FBI Starts Going After US Citizens Who Attend Iran-linked Conference – Reports
Sputnik – August 11, 2019
The US Federal Bureau of Investigation (FBI) is going after American citizens who have already attended or plan to attend the New Horizon Conference (NHC) held by an Iranian media expert to discuss major global issues.
A Virginia-based ex-Pentagon official said FBI agents were knocking at his door at 6:30 am in May, cited by Medium.com. Michael Maloof had travelled to Mashhad in northeast Iran to attend last year’s NHC and was one of the guests invited to the next conference which is to be held in the Lebanese capital of Beirut in September. The agents, however, warned him of consequences if he decides to attend.
In July, the FBI reportedly sent agents to the Florida home of Scott Rickard, a former translator with the US Air Force and the US National Security Agency (NSA) who once attended New Horizon, also warning him to skip the conference or face arrest.
The bureau also reportedly approached former State Department diplomat J. Michael Springmann, asking him over the phone to attend a meeting and answer a few questions about the conference, but he turned down the request. Vernellia Randall, an African American academic who wrote the book “Dying while Black,” and who attended the conference in Tehran in 2015, was also visited by the FBI.
Hicks said the FBI’s intimidation techniques set a “new low” in America’s approach to its relationship with Tel Aviv, where it has constantly backed the regime despite its many atrocities against the people of Palestine, Lebanon and more recently Syria. Later Hicks told Press TV that the FBI turned up at his door and warned him that New Horizon was being held by what they called “Iranian intelligence” without giving any evidence.
Nader Talebzadeh, the renowned Iranian intellectual and journalist who chairs the New Horizon organization, has filed a petition with the Treasury, appealing the decision.
“The consequence of your highly inaccurate and inflammatory allegations have had the result of seriously damaging our reputation, costing us a major loss of business and longtime friendships,” he wrote in the petition, adding that the NHC is a forum for free thought and expression of these thoughts.
See also:
Israeli elements behind US ban on New Horizon; FBI harassment of guests: Ex-diplomat
8chan: The Latest Fearporn Drive
Guardian in Hysterics Over Threat of Homeless, Anonymous Shitposters
By Kit Knightly | OffGuardian | August 9, 2019
The Problem
8chan may have been shut down, but that doesn’t mean we’re safe.
You see, all the people that used 8chan before it was shut down are still out there. They might be on Twitter. They might be on Facebook. They might be ordering coffee at a Starbucks. They might be plotting some sort of far-right apocalypse. They might just be talking about movies on reddit. There’s no way of knowing.
We should all be terribly worried.
At least, according to The Guardian, who headline today:
8chan: ex-users of far-right site flock to new homes across internet
First off, of course, 8chan was not a “far-right site”, it was a site with some “far-right” people on it.
There are hundreds of boards on 8chan, with thousands upon thousands of different posters. Boards could be created by anyone to discuss anything.
The vast majority were dedicated to perfectly ordinary topics. Video games, fashion, cars, movies. There were many much more specific, fetishy, niche and weird… but not “far-right”. The site didn’t have an ideology except “free speech”.
The general shifting of “free speech” from something we all take for granted to being described as a “far-right agenda” is one of the most worrying trends in modern politics.
The article is actually funny, not least for the total lack of web literacy on display:
Former members of 8chan have scattered across the internet after the far-right site was shut down over the weekend
This is simply ridiculous to anyone who knows anything about the nature of 8chan et al. There are no “members”. That, indeed, is the whole entire point of the place. It is anonymous and temporary. No usernames, no registration, no “membership”.
The press has a long history of simply not being able to grasp the way the internet works (as in the famous “Who is this 4chan?” CNN interview or Fox’s “internet hate machine” piece), but this is such basic ignorance of the topic at hand that I almost can’t believe it’s genuine.
Indeed, it might not be. It might be that portraying “8chan” as some sort of organized community plays into the media’s need to generate fear. This generates, “the problem”, which sets us up for…
The Reaction
Having established that 8chan’s “far-right” “members” are out there in the ether, being terrifying, the article needs to get some feedback on what that means.
To do this they go to two “consultants”:
- Joan Donovan, who runs the Technology and Social Change (TaSC) Research Project
- Ben Decker the CEO of “Memetic Consultancy” (sic. It’s actually “Memetica”).
They are portrayed as two essentially different voices, as if we’re getting a spectrum of opinion. But the most cursory check on Donovan and Decker shows they are both research fellows at the Shorenstein Institute of the Kennedy School of Government. They aren’t separate. At all.
(NOTE: In fact, Memetica, Shorenstein, and other NGOs currently talking up the need for internet censorship are a ripe subject for a full-on exposé, and will be in the near future)
Not at all surprisingly, being research fellows for the same institute at the same university, Decker and Donovan absolutely agree on pretty much everything.
Primarily, that shutting down 8chan was a really good idea, but won’t – on its own – solve the “far-right” problem.
Apparently, all the people that posted on 8chan will NOT flee the internet forever, but will now just go and post somewhere else. Why anyone would need two Harvard-trained academics to tell them this, I don’t know.
Where will they go?
Well, other scary places of course. Like the “far-right forum” Gab, or back to 4chan or reddit. Some of them will be “absorbed” by the social media giants (meaning they will post on Twitter and Facebook), and some will post in discussions on encrypted message services like Telegram and Discord.
For some reason, Gab is a real bugbear for centrists, being regularly attacked simply for existing. Its one claim to infamy is that the Pittsburgh synagogue shooter apparently had a Gab account…this, apparently, makes it a far-right social network.
Niche and independent networks are always attacked by-association in this way. The Dayton shooter and “MAGABomber” both had twitter accounts, and the Christ Church attack was live-streamed on Facebook…but they are not shut down.
The Solution
Having established that shutting down 8chan was brilliant, but more is needed, our two NGO representatives set out what else needs to be done:
One way to prevent 8chan users from migrating to alternative social media spaces like YouTube and Facebook would be to build a moat around the platforms to prevent inbound links from these sites,”
This is total, complete nonsense. 8chan is gone, so “preventing inbound links” from it is now moot. Secondly, users don’t click from 8chan to YouTube, or Facebook or whatever. That’s not how the internet works. This would never control users crossposting, or prevent people having different accounts on different platforms or anything like that.
All this would do is prevent people from linking to sources. It stops the flow of information, not users. If Ben is really a “social media consultant”, he knows that. He’s just dishonestly suggesting censorship on totally spurious grounds.
There is an inherent value in deplatforming the site as a whole and making it harder to be accessed because the nature of these communities makes it difficult to inoculate the spread of this toxicity.”
Just “deplatform” websites “as a whole” if they are “toxic”. That’s the solution. Who decides what’s “toxic”?
Well, obviously the government does. Duh.
That’s just the start though. Whilst these Harvard academics give us the problem a reaction and just a hint of “solution”, elsewhere on the Guardian we are presented with a full, detailed (final?) solution.
Julia Ebner – another researcher for yet another creepy-sounding NGO the “Institute for Strategic Dialogue” – headlines:
How do we beat 8chan and other far-right sites? The same way we beat Isis
Essentially, as CJ Hopkins has written, this is just a rebranding of the War on Terror for a modern age. More like a remake, actually, to use Hollywood parlance. The same themes, the same characters. New dialogue. Different casting.
Bellingcat got in on this one too, hosting an article claiming:
Until law enforcement, and the media, treat these shooters as part of a terrorist movement no less organized, or deadly, than ISIS or Al Qaeda, the violence will continue.
(NOTE: The ISIS comparison is more than apt. Now would be a good time to remember just how phony and manipulated the ISIS narrative was. Catte did excellent work on this.)
Julia writes that what we need is:
a stronger international response to condemn political rhetoric that belittles, legitimises or even endorses the dangerous concepts and conspiracy theories of far-right extremists.
Translation – Governments cooperating to suppress free speech. “Conspiracy theories” can, and will, mean absolutely anything they want it to mean. The DNC fixing the primaries for Clinton, for example. Or the Skripals being poisoned by MI6. Press bias against Corbyn. Criticism of Israel, or even mentioning the “Labour Friends of Israel”. These can all be defined as “conspiracy theories”.
On top of this Julia wants:
an international definition of terrorism that is ideologically agnostic and includes not only traditional jihadi organisations but also loose far-right networks.
