Consortium News Blazed the Trail of Russiagate Reporting; Help Us to Continue Telling the Story – Consortium News

With his first article on what would become known as Russiagatewritten on Aug. 9, 2016, three months before the electionBob Parry positioned CN as the leading skeptic of the alleged scandal.

The White House, Moscow, 2015. (Joe Lauria)

By Joe LauriaSpecial to Consortium News

From our founding editor Bob Parrys first article on Russiagate in August 2016 to Patrick Lawrences column on Monday, Consortium News has for nearly four years been in the forefront of skeptical analysis of a purported scandal that engulfed the United States but then ignominiously collapsed.

Throughout the years in which the American public was subjected to the daily gymnastics of the corporate media trying to brand Donald Trump as a Kremlin agent and Moscow as a destroyer of American democracy, Consortium News writers, led by Parry, methodically demolished what in the end was proved a reckless theory of conspiracy.

Parry did so in the name of pursuing critical, non-partisan journalism, for which Parry and his writers nonetheless were smeared as Trump supporters and Kremlin apologists. Being critical only of ones opposing party, which American journalism has devolved into, is no journalism at all.

In that first article, Parry provided an inkling of what was to come, identifying what would erupt into Russiagate as this latest group think. That indeed became the case as the media whipped itself into a self-perpetuating frenzy in which at least 50erroneous stories were published and cool evaluation of facts fell prey to partisan fervor.

Todays Democrats apparently feel little shame in whipping up an anti-Russian hysteria and then using it to discredit Trump and other Americans who wont join this latest group think, Parry wrote. He went on, in a harbinger of things to come:

While lacking any verifiable proof, Clintons campaign and its allied mainstream media have blamed Russian intelligence for hacking into the Democratic National Committees emails and then publicizing them through Wikileaks. This conspiracy theory holds that Putin is trying to influence the U.S. election to put his secret agent, Donald Trump, into the White House.

[See Parrys first Russiagate story, Hillary Clintons Turn to McCarthyism, on Aug. 9, 2016, republished today.]

Parry and other CN writers went on to pick apart the core Russiagate allegations: that Russia hacked the Democratic National Committee and gave Clinton emails to WikiLeaks for publication; that the Trump campaign colluded with Russia; that President Trump continued to act in the White House as an agent of the Kremlin and lastly, that $100,000 of Facebook ads by a Russian troll farm divided American society.

All of it was ludicrously compared to a new Pearl Harbor.

True Russiagate believers still deny the clear evidence of the Mueller report, that there was no collusion or conspiracy between Russia and the Trump campaign; they deny newly released evidence that the head of a private firm the government relied on to prove Russias hack admitted under oath it had no such evidence; and they deny the fact that the Mueller indictment of the troll farm was dropped after the St. Petersburg defendants sought discovery.

The Russiagate saga is not over. The investigation into how all this came about continues.

While Bob is no longer with us, his work on Russiagate carries on at Consortium News. But we cant do it without you. Help us to continue covering the story that Bob started with a generous, tax-deductible donation during our 25th Anniversary Spring Fund Drive. Thank you.

Please Donate

Moscow River at night, 2015. (Joe Lauria)

Joe Lauria is editor-in-chief of Consortium News and a former correspondent for The Wall Street Journal, Boston Globe,Sunday Timesof London and numerous other newspapers. He began his professional career as a stringer for The New York Times. He can be reached atjoelauria@consortiumnews.com and followed on Twitter @unjoe .

Original post:
Consortium News Blazed the Trail of Russiagate Reporting; Help Us to Continue Telling the Story - Consortium News

Putin Is Well on His Way to Stealing the Next Election – The Atlantic

Jack Cable sat down at the desk in his cramped dorm room to become an adult in the eyes of democracy. The rangy teenager, with neatly manicured brown hair and chunky glasses, had recently arrived at Stanfordhis first semester of life away from homeand the 2018 midterm elections were less than two months away. Although he wasnt one for covering his laptop with strident stickers or for taking loud stands, he felt a genuine thrill at the prospect of voting. But before he could cast an absentee ballot, he needed to register with the Board of Elections back home in Chicago.

To hear more feature stories, get the Audm iPhone app.

When Cable tried to complete the digital forms, an error message stared at him from his browser. Clicking back to his initial entry, he realized that he had accidentally typed an extraneous quotation mark into his home address. The fact that a single keystroke had short-circuited his registration filled Cable with a sense of dread.

