A question of liberty 199

If Julian Assange has published information that has harmed anybody working for the United States, it is right that he has been arrested and right for him to be brought to trial.

But has he?

The BBC (no longer a trustworthy source in general but quoting other sources here) reported and commented in 2010 when “a trove of US diplomatic cables which offer, among other things, unflattering and candid assessments of world leaders” was released by Assange’s organization Wikileaks: .

Much of the criticism of Wikileaks … revolves around the notion that releasing such information risks lives.

Identities of informants could be compromised, spies exposed, and the safety of human rights activists, journalists and dissidents jeopardized when information of their activities is made public, the argument goes.

US military officials contend that allowing enemies access to their strategic and operational documents creates a dangerous environment for American troops serving abroad. ..

But is there any real evidence of this peril?

The problem … is proving direct links between the information released and any loss of life.

After the release of an enormous haul of US defense department documents in August, [a] Pentagon spokesman… told the Washington Post: “We have yet to see any harm come to anyone in Afghanistan that we can directly tie to exposure in the Wikileaks documents.” …

After this latest release a Pentagon official … [said] that even three months later the US military still had no evidence that people had died or been harmed because of information gleaned from Wikileaks documents.

Daniel Ellsberg, the former military analyst who in 1971 released the Pentagon Papers which detailed government lies and cover-ups in the Vietnam War, is skeptical of whether the government really believes that lives are at stake.

He told the BBC’s World Today programme that US officials made that same argument every time there was a potentially embarrassing leak.

“The best justification they can find for secrecy is that lives are at stake. Actually, lives are at stake as a result of the silences and lies which a lot of these leaks reveal,” he said. “The same charges were made against the Pentagon Papers and turned out to be quite invalid.” …

Assange did not steal Pentagon documents, he published them. If he was wrong to do so, then so were the newspapers that did the same, such as the New York Times.

Professor Alan Dershowitz writes at The Hill:

Before WikiLeaks founder Julian Assange gained asylum in the Ecuadorian embassy in London in 2012, he and his British legal team asked me to fly to London to provide legal advice about United States law relating to espionage and press freedom. I cannot disclose what advice I gave them, but I can say that I believed then, and still believe now, that there is no constitutional difference between WikiLeaks and the New York Times.

If the New York Times, in 1971, could lawfully publish the Pentagon Papers knowing they included classified documents stolen by Rand Corporation military analyst Daniel Ellsberg from our federal government, then indeed WikiLeaks was entitled, under the First Amendment, to publish classified material that Assange knew was stolen by former United States Army intelligence analyst Chelsea Manning from our federal government.

So if prosecutors were to charge Assange with espionage or any other crime for merely publishing the Manning material, this would be another Pentagon Papers case with the same likely outcome. Many people have misunderstood the actual Supreme Court ruling in 1971. It did not say that the newspapers planning to publish the Pentagon Papers could not be prosecuted if they published classified material. It only said that they could not be restrained, or stopped in advance, from publishing them. Well, they did publish, and they were not prosecuted.

The same result would probably follow if Assange were prosecuted for publishing classified material on WikiLeaks, though there is no guarantee that prosecutors might not try to distinguish the cases on the grounds that the New York Times is a more responsible outlet than WikiLeaks. But the First Amendment does not recognize degrees of responsibility. When the Constitution was written, our nation was plagued with irresponsible scandal sheets and broadsides. No one described political pamphleteers Thomas Paine or James Callender as responsible journalists of their day.

It is likely, therefore, that a prosecution of Assange for merely publishing classified material would fail. Moreover, Great Britain might be unwilling to extradite Assange for such a “political” crime. That is why prosecutors have chosen to charge him with a different crime of conspiracy to help Manning break into a federal government computer to steal classified material. Such a crime, if proven beyond a reasonable doubt, would have a far weaker claim to protection under the Constitution. The courts have indeed ruled that journalists may not break the law in an effort to obtain material whose disclosure would be protected by the First Amendment.

But the problem with the current effort is that, while it might be legally strong, it seems on the face of the indictment to be factually weak. It alleges that “Assange encouraged Manning to provide information and records” from federal government agencies, that “Manning provided Assange with part of a password,” and that “Assange requested more information.” It goes on to say that Assange was “trying to crack the password” but had “no luck so far.” Not the strongest set of facts here!

It was Manning who committed a crime, not Assange.  Where Assange is concerned, we ( in agreement with Mark Steyn – see the video in the post immediately below – who is as firm a conservative as we are) do not accept that the US has a legal or moral right to have an Australian arrested in London and extradited here for offending the US. In his case, it is not a question of treason and betrayal as with Manning. It is a question of liberty.

Even if Assange is a Leftist, with opinions we strongly dislike, we cannot approve the gross interference with his personal liberty, cannot but object indignantly to his arrest and incarceration.

However, we are interested in what sort of person we are defending.

Is he a Lefty?

