Dave Emory’s entire lifetime of work is available on a flash drive that can be obtained HERE. The new drive is a 32-gigabyte drive that is current as of the programs and articles posted by early winter of 2016. The new drive (available for a tax-deductible contribution of $65.00 or more.) (The previous flash drive was current through the end of May of 2012.)
WFMU-FM is podcasting For The Record–You can subscribe to the podcast HERE.
You can subscribe to e‑mail alerts from Spitfirelist.com HERE.
You can subscribe to RSS feed from Spitfirelist.com HERE.
You can subscribe to the comments made on programs and posts–an excellent source of information in, and of, itself HERE.
COMMENT: Some cyber-security experts view the “Russian intelligence” hacking of DNC computers as suspiciously transparent. Noting that the hacker seems to have left information available pointing to a Russian culprit, some have asked if a serious, professional intelligence service would do something like that.
It reminds us of the Lee Harvey Oswald doubles who were traveling all around and taking actions that would point to, and incriminate Oswald as the supposed assassin who killed President Kennedy. Recall that one of the nicknames we have assigned Snowden is “The Obverse Oswald.”
We wonder if “Team Snowden” might have something to do with this? Julian Assange has been quite open about wanting to damage Hillary Clinton’s chances to win the Presidency.
Both Snowden and Julian Assange are ultra-right wingers and big fans of Ron Paul, who expresses sentiments similar to those voiced by the Trumpenkampfverbande. The hack seems likely to propel Hillary more in the direction of the New Cold War than she is already inclined to navigate, if she wins.
WikiLeaks’ operations for Russia and Scandinavia are overseen by Assange’s Holocaust denying close aide Joran Jermas (aka “Israel Shamir”) and his son Johannes Wahlstrom, a bird of the same political feather. It was Jermas/Shamir who arranged for WikiLeaks to be hosted on the Pirate Bay server, financed by Swedish fascist Carl Lundstrom.
Snowden, of course, is in Russia right now, working for a computer firm. Does he have anything to do with this? Recall it was Snowden’s journey to Russia, courtesy of Sarah Harrison and WikiLeaks, that put the final nail in the coffin of the “reboot with Russia” undertaken by Obama’s State Department under Hillary Clinton.
Pierre Omidyar, who’s First Look Media were the recipient of Snowden’s NSA files and which employs Nazi fellow-traveler Glenn Greenwald, helped finance the Ukraine coup.
In a future program and/or post, we will look at “corporate Germany’s” dissatisfaction with the sanctions on Russia. They are costing German firms a great deal of money. Bear in mind that the Bormann capital network controls corporate Germany. The situation of German firms and Russia must also be evaluated against traditional German “Ostpolitik,” which is covered at length in Germany Plots with the Kremlin available for download for free on this website.
We mention this, because Trump’s comments about Putin, Russia and NATO have led most observers to assume he is a “Kremlin stooge.” We suspect he may actually be under the control of the Bormann capital network and his expressed attitudes toward Russia reflect corporate Germany’s dissatisfaction with the US-led sanctions.
UPDATE: A former German hacktivist has weighed in, casting further doubt on Russian authorship of the hack.
“Russia Wanted to Be Caught, Says Company Waging War on the DNC Hackers” by Patrick Tucker; Defense One; 7/28/2016.
. . . . But security expert Jeff Carr thought the smoke off this smoking-gun was a bit too thick. In his minority report, he asks: what kind of spy ring tags their stolen docs before releasing them under a cover?
“Raise your hand if you think that a GRU or FSB officer would add Iron Felix’s name to the metadata of a stolen document before he released it to the world while pretending to be a Romanian hacker. Someone clearly had a wicked sense of humor,” he wrote.
“If you were to reduce the very high level of cybercrime, states wouldn’t be able to carry out these attacks. They would lose this plausible deniability and it would become a more straightforward attack. I think they want to make it difficult for leaders to have the kind of unambiguous statement that drives policy in a democracy,” Porter said. “They want to make it hard to respond. But they probably don’t mind getting caught, in the sense that they want to send a message.” . . . .
Crowdstrike president Shawn Henry is dubious. “I don’t know what kind of foreign intelligence service conducting a covert operation wants to be found,” he said on Thursday, but added that CrowdStrike picked up the DNC hack within 48 hours and that it “wasn’t difficult.” . . . .
