Hear no evil, see no evil, print no evil? MSM warn journalists away from Burisma/Biden info after ‘hack’ report
By Helen Buyniski | RT | January 14, 2020
The US political and media elite have warned any journalist who might think of publishing (or even looking at) material potentially hacked from Ukrainian gas firm Burisma that they’re essentially handing 2020’s election to Russia.
Burisma Holdings – the Ukrainian company where Democratic frontrunner Joe Biden’s son Hunter served as a director – has been hacked, cybersecurity firm Area 1 announced on Tuesday. Area 1 has ties to both the NSA and Crowdstrike, the firm behind 2016’s still-unproven “Russian hacking” allegations, and has fingered “Fancy Bear” – the ‘hacking group’ at the center of those allegations – as the culprit.
No files have been released from the “hack,” but that hasn’t stopped American political and media thought leaders from issuing dire warnings to any journalists thinking of publishing or even reading them if they ever are released. To do so would be giving aid and comfort to the enemy – one step above treason – and nothing less than a capital thoughtcrime, these individuals have suggested.
Daily Beast editor Noah Shachtman put out a notice to his fellow editors warning them to steer clear of any information that could possibly have come from the hack. Since there was no confirmation of any data being copied, planted, or removed in that “hack,” editors might just want to be safe and ignore any negative information that might emerge relating to Biden. Problem solved!
According to Area 1, the Burisma “hack” echoed the setup that brought down Clinton campaign director John Podesta and the Democratic National Committee in 2016 – a phishing scheme in which executives received emails linking to fake login pages and a few hapless dupes fed their passwords to the scammers. Area 1 didn’t share what (if any) data had been accessed or stolen – they merely informed the media that “the timing of the Russian campaign mirrors the GRU hacks we saw in 2016 against the DNC and John Podesta… in what we can only assume is a repeat of Russian interference in the last election.”
As if on cue, 2016’s victim-in-chief, former Secretary of State and almost-president Hillary Clinton, leapt into the fray, lamenting that “Russians appear to be re-running their 2016 hacking playbook.” She warned the media against “playing along” by publishing any ‘hacked’ material, lest “the Russians help pick our POTUS again.”
A CNN reporter weighed in, warning “Russia could leak Burisma emails, and slip in some doctored emails, to harm Biden later on, if he is the Democratic nominee.” Russiagate true-believer Malcolm Nance predicted an oddly specific version of the same thing. And MSNBC took that conspiratorial line public, essentially warning Americans to discard any and all leaked emails, lest a few fakes (or deepfakes!) slip by.
“We are just not clear on what’s real and what’s not anymore,” an ‘expert’ lamented, sounding vaguely panicked.
News of the “hack” follows closely on the heels of anonymous US officials’ claim that “Russian disinformation operations” are targeting Biden – once the surefire Democratic frontrunner, but lately second to Bernie Sanders, Elizabeth Warren, and even Pete Buttigieg, depending on the poll. The Biden campaign seized on news of the “hack” as proof their candidate was still a force to be reckoned with, making sure to get in a dig at President Donald Trump at the same time in campaign spokesman Andrew Bates’ comment to the New York Times. “Any American president who had not repeatedly encouraged foreign interventions of this kind would immediately condemn this attack on the sovereignty of our elections,” he said, surprising anyone who didn’t realize ‘the sovereignty of our elections’ extends deep into Ukraine.
Area 1 specializes in “preemptive cybersecurity,” and asking the entire US news media to ignore any data that might potentially have come from a phishing attack on a Ukrainian energy firm fits that definition rather well. But interfering with freedom of the press in the name of preventing foreign interference means there’s no need for a Russian bogeyman anymore – the political establishment can defeat itself.
Non-commitment probe into Iran by France, Germany & UK ‘groundless,’ only increases tensions around nuclear deal – Russia
RT | January 14, 2020
The European trio’s accusation that Iran violates the key restrictions of the nuclear deal are unjustified, the Russian Foreign Ministry said urging the countries not to increase tensions that could endanger the pact.
Paris, Berlin and London officially reported Iran’s non-compliance with the 2015 agreement to the Joint Commission under the Dispute Resolution Mechanism. This step could potentially lead to the UN Security Council being forced to decide on whether or not to bring back sanctions against Tehran.
“We can’t rule out that the ill-considered actions of the European trio will lead to a new escalation around the JCPOA (Joint Comprehensive Plan of Action) and make the return to the implementation of the ‘nuclear deal’ in its initially agreed format unachievable,” Russia’s Foreign Ministry said in a statement.