Translation – An international definition of terrorism that is loose enough to be deployed against anybody for anything.
“Terrorism” will become even more absurdly vague than it is now. These “loose far-right networks” will mean “anybody who posts on Gab”, or “anyone who thinks 9/11 was an inside job”. Joining certain Facebook groups, visiting certain websites (there was actually a meme about this one). Watching RT. She says “loose”, and she means it.
It will shock you how “loose” these networks are. You’re probably in one, right now, just for reading this article. Welcome to our “loose network of far-right extremists”.
Most importantly Julia thinks…
… governments will need to look beyond the big tech platforms and introduce legal frameworks that tackle the ongoing migration of extremists to the smaller alt-tech sites.
Translation – Banning certain opinions from the big platforms that cooperate with the state is not enough. We then need to move against the smaller, independent platforms that – unlike Google, Facebook and Twitter – refuse to toe the party line.
Censor Twitter, and shutdown any platform – like Gab or Parler – that attempts to fill the “free speech” market niche. The state machine will love that, because it gives it control of narrative and information flow, while the social media giants will love it because it essentially writes their monopoly into law. That’s a massive win-win.
In that sense it coincides perfectly with the famous Mussolini definition of fascism – “Fascism should more appropriately be called Corporatism because it is a merger of state and corporate power”
The establishment is signalling intent here – the way they always do when these opportunities are either presented to them, or created by them. Harness that fear, sense the opening, and drive the push through.
It’s all rather like that old joke – “Q: What do you call 1000 lawyers at the bottom of the ocean? A: A good start.”
Q: What do you call one website shut down for allowing free speech?
A: Just the beginning.
Kit Knightly is co-editor of OffGuardian. The Guardian banned him from commenting. Twice. He used to write for fun, but now he’s forced to out of a near-permanent sense of outrage.
An Open Invitation to Tyranny
By Paul Craig Roberts • Unz Review • August 7, 2019
The FBI has published a document that concludes that “conspiracy theories” can motivate believers to commit crimes.
Considering the growing acceptance of pre-emptive arrest, that is, arresting someone before they can commit a crime that they are suspected of planning to commit, challenging official explanations, such as those offered for the assassinations of John F. Kennedy, Robert Kennedy, and Martin Luther King or the official explanation for 9/11, can now result in monitoring by authorities with a view to finding a reason for pre-emptive arrest. Presidents George W. Bush and Obama created the police state precedents of suspension of habeas corpus and assassination of citizens on suspicion alone without due process. If Americans can be preemptively detained indefinitely and preemptively assassinated, Americans can expect to be preemptively imprisoned for crimes that they did not commit.
As Lawrence Stratton and I explained in our book, The Tyranny of Good Intentions, the historic achievement of forging law into a shield of the people is being reversed in our time as law is being reforged into a weapon in the hands of the government.
The FBI document says that conspiracy theories “are usually at odds with official or prevailing explanations of events.” Note the use of “official” and “prevailing.” Official explanations are explanations provided by governments. Prevailing explanations are the explanations that the media repeats. Examples of official and prevailing explanations are: Saddam Hussein’s weapons of mass destruction, Assad’s use of chemical weapons, Iranian nukes, Russian invasion of Ukraine, and the official explanation by the US government for the destruction of Libya. If a person doubts official explanations such as these, that person is a “conspiracy theorist.”
Official and prevailing explanations do not have to be consistent with facts. It is enough that they are official and prevailing. Whether or not they are true is irrelevant. Therefore, a person who stands up for the truth can be labeled a conspiracy theorist, monitored, and perhaps pre-emptively arrested.
Consider 9/11. No forensic investigation of 9/11 was ever officially conducted. Instead the destruction of the buildings was blamed on Osama bin Laden, and scenarios and simulations were created to support the allegation, not to find the truth. Architects, engineers, scientists, pilots, and first responders on site cannot reconcile the official prevailing explanation with the facts. The scientific and testimonial evidence that they have produced is dismissed as “conspiracy theory.” It is those experts who stand on the evidence who are defined as conspiracy theorists, not those who created the story of Osama bin Laden’s 9/11 conspiracy.
Consider Russiagate. Here we have an alleged conspiracy between Trump and Russia that was the official prevailing explanation. Yet, to believe in the Russiagate conspiracy did not make one a conspiracy theorist as this conspiracy was the official prevailing explanation. But to doubt the Russiagate conspiracy did make one a conspiracy theorist.
What the FBI report does, intentionally or unintentionally, is to define a conspiracist as a person who doubts official explanations. In other words, it is a way of preventing any accountability of government. Whatever the government says, no matter how obvious a lie, will have to be accepted as fact or we will be put on a list to be monitored for preemptive arrest.
In effect, the FBI’s document reduces the First Amendment, that is, free speech, to the right to repeat official and prevailing explanations. Any other speech is a conspiratorial belief that can lead to the commission of a crime.
Every American should be greatly concerned that the government in Washington does not see this FBI document as an open invitation to tyranny, repudiate it, and demand its recall.
Did Bill Barr Call His Shot? Unanswered Questions about FBI’s Foreknowledge of the El Paso Shooting
William Barr’s warning that a “major incident” could occur “at any time” and “galvanize public opinion” around the unpopular encryption back-door policy he has been seeking seems to have come true in the weeks since the attorney general made those statements.
By Whitney Webb | MintPress News | August 7, 2019
As a series of recent mass shootings have brought renewed demands for the U.S. government to do something to address the spike in “lone wolf” violence, the Trump administration’s decision to blame internet privacy, controversial websites like 8chan, and social media for the shootings has raised eyebrows from across the political spectrum, particularly in light of claims that Trump’s recent rhetoric about immigrants may have incited some of the shooters.
During a press conference on Monday, Trump blamed the internet for the three most recent mass shooting events:
We must recognize that the internet has provided a dangerous avenue to radicalize disturbed minds and perform demented acts. We must shine light on the dark recesses of the internet and stop mass murders before they start…. The perils of the internet and social media cannot be ignored, and they will not be ignored… We cannot allow ourselves to feel powerless. We can and will stop this evil contagion.”
Yet, not long before the recent spate of mass shootings began, U.S. Attorney General William Barr gave a speech on July 23 in which he spoke of the need for all consumer electronic devices and encrypted software to have a backdoor for the government to bypass encryption, essentially calling for many of the same measures that Trump has proposed following the recent shootings.
Notably, Barr concluded his speech by stating that he anticipated “a major incident may well occur at any time that will galvanize public opinion on these issues.” In other words, just a few days prior to the recent spate of mass shootings, William Barr stated that he anticipated a public safety crisis that “may well occur at any time” and would reduce public resistance to the further erosion of civil liberties that he was advocating for in his speech.
Furthermore, the FBI, which operates under the jurisdiction of the Department of Justice and reports directly to William Barr, has now stated that it was aware of the El Paso shooter’s plan to murder civilians via a post made on 8chan at least two hours before the shooting took place. 8chan — a controversial website that the FBI is known to have used to incite violence as part of its controversial terrorist entrapment strategy — has since been banned in the shooting’s aftermath. In addition, less than two months ago, the FBI obtained a warrant for 8chan’s host — Ch.net — in which the Bureau demanded access to the entire contents of the accounts that were of interest in that specific investigation, suggesting that the FBI had increased access to information of hundreds of 8chan accounts in the lead-up to the recent shootings.
The overlap between Barr’s recent speech and Trump’s proposed solution to the massacres, as well as the FBI’s unusual recent relationship with 8chan, has led some to suggest that the Trump administration is taking advantage of the tragedy at El Paso and of other recent mass shootings to impose unpopular restrictions on civil liberties and increase the mass surveillance of innocent Americans.
An uncanny prediction
On Tuesday, July 23, Attorney General William Barr gave the keynote address at the 2019 International Conference on Cyber Security (ICCS) at Fordham University. The focus of Barr’s speech was the need for consumer electronic products and applications that use encryption to offer a “backdoor” for the government, specifically law enforcement, to obtain access to encrypted communications as a matter of public safety.
Early in his speech, Barr stated:
Service providers, device manufacturers and application developers are developing and deploying encryption that can only be decrypted by the end user or customer, and they are refusing to provide technology that allows for lawful access by law enforcement agencies in appropriate circumstances….
