant information unless specific and compelling reasons are otherwise provided.” Which seems an eminently rational and reasonable demand.
Thoughts from a former NIST employee
I was a member of the NIST technical staff during the period 1997- 2011. I initially joined the High Performance Systems and Services Division and later became a member of what was, at the time, the Mathematical and Computational Sciences Division of the Information Technology Laboratory. My fellow NIST employees were among the finest and most intelligent people with whom I have ever worked.
I did not contribute to the NIST WTC investigation or reports. But in August of this year, I began to read some of those reports. As I then watched several documentaries challenging the findings of the NIST investigation, I quickly became furious. First, I was furious with myself. How could I have worked at NIST all those years and not have noticed this before? Second, I was furious with NIST. The NIST I knew was intellectually open, non-defensive, and willing to consider competing explanations.
The more I investigated, the more apparent it became that NIST had reached a predetermined conclusion by ignoring, dismissing, and denying the evidence. Among the most egregious examples is the explanation for the collapse of WTC 7 as an elaborate sequence of unlikely events culminating in the almost symmetrical total collapse of a steel-frame building into its own footprint at free-fall acceleration.
I could list all the reasons why the NIST WTC reports don’t add up, but others have already done so in extensive detail and there is little that I could add. What I can do, however, is share some thoughts based on common sense and experience from my fourteen years at NIST.
First, if NIST truly believes in the veracity of its WTC investigation, then it should openly share all evidence, data, models, computations, and other relevant information unless specific and compelling reasons are otherwise provided. For example, would the release of all files and calculations associated with the ANSYS collapse initiation mod- el jeopardize public safety to an extent that outweighs the competing need for accountability?
Second, in its reports, NIST makes a great show of details leading to collapse initiation and then stops short just when it becomes interesting. The remainder of the explanation is a perfunctory statement that total collapse is inevitable and obvious. It is easy to see through this tactic as avoid- ance of inconvenient evidence. In response to any challenges, NIST has provided curt explanations from its Public Affairs Office. There were many contributors to the NIST WTC investigation: Why not let them openly answer questions in their own voice with the depth of knowledge and level of detail that follows from the nuts and bolts of their research?
Lastly, awareness is growing of the disconnect between the NIST WTC reports and logical reasoning. The level of interest in “15 years later” is a good example. Due to the nature of communication in today’s world, that awareness may increase approximately exponentially. Why not NIST blow the whistle on itself now while there is still time?
Truth is where our healing lies.
Peter Michael Ketcham, USA
The 9/11 Truth community has, understandably, promoted the above letter as evidence for the crumbling of NIST’s official position on 9/11. But we think the following announcement is in many ways the most relevant to our current time. In the era of “propornot”, campus censorship and the promotion of “anti-free-speech” as the new badge of the Left, below is the official statement by the editors of Europhysics News itself (our emphasis):
The editors respond
It is the policy of EPN to publish by invitation. Prospective authors are suggested by members of our Editorial Advisory Board, who cover various disciplines and come from different countries.
This particular Feature article ‘On the physics of High Rise Building Collapses’, followed the same route. We expected this topic to be of wide interest to our readers and thus invited the suggested authors to submit their manuscript. EPN does not have a formal review/rejection policy for invited contributions.
In the present case we realized that the final manuscript contained some speculations and had a rather controversial conclusion. Therefore a ‘Note from the editors’ was added, stressing that the content is the sole responsibility of the authors and does not represent an official position of EPN.
Since some controversy remains, even among more competent people in the field, we considered that the correct scientific way to settle this debate was to publish the manuscript and possibly trigger an open discussion leading to an undisputable truth based on solid arguments. Therefore we asked NIST, as principal investigator of the WTC collapse, to send us a reaction to the article. Their response can be found elsewhere on these pages.
It is shocking that the published article is being used to support conspiracy theories related to the attacks on the WTC buildings. The Editors of EPN do not endorse or support these views.
In future, prospective authors will be asked to provide an abstract of the proposed article, as well as an indication of other related publications to allow the editors to better assess the content of the invited articles.
It’s hard to read this as anything but a wholesale rejection of its own decision to publish this “controversial” paper, and an announcement that all future papers will be vetted for political content as well as scientific validity, and that certain authors and/or dissenting opinions will be suppressed. Whatever your opinions on 9/11, and however you view the Jones et al paper, this must disturb you.
We did email Europhysics News to ask them for some clarification. We’ll let our readers know when/if they respond.
In the past year the Guardian has been overtly promoting internet censorship. A while back they uncritically coordinated with Yvette Cooper’s insinuating “take back the internet” programme to make sure we all get “the web we they want”. Last week they uncritically published an opinion piece from Tim Berners-Lee, where he claims we should:
… push back against misinformation by encouraging gatekeepers such as Google and Facebook to continue their efforts to combat the problem…
While, of course….
… avoiding the creation of any central bodies to decide what is “true” or not.
Hmm… tough thing to achieve you may think. Which is possibly why Tim doesn’t bother to tell us how he thinks it should be done. In fact we can be pretty sure, being a bit of a genius allegedly, Tim knows pretty well that Governments and corporations are so irreversibly intertwined, their policies and goals so similar, that by instructing Facebook to “take measures” you are, in effect, privatising Orwell’s Minitrue, and creating precisely the “central bod[y] to decide what is true or not” that he affects to fear.
We can also be pretty sure that if/when Facebook/Twitter and the rest announce the creation of some new “special department” for further “fact-checking”, people at the Guardian will write editorials congratulating them on saving the internet.
