Aletho News

ΑΛΗΘΩΣ

How NeoCon Billionaire Paul Singer Is Driving the Outsourcing of US Tech Jobs to Israel

By Whitney Webb | MintPress News | June 11, 2019

WASHINGTON — With nearly 6 million Americans unemployed and regular bouts of layoffs in the U.S. tech industry, major American tech companies like Google, Microsoft and Intel Corporation are nonetheless moving key operations, billions in investments, and thousands of jobs to Israel — a trend that has largely escaped media attention or concern from even “America first” politicians. The fact that this massive transfer of investment and jobs has been so overlooked is particularly striking given that it is largely the work of a single leading neoconservative Republican donor who has given millions of dollars to President Donald Trump.

To make matters worse, many of these top tech companies shifting investment and jobs to Israel at record rates continue to collect sizable U.S. government subsidies for their operations while they move critical aspects of their business abroad, continue to layoff thousands of American workers, and struggle to house their growing company branches in Israel. This is particularly troubling in light of the importance of the tech sector to the overall U.S. economy, as it accounts for 7.1 percent of total GDP and 11.6 percent of total private-sector payroll.

Furthermore, many of these companies are hiring members of controversial Israeli companies — known to have spied on Americans, American companies, and U.S. federal agencies — as well as numerous members of Israeli military intelligence as top managers and executives. 

This massive transfer of the American tech industry has largely been the work of one leading Republican donor — billionaire hedge fund manager Paul Singer, who also funds the neoconservative think tank American Enterprise Institute (AEI), the Islamophobic and hawkish think tank Foundation for Defense of Democracies (FDD), the Republican Jewish Coalition (RJC), and also funded the now-defunct Foreign Policy Initiative (FPI).

Singer’s project to bolster Israel’s tech economy at the U.S.’ expense is known as Start-Up Nation Central, which he founded in response to the global Boycott, Divest and Sanctions (BDS) movement that seeks to use nonviolent means to pressure Israel to comply with international law in relation to its treatment of Palestinians.

This project is directly linked to Israeli Prime Minister Benjamin Netanyahu, who in recent years has publicly mentioned that it has been his “deliberate policy” to have former members of Israel’s “military and intelligence units … merge into companies with local partners and foreign partners” in order to make it all but impossible for major corporations and foreign governments to boycott Israel.

In this report, MintPress identifies dozens of former members of an elite Israeli military intelligence unit who now hold top positions at Microsoft, Google and Facebook.

Singer’s nonprofit organization has acted as the vehicle through which Netanyahu’s policy has been realized, via the group’s close connections to the Israeli PM and Singer’s long-time support for Netanyahu and the Likud Party. With deep ties to Netanyahu, the American Israel Public Affairs Committee (AIPAC), and controversial tech companies — like Amdocs — that spied on the American government, this Singer-funded organization has formed a nexus of connections between the public and private sectors of both the American and Israeli economies with the single goal of making Israel the new technology superpower, largely at the expense of the American economy and government, which currently gives $3.2 billion in aid to Israel annually.

Researched and developed in Israel

In recent years, the top U.S. tech companies have been shifting many of their most critical operations, particularly research and development, to one country: Israel. A 2016 report in Business Insider noted that Google, Facebook, Microsoft, Amazon and Apple had all opened up research and development (R&D) centers in recent years, with some of them having as many as three such centers in Israel, a country roughly the size of New Jersey. Other major tech companies that have also opened key operation and research centers in Israel include Sandisk, Nvidia, PayPal, Palantir and Dell. Forbes noted last year that the world’s top 10 tech companies were now “doing mission-critical work in Israel that’s core to their businesses back at HQ.”

Yet, some of these tech giants, particularly those based in the U.S., are heavily investing in their Israeli branches while laying off thousands of American employees, all while receiving millions of dollars in U.S. government subsidies funded by American taxpayers.

For example, Intel Corporation, which is the world’s second largest manufacturer of semiconductor computer chips and is headquartered in California, has long been a major employer in Israel, with over 10,000 employees in the Jewish state. However, earlier this year, Intel announced that it would be investing $11 billion in a new factory in Israel and would receive around $1 billion in an Israeli government grant for that investment. Just a matter of months after Intel announced its major new investment in Israel, it announced a new round of layoffs in the United States.

Yet this is just one recent example of what has become a trend for Intel. In 2018, Intel made public its plan to invest $5 billion in one of its Israeli factories and had invested an additional $15 billion in Israeli-created autonomous driving technology a year prior, creating thousands of Intel jobs in Israel. Notably, over that same time frame, Intel has cut nearly 12,000 jobs in the United States. While this great transfer of investment and jobs was undermining the U.S. economy and hurting American workers, particularly in the tech sector, Intel received over $25 million dollars in subsidies from the U.S. federal government.

A similar phenomenon has been occurring at another U.S.-based tech giant, Microsoft. Beginning in 2014 and continuing into 2018, Microsoft has laid off well over 20,000 employees, most of them Americans, in several different rounds of staff cuts. Over that same time period, Microsoft has been on a hiring spree in Israel, building new campuses and investing billions of dollars annually in its Israel-based research and development center and in other Israeli start-up companies, creating thousands of jobs abroad. In addition, Microsoft has been pumping millions of dollars into technology programs at Israeli universities and institutes, such as the Technion Institute. Over this same time frame, Microsoft has received nearly $197 million in subsidies from the state governments of Washington, Iowa and Virginia.

Though Israeli politicians and tech company executives have praised this dramatic shift as the result of Israel’s tech prowess and growing reputation as a technological innovation hub, much of this dramatic shift has been the work of the Netanyahu-tied Singer’s effort to counter a global movement aimed at boycotting Israel and to make Israel a global “cyber power.”

Start-Up Nation Central and the Neocons

In 2009, a book titled Start Up Nation: The Story of Israel’s Economic Miracle, written by American neoconservative Dan Senor and Jerusalem Post journalist Saul Singer (unrelated to Paul), quickly rose to the New York Times bestseller list for its depiction of Israel as the tech start-up capital of the world. The book — published by the Council on Foreign Relations, where Senor was then serving as Adjunct Senior Fellow — asserts that Israel’s success in producing so many start-up companies resulted from the combination of its liberal immigration laws and its “leverage of the business talents of young people with military experience.”

“The West needs innovation; Israel’s got it,” wrote Senor and Singer. In a post-publication interview with the blog Freakonomics, Senor asserted that service in the Israeli military was crucial to Israel’s tech sector success, stating that:

“Certain units have become technology boot camps, where 18- to 22-year-olds get thrown projects and missions that would make the heads spin of their counterparts in universities or the private sector anywhere else in the world. The Israelis come out of the military not just with hands-on exposure to next-gen technology, but with training in teamwork, mission orientation, leadership, and a desire to continue serving their country by contributing to its tech sector — a source of pride for just about every Israeli.”

The book, in addition to the many accolades it received from the mainstream press, left a lasting impact on top Republican donor Paul Singer, known for funding the most influential neoconservative think tanks in America, as noted above. Paul Singer was so inspired by Senor and Singer’s book that he decided to spend $20 million to fund and create an organization with a similar name. He created the Start-Up Nation Central (SUNC) just three years after the book’s release in 2012.

To achieve his vision, Singer – who is also a top donor to the Republican Party and Trump – tapped Israeli economist Eugene Kandel, who served as Netanyahu’s national economic adviser and chaired the Israeli National Economic Council from 2009 to 2015.

Senor was likely directly involved in the creation of SUNC, as he was then employed by Paul Singer and, with neoconservatives Bill Kristol and Robert Kagan, co-founded the FPI, which Singer had long funded before it closed in 2017. In addition, Dan Senor’s sister, Wendy Singer (unrelated to either Paul or Saul), long-time director of Israel’s AIPAC office, became the organization’s executive director.

SUNC’s management team, in addition to Eugene Kandel and Wendy Singer, includes Guy Hilton as the organization’s general manager. Hilton is a long-time marketing executive at Israeli telecommunications company Amdocs, where he “transformed” the company’s marketing organization. Amdocs was once highly controversial in the United States after it was revealed by a 2001 Fox News investigation that numerous federal agencies had investigated the company, which then had contracts with the 25 largest telephone companies in the country, for its alleged role in an aggressive espionage operation that targeted the U.S. government. Hilton worked at Microsoft prior to joining Amdocs.

Beyond the management team, SUNC’s board of directors includes Paul Singer, Dan Senor and Terry Kassel — who work for Singer at his hedge fund, Elliott Management — and Rapheal Ouzan. Ouzan was an officer in the elite foreign military intelligence unit of Israel, Unit 8200, who co-founded BillGuard the day after he left that unit, which is often compared to the U.S.’ National Security Agency (NSA). Within five months of its founding, BillGuard was backed by funding from PayPal founder Peter Thiel and former CEO of Google, Eric Schmidt. Ouzan is also connected to U.S. tech companies that have greatly expanded their Israeli branches since SUNC’s founding — such as Microsoft, Google, PayPal and Intel, all of which support Ouzan’s non-profit Israel Tech Challenge.

According to reports from the time published in Haaretz and Bloomberg, SUNC was explicitly founded to serve as “a foreign ministry for Israel’s tech industry” and “to strength Israel’s economy” while also aiming to counter the Boycott, Divest and Sanctions (BDS) movement that seeks to use a nonviolent boycott to end the illegal military occupation of the West Bank and Israeli apartheid, as well as the growth of illegal Jewish-only settlements in occupied Palestinian territory.

Since its founding, SUNC has sought to transfer tech jobs from foreign companies to Israel by developing connections and influence with foreign governments and companies so that they “deepen their relationship with Israel’s tech industry.” Though SUNC has since expanded to include other sectors of the Israeli “start-up” economy, its focus has long remained on Israel’s tech, specifically its cybersecurity industry. Foreign investment in this single Israeli industry has grown from $227 million in 2014 to $815 million in 2018.

In addition to its own activities, SUNC appears to be closely linked to a similar organization, sponsored by Coca Cola and Daimler Mercedes Benz, called The Bridge, which also seeks to connect Israeli start-up companies with large international corporations. Indeed, SUNC, according to its website, was actually responsible for Daimler Mercedes Benz’s decision to join The Bridge, thanks to a delegation from the company that SUNC hosted in Israel and the connections made during that visit.

Teaming up with Israel’s Unit 8200

Members of Israel’s signals intelligence Unit 8200 work under a Saudi flag. Photo | Moti Milrod

Notably, SUNC has deep ties to Israel’s military intelligence unit known as Unit 8200 and, true to Start Up Nation’s praise of IDF service as key to Israel’s success, has been instrumental in connecting Unit 8200 alumni with key roles in foreign companies, particularly American tech companies. For instance, Maty Zwaig, a former lieutenant colonel in Unit 8200, is SUNC’s current director of human capital programs, and SUNC’s current manager of strategic programs, Tamar Weiss, is also a former member of the unit.

