Aletho News

ΑΛΗΘΩΣ

The WannaCry Cyberattack: What the Evidence Says and Why the Trump Administration Blames North Korea

By Gregory Elich | CounterPunch | January 3, 2018

On December 19, in a Wall Street Journal editorial that drew much attention, Homeland Security Advisor Tom Bossert asserted that North Korea was “directly responsible” for the WannaCry cyberattack that struck more than 300,000 computers worldwide. The virus encrypted files on infected computers and demanded payment in return for supposedly providing a decryption key to allow users to regain access to locked files. Bossert charged that North Korea was “using cyberattacks to fund its reckless behavior and cause disruption across the world.” [1]

At a press conference on the same day, Bossert announced that the attribution was made “with evidence,” and that WannaCry “was directed by the government of North Korea,” and carried out by “actors on their behalf, intermediaries.” The evidence that led to the U.S. to that conclusion? Bossert was not saying, perhaps recalling the ridicule that greeted the FBI and Department of Homeland Security’s misbegotten report on the hacking of the Democratic National Committee. [2] “Press Briefing on the Attribution of the WannaCry Malware Attack to North Korea,” Whitehouse.gov, December 19, 2017.

The centerpiece of the claim of North Korean culpability is the similarity in code between the Contopee malware, which opens backdoor access to an infected computer, and code in an early variant of WannaCry. [3]

Contopee has been linked to the Lazarus group, a cybercrime organization that some believe launched the Sony hack, based on the software tools used in that attack. Since North Korea is widely considered to be behind the cyberattack on Sony, at first glance that would appear to seal the argument.

It is a logical argument, but is it founded on valid premises? Little is known about Lazarus, aside from the operations that are attributed to it. The link between Lazarus and North Korea is a hypothesis based on limited evidence. It may or may not be true, but the apparent linkage is far weaker than mainstream media’s conviction would have one believe. Lazarus appears to be an independent organization possibly based in China, which North Korea may or may not have contracted to perform certain operations. That does not necessarily mean that every action – or even any action at all – Lazarus performs is at North Korea’s behest.

In Bossert’s mind as well as that of media reporters, Lazarus – the intermediaries Bossert refers to – and North Korea are synonymous when it comes to cyber operations. North Korea gives the orders and Lazarus carries them out. James Scott, a senior fellow at the Institute for Critical Infrastructure Technology, notes that “speculation concerning WannaCry attributes the malware to the Lazarus Group, not to North Korea, and even those connections are premature and not wholly convincing. Lazarus itself has never been definitively proven to be a North Korean state-sponsored advanced persistent threat (APT); in fact, an abundance of evidence suggests that the Lazarus group may be a sophisticated, well-resourced, and expansive cyber-criminal and occasional cyber-mercenary collective.” Furthermore, Scott adds, the evidence used to tie Lazarus to North Korea, “such as an IP hop or some language indicators, are circumstantial and could even be intentional false flags” to misdirect investigators. [4]

Whether an association exists or not between Lazarus and North Korea has little meaning regarding a specific attack. Joseph Carson of Thycotic emphasizes “that it is important to be clear that [Lazarus] is a group and motives can change depending on who is paying. I have found when researching hacking groups they can one day be working for one government under one alias and another using a different alias. This means that association in cyberspace means nothing.” [5]

It is considered a particularly damning piece of evidence that some of the tools used in an early variant of WannaCry share characteristics with those deployed in the cyberattack on Sony. [6] However, there is ample cause for doubting North Korea’s role in the Sony hack, as I have written about before. [7] Following the Sony breach, IT businessman John McAfee revealed that he had contact with the group that attacked Sony. “It has to do with a group of hackers” motivated by dislike of the movie industry’s “controlling the content of art,” he said, and the FBI was wrong in attributing the attack to North Korea. [8]

If attribution of the Sony hack to North Korea does not hold up, then linkage based on tool usage falls apart.

Once malware is deployed, it often appears for sale on the Dark Web, where it can be purchased by cybercriminals. The reuse of code is a time-saving measure in building new threats. Indeed, malware can find its way onto the market quite rapidly, and almost as soon as WannaCry was wreaking havoc back in May, it was reported that “researchers are already finding variants” of WannaCry “in the wild.” [9]

According to Peter Stephenson of SC Media, “The most prevailing [theory] uses blocks of code that were part of known Korean hacks appearing in the WannaCry code as justification for pinning the attacks on NK. That’s really not enough. These blocks of code are readily available in the underground and get reused regularly.” [10]

Commonality of tool usage means less than we are led to believe. “While malware may initially be developed and used by a single actor,” Digital Shadows explains, “this does not mean that it will permanently remain unique to that actor. Malware samples might be accidentally or intentionally leaked, stolen, sold, or used in independent operations by individual members of the group.” [11]

“Shared code is not the same as attribution. Code can be rewritten and erased by anyone, and shared code is often reused,” observes Patrick Howell O’Neill of Cyberscoop. “The same technique could potentially be used to frame another group as responsible for a hack but, despite a lot of recent speculation, there is no definitive proof.” [12]

None of the shared code was present in WannaCry’s widespread attack on May 12. Although it is more likely than not that the same actor was behind the early variants of WannaCry and the May version, it is not certain. Alan Woodward, cybersecurity advisor to Europol, points out, “It is quite possible for even a relatively inexperienced group to obtain the malicious WannaCry payload and to have repackaged this. Hence, the only thing actually tying the May attacks to the earlier WannaCry attacks is the payload, which criminals often copy.” [13]

The most devastating component WannaCry utilized in its May 12 attack is EternalBlue, an exploit of Windows vulnerabilities that was developed by the National Security Agency and leaked by Shadow Brokers. The NSA informed Microsoft of the vulnerability only after it learned of the software’s theft. According to Bossert, the NSA informs software manufacturers about 90 percent of the time when it discovers a vulnerability in operating software. It keeps quiet about the remaining ten percent so that it can “use those vulnerabilities to develop exploits for the purpose of national security for the classified work we do.” [14] Plainly put, the NSA intentionally leaves individuals and organizations worldwide exposed to potential security breaches so that it can conduct its own cyber operations. This is less than reassuring.

The May variant of WannaCry also implemented DoublePulsar, which is a backdoor implant developed by the NSA that allows an attacker to gain full control over a system and load executable malware.

The two NSA-developed components are what allowed WannaCry to turn virulent last May. After loading, EternalBlue proceeds to infect every other vulnerable computer on the same network. It simultaneously generates many thousands of random IP addresses and launches 128 threads at two-second intervals, seeking vulnerabilities in computers that it can exploit at each one of the generated external IP addresses.[15]

China and Russia were among the nations that were most negatively impacted by the malware. [16] WannaCry initially targeted Russian systems, which would seem an odd thing for North Korea to do, given that Russia and China are the closest things it has to allies. [17]

Digital Shadows reports that “the malware appeared to spread virtually indiscriminately with no control by its operators,” and a more targeted approach “would have been more consistent with the activities of a sophisticated criminal outfit or a technically-competent nation-state actor.” [18]

Flashpoint analyzed the ransom note that appeared on infected computers. There were two Chinese versions and an English version. The Chinese texts were written by someone who is fluent, and the English by someone with a strong but imperfect command of English. Ransom notes in other languages were apparently translated from the English version using Google translator. [19] It has been pointed out that this fact does not disprove the U.S. attribution of North Korea, as that nation could have hired Chinese cybercriminals. True enough, but then North Korea does not have a unique ability to do so. If so inclined, anyone could contract Chinese malware developers.  Or cybercriminals could act on their own.

Lazarus and North Korean cyber actors have a reputation for developing sophisticated code. The hallmark of WannaCry, however, is its sheer sloppiness, necessitating the release of a series of new versions in fairly quick succession. Alan Woodward believes that WannaCry’s poorly designed code reveals that it had been written by “a less than experienced malware developer.” [20]

Important aspects of the code were so badly bungled that it is difficult to imagine how any serious organization could be responsible.

