Well, that didn’t take long. Just five days into 2018, and the American fake news industry is already up and running, churning out tasteless whoppers faster than Burger King.
Wired magazine has joined the greasy ranks of other Western mythmakers now fueling a black wave of anti-Russia hysteria by mass-producing never-ending unsubstantiated claims and outright lies against the Kremlin.
The article begins with a doomsday scenario involving some “terrorist organization or nefarious nation” making the reckless decision to cut the undersea fiber optic cables that connect people across the world. So out of all the numerous diabolical groups that now populate the planet, who did Wired nominate as the most likely to pull off such a wanton act of sabotage? Yes, you got it. Putin’s Russia.
The obvious question for any rational thinking person is: Why would Russia do such a thing? Because, according to Wired, the Russian Navy has been “repeatedly caught snooping near the cables” that run along the entire expanse of the North Atlantic Ocean. Wired conveniently fails to remind its readers, however, that any country with a naval force would be forced to pass these lines on numerous occasions in the course of its travels. But acknowledging as much would be putting facts before fiction, and of course we can’t have that.
So where does Wired get its information regarding these latest nefarious plans on the part of Russia? From yet another purveyor of Russian fake news – arguably second only to the Washington Post – the New York Times.
“Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict,” the Times breathlessly reported back in 2015.
However, just like the fake news of ‘Russia hacking the 2016 US presidential elections,’ don’t expect any evidence to support the claims. In fact, the Times admits as much in the third paragraph.
“While there is no evidence yet of any cable cutting, the concern is part of a growing wariness among senior American and allied military and intelligence officials over the accelerated activity by Russian armed forces around the globe.”
Well, now we’re getting somewhere. What really seems to be annoying the Americans is not some sort of outlandish attack on the Internet by Russia, but the fact that the Russian military is now a force to reckon with.
It is also worth noting that the Times article appeared just one month after Vladimir Putin committed the Russian military in September 2015 to fighting against Islamic State forces in Syria – following a formal request by Syrian President Bashar Assad. Some might call that curious timing.
So what exactly would Russia stand to gain from cutting these undersea cables? Absolutely nothing. In fact, as even Wired was gracious enough to admit – albeit buried far at sea in its hit piece – is that any cutting of the cables would be more injurious to Russia than most other countries.
“… Russia’s epic hypothetical cable attack would primarily harm its own people,” according to a Telegeography senior analyst Jonathan Hjembo, as quoted by the magazine. “It would hurt the Russians perhaps even more than it would hurt [Americans]. They’re far more dependent on international networks than we are, because so much of our content is stored locally.”
In fact, Wired was forced to admit that the greatest threat to the undersea cables is not Russia, the bogeyman of nearly every Western publication in circulation, but fishermen and scavengers.
Wired retold the story of one elderly woman who accidentally cut through an underground cable “while scavenging for copper,” cutting off Armenia’s entire internet access, leaving the country offline for five hours.
Yet despite those admissions, and the absolute lack of any incentive on the part of Russia to commit such an act of folly, Wired bowed out of its story with a parting shot at “Putin’s Russia” anyways.
“There have also been no ruptures attributed to Russian aggression. It appears that Putin has largely left the undersea cables alone, at least for now.”
Clearly, as this ridiculously flimsy article illustrates, without any shame, there will be no pause in the anti-Russia propaganda mudslinging in the New Year.
Award winning journalist James Risen has recently described in some detail his sometimes painful relationship with The New York Times. His lengthy account is well worth reading as it demonstrates how successive editors of the paper frequently cooperated with the government to suppress stories on torture and illegal activity while also self-censoring to make sure that nothing outside the framework provided by the “war on terror” should be seriously discussed. It became a faithful lap dog for an American role as global hegemon, promoting government half-truths and suppressing information that it knew to be true but which would embarrass the administration in power, be they Democrats or Republicans.
If one were to obtain a similar insider account of goings-on at the other national “newspaper of record”, The Washington Post, it is quite likely that comparable trimming of the narrative also took place. To be sure, the Post is worse than the Times, characterized by heavily editorializing in its news coverage without necessarily tipping off the reader when “facts” end and speculation begins. In both publications, stories about Iran or Russia routinely begin with an assertion that Moscow interfered in the 2016 U.S. election and that Iran is the aggressor in the Middle East, contentions that have not been demonstrated and can easily be challenged. Both publications also have endorsed every American war since 2001, including Iraq, Libya and the current mess in Syria, one indication of the quality of their reporting and analysis.
A recent op-ed in the Times by Bret Stephens is a perfect example of warmongering mischief wrapped in faux expert testimony to make it palatable. Stephens is the resident neocon at the Times. He was brought over from the Wall Street Journal when it was determined that his neocon colleague David Brooks had become overly squishy, while the resident “conservative” Russ Douthat had proven to be a bit too cautious and even rational to please the increasingly hawkish senior editors.
Stephens’ article, entitled Finding the Way Forward on Iran sparkles with throwaway gems like “Tehran’s hyperaggressive foreign policy in the wake of the 2015 nuclear deal” and “Real democracies don’t live in fear of their own people” and even “it’s not too soon to start rethinking the way we think about Iran.” Or try “A better way of describing Iran’s dictatorship is as a kleptotheocracy, driven by impulses that are by turns doctrinal and venal.”
Bret has been a hardliner on Iran for years. Early on in this op-ed he makes very clear that he wants it to be dealt with forcibly because it has “centrifuges, ballistic missiles, enriched uranium [and] fund[s] Hezbollah, assist Bashar al-Assad, arm[s] the Houthis, [and] imprison[s] the occasional British or American citizen.” He describes how Iran is a very corrupt place run by religious leaders and Revolutionary Guards and proposes that their corruption be exposed so that the Iranian people can take note and rise up in anger. And if exposure doesn’t work, they should be hammered with sanctions. He does not explain why sanctions, which disproportionately hurt the people he expects to rise up, will bring about any real change.
Stephens cites two of his buddies Ken Weinstein of the Hudson Institute and Mark Dubowitz of the Foundation for the Defense of Democracies (FDD), who are apparently experts on how to squeeze Iran. Weinstein prefers exposing the misdeeds of the Mullahs to anger the Iranian people while Dubowitz prefers punitive sanctions “for corruption.”
The article does not reveal that Weinstein and Dubowitz are long time critics of Iran, are part of the Israel Lobby and just happen to be Jewish, as is Stephens. The Hudson Institute and the FDD are leading neocon and pro-Israel fronts. So my question becomes, “Why Iran?” The often-heard Israeli complaint about its being unfairly picked on could reasonably be turned on its head in asking the same about Iran. In fact, Iran compares favorably with Israel. It has no nuclear weapons, it does not support any of the Sunni terrorist groups that are chopping heads, and it has not disenfranchised hundreds of thousands of people that it rules over. The fact is that Iran is being targeted because Israel sees it as its prime enemy in the region and has corrupted many “opinion makers” in the U.S., to include Stephens, to hammer home that point. To be sure, Iran is a very corrupt place run by people who should not be running a hot dog stand, but the same applies to the United States and Israel. And there are lots of places that are not being targeted like Iran that are far worse, including good friend and ally of both Jerusalem and Washington, Saudi Arabia.