Iran rolled back on its uranium enrichment constraints detailed in the international agreement earlier this month after one of its top military commanders, Qassem Soleimani, was assassinated in an American drone strike in Iraq.
Tehran’s decision to put its commitments on hold was a response to the actions of the US, which unilaterally withdrew from the deal in May 2018 and reintroduced restrictions against Iran, the ministry reminded. However, the country keeps allowing the International Atomic Energy Agency (IAEA) monitors to its nuclear sites – and “the transparency of the Iranian nuclear program has been one of the key clauses of the nuclear deal.”
Despite vocally rejecting the US campaign of “maximum pressure” on Iran, France, Germany and the UK are “either not ready or can’t afford to” work on finding effective ways of bypassing the hurdles to the deal created by Washington.
There are also “serious problems” with implementing the side of the deal on the part of the European trio, the ministry said. When all those issues are settled, “Iran would have no reason to retract from the initially agreed framework of the JCPOA.”
Iraqis must resort to resistance if US forces refuse to pull out: Senior Nujaba official
Press TV – January 14, 2020
The deputy secretary general of Iraq’s al-Nujaba Movement says the Iraqi nation must choose the path of resistance in case the parliamentary bill demanding the withdrawal of all US-led foreign military forces from the country is not implemented.
“The Iraqi people must opt for the path of resistance unless the parliament’s decision on the pullout of foreign forces is carried out,” Nasr al-Shammari said in an exclusive interview with Lebanon-based Arabic-language al-Mayadeen television news network on Tuesday.
He added that the decision to expel foreign forces from Iraq does not need a parliamentary mandate, stating that the US-led military coalition purportedly fighting the Daesh terrorist group entered Iraq at the request of Baghdad government and can be removed by a letter from the government as well.
“The decision concerning the removal of foreign forces from Iraq is the only decision taken away from sectarian fault lines. A person of sound mind cannot accept the presence of a foreign state that imposes its own authority on a sovereign country. If getting foreign forces out of Iraq is a charge, then we consider it as an honor for ourselves, our children and our grandchildren,” Shammari pointed out.
He then noted that all Iraqi resistance factions are united to end the presence of foreign troops in the country, saying, “The United States must respect the sovereignty of states and decisions of peoples, and adhere to them.”
“Iraq will not accept being ruled by any country. Any failure to implement the parliament decision on the withdrawal of foreign forces will give the green light for the start of resistance operations,” Shammari highlighted.
The Nujaba official went on to say that Popular Mobilization Units (PMU), better known by the Arabic word Hashd al-Sha’abi, have become more coherent and solid in the wake of the recent US assassination of the second-in-command of PMU, Abu Mahdi al-Muhandis.
“The death of Muhandis does not mean the end of Hashd al-Sha’abi and its role in the region,” Shammari said.
He added that Iraqi resistance groups are indebted to Lieutenant General Qassem Soleimani, the commander of the Quds Force of Iran’s Islamic Revolution Guards Corps (IRGC).
“The resistance against US forces will soon attain its goal of removing foreign troops from the Iraqi soil. The blood of martyrs will finally bring about the demise of the Zionist entity, and the end of its occupation of Arab lands,” Shammari concluded.
Baghdad moving to internationally prosecute US for crimes in Iraq
Meanwhile, a member of the Iraqi Parliamentary Human Rights Committee said the Baghdad government was preparing to prosecute the United States at international courts of law for its crimes in Iraq, noting that the offenses amount to genocide.
“The United States has been committing the most heinous war crimes since 2003 up until now. The invasion of Iraq, the Abu Ghraib prisoner abuse, the Nisour Square massacre and the emergence of Daesh (Takfiri terrorist group) besides the attack on the leaders of Hashd al-Sha’abi are all crimes classified as genocide,” Ahmed al-Kanani said in a statement on Tuesday.
Kanani added, “All the crimes that America has perpetrated against the Iraqi nation are documented, and that there are bids to prosecute Washington for its crimes against Iraqis before international courts.”
On January 5, Iraqi lawmakers unanimously approved a bill, demanding the withdrawal of all foreign military forces led by the United States from the country.
Late on January 9, Iraq’s caretaker Prime Minister Adel Abdul-Mahdi called on the United States to dispatch a delegation to Baghdad tasked with formulating a mechanism for the withdrawal of US troops from the country.
According to a statement released by the Iraqi premier’s office, Abdul-Mahdi “requested that delegates be sent to Iraq to set the mechanisms to implement the parliament’s decision for the secure withdrawal of (foreign) forces from Iraq” in a phone call with US Secretary of State Mike Pompeo.