IT security specialists use virtual machines, or sandboxes, to safely test and analyze malware code. A well-designed piece of malware will include logic to detect the type of environment it is executing in and alter its performance in a virtual machine (VM) environment to appear benign. WannaCry was notably lacking in that regard.  “The authors did not appear to be concerned with thwarting analysis, as the samples analyzed have contained little if any obfuscation, anti-debugging, or VM-aware code,” notes LogRhythm Labs. [21]

James Scott argues that “every WannaCry attack has lacked the stealth, sophistication, and resources characteristic of [Lazarus sub-group] Bluenoroff itself or Lazarus as a whole. If either were behind WannaCry, the attacks likely would have been more targeted, had more of an impact, would have been persistent, would have been more sophisticated, and would have garnered significantly greater profits.” The EternalBlue exploit was too valuable to waste “on a prolific and unprofitable campaign” like the May 12 WannaCry attack. By contrast, Bluenoroff “prefers to silently integrate into processes, extort them, and invisibly disappear after stealing massive fiscal gains.” [22] Bogdan Botezatu of Bitdefender, agrees. “The attack wasn’t targeted and there was no clear gain for them. It’s doubtful they would use such a powerful exploit for anything else but espionage.” [23]

WannaCry included a “kill switch,” apparently intended as a poorly thought out anti-VM feature. “For the life of me,” comments Peter Stephenson, “I can’t see why they might think that would work.” [24] When the software executes it first attempts to connect to a hostname that was unregistered. The malware would proceed to run if the domain was not valid. A cybersecurity researcher managed to disable WannaCry by registering the domain through NameCheap.com, shutting down with ease the ability of WannaCry to infect any further computers. [25]

Once WannaCry infected a computer, it demanded a ransom of $300 in bitcoin to release the files it had encrypted. After three days, the price doubled. The whole point of WannaCry was to generate income, and it is here where the code was most inept.

Ideally, ransomware like WannaCry would use a new account number for each infected computer, to better ensure anonymity. Instead, WannaCry hard-coded just three account numbers, which basically informed authorities what accounts to monitor. [26] It is an astonishing botch.

Incredibly, WannaCry lacked the capability of automatically identifying which victims paid the ransom. That meant that determining the source of each payment required manual effort, a daunting task given the number of infected computers. [27] Inevitably, decryption keys were not sent to paying victims and once the word got out, there was no motivation for anyone else to pay.

In James Scott’s assessment, “The WannaCry attack attracted very high publicity and very high law-enforcement visibility while inflicting arguably the least amount of damage a similar campaign that size could cause and garnering profits lower than even the most rudimentary script kiddie attacks.” Scott was incredulous over claims that WannaCry was a Lazarus operation. “There is no logical rationale defending the theory that the methodical [Lazarus], known for targeted attacks with tailored software, would suddenly launch a global campaign dependent on barely functional ransomware.” [28]

One would never know it from news reports, but cybersecurity attribution is rarely absolute. Hal Berghel, of the Department of Computer Science at the University of Nevada, comments on the “absence of detailed strategies to provide justifiable, evidence-based cyberattribution. There’s a reason for that: there is none. The most we have is informed opinion.”  The certainty with which government officials and media assign blame in high-profile cyberattacks to perceived enemies should at least raise questions. “So whenever a politician, pundit, or executive tries to attribute something to one group or another, our first inclination should always be to look for signs of attribution bias, cognitive bias, cultural bias, cognitive dissonance, and so forth. Our first principle should be cui bono: What agendas are hidden? Whose interests are being represented or defended? What’s the motivation behind the statement? Where are the incentives behind the leak or reportage? How many of the claims have been substantiated by independent investigators?” [29]

IT security specialist Graham Cluley raises an important question. “I think in the current hostile climate between USA and North Korea it’s not unhelpful to retain some skepticism about why this claim might have been made, and what may have motivated the claim to be made at the present time.” [30]

To all appearances, WannaCry was the work of amateurish developers who got hold of NSA software that allowed the malware to spread like wildfire, but their own code was so poorly written that it failed to monetize the effort to any meaningful degree.

WannaCry has its uses, though. The Trump administration’s public attribution is “more about the administration’s message that North Korea is a dangerous actor than it is about cybersecurity,” says Ross Rustici, head of Intelligence Research at Cybereason. “They’re trying to lay the groundwork for people to feel like North Korea is a threat to the homeland.” [31] It is part of a campaign by the administration to stampede the public into supporting harsh measures or possibly even military action against North Korea.

[1] Thomas P. Bossert, “It’s Official: North Korea is Behind WannaCry,” Wall Street Journal,” December 19, 2017.

[2] “Press Briefing on the Attribution of the WannaCry Malware Attack to North Korea,” Whitehouse.gov, December 19, 2017.

[3] “WannaCry and Lazarus Group – the Missing Link?” SecureList, May 15, 2017.

[4] James Scott, “There’s Proof That North Korea Launched the WannaCry Attack? Not So Fast! – A Warning Against Premature, Inconclusive, and Distracting Attribution,” Institute for Critical Infrastructure Technology, May 23, 2017.

[5] Eduard Kovacs, “Industry Reactions to U.S. Blaming North Korea for WannaCry,” Security Week, December 22, 2017.

[6] “WannaCry: Ransomware Attacks Show Strong Links to Lazarus Group,” Symantec Official Blog, May 22, 2017.

[7] Gregory Elich, “Who Was Behind the Cyberattack on Sony?” Counterpunch, December 30, 2014.

[8] David Gilbert, Gareth Platt, “John McAfee: ‘I Know Who Hacked Sony Pictures – and it Wasn’t North Korea,” International Business Times, January 19, 2015.

[9] Amanda Rousseau, “WCry/WanaCry Ransomware Technical Analysis,” Endgame, May 14, 2017.

[10] Peter Stephenson, “WannaCry Attribution: I’m Not Convinced Kim Dunnit, but a Russian…”, SC Media, May 21, 2017.

[11] Digital Shadows Analyst Team, “WannaCry: An Analysis of Competing Hypotheses,” Digital Shadows, May 18, 2017.

[12] Patrick Howell O’Neill, “Researchers: WannaCry Ransomware Shares Code with North Korean Malware,” Cyberscoop, May 15, 2017.

[13] Alan Woodward, “Attribution is Difficult – Consider All the Evidence,” Cyber Matters, May 24, 2017.

[14] Thomas P. Bossert, “It’s Official: North Korea is Behind WannaCry,” Wall Street Journal,” December 19, 2017.

[15] Luke Somerville, Abel Toro, “WannaCry Post-Outbreak Analysis,” Forcepoint, May 16, 2017.

Sarah Maloney, “WannaCry / WCry /WannaCrypt Attack Profile,” Cybereason, May 16, 2017.

Rohit Langde, “WannaCry Ransomware: A Detailed Analysis of the Attack,” Techspective, September 26, 2017.

[16] Eduard Kovacs, “WannaCry Does Not Fit North Korea’s Style, Interests: Experts,” Security Week, May 19, 2017.

[17] “A Technical Analysis of WannaCry Ransomware,” LogRhythm, May 16, 2017.

[18] Digital Shadows Analyst Team, “WannaCry: An Analysis of Competing Hypotheses,” Digital Shadows, May 18, 2017.

[19] Jon Condra, John Costello, Sherman Chu, “Linguistic Analysis of WannaCry Ransomware Messages Suggests Chinese-Speaking Authors,” Flashpoint, May 25, 2017.

[20] Alan Woodward, “Attribution is Difficult – Consider All the Evidence,” Cyber Matters, May 24, 2017.

[21] Erika Noerenberg, Andrew Costis, Nathanial Quist, “A Technical Analysis of WannaCry Ransomware,” LogRhythm, May 16, 2017.

[22] James Scott, “There’s Proof That North Korea Launched the WannaCry Attack? Not So Fast! – A Warning Against Premature, Inconclusive, and Distracting Attribution,” Institute for Critical Infrastructure Technology, May 23, 2017.

[23] Eduard Kovacs, “WannaCry Does Not Fit North Korea’s Style, Interests: Experts,” Security Week, May 19, 2017.

[24] Peter Stephenson, “WannaCry Attribution: I’m Not Convinced Kim Dunnit, but a Russian…”, SC Media, May 21, 2017.

[25] Rohit Langde, “WannaCry Ransomware: A Detailed Analysis of the Attack,” Techspective, September 26, 2017.

[26] Jesse Dunietz, “The Imperfect Crime: How the WannaCry Hackers Could Get Nabbed,” Scientific American, August 16, 2017.

[27] Andy Greenberg, “The WannaCry Ransomware Hackers Made Some Major Mistakes,” Wired, May 15, 2017.

[28] James Scott, “WannaCry Ransomware & the Perils of Shoddy Attribution: It’s the Russians! No Wait, it’s the North Koreans!” Institute for Critical Infrastructure Technology, May 18, 2017.

