Deep Politics Forum

Full Version: The attempted Clinton-CIA coup against Donald Trump
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Dumbstruck: a Homefront Intelligence Report on how America was conned about the DNC hack

By Scott Ritter

Data that would shed light on claims of Russian meddling in the 2016 U.S. Presidential election remains out of investigators' hands.

https://medium.com/homefront-rising/dumb...fa522ff44f

Quote:Part One: Cozy Bear and Fancy Bear

To hear Dmitri Alperovitch tell it, the moment had all the tension of a Hollywood blockbuster: a phone call in the early morning hours, a quick exchange of words, and a sudden, dramatic realization  the Democratic National Committee was under attack. "Are we sure it's Russia?," Alperovitch asked the security analyst on the other end of the line. The analyst, a former intelligence officer trained in the art of cyber warfare, told Alperovitch that there was no doubt.

Alperovitch is the 37-year-old chief technical officer of the cyber security company CrowdStrike. CrowdStrike's proprietary cyber security software, named Falcon Host, a "next generation" endpoint security technology, had been installed on the servers of the Democratic National Committee just the night before, in response to a suspected intrusion. Within "ten seconds" the software signaled a positive hit  the malware that had been detected by Falcon had the same traits as those previously used by two "advanced persistent threats," or APTs, known to CrowdStrike by the code names Cozy Bear and Fancy Bear.

Cozy Bear was assessed by Alperovitch to be run by the Russian Federal Security Service, or FSB; Fancy Bear was attributed to Russian military intelligence, or the GRU. CrowdStrike's Falcon software showed that Cozy Bear had been active in the DNC server since the summer of 2015, mapping out directories and exfiltrating data. Fancy Bear had penetrated the DNC server in April 2016, and had stolen some files related to opposition research.

Alarmed by what Falcon had uncovered, Alperovitch made a phone call to Shawn Henry, a former senior FBI official who had headed CrowdStrike's incident response capability since being recruited straight from retirement in 2012. Henry and his team deployed an intelligence tool, Falcon Overwatch, to assist in what CrowdStrike terms "the incident response engagement." According to CrowdStrike, Falcon Overwatch is a 24/7 global operations center staffed by "an elite group of cyber intrusion detection analysts and investigators" who hunt for adversary activity and malware in a client's server.

"The OverWatch team saw activity as it occurred with over the shoulder' observation of hands on keyboard' as command line activity occurred," Henry recalled in a company after-action report. "This real-time information provided the CrowdStrike Services team with additional indicators of compromise to examine, which in turn helped reveal what the attackers were trying to accomplish."

CrowdStrike has a corporate motto: "You don't have a Malware Problem, You Have an Adversary Problem." The ethos behind this motto, as explained by Adam Meyers, who runs CrowdStrike's Global Threat Intelligence Team, is the notion that by focusing on the adversary "you are dealing with the problem, not just a symptom of the problem. Malware deals with the symptom." Adversaries, Meyers notes, "are the humans behind the attacks. We spent years in security focusing on malware and exploits and techniques, but not on who is perpetrating them. There are humans behind the attacks, so we watch for patterns, use intel to zero in on the human element. We ask who they are, what their motivation is and what types of things they are likely to do in the future."

On April 29, 2016, when the DNC became aware its servers had been penetrated, an emergency meeting was held between the Chairwoman of the DNC, Debbie Wasserman-Schultz, DNC's Chief Executive, Amy Dacey, the DNC's Technology Director, Andrew Brown, and Michael Sussman, a lawyer for Perkins Coie, a Washington, DC law firm that represented the DNC. Sussman took control of the meeting, setting out the DNC's agenda when it came to dealing with the cyber attack on its server. The three most important questions, Sussman declared, were what data was accessed, how was it done, and how can it be stopped?

The one question Sussman, a former federal prosecutor who focused on computer crimes, did not ask was, who did it?

It took the DNC four days to decide to bring in an outside vendor to investigate the breach of its servers. In the end, it was Sussman who made the call to Shawn Henry at CrowdStrike. The call was made on May 4; by May 5 CrowdStrike had installed its FalconHost software that had triggered the Russian attribution.

This wasn't the first time CrowdStrike had been called in by the DNC. In December 2015 it tapped the company to conduct an audit of the circumstances surrounding a breach of security involving the DNC's party-administered voter file system  specialized software developed by the company NGP VAN known as VoteBuilder. Over the course of five weeks, CrowdStrike examined administrative logs from the DNC to assess user activity within the VoteBuilder system, and conducted a forensic examination of two other systems belonging to the campaign of Vermont Senator Bernie Sanders. The results of the CrowdStrike investigation were released on April 29, 2016  the same day the breach of DNC servers was detected.

Acting on FalconHost's May 5 alert, CrowdStrike poured over the data. FalconHost had found indicators  malware, techniques, and patterns of behavior  that suggested two APT's, Cozy Bear and Fancy Bear, were behind the cyber attack on the DNC. Shawn Henry now deployed CrowdStrike's Overwatch capabilities to answer the questions Sussman had asked: What data had been compromised, how did this compromise occur, and how could the DNC prevent future compromise?

But CrowdStrike had to proceed carefully. If the humans behind either Cozy Bear or Fancy Bear detected that their respective hacks had been discovered, they would be able to cover their tracks and, worse, burrow so deep into the DNC server system it could never be deemed secure.

CrowdStrike, however, had built its corporate reputation on being more proactive than reactive when it came to cyber security. Using what it called Enterprise Adversary Assessment, CrowdStrike sought not only to locate the perpetrator of the attack, but also track them back into their systems and prevent them from ever returning. One of the tools CrowdStrike advertised in this regard involves so-called "attractive data" that had been tagged with tracking malware and placed in the compromised server. Once the hacker fell for the trap, and exfiltrated the file in question, CrowdStrike would be able to follow it back through the adversary's network, helping build a picture of the adversary's infrastructure, and hopefully identify what data had been previously stolen and where it resided. Crowdstrike also advertised offensive strategies designed to limit the number and severity of future attacks by disrupting the attackers' infrastructure using undisclosed techniques.

The services described would seem to run afoul of the Computer Fraud and Abuse Act, or CFAA (under the CFAA, private entities are restricted from pursuing offensive cyber security measures designed to infiltrate an attacker's computer infrastructure for the purpose of learning how a cyber attack occurred.) CrowdStrike sought to mitigate any legal exposure presented by its new, innovative approach to cyber security by bringing Steven Chabinsky, a former FBI legal specialist with considerable experience in cyber intelligence operations, onboard as its general counsel.

Chabinsky didn't believe that the CFAA represented an insurmountable obstacle to CrowdStrike's aggressive approach; if a business was hacked, he held, it had every right to either delete or encrypt its property if it was discovered on the attacker's computers. Chabinsky's approach echoed the mentality of Alperovitch, who likened CrowdStrike's offensive posture to defending ones property rights. "If I tackle you on the street, that's assault and battery," Alperovitch noted. "But if a few minutes prior you had taken my wallet, it's completely legal."

Shawn Henry and his team used CrowdStrike's Falcon Overwatch capability to monitor the DNC's compromised servers for more than 30 days, mapping out the scope of the intrusion and tracking the actions of the attackers. The scope of the Cozy Bear intrusion was potentially devastating. According to CrowdStrike, Cozy Bear had roamed uncontested throughout the totality of the DNC server, collecting and transmitting email and Voice over Internet Protocol (VoIP) communications. Significant amounts of data had been exfiltrated during this time, CrowdStrike assessed, and the DNC had to assume that anything stored in the server had been compromised.

Fancy Bear appeared to have more limited objectives. Henry's team detected evidence of a few select files having already been exfiltrated, while others were staged for future exfiltration. An analysis of these files showed that Fancy Bear was focused on opposition research being done by the DNC on the erstwhile Republican nominee, Donald J. Trump.

While the CrowdStrike analysts believed they were able to isolate the malware, tools and techniques used by both Cozy Bear and Fancy Bear to facilitate the theft of DNC data, they were not able to determine the source of the initial intrusion for either threat actor. Threat intelligence from previous cyber attacks on other targets (including the German Parliament, a French television channel, TVMonde5, the US State Department and the White House) attributed to both Cozy Bear and Fancy Bear, suggested that the vector used to facilitate initial penetration of a targeted server was through a technique known as a "phishing" attack, where the attacker used fake documents and communications to trick the target into clicking on a field infected with malware. There was, however, no evidence on the DNC server that showed it had been subjected to a "phishing" attack. How the Cozy Bear and Fancy Bear malware came to infect the DNC server remained a mystery to CrowdStrike.

At some point, the decision was made by the DNC and CrowdStrike to go ahead and regain control of the DNC servers. But to CrowdStrike, this wasn't enough. Sifting through the data collected by Shawn Henry and his Falcon Overwatch team, Dmitri Alperovitch was taken aback by the sheer audacity of what had transpired. Michael Sussman, the DNC legal counsel, agreed. "You have a presidential election underway here and you know that the Russians have hacked into the DNC," Mr. Sussman told the New York Times. "We need to tell the American public that. And soon."

At first the DNC tried to get the FBI to make the attribution call, figuring that it would garner more attention coming from the US government. But when the FBI wanted full access to the DNC server so that it could conduct a full forensic investigation, the DNC balked. Instead, after meeting with Alperovitch and Henry, the DNC and CrowdStrike devised a strategy to take the case to the public themselves. Alperovitch prepared a formal technical report that singled out the Russians for attribution. When it was ready, the DNC invited in a reporter from the Washington Post named Ellen Nakashima, who was given exclusive access to senior DNC and CrowdStrike personnel for an above-the-fold, front-page article.

Before the Washington Post could go to print, however, CrowdStrike needed to evict Cozy Bear and Fancy Bear from the DNC server, and deploy security mechanisms designed to keep them out. Over the course of two days, from June 1012, CrowdStrike stealthily replaced the DNC's software, moving carefully to avoid detection. With the DNC server clean and secure, the plan to "name and shame" Russia could go forward.

The Post article, published on the morning of June 14, 2016, went viral, with nearly every major media outlet, including the New York Times, citing it in their own subsequent investigations. When CrowdStrike published its technical report 30 minutes later, it was received by a media already driven to a frenzy and starving for information. The report, "Bears in the Midst: Intrusion into the Democratic National Committee," quickly became headline news, and Dmitri Alperovitch, its author, a household name. The DNC and CrowdStrike, it seemed, had executed the perfect attribution campaign, creating a perfect storm of political intrigue and spy-versus-spy narrative that the media couldn't ignore.

Part Two: Shady Rat

The public attribution campaign targeting Cozy Bear and Fancy Bear wasn't the first time Dmitri Alperovitch had engaged in a highly publicized "name and shame" operation. Back in 2011, when Alperovitch worked as the vice president of threat research for the cyber security giant, McAfee, he had published a similarly politically charged report, "Revealed: Operation Shady Rat." This report was to push Alperovitch's attribution strategy, and Alperovitch himself, to the forefront of a national dialogue on cyber security.

According to Esquire, it was Alperovitch's own analysis of administrative logs from a compromised server that led him to conclude that Shady Rat was the culprit behind cyber attacks targeting dozens of companies around the world. Moreover, Alperovitch believed, this evidence pointed to China as the perpetrator of this hacking campaign. McAfee policy prevented this attribution from appearing in a formal company report, but this didn't stop Alperovitch from naming names; when Vanity Fair specifically asked about the link between China and Shady Rat in mid-July 2011 (prior to the publication of the McAfee report), Alperovitch reiterated McAfee corporate policy about attribution, before observing, "If others want to draw that conclusion, I would not discourage them."

In the weeks leading up to the public release of the Shady Rat report, Alperovitch privately pushed his view on Chinese attribution in a series of closed-door meetings with the White House, "executive-branch agencies" (i.e., the FBI and intelligence community), and congressional committee staff. These briefings proved to be a media bonanza for Alperovitch  once the Shady Rat report became public, the White House and Department of Homeland Security were compelled to acknowledge their awareness of the report and the issues it raised. The NSA had been tracking the various entities that comprised Shady Rat for years. However, the manner in which Shady Rat presented to the public helped create the impression that it was Alperovitch, and not American law enforcement or intelligence agencies, that uncovered the threat posed by China and Shady Rat.

As a marketing ploy, the Shady Rat report was pure genius, playing on the nexus of public ignorance and political paranoia that existed in the United States. A perfect example of this was a statement made by the Democratic Chair of the Senate Select Intelligence Committee, Dianne Feinstein, after reading Alperovitch's Shady Rat report. Feinstein emailed Vanity Fair, who quoted her as saying Alperovitch's Shady Rat report represented "further evidence that…we need to start applying pressure to other countries to make sure they do more to stop cyber hacking emanating from their borders."

This was music to Alperovitch's ears, since "naming and shaming" was a core principle behind his approach to cyber security. "We saw that no one's really focused on the adversary," Alperovitch later told Esquire. "No one's focusing exclusively on how can we actually identify them, attribute them, deter them from taking this action again." From the Shady Rat experience was born the ethos that later morphed into CrowdStrike's corporate motto: "You don't have a malware problem, you have an adversary problem."

Almost overnight, Alperovitch and Shady Rat had become household names. The media (including Washington Post cyber beat reporter Ellen Nakashima) picked up the story and ran with it, making the linkage between Shady Rat and China an incontrovertible fact in the minds of the American public. It also boosted the stock of Aleprovitch and a colleague of his at McAfee named George Kurtz. Kurtz resigned from McAfee in October 2011, and within a month was brought on by Warburg Pincus, a private equity firm, as an Executive in Residence. Kurtz was slated to head up a new cyber security company, CrowdStrike, which Patrick Severson, a Managing Director at Warburg Pincus, was in the process of underwriting to the tune of $26 million in Series A funding.

Kurtz poached a number of senior executives from McAfee to join him at this new startup company, which he named CrowdStrike. But the jewel in CrowdStrike's crown was the man around whom the company's operating ethos would be constructed  Dmitri Alperovich. Alperovich left McAfee in mid-September, and by the end of that month was presenting his vision for cyber security at an event sponsored by Brookings. Alperovich helped co-found CrowdStrike with Kurtz and another McAfee alumnus, Gregg Marston. While Kurtz, Marston and Severson's names populated the SEC filings submitted by CrowdStrike in December 2011 in regard to its funding efforts, it was Alperovitch's cache that made it all possible.