Hard to be sure. A sign that he is not, is that there are people on the Left who wish him dead. For instance, Bob Beckel said on Fox News:

A dead man can’t leak stuff. This guy’s a traitor, a treasonist, and he has broken every law of the United States. The guy ought to be — And I’m not for the death penalty, so if I’m not for the death penalty, there’s only one way to do it: illegally shoot the son of a bitch.

Chris Hedges writes cogently (in part only – we strongly disagree with some of his comments) at truthdig.com:

The arrest Thursday of Julian Assange eviscerates all pretense of the rule of law and the rights of a free press. The illegalities, embraced by the Ecuadorian, British and U.S. governments, in the seizure of Assange are ominous. They presage a world where the internal workings, abuses, corruption, lies and crimes, especially war crimes, carried out by corporate states and the global ruling elite will be masked from the public. They presage a world where those with the courage and integrity to expose the misuse of power will be hunted down, tortured, subjected to sham trials and given lifetime prison terms in solitary confinement. They presage an Orwellian dystopia where news is replaced with propaganda, trivia and entertainment. The arrest of Assange, I fear, marks the official beginning of the corporate totalitarianism that will define our lives.

Under what law did Ecuadorian President Lenin Moreno capriciously terminate Julian Assange’s rights of asylum as a political refugee? Under what law did Moreno authorize British police to enter the Ecuadorian Embassy — diplomatically sanctioned sovereign territory — to arrest a naturalized citizen of Ecuador? Under what law did Prime Minister Theresa May order the British police to grab Assange, who has never committed a crime? Under what law did President Donald Trump demand the extradition of Assange, who is not a U.S. citizen and whose news organization is not based in the United States? …

Pause here for a particular disagreement. President Trump has not personally approved the extradition. During his presidential campaign he defended Wikileaks.

Britain will use as its legal cover for the arrest the extradition request from Washington based on conspiracy charges. This legal argument, in a functioning judiciary, would be thrown out of court. Unfortunately, we no longer have a functioning judiciary. We will soon know if Britain as well lacks one.

Assange was granted asylum in the embassy in 2012 to avoid extradition to Sweden to answer questions about sexual offense allegations that were eventually dropped. Assange and his lawyers always argued that if he was put in Swedish custody he would be extradited to the United States. Once he was granted asylum and Ecuadorian citizenship the British government refused to grant Assange safe passage to the London airport, trapping him in the embassy for seven years as his health steadily deteriorated.

The Trump administration will seek to try Assange on charges that he conspired with Manning in 2010 to steal the Iraq and Afghanistan war logs obtained by WikiLeaks. …

U.S. government lawyers will attempt to separate WikiLeaks and Assange from The New York Times and the British newspaper The Guardian, both of which also published the leaked material from Manning, by implicating Assange in the theft of the documents. …

Once the documents and videos provided by Manning to Assange and WikiLeaks were published and disseminated by news organizations such as The New York Times and The Guardian, the press callously, and foolishly, turned on Assange. News organizations that had run WikiLeaks material over several days soon served as conduits in a black propaganda campaign to discredit Assange and WikiLeaks. This coordinated smear campaign was detailed in a leaked Pentagon document prepared by the Cyber Counterintelligence Assessments Branch and dated March 8, 2008. The document called on the U.S. to eradicate the “feeling of trust” that is WikiLeaks’ “center of gravity” and destroy Assange’s reputation.

Assange, who with the Manning leaks had exposed the war crimes, lies and criminal manipulations of the George W. Bush administration, soon earned the ire of the Democratic Party establishment by publishing 70,000 hacked emails belonging to the Democratic National Committee (DNC) and senior Democratic officials. The emails were copied from the accounts of John Podesta, Hillary Clinton’s campaign chairman. The Podesta emails exposed the donation of millions of dollars from Saudi Arabia and Qatar, two of the major funders of Islamic State, to the Clinton Foundation. It exposed the $657,000 that Goldman Sachs paid to Hillary Clinton to give talks, a sum so large it can only be considered a bribe. It exposed Clinton’s repeated mendacity. She was caught in the emails, for example, telling the financial elites that she wanted “open trade and open borders” and believed Wall Street executives were best positioned to manage the economy, a statement that contradicted her campaign statements. It exposed the Clinton campaign’s efforts to influence the Republican primaries to ensure that Trump was the Republican nominee. It exposed Clinton’s advance knowledge of questions in a primary debate. It exposed Clinton as the primary architect of the war in Libya, a war she believed would burnish her credentials as a presidential candidate. Journalists can argue that this information, like the war logs, should have remained hidden, but they can’t then call themselves journalists. 

What has Julian Assange himself said that reveals what motivates him?

He is against governments keeping secrets from the people. He thinks it is the job of journalists to reveal them.

Journalism should be more like science. As far as possible, facts should be verifiable. If journalists want long-term credibility for their profession, they have to go in that direction. Have more respect for readers.

One of the best ways to achieve justice is to expose injustice.

