In the American Prospect article linked below, The Road to Medicare for Everyone, Jacob Hacker is once again working to dissuade single payer healthcare supporters from demanding National Improved Medicare for All and use our language to send us down a false path. Once again, he comes up with a scheme to convince people to ask for less and calls those who disagree “purists”. Hacker calls his “Medicare Part E” “daring and doable,” I call it dumb and dumber. Here’s why.
Hacker makes the same assertions we witnessed in August of 2017 when other progressives tried to dissuade single payer supporters.
He starts with “risk aversion,” although he doesn’t use the term in his article. Hacker asserts that those who have health insurance through their employers won’t want to give it up for the new system. Our responses to this are: there is already widespread dislike for the current healthcare system; people don’t like private insurance while there is widespread support across the political spectrum for Medicare and Medicaid; there is also widespread support for single payer; and those with health insurance can be reassured that they will be better off under a single payer system. It is also important to note that employers don’t want to be in the middle of health insurance. Healthcare costs are the biggest complaint by small and medium sized businesses and keep businesses that operate internationally less competitive.
Next, Hacker brings up the costs of the new system and complains that it will create new federal spending. He points to the failures to pass ‘single payer’ in Vermont and California. First, it must be recognized that the state bills were not true single payer bills, and second, states face barriers that the federal government does not, they must balance their budgets. Hacker ignores the numerous studies at the national level, some by the General Accounting Office and the Congressional Budget Office that demonstrate single payer is the best way to save money. Of course there would be an increase in federal spending, the system would be financed through taxes, but the taxes would replace premiums, co-pays and deductibles, which are rising as fast as health insurers can get away with. Hacker proposes a more complex system that will fail to provide the savings needed to cover everyone, the savings that can only exist under a true single payer system.
Hacker also confuses “Medicare for All” with simply expanding Medicare to everyone, including the wasteful private plans under Medicare Advantage. This is not what National Improved Medicare for All (NIMA) advocates support. NIMA would take the national infrastructure created by Medicare and use it for a new system that is comprehensive in coverage, including long term care, and doesn’t require co-pays or deductibles. The system would negotiate reasonable pharmaceutical prices and set prices for services. It would also provide operating budgets for hospitals and other health facilities and use separate capital budgets to make sure that health resources are available where they are needed. And the new system would create a mechanism for negotiation of payment to providers.
Finally, Hacker tries to convince his readers that the opposition to NIMA will be too strong, so we should demand less. We know that the opposition to our lesser demands will also be strong. That was the case in 2009 when people advocated for the ‘public option’ gimmick. If we are going to fight for something, if we are going to take on this opposition, we must fight for something worthwhile, something that will actually solve the healthcare crisis. That something is NIMA. We are well aware that the opposition will be strong, but we also know that when people organize and mobilize, they can win. Every fight for social transformation has been a difficult struggle. We know how to wage these struggles. We have decades of history of successful struggles to guide us.
One gaping hole in Hacker’s approach is that it prevents the social solidarity required to win the fight and to make the solution succeed. Hacker promotes a “Medicare Part E” that some people can buy into. Not only will this forego most of the savings of a single payer system, but it also leaves the public divided. Some people will be in the system and others will be out. This creates vulnerabilities for the opposition to exploit and further divide us. Any difficulties of the new system will be blown out of proportion and those in the system may worry that they are in the wrong place. When we are united in the same system, not only does that create a higher quality system (a lesson we’ve learned from other countries), but it also unites us in fighting to protect and improve that system.
Hacker succeeded in convincing people who support single payer to ask for something less in 2009 and we ended up with a law that is further enriching the health insurance, pharmaceutical and private healthcare institutions enormously while tens of millions of people go without care. Now, Hacker rises again to use the same scare tactics and accusations that he used then to undermine the struggle for NIMA. This is to be expected. The national cry for NIMA is growing and the power holders in both major political parties and their allies in the media and think tanks are afraid of going against the donor class. Social movements have always been told that what they are asking for is impossible, until the tide shifts and it becomes inevitable.
Our task is to shift the tide. We must not be fooled by people like Jacob Hacker. We know that single payer systems work. We have the money to pay for it. We have the framework for a national system and we have the institutions to provide care. Just as we did in 1965 when Medicare and Medicaid were created from scratch, and without the benefit of the Internet, we can create National Improved Medicare for All, a universal system, all at once. Everybody in and nobody out.
We know that we are close to winning when the opposition starts using our language to take us off track. “Medicare Part E” is not National Improved Medicare for All, it is a gimmick to protect the status quo and convince us that we are not powerful. We aren’t falling for it. This is the time to fight harder for NIMA. We will prevail.
Read Jacob Hacker’s article in the American Prospecthere.
If the shoe were on the other foot, one can imagine the absolute outcry in the Western media. If social protests were to break out in the United States or Europe, and Iranian leaders issued interfering calls in support of those protests, there would be mouth-foaming denunciations of Tehran for “mischievous meddling” in others’ sovereignty.
Yet over the past week, this is exactly what Western governments and news media have been doing in regard to public protests in Iran.
The US government has taken the lead with President Trump labelling the Iranian authorities a “brutal and corrupt regime”.
European governments have been a little more circumspect in their statements, urging the Iranian authorities to be “restrained” and to “allow peaceful protests”.
Nevertheless, European leaders are subtly shoring up the American narrative that the street demonstrations across Iran are a righteous democratic cause against an oppressive regime. That was the implication in statements made by Britain’s foreign minister Boris Johnson and French president Emmanuel Macron. This week, the French foreign minister Jean-Yves Le Drian cancelled an official trip to Tehran. Such moves represent an unacceptable attempt to undermine the Iranian authorities.
Images carried by American media, in particular CNN, the New York Times and the Washington Post, of protesters holding up clenched fists have sought to simplify the events in Iran as a “good-citizens-versus-bad-regime” scenario. Notwithstanding that the protests have been relatively small and the grievances are mainly about economic concerns – not a rebellion against state institutions.
By contrast, Russia called on foreign states to back off making prejudiced comments on the Iranian disturbances. Moscow said the events in Iran were an internal political matter for Iranians to resolve without foreign countries interfering.
