Aletho News


Fact-checking the second volume of the U.S. National Climate Assessment

By Roger Andrews | Energy Matters | December 4, 2018

This recently-issued study (the “Assessment”) was seized on by the media as proof of the massive damage the US will suffer if nothing is done about climate change. The Assessment’s conclusions are based largely on speculative model projections that aren’t amenable to checking, but it also claims that the US is already experiencing some of the impacts of man-made climate change, and these claims can be checked. This post accordingly evaluates them claim-by-claim and finds that they are rarely backed up by any hard data, that in some cases they are contradicted by disclaimers buried in the text, and that in no case is there any hard evidence that conclusively relates the impacts to man-made climate change. The credibility of the Assessment’s predictions can be judged accordingly.

The Assessment is 1,600 pages long and I doubt that anyone has read it from cover to cover – I certainly haven’t. I have obtained my information from the Summary Findings, Overview, Report Chapters and Downloads sections in the boxes that clicking on this link leads to. These sections themselves contain several hundred pages of text, much of it repetitive, but there is always the possibility that I’ve missed some critical graphic or piece of text. On the other hand, if I’ve missed it the media, who will have read the introductory sections only, will have too.

And how did the media report the Assessment’s results? Here are some excerpts:


Climate change is already harming Americans’ lives with “substantial damages” set to occur as global temperatures threaten to surge beyond internationally agreed limits ……… The influence of climate change is being felt across the US with increases in disastrous wildfires in the west, flooding on the east coast, soil loss in the midwest and coastal erosion in Alaska

CBS News

Billions of hours in productivity will be lost. Hundreds of billions of dollars will be wiped from the economy. Tens of thousands of people will die each year. The scientific report, which was produced by 13 federal agencies, describes an American future nothing short of apocalyptic due to rising threats from climate change …. rising sea levels, disruptions in food productions and the spread of wildfires — have all come true today.

National Public Radio

Climate change is happening here and now …. It is affecting all of us no matter where we live. And the more climate changes, the more serious and even more dangerous the impacts will become.

US News & World Report

From record-breaking wildfires that destroyed more than 14,000 homes in California, to hurricanes that devastated parts of Florida and much of Puerto Rico, long-predicted impacts of climate change are here and wreaking havoc.

The media never lose an opportunity to cast climate change in the worst possible light, or fail to report it when someone else does it for them.

And what are the climate change impacts that the Assessment claims are “happening here and now”, which are the only ones we can verify, or not verify as the case may be, against observations? These excerpts identify them either explicitly or implicitly:

Glaciers and snow cover are shrinking

Increases in greenhouse gases and decreases in air pollution have contributed to increases in Atlantic hurricane activity since 1970.

America’s trillion-dollar coastal property market and public infrastructure are threatened by the ongoing increase in the frequency, depth, and extent of tidal flooding due to sea level rise

Existing water, transportation, and energy infrastructure already face challenges from heavy rainfall, inland and coastal flooding, landslides, drought, wildfire, heat waves, and other weather and climate events

Climate-related changes in weather patterns and associated changes in air, water, food, and the environment are affecting the health and well-being of the American people, causing injuries, illnesses, and death.

Rising air and water temperatures and changes in precipitation are intensifying droughts, increasing heavy downpours, reducing snowpack

Our Nation’s aging and deteriorating infrastructure is further stressed by increases in heavy precipitation events, coastal flooding, heat, wildfires

Some storm types such as hurricanes, tornadoes, and winter storms are also exhibiting changes that have been linked to climate change

After eliminating repetition and sorting the individual impacts into something resembling order we are left with droughts; floods; heavy precipitation; heat waves; wildfires; Atlantic hurricanes; tornadoes; winter storms; sea level rise; glaciers and snowpack; injuries, illnesses and death. We will review these in order of appearance:

1. Droughts

The Assessment begins by claiming that climate-change-induced droughts are intensifying in the US. Then later in the text it shoots itself in the foot:

While there are a number of ways to measure drought, there is currently no detectable change in long-term U.S. drought statistics using the Palmer Drought Severity Index

And adds a graphic to prove it, reproduced below as Figure 1:

Figure 1: US drought conditions. The Palmer Drought Severity Index is the commonly-used metric for measuring drought intensity

2. Floods

The Assessment provides no hard data to back up its claims that climate change is already causing increased flooding in the US (coastal flooding is discussed under sea level rise). The only quantitative historical data I can find on US floods are summarized in Figure 2 (data from Researchgate ):

Figure 2: Two measures of US flood damage, 1934-2000

These graphics don’t tell us whether floods in the US are on the increase or not. And the Assessment doesn’t tell us either, Not only does it fail to detect any nationwide trends, it states that it never claimed any relationship between floods and man-made climate change to begin with:

Analysis of 200 U.S. stream gauges indicates areas of both increasing and decreasing flooding magnitude but does not provide robust evidence that these trends are attributable to human influences …. Hence, no formal attribution of observed flooding changes to anthropogenic forcing has been claimed.

3. Heavy Precipitation

Since the Assessment admits that there are no detectable human-induced trends in US flooding we can reasonably assume that the claimed increase in heavy precipitation events has had no impact. But we will look at the data anyway. The Assessment presents this   graphic to back up its claim that heavy precipitation events are increasing over the US as a whole (Figure 3). As usual, the source of the data is not specified:

Figure 3: Percent of US land area with heavy precipitation events

The U.S. Global Change Research Program, under the auspices of which the Assessment was written, also produces graphics showing how heavy precipitation has changed with time and by region in the US (they may in fact be buried in parts of the Assessment I haven’t looked at). According to Figure 4 (from Globalchange) heavy precipitation events have increased over all of the US except the Southwest:

Figure 4: Increases in US total precipitation and very heavy precipitation events by region

And Huang et al (2017) produce time series showing how total precipitation and extreme precipitation in the Northeast US have both increased since about 1960 (Figure 5):

Figure 5: Increases in US total and extreme precipitation

So in this case the claim checks out against observations, or least in the northeast US. A lingering question, however, is how much of the increase in heavy precipitation was caused by man-made climate change. The Assessment implicitly assumes that all of it was, but a 2015 study by Hoerling et al. concludes that most of the changes after 1979 were caused by ocean variability:

Based on the modeling results, we conclude that anthropogenic climate change has not been a principal factor driving key characteristics of observed changes in U.S. heavy daily precipitation since 1979 …. Our results provide evidence for an alternative argument for another factor that has been operating in recent decades, namely, that statistics of U.S. heavy precipitation have been sensitive to strong decadal ocean variability since 1979

4. Heat Waves

One of the problems with heat waves is defining them (droughts and floods have the same problem). How hot does it have to get, and for how long, before a warm spell becomes a heat wave? The Assessment does not tell us. All it presents in the way of evidence for an increase in heat waves in the introductory report sections, including the 186-page “Report-in-Brief”, is this graphic (Figure 6), which shows the “heat wave season” increasing since the 1960s but not how many heat waves there were. Once again the data source is not specified, nor is the meaning of the cross-hatching:

Figure 6: Length of US “heat wave season”

The next graphic (Figure 7) is another one I added from the globalchange website. It shows an increase in daily record high temperatures in recent decades but again provides no information on the number of heat waves. How many of the record highs, for example, occurred in the winter?