It raises questions about the natural instincts of Clinton that, when confronted with a serious domestic political scandal, she tries to blame the Russians, blame the Chinese, et cetera.

Although I still write, research and investigate, my role is primarily that of a publisher and editor-in-chief who organizes and directs other journalists.

Cablegate [the scandal over the release by Wikileaks of State Department documents in 2010 and 2011] is 3,000 volumes of material. It is the greatest intellectual treasure to have entered into the public record in modern times. 

You can either be informed and be your own rulers, or you can be ignorant and have someone else, who is not ignorant, rule over you. 

Wikileaks is a mechanism to maximize the flow of information to maximize the amount of action leading to just reform.

True information does good. 

In the history of Wikileaks, nobody has claimed that the material being put out is not authentic. 

Well, I mean, the real attack on truth is tabloid journalism in the United States.

With these statements at least, we agree. We agree that Western governments have become too secretive. We agree that it is a journalist’s business to report what a government is doing to the people who elect it …

… always provided that no individual working for the country is harmed, and no planned strategies of war are betrayed to our enemies. For that to be prevented, it is the responsibility of governments to keep their secrets safe.

The man who let out secrets 203

Julian Assange, the man who published secrets stolen from the Pentagon by Chelsea (then Bradley) Manning, was dragged out of the Ecuadorian Embassy in London yesterday (April 12, 2019) and is being held in jail while an extradition request from the US is being considered.

https://youtu.be/rY6v63jMyl4

 

https://youtu.be/K8f1GVumAyQ

 

AP reports:

A bearded and shouting Julian Assange was pulled from the Ecuadorian Embassy in London and hauled into court Thursday, the start of an extradition battle for the WikiLeaks founder who faces U.S. charges related to the publication of tens of thousands of secret government documents.

Police arrested Assange after the South American nation revoked the political asylum that had given him sanctuary for almost seven years. Ecuador’s President Lenin Moreno said he took the action due to “repeated violations to international conventions and daily-life protocols”.

In Washington, the U.S. Justice Department accused Assange of conspiring with former U.S. Army intelligence analyst Chelsea Manning to break into a classified government computer at the Pentagon. The charge was announced after Assange was taken into custody.

His lawyer said the 47-year-old Assange would fight extradition to the U.S.

Assange took refuge in the embassy in 2012 after he was released on bail in Britain while facing extradition to Sweden on sexual assault allegations that have since been dropped. He refused to leave the embassy, fearing arrest and extradition to the U.S. for publishing classified military and diplomatic cables through WikiLeaks.

Manning, who served several years in prison for leaking troves of classified documents before her sentence was commuted by then-President Barack Obama, is again in custody in Alexandria, Virginia, for refusing to testify before a grand jury investigating WikiLeaks.

Over the years, Assange used Ecuador’s embassy as a staging post to keep his name before the public, frequently making appearances on its tiny balcony, posing for pictures and reading statements. Even his cat became well-known.

But his presence was an embarrassment to U.K. authorities, who for years kept a police presence around the clock outside the embassy, costing taxpayers millions in police overtime. Such surveillance was removed in 2015, but the embassy remained a focal point for his activities.

Video posted online by Ruptly, a news service of Russia Today, showed several men in suits pulling a handcuffed Assange out of the embassy and loading him into a police van while uniformed British police formed a passageway. Assange … shouted and gestured as he was removed …

He later appeared in Westminster Magistrates’ Court, where District Judge Michael Snow wasted no time in finding him guilty of breaching his bail conditions, flatly rejecting his assertion that he had not had a fair hearing and a reasonable excuse for not appearing.

“Mr. Assange’s behavior is that of a narcissist who cannot get beyond his own selfish interests,” Snow said. “He hasn’t come close to establishing ‘reasonable excuse’.”

Assange waved to the packed public gallery as he was taken to the cells. His next appearance was set for May 2 via prison video-link in relation to the extradition case.

Assange’s attorney, Jennifer Robinson, said he will fight any extradition to the U.S.

“This sets a dangerous precedent for all journalist and media organizations in Europe and around the world,” she said. “This precedent means that any journalist can be extradited for prosecution in the United States for having published truthful information about the United States.”

Asked at the White House about the arrest, President Donald Trump declared, “It’s not my thing,” and “I know nothing about WikiLeaks,” despite praising the anti-secrecy organization dozens of times during his 2016 campaign.

Speaking in Parliament, British Prime Minister Theresa May said the arrest shows that “no one is above the law”.

A stupid remark that, inapplicable to Julian Assange. It would apply to people in power who evade answering for their crimes, such as Hillary Clinton.

Moreno [President Lenin Moreno of Ecuador] said in a video posted on Twitter that Ecuador was no longer willing to give Assange protection. Other Ecuadorian officials in Quito accused supporters of WikiLeaks and two Russian hackers of trying to destabilize the country. …

Assange has been under U.S. Justice Department scrutiny for years for WikiLeaks’ role in publishing government secrets. He was an important figure in special counsel Robert Mueller’s Russia probe as investigators examined how WikiLeaks obtained emails that were stolen from Hillary Clinton’s presidential campaign and Democratic groups.

