MCViewPoint

Opinion from a Libertarian ViewPoint

Posts Tagged ‘Edward Snowden’

Snowden Warns Smartphone Owners About Danger of Personal Data Scanning by Phonemakers

Posted by M. C. on September 3, 2021

“[Apple] breaks down this barrier between service and your phone, and now they start scanning on your phone. They can scan for anything, they can scan for political criticism, they can scan for financial records, they can scan for really anything,” Snowden said, noting that once Apple has established the precedent of using this type of scanning, it loses the ability to say the company will never use it.

https://www.lewrockwell.com/2021/09/no_author/snowden-warns-smartphone-owners-about-danger-of-personal-data-scanning-by-phonemakers/

MOSCOW (Sputnik) – Smartphone owners should be wary of phone producers, in particular Apple, trying to scan personal data and files on devices, former US intelligence contractor Edward Snowden said on 2 September.

The remark, related to Apple’s new controversial scanning system for iPhones, was made during the annual New Knowledge conference in Russia, which is running this year from Wednesday to Friday. The technology is set to be installed on users’ devices with the upcoming iOS 15 update, and is said to scan photos for child pornography.

“[Apple] breaks down this barrier between service and your phone, and now they start scanning on your phone. They can scan for anything, they can scan for political criticism, they can scan for financial records, they can scan for really anything,” Snowden said, noting that once Apple has established the precedent of using this type of scanning, it loses the ability to say the company will never use it.

The new technology has caused privacy concern among people around the world, even though it is said to be coming out only in the United States and used for security reasons, he said.

“Once Apple proves that it is possible for them to scan for some kind of forbidden content … once they say you can have this file on your phone, we developed a system to detect it. They cannot decide in future what kind of files be searched for … it is government question … that is dangerous,” Snowden said.

The whistleblower added that devices should be made more secure, as now there are private companies that do nothing but create ways to hack into smartphones and sell these hacking methods to governments around the world.

Be seeing you

Posted in Uncategorized | Tagged: , , , , | Leave a Comment »

Snowden joins battle against iPhone photo-scanning plan as Apple insults privacy activists as ‘screeching voices of the minority’ — RT World News

Posted by M. C. on August 7, 2021

“No matter how well-intentioned [Apple] is rolling out mass surveillance to the entire world with this. Make no mistake: if they can scan for kiddie porn today, they can scan for anything tomorrow,” he tweeted on Thursday night. “They turned a trillion dollars of devices into iNarcs – *without asking.*”

If Apple admits to its spying, it’s evil twin Google likely has already been at work without mentioning it.Time to start using that real camera again.

You are using a VPN and Firefox, Duckduckgo or Startpage…right?

https://www.rt.com/news/531389-apple-petition-privacy-snowden/

NSA whistleblower Edward Snowden has endorsed a petition against Apple’s plan to scan every iPhone user’s photos, calling it an assault on privacy. The company insisted its intention is only to root out child sexual abuse.

The letter, published on the platform Github on Friday is signed by security and privacy experts, cryptographers, researchers, academics, legal experts and ordinary consumers, united in condemnation of Apple’s “privacy-invasive content scanning technology.”

If you have a @github account, you can join me in co-signing the first letter uniting security & privacy experts, researchers, professors, policy advocates, and consumers against @Apple‘s planned moves against all of our privacy.https://t.co/QIb1TwJE0C— Edward Snowden (@Snowden) August 6, 2021

While acknowledging that efforts to combat child exploitation and abuse are “almost unquestionably well-intentioned,” the signers say that Apple’s proposal to constantly monitor and scan everyone’s photos – and alert authorities if its AI-driven algorithm tags them as criminal – “introduces a backdoor that threatens to undermine fundamental privacy protections for all users of Apple products.”

They warn that the technology has the potential to bypass any end-to-end encryption that would normally safeguard the user’s privacy – something Apple has long been promoting as a major feature of its software ecosystem.

Apple’s plan to roll out the scanning program in the US was leaked on Thursday via the Financial Times. It immediately raised eyebrows among cybersecurity researchers and privacy advocates – including Snowden, who became a household name in 2013 after blowing the whistle on the National Security Agency’s warrantless surveillance of Americans.

“No matter how well-intentioned [Apple] is rolling out mass surveillance to the entire world with this. Make no mistake: if they can scan for kiddie porn today, they can scan for anything tomorrow,” he tweeted on Thursday night. “They turned a trillion dollars of devices into iNarcs – *without asking.*”

The letter he shared contains quotes from the Electronic Frontier Foundation (EFF), the Center for Democracy and Technology (CDT), and the Open Privacy Research Society, as well as several prominent advocates and researchers.

They all urged Apple to halt the deployment of the proposed technology “immediately” and reaffirm their commitment to user privacy and encryption.

I know, it sounds nuts. But ten years ago I would have said “running a local scanner on your device’s photo library even when photos aren’t shared” sounds nuts. And yet here we are.— Matthew Green (@matthew_d_green) August 6, 2021

Judging by the content of an internal memo sent on Friday by vice-president for software Sebastien Marineau-Mes, however, Apple is doubling down on the project – and seeking to motivate employees with a letter of praise insulting the critics.

“We’ve seen many positive responses today. We know some people have misunderstandings, and more than a few are worried about the implications, but we will continue to explain and detail the features so people understand what we’ve built,” Marineau-Mes wrote in the memo, which was reprinted by 9to5Mac on Friday.

He then appends the note Apple received from Marita Rodriguez, an executive with the National Center for Missing and Exploited Children (NCMEC), saying he found it “incredibly motivating, and hope that you will as well.”

Apple distributed an internal memo today which referred to pushback against its new content surveillance measures as “the screeching voices of the minority.” I have nothing to add. pic.twitter.com/6R9moiekyN— Nadim Kobeissi (@kaepora) August 6, 2021

“We know that the days to come will be filled with the screeching voices of the minority. Our voices will be louder,” Rodriguez wrote, after saying that NCMEC is “SO PROUD” of everyone at Apple and “the incredible decisions you have made in the name of prioritizing child protection.”

Apple has previously defended the encrypted nature of its operating systems, famously going to court in 2016 to fight the FBI demand for a ‘backdoor’ to the iPhone of the suspect in the San Bernardino, California terrorist shooting rampage. In its legal briefs, the company said the US government was demanding something they didn’t have and would be “too dangerous” for them to create.

The FBI later managed to unlock the phone, reportedly using an Israeli spy tool, but found nothing of use. Last month, it emerged that another Israeli spy tool, Pegasus, has been used to hack tens of thousands of iPhones around the world – including those of journalists, dissidents and even heads of state.

Be seeing you

Posted in Uncategorized | Tagged: , , , , , , , , | Leave a Comment »

The NSA Is Spying on Tucker Carlson (and Everyone Else) | The Libertarian Institute

Posted by M. C. on July 5, 2021

https://libertarianinstitute.org/articles/the-nsa-is-spying-on-tucker-carlson-and-everyone-else/

by Jim Bovard

Fox News host Tucker Carlson was mocked on social media this week for stating that he had been told that the National Security Agency was reading his private emails and spying on him. The usual suspects called Carlson paranoid, because there are so many checks and balances to assure the feds would never illegally target a vexatious Biden critic. However, on Tuesday, a dissent by Travis LeBlanc, a member of the Privacy and Civil Liberties Oversight Board, revealed that one of the NSA’s most intrusive surveillance engines, XKeyscore, may be violating federal law and Americans’ rights and privacy.