[29] Hal Berghel, “On the Problem of (Cyber) Attribution,” Computer — IEEE Computer Society, March 2017.

[30] Scott Carey, “Should We Believe the White House When it Says North Korea is Behind WannaCry?” Computer World, December 20, 2017.

[31] John P. Mello Jr., “US Fingers North Korea for WannaCry Epidemic,” Tech News World, December 20, 2017.

Gregory Elich is on the Board of Directors of the Jasenovac Research Institute and the Advisory Board of the Korea Policy Institute. He is a member of the Solidarity Committee for Democracy and Peace in Korea, a columnist for Voice of the People, and one of the co-authors of Killing Democracy: CIA and Pentagon Operations in the Post-Soviet Period, published in the Russian language. He is also a member of the Task Force to Stop THAAD in Korea and Militarism in Asia and the Pacific. His website is https://gregoryelich.org Follow him on Twitter at @GregoryElich

January 3, 2018 Posted by | Deception, Fake News, Mainstream Media, Warmongering, Timeless or most popular | , , , | Leave a comment

Kim Jong-un Opens Contact Channel Between Two Koreas

© Sputnik/ Ilya Pitalev
Sputnik – 03.01.2018

North Korean leader Kim Jong-un has ordered the reopening of a contact channel between Pyongyang and Seoul to discuss issues related to the upcoming Olympic games in Pyeongchang, Ri Son Gwon, the head of North Korea’s agency handling inter-Korean affairs, said as quoted by the Yonhap news agency.

“I was instructed to open the Panmunjom [the shared border village] contact channel between North and South at 15:00 [3:30 p.m. in Seoul, 6:30 GMT] in order to settle issues related to hosting the PyeongChang Olympic Games, including sending [North Korea’s] delegation to the Games,” Ri said.

The officials added that Pyongyang would closely work with Seoul on practical issues related to sending the country’s delegation to the upcoming sports event, based upon the leadership’s stance, and expressed the hope that the Olympics would be successful.

“We sincerely wish once again that the PyeongChang Olympic Games will be held successfully,” Ri said.

Cheong Wa Dae, South Korea’s presidential office welcomed the announcement.

“I believe it signals a move toward an environment where communication will be possible at all times,” Yoon Young-chan, the chief presidential spokesman, told reporters, as quoted by the news agency.

Pyongyang’s statement came a day after Seoul proposed high-level discussions with the DPRK following Kim’s New Year’s address in which he had stressed he was willing to launch a dialogue with South Korea.

Meanwhile, US Envoy to the United Nations Nikki Haley warned in a statement on Tuesday that Washington would not recognize any talks between the two Koreas unless the nuclear issue is resolved and all of their nuclear weapons banned.

“North Korea can talk to anyone they want, but the United States is not going to recognize it or acknowledge it until they agree to ban the nuclear weapons that they have,” Haley said.

North Korean leader Kim Jong-un said in his New Year’s Day address that Pyongyang was ready to send its athletes to the 2018 Winter Olympics in Pyeongchang, South Korea, and expressed readiness to start talks with Seoul on the issue.

Seoul, in turn, has proposed holding high-level talks on January 9 in Panmunjom Village in the demilitarized zone between North Korea and South Korea.

The 2018 Winter Olympic Games will take place in Pyeongchang and two nearby cities, Gangneung and Jeongseon, in South Korea from February 9 to February 25. The South Korean resort city is located just 80 kilometers (50 miles) from the border with North Korea.

January 3, 2018 Posted by | Aletho News | , , | Leave a comment

The Times Rides to Mueller’s Rescue

By Pat Buchanan • Unz Review • January 2, 2018

What caused the FBI to open a counterintelligence investigation into the Trump campaign in July 2016, which evolved into the criminal investigation that is said today to imperil the Trump presidency?

As James Comey’s FBI and Special Counsel Robert Mueller have, for 18 months, failed to prove Donald Trump’s “collusion” with the Kremlin, what was it, in mid-2016, that justified starting this investigation?

What was the basis for the belief Trump was colluding, that he was the Manchurian candidate of Vladimir Putin? What evidence did the FBI cite to get FISA court warrants to surveil and wiretap Trump’s team?

Republican congressmen have for months been demanding answers to these questions. And, as Mueller’s men have stonewalled, suspicions have arisen that this investigation was, from the outset, a politicized operation to take down Trump.

Feeding those suspicions has been the proven anti-Trump bias of investigators. Also, wiretap warrants of Trump’s team are said to have been issued on the basis of a “dirty dossier” that was floating around town in 2016 — but which mainstream media refused to publish as they could not validate its lurid allegations.

Who produced the dossier?

Ex-British spy Christopher Steele, whose dirt was delivered by ex-Kremlin agents. And Steele was himself a hireling of Fusion GPS, the oppo research outfit enlisted and paid by the Clinton campaign and DNC.

Writes the Washington Times, Steele “paid Kremlin sources with Democratic cash.”

Yet, if Steele’s dossier is a farrago of falsehoods and fake news, and the dossier’s contents were used to justify warrants for wiretaps on Trump associates, Mueller has a problem.

Prosecutions his team brings could be contaminated by what the FBI did, leaving his investigation discredited.

Fortunately, all this was cleared up for us New Year’s Eve by a major revelation in The New York Times. Top headline on page one:

“Unlikely Source Propelled Russia Meddling Inquiry”

The story that followed correctly framed the crucial question:

“What so alarmed American officials to provoke the FBI to open a counterintelligence investigation of the Trump campaign months before the presidential election?”

The Times then gave us the answer we have been looking for:

“It was not, as Trump and other politicians have alleged, a dossier compiled by a former British spy hired by a rival campaign. Instead it was firsthand information from one of America’s closest intelligence allies.”

The ally: Australia, whose ambassador to Britain was in an “upscale London Bar” in the West End in May 2016, drinking with a sloshed George Papadopoulos, who had ties to the Trump campaign and who informed the diplomat that Russia had dirt on Hillary Clinton.

Papadopoulos had reportedly been told in April that Russia had access to Clinton’s emails.

Thus, when the DNC and John Podesta emails were splashed all over the U.S. press in June, Amb. Alexander Downer, recalling his conversation with Papadopoulos, informed his government, which has excellent ties to U.S. intelligence, and the FBI took it from there.

The Times’ story pounds home this version of events:

“The hacking and the revelation that a member of the Trump campaign may have had inside information about it were driving factors that led the FBI to open an investigation in July 2016 into Russian attempts to disrupt the election and whether any of Trump’s associates conspired.”

This, the Times assures us, “answers one of the lingering mysteries of the past year.”

Well, perhaps.

But if Papadopoulos’s drunken babbling to the Aussie ambassador triggered the investigation in July 2016, why was George not interviewed by the FBI until January 2017?

According to the Times, an FBI agent in Rome had been told by Steele in June 2016 what he had learned from the Russians.

And Steele was interviewed by the FBI in October 2016.

If Papadopoulos triggered the investigation, why the seeming FBI disinterest in him — as compared to Steele?

Yet another major question remains unanswered.

If, as the Times writes, the FBI was looking “into Russian attempts to disrupt the elections,” why did the FBI not open an investigation into the KGB roots of the Steele dossier that was written to destroy the Republican candidate, Donald Trump?

If Trump’s alleged “collusion” with Putin to damage Clinton was worthy of an all-out FBI investigation, why did the Clinton-DNC scheme to tie Trump to Russian prostitutes, using British spies and former KGB agents, not merit an FBI investigation?

Why was there less concern about the Clinton campaign’s ties to Russian agents, than to Trumpian “collusion” that is yet unproven?

Consider what the British spy Steele and his former KGB/FSB comrades accomplished:

They have kept alive a special counsel’s investigation that has divided our country, imperiled the FBI’s reputation, preoccupied and damaged a president, and partially paralyzed the U.S. government.

Putin must be marveling at the astonishing success of his old comrades from KGB days, who could pull off an intelligence coup like this and so cripple the superpower that won the Cold War.

Copyright 2018 Creators.com.

January 2, 2018 Posted by | Deception, Fake News, Mainstream Media, Warmongering, Russophobia | , , , | Leave a comment

Yemen says Saudi war has killed, wounded 35,000 people

Press TV – January 2, 2018

The Yemeni Ministry of Health says the Saudi-led military coalition has either killed or wounded some 35,000 people of Yemen during the ongoing war Riyadh imposed on the impoverished nation almost three years ago.

