Aletho News

ΑΛΗΘΩΣ

Assassination Nation

By Jacob G. Hornberger | FFF | January 13, 2020

We are all familiar with the Pentagon’s and CIA’s torture center and prison camp at Guantanamo Bay Cuba, where the U.S. national-security establishment has knowingly, intentionally, and deliberately destroyed protections guaranteed by the Bill of Rights. Those include the right to a speedy trial, right to effective assistance of counsel, right to be remain silent, right to trial by jury, and right to confront adverse witnesses.

It’s worth noting that that the national-security state’s power to assassinate people also violates the Bill of Rights, specifically the Fifth Amendment, which reads in part as follows:

“No person shall be … deprived of life … without due process of law.”

There are two important points to note about that restriction on the power of the federal government:

One, the restriction is not limited to American citizens. By the use of the word “person,” rather than “citizen,” the protection extends to everyone in the world. The federal government is prohibited from killing anyone, citizen or foreigner, without due process of law.

Two, notice that our ancestors included no exceptions to this restriction. That is, the restriction does not say: “No person shall be deprived of life without due process of law, unless the federal government deems it necessary to protect national security.” There are no exceptions whatsoever.

What is due process of law? The term stretches all the way back to Magna Carta, when the barons of England forced their king to acknowledge that his powers over the people were limited, as compared to omnipotent.

Over the centuries, due process of law has come to mean notice and hearing. When it comes to the government’s power to kill people, that means (1) a formal indictment notifying the person what he is being accused of; and (2) a trial, usually a jury of regular citizens in the community, in which the government must prove guilt beyond a reasonable doubt and in which the accused is free to defend himself.

So, there it is, in clear and succinct language: Our ancestors expressly prohibited U.S. officials from killing people without first providing them formal notice of charges and a trial.

That was America’s established system for more than 150 years. No program of state-sponsored assassinations. No federal program for killing people without due process of law.

That all changed after World War II, when the federal government was converted from a limited-government republic type of governmental system to a national-security state form of governmental system.

A national-security state is a totalitarian type of governmental system. North Korea is a national-security state. So is Egypt. And China, Russia, Cuba. And post-World War II United States.

A national security state is composed of a vast and powerful military establishment, an intelligence agency with omnipotent powers, including the power to assassinate people, and a surveillance agency that has the power to maintain a vast system of secret surveillance over the citizenry and others.

In the early days of the national-security state, the CIA just assumed the power of assassination. There was no congressional law delegating that power to the CIA. The CIA began wielding and exercising the power of assassination on its own, as part of the new national-security state form of governmental structure that had been adopted after World War II.

Almost from its beginning, the CIA established an assassination program, which included the preparation of an assassination manual. The manual trained CIA personnel in the art of assassination and, equally important, in ways to prevent people from recognizing the assassination as being state-sponsored. Making killings look like accidents was one of the methods in which CIA assassins would be trained.

Central to this assassination program was secrecy. The national-security state essentially made an implicit deal with the American people: we will exercise dark-side, totalitarian-like powers, including the power to kill people without due process of law, in order to keep you safe, but we will also keep it secret so that you don’t have to be bothered about what we are having to do to protect national security.

As early as 1953, the CIA assassinated federal military scientist Frank Olson because, they felt, he posed a threat to national security. One year later, it had a list of people targeted for assassination as part of its coup in Guatemala, which ousted the democratically elected president of the country, Jacobo Arbenz, and replaced him with an unelected military dictator. That kill list is still classified by the CIA as top secret. In 1961, there was the CIA conspiracy to assassinate Congo leader Patrice Lumumba. In the early 1960s, there were the repeated CIA attempts to assassinate Cuban leader Fidel Castro. In 1963, there was the CIA assassination of President John F. Kennedy. In 1973, there was the CIA orchestration of a military coup in Chile, during which the Chilean national-security establishment tried to assassinate the democratically elected president of the country, Salvador Allende, with missiles fired from the military’s jet planes.

It was all kept top secret, until the 9/11 attacks. From that day forward, the national-security establishment’s program of state-sponsored assassinations came out into the open and became recognized as an official program of the U.S. government, one fully confirmed by the federal judiciary. That’s how the Pentagon and the CIA have turned America into an assassination nation, one in which the U.S. government wields and exercises the power to deprive anyone it wants, including both American citizens and foreign citizens, of life without due process of law, in violation of the Fifth Amendment to the U.S. Constitution.

January 13, 2020 Posted by | Civil Liberties, Timeless or most popular | , , | Leave a comment

“Will Not Comment on Recent Events in Jammu & Kashmir”: Detainees Being Released Sign Gov’t Form

Sputnik | January 12, 2020

Thousands were detained under India’s Public Safety Act, a law that allows authorities to imprison someone for up to two years without charge or trial, in Jammu and Kashmir before the Narendra Modi-led government revoked Articles 370 of the Constitution, stripping the state of its special status on 5 August.

The detained people, who are being released after five months of imprisonment, have to sign a bond where they say they will not make any comment or statement on the “recent events” in Jammu and Kashmir.

The bond, signed under Section 117 of the Code of Criminal Procedure (CrPC), includes Section 107, which states that the executive magistrate has the power to apprehend any individual for not more than a year on information that a person is likely to disturb peace and public tranquillity.

“I undertake that in case of release from the detention, I will not make any comment(s) or statement(s) or make public speech(s), (or) hold or participate in public assembly(s) related to the recent events in the State of Jammu and Kashmir, at the present time, since it has the potential of endangering the peace and tranquillity and law and order in the State or any part thereof for a period of one year,” section two of the bond reads.

Nearly 4,000 people were arrested and some political leaders were detained after the revocation of Article 370, over fears of outbreaks of unrest and “most of them were flown out of Kashmir because prisons here have run out of capacity”, news agency AFP had quoted an official as saying.

The government bifurcated the state into two federally-administered territories – Jammu and Kashmir and Ladakh. The union territory then imposed a communications clampdown as new charges for mobile phone services were imposed. Postpaid mobile calling and messaging services along with broadband internet have been resumed, but internet services remain suspended. India’s apex court has termed the restrictions unconstitutional.

A delegation of envoys from 15 countries such as the United States, South Korea, Vietnam, Bangladesh, Maldives, Morocco, Fiji, Norway, Philippines, Argentina, Peru, Niger, Nigeria, Togo and Guyana visited the Jammu and Kashmir on 9 January.

January 12, 2020 Posted by | Civil Liberties, Full Spectrum Dominance | , , | Leave a comment

I Was Harassed, Wrongfully Detained, Then Had “Evidence” Planted On Me At the Airport

By Eric Striker • National Justice • January 9, 2020

It all started yesterday evening when I arrived at Pittsburgh International Airport in the rustbelt township of Moon, Pennsylvania for a flight to Boston.

I approached the Kiosk to print my ticket and immediately got an error, asking I go get my boarding pass from the airline’s main booth. I followed the instructions.

There, the woman typed my information in and made a phone call. After a lengthy 20 minutes, she gave me the phone and asked me to “listen” while she briefly walked away. This most likely was a way to get whatever Department of Homeland Security surveillance team to identify me and watch me through the camera.

Shortly after, my ticket printed with the dreaded SSSS – Secondary Security Screening Selection. This is the first time it has ever happened to me (I last flew less than a year ago). The SSSS list is reserved for suspected terrorists and criminals, of which I am neither. There are millions of people on the list, with random samplings finding that up to 40% of people on it have inaccurately registered records. Furthermore, a federal judge last September found that the practice is unconstitutional. I’ve been traveling largely by bus and car to work on news stories or visit friends so I was caught off guard.

Little did I know I was in for an annoying and long night, but I didn’t expect how bad it would be. I have heard from other peaceful dissidents and journalists that they have been harassed like this at the airport for the past year.

I used the restroom then approached the TSA line. They took me to a separate, cordoned off section and began the invasive and downright ridiculous process.

