Wednesday, July 31, 2019

“Call them racists…This makes them sputter with rage.” Journolist group during Obama 2008 presidential campaign discussed that best way to silence Republicans is to “call them racists”-Wall St. Journal, James Taranto, 7/20/2010

.
Call Them Racists…This makes *them* sputter with rage, which in turn leads to overreaction and self-destruction,” said Spencer Ackerman…”It [Journolist] was a forum where people employed as journalists conspired to suppress the news–and, by doing so “off the record,” used journalistic ethics as cover.” 

July 20, 2010,‘Call Them Racists’, Wall St. Journal, James Taranto,How “journolists” tried to suppress the news” 

The “Journolist” scandal has deepened with new revelations that participants in the now-defunct email list for ideologically approved journalists–-no conservatives allowed–engaged in efforts to suppress news damaging to then-candidate Barack Obama [vs then candidate Mrs. Clinton]…. 

According to records obtained by The Daily Caller, at several points during the 2008 presidential campaign a group of liberal journalists took radical steps to protect their favored candidate [Obama]. 

Employees of news organizations including Time, Politico, the Huffington Post, the Baltimore Sun, the Guardian, Salon and the New Republic participated in outpourings of anger over how Obama had been treated in the media, and in some cases plotted to fix the damage.” 

Most damning is a long quote from a Spencer Ackerman who worked for something called the Washington Independent: 

“…What is necessary is to raise the cost on the right of going after the left. In other words, find a rightwinger’s [sic] and smash it through a plate-glass window. Take a snapshot of the bleeding mess and send it out in a Christmas card to let the right know that it needs to live in a state of constant fear. Obviously I mean this rhetorically….If the right forces us all to either defend Wright or tear him down, no matter what we choose, we lose the game they’ve put upon us. Instead, take one of themFred Barnes, Karl Rove, who cares and call them racists. Ask: why do they have such a deep-seated problem with a black politician who unites the country? What lurks behind those problems? This makes *them* sputter with rage, which in turn leads to overreaction and self-destruction.” 

Smashing somebody’s [sic] through a plate-glass window seems like an odd way to thread a needle, but atrocious prose is the least of the problems here. The problem here isn’t bias, either. 

Assuming Ackerman was an opinion writer rather than a straight-news reporter, he was entitled not only to hold his opinions but to express them. 

But Ackerman was not engaging in a public debate; he was privately strategizing about how to suppress the news. And his fellow journolists, while disagreeing with him, did so “only on strategic grounds”:  

“Spencer, you’re wrong,” wrote Mark Schmitt, now an editor at the American Prospect. “Calling Fred Barnes a racist doesn’t further the argument, and not just because Juan Williams is his new black friend, but because that makes it all about character. The goal is to get to the point where you can contrast something_–Obama’s substantive agenda–with this crap. 

Kevin Drum, then of Washington Monthly, also disagreed with Ackerman’s strategy. “I think it’s worth keeping in mind that Obama is trying (or says he’s trying) to run a campaign that avoids precisely the kind of thing Spencer is talking about, and turning this into a gutter brawl would probably hurt the Obama brand pretty strongly. After all, why vote for him if it turns out he’s not going [to] change the way politics works?” 

But it was Ackerman who had the last word. “Kevin, I’m not saying OBAMA should do this. I’m saying WE should do this.” 

If anybody on the list objected in principle to Ackerman’s idea of slandering people, including a fellow journalist, as racist, the Caller missed that part of the story. (We’ll be happy to report it if a Journolist member would care to supply us with the evidence.) 

What Ackerman proposed was to carry out a political dirty trick in order to suppress the news and thereby aid a candidate for public office. That’s about as unethical as journalism can get. 

The final product of this debate was a pathetic “open letter,” which, as we noted at the time, was signed by 41 self-described “journalists and media analysts,” nearly all of whom were affiliated with universities, left-wing publications or left-wing think tanks. The letter does seem to have been more of a collaborative effort than we guessed back then: the Caller lists eight people who contributed to its drafting. Even so, what self-respecting journalist shares a byline with 40 other guys?

 “The letter caused a brief splash and won the attention of the New York Times,” the Caller reports, but thereafter was deservedly forgotten until now. Obama weathered the Wright revelations, but it seems a stretch to give Journolist the credit (or, if you prefer, the blame) for that. On the other hand, are there other stories they did succeed in suppressing? We cannot know as long as the full Journolist archives are secret. 

These revelations also belie Journolist founder…[subsequently editor-at-large and founder of Vox. Before that, he was columnist and editor at the Washington Post, policy analyst at MSNBC, and contributor to Bloomberg] Ezra Klein‘s defense of the enterprise back in March 2009:  

“As for sinister implications, is it “secret?” No. Is it off-the-record? Yes. The point is to create a space where experts feel comfortable offering informal analysis and testing out ideas. Is it an ornate temple where liberals get together to work out “talking points?” Of course not. Half the membership would instantly quit if anything like that emerged.” 

This statement is true only if parsed as a denial that an email list is an ornate temple. Plainly the list was a forum where liberals got together to work out talking points, as evidenced by that “open letter.” 

Worse, it was a forum where people employed as journalists conspired to suppress the news–and, by doing so “off the record,” used journalistic ethics as cover.

 In 2009 Klein wrote that Journolist’s policy of excluding conservatives was “not about fostering ideology but preventing a collapse into flame war. The emphasis is on empiricism, not ideology.” 

Call them racists." That’s empiricism for you!”…
 
 
 
 
............