Alperovitch's name was well known, thanks in large part to the momentum created by his Shady Rat report and the accompanying Vanity Fair interview, which was published in September 2011. Brought in as the Chief Technology Officer for CrowdStrike, Alperovitch leveraged the reputation he built on the back of Shady Rat to promote one of CrowdStrike's initial technological initiatives, Crowdsourced Reverse Engineering (CrowdRe), a free collaborative malware assessment tool. Even here, Alperovitch's history with Shady Rat could be seen: the CrowdRe functional demonstration used as its case study a malware sample CrowdStrike sourced from what it named "Comment Panda" (the name it gave to the cyber adversary Alperovich claimed to have exposed as a result of his Shady Rat investigation).

This collaborative approach to cyber security was part and parcel of CrowdStrike's operational methodology. "At CrowdStrike," Alperovitch told one interviewer, "we look for traces of the adversary and try to find out who the adversary is, what they are after, and what their tradecraft is. We also disseminate that information to enable collective action." In this, CrowdStrike was no different from other cyber security startups. What separated CrowdStrike from the pack were the pro-active measures Alperovitch promoted in defending against an identified threat. "We should enable the private sector to engage in self-defense in the cyber world, like we do in the physical world," Alperovitch declared. "Licensed cyber security companies" in the mold of CrowdStrike should be allowed "to take certain actions in defense of a network…if you see your data going to some other network, why can't you go into that network for the purpose of getting your data back, or take data off that machine to mitigate the damage?"

Alperovitch's aggressive posturing was soon reinforced when, in May 2012, CrowdStrike hired Shawn Henry, who had just retired from 24 years service with the FBI. Henry's last position with the FBI was as the Executive Assistant Director of the Criminal, Cyber, Response and Services Branch, where he oversaw the entirety of the FBI's cyber response capability. Like Alperovitch, Henry was frustrated with the approach being taken by the US government and private industry when it came to responding to cyber attacks against American targets. "I don't see how we ever come out of this without changes in technology or changes in behavior, because with the status quo, it's an unsustainable model," Henry told an interviewer from the Wall Street Journal in March 2012, shortly before leaving the FBI.

Alperovitch's smarts and Henry's brawn made for a perfect combination of personalities that enabled CrowdStrike to market its new image as a private cyber intelligence agency, one that, according to a Los Angeles Times company profile, "identifies sophisticated foreign attackers trying to steal US intellectual property and uses the attackers' own techniques and vulnerabilities to thwart them." This aggressive posturing proved to be highly effective; in 2013 Crowdstrike was able to secure an additional $30 million in Series B funding from Accel Partners and Warbus Pinkus. Alperovitch was showered with praise, selected by MIT Technology Review as a "Young Innovator Under 35," and named by Foreign Policy as one of the "Top 100 Global Thinkers" for 2013, largely on the reputation he garnered from his 2011 Shady Rat report.

But while Alperovitch may have charmed the billionaires who were underwriting the CrowdStrike enterprise, several of his fellow cyber sleuths smelled a rat. One of them, Eugene Kaspersky, took the time to put his concerns into writing. Kaspersky is the CEO and founder of Kaspersky Lab, a well-regarded Russian-based cyber security company. "We conducted detailed analysis of the Shady Rat botnet and its related malware," Kaspersky wrote in an August 2011 blog, "and can conclude that the reality of the matter (especially the technical specifics) differs greatly from the conclusions made by Mr. Alperovitch." Moreover, Kaspersky stated, "We consider those conclusions to be largely unfounded and not a good measure of the real threat level," adding that "we cannot concede that the McAfee analyst was not aware of the groundlessness of the conclusions, leading us to being able to flag the report as alarmist due to its deliberately spreading misrepresented information."

Symantec, the maker of the popular Norton Anti-Virus software, shared Kaspersky's concerns over Alperovitch's exaggeration and outright misrepresentation of the Shady Rat threat. Writing for the Symantec company blog, Hon Lau, a security analyst, noted that Symantec had "uncovered what appears to be the same information source about the victims of the attacks that was used by McAfee as the basis of their report. This information is freely available on the attackers' command and control site, which is a strange oversight considering this type of attack is often described as advanced' or sophisticated.'"

Lau also undercut Alperovitch's self-made reputation as a super cyber sleuth. "It turned out," Lau wrote, "that the attackers not only failed to secure their server properly, they had also installed various Web traffic analysis tools on it too, which is of course useful to the attackers to see how they are doing, but makes our lives easier too when investigating such attacks. For example, on one of the sites we were able to see the statistics about computers contacting the command and control server to download command files. Based on this information, we were also able to determine the organizations affected by this threat."

Both Lau and Kaspersky discounted Alperovitch's efforts to attribute blame for the Shady Rat cyber attacks on China. "There has been some discussion," Lau noted, "of this being a government-sponsored attack. However, the finger can't be pointed at any particular government. Not only are the victims located in various places around the globe, so too are the servers involved in these attacks."

Kaspersky echoed this point, stating, "It looks overwhelmingly likely that no state is behind the Shady Rat botnet. How the botnet operates and the way the related malware is designed reveals startling fundamental defects hardly indicative of a well-funded cyber-attack backed up by a nation state."

Alperovitch had described Shady Rat as "an advanced persistent threat," a "sophisticated penetration" where "the adversary is motivated by a massive hunger for secrets and intellectual property." Neither Kaspersky nor Symantec shared this conclusion. "When you consider the errors made in configuring the servers and the relatively non-sophisticated malware and techniques used in this case," Lau wrote, "one could not call Shady Rat an advanced persistent threat." Moreover, as Kaspersky pointed out, the IT industry was already fully aware of the Shady Rat phenomenon, "but decided not to ring any alarm bells due to its very low proliferation  as confirmed by our cloud-based cyber-threat monitoring system and by other security vendors. It has never been on the list of the most widespread threats."

Contrary to Alpertovitch's claims that Shady Rat was responsible for stealing "secrets and intellectual property," Kaspersky notes that a review of the logs used by Alpertovitch make clear that "there is no evidence showing what sort of data has been acquired from infected computers, or if any data has been acquired at all." Lau reached the same conclusion, noting, "Whats still unclear is the type of information the attackers were targeting."
In retrospect, Shady Rat appears to have been perpetrated for one purpose  to manufacture a narrative that could be exploited for the personal benefit of Dmitri Alperovitch, George Kurtz and Gregg Marston, the three former McAfee executives who founded CrowdStrike. Alperovitch and George Kurtz had been planning to leave McAfee prior to the Shady Rat report being published. Alperovitch told Esquire Magazine that he accelerated his plans to depart McAfee because of his outrage at being "censored" by corporate executives uneasy over his attribution of China in the report. But this is disingenuous; as Alperovitch related to Vanity Fair during his exclusive pre-publication interview, McAfee policy at the time was not to speculate on what country was behind Shady Rat. It was this long-standing policy, and not any knee-jerk corporate reaction to the Shady Rat report, that drove the top-down request to remove specific attribution from the report.

It appears that Alperovitch concocted the Shady Rat threat from thin air, and then promulgated its existence through private meetings with government officials predisposed to accept any public reporting that sustained the notion of a Chinese cyber threat to the United States. Alperovitch, Kurtz and Marston were more than likely planning what would eventually become CrowdStrike well prior to the Shady Rat report being published  one does not simply attract tens of millions of dollars in investment funding on the fly. The entire Shady Rat enterprise  the report, the secret government briefings, the exclusive high profile article  appeared to be designed to elevate Alperovitch's public profile on the eve of his resignation from McAfee and the creation of CrowdStrike, a profile Kurtz and Marston were only to willing to exploit. If this was indeed the case, it was at a minimum deceptive marketing, and America fell for it.

There was a fourth McAfee executive who claims he was supposed to be a part of the CrowdStrike venture. Stuart McClure, the current CEO of Cylance, a California-based cyber security company (and competitor of CrowdStrike), claims that he was invited by George Kurtz to join CrowdStrike in early 2012, an offer McClure says he turned down. "I decided I needed to live my life with high integrity and with high-integrity people, so I decided to do this gig (Cylance) on my own." (Kurtz denies that he offered McClure a position in CrowdStrike.) Normally such claims would be downplayed, especially given the contentious history between the two men, who were colleagues and business partners for 14 years before their falling out. But McClure's reference to "high integrity," made in a manner suggesting both Kurtz and the CrowdStrike business venture were found lacking in such by McClure, cannot simply be dismissed in light of the Shady Rat fraud perpetrated by Alperovitch and, by extension, Kurtz.

The observations of Jeffrey Carr, a well-regarded cyber security author, are relevant in this regard. In a blog posting titled "Where's the Strike' in CrowdStrike," Carr noted that, as of September 2012, CrowdStrike had announced the recruitment a number of highly skilled employees, but "so far they haven't announced much in the way of a product line." Carr was on record as stating that the Shady Rat report authored by Alperovitch was "an indictment of McAfee as an information security company," noting that "it's a lot easier to blame China than to acknowledge how you and your company have been profiting from a failed security model for all these years while hiding that fact from your customers." With CrowdStrike, Carr observed, Alperovitch seemed to be repeating the same pattern of overselling his company's capabilities.

"The company (CrowdStrike) website," Carr writes, "claims to offer Enterprise Adversary Assessment' where we identify the adversary and find out what they're after.' And how do they do that? Back to the website: Through hunting operations, including host-based detection, threat-specific network analysis, and victim threat profiling.'" Carr, however, is critical of these claims, noting "CrowdStrike cannot currently deliver anything unique in the infosec space…that other companies aren't already doing unless it significantly improves its sources and methods regarding identifying adversary state and non-state actors and pushes the envelope on active defense."

The biggest sin, according to Carr, was the fact that the CrowdStrike methodology represented little more than "a continuation of the piss-poor intelligence that Dmitri Alperovich published while at McAfee," singling out the Shady Rat paper as a case study in point. "There's over 30 nation states developing computer network attack, defense, and exploitation capabilities," Carr notes, "and at least a dozen that are highly proficient and actively conducting cyber espionage yet somehow McAfee's intelligence analysts' only see China."

Carr points out that while CrowdStrike "talks about identifying adversaries via toolmarks and the usual TTPs 9tools, techniques and procedures) that every so-called cyber intelligence firm narrowly focuses their attention on but that's not analysis…that's a cognitive trap known as target fixation. If after looking at all of the technical parameters," Carr concludes, "the only nation state that you see is China, you need to find another job because you suck as an intelligence analyst."

A former intelligence analyst named Michael Tanji echoes Carr's concerns. Tanji spent 20 years working for the Defense Intelligence Agency, the National Security Agency, and other intelligence organizations, where he specialized in computer network operations and computer forensics. In an article entitled, "Malware Analysis: The Danger of Connecting the Dots", Tanji asked the following question: "If I give you a malware binary to reverse engineer, what do you see?" His answer is telling: "Exactly what the author wants you to see."

Tanji wrote:

I want you to see words in a language that would throw suspicion on someone else. I want you to see that my code was compiled in a particular foreign language (even though I only read and/or write in a totally different language). I want you to see certain comments or coding styles that are the same or similar to someone else's (because I reuse other people's code). I want you to see data about compilation date/time, PDB file path, etc., which could lead you to draw erroneous conclusions have no bearing on malware behavior or capability.

Extrapolating from Tanji's words, one sees that, when it came to Shady Rat, Alperovitch wanted to see China, so he did. This was the ultimate flaw in the methodology Alperovitch brought with him from McAfee to CrowdStrike, a willingness to make assumptions based upon misplaced certainty, to shoehorn unknowns into these assumptions, to allow personal bias to dictate the data set, and to let personal animus influence conclusions that might not otherwise be valid. This is what Alperovitch did with Shady Rat while working for McAfee back on 2011. Five years later, history repeated itself: CrowdStrike, with Alperovitch in the lead, fell into the exact same target fixation cognitive trap when it came to Cozy Bear and Fancy Bear.

Part Three: Guccifer 2.0

Alperovitch and CrowdStrike nearly pulled it off. The "name and shame" strategy is designed to embarrass state-sponsored actors, compelling them to cease and desist their criminal cyber activity while mobilizing political support at home for more robust cyber security policies intended to keep the identified perpetrators at bay. Had the attack on the DNC server been an actual Russian state sponsored event, this approach might have worked.

Almost immediately after the one-two punch of the Washington Post article/CrowdStrike technical report went public, however, something totally unexpected happened  someone came forward and took full responsibility for the DNC cyber attack. Moreover, this entity  operating under the persona Guccifer 2.0 (ostensibly named after the original Guccifer, a Romanian hacker who stole the emails of a number of high-profile celebrities and who was arrested in 2014 and sentenced to 4 ½ years of prison in May 2016)  did something no state actor has ever done before, publishing documents stolen from the DNC server as proof of his claims.
Hi. This is Guccifer 2.0 and this is me who hacked Democratic National Committee.

With that simple email, sent to the on-line news magazine, The Smoking Gun, Guccifer 2.0 stole the limelight away from Alperovitch. Over the course of the next few days, through a series of emails, online posts and interviews, Guccifer 2.0 openly mocked CrowdStrike and its Russian attribution. Guccifer 2.0 released a number of documents, including a massive 200-plus-missive containing opposition research on Donald Trump.
Guccifer 2.0 also directly contradicted the efforts on the part of the DNC to minimize the extent of the hacking, releasing the very donor lists the DNC specifically stated had not been stolen. More chilling, Guccifer 2.0 claimed to be in possession of "about 100 Gb of data" which had been passed on to the online publisher, Wikileaks, who "will publish them soon."

With the foundational premise of his attribution report under attack, Dmitri Alperovitch responded, updating his "Bears in the Midst" report with the following passage (which was also sent out to the media as a press release):

CrowdStrike stands fully by its analysis and findings identifying two separate Russian intelligence-affiliated adversaries present in the DNC network in May 2016. On June 15, 2016 a blog post to a Wordpress site authored by an individual using the moniker Guccifer 2.0 claimed credit for breaching the Democratic National Committee. This blog post presents documents alleged to have originated from the DNC.

Whether or not this posting is part of a Russian Intelligence disinformation campaign, we are exploring the documents' authenticity and origin. Regardless, these claims do nothing to lessen our findings relating to the Russian government's involvement, portions of which we have documented for the public and the greater security community.

Through this release, Alperovitch and CrowdStrike sought to deflect the impact of the Guccifer 2.0 bombshell by treating it simply as an extension of the "Russia did it" narrative they had begun with "Bears in the Midst"  in this case, as a disinformation campaign. To do this, however, CrowdStrike would need to dissect claims made by Guccifer 2.0 regarding his hack of the DNC server. To accomplish this, CrowdStrike was assisted by a number of private cyber security companies, who began dissecting the Guccifer 2.0 narrative with an eye toward disproving his claims. The results have been less than convincing.