Oddly enough Stephens, Weinstein and Dubowitz do not get into any of that back story, presumably because it would be unseemly. And, of course and unfortunately, the New York Times opinion page is not unique. An interesting recent podcast interview by Politico‘s Chief International Affairs correspondent Susan Glasser with leading neoconservatives Eliot Cohen and Max Boot, is typical of how the media selectively shapes a narrative to suit its own biases. Glasser, Cohen and Boot are all part of the establishment foreign policy consensus in the U.S. and therefore both hate and fail to understand the Trump phenomenon. Both Cohen and Booth were vociferous founding members of the #NeverTrump foreign policy resistance movement.
Boot describes the new regime’s foreign policy as “kowtow[ing] to dictators and undermin[ing] American support for freedom and democracy around the world,” typical neocon leitmotifs. Glasser appears to be in love with her interviewees and hurls softball after softball. She describes Boot as “fantastic” and Cohen receives the epithet “The Great.” The interview itself is remarkably devoid of any serious discussion of foreign policy and is essentially a sustained assault on Trump while also implicitly supporting hardline national security positions. Cohen fulminates about “a very serious Russian attack on the core of our political system. I mean, I don’t know how you get more reckless and dangerous than that,” while Boot asks what “has to be done” about Iran.
Pompous ass Cohen, who interjected in the interview that “and you know, Max and I are both intellectuals,” notably very publicly refused to have any part in a Trump foreign policy team during the campaign but later when The Donald was actually elected suggested that the new regime might approach him with humility to offer a senior position and he just might condescend to join them. They did not do so, and he wrote an angry commentary on their refusal.
Hating Trump is one thing, but I would bet that if the question of a hardline policy vis-à-vis Russia or the Jerusalem Embassy move had come up Cohen and Boot would have expressed delight. The irony is that Trump is in fact pursuing a basically neocon foreign policy which the two men would normally support, but they appear to be making room for Trump haters in the policy formulation process to push the national security consensus even farther to the right. Indeed, in another article by Boot at Foreign Policy he writes “I applaud Trump’s decisions to provide Ukraine with arms to defend itself from Russian aggression, to recognize Jerusalem as the capital of Israel, to send additional U.S. troops to Afghanistan, and to accelerate former President Barack Obama’s strategy for fighting the Islamic State.” Cohen meanwhile applauds the embassy move, though he warns that Trump’s success in so doing might embolden him to do something reckless over North Korea.
Perhaps one should not be astonished that leading neocons appearing in the mainstream media will continue to have their eyes on the ball and seek for more aggressive engagement in places like Iran and Russia. The media should be faulted because it rarely publishes any contrary viewpoint and it also consistently fails to give any space to the considerable downside to the agitprop. It must be reassuring for many Americans to know that the Center for Disease Control and Prevention (CDC) is preparing itself to deal with the aftermath of a nuclear attack on the United States and it will be sharing information on the appropriate preparations with the American people. There will be a public session on how to prepare for a nuclear explosion on January 16th.
CDC experts will consider “planning and preparation efforts” for such a strike. “While a nuclear detonation is unlikely, it would have devastating results and there would be limited time to take critical protection steps,” the Center elaborated in its press release on the event.
That the United States should be preparing for a possible nuclear future can in part be attributed to recent commentary by the “like, really smart” and “very stable genius” who is the nation’s chief executive, but the fuel being poured on the fire for war is from the very same neocons who are featured in the mainstream media as all-purpose experts and have succeeded in selling the snake oil about America’s proper role as aggressor-in-chief for the entire world. It would be an unparalleled delight to be able to open a newspaper and not see Bret Stephens, Eliot Cohen, Max Boot or even the redoubtable Bill Kristol grinning back from the editorial page, but I suppose I am only dreaming.
Philip M. Giraldi, Ph.D., is Executive Director of the Council for the National Interest, a 501(c)3 tax deductible educational foundation that seeks a more interests-based U.S. foreign policy in the Middle East. Website is http://www.councilforthenationalinterest.org, address is P.O. Box 2157, Purcellville VA 20134 and its email is inform@cnionline.org.
Today there are claims being made that the Iran Protests are Due to “Global Warming”- Seriously, this is the absolute baloney, garbage, nonsense that is being put forth as the reason for these protests.
“Barbara Slavin, director of the Future of Iran Initiative at the Atlantic Council.
She said the role of climate change on the protests is “massive” and under-reported by the media.
This exact same claim was made regarding Syria, by self proclaimed authority figures and regurgitated by agenda pushing 5 eyes msm and alt media. Though it was later clarified that the scientific evidence for the Syrian claim was so thin as to be considered tenuous. Tenous: lacking a sound basis, as reasoning; unsubstantiated; weak: Yah, tenuous sounds exactly right!
“There is no sound evidence that global climate change was a factor in sparking the Syrian civil war,” said University of Sussex Professor Jan Selby, one of the study’s co-authors, in a statement.
“It is extraordinary that this claim has been so widely accepted when the scientific evidence is so thin.”
A lack of evidence never stops liars from lying. Same spin, different destabilization campaign.
The English translation of German journalist Udo Ulfkotte’s best-selling book, Gekaufte Journalisten (Bought Journalists) appears to have been suppressed throughout North America and Europe.
On May 15, 2017 Next Revelation Press, an imprint of US-Canadian-based publisher Tayen Lane, released the English version of Bought Journalists, under the title, Journalists for Hire: How the CIA Buys the News.
Tayen Lane has since removed any reference to the title from its website. Correspondingly Amazon.com indicates the title is “currently unavailable,” with opportunities to purchase from independent sellers offering used copies for no less than $1309.09.[note from OffG- we also checked on Amazon UK, as of January 7 2018 the book is unavailable there too]
The book’s subject matter and unexplained disappearance from the marketplace suggest how powerful forces are seeking to prevent its circulation.
Gekaufte Journalisten was almost completely ignored by mainstream German news media following its release in 2014. “No German mainstream journalist is allowed to report about [my] book,” Ulfkotte observed:
Otherwise he or she will be sacked. So we have a bestseller now that no German journalist is allowed to write or talk about.{1]
Along these lines, publication of the English translation was repeatedly delayed. When this author contacted Ulfkotte in early December 2015 to inquire on the book’s pending translation, he responded,
The above address, once providing the book’s description and anticipated publication date, now leads to an empty page.[2] Tayen Lane has not responded to emails or telephone calls requesting an explanation for the title’s disappearance.
When a book publisher determines that it has acquired a politically volatile or otherwise “troublesome” title it may embark on a process recognized in the industry as “privishing.” “Privishing is a portmanteau meaning to privately publish, as opposed to true publishing that is open to the public,” writes investigative journalist Gerald Colby.