Tuesday, July 30, 2019

Evidence-free Senate Intel Committee report shows “attack on our democracy” comes from US, not Russia-Dave DeCamp, AntiWar….(No wonder they haven’t impeached Trump, he’s delivering Obama’s third term, certainly Obama’s DHS judging from latest Senate Intel Committee evidence-free Russia scare report)

.
It’s not really about Russia, it’s about the US whose entire political class seeks to render US voters and elections irrelevant to cement our status as peasant/colonists under our "classified" military/intel superiors: The US Endless War and Starvation “revolution is not directed primarily against foreign tyrants: for even as they [US warmongers] put on a great show of “liberating” foreign peoples, they are in the process of enslaving the American people….Our old Republic, once the enemy of kings and contemptuous of empires, is now donning the imperial purple….The America we loved is lost, perhaps forever. That is the meaning of this [2003 Iraq] war. The republic that bound its rulers with the chains of the Constitution and freed the rest of us to live in peace is no more.”Justin Raimondo, March 19, 2003. 

7/29/19, MSM Coverage of Senate Intelligence Report Is Misleading, AntiWar.com, Dave DeCamp 

“A day after Robert Mueller’s testimony before Congress, the Senate Intelligence Committee released a report on supposed Russian interference in the 2016 election at the state and local level. The committee will be releasing four more reports relating to Russian interference over the next month. The heavily redacted report made the claim the Russian government directed extensive activity against “US election infrastructure.” The activity was scanning the networks and servers of the “election infrastructure.” 

The findings section of the report said, “The Russian government directed extensive activity [but not “hacking”] beginning in at least 2014 and carrying into at least 2017, against U.S. election infrastructure’ at the state and local level." And that, “The Committee has seen no evidence that any votes were changed or that any voting machines were manipulated.” 

The report lacked any real evidence to link the activities to the Russian government. But of course, that’s not how the mainstream media reported itVox headlined their story, “New Senate Intelligence report shows ‘extensive’ Russia 2016 election interference.” NBC’s headline read, “Senate Intelligence report finds ‘extensive’ Russian election interference.” The Hill said, “Senate Intel finds ‘extensive’ Russian election interference going back to 2014.” 

None of these mainstream outlets explained how the Department of Homeland Security (DHS) determined that Russia was behind the activities. Page 11 of the report said, 

“DHS arrived at their initial assessment by evaluating whether the tactics, techniques, and procedures (TTPs) observed were consistent with previously observed Russian TTPs, whether the actors used known Russian-affiliated malicious infrastructure, and whether a state or local election system was the target.”... 

[Ed. note: Being "targeted or "scanned"-if such things happened-are of course normal, harmless, meaningless, happen thousands of times a day to many computer systems, don’t imply “penetration” of an election “system.” The terrorist US government can use these terms as weapons to force US taxpayers to bomb Russia and murder Putin. We're told that US elections are no longer needed because all Americans have only one issue which is Putin.] 

(continuing): “Page 13 of the report said, “IP addresses associated with the August 18, 2016 FLASH (an FBI alert of a potential cyber-attack) provided some indications the activity might be attributable to the Russian government, particularly the GRU:” So the IP addresses only provide some “indications” that the activity “might be attributable to the Russian government.” 

The next few paragraphs are redacted. The only few sentences that are not redacted do not have the proper context to come to any real conclusion. Those sentences read, “One of the Netherlands-based [REDACTED] ‘exhibited the same behavior from the same node over a period of time. … It was behaving like … the same user or group of users was using this to direct activity against the same type of ***targets,’*** according to DHS staff.” 

Nothing else in the report tries to tie the activity to the Russian government. 

Another claim in the report was that all 50 states were ***targeted***, something that most media outlets repeated. That claim is based on an assumption the DHS had since they could not figure out a pattern to the ***scanning.*** After a chart explaining the varying degrees of ***scanning*** in up to 21 states, Illinois being the only one named, page 20 read, 

“Neither DHS nor the Committee can ascertain a pattern to the states ***targeted,*** lending credence to DHS’s later assessment that all 50 states probably were ***scanned.“*** Notice the word “probably.” 

The New York Times headlined their story on the report as, “Russia Targeted Election Systems in All 50 States, Report Finds.” The Progressive YouTube talk show The Young Turks titled their video on the story, “Russia Hacks All 50 States.””… 

[Ed. note: “Hacking” hasn’t been mentioned in the report, just “targeting” and “scanning”–which are meaningless.Hacking” is something entirely different and the report doesn’t say it happened or that “Russians” did it. If I were Russia, I’d sue for slander or libel anyone who made the claim that Russia “hacked” all 50 states. Of course the term “hacking” is really about the US and not Russia. The mere evidence-free accusation of “hacking” has converted the US into the Soviet Union. American voters have been permanently silenced. Certainly, the GOP Establishment is ecstatic about this. They’ve always dreamed of silencing Republican voters, would be thrilled if Democrat voters were their voters: "Christmas Morning": That's what it would be for the GOP E if they got a different voting base: "That is the way they're thinking....All they gotta do is throw away their base. That's Christmas morning for 'em." Rush Limbaugh, 10/13/2013] 

(continuing): “The rest of the report explains ways in which the states could make their voting systems more secure. It also expresses a desire to respect state’s privacy from the federal government. 

Senator Ron Wyden (D-OR) wrote the minority views at the end of the report. Wyden said, “The defense of US national security against a highly sophisticated foreign government cannot be left to state and county officials. For that reason, I cannot support a report whose top recommendation is to ‘reinforce state’s primacy in running elections.’” 

Wyden’s almost manic ravings in this report encapsulate the attitude towards Russia that is becoming all too common in the US today. Wyden wrote, “America is facing a direct assault on the heart of our democracy by a determined adversary. We would not ask a local sheriff to go to war against the missiles, planes and tanks of the Russian Army. We shouldn’t ask a county election IT employee to fight a war against the full capabilities and vast resources of Russia’s cyber army. That approach failed in 2016 and it will fail again.” 