Figure 7: Record daily highs in the US. The meaning of “ratio of daily temperature records” isn’t clear

The only graphic I found that provided any historic information on the incidence of heat waves was the Figure 8 plot of the EPA’s Annual Heat Wave Index. It’s not surprising that it doesn’t appear in the Assessment:

Figure 8: US annual heat wave index since 1895

5. Wildfires

The Assessment provides two graphics to support its claim that climate change is causing more wildfires. Figure 9 shows the first. Again no data source is cited, but it turns out that it comes from the National Interagency Fire Center:

Figure 9: Acres burned by US wildfires since 1987

It also shows only a fraction of the NIFC data. Figure 10, for what it may be worth, shows the complete plot. I say “for what it may be worth” because the plot comes accompanied by this disclaimer:

The National Interagency Coordination Center at NIFC compiles annual wildland fire statistics for federal and state agencies. This information is provided through Situation Reports, which have been in use for several decades. Prior to 1983, sources of these figures are not known, or cannot be confirmed, and were not derived from the current situation reporting process. As a result the figures prior to 1983 should not be compared to later data.

Figure 10: Acres burned by US wildfires. Figure 9 data carried back to 1926

Figure 11 reproduces the Assessment’s second graphic. It shows that about half of the increase in acreage burned was caused by climate change. (Note that it conflicts with the Figure 9 data, according to which a cumulative total of 173 million acres, not 23 million, has been burned since 1984).

Figure 11: Acreage burned by naturally-occurring wildfires vs. acreage burned by climate-change-caused wildfires

In this case the data source is specified. It’s a 2016 paper written by John T. Abatzoglou and A. Park Williams entitled “Impact of anthropogenic climate change on wildfire across western US forests”. How did they segregate climate change-caused wildfires from naturally-occurring wildfires? They used climate models:

We quantify the influence of ACC (anthropogenic climate change) using the Coupled Model Intercomparison Project, Phase 5 (CMIP5) multimodel mean changes in temperature and vapor pressure …. This approach defines the ACC signal for any given location as the multimodel mean 50-y low-pass-filtered record of monthly temperature and vapor pressure anomalies relative to a 1901 baseline.

Before we can accept these results as meaningful we must assume that the global CMIP5 climate models can hindcast temperatures and vapor pressures to a high level of accuracy in the US, which they probably can’t (it’s generally accepted that climate models do a poor job of simulating regional changes). We also have to assume that the numerous other variables that affect wildfires have had no impact. This is a stretch, to put it mildly.

6. Atlantic Hurricanes

In this case the Assessment supplies no data, or at least none that I can find, to back up its claim that Atlantic hurricanes have increased since 1970. So once again I have had to dig up data on my own. Figure 12 (data from the US Environmental Protection Agency) plots the number of North Atlantic hurricanes since 1880. The total number is defined by the orange line, which adjusts for undercounting before 1967, and by the green line after that. There has been an erratic overall increase since about 1970, but since 1880 there has been no clear trend:

Figure 12: Unadjusted hurricane counts, hurricane counts adjusted for undercounting and hurricanes making landfall in the US

The North Atlantic, however, is not part of the US. The important consideration is how many hurricanes have made landfall in the US. These are shown by the red line at the bottom of Figure 12. There is no clear trend since 1970 and if anything a decrease since 1880.

According to Figure 13 (data from Dr. Roy Spencer) major hurricanes making landfall in the US have also been decreasing since the 1930s:

Figure 13: Major hurricanes making landfall in the US

And according to Klotzbach et al (2018) there has been little to no increase in normalized hurricane damages in the US since 1900 (Figure 13):

Figure 14: Normalized damages from hurricanes making landfall in the US

In this case the claim broadly matches observations but conceals (probably deliberately) the big picture, which is that man-made climate change has not increased the incidence of, or the damage caused by, North Atlantic hurricanes making landfall in the US since at least the late 1800s.

7. Tornadoes

Some storm types such as … tornadoes … are also exhibiting changes that have been linked to climate change. Once more the Assessment presents no supporting data, but NOAA’s tornado counts (Figure 15) speak for themselves:

Figure 15: Total tornado and strong-to-violent tornado counts since 1954

8. Winter Storms

… winter storms … are also exhibiting changes that have been linked to climate change.

Once again there are no supporting data in the Assessment, but according to Coleman & Schwartz’s 2017 paper An Updated Blizzard Climatology of the Contiguous United States (1959–2014) the incidence of blizzards in the US has been increasing (Figure 16):

Figure 16: Incidence of blizzards in US

Is this counter-intuitive increase related to climate change? NOAA thinks it may be, although NOAA’s explanation works only in the eastern US ….

Conditions that influence the severity of eastern U.S. snowstorms include warmer-than-average ocean surface temperatures in the Atlantic. These can lead to exceptionally high amounts of moisture flowing into a storm and contribute to greater intensification of the storm. Natural variability can affect ocean surface temperatures, but as global surface temperatures increase, the temperature at any time is higher than it would have been without climate change.

…. and it doesn’t match up very well with trends in sea surface temperatures off the eastern US coast (data from KNMI Climate Explorer) ….

Figure 17: Sea surface temperatures along US east coast (30N-45N, 65W-80W)

… and according to the IPCC Fifth Assessment Report it’s going off in the wrong direction:

Changes in the frequency, severity, and duration of extreme events may be among the most important risks associated with climate change. In some parts of North America, this includes fewer periods of extreme cold, fewer snowstorms ….

Milder winter temperatures will decrease heavy snowstorms .…

This is one of the cases where the claim matches observational changes, but no conclusion as to causation can be reached until there is agreement over whether climate change causes a) more snowstorms, b) fewer snowstorms or c) both at the same time. My money is on c).

9. Sea Level Rise/Coastal Flooding

These are related phenomena, so I will discuss them under the same heading.

Once more there are no supporting data in the Assessment, so once more I had to go searching for some. This graphic from NOAA shows an increase in high-tide flooding that correlates with an increase in “coastal sea level” (Figure 18):

Figure 18: Average days/year with high-tide flooding vs. US sea level

And as shown in Figure 19 (data from EPA) the increased flooding is dominantly an east coast phenomenon:

Figure 19: Average number of tidal floods/year, 2010-2015 vs. 1950-1959

But note the fine print. These are “nuisance floods” that don’t do any serious damage. There is no accepted definition of a nuisance flood, but a maximum water depth of 10cm has been proposed. And a 10cm-deep flood is hardly a catastrophic event.

And what does sea level rise have to do with the increase in nuisance floods? Not much. The reason nuisance floods are more common along the east coast of the US is that the east coast is sinking (a result of glacial rebound*, sediment compaction and groundwater extraction) while the west coast isn’t, and the rate at which the east coast is sinking exceeds the rate at which sea levels are rising in many places. The PSMSL tide gauge record from Sewell’s Point, near the mouth of Chesapeake Bay, is an example (Figure 20). The trend line shows sea level rising at an average rate of 4.5mm/year, but according to the United States Geological Survey less than half of this – maybe less than 2 mm/year – is a result of eustatic sea level rise. The rest is caused by land subsidence:

* Glacial rebound causes the land in and immediately around the ice sheet to rise while the surrounding land, which was squeezed upwards by the ice, sinks back down again. 

Figure Figure 20: Relative sea level rise, Sewell’s Point, Virginia

10 cm nuisance floods and ~2 mm/year sea level rises also pale into insignificance beside the hurricane storm surges that have occurred in the past and which can be expected to recur in the future along the US east coast. They reached heights of eight feet at Sewell’s point during Hurricane Isabel as recently as 2003 and 18 feet along the North Carolina coast during Hurricane Hazel in 1954.

My 2016 post on Isle de Jean Charles, Louisiana describes how sea level rise routinely takes the blame for inundations it didn’t cause. The Assessment cites it as an example of climate change in action.

