Department of Homeland Security – Strategic Culture Foundation https://www.strategic-culture.org Strategic Culture Foundation provides a platform for exclusive analysis, research and policy comment on Eurasian and global affairs. We are covering political, economic, social and security issues worldwide. Mon, 11 Apr 2022 21:41:14 +0000 en-US hourly 1 https://wordpress.org/?v=4.9.16 ‘Smart Borders?’ High-Tech ‘Virtual’ Walls Are Even More Invasive Than Iron Walls https://www.strategic-culture.org/news/2021/10/14/smart-borders-high-tech-virtual-walls-are-even-more-invasive-than-iron-walls/ Thu, 14 Oct 2021 18:16:49 +0000 https://www.strategic-culture.org/?post_type=article&p=757097 By Todd MILLER

In December 2019, the city of Chula Vista announced with much fanfare that it had been designated as California’s first Welcoming City. This designation honored the community’s commitment to include its undocumented residents. Located 15 minutes from the U.S.-Mexico border, Chula Vista has one of the highest populations of immigrants in the United States, about 30 percent of its population of 270,000. Rachel Peric, the director of Welcoming America, said this “inclusive environment” was a “model . . . to ensure residents of all backgrounds—including immigrants, can thrive and belong.”

College student Nicholas Paúl told me his city’s designation “was a proud moment” for his community. Raised on both sides of the U.S.-Mexico border, Paúl is emblematic of many residents from Chula Vista. “I’m a fronterizo,” he told me. Every weekend he crossed the border to Tijuana to visit family and friends. “It’s a way of life,” he said. “It’s not something that is unique to me. It’s my whole family, my whole neighborhood.”

So it came as a shock to Paúl a year later, in December 2020, when an exposé by San Diego’s daily newspaper revealed that the Chula Vista Police Department was sharing information from automated license plate readers with U.S. Customs and Border Protection, the parent agency of the Border Patrol, and of Immigration and Customs Enforcement.

“They collect information not only about license plates but also the car—make, model, color, location coordinates,” Paúl said. Police mounted cameras on four patrol vehicles that constantly take pictures of license plates while they roam the city. Paúl and other Chula Vista residents feared that they were targeting the city’s undocumented population, possibly his very neighbors. Furthermore, the license plate reading program had been in effect since 2017, so this was happening even as Chula Vista received its Welcoming City designation.

Paúl’s testimony is in a new reportSmart Borders or a Humane World?, that I coauthored with immigrant rights organizer Mizue Aizeki, and border scholars Geoffrey Boyce, Joseph Nevins, and Miriam Ticktin for the nonprofit Immigrant Defense Project and the Transnational Institute.

In this report, we examine what a “smart” border is, especially the version bristling with surveillance and detection technologies currently championed by the Biden administration. Even as the events in Chula Vista spurred border residents, like Paúl, to join forces against invasive license plate reader technology in their community, border technologies are being presented nationally as harmless and humane, especially in comparison to the foreboding physical barrier that dominated the news during the Donald Trump years. The border will be “managed,” in the language of the Biden administration, and it will be as modern and cool as the smartphone in your pocket.

Former representative Nina Lowey (D-NY) expressed this technophilic framing perfectly in July 2020 after the House Appropriations Committee released its 2021 fiscal year draft. The budget, she said, provided “strong investments in modern, effective technologies” for border security while prohibiting funding for “President Trump’s racist border wall boondoggle.” In a way, this is the Democratic version of “border theater,” a smoke-and-mirrors routine that presents “smart” technology as an alternative to the border wall, rather than as an integral part, extension, and perpetuation of it.

The border wall is more than just a physical barrier; it is also a system of video surveillance systems, unmanned aerial systems (or drones), and license plate readers, like the ones used in Chula Vista, which are part of a broadening biometric collection strategy. Biometric collection has grown “big time” for CBP since 9/11, said Patrick Nemeth, the Department of Homeland Security’s director of identity operations, at the 2017 Border Security Expo, the industry trade show for new border technologies, held in in San Antonio, Texas. Nemeth said that CBP’s fingerprint data increased from 10 million to 212 million since 9/11. He boasted that DHS now had the second-largest biometric system in the world, “right behind India’s.” Since then, the number of “unique identity records” collected by the agency has increased to 260 million. And this will only keep growing as CBP upgrades its biometric system to Homeland Advanced Recognition Technology, which not only has facial, iris, and digital fingerprint capability, but will also be able to get a person’s DNA (which is already happening) and track an individual’s “relationship patterns.”

And if you were wondering what the future might entail, drone surveillance technology and biometrics are both melding and advancing together. In April 2018, DHS tested a small drone that can “fly unnoticed by human hearing and sight” along a “predetermined route observing and reporting unusual activity and identifying faces and vehicles . . . comparing them to profile pictures and license plate data.”

Technology evolves so quickly—and with so little transparency—that many border residents are unaware of how intensely their communities are being surveilled. After the exposé, Chula Vista residents like Paúl joined with the American Friends Service Committee and others to form the Chula Vista Surveillance Ad-Hoc Committee. They began to study the issue and planned to pressure City Council members at an April meeting. One obstacle, however, is that “there is a tolerance for this that has to do with society’s being much more used to using technology in a way that’s convenient for them, like using fingerprints or iris scans to open up their phones,” said Pedro Rios, the director of the U.S.-Mexico Border Program for the American Friends Service Committee.

Rios added that the “larger trend of using technology for security monitoring is for me one that is concerning because it could have a significant impact on our civil liberties.”

Chula Vista residents, Paúl and Rios explained, want to know how the Police Department could share data with immigration agencies for three years, since the city signed a contract with the private company Vigilant Solutions in 2017 to provide the Automated License Plate Reader system. When asked by reporter Gustavo Solis, Francisco Estrada, the chief of staff for Chula Vista mayor Mary Casillas Salas, acknowledged that the city chose to share information with the immigration agencies. “ICE and CBP are important,” Estrada said, “because crimes and criminals cross the border and while we do not share information about a person’s immigration status, we do work with federal law enforcement on drug interdiction, human trafficking, stolen vehicles and other crimes.” Thanks to community pressure after the exposé in December, the Police Department announced that it would stop sharing the data with CBP and ICE. Rios told me, however, that the license plate information could still be shared indirectly through “fusion centers,” intelligence hubs that DHS has throughout the country. The Chula Vista Police Department also receives funds from Operation Stonegarden, a DHS grant that funds police in primarily border states to coordinate with CBP.

The organizing committee wanted the city to get rid of the ALPR system altogether. But instead the City Council voted unanimously to keep the program, illustrating a fundamental point we make in Smart Borders or Humane World?: government officials tend to double down on surveillance instead of considering any sort of policy alternative. Casillas Salas, for example, claimed that the anti-surveillance committee was misrepresenting “what the license plate reader is or is not.” It is a tool, she claimed, to fight crime. “We will continue the dialogue, but right now I do not want to take one tool away from our police officers, not one.”

As you’ll discover in this new report, policy makers and elected officials have long asked the wrong questions and gotten the wrong answers about the border and border policing. This is especially true in a world with mounting global crises in public health, climate change, and endemic global inequalities, crises that often trigger migration. Rather than more “smart” technology, we need to “invest in the construction of a just, compassionate, and sustainable world,” as we argue in the report. Instead of asking, What is the best way to secure the border?, we need to ask better questions: How do we help create conditions that allow people to stay in the places they call home, and thrive where they reside? And, when people do have to move, how can we ensure they are able to do so safely?

And maybe even more importantly, What is the world we want to live in, and how do we get there? Part of the answer can be found in what it means to be a Welcoming City: to build a place where all residents, regardless of their immigration status, can thrive and belong.

counterpunch.org

 

]]>
The Greater the Disaster, the Greater the Profits https://www.strategic-culture.org/news/2021/03/26/greater-disaster-greater-profits/ Fri, 26 Mar 2021 16:00:07 +0000 https://www.strategic-culture.org/?post_type=article&p=736324 By Todd MILLER

In late February, I drove to see the Trump wall in Sasabe, Arizona. As soon as I parked, a green-striped Border Patrol vehicle stationed a quarter of a mile away began to creep down the dirt road toward us. Just ahead, a dystopian “No Trespassing” sign was flapping in the wind. It was cold as I stepped out of the car with my five-year-old son, William. The wall ahead of us, 30-feet high with steel bollards, was indeed imposing as it quavered slightly in the wind. Through its bars we could see Mexico, a broken panorama of hills filled with mesquites backed by a blue sky.

The Homeland Security vehicle soon pulled up next to us. An agent rolled down his window and asked me, “What are you doing? Joyriding?”

After I laughed in response to a word I hadn’t heard in years, the agent informed us that we were in a dangerous construction zone, even if this part of the wall had been built four months earlier. I glanced around. There were no bulldozers, excavators, or construction equipment of any sort. I wondered whether the lack of machinery reflected the campaign promise of the recently inaugurated Joe Biden that “not another foot” of Trump’s wall would be built.

Indeed, that was why I was here — to see what the border looked like as the post-Trump era began. President Biden had started his term with strong promises to reverse the border policies of his predecessor: families torn apart would be reunited and asylum seekers previously forced to stay in Mexico allowed to enter the United States.  Given the Trump years, the proposals of the new administration sounded almost revolutionary.

And yet something else bothered me as we drove away: everything looked the same as it had for years. I’ve been coming to this stretch of border since 2001.  I’ve witnessed its incremental disfigurement during the most dramatic border fortification period in this country’s history. In the early 2000s came an influx of Border Patrol agents, followed in 2007 by the construction of a 15-foot wall (that Senator Joe Biden voted for), followed by high-tech surveillance towers, courtesy of a multi-billion-dollar contract with the Boeing Corporation.

Believe me, the forces that shaped our southern border over the decades have been far more powerful than Donald Trump or any individual politician. During the 2020 election, it was commonly asserted that, by getting rid of Trump, the United States would create a more humane border and immigration system. And there was a certain truth to that, but a distinctly limited one. Underneath the theater of partisan politics, there remains a churning border-industrial complex, a conjunction of entrenched interests and relationships between the U.S. government — particularly the Department of Homeland Security (DHS) — and private corporations that has received very little attention.

The small border town of Sasabe and its surrounding region is a microcosm of this.

The cumulative force of that complex will now carry on in Trump’s wake. Indeed, during the 2020 election the border industry, created through decades of bipartisan fortification, actually donated more money to the Biden campaign and the Democrats than to Trump and the Republicans.

The Complex

In the 12 years from 2008 to 2020, Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) dolled out 105,000 contracts, or a breathtaking average of 24 contracts a day, worth $55 billion to private contractors. That sum exceeded their $52 billion collective budgets for border and immigration enforcement for the 28 years from 1975 to 2003. While those contracts included ones for companies like Fisher Sand and Gravel that built the 30-foot wall my son and I saw in Sasabe, many of them — including the most expensive — went to companies creating high-tech border fortification, ranging from sophisticated camera systems to advanced biometric and data-processing technologies.

This might explain the border industry’s interest in candidate Biden, who promised: “I’m going to make sure that we have border protection, but it’s going to be based on making sure that we use high-tech capacity to deal with it.”

Behind that bold, declarative sentence lay an all-too-familiar version of technological border protection sold as something so much more innocuous, harmless, and humane than what Trump was offering. As it happens, despite our former president’s urge to create a literal wall across hundreds of miles of borderlands, high-technology has long been and even in the Trump years remained a large part of the border-industrial complex.

One pivotal moment for that complex came in 2005 when the deputy secretary of the Department of Homeland Security, Michael Jackson (previously Lockheed Martin’s chief operating officer), addressed a conference room of border-industry representatives about creating a virtual or technological wall. “This is an unusual invitation,” he said then. “I want to make sure you have it clearly, that we’re asking you to come back and tell us how to do our business. We’re asking you. We’re inviting you to tell us how to run our organization.”

Of course, by then, the border and immigration enforcement system had already been on a growth spurt. During President Bill Clinton’s administration (1993-2001), for example, its annual budgets had nearly tripled from $1.5 billion to $4.3 billion. Clinton, in fact, initiated the immigration deterrence system still in place today in which Washington deployed armed agents, barriers, and walls, as well as high-tech systems to block the traditional urban places where immigrants had once crossed. They were funneled instead into dangerous and deadly spots like the remote and brutal Arizona desert around Sasabe. As Clinton put it in his 1995 State of the Union address:

“[O]ur administration has moved aggressively to secure our borders more by hiring a record number of new border guards, by deporting twice as many criminal aliens as ever before, by cracking down on illegal hiring, by barring welfare benefits to illegal aliens.”

Sound familiar?

The Clinton years, however, already seemed like ancient times when Jackson made that 2005 plea. He was speaking in the midst of a burgeoning Homeland Security era. After all, DHS was only created in 2002 in the wake of the 9/11 attacks. In fact, during George W. Bush’s years in office, border and immigration enforcement budgets grew from $4.2 billion in 2000 to $15.2 billion in 2008 — more, that is, than during any other presidency including Donald Trump’s. Under Bush, that border became another front in the war on terror (even if no terrorists crossed it), opening the money faucets. And that was what Jackson was underscoring — the advent of a new reality that would produce tens of thousands of contracts for private companies.

