Orwell, again. 1984 was prescient on so many concepts that it seems it was written for the Biden era. Underlying it all is the concept of disinformation, the root of propaganda and mind control. So it is in 2023. Just ask FBI Director Chris Wray. Or Facebook.
George Orwell’s novel explores the concept of disinformation and its role in controlling and manipulating society. Orwell presents a dystopian future where a totalitarian regime, led by the Party and its figurehead Big Brother, exerts complete control over its citizens’ lives, including their thinking. The Party employs a variety of techniques to disseminate disinformation and maintain its power. One of the most prominent examples is the concept of “Newspeak,” a language designed to restrict and manipulate thought by reducing the range of expressible ideas. Newspeak aims to replace words and concepts that could challenge or criticize the Party’s ideology, effectively controlling the way people think and communicate (unhomed, misspoke, LGBQTIAXYZ+, nati0nalist, terrorist.)
Orwell also introduces the concept of doublethink, which refers to the ability to hold two contradictory beliefs simultaneously and accept them both as true. This psychological manipulation technique allows the Party to control the minds of its citizens and make them believe in false information or embrace contradictory ideas without questioning (masks which do not prevent disease transmission are still mandatory.) The Party in 1984 alters historical records and disseminates false information through the Ministry of Truth. This manipulation of historical events and facts aims to control the collective memory of the society in a post-truth era, ensuring that the Party’s version of reality remains unquestioned (war in Ukraine, Iraq, El Salvador, Vietnam, all to protect our freedom at home.)
Through these portrayals, Orwell highlights the dangers of disinformation and its potential to distort truth, manipulate public opinion, and maintain oppressive systems of power. The novel serves as a warning about the importance of critical thinking, independent thought, and the preservation of objective truth in the face of disinformation and propaganda.
Disinformation is bad. But replacing disinformation with censorship and/or replacement with other disinformation is worse. 1984 closed down the marketplace of ideas. So for 2023.
In 2023 America the medium is social media and the Ministry of Truth is the Executive Branch, primarily the FBI. Topics the FBI at one point labeled disinformation and sought to censor in the name of protecting Americans from disinformation include but are not limited to the contents of Hunter Biden’s laptop, the Covid lab leak theory, the efficiency and value to society of masks, lockdowns, and vaccines, speech about election integrity and the 2020 presidential election, the security of voting by mail, even parody accounts mocking the president (about Finnegan Biden, Hunter Biden’s daughter.)
When asked before Congress to define disinformation, FBI Director Christopher Wray could not do it, even though it is the basis for the FBI’s campaign to censor Americans. It’s a made up term with no fixed meaning. That gives it its power, like “terrorism” was used a decade or so earlier. Remember “domestic terrorism”? That stretched to cover everything from white power advocates to J6 marchers to BLM protestors to Moms for Liberty. It just can’t be all those things all the time but it can be all those things at different times, as needed. The term “hate speech” is another flexible tool of enforcement and is why efforts to codify banning hate speech under the First Amendment must be resisted so strongly. Same for QAnon. We’ve heard about QAnon for years now but still can’t figure out if it even exists. To read the MSM, you would think it is the most powerful and sinister thing one can imagine yet seems to be imaginary, another Cthulhu. Do they have an office, an email address, a lair somewhere?
In simple words: the government is using social media companies as proxies to censor the contrary thoughts of Americans, all under the guise of correcting misinformation and in direct contrivance of the First Amendment.
How bad does it get? As part of its 2023 investigation into the federal government’s role in censoring lawful speech on social media platforms, the House Committee on the Judiciary issued a subpoena to Meta, the parent company of Facebook and Instagram, and Alphabet, the parent of Google and YouTube. Documents obtained revealed the FBI, on behalf of a compromised Ukrainian intelligence service, requested and, in some cases, directed, the world’s largest social media platforms to censor Americans engaging in constitutionally protected speech online about the war in Ukraine.
Another tool of thought control is the Foreign Intelligence Surveillance Act (FISA), which was supposed to be used to spy on foreigners but has been improperly used against thousands of Americans. Over 100,000 Americans were spied on in 2022, down from three million in 2021.
Does it sound familiar? An amorphous threat is pounded into the heads of Americans (Communism and Red Scares, Covid, terrorism, disinformation) and in its name nearly anything is justified, including in the most recent battle for freedom, censorship. The wrapper is that it is all for our own protection (Biden himself accused social-media companies of “killing people,” the more modern version of the terrorism-era’s “blood on their hands”) with the government assuming the role of knowing what is right and correct for Americans to know. The target in name is always some Ruskie-type foreigner, but in reality morphs to be censorship of our citizens ourselves (stained as “pro-Putin.”) Yet Meta CEO Mark Zuckerberg admitted the government asked Facebook to suppress true information. He said during the Covid era the scientific establishment within the government asked “for a bunch of things to be censored that, in retrospect, ended up being more debatable or true.”
Under President Joe Biden, the government has undertaken “the most massive attack against free speech in United States history.” That was the extraordinary conclusion reached by a federal judge in Missouri v. Biden. The case exposed the incredible lengths to which the Biden White House and its federal agencies have gone to bully social-media platforms into removing political views they dislike. The White House is appealing and attained a stay, hoping to retain this powerful tool of thought control right out of 1984. A victory for censorship of Americans and their thoughts could be the greatest threat to free speech in American history.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Air National Guard leaker Jack Teixeira had one of the highest levels of security clearance. Over five million Americans, more than the population of Costa Rica, Ireland or New Zealand, hold some type of security clearance. Can we trust them? Is Teixeira an exception, or is the process never expected to work 100 percent of the time?
A security clearance is issued by a part of the U.S. Government (Department of Defense, CIA, the State Department…) and says the holder can be trusted to handle sensitive documents and duties. At the low end this may mean a contractor can enter the Navy Yard without a body search, or at the extreme means a person will assume a completely new identity, live abroad, and conduct clandestine actions on behalf of the U.S.
Government-wide there are three basic levels of clearance: Confidential, Secret, and Top Secret. There are formal definitions, but the basic idea is that the higher you go up the ladder, the more harm and damage disclosure would create. Added to this three-tiered system are many subcategories, including Sensitive But Unclassified, for well, unclassified things that are still sensitive, such as an applicant’s social security number, Law Enforcement Sensitive and the like. Top Secret is supplemented by Sensitive Compartmented Information (SCI), often used to denote information obtained from intelligence sources. There are also many, many flavors of Special Access Programs (SAP) that require both a very high level clearance and specific permission to access just that single project, such as a clandestine operation against Iran, or the identities of spies in Syria. The military has its own lexicon of classifications.
The clearance process is largely a variation on a single note: let’s look into what this person has done in his life prior to seeking a clearance, and then try to extrapolate that into what he will do once cleared. But because, like your mutual funds, past performance is no guarantee of future success, the process is inherently flawed.
Despite the wide variety of clearances available, the process of obtaining one is similar across the board. What changes is less the process of looking into someone’s life than the granularity of the look. Most everyone seeking a clearance begins at the same place, filling out Standard Form 86, Questionnaire for National Security Positions, form SF-86. The SF-86 is mainly a very detailed autobiography, the raw material that fuels the rest of the process. Young people filling out their first SF-86 invariably end up on the phone to mom, gathering old addresses they lived at as kids, birthdays of disconnected relatives, foreign countries visited on family trips and more, a lot more: the SF-86 runs some 129 pages. Some interesting perjury bait is near the end, almost silly questions such as “Have you ever engaged in an act of terrorism?” and a follow-up requiring you to describe, in one line, “The nature and reason for the terror activity.”
After a hundred pages of names and dates the SF-86 dips into the deal breakers, the questions that weed out quickly those who are unlikely to get very far in the clearance process. Applicants are asked to self-describe financial problems, debts, drug use, gambling, drinking, mental health issues, legal troubles, job firings, and more. Whether out of duty and honor, or more likely a thought process that the agency will find out anyway and lying is an automatic disqualification, most applicants do tell the truth and disqualify themselves.
Everyone who gets past the SF-86 has some standard checks run on them. Since U.S. Citizenship is the most basic and unwavering requirement for a clearance, every applicant’s claim to being an American is verified. Every applicant then gets a run through whatever databases and electronic records can be found. The goal is to verify quickly as much of the self-provided data and to skim off the low-hanging fruit. A serious arrest record, neck-deep financial problems, and the like will be easily found. Checks are also run through the various intelligence files (a National Agency Check) to make sure while you’re applying for a job at the State Department you are not on some secret list of bad guys over at CIA. For some low-level or short-term clearances, the process can stop here and a decision is made. The time period varies, but usually is a couple of months for a background-only clearance.
For higher level clearances, including Top Secret, a full spectrum investigation is required. An investigator will visit an applicant’s home town school teachers, his second-to-last-boss, his neighbors, his parents, and almost certainly the local police force and ask questions in person. As part of the clearance process, an applicant will sign the Mother of All Waivers, basically giving the government permission to do all this as intrusively as the government cares to do. This is old fashioned shoe leather police work, knocking on doors, eye balling people who say they knew the applicant, turning the skepticism meter up to 11. The investigator will ask each interviewee to keep quiet about the interview, but typically the applicant will get a hushed phone call or email from some old acquaintance saying the Feds just knocked. Many of the contract investigators at this level are retired FBI or Secret Service people and often will present their old ID to add some gravitas to the procedure. If an applicant lived abroad, the process is tasked out to the nearest U.S. Embassy. All this on-the-street work does not come cheap. A full background investigation can run $15-20,000.
For many agencies, including the CIA and NSA and likely for a guy like Teixeira, an additional step in the clearance process is the polygraph, the lie detector, the box. The federal government polygraphs about 70,000 people a year in connection with security clearances. What portion of the polygraph process that isn’t shrouded in movie drama is classified, but the basics are simple; even Mythbusters looked into it. The process is based on the belief that when one fibs one’s body involuntarily expresses stress in the form of higher blood pressure, changes in pulse, breathing, and perspiration rate. Those things can be precisely monitored. Did you ever steal anything? No? That’s a lie — see here, your heart rate went up X percent when you answered.
Some say that the presence of the polygraph machine itself may be mostly for show, and the real nuts and bolts of the process are actually just clever manipulation and interrogation techniques as old as dirt. An awful lot of information obtained via a polygraph has nothing to do with the needles and dials per se, but the applicant’s fear of them and belief that they “work.” Polygraphers are allowed considerable freedom in style, and some get more into role-playing than others. Often the applicant will self-incriminate.
Up to this point the clearance process has been mostly the aggregation of information. Along the way some applicants might be picked off, but most applicants for a clearance end up in adjudication. And in adjudication lies the core problem in the clearance process: it relies on human judgment.
The basics of an adjudication look at vulnerabilities, and at past examples of trusts kept or violated.
Vulnerabilities are easier to determine. People betray their country’s trust for money, sex/compromise, ego or ideology. People with loads of debt or a gambling problem are more susceptible to bribes. People with records of infidelity or a pattern of poor judgment might be lured into sexual encounters that could be used to compromise them. In the bad old days when most LGBT applicants were deeply closeted, this was used as a one-size-fits-all pseudo-reason to deny them employment. Ego is a tougher one to pin down, but persons who lack self-esteem or who want to play at being a “real spy” might be tempted to become “heroes” for the other side. Ideology is a growing issue as more and more hyphenated Americans seek government work and, needing qualified language employees, more and more are recruited by the government. Will a Chinese-American’s loyalty fall to her new home or to the old country where grandma still resides?
Back in the good old days, when qualification for high level positions required one to be male, pale and Yale, these things were less of concern. Fathers recruited sons, professors noted promising students, and no one thought much about the messy range of people now sought for government work. Need fluent Farsi speakers or a surge of network engineers? You’re going to have to recruit farther afield than the country club. Agencies who used to toss back into the pond pretty much anyone without a pristine background now face unfilled critical positions. So, standards change, always have changed, and will continue to change. Security clearances just work that way.
If vulnerabilities seem sometimes ambiguous to adjudicate, the next category, trust, is actually much harder. Persons who have kept trusts extended to them, not been fired, not broken laws, paid their bills, saw to their responsibilities, are in the Nice category. Those who didn’t end up over in Naughty. The adjudication part becomes important because very few people are perfect, and very few are really bad. Most everyone falls in the middle, and so agencies must make judgment calls. The goal is to come up with a picture of the person, and then project that picture forward into what they might be like on the job. Like any human-powered process that attempts to predict the future, it is flawed. That’s how Jack Teixeira (Ed Snowden, Chelsea Manning, et al) ended up with a Top Secret security clearance.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
How do you fix the security clearance process?
The security clearance process is not a real-time, ongoing endeavor. Instead, someone applies for a government or contractor job that requires a clearance, some sort of background check is done, and a clearance decision is adjudicated. Next case, please. Most clearances are only reviewed every five years and then investigators lean heavily on anything new or changed, and especially on the subject’s performance those five years. Even agencies that use the polygraph employ an abbreviated version of the test when renewing a security clearance. There is no 365/24/7 continuous reevaluation process. Of course records checks are done, a felony arrest properly documented might pop up, and many agencies yearly run standard credit checks and conduct random drug tests. But overall, absent something self-reported or too obvious to ignore, a clearance rides for five years, sometimes literally with no questions asked. How could it be otherwise with over five million active cleared Americans strung across the globe?
It doesn’t always work out. As happened following the process’ failure with people like Edward Snowden, Chelsea Manning, now with Air National Guardsman Jack Teixeira, much noise will be generated about “doing something” to fix the clearance process. But what?
Dramatically increasing the number and scope of on-the-street investigations as part of background checks will spiral wildly into crazy expenses and even longer waiting periods to complete clearances. It could bring the hiring process to its knees, and spawn more and more “temporary clearances,” a self-defeating act. This all with no assurance of better results due to both limitations on the whole concept (past behavior in a wholly different environment like high school may not be indicative of future intent under real-world pressures, as in the Teixeira and Manning cases) or simply human judgment errors. If done properly, such changes might even catch a few of the Teixeira’s out there, but to be honest, there are few Teixeira’s out there to begin with and most of them will be sending up obvious danger signals at work for a long time if anyone would pay attention before a clearance review catches up.
In the interest of never letting a good crisis go to waste, the Biden Administration is now reportedly planning to increase its surveillance of social media and online chatrooms, as if not understanding the internet is a very big place. It is certain that many more in government will call for more aggressive “monitoring” of employees, having them sign away basically all of their civil rights in return for a job. The government will turn its vast intelligence gathering tools further inward and end up pointlessly compiling CIA officers’ credit card receipts from Applebee’s, the web browsing habits of diplomats’ children, and so forth. In truth, a lot of that is probably already going on now anyway (the CIA and other intel agencies have had for years robust counterintelligence operations designed specifically to spy on their own spies.) But you just can’t see into a person’s head, or his heart, via his bank account.
In addition to a huge waste of money and resources, these measures will inevitably lead to more mistrust and paranoia inside government. Lack of sharing (the CIA believes things it shares with State get leaked, the Army won’t give things away to the Navy, the FBI hoards info so as to not let another part of the Department of Justice get credit for a bust, the NSA doesn’t trust anyone, and so forth) is already an issue among agencies, and even inside of agencies, and helped pave the way for 9/11.
In addition, handing even more power to security teams will also not work well in the long run. Hyper-scrutiny will no doubt discourage more decent people from seeking government work, unwilling to throw their lives open for a job if they have prospects elsewhere. The Red Scare of the 1950s, and the less-known Lavender Scares, when labeling someone gay inside government would see him fired, show what happens when security holds too many cards. James Jesus Angleton’s paranoid mole hunting at CIA, which ruined many careers, is still a sore point at Langley. No, unleashing the bullies won’t help.
As a wise man once said, cut through all the lies and there it is, right in front of you. The only answer to the clearance problem is to simply require fewer cleared people inside government.
This will require the tsunami of document classification to be dammed. In FY2009 alone, 54 million U.S. Government documents were classified. Every one of those required cleared authors and editors, system administrators and database technicians, security personnel, and electronic repair persons. Even the cafeteria personnel who fed them lunch needed some sort of vetting.
With fewer people to clear because there is less classified material to begin with, always-limited resources can be better focused. Better background checks can be done. Corners need not be cut, and unqualified people would not be issued clearances out of necessity. Processing time would be reduced. Human judgment, always the weak link, could be applied more slowly and more deliberately, with more checks and balances involved.
More monitoring won’t help and will very likely hurt. In a challenge as inherently flawed as the clearance process, the only way forward is less, not more.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Why hasn’t the U.S. government arrested WaPo journalist Shane Harris for publishing highly classified documents related to the war in Ukraine and U.S. spying on its allies? The ones leaked by Air national Guardsman Jack Teixeira?
The documents contain significant revelations. Among other secrets, they show the CIA recruited human agents privy to the closed-door conversations of world leaders, reveal eavesdropping that shows a Russian mercenary outfit tried to acquire weapons from NATO ally Turkey to use against Ukraine, explained what kind of satellite imagery the United States uses to track Russian forces, and made clear U.S. and NATO have special forces on the ground inside Ukraine.
Why Shane Harris is not in jail has a long history, and a complex answer. In 1971, Daniel Ellsberg leaked the Pentagon Papers, a secret U.S. government-written history of the Vietnam War, to the New York Times. No one had ever published such classified documents before, and reporters at the Times feared they would go to jail under the Espionage Act (the same law under which Jack Teixeira is charged.) A federal court ordered the Times to cease publication after initial excerpts were printed, the first time in U.S. history a federal judge censored a newspaper via prior restraint. In the end, the Supreme Court reversed the lower courts and handed down a victory for the First Amendment in New York Times Company v. United States. The Times won the Pulitzer Prize. Ever since media have published national security secrets as they found them.