One particularly glaring connection between SUNC and Unit 8200 can be seen in Inbal Arieli, who served as SUNC’s Vice President of Strategic Partnerships from 2014 to 2017 and continues to serve as a senior adviser to the organization. Arieli, a former lieutenant in Unit 8200, is the founder and head of the 8200 Entrepreneurship and Innovation Support Program (EISP), which was the first start-up accelerator in Israel aimed at harnessing “the vast network and entrepreneurial DNA of [Unit] 8200 alumni” and is currently one of the top company accelerators in Israel. Arieli was the top executive at 8200 EISP while working at SUNC.

Another key connection between SUNC and Unit 8200 is SUNC’s promotion of Team8, a company-creation platform whose CEO and co-founder is Nadav Zafrir, former commander of Unit 8200. In addition to prominently featuring Team8 and Zafrir on the cybersecurity section of its website, SUNC also sponsored a talk by Zafrir and an Israeli government economist at the World Economic Forum, often referred to as “Davos,” that was attended personally by Paul Singer.

Team8’s investors include Google’s Eric Schmidt, Microsoft, and Walmart — and it recently hired former head of the NSA and U.S. Cyber Command, retired Admiral Mike Rogers. Team8 described the decision to hire Rogers as being “instrumental in helping strategize” Team8’s expansion in the United States. However, Jake Williams, a veteran of NSA’s Tailored Access Operations hacking unit, told CyberScoop:

“Rogers is not being brought into this role because of his technical experience. … It’s purely because of his knowledge of classified operations and his ability to influence many in the U.S. government and private-sector contractors.”

In addition to connections to Unit 8200-linked groups like Team8 and 8200 EISP, SUNC also directly collaborates with the IDF in an initiative aimed at preparing young Israeli women to serve in Unit 8200. That initiative, called the CyberGirlz Club, is jointly funded by Israel’s Defense Ministry, SUNC and the Rashi Foundation, the philanthropic organization set up by the Leven family of Perrier-brand water, which has close ties to the Israeli government and IDF.

“Our aim is to bring the girls to this process already skilled, with the knowledge needed to pass the exams for Unit 8200 and serve in the military as programmers,” Zwaig told Israel National News.

Seeding American tech

The connections between SUNC and Unit 8200 are troubling for more than a few reasons, one of which being that Unit 8200, often likened to the U.S.’ NSA, closely coordinates with Israel’s intelligence agency, the Mossad, and is responsible for 90 percent of the intelligence material obtained by the Israeli government, according to its former commander Yair Cohen. Cohen told Forbes in 2016, that “there isn’t a major operation, from the Mossad or any intelligence security agency, that 8200 is not involved in.” For obvious reasons, the fact that an organization founded by an American billionaire is actively promoting the presence of former military intelligence officers in foreign companies, specifically American companies, while also promoting the transfer of jobs and investment to that same country, is very troubling indeed.

Particularly troubling is the fact that, since SUNC’s founding, the number of former Unit 8200 members in top positions in American tech companies has skyrocketed. Based on a non-exhaustive analysis conducted by Mintpress of over 200 LinkedIn accounts of former Israeli military intelligence and intelligence officers in three major tech companies, numerous former Unit 8200 alumni were found to currently hold top managerial or executive positions in Microsoft, Google and Facebook.

At Microsoft, managers for at least 15 of the company’s products and programs — including Microsoft’s lead managers for engineering, product strategy, threat analytics and cloud business intelligence — publicly listed their affiliation with Unit 8200 on their LinkedIn accounts. In addition, the general manager of Microsoft’s Israeli Research and Development Center is also a former member of Unit 8200. In total, of the 200 accounts analyzed, 50 of them currently worked for Microsoft.

Similarly, at Google, 28 former Unit 8200 members at the company were identified from their LinkedIn accounts. Among them are Google’s Engineering Director, its strategic partner manager, two growth marketing leads, its lead technical manager, and six product and program managers, including Google’s manager for trust and safety search.

Facebook also has several Unit 8200 members in prominent positions, though fewer than Google and Microsoft. MintPress identified at least 13 Unit 8200 alumni working for Facebook, including its director of engineering, lead manager for express wi-fi, and technical program manager. Notably, Facebook has spent the last several years collaborating with Israel’s government to censor Israel’s critics.

Of course, there is likely much more influence of Unit 8200 on these companies than this non-exhaustive analysis revealed, given that many of these companies acquired several Israeli start-ups run by and staffed by many Unit 8200 alumni who subsequently went on to found new companies and start-ups a few years or shortly after acquisition. Furthermore, due to the limitations of LinkedIn’s set-up, MintPress was not able to access the complete list of Unit 8200 alumni at these three tech companies, meaning that the eye-opening numbers found were generated by a relatively small sample.

This jump in Unit 8200 members in top positions in tech companies of global importance is actually a policy long promoted by Netanyahu, whose long-time economic adviser is the chief executive at SUNC. During an interview with Fox News last year, Netanyahu was asked by Fox News host Mark Levin if the large growth seen in recent years in Israel’s technology sector was part of Netanyahu’s plan. Netanyahu responded, “That’s very much my plan … It’s a very deliberate policy.” He later added that “Israel had technology because the military, especially military intelligence, produced a lot of capabilities. These incredibly gifted young men and women who come out of the military or the Mossad, they want to start their start-ups.”

Netanyahu further outlined this policy at the 2019 Cybertech conference in Tel Aviv, where he stated that Israel’s emergence as one of the top five “cyber powers” had “required allowing this combination of military intelligence, academia and industry to converge in one place” and that this further required allowing “our graduates of our military and intelligence units to merge into companies with local partners and foreign partners.” The direct tie-ins of SUNC to Netanyahu and the fact that Paul Singer has also been a long-time political donor and backer of Netanyahu suggest that SUNC is a key part of Netanyahu’s policy of placing former military intelligence and intelligence operatives in strategic positions in major technology companies.

Notably, just as SUNC was founded to counter the BDS movement, Netanyahu has asserted that this policy of ensuring Israel’s role as a “cyber power” is aimed at increasing its diplomatic power and specifically undermining BDS as well as the United Nations, which has repeatedly condemned Israel’s government for war crimes and violations of international law in relation to the Palestinians.

Building the bi-national surveillance state

Top U.S. tech companies have filled top positions with former members of Israeli military intelligence and moved strategic and critical operations to Israel, boosting Israel’s economy at the expense of America’s, and SUNC’s role in this marked shift merits scrutiny.

A powerful American billionaire has built an influential organization with deep connections to the U.S.-Israel lobby (AIPAC), an Israeli company that has been repeatedly investigated for spying on the U.S. government (Amdocs), and the elite Israeli military intelligence unit (Unit 8200) that has used its influential connections to the U.S. government and the U.S. private sector to dramatically shift the operations and make-up of major companies in a critical sector of the U.S. economy.

Further consider that U.S. government documents leaked by Edward Snowden have flagged Israel as “leading threat” to the infrastructure of U.S. financial and banking institutions, which use much of the software produced by these top tech companies, and have also flagged Israel as a top espionage threat. One U.S. government document cited Israel as the third most aggressive intelligence service against the U.S. behind Russia and China. Thus, Paul Singer’s pet project in Start-Up Nation Central has undermined not only the U.S. economy but arguably U.S. national security as well.

This concern is further exacerbated by the deep ties connecting top tech companies like Microsoft and Google to the U.S. military. Microsoft and Google are both key military contractors — Microsoft in particular, given that it is set to win a lucrative contract for the Pentagon’s cloud management and has partnered with the Department of Defense to produce a “secure” election system known as ElectionGuard that is set to be implemented in some U.S. states for the 2020 general election.

Whitney Webb is a MintPress News journalist based in Chile. She has contributed to several independent media outlets including Global Research, EcoWatch, the Ron Paul Institute and 21st Century Wire, among others. She has made several radio and television appearances and is the 2019 winner of the Serena Shim Award for Uncompromised Integrity in Journalism.

June 11, 2019 Posted by | Economics, Ethnic Cleansing, Racism, Zionism | , , , , , , , , , , | 2 Comments

How the U.S. Weaponizes “Internet Freedom”

By Julianne Tveten | American Herald Tribune | June 8, 2019

Several weeks ago, Edward Snowden took to Twitter to weigh in on the recent coup attempt in Venezuela. “Big: Venezuela’s opposition leader just launched a coup,” he wrote. “Reports coming in that the government is now blocking access to social media in response. Any interference with the right of the people to communicate freely must be condemned.”

Snowden, of course, was referring to the U.S.-backed attempt to oust the elected Venezuelan President Nicolás Maduro and install right-wing opposition party member Juan Guaidó. Yet Snowden’s concerns didn’t revolve around the damages visited upon Venezuela. Instead, as his critics observed, his focus on Internet access revealed a decidedly libertarian set of values: Sure, a potential (albeit failing) coup was in progress, hurling the Venezuelan people into the throes of imperialist upheaval—but wouldn’t someone think of the Internet access?

This time, it seemed Snowden, who was catapulted into international recognition for exposing the National Security Agency (NSA)’s surveillance abuses, was doing the U.S. government’s bidding. For decades, U.S. institutions have weaponized the arbitrary notion of “Internet freedom” for political gain. Their goal: to villainize “enemy states” in order to sustain U.S. hegemony, technologically and otherwise.

By various accounts, the notion of “Internet freedom” entered U.S. policy during the Clinton Administration, in the early stages of the Internet’s commercialization. In 1997, then-President Bill Clinton and Vice President Al Gore argued that “governments must adopt a non-regulatory, market-oriented approach to electronic commerce” and warned against those that “will impose extensive regulations on the Internet and electronic commerce.” Stating that the “private sector should lead,” their proposal envisaged the Internet, first and foremost, as a global marketplace governed by laissez-faire individualism.

Hillary Clinton cemented this concept in a 2010 speech, insisting that the United States would confront governments that implemented online “censorship,” including, but not limited to, China, Iran, and North Korea—countries, like Venezuela, that have worked to develop infrastructures and economies independent of the U.S.’s capitalist framework. Clinton also touted the role of the private sector in such an effort. Advocating for an Internet defined by “free expression” and, most important, free markets, she lauded the Global Network Initiative, an “anti-censorship” collaboration among tech firms like Microsoft, Google, Yahoo, and various NGOs.

The Clintons’ Internet-policy postures have persisted into the present day. The U.S. nonprofit and Global Network Initiative member NetBlocks, for example, regularly issues reports warning of limited Internet access throughout the world. Among its most commonly cited countries, by far, is Venezuela. Over the course of the attempted Venezuelan coup, which began in January, NetBlocks has published dozens of reports of restrictions to access of various U.S. web services, including YouTube, Google, and Bing. Instead of offering geopolitical context to explain why a country might be forced to limit access, these reports offer an alternative narrative: A beleaguered country’s temporary (if exaggerated) shutdowns of a few websites, rather than a U.S.-led coup, are the real problem.