It is usually employed in the following context: “We privished the book so that it sank without a trace.” The mechanism used is simple: cut off the book’s life-support system by reducing the initial print run so that the book “cannot price profitably according to any conceivable formula,” refuse to do reprints, drastically slash the book’s advertising budget, and all but cancel the promotional tour.”[3]
Privishing often takes place without the author knowing, simply because it involves breach of contract and potential liability.
Tayen Lane will likely not face any legal challenge in this instance, however. Ulfkotte died of a heart attack on January 13, 2017, at age 56.[4]
Udo Ulfkotte was a prominent European journalist, social scientist, and immigration reform activist. Upon writing Gekaufte Journalisten and becoming one of the most significant media industry and deep state whistleblowers in recent history, Ulfkotte complained of repeated home searches by German state police and expressed fear for his own life. He also admitted previous health complications stemming from witnessing a 1988 poisoned gas attack in Iraqi Kurdistan.
Ulfkotte’s testimony of how intelligence agencies figure centrally in Western journalism is especially compelling because he for many years functioned in the higher echelons of mainstream newsworkers.
The German journalist explains how he was recruited during the 1980s to work in espionage. This began through an invitation proffered by his graduate school advisor for an all-expense-paid trip to attend a two-week seminar on the Cold War conflict in Bonn.
After Ulfkotte obtained his doctorate he was given a job as a reporter at “the leading conservative German newspaper, the Frankfurter Allgemeine Zeitung, oddly appointed despite no journalistic training and hundreds of other applicants.
Serving as a correspondent throughout the Middle East, Ulfkotte eventually became acquainted with agents from the CIA, German intelligence agency Bundesnachrichtendienst (BND), Britain’s MI6, and Israel’s Mossad, all of whom valued his ability to travel freely in countries largely closed to the West.
His editors readily collaborated in such intelligence gathering operations,”[5] for which journalist possess “non-official cover” by virtue of their profession.
“Non-official cover” occurs when a journalist is essentially working for the CIA, but it’s not in an official capacity,” Ulfkotte explains.
This allows both parties to reap the rewards of the partnership, while at the same time giving both sides plausible deniability. The CIA will find young journalists and mentor them. Suddenly doors will open up, rewards will be given, and before you know it, you owe your entire career to them. That’s essentially how it works.[6]
He likewise ruefully admits to
publishing articles under my own name written by agents of the CIA and other intelligence services, especially the German secret service.[7]
Ulfkotte’s insider knowledge of the relationship between mainstream media and the intelligence community has special relevance in terms of informing the CIA’s antipathy toward Wikileaks, as well as the media campaign centering on the Trump administration’s alleged “ties to Russia,” while also lending credence to Trump’s frequent claims of the US media’s political biases and deep state ties. Indeed, Ulfkotte “Tweeted” about these very subjects just two days before he passed.
Ulfkotte’s explosive revelations still have the potential to further intensify the much-deserved scrutiny corporate news media presently face. In a society that pays more than lip service to freedom of thought and expression Journalists for Hire would be required reading for college students—and particularly those studying in journalism programs intending to seek employment in the media industries.
In fact, journalism professors, some of whom have migrated to the academy following long careers at renowned news outlets, possess similar insider knowledge of the relationships Ulfkotte readily explains. As both journalists and educators they have a twofold burden of responsibility. This is the case more so than ever because the entire professional and intellectual enterprise they are engaged in (and one directly linked to the nation’s accelerating civic deterioration) has been made a farce.
Journalists for Hire’s suppression suggests how Ulfkotte’s posthumous censors refuse for this important examination and cleansing to proceed.
[2] Udo Ulfkotte to James Tracy, email correspondence, December 6, 2015. In author’s possession.
[3] Gerard Colby, “The Price of Liberty,” in Into the Buzzsaw: Leading Journalists Expose the Myth of a Free Press, Kristina Borjesson, ed., Amherst NY: Prometheus Books, 2002, 15-16.
[4] Former US military intelligence officer L. Fletcher Prouty relates a similar experience of how publication of his book, The Secret Team: The CIA and Its Allies in Control of the United States and the World, was greeted in 1972. “Then one day a business associate in Seattle called to tell me that the bookstore next to his office building had had a window full of books the day before, and none the day of his call. They claimed they had never had the book. I called other associates around the country. I got the same story from all over the country. The paperback had vanished. At the same time I learned that Mr. Ballantine had sold his company. I traveled to New York to visit the new ‘Ballantine Books’ president. He professed to know nothing about me, and my book … The campaign to to kill the book was nationwide and worldwide. It was removed from the Library of Congress and from College libraries as letters I received attested all too frequently.” Prouty, The Secret Team: The CIA and Its Allies in Control of the United States and the World, New York: SkyHorse Publishing, 2008, xii.
Most of our readers are now more than familiar with the bizarre events surrounding the BBC Panorama program Saving Syria’s Children. We’ve already returned to this storyseveraltimes. The possibility that this program presented faked footage of a non-existent chemical attack by government troops on a school in Syria has been meticulously documented by independent researcher Robert Stuart over several years.
But a further twist to the story seems to show that the crew who filmed this questionable footage were being escorted and protected during their sojourn in Syria, by members of a jihadist terrorist group affiliated to Jabhat al-Nusra, al-Qaeda and ISIS.
The evidence, on the face of it, seems damning.
Ten minutes, 18 seconds into the program (which can be seen here) the film crew record a car journey, with the two British doctors featured in the program, to “see what medical care is available for children closer to where the fighting is”. At one point the journalist Ian Pannell can be heard in voice over saying:
Western journalists have been targeted in Syria, so I have to travel with my own security. The doctors are able to be more low key and take their own vehicles.
As he speaks we see Pannell himself, presumably filmed by his cameraman Darren Conway, in a car, part of a convoy, accompanied by armed men. We also see the hood of one of the cars in the convoy several times and pretty clearly. It has a logo on it. This is it:
The inset on the right is the logo of Ahrar-al-Sham.
It was just 19 days after this massacre – on August 23 – that Ian Pannell and cameraman Darren Conway (now an OBE) apparently decided Ahrar-al-Sham were the go-to ’security’ guys for them. The documentary further shows Pannell, Conway and their chums being waved through ISIS road blocks without a hitch. This is the same ISIS who – allegedly – had declared war on all westerners and were prone to cutting off their heads (though in 2013 this hadn’t become the media meme it later became). Our boys are apparently welcome deep in ISIS territory, with no worries about repercussions.
But maybe the contact with terrorists was fleeting and almost accidental? Well, below are two images that tell a story. The top one is a screencap from Saving Syria’s Children. The man outlined in red is the “Fixer/Translator” for the program, Mughira Al-Sharif, and he is shown driving Pannell’s convoy car (Pannell himself can be seen second from right next to the window in the back). Mughira is seen again in the bottom image in a photograph taken the same day and shared on Instagram. Also with him in this pic, and looking remarkably chummy, are two members of the Ahrar-al-Sham security detail who can be seen in Pannell’s car. Mughira described these men in his Instagram post as ‘friends’. That post was subsequently deleted.