Law professor Steve Vladeck points out “although the First Amendment separately protects the freedom of speech and the freedom of the press, the Supreme Court has long refused to give any separate substantive content to the Press Clause above and apart from the Speech Clause. The Supreme Court has never suggested that the First Amendment might protect a right to disclose national security information. Yes, the Pentagon Papers case rejected a government effort to enjoin publication, but several of the Justices in their separate opinions specifically suggested that the government could prosecute the New York Times and the Washington Post after publication, under the Espionage Act.”
The Supreme Court left the door open for the prosecution of journalists who publish classified documents by focusing narrowly on prohibiting prior restraint. Politics and public opinion, not law, has since kept the feds exercising discretion in not prosecuting the press, a delicate dance around an 800-pound gorilla loose in the halls of democracy.
The closest an American journalist ever came to being thrown in jail was in 2014, when the Obama administration subpoenaed New York Times reporter James Risen. They then accused former CIA officer Jeffrey Sterling of passing classified information to Risen. After a lower court ordered Risen to testify and disclose his source under threat of jail, the Supreme Court turned down his appeal, siding with the government in a confrontation between a national security prosecution and an infringement of press freedom. The Supreme Court refused to consider whether the First Amendment implied a “reporter’s privilege,” an undocumented protection beneath the handful of words in the Free Press Clause.
In the end, the Obama administration, fearful of public opinion, punted on Risen and set precedent extra-judicially. Waving a patriotic flag over a messy situation, then-attorney general Eric Holder announced that “no reporter who is doing his job is going to go to jail.” Risen wasn’t called to testify and wasn’t punished for publishing classified material, even as the alleged leaker, Jeffrey Sterling, disappeared into prison for three and a half years. To avoid creating a precedent that might have granted some form of reporter’s privilege under the Constitution, the government set a different precedent and stepped away from the fight. That’s why Shane Harris of the Washington Post isn’t under arrest right now. For traditional media American journalists like Shane Harris, the Risen case was a turning point.
Meanwhile Wikileaks’ Julian Assange is under arrest, rotting away in his fifth year in a UK prison fighting extradition to the United States. There are complex legal questions to be answered about who is a journalist and what is publishing in the digital world — is Assange himself a journalist like Risen or a source for journalists like Sterling was alleged to be? There is no debate over whether James Risen is a journalist and whether a book is publishing. Glenn Greenwald has written about and published online classified documents given to him by Edward Snowden, and has never been challenged by the government as a journalist or publisher.
Assange isn’t an American, so he is vulnerable. He is unpopular, drawn into America’s 21st-century Red Scare for revealing the DNC emails. He has written nothing alongside the primary source documents on Wikileaks, has apparently done little curating or culling, and has redacted little. Publishing for him consists of uploading what has been supplied. The government would argue Assange is not entitled to First Amendment protections simply by claiming that a mouse click and some web code isn’t publishing and Assange isn’t a journalist. The simplest interpretation of 18 U.S.C. § 793(e) of the Espionage Act, that Assange willfully transmitted information relating to national defense without authorization, would apply. He would be guilty, same as the other canaries in the deep mine shaft of Washington before him, no messy balancing questions to be addressed. And with that, a unique form of online primary source journalism would be made extinct.
And that really, really matters. Wikileaks sidestepped the restraints of traditional journalism to bring the raw material of history to the people. Never mind whether or not a court determined disclosure of secret NSA programs which spied on Americans disclosure was truly in the public interest. Never mind the New York Times gets a phone call from the President and decides not to publish something. Never mind how senior government officials are allowed to selectively leak information helpful to themselves. Never mind what parts of an anonymous technical disclosure a reporter understood well enough to write about, here are the cables, the memos, the emails, the archives themselves. Others can write summaries and interpretations if they wish (and nearly every mainstream media outlet has used Wikileaks to do that, some even while calling Assange and his sources traitors), or you as an individual can simply read the stuff yourself and make up your own damn mind about what the government is doing. Fact checks? There are the facts themselves in front of you. That is the root of an informed public, through a set of tools and freedoms never before available until the internet created them.
Allowing these new tools to be broken over the meaning of the words journalist and publishing will stifle all of what’s left of the press. If Assange becomes the first successful prosecution of a third party under the Espionage Act, the government can then turn that precedent into a weapon to aggressively attack the media’s role in national security leaks. Is a reporter, for example, publishing a Signal number in fact soliciting people to commit national security felonies? Will media employees have to weigh for themselves the potential public interest, hoping to avoid prosecution if they differ from the government’s opinion? The Assange case may prove to be the topper in a long-running war of attrition against free speech.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Despite all the precautions and double-checks, at some level it ends up a matter of trust. And in the case of Air National Guardsman Jack Teixeira, much of that trust was violated. Why couldn’t the military trust him? Why do we have to trust him?
The charging documents against Jack Teixeira, 21-year-old going on 14-year-old airman first class who is accused of leaking classified documents, indicate that he was granted a top-secret security clearance in 2021, which was required for his job as a computer network technician in the Massachusetts Air National Guard. While that may sound like an exceptional degree of access for such a junior service member, having top secret/SCI (sensitive compartmented information) clearance in that kind of job is standard. Other recent celebrity leakers were of a similar age and experience; NSA leaker Reality Winner was arrested at age 26. Edward Snowden did his leaking from the NSA and CIA in his early thirties, and Chelsea Manning was only 22 when she exposed massive amounts of State Department and U.S. military data via Wikileaks. With the exception of Winner, all worked as network engineers of some sort, sitting at the electronic nexus between the producers of intelligence and the consumers. There is no place elsewhere on the network which offers greater visibility. Think of how much water a plumber watches pass by as he fixes your pipes.
Though each leaker had all the requisite background checks, at their young ages there wasn’t much background to check. Teixeira joined the military at age 20 and so, like Manning and others, his suitability for a clearance was based mostly on what kind of kid he was in high school. It is unclear what a better clearance system would look like, but it is equally clear the current one has some holes in it. Right now things are based mostly on a matter of trust.
Teixeira violated the trust put in him in a number of ways, the most significant was the actual leaking of highly classified documents. The manner in which he appears to have obtained the documents, however, suggests other steps of breach of trust along the way. The documents as they appeared online on that Discord gaming and chat server appear to be photographs of classified documents. This makes sense; the military networks are physically isolated from the outside world and so electronic outloading secrets is near impossible. If a classified document is physically printed, as in the case of the Reality Winner leaks, a secret source code is surreptitiously embedded and can be traced back to the printer. In both Manning’s and Snowden’s cases some sort of storage device was illegally brought into the secure area, in Manning’s case a read/writable CD-ROM. What Snowden used has never been publicly disclosed though Oliver Stone’s film Snowden postulates it was some sort of media smuggled in and out via a Rubik’s Cube. Teixeira seems to have acquired classified documents printed by someone else and taken cell phone photos of them, either at work or, based on the daily detritus in the frames, at home. Teixeira was trusted not to bring a phone into his secured area and not to take documents out. He violated these trusts to try impress some online friends with the level of access he had.
Here things are on more traditional ground. Standard spy tradecraft says someone will betray their country for one or more of a fairly standard set of reasons, MICE: money, ideology, compromise and ego, with the kid Teixeira solidly on the square marked “ego.” It’s easy to screen out the drunks and gamblers and bankrupt, harder to figure out who is doing it for themselves.
But what other matters of trust were breached in the short saga of Jack Teixeira? The MSM soiled itself once again, proving to be more a tool of the state rather than a way to inform the people about what their government is up to. Most of the MSM joined with online pundits in first claiming the Teixeira documents were fakes, or at least grossly altered. When the story first appeared Reuters claimed, based on anonymous sources, that Russia was behind it. When the documents’ veracity became too obvious to ignore, the MSM switched over into claiming whatever the documents said, it was not very important, just things everyone sort of already knew (they did the same with the Snowden info.) Then despite the documents being of no great importance, when instructed from the White House briefing podium that the documents do not belong on the front pages of American newspapers, the documents were taken off line by the MSM and replaced with blurred images. Based on publicly available information, the New York Times and Washington Post tracked down the leaker before the FBI did, practically outing him on page one for the Feds. The trust between the press and its role in a democracy, and the people, was treated with the same callousness as the trust between Teixeira and the military.
As for other matters of trust, the Teixeira documents show that post-Snowden the U.S. still spies on its allies. Snowden revealed American spying in Western Europe, for example, was down to the level of listening in on world leaders’ personal cell phones, and that in Asia the entire Japanese phone system was compromised. Teixeira reveals the U.S. listens in on Cabinet-level internal discussions in South Korea, and on high-level deliberations in Egypt (who, speaking of matters of trust) appeared to be planning on selling arms to Russia while at the same time being the second largest recipient of U.S. foreign aid. The U.S. also listened in on Jordan’s Crown Prince Hussein and of course ally Ukraine. There was no trust despite public pronouncements of common goals and joint efforts.
But the biggest breach of trust revealed by the Teixeira documents is between the U.S. government and the people. The leaked documents show despite claims to the contrary, there are American (special) forces on the ground in Ukraine, catching the president in a solid lie. Other NATO forces have military personnel on the ground as well, dramatically risking wider conflict even as the president begs the American people to believe all that the U.S. is doing is passively supplying weapons to Ukraine. We also learn that any pronouncements of optimism that Ukraine may force back its Russian invaders cannot be trusted; the documents show U.S. intelligence assesses the much-vaunted spring counteroffensive by Ukraine will likely fail, and that the war writ large will continue into 2024. Not only does this show administration claims of progress to be false, it raises the possibility deeper American involvement will be necessary and likely.
It is a familiar story. The sum of the Manning leaks showed the American government could not be trusted to tell the truth about progress in the Iraq and Afghan wars (echoing the Daniel Ellsberg leaks about Vietnam known as the Pentagon Papers.) The sum of the Snowden leaks was to show the American government could not be trusted when it claimed to not spy domestically on its own citizens, or on its closest allies abroad. It becomes a sad state of affairs where we the people end up trusting leakers, people by definition untrustworthy, to accurately and completely tell us what our own government is doing behind the always happy public announcements. If the leaked documents matched the public statements there would be nothing to say, indeed, no point in leaking, for the adolescent dork or the self-styled crusader. But it never works that way.
So when we ask why we cannot trust kids like Jack Teixeira to follow the rules and earn the trust granted them, we need to look broader, at a military-government system that pretends to be based on trust while lying its pants off. That’s how Teixeira probably grew up seeing things, you can trust me.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
I was shadow banned by Twitter, even after my suspended account was restored. What is it with these people? What are they so afraid of?
Things are changing fast under new owner Elon Musk, but using available free tools a few days ago I found my new account @PeterMVanBuren has been electronically censored. Specifically, using a tool called Shadow Bird, I learned my tweets have been subjected to Reply Deboosting. This means my replies on tweets will be hidden behind a “Show More” button for accounts that don’t follow me. This is particularly frustrating because it essentially silences me except among people who already know and usually agree with me. It makes it nearly impossible to build followers; they have to stumble on to my tweets or come looking for me based on something they have seen online. It is a very effective way of shutting someone up without leaving more than a paranoid’s slime trail behind, until now.
After years of denying such manipulation (“Paranoid much, dude?”) Elon Musk has made public information showing Twitter has been subjecting mostly conservative voices to search suggestion bans, search bans, ghost bans ( blocking content from an online community in such a way that the ban is not readily apparent to the user) and reply deboosting. Though directed at a variety of users, the bans have disfavored voices from the right and in all cases were implemented without notice to the user and without a chance for any form of process or arguing back. Yes, yes, Twitter is a private company and not subject to the 1A, but the moment they became a private company with the ability and now the demonstrated willingness to influence presidential elections their business became everyone’s business. Extensive Twitter threads posted by Matt Taibbi and Bari Weiss revealed that the company was essentially part of a coordinated Democratic suppression operation and actively colluded with the FBI to destroy Donald Trump and assure Joe Biden’s election. Which is why, as Elon Musk observed, “Twitter is both a social media company and a crime scene.”
In his novel 1984, George Orwell suggested a diabolical solution to the problem of censorship. He conjured up a technological device for the world of Big Brother that he called “the memory hole.” In his dark future, armies of bureaucrats, working in what he dubbed the Ministry of Truth, spent their lives erasing or altering documents, newspapers, books, and the like in order to create an acceptable version of history. When a person fell out of favor, the Ministry of Truth sent him and all the documentation relating to him down the memory hole. Every story or report in which his life was in any way noted or recorded would be edited to eradicate all traces of him. Same for ideas. A purity of thought, a world in which negative news such as about Hunter Biden’s laptop simply did not exist, was created.
In Orwell’s pre-digital world, the memory hole was a vacuum tube into which old documents were physically disappeared forever. Alterations to existing documents and the deep-sixing of others ensured that even the sudden switching of global enemies and alliances would never prove a problem for the guardians of Big Brother. In the world he imagined, thanks to those armies of bureaucrats, the present was what had always been — and there were those altered documents to prove it and nothing but faltering memories to say otherwise. Anyone who expressed doubts about the truth of the present would, under the rubric of “thoughtcrime,” be marginalized (shadow banned) or eliminated (search banned.) What is scary is not how Orwell differs from Twitter, but how much the same they are. 1984 was not supposed to be an instruction manual.
Through my Foreign Service career I served in and visited countries that practiced overt government censorship. Critics of the regime would be punished, the least physical of which method was usually the most effective, simply finding ways to stop them from publishing. No newspaper or broadcasting station would take their work, to the point where they found themselves unable to hand out photocopied pamphlets on street corners. What astounded me was not the censorship per se, that was easy to understand no matter how abhorrent, but the degree of detail. As with Iran’s “appearance” morality people who look for any wisp of hair peaking out from beneath a hijab, no subversive thought is too small, no objectionable material too minor to stomp on. It is the pervasiveness of evil, its level of detail, that makes it so wrong. A dictator need not disappear a troublesome person anymore, just his ideas. The need to murder Jamal Khashoggi was a failure of Internet technology.
I hate using Twitter but am expected to post my articles there and try to build a following of readers. Even after restoring me to Twitter after my original account with several thousand followers was shut down, somewhere deep within the Ministry of Twitter someone still thought I must be a threat of some kind, and electronically made sure I would never amass as large a following again, all via reply deboosting. I was a thought threat as far as Twitter was concerned and I had to be dealt with. I had made about 50 Tweets and a few RTs; is there some sort of naughty not nice list?
Of course what Twitter (and no doubt other social media sites) has been doing is small stuff. For the future, look to Google and negative search strategy. Here’s how a negative search strategy works, even if today its focus — largely on pedophiles — is easy enough to accept. Google uses software which makes it harder for users to locate child abuse material. Google Search has been “fine-tuned” to clean up results for more than 100,000 insider terms, many supplied by law enforcement, used by pedophiles to look for child pornography. Now, for instance, when users type in queries that may be related to child sexual abuse, they will find no results that link to illegal content. Instead, Google will redirect them to counseling sites. “We will roll out these changes in more than 150 languages, so the impact will be truly global,” Google claims.
While Google is redirecting searches for kiddie porn to counseling sites, the NSA has developed a similar ability. The agency already controls a set of servers codenamed Quantum that sit on the Internet’s backbone. Their job is to redirect “targets” away from their intended destinations to websites of the NSA’s choice. The idea is you type in the website you want and end up somewhere less disturbing to the agency. While at present this technology may be aimed at sending would-be online jihadis to more moderate Islamic material, in the future it could, for instance, be repurposed to redirect people seeking news to an Al-Jazeera lookalike site with altered content that fits the government’s version of events. Or making sure no one saw an article about Hunter Biden’s laptop. Or hiding the latest revelations from social media.
Back on Twitter, welcome to @MoonmanCartoons, an account featuring the conservative editorial cartoons of Robert Mooney. Mooney has all of 88 followers yet is subject to Twitter’s reply blocking and search suggestion ban, making it impossible for him to build followers. He posts a cartoon and less than 100 people see it; why bother, Twitter?
“Why would they censor us ‘small fish?’ Mooney asked TAC in an interview. “I think there are a couple of reasons, the first of which is simply because they can. If the technology exits, why wouldn’t they use it to achieve their objectives? Also, I think they may see some people at our level as potentially influential if they don’t nip us in the bud. Despite the censorship, I’ve occasionally slipped one by the goalie. For example, when Dinesh D’Souza retweeted one of my cartoons about 2020 election fraud, I got almost 1400 likes and 439 retweets. That sort of thing is rare, but it’s happened a few times, showing that I have a potential receptive audience out there.”
“As for whether this is similar to other nations that censor, I’ve felt for months that where we are in the U.S. right now with regard to censorship and the criminalization of political opposition is the American equivalent of Germany 1933. Obviously it’s not an exact duplication of the dawn of the Third Reich, but if we keep going down this road, we will end up with a country very different from what we’ve known for over two centuries and from what the Founders intended — and not different in a good way.”
As they say, it starts with the small stuff. Like Twitter.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
The New York Times ran an article on the use of surveillance tech in China. One wishes they would do the same for the U.S.
The NYT article came to some scary conclusions about autocratic China. Chinese authorities implement facial recognition tech everywhere they can, the police seek to connect electronic activity (making a call) to physical location, biometric information such as fingerprint and DNA is collected on a mass scale, and the government wants to tie together all of this data to build comprehensive profiles on troublesome citizens. The latter is the Holy Grail of surveillance, a single source to know all there is known about a person.