That brings us to today. Today the Guardian are – again uncritically – reprinting censorship advocacy, this time by their very close associates GCHQ. This article quotes Paul Chichester, the head of GCHQ’s new National Cyber Security Centre, who says that Facebook and Twitter have a
“social responsibility” to do more to “limit the spread of fake news” and control the flow of “misinformation”.
There is not a single word of analysis, doubt or even equivocation in the article. The headline reads [my emphasis]:
And that’s all the story is, a stenographic report of what Chichester said. Not a single question is asked about the implications of what said, or indeed why he might be saying it. It is a press release. It tells us what the people in power think and, worse than agreeing, simply refuses to acknowledge that disagreeing is even a possibility.
The “journalist” (Josh Halliday) who put this piece together doesn’t acknowledge that state agencies would have an obvious vested interest in controlling what the citizenry reads online, or that mega-corporations such as Facebook or Google could abuse this “plea” to take advantage of their users. He’s content to just reprint the head of the spy agency’s opinion, word for word. He is, essentially, reducing himself from a journalist to a state broadcasting service.
And he most likely has a long career ahead of him.
The Anti-Defamation League (ADL) has announced that it will build a “a state-of-the-art command center in Silicon Valley” to monitor and fight anything online that it determines is “hate.”
The ADL is known for attacking individuals who criticize Israel as allegedly “anti-Semitic.” Its website states: “ADL has always been a strong voice for Israel.”
Critics of the organization have noted that its fundraising strategy relies on finding “anti-Semitism” and charge that it often exaggerates this threat.
A former Israeli minister stated that Israel and its partisans often use the charge of anti-Semitism against those who speak discuss Israel’s oppression of Palestinians: “It’s a trick, we always use it.” The ADL was the initiator of hate crimes legislation in the United States, launching this campaign in 1981.
ADL CEO Jonathan Greenblatt announced the new center on March 12 at a music festival in Austin, Texas. Accompanying him was Texas Tribune Editor-in-Chief Evan Smith.
According to the ADL’s press release on the project, the new center “will write reports, compile data, and “provide insights to government and policy makers.” The center will use the “best-in-class technology,” according to Greenblatt.
“This is a natural extension of the cyber hate work ADL has been doing for decades,” Greenblatt said, “and builds on the new presence we established last year in the Valley to collaborate even closer on the threat with the tech industry.”
The Omidyar Network is providing seed funding for the project. According to its website, Omidyar Network is a “philanthropic investment firm” that works to “catalyze economic and social change.” Founded by Ebay creator Pierre Omidyar, the organization has dispersed over a billion dollars since its inception in 2004.
According to the ADL release, “The new center will leverage ADL’s long-standing relationships with law enforcement.“ It will evaluate artificial intelligence, big data, augmented/virtual reality, and other technologies as potential tools.
The center’s director will be Brittan Heller, who joined the ADL in September 2016 from the U.S. Department of Justice.
CEO Greenblatt came to the ADL from the tech word, with experience “starting ventures, raising capital, developing products, and crafting partnerships in Silicon Valley.
According to the ADL, “Over the next several months, Heller, Greenblatt, and the ADL team will engage with a wide range of stakeholders in Silicon Valley and beyond as they work to stand up this new center.”
Below is the trailer for a documentary on the ADL made by Israeli film director Yoav Shamir:
Say Ann Arbor and people will think of Michigan football, with the second biggest stadium in the entire world, behind only North Korea’s Rungrado May Day Stadium. The annual marijuana rally, Hash Bash, may also come to mind.
Downtown is filled with hip cafés, trendy shops, comfy brewpubs and sophisticated restaurants. These kids have money, I thought as I roamed around, searching for cheap beer. In-state tuition, in turns out, is $28,776, and out of state is $59,784. Michigan has plenty of international students, most notably Chinese.
At Curtain Call, the 30-something bartender, Chris, was from Hawaii. Her dad owned a Maui bar close enough to the beach for surfers to down a few at dawn before hitting the waves. Sounded like paradise. Chris couldn’t work for her old man, however, because he was so cheap, so she ended slinging beer in Ann Arbor. Chris had originally gone there to study biochemistry at the university.
This was her first Friday night off in eleven years, Chris confessed, “I don’t know what to do with myself.”
“You should go somewhere and drink.”
“It’s been eleven years since I can do that!”
“That’s interesting.”
“For me, it doesn’t matter if it’s one drink or ten drink, I’ll still get a headache in the morning.”
“You should drink ten then!”
We laughed.
Jewish, Chris told me Ann Arbor’s best deli was Zingerman’s.
In my late 20’s, I took a girl to a Philly diner. I ordered chicken liver, a favorite to this day. Maria looked at me in horror, “What the fuck are you eating?! Chicken shit?!”
Did I tell you that Jews have been most instrumental in my life? In college, my three most supportive professors, Boris Putterman, Stephen Berg and Eileen Neff, were Jews, with Berg and Neff practically my surrogate parents, they nurtured me so much. Berg bought a painting of mine to put over his fireplace, and lent me money several times. My fiction publisher, Dan Simon, is Jewish, and Jewish Ron Unz has treated me better than any other webzine editor. Novelist Matthew Sharpe has talked me up in the fiction world. I can go on and on. Hell, my first date was with a Jewish girl, and I even lost my virginity to a Jew! I traveled through remote northwest Vietnam with photographer Mitch Epstein, and with 6-9 Lloyd Luntz, explored the Mekong Delta. Jews swarm me, fill my head, course through my veins. I can go on and on.
My next time at Curtain Call, I chatted with a 28-year-old who wished he was 25. “My last birthday, I said it was the 3rd anniversary of my 25th.”
Overhearing this, a guy down the bar shouted, “I wish I was 50!”