While the claim that Russian hackers infiltrated our election system to observe and scan it could be true, nothing in this report – at least the redacted version – substantiates that claim. Media outlets, politicians and the intelligence community are all still pushing the idea that the Russian government hacked our elections in 2016, even though there is no concrete evidence. 

A thing Russia-gaters like Senator Wyden like to say is that Russian cyber-attacks are a “threat to our democracy.” But what is a real threat to our democracy is the fact that the establishment can blame any politician’s success on Russian interference or influence. Democrats [and Republicans] are still blaming Trump’s victory in 2016 on Russia. 

Rep. Tulsi Gabbard (D-HI) has been the latest victim of this Russia smear. Shortly after she announced her candidacy for the 2020 presidential race NBC ran a story that said, “The Russian propaganda machine that tried to influence the 2016 US election is now promoting the presidential aspirations of a controversial Hawaii Democrat who earlier this month declared her intention to run for president in 2020.” The article drew this conclusion from the fact that she was given a lot of coverage by Russian funded media outlets like RT. These media outlets make it no secret that they are funded by the Russian government. 

Another hit piece on Gabbard came from the Daily Beast titled, “Tulsi Gabbard’s Campaign is Being Boosted by Putin Apologists.” This sorry piece of journalism named three of Gabbard’s donors, two of them have been pushing for better US-Russia relations [who wouldn’t be?] and the other one worked for a show on the RT network. 

On Friday, the Washington Post ran a story titled, “Mitch McConnell is a Russian Asset." The article makes the wild accusation that McConnell is doing “Vladimir Putin’s bidding” since he has blocked some legislation to [allegedly] further secure elections. 

Over the next month, the Senate Intelligence Committee will be releasing four more reports on [so-called] Russian interference. It is almost a guarantee that most media outlets will be reporting the committee’s claims as fact. Unfortunately, the American people cannot count on the media to report on this honestly. Now every reporter and news outlet has a way to delegitimize any election they want if they’re not happy with the results. The real attack on US democracy is not from Russia, it’s from within.” 

“Dave DeCamp is a freelance journalist based in Brooklyn NY, focusing on US foreign policy and wars. He recently joined Antiwar.com as an assistant editor. He is on Twitter at @decampdave.”
 
...........................

Added: Trump's FBI is also Soros/Obama's third term.

..........................

Added: “The narrative of Russian intelligence attacking state and local election boards and threatening the integrity of U.S. elections has achieved near-universal acceptance by media and political elites.  And now it has been accepted by the Trump administration’s intelligence chief, Dan Coats, as well. But the real story behind that narrative, recounted here for the first time, reveals that the Department of Homeland Security (DHS) created and nurtured an account that was grossly and deliberately deceptive. 

"The facts surrounding the two actual breaches of state websites in Illinois and Arizona, as well as the broader context of cyberattacks on state websites, don't support Russian government interference at all." In the case of Arizona, "After meeting with DHS officials in early October 2017, however, [Arizona Sec. of State] Reagan wrote in a blog post that DHS “could not confirm that any attempted Russian government hack occurred whatsoever to any election-related system in Arizona, much less the statewide voter registration database.” What the DHS said in that meeting, as Reagan’s spokesman Matt Roberts recounted to me, is even more shocking. “When we pressed DHS on what exactly was actually targeted, they said it was the Phoenix public library’s computers system,” Roberts recalled."  

In article below, “grossly and deliberately deceptive” DHS “Russia scare” claims are documented. Among DHS would-be celebrities milking this scam is ubiquitous Jeanette Manfra. DHS personnel use terms that don't mean "hacking," such as "targeting," "scanning," or "attempts to penetrate" which mean nothing but are intended to be heard as "Putin stole the election," US taxpayers must bomb Russia and murder Putin. DHS claimed 21 US states were hacked by Putin, which has been disproved, but at the time DHS said they couldn't tell states exactly how Putin did it because it's "classified." That's heard as: US taxpayers must line up tanks on every inch of Putin's border, prepare to bomb Russia and murder Putin. Trump administration "intelligence chief," Dan Coats, also promotes DHS lies.
................    

8/28/2018, “How  Department of Homeland Security Created a Deceptive Tale of Russia Hacking US Voter Sites,Gareth Porter, Consortium News   

“The narrative about Russian cyberattacks on American election infrastructure is a self-interested abuse of power by DHS based on distortion of evidence, writes Gareth Porter.

“The narrative of Russian intelligence attacking state and local election boards and threatening the integrity of U.S. elections has achieved near-universal acceptance by media and political elites.  And now it has been accepted by the Trump administration’s intelligence chief, Dan Coats, as well.  

But the real story behind that narrative, recounted here for the first time, reveals that the Department of Homeland Security (DHS) created and nurtured an account that was grossly and deliberately deceptive.   

DHS compiled an intelligence report suggesting hackers linked to the Russian government could have targeted voter-related websites in many states and then leaked a sensational story of Russian attacks on those sites without the qualifications that would have revealed a different story. When state election officials began asking questions, they discovered that the DHS claims were false and, in at least one case, laughable.  

The National Security Agency and special counsel Robert Mueller’s investigating team have also claimed evidence that Russian military intelligence was behind election infrastructure hacking, but on closer examination, those claims turn out to be speculative and misleading as well. Mueller’s indictment of 12 GRU military intelligence officers does not cite any violations of U.S. election laws though it claims Russia interfered with the 2016 election.  