While encryption protects against cyberattacks, deploying it in warrant-proof form jeopardizes public safety more generally. The net effect is to reduce the overall security of society.”
Barr went onto say that “warrant-proof encryption is also seriously impairing our ability to monitor and combat domestic and foreign terrorists.” Barr stated that “smaller terrorist groups and ‘lone wolf’ actors” — such as those involved in the series of mass shootings in California, Texas and Ohio that would occur in the weeks after his speech — “have turned increasingly to encryption.” Barr later notes that he is specifically referencing encryption used by “consumer products and services such as messaging, smart phones, email, and voice and data applications.”
Barr then laid out his vision of what the solution to this challenge posed by “warrant-proof encryption” would look like:
We believe that when technology providers deploy encryption in their products, services, and platforms they need to maintain an appropriate mechanism for lawful access. This means a way for government entities, when they have appropriate legal authority, to access data securely, promptly, and in an intelligible format, whether it is stored on a device or in transmission.
We do not seek to prescribe any particular solution. Our private-sector technology providers have immensely talented engineers who have built the very products and services that we are talking about. They are in the best position to determine what methods of lawful access work best for their technology.”
After laying out his vision, Barr stated that, while he would like to give private companies time to willingly cooperate and comply with his suggested solution to “warrant-proof encryption,” “the time to achieve that [government back-doors into electronic consumer apps and products] may be limited.”
To overcome the resistance by some private companies — who do not want to renege on their right to privacy by giving the government back-door access to their devices — and American consumers, Barr tellingly anticipates that a “major incident” will soon take place that will mold public opinion in favor of his proposed solution.
Barr concluded his speech by stating:
I think it is prudent to anticipate that a major incident may well occur at any time that will galvanize public opinion on these issues.
As this debate has dragged on, and deployment of warrant-proof encryption has accelerated, our ability to protect the public from criminal threats is rapidly deteriorating. The status quo is exceptionally dangerous, unacceptable, and only getting worse.
The rest of the world has woken up to this threat. It is time for the United States to stop debating whether to address it, and start talking about how to address it.” (emphases added)
On Thursday, July 25, the last day of the ICCS conference, FBI Director Christopher Wray also echoed Barr’s call for government back-doors into encrypted software and apps, stating in his speech:
Cybersecurity is a central part of the FBI’s mission. But as the attorney general discussed earlier this week, our request for lawful access cannot be considered in a vacuum. It’s got to be viewed more broadly, taking into account the American public’s interest in the security and safety of our society, and our way of life. That’s important because this is an issue that’s getting worse and worse all the time.
There’s one thing I know for sure: It cannot be a sustainable end state for us to be creating an unfettered space that’s beyond lawful access for terrorists, hackers and child predators to hide. But that’s the path we’re on now, if we don’t come together to solve this problem.”
A new phase of an old campaign
The speeches given by Barr and Wray are the most recent iterations of the Department of Justice’s years-long effort to evade and weaken the encryption used by certain electronic products and applications, particularly encrypted messaging apps. Indeed, the DOJ was particularly active in late 2017 in pushing for back-doors into encrypted software, citing the encrypted devices of past perpetrators of mass shootings as proving the need for federal law enforcement to easily and quickly bypass encryption in criminal investigations.
However, Barr’s and Wray’s speeches mark a new phase of this government campaign targeting encryption, a campaign that has picked up in the past two weeks just as a series of mass shootings in the United States have led to widespread calls for the government to do something to prevent further massacres.
At a Monday press conference, President Donald Trump gave his official response to the most recent shootings in Ohio and Texas, tragedies that he largely blamed on the internet and its “dark recesses” that are inaccessible to the government. “We must recognize that the internet has provided a dangerous avenue to radicalize disturbed minds and perform demented acts,” Trump stated, before adding: “We must shine light on the dark recesses of the internet and stop mass murders before they start.”
“The perils of the internet and social media cannot be ignored and they will not be ignored,” the president emphasized.
One of the main solutions Trump offered to what he alleged caused the recent shootings was to mandate the DOJ “to work in partnership with local, state and federal agencies as well as social media companies to develop tools that can detect mass shooters before they strike.” Some interpreted this statement as suggesting the more widespread implementation of “pre-crime” software, such as Palantir, which was co-founded by billionaire Trump backer Peter Thiel, who is also on Facebook’s board.
Conveniently for William Barr, Facebook announced in May that the company is already developing just the “backdoor” that the attorney general has sought. This new initiative would implement AI-powered surveillance measures onto consumer devices, which would bypass end-to-end encryption on both the recently encrypted Facebook Messenger and the popular encrypted messaging app WhatsApp, acquired by Facebook in 2014. Though the measure was announced in May, it has received media attention only in the last week, following Barr’s speech at the 2019 ICCS.
Following Trump’s proposal for social media and the Barr-led DOJ to work together to monitor encrypted messages, it seems that Facebook will be one of the first major tech companies to offer its ready-made solution to the U.S. government. It is also worth considering the possibility that Barr may use the threat of his Silicon Valley antitrust probe to potentially strong-arm tech companies that would otherwise be unwilling to create a government back-door in their software or products. That probe was announced the same day that Barr spoke about anti-encryption measures at the 2019 ICCS.
In addition, between Barr’s July 23 speech and Trump’s August 5 press conference, there has been a concerted push from not only the DOJ but also the Five Eyes intelligence alliance, of which the U.S. is part, to weaken encryption or give governments access to encrypted applications.
On the heels of the 2019 ICCS, at which Barr and Wray spoke, there was a related cyber security summit in London — called the Five Country Ministerial — where “senior ministers from the U.K., Australia, Canada, New Zealand and the United States … reaffirmed their commitment to work together with industry to tackle a range of security threats.”
According to the U.K. government’s press release on the summit, which took place from July 29 to 30, the ministers in attendance “stressed that law enforcement agencies’ efforts to investigate and prosecute the most serious crimes would be hampered if the industry carries out plans to implement end-to-end encryption, without the necessary safeguards.” William Barr attended that summit, representing the U.S., and echoed his speech given a week prior, stating:
We must ensure that we do not stand by as advances in technology create spaces where criminal activity of the most heinous kind can go undetected and unpunished.”
Notably, Australia last year implemented a law similar to that which Barr is seeking to enact in the United States. It has since been lampooned by expert cryptographers for its ineffectiveness and has caused damage to Australia’s tech industry. According to the Guardian, Microsoft revealed in March that companies and governments it works with say they “are no longer comfortable about storing their data in Australia as a result of the encryption legislation.” Perhaps predictably, what has happened since Australia’s enactment of this controversial encryption legislation is the Australian government’s use of its new “back-doors” to widely surveil its civilians without a warrant.
Barr’s Orwellian bent
Barr’s outsized involvement in this recent push for a government back-door into all encryption apps is notable given his past. For instance, prior to becoming attorney general under Trump, Barr worked at the law firm Kirkland & Ellis, a firm that “represent[s] clients on matters relating to data and network security.” Kirkland & Ellis, in describing its own services, notes:
These matters are increasingly important to national security and international trade concerns such as government surveillance issues, state-sponsored cyber-attacks and espionage, and legal limitations on cross-border data transfers. The Firm represents clients in navigating these legal matters, including with respect to investigating security incidents/breaches and handling resulting litigation or government relations aspects of such incidents.”
Furthermore, Barr’s previous stint as attorney general, during the administration of George H.W. Bush, saw him push for increasing mass surveillance of innocent Americans. According to USA Today, in 1992, while serving as Attorney General under Bush Sr., Barr “launched a vast surveillance program that gathered records of innocent Americans’ international phone calls without first conducting a review of whether it was legal.” The program “ultimately gathered billions of records of nearly all phone calls from the United States to 116 countries, with little oversight from Congress or the courts” and also “provided a blueprint for far broader phone-data surveillance the government launched after the terrorist attacks of Sept. 11, 2001.” The program was partially carried out by the then-head of the DOJ’s Criminal Division, former FBI Director Robert Mueller.