In 2013, Edward Snowden leaked documents proving that XKeyscore was the surveillance state’s incarnation of paranoia. What did it take for the NSA to justify vacuuming up Americans’ emails and internet data? Merely detecting “someone searching the web for suspicious stuff.” The peril of that farcical standard was compounded because, as Snowden explained, NSA surveillance tools enabled him to “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email.” Thanks to its all-encompassing standard of “suspicious,” NSA has “assembled on the order of 20 trillion [email and phone] transactions about U.S. citizens with other U.S. citizens,” according to former NSA senior analyst William Binney. Six months after Snowden’s disclosures began, federal judge Richard Leon issued a ruling denouncing the NSA surveillance regime as “almost Orwellian”: “I cannot imagine a more indiscriminate and arbitrary invasion than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval.”

After the uproar created by the Snowden revelations, the civil liberties watchdog board leaped into action to investigate XKeyscore. Six years later, the board finished its 56-page report, a confidential version of which was provided to the White House and select members of Congress in March. Unfortunately, the board apparently did not have time to look under any rocks to see what the NSA might be hiding. In a dissent partially declassified on Tuesday, LeBlanc complained that the board failed to ask “how many U.S. persons have been impacted by XKeyscore, how much data the program collects and analyzes, how widely information analyzed through XKeyscore is shared, the number of lives saved, or the number of terrorist events averted as a result of XKeyscore.” In 2019, XKeyscore resulted in “hundreds of compliance incidents,” and LeBlanc noted that “U.S. law and the known collection or processing of U.S. person information are serious compliance issues.” However, the civil liberties oversight board did not “request specific information” about violations of U.S. law by NSA. LeBlanc groused that the board’s report “reads more like a book report of the XKeyscore program than an independent oversight analysis.”

Continue reading this article at The American Conservative

About Jim Bovard

Jim Bovard is the author of Public Policy Hooligan (2012), Attention Deficit Democracy (2006), Lost Rights: The Destruction of American Liberty (1994), and 7 other books. He is a member of the USA Today Board of Contributors and has also written for the New York Times, Wall Street Journal, Playboy, Washington Post, and other publications. His articles have been publicly denounced by the chief of the FBI, the Postmaster General, the Secretary of HUD, and the heads of the DEA, FEMA, and EEOC and numerous federal agencies.

Be seeing you

Posted in Uncategorized | Tagged: , , , , | Leave a Comment »

Conspiracy: Theory and Practice – Continuing Ed — with Edward Snowden

Posted by M. C. on June 30, 2021

https://edwardsnowden.substack.com/p/conspiracy-pt1

Edward Snowden

I.

The greatest conspiracies are open and notorious — not theories, but practices expressed through law and policy, technology, and finance. Counterintuitively, these conspiracies are more often than not announced in public and with a modicum of pride. They’re dutifully reported in our newspapers; they’re bannered onto the covers of our magazines; updates on their progress are scrolled across our screens —  all with such regularity as to render us unable to relate the banality of their methods to the rapacity of their ambitions.

The party in power wants to redraw district lines. The prime interest rate has changed. A free service has been created to host our personal files. These conspiracies order, and disorder, our lives; and yet they can’t compete for attention with digital graffiti about pedophile Satanists in the basement of a DC pizzeria.

This, in sum, is our problem: the truest conspiracies meet with the least opposition.

Or to put it another way, conspiracy practices — the methods by which true conspiracies such as gerrymandering, or the debt industry, or mass surveillance are realized — are almost always overshadowed by conspiracy theories: those malevolent falsehoods that in aggregate can erode civic confidence in the existence of anything certain or verifiable.

In my life, I’ve had enough of both the practice and the theory. In my work for the United States National Security Agency, I was involved with establishing a Top-Secret system intended to access and track the communications of every human being on the planet. And yet after I grew aware of the damage this system was causing — and after I helped to expose that true conspiracy to the press — I couldn’t help but notice that the conspiracies that garnered almost as much attention were those that were demonstrably false: I was, it was claimed, a hand-picked CIA operative sent to infiltrate and embarrass the NSA; my actions were part of an elaborate inter-agency feud. No, said others: my true masters were the Russians, the Chinese, or worse — Facebook.

Contrary to what a surprisingly large number of people on Twitter believe, that is very much not me.

As I found myself made vulnerable to all manner of Internet fantasy, and interrogated by journalists about my past, about my family background, and about an array of other issues both entirely personal and entirely irrelevant to the matter at hand, there were moments when I wanted to scream: “What is wrong with you people? All you want is intrigue, but an honest-to-God, globe-spanning apparatus of omnipresent surveillance riding in your pocket is not enough? You have to sauce that up?”

It took years — eight years and counting in exile — for me to realize that I was missing the point: we talk about conspiracy theories in order to avoid talking about conspiracy practices, which are often too daunting, too threatening, too total.


II.

It’s my hope in this post and in posts to come to engage a broader scope of conspiracy-thinking, by examining the relationship between true and false conspiracies, and by asking difficult questions about the relationships between truth and falsehood in our public and private lives.

I’ll begin by offering a fundamental proposition: namely, that to believe in any conspiracy, whether true or false, is to believe in a system or sector run not by popular consent but by an elite, acting in its own self-interest. Call this elite the Deep State, or the Swamp; call it the Illuminati, or Opus Dei, or the Jews, or merely call it the major banking institutions and the Federal Reserve…

See the rest here

Posted in Uncategorized | Tagged: , , , , | Leave a Comment »

CIA (Dis)Information Operations Come Home To The US | ZeroHedge

Posted by M. C. on June 8, 2021

Not today. Journalism is today devoted to eliminating practitioners unwilling to play the game. Few have been targeted more than Glenn Greenwald (with Matt Taibbi as runner up.) Greenwald exploded into a journalistic superhero for his reporting on Edward Snowden’s NSA archive, founding The Intercept to serve as a platform for that work (Greenwald’s downfall parallels Julian Assange, who went from liberal hero for exposing the foundational lies of the Iraq War to zero when his Wikileaks was demonized for supposedly helping Donald Trump.)

https://www.zerohedge.com/political/cia-disinformation-operations-come-home-us

Tyler Durden's Photoby Tyler Durden

Via WeMeantWell.com,

Reporters joke the easiest job in Washington is CIA spokesman. You need only listen carefully to questions and say “No comment’ before heading to Happy Hour. The joke, however, is on us. The reporters pretend to see only one side of the CIA, the passive hiding of information about itself. They meanwhile choose to profit from the other side of the equation, active information operations designed to influence events in America. It is 2021 and the CIA is running an op against the American people.

Leon Panetta, the Director CIA from 2009 to 2011 explained bluntly his CIA did influence foreign media outlets ahead of elections in order to “change attitudes within the country.” The method, Panetta said, was to “acquire media within a country or within a region that could very well be used for being able to deliver a specific message or work to influence those that may own elements of the media to be able to cooperate, work with you in delivering that message.”

The CIA has been running such information ops to influence foreign elections since the end of WWII. Richard Bissell, who ran the agency’s operations during the Cold War, wrote of “exercising control over a newspaper or broadcasting station, or of securing the desired outcome in an election.” A report on the CIA in Chile boasts the Agency portrayed its favored candidate in one election as a “wise, sincere and high-minded statesman” while painting his leftist opponent as a “calculating schemer.” At one point in the 1980s foreign media insertions ran 80 a day.

