Spitfire List Web site and blog of anti-fascist researcher and radio personality Dave Emory.

For The Record  

FTR #917 Wiki-Fascism, Part #4: Weighing In for the Trumpenkampfverbande (Technocratic Fascism in Action)

Dave Emory’s entire life­time of work is avail­able on a flash drive that can be obtained HERE. The new drive is a 32-gigabyte drive that is current as of the programs and articles posted by early winter of 2016. The new drive (available for a tax-deductible contribution of $65.00 or more.) (The previous flash drive was current through the end of May of 2012.)

WFMU-FM is podcasting For The Record–You can subscribe to the podcast HERE.

You can subscribe to e-mail alerts from Spitfirelist.com HERE.

You can subscribe to RSS feed from Spitfirelist.com HERE.

You can subscribe to the comments made on programs and posts–an excellent source of information in, and of, itself HERE.

This broadcast was recorded in one, 60-minute segment.

Lee Harvey Oswald: Ersatz Communist

Lee Harvey Oswald: Ersatz Communist

Introduction: In FTR #’s 724, 725, 732, 745 and 755, we have detailed the fascist and far right-wing ideology, associations and politics of Julian Assange and WikiLeaks.

Lionized by the so-called progressive sector, as well as mainstream media sources like The New York Times and Der Spiegel, Assange’s true colors and fascist politics and associations have emerged on a larger stage.

As the Trump campaign evolves, a major alliance between “The Donald’s” Trumpenkampfverbande and the Assange organization has developed. Obviously serving as a dirty-tricks cadre for the GOP, Assange is working hard to destroy Hillary Clinton with leaked documents intended to torpedo her campaign.

Is this Julian Assange?

Is this Julian Assange?

Assange–not even an American citizen–is manifesting what we termed “technocratic fascism,” arrogating to himself the right to determine the results of the American Presidential election. Quoting from a seminal article by David Golumbia: ” . . . Hack­ers (“civic,” “eth­i­cal,” “white” and “black” hat alike), hack­tivists, Wik­iLeaks fans [and Julian Assange et al–D. E.], Anony­mous “mem­bers,” even Edward Snow­den him­self walk hand-in-hand with Face­book and Google in telling us that coders don’t just have good things to con­tribute to the polit­i­cal world, but that the polit­i­cal world is theirs to do with what they want, and the rest of us should stay out of it: the polit­i­cal world is bro­ken, they appear to think (rightly, at least in part), and the solu­tion to that, they think (wrongly, at least for the most part), is for pro­gram­mers to take polit­i­cal mat­ters into their own hands. . . .”

Beginning with analysis of the alleged Russian authorship of the hack of the Democratic National Committee on the eve of the Democratic Convention in July, we highlight disturbing indications that the hack is actually a false flag operation, setting the stage for some very dangerous developments.

In that context, we recall that one of the terms we have applied to Edward Snowden is “The Obverse Oswald.”  We strongly suspect that Snowden, in Russia and working for a computer firm, may have had something to do with this.

The (frankly lame) framing of Russia for the DNC hack reminds us of the process of “painting Oswald Red.” We have covered this in numerous broadcasts, including The Guns of November, Part 1AFA #15 and FTR #’s 777 and 876. (An excellent book on the JFK assassination that presents an excellent breakdown of “the painting of Oswald Red” is JFK and the Unspeakable: Why He Died and Why It Matters.)

Much of the broadcast highlights WikiLeaks’ efforts on behalf of the Trump campaign, detailing aspects of Assange’s presentation of Hillary Clinton’s e-mails.

We note the powerful resonance between Assange’s presentations and elements of major right-wing attacks on Clinton.

Assange/WikiLeaks’ points of attack on Hillary Clinton:

  • Focus on the Clinton Foundation, synchronizing with Koch brothers’ protege Peter Schweizer’s book Clinton Cash.
  • Imply that Clinton murdered a DNC volunteer named Seth Rich. Trump dirty tricks specialist Roger Stone is writing a book blaming the Clintons for murdering JFK, Jr.–Hillary the murderer!
  • Obliquely endorse Donald Trump.
  • Disclose the Social Security and credit card numbers of Democratic Party contributors, opening them up to retribution. Stone threatened to disclose the hotel room numbers of anti-Trump GOP delegates, implying that they could be subject to violence. The WikiLeaks Clinton e-mail dump: ” . . . .  The emails include unencrypted, plain-text listings of donor emails addresses, home addresses, phone numbers, social security numbers, passport numbers, and credit card information. WikiLeaks proudly announced the data dump in a single tweet. . . .” Might this have had something to do with the murder of Seth Rich?
  • Are apparently being conducted in concert with Roger Stone, with whom Assange is apparently in contact!

Further developing the right-wing, fascist and anti-Semitic aspects of Assange/WikiLeaks, we note that Assange responded to critics of his efforts against Clinton and on behalf of Trump/Stone with an anti-Semitic tweet.

Among Assange’s champions are the fascist National front in France and the U.K. Independence Party, which may well have set the stage for the fragmentation of Great Britain with the Brexit campaign.

It would come as a distasteful surprise to the Bernie Sanders crowd, to whom Assange has catered, to learn that Assange is a champion of free-market economics, synthesizing the Chicago and Austrian schools of economics.

Much of the latter part of the broadcast reviews information about Assange, Snowden and Citizen Greenwald’s right-wing and fascist manifestations.

Program Highlights Include:

  • Comparison of the racist rhetoric of Snowden and Assange Presidential candidate of choice with that of Donald Trump.
  • Citizen Greenwald’s anti-immigrant rhetoric.
  • Review of the back-cover promotion of Serpent’s Walk in the context of the Trump campaign.
  • A bullet-point analysis that connects many of the dots in this concatenation.

1. An interesting piece by Dr. Sandro Gaycken, a Berlin-based former ‘hacktivist’ who now advises NATO and the German government on cyber-security matters, makes the case that the evidence implicating Russia was very much the type of evidence a talented team could spoof. He also notes that some of the tools used in the hack were the same used last year when Angela Merkel’s computer was hacked and used to infect other computers at the Bundestag. That hack was also blamed on Russian hackers. But, again, as the article below points out, when the evidence for who is responsible is highly spoofable, confidently assigning blame is almost too easy:

 “Blaming Russia For the DNC Hack Is Almost Too Easy” by Dr. Sandro Gaycken; Council on Foreign Relations Blog; 8/01/2016.

Dr. Sandro Gaycken is the Director of the Digital Society Institute, a former hacktivist, and a strategic advisor to NATO, some German DAX-companies and the German government on cyber matters.

The hack of the Democratic National Committee (DNC) definitely looks Russian. The evidence is compelling. The tools used in the incident appeared in previous cases of alleged Russian espionage, some of which appeared in the German Bundestag hack. The attackers, dubbed Cozy Bear and Fancy Bear, have been known for years and have long been rumored to have a Russian connection. Other indicators such as IP addresses, language and location settings in the documents’ metadata and code compilation point to Russia. The Kremlin is also known to practice influence operations, and a leak before the Democrats’ convention fits that profile as does laundering the information through a third party like Wikileaks. Finally, the cui bono makes sense as well; Russia may favor Donald Trump given his Putin-friendly statements and his views on NATO.

Altogether, it looks like a clean-cut case. But before accusing a nuclear power like Russia of interfering in a U.S. election, these arguments should be thoroughly and skeptically scrutinized.

A critical look exposes the significant flaws in the attribution. First, all of the technical evidence can be spoofed. Although some argue that spoofing the mound of uncovered evidence is too much work, it can easily be done by a small team of good attackers in three or four days. Second, the tools used by Cozy Bear appeared on the black market when they were first discovered years ago and have been recycled and used against many other targets, including against German industry. The reuse and fine-tuning of existing malware happens all the time. Third, the language, location settings, and compilation metadata can easily be altered by changing basic settings on the attacker’s computer in five minutes without the need of special knowledge. None of the technical evidence is convincing. It would only be convincing if the attackers used entirely novel, unique, and sophisticated tools with unmistakable indicators pointing to Russia supported by human intelligence, not by malware analysis.

The DNC attackers also had very poor, almost comical, operational security (OPSEC). State actors tend to have a quality assurance review when developing cyberattack tools to minimize the risk of discovery and leaving obvious crumbs behind. Russian intelligence services are especially good. They are highly capable, tactically and strategically agile, and rational. They ensure that offensive tools are tailored and proportionate to the signal they want to send, the possibility of disclosure and public perception, and the odds of escalation. The shoddy OPSEC just doesn’t fit what we know about Russian intelligence.

The claim that Guccifer 2.0 is a Russian false flag operation may not hold up either. If Russia wanted to cover up the fact it had hacked the DNC, why create a pseudonym that could only attract more attention and publish emails? Dumping a trove of documents all at once is less valuable than cherry picking the most damaging information and strategically leaking it in a crafted and targeted fashion, as the FSB, SVR or GRU have probably done in the past. Also, leaking to Wikileaks isn’t hard. They have a submission form.

Given these arguments, blaming Russia is not a slam dunk. Why would a country with some of the best intelligence services in the world commit a whole series of really stupid mistakes in a highly sensitive operation? Why pick a target that has a strong chance of leading to escalatory activity when Russia is known to prefer incremental actions over drastic ones? Why go through the trouble of a false flag when doing nothing would have been arguably better? Lastly, how does Russia benefit from publicly backing Donald Trump given that Republicans have been skeptical of improving relations?

The evidence and information in the public domain strongly suggests Russia was behind the DNC hack, even though Russian intelligence services would have had the choice of not making it so clear cut given what we know about their tools, tactics, procedures, and thinking.

The DNC hack leads to at least four “what if” questions, each with its own significant policy consequences. First, if Russia had poor operational security and misjudged its target, it needs to be educated about the sensitivity of certain targets in its favorite adversary countries to avoid a repeat of this disaster. Second, if Russia deliberately hacked the DNC to leak confidential information, it would represent a strategic escalation on behalf of the Kremlin and the world would need to prepare for difficult times ahead. Third, if the breach and leak were perpetrated by a bunch of random activists using the pseudonym “Guccifer 2.0“, it would be the first instance of non-state actors succeeding in creating a global incident with severe strategic implications, demanding more control of such entities and a much better design of escalatory processes among nations. Finally, it is entirely possible that this was a false flag operation by an unknown third party to escalate tensions between nuclear superpowers. If this is the case, this party has to be uncovered. . . .

2. More about cyber-security experts who view the “Russian intelligence” hacking of DNC computers as suspiciously transparent:

“Russia Wanted to Be Caught, Says Company Waging War on the DNC Hackers” by Patrick Tucker; Defense One; 7/28/2016.

. . . . But security expert Jeff Carr thought the smoke off this smoking-gun was a bit too thick. In his minority report, he asks: what kind of spy ring tags their stolen docs before releasing them under a cover?

“Raise your hand if you think that a GRU or FSB officer would add Iron Felix’s name to the metadata of a stolen document before he released it to the world while pretending to be a Romanian hacker. Someone clearly had a wicked sense of humor,” he wrote. . . . .

. . . . Crowdstrike president Shawn Henry is dubious. “I don’t know what kind of foreign intelligence service conducting a covert operation wants to be found,” he said on Thursday, but added that CrowdStrike picked up the DNC hack within 48 hours and that it “wasn’t difficult.” . . . .

3a. Check out the latest member of Donald Trump’s opposition research team. It’s an informal membership:

“WikiLeaks Will Release New Clinton Emails to Add to Incriminating Evidence, Julian Assange Says, in ‘Big Year Ahead'” by Ben Norton; Salon; 6/14/2016.

Assange says the government likely won’t indict “war hawk” Hillary Clinton, but it has more than enough evidence

Julian Assange, editor-in chief of WikiLeaks, says the whistle-blowing journalism organization will soon be publishing unreleased emails from Hillary Clinton.

Clinton, the Democratic Party presidential front-runner, has been under criminal investigation by the FBI for using a personal email account on a private server in her home that contained top-secret information.

Assange doesn’t believe that Clinton will be indicted, but argues that the government has more than enough evidence, in both her emails and in the dealings of the Clinton Foundation, if it were truly committed to doing so.

“We have upcoming leaks in relation to Hillary Clinton,” Assange said. “WikiLeaks has a very big year ahead.” . . . .

3b. Behold the latest chapter in Julian Assange’s quest to get Donald Trump elected President: WikiLeaks just released a new searchable database of Democratic National Committee emails. Since the database consists of 19,252 emails so, as you can imagine, there’s quite a bit of content available to the public. Content like innocent donors’ credit card, social security, and passport numbers:

“WikiLeaks Just Published Tons of Credit Card and Social Security Numbers” by Michael Nunez; Gizmodo; 7/22/2016.

. . . . But not always.The organization has also used that tradition of transparency for less just causes, like today when the site published 19,252 emails from top US Democratic National Committee members,many of which included personal information about innocent donors including credit card, social security numbers, and passport numbers.

If you visit the WikiLeaks DNC emails website, you can browse the emails using a simple boolean search.Typing a word like “contribution” will actually turn up hundreds of results. The emails include unencrypted, plain-text listings of donor emails addresses, home addresses, phone numbers, social security numbers, passport numbers, and credit card information. WikiLeaks proudly announced the data dump in a single tweet. . . .

The new leak is part of the organization’s ongoing Hillary Leaks series, which launched in March as a searchable archive of more than 30,000 emails and attachments sent to and from Clinton’s private email server, while she was Secretary of State. The original email dump included documents from June 2010 to August 2014. The new release includes emails from January 2015 to May 2016. . . .

3c.While Assange hasn’t come out and endorsed Trump yet, he definitely doesn’t seem very keen on criticizing him:

“Hillary Clinton FBI Investigation: Enough Evidence of an Indictment, But More Emails Coming, Wikileaks Founder Julian Assange Claims” by Robert Jonathan; The Inquisitr; 6/13/2016.

. . . . Against this backdrop, Peston wondered if Assange would prefer that Donald Trump, the GOP presumptive nominee, wins the White House in November. . . .
“Trump is a completely unpredictable phenomenon—you can’t predict what he would do in office . . .

3d. Donald Trump once again is hinting at violence as the solution to a Hillary Clinton presidency along with Roger Stone suggesting that the election will be rigged and the government invalid and Julian Assange making it clear that he wants to do whatever he can to ensure Hillary Clinton loses and has more documents that he’s sitting on for the right “October Surprise” moment to politically damage her, it’s probably worth noting that Roger Stone just claimed he’s in contact with Assange.

Wikileaks is now clearly working as the unofficial hacking squad for the Trump campaign’s dirty tricks team. It makes sense that Assange would be in communication with the campaign’s unofficial dirty tricks organizer.

Stone is a master dirty trickster,with a track record going back to the Nixon campaign. What specifically is Stone recommending to Assange regarding the nature and timing of planned leaks. Is Wikileaks going to try and help Trump trigger a bloody ‘American Spring’ this Fall? Now that the Trump campaign’s central strategy appears to be preemptively delegitimizing a Clinton presidency and/or prepping the Trump base for acts of political violence it’s a pretty big question.

“Roger Stone Claims He’s In Touch With Wikileaks’ Assange About Clinton Emails” by Allegra Kirkland; Talking Points Memo Livewire; 8/9/2016.

Longtime Donald Trump ally Roger Stone claimed on Monday that he was in touch with the founder of Wikileaks about documents the organization plans to release to derail Hillary Clinton’s campaign.

During a Monday speech to the Southwest Broward Republican Organization, Stone was asked for his “forecast” on what the “October surprise” Wikileaks founder Julian Assange had promised to reveal about Clinton may be.

“Well, it could be any number of things,” Stone said, according to video of his remarks obtained by Media Matters. “I actually have communicated with Assange. I believe the next tranche of his documents pertain to the Clinton Foundation but there’s no telling what the October surprise may be.”

These remarks fly in the face of Stone and other Trump allies’ repeated claims that the general election results may be “rigged” in Clinton’s favor. . . .

. . . . Since late July, Stone has pushed the claim that a Clinton victory could only result from a “rigged” election system that favored her campaign. “If there’s voter fraud, this election will be illegitimate, the election of the winner will be illegitimate, we will have a constitutional crisis, widespread civil disobedience, and the government will no longer be the government,” Stone said in a podcast with Breitbart’s Milo Yiannopoulos, despite the overwhelming evidence that voter fraud is virtually nonexistent in the United States. . . .

3e. Assange strongly hinted that the source for the DNC hacks was Seth Rich, a recently murdered young DNC staffer. Also, Wikileaks just offered $20,000 for anyone with information on Rich’s murder. The Trump is–not surprisingly–endorsing this.

Rich’s family is on record as urging that Assange’s inuendos not be taken seriously.

“WikiLeaks Is Fanning a Conspiracy Theory That Hillary Murdered a DNC Staffer” by Jeremy Stahl; Slate; 8/09/2015.

Julian Assange and his WikiLeaks organization appear to be actively encouraging a conspiracy theory that a Democratic National Committee staffer was murdered for nefarious political purposes, perhaps by Hillary Clinton.

Seth Rich was killed last month in Washington, D.C., in an early morning shooting that police have speculated was a failed robbery. Because Rich did voter outreach for the DNC and because we live in a ridiculous world, conspiracy theorists have glommed on to a fantastical story that Rich was an FBI informant meeting with purported agents who were actually a hit team sent by Hillary Clinton. There is of course absolutely zero evidence for this and Snopes has issued a comprehensive debunking of the premise (Rich is only 27 and has only worked at the DNC since 2014 so is unlikely to be in possession of information that might take down Clinton, he was on the phone with his girlfriend at the time of the shooting and she hasn’t reported any FBI meeting, there have been a string of robberies in the area, an FBI rendezvous at 4 a.m. only happens in movies, the whole thing is batshit crazy, etc.)

The fact that the idea is so absurd, though, has not stopped Assange from suggesting that Rich was murdered for nefarious political purposes either because he was an informant for the FBI or because he may have been a source in last month’s WikiLeaks release of thousands of DNC emails. In an interview on Tuesday that was picked up by BuzzFeed’s Andrew Kaczynski, Assange seemed to lend credence to the idea that Rich had been retaliated against.

“WikiLeaks never sits on material. Whistleblowers go to significant efforts to get us material and often very significant risks,” Assange said in an interview with the Dutch television program Nieuwsuur. “There’s a 27-year-old who works for the DNC who was shot in the back, murdered, just a few weeks ago, for unknown reasons as he was walking down the streets in Washington.”

When Assange was questioned as to what the hell he was talking about, he said, “I’m suggesting that our sources take risks and they are—they become concerned to see things occurring like that.”

The implication here is that either Assange’s sources are fearful that Rich might have been a whistleblower to the FBI or someone else and was taken out by Clinton or others—as the conspiracy theory suggests—or that he was a whistleblower for Assange’s group and was murdered because of that.

When the interviewer asked Assange if he was implying that Rich was a WikiLeaks source, he said, “We don’t comment on who our sources are.”

On Tuesday, WikiLeaks sent out a tweet offering a $20,000 reward for information about Rich’s murder. . . .

4. With ‘accidentally’ tweeting neo-Nazi memes the hot new thing in 2016 thanks to the Donald Trump campaign, it looks like one of Trump’s unofficial campaign surrogates decided to get ‘accidentally’ trendy:

“Wikileaks Denies Anti-Semitism over (((echoes))) Tweet” by Chris Tognotti; The Daily Dot; 7/24/2016.

If any one form of discriminatory social media expression has been on the rise in recent months, it’s been anti-Semitism.

The Donald Trump presidential campaign’s well-documented white nationalist and Neo-Nazi following continues to bring such hatred to the forefront. Trump himself had even retweeted things from members of the “white genocide” movement, and in June, the campaign tweeted out an anti-Semitic meme that originated from the alt-right fever swamps of social media.

On Saturday, a completely different organization seemed to dip its toes in those waters, too. Wikileaks started tweeting about (((echoes))), and it’s generated a great amount of controversy.

It’s one of the increasingly well-known methods of harassment used by anti-Jewish racists on Twitter, which has exploded into wider visibility in recent months―tweeting at Jews, and bracketing their names with two or three parentheses on either side.

It’s intended both as a signal to other anti-Semites and neo-Nazis, to highlight the target’s Jewish heritage (or perceived Jewish heritage, since racists aren’t always the sharpest or most concerned with accuracy), and track them on social media, making it even easier for other anti-Semites to join in on the abuse. . . .

That’s where Wikileaks comes in. On Saturday, amid the group’s high-profile dump of thousands and thousands of emails from the Democratic National Committee, its Twitter account said something very suggestive about its critics. The tweet has since been deleted, going against Wikileaks’ perceived notion of radical transparency. Nevertheless, screenshotters never forget.

It’s not exactly the most coherent tweet, but the thrust is nonetheless pretty clear: Wikileaks accused most of its critics of having the (((echoes))) brackets around their names, as well as “black-rimmed glasses,” statements that many interpreted, plainly enough, as “most of our critics are Jews.” . . . .

. . . . It’s also been maintaining a pretty aggressive public relations posture regarding these latest leaks. It threatened MSNBC host Joy Reid for tweeting that she planned to discuss an “affinity” between the group and the Russian government on her show, saying “our lawyers will monitor your program.” . . . .

5. The National Front and the UK Independence Party are among Assange’s big supporters.

“WikiLeaks Motivations Aren’t What You Think” by Akbar Shahid Ahmed; The Huffington Post; 8/03/2016.

. . . . Meanwhile, he [Assange] has attracted support from powerful anti-U.S. actors in his battle with Swedish authorities. Two right-wing political parties in Europe that are skeptical of Washington . . . the far-right National Front in France and the pro-Brexit U.K. Independence Party, have called for their countries to grant Assange asylum so he can avoid questioning by Sweden. . . .

6. Among his many delightful qualities, Assange is an advocate of neoliberal economic theory. We wonder what the Bernie Bots would think of this?!

“Julian Assange–Also Neoliberal Utopian” by Ramona; libcom.org; 8/27/2012.

. . . . Assange’s most lengthy articulation of his own politics comes in a lengthy interview with Forbes. Asked “Would you call yourself a free market proponent?”, Assange replies “Absolutely. I have mixed attitudes towards capitalism, but I love markets”. . . . How does Wikileaks fit into this scenario? For Assange, through the act of leaking information, Wikileaks is providing better information in order for the market of international politics to work better. The question of informational asymmetry is a complex one in neoliberal circles, with a long history. Whereas neoliberalism in the variant of the Chicago School of Economics tends towards a model of equilibrium where actors have perfect information about the market, the Austrian school of Economics, favoured by the more radical anarcho-capitalist believe that information is unevenly distributed throughout a market system, and that to increase overall information enables better price setting thus improving the efficency of the market.

Assange’s philosophy here blends Austrian and Chicago School approaches. . . .

7a. Eddie the Friendly Spook Snowden and Julian Assange are big fans of Ron Paul. It is worth weighing Ron Paul’s pronouncements in light of Donald Trump’s candidacy and Assange’s more or less open backing of Donald Trump:

“Bal­ti­more & The Walk­ing Dead” by Mark Ames; Pando Daily; 5/1/2015.

. . . . In 1992, the most famous lib­er­tar­ian of all, Ron Paul, was still between Con­gres­sional stints when [the riots in] Los Ange­les erupted, but he did run a prof­itable lib­er­tar­ian newslet­ter, “The Ron Paul Polit­i­cal Report,” to keep his ideas alive. Shortly after the LA riots, Ron Paul put out a “Spe­cial Issue on Racial Ter­ror­ism”offer­ing his lib­er­tar­ian analy­sis of what he termed black “terrorism”:“The crim­i­nals who ter­ror­ize our cities—in riots and on every non-riot day—are not exclu­sively young black males, but they largely are. As chil­dren, they are trained to hate whites, to believe that white oppres­sion is respon­si­ble for all black ills, to ‘fight the power,’ to steal and loot as much money from the white enemy as pos­si­ble.

“The cause of the riots is plain: bar­barism. If the bar­bar­ians can­not loot suf­fi­ciently through legal chan­nels (i.e., the riots being the welfare-state minus the middle-man), they resort to ille­gal ones, to ter­ror­ism. Trou­ble is, few seem will­ing to stop them. The cops have been handcuffed. . . .

. . . .“We are con­stantly told that it is evil to be afraid of black men, but it is hardly irra­tional. Black men com­mit mur­ders, rapes, rob­beries, mug­gings, and bur­glar­ies all out of pro­por­tion to their num­bers.”