Despite his youth, Cable already enjoyed a global reputation as a gifted hackeror, as he is prone to clarify, an ethical hacker. As a sophomore in high school, he had started participating in bug bounties, contests in which companies such as Google and Uber publicly invite attacks on their digital infrastructure so that they can identify and patch vulnerabilities before malicious actors can exploit them. Cable, who is preternaturally persistent, had a knack for finding these soft spots. He collected enough cash prizes from the bug bounties to cover the costs of four years at Stanford.

Though it wouldnt have given the average citizen a moment of pause, Cable recognized the error message on the Chicago Board of Elections website as a telltale sign of a gaping hole in its security. It suggested that the site was vulnerable to those with less beneficent intentions than his own, that they could read and perhaps even alter databases listing the names and addresses of voters in the countrys third-largest city. Despite his technical savvy, Cable was at a loss for how to alert the authorities. He began sending urgent warnings about the problem to every official email address he could find. Over the course of the next seven months, he tried to reach the citys chief information officer, the Illinois governors office, and the Department of Homeland Security.

As he waited for someone to take notice of his missives, Cable started to wonder whether the rest of Americas electoral infrastructure was as weak as Chicagos. He read about how, in 2016, when he was a junior in high school, Russian military intelligenceknown by its initials, GRUhad hacked the Illinois State Board of Elections website, transferring the personal data of tens of thousands of voters to Moscow. The GRU had even tunneled into the computers of a small Florida company that sold software to election officials in eight states.

Out of curiosity, Cable checked to see what his home state had done to protect itself in the years since. Within 15 minutes of poking around the Board of Elections website, he discovered that its old weaknesses had not been fully repaired. These were the most basic lapses in cybersecuritypreventable with code learned in an introductory computer-science classand they remained even though similar gaps had been identified by the FBI and the Department of Homeland Security, not to mention widely reported in the media. The Russians could have strolled through the same door as they had in 2016.

From the January/February 2018 issue cover story: What Putin really wants

Between classes, Cable began running tests on the rest of the national electoral infrastructure. He found that some states now had formidable defenses, but many others were like Illinois. If a teenager in a dorm roomeven an exceptionally talented onecould find these vulnerabilities, they were not going to be missed by a disciplined unit of hackers that has spent years studying these networks, a unit with the resources of a powerful nation bent on discrediting an American election.

#DemocracyRIP was both the hashtag and the plan. The Russians were expecting the election of Hillary Clintonand preparing to immediately declare it a fraud. The embassy in Washington had attempted to persuade American officials to allow its functionaries to act as observers in polling places. A Twitter campaign alleging voting irregularities was queued. Russian diplomats were ready to publicly denounce the results as illegitimate. Events in 2016, of course, veered in the other direction. Yet the hashtag is worth pausing over for a moment, because, though it was never put to its intended use, it remains an apt title for a mission that is still unfolding.

Russias interference in the last presidential election is among the most closely studied phenomena in recent American history, having been examined by Special Counsel Robert Mueller and his prosecutors, by investigators working for congressional committees, by teams within Facebook and Twitter, by seemingly every think tank with access to a printing press. Its possible, however, to mistake a plot pointthe manipulation of the 2016 electionfor the full sweep of the narrative.

Events in the United States have unfolded more favorably than any operative in Moscow could have ever dreamed: Not only did Russias preferred candidate win, but he has spent his first term fulfilling the potential it saw in him, discrediting American institutions, rending the seams of American culture, and isolating a nation that had styled itself as indispensable to the free world. But instead of complacently enjoying its triumph, Russia almost immediately set about replicating it. Boosting the Trump campaign was a tactic; #DemocracyRIP remains the larger objective.

From the April 2020 issue: George Packer on how Trump is winning his war on American institutions

In the week that followed Donald Trumps election, Russia used its fake accounts on social media to organize a rally in New York City supporting the president-electand another rally in New York decrying him. Hackers continued attempting to break into state voting systems; trolls continued to launch social-media campaigns intended to spark racial conflict. Through subsidiaries, the Russian government continued to funnel cash to viral-video channels with names like In the Now and ICYMI, which build audiences with ephemera (Man Licks Store Shelves in Online Post), then hit unsuspecting readers with arguments about Syria and the CIA. This winter, the Russians even secured airtime for their overt propaganda outlet Sputnik on three radio stations in Kansas, bringing the networks drive-time depictions of American hypocrisy to the heartland.