The goal is to control information as a tool of influence. Sometimes the control is very direct, simply paying a reporter to run a story, or, as was done in Iraq, simply operating the media outlet yourself (known as the Orwellian Indigenous Media Project.) The problem is such direct action is easily exposed, destroying credibility.

A more effective strategy is to become a source for legitimate media such that your (dis)information inherits their credibility. The most effective is an operation so complex one CIA plant is the initial information source while a second CIA plant acts seemingly independently as a confirming source. At that point you can push information to the mainstream media, who can then “independently” confirm it, sometimes unknowingly, through your secondary agents. You can basically write tomorrow’s headlines.

Other techniques include exclusive true information mixed with disinformation to establish credibility, using official sources like Embassy spokesmen to appear to inadvertently confirm sub details, and covert funding of research and side gigs to promote academics and experts who discredit counter-narratives. The academics may never know where their money comes from, adding to their credibility.

From the end of WWII to the Church Committee in 1976, this was all just a conspiracy theory. Of course the US would not use the CIA to influence elections, especially in fellow democracies. Except it did. By its nature reporting on intelligence always requires one to work with limited information. Always give time a chance to explain.

Through Operation Mockingbird the CIA ran over 400 American journalists as direct assets. Almost none have ever discussed their work publically. CIA documents show journalists were engaged to perform tasks for the CIA with the consent of the managements of America’s leading news organizations. The New York Times alone willingly provided cover for about ten CIA officers over decades and kept quiet about it. Such long term relationships are a powerful tool, so feeding a true big story to a young reporter to get him promoted is part of the game. Don’t forget the anonymous source who drove the Watergate story was an FBI official who through his actions made the careers of  cub reporters Woodward and Bernstein. Bernstein went on to champion the Russiagate story. Woodward became a Washington hagiographer. Ken Dilanian, formerly with the Los Angeles Times, the Associated Press, and now working for NBC, maintains a “collaborative relationship” with the CIA.

That’s the tradecraft and the history. The problem for America is once again the tools of war abroad have come home. The intelligence community is currently operating against the American people using established media.

See the rest here

Be seeing you

Posted in Uncategorized | Tagged: , , , , | Leave a Comment »

Edward Snowden Warns Joe Biden Is Illegally Spying on European Leaders | Neon Nettle

Posted by M. C. on June 2, 2021

By using politicians’ and officials’ phone numbers, authorities were able to pull texts and phone calls, while those being spied on were none the wiser. 

Do you have a phone number?

https://neonnettle.com/news/15437-edward-snowden-warns-joe-biden-is-illegally-spying-on-european-leaders

By: Jay Greenberg

edward snowden says joe biden is  deeply involved  in spying on foreign leaders
Edward Snowden says Joe Biden is ‘deeply involved’ in spying on foreign leaders

Former CIA contractor-turned-whistleblower Edward Snowden has warned that Democrat Joe Biden is “deeply involved” in a National Security Agency (NSA) operation to illegally spy on European leaders.

According to Snowden, who now lives in exile in Russia after fleeing the United States, says Biden has been working with intelligence officials in Denmark to spy on foreign leaders part of an NSA program.

The most notable targets of the alleged operation are German leaders Chancellor Angela Merkel and President Frank Walter-Steinmeier.

Snowden claims Merkel and Walter-Steinmeier are among several high-profile officials who were illegally spied on by the NSA.

The NSA reportedly acted with the cooperation and help of the Danish Defense Intelligence Service (FE), according to a European media investigation. 

The spying allegations first came to light in 2013, thanks to NSA documents leaked by Snowden.

german leaders chancellor angela merkel and president frank walter steinmeier were targeted by the operation
German leaders Chancellor Angela Merkel and President Frank Walter-Steinmeier were targeted by the operation

Snowden’s leaks specifically revealed Merkel’s private cell phone had been monitored by the Obama administration.

The new revelations come as a result of multiple European news outlets – including Danish state broadcaster DR, German NDR, Swedish SVT, Norwegian NRK, and French Le Monde among others – obtaining access to internal reports and information from Danish Secret Service sources.

According to the investigation, politicians in Germany, Sweden, Norway, the Netherlands, France, and even Danish finance industries were also targeted by the NSA with the help of Danish spies.

The Danish government has reportedly known about the cooperation for years and forced FE leadership to step down in 2020 after discovering the full extent of the relationship following an internal investigation.

They did not, however, report the findings to any European Union allies.

The spying was primarily done through hijacking Danish electronic communications systems as the country has landing stations for subsea internet cables between numerous countries, such as Germany and Sweden.

By using politicians’ and officials’ phone numbers, authorities were able to pull texts and phone calls, while those being spied on were none the wiser. 

 biden is well prepared to answer for this when he soon visits europe   snowden said
‘Biden is well-prepared to answer for this when he soon visits Europe,’ Snowden said

Snowden, who first made his revelations about the NSA while Biden was vice president, says the current president is “well-prepared” to answer the accusations and that there should be a requirement of “full disclosure” from both Denmark and the US.

“Biden is well-prepared to answer for this when he soon visits Europe since, of course, he was deeply involved in this scandal the first time around,” he tweeted. 

“There should be an explicit requirement for full public disclosure not only from Denmark but their senior partner as well.”

Biden is well-prepared to answer for this when he soon visits Europe since, of course, he was deeply involved in this scandal the first time around.

There should be an explicit requirement for full public disclosure not only from Denmark, but their senior partner as well. https://t.co/TJL7gr6dy8 — Edward Snowden (@Snowden) May 30, 2021

In response to explosive reports, Norway’s Defence Minister Frank Bakke-Jensen said they were “taking the allegations seriously,” while Sweden’s Defence Minister Peter Hultqvist said he “demanded full information on these things.” 

Neither the NSA nor the Danish Defence Intelligence Service has issued a comment yet.

Former German opposition leader and Merkel rival, Peer Steinbrück, who also reportedly had his communications monitored, told German broadcaster ARD that he considers the situation to be a “scandal.” 

“It is grotesque that friendly intelligence services are indeed intercepting and spying on top representatives of other countries,” he said.

[RELATED] Ex-NYPD Commissioner: I’ve Seen Hunter’s Hard Drive; the Bidens ‘Belong in Handcuffs’

Be seeing you

Posted in Uncategorized | Tagged: , , , , , , | Leave a Comment »

Rough Ridin’ with Biden | Kunstler

Posted by M. C. on January 23, 2021

The threatened impeachment trial will be a marvel of casuistry — a procedure for removing someone from office who is no longer in office — and also for the transparently flimsy charge of “inciting the insurrection” at the capitol. As if to underscore the absurdity of that, Antifa squads rioted in Portland and Seattle on inauguration night. Their banners expressed less-than-jubilant sentiment for the new regime.

https://kunstler.com/clusterfuck-nation/rough-ridin-with-biden/

James Howard Kunstler

Speaking of the inauguration, I don’t know what was more peculiar: Lady Gaga sweeping out onto the capitol dais in Hunger Games drag —and I mean but exactly, down to the golden mockingjay pinned above her left breast — or Garth Brooks’s post-hymn dash to the exit as though he just heard the repo man was coming for his Gulfstream jet parked across the Potomac at Reagan National Airport.