Another old head jumped in, “I wish I was 60!”
With two friends threatening suicide, I brought up the topic to this just-arrived, incipient man who’s already mourning his lost youth. “Don’t do it before you’re 50!” I joked.
Outside the FederalBuilding on Liberty Street, I ran into two people protesting the Dakota Access Pipeline. Their signs, “I STAND WITH STANDING ROCK,” “CAN’T DRINK OIL / WATER IS LIFE / #NODAPL” and “BE A TSUNAMI,” among others.
Jeff’s a retired lawyer, and Mary’s a former elementary school teacher who worked at Crazy Wisdom, a tea room and bookstore. This month’s book picks include Mediumship: An Introductory Guide to Developing Spiritual Awareness and Intuition, Magicians of the Gods: Fingerprints of the Gods, Rest in Power: The Enduring Life of Trayvon Martin and The Education of Will: a Mutual Memoir of a Woman and her Dog.
I asked what they were about. Jeff, “If you feel connected to Mother Earth, then you’re going to protect Mother Earth, and you’re going to relate to the Native Americans, and what they stand for. We don’t own any of this. We think we own it, but that’s an illusion.”
Ellen, “People will say I’m not doing it, but we’re all one, so we are all doing it. We live in homes that use electricity and gas. The America first mindset has been going on for a while. Not enough of us realize that we are one with the rest of the world. If they starve, so do we. Our hearts do, even if our bodies are not. I feel responsible for the world.”
“So what are you doing personally to help?” I asked.
“Personally, I am keeping my temperature lower. I’m using less water. I am signing every petition that comes my way that I believe in. I’m contributing money to the bigger organizations that I feel can, perhaps, get their voice heard more than I can.
“So many people don’t know any different, and so they assume that everything they’re doing is fine. Many people don’t know that a lot of people in the world are suffering. They just don’t understand, and if they do know, they don’t care. It’s not their own family.
“My own stepson and his family, they work at home, they love their children, they’re good people, but he says, ‘This is my world.’ It’s his home and his family.”
Jeff, “I think the culture is so isolating. You get in your car and you drive around. You look at your phone all day. We do things that separate us, you know.
“Look where we are, close to Detroit, where they make automobiles. For me, I don’t particularly enjoy driving around in a car all day.”
I brought up the election. Ellen, “What happened is a huge amount of people who felt like they didn’t have a voice, and it was a contemptuous voice, were given it by he who should not be president. And, they feel really good now, but nothing is really going to happen for them, but they were heard. To be heard is going to be enough for them for a while.
“I do yoga with a quite introspective man, and he thinks something went wrong with America this time. It’s been building up, and I’ll admit that Hillary was a part of it too, but this election is proof positive that we are fucked!”
Jeff, “People need to speak up, and not be afraid to speak up, you know, whatever their conscience is. I’m not a fan of the media at all. People will try to steer you in their direction. You need the courage to stand alone and be a voice, a different voice. It takes courage to do it.”
Ellen, “It does, it does, and courage isn’t something Americans have in huge, ah, commodity.”
College towns proliferate in approved political statements, so in Ann Arbor, I saw a “Black Lives Matter” banner at a church, “Black Lives Matter” signs outside homes, a rainbow flag in front of a church with “God is still speaking” and a “WITH ISRAEL WE STAND” sign at a liquor store, etc. A house displayed a “PEACE” rainbow flag and a bed sheet painted with “WE SUPPORT OUR MUSLIM NEIGHBORS.”
Nowhere did I see “STOP BOMBING MUSLIMS,” “STOP SUPPORTING THE TERROR STATE OF ISRAEL” or “STOP SLANDERING AND PROVOKING RUSSIA.”
A progressive American is mostly a jerked puppet who’s outraged solely at preselected triggers. At his Deir Yassin Remembered website, lifelong Ann Arbor resident Henry Herskovitz explains:
Jackie Robinson and Jewish Power
Emotions naturally flare at watching the PBS special shown on MLK day of the career of baseball icon Jackie Robinson. Who could not grow emotional when reminded that Jackie and wife Rachel were bumped twice from the planes carrying them to a spring training camp in Florida? What outrage is felt by viewers recognizing that this discrimination they experienced came merely because of the color of their skin and nothing else!
Yes, we get it. And we feel for the Robinsons; their plight was genuine. Racial discrimination still exists in America.
But what about Muhammed Ali, my friend and sandwich shop operator in the Balata refugee camp near Nablus, Palestine? Muhammed grew up in Haifa, graduated high school there and earned a technical degree before being bumped, not just from an airplane, but from his home town. Yes, he cannot return to Haifa and swim in the Mediterranean the way his family did before him. He cannot even travel to the Haram esh-Sharif/Noble Sanctuary to practice his religion. Like Jackie Robinson, Muhammed is the wrong “color”: neither ethnic Jew, secular Jew, nor religious Jew.
Isn’t there a story here as well, PBS? Perhaps even more compelling than Robinson’s, because Muhammed has yet to break his “color” barrier. Hello, Hollywood, isn’t his story worthy—at least—of a two-hour documentary?
Born Jewish, Herskovitz soured on his tribe after a trip to Israel. He saw firsthand the gross brutality of the illegally founded terror state. Back in Ann Arbor, Herskovitz wanted to give a presentation to his synagogue, Beth Israel, but the rabbi nixed the idea. Outraged, Herskovitz has staged an anti-Israel protest outside Beth Israel each Saturday for 13+ years. Though Herskovitz loves to ride his motorcycle long distance, he always come back in time to stand with his signs. A small band join him.