While the Russians continued their efforts to undermine American democracy, the United States belatedly began to devise a response. Across governmentif not at the top of itthere was a panicked sense that American democracy required new layers of defense. Senators drafted legislation with grandiose titles; bureaucrats unfurled the blueprints for new units and divisions; law enforcement assigned bodies to dedicated task forces. Yet many of the warnings have gone unheeded, and what fortifications have been built appear inadequate.

Jack Cable is a small emblem of how the U.S. government has struggled to outpace the Russians. After he spent the better part of a semester shouting into the wind, officials in Chicago and in the governors office finally took notice of his warnings and repaired their websites. Cable may have a further role to play in defending Americas election infrastructure. He is part of a team of competitive hackers at Stanfordnational champions three years runningthat caught the attention of Alex Stamos, a former head of security at Facebook, who now teaches at the university. Earlier this year, Stamos asked the Department of Homeland Security if he could pull together a group of undergraduates, Cable included, to lend Washington a hand in the search for bugs. Its talent, but unrefined talent, Stamos told me. DHS, which has an acute understanding of the problem at hand but limited resources to solve it, accepted Stamoss offer. Less than six months before Election Day, the government will attempt to identify democracys most glaring weakness by deploying college kids on their summer break.

Despite such well-intentioned efforts, the nations vulnerabilities have widened, not narrowed, during the past four years. Our politics are even more raw and fractured than in 2016; our faith in governmentand, perhaps, democracy itselfis further strained. The coronavirus may meaningfully exacerbate these problems; at a minimum, the pandemic is leeching attention and resources from election defense. The president, meanwhile, has dismissed Russian interference as a hoax and fired or threatened intelligence officials who have contradicted that narrative, all while professing his affinity for the very man who ordered this assault on American democracy. Fiona Hill, the scholar who served as the top Russia expert on Trumps National Security Council, told me, The fact that they faced so little consequence for their action gives them little reason to stop.

The Russians have learned much about American weaknesses, and how to exploit them. Having probed state voting systems far more extensively than is generally understood by the public, they are now surely more capable of mayhem on Election Dayand possibly without leaving a detectable trace of their handiwork. Having hacked into the inboxes of political operatives in the U.S. and abroad, theyve pioneered new techniques for infiltrating campaigns and disseminating their stolen goods. Even as to disinformation, the best-known and perhaps most overrated of their tactics, they have innovated, finding new ways to manipulate Americans and to poison the nations politics. Russias interference in 2016 might be remembered as the experimental prelude that foreshadowed the attack of 2020.

When officials arrived at work on the morning of May 22, 2014, three days before a presidential election, they discovered that their hard drives were fried. Hours earlier, pro-Kremlin hackers had taken a digital sledgehammer to a vital piece of Ukraines democratic infrastructure, the network that collects vote tallies from across the nation. After finishing the task, they taunted their victim, posting photos of an election commissioners renovated bathroom and his wifes passport.

Relying on a backup system, the Ukrainians were able to resuscitate their network. But on election night the attacks persisted. Hackers sent Russian journalists a link to a chart they had implanted on the official website of Ukraines Central Election Commission. The graphic purported to show that a right-wing nationalist had sprinted to the lead in the presidential race. Although the public couldnt access the chart, Russian state television flashed the forged results on its highly watched newscast.

If the attack on Ukraine represented something like all-out digital war, Russias hacking of the United States electoral system two years later was more like a burglar going house to house jangling doorknobs. The Russians had the capacity to cause far greater damage than they didat the very least to render Election Day a chaotic messbut didnt act on it, because they deemed such an operation either unnecessary or not worth the cost. The U.S. intelligence community has admitted that its not entirely sure why Russia sat on its hands. One theory holds that Barack Obama forced Russian restraint when he pulled Vladimir Putin aside at the end of the G20 Summit in Hangzhou, China, on September 5, 2016. With only interpreters present, Obama delivered a carefully worded admonition not to mess with the integrity of the election. By design, he didnt elaborate any specific consequence for ignoring his warning.

From the March 2017 issue: Franklin Foer on how Vladimir Putin became the hero of nationalists everywhere

Perhaps the warning was heeded. The GRU kept on probing voting systems through the month of October, however, and there are other, more ominous explanations for Russias apparent restraint. Michael Daniel, who served as the cybersecurity coordinator on Obamas National Security Council, told the Senate Intelligence Committee that the Russians were, in essence, casing the joint. They were gathering intelligence about the digital networks that undergird American elections and putting together a map so that they could come back later and actually execute an operation.