In addition, as U.S. war efforts in Afghanistan and Iraq began to wane, many security and defense companies pivoted toward the new border market. As one vendor pointed out to me at a Border Security Expo in Phoenix in 2012, “We are bringing the battlefield to the border.” That vendor, who had been a soldier in Afghanistan a few years earlier, smiled confidently, the banners of large weapons-makers like Raytheon hanging above him. At the time (as now), an “unprecedented boom period” was forecast for the border market. As the company VisionGain explained then, a “virtuous circle… would continue to drive spending in the long term based on three interlocking developments: ‘illegal immigration and terrorist infiltration,’ more money for border policing in ‘developing countries,’ and the ‘maturation’ of new technologies.”

Since 9/11, border-security corporate giants became big campaign contributors not only to presidential candidates, but also to key members of the Appropriations Committees and the Homeland Security Committees (both House and Senate) — all crucial when it came to border policies, contracts, and budgets. Between 2006 and 2018, top border contractors like General DynamicsLockheed MartinNorthrop Grumman, and Raytheon contributed a total of $27.6 million to members of the House Appropriations Committee and $6.5 million to members of the House Homeland Security Committee. And from 2002 to 2019, there were nearly 20,000 reported lobbying “visits” to congressional offices related to homeland security. The 2,841 visits reported for 2018 alone included ones from top CBP and ICE contractors AccentureCoreCivicGeoGroupL3Harris, and Leidos.

By the time Donald Trump entered the White House in 2017, the border-industrial complex was truly humming. That year, he would oversee a $20-billion border and immigration budget and have at his disposal nearly 20,000 Border Patrol agents (up from 4,000 in 1994), 650 miles of already built walls and barriers, billions of dollars in border technology then in place, and more than 200 immigration-detention centers across the United States.

He claimed he was going to build his very own “big, fat, beautiful wall,” most of which, as it turned out, already existed. He claimed that he was going to clamp down on a border that was already remarkably clamped down upon. And in his own fashion, he took it to new levels.

That’s what we saw in Sasabe, where a 15-foot wall had recently been replaced with a 30-foot wall. As it happened, much of the 450 miles of wall the Trump administration did, in the end, build really involved interchanging already existing smaller barriers with monstrous ones that left remarkable environmental and cultural destruction in their wake.

Trump administration policies forced people seeking asylum to wait in Mexico, infants to appear in immigration court, and separated family members into a sprawling incarceration apparatus whose companies had been making up to $126 per person per day for years. He could have done little of this without the constantly growing border-industrial complex that preceded him and, in important ways, made him.

Nonetheless, in the 2020 election campaign, the border industry pivoted toward Biden and the Democrats. That pivot ensured one thing: that its influence would be strong, if not preeminent, on such issues when the new administration took over.

The Biden Years Begin at the Border

In early January 2021, Biden’s nominee to run DHS, Alejandro Mayorkas disclosed that, over the previous three years, he had earned $3.3 million from corporate clients with the WilmerHale law firm. Two of those clients were Northrop Grumman and Leidos, companies that Nick Buxton and I identified as top border contractors in Biden’s Border: The Industry, the Democrats and the 2020 Election, a report we co-authored for the Transnational Institute.

When we started to look at the 2020 campaign contributions of 13 top border contractors for CBP and ICE, we had no idea what to expect.  It was, after all, a corporate group that included producers of surveillance infrastructure for the high-tech “virtual wall” along the border like L3Harris, General Dynamics, and the Israeli company Elbit Systems; others like Palantir and IBM produced border data-processing software; and there were also detention companies like CoreCivic and GeoGroup.

To our surprise, these companies had given significantly more to the Biden campaign ($5,364,994) than to Trump ($1,730,435). In general, they had shifted to the Democrats who garnered 55% of their $40 million in campaign contributions, including donations to key members of the House and Senate Appropriations and Homeland Security committees.

It’s still too early to assess just what will happen to this country’s vast border-and-immigration apparatus under the Biden administration, which has made promises about reversing Trumpian border policies. Still, it will be no less caught in the web of the border-industrial complex than the preceding administration.

Perhaps a glimpse of the future border under Biden was offered when, on January 19th, Homeland Security secretary nominee Mayorkas appeared for his Senate confirmation hearings and was asked about the 8,000 people from Honduras heading for the U.S. in a “caravan” at that very moment. The day before, U.S.-trained troops and police in Guatemala had thwarted and then deported vast numbers of them as they tried to cross into that country. Many in the caravan reported that they were heading north thanks to back-to-back catastrophic category 4 hurricanes that had devastated the Honduran and Nicaraguan coasts in November 2020.

Mayorkas responded rather generically that if people were found to qualify “under the law to remain in the United States, then we will apply the law accordingly, if they do not qualify to remain in the United States, then they won’t.” Given that there is no climate-refugee status available to anyone crossing the border that meant most of those who finally made it (if they ever did) wouldn’t qualify to stay.

It’s possible that, by the time I went to see that wall with my son in late February, some people from that caravan had already made it to the border, despite endless obstacles in their path. As we drove down Highway 286, also known as the Sasabe Road, there were reports of undocumented people from Guatemala, Honduras, El Salvador, and Mexico all traveling through the rugged Baboquivari mountain range to the west of us and the grim canyons to the east of us in attempts to avoid the Border Patrol and its surveillance equipment.

When President Dwight D. Eisenhower warned Americans against what he dubbed “the military-industrial complex” in 1961, he spoke of its “total influence — economic, political, even spiritual… felt in every city, every statehouse, every office of the Federal government.” Sixty years later, something similar could be said of the ever-expanding border-industrial complex. It needs just such climate disasters and just such caravans (or, as we’re seeing right now, just such “crises” of unaccompanied minors) to continue its never-ending growth, whether the president is touting a big, fat, beautiful wall or opting for high-tech border technology.

For my son and me, the enforcement apparatus first became noticeable at a checkpoint 25 miles north of the international boundary. Not only were green-uniformed agents interrogating passengers in any vehicle heading northwards, but a host of cameras focused on the vehicles passing by.

Whether they were license-plate readers or facial-recognition cameras I had no way of knowing.  What I did know was that Northrop Grumman (which contributed $649,748 to Joe Biden and $323,014 to Donald Trump in the 2020 election campaign) had received a valuable contract to ensure that CBP’s biometric system included “modalities” of all sorts — face and voice data, iris recognition, scars and tattoos, possibly even DNA sample collection, and information about “relationship patterns” and “encounters” with the public. And who could tell if the Predator B drones that General Atomics produces — oh, by the way, that company gave $82,974 to Biden and $51,665 to Trump in 2020 — were above us (as they regularly are in the border regions) using Northrup Grumman’s VADER “man-hunting” radar system first deployed in Afghanistan?

As we traveled through that gauntlet, Border Patrol vehicles were everywhere, reinforcing the surveillance apparatus that extends 100 miles into the U.S. interior. We soon passed a surveillance tower at the side of the road first erected by the Boeing Corporation and renovated by Elbit Systems ($5,553 to Biden, $5,649 to Trump), one of dozens in the area. On the other side of that highway was a gravel clearing where a G4S ($49,233 to Biden, $33,019 to Trump) van usually idles.  It’s a mobile prison the Border Patrol uses to transport its prisoners to short-term detention centers in Tucson. And keep in mind that there was so much we couldn’t see like the thousands of implanted motion sensors manufactured by a host of other companies.

Traveling through this border area, it’s hard not to feel like you’re in a profitable version of a classic panopticon, a prison system in which, wherever you might be, you’re being watched. Even five-year-old William was startled by such a world and, genuinely puzzled, asked me, “Why do the green men,” as he calls the Border Patrol, “want to stop the workers?”

By the time we got to that shard of Trump’s “big, fat, beautiful” wall, it seemed like just a modest part of a much larger system that left partisan politics in the dust. At its heart was never The Donald but a powerful cluster of companies with an active interest in working on that border until the end of time.

Just after the agent told us that we were in a construction zone and needed to leave, I noticed a pile of bollards near the dirt road that ran parallel to the wall. They were from the previous wall, the one Biden had voted for in 2006. As William and I drove back to Tucson through that gauntlet of inspection, I wondered what the border-industrial world would look like when he was my age and living in what could be an even more extreme world filled with ever more terrified people fleeing disaster.

And I kept thinking of that discarded pile of bollards, a reminder of just how easy it would be to tear that wall and the world that goes with it down.

tomdispatch.com

]]>
The Department of Homeland Security: The Ideal Authoritarian Tool https://www.strategic-culture.org/news/2020/08/06/department-homeland-security-ideal-authoritarian-tool/ Thu, 06 Aug 2020 12:19:15 +0000 https://www.strategic-culture.org/?post_type=article&p=476687 Bymelvin GOODMAN

In the wake of 9/11, the Bush administration made a series of blunders that have created havoc in U.S. governance. The invasion of Iraq in 2003 was the worst of these decisions, but not far behind was the creation of the Department of Homeland Security (DHS). The DHS has turned out to be the perfect authoritarian tool in the hands of a corrupt administration, and there is ample evidence of the department’s role in degrading public life in America in the past several weeks. The department has become Trump’s tool for targeting “anti-fascists,” the label that he has broadly applied to all protestors.

The DHS is a bureaucratic monstrosity that includes the Coast Guard, the Federal Emergency Management Agency, the Immigration and Customs Enforcement Agency (ICE), and various unrelated departments.  It has over 240,000 employees, a $50 billion budget, and a reputation for excessive waste and ineffectiveness.  It is the third largest government agency, and its 60,000 law enforcement officers represent half of all federal law enforcement agents in the government.  DHS has too many subdivisions, operates in too many disparate fields, and lacks proper congressional oversight.  The creation of DHS meant that immigration enforcement and border protection were moved from the Departments of Treasury and Justice, respectively, and were then treated as national security issues.  Under Trump, demonstrators, dissidents, and protestors have become national security issues.

It took Hurricane Katrina in 2005 to teach us what a mess had been created at DHS.  Several years later, the office of U.S. Customs and Border Protection acknowledged that it “does open mail to U.S. citizens that originate from foreign countries whenever it’s deemed necessary.”  In 2012, a Senate Homeland Security report concluded that DHS intelligence was “irrelevant, useless, or inappropriate.” In 2017, a border patrol agent was investigated for obtaining confidential travel records of a Washington journalist and using them to press for her sources.

Events in Portland, Oregon have illuminated the DHS threat to governance and civil rights as the Federal Protective Service (FPS) has operated without any consultation, let alone permission, from state or local authorities.  The FPS  deployed its unidentified agents in camouflage uniforms without identifying insignia, used so-called “nonlethal” projectiles and tear gas against American citizens, and forced demonstrators into unmarked rental cars to be held in federal buildings without charges.  DHS agents were involved in the separation of children from their parents at the southern border, and agents from U.S. Immigration and Customs Enforcement and the Customs and Border Protection (CBP) have been labeled as “RoboCops” for their aggressive measures against immigrants.  A CBP drone monitored the protest activities in Minneapolis following the murder of George Floyd.

Over the past week, the DHS Office of Intelligence and Analysis (I&A) disseminated reports to various law enforcement agencies that summarized tweets by a reporter for the New York Times and the editor of the blog Lawfare.  The journalists had posted leaked DHS documents that revealed shortcomings in the department’s aggressive handling of events in Portland. According to the Washington Post, the DHS also tracked the communications of demonstrators, another violation of the First Amendment.  The acting director of DHS, Chad Wolf, immediately acknowledged the threat to the First Amendment, stopped the illegal activities of the office, and removed its director, Brian Murphy, but this was simply an act of damage limitation. Murphy, a former FBI agent, had a reputation for misapplying the authorities of I&A, and ignoring their intelligence assessments. In any event, the overall problems of DHS remain.

The illegal creation of dossiers on journalists is reminiscent of the unconstitutional activities of the intelligence community in the 1960s and 1970s during the Vietnam War.  The congressional investigations of the mid-1970s and the excellent reporting of Seymour Hersh exposed the illegal domestic spying operations of the Central Intelligence Agency, the Federal Bureau of Investigation, and the National Security Agency to disrupt the anti-war movement.  The FBI’s counterintelligence program (COINTELPRO) actively disrupted lawful activities of numerous individuals and organizations, including Martin Luther King Jr.  FBI director J. Edgar Hoover’s designation of the Black Panther Party as the “greatest threat to the internal security of the country” is reminiscent of Trump’s identification of “antifa” as a similar threat. (At least, there was a Black Panther Party; there is no “antifa” party.) The dossiers on political dissidents is reminiscent of DHS’ collection against U.S. journalists.