The irony of Western doublethink is rich. Over the past year, there has been a recurring theme among Western governments and media of “foreign interference” allegedly in their political affairs. Russia has been the focus of these allegations, even though there is no evidence to support such claims. The ever-so pious Western governments and media have no such reservations about “foreign meddling” when it comes to their brazen rush to pile into Iran’s internal politics as shown this week. Or in the forthcoming Russian presidential elections.
Western interference is not just limited to pejorative statements on Iran’s protests. The US State Department has openly admitted that it is communicating via social media with anti-government protesters. This active involvement by Washington is a repeat of similar outside agitation during the so-called Green Movement disturbances in Iran back in 2009. As mentioned above, one can imagine the hue and cry in Western capitals if Iran, or Russia, or some other foreign state, was agitating anti-austerity demonstrations in Washington, London and Paris.
Iranian authorities have sound reason to suspect that Western interference may be even more sinister. The protests – while largely peaceful – have included what appears to be an organized violent element. At least one police officer was reportedly shot dead and police stations have come under armed attack. The rapid escalation of violence and burning of public property suggest a subversive agenda. Comparisons have been made to the way protests in Syria in 2011 were exploited by Western powers for an agenda of regime change which led to all-out war in that country.
For now, the demonstrations in over a dozen cities across Iran appear to have subsided. They have been replaced by much larger public rallies in support of the government and President Hassan Rouhani, as well as the country’s spiritual leader Ayatollah Khamenei.
The economic grievances that sparked the initial protests last week are real enough. Iranians are reportedly enduring hard economic times with soaring inflation of basic living costs and high unemployment among the youth population. But this is a political challenge for the Iranian government to overcome in response to their nation’s grievances.
Ironically, however, it illustrates another aspect of Western doublethink. Western media have reported – with upside-down logic – that President Rouhani “has failed to deliver on economic improvements”. But that “failure” is largely due to the US and Europe not fully implementing the nuclear accord signed with Iran in July 2015, which was also signed by Russia and China and who are abiding by the treaty. That internationally binding accord obliges the end to decades of Western-imposed economic sanctions on Iran.
While the Europeans have begun normalizing economic relations with Iran, not so the Trump administration. Washington has in fact increased the financial blockade under the tendentious pretext of Iran’s alleged “support for terrorism”. Trump has repeatedly threatened to rip up the 2015 nuclear accord. Washington has also intimidated European states, companies and banks from engaging fully with Iran.
The European Union needs to show more backbone towards the US and tell Washington that the nuclear accord is a legal mandate to lift economic sanctions off Iran. Iran’s economic problems are directly related to the bad faith that Western states are showing with regard to the UN-approved nuclear deal. Washington’s policy towards Iran is a continuation of decades of US-led aggression towards the Islamic Republic ever since its 1979 revolution against the American-backed stooge regime of Shah Pahlavi.
The readiness shown by the US and Europe to interfere in Iran’s internal problems is nothing but arrogant doublethink. Get over it.
The editor of a prominent Jewish community newspaper has come under strong attack for making a joke about a war in which more than a million Iranians and Iraqis lost their lives.
Stephen Pollard, editor of Britain’s Jewish Chronicle, now stands accused of inciting hatred and bigotry following a tweet in which the staunchly pro-Israel and equally enthusiastic Tottenham Hotspur fan compared the Premier League game between Chelsea and Arsenal yesterday to the war between Iran and Iraq because he wanted both sides to lose.
“Time to wheel out my regular comment,” tweeted Pollard. “It’s Arsenal v Chelsea tonight, the football version of the Iran/Iraq war when you want both sides to lose.”
Other twitter users condemned the JC editor for his insensitive and callous remarks about a war in which more than a million people were killed.
“I wonder what your reaction would of been if someone made football related jokes about the Holocaust!” one furious twitter user responded. Another said: “Wow, how callous can you be? 1 Million people died and 10s of thousand people suffer from chemical attack and you make this comment. What is next? you will compare it to Holocaust?”
Others described the comment as “vile” and “disgusting”. Many were keen to point out the latent racism displayed by Pollard.
“You despicable man. A million people died & you make fun of them? Is this implicit #Islamophobia coming out? If someone had made such a hideous analogy with Israel etc you’d be crying antisemitism. Truly hideous man”.
“His hate and contempt for Arabs and Muslims is so obvious. And this is the editor of a major Jewish paper!” wrote another angry user.
One took aim at Pollard’s well-known support for Israel: “Is it a bit like the Israeli Palestinian conflict where you wish Israel would just leave after their away game with Palestine, instead of permanently making the stadium their home?”
An unverified report that Beijing was negotiating a secret deal with Pyongyang, published on Tuesday by the Washington Free Beacon, and syndicated by the Washington Times newspaper, has not gained much traction beyond that spattering of conservative American news outlets, garnering only a healthy dose of skepticism.
Not surprisingly, China was also not interested.
Chinese foreign ministry spokesperson Geng Shuang responded Wednesday to a Chinese-language question on the report with two words – in English.
“Fake news,” Geng was quoted as saying in the official transcript of Wednesday’s regular press breifing. Next question, please.
The “top secret” document published in the report was purported to be from “a person who once had ties to the Chinese intelligence and security communities,” whatever that means, but the author also said he could not independently verify the document.
The question we posed yesterday is whether conservative media’s reporting of the document as newsworthy will pique Trump’s interest, regardless of its veracity. If the report was true, it makes Trump look like he was played like a fiddle, so he might be careful not to draw attention.
We might also see if the US president buys the “fake news” line — which he uses exclusively to lambast hostile liberal media — when it is used against conservative media supportive of his administration.
A new Pentagon report claiming that Iran supports terrorist groups such as the Taliban and al-Qaeda has been disseminated through American media outlets – but has come under fire for wishy-washy claims about said connections.
For instance, one supposed link came when Saad bin Laden, one of Osama bin Laden’s sons, fled to Iran after the September 11, 2001, attacks in the US. But what isn’t mentioned is that Saad and his family were detained upon arrival and placed under house arrest. Khalid bin Laden, another of Osama’s sons who was killed alongside him during the 2011 US Navy SEALs raid, accused the Iranians in 2010 of subjecting his family members to beatings and severe mistreatment.