Think tank Freedom House, which is significantly funded by the U.S. government, offers similar assessments. According to its 2018 “Freedom on the Net” report, “digital authoritarianism” is on the rise, thanks largely to China, a country that has long curbed access to—and thus constrained the market and influence of—U.S. tech platforms. Not coincidentally, Freedom House has ranked China the least “free” country for four consecutive years, with Syria, Iran, and Cuba closely trailing. Meanwhile, Freedom House, as well as NetBlocks, have been consistent sources for U.S. corporate media, including the Washington Post and the New York Times.

For all of their admonitions about censorship abroad, these “watchdogs” have done little to underscore the censorship committed by U.S. tech companies. Freedom House concedes that “Internet freedom” has declined in the United States; the reasons it provides relate to such valid and significant issues as network monopolies, the FCC’s assault on net neutrality, and the “digital divide.” Nowhere, however, does Freedom House acknowledge Google’s and U.S. social media’s inveterate silencing of left-leaning media and organizations, nor the punitive surveillance activists disproportionately face. Instead, the think tank routinely deems the U.S. Internetfree.”

This dovetails with another cause of “free Internet” acolytes: U.S. access to other countries’ data. Various countries, such as China, Russia, and Vietnam, have required storage of their data on devices within their own countries’ borders—a policy known as data localization. An assertion of sovereignty, data localization is often in direct opposition to the vision of an “open” Internet outlined by the Clintons. In other words, as it blocks foreign companies’ and governments’ access to international digital data, it wrests control of the Internet from the U.S. Right on cue, Freedom House’s 2018 report condemned China, Russia, Vietnam, and other countries’ decisions to institute data localization.

An illustrative scenario took place in 2013. In the wake of revelations that part of the NSA’s surveillance program included spying on Brazil, Brazil’s then-president Dilma Rousseff proposed a shift toward data localization. Aptly enough, former Google executive Eric Schmidt fretted not long before Rousseff’s proposal that data localization—which would corrode his company’s profits—might lead to a “balkanized Internet”:

“The real danger [from] the publicity about all of this is that other countries will begin to put very serious encryption – we use the term ‘balkanization’ in general – to essentially split the Internet and that the Internet’s going to be much more country specific. That would be a very bad thing, it would really break the way the Internet works, and I think that’s what I worry about.”

Schmidt’s concerns echo those of the Clintons. A “free” and “open” “global” Internet, they claim, is a democratic forum, the “great equalizer”; all countries will thereby be more enlightened for connecting to Google, Microsoft, Amazon, and other multibillion-dollar U.S. corporations with military contracts. This rationale permeates corporate media and think tanks, both of which characterize a “balkanized Internet” as a civilizational regression. What these proclamations omit is the fact that there are reasons some countries don’t agree with the U.S.’s digital prescriptions. The Internet doesn’t exist in a political vacuum; it’s an extension of geopolitical relations and all of the iniquities that accompany them.

These fearmongering editorials and reports will continue, invoking imperialism’s dog whistles: “censorship,” “authoritarianism,” and other affronts to putative “freedom.” Yet these are only a problem to those who would believe that the U.S.’s superpower status is some sort of good. Vulnerable countries’ efforts to defend themselves from the scourge of exploitation, in any way they see fit, aren’t a pity or a threat; they’re a liberatory necessity. No matter what the U.S. insists, there are plenty of places—digital and physical—where its capitalist metrics of “freedom” simply don’t belong.


Julianne Tveten’s work has appeared at In These TimesFairness & Accuracy In Reporting, The NationPacifica Radio and elsewhere.

June 8, 2019 Posted by | Deception | , , | Leave a comment

People Who Support Internet Censorship Are Infantile Narcissists

By Caitlin Johnstone | June 7, 2019

As of this writing, journalist Ford Fischer is still completely demonetized on YouTube as the result of a new set of rules that were put in place because of some doofy Twitter drama between some unfunny asshole named Steven Crowder and some infantile narcissist who thinks the world revolves around his opinions named Carlos Maza. It remains an unknown if Fischer will ever be restored to an important source of income around which he has built his livelihood.

Fischer often covers white supremacist rallies and counter-protests, and his channel was demonetized within minutes of YouTube’s new rules against hate speech going into effect because some of his content, as you’d expect, includes white supremacists saying and doing white supremacist things. Maza, a Vox reporter who launched a viral Twitter campaign to have Crowder removed from YouTube for making homophobic and bigoted comments about him on his channel, expressed concern over Fischer’s financial censorship.

“What’s happening to Ford is fucking awful,” Maza tweeted yesterday. “He’s a good journalist doing important work. I don’t understand how YouTube is still so bad at this. How can they not differentiate between white supremacist content and good faith reporting on white supremacy?”

I say that Maza is an infantile narcissist who thinks the world revolves around his opinions because it genuinely seems to have surprised him that good people would get harmed in the crossfire of his censorship campaign.

I mean, what did he think was going to happen? Did he think some soulless, multibillion-dollar Silicon Valley corporation was going to display company-wide wisdom and woke insightfulness while implementing his agenda to censor obnoxious voices? Did he imagine that YouTube executives were going to sit down with him over a cup of coffee and go down a list with him to get his personal opinion of who should and should not be censored?

Think about it. How narcissistic do you have to be to assume that a vast corporation is going to use your exact personal perceptual filters while determining who should and should not be censored for oafish behavior? How incapable of understanding the existence of other points of view must you be to believe it’s reasonable to expect that a giant, sweeping censorship campaign will exercise surgical precision which aligns perfectly with your own exact personal values system? How arrogant and self-centered must you be to demand pro-censorship reforms throughout an enormous Google-owned platform, then whine that they’re not implementing your censorship desires correctly?

This is the same staggering degree of cloistered, dim-eyed narcissism that leads people to support Julian Assange’s persecution on the grounds that he’s “not a journalist”. These egocentric dolts sincerely seem to believe that the US government is going to prosecute Assange for unauthorized publications about US war crimes, then when it comes time to imprison the next Assange the US Attorney General is going to show up on their doorstep to ask them for their opinion as to whether the next target is or is not a real journalist. Obviously the power-serving agenda that you are helping to manufacture consent for is not going to be guided by your personal set of opinions, you fucking moron.

The fact that other people aren’t going to see and interpret information the same way as you do is something Carlos Maza and the thousands of people who’ve supported his pro-censorship campaign should have learned as small children. Understanding that the world doesn’t revolve around you and your wants and desires is a basic stage in childhood development. People who believe Silicon Valley tech giants can implement censorship in a way that is wise and beneficent are still basically toddlers in this respect. One wonders if they still interrupt their mother’s important conversations with demands for attention and apple juice.

Ford Fischer was not the first good guy to get caught in the crossfire of internet censorship, and he will not be the last. In addition to the way unexpected interpretations of what constitutes hate speech can lead to important voices losing their platforms or being unable to make a living doing what they do, the new rules appear to contain a troubling new escalation that could see skeptics of legitimate military false flags completely censored.

“Finally, we will remove content denying that well-documented violent events, like the Holocaust or the shooting at Sandy Hook Elementary, took place,” reads a single sentence in the official YouTube blog about its new rules.

The sentence appears almost as an aside, without any elaboration or further information added, and at first glance it reads innocuously enough. No Holocaust deniers or Sandy Hook false flag videos? Okay, got it. I personally am not a denier of either of those events, so this couldn’t possibly affect me personally, right?

Wrong. YouTube does not say that it will just be censoring Holocaust deniers and Sandy Hook shooting deniers, it says it will “remove content denying that well-documented violent events, like the Holocaust or the shooting at Sandy Hook Elementary, took place.”

So what does this mean? Where exactly is the line drawn? If you are not an infantilized narcissist, you will not assume that YouTube intends to implement this guideline in the same way you would. It is very possible that it will include skeptics of violent events which the entire political/media class agrees were perpetrated by enemies of the US-centralized power alliance, which just so happen to manufacture support for increased aggressions against those nations.

Would the new rules end up forbidding, for example, this excellent YouTube video animation explaining how a leaked OPCW report disputes the official narrative about an alleged chemical attack in Douma, Syria last year? If you are not making the assumption that YouTube will be implementing its censorship using your own personal values system, there is no reason to assume it wouldn’t. After all, the official narrative that dozens of civilians were killed by the Assad government dropping chlorine cylinders through rooftops is the mainstream consensus narrative maintained by all respected US officials and “authoritative” news outlets.

This is a perfect example of a very real possibility that could be a disastrous consequence of increased internet censorship. It is a known fact that the US government has an extensive history of using false flags to manufacture consent for war, from the USS Liberty to the Gulf of Tonkin to the false Nayirah testimony about removing babies from incubators to the WMD narrative in Iraq. These new rules could easily serve as a narrative control device preventing critical discussions about suspicious acts of violence which have already happened, and which happen in the future.

Consider the fact that Google, which owns YouTube, has had ties to the CIA and the NSA from its very inception, is known to have a cozy relationship with the NSA, and has served US intelligence community narrative control agendas by tweaking its algorithms to deliberately hide dissenting alternative media outlets. Consider this, then ask yourself this question: do you trust this company to make wise and beneficent distinctions when it comes to censoring public conversations?

In a corporatist system of government which draws no meaningful distinction between corporate power and state power, corporate censorship is state censorship. Only someone who believes that giant Silicon Valley corporations would implement censorship according to their own personal values system could ever support giving these oligarchic establishments that kind of power. And if you believe that, it’s because you never really grew up.

June 7, 2019 Posted by | Civil Liberties, False Flag Terrorism, Full Spectrum Dominance | , , | Leave a comment

Israel and US disputed intelligence for assassination targets

Lebanese men inspect the damage done to their homes after Israel carried out attacks in Beirut, Lebanon on 22 July 2006 [PATRICK BAZ/AFP/Getty Images]

Lebanese men inspect the damage done to their homes following Israel’s invasion of Lebanon in 2006 [PATRICK BAZ/AFP/Getty Images]
MEMO | May 30, 2019

Leaked documents published by whistle-blower Edward Snowden have exposed a deep rift between Israeli intelligence officials and their counterparts in the US National Security Agency (NSA) over the sharing of intelligence which the Israelis requested to carry out assassinations during the 2006 invasion of Lebanon.

Details of the rift were laid out in the NSA’s internal newsletter known as SIDtoday under the heading “The Israel-Hizballah [sic] Crisis — Perspectives from an Acting SLO Tel Aviv”. In the document, an American liaison officer, who is tasked with managing relations with counterparts in Israel, recounted a dispute with the Israelis over intelligence that was to be used for “targeted killings”.

The Israeli demand, the US liaison wrote, “centred on requests for time sensitive tasking, threat warning, including tactical ELINT” — electronic intelligence — “and receipt of geolocational information on Hizballah elements.”

“The latter request was particularly problematic,” he continued, adding that he “had several late-night, sometimes tense, discussions with ISNU,” the elite Israeli equivalent of the NSA. The US official rejected the demand, and said that he provided details of “NSA’s legal prohibition on providing information that could be used in targeted killings.”