Barr’s history of pushing for reducing privacy for citizens is troubling considering that, earlier in his career, he pushed for increased government secrecy while he was employed by the CIA in the late 1970s. For instance, while working at the CIA’s Office of Legislative Council, Barr attempted to circumvent the moratorium placed on the CIA that prevented it from destroying records and also stonewalled the Church Committee’s investigation into CIA abuses. Thus, Barr’s push for reduced privacy for citizens but increased privacy for the government bodes poorly for those who see government transparency and citizen privacy as important to keeping government overreach in check.
FBI foreknowledge
In the hours before the shooting at a Walmart in El Paso, Texas — and less than two weeks after Barr warned of an imminent “major incident” that would “galvanize public opinion” in favor of ending encryption free from a government back-door — the FBI was made aware of a manifesto published on the controversial website 8chan that is alleged to have been authored by the shooter, Patrick Crusius.
According to NBC News, the FBI was aware of the document prior to the shooting, but was unable to act quickly enough to prevent the attack. There have, however, been conflicting reports about exactly how long the FBI was aware of the alleged manifesto prior to the shooting.
For instance, soon after the shooting, CNN stated that three different sources had told the outlet that the manifesto had been “posted days before the shootings.” However, the FBI later stated less than a half hour before the shooting, while separate law enforcement sources told reporters that it was actually two hours before the shooting.
There is also a discrepancy regarding whether the manifesto was originally posted on 8chan and whether the shooter himself even posted it. Jim Watkins, who owns the 8chan message boards and has alerted federal authorities previously when past shooting manifestos were published at the site, stated:
First of all, the El Paso shooter posted on Instagram, not 8chan… Later, someone uploaded the manifesto. However, that manifesto was not uploaded by the Walmart shooter. I don’t know if he wrote it or not, but it was not uploaded by the murderer; that is clear.”
Facebook, which owns Instagram, said that it had disabled an Instagram account that belonged to Crusius and also noted that that account had been inactive for over a year.
In the past, 8chan administrators had deleted manifestos minutes after they were posted and warned federal authorities that the documents had been published. In the case of the El Paso shooting, Watkins claimed that the site had informed federal authorities as soon as they were aware that the manifesto had been uploaded to its page.
The facts that the FBI knew in advance of the manifesto, that the manifesto may not have been uploaded by the shooter, and that the FBI was quick to link that document to the shooting event soon after it took place have led to speculation about how the FBI was able to make that connection so quickly. For instance, lawyer Robert Barnes stated the following on Twitter:
How did [the] FBI identify the shooter before he began his attack from a post on an anonymous chat board? Usually, this means the shooter tipped them off either directly or indirectly (informant). Misuse of informants (including encouraging violence) is an underexplored problem.”
In addition, journalist Rachel Blevins posed a similar question on social media following the revelations, writing:
It took just hours for the FBI to both identify the suspect in the El Paso shooting and connect him to a manifesto posted on 8chan, which raises the question… was the suspect included in the FBI’s surveillance, and were their agents in contact with him before the shooting?”
This possibility is worth considering, given the well-documented history of the FBI’s policy of manufacturing domestic terror plots within the United States, most of which are ultimately foiled at the last minute by the Bureau. In many of those cases, many alleged terrorists would not have planned or attempted those attacks without goading and support from the FBI, leading critics to accuse the FBI of deliberately using entrapment. For instance, a 2014 study by Human Rights Watch and Columbia Law School’s Human Rights Institute found that “many of these people [in the cases examined in the study] would never have committed a crime if not for law enforcement encouraging, pressuring, and sometimes paying them to commit terrorist acts,” according to the study’s co-author Andrea Prasow.
There are several instances where the FBI sought out mentally handicapped and unstable individuals with no resources of their own, giving them incentives, fake weapons and even driving them to the scene of the planned fake terror attack. Two high-profile domestic terror cases have also had hints of FBI involvement — including the Pulse nightclub shooting, where the shooter’s father was later revealed to be a FBI informant and the FBI had attempted to goad the Pulse shooter into committing a terror attack years prior to the Pulse shooting. In addition, the family of the Boston Marathon bombers claimed that the FBI regularly visited their family home and had cultivated a close relationship with one of the bombers, Tamerlan Tsarnaev, prior to the bombing.
Since late 2016, the FBI’s controversial policy of inducting individuals to commit acts of terror in the United States has expanded after a federal appeals court ruling in December of that year said that federal agents were allowed to target a person’s religious affiliation in order to “probe the attitudes” of an individual who may want to “do something to America” by entrapping them in fake terror act schemes. The ruling also permitted federal agents to create false friendships, referred to in the ruling as the “illusory cultivation of emotional intimacy,” as a means of manipulating individuals to commit acts of terrorism — as well as providing these unstable individuals with money, vehicles, businesses and even vacations to get them to agree to participate in fake attacks.
As a result of this troubling trend, and given the FBI’s foreknowledge of the manifesto and its ease in connecting that document to the shooter, it becomes important to ask whether the FBI had more foreknowledge of the situation than it has publicly let on.
Though history indicates that FBI foreknowledge of the shooter is definitely plausible, 8chan has been a recent focus of the FBI in recent months. For instance, after the alleged manifesto of the shooter responsible for the massacre at the Poway Synagogue earlier this year was published on 8chan, the FBI issued a warrant for hundreds of 8chan user accounts that had commented on the Poway Synagogue shooter’s thread, including both users that supported his statement of intent and those who were appalled by it.
According to the Bureau’s application for a search warrant, the FBI was seeking the “IP address and metadata information about [Poway shooter John] Earnest’s original posting and the postings of all of the individuals who responded to the subject posting and/or commented about it.” The FBI further instructed Ch.net, which hosts 8chan, “to make a digital copy of the entire contents of the accounts subject to seizure.”
It goes without saying that with the information on hundreds of 8chan users, the FBI would have had access to potential future informants and potential targets to be “groomed” by the FBI for a future domestic terrorism entrapment case. This is especially likely given that the FBI’s reasoning for obtaining this large amount of information in the warrant was to identify “individuals who are inspired by the subject posting [i.e., the Poway shooter manifesto].” One 8chan user who was contacted by the FBI after this search warrant and filmed the encounter, was asked by federal agents to help them with information-gathering on other 8chan users.
This possibility is further supported by the fact that the FBI agent who filed the search warrant application, FBI Special Agent Michael Rod, revealed that he had been active on 8chan and (perhaps inadvertently) revealed his user name on 8chan to be user “8f4812.” An archive of the Poway shooter’s 8chan thread, available here, reveals that Rod stated in that 8chan thread that Russia was to blame for the Poway shooting and Rod also claimed that he knew of the Poway shooting 15 minutes before it happened but was unable to warn the authorities because he “was shit posting and got tied up.”
In the wake of the recent shootings in El Paso, Texas and Dayton, Ohio, 8chan was taken offline after internet infrastructure company Cloudflare declined to continue supporting the website.
A tragedy foretold and exploited
William Barr’s warning that a “major incident” could occur “at any time” and “galvanize public opinion” around the unpopular encryption back-door policy he has been seeking seems to have come true in the weeks since the attorney general made those statements. Given Barr’s influence over the FBI, which operates under his jurisdiction, it is important to scrutinize the evidence that the FBI had apparent foreknowledge of at least one of these recent shootings, and consider that the Bureau may have failed to act to prevent the tragedy, allowing Barr’s prediction just weeks earlier to become a self-fulfilling prophecy.
Trump’s proposed solution to the recent spate of mass shootings is focused on giving Barr a mandate to work with social media and tech companies to prevent another mass shooting before it occurs. It seems evident that this solution is set to involve surveilling encrypted communications to ostensibly prevent another shooting while also providing Barr, and the DOJ at large, the back-door into encrypted apps and consumer products that they have long sought but have been unable to sell to either the public or those same tech companies.
Now, a public safety crisis has emerged in the wake of Barr’s recent speech, tipping the scales — as Barr had predicted — so the public would favor further reductions to their civil liberties and right to privacy so that the federal government could provide increased public safety through increased surveillance. Yet, taking this alongside the well-documented fact that the FBI regularly manufactures domestic terror plots, it is worth asking whether some of these recent shootings were allowed to happen and whether public officials like William Barr are manipulating the public’s reaction to these tragedies to advance their own political agendas and further the build-up of state power.
Whitney Webb is a MintPress News journalist based in Chile. She has contributed to several independent media outlets including Global Research, EcoWatch, the Ron Paul Institute and 21st Century Wire, among others. She has made several radio and television appearances and is the 2019 winner of the Serena Shim Award for Uncompromised Integrity in Journalism.