(Above) Fixer/Translator Mughira Al-Sharif driving Ian Pannell’s convoy saloon car in Saving Syria’s Children. Pannell is second from right. (Below) Al Sharif poses with two of the Ahrar al-Sham men in an Instagram post of the same day, describing them as “friends”. The post was subsequently deleted.
Let’s be clear – these “friends’ of Mughira’s could well have taken part in the recent slaughter discussed above, and must, at very least, be assumed to support the mass murder of innocent people. And this man Mughira is employed by Pannell as his guide and helper in making their documentary.
Why are a supposedly distinguished and professional BBC journalist and his crew working with allies of ISIS? Why are they using them as their ‘security’? Why are they comfortable tooling round Syria in a car festooned with jihadist logos? Why did they end up producing a documentary using highly questionable footage to promote UK intervention against the elected government of Syria?
Did neither they nor their employers at the BBC realise what they were doing?
Or did they know and think it was just dandy?
When is the BBC – and Ian Pannell and Darren Conway(OBE) – going to answer these and the many other questions hanging over this program and their credibility?
An unverified report that Beijing was negotiating a secret deal with Pyongyang, published on Tuesday by the Washington Free Beacon, and syndicated by the Washington Times newspaper, has not gained much traction beyond that spattering of conservative American news outlets, garnering only a healthy dose of skepticism.
Not surprisingly, China was also not interested.
Chinese foreign ministry spokesperson Geng Shuang responded Wednesday to a Chinese-language question on the report with two words – in English.
“Fake news,” Geng was quoted as saying in the official transcript of Wednesday’s regular press breifing. Next question, please.
The “top secret” document published in the report was purported to be from “a person who once had ties to the Chinese intelligence and security communities,” whatever that means, but the author also said he could not independently verify the document.
The question we posed yesterday is whether conservative media’s reporting of the document as newsworthy will pique Trump’s interest, regardless of its veracity. If the report was true, it makes Trump look like he was played like a fiddle, so he might be careful not to draw attention.
We might also see if the US president buys the “fake news” line — which he uses exclusively to lambast hostile liberal media — when it is used against conservative media supportive of his administration.
A new Pentagon report claiming that Iran supports terrorist groups such as the Taliban and al-Qaeda has been disseminated through American media outlets – but has come under fire for wishy-washy claims about said connections.
For instance, one supposed link came when Saad bin Laden, one of Osama bin Laden’s sons, fled to Iran after the September 11, 2001, attacks in the US. But what isn’t mentioned is that Saad and his family were detained upon arrival and placed under house arrest. Khalid bin Laden, another of Osama’s sons who was killed alongside him during the 2011 US Navy SEALs raid, accused the Iranians in 2010 of subjecting his family members to beatings and severe mistreatment.
Garland Nixon and Lee Stranahan of Radio Sputnik’s Fault Lines spoke to John Kiriakou, a CIA agent-turned-whistleblower who helped reveal the CIA’s torture program to the American public in 2007.
”The whole thing rests on your definition of harbor,” said Kiriakou. “Osama bin Laden’s son [Saad] in the immediate aftermath of the [battle of Tora Bora in December 2001] fled to Iran with his wives and his children and a handful of hangers-on. They were promptly arrested at the border. They were not put under house arrest in some beautiful palace with servants and a view of the valley; they were put under arrest and put in a jail. If that’s harbored, man, I don’t want to be harbored.”
“Let me say something unequivocally: there was no cooperation between al-Qaeda and Iran, just like there was no cooperation between al-Qaeda and Iraq.” Kiriakou referenced a little-mentioned Taliban execution of Iranian diplomats a few years before 9/11: in 1998, in the city of Mazar-i-Sharif, the Taliban rounded up and killed a number of Iranian diplomats in retribution for Tehran’s support of the Northern Alliance in their war against the Taliban in the 90s — the same Northern Alliance that the US supported when they invaded Afghanistan in October 2001.
“There’s no love lost between between the Taliban/al-Qaeda and the Iranians,” said Kiriakou. “I’m going to say it again unequivocally: there is no connection between Iran and al-Qaeda, this is being made up. There are other countries that would benefit from the proliferation of this lie — but that’s what it is, simply a lie.”
Nixon mentioned that the connection between al-Qaeda and Iran was drawn from a CIA document dump from early November, with all the articles appearing in a three-day period — almost as though the outlets had coordinated to make the story.
“This is what the CIA does to confuse people,” said Kiriakou. “There’s no analysis, there’s no vetting of the documents, they just dump it. This is exactly what the CIA complained was happening during the first four years of the Bush administration, where the president is coming out or his aides are coming out and saying, ‘there’s cooperation between the Iraqi government and al-Qaeda.’ There wasn’t.”
“But what was happening was that people in the [National Security Council] who had their own political agenda were passing the president raw intelligence that had not been vetted, not been analyzed by the directorate of intelligence. Well, the CIA is doing exactly the same thing now, but they’re using the press as their dupe. They’re just releasing this raw data taken off of Osama bin Laden’s computers and saying, ‘here it is!’ No analysis, no nothing.”
On Wednesday, former New York Times journalist James Risen published a story on The Intercept in which he claimed his skepticism that Iraq under Saddam Hussein was linked to terrorist groups such as al-Qaeda were on multiple occasions buried by the Times’ editorial staff.
“My stories raising questions about the intelligence, particularly the administration’s claims of a link between Iraq and al-Qaeda, were being cut, buried or held out of the paper altogether,” Risen wrote. “What angered me most was that while they were burying my skeptical stories, the editors were not only giving banner headlines to stories asserting that Iraq had weapons of mass destruction, they were also demanding that I help match stories from other publications about Iraq’s purported WMD programs.”
Risen, and the others who were skeptical about the US intelligence community’s claims that Saddam had partnered with al-Qaeda and other terrorist groups in order to garner support for the 2003 invasion, were vindicated by history when the alleged links were revealed to be false.
Gusts of 100mph were recorded at Great Dun Fell in Cumbria at 1am.
Wow! Hurricane force winds, as has been reported elsewhere.
Only one slight problem though. Great Dun Fell is the second highest mountain in England’s Pennines , and the weather station is sat at the very top, at an altitude of 847m.
Even then, mean wind speeds only reached 75 mph.
At nearby Warcop, just seven miles away and at an altitude of 224m, wind speed never got above 29 mph, a “strong breeze” on the Beaufort Scale.
This all comes from a Press Association report, which in turn appears to have been fed by the Met Office.
Why the Met Office should decide to deliberately mislead the public is anybody’s guess.
The Telegraph goes on to mention that 77mph gusts were recorded in High Bradfield, South Yorkshire.
I live 5 miles away from High Bradfield, and it was no more than a bit windy. So it won’t come as any surprise that High Bradfield is also a high altitude site, high up in the Peak District at 395m.
The nearest site with up to date data, according to the Met Office, is Watnall, 32 miles away in Nottinghamshire.
There wind speeds only reached 24 mph, a “Fresh Breeze” on the Beaufort Scale.