On of Guccifer 2.0's claims is that he hacked the DNC using what is called a "zero-day exploit" of the NGP VAN software. He then installed a "shell code" into the DNC server, which he used to gain access to the entire DNC network. Guccifer 2.0 claims he used the DNC's Windows-based domain architecture to infect several DNC computers with "Trojans", and that he moved from one PC to another every week (i.e., "lateral movement") to avoid detection, defeating intrusion detection software through the use of what he called "heuristic algorithms."

ThreatConnect, a respected collective of cyber security experts, has been dismissive of Guccifer 2.0's "zero-day" claim. Their argument, however, is circular and non-persuasive. They note that the MITRE common vulnerabilities and exploitation (CVE) website does not list any known vulnerabilities for NGP VAN software. A "zero-day" vulnerability is, by definition, an unknown exploit that would not appear in a CVE database until which time it had been identified and a "patch," or fix, implemented.

ThreatConnect likewise sought to conflate Guccifer 2.0's claim to have penetrated the DNC server in the summer of 2015 with the only publicly known vulnerability in NGP VAN  the December 2015 VoteBuilder breach that was audited by CrowdStrike, creating the impression that Guccifer 2.0 was claiming to have exploited a vulnerability that had not yet come into existence. But Guccifer 2.0 made no such claim. He simply said he penetrated the DNC server in the summer of 2015 using a "zero-day" vulnerability in the NGP VAN software.

CrowdStrike had stated in its various reports that the DNC server was, in fact, penetrated sometime in the summer of 2015. It also noted that it had uncovered no evidence on how this penetration was accomplished. While CrowdStrike and others speculate that the DNC fell victim to a "phishing" attack, the fact remains that Guccifer 2.0's claim to have used a "zero-day" vulnerability remains uncontradicted by any evidence.

ThreatConnect also contended that if Guccifer 2.0 had, in fact, penetrated the DNC server in the summer of 2015, this penetration should have been detected as part of the DNC/NGP VAN/CrowdStrike audit. Missing from this logic is the fact the all parties acknowledge that the Cozy Bear actor had penetrated the DNC server in the summer of 2015, and yet this actor had somehow avoided detection by the aforementioned audit. Moreover, the tools and techniques Guccifer 2.0 claims to have used against the DNC closely mirror those used by Cozy Bear that were uncovered by CrowdStrike.

The confluence of time of access and tools and technique between Guccifer 2.0 and Cozy Bear begs the question  could Guccifer 2.0 be Cozy Bear? This was not a possibility considered by CrowdStrike, or any of the cyber security vendors who have commented on Guccifer 2.0. Instead, they have painted Guccifer 2.0 as an extension of Fancy Bear, citing forensic evidence that links Fancy Bear to documents stolen from the DCCC and subsequently released by Guccifer 2.0.

Guccifer 2.0 was always treated as either a third intruder, or else an extension of Fancy Bear. No evidence has been uncovered suggesting the presence of a third intruder. As such, Guccifer 2.0's claims of having accessed the DNC server through a "zero day" vulnerability sometime in the summer of 2015 have been dismissed out of hand, leaving only one possibility  Guccifer 2.0 was Fancy Bear. Since CrowdStrike had attributed Fancy Bear as being Russian military intelligence (the GRU), by extension Guccifer 2.0 was the GRU.

Such a finding was very convenient for CrowdStrike, since it did not alter the conclusion reached in the June 2016 "Bears in the Midst" report. It also highlighted the tunnel vision CrowdStrike and the other cyber security companies had when it came to looking at the data emerging about the DNC cyber attack.

"If I give you a malware binary to reverse engineer, what do you see?" This is the question that had been posited by Michael Tanji, the retired cyber intelligence analyst. "Exactly what the author wants you to see."
I want you to see words in a language that would throw suspicion on someone else.

An article published in ArsTechnica highlighted the work of an independent security researcher, Adam Carter, who had uncovered evidence that some of the documents released by Guccifer 2.0 in his initial document dump had been manipulated in a manner which introduced Russian words, in the Cyrillic alphabet, into the metadata of the documents, including a reference to "Felix Edmundovich," the first name and patronymic of the founder of the Soviet security service, Felix Dzerzhinsky. The combination of the Cyrillic alphabet and the reference to a Russian spymaster seems ideal if one is trying to attribute its existence to the Russian intelligence services.
I want you to see that my code was compiled in a particular foreign language (even though I only read and/or write in a totally different language).

FireEye, a well-known cyber security company, has written a report on APT-28 (another name for Fancy Bear), highlights a number of Russian language indicators, including the consistent use of Russian language in malware code over the course of six years.

I want you to see certain comments or coding styles that are the same or similar to someone else's (because I reuse other people's code.)

Fidelis Security, another well-known cyber security company, was provided samples of the Cozy Bear and Fancy Bear malware for "independent analysis." According to Fidelis, these samples matched the description provided by CrowdStrike and "contained complex coding structures and utilized obfuscation techniques that we have seen advanced adversaries utilize in other investigations we have conducted," Michael Buratowski, the senior vice president of security consulting services at Fidelis, noted. The malware was "at times identical to" malware that other cyber security vendors, such as Palo Alto Networks, have attributed to Fancy Bear. Many of these similarities have been previously identified by other cyber security vendors and made public as far back as 2013.

I want you to see data about compilation date/time, PDB file path, etc., which could lead you to draw erroneous conclusions have no bearing on malware behavior or capability.

FireEye, in its report on APT-28 (i.e., Fancy Bear), also notes that the compile times associated with the malware align with the work hours and holiday schedules of someone residing in the same time zone as Moscow and St. Petersburg.

The fascinating thing about Michael Tanji's observations was that they were made in 2012, largely in response to the spate of China attributions headed up by Dmitri Alperovitch's highly publicized 2011 Shady Rat report. Four years later, the fixation on pattern-derived attribution remained a problem within the cyber security collective, this time with Russia as the target de jour. In 2011, the Chinese caseload was spread across a broad field of separate cyber attacks. In 2016, the Russian data set was limited to a single event  the DNC cyber attack.

Moreover, the data set in 2016 was under the exclusive control of a single entity  CrowdStrike. While select malware samples were farmed out to like-minded vendors, for the most part outside analysis of the DNC cyber penetration was limited to the information provided by CrowdStrike in its initial report. Even the FBI found itself in the awkward position of being denied direct access to the DNC servers, having instead to make use of "forensic images" of the server provided by CrowdStrike, along with its investigative report and findings.

There is much unknown about these scans  were they taken from May 6, when CrowdStrike first detected what it assessed to be a Russian presence inside the DNC server? Or are they from June 10, the last day the server was in operation? The difference could be significant, keeping in mind the fact that there were more than 30 days between the two events.

In this intervening time, CrowdStrike watched Guccifer 2.0 exfiltrate documents. It also possibly engaged in offensive measures, such as the dangling of so-called "attractive data" (the Russian-language tainted opposition research documents come to mind.) The possibility of additional manipulation of data cannot be discounted. However, even though members of Congress are starting to call for the FBI to take physical possession of the server and conduct its own independent forensic investigation, the server remains in the possession of the DNC.

Through the release of its "Bears in the Midst" report, CrowdStrike anticipated that the US government and, by extension, the American people, would place their trust in CrowdStrike's integrity regarding Russian attribution. The media has, for the most part, accepted at face value CrowdStrike's Russian attribution regarding the DNC cyber attack.

The US government, while slower to come onboard, eventually published a Joint Statement by the Office of Director of National Intelligence and the Department of Homeland Security in October 2016 that declared, "The recent disclosures of alleged hacked e-mails…by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts."

On December 29, 2016, the FBI and DHS released a Joint Analysis Report (JAR) that directly attributed the presence of both the Cozy Bear and Fancy Bear actors on the DNC server to "spearfishing" attacks, thereby eliminating from consideration any possibility that Guccifer 2.0 penetrated the DNC server through a "zero day" exploit. This was a curious assessment, given that the only data in existence regarding what had transpired inside the DNC server was the data collected by CrowdStrike  data CrowdStrike maintains did not provide evidence pertaining to how the DNC server was initially breached by either Cozy Bear or Fancy Bear.

The Director of National Intelligence followed up with a National Intelligence Assessment, released on January 6, 2017, that similarly endorsed the findings of CrowdStrike when it came to Russian attribution for the Cozy Bear and Fancy Bear penetration of the DNC, as well as linking Guccifer 2.0 to the GRU, or Russian military intelligence. It was the strength of this national assessment that closed the book on debate on the matter of Russian attribution. Senators and Congressmen, intelligence officials and media pundits  all seem to be in agreement that Russia was singularly responsible for the cyber attack against the DNC, and the subsequent release of documents acquired from that breach. "Without a doubt," "undeniable," "incontrovertible"  this was the verbiage that accompanied any discussion of the case against Russia.

The genesis moment for this collective clarity, however, remains the carefully choreographed release of the CrowdStrike report, "Bears in the Midst," and the accompanying Washington Post exclusive laying the blame for the DNC cyber attack squarely at the feet of Russia. From this act all else followed, leading to the certainty that accompanied this attribution was enough to overcome the challenge posed by the sudden appearance of Guccifer 2.0, enabling the same sort of shoehorned analysis to occur that turned Guccifer 2.0 into a Russian agent as well.

Much of this discussion turns on the level of credibility given to the analysis used by CrowdStrike to underpin its conclusions. Alperovitch, the author of the "Bears in the Midst" report, does not have a good record in this regard; one need only look at the controversy surrounding the report he wrote on Shady Rat while working for McAfee. A new report released by Alperovitch and CrowdStrike casts further aspersions on Alperovitch's prowess as a cyber analyst, and CrowdStrike's overall methodology used to make its Russian attribution.

On December 22, 2016, CrowdStrike published a new report purporting to detail a new cyber intrusion by the Fancy Bear actor, titled "Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units." This analysis, prepared by Adam Meyers, CrowdStrike's vice president for intelligence, was claimed to further support "CrowdStrike's previous assessments that Fancy Bear is likely affiliated with the Russian military intelligence (GRU). This report was used to promote a Jan. 4 live discussion event with Meyers and Alperovitch, titled "Bear Hunting: History and Attribution of Russian Intelligence Operations," which was intended to educate the audience on the links between Fancy Bear and the GRU.

The "Danger Close" report was presented as further validation of CrowdStrike's Falcon Program, which CrowdStrike claims helps organizations stop cyber penetrations through proactive measures developed through a deep understanding of the adversary and the measures needed to stop them. It was Falcon that "lit up" ten seconds after being installed on the DNC server back on May 6, 2016, fingering Cozy Bear and Fancy Bear as the culprits in the DNC attack. Falcon was now being linked to this newest effort at Russian attribution.

The only problem for Meyers, Alperovitch and CrowdStrike was that "Danger Close" was wrong  dead wrong  in every aspect of its analysis. The report was dissected by none other than Jeffrey Carr  the same individual who criticized Alperovitch over his Shady Rat claims. One of Carr's most important findings deals directly with the credibility methodology used by CrowdStrike to attribute Fancy Bear to the GRU. "Part of the evidence supporting Russian government involvement in the DNC and related hacks (including the German Bundestag and France's TV5 Monde)," Carr writes, "stemmed from the assumption that X-Agent malware was exclusively developed and used by Fancy Bear. We now know that's false, and that the source code has been obtained by others outside of Russia." Carr cites at least two examples, one a security company, the other a hacker collective, of the X-Agent malware existing "in the wild." If these two entities have the X-Agent malware, Carr notes, "then so do others, and attribution to APT28/Fancy Bear/GRU based solely upon the presumption of exclusive use' must be thrown out."

In one fell swoop, Carr destroyed the very premise upon which CrowdStrike not only attributed the DNC cyber attack to Russia, but the heart and soul of CrowdStrike's business platform  the Falcon Platform used by CrowdStrike to provide "end point" protection to its clients. Far from representing an intelligent platform capable of discerning threats through advanced algorithms and proprietary techniques, the Falcon Platform seems to be little more than a database pre-programmed to deliver a preordained finding  X-Agent equals Fancy Bear, and Fancy Bear equals Russia.

X-Agent was always the one malware CrowdStrike could turn to as demonstrating an exclusive Russian attribution  every other malware detected in the DNC penetration was publicly available. Now it appears that X-Agent, too, was "in the wild," available to any enterprising hacker to use as he or she saw fit.

Carr's findings do not exclude Russia as a suspect in the DNC breach. It just means that Russia is not the only actor capable of using that particular malware  Alperovitch's "DNA" is no longer conclusive. And if the presence of X-Agent no longer automatically equates Fancy Bear with Russia, then the same can be said about Guccifer 2.0. In short, the entire foundational premise upon which CrowdStrike, and by extension the US intelligence community, constructed its case for Russian attribution, just falls apart.

Within elements of the cybercommunity, the credibility of CrowdStrike has been shattered by its involvement in the DNC hack. Its two premier product paltforms  Falcon and Overwatch  have been exposed as being fundamentally (and perhaps fatally) flawed. The attributions derived from Falcon are little more than false positives generated by algorithms pre-programmed to deliver an outcome  CrowdStrike was looking for Russia, and therefore found it.

Moreover, the performance of CrowdStrike's other premier product, Overwatch, in the DNC breach leaves much to be desired. Was CrowdStrike aware that the hackers continued to exfiltrate data (some of which ultimately proved to be the undoing of the DNC Chairwoman, Debbie Wasserman Schultz, and the entire DNC staff) throughout the month of May 2016, while Overwatch was engaged? Did Overwatch detect the spread of malware into the servers of the DCCC? If the answer is yes, one must question the competence of a cyber security company whose job is to prevent just that kind of activity. Did Overwatch help disseminate documents through legally questionable techniques designed to track an adversary's activities? If so, the success of Guccifer 2.0, and ultimately Wikileaks, in publishing the stolen material undercuts any argument in favor of that exercise.

For more than 30 days CrowdStrike had exclusive control over the DNC server. During this time, CrowdStrike made an attribution of Russian involvement that has been shown to be fundamentally flawed, and oversaw the transfer of politically sensitive documents, some of which may have been tainted by CrowdStrike's own actions, to parties who subsequently leaked this material in a politically impactful manner. In short, this 30-plus day period of time emerges as one of the most critical moments in the entire Russia election meddling saga. The data that would shed important light into the most significant claims of Russian involvement in the 2016 US Presidential election  the "weaponizing" of stolen documents  remains out of the hands of those conducting the investigation.

It is difficult to avoid the conclusion that CrowdStrike, by irresponsibly and deliberately attributing the DNC cyber attack to Russia, is involved in deception on a scale that is hard to measure. America today is virtually paralyzed as a result, with a new Cold War looming in terms of US-Russian relations, a possible Constitutional crisis brewing between the president and Congress, and the potential of a trade war between Europe and the US over sanctions passed by Congress in large part because of the issue of Russian election meddling.