Wired has a piece on the ongoing vulnerabilities in the US’s electronic voting machines that makes a rather important point in the context of the suspicions that Russia is playing a pro-Trump role in the US elections by hacking the Democratic National Committee’s emails: While the article asserts that the odds of Russia hacking the US election is quite low given the potential blowback even if you assume the Kremlin is behind the DNC email hack, even if there is no hacking of the voting machines in the upcoming election the very fact that some machines can be hacked basically gives someone like Donald Trump and excuse to challenge and try to invalidate the election results should he lose.
The article goes on to point out that the number of states with machines vulnerable to hacking isn’t as many of is often assumed, but there are still key swing states like Pennsylvania that remain vulnerable. So whether or not electronic voting machine hacking becomes a real issue with the integrity of the 2016 election, the existing vulnerabilities are still large enough to easily become a real threat to the perception of the integrity of the election, which is almost as bad:
“Still, unlikelihood that Russia would tamper with our voting machines hasn’t lifted the sense of unease around the election. When Donald Trump suggests the election might be “rigged,” he’s referring to a host of potential disruptions, from the times and dates of scheduled debates to whatever else he might bend to his narrative. In November, should he lose, he’ll find the voting machines to be an easy target.”
Keep in mind that all of this could have been avoided if state legislators weren’t holding out for a crisis first:
Also keep in mind that the current nightmare situation is actually the result of a response to a crisis: the 2000 Florida recount. So waiting for a crisis and panicking might not be the best approach.
Oh, and don’t forget that the GOP has an almost complete stranglehold on state governments.
So it’s pretty clear that this situation is going to linger until there’s a crisis. Real or perceived. And perhaps that’s one possible positive outcome if Trump loses and immediately charges that electronic voting machines did him in: maybe Trump will create the crisis required to finally get rid of the garbage machines and implement systems with meaningful safeguards. Or course, that assumes that Trump doesn’t lose and immediate challenge the election with an armed insurrection or something:
““If there’s voter fraud, this election will be illegitimate, the election of the winner will be illegitimate, we will have a constitutional crisis, widespread civil disobedience, and the government will no longer be the government,” Stone said. He also promised a “bloodbath” if the Democrats attempt to “steal” the election.”
Keep in mind that Roger Stone was explicitly talking about the risk of Diebold voting machines in the interview before he promised a “bloodbath” if the Democrats attempt to “steal” the election and actually concluded that Diebold machines likely helped George W. Bush steal the 2004 election from John Kerry and Karl Rove tried to steal the 2012 electronically but Obama paid the hackers more:
“I think we have widespread voter fraud, but the first thing that Trump needs to do is begin talking about it constantly...He needs to say for example, today would be a perfect example: ‘I am leading in Florida. The polls all show it. If I lose Florida, we will know that there’s voter fraud. If there’s voter fraud, this election will be illegitimate, the election of the winner will be illegitimate, we will have a constitutional crisis, widespread civil disobedience, and the government will no longer be the government.’”
That’s Roger Stone’s advice to Trump: Talk about electronic voting machine fraud constantly, and when he’s leading in a poll in a state like Florida use that moment to declare that is he does lose that state it’s due to electronic voting machine fraud which means “we will have a constitutional crisis, widespread civil disobedience, and the government will no longer be the government.”
Yep, Trump can’t lose using this strategy. At least not in the minds of his supporters. If he wins, it’s because he’s a winner (and not because Wikileaks hackers or the Kremlin ‘assisted’ him), and if he loses it’s because Hillary stole the election and the government is no longer legitimate. Given all that, if you’re an enemy of the United States, not only do you want to hack the election, you also want to do it blatantly, frame some other group (since hackers can often do that), and ensure they caught in the act.
So let’s hope all those remaining vulnerable machines will get fixed before the next election. Also, let’s hope there’s a next election. Threats a bloodbaths sort of complicate those kinds of hope.
@Pterrafractyl–
Keep an eye peeled for hacking attributed to Russia, but actually done by–who knows?
The “Russia hacked the DNC” doesn’t pass the sniffs test, as discussed in the post to which you commented.
With Eddie the Friendly Spook in Russia and working with computers and the fascists at WikiLeaks manifesting precisely what David Golumbia discussed, it is going to be interesting, to say the least.