Last year, I visited Herskovitz at home and saw anti-Israel messages everywhere, including on the salt shaker, the fridge, the car, the garage and even the fireplace’s ember screen. To some neighbors’ dismay, Herskovitz paid to have “STOP US AID TO ISRAEL” and “LIBERATE PALESTINE / END ISRAEL” incised into the sidewalk outside his house.
Herskovitz routinely wears an anti-Israel T-shirt and baseball cap, and on his car are several anti-Israel stickers.
In 2015, Herskovitz and his allies paid for a billboard in Detroit, “AMERICA FIRST NOT ISRAEL.” Herskovitz:
The strategy behind this billboard’s statement, ‘America First, Not Israel’, is to drive a wedge between those who feel American interests are not served by fighting wars for Israel, and the Israel-firsters in this country who manipulate our leaders into the false premise that Israel is the ally of the United States.
Charges of anti-semitism quickly flooded in, and the message was taken down, so it was put up at another, more out of the way spot, until this second billboard company was also pressured to remove it. Henry:
Jewish Power Never Sleeps
Like Michigan rust on vehicles, Jewish Power remains relentless at getting its way. Just when Witness for Peace was to announce the installation of a local billboard—sponsored by sister organization Deir Yassin Remembered and carrying our message “America First, Not Israel”—we get “the call”. The billboard […] was taken down by Adams Outdoor Advertising one week after installation, effectively terminating a three-month contract.
That’s how long it took for Jewish Power to pressure Adams’ executives into seeing things their way. The call came from General Manager Mike Cannon, who admitted to receiving phone calls asking that the billboard be taken down. Mike claimed he was not the one who made the decision, and provided the phone number of Vice President of Human Resources Brian Grant to field my questions.
Brian developed a mantra for the conversation we shared: “the decision to remove the billboard was a collective decision and was made because the message did not meet Adams’ company standards. We removed the billboard and refunded your money. And that’s all I can say.” Brian fell back on this mantra at least a half dozen times during our 20-minute discussion. And reminded me that, since a clause in the contract allowed Adams to terminate at any time, there was no “breach of contract”.
Q: What were the company standards?
A: [Brian was not going to go into that.]
Q: How do you square the fact that the message was initially approved by Adams?
A: It should not have been approved; due diligence was not applied.
Q: Who were the people complaining about the billboard?
A: [Would not answer that.]
Q: What were the organizations calling for the billboard to be taken down?
A: [See above.]
Q: Would the decision to pull the billboard have been the same had the message been simply America First?
A: Well, you’re asking a hypothetical.
Q: You mean Adams would NOT run a billboard saying America First?
A: [No answer.]
And so it goes. By deception shall you make war. DYR and WfP lose the round; Jewish Power wins. We move on.
When Russia Today reported on this billboard controversy, the first commenter said, “Calling Americans to put interest of America ahead of Isreal is branded as anti semitic ? That goes to prove how much the zionist wants the americans to be brain dead!”
Brainwashed, Americans also cringe at “Jewish power,” but it’s OK so declare and celebrate “black power,” “Latino power,” “gay power” or “women’s power,” etc. Aren’t AIPAC, the flushing of the U.S.S. Liberty down the memory hole, the abject kowtowing of DC politicians to Tel Aviv and our endless war against Israel’s enemy all examples of Jewish power?
But you’re dead wrong, anti-semite! As eternal victims everywhere, Jews are always powerless, so only Jew haters would dare to suggest otherwise.
“Are you a Jew hater?” I asked Herskovitz. His answer:
“Hate” is a term used by my opponents, not by me. “Hate speech” is used by the Hasbara folks as an epithet thrown at their perceived enemies. Like “Holocaust Denier,” the users of these terms do not define them, but merely slime those whose voices they want to silence. I’m a “hater” because Mark Potok of the Southern Poverty Law Center says I am. Could Mr. Potok be a child molester because I make the claim?
I try not to play defense. My experience in these matters tells me that once I start down the slippery slope of “denial,” or defending my position, this tactic merely fuels opponents’ appetite for further questions. It answers nothing. The best defense is a good offense.
Even if I were to admit a hatred of an ethnic/religious group, an interesting question arises. Assume this group was Irish Protestants, and I said I hated them. Who would care? But admitting to hating Jews is another story altogether. Perhaps the phrase “To learn who rules over you, simply find out who you are not allowed to criticize” makes sense when used in this context.
And the question becomes rather ludicrous when you consider that I love my sister, her children and grandchildren; ditto for my Virginia cousins, their children and grandchildren. I’m even scheduled to attend a Bat Mitzvah of one of these kids this summer. If you were to tell this group I’m a Jew hater, you would not be believed.
So no, Herskovitz has no beef with ordinary Jews, or he would have to disown his entire family, but haven’t Jewish policy makers, media masters, opinion shapers and bankers used their disproportionate sway over the makeup and direction of this country to harm not just their Muslim enemies, but ordinary Americans?
In putting up the billboard, “AMERICA FIRST / NOT ISRAEL,” Herskovitz merely wants our country to serve its own citizens, and not be distorted, corrupted, discredited and destroyed by a foreign agenda, and I, as an American, can’t help but concur.
Both Russia and Egypt have denied reports alleging that Russian special forces have been deployed at an airbase near the Libyan border to support a military commander loyal to Libya’s eastern government.
“There are no Russian special forces in Sidi Barrani,” the Russian Defense Ministry’s official spokesman, Igor Konashenkov, said on Tuesday.