What sort of operation could Russia execute in 2020? Unlike Ukraine, the United States doesnt have a central node that, if struck, could disable democracy at its core. Instead, the United States has an array of smaller but still alluring targets: the vendors, niche companies, that sell voting equipment to states and localities; the employees of those governments, each with passwords that can be stolen; voting machines that connect to the internet to transmit election results.

Matt Masterson is a senior adviser at the Department of Homeland Securitys freshly minted Cybersecurity and Infrastructure Security Agency, a bureau assigned to help states protect elections from outside attack; its where Jack Cable will work this summer. I asked Masterson to describe the scenarios that keep him up at night. His greatest fear is that an election official might inadvertently enable a piece of ransomware. These are malicious bits of code that encrypt data and files, essentially placing a lock on a system; money is then demanded in exchange for the key. In 2017, Ukraine was targeted again, this time with a similar piece of malware called NotPetya. But instead of extorting Ukraine, Russia sought to cripple it. NotPetya wiped 10 percent of the nations computers; it disabled ATMs, telephone networks, and banks. (The United States is well aware of NotPetyas potency, because it relied on a tool created byand stolen fromthe National Security Agency.) If the Russians attached such a bug to a voter-registration database, they could render an entire election logistically unfeasible; tracking who had voted and where theyd voted would be impossible.

But Russia need not risk such a devastating attack. It can simply meddle with voter-registration databases, which are filled with vulnerabilities similar to the ones that Cable exposed. Such meddling could stop short of purging voters from the rolls and still cause significant disruptions: Hackers could flip the digits in addresses, so that voters photo IDs no longer match the official records. When people arrived at the polls, they would likely still be able to vote, but might be forced to cast provisional ballots. The confusion and additional paperwork would generate long lines and stoke suspicion about the underlying integrity of the election.

Given the fragility of American democracy, even the tiniest interference, or hint of interference, could undermine faith in the tally of the vote. On Election Night, the Russians could place a page on the Wisconsin Elections Commission website that falsely showed Trump with a sizable lead. Government officials would be forced to declare it a hoax. Imagine how Twitter demagogues, the president among them, would exploit the ensuing confusion.

Such scenarios ought to have sparked a clamor for systemic reform. But in the past, when the federal government has pointed out these vulnerabilitiesand attempted to protect against themthe states have chafed and moaned. In August 2016, President Obamas homeland-security secretary, Jeh Johnson, held a conference call with state election officials and informed them of the need to safeguard their infrastructure. Instead of accepting his offer of help, they told him, This is our responsibility and there should not be a federal takeover of the election system.

After the 2016 election, the federal government could have taken a stronger hand with localities. Unprecedented acts of foreign interference presumably would have provided quite a bit of leverage. That did not happen. The president perceives any suggestion of Russian interference as the diminution of his own legitimacy. This has contributed to a conspiracy of silence about the events of 2016. A year after the election, the Department of Homeland Security told 21 states that Russia had attempted to hack their electoral systems. Two years later, a Senate report publicly disclosed that Russia had, in fact, targeted all 50 states. When thenDHS Secretary Kirstjen Nielsen tried to raise the subject of electoral security with the president, acting White House Chief of Staff Mick Mulvaney reportedly told her to steer clear of it. According to The New York Times, Mulvaney said it wasnt a great subject and should be kept below his level.

From the April 2019 issue: William J. Burns on how the U.S.-Russian relationship went bad

This atmosphere stifled what could have been a genuinely bipartisan accomplishment. The subject of voting divides Republicans and Democrats. Especially since the Bush v. Gore decision in 2000, the parties have stitched voting into their master narratives. Democrats accuse Republicans of suppressing the vote; Republicans accuse Democrats of flooding the polls with corpses and other cheating schemes. Despite this rancor, both sides seemed to agree that Russian hacking of voting systems was not a good thing. After the 2016 election, Democratic Senator Amy Klobuchar, from Minnesota, partnered with Republican Senator James Lankford, from Oklahoma, on the Secure Elections Act. The bill would have given the states money to replace electronic voting machines with ones that leave a paper trail and would have required states to audit election results to confirm their accuracy. The reforms would also have had the seemingly salutary effect of making it easier for voters to cast ballots.

