Spitfire List Web site and blog of anti-fascist researcher and radio personality Dave Emory.

News & Supplemental

These entries present indi­vid­ual sto­ries and top­ics, some­times with ana­lyt­i­cal com­men­tary.

This category contains 1397 posts

Failure

In the first two pro­grams after the 9/11 attacks, Mr. Emory pre­sent­ed excerpts from his pro­grams which direct­ly fore­shad­owed the attacks. That event and those that fol­lowed embody the fail­ure of Amer­i­can soci­ety. Serge Schme­mann wrote the lead arti­cle for “The New York Times” the day after the attack. He also craft­ed a “hit-piece” review of Christo­pher Simp­son’s “Blow­back.” That is not sur­pris­ing, giv­en Schme­man­n’s back­ground and some of the “Gray Lady’s” hir­ing prac­tices. WFMU-FM is pod­cast­ing For The Record–You can sub­scribe to the pod­cast HERE.


Brazilian Manifestation of The Fascist International

In AFA#1, we high­light­ed Third Reich Finance Min­is­ter von Krosigk’s use of the term “Iron Cur­tain” in a Nazi pro­pa­gan­da broad­cast short­ly before the end of the war. Win­ston Churchill “bor­rowed” the phrase for use in his famous speech in Spring­field, Mis­souri, which enshrined it in the rhetor­i­cal lex­i­con of The Cold War. Now, von Krosigk’s granddaughter–a par­lia­men­tary rep­re­sen­ta­tive for the AfD par­ty in Germany–is net­work­ing with Brazil­ian pres­i­dent Jair Bol­sonaro in order to fur­ther the solid­i­fi­ca­tion of “Fas­cist Inter­na­tion­al.” WFMU-FM is pod­cast­ing For The Record–You can sub­scribe to the pod­cast HERE.


Me Ne Frego

In an ear­li­er post, we not­ed that Mela­nia Trump’s jacket–adorned with the state­ment “I Real­ly Don’t Care, Do U” res­onates with a key fas­cist mot­to. The phrase “Me Ne Frego” was put for­ward by Mus­soli­ni him­self. (“Il Duce” detailed his state­ment in his “The Doc­trine of Fas­cism) as a defin­i­tive state­ment of the exis­ten­tial eth­ic of the fas­cist stormtroop­er. WFMU-FM is pod­cast­ing For The Record–You can sub­scribe to the pod­cast HERE.


What Are the “Seeing Stones” Seeing?

We have dis­cussed Palan­tir and its depre­da­tions in numer­ous pro­grams. The news that Palantir–the alpha preda­tor of the elec­tron­ic sur­veil­lance land­scape and inex­tri­ca­bly linked with the most crit­i­cal parts of the intel­li­gence community–has bought mil­lions of dol­lars of gold bars and will accept pay­ment in gold bul­lion as pay­ment for future trans­ac­tions rais­es inter­est­ing ques­tions. (The com­pa­ny is named after the “see­ing stones” in the Lord of the Rings tril­o­gy.) This fol­lows the com­pa­ny’s relo­ca­tion to Den­ver from the Bay Area by rough­ly a year. Joe Biden’s Direc­tor of Nation­al Intel­li­gence Avril Haines was a key mem­ber of Biden’s tran­si­tion team, as well as a con­sul­tant to Palan­tir, the key play­er in which is Peter Thiel. Thiel is also a big part of “Team Trump”. WFMU-FM is pod­cast­ing For The Record–You can sub­scribe to the pod­cast HERE.


Avril Haines, The American Deep State, Event 201 and Palantir

In con­nec­tion with our “Oswald Insti­tute of Virol­o­gy” series, we note for pur­pos­es of empha­sis an alto­geth­er remark­able “coin­ci­dence,” which we doubt is a coin­ci­dence. On Octo­ber 18, 2019, there was a pan­dem­ic pre­pared­ness exer­cise called Event 201. ” . . . . The experts ran through a care­ful­ly designed, detailed sim­u­la­tion of a new (fic­tion­al) viral ill­ness called CAPS or coro­n­avirus acute pul­monary syn­drome. This was mod­eled after pre­vi­ous epi­demics like SARS and MERS. . . .” We have also not­ed that an impor­tant par­tic­i­pant in Event 201 was Avril Haines, for­mer Deputy Direc­tor of the CIA and now Biden’s Direc­tor of Nation­al Intel­li­gence. Haines was also a key mem­ber of Biden’s tran­si­tion team, as well as a con­sul­tant to Palan­tir, the key play­er in which is Peter Thiel. Thiel is also a big part of “Team Trump”. WFMU-FM is pod­cast­ing For The Record–You can sub­scribe to the pod­cast HERE.