Garland Nixon and Lee Stranahan of Radio Sputnik’s Fault Lines spoke to John Kiriakou, a CIA agent-turned-whistleblower who helped reveal the CIA’s torture program to the American public in 2007.
”The whole thing rests on your definition of harbor,” said Kiriakou. “Osama bin Laden’s son [Saad] in the immediate aftermath of the [battle of Tora Bora in December 2001] fled to Iran with his wives and his children and a handful of hangers-on. They were promptly arrested at the border. They were not put under house arrest in some beautiful palace with servants and a view of the valley; they were put under arrest and put in a jail. If that’s harbored, man, I don’t want to be harbored.”
“Let me say something unequivocally: there was no cooperation between al-Qaeda and Iran, just like there was no cooperation between al-Qaeda and Iraq.” Kiriakou referenced a little-mentioned Taliban execution of Iranian diplomats a few years before 9/11: in 1998, in the city of Mazar-i-Sharif, the Taliban rounded up and killed a number of Iranian diplomats in retribution for Tehran’s support of the Northern Alliance in their war against the Taliban in the 90s — the same Northern Alliance that the US supported when they invaded Afghanistan in October 2001.
“There’s no love lost between between the Taliban/al-Qaeda and the Iranians,” said Kiriakou. “I’m going to say it again unequivocally: there is no connection between Iran and al-Qaeda, this is being made up. There are other countries that would benefit from the proliferation of this lie — but that’s what it is, simply a lie.”
Nixon mentioned that the connection between al-Qaeda and Iran was drawn from a CIA document dump from early November, with all the articles appearing in a three-day period — almost as though the outlets had coordinated to make the story.
“This is what the CIA does to confuse people,” said Kiriakou. “There’s no analysis, there’s no vetting of the documents, they just dump it. This is exactly what the CIA complained was happening during the first four years of the Bush administration, where the president is coming out or his aides are coming out and saying, ‘there’s cooperation between the Iraqi government and al-Qaeda.’ There wasn’t.”
“But what was happening was that people in the [National Security Council] who had their own political agenda were passing the president raw intelligence that had not been vetted, not been analyzed by the directorate of intelligence. Well, the CIA is doing exactly the same thing now, but they’re using the press as their dupe. They’re just releasing this raw data taken off of Osama bin Laden’s computers and saying, ‘here it is!’ No analysis, no nothing.”
On Wednesday, former New York Times journalist James Risen published a story on The Intercept in which he claimed his skepticism that Iraq under Saddam Hussein was linked to terrorist groups such as al-Qaeda were on multiple occasions buried by the Times’ editorial staff.
“My stories raising questions about the intelligence, particularly the administration’s claims of a link between Iraq and al-Qaeda, were being cut, buried or held out of the paper altogether,” Risen wrote. “What angered me most was that while they were burying my skeptical stories, the editors were not only giving banner headlines to stories asserting that Iraq had weapons of mass destruction, they were also demanding that I help match stories from other publications about Iraq’s purported WMD programs.”
Risen, and the others who were skeptical about the US intelligence community’s claims that Saddam had partnered with al-Qaeda and other terrorist groups in order to garner support for the 2003 invasion, were vindicated by history when the alleged links were revealed to be false.
Gusts of 100mph were recorded at Great Dun Fell in Cumbria at 1am.
Wow! Hurricane force winds, as has been reported elsewhere.
Only one slight problem though. Great Dun Fell is the second highest mountain in England’s Pennines , and the weather station is sat at the very top, at an altitude of 847m.
Even then, mean wind speeds only reached 75 mph.
At nearby Warcop, just seven miles away and at an altitude of 224m, wind speed never got above 29 mph, a “strong breeze” on the Beaufort Scale.
This all comes from a Press Association report, which in turn appears to have been fed by the Met Office.
Why the Met Office should decide to deliberately mislead the public is anybody’s guess.
The Telegraph goes on to mention that 77mph gusts were recorded in High Bradfield, South Yorkshire.
I live 5 miles away from High Bradfield, and it was no more than a bit windy. So it won’t come as any surprise that High Bradfield is also a high altitude site, high up in the Peak District at 395m.
The nearest site with up to date data, according to the Met Office, is Watnall, 32 miles away in Nottinghamshire.
There wind speeds only reached 24 mph, a “Fresh Breeze” on the Beaufort Scale.
Even in Southern Scotland, the area worst affected in Britain, where the Met Office reported gusts of 72 mph high up on exposed cliffs above the Solway near Dundrennan, the mean wind speed peaked at 54 mph, still only a “Strong Gale”.
The headline claim that Storm Eleanor has lashed the UK with violent storm-force winds of up to 100mph is quite fraudulent.
If there’s one thing that the West’s state-corporate media loves to report, it’s public protest within a non-compliant country — people demonstrating against a government that has refused to roll over in the face of US aggression and greed.
If you’re in the habit of examining these media reports, you’ll often find that there’s a particular word which gets used a lot.
Here are a few highly topical examples; see if you can work out which word it is…
Iranians protesting the country’s strained economy gathered in Tehran and another major city on Friday, for the second day of spontaneous, unsanctioned demonstrations […] (US, Associated Press, via Washington Post, 29 Dec 2017)
A wave of spontaneous protests over Iran’s weak economy swept into Tehran on Saturday, with college students and others chanting against the government… (UK, Associated Press, via Mail Online, 30 Dec 2017)
Unauthorized, spontaneous protests engulfed Iran’s major cities for a third straight day on Saturday as what started out as demonstrations over rising prices seem to have taken a decidedly anti-government tone. (Slate.com, 30 Dec 2017)
Pro-government Iranians rallied in Tehran Saturday following spontaneous angry protests in the capital and other major cities. (US, Fox News with Associated Press, 30 Dec 2017)
A relatively small protest on Thursday in Mashhad, Iran’s second largest city . . . unexpectedly gave impetus to a wave of spontaneous protests spreading across provinces. (UK, Guardian, 31 Dec 2017)
Protests seem to be spontaneous and lack a clear leader. (Australia, ABC Radio Australia, 1 Jan 2018)
Yes: the Word of the Day is spontaneous.