Just as the FBI’s COINTELPRO and CIA’s Operation Chaos hurt the reputation of these agencies, the actions of DHS on behalf of Donald Trump are drawing criticism from former Republican directors of the agency.  The first director of DHS, Tom Ridge, the former governor of Pennsylvania, stated that it would be a “cold day in hell before I would consent to an uninvited intervention into one of my cities.”  Former director Michael Chertoff pointed out that DHS is much too willing to carry out the president’s support for brutal and aggressive force, “especially in cities…governed by liberal Democratic mayors.”

The threat to American governance in an election year is dire.  There is an authoritarian president in the White House with no respect for the rule of law; a strong advocate for presidential power in William Barr as Attorney General; toadying and unconfirmed loyalists at the top of the Department of Homeland Security; and a Republican-led Senate that will offer no criticism of the outrageous actions of the president.  We know little about Barr’s Operation Legend, which is using agents from the FBI, the U.S. Marshals Service, the Drug Enforcement Administration, and the Bureau of Alcohol, Tobacco, Firearms and Explosives to prevent peaceful demonstrations.

At least, Secretary of Defense Mark Esper and chairman of the Joint Chiefs of Staff Mark Milley expressed regret for being present when federal police officers violently cleared Lafayette Square to enable Trump’s blasphemous display of power at the St. John’s Episcopal Church in June.  Chad Wolf, however, has been a willing tool of the White House, parroting the line about “violent antifa anarchists,” and blocking the Supreme Court’s order to restore protections and benefits to dreamers in the Deferred Action for Childhood Arrivals  (DACA).

Barr and Wolf are enablers of the president’s excesses, and It is long past time for them to acknowledge the misuse of the DoJ and the DHS, respectively, on behalf of Trump’s reelection campaign.  It is also time for the Congress to conduct the kind of  oversight that exposed the illegal and unconstitutional activities of the intelligence community during the Vietnam War.  The city of Portland must not become a petri dish for studying the death of democracy.

counterpunch.org

]]>
Are We on the Cusp of the First Ever Cyber World War? https://www.strategic-culture.org/news/2020/03/15/are-we-on-cusp-of-first-ever-cyber-world-war/ Sun, 15 Mar 2020 13:00:46 +0000 https://www.strategic-culture.org/?post_type=article&p=338299 TruePublica

In its quest for global economic and geopolitical domination, America has made many enemies. To help fund 800 military bases all over the world, last year the American taxpayer spent $620 billion on defence, $69 billion for ‘war-funding’ and $10billion on cybersecurity. Military spending represents about 40 per cent of America’s entire global exports trade. However, corporate America describes as derisory the funding for cybersecurity and it is stepping up to the challenge as they get to grips with the threats they now face. As a result of government inaction and under-funding, private sector companies have been forced to take cybersecurity more seriously and, according to some projections, will spend an eye-watering $1 trillion on the digital security of their global operations from now until then end of 2021.

America’s enemies are in no position to fight a hot war  – for the time being. They know that. In the meantime, President Trump has continually stepped up trade wars and financial sanctions that some countries are now finding too much and are soon to fight back. The cold war between China and America is just one. Russia, North Korea and Iran are obvious allies of China, so are a number of other countries across the Mid-East, Africa and Asia – weary of endless American intervention in their affairs.

Although the cold war with China is by definition a low-intensity conflict, a sharp escalation is likely during 2020. To some Chinese leaders, it is hardly a coincidence that their country is simultaneously being attacked on all sorts of fronts at the same time. In the last twelve months, China has been beset with a massive swine flu outbreak, a severe bird flu outbreak, and a coronavirus epidemic that has destabilised the entire workings its economy. The trade war is financially damaging and unpopular at home. Political unrest in Hong Kong, the re-election of Taiwan’s pro-independence president, combined with stepped-up US naval operations in the East and South China Seas also add to keeping Chinese leaders awake at night. The coronavirus crisis that now grips the world provides some with an opportunity though.

Contrary to what we have heard in the MSM, in China, hospitals are overwhelmed and overflowing with the sick and dying as a result of CoVid-19. But the Chinese authorities know that the very same disease is now gripping the rest of the world as well.

Nouriel Roubini, Professor of Economics at New York University was Senior Economist for International Affairs in the White House’s Council of Economic Advisers during the Clinton Administration. He has worked for the International Monetary Fund, the US Federal Reserve, and the World Bank. He takes the view that China is ready to fight back and says that – “China’s immediate response to US containment efforts (the trade war) will likely take the form of cyberwarfare. There are several obvious targets. Chinese hackers (and their Russian, North Korean, and Iranian counterparts) could interfere in the US election by flooding Americans with misinformation and deep fakes. With the US electorate already so polarized, it is not difficult to imagine armed partisans taking to the streets to challenge the results, leading to serious violence and chaos.”

These are strong words from someone like Roubini who also asserts that within a year, “the US-China conflict could have escalated from a cold war to a near-hot one. A Chinese regime with its economy severely damaged by the CoVid-19 crisis and facing restless masses will need an external scapegoat, and will likely set its sights on Taiwan, Hong Kong, Vietnam, and US naval positions in the East and South China Seas; confrontation could creep into escalating military accidents.”

The US, of course, will respond as it comes under an asymmetric attack. It has already been increasing the pressure on these countries with sanctions and other forms of trade and financial warfare, not to mention its own world-beating cyberwarfare capabilities. Roubini goes another step to say:

“US cyberattacks against the four rivals will continue to intensify this year, raising the risk of the first-ever cyber world war and massive economic, financial, and political disorder”

In the meantime, the European Central Bank President Christine Lagarde has warned that a cyberattack on European financial markets could cost $645 billion. Just three weeks ago Lagarde warned that another financial crisis could occur if systemically important institutions failed to protect themselves. “History shows that liquidity crises can quickly become systemic crises,” Lagarde said, adding, “The ECB is well aware that it has a duty to be prepared and to act pre-emptively.”

And while the western world looks to defend itself from cyberattacks, other threats now require considerable effort and money. One of those is the climate crisis. It is already causing a huge shift of capital from fossil fuel investments. The signs are there that the focus is now moving its trillions invested in coal, gas and fracking rigs (and so on) towards more environmentally friendly forms of power. The capital shift is gigantic.

Roubini says that – “As of early 2020, this is where we stand: the US and Iran have already had a military confrontation that will likely soon escalate; China is in the grip of a viral outbreak that will become a global pandemic; cyberwarfare is ongoing; major holders of US Treasuries are pursuing diversification strategies; the Democratic presidential primary is exposing rifts in the opposition to Trump and already casting doubt on vote-counting processes; rivalries between the US and four revisionist powers are escalating; and the real-world costs of climate change and other environmental trends are mounting.”

The point to be made here is this. If China, Russia, Iran, North Korea and others were looking for a moment in time to concentrate their efforts and contain America’s hegemonic empire – 2020 is the best opportunity they have ever had. It’s a perfect storm sceanrio. All four countries are facing problems domestically, all four have strong nationalistic backing from their own citizens, all four have new cyber warfare tools and all four have been collaborating in recent years. On the other side of the scales, the world economy is rapidly sliding into negative territory, vast quantities of money are shifting into safe havens (and away from tech gamble’s) – all of which threatens Trump’s re-election prospects and at the same time, a global pandemic is banging hard on the front door of Western countries – America’s included.

If Trump’s election prospects start to dip – as they are, the tiniest trigger could see America looking for a bogeyman as its scapegoat and before anyone is aware of it – we have a cyber world war.

And it is notable that while there is debate over how a ‘cyberwar’ might turn out, there are really only eight countries that are prepared for it in any tangible way –  the Western allies consist of the United States, United Kingdom, India and Israel on the one side – China, Russia, Iran, and North Korea on the other. These two opposing sides are the only countries that have significant and active cyber operations for offensive and defensive operations. Both sides are currently experiencing many political and economic challenges that are surging in 2020.

On either side, it could be an act of aggression or even a response to a perceived one, committed through a digital network, meant to cause damage in the real world, either to civilian or military targets, in order to force its opponent to act or refrain from acting. Power or water supplies, financial hubs and health systems could be targets.

We humans are now living in a two-lane world. One is physical, the other is digital. It’s the same for us individually as it is for the country we live in.

As for the trigger to a cyber world war, here is a good example of that two-lane world. In June last year, Iran fired a surface to air missile at an American surveillance drone flying over the Strait of Hormuz and brought it crashing out of the sky. America responded by launching a cyber attack against Iran by hitting Iranian computer systems that control missile and rocket launches. The Iranians now knew where their cybersecurity weaknesses were and whilst working to plug the holes in their networks – brazenly responded that they weren’t done and used cyberattacks against American businesses.

This is why the U.S. Department of Homeland Security issued a special alert about an increasing number of cyberattacks from Iran. Attacks which are not only going after U.S. government agencies but also U.S.-based businesses:

These efforts are often enabled through common tactics like spear-phishing, password spraying, and credential stuffing. What might start as an account compromise, where you think you might just lose data, can quickly become a situation where you’ve lost your whole network.”

It appears to be that America has somehow become more peaceful recently as it hasn’t physically attacked a new country recently. But that’s not true. Traditional warfighting methods and cyber warfighting methods are used interchangeably and used in conjunction with economic sanctions and trade wars. This suite of tactics is well underway – it is just that we don’t hear the bombs going off.

truepublica.org.uk

]]>
Now It’s Official: US Visa Can Be Denied If You (Or Even Your Friends) Are Critical of American Policies https://www.strategic-culture.org/news/2019/09/05/now-official-us-visa-denied-if-you-or-your-friends-critical-american-policies/ Thu, 05 Sep 2019 09:55:12 +0000 https://www.strategic-culture.org/?post_type=article&p=179937 There have been several interesting developments in the United States government’s war on free speech and privacy. First of all, the Department of Homeland Security’s (DHS) Customs and Border Protection Agency (CBP), which is responsible for actual entry of travelers into the country, has now declared that it can legally access phones and computers at ports of entry to determine if there is any subversive content which might impact on national security. “Subversive content” is, of course, subjective, but those seeking entry can be turned back based on how a border control agent perceives what he is perusing on electronic media.

Unfortunately, the intrusive nature of the procedure is completely legal, particularly as it applies to foreign visitors, and is not likely to be overturned in court in spite of the Fourth Amendment’s constitutional guarantee that individuals should “…be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” Someone at a port of entry is not legally inside the United States until he or she has been officially admitted. And if that someone is a foreigner, he or she has no right by virtue of citizenship even to enter the country until entry has been permitted by an authorized US Customs and Border Protection official. And that official can demand to see anything that might contribute to the decision whether or not to let the person enter.

And there’s more to it than just that. Following the Israeli model for blocking entry of anyone who can even be broadly construed as supporting a boycott, the United States now also believes it should deny admittance to anyone who is critical of US government policy, which is a reversal of previous policy that considered political opinions to be off-limits for visa denial. DHS, acting in response to pressure from the White House, now believes it can adequately determine hostile intent from the totality of what appears on one’s phone or laptop, even if the material in question was clearly not put on the device by the owner. In other words, if a traveler has an email sent to him or her by someone else that complains about behavior by the United States government, he or she is responsible for that content.

One interesting aspect of the new policy is that it undercuts the traditional authority of US Embassies and Consulates overseas to issue visas to foreigners. The State Department visa process is rigorous and can include employment and real property verification, criminal record checks, social media reviews and Google-type searches. If there is any doubt about the visa applicant, entry into the US is denied. With the new DHS measures in place, this thoroughly vetted system is now sometimes being overruled by a subjective judgment made by someone who is not necessarily familiar with the traveler’s country or even regarding the threat level that being a citizen of that country actually represents.

Given the new rules regarding entering the United States, it comes as no surprise that the story of an incoming Harvard freshman who was denied entry into the United States after his laptop and cellphone were searched at Boston’s Logan Airport has been making headlines. Ismail Ajjawi, a 17-year-old Palestinian resident of Lebanon, was due to begin classes as a freshman, but he had his student visa issued in by the US Embassy in Beirut rejected before being flown back to Lebanon several hours later.

Ajjawi was questioned by one immigration officer who asked him repeatedly about his religion before requiring him to turn over his laptop and cell phone. Some hours later, the questioning continued about Ajjawi’s friends and associates, particularly those on social media. At no point was Ajjawi accused of having himself written anything that was critical of the United States and the interrogation rather centered on the views expressed by his friends.

The decision to ban Ajjawi produced such an uproar worldwide that it was reversed a week later, apparently as a result of extreme pressure exerted by Harvard University. Nevertheless, the decisions to deny entry are often arbitrary or even based on bad information, but the traveler normally has no practical recourse to reverse the process. And the number of such searches is going up dramatically, numbering more than 30,000 in 2017, some of which have been directed against US residents. Even though permanent resident green card holders and citizens have a legal right to enter the United States, there are reports that they too are having their electronic media searched. That activity is the subject of an American Civil Liberties Union (ACLU) lawsuit against the Department of Homeland Security that is currently working its way through the courts. The ACLU is representing 10 American citizens and a legal permanent resident who had their media searched without a warrant as required by the Fourth Amendment.