Reflections on the Collapse in Afghanistan

The Afghan col­lapse was not a sur­prise. Emblem­at­ic of the fail­ure of the mil­i­tary effort was the Bush admin­is­tra­tion’s evac­u­a­tion of Al-Qae­da and Tal­iban com­bat­ants so they could escape U.S. mil­i­tary encir­clement. In the last pro­gram Mr. Emory did in 1999, he exam­ined George W. Bush’s polit­i­cal CV and her­itage, in order to gain per­spec­tive on what a Bush pres­i­den­cy might be like. Side 1 of the pro­gram began with dis­cus­sion of the Bin Laden fam­i­ly’s financ­ing of George W. Bush’s first ener­gy com­pa­ny. WFMU-FM is pod­cast­ing For The Record–You can sub­scribe to the pod­cast HERE.


Cyber Attribution, the Mega-Hacks of 2021, and the Existential Threat of Blind Faith in Bad-Faith

Move over COVID. 2021 is turn­ing out to be anoth­er year of the dig­i­tal virus. One mas­sive hack­ing sto­ry after anoth­er. Unre­lat­ed sto­ries in many cas­es, we are told. In par­tic­u­lar:
1. The Solar­Winds mega-hack announced in Decem­ber of 2020, blamed on Rus­sia, blamed on Cozy Bear
2. The Microsoft Exchange mega-hack dis­closed in March 2021, blamed on Chi­na.
3. The rev­e­la­tions about NSO Group’s over­sight (or lack there­of) of its pow­er­ful spy­ware sold to gov­ern­ments around the world.
4. The emerg­ing sto­ry of Can­diru, one of NSO Group’s fel­low “com­mer­cial sur­veil­lance ven­dors”, sell­ing toolk­its over­flow­ing with zero-day exploits, spe­cial­iz­ing in tar­get­ing Microsoft prod­ucts.

But how unre­lat­ed are these sto­ries? That’s the big ques­tion we’re going to explore in this post. A ques­tion punc­tu­at­ed by anoth­er meta-sto­ry we’ve looked at many times before: the meta-sto­ry of a cyber­at­tri­bu­tion par­a­digm seem­ing­ly designed to allow pri­vate com­pa­nies and gov­ern­ments to con­coct an attri­bu­tion sce­nario for what­ev­er guilty par­ty they want to fin­ger. As long as there was some sort of ‘clue’ found by inves­ti­ga­tors — like piece of Cyril­lic or Man­darin text or mal­ware pre­vi­ous­ly attrib­uted to a group — these clues were strung togeth­er in a “pat­tern recog­ni­tion” man­ner to arrive at a con­clu­sion about the iden­ti­ty of the per­pe­tra­tors. Attri­bu­tion con­clu­sions often arrived at with incred­i­ble lev­els of con­fi­dence. Recall how the Japan­ese cyber­se­cu­ri­ty firm Trend­Mi­cro attrib­uted a 2017 US Sen­ate email phish­ing cam­paign to ‘Pawn Storm’/Fancy Bear with 100 per­cent cer­tain­ty, and they made this high­ly cer­tain attri­bu­tion based heav­i­ly on how sim­i­lar the hack was to the 2017 hacks of Emmanuel Macron’s emails via a phish­ing cam­paign that Trend­Mi­cro attrib­uted at the time with 99 per­cent cer­tain­ty to Pawn Storm/Fancy Bear and yet the ANSSI, the French government’s cyber­se­cu­ri­ty agency, was leav­ing open the pos­si­bil­i­ty that the hack they could be the work of “oth­er high-lev­el” hack­ers try­ing to pin the blame on “Pawn Storm” (anoth­er name for “Fan­cy Bear”). Trend­Mi­cro was mak­ing 99 per­cent cer­tain attri­bu­tions that the French gov­ern­ment said could be any range of actors. That was the state of affairs for cyber­at­tri­bu­tions in 2017 and noth­ing has changed in the years since. High­ly cer­tain attri­bu­tions con­tin­ued to be piled on top of high­ly cer­tain attri­bu­tions — almost always point­ing towards Russ­ian, Iran, Chi­na, or North Korea — built on a foun­da­tion of what appear to be large­ly guess­work. Often high­ly moti­vat­ed guess­work (i.e. lies).