As far as our state-corporate media and its ubiquitous anti-journalism are concerned, this is one of the most fascinating adjectives we ever see. Let’s take a moment to examine its use…
For a start, how would anyone really know — and so quickly, too! — that these foreign protests, these far-away demonstrations were all ‘spontaneous’? Are thousands of protestors across Iran currently in touch with hundreds of Western journalists — and constantly insisting on the utter spontaneity of everything they do?
No, they aren’t. And even if they were, why would anyone with any sense believe they were telling the truth?
The reality is, of course, that ‘spontaneous’ is a propaganda word, purely manipulative. It’s there to achieve three different but related aims — every one of which serves the imperialist agendas of the Western elites.
First, it helps to create the encouraging impression of an Official Enemy in Deep Trouble. If the media unites in painting a given set of protests as ‘spontaneous‘, then the illusion can be manufactured that ‘the population as a whole‘ is ‘angrily turning against‘ the obstructive government that the West is so selfishly anxious to see removed. ‘Clearly, this vile regime is tottering! Stay focused, everyone! Our corporations will be gang-raping the place in no time!‘
Secondly, ‘spontaneous’ protests are by far the best kind when it comes to ‘justifying’ illegal and destructive ‘intervention’ in a non-compliant country. How ‘desperate‘ an oppressed population must be if it ‘takes to the streets’ in ‘spontaneous protests’! How ‘close to the edge‘ those people must feel to be ‘finallyovercoming their fear‘ and ‘actually calling for change‘! ‘Those people can’t take much more of this! For God’s sake, we have to do something! How about we try more economic warfare — plus humanitarian bombing? Agreed…?‘
Thirdly, it’s a word that’s designed to take the most important thought of all … and drive it far away from everyone’s mind. For what, ultimately, the word ‘spontaneous‘ says is: ‘Do not for a moment consider the probability that this is happening as part of a carefully co-ordinated and externally funded regime-change operation. Don’t even think about it! It’s all just SPONTANEOUS, d’you hear!‘
And if you won’t listen to me, pay attention to Nikki Haley, the Novelty Talking Insect currently doubling as the Trump Administration’s ‘Ambassador to the United Nations’…
See…?
For the rest — and just in case anyone still refuses to believe how indispensable a weapon is the word ‘spontaneous’ in the armoury of the modern journalist-impersonator — note how and when the imprimatur is withheld.
On the one hand, when a Western media trusty encounters what might be a public demonstration of support for an Official Enemy, ‘spontaneity’ will be specifically denied — sometimes even before you can say Nick Jack Robinson…
Then, on the other hand, there’s what happens when people in the Proudly Democratic West decide to protest about the actions or policies of their own governing elites. For, if a protest or demonstration is happening whose scale and importance cannot altogether be denied by our state-corporate media, the word ‘spontaneous’ simply won’t be in evidence: it would be too legitimating…
TEHRAN – The above image has become synonymous with the Iranian protests that have engulfed most regions of Iran for the past week. However, there remains one problem…. The original image has nothing to do with the current protests at all.
The original photo shows a woman with a hijab on a stick in a defiant moment as she challenges the law that makes it compulsory for women to wear a hijab in Iran.
However this was taken before the current protests even began. Although the Islamic Republic forces women to wear the hijab, its slow liberalization is seen, especially with Tehran announcing just days before protests began that they will no longer enforce the law in this regard.
However, despite the current protests being about economic reform and a clampdown on corruption, Western war enablers, particularly so-called activists and Western media, have widely been spreading this image as a symbol for a struggle against the regime that only exists in their own mind and not in the general consensus of Iranians, nor the majority of those protesting.
As Israeli geopolitical expert Michael A. Horowitz acknowledges, “The only thing this new “symbol,” [the image] largely imposed from the outside [the West], does represent is some form of “wishful thinking” from outside observers on what they’d want the current protest movement to be.
Western war hawks, activists and media alike are all trying to portray the Iranian protests as one for regime-change, but this remains only a small segment of the current protesters. However, no amount of Western “wishful thinking” as Horowitz correctly asserts, will change the fact that the majority of women currently protesting come from conservative segments of Iran.
It has been found that Saudi Arabia has tweeted more about the Iranian protests then people within Iran has themselves, with around three-quarters of all tweets about the protests coming from outside of the Islamic Republic.
Therefore, it can be seen that the great pushers for the protests are mostly coming from outside of the country. Another attempted colored revolution that will fail just as imperialists had in Venezuela last year.
On December 19, in a Wall Street Journal editorial that drew much attention, Homeland Security Advisor Tom Bossert asserted that North Korea was “directly responsible” for the WannaCry cyberattack that struck more than 300,000 computers worldwide. The virus encrypted files on infected computers and demanded payment in return for supposedly providing a decryption key to allow users to regain access to locked files. Bossert charged that North Korea was “using cyberattacks to fund its reckless behavior and cause disruption across the world.” [1]
At a press conference on the same day, Bossert announced that the attribution was made “with evidence,” and that WannaCry “was directed by the government of North Korea,” and carried out by “actors on their behalf, intermediaries.” The evidence that led to the U.S. to that conclusion? Bossert was not saying, perhaps recalling the ridicule that greeted the FBI and Department of Homeland Security’s misbegotten report on the hacking of the Democratic National Committee. [2] “Press Briefing on the Attribution of the WannaCry Malware Attack to North Korea,” Whitehouse.gov, December 19, 2017.
The centerpiece of the claim of North Korean culpability is the similarity in code between the Contopee malware, which opens backdoor access to an infected computer, and code in an early variant of WannaCry. [3]
Contopee has been linked to the Lazarus group, a cybercrime organization that some believe launched the Sony hack, based on the software tools used in that attack. Since North Korea is widely considered to be behind the cyberattack on Sony, at first glance that would appear to seal the argument.
It is a logical argument, but is it founded on valid premises? Little is known about Lazarus, aside from the operations that are attributed to it. The link between Lazarus and North Korea is a hypothesis based on limited evidence. It may or may not be true, but the apparent linkage is far weaker than mainstream media’s conviction would have one believe. Lazarus appears to be an independent organization possibly based in China, which North Korea may or may not have contracted to perform certain operations. That does not necessarily mean that every action – or even any action at all – Lazarus performs is at North Korea’s behest.