As one man meticulously poked and prodded my frank-n-beans from every angle, a senior citizen checked every nook and cranny of my wallet along with the bristles of my toothbrush for…I’m not sure exactly. I made sure that none of my electronics (phones and laptops) were being illegally searched, which they didn’t, they only ask you to turn them on.

In the commotion (at least 7 TSA agents surrounded me) a woman was asking me for personal information, like my latest home address. My response to her was to ask whether it was mandatory to give it to her. She did not say whether it was mandatory, but kept asking over and over again for my information and I refused to give it. I don’t have anything to hide, but the principle stands.

When the search concluded (about 20-30 minutes), they found a secondary phone I use that happened to be out of batteries. They asked me to turn it on, which I agreed to but needed to charge it. The TSA supervisor told me it was against protocol, and escorted me with all of my stuff back outside to charge my phone, telling me that I would have to do the search all over again from scratch.

At this point I was going to miss my flight. I summoned the supervisor again, who was very polite and friendly to my face, to demand a place where I can complain for my atrocious treatment and that I be compensated for my airline ticket. I informed him that I was a journalist and that being treated like a member of Al Qaeda on my way to a domestic flight was confusing and humiliating.

He gave me a TSA card and in my frustration over the bullshit I had just endured, decided to leave the airport to find different transportation to my destination that would be free of these silly theatrics.

As I walked away, a female police officer named Deb Spotts approached me to ask me why I had gone into the TSA security and back out. I told her they had asked me to go out and charge my phone. She then demanded to know why I had used the bathroom, to which I responded “to take a piss.”

She asked me for identification, and my response was to ask her if I was being detained and was free to leave over and over again. She radio’d her Sergeant, Michael Kuma, who gave the order to arrest me. Multiple police officers, including one carrying an assault weapon, grabbed me and put me in handcuffs.

The entire time I was loudly asking in front of others in the airport lobby why I was being detained, what their probable cause was, and that I wanted to call a lawyer. The police officers transporting me told me that they did not know why I was being detained, which is absurd.

I specifically told the officers that I did not consent to any search of any of my belongings, which they mostly respected. My things were put in a bucket in front of my cell and I was in there for about an hour.

Finally, Sergeant Kuma emerges with his team. I asked him for an explanation.

According to Kuma, the TSA inspectors had “felt” two bullets in one of the tight sleeves of my flight jacket. I have never owned a firearm nor have been shooting.

I asked Kuma why I was not dogpiled and detained during the TSA special suspected terrorist screening process if they thought I was trying to bring bullets on board. Kuma’s response is that bringing bullets on a flight was not illegal, which is a flagrant lie!

I then gave Kuma permission to search my jacket and show me the supposed bullets in my possession. He took his time, briefly got the jacket out of my sight, then acted like he was struggling to get the “bullets” out.

Then, all the cops smiled at me while Kuma said “oh wow, they’re only pen caps!”

He then pulled out black bullet-shaped pen caps from my jacket as I looked on in disbelief. I don’t carry or use pens at all.

I showed the pen cap to a friend who actually runs an office supply store. He said the weird bullet shaped plastic caps might belong to a mechanical pencil, which I also do not carry around and have never while owning the jacket I was wearing. Kuma I believe threw one of them away, but when I realized what was going on I said “no, that’s my property, I’ll keep it” for the second one.

These were beyond all reasonable doubt planted on me after they put me in handcuffs. Judging from the big sarcastic smiles on the police officers’ faces as I was finally let out of my cell, they were planted on me at the precinct, probably by Sergeant Kuma himself when he needed an excuse for why I was being locked up.

I then obtained the Sergeant’s business card, with a phone number on the back to be able to get the police report of my illegal arrest. He told me to wait a while because it takes time to get it in the system. I have a funny feeling this police report will never materialize but will be trying anyway.

These kinds of shenanigans are so stupid I’m almost tempted to laugh about this myself. I’m relieved they didn’t plant actual bullets on me, though that would’ve added a whole new layer of bullshit for them too. This type of petty corruption would be a joke if it wasn’t part of a wider system the federal government has in place that has no law enforcement value and is intended solely to intimidate and inconvenience journalists and people with First Amendment protected opinions they don’t like.

The big question I have, and will be investigating, is how did I get on the SSSS list, along with many others I know who engage in peaceful advocacy or dissent? Why in the last year, and all of my life, have I flown without any problems prior to this?

The Department of Homeland Security keeps the criteria for being a “selectee” very private, likely due to the civil liberties ramifications of the system as they drastically expand how many people are targeted and why. As someone who hasn’t even been harassed by the FBI or accused of anything, occam’s razor tells me that in my case and others, they are using a purely political criteria. The only scenario for what just happened is that they are deferring to the Southern Poverty Law Center for names and adding them to the list uncritically. If it came out, it would be a scandal, as the SPLC is a highly discredited, agenda-ridden and universally despised organization.

There is a small chance that it is a case of mistaken identity, but I doubt it. I will be looking into applying for the DHS Traveler Redress Inquiry Program (TRIP) and will see what they tell me.

National Justice is over the target indeed!

January 11, 2020 Posted by | Civil Liberties | , , | Leave a comment

“Zipper Killing” Americans: A Police Tactic Of Killing People In A Hail Of Gunfire

MassPrivateI | January 9, 2020

Have you ever tried to get someone’s attention because they forgot to pull up their fly? Perhaps you have tried to use hand signals or made eye contact with them in a discreet attempt to get them to zip up their fly.

Well, America’s police have figured out a way to make sure a person will never forget to pull up their zipper.

As the above video explains, police are being taught to ‘start shooting a suspect low on the pelvic girdle and work their way up to the face or on the brain housing group’ like a zipper.

The instructor’s use of words, “pelvic girdle and brain housing” are designed to make it easier for cops to justify using their weapons like a zipper on human beings.

Police zippering citizens in the brain housing gives new meaning to an old Korean War term, “zipper heads” that was used to describe American troops running over Asians with a jeep.

“The soldiers claimed that the tire tracks from the jeeps left a pattern resembling that of a closed zipper along the corpse.” (To find out how American soldiers referred to Japanese as zipper heads click here.)

This past December, The Appeal, revealed that in California, the Vallejo Police Department’s officers have been “zipper killing” people for a decade.

“The newly released records also show that Vallejo police supervisors who reviewed fatal and non-fatal shootings for potential policy violations and training purposes praised officers for using a zipper drill method of firing. An officer using this method fires numerous rounds into an adversary, starting low in the target’s body and zipping the barrel of the gun up toward the person’s head while continuously shooting.”

In what version of America is this not horrifying: Pre-9/11 or post-9/11? And why have only three police “zipper killings” been criticized?

Cops are praised for “zipper killing” Americans

credit: the truth about guns

According to the Appeal, police supervisors have only criticized three officers for not “zipper killing” suspects.

“From 2010 through 2018, only three officers’ firearms tactics were criticized by supervisors. One of the officers was criticized for not using a method, taught by the department, that involves firing more shots at a murder suspect. Another shot at a suspect while police and passing motorists were in his line of fire. The third shot a rifle over the heads of other officers to kill an armed man.”

Being criticized for not shooting a suspect numerous times? What has happened to American policing?

Supervisors commended a police officer for continuously firing at an unarmed suspect until he collapsed from being zippered to death!

“Sgt. Joe Iacono, who reviewed Kenney’s shooting of Barrett, determined that Kenney was entirely within department policy when he killed the unarmed man. Iacono wrote that Kenney used a pattern of fire consistent with how the department trains its officers to shoot. He did not simply use two rounds and reevaluate as was taught in the past, Iacono wrote. Instead, Kenney continuously fired into the unarmed man’s legs, arms, and body until he collapsed and stopped moving.”

Another supervisor wants the FBI to teach every police officer to “zipper kill” Americans.

“Sgt. Kent Tribble wrote in a report about the incident that the department’s firearms instructors should step away from the outdated FBI failure drill (two to the body, one to the head), and instead have firearms instructors all teach the more industry standard Zipper drill.”

Why isn’t this headline news? Have police killings of Americans become so commonplace that zipper killings are viewed with indifference by the mass media?