Summoning The Demon: Endgame of Social Darwinism?

In L‑2  (record­ed in Jan­u­ary of 1995), the dom­i­nant ide­o­log­i­cal tenet of Social Dar­win­ism was ana­lyzed in the con­text of the evo­lu­tion of fas­cism. When AI’s actu­al­ize the con­cept of “Sur­vival of the Fittest,” they are like­ly to objec­tive­ly regard a [large­ly] self­ish, small-mind­ed, alto­geth­er mor­tal and desirous human­i­ty with the deter­mi­na­tion that THEY–the AI’s–are the fittest. Near­ly 20 years later–in 2014–physicist Stephen Hawk­ing warned that AI’s would indeed wipe us out, if giv­en the oppor­tu­ni­ty. WFMU-FM is pod­cast­ing For The Record–You can sub­scribe to the pod­cast HERE.


September 2, 1945: The American Deep State Rolls the Dice

In FTR#1142, we detailed the lit­tle-known involve­ment of Chi­ang Kai-shek and Mme. Chi­ang Kai-shek in the 1943 con­fer­ences at Cairo and Teheran. (Mme. Chi­ang Kai-shek was the sis­ter of T.V. Soong, one of Chi­ang’s finance min­is­ters and the rich­est man in the world at one time.) This low-pro­file involve­ment appar­ent­ly gave them con­sid­er­able grav­i­tas in help­ing to shape the post­war geopo­lit­i­cal agen­da. While in Oki­nawa dur­ing Japan’s sur­ren­der in World War II, Colonel L. Fletch­er Prouty was wit­ness to the ear­ly com­mit­ment of deci­sive mil­i­tary resources to the wars that were to take place in Korea and Indochina/Vietnam. ” . . . . I was on Oki­nawa at that time, and dur­ing some busi­ness in the har­bor area I asked the har­bor­mas­ter if all that new mate­r­i­al was being returned to the States. His response was direct and sur­pris­ing: ‘Hell, no! They ain’t nev­er goin’ to see it again. One-half of this stuff, enough to equip and sup­ply at least a hun­dred and fifty thou­sand men, is going to Korea, and the oth­er half is going to Indochi­na.’ In 1945, none of us had any idea that the first bat­tles of the Cold War were going to be fought by U.S. mil­i­tary units in those two regions begin­ning in 1950 and 1965–yet that is pre­cise­ly what had been planned, and it is pre­cise­ly what hap­pened. Who made that deci­sion back in 1943–45? . . . .” WFMU-FM is pod­cast­ing For The Record–You can sub­scribe to the pod­cast HERE.


Oswald World

In numer­ous pro­grams we have not­ed the deci­sive­ly impor­tant posi­tion of avowed Chi­na hawk Avril Haines. Ms. Haines is the Direc­tor of Nation­al Intel­li­gence, and, as such, is in charge of the “inves­ti­ga­tion” into the “Lab-Leak The­o­ry.” The U.S. is now alleg­ing that Chi­na hacked key Microsoft email infra­struc­ture. Note in that con­text, that we have learned that the CIA’s hack­ing tools are specif­i­cal­ly craft­ed to mask CIA author­ship of the attacks. Most sig­nif­i­cant­ly, for our pur­pos­es, is the fact that the Agen­cy’s hack­ing tools are engi­neered in such a way as to per­mit the authors of the event to rep­re­sent them­selves as Chi­nese, among oth­er nation­al­i­ties. ” . . . . These tools could make it more dif­fi­cult for anti-virus com­pa­nies and foren­sic inves­ti­ga­tors to attribute hacks to the CIA. Could this call the source of pre­vi­ous hacks into ques­tion? It appears that yes, this might be used to dis­guise the CIA’s own hacks to appear as if they were Russ­ian, Chi­nese, or from spe­cif­ic oth­er coun­tries. . . .”