The acting SLO officer pointed out that, “Even with his full understanding of the US statutes, [ISNU Commander] BG Harari sought assistance from NSA for an exemption to this legal policy. To ISNU, this prohibition was contrary not only to supporting Israel in its fight against Hizballah but overall, to support the US Global War on Terrorism.”

The account, published by The Intercept — which has released four years’ worth of SIDdtoday material in batches — goes on to suggest that the NSA ultimately reached a compromise with the Israelis by working with the Office of the Director of National Intelligence (ODNI), and that in the end it was the Israeli team that defined the parameters and methods of what could and could not be shared with them.   

According to The Intercept, the episode recounted by the US liaison officer raises “questions of what intelligence the United States can legally share with a foreign government.” This, it said, is a “notoriously murky” area.

READ ALSO:

Israel assassinates more people than any Western country, concludes new book

May 30, 2019 Posted by | Timeless or most popular, War Crimes | , , , , | 5 Comments

US City of Baltimore Under Attack by NSA Cyber Weapon – Report

Sputnik – 26.05.2019

The cyber weapon was developed by the US tech spying agency to break into foreign computers, but now the US itself is under attack by the malware, and tech experts say it’s the handiwork of the NSA.

Guess which list unites North Korea, Iran, China, Russia, Israel and the United States? These are all the nations that have not signed the Paris Call for Trust and Security in Cyberspace — Emmanuel’s Macron’s effort to stop cyber-attacks in peacetime.

The US’s National Security Agency (NSA), often portrayed in the media as the most technologically advanced intelligence agency in the world, and routinely resorts to hacking and cyber-attacks in order to steal the information they need. To do so, tech geniuses on government payrolls write “tools” — malware programs designed specifically to strike at vulnerabilities found in operational systems, including the US-made Windows OS family.

And then these programs get leaked.

In 2017, an unidentified group of hackers named Shadow Brokers published EternalBlue — NSA-made very powerful program capable of taking control of computers run on the Windows operational system. Anonymous NSA operators, cited by The New York Times, say it took the agency a year to find a flaw in Microsoft security to build the malware upon. Needless to say, once the flaw was discovered, NSA did not go out of its way to inform the software giant about it. In fact, it was only after the malware was published online that they contacted Microsoft and told them about the vulnerability.

Now the NSA-written malware is rampaging Baltimore, Maryland. The exact geography of the affected computers is undisclosed as Microsoft is trying to keep the lid on the outbreak, but it is likely that other cities were affected as well, the Times report says.

The malware is capable of paralyzing hospitals, airports, rail and shipping operators, ATMs and factories. Local US governments that use aged software and hardware are particularly vulnerable to EternalBlue attacks, according to the Times.

On 7 May, Baltimore city workers were hit with a classic ransomware attack. The malicious software locked the workers out of their computers and displayed a message written in remarkably poor English.

“We’re watching you for days and we’ve worked on your systems to gain full access to your company and bypass all of your protections,” the note on the screen warned against calling the FBI and demanded $100,000 in Bitcoin as ransom.

“We won’t talk more, all we know is MONEY!” the note said. “Hurry up! Tik Tak, Tik Tak, Tik Tak!”

According to The Baltimore Sun report, poor spelling does not necessarily indicate a foreign attacker: domestic hackers use it to deceive both victims and investigators.

Earlier in February, Allentown, Pennsylvania was also hit with an EternalBlue-based attack. It cost the city $1 million to remedy and $400,000 for new defences, according to the Times. In September, the malware hit San Antonio, Texas, locking the local sheriff’s office.

The Times reported that EternalBlue has become the favourite tool of the trade for government hackers. The 2016 WannaCry attack, attributed to North Korea and 2017 NotPetya attack, blamed on Russia, is said to be all based on EternalBlue. Iran has been accused of hacking airline networks in the Middle East, and China is said to have targeted Middle Eastern governments using the same tool.

The NSA tries to deflect flak for the Shadow Brokers leak and release of EternalBlue in the world, making an analogy with a Toyota truck — initially designed for peaceful use but converted by Middle Eastern militants into a weapon of war. Microsoft officials reject that analogy, saying EternalBlue was designed as a weapon from the start.

“These exploits are developed and kept secret by governments for the express purpose of using them as weapons or espionage tools. They’re inherently dangerous,” says Tom Burt, Microsoft’s Vice President of Customer Security and Trust. “When someone takes that, they’re not ‘strapping a bomb’ to it. It’s already a bomb.”

May 26, 2019 Posted by | Deception, Militarism | , | Leave a comment

Microsoft’s ElectionGuard a Trojan Horse for a Military-Industrial Takeover of US Elections

By Whitney Webb | MintPress News | May 24, 2019

Earlier this month, tech giant Microsoft announced its solution to “protect” American elections from interference, which it has named “ElectionGuard.” The election technology is already set to be adopted by half of voting machine manufacturers and some state governments for the 2020 general election. Though it has been heavily promoted by the mainstream media in recent weeks, none of those reports have disclosed that ElectionGuard has several glaring conflicts of interest that greatly undermine its claim aimed at protecting U.S. democracy.

In this investigation, MintPress will reveal how ElectionGuard was developed by companies with deep ties to the U.S. defense and intelligence communities and Israeli military intelligence, as well as the fact that it is far from clear that the technology would prevent foreign or domestic interference with, or the manipulation of, vote totals or other aspects of American election systems.

Election forensics analyst and author Jonathan Simon as well as investigative journalist Yasha Levine, who has written extensively on how the military has long sought to weaponize public technologies including the internet, were consulted for their views on ElectionGuard, its connections to the military-industrial complex and the implication of those connections for American democracy as part of this investigation. 

In January, MintPress published an exposé that later went viral on a news-rating company known as Newsguard. Officially aimed at fighting “fake news,” the company’s many connections to U.S. intelligence, a top neoconservative think tank, and self-admitted government propagandists revealed its real intention was to promote corporate media over independent alternatives.

Newsguard was among the first initiatives that comprise Microsoft’s “Defending Democracy” program, a program that the tech giant created under the auspices of protecting American “democratic processes from cyber-enabled interference [which] have become a critical concern.” Through its partnership with Microsoft, Newsguard has been installed in public libraries and universities throughout the country, even while private-sector companies have continued to avoid adopting the problematic browser plug-in.

Now, Microsoft is promoting a new “Defending Democracy” initiative — one equally ridden with glaring conflicts of interest — that threatens American democracy in ways Newsguard never could. ElectionGuard is touted by Microsoft as a system that aims to “make voting secure, more accessible, and more efficient anywhere it’s used in the United States or in democratic nations around the world.” It has since been heavily promoted by mainstream and U.S. government-funded media outlets in preparation for its use in the 2020 general election.

However, according to Jonathan Simon, election forensic analyst and author of CODE RED: Computerized Elections and the War on American Democracy, this public relations campaign is likely just cover for more insider control over U.S. elections. “It’s encouraging that after close to two decades of ignoring the security issues with computerized voting, there’s suddenly a scramble to protect our next election that suggests those issues are finally being taken seriously,” Simon told MintPress. “Unfortunately the proposed solution is just more computerization and complexity — which translates to more control by experts and insiders, though of course that is not part of the PR campaign.”

As to the likely identity of those insiders, the fact that Microsoft’s ElectionGuard was developed in tandem with a private military and intelligence contractor whose only investor is the U.S. Department of Defense offers a troubling clue. As a consequence, ElectionGuard’s promise to “secure” elections is dubious, especially given that Microsoft itself is a U.S. military contractor. Furthermore, amid the unfolding scandal of Israeli meddling in foreign elections, Microsoft’s growing ties to Israeli military intelligence and private Israeli cybersecurity firms raise even more concerns about whether ElectionGuard’s real purpose is to “secure” American elections for candidates friendly to the establishment, especially the military-industrial complex.

Explaining ElectionGuard

According to an announcement made in early May by Tom Burt, Microsoft’s Vice President for Customer Security and Trust, ElectionGuard is “a free open-source software development kit (SDK)” that “will make voting secure, more accessible, and more efficient anywhere it’s used.” Burt’s statement further claims that the ElectionGuard system “will enable end-to-end verification of elections, open results to third-party organizations for secure validation, and allow individual voters to confirm their votes were correctly counted.” While ElectionGuard may appear to concern itself only with electronic ballots, the announcement states that the system “is designed to work with systems that use paper ballots” through the use of an optical scanner.

Notably, Microsoft chose to announce ElectionGuard only after it had already partnered “with major election technology suppliers who are exploring the integration of ElectionGuard into their voting systems.” Burt further noted that Microsoft now has “partnerships with election technology suppliers responsible for more than half of the voting machines sold in the U.S.” ElectionGuard partner companies include Democracy Live, Election Systems & Software, Hart InterCivic, BPro, MicroVote, and VotingWorks.

Another interesting, and deeply troubling, admission in the Microsoft announcement is that Microsoft’s ElectionGuard development partner, the Portland-based cybersecurity firm Galois, “recently received $10 million in funding from the Pentagon’s Defense Advanced Research Projects Agency (DARPA) to build a demonstration voting system to help evaluate secure hardware DARPA researchers are developing as part of a separate DARPA program.”

Microsoft’s announcement then notes that “the agency views ensuring the integrity and security of the election process as a critical national security concern and plans to implement the ElectionGuard SDK as part of their effort to enable an end-to-end verifiable component in future versions of their demonstration voting system.”

As deeply troubling as DARPA’s $10 million indirect investment in ElectionGuard may seem, it is merely scratching the surface, as Galois itself is essentially an extension of DARPA in the private cybersecurity industry.

The “private” company whose only investor is the Pentagon

Founded in 1999 by John Launchbury, Galois quickly became close to numerous government agencies that now – according to the Galois website – form the vast majority of its clientele. In fact, Galois currently only lists the following U.S. government agencies in its “clients” section: DARPA, the Department of Defense, the Department of Energy, the Department of Homeland Security, “Intelligence Community” (i.e., CIA, NSA, etc.) and NASA. However, other clients of Galois include top U.S. weapons manufacturer General Dynamics. Galois’ stated focus as a company is research and development in advanced computer science, with an emphasis on securing critical systems and cybersecurity. It also dabbles in artificial intelligence, human-computer interaction, and machine learning.

Though it describes itself as “a privately held U.S.-owned and -operated company,” public records indicate that Galois’ only investors are DARPA and the Office of Naval Research (ONR), both of which are divisions of the Department of Defense. In other words, while “officially” a private company, its only investor is the U.S. government, more specifically the Pentagon.

However, the company’s connections to DARPA go even further. The company’s founder and chief scientist John Launchbury, left Galois in 2014 to become program manager and subsequently the director of DARPA’s Information Innovation Office, which deals with “nation-scale investments in cybersecurity and artificial intelligence.” In 2017, he left DARPA and went back to work at Galois as the company’s chief scientist. DARPA’s Information Innovation Office’s official purpose is to develop advanced technology for issues of national security interest, but it also focuses on enhancing “human/machine partnership.”