In Bossert’s mind as well as that of media reporters, Lazarus – the intermediaries Bossert refers to – and North Korea are synonymous when it comes to cyber operations. North Korea gives the orders and Lazarus carries them out. James Scott, a senior fellow at the Institute for Critical Infrastructure Technology, notes that “speculation concerning WannaCry attributes the malware to the Lazarus Group, not to North Korea, and even those connections are premature and not wholly convincing. Lazarus itself has never been definitively proven to be a North Korean state-sponsored advanced persistent threat (APT); in fact, an abundance of evidence suggests that the Lazarus group may be a sophisticated, well-resourced, and expansive cyber-criminal and occasional cyber-mercenary collective.” Furthermore, Scott adds, the evidence used to tie Lazarus to North Korea, “such as an IP hop or some language indicators, are circumstantial and could even be intentional false flags” to misdirect investigators. [4]
Whether an association exists or not between Lazarus and North Korea has little meaning regarding a specific attack. Joseph Carson of Thycotic emphasizes “that it is important to be clear that [Lazarus] is a group and motives can change depending on who is paying. I have found when researching hacking groups they can one day be working for one government under one alias and another using a different alias. This means that association in cyberspace means nothing.” [5]
It is considered a particularly damning piece of evidence that some of the tools used in an early variant of WannaCry share characteristics with those deployed in the cyberattack on Sony. [6] However, there is ample cause for doubting North Korea’s role in the Sony hack, as I have written about before. [7] Following the Sony breach, IT businessman John McAfee revealed that he had contact with the group that attacked Sony. “It has to do with a group of hackers” motivated by dislike of the movie industry’s “controlling the content of art,” he said, and the FBI was wrong in attributing the attack to North Korea. [8]
If attribution of the Sony hack to North Korea does not hold up, then linkage based on tool usage falls apart.
Once malware is deployed, it often appears for sale on the Dark Web, where it can be purchased by cybercriminals. The reuse of code is a time-saving measure in building new threats. Indeed, malware can find its way onto the market quite rapidly, and almost as soon as WannaCry was wreaking havoc back in May, it was reported that “researchers are already finding variants” of WannaCry “in the wild.” [9]
According to Peter Stephenson of SC Media, “The most prevailing [theory] uses blocks of code that were part of known Korean hacks appearing in the WannaCry code as justification for pinning the attacks on NK. That’s really not enough. These blocks of code are readily available in the underground and get reused regularly.” [10]
Commonality of tool usage means less than we are led to believe. “While malware may initially be developed and used by a single actor,” Digital Shadows explains, “this does not mean that it will permanently remain unique to that actor. Malware samples might be accidentally or intentionally leaked, stolen, sold, or used in independent operations by individual members of the group.” [11]
“Shared code is not the same as attribution. Code can be rewritten and erased by anyone, and shared code is often reused,” observes Patrick Howell O’Neill of Cyberscoop. “The same technique could potentially be used to frame another group as responsible for a hack but, despite a lot of recent speculation, there is no definitive proof.” [12]
None of the shared code was present in WannaCry’s widespread attack on May 12. Although it is more likely than not that the same actor was behind the early variants of WannaCry and the May version, it is not certain. Alan Woodward, cybersecurity advisor to Europol, points out, “It is quite possible for even a relatively inexperienced group to obtain the malicious WannaCry payload and to have repackaged this. Hence, the only thing actually tying the May attacks to the earlier WannaCry attacks is the payload, which criminals often copy.” [13]
The most devastating component WannaCry utilized in its May 12 attack is EternalBlue, an exploit of Windows vulnerabilities that was developed by the National Security Agency and leaked by Shadow Brokers. The NSA informed Microsoft of the vulnerability only after it learned of the software’s theft. According to Bossert, the NSA informs software manufacturers about 90 percent of the time when it discovers a vulnerability in operating software. It keeps quiet about the remaining ten percent so that it can “use those vulnerabilities to develop exploits for the purpose of national security for the classified work we do.” [14] Plainly put, the NSA intentionally leaves individuals and organizations worldwide exposed to potential security breaches so that it can conduct its own cyber operations. This is less than reassuring.
The May variant of WannaCry also implemented DoublePulsar, which is a backdoor implant developed by the NSA that allows an attacker to gain full control over a system and load executable malware.
The two NSA-developed components are what allowed WannaCry to turn virulent last May. After loading, EternalBlue proceeds to infect every other vulnerable computer on the same network. It simultaneously generates many thousands of random IP addresses and launches 128 threads at two-second intervals, seeking vulnerabilities in computers that it can exploit at each one of the generated external IP addresses.[15]
China and Russia were among the nations that were most negatively impacted by the malware. [16] WannaCry initially targeted Russian systems, which would seem an odd thing for North Korea to do, given that Russia and China are the closest things it has to allies. [17]
Digital Shadows reports that “the malware appeared to spread virtually indiscriminately with no control by its operators,” and a more targeted approach “would have been more consistent with the activities of a sophisticated criminal outfit or a technically-competent nation-state actor.” [18]
Flashpoint analyzed the ransom note that appeared on infected computers. There were two Chinese versions and an English version. The Chinese texts were written by someone who is fluent, and the English by someone with a strong but imperfect command of English. Ransom notes in other languages were apparently translated from the English version using Google translator. [19] It has been pointed out that this fact does not disprove the U.S. attribution of North Korea, as that nation could have hired Chinese cybercriminals. True enough, but then North Korea does not have a unique ability to do so. If so inclined, anyone could contract Chinese malware developers. Or cybercriminals could act on their own.
Lazarus and North Korean cyber actors have a reputation for developing sophisticated code. The hallmark of WannaCry, however, is its sheer sloppiness, necessitating the release of a series of new versions in fairly quick succession. Alan Woodward believes that WannaCry’s poorly designed code reveals that it had been written by “a less than experienced malware developer.” [20]
Important aspects of the code were so badly bungled that it is difficult to imagine how any serious organization could be responsible.