In a report read out in a press conference in the Yemeni capital of Sana’a on Tuesday, the ministry said that the appalling number of casualties occurred in just 1,000 days since the Saudi regime began its military aggression against the Yemeni people in March 2015.

The report added that nearly all of Yemen’s provinces sustained losses in the war with the northwestern province of Sa’ada, the west-central province of Sana’a and the western province of Hajjah suffering the most in a descending order.

The ministry also said that 415 health facilities were destroyed, either completely or partially, as a result of direct Saudi airstrikes, pointing out that more than 55 percent of the health facilities did not function due to the ceaseless aggression, and that the remaining 45 percent operated with a minimum capacity.

The report also revealed figures showing that more than 95,000 Yemeni patients needed to travel abroad for proper treatment, stressing that the closure of airports, due to a total blockade of the country by the Saudi-led coalition, led to the death of 32 patients every day in all provinces.

The ministry further said that, according to figures provided by the World Food Programme, more than 21 million Yemenis needed humanitarian assistance, and that more than 9 million others were expected to enter the stage of starvation.

According to the ministry’s figures, some 2 million Yemeni children suffer from some form of malnutrition, of which half a million are dying of severe malnutrition and 52,000 children died in 2016 for preventable causes.

The report also said that 2,236 people had so far lost their lives due to a cholera outbreak triggered by the Saudi war.

The international committee of the Red Cross says more than one million people have contracted cholera in Yemen amid Saudi Arabia’s war.

Saudi Arabia has been leading a deadly campaign against Yemen from the air, land, and sea since March 2015 in an attempt to reinstate former President Abd Rabbuh Mansur Hadi, a staunch ally of Riyadh, and to undermine the Houthi Ansarullah movement. Over the past two years, the Houthis have been running state affairs and defending Yemeni people against the Saudi aggression.

The campaign has also taken a heavy toll on the country’s facilities and infrastructure, destroying many hospitals, schools, and factories. The offensive has, however, achieved neither of its goals despite the spending of billions of petrodollars and the enlisting of the cooperation of Saudi Arabia’s regional and Western allies.

January 2, 2018 Posted by | War Crimes | , | Leave a comment

Flashback: Key witness disputes Hejazi account of Neda death

PressTV | July 29, 2009

More than a month after Neda Aqa-Soltan was killed in the post-election frenzy in Iran, a key witness to the incident moves to set the record straight.

Neda, 26, was shot dead on June 20 in an alley away from the scene of clashes between security forces and demonstrators in Tehran.

She immediately became an international icon after graphic videos of her bleeding to death in a matter of seconds, grabbed the attention of world media outlets.

Hamid Panahi, Neda’s friend and music teacher who was by her side in her final moments, dismissed the slew of eyewitness accounts of the sad incident — particularly the one given by Arash Hejazi.

Arash Hejazi, an Iranian physician currently studying in England, told the BBC that he had witnessed a member of the Basij shooting Neda.

His comments were a contributing factor in the Western-led media campaign against the Ahmadinejad government.

Panahi said contrary to Hejazi’s account of the incident, ‘there were no security forces of Basij members nearby’.

“In his interviews with foreign media outlets, Mr. Hejazi said that the culprit behind Neda’s death was arrested on the spot. I saw nothing of the sort. There were only about a dozen people present at the scene. No one was arrested,” he said.

To prove his point, Panahi said that new revelations have found that Neda was in fact shot not in the chest, but in the back.

Panahi is not the first to dismiss Hejazi’s account of Neda’s death. Earlier in June, the man who drove Neda to hospital had also said that there were no Basij members around at the time.

Iranian security forces have dismissed the reports out of hand, asserting that they did not open fire on protestors during the sporadic unrest.

While Media outlets in the West blame Neda’s death on Iranian security forces, new revelations show that she was murdered by a small caliber pistol– a weapon that is not used by Iranian security forces.

Iranian President Mahmoud Ahmadinejad has asked Judiciary chief Ayatollah Hashemi-Shahroudi to conduct a through investigation into the incident.

January 2, 2018 Posted by | Deception, Mainstream Media, Warmongering, Timeless or most popular | , | Leave a comment

Kosherising the 9/11 Truth Movement

By Gilad Atzmon | January 2, 2018

I have been correctly accused of remaining silent about 9/11. Although I frequently talk to 9/11 truth groups about various related topics such as Israel, Zionism and Jewish ID politics, I do not contribute to the discourse involving controlled demolitions and airplanes flying into buildings. Engineering, construction and flying are not within my field of research. Though I am aware of many of the details to do with the 9/11 truth movement, I can’t make any original scholarly contributions in this arena.

However, there are a few areas of my study that I think are important in relation to the 9/11 truth movement:

1.     The Mossad’s motto is ‘by way of deception’ and false flag operations are deeply rooted in the Mossad’s modus operandi.

2.    The prime beneficiary of 9/11 has been Israel. It was Zio-cons who pushed for the so-called ‘war against terror.’ In the name of democracy and Coca Cola the English speaking empire has been fighting Zionist conflicts for almost two decades.

3.    Most important, be aware that controlling the opposition is at the core of Zionist survival strategy.

The last point is one of the most important conclusions I draw in my latest book, Being in Time – a Post Political Manifesto.

When self-identified Jews notice that something about their culture, ideology or politics has become a problematic topic, some Jews often form Jewish satellite dissent.  Once the Israeli Palestinian conflict evolved into a ‘Jewish problem,’ some ethically motivated Jews formed JVP (Jewish Voice for Peace), Mondoweiss and other pro-Palestinian Jewish bodies. Within a short time these groups gained complete hegemony within the Palestinian Solidarity Movement. As soon as it became clear that the Neocon school is primarily an extended Zionist gathering and that Neocon wars are, in practice, Ziocon global conflicts, the ‘Neocon debate’ was reduced to an internal Jewish quarrel between rabid Zion-con Sam Harris and Anti-con Noam Chomsky.

But what about 9/11?

In my talks and writings I sarcastically suggest to my listeners that if Global Warming were to mature into a ‘Jewish problem,’ in a few hours we would see the formation of the newly ecologically aware ‘Jews Against Global Warming’ (JAGW I guess).  It would probably take another week before the new Jewish body would take over the Anti Global Warming Movement and start to expel the so-called ‘anti-Semites.’ This scheme applies to 9/11 truth. As soon as some noticed that the truth movement had become an emerging ‘Jewish problem,’ we could see a growing number of infiltrators attempting to steer the movement away from Israel. This transition within the truth movement has made the 9/11 truth movement of great interest to me.

 Ludwig Watzal, Elias Davidsson and the Kosher Narrative

Following the recent duplicitous slander campaign against my work in Germany run by Elias Davidsson and Ludwig Watzal, I stumbled upon their comical 9/11 spin. Countercurrents’ Are 9/11 Truthers Anti-Semites? An Interview With Elias Davidsson by Ludwig Watzal is a case study of an open, non–apologetic attempt to sabotage a movement.

Watzal writes, “Elias Davidsson is one of these ‘truthers’ who challenges the official narrative on 9/11. He is also concerned about the claim made by some ‘truthers’ that Israel was behind the attacks…”

Then we learn that Elias Davidsson is upset by Jew haters who keep referring to the ‘dancing Israelis’ and “the canard that 4,000 Jews, who, forewarned, did not go to work to the World Trade Center on 9/11.” Larry Silverstein is also vindicated by our 9/11 ‘truther’ because “he did not make any effort to cover his alleged tracks. He leased the WTC just six weeks before 9/11, announced this lease to the world, insured it against terrorism for a whopping $3.2 billion and ‘admitted’ in a documentary film to have given on 9/11 the authorization to ‘pull’ WTC 7.” According to our ‘kosher detective’ Davidsson, all this is evidence that Silverstein is innocent. Why? Because “we have here all the requisite elements: A greedy Jew, proximity to the crime, motive. It is precisely the high visibility of Larry Silverstein as an ideal villain that makes me (Davidsson) hesitate to implicate him in the crime. His alleged complicity is simply too obvious.”

Silverstein may well be innocent, although proximity to the crime, having a motive and high visibility are not elements of ‘vindication.’ On the contrary, they justify intense scrutiny of Silverstein’s actions.