Should the Times (or China) wish to expand its review of invasive government surveillance technology, particularly those technologies which integrate multiple systems, it need look no further than its hometown police force, the NYPD, and data aggregated into the little-known Consular Consolidated Database (CCD) by the U.S. State Department.
Prior to 2021, when the New York City Council passed the Public Oversight of Surveillance Technology (POST) Act, citizens were left to piece together the various technologies used to surveil them based on scattered media reports. We know now the NYPD deploys facial recognition surveillance (and can retroactively employ facial recognition against video saved from one of 20,000 cameras), x-ray vans, Stingrays, ShotSpotters, and drones, among others, equipment all originally deployed in the Iraq and Afghan wars. But we still don’t know how many of these technologies are used in coordination with each other, and, as in China, that is the key to understanding their real effectiveness.
POST reporting and other sources offer some clues. The NYPD uses the smartphone-based Domain Awareness System (DAS), “one of the world’s largest networks of cameras, license plate readers, and radiological censors,” all created by Microsoft with video analytics by IBM. DAS also utilizes automated license plate reader (ALPRs) devices attached to police cars or fixed on poles to capture the license plates of all cars passing by. ALPRs can also capture photographs of cars, along with photos of the driver and passengers. This information is uploaded to a database where it can be analyzed to study movements, associations, and relationships. Facial Identification can then run photos, including from databases of arrest photos, juvenile arrest photos of children as young as 11, and photos connected to handgun permits. The system analyzes an image against those databases and generates potential matches in real-time.
Included in DAS is a translator application which helps officers communicate with community members who do not speak English, while of course also recording and storing their remarks. DAS ties in to ShotSpotter, a technology developed for the Iraq War which pinpoints the sound of gunfire with real-time locations, even when no one calls 911. This technology triangulates where a shooting occurred and alerts police officers to the scene, letting them know relevant information, including the number of shots fired, if the shooter was moving at the time of the incident (e.g., in a vehicle), and the direction of the shooter’s movement. DNA data can also be accessed, so wide-spread collection is a must. One area of activity outlined in Chief of Detectives Memo #17 instructs on how to collect “abandoned” DNA samples from objects such as water bottles, gum, and apple cores. For example, police officers are taught to wait for the suspect to take a drink or smoke, and collect the sample once a suspect throws the cup or butt away.
What is deployed in New York to aggregate sensor and bio data (including social media monitoring and cell phone locator services, which when tied to facial recognition can identify individuals, say who attend a protest, visit an AIDs clinic, etc.) will no doubt be coming soon to your town as the weapons of war all come home. The next step would be to tie together cities into regional and then state-wide networks. The extent to which information obtained from DAS is shared with federal agencies, such as immigration authorities, remains unknown. What we do know is the phrase “reasonable expectation of privacy” needs some updating.
Perhaps the largest known data aggregator within the Federal government is the innocent-sounding Consular Consolidated Database (CCD) administered by the U.S. Department of State. Originally a simple database created in the 1990s to track visa and passport issuances, the CCD is now one of the largest global databases of personal information, growing at a rate of some 35,000 records a day. The system collects data from both foreign visa applicants and American citizens to include but not limited to imagery for use with facial recognition, biometric data such as ten-fingerprint samples, home/business addresses, phone numbers, email addresses, financial information, race, gender, social security and alien registration numbers, passport information, certain Federal benefits, medical information, legal information, education information, family information, travel history, arrests and convictions, and social media indicators.
The CCD is especially valuable in that it is a database of databases, pulling together information collected elsewhere including abroad, as well as from some commercial databases and public records, and making the aggregate available both for individual search by identifiers like name, social security number or facial recognition, but also for very large scale analytic searches to identify patterns and trends. This massive pool of data is then made accessible to the Department of Homeland Security, Department of Commerce, Department of Defense, Department of Justice, Office of Personnel Management, Federal Bureau of Investigation, and “other interagency partners” to include potentially intelligence services. In addition to the State Department, information is regularly input into the CCD by the FBI, the Integrated Automated Fingerprint Identification System, DEA, ICE, IRS, DOD, Treasury, Health and Human Services (HHS), DHS, Interpol, and U.S. Marshal Service (USMS.)
Numbers of records held by CCD are not available, with the last public tallies documented in 2016 showing 290 million passport records on American citizens, 25 million records pertaining to American citizens living abroad, 184 million visa records of foreigners, and over 75 million photographs. Some 35,000 records are added to the CCD daily, so do the math given the existing tallies are up to 13 years old. As a point of comparison, Google’s database of landmark photos holds only five million records. The Library of Congress database lists 29 million books.
The New York Times article about surveillance in China is scary, showing what a vast, interconnected system is capable of doing in exposing a person’s life to scrutiny. The Chinese authorities are, however, realistic about their technological limitations. According to one bidding document, the Ministry of Public Security, China’s top police agency, believed one of their biggest problems was data had not been centralized. That Chinese problem appears well on its way to resolution inside the United States, and that is also quite scary.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
If you still dismiss “Russiagate,” the Dossier, Alfa Bank, and the Yota Russian smartphone events surrounding Donald Trump, the 2016 campaign, and the Mueller investigation, you may want a second cup of coffee. The latest filing by Special Consul Robert Durham suggests the rabbit hole goes a bit deeper. I hate to sound like Rachel Maddow, but it is just that much more likely the walls are closing in.
Durham filed a new, 34-page motion on April 15, 2022, in answer to defendant Michael Sussman’s request to dismiss the case against him. Durham accused Sussmann of lying to the FBI about his working for the Clinton Campaign while he was trying to sell the Bureau on opening an investigation into Trump’s ties to Russia, focusing on alleged Internet pings between a Trump server and the Russian Alfa Bank. Sussmann’s claims included a number of pings against Trump Tower WiFi and later White House WiFi by a Russian-made Yota cellphone. Sussmann’s motion basically called Durham case garbage, which pressed Durham to explain to the court why the case needed to proceed, hence the new motion (the court subsequently ruled against Sussmann and the trial will commence soon.)
But as he has done in the past, Durham used the required motion filing as a chance to tip over a few of the cards he is holding. It looks like aces.
Durham previously established CIA knew about what we’ll call “Russiagate” as of at least July 2016 and briefed President Obama on the same only five days before the FBI’s Crossfire Hurricane full-spectrum investigation into Trump/Russia began. The new filing adds the next chapter. Sussmann met with unknown persons at CIA to tell them a Russian Yota cellphone seemed to be following Trump around, attempting to log into the WiFi network wherever he was. This included Trump Tower and later the White House. At January and February 2017 CIA meetings Sussmann claimed the phone “appeared” in April 2016 (coincidentally right around the time the DNC hack supposedly took place) and even “appeared with Trump in Michigan” when he was interviewing a future Cabinet secretary. Sussmann went on to disingenuously claim to CIA the Yota smartphone model used is often gifted to Russian officials. He also claimed his client was a Republican.
The problem was the information Sussmann passed to the FBI was fake. Phony. Made -up. Fabricated, much like the Dossier. CIA “concluded in early 2017 Russian Bank-1 data [Alfa] and Russian Phone Provider-1 [Yota] data was not “‘technically plausible,’ did not ‘withstand technical scrutiny,’ ‘contained gaps,’ ‘conflicted with [itself]’ and was ‘user created and not machine/tool generated.’” Reuters‘ own tech people also said they could not authenticate the data and passed on the story. While CIA declined to open an investigation based on such data, the FBI did, leaving open additional questions on whether or not the FBI was technically unschooled, or in on the greater conspiracy.
This new information also begs the question of why Robert Mueller or DOJ Inspector General Michael Horowitz did not ask why the FBI was so easily fooled when their cousins across the river (and some journalists) saw through the grift. The FBI were warned — on September 7, 2016 the CIA sent FBI Director James Comey and Peter Strzok a warning Hillary Clinton approved a plan to tie Trump to Russia to distract from her email scandal. Then only 12 days later Sussmann approached the FBI, who despite the heads-up, took the hook. About a month later the courts issued the first FISA warrant. Hillary Clinton tweeted “Computer scientists have apparently uncovered a covert server linking the Trump Organization to a Russian-based bank.”
This would also raise questions about Michael Sussmann and his role representing the Democratic National Committee and the DNC server hack. Careful research by retired NSA persons suggested the server was accessed from inside the U.S., not hacked from Russia as widely alleged. If there is truth to that, would the same people who fabricated complex DNS and WiFi log data (i.e., good enough to fool the FBI) have been capable of making a local hack look international? One hates to go down the conspiracy road, but is Julian Assange, whose Wikileaks released some of the DNC emails, imprisoned in part because he could prove his source for the hacked emails was not Russian, as he has claimed?
Who knows, right? Maybe Researcher-2 (identified elsewhere as David Dagon of Georgia Tech, whose research focus is Botnets.) Dagon previously bragged of using a “bag of tricks” to prove Trump-Russia collusion.) Durham granted Researcher-2 immunity to “uncover otherwise-unavailable facts underlying the opposition research project.” Durham also granted immunity to someone at Fusion GPS, the front organization that moved money from the DNC/Clinton Campaign to both Dossier author Christopher Steele and Alfa/Yota pitchman Michael Sussmann. The Fusion person is likely Laura Seago. Seago helped sell the fake Alfa data to Slate.
Earlier articles established the Alfa/Yota conspiracy mirrored the Dossier conspiracy in style, funding, and execution. This new information from Durham adds now as with the Dossier, the Alfa/Yota data was faked. The commonalities between the two as yet legally unlinked conspiracies strongly suggests a common backstage element. We spoke with a former U.S. intelligence officer about what would be involved in managing an operation this size, Alfa, Yota, Dossier, etc., liaison with the FBI, all the media planted bells and whistles, but just the admin side, not the actual spy work. She said it would be a very large job, likely bigger than many overseas stations would take on, something that would need its own working group in Washington. She said keeping the finances clean but covert alone would be a near full-time job.
So what does it all mean? Special Counsel Durham is revealing a relentless effort by Democrats to sell the Russia collusion narrative across the U.S. government from CIA to the FBI, to the point where in the absence of derogatory information they created it. The Democrats then enlisted (to date…) Christopher Steele and Michael Sussman to peddle the false information across Washington in hopes of stirring someone in the intelligence community to turn their vast resources on Trump to find actual dirt. The whole venture failed in the initial sense — Trump was elected and completed his term — but large numbers of Americans still believe in whole or in part Trump is somehow allied with the Russians, a hangover likely to last into the next election.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
We are looking for two smoking guns now in connection with Russiagate. Today’s Part I will show Hillary Clinton herself sat atop a large-scale conspiracy to use the tools of modern espionage to create and disseminate false information about Trump. Part II to follow will show the FBI was an active participant in that conspiracy.
In summer 2016 Hillary Clinton’s private email server and her improper handling of classified information was the political story. Consensus was the election was Hillary’s to lose, that her opponents in general and especially the Trump clown show, could not stop her. Despite the MSM’s heroic attempts to downplay the importance of the emails, the issue lingered in the public mind, often aided by Hillary’s own contradictory statements. The emails nagged at the Clinton campaign — her unsecured server lay exposed during her SecState trips to Russia and China, and the deepest fear was that her internal communications might appear one day on Wikileaks, ending her career.
Clinton fought back. The initial shot was fired on July 24, 2016 by campaign manager Robby Mook, who was the first to claim there was a quid pro quo between Trump and Russia. “It was very concerning last week that Donald Trump changed the Republican platform to become what some experts would regard as pro-Russian,” Mook said, referring to a false story from the GOP convention just a few days earlier. The New York Times sent up a warning flare to all MSM media the next day announcing Clinton was making the Trump-Russia allegation a “theme” of the campaign. As if she knew just what was coming next, Hillary took that as her cue to claim the Russians were trying to destroy her campaign, a theme which soon morphed into the Russians were trying to help Trump. That soon became Trump and Putin were working in collusion to elect Trump as a Manchurian candidate.
A prime driver behind all this was a mysterious “dossier.” The jewel in the crown was a “pee tape,” blackmail, kompromat, Moscow held to control Trump. Word was a former MI-6 intelligence officer named Christopher Steele compiled the dossier, giving the whole thing credibility. America media openly speculated on Trump’s imminent arrest for treason, with Twitter aflutter with phrases like tik-tok, walls closing in, and the like. The FBI’s James Comey and CIA’s John Brennan briefed the newly-elected Trump on the dossier simultaneously with the full contents spilling into the media. Talk shifted to impeachment, alongside claims Hillary might still deserve to be president.
We know now the dossier was fiction. Steele’s raw information was provided by the Clinton campaign, with his chief source working for the Brookings Institute. Steele worked as a double-agent, feeding Clinton-paid for fake info to the FBI pretending he was an FBI informant with sources deep inside Mother Russia. The dossier was a product of the Clinton campaign.
We also now know the Clinton campaign, via one of its lawyers, Michael Sussmann, gathered Internet DNS data on Trump and used that to create a fully fictional story about Trump using a secret server connected to the Alfa Bank to communicate with his Russian “handlers.” Sussmann also peddled a false story about Russian smartphones connecting into the Trump White House. We know Sussmann hid his relationship to Clinton from the FBI, pretending to be a “concerned citizen.” Sussmann is under indictment by Special Counsel John Durham, and in his own defense filing does not dispute the basic facts. He only claims his lying was immaterial.
Both the dossier op and the DNS op were funded by Clinton campaign money laundered through its lawyers at Perkins Coie and then contractors Fusion GPS and Orbis. In both instances the false information created was peddled to the FBI (and CIA) by a Clinton-paid stooge pretending not to be affiliated with the campaign, Steele as an FBI informant and Sussmann as a “concerned citizen.” Both ops used a sophisticated information sub-op, feeding the media as if Steele and Sussmann were not the source and then having Steel and Sussmann step in to serve as anonymous confirmers, an inside loop. In both instances the FBI took the bait and opened unprecedented full-spectrum investigations into first Candidate Trump, and then President of the United States Trump.
Four years after all that, on October 6, 2020, Director of National Intelligence John Ratcliffe declassified documents revealing then-CIA Director John Brennan briefed then-President Obama on or about July 28, 2016 on Hillary Clinton’s plan to tie Candidate Trump to Russia as a means of distracting the public from her use of a private email server.
The highly-redacted document says “We’re getting additional insight into Russian activities from [REDACTED]. Cite alleged approved by Hillary Clinton on July 26 a proposal from one of her foreign policy advisers to vilify Donald Trump by stirring up a scandal claiming interference by the Russian security service.”
Ratcliffe in 2020 also revealed in September 2016 the CIA forwarded to the FBI an investigative referral on Hillary Clinton approving “a plan concerning U.S. presidential candidate Donald Trump and Russian hackers hampering U.S. elections in order to distract the public from her email scandal.”
The MSM at the time dismissed these two important disclosures as unverified disinformation. The problem with simply waving away these documents is the very high threshold for information to actually reach the president. Every day a near-infinate amount of information is collected by the CIA. A tiny percentage of that is culled for the standing Agency briefings the president receives. An even tinier subset is seen as important and credible enough to be personally briefed by the CIA Director face-to-face with the president.
Rarely is there near-time “verification” with intelligence. There is however “confidence,” how sure the CIA is the information is true, and the Director would not waste his boss’ time with that of low or medium confidence (and neither would the Agency do the same in sending its referral on to the FBI.) Knowing what we know now about Clinton campaign funding of the ops and Clinton personnel involvement, Brennan’s confidence is better understood. And it is important to remember Brennan openly supported Hillary; he was not the guy to dish dirt on her. He was making sure his boss, Barack Obama, had a heads up if the whole thing was ever exposed.
There is also the matter of Ratcliffe, who hand-selected the documents to declassify, lending them more credibility. Why play high stakes with information Radcliffe knew to be false?
One last concern has been that the CIA source appears to be foreign, and therefore suspect. The CIA is legally prohibited from spying on Americans in America, particularly something as sensitive as a presidential campaign. Even if tipped off by an American, the CIA would need to go overseas and recreate the info with a foreign source. That the information was available through a foreign source also suggests strongly Moscow had eyes on inside the Hillary campaign. Perhaps through her email?
Both ops ran on Clinton’s money and Clinton’s people. The smoking gun of Brennan’s notes ties it all to Hillary herself.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Reporters joke the easiest job in Washington is CIA spokesman. You need only listen carefully to questions and say “No comment’ before heading to Happy Hour. The joke, however, is on us. The reporters pretend to see only one side of the CIA, the passive hiding of information about itself. They meanwhile choose to profit from the other side of the equation, active information operations designed to influence events in America. It is 2021 and the CIA is running an op against the American people.
Leon Panetta, the Director CIA from 2009 to 2011 explained bluntly his CIA did influence foreign media outlets ahead of elections in order to “change attitudes within the country.” The method, Panetta said, was to “acquire media within a country or within a region that could very well be used for being able to deliver a specific message or work to influence those that may own elements of the media to be able to cooperate, work with you in delivering that message.”
The CIA has been running such information ops to influence foreign elections since the end of WWII. Richard Bissell, who ran the agency’s operations during the Cold War, wrote of “exercising control over a newspaper or broadcasting station, or of securing the desired outcome in an election.” A report on the CIA in Chile boasts the Agency portrayed its favored candidate in one election as a “wise, sincere and high-minded statesman” while painting his leftist opponent as a “calculating schemer.” At one point in the 1980s foreign media insertions ran 80 a day.