IT security specialists use virtual machines, or sandboxes, to safely test and analyze malware code. A well-designed piece of malware will include logic to detect the type of environment it is executing in and alter its performance in a virtual machine (VM) environment to appear benign. WannaCry was notably lacking in that regard. “The authors did not appear to be concerned with thwarting analysis, as the samples analyzed have contained little if any obfuscation, anti-debugging, or VM-aware code,” notes LogRhythm Labs. [21]
James Scott argues that “every WannaCry attack has lacked the stealth, sophistication, and resources characteristic of [Lazarus sub-group] Bluenoroff itself or Lazarus as a whole. If either were behind WannaCry, the attacks likely would have been more targeted, had more of an impact, would have been persistent, would have been more sophisticated, and would have garnered significantly greater profits.” The EternalBlue exploit was too valuable to waste “on a prolific and unprofitable campaign” like the May 12 WannaCry attack. By contrast, Bluenoroff “prefers to silently integrate into processes, extort them, and invisibly disappear after stealing massive fiscal gains.” [22] Bogdan Botezatu of Bitdefender, agrees. “The attack wasn’t targeted and there was no clear gain for them. It’s doubtful they would use such a powerful exploit for anything else but espionage.” [23]
WannaCry included a “kill switch,” apparently intended as a poorly thought out anti-VM feature. “For the life of me,” comments Peter Stephenson, “I can’t see why they might think that would work.” [24] When the software executes it first attempts to connect to a hostname that was unregistered. The malware would proceed to run if the domain was not valid. A cybersecurity researcher managed to disable WannaCry by registering the domain through NameCheap.com, shutting down with ease the ability of WannaCry to infect any further computers. [25]
Once WannaCry infected a computer, it demanded a ransom of $300 in bitcoin to release the files it had encrypted. After three days, the price doubled. The whole point of WannaCry was to generate income, and it is here where the code was most inept.
Ideally, ransomware like WannaCry would use a new account number for each infected computer, to better ensure anonymity. Instead, WannaCry hard-coded just three account numbers, which basically informed authorities what accounts to monitor. [26] It is an astonishing botch.
Incredibly, WannaCry lacked the capability of automatically identifying which victims paid the ransom. That meant that determining the source of each payment required manual effort, a daunting task given the number of infected computers. [27] Inevitably, decryption keys were not sent to paying victims and once the word got out, there was no motivation for anyone else to pay.
In James Scott’s assessment, “The WannaCry attack attracted very high publicity and very high law-enforcement visibility while inflicting arguably the least amount of damage a similar campaign that size could cause and garnering profits lower than even the most rudimentary script kiddie attacks.” Scott was incredulous over claims that WannaCry was a Lazarus operation. “There is no logical rationale defending the theory that the methodical [Lazarus], known for targeted attacks with tailored software, would suddenly launch a global campaign dependent on barely functional ransomware.” [28]
One would never know it from news reports, but cybersecurity attribution is rarely absolute. Hal Berghel, of the Department of Computer Science at the University of Nevada, comments on the “absence of detailed strategies to provide justifiable, evidence-based cyberattribution. There’s a reason for that: there is none. The most we have is informed opinion.” The certainty with which government officials and media assign blame in high-profile cyberattacks to perceived enemies should at least raise questions. “So whenever a politician, pundit, or executive tries to attribute something to one group or another, our first inclination should always be to look for signs of attribution bias, cognitive bias, cultural bias, cognitive dissonance, and so forth. Our first principle should be cui bono: What agendas are hidden? Whose interests are being represented or defended? What’s the motivation behind the statement? Where are the incentives behind the leak or reportage? How many of the claims have been substantiated by independent investigators?” [29]
IT security specialist Graham Cluley raises an important question. “I think in the current hostile climate between USA and North Korea it’s not unhelpful to retain some skepticism about why this claim might have been made, and what may have motivated the claim to be made at the present time.” [30]
To all appearances, WannaCry was the work of amateurish developers who got hold of NSA software that allowed the malware to spread like wildfire, but their own code was so poorly written that it failed to monetize the effort to any meaningful degree.
WannaCry has its uses, though. The Trump administration’s public attribution is “more about the administration’s message that North Korea is a dangerous actor than it is about cybersecurity,” says Ross Rustici, head of Intelligence Research at Cybereason. “They’re trying to lay the groundwork for people to feel like North Korea is a threat to the homeland.” [31] It is part of a campaign by the administration to stampede the public into supporting harsh measures or possibly even military action against North Korea.
[1] Thomas P. Bossert, “It’s Official: North Korea is Behind WannaCry,” Wall Street Journal,” December 19, 2017.
[2] “Press Briefing on the Attribution of the WannaCry Malware Attack to North Korea,” Whitehouse.gov, December 19, 2017.
[3] “WannaCry and Lazarus Group – the Missing Link?” SecureList, May 15, 2017.
[4] James Scott, “There’s Proof That North Korea Launched the WannaCry Attack? Not So Fast! – A Warning Against Premature, Inconclusive, and Distracting Attribution,” Institute for Critical Infrastructure Technology, May 23, 2017.
[5] Eduard Kovacs, “Industry Reactions to U.S. Blaming North Korea for WannaCry,” Security Week, December 22, 2017.
[6] “WannaCry: Ransomware Attacks Show Strong Links to Lazarus Group,” Symantec Official Blog, May 22, 2017.
[7] Gregory Elich, “Who Was Behind the Cyberattack on Sony?” Counterpunch, December 30, 2014.
[8] David Gilbert, Gareth Platt, “John McAfee: ‘I Know Who Hacked Sony Pictures – and it Wasn’t North Korea,” International Business Times, January 19, 2015.
[10] Peter Stephenson, “WannaCry Attribution: I’m Not Convinced Kim Dunnit, but a Russian…”, SC Media, May 21, 2017.
[11] Digital Shadows Analyst Team, “WannaCry: An Analysis of Competing Hypotheses,” Digital Shadows, May 18, 2017.
[12] Patrick Howell O’Neill, “Researchers: WannaCry Ransomware Shares Code with North Korean Malware,” Cyberscoop, May 15, 2017.
[13] Alan Woodward, “Attribution is Difficult – Consider All the Evidence,” Cyber Matters, May 24, 2017.
[14] Thomas P. Bossert, “It’s Official: North Korea is Behind WannaCry,” Wall Street Journal,” December 19, 2017.
[15] Luke Somerville, Abel Toro, “WannaCry Post-Outbreak Analysis,” Forcepoint, May 16, 2017.