10. Glaciers and snowpack

North American glaciers have indeed been retreating, as the Assessment claims. But  according to Oerlemans (2005, Figure 21) they have been retreating since about 1825 and retreating rapidly after 1890, well before human-induced climate forcings became significant. This raises the question of whether the retreat has anything to do with man-made climate change:

Figure 21: Glacier retreat since 1700. The green line is North America

No data are available on snowpack, but Rutgers University publishes North American snow cover data (Figure 22). The trend line shows only a very minor decrease since 1975:

Figure 22: Snow-Covered Area in North America, 1972-2015

11. Injuries, Illnesses and Death:

Climate-related changes in weather patterns …. are affecting the health and well-being of the American people, causing injuries, illnesses, and death.

No data on illnesses or injuries are readily available, but over the last ten years approximately 25 million people have died in the US. According to Wikipedia
natural disasters of the type that commonly get blamed on climate change (hurricanes, floods, blizzards, wildfires, tornadoes) have claimed only 1,200 lives over this period.


In this post I have fact-checked eleven separate climate change impacts which according to the Assessment’s summary sections are already doing damage in the US. In six of these cases (heavy precipitation, heat waves, wildfires, winter storms, sea level rise/coastal flooding and glacier retreat) there is observational evidence – most of which I have had to dig up myself – for impacts that might be related to man-made climate change, but in all of them this evidence is equivocal (e.g. wildfires) or the impacts are insignificant (e.g. nuisance tidal floods). In the other five cases (droughts, floods, Atlantic hurricanes, tornadoes, and injuries, illnesses and deaths) the observational evidence either contradicts the Assessment’s claims or the Assessment admits later in the text that the claim isn’t valid (droughts and floods).

Clearly the Assessment was conducted with little regard for the facts. A disregard for the facts, however, is necessary if one wishes to get the climate change catastrophe message across.

December 4, 2018 Posted by | Deception, Fake News, Mainstream Media, Warmongering, Science and Pseudo-Science, Timeless or most popular | , , , | Leave a comment

How the Department of Homeland Security Created a Deceptive Tale of Russia Hacking US Voter Sites

By Gareth Porter | Consortium News | August 28, 2018

The narrative of Russian intelligence attacking state and local election boards and threatening the integrity of U.S. elections has achieved near-universal acceptance by media and political elites. And now it has been accepted by the Trump administration’s intelligence chief, Dan Coats, as well.

But the real story behind that narrative, recounted here for the first time, reveals that the Department of Homeland Security (DHS) created and nurtured an account that was grossly and deliberately deceptive.

DHS compiled an intelligence report suggesting hackers linked to the Russian government could have targeted voter-related websites in many states and then leaked a sensational story of Russian attacks on those sites without the qualifications that would have revealed a different story. When state election officials began asking questions, they discovered that the DHS claims were false and, in at least one case, laughable.

The National Security Agency and special counsel Robert Mueller’s investigating team have also claimed evidence that Russian military intelligence was behind election infrastructure hacking, but on closer examination, those claims turn out to be speculative and misleading as well. Mueller’s indictment of 12 GRU military intelligence officers does not cite any violations of U.S. election laws though it claims Russia interfered with the 2016 election.

A Sensational Story 

On Sept. 29, 2016, a few weeks after the hacking of election-related websites in Illinois and Arizona, ABC News carried a sensational headline: “Russian Hackers Targeted Nearly Half of States’ Voter Registration Systems, Successfully Infiltrated 4.” The story itself reported that “more than 20 state election systems” had been hacked, and four states had been “breached” by hackers suspected of working for the Russian government. The story cited only sources “knowledgeable” about the matter, indicating that those who were pushing the story were eager to hide the institutional origins of the information.

Behind that sensational story was a federal agency seeking to establish its leadership within the national security state apparatus on cybersecurity, despite its limited resources for such responsibility. In late summer and fall 2016, the Department of Homeland Security was maneuvering politically to designate state and local voter registration databases and voting systems as “critical infrastructure.” Such a designation would make voter-related networks and websites under the protection a “priority sub-sector” in the DHS “National Infrastructure Protection Plan, which already included 16 such sub-sectors.

DHS Secretary Jeh Johnson and other senior DHS officials consulted with many state election officials in the hope of getting their approval for such a designation. Meanwhile, the DHS was finishing an intelligence report that would both highlight the Russian threat to U.S. election infrastructure and the role DHS could play in protecting it, thus creating political impetus to the designation. But several secretaries of state—the officials in charge of the election infrastructure in their state—strongly opposed the designation that Johnson wanted.

On Jan. 6, 2017—the same day three intelligence agencies released a joint “assessment” on Russian interference in the election—Johnson announced the designation anyway.

Media stories continued to reflect the official assumption that cyber attacks on state election websites were Russian-sponsored. Stunningly, The Wall Street Journal reported in December 2016 that DHS was itself behind hacking attempts of Georgia’s election database.

The facts surrounding the two actual breaches of state websites in Illinois and Arizona, as well as the broader context of cyberattacks on state websites, didn’t support that premise at all.

In July, Illinois discovered an intrusion into its voter registration website and the theft of personal information on as many as 200,000 registered voters. (The 2018 Mueller indictments of GRU officers would unaccountably put the figure at 500,000.) Significantly, however, the hackers only had copied the information and had left it unchanged in the database.

That was a crucial clue to the motive behind the hack. DHS Assistant Secretary for Cyber Security and Communications Andy Ozment told a Congressional committee in late September 2016 that the fact hackers hadn’t tampered with the voter data indicated that the aim of the theft was not to influence the electoral process. Instead, it was “possibly for the purpose of selling personal information.” Ozment was contradicting the line that already was being taken on the Illinois and Arizona hacks by the National Protection and Programs Directorate and other senior DHS officials.

In an interview with me last year, Ken Menzel, the legal adviser to the Illinois secretary of state, confirmed what Ozment had testified. “Hackers have been trying constantly to get into it since 2006,” Menzel said, adding that they had been probing every other official Illinois database with such personal data for vulnerabilities as well. “Every governmental database—driver’s licenses, health care, you name it—has people trying to get into it,” said Menzel.

In the other successful cyberattack on an electoral website, hackers had acquired the username and password for the voter database Arizona used during the summer, as Arizona Secretary of State Michele Reagan learned from the FBI. But the reason that it had become known, according to Reagan in an interview with Mother Jones, was that the login and password had shown up for sale on the dark web—the network of websites used by cyber criminals to sell stolen data and other illicit wares.

Furthermore, the FBI had told her that the effort to penetrate the database was the work of a “known hacker” whom the FBI had monitored “frequently” in the past. Thus, there were reasons to believe that both Illinois and Arizona hacking incidents were linked to criminal hackers seeking information they could sell for profit.

Meanwhile, the FBI was unable to come up with any theory about what Russia might have intended to do with voter registration data such as what was taken in the Illinois hack. When FBI Counterintelligence official Bill Priestap was asked in a June 2017 hearing how Moscow might use such data, his answer revealed that he had no clue: “They took the data to understand what it consisted of,” said the struggling Priestap, “so they can affect better understanding and plan accordingly in regards to possibly impacting future elections by knowing what is there and studying it.”

The inability to think of any plausible way for the Russian government to use such data explains why DHS and the intelligence community adopted the argument, as senior DHS officials Samuel Liles and Jeanette Manfra put it, that the hacks “could be intended or used to undermine public confidence in electoral processes and potentially the outcome.” But such a strategy could not have had any effect without a decision by DHS and the U.S. intelligence community to assert publicly that the intrusions and other scanning and probing were Russian operations, despite the absence of hard evidence. So DHS and other agencies were consciously sowing public doubts about U.S. elections that they were attributing to Russia.