The goal is to control information as a tool of influence. Sometimes the control is very direct, simply paying a reporter to run a story, or, as was done in Iraq, simply operating the media outlet yourself (known as the Orwellian Indigenous Media Project.) The problem is such direct action is easily exposed, destroying credibility.
A more effective strategy is to become a source for legitimate media such that your (dis)information inherits their credibility. The most effective is an operation so complex one CIA plant is the initial information source while a second CIA plant acts seemingly independently as a confirming source. At that point you can push information to the mainstream media, who can then “independently” confirm it, sometimes unknowingly, through your secondary agents. You can basically write tomorrow’s headlines.
Other techniques include exclusive true information mixed with disinformation to establish credibility, using official sources like Embassy spokesmen to appear to inadvertently confirm sub details, and covert funding of research and side gigs to promote academics and experts who discredit counter-narratives. The academics may never know where their money comes from, adding to their credibility.
From the end of WWII to the Church Committee in 1976, this was all just a conspiracy theory. Of course the US would not use the CIA to influence elections, especially in fellow democracies. Except it did. By its nature reporting on intelligence always requires one to work with limited information. Always give time a chance to explain.
Through Operation Mockingbird the CIA ran over 400 American journalists as direct assets. Almost none have ever discussed their work publically. CIA documents show journalists were engaged to perform tasks for the CIA with the consent of the managements of America’s leading news organizations. The New York Times alone willingly provided cover for about ten CIA officers over decades and kept quiet about it. Such long term relationships are a powerful tool, so feeding a true big story to a young reporter to get him promoted is part of the game. Don’t forget the anonymous source who drove the Watergate story was an FBI official who through his actions made the careers of cub reporters Woodward and Bernstein. Bernstein went on to champion the Russiagate story. Woodward became a Washington hagiographer. Ken Dilanian, formerly with the Los Angeles Times, the Associated Press, and now working for NBC, maintains a “collaborative relationship” with the CIA.
That’s the tradecraft and the history. The problem for America is once again the tools of war abroad have come home. The intelligence community is currently operating against the American people using established media.
Some of it can’t be more obvious. The CIA always planted stories in foreign media for American outlets to pick up. The Agency works directly with Hollywood to control movies about itself. Turn on any of the advocacy media outlets and you see panels of former CIA officials. Journalist Matt Taibbi even created a list (and since ex-‘s need agency clearance to speak, all are of the officially approved class.) None is more egregious than John Brennan, former Director CIA, who for years touted Russiagate when he knew from information gathered while he was still in office it was all a lie. The uber-lie that Trump was dirty with Russia was leaked to the press most likely by Brennan in January 2017 as the kick off event to the info op still running today.
Brennan’s role is more than speculation. John Durham, the US attorney leading the ongoing “how it happened” Russiagate investigation into the intelligence community, has requested Brennan’s emails and call logs from CIA. Durham is also examining whether Brennan changed his story between his public comments (not under oath, say anything) and his May 2017 testimony to Congress (under oath, watch out for perjury) about the dossier. Reporter Aaron Mate is less delicate, laying out the evidence Brennan was “a central architect and promoter of the conspiracy theory from its inception.” Even blunter is Senator Rand Paul, who directly accuses Brennan of trying “to bring down a sitting president.”
It was all based on nothing but disinformation and the American press swallowed every bit of it, turning the op into a three year tantrum falsely convincing a vast number of citizens their nation was run by a Russian asset. Robert Mueller, whose investigation was supposed to propel all this nothing into impeachment hearings, ended up exercising one of the last bits of political courage Americans will ever see in walking right to the edge of essentially a coup and refusing to step off into the abyss.
The CIA is a learning institution, and recovered well from Russiagate. Details can be investigated. That’s where the old story fell apart. The dossier wasn’t true. But the a-ha discovery was since you’ll never formally prosecute anyone, why bother with evidence. Just throw out accusations and let the media fill it all in for you. The new paradigm included let the nature of the source — the brave lads of the intelligence agencies — legitimize the accusations this time, not facts. Go overt and use the new, unexpected prestige of the CIA as progressive heros to substantiate things.
So in December 2017 CNN reported Donald Trump, Jr. had advance access to the WikiLeaks archive. Within an hour, NBC’s Ken Dilanian and CBS both claimed independent confirmation. It was a complete lie, based on fabricated documents. How do you confirm a lie? Ask another liar.
In February 2020, the Office of the Director of National Intelligence (ODNI) briefed the House Intelligence Committee the Russians were election meddling again to favor Trump. A few weeks earlier, the ODNI briefed Bernie Sanders the Russians were also meddling in the Democratic primaries in his favor. Both briefings were leaked, the former to the New York Times to smear Trump for replacing his DNI, the latter to the Washington Post ahead of the Nevada caucuses to damage Sanders.
In June 2020 The New York Times stated CIA officials concluded the Russians “secretly offered bounties to Taliban-linked militants for killing coalition forces in Afghanistan — including targeting American troops.” The story ran near another claiming Trump had spoken disrespectfully about fallen soldiers. Neither story was true. But they broke around the same time Trump announced his plan to withdraw troops from Afghanistan, aimed at discouraging pro-military voters.
Earlier this month The Washington Post, citing anonymous sources, claimed the FBI gave a defensive briefing to Rudy Giuliani in 2019, before he traveled to Ukraine. Giuliani supposedly ignored the warning. The story was “independently confirmed” by both NBC and The New York Times. It was totally false.
The American system always envisioned an adversarial role for the media. One of the earliest challenges to freedom of the press was the Colonial-era Peter Zenger case, which established the right of the press to criticize politicians free from libel charges. At times when things really mattered and even as other journalists hid under their beds, men like Edward R. Murrow worked their craft to preserve democracy. Same for Walter Cronkite finally reaching his opposition to the Vietnam War, and the New York Times reporters weighing imprisonment to publish the Pentagon Papers.
In each of those instances the handful of reporters who risked everything to tell the truth were held up as heroes. Seeing the Times fighting for its life, the Washington Post co-published the Pentagon Papers to force the government to make its case not just against a rival newspaper, but the 1A itself.
Not today. Journalism is today devoted to eliminating practitioners unwilling to play the game. Few have been targeted more than Glenn Greenwald (with Matt Taibbi as runner up.) Greenwald exploded into a journalistic superhero for his reporting on Edward Snowden’s NSA archive, founding The Intercept to serve as a platform for that work (Greenwald’s downfall parallels Julian Assange, who went from liberal hero for exposing the foundational lies of the Iraq War to zero when his Wikileaks was demonized for supposedly helping Donald Trump.)
Greenwald’s criticism of the media for accepting Deep State lies as truth, particularly concerning Russiagate, turned him into a villian for progressives. MSNBC banned him, and other media outlets ran stories critical of him. Then something very, very odd happened to make it appear The Intercept outed one of its own whistleblower sources. Evidence suggests the source was a patsy, set up by the intel community, and exposed via Matt Cole, one of The Intercept journalists on this story. Cole was also involved in the outing of source CIA officer John Kiriakou in connection with torture claims. Either way new whistleblowers will think twice before turning to The Intercept. Greenwald recently quit the site after it refused to publish his article on Hunter Biden’s ties to China unless he deleted portions critical of Joe Biden.
Greenwald seems to have figured out the intel community’s game, writing “the most significant Trump-era alliance is between corporate outlets and security state agencies, whose evidence-free claims they unquestioningly disseminate… Every journalist, even the most honest and careful, will get things wrong sometimes, and trustworthy journalists issue prompt corrections when they do. That behavior should be trust-building. But when media outlets continue to use the same reckless and deceitful tactics — such as claiming to have ‘independently confirmed‘ one another’s false stories when they have merely served as stenographers for the same anonymous security state agents while ‘confirming’ nothing — that strongly suggests a complete indifference to the truth and, even more so, a willingness to serve as disinformation agents.”
Democracy has no meaning if people simply vote uninformed, as they are propagandized. It will be sport for future historians to mark the thing that most pushed America into decline. Seeing decades of success abroad in using info ops, the CIA and others turned those weapons inward. So seeing her Deep State meddle in presidential politics, simultaneously destroying (albeit mostly with their cooperation) the adversarial media, while crushing faith in both our leaders and in the process of electing them, will certainly be a top qualifier.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
The Department of State has been adrift for the past handful of administrations, an agency without agency, personnel, or budget, in search of a mission. It is the essential agency which does nothing that matters anymore. As seen in Part I of this article, a number of secretaries of state, from the politically royal to the politically disabled, have failed to impact diplomacy. How did this all happen?
Traditional diplomacy began as a necessary expedient. Nations had business with one another, but messages could take weeks to travel from one capital to another. Instead, ambassadors were sent out, empowered in the case of the U.S. as the President’s personal representative to speak in his name with the full force of the United States. Heady stuff. Messages back to Washington would report final results, such Ben Franklin letting the boys at home know he’d knocked out a treaty with France against Great Britain so we might win the Revolution after all. Hundreds of year later communications improved to the point where world leaders can now text each other, but those ambassadors and embassies remain as if Ben was still out there.
Leaders came and went. For every Abraham Lincoln there were a lot of Millard Fillmore’s and Taylor’s (John and Zach) who mattered little. With exceptions along the way (FDR stand outs), presidents did not conduct first-name diplomacy or tie themselves up with the details of foreign affairs. They had secretaries of state for that. Everything shifted under Richard Nixon, whose interest in first-person diplomacy with China and reluctant ownership of the Vietnam War sent the State Department into a supporting role.
The change began under Nixon. Events both internal and external to the U.S., its State Department, and the world, did the rest.
A Rubik’s Cube, Not a Chessboard
The world has changed even as the State Department is still largely configured for the early 20th century. State’s primary organizational unit is the nation-state, and so it divides itself into the “China Desk” or the “Argentina Desk.” Inside that unit, it is assumed the host country has a government that works more or less like ours, with a Foreign Ministry, some rational system of sending policies up to the leader, in most cases some sort of press, that kind of thing. So inside the country desk State organizes fiefdoms along subunits of Political, Economic, Press, and Trade. New diplomats arrive in foreign capitals to go off in search of their one-to-one counterparts. Everyone at Foggy Bottom assumes the basic framework applies from Albania to Zimbabwe. Over the years State has created regional divisions (East Asia) and topical divisions (Science and Tech) but overlaid these across the geographic divisions so that ideas skitter sideways and up and down simultaneously. The result is usually paralysis when it is not confusion. The problem is not determining who is in charge per se, but that 10-12 people all think they are in charge.
The days of seeing the world as a chessboard are over. It’s now closer to a Rubik’s Cube that Washington can’t figure out how to manipulate. In many cases no one in State can get to the policy task itself, busy as they are arguing over who has the lead on some issue. In most cases senior decision makers elsewhere in Washington leave State to its internal fussing and seek guidance elsewhere — CIA, NSC, the Pentagon.
No one outside of official Washington can appreciate how much 9/11 altered the way the U.S. Government thinks about itself. The shock changed the posture of the government from one of at times satisfied with passivity in its more distant foreign affairs to one demanding constant action. Presidents from that day forward would probably have preferred each Federal worker go out and strangle a terrorist personally, but if that was not possible everyone was to find a way to go to war. State never really has.
Things change slowly if at all. State has no tanks or battleships, just people as its primary way of getting things done. In 1950 State had 7,710 foreign service officers. Pre-9/11 they had 7,158. Today it’s still only about 8,000.
Growing Sophistication of Foreign Actors
The traditional image of the older gentleman from the embassy meeting with the local king is for the movies. Foreign actors have gotten much more sophisticated in their ability to demand VIPs to fly in to finalize deals, and in playing local staff off against the real decision makers scattered throughout Washington. Those foreign actors understand today State is less than a one-stop portal into the USG and more of just one player to manipulate alongside others.
In almost every nation, smaller bureaucracies allow easier bundling/unbundling of issues, something which befuddles State — Country X says if you want that naval base you have to cut American tariffs on cinnamon imports. State throws up its hands, paralyzed, knowing their real diplomacy will involve the Pentagon and whoever the hell does spice tariffs in what, Treasury? Commerce? Senator Johnson’s office, whose district controls most cinnamon packaging? The other side is scheming clever demands while State organizes Zoom calls. The joke inside the Department is deals abroad fail on diplomatic efforts inside the Beltway.
Similarly, in most places abroad the U.S. has three centers of representation who vie for the authority of the United States, and are played off one another by smart foreigners. The Department of Defense maintains relationships with foreign militaries. The intelligence community does the same with host country spies and cops. State tries with everyone left over. Depending on the country, the civilians State interfaces with may matter little in a power structure dominated by say the army, or the local version of the CIA. That renders the American ambassador second place on his own team, never mind in the eyes of the locals. That ambassador may not even know what his own country’s military or spies are up to, leading to naughty surprises and the loss of credibility as a hollow figurehead.
Militarization
Negotiating in Iraq with a minor tribal leader for safe passage, he asked me as the State Department representative how many goats I was offering. About five seconds into my response on the need for lasting friendships, an U.S. Army major cut me off saying “I can get goats” and I no longer mattered to the negotiation, the war, maybe the 21st century itself.
It is all about resources. The military has more people, more hardware, and more cash. From Great Britain to some valley in Garbagestan the military can offer new friends shiny tools (Section 1206 funding: for the first time since President Kennedy signed the Foreign Assistance Act of 1961, President George W. Bush allowed that the U.S. military would fund many weapons transfers directly from its own accounts, bypassing the State Department. Conspicuously absent from the debate over Section 1206 was Condoleezza Rice, America’s then Secretary of State.) State meanwhile needs a couple of days to arrange transportation to the meeting.
Stephen Glain’s State vs. Defense: The Battle to Define America’s Empire is a sober biography of the Department since World War II. The choice of word — biography — is significant, in that traces the decline in old age of State as America’s foreign policy is increasingly made and carried out by the Pentagon. In particular Glain understands the military is organized for the new world order.
“The yawning asymmetry is fueled by more than budgets and resources (though the Pentagon-State spending ration is 12:1), however. Unlike ambassadors, whose responsibility is confined to a single country or city-state, the writ of a combatant commander is hemispheric in scope. His authority covers some of the world’s most strategic resources and waterways and he has some of the most talented people in the federal government working for him. While his civilian counterpart is mired in such parochial concerns as bilateral trade disputes and visa matters, a combatant commander’s horizon is unlimited. ‘When we spoke, we had more clout,’ according to Anthony Zinni. ‘There’s a mismatch in our stature. Ambassadors don’t have regional perspectives. You see the interdependence and interaction in the region when you have regional responsibility. If you’re in a given country, you don’t see beyond its borders because that is not your mission.’”
Adding to the problem is about a third of State’s ambassadors are political appointees, amateurs selected mostly because they raised big campaign bucks for the president. The United States is the only first world nation that allots ambassador jobs as political patronage.
Self-Destruction
State’s once-valued competitive advantage was its from-the-ground reporting. Even there the intelligence community has eaten State’s sandwiches with the crusts cut off — why hear what some FSO thinks the Prime Minister will do when the NSA can provide the White House with real time audio of him explaining it in bed to his mistress? The uber revelation from the 2010 Wikileaks dump of documents was most of State’s reporting is of little practical value. State struggled through the Manning trial to show actual harm was done by the disclosures. Some 10 years later there hasn’t even been a good book written from them.
Under the Trump administration the State Department has seemingly sought out opportunities to sideline itself, now and in the future. Even before the 2016 election results were in, diplomats leaked a dissent memo calling for more U.S. intervention in Syria, a move opposed by Trump. Soon after Rex Tillerson took office, his diplomats leaked another memo very close to insubordination opposing the State Department’s role in Trump’s immigration plans. In yet another dissent memo, Foggy Bottom’s denizens claimed their boss violated a child soldier law. FYI: Nothing substantive came of any of those leaks/memos.
Everyone in the current White House knows how many scandals of the last few years have criss-crossed the State Department: slow-walking the release of Hillary Clinton’s emails (after helping hide the existence of her private server for years), turning a blind eye to Clinton’s nepotism hiring her campaign aides as State employees (remember Huma?), the Foundation shenanigans, the crazy sorrow of Benghazi remembered, the Steele Dossier and many things Russiagate and Ukraine. Most of the impeachment witnesses were from the State Department, including one who claimed to surreptitiously listen in on phone calls with his political appointee ambassador to tell all later to Congress. That’s an awful lot of partisanship woven into an organization which is supposed to be about being non-partisan.
Nobody trusts a snitch, Democrat or Republican. What White House staffer of any party will interact openly with his tattletale diplomats, knowing they are saving his texts and listening in on his calls, waiting? Hey, in your high school, did anyone want to have the kids who lived to be hall monitors and teacher’s pet as their lunch buddies?
America’s Concierge Abroad
What’s left is what we have, the State Department transitioned to America’s concierge abroad. It’s relevancy to top-tier foreign policy is questionable, and its work now mostly logistical. Embassies are great bases for intel work, military offices, the occasional evacuation, to grind out some visas, and for ceremonial events. Someone has to be out there to arrange VIP visits and tidy up local issues. For me, while stationed in the UK, I escorted so many Mrs. Important Somebody’s on semi-official shopping trips I was snarkily labeled “Ambassador to Harrod’s Department Store” by my colleagues. In Japan I found out my duties included re-authorizing radio certificates for American seamen under an early 20th century treaty.