If Davidsson and Watzal had spent some time reading yours truly instead of fabricating statements and attributing them to me, they would know that I explain this. I contend that self identified Jews hardly conspire, they prefer to act in the open. Whether it is AIPAC, J-STRET, CFI, The CRIFF, Soros, Kushner or Israeli war crimes in Gaza, Jewish action is not disguised. Jewish power, on the other hand, is the power to suppress discussion of Jewish power. Silverstein and Davidsson both provide evidence of my hypothesis. Silverstein acted in the open and Davidsson is obviously committed to suppressing discussion of Israel and Silverstein within the truth movement.

But “what might be the motives for linking Israel to 9/11?” Watzal wonders.

Davidsson answers, “who are better placed as bogeymen than Jews or Israel? The Nazis used this method with great success.”

Apparently Davidsson’s role in the truth movement is identical to JVP’s role in the Palestinian solidarity movement. The self appointed commissars are there to label as ‘Nazis’ those who do not adhere to the ‘correct’ narrative.

At this stage, I am not in any position to assess the role Israel might have played in 9/11. But I can easily evaluate Davidsson and Watzal’s kosher impetus. Both publicly attempt to steer the inquiry away from Israel or anything remotely Zionist.

Finally, Watzal asks Davidsson who did 9/11, to which Davidsson answers “I consider it beyond dispute that the US military planned and executed the mass-murder of 9/11 on behalf of the US elite (which, evidently, includes also persons of Jewish descent).”

Watzal and Davidsson inveigle to move the 9/11 movement to the realm of ‘beyond dispute,’ a territory in which Israel is clean and Silverstein has become a victim. In Davidsson’s ‘beyond dispute’ land, once again, it is Goyim who are killing Goyim. Is it possible that both Davidsson and Watzal are too afraid of the 9/11 truth movement retaining its freedom to explore alternative narratives?

In his invaluable book Heidegger and the Jews, the French philosopher Jean-Francois Lyotard suggested that history claims to tell us what really happened, but in practice, it acts to conceal our collective shame. In the above article I come short of labelling Watzal and Davidsson as Israeli agents or controlled opposition, but it is clear ‘beyond dispute’ who and what the two are working hard to shove under the carpet.

January 2, 2018 Posted by | Deception, Ethnic Cleansing, Racism, Zionism, False Flag Terrorism, Full Spectrum Dominance, Timeless or most popular | , , , | Leave a comment

John Bolton: “Our Goal Should Be Regime Change In Iran”

By Hunter Wallace | Occidental Dissent | January 1, 2018

If you wondered what happened to John Bolton, the neocon throwback who advocated the disastrous Iraq War, he is back to educate normies on how tell deal with Iran.

Follow the money to President Donald Trump:

“Indeed, the influence of these key donors—Sheldon Adelson, Bernard Marcus, and Paul Singer—over U.S. foreign policy, particularly with regards to Iran, doesn’t stop at the White House, where combined they contributed over $40 million to various pro-Trump political groups and causes.

Those three donors also contributed $65 million at the congressional level. That represents nearly half of the individual contributions made to the Senate Leadership Fund (CLF) and Congressional Leadership Fund (CLF), Super PACs dedicated to maintaining Republican majorities in the House and Senate. Those contributions provide a considerable incentive for Hill Republicans to stake out a hawkish position on the JCPOA. …”

The GOP has a lot of shekels riding on this!

Bibi Netanyahu wants you to know it has nothing to do with Israel even though it came the day after the announcement of the Trump administration and Israel’s joint plan to counter Iran.

It is all just one big (((coincidence))).


January 2, 2018 Posted by | Mainstream Media, Warmongering, Timeless or most popular, Video, Wars for Israel | , , , , | Leave a comment

WSJ Said It 6 Months ago: CIA Working to Turn up Heat on Iran

Al-Manar | January 2, 2018

American daily Wall Street Journal had said it clearly six months ago: The Central Intelligence Agency has established an organization in Iran aimed at spying on the Islamic Republic.

“The Central Intelligence Agency has established an organization focused exclusively on gathering and analyzing intelligence about Iran, reflecting the Trump administration’s decision to make that country a higher priority target for American spies,” the WSJ reported last June, citing US officials.

The report said that the mission center “will bring together analysts, operations personnel and specialists from across the CIA to bring to bear the range of the agency’s capabilities, including covert action.”

The CIA did not announce the Iran Mission Center at that time, but it likened it to the Korea Mission Center that the CIA announced earlier in May to address North Korea’s efforts to develop long-range nuclear missiles.

Talking more about the move, the report described CIA Director Mike Pompeo as a longtime Iran hawk, citing his first public remarks since taking the helm at the spy agency, when he warned that Iran was “on the march.”

“Whether its enormous increased capacity to deliver missile systems into Israel from Hezbollah, their increased strength in and around Mosul with the Shia militias, the work that they’ve done to support the Houthis to fire missiles against the Saudis—the list of Iranian transgressions has increased dramatically since the date that the JCPOA was signed,” the WSJ quoted Pompeo as saying then, referring the Joint Comprehensive Plan of Action, the 2015 agreement that Iran struck with the US and other world powers to limit its nuclear program.

“We’re actively engaged in a lot of work to assist the president, making sure he has an understanding of where the Iranians are complying and where they might not be,” the report quoted Pompeo as saying at the Center for Strategic and International Studies in Washington in April.

The report also quoted Mark Lowenthal, a former senior CIA official as saying that the center in Iran was an effort by the agency to bring all its experts together in one place, from the spies who gather information to the analysts who make sense of it.

“We know that combining [intelligence] collectors and analysts together you end up with better analysis and better operations,” Lowenthal said, noting that the center model has been used successfully in other areas.

January 2, 2018 Posted by | Deception, Timeless or most popular, War Crimes | , , | Leave a comment

Facebook ‘Routinely’ Blocking Accounts at US, Israel’s Requests – Giraldi

Sputnik – January 2, 2018

Facebook and other Silicon Valley firms choose to comply with the requests of Washington and Tel Aviv to delete undesired accounts because they fear US and Israeli influential political elites, Philip Giraldi, a former CIA officer, has told Sputnik, adding that the practice, which he described as “illegal,” has become routine.

Glenn Greenwald’s article is completely accurate, Philip Giraldi, a former counter-terrorism specialist and military intelligence officer at the CIA, told Sputnik, commenting on the Pulitzer-Prize winning journalist’s recent op-ed which shed light on Facebook’s controversial practice of blocking accounts of individuals at the request of the US and Israeli governments.

“The blocking of accounts of people who are on lists maintained by the US government has become routine,” Giraldi said. “It is also illegal as the account holders have broken no laws and are in compliance with the rules set up by the sites themselves.”

Greenwald raised the alarm over the supposed state censorship exercised by the social networking service against Palestinian activists and Russian officials.

Citing Al Jazeera and The New York Times, the investigative journalist emphasized the alleged mutual consent reached by the Israeli government and Facebook which resulted in the closure of numerous accounts and pages of Palestinian individuals and media outlets deemed as “inciting violence.”

“That means that Israeli officials have virtually unfettered control over a key communications forum of Palestinians,” Greenwald concluded, suggesting that at the same time “calls by Israelis for the killing of Palestinians are commonplace on Facebook, and largely remain undisturbed.”

According to the journalist, Facebook’s decision to close the account of Ramzan Kadyrov, the leader of the Chechen Republic, Russia, is similarly “disturbing and dangerous.” Greenwald highlighted that while the social media service claims that “Mr. Kadyrov’s [Facebook and Instagram] accounts were deactivated because he had just been added to a United States sanctions list and that the company was legally obligated to act,” Venezuelan President Nicolas Maduro remains active on both platforms despite the fact he is on the same sanctions list.

“Does anyone trust the Trump administration — or any other government — to compel social media platforms to delete and block anyone it wants to be silenced?” Greenwald asked rhetorically.

The CIA veteran says that there is nothing new in what the investigative journalist is describing: “Those of us in the activist community have long been observing how some articles have been blocked or made to disappear.”

“Israel and Jewish groups in the United States have led discussions with Facebook, Google and other sites to restrict what they choose to describe as hate speech. They have been successful, obtaining the agreement of those companies to set up standards that will in effect limit any criticisms of Israel and permit criticism of the Palestinians and other Arabs,” Giraldi explained.

He noted that “the companies can, in fact, do what they want as they are private entities. However, “if the public begins to understand that they are cooperating with governments to censor their product it will hurt their bottom lines as advertisers will go elsewhere,” he pointed out.