“Some Western media have been disturbing the public with such reports, citing anonymous sources for several years now… And ever more foolish and indecent with regard to American intelligence are the words of the ‘source’ quoted by Reuters, who said that ‘intelligence activity of the United States into the [actions] of the Russian military are complicated because of the involvement of contractors and agents in civilian clothes,’” Konashenkov added.
Citing US, Egyptian, and “diplomatic“ sources who spoke on condition of anonymity, Reuters had reported earlier that Russian special operations forces and drones were allegedly deployed at Sidi Barrani base, some 100 kilometers (60 miles) from the border between Egypt and Libya. The unnamed Egyptian security sources said the unit consisted of 22 members, but would not discuss their supposed mission, the agency stated, while suggesting that Russia had also flown six military units to Egypt’s Marsa Matrouh base in early February, which proceeded to Libya some 10 days later.
The chair of Russia’s Federal Defense and Security Committee, Victor Ozerov, branded the report a “hoax,” insisting that no deployment of special forces to Egypt or Libya had ever been brought before the Russian Parliament.
“Nobody addressed the Federation Council on the question of sending the Russian Armed Forces to either Egypt or Libya.
“The president of the Russian Federation has the right to use Russian armed forces abroad only with the consent of the Federation Council; this is a constitutional norm. No such request was submitted to the Federation Council [therefore] there is no legal reason to say that [Russian] servicemen could be in Egypt,” Ozerov told RIA Novosti news agency. The reports are “yet another anti-Russian attack,” Ozerov said, adding that “Russia has proved that it strictly adheres to international norms on the use of armed forces abroad.”
Egypt also dismissed the Reuters report.
“There is no foreign soldier from any foreign country on Egyptian soil. This is a matter of sovereignty,” Egyptian army spokesman Tamer al-Rifai said, as cited by Reuters.
The refuted allegations contend that Russian special forces have been deployed to support Khalifa Haftar, the commander of the Libyan National Army (LNA) that is loyal to Libya’s eastern government. The 73-year-old general had been an ally of Libyan strong-man Muammar Gaddafi, but joined the Western-backed uprising against the country’s long-time leader in 2011, which led to the Gaddafi’s death and a civil war that’s still raging.
After years of turmoil and fighting, with various factions vying for power, two rival governments emerged in Libya: the Council of Deputies based in Tobruk and the Tripoli-based General National Congress. With the UN’s help, in 2015, the two agreed to set up a Government of National Accord (GNA) that would form a Presidency Council. However, the Tobruk-based parliament supported by Haftar has refused to cooperate with the unity government, which it accuses of aligning with some of the country’s Islamist-leaning forces. Haftar’s forces have been fighting an alliance of Islamist militants and former rebels in Benghazi for two years now. The general maintains close relationships with Egypt and the United Arab Emirates, as well as Russia. Haftar was in Russia twice last year, asking for military aid.
Last week, another Reuters report alleged that a force of several dozen armed private Russian security contractors had been operating in a part of Libya under Haftar’s control until February. The contractors were allegedly there to help mine sweep Benghazi, the head of the firm that allegedly hired them said, according to Reuters. However, the commander of Benina air base near Benghazi, Mohamed Manfour, said that the LNA had not received any military assistance from the Russian government or Russian military contractors, while denying that there were any Russian forces or bases in eastern Libya.
Russia has stressed that it “continues meticulously working with both power centers in Libya,” with Foreign Minister Sergei Lavrov saying that only the Libyan people can decide their country’s future.
“It’s clear that the country’s future must be determined by Libyans. We believe that attempts to impose a ready-made solution on them are counterproductive,” Lavrov said in a February interview with Russia’s Izvestiya newspaper.
Russia’s foreign minister also pledged to help unify Libya and foster dialogue at a recent meeting with Fayez Seraj, the leader of Libya’s UN-backed government.
The WikiLeaks exposure of thousands of documents relating to the Central Intelligence Agency’s (CIA) hacking program, which was expanded dramatically under President Barack Obama between 2013 and 2016, has created something of a panic in the users of cell phones, online computers and even for smart television viewers. The documents describe “more than a thousand hacking systems, trojans, viruses and other ‘weaponized’ malware” and one document even identifies attempts to enable CIA controllers to take control of automobiles that have “On Star” or similar satellite interactive features.
According to analysts who have gone through the documents, any electronic device that is connected to the internet is reported to be vulnerable to being taken over and “weaponized,” manipulated through its microphone or camera function even if it appears to be turned off. Apple, Google, Android and Microsoft products were among the technologies that were targeted, with the security systems being constantly probed for vulnerabilities. When a flaw was discovered it was described as “zero day” because the user would have zero time to react to the detection and exploitation of the vulnerability.
And they are indeed everywhere. Ron Paul has described a woman’s test on the Amazon marketed interactive voice controlled device called Alexa, asking it if it were reporting to the CIA. Alexa, which allegedly cannot tell a lie, refused to answer.
According to Wikipedia, “Alexa is an intelligent personal assistant developed by Amazon Lab126, made popular by the Amazon Echo. It is capable of voice interaction, music playback, making to-do lists, setting alarms, streaming podcasts, playing audiobooks, and providing weather, traffic, and other real time information.” One reviewer observed “In a good but scary feature, Amazon Echo can learn a person’s habits over time. It will get used to the way a person talks, his/her habits and routines and will save all the data in the cloud.”
Alexa demonstrates that CIA and NSA intrusion into the lives of ordinary people is not unique. In the cyber-sphere there are many predators. Amazon has apparently run special sales to get Alexa devices into as many homes as possible, presumably for commercial reasons, to have a machine in one’s home that will eventually replace the cookies on computers that collect information on what people are interested in buying. The company’s president Jeff Bezos also recently completed a deal worth $600 million for Amazon to provide cloud hosting services for the Agency. And there are, of course, two clear conflicts of interest in that deal as Bezos is selling a device that can be hacked by the government while he also owns The Washington Post newspaper, which, at least in theory, is supposed to be keeping an eye on the CIA.