The prime minister said Iraq rejects violation of its sovereignty, particularly the US military’s violation of Iraqi airspace in the airstrike that assassinated Lt. Gen. Soleimani, Muhandis and their companions.
Abdul-Mahdi asked Pompeo to “send delegates to Iraq to prepare a mechanism to carry out the parliament’s resolution regarding the withdrawal of foreign troops from Iraq,” the statement said.
“The prime minister said American forces had entered Iraq and drones are flying in its airspace without permission from Iraqi authorities and this was a violation of the bilateral agreements,” the statement added.
The US State Department bluntly rejected the request the following day.
Israel to build more detention facilities for Palestinians
Palestine Information Center – January 14, 2020
OCCUPIED JERUSALEM – The Israeli occupation government has approved a plan to build more detention facilities to accommodate thousands of new Palestinian prisoners.
According to Israel’s Channel 7, four prisons will be built to accommodate about 4,000 Palestinians as part of a long-term plan to be finished in 2040.
The project will also include other detention centers, police stations and courts.
The Israeli prison service has 30 prisons and detention centers, the Channel said.
There are about 5,700 Palestinian prisoners in Israeli jails, including 47 women and girls, 250 children, six lawmakers, 500 administrative detainees and 700 patients.
How an Israeli Spy-Linked Tech Firm Gained Access to the US Gov’t’s Most Classified Networks
Graphic by Claudio Cabrera
By Whitney Webb | MintPress News | January 14, 2020
If the networks of the U.S. military, the U.S. intelligence community and a slew of other U.S. federal agencies were running the software of a company with deep ties, not only to foreign companies with a history of espionage against the U.S. but also foreign military intelligence, it would — at the very least — garner substantial media attention. Yet, no media reports to date have noted that such a scenario exists on a massive scale and that the company making such software recently simulated the cancellation of the 2020 election and the declaration of martial law in the United States.
Earlier this month, MintPress News reported on the simulations for the U.S. 2020 election organized by the company Cybereason, a firm led by former members of Israel’s military intelligence Unit 8200 and advised by former top and current officials in both Israeli military intelligence and the CIA. Those simulations, attended by federal officials from the FBI, DHS and the U.S. Secret Service, ended in disaster, with the elections ultimately canceled and martial law declared due to the chaos created by a group of hackers led by Cybereason employees.
The first installment of this three part series delved deeply into Cybereason’s ties to the intelligence community of Israel and also other agencies, including the CIA, as well as the fact that Cybereason stood to gain little financially from the simulations given that their software could not have prevented the attacks waged against the U.S.’ electoral infrastructure in the exercise.
Also noted was the fact that Cybereason software could be potentially used as a backdoor by unauthorized actors, a possibility strengthened by the fact that the company’s co-founders all previously worked for firms that have a history of placing backdoors into U.S. telecommunications and electronic infrastructure as well as aggressive espionage targeting U.S. federal agencies.
The latter issue is crucial in the context of this installment of this exclusive MintPress series, as Cybereason’s main investors turned partners have integrated Cybereason’s software into their product offerings. This means that the clients of these Cybereason partner companies, the U.S. intelligence community and military among them, are now part of Cybereason’s network of more than 6 million endpoints that this private company constantly monitors using a combination of staff comprised largely of former intelligence operatives and an AI algorithm first developed by Israeli military intelligence.
Cybereason, thus far, has disclosed the following groups as lead investors in the company: Charles River Ventures (CRV), Spark Capital, Lockheed Martin and SoftBank. Charles River Ventures (CRV) was among the first to invest in Cybereason and has been frequently investing in other Israeli tech start-ups that were founded by former members of the elite Israeli military intelligence Unit 8200 over the last few years. Spark Capital, based in California, appears to have followed CRV’s interest in Cybereason since the venture capitalist who co-founded Spark and led its investment in Cybereason is a former CRV partner who still has close ties to the firm.
While CRV and Spark Capital seem like just the type of investors a company like Cybereason would attract given their clear interest in similar tech start-ups coming out of Israel’s cyber sector, Cybereason’s other lead investors — Lockheed Martin and SoftBank — deserve much more attention and scrutiny.
Cybereason widely used by US Government, thanks to Lockheed
“A match made in heaven,” trumpeted Forbes at the news of the Lockheed Martin-Cybereason partnership, first forged in 2015. The partnership involved not only Lockheed Martin becoming a major investor in the cybersecurity company but also in Lockheed Martin becoming the largest conduit providing Cybereason’s software to U.S. federal and military agencies.