The immense ranked American flags deployed silently down the mall in place of annoying US citizens lent a funereal vibe to the proceedings (as in the death of your country), while the thousands of massed national guard troops signaled the paranoia crackling under the surface as Ol’ White Joe Biden stepped forward to commence his party’s punishments against the unWoke (disguised as a call for “unity”). He was surrounded by a virtual wax museum of Deep Staters salivating for the upcoming blood-feast: The Obamas, Hillary and Bill (nodding off), Nancy, Chuck, Mitch… but just who was the Asian chap sitting behind the man-of-the-hour? Secret Service? Or his new minder (courtesy of Uncle Xi)?

As for Mr. Trump, he departed as he had arrived in 2016: stridently contemptuous toward the parasitical oligarchy that finally expelled him like a bladder-stone. The threatened impeachment trial will be a marvel of casuistry — a procedure for removing someone from office who is no longer in office — and also for the transparently flimsy charge of “inciting the insurrection” at the capitol. As if to underscore the absurdity of that, Antifa squads rioted in Portland and Seattle on inauguration night. Their banners expressed less-than-jubilant sentiment for the new regime. The Portland outfit broke windows and spray-painted the city’s Democratic headquarters, faking-out pols who had warned against an uprising of “white supremacists.” Of course, all those arrested would be promptly released without charges — demonstrating just how serious the Wokester officials running those cities really are about criminal anarchy. The grannies swept into the capitol rotunda by Antifa incursionists January 6th won’t be so lucky.

Neither did a much chattered-about military takeover happen during the tension-filled transition hours, though kibitzers on the web insist days later that it remains secretly underway. On his way out, Mr. Trump failed to pardon either Julian Assange or Edward Snowden, a disturbing failure, while he commuted the sentences of a couple of two-bit rap-stars, based on their contributions to advancing human dignity. And whatever Mr. Trump finally rooted out in the way of declassified FBI documents has already disappeared into the DC quicksand.

Much adored as he is for valiantly opposing everything swampish, it might be best now for Mr. Trump to just retire from the political scene and leave the battle to others. He made his point, colorfully and often bravely, considering the astounding bad faith of his adversaries, though he certainly could have articulated the stakes better and with more decorum. He leaves not merely a vacuum but a sucking chest wound of leadership opposing hysterical and tyrannical Wokery. Who will step forward in his absence? Probably someone we haven’t heard from yet. That’s how these things work.

The narrative instructs us that the election is resolved — so shut up about it already. But the election is not resolved. Enterprising gumshoes will be sifting through the evidence, interviewing witnesses, and combing through the thickets of fraud for a long time to come. Crime will be outed, if not prosecuted. Mr. Biden moves under a cloud of illegitimacy. Beyond the lingering election dispute lies all that evidence about the Biden family’s money-grubbing operations in foreign lands, clear down to the money-laundering records. Think that won’t bite eventually?

Nothing else is resolved about the national drift toward the Niagara of woe just downstream of here. Mr. Biden couldn’t have asked for trouble more loudly on Day One than by shutting down deportations of foreign nationals here illegally and signaling an open borders policy. The legions of newly unemployed and financially ruined US small business owners and workers may take a dim view of that. Rent and mortgage moratoria are extended as far ahead as June, as if landlords and mortgage-lenders don’t need to be paid to keep the banking system running. The new president has promised further, and even more severe, Covid-19 lockdowns. The Democratic Party apparently wants to utterly destroy what’s left of the real on-the-ground economy. No incoming US president has gotten off to a more feckless and ill-fated start.

Be seeing you


Posted in Uncategorized | Tagged: , , , , | Leave a Comment »

The Past Lives On: The Elite Strategy To Divide and Conquer – Edward Curtin

Posted by M. C. on December 1, 2020

Many Trump voters no doubt know that Trump was never going to save them. But he said the right things, and desperation and disgust will grasp onto the slightest will-o’-the-wisp when disbelief in the whole rotten system is widespread.

Let’s not bullshit: everyone knows the game is rigged.

Trump is a liar.

Biden is a liar.

Great Britain’s Boris Johnson is a liar.

Fill in the names of the political charlatans.

The system is built on lies to keep the illusions brightening the screen of the great picture show, what Neil Gabler has rightly called “life the movie.”

http://edwardcurtin.com/the-past-lives-on-the-elite-strategy-to-divide-and-conquer/

Edward Curtin

“They call my people the White Lower Middle Class these days. It is an ugly, ice-cold phrase, the result, I suppose, of the missionary zeal of those sociologists who still think you can place human beings on charts.  It most certainly does not sound like a description of people on the edge of open, sustained and possibly violent revolt,” wrote the marvelous New York journalist, Pete Hamill in “The Revolt of the White Lower Middle Class” in New York magazine.  He added:

The White Lower Middle Class? Say that magic phrase at a cocktail party on the Upper East Side of Manhattan and monstrous images arise from the American demonology. Here comes the murderous rabble: fat, well-fed, bigoted, ignorant, an army of beer-soaked Irishmen, violence-loving Italians, hate-filled Poles. Lithuanians and Hungarians….Sometimes these brutes are referred to as ‘the ethnics’ or ‘the blue-collar types.’ But the bureaucratic, sociological phrase is White Lower Middle Class. Nobody calls it the Working Class anymore.

He wrote that on April 14, 1969. Yesterday. Little changes.

Transferred from NYC to the middle of the country half a century later, these people are referred to as Trump’s “deplorables.” They comes in baskets, as Hillary Clinton said.  And even though they represent nearly half the voting public in the last two presidential elections – 70+ million Americans – their complaints are dismissed as the rantings of ignorant, conservative racists.

Name calling substitutes for understanding. This is not an accident.

Like Hamill, I am a NYC born and bred Irish-American – my working-class Bronx to Pete’s Brooklyn. We both attended the same Jesuit high school in different years. Unlike Hamill, known for his gritty street reporting, because I have been a college sociology professor, I could falsely be categorized as a northeastern liberal intellectual oozing with disdain for those who voted for Trump.  This is false, because, like Hamill, I see it as my intellectual duty to understand what motivates these voters, just as I do with those who voted for Biden.

I didn’t vote for Donald Trump, nor did I vote for Joseph Biden, or Hillary Clinton in 2016.  I am not one of those sociologists Hamill refers to; I use the term Working Class and am acutely aware of the social class nature of life in the U.S.A., where the economic system of neo-liberal capitalism is constructed to try to convince working Americans that the system cares for them, and if they grow disgusted with its lies and inequities and rage against the machine by voting for anyone who seems to be with them (even a super-rich reality TV real estate magnate named Trump who is not with them), they are dumb-ass bigots whose concerns should be brushed off.

The truth is that both the Trump voters and the Biden voters have been taken for a ride.  It is a game, a show, a movie, a spectacle.  It hasn’t changed much since 1969; the rich have gotten richer and the poor, working, and middle classes have gotten poorer and more desperate.  Those who have profited have embraced the fraud.

The Institute for Policy Studies has just released a new analysis showing that since the start of the Covid-19 “pandemic” in mid-March and the subsequent transfer upwards of $5 trillion to the wealthy and largest corporations through the Cares Act, approved 96-0 in the U.S. Senate, 650 U.S. billionaires have gained over a trillion dollars in eight months as the American people have suffered an economic catastrophe.  This shift upward of massive wealth under Trump is similar to Obama’s massive 2009 bailout of the banks on the backs of American workers. Both were justified through feats of legerdemain by both political parties, accomplices in the fleecing of regular people, many of whom continue to support the politicians that screw them while telling them they care.

If the Democrats and the Republicans are at war as is often claimed, it is only over who gets the larger part of the spoils. Trump and Biden work for the same bosses, those I call the Umbrella People (those who own and run the country through their intelligence/military/media operatives), who produce and direct the movie that keeps so many Americans on the edge of their seats in the hope that their chosen good guy wins in the end.