A Galois spin-off company called Free & Fair, which develops election technology, partnered with Microsoft to produce ElectionGuard. Free & Fair’s website lists its partners as DARPA, Microsoft, voting machine manufacturer VotingWorks, vote tallying software developer Verificatum, the state government of Colorado, and the OSET (Open Source Election Technology) Institute. VotingWorks is a “non-profit” voting machine manufacturer founded by a former Mozilla director of engineering and closely affiliated with the Center for Democracy and Technology (CDT). In addition to Colorado, other states like Minnesota have partnered with Microsoft’s “Defending Democracy” program, but it is unclear if they have adopted or plan to adopt ElectionGuard as a consequence of that partnership.

According to the CDT’s announcement of VotingWorks’ launch:

CDT will serve as a home for VotingWorks until it becomes its own non-profit entity. This partnership means VotingWorks is working closely with the CDT’s experienced team to rapidly ramp up operations and begin in earnest the development of affordable, secure, open-source voting machines for use in US public elections.”

The president and CEO of CDT is Nuala O’Connor, who was Amazon’s Vice President for Compliance and Customer Trust before becoming CDT president. O’Connor was also formerly chief privacy officer of the U.S. Department of Homeland Security and has also worked at General Electric and the U.S. Department of Commerce.

CDT’s board includes former Deputy Intellectual Property Enforcement Coordinator for the White House under Obama and current Principal Counsel at Apple Philippa Scarlett; Microsoft’s corporate vice president, Julie Brill; and Mozilla’s vice president of global policy, Alan Davidson. More troubling, however, is its advisory council, which includes representatives of RAND Corporation, Walmart, Verizon, the Charles Koch Institute, Facebook and the American Enterprise Institute (AEI). MintPress readers are likely familiar with AEI, one of the country’s most notorious neoconservative think tanks, known for employing John Bolton and Paul Wolfowitz, among others. One of Newsguard’s co-founders, Louis Gordon Crovitz, is also affiliated with the AEI.

Another partner of Galois’ Free & Fair is the Open Source Election Technology Institute (OSET Institute, or OSETI), whose flagship initiative is called “TrustTheVote.” One of OSETI’s co-founders and its current CTO is E. John Sebes, who has previously done work for DARPA and DHS. OSETI’s strategic board of advisors includes Chris Barr of the John S. and James L. Knight Foundation, which is a top investor in Newsguard; former Oregon Secretary of State Phil Keisling; former Deputy Director of the NSA William Cromwell; former head of DHS’ Cybersecurity Directorate and former DARPA project manager Doug Maughan; and Norm Ornstein of the neoconservative American Enterprise Institute and co-director of the AEI-Brookings Election Reform Project.

Aside from the numerous links to major corporations, government agencies and neoconservative think tanks, of particular concern to Free & Fair’s mission to develop “secure” election technology are its connections to DHS. This is because, before, during and after the 2016 election, DHS was caught attempting to hack into state electoral systems in at least three states — Georgia, Indiana and Idaho — with similar accusations also being made in Kentucky and West Virginia. In Indiana’s case, the DHS’ attempted hacks occurred nearly 15,000 times over a 46 day period. In an official answer to Georgia’s claim the DHS had tried to penetrate its electoral system’s firewall, DHS which initially denied being behind the attempted hack, later responded that the attempted breach was “legitimate business” aimed at “verifying a professional license administered by the state.” Some of the states targeted by DHS had turned down the department’s offer to “shore up” election systems prior to the 2016 election.

Compare this to the alleged Russian hacking into state electoral systems, which – to date – includes only the claim from the FBI that hackers alleged to be affiliated with Russian military intelligence penetrated voter registration data in two counties in Florida. That alleged hack, the details of which remain classified and for which no evidence of it even happening has been made publicly available, did not result in any alterations to data or other manipulation of those systems, per FBI officials. The DHS, in contrast, attempted to hack into the systems, not of individual counties, but entire states and acknowledged that it did so, even though they chose not to use the work “hack” and defended their activity. While focusing on foreign — and especially Russian — interference may make for a more patriotic story, the dangers posed by domestic actors with at least as great a stake in U.S. election outcomes appear to have been grossly underestimated and virtually ignored by the media.

Free & Fair’s partnerships with groups tied to DHS seem to further undermine its stated mission of providing secure and trustworthy election technology, in addition to its parent company’s deep ties to the Department of Defense, especially DARPA.

Russian-American investigative journalist, and author of Surveillance Valley: The Secret Military History of the Internet, Yasha Levine explained to MintPress why DARPA is likely interested in U.S. election system software like ElectionGuard and why the agency’s interest is dangerous for American democracy:

Election systems are now being increasingly seen as a theater for warfare between competing nation states. So, if you are DARPAand your reason for existence is to create hi-tech weapons for the future, then you are going to be looking at electronic voting systems as a theater of war where the country could be attacked by a foreign adversary. That explains why DARPA is involved.

But DARPA and some of these companies involved can also be seen as foes of Americans’ popular will… We can hypothesize about what’s really going on and what their intentions are, but clearly the Pentagon R&D Lab for war should not be anywhere near America’s electoral system because it represents a huge and powerful and unaccountable force in the American political system whose interests often run counter to democracy.

The fact that we are handing over the keys of American democracy to the military-industrial complex — it’s like giving the keys to the henhouse to a fox and saying, ‘here come in and take whatever you want.’ It’s obviously dangerous.”

From mind control to vote control?

It’s worth briefly describing why DARPA’s role at Galois is of concern. This stems mainly from the fact that DARPA is currently developing Orwellian and nightmarish “Terminator” technologies — including efforts to implant chips into soldiers’ brains, replace most human soldiers with robot soldiers, and create killer “Terminator” robots — and autonomous artificial-intelligence targeting systems that will use social media to identify potential targets.

In 2015, Michael Goldblatt — then-director of the DARPA subdivision Defense Sciences Office (DSO), which oversees the “super soldier” program — told journalist Annie Jacobsen that he saw no difference between “having a chip in your brain that could help control your thoughts” and “a cochlear implant that helps the deaf hear.” When pressed about the unintended consequences of such technology, Goldblatt stated that “there are unintended consequences for everything.”

It goes without saying that the fact that an institution currently developing what essentially amounts to mind-control technology, and that also sees nothing wrong with such technology, has suddenly become so interested in creating and funding with millions of dollars a “free, fair and secure” election system to protect American democracy from interference, is beyond odd and suggests an ulterior motive.

Similarly, Microsoft’s claim that it “will not charge for using ElectionGuard and will not profit from partnering with election technology suppliers that incorporate it into their products” should also raise eyebrows. Considering that Microsoft has a long history of predatory practices, including price gouging for its OneCare security software, its offering of ElectionGuard software free of charge is tellingly out of step for the tech giant and suggests an ulterior motive behind Microsoft’s recent philanthropic interest in “defending democracy.”

In addition, Microsoft’s dual role as a major technology company and a contractor for both the U.S. military and the U.S. intelligence community should also raise red flags. Indeed, Microsoft has made it abundantly clear that it plans to forge ever closer ties with the U.S. government, especially after Microsoft President Brad Smith announced last December that Microsoft is “going to provide the US military with access to the best technology … all the technology we create. Full stop.” A month prior to that statement, Microsoft secured a $480 million contract with the Pentagon to provide the U.S. military with its HoloLens technology.

This close relationship that Microsoft is building with the Pentagon may explain the company’s ulterior motive in creating and promoting ElectionGuard, as promoting the largely DARPA-funded election technology could help improve Microsoft’s chances in its current bid for a $10 billion cloud services contract with the Pentagon.

Furthermore, given the numerous corporate connections as well as the connections to the AEI, it could be argued that Microsoft and Galois’ intimate involvement in this system could be to help “guard” elections from candidates who threaten to regulate or rein in their industries, particularly the military-industrial complex. Of course, the claim that ElectionGuard is “open source” is meant to mitigate such speculation, as the open-source nature of the technology ostensibly means that no discrete code is hidden that could be used to manipulate results. However, as will be shown shortly, the fact that a technology is open-source does not necessarily mean that the data that passes through that technology is not open to manipulation from a third party.

ElectionGuard isn’t immune to manipulation

Microsoft’s press release announcing ElectionGuard highlights its claim that its system would make elections more verifiable, secure, and auditable; be open source-based; and improve the voting experience. While all of these things sound nice enough, there is reason to believe — based on the description given by Microsoft — that some of these claims are dubious and misleading. Unfortunately, for now, analysis of ElectionGuard is restricted to Microsoft’s description of the software as it is not yet available for public examination. The ElectionGuard software kit is expected to be released later this year on the GitHub platform.

The first aspect of the “verifiable” claim relates to a voter tracking system, where each voter is given a unique tracking ID which allows them “to follow an encrypted version of the vote through the entire election process via a web portal provided by election authorities.” Voters can choose the option of confirming “that their trackers and encrypted votes accurately reflect their selections.”

Yet Microsoft notes that “once a vote is cast, neither the tracker nor any data provided through the web portal can be used to reveal the contents of the vote,” meaning that while a person can track whether their vote was counted, they cannot verify whether the content of the vote (i.e., who they voted for) is counted correctly or not. Microsoft goes on to note that only “after the election is complete” will the tracker page allow the content of the vote to be seen.

The second “verifiability” component of ElectionGuard “is an open specification – or a road map – which allows anyone to write an election verifier.” Microsoft then notes that this open specification would mean that “voters, candidates, news media and any observers can run verifiers of their own or downloaded from sources of their choosing to confirm tabulations are as reported.”

Microsoft describes these two features as constituting “end-to-end verifiability” (E2E-V), which Free & Fair describes as “cryptographic technology that enables voters to vote in a normal fashion in a polling place and have evidence that the election is trustworthy.”

Another focus of ElectionGuard is security, for which the system employs “homomorphic encryption, which enables mathematical procedures – like counting – to be done with fully encrypted data” and this allows individually encrypted votes to be “combined to form an encrypted tabulation of all votes which can then be decrypted to produce an election tally that protects voter privacy.”  Notably, homomorphic encryption is the only ElectionGuard security measure named in the press release.

Election forensics analyst Jonathan Simon, author of CODE RED: Computerized Elections and the War on American Democracy, was not fully persuaded by the E2E-V claim. “Pardon my skepticism,” Simon told MintPress, “but I’ve read Microsoft’s ‘good news’ ElectionGuard flyer and it reminds me very much of the flyers and PR material long served up by the vendors and programmers of the current voting equipment — the very computers that IT experts discovered could be hacked by outsiders and programmed to add, delete, and shift votes by insiders.”

Simon continued:

Right now, for example, they’re hawking expensive and completely unnecessary ballot-marking devices (BMDs) that turn your votes into a barcode, a code that no voter can read or verify. Very slick but yet another level of non-transparency, another step away from public, observable vote-counting, and another vector for fraud.