A Sensational Story    

On Sept. 29, 2016, a few weeks after the hacking of election-related websites in Illinois and Arizona, ABC News carried a sensational headline: “Russian Hackers Targeted Nearly Half of States’ Voter Registration Systems, Successfully Infiltrated 4.” The story itself reported that “more than 20 state election systems” had been hacked, and four states had been “breached” by hackers suspected of working for the Russian government. The story cited only sources “knowledgeable” about the matter, indicating that those who were pushing the story were eager to hide the institutional origins of the information. 

Behind that sensational story was a federal agency seeking to establish its leadership within the national security state apparatus on cybersecurity, despite its limited resources for such responsibility. In late summer and fall 2016, the Department of Homeland Security was maneuvering politically to designate state and local voter registration databases and voting systems as “critical infrastructure.” Such a designation would make voter-related networks and websites under the protection a “priority sub-sector” in the DHS “National Infrastructure Protection Plan, which already included 16 such sub-sectors.  

DHS Secretary Jeh Johnson and other senior DHS officials consulted with many state election officials in the hope of getting their approval for such a designation. Meanwhile, the DHS was finishing an intelligence report that would both highlight the Russian threat to U.S. election infrastructure and the role DHS could play in protecting it, thus creating political impetus to the designation. But several secretaries of state—the officials in charge of the election infrastructure in their state—strongly opposed the designation that Johnson wanted.     

On Jan. 6, 2017—the same day three intelligence agencies released a joint “assessment” on Russian interference in the election—Johnson announced the designation anyway. Media stories continued to reflect the official assumption that cyber attacks on state election websites were Russian-sponsored. Stunningly, The Wall Street Journal reported in December 2016 that DHS was itself behind hacking attempts of Georgia’s election database.  

The facts surrounding the two actual breaches of state websites in Illinois and Arizona, as well as the broader context of cyberattacks on state websites, didn’t support that premise at all. 

In July, Illinois discovered an intrusion into its [online] voter registration website and the theft of personal information on as many as 200,000 registered voters. (The 2018 Mueller indictments of GRU officers would unaccountably put the figure at 500,000.) Significantly, however, the hackers only had copied the information and had left it unchanged in the database. 

That was a crucial clue to the motive behind the hack. DHS Assistant Secretary for Cyber Security and Communications Andy Ozment told a Congressional committee in late September 2016 that the fact hackers hadn’t tampered with the voter data indicated that the aim of the theft was not to influence the electoral process. Instead, it was “possibly for the purpose of selling personal information.Ozment was contradicting the line that already was being taken on the Illinois and Arizona hacks by the National Protection and Programs Directorate and other senior DHS officials.  

In an interview with me last year, Ken Menzel, the legal adviser to the Illinois secretary of state, confirmed what Ozment had testified. “Hackers have been trying constantly to get into it since 2006, Menzel said, adding that they had been probing every other official Illinois database with such personal data for vulnerabilities as well.  “Every governmental database—driver’s licenses, health care, you name it—has people trying to get into it,” said Menzel.  

In the other successful cyberattack on an [alleged] electoral website, hackers had acquired the username and password for the voter database Arizona used during the summer, as Arizona Secretary of State Michele Reagan learned from the FBI. But the reason that it had become known, according to Reagan in an interview with Mother Jones, was that the login and password had shown up for sale on the dark web—the network of websites used by cyber criminals to sell stolen data and other illicit wares.  

Furthermore, the FBI had told her that the effort to penetrate the database was the work of a “known hacker” whom the FBI had monitored “frequently” in the past. Thus, there were reasons to believe that both Illinois and Arizona hacking incidents were linked to criminal hackers seeking information they could sell for profit.  

Meanwhile, the FBI was unable to come up with any theory about what Russia might have intended to do with voter registration data such as what was taken in the Illinois hack.

When FBI Counterintelligence official Bill Priestap was asked in a June 2017 hearing how Moscow might use such data, his answer revealed that he had no clue:They took the data to understand what it consisted of,” said the struggling Priestap, “so they can affect better understanding and plan accordingly in regards to possibly impacting future elections by knowing what is there and studying it.”  

The inability to think of any plausible way for the Russian government to use such data explains why DHS and the intelligence community adopted the argument, as senior DHS officials Samuel Liles and Jeanette Manfra put it, that the hacks “could be intended or used to undermine public confidence in electoral processes and potentially the outcome.

[Image: Jeanette Manfra of DHS]  

But such a strategy could not have had any effect without a decision by DHS and the U.S. intelligence community to assert publicly that the intrusions and other scanning and probing were Russian operations, despite the absence of hard evidence. So DHS and other agencies were consciously sowing public doubts about U.S. elections that they were attributing to Russia.  

DHS Reveals Its Self-Serving Methodology  

In June 2017, Liles and Manfra testified to the Senate Intelligence Committee that an October 2016 DHS intelligence report had listed election systems in 21 states that were “potentially targeted by Russian government cyber actors.”    

They revealed that the sensational story leaked to the press in late September 2016 had been based on a draft of the DHS report. And more importantly, their use of the phrase “potentially targeted” showed that they were arguing only that the cyber incidents it listed were possible indications of a Russian attack on election infrastructure.  

Furthermore, Liles and Manfra said the DHS report had “catalogued suspicious activity we observed on state government networks across the country,” which had been “largely based on suspected malicious tactics and infrastructure. They were referring to a list of eight IP addresses an August 2016 FBI “flash alert” had obtained from the Illinois and Arizona intrusions, which DHS and FBI had not been able to  attribute to the Russian government.  