It is believed that many of the arbitrary “enforcements” by the CBP are carried out by the little-known Tactical Response Team (TRT) that targets certain travelers that fit a profile. DHS officials confirmed in September 2017 that 1,400 visa holders had been denied entry due to TRT follow-up inspections. And there are also reports of harassment of American citizens by possible TRT officials. A friend of mine was returning from Portugal to a New York Area airport when he was literally pulled from the queue as he was departing the plane. A Customs agent at the jetway was repeatedly calling out his birth date and then also added his name. He was removed from the line and taken to an interrogation room where he was asked to identify himself and then queried regarding his pilot’s license. He was then allowed to proceed with no other questions, suggesting that it was all harassment of a citizen base on profiling pure and simple.

My friend is a native-born American who has a Master’s degree and an MBA, is an army veteran and has no criminal record, not even a parking ticket. He worked for an American bank in the Middle East more than thirty years ago, which, together with the pilot’s license, might be the issue these days with a completely paranoid federal government constantly on the lookout for more prey “to keep us safe.” Unfortunately, keeping us safe has also meant that freedom of speech and association as well as respect for individual privacy have all been sacrificed. As America’s Founding Father Benjamin Franklin once reportedly observed, “Those who would give up essential Liberty to purchase a little temporary Safety will wind up with neither.”

]]>
How the Department of Homeland Security Created a Deceptive Tale of Russia Hacking US Voter Sites https://www.strategic-culture.org/news/2018/09/03/how-department-homeland-security-created-deceptive-tale-russia-hacking-us-voter-sites/ Mon, 03 Sep 2018 10:25:00 +0000 https://strategic-culture.lo/news/2018/09/03/how-department-homeland-security-created-deceptive-tale-russia-hacking-us-voter-sites/ Gareth PORTER

The narrative of Russian intelligence attacking state and local election boards and threatening the integrity of U.S. elections has achieved near-universal acceptance by media and political elites.  And now it has been accepted by the Trump administration’s intelligence chief, Dan Coats, as well. 

But the real story behind that narrative, recounted here for the first time, reveals that the Department of Homeland Security (DHS) created and nurtured an account that was grossly and deliberately deceptive. 

DHS compiled an intelligence report suggesting hackers linked to the Russian government could have targeted voter-related websites in many states and then leaked a sensational story of Russian attacks on those sites without the qualifications that would have revealed a different story. When state election officials began asking questions, they discovered that the DHS claims were false and, in at least one case, laughable.

The National Security Agency and special counsel Robert Mueller’s investigating team have also claimed evidence that Russian military intelligence was behind election infrastructure hacking, but on closer examination, those claims turn out to be speculative and misleading as well. Mueller’s indictment of 12 GRU military intelligence officers does not cite any violations of U.S. election laws though it claims Russia interfered with the 2016 election.

A Sensational Story

On Sept. 29, 2016, a few weeks after the hacking of election-related websites in Illinois and Arizona, ABC News carried a sensational headline: “Russian Hackers Targeted Nearly Half of States’ Voter Registration Systems, Successfully Infiltrated 4.” The story itself reported that “more than 20 state election systems” had been hacked, and four states had been “breached” by hackers suspected of working for the Russian government. The story cited only sources “knowledgeable” about the matter, indicating that those who were pushing the story were eager to hide the institutional origins of the information.

Behind that sensational story was a federal agency seeking to establish its leadership within the national security state apparatus on cybersecurity, despite its limited resources for such responsibility. In late summer and fall 2016, the Department of Homeland Security was maneuvering politically to designate state and local voter registration databases and voting systems as “critical infrastructure.” Such a designation would make voter-related networks and websites under the protection a “priority sub-sector” in the DHS “National Infrastructure Protection Plan, which already included 16 such sub-sectors. 

DHS Secretary Jeh Johnson and other senior DHS officials consulted with many state election officials in the hope of getting their approval for such a designation. Meanwhile, the DHS was finishing an intelligence report that would both highlight the Russian threat to U.S. election infrastructure and the role DHS could play in protecting it, thus creating political impetus to the designation. But several secretaries of state—the officials in charge of the election infrastructure in their state—strongly opposed the designation that Johnson wanted.   

On Jan. 6, 2017—the same day three intelligence agencies released a joint “assessment” on Russian interference in the election—Johnson announced the designation anyway.

Media stories continued to reflect the official assumption that cyber attacks on state election websites were Russian-sponsored. Stunningly, The Wall Street Journal reported in December 2016 that DHS was itself behind hacking attempts of Georgia’s election database.

The facts surrounding the two actual breaches of state websites in Illinois and Arizona, as well as the broader context of cyberattacks on state websites, didn’t support that premise at all.

In July, Illinois discovered an intrusion into its voter registration website and the theft of personal information on as many as 200,000 registered voters. (The 2018 Mueller indictments of GRU officers would unaccountably put the figure at 500,000.) Significantly, however, the hackers only had copied the information and had left it unchanged in the database. 

That was a crucial clue to the motive behind the hack. DHS Assistant Secretary for Cyber Security and Communications Andy Ozment told a Congressional committee in late September 2016 that the fact hackers hadn’t tampered with the voter data indicated that the aim of the theft was not to influence the electoral process. Instead, it was “possibly for the purpose of selling personal information.” Ozment was contradicting the line that already was being taken on the Illinois and Arizona hacks by the National Protection and Programs Directorate and other senior DHS officials. 

In an interview with me last year, Ken Menzel, the legal adviser to the Illinois secretary of state, confirmed what Ozment had testified. “Hackers have been trying constantly to get into it since 2006,” Menzel said, adding that they had been probing every other official Illinois database with such personal data for vulnerabilities as well.  “Every governmental database—driver’s licenses, health care, you name it—has people trying to get into it,” said Menzel.

In the other successful cyberattack on an electoral website, hackers had acquired the username and password for the voter database Arizona used during the summer, as Arizona Secretary of State Michele Reagan learned from the FBI. But the reason that it had become known, according to Reagan in an interview with Mother Jones, was that the login and password had shown up for sale on the dark web—the network of websites used by cyber criminals to sell stolen data and other illicit wares.  

Furthermore, the FBI had told her that the effort to penetrate the database was the work of a “known hacker” whom the FBI had monitored “frequently” in the past. Thus, there were reasons to believe that both Illinois and Arizona hacking incidents were linked to criminal hackers seeking information they could sell for profit.

Meanwhile, the FBI was unable to come up with any theory about what Russia might have intended to do with voter registration data such as what was taken in the Illinois hack.  When FBI Counterintelligence official Bill Priestap was asked in a June 2017 hearing how Moscow might use such data, his answer revealed that he had no clue: “They took the data to understand what it consisted of,” said the struggling Priestap, “so they can affect better understanding and plan accordingly in regards to possibly impacting future elections by knowing what is there and studying it.”  

The inability to think of any plausible way for the Russian government to use such data explains why DHS and the intelligence community adopted the argument, as senior DHS officials Samuel Liles and Jeanette Manfra put it, that the hacks “could be intended or used to undermine public confidence in electoral processes and potentially the outcome.” But such a strategy could not have had any effect without a decision by DHS and the U.S. intelligence community to assert publicly that the intrusions and other scanning and probing were Russian operations, despite the absence of hard evidence. So DHS and other agencies were consciously sowing public doubts about U.S. elections that they were attributing to Russia.

DHS Reveals Its Self-Serving Methodology

In June 2017, Liles and Manfra testified to the Senate Intelligence Committee that an October 2016 DHS intelligence report had listed election systems in 21 states that were “potentially targeted by Russian government cyber actors.”  They revealed that the sensational story leaked to the press in late September 2016 had been based on a draft of the DHS report. And more importantly, their use of the phrase “potentially targeted” showed that they were arguing only that the cyber incidents it listed were possible indications of a Russian attack on election infrastructure.  

Furthermore, Liles and Manfra said the DHS report had “catalogued suspicious activity we observed on state government networks across the country,” which had been “largely based on suspected malicious tactics and infrastructure.” They were referring to a list of eight IP addresses an August 2016 FBI “flash alert” had obtained from the Illinois and Arizona intrusions, which DHS and FBI had not been able to  attribute to the Russian government.

The DHS officials recalled that the DHS began to “receive reports of cyber-enabled scanning and probing of election-related infrastructure in some states, some of which appeared to originate from servers operated by a Russian company.” Six of the eight IP addresses in the FBI alert were indeed traced to King Servers, owned by a young Russian living in Siberia. But as DHS cyber specialists knew well, the country of ownership of the server doesn’t prove anything about who was responsible for hacking: As cybersecurity expert Jeffrey Carr pointed out, the Russian hackers who coordinated the Russian attack on Georgian government websites in 2008 used a Texas-based company as the hosting provider.  

The cybersecurity firm ThreatConnect noted in 2016 that one of the other two IP addresses had hosted a Russian criminal market for five months in 2015. But that was not a serious indicator, either. Private IP addresses are reassigned frequently by server companies, so there is not a necessary connection between users of the same IP address at different times.

The DHS methodology of selecting reports of cyber incidents involving election-related websites as “potentially targeted” by Russian government-sponsored hackers was based on no objective evidence whatever. The resulting list appears to have included any one of the eight addresses as well as any attack or “scan” on a public website that could be linked in any way to elections. 

This methodology conveniently ignored the fact that criminal hackers were constantly trying to get access to every database in those same state, country and municipal systems. Not only for Illinois and Arizona officials, but state electoral officials.

In fact, 14 of the 21 states on the list experienced nothing more than the routine scanning that occurs every day,according to the Senate Intelligence Committee. Only six involved what was referred to as a “malicious access attempt,” meaning an effort to penetrate the site. One of them was in Ohio, where the attempt to find a weakness lasted less than a second and was considered by DHS’s internet security contractor a “non-event” at the time.

State Officials Force DHS to Tell the Truth

For a year, DHS did not inform the 21 states on its list that their election boards or other election-related sites had been attacked in a presumed Russian-sponsored operation. The excuse DHS officials cited was that it could not reveal such sensitive intelligence to state officials without security clearances. But the reluctance to reveal the details about each case was certainly related to the reasonable expectation that states would publicly challenge their claims, creating a potential serious embarrassment.  

On Sept. 22, 2017, DHS notified 21 states about the cyber incidents that had been included in the October 2016 report. The public announcement of the notifications said DHS had notified each chief election officer of “any potential targeting we were aware of in their state leading up to the 2016 election.” The phrase “potential targeting” again telegraphed the broad and vague criterion DHS had adopted, but it was ignored in media stories.

But the notifications, which took the form of phone calls lasting only a few minutes, provided a minimum of information and failed to convey the significant qualification that DHS was only suggesting targeting as a possibility. “It was a couple of guys from DHS reading from a script,” recalled one state election official who asked not to be identified. “They said [our state] was targeted by Russian government cyber actors.”

A number of state election officials recognized that this information conflicted with what they knew. And if they complained, they got a more accurate picture from DHS. After Wisconsin Secretary of State Michael Haas demanded further clarification, he got an email response from a DHS official with a different account. “[B]ased on our external analysis,” the official wrote, “the WI [Wisconsin] IP address affected belongs to the WI Department of Workforce Development, not the Elections Commission.”

California Secretary of State Alex Padilla said DHS initially had notified his office “that Russian cyber actors ‘scanned’ California’s Internet-facing systems in 2016, including Secretary of State websites.” But under further questioning, DHS admitted to Padilla that what the hackers had targeted was the California Department of Technology’s network.

Texas Secretary of State Rolando Pablos and Oklahoma Election Board spokesman Byron Dean also denied that any state website with voter- or election-related information had been targeted, and Pablos demanded that DHS “correct its erroneous notification.”  

Despite these embarrassing admissions, a statement issued by DHS spokesman Scott McConnell on Sept. 28, 2017 said the DHS “stood by” its assessment that 21 states “were the target of Russian government cyber actors seeking vulnerabilities and access to U.S. election infrastructure.” The statement retreated from the previous admission that the notifications involved “potential targeting,” but it also revealed for the first time that DHS had defined “targeting” very broadly indeed. 

It said the category included “some cases” involving “direct scanning of targeted systems” but also cases in which “malicious actors scanned for vulnerabilities in networks that may be connected to those systems or have similar characteristics in order to gain information about how to later penetrate their target.” 

It is true that hackers may scan one website in the hope of learning something that could be useful for penetrating another website, as cybersecurity expert Prof. Herbert S. Lin of Stanford University explained to me in an interview. But including any incident in which that motive was theoretical meant that any state website could be included on the DHS list, without any evidence it was related to a political motive.

Arizona’s further exchanges with DHS revealed just how far DHS had gone in exploiting that escape clause in order to add more states to its “targeted” list. Arizona Secretary of State Michele Reagan tweeted that DHS had informed her that “the Russian government targeted our voter registration systems in 2016.” After meeting with DHS officials in early October 2017, however, Reagan wrote in a blog post that DHS “could not confirm that any attempted Russian government hack occurred whatsoever to any election-related system in Arizona, much less the statewide voter registration database.” 