“I think we can safely assume that 95% of the black males in [major U.S. cities] are semi-criminal or entirely crim­i­nal.” A few months later, in Octo­ber 1992, Dr. Paul explained how he taught his own family—presumably includ­ing his favorite son, Rand Paul—how to defend them­selves and even mur­der what Dr. Paul called “hip-hop” car­jack­ers, “the urban youth who play unsus­pect­ing whites like pianos”:

“What can you do? More and more Amer­i­cans are car­ry­ing a gun in the car. An ex-cop I know advises that if you have to use a gun on a youth, you should leave the scene imme­di­ately, dis­pos­ing of the wiped off gun as soon as pos­si­ble. Such a gun can­not, of course, be reg­is­tered to you, but one bought pri­vately (through the clas­si­fieds, for example.).

Beyond that, the Lib­er­tar­ian Party’s polit­i­cal solu­tion to African-American poverty and injus­tice was to abol­ish all wel­fare pro­grams, pub­lic schools, and anti-discrimination laws like the Civil Rights Act. This was the solu­tion pro­moted by an up-and-coming lib­er­tar­ian, Jacob Hornberger—who this week co-hosted an event with Ron Paul and Glenn Green­wald. Horn­berger believes that 19th cen­tury ante­bel­lum slave-era Amer­ica was “the freest soci­ety in his­tory”. . .

7c. David Duke has been a high-profile supporter of Trump, characterizing him in much the same context as he characterized Ron Paul, Snowden and

“Top 10 Racist Ron Paul Friends, Supporters” by Casey Gane-McCalla”; News One; 12/27/2011.

. . . . 6. David Duke
David Duke is a former Grand Wizard of the Ku Klux Klan and candidate for Governor of Louisiana. Duke is also a New World Order conspiracy theorist who believes that Jews control the Federal Reserve. On his website, Duke proudly boasts about the endorsements and kind words that Paul gave him in his newsletters and in turn endorses Paul for president:

Duke’s platform called for tax cuts, no quotas, no affirmative action, no welfare, and no busing…

To many voters, this seems like just plain good sense. Duke carried baggage from his past, the voters were willing to overlook that. If he had been afforded the forgiveness an ex-communist gets, he might have won.

…David Broder, also of the Post and equally liberal, writing on an entirely different subject, had it right: ‘No one wants to talk about race publicly, but if you ask any campaign consultant or pollster privately, the sad reality that a great many working-class and middle class white Americans are far less hostile to the rich and their tax breaks than they are to the poor and minorities with their welfare and affirmative action programs.”

Liberals are notoriously blind to the sociological effects of their own programs. David Duke was hurt by his past. How many more Dukes are waiting in the wings without such a taint?

“Duke lost the election,” it said, “but he scared the blazes out of the Establishment.” In 1991, a newsletter asked, “Is David Duke’s new prominence, despite his losing the gubernatorial election, good for anti-big government forces?” The conclusion was that “our priority should be to take the anti-government, anti-tax, anti-crime, anti-welfare loafers, anti-race privilege, anti-foreign meddling message of Duke, and enclose it in a more consistent package of freedom.”

Duke also gave advice to Paul on his website, saying:

What must Paul do to have any real chance of winning or making a bigger impact? I think he should do exactly what I did in Louisiana, and for Ron Paul to follow exactly the same advice Ron Paul gave in his newsletters for others, take up my campaign issues with passion and purpose.

Could it be that Paul is taking Duke’s advice by hiding the racist “baggage from his past” in a more consistent package of “freedom?” . . .

7c. Snowden’s leaking journalist of choice–Glenn Greenwald–is also worth pondering in this regard.

His observations on immigration sound JUST like Donald Trump.

“Would You Feel Differently About Snowden, Greenwald, and Assange If You Knew What They Really Thought?” by Sean Wilentz; The New Republic; 1/19/2014.

. . . . On certain issues, though, his [Greenwald’s] prose was suffused with right-wing conceits and catchphrases. One example was immigration, on which Greenwald then held surprisingly hard-line views. “The parade of evils caused by illegal immigration is widely known,” Greenwald wrote in 2005. The facts, to him, were indisputable: “illegal immigration wreaks havoc economically, socially, and culturally; makes a mockery of the rule of law; and is disgraceful just on basic fairness grounds alone.” Defending the nativist congressman Tom Tancredo from charges of racism, Greenwald wrote of “unmanageably endless hordes of people [who] pour over the border in numbers far too large to assimilate, and who consequently have no need, motivation or ability to assimilate.” Those hordes, Greenwald wrote, posed a threat to “middle-class suburban voters.” . . . .

7d. Compare, also, the back cover of Serpent’s Walk with the Trump phenomenon.

  Serpent’s Walk by “Randolph D. Calverhall;” Copyright 1991 [SC]; National Vanguard Books; 0-937944-05-X.

It assumes that Hitler’s warrior elite – the SS – didn’t give up their struggle for a White world when they lost the Second World War. Instead their survivors went underground and adopted some of their tactics of their enemies: they began building their economic muscle and buying into the opinion-forming media. A century after the war they are ready to challenge the democrats and Jews for the hearts and minds of White Americans, who have begun to have their fill of government-enforced multi-culturalism and ‘equality.’

8. Once again, the world of technocratic fascism should be viewed against the background of a vitally important article by David Golumbia.

THIS is what Julian Assange and WikiLeaks are doing!

“Tor, Technocracy, Democracy” by David Golumbia; Uncomputing.org; 4/23/2015.

 . . . . Such tech­no­cratic beliefs are wide­spread in our world today, espe­cially in the enclaves of dig­i­tal enthu­si­asts, whether or not they are part of the giant corporate-digital leviathanHack­ers (“civic,” “eth­i­cal,” “white” and “black” hat alike), hack­tivists, Wik­iLeaks fans [and Julian Assange et al–D. E.], Anony­mous “mem­bers,” even Edward Snow­den him­self walk hand-in-hand with Face­book and Google in telling us that coders don’t just have good things to con­tribute to the polit­i­cal world, but that the polit­i­cal world is theirs to do with what they want, and the rest of us should stay out of it: the polit­i­cal world is bro­ken, they appear to think (rightly, at least in part), and the solu­tion to that, they think (wrongly, at least for the most part), is for pro­gram­mers to take polit­i­cal mat­ters into their own hands. . .

9. Let’s connect some dots in the “conga-line ‘ops'”:

  • Don’t forget who else is in Russia: a very high-profile CIA officer (and former NSA contractor) named “Edward.” I think his last name begins with an “S.” We strongly suspect that the DNC hack (and very possibly the German Bundestag hack referred to in Item #1) involved The Obverse Oswald.
  • It was, of course, Snowden’s journey to Russia, effected by Sarah Harrison and WikiLeaks, that put the final nail in the coffin of Barack Obama and (ahem) Hillary Clinton’s reboot with Russia.
  • Connecting some more dots: The Clinton e-mail non-scandal was an outgrowth of the Benghazi investigations (nine of them by the GOP), which grew out of the so-called Arab Spring, one of the “Conga-Line ‘Ops'”.
  • In FTR #733 and FTR 734  we noted that Karl Rove was acting as a top advisor to the prime minister of Sweden at the time that WikiLeaks landed on Carl Lundstrom’s server.
  • The launch of the Arab Spring stemmed from a leaked State Department cable.
  • Karl Rove was also channeling money to Bernie Sanders.
  • Assange, like Snowden, is a big Ron Paul fan.
  • Ron Paul is very close to Mitt Romney.
  • Although he is from Texas, Paul’s Super PAC was in Provo, Utah.
  • It was largely capitalized by Peter Thiel, the largest stockholder in Palantir which–its disclaimers notwithstanding–makes the PRISM software at the core of L’Affaire Snowden.
  • Peter Thiel is now a Trump delegate.
  • James Comey, head of the FBI, was a big supporter of Mitt Romney.
  • Comey was the former general counsel for Bridgewater Associates, the world’s largest hedge fund, which provided a big chunk of start-up capital for Palantir.
  • David Duke has been a big supporter of Trump.
  • Duke has been networking with Snowden presidential selection Ron Paul for decades.
  • Carl Lundstrom (who financed the Pirate Bay site at which WikiLeaks landed) arranged a speaking tour for David Duke.
  • Joran Jermas aka “Israel Shamir” is part of a Russian and Ukrainian fascist milieu that networks with David Duke.

Discussion

22 comments for “FTR #917 Wiki-Fascism, Part #4: Weighing In for the Trumpenkampfverbande (Technocratic Fascism in Action)”

  1. Well look at that: with more and more people noting the exclusive targeting of the Democrats in this year’s big hack attacks, now we have the GOP getting hit with a hack of its own. A completely inconsequential, and redacted, email hack with nothing of interest. And a hack that “Guccifer 2.0” isn’t even claiming to have done (and they aren’t exactly shy about claiming credit for these things). That’s sure convenient…for the GOP.

    Beyond that, the site where the hacked documents was released, DCLeaks, appears to have Russian-connected fingerprints all over it, much like the Fancy Bear and Cozy Bear hackers allegedly behind the DNC hack. Specifically, the website is written in what appears to be non-native English speakers (who claim to be Americans) and uses email addresses and servers almost exclusively associated with Russian hackers. So, much like the Fancy Bear and Cozy Bear hack of the DNC, the people behind the DCLeaks site appear to be conspicuously trying to associate themselves with Russian hackers:

    The Hill

    Site connected to Russian hackers posts Republican emails

    By Joe Uchill
    August 12, 2016, 06:20 pm

    A website tied to the hacking scandal of the Democratic Party has now posted a small batch of leaked emails from Republican campaigns and state GOP staffers.

    The emails on the site, known as DCLeaks, appear to be from state party officials and former Republican presidential candidates, including Sen. Lindsey Graham (R-S.C.). The messages range from June to October of 2015.

    The DNC hacker or hackers known as Guccifer 2.0 used DC Leaks to promote leaks from a Clinton staffer’s email to The Smoking Gun, though the hacker claimed not to have been involved with the theft of the messages.

    Most of the messages coordinate campaign activities, solicit funds, or invite or RSVP to events. The archive is largely the procedural minutia of running campaigns or state parties.

    The emails include a wide array of constituent email addresses. Many appear to be responses to mass-emails from concerned party supporters writing in to their delegates. One reply to a Stop Hillary PAC fundraising email targeting Democrats lack of support for the Benghazi commission reads, “Don’t the Republicans have a majority in Congress? Isn’t John Boehner a Republican? What is the problem that you need my $36 to help you fight back.”

    The archive appears to be incomplete, with replies to emails that don’t appear to be included on their own. That could mean the emails were deleted before being retrieved, or that the leaker or site decided to scrub certain items from the record.

    But that there was a leak at all runs counter to a Republican narrative that the DNC is particularly susceptible to data breaches (“What is it with Democrats that they can’t maintain basic email security?” Mike Huckabee asked on Facebook).

    Guccifer 2.0 is thought to be a front name for Russian intelligence, and the site has strong circumstantial ties to the Russian group believed to be behind the hack of the Democratic National Committee (DNC).

    DCLeaks claims to be the work of patriotic American activists but is written in a way that suggests non-native English speakers. Much of the leaks are email archives from critics of Russia.

    The site hosts a trove of leaked emails from Gen. Philip Breedlove, who was heavily in favor of fending off Russia during its Ukraine incursion, and George Soros, whose DC Leaks emails were promoted by the site on twitter as “Check George Soros’s [Open Society Foundation] plans to counter Russian policy and traditional values.”

    DC Leaks site was initially registered by THCServers, a company that has only been the initial registrar for 14 sites since 2013. Including DC Leaks, three of those sites have been connected to the Russian hackers believed to be behind the DNC hack, including a site identified by the German government.

    The Russian hackers, nicknamed Fancy Bear, have a pattern of using domain registrars outside of United States that accept bitcoin and the Romanian THCServers fit the mold. It is registered to an email account from europe.com, which, like most of the emails connected to FancyBear, is a free web service based in Europe.

    A representative from ThreatConnect, the company that linked Fancy Bear to DCLeaks, noted that the obscure Romanian THCServer and Europe.com would be abnormal for an American hacktivist collective, and believes the sum-total is a strong circumstantial case.

    At publication time, the Republican National Convention was not yet able to authenticate the emails.

    “A representative from ThreatConnect, the company that linked Fancy Bear to DCLeaks, noted that the obscure Romanian THCServer and Europe.com would be abnormal for an American hacktivist collective, and believes the sum-total is a strong circumstantial case.

    Yes, the circumstantial evidence for Russian government involvement in this hack is sum-total quite strong. If you assume they wanted to be caught:

    Guccifer 2.0 is thought to be a front name for Russian intelligence, and the site has strong circumstantial ties to the Russian group believed to be behind the hack of the Democratic National Committee (DNC).

    DCLeaks claims to be the work of patriotic American activists but is written in a way that suggests non-native English speakers. Much of the leaks are email archives from critics of Russia.

    The site hosts a trove of leaked emails from Gen. Philip Breedlove, who was heavily in favor of fending off Russia during its Ukraine incursion, and George Soros, whose DC Leaks emails were promoted by the site on twitter as “Check George Soros’s [Open Society Foundation] plans to counter Russian policy and traditional values.”

    DC Leaks site was initially registered by THCServers, a company that has only been the initial registrar for 14 sites since 2013. Including DC Leaks, three of those sites have been connected to the Russian hackers believed to be behind the DNC hack, including a site identified by the German government.

    The Russian hackers, nicknamed Fancy Bear, have a pattern of using domain registrars outside of United States that accept bitcoin and the Romanian THCServers fit the mold. It is registered to an email account from europe.com, which, like most of the emails connected to FancyBear, is a free web service based in Europe.

    Yes, DCLeaks was initially registered to a Romanian web server company that has only registered 14 sites in the last three years, and two those sites were also connected to the hackers believed to be behind the DNC hack (based in part on evidence provided by the German government). Oh, and DCLeaks used an email account from europe.com, which FancyBear also used. And all this is apparently strong circumstantial evidence that DCLeaks is not, as the site’s operators claim, really run by Americans but is in fact run by the same Russian hackers behind the DNC email hack. LOL!

    Now, while all of this evidence does point towards the people behind the DCLeaks site being the same people, or associated with, the Fancy Bear/Cozy Bear hackers, that would ALSO suggest that the people behind DCLeaks wanted to be eventually connected with a Russian hacking outfit since the Fancy/Cozy Bear team apparently wanted investigators to conclude that they were indeed Russian hackers. As Christopher Porter, the person in charge of FireEye’s DNC email hack investigation, sees it, the reason the hackers left so much evidence that they were Russian hackers is because Russia is doing this all to show off:

    Defense One

    Russia Wanted to be Caught, Says Company Waging War on the DNC Hackers

    By Patrick Tucker

    July 28, 2016

    Pointing a finger at Russia is easy. Punishing them is hard. That’s why they hacked the DNC, according to the company that first named one of the key suspects.

    The Russian groups behind the DNC hack no longer seem to care about getting caught. Long before the Kremlin-sponsored hacking squads APT 28 and APT 29 were making waves for stealing files from the Democratic National Committee, they made an appearance in two white papers put out by FireEye. The cybersecurity company has been monitoring and analyzing the two groups on behalf of corporate clients for years. In the DNC breach, a company spokesman told Defense One: “They wanted experts and policymakers to know that Russia is behind it.”

    That fits a pattern of increasing bold moves over the past year by the groups, which are also known as FANCY BEAR and COZY BEAR, says Christopher Porter, the manager of Horizons, the strategic intelligence and forecasting arm of FireEye iSIGHT Intelligence, the company’s threat monitoring division.

    “We see them now persisting even when they know that security professionals have been called in to remove them from a system. They continue their operational pace at a very high level. So that’s a huge risk and a sea change in their behavior,” Porter said. “Even when they know they’re caught, they don’t stop the operation, necessarily.”

    That’s highly unusual for an advanced persistent threat group. It signals that Russia is willing to work in a space normally reserved for criminals, devoting government resources and acting with impunity. That makes them incredibly difficult to counter, for the same reason the West had no good response to the “little green men” — the Russian forces that invaded Ukraine disguised as a organic populist militant movement.

    “We’ve even seen them on some systems where they know that there is anti-virus [software] on a computer inside of a network system that they’re on,” FireEye’s Porter said. “They’re moving laterally within a network. They know that their tool is going to be detected by a system that they’re about to move to and they’ll do it anyway because they’re such skilled hackers that they can compromise the system and then jump to another system and get what they need before they can be quarantined.”

    There’s a reason that’s not normal behavior, even among very skilled hackers. After attackers are expelled from a system, defenders move quickly to patch the security hole they used. Groups that run advanced persistent attacks move stealthily, lest they burn too quickly through their bag of tricks.

    Yet FireEye found that APT 28 and APT 29 didn’t even bother to change the pace of their attacks as their targets became aware of them.

    Over the past week, U.S. intelligence community officials have said that they have “high confidence” that the Russian government was behind the theft of emails from the DNC. That’s an unusually bold statement for the IC to make about a data breach that’s currently moving the news cycle. By contrast, the intelligence community still hasn’t made a formal declaration of attribution about the OPM hack. Months after the intrusion was revealed, Clapper acknowledged only that China was the “leading suspect.”

    Porter believes that part of the reason that the IC and multiple cyber security researchers were able to implicate Russia is that Russia was showing off. Consider that on June 15, one day after Crowdstrike fingered APT 28 and APT 29, a figure named Guccifer 2.0 claimed to have done the hack, alone. But Twitter users quickly found metadata in Guccifer 2.0’s files that undermined that claim. The docs contained a tag reading “?????? ??????????,” a reference to to the founder of the Soviet Secret Police.

    But security expert Jeff Carr thought the smoke off this smoking-gun was a bit too thick. In his minority report, he asks: what kind of spy ring tags their stolen docs before releasing them under a cover?

    “Raise your hand if you think that a GRU or FSB officer would add Iron Felix’s name to the metadata of a stolen document before he released it to the world while pretending to be a Romanian hacker. Someone clearly had a wicked sense of humor,” he wrote.

    “Porter believes that part of the reason that the IC and multiple cyber security researchers were able to implicate Russia is that Russia was showing off….”

    Yep, if we are to assume that the DNC email hacks and the DCLeaks website are all part of the same Russian hacking team, we also have to assume that getting caught and getting all this blamed in Putin was always part of the plan. And apparently a form of bragging. Bragging in a manner where the hackers risked burning through their bag of hacker tricks:


    “We’ve even seen them on some systems where they know that there is anti-virus [software] on a computer inside of a network system that they’re on,” FireEye’s Porter said. “They’re moving laterally within a network. They know that their tool is going to be detected by a system that they’re about to move to and they’ll do it anyway because they’re such skilled hackers that they can compromise the system and then jump to another system and get what they need before they can be quarantined.”

    There’s a reason that’s not normal behavior, even among very skilled hackers. After attackers are expelled from a system, defenders move quickly to patch the security hole they used. Groups that run advanced persistent attacks move stealthily, lest they burn too quickly through their bag of tricks.

    Yet FireEye found that APT 28 and APT 29 didn’t even bother to change the pace of their attacks as their targets became aware of them.

    Yes, not only did the hackers want to get caught but they apparently wanted to demonstrate to US investigators how they did it too. Ok. That’s odd.

    But even if the hackers weren’t leaving a trail of their methods, the fact that they wanted to be identified as Russian operatives is enough of a head scratcher on its own. Especially considering the growing possibility of a full blown proxy war breaking out between the US and Russia over the situation in Ukraine. Why Russia would Russia want to do that? So US public support for military aid to Ukraine increases? To ensure that a Hillary Clinton presidency views Putin as a personal enemy or maybe generally trying to reinforce the image of Putin an enemy of the US’s democracy in general? If the ‘Russians did it’ theory is going to remain the dominant theory, the question of why the Kremlin would want to obviously get caught manipulating a US election in a manner designed to embarrass and piss off the likely winner has to become one of the dominant questions.

    Of course, questions about who else could have the motive to fake a Russian hack with the intent of simultaneously undermining both the Clinton campaign and US/Russian relations should probably be a top question too, but that’s apparently never going to be asked. So that just leaves us with questions about why on earth the Kremlin wanted to set a trap for Russia that would obviously result in the demonization of Russia in the US press during an election season and further poison US/Russian relations. Hopefully at least that question gets asked.

    Also, hopefully there will be some answers as to why the hackers were apparently allowed to hack the Democrats for over a year while US intelligence was monitoring it as the article below reports. Maybe all the hacker methods the hackers were leaving behind for investigators to discover were just so tantalizing that the investigators figured the cost of stopping the attacks wasn’t worth the benefits:

    Reuters

    Exclusive: Congressional leaders were briefed a year ago on hacking of Democrats – sources

    By Mark Hosenball and John Walcott | WASHINGTON

    Fri Aug 12, 2016 12:07pm EDT

    U.S. intelligence officials told top congressional leaders a year ago that Russian hackers were attacking the Democratic Party, three sources familiar with the matter said on Thursday, but the lawmakers were unable to tell the targets about the hacking because the information was so secret.

    The disclosure of the Top Secret information would have revealed that U.S. intelligence agencies were continuing to monitor the hacking, as well as the sensitive intelligence sources and the methods they were using to do it.

    The material was marked with additional restrictions and assigned a unique codeword, limiting access to a small number of officials who needed to know that U.S. spy agencies had concluded that two Russian intelligence agencies or their proxies were targeting the Democratic National Committee, the central organizing body of the Democratic Party.

    The National Security Agency and other intelligence agencies sometimes delay informing targets of foreign intelligence activities under similar circumstances, officials have said.

    The alleged hacking of the Democrats and the Russian connection did not become public until late last month when the FBI said it was investigating a cyber attack at the DNC. The DNC did not respond to a request for comment for this story.

    The congressional briefing was given last summer in a secure room called a Sensitive Compartmented Information Facility, or SCIF, to a group of congressional leaders informally known as the “Gang of Eight,” the sources said.

    The group at the time included four Republicans: Senate Majority leader Mitch McConnell and House of Representatives Speaker John Boehner, and Senator Richard Burr and Representative Devin Nunes, the House and Senate intelligence committee chairs. Their Democratic counterparts were: Senator Harry Reid and Representative Nancy Pelosi, and Senator Dianne Feinstein and Representative Adam Schiff of the intelligence committees.

    AshLee Strong, press secretary for the current House Speaker, Paul Ryan, declined to comment, and Pelosi’s office did not immediately respond to requests for comment.Pelosi on Thursday called the hacking an “electronic Watergate” and said the Russians were behind it.

    “SPEARPHISHING”

    DNC officials have said they did not learn about the hacking until months after the initial congressional briefing, when an agent from an FBI cybersecurity squad asked them last fall about the party’s data security arrangements.

    Even then, the Democratic sources said, the FBI agent never mentioned that U.S. intelligence officials suspected that Russian hackers were targeting the organization.

    The attack on the DNC later led the hackers to other party organizations, including the Democratic Congressional Campaign Committee, which raises funds for House candidates, Hillary Clinton’s presidential campaign, and other groups.

    The hackers initially used “spearphishing” – attacks on the private email accounts of dozens of people working for the organizations, several sources said.

    One of the sources said the Clinton campaign first detected attacks on its data system in early March, and was given what the source described as a “general briefing” about it by the FBI later that month. The source said the FBI made no mention of a Russian connection in that briefing and did not say when the penetration first took place.

    According to a memo obtained by Reuters, interim DNC Chair Donna Brazile said on Thursday she was creating a Cybersecurity Advisory Board “to ensure prevent future attacks and ensure that the DNC’s cybersecurity capabilities are best-in-class.”

    “The congressional briefing was given last summer in a secure room called a Sensitive Compartmented Information Facility, or SCIF, to a group of congressional leaders informally known as the “Gang of Eight,” the sources said.”

    Wow, so last summer, when Donald Trump made his presidential campaign announcement, the congressional “Gang of Eight” (Senate Majority leader Mitch McConnell and House of Representatives Speaker John Boehner, Senator Richard Burr, Representative Devin Nunes, Senator Harry Reid, Representative Nancy Pelosi, and Senator Dianne Feinstein and Representative Adam Schiff of the intelligence committees) was briefed on this alleged Russian hacking operation targeting the Democrats. But since the methods used to detect the attack were so secret there was nothing the Gang of Eight could say. And then when the DNC and Clinton campaign were later notified that they were under attack, there was no mention that Russia was behind it:

    DNC officials have said they did not learn about the hacking until months after the initial congressional briefing, when an agent from an FBI cybersecurity squad asked them last fall about the party’s data security arrangements.

    Even then, the Democratic sources said, the FBI agent never mentioned that U.S. intelligence officials suspected that Russian hackers were targeting the organization.

    The attack on the DNC later led the hackers to other party organizations, including the Democratic Congressional Campaign Committee, which raises funds for House candidates, Hillary Clinton’s presidential campaign, and other groups.