Even in Southern Scotland, the area worst affected in Britain, where the Met Office reported gusts of 72 mph high up on exposed cliffs above the Solway near Dundrennan, the mean wind speed peaked at 54 mph, still only a “Strong Gale”.
The headline claim that Storm Eleanor has lashed the UK with violent storm-force winds of up to 100mph is quite fraudulent.
If there’s one thing that the West’s state-corporate media loves to report, it’s public protest within a non-compliant country — people demonstrating against a government that has refused to roll over in the face of US aggression and greed.
If you’re in the habit of examining these media reports, you’ll often find that there’s a particular word which gets used a lot.
Here are a few highly topical examples; see if you can work out which word it is…
Iranians protesting the country’s strained economy gathered in Tehran and another major city on Friday, for the second day of spontaneous, unsanctioned demonstrations […] (US, Associated Press, via Washington Post, 29 Dec 2017)
A wave of spontaneous protests over Iran’s weak economy swept into Tehran on Saturday, with college students and others chanting against the government… (UK, Associated Press, via Mail Online, 30 Dec 2017)
Unauthorized, spontaneous protests engulfed Iran’s major cities for a third straight day on Saturday as what started out as demonstrations over rising prices seem to have taken a decidedly anti-government tone. (Slate.com, 30 Dec 2017)
Pro-government Iranians rallied in Tehran Saturday following spontaneous angry protests in the capital and other major cities. (US, Fox News with Associated Press, 30 Dec 2017)
A relatively small protest on Thursday in Mashhad, Iran’s second largest city . . . unexpectedly gave impetus to a wave of spontaneous protests spreading across provinces. (UK, Guardian, 31 Dec 2017)
Protests seem to be spontaneous and lack a clear leader. (Australia, ABC Radio Australia, 1 Jan 2018)
Yes: the Word of the Day is spontaneous.
As far as our state-corporate media and its ubiquitous anti-journalism are concerned, this is one of the most fascinating adjectives we ever see. Let’s take a moment to examine its use…
For a start, how would anyone really know — and so quickly, too! — that these foreign protests, these far-away demonstrations were all ‘spontaneous’? Are thousands of protestors across Iran currently in touch with hundreds of Western journalists — and constantly insisting on the utter spontaneity of everything they do?
No, they aren’t. And even if they were, why would anyone with any sense believe they were telling the truth?
The reality is, of course, that ‘spontaneous’ is a propaganda word, purely manipulative. It’s there to achieve three different but related aims — every one of which serves the imperialist agendas of the Western elites.
First, it helps to create the encouraging impression of an Official Enemy in Deep Trouble. If the media unites in painting a given set of protests as ‘spontaneous‘, then the illusion can be manufactured that ‘the population as a whole‘ is ‘angrily turning against‘ the obstructive government that the West is so selfishly anxious to see removed. ‘Clearly, this vile regime is tottering! Stay focused, everyone! Our corporations will be gang-raping the place in no time!‘
Secondly, ‘spontaneous’ protests are by far the best kind when it comes to ‘justifying’ illegal and destructive ‘intervention’ in a non-compliant country. How ‘desperate‘ an oppressed population must be if it ‘takes to the streets’ in ‘spontaneous protests’! How ‘close to the edge‘ those people must feel to be ‘finallyovercoming their fear‘ and ‘actually calling for change‘! ‘Those people can’t take much more of this! For God’s sake, we have to do something! How about we try more economic warfare — plus humanitarian bombing? Agreed…?‘
Thirdly, it’s a word that’s designed to take the most important thought of all … and drive it far away from everyone’s mind. For what, ultimately, the word ‘spontaneous‘ says is: ‘Do not for a moment consider the probability that this is happening as part of a carefully co-ordinated and externally funded regime-change operation. Don’t even think about it! It’s all just SPONTANEOUS, d’you hear!‘
And if you won’t listen to me, pay attention to Nikki Haley, the Novelty Talking Insect currently doubling as the Trump Administration’s ‘Ambassador to the United Nations’…
See…?
For the rest — and just in case anyone still refuses to believe how indispensable a weapon is the word ‘spontaneous’ in the armoury of the modern journalist-impersonator — note how and when the imprimatur is withheld.
On the one hand, when a Western media trusty encounters what might be a public demonstration of support for an Official Enemy, ‘spontaneity’ will be specifically denied — sometimes even before you can say Nick Jack Robinson…
Then, on the other hand, there’s what happens when people in the Proudly Democratic West decide to protest about the actions or policies of their own governing elites. For, if a protest or demonstration is happening whose scale and importance cannot altogether be denied by our state-corporate media, the word ‘spontaneous’ simply won’t be in evidence: it would be too legitimating…
TEHRAN – The above image has become synonymous with the Iranian protests that have engulfed most regions of Iran for the past week. However, there remains one problem…. The original image has nothing to do with the current protests at all.
The original photo shows a woman with a hijab on a stick in a defiant moment as she challenges the law that makes it compulsory for women to wear a hijab in Iran.
However this was taken before the current protests even began. Although the Islamic Republic forces women to wear the hijab, its slow liberalization is seen, especially with Tehran announcing just days before protests began that they will no longer enforce the law in this regard.
However, despite the current protests being about economic reform and a clampdown on corruption, Western war enablers, particularly so-called activists and Western media, have widely been spreading this image as a symbol for a struggle against the regime that only exists in their own mind and not in the general consensus of Iranians, nor the majority of those protesting.
As Israeli geopolitical expert Michael A. Horowitz acknowledges, “The only thing this new “symbol,” [the image] largely imposed from the outside [the West], does represent is some form of “wishful thinking” from outside observers on what they’d want the current protest movement to be.
Western war hawks, activists and media alike are all trying to portray the Iranian protests as one for regime-change, but this remains only a small segment of the current protesters. However, no amount of Western “wishful thinking” as Horowitz correctly asserts, will change the fact that the majority of women currently protesting come from conservative segments of Iran.
It has been found that Saudi Arabia has tweeted more about the Iranian protests then people within Iran has themselves, with around three-quarters of all tweets about the protests coming from outside of the Islamic Republic.
Therefore, it can be seen that the great pushers for the protests are mostly coming from outside of the country. Another attempted colored revolution that will fail just as imperialists had in Venezuela last year.
On December 19, in a Wall Street Journal editorial that drew much attention, Homeland Security Advisor Tom Bossert asserted that North Korea was “directly responsible” for the WannaCry cyberattack that struck more than 300,000 computers worldwide. The virus encrypted files on infected computers and demanded payment in return for supposedly providing a decryption key to allow users to regain access to locked files. Bossert charged that North Korea was “using cyberattacks to fund its reckless behavior and cause disruption across the world.” [1]
At a press conference on the same day, Bossert announced that the attribution was made “with evidence,” and that WannaCry “was directed by the government of North Korea,” and carried out by “actors on their behalf, intermediaries.” The evidence that led to the U.S. to that conclusion? Bossert was not saying, perhaps recalling the ridicule that greeted the FBI and Department of Homeland Security’s misbegotten report on the hacking of the Democratic National Committee. [2] “Press Briefing on the Attribution of the WannaCry Malware Attack to North Korea,” Whitehouse.gov, December 19, 2017.