WikiLeaks quickly drew attention to U.S. interest in Assange and said that Ecuador had illegally terminated Assange’s political asylum “in violation of international law”.

“Powerful actors, including CIA, are engaged in a sophisticated effort to de-humanise, de-legitimize and imprison him,” the group said in a tweet over a photo of Assange’s smiling face. …

Assange’s arrest came a day after WikiLeaks accused Ecuador’s government of an “extensive spying operation” against him. It alleges that meetings with lawyers and a doctor in the embassy over the past year were secretly filmed. …

Former Ecuadorian President Rafael Correa called [President] Moreno’s decision “cowardly”, accusing him of retaliating against Assange for WikiLeaks spreading allegations about an offshore bank account purportedly linked to Moreno’s family and friends.

Allegations were made that the publication by Wikileaks of the stolen information endangered American agents in foreign countries. Of course that would tell against Assange. But he has denied it, and it has not been confirmed.

Assange was at one time accused of acting for Russia, which he also denied.

We agree with Mark Steyn’s opinion of the matter.

At issue is not the honesty or the virtue or the motives of Julian Assange.

The issue is liberty. 

We would like to know our readers’ opinions. 

The name of the wall 99

What do the globalists mean by “globalization”?

Do they mean anything more than their power, their wealth, their commercial and political control over a borderless world?

Is “globalization” anything other than a new name for old International Communism, the dictatorship over the very many by the very few?

Facebook. Google. Twitter. These are world powers, and they are all on the Left. They have the power to suppress criticism and opposition – and they do.

Elizabeth Vos writes at Disobedient Media about one of the very few:

Eric Schmidt, Executive Chairman of Alphabet’s board of directors, stepped down without naming a successor. …  Alphabet, Google’s parent company, had announced Schmidt would be transitioning to a technical advisory role, and will continue to serve on the company’s board. …

Schmidt gained notoriety during his tenure at Google and Alphabet for his involvement in politics as well as technology. He was a regular figure amongst the Hillary Clinton Presidential campaign, even going so far as to donate the use of a private Google jet for the campaign’s use. Press reports on the relationship between Schmidt and Clinton’s campaign referred to his role in Clinton’s campaign as “crucial”.  … Schmidt created a start-up which was described as: “The stealthy, Eric Schmidt-backed startup that’s working to put Hillary Clinton in the White House.”

Emails published last year by Wikileaks reveal that Schmidt’s support for the Clinton campaign dated [from] as far back as 2015. The emails illustrate a close relationship between Schmidt and Clinton insiders, notably Bill Clinton and John Podesta, the Clinton campaign’s Chief of Staff. … [Schmidt] has been a regular speaker at Clinton Global Initiative events. …

His position within the global power structure was noted by The Guardian, who described Schmidt: “Bilderberg insider Eric Schmidt, who runs Google, once began a speech at Davos with the words: ‘I assume that everybody here agrees that globalization is wonderful.’”

Wikileaks founder Julian Assange has been a long-time critic of Google. Assange authored “When Google Met Wikileaks” during his time under house arrest, detailing the various ways in which Google has become increasingly enmeshed within the structure of the American deep state.

Wikileaks‘ extract from the book describes a revolving door between Google, the State Department, the United Nations and The Council On Foreign Relations. Assange describes the close ties between Schmidt and then Secretary of State Hillary Clinton: “Not only had Hillary Clinton’s people known that Eric Schmidt’s partner had visited me, but they had also elected to use her as a back channel.” …

Assange described Google’s evolution under Schmidt:

Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation … Long before company founders Larry Page and Sergey Brin hired Schmidt in 2001, their initial research upon which Google was based had been partly funded by the Defense Advanced Research Projects Agency (DARPA).  And even as Schmidt’s Google developed an image as the overly friendly giant of global tech, it was building a close relationship with the intelligence community.

This crossover between Google and intelligence agencies and military/state function, as described by Assange, is echoed by the structure and executive makeup of Crowdstrike. The company, with substantial funding from a Google subsidiary, is headed by a number of former long-serving figures from the FBI.

Crowdstrike served the Democratic Party during the 2016 Presidential campaign, which Schmidt was deeply embedded with himself, as shown in the contents of the Podesta email leak.

Crowdstrike is also the only company to have examined DNC servers, and their word serves as the entirety of the basis for Russian hacking claims.

Press reports indicate that Alphabet has financed Google Capital. Acting as an arm of Alphabet, Google Capital then financed Crowdstrike to the tune of $100 million. Google Capital has rebranded, and currently goes by the name “CapitalG.” CapitalG maintains on their website that: “Our Google connection is our key asset. ” CapitalG reiterates that “CapitalG (formerly Google Capital) is a growth equity fund backed by Alphabet, Google’s parent company.” …

The writer repeats, and we stress:

Crowdstrike is the only entity that has examined the DNC’s servers. US authorities including the FBI have not been allowed to access them in order to independently verify the firm’s claim that Russians hacked the DNC.