One of The Blob’s greatest accomplishments has been to convince a large number of Americans everything pre-Trump was normal and everything since is extraordinary. That sets up the idea that extraordinary means are needed to deal with unique threats, and that sets up throwing away the rules because ends justify the means. Meh. The work known as diplomacy otherwise continues in some sort, albeit done by people outside the Department of State. Future presidents will need to change that, or, if history serves, live comfortably with it.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Former NSA and CIA head Michael Hayden’s new book The Assault on Intelligence: American National Security in an Age of Lies wants to be the manifesto behind an intelligence community coup. It ends up reading like outtakes from Dr. Strangelove.
Hayden believes Trump cannot discern truth from falsehood, and that Trump is the product of too much fact-free thinking, especially on social media (“computational propaganda” where people can “publish without credentials”) being used by the Russians to destroy the United States. Hayden wants artificial intelligence and a media truth-rating system to “purify our discourse” and help “defend it against inauthentic stimulation.” He believes in the “fragility of civilization” as clearly as he believes there is a “FOX/Trump/RT” alliance in place to exploit it. Under Trump “post-truth is pre-fascism, and to abandon facts is to abandon freedom.” Hayden claims Trump has a “glandular aversion” to even thinking how “Russia has been actively seeking to damage the fabric of American democracy.”
Seriously.
Salvation depends on the intelligence community. Hayden makes clear, ominously quoting conversations with anonymous IC officers, that no one else is protecting America from these online threats to our precious bodily fluids. He warns “the structures we rely on to prevent civil war and societal collapse are under stress.” The IC on the other hand “pursues Enlightenment values [and] is essential not just to American safety but to American liberty.”
Hayden writes he reminded a lad fresh to the IC “Protect yourself. And above all protect the institution. American still needs it.” He has a bit of advice about the CIA: “We are accustomed to relying on their truth to protect us from foreign enemies. Now we may need their truth to save us from ourselves.” The relationship between Trump and the IC is, Hayden threatens, “contentious, divisive, and unpredictable” in these “uncharted waters for the Republic.”
The Assault on Intelligence: American National Security in an Age of Lies is blowing ten dogs whistles at once. Arise ye patriots of Langley and Fort Meade!
Yet for all his emphasis on truth, Hayden is shy about presenting actual evidence of the apocalypse. You are left to believe because Hayden says you must. To disbelieve is to side with Putin. The best we get is executive summary-like statements along the lines of “There is clear evidence of what I would call convergence, the convergence of a mutually reinforcing swirl of Presidential tweets and statements, Russian influenced social media, alt right websites and talk radio, Russian ‘white’ press like RT and even mainstream U.S. media like Fox News.”
With that established, Hayden informs us when the IC tried to warn Trump of the Russian plot, he “rejected a fact-based intel assessment… because it was inconsistent with a preexisting world view or because it was politically inconvenient, the stuff of ideological authoritarianism not pragmatic democracy.” Comrade, er, Candidate Trump, says Hayden matter-of-factly, “did sound a lot like Vladimir Putin.” The two men, he declaims, are “Russian soulmates.”
Hayden figures if you’ve read this far into his polemic, he might as well just splurge the rest of his notes on you. Trump is “uninformed, lazy, dishonest, off the charts, rejects the premise objective reality even existed.” Trump is fueled by Russian money (no evidence in the book because the evidence is in the tax returns, Hayden says, as if Line 42 on Trump’s 1040 would read “Putin Black Funds $5mil” and the IRS which does have the tax returns overlooked that.) Trump is an “unwitting agent” of Putin, which Hayden tells us in Russian is polezni durak, so you can see he knows his Cold War lingo. We hear how Wikileaks worked with the Ruskies, how Trump Jr. worked with the Ruskies, about Ruskies inside Trump Tower where they could see the Big Board, how the whole brewhaha over #TakeAKnee was Russian meddling, and how Jill Stein existed to “bleed off votes from Clinton,” every Mueller fan-fiction trope tumbling from the pages like crumbs left over from an earlier reader.
That’s what The Assault on Intelligence: American National Security in an Age of Lies reads like as a polemic. It also fails as a book.
There are pages of filler, jumbled blog post-like chapters about substate actors and global tectonics. Hayden writes in a recognizable style that might be called Bad Military, where everything must eventually be tied to some Big Idea, preferably with classical references Googled up to add gravitas.
So it is not enough for Hayden to state Trump is a liar, he has to actually label Trump the end of the entire body of Western thought: “We are in a post-truth world, a world in which decisions are far more based upon emotion and preference. And that’s an overturning of the Western way of thought since the Enlightenment.” Bad things are Hobbesian, good things Jeffersonian, Madisonian or Hamiltonian. People Hayden agrees with get adjectival modifiers before their names: the perceptive scholar ____, the iconic journalist _____, the legendary case officer ____. It makes for tiresome reading, like it’s Sunday night at 4am and you still have nine undergrad papers on the causes of the Civil War to grade kind of tiresome.
Hayden is openly contemptuous of the American people, seeing them as brutes who need to be lead around, either by the Russians as he sees it now, or by the IC, as he wishes it to be. Proof of how dumb we are? Hayden cites a poll showing 83% of Republicans and 27% of Democrats don’t believe the IC analysis that Russia meddled in the 2016 election when they damn well should. Part of his proof Russian bots are at work on Twitter influencing conservative minds is the hashtags #God and #Benghazi trended together.
In our odd times, Hayden is a Hero of the Resistance. Seemingly forgotten is Hayden, as head of the NSA, implemented blanket surveillance of American citizens in a rape of the Fourth Amendment, itself a product of the Enlightenment, justifying his unconstitutional actions with a mish-mash of post-truth platitudes and still-secret legal findings. Hayden also supported torture during the War on Terror, but whatever.
This book-length swipe right for the IC leaves out the slam dunk work on weapons of mass destruction. Any concern about political motives inside the IC is swept away as “baseless.” Gina Haspel, who oversaw the torture program, is an “inspired choice” to head CIA. Hayden writes for the rubes, proclaiming the IC produces facts, when in reality even good intel can only be assessments and ambiguous conclusions.
That people so readily overlook Hayden’s sins simply because he rolls off snark against Trump speaks to our naivety. In that men like Hayden retain their security clearances while serving as authors and paid commentators to outlets like CNN speaks to how deep the roots of the Deep State reach. That some troubled Jack D. Ripper squirreled deep inside the IC might take this pablum seriously is frightening.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
The role pervasive surveillance plays in politics today has been grossly underreported. Set aside what you think about the Trump presidency for a moment and focus instead on the new paradigm for how politics and justice work inside the surveillance state.
“Incidental collection” is the claimed inadvertent or accidental monitoring of Americans’ communications under Section 702 of the FISA Amendments Act. Incidental collection exists alongside court-approved warranted surveillance authorized on a specific individual. But for incidental collection, no probable cause is needed, no warrant is needed, and no court or judge is involved. It just gets vacuumed up.
While exactly how many Americans have their communications monitored this way is unknown, a significant number Trump staffers (no evidence of incidental surveillance of the Clinton campaign exists) were surveilled by a White House controlled by their opposition party. Election-time claims the Obama administration wasn’t “wiretapping” Trump were disingenuous. They in fact gathered an unprecedented level of inside information. How was it used?
Incidental collection nailed Michael Flynn; the NSA was ostensibly not surveilling Flynn, just listening in on the Russian ambassador as the two spoke. The intercept formed the basis of Flynn’s firing as national security advisor, his guilty plea for perjury, and very possibly his “game changing” testimony against others.
Jeff Sessions was similarly incidentally surveilled, as was former White House Chief Strategist Steve Bannon, whose conversations were picked up as part of a FISA warrant issued against Trump associate, Carter Page. Paul Manafort and Richard Gates were also subjects of FISA-warranted surveillance; they were surveilled in 2014, the case was dropped for lack of evidence, then re-surveilled after they joined the Trump team and became more interesting to the state.
Officials on the National Security Council revealed Trump himself may also have been swept up in surveillance of foreign targets. Devin Nunes, chair of the House Intelligence Committee, claims multiple communications by Trump transition staff were inadvertently picked up. Trump officials were monitored by British GCHQ with the information shared with their NSA partners. Some reports claim after a criminal warrant was denied to look into whether or not Trump Tower servers were communicating with a Russian bank, a FISA warrant was issued.
How much information on Trump’s political strategy a Democratic White House acquired via surveillance, as well as the full story of what might have been done with that information, will never be known. We do know Director of National Intelligence Dan Coats saw enough after he took office to specify the “intelligence community may not engage in political activity, including dissemination of U.S. person identities to the White House, for the purpose of affecting the political process of the United States.”
Coats likely had in mind the use of unmasking by the Obama administration. Identities of U.S. persons picked up inadvertently by surveillance are supposed to be masked, hidden from most users of the data. However, a select group of officials, including political appointees in the White House, can unmask and include names if they believe it is important to understanding the intelligence, or to show evidence of a crime.
Former Obama national security adviser Susan Rice told House investigators in at least one instance she unmasked the identities of Michael Flynn, Jared Kushner, and Steve Bannon. Obama’s ambassador to the United Nations, Samantha Power, also made a number of unmasking requests in her final year in office.
But no one knows who unmasked Flynn in his conversations with the Russian ambassador. That and subsequent leaking of what was sad were used not only to snare Flynn in a perjury trap, but also to force him out of government. Prior to the leak which took Flynn down, Obama holdover and then-acting attorney general Sally Yates warned Trump Flynn could be blackmailed by Moscow for lying about his calls. When Trump didn’t immediately fire Flynn, the unmasked surveillance was leaked by a “senior government official” (likely Yates) to the Washington Post. The disclosure pressured the administration to dump Flynn.
Similar leaks were used to try to pressure Attorney General Jeff Sessions to resign, though only resulted in him recusing himself from the Russiagate investigation. Following James Comey’s firing, that recusal ultimately opened the door for the appointment of Special Counsel Mueller.
A highly classified leak was used to help marginalize Jared Kushner. The Washington Post, based on leaked intercepts, claimed foreign officials’ from four countries spoke of exploiting Kushner’s economic vulnerabilities to push him into acting against the United States. If the story is true, the leakers passed on data revealing sources and methods; those foreign officials now know however they communicated their thoughts about Kushner, the NSA was listening. Access to that level of information and the power to expose it is not a rank and file action. One analyst described the matter as “the Deep State takes out the White House’s Dark Clown Prince.”
Pervasive surveillance has shown its power perhaps most significantly in creating perjury traps to manufacture indictments to pressure people to testify against others.
Trump associate George Papadopoulos lied to the FBI about several meetings concerning Clinton’s emails. The FBI knew about the meetings, “propelled in part by intelligence from other friendly governments, including the British and Dutch.” The feds asked him questions solely in hope Papadopoulos would lie, commit perjury, even though there was nothing shown to be criminal in the meetings themselves. Now guilty of a crime, the FBI will use the promise of light punishment to press Papadopoulos into testifying against others.
There is an element here of using surveillance to create a process crime out of a non-material lie (the FBI already knew) where no underlying crime of turpitude exists (the meetings were legal.) That that is then used to press someone to testify in an investigation that will have significant political impact seems… undemocratic… yet appears to be a primary tool Mueller is using.
This is a far cry from a traditional plea deal, giving someone a light sentence for actual crimes so that they will testify against others. Mueller should know. He famously allowed Mafia hitman Sammy the Bull to escape more serious punishment for 19 first degree murders in return for testifying against John Gotti. No need to manufacture a perjury trap; the pile of bodies who never saw justice did the trick.
Don’t be lured into thinking the ends justify the means, that whatever it takes to purge Trump is acceptable. Say what you want about Flynn, Kushner, et al, what matters most is the dark process being used. The arrival of pervasive surveillance as a political weapon is more significant than what happens to a little bug like Jared.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
California Congressman Devin Nunes’ memo details how the Department of Justice secured a FISA warrant to surveil former Trump campaign adviser Carter Page. Many feel the memo raises questions about bias inside the FBI, and the legal and ethical use of a Trump opposition research dossier as justification for a FISA warrant. Others claim the memo is irrelevant, a dud.
When you wave away all the partisan smoke, what is deeply worrisome is the Nunes memo confirms American intelligence services were involved in a presidential campaign and remain so in the aftermath. No more conspiracy theories. So forget what you “agree” with, and focus on what happened during the 2016 campaign.
The FBI conducted an investigation, the first ever of a major party candidate in the midst of a presidential battle, and exonerated Hillary Clinton of wrongdoing over her private email server, a government-endorsed “OK” for her expected victory. No real investigation was conducted into the vast sums of money moving between foreign states and the Clinton Foundation, dead-ending those concerns to partisan media.
A month before voting the Obama administration accused the Russian government of stealing emails from the Democratic National Committee. The director of national intelligence, James Clapper, said the leaked emails (which reflected poorly on Clinton) “are intended to interfere with the U.S. election process.” The FBI swung again and said well maybe there was something to see in Clinton’s emails, buried on Anthony Weiner’s laptop. The CIA/NSA meanwhile leaked like cheap diapers throughout the campaign. Trump owes money to Russia. Trump’s computers communicate with Russia. The Russians have sexy kompromat on Trump. That the newly-elected president is literally a tool of Russian intelligence became a common element in the national conversation (John McCain on the Nunes memo release: “We are doing Putin’s job for him.”)
Leave aside the question of what in all of the above is actually true. Maybe Clinton’s private email server exposed no secrets. Maybe Trump’s real estate ventures have dirty Russian money in them. Or maybe not, it is doubtful any of us will ever know. What is important is each of those actions by the intelligence community affected the course of the election. They may not have always shifted votes in the intended way, or there theoretically may have been no intention per se, but the bare naked fact is unlike any previous presidential election the intelligence community played an ongoing public role in who ended up in the White House, and now, for how long the elected president remains there.
And of course the intelligence community was deep in the Steele dossier, the focal point of the Nunes memo. Christopher Steele is a former British intelligence officer with a long history of close work with his American counterparts. He was commissioned first by a conservative website to develop dirt (“opposition research”) on candidate Trump. Funding swiftly shifted to Clinton surrogates, who saw the thing through to being leaked to the FBI. Steele’s product, the dossier, is a collection of second-hand gossip, dangling suggestions of entanglements between Trump and shadowy Russians, and of course, the infamous pee tape. Nothing in the dossier has been confirmed. It might all be true, or none of it. We will likely never know.
The FBI nonetheless embraced the dossier and morphed it from opposition research into evidence. Per the Nunes memo, the Steele dossier, and a “collaborating” article actually derived from the same information leaked by Steele to the author, then became part the legal justification for a FISA surveillance warrant issued against Trump associate Carter Page. A product of unclear reliability created and promoted via the opponent’s campaign abetted by the western intelligence community justified the demand to spy on Trump campaign associate Carter Page.
Much will be made of how influential, or not, the Steele dossier was in obtaining the original FISA warrant, and whether or not its use was legal at all. The Nunes memo states recently “retired” FBI No. 2 Andrew McCabe confirmed no FISA warrant would have been sought without the Steele dossier; McCabe denies saying that during still-classified and still-unreleased testimony. Senior DOJ officials knew the dossier’s politics but left that information off their FISA application. Does any of that matter?
We will never know. The Foreign Intelligence and Surveillance Act court works in secret. The standards are secret, the results and decisions are secret. None of us knows what matters to a FISA judge in rendering a decision to spy on an American campaign associate. Someone can release the so-called “underlying documents” (they’re typically dozens of pages long) DOJ used for the FISA application but without knowledge of FISA standards, those documents won’t be of much help. The apparatus of spying in America, including the FISA court, is widely supported and authority to spy was just extended with support from both parties.
If you want to assert the FISA warrant on Page was apolitical, issued only to collect on his possible role as a Russian agent, and no strategy, financial, or campaign information was collected, or that if it was it was simply discarded, well, that’s a beneficent view of human nature, never mind a bizarrely generous level of trust in government. Yet even if the intent was righteous and the people involved lawful, the information is stored. Which person or agency has control of it today is not necessarily who will control it in the future; information is forever.
Remember, too, the Nunes memo addresses only one FISA warrant on one person from October 2016; investigations into Trump, et al, had been ongoing well before that. We do not know, for example, what information formed the basis of the July 2016 investigation into Trump staffer George Papadopoulos the Nunes memo mentions; it may have been passed from the Australians via U.S. intelligence. Michael Flynn’s conversations with Russian persons were “inadvertently” monitored and later “unmasked” (and leaked) by Obama administration officials. Jeff Session’s conversations with the Russian ambassador were collected and leaked. The Nunes memo tells us then-Associate Deputy Attorney General Bruce Ohr unofficially funneled additional material from Steele into DOJ; Ohr’s wife worked for the company that first commissioned the dossier. As yet unsubstantiated reports say Trump officials were monitored by British GCHQ with the information shared with their NSA partners, a common arrangement on both sides to get around domestic laws limiting such work on one’s own citizens, such as when a FISA warrant can’t be obtained, or one does not want to leave a paper trail.
If you’re fine with the U.S. government using paid-for opposition research to justify spying on persons connected to presidential campaign staff, then nothing further I can write will help you understand how worrisome this disclosure is. Except maybe this. Switch the candidate’s name you hate with the one you like. That means President Trump surveilling staff from the Elizabeth Warren or Bernie Sanders 2020 campaign after a dossier commissioned by the Republican party links them to China. You’d trust Trump, and every future president, with that, right?
The involvement of the intelligence community as in the 2016 presidential campaign, clumsy and disorganized as it appears to have been, will be part of the next election, and the ones after that. If you’re in search of a Constitutional crisis, it lies waiting there. After all, when we let George W. Bush create, and Barack Obama greatly expand, the surveillance state, what did we think it would come to be used for?