For anyone out there who still clings to the idea that America’s police are not militarized: please, please try and explain why cops have been “zipper killing” Americans for ten years.

January 11, 2020 Posted by | Civil Liberties | , | Leave a comment

Interpol Activates Arrest Warrant Against Morales at Bolivia’s Request – Interior Minister

Sputnik – 09.01.2020

The International Criminal Police Organization (Interpol) has activated an international arrest warrant for former Bolivian President Evo Morales per the Bolivian government’s request, according to the country’s interior minister, Arturo Murillo.

“I have given the order at 6:00 [10:00 GMT on Wednesday] to Interpol to activate the international order [against Morales]”, Bolivian President Evo Murillo said during a press conference on Wednesday, as quoted by the state Agencia Boliviana de Informacion.

He added that it was important for Morales be held to account for his actions in his own country.

In December, the Bolivian authorities issued an arrest order for ousted Morales, accusing him of sedition, terrorism, and sponsoring terrorism. Morales claimed he was not afraid of the warrant, calling it illegal and unconstitutional.

Late last year, Bolivia experienced a change in leadership following mass protests against the results of the October general election. Morales stepped down as president on November 10 and fled to Mexico. Most of Bolivia’s senior officials resigned in his wake. This resulted in the senate’s second vice speaker, opposition lawmaker Jeanine Anez, declaring herself interim president. Morales has characterized the situation as a coup.

January 9, 2020 Posted by | Civil Liberties | , | Leave a comment

MAS Can Get Over 40 Percent of Vote Even Without Morales as Its Candidate – Bolivian Journalist

By Ekaterina Blinova – Sputnik – 09.01.2020

Bolivia’s highest electoral body has set the date for the country’s general vote. Although Evo Morales’ Movement Towards Socialism (MAS) was eventually allowed to participate, the chances of the de facto government committing fraud to upend a MAS victory are high, says Alberto Echazu, a journalist from the media platform La Resistencia Bolivia.

On Sunday, the Supreme Electoral Tribunal of Bolivia declared that the country would hold a general vote on 3 May 2020 with the candidates having to be submitted to the electoral authority by 3 February.

The de facto government in La Paz, meanwhile, continues to crack down on Evo Morales’ supporters and leftist media sources.

Alberto Echazu, a journalist with the left-wing media outlet La Resistencia Bolivia, which has recently been subjected to arrests and intimidation, has described the unfolding situation as the country braces for new general elections.

Sputnik: The Supreme Electoral Tribunal (TSE) of Bolivia announced on 31 December that Evo Morales’ MAS will be able to participate in the 2020 general elections. Why did the de facto interim government request TSE to decide the fate of MAS? Did they hope to somehow weaken MAS’ positions or expel the party from the election race? What are MAS’ chances in the upcoming May 2020 elections and what obstacles could the party face, in your opinion?

Alberto Echazu: The de facto regime is trying to block and nullify MAS’ legal status as a national party so that it cannot be an electoral option in the upcoming elections. Using the false idea that MAS is the party of a government that committed fraud, the regime is trying to criminalise it and expel it from the election race. This is all because they are very aware of MAS’ strength, it being the only party that can obtain a vote higher than 40 percent even without Evo Morales as its candidate.

Some media sources have performed surveys of how residents intend to vote, and despite MAS’ candidate not having been decided yet, the party is leading in the polls against a group of right-wing candidates such as Fernando Camacho, Carlos Mesa, and others.

MAS has every chance of winning the elections as it is still the biggest and strongest party nationwide, however, the chances of the regime actually committing fraud in order to avoid a MAS victory are fairly high. The regime has not held back from using every resource at hand, regularly violating constitutional rights and even international treaties and international human rights.

Sputnik: Who are the most likely MAS presidential candidates to take part in the 2020 general elections? What’s your take on the candidacy of Andronico Rodriguez, named by some media outlets as Morales political heir? Is he charismatic enough to unify the Left?

Alberto Echazu: The most likely MAS’ pairing is Luis Arce as presidential candidate and Andronico Rodriguez as vice president. Luis Arce was Evo Morales’ minister of economy and is seen as the one responsible for the country’s economic stability and success in the last 14 years.

The economic model, labelled Modelo Económico Social Comunitario Productivo (Social Communal Productive Economic Model) was one of the most important reasons behind Bolivia’s economic miracle, giving Arce a great reputation and prestige among the urban middle class, him being the main thinker behind it. He is also highly respected among MAS’ supporters as he was not only a technical cadre in Morales’ government but also very committed politically, having been a member of the Socialist Party before joining Morales’ government.

Andronico Rodriguez has great charisma among MAS’ supporters as he was named Morales’ successor and is seen as an important young cadre. Because of his age he is not expected to be the presidential candidate (he is 30 years old).

This pairing has great acceptance among MAS’ supporters and could receive a large number of votes, both of them being very respected figures and having Morales’ trust and blessing.

Sputnik: Could you please shed light on the political persecution of leftist journalists, in particular, La Resistencia Bolivia, that provided the coverage of the Bolivian coup. Have any international human rights organisations or entities protecting journalists paid attention to these incidents so far?

Alberto Echazu: Political persecution against members of the alternative media platform La Resistencia Bolivia, of which I am a member, is due to our work broadcasting and informing about the coup in our country and all of the assassinations and violations of human rights during the coup and the de facto government.

The regime silenced the rest of the media that tried to inform with some kind of impartiality as soon as it took power and forced to halt the broadcast of any media outlet that refused to comply with the regime’s policies of legitimising the coup and the de facto government.

Two members of La Resistencia Bolivia were arrested on New Year’s Eve. The charges are “sedition” and “misuse of state assets”, even though the police have no evidence. They have been unjustly detained for a week and spent New Year in judicial cells. It is all clearly for political reasons.

The timing of the detentions was strategically planned so that there was not any social protest or support against this injustice, but in spite of that there has been a lot of support on social media, and as people go back to normality after the festive period the denouncing of this abuse has increased, given that La Resistencia has gained a lot of respect and followers for being almost the only media outlet left that informs about what is going on in Bolivia.

In that regard, different human rights organisations have expressed their solidarity towards our detained members and the persecution against the platform like Defensoría del Pueblo (People’s Defence), and Asociación de Madres de Plaza de Mayo from Argentina, but the police intimidation of society in general has stopped people from protesting, as happened in other cases of abuse and arrests as well.

January 9, 2020 Posted by | Civil Liberties | , , | Leave a comment

Cloud Extraction Firms Are Offering Your Most Personal Data to the Government With Little Oversight

By Mohamed Elmaazi – Sputnik – January 7, 2020

A UK civil liberties charity says surveillance technology firms offer the ability to access and copy vast amounts of personal data, including from social media accounts, emails, messenger programmes, health monitors, and many more applications, all without any clear legal guidelines

Privacy International is sounding the alarm about highly intrusive surveillance technology currently on offer to the government agencies worldwide, with little to no legal oversight. The UK-based civil liberties charity published its latest report, Cloud extraction technology: the secret tech that lets government agencies collect masses of data from your apps, on 7 January 2020.

It examines the tech being sold to policing agencies which gives them access  to “cloud data” or information which is stored on third party storage devices. Applications which store immense amounts of data on “clouds” include Twitter, Instagram, Facebook and My Space, any e-mail account like Gmail or YahooMail, location trackers, health monitors like the Fitbit wristwatch, and storage software like Drop Box, Google Cloud Storage, and iCloud. Even encrypted messenger apps like WhatsApp store conversations on a cloud whenever a user backs up their conversations, for example to transfer them to a new phone.

In 2017 surveillance tech firm Cellebrite, an industry leader, celebrated the amount of data available saying:

“Private cloud-based data represents a virtual goldmine of potential evidence for forensic investigators.”

Cellebrite Data Available on Mobile Phones Vs Cloud Data

Cellebrite Data Available on Mobile Phones Vs Cloud Data Pg 2

Continuous Access to Personal Data of Millions of People

The report is based on publicly available information, freedom information requests, and Privacy International’s own technical analysis. It is important to note that once someone has accessed the cloud data of an individual they can continue to get live updates to the cloud, even after a device is returned to its owner.