DHS Reveals Its Self-Serving Methodology

In June 2017, Liles and Manfra testified to the Senate Intelligence Committee that an October 2016 DHS intelligence report had listed election systems in 21 states that were “potentially targeted by Russian government cyber actors.” They revealed that the sensational story leaked to the press in late September 2016 had been based on a draft of the DHS report. And more importantly, their use of the phrase “potentially targeted” showed that they were arguing only that the cyber incidents it listed were possible indications of a Russian attack on election infrastructure.

Furthermore, Liles and Manfra said the DHS report had “catalogued suspicious activity we observed on state government networks across the country,” which had been “largely based on suspected malicious tactics and infrastructure.” They were referring to a list of eight IP addresses an August 2016 FBI “flash alert” had obtained from the Illinois and Arizona intrusions, which DHS and FBI had not been able to  attribute to the Russian government.

Manfra: No doubt it was the Russians. (C-SPAN)

The DHS officials recalled that the DHS began to “receive reports of cyber-enabled scanning and probing of election-related infrastructure in some states, some of which appeared to originate from servers operated by a Russian company.” Six of the eight IP addresses in the FBI alert were indeed traced to King Servers, owned by a young Russian living in Siberia. But as DHS cyber specialists knew well, the country of ownership of the server doesn’t prove anything about who was responsible for hacking: As cybersecurity expert Jeffrey Carr pointed out, the Russian hackers who coordinated the Russian attack on Georgian government websites in 2008 used a Texas-based company as the hosting provider.

The cybersecurity firm ThreatConnect noted in 2016 that one of the other two IP addresses had hosted a Russian criminal market for five months in 2015. But that was not a serious indicator, either. Private IP addresses are reassigned frequently by server companies, so there is not a necessary connection between users of the same IP address at different times.

The DHS methodology of selecting reports of cyber incidents involving election-related websites as “potentially targeted” by Russian government-sponsored hackers was based on no objective evidence whatever. The resulting list appears to have included any one of the eight addresses as well as any attack or “scan” on a public website that could be linked in any way to elections.

This methodology conveniently ignored the fact that criminal hackers were constantly trying to get access to every database in those same state, country and municipal systems. Not only for Illinois and Arizona officials, but state electoral officials.

In fact, 14 of the 21 states on the list experienced nothing more than the routine scanning that occurs every day, according to the Senate Intelligence Committee. Only six involved what was referred to as a “malicious access attempt,” meaning an effort to penetrate the site. One of them was in Ohio, where the attempt to find a weakness lasted less than a second and was considered by DHS’s internet security contractor a “non-event” at the time.

State Officials Force DHS to Tell the Truth

For a year, DHS did not inform the 21 states on its list that their election boards or other election-related sites had been attacked in a presumed Russian-sponsored operation. The excuse DHS officials cited was that it could not reveal such sensitive intelligence to state officials without security clearances. But the reluctance to reveal the details about each case was certainly related to the reasonable expectation that states would publicly challenge their claims, creating a potential serious embarrassment.

On Sept. 22, 2017, DHS notified 21 states about the cyber incidents that had been included in the October 2016 report. The public announcement of the notifications said DHS had notified each chief election officer of “any potential targeting we were aware of in their state leading up to the 2016 election.” The phrase “potential targeting” again telegraphed the broad and vague criterion DHS had adopted, but it was ignored in media stories.

But the notifications, which took the form of phone calls lasting only a few minutes, provided a minimum of information and failed to convey the significant qualification that DHS was only suggesting targeting as a possibility. “It was a couple of guys from DHS reading from a script,” recalled one state election official who asked not to be identified. “They said [our state] was targeted by Russian government cyber actors.”

A number of state election officials recognized that this information conflicted with what they knew. And if they complained, they got a more accurate picture from DHS. After Wisconsin Secretary of State Michael Haas demanded further clarification, he got an email response from a DHS official  with a different account. “[B]ased on our external analysis,” the official wrote, “the WI [Wisconsin] IP address affected belongs to the WI Department of Workforce Development, not the Elections Commission.”

California Secretary of State Alex Padilla said DHS initially had notified his office “that Russian cyber actors ‘scanned’ California’s Internet-facing systems in 2016, including Secretary of State websites.” But under further questioning, DHS admitted to Padilla that what the hackers had targeted was the California Department of Technology’s network.

Texas Secretary of State Rolando Pablos and Oklahoma Election Board spokesman Byron Dean also denied that any state website with voter- or election-related information had been targeted, and Pablos demanded that DHS “correct its erroneous notification.”

Despite these embarrassing admissions, a statement issued by DHS spokesman Scott McConnell on Sept. 28, 2017 said the DHS “stood by” its assessment that 21 states “were the target of Russian government cyber actors seeking vulnerabilities and access to U.S. election infrastructure.” The statement retreated from the previous admission that the notifications involved “potential targeting,” but it also revealed for the first time that DHS had defined “targeting” very broadly indeed.

It said the category included “some cases” involving “direct scanning of targeted systems” but also cases in which “malicious actors scanned for vulnerabilities in networks that may be connected to those systems or have similar characteristics in order to gain information about how to later penetrate their target.”

It is true that hackers may scan one website in the hope of learning something that could be useful for penetrating another website, as cybersecurity expert Prof. Herbert S. Lin of Stanford University explained to me in an interview. But including any incident in which that motive was theoretical meant that any state website could be included on the DHS list, without any evidence it was related to a political motive.

Arizona’s further exchanges with DHS revealed just how far DHS had gone in exploiting that escape clause in order to add more states to its “targeted” list. Arizona Secretary of State Michele Reagan tweeted that DHS had informed her that “the Russian government targeted our voter registration systems in 2016.” After meeting with DHS officials in early October 2017, however, Reagan wrote in a blog post that DHS “could not confirm that any attempted Russian government hack occurred whatsoever to any election-related system in Arizona, much less the statewide voter registration database.”

What the DHS said in that meeting, as Reagan’s spokesman Matt Roberts recounted to me, is even more shocking. “When we pressed DHS on what exactly was actually targeted, they said it was the Phoenix public library’s computers system,” Roberts recalled.

In April 2018, a CBS News “60 Minutes” segment reported that the October 2016 DHS intelligence report had included the Russian government hacking of a “county database in Arizona.” Responding to that CBS report, an unidentified “senior Trump administration official” who was well-briefed on the DHS report told Reuters that “media reports” on the issue had sometimes “conflated criminal hacking with Russian government activity,” and that the cyberattack on the target in Arizona “was not perpetrated by the Russian government.”

NSA Finds a GRU Election Plot

National Security Agency headquarters in Fort Meade, Md. (Wikimedia)

NSA intelligence analysts claimed in a May 2017 analysis to have documented an effort by Russian military intelligence (GRU) to hack into U.S. electoral institutions. In an intelligence analysis obtained by The Intercept and reported in June 2017, NSA analysts wrote that the GRU had sent a spear-phishing email—one with an attachment designed to look exactly like one from a trusted institution but that contains malware design to get control of the computer—to a vendor of voting machine technology in Florida. The hackers then designed a fake web page that looked like that of the vendor. They sent it to a list of 122 email addresses NSA believed to be local government organizations that probably were “involved in the management of voter registration systems.” The objective of the new spear-phishing campaign, the NSA suggested, was to get control of their computers through malware to carry out the exfiltration of voter-related data.