Spooks behind Patriot Act, drone & torture programs unite to ‘secure’ US elections, free of charge

Protest against mass surveillance © Reuters / Jonathan Ernst
By Helen Buyniski | RT | August 7, 2019
A group of former intelligence agency directors and other trustworthy cybersecurity pros has launched a charitable initiative to protect US elections against foreign interference. So who are these noble guardians of democracy?
The “US Cyberdome” claims to apply top-of-the-line cybersecurity capabilities to the country’s vulnerable election systems, motivated by nothing more than a selfless devotion to protecting democracy against “sophisticated attacks by constant and ever-evolving threats.” Stuffed with sinister ex-spooks like former Director of National Intelligence James Clapper and former Homeland Security Secretary Michael Chertoff, Cyberdome will keep America’s democracy safe from “purposeful attacks and exploits” and even “undue influence from enemies both foreign and domestic” – at no cost!
One might be forgiven for looking this particular gift horse in the mouth. Clapper, after all, stood in front of Congress and denied under oath that the NSA was collecting data on US citizens, an apparent act of perjury he attributed first to forgetting about the Patriot Act section used to authorize the agency’s StellarWind surveillance program and later to simple misspeaking. He has also claimed Russians are “genetically driven to co-opt, penetrate, gain favor” – not exactly the kind of impartial authority one wants guarding one’s democracy. And Chertoff, a member of the infamous Atlantic Council, co-wrote both the Patriot Act and the CIA interrogation memo advising agents on the judicious use of waterboarding.
Other members of Cyberdome’s board of advisors include former Homeland Security Secretary Jeh Johnson, who oversaw Obama’s targeted drone assassination program and approved the killing of US citizens like Anwar al-Awlaki without due process; and former CIA director Michael Morell, another Atlantic Council member who was responsible for reviewing the “intelligence” that went into then-Secretary of State Colin Powell’s infamous United Nations speech in which he claimed Iraq had weapons of mass destruction. A less trustworthy bunch has not been assembled on an advisory board since the Orwellian browser plugin NewsGuard was unveiled.
It’s not like Cyberdome’s tech isn’t expensive – the group was founded by Matt Barrett, who led the development of the National Institute of Standards and Technology’s “Cybersecurity Framework,” a best-practices security infrastructure program that came with a price tag so hefty half the organizations that reviewed it cited cost as the primary barrier to adoption. Cyberdome accepts donations (inviting donors to “Put Your Money Where Your Democracy Is!”), but securing the nation’s voting systems to NIST standards isn’t cheap.
This, it seems, is where the advisory board comes in – with such a pedigreed array of spooks on hand, elections that don’t adopt Barrett’s vision of cybersecurity could easily experience a breach or two. Top-brass spies like Cyberdome’s board know how to spoof traffic from foreign “hackers” – a capability WikiLeaks revealed the CIA possesses in the Vault7 leaks. If they want to knock off an inconvenient presidential candidate, all they need to do is spoof a hack into the voting system from whoever the bogeyman du jour is, and voila – instant Manchurian (or Siberian) candidate.
Former DHS Secretary Michael Chertoff warned when the NIST framework was unveiled in 2014 that unless Congress “really put some muscle behind it” or regulators got involved, it would be difficult to achieve widespread adoption of the “voluntary” program. Chertoff in his post-DHS career has hopped from industry to industry collecting large paychecks to consult on cybersecurity, convincing everyone from bankers to airports that the cyber-barbarians are at the gates, and only he can protect them. And Cyberdome is merely his vision writ large, with the whole election system in its sights.
The company claims its initial efforts are focused “only” on securing the 2020 presidential campaign, but its hope is to ultimately “assist all national political campaigns.” As Johnson said in a statement on Tuesday, “In the face of known, ongoing efforts by foreign powers to try to interfere in our upcoming election, US Cyberdome could not come at a more critical juncture.”
Translation? “Gee, that’s a nice democracy you’ve got there – sure would be a shame if something happened to it.”
Helen Buyniski is an American journalist and political commentator, working at RT since 2018
We’re All Enemies of the State: Draconian Laws, Precrime & the Surveillance State
By John W. Whitehead | The Rutherford Foundation | August 6, 2019
We’ve been down this road many times before.
If the government is consistent about any one thing, it is this: it has an unnerving tendency to exploit crises and use them as opportunities for power grabs under the guise of national security.
Cue the Emergency State, the government’s Machiavellian version of crisis management that justifies all manner of government tyranny in the so-called name of national security.
Terrorist attacks, mass shootings, “unforeseen economic collapse, loss of functioning political and legal order, purposeful domestic resistance or insurgency, pervasive public health emergencies, and catastrophic natural and human disasters”: the government has been anticipating and preparing for such crises for years now.
It’s all part of the grand plan for total control.
The government’s proposed response to the latest round of mass shootings—red flag gun laws, precrime surveillance, fusion centers, threat assessments, mental health assessments, involuntary confinement—is just more of the same.
It’s a simple enough formula: first, you create fear, then you capitalize on it by seizing power.
For instance, in his remarks on the mass shootings in Texas and Ohio, President Trump promised to give the FBI “whatever they need” to investigate and disrupt hate crimes and domestic terrorism.
Let that sink in a moment.
In a post-9/11 America, Trump’s promise bodes ill for whatever remnants of freedom we have left. With that promise, flippantly delivered without any apparent thought for the Constitution’s prohibitions on such overreach, the president has given the FBI the green light to violate Americans’ civil liberties in every which way.
This is how the Emergency State works, after all.
So what does the government’s carefully calibrated response to this current crisis mean for freedom as we know it? Compliance and control.
For starters, consider Trump’s embrace of red flag gun laws, which allow the police to remove guns from people “suspected” of being threats, will only add to the government’s power.
Be warned: these laws, growing in popularity as a legislative means by which to seize guns from individuals viewed as a danger to themselves or others, are yet another Trojan Horse, a stealth maneuver by the police state to gain greater power over an unsuspecting and largely gullible populace.
Seventeen states, plus the District of Columbia, now have red flag laws on their books. That number is growing.
In the midst of what feels like an epidemic of mass shootings, these gun confiscation laws—extreme risk protection order (ERPO) laws—may appease the fears of those who believe that fewer guns in the hands of the general populace will make our society safer.
Of course, it doesn’t always work that way.
Anything—knives, vehicles, planes, pressure cookers—can become a weapon when wielded with deadly intentions.
With these red flag gun laws, the intention is to disarm individuals who are potential threats.
Therein lies the danger of these red flag laws, specifically, and pre-crime laws such as these generally, especially when you put the power to determine who is a potential danger in the hands of government agencies, the courts and the police.
After all, this is the same government that uses the words “anti-government,” “extremist” and “terrorist” interchangeably.
This is the same government that has a growing list—shared with fusion centers and law enforcement agencies—of ideologies, behaviors, affiliations and other characteristics that could flag someone as suspicious and result in their being labeled potential enemies of the state.
For instance, if you believe in and exercise your rights under the Constitution (namely, your right to speak freely, worship freely, associate with like-minded individuals who share your political views, criticize the government, own a weapon, demand a warrant before being questioned or searched, or any other activity viewed as potentially anti-government, racist, bigoted, anarchic or sovereign), you could be at the top of the government’s terrorism watch list.
Moreover, as a New York Times editorial warns, you may be an anti-government extremist (a.k.a. domestic terrorist) in the eyes of the police if you are afraid that the government is plotting to confiscate your firearms, if you believe the economy is about to collapse and the government will soon declare martial law, or if you display an unusual number of political and/or ideological bumper stickers on your car.
According to the FBI’s latest report, you might also be classified as a domestic terrorism threat if you espouse conspiracy theories, especially if you “attempt to explain events or circumstances as the result of a group of actors working in secret to benefit themselves at the expense of others” and are “usually at odds with official or prevailing explanations of events.”
In other words, if you dare to subscribe to any views that are contrary to the government’s, you may well be suspected of being a domestic terrorist and treated accordingly.
Be warned: once you get on such a government watch list—whether it’s a terrorist watch list, a mental health watch list, a dissident watch list, or a red flag gun watch list—there’s no clear-cut way to get off, whether or not you should actually be on there.