I am well aware that most people disagree with my analysis.  It does seem as if I am wrong and that because the Democrats and their accomplices have spent years attempting to oust Trump through Russia-gate, impeachment, etc. that what seems true is true and Trump is simply a crazy aberration who somehow slipped through the net of establishment control to rule for four years.  To those 146 + million people who voted for Biden and Trump this seems self-evident.  But if that is so, why, despite their superficial differences – and Obama’s, Hillary Clinton’s and George W. Bush’s for that matter – have the super-rich gotten richer and richer over the decades and the war on terror continued as the military budget has increased each year and the armament industries and the Wall Street crooks continued to rake in the money at the expense of everyone else?  These are a few facts that can’t be disputed. There are many more. So what’s changed under Trump?  We are talking about nuances, small changes.  A clown with a big mouth versus traditional, “dignified” con men.

If you were writing this script as part of long-term planning and average people were getting disgusted from decades of being screwed and were sick of politicians and their lying ways, wouldn’t you stop the reruns and create a new show?  Come on, this is Hollywood where creative showmen can dazzle our minds with plots so twisted that when you leave the theater you keep wondering what it was all about and arguing with your friends about the ending. So create a throwback film where the good guy versus the bad guy was seemingly very clear, and while the system ground on, people would be at each other’s throats over the obvious differences, even while they were fabricated.

Variety is necessary.  You wouldn’t want to repeat the film from 2008 when a well-spoken black man came into town out of nowhere to clean up the mess created by the poorly spoken white sheriff who loved war and then the black hero went on to wage war in seven countries while his fans sat contented in the audience loving the show and making believe they didn’t see what was happening on the screen even though their hero jailed whistle blowers and greatly expanded the surveillance state right in front of their eyes.

No, as the years passed, those two guys turned out to be buddies, and their wives hit it off, and a famous photograph appeared of the good guy’s wife hugging the bad guy, which was not a good thing for the script that has the Republicans warring against the Democrats.

A new story line was needed. How about an opéra bouffe, someone suggested, and the rest is history. Or pseudo-history. This is the real matrix. The most sophisticated mind control operation up to this point, with the coronavirus lockdown added to propel it to what the producers hope is a conclusion.

What more can I say?

Billy Joel said it:  “JFK blown away.”

The Towers pulverized. David Ray Griffin told us the truth repetitively.

Minds of this generation destroyed, as Allen Ginsberg said in Howl: “I saw the best minds of my generation destroyed by madness.”

It’s been many generations now.  There has been a form of social madness growing over the decades and it is everywhere now.  Look at people’s faces, if you can see them behind the masks; everywhere the strained and stressed looks, the scared rabbit eyes that you see on the wards of mental hospitals. The look that says: what the fuck has happened as they stare into a blank screen in a tumbling void, to paraphrase Don DeLillo from his new book Silence, where people speak gibberish once their digital world is mysteriously taken down and they wander in the dark.  We are in the dark now, even though the lights and screens are still shining for the time being.

Let those who think I am wrong about Trump and Biden being players in the same show, consider this. If Trump is truly the opponent of the Deep State, the Swamp, the corrupt establishment, he will pardon Julian Assange, Chelsey Manning, and Edward Snowden who have been persecuted by these forces.  He has nothing left to lose as he exits stage right.

The journalist Julian Assange has done more than anyone to expose the sick underbelly of the gangster state, its intelligence and military secrets, its illegal and immoral killings. That is why he has been hounded and locked away for so long. It’s a bipartisan persecution of an innocent man whose only “crime” has been to tell the truth that is allegedly the essence of a democratic society.

Chelsey Manning has also suffered tremendously for exposing the savagery of U.S. military operations.

And Edward Snowden has been forced into Russian exile for telling us about the vast global surveillance systems run by the NSA and CIA to spy on the American people.

See the rest here

Be seeing you

Posted in Uncategorized | Tagged: , , , | Leave a Comment »

Edward Snowden On Big Tech Companies, Like Facebook, Censoring & Controlling Information – Collective Evolution

Posted by M. C. on November 30, 2020

These companies are not obligated by the law to do almost any of what they’re actually doing but they’re going above and beyond, to, in many cases, to increase the depth of their relationship (with the government) and the government’s willingness to avoid trying to regulate them in the context of their desired activities, which is ultimately to dominate the conversation and information space of global society in different ways…They’re trying to make you change your behaviour… – Snowden

https://www.collective-evolution.com/2020/11/29/edward-snowden-on-big-tech-censoring-information-joe-biden-press-freedom-dangers/

ByArjun WaliaCE Staff Writer

In Brief

  • The Facts:Glenn Greenwald interviews NSA whistleblower Edward Snowden about Big Tech censorship of information, and the muzzling of journalists who go against the grain.
  • Reflect On:f your perception is built by mainstream media, do you truly know what is going on in the world if they are often working to hide or censor stories that would dramatically change your perception?

Glenn Greenwald is no stranger to censorship, he’s the journalist who worked with Edward Snowden (NSA mass surveillance whistleblower)  to put together his story and release it to the world while working for the Guardian. He eventually left the Guardian and co-founded his own media company, The Intercept, an organization that would be free from censorship and free to report on government corruption and wrong-doings of powerful people and corporations. He recently resigned from The Intercept as well due to the fact that they’ve now censored him, and is now completely independent. You can find his work here.

Anybody who reports on or sheds a bright light onto immoral and unethical actions taken by governments and the powerful corporations they work with has been subjected to extreme censorship. In the case of Edward Snowden, he’s been exiled, and Julian Assange of Wikileaks is currently clinging to his life for exposing war crimes and other unethical actions by multiple governments and corporations. There are many other examples. What does it say about our civilization when we prosecute those who expose harm, corruption, immoral/unethical actions by governments and war crimes?

Greenwald recently interviewed Snowden about internet censorship and the role big tech companies and governments are playing. Greenwald explains that in one of his earliest meetings with Snowden, he (Snowden) explained that he was driven in large part by the vital role the early internet played in his life, “one that was free of corporate and state control, that permitted anonymity and exploration free of monitoring, and, most of all, fostered unrestrained communication and dissemination of information by and among citizens of the world without corporate and state overlords regulating and controlling what they were saying.

This is what he and Snowden go into in the interview posted below. Prior to that I provide a brief summary of Snowden’s key thoughts.

Snowden starts off by mentioning government surveillance programs and the companies they contracted to do this work and compares them to modern day Big Tech giants censoring information on a wide range of topics. We see this today with elections/politics, to medical information dealing with coronavirus and vaccines, for example.

“In secret, these companies had all agreed to work with the U.S. Government far beyond what the law required of them, and that’s what we’re seeing with this new censorship push is really a new direction in the same dynamic. These companies are not obligated by the law to do almost any of what they’re actually doing but they’re going above and beyond, to, in many cases, to increase the depth of their relationship (with the government) and the government’s willingness to avoid trying to regulate them in the context of their desired activities, which is ultimately to dominate the conversation and information space of global society in different ways…They’re trying to make you change your behaviour… – Snowden

So basically, these Big Tech companies have become slaves, if you will, to the governments will, or at least powerful people situated in high places within the government. Snowden brings up the fact that many of these companies are hiring people from the CIA, who come from the Pentagon, who come from the NSA, who have top secret clearances…The government is a customer of all the major cloud service providers. They are also a major regulator of these companies, which gives these companies the incentive to do whatever they want.