Maybe Russia did it. This conclusion cannot be discounted. But such a finding can only be had after a thorough investigation of all available data that takes into account all possibilities. The intelligence underpinning the US government's case against Russia has been undermined by the flaws that have been exposed in the analysis and methodologies used by CrowdStrike to make the Russian attribution the FBI and US intelligence community is using as its starting point. If, for instance, one changed "Russia" to "private hacker collective," the entire premise of Russian involvement, and with it Russian collusion, is undone.

This doesn't mean the Russian government didn't have a favorite horse in the US Presidential race, or that Russian media outlets didn't take an editorial stance in favor of a given candidate. It does, however, significantly weaken the foundational arguments surrounding Russian meddling that were built around the hacking of the DNC server, and the subsequent release of documents.

Given the stakes involved, one would think it would become a top priority of the US government to take control of the DNC server and conduct a thorough forensic examination of all activity, with special attention paid to the period between May 5, 2016  when CrowdStrike installed its Falcon software and deployed its Overwatch capabilities  and June 12, 2016, when CrowdStrike purged the DNC server of all malware. There is every reason to believe that, in doing so, investigators will expose one of the greatest cons in modern American history.

Note: The author contacted CrowdStrike for comment about the employment of Falcon Overwatch as part of CrowdStrike's 2016 DNC incident response. CrowdStrike responded with an email noting that they had no "no new insights or context to share about the investigation," and directed the author to its June 14, 2016 report "Bears in the Midst," as well as a March 5, 2017 article in WIRED. Both sources were consulted by the author in the research for this article prior to his request for comment. The author also reached out to Mr. Steven Chabinsky, the former CrowdStrike legal counsel, and Mr. Michael Sussman, the DNC legal counsel, for comment on various aspects of this article. Neither had responded by the time this article was published.

Scott Ritter is a former Marine Corps intelligence officer who served in the former Soviet Union implementing arms control treaties in the Persian Gulf during Operation Desert Storm, and in Iraq overseeing the disarmament of WMD. He is the author of Deal of the Century: How Iran Blocked the West's Road to War (Clarity Press, 2017).
Russiagate: Scapegoating Russia to Justify Endless War

Guns and Butter, 6 September 2017

We discuss Dan Kovalik's new book, "The Plot to Scapegoat Russia: How the CIA and the Deep State Have Conspired to Vilify Russia"; the cold war; the allegations against Russian President Vladimir Putin and the Russian Federation; the Yeltsin years in Russia; Nicaragua and Colombia; Afghanistan; Yemen; US imperialism and endless war.

http://soundcloud.com/guns-and-butter-1

Or

http://www.gunsandbutter.org/blog/2017/0...ndless-war
The United States of Manufactured Hysteria

https://consentfactory.org/2017/09/01/th...-hysteria/

Quote:Thank God for the Charlottesville Nazis! For a moment there, it was looking like we were actually going to have a few days to stop and reflect on the state of America without being subjected to some new form of manufactured mass hysteria. Seriously, just a few short weeks ago, as the corporatist ruling classes' ridiculous attempt to convince the world that Donald Trump is some sort of Russian sleeper agent appeared to be finally fizzling out, a significant number of leftist types were beginning to wonder if maybe, just maybe, the fact that the United States government is controlled by a global corporate plutocracy that has no allegiance to any nation, or people, or to anything other than itself, and that is in the process of demonizing and potentially deposing an elected president … that maybe that might be something to focus on, not exclusively, by any means, but alongside other vital issues, like defending the rights of transgender drone pilots and purging syllabi of oppressive pronouns.

Fortunately, thanks to the Nazis of Charlottesville, this dangerous moment of doubt has now passed. If you were listening closely on August 11, you could hear the collective sigh of relief whooshing out of Resistance quarters like a hypnagogic idiot wind as roughly one hundred white supremacists marched into town with their tiki torches barking N.S.D.A.P. slogans and otherwise making asses of themselves. Corporate media apparatchiks, mandarins of the Internet Left, professional and amateur Naziologists, and assorted other Nazi experts immediately went to DEFCON 1, signaling imminent Nazi invasion. Photos of bug-eyed, torch-bearing Nazis, their mouths wide open in mid-Nazi shriek, veins bulging out of their Nazi necks, were released to the public and circulated widely. Millions of conflicted leftists (many of whom had been feeling uneasy about collaborating with the corporate plutocracy in their efforts to delegitimize Trump, and every last American who voted for him), upon seeing glossy, color close-ups of these Nazis waved in front of their faces, responded as every Good American has been conditioned to respond since early childhood. They instantly switched off their critical faculties and began reenacting the Second World War … or rather, the mythical version of it wherein the USA defeated the Nazis, which is one of Americans' favorite pastimes.

Look, I don't mean to make light of Charlottesville. We're talking actual neo-Nazis, with actual Nazi flags and haircuts, shouting actual Nazi slogans, and the Ku Klux Klan, and heavily-armed militia, and just garden variety racist rednecks … all of which have been standard features of American life for decades, and longer, but this is no time to reflect on history, or try to put things into perspective. Also, one of these Nazi morons ran over people with his car the next day, killing one woman, and injuring many others, which renders any critical thinking about the actual size of the Nazi menace (which remains ridiculously small, as ever) or the motives of the corporate media in blowing it up all out of proportion tantamount to Nazi sympathizing, and I'm already in enough trouble as it is.

Plus, Charlottesville was just the beginning … kind of like a Nazi Tet Offensive. Just one week later, on August 19, literally forty to fifty Nazis (cleverly disguised as Trump supporters, libertarians, and right-wing oddballs) occupied a public gazebo in Boston, and were right on the verge of expressing virulent Nazi views to the cops surrounding them. Luckily, just in the nick of time, a contingent of approximately forty thousand anti-fascist Resistance members arrived on the scene to deny them a platform, and chase down anyone wearing one of those MAGA hats and verbally abuse them.

You'd think the Nazis would have gotten the message … but no, last Sunday, August 27, another ten or eleven Nazis (many of them posing as "Trump supporters," as if that didn't make them Nazis, and some of them even going so far as to attempt to pass themselves off as "Latinos") audaciously tried to assemble in Berkeley. The Resistance showed them no mercy this time. Thousands of peaceful counter-protesters quickly frightened the Nazis away, then squads of masked-up anti-fascists hunted down any Nazi-looking stragglers, "apparent alt-righters," and nosy photographers, and stomped the living Hitler out of them. This alarmed the more liberal Resistance, which set about branding the anti-fascists who beat the crap out of the folks the liberals had branded Nazis "domestic terrorists."

Elsewhere in America, Resistance members were frantically tearing down Confederate monuments, which had suddenly become intolerably offensive, and searching through online business directories for anyone named after Robert E. Lee, or horses named after General Lee's horse, or the horses of other racist Nazis. That, and hastily organizing the upcoming March to Confront White Supremacy (presumably in order to make a mockery of the 1963 March on Washington), and penning lengthy explications of the evils of racism, white supremacy, and all other forms of Naziism associated with Donald Trump … and otherwise whipping people up into a sputtering frenzy of Nazi hysteria.

Now, you have to hand it to the fake Resistance … this Nazi hysteria is good for everyone. Not only is it an easier sell than that ridiculous Russian hacking nonsense (because Trump really is a racist, of course), but it's something the broader Left can embrace, as it plugs straight into identity politics, which is pretty much all we've got these days.

See, up to now, the dilemma we've been facing (or some of us have been facing, anyway) is how to respond to the ruling establishment's concerted campaign to "regime-change" Trump. On the one hand, Trump is a living embodiment of everything the Left opposes. On the other hand, going after Trump has meant carrying water for the fake Resistance, i.e., that global corporatocracy (which, by the way, does not mean "the Jews." I always like to slip that in to piss off my anti-Semitic readers.) This has been a bit awkward for some of us, restraining our impulse to stick it to Trump (at least on whatever talking points the Resistance is currently putting out) because in doing so we would align ourselves with the ruling establishment's attempt to demonize, and eventually depose an American president who isn't playing ball with them properly. If we oppose regime change in other countries, shouldn't we also oppose it at home? Or do the ruling classes get a pass this time because Trump is such an exceptional monster? But wait … wasn't Saddam a monster? And Gaddafi? And all the other "Hitlers" that wouldn't play ball with the corporatocracy? And Assad? Isn't he a monster?

You can see how confusing all this gets … when you're trying to figure out how to oppose both the supranational corporatocracy that is superseding sovereign nations as the hegemonic power in the world and the neo-nationalist reaction against it, which is essentially fascist in nature, and which the corporatocracy also opposes … and desperately wants you to help them oppose by buying their manufactured hysteria about Russians, or Nazis, or whatever scary monster they wave in front of your face. After a while, your brain starts to hurt, and you just want someone to make things simple.

Charlottesville Nazis to the rescue! How much simpler could it possibly get? Corporatocracy? What corporatocracy? We got goddamned Nazis coming out of the woodwork! Racist Nazis! Confederate Nazis! Nazi apologists! Nazi sympathizers! This is no time to worry about who's actually wielding political power, or how they're manufacturing hysteria and otherwise manipulating people (not you, of course … other people). No, what we need to do now is censor the Internet, and other venues for Nazi hate speech, and round up all these racist Nazis and subject them to anti-Nazi therapy, or anti-racist empathy programs, or just gang up on them and beat them senseless.

OK, sure, that might sound extreme, or authoritarian, or just plain old creepy, but keep in mind that This Is Not Normal! And racism and Naziism is very, very bad. And Love Trumps Hate! And Scope Kills Germs! And we never literally meant that Trump was an actual Russian agent or anything. Forget about all that Russia stuff now. Trump is Hitler. Trump has always been Hitler. America has always been at war with Hitler. America will always be at war with Hitler.

Oh, yeah, and I almost forgot, today's edition of the Two Minutes Hate will begin in approximately fifteen minutes. Please assemble in the usual location. Thank you for your cooperation.

CJ Hopkins
(first published in CounterPunch, September 1, 2017)
The Blathering Superego at the End of History

By Emmett Rensin

JUNE 18, 2017

https://lareviewofbooks.org/article/the-...-history/#!

Quote:LIBERALISM IS NOT working. Something deep within the mechanism has cracked. All our wonk managers, our expert stewards of the world, have lost their way. They wander desert highways in a daze, wondering why the brakes locked up, why the steering wheel came off, how the engine caught on fire. Their charts lie abandoned by the roadside. It was all going so well just a moment ago. History was over. The technocratic order was globalizing the world; people were becoming accustomed to the permanent triumph of a slightly kinder exploitation. What happened? All they can recall is a loud thump in the undercarriage, an abrupt loss of control. Was it Brexit? Trump? Suddenly the tires were bursting and smoke was pouring into the vehicle, then a flash. The next thing they could remember, our liberals were standing beside a smoldering ruin, blinking in the hot sun, their power stolen, their world collapsing, their predictions all proven wrong.

In the six months since the election of Donald Trump, American liberals have managed to regroup, assembling themselves into a self-styled "Resistance" and attempting to reassert control over a world they no longer recognize. But something happened out there in the desert. There is something off about them now. On every level, our most prominent technocrats have entered the new year like uncanny valley copies of themselves, stuttering and miming their old habits, with each take trying to remember what their lives felt like before the accident. They can't quite get the message right. For months, serious journalists studied The Origins of Totalitarianism like a divination manual, wondering when Trump would pass his enabling act. First, the president was a fascist, until he failed to consolidate power. Then he was an authoritarian, until he showed no interest in micro- or macro-management. Then he merely had authoritarian tendencies, or something, and at any rate was probably a Kremlin agent.

The situation is no better on television. Rachel Maddow, once the charming spokesperson of a kinder world, crazily unveils tax returns she found in Al Capone's vault. Keith Olbermann never charming but at least self-confident now squats on the floor in promotional photos, swaddled in an American flag. The newer stars of the left the Louise Mensches and Eric Garlands are using game theory to outwit invisible Soviet assassins. Elected Democrats are paralyzed. They repeat, over and over, that none of this is normal, commit themselves to the fight, and then roll over, confirming the president's appointments, praising the beauty of a missile strike, or begging the FBI to save them. Hillary Clinton emerges from the woods to blame Jim Comey, the DNC, and the Russians for her loss, and the day before the United States withdraws from the Paris Climate Agreement, she tweets a covfefe joke.

On television, in journals, in the halls of Congress, none of the old methods by which American liberals enforced their claim to superior expertise are working anymore. For all their "resistance," the greatest impediment to Donald Trump remains his own stupidity. Despite every evil and crime of his administration, the most ambitious Democratic victory on the horizon is making Mike Pence president. Our liberals are right: none of this is normal. This isn't how it used to be. Everywhere, our best and brightest blink. Are they still in the desert? Is all this an hallucination, a bad dream?

So far, critics of contemporary liberalism have attributed all of this disorder to the shock of our recent election. It's just the ordinary chaos, they insist, that follows an unexpected loss. But something deeper is amiss. Something was lost in the confusion after they crashed into November, and nothing, not even future victories, will bring it back. This breakdown has been a long time coming. These last few months have only made it more obvious, and more complete. What happened?

The most significant development in the past 30 years of liberal self-conception was the replacement of politics understood as an ideological conflict with politics understood as a struggle against idiots unwilling to recognize liberalism's monopoly on empirical reason. The trouble with liberalism's enemies was no longer that they were evil, although they might be that too. The problem, reinforced by Daily Kos essays in your Facebook feed and retweeted Daily Show clips, was that liberalism's enemies were factually wrong about the world. Just take a look at this chart …

This shift was a necessary accommodation to the fact that, beginning with Bill Clinton, the slim ideological differences that existed between the Democrats and the GOP were replaced with differences of style. Clinton's "Third Way" promised to be every bit the dupe-servant of war and profit its rivals were, but to do it with the measured confidence of an expert. The New Democrats would destroy the labor movement, but sigh about it. They would frown while they voted to authorize the next war. They would make only the concessions necessary to bolster the flailing engine of finance capital, but they would do it with the latest research in the world. The point, as Jonathan Chait made clear in his 2005 manifesto for this new liberalism, "Fact Finders," was not the moral content of any particular policy, but the fact that liberals in the 21st century were open to evidence, whereas conservatives were not. "The contrast between economic liberalism and economic conservatism," he wrote, "ultimately lies […] in different epistemologies. Liberalism is a more deeply pragmatic governing philosophy more open to change, more receptive to empiricism, and ultimately better at producing policies that improve the human condition." It is not a coincidence that Chait's essay quickly devolves into a defense of welfare reform.