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Because we traded the smooth talking guy for the clumsy boob with no manners, it is popular to bleat that America has given up its role as leader of the free world, to say other nations don’t respect us anymore, or look to us for moral guidance — in the extreme, that we are no longer that shining city on the hill we see ourselves as.
What such cliches overlook is that not everyone in the free world is as blind as a typical American op-ed writer. Some in fact see past who the current Spokesmodel of Democracy in the White House is, and look to what America actually does. And what it does is often not pretty, and when revealed suggests our nation is and has been morally bankrupt a lot longer than the Trump administration has been in charge.
One of the more recent revelations of what much of the world already knew comes, again, via Wikileaks, America’s conscience.
Leaked documents show home internet routers, that blinking thing in the corner of the room where you’re reading this, from ten American manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices.
Short: American-made devices sold globally to allow the free world to use the Internet have been repurposed by the CIA as spy tools.
The CIA’s technique requires new firmware to be added to the router. This can be done remotely, over WiFi, at the factory, or at any point along the supply chain. It is unknown if America’s leading electronics manufacturers actively helped the CIA do this, passively allowed the CIA to do this after sharing technical data, or simply looked the other way.
The results of this CIA hack are spectacular.
The firmware allows the CIA full access to the router, and all connected devices and networks. The spooks can insert malware, copy passwords, see what is being sent and received, redirect browsers to fake websites, why there is little-to-no limit. Apparently the user interface the CIA created for itself is quite friendly. There’s even a Quick Start Guide.
And you know what?
The CIA has been doing all this since at least 2007. That means it started under the George W. Bush administration, ran during both Obama terms, and continues without a break right into the Trump years. Three very different presidents, three very different self-images for America, yet underlying all was the same CIA, turning American products to their own needs and spying on well, everyone. Anyone. Free world or not.
From a global perspective, it doesn’t really matter whether the person in the White House is a Nobel Peace Prize winner or a bumbling oaf. Because the real America, the one that spies on a global scale for its own ends, never changes. That guy on TV you hate? He’s just a placeholder, maybe a distraction, about as consequential to the real role of the United States as a professional wrestler.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
An NSA document purporting to show Russian military hacker attempts to access a Florida company which makes voter registration software is sent anonymously to The Intercept. A low-level NSA contractor, Reality Winner, above, is arrested almost immediately. What’s wrong with this picture? A lot.
Who Benefits?
Start with the question of who benefits — cui bono— same as detectives do when assessing a crime.
— Trump looks bad as another trickle of information comes out connecting something Russian to something 2016 election. Intelligence community (IC) looks like they are onto something, a day or so before ousted FBI Director James Comey testifies before Congress on related matters.
— The Intercept looks like it contributed to burning a source. Which potential leaker is going to them in the future? If potential leakers are made to think twice, another win for the IC.
— The FBI made an arrest right away, nearly simultaneous to the publication, with the formal charges coming barely an hour after The Intercept published. The bust is sure thing according to the very publicly released information. No Ed Snowden hiding out in Russia this time. IC looks good here.
— More evidence is now in the public domain that the Russians are after our election process. Seems as if the IC has been right all along.
What Happened is… Curious and Curiouser…
Now let’s look at what we know so far about how this happened.
A 25-year-old improbably-named Reality Winner leaves behind a trail long and wide on social media of anti-Trump stuff, including proclaiming herself a member of The Resistance. Never mind, she takes her Top Secret clearance with her out of the Air Force (she had been stationed with the military’s 94th Intelligence Squadron out of Fort Meade, Maryland, co-located with the NSA’s headquarters) and scores a job with an NSA contractor. Despite the lessons of too-much-access the Snowden episode should have taught the NSA, Winner apparently enjoys all sorts of classified documents — her Air Force expertise was in Afghan matters, so it is unclear why she would have access to info on Russia hacking of U.S. domestic companies.
Within only about 90 days of starting her new job, she prints out the one (and only one apparently, why not more?) document in question and mails it to The Intercept. She also uses her work computer inside an NSA facility to write to the Intercept twice about this same time.
Winner has a clearance. She was trained as a Dari, Pashto, and Farsi linguist by the Air Force. She knows how classified stuff works. She has been told repeatedly, as all persons with a clearance are, that her computer, email, printing, and phone are monitored. She mailed the document from Augusta, Georgia, the city where she lives and where the NSA facility is located. She practiced no tradecraft, did nothing to hide her actions and many things to call attention to them. It is very, very unclear why she took the actions she did under those circumstances.
The Document
The Intercept meanwhile drops by their friendly neighborhood NSA contact and shows them the document. NSA very publicly confirms the veracity of the document (unusual in itself, officially the Snowden and Manning documents remain unconfirmed) and then makes sure the open-court document filed is not sealed and includes the information on how the spooks know the leaked doc was printed inside the NSA facility. Winner went on to make a full confession to the FBI. The upshot? This document is not a plant. The NSA wants you to very much know it is real. The Russians certainly are messing with our election.
But funny thing. While the leaked NSA document seems to be a big deal, at least to the general public, it sort of isn’t. It shows one piece of analysis suggesting but not confirming the GRU, Russian military intelligence, tried to steal some credentials and gain access to a private company. No U.S. sources and methods, or raw technical intel, are revealed, the crown jewel stuff. There is no evidence the hack accomplished anything at all, never mind anything nefarious. The hack took place months ago and ran its course, meaning the Russian operation was already dead. The Russians were running a run-of-the-mill spearfishing attack, potentially effective, but nothing especially sophisticated. You get similar stuff all the time trying to harvest your credit card information. The leaked document looks like a big deal but isn’t.
Another issue. The Intercept has a lot of very smart people working for it, people with real-world intelligence and tradecraft experience. People who know about microdot encoding on printed documents, one of the tells here, and people who know they don’t show their whole hand when asking the NSA for a comment. The Intercept journalist volunteered to an NSA contracting company that the envelope received was postmarked to Augusta, where Winner lived and worked. Like Reality Winner and her own security training, it is very, very unclear why the Intercept took the actions it did under those circumstances.
So For Now…
So, look, what we know about this story may represent .01% of the whole picture, and that tiny sliver of visible information is only what the government has chosen to reveal. And sometimes a coincidence is just a coincidence. Sometimes smart people make dumb mistakes.
But that’s not the way you place your bets, especially when dealing with the IC who are good at these kinds of games. At this very early stage I’m going to say there are too many coincidences and too many mistakes to simple shrug it all off. Too many of the benefits in this have accrued on the side of the IC than is typical when a real whistleblower shares classified documents with a journalist.
If it frightens you that I invoke the question of the Deep State using journalists to smear the President, just forget I said anything. But if we’re willing to believe the Russians somehow successfully manipulated our entire society to elect their favored candidate, then we can at least ask a few questions.
Otherwise, if anyone hears Winner’s lawyer use the word “patsy,” let me know, OK?
BONUS: Matt Cole, one of The Intercept journalists credited to this story, was also involved in the outing of source CIA officer John Kiriakou in connection with CIA torture claims. Small world!
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
I want to scare the hell out of you.
People talk of the Deep State, a kind of shorthand to refer to the entrenched parts of the government, particularly inside the military, intelligence, and security communities, who don’t come and go with election cycles. The information they hold, and their longevity, allows them to significantly influence, perhaps control, the big picture decisions that change the way America works on a global scale. Who the enemies are, where the power needs to be applied, which wars will start and what governments should fall.
One of the features of the Deep State is that it prefers to work behind the scenes, in the shadows if you like. The big name politicians are out front, smiling for the cameras, and the lesser pols have to tend to the day-to-day stuff of government. The Deep State doesn’t trouble itself with regulating agriculture or deciding which infrastructure bill to fund. That is in large part why there will never be a full-on coup; why would the Deep State want to take on responsibility for the Department of Transportation?
When the Deep State does accidentally expose itself, it is often by accident, such as in the panic right after 9/11 when the president was sitting around reading a children’s book while Cheney, Rice, and Rumsfeld were calling the shots. Same for in the 1980s when a set of cock-ups exposed U.S. arms sales to Iran to pay for U.S. proxy forces in Central America while with U.S. support the Saudis paid for jihadists to fight in Afghanistan, laying the early groundwork for what would become the War on Terror.
Forget for a moment what you think of their actions, but pay attention: both our domestic intelligence service (the FBI) and our overseas intelligence service (the CIA) played significant roles in our election. Still not sure what the Deep State is? It’s that.
Forget what you “agree” with, and focus on what happened. In July the FBI exonerated Hillary Clinton of any wrongdoing in connection with her private email server. Yep, there was highly classified material, but that didn’t matter. Nope, the Russians and/or everybody else never hacked into her server, and nobody on her staff ever clicked Podesta-like on a phishing link. Nothing to see here. And then in October the FBI swung again and said well maybe there was something to see, buried conveniently on known-idiot Anthony Weiner’s laptop already in their possession. Funny about that. Anybody seen once marked-to-go places Huma Abedin lately?
As for the CIA, they managed to leak like Grandpa’s adult diapers throughout the campaign that Trump and Putin… something. Trump owes money to Russia. Trump’s computers communicate with Russia. Trump’s advisors work for Russia. Trump wants to build hotels in Russia. When none of that really stuck, it turned out the hacks into the DNC servers were done by Russians — in cahoots with arch-villian Julian Assange — ordered personally by Putin to elect Trump. All because Trump was Putin’s stooge, as the argument completed its circle.
UPDATE: When last week’s intelligence community report that “proved” the Russians did the DNC hack failed to really do much past a news cycle or two, it should be no surprise at all that this week a leak dropped on CNN that the Russians may have “compromising material” on Trump. Now, that leak supposedly came from anonymous sources from a classified synopsis included in a version of last week’s report that was based on allegation made public in the summer but only very recently “confirmed” by a former British intelligence officer who worked privately doing opposition research for an unnamed Trump Republican opponent.
If Trump could not be defeated, he would be delegitimized. Overnight the left/liberals/progressives/whatever turned into red-blooded supporters of the CIA and 21st century Cold Warriors, with anyone from that one asshole on Facebook you argue with to Pulitzer-prize winning journalists who disagree, labeled as Russian stooges, spies, fellow travelers and the like.
The result? A new Cold War, sold to the American people over the course of about a month.
When the Soviet Union collapsed and the old Cold War wrapped up, there was left a gaping hole for the Deep State. They nearly literally had nothing to do. Budgets were being cut, power in Washington defused. 9/11 was a helpful and timely accident; the War on Terror would provide the much-needed Cause to blow up spending and reconstruct status and power.
And the War on Terror started off with great promise for the Deep State, dovetailing nicely with long-sought Conservative projects such as remaking the Middle East and controlling the Persian Gulf. The future was wide open, Afghanistan a stupid but necessary prelude to the real first act in Iraq.
But despite the power of the Deep State, mistakes are made and nature finds a way. The War on Terror became a global clusterf*ck. Failures accumulated: Iraq and Afghanistan, of course. Libya, Syria, the messy Arab Spring, relations with Pakistan. You can’t really trust any of those folks to get it, we want a war that doesn’t end but looks good. Beheadings on TV simply stir people up at home and there is not much we can do about them.
Now, to be fair to the War on Terror, it had a good run. It normalized domestic spying and the omni-presence of security everywhere in America, and set up a nice bureaucracy to manage all that in Homeland Security. It got Americans used to see armed military, and militarized cops, on the streets.
But what was needed was a global struggle that made us look like we were winning without it ever ending.
If only there was some sort of model for that…
The Russians. Every American fear rolled into one guy, Putin, who might as well come from a Hollywood super-villian workshop. Unlike messy terrorists, who wanted, whatever, Sharia or a Caliphate, damn foreign words, Russia wanted old-fashioned territory, stuff on maps like Crimea and the Ukraine that mattered not a whit to America, but could be played domestically as Struggles for Freedom (C). The Russkies had troops with actual uniforms, and all the old propaganda materials were laying around. The Russians also knew how to play ball, blasting back through their RT and Sputnik channels nobody really watches but are right there to label as threats to our democracy. The Russian version of the Deep State knows a good deal when they see one, too.
Clinton was the perfect figurehead, already warm friends with one of the last dessicated Cold Warriors, Henry Kissinger, and already more than predisposed to cast the Russians into their role. Trump, well, he didn’t seem to get it, and, when it was becoming clearer he might win, he needed to be made to get it. The Deep State appeared to have some internal dissension; that publicly popped up when it appeared the FBI and CIA were not sure which horse to back in the latter days of the campaign and how to do it. Hey, mistakes were made, sorry, even the Deep State is kinda human.
Well, it was messy and dragged on past the actual election, but everything is settled now. The intelligence report that just came out made things clear: Russia is the bad guy, Trump now the cuck of the Deep State, things are back to “normal.” Funding will pour into the military, intelligence, and security communities. Since the war will be a cold one, the U.S. can declare periodic victories just like in the old days over things like the Olympics, chess matches, dissidents saved, spy stuff We Can’t Tell You About but will leak out anyway. We can have proxy wars and skirmishes that seem like huge deals but can usually be managed in scope. Any troublemakers at home, in or out of the White House, can be labeled Russian sympathizers on CNN and Maddow and dealt away quickly.
Overall, the 1950s weren’t that bad now were they?
BONUS: One currently outstanding question is whether the manipulations of the Deep State in our election became public by accident, such as after 9/11, or whether someone (us? Trump? Putin?) was meant to see them for some purpose. Hang on to that question.
MORE BONUS: Yes, yes, this is all conspiracy nonsense. The moon landings were faked and 9/11 was an inside job by the Mossad. There is no Deep State, or Trump really is a Russian Manchurian candidate, or the spiders from Mars are actually pulling the strings or I am reading those weird Geocities-like websites for preppers and soon will be posting cheesy animated GIFs of flags waving, whatever. I’m also a Russian, or Edward Snowden, or being paid by someone to write this. Whatever you need to tell yourself, and you should never believe what I say and say how sad it is that this is what I’ve come too. I’ll kill a puppy in your honor. Thanks!
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
There are many reasons why Federal Bureau of Investigation Director James Comey is interested in the emails on Anthony Weiner’s home computer, emails which may include United States government information pertinent to Hillary Clinton or those communicating with her.
The majority of those reasons for Comey’s involvement, for good or for bad depending on your political position, have been laid out across the media spectrum.
But there may be one more reason not yet discussed. Since we seem to be spending so much time this election cycle on the Russians this year, let’s think like Russian intelligence officers. Comey may be looking at an intelligence operation.
Professional intelligence officers do not risk international incidents to play the equivalent of pranks on nation states, say by embarrassing the Democratic National Committee with leaked documents months before the election. That’s Wikileaks level stuff. No, when you want to rig an election, you rig an election. Have a look at the way the CIA historically manipulated elections — assassinations, massive demonstrations, paid off protesters and journalists, serious stuff that directly affected leaders and votes. You don’t mess around with half-measures.
Now have a look at the Edward Snowden documents, and the incredible efforts the National Security Agency went to to gather information, and then let’s think like intelligence officers. The world of real “spies” is all about “the take,” information. Putin (or Obama, or…) doesn’t likely have on his desk a proposal to risk cyberwar to expose a CNN contributor for handing over debate questions. He wants more of hard information he can use to make decisions about his adversary. What is Obama (or Putin, et al) thinking, what are his plans, what are his negotiating points ahead of the next summit… information at a global strategic level.
That’s worth risking retaliation, maybe even a confrontation, for. So let’s think like intelligence officers. How do you get to that kind of stuff?
How the great game of intelligence gathering works is in the end very basic: who has access to the information you want, what are their vulnerabilities, and how do you exploit those vulnerabilities to get to the information. What do they want and how can you give it to them?
Hillary Clinton as Secretary of State had access to extraordinarily sensitive information, both classified and unclassified. Huma Abedin is arguably the most powerful person in Clinton’s circle, and had access to much or all of that pool of information. What Huma knows would be of great interest to Moscow.
How to get the info? Huma’s husband is a publicly outed sexual predator. Everyone in the world knows he sexts, trolls online message boards, and seemingly does little to hide his identity while doing it all. He is a target, the kind of dream package of vulnerabilities an intelligence officer waits a whole career to have fall into their lap.
Baiting the trap appears to be easy. As recently as August Weiner was in a flirty chat with someone he thought was a young woman named Nikki, but was actually Nikki’s male, Republican friend using the account in order to manipulate him (Weiner later claimed he knew he was being set up.)
So perhaps for the Russians, contacting Weiner would have been as easy as posting a few fake sexy photos and waiting for him to take a bite. Placing malware on his computer to see what was there was as easy as trading a few more sexy photos with him. He clicks, he loads the malware, NSA 101 level stuff. An intelligence officer then has access to Weiner’s computer, as well as his home wireless network, and who knows what else. An Internet-enabled nanny cam? A smartphone camera? Huma’s own devices?
To be fair, I doubt any intelligence agent could have believed their own eyes when they realized Weiner’s computer was laden with (presumably unencrypted) official U.S. government documents. Depending on the time period the documents covered, it is possible the Russian intelligence could have been reading Clinton’s mail in near-real time. Somebody in Moscow may have gotten a helluva promotion this year.
If I was a sloppy journalist these days, I guess I could package all this for you by claiming it came from “several anonymous government officials. Instead, you know it’s all made up. Just like a spy novel. Because no real intelligence agent could have put these pieces together like this.
Right?