Indeed, as Forbes noted at the time, not only did Lockheed invest in the company, it decided to integrate Cybereason’s software completely into its product portfolio, resulting in a “model of both using Cybereason internally, and selling it to both public and private customers.”
Cybereason CEO and former offensive hacker for Israeli military intelligence — Lior Div — said the following of the partnership:
Lockheed Martin invested in Cybereason’s protection system after they compared our solution against a dozen others from the top industry players. The US firm was so impressed with the results they got from Cybereason that they began offering it to their own customers – among them most of the top Fortune 100 companies, and the US federal government. Cybereason is now the security system recommended by LM to its customers for protection from a wide (sic) malware and hack attacks.”
Rich Mahler, then-director of Commercial Cyber Services at Lockheed Martin, told Defense Daily that the company’s decision to invest in Cybereason, internally use its software, and include the technology as part of Lockheed Martin’s cyber solutions portfolio were all “independent business decisions but were all coordinated and timed with the transaction.”
How independent each of those decisions actually was is unclear, especially given the timing of Lockheed Martin’s investment in Cybereason, whose close and troubling ties to Israeli intelligence as well as the CIA were noted in the previous installment of this investigative series. Indeed, about a year prior to their investment in the Israeli military intelligence-linked Cybereason, Lockheed Martin opened an office in Beersheba, Israel, where the IDF has its “cyberhub”. The office is focused not on the sales of armaments, but instead on technology.
Marilyn Hewson, Lockheed Martin’s CEO, said the following during her speech that inaugurated the company’s Beersheba office:
The consolidation of IDF Technical Units to new bases in the Negev Desert region is an important transformation of Israel’s information technology capability… We understand the challenges of this move. Which is why we are investing in the facilities and people that will ensure we are prepared to support for these critical projects. By locating our new office in the capital of the Negev we are well positioned to work closely with our Israeli partners and stand ready to: accelerate project execution, reduce program risk and share our technical expertise by training and developing in-country talent.”
Beersheba not only houses the IDF’s technology campus, but also the Israel National Cyber Directorate, which reports directly to Israel’s Prime Minister, as well as a high-tech corporate park that mostly houses tech companies with ties to Israel’s military intelligence apparatus. The area has been cited in several media reports as a visible indicator of the public-private merger between Israeli technology companies, many of them started by Unit 8200 alumni, and the Israeli government and its intelligence services. Lockheed Martin quickly became a key fixture in the Beersheba-based cyberhub.
Not long before Lockheed began exploring the possibility of opening an office in Beersheba, the company was hacked by individuals who used tokens tied to the company, RSA Security, whose founders have ties to Israel’s defense establishment and which is now owned by Dell, a company also deeply tied to the Israeli government and tech sector. The hack, perpetrated by still unknown actors, may have sparked Lockheed’s subsequent interest in Israel’s cybersecurity sector.
Soon after opening its Beersheba office, Lockheed Martin created its Israel subsidiary, Lockheed Martin Israel. Unlike many of the company’s other subsidiaries, this one is focused exclusively on “cybersecurity, enterprise information technology, data centers, mobile, analytics and cloud” as opposed to the manufacture and design of armaments.
Marillyn Hewson, center, poses with Israeli gov. officials at the opening of Lockheed Martin’s facility in Beersheba. Photo | Diego Mittleberg
Haden Land, then-vice president of research and technology for Lockheed Martin, told the Wall Street Journal that the creation of the subsidiary was largely aimed at securing contracts with the IDF and that the company’s Israel subsidiary would soon be seeking partnership and investments in pursuit of that end. Land oversaw the local roll-out of the company’s Israel subsidiary while concurrently meeting with Israeli government officials. According to the Journal, Land “oversees all of Lockheed Martin’s information-systems businesses, including defense and civilian commercial units” for the United States and elsewhere.
Just a few months later, Lockheed Martin partnered and invested in Cybereason, suggesting that Lockheed’s decision to do so was aimed at securing closer ties with the IDF. This further suggests that Cybereason still maintains close ties to Israeli military intelligence, a point expounded upon in great detail in the previous installment of this series.
Thus, it appears that not only does Lockheed Martin use Cybereason’s software on its own devices and on those it manages for its private and public sector clients, but it also decided to use the company’s software in this way out of a desire to more closely collaborate with the Israeli military in matters related to technology and cybersecurity.