But the authors of The Intercept story failed to notice crucial details in the NSA report that should have tipped them off that the attribution of the spear-phishing campaign to the GRU was based merely on the analysts’ own judgment—and that their judgment was faulty.

The Intercept article included a color-coded chart from the original NSA report that provides crucial information missing from the text of the NSA analysis itself as well as The Intercept’s account. The chart clearly distinguishes between the elements of the NSA’s account of the alleged Russian scheme that were based on “Confirmed Information” (shown in green) and those that were based on “Analyst Judgment” (shown in yellow). The connection between the “operator” of the spear-phishing campaign the report describes and an unidentified entity confirmed to be under the authority of the GRU is shown as a yellow line, meaning that it is based on “Analyst Judgment” and labeled “probably.”

A major criterion for any attribution of a hacking incident is whether there are strong similarities to previous hacks identified with a specific actor. But the chart concedes that “several characteristics” of the campaign depicted in the report distinguish it from “another major GRU spear-phishing program,” the identity of which has been redacted from the report.

The NSA chart refers to evidence that the same operator also had launched spear-phishing campaigns on other web-based mail applications, including the Russian company “” Those targets suggest that the actors were more likely Russian criminal hackers rather than Russian military intelligence.

Even more damaging to its case, the NSA reports that the same operator who had sent the spear-phishing emails also had sent a test email to the “American Samoa Election Office.” Criminal hackers could have been interested in personal information from the database associated with that office. But the idea that Russian military intelligence was planning to hack the voter rolls in American Samoa, an unincorporated U.S. territory with 56,000 inhabitants who can’t even vote in U.S. presidential elections, is plainly risible.

The Mueller Indictment’s Sleight of Hand

The Mueller indictment of GRU officers released on July 13 appeared at first reading to offer new evidence of Russian government responsibility for the hacking of Illinois and other state voter-related websites. A close analysis of the relevant paragraphs, however, confirms the lack of any real intelligence supporting that claim.

Mueller accused two GRU officers of working with unidentified “co-conspirators” on those hacks. But the only alleged evidence linking the GRU to the operators in the hacking incidents is the claim that a GRU official named Anatoly Kovalev and “co-conspirators” deleted search history related to the preparation for the hack after the FBI issued its alert on the hacking identifying the IP address associated with it in August 2016.

A careful reading of the relevant paragraphs shows that the claim is spurious. The first sentence in Paragraph 71 says that both Kovalev and his “co-conspirators” researched domains used by U.S. state boards of elections and other entities “for website vulnerabilities.” The second says Kovalev and “co-conspirators” had searched for “state political party email addresses, including filtered queries for email addresses listed on state Republican Party websites.”

Mueller: Don’t read the fine print. (The White House/Wikimedia)

Searching for website vulnerabilities would be evidence of intent to hack them, of course, but searching Republican Party websites for email addresses is hardly evidence of any hacking plan. And Paragraph 74 states that Kovalev “deleted his search history”—not the search histories of any “co-conspirator”—thus revealing that there were no joint searches and suggesting that the subject Kovalev had searched was Republican Party emails. So any deletion by Kovalev of his search history after the FBI alert would not be evidence of his involvement in the hacking of the Illinois election board website.

With this rhetorical misdirection unraveled, it becomes clear that the repetition in every paragraph of the section of the phrase “Kovalev and his co-conspirators” was aimed at giving the reader the impression the accusation is based on hard intelligence about possible collusion that doesn’t exist.

The Need for Critical Scrutiny of DHS Cyberattack Claims

The DHS campaign to establish its role as the protector of U.S. electoral institutions is not the only case in which that agency has used a devious means to sow fear of Russian cyberattacks. In December 2016, DHS and the FBI published a long list of IP addresses as indicators of possible Russian cyberattacks. But most of the addresses on the list had no connection with Russian intelligence, as former U.S. government cyber-warfare officer Rob Lee found on close examination.

When someone at the Burlington, Vt., Electric Company spotted one of those IP addresses on one of its computers, the company reported it to DHS. But instead of quietly investigating the address to verify that it was indeed an indicator of Russian intrusion, DHS immediately informed The Washington Post. The result was a sensational story that Russian hackers had penetrated the U.S. power grid. In fact, the IP address in question was merely Yahoo’s email server, as Rob Lee told me, and the computer had not even been connected to the power grid. The threat to the power grid was a tall tale created by a DHS official, which the Post had to embarrassingly retract.

Since May 2017, DHS, in partnership with the FBI, has begun an even more ambitious campaign to focus public attention on what it says are Russian “targeting” and “intrusions” into “major, high value assets that operate components of our Nation’s critical infrastructure”, including energy, nuclear, water, aviation and critical manufacturing sectors. Any evidence of such an intrusion must be taken seriously by the U.S. government and reported by news media. But in light of the DHS record on alleged threats to election infrastructure and the Burlington power grid, and its well-known ambition to assume leadership over cyber protection, the public interest demands that the news media examine DHS claims about Russian cyber threats far more critically than they have up to now.

Gareth Porter is an independent investigative journalist and winner of the 2012 Gellhorn Prize for journalism. His latest book is Manufactured Crisis: The Untold Story of the Iran Nuclear Scare.

August 28, 2018 Posted by | Deception, Fake News, Mainstream Media, Warmongering, Russophobia | , , , , , , | 1 Comment

Promoters of Saudi Prince as Feminist Reformer Are Silent on His Crackdown on Women

By Adam Johnson | FAIR | May 23, 2018

During his US PR tour in March, Saudi prince and de facto ruler of the absolute monarchy Mohammed bin Salman (often referred to as “MBS”) touted the progress the kingdom was making in the area of “women’s rights”—namely letting women drive and combatting nebulous reactionary forces that were somehow separate from the regime.

Since then, at least seven major women’s rights advocates—Eman al-Nafjan, Loujain al-Hathloul, Aziz al-Yousef, Aisha al-Manea, Madiha Al-Ajroush, Walaa Al-Shubbar and Hasah Al-Sheikh—have been detained by Saudi authorities and, according to at least one report (Middle East Eye, 5/22/18), may face the death penalty.

Two of the biggest media corners that helped sell bin Salman as a feminist reformer during the trip and the months leading up to it—the New York Times opinion pages and CBS News 60 Minutes—have not published any follow-up commentary on bin Salman’s recent crackdown on women’s rights campaigners (Independent, 5/22/18). Let’s review their past coverage:

  • “In some ways, Prince Mohammed bin Salman, who serves as defense minister, is just what his country needs…. He would allow concerts, and would consider reforming laws tightly controlling the lives of women.” —New York Times editorial board (“The Young and Brash Saudi Crown Prince,” 6/23/17)
  • “I never thought I’d live long enough to write this sentence: The most significant reform process underway anywhere in the Middle East today is in Saudi Arabia….There was something a 30-year-old Saudi woman social entrepreneur said to me that stuck in my ear. ‘We are privileged to be the generation that has seen the before and the after.’ The previous generation of Saudi women, she explained, could never imagine a day when a woman could drive and the coming generation will never be able to imagine a day when a woman couldn’t.” —Thomas Friedman (New York Times, 11/23/17)
  • “He is emancipating women…. He has curbed the powers of the country’s so-called ‘religious police,’ who until recently were able to arrest women for not covering up.”—Norah O’Donnell (60 Minutes, 3/19/18)

The 60 Minutes interview was panned by many commentators at the time. “A crime against journalism,” The Intercept’s Mehdi Hasan (3/19/18) called it. “Embarrassing to watch,” insisted Omar H. Noureldin, VP of the the Muslim Public Affairs Council (Twitter, 3/20/18). “It was more of an Entertainment Tonight puff piece than a serious interview with journalistic standards.”