Commenting on what is behind the Silicon Valley giant’s apparent pliability to Washington and Tel Aviv, the ex-CIA officer opined that “the companies for the most part go along with Israel and the US government because they are fearful that the US government will intervene to regulate the system.”

“In the case of Israel, they fear lawsuits from Israel’s many and powerful friends in the United States,” Giraldi suggested.

Regardless of Donald Trump’s assuming office, the United States government has been doing much of the same since the time of the Obama administration, the former intelligence official underscored.

January 2, 2018 Posted by | Civil Liberties, Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance | , , , , | Leave a comment

The Still-Missing Evidence of Russia-gate

By Dennis J. Bernstein | Consortium News | January 1, 2018

A changing-places moment brought about by Russia-gate is that liberals who are usually more skeptical of U.S. intelligence agencies, especially their evidence-free claims, now question the patriotism of Americans who insist that the intelligence community supply proof to support the dangerous claims about Russian ‘hacking” of Democratic emails especially when some  veteran U.S. government experts say the data would be easily available if the Russians indeed were guilty.

One of those experts is William Binney, a former high-level National Security Agency intelligence official who, after his 2001 retirement, blew the whistle on NSA extraordinary breadth of NSA surveillance programs. His outspoken criticism of the NSA during the George W. Bush administration made him the subject of FBI investigations that included a raid on his home in 2007.

Even before Edward Snowden’s NSA whistleblowing, Binney publicly revealed that NSA had access to telecommunications companies’ domestic and international billing records, and that since 9/11 the agency has intercepted some 15 trillion to 20 trillion communications. Snowden has said: “I have tremendous respect for Binney, who did everything he could according to the rules.”

I spoke to Binney on Dec. 28 about Russia-gate and a host of topics having to do with spying and America’s expanding national security state.

Dennis Bernstein: I would like you to begin by telling us a little about your background at the NSA and how you got there.

William Binney: I was in the United States Army from 1965 to 1969. They put me in the Army Security Agency, an affiliate of the NSA. They liked the work I was doing and they put me on a priority hire in 1970.  I was in the NSA for 32 years, mostly working against the Soviet Union and the Warsaw Pact.  I was solving what were called “wizard puzzles,” and the NSA was sometimes referred to as the “Puzzle Palace.”  I had to solve code systems and work on cyber systems and data systems to be able to predict in advance the “intentions and capabilities of adversaries or potential adversaries.”

Bernstein: At a certain point you ran amiss of your supervisors. What did you come to understand and try to tell people that got you in dutch with your higher-ups?

Binney: By 1998-1999, the “digital issue” was basically solved. This created a problem for the upper ranks because at the time they were lobbying Congress for $3.8 billion to continue working on what we had already accomplished.  That lobby was started in 1989 for a separate program called Trailblazer, which failed miserably in 2005-2006. We had to brief Congress on how we were progressing and my information ran contrary to the efforts downtown to secure more funding. And so this caused a problem internally.

We learned from some of our staff members in Congress that several of the corporations that were getting contracts from the NSA were downtown lobbying against our program in Congress. This is the military industrial complex in action. That lobby was supported by the NSA management because they just wanted more money to build a bigger empire.

But Dick Cheney, who was behind all of this, wanted it because he grew up under Nixon, who always wanted to know what his political enemies were thinking and doing.  This kind of approach of bulk acquisition of everything was possible after you removed certain segments of our software and they used it against the entire digital world. Cheney wanted to know who his political enemies were and get updates about them at any time.

Bernstein: Your expertise was in the Soviet Union and so you must know a lot about bugging. Do you believe that Russia hacked and undermined our last election? Can Trump thank Russia for the result?

Binney: We at Veteran Intelligence Professionals for Sanity (VIPS) published an article on this in July. First of all, if any of the data went anywhere across the fiber optic world, the NSA would know.  Just inside the United States, the NSA has over a hundred tap points on the fiber lines, taking in everything. Mark Klein exposed some of this at the AT&T facility in San Francisco.

This is not for foreigners, by the way, this is for targeting US citizens. If they wanted only foreigners, all they would have to do was look at the transatlantic cables where they surface on the coast of the United States. But they are not there, they are distributed among the US population.

Bernstein: So if, in fact, the Russians were tapping into DNC headquarters, the NSA would absolutely know about it.

Binney: Yes, and they would also have trace routes on where they went specifically, in Russia or anywhere else. If you remember, about three or four years ago, the Chinese hacked into somewhere in the United States and our government came out and confirmed that it was the Chinese who did it, and it came from a specific military facility in Shanghai. The NSA had these trace route programs embedded by the hundreds across the US and all around the world.

The other data that came out from Guccifer 2.0, a download from the DNC, has been a charade. It was a download and not a transfer across the Web. The Web won’t manage such a high speed. It could not have gotten across the Atlantic at that high speed. You would have to have high capacity lines dedicated to that in order to do it. They have been playing games with us. There is no factual evidence to back up any charge of hacking here.

Bernstein: So was this a leak by somebody at Democratic headquarters?

Binney: We don’t know that for sure, either. All we know was that it was a local download. We can likely attribute it to a USB device that was physically passed along.

Bernstein: Let me come at this from the other side.  Has the United States ever tried to hack into and undermine Russian operations in this way?

Binney: Oh, sure. We do it as much as anybody else. In the Ukraine, for example, we sponsored regime change. When someone who was pro-Soviet was elected president, we orchestrated a coup to put our man in power.

Then we invited the Ukraine into NATO.  One of the agreements we made with the Russians when the Soviet Union fell apart was that the Ukraine would give them their nuclear weapons to manage and that we would not move NATO further east toward Russia. I think they made a big mistake when they asked Ukraine to join NATO. They should have asked Russia to join as well, making it all-inclusive. If you treat people as adversaries, they are going to act that way.

Bernstein: Did the US meddle in the Russian elections that brought Yeltsin to power?

Binney: I believe they did.  We try to leverage our power and influence elections around the world.

Bernstein: What has your group, Veteran Intelligence Professionals for Sanity, been up to, and what has been the US government’s response?

Binney: We have been discussing privacy and security with the European Union and with a number of European parliaments. Recently the Austrian supreme court ruled that the entire bulk acquisition system was unconstitutional. Everyone but the conservatives in the Austrian parliament voted that bill down, making Austria the first country there to do the right thing.

Bernstein: Is it your goal to defend people’s privacy and their right to communicate privately?

Binney: Yes, to defend privacy but also to defend the Constitution. Right now, our government is violating the first, fourth and fifth amendments in various ways. Mueller did it, Comey did it, they were all involved in violating the Constitution.

Back in the 1990’s, the idea was to make our analysts effective so that they could see threats coming before they happened and alert people to take action so that lives would be saved. What happens now is that people go out and kill someone and then the NSA and the FBI go on a forensics mission. Intelligence is supposed to tell you in advance when a crime is coming so that you can do something to avert it.  They have lost that perspective.

Bernstein: They now have access to every single one of our electronic conversations, is that right? The human mind has a hard time imagining how you could contain, move and study all that information.

Binney: Basically, it is achievable because most of the processing is done by machine so it doesn’t cost human energy.

Bernstein: There seems to be a new McCarthyite operation around the Russia-gate investigation. It appears that it is an attempt to justify the idea that Clinton lost because the Russians undermined the election.

Binney: I have seen no evidence at all from anybody, including the intelligence community. If you look at the Intelligence Community Assessment (ICA) report, they state on the first page that “We have high confidence that the Russians did this.”  But when you get toward the end of the report, they basically confess that “our judgment does not imply that we have evidence to back it up.”

Bernstein: It was initially put out that seventeen intelligence agencies found compelling evidence that the Russians hacked into our election. You’re saying it was actually selected individuals from just three agencies.  Is there anything to the revelations that FBI agents talked about taking action to prevent Trump from becoming president?

Binney: It certainly does seem that it is leaning that way, that it was all a frame-up. It is a sad time in our history, to see the government working against itself internally.

Bernstein: I take it you are not a big supporter of Trump.

Binney: Well, I voted for him. I couldn’t vote for a warmonger like Clinton. She wanted to see our planes shooting down Russian planes in Syria. She advocated for destabilizing Libya, for getting rid of Assad in Syria, she was a strong backer of the war in Iraq.

Bernstein: What concerns do you have regarding the Russia-gate investigation and the McCarthyite tactics that are being employed?