The type of information which surveillance tech firms say they can access is:

  • emails,
  • social media activity,
  • account and device details (including passwords),
  • contacts,
  • user activity,
  • incoming and outgoing messages,
  • calendars,
  • notifications,
  • user created lists,
  • created/installed skills, and
  • preferences.

In pitching one of their surveillance programmes, Cellebrite suggests to its clients that access to people’s an Amazon user’s search history and wish list “can indicate suspicious behaviour leading up to a crime”.

Another surveillance tech firm, Oxygen Forensic, says that they can provide access to a user’s “actual voice”, when speaking to their digital devices such as Alexa, which they say offers “tremendous insights into the user’s everyday activity, their contacts, shared messages, and valuable voice commands.”

Privacy International Legal Safeguards Are Needed

Privacy International says that all of this technology is being used in a “vacuum of legal standards” and that many people don’t even know that this tech exists, let alone that it is being used against them. They say that legal protections and safeguards need to rapidly evolve to take into account the growing capability of surveillance technology and the potential threat they pose to civil liberties.

The report ends by calling for an immediate independent review of the surveillance technology and the current legal regime as it stands, with consultation taken from the public, industry, and police.

The report’s authors argue that there must be a clear legal basis before authorities can store or analyse anyone’s cloud data and that a warrant must be needed before such data can be accessed.

January 7, 2020 Posted by | Civil Liberties, Deception, Timeless or most popular | , , | Leave a comment

Israel army chief censor in talks to join notorious spyware firm NSO

MEMO | January 6, 2020

The Israeli military chief censor is in talks to join notorious Israeli cyber surveillance company NSO Group, which has been embroiled in a number of scandals over the use of its software to target human rights activists and political dissidents.

According to Globes, Brigadier General Ariella Ben Avraham is “negotiating” to join NSO Group as soon as possible; currently scheduled to be discharged from the military in June, Ben Avraham has “asked to bring her release forward”. The role “will apparently focus on regulation and media.”

Founded in 2010, NSO “has developed a range of cyber intelligence products”, reported Globes, with the company’s lead product, Pegasus, “described as a surveillance tool, and the company says that it is devised to help governments and espionage organizations prevent terrorist acts”.

However, as Globes noted, NSO Group has been embroiled in a number of scandals where their “software has allegedly been used to spy on journalists and opponents of unsavoury regimes”.

Just last month, the Guardian revealed that the mobile phones of at least two dozen Pakistani government officials were allegedly targeted in 2019 with technology owned by NSO Group.

Last October, Facebook – as the owner of WhatsApp – filed a lawsuit against NGO, accusing the company of “unauthorised access and abuse” of its services.

The lawsuit claimed intended targets included “attorneys, journalists, human rights activists, political dissidents, diplomats, and other senior foreign government officials.”

Globes reported that a Tel Aviv court is currently “hearing a lawsuit against NSO seeking to find the company liable for spying on opponents of the regime in Saudi Arabia.”

“The court dismissed NSO’s petition to dismiss the claim,” the report added, and also dismissed NSO’s request “to bar publication of the legal proceedings against it.”

The court will thus hear “the question of the company’s responsibility for the use of its products.”

READ ALSO:

Israel tech ‘facilitating press freedom abuses around the world’

January 6, 2020 Posted by | Civil Liberties, Full Spectrum Dominance | , | Leave a comment

Why a Shadowy Tech Firm With Ties to Israeli Intelligence Is Running Doomsday Election Simulations

Graphic by Claudio Cabrera for MintPress News
By Whitney Webb | MintPress News | January 4, 2020

Election Day 2020: 32 Americans dead, over 200 injured, martial law declared and the election itself is canceled. While this horrific scenario seems more like the plot of a Hollywood film, such was the end result of a recent simulation examining the preparedness of U.S. officials from the Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS) and the U.S. Secret Service against “bad actors” seeking to undermine the upcoming presidential election.

Yet, this simulation was not a government-organized exercise but was instead orchestrated by a private company with deep ties to foreign and domestic intelligence services, a company that is also funded by investors with clear connections to individuals who would stand to benefit if such a catastrophic election outcome were to become reality.

Much of the rhetoric since the last presidential election in 2016 has focused on the issue of foreign meddling by U.S. rival states like Russia, while China has emerged as the new “meddler” of choice in American corporate media as the 2020 election approaches. Though time has revealed that many of the post-2016 election meddling claims were not as significant as initially claimed, the constant media discussion of foreign threats to U.S. democracy and electoral processes – whether real or imagined – has undeniably created a climate of fear. 

Those fears have since been preyed upon by neoconservative groups and the U.S. military-industrial complex, both of which are hardly known for their love of democratic processes, to offer a series of ready-made solutions to these threats that actually undermine key pillars of American democracy, including independent reporting and voting machine software.

However, many of the very same media outlets and groups that frequently fretted about Russia, China or another rival state meddling in U.S. democracy have largely ignored the role of other nation states, such as Israel, in efforts to sway the last U.S. election in 2016 and meddle in numerous elections in Africa, Latin America and Asia in the years since.

As a consequence of this climate of fear, it should be hardly surprising that the corporate media lauded the recent 2020 election simulation that ended in an abysmal failure for U.S. officials, the cancellation of the U.S. election and the imposition of martial law. Yet, none of those reports on the exercise noted that the company that hosted the simulation, called Cybereason, is led by ex-members of Israel’s military intelligence unit 8200, advised by former top and current officials in both Israeli military intelligence and the CIA. In addition, it is funded by and partnered with top U.S. weapons manufacturer and government contractor Lockheed Martin and financial institutions with clear and direct ties to Saudi Crown Prince Mohammed bin Salman and White House adviser and the president’s son-in-law Jared Kushner. Also left unmentioned in media reports on Cybereason’s election simulations is the fact that Cybereason’s CEO, Lior Div, has openly admitted that he views his work at Cybereason as a “continuation” of his service to Israel’s intelligence apparatus.

With Cybereason planning to host more simulations in cooperation with federal agencies as the U.S. election inches closer, a deeper exploration of this company, its ties to intelligence and military contractors in the U.S. and Israel and its financial ties to key Trump allies both domestically and abroad warrants further investigation.

In this two part series, MintPress will not only explore these aspects but also how many of the technologies wielded by the “bad actors” in the Cybereason election simulation have been pioneered and perfected, not by U.S. rival states, but by Israeli companies and start-ups with clear ties to that country’s intelligence apparatus.

Also notable is the fact that Cybereason itself has covertly become a major software provider to the U.S. government and military through its direct partnership with Lockheed Martin, which followed the defense company’s decision to open an office at the Israeli military’s new cyber operations hub in the Negev desert. In examining all of these interlocking pieces, a picture emerges of a potentially sinister motive for Cybereason’s simulations aimed at gauging how U.S. federal officials respond to crisis situations on Election Day.

Understanding “Operation Blackout”

In early November, a team of “hackers” working for the private U.S.-based, Israeli-founded company Cybereason conducted a 2020 election simulation with members of various U.S. agencies, namely the DHS, FBI and the U.S. Secret Service. The simulation was organized by Cybereason and the law firm Venable and the U.S. agencies in attendance were invited and appear to not have been charged to participate.

The simulation, titled “Operation Blackout,” was set in a fictional swing state called “Adversaria” and pitted “ethical hackers” from Cybereason against a team of federal and local law enforcement officials. The opposing teams were supervised by a “white team” composed of members of Cybereason’s staff and Ari Schwartz — a former member of the White House’s National Security Council and the National Institute of Standards and Technology (NIST) — who set the rules of the simulation and would ultimately decide its outcome. Schwartz also used to work for the Center for Democracy and Technology (CDT), a major backer of Microsoft’s ElectionGuard software.

Operation Blackout did not involve hackers targeting election software or voting machines, instead, it focused on civilian infrastructure and psychological operations against the American citizens in the fictitious “Adversaria” on election day. The hacker team was led by Cybereason co-founder Yonathan Striem-Amit, a former contractor for Israeli government agencies and a former operative for the elite Israeli military intelligence Unit 8200, best known for its cyber offensives against other governments.