The cozy ties between Lockheed Martin, one of the U.S. government’s largest private contractors, and the IDF set off alarm bells, then and now, for those concerned with U.S. national security. Such concern makes it important to look at the extent of Cybereason’s use by federal and military agencies in the United States through their contracting of Lockheed Martin’s Information Technology (IT) division. This is especially important considering Israeli military intelligence’s history of using espionage, blackmail and private tech companies against the U.S. government, as detailed here.
While the exact number of U.S. federal and military agencies using Cybereason’s software is unknown, it is widespread, with Lockheed Martin’s IT division as the conduit. Indeed, Lockheed Martin was the number one IT solutions provider to the U.S. federal government up until its IT division was spun off and merged with Leidos Holdings. As a consequence, Leidos is now the largest IT provider to the U.S. government and is also directly partnered with Cybereason in the same way Lockheed Martin was. Even after its IT division was spun off, Lockheed Martin continues to use Cybereason’s software in its cybersecurity work for the Pentagon and still maintains a stake in the company.
The Leidos-Lockheed Martin IT hybrid provides a litany of services to the U.S. military and U.S. intelligence. As investigative journalist Tim Shorrock noted for The Nation, the company does “everything from analyzing signals for the NSA to tracking down suspected enemy fighters for US Special Forces in the Middle East and Africa” and, following its merger with Lockheed and consequential partnership with Cybereason, became “the largest of five corporations that together employ nearly 80 percent of the private-sector employees contracted to work for US spy and surveillance agencies.” Shorrock also notes that these private-sector contractors now dominate the mammoth U.S. surveillance apparatus, many of them working for Leidos and — by extension — using Cybereason’s software.
Leidos’ exclusive use of Cybereason software for cybersecurity is also relevant for the U.S. military since Leidos runs a number of sensitive systems for the Pentagon, including its recently inked contract to manage the entire military telecommunications infrastructure for Defense Information Systems Agency (DISA). In addition to maintaining the military telecom network, Cybereason is also directly partnered with World Wide Technologies (WWT) as of this past October. WWT manages cybersecurity for the U.S. Army, maintains DISA’s firewalls and data storage as well as the U.S. Air Force’s biometric identification system. WWT also manages contracts for NASA, itself a frequent target of Israeli government espionage, and the U.S. Navy. WWT’s partnership is similar to the Lockheed/Leidos partnership in that Cybereason’s software is now completely integrated into its portfolio, giving the company full access to the devices on all of these highly classified networks.
Many of these new partnerships with Cybereason, including its partnership with WWT, followed claims made by members of Israel’s Unit 8200 in 2017 that the popular antivirus software of Kaspersky Labs contained a backdoor for Russian intelligence, thereby compromising U.S. systems. The Wall Street Journal was the first to report on the alleged backdoor but did not mention the involvement of Unit 8200 in identifying it, a fact revealed by the New York Times a week later.
Notably, none of the evidence Unit 8200 used to blame Kaspersky has been made public and Kaspersky noted that it was actually Israeli hackers that had been discovered planting backdoors into its platform prior to the accusation levied against Kaspersky by Unit 8200. As the New York Times noted:
Investigators later discovered that the Israeli hackers had implanted multiple back doors into Kaspersky’s systems, employing sophisticated tools to steal passwords, take screenshots, and vacuum up emails and documents.”
Unit 8200’s claims ultimately led the U.S. government to abandon Kaspersky’s products entirely in 2018, allowing companies like Cybereason (with its own close ties to Unit 8200) to fill the void. Indeed, the very agencies that banned Kaspersky now use cybersecurity software that employs Cybereason’s EDR system. No flags have been raised about Cybereason’s own collaboration with the very foreign intelligence service that first pointed the finger at Kaspersky and that previously sold software with backdoors to sensitive U.S. facilities.
SoftBank, Cybereason and the Vision Fund
While its entry into the U.S. market and U.S. government networks is substantial, Cybereason’s software is also run throughout the world on a massive scale through partnerships that have seen it enter into Latin American and European markets in major ways in just the last few months. It has also seen its software become prominent in Asia following a partnership with the company Trustwave. Much of this rapid expansion followed a major injection of cash courtesy of one of the company’s biggest clients and now its largest investor, Japan’s SoftBank.
SoftBank first invested in Cybereason in 2015, the same year Lockheed Martin initially invested and partnered with the firm. It was also the year that SoftBank announced its intention to invest in Israeli tech start-ups. SoftBank first injected $50 million into Cybereason, followed by an additional $100 million in 2017 and $200 million last August. SoftBank’s investments account for most of the money raised by the company since it was founded in 2012 ($350 million out of $400 million total).