Binney: Ultimately, my main concern is that it could lead to actual war with Russia. We should definitely not be going down that path. We need to get out of all these wars. I am also concerned about what we are doing to our own democracy. We are trampling the fundamental principles contained in the Constitution. The only way to reverse all this is to start indicting people who are participating in and managing these activities that are clearly unconstitutional.

Dennis J Bernstein is a host of “Flashpoints” on the Pacifica radio network and the author of Special Ed: Voices from a Hidden Classroom. You can access the audio archives at www.flashpoints.net.

January 1, 2018 Posted by | Deception, Russophobia, Timeless or most popular | , | Leave a comment

President Trump’s Jerusalem Decision: the End of Hegemony?

By James Petras • Unz Review • January 1, 2018

Introduction

The Trump regime proclaimed that the vote in the General Assembly of the United Nations regarding the recognition of Jerusalem as the capital of Israel was a strategic US decision.

Both President Trump and his bombastic UN Ambassador Nikki Haley threatened that all decisions and agreements regarding alliances, loans, aid and diplomatic relations were at stake.

Moreover, the Trump regime clearly defined the style and substance of US imperial dictates: All UN member nations (large and small) must grovel in the most abject manner to his orders. Ambassador Haley demanded that each nation on earth accept Trump’s and the racist-Zionist Netanyahu’s declaration that the ancient city of Jerusalem is the eternal, undivided and ethnically managed capital of the Jews. Trump’s message was loud and clear – he was the great ‘decider’ and the UN votes would identify America’s true friends and enemies. “We are making a list… and there will be consequences…”

Clearly Trump’s boast of US power and Haley’s assumption that her terrifying threats would ensure that Washington had a majority vote in the ‘gifting’ of Jerusalem to Zio-fascism. They believed that US dominance and global hegemony was absolute and unassailable. The vote proved something else, something very new was happening.

The US suffered an overwhelming and humiliating defeat, one that kept Ambassador Haley’s dexterous fingers busy ‘taking notes’: 128 nations demanded that the Trump regime withdraw its declaration that Jerusalem was Israel’s undivided capital for Jews. Only 9 micro-nations (some mere postage stamps and a few death-squad banana-stans) voted with the Trump-Haley decision, 35 mendicant-states put their heads down and abstained while 21 timorous ambassadors chose to hide their shamelessness in the toilet stalls rather than show up for this important vote.

Political Context

First and foremost it is important to discuss the steps leading up to the US suffering such a crushing debacle. In other words, who was responsible for leading the Trump Administration by the nose down the blind alley of submission to the dictates of Zio-fascism.

The leader and driving force behind the UN disaster was Israeli Prime Minister Benjamin Netanyahu whose quest to seize Jerusalem and convert it into the ‘eternal’ capital of the Jews was his top priority. For decades the entire world has rejected Israel’s seizure of Jerusalem and its conversion into an ethnically cleansed capital for the ‘Jewish’ state. The UN and international jurists denounced Israel’s colonial conquest and ethnic cleansing of Palestine.

Netanyahu took charge with the election of Donald Trump as President. Operation Jerusalem was his first order to Puppet Donald. A number of Israel-First multi-billionaires, who financed Trump’s electoral campaign, demanded an immediate pay-off from their puppet: The Administration’s unconditional support for Netanyahu’s agenda. Despite protests from the rest of the world, especially the US closest European allies, Trump plunged the nation right into the Zionist soup: a Jewish Jerusalem; the systematic eviction of all Arabs, Christian, Muslim and secular, and the eventual annexation of all of Palestine; as well as an increasing military confrontation with Iran.

Real estate speculator, Jared Kushner, Trump’s pampered son-in- law, and a complete Netanyahu flunky, became the senior advisor for the Middle East. Kushner pressured Trump’s National Security Advisor General Michael Flynn to intervene with Russia on behalf of Israel’s take-over of Jerusalem. Flynn was subsequently prosecuted for discussing global US Russian relations and the ‘good soldier’ is falling on his sword on behalf of the Zionists. Not surprising, the Congressional Democrats, the FBI and the Special Prosecutor found it easier to prosecute Flynn for his discussion regarding de-escalating the tense US-Russian relations provoked by the Obama administration than his discussions with the Kremlin in support of Israel’s seizure of Jerusalem!

Netanyahu’s operational weapons in manipulating US policy involved Jared Kushner, the billionaire Israel-First donors, the AIPAC and UN Ambassador Nikki Haley. Tel Aviv succeeded in securing Trump’s commitment to the Israeli agenda, despite opposition from the entire UN National Security Council and the overwhelming majority of the General Assembly. In the style of a typical authoritarian, US President Trump grovels at the feet of his ‘superior’, Israeli Prime Minister Benjamin Netanyahu, while tearing at the throats of his ‘inferiors’, the 193 member nations of the UN General Assembly.

Netanyahu’s vitriolic bar room threats against the entire membership of the UN prior to the vote ensured the repudiation of all Security Council representatives with the exception of his South Carolina puppet, Ambassador Nikki Haley. Trump and Haley backed the blustering Netanyahu by issuing gangland threats to all UN representatives who dare to oppose Washington’s dictates.

In this way, Prime Minister Netanyahu secured the greatest diplomatic and political success of his career – the total submission of the US to his agenda, at the risk of a major humiliation in the UN. This, in effect, formalized Israeli hegemony over Washington, for the world to see.

In contrast to Netanyahu’s beaming success, the US suffered a historic diplomatic defeat: Fourteen times as many nations voted against the demands of the US President over– Netanyahu’s grab of Jerusalem.

What makes the defeat even more striking is the fact that all major allies and most of the biggest aid recipients openly defied the US threats. Eight of the ten biggest US aid recipients voted against Trump–Netanyahu–Haley. This bizarre troika is now left with an enemy list circling the entire globe, and a few timorous allies in the South Pacific and among the death squads of Guatemala.

Trump’s total and puerile embrace of the raving Netanyahu has exposed and widened fissures in US global hegemony.

Apart from ‘capturing’ Netanyahu’s vote, the other pro Trump nations included a handful of insignificant Pacific islands (Marshall Islands, Palau, Micronesia), Togo, a corrupt African mini-state and two banana-sized ‘death squad democracies’, Honduras and Guatemala. The latter two regimes hold power via stolen elections backed by narco-thugs in the pay (dubbed ‘foreign aid’) of the US.

All of the leading Asian and Western European countries voted against Trump. They openly rejected the crude blackmail of the US-Israel duet. Subservient regimes in Eastern Europe, corrupt regimes in Latin America and some horrifically impoverished nations in Africa and Asia chose to abstain or excuse themselves to the bathrooms of Times Square. Narco-neo-liberal regimes in Mexico, Colombia, Paraguay, Panama and the Dominican Republic abstained. Even rightwing Eastern European regimes, which usually give unquestioned support to all US demands, like Romania, Bosnia, Poland and Latvia defied Nikki Haley’s ‘name taking’ by abstaining. The ‘no-shows’ (hiding in the toilets) included US puppets like Georgia, Samoa, St Kitts and Tonga.

An openly humiliated UN Ambassador Haley was left with the task of thanking the abstainers and ‘no-shows’ for their courage and preparing a few bags of goodies (matzos, Mogan David wine and discounts to the brothels of Tel Aviv) for the torturers of Honduras and half-drowned ‘leaders’ of Palau in gratitude for such loyalty.

Conclusion

Clearly Trump’s championing of a racist, colonialist, ethnic cleansing state like Israel is viewed as a strategic diplomatic disaster. The Manhattan egomaniac has tied the US fortunes to the whims of a pariah state led by a complete lunatic.

Trump’s decision to demonstrate total loyalty to his Zionist billionaire campaign ‘donor-owners’ and his Israel-First son-in-law in his first major foreign policy decision failed to impress any of the influential nations of the world – East or West. Indeed, it showed how fractured and dangerously dysfunctional the US Administration had become.

Most important, Trump’s proclamation of a unipolar world based on his notion of the US’s economic power has collapsed. Israel, despite Haley’s bluster and list-taking, has no legitimacy. It’s continued Mossad assassinations of leading Palestinians and others and the increasing IDF slaughter of the spontaneous Palestinian civilian resistance has failed to improve its international standing – except among Guatemalan torturers.

However, it is not clear that the US has lost its big power influence regarding other regional conflicts. The subsequent UN Security Council vote in favor of Washington’s demands for added sanctions against North Korea demonstrated Trump’s power to intimidate the oligarchs and leaders of China and Russia.