The DHS officials recalled that the DHS began to “receive reports of cyber-enabled scanning and probing of election-related infrastructure in some states, some of which appeared to originate from servers operated by a Russian company.” Six of the eight IP addresses in the FBI alert were indeed traced to King Servers, owned by a young Russian living in Siberia. But as DHS cyber specialists knew well, the country of ownership of the server doesn’t prove anything about who was responsible for hacking: As cybersecurity expert Jeffrey Carr pointed out, the Russian hackers who coordinated the Russian attack on Georgian government websites in 2008 used a Texas-based company as the hosting provider.  

The cybersecurity firm ThreatConnect noted in 2016 that one of the other two IP addresses had hosted a Russian criminal market for five months in 2015. But that was not a serious indicator, either. Private IP addresses are reassigned frequently by server companies, so there is not a necessary connection between users of the same IP address at different times.  

The DHS methodology of selecting reports of cyber incidents involving election-related websites as “potentially targeted” by Russian government-sponsored hackers was based on no objective evidence whatever. The resulting list appears to have included any one of the eight addresses as well as any attack or “scan” on a public website that could be linked in any way to elections.  

This methodology conveniently ignored the fact that criminal hackers were constantly trying to get access to every database in those same state, country and municipal systems. Not only for Illinois and Arizona officials, but state electoral officials.  

In fact, 14 of the 21 states on the list experienced nothing more than the routine scanning that occurs every day, according to the Senate Intelligence Committee. Only six involved what was referred to as a “malicious access attempt,” meaning an effort to penetrate the site. One of them was in Ohio, where the attempt to find a weakness lasted less than a second and was considered by DHS’s internet security contractor a “non-event” at the time.  

State Officials Force DHS to Tell the Truth   

For a year, DHS did not inform the 21 states on its list that their election boards or other election-related sites had been attacked in a presumed Russian-sponsored operation. The excuse DHS officials cited was that it could not reveal such sensitive intelligence to state officials without security clearances. 

But the reluctance to reveal the details about each case was certainly related to the reasonable expectation that states would publicly challenge their claims, creating a potential serious embarrassment.   

On Sept. 22, 2017, DHS notified 21 states about the cyber incidents that had been included in the October 2016 report. The public announcement of the notifications said DHS had notified each chief election officer ofany potential targeting we were aware of in their state leading up to the 2016 election.”

The phrase “potential targeting” again telegraphed the broad and vague criterion DHS had adopted, but it was ignored in media stories.  

But the notifications, which took the form of phone calls lasting only a few minutes, provided a minimum of information and failed to convey the significant qualification that DHS was only suggesting targeting as a possibility. “It was a couple of guys from DHS reading from a script,” recalled one state election official who asked not to be identified. “They said [our state] was targeted by Russian government cyber actors.
     
A number of state election officials recognized that this information conflicted with what they knew. And if they complained, they got a more accurate picture from DHS. After Wisconsin Secretary of State Michael Haas demanded further clarification, he got an email response from a DHS official  with a different account. “[B]ased on our external analysis,” the official wrote, “the WI [Wisconsin] IP address affected belongs to the WI Department of Workforce Development, not the Elections Commission.”  

California Secretary of State Alex Padilla said DHS initially had notified his office “that Russian cyber actors ‘scanned’ California’s Internet-facing systems in 2016, including Secretary of State websites.” But under further questioning, DHS admitted to Padilla that what the hackers had targeted was the California Department of Technology’s network.  

Texas Secretary of State Rolando Pablos and Oklahoma Election Board spokesman Byron Dean also denied that any state website with voter- or election-related information had been targeted, and Pablos demanded that DHS “correct its erroneous notification.”    

Despite these embarrassing admissions, a statement issued by DHS spokesman Scott McConnell on Sept. 28, 2017 said the DHS “stood by” its assessment that 21 states “were the target of Russian government cyber actors seeking vulnerabilities and access to U.S. election infrastructure.” The statement retreated from the previous admission that the notifications involved “potential targeting,” but it also revealed for the first time that DHS had defined “targeting” very broadly indeed.   

It said the category included “some cases” involving “direct scanning of targeted systems” but also cases in which “malicious actors scanned for vulnerabilities in networks that may be connected to those systems or have similar characteristics in order to gain information about how to later penetrate their target.”  

It is true that hackers may scan one website in the hope of learning something that could be useful for penetrating another website, as cybersecurity expert Prof. Herbert S. Lin of Stanford University explained to me in an interview. But including any incident in which that motive was theoretical meant that any state website could be included on the DHS list, without any evidence it was related to a political motive.  

Arizona’s further exchanges with DHS revealed just how far DHS had gone in exploiting that escape clause in order to add more states to its “targeted” list. Arizona Secretary of State Michele Reagan tweeted that DHS had informed her that “the Russian government targeted our voter registration systems in 2016.” After meeting with DHS officials in early October 2017, however, Reagan wrote in a blog post that DHS “could not confirm that any attempted Russian government hack occurred whatsoever to any election-related system in Arizona, much less the statewide voter registration database.”   

What the DHS said in that meeting, as Reagan’s spokesman Matt Roberts recounted to me, is even more shocking. “When we pressed DHS on what exactly was actually targeted, they said it was the Phoenix public library’s computers system,” Roberts recalled. In April 2018, a CBS News “60 Minutes” segment reported that the October 2016 DHS intelligence report had included the Russian government hacking of a “county database in Arizona.” Responding to that CBS report, an unidentified “senior Trump administration official” who was well-briefed on the DHS report told Reuters that “media reports” on the issue had sometimes “conflated criminal hacking with Russian government activity,” and that the cyberattack on the target in Arizona “was not perpetrated by the Russian government.”  