Cybereason CEO Lior Div speaks at a SoftBank event in Japan, July 21, 2017. Photo | Cybereason
Prior to investing, Softbank was a client of Cybereason, which Ken Miyauchi, president of SoftBank, noted when making the following statement after Softbank’s initial investment in Cybereason:
SoftBank works to obtain cutting edge technology and outstanding business models to lead the Information Revolution. Our deployment of the Cybereason platform internally gave us firsthand knowledge of the value it provides, and led to our decision to invest. I’m confident Cybereason and SoftBank’s new product offering will bring a new level of security to Japanese organizations.”
SoftBank — one of Japan’s largest telecommunications companies — not only began to deploy Cybereason internally but directly partnered with it after investing, much like Lockheed Martin had done around the same time. This partnership resulted in SoftBank and Cybereason creating a joint venture in Japan and Cybereason creating partnerships with other tech companies acquired by SoftBank, including the U.K.’s Arm, which specializes in making chips and management platforms for Internet of Things (IoT) devices.
SoftBank’s interest in Cybereason is significant, particularly in light of Cybereason’s interest in the 2020 U.S. election, given that SoftBank has significant ties to key allies of President Trump and even the president himself.
Indeed, SoftBank’s Masayoshi Son was among the first wave of international business leaders who sought to woo then-president-elect Trump soon after the 2016 election. Son first visited Trump Tower in December 2016 and announced, with Trump by his side in the building’s lobby, that SoftBank would invest $50 billion in the U.S. and create 50,000 jobs. Trump subsequently claimed on Twitter that Son had only decided to make this investment because Trump had won the election.
Son told reporters at the time that the investment would come from a $100 billion fund that would be created in partnership with Saudi Arabia’s sovereign wealth fund as well as other investors. “I just came to celebrate his new job. I said, ‘This is great. The US will become great again,’” Son said, according to reports.
Then, in March of 2017, Son sent top SoftBank executives to meet with senior members of Trump’s economic team and, according to the New York Times, “the SoftBank executives said that because of a lack of advanced digital investments, the competitiveness of the United States economy was at risk. And the executives made the case, quite strongly, that Mr. Son was committed to playing a major role in addressing this issue through a spate of job-creating investments.” Many of SoftBank’s investments and acquisitions in the U.S. since then have focused mainly on artificial intelligence and technology with military applications, such as “killer robot” firm Boston Dynamics, suggesting Son’s interest lies more in dominating futuristic military-industrial technologies than creating jobs for the average American.
After their initial meeting, Trump and Son met again a year later in June 2018, with Trump stating that “His [Son’s] $50 billion turned out to be $72 billion so far, he’s not finished yet.” Several media reports have claimed that Son’s moves since Trump’s election have sought to “curry favor” with the President.
Through the creation of this fund alongside the Saudis, SoftBank has since become increasingly intertwined with Saudi Crown Prince Muhammad bin Salman (MBS), a key ally of President Trump in the Middle East known for his authoritarian crackdowns on Saudi elites and dissidents alike. The ties between Saudi Arabia and SoftBank became ever tighter when MBS took the reins in the oil kingdom and after SoftBank announced the launch of the Vision Fund in 2016. SoftBank’s Vision Fund is a vehicle for investing in hi-tech companies and start-ups and its largest shareholder is the Public Investment Fund of Saudi Arabia. Notably, Son decided to launch the Vision Fund in Riyadh during President Trump’s first official visit to the Gulf Kingdom.
Masayoshi Son, left, signs a deal related to the Vision Fund with Bin Salman in March 2018. Photo | SPA
In addition, the Mubadala Investment Company, a government fund of the United Arab Emirates (UAE), gave $15 billion to the Vision Fund. UAE leadership also share close ties to the Trump administration and MBS in Saudi Arabia.
As a consequence, SoftBank’s Vision Fund is majority funded by two Middle Eastern authoritarian governments with close ties to the U.S. government, specifically the Trump administration. In addition, both countries have enjoyed the rapid growth and normalization of ties with the state of Israel in recent years, particularly following the rise of current Saudi Crown Prince Muhammad bin Salman and Jared Kushner’s rise to prominence in his father-in-law’s administration. Other investments in the Vision Fund have come from Apple, Qualcomm and Oracle’s Larry Ellison, all tech companies with strong ties to Israel’s government.