In other words, limits on US power still depend on the issues, the allies, the diplomatic appeals, the adversaries and the distribution of benefits and costs.

In the case of Jerusalem, Real Estate Mogul Trump’s bizarre decision to hand an entire city over to the Zionists alienated all Muslims and Christians the world over, as well as the secular Western liberal nations and emerging powers, like Russia and China. The US tied its prestige to the whims of a paranoid nation arrogantly flaunting its racist superiority complex, backed by groups of immensely wealthy overseas dual citizens.

Diplomatically, Israel’s vituperative responses to any legal criticism from world bodies undermines its chances of coalition building.

Finally, Washington’s support for Israel’s perpetual and overt violation of international law and its bombing of humanitarian missions makes Israel a very costly ally.

January 1, 2018 Posted by | Ethnic Cleansing, Racism, Zionism, Illegal Occupation, Timeless or most popular, War Crimes | , , , , , | Leave a comment

Botched reporting- A Reply to The NYT on “How Climate Change Deniers Rise to the Top in Google Searches”

By Leo Goldstein | Watts Up With That? | January 1, 2018

The New York Times remains a slave to climate alarmism even after its miserable failure in Paris on December 12, and continues to push the fossil fuels conspiracy theory. It’s regularly publishing fake news. A NYT piece that appeared on December 29, How Climate Change Deniers Rise to the Top in Google Searches, mentions me, my website DefyCCC, and WUWT, and I take this opportunity to reply. In November and December 2017, I experimented with distributing the climate realism message using advertising options on Google and some other platforms. I will report on the results of this experiment in a separate article.  Apparently, some of my Google ads caught the attention of the NYT. On December 4th, a NYT reporter named Hiroko Tabuchi interviewed me for 45 minutes in preparing for the above NYT piece.

In the interview, I attempted to convince the reporter that the NYT got science wrong, that real scientists are against climate alarmism, and that other countries build coal power plants and more. The reporter was honest in telling me that the NYT piece would be about the ads, not about the climate debate (I hope NYT does not fire her for this act of honesty, unfit for its organizational culture), so I already knew what to expect. However, the piece weaves lies, half-truths, and trivial facts so seamlessly that it elevates fake news into an art form.  I will comment only on some falsehoods related to me.

The only thing that surprised me in the NYT piece was how it used me to link Trump to Russia:

“Of course, people click,” said Mr. Goldstein, who said he had emigrated from Russia two decades ago and had worked in the software and power industries. “Google is the No. 1 advertising choice.”

The proliferation of climate disinformation, both online and off, has coincided with an effort to undermine measures to combat climate change. Republican leaders regularly question climate science and President Trump has called climate change a hoax.

I emigrated from the Soviet Union (not from Russia) before it dissolved in 1991, the dissolution that happened twenty-six years ago. I was born and grew up in the Ukraine, then a part of the Soviet Union. This information is present in the About page of my site. I did not tell the reporter that I “emigrated from Russia two decades ago.” Here, the New York Times has “slightly” changed times and names in order to evoke another conspiracy theory, one of a Trump-Russia collusion. The rest could have been expected. This is how the NYT linked me to the Koch brothers:

DefyCCC, the site that recently bought the “climate change” search term on Google, devotes an entire section of its site to content from WattsUpWithThat, a well-known climate denial site by the blogger Anthony Watts. Mr. Watts has received funding from the Heartland Institute, backed by the billionaire Koch brothers.

Beyond that, little is known about DefyCCC. …

The reporter ran this line (except for the last quoted sentence) by me in the interview. In fact, DefyCCC has no sections at all. It does have a menu, and links to my articles in WUWT are collected under top menu items In WattsUpWithThat and WUWT 2016. I explained that to the reporter. But the NYT still published this line, falsely insinuating that I am connected to the Koch brothers. The next sentence was supposed to cement this lie as truth:

“Beyond that, little is known about DefyCCC.”

This is also a typical line in the hatchet job pieces, used when it cannot find dirt on somebody. For the record, I also told her I have no information about other allegations in that paragraph. Further in the piece, the NYT made another wild insinuation about me:

He received help with his site but would not say who his backers were to protect their privacy.

In the interview, I said I have colleagues and refused to name them. Then, I told the reporter about the shooting of the UAH building as a reason to withdraw personal information. This topic was blacked out by the media, so the NYT didn’t mention it, but made up its own explanation. This is where fake news becomes an art form. In the sentence, the word help (from colleagues or coworkers) is followed by the word backers, subtly turning it into financial support. And then a quote, taken out of context, cements this impression.

Having written about my imaginary backers, the NYT failed to disclose its own. Its largest shareholder is Mexican multi-billionaire Carlos Slim, who was the world’s richest man a few years ago. Mr. Slim has significant investments in oil and natural gas in Latin America, which compete against U.S. oil, gas, and coal industries. The NYT’s attempts to damage the U.S. fossil fuels industry and promote the financial interests of its largest shareholder.

I took record of the insults that the NYT hurled at me, but I will not dignify them with a response.

The NYT piece mentions WUWT and DefyCCC, but it links to neither of our sites. I understand that it doesn’t want to transfer “link equity” or encourage readers to visit them. But, when the NYT wrote about white supremacists, it linked to Stormfront with a perfect, link equity carrying link (3), although it didn’t have to, or could have used a nofollow tag that prevented transfer of link equity. When I checked in September 2017, I found that the top neo-nazi websites received most of their link equity from the leftstream media. Just a note.

I don’t want to finish this article on the NYT links to neo-nazi websites. Sorry, I mean, the links from the NYT site to neo-nazi sites. Reading the NYT is not only misinforming, but also morally degrading. The NYT published two pieces about UFOs in December 2017:  2 Navy Airmen and an Object That ‘Accelerated Like Nothing I’ve Ever Seen’ (in the section Politics) and Dad Believed in U.F.O.s. Turns Out He Wasn’t Alone (in the section News Analysis). Seems to me that the NYT is looking for its niche among tabloids.

Notes

Carlos Slim owned ~17% of class A shares of the NYT until a few months ago. But Class A shares of the NYT elect only about one third of the board. Class B shares are thought to be held by the Ochs-Sulzberger family. Father and son Ochs-Sulzberger have been the NYT publishers since 1963, so the NYT was considered independent from external financial influences. But, in the precarious financial situation into which the NYT painted itself by serving as a propaganda accessory and by false reporting — money ends up mattering more than formal voting rights. Thus, Carlos Slim probably wields or wielded much more power in the editorial room of the NYT than previously thought. To his credit, he is not a liberal. Mr. Slim also owns substantial interest in the tobacco industry around the world, which makes the NYT a sister company of Big Tobacco.

Posts about the New York Times take a good part of the fakestream media category in DefyCCC. Besides printing fake news, it was caught doing near-Orwellian re-writing of its articles to toe the party line. I have even proposed a new logo and byline for it that better reflects its new nature. It can use them free of charge under a Creative Commons license, just like other content of my website.


Addendum by Anthony:

The way the NYT article is written, it implies that WUWT has an ad campaign running in Google Adwords to attract readers. It does not, and never has. We have no advertising budget. The article also implies that WUWT is funded by the Heartland Institute. It is not and never has been. Neither WUWT nor the owner Anthony receives any payroll or regular funding from Heartland. We rely entirely upon advertisements (managed by WordPress.com and a sharing agreement) and donations from readers. In the past, Heartland helped locate a donor for a project, and Anthony has been given a $1000 honorarium and travel expenses to speak at some Heartland conferences on climate change, just like any other speaker, including pro-warming/pro-climate change scientist, Dr. Scott Denning.

Tabuchi also insinuated that WUWT and/or me is funded by the Koch Brothers; this is a laughable falsehood. They have never sent me a dime, either directly or indirectly. They don’t even know who I am and I’ve never had any contact with them or their charitable organization; it’s just a weak conspiracy theory pushed by the weak-minded who would rather take talking points from others than do their own homework.

But, the writer, one unheard of Ms. HIROKO TABUCHI never bothered to ask any questions of me. So as a journalist, she fails miserably based by relying on and writing about her own assumptions.

Is this the best the New York Times can do? Apparently so.

January 1, 2018 Posted by | Deception, Fake News, Mainstream Media, Warmongering, Science and Pseudo-Science, Timeless or most popular | , | Leave a comment