What the DHS said in that meeting, as Reagan’s spokesman Matt Roberts recounted to me, is even more shocking. “When we pressed DHS on what exactly was actually targeted, they said it was the Phoenix public library’s computers system,” Roberts recalled.

In April 2018, a CBS News “60 Minutes” segment reported that the October 2016 DHS intelligence report had included the Russian government hacking of a “county database in Arizona.” Responding to that CBS report, an unidentified “senior Trump administration official” who was well-briefed on the DHS report told Reuters that “media reports” on the issue had sometimes “conflated criminal hacking with Russian government activity,” and that the cyberattack on the target in Arizona “was not perpetrated by the Russian government.”  

NSA Finds a GRU Election Plot

NSA intelligence analysts claimed in a May 2017 analysis to have documented an effort by Russian military intelligence (GRU) to hack into U.S. electoral institutions. In an intelligence analysis obtained by The Intercept and reported in June 2017, NSA analysts wrote that the GRU had sent a spear-phishing email—one with an attachment designed to look exactly like one from a trusted institution but that contains malware design to get control of the computer—to a vendor of voting machine technology in Florida. The hackers then designed a fake web page that looked like that of the vendor. They sent it to a list of 122 email addresses NSA believed to be local government organizations that probably were “involved in the management of voter registration systems.” The objective of the new spear-phishing campaign, the NSA suggested, was to get control of their computers through malware to carry out the exfiltration of voter-related data.

But the authors of The Intercept story failed to notice crucial details in the NSA report that should have tipped them off that the attribution of the spear-phishing campaign to the GRU was based merely on the analysts’ own judgment—and that their judgment was faulty. 

The Intercept article included a color-coded chart from the original NSA report that provides crucial information missing from the text of the NSA analysis itself as well as The Intercept’s account. The chart clearly distinguishes between the elements of the NSA’s account of the alleged Russian scheme that were based on “Confirmed Information” (shown in green) and those that were based on “Analyst Judgment” (shown in yellow). The connection between the “operator” of the spear-phishing campaign the report describes and an unidentified entity confirmed to be under the authority of the GRU is shown as a yellow line, meaning that it is based on “Analyst Judgment” and labeled “probably.” 

A major criterion for any attribution of a hacking incident is whether there are strong similarities to previous hacks identified with a specific actor. But the chart concedes that “several characteristics” of the campaign depicted in the report distinguish it from “another major GRU spear-phishing program,” the identity of which has been redacted from the report. 

The NSA chart refers to evidence that the same operator also had launched spear-phishing campaigns on other web-based mail applications, including the Russian company “Mail.ru.”  Those targets suggest that the actors were more likely Russian criminal hackers rather than Russian military intelligence.

Even more damaging to its case, the NSA reports that the same operator who had sent the spear-phishing emails also had sent a test email to the “American Samoa Election Office.” Criminal hackers could have been interested in personal information from the database associated with that office. But the idea that Russian military intelligence was planning to hack the voter rolls in American Samoa, an unincorporated U.S. territory with 56,000 inhabitants who can’t even vote in U.S. presidential elections, is plainly risible.

The Mueller Indictment’s Sleight of Hand

The Mueller indictment of GRU officers released on July 13 appeared at first reading to offer new evidence of Russian government responsibility for the hacking of Illinois and other state voter-related websites. A close analysis of the relevant paragraphs, however, confirms the lack of any real intelligence supporting that claim. 

Mueller accused two GRU officers of working with unidentified “co-conspirators” on those hacks. But the only alleged evidence linking the GRU to the operators in the hacking incidents is the claim that a GRU official named Anatoly Kovalev and “co-conspirators” deleted search history related to the preparation for the hack after the FBI issued its alert on the hacking identifying the IP address associated with it in August 2016. 

A careful reading of the relevant paragraphs shows that the claim is spurious. The first sentence in Paragraph 71 says that both Kovalev and his “co-conspirators” researched domains used by U.S. state boards of elections and other entities “for website vulnerabilities.”  The second says Kovalev and “co-conspirators” had searched for “state political party email addresses, including filtered queries for email addresses listed on state Republican Party websites.” 

Searching for website vulnerabilities would be evidence of intent to hack them, of course, but searching Republican Party websites for email addresses is hardly evidence of any hacking plan. And Paragraph 74 states that Kovalev “deleted his search history”—not the search histories of any “co-conspirator”—thus revealing that there were no joint searches and suggesting that the subject Kovalev had searched was Republican Party emails. So any deletion by Kovalev of his search history after the FBI alert would not be evidence of his involvement in the hacking of the Illinois election board website. 

With this rhetorical misdirection unraveled, it becomes clear that the repetition in every paragraph of the section of the phrase “Kovalev and his co-conspirators” was aimed at giving the reader the impression the accusation is based on hard intelligence about possible collusion that doesn’t exist.

The Need for Critical Scrutiny of DHS Cyberattack Claims

The DHS campaign to establish its role as the protector of U.S. electoral institutions is not the only case in which that agency has used a devious means to sow fear of Russian cyberattacks. In December 2016, DHS and the FBI published a long list of IP addresses as indicators of possible Russian cyberattacks. But most of the addresses on the list had no connection with Russian intelligence, as former U.S. government cyber-warfare officer Rob Lee found on close examination.

When someone at the Burlington, Vt., Electric Company spotted one of those IP addresses on one of its computers, the company reported it to DHS. But instead of quietly investigating the address to verify that it was indeed an indicator of Russian intrusion, DHS immediately informed The Washington Post. The result was a sensational story that Russian hackers had penetrated the U.S. power grid. In fact, the IP address in question was merely Yahoo’s email server, as Rob Lee told me, and the computer had not even been connected to the power grid. The threat to the power grid was a tall tale created by a DHS official, which the Post had to embarrassingly retract.  

Since May 2017, DHS, in partnership with the FBI, has begun an even more ambitious campaign to focus public attention on what it says are Russian “targeting” and “intrusions” into “major, high value assets that operate components of our Nation’s critical infrastructure”, including energy, nuclear, water, aviation and critical manufacturing sectors.  Any evidence of such an intrusion must be taken seriously by the U.S. government and reported by news media. But in light of the DHS record on alleged threats to election infrastructure and the Burlington power grid, and its well-known ambition to assume leadership over cyber protection, the public interest demands that the news media examine DHS claims about Russian cyber threats far more critically than they have up to now.

consortiumnews.com

]]>
Amazon’s Fusion With the State Shows Neoliberalism’s Drift to Neo-Fascism https://www.strategic-culture.org/news/2018/07/02/amazon-fusion-with-state-shows-neoliberalism-drift-neofascism/ Mon, 02 Jul 2018 09:43:42 +0000 https://strategic-culture.lo/news/2018/07/02/amazon-fusion-with-state-shows-neoliberalism-drift-neofascism/ Elliott GABRIEL

This year may go down in history as a turning-point when the world finally woke up to the dark side of the ubiquitous presence of popular Silicon Valley companies in our daily lives. One can only hope so, at least.

From Amazon to Facebook, Apple, Google, Microsoft and PayPal – among others – revelations poured out confirming the ongoing abuse of user data by monopolistic corporations, as well as their growing role as vendors of surveillance technology to the U.S. police state, military, and migrant detention agencies.

In March, the lid was blown off of the violation of user data on Facebook, with Cambridge Analytica mining user information for the purpose of providing millions of detailed “psychological profiles” to the Trump campaign, among others. Scarcely two weeks later, the Google campus was in an uproar over the development of its “Project Maven,” which was building an AI-fueled platform to vastly upgrade the automatic targeting abilities of the U.S. military’s global drone fleet. Faced with public outrage and internal dissent, the company pulled out of bidding to renew its Pentagon contract, which ends next year.

Now, employees and shareholders of Amazon.com – the world’s largest online marketer and cloud-computing provider – are demanding that chief executive Jeff Bezos halt the sale of its facial recognition or Amazon Web Services (AWS) Rekognition service to law enforcement agencies across the U.S., including to the Department of Homeland Security – Immigration and Customs Enforcement (DHS-ICE).

“As ethically concerned Amazonians, we demand a choice in what we build, and a say in how it is used,” the letter said. “We learn from history, and we understand how IBM’s systems were employed in the 1940s to help Hitler.

“IBM did not take responsibility then, and by the time their role was understood, it was too late,” it continued, referring to collusion with the operation of Nazi extermination camps during the Second World War. “We will not let that happen again. The time to act is now.”

Unveiled in November 2016 as a part of the AWS cloud suite, Rekognition analyzes images and video footage to recognize objects while providing analytics to users. It also lets clients “identify people of interest against a collection of millions of faces in near real-time, enabling use cases such as timely and accurate crime prevention,” according to promotional material. Law enforcement agencies like the Washington County Sheriff’s Department pay as little as $6 to $12 a month for access to the platform, giving deputies the ability to scan its mugshot database against real-time footage.

Amazon employees cited a report from the ACLU that notes that AWS Rekognition “raises profound civil liberties and civil rights concerns” owing to its “capacity for abuse.” Its uses could include monitoring protest activity, as well as the possibility that ICE could employ the technology to continuously track immigrants and advance its “zero tolerance” policy of detaining migrant families and children at the U.S.-Mexico border.

In the letter distributed on email list “we-won’t-build-it,”  Amazon employees lay out their opposition to their employer’s collusion with the police and the DHS-ICE migrant-capture and mass-incarceration regime:

We don’t have to wait to find out how these technologies will be used. We already know that in the midst of historic militarization of police, renewed targeting of Black activists, and the growth of a federal deportation force currently engaged in human rights abuses — this will be another powerful tool for the surveillance state, and ultimately serve to harm the most marginalized.”

The furor surrounding AWS Rekognition is hardly a revelation to journalist Yasha Levine. Instead, as is the case with Google and other flagship firms’ work for Washington, it’s just another chapter in Silicon Valley’s long-time integration into the repressive state apparatus.

“This isn’t so much a big step to some ‘Surveillance Apocalypse,’ it’s just an indication of where we’ve been for a long time,” Levine told MintPress News.

Yet the Amazon workers’ outrage was likely provoked by recent headlines highlighting the Trump administration’s separation of Central American migrant families at the concentration camps along the Southern border — along with the key role Amazon plays for ICE’s data “ecosystem,” crucial to the operation of ICE’s immigrant enforcement, mass incarceration, and removal regime.

In their letter, Amazon’s employees decried the role the company plays in the platform Palantir provides for ICE:

We also know that Palantir runs on AWS. And we know that ICE relies on Palantir to power its detention and deportation programs. Along with much of the world we watched in horror recently as U.S. authorities tore children away from their parents. Since April 19, 2018 the Department of Homeland Security has sent nearly 2,000 children to mass detention centers … In the face of this immoral U.S. policy, and the U.S.’s increasingly inhumane treatment of refugees and immigrants beyond this specific policy, we are deeply concerned that Amazon is implicated, providing infrastructure and services that enable ICE and DHS.“

In 2014, ICE gave Palantir a $41 million contract for the Investigative Case Management (ICM) system, which expanded its capacity for data-sharing between the bureau and other agency databases including those of the FBI, the Drug Enforcement Administration, and the Bureau of Alcohol, Tobacco, Firearms and Explosives, among others. The contract allowed ICE to significantly boost its ability to capture and incarcerate unauthorized migrants based on the disparate data Palantir collated and hosted on Amazon Web Services’ servers.

“What Amazon has simply done is allow everyone to lease that [Rekognition] capability the way that you would lease its web space, or have a pay-as-you-go plan with Amazon,” Levine commented.

In his new book, Surveillance Valley: The Hidden History of the Internet, Levine details the romance enjoyed between Big Data and the U.S. repressive state. In the introduction to his book, he notes :

From Amazon to eBay to Facebook — most of the Internet companies we use every day have also grown into powerful corporations that track and profile their users while pursuing partnerships and business relationships with major U.S. military and intelligence agencies. Some parts of these companies are so thoroughly intertwined with America’s security services that it is hard to tell where they end and the U.S. government begins.”

Having conquered retail and the internet, Amazon looks to the state and says “Forward”

President Barack Obama shakes hands with workers after speaking at the Amazon fulfillment center in Chattanooga, Tenn., July 30, 2013. Susan Walsh | AP

Conceived by founder Jeff Bezos as an “everything store” selling products from books to DVDs and music, Amazon has long been a scourge to the traditional brick-and-mortar marketplace, spending the late 1990s and the 2000s sweeping big and small booksellers alike into the ash-heap of retail history.

“Amazon has now become the de facto store for everything in America –  it’s shocking to think about how much we buy from it and how much money we give away to it,” Levine said, adding that the company’s power as a business “is kind of depressing.”

The company has also become the world’s premier internet hosting firm through its Amazon Web Services cloud computing platform. From 2006 on, AWS played a similar role to Amazon.com’s retail platform in regard to small-fry-displacing traditional corporate data centers and information technology (IT) professionals, providing a previously unimaginable level of centralization in terms of data storage and IT functionality at a low cost. For some time even Dropbox found shelter under the AWS cloud.