But spying for profit and spying by the government are two different things and the WikiLeaks revelations suggest that the CIA has had a massive program of cyberespionage running for a number of years, even having created a major new division to support the effort called the Directorate for Digital Innovation, with an operation component called the Center for Cyber Intelligence. Media reports also suggest that a major hub for the operation was the American Consulate General in Frankfurt Germany, where the Agency established a base of operations.
First of all, it is necessary to make an attempt to understand why the CIA believes it needs to have the capability to get inside the operating systems of phones and other devices which rely on the internet. It should be pointed out that the United States government already has highly developed capabilities to get at phones and other electronics. It is indeed the principal raison d’etre of the National Security Agency (NSA) to do so and the FBI also does so when it initiates wiretaps during criminal and national security investigations.
Beyond that, since the NSA basically collects all electronic communications in the United States as well as more of the same fairly aggressively overseas, it would seem to be redundant for the CIA to be doing the same thing. The CIA rationale is that it has a different mission than the NSA. It exists to conduct espionage against foreign intelligence targets, which frequently requires being able to tap into their personal phones or other electronic devices by exploiting vulnerabilities in the operating systems. As the targets would be either sources or even prospective agents, the Agency would have to protect their identity in the highly compartmented world of intelligence, making outsourcing to NSA problematical.
This need to develop an independent capability led to the development of new technologies by the CIA working with its British counterparts. There were apparently successful efforts to target Samsung “smart” televisions, which would use their speakers to record conversations even when the set was turned off. The project was called “Weeping Angel,” and other hacking programs were called “Brutal Kangaroo,” “Assassin,” “Hammer Drill,” “Swindle,” “Fine Dining” and “Cutthroat,” demonstrating that government bureaucrats sometimes possess a dark sense of humor.
Being able to enter one’s home through a television would be considered a major success in the intelligence world. And the ability to access cell phones at source through obtaining full control of the operating system rather than through their transmissions means that any security system will be ineffective because the snoopers will be able to intrude and hear the conversation as it is spoken before any encryption is applied. CIA and its British allies were reportedly able to take control of either Android or i-Phones through vulnerabilities in their security systems by using their attack technologies.
WikiLeaks claims to have 8,761 documents detailing efforts to circumvent the security features on a broad range of electronic devices to enable them to be remotely tapped, the information having apparently been passed to WikiLeaks by a disgruntled government contractor, though the Russians are perhaps inevitably also being blamed. The U.S. government has apparently been aware of the theft of the information for the past year and one presumes it has both done damage control and is searching for the miscreant involved. Also, there have been security fixes on both Apple and Android phones in the past year that might well have rendered the attack technologies no longer effective.
So many will shrug and wonder what the big deal is. So the CIA is tapping into the electronics of suspected bad guys overseas. Isn’t that what it’s supposed to do? That question has to be answered with another question: How do we know if that is all the CIA is doing? Technology that can attack and take control of a telephone or television or computer overseas can also do the same inside the United States. And the Agency can always plausibly claim that a connection with a suspect overseas leads back to the U.S. to enable working on related targets on this side of the Atlantic.
Another issue is the possibility to engage in mischief, with potentially serious consequences. The WikiLeaks documents suggest that the CIA program called UMBRAGE had been able to acquire malware signatures and attack codes from Russia, China, Iran and other places. It does that so it can confuse detection systems and preserve “plausible denial” if its intrusion gets caught, disguising its own efforts as Russian or Chinese to cast the blame on the intelligence services of those countries. It has been alleged that the hack of the Democratic National Committee computers was carried out by Moscow employed surrogates and part of the evidence produced was signature malware that had left “fingerprints” linked to Russian military intelligence in Ukraine. What if that hack was actually done by the CIA for domestic political reasons?
Critics have also pointed out that President Obama in 2014 had come to an agreement with major communications industry executives to share with manufacturers information regarding the vulnerabilities in their systems so they could be addressed and made secure. This would have benefited both the industry and the general public. The agreement was obviously ignored in the CIA case and is just another sign that one cannot trust the government.
However, the real downside regarding the CIA hacking is something that might not even have occurred yet. It is an unfortunate reality that government spying operations largely lack regulation, oversight or any effective supervision by Congress or anyone else outside the agencies themselves. Even if knowledge about communications vulnerabilities has not been employed illegally against American targets or to mislead regarding domestic hacks, the potential to use those capabilities once they are in place will likely prove too hard to resist. As such, no home or work environment will any more be considered a safe place and it is potentially, if not actually, the greatest existing threat to Americans’ few remaining liberties.
New revelations from Wikileaks’ ‘Vault 7’ leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies.
Reading the revelations contained in the documents released by WikiLeaks and adding them to those already presented in recent years by Snowden, it now seems evident that the technological aspect regarding espionage is a specialty in which the CIA, as far as we know, excels. Hardware and software vendors that are complicit — most of which are American, British or Israeli — give the CIA the opportunity to achieve informational full-spectrum dominance, relegating privacy to extinction. Such a convergence of power, money and technology entails major conflicts of interest, as can be seen in the case of Amazon AWS (Amazon’s Cloud Service), cloud provider for the CIA, whose owner, Jeff Bezos, is also the owner of The Washington Post. It is a clear overlap of private interests that conflicts with the theoretical need to declare uncomfortable truths without the need to consider orders numbering in the millions of dollars from clients like the CIA.