Liberalism remained slightly kinder than pure reaction not quite so racist, not so terribly brutal to the poor but even these commitments were subsumed by the ideology of pure competence. Bigotry wasn't evil, it was just stupid, an impediment to growth. Health care reform and the welfare state were not moral necessities, they were the best means of keeping workers healthy and productive. The notion that knowledge asymmetries lay at the root of all political conflict was quickly transmuted into the basis of policy itself. If liberals became masters of the world due to their superior respect for facts, then education not redistribution was the only hope for the dispossessed. If liberals believed in climate change because scientists told them they should, then the trouble was not the metastatic excesses of capital but the failure of reactionaries to bow to empirical consensus.

The result was an American political movement whose center was a moral void. When John Kerry spoke out against the death penalty, his opposition was based in flawed application the punishment just wasn't smart. When he criticized Bush's handling of the War in Iraq, his position was similar: he would continue the war but be more strategic about it. When Kerry lost, American liberals opined that there were just too many rubes out there. They would have voted better smarter if only they had had the right data visualizations in front of them. When Barack Obama won, and then passed the Heritage Foundation's health care policy while carrying out a drone war responsible for the incineration of children in half a dozen sovereign nations, he did it while remaining the smartest guy in the room. That was what mattered. At the dawn of the 21st century, we stood on the doorstep of a permanent managerial world order. The wonks just needed to finish explaining it to the rest of us.

The 2016 presidential election was meant to be the final victory of the wonk-managers, the triumph of a West Wing fantasy wherein the leadership class didn't quite do anything beyond displaying the sublime confidence of cerebral people hurrying down the hallways of power with matters well in hand. Donald Trump was a perfect foe: the forces of stupidity and reaction, starkly manifested, were about to be dispatched. By this point, the knowledge-asymmetry theory of politics had become a commitment so pervasive that its champions could articulate it explicitly: Hillary Clinton was the most qualified candidate in history, full stop. The Clinton campaign was technocratic liberalism incarnate. Its surrogates might have been empty or evil, but they were smart. Its ideas might have been inert, but they were backed up by the latest charts. The campaign's messaging apparatus was a digital marvel, cooked up by the best computers Robby Mook could buy. The Clinton campaign believed that it would win because it predicted that it would win, and because the capacity to predict and manage was precisely the competence Clinton's team was selling. But then Clinton lost. The car crashed in the desert instead.

Fake news "Fake news!" in its current incarnation did not originate with Donald Trump. Fake news originated in the liberal impulse. On November 9, 2016, liberals who had not yet seized on the Russians as the proximate cause of their defeat attributed the election results to a widespread and decentralized propaganda campaign: social networks had allowed distorted or even outright false stories to go viral, sometimes outperforming real news items, and it was the ignorance and confirmation bias engendered by these stories that gave Trump his essential margins in Wisconsin, Michigan, and Pennsylvania. It is significant that this was liberalism's immediate reaction, before international conspiracies or morally tinged appeals to bigotry took its place. Despite spending 20 years fact-checking its way into losing control of every level of government in the United States, the Democratic Party's first recourse was to fact-check once again. Here we begin to see what is so strange about today's liberals. It isn't that they've changed. Rather, the political landscape has been irrevocably altered. Liberalism is only doing what it always has, the only thing it can do. Fact check Donald: You're wrong! run hundred-post replies to each of the president's tweets.

Sigmund Freud conceived of the superego as a normative instrument, but it is better understood as a censorious machine. Its strictures, after all, do not come from some interior wellspring; it is not a moral imagination. The rules and they are rules, nothing more are received from outside, then internalized and enforced. The superego, even in Freud, does not direct the ego toward high principle or even a particular sensitivity to injustice. "The super-ego can be thought of as a type of conscience that punishes misbehavior with feelings of guilt," Freud wrote in Introduction to Psychoanalysis. When a transgression is detected, the superego inflicts a psychic wound. It is not a conscience so much as a fully automated priest. The mechanism is simple: sin goes in, censure comes out. Slip up too much and you're excommunicated.

I am not qualified to make, nor do I want to make, any claims about the psychological character of any particular American liberal. And I am not at all convinced that Freudian psychoanalysis constitutes the most useful way to do so, in any case. But the superego as a metaphor for the collective operation of the liberal world order throws a great deal of much-needed light on what we are observing in the wake of the 2016 election. When history is meant to be over and a single political faction begins to conceive of itself as the permanent manager of a static world, then that faction ceases to be political in the ordinary sense. Politics, in its classic incarnation, is the art of deriving an is from an ought; the point, as Marx famously said, is not to describe the world but to change it. But if the world is as it ought to be already and the essential task is to maintain it that is, to police the circumscribed boundaries of permissible behavior and ideas then those tasked with that maintenance must conceive of themselves as acting above politics itself. They become a superego, beyond the libidinal whims of any faction and dedicated not to some alternative vision of the world but to resisting all impulse toward alternatives. Possibility goes in, correction comes out. The End of History suggests a perfectly healthy mind; thus, any attempt to alter this situation is dangerous. But the trouble with superegos is that, once they have taken on this role, they cannot cease to perform it. When the id can be kept in control, all is well. But when it can't, then the result is not the superego's surrender it is repetitious, manic dysfunction. It becomes the blathering superego at the end of history.

The ordinary understanding of managerial liberalism that it is a normal political faction of the capitalist center-left leads inevitably to a number of difficult-to-answer questions. Why, for example, do liberals who routinely insist they support more ambitious progressive programs in their hearts, only rejecting them for now on pragmatic grounds, nonetheless oppose any such leftward movement when it becomes a realistic possibility? Why do they take up that opposition with a special enthusiasm, one that often feels more aggressive and personal than their rejection of their official rivals on the right? The reaction of American liberals to even the moderate-left candidacy of Bernie Sanders reached its apex not in any argument about policy but in Hillary Clinton declaring that single-payer health care was "never, ever" going to happen. The present campaign within the British Labour Party to sabotage Jeremy Corbyn moves along similar lines: the problem is that Corbyn is irresponsible and can't possibly win, a position that becomes a self-fulfilling prophecy. The left now reacts to its notional allies with the cluck-cluck chiding ordinarily directed toward disobedient kids. I do not expect this will be much abated by Corbyn's extraordinary success in an actual election.

If liberalism has ceased to function as a political faction so much as a censorious regency for capital, then there is little difference, in its view, between left and right both are id-ish impulses that must be suppressed. The language of irresponsibility and childishness is not just a messaging contrivance but an explicit statement of core values: the trouble with all of these radical politics is that they want to pull society up by the root and the root, as any adult knows, must be kept firmly in place. The fact that the right receives a larger share of liberalism's disdain is not a reflection of a larger distaste but simply of the fact that the right happens to be winning. That it might be winning because managerial liberalism has hamstrung progressive impulses is an unthinkable idea, dutifully suppressed.

Like any superego, managerial liberalism is concerned first and foremost with appearances. This explains why, in the face of so much bad policy, liberals are incessantly talking about decorum. Thus, the vulgarity and impropriety of Donald Trump are more offensive than his policies, the callousness of his collusion with dictators more insulting than the collusion itself (ordinarily, that is done more quietly, and only with governments like Saudi Arabia, which can butcher their own citizens but not threaten American hegemony). Meanwhile, liberal politicians and journalists express frustration with the rude socialists popping up in their Twitter feeds and at their town halls, refusing to respect their elders. It's all so embarrassing and juvenile, they claim, when what is needed is a sober, adult response to Donald Trump never mentioning that the adults were all routed at the polls by this Monster from the Id.

What has changed in these past few years has only been the capacity of our liberal managers to maintain control. The internet, as the truism goes, is a forum for the id and while it became for liberals a forum for the superego a place to censor and correct and chide in real time the essential nature of the medium chipped away at their control in the same manner it chips away at the capacity of any individual superego to rein in the bad behavior of individuals: it's just easier to act out online. The deeper cause was material: control and propriety are easier to maintain in lush times, and as Western inequality grows in the shadow of an apocalyptic crisis of global ecology, it becomes more and more difficult to suppress radical impulses of all kinds. What became strange, in this new year, was not the behavior of our liberals. That remained the same. What became strange was the world.

For 60 years, liberal managers believed that their political authority was derived from their intellectual authority. When their political authority was suddenly and violently ripped away, they tried to reestablish it by reminding the world that they still knew better than the rest of us. But they got the order of their power backward: without political power, there is no power to assert the boundaries of the normal. "Fake news" was meant to chide the new right into complacency. Instead, the new right, newly in control of our whole government, simply stole the phrase and projected it back again. Now The New York Times and CNN are the Fake News. But a superego can only do one thing correct and so it says "No you!" while its enemies shrug and carry on. The truth is that intellectual authority does not cause political authority, and political authority does not cause intellectual superiority. Both are derived from class power. For 60 years, capital believed that it had the whole world well in hand, and so its most important servants were just the smiling reformists who could keep it that way. But the world changed. Now money has no need for its superego.

Managerial liberalism is doing what any superego must under severe stress: continue, against all hope, to assert control. Yet, faced with an ascendant global right and a resurgent global left, its correcting and corralling impulses have gone haywire. It becomes frenzied, elevating cranks like Louise Mensch in a last-ditch effort to reestablish its authority, shouting this is not normal this is not normal into a void. But what is abnormal is not any particular political state, it is the accelerating collapse of the superego's capacity to regulate the behavior of the body politic. It is the realization that history is not over, and that nothing not the temporary restoration of the Democratic Party to power, or the defeat of every fascist in Europe, or the transformation of the United States's young socialists into eager NIMBY liberals will ever make it stop.
Something strange did happen out there in the desert: the liberal order collapsed, and its survivors wandered back into society, unaware they were now out of a job. Capital has new servants, and new enemies, no longer content merely to battle over a four percent difference in the top marginal tax rate.

In the face of these epochal changes, the superego of managerial liberalism is impotent. On some level it knows that. But it cannot simply abdicate, and it will take a while yet for it to wither entirely away. In the meantime, all it can do is blather, make empty threats of guilt and shame, issue fact-checks and explainers, shout from the roadside to an indifferent planet as the whole world goes libidinal and mad.

Emmett Rensin is an essayist and contributing editor for the Los Angeles Review of Books. His work has appeared in The Atlantic, The New Republic, the Los Angeles Times, and other venues.
Russiagate: Proof Obama's Justice Department placed Trump campaign under surveillance

FISA surveillance of Trump campaign chair Paul Manafort before, during and after Presidential election confirmed.

by Alexander Mercouris

September 19, 2017, 19:29

http://theduran.com/russiagate-proof-oba...veillance/

Quote:An unintended though unsurprising paradox of the Russiagate investigation is that though it has failed to produce any evidence of collusion between Russia and Donald Trump's campaign team because no such collusion took place it is increasingly flushing out evidence of disturbing behaviour against the Trump campaign by former officials of the Obama administration.

Thus a few days ago we had the admission from Susan Rice that members of Donald Trump's transitional team were placed under surveillance before the inauguration for no other reason supposedly than that they met with the Crown Prince of Abu Dhabi (a US ally) and that she then circulated ("unmasked") their identities for no very clear reason internally across the US bureaucracy.

Surveillance of Paul Manafort and of the Trump campaign

Now we have confirmation that Paul Manafort, who was briefly chaired Donald Trump's campaign team and who continued to play an active role in the campaign thereafter, was the subject of two FISA warrants obtained by Obama's Justice Department, and was placed under surveillance before, during and after the Presidential election, and that he was still under surveillance at the start of this year.

The confirmation has come in a story published by CNN, which along with the New York Times and the Washington Post has been the main media outlet driving the Russiagate scandal.

US investigators wiretapped former Trump campaign chairman Paul Manafort under secret court orders before and after the election, sources tell CNN, an extraordinary step involving a high-ranking campaign official now at the center of the Russia meddling probe.

The government snooping continued into early this year, including a period when Manafort was known to talk to President Donald Trump.

Some of the intelligence collected includes communications that sparked concerns among investigators that Manafort had encouraged the Russians to help with the campaign, according to three sources familiar with the investigation. Two of these sources, however, cautioned that the evidence is not conclusive.

Note the careful use of the word "wiretap" the implications of whose I will discuss below.

The surveillance of Manafort took place over an extended period, with a short break during 2016. It was carried out on two different pretexts.

The first supposedly related to the allegations which have swirled around Manafort and which originate in Ukraine that he had some sort of corrupt relationship with the previous Ukrainian government of Viktor Yanukovych, which was overthrown in February 2014 as a result of the Maidan coup, and which he undoubtedly did work for

The FBI interest in Manafort dates back at least to 2014, partly as an outgrowth of a US investigation of Viktor Yanukovych, the former Ukrainian president whose pro-Russian regime was ousted amid street protests. Yanukovych's Party of Regions was accused of corruption, and Ukrainian authorities claimed he squirreled millions of dollars out of the country.

Investigators have spent years probing any possible role played by Manafort's firm and other US consultants, including the Podesta Group and Mercury LLC, that worked with the former Ukraine regime. The basis for the case hinged on the failure by the US firms to register under the US Foreign Agents Registration Act, a law that the Justice Department only rarely uses to bring charges.

All three firms earlier this year filed retroactive registrations with the Justice Department.

It hasn't proved easy to make a case.

Last year, Justice Department prosecutors concluded that there wasn't enough evidence to bring charges against Manafort or anyone of the other US subjects in the probe, according to sources briefed on the investigation.

The FBI and Justice Department have to periodically seek renewed FISA authorization to continue their surveillance.

Note the admission that no evidence of wrongdoing by Manafort involving Ukraine has come to light, and that CNN does not make clear when the FISA authorised surveillance as opposed to the FBI investigation of Manafort's dealings with Yanukovych began.

This supposedly Ukraine related surveillance of Manafort apparently ended at some point in the first half of 2016. By May 2016 Manafort at least was no longer under surveillance. However the surveillance later resumed, possibly in August 2016 or perhaps a little later, this time under the aegis of the Russiagate investigation

The FBI then restarted the surveillance after obtaining a new FISA warrant that extended at least into early this year.

Sources say the second warrant was part of the FBI's efforts to investigate ties between Trump campaign associates and suspected Russian operatives. Such warrants require the approval of top Justice Department and FBI officials, and the FBI must provide the court with information showing suspicion that the subject of the warrant may be acting as an agent of a foreign power.

It is unclear when the new warrant started. The FBI interest deepened last fall because of intercepted communications between Manafort and suspected Russian operatives, and among the Russians themselves, that reignited their interest in Manafort, the sources told CNN. As part of the FISA warrant, CNN has learned that earlier this year, the FBI conducted a search of a storage facility belonging to Manafort. It's not known what they found.

The conversations between Manafort and Trump continued after the President took office, long after the FBI investigation into Manafort was publicly known, the sources told CNN. They went on until lawyers for the President and Manafort insisted that they stop, according to the sources.