You will be tracked wherever you go.
You will be flagged as a potential threat and dealt with accordingly.
This is pre-crime on an ideological scale and it’s been a long time coming.
If you’re not scared yet, you should be.
Connect the dots.
Start with the powers amassed by the government under the USA Patriot Act, note the government’s ever-broadening definition of what it considers to be an “extremist,” then add in the government’s detention powers under NDAA, the National Security Agency’s far-reaching surveillance networks, and fusion centers that collect and share surveillance data between local, state and federal police agencies.
To that, add tens of thousands of armed, surveillance drones, facial recognition technology that will identify and track you wherever you go. And then to complete the picture, toss in the real-time crime centers which will attempt to “predict” crimes and identify so-called criminals before they happen based on widespread surveillance, complex mathematical algorithms and prognostication programs.
See how easy we’ve made it for the government to identify, label, target, defuse and detain anyone it views as a potential threat, including those who challenge its authority?
Yet as I make clear in my book Battlefield America: The War on the American People, you don’t even have to be a dissident to get flagged by the government for surveillance, censorship and detention.
All you really need to be is a citizen of the American police state.
Bars & Nightclubs Use A Secret Biometric Blacklist To Ban Customers
credit: PatronScan
MassPrivateI | June 4, 2019
Have you ever had too much to drink at a bar or nightclub and been asked to leave? Have you or your friends ever mouthed off to the staff or been hit on by a bartender? Have you ever Yelped or Tweeted about bad food or service?
If you answered yes to any of those questions, then you will be mortified to learn that Big Brother knows exactly who you are.
According to an article in OneZero, the service industry has been quietly using PatronScan to scan the IDs and faces of 500,000+ bargoers.
“PatronScan collected and retained information on over 10,000 patrons in Sacramento in a single day. Within a five month period, that added up to information on over 500,000 bargoers.”
PatronScan otherwise known as Servall Biometrics Inc. is first and foremost a biometrics company that makes its money collecting biometric data of service industry patrons.
Bars, nightclubs and pubs have used PatronScan to create a blacklist of 40,000+ customers. Who are, on average banned for 19 years from local establishments!
“Using PatronScan, our venues have placed over 40,000 people on our shared Banned Patron list.”
According to PatronScan’s Privacy Policy, the only way a person can be removed from their secret banned (blacklist) list is to contact the manager or head of security first; then and only then will PatronScan open up their own investigation.
PatronScan has such a cozy relationship with law enforcement that they warn customers, “their personal information may also be provided to us from a law enforcement agency.”
Doesn’t it make you feel all warm and snugly, knowing your local bar or club could be working with law enforcement?
Bars and nightclubs share blacklist of customers
According to OneZero,
“PatronScan logs where customers live, the household demographics for that area, how far each customer travelled to a bar, and how many different bars they had visited. OneZero readily shares the information it collects on patrons, both banned and not, at the request of police.”
Being banned from one bar in a city or town means you are banned (blacklisted) from other participating establishments.
To make matters worse, law enforcement has also created a national database, masquerading as a non-profit that tracks every alcoholic purchase you have made.
The database is called the National Liquor Law Enforcement Association or “Place of Last Drink.”
“NLLEA President Justin Nordhorn, said the NLLEA received federal money to develop a nationwide database that will allow law enforcement officers to input information about where an intoxicated person was drinking before a crime, incident or alcohol-related crash.”
With PatronScan, police will know who you are and which bars or clubs you frequent. With the NLLEA they will know what you had to drink. How is that for Orwellian?
Service industry is being turned into min-surveillance centers
When is the last time you entered a restaurant, bar or nightclub and asked the manager about their surveillance cameras? When is the last time you asked a doorman or the manager about what they do with your personal information?
OneZero’s article warns,
“Many bars also have internal surveillance systems, which track customer trends and catalog granular data on purchasing habits. Those tools are growing increasingly sophisticated, with obvious benefits to venue owners and law enforcement.”
NBC 6 warned that letting bars scan your drivers license puts all your personal information at risk.
“With just a swipe of your ID, computers can pull your personal information from it giving it to the companies and facilities you visit, including your date of birth, address, height and weight.”
According to the ACLU, drivers licenses contain much more information than you are being told.
Drivers license barcodes, “contain your name, address, date of birth, hair color, eye color, height, weight, gender, license expiration date, organ donor status, driver’s license number, fingerprint, medical information, and driver classification code.” (To see a detailed list of what drivers license barcodes contain, click here.)
The privacy implications for allowing your ID to be scanned by a bar or nightclub are clearly not worth the risks.
As NBC 6 warned, “the security experts we spoke to recommend you ask security to write down your information or take a photo of your ID instead of swiping it.”
Matt Cagle, a technology and civil liberties attorney with the ACLU of Northern California said, “When you create a confidential ban list, that’s an invitation for businesses to pretextually exclude people because of who they are.”
And that is the problem with companies like PatronScan, Suspect Technologies and law enforcement watchlists. Businesses and police do not need a reason to place someone on a banned list or watchlist and that should scare the hell out of everyone.
If Big Brother has its way — and it certainly appears like it does — Americans will soon find themselves living in a mirror-image of China where everything we do and everywhere we go is scrutinized.
London council cancels pro-Palestine event over anti-Semitism claims
MEMO | August 5, 2019
London Borough of Tower Hamlets refused to host the closing rally of the annual bike ride raising money for Palestinian children in the besieged Gaza over claims it would breach the IHRA’s anti-Semitism criteria, the Guardian reported on Saturday.
The council told the Big Ride for Palestine, which was established on the first anniversary of Israel’s 2014 offensive on Gaza and which has raised nearly £150,000 for sports equipment for children in the enclave, that the event could not go ahead in the borough “without problems”.
However, the Palestine Solidarity Campaign won a Freedom of Information battle in an effort to discover the reasons behind the council’s refusal to host the event. Internal emails revealed that council staff agreed not to make public “anti-Semitism concerns”.
While the council officials, according to the Guardian, told the organisers that there was a risk speakers might express views which contradicted the council’s policies on community cohesion and equality, behind the scenes the council attributed the reasons to “real risk” of violating IHRA’s definition of anti-Semitism.
The council’s concerns were linked to the Big Ride’s website describing Israel’s illegal occupation and siege of the Gaza Strip as “apartheid” and “ethnic cleansing”.
When considering how to explain the decision, the Guardian said, one council official said it would be wise to “avoid the anti-Semitism aspect… as this could open a can of worms and come back to bite us”.
The Guardian reported a council spokesman saying: “The council gave the application careful consideration and decided not to host the event, because we do not host rallies with political connotations, albeit without direct links to political parties.”
However a spokesperson for the charity said its work was focused on helping the 300,000 children in Gaza showing signs of severe psychological distress.
The spokesperson added: “It’s a dreadful thing when an over-scrupulous interpretation of the IHRA definition of anti-Semitism is used behind closed doors to prevent awareness raising of the situation in Palestine and the need for humanitarian support.”
It’s not too late to donate, follow this link and give what you can.
Don’t Let Mass Shooters and the New York Times Destroy Freedom of Speech
By Thomas L. Knapp | Garrison Center | August 5, 2019
“Online communities like 4chan and 8chan have become hotbeds of white nationalist activity,” wrote the editors of the New York Times on August 4 in the wake of a mass shooting in El Paso, Texas. Then: “Law enforcement currently offers few answers as to how to contain these communities.”
Wait, what? Is the Times really implying what it looks like they’re implying? Yes.
“Technology companies have a responsibility to de-platform white nationalist propaganda and communities as they did ISIS propaganda,” the editorial continues. “And if the technology companies refuse to step up, law enforcement has a duty to vigilantly monitor and end the anonymity, via search warrants, of those who openly plot attacks in murky forums.”
Translation: The New York Times has announced its flight from the battlefield of ideas. Instead of countering bad ideas with good ideas, they want Big Tech and Big Government to forcibly suppress the ideas they disagree with.
Not so long ago, the Times‘s editors endorsed a very different view:
“One of the Internet’s great strengths is that a single blogger or a small political group can inexpensively create a Web page that is just as accessible to the world as Microsoft’s home page. But this democratic Internet would be in danger if the companies that deliver Internet service changed the rules so that Web sites that pay them money would be easily accessible, while little-guy sites would be harder to access and slower to navigate. Providers could also block access to sites they do not like.”