Watch | Amazon.com and Jeff Bezos In 1999

The company’s success as the world’s biggest retailer and cloud computing service was closely related to Amazon’s surveillance efforts directed not only toward consumers, but against its huge and heavily-exploited employee workforce. As Levine detailed in his book:

[Amazon] recorded people’s shopping habits, their movie preferences, the books they were interested in, how fast they read books on their Kindles, and the highlights and margin notes they made. It also monitored its warehouse workers, tracking their movements and timing their performance.

Amazon requires incredible processing power to run such a massive data business, a need that spawned a lucrative side business of renting out space on its massive servers to other companies.”

In the 2012 U.S. presidential election, AWS software provided nearly all aspects of then-incumbent President Barack Obama’s reelection campaign software and big-data analysis, ranging from web management to mailing-list management, data modeling, volunteer dispatching, voter-information database maintenance and “massive transaction processing” for donations.

Watch | Obama for America on AWS

By early 2013, a secretive deal awarded Amazon a 10-year, $600-million contract to provide cloud services to the Central Intelligence Agency and the 17 agencies comprising the intelligence community.

Langley’s contract with such a commercially-oriented company as Amazon, rather than rival bidder IBM, sent shockwaves through the tech industry, but the company boasted that it reflected the “superior technology platform” it could provide to the CIA along with its ability to deliver “the confidence and security assurance needed for mission-critical systems.”

Amazon’s platform will soon be the venue for a major intelligence project by the CIA dubbed “Mesa Verde,” which will see the agency’s AWS-built C2S cloud software deployed in multiple experiments meant to parse thousands of terabytes of data, including public web data, using natural language processing tools, sentiment analysis, and data visualization.

According to a Bloomberg Government report in May, AWS is the only private cloud platform granted clearance to store agency information marked “Secret.”

Amazon’s CIA partnership: Surveillance Capitalism in action

Rev. Paul Benz, center, and Shankar Narayan, legislative director of the ACLU of Washington, right, stand with others as they wait to deliver petitions at Amazon headquarters, June 18, 2018, in Seattle. Representatives of community-based organizations urged Amazon at a news conference to stop selling its face surveillance system, Rekognition, to the government. They later delivered the petitions to Amazon. Elaine Thompson | AP

Rev. Paul Benz, center, and Shankar Narayan, legislative director of the ACLU of Washington, right, stand with others as they wait to deliver petitions at Amazon headquarters, June 18, 2018, in Seattle. Representatives of community-based organizations urged Amazon at a news conference to stop selling its face surveillance system, Rekognition, to the government. They later delivered the petitions to Amazon. Elaine Thompson | AP

Amazon’s partnership with Langley is just another case of surveillance capitalism in action, according to sociology professor and author John Bellamy Foster, the editor of the venerable independent socialist journal Monthly Review.

Speaking to MintPress News, Foster explained:

"Amazon now seems to be landing one contract after another with the military and intelligence sectors in the United States … [The CIA cloud] is built on the premises of a private corporation, a kind of ‘walled castle’ for intelligence [spy] agency communication separate from the rest of the Internet, but principally operated by a for-profit corporation. Amazon also has a $1 billion contract with the Security and Exchange Commission, works with NASA, the Food and Drug Administration and other government agencies.”

In a 2014 essay for Monthly Review, Foster and Robert W. McChesney introduced the term surveillance capitalism in reference to the process of finance capital monetizing data extracted through surveillance operations performed in collusion with the state apparatus. The two trace the political-economic roots of the the data-driven Information Age from the early stages of the military-industrial complex to the 1950s fusion of consumer capitalism – corporations, ad agencies, and media – with the permanent warfare state, eventually leading to the birth of satellite technology, the internet, and the domination of a handful of monopolist tech firms during the present era of neoliberal globalization.

From the tech sector’s role in police-state operations to the expansion of “Smart” technology like Amazon’s Alexa into our homes, the use of drones and AI for keeping tabs on the entire population, and the manipulation of Facebook user data by the Trump campaign’s partnership with Cambridge Analytica, Foster is unequivocal in his judgment of surveillance capitalism’s metastasizing growth and its omniscient role in our daily lives:

"The implications for the future are staggering.”

Not everyone shares Foster’s pessimistic perspective. To former CIA cybersecurity researcher John Pirc, the agency contract with Amazon represented the removal of a “clouded judgment”-based stigma over cloud computing security. Speaking to The Atlantic, Pirc commented:

You hear so many people on the fence about cloud, and then to see the CIA gobble it up and do something so highly disruptive, it’s kind of cool.”

Holy Disruption and the “Gale Force of Creative Destruction”

Creation, epiphany, genesis, prophecy, rapture, sacrifice, wrath; such sacred words pepper the Old and New Testaments and still carry divine significance for the faithful. Beloved by clergy and revered by the flock, such consecrated terms hardly apply to Apple’s bitten-fruit logo or Alexa’s profanely secular robotic voice.

But in today’s cult of high technology and the internet — where entrepreneurs like Steve Jobs and Mark Zuckerberg have been elevated to the level of prophets or pharaohs, and start-ups are evangelized at TED Talks as the panacea to problems ranging from physical fitness to refugee crises — a new ecclesiastical lexicon is used. Central to this pseudo-religion of Big Data is the phrase disruption, an oft-invoked term signifying the replacement of old markets and business models by new technological innovations.

As Silicon Valley pioneer, computer scientist, and critic Jaron Lanier noted in his 2013 book Who Owns the Future?:

The terminology of ‘disruption’ has been granted an almost sacred status in tech business circles… To disrupt is the most celebrated achievement. In Silicon Valley, one is always hearing that this or that industry is ripe for disruption. We kid ourselves, pretending that disruption requires creativity. It doesn’t. It’s always the same story.”

For Lanier – a fervent defender of capitalism —  the D-word is misused to convey the liberating potential of new technology, when in fact the reign of big tech firms has led to a shrunken market dominated by “a small number of spying operations in omniscient positions.” Thus the digital landscape has become the fiefdom of monopoly firms who exercise an iron grip on competitors and Big Data’s primary commodities – internet users and their data.

To Foster, this process is little more than neoliberalism – the prevailing capitalist ideology dictating the unimpeded control over all aspects of public life by finance capital and the market. Foster notes that neoliberal orthodoxy is rooted in the concept of creative destruction, the concept from which the “disruption” buzzword is derived.

Creative destruction was introduced in 1942 by Austrian-American economist Joseph Schumpeter to describe a process of constant change under capitalism, whereby emerging entrepreneurs act as “innovation powerhouses” through a “perennial gale of creative destruction” that disorganizes and displaces competition, reshapes global markets, and paves the way to an emergence of new monopolies such as, for example, Silicon Valley’s leading firms.

Watch | Greenspan on Schumpeter’s “Creative Destruction”

“One of the key components of neoliberal ideology has been the opening up of the system to the unrestricted growth of monopolistic corporations and monopoly power,” Foster said to MintPress News, adding:

"The neoliberal age has thus seen one of the greatest periods of growth of monopoly power, particularly in the cyber or digital realm, in all of history. If you take Google, Amazon, and Facebook, none of them even existed 25 years ago, and Facebook didn’t exist 15 years ago. Amazon had a 51 percent increase in market capitalization between 2016 and 2017 alone. These are giant monopolistic enterprises.”

Continuing, Foster explained:

"In general, capitalism is a system that seeks to transgress all boundaries in its production and sale of commodities, commodifying everything in existence — which today, in the age of monopoly-finance capital and surveillance capitalism, means intruding into every aspect of existence as a means of manipulating not only the physical world, but also the minds and lives of everyone within it. It is this that constitutes the heart of surveillance capitalism.

But this same system of monopoly-finance capital has as its counterpart a growing centralization of power and wealth, increasing monopoly control, expanding militarism and imperialism, and an expansion of police power. It is what the political theorist Sheldon Wolin called ‘inverted totalitarianism,’ the growth of totalizing control of the population, and the destruction of human freedom under the mask of an ideology of individualism.”

As Amazon now approaches its 25-year anniversary, Foster notes, it’s become “a vast cultural (or anti-cultural) commodity empire” – and its ownership of The Washington Post has made clear the monopoly firm’s fusion with the state apparatus of U.S. imperialism.

Amazon clutches the “Newspaper of Record,” or “Democracy Dies in Darkness”

The front page of the Washington Post is displayed outside the Newseum in Washington, , 2013, a day after it was announced that Amazon.com founder Jeff Bezos bought the Washington Post for $250 million. Evan Vucci | AP

The front page of the Washington Post is displayed outside the Newseum in Washington, , 2013, a day after it was announced that Amazon.com founder Jeff Bezos bought the Washington Post for $250 million. Evan Vucci | AP

Since Jeff Bezos bought The Washington Post in 2013 for $250 million, the leading newspaper of the U.S. capital has stood at the ramparts of Fortress Amazon. Beyond any elite squadron of lobbyists or contracts with the Homeland Security or National Security State, the newspaper’s influential role shaping public and policymaker opinion gives Jeff Bezos and his fellow Amazon executives unparalleled access to the halls of imperial power.

“Of course it’s a problem when a powerful, monopolistic business like this with a very controlling owner is in the media business as well,” Yasha Levine commented, adding:

Let’s be honest, Amazon is a major CIA contractor now, and now this major contractor owns one of the most important newspapers in the country – which also happens to report on the CIA and national security issues.”

Since President Donald Trump came to power last January, “Amazon Washington Post” has been the target of the former reality-TV star’s ire as a top example of “fake news media.” While many of Trump’s attacks on the Post have been his standard Twitter outbursts against legitimate journalistic scrutiny, the newspaper once celebrated for publishing the groundbreaking 1971 Pentagon Papers is now both a bully pulpit for the president’s detractors in the Beltway liberal “resistance” and a mouthpiece of an aggressively neoliberal wing of the U.S. establishment.

“The Washington Post was always a liberal-capitalist paper, an arbiter of capitalist ideology and a defender of U.S. empire, [but] it has now become, as part of the Bezos empire, something worse,” Foster observed.

Scarcely a day passes without the Post publishing a torrent of stories seeking to expose “Russian interference” favoring Trump through social media or “fake news.” Citing the “experts” in “nonpartisan” media criticism group PropOrNot, the Post has smeared MintPress News and publications like Black Agenda Report, CounterPunch, and Truthout as propaganda platforms tied to the Kremlin without citing so much as a shred of evidence. Through its de facto blacklist, the group has also attempted to tie disparate independent media organizations to hard-right and white-supremacist outlets like Alex Jones’ Infowars and neo-Nazi website The Daily Stormer.

Watch | WaPo refuses to add disclosure about $600M CIA contract

The Washington Post has generally waged what amounts to an ideological war on basic progressive causes, Foster explained:

"It recently ran an article describing the ‘far left’ as those who believed in single-payer health insurance or protecting national parks, as if even these traditional left-liberal causes were now far outside the range of acceptable political discourse — a stance clearly designed to ratchet the political discourse further to the right. Bezos and Amazon are simply symbols of this social retrogression, as is the current autocrat in the White House.”

To Levine, the trend – like the ownership of muckraking news website The Intercept by billionaire Silicon Valley entrepreneur and eBay co-founder Pierre Omidyar — goes beyond the Post alone. Levine commented:

It’s a larger issue of Silicon Valley coming into its own, and businesses built on top of the internet dominating business; and if you dominate business, you dominate society and news media coverage – that’s just the way things work.”

Foster agrees, and minces no words depicting the danger Amazon’s growing power in U.S. society represents:

"Democracy can be judged in various ways, but no definition of democracy – no matter how specious – is consistent with a society in which such vast class and monopoly power exist, and where the infrastructure of genuine democracy (education, communications, science, culture, public discourse, means of public protest) is demolished.

For this and other reasons, U.S. society and much of the capitalist world is shifting from neo-liberalism to something better described as neo-fascism.”

mintpressnews.com

]]>
US Government & Press Lie Constantly, with Total Impunity https://www.strategic-culture.org/news/2017/08/09/us-government-and-press-lie-constantly-with-total-impunity/ Wed, 09 Aug 2017 05:45:00 +0000 https://strategic-culture.lo/news/2017/08/09/us-government-and-press-lie-constantly-with-total-impunity/ The lies are usually about the most important policies and actions of the United States government regarding international relations — foreign policy matters, such as wars, treaties, and economic sanctions. In the past, they were lies about matters such as that North Vietnam had attacked the USS Maddox in the Gulf of Tonkin Incident, and that Chile’s President Salvador Allende opposed democracy, and that Iraq’s President Saddam Hussein was «six months away from developing a [nuclear] weapon», and that Russian President Vladimir Putin’s «conquest of land» regarding Crimea had happened, and is the basic reason for the economic sanctions the US has placed against Russia. 