“In a country as fragmented as the US, the number of people needed to influence an election is surprisingly small,” Striem-Amit told Quartz of the exercise. “We attempted to create havoc and show law enforcement that protecting the electoral process is much more than the machine.”

Streim-Amit’s team completely devastated the U.S. law enforcement team in Operation Blackout by not only causing chaos but murdering numerous civilians. Hackers took control of city buses, ramming them into civilians waiting in line at polling stations, killing 32 and injuring over 200. They also took control of city traffic lights in order to cause traffic accidents, used so-called “deepfakes” to conduct psychological operations on the populace and created fake bomb threats posing as the terror group ISIS, which incidentally has its own ties to Israeli intelligence. Telecom networks and news outlets within the fictitious states were also hacked and flooded with deepfakes aimed at spreading disinformation and panic among U.S. citizens.

A map of targets in Adverseria is shown during Operation Blackout in Boston’s John Hancock Tower. Mark Albert | Twitter

The supervising team, composed of Cybereason employees and former NSC member Ari Schwartz, decided that the outcome of the face-off between the hacker and law enforcement teams was the outright cancellation of the 2020 election, the declaration of martial law by authorities, the growth of public fear regarding terrorism and allegations of U.S. government collusion with a foreign actor. Cybereason has stated that they will soon conduct another 2020 election simulation with federal authorities as the election draws closer.

Given how the simulation played out, it is quite clear that it is a far cry from the actual scope of alleged foreign meddling during the 2016 election, meddling which was allegedly the motivation behind Operation Blackout. Indeed, the extent of Russian interference in the 2016 election amounted to $100,000 worth of Facebook ads over three years, 25 percent of which were never seen by the public, and claims that Russian state actors were responsible for leaking emails from the then-Democratic presidential nominee Hillary Clinton and the Democratic National Committee (DNC). In contrast, Operation Blackout went well beyond any observed or even imagined “foreign meddling” related to the 2016 election and appears more like a terror attack targeting elections than a covert means of manipulating their outcomes.

Several mainstream publications have covered Operation Blackout but have failed to note that the company behind them has deep ties to foreign intelligence outfits and governments with a documented history of manipulating elections around the world, including the 2016 U.S. election.

Quartz framed the exercise as important for “preparing for any and all possibilities in 2020,” which “has become an urgent task for US regulators and law enforcement.” Similarly, CyberScoop treated the simulation as a “sophisticated exercise to help secure the vote.” Other articles took the same stance.

A series of simulations

In the weeks after the Washington area election simulation, Cybereason repeated the same exercise in London, this time with members of the U.K. Intelligence agency GCHQ, the U.K. Foreign Office and the Metropolitan Police. The law enforcement team in the exercise, which included the U.K. officials, was headed by a Cybereason employee — Alessandro Telami, who formerly worked for the NATO Communications and Information Agency (NCI). Like the prior simulation conducted in the U.S., Cybereason did not appear to charge U.K. government agencies for their participation in the exercise.

Cybereason has — with little fanfare — been promoting extreme election day scenarios since before the 2016 election. Cybereason’s first mention of these tactics appears in a September 2016 blog post written by the company’s CEO and former Israeli government contractor Lior Div — a former leader of offensive cyberattacks for the IDF’s elite Unit 8200 and a former development group leader at the controversial Israeli-American corporation Amdocs.

Div wrote that hackers may target U.S. elections by “breaking into the computers that operate traffic lighting systems and interfering with the ones around polling stations to create massive traffic jams, “hacking polling companies,” and “targeting live election coverage on cable or network television stations.” A follow-up post by Div from October 2016 added further meddling tactics such as “cut power to polling stations” and “mess with a voter’s mind.”

Two years later, Cybereason held its first election meddling simulation, touting many of these same tactics, in Boston. The simulation focused on local and state responses to such attacks and saw Boston-based Cybereason invite Massachusetts state and local officials as well as Boston police officers and a former police commissioner to participate. “Twitter accounts spreading fake news,” “turning off a city’s closed-circuit cameras,” “hacking self-driving cars and navigation apps,” and “targeting a city’s 911 call center with a DDoS attack” were all used in the simulation, which saw Cybereason’s “ethical hackers” attempt to disrupt election day. Media coverage of the simulation at the time framed it as a necessary preparation for countering “Russian” threats to U.S. democracy. Like the more recent simulations, the mock election was canceled and voter confidence in the electoral process was devastated.

This past July, Cybereason conducted a similar simulation with officials from the FBI, DHS and the Secret Service for the first time. That simulation, which also took place in Boston, was remarkably similar to that which occurred in November. One intelligence officer from DHS who participated in the July exercise called the simulation “very realistic.” Another claimed that the simulation was a way of applying “lessons learned from 9/11” by preventing the government’s “failure of imagination” that officials have long alleged was the reason for the government’s inability to thwart the September 11 attacks. Notably, The U.S. military simulated a scenario in which terrorists flew airplanes into the Pentagon less than a year before the September 11 attacks.

In this undated photo from Cybereason’s website, a faux ballot box is shown in the company’s Boston office.

Participating government officials, Cybereason staff and the media have consistently touted the importance of these simulations in securing elections against extreme threats, threats which — to date — have never materialized due to the efforts of foreign or domestic actors on election day. After all, these exercises are only simulations of possibilities and, even if those possibilities seem implausible or unlikely, it is important to be prepared for any eventuality.

But what if the very figures behind these simulations and the investors that fund them had a history of election meddling themselves? Cybereason’s deep ties to Israeli intelligence, which has a documented history of aggressive espionage and election meddling in the United States and in several nations worldwide, warrant a deeper look into the firms’ possible motives and the myriad conflicts of interest that arise in giving it such unprecedented access to the heart of America’s democracy.

What Does Cybereason Do?

Cybereason’s interest in terror events during elections seems out of place given that the company itself is focused on selling technological cybersecurity solutions like antivirus and ransomware protection software, software products that would be minimally effective against the type of threat encountered in the company’s election day simulations.

Cybereason is often described as offering a comprehensive technological defense platform to companies and governments that combines a next-generation antivirus with endpoint detection and response (EDR), which enables the company to respond to typical viruses and malware as well as sophisticated, complex attacks. The platform makes heavy use of artificial intelligence (AI) and cloud computing and specifically uses Amazon Web Services (AWS), which is used by a litany of private companies as well as U.S. intelligence agencies.

While many cybersecurity platforms combine antivirus and antimalware with EDR and AI, Cybereason claims that their military background is what sets them apart. They have marketed themselves as offering “a combination of military-acquired skills and cloud-powered machine learning to endpoint detection and response” and actively cite the fact that most of their employees are former members of Unit 8200 as proof that they are “applying the military’s perspective on cybersecurity to enterprise security.”

In 2018, Cybereason’s former senior director for intelligence, Ross Rustici, described the platform to CBR as follows:

Our founders are ex-Israeli intelligence who worked on the offensive side. They basically wanted to build a tool that would catch themselves. We follow the kill chain model started by Lockheed Martin [now a major investor in Cybereason] and try to interrupt every stage once an intruder’s inside a target network.”

Lior Div, Cybereason’s CEO described the difference between his company’s platform and that of past market leaders in this way to Forbes :

The old guard of antivirus companies like Symantec and McAfee would install something to block endpoints and you needed to do a lot [of monitoring] to make sure you weren’t under attack. We came with a different approach to see the whole enterprise and leverage AI to be able to fully autonomously identify where attackers are and what they’re doing.”

Thus, in looking at Cybereason’s product and its marketing objectively, it seems that the only innovative component of the company’s system is the large number of ex-military intelligence officers it employs and its tweaking of a previously developed and automated model for threat engagement, elimination and prevention.

Instead, Cybereason’s success seems to owe to its prominent connections to the private and public sectors, especially in Israel, and its investors who have funneled millions into the company’s operations, allowing them to expand rapidly and quickly claim a dominant position in emerging technology markets, such as the Internet of Things (IoT) and advanced healthcare systems.