While it is just one example, there are thousands more out there. The perverse interplay between media, spy agencies and politicians has compromised the very meaning of the much vaunted democracy of the land of the Stars and Stripes. The constant scandals that are beamed onto our screens now serve the sole purpose of advancing the deep interest of the Washington establishment. In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and détente between the United States and Russia. In terms of news, the Wikileaks revelations shed light on the methods used by US intelligence agencies like the CIA to place blame on the Kremlin, or networks associated with it, for the hacking that occurred during the American elections.
Perhaps this is too generous a depiction of matters, given that the general public has yet to see any evidence of the hacking of the DNC servers. In addition to this, we know that the origin of Podesta’s email revelations stem from the loss of a smartphone and the low data-security measures employed by the chairman of Hillary Clinton’s presidential campaign. In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations based on the fact that Moscow, together with RT and other media (not directly linked to the Kremlin), finally enjoy a major presence in the mainstream media. The biggest problem for the Washington establishment lies in the revelation of news that is counterproductive to the interests of the deep state. RT, Sputnik, this site and many others have diligently covered and reported to the general public every development concerning the Podesta revelations or the hacking of the DNC.
Now what is revealed through Wikileaks’ publications in Vault 7 is the ability of a subsection of the CIA, known as Umbrage, to use malware, viruses, trojans and other cyber tools for their own geopolitical purposes. The CIA’s Umbrage collects, analyzes and then employs software created variously from foreign security agencies, cyber mafia, private companies, and hackers in general. These revelations become particularly relevant when we consider the consequences of these actions. The main example can be seen in the hacking of the DNC. For now, what we know is that the hacking – if it ever occurred – is of Russian origin. This does not mean at all that the Kremlin directed it. It could actually be very much the opposite, its responsibility falling into the category of a cyber false-flag. One thing is for sure: all 16 US intelligence agencies are of the view that “the Russians did it”. That said, the methods used to hack vulnerabilities cannot be revealed, so as to limit the spread of easily reusable exploits on systems, such as the one that hosted the DNC server. It is a great excuse for avoiding the revelation of any evidence at all.
So, with little information available, independent citizens are left with very little information on which to reliably form an opinion on what happened. There is no evidence, and no evidence will be provided to the media. For politicians and so-called mainstream journalists, this is an acceptable state of affairs. What we are left with instead is blind faith in the 16 spy agencies. The problem for them is that what WikiLeaks revealed with Vault 7 exposes a scenario that looks more likely than not: a cyber false-flag carried out by the Central Intelligence Agency using engineered malware and viruses made in Russia and hypothetically linking them back to hacking networks in Russia. In all likelihood, it looks like the Democrats’ server was hacked by the CIA with the clear objective of leaving Russian fingerprints and obvious traces to be picked up by other US agencies.
In this way, it becomes easier to explain the unique views of all 16 spy agencies. Thus, it is far more likely that the CIA intentionally left fake Russian fingerprints all over the DNC server, thereby misleading other intelligence agencies in promoting the narrative that Russia hacked the DNC server. Of course the objective was to create a false narrative that could immediately be picked up by the media, creating even more hysteria surrounding any rapprochement with Russia.
Diversification of computer systems.
The revelations contained in the Wikileaks vault 7 (less than 1 % of the total data in Wikileaks’ possession has been released to date) have caused a stir, especially by exposing the astonishing complicity between hardware and software manufacturers, often intentionally creating backdoors in their products to allow access by the CIA and NSA. In today’s digital environment, all essential services rely on computer technology and connectivity. These revelations are yet more reason why countries targeted by Washington, like China, Russia, Iran and North Korea, should get rid of European and American products and invest in reducing technological dependence on American products in particular.
The People’s Republic has already started down this track, with the replacement of many network devices with local vendors like Huawei in order to avoid the type of interference revealed by Snowden. Russia has been doing the same in terms of software, even laying the groundwork to launch of its own operating system, abandoning American and European systems. In North Korea, this idea was already put into practice years ago and is an excellent tool for deterrence for external interference. In more than one computer security conference, US experts have praised the capabilities of the DPRK to isolate its Internet network from the rest of the world, allowing them to have strong safety mechanisms. Often, the only access route to the DPRK systems are through the People’s Republic of China, not the easiest way for the CIA or NSA to infiltrate a protected computer network.
An important aspect of the world in which we live today involves information security, something all nations have to deal with. At the moment, we still live in a world in which the realization of the danger and effect of hacking attacks are not apparent to many. On the other hand, militarily speaking, the diversification and rationalization of critical equipment in terms of networks and operability (smartphones, laptops, etc) has already produced strong growth in non-American and European manufacturers, with the aim of making their systems more secure.
This strengthening of technology also produces deleterious consequences, such as the need for intelligence agencies to be able to prevent the spread of data encryption so as to always enjoy access to any desired information. The birth of the Tor protocol, the deployment of Bitcoin, and apps that are more and more encrypted (although the WikiLeaks documents have shown that the collection of information takes place on the device before the information is encrypted) are all responses to an exponential increase in the invasion of privacy by federal or American government entities.
We live in a world that has an enormous dependence on the Internet and computer technology. The CIA over the years has focused on the ability to make sure vulnerable systems are exploited as well as seeking out major security flaws in consumer products without disclosing this to vendors, thereby taking advantage of these security gaps and leaving all consumers with a potential lack of security. Slowly, thanks to the work and courage of people like Snowden and Assange, the world is beginning to understand how important it is to keep personal data under control and prevent access to it by third parties, especially if they are state actors. In the case of national security, the issue is expanded exponentially by the need to protect key and vital infrastructure, considering how many critical services operate via the Internet and rely on computing devices.