NSA Finds a GRU Election Plot

NSA intelligence analysts claimed in a May 2017 analysis to have documented an effort by Russian military intelligence (GRU) to hack into U.S. electoral institutions. In an intelligence analysis obtained by The Intercept and reported in June 2017, NSA analysts wrote that the GRU had sent a spear-phishing email—one with an attachment designed to look exactly like one from a trusted institution but that contains malware design to get control of the computer—to a vendor of voting machine technology in Florida. The hackers then designed a fake web page that looked like that of the vendor.  

They sent it to a list of 122 email addresses NSA believed to be local government organizations that probably were “involved in the management of voter registration systems.” The objective of the new spear-phishing campaign, the NSA suggested, was to get control of their computers through malware to carry out the exfiltration of voter-related data.  

But the authors of The Intercept story failed to notice crucial details in the NSA report that should have tipped them off that the attribution of the spear-phishing campaign to the GRU was based merely on the analysts’ own judgment—and that their judgment was faulty.  

The Intercept article included a color-coded chart from the original NSA report that provides crucial information missing from the text of the NSA analysis itself as well as The Intercept’s account.   

The chart clearly distinguishes between the elements of the NSA’s account of the alleged Russian scheme that were based on “Confirmed Information” (shown in green) and those that were based on “Analyst Judgment” (shown in yellow). The connection between the “operator” of the spear-phishing campaign the report describes and an unidentified entity confirmed to be under the authority of the GRU is shown as a yellow line, meaning that it is based on “Analyst Judgment” and labeled “probably."

A major criterion for any attribution of a hacking incident is whether there are strong similarities to previous hacks identified with a specific actor. But the chart concedes that “several characteristics” of the campaign depicted in the report distinguish it from “another major GRU spear-phishing program,” the identity of which has been redacted from the report.   

The NSA chart refers to evidence that the same operator also had launched spear-phishing campaigns on other web-based mail applications, including the Russian company “Mail.ru.”  Those targets suggest that the actors were more likely Russian criminal hackers rather than Russian military intelligence. 

Even more damaging to its case, the NSA reports that the same operator who had sent the spear-phishing emails also had sent a test email to the “American Samoa Election Office.” Criminal hackers could have been interested in personal information from the database associated with that office. But the idea that Russian military intelligence was planning to hack the voter rolls in American Samoa, an unincorporated U.S. territory with 56,000 inhabitants who can’t even vote in U.S. presidential elections, is plainly risible.  

The Mueller Indictment’s Sleight of Hand   

The Mueller indictment of GRU officers released on July 13 appeared at first reading to offer new evidence of Russian government responsibility for the hacking of Illinois and other state voter-related websites. A close analysis of the relevant paragraphs, however, confirms the lack of any real intelligence supporting that claim.

 Mueller accused two GRU officers of working with unidentified “co-conspirators” on those hacks. But the only alleged evidence linking the GRU to the operators in the hacking incidents is the claim that a GRU official named Anatoly Kovalev and “co-conspirators” deleted search history related to the preparation for the hack after the FBI issued its alert on the hacking identifying the IP address associated with it in August 2016.  

A careful reading of the relevant paragraphs shows that the claim is spurious. The first sentence in Paragraph 71 says that both Kovalev and his “co-conspirators” researched domains used by U.S. state boards of elections and other entities “for website vulnerabilities.”  The second says Kovalev and “co-conspirators” had searched for “state political party email addresses, including filtered queries for email addresses listed on state Republican Party websites.”  

Searching for website vulnerabilities would be evidence of intent to hack them, of course, but searching Republican Party websites for email addresses is hardly evidence of any hacking plan. And Paragraph 74 states that Kovalev “deleted his search history”—not the search histories of any “co-conspirator”—thus revealing that there were no joint searches and suggesting that the subject Kovalev had searched was Republican Party emails. So any deletion by Kovalev of his search history after the FBI alert would not be evidence of his involvement in the hacking of the Illinois election board website.   

With this rhetorical misdirection unraveled, it becomes clear that the repetition in every paragraph of the section of the phrase “Kovalev and his co-conspirators” was aimed at giving the reader the impression the accusation is based on hard intelligence about possible collusion that doesn’t exist.  

The Need for Critical Scrutiny of DHS Cyberattack Claims

The DHS campaign to establish its role as the protector of U.S. electoral institutions is not the only case in which that agency has used a devious means to sow fear of Russian cyberattacks.

In December 2016, DHS and the FBI published a long list of IP addresses as indicators of possible Russian cyberattacks. But most of the addresses on the list had no connection with Russian intelligence, as former U.S. government cyber-warfare officer Rob Lee found on close examination.  

When someone at the Burlington, Vt., Electric Company spotted one of those IP addresses on one of its computers, the company reported it to DHS. But instead of quietly investigating the address to verify that it was indeed an indicator of Russian intrusion, DHS immediately informed The Washington Post. The result was a sensational story that Russian hackers had penetrated the U.S. power grid. In fact, the IP address in question was merely Yahoo’s email server, as Rob Lee told me, and the computer had not even been connected to the power grid. The threat to the power grid was a tall tale created by a DHS official, which the Post had to embarrassingly retract.  

Since May 2017, DHS, in partnership with the FBI, has begun an even more ambitious campaign to focus public attention on what it says are Russian “targeting” and “intrusions” into “major, high value assets that operate components of our Nation’s critical infrastructure”, including energy, nuclear, water, aviation and critical manufacturing sectors.  Any evidence of such an intrusion must be taken seriously by the U.S. government and reported by news media. But in light of the DHS record on alleged threats to election infrastructure and the Burlington power grid, and its well-known ambition to assume leadership over cyber protection, the public interest demands that the news media examine DHS claims about Russian cyber threats far more critically than they have up to now.”  