The New York Times editorial, while not quite as overtly sycophantic as Friedman and O’Donnell, still broadly painted the ruler as a “bold” and “brash” “reformer.”

Since the mass arrests of women’s group’s on Saturday, the Times news section has run several AP stories (5/18/18, 5/22/18) on the crackdown and one original report (5/18/18), but the typically scoldy editorial board hasn’t issued a condemnation of the arrests. They did, however, take time to condemn in maximalist terms the “violent regime” of Venezuela (5/21/18), insisting on “getting rid” of recently re-elected president Nicolas Maduro, and ran a separate editorial cartoon (5/22/18) showing Maduro declaring victory over the corpses of suffering Venezuelans.

Nor did MBS’s biggest court stenographer, Thomas Friedman, find room in his latest column  in his latest column (5/22/18) to note the crackdown. Given Times opinion page editor James Bennet was clear his paper was axiomatically “pro-capitalism” (3/1/18), one wonders whether he views Latin American socialists as uniquely worthy of condemnation, whereas Middle East petrol dictatorships that invest in American corporations and hosts glossy tech conferences deserve nuance and mild “reform” childing. We have to “get rid of” the former, and the latter simply need “guidance” from the US—their respective human rights records a total non-factor.

CBS ran a  50-second story on the “emancipating” MBS’s crackdown on its web-only news network, CBSN (5/21/18), and an AP story on its website (5/19/18), but CBS News has thus far aired nothing on the flagrant human rights violation on any of the news programs on its actual network, and certainly nothing in the ballpark of its most-watched prime time program, 60 Minutes.

If influential outlets like the Times opinion section and CBS News are going to help build up bin Salman’s image as a “reformer” and a champion of women’s rights, don’t they have a unique obligation to inform their readers and viewers when the image they built up is so severely undermined? Shouldn’t Bennet’s editorial board and Friedman—who did so much to lend legitimacy to the Saudi ruler’s PR strategy—be particularly outraged when he does a 180 and starts arresting prominent women’s rights advocates? Will 60 Minutes do a comparable 27-minute segment detailing these arrests and their chilling effect on activism?

This is all unlikely, since US allies’ crackdown on dissent is never in urgent need of clear moral condemnation; it’s simply a hiccup on the never-ending road to “reform.”

May 27, 2018 Posted by | Deception, Mainstream Media, Warmongering | , , | Leave a comment

Witch Hunt: “Fake News” Software Touted by CBS News

Creator Admits He Made Up Who Went on Hit List

Yves Smith | Naked Capitalism | December 7, 2016

One of most pernicious means underway to crush independent news sites is the release of software tools that brand them as unreliable. This means that hidden developers and the parties that fed them information are beyond any accountability, yet would serve as censors.

Last week, the Financial Times described efforts to use software to designate certain sites as suspect:

Concern over the impact on voters of soaring amounts of fake news during the US election has sparked a hackathon where the technology industry and the media’s top thinkers are seeking to find new ways to prioritise the truth.

A community has gathered to share ideas around a 58-page Google document started by Eli Pariser, the author of a best-selling critique of social media, The Filter Bubble: What the Internet is hiding from you. A professor has circulated a spreadsheet of reliable and less reliable news sources for comment, while hackathons at Princeton and in the Bay Area have produced prototype products that Facebook could copy…

A team of students won a prize sponsored by Google at a Princeton hackathon last week by creating a quick and dirty prototype of a product that does just that: showing Facebook users a “trust rating” for stories they see, based on an online safety rating provided by “World of Trust”.

If you read the article in full, you’ll see it depicts Wikipedia as a gold standard. As Gary Null discussed yesterday in his Progressive Commentary Hour show (we were a guest; the archived interview should be up later today), it is in fact very difficult to get corrections of Wikipedia entries. Similarly, on certain topics, such as economics, Wikipedia minimizes or excludes non-mainstream views even when they have solid empirical underpinnings and have been given a hearing in academic journals and the press.

The faith in coders coming up with a magic bullet for information validation is similarly questionable. The concern about “fake news” on the Internet is almost comical given that more citizens encounter “fake news” via seeing National Enquirer and National Examiner covers in grocery stores than via websites. It is not hard to imagine that much of the tender concern expressed by the mainstream media is commercial: independent news and analysis sites threaten their legitimacy by exposing how dependent they are on stories planted by government or business sources that these press outlets often fail to vet adequately.

One approach is browser extensions that flag sites as suspect via undisclosed, unverifiable methods. Browser extensions are a particularly pernicious approach, since many users are not even aware that they have installed them, and they update automagically in the background. Most consumers do not know how to check for them or remove them.

Shadowproof exposed how this technological response is being deployed in a reckless, fact-free, libelous manner against Shadowproof, Naked Capitalism, and other long-standing, well-regarded websites. Worse, this dodgy tool was promoted by CBS News. As Kevin Gosztola reports:

CBS News reported developers increased pressure on Facebook to address its “fake news problem” with a browser extension for Chrome and Firefox called the “B.S. Detector.” It claimed the extension relies upon “a constantly-updated list of known fake news sites, propaganda mills and ‘promoters of kooky conspiracy theories’” as a reference point.

However, CBS News was wrong. The extension is not “constantly updated.” The extension, as developer Daniel Sieradski shared, was created to “make fun” of Facebook. Sieradski “scraped some data together” that included sites, which are not “fake news” websites. (One of those sites was

“B.S. Detector” displays a red banner that indicates a news website is “not a reliable news source.” Up until publication, the extension still flagged Consortium News, Naked Capitalism, Truthout, and Truthdig, even though Sieradski said they would not be listed in the update….

Sieradski claims he never expected this to achieve the kind of success or interest it has garnered in the past couple weeks. He seems reluctant to own the mistakes made and publish a list of the websites that were wrongly included in the initial launch in order to exonerate them.

It does not matter if the improper inclusion of certain websites was done maliciously or accidentally. The effect is the same, at this point. People who do not know better can install the extension, and if they become a unique or new viewer to Consortium News, Naked Capitalism, Truthout, or Truthdig, they will see a red banner that may discourage them from further reading and visits to these sites.

Gosztola is being unduly charitable in how he characterizes the casual way with which Sieradski went about smearing small websites. Sieradski’s Twitter handle is @selfagency and business name is The Self Agency, LLC. This page on GitHub, selfagency/bs-dector, contains this astonishing admission:

As I have repeatedly stated in the press, on our repo, and on our homepage, the dataset was somewhat indiscrimintely compiled and we are slowly making our way through it. We are also looking to partner with media watchdog groups to provide research to back up our inclusions and classifications so that it is neither arbitrary nor the decision of a sole authority.

This is an admission of reckless disregard for accuracy for someone who is making himself an arbiter and doing damage to small sites that have worked long and hard to establish their reputations. This is defamation, pure and simple. Sieradski claims that he is not acting as a censor when he is doing precisely that. The fact that he may get others to participate in this witch hunt does not change the fundamental nature of the activity.

In fact, Sieradski’s ability to rationalize that what he is doing here is on the up and up by virtue of his having donated to the EFF, ACLU, and Chelsea Manning’s defense funds is yet another example of Upton Sinclair’s aphorism, “It is difficult to get a man to understand something when his salary depends on his not understanding it.”