A screenshot from a live stream of a 2019 Cybereason cyber-attack simulation

Their considerable funding from the likes of Lockheed Martin and Softbank, among others, has also helped them to expand their international presence from the U.S., Europe and Israel into Asia and Latin America, among other places. Notably, while Cybereason is open about their investors and how much funding they receive from each, they are extremely secretive about their financial performance as a company and decline to disclose their annual revenue, among other indicators. The significance of Cybereason’s main investors in the context of the company’s election simulations and its ties to Israeli and U.S. intelligence (the focus of this article) will be discussed in Part 2.

Cybereason also includes a security research arm called Nocturnus, currently headed by a former Unit 8200 officer. Nocturnus will be explored further in Part 2 of this series, as it essentially functions as a private intelligence company in the tech sector and has been behind several recent claims that have attributed alleged hacks to state actors, namely China and North Korea. For now, it is important to keep in mind that Nocturnus utilizes Cybereason’s “global network of millions of endpoints” for its intelligence gathering and research, meaning the endpoints of every device to which Cybereason’s software has access.

Given what Cybereason provides as a company, their interest in offering election simulations to government officials free of charge seems odd. Indeed, in the simulations hosted by Cybereason for U.S. officials, there is little opportunity for the company to market their software products given that the simulation did not involve electronic voting infrastructure at all and, instead, the malevolent actors used deep fakes, disinformation and terror attacks to accomplish their goals. Why then would this company be so interested in gauging the response of U.S. law enforcement to such crises on election day if there is no sales pitch to be made? While some may argue that these simulations are an altruistic effort by the company, an investigation into the company’s founders and the company’s ties to intelligence agencies suggests that this is unlikely to be the case.

The People Behind Cybereason

Cybereason was created in 2012 by three Israelis, all of whom served together as officers in the Israel Defense Force’s elite technological and signals intelligence unit, which is most often referred to as Unit 8200. Unit 8200 has been the subject of several MintPress investigative reports over the past year focusing on its ties to the tech industry.

Unit 8200 is an elite unit of the Israeli Intelligence corps that is part of the IDF’s Directorate of Military Intelligence and is involved mainly in signal intelligence, surveillance, cyberwarfare and code decryption. It is also well-known for its surveillance of Palestinian civilians and for using intercepted communications as blackmail in order to procure informants among Palestinians living under occupation in the West Bank.

The unit is frequently described as the Israeli equivalent of the NSA and Peter Roberts, a senior research fellow at Britain’s Royal United Services Institute, characterized the unit in an interview with the Financial Times as “probably the foremost technical intelligence agency in the world and stand[ing] on a par with the NSA in everything except scale.” Notably, the NSA and Unit 8200 have collaborated on numerous projects, most infamously on the Stuxnet virus as well as the Duqu malware.

Given the secrecy of the work conducted by Unit 8200, it is hard to know exactly what Cybereason’s co-founders did while serving in the controversial unit, however, a brief biography of the company’s current CEO and co-founder Lior Div states that “Div served as a commander [in Unit 8200] and carried out some of the world’s largest cyber offensive campaigns against nations and cybercrime groups. For his achievements, he received the Medal of Honor, the highest honor bestowed upon Unit 8200 members (emphasis added).”

Lior Div speaks during the Cyber Week conference in Tel Aviv, Israel, June 25, 2019. Corinna Kern | Reuters

After having served in leadership positions within Unit 8200, all three Cybereason co-founders went on to work for private Israel-based tech or telecom companies with a history of aggressive espionage against the U.S. government.

Cybereason co-founders Yonathan Striem Amit (Cybereason’s Chief Technology Officer) and Yossi Naar (Cybereason Chief Visionary Officer) both worked for Gita Technologies shortly before founding Cybereason with fellow Unit 8200 alumnus Lior Div. Gita, according to public records, is a subsidiary of Verint Systems, formerly known as Comverse Infosys.

Verint/Comverse was initially funded by the Israeli government and was founded by Jacob “Kobi” Alexander, a former Israeli intelligence officer who was wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes for over a decade until he was finally extradited to the United States and pled guilty to some of those charges in 2016.

Despite its history of corruption and foreign intelligence connections, Verint/Comverse was hired by the National Security Agency (NSA) to create backdoors into all the major U.S. telecommunications systems and major tech companies, including Facebook, Microsoft and Google. An article on Verint’s access to U.S. tech infrastructure in Wired noted the following about Verint:

In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. ‘Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,’ said Gefen.”

Federal agents have reported systemic breaches at the Department of Justice, FBI, DEA, the State Department, and the White House going all the way back to the 1990s, breaches they claimed could all be traced back to two companies: Comverse/Verint and Amdocs. Cybereason’s other co-founder and current CEO, Lior Div, used to work for Amdocs as the company’s development group leader.

After leaving Amdocs, Div founded a company called Alfatech. Alfatech publicly claims to specialize in “professional Head Hunting and Quality Recruiting services,” yet it has no functional website. Despite its publicly stated mission statement, Israeli media reports that mention Alfatech describe it as “a cybersecurity services company for Israeli government agencies.” No reason for the obvious disconnect between the company’s own claims and those made by the media has been given.

Div left Alfatech in 2012 to found Cybereason alongside Striem-Amit and Naar. According to an interview that Div gave to TechCrunch earlier this year, he stated that his work at Cybereason is “the continuation of the six years of training and service he spent working with the Israeli army’s 8200 Unit (emphasis added).” Div was a high-level commander in Unit 8200 and “carried out some of the world’s largest cyber offensive campaigns against nations and cybercrime groups” during his time there. TechCrunch noted that “After his time in the military, Div worked for the Israeli government as a private contractor reverse-engineering hacking operations,” an apparent reference to his work at Alfatech.

Even deeper ties to intelligence

Not only do Cybereason’s own co-founders have considerable links to the Israeli government, Israeli intelligence and intelligence-connected private companies, but it also appears that the work of Cybereason itself is directly involved with Israeli intelligence.

The company periodically publishes reports by a secretive faction of the company called the Cybereason Intelligence Group or CIG. The only description of CIG’s composition available on Cybereason’s website is as follows:

The Cybereason Intelligence Group was formed with the unique mission of providing context to the most sophisticated threat actors. The group’s members include experts in cyber security and international security from various government agencies, including the Israel Defense Forces’ Unit 8200, which is dedicated to conducting offensive cyber operations. Their primary purpose is to examine and explain the Who and the Why behind cyber attacks, so that companies and individuals can better protect themselves (emphasis added).”

It is unclear how many members comprise CIG and if its members are employees of only Israeli government agencies, or if it includes officials from the U.S. government/Intelligence or other governments. However, what is clear is that it is composed entirely of government officials, which include active members of Unit 8200, and that the purpose of the group is to issue reports that place blame for cyberattacks on state and non-state actors. Perhaps unsurprisingly, the vast majority of CIG’s reports published by Cybereason focus exclusively on Russia and China. When discussing nation-state cyber threats in general, Cybereason’s website only mentions China, North Korea, Iran and Russia by name, all of which are incidentally rival states of the U.S. government. Notably, Israel’s government — listed as a “leading espionage threat” to U.S. financial institutions and federal agencies by the U.S.’ NSA — is absent from Cybereason’s discussions of state actors.

In addition to CIG, Cybereason’s cybersecurity research arm, Nocturnus, includes several Unit 8200 alumni and former Israeli military intelligence and government contractors and has assigned blame to state actors for several recent hacks. It also has claimed to have discovered more such hacks but has declined to publicly disclose them due to the “sensitive” nature of the hacks and companies affected.

Other hints at Cybereason’s connections to state intelligence can be seen in its advisory board. Robert Bigman, the former Chief Information Security Officer (CISO) for the Central Intelligence Agency (CIA) who oversaw the spy agency’s “commercial partner engagement” program (i.e. alliances with the private tech sector), is a key figure on the company’s advisory board. According to his biography, Bigman “ contributed to almost every Intelligence Community information security policy/technical standard and has provided numerous briefings to the National Security Council, Congress and presidential commissions. In recognition of his expertise and contributions, Bigman has received numerous CIA and Director of National Intelligence Awards.”