“Gareth Porter is an independent investigative journalist and winner of the 2012 Gellhorn Prize for journalism. His latest book is Manufactured Crisis: The Untold Story of the Iran Nuclear Scare.”
………………………..

Comment: Why didn’t anyone demand a recount of 2016 Illinois results if Illinois is such a big example of Putin's work?


...............


...........

War on Terror must now be aimed at US which lavishly arms headslicing Islamic terrorists in Syria. UN must add US to list of state sponsors of terrorism. US government personnel must stand trial at war crimes tribunal-Caitlin Johnstone

.
After it was discovered that the US and its allies armed actual, literal terrorist factions in Syria with the goal of effecting regime change, the only sane response would have been for the public to loudly and aggressively demand that all governments involved to take immediate action to completely rectify all damage done by this unforgivable war crime at any cost, and for there to be war crimes tribunals for every decision maker who was a part of it.”…US murder of Syria like its genocide of Libya was possible only by diverting billions of US taxpayer dollars to terrorists….MSNBC doesn’t serve the Democratic party.First and foremost it serves “the US national security state. And so do all the other western mainstream news networks….Western mass media outlets serve not a political party, nor even money, but the power structures of the western empire. This is the real reason why Russia hysteria has been mainlined into mainstream consciousness day in and day out for three years. Not for ratings, not to hurt Trump, not to help the Democrats, but because Russia is viewed as a disobedient geopolitical adversary by the US-centralized power alliance. That’s all it’s ever been.” 7/26/19 

June 8, 2019, MSM Mourns Death Of CIA-Backed Syrian Al-Qaeda/ISIS Ally, Caitlin Johnstone, Medium.com

 


“On Wednesday the alternative media outlet Southfront published an article titled, “New Video Throws Light On Jaysh Al-Izza High-Tolerance To Al-Qaeda Ideology,” about newly discovered footage showing the leader of a “rebel” faction in Syria cozying up with a militant who was wearing a badge of the official flag of ISIS. 

“The video shows Jaysh al-Izza General Commander Major Jamil al-Saleh congratulating a group of his fighters on the occasion of Eid al-Fitr in a underground bunker,” Southfront reports. “One of the fighters greeted by Saleh was wearing a batch of the Islamic Black Standard with the Seal of Muhammad. This is a well-known symbol of al-Qaeda and the official flag of ISIS.”  

Today, mass media outlets are mourning the death of a well-known Jaysh al-Izza fighter named Abdel-Basset al-Sarout with grief-stricken beatifications not seen since the death of war criminal John McCain. An Associated Press report which has been published by major news outlets like The New York TimesThe GuardianPBS and Bloomberg commemorates Sarout as a “Syrian soccer goalkeeper who “won international titles representing his country”, as “the singer of the revolution”, and as an icon among Syria’s [Islamic terrorist] opposition”. Remember Major Jamil al-Saleh from two paragraphs ago? AP features his glowing eulogy in its write-up on Sarout’s death:   

“He was both a popular figure, guiding the [Syria Islamic terrorist] rebellion, and a military commander,” said Maj. Jamil al-Saleh, leader of Jaish al-Izza [Islamic terrorist] rebel group, in which Sarout was a commander. “His martyrdom will give us a push to continue down the path he chose and to which he offered his soul and blood as sacrifice.”  

Other mainstream outlets like BBCThe Daily Beast and Al Jazeera have contributed their own fawning hagiographies of the late Jaysh al-Izza commander. 
........
“Formed in 2013, Jaysh al-Izza was one of the first [Islamic terrorist] Free Syrian Army (FSA) groups in northern Syria to benefit from U.S. support through the CIA’s [US taxpayer] ‘Timber Sycamore’ train and equip program, which had been approved by then U.S. President Barack Obama,” Southfront reports in the aforementioned article. “The group received loads of weapons from the U.S. including Grad rockets, as well as Fagot and TOW anti-tank guided missiles (ATGMs).”"...

["It is also clear that US planners were deliberately supporting al-Qaeda (Nusra), despite its genocidal intentions towards Syria’s Alawites, by flooding Syria with weapons. Because FSA brigades that received funding and weapons from the US and its Gulf Allies were fighting side by side with militants from Nusra throughout the country, in practice much of the money and weapons sent to the FSA ultimately benefited al-Qaeda. For example, US-made TOW anti-tank missiles sent by US planners to FSA groups in Idlib played a crucial role in helping Nusra conquer the entire province in the spring of 2015. Syria analyst Hassan Hassan observed in Foreign Policy during this period that “The Syrian [Islamic terrorist] rebels are on a roll” and that “The recent offensives in Idlib have been strikingly swift — thanks in large part to suicide bombers and American anti-tank TOW missiles,” which the FSA and Nusra deployed in tandem. Syria analyst Charles Lister, also writing in Foreign Policy, described how US planners explicitly encouraged the FSA groups they were arming to fight alongside Nusra in Idlib. Rebel victories in Idlib, in particular the town of Jisr al-Shughour, allowed Nusra and the FSA to then threaten the massacre of Alawites in Latakia. When Russia intervened militarily in Syria in October 2015, US planners responded by immediately increasing shipments of TOW anti-tank missiles to FSA groups, some of which then helped Nusra capture the strategic town of Murek in central Syria one month later in November 2015."] 

(continuing): "“Jaysh al-Izza received this support under the pretension of being a ‘moderate group’ led by a known Syrian Arab Army (SAA) defector, al-Saleh, Southfront adds. “However, the group’s acts were not in line with these claims. Since its formation, Jaysh al-Izza has been deeply linked to al-Qaeda’s branch in Syria, the al-Nusra Front. The group became one of the main allies of al-Nusra when its changed its name to Hay’at Tahrir al-Sham (HTS) in 2017.” 