The Saudi and Emirati governments’ links to the Vision Fund are so obvious that even mainstream outlets like the New York Times have described them as a “front for Saudi Arabia and perhaps other countries in the Middle East.”
SoftBank also enjoys close ties to Jared Kushner, with Fortress Investment Group lending $57 million to Kushner Companies in October 2017 while it was under contract to be acquired by SoftBank. As Barron’s noted at the time:
When SoftBank Group bought Fortress Investment Group last year, the Japanese company was buying access to a corps of seasoned investors. What SoftBank also got is a financial tie to the family of President Donald Trump’s senior advisor and son-in-law, Jared Kushner.”
According to The Real Deal, Kushner Companies obtained the financing from Fortress only after its attempts to obtain funding through the EB-5 visa program for a specific real estate venture were abandoned after the U.S. Attorney and the Securities and Exchange Commission began to investigate how Kushner Companies used the EB-5 investor visa program. A key factor in the opening of that investigation was Kushner Companies’ representatives touting Jared Kushner’s position at the White House when talking to prospective investors and lenders.
SoftBank also recently came to the aid of a friend of Jared Kushner, former CEO of WeWork Adam Neumann. Neumann made shocking claims about his ties to both Kushner and Saudi Arabia’s MBS, even asserting that he had worked with both in creating Kushner’s long-awaited and controversial Middle East “peace plan” and claimed that he, Kushner and MBS would together “save the world.” Neumann previously called Kushner his “mentor.” MBS has also discussed on several occasions his close ties with Kushner and U.S. media reports have noted the frequent correspondence between the two “princelings.”
Notably, SoftBank invested in Neumann’s WeWork using money from the Saudi-dominated Vision Fund and later went on to essentially bail the company out after its IPO collapse and Neumann was pushed out. SoftBank’s founder, Masayoshi Son, had an odd yet very close relationship with Neumann, perhaps explaining why Neumann was allowed to walk with $1.7 billion after bringing WeWork to the brink of collapse. Notably, nearly half of SoftBank’s approximately $47 billion investments in the U.S. economy since Trump’s election, went to acquiring and then bailing out WeWork. It is unlikely that such a disastrous investment resulted in the level of job creation that Son had promised Trump in 2016.
Given that it is Cybereason’s top investor and shareholder by a large margin, SoftBank’s ties to the Trump administration and key allies of that administration are significant in light of Cybereason’s odd interest in 2020 U.S. election scenarios that end with the cancellation of this year’s upcoming presidential election. It goes without saying that the cancellation of the election would mean a continuation of the Trump administration until new elections would take place.
Furthermore, with Cybereason’s close and enduring ties to Israeli military intelligence now well-documented, it is worth asking if Israeli military intelligence would consider intervening in 2020 if the still-to-be-decided Democratic contender was strongly opposed to Israeli government policy, particularly Israel’s military occupation of Palestine. This is especially worth considering given revelations that sexual blackmailer and pedophile Jeffrey Epstein, who targeted prominent U.S. politicians, mostly Democrats, was in the employ of Israeli military intelligence.
Notably, Cybereason’s doomsday election scenarios involved the weaponization of deep fakes, self-driving cars and the hacking Internet of Things devices, with all of those technologies being pioneered and perfected — not by Russia, China or Iran — but by companies directly tied to Israeli intelligence, much like Cybereason itself. These companies, their technology and Cybereason’s own work creating the narrative that U.S. rival states seek to undermine the U.S. election in this way, will all be discussed in the conclusion of MintPress’ series on Cybereason and its outsized interest in the U.S. democratic process.
Whitney Webb is a MintPress News journalist based in Chile. She has contributed to several independent media outlets including Global Research, EcoWatch, the Ron Paul Institute and 21st Century Wire, among others. She has made several radio and television appearances and is the 2019 winner of the Serena Shim Award for Uncompromised Integrity in Journalism.
Iran Jet Disaster Setup
By Soraya Sepahpour-Ulrich and Finian Cunningham – Sputnik – 13.01.2020
The 19-second video published by the New York Times last week showing the moment an Iranian missile hit a passenger jet has prompted much social media skepticism.
Questions arise about the improbable timing and circumstances of recording the precise moment when the plane was hit.
The newspaper ran the splash story on January 9, the day after a Ukrainian airliner was brought down near Tehran. It was headlined: ‘Video Shows Ukrainian Plane Being Hit Over Iran’. All 176 people onboard were killed. Two days later, the Iranian military admitted that one of its air defense units had fired at the plane in the mistaken belief that it was an incoming enemy cruise missile.