The Secure Elections Act wouldnt have provided perfect insulation from Russian attacks, but it would have been a meaningful improvement on the status quo, and it briefly looked as if it could pass. Then, on the eve of a session to mark up the legislationa moment for lawmakers to add their final touchesSenate Republicans suddenly withdrew their support, effectively killing the bill. Afterward, Democrats mocked Senate Majority Leader Mitch McConnell as Moscow Mitch, an appellation that stung enough that the senator ultimately agreed to legislation that supplied the states with hundreds of millions of dollars to buy new voting systemsbut without any security demands placed on the states or any meaningful reforms to a broken system. McConnell made it clear that he despised the whole idea of a legislative fix to the electoral-security problem: Im not going to let Democrats and their water carriers in the media use Russias attack on our democracy as a Trojan horse for partisan wish-list items that would not actually make our elections any safer. For McConnell, suppressing votes was a higher priority than protecting them from a foreign adversary.

To raise the subject of John Podestas email in his presence is a callous act. But I wanted his help tabulating a more precise toll of Russian hackinghow it leaves a messy trail of hurt feelings, saps precious mental space, and reshapes the course of a campaign. After repeatedly prodding him for an interview, I finally met with Hillary Clintons old campaign chief in his Washington office, which stares down onto the steeple of the church Abraham Lincoln attended during the Civil War. Dressed in a plaid shirt, with a ballpoint pen clipped into the pocket, Podesta rocked back and forth in a swivel chair as he allowed me to question him about one of the most wince-inducing moments in recent political history.

Months before WikiLeaks began publishing his emails, Podesta had an inkling that his Gmail account had been compromised. Internal campaign documents had appeared on an obscure website, and he considered the possibility that they had been lifted from his computer. Still, the call from a member of the campaigns communications team on October 7, 2016, left him gobsmacked. As he finished a session of debate preparation with Clinton, he learned that Julian Assange intended to unfurl the contents of his inbox over the remaining month of the campaign. Its a familiar if much-ignored maxim in politics that no email should ever contain content one wouldnt want to see on the front page of The New York Times. This was now Podestas reality.

On the 10th floor of the Clinton campaigns headquarters, in Brooklyn, a team of 14 staffers quickly assembled. They covered a glass door in opaque paper to prevent voyeurs from observing their work and began to pore over every word of his 60,000 emailsevery forwarded PDF, every gripe from an employee, even the meticulous steps of his risotto recipe. The project would consume the entirety of the month. Every day, Podesta set aside time to meet with emissaries from the 10th floor and review their findings. I willed myself not to feel pain, he told me.

The material that WikiLeaks eventually posted created some awkward moments. Podesta had received snarky emails from colleagues, and had sent a few himself. To repair relationships, Podesta found himself apologizing to co-workers, friends, former Cabinet secretaries. Even when the contents of the leaked messages seemed innocuous, new annoyances would arise. WikiLeaks hadnt redacted the correspondence to protect privacy, leaving the cellphone numbers of campaign staffers for the world to view. In the middle of meetings, staffers would find their devices vibrating incessantly; strangers would fill their voicemails with messages like I hope youre raped in prison. Identity thieves quickly circled Podesta, attempting to claim his Social Security benefits and applying for credit cards in his name. Despite a political career that has permitted him to whisper into the ears of presidents, the legendarily frugal Podesta had commuted to New York on Vamoose, a discount bus line. A fraudster exploited the hack to steal the points he had accumulated in the Vamoose rewards program.

As Podesta revisited these painful moments, he claimed that hed stoically persisted in their face: I kept going on television. I kept raising money. I kept traveling with Hillary and President Clinton. I kept doing everything that I had been doing. But these were the closing weeks of an election that would turn on fewer than 80,000 votes spread across three states. For a campaign that arguably didnt invest its resources properly in the final stretch, the question must be asked: How badly did the Russians throw the campaign off its game? The least visible damage of the hack might have been the most decisive.

In the years since the Podesta hack, Microsofts Tom Burt has continually battled its perpetrators. As the man charged with safeguarding the security of Windows, Word, and his companys other software, he has developed a feel for the GRUs rhythms and habits. Through Microsofts work with political parties and campaigns around the worldthe company offers them training and sells them security software at a discountBurt has accumulated lengthy dossiers on past actions.

What hes noticed is that attacks tend to begin on the furthest fringes of a campaign. A standard GRU operation starts with think-tank fellows, academics, and political consultants. These people and institutions typically have weak cybersecurity fortifications, the penetration of which serves dual purposes. As the GRU pores through the inboxes of wonks and professors, it gathers useful intelligence about a campaign. But the hacked accounts also provide platforms for a more direct assault. Once inside, the GRU will send messages from the hacked accounts. The emails come from a trusted source, and carry a plausible message. According to Burt, It will say something like Saw this great article on the West Bank that you should review, and its got a link to a PDF. You click on it, and now your campaign network is infected. (Although Burt wont discuss specific institutions, he wrote a blog post last year describing attacks on the German Marshall Fund and the European offices of the Aspen Institute.)