Sarah Maloney, “WannaCry / WCry /WannaCrypt Attack Profile,” Cybereason, May 16, 2017.
Rohit Langde, “WannaCry Ransomware: A Detailed Analysis of the Attack,” Techspective, September 26, 2017.
[16] Eduard Kovacs, “WannaCry Does Not Fit North Korea’s Style, Interests: Experts,” Security Week, May 19, 2017.
[17] “A Technical Analysis of WannaCry Ransomware,” LogRhythm, May 16, 2017.
[18] Digital Shadows Analyst Team, “WannaCry: An Analysis of Competing Hypotheses,” Digital Shadows, May 18, 2017.
[19] Jon Condra, John Costello, Sherman Chu, “Linguistic Analysis of WannaCry Ransomware Messages Suggests Chinese-Speaking Authors,” Flashpoint, May 25, 2017.
[20] Alan Woodward, “Attribution is Difficult – Consider All the Evidence,” Cyber Matters, May 24, 2017.
[21] Erika Noerenberg, Andrew Costis, Nathanial Quist, “A Technical Analysis of WannaCry Ransomware,” LogRhythm, May 16, 2017.
[22] James Scott, “There’s Proof That North Korea Launched the WannaCry Attack? Not So Fast! – A Warning Against Premature, Inconclusive, and Distracting Attribution,” Institute for Critical Infrastructure Technology, May 23, 2017.
[23] Eduard Kovacs, “WannaCry Does Not Fit North Korea’s Style, Interests: Experts,” Security Week, May 19, 2017.
[24] Peter Stephenson, “WannaCry Attribution: I’m Not Convinced Kim Dunnit, but a Russian…”, SC Media, May 21, 2017.
[25] Rohit Langde, “WannaCry Ransomware: A Detailed Analysis of the Attack,” Techspective, September 26, 2017.
[26] Jesse Dunietz, “The Imperfect Crime: How the WannaCry Hackers Could Get Nabbed,” Scientific American, August 16, 2017.
[27] Andy Greenberg, “The WannaCry Ransomware Hackers Made Some Major Mistakes,” Wired, May 15, 2017.
[28] James Scott, “WannaCry Ransomware & the Perils of Shoddy Attribution: It’s the Russians! No Wait, it’s the North Koreans!” Institute for Critical Infrastructure Technology, May 18, 2017.
[29] Hal Berghel, “On the Problem of (Cyber) Attribution,” Computer — IEEE Computer Society, March 2017.
[30] Scott Carey, “Should We Believe the White House When it Says North Korea is Behind WannaCry?” Computer World, December 20, 2017.
[31] John P. Mello Jr., “US Fingers North Korea for WannaCry Epidemic,” Tech News World, December 20, 2017.
Gregory Elich is on the Board of Directors of the Jasenovac Research Institute and the Advisory Board of the Korea Policy Institute. He is a member of the Solidarity Committee for Democracy and Peace in Korea, a columnist for Voice of the People, and one of the co-authors of Killing Democracy: CIA and Pentagon Operations in the Post-Soviet Period, published in the Russian language. He is also a member of the Task Force to Stop THAAD in Korea and Militarism in Asia and the Pacific. His website is https://gregoryelich.org Follow him on Twitter at @GregoryElich
What caused the FBI to open a counterintelligence investigation into the Trump campaign in July 2016, which evolved into the criminal investigation that is said today to imperil the Trump presidency?
As James Comey’s FBI and Special Counsel Robert Mueller have, for 18 months, failed to prove Donald Trump’s “collusion” with the Kremlin, what was it, in mid-2016, that justified starting this investigation?
What was the basis for the belief Trump was colluding, that he was the Manchurian candidate of Vladimir Putin? What evidence did the FBI cite to get FISA court warrants to surveil and wiretap Trump’s team?
Republican congressmen have for months been demanding answers to these questions. And, as Mueller’s men have stonewalled, suspicions have arisen that this investigation was, from the outset, a politicized operation to take down Trump.
Feeding those suspicions has been the proven anti-Trump bias of investigators. Also, wiretap warrants of Trump’s team are said to have been issued on the basis of a “dirty dossier” that was floating around town in 2016 — but which mainstream media refused to publish as they could not validate its lurid allegations.
Who produced the dossier?
Ex-British spy Christopher Steele, whose dirt was delivered by ex-Kremlin agents. And Steele was himself a hireling of Fusion GPS, the oppo research outfit enlisted and paid by the Clinton campaign and DNC.
Writes the Washington Times, Steele “paid Kremlin sources with Democratic cash.”
Yet, if Steele’s dossier is a farrago of falsehoods and fake news, and the dossier’s contents were used to justify warrants for wiretaps on Trump associates, Mueller has a problem.
Prosecutions his team brings could be contaminated by what the FBI did, leaving his investigation discredited.
Fortunately, all this was cleared up for us New Year’s Eve by a major revelation in The New York Times. Top headline on page one:
“Unlikely Source Propelled Russia Meddling Inquiry”
The story that followed correctly framed the crucial question:
“What so alarmed American officials to provoke the FBI to open a counterintelligence investigation of the Trump campaign months before the presidential election?”
The Times then gave us the answer we have been looking for:
“It was not, as Trump and other politicians have alleged, a dossier compiled by a former British spy hired by a rival campaign. Instead it was firsthand information from one of America’s closest intelligence allies.”
The ally: Australia, whose ambassador to Britain was in an “upscale London Bar” in the West End in May 2016, drinking with a sloshed George Papadopoulos, who had ties to the Trump campaign and who informed the diplomat that Russia had dirt on Hillary Clinton.
Papadopoulos had reportedly been told in April that Russia had access to Clinton’s emails.
Thus, when the DNC and John Podesta emails were splashed all over the U.S. press in June, Amb. Alexander Downer, recalling his conversation with Papadopoulos, informed his government, which has excellent ties to U.S. intelligence, and the FBI took it from there.
The Times’ story pounds home this version of events:
“The hacking and the revelation that a member of the Trump campaign may have had inside information about it were driving factors that led the FBI to open an investigation in July 2016 into Russian attempts to disrupt the election and whether any of Trump’s associates conspired.”