I’ve spent the last 17 years examining vote-count patterns and drawing attention to a parade of egregious red flags indicative of computerized vote-count manipulation. It has been a system designed for concealment and about as non-transparent as a process can be. It would be great if more advanced technology would bring transparency at last, as Microsoft seems to promise.

But what I see so far is even more complexity — encryption that, whether open source or not, requires the most rarefied experts to penetrate or understand. And just a short step to full-on internet voting — even more convenient and about as secure as, say, Facebook.

Pending a demonstration showing with perfect layperson-accessible clarity how a third-party entity can verify aggregate vote-counts without having to take on faith some step in the pipeline (individual verification that ‘your’ vote was ‘counted’ is a useless bell-and-whistle), it still feels like the same old ‘trust us’ game. I’m willing to be persuaded but the historical context here is very cautionary.”

Simon’s concerns reflect some controversial aspects of the ElectionGuard approach. While encryption would ostensibly protect votes from tampering and thus elections results, it is important to point out that homomorphic encryption is a malleable form of encryption.

According to Brilliant.org:

A malleable crypto-system is one in which anyone can intercept a cipher text, transform it into another cipher text, and then decrypt that into a plain text that makes sense. Malleability is generally considered undesirable in a crypto-system. Imagine you’re trying to send the message ‘I love you’ to your friend using encryption. You encrypt it and send it off. But, it is intercepted by a hacker on the way. All they see is some cipher text, but they can change that cipher text to something that will decrypt to ‘I hate you’ when your friend tries to decrypt it. That is why malleability is not usually wanted.”

If that’s the case, then what stops a “hacker” or another third party — say a U.S. government agency like the NSA or a political operative with access to the electoral cyber-pipeline — from changing a person’s vote from Democrat to Republican or vice versa, or altering the encrypted tabulation of all votes?

While homomorphic encryption seems a reasonable choice in one sense, for allowing votes to be tallied without decrypting, there is an added layer of concern given Microsoft’s past, particularly Microsoft’s history of actually working with U.S. government agencies to bypass encryption.

Indeed, documents leaked by Edward Snowden revealed that Microsoft actually helped the National Security Agency bypass its own encryption so the agency could decrypt messages sent via certain Microsoft platforms including Outlook.com Web chat, Hotmail email service, and Skype. In addition, in 2009, a senior NSA official testified before Congress that Microsoft and the NSA worked together to create its Windows 7 operating system, leading some to worry that Microsoft had built a “backdoor” into the operating system to aid government surveillance activities. Now that Microsoft’s ties to the U.S. military and intelligence community are deeper than ever, it begs the question whether Microsoft’s covert cooperation with government agencies to the detriment of consumers is also a factor guiding its role in creating and promoting ElectionGuard.

Furthermore, with Microsoft’s president having vowed to hand over all its technologies to the U.S. military, one wonders if this type of encryption and methodology was not chosen on purpose, especially given the fact that the NSA is quite accomplished at breaking much more secure types of encryption even without help from Microsoft.

Another of Microsoft’s talking points used to promote ElectionGuard is the fact that it will be open source, meaning the program’s code will be publicly available, a move apparently aimed at assuaging concerns that ElectionGuard’s code could contain hidden manipulations or vulnerabilities.

However, investigative journalist Yasha Levine likened Microsoft’s promotion of ElectionGuard’s still unreleased open source code to a “PR move.” Levine told MintPress:

Open source inevitably has bugs and vulnerabilities that are there accidentally because all code has vulnerabilities. This is true for open source and closed source systems. Open source just means that people can look at it, but then that code has to be run through a compiler that actually runs an executable program. So there you already have a degree of abstraction and separation from the open source code. But even if the executable code and the source code are the same, there are bugs which can be exploited.

So, what open source does is give a veneer of openness that leads one to think that thousands of people have probably vetted the code and flagged any bugs in it. But, actually very few people have the time and the ability to look at this code. So this idea that open source code is more transparent isn’t really true because few people are looking at it.”

Levine went on to note that there are many examples of open source systems — including widely used open source systems — having major vulnerabilities that go undetected for years. One of the best examples, in Levine’s opinion, is the “Heartbleed” bug, which was a security vulnerability in the open source OpenSSL software, a system that allows for the basic encryption of web traffic by encrypting “http” connections. The Heartbleed allowed hackers access to the memory of data servers for an estimated half a million websites and went undetected for years, despite the fact that OpenSSL is an open source system.

Levine also underscored the fact that both American and foreign intelligence agencies “more than any other person or group” are involved in seeking out such vulnerabilities and exploits, which they keep hidden from the public in order to give themselves an advantage in cyberwarfare. Some of the CIA’s lists of such exploits or vulnerabilities were revealed in the WikiLeaks Vault 7 release.

Microsoft’s ties to Israeli military intelligence

ElectionGuard is currently being promoted as a key step towards preventing the “interference” of a foreign government or state actor in U.S. elections in the future. Yet, there is no guarantee that ElectionGuard itself is free from foreign influence, given that Microsoft has deep ties to the military intelligence community of a foreign nation: Israel.

Microsoft’s links to the Israeli military intelligence unit known as Unit 8200, which will be discussed momentarily, are troubling for more than a few reasons. The first is the fact that the main developer of a new election software system aimed at protecting U.S. elections from “foreign interference” has close ties to a foreign military intelligence agency. It goes without saying that if the main developer of ElectionGuard had such ties with another foreign military intelligence agency, such as Russian military intelligence, the software would not stand a chance of adoption in the U.S. and it would likely be a national scandal. The fact that Microsoft’s ties to Israeli military intelligence have not troubled proponents of ElectionGuard suggests that the problem is not foreign interference or influence as long as the foreign nation involved is an ally, not an adversary.

Arguably yet a graver concern in terms of the Microsoft-Unit 8200 relationship and Electionguard, is the recent slew of scandals surrounding Israeli interference in foreign elections all around the world. The most recent of those scandals involved the Israeli company the Archimedes Group and its social-media influence disinformation campaigns to target the elections in several African and Asian nations. According to the Times of Israel, the CEO of the Archimedes Group, Elinadav Heymann, is a former senior intelligence agent for the Israeli military. The group spent an estimated $800,000 on misleading Facebook ads as part of its disinformation campaign, a sum much larger than the $100,000 alleged to have been spent by a Russian company on a similar disinformation campaign in the 2016 election.

Prior to this latest scandal, several private Israeli companies were accused of seeking to collude with the Trump campaign in 2016, namely the now-shuttered PSY-Group — which was run by former Israeli intelligence operatives — and Wikistrat, which also has close ties to Israeli intelligence. The fact that private Israeli firms with ties to Israeli intelligence and Israeli military intelligence have been caught in recent election meddling scandals, including in the U.S., should be a major red flag when examining the many conflicts of interests that enshroud ElectionGuard’s developers and how those conflicts may inform the program’s functionality.

Microsoft has long had a presence in Israel, which dates back to 1989. However, in recent years, they have invested in and acquired in several companies with deep ties to the IDF’s Unit 8200.

In 2015, Microsoft acquired Israeli cloud security company Adallom for $320 million, which would go on to serve as a new foundation for Microsoft’s Research and Development (R&D) Center in Israel, which has been active since 1989. Adallom’s product was subsequently rebranded as Microsoft Cloud App Security. Adallom’s CEO and co-founder is Assaf Rappaport, who now heads Microsoft’s R&D Center in Tel Aviv. Rappaport, among other things, is a graduate of the elite IDF “Talpiot” program and also served in the Israeli military intelligence unit known as Unit 8200.

Unit 8200 is an elite unit of the Israeli Intelligence corps that is part of the IDF’s Directorate of Military Intelligence and is involved mainly in signal intelligence (i.e., surveillance), cyberwarfare and code decryption. It is often described as the Israeli equivalent of the NSA and Peter Roberts, senior research fellow at Britain’s Royal United Services Institute, characterized the unit in an interview with the Financial Times as “probably the foremost technical intelligence agency in the world and stand[ing] on a par with the NSA in everything except scale.”

Notably, the NSA and Unit 8200 have collaborated on projects such as the infamous Stuxnet virus as well as the Duqu malware, a sophisticated strain of which was used to spy on countries engaged in negotiating the nuclear deal with Iran. In addition, the NSA is known to work with veterans of Unit 8200 in the private sector, such as when the NSA hired two Israeli companies, whose executives are linked to Unit 8200, to create backdoors to all the major U.S. telecommunications and major tech companies including Facebook, Microsoft and Google. The unit is also known for spying on civilians in the occupied Palestinian territories for “coercion purposes” — i.e., gathering info for blackmail — and also for spying on Palestinian-Americans via an intelligence sharing agreement with the NSA.

However, Microsoft’s connections to Unit 8200 go far beyond Adallom. Another example is Microsoft’s considerable investment in Illusive Networks, an Israeli cybersecurity firm created by Team8, in which Microsoft has also invested heavily. Team8’s CEO and co-founder is Nadav Zafrir, who used to lead Unit 8200, and two of the company’s three other co-founders are also veterans of Unit 8200. Former CEO of Google (now Alphabet), Eric Schmidt, is a major backer of Team8.

Team8 has cozied up to former NSA directors, with Zafrir giving presentations alongside former NSA director Keith Alexander, for example. Those efforts eventually culminated in Team8 hiring retired Admiral Mike Rogers, former director of the NSA and U.S. Cyber Command, as a “senior adviser.” “I’ve worked with the highly talented resources of Unit 8200 in the past and so when I had the opportunity to join Team8, I knew this was a rare and valued opportunity,” Rogers said of his hire. Team8 described the decision to hire Rogers as being “instrumental in helping strategize” Team8’s expansion in the United States.

Rogers’ hire by a firm headed by the former boss of a foreign military intelligence agency drew sharp criticism from veterans of the NSA. One of those ex-NSA employees — Jake Williams, a veteran of NSA’s Tailored Access Operations hacking unit — told CyberScoop that “Rogers is not being brought into this role because of his technical experience …It’s purely because of his knowledge of classified operations and his ability to influence many in the U.S. government and private-sector contractors.”

In addition to Microsoft’s ties to Unit 8200 through its connections to Adallom, Illusive Networks and Team8, Microsoft is also developing direct ties with Israel’s military, with the IDF having adopted the company’s HoloLens technology. The IDF’s C2 Systems Department has been using a pair of HoloLens devices to adapt the technology for use in war for the past three years, a precursor to what is sure to be a lucrative military contract for Microsoft, considering that their HoloLens contract with the U.S. military was nearly half a billion dollars.

ElectionGuard a bloodless coup for the military-industrial complex

Following the 2016 election and the heavily promoted concerns about “Russian hackers” infiltrating election systems, federal agencies like the NSA have used that threat to lobby for greater control over American democracy. For instance, during a 2017 hearing then-NSA Director Adm. Mike Rogers stated:

If we define election infrastructure as critical to the nation and we are directed by the president or the secretary, I can apply our capabilities in partnership with others – because we won’t be the only ones, the Department of Homeland Security, the FBI – I can apply those capabilities proactively with some of the owners of those systems.”