It's unclear whether Trump himself was picked up on the surveillance.

(bold italics added)

Here it is worth making a number of points.

(1) It is now clear that Paul Manafort is the main focus of Robert Mueller's investigation and that the success or failure of the investigation and of the whole case of collusion between the Trump campaign and Russia rests on Mueller being able to press a case against him.

(2) It is completely unclear (at least to me) why a FISA warrant was used to carry out the first Ukraine related surveillance of Manafort, which ended some time in early 2016.

On the face of it the FBI investigation of Manafort that was taking place at that time seems to have centred on allegations of corruption by Manafort involving his dealings in Ukraine. That would suggest a criminal not a counter intelligence probe.

In that case any surveillance of Manafort connected to that probe would appear to a require a conventional warrant issued by a conventional criminal court, not a secret warrant, issued by the FISA court, which is an intelligence connected court.

This is important since if Manafort had been placed under surveillance as a result of a conventional warrant issued by some conventional criminal court he would at some point have presumably been informed about it, and which would have been in a position to contest it.

Instead the secret intelligence related FISA court was used, suggesting a counter intelligence operation, resulting in Manafort being placed under surveillance presumably without his knowledge and possibly for an extended period (the CNN article says that the FISA warrant had to be renewed repeatedly).

I am not familiar with US legal practice, but on the face of it this looks to me like a case of misuse of the FISA court and its procedures to make possible extended surveillance of a US citizen against whom no evidence of wrongdoing was ever found.

In light of this, especially since CNN says that the FISA warrant was repeatedly renewed despite no evidence against Manafort coming to light, the Ukraine related allegations which have been made against Manafort start to look like an excuse rather than the true reason for the surveillance.

(3) As the CNN article admits, the application to the FISA court, both in connection to the Ukraine related investigation and in relation to the Russiagate investigation, was authorised by senior officials of Obama's Justice Department and of the FBI. In the latter case that would undoubtedly have included the FBI's director, James Comey, who at the time was leading the investigation.

(4) The CNN article all but says that Donald Trump himself was caught up in the surveillance of Manafort.

The article says that Manafort continued to have regular meetings with Trump right up to the start of this year whilst the surveillance was underway. CNN also says that Manafort had what CNN calls a "residence" in Trump Tower, where Donald Trump until he moved to the White House had his main residence and office.

CNN claims not to know whether Manafort's "residence" was "wiretapped". In reality, given that Manafort was under surveillance, and given that the ostensible reason for the surveillance was to investigate claims of collusion between him as a member of Donald Trump's campaign team and Russia, it beggars belief that it wasn't.

As CNN admits, back in March President Trump caused a storm when he claimed in a series of tweets that his telephones in Trump Tower had been wiretapped on President Obama's orders during the election period.

The claim was widely ridiculed and criticised. However it is now confirmed that the telephones of Paul Manafort at the time one of Donald Trump's closest associates were indeed being wiretapped' during the election period, with the virtual certainty that Manafort's telephones in his "residence" in Trump Tower the same building where Donald Trump had his main residence and office were part of this wiretap'.

Moreover given Trump's and Manafort's closeness to each other at the time, and the physical proximity between them since they were occupying "residences" in the same building, it is hardly implausible that Trump from time to time used the telephones in Manafort's "residence" during the election period, in which case his conversations would have been picked up as a result of the wiretap'.

Though the evidence is not yet conclusive, I am going to express here my view that it was this chain of events which was the probable cause of Donald Trump's outburst in March.

(5) Lastly, CNN provides a clue as to what it was which precipitated the renewed interest in Paul Manafort, which resulted in the surveillance of him resuming in late summer or early autumn.

Manafort was ousted from the campaign in August. By then the FBI had noticed what counterintelligence agents thought was a series of odd connections between Trump associates and Russia. The CIA also had developed information, including from human intelligence sources, that they believed showed Russian President Vladimir Putin had ordered his intelligence services to conduct a broad operation to meddle with the US election, according to current and former US officials.

Compare these words with the very similar words in a Washington Post article dated 23rd June 2017

Early last August, an envelope with extraordinary handling restrictions arrived at the White House. Sent by courier from the CIA, it carried "eyes only" instructions that its contents be shown to just four people: President Barack Obama and three senior aides.

Inside was an intelligence bombshell, a report drawn from sourcing deep inside the Russian government that detailed Russian President Vladi*mir Putin's direct involvement in a cyber campaign to disrupt and discredit the U.S. presidential race.

But it went further. The intelligence captured Putin's specific instructions on the operation's audacious objectives defeat or at least damage the Democratic nominee, Hillary Clinton, and help elect her opponent, Donald Trump…..

The CIA breakthrough came at a stage of the presidential campaign when Trump had secured the GOP nomination but was still regarded as a distant long shot. Clinton held comfortable leads in major polls, and Obama expected that he would be transferring power to someone who had served in his Cabinet.

The intelligence on Putin was extraordinary on multiple levels, including as a feat of espionage.

For spy agencies, gaining insights into the intentions of foreign leaders is among the highest priorities. But Putin is a remarkably elusive target. A former KGB officer, he takes extreme precautions to guard against surveillance, rarely communicating by phone or computer, always running sensitive state business from deep within the confines of the Kremlin

(bold italics added)

Here is what I wrote about these words in the 23rd June 2017 Washington Post article in an article which I wrote on 24th June 2017

That this refers to the Trump Dossier is clear from the highlighted words.

The Trump Dossier purports to be a "report drawn from sourcing deep inside the Russian government that detailed Russian President Vladimir Putin's direct involvement in a cyber campaign to disrupt and discredit the US Presidential race", which is exactly what the report mentioned in the article is said to be.

The timing is right, with the early parts of the Trump Dossier dated to June 2016 and Brennan sending out his memorandum to Obama in August 2016.

No other report other than the Trump Dossier fitting the description of the report in the Washington Post article is known to exist, and the Washington Post article says that "Putin is a remarkably elusive target", which makes it all but certain that no other such report exists.

Moreover the Washington Post article slips out these further very interesting comments about the report mentioned in the article

Despite the intelligence the CIA had produced, other agencies were slower to endorse a conclusion that Putin was personally directing the operation and wanted to help Trump. "It was definitely compelling, but it was not definitive," said one senior administration official. "We needed more."

Some of the most critical technical intelligence on Russia came from another country, officials said. Because of the source of the material, the NSA was reluctant to view it with high confidence.

(bold italics added)

The Trump Dossier is not a US confection but was compiled by Christopher Steele, who is British, and who is a former agent of the British intelligence agency MI6. The fact that the Washington Post story says that "the most critical technical intelligence on Russia came from another country" therefore again clearly points to the Trump Dossier, which originated not in the US but in Britain.

In light of these comments I do not think there is any doubt that it is the early sections of the Trump Dossier that are being referred to, and which were what caused Brennan to send his memorandum to the White House in August.

The close similarity in words between June's Washington Post article and the latest article published by CNN revealing the surveillance of Paul Manafort again points to the Trump Dossier as being the cause.

In other words it was the circulation of the Trump Dossier over the course of the summer, and the credence given to it by some officials in the Obama administration and the CIA, which led to the surveillance of Manafort being resumed in the late summer or autumn of 2016.

Conduct of the Manafort investigation

In the last few weeks Robert Mueller's investigators have put Manafort through the legal equivalent of the third degree'. The extent of the pressure on him is set out in an article which has appeared in the New York Times

Paul J. Manafort was in bed early one morning in July when federal agents bearing a search warrant picked the lock on his front door and raided his Virginia home. They took binders stuffed with documents and copied his computer files, looking for evidence that Mr. Manafort, President Trump's former campaign chairman, set up secret offshore bank accounts. They even photographed the expensive suits in his closet.

The special counsel, Robert S. Mueller III, then followed the house search with a warning: His prosecutors told Mr. Manafort they planned to indict him, said two people close to the investigation.

The moves against Mr. Manafort are just a glimpse of the aggressive tactics used by Mr. Mueller and his team of prosecutors in the four months since taking over the Justice Department's investigation into Russia's attempts to disrupt last year's election, according to lawyers, witnesses and American officials who have described the approach. Dispensing with the plodding pace typical of many white-collar investigations, Mr. Mueller's team has used what some describe as shock-and-awe tactics to intimidate witnesses and potential targets of the inquiry.

Mr. Mueller has obtained a flurry of subpoenas to compel witnesses to testify before a grand jury, lawyers and witnesses say, sometimes before his prosecutors have taken the customary first step of interviewing them. One witness was called before the grand jury less than a month after his name surfaced in news accounts. The special counsel even took the unusual step of obtaining a subpoena for one of Mr. Manafort's former lawyers, claiming an exception to the rule that shields attorney-client discussions from scrutiny.

"They are setting a tone. It's important early on to strike terror in the hearts of people in Washington, or else you will be rolled," said Solomon L. Wisenberg, who was deputy independent counsel in the investigation that led to the impeachment trial of President Bill Clinton in 1999. "You want people saying to themselves, Man, I had better tell these guys the truth.'"

In the event these aggressive tactics appear to have come up with nothing. On 6th August 2017 Mueller's boss Deputy Attorney General Rod Rosenstein the man who would have to approve any prosecutions or indictments before they were issued gave an interview to Fox News (discussed by me here) in which he cast cold water on suggestions that any indictment was pending.

That Manafort is failing to crack', and that the investigations of him are drawing a blank with no evidence presumably being found of the secret offshore bank accounts the investigators were looking for is all but admitted by the CNN article

The government snooping continued into early this year, including a period when Manafort was known to talk to President Donald Trump.

Some of the intelligence collected includes communications that sparked concerns among investigators that Manafort had encouraged the Russians to help with the campaign, according to three sources familiar with the investigation. Two of these sources, however, cautioned that the evidence is not conclusive…..

Manafort previously has denied that he ever "knowingly" communicated with Russian intelligence operatives during the election and also has denied participating in any Russian efforts to "undermine the interests of the United States."

The FBI wasn't listening in June 2016, the sources said, when Donald Trump Jr. led a meeting that included Manafort, then campaign chairman, and Jared Kushner, the President's son-in-law, with a Russian lawyer who had promised negative information on Hillary Clinton.

That gap could prove crucial as prosecutors and investigators under Mueller work to determine whether there's evidence of a crime in myriad connections that have come to light between suspected Russian government operatives and associates of Trump.

The FBI interest in Manafort dates back at least to 2014, partly as an outgrowth of a US investigation of Viktor Yanukovych, the former Ukrainian president whose pro-Russian regime was ousted amid street protests. Yanukovych's Party of Regions was accused of corruption, and Ukrainian authorities claimed he squirreled millions of dollars out of the country.

Investigators have spent years probing any possible role played by Manafort's firm and other US consultants, including the Podesta Group and Mercury LLC, that worked with the former Ukraine regime. The basis for the case hinged on the failure by the US firms to register under the US Foreign Agents Registration Act, a law that the Justice Department only rarely uses to bring charges.

All three firms earlier this year filed retroactive registrations with the Justice Department.

It hasn't proved easy to make a case.

Last year, Justice Department prosecutors concluded that there wasn't enough evidence to bring charges against Manafort or anyone of the other US subjects in the probe, according to sources briefed on the investigation.


(bold italics added)

CNN is here conflating the results of the two probes: the probe into the corruption allegations against Manafort connected to his dealings with Ukraine, and the separate probe into the Russiagate allegations.

However it is clear that the corruption allegations are going nowhere ("it hasn't proved easy to make a case") a further indication incidentally that the July search of Manafort's residence came up with nothing whilst the surveillance of Manafort which began last year has apparently produced no evidence of illegal collusion between Manafort and Russia at all ("Two of these sources, however, cautioned that the evidence is not conclusive…..").

That incidentally was already admitted by CNN in an article it published on 4th August 2017 shortly after the search of Manafort's residence which admitted that Manafort was not being accused of any wrongdoing, and that the evidence of illegal collusion between Donald Trump's campaign and Russia was simply not turning up

Even at the FBI, there's a measure of frustration over the investigation.

After a highly contentious year investigating Hillary Clinton's private email servers and being accused of swinging the election against her, the FBI finds itself again where officials tried not to be: amid a politically treacherous investigation that has hobbled a new President.

Worse yet, some FBI officials fear the question of whether there was any criminal coordination or collusion between the Trump campaign and Russia may never be answered.

One challenge is that tantalizing pieces of intelligence are missing key links because they did not develop long enough for investigators to determine their significance. These include intercepts monitored by US intelligence that showed suggestions of illegal coordination but nothing overt.

Those missing links mean that the FBI and Mueller's prosecution team may not have enough evidence to bring charges related to possible illegal coordination with a foreign intelligence service. Instead, prosecutors could pursue financial crime charges unrelated to the election.

Investigators also face a big hurdle: those participating in the intercepted communications were foreigners, outside the reach of the FBI, who may be exaggerating or lying about events.

Some FBI officials also blame media coverage dating back to last summer for prompting some communications to cease, and making it more difficult for investigators to monitor the interactions of Russians and campaign associates.

(bold italics added)

For my detailed discussion of this 4th August 2017 CNN article here.

Compare these comments in CNN's 4th August 2017 article about "missing links" with the frankly desperate claim in CNN's latest article that the reason these "missing links" are not being found is because Manafort was not under surveillance for a period last year when these "missing links" might have been found ("That gap could prove crucial….").

Given the aggressive tactics which Mueller's team have been using as revealed in the New York Times article, and the fact that these tactics are drawing a blank, it is completely unsurprising that as CNN revealed in its 4th August 2017 article some of Mueller's investigators are now taking out private liability insurance.

CNN has learned some of the investigators involved in the probe are buying liability insurance out of concern they could become targets of lawsuits from those who are being investigated, according to one of the people familiar with the probe. The Justice Department covers legal fees for employees sued in the course of their duties, but some of the lawyers want extra protection.

The Justice Department and special counsel's office both declined to comment on the liability concerns.

(bold italics added)

Summary

What do all these revelations tell us about the state of the Russiagate investigation? In my opinion the position can be summarised as follows:

(1) the complaints made by Donald Trump and his associates that the Obama administration placed at least some of them under surveillance before, during and after the election are turning out to be true.

Paul Manafort was placed under surveillance well before the election through what looks like a misuse of the FISA process. During the election he was placed under surveillance again, as was Carter Page, who however had only a peripheral role in the Trump campaign. The fact that the FISA process was used shows that in both cases shows senior officials of Obama's Justice Department were involved, and that this was not a conventional legal process, with no evidence of criminal wrongdoing existing such as might have justified obtaining a conventional criminal warrant.