This, the Times assures us, “answers one of the lingering mysteries of the past year.”
Well, perhaps.
But if Papadopoulos’s drunken babbling to the Aussie ambassador triggered the investigation in July 2016, why was George not interviewed by the FBI until January 2017?
According to the Times, an FBI agent in Rome had been told by Steele in June 2016 what he had learned from the Russians.
And Steele was interviewed by the FBI in October 2016.
If Papadopoulos triggered the investigation, why the seeming FBI disinterest in him — as compared to Steele?
Yet another major question remains unanswered.
If, as the Times writes, the FBI was looking “into Russian attempts to disrupt the elections,” why did the FBI not open an investigation into the KGB roots of the Steele dossier that was written to destroy the Republican candidate, Donald Trump?
If Trump’s alleged “collusion” with Putin to damage Clinton was worthy of an all-out FBI investigation, why did the Clinton-DNC scheme to tie Trump to Russian prostitutes, using British spies and former KGB agents, not merit an FBI investigation?
Why was there less concern about the Clinton campaign’s ties to Russian agents, than to Trumpian “collusion” that is yet unproven?
Consider what the British spy Steele and his former KGB/FSB comrades accomplished:
They have kept alive a special counsel’s investigation that has divided our country, imperiled the FBI’s reputation, preoccupied and damaged a president, and partially paralyzed the U.S. government.
Putin must be marveling at the astonishing success of his old comrades from KGB days, who could pull off an intelligence coup like this and so cripple the superpower that won the Cold War.
More than a month after Neda Aqa-Soltan was killed in the post-election frenzy in Iran, a key witness to the incident moves to set the record straight.
Neda, 26, was shot dead on June 20 in an alley away from the scene of clashes between security forces and demonstrators in Tehran.
She immediately became an international icon after graphic videos of her bleeding to death in a matter of seconds, grabbed the attention of world media outlets.
Hamid Panahi, Neda’s friend and music teacher who was by her side in her final moments, dismissed the slew of eyewitness accounts of the sad incident — particularly the one given by Arash Hejazi.
Arash Hejazi, an Iranian physician currently studying in England, told the BBC that he had witnessed a member of the Basij shooting Neda.
His comments were a contributing factor in the Western-led media campaign against the Ahmadinejad government.
Panahi said contrary to Hejazi’s account of the incident, ‘there were no security forces of Basij members nearby’.
“In his interviews with foreign media outlets, Mr. Hejazi said that the culprit behind Neda’s death was arrested on the spot. I saw nothing of the sort. There were only about a dozen people present at the scene. No one was arrested,” he said.
To prove his point, Panahi said that new revelations have found that Neda was in fact shot not in the chest, but in the back.
Panahi is not the first to dismiss Hejazi’s account of Neda’s death. Earlier in June, the man who drove Neda to hospital had also said that there were no Basij members around at the time.
Iranian security forces have dismissed the reports out of hand, asserting that they did not open fire on protestors during the sporadic unrest.
While Media outlets in the West blame Neda’s death on Iranian security forces, new revelations show that she was murdered by a small caliber pistol– a weapon that is not used by Iranian security forces.
Iranian President Mahmoud Ahmadinejad has asked Judiciary chief Ayatollah Hashemi-Shahroudi to conduct a through investigation into the incident.
“Indeed, the influence of these key donors—Sheldon Adelson, Bernard Marcus, and Paul Singer—over U.S. foreign policy, particularly with regards to Iran, doesn’t stop at the White House, where combined they contributed over $40 million to various pro-Trump political groups and causes.
Those three donors also contributed $65 million at the congressional level. That represents nearly half of the individual contributions made to the Senate Leadership Fund (CLF) and Congressional Leadership Fund (CLF), Super PACs dedicated to maintaining Republican majorities in the House and Senate. Those contributions provide a considerable incentive for Hill Republicans to stake out a hawkish position on the JCPOA. …”
If you regard the United States as perhaps flawed but overall a force for good in the world . . .
If you scoff at the notion that the US, a republic founded on principles of freedom and democracy, has morphed into a world empire, perpetrating assassinations, coups d’état, acts of terror and illegal warfare . . .
If you want to promote peace but haven’t yet explored deceptive events that precipitate US warmongering . . .
. . . here is a volume that will clear the air and paint an honest picture of the significant, not-so-rosy impact US foreign policy and actions have had in the world around us.
USA: The Ruthless Empire, by Swiss historian and peace researcher Daniele Ganser, is the newly published English language translation of his book Imperium USA, originally written in German and published in 2020. Here is a summary of key points — including some lesser-known ones — along with remedies for a more peaceful future, that are covered in the book. … continue
This site is provided as a research and reference tool. Although we make every reasonable effort to ensure that the information and data provided at this site are useful, accurate, and current, we cannot guarantee that the information and data provided here will be error-free. By using this site, you assume all responsibility for and risk arising from your use of and reliance upon the contents of this site.
This site and the information available through it do not, and are not intended to constitute legal advice. Should you require legal advice, you should consult your own attorney.
Nothing within this site or linked to by this site constitutes investment advice or medical advice.
Materials accessible from or added to this site by third parties, such as comments posted, are strictly the responsibility of the third party who added such materials or made them accessible and we neither endorse nor undertake to control, monitor, edit or assume responsibility for any such third-party material.
The posting of stories, commentaries, reports, documents and links (embedded or otherwise) on this site does not in any way, shape or form, implied or otherwise, necessarily express or suggest endorsement or support of any of such posted material or parts therein.
The word “alleged” is deemed to occur before the word “fraud.” Since the rule of law still applies. To peasants, at least.
Fair Use
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more info go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
DMCA Contact
This is information for anyone that wishes to challenge our “fair use” of copyrighted material.
If you are a legal copyright holder or a designated agent for such and you believe that content residing on or accessible through our website infringes a copyright and falls outside the boundaries of “Fair Use”, please send a notice of infringement by contacting atheonews@gmail.com.
We will respond and take necessary action immediately.
If notice is given of an alleged copyright violation we will act expeditiously to remove or disable access to the material(s) in question.
All 3rd party material posted on this website is copyright the respective owners / authors. Aletho News makes no claim of copyright on such material.