    One of the sources said the Clinton campaign first detected attacks on its data system in early March, and was given what the source described as a “general briefing” about it by the FBI later that month. The source said the FBI made no mention of a Russian connection in that briefing and did not say when the penetration first took place.

    So, all in all, it would appear that US intelligence agencies were well aware of this alleged Russian attack and basically allowed it to continue despite the fact that the DNC hack apparently allowed the hackers to proceed to hack other Democratic organizations. And the suspicions that Russia was behind it were so super secret and sensitive that the DNC and Clinton campaign didn’t even get to know about that angle when they were told of the act months later. Ok, that’s pretty interesting but it does again raise the question of why the Kremlin would want to get caught doing something that US intelligence found so sensitive that it couldn’t even fully inform the DNC and Clinton campaigns about it.

    Does Putin would robust US public and congressional support for a proxy war with Russia in Ukraine and Syria? If so, why? Since speculation about other possible culprits, like the far-right faction within the elite hacker community (or some faction of the US security establishment that really, really, really wants a war with Russia and wouldn’t mind embarrassing Hillary and the Democrats), is totally off the table, let’s at least hope there’s speculation about why Putin wants to increase anti-Russian sentiments in the US during a critical period when a potential proxy war could break out over multiple conflicts. After all, if there’s one thing that could give US cheerleaders of proxy wars with Russia pause it’s the idea that Putin actually wants one too. So it’s a useful question considering the circumstances even if the circumstances don’t allow for asking more useful questions like who else could want a proxy war.

    So let’s hope those kinds of questions get asked as “Guccifer 2.0”, or any other groups that decide to join in on the fun, continues their Democrat-targeted leaks this campaign season. Especially now that there are growing calls for reprisals against the responsible parties following Guccifer 2.0’s latest Democratic hack:

    The Wall Street Journal

    Hacker Reveals Personal Information for Almost 200 Democrats
    Guccifer 2.0 says records stolen as part of breach of Democratic Congressional Campaign Committee

    By Damian Paletta
    Updated Aug. 13, 2016 8:41 a.m. ET

    WASHINGTON—A hacker posted cellphone numbers and other personal information of nearly 200 current and former congressional Democrats on Friday, the latest public disclosure of sensitive records this election season.

    The hacker, or group of hackers, going by the name “Guccifer 2.0” said the records were stolen as part of a breach of the Democratic Congressional Campaign Committee. A number of files were posted onto Guccifer 2.0’s website, including a spreadsheet that has information, such as phone numbers and email addresses, for 193 people. The cellphone numbers of House Minority Leader Nancy Pelosi of California and Democratic Whip Steny Hoyer of Maryland were among the information posted.

    Mr. Hoyer, reached on the cellphone number listed on the spreadsheet, said he wasn’t aware that this information had been stolen or posted online.

    “This is the first I’ve heard of it, obviously,” he said Friday evening.

    A White House spokesman declined to comment.

    Word began to spread Friday evening among Democrats whose personal information was posted, and several became furious, a congressional staffer said. Not all the information appeared to be correct, as at least one email address listed on the spreadsheet was no longer current.

    The spreadsheet also included many personal email addresses and cellphone numbers for the lawmakers’ chiefs of staffs, schedulers, and legislative directors.

    Hours after the information was posted online, an email list-serve run by the Democratic Caucus sent a notice to recipients informing them to “change passwords to all email accounts that you use” and also to “strongly consider changing your non-House email addresses if possible.”

    It also told them to “be extremely suspicious” before opening any emailed links or attachments and to consider changing passwords for banking accounts, among other things.

    Rep. Adam Schiff of California, whose cellphone number was revealed in the spreadsheet, said in a statement, “I have every confidence that law enforcement will get to the bottom of this, and identify the responsible parties. And when they do, I hope the Administration will disclose who is attempting to interfere with the American political process, and levy strong consequences against those responsible.”

    The posting of the cellphone numbers and personal email addresses of members of Congress has national security implications. Included in the spreadsheet were the personal information of members of the House Intelligence, Armed Services and Foreign Relations Committees. Foreign spies could use that information to try to intercept sensitive communications.

    “This is sensitive information and it could be used in a very detrimental way by a foreign government,” Mr. Hoyer said.

    The DCCC breach was reported late last month. In June, Guccifer claimed responsibility for hacking the Democratic National Committee and posting an opposition research document of Donald Trump online.

    A number of U.S. intelligence officials believe the most likely culprit for stealing the DCCC data, as well as a large batch of records from the Democratic National Committee, are hackers backed by the Russian government. At least one cybersecurity company has said there appear to be links between the Russians and the entity identifying itself as Guccifer 2.0, although the hacker has denied being connected to Moscow.

    The Guccifer 2.0 Twitter account said late Friday that it would provide “the major trove” of stolen information from the DCCC, including emails, to WikiLeaks, which has already published information from a similar breach of the Democratic National Committee. The same Twitter account sent a message to The Wall Street Journal on Friday evening that said the hacker had acted alone, not as part of a team.

    In another message to the Journal, Guccifer 2.0 wrote, “I won’t disclose my whereabouts for the safety reasons. I have a full archive of docs and emails from the dccc server.”

    The Twitter account had been suspended by Saturday morning.

    Mr. Hoyer said Congress, the White House and U.S. intelligence agencies should consider using “offensive measures” in response to the breach.

    “The posting of the cellphone numbers and personal email addresses of members of Congress has national security implications. Included in the spreadsheet were the personal information of members of the House Intelligence, Armed Services and Foreign Relations Committees. Foreign spies could use that information to try to intercept sensitive communications.”

    Keep in mind that this hack was apparently something US intelligence agencies were monitoring and basically allowed to happen if, as the previous article suggested, the hacks of the Clinton campaign and DCCC were a result of the hack of the DNC that intelligence officials did nothing to stop. So the national security implications hopefully aren’t all that significant unless personal cellphone and email addresses are typically very difficult for foreign spies to come across. Although it might make hacking future hacks against these 200 Democratic insiders much easier for random hackers that have no government ties.

    But with Steny Hoyer calling for “offensive measure” in response to the hack, and Rep Schiff (one of “Gang of Eight” who got the initial briefing last summer) calling for the Obama administration to identify the perpetrators and “levy strong consequences against those responsible,” the risk of the political dynamics created by this hack forcing the US into a cyberwar with Russia is now a real possibility. So, did Russia want a cyberwar? Because that was an obvious consequence of obviously meddling in the US election.

    Also not that Rep Schiff is a vocal advocate of giving lethal military aid to Ukraine, so it will be very interesting to see if there are attempts to get the US presidential candidates to pledge to arm Ukraine as tensions with Russia become a growing factor in the elections. Was that one of the Kremlin’s goals?

    So we’ll see if the narrative of these hacks ever includes speculation that goes beyond the conspicuous Russian culprits, but it’s also worth keep in mind that if it does turn out this was a third-party attack with the intent of goading the US and Russia to a military conflict, that’s exactly the kind of revelation that could end up being one of those fortuitous events that easing tensions. Obama’s planned “Russian Reset” that was snuffed out by the Snowden Affair may not be exactly repeatable at this point given the situation in Ukraine and annexation of Crimea, but that doesn’t mean a “reset” of sorts still can’t happen at the end of Obama’s last term. Few things are as sobering and likely to induce peaceful overtures than an exposed plot to pit two nuclear powers against each other.
    It’s also worth keeping in that regardless of whether or not “Guccifer 2.0” is a state actor or someone else, there’s almost undoubtedly going to be a lot more random partisan hacks of this nature going forward. Especially if the YouGov poll highlighted by Wikileaks showing a surge in support for Wikileaks among Republicans, is accurate. If this tactic becomes popular and acceptable, hacking political groups is probably going to become a permanent political pastime. Especially if you can easily get away with framing the Russians or Chinese or any other foreign power with similar capabilities. Why wouldn’t it become widespread if that’s the case?

    So get ready for a lot more Democratic hacks and leaks (along with some laughable GOP hacks and leaks). And also get ready for some cyberwars and maybe real proxy wars if that’s how this play out. But don’t get ready for any meaningful consideration of the possibility that we’re getting duped into those wars by one of the many groups out there capable of mimicking a conspicuous Russian attack. And don’t get ready for any meaningful speculation as to what other forces in the world with elite hacking skills (like the pro-Trump faction of Anonymous or Wikileaks) would love to see a ratcheting of tensions between the US and Russia. That’s clearly not going to happen. Clearly and conspicuously.

    Posted by Pterrafractyl | August 13, 2016, 5:11 pm
  2. I’ve confronted Wiki leaks directly about Assange’s support for the far-right and how that’s glossed over by progressive (controlled) left media and I received a very confused almost MK ULTRA like non sense reply from them (Assange himself? ) on Twitter.

    Could be an early “gene editing” experiment? Was this a function of the cult? Was this part of his symbolic/ritual importance to the larger stage.

    Posted by DICKERSON | August 13, 2016, 9:24 pm
  3. Bill Maher asked Assange “Why don’t you hack into Donald Trump’s tax returns?” With an insipid disingenuous smile he replied ‘We’re working on it.”
    BS!! Wikileaks later tweated “Wikileaks isn’t working on
    hacking Trump’s tax returns. Claim is a joke from a comedy show.” The joke here is Assange himself. The Ecuadorian embassy should throw the bum out.

    Posted by Dennis | August 15, 2016, 6:01 pm
  4. Mark Ames penned a great critique entitled “The Gary Johnson Swindle and the Degradation of Third Party Politics” in nsfwcorp Nov. 6 2012. In it we learned “The first interesting thing about Gary Johnson is that he decided to set up his campaign headquarters in Salt Lake City Utah, just a few blocks away from the HQ of the Church of Latter Day Saints. That’s where Gary Johnson’s main Super PAC is located as well. Gary Johnson isn’t Mormon.” I would add neither is Ron Paul. Ames continued “Johnson’s actual record as governor of New Mexico was that of a law and order authoritarian…stiffening prison sentences
    (while recklessly privatizing the prisons), along with a broader program of slashing taxes, slashing social programs and privatizing schools. He was divisive and his law and order policies led to some of the worst prison violence in decades.” He contracted Wackenhut to run the prisons and that scuzzy outfit made campaign contributions. The story gets worse as Johnson’s campaign utilized the services of far right dirty tricks specialists Jim Lacy, Maureen Otis AND – you guessed it that old dirty swinging’ dandy himself – ROGER STONE! Since this article was published the ‘business minded” Johnson stepped down as CEO of Cannabis Sativa a marijuana company. Don’t know if he sold weed to welfare recipients only to have them submit to drug tests, then kick them off the dole and lock ’em up. Maybe Johnson, Assange, Paul and the aptly-named Stone can pass the bong around while chortling over how well the Friedman Chicago economic model worked in fellow traveller Pinochet’s Chile. Coming soon to an election near you.

    Posted by Dennis | August 15, 2016, 8:12 pm
  5. @Dennis–

    Citizen Greenwald is a big fan of Gary Johnson as well:

    http://www.out.com/news-commentary/2011/04/18/glenn-greenwald-life-beyond-borders

    Best,

    Dave

    Posted by Dave Emory | August 16, 2016, 9:56 pm
  6. The high-profile hack attacks of 2016 heated up again this week. So who was the latest victim? Well, believe it or not, the NSA:

    The Wall Street Journal

    Group Claims to Have U.S. Government Hacking Tools for Sale
    Security experts doubt previously unknown hackers have access to NSA-linked cyberweapons

    By Robert McMillan
    Updated Aug. 15, 2016 10:28 p.m. ET

    A previously unknown hacking group claims to have broken into a cyberespionage organization linked to the National Security Agency and is offering to sell what it says are U.S. government hacking tools.

    The group, calling itself the “Shadow Brokers,” said in an internet post on Saturday that it had access to a “full state sponsor tool set” of cyberweapons. To back up its claims, the group posted what appears to be attack code that targets security software on routers that direct computer traffic around the internet.

    In a post written in broken English, the Shadow Brokers offered to sell a complete trove of tools to the highest bidder. The group said if it is paid one million bitcoin, valued at roughly $568 million, it will release the tools publicly.

    Security experts doubt the group has access to the hacking treasure trove that it boasts, but several said the code it released appears to be legitimate. It affects routers built by three U.S. firms— Cisco Systems Inc., Juniper Networks Inc. and Fortinet Inc.—and two Chinese companies—Shaanxi Networkcloud Information Technology Co. and Beijing Topsec Network Security Technology Co.

    A Cisco spokeswoman said her company was investigating the incident, but “so far, we have not found any new vulnerabilities.”

    A Fortinet representative didn’t have a comment. Juniper, Topsec and Shaanxi Networkcloud didn’t immediately respond to requests for comment.

    The Shadow Brokers’ claims are still being analyzed by security experts. If true, they would reflect an unprecedented breach of a computer-espionage outfit dubbed the “Equation Group.”

    In a report last year, Russian computer security firm Kaspersky Lab ZAO said the Equation Group launched hacking efforts against governments, telecommunications companies and other organizations in countries such as Russia, Iraq and Iran. Kaspersky didn’t name any U.S. agencies in its report, but it appeared to detail the kind of work typically conducted by the NSA.

    The NSA didn’t return messages seeking comment. In the past, the agency has neither confirmed nor denied involvement with the Equation Group.

    In an internet post, the Shadow Brokers rail against “wealthy elites.” The Shadow Brokers didn’t respond to email and Twitter messages seeking comment.

    Security experts who have examined the code published by the hackers said it appears to contain genuine NSA programs that could manipulate or redirect computer traffic as it passes through a router.

    “The more we look at it…it looks more and more like a tool kit from the NSA,” said Matt Suiche, the founder of Comae Technologies FZE, a computer-security startup based in the United Arab Emirates.

    “It looks genuine,” said Nicholas Weaver, a researcher with the International Computer Science Institute, a nonprofit research center affiliated with the University of California, Berkeley. Mr. Weaver said that, in addition to the router-attack programs, the code includes tools that would be available only to someone with access to NSA computers and tools that appear to interact with NSA software described in documents leaked by former NSA contractor Edward Snowden.

    However, security experts questioned the ransom demand, saying it was unlikely anyone would pay millions for the promised tools, sight unseen. Mr. Weaver believes the bitcoin auction scheme was most likely a distraction to obscure whoever obtained the documents.

    “Whoever stole the data wants the world to know that they stole it,” he said in an email message. “The suspect list is almost certainly short—Russia or China, and given the recent espionage troubles between the U.S. and Russia, probably the former.”

    Ben Johnson, co-founder of Carbon Black Inc. and a former NSA computer scientist, cautioned that the Equation Group hasn’t been definitively linked to the NSA and that it is unclear how much data was taken.

    “People should not be thinking that the NSA has been hacked,” he said. “Certainly there’s been some effort put into [the Shadow Brokers’ data], but I’m by no means convinced that this is a full toolset of a nation state.”

    “In a post written in broken English, the Shadow Brokers offered to sell a complete trove of tools to the highest bidder. The group said if it is paid one million bitcoin, valued at roughly $568 million, it will release the tools publicly.”

    So, once again, we have a high profile hack targeting the US government, although in this case it’s not the DNC, which would presumably be a fairly easy target for elite hackers, but instead an organization that one assumes is the most unhackable in the world. If it’s a real hack, that’s pretty impressive.

    At the same time, as with the DNC email hacks, this latest hack is both conspicuously high profile and appears to involve conspicuously atypical hacking behaviors. For instance, as the article below points out, the phenomena of hackers selling exploits they discover is quite commonplace. What isn’t commonplace is offering to sell the exploit to the entire world with an absurdly high price tag. Half a billion dollars for an alleged NSA toolkit trove that will be publicly released doesn’t exactly leave you with a huge market of potential buyers unless you’re trying to convince the bitcoin community to crowdsource the whole Bitcoin community, especially since the price of bitcoins would probably skyrocket if some nation or private entity suddenly decided to purchase a million bitcoins (the Bitcoin community probably wouldn’t mind if this happened). And if some government or private entity did try to acquire a million bitcoins, it would be awfully hard to buy those million bitcoins without someone discovering your identity. It’s one of the many reasons to assume that the offer to sell the toolkit to the highest bidder isn’t really about finding a buyer but instead about just getting publicity for the hack.

    Another reason to assume the million bitcoin price is just a theatrics is the fact that Wikileaks announced they’re going to be releasing the entire alleged NSA toolkit. So the hackers asking for half a billion dollars also apparently decided to give their toolkit to Wikileaks so it could leak it to the world for free. That’s a bit odd.

    Still, the notion that there’s a group out there hacking NSA servers should raise some eyebrows whether it’s the Russians like everyone is assuming (and the hackers clearly want us to assume) or some other group. So it’s worth noting that, as the article below points out, a number of researchers looking over the hack are raising the possibility that the server wasn’t hacked at all. Instead, it could have been a case of classic espionage. Someone with a USB stick. It’s also worth noting that Edward Snowden, someone who knows how easy it is to steal from the NSA with a USB stick, is declaring that Russia is likely behind it:

    Business Insider Nordic

    Here’s why the supposed NSA ‘hack’ is unlike anything we’ve ever seen before

    Paul Szoldra
    16 Aug 2016 11:58 PM

    Earlier this week, a group calling itself the “Shadow Brokers” announced that it was selling a number of cyber weapons – auction-style – that it claimed were hacked and stolen from an alleged NSA hacking group dubbed “The Equation Group.”

    Beside the fact that the National Security Agency getting hacked is eyebrow-raising in itself, the leak of the data and the claim from this mystery group that it’s just trying to make money doesn’t seem to add up.

    Here’s why.
    Their claim to have ‘hacked’ a server belonging to the NSA is fishy

    According to ex-NSA insiders who spoke with Business Insider, the agency’s hackers don’t just put their exploits and toolkits online where they can potentially be pilfered. The more likely scenario for where the data came from, says ex-NSA research scientist Dave Aitel, is an insider who downloaded it onto a USB stick.

    Instead of a “hack,” Aitel believes, it’s much more likely that this was a more classic spy operation that involved human intelligence.

    “This idea that a group of unknown hackers are going to take on the NSA seems unlikely as well,” Aitel told Business Insider. “There’s a long arm and a long memory to the US intelligence community, and I don’t think anyone wants to be on the other end of that without good reason. I don’t necessarily think a million bitcoin is a good-enough reason.”

    When hackers gain access to a server, they keep quiet about it so they can stay there

    One of the many strange things about this incident is the very public nature of what transpired. When a hacker takes over your computer, they don’t start activating your webcam or running weird programs because you’d figure out pretty quickly that something was up and you’d try to get rid of them.

    The same is true for the NSA.

    If the Shadow Brokers owned the NSA’s command and control server, then it would probably be a much better approach to just sit back, watch, and try to pivot to other interesting things that they might be able to find.

    Instead, the group wrote on Pastebin, a website where you can store text, that “we follow Equation Group traffic. We find Equation Group source range. We hack Equation Group. We find many many Equation Group cyber weapons,” which immediately signals to this alleged NSA hacker group that they have a big problem.

    Though this seems problematic, it’s probable that the group no longer has access to the server, so it no longer cares about getting back on it. Since the files are years old, this could be the case. But it’s still out of the ordinary since any claim like this can be later investigated by the victim, which will be going through everything trying to figure out who they are.

    If this was some random hacking group, then it would’ve been better to keep their mouth shut, especially when their victim is the NSA.

    People sell exploits all the time, but they hardly ever talk about it

    Software exploits are digital gold for hackers, since they often give a key inside a system or network that no one has ever noticed before, and thus, hasn’t fixed. Which is why the marketplace for these “zero-day” exploits is so lucrative. We’re talking hundreds of thousands to millions of dollars for this kind of code.

    Most of the time, an exploit is either found by a security research firm, which then writes about it and reports it to the company so it can fix the problem. Or, a hacker looking for cash will take that found exploit and sell it on the black market.

    So it would make sense for a group like Shadow Brokers to want to sell their treasure trove, but going public with it is beyond strange.

    “From my perspective, its extremely bizarre behavior,” an ex-NSA hacker who spoke on condition of anonymity told Business Insider. “Most groups who either identify or trade in exploits do one of two things. If you identify, like a security research firm [does] … they’ll typically publish their findings. They’re really in the best interest of the companies and users who use these products.”

    The source added: “In the other scenarios, folks who sort of deal in the exploit markets. They quietly sell these things. To come out with this public auction is the more bizarre variance of that that I’ve ever seen. So it’s not clear what the intent here is.”

    So what is the intent?

    If you ask ex-NSA contractor Edward Snowden, the public leak and claims of the Shadow Brokers seem to have Russian fingerprints all over them, and it serves as a warning from Moscow to Washington. The message: If your policymakers keep blaming us for the DNC hack, then we can use this hack to implicate you in much more.

    “That could have significant foreign policy consequences,” Snowden wrote on Twitter. “Particularly if any of those operations targeted US allies. Particularly if any of those operations targeted elections.”

    Aitel seems to agree, though he criticized Snowden as being, at some level, a “voice piece” for Russian intelligence now, since he lives in asylum in Moscow.

    “He has the same theory – the DNC hack happened. The US political people got upset. They probably made the NSA do a covert response,” Aitel speculated. “This is another response to the NSA’s covert response. There’s a lot of sort of very public messages here going back and forth, which is interesting to look at.”

    Aitel also doesn’t think that anyone is going to actually pony up the money required to win the auction. And that prediction is probably going to be right, since WikiLeaks claims that it already has the archive.

    “We had already obtained the archive of NSA cyber weapons released earlier today,” its official Twitter account wrote, “and will release our own pristine copy in due course.”

    “If you ask ex-NSA contractor Edward Snowden, the public leak and claims of the Shadow Brokers seem to have Russian fingerprints all over them, and it serves as a warning from Moscow to Washington. The message: If your policymakers keep blaming us for the DNC hack, then we can use this hack to implicate you in much more.

    That’s Snowden’s take: this is all part of a Russian messaging/propaganda war. And who knows, maybe that’s that case and the explanation for the conspicuous hacking behavior that consistently seems to be trying to finger Russian government hackers as the culprits. It’s possible. But when you consider suspicions that this could have been an inside job, someone with a USB sticks it’s also worth keeping in mind that if there was someone associated with Russia’s intelligence community that would have been very well positioned to pull off such a spy operation, it’s Edward Snowden. Especially since the latest files released in the hack are from the same year Snowden fled to Russia:

    National Public Radio

    ‘Shadow Brokers’ Claim To Have Hacked The NSA’s Hackers

    August 17, 2016 2:36 PM ET

    The “Shadow Brokers” are in the spotlight.

    The mysterious group has seized the attention of the cybersecurity world with its claim to have stolen code from the Equation Group — a team of hackers who have been tied to the National Security Agency.

    On a website written in broken English, the Shadow Brokers revealed some files and promised “better” ones available, for sale to the highest bidder. One caveat: By “bidding,” they mean sending bitcoins, and losing bidders don’t get them back. (“Sorry lose bidding war lose bitcoin and files. Lose Lose. Bid to win!”)

    The group also said it would make a new batch of files public if it received 1 million bitcoins to a specified address. That’s more than half a billion dollars, and nearly 1/15th of all the bitcoins in circulation.

    As of Wednesday afternoon, the Shadow Brokers appear to have received 1.6 bitcoins, or less than $1,000, based on the public ledger showing funds sent to that bitcoin address.

    The auction is “absurd” and “weird,” as Wired puts it, but the magazine notes that there’s a “growing consensus” that the files themselves — at least the ones released so far — are legitimate.

    Matt Suiche, a security researcher who analyzed the code that has been publicly released by the Shadow Brokers, tells NPR’s Aarti Shahani that it does appear to be a compilation of tools used by the NSA.

    But the “teaser” files don’t include any very valuable information, he says — and the question now is whether the hackers actually have more files.

    “The sample files … are complete, but they are not extremely significant enough to shut down the Internet,” Suiche told Aarti. “If that would be the best of what they had, it would be disappointing. It’s like Pokémon Go. You hear the hype, it’s interesting. Then you pay for more — but you get bored.”

    Other experts say they, too, believe the files contain actual NSA code.

    The Washington Post reports that the hacking tools released in the teaser file — with names such as Epicbanana, Buzzdirection and Egregiousblunder — are highly sophisticated.

    “The file contained 300 megabytes of information, including several ‘exploits,’ or tools for taking control of firewalls in order to control a network, and a number of implants that might, for instance, exfiltrate or modify information.

    “The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used ‘in the largest and most critical commercial, educational and government agencies around the world,’ said Blake Darche, another former TAO operator and now head of security research at Area 1 Security.”

    (TAO stands for Tailored Access Operations, the NSA’s hacking division, the newspaper explains.)

    The New York Times writes that the NSA could have used the code to “get inside the computer systems of competitors like Russia, China and Iran,” with the exploits, and “lurk unseen for years” with the implants.