The centerpiece of the claim of North Korean culpability is the similarity in code between the Contopee malware, which opens backdoor access to an infected computer, and code in an early variant of WannaCry. [3]
Contopee has been linked to the Lazarus group, a cybercrime organization that some believe launched the Sony hack, based on the software tools used in that attack. Since North Korea is widely considered to be behind the cyberattack on Sony, at first glance that would appear to seal the argument.
It is a logical argument, but is it founded on valid premises? Little is known about Lazarus, aside from the operations that are attributed to it. The link between Lazarus and North Korea is a hypothesis based on limited evidence. It may or may not be true, but the apparent linkage is far weaker than mainstream media’s conviction would have one believe. Lazarus appears to be an independent organization possibly based in China, which North Korea may or may not have contracted to perform certain operations. That does not necessarily mean that every action – or even any action at all – Lazarus performs is at North Korea’s behest.
In Bossert’s mind as well as that of media reporters, Lazarus – the intermediaries Bossert refers to – and North Korea are synonymous when it comes to cyber operations. North Korea gives the orders and Lazarus carries them out. James Scott, a senior fellow at the Institute for Critical Infrastructure Technology, notes that “speculation concerning WannaCry attributes the malware to the Lazarus Group, not to North Korea, and even those connections are premature and not wholly convincing. Lazarus itself has never been definitively proven to be a North Korean state-sponsored advanced persistent threat (APT); in fact, an abundance of evidence suggests that the Lazarus group may be a sophisticated, well-resourced, and expansive cyber-criminal and occasional cyber-mercenary collective.” Furthermore, Scott adds, the evidence used to tie Lazarus to North Korea, “such as an IP hop or some language indicators, are circumstantial and could even be intentional false flags” to misdirect investigators. [4]
Whether an association exists or not between Lazarus and North Korea has little meaning regarding a specific attack. Joseph Carson of Thycotic emphasizes “that it is important to be clear that [Lazarus] is a group and motives can change depending on who is paying. I have found when researching hacking groups they can one day be working for one government under one alias and another using a different alias. This means that association in cyberspace means nothing.” [5]
It is considered a particularly damning piece of evidence that some of the tools used in an early variant of WannaCry share characteristics with those deployed in the cyberattack on Sony. [6] However, there is ample cause for doubting North Korea’s role in the Sony hack, as I have written about before. [7] Following the Sony breach, IT businessman John McAfee revealed that he had contact with the group that attacked Sony. “It has to do with a group of hackers” motivated by dislike of the movie industry’s “controlling the content of art,” he said, and the FBI was wrong in attributing the attack to North Korea. [8]
If attribution of the Sony hack to North Korea does not hold up, then linkage based on tool usage falls apart.
Once malware is deployed, it often appears for sale on the Dark Web, where it can be purchased by cybercriminals. The reuse of code is a time-saving measure in building new threats. Indeed, malware can find its way onto the market quite rapidly, and almost as soon as WannaCry was wreaking havoc back in May, it was reported that “researchers are already finding variants” of WannaCry “in the wild.” [9]
According to Peter Stephenson of SC Media, “The most prevailing [theory] uses blocks of code that were part of known Korean hacks appearing in the WannaCry code as justification for pinning the attacks on NK. That’s really not enough. These blocks of code are readily available in the underground and get reused regularly.” [10]
Commonality of tool usage means less than we are led to believe. “While malware may initially be developed and used by a single actor,” Digital Shadows explains, “this does not mean that it will permanently remain unique to that actor. Malware samples might be accidentally or intentionally leaked, stolen, sold, or used in independent operations by individual members of the group.” [11]
“Shared code is not the same as attribution. Code can be rewritten and erased by anyone, and shared code is often reused,” observes Patrick Howell O’Neill of Cyberscoop. “The same technique could potentially be used to frame another group as responsible for a hack but, despite a lot of recent speculation, there is no definitive proof.” [12]
None of the shared code was present in WannaCry’s widespread attack on May 12. Although it is more likely than not that the same actor was behind the early variants of WannaCry and the May version, it is not certain. Alan Woodward, cybersecurity advisor to Europol, points out, “It is quite possible for even a relatively inexperienced group to obtain the malicious WannaCry payload and to have repackaged this. Hence, the only thing actually tying the May attacks to the earlier WannaCry attacks is the payload, which criminals often copy.” [13]
The most devastating component WannaCry utilized in its May 12 attack is EternalBlue, an exploit of Windows vulnerabilities that was developed by the National Security Agency and leaked by Shadow Brokers. The NSA informed Microsoft of the vulnerability only after it learned of the software’s theft. According to Bossert, the NSA informs software manufacturers about 90 percent of the time when it discovers a vulnerability in operating software. It keeps quiet about the remaining ten percent so that it can “use those vulnerabilities to develop exploits for the purpose of national security for the classified work we do.” [14] Plainly put, the NSA intentionally leaves individuals and organizations worldwide exposed to potential security breaches so that it can conduct its own cyber operations. This is less than reassuring.
The May variant of WannaCry also implemented DoublePulsar, which is a backdoor implant developed by the NSA that allows an attacker to gain full control over a system and load executable malware.
The two NSA-developed components are what allowed WannaCry to turn virulent last May. After loading, EternalBlue proceeds to infect every other vulnerable computer on the same network. It simultaneously generates many thousands of random IP addresses and launches 128 threads at two-second intervals, seeking vulnerabilities in computers that it can exploit at each one of the generated external IP addresses.[15]
China and Russia were among the nations that were most negatively impacted by the malware. [16] WannaCry initially targeted Russian systems, which would seem an odd thing for North Korea to do, given that Russia and China are the closest things it has to allies. [17]
Digital Shadows reports that “the malware appeared to spread virtually indiscriminately with no control by its operators,” and a more targeted approach “would have been more consistent with the activities of a sophisticated criminal outfit or a technically-competent nation-state actor.” [18]
Flashpoint analyzed the ransom note that appeared on infected computers. There were two Chinese versions and an English version. The Chinese texts were written by someone who is fluent, and the English by someone with a strong but imperfect command of English. Ransom notes in other languages were apparently translated from the English version using Google translator. [19] It has been pointed out that this fact does not disprove the U.S. attribution of North Korea, as that nation could have hired Chinese cybercriminals. True enough, but then North Korea does not have a unique ability to do so. If so inclined, anyone could contract Chinese malware developers. Or cybercriminals could act on their own.
Lazarus and North Korean cyber actors have a reputation for developing sophisticated code. The hallmark of WannaCry, however, is its sheer sloppiness, necessitating the release of a series of new versions in fairly quick succession. Alan Woodward believes that WannaCry’s poorly designed code reveals that it had been written by “a less than experienced malware developer.” [20]
Important aspects of the code were so badly bungled that it is difficult to imagine how any serious organization could be responsible.