Cybereason’s leadership team features a who’s who of Israeli and US intel officials

Unmentioned in his biography published on his own website, or on Cybereason’s website, is that Bigman is also an advisor to another Israeli tech company, Sepio Systems. The chairman of Sepio, Tamir Pardo, is a self-described “leader” in the cybersecurity industry and former director of Israel’s Mossad. Sepio is funded by a venture capital firm founded by the creators of the controversial Israeli spy tech company NSO Group, which has received a slew of negative press coverage after its software was sold to several governments who used it to spy on dissidents and human rights activists.

In addition to Bigman, Cybereason’s advisory board includes Pinchas Buchris, the former head of Unit 8200 and former managing director of the IDF. Not unlike Bigman, Buchris’ bio fails to mention that he sits on the board of directors of Carbyne911, alongside former Israeli Prime Minister Ehud Barak and Nicole Junkerman, both well-known associates of intelligence-linked sex trafficker Jeffery Epstein. Epstein himself poured at least $1 million into Carbyne, an Israeli company that seeks to run all 911 call centers in the U.S. at the national level and has close ties to the Trump administration. More information on Carbyne and its ties to Israeli and U.S. intelligence as well as its connection to coming pre-crime policies to be enacted in 2020 by the U.S. Department of Justice can be found in this MintPress report from earlier this year. Given that Cybereason’s election day simulations involve the simulated collapse of 911 call center functionality, Buchris’ ties to both Cybereason and Carbyne911 are notable.

Another notable Cybereason advisor is the former commissioner of the Boston Police Department, Edward Davis. Davis heavily promoted Cybereason’s disturbing election day simulations and even participated directly in one of them. He was also police commissioner of the Boston PD at the time of the Boston Marathon bombing and oversaw the near-martial law conditions imposed on the city during the manhunt for the alleged perpetrators of that bombing (who themselves had a rather odd relationship with the FBI). This is notable given that Cybereason’s election day simulations ended with martial law being imposed on the fictional city used in the exercise

Cybereason also has several advisors who hold top positions at powerful U.S. companies that are also — incidentally — U.S. government contractors. These include the Vice President Security and Privacy Engineering at Google, Deputy Chief Information Security Officer (CISO) of Lockheed Martin and CISO at Motorola. Both Motorola and Lockheed Martin use Cybereason’s software and the latter is also a major investor in the company. Furthermore, as will be explained in Part 2 of this article, Lockheed Martin has used its privileged position as the top private contractor to the U.S. government to promote the widespread use of Cybereason’s software among U.S. government agencies, including the Pentagon.

Much more than a cybersecurity company

Given Cybereason’s deep and enduring ties to Israeli intelligence and its growing connections to the U.S. military and U.S. intelligence through its hiring of top CIA officials and partnership with Lockheed Martin, it’s worth asking if these disturbing election simulations could serve an ulterior purpose and, if so, who would benefit. While some aspects regarding clear conflicts of interest in relation to the 2020 election and Cybereason will be discussed in Part 2, this article will conclude by examining the possibility that Cybereason is acting as a front company for Israeli intelligence based on that country’s history of targeting the U.S. through private tech companies and on Cybereason’s own questionable characteristics.

First, Cybereason as a company presents several oddities. Its co-founder and CEO openly states that he views Cybereason’s work as a continuation of his service for Israeli military intelligence. In addition, he and the company’s other founders — after they left Unit 8200 — went to work for Israeli tech companies that have been known to spy on U.S. federal agencies for the Israeli government.

In addition, as previously mentioned, Cybereason has sought out former intelligence officers from the CIA and Unit 8200 for its management team and board of advisors. The company itself also functions as a private intelligence firm through CIG and Nocturnus, both of which employ former and current intelligence officials, and have made significant claims regarding the attribution of specific cybercrimes to state actors. It appears highly likely that these claims are influenced by those same intelligence agencies that boast close ties to Cybereason. Furthermore, Nocturnus’ access to Cybereason’s “global” network of endpoints makes it a private intelligence gathering company as it gathers and analyzes data from all devices that run Cybereason’s software.

Yet, even more telling is the fact that Israel’s government has an open policy of outsourcing intelligence-related activity to the private sector, specifically the country’s tech sector. As MintPress previously reported, this trend was first publicly acknowledged by Israel in 2012, the same year that Cybereason was founded by former Israeli military intelligence officers then-working for private contractors for Israel’s government (Alfatech) or private companies known to have ties to Israeli intelligence, including Verint/Comverse.

As noted in an article on the phenomenon from the Israeli media outlet The Calcalist:

Israel is siphoning cyber-related activities from its national defense apparatus to privately held companies. Since 2012, cyber-related and intelligence projects that were previously carried out in-house in the Israeli military and Israel’s main intelligence arms are transferred to companies that in some cases were built for this exact purpose.”

Mention of Israel’s policy of blurring the lines between the public and private sector when it comes to cybersecurity and intelligence gathering has even garnered the occasional mention in mainstream media, such as in a 2018 Foreign Policy article:

Israel, for one, has chosen to combat the problem on a statewide level by linking the public and private spheres, sometimes literally. The country’s cyberhub in the southern city of Beersheba is home not just to the Israeli military’s new technology campus but also to a high-tech corporate park, Ben-Gurion University of the Negev’s cyber-research center, and the Israel National Cyber Directorate, which reports directly to the prime minister’s office. “There’s a bridge between them—physically,” [Gabriel] Avner, the security consultant, said by way of emphasis.”

Notably, a year before Lockheed Martin invested in and partnered with Cybereason, the U.S.-based weapons company opened an office at the IDF’s public-private cyber hub in Beersheba. At the inauguration ceremony for Lockheed’s Beersheba office, company CEO Marilyn Hewson stated:

The consolidation of IDF Technical Units to new bases in the Negev Desert region is an important transformation of Israel’s information technology capability… By locating our new office in the capital of the Negev we are well positioned to work closely with our Israeli partners and stand ready to: accelerate project execution, reduce program risk and share our technical expertise by training and developing in-country talent.”

Lockheed Martin CEO Marillyn Hewson, inaugurates the Lockheed Martin Israel Demonstration Center in Tel Aviv.

Further evidence of this public-private merger can be seen in how two of Israel’s intelligence agencies, Shin Bet and Mossad, have both recently launched a private start-up accelerator and a hi-tech venture capital fund, respectively. The Shin Bet’s accelerator, called Xcelerator, usually makes its investments in private companies public, while Mossad’s Libertad Ventures refuses to disclose the tech companies and start-ups in which it invests. Former directors of both Mossad and Shin Bet have described these intelligence agencies themselves of being like start-ups, clearly showing how much the line between intelligence apparatus and private company has been blurred within the context of Israel’s tech industry and specifically its cybersecurity industry.

The advantages of outsourcing cyber intelligence operations to private companies have been noted by several analysts, including Sasha Romanosky, a former Cyber Policy Advisor at the Department of Defense and current analyst at RAND Corporation. Romanosky noted in 2017 that private intelligence and cybersecurity firms “do not necessarily face the same constraints or potential repercussions” as their public counterparts when it comes to designating blame for a cyberattack, for example. In addition, outsourcing intelligence objectives or missions to private companies provides a government with plausible deniability if that private company’s espionage-related activities or ties are made public.

Furthermore, Israeli intelligence has a long history of using private tech companies for the purposes of espionage, including against the United States. While Amdocs and Verint/Comverse were already mentioned as having been used by the state of Israel in this way, other private companies have also been used to market software backdoored by Israeli intelligence to countries around the world, both within the U.S. and elsewhere. The most well-known example of this is arguably the mass sale and distribution of the bugged PROMIS software, which was discussed at length in several recent MintPress News reports.