Gosztola points out that the reason that Sieradski was so casual about smearing well-established sites and so unapologetic about reputational harm is that they are assumed to lack the resources to take legal action:

The developers also possess a few viewpoints, which may inhibit their ability to develop an extension that is objective and valuable to news readers.

One, Sieradski has no idea how to handle the problem of corporate news media, which publishes “fake news.” Journalist Marcy Wheeler asked Sieradski why “mainstream fake news” was not flagged through this extension. She wondered why “Squawk Box” financial-type news that pushes a made-up “market” narrative is not flagged. Or what about Fox News? Why aren’t they flagged as a “fake news” website?

Sieradski replied, “We’re working on gathering data on all NewsCorp titles,” and looking for “examples of false stories that point to a pattern of intent to mislead the public.”

It is abundantly evident the developers are going through a much more rigorous process to determine whether it is proper to include Fox News than it is going through other independent news media sites that possibly should not be flagged. Of course, their inclusion is much more detrimental to them because unlike corporate news outlets they do not have significant money and resources.

Due to the traditional media’s eagerness to use the “fake news” meme to regain control over what they once called “the discourse,” independent news sites are under the threat of death by a thousand at best uninformed and at worst malicious efforts to silence them. And for a soi-disant progressive like Sieradski to take up this rancid cause is deeply disturbing.

December 7, 2016 Posted by | Deception, Fake News, Full Spectrum Dominance, Mainstream Media, Warmongering | , , | 5 Comments

Corporate Media Backing Clinton Exploits Orlando Shooting for Passive Holocaust Denial

By Robert Barsocchini | Empire Slayer | June 16, 2016

Within hours of the mass shooting in Orlando, the corporate media backing neoconservative favorite Hillary Clinton began, almost unanimously, to exploit the opportunity to passively promote holocaust and genocide denial.

Outlets including the NY Times, CBS News, NBC News, CNN, Newsweek, USA Today, and so on, all referred to the Orlando massacre unequivocally as the worst shooting and/or worst act of gun violence in US history. (CBS News, at the time it was accessed for this piece, was running a large “I’m With Her” ad for Hillary Clinton at the top of its page.) A useful comparison to the corporate assessment might be to imagine if a German civilian gassed a group of people to death and the German press reported it as the worst gassing in German history. After the Paris shooting, the Western press likewise reported that as the worst shooting in recent Parisian history, despite that the Parisian police not long ago massacred some 300 peaceful marchers protesting the French dictatorship in Algeria and dumped their bodies in the river that runs through the city (more info in previous piece).

Native News Online quickly pointed out that the corporate media was almost completely whitewashing “mass killings of American Indians in its reporting” on Orlando. It gave two well-known (as far as these go) examples of worse gun-violence and mass-shootings: some 300 Native men, women, and children, were massacred at Wounded Knee, and 70 to 180 were massacred at Sand Creek.

One commenter on the Native News piece shared that she “wrote to every single news outlet yesterday from the New York Times, the Guardian, the Huffington Post, and Salon to CNN, NBC, and the BBC. I have yet to receive a reply from any of them with the exception of the Oregonian, who changed its language immediately. They also informed me that the Associated Press has just begun to change its language. I’m hoping the Guardian and BBC begin to do the same too.”

Another commenter on the Native News piece gave a short list of some acts of gun-violence, mass-shootings, or mass killings perpetrated in US history, by US forces:

1864 – 300 Yana in California
1863 – 280 Shoshone in Idaho
1861 – 240 Wilakis in California
1860 – 250 Wiyot in California
1859 – 150 Yuki in California
1853 – 450 Tolowa in California
1852 – 150 Wintu in California
1851 – 300 Wintu in California
1850 – 100 Pomo in California
1840 – 140 Comanches in Colorado
1833 – 150 Kiowa in Oklahoma
1813 – 200 Creek in Alabama
1813 – 200 Creek in Alabama
1782 – 100 Lanape in Pennsylvania
1730 – 500 Fox in Illinois
1713 – 1000 Tuscarora in North Carolina
1712 – 1000 Fox in Michigan
1712 – 300 Tuscarora in North Carolina
1704 – 1000 Apalachee killed & 2000 sold into slavery in North Carolina
1676 – 100 Algonquian and Nipmuc in Massachusetts.
1676 – 100 Occaneechi in Virginia
1675 – 340 Narragansett in Rhode Island
1644 – 500 Lanape in New York
1640 – 129 Massapeag in New York
1637 – 700 Pequot in Connecticut
1623 – 200 Powhatan & Pamunkey in Virginia with “poison wine”

Professor David E. Stannard describes one such massacre, wherein US forces weakened a Delaware group of Native men, women, children, and elders through starvation, convinced them it would be in their best interest to disarm, then tied them up and exterminated them and mutilated their dead bodies. Stannard notes that such massacres by US forces “were so numerous and routine that recording them eventually becomes numbing”. (American Holocaust, pp. 125/6)

A couple of corporate news outlets used somewhat more precise language to describe the Orlando massacre, editorializing (while again presenting it as fact) that it was the ‘worst shooting in modern US history’.

However, this still leaves unstated the writer’s opinion of what constitutes ‘modern’. The wounded knee massacre took place in 1898, and the Black Wall Street massacre, for example, in which 55-400 people were murdered and a wealthy black community in Oklahoma ethnically cleansed, took place in 1921. (More examples.)

And, of course, the US has massacred millions of people, many of them with rifles and other types of guns, but also in far worse ways, outside the territory it officially claims, and continues to do so. Obama recently massacred almost a hundred people at one time with what could be viewed as an AR-15 on steroids. Is any of this part of ‘modern US history’? Why or why not? The qualifications are unstated and thus subjective. The vague language from the neoliberal, government-linked corporate outlets may lead readers to believe that all of US history is included in their ‘factual’ statements, and that the US has never massacred more than fifty people anywhere.

In some cases, this impression will have been intentional on the part of the oligarch mouthpiece outlets, which have an interest in fostering a benevolent image of the US to help elites further capture global markets . In others, it will have been a result of conveniently self-aggrandizing ignorance on behalf of the writers and editors – an ignorance that makes an important contribution to their job security.

As some of them partially or belatedly demonstrated, all of the corporate outlets could have easily avoided any holocaust/genocide-denial by calling the shooting the worst by a single civilian on US territory in at least the last thirty years, or any number of other obvious, simple, direct phrasings, which are supposed to be integral to journalism, anyway.

But as John Ralston Saul points out, the neoliberal/neoconservative ideology relies on the ‘whitewashing of memory’. That doesn’t always work, though, especially on survivors of US and Western genocides, which is why, as Ralston Saul further notes, the West and its proxies are behind most of the global murders of writers, who may try to expose facts and evidence that interfere with the West’s historical whitewashing.

Since the Orlando massacre, both Clinton and Trump have called for further escalation of Western aggression in the Middle East.

Robert Barsocchini is an internationally published author who focuses on force dynamics, national and global, and also writes professionally for the film industry. Updates on Twitter.

June 17, 2016 Posted by | Deception, Ethnic Cleansing, Racism, Zionism, Mainstream Media, Warmongering | , , , , , , , | 1 Comment

Law Enforcement Misrepresentation of Orlando Killer’s 911 Call Ignores U.S. Foreign Policy Motivation

By Matt Peppe | Just the Facts | June 14, 2016

In the aftermath of the horrific mass murder at the Pulse nightclub in Orlando over the weekend in which 50 people were killed, media including CNN, USA Today, NPR, NBC News, and CBS News, all reported that the gunman called 911 during his murderous rampage and pledged allegiance to ISIS. None of the journalists writing for any of these news outlets heard the call themselves; they all cite the FBI as their source.