Now the Times says providers have a “responsibility” to block access to sites the Times doesn’t like. That’s quite a change. And an ugly one.
There are plenty of good reasons, both moral and practical, to oppose the suppression of white nationalist and other “extremist” web platforms.
Free speech is a core moral value for any society that aspires to freedom of any kind and to any degree. We must — MUST — have the right to form our own opinions, and to express those opinions, no matter how ugly others may find those opinions. Without that freedom, no other freedoms can survive.
As a practical matter, “extremists,” like everyone else, will choose to state, promote, and argue for their beliefs. If they can do so in public, those beliefs can be engaged and argued against. If they can’t do so in public, they’ll do so in private, without anyone to convince them (and those they quietly bring into their circles over time) of the error of their ways. The rest of us won’t have a clue what might be in the offing — until the guns come out, that is.
It’s appalling to see the New York Times endorsing an end to the freedom that undergirds its very existence and the prerogatives of every other newspaper and soapbox speaker in America. The only substantive difference between the editors’ position and that of the El Paso shooter, allegedly one Patrick Crusius, is that the shooter did his own dirty work.
Thomas L. Knapp (Twitter: @thomaslknapp) is director and senior news analyst at the William Lloyd Garrison Center for Libertarian Advocacy Journalism (thegarrisoncenter.org).
8chan: Another Mass Shooting, Another Internet Purge
This is the third “mass casualty event” in less than a year that was immediately followed up by censorship of the internet
By Kit Knightly | OffGuardian | August 5, 2019
Last year, after the shooting at a Pittsburgh synagogue, the new social-media platform Gab was attacked in the press and bullied off the internet. Earlier this year, following the Christ Church mosque attack, New Zealand briefly totally blocked access to several websites.
Yesterday, two men allegedly killed 30 people at a store in Dayton Ohio, and a mall in El Paso Texas.
Today 8chan has been totally shut down.
If you don’t know what 8chan is, well it’s like 4chan but without the sense of decency. If you don’t know what 4chan is, it’s like reddit went off its medication.
Both places could be, can be, kinda gross. But they could – can – also be amazing. Insightful. Useful. Free speech is like that. Sometimes beautiful, sometimes ugly. If you cut off the ugly parts it’s not “free speech” anymore. This is something we all know, but the media is trying to force us to forget.
The boot-licking justification of this move was, of course, spear-headed by The Guardian: 8chan: the far-right website linked to the rise in hate crimes
The hand-wringers and pearl-clutchers in the media are happy to pretend this is about “hate” and “safety”, which is obviously not true.
Take the thrust of the Guardian article:
8chan… why is a website linked to such a high death count allowed to exist on the open internet?
Wouldn’t this question be better asked of www.cia.gov?
Or maybe one of these…
www.defense.gov
www.lockheedmartin.com
www.army.mil
www.mi5.uk
Hell, going by this absurd definition of “death count” – meaning, apparently, “someone who allegedly posted there, allegedly committed a crime” – then all Facebook and twitter have staggering “death counts”.
Known war criminals use twitter every single day. The alleged Christ Church shooting was live-streamed on Facebook (but it was 8chan that got blocked).
The Guardian itself published an opinion piece, a week ago, written by Alastair Campbell. A man with a body count 50,000x higher than the Texas shooting. That’s an El Paso every day for 137 years.
This isn’t about hate, they’re fine with hate. This isn’t about blood, they love blood.
8chan was no more hateful or bloody than any website on that list, so what was the real problem with it?
It was anonymous, fringe and uncontrollable.
It was free. Now it’s not. Any one of us could be next.
Tulsi Gabbard vs Google Goliath
By Rick Sterling | Dissident Voice | July 31, 2019
Introduction
The Tulsi Gabbard presidential campaign has filed a major law suit against Google. This article outlines the main points of the law suit and evidence the the social media giant Google has quietly acquired enormous influence on public perceptions and has been actively censoring alternative viewpoints.
Tulsi Now vs Google
Tulsi Now, Inc vs Google, LLC was filed on July 25 in the U.S. District Court for the Central District of California. The attorneys demand a jury trial and seek compensation and punitive damages of “no less than $50 million”. Major points and allegations in the 36 page complaint include:
* Google has monopolistic control of online searches and related advertising.
“Google creates, operates, and controls its platform and services, including but not limited to Google Search, Google Ads, and Gmail as a public forum or its functional equivalent by intentionally and openly dedicating its platform for public use and public benefit, inviting the public to utilize Google as a forum for free speech. Google serves as a state actor by performing an exclusively and traditionally public function by regulating free speech within a public forum and helping to run elections.” (p. 22)
“Google has used its control over online political speech to silence Tulsi Gabbard, a candidate millions of Americans want to hear from. With this lawsuit, Tulsi seeks to stop Google from further intermeddling in the 2020 United States Presidential Election….. Google plays favorites, with no warning, no transparency – and no accountability (until now).” (p. 2)
* At a critical moment Google undercut the Tulsi Gabbard campaign.
“On June 28, 2019 – at the height of Gabbard’s popularity among internet researchers in the immediate hours after the debate ended, and in the thick of the critical post-debate period… Google suspended Tulsi’s Google Ads account without warning.” (p. 3)
* Google has failed to provide a credible explanation.
The Tulsi campaign quickly sought to restore the account but “In response, the Campaign got opacity and an inconsistent series of answers from Google… To this day, Google has not provided a straight answer – let alone a credible one – as to why Tulsi’s political speech was silence right when millions of people wanted to hear from her.” (p. 4)
Google started by falsely claiming “problems with billing”. Later, as reported in the NY Times story a Google spokesperson claimed, “Google has automated systems that flag unusual activity on advertiser accounts – including large spending changes – to prevent fraud…. In this case, ‘our system triggered a suspension.’ ”
* Google has a corporate profit motive to oppose Tulsi Gabbard.
“Google has sought to silence Tulsi Gabbard, a presidential candidate who has vocally called for greater regulation and oversight of (you guessed it) Google.” (p. 5)
“During her career in Congress, Gabbard has moved to limit the powers of big tech companies like Google and has fought to keep the internet open and available to all. Gabbard has co-sponsored legislation that prohibits multi-tiered pricing agreements for the privileged few, and she has spoken in favor of reinstating and expanding net neutrality to apply to Internet firms like Google.” (p. 8)
* Google’s Actions have caused significant harm to the Gabbard campaign and violate the U.S. and California constitutions and California business law.
“Through its illegal actions targeting Tulsi Gabbard, Google has caused the Campaign significant harm, both monetary (including potentially millions of dollars in forgone donations) and nonmonetary (the ability to provide Tulsi’s important message with Americans looking to hear it).” (p. 6)
“Google engages in a pattern and practice of intentional discrimination in the provision of its services, including discriminating and censoring the Campaign’s speech based not on the content of the censored speech but on the Campaign’s political identity and viewpoint.” (p. 27)
* The public has an interest in this case.
“Unless the court issues an appropriate injunction, Google’s illegal and unconstitutional behavior will continue, harming both the Campaign and the general public, which has an overwhelming interest in a fair, unmanipulated 2020 United States Election cycle. (p. 34)
Google Explanation is Not Credible
The Tulsi Gabbard Google Ads account was abruptly suspended at a crucial time. The question is why. Was it the result of “unusual activity” triggering an “automatic suspension” as claimed by Google? Or was it because someone at Google changed the software or otherwise intervened to undermine the Tulsi campaign?
Google’s explanation of an “automatic suspension” from “unusual activity” is dubious. First, the timing does not make sense. The sudden rise in searches on “Tulsi Gabbard” began the day before the suspension. Gabbard participated in the first debate, on June 26. Her presence and performance sparked interest among many viewers. Next morning, June 27, media reported that, “Tulsi Gabbard was the most searched candidate on Google after the Democratic debate in Miami“. The second debate took place in the evening of June 27. With discussion of the Democratic candidates continuing, Tulsi Gabbard continued to attract much interest. Around 9:30 pm (ET) on June 27 the Google Ads account was suddenly suspended. If the cause was “unusual activity”, the “automatic trigger” should have occurred long before.