This is quite clear if you look at Facebook, Google and Amazon employees. There are many who have come from very high positions within the Department of Defense.

In no case is this more clear than Amazon – Snowden

Amazon appointed Keith Alexander, director of the NSA under Barack Obama.

He was one of the senior architects of the mass surveillance program that courts have repeatedly now declared to be unlawful and unconstitutional….When you have this kind of incentive from a private industry to maintain the warmest possible relationship with the people in government, who not just buy from you but also have the possibility to end your business or change the way you do business…You now see this kind of soft corruption that happens in a constant way. – Snowden

Snowden goes on to explain how people get upset when government, especially the Trump government, tries to set the boundaries of what appropriate speech is by attempting to stop big tech censorship, he then says,

If you’re not comfortable letting the government determine the boundaries of appropriate political speech, why are you begging Mark Zuckerberg to do it?

I think the reality here is…it’s not really about freedom of speech, and it’s not really about protecting people from harm…I think what you see is the internet has become the de facto means of mass communication. That represents influence which represents power, and what we see is we see a whole number of different tribes basically squabbling to try to gain control over this instrument of power.

What we see is an increasing tendency to silence journalists who say things that are in the minority.

In Brief

  • The Facts:Glenn Greenwald interviews NSA whistleblower Edward Snowden about Big Tech censorship of information, and the muzzling of journalists who go against the grain.
  • Reflect On:f your perception is built by mainstream media, do you truly know what is going on in the world if they are often working to hide or censor stories that would dramatically change your perception?

Glenn Greenwald is no stranger to censorship, he’s the journalist who worked with Edward Snowden (NSA mass surveillance whistleblower)  to put together his story and release it to the world while working for the Guardian. He eventually left the Guardian and co-founded his own media company, The Intercept, an organization that would be free from censorship and free to report on government corruption and wrong-doings of powerful people and corporations. He recently resigned from The Intercept as well due to the fact that they’ve now censored him, and is now completely independent. You can find his work here. advertisement – learn more

Anybody who reports on or sheds a bright light onto immoral and unethical actions taken by governments and the powerful corporations they work with has been subjected to extreme censorship. In the case of Edward Snowden, he’s been exiled, and Julian Assange of Wikileaks is currently clinging to his life for exposing war crimes and other unethical actions by multiple governments and corporations. There are many other examples. What does it say about our civilization when we prosecute those who expose harm, corruption, immoral/unethical actions by governments and war crimes?

–> Practice Is Everything: Want to become an effective changemaker? Join CETV and get access to exclusive conversations, courses, and original shows that empower you to embody the changemaker this world needs. Click here to learn more!

Greenwald recently interviewed Snowden about internet censorship and the role big tech companies and governments are playing. Greenwald explains that in one of his earliest meetings with Snowden, he (Snowden) explained that he was driven in large part by the vital role the early internet played in his life, “one that was free of corporate and state control, that permitted anonymity and exploration free of monitoring, and, most of all, fostered unrestrained communication and dissemination of information by and among citizens of the world without corporate and state overlords regulating and controlling what they were saying.

This is what he and Snowden go into in the interview posted below. Prior to that I provide a brief summary of Snowden’s key thoughts.

Snowden starts off by mentioning government surveillance programs and the companies they contracted to do this work and compares them to modern day Big Tech giants censoring information on a wide range of topics. We see this today with elections/politics, to medical information dealing with coronavirus and vaccines, for example.

“In secret, these companies had all agreed to work with the U.S. Government far beyond what the law required of them, and that’s what we’re seeing with this new censorship push is really a new direction in the same dynamic. These companies are not obligated by the law to do almost any of what they’re actually doing but they’re going above and beyond, to, in many cases, to increase the depth of their relationship (with the government) and the government’s willingness to avoid trying to regulate them in the context of their desired activities, which is ultimately to dominate the conversation and information space of global society in different ways…They’re trying to make you change your behaviour… – Snowden advertisement – learn more

So basically, these Big Tech companies have become slaves, if you will, to the governments will, or at least powerful people situated in high places within the government. Snowden brings up the fact that many of these companies are hiring people from the CIA, who come from the Pentagon, who come from the NSA, who have top secret clearances…The government is a customer of all the major cloud service providers. They are also a major regulator of these companies, which gives these companies the incentive to do whatever they want.

This is quite clear if you look at Facebook, Google and Amazon employees. There are many who have come from very high positions within the Department of Defense.

In no case is this more clear than Amazon – Snowden

Amazon appointed Keith Alexander, director of the NSA under Barack Obama.

He was one of the senior architects of the mass surveillance program that courts have repeatedly now declared to be unlawful and unconstitutional….When you have this kind of incentive from a private industry to maintain the warmest possible relationship with the people in government, who not just buy from you but also have the possibility to end your business or change the way you do business…You now see this kind of soft corruption that happens in a constant way. – Snowden

Snowden goes on to explain how people get upset when government, especially the Trump government, tries to set the boundaries of what appropriate speech is by attempting to stop big tech censorship, he then says,

If you’re not comfortable letting the government determine the boundaries of appropriate political speech, why are you begging Mark Zuckerberg to do it?

I think the reality here is…it’s not really about freedom of speech, and it’s not really about protecting people from harm…I think what you see is the internet has become the de facto means of mass communication. That represents influence which represents power, and what we see is we see a whole number of different tribes basically squabbling to try to gain control over this instrument of power.

What we see is an increasing tendency to silence journalists who say things that are in the minority. Stay Aware Subscribe To Our Newsletter  

You can watch the full conversation between Greenwald and Snowden below, the conversation is about 40 minutes long.

https://www.youtube.com/embed/5qEuKCS-czU?start=0&modestbranding=1&showinfo=0&theme=light

Closing Comments: This kind of information almost begs the question, are we ready as a society to truly create and disseminate journalism that is honest, integral and bi-partisan? Why is it that these types of organizations fail or struggle? How do some media companies fail? Well, they no longer stay true to their mission. They fall to the pressure of politics and fall into ideology. How many other times did ideology change what media outlets reported? Yes, it’s almost impossible to have zero bias, but how close can we get to zero? How can we achieve this when media outlets who do not fit within the accepted framework and disseminate information that challenges the popular opinion are constantly being punished for simply putting out information?

As Snowden mentioned above, these Big Tech companies in collusion with governments are literally attempting to not only censor information, but change the behaviour of people as well, especially journalists. When you take away one’s business or livelihood as a result of non-compliance, you are in a way forcing them to comply and do/say things you they way you want them done/said. We’ve experienced massive amounts of censorship and demonetization here at Collective Evolution, but we haven’t changed as a results of it. We simply created CETV, a platform that helps support our work as a result of censorship.

Posted in Uncategorized | Tagged: , , , , | Leave a Comment »

THE REVELATIONS OF WIKILEAKS: No. 9—Opening the CIA’s Vault – Consortiumnews

Posted by M. C. on October 28, 2020

https://consortiumnews.com/2020/10/26/the-revelations-of-wikileaks-no-9-opening-the-cias-vault/

By Patrick LawrenceSpecial to Consortium News

On Feb. 6, 2017, WikiLeaks released documents detailing the Central Intelligence Agency’s espionage program in the months leading up to and following France’s presidential election in 2012. 