    “Whoever obtained the source code apparently broke into either the top-secret, highly compartmentalized computer servers of the N.S.A. or other servers around the world that the agency would have used to store the files,” the Times writes.

    The code released by the Shadow Brokers dates most recently to 2013, the same year Edward Snowden leaked classified information about the NSA’s surveillance programs.

    Via Twitter, Snowden commented on the apparent hack, saying the most notable thing wasn’t that NSA servers were breached but that the hack has now been publicized.

    “Why did they do it?” Snowden asked. “No one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the DNC hack.”

    The hackers could be advertising that they have the ability to identify actions the NSA took on the compromised server, Snowden suggests — a warning of sorts.

    Snowden also noted that the released files end in 2013. “When I came forward, NSA would have migrated offensive operations to new servers as a precaution,” he suggested — a move that would have cut off the hackers’ access to the server.

    “You’re welcome,” he tweeted.

    “Snowden also noted that the released files end in 2013. “When I came forward, NSA would have migrated offensive operations to new servers as a precaution,” he suggested — a move that would have cut off the hackers’ access to the server.

    “You’re welcome,” he tweeted.”

    Well, that’s one possible explanation for why the hacked material is no newer than 2013: the hackers presumably lost access to their hacked server after the Snowden affair forced the NSA to move their offensive operations to different servers. But that explanation also assumes this server was actually remotely hacked, as opposed to a USB-stick classic spy operation.

    And that raises a really big question that could potentially be answered although it’s unclear who could answer it: were these tools part of the giant Snowden “Doomsday” cache of technical documents? The documents that Glenn Greenwald threatened would be released if anything happened to Snowden and that Greenwald described as the NSA “blueprints”? There were apparently only three unknown people how had the keys to Snowden’s Doomsday cache, although the NSA itself presumably has a good idea of what Snowden took so it will be interesting to see if this latest leak is really an extension of the Snowden leak.

    Thanks Eddy?

    Posted by Pterrafractyl | August 17, 2016, 6:37 pm
  7. @Pterrafractyl–

    This is not to blow my own horn, but my characterization of Eddie the Friendly Spook as “The Obverse Oswald” is looking more and more prescient.

    These high-profile hacks designed, obviously, to finger Russia do NOT appear to be of Russian intel origin at all.

    And with the Peach Fuzz Fascist (Snowden) weighing in that, sho ’nuff, this must be Russia, he is looking more and more like a culprit.

    This is REALLY looking like the relatively clumsy “painting of Oswald Red.”

    ” . . . . On a website written in broken English, the Shadow Brokers revealed some files and promised “better” ones available, for sale to the highest bidder. One caveat: By “bidding,” they mean sending bitcoins, and losing bidders don’t get them back. (“Sorry lose bidding war lose bitcoin and files. Lose Lose. Bid to win!”) . . . ”

    Sounds like Boris and Natasha, Dahlink!

    Not too convincing.

    Best,

    Dave

    Posted by Dave Emory | August 17, 2016, 8:58 pm
  8. @Dave: One of the things worth noting regarding the cui bono angle behind the NSA hack/theft is that, as the second article below makes clear, the emerging meme in response to the hack is that this is why the NSA should immediately disclose all exploits it finds for the purpose of greater security, which was one of the core arguments behind pushed by Snowden and the cypherpunk community in the wake of the Snowden affair. Of course, most of those warnings were predicated on assumption that random hacker would discover these same vulnerabilities independently (and not that the NSA would itself get hacked or hit with a Snowden-like inside job), but that’s been the argument. And this hack is certainly poised to push that meme that the NSA makes us all less secure, a meme that assumes there’s minimal value or security gained from what spy agencies spying on, say, other governments or criminal organizations.

    Cui bono? The cypherpunks definitely did in this case. Whether or not society in general benefits sort of depends on how much abuse take place with that hacking code now that it’s released to the world and the lag time associated with developing and installing patches on all that hardware (and also whether or not there was actually some important surveillance taking place using those exploits that are going to be closed).

    And since it’s widely assumed that Russia is behind the hack, it’s also worth noting that Cisco, one of the three brands of hardware targeted by the released toolkit, was actually charged with going around American sanctions against Russia to sell Russia’s military and the FSB its networking hardware (which is presumably now hackable) last year:

    Network World

    Cisco bypassed Russia sanctions to continue sales: report
    Set up ghost buyers and falsified records to sell to Russian army and security organizations

    By Jim Duffy

    May 21, 2015 10:12 AM PT

    Cisco reportedly skirted sanctions in order to sell networking equipment to Russia’s military.

    In an investigative piece published this week, Buzzfeed alleges Cisco knowingly sold gear through straw companies fronting for Russian government and military institutions in violation of American sanctions. Cisco denies any wrongdoing and any knowledge of the scheme, allegedly perpetrated by its Russian operations, according to Buzzfeed.

    Cisco says some of the bogus customer names were errors, Buzzfeed reports.

    Cisco’s business in Russia is already under scrutiny for possibly violating the U.S. Foreign Corrupt Practices Act.

    Citing internal documents and inside sources, Buzzfeed says Cisco altered sales records and booked deals under false customer names on order to continue sales to Russian military and security forces. Cisco succeeded in selling equipment to Russia’s FSB – the successor to the KGB – by disguising them as sales to the Russian Chamber of Commerce and Industry of the Russian Federation.

    The Chamber of Commerce was used as a “ghost buyer” for sales to banned federal agencies, Buzzfeed reports, but the chamber itself claimed it never bought anything other than office supplies for its own use.

    Citing internal company records, Buzzfeed says Cisco booked at least seven deals over six months to sell a total of more than $500,000 worth of equipment such as routers, switches, and servers to the chamber.

    In other cases, employees changed the name of the customer from the Ministry of Defense or the Russian space agency to a company in order to disguise the true buyer, Buzzfeed reports.

    Cisco has come under fire in the past for sales to governments with strained relations with the U.S. and with its own people.

    “Citing internal documents and inside sources, Buzzfeed says Cisco altered sales records and booked deals under false customer names on order to continue sales to Russian military and security forces. Cisco succeeded in selling equipment to Russia’s FSB – the successor to the KGB – by disguising them as sales to the Russian Chamber of Commerce and Industry of the Russian Federation.”

    So if we suddenly get reports that Russia has recently purged or independently patched its military and intelligence IT infrastructure, or that those Cisco routers were never actually used, that would certainly suggest Russia knew this release, which is going to impact critical systems around the globe, was coming soon. But so far it doesn’t look like the Russian government was super concerned about Cisco vulnerabilities last year.

    Here’s something else to keep an eye on regarding when the hack actually took place and the possibility that this stolen code could have been part of the larger Snowden Doomsday file: Based on the time stamps of the files currently made available, it would appear that the hack/theft took place after the Snowden affair because the “FileModifyDate” value of publicly available files are are mostly on June 11, 2013, with one as late as October 18th, 2013:

    Washington Post

    NSA’s use of software flaws to hack foreign targets posed risks to cybersecurity

    By Ellen Nakashima and Andrea Peterson
    August 17 at 7:23 PM

    To penetrate the computers of foreign targets, the National Security Agency relies on software flaws that have gone undetected in the pipes of the Internet. For years, security experts have pressed the agency to disclose these bugs so they can be fixed, but the agency hackers have often been reluctant.

    Now with the mysterious release of a cache of NSA hacking tools over the weekend, the agency has lost an offensive advantage, experts say, and potentially placed at risk the security of countless large companies and government agencies worldwide.

    Several of the tools exploited flaws in commercial firewalls that remain unpatched, and they are out on the Internet for all to see. Anyone from a basement hacker to a sophisticated foreign spy agency has access to them now, and until the flaws are fixed, many computer systems may be in jeopardy.

    The revelation of the NSA cache, which dates to 2013 and has not been confirmed by the agency, also highlights the administration’s little-known process for figuring out which software errors to disclose and which to keep secret.

    The hacker tools’ release “demonstrates the key risk of the U.S. government stockpiling computer vulnerabilities for its own use: Someone else might get a hold of them and use them against us,” said Kevin Bankston, director of New America’s Open Technology Institute.

    “This is exactly why it should be U.S. government policy to disclose to software vendors the vulnerabilities it buys or discovers as soon as possible, so we can all better protect our own cybersecurity.”

    The weekend’s release prompted immediate speculation about who might be behind it. A group calling itself Shadow Brokers claimed responsibility. Some experts and former employees suspect, although without hard evidence, that Russia is involved. Other former employees say it is more likely a disgruntled insider seeking to make a profit.

    Whoever it is, “it’s very concerning that potentially someone working for another government is essentially holding hostage companies that are sitting behind these [firewalls], making them very vulnerable,” said Oren Falkowitz, chief executive of Area 1 Security and a former NSA analyst.

    The firewalls sold by Cisco, Juniper and Fortinet are highly popular and work on large-scale enterprise systems. “These are very, very powerful and successful” products, Falkowitz said. “They aren’t devices bought by two people.”

    Already, the firms are racing to reverse-engineer the code, identify any flaws and devise patches. Cisco confirmed Wednesday that one of the flaws was a “zero-day” — previously unknown to the public — and that it is working on a fix. The flaw was in a tool or exploit code-named Extrabacon.

    Experts studying the release say the material probably was stolen in October 2013, the date of the last file creation. If that’s true, then someone or another spy agency has had time to hack companies using the vulnerable firewalls or watch NSA’s own cyber spying.

    Past NSA employees, including former contractor Edward Snowden, say it is unlikely that the material was hacked from the agency’s servers. It is more likely, some say, that the tools were uploaded and inadvertently left by a TAO hacker on a server used to stage hacks on targets. These servers are sometimes called redirectors or staging servers, and they mask the hacker’s true location.

    The NSA has always had audit controls on its systems. But particularly in the wake of leaks of classified material by Snowden that began appearing in the media in June 2013, the agency has strengthened its control mechanisms.

    Experts studying the release say the material probably was stolen in October 2013, the date of the last file creation. If that’s true, then someone or another spy agency has had time to hack companies using the vulnerable firewalls or watch NSA’s own cyber spying.”

    Well, that settles it. The hack/theft must have happend post-Snowden. Except, of course, for the fact that there was absolutely nothing preventing the “Shadow Brokers” from modifying those timestamps. Sure, it’s very possible that the timestamps on the publicly available uploaded files are indeed accurate and a reasonable measure of when this hack took place. But since it’s also very possible that those timestamps have been modified because there’s absolutely nothing preventing that and it would be an untraceable modification, it seems like we should be reading something like “Experts studying the release say the material probably was stolen in October 2013, the date of the last file creation, assuming the files have not been modified in any way which is a silly assumption at this point in time.” It’s kind of like basing an investigation solely on asking the suspect questions and just assuming everything they say is true.

    Again, it’s not like it’s impossible that these timestamps are accurate. But if that’s the only evidence, that’s not really evidence. Or at least it’s barely evidence. So it will be interesting to see if any additional evidence of the actual date of this hack/theft emerges after WikiLeaks released its “pristine” set of the full archives of super NSA hacking tools. It’s “pristine” archive which, of course, could be totally modified without anyone else knowing it.

    Posted by Pterrafractyl | August 18, 2016, 8:30 pm
  9. James Bamford weighed in on the release of the NSA’s “Tailored Access Operations” (TAO) super hacking tools by the allegedly Russian “Shadow Brokers”. Bamford’s conclusion? It was most likely another Snowden-like inside job, but Bamford doesn’t think the source of this leak was Snowden or someone with access to the full Snowden cache. Bamford actually traveled to Russia, interviewed Snowden, and got to examine and search what Snowden claimed was the full cache and didn’t see anything indicating TAO hacking tools (although who knows if what he saw was the full “dead-man’s switch” Doomsday cache).

    No, the person Bamford has in mind in none other than Jacob Appelbaum, the Berlin-based hackivist/Tor developer (ex-Tor developer)/Wikileaks hacker/avowed enemy of Hillary Clinton. Why Appelbaum? Well, because when Jacob Appelbaum gave his big speech in December 2013 at the Chaos Communications Congress and wrote a bunch of Der Spiegel articles describing an array of of NSA TAO hacking tools, everyone assumed he was grabbing that info from the Snowden cache. But Bamford never saw those tools when he examined the cache and there was never an explanation of where Appelbaum got that TAO data.

    So are Appelbaum, or possibly Appelbaum’s unidentified NSA inside source, the real “Shadow Brokers”? That’s what Bamford appears to suspect:

    Reuters

    Commentary: Evidence points to another Snowden at the NSA

    By James Bamford
    Mon Aug 22, 2016 4:42pm EDT

    In the summer of 1972, state-of-the-art campaign spying consisted of amateur burglars, armed with duct tape and microphones, penetrating the headquarters of the Democratic National Committee. Today, amateur burglars have been replaced by cyberspies, who penetrated the DNC armed with computers and sophisticated hacking tools.

    Where the Watergate burglars came away empty-handed and in handcuffs, the modern- day cyber thieves walked away with tens of thousands of sensitive political documents and are still unidentified.

    Now, in the latest twist, hacking tools themselves, likely stolen from the National Security Agency, are on the digital auction block. Once again, the usual suspects start with Russia – though there seems little evidence backing up the accusation.

    In addition, if Russia had stolen the hacking tools, it would be senseless to publicize the theft, let alone put them up for sale. It would be like a safecracker stealing the combination to a bank vault and putting it on Facebook. Once revealed, companies and governments would patch their firewalls, just as the bank would change its combination.

    A more logical explanation could also be insider theft. If that’s the case, it’s one more reason to question the usefulness of an agency that secretly collects private information on millions of Americans but can’t keep its most valuable data from being stolen, or as it appears in this case, being used against us.

    In what appeared more like a Saturday Night Live skit than an act of cybercrime, a group calling itself the Shadow Brokers put up for bid on the Internet what it called a “full state-sponsored toolset” of “cyberweapons.” “!!! Attention government sponsors of cyberwarfare and those who profit from it !!!! How much would you pay for enemies cyberweapons?” said the announcement.

    The group said it was releasing some NSA files for “free” and promised “better” ones to the highest bidder. However, those with loosing bids “Lose Lose,” it said, because they would not receive their money back. And should the total sum of the bids, in bitcoins, reach the equivalent of half a billion dollars, the group would make the whole lot public.

    While the “auction” seemed tongue in cheek, more like hacktivists than Russian high command, the sample documents were almost certainly real. The draft of a top-secret NSA manual for implanting offensive malware, released by Edward Snowden, contains code for a program codenamed SECONDDATE. That same 16-character string of numbers and characters is in the code released by the Shadow Brokers. The details from the manual were first released by The Intercept last Friday.

    The authenticity of the NSA hacking tools were also confirmed by several ex-NSA officials who spoke to the media, including former members of the agency’s Tailored Access Operations (TAO) unit, the home of hacking specialists.

    “Without a doubt, they’re the keys to the kingdom,” one former TAO employee told the Washington Post. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.” Another added, “From what I saw, there was no doubt in my mind that it was legitimate.”

    Like a bank robber’s tool kit for breaking into a vault, cyber exploitation tools, with codenames like EPICBANANA and BUZZDIRECTION, are designed to break into computer systems and networks. Just as the bank robber hopes to find a crack in the vault that has never been discovered, hackers search for digital cracks, or “exploits,” in computer programs like Windows.

    The most valuable are “zero day” exploits, meaning there have been zero days since Windows has discovered the “crack” in their programs. Through this crack, the hacker would be able to get into a system and exploit it, by stealing information, until the breach is eventually discovered and patched. According to the former NSA officials who viewed the Shadow Broker files, they contained a number of exploits, including zero-day exploits that the NSA often pays thousands of dollars for to private hacking groups.

    .=The reasons given for laying the blame on Russia appear less convincing, however. “This is probably some Russian mind game, down to the bogus accent,” James A. Lewis, a computer expert at the Center for Strategic and International Studies, a Washington think tank, told the New York Times. Why the Russians would engage in such a mind game, he never explained.

    Rather than the NSA hacking tools being snatched as a result of a sophisticated cyber operation by Russia or some other nation, it seems more likely that an employee stole them. Experts who have analyzed the files suspect that they date to October 2013, five months after Edward Snowden left his contractor position with the NSA and fled to Hong Kong carrying flash drives containing hundreds of thousands of pages of NSA documents.

    So, if Snowden could not have stolen the hacking tools, there are indications that after he departed in May 2013, someone else did, possibly someone assigned to the agency’s highly sensitive Tailored Access Operations.

    In December 2013, another highly secret NSA document quietly became public. It was a top secret TAO catalog of NSA hacking tools. Known as the Advanced Network Technology (ANT) catalog, it consisted of 50 pages of extensive pictures, diagrams and descriptions of tools for every kind of hack, mostly targeted at devices manufactured by U.S. companies, including Apple, Cisco, Dell and many others.

    Like the hacking tools, the catalog used similar codenames. Among the tools targeting Apple was one codenamed DROPOUTJEEP, which gives NSA total control of iPhones. “A software implant for the Apple iPhone,” says the ANT catalog, “includes the ability to remotely push/pull files from the device. SMS retrieval, contact-list retrieval, voicemail, geolocation, hot mic, camera capture, cell-tower location, etc.”

    Another, codenamed IRATEMONK, is, “Technology that can infiltrate the firmware of hard drives manufactured by Maxtor, Samsung, Seagate and Western Digital.”

    In 2014, I spent three days in Moscow with Snowden for a magazine assignment and a PBS documentary. During our on-the-record conversations, he would not talk about the ANT catalog, perhaps not wanting to bring attention to another possible NSA whistleblower.

    I was, however, given unrestricted access to his cache of documents. These included both the entire British, or GCHQ, files and the entire NSA files.

    But going through this archive using a sophisticated digital search tool, I could not find a single reference to the ANT catalog. This confirmed for me that it had likely been released by a second leaker. And if that person could have downloaded and removed the catalog of hacking tools, it’s also likely he or she could have also downloaded and removed the digital tools now being leaked.

    In fact, a number of the same hacking implants and tools released by the Shadow Brokers are also in the ANT catalog, including those with codenames BANANAGLEE and JETPLOW. These can be used to create “a persistent back-door capability” into widely used Cisco firewalls, says the catalog.

    Consisting of about 300 megabytes of code, the tools could easily and quickly be transferred to a flash drive. But unlike the catalog, the tools themselves – thousands of ones and zeros – would have been useless if leaked to a publication. This could be one reason why they have not emerged until now.

    Enter WikiLeaks. Just two days after the first Shadow Brokers message, Julian Assange, the founder of WikiLeaks, sent out a Twitter message. “We had already obtained the archive of NSA cyberweapons released earlier today,” Assange wrote, “and will release our own pristine copy in due course.”

    The month before, Assange was responsible for releasing the tens of thousands of hacked DNC emails that led to the resignation of the four top committee officials.

    There also seems to be a link between Assange and the leaker who stole the ANT catalog, and the possible hacking tools. Among Assange’s close associates is Jacob Appelbaum, a celebrated hacktivist and the only publicly known WikiLeaks staffer in the United States – until he moved to Berlin in 2013 in what he called a “political exile” because of what he said was repeated harassment by U.S. law enforcement personnel. In 2010, a Rolling Stone magazine profile labeled him “the most dangerous man in cyberspace.”

    In December 2013, Appelbaum was the first person to reveal the existence of the ANT catalog, at a conference in Berlin, without identifying the source. That same month he said he suspected the U.S. government of breaking into his Berlin apartment. He also co-wrote an article about the catalog in Der Spiegel. But again, he never named a source, which led many to assume, mistakenly, that it was Snowden.

    In addition to WikiLeaks, for years Appelbaum worked for Tor, an organization focused on providing its customers anonymity on the Internet. But last May, he stepped down as a result of “serious, public allegations of sexual mistreatment” made by unnamed victims, according to a statement put out by Tor. Appelbaum has denied the charges.

    Shortly thereafter, he turned his attention to Hillary Clinton. At a screening of a documentary about Assange in Cannes, France, Appelbaum accused her of having a grudge against him and Assange, and that if she were elected president, she would make their lives difficult. “It’s a situation that will possibly get worse” if she is elected to the White House, he said, according to Yahoo News.

    It was only a few months later that Assange released the 20,000 DNC emails. Intelligence agencies have again pointed the finger at Russia for hacking into these emails.

    Yet there has been no explanation as to how Assange obtained them. He told NBC News, “There is no proof whatsoever” that he obtained the emails from Russian intelligence. Moscow has also denied involvement.

    There are, of course, many sophisticated hackers in Russia, some with close government ties and some without. And planting false and misleading indicators in messages is an old trick. Now Assange has promised to release many more emails before the election, while apparently ignoring email involving Trump. (Trump opposition research was also stolen.)

    In hacktivist style, and in what appears to be phony broken English, this new release of cyberweapons also seems to be targeting Clinton. It ends with a long and angry “final message” against “Wealthy Elites . . . breaking laws” but “Elites top friends announce, no law broken, no crime commit[ed]. . . Then Elites run for president. Why run for president when already control country like dictatorship?”

    Then after what they call the “fun Cyber Weapons Auction” comes the real message, a serious threat. “We want make sure Wealthy Elite recognizes the danger [of] cyberweapons. Let us spell out for Elites. Your wealth and control depends on electronic data.” Now, they warned, they have control of the NSA’s cyber hacking tools that can take that wealth away. “You see attacks on banks and SWIFT [a worldwide network for financial services] in news. If electronic data go bye-bye where leave Wealthy Elites? Maybe with dumb cattle?”

    “But going through this archive using a sophisticated digital search tool, I could not find a single reference to the ANT catalog. This confirmed for me that it had likely been released by a second leaker. And if that person could have downloaded and removed the catalog of hacking tools, it’s also likely he or she could have also downloaded and removed the digital tools now being leaked.

    That was Bamford’s impression after scouring Snowden’s cache in Russia: The ANT catalog of TAO hacking tools discussed by Jacob Appelbaum in 2013 must have come from a second Snowden leaker. And regardless of whether or not that theory is true or not, it’s hard to ignore the fact that the TAO tools Appelbaum publicly disclosed in 2013 are exactly the kind of tools the Shadow Brokers released. It’s also hard to ignore the fact that Appelbaum really, really hates Hillary Clinton:

    There also seems to be a link between Assange and the leaker who stole the ANT catalog, and the possible hacking tools. Among Assange’s close associates is Jacob Appelbaum, a celebrated hacktivist and the only publicly known WikiLeaks staffer in the United States – until he moved to Berlin in 2013 in what he called a “political exile” because of what he said was repeated harassment by U.S. law enforcement personnel. In 2010, a Rolling Stone magazine profile labeled him “the most dangerous man in cyberspace.”

    In December 2013, Appelbaum was the first person to reveal the existence of the ANT catalog, at a conference in Berlin, without identifying the source. That same month he said he suspected the U.S. government of breaking into his Berlin apartment. He also co-wrote an article about the catalog in Der Spiegel. But again, he never named a source, which led many to assume, mistakenly, that it was Snowden.

    In addition to WikiLeaks, for years Appelbaum worked for Tor, an organization focused on providing its customers anonymity on the Internet. But last May, he stepped down as a result of “serious, public allegations of sexual mistreatment” made by unnamed victims, according to a statement put out by Tor. Appelbaum has denied the charges.

    Shortly thereafter, he turned his attention to Hillary Clinton. At a screening of a documentary about Assange in Cannes, France, Appelbaum accused her of having a grudge against him and Assange, and that if she were elected president, she would make their lives difficult. “It’s a situation that will possibly get worse” if she is elected to the White House, he said, according to Yahoo News.

    Shortly thereafter, he turned his attention to Hillary Clinton. At a screening of a documentary about Assange in Cannes, France, Appelbaum accused her of having a grudge against him and Assange, and that if she were elected president, she would make their lives difficult. “It’s a situation that will possibly get worse” if she is elected to the White House, he said, according to Yahoo News.”

    Well, there’s certainly no shortage of circumstantial evidence pointing in the direction of Appelbaum. And while the following is rather weak additional evidence, since Appelbaum is currently living in Berlin it’s worth noting that the email address that appears to be used by the Shadow Brokers is a German email provider with a policy of cooperating with legal authorities as little as possible and only handing over encrypted data when given a court order:

    Forbes

    Edward Snowden: Russia Is Chief Suspect In NSA Hack

    Thomas Fox-Brewster, Forbes Staff
    Aug 16, 2016 @ 09:00 AM

    If there’s anyone who knows how and why anyone would hack the NSA, and can talk about it openly, it’s former contractor Edward Snowden. After all, the exile-in-Russia siphoned off masses of information from the intelligence agency before helping journalists publish the documents, which together have exposed mass surveillance by US and international snoops.

    Who are the Shadow Brokers?