Podesta fell victim to a generic spear-phishing attack: a spoofed security warning urging him to change his Gmail password. Many of us might like to think were sophisticated enough to avoid such a trap, but the Russians have grown adept at tailoring bespoke messages that could ensnare even the most vigilant target. Emails arrive from a phony address that looks as if it belongs to a friend or colleague, but has one letter omitted. One investigator told me that hes noticed that Russians use details gleaned from Facebook to script tantalizing messages. If a campaign consultant has told his circle of friends about an upcoming bass-fishing trip, the GRU will package its malware in an email offering discounts on bass-fishing gear.

Many of these techniques are borrowed from Russian cybercrime syndicates, which hack their way into banks and traffic in stolen credit cards. Burt has seen these illicit organizations using technologies that he believes will soon be imported to politics. For instance, new synthetic-audio software allows hackers to mimic a voice with convincing verisimilitude. Burt told me, In the cybercrime world, youre starting to see audio phishes, where somebody gets a voicemail message from their boss, for example, saying, Hey, I need you to transfer this money to the following account right away. It sounds just like your boss and so you do it.

What the Russians cant obtain from afar, they will attempt to pilfer with agents on the ground. The same GRU unit that hacked Podesta has allegedly sent operatives to Rio de Janeiro, Kuala Lumpur, and The Hague to practice what is known as close-access hacking. Once on the ground, they use off-the-shelf electronic equipment to pry open the Wi-Fi network of whomever theyre spying on.

The Russians, in other words, take risks few other nations would dare. They are willing to go to such lengths because theyve reaped such rich rewards from hacking. Of all the Russian tactics deployed in 2016, the hacking and leaking of documents did the most immediate and palpable damagedistracting attention from the Access Hollywood tape, and fueling theories that the Democratic Party had rigged its process to squash Bernie Sanderss campaign.

In 2020, the damage could be greater still. Podesta told me that when he realized his email had been breached, he feared that the hackers would manufacture embarrassing or even incriminating emails and then publish them alongside the real ones. Its impossible to know their reasoning, but Russian hackers made what would prove to be a clever decision not to alter Podestas email. Many media outlets accepted whatever emails WikiLeaks published without pausing to verify every detail, and they werent punished for their haste. The Podesta leaks thus established a precedent, an expectation that hacked material is authenticperhaps the most authentic version of reality available, an opportunity to see past a campaigns messaging and spin and read its innermost thoughts.

In fact, the Russians have no scruples about altering documents. In 2017, hackers with links to the GRU breached the inboxes of French President Emmanuel Macrons campaign staffers. The contents were rather banal, filled with restaurant reservations and trivial memos. Two days before these were released, other documents surfaced on internet message boards. Unlike the emails, these were pure fabrications, which purported to show that Macron had used a tax haven in the Cayman Islands. The timing of their release, however, gave them credibility. It was natural to assume that they had been harvested from the email hack, too. The Macron leaks suggested a dangerous new technique, a sinister mixing of the hacked and the fabricated intended to exploit the electorates hunger for raw evidence and faith in purloined documents.

In the spring of 2015, trolls in St. Petersburg peered at the feed of a webcam that had been furtively placed in New York City. Sitting in front of a computer screen on the second floor of a squat concrete office building, the trolls waited to see if they could influence the behavior of Americans from the comfort of Russian soil.

The men worked for a company bankrolled by Yevgeny Prigozhin, a bald-headed hot-dog vendor turned restaurateur, known to the Russian press as Putins chef. In the kleptocratic system that is the Russian economy, men like Prigozhin profit from their connections to Putin and maintain their inner-circle status by performing missions on his behalf. The operation in St. Petersburg was run by the Internet Research Agency, a troll farm serving the interests of the Kremlin. (Prigozhin has denied any involvement with the IRA.)

The IRA is an heir to a proud Russian tradition. In the Soviet Unions earliest days, the state came to believe that it could tip the world toward revolution through psychological warfare and deception, exploiting the divisions and weaknesses of bourgeois society. When it was assigned this task, the KGB referred to its program by the bureaucratic yet ominous name Active Measures. It pursued this work with artistic verve. It forged letters from the Ku Klux Klan that threatened to murder African athletes at the 1984 Summer Olympics in Los Angeles. It fomented conspiracies about the CIAthat the agency had orchestrated the spread of the AIDS virus in a laboratory and plotted the assassination of President John F. Kennedy. Some of these KGB schemes were harebrained. But as one defector to the West put it, more Americans believed the Soviet version of JFKs murder than the Warren Report.