And she speculates:

… One possible explanation for [Schmidt’s] sudden decision that has not previously been considered by legacy press, is that the investigation into Russian hacking claims made by Crowdstrike and the DNC may have turned up some unsavory information about the company or the involvement of Mr. Schmidt in the saga as an insider to Clinton’s campaign, and that this may have prompted him to step down without announcing a successor.

This information is all very sinister. It is about conspiracy – low and dirty.

It is also bewildering. What is going on? Does anyone who is not part of the vast Left-wing conspiracy know what it is that is being plotted?

Whatever else it might be, it is certainly a movement against the nation state.

So the nation state must be preserved. Borders must be strict and strong.

We need a wall.

We need a wall that protects us from the globalists.

President Trump is all we have to protect us from them. He is the Wall.

The Russian hacking that never happened 192

The Nation weekly journal is generally on the side of the Others: the Democrats, the socialists, the statists, the Islam-promoters, the politically correct, the “social justice warriors”.

So if THEY say that there was no Russian hacking of the DNC during the 2016 election year and can prove it – which it seems they can and have – then the conspiracy to spin a “narrative” that presidential candidate Donald Trump plotted with “the Russians” to keep Hillary Clinton out of the White House, is over.

We quote the meaty parts of the article by Patrick Lawrence at The Nation:

It is now a year since the Democratic National Committee’s mail system was compromised — a year since events in the spring and early summer of 2016 were identified as remote hacks and, in short order, attributed to Russians acting in behalf of Donald Trump. A great edifice has been erected during this time. President Trump, members of his family, and numerous people around him stand accused of various corruptions and extensive collusion with Russians. Half a dozen simultaneous investigations proceed into these matters. Last week news broke that Special Counsel Robert Mueller had convened a grand jury, which issued its first subpoenas on August 3. Allegations of treason are common; prominent political figures and many media cultivate a case for impeachment.

The president’s ability to conduct foreign policy, notably but not only with regard to Russia, is now crippled. Forced into a corner and having no choice, Trump just signed legislation imposing severe new sanctions on Russia and European companies working with it on pipeline projects vital to Russia’s energy sector. Striking this close to the core of another nation’s economy is customarily considered an act of war, we must not forget. In retaliation, Moscow has announced that the United States must cut its embassy staff by roughly two-thirds. All sides agree that relations between the United States and Russia are now as fragile as they were during some of the Cold War’s worst moments. To suggest that military conflict between two nuclear powers inches ever closer can no longer be dismissed as hyperbole.

All this was set in motion when the DNC’s mail server was first violated in the spring of 2016 and by subsequent assertions that Russians were behind that “hack” and another such operation, also described as a Russian hack, on July 5. These are the foundation stones of the edifice just outlined. The evolution of public discourse in the year since is worthy of scholarly study: Possibilities became allegations, and these became probabilities. Then the probabilities turned into certainties, and these evolved into what are now taken to be established truths. By my reckoning, it required a few days to a few weeks to advance from each of these stages to the next. This was accomplished via the indefensibly corrupt manipulations of language repeated incessantly in our leading media.

Lost in a year that often appeared to veer into our peculiarly American kind of hysteria is the absence of any credible evidence of what happened last year and who was responsible for it. It is tiresome to note, but none has been made available. Instead, we are urged to accept the word of institutions and senior officials with long records of deception. These officials profess “high confidence” in their “assessment” as to what happened in the spring and summer of last year—this standing as their authoritative judgment. Few have noticed since these evasive terms first appeared that an assessment is an opinion, nothing more, and to express high confidence is an upside-down way of admitting the absence of certain knowledge. This is how officials avoid putting their names on the assertions we are so strongly urged to accept — as the record shows many of them have done.

We come now to a moment of great gravity.

There has been a long effort to counter the official narrative we now call “Russiagate”.  This effort has so far focused on the key events noted above, leaving numerous others still to be addressed. Until recently, researchers undertaking this work faced critical shortcomings, and these are to be explained. But they have achieved significant new momentum in the past several weeks, and what they have done now yields very consequential fruit. Forensic investigators, intelligence analysts, system designers, program architects, and computer scientists of long experience and strongly credentialed are now producing evidence disproving the official version of key events last year. Their work is intricate and continues at a kinetic pace as we speak. But its certain results so far are two, simply stated, and freighted with implications:

  • There was no hack of the Democratic National Committee’s system on July 5 last year — not by the Russians, not by anyone else. Hard science now demonstrates it was a leak — a download executed locally with a memory key or a similarly portable data-storage device. In short, it was an inside job by someone with access to the DNC’s system. This casts serious doubt on the initial “hack,” as alleged, that led to the very consequential publication of a large store of documents on WikiLeaks last summer.
  • Forensic investigations of documents made public two weeks prior to the July 5 leak by the person or entity known as Guccifer 2.0 show that they were fraudulent: Before Guccifer posted them they were adulterated by cutting and pasting them into a blank template that had Russian as its default language. Guccifer took responsibility on June 15 for an intrusion the DNC reported on June 14 and professed to be a WikiLeaks source—claims essential to the official narrative implicating Russia in what was soon cast as an extensive hacking operation. To put the point simply, forensic science now devastates this narrative.