Second, Google was fully aware of the “unusual activity”. In fact, Google was the source of the news reports on the morning of June 27. Reports said:
According to Google Trends, Massachusetts Sen. Elizabeth Warren was the most searched candidate heading into the debate… After the debate, Gabbard vaulted into first.
Third, it is hard to believe that Google does not have any human or more sophisticated review before suspending a major Ads account on a politically intense night. It should have been obvious that the cause of increased interest in Gabbard was the nationally televised Democratic candidates debate and media coverage.
Fourth, the changing explanation for the sudden suspension, starting with a false claim that there were “problems with billing”, raises questions about the integrity of Google’s response.
Google Secretly Manipulates Public Opinion
Unknown to most of the public, there is compelling evidence that Google has been secretly manipulating search results to steer public perception and election voting for years.
Dr. Robert Epstein, former editor-in-chief of Psychology Today, has been studying and reporting on this for the past six years. Recently, on June 16, 2019 he testified before the Senate Judiciary Committee on the Constitution. His testimony is titled “Why Google Poses a Serious Threat to Democracy, and How to End That Threat”.
Epstein has published 15 books and over 300 scientific and mainstream media articles on artificial intelligence and related topics. “Since 2012, some of my research and writings have focused on Google LLC, specifically on the company’s power to suppress content – the censorship problem, if you will – as well as on the massive surveillance the company conducts, and also on the company’s unprecedented ability to manipulate the thoughts and behavior of more than 2.5 billion people worldwide.”
As shown by Dr. Epstein, Google uses several techniques to manipulate public opinion. The results of an online search are biased. Search “suggestions” are skewed. Messages such as “Go Vote” are sent to some people but not to others.
Epstein’s written testimony to Congress includes links to over sixty articles documenting his research published in sites ranging from Proceedings of the National Academy of Sciences to Huffington Post. Epstein’s testimony describes “disturbing findings” including:
“In 2016, biased search results generated by Google’s search algorithm likely impacted undecided voters in a way that gave at least 2.6 million votes to Hillary Clinton”. (Epstein notes that he supported Clinton.)
“On Election Day in 2018, the ‘Go Vote’ reminder Google displayed on its home page gave one political party between 800,000 and 4.6 million more votes than it gave the other party.”
“My recent research demonstrates that Google’s ‘autocomplete’ search suggestions can turn a 50/50 split among undecided voters into a 90/10 split without people’s awareness.”
“Google has likely been determining the outcomes of upwards of 25 percent of the national elections worldwide since at least 2015. This is because many races are very close and because Google’s persuasive technologies are very powerful.”
Google is Censoring Alternative Media
In August 2017 TruePublica reported their experience and predictions in an article titled “The Truth War is Being Lost to a Global Censorship Apparatus Called Google“. The article says:
60 percent of people now get their news from search engines, not traditional human editors in the media. It is here where the new information war takes place – the algorithm. Google now takes 81.2 percent of all search engine market share globally…. Google has the ability to drive demand and set the narrative, create bias and swing opinion.
In 2017, the World Socialist Web Site (wsws.org) reported that:
In April, under the guise of combating ‘fake news’, Google introduced new procedures that give extraordinary powers to unnamed ‘evaluators’ to demote web pages and websites. These procedures have been used to exclude the WSWS and other anti-war and oppositional sites. Over the past three months, traffic originating from Google to the WSWS has fallen by approximately 70%…. In key searches relevant to a wide range of topics the WSWS regularly covers – including the U.S. military operations and the threat of war, social conditions, inequality and even socialism – the number of search impressions … has fallen dramatically.
In essence, Google has “de-ranked” and is screening searchers from seeing alternative and progressive websites such as truepublica, globalresearch, consortiumnews, commondreams, Wikileaks, truth-out and many more. WSWS reported numerous specific examples such as this one: “Searches for the term ‘Korean war’ produced 20,932 impressions in May. In July, searches using the same words produced zero WSWS impressions.”
“The policy guiding these actions is made absolutely clear in the April 25, 2017 blog post by Google’s Vice President for Engineering, Ben Gomes, and the updated ‘Search Quality Rater Guidelines’ published at the same time. The post refers to the need to flag and demote ‘unexpected offensive results, hoaxes and conspiracy theories’ – broad and amorphous language used to exclude any oppositional content…. “The ‘lowest’ rating is also to be given to a website that ‘presents unsubstantiated conspiracy theories or hoaxes as if the information were factual.’”
Tulsi Gabbard has not only called for much stricter regulations on high tech and social media giants. She has also challenged the Democratic Party and foreign policy establishment. In late February 2016 she resigned as vice-chair of the Democratic National Committee to support candidate Bernie Sanders against the establishment favorite, Hillary Clinton. Gabbard has issued sharp criticisms of US foreign policy. Recently she said:
We hear a lot of politicians say the same argument that we’ve got to stay engaged in the world otherwise we’ll be isolationists as though the only way the United States can engage with other countries is by blowing them up or strangling them with economic sanctions by smashing them and trying to overthrow their governments. This is exactly what’s wrong with this whole premise and the whole view in which too many politicians, too many leaders in this country are viewing the United States role in the world.
Conclusion
Did Google take the next step from silently censoring websites the corporation does not like to undercutting a presidential candidate the corporation does not like?
This is a David vs Goliath story. Google/Alphabet is the 37th largest corporation in the world with enormous political influence in Washington. Whether or not the law suit succeeds, it may serve the public interest by exposing Google’s immense monopolistic power and illustrate the need for much more regulation, transparency and accountability. It may also generate more interest in Gabbard’s message and campaign in the face of efforts to silence her.
Investigative Journalist Rick Sterling can be reached at rsterling1@gmail.com.
Facebook defeats appeal in US claiming it aided Hamas attacks in Israel
MEMO | July 31, 2019
Facebook Inc on Wednesday defeated an appeal by American victims of Hamas attacks in Israel, who sought to hold the company liable for providing the group a social media platform to further its terroristic goals, Reuters reports.
The 2nd US Circuit Court of Appeals in Manhattan said the Communications Decency Act (“CDA”), a 1996 law regulating internet content, shielded Facebook from civil liability.
It also declined to consider the plaintiffs’ foreign law claims, noting that most plaintiffs, including relatives and estates of victims, said they were Americans living in Israel.
The plaintiffs originally sought $3 billion in damages from Facebook, for allowing Hamas to use its platform to encourage terrorist attacks in Israel, celebrate successful attacks, and generally support violence toward that country.
Their complaint described Hamas attacks against five Americans, four of whom died, in Israel from 2014 to 2016.
Lawyers for the plaintiffs did not immediately respond to requests for comment. Facebook, based in Menlo Park, California, did not immediately respond to similar requests.
Wednesday’s decision is a fresh setback to efforts to hold companies such as Facebook and Twitter Inc liable for failing to better police users’ online speech. It upheld a May 2017 dismissal by US District Judge Nicholas Garaufis in Brooklyn.
In seeking to overturn that dismissal, the plaintiffs said Facebook functioned as a matchmaker between Hamas and people receptive to its messages, and should not be immune from liability as a mere “publisher” of Hamas’ content.
Circuit Judge Christopher Droney, however, said it would turn the CDA “upside-down” to suggest that Facebook’s having become an “especially adept” publisher exposed it to liability.
He also refused to hold Facebook liable because its “friend” and content-based algorithms might have helped direct people interested in Hamas.
“Merely arranging and displaying others’ content to users of Facebook through such algorithms – even if the content is not actively sought by those users – is not enough to hold Facebook responsible as the ‘developer’ or ‘creator’ of that content,” Droney wrote.
Chief Judge Robert Katzmann, part of the three-judge appeals court panel, dissented from the algorithms discussion.
He said Congress did not consider how broadly to immunize social media companies, when it passed the CDA to regulate online pornography, and might rethink how to treat those accused of encouraging terrorism, propaganda and extremism.
“Over the past two decades the Internet has outgrown its swaddling clothes,” Katzmann wrote. “It is fair to ask whether the rules that governed its infancy should still oversee its adulthood.”
The US Department of State has designated Hamas a foreign terrorist organization since 1997.
The case is Force et al v. Facebook Inc et al, 2nd US Circuit Court of Appeals, No. 18-397.