“A smoking gun” was how NY Times’ journalist Christiaan Triebert described the video in a tweet. Triebert works in the visual investigations team at the paper. In the same tweet, he thanked – “a very big shout out” – to an Iranian national by the name of Nariman Gharib “who provided it [the video] to the NY Times, and the videographer, who would like to remain anonymous”.
The anonymous videographer is the person who caught the 19-second clip which shows a missile striking Flight PS752 shortly after take-off from Tehran’s Imam Khomenei airport at around 6.15 am. This person, who remains silent during the filming while smoking a cigarette (the smoke briefly wafts over the screen), is standing in the suburb of Parand looking northwest. His location was verified by the NY Times using satellite data. The rapid way the newspaper’s technical resources were marshaled raises a curious question about how a seemingly random video submission was afforded such punctilious attention.
But the big question which many people on social media are asking is: why was this “videographer” standing in a derelict industrial area outside Tehran at around six o’clock in the morning with a mobile phone camera training on a fixed angle to the darkened sky? The airliner is barely visible, yet the sky-watching person has the camera pointed and ready to film a most dramatic event, seconds before it happened. That strongly suggests, foreknowledge.
Given that something awful has just been witnessed it is all the more strange that the person holding the camera remains calm and unshaken. There is no audible expression of shock or even the slightest disquiet.
Turns out that Nariman Gharib, the guy who received the video and credited by the NY Times for submitting it, is a vociferous anti-Iranian government dissident who does not live in Iran. He ardently promotes regime change in his social media posts.
Christiaan Triebert, the NY Times’ video expert, who collaborated closely with Gharib to get the story out within hours of the incident, previously worked as a senior investigator at Bellingcat. Bellingcat calls itself an independent online investigative journalism project, but numerous critics accuse it of being a media adjunct to Western military intelligence. Bellingcat has been a big proponent of media narratives smearing the Russian and Syrian governments over the MH17 shoot-down in Ukraine in 2014 and chemical weapons attacks.
In the latest shoot-down of the airliner above Tehran, the tight liaison between a suspiciously placed anonymous videographer on the ground and an expatriate Iranian dissident who then gets the prompt and generous technical attention of the NY Times suggests a level of orchestration, not, as we are led to believe, a random happenstance submission. More sinisterly, the fateful incident was a setup.
It seems reasonable to speculate that in the early hours of January 8 a calamitous incident was contrived to happen. The shoot-down occurred only four hours after Iran attacked two US military bases in Iraq. Those attacks were in revenge for the American drone assassination on January 3 of Iran’s top military commander, Maj. General Qassem Soleimani.
Subsequently, Iranian air-defense systems were on high alert for a possible counter-strike by US forces. Several reports indicate that the Iranian defense radars were detecting warnings of incoming enemy warplanes and cruise missiles on the morning of 8 January. It does seem odd why the Iranian authorities did not cancel all commercial flights out of Tehran during that period. Perhaps because civilian airliners can normally be differentiated by radar and other signals from military objects.
However, with the electronic warfare (EW) technology that the United States has developed in recent years it is entirely feasible for enemy military radars to be “spoofed” by phantom objects. One such EW developed by the Pentagon is Miniature Air-Launched Decoy (MALD) which can create deceptive signals on enemy radar systems of incoming warheads.
What we contend therefore is this: the Americans exploited a brink-of-war scenario in which they anticipated Iranian air-defense systems to be on a hair-trigger. Add to this tension an assault by electronic warfare on Iranian military radars in which it would be technically feasible to distort a civilian airliner’s data as an offensive target. The Iranian military has claimed this was the nature of the shoot-down error. It seems plausible given the existing electronic warfare used by the Pentagon.
It’s a fair, albeit nefarious, bet that the flight paths out of Tehran were deliberately put in an extremely dangerous position by the malicious assault from American electronic warfare. A guy placed on the ground scoping the outward flight paths – times known by publicly available schedules – would be thus on hand to catch the provoked errant missile shot.
The shoot-down setup would explain why Western intelligence were so quick to confidently assert what happened, contradicting Iran’s initial claims of a technical onboard plane failure.
The disaster has gravely undermined the Iranian government, both at home and around the world. Protests have erupted in Iran denouncing the authorities and the Islamic Revolutionary Guards Corp for “lying” about the crash. Most of the 176 victims were Iranian nationals. The anger on the streets is being fueled by the public comments of Western leaders like Donald Trump, who no doubt see the clamor and recriminations as an opportunity to push harder for regime change in Iran.