On August 2nd, US President Donald Trump signed into law increased sanctions against Russia, which had been passed 98-2 in the Senate and 419-3 in the House. This new law stated in Section 211, «Congress makes the following findings» as the basis for greatly hiking the economic sanctions against Russia:

(6) On January 6, 2017, an assessment of the United States intelligence community entitled, «Assessing Russian Activities and Intentions in Recent US Elections» stated, «Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the United States presidential election». The assessment warns that «Moscow will apply lessons learned from its Putin-ordered campaign aimed at the US Presidential election to future influence efforts worldwide, including against US allies and their election processes».

In other words: because of this alleged hacking of the 2016 US Presidential election, the sanctions that were originally (and entirely falsely) based upon «conquest of land» regarding Crimea, are now being greatly increased.

The 6 January 2017 document that the 98 Senators and 419 Representatives were relying upon there,  «Assessing Russian Activities and Intentions in Recent U.S. Elections», was signed by just one of the 17 U.S. intelligence agencies: President Obama’s Director of National Intelligence (James R. Clapper), who served at the pleasure of the then-President (Obama). The portion of it titled «Russia’s Influence Campaign Targeting the 2016 US Presidential Election» was additionally signed by the NSA, FBI and CIA. The entire document was built upon an earlier document, dated 7 October 2016 and issued in anticipation of Hillary Clinton’s becoming the next President; and that earlier document had been signed by two of the 17: the office of the Director of National Intelligence, and the office of the intelligence service for the U.S. Department of Homeland Security. The public part of this earlier document was titled «Joint Statement from the Department Of Homeland Security and Office of the Director of National Intelligence on Election Security». It opened:

The US Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process.

It was signed with the seal of the Department of Homeland Security, and the seal of the Director of National Intelligence — those two seals or official signatures, being co-equals in authority. They were two of the 17 offices of the US federal government’s Intelligence Community

According to Wikipedia’s article «United States Intelligence Community», «The IC [Intelligence Community] is headed by the Director of National Intelligence (DNI), whose statutory leadership is exercised through the Office of the Director of National Intelligence (ODNI)». The 17 members of the IC are shown there in that Wikipedia article, along with the official seal for each one (because a «finding» is officially «signed» with that seal, not with the person’s signature); and the 17 are: 

Eight are under the US Department of Defense (DOD). These offices are the respective intelligence-offices for: Air Force, Army, Marine Corps, Navy, Geospatial Intelligence Agency, and then 3 stand-alone ones that also are under US DOD: National Reconnaissance Office, Defense Intelligence Agency, and National Security Agency.

Two intelligence-offices are at Department of Homeland Security: Office of Intelligence and Analysis, and Coast Guard Intelligence.

Two are at Department of Justice: Office of National Security Intelligence, and FBI Intelligence Branch.

One is at Department of Energy: Office of Intelligence and Counterintelligence.

One is at Department of State: Bureau of Intelligence and Research. 

One is at Treasury Department: Office of Terrorism and Financial Intelligence.

There are two entirely independent stand-alone intelligence offices: CIA, and Director of National Intelligence. Each of those two officials reports directly to the US President, not via a Cabinet Department.

That’s all 17 of them.

The Director of National Intelligence (DNI) is authorized to represent each of the other 16, and not only himself. He is authorized to do that even if some (or all) of the other intelligence offices disagree with him in opinions that he expresses — if they disagree, they just don’t sign it (their official seal then doesn’t appear on the «finding»). The DNI may express an opinion that’s contradicted by any or all of the other 16. However, his opinion is not superior to the opinion of any of the other 16 top intelligence officials: he is instead considered to be one among the 17 — not superior to the other 16 — but nonetheless to express, in some purely official sense, «the Intelligence Community». However, if he expresses an opinion that contradicts the opinion of the sitting President, he may be fired by the President. None of his 16 Intelligence Community colleagues can do that — officially represent «the Intelligence Community» regardless of what its other 16 persons might privately support. The basic law that defines the DNI’s authority is Sec. 102. [50 U.S.C. § 3023], and states (on page 37) that he is at all times «Subject to the authority, direction, and control of the President». In other words: When the DNI speaks, the President of the United States is actually being expressed. Whether any other of the 17 top US intelligence officials is also being expressed, is therefore irrelevant. The system was set up this way so that the President would officially have «the Intelligence Community» supporting whatever publicly endorsed «facts» or findings the President backs. Any dissenting members of that 17 simply don’t sign, that’s all. The purpose of this arrangement is to keep the findings — the public ‘facts’ — in line with the President’s policy on the given matter, no matter what.

Each of the 17 top intelligence officials has an official seal of office. No document that lacks the official seal of a particular one of these 17 offices is officially approved by that office. The lack of that person’s seal means one of two things: his agency was not consulted on the given matter, or else he had been consulted and declined to sign the given document or «findings».

Thus: only two of the 17 US intelligence agencies signed the «Joint Statement from the Department Of Homeland Security and Office of the Director of National Intelligence on Election Security».

On 19 October 2016 occurred the last one of the three US Presidential debates between Hillary Clinton and Donald Trump; and Clinton said: «We have 17 intelligence agencies, civilian and military, who have all concluded that these espionage attacks, these cyberattacks, come from the highest levels of the Kremlin, and they are designed to influence our election». She was referring to that «Joint Statement from the Department Of Homeland Security and Office of the Director of National Intelligence on Election Security». That night, Politifact headlined «Hillary Clinton blames high-up Russians for WikiLeaks releases», and rated Clinton’s assertion there «True» because:

The October statement … said «The US Intelligence Community (USIC) is confident» in its assessment. As we noted in the article, the 17 separate agencies did not independently come to this conclusion, but as the head of the intelligence community, the Office of the Director of National Intelligence speaks on behalf of the group.

That’s not really true, but it is officially true: if the DNI signs to a «finding», then any dissenting member of the 17 must simply keep quiet, say nothing publicly about the matter. To Politifact, the refusal of the other top 15 US intelligence officials to sign the October 7th document meant nothing, and was irrelevant; the only signature that mattered to Politifact was the DNI’s (the signature of the person who, at all times, is, in fact, by law, «Subject to the … control of the President» — which then was Obama) — even the DHS signature (which was on the document) meant nothing to Politi‘fact’. Politi‘fact’ didn’t say two signed it; but instead said that all 17 did — which was false. Politi‘fact’ too lies, in order to make the ‘facts’ fit the government’s policy. 

Then, on 21 October 2016, USA Today headlined «Yes, 17 intelligence agencies really did say Russia was behind hacking»,  and wrote — in this ‘news’report, this wasn’t published as an opinion-piece but ‘news’:

The fact-checking website Politifact says Hillary Clinton is correct when she says 17 federal intelligence agencies have concluded that Russia is behind the hacking.

«We have 17, 17 intelligence agencies, civilian and military who have all concluded that these espionage attacks, these cyber attacks, come from the highest levels of the Kremlin. And they are designed to influence our election. I find that deeply disturbing», Clinton said during Wednesday’s presidential debate in Las Vegas.

Trump pushed back, saying that Clinton and the United States had «no idea whether it is Russia, China or anybody else».

But Clinton is correct. On Oct. 7, the Department of Homeland Security and Office of the Director of National Intelligence issued a joint statement on behalf of the US Intelligence Community. The USIC is made up of 16 agencies, in addition to the Office of the Director of National Intelligence… The agencies all issued the statement together.

That ‘news’-report was influential: it had 45 thousand shares online. Its statement that the Department of Homeland Security was authorized to speak for any other intelligence agency than itself, was entirely false. And the fundamental Russiagate narrative itself is almost certainly also a lie, which might help explain why Obama couldn’t get the other 15 US intelligence services (or at least the ones such as the CIA and NSA and FBI, which clearly possessed relevant intelligence about the matter) to attach their seals to it at the time.

An alternative narrative explaining the Wikileaks information-releases exists, and is supported by all of the available relevant evidence, and it doesn’t entail any hacks at all, but instead leaks: both of the information-releases resulted from leaks by insiders, instead of from hacks by outsiders. This doesn’t necessarily mean that nobody hacked anything, but just that neither of the information-releases came from a hack.

Strong evidence exists that Craig Murray, a British friend of Julian Assange, picked up from a Democratic National Committee insider on 24 September 2016 in Washington DC a thumb drive or other physical embodiment of the data that soon thereafter became leaked, and that he delivered it to the Wikileaks founder inside the Ecuadorean Embassy in London.

Furthermore, according to investigative journalist Seymour Hersh speaking on 1 August 2017, an earlier leak from a different DNC insider, had produced the June 2016 DNC computer-data release by Wikileaks. 

Furthermore, the technical evidence regarding the ‘hacking’ indicates there was no hack; that it was only (at least one) inside leak(s)

The charge that Russia had ‘hacked’ ‘the election’ is the core ‘justification’ given for the 98-2 Senate and 419-3 House passage of the great hike in anti-Russia economic sanctions. Clearly, this Congress — both Parties in it — are determined to squeeze Russia harder and harder, until it’s conquered. Maybe the reason why Trump signed this bill into law (which would have easily passed over his veto if he had vetoed it) is so as not to give Congress an additional ‘reason’ to impeach and replace him by Mike Pence, whom both Parties in Congress seem to prefer.

America invaded Vietnam on the basis of lies. We invaded Iraq on the basis of lies. We’ve done much else — in Libya, Syria, and Ukraine etc. — on the basis of lies. Are our leaders preparing to invade Russia on the basis of lies? (If so, those lies started on 24 February 1990.) How much longer will the American public continue rewarding (instead of demanding prosecution of) the liars who are promoting Lockheed Martin and the rest of the US military-industrial complex and destroying countries one after another? America isn’t being ruled by the military; it’s being ruled by the Military-Industrial Complex. To understand the MIC, the «revolving door» is essential. Without that revolving door, America could be a democracy. But that revolving door is controlled by billionaires; and, by means of it, the billionaires control the US government. The divisions within the US government are only superficial, as is clearly shown by that virtually unanimous vote (98-2 and 419-3) in Congress, for lies. It’s now become almost lock-step, in Washington. The US aristocracy controls the US MIC, by controlling both the government, and the press. The only way to become a serious contender, to win a seat in Congress, or especially to win the Presidency, is to be acceptable to billionaires — Republican, Democratic, or otherwise. And America’s billionaires are virtually unanimous in their determination to conquer Russia.

This is not likely to end well. Robert Mueller has now impanelled two grand juries in order to find some crime by the President that’s part of his Russiagate investigation, so that Trump can be criminally charged, then impeached, and then replaced by the hard-right, neoconservative, Mike Pence. At the present stage, it’s an «investigation in search of a crime», and probably one or more crimes will be found, on which Trump can be prosecuted; but, why weren’t Barack Obama’s crimes even searched for (I could name several he could almost certainly have been indicted for, including his aiding and abetting the American public’s actual enemies, in his policies on Honduras, Libya, Syria, Yemen, Ukraine, and elsewhere — and his protecting mega-banksters whose frauds had produced the 2008 economic collapse, and he even told them privately «I’m protecting you»), much less investigated at all? Obviously, America’s aristocracy detest Trump, though he’s one of them. Trump is trying to give them almost everything they want, but that’s clearly not sufficient. He’s not bad enough to satisfy them, and they’re in control. Most recently, the lies they are pumping out have focused against Venezuela. Only ignoramuses and fools still trust the honesty of the US government, and of its sycophantic press, which is controlled by the same aristocracy — both Parties of it. Some ‘democracy’!

]]>
Foisting Blame for Cyber-hacking on Russia https://www.strategic-culture.org/news/2017/07/03/foisting-blame-for-cyber-hacking-on-russia/ Mon, 03 Jul 2017 08:45:00 +0000 https://strategic-culture.lo/news/2017/07/03/foisting-blame-for-cyber-hacking-on-russia/ Gareth PORTER

Recent hearings by the Senate and House Intelligence Committees reflected the rising tide of Russian-election-hacking hysteria and contributed further to it. Both Democrats and Republicans on the two committees appeared to share the alarmist assumptions about Russian hacking, and the officials who testified did nothing to discourage the politicians.

Russian President Vladimir Putin, following his address to the UN General Assembly on Sept. 28, 2015. (UN Photo)

On June 21, Samuel Liles, acting director of the Intelligence and Analysis Office’s Cyber Division at the Department of Homeland Security, and Jeanette Manfra, acting deputy under secretary for cyber-security and communications, provided the main story line for the day in testimony before the Senate committee — that efforts to hack into election databases had been found in 21 states.

Former DHS Secretary Jeh Johnson and FBI counter-intelligence chief Bill Priestap also endorsed the narrative of Russian government responsibility for the intrusions on voter registration databases.

But none of those who testified offered any evidence to support this suspicion nor were they pushed to do so. And beneath the seemingly unanimous embrace of that narrative lies a very different story.