    Very little is known about the Shadow Brokers. They used Github, Tumblr and Mega to disseminate their files. When they released the data on August 13, they used broken English to launch a Bitcoin auction for the remaining 40 per cent of data they hand’t released from their alleged Equation Group attack. For instance: “If you want know your networks hacked, you send bitcoin. If you want hack networks as like equation group, you send bitcoin. If you want reverse, write many words, make big name for self, get many customers, you send bitcoin. If want to know what we take, you send bitcoin.”

    Of the little information available, it’s clear the hackers used an email address belonging to Tutanota, a German provider focused on security, to upload the data to Github.

    Founder of Tutanota Matthias Pfau told FORBES the company had not been contacted by law enforcement regarding the alleged breach of the NSA. “If our accounts are misused … a German judge can force us to deliver the encrypted data,” Pfau said.

    He said Tutanota had only ever been forced to hand over encrypted data of its users a few times and it has a transparency report where it discloses those cases. “However, we release data only in very, very few cases … And when we have to provide the data due to a court order, it is still encrypted,” Pfau added, going on to explain the company’s stance on surveillance.

    “Fantasies of omnipotence and total surveillance are threatening our fundamental rights. That is not acceptable and that is why we stand up and fight for privacy.”

    “He said Tutanota had only ever been forced to hand over encrypted data of its users a few times and it has a transparency report where it discloses those cases. “However, we release data only in very, very few cases … And when we have to provide the data due to a court order, it is still encrypted,” Pfau added, going on to explain the company’s stance on surveillance.”

    Well, it will be interesting to see if there are any followup reports on German authorities asking for the encrypted account data. If they don’t that would be rather odd.

    Still, keep in mind that there’s nothing stopping someone from anywhere with an internet connection from using a Tutanota account, although Germany’s enhanced data-privacy laws for citizens would potentially make a German-based hacker more likely to stick with a domestic super-privacy email service. But the Tutanota data point is, at this point, really just an interesting side point that at least kind of hints at a Germany-based hacker.

    So is Jacob Appelbaum, or perhaps Appelbaum’s unidentified NSA source, the real Shadow Broker? Perhaps, but let’s not throw out the possibility that the leaked NSA hacking tools really were part of the Snowden doomsday cache (a cache that Bamford presumably never had full access to). Let’s especially not throw that possibility out since Edward Snowden sent out a cryptic tweet one week before the leak that could very easily be interpreted as a metaphorical push of the Dead Man’s Switch

    International Business Times

    Is Edward Snowden dead? Conspiracy theory claims whistleblower killed after cryptic tweet

    Rumours of his demise have been denied by confidante Glenn Greenwald.

    By Jason Murdock
    August 8, 2016 13:54 BST

    Exiled NSA whistleblower Edward Snowden sparked intrigue on 5 August after tweeting a 64-digit code to his two million-strong Twitter following, which conspiracy theorists quickly assumed meant he had met his untimely demise. The fears were sparked by a Russian news website called Sputnik, which reported the now-deleted tweet could have been a “dead man’s switch” – an insurance code set up to aid the release of another trove of documentation “if he did not check in to the computer at a certain time.”

    However, the rumours of his death or kidnapping have been denied by Snowden’s close confidante Glenn Greenwald, who replied to one concerned tweet with: “He’s fine.”

    In any case, since the posting Snowden’s own Twitter presence has been eerily muted.

    Previously, Snowden has indicated he has such an insurance tactic in place should something happen to him while he is living under asylum in Russia.

    In one report by Wired, published in 2013 after the initial NSA disclosures hit the headlines, Greenwald described the system in place. “It’s really just a way to protect himself against extremely rogue behaviour on the part of the United States, by which I mean violent actions toward him, designed to end his life, and it’s just a way to ensure that nobody feels incentivised to do that,” he said.

    In response to the code, which appears on the surface to be a form of hash, journalist Barton Gellman also took to social media to note the tweet had a “private meaning” and was not intended for the general audience. “Everyone requesting proof of life for me and @Snowden, take a deep breath. Some tweets have private meaning,” he wrote on 6 August.

    Based on this, it is likely the long code is a form of verification used to prove to a contact of Snowden that he is the legitimate sender or recipient of a communication. Using a direct mail to message, for example, would leave metadata, and therefore a record of the conversation taking place.

    Gellman, who is currently writing a book about the Edward Snowden leaks, was previously embroiled in another recent post that sparked controversy after the former NSA contractor mysteriously tweeted: “It’s time.”

    In light of this, the use of a so-called dead man’s switch was used to protect his wellbeing. Additionally, whistleblowing outfit WikiLeaks, which has released sensitive files from the US government, also uses the technique. Most recently, the group’s founder, Julian Assange, uploaded a fresh 88GB file to the internet – just prior to the leaks from the Democratic National Committee (DNC).

    “Gellman, who is currently writing a book about the Edward Snowden leaks, was previously embroiled in another recent post that sparked controversy after the former NSA contractor mysteriously tweeted: “It’s time.”

    Let’s see…so Snowden first cryptically tweets on August 3, “Did you work with me? Have we talked since 2013? Please recontact me securely, or talk to @bartongellman. It’s time. https://t.co/AKmgF5AIDJ

    And then he tweets a very long cryptographic key of some sort. Then he goes silent for a couple days and people start assuming he’s dead. And then a week later we get the Shadow Broker leak of NSA TAO hacking tools.

    So we have circumstantial evidence suggesting that the Shadow Brokers leak may be a consequence of Snowden hitting his switch along with circumstantial evidence that Appelbaum already had his hands on the kinds of NSA hacking tools that actually got leaked but those tools probably didn’t come from Snowden but a different, still unidentified, NSA leaker. Curiouser and curiouser…

    Posted by Pterrafractyl | August 23, 2016, 6:30 pm
  10. @Pterrafractyl–

    Applebaum? WikiLeaks? All part of what I have termed “Team Snowden” and that I fingered as the culprit for the high-profile leaks.

    Another of the “Conga-Line ‘Ops”” here, I suspect.

    Recall that Applebaum appears to have assisted Snowden’s flight from Hawaii to China. WikiLeaks and Sarah Harrison helped “The Obverse Oswald” get to Moscow.

    Although Snowden may not have been personally involved (and, who knows, he MAY have been), “Team Snowden” is coming into higher profile here all the time.

    The fact that Snowden weighed in that “Sho ‘Nuff, must be Russia” is approaching the territory of what legal analysts call “consciousness of guilt.”

    Don’t expect the world’s journalistic community to start fingering The Peachfuzz Fascist, however.

    They have already cast him as a saint and can’t do otherwise without making themselves look like clowns.

    Keep up the great work!

    Best,

    Dave

    Posted by Dave Emory | August 23, 2016, 9:23 pm
  11. It’s been reported that the disgraced former head of Fox News, Roger Ailes, is prepping Donald Trump for the presidential debates with Hillary Clinton.
    Ailes, of course, was shown the gate for sexual misconduct. Applebaum, who championed Assange in the face of rape allegations in 2012, was himself cut loose by the Tor Project after an internal investigation determined sexual harrassment allegations against Applebaum were true. Perhaps Applebaum and Assange can assist Ailes in getting Trump ready. The Three A ….. (No not Amigos). A federal lawsuit filed by “Jane Doe” in June of this year accused Trump of raping her in 1994 when she was thirteen years old. Interesting how MSM AND Progressives have let this quartet skate away unlike Bill Cosby (and I’m no apologist for Cosby!).
    The abysmal sexual politics of Julian Assange continued today with Wikileaks’ unredacted mass data dump outing gay people in Saudi Arabia, one of the most repressive countries in the world when it comes to LGBT civil rights.

    Posted by Dennis | August 23, 2016, 10:49 pm
  12. Roger Stone recently gave another interview where he repeated his claim that he’s in contact with Julian Assange and hinted at the likely nature of a possible Wikileaks “October Surprise”, although he noted that it might happen sooner than October and Assange might just do strategic dumps before the three presidential debates. So get ready for a September surprise since the first scheduled debate is September 26. Plus a couple October surprises for the other two debates. And presumably another surprise before the actual election.

    Stone also briefly mentioned one topic that is likely going to be in at least one of those leaks: “I believe that he is in possession of all of those emails that Huma Abedin and Cheryl Mills, the Clinton aides, believe they deleted. That and a lot more. These are like the Watergate tapes.” Keep in mind that the right-wing has long tried to smear Huma Abedin with Muslim Brotherhood ties and Roger Stone recently suggested she’s a terrorist agent. So while there’s probably going to be multiple “surprises” over the next couple of months, at least one of them is going to try to suggest that Hillary is a terrorist agent:

    AlterNet

    Trump Dirty Trickster Roger Stone: How ‘Hero’ Assange Could Help Our Campaign

    The conspiracist reveals he’s been in touch with the WikiLeaks founder regarding Clinton emails—and when to dump them on the media.

    By Adele M. Stan / AlterNet
    August 22, 2016

    In an interview that aired Sunday on C-SPAN’s “Newsmakers” program, Roger Stone, the off-the-books Trump adviser, reiterated his claim that he has been in touch with WikiLeaks founder Julian Assange.

    Assange posted the hacked emails of the Democratic National Committee to his site, as well as a database of emails from Hillary Clinton’s private email server, which the former secretary of state used to communicate with State Department aides during her tenure in the Cabinet.

    Stone, a longtime Republican political operative and dirty trickster, purportedly either resigned or was fired from the presidential campaign of Donald Trump last year but continues to be deeply involved with the campaign, especially the elements of its messaging that advance the conspiracy theories of the right. In the interview, he described his relationship to the Trump campaign this way: “I count myself as a Trump friend—kind of like Sidney Blumenthal [is to the Clintons]; I have no formal nor informal role, but I do have access to all the right people.”

    On the C-SPAN show, Stone told Politico’s Alex Isenstadt of his communication to Assange “through an intermediary—somebody who is a mutual friend”—regarding the 30,000 emails the Clinton staff deleted before turning over the contents of the server to Justice Department investigators. (Clinton maintains that only emails of a personal nature were deleted.) Asked to corroborate Assange’s threat of “an October surprise” to stem from that trove, Stone offered a suggestion he clearly deemed to be more helpful to the Trump campaign.

    “Well, first of all, I think Julian Assange is a hero; I think he’s taking on the deep state, both Republican and Democrat,” Stone began. He went on to say, “I believe that he is in possession of all of those emails that Huma Abedin and Cheryl Mills, the Clinton aides, believe they deleted. That and a lot more. These are like the Watergate tapes…” (Video below: Go to timestamp 15:15.)

    Stone knows a thing or two about the Watergate scandal, in which he played a minor role before moving on to bigger operations, such as the 2000 “Brooks Brothers riot” in Florida, when Stone organized dozens of Republican congressional staffers to storm the election board in Miami-Dade County, Florida, where a recount of presidential election ballots was taking place.

    “I don’t know that this is going to happen in October,” Stone said of a potential WikiLeaks dump of Clinton correspondence. “There is an enormous amount of material here. Mr. Assange could, theoretically, drop a tranche of documents before each one of [the presidential] debates.”

    Of newly named Trump campaign manager Kellyanne Conway, Stone had this to say: “Kellyanne’s [presidential campaign] experience dates to Ted Cruz. That didn’t work out too well.”

    ““I don’t know that this is going to happen in October…There is an enormous amount of material here. Mr. Assange could, theoretically, drop a tranche of documents before each one of [the presidential] debates.”

    Get ready for special debate-influence-leaks, served up just for The Donald’s debate nights. Because Julian Assange cares about the future.

    Or course, there’s no guarantee that whatever Wikileaks leaks right before the debate will end up getting much or any attention during the debate. That’s going to depend in part on how mundane the actual leaked info actual is and how hysterical the right-wing spin around it ends up being. Or course, if Donald Trump gets to pick the debate moderators as one of his “demands” for participating in the debates at all, there’s probably going to be quite a few questions about the Wikileaks “surprises”:

    Politico

    Trump wavers on debates: ‘I have to see the conditions’

    The Clinton campaign says that he’s engaging in ‘shenanigans’ and ‘toying’ with the media.

    By Nolan D. McCaskill

    08/09/16 03:46 PM EDT

    Updated 08/09/16 06:05 PM EDT

    Donald Trump wants to debate Hillary Clinton “very badly,” but the Republican presidential nominee on Tuesday said he has “to see the conditions” before fully committing to it.

    Trump’s wavering comes amid increasing concern that the often erratic political outsider could forgo his chances to spar with Clinton on the national stage, breaking a historic precedent. Clinton’s campaign issued a pre-emptive rebuke, accusing Trump of engaging in “shenanigans” and possibly “toying” with the media to create drama.

    The nonpartisan Commission on Presidential Debates announced in September 2015 the locations for the presidential and vice presidential debates: Hofstra University in Hempstead, New York, on Sept. 26; Washington University in St. Louis on Oct. 9; the University of Nevada, Las Vegas, on Oct. 19; and Longwood University in Farmville, Virginia, for the vice presidential debate on Oct. 4.

    In a telephone interview with Time, Trump seemingly committed to participating in three debates but added a caveat.

    “I will absolutely do three debates,” Trump said. “I want to debate very badly. But I have to see the conditions.”

    Before the interview was published, Clinton campaign chairman John Podesta said in a statement that the debates aren’t open to negotiation.

    “It is concerning that the Trump campaign is already engaged in shenanigans around these debates. It is not clear if he is trying to avoid debates, or merely toying with the press to create more drama,” he said. “Either way, our campaign is not interested in playing along with a debate about debates or bargaining around them. The only issue now is whether Donald Trump is going to show up to debate at the date, times, places and formats set by the commission last year through a bipartisan process. We will accept the commission’s invitation and expect Donald Trump to do the same.”

    On Tuesday, Trump suggested he would try to cut a deal with the commission. Trump criticized a marathon CNN debate during the GOP primary that lasted more than three hours and took credit for the following debate, which was hosted by CNBC, being limited to two hours. PolitiFact, however, rated Trump’s assertion that he renegotiated a three-hour debate down to two hours “Mostly False.”

    “I renegotiated the debates in the primaries, remember?” Trump told Time on Tuesday. “They were making a fortune on them, and they had us in for 3½ hours, and I said that’s ridiculous. I’m sure they’ll be open to any suggestions I have because I think they’ll be very fair suggestions. But I haven’t [seen the conditions] yet. They’re actually presented to me tonight.”

    Trump famously clashed with Fox News anchor and debate moderator Megyn Kelly last year, and he emphasized to Time that he would have to wait and see who the general election debate moderators are because “certain moderators would be unacceptable.

    “I did very well in the debates on the primaries,” Trump said. “According to the polls, I won all of them. So I look forward to the debates. But, yeah, I want to have fair moderators … I will demand fair moderators.”

    “I did very well in the debates on the primaries…According to the polls, I won all of them. So I look forward to the debates. But, yeah, I want to have fair moderators … I will demand fair moderators.”

    Yep, Trump is totally willing to do the debates…as long as his demands are met and those demands include moderators Trump deems “fair”. At least that’s his bargaining position. We’ll see if it works. But given the media’s desire to see this race as close as possible right up until the last moment and given the ratings a Trump/Clinton debate could garner, it’s not at all inconceivable that we could see the Trump campaign basically stack the debate with far-right Breitbart-style moderators.

    So, assuming Trump actually does the debates and doesn’t find a way to skip them and declared them rigged, get ready for an upcoming set of debates with lots of questions about how Hillary is secretly trying to undermine the US and supports terrorism. Lot’s of ironic questions asked non-ironically.

    Posted by Pterrafractyl | August 24, 2016, 3:04 pm
  13. Julian Assange just gave a two-part interview with Megyn Kelly on Fox News. It didn’t contain too many surprises since it was mostly just Assange reiterating his foreshadowing of some sort of “October Surprise” against Hillary Clinton that will potentially shake up the election. Kelly asked Assange about his previous non-suggestion suggestion that Seth Rich, the recently murdered DNC staffer, was the source for his DNC email leaks and, also not surprisingly, Assange issued another non-denial denial intertwined with some more non-suggestion suggestions that Seth Rich was the source:

    Fox 5 DC

    WikiLeaks founder addresses death of DNC staffer Seth Rich in Fox News interview

    By: Sarah Simmons

    Posted:Aug 25 2016 11:17PM EDT
    Updated:Aug 25 2016 11:17PM EDT

    WASHINGTON – WikiLeaks founder Julian Assange has spoken out about the a Democratic National Committee staffer killed nearby his Washington D.C. home.

    In the past, Assange hinted Seth Rich may have been a WikiLeaks informant, and in an exclusive interview with Fox News’ Megyn Kelly, he revealed even more.

    But once again, Assange skirted the question of whether Rich was an informant in the interview. He would only say he was concerned about any potential sources who would try to help WikiLeaks in its endeavors.

    But the exchange with Kelly about the D.C. murder of the 27-year-old Democratic National Committee employee revealed some interesting information.

    “We’re not saying that Seth Rich’s death necessarily is connected to our publications – that’s something that needs to be established,” said Assange. “But if there is any question about a source of WikiLeaks being threatened, then people can be assured that this organization will go after anyone who may have been involved in some kind of attempt to coerce or possibly, in this kill a potential source.”

    When Kelly asked him if he has any suspicions on who may have murdered Rich, Assange responded, “We have received a variety of information. We will be forwarding that information to the police. I don’t think the information so far is enough to start pointing a direct finger. We don’t want to compromise the police investigation.”

    Rich was gunned down on his way to his Bloomingdale neighborhood home at around 4:20 a.m. on July 10. He had left a bar in Columbia Heights and was walking home when he was fatally shot while on the phone with his girlfriend.

    Investigators have no leads right now and there were no witnesses to the killing.

    Conspiracy theories festered on social media, especially after WikiLeaks offered a $20,000 reward for information leading to the arrests in addition the $5,000 reward offered by D.C. police. But police said there is no evidence to suggest Rich’s death, which was 12 days before WikiLeaks released a barrage of Democratic National Committee emails, had anything to do with his job.

    Right now, investigators still believe Rich’s death was a robbery gone wrong and there is no other evidence to prove otherwise.

    “When Kelly asked him if he has any suspicions on who may have murdered Rich, Assange responded, “We have received a variety of information. We will be forwarding that information to the police. I don’t think the information so far is enough to start pointing a direct finger. We don’t want to compromise the police investigation.””

    So is this the big news that Assange feels will shake up the campaign? Some sort of evidence that Seth Rich was behind the DNC hack and vaguely points a finger towards some sort of Hillary hit man? If so, those police investigators would probably appreciate if Wikileaks actually forwarded that information to them. Note that Assange said he “will be forwarding that information to the police” as opposed to “we already forwarded that information to the police.” But then he raises questions about the utility of the information he’s received and says Wikileaks doesn’t want to compromise the police investigation. So maybe the police should be glad Wikileaks hasn’t forwarded the information yet because based any information that harms an investigation is probably disinformation. And yet here was have Assange once again pushing this meme.

    Also keep in mind that if Rich really was behind the DNC hack it’s not inconceivable that Wikileaks would have evidence of this if Rich was in contact with Wikileaks, but the sources should in theory remain anonymous even to Wikileaks given the way Wikileaks’s online submission system works. So unless the DNC hack source specifically deanonymized themselves to Wikileaks (or Assange himself was behind the hack), the default assumption for Wikileaks’s knowledge of its sources is generally that it has no idea who the source actually is, which makes it all the more amazing that Assange just decided to publicly speculate and strongly hint that Rich was the source.

    Unless, of course, he does have information that Rich was the source. Maybe Rich chatted with him using some encryption app or something. But if that’s the case, then it begs the question of whether or not Assange has passed that information along to police too. If not, why not?

    It all raises the general question as to whether or not Wikileaks would, in theory, hand over information to investigators about their sources if 1. They know who the source is, and 2. The source just got mysteriously murdered and investigators have no suspect or motive. After all, if Wikileaks made it clear that it won’t reveal sources unless they’re mysteriously murdered and there are no suspects or motives, it’s hard to see how that would be anything other than an additional level of protection for Wikileaks’s sources.

    So let’s hope some of these questions get asked of the man who repeatedly issues non-denial denials over whether or not his non-assertion assertions are intended to tell the world that Hillary Clinton has Seth Rich murdered during future interviews. Don’t be super surprised if they aren’t.

    Posted by Pterrafractyl | August 25, 2016, 8:20 pm
  14. Oh, look at that: someone appears to have attempted to hack Illinois’s and Arizona’s voting systems:

    Yahoo News

    FBI says foreign hackers penetrated state election systems

    Michael Isikoff
    Chief Investigative Correspondent
    August 29, 2016

    The FBI has uncovered evidence that foreign hackers penetrated two state election databases in recent weeks, prompting the bureau to warn election officials across the country to take new steps to enhance the security of their computer systems, according to federal and state law enforcement officials.

    The FBI warning, contained in a “flash” alert from the FBI’s Cyber Division, a copy of which was obtained by Yahoo News, comes amid heightened concerns among U.S. intelligence officials about the possibility of cyberintrusions, potentially by Russian state-sponsored hackers, aimed at disrupting the November elections.

    Those concerns prompted Homeland Security Secretary Jeh Johnson to convene a conference call with state election officials on Aug. 15, in which he offered his department’s help to make state voting systems more secure, including providing federal cyber security experts to scan for vulnerabilities, according to a “readout” of the call released by the department.

    Johnson emphasized in the call that Homeland Security was not aware of “specific or credible cybersecurity threats” to the election, officials said. But three days after that call, the FBI Cyber Division issued a potentially more disturbing warning, entitled “Targeting Activity Against State Board of Election Systems.” The alert, labeled as restricted for “NEED TO KNOW recipients,” disclosed that the bureau was investigating cyberintrusions against two state election websites this summer, including one that resulted in the “exfiltration,” or theft, of voter registration data. “It was an eye opener,” one senior law enforcement official said of the bureau’s discovery of the intrusions. “We believe it’s kind of serious, and we’re investigating.”

    The bulletin does not identify the states in question, but sources familiar with the document say it refers to the targeting by suspected foreign hackers of voter registration databases in Arizona and Illinois. In the Illinois case, officials were forced to shut down the state’s voter registration system for ten days in late July, after the hackers managed to download personal data on up to 200,000 state voters, Ken Menzel, the general counsel of the Illinois Board of Elections, said in an interview. The Arizona attack was more limited, involving malicious software that was introduced into its voter registration system but no successful exfiltration of data, a state official said.

    FBI Flash PDF : Targeting Activity Against State Board of Election Systems >>>

    The FBI bulletin listed eight separate IP addresses that were the sources of the two attacks and suggested that the attacks may have been linked, noting that one of the IP addresses was used in both intrusions. The bulletin implied that the bureau was looking for any signs that the attacks may have been attempting to target even more than the two states. “The FBI is requesting that states contact their Board of Elections and determine if any similar activity to their logs, both inbound and outbound, has been detected,” the alert reads. “Attempts should not be made to touch or ping the IP addresses directly.”

    “This is a big deal,” said Rich Barger, chief intelligence officer for ThreatConnect, a cybersecurity firm, who reviewed the FBI alert at the request of Yahoo News. “Two state election boards have been popped, and data has been taken. This certainly should be concerning to the common American voter.”

    Barger noted that that one of the IP addresses listed in the FBI alert has surfaced before in Russian criminal underground hacker forums. He also said the method of attack on one of the state election systems — including the types of tools used by the hackers to scan for vulnerabilities and exploit them — appear to resemble methods used in other suspected Russian state-sponsored cyberattacks, including one just this month on the World Anti-Doping Agency.

    The FBI did not respond to detailed questions about the alert, saying in a statement only that such bulletins are provided “to help systems administrators guard against the actions of persistent cyber criminals.” Menzel, the Illinois election official, said that in a recent briefing, FBI agents confirmed to him that the perpetrators were believed to be foreign hackers, although they were not identified by country. He said he was told that the bureau was looking at a “possible link” to the recent highly publicized attack on the Democratic National Committee and other political organizations, which U.S. officials suspect was perpetrated by Russian government hackers. But he said agents told him they had reached no conclusions, and other experts say the hackers could also have been common cyber criminals hoping to steal personal data on state voters for fraudulent purposes, such as obtaining bogus tax refunds.

    Still, the FBI warning seems likely to ramp up pressure on the Department of Homeland Security to formally designate state election systems as part of the nation’s “critical infrastructure” requiring federal protection — a key step, advocates say, in forestalling the possibility of foreign government meddling in the election.

    Such a formal designation, which would allow state election officials to request federal assistance to protect their voting systems, “is under consideration,” a Homeland Security spokesman told Yahoo News.

    Federal and state election officials say that the prospect of a full-blown cyberattack that seriously disrupts the November elections is remote, but not out of the question. About 40 states use optical-scan electronic-voting machines, allowing voters to fill out their choices on paper. The results are tabulated by computers.