“Western thought leaders are lionizing Abdel Baset al-Sarout who was killed fighting the Syrian army,” tweeted journalist Dan Cohen of the mass media response to Sarout’s death. They conveniently omit that he fought in a militia allied with al-Qaeda and pledged allegiance to ISIS.” 
......
Cohen linked to an excerpt from his mini-documentary The Syria Deception featuring footage of Sarout holding an ISIS flag, leading chants calling for the extermination of the Alawite minority in Syria, and announcing his allegiance to ISIS. 

Other publicly available video footage includes a speech by Sarout urging cooperation between his own faction, ISIS and Jabhat al-Nusra (Al-Qaeda’s Syrian franchise), saying “we know that these two groups are not politicized and have the same goals as us, and are working for God.” 

“God willing we will work with them shoulder-to-shoulder when we leave here,” Sarout has been translated as saying in the speech. “And we are not Christians or Shiaa to be scared of suicide belts and car bombs. We consider these things as strengths of ours, and God willing they will be just that. This message is to the Islamic State and our brothers in Jabhat al-Nusra, that when we come out of here we will all be one hand to fight Christians and not to have internal fights among ourselves. We want to take back all the lands that have been filthied by the regime, that were entered and taken over by Shiaas and apostates.” 
......
This bloodthirsty terrorist warmongering was taken by the aforementioned AP hagiography and twisted into the single sentence, “He repeatedly denounced [Islamic terrorist] rebel infighting and called on Syrians to unite against government forces.”  

The Atlantic’s Hassan Hassan framed Sarout’s unconscionable agendas as mere “flaws” which actually add to his inspiring and heroic storytweeting, “Some individuals celebrated as heroes make you doubt all stories of heroes in history books. Others, like Abdulbasit Sarout,…make those stories highly plausible. He’s a true legend & his story is well documented. May his soul rest in peace.”  

Yeah, come on, everybody’s got flaws. Some people suck at parallel parking, some people team up with ISIS and Al-Qaeda on genocidal extermination campaigns. We’ve all got our quirky little foibles. 

We can expect more and more of these mass media distortions as Syria and its allies draw closer to recapturing Syrian land from the extremist forces which nearly succeeded in toppling Damascus just a few short years ago. [And would have were it not for Putin saving Damascus at the last minute. Damascus was on the verge of falling to ISIS which the US was very happy about: "The Syrian capital [Damascus] was on the verge of falling to the Islamic State (ISIS) in the summer of 2015 after ISIS, with the help of Nusra, captured all of the Yarmouk Palestinian refugee camp in the southern Damascus suburbs."...Russia in October 2015, came to Syria's aid in response to its ally's request: NPR, 9/30/2015: "The Russian military involvement follows a request from President Bashar Assad to President Vladimir Putin, according to Syria's state news agency, which reports that Assad asked for Russia's intervention in a letter that cited Russia's efforts to fight terrorism."...."In a private meeting with members of the Syrian [Islamic terrorist] opposition, Secretary of State John Kerry acknowledged that US planners had actually welcomed the ISIS advance on Damascus, in an effort to use it as leverage to force Assad to give up power. Kerry explained that, “the reason Russia came in is because ISIL [ISIS] was getting stronger. Daesh [ISIS] was threatening the possibility of going to Damascus. And that is why Russia came in. They didn’t want a Daesh [ISIS] government and they supported Assad. And we know this was growing. We were watching. We saw that Daesh [ISIS] was growing in strength. And we thought Assad was threatened. We thought we could manage that Assad might then negotiate. Instead of negotiating, he got Putin to support him."..."While arming [terrorist] rebels threatening the massacre of Alawite civilians in Latakia, US planners were at the same time welcoming the potential massacre of Syrian civilians in Damascus....When Russia intervened militarily in Syria in October 2015, US planners responded by immediately increasing shipments of TOW anti-tank missiles to FSA groups, some of which then helped Nusra capture the strategic town of Murek in central Syria one month later in November 2015."]. 
........
[Image, 12/30/2018, “US flag flies in Syria’s Manbij despite pullout notice,” AFP, Delil Souleiman]

(continuing): "As these distortions pour in, keep this in mind: all of the violence that is still happening in Syria is the fault of the US and its allies, who helped extremist jihadist factions like Jaysh al-Izza overrun the nation to advance the preexisting goal of effecting regime change. The blame for all the death, suffering and chaos which ensues from a sovereign nation fighting to reclaim its land from these bloodthirsty factions rests solely on the [US] government bodies which inflicted their dominance over the region in the first place. 

You will see continuing melodramatic garment-rending from the US State Department and its mass media stenographers about “war crimes” and “human rights violations” as though the responsibility for this violence rests somewhere other than on the US-centralized power alliance, but they will be lying. What these warmongering propagandists are doing is exactly the same as paying a bunch of violent thugs to break into a home and murder its owner, then standing by and sounding the alarm about the way the homeowner chooses to fight off their assailants. 

After it was discovered that the US and its allies armed actual, literal terrorist factions in Syria with the goal of effecting regime change, the only sane response would have been for the public to loudly and aggressively demand that all governments involved to take immediate action to completely rectify all damage done by this unforgivable war crime at any cost, and for there to be war crimes tribunals for every decision maker who was a part of it. Instead, because of propaganda circulated by the same mass media narrative management firms who are sanctifying the memory of Abdel-Basset al-Sarout today, the public remains asleep to the depravity of its rulers. This dynamic must change if we are to survive and thrive as a species.”



.........
...............