The agency used spies and cyberweapons to infiltrate and hack into the major political parties with competing candidates — the Socialists, the National Front and the Union for a Popular Movement. Their candidates — respectively François Hollande, Marine Le Pen and incumbent Nicolas Sarkozy — were also spied upon individually, as were many other prominent political figures.

The objectives of the program included ascertaining the contending parties’ political strategies and platforms, their views of the U.S., and their relations with the European Union, with other European nations (Germany, Britain) as well as Israel, Palestine, Libya, Syria, and others. The CIA’s French operation lasted 10 months, beginning in November 2011 and enduring until September 2012, several months after Hollande won the election and formed a Socialist government.

WikiLeaks’ disclosure of the agency’s project bears a special irony: It was just as WikiLeaks published this material in 2017 that the CIA helped propagate unsubstantiated (and later discounted) “intelligence” that Russian hackers and propagandists were interfering with France’s presidential election that year. Similar allegations (similarly lacking in evidence) were floated as the European Union held parliamentary elections in May 2019.

As WikiLeaks reported at the time of the releases on the CIA’s covert activities in France, those revelations were to serve “as context for its forthcoming CIA Vault 7 series.” WikiLeaks’ apparent intent was to display a CIA’s hacking operation in action.

Vault 7, the subject of this latest report on the history of WikiLeaks disclosures, stands as the most extensive publication on record of classified and confidential CIA documents. Never before and not since have the agency’s innumerable programs and capabilities been so thoroughly exposed to public scrutiny.

Biggest Since Snowden

Rally in Germany in support of Edward Snowden, Aug. 30, 2014. (Markus Winkler, CC BY-SA 2.0, Wikimedia Commons)

Julian Assange, WikiLeaks founder and publisher, described the Vault 7 publications as the most significant since Edward Snowden, the former CIA data analyst, released an unprecedented trove of National Security Agency documents in the summer of 2013. 

The Vault 7 series concerns the extraordinarily sophisticated inventory of cyber weapons the CIA has developed to spy on or hack into the communications of any person or entity it targets. Apart from the espionage function, certain of the programs in Vault 7 — this designation is WikiLeaks’, not the CIA’s — can also plant documents and data without being detected as the source — when, for example, the agency wishes to compromise an adversary via a false-flag operation.

The program wherein this capability was developed, called Marble, may have been crucial to creating the orthodox “narrative” that Russia was responsible for the theft of Democratic Party email in 2016 — the cornerstone allegation in the construct we now call Russiagate.

The Vault 7 releases expose the CIA’s hacking activities from 2013 to 2016. The series began on March 7, 2017, with the publication of “Year Zero,” an introductory survey and analysis of the agency’s globally deployed hacking programs. The Vault 7 series ran for six months, concluding on Sept. 7, 2017.

Complete as of that date, the series is comprised of 23 publications, each of which focuses on an individual hacking or cyber-espionage program. Marble is one of these. 

The CIA’s development of its hacking capabilities began as a joint effort with the National Security Agency. But the Sept. 11 terrorist attacks and the subsequent wars in Afghanistan and Iraq, begun in 2001 and 2003 respectively, proved a turning point for the agency. It was during this time that the CIA, as WikiLeaks puts it in its introduction to the Vault 7 series, “gained political and budgetary preeminence over the NSA.”

According to former U.S. intelligence sources, the CIA has invested some $175 billion in its vast variety of cyber programs in the post–2001 years. “The agency’s hacking division, WikiLeaks notes, “freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.”

A Near Deal to Free Assange

Assange in 2014, while in the Ecuadorian embassy in London. (Cancillería del Ecuador, CC BY-SA 2.0, via Wikimedia Commons)

WikiLeaks launched the Vault 7 series at a delicate moment for Assange, who was at the time taking asylum at the Ecuadoran embassy in London.

Shortly after Donald Trump took office in January 2017, Assange’s attorneys approached a lawyer named Adam Waldman, who was noted for his Washington connections.

Assange’s team proposed negotiations that would commit the U.S. to granting Assange limited immunity and safe passage from the Ecuadoran embassy in exchange for his agreement to limit publication of classified CIA documents. The agency knew by this time that WikiLeaks had an extensive inventory of CIA documents it was prepared to publish. These included what WikiLeaks soon named Vault 7.

Crucially, Assange signaled that he was also willing to reveal technical evidence that would shed light on who was not responsible for the theft of email from the Democratic National Committee in mid–2016. This was key: By this time the “narrative” that Russia had hacked the DNC’s computer servers was well-established; the Democratic Party, the intelligence agencies, the Federal Bureau of Investigation and the media were heavily invested in it. Assange, while observing the WikiLeaks principle of not revealing sources, had by this time asserted that Russia had nothing to do with the intrusion.  

The Justice Department and Assange’s attorneys drafted an immunity deal in the course of the negotiations that both sides agreed to pursue. The attorneys’ initial contact, through Waldman, was a DoJ official named Bruce Ohr. The lead DoJ negotiator was named David Laufman. When WikiLeaks released “Year Zero” on March 7, 2017, these negotiations were still in progress; the release had no apparent impact on the talks.

But at this point the contacts between Assange and the U.S. government took a fateful turn. The only full account of the events summarized below was written by John Solomon, who has followed the Russiagate phenomenon from the first, and was published in The Hill on June 25, 2018.

Shortly after negotiations began, Waldman, the go-between, contacted Mark Warner, the Democratic senator from Virginia, to see if the Senate Intelligence Committee, of which Warner was vice-chairman, wished to contact Assange on its own in connection to matters related to Russia. This proved a miscalculation.

Sen. Mark Warner giving keynote address during 2008 Democratic National Convention in Denver. (Qqqqqq, CC BY-SA 3.0, Wikimedia Commons)

Warner, who had vigorously pressed the Russiagate narrative from the first, soon contacted James Comey, then the FBI director. Comey was also an aggressive Russiagate advocate and had a direct interest in sustaining the official account of events: It was while he ran the FBI that the bureau worked with CrowdStrike, the infamous cybersecurity firm hired by the DNC, to build what is now demonstrated to be an entirely false case to support the Democrats’ assertions of Russian responsibility for the mail intrusion.

Any proof that Russia had no role in the DNC mail theft would have discredited the FBI and Comey and very likely destroyed the career of Comey and numerous others. 

Comey, working through Sen. Warner, immediately ordered Waldman to cut off the Assange–DoJ talks. Although negotiations continued a brief while longer, Comey had effectively dealt them a soon-to-be-fatal blow. By this time WikiLeaks had released two other Vault 7 document collections, including what it called the Marble Framework.

The DoJ finally broke off the negotiations on April 7, when WikiLeaks released a fourth set of documents, this one called Grasshopper. Six days later Mike Pompeo, then CIA director, gave a notably aggressive speech at the Center for Strategic and International Studies, the Washington think tank, in which he called WikiLeaks “a nonstate hostile intelligence service often abetted by state actors like Russia.” https://www.youtube.com/embed/pe3ApagvwNM?enablejsapi=1&autoplay=0&cc_load_policy=0&iv_load_policy=1&loop=0&modestbranding=1&fs=1&playsinline=0&controls=1&color=red&rel=0&autohide=2&theme=dark&

With the CSIS speech, Pompeo effectively opened the Trump administration’s rigorously pressed campaign to have Assange extradited from Britain. The WikiLeaks founder appears never to have had another chance to negotiate an agreement providing for his freedom.