The wars of the future will have a strong technological basis, and it is no coincidence that many armed forces, primarily the Russian and Chinese, have opted in recent years toward training troops, and conducting operations, not completely relying on connectivity. No one can deny that in the event of a large-scale conflict, connectivity is far from guaranteed. One of the major goals of competing nations is to penetrate the military security systems of rival nations and be able to disarm the internal networks that operate major systems of defense and attack.
The Wikileaks revelations are yet another confirmation of how important it is to break the technological unipolar moment, if it may be dubbed this way, especially for nations targeted by the United States. Currently Washington dictates the technological capacities of the private and government sectors of Europe and America, steering their development, timing and methods to suit its own interests. It represents a clear disadvantage that the PRC and its allies will inevitably have to redress in the near future in order to achieve full security for its vital infrastructure.
The United States has recently deployed hundreds of troops to Syria in an apparent bid to assist the looming operation aimed at liberating Raqqa, but Washington will not be able to maintain a permanent military presence in the war-torn country, defense analyst Omar Maaribuni told RIA Novosti.
“Speaking about prospects, I don’t think that Turkey or the United States will be able to maintain their dominance [in northern Syria]. This is due to many factors. The main reason is the resistance which could emerge if American and Turkish forces refuse to withdraw from the region after the war is over,” he said.
In Maaribuni’s opinion, the other reason has to do with Washington’s plans to create a Kurdish canton spanning from the city of Afrin to the Mediterranean. The analyst said that it is impossible to carry out such a project in Syria due to demography and ethnic distribution, which prevent the Kurds from creating a “stable and self-contained” autonomous region on the border with Turkey.
“I think that America’s military presence near Manbij and other cities is temporary. The United States will have to withdraw sooner or later since there are no grounds for them to be there,” the analyst said. “Washington is trying to claim some of the achievement [in the fight against terrorism] as its own at the moment and improve its standing following a series of setbacks that the US has suffered.”
The Obama administration pledged to refrain from sending American boots on the ground in Syria, but later reversed its decision once it became apparent that the US-led coalition was struggling to destroy Daesh. The US has deployed hundreds of special operations troops to the war-torn country to ostensibly train and assist its local allies in their counterterrorism campaigns.
Maaribuni further commented on multilateral efforts aimed at liberating Raqqa, the so-called capital of Daesh’s caliphate. The US-backed Syrian Democratic Forces (SDF) are the primary force engaged in the operation aimed at pushing the militants out of the city, but the analyst suggested that the Syrian Arab Army (SAA) could also make a move towards the brutal group’s key stronghold.
“If the SAA moves towards the city of al-Thawrah after the military operation in Maskanah is over, Damascus-led forces will be able to secure three of its air bases, namely Kuweires, Kashish and al-Thawrah. They will need them for air cover largely provided by attack helicopters. These tactics have been used in the eastern Aleppo province and around Palmyra,” he explained.
Maaribuni suggested that the SAA “could find itself on the verge of the battle for Raqqa” if it has enough aerial support and uses artillery wisely.
Russia strives for the demilitarization of Central Europe, stipulated in the agreement between the country and NATO, and Europe is able to ensure regional security if it follows its own obligations under the alliance, French National Front (FN) party leader and presidential hopeful Marine Le Pen said in an interview Monday.
“[Russia’s President Vladimir Putin] wants to turn Central Europe not so much into the Russian influence zone, as the neutral zone,” Le Pen told Polish newspaper Rzeczpospolita.
She noted that the agreement, which had been concluded with Russia and which stipulated that the territories would not be militarized, was violated.
“Putin just wants these territories to be demilitarized again,” Le Pen stressed.
Commenting on the strengthening of the NATO’s eastern flank, Le Pen added that, as the European member states have complied with the demilitarization obligation for dozens of years, there was no reason which would prevent them from respecting it in the future.
At the 2016 NATO Summit in Warsaw, the alliance agreed to deploy its international troops in Latvia, Lithuania, Estonia and Poland. Additionally, it was agreed that out military exercises would be carried out in the Black Sea area in 2017. The actions are aimed at deterring the alleged aggression from Russia. Moscow has repeatedly criticized the increased presence of NATO’s troops and military facilities near the Russian border.
In 1997, the Founding Act on Mutual Relations, Cooperation and Security between Russia and NATO, which aimed at strengthening mutual trust and building a stable, peaceful and undivided Europe, was concluded in Moscow.
Why must Jewish organizations be and be seen as the loudest drum-beaters of all? Why can we not bring ourselves to say that military intervention is not on the table at all? Why not stash it under the table, out of sight and mount instead a diplomatic assault? – Leonard Fein, Forward
Introduction
As the White House and Congress escalate their economic sanctions and military threats against Iran, top military commanders and Pentagon officials have launched a counter-offensive, opposing a new Middle East War. While some commentators and journalists, like Chris Hedges (Truthdig, November 13, 2007), privy to this high stakes inter-elite conflict, attribute this to a White House cabal led by Vice President Cheney, a more stringent and accurate assessment puts the Zionist Power Configuration (ZPC) in the center of the Iran war debate.
There is a great deal riding in this conflict – the future of the American empire as well as the balance of power in the Middle East. Equally important is the future of the US military and our already heavily constrained democratic freedoms. The outcome of the continuous and deepening confrontation between top US military officials and the Israel Firsters over US foreign policy in the Middle East has raised fundamental questions over self-determination, colonization, civilian primacy and military political intervention, empire or republic. These and related issues are far from being of academic interest only; they concern the future of the United States. … continue
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.