Given Cybereason’s ties to intelligence and Israeli intelligence’s history of placing backdoors in its software, it is worth pointing out that Cybereason’s main product, its antivirus and network defense platform, offers a major espionage opportunity. Blake Darché, a former N.S.A. operator, told the New York Times in 2017 that antivirus programs, which Cybereason’s defense platform includes, is “the ultimate backdoor,” adding that it “provides consistent, reliable and remote access that can be used for any purpose, from launching a destructive attack to conducting espionage on thousands or even millions of users.” Whether a company like Cybereason would use its software for such ends is unknown, though the company does acknowledge that its cybersecurity arm does gather intelligence from all systems that use the company’s software and currently employs and works with active duty Unit 8200 officials through CIG. This is notable because Unit 8200’s main task for Israeli military intelligence is signals intelligence, i.e. surveillance.

More of a mystery, however, is why a company like Cybereason is so interested in U.S. election security, particularly when Israeli intelligence and Israeli intelligence-connected private companies have been caught in recent years meddling in elections around the world, including the United States.

Whitney Webb is a MintPress News journalist based in Chile. She has contributed to several independent media outlets including Global Research, EcoWatch, the Ron Paul Institute and 21st Century Wire, among others. She has made several radio and television appearances and is the 2019 winner of the Serena Shim Award for Uncompromised Integrity in Journalism.

January 4, 2020 Posted by | Civil Liberties, Deception, False Flag Terrorism | , , , , , , , , , , , | Leave a comment

Declassified files reveal British establishment’s fear of online Irish Republican activity

Sinn Féin has consistently outsmarted the UK in the propaganda war
Press TV – December 31, 2019

Newly declassified files reveal that the British government had anticipated Irish Republican prowess in the online information warfare arena.

According to newly released state papers, the British establishment – led by the intelligence and security community – was fearful of the successful use of the internet for “propaganda purposes” by Irish Republicans, as early as the mid-1990s.

The potential threat to British national security from a Sinn Féin website (in the early days of the internet) was raised by then minister of state at the Home Office, David Maclean.

In a letter to Sir John Wheeler, the then Northern Ireland Office minister, dated March 12, 1996, Maclean wrote: “Amongst the unsavoury nasties were these very professionally produced pages, apparently showing our complete [military] deployment in NI”.

“It horrifies me to find such dangerous and nasty propaganda on the internet”. Maclean added by referencing enclosed documents from the Sinn Féin website which supplied details of British military, Royal Navy, RAF and Royal Irish Regiment numbers.

Maclean tried to raise the issue again in April 1996 at the Northern Ireland Office (NIO) Security Information Group meeting at Stormont Castle.

According to the declassified files, whilst officials learnt that the NIO had a website, it was noted that it was inferior to Sinn Féin’s “sophisticated” website.

The release of the declassified material from a quarter of a century ago coincides with the resurgence of the Irish Unity movement spearheaded by Sinn Féin and other nationalist groups.

Reflecting the growing anxiety of the British establishment, Jonathan Powell, who is a former senior diplomat and Downing Street Chief of Staff under Tony Bair, said recently that Brexit “could lead” to a United Ireland “within a decade”.

January 1, 2020 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular | , | Leave a comment

We Were Warned About the Deep State, but Refused to Listen

By Larry Johnson | Sic Semper Tyrannis | December 30, 2019

Many of the critical tools employed in the coup to paint Donald Trump as a tool of the Russians and to manufacture a pretext for removing him from office, were created more than twenty years ago. I am talking about the surveillance state that the American electorate has ignorantly accepted as necessary in order to keep us safe from terrorists. Despite previous warning from whistleblowers like Russ Tice, Bill Binney, Ed Loomis and Kird Wiebe, no action to rein in the surveillance monster was taken until Edward Snowden absconded with the documents exposing the vast amount spying that the U.S. Government is doing to its own citizens. But even those weak efforts to supposedly rein in the NSA proved to be nothing more than mere window dressing.

The spying got worse. Just ask Donald Trump and the members of his campaign that were targeted first by the CIA and NSA and then by the FBI. Fundamental civil rights were trampled.

The real irony in all of this is that Barack Obama, as President, took credit for helping revise the laws in order to prevent the spying exposed by Edward Snowden. But under the Obama Administration, spying on political opponents–both real and perceived–escalated. We know for a fact that journalists, such as James Rosen and Sheryl Atkinson, were targets and their communications and computers attacked by the U.S. Government.

We know, thanks to a memo released by Judge Rosemary Collyer, that “FBI consultants” were making illegal searches of NSA material using the names of Donald Trump, his family and members of his campaign staff.

Some of this NSA material came courtesy of the Brits and their collection on U.S. targets. Some of this material came from the NSA’s own collection and storage of all electronic communications and was obtained using a nifty NSA tool called XKEYSCORE. Listen to Ed Snowden’s description. Also, take time to appreciate the irony that CNN and other journalists were actually trying to report real news. Now they are full blown apologists for the abuse of the intelligence collection tools.

Six years ago, former NSA Technical Director for Military and Geopolitical Issues, Bill Binney, and Russ Tice, a former NSA analyst, appeared on the PBS News Hour. Once again, they make very clear the enormous nature to the threat to our civil liberties.

Too bad Donald Trump did not listen to their warning.

Given the robust, wide ranging ability of the NSA to probe all communications by any person in the United States, it is remarkable that no real dirt on Donald Trump was ever uncovered. Had such information existed, it would be in the NSA’s storage vaults in Utah and crooked CIA analysts under Brennan’s direction would have found it and used it. But that did not happed. The best the intel folks could fabricate were the salacious claims attributed to reports ostensibly created by former British spy, Christopher Steele. Turns out that the titillating account that Trump hired hookers to perform coprophilia (could of been worse, coprophagia) was nothing more than idle bar talk.

What has happened to Donald Trump can happen to any of us. It is time to take this threat seriously and put the intel agencies back into a properly monitored corral. Otherwise, we will lose this Republic.

January 1, 2020 Posted by | Civil Liberties, Timeless or most popular | , | Leave a comment

Sputnik Estonia Journalists to Terminate Employment Over Threats – Rossiya Segodnya

Sputnik – December 31, 2019

Sputnik Estonia journalists are forced to terminate their employment starting January 1, 2020, over a fear of criminal prosecution in the country, Rossiya Segodnya International Information Agency said, slamming the Estonian government’s pressure on the journalists as a totalitarian campaign violating the freedom of speech.

“Due to the threat of criminal prosecution by the Estonian authorities under an article envisioning up to five years of imprisonment, Sputnik Estonia employees have been forced to make a decision to terminate their employment with the agency starting January 1, 2020. Sputnik Estonia and Rossiya Segodnya support this decision of their employees”, Rossiya Segodnya said in a statement, adding that it does not find it possible to put the journalists’ freedom at risk.

“We consider the Estonian regime’s actions targeting the citizens of our country as overt bullying, lawlessness, a manifestation of totalitarianism and a gross violation of the principles of freedom of speech, which has no precedents in the European Union. The only thing the journalists are ‘guilty’ of is working for a Russian media outlet,” the agency added.

Harlem Desir, the Organization for Security and Co-operation in Europe’s representative on freedom of the media, has already said that EU sanctions on Dmitry Kiselev cannot be extended on Sputnik Estonia journalists, the news agency added.

“We will take all the necessary steps, legal and others, to enable Sputnik journalists to work without fear of criminal prosecution by Estonian security structures”, Rossiya Segodnya said, adding that the operation of the Sputnik Estonia website will be resumed later, although it will take time.

The information agency called on all the international and European organisations to express their position regarding Tallinn’s steps, and thanked global politicians and journalists for their support.

The Estonian Police and Border Guard Board warned Sputnik Estonia earlier in December that its journalists could face criminal prosecution unless they severed their ties with the Moscow-based parent news agency, Rossiya Segodnya, by 1 January. The Estonian authorities cited the 2014 European Union’s sanctions, imposed on a range of entities and persons in light of the events in Ukraine, as a pretext for the possible legal action.

December 31, 2019 Posted by | Civil Liberties, Full Spectrum Dominance | | Leave a comment