With Rogers — who is now employed by the Microsoft-funded and Israeli military intelligence-connected company Team8 — having lobbied for the direct involvement of U.S. government agencies, including the NSA and DHS, in supervising elections, it seems likely that ElectionGuard will help enable those agencies to surveill U.S. elections with particular ease, especially given Microsoft’s past of behind-the-scenes collaboration with the NSA.

Given that ElectionGuard’s system as currently described is neither as “secure” nor as “verifiable” as Microsoft is claiming, it seems clear that the conflicts of interests of its developers, particularly their connections to the U.S. and Israeli militaries, are a recipe for disaster and tantamount to a takeover of the American election system by the military-industrial complex.

“The great irony, and tragedy, here,” according to election forensics analyst Jonathan Simon, “is that we could so easily go the opposite direction and quickly solve all the problems of election security if we got the computers out of the voting process and were willing to collectively invest the modicum of effort needed for humans to count votes observably in public as they once did. If democracy is not worth that effort, perhaps we don’t deserve it.”

Whitney Webb is a MintPress News journalist based in Chile. She has contributed to several independent media outlets including Global Research, EcoWatch, the Ron Paul Institute and 21st Century Wire, among others. She has made several radio and television appearances and is the 2019 winner of the Serena Shim Award for Uncompromised Integrity in Journalism.

May 24, 2019 Posted by | Civil Liberties, Deception | , , | 1 Comment

‘Mass surveillance is exactly what the US does’: Dotcom points out glaring irony of Huawei ban

RT | May 17, 2019

Kim Dotcom has slammed the US for hypocrisy over its Huawei ban given America’s history of “abusing technology” and “turning its entire tech sector into a spy machine.”

The Megaupload founder took to Twitter in the wake of the ban to highlight that the abuse of technology for mass surveillance is “exactly the conduct of the US” and said that “because the US does it, they think China will too.”

Trump declared a “national emergency” for the telecommunications sector on Wednesday, citing risks from “foreign adversaries.”

The US Commerce Department subsequently added Huawei Technologies Co Ltd and 70 affiliates to its so-called Entity List, which bans the Chinese brand from buying parts from US companies without government approval, making it difficult for Huawei to sell some of its products because of its reliance on US parts.

Dotcom pointed out that the US has used tech companies to spy on its own citizens as well as people all around the world. The extent of US surveillance was revealed by National Security Agency (NSA) whistleblower Edward Snowden in 2013 when he exposed the US’ warrantless surveillance, including listening in on phone conversations, its ability to compel tech companies like Google and Facebook to turn over user data, and the XKeyscore tool that can be used to collect nearly everything a user does on the internet.

Snowden also revealed how the US spies on world leaders, attempts to crack encryption and works with the UK to intercept global internet data.

The 2017 Wikileaks ‘Vault 7’ leak of CIA secrets revealed the US agency kept vulnerabilities and security bugs from tech companies so it could continue to access devices. The documents also highlighted the spy agency’s use of hacking tools to remotely hack and control smart phones, and cover their own tracks.

May 17, 2019 Posted by | Civil Liberties, Full Spectrum Dominance | , , | 3 Comments

US spies helped UAE hack phones of Al Jazeera chairman, BBC host & other journalists – report

RT | April 2, 2019

Former US intelligence hackers helped the United Arab Emirates spy on Al Jazeera’s chairman, a BBC host, and other media figures as part of a secret Emirati intelligence program called Project Raven during the blockade on Qatar.

At least 9 former National Security Agency (NSA) and US military operatives worked within Project Raven, which was exposed in January after spying on US journalists and a British activist, along with dissidents and opponents of the UAE royal family.

The targeting of Arab media figures began during the 2017 diplomatic dispute with Qatar, which saw the UAE, Saudi Arabia, Bahrain, Egypt and others turn against the small Gulf nation after accusing it of supporting terrorism. The countries imposed an air, sea and land blockade on Qatar and demanded it shut down Al Jazeera, which is funded by the Qatari government.

It was then that Project Raven hacked into the iPhones of at least 10 journalists and media executives to see if they had ties to the Qatar government or the Muslim Brotherhood in order to uncover something that would show Qatar royal family influence over Al Jazeera and other media outlets, a Reuters investigation has revealed.

They used a program called Karma, which gives access to a target’s phone by simply inputting their email and phone number. There is no need for the target to click a link or download anything to gain access. They then passed the data gathered on to UAE intelligence.

Among those targeted were BBC Arabic host Giselle Khoury, Al Jazeera host Faisal al-Qassem, and Al Jazeera chairman Hamad bin Thamer bin Mohammed Al Thani.

Abdullah Al-Athba, editor of Qatar newspaper Al-Arab, Al Araby TV director Abdulrahman Elshayyal and Al-Araby Al-Jadeed founder Amzi Bishara were also targeted, along with journalists from London-based Al-Araby TV and Al-Hiwa media outlets.

The revelation that former US government employees are working with a Gulf monarchy to spy on the media raises questions about US oversight over its former employees, who are sharing the hacking capabilities they learned while working for the US government to assist a foreign government to spy on media and dissidents.

Project Raven was set up in 2009 with the assistance of former George W Bush White House officials and US intelligence contractors, it was originally meant to track terrorism but soon evolved into spying on opponents.

April 2, 2019 Posted by | Full Spectrum Dominance | , | Leave a comment

Guardian Accused Of Whitewashing U.S. Role In Brazil’s Dictatorship

Brasil Wire | March 28, 2019

Kathy Swart is a U.S. Professor, Librarian and expert on the information landscape of Latin America. Following the Guardian’s publication of this article regarding planned commemorations of Brazil’s US-backed 1964 Military Coup, she was compelled to lodge an official complaint with the newspaper. It has yet to respond.


“For years I have enjoyed the Guardian’s articles on many topics. But this article is representative of the disturbing trend I’ve noticed for several years: a whitewashing of U.S. involvement in Brazil’s 1964 coup and dictatorship. As someone who has read widely on Brazil, it is offensive to read this piece because of this glaring omission. Particularly disappointing is the “Quick Guide” to the dictatorship that fails to even mention this extensively documented history. Mr. Phillips must be aware that the U.S. role included spending millions trying to oust Goulart, military assistance, CIA infiltration, and even torture training. The U.S. itself admitted its role 40 years ago—and yet reading the Guardian, one would think this history never occurred.

It’s curious that Mr. Phillips took the trouble to cite James Green but not to refer to any of the facts of U.S. involvement detailed in his book, We Cannot Remain Silent: Opposition to Brazil’s Military Dictatorship in the United States. In the article in question, Green points out that the military’s rationale for throwing the coup — “anti-communism” — was a pretext. Who do you think encouraged the military to use anti-communism as a pretext? Green and others have documented how the U.S. leveraged McCarthyite sentiment to spin its support of Right-wing dictators as about “quelling communism.” The communist threat to Brazil was an invention of propagandists in Washington and Brazil’s military (a separate well-referenced source describes how the CIA paid peasants to call themselves communists and set fire to landholder’s buildings to create the illusion of a communist threat). Green’s book illustrates how it was actually U.S. financial interests that drove the coup. By not mentioning U.S. involvement, you are simply perpetuating a false narrative from the Cold War.

But U.S. meddling did not end with throwing coups. Journalists from other media have described its intervention in Brazil’s more recent affairs, such as NSA spying on Petrobras, the 2016 coup against Rousseff, and the conviction of Lula without evidence. Again, the Guardian remains silent on these stories. For example, last week you published 3 separate pieces on Bolsonaro’s trip to the U.S. but failed to mention an off-agenda visit to the CIA with his justice minister. This was a major story in Brazil; even Brazilians know the CIA had much to do with its coup. And yet you fail to mention this historic visit? You are writing history with revisionism by omission. Ignorance is not a likely explanation, so why are you whitewashing the U.S. involvement? Is it because the Guardian is under the editorial influence of US and UK foreign policy? If not, what is your explanation for these omissions?”

Kathy Swart

March 30, 2019 Posted by | Deception, Mainstream Media, Warmongering, Timeless or most popular | , , , | 1 Comment

The Russian Mirror

By Jacob G. Hornberger | FFF | February 26, 2019

A recent article in the New York Times about Russia’s “intelligence state,” authored by John Sipher, a former chief of station for the CIA, provides a valuable mirror for the American people. The problem is that American statists cannot see it as a mirror. While Sipher’s article clearly demonstrates that American statists, especially conservative ones, can see the wrongdoing of foreign totalitarian or authoritarian regimes with great clarity, they have a moral blindness when it comes to recognizing wrongdoing by their own government. Even worse, they defend wrongdoing by their own regime (which they can’t see as wrongdoing) as a way to combat foreign wrongdoing. In fact, they come to view their own wrongdoing as something good when it is being used to oppose wrongdoing by a foreign regime.

Sipher labels Russia’s (and, before that, the Soviet) governmental system an “intelligence state.” He’s critical of it, and rightly so. It is a type of governmental system that engages in such things as secret surveillance of the citizenry, assassination, torture, and interference in the affairs of other nations.

Referring to Russia’s system under Vladimir Putin, who Sipher reminds us is a former KGB officer, Sipher writes:

“The history of the brutal Soviet security services lays bare the roots of Russia’s current use of political arrests, subversion, disinformation, assassination, espionage and the weaponization of lies. None of those tactics is new to the Kremlin.

“In fact, those tactics made Soviet Russia the world’s first “intelligence state,” and they also distinguished it from authoritarian states run by militaries…. The result is a regime with the policies and philosophy of a supercharged secret police service, a regime that relies on intelligence operations to deal with foreign policy challenges and maintain control at home….

“Over the decades, the Soviet and Russian secret services developed tools and habits based on their Chekist experience that set them apart from their counterparts in the West. Rather than focusing on collecting and analyzing intelligence, they developed expertise in propaganda, agitation, subversion, repression, deception and murder.”

Sipher uses the label “intelligence state” to describe the Russian and Soviet system. There is another label that Sipher could have used, a much more common one: a “national security state.”

Why would Sipher avoid using the term “national-security state”? My hunch is that he instinctively knows that that would be holding the mirror to himself and the rest of the American people. That’s because the United States is a “national-security state” or an “intelligence state,” just like Russia is.

In fact, a supreme irony in Sipher’s article is that he worked for the CIA for 27 years. At the risk of belaboring the obvious, the CIA is an “intelligence agency,” one that not only engages in intelligence gathering but also has long wielded and exercised the powers of assassination, torture, indefinite detention, involuntary drug experimentation, and secret surveillance — that is, the same types of powers that Sipher decries in the Russia/Soviet “intelligence state.”