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
I’ve reviewed Oliver Stone’s movie Snowden elsewhere, and it’s well worth seeing just as a movie. But of course the issues brought up by Snowden the man, and Snowden the movie, are more complex than fit into two hours.
I had this hit home in a recent discussion with a friend who keeps insisting he has nothing to hide in his emails, phone calls, social media, etc., so why should he care if the NSA looks at all that?
Friend, here’s why:
NSA surveillance is legal.
True, as was slavery in the U.S., the Holocaust under Nazi Germany, Apartheid in South Africa and so forth. Laws serve higher purposes. They can be manipulated for evil. That’s why we need checks and balances to protect us.
Well, there are checks and balances in the system to protect us.
The king of all checks and balances in this, the Fourth Amendment, has been treated by the government like a used Kleenex.
As for the Foreign Intelligence and Surveillance Court (FISA), set up to review government requests for wiretapping, it approved all 1,789 requests submitted to it in 2012. The FBI made 15,229 National Security Letter requests in 2012 on Americans. None of those even require FISA rubber-stamping. And here’s DOJ trying to keep classified a court ruling that says it might have acted unconstitutionally.
The first FISA ruling ever released in full came from Edward Snowden. Before that, no one outside a small circle inside the government had ever seen one.
And you know who represents the “suspect” (i.e., you) in front of the FISA court? No one. You don’t even know they’re reviewing you.
If all the NSA’s activities are legal, why not allow them to be tested openly and unambiguously in public, in front of the Supreme Court. After all, if you’ve done nothing wrong there is nothing to hide. Unfortunately, when Amnesty International tried to bring such a case before the Court, the case was denied because Amnesty could not prove it was subject to monitoring– that was a secret!– and thus was denied standing to even bring the suit.
Unfettered surveillance violates both the Fourth Amendment protections against search, and the First Amendment protections on the right to peaceably assemble, online in this instance.
Anyway, whatever, FISA. I’m not doing anything wrong, so why should I care? If you’re doing nothing wrong, then you’ve got nothing to hide!
The definition of “wrong” can change very quickly, especially if you have no way to defend yourself, or even know you’re under suspicion. Are you really, really ready to risk everything on what is right and wrong today staying that way forever? Seems like a fool’s bet, given America’s witch hunts in the 1950s for communists, and Islamophobia today. Things do change.
Well, I trust Obama on this.
Good for you. There’ll be a new president soon. You also trust him or her? How about the one after that, and the one after that? Data collected is forever. Trusting anyone with such power is foolish.
FYI, whether you trust Obama, Trump, Hillary or the next presidents, do remember your personal data is in the hands of the same people that run the TSA, the IRS and the DMV. Do you trust all of them all the time to never make mistakes or act on personal grudges or political biases? Do you believe none of them would ever sell your data for personal profit ever? That they have your information so well protected hackers will never get to it and dump it out onto the Internet?
How about other governments? The NSA is already sharing your data with, at minimum, British and Israeli intelligence. Those are foreign governments that your American government is informing on you to.
Distasteful as this all is, it is necessary to keep us safe. It’s for our own good.
The United States, upholding to our beautiful Bill of Rights, has survived (albeit on a sometimes bumpy road) two world wars, the Cold War and innumerable challenges without a massive, all-inclusive destruction of our civil rights. Keep in mind that the Founders created the Bill of Rights, point-by-point, specifically to address the abuses of power (look up the never-heard-from-again Third Amendment) they experienced under an oppressive British government.
A bunch of angry jihadis, some real and many imagined, seems a poor reason to change that system. Prior to 9/11 we did not have a mass-scale terror act (by foreigners; American Citizen Timothy McVeigh pulled one off.) Since 9/11 we have not had a mass-scale terror attack. More than 15 years in, we must accept 9/11 was a one-off, an aberration, and cannot be a justification for everything the government wishes to do.
There is also the question of why, if the NSA is vacuuming up everything, and even sharing that collection abroad, this all needs to be kept secret from the American people. If it is for our own good, the government should be proud to tell us what they are doing for us, instead of being embarrassed when it leaks.
After all, if you’re not doing anything wrong then you’ve got nothing to hide, right?
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Snowden is a helluva movie, kicking an audience’s ass on a number of levels. I had a chance to see the film last night at a preview event; it opens everywhere on September 16. Go see it.
On one level the film presents Snowden’s story as a political thriller. A brave but frightened man, certain he is doing the right thing but worried if he can pull it off, smuggles some of the NSA’s most secret information out of a secure facility. He makes contact with skeptical journalists in Hong Kong, convinces them of the importance of what he has to say, and then goes on the run from a U.S. government out to arrest, or, possibly assassinate, him. In interviews Stone has made clear that he has dramatized and/or altered some events, and that his film is not a documentary. It does keep you on the edge of your beliefs, watching a story you know as if you don’t.
The next level of the film is a carefully constructed vision of the national security state, seen through Snowden’s eyes. For many Americans, this may be the first time they will react emotionally to the way our government spies on us. It is one thing to “know” the NSA can access webcams at will, it is another to watch a technician “spy” on a Muslim woman undressing in her bedroom.
When Snowden (played by Joseph Gordon-Levitt) slaps a piece of tape over his own webcam before an intimate moment with his girlfriend (played by Shailene Woodley), he has the wool taken from his eyes, his trust in government shattered. He is all of us.
The final level of Snowden is perhaps the most important.
Director Oliver Stone is in the business of creating counter-myths at critical points in time, and his work is best understood in that context.
Even as most Americans still believed the myth that while the Vietnam was bad, the warriors were not, Stone showed us the dark side in Platoon. In the 1980s, when making money was seen as the best of America, Stone gave us Wall Street, and turned the myth “greed is good” from an instructional line out of an MBA program to a condemnation of how we all suffered when the bubble broke in the financial markets.
And so with Snowden, which makes clear the myth of a benign national security (“nothing to hide, nothing to fear,” they’re the good guys protecting us) is anything but. The NSA and other agencies want to vacuum it all up, every communication, everywhere. They then move on to controlling our communications; the movie illustrates the depth of NSA’s penetration into the Japanese electrical grid by imagining a black out of Tokyo, and shows us how an NSA technical mistake reveals how they could shut down the Internet across the Middle East.
In what is the most Oliver Stone-like scene in perhaps any of his movies, Snowden’s CIA boss confronts him, suspicious of wrongdoing. Their video conference discussion starts with Snowden at one end of the table, the boss’ face on a monitor at the other. As the scene unfolds and the intensity increases, Snowden moves closer to the screen until his head is a small dot, and the boss’ face takes over the audience’s whole field of view. The government itself has morphed into Big Brother before your eyes.
For many aware viewers, a lot of this may seem old hat — of course the NSA is doing all that.
But imagine the impact of Snowden. Thoughts that have largely been laid out only on blogs and left-of-center, non-main stream media, are now in suburban multiplexes, all carefully wrapped inside a thriller Tom Clancy fans will enjoy.
You can’t get much more radical than that.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Short answer: nobody knows, but the media is treating it as a fact based primarily on a single technical source employed by the Democratic National Committee. I read the source’s publically available explanation. Here’s what I found.
A Quick Taste of Media Conclusions
Despite a line in paragraph five saying “Proving the source of a cyberattack is notoriously difficult,” the New York Times offers the following statements.
— “researchers have concluded that the national committee was breached by two Russian intelligence agencies;”
— “Though a hacker claimed responsibility for giving the emails to WikiLeaks, the same agencies are the prime suspects;”
— “Whether the thefts were ordered by Mr. Putin, or just carried out by apparatchiks who thought they might please him, is anyone’s guess.”
— “It is unclear how WikiLeaks obtained the email trove. But the presumption is that the intelligence agencies turned it over, either directly or through an intermediary. Moreover, the timing of the release, between the end of the Republican convention and the beginning of the Democratic one, seems too well planned to be coincidental.”
There’s more, but you get the picture. The article also quotes Clinton staffers citing unnamed experts and researchers.
Who Are These Experts?
The only experts cited work for a company hired by the Democratic National Committee to investigate the hack. There is no indication of any neutral third party investigation. The company, Crowdstrike, issued a publicly available report on what they found.
The report title makes clear the company’s conclusion: Bears in the Midst: Intrusion into the Democratic National Committee.
What Does the Report Say?
The report has some technical explanations, but focuses on conclusions that seem to be at best presumptions, despite the media treating them as fact.
— The key presumptive conclusion seems to be that the sophistication of the hacks points to a nation-state actor. “Their tradecraft is superb, operational security second to none and the extensive usage of ‘living-off-the-land’ techniques enables them to easily bypass many security solutions they encounter. In particular, we identified advanced methods consistent with nation-state level capabilities.”
— The hackers, two separate entities Crowdstrike says worked independently, used techniques known to be used by Russians. Better yet, with no evidence at all presented, Crowdstrike concludes, “Both adversaries engage in extensive political and economic espionage for the benefit of the government of the Russian Federation and are believed to be closely linked to the Russian government’s powerful and highly capable intelligence services.” Also, for one of the alleged hackers, “Extensive targeting of defense ministries and other military victims has been observed, the profile of which closely mirrors the strategic interests of the Russian government.”
— By the end of the report Crowdstrike is just plain out called the hackers “Russian espionage groups.”
FYI: Fidelis, another cybersecurity company, was hired by Crowdstrike to review the findings. Fidelis worked exclusively and only with data provided by Crowdstrike (as did several other companies.) Fidelis They concluded the same two hackers, COZY BEAR and FANCY BEAR APT, committed the intrusion, but made no comments on whether those two were linked to the Russian government.
Um, Valid Conclusions?
Despite the citing with certainty of experts and researchers by the media and the Clinton campaign, the only such expert who has made any findings public has basically thrown out little more than a bunch of presumptions and unsubstantiated conclusions.
Left undiscussed are:
— the commonality of hackers using “false flags,” say where an Israeli hackers will purposely leave behind false clues to make it seem that a Hungarian did the work. As one commentator put it sarcastically “The malware was written in Russian? It was a Russian who attacked you.
Chinese characters in the code? You’ve been hacked by the Peoples Liberation Army.”— the question of if the hackers were “Russians,” can anyone tie them to the Russian government? Joe Black Hat breaking into some system in Ireland may indeed be an American person, but it is quite a jump to claim he thus works for the American government.
— there is also a significant question of motive. For Putin to be the bad guy here, we have to believe that Putin wants Trump in power, bad enough to risk near-war with the U.S. if caught in the hack, and bad enough to really p.o. Clinton who will be nominated this week anyway, and hoping of course that evidence of dirty tricks by the DNC released in July will be enough to defeat her in November. That’s a real s-t-r-e-t-c-h, Sparky.
— other than those private persons who hack for their own entertainment or personal political beliefs, most work for money. They steal something and sell it. Information from the DNC system would find an easy buyer.
— Who might be intersted in buying these emails? Along the range of actors who would benefit from exposing these emails, why would the Russians come out on top? Perhaps the Republicans? China? Pretty much any of the many enemies the Clintons have amassed over the years? Hell, even Bernie Sanders, whose complaints about the DNC were validated by the email release. The suspects based on motive alone make up a very long list.
Learning More
For some intelligent analysis suspicious that the DNC hack was a Russian intelligence job, try this.
For some more technical information on one of the alleged DNC infiltrators, here you go.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
If you were Vladimir Putin, or President Xi of China, what would you do if you had the entire archive of Hillary Clinton’s emails, classified and unclassified, “deleted” and not, in your hands? What value to you would that be in your next round of negotiations with the president of the United States?
Unencrypted Email
Hillary Clinton traveled to 19 foreign locations during her first three months in office, inlcuding China, South Korea, Egypt, Israel, Palestine, and a meeting in Switzerland with her Russian counterpart. During that period of time her email system was unencrypted. She transmitted data over wireless networks in those countries, networks almost certainly already monitored 24/7 by intelligence and security officials. To say her email was not collected is to say the Russian, Chinese, Israeli and other intelligence services are complete amateurs.
They are not complete amateurs.
A System Wide Open to Monitoring
While FBI director James Comey said his investigators had no “direct evidence” that Hillary Clinton’s email account had been “successfully hacked,” both private experts and federal investigators, according to the New York Times, “immediately understood his meaning: It very likely had been breached, but the intruders were far too skilled to leave evidence of their work.”
Comey described a set of email practices that left Clinton’s systems wide open to monitoring. She had no full-time cyber security professional monitoring her system. She took her BlackBerry everywhere she went, “sending and receiving work-related emails in the territory of sophisticated adversaries.” Her use of “a personal email domain was both known by a large number of people and readily apparent… Hostile actors gained access to the private commercial email accounts of people with whom Secretary Clinton was in regular contact.”
The FBI director was generous in his assessment. See, no hacking was really necessary.
But No Hacking was Really Needed
Online security company Venafi TrustNet has the world’s largest database of digital certificates and associated metadata, allowing it to go back in time and identify how digital certificates were used in the past, a kind of forensics capability for IT security. Here’s what they found on the clintonemail.com server, and it is not good.
Using non-intrusive Internet scanning tests routinely performed throughout by IT security teams (meaning foreign intelligence agencies have them too), Venafi learned the Clinton server was enabled for logging in via web browser, smartphone, Blackberry, and tablet. That automatically makes it vulnerable to interception, as the information Clinton was sending and receiving abroad was traveling via other nations’ web infrastructure and open-air cellular networks.
Clinton’s email log-in page was also on the web, meaning anyone who stumbled on it could try and log in, or employ the standard array of password hacking and brute force attacks against it, much like they did with your Gmail account that was hacked.
The Clinton email setup also was initially running a standalone Microsoft Windows Server, which is very vulnerable to attack, with at least 800 known trojans/spyware in existence that can steal keys and certificates. If the credentials on the server were compromised in those first three months, then the next years of encryption might have meant nothing.
How could someone have gained access to the credentials? Clinton’s most recent digital security certificate was issued by GoDaddy. Her domain’s landing page was at one time hosted by Confluence Networks, a web firm in the British Virgin Islands.
No Smoking Gun?
If anyone had picked up Clinton’s emails from the airwaves or in transit over the Internet (as we know, via Snowden, the NSA does), while they were encrypted, or had acquired the encrypted versions and used the resources of a state security apparatus to decrypt them, there would of course be no forensic evidence to find. Persons working at NSA-like levels actually breaking into systems expend significant energies hiding their intrusions, and such high level “hacks” have been known to stay hidden for years.
Sure, if the standard is a “smoking gun,” there is none. But such proof is rarely available in the world of global espionage, and decisions and conclusions are made accordingly on a daily basis.
Clinton’s email was extremely vulnerable, and her decision to run it off a private server put at significant risk the security of the United States. This is not a partisan attack or a conspiracy; it is technology.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Here’s where things stand.
The only mainstream candidate in recent decades to come along with new ideas, a model of not accepting big money with strings attached, and willing to address the critical issues in America of economic inequality and lack of health care for many, is done.
Unless Lin-Manuel Miranda does a musical of his life, Bernie’s just a footnote in the history books. But the stigma that he won via a set of tricks to include the “superdelegate system,” some election fraud, and overt partisanship by the Democratic National Committee and much of the media, never mind what Obama does with the FBI report into her mishandling of classified information, lingers like the smell of ripe sh*t in a stadium toilet.
The Republican candidate pulled in a helluva lotta votes via old-fashioned demagoguery, modern racism, and some clever Tweets. Trump is running strong in swing states like Ohio and Pennsylvania. But his own party hates him, many refuse to endorse him, a lot of people are hoping he self-destructs, and many more want some magic process to replace him with one of the “good Republicans” who already failed in the primaries.
And then Hillary. She has famously high negatives, is distrusted by a vast number of Americans, believed to be an actual criminal by large numbers, and has yet to answer for her emails and her corrupt Clinton Foundation. She is the textbook case of big money, big donor politics, and a lifetime Washington insider. Republican hatred for her assures Congress will do as little as possible for any agenda she puts forward if elected, assuming she has one other than to immediately start her campaign for a second term while further enriching herself.
That all adds up to a miserable picture of America in 2016. We have a reality TV star and real estate developer running against the only candidate in American history seeking the White House while under an active FBI criminal investigation.
What’s a voter with still intact critical thinking skills to do? Fall victim to the emerging meme of both candidates, vote for the lesser of two evils, pick me or you’ll get the other one? Are we really supposed to participate in an electoral process that is subtitled “Pick the One That Sucks a Little Less?”
No. Let the whole damn thing burn down and collapse.
Let Trump/Clinton take us into as many wars as they hope to, bleed our youth and our treasury dry. Stand back as three military personnel a day commit suicide. Fight the Russians, ISIS, the Chinese, militarize Africa like 21st century colonialists, set up more secret prisons, expand Guantanamo, torture, hell, rape the families of “terrorists” in front of them to force confessions on anything and everything and then use that info for a new war. Fake WMDs in Iraq? That was amateur work.
Let them concentrate more and more wealth into a tiny group, such that the concept of the “One Percent” is quaint; let it be the .01 percent. Let them deliver cash and gold directly to the front door of the White House and stop pretending such things are “contributions.” Let people go hungry, make higher education only for the rich or those stupid enough to take on a lifetime of student loan debt. Watch people suffer from lack of basic health care. Stop wasting money on infrastructure that wealthy people never use anyway. Thin out the herd with lead-soaked water.
Throw up billboards reminding everyone that the NSA is spying on everything they do, and make kids rat out their parents who smoke weed. Unleash the drones over America and stop wasting money “prosecuting” American terrorists. Keep the prisons looking like plantations.