Run Amok

The Vault 7 releases continued at a steady pace, roughly four a month, for the next five months. The documents WikiLeaks made public, along with descriptions of the programs WikiLeaks deemed significant, can be found via its “Vault 7: Projects” report. Taken together they describe an expensively funded U.S. government organization that has run frighteningly amok, operates with no regard for U.S. or international law, and stands entirely beyond civilian control. Many of the projects exposed in the Vault 7 releases, and very likely most or all, violate Fourth Amendment rights to privacy and the CIA’s charter, which bars the agency from activity on U.S. soil.

Former CIA Director Allen Dulles. (CIA)

The history of the CIA, reaching back to Allen Dulles’ tenure as director (1953 to 1961), indicates that from its earliest days it entertained a diabolic desire to accumulate the power to operate with no reference to constraints of any kind, including those imposed by ordinary standards of decency. In this way it was effectively the id of America’s exceptionalist consciousness. What we see in the Vault 7 series is the perversely logical outcome of this culture of limitless impunity and immunity.

By the end of 2016, the hacking division of the CIA’s Center for Cyber Intelligence had more than 1,000 hacking, malware, virus-implanting, remote-control and Trojan-horse programs in its inventory. These comprised more than 700 million lines of computer code.

Former CIA and NSA officials told Consortium News that a line of code costs roughly $25 to produce, putting the cost of the agency’s hacking tools over the years these programs were developed at $175 billion. “The CIA had created its ‘own NSA,’” WikiLeaks noted when it began releasing the Vault 7 publications, “with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.”

What follows are accounts and summaries of the most significant of the 23 Vault 7 releases. We present these chronologically, the earliest first, to give readers a clear idea of how WikiLeaks organized and presented the Vault 7 project. 

Year Zero

March 7, 2017

With the publication of “Year Zero,” it was immediately clear that WikiLeaks had penetrated into or very near the core of the CIA’s cyberoperations. This first Vault 7 release is comprised of 8,761 documents and files obtained from what WikiLeaks describes as “an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virginia, the agency’s headquarters.

Aerial view of CIA headquarters in Langley, Virginia. (Carol M. Highsmith, Wikimedia Commons)

As WikiLeaks notes, the agency had “lost control of the majority of its hacking arsenal” shortly before it published “Year Zero.” There had been a massive leak, to put this point in simple terms. “The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner,” WikiLeaks reported, “one of whom has provided WikiLeaks with portions of the archive.” This occurred at some point in 2016.

“Year Zero” serves as an overview of “the scope and direction of the CIA’s global hacking program” and an introduction to material included in the Vault 7 releases to follow. The agency’s inventory of tools was the purview — and we can assume continues to be so — of the Engineering Development Group (EDG), a technology department under the authority of the Center for Cyber Intelligence.

The EDG also tests and operates its products once they are perfected and added to the agency’s arsenal. The engineering group, Wikileaks reported, has developed some 500 projects, each with its own malware and hacking tools. The EDG’s focus is on penetration, implanting, control and exfiltration. “Year Zero” analyzes the most important of these. 

High among the objectives of Vault 7 programs was to achieve the capability of penetrating the manufacturers of cellular telephones and other electronic devices for a variety of operations. Among the products targeted for this purpose were Apple’s iPhone and iPad, Google’s Android operating system, Microsoft Windows and Samsung televisions.

Programs included in the Vault 7 collection were designed to hack these and other commonly used devices and systems remotely so they can corrupt the targets and also send the CIA the owner’s geographic location and all audio and text communications. Other programs were capable of turning on a device’s microphone and camera without the owner’s knowledge. Other attack-and-control programs targeted MAC OS X, Solaris and Linux operating systems.

A number of the CIA’s programs revealed in the Vault 7 releases focus exclusively on one or another of these companies, most commonly Microsoft.

Building 92 at Microsoft Corporation headquarters in Redmond, Washington. (Coolcaesar, CC BY-SA 4.0, Wikimedia Commons)

“Grasshopper” (April 7, 2017) is a platform for the development of malware designed for attacks on Windows operating systems. “AfterMidnight” (May 12, 2017) and “Brutal Kangaroo” (June 22, 2017) also target the Microsoft Windows platform, while “Weeping Angels” (April 21, 2017) infiltrated Samsung televisions. “Outlaw Country” (June 30, 2017) is designed for attack on computers that use the Linux OS. 

“Year Zero” also details the CIA’s use of what the agency calls “zero days.” These are commonly occurring software code imperfections and vulnerabilities in electronic devices that the CIA knows and makes use of but does not disclose to manufacturers or the public.

In some respects, zero days are treated as commodities. While the CIA discovered some zero days on its own, it obtained others from the NSA, GCHQ (the NSA’s British counterpart), or the FBI. It also purchased zero days from private cyber-weapons manufacturers much as the Pentagon would buy a weapons system from a defense contractor.

The CIA’s stockpile of zero days enables it to bypass encryption systems installed in such communications applications as WhatsApp, the widely used long-distance telephone and text service. This makes zero days, which can be used either locally or remotely, especially significant in extending the reach of the agency’s hacking operations. The CIA’s practice of keeping zero days secret — effectively hoarding them, as WikiLeaks notes — is especially cynical and dangerous.

As WikiLeaks explains:

“If the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable. The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google, the CIA ensures that it can hack everyone– at the expense of leaving everyone hackable.”

Most malware developed by the EDG and related units in the CIA’s organizational structure is designed to remain in implanted devices for considerable lengths of time — in some cases years — after it is installed. So long as it is present it communicates regularly and in two-way fashion with the CIA’s Command and Control systems.

While many programs are implanted remotely, some require a physical presence. This typically means an agent infests a targeted device on site. But in some cases, the CIA covertly intervened into supply chains and delivery services, including postal services, by opening, infecting, and on-sending products without the knowledge of either the manufacturer or the purchaser.

As it began its Vault 7 series with “Year Zero,” WikiLeaks took the occasion to note “an extreme proliferation risk in the development of cyber ‘weapons,’” as Assange put it at the time. He drew a comparison between these weapons and the global arms trade, noting “the inability to contain them, combined with their high market value.”

The source of the Vault 7 trove, who was among the former government hackers and contractors circulating the Vault programs among themselves, shared these and other concerns:

“In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation, and democratic control of cyber-weapons.”

This is Consortium News’s intent in publishing its report on Vault 7.

Mindful of the risks attached to proliferation, and perhaps of past (and unfounded) charges that its publications compromised U.S. national security and American personnel, WikiLeaks notes that it was careful to avoid distributing what it termed “‘armed’ cyber-weapons” as it published the Vault 7 series.

It also said it redacted “tens of thousands of CIA targets and attack machines throughout Latin America, Europe, and the United States.” In a note in an FAQ section appended to “Year Zero,” WikiLeaks states, “Names, email addresses, and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.”

Dark Matter
March 23, 2017

Projects developed in the “Dark Matter” program were designed to penetrate Apple Macs and iPhones with what is called firmware — that is, malware that continues to infect the units attacked even if the OS is reinstalled. “Sonic Screwdriver,” a sub-project in this group, allowed attackers to install and activate computer code while users booted up these Apple devices.

See the rest here

Patrick Lawrence, a correspondent abroad for many years, chiefly for theInternational Herald Tribune, is a columnist, essayist, author and lecturer. His most recent book is Time No Longer: Americans After the American Century (Yale). Follow him on Twitter @thefloutist. His web site is Patrick Lawrence. Support his work via his Patreon site.

Be seeing you

Posted in Uncategorized | Tagged: , , , , , | Leave a Comment »