    These are “reasonably safe” because the voting machines are backed up by paper ballots that can be checked, says Andrew W. Appel, a Princeton University computer science professor who has studied election security. But six states and parts of four others (including large swaths of Pennsylvania, a crucial swing state in this year’s race) are more vulnerable because they rely on paperless touchscreen voting, known as DREs or Direct-Recording Electronic voting machines, for which there are no paper ballot backups.

    “Then whatever numbers the voting computer says at the close of the polls are completely under the control of the computer program in there,” Appel wrote in a recent blog post entitled “Security Against Election Hacking.” “If the computer is hacked, then the hacker gets to decide what numbers are reported. … All DRE (paperless touchscreen) voting computers are susceptible to this kind of hacking. This is our biggest problem.” Another area of concern cited by Appel and other experts is the growing number of states that allow overseas and military voters to cast their ballots online.

    In his conference call this month with state election officials, Johnson urged them to guard against potential intrusions by taking basic precautionary steps, such as ensuring that electronic voting machines are not connected to the Internet while voting is taking place. The FBI bulletin addresses additional potential threats, such as the targeting of state voter registration databases comparable to the attacks in Arizona and Illinois. “This is a wake-up call for other states to look at their systems,” said Tom Hicks, chairman of the federal Election Assistance Commission, an agency created by Congress after the 2000 Florida recount to protect the integrity of elections and which helped distribute the FBI alert to state election officials last week.

    Hackers could conceivably use intrusions into voter registration databases to delete names from voter registration lists, although in most states, voters can request provisional ballots at the polls, allowing time for discrepancies to be resolved, an official of the National Association of Secretaries of State told Yahoo News. Still, according to Barger, the cybersecurity expert, such attacks can be used to create havoc and sow doubt over the election results.

    “Federal and state election officials say that the prospect of a full-blown cyberattack that seriously disrupts the November elections is remote, but not out of the question. About 40 states use optical-scan electronic-voting machines, allowing voters to fill out their choices on paper. The results are tabulated by computers.”

    Ok, let’s hope the prospect of a full-blown cyberattack that seriously disrupt the election really is remote. Hopefully that means Arizona’s and Illinois’s systems had just unusually crappy security or something. But as Josh Marshall reminds us below, if the purpose of a hack attack isn’t intended to secretly shift the outcome of an election but instead to simply disrupt the election, and call into question the integrity of the vote, than seriously disrupting the election could be as simple as raising major questions about the integrity of the vote in a few key precincts in a couple swing states in a manner that is guaranteed to be caught. In other words, it’s not that the hack will used to swing the election. It will be used to invalidate it in the minds of a hyperpolarized electorate:

    Talking Points Memo
    Editor’s Blog

    Could The Election Itself Be Hacked?

    By Josh Marshall
    Published August 29, 2016, 12:36 PM EDT

    A few weeks back, when I was writing about possible Russian efforts to influence the US election, a number of security experts pointed me to concerns about hacking or tampering with the actual US voting apparatus. Now the FBI has reached out to local election officials after hacks were detected in two states. Whether something has Russian fingerprints on it is obviously hugely inflammatory and polarization. I think the emphasis here is something that someone may be trying to do this – at least on first blush, precisely who it is is less important to taking precautions to prevent problems.

    But here’s the thing. If foreign hackers of any source or domestic hackers for that matter want to disrupt an election, that’s much simpler. Perhaps you’ve hacked into the servers in advance and then you simply erase the data late in the day? Or shift it to all Clinton or all Trump. If it’s being done from somewhere in Senegal or Bangkok you’re never going to track down and apprehend the culprits. And the changes to the numbers don’t need to be credible to severely disrupt the election. Complete hypothetical: what if 10 critical precinct tallies in Florida and Ohio are simply erased or tampered with so that the numbers bear no confidence? What do you do then? We’re not in a high trust climate in our politics where something like that could be easily resolved. Precisely because we are already in such a low trust political era, even a tiny number of demonstrated cases of cyber-tampering would cast a penumbra of doubt over the whole process, especially for the losing party.

    The point is that disruption doesn’t really require hiding your tracks. It’s enough to disrupt, delete, alter. It can also be done by people who don’t have any particular concern with the actual election outcome, have no need to make the results credible and have none of the legal or reputational vulnerabilities that might deter people within the political system itself from trying to tamper with election results.

    The country has enough things to freak out about as a country. I’m not saying we should start wigging out about this. But it’s definitely worth being concerned about and hopefully one that federal law enforcement authorities are focusing on and proactively working with local authorities to prevent. And it’s something qualitatively easier to pull off for bad actors whose aim is disruption rather than winning.

    “But here’s the thing. If foreign hackers of any source or domestic hackers for that matter want to disrupt an election, that’s much simpler. Perhaps you’ve hacked into the servers in advance and then you simply erase the data late in the day? Or shift it to all Clinton or all Trump. If it’s being done from somewhere in Senegal or Bangkok you’re never going to track down and apprehend the culprits. And the changes to the numbers don’t need to be credible to severely disrupt the election. Complete hypothetical: what if 10 critical precinct tallies in Florida and Ohio are simply erased or tampered with so that the numbers bear no confidence? What do you do then? We’re not in a high trust climate in our politics where something like that could be easily resolved. Precisely because we are already in such a low trust political era, even a tiny number of demonstrated cases of cyber-tampering would cast a penumbra of doubt over the whole process, especially for the losing party.

    Now, it’s worth noting that 2004 gives us a great example of what might happen if, say, Ohio has a number of voting irregularities, including possible electronic voting machine irregularities, in a very close race that would have determined the outcome of the presidential election. And in that case, questions were indeed raised and continued to be raised years later as evidence for electronic voter fraud mounted using a pro-Bush voting tabulation company continued to accrue (and the GOP’s IT guru died in a small plane crash after getting subpoenaed in an investigation over the election), but it’s not like the results of the whole election results were called into question and a constitutional crisis ensued.

    So we do have one fairly recent example of how the US might respond if there’s significant questions raised about integrity of the vote, although in the case of the 2004 Ohio vote the types of GOP violations went far beyond just possible electronic vote-rigging so it possible that a full-spectrum vote-manipulation/suppression campaign could have the effect of almost masking the shock and mystery associated with the unexplained pro-GOP vote shifts.

    It’s also important to keep in mind that it was John Kerry, a Democrat, who lost in 2004, and Kerry wasn’t exactly a “burn it all down!” kind of politician. Donald Trump, on the other hand, has already declared that the only way he can lose is if the election is rigged. It was one of the themes of his very first general election tv ad. And Roger Stone has already declared the government no longer the government if Trump loses and there’s going to be widespread civil-disobedience and a ‘bloodbath’.

    So the Trump campaign clearly wants someone to hack the vote somewhere. Or, more generally, hack voting system computers and get caught. And don’t forget that for the Trump campaign to raise hell and demand the entire election invalid it wouldn’t necessarily even have to be a hack that manipulates a single vote. Just a single hack like what was reported, where it’s clear the someone got into the system, would potentially be adequate if Trump simply wanted to create narrative about how the whole system was rigged. And, lo and behold, we now have two separate states that experienced some sort of successful hacking on their voting systems. That’s convenient. For the people that want to burn it all down.

    There is one problem with all this for Trump: the fact that the hackers are either trying to spoof Russian hackers or are actually Russian hackers. If there are news reports about Russian hackers on election night that wouldn’t go so well for Trump’s narrative. But that’s also part of why it’s so potentially dangerous to attribute the source of all these hacks, whether or they’re DNC email hacks or whatever, to the Russian government when the hackers are obviously trying to make it look like they’re from Russia. Sure, they could be Russian hackers trying to send a signal. But since we really have no idea and we’re talking about elite hackers who would presumably have the ability to spoof Russian hackers, there’s nothing stopping them from pretending to be a completely different set of hackers on election day, whether they’re Russian hackers or not.

    So we have another round of hackers, hackers who seem to want to be seen as Russian hackers and might be but we really don’t know, now hacking state election systems and getting caught. And we know that getting caught hacking is potentially the big trigger that can help Trump the most. So if the plan is to get caught hacking on election day, one of the big questions we should be asking is whether or not these same hackers, or similar groups, are going to continue doing that in a way that seems to blatantly seem like Russian hackers did it? Because that wouldn’t really help the Trump narrative.

    In other words, the more evidence we have that there are pro-Trump hackers out there planning on assisting the Trump campaign in whatever manner they can, and the more those pro-Trump hackers keep getting caught in a manner that makes the seem like they want to be caught identified as Russian hackers, the more important it becomes to ask the question of whether or not these hackers are intentionally leaving tracks that identify them Russian hackers or not. Because if these are elite hackers at work, who presumably have the ability and apparent desire to self-implicate themselves as Russian hackers, why wouldn’t they do the same thing on election day but choose a completely different pro-Clinton identity? That’s what Trump and the far-right in general, who would love to destabilize the US democratic system, are pining for. So why wouldn’t the hackers pretend to be pro-Hillary hackers on election day and flip a few precincts in a state like Illinois her way? Isn’t it basically setting a giant trap for ourselves to assume that these hackers really are Russian and can’t help but get caught and identified as Russian?

    Posted by Pterrafractyl | August 29, 2016, 3:03 pm
  15. Goebbels would be so proud of this propaganda! I wonder if the propaganda leads the DNC to believe the hacks were caused by Russia, but right before the election they will prove the hack came from someone other than the Russians. This will discredit Hillary. Hillary so far has taken the bait. See the article below:

    http://www.mirror.co.uk/news/world-news/wikileaks-founder-julian-assange-slams-8714291

    WikiLeaks founder Julian Assange slams Hillary Clinton’s ‘McCarthyite-style anti-Russian hysteria’ and accuses her of ‘demonising’ Donald Trump campaign

    Wikileaks founder Julian Assange has accused Hillary Clinton of being “hysterical” about Russia with a “kind of neo-McCarthyist” politics.

    Speaking to Fox News via video-link from the Ecuadorian embassy in London, Assange said: “She has palled up with the neo-cons responsible for the Iraq war and she has grabbed onto a kind of neo-McCarthy hysteria about Russia and is using this to demonise the Trump campaign.”

    The Democratic presidential candidate accused Donald Trump at her latest rally in Reno, Nevada yesterday of having links to Vladimir Putin.

    She referred to the Russian leader as the “grand godfather of this global brand of extreme nationalism” and said “Trump himself heaps praise on Putin and embraces pro-Russian policies”.

    Assange has not officially endorsed the trump campaign but said it has no links to Russian agents.

    Wikileaks made around 20,000 Democratic National Committee email public last month, which appeared to reveals that top politicians attempted to derail the Bernie Sanders’ nomination.

    Clinton alleged that Russia was behind the DNC hack but hasn’t provided evidence to back up her claims.

    Assage has been holed-up in the embassy for four years, under constant police surveillance, after being granted asylum after Sweden called for him to be extradited over historic sexual assault claims.

    He is wanted for questioning over allegations against two women in 2010 – which he has always denied.

    However, he claims if he travels to Sweden the American government will secure his extradition over espionage charges related to his work for Wikileaks.

    In February, a UN panel ruled that Assange has been “arbitrarily detained” in the Ecuadorian embassy in London.

    Earlier this month he offered to be questioned inside the embassy but the Swedish prosecutors only recently agreed.

    Posted by Anonymous | August 30, 2016, 4:52 pm
  16. One of the ironic quirks about the “October surprise” in American politics is that it’s not really a surprise. At least not in terms of the timing since October is basically the month you would expect a big nasty planned ‘surprise’ to get used during a presidential election season that ends in early November. If you’re going to dump something big on your opponent it’s basically got to be an October, or maybe November, surprise.

    And this year it’s even less surprising if we get an October surprise since Julian Assange and Roger Stone have been hinting about it for months. That said, if we do get our long-predicted October surprise this week it will actually be a little surprising, if only because Assange and Stone keep sending mixed messages when exactly we’re supposed to all get surprised by their big planned October surprise:

    Talking Points Memo Livewire

    WikiLeaks Cancels, Then Hints At Clinton-Related October Surprise

    By Allegra Kirkland
    Published October 3, 2016, 9:54 AM EDT

    WikiLeaks has so far struggled to provide a clear timeline for the Hillary Clinton-related “October surprise” that the radical transparency organization has hinted at for months.

    On Friday, NBC’s Jesse Rodriguez reported that WikiLeaks canceled an anticipated Tuesday announcement from founder Julian Assange over “security concerns” at the Ecuadorian embassy in London, where Assange has lived for the past four years.

    Due to security concerns at the Ecuadorian Embassy, Julian Assange's balcony announcement on Tues has been cancelled, per @wikileaks— Jesse Rodriguez (@JesseRodriguez) September 30, 2016

    Yet on Saturday, Roger Stone, a longtime ally of Donald Trump, tweeted that Clinton would be “done” by Wednesday as a result of WikiLeaks’ announcement.

    Wednesday@HillaryClinton is done. #Wikileaks.— Roger Stone (@RogerJStoneJr) October 2, 2016

    In the months after the release, the group has turned into something of a Clinton conspiracy machine, pushing unfounded rumors about the Democratic nominee’s health and suggesting a DNC staffer was killed for crossing the Clintons.

    Stone, himself no stranger to the world of Clinton conspiracies, claimed that he he has been in touch with Assange about “the next tranche of documents” WikiLeaks plans to release about the former secretary of state.

    On Sunday, NBC’s Rodriguez reported that Assange will still make a public appearance on Tuesday in a video livestream at a Berlin press conference. It’s unclear if that appearance is related to the purported “October surprise.”

    According to @wikileaks, Julian Assange will appear via video link at Berlin press conference on Tuesday AM— Jesse Rodriguez (@JesseRodriguez) October 2, 2016

    “On Sunday, NBC’s Rodriguez reported that Assange will still make a public appearance on Tuesday in a video livestream at a Berlin press conference. It’s unclear if that appearance is related to the purported “October surprise.” ”

    Ok, so after Assange canceled his planned balcony announcement for Tuesday, citing security concerns. Then Roger Stone tweets that the Hillary Clinton will be “done” by Wednesday because of Wikileaks, and then we get a report that Assange will actually make a video appears at a Berlin press conference on Tuesday, although it’s unclear if he’ll be talking about the October surprise. So you can at least be a little surprised if we do see some big October surprise as previously scheduled on Tuesday.

    There is, however, a genuine surprise that we can already identify from the whole back and forth between Assange and Stone: Roger Stone has “a very good friend”. Really, he does. At least that what he claims. You might suspect someone like Stone wouldn’t actually have very good friends, but he apparently does have at least one. Who that very good friend is remains a mystery but that very good friend is a apparently Stone’s contact with Assange and flew to London last week to meet with Assange:

    Media Matters

    Trump Ally Roger Stone Says His “Very Good Friend” Is Meeting With Julian Assange Soon And Reporting Back

    Video ››› September 27, 2016 12:23 PM EDT ››› MEDIA MATTERS STAFF

    From the September 26 edition of Genesis Communications Network’s The Alex Jones Show:

    [see video]

    ROGER STONE: A very good friend of mine is on his way to London even as we speak to talk to him. I will get a report shortly. I think Julian Assange is a freedom fighter, that he is a truth teller. The idea that he is working for the Russians is as absurd as the idea put forward by our ridiculous CIA director that the Russians are going to hack our elections. No. Rahm Emanuel may hack our elections.

    “A very good friend of mine is on his way to London even as we speak to talk to him. I will get a report shortly…”

    Yes, Roger Stone has a very good friend. Now you know. In October. Surprise!

    So that was Stone’s message last Thursday, one day before Assange initially canceled his Tuesday balcony appearance. And just yesterday we got a new update from Roger Stone about his friend’s meeting with Assange: Yes, the October surprise is coming, it’s going to be devastating. Also, Hillary is trying to figure out to how kill Assange. This all according to Roger and his mysterious friend (who is also a friend of Assange):

    MediaMatters

    Trump Adviser Roger Stone Says He’s Been “Assured” Through An Assange Intermediary That “The Mother Lode Is Coming”

    Stone: “The Clintonites Are Trying To Figure Out How To Kill” Assange
    Video ››› 10/3/2016 ››› MEDIA MATTERS STAFF

    From the October 2 edition of Genesis Communications Networks’ The Alex Jones Show:

    [see video]

    ROGER STONE: [WikiLeaks founder Julian] Assange is in my view a hero. He does not work for the Russians.

    […]

    An intermediary met with him in London recently who is a friend of mine and a friend of his, a believer in freedom. And I am assured that the mother lode is coming Wednesday. It wouldn’t be an October surprise if I told you what it was but I have reason to believe that it is devastating because people with political judgment who are aware of the subject matter tell me this.

    […]

    Now we’ve seen disinformation in the last 24 hours saying that Assange has postponed this, he’s moved. I do know this. He does fear for his life and he should. Right now the globalists and the Clintonites are trying to figure out how to kill him.

    “Now we’ve seen disinformation in the last 24 hours saying that Assange has postponed this, he’s moved. I do know this. He does fear for his life and he should. Right now the globalists and the Clintonites are trying to figure out how to kill him.

    Yes, Roger is convinced that the Clintons are getting ready to assassinate Assange. Is this something his mystery friend told him? No, unfortunately it comes from a far less credible source. And while you might think it’s not actually possible to find a less credible source than an anonymous mystery friend of Roger Stone, you must not be familiar with True Pundit:

    MediaMatters

    Conservatives Run With Sketchy Conspiracy Website’s Utterly Baseless Claim Clinton Wanted To “Drone” Assange

    Blog ››› 10/3/2016 ››› OLIVER WILLIS

    Wikileaks and some conservative outlets are running with a claim that Democratic presidential nominee Hillary Clinton openly speculated about targeting Wikileaks founder Julian Assange with a drone strike. But the report in question comes from an anonymously-sourced article from “True Pundit,” a fringe conspiracy website that even conservatives have criticized.

    On October 2, True Pundit posted an article claiming that during a meeting of “State’s top brass” in 2010 to discuss how to deal with Wikileaks, Clinton asked of Assange, “Can’t we just drone this guy?” The site only attributes the comment to anonymous “State Department sources. ”The fact-checking website Snopes looked into the True Pundit article and found their claim “unproven,” pointing out that the source of their purported Clinton quote was “a vague and anonymous reference that does not yield to verification.” (It’s also unclear why multiple sources with knowledge of this supposed incident that took place in a meeting of senior State Department staff would choose to leak them to a minor conspiracy blogger rather than a credible news outlet. )

    RT, the international news network owned by the Russian government, picked up the True Pundit story. Wikileaks’ official Twitter account also promoted the story, as did Trump allies Alex Jones and Roger Stone. FoxNews.com cited the Wikileaks tweet in its report on Assange rescheduling the time of a proposed address this week.

    True Pundit’s supposed scoop comes on the heels of months of laughable articles forwarding conspiracies about Clinton.

    Conservative blogger Jim Hoft of Gateway Pundit, no stranger to oddball conspiracy content, noted, “TruePundit may be a hoax website” (though he still devoted an article to promoting the claim about the Assange drone strike).

    Heat Street, a conservative website run by Rupert Murdoch’s News Corp., also described the Assange drone story as a “conspiracy theory.”

    Conspiracy theorist Paul Joseph Watson of Alex Jones’ Infowars initially described the True Pundit story as “iffy,” but after Wikileaks posted it said, “thought this was a fake story, until Wikileaks tweeted it out.”

    “Conspiracy theorist Paul Joseph Watson of Alex Jones’ Infowars initially described the True Pundit story as “iffy,” but after Wikileaks posted it said, “thought this was a fake story, until Wikileaks tweeted it out.”

    Bwah!! That’s right, even Infowars thought that the story looked “iffy”. At least until Wikileaks tweeted it out. Surprise! Oh wait, that’s not at all a surprise. Oh well. We’ll just have to wait and see if Assange gets taken out by a drone strike. That would actually be pretty surprising.

    Posted by Pterrafractyl | October 3, 2016, 3:32 pm
  17. And the Year of the Troll rolls on. Look who Wikileaks trolled today during Julian Assange’s big hyped press conference where he was expected to reveal his big devastating October surprise about Hillary Clinton: Alex Jones and Roger Stone (and anyone else waiting with bated breath for the big surprise):

    The Daily Beast

    WikiLeaks Trolls Trump World, Delivers Nothing on Hillary
    Roger Stone and Alex Jones predicted Julian Assange would end the Clinton campaign on Tuesday with a hyped announcement. October surprise, indeed.

    Shane Harris
    10.04.16 8:15 AM ET

    If Hillary Clinton’s die-hard opponents were hoping for an October surprise, they’re going to have to wait.

    A Tuesday morning press conference by WikiLeaks, which Clinton antagonists and conspiracy theorists had hoped would spell the beginning of the end of her presidential campaign, turned out to be a celebration-cum-infomercial for the website, which celebrates its 10th anniversary today and is promoting a new book.

    Either WikiLeaks and its founder, Julian Assange, never really had the goods on Clinton, or Donald Trump and his supporters just got wickedly trolled.

    For months, WikiLeaks has been hinting that it would release damaging documents about Clinton in the home stretch of the presidential campaign. The group had posted embarrassing emails stolen by hackers from the Democratic National Committee in July, leaving the world wondering, what else does Assange have in his hard drive?

    Egged on by the apparently unfounded claims of Trump adviser Roger Stone that WikiLeaks had a campaign-ending document dump in store, anticipation reached a fever pitch. According to Google, the top trending question about Trump’s opponent on Monday was “What could WikiLeaks have on Clinton?”

    Turns out, probably not much. There was no spectacular release of private emails. No bombshells about the Clinton Foundation or brain tumors. Instead, Assange and some of his WikiLeaks colleagues used the press conference to make a pitch for donations and to note the remarkable quantity of the site’s work—10 million documents published, containing more than 10 billion words, which the group claims is “more secret documents than the rest of the world’s media combined.”

    With legions of Trump supporters and Clinton haters feeling deceived, Stone claimed that Assange had never promised a big reveal.

    “Not at all what he said,” Stone wrote in an email to The Daily Beast, adding that journalists had engaged in “wishful thinking.”

    Stone had already seemed to tamp down expectations ahead of the press conference, which was streamed live at 4 a.m. Eastern time.

    “Assange correctly fears for his life because he has the deep secrets of the Deep State and he’s getting ready to spill the beans,” Stone said on The Alex Jones Show on Monday, explaining why Assange must have changed his earlier plans to hold the press conference from the balcony of the Ecuadorian embassy in London, where he lives in a self-imposed exile. WikiLeaks held the event in Berlin instead, and Assange joined via video.

    “Bill and Hillary Clinton know that it’s handcuff time and they’re apoplectic,” Stone said.

    What now appears more likely is that there was never an October surprise, at least not of the magnitude that Stone had been promising when he tweeted Sunday, “Wednesday@HillaryClinton is done. #Wikileaks.”

    Some Clinton opponents took that as gospel, perhaps because Stone has said he’s in contact with Assange, whom he recently described as “my hero.”

    WikiLeaks, however, batted down the suggestion that Tuesday was some kind of D-Day.

    “Regarding upcoming elections…We hope to be publishing every week for the next 10 weeks,” Assange said, alluding to a more prolonged and less-decisive document drip. Assange said that the “significant” disclosures would cover the U.S. election and Google, but he gave no precise details about when they would occur.

    Clinton’s most fervent antagonists were outraged.

    “Julian Assange trolling the world is Hillary’s October surprise,” Jones declared in a Tuesday morning tirade. Jones, who had covered the press conference live on his website Infowars, had promised his followers that Assange had a revelation that “could swing the election against Hillary if it catches fire.”

    “He was promising this damning evidence and he doesn’t release it now 34 days out and now he’s saying he’ll release it by the end of the year so that smacks of a sell-out,” Jones said. “I think he’s probably out of documents.”

    But some people would still like to know where Assange is getting those documents. At a hearing of the House Judiciary Committee last month, Rep. Jerrold Nadler (D-NY) asked FBI Director James Comey whether law-enforcement officials had interviewed Stone “about his communications with Julian Assange or his knowledge of how WikiLeaks got these illegally obtained documents,” referring to the hacked DNC emails.

    Comey declined to comment. Nadler also pressed the director on whether the FBI had talked to Stone about his claims to have “knowledge about upcoming leaks of additional illegally hacked documents.”

    Comey again declined to comment and wouldn’t say whether or not the FBI had opened an investigation into the matter.

    Democrats have been pressing the FBI to investigate in particular the Trump campaign’s ties to the Russian government and whether Trump is benefiting from the breaches. Republicans, though, have refused to sign on to those inquiries, leaving the Democrats with few tools to pursue an investigation.