The U.S. government has been engaged in a war against the self-professed Islamic State for the last two years. Their military intervention consists of a bombing campaign against ISIS targets in Iraq and Syria. Hyping the threat members connected to the terror group – or spiritually loyal to it – pose to American citizens is supportive of U.S. foreign policy. If ISIS, or people claiming to act on behalf of ISIS, are a real danger to Americans, it bolsters the notion that the group is a threat to national security and helps justify the government’s military response.

The FBI seems eager to show itself as disrupting ISIS plots in the States. As Adam Johnson has written in FAIR, the FBI has put Americans in contact with informants who claim to represent ISIS and then led the targets to believe they would help the targets join the terrorist organization. The media have then conflated this with an “ISIS Plot” and “ISIS Support,” when no members of ISIS were ever involved in any way.

The FBI’s motivation to portray events in a way that supports U.S. foreign policy, and its history of portraying its actions in a way that has served to hype an ISIS threat should make journalists cautious about taking officials’ words at face value. Especially in the case of a 911 call, which is a public record in Florida, proper journalistic due diligence would be to consult the actual source of the claims being disseminated.

Instead, not a single journalist appears to have done this with Orlando killer Omar Mateen’s 911 call.

On Tuesday, CNN aired interviews of eyewitnesses to the shooting spree who described their harrowing encounters with the gunman inside the club. Patience Carter, who was inside a bathroom stall feet from the gunman when he called 911, said he told the dispatcher that “the reason why he was doing this is because he wants America to stop bombing his country.” (Mateen is a native of the United States, but he was presumably referring to Afghanistan, where both of his parents are from.) She said he then declared that “from now on he pledges his loyalty to ISIS.”

This demonstrates that his primary motive for his terror attack was retaliation for the U.S. aggression in Afghanistan, where nearly 100,000 people have been killed since the illegal U.S. invasion in 2001. His mention of ISIS seems merely adjunct to what he admits was his justification for the attack. His motivation precedes his ideological alignment with ISIS, not the other way around.

Anti-war activists have long argued that overseas military operations endanger not only the populations whose countries are invaded, occupied and bombed, but Americans in the United States who are at risk of terrorist retaliation from people outraged by the death and destruction war inevitably produces to the point of being willing to resort to violence themselves.

Carter’s version of the 911 call reveals a very different picture than the partial one revealed by the FBI and reprinted by each of the largest news organizations. The complete conversation depicts Mateen as indicating that he considered his actions a response to U.S. foreign policy. Of course, the murder of innocent civilians is always reprehensible and can never be justified by claiming they are a response to a state’s military aggression, regardless of how deadly and devastating such military operations are. But it should be predictable that some people will use this rationalization regardless and seek out soft targets in the country whose government they claim to be retaliating against.

The FBI chose to omit Mateen’s professed motive entirely when recounting the 911 call to the media, and merely state that he professed allegiance to ISIS. Perhaps they recognized how putting Mateen’s call in context may lead people to question whether U.S. wars in Afghanistan (and Iraq) raise the terrorist threat at home.

After all, this is not the first time this has happened. The surviving Boston Marathon bomber cited the U.S. wars abroad as his motivation for committing the attack that killed three people and maimed dozens more.

It is not clear whether any journalist even asked to hear the 911 call themselves. But it is clear that they chose to disseminate second-hand information when the primary source should have been easily accessible. If it was not made available (as required by law), the public deserves to know that it was suppressed and be given an explanation why.

Media stenographers parroted government officials’ descriptions of the call, which left out the killer’s professed motivation for his politically motivated attack and failed to put the ISIS claim in any context. Unsurprisingly, their misrepresentation served the government’s policy agenda and avoided having the incident serve as an example of a negative consequence of U.S. foreign policy – one that anti-war dissenters have used in arguing against the wars in Afghanistan and Iraq since the War on Terror was launched more than a decade and a half ago.

June 15, 2016 Posted by | Deception, Mainstream Media, Warmongering, Militarism | , , , , , , , | 1 Comment

Israel Censors Bob Simon’s Report on Palestinian Christians

Al-Manar | April 26, 2012

During Sunday night’s episode of “60 Minutes,” reporter Bob Simon’s story on Arab Christians included a heated confrontation between himself and the Zionist ambassador to the United States Michael Oren.

The “60 Minutes” story tackled the displacement of Palestinian Christians by the Zionist Occupation of the West Bank and East Jerusalem.

Oren also called Simon’s report “outrageous” and “incomprehensible,” and reportedly called Jeff Fager, the chairman of CBS News, before the broadcast and said he had information the “60 Minutes” story was “a hatchet job.” He was concerned that the piece was critical of the Zionist entity and could harm its reputation among American Christians.

In its report, Simon told Americans that there are Palestinian Christians, and the Right wing Zionists have attempted to displace, expropriate and erase the Palestinian nation, and to convince them that Palestinians don’t exist or if they do are enemies of the U.S.

According to the report, when the foe of the US was the Soviet Union, they made the Palestinians Communists. When the foe became al-Qaeda, they made the Palestinians violent fundamentalists. But if some percentage of Palestinians is Christians, then that fact disrupts the propaganda. In fact, millions of Palestinians are descended from the 700,000 or so Palestinians ethnically cleansed by the Israelis from what is now Israel in 1948, of whom about 10 percent were Christian.

The report also mentioned that some Palestinians are Lutherans, Catholics and Episcopalians, establishing a link of commonality between them and Americans, which raised the ire of the entity of occupation because it wants Americans identifying only with the so-called ‘Israelis’, not with Palestinians.

It also told Americans that ‘Israel’ is occupying and colonizing Palestinian land, and it let it slip that Palestinians in the West Bank need a permit to travel to Arab East Jerusalem and are subjected within the West Bank to humiliating check points that turn a 7 mile journey into an all-day ordeal.

Simon’s story allowed Palestinians to speak for themselves as well, and to refute Oren’s anti-Palestinian talking points, where it mentioned a prominent Palestinian businessman and Coca Cola distributor saying that he knew of no Palestinian Christians who were leaving the West Bank and Jerusalem because of Muslims but that rather they were leaving because of the “Israeli Oppression.”

The report allowed the Palestinians to point out that the West Bank now looks like Swiss cheese, with Zionist colonies grabbing the good land and water, and the stateless Palestinians pushed into the holes; and that the way the Israelis built the Separation Wall isolated Bethlehem, Jesus’s birthplace and a city that still is 18% Christian, had made it “an open-air prison.”

It also described the Palestinian Kairos Document, calling for nonviolence, as a peaceful struggle by Palestinians against the Zionist Occupation and land grabs, particularly when it quoted a Zionist scholar putting “Political Judaism” on par with “Political Islam.”

According to sources, news of Simon’s “60 Minutes” report reached the highest governmental levels of the Zionist entity, where a main daily Haaretz reported Tuesday that PM Benjamin Netanyahu and his political adviser Ron Dermer were “fully informed on the affair almost since its start.”

A source told Haaretz that Israel’s unsuccessful attempts to kill the “60 Minutes” report backfired as Oren’s call to Fager became a central part of the story. “We awakened the dead,” the source said.

However, officials in the Prime Minister’s Office disagreed and insisted that their efforts delayed the broadcast and made the final version “softer.”

April 26, 2012 Posted by | Ethnic Cleansing, Racism, Zionism, Illegal Occupation | , , , , , , , | 2 Comments