IT security specialists use virtual machines, or sandboxes, to safely test and analyze malware code. A well-designed piece of malware will include logic to detect the type of environment it is executing in and alter its performance in a virtual machine (VM) environment to appear benign. WannaCry was notably lacking in that regard. “The authors did not appear to be concerned with thwarting analysis, as the samples analyzed have contained little if any obfuscation, anti-debugging, or VM-aware code,” notes LogRhythm Labs. [21]
James Scott argues that “every WannaCry attack has lacked the stealth, sophistication, and resources characteristic of [Lazarus sub-group] Bluenoroff itself or Lazarus as a whole. If either were behind WannaCry, the attacks likely would have been more targeted, had more of an impact, would have been persistent, would have been more sophisticated, and would have garnered significantly greater profits.” The EternalBlue exploit was too valuable to waste “on a prolific and unprofitable campaign” like the May 12 WannaCry attack. By contrast, Bluenoroff “prefers to silently integrate into processes, extort them, and invisibly disappear after stealing massive fiscal gains.” [22] Bogdan Botezatu of Bitdefender, agrees. “The attack wasn’t targeted and there was no clear gain for them. It’s doubtful they would use such a powerful exploit for anything else but espionage.” [23]
WannaCry included a “kill switch,” apparently intended as a poorly thought out anti-VM feature. “For the life of me,” comments Peter Stephenson, “I can’t see why they might think that would work.” [24] When the software executes it first attempts to connect to a hostname that was unregistered. The malware would proceed to run if the domain was not valid. A cybersecurity researcher managed to disable WannaCry by registering the domain through NameCheap.com, shutting down with ease the ability of WannaCry to infect any further computers. [25]
Once WannaCry infected a computer, it demanded a ransom of $300 in bitcoin to release the files it had encrypted. After three days, the price doubled. The whole point of WannaCry was to generate income, and it is here where the code was most inept.
Ideally, ransomware like WannaCry would use a new account number for each infected computer, to better ensure anonymity. Instead, WannaCry hard-coded just three account numbers, which basically informed authorities what accounts to monitor. [26] It is an astonishing botch.
Incredibly, WannaCry lacked the capability of automatically identifying which victims paid the ransom. That meant that determining the source of each payment required manual effort, a daunting task given the number of infected computers. [27] Inevitably, decryption keys were not sent to paying victims and once the word got out, there was no motivation for anyone else to pay.
In James Scott’s assessment, “The WannaCry attack attracted very high publicity and very high law-enforcement visibility while inflicting arguably the least amount of damage a similar campaign that size could cause and garnering profits lower than even the most rudimentary script kiddie attacks.” Scott was incredulous over claims that WannaCry was a Lazarus operation. “There is no logical rationale defending the theory that the methodical [Lazarus], known for targeted attacks with tailored software, would suddenly launch a global campaign dependent on barely functional ransomware.” [28]
One would never know it from news reports, but cybersecurity attribution is rarely absolute. Hal Berghel, of the Department of Computer Science at the University of Nevada, comments on the “absence of detailed strategies to provide justifiable, evidence-based cyberattribution. There’s a reason for that: there is none. The most we have is informed opinion.” The certainty with which government officials and media assign blame in high-profile cyberattacks to perceived enemies should at least raise questions. “So whenever a politician, pundit, or executive tries to attribute something to one group or another, our first inclination should always be to look for signs of attribution bias, cognitive bias, cultural bias, cognitive dissonance, and so forth. Our first principle should be cui bono: What agendas are hidden? Whose interests are being represented or defended? What’s the motivation behind the statement? Where are the incentives behind the leak or reportage? How many of the claims have been substantiated by independent investigators?” [29]
IT security specialist Graham Cluley raises an important question. “I think in the current hostile climate between USA and North Korea it’s not unhelpful to retain some skepticism about why this claim might have been made, and what may have motivated the claim to be made at the present time.” [30]
To all appearances, WannaCry was the work of amateurish developers who got hold of NSA software that allowed the malware to spread like wildfire, but their own code was so poorly written that it failed to monetize the effort to any meaningful degree.
WannaCry has its uses, though. The Trump administration’s public attribution is “more about the administration’s message that North Korea is a dangerous actor than it is about cybersecurity,” says Ross Rustici, head of Intelligence Research at Cybereason. “They’re trying to lay the groundwork for people to feel like North Korea is a threat to the homeland.” [31] It is part of a campaign by the administration to stampede the public into supporting harsh measures or possibly even military action against North Korea.
[1] Thomas P. Bossert, “It’s Official: North Korea is Behind WannaCry,” Wall Street Journal,” December 19, 2017.
[2] “Press Briefing on the Attribution of the WannaCry Malware Attack to North Korea,” Whitehouse.gov, December 19, 2017.
[3] “WannaCry and Lazarus Group – the Missing Link?” SecureList, May 15, 2017.
[4] James Scott, “There’s Proof That North Korea Launched the WannaCry Attack? Not So Fast! – A Warning Against Premature, Inconclusive, and Distracting Attribution,” Institute for Critical Infrastructure Technology, May 23, 2017.
[5] Eduard Kovacs, “Industry Reactions to U.S. Blaming North Korea for WannaCry,” Security Week, December 22, 2017.
[6] “WannaCry: Ransomware Attacks Show Strong Links to Lazarus Group,” Symantec Official Blog, May 22, 2017.
[7] Gregory Elich, “Who Was Behind the Cyberattack on Sony?” Counterpunch, December 30, 2014.
[8] David Gilbert, Gareth Platt, “John McAfee: ‘I Know Who Hacked Sony Pictures – and it Wasn’t North Korea,” International Business Times, January 19, 2015.
[10] Peter Stephenson, “WannaCry Attribution: I’m Not Convinced Kim Dunnit, but a Russian…”, SC Media, May 21, 2017.
[11] Digital Shadows Analyst Team, “WannaCry: An Analysis of Competing Hypotheses,” Digital Shadows, May 18, 2017.
[12] Patrick Howell O’Neill, “Researchers: WannaCry Ransomware Shares Code with North Korean Malware,” Cyberscoop, May 15, 2017.
[13] Alan Woodward, “Attribution is Difficult – Consider All the Evidence,” Cyber Matters, May 24, 2017.
[14] Thomas P. Bossert, “It’s Official: North Korea is Behind WannaCry,” Wall Street Journal,” December 19, 2017.
[15] Luke Somerville, Abel Toro, “WannaCry Post-Outbreak Analysis,” Forcepoint, May 16, 2017.
Sarah Maloney, “WannaCry / WCry /WannaCrypt Attack Profile,” Cybereason, May 16, 2017.
Rohit Langde, “WannaCry Ransomware: A Detailed Analysis of the Attack,” Techspective, September 26, 2017.
[16] Eduard Kovacs, “WannaCry Does Not Fit North Korea’s Style, Interests: Experts,” Security Week, May 19, 2017.
[17] “A Technical Analysis of WannaCry Ransomware,” LogRhythm, May 16, 2017.
[18] Digital Shadows Analyst Team, “WannaCry: An Analysis of Competing Hypotheses,” Digital Shadows, May 18, 2017.