This article is based on an examination of the documents these forensic experts and intelligence analysts have produced, notably the key papers written over the past several weeks, as well as detailed interviews with many of those conducting investigations and now drawing conclusions from them. …

 

Qualified experts working independently of one another began to examine the DNC case immediately after the July 2016 events. Prominent among these is a group comprising former intelligence officers, almost all of whom previously occupied senior positions. Veteran Intelligence Professionals for Sanity (VIPS), founded in 2003, now has 30 members, including a few associates with backgrounds in national-security fields other than intelligence. The chief researchers active on the DNC case are four: William Binney, formerly the NSA’s technical director for world geopolitical and military analysis and designer of many agency programs now in use; Kirk Wiebe, formerly a senior analyst at the NSA’s SIGINT Automation Research Center; Edward Loomis, formerly technical director in the NSA’s Office of Signal Processing; and Ray McGovern, an intelligence analyst for nearly three decades and formerly chief of the CIA’s Soviet Foreign Policy Branch. Most of these men have decades of experience in matters concerning Russian intelligence and the related technologies. …

Until recently there was a serious hindrance to the VIPS’s work, and I have just suggested it. The group lacked access to positive data. It had no lump of cyber-material to place on its lab table and analyze, because no official agency had provided any. …

Based on the knowledge of former officials such as Binney, the group knew that (1) if there was a hack and (2) if Russia was responsible for it, the NSA would have to have evidence of both. Binney and others surmised that the agency and associated institutions were hiding the absence of evidence behind the claim that they had to maintain secrecy to protect NSA programs. … [but] “Everything that they say must remain classified is already well-known,” Binney said …

Research into the DNC case took a fateful turn in early July, when forensic investigators who had been working independently began to share findings and form loose collaborations wherein each could build on the work of others. In this a small, new website called www.disobedientmedia.com proved an important catalyst. Two independent researchers selected it, Snowden-like, as the medium through which to disclose their findings. One of these is known as Forensicator and the other as Adam Carter. On July 9, Adam Carter sent Elizabeth Vos, a co-founder of Disobedient Media, a paper by the Forensicator that split the DNC case open like a coconut.

By this time Binney and the other technical-side people at VIPS had begun working with a man named Skip Folden. Folden was an IT executive at IBM for 33 years, serving 25 years as the IT program manager in the United States. He has also consulted for Pentagon officials, the FBI, and the Justice Department. Folden is effectively the VIPS group’s liaison to Forensicator, Adam Carter, and other investigators, but neither Folden nor anyone else knows the identity of either Forensicator or Adam Carter. … Unanimously, however, all the analysts and forensics investigators interviewed for this column say Forensicator’s advanced expertise, evident in the work he has done, is unassailable. They hold a similarly high opinion of Adam Carter’s work.

Forensicator is working with the documents published by Guccifer 2.0, focusing for now on the July 5 intrusion into the DNC server. The contents of Guccifer’s files are known — they were published last September — and are not Forensicator’s concern. His work is with the metadata on those files. These data did not come to him via any clandestine means. Forensicator simply has access to them that others did not have. It is this access that prompts Kirk Wiebe and others to suggest that Forensicator may be someone with exceptional talent and training inside an agency such as the FBI. “Forensicator unlocked and then analyzed what had been the locked files Guccifer supposedly took from the DNC server,” Skip Folden explained in an interview. “To do this he would have to have ‘access privilege’, meaning a key.” …

Forensicator’s first decisive findings, made public in the paper dated July 9, concerned the volume of the supposedly hacked material and what is called the transfer rate — the time a remote hack would require. The metadata established several facts in this regard with granular precision: On the evening of July 5, 2016, 1,976 megabytes of data were downloaded from the DNC’s server. The operation took 87 seconds. This yields a transfer rate of 22.7 megabytes per second.

These statistics are matters of record and essential to disproving the hack theory. No Internet service provider, such as a hacker would have had to use in mid-2016, was capable of downloading data at this speed. Compounding this contradiction, Guccifer claimed to have run his hack from Romania, which, for numerous reasons technically called delivery overheads, would slow down the speed of a hack even further from maximum achievable speeds.