The IRA has updated the principles of Active Measures for the digital age. On social media, disinformation can flourish like never before. Whereas the KGB once needed to find journalistic vehicles to plant their storiesusually the small-audience fringes of the radical pressFacebook and Twitter hardly distinguished between mainstream outlets and clickbait upstarts. And many of the new platforms were designed to manipulate users, to keep them engaged for as long as possible. Their algorithms elevated content that fueled panic and anger.

With the New York webcam, the IRA was testing a hunch: that, through the miracle of social media, it could now toy with Americans as if they were marionettes. As the political scientist Thomas Rid recounts in his powerful new history, Active Measures, a post on Facebook promised that free hot dogs would be available to anyone who arrived on a specific corner at a prescribed time. Back in St. Petersburg, IRA employees watched as New Yorkers arrived, looked at their phones in frustration, and skulked away.

The ruse was innocuous, but it proved a theory that could be put to far more nefarious ends: Social media had made it possible, at shockingly low cost, for Russians to steer the emotions and even movements of Americans. No study has quantified how many votes have been swayed by the 10 million tweets that the IRA has pumped into the digital world; no metric captures how its posts on Facebook and Instagram altered Americas emotional valence as it headed to the polls in 2016. In the end, the IRAs menagerie of false personas and fusillades of splenetic memes were arguably more effective at garnering sensationalistic headlines than shifting public opinion. For their part, the IRAs minions immodestly credited themselves with having tilted the trajectory of history. The U.S. government obtained an email from an IRA employee describing the scene at the St. Petersburg office on Election Night: When around 8 a.m. the most important result of our work arrived, we uncorked a tiny bottle of champagne took one gulp each and looked into each others eyes We uttered almost in unison: We made America great.

Having run a noisy operation in 2016, the IRA has since learned to modulate itself. Its previous handiwork, much of which was riddled with poor syntax and grammatical errors, hardly required a discerning eye to identify. These days, the IRA takes care to avoid such sloppiness. Now, when they want to, IRA trolls can make themselves inconspicuous.

Relying on this quieter approach, the IRA has carried the theory of its hot-dog experiment into American political life. When white supremacists applied for a permit to hold a march in 2018 to commemorate the first anniversary of their protests in Charlottesville, Virginia, a Facebook group organized a counterprotest in Washington, D.C. The group was called the Resisters. Its administrators, who went by the names Mary and Natasha, recruited a coterie of enthusiastic organizers to promote the rally. When Facebook took down the Resisters pagenoting its ties to IRA accounts, and implying that Mary and Natasha were fictitious creationsAmerican leftists were shocked to learn that they had apparently been hatching plans with foreign trolls. According to The New York Times, they were also furious with Facebook: Whether or not the page was a Russian ploy, it had become a venue for real Americans to air their real grievances. In fact, it was hard to pinpoint where the Active Measures ended and the genuine action beganthe sort of tradecraft that the KGB would have admired.

Although the IRA might practice stealth when the operation demands, in other circumstances it will deploy raw bluster. Starting in 2017, it launched a sustained effort to exaggerate the specter of its interference, a tactic that social-media companies call perception hacking. Its trolls were instructed to post about the Mueller report and fan the flames of public anger over the blatant interference it revealed. On the day of the 2018 midterm elections, a group claiming to be the IRA published a grandiloquent manifesto on its website that declared: Soon after November 6, you will realize that your vote means nothing. We decide who you vote for and what candidates will win or lose. Whether you vote or not, there is no difference as we control the voting and counting systems. Remember, your vote has zero value. We are choosing for you.

The claim was absurd, but the posturing had a purpose. If enough Americans come to believe that Russia can do whatever it wants to our democratic processes without consequence, that, too, increases cynicism about American democracy, and thereby serves Russian ends. As Laura Rosenberger, a former National Security Council staffer under Obama who runs the Alliance for Securing Democracy, put it, They would like us to see a Russian under every bed.

Judging by this years presidential-primary campaign, they have been successful in this effort. When the Iowa Democratic Party struggled to implement new technology used to tally results for the states caucus, television panelists, Twitter pundits, and even a member of Congress speculated about the possibility of hacking, despite a lack of evidence to justify such loose talk. American incompetence had been confused for a plot against America.