[19] Jon Condra, John Costello, Sherman Chu, “Linguistic Analysis of WannaCry Ransomware Messages Suggests Chinese-Speaking Authors,” Flashpoint, May 25, 2017.
[20] Alan Woodward, “Attribution is Difficult – Consider All the Evidence,” Cyber Matters, May 24, 2017.
[21] Erika Noerenberg, Andrew Costis, Nathanial Quist, “A Technical Analysis of WannaCry Ransomware,” LogRhythm, May 16, 2017.
[22] James Scott, “There’s Proof That North Korea Launched the WannaCry Attack? Not So Fast! – A Warning Against Premature, Inconclusive, and Distracting Attribution,” Institute for Critical Infrastructure Technology, May 23, 2017.
[23] Eduard Kovacs, “WannaCry Does Not Fit North Korea’s Style, Interests: Experts,” Security Week, May 19, 2017.
[24] Peter Stephenson, “WannaCry Attribution: I’m Not Convinced Kim Dunnit, but a Russian…”, SC Media, May 21, 2017.
[25] Rohit Langde, “WannaCry Ransomware: A Detailed Analysis of the Attack,” Techspective, September 26, 2017.
[26] Jesse Dunietz, “The Imperfect Crime: How the WannaCry Hackers Could Get Nabbed,” Scientific American, August 16, 2017.
[27] Andy Greenberg, “The WannaCry Ransomware Hackers Made Some Major Mistakes,” Wired, May 15, 2017.
[28] James Scott, “WannaCry Ransomware & the Perils of Shoddy Attribution: It’s the Russians! No Wait, it’s the North Koreans!” Institute for Critical Infrastructure Technology, May 18, 2017.
[29] Hal Berghel, “On the Problem of (Cyber) Attribution,” Computer — IEEE Computer Society, March 2017.
[30] Scott Carey, “Should We Believe the White House When it Says North Korea is Behind WannaCry?” Computer World, December 20, 2017.
[31] John P. Mello Jr., “US Fingers North Korea for WannaCry Epidemic,” Tech News World, December 20, 2017.
Gregory Elich is on the Board of Directors of the Jasenovac Research Institute and the Advisory Board of the Korea Policy Institute. He is a member of the Solidarity Committee for Democracy and Peace in Korea, a columnist for Voice of the People, and one of the co-authors of Killing Democracy: CIA and Pentagon Operations in the Post-Soviet Period, published in the Russian language. He is also a member of the Task Force to Stop THAAD in Korea and Militarism in Asia and the Pacific. His website is https://gregoryelich.org Follow him on Twitter at @GregoryElich
What caused the FBI to open a counterintelligence investigation into the Trump campaign in July 2016, which evolved into the criminal investigation that is said today to imperil the Trump presidency?
As James Comey’s FBI and Special Counsel Robert Mueller have, for 18 months, failed to prove Donald Trump’s “collusion” with the Kremlin, what was it, in mid-2016, that justified starting this investigation?
What was the basis for the belief Trump was colluding, that he was the Manchurian candidate of Vladimir Putin? What evidence did the FBI cite to get FISA court warrants to surveil and wiretap Trump’s team?
Republican congressmen have for months been demanding answers to these questions. And, as Mueller’s men have stonewalled, suspicions have arisen that this investigation was, from the outset, a politicized operation to take down Trump.
Feeding those suspicions has been the proven anti-Trump bias of investigators. Also, wiretap warrants of Trump’s team are said to have been issued on the basis of a “dirty dossier” that was floating around town in 2016 — but which mainstream media refused to publish as they could not validate its lurid allegations.
Who produced the dossier?
Ex-British spy Christopher Steele, whose dirt was delivered by ex-Kremlin agents. And Steele was himself a hireling of Fusion GPS, the oppo research outfit enlisted and paid by the Clinton campaign and DNC.
Writes the Washington Times, Steele “paid Kremlin sources with Democratic cash.”
Yet, if Steele’s dossier is a farrago of falsehoods and fake news, and the dossier’s contents were used to justify warrants for wiretaps on Trump associates, Mueller has a problem.
Prosecutions his team brings could be contaminated by what the FBI did, leaving his investigation discredited.
Fortunately, all this was cleared up for us New Year’s Eve by a major revelation in The New York Times. Top headline on page one:
“Unlikely Source Propelled Russia Meddling Inquiry”
The story that followed correctly framed the crucial question:
“What so alarmed American officials to provoke the FBI to open a counterintelligence investigation of the Trump campaign months before the presidential election?”
The Times then gave us the answer we have been looking for:
“It was not, as Trump and other politicians have alleged, a dossier compiled by a former British spy hired by a rival campaign. Instead it was firsthand information from one of America’s closest intelligence allies.”
The ally: Australia, whose ambassador to Britain was in an “upscale London Bar” in the West End in May 2016, drinking with a sloshed George Papadopoulos, who had ties to the Trump campaign and who informed the diplomat that Russia had dirt on Hillary Clinton.
Papadopoulos had reportedly been told in April that Russia had access to Clinton’s emails.
Thus, when the DNC and John Podesta emails were splashed all over the U.S. press in June, Amb. Alexander Downer, recalling his conversation with Papadopoulos, informed his government, which has excellent ties to U.S. intelligence, and the FBI took it from there.
The Times’ story pounds home this version of events:
“The hacking and the revelation that a member of the Trump campaign may have had inside information about it were driving factors that led the FBI to open an investigation in July 2016 into Russian attempts to disrupt the election and whether any of Trump’s associates conspired.”
This, the Times assures us, “answers one of the lingering mysteries of the past year.”
Well, perhaps.
But if Papadopoulos’s drunken babbling to the Aussie ambassador triggered the investigation in July 2016, why was George not interviewed by the FBI until January 2017?
According to the Times, an FBI agent in Rome had been told by Steele in June 2016 what he had learned from the Russians.
And Steele was interviewed by the FBI in October 2016.
If Papadopoulos triggered the investigation, why the seeming FBI disinterest in him — as compared to Steele?
Yet another major question remains unanswered.
If, as the Times writes, the FBI was looking “into Russian attempts to disrupt the elections,” why did the FBI not open an investigation into the KGB roots of the Steele dossier that was written to destroy the Republican candidate, Donald Trump?
If Trump’s alleged “collusion” with Putin to damage Clinton was worthy of an all-out FBI investigation, why did the Clinton-DNC scheme to tie Trump to Russian prostitutes, using British spies and former KGB agents, not merit an FBI investigation?
Why was there less concern about the Clinton campaign’s ties to Russian agents, than to Trumpian “collusion” that is yet unproven?
Consider what the British spy Steele and his former KGB/FSB comrades accomplished:
They have kept alive a special counsel’s investigation that has divided our country, imperiled the FBI’s reputation, preoccupied and damaged a president, and partially paralyzed the U.S. government.
Putin must be marveling at the astonishing success of his old comrades from KGB days, who could pull off an intelligence coup like this and so cripple the superpower that won the Cold War.
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.