What is the maximum achievable speed? Forensicator recently ran a test download of a comparable data volume (and using a server speed not available in 2016) 40 miles from his computer via a server 20 miles away and came up with a speed of 11.8 megabytes per second — half what the DNC operation would need were it a hack. Other investigators have built on this finding. Folden and Edward Loomis say a survey published August 3, 2016, by www.speedtest.net/reports is highly reliable and use it as their thumbnail index. It indicated that the highest average ISP speeds of first-half 2016 were achieved by Xfinity and Cox Communications. These speeds averaged 15.6 megabytes per second and 14.7 megabytes per second, respectively. Peak speeds at higher rates were recorded intermittently but still did not reach the required 22.7 megabytes per second.

“A speed of 22.7 megabytes is simply unobtainable, especially if we are talking about a transoceanic data transfer,” Folden said. “Based on the data we now have, what we’ve been calling a hack is impossible.” Last week Forensicator reported on a speed test he conducted more recently. It tightens the case considerably. “Transfer rates of 23 MB/s (Mega Bytes per second) are not just highly unlikely, but effectively impossible to accomplish when communicating over the Internet at any significant distance,” he wrote. “Further, local copy speeds are measured, demonstrating that 23 MB/s is a typical transfer rate when using a USB–2 flash device (thumb drive).”

Time stamps in the metadata provide further evidence of what happened on July 5. The stamps recording the download indicate that it occurred in the Eastern Daylight Time Zone at approximately 6:45 pm. This confirms that the person entering the DNC system was working somewhere on the East Coast of the United States. In theory the operation could have been conducted from Bangor or Miami or anywhere in between — but not Russia, Romania, or anywhere else outside the EDT zone. Combined with Forensicator’s findings on the transfer rate, the time stamps constitute more evidence that the download was conducted locally, since delivery overheads — conversion of data into packets, addressing, sequencing times, error checks, and the like — degrade all data transfers conducted via the Internet, more or less according to the distance involved.

In addition, there is the adulteration of the documents Guccifer 2.0 posted on June 15, when he made his first appearance. This came to light when researchers penetrated what Folden calls Guccifer’s top layer of metadata and analyzed what was in the layers beneath. They found that the first five files Guccifer made public had each been run, via ordinary cut-and-paste, through a single template that effectively immersed them in what could plausibly be cast as Russian fingerprints. They were not: The Russian markings were artificially inserted prior to posting.“It’s clear,” another forensics investigator self-identified as HET, wrote in a report on this question, “that metadata was deliberately altered and documents were deliberately pasted into a Russianified [W]ord document with Russian language settings and style headings.

To be noted in this connection: The list of the CIA’s cyber-tools WikiLeaks began to release in March and labeled Vault 7 includes one called Marble that is capable of obfuscating the origin of documents in false-flag operations and leaving markings that point to whatever the CIA wants to point to. (The tool can also “de-obfuscate” what it has obfuscated.) It is not known whether this tool was deployed in the Guccifer case, but it is there for such a use. …

VIPS has assembled a chronology that imposes a persuasive logic on the complex succession of events just reviewed. It is this:

  • On June 12 last year, Julian Assange announced that WikiLeaks had and would publish documents pertinent to Hillary Clinton’s presidential campaign.
  • On June 14, CrowdStrike, a cyber-security firm hired by the DNC, announced, without providing evidence, that it had found malware on DNC servers and had evidence that Russians were responsible for planting it.
  • On June 15, Guccifer 2.0 first appeared, took responsibility for the “hack” reported on June 14 and claimed to be a WikiLeaks source. It then posted the adulterated documents just described.
  • On July 5, Guccifer again claimed he had remotely hacked DNC servers, and the operation was instantly described as another intrusion attributable to Russia. Virtually no media questioned this account.

It does not require too much thought to read into this sequence. With his June 12 announcement, Assange effectively put the DNC on notice that it had a little time, probably not much, to act preemptively against the imminent publication of damaging documents. Did the DNC quickly conjure Guccifer from thin air to create a cyber-saboteur whose fingers point to Russia? There is no evidence of this one way or the other, but emphatically it is legitimate to pose the question in the context of the VIPS chronology. WikiLeaks began publishing on July 22. By that time, the case alleging Russian interference in the 2016 elections process was taking firm root. In short order Assange would be written down as a “Russian agent”.

By any balanced reckoning, the official case purporting to assign a systematic hacking effort to Russia, the events of mid-June and July 5 last year being the foundation of this case, is shabby to the point taxpayers should ask for their money back. The Intelligence Community Assessment [ICA], the supposedly definitive report featuring the “high confidence” dodge, was greeted as farcically flimsy when issued January 6. Ray McGovern calls it a disgrace to the intelligence profession. It is spotlessly free of evidence, front to back, pertaining to any events in which Russia is implicated. James Clapper, the former director of national intelligence, admitted in May that “hand-picked” analysts from three agencies (not the 17 previously reported) drafted the ICA. There is a way to understand “hand-picked” that is less obvious than meets the eye: The report was sequestered from rigorous agency-wide reviews. This is the way these people have spoken to us for the past year.