Sipher points out that one of the main features of an “intelligence state” is lying. He ought to know. Since its very beginning, the CIA has been an agency based on lies and lying. Deception has always been justified under the rubric of “national security.” Coming immediately to mind is CIA Director Richard Helms, who was convicted of lying to Congress regarding the CIA’s secret regime-change operation against Chile, to the praise and acclaim of his subordinate officers in the CIA. Let’s also not forget the lies that former Director of National Intelligence James Clapper Jr. told Congress under oath regarding the NSA’s secret surveillance of Americans.

Consider all the nefarious things the CIA has done and continues to do in foreign countries, including assassination, coups, installation of foreign dictators, invasions, wars of aggression, torture, rendition, partnerships with dictatorial regimes, sanctions and embargoes targeting innocent people with death, impoverishment, and suffering.

Or consider MKULTRA, the CIA’s top-secret operation to subject innocent, unsuspecting people to drug experimentation, along with the subsequent intentional destruction of official records to prevent Americans from discovering the full extent of the operation.

Or the U.S. national-security state’s secret surveillance of American citizens, along with secret illegal operations to spy on and infiltrate peaceful and law-abiding organization with the intent to smear and destroy them and their members.

Of course, it wasn’t always that way. The United States was founded as a limited-government republic, which is the opposite of a national-security state. For more than 150 years, our nation prospered without a Pentagon, a military-industrial complex, a national-security state, a CIA, and a NSA. Governmental procedures were transparent. There was no obsession over the nebulous and meaningless term “national security.”

Then came the aftermath of World War II, when U.S. officials told Americans that they were now facing a new official enemy, one that had been an official enemy of Nazi Germany and a friend and partner of the United States. That new official enemy was the Soviet Union and its system of communism. The communists were coming to get us, U.S. official maintained, as part of a worldwide communist conspiracy based in Moscow, Russia.

U.S. officials said that there was only one way to prevent a communist takeover of the United States. In order to prevail against the Soviet Union, the U.S. government would have to be converted into the same type of governmental system, U.S. officials said.

That meant moving to the dark side — toward torture, assassination, coups, regime-change operations, sanctions and embargoes, secret surveillance — i.e., the types of things the communists were doing. That’s how we got the Pentagon, the CIA, and the NSA, three principal components of the U.S. national-security state or intelligence state.

What about our limited-government republic? U.S. officials said that as soon as the Cold War was over, we could have it back. But when the Cold War suddenly and unexpectedly ended, we didn’t get our republic back. Instead, we got the continued existence of the national-security state, along with its forever wars and forever interventions all around the world, along with its never-ending plunge into the dark side.

Worst of all, we got a moral blindness, one in which all too many Americans are unable to recognize what all this has done to us.

February 26, 2019 Posted by | Deception, Mainstream Media, Warmongering, Russophobia | , , , | Leave a comment

Mueller’s Indictments and James R. Clapper Jr.

By Jacob G. Hornberger | FFF | January 30, 2019

Special Counsel’s Robert Mueller’s securing of an indictment against political operative Roger Stone adds to the list of people associated with President Trump who have been charged with making false statements to federal officials.

The question naturally arises: If false statements to federal officials are so important, then why hasn’t the Justice Department secured an indictment against James R. Clapper, Jr., former director of the Defense Intelligence Agency under President Barack Obama. Clapper lied to Congress about secret surveillance schemes that were being conducted on American citizens.

According to vox.com, the following is a list of the people who Mueller has prosecuted or is prosecuting for allegedly making false statements to U.S. officials:

Paul Manafort
Roger Stone
Rick Gates
Michael Flynn
Alex van der Zwaan
Michael Cohen

Obviously, Mueller considers it important that people tell the truth when they are talking to federal officials.

So, I repeat: Why hasn’t the Justice Department secured an indictment against James R. Clapper Jr.?

On March 12, 2013, in a hearing of the United States Senate Committee on Intelligence, Senator Ron Wyden asked Clapper, “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?”

Clapper responded, “No, sir.”

Wyden asked “It does not?”

Clapper said, “Not wittingly. There are cases where they could inadvertently, perhaps, collect, but not wittingly.”

On June 5, 2013, the Guardian published secret surveillance documents leaked by Edward Snowden. According to Wikipedia, these included “a top secret order showing that the NSA had collected phone records from over 120 million Verizon subscribers.”

Obviously, neither Clapper nor anyone else within America’s deep state could have anticipated that such records would ever see the light of day. Clapper must have believed that his lie to Congress was going to be preserved forever. But then Snowden came along and revealed the truth.

According to Wikipedia, “The following day, Clapper acknowledged that the NSA collects telephony metadata on millions of Americans’ telephone calls.”

It was clear that Clapper had lied to Congress, under oath. Again, from Wikipedia:

Representative Justin Amash became the first congressman to openly accuse Director Clapper of criminal perjury, calling for his resignation. In a series of tweets he stated: “It now appears clear that the director of national intelligence, James Clapper, lied under oath to Congress and the American people,” and “Perjury is a serious crime … [and] Clapper should resign immediately,” U.S. Senator Rand Paul (R-KY) said “The director of national intelligence, in March, did directly lie to Congress, which is against the law.” Paul later suggested that Clapper might deserve prison time for his testimony.

Why do Justice Department officials consider it bad when people who are associated with President Trump lie to federal officials but no big deal when it is done by people associated with former President Obama?

January 30, 2019 Posted by | Deception | , , | 1 Comment

Project Raven: Using US Spies and Spying Tactics, UAE Snooped on Entire World

Sputnik – 30.01.2019

Thousands of documents and emails reveal that NSA surveillance techniques were central to the UAE’s efforts to monitor opponents.

In an exclusive report, Reuters has documented the work of ‘Project Raven’ — an operation run by the government of the United Arab Emirates, in which former US intelligence agency staff have spied on other governments, human rights activists and even US citizens.

The article primarily focuses on former NSA intelligence analyst Lori Stroud, the only Project operative willing to be named — eight others spoke on the condition of anonymity.

Stroud spent a decade at the NSA, first as military service member 2003 — 2009, then agency contractor for tech giant Booz Allen Hamilton 2009 — 2014. Her specialism was hunting for vulnerabilities in foreign government computer systems — such as China’s — and assessing what data could and should be stolen.

Her glittering career at the agency would be scuppered via an intriguing chain of events, kickstarted in 2013 when she recommended none other than Edward Snowden — then a Dell technician — be promoted to her team.

A mere two months later, Snowden infamously fled the US and passed on thousands of pages of top secret program files to journalists. Stroud and her team were unofficially blamed for enabling the massive security breach, and they became persona non grata at the agency.

Job Opportunity

In the wake of the scandal, Marc Baier, a former colleague of Stroud’s at NSA Hawaii, offered her the opportunity to work for CyberPoint, a US contractor. She was told the job involved counterterrorism work in cooperation with the Emiratis, but little else — although she was assured the project was approved by the NSA, and accepted the offer in May 2014.

A fortnight later, Stroud was in Abu Dhabi, one of over a dozen former US intelligence veterans working under the auspices of Project Raven — their primary task surveillance of citizens critical of the UAE’s ruling monarchy. They would use techniques invented and perfected by the US intelligence community, including a resource called ‘Karma’, which was employed to hack into hundreds of dissidents’ phones and computers. The team also investigated targets’ friends, relatives and associates, placing them under close surveillance too.

The work also involved monitoring social media for negative comments, which Stroud occasionally found difficult.

“Some days it was hard to swallow, like [when you target] a 16-year-old kid on Twitter. But it’s an intelligence mission, you are an intelligence operative. I never made it personal,” she told Reuters.

Raven’s targets eventually evolved to militants in Yemen, and foreign governments including Iran, Qatar and Turkey, all bitter enemies of UAE. On top of employing their existing knowledge of intelligence tactics, the American operatives also developed new software to carry out infiltration and monitoring tasks. An Emirati operative would usually “press the button” on an attack however, in order to give the former US spy agency staff “plausible deniability”.

Moreover, using fake identities and Bitcoin, the Project anonymously rented servers around the world, allowing them to launch attacks from a network of machines that couldn’t be traced back to its true origin.

Human Wrongs

Fake identities also played a role in the targeting of several individuals, including UK journalist and activist Rori Donaghy, who’d authored articles critical of the UAE’s human rights record. The Emiratis were acutely aware spying on Donaghy could harm diplomatic relations with its Western allies, and stressed the need for extreme caution, suggesting Project operatives “ingratiate [themselves] to the target by espousing similar beliefs”.

Posing as a single human rights activist, staff emailed Donaghy asking for his help to “bring hope to those who are long suffering”, managing to convince him to download software that would make messages “difficult to trace.” In reality, the malware allowed the Emiratis to continuously monitor Donaghy’s email account and Internet browsing. The surveillance against Donaghy remained a top priority for the Emirates until 2015, when he learned his email had been hacked.

Prominent Emirati activist Ahmed Mansoor was another key target — he’d criticized the country’s ruling elite for years over the war in Yemen, treatment of migrant workers and detention of political opponents. Evidence the Project collected on him was compiled in a PowerPoint presentation — it would later be used in a secret trial in 2017, which saw him sentenced to 10 years in solitary confinement.

Along the way, staff were told the NSA approved of and was regularly briefed on Raven’s activities — but in 2016, the Emiratis moved responsibility for Project Raven to UAE cybersecurity firm DarkMatter, but the former US spies remained. It would not be long before their mission began to involve the targeting of fellow Americans for surveillance, activity which not only raised serious ethical questions for all involved, but made their activities illegal in their home country.

While Stroud praises the lack of “bull****” red tape” and “limitations” in her work for Project Raven, she also alleges she helped create an policy detailing how data on Americans accidentally harvested by the team’s activities should be deleted, she said after its supposed implementation she kept on finding such information in the organization’s data stores.

At the same time, the Emiratis began hiding an increasing number of sections of Project Raven from the view of the Americans on the team.

Tough Questions

In 2016, FBI agents began questioning American Project Raven employees who’d reentered the US, in particular whether they’d spied on US citizens and shared sensitive information with the Emiratis — Stroud was among them, having been approached at Virginia’s Dulles airport as she was preparing to head back to the UAE after a trip home. She says she refused to tell them “jack”.

However, one morning in spring 2017 Stroud noticed a passport page of an American was in the Project system, and emailed supervisors to complain. She was told the data had been collected by mistake and would be deleted — but her concerns not allayed, she began searching a targeting request list usually limited to Emirati staff, which she was able to access because of her role as lead analyst.

She saw security forces had sought surveillance against two other Americans, and questioned her bosses on the find — their response was a rebuke, on the basis she wasn’t meant to be able to process such information. Days later, she came upon three more American names on the hidden targeting queue — all journalists.

When Stroud kept raising questions, she was put on leave, her phones and passport confiscated. She was allowed to return to her homeland after two months, whereupon she contacted the FBI agents who confronted her at the airport. The Bureau is now investigating Project Raven’s activities — but Stroud’s contributions are limited in specifics, as she claims to not remember the names of the Americans she came across in the files.

January 30, 2019 Posted by | Civil Liberties, Deception | , , , , | Leave a comment