    “Turns out, probably not much. There was no spectacular release of private emails. No bombshells about the Clinton Foundation or brain tumors. Instead, Assange and some of his WikiLeaks colleagues used the press conference to make a pitch for donations and to note the remarkable quantity of the site’s work—10 million documents published, containing more than 10 billion words, which the group claims is “more secret documents than the rest of the world’s media combined.””

    So it sounds like the big surprise is that Wikileaks needs donations and has a lot of documents. That was the big reveal. Surprise!

    And now we get to scratch our heads wondering if Assange had nothing all along, or if what he was given was such garbage that just couldn’t go through with it and decided to turn the press conference into a fund-raising pitch at the last minute. This would be a time when a Wikileak internal leak might come in handy. Any Wikileaks insiders want to enlighten us?

    Although, since Assange also promised a new leak a week for the next 10 weeks, it should be apparent soon enough if he has something worth leaking. Or maybe he’s just hoping that he can get a bunch of new documents soon and the ’10 weeks of leaks’ pledge was just an attempt to buy time. Of and course there’s another reason Assange might need to buy time: To do a better job creating fake leaks and avoid the laughable fate of “Guccfier 2.0″‘s surprise leak today. That’s right, Guccifer 2.0, the hacker (or hackers) who are attributed with pulling off the big DNC hack, released a big Clinton Foundation hack today. A hack that, upon casual inspection, turned out to be an obviously doctored release based on the earlier DNC hack. So “Guccifer 2.0” just demonstrated that they are more than happy to fabricate the documents they’re leaking while attempting to smear the Clinton Foundation. It’s today’s bonus October troll surprise:

    Ars Technica

    Guccifer 2.0 posts DCCC docs, says they’re from Clinton Foundation
    Files appear to be from Democratic Congressional Campaign Committee and DNC hacks.

    Sean Gallagher – 10/4/2016, 6:29 PM

    WikiLeaks celebrated its tenth anniversary today by teasing a release of documents that would damage presidential candidate Hillary Clinton. But when Julian Assange failed to release anything new, the individual who refers to himself as Guccifer 2.0 posted what he claimed were files from the Clinton Foundation’s servers.

    “Many of you have been waiting for this, some even asked me to do it,” Guccifer 2.0, or whoever is posting under that name, wrote in a blog post. “So, this is the moment. I hacked the Clinton Foundation server and downloaded hundreds of thousands of docs and donors’ databases. Hillary Clinton and her staff don’t even bother about the information security. It was just a matter of time to gain access to the Clinton Foundation server.” Ars contacted Guccifer 2.0, or whomever runs his Twitter account. He claimed the files came directly from the Clinton Foundation server—but declined to say how he got access to them (“I prefer to keep it to me yet”).

    However, a review by Ars found that the files are clearly not from the Clinton Foundation. While some of the individual files contain real data, much of it came from other breaches Guccifer 2.0 has claimed credit for at the Democratic National Committee and the Democratic Congressional Campaign Committee—hacks that researchers and officials have tied to “threat groups” connected to the Russian Government. Other data could have been aggregated from public information, while some appears to be fabricated as propaganda.

    Guccifer’s post includes a screen grab of what appears to directory folders, including one labeled “Pay to Play,” that appears to be fabricated from DCCC and DNC files and other material of questionable provenance. But some of the material appears to be actual data from the DCCC. [Update: the folder in the full download contains competitive intelligence reports on incidents where Republican members of Congress took large donations from companies that directly benefitted from bills they sponsored—the Republican version of “Pay to Play”.]

    One spreadsheet, called “master-spreadsheet-pac-contributions,” lists what appear to be congressional campaign donations to individual representatives and the Democratic Congressional Campaign Committee alongside bank names and a column labeled “Tarp funds”—an apparent reference to the Troubled Asset Relief Program. The spreadsheet’s metadata says that it was created in 2009 by “Kevin McKeon”—a Kevin McKeon served as the DCCC’s deputy research director at that time.

    Another spreadsheet purportedly from 2010, entitled “hfscmemberdonationsbyparty6101,” lists members of the House Financial Services Committee from both parties and shows a list of what are suggested to be campaign contributions by major banks and financial institutions. That spreadsheet—which was apparently created by a Linda K. Strohl and then saved by a Ned Brown a day later on June 10, 2010—was created on a copy of Microsoft Excel licensed to “Home.” It may have been prepared as competitive research for the 2010 mid-term congressional races.

    A third, later file, appears to be a donor “tracker” spreadsheet. It is most certainly from the DCCC. Created by Andrew Bower—another DCCC employee—in 2015, the spreadsheet contains names and e-mail addresses from the Western US. Ars directly contacted several of the people listed in the document and confirmed that the individuals on the list were donors. While they weren’t certain the amounts associated with them were correct, they confirmed other details were accurate.

    If anything, many of the DCCC documents revealed in this “Clinton Foundation” dump are more damaging to Republicans than they are to Democrats.

    “If anything, many of the DCCC documents revealed in this “Clinton Foundation” dump are more damaging to Republicans than they are to Democrats.”

    Oops. So was “Guccifer 2.0″‘s big Clinton Foundation hoax leak the leak that Assange was supposed to release today but didn’t because it was such an obvious hoax? Again, a insider Wikileaks leak sure would be helpful here. After today’s multiple surprises there’s clearly a Wikileaks transparency problem.

    Posted by Pterrafractyl | October 4, 2016, 6:33 pm
  18. With the presidential race turning out to be closer than expected in a number of key battleground states, it’s probably worth noting that this is exactly the kind of scenario Roger Stone’s unscientific ‘scientific exit polling’ scheme was designed to wreak havoc. And while, as the article below notes, Stone has been forced to modify the instructions for his “Stop the Steal” group that was to be carrying out these “exit polls” following a string of Democratic lawsuits, the unscientific ‘scientific exit polls’ are still part of Stone’s plans:

    The Guardian

    Donald Trump ally swears vigilante poll watchers will not target voters by race

    Roger Stone pledged that his voter fraud prevention scheme was a ‘neutral project’ after multiple lawsuits allege an effort to intimidate minority voters

    Lois Beckett in Philadelphia

    Tuesday 8 November 2016 05.36 EST

    After local Democratic parties in six battleground states filed lawsuits against Trump adviser Roger Stone’s voter fraud monitoring project, the Republican operative released new rules for volunteer monitors and pledged to a Nevada judge that he “will not target voters based on their race”.

    Roger Stone, an informal Trump adviser, also told the Guardian on Monday that he was concerned that the Republican party in Ohio would try to manipulate votes to undermine Trump, and said that the Stop the Steal fraud prevention project was a “neutral process”.

    Stone had announced the Stop the Steal voter fraud prevention project to the Guardian in late October. He said the effort was recruiting volunteers to conduct exit polls in nine Democrat-leaning cities in swing states in order to check for “election theft” via hacked or compromised voting machines. The cities he listed then – Cleveland, Detroit, Philadelphia, Las Vegas, Milwaukee, Fort Lauderdale, Charlotte, Richmond and Fayetteville – had large minority voting populations.

    In response, local Democratic parties in six battleground states filed lawsuits against Stone, Stop the Steal, and Republican parties, alleging broad efforts to intimidate minority voters.

    In a court filing as part of the Nevada lawsuit over the weekend, Stone promised to email all of his exit polling volunteers across the country on Monday with a new set of rules, including not to talk to voters before they cast their ballots, not to photograph anyone at the polls or in line to vote, and not to videotape or audio record the comments of any voters without their permission. He also pledged to reiterate these rules in a conference call with volunteers on Monday night. The new rules have been posted on Stop the Steal’s website.

    “The idea that these volunteers are thugs, how do you intimidate people when you’re only speaking to people after they’ve voted?” Stone said.

    “Volunteers have to agree to follow a certain neutral script, can’t wear campaign paraphernalia, they cannot film people, they cannot wear armbands, hats – it is a very neutral process.”

    Volunteers had an extra incentive not to behave in any partisan manner, in order to encourage more people to participate in the poll, he said.

    Rick Hasen, an election law expert at the University of California Irvine, said that Stone’s new guidelines were an important win for Democrats, despite the lack of victories in the lawsuits themselves.

    “The fact that Stone is putting up guidelines at all and disavowing any particular funny business will be helpful for any of Stone’s followers who might follow his lead,” Hasen wrote in an email. “Getting him on the record like this also makes it more likely he will face some kind of sanction later should he engage in dirty tricks. Even without a court order, it is a bad thing to lie to the courts.”

    Stone had described the effort as a “scientific exit poll”, but Hasen had said it sounded more like a “goon squad”.

    Officials across the political spectrum, including Alberto Gonzales, who served as attorney general under Republican president George W Bush, raised concern last week about vigilante poll watchers intimidating voters outside of the polls. The Oath Keepers, one of the country’s largest militia groups, and the National Socialist Movement, which is categorized as a neo-Nazi group, have both made public plans to quietly monitor for fraud at the polls.

    Stone said Stop the Steal’s focus was not poll watching, or an effort to provide poll watchers, but a pure focus on monitoring for manipulation of voting machines. He said he believed there was a “strong case” that “there was a willful conspiracy to rig the machines for George W Bush in Ohio”.

    “I think both parties engage in this,” he said.

    Stone said the goal of organizing volunteers to conduct exit polls in key areas was to check if the official results of any precinct differed from the group’s poll by more than 2%. While slightly more than 2% might not be a concern, he said a 10% deviation would suggest to him that the voting machines had been “tampered with”. He conceded there might be some margin of error in the volunteer-run exit poll project.

    “We’re just going to put it up online and we’ll tell you what our conclusions are, and you can reach your own,” he said. “Maybe there will be some pattern, or maybe there will be no pattern.”

    He also said he was concerned that the group’s volunteers might be “infiltrated with political partisans” and that the group was trying to vet volunteers, focus on working with people they already knew, and not allow “people who are we don’t think are temperamentally fit” to conduct the exit polls.

    “It has occurred to me that if one person at the polling places will scream racial epithets, the rest of us get blamed,” he said.

    He said that Stop the Steal’s volunteers included supporters of Jill Stein and “diehard Bernie Sanders supporters” as well as “Donald Trump supporters for sure”. He called himself only an “adviser” to the project, and said that he was not deeply involved in the day-to-day organization of the effort, particularly because he was not dealing with the different lawsuits.

    “Yes, I am a hard-nosed partisan, but intimidation is illegal, and we’re not going to do anything illegal,” Stone said.

    He said that he himself would not be doing any exit polling on election day, because he planned to be “in Austin, Texas, doing commentary for infowars.com”.

    “Stone said the goal of organizing volunteers to conduct exit polls in key areas was to check if the official results of any precinct differed from the group’s poll by more than 2%. While slightly more than 2% might not be a concern, he said a 10% deviation would suggest to him that the voting machines had been “tampered with”. He conceded there might be some margin of error in the volunteer-run exit poll project.”

    Yes, if Roger Stone’s unscientific ‘scientific exit polling’ goon squad finds more than a 10 percent difference between their exit polls and the results, they’re going to cry foul. Granted, he’ll primarily be crying foul in Infowars, so the potential impact “Stop the Steal” will have even if they do cry foul is unclear. Unclear in a bad way.

    Posted by Pterrafractyl | November 8, 2016, 7:58 pm
  19. https://www.bloomberg.com/news/articles/2016-10-27/twitter-s-firehose-of-tweets-is-incredibly-valuable-and-just-as-dangerous

    But if Twitter provides a rare outlet for criticism of repressive regimes, it’s also useful to those regimes for tracking down and punishing critics. In September 2012 a Saudi Twitter user named Bader Thawab was arrested for tweeting “down with the House of Saud.” In March 2014 an eight-year prison sentence was upheld for a Saudi man who’d mocked the king and religious officials on Twitter and YouTube. The following May, a Saudi man in a wheelchair named Dolan bin Bakheet was sentenced to 18 months in prison and 100 lashes for using Twitter to complain about his medical care. In all, there have been dozens of Twitter-related prosecutions in Saudi Arabia, according to Human Rights Watch.

    Twitter is still popular in the kingdom—the service has added 200,000 active users there since 2014, according to the Arab Social Media Report—but it no longer hosts much dissent. Activists are careful to tweet in coded language, if they tweet at all. “People don’t openly discuss important things on Twitter anymore,” says Ali Adubisi, a Saudi human-rights activist. “Twitter is totally different, totally silent, totally weak.”

    Critiques about the dark side of Twitter have been around almost since its founding in 2006. Women and minorities have long complained of routine harassment from trolls, leaving them with little recourse beyond deleting their accounts. The tendency of Twitter conversations to end in vitriol or even physical threats has hindered the company’s efforts to attract new users—its user base grew just 1 percent in the second quarter of 2016—and to reach profitability. The prevalence of abuse on the platform also figured in the decision by Walt Disney, a leading candidate to buy the company, to back away in October from a bid, according to people familiar with Disney’s thinking. Twitter’s stock price has fallen 31 percent since reaching a high for the year on Oct. 5. It’s preparing to lay off 300 employees, or about 8 percent of its workforce, according to Bloomberg News.

    During an earnings call in July, Dorsey acknowledged that Twitter needed to think harder about how it ensures the safety of its users. “Freedom of expression means little if we allow voices to be silenced because of fear of harassment,” Dorsey said, adding that user safety would be “one of our top five priorities for this year.”

    “We all knew this could be used to put a black bag over someone’s head and make them disappear”

    For years, Twitter has offered access to its “Firehose”—the global deluge of tweets, half a billion a day—to a number of companies that monitor social media. Some of those companies resell the information—mostly to marketers, but also to governments and law enforcement agencies around the world. Some of these authorities use the data to track dissidents, as Bloomberg Businessweek has learned through dozens of interviews with industry insiders and more than 100 requests for public records from law enforcement agencies in the U.S.

    There’s nothing illegal about selling Twitter data, but it’s uncomfortable for a company that promotes itself as a medium for free speech and protest. Twitter issues regular transparency reports and has gone to court to fight censorship. Dorsey himself marched with Black Lives Matter activists in 2014, regularly tweeting messages of support and appearing at a conference this June wearing a #staywoke T-shirt. But amid Dorsey’s activism, one data user, Chicago monitoring company Geofeedia, was hired by California police departments after pitching its ability to identify civil rights protesters, according to an American Civil Liberties Union report released in September. Twitter, which touts a policy that prohibits third parties from making content available “to investigate, track or surveil Twitter’s users or their content,” cut ties with Geofeedia in October.

    Twitter offers a free, stripped-down version of the full Firehose to the public, and in recent years, at least 17 companies besides Geofeedia have marketed surveillance products that make use of Twitter data to law enforcement organizations. One such company, Snaptrends, based in Austin, promoted social media analytics tools to authorities in Azerbaijan, Bahrain, Malaysia, Saudi Arabia, Turkey, and other countries known to suppress online speech, according to confidential company documents and interviews with current and former employees. The company often approached potential customers during moments of social unrest. In a statement, Snaptrends characterizes its business with foreign governments as appropriate and lawful, and says its software was intended for “market awareness around a brand, product, service, issue, or a person.”

    According to internal documents, Snaptrends has done business with the United Arab Emirates, whose government last year imprisoned an Omani blogger for tweets insulting the U.A.E.’s leaders. It also provided Twitter data to a law enforcement agency in Bangladesh that’s classified as a “death squad” by Human Rights Watch. As Kevin Hatline, a former customer support manager at Snaptrends, puts it, “We all knew this could be used to put a black bag over someone’s head and make them disappear.”

    Posted by Roger Stoned | November 9, 2016, 3:20 pm
  20. Isn’t that special, the GOP’s 2012 “autopsy” got replaced with a national 2016 terminal illness diagnosis. So now that the GOP has complete control of all the federal levers of power and watching the GOP kill the future is set to become America’s new pastime, it’s worth noting that there’s fun new way active game you can play too: Finding something you can do that lands you on Trump’s enemies list:

    Salon

    Omarosa hints at a Donald Trump enemies list: “It’s so great our enemies are making themselves clear”
    The Trump administration may be pretty vindictive

    Matthew Rozsa

    Wednesday, Nov 9, 2016 09:31 AM CST

    Foreshadowing the possibility that the worst fears of Donald Trump’s critics have merit, Omarosa Manigault — who met Trump while competing on “The Apprentice” and has campaigned for him in this election — has discussed how the Republican victor has been keeping an enemies list.

    “It’s so great our enemies are making themselves clear so that when we get in to the White House, we know where we stand,” Manigault told Independent Journal Review at Trump’s election night party on Wednesday.

    She also referenced a tweet sent by South Carolina Sen. Lindsey Graham on Tuesday afternoon.

    I voted @Evan_McMullin for President. I appreciate his views on a strong America and the need to rebuild our military. #3— Lindsey Graham (@LindseyGrahamSC) November 8, 2016

    “If [Graham] felt his interests was with that candidate, God bless him,” Manigault remarked. “I would never judge anybody for exercising their right to and the freedom to choose who they want. But let me just tell you, Mr. Trump has a long memory and we’re keeping a list.”

    “If [Graham] felt his interests was with that candidate, God bless him,” Manigault remarked. “I would never judge anybody for exercising their right to and the freedom to choose who they want. But let me just tell you, Mr. Trump has a long memory and we’re keeping a list.

    They’re already keeping a list! And there’s a spot on that list for all patriotic Americans. They just have to figure out how to get there and at least allow this nation to die with a little grace and dignity.

    What’s going to be extra interesting is seeing just how many GOPers not already on that list end up on that list before his term is over. Why? Because with the GOP just one “accident” or major Trump-specific scandal away from seeing President Mike Pence – the GOP/Koch Brothers’ unabashed dream President – it’s not clear how long the intra-GOP honeymoon period will last. Especially if Trump behaves like…well Trump, and ends up trashing the GOP brand even more than it’s already been trashed. Don’t forget that part of Trump’s appeal to the GOP is that he wasn’t seen as a normal GOPer but something new. So now that the GOP basically “owns” the future by controlling all levers of power – along with all the blame the public will apply to the GOP after Trump/GOP policies inevitably destroys lives – we probably shouldn’t be too surprised if factions within the GOP start plotting for a Trumpexit of one form or another if Trump ends up governing like the unhinged lunatic he appears to actually be in real life and ends up the kind of national embarassment that makes George W. Bush look like a statesman. In other words, while Trump’s enemies list will probably be mostly comprised of his political enemies on the Left, there’s going to be no shortage of scenarios that could end up with quite a few GOP Trump enemies too. More precisely, the more unhinged and disastrous Trump’s president is, the longer that GOP enemies list is probably going to get. Especially if the nation sours on Trump before the 2018 mid-term elections and GOPers start feeling the need to distance themselves from Trump. That’s clearly not going to go over well with the Trumpster!

    But also note that Trump represents basically an neo-Nazi fascist takeover of the White House and is seen as a vehicle by open Nazis in the Alt-Right to mainstream and legitimize their grip on real political power. And that means any elected Republicans who don’t make it very clear that they are fully supportive of a white nationalist fascist takeover of the nation are probably going to be preemptively put on that list, whether they overtly oppose Trump or not. There’s a purge coming, folks! And if the GOP doesn’t allow Donald Trump to completely remake the party in the Alt-Right image – whether this looks like it’s going to help or hurt the party in the long run – the GOP is going to be ground zero for that purge. Oddly enough, Trump’s era of neo-McCarthyism could start with the GOP. So, with all that in mind, here’s a taste of what’s going to happen to the people put on Trump’s enemies list. It should be a familiar taste at this point:

    Reuters

    Report: FBI Examining Fake Documents Targeting Clinton Campaign
    In a letter identified as fake, Senator Tom Carper, a Democrat, is quoted as writing to Clinton, “We will not let you lose this election.”

    Mark Hosenball
    11/04/2016 09:04 am ET | Updated

    WASHINGTON, Nov 4 (Reuters) – The FBI and U.S. intelligence agencies are examining faked documents aimed at discrediting the Hillary Clinton campaign as part of a broader investigation into what U.S. officials believe has been an attempt by Russia to disrupt the presidential election, people with knowledge of the matter said.

    U.S. Senator Tom Carper, a Democrat on the Senate Homeland Security Committee, has referred one of the documents to the FBI for investigation on the grounds that his name and stationery were forged to appear authentic.

    In a document forged to appear as though Carper was writing a letter to Clinton, Carper is quoted as saying the Department of Homeland Security had advised him of a risk that a “massive” cyber attack “could change the election results in favor of a specific candidate.” The document dated October 3 was reviewed by Reuters.

    It concludes, “Any suspicious incident will be immediately reported to your assistants so that a recount of votes could be timely organized. You will not lose the election because of some compromised electronic voting systems.”

    The fake Carper letter is one of several documents presented to the Federal Bureau of Investigation and the U.S. Department of Justice for review in recent weeks, the sources said.

    Carper spokeswoman Meghan Pennington confirmed on Friday that the senator had sent a copy of the letter to the FBI and the Senate’s chief law enforcement officer.

    “Our office became aware of a fake letter on Senator Carper’s official letterhead and immediately referred it to federal law enforcement to investigate its genesis,” Pennington said.

    As part of an investigation into suspected Russian hacking, FBI investigators have also asked Democratic Party officials to provide copies of other suspected faked documents that have been circulating along with emails and other legitimate documents taken in the hack, people involved in those conversations said.

    A spokesman for the FBI confirmed the agency was “in receipt of a complaint about an alleged fake letter” related to the election but declined further comment. Others with knowledge of the matter said the FBI was also examining other fake documents that recently surfaced.

    U.S. intelligence officials have warned privately that a campaign they believe is backed by the Russian government to undermine the credibility of the U.S. presidential election could move beyond the hacking of Democratic Party email systems. That could include posting fictional evidence of voter fraud or other disinformation in the run-up to voting on Nov. 8, U.S. officials have said.

    Russian officials deny any such effort.

    In addition to the Carper letter, the FBI has also reviewed a seven-page electronic document that carries the logos of Democratic pollster Joel Benenson’s firm, the Benenson Strategy Group, and the Clinton Foundation, a person with knowledge of the matter said.

    The document, identified as a fake by the Clinton campaign, claims poll ratings had plunged for Clinton and called for “severe strategy changes for November” that could include “staged civil unrest” and “radiological attack” with dirty bombs to disrupt the vote.

    Like the Carper letter, it was not immediately clear where the fraudulent document had originated or how it had begun to circulate.

    On Oct. 20, Roger Stone, a former Trump aide and Republican operative, linked to a copy of the document on Twitter with the tag, “If this is real: OMG!!”

    Benenson’s firm had no immediate comment. Craig Minassian, a spokesman for the Clinton Foundation, said the document was “fake.” He said he did not know if the FBI had examined it.

    Stone did not respond to emails requesting comment.

    A spokesman for the Clinton campaign, Glen Caplin, said the document was a fake and part of a “desperate stunt” to capitalize on the leak of Democratic emails by Wikileaks.

    “The document, identified as a fake by the Clinton campaign, claims poll ratings had plunged for Clinton and called for “severe strategy changes for November” that could include “staged civil unrest” and “radiological attack” with dirty bombs to disrupt the vote.”

    And that, right there, is probably going to be almost typical by the end of Trump’s term: faked documents, maybe pushed by Wikileaks or maybe just spread around by Roger Stone-types on the internet. When you consider that leaked documents about his enemies was the greatest ally of the Trump campaign, a campaign that is basically the manifestation of ‘the Big Lie’ succeeding in democratic politics, it’s pretty clear that the kinds of dirty tricks depicted above are going to be the New Normal. So it should be interesting to see what the inevitable documents about Lindsey Graham will say. They won’t even have to be fake documents claiming Lindsey is planning a dirty-bomb attack. They could just be real hacked documents that get farcically promoted as evidence that Linsday Graham is, say, a Satanist who kidnaps children. You know, kind of like the video from a neo-Nazi twitter account Donald Trump Jr. promoted days before the election:

    Media Matters

    Donald Trump Jr. Promotes “Alt-Right” Video Claiming Clinton Camp Has Satanists Who Want To Kidnap Kids

    Trump Jr.-Promoted Video Praises Trump Jr. For Looking Like He Wants To “Waterboard Or Guillotine” Clinton’s Circle

    Blog ››› November 7, 2016 2:13 PM EST ››› ERIC HANANOKI

    Donald Trump Jr. promoted an “alt-right” video on his Twitter account that suggests Democratic nominee Hillary Clinton’s campaign is engaged in satanism and her aides are trying to “kidnap your children, make them disappear, sell them into all kinds of things.” The video features “alt-right” bloggers Vox Day, who claims blacks are inferior to whites, and Mike Cernovich, a rape apologist.