And then stand back and watch it all burn down. Turn us loose to eat each other. Make us fight for scraps and scavenge trash piles. If anything is left after all that, then maybe we can try again. If not, we should all just smile and welcome Chelsea Clinton to the White House in 2024.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
The web’s biggest content providers have started using automation to remove “extremist propaganda” videos from their sites.
Censoring Content
YouTube (owned by Google) and Facebook are among the sites deploying systems to block or rapidly take down Islamic State videos and other similar material, sources said, though no company would confirm the action.
The technology employed was originally developed to remove copyright-protected content on video sites. It looks for “hashes,” unique digital fingerprints that Internet companies automatically assign to specific videos, allowing all content with matching fingerprints to be removed rapidly. Someone finds an offensive video, tags it, and then searches find other copies across the Internet.
Newly posted videos would be checked against a database of banned content to identify unauthorized information.
The system was kicked off in late April, amid pressure from an Obama White House concerned about online radicalization. Internet companies held a conference call to discuss options, including use of a content-blocking system put forward by the private Counter Extremism Project, a nonprofit controlled in part by George W. Bush Homeland Security Advisor Frances Townsend.
Get it yet?
Government and private industry will decide what content you (as well as journalists and academics) may see on the Internet. What is and is not allowable will be decided by a closed process, and will be automated. A database will be drawn upon for decision making.
Databases and tagging can be hacked/manipulated, perhaps by governmental intelligence organizations, maybe some bad guys, hell, even by advertisers to control what is available to you online.
Since content removed equals content prohibited, you’ll never know what you can’t see. The obvious slippery slope is in decisions about what is “extremist” and what is legitimate free, political speech that, while offensive, has a right to be heard and a place in the market of ideas.
So how about blocking all videos of police violence during say a Ferguson/Baltimore scenario, so as not to “inflame” a situation?
And even if Government A plays nicely, Government B may not, and dictatorships and oligarchies will have a new tool for repression. In the same way Western companies are forced now by China, for example, to adjust content, they will likely be forced to add things to the no-fly database of ideas. Corporations will be in a position to censor things on behalf of governments.
Via the Edward Snowden documents, we already know that many tech companies cooperate directly with the NSA and others, either voluntarily, or under pressure from secret national security practices and laws. It is not a matter of “it can happen here,” but one of “it is already happening here.”
But, some will say, Google, et al, are private companies. They can do what they want with their businesses, and you don’t have to use them.
Certain private businesses, such as power companies and transportation providers, have become clearly so much a part of society that they indeed can’t just do what they want. They become public utilities, and there is no doubt that organizations like Google are squarely in the category.
Lastly, for those who prefer dictionary things, do check up on the definition of true fascism: a collusion between government and industry.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Here’s a shout out to all of you who said “If I’ve got nothing to hide I’ve got nothing to fear” after the Snowden revelations. And this little gem deals only with publicly available information about you. Imagine what it’s like when it gets into the good stuff you think is private.
An Orwellian startup called Tenant Assured will to take a deep dive into your social media, including chats, check-ins, how many times you’ve posted words like pregnant, wasted, busted, no money, broke, moving back in with the parents, weed, or loan, and deliver to potential landlords and employers a “personality score.”
While many people already Google folks they might rent to or hire, this new service aggregates a mountain of information and then evaluates it. At the end, someone gets some numbers that describe you (see sample reports, below,) with little idea how those numbers came to be determined.
How many times did you check-in at a bar? Are you a drunk who’ll screw up at work? How often does your relationship status change? Same sex relationships? Evidence of drug use? Political affiliation?
The report will also assess your “financial stress level” as a breakdown of five personality traits: extraversion, neuroticism, openness, agreeableness, and conscientiousness.
The company says it is aware that some of the information it gathers cannot legally be used to decline a loan, lease or job, but nicely covers itself. “All we do is give them the information,” a spokesperson said. “It’s up to landlords to do the right thing.”
The company states its goal as “you won’t hire a dog sitter or book an Airbnb without first viewing a social media dossier,” as compiled by the company.
Welcome to your future. We’ll soon be looking back on the Snowden revelations as quaint.
A sample report:
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
If I had to choose one phrase to sum up America’s efforts against terrorism since 9/11, it would be that lay definition of mental illness, doing the same thing over and over expecting different results.
Following 9/11 we had to go after the terrorists in their dark lairs. So we did, in Afghanistan, then Iraq, then Libya, then Yemen, then by militarizing Africa, the Iraq again and then Syria. We’ve been bombing and invading places in the Middle East continuously since 9/11, every day expecting different results.
Literally days after 9/11, it was felt that the problem was the government did not know enough about what was happening inside the U.S. vis-vis terrorists, so the vast capabilities of the NSA and FBI were pointed inward. From a relatively modest start, we advanced to Snowden-esque levels where every phone call, every email and every GPS-tracked move of everyone is monitored, every day expecting different results.
When it seemed we did not have the intelligence and enforcement tools needed, we created a new cabinet level agency, the Department of Homeland Security. That quickly grew into one of the largest bureaucracies in America. We created terror fusion centers, staffed up at the FBI and CIA, every day expecting different results.
Orlando Shooter Omar Mateen
And that of course brings us to Orlando Shooter Omar Mateen, whom the FBI stalked for 10 months, interviewed twice and then ignored. Through that we learned that there are some 10,000 FBI terrorism investigations open, with new cases added daily as Americans are encouraged to see something and say something. The New York Times tells us tens of thousands of counterterrorism tips flow into the FBI each year, some maybe legitimate, others from “vengeful ex-spouses or people casting suspicion on Arab-Americans.”
The flood of leads is so relentless that counterterrorism agents hung a section of fire hose outside their offices in Northern Virginia as a symbol of their mission.
Intelligence Surge, or a Surge of Intelligence?
So having missed the Orlando shooter, the Boston Marathon bombers, angry white anti-abortion shooters here and there, the answer is obvious. We need more FBI resources (Hillary Clinton has already called for an “intelligence surge”), of course every day thereafter expecting different results.
It is almost as if by trying to track every branch, leaf and dirt clod in the forest we are missing the trees. By running down every panicked tip (can you imagine how many calls have come in since Sunday in Orlando?) as a CYA exercise, we get bitten in the YA part over and over.
The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept. If so many are terrorists in one form or another, how can anyone pinpoint the real bad guys, should many of them exist at all?
By imagining we can track everyone and then sort them out, we are leaving outside the door the discussion of just why terrorists seem to keep attacking the U.S. Could it have something to do with our scorched earth policy in the Middle East?
By becoming terrified of every brown-skinned person and Muslim in America, we are leaving outside the door the discussion of how throwing innocent people off planes, maintaining secret no-fly lists, spying on whole communities, and giving media platforms to every nut job that wants to rant about what they don’t know but hate anyway about Islam might be helping “radicalize” folks here at home and abroad.
And certainly never admitting that our culture of easily available weaponry might play a role shuts down any useful discussions about gun control.
I am sure it is reasonable to expect different results by tomorrow.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Or have they?
Twitter claims it does not want intelligence agencies using a Tweet-mining service for surveillance purposes. The company recently restated its “longstanding” policy of preventing a company called Dataminr from selling information to intelligence agencies that want to monitor Tweets.
“Dataminr uses public Tweets to sell breaking news alerts to media organizations, corporations and government agencies,” a spokesman for Twitter said in a statement. “We have never authorized Dataminr or any third party to sell data to a government or intelligence agency for surveillance purposes. This is a longstanding policy, not a new development.”
There are multiple issues worth unpacking here.
— The reality-to-b*llshit level on this is very high. Twitter sounds nicely righteous, but the whole affair is one FBI front company signing up with Dataminr away from being meaningless.
— In fact, Dataminr retains its contract with the Department of Homeland Security, which it classifies as something other than an intel agency.
— Can Twitter actually stop Dataminr from gathering information about Tweets? Not really, as Dataminr uses public Tweets to do its work. It seems Twitter just asked Dataminr nicely to stop. And how many other companies out there are doing the same thing?
— Small world: The CIA’s own non-profit investment arm, In-Q-Tel, is a Dataminr investor. And Twitter itself is an investor in Dataminr.
But questions about the actual impact of Twitter’s statements aside, the worst thing about all this is that Americans are now fully dependent on corporate good deeds for the protection of their privacy. Yes, yes, we all “choose” to use social media, as we choose to use smartphones and have bank accounts and fly to Chicago. But c’mon, absent moving off the grid next to the Unabomber’s old cabin, how realistic is it for surveillance zealots to keep hiding behind the choice argument?
And for those familiar with the actual definition of fascism, collusion between the state and corporate interests, welcome to your latest piece of evidence. We have only has much privacy as Twitter and the government agree we may have.
Sample Dataminr screen:
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Espionage works like this: identify a target who has the info you need. Determine what he wants to cooperate (usually money.) Be sure to appeal to his vanity and/or patriotism. Create a situation where he can never go back to his old life, and give him a path forward where it favors his ongoing cooperation in a new life. Recruit him, because you own him.
The FBI appears to have run a very successful, very classic, textbook recruitment on the guy above, Matt Edman, to use his insider-knowledge to defeat one of the best encryption/privacy software tools available. Aloha, privacy, and f*ck you, Fourth Amendment rights against unwarranted search and seizure.
Edman is a former Tor Project developer who created malware for the FBI that allows agents to unmask users of the anonymity software.
Tor is part of a software project that allows users to browse the web and send messages anonymously. In addition to interfacing with encryption, the basic way Tor works is by bouncing your info packets from server to server around the Internet, such that each server knows only a little bit about where the info originated. If you somehow break the chain, you can only trace it back so far, if at all. Tor uses various front ends, graphic user interfaces that make it very easy for non-tech people to use.
Tor is used by (a small number of) bad guys, but it is also used by journalists to protect sources, democracy advocates in dangerous countries, and simply people choosing to exercise their rights to privacy because they are in fact entitled to do so and don’t need a reason to do so. Freedom and all that. It is up to me if I want to lock the door to my home and close the blinds, not anyone else.
Our boy Edman worked closely with the FBI to customize, configure, test, and deploy malware he called “Cornhusker” to collect identifying information on Tor users. The malware is also known as Torsploit. Cornhusker used a Flash application to deliver a user’s real Internet Protocol (IP) address to an FBI server outside the Tor network. Cornhusker was placed on three servers owned by a Nebraska man who ran multiple child pornography websites.
We all hate child pornographers and we all would like to see them crammed up Satan’s butthole to suffocate in a most terrible way. But at the same time, we should all hate the loss of our precious rights. Malware has a tendency to find its way into places it should not be, including into the hands of really bad dictators and crooks, and even if we fully trusted the FBI to only use its Tor-cracking tools for good, the danger is there.
And of course we cannot trust the FBI to use its Tor-cracking tools only for good. If Tor can be taken away from a few bad actors, then it can be taken away from all of us. Our choice to browse the web privately and responsibly is stripped from us. Encryption and tools like Tor are like any tool, even guns, in that they can be used for good or for evil. You never want to throw the baby out with the bathwater, especially when fundamental Constitutional rights are at stake.
Rough and unpleasant as it is to accept, the broad, society-wide danger of the loss of those fundamental rights in the long run out-shadows the tragedy of child pornography.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Of course he can. Have a look at the latest trailer for the upcoming Oliver Stone movie, SNOWDEN, due out in September.
The Edward Snowden story is many things, but at some level, well apart from politics, it is a helluva thriller. Think of it: a young programmer, at great personal risk, figures out a way to gain access to a vast trove of very highly classified documents from one of America’s most secret agencies. He then discovers a way to beat all of NSA’s security to smuggle that information out of secure facilities. With the Feds no doubt on his heals, he finds his way to a foreign country, meets up with journalists, and reveals to Americans (and the world) that their own government has been illegally spying on them — reading their emails, listening to their calls, looking in their very bedrooms via hijacked webcams — for years. He then successfully eludes the full resources of the U.S. government and settles into a new life in Russia.
So if that isn’t suspenseful, then not much can be.
And it is hard to imagine a filmmaker more equipped to handle this story than Oliver Stone. Stone’s work has been all about creating narratives, often narratives contradictory to the mainstream, around significant historical and social events (Wall Street, W. Platoon, JFK). Snowden’s story may have found its natural storyteller.
The trailer looks good, and shows a movie that is structured as a thriller, but one with a larger message. This film looks to be an excellent addition to the conversations about the changes he brought to the United States, and the world.
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.
Did the CIA meet with some of the 9/11 hijackers ahead of the attacks on New York? Did the Saudi government help finance those hijackers? Someone knows the answers, and soon, you might know as well.
This Summer?
James Clapper, the director of national intelligence, told the New York Times the so-called “28 pages,” a still-classified section from the official report of the Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001, may be released to the public as early as this summer. The full 838-page report, minus those pages, was published in December 2002.
The pages detail Saudi Arabia involvement in funding the 9/11 hijackers, and were classified by then-President George W. Bush.
So what do they say?
The 28 Pages
Richard Clarke is the former National Coordinator for Security, Infrastructure Protection and Counterterrorism for the United States. He is best-known for trying to warn the George W. Bush administration that a terror attack was imminent in the days preceding 9/11. As late as a July 5, 2001, White House meeting with the FAA, the Coast Guard, the FBI, Secret Service and the INS, Clarke stated that “something really spectacular is going to happen here, and it’s going to happen soon.”
Here’s what Clarke said at a security forum held this week in New York about what those 28 pages will reveal:
— 9/11 hijackers and Saudi citizens (15 of the 19 hijackers were Saudis) Khalid Al-Midhar and Nawaq Al Hamzi met in San Diego with several other Saudis, including one who may have been a Saudi intelligence agent and another who was both an al Qaeda sympathizer and an employee of the Saudi Consulate in Los Angeles.
— The CIA also made contact with Midhar and Hamzi in San Diego, and unsuccessfully tried to “turn them,” i.e., recruit them to work for the United States. The CIA did not inform the FBI or others of this action until just before 9/11. (In a 2009 interview, Clarke speculated that the CIA would have used Saudi intelligence as an intermediary to approach the two al-Qaeda operatives.)
— The 28 pages may include speculation that the Saudi Ministry of Islamic Affairs funded mosques and other locations in the U.S. used by al Qaeda as meeting places and for recruitment.
— The rumors that Saudi charities and/or the spouse of then-Saudi ambassador to the United States Bandar bin Sultan (who went on to be director general of the Saudi Intelligence Agency from 2012 to 2014) directly funded the 9/11 hijackers per se are “overblown,” according to Clarke.
However, elements of Saudi charities and the ambassador himself did regularly provide funding to various Saudi citizens in the United States, for example, those needing money for medical care. It is possible that the 9/11 hijackers defrauded Saudi sources to obtain funds, but less clear that any Saudi government official knowingly funded persons for the purpose of committing 9/11.
Alongside Clapper, Clarke too believes the 28 pages will be released to the public within the next five to six weeks.
Others have suggested more clear ties between the hijackers and the Saudis, including multiple pre-9/11 phone calls between one of the hijackers’ handlers in San Diego and the Saudi Embassy, and the transfer of some $130,000 from Bandar’s family checking account to yet another of the hijackers’ Saudi handlers in San Diego.
Not the What, But the Why
Should the full 28 pages be released, there will no doubt be enormous emphasis placed on what they say, specifically the degree to which they implicate elements of Saudi Arabia and/or the Saudi royal family in funding or supporting the 9/11 hijackers. If the CIA contact with some of the hijackers is confirmed, that will be explosive.
But as pointed out in Oliver Stone’s movie JFK (below), after the what is the why, and that answer has the potential to affect the future, not just document the past.
— Why were the pages classified in the first place (who benefited?) and why did they stay classified now into a second administration, some 15 years after the events they discuss took place?
— Why did the United States allow officials of the Saudi Ministry of Islamic Affairs to work in the U.S. under diplomatic status? That Ministry’s existence goes back to the 1991 Gulf War. The presence of American troops in Saudi Arabia was a shattering event in the country’s history, calling into question the bargain between the royal family and the Wahhabi clerics, whose blessing allows the Saud family to rule. In 1992, a group of the country’s most prominent religious leaders issued the Memorandum of Advice, which implicitly threatened a clerical coup.
The royal family, shaken by the threat to its rule, accommodated most of the clerics’ demands, giving them more control over Saudi society. One of their directives called for the creation of a Ministry of Islamic Affairs, which would be given offices in Saudi embassies and consulates. As the journalist Philip Shenon writes, citing John Lehman, the former Secretary of the Navy and a 9/11 commissioner, “it was well-known in intelligence circles that the Islamic affairs office functioned as the Saudis’ ‘fifth column’ in support of Muslim extremists.”
Only one official in the Ministry of Islamic Affairs inside the U.S., Fahad al-Thumairy, was stripped of his diplomatic visa and deported because of suspected ties to terrorists. That was in 2002.
— Why does the U.S. still allow allow officials of the Saudi Ministry of Islamic Affairs to work in the U.S. under diplomatic status?
— Why did the American government not arrest Omar al-Bayoumi, a Saudi national and employee of the Saudi aviation-services company Dallah Avco. Although he drew a salary, according to the New Yorker he apparently never did any actual work for the company during the seven years he spent in America. Bayoumi was in frequent contact with the Saudi Embassy and with the consulate in Los Angeles; he was widely considered in the Arab expat community to be a Saudi spy, though the Saudi government has denied that he was.
— Why did the CIA not reveal its contacts with the two 9/11 hijackers? Who benefited?
Copyright © 2020. All rights reserved. The views expressed here are solely those of the author(s) in their private capacity.