Best,
Dave
@Dave: The Council on Foreign Relation’s blog has an interesting piece by Dr. Sandro Gaycken, a Berlin-based former ‘hacktivist’ who now advises NATO and the German government on cyber-security matters, that makes the case that the evidence implicating Russia was very much the type of evidence a talented team could spoof. He also notes that some of the tools used in the hack were the same used last year when Angela Merkel’s computer was hacked and used to infect other computers at the Bundestag. That hack was also blamed on Russian hackers. But, again, as the article below points out, when the evidence for who is responsible is highly spoofable, confidently assigning blame is almost too easy:
“The DNC hack leads to at least four “what if” questions, each with its own significant policy consequences. First, if Russia had poor operational security and misjudged its target, it needs to be educated about the sensitivity of certain targets in its favorite adversary countries to avoid a repeat of this disaster. Second, if Russia deliberately hacked the DNC to leak confidential information, it would represent a strategic escalation on behalf of the Kremlin and the world would need to prepare for difficult times ahead. Third, if the breach and leak were perpetrated by a bunch of random activists using the pseudonym “Guccifer 2.0“, it would be the first instance of non-state actors succeeding in creating a global incident with severe strategic implications, demanding more control of such entities and a much better design of escalatory processes among nations. Finally, it is entirely possible that this was a false flag operation by an unknown third party to escalate tensions between nuclear superpowers. If this is the case, this party has to be uncovered.”
That last point seems pretty critical because if this really was carried about by an unknown third party designed to ratchet up tensions between the world’s two leading nuclear powers at a time when tensions are already ratcheted up, that’s sort of an attack on life on Earth and arguably a lot serious than if Russia was behind it. While it would be a serious and rather insane move on the Kremlin’s part if it meddled in this manner in a US presidential election, that’s probably a lot less scary than unknown third party actors with sophisticated hacking skills who are intent on ratcheting up tensions between nuclear powers. Because there’s no reason to assume they’ll stop here. For all we know spoof hacks designed to pit the US and Russia against each other, or maybe the India and Pakistan or any other pair of nuclear armed adversaries, could be emerging as the New Normal.
Let’s also keep in mind that, whether or not the Kremlin was behind the DNC hack, the precedent of state-sanctioned hacking to meddle in a foreign election has effectively been set and that means not only is it possible that the US could retaliate in kind and release some embarrassing info on Putin but there’s also nothing stopping a unknown third party from spoofing a US attack and taking this situation to another level. We could literally have a single unknown third party fight both sides of the same spoofed cyberwar. Or maybe other previously uninvolved unknown third parties could join in on the fun. That’s the opaque nature of the modern digital landscape.
Yikes.
http://m.huffpost.com/us/entry/us_57a2575ee4b04414d1f365b1
“Meanwhile, he [Assange] has attracted support from powerful anti‑U.S. actors in his battle with Swedish authorities. Two right-wing political parties in Europe that are skeptical of Washington . . . the far-right National Front in France and the pro-Brexit U.K. Independence Party, have called for their countries to grant Assange asylum so he can avoid questioning by Sweden.”
Check out what appears to be Julian Assange’s latest attempt to get Donald Trump elected: While Assange refused to answer who the source was for the DNC email hack during a TV interview, he did very strongly hint that the source was Seth Rich, a recently murdered young DNC staffer, although he also left enough wiggle room to deny what he just strongly suggested. Also, Wikileaks just offered $20,000 for anyone with information on Rich’s murder.
The ForceThe Trump is strong with this one:“When the interviewer asked Assange if he was implying that Rich was a WikiLeaks source, he said, “We don’t comment on who our sources are.””
Yes, Wikileaks never comments on who its sources are. Of course, that comment came right after a string of statements by Assange that strongly suggested that Seth Rich was indeed the Wikileaks source. So, either Wikileaks has some real evidence that Seth Rich was the source of the DNC email hack or Assange is basically trying to confuse investigators and smear a dead DNC staffer in order to get Donald Trump elected president. Because he cares about the world.
Beyond the many questions this latest stunt raises about the relationship between the Trump campaign and Assange, you also have to wonder if Wikileaks has any intention of turning over their evidence that Rich was their source to investigators. Because if he really was Wikileak’s source that would be a hugely important piece of information for investigators. So unless we learn that Wikileaks turns over evidence that Rich was the source it’s going to be really hard to take this claim seriously. After all, it’s not like Wikileaks would be protecting Rich’s identity at this point after that interview.
Note that Rich’s family is dismissing Assange’s suggestion and is asking that it not be taken seriously. But, hey, if this is real and Wikileaks really does have evidence that Rich was their source that would indeed be quite a twist. Of course, if that evidence doesn’t emerge that would also be a twist, albeit merely the latest twist in Julian Assange’s long weird path to becoming Donald Trump’s lead hacker.
@Pterrafractyl–
Oh, so it was Seth Rich, not Russia?
I’m confused. Of course, Assange is a VERY credible source, as is Roger Stone.
We aren’t being taken for a ride, are we?