As the outlines of the IRAs efforts began to emerge in the months following the 2016 election, Facebook at first refused to acknowledge the problem. The companys defensiveness called attention to its laissez-faire attitude toward the content that it elevated in peoples News Feeds. Facebook found itself flayed by congressional committees, its inner workings exposed by investigative journalists. Ostensibly it had been Alex Stamoss job to prevent the last attack, and now he faced another wave of disinformation, with midterm elections fast approaching. Stamos worried that, in the absence of an orchestrated defense, his company, as well as the nation, would repeat the mistakes of 2016.

In the spring of 2018, he invited executives from the big tech companies and leaders of intelligence agencies to Facebooks headquarters in Menlo Park, California. As he thought about it, Stamos was surprised that such a summit hadnt been organized sooner. What shocked him more was a realization he had as the meeting convened: Few of these people even knew one another. People who ran different agencies working on foreign interference met for the first time at Menlo Park, even though they were 10 Metro stops away in D.C., he told me. The normal collaborative process in government didnt exist on this issue.

Stamoss summit succeeded in spurring cooperation. Prior to the meeting, one tech company would identify and disable Russian accounts but fail to warn its competitors, allowing the same trolls to continue operating with impunity. Over the course of 2018, the tech industry gradually began acting in concert. The lead investigators on the threat-intelligence teams at 30 companiesincluding Facebook, Verizon, and Redditjoined a common channel on Slack, the messaging platform. When one company spies a nascent operation, it can now ring a bell for the others. This winter, Facebook and Twitter jointly shut down dozens of accounts associated with a single residential address in Accra, Ghana, where the Russians had set up a troll factory and hired local 20-somethings to impersonate African Americans and stoke online anger.

Yet this remains a game of cat and mouse in which the mice enjoy certain advantages. Despite the engineering prowess of the social-media companies, they havent yet built algorithms capable of reliably identifying coordinated campaigns run by phony Russian accounts. In most instances, their algorithms will suggest the inauthenticity of certain accounts. Those data points become a lead, which is then passed along to human investigators.

Facebook has several dozen employees on its threat-intelligence team, many of them alumni of the three-letter agencies in Washington. Still, the tech companies rely heavily on law enforcement for tips. Facebook and Twitter have frequent check-ins with the FBI. Without the bureau, Facebook might have missed an IRA video filled with lies about Russian tampering in the midterm elections. After a heads-up from the government, Facebook blocked the IRA from uploading the video before it ever appeared on its site, using the same technique that it deploys to suppress Islamic State snuff videos and child pornography. Rising from their denialist crouch, the social-media companies have proved themselves capable of aggressive policing; after treating the IRA as a harmless interloper, they came to treat it with the sort of disdain they otherwise reserve for terrorists and deviants.

Devising strategies for thwarting the last attack is far easier than preventing the next one. Even if Russian disinformation can be tamped down on social mediaand the efforts here, on balance, are encouragingthere are other ways, arguably more consequential, to manipulate American politics, and scant defense against them.

On an early-March afternoon, I typed the Federal Election Commission as a destination into Uber and was disgorged at a building the agency hasnt occupied for two years. The antiquated address placed me on course to arrive half an hour late for an appointment with Ellen Weintraub, the longest-serving and most vociferous member of the commission nominally assigned to block the flow of foreign money into political campaigns. When I called her office to inform her of my tardiness, her assistant told me not to worry: Weintraubs schedule was wide open that afternoon. In fact, for the past six months the FEC hadnt conducted much official business. Only three Senate-approved commissioners were installed in their jobs, even though the agency should have six and needs four for a quorum.

Weintraub, a Democrat, has an impish streak. Near the beginning of the FECs hibernation, she called out a fellow commissioner who had blocked the publication of a memo that seemed to criticize the Trump campaign for its 2016 meeting with a Russian lawyerthen posted the memo in a 57-part thread on Twitter. Weintraub has grown accustomed to her colleagues ignoring her questions about the presence of Russian and other illicit money in American campaigns. When the commission received a complaint suggesting that the FBI was investigating the National Rifle Association as a conduit for Russian money, she asked her fellow commissioners for permission to call the FBI, to, as she put it, see if they have interesting information they want to share. But they said, Were not going to call the FBI. They didnt want to do anything.

Outside Weintraubs office, the subject of Russias illicit financing of campaigns hardly provokes any attention. The Alliance for Securing Democracy was the only organization I could find that comprehensively tracks the issue. It has collected examples