Behind the ICA lie other indefensible realities. The FBI has never examined the DNC’s computer servers — an omission that is beyond preposterous. It has instead relied on the reports produced by Crowdstrike, a firm that drips with conflicting interests well beyond the fact that it is in the DNC’s employ. Dmitri Alperovitch, its co-founder and chief technology officer, is on the record as vigorously anti-Russian. He is a senior fellow at the Atlantic Council, which suffers the same prejudice. Problems such as this are many.

In effect, the new forensic evidence considered here lands in a vacuum. We now enter a period when an official reply should be forthcoming. What the forensic people are now producing constitutes evidence, however one may view it, and it is the first scientifically derived evidence we have into any of the events in which Russia has been implicated. … The cost of duplicity has rarely been so high.

How has the Democratic Part reacted to the revelation, in a usually supportive magazine, that they have been proved to have lied?

Flat denial, and accusation that the revelation is itself  a “conspiracy  theory”:

[The Nation’s] Editor’s note: After publication, the Democratic National Committee contacted The Nation with a response, writing, “U.S. intelligence agencies have concluded the Russian government hacked the DNC in an attempt to interfere in the election. Any suggestion otherwise is false and is just another conspiracy theory like those pushed by Trump and his administration. It’s unfortunate that The Nation has decided to join the conspiracy theorists to push this narrative.” 

We await with keen interest – animated we confess by more than a little Schadenfreude – the reaction of: the Mainstream Media, Hillary Clinton, Chuck Schumer, Nancy Pelosi, Maxine Waters, Robert Mueller, James Comey, Julian Assange, Guccifer 2.o, Vladimir Putin, Uncle Tom Cobley and all.

Real crime, real corruption 12

And no indictment?

Julian Assange of Wikileaks talks to the notorious John Pilger, who is unimportant in this clip and doesn’t say much.

Assange accuses Hillary Clinton of criminal corruption, referring to one of her emails in his possession which, he says, is “the most significant email in the whole collection”.

Posted under corruption, Crime, Qatar, Saudi Arabia, United States, Videos by Jillian Becker on Friday, June 23, 2017

Tagged with , , ,

This post has 12 comments.

Permalink

“The most significant email … 147

of the whole [Clinton] collection, ”  Julian Assange says.

Secretary of State Hillary Clinton supplied arms, in the biggest arms deal ever, to the Saudi Arabian government – the power that funded ISIS.

It bribed her by giving vast sums to the Clinton Foundation.

Footnote: The interviewer is the notoriously anti-American journalist, John Pilger. Here he appears to be only anti-Hillary Clinton, but who knows the motives for anything anyone does?

We never thought we would find ourselves, even for a moment, on the same side of a political argument as John Pilger!

The times are out of joint.

Posted under corruption, Saudi Arabia, United States, Videos by Jillian Becker on Friday, November 4, 2016

Tagged with , , ,

This post has 147 comments.

Permalink

Blizzard of paper – little damage 100

So some 92,000 US military documents were leaked by an unknown agent to Wikileaks and handed on to three big news outlets for co-ordinated news releases today.

The question is, what do they reveal according to the New York Times, the Guardian (Britain), and Der Spiegel (Germany)?

Not much is the answer.

The NYT finds proof that Pakistan’s intelligence service has been actively helping the Taliban. But news reports of that have been appearing for some time now.

The Guardian, perhaps a jot more interestingly, finds no convincing evidence of it in the documents. What it does find is evidence that a secret  unit of special forces hunts down Taliban leaders which is already known or at least assumed  and that the US has covered up the fact that the Taliban got hold of, and is deploying, heat-seeking surface-to-air missiles. The Taliban’s possession of them must be a cause for concern, but is not a startling revelation. If the high command, or the Pentagon, or the administration, or all of them have been trying to conceal the fact, the wonder is why, and how they hoped to succeed.

Der Spiegel finds evidence that German troops are coming under increasing threat. But the German government has plainly said as much.

Any scandalous revelations? There are mentions, yet to be filled out, of civilian deaths that may have been suppressed. Bad, but not unusual in a war.

It’s possible that something surprising, illuminating, significant in some way will yet be caught in that blizzard of paper. Possible, but not very likely.

Wikileaks is an international organization “based” (whatever that means) in Sweden, that “publishes anonymous submissions and leaks of sensitive documents from governments and other organizations, while preserving the anonymity of their sources” (according to Wikipedia).  One of its founders is Julian Assange, an Australian who seems also to be its only or chief spokesman.

The Wikileaks list of past revelations is not very impressive.

They were one of several channels through which the Climategate documents were released. Good.

They saw fit to release Sarah Palin’s private emails when she was a vice-presidential candidate, given to them in September 2008 by the hacker himself. Not so good.

Far more useful would be documents revealing  the suppressed facts of Obama’s life, schooling, and career. And even better would be a list of the politicians who made the decision to admit millions of Muslim immigrants into Europe and the United States, and documents that would tell us why they made it. If Wikileaks could supply those, it would truly deserve the gratitude of this generation and future historians.