Almost certainly Donald Trump was caught up in the surveillance as he apparently found out to his great anger in March with the surveillance being expanded after the election to take in other Trump associates such as Flynn and Kushner, often on the flimsiest pretexts, such as that they had had meeting with the Crown of Abu Dhabi, who is actually the US's friend and ally, and who denies that he had any role in setting up a secret backchannel between the Trump transition team and Russia.

Susan Rice, Obama's National Security Adviser, has now admitted arranging for the identities of the Trump associates caught up in the surveillance to be revealed and circulated throughout the US bureaucracy, though no proof of wrongdoing or of illegal collusion with Russia by any of these people has ever come to light.

(2) By contrast all efforts to find proof of wrongdoing which might justify this surveillance are drawing a blank, with the investigators becoming increasingly desperate and aggressive as they search for evidence of wrongdoing which is simply not appearing, because of course it doesn't exist.

An ill-conceived and improperly conducted search of Paul Manafort's house followed up by what appear to have been unwarranted threats of a pending criminal indictment appears to have seriously backfired, coming up with nothing useful, leading to recriminations within Mueller's team with some of them taking out legal liability insurance presumably following threats of legal action by Manafort's lawyers.

Conclusion

Back in March, in the aftermath of Donald Trump's claims (which he has never retracted) that President Obama had his telephones wiretapped during the Presidential election, I wrote that it was the way the Obama administration had used the US intelligence community to conduct surveillance of Donald Trump and his campaign team during the election despite the absence of any evidence of wrongdoing by any of them which was the true scandal of 2016

What we now learn is that the Obama administration, of which Hillary Clinton was once a part, used the US's federal security and intelligence agencies during the election to spy on Hillary Clinton's opponent, Donald Trump, and on his campaign. They did so despite the fact that no evidence existed or has ever come to light of any wrongdoing by Donald Trump or by anyone else working on his behalf or for his campaign such as would normally justify surveillance.

This is the true scandal of the US Presidential election of 2016. By contrast the various claims of Russian interference in the election are unproven and threadbare and almost certainly wrong, whilst the claims of illicit contacts between the Trump campaign and Russia are undoubtedly false and wrong.

This statement has to be qualified in that we now know that evidence was in fact believed to exist at the time the surveillance was ordered, with some of the people who ordered the surveillance apparently believing in this evidence. The evidence in question was however almost certainly the Trump Dossier, an uncorroborated and obviously concocted document, to which no credence should ever have been given.

The big question of the Russiagate scandal should be not whether collusion between Donald Trump's campaign team and Russia ever took place. The despairing comments of the investigators leaked to CNN show that no proof of this will ever be found because no such proof exists.

The big question is whether the true scandal of the 2016 election, the fact that during the election Obama's Justice Department and the US intelligence community undertook surveillance of the campaign team of Hillary Clinton's Republican opponent, will ever be publicly admitted in the US.

The fact that we now have revelations of surveillance of Paul Manafort and Carter Page during the election, and admissions that following the election the surveillance was further extended to include still more members of Trump's campaign team, under the fact that this surveillance was carried out on either false (the meeting with the Crown Prince of Abu Dhabi) or flimsy (the Trump Dossier) pretexts, and that no senior official of the US government or member of the Congress, and no part of the establishment media, seem at all concerned, provides the answer to that question.
It looks like Obama did spy on Trump, just as he apparently did to me

September 20, 2017 - 08:30 AM EDT

BY SHARYL ATTKISSON, OPINION CONTRIBUTOR

http://thehill.com/opinion/campaign/3514...-to-me?amp

Quote:Many in the media are diving deeply into minutiae in order to discredit any notion that President Trump might have been onto something in March when he fired off a series of tweets claiming President Obama had "tapped" "wires" in Trump Tower just before the election.

According to media reports this week, the FBI did indeed "wiretap" the former head of Trump's campaign, Paul Manafort, both before and after Trump was elected. If Trump officials - or Trump himself - communicated with Manafort during the wiretaps, they would have been recorded, too.

But we're missing the bigger story.

If these reports are accurate, it means U.S. intelligence agencies secretly surveilled at least a half dozen Trump associates. And those are just the ones we know about.

Besides Manafort, the officials include former Trump advisers Carter Page and Michael Flynn. Last week, we discovered multiple Trump "transition officials" were "incidentally" captured during government surveillance of a foreign official. We know this because former Obama adviser Susan Rice reportedly admitted "unmasking," or asking to know the identities of, the officials. Spying on U.S. citizens is considered so sensitive, their names are supposed to be hidden or "masked," even inside the government, to protect their privacy.

In May, former Director of National Intelligence James Clapper and former Acting Attorney General Sally Yates acknowledged they, too, reviewed communications of political figures, secretly collected under President Obama.

Weaponization of intel agencies?

Nobody wants our intel agencies to be used like the Stasi in East Germany; the secret police spying on its own citizens for political purposes. The prospect of our own NSA, CIA and FBI becoming politically weaponized has been shrouded by untruths, accusations and justifications.

You'll recall DNI Clapper falsely assured Congress in 2013 that the NSA was not collecting "any type of data at all on millions or hundreds of millions of Americans."

Intel agencies secretly monitored conversations of members of Congress while the Obama administration negotiated the Iran nuclear deal.

In 2014, the CIA got caught spying on Senate Intelligence Committee staffers, though CIA Director John Brennan had explicitly denied that.

There were also wiretaps on then-Congressman Dennis Kucinich (D-Ohio) in 2011 under Obama. The same happened under President George W. Bush to former Congresswoman Jane Harman (D-Calif.).

Journalists have been targeted, too. This internal email, exposed by WikiLeaks, should give everyone chills. It did me.

Dated Sept. 21, 2010, the "global intelligence" firm Stratfor wrote:

[John] Brennan [then an Obama Homeland Security adviser] is behind the witch hunts of investigative journalists learning information from inside the beltway sources.

Note -- There is specific tasker from the WH to go after anyone printing materials negative to the Obama agenda (oh my.) Even the FBI is shocked. The Wonder Boys must be in meltdown mode...

The government subsequently got caught monitoring journalists at Fox News, The Associated Press, and, as I allege in a federal lawsuit, my computers while I worked as an investigative correspondent at CBS News. On Aug. 7, 2013, CBS News publicly announced:

... correspondent Sharyl Attkisson's computer was hacked by 'an unauthorized, external, unknown party on multiple occasions,' confirming Attkisson's previous revelation of the hacking.

Then, as now, instead of getting the bigger story, some in the news media and quasi-news media published false and misleading narratives pushed by government interests. They implied the computer intrusions were the stuff of vivid imagination, conveniently dismissed forensic evidence from three independent examinations that they didn't review. All seemed happy enough to let news of the government's alleged unlawful behavior fade away, rather than get to the bottom of it.

I have spent more than two years litigating against the Department of Justice for the computer intrusions. Forensics have revealed dates, times and methods of some of the illegal activities. The software used was proprietary to a federal intel agency. The intruders deployed a keystroke monitoring program, accessed the CBS News corporate computer system, listened in on my conversations by activating the computer's microphone and used Skype to exfiltrate files.

We survived the government's latest attempt to dismiss my lawsuit. There's another hearing Friday. To date, the Trump Department of Justice - like the Obama Department of Justice - is fighting me in court and working to keep hidden the identities of those who accessed a government internet protocol address found in my computers.

Evidence continues to build. I recently filed new information unearthed through forensic exams. As one expert told the court, it was "not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack."

https://twitter.com/stillgray/status/909...frame.html

Patterns

It's difficult not to see patterns in the government's behavior, unless you're wearing blinders.

The intelligence community secretly expanded its authority in 2011 so it can monitor innocent U.S. citizens like you and me for doing nothing more than mentioning a target's name a single time.

In January 2016, a top secret inspector general report found the NSA violated the very laws designed to prevent abuse.

In 2016, Obama officials searched through intelligence on U.S. citizens a record 30,000 times, up from 9,500 in 2013.

Two weeks before the election, at a secret hearing before the FISA court overseeing government surveillance, NSA officials confessed they'd violated privacy safeguards "with much greater frequency" than they'd admitted. The judge accused them of "institutional lack of candor" and said, "this is a very serious Fourth Amendment issue."

Officials involved in the surveillance and unmasking of U.S. citizens have said their actions were legal and not politically motivated. And there are certainly legitimate areas of inquiry to be made by law enforcement and intelligence agencies. But look at the patterns. It seems that government monitoring of journalists, members of Congress and political enemies - under multiple administrations - has become more common than anyone would have imagined two decades ago. So has the unmasking of sensitive and highly protected names by political officials.

Those deflecting with minutiae are missing the point. To me, they sound like the ones who aren't thinking.

Sharyl Attkisson (@SharylAttkisson) is an Emmy-award winning investigative journalist, author of The New York Times bestsellers "The Smear" and "Stonewalled," and host of Sinclair's Sunday TV program "Full Measure."
Will The "Deep State's" War on Trump Lead To An Actual Civil War?

Written by Andrew KORYBKO on 21/09/2017

Oriental Review is publishing the English original of Andrew Korybko's interview with an Iranian newspaper from earlier this month.

https://orientalreview.org/2017/09/21/wi...civil-war/

Quote:After only eight months after entering into office, we have witnessed the resignation and dismissal of 15 high-ranked people from the White House. In view of this, do you think that Trump will be able to finish his first term? Some analysts suggest that he won't, so how unstable do you think the political situation in the US, and how serious of a threat does it pose to Trump's presidency?

There have been over a dozen high-level and much-publicized personnel shifts in the Trump Administration in the past 9 months, but they shouldn't be interpreted as signaling that the President himself will be leaving anytime soon. These are all just casualties of Trump's war with the "deep state" (permanent military, intelligence, and diplomatic bureaucracies), whereby the vested power interests in the US are fighting to defeat the "Make America Great Again" (MAGA) movement. Throughout the course of this conflict, Trump has clearly been thrown on the defensive as he's had to compromise on his promised foreign policy platforms in order to retain a chance at succeeding on the domestic front, but even that looks uncertain right now in some respects as the "deep state", aided by the RINOs (Republicans In Name Only), relentlessly continues to chip away at MAGA in order to retain their power and influence.

If they can force Trump into submission and turn him into their puppet, as they're trying to do, then there would be no need to attempt to remove him from office; likewise, if he continues to resist in some capacities, as he's doing on domestic issues, then this scenario because more possible. Even so, it's unlikely to succeed except in the event that Trump's enemies can pull off turning him into the "fascist dictator" that they've fear mongered he'd become even before he was elected.

The only conceivable way for this to happen is if the domestic unrest in the US between the Alt-Left and Alt-Right becomes so uncontrollable that Trump is forced to implement limited martial law, and if (or likely when) a racial minority or group thereof is killed during this time, regardless of the circumstances, this would be used to swiftly bring about attempted impeachment charges on whatever trumped-up pretext can be made. It's not being implied that this will succeed, but just that if one talks about the impeachment scenario, then this is the only one out of the wide array that are being bandied about which has any realistic chance of succeeding, though the odds are nevertheless still slim.

Charlottsville

"The New Yorker" recently published an article which said that racism and fascism have been on the rise after Trump's election, pointing to the incident in Charlottesville as proof of that. In your view, what's the risk that this will spark a war between the left and right in the US?

"The New Yorker", given its liberal-progressive and endemic anti-Trump bias, shouldn't be trusted as a reliable source of information, but the fact that it's pushing the Mainstream Media narrative about Trump coming to power on the backs of racists and fascists deserves to be elaborated on. This is a false stereotype which suggests that "white" (Caucasian) people are racists simply because of their skin color, and therefore voted for Trump on that basis alone, which isn't the case at all and is condescending to the tens of millions of people who supported him for his policies.

That being said, there are indeed some actual racists and fascists who openly support Trump, but they're such a small minority of the population as to be statistically irrelevant. For instance, the notorious Ku Klux Klan only has several thousand members nationwide, which pales in comparison to the at least 100,000-200,000 members of the Alt-Left militant group "Antifa", which has proven to be much more violent and dangerous than their Alt-Right counterparts.

The reason why the "deep state" is trying to link racists and fascists to Trump is to discredit his election victory, so their affiliated Mainstream Media proxies amplify the voices and numbers of a tiny minority of a minority of individuals in order to promote this perception. Nevertheless, they are dangerous and deserve to be condemned, though to be fair, so too should most of their Alt-Left counter-protesters, and for even more urgent reasons.

When "Antifa" is heralded as "heroes" despite their wanton destruction and actual fascist-like violent intolerance for any dissenting views, this lends "legitimacy" to their tactics and "normalizes" them, essentially turning Far-Left street destabilizations into an accepted part of life for the elite because of their weaponized instrumentalization in intimidating the vast majority of Trump's non-racist non-fascist base. In turn, this can only provoke a defensive reaction from these people which spikes the chances of Left-Right clashes becoming as common in the future in America's cities as gangland shootings are today.

To tie all of this in with the previous question, the reason why the "deep state" and Soros-affiliated Alt-Left groups want to spark such pronounced disorder and chaos in the US is to fuel a Color Revolution which would then rapidly descend into an Unconventional War of urban terrorism and political killings, all with the intent of driving Trump to become the "fascist dictator" that they fear mongered he'd become so as to have a basis for pushing through impeachment proceedings against him should racial minorities be killed if he implements limited martial law in response.

DISCLAIMER: The author writes for this publication in a private capacity which is unrepresentative of anyone or any organization except for his own personal views. Nothing written by the author should ever be conflated with the editorial views or official positions of any other media outlet or institution.
Quote:To tie all of this in with the previous question, the reason why the "deep state" and Soros-affiliated Alt-Left groups want to spark such pronounced disorder and chaos in the US is to fuel a Color Revolution which would then rapidly descend into an Unconventional War of urban terrorism and political killings, all with the intent of driving Trump to become the "fascist dictator" that they fear mongered he'd become so as to have a basis for pushing through impeachment proceedings against him should racial minorities be killed if he implements limited martial law in response.

Another option: Trump has been placed in the presidency for purposes yet to be determined since Hillary turned out to be a very bad candidate. He could well be an unwitting patsy of sorts. It is probably that part of the plan is to transfer power to the military as a very quiet coup -- mission accomplished. Watch out for some kind of managed dialectic.
MI6 was the engine of interwar fascism (the financer of Mussolini, the airline of Franco, to name but two), and central to the Conservative Party's assault on inter-war British elections. Post-war, it retained status and power by throwing in its lot with the CIA, and serving it faithfully from the destruction of Roger Hollis, to the Indonesian holocaust, and the overthrow of Allende.

And now in the attempt to destroy Trump.