The Department of Homeland Security (DHS) has a record of spreading false stories about alleged Russian hacking into U.S. infrastructure, such as the tale of a Russian intrusion into the Burlington, Vermont electrical utility in December 2016 that DHS later admitted was untrue. There was another bogus DHS story about Russia hacking into a Springfield, Illinois water pump in November 2011.

So, there’s a pattern here. Plus, investigators, assessing the notion that Russia hacked into state electoral databases, rejected that suspicion as false months ago. Last September, Assistant Secretary of DHS for Cybersecurity Andy Ozment and state officials explained that the intrusions were not carried out by Russian intelligence but by criminal hackers seeking personal information to sell on the Internet.

Both Ozment and state officials responsible for the state databases revealed that those databases have been the object of attempted intrusions for years. The FBI provided information to at least one state official indicating that the culprits in the hacking of the state’s voter registration database were cyber-criminals.

Illinois is the one state where hackers succeeded in breaking into a voter registration database last summer. The crucial fact about the Illinois hacking, however, was that the hackers extracted personal information on roughly 90,000 registered voters, and that none of the information was expunged or altered.

The Actions of Cybercriminals

That was an obvious clue to the motive behind the hack. Assistant DHS Secretary Ozment testified before the House Subcommittee on Information Technology on Sept. 28 (at 01:02.30 of the video) that the apparent interest of the hackers in copying the data suggested that the hacking was “possibly for the purpose of selling personal information.”

A busy tourist scene in St. Petersburg, Russia. (Photo by Robert Parry)

Ozment ‘s testimony provides the only credible motive for the large number of states found to have experienced what the intelligence community has called “scanning and probing” of computers to gain access to their electoral databases: the personal information involved – even e-mail addresses – is commercially valuable to the cybercriminal underworld.

That same testimony also explains why so many more states reported evidence of attempts to hack their electoral databases last summer and fall. After hackers had gone after the Illinois and Arizona databases, Ozment said, DHS had provided assistance to many states in detecting attempts to hack their voter registration and other databases.

“Any time you more carefully monitor a system you’re going to see more bad guys poking and prodding at it,” he observed, “because they’re always poking and prodding.” [Emphasis added]

State election officials have confirmed Ozment’s observation. Ken Menzel, the general counsel for the Illinois Secretary of State, told this writer, “What’s new about what happened last year is not that someone tried to get into our system but that they finally succeeded in getting in.” Menzel said hackers “have been trying constantly to get into it since 2006.”

And it’s not just state voter registration databases that cybercriminals are after, according to Menzel. “Every governmental data base – driver’s licenses, health care, you name it – has people trying to get into it,” he said.

Arizona Secretary of State Michele Reagan told Mother Jones that her I.T. specialists had detected 193,000 distinct attempts to get into the state’s website in September 2016 alone and 11,000 appeared to be trying to “do harm.”

Reagan further revealed that she had learned from the FBI that hackers had gotten a user name and password for their electoral database, and that it was being sold on the “dark web” – an encrypted network used by cyber criminals to buy and sell their wares. In fact, she said, the FBI told her that the probe of Arizona’s database was the work of a “known hacker” who had been closely monitored “frequently.”

James Comey’s Role

The sequence of events indicates that the main person behind the narrative of Russian hacking state election databases from the beginning was former FBI Director James Comey. In testimony to the House Judiciary Committee on Sept. 28, Comey suggested that the Russian government was behind efforts to penetrate voter databases, but never said so directly.

Former FBI Director James Comey

Comey told the committee that FBI Counterintelligence was working to “understand just what mischief Russia is up to with regard to our elections.” Then he referred to “a variety of scanning activities” and “attempted intrusions” into election-related computers “beyond what we knew about in July and August,” encouraging the inference that it had been done by Russian agents.

The media then suddenly found unnamed sources ready to accuse Russia of hacking election data even while admitting that they lacked evidence. The day after Comey’s testimony ABC headlined, “Russia Hacking Targeted Nearly Half of States’ Voter Registration Systems, Successfully Infiltrating 4.” The story itself revealed, however, that it was merely a suspicion held by “knowledgeable” sources.

Similarly, NBC News headline announced, “Russians Hacked Two U.S. Voter Databases, Officials Say.” But those who actually read the story closely learned that in fact none of the unnamed sources it cited were actually attributing the hacking to the Russians.

It didn’t take long for Democrats to turn the Comey teaser — and these anonymously sourced stories with misleading headlines about Russian database hacking — into an established fact. A few days later, the ranking Democrat on the House Intelligence Committee, Rep. Adam Schiff declared that there was “no doubt” Russia was behind the hacks on state electoral databases.

On Oct. 7, DHS and the Office of the Director of National Intelligence issued a joint statement that they were “not in a position to attribute this activity to the Russian government.” But only a few weeks later, DHS participated with FBI in issuing a “Joint Analysis Report” on “Russian malicious cyber activity” that did not refer directly to scanning and spearphishing aimed of state electoral databases but attributed all hacks related to the election to “actors likely associated with RIS [Russian Intelligence Services].”

Suspect Claims

But that claim of a “likely” link between the hackers and Russia was not only speculative but highly suspect. The authors of the DHS-ODNI report claimed the link was “supported by technical indicators from the U.S. intelligence community, DHS, FBI, the private sector and other entities.” They cited a list of hundreds of I.P. addresses and other such “indicators” used by hackers they called “Grizzly Steppe” who were supposedly linked to Russian intelligence.

A wintery scene in Moscow, near Red Square. (Photo by Robert Parry)

But as I reported last January, the staff of Dragos Security, whose CEO Rob Lee, had been the architect of a U.S. government system for defense against cyber attack, pointed out that the vast majority of those indicators would certainly have produced “false positives.”

Then, on Jan. 6 came the “intelligence community assessment” – produced by selected analysts from CIA, FBI and National Security Agency and devoted almost entirely to the hacking of e-mail of the Democratic National Committee and Hillary Clinton’s campaign chairman John Podesta. But it included a statement that “Russian intelligence obtained and maintained access to elements of multiple state or local election boards.” Still, no evidence was evinced on this alleged link between the hackers and Russian intelligence.

Over the following months, the narrative of hacked voter registration databases receded into the background as the drumbeat of media accounts about contacts between figures associated with the Trump campaign and Russians built to a crescendo, albeit without any actual evidence of collusion regarding the e-mail disclosures.

But a June 5 story brought the voter-data story back into the headlines. The story, published by The Intercept, accepted at face value an NSA report dated May 5, 2017, that asserted Russia’s military intelligence agency, the GRU, had carried out a spear-phishing attack on a U.S. company providing election-related software and had sent e-mails with a malware-carrying word document to 122 addresses believed to be local government organizations.

But the highly classified NSA report made no reference to any evidence supporting such an attribution. The absence of any hint of signals intelligence supporting its conclusion makes it clear that the NSA report was based on nothing more than the same kind of inconclusive “indicators” that had been used to establish the original narrative of Russians hacking electoral databases.

A Checkered History

So, the history of the U.S. government’s claim that Russian intelligence hacked into election databases reveals it to be a clear case of politically motivated analysis by the DHS and the Intelligence Community. Not only was the claim based on nothing more than inherently inconclusive technical indicators but no credible motive for Russian intelligence wanting personal information on registered voters was ever suggested.

Seal of the U.S. Department of Homeland Security

Russian intelligence certainly has an interest in acquiring intelligence related to the likely outcome of American elections, but it would make no sense for Russia’s spies to acquire personal voting information about 90,000 registered voters in Illinois.

When FBI Counter-intelligence chief Priestap was asked at the June 21 hearing how Moscow might use such personal data, his tortured effort at an explanation clearly indicated that he was totally unprepared to answer the question.

“They took the data to understand what it consisted of,” said Priestap, “so they can affect better understanding and plan accordingly in regards to possibly impacting future election by knowing what is there and studying it.”

In contrast to that befuddled non-explanation, there is highly credible evidence that the FBI was well aware that the actual hackers in the cases of both Illinois and Arizona were motivated by the hope of personal gain.

consortiumnews.com

]]>
International Cyber Attack: Roots Traced to US National Security Agency https://www.strategic-culture.org/news/2017/05/14/international-cyber-attack-roots-traced-us-national-security-agency/ Sun, 14 May 2017 09:45:00 +0000 https://strategic-culture.lo/news/2017/05/14/international-cyber-attack-roots-traced-us-national-security-agency/ Over 45,000 ransomware attacks have been tracked in large-scale attacks across Europe and Asia — particularly Russia and China — as well as attacks in the US and South America. There are reports of infections in 99 countries. A string of ransomware attacks appears to have started in the United Kingdom, Spain and the rest of Europe, before striking Japan, Vietnam and the Philippines on May 12. According to Kaspersky Laboratory, Russia, Ukraine, India and Taiwan were hit hardest. Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, called the attack «the biggest ransomware outbreak in history». It is not known who exactly was behind it.

The overwhelming majority of the infections appeared in Russia. The ransomware hit about 1,000 computers at the Russian Interior Ministry, though the agency’s servers were not affected thanks to using the national Elbrus operating system instead of Windows.

The US Department of Homeland Security has not confirmed any attacks in the US on government targets or vital industries, such as hospitals and banks.

The malicious code exploits a Windows flaw patched in Microsoft's Security Bulletin MS17-010 in March. The malware is usually covertly installed onto computers by hiding within emails containing links, which users are tricked into opening. A single computer infected can end up compromising the entire corporate network.

The malware is alleged to have been leaked or stolen from the National Security Agency (NSA) to be reportedly distributed by the Shadow Brokers, which claimed to have hacked an NSA-linked team of hackers last summer.

The hints about alleged «Russia trail» have already appeared in Western media. According to NPR, the Shadow Brokers group, which is suspected of having ties to Russia, posted Windows hacking tools in April, saying it was a «protest» about US President Donald Trump. «A computer hacking group known as Shadow Brokers was at least partly responsible. It is claimed the group, which has links to Russia, stole US National Security Agency cyber tools designed to access Microsoft Windows systems, then dumped the technology on a publicly-accessible website where online criminals could access it – possibly in retaliation for America’s attack on Syria», writes the Telegraph.

Edward Snowden, the former CIA employee and NSA contractor, tweeted he was confident that the hackers used NSA tools. He believes that if the NSA had given an advance warning the hit structures and hospitals in other countries could have taken proper measures to repel the attack. Politico chimes in. «Friday's attacks could have been avoided if the NSA had simply told Microsoft about the flaw earlier, digital privacy activists argued», the prestigious outlet informs.

So, the National Security Agency tools were used, the NSA gave no warning and…Russia, the hardest hit by the attack, is to blame! The same song and dance as usual. Of course, nothing like evidence to go upon has been produced like in all other cases when Moscow was blamed for each and everything going wrong everywhere. It’s just that someone thinks that a group of hackers may have links to Russia and… nothing more. We’ve seen it before.

In reality, it’s an open secret that computers, routers and other equipment normally includes element of software that could be activated by US special agencies. Hackers simply found out how it works and decided to use it for personal gains. It shows that the NSA is working on powerful software to serve as a tool for global dominance.

The event demonstrates how important it is for major world powers to make cybersecurity top the international security agenda.

Today, no international law regulates cyber operations. The 2015 in The Hague showed there are few chances for signing an international agreement to monitor cyber activities. The only international effort so far to adopt a self-regulatory approach to non-aggression in cyberspace was initiated by the Shanghai Cooperation Organization (SCO) in 2015. The details have been debates within the framework of the UN Group of Government Experts (GGE). Russia and China set an example for the world to follow by signing an agreement on information security in 2015.

The Russia-US cyber-security confidence-building package of agreements in 2013 foresaw similar cooperation and information exchange between the US and Russian computer emergency response teams (CERTs), the creation of a working group on emerging threats and the use of the existing nuclear hotline to communicate directly in a cyber crisis. It has never got off the ground and got stalled as the bilateral relations deteriorated in 2014.

Experts could join the process to give the suspended 2013 package a new lease on life. The meetings of working group could be resumed. A hotline between Moscow and Washington could be reactivated to prevent escalation of cyber incidents between the two countries. The parties could start working on the first-ever non-aggression pact in cyber domain. The national centers for reduction of cyber threats could play an important role allowing the military of the two countries to notify each other about the attacks on crucial objects of infrastructure. They were used in 2014 during the Russian preparation for the Winter Olympics in Sochi with the operations suspended the same year.

Russia and the US picked up the issue a year ago. They discussed drafting the norms and principles of responsible behavior in cyberspace and countering terrorism in the sphere of information technologies. It was a good start that to everyone’s chagrin happened to be just another one-time event. The initiative seems to be swept under the rug overshadowed by other issues. In April, 2017 a United Nations cybersecurity experts group in Geneva, where Russian and America officials had a chance to meet but it’s evidently not enough.

The recent cyberattack shows the time is right for intensifying international efforts to handle the burning problem. There is a hope. India is to host the 5th Global Conference on Cyber Space (GCSS) in the last quarter of 2017, in which over 100 countries are expected to participate. The recent attack rings an alarm bell. The upcoming event offers an opportunity not to be missed. 

]]>