    On November 4, Trump Jr. retweeted the video, in which blogger Stefan Molyneux talks with Cernovich and Day about the “spirit cooking scandal”:

    [see tweet image]

    The “spirit cooking scandal” refers to a hacked email posted to WikiLeaks in which lobbyist Tony Podesta asked his brother, Clinton campaign chairman John Podesta, if he wanted to attend a “spirit cooking dinner” hosted by performance artist Marina Abramovic. Trump supporters have used the invitation to claim that Podesta and the Clinton campaign are Satan worshippers. The Washington Post debunked the absurd claim, writing that an email “inviting Clinton’s campaign chair to dinner — a dinner he didn’t even attend — is not proof of any of the things that the Trump Internet is claiming about it right now.”

    During the video, Molyneux says the news is “extraordinary,” referring to the “Podesta emails, which is all this spirit cooking stuff, and invitations to what seems like occult magic/satanic rituals/I don’t know what the hell is going on.” Cernovich claimed that the allegations are “worse” than what people are saying and that “John Podesta and his brother are doing this together with who knows how many people are there.”

    The video also suggests Podesta and his allies might be luring children with their alleged “spirit cooking” parties — a variation of the “pants on fire” false claim that the Clintons are running an underground sex ring targeting children.

    Vox Day asked: “Given all of the other weirdness that is surrounding Podesta, and is surrounding these people — because these are the same people that were talking about this whole spirit cooking thing. And so that’s what’s very troubling. I mean, would you ever want your young children going to a party with John Podesta and his spirit cooking?”

    Mike Cernovich later said: “If you’re going to have children, you don’t want to live in a world where these people could potentially kidnap your children, make them disappear, sell them into all kinds of things, or who knows what. And that’s what people are realizing now is the gatekeepers are gone. The media people, they’re not writing about this because they’re right there at these parties — with them.”

    Day also praised Trump Jr., saying that “he looks like he wants to personally waterboard or guillotine every single member of Hillary Clinton’s circle” during the debates.

    Vox Day is an “alt-right” writer with a history of pushing racist and misogynistic rhetoric. He has tweeted that “I support white nationalism.” He also tweeted that “I am an Alt Right nationalist, I’m American Indian.”.=

    Day has a long history of racism. He has tweeted that African-Americans have lower IQs than others, are more prone to violence, and are worse than an atomic bomb for a city:

    And from his blog:

    As for the idea of stronger blacks and smarter Asians serving whites, that could not be further from my own position on ideal interracial relations. My belief is that every population group, every human sub-species, every nation, is better served by furthering a homogeneous group interest. To put it crudely, whites would do well to pick their own cotton and count their own money, blacks would do well to build their own power stations and grow their own crops, and yellows would do well to develop their own technologies and establish their own university systems. Let Israel be Israel and let Myanmar be Myanmar.

    Mike Cernovich is another “alt-right” activist, who operates a website that attacks feminists and disputes the validity of date rape claims. He has tweeted: “the hotter the sex, the more closely it resembles rape,” “the only rape culture is Muslim rape culture,” and “why should I care when women are raped?” Cernovich is a favorite of the Trump campaign.

    Trump Jr. has repeatedly interacted with white nationalists and promoted their work. In March, he retweeted the false claim from Vox Day that “The ‘Trump Nazi’ is Portia Boulger, who runs the Women for Bernie Sanders Twitter account.” And he also:

    * posted an image celebrating “Pepe the Frog, a symbol that has been co-opted by white supremacists and nationalists”;

    * said during a radio interview that the media would be “warming up the gas chamber” if Trump lied like Hillary Clinton has;

    * retweeted anti-Semitic writer Kevin MacDonald, whom the Southern Poverty Law Center calls “the neo-Nazi movement’s favorite academic”; and

    * gave an interview to white nationalist radio host James Edwards, during which Edwards and Trump Jr. complained about “political correctness.”

    Trump Jr. has unsurprisingly become a hero to white nationalists and neo-Nazis.

    “Mike Cernovich later said: “If you’re going to have children, you don’t want to live in a world where these people could potentially kidnap your children, make them disappear, sell them into all kinds of things, or who knows what. And that’s what people are realizing now is the gatekeepers are gone. The media people, they’re not writing about this because they’re right there at these parties — with them.””

    Is Lindsey Graham going to end up getting exposed as a secret child-killing Satanist or secretly plotting a dirty-bomb attack? We’ll find out! And when we do, we can be confident that Donald Trump Jr. will be there to tweet about it. It’s all a reminder that it won’t just be Trump’s enemies list. It’s going to be the Alt-Right’s enemies list too, which the Trump administration will be more than happy to promote. Isn’t the age of the neo-Nazi enemies-list going to be fun?

    Of course, maybe Trump’s enemies are hoping that there’s no way anyone could possibly believe such absurdities about them because such claims won’t remotely reflect their real track-record. Maybe that’s what they’ll assume. If so, LOL!

    The New Republic

    The Truth About Hillary Clinton
    She’s honest and trustworthy. Donald Trump is not. That voters believe otherwise is a triumph of branding over facts.

    By Graham Vyse
    November 8, 2016

    Hillary Clinton is on the cusp of history, likely to be elected Tuesday as America’s first female president. That’s a momentous achievement for a woman who’s already peerless in our public life. Yet the bigger story of this Election Day is a nation on the brink, with Donald Trump’s victory improbable but still possible despite his manifest unfitness for office and the danger he poses to our democracy and the world’s stability.

    Part of the reason for that possibility can be found in public opinion of the candidates. By four percentage points, likely voters in two national surveys hold a belief that’s demonstrably untrue: that Trump is more honest and trustworthy than Clinton. Voters trust Trump over Clinton 44 percent to 40 percent, according to an ABC News/Washington Post poll taken November 2-5; and by 37 percent to 33 percent, according to a Fox News poll taken November 3-6.

    It’s positive news that a strong majority of these Americans knows Trump can’t be trusted. His candidacy has flummoxed fact-checkers, and his capacity for lying is unprecedented in presidential politics. But to believe that Clinton is just as bad or even worse than Trump on this issue is to succumb to false equivalence.

    The 2016 campaign has not been, as Meet the Press moderator Chuck Todd said on MSNBC Monday, a “post-truth election.” Clinton has not run a post-truth campaign. She hasn’t always been truthful; The Washington Post’s Fact Checker awarded her seven of its worst Four-Pinocchio ratings throughout the race. But critically, the Post noted that this is an average score, putting her “in about the same range as President Obama and former Massachusetts governor Mitt Romney in 2012.” (There was far less discussion about the end-of-truth-as-we-know-it four years ago.)

    Moreover, “Trump has amassed such a collection of Four-Pinocchio ratings—59 in all—that by himself he’s earned as many in this campaign as all other Republicans (or Democrats) combined in the past three years.” Todd acknowledged the differential in his segment, but failed to drive the point home.

    It’s not just the Post either. PolitiFact published a comparison of Clinton and Trump on its , and the vast majority of her statements were all or partially truth. The vast majority of his statements were all or partially false.

    As The Atlantic’s conservative senior editor, David Frum told The Ezra Klein Show over the weekend, “Hillary Clinton tells lies, but she never forgets that the truth is there.” She might shade the truth or hide it, misrepresent it or even evade it—as all politicians sometimes do. What she rarely does is deny it outright.

    Trump, of course, does that constantly. As Vox put it succinctly a month ago, he “has spent his entire campaign gaslighting America by denying that he ever said or did things that we have clear video or text evidence that he did, in fact, say or do.”

    Clinton’s honesty needn’t be graded on a Trumpian curve. In August, Kevin Drum at Mother Jones concluded “Hillary Clinton Is One of America’s Most Honest Politicians,” citing the chart above, of PolitiFact scores for 20 of America’s most prominent pols. Drum noted that The New York Times reached a similar conclusion; Jill Abramson, the former executive editor of the Times, called Clinton “fundamentally honest and trustworthy” in her Guardian column in March, citing PolitiFact and her own reporting.

    Clinton can even be honest to a fault. Several times during this campaign, she has told a truth at her own political expense.

    How come voters see Trump, for whom serial dishonesty isn’t even his most damning character flaw, as more honest and trustworthy than Clinton? There’s an element of sexism, to be sure. And there’s a kernel of truth to the “vast right-wing conspiracy”—a sustained, coordinated campaign that has for decades sought to destroy the Clintons as a political force.

    The key, however, is Trump’s one true talent for branding. That’s how he dispatched the likes of “Little Marco” and “Lyin’ Ted” in the primary, before relentlessly hammering “Crooked Hillary” as a liar on the stump (“She lies more than any human being,” he said two weeks ago) and in advertising. It’s further proof of the well-documented fact that simply repeating falsehoods can make people belief they’re true.

    Whatever the reasons, millions of Americans who are voting today somehow believe that Hillary Clinton is a liar who can’t be trusted. Here’s hoping she’ll get four years to prove them otherwise.

    “The key, however, is Trump’s one true talent for branding. That’s how he dispatched the likes of “Little Marco” and “Lyin’ Ted” in the primary, before relentlessly hammering “Crooked Hillary” as a liar on the stump (“She lies more than any human being,” he said two weeks ago) and in advertising. It’s further proof of the well-documented fact that simply repeating falsehoods can make people belief they’re true.”

    So that’s all part of what we can expect from the era of the Trump/Alt-Right enemies list, a list that will no doubt include nearly all progressive but also anyone that isn’t basically on board with an Alt-Right neo-Nazi future for America. So remember, if you aren’t doing the kinds of things that will get you labeled a child-killing Satanist planning on a dirty bomb attack, you probably aren’t actually trying to do the right thing in our Trumpian era.

    Posted by Pterrafractyl | November 9, 2016, 3:51 pm
  21. Since we’re now in a Trumpian era of “enemies lists” and a far-right power alignment that will create an irresistible potential for basically jailing the political opponents of Trump’s agenda, it’s probably worth noting that the Trump campaign is still dropping hints that its going to prosecute Hillary Clinton:

    The Washington Post

    Donald Trump could actually take steps to try to jail Hillary Clinton

    By Matt Zapotosky
    November 9, 2016

    Donald Trump said at a debate last month that he would appoint a special prosecutor to examine Hillary Clinton’s use of a private email server during her time as secretary of state and remarked that she would “be in jail” if he were president.

    In about two months, he’ll have the power to potentially make that a reality.

    He wouldn’t, of course, be able to snap his fingers and throw his political rival behind bars. He would have to order his attorney general to appoint a special prosecutor, then count on that special prosecutor to agree with his assessment that Clinton’s email practices violated criminal laws about mishandling classified information. And even if he did all that and Clinton was charged, she would still be afforded a trial, and Trump’s special prosecutor would have to contend with evidence that led the original team of federal investigators to conclude there was not sufficient basis to believe a crime occurred.

    Getting that process started, though, would not seem that difficult. Trump gets to pick and appoint the attorney general.

    FBI Director James B. Comey recommended in July that neither Clinton nor her aides be charged with any crimes in connection with her use of a private email server during her term at the State Department, saying “no reasonable prosecutor” would bring such a case. He said in recent weeks that his conclusion was unchanged, even after investigators examined a new, potentially relevant batch of emails discovered on a computer belonging to disgraced former congressman Anthony Weiner, the husband of top Clinton aide Huma Abedin.

    Trump rallies have sometimes been marked with chants of “lock her up,” and his supporters repeated those cries as the Republican moved toward an upset victory Tuesday night. Kellyanne Conway, his campaign manager, did not rule out appointing a special prosecutor in TV appearances Wednesday morning.

    “We didn’t discuss that last night and he did not discuss that with Hillary Clinton on the phone,” Conway said in one appearance.

    President Obama could short-circuit the affair entirely, pardoning Clinton before he leaves office in January. Legal analysts have said that could happen even though Clinton is not charged with any crimes. Such was the case with Richard Nixon, who was given a full pardon by Gerald R. Ford before he was indicted for all offenses he “committed or may have committed or taken part in” during his time in office.

    Even prominent conservatives in the legal field have said that for Trump to act to jail Clinton would be inadvisable, and it would politicize the Justice Department in an alarming way. Former attorney general Michael Mukasey, one of Clinton’s most vocal critics on the email issue, told The Washington Post last month, “It would be like a banana republic.” Those remarks came after Trump broached the idea of a special prosecutor at a debate.

    “I didn’t think I’d say this, but I’m going to say it, and I hate to say it. But if I win, I am going to instruct my attorney general to get a special prosecutor to look into your situation, because there has never been so many lies, so much deception,” Trump said. “There has never been anything like it, and we’re going to have a special prosecutor.”

    Later, when Clinton said, “It’s just awfully good that someone with the temperament of Donald Trump is not in charge of the law in our country,” Trump replied, “Because you’d be in jail.”

    Conway later said on MSNBC’s “Morning Joe” that Trump’s remark about jailing Clinton was a “quip.” She added, “As for the special prosecutor, I think that’s Donald Trump channeling the frustration he hears from thousands of voters out on the stump every day.”

    During his victory speech, Trump said, “It is time for us to come together as one united people” and said that Clinton had “worked very long and very hard over a long period of time, and we owe her a major debt of gratitude for her service to our country.” He made no mention of Clinton’s emails.

    “Trump rallies have sometimes been marked with chants of “lock her up,” and his supporters repeated those cries as the Republican moved toward an upset victory Tuesday night. Kellyanne Conway, his campaign manager, did not rule out appointing a special prosecutor in TV appearances Wednesday morning.

    “Hmmmm…maybe we’ll prosecute Hillary…we haven’t decided yet.” That was basically the message coming from Trump’s campaign manager on election night. And today Rudy Giuliani, someone on the short list to be Attorney General, gave us an update on the Trump administration’s stance: Rudy thinks it’s a “tough decision” and still isn’t sure what Trump should do:

    AFP

    Top Trump aide refuses to rule out Clinton prosecution

    November 10, 2016

    Washington (AFP) – A top aide to President-elect Donald Trump on Thursday refused to rule out prosecuting Democrat Hillary Clinton or investigating the foundation run by former president Bill Clinton.

    Ex-New York mayor Rudy Giuliani, a likely member of the incoming president’s cabinet, told CNN that it was a “tough decision” on whether a special prosecutor should be appointed to look into possible illegal Clinton activities, as Trump threatened to do on the campaign trail.

    “It’s been a tradition in our politics to put things behind us. On the other hand you have to look at how bad was it?” he said.

    “Equal administration of justice. It’s one of our most important principles,” he said.

    Trump in August called for a special prosecutor — an independent outsider — to probe the financial dealings of the Clinton Foundation, claiming while on the campaign trail that the FBI and the Justice Department could not be trusted to impartially investigate the case.

    Trump suggested that the foundation allowed Clinton to set up a “pay for play” scheme while she was the US secretary of state.

    Speaking on Fox, the ex-mayor said “I don’t think President Obama should pardon her” — even though Clinton has not been convicted of any crime.

    Giuliani was coy when asked if he’d accept if offered the office of the US attorney general.

    “I certainly have the energy, and there’s probably nobody that knows the Justice Department better than me,” he told CNN.

    “It’s been a tradition in our politics to put things behind us. On the other hand you have to look at how bad was it?”

    Yes, the depiction of Hillary Clinton’s corruption, as portrayed by the right-wing smear machine, did indeed look pretty bad. It also looked divorced from reality for anyone not living in a far-right media bubble. But for the dedicated audiences of the GOP’s Big Lie narrative, it’s not all that surprising that they might still be thinking about prosecuting her. After all, Trump repeatedly told the nation that Hillary Clinton “may be the most corrupt person ever to seek the presidency”. Banana Republic here we come! Don’t forget that the FBI is infested with Breitbart fans so who knows what kind of zany this is going to go. Especially after the House GOP joins in on the fun:

    The Salt Lake Tribune

    Utah’s Chaffetz vows to continue Clinton investigations, keep eye on Trump

    By THOMAS BURR
    First Published Nov 09 2016 01:00PM • Last Updated Nov 09 2016 09:49 pm

    Washington • Hillary Clinton may have lost the presidential race but will still face ongoing probes into her use of private email servers and handling of classified information, the chairman of the House Oversight and Government Reform Committee said Wednesday.

    Rep. Jason Chaffetz, R-Utah, said he still has a “duty and obligation” to investigate the actions of the former secretary of state and it doesn’t matter that she won’t be occupying the White House come January.

    “I’m not out to get her,” Chaffetz said, “but I am here to find the truth and make sure that it never happens again.”

    The chairman’s comments did not go over well with Democrats on the committee.

    The House’s chief investigator, Chaffetz has held several hearings on the former secretary of state’s use of private, non-government email to send and receive emails. The FBI concluded in a yearlong review that while Clinton had been reckless it did not amount to criminal wrongdoing.

    Chaffetz, who had said before the election that he had years of material to investigate Clinton, says he will bring the same gusto to President-elect Donald Trump’s administration, though he said he expects a Republican White House to work with the Oversight Committee rather than fight it like the Obama administration.

    The State Department and Clinton said they had turned over tens of thousands of pages of emails to the committee.

    The Utah Republican says he will go “wherever the evidence takes us.”

    “I am optimistic that a Trump administration would actually be cooperative,” Chaffetz said. “The Obama administration has given us the stiff arm every single step of the way. I think a new administration would actually work with us to quickly get to the truth, learn what we need to learn and then fix it.”

    “I’m not out to get her…but I am here to find the truth and make sure that it never happens again.”

    Bwah! Wow, the next four years is just going to be one long troll ride. One long white supremacist troll ride. But at least it will be completely clear that the GOP is fully on board with Trump’s Banana Republic agenda.

    Now, is all this talk coming from the GOP just preparing Trump’s base for an eventual let down or are Trump and the GOP really going to go through with this and make prosecuting your opponent a new American precedent. That’s not obvious at this point, but keep something in mind: the wrecking-ball nature of Trump’s GOP austerity agenda is guaranteed to make life a lot worse for huge swathes of Trump’s voting base. The wealthy Trump base will obviously get lots of government goodies, but average Trump voters are about to have to hopes for a better economic future and functional government services basically destroyed, and that means the only ‘positive’ accomplishments Trump and the GOP will realistically be able accomplish is the persecution of liberals and minorities. That’s about it. Sure, the evangelical base will be pleased by letting Mike Pence and the GOP roll back social policy back to the 1950’s. But for Trump’s non-evangelical supporters who can’t really be satisfied with the GOP’s traditional theocratic social agenda and who will be directly harmed by the GOP’s austerity agenda, ‘punching hippies’ is Trump’s main source of enduring appeal.

    So for all the warnings to Trump about how prosecuting Hillary could backfire, don’t neglect the fact that not doing things like persecuting Hillary really does deprive Trump of one of the primary political ‘gifts’ had can give to his base. And he’s going to need to give a lot of ‘gifts’ of that nature to give considering that all almost all the fiscal gifts are going to the super-wealthy and giant banks. It’s one of many reasons we really can’t rule the prosecution and jailing of Hillary out. It’s also one of the many reasons the Trump administration’s use of the justice department to destroy his opponent probably isn’t going to end with Hillary. Or elected Democrats for that matter. Given how destructive the Trump/GOP agenda is going to be to the lives of his supporters, he’s going to have to jail a lot more enemies than just elected Democrats.

    Posted by Pterrafractyl | November 10, 2016, 3:58 pm
  22. Now that Donald Trump won the 2016 election after spending most of his campaign constantly asserting that there was going to be massive voter fraud and vote rigging, it’s worth noting that one of the few potentially positive outcomes of a Trump administration is the possibility that we’ll see an increased public awareness of the decrepit and absurdly insecure electronic voting machines still in use today. After all, the bogus election day exit-polling operation set up Trump’s dirty trickster Roger Stone was predicated on the assumption that there was going to be massive pro-Democrat electronic voting hacking. After Trump made that scenario a key theme of his campaign there’s basically no excuse for a Trump administration to not push for either replacing all those old, unreliable machines with new secure machines or, ideally, ditching them altogether and returning paper ballots.

    So it will be interesting to see if electronic voting machines are even mentioned by the Trump administration. It will also be interesting to see if there actually is a Trump administration given the new reports by election experts of evidence hinting towards major pro-Trump voting machine hacking in key swing states:

    Talking Points Memo Livewire

    Computer Scientists Pushing Clinton To Ask For Recount In 3 States

    By Caitlin MacNeal
    Published November 23, 2016, 8:01 AM EDT

    This post has been updated.

    A group of computer scientists believe they have evidence that suggests voting machines in Wisconsin, Michigan, and Pennsylvania have been hacked and have been urging the Hillary Clinton campaign to ask for a recount in the three key states, according to a New York Magazine report.

    CNN confirmed that the experts have been in touch with John Podesta, Clinton’s campaign chair, and Marc Elias, the campaign’s general counsel.

    The group includes John Bonifaz, a voting rights attorney, and J. Alex Halderman, the director of the University of Michigan Center for Computer Security and Society, according to New York Magazine.

    They have not found evidence of hacking, but say that voting patterns they analyzed suggest hacking could have taken place, according to the New York Magazine report. They group of experts told the Clinton campaign that an independent review of the patterns should be conducted, according to New York Magazine.

    The experts presented their findings to the Clinton campaign, telling them that Clinton received 7 percent fewer votes in counties that used electronic voting machines in Wisconsin, according to New York Magazine. The report in New York Magazine did not mention the group’s findings in Michigan or Pennsylvania.

    If the results in Wisconsin and Pennsylvania were overturned and Clinton won the state of Michigan, the total of 36 electoral votes would secure Clinton the victory.

    Halderman on Wednesday morning offered an explanation on why he believes states should conduct a recount by hand and said that the New York Magazine story “includes somebody else’s description of my views, incorrectly describes the reasons manually checking ballots is an essential security safeguard (and includes some incorrect numbers, to boot).”

    He did not go on to correct the numbers used in the New York Magazine piece, but instead explained in a post on Medium that he believes states must check ballots manually. Halderman argued that electronic voting machines are very susceptible to hacking and cited reports that Russian hackers obtained emails from the Democratic National Committee and Joh Podesta, the Clinton campaign chair. And he wrote that checking paper ballots by hand is an “absolutely essential security safeguard,” but that not all states require it.

    “Examining the physical evidence in these states—even if it finds nothing amiss—will help allay doubt and give voters justified confidence that the results are accurate,” Halderman wrote. “It will also set a precedent for routinely examining paper ballots, which will provide an important deterrent against cyberattacks on future elections. Recounting the ballots now can only lead to strengthened electoral integrity, but the window for candidates to act is closing fast.”

    He did note that it’s not likely voting machines were hacked.

    “Were this year’s deviations from pre-election polls the results of a cyberattack? Probably not. I believe the most likely explanation is that the polls were systematically wrong, rather than that the election was hacked. But I don’t believe that either one of these seemingly unlikely explanations is overwhelmingly more likely than the other,” he wrote.

    The experts may have more evidence than the findings about patterns in Wisconsin laid out in the New York Magazine article, but data scientists on Tuesday night seemed skeptical of the findings that were made public, as the Huffington Post noted. The New York Times’ Nate Cohn indicated that the group’s findings detailed by New York Magazine were “weak.”

    Nate Silver also cast doubt on the findings laid out in the New York Magazine report.

    “Examining the physical evidence in these states—even if it finds nothing amiss—will help allay doubt and give voters justified confidence that the results are accurate,” Halderman wrote. “It will also set a precedent for routinely examining paper ballots, which will provide an important deterrent against cyberattacks on future elections. Recounting the ballots now can only lead to strengthened electoral integrity, but the window for candidates to act is closing fast.””

    That’s a critical point here: Even if there’s no hacking discovered, and even if there are plenty of doubts coming from other experts as to whether or not these findings actually point towards hacking, there’s no reason not to investigate these claims because otherwise the Trump administration is going be dogged by claims that it stole the election for the rest of his term.

    So while everyone is waiting to see if the Clinton campaign officially calls for an investigation, don’t forget that the Trump administration has an incentive to see these claims investigated too after spending a year shrieking about how Hillary was going to steal the election. Sure, the GOP as a party probably doesn’t care if Trump’s legacy is tainting with suspicions that Trump’s team, or some third party, stole the election for Trump. But Trump presumably cares, doesn’t he? As he must realize, the lower his popularity ratings go, the more these unresolved issues are going to take hold in the mind of the electorate. Does the Cheater in Chief not care if he’s seen as a Cheater in Chief?

    So while it’s doubtful that these claims will really get investigated or lead to anything as dramatic as a reversal of the election outcome, and it’s very possible that there are other explanations for these observed anomalies, there’s really no reason this story should be dropped even after Trump is sworn into office if this isn’t investigated. Along with all the other questions raised about electronic voting machines over the last dozen years that somehow don’t get adequately investigated.

    Posted by Pterrafractyl | November 23, 2016, 4:03 pm

Post a comment