British Involvement In "Trump Dossier" Needs Further Investigation

Moon of Alabama

26 October 2017

http://www.moonofalabama.org/2017/10/the....html#more

Quote:We noted back in July that the only relevant "collusion with the Russians" during the 2016 election cycle was the Democratic Party and Hillary Clinton smear campaign against Donald Trump:

Hillary Clinton campaign cut-out hires the (former?) British intelligence agent Steele to pay money to (former?) Russian intelligence agents and high-level Kremlin employees for dirt about Donald Trump. They deliver some fairy tales. The resulting dossier is peddled far and wide throughout Washington DC with the intent of damaging Trump.
There was never evidence that Steele indeed talked to any Russian, or really had contact with his claimed sources. He has been for years persona non grata in Moscow and could not visit the country.

Yesterday, our assertion that Clinton campaign cut-outs paid for the dossier, was finally confirmed: Clinton campaign, DNC paid for research that led to Russia dossier

Marc E. Elias, a lawyer representing the Clinton campaign and the DNC, retained Fusion GPS, a Washington firm, to conduct the research.
..,
After that, Fusion GPS hired dossier author Christopher Steele, a former British intelligence officer with ties to the FBI and the U.S. intelligence community, according to those people, who spoke on the condition of anonymity.

Told ya so ...

Michael Sussmann, a lawyer from the same firm that hired Fusion GPS on order of Democrats, hired the Crowdstrike cyber-outlet to investigate the leak of DNC emails. Crowdstrike and the DNC denied the FBI access to the relevant servers but asserted that "Russian hacking" was the source of the leak.

The "Trump dossier" was opposition research ordered up and paid for by the Clinton/DNC mafia. Most of its content was obviously fake or patched together from publicly known facts. But it took up to now for U.S. media to point that out. The fake dossier, paid for by the Democrats, was used by the FBI under Obama to get FISA warrants to spy on Republican party operatives.

We noted in January that the dossier was additionally used by the British and American deep state to sabotage Trump's plans for better relations with Russia (see original for source quotes):

The "former" desk officer for Russia in the British MI6 Christopher Steele was the one who prepared the 35 pages of obviously false claims about Russian connections with and kompromat against Trump. There are so many inconsistencies in these pages that anyone knowledgeable about the workings in Moscow could immediately identify it as fake.
...
Steele spread the fakes throughout the press corps in Washington DC but no media published them because these were obviously false accusations.

Steele then decided to hand the papers to the FBI and to talk to its agents hoping they would start an official investigation. He cleared his move (or was ordered to proceed?) at the highest level of the British government:
...
When Steele's first move with the FBI in October did note deliver the hoped for results an attempt to stove pipe them through Senator John McCain was launched. A "former" British ambassador to Moscow arranged the hand over:
...
The MI6 is well known for launching fakes on behalf of the British government.

Even the second, more official handover to the FBI still did not result in the hoped for publication of the allegations. But by that time Clinton was widely expect to win the election anyway so no further steps were taken.

After Trump unexpectedly won the election a new effort was launched to publish the smears. The Director of National Intelligence decided (or was ordered to) "brief" the President, the President elect and Congress on the obviously dubious accusations.

It was this decision that made sure that the papers would eventually be published. As the NYT noted:
...
Only after Clapper or others leaked to CNN about the briefing of Obama, Trump and Congress, did CNN publish about the 35 pages:
...
The attack was a deep state attempt to stage a coup against Trump:

After the election the Democrats stopped paying for new Steele reports. But by then efforts to make the fake Steele reports public and to thereby sabotage Trump policies turned into high gear. McCain had already been involved in distributing the report and it was he or the Brits who who paid for the last fake report Steele delivered:

Let me remind you of the basic facts about the Dossier--It consists of 13 separate reports. The first is dated 20 June 2016. That date is important because it shows that it took a little more than two months [after the Democrats started paying] for Fusion GPS to generate its first report on Trump's alleged Russian activities. If Fusion GPS already had something in the can then I would expect them to have put something out in early May. Eleven more reports were generated between 26 July and 19 October 2016. That tracks with the letter from Perkins Coie that the engagement by the Clinton Campaign ended at the end of October.

But there is a big problem and unanswered question--The Dossier includes a final report that is dated 13 December 2016. Who paid for this? Was it John McCain?

The purpose of the final fake report Steele added to the dossier was to provide "evidence" that Trump was involved in the "Russian hacking" of the DNC:

After Donald Trump was elected, Christopher Steele prepared an additional memorandum (dated 13 December 2016) that made the following claims:

Michael Cohen[, President Donald Trump's longtime personal lawyer,] held a secret meeting in Prague, Czechoslovakia in August 2016 with Kremlin operatives.

Cohen, allegedly accompanied by 3 colleagues (Not Further Identified), met with Oleg SOLODUKHIM to discuss on how deniable cash payments were to be made to hackers who had worked in Europe under Kremlin direction against the Clinton campaign and various contingencies for covering up these operations and Moscow's secret liaison with the Trump team more generally.

In Prague, Cohen agreed (sic) contingency plans for various scenarios to protect the operation, but in particular what was to be done in the event that Hillary Clinton won the Presidency.
Sergei Ivanov's associate claimed that payments to hackers had been made by both Trump's team and the Kremlin.
...
Christopher Steele passed a copy of the December memo to a senior UK Government national security official and to Fusion GPS (via encrypted email) with the instruction to give a hard copy to Senator McCain via David Kramer.

Michael Cohen, Trump's lawyer, denies to have been in Prague. The meeting Steele "reported" did not happen. The intent of this December Steele report was to further the meme of "Russian hacking" by providing fake evidence for alleged Trump involvement in it. But the report is false. Trump/Cohen did not hire "Russian hackers". Who's interest was it to plant this meme? Was this a British attempt to divert attention from their own hacking?

The Brits are knee deep involved in the Steele reports. There is the hiring of a (former?) British MI-6 agent to make up the dossier. Who came up with his name? The dossier was first peddled to McCain by a (former?) British ambassador. The British government green-lighted pushing the report to the FBI. It was one of the customers of the last Steele report.

The source said that Mr Steele spoke to officials in London to ask for permission to speak to the FBI, which was duly granted, and that Downing Street was informed.
The last Steele report was not paid for by the DNC. It was delivered to British government and to John McCain. The purpose of this last report was to plant false evidence that Trump paid for "Russian hacking". There is a strong cooperation between U.S. and British intelligence.

Why were the highest levels of the British government involved in the "private investigation" that resulted in the Steele dossier. Did the Brits act on their own initiative or were they cut-outs for U.S. intelligence circles, especially for Obama's consigliere and CIA director John Brennan?

It his time for Congress to dig deeper into the undue British influence in this whole affair.

Posted by b on October 26, 2017 at 03:26 AM
Dirty Trump dossier: what no one is talking about

A British spy's fantastical story

By Jon Rappoport

27 October 2017

https://jonrappoport.wordpress.com/2017/...ing-about/

Quote:"Excuse me, can you help me? I'm a spy." (Doctor Who)

First, a bit of background.

The dirty Trump dossier made several claims:

One: Russia had strong blackmail material on Trump and could thus control him;

Two: Most damning in that material, Trump used prostitutes while he was in Russia, and paid several of them to urinate on a hotel bed Obama had once slept in;

Three: Russia hacked DNC (Democratic National Committee) emails and passed them on WikiLeaks, who published them. The emails were damaging to Hillary and helped Trump win the election;

Four: Russia wanted Trump to win the election.

Major media are now covering the Trump dossier from a new angle---who paid a British ex-spy to assemble it?

And the answer everyone already knew---Hillary Clinton's camp and the Democratic National Committee---is out in the open.

Follow the bouncing ball. It goes this way:

During the 2016 presidential campaign, the Hillary team and the DNC funneled some $9 million to a Hillary lawyer, Marc Elias, and his law firm, Perkins-Cole.

That money then went to a research firm, GPS Fusion, who passed some part of it on to a British ex-spy, Christopher Steele. Steele had once worked in Russia and allegedly had many connections there.

Steele put together the Trump dossier after consulting with a number of Russians and spreading some money around. He gave the dossier to his employer, GPS Fusion. The dossier found its way to many media outlets, who sat on it for a while and eventually decided to run with it and slam Trump without let-up.

Steele also took the dossier to the FBI (and other intelligence agencies in the US and England). The FBI offered to pay Steele to keep digging up dirt on Trump!---but when the dossier went public and the media trumpeted its claims, the FBI withdrew its offer.

Given that background, let's go deeper.

The fact that Hillary's team paid to get damaging info on Trump is no surprise. It's called opposition research, and many candidates engage in it.

But paying Steele to put together the dossier and hiding the payments ---that's illegal. It's also a ruse to parlay the un-vetted dossier into a pretext for: Democrat eavesdropping on Trump and his associates, as well as Robert Mueller's investigation of Trump.

The contents of the dossier are open to question. Is Steele's research accurate?

And here is what no one is examining in any depth. Steele claims, in the dossier, that he was talking with a number of well-placed Russian officials. That's where he obtained his information.

What? Why would these Russians speak with him? Why would these Russians expose a purported plot, built by their own colleagues, under Putin's orders, to hand the election to Trump?

If such a plot existed, it would be a tightly controlled secret.

Yet, here are Russian intelligence people spilling the beans to Steele, a former British spy.

And by spilling the beans, they're risking their own lives, because there is a good chance their Russian colleagues and superiors will be able to track them down and identify them, since they've had connections to Steele in the past.

Steele appears to have pulled off an intelligence op for the ages. He goes to Russia, sits down with a number of Russian intel people, asks them questions, and they tell him all about a top-secret plot to sway a US election. No problem.

Keep this in mind as well. While Steele worked for MI-6, the British spy agency, he was stationed in Moscow (1990-92) using a diplomatic cover. In order to put together the numerous Russian sources he was able to tap years later while assembling the Trump dossier, Steele must have blown his cover to pieces as he cultivated those Russian intel sources back in the 1990s. Odd, to say the least.

Let's imagine a similar scenario playing out in the US. During a campaign to elect a president of Russia, a Russian ex-spy who once worked at the Russian Embassy in Washington, under diplomatic cover, comes to the US and sits down with a few of his old pals from the CIA.

Risking their reputations, careers, and lives, these CIA people tell him that, under orders from the president of the US, they've been putting together files on one of the Russian presidential candidates. They tell him they favor this candidate. They tell him they have important blackmail info on this candidate and can control him if he wins the Russian election. THEY HAND HIM THE MOST IMPORTANT INFO IN THE FILES.

Poof. No problem. The Russian ex-spy returns to Russia with the info.

Really? How likely is that?

If we bend and twist credulity, and assume Christopher Steele did extract highly secret info about a Russian plot to hand the election to Trump and then control Trump as a Russian asset---if we assume all that to be true, well, we have just uncovered a MAJOR FRACTURE in the Russian intelligence establishment.

We have uncovered a volatile rebellion in the Russian ranks, a rebellion against Putin himself. This rebellion is so relentless, the Russian instigators are willing to risk life and limb to forward it.

Their hostility toward Putin is so great, they've picked this operation---Russia influencing the US election on behalf of Trump---to torpedo the president of Russia.

If you were Putin, what could you do? The answer is obvious, and what you could do would be quite effective:

"All right, men, I've brought you here because I trust you, and I'd better be right in that trust. I want you to collect every shred of information that exists on this British spy, Steele, going all the way back to when he was first stationed in Moscow. I want to know everyone he knew, everyone he had coffee and drinks and lunches and dinner with---every single Russian. I want you to unearth every detail, and find out who he tapped a year ago, when he put together this Trump dossier. Give me names. Don't fail."

Of course, these Russians who supposedly handed over key information to Steele already knew, at the time, that this would happen. They would be hounded and most likely exposed. But...they didn't care. They were willing to go to the wall.

OR...Steele never accumulated all the information in the Trump dossier. He made unwarranted leaps of inference. He inflated information. He invented key facts. He wanted to satisfy his employers, GPS Fusion, Hillary Clinton, and the DNC. They wanted dirt on Trump, and he gave them dirt.

For example, Steele claims, in the Trump dossier, that he discovered Russians hacked the DNC servers, extracted thousands of emails, and passed them on WikiLeaks. The implication is, Russian operatives told Steele about the plot.

As we know, there has been a great deal of discussion around this point. Was there a hack of DNC emails, or was it a leak from inside the DNC? Without trying to draw a final conclusion from myriad technical and political analysis, I'll point to a statement, published in The Nation, by a several analysts from the Veteran Intelligence Professionals for Sanity (VIPS):

"For more than a year, we have been pointing out that any data acquired by a hack would have had to come across the Internet. The blanket coverage of the Internet by the NSA, its UK counterpart GCHQ, and others would be able to produce copies of that data and show where the data originated and where it went. But US intelligence has produced no evidence that hacking by Russia led to it acquiring the DNC e-mails and passing them on to WikiLeaks."

That's a cogent point. If Steele really did extract a confession from Russian intelligence officials pointing to a Russian hack of the DNC emails, why doesn't the NSA or GCHQ confirm it and show us the evidence?

All in all, Steele has built a Trump dossier based on his highly questionable access to Russian intelligence professionals. If at this point, he cares about convincing us he's on the level, he'll have to do a lot of talking. At a recent photo op, he declined to comment on anything more than how happy he was to get back to work for his current private-sector company, Chawton Holdings. Otherwise, he was a silent bland egg.

That isn't going to cut it.

We're left with a fantastical story about his penetration of Russian higher-ups. Daniel Craig could play the Steele role in a Netflix series, and a bunch of good Russian actors who've been hanging around since the early James Bond movies, hoping for work, could step in, but beyond that, Steele has nothing to offer.

I'm working on the Netflix script. Here are the first few lines:

Steele: Hi, Ivan, remember me?

Ivan: Why, it's Chris Steele! Haven't seen you in years. Let's see, you were working for MI-6 in the old days here in Moscow, right? Pretending you were a diplomat. Yes, we had a few lunches back then.

Steele: Right. Look, I was wondering whether you can tell me anything about a super-secret file you guys are building on Donald Trump. This is the off the record, of course.

Ivan: Sure. We're blackmailing him. If we can help him win the election, he'll be under our control, completely. This is a Putin operation. I don't like it myself. I think it's over the top. Anything I can do to put a thorn in Putin's side, I'm ready to help. It's a little noisy here in the restaurant. Why don't we go over to my office and I'll show you all the data.

Steele: That'd be great.

Ivan: We also hacked the DNC and stole thousands of emails. We're leaking them to Julian Assange. Be sure to keep my name out of it.

Steele: Of course.

Ivan: Putin wants Trump to win. I don't like Trump or Putin. I prefer Hillary. I assume you do, too.

Steele: Well, sure. I'm working for her. That's why I'm here.

Ivan: Wonderful...

It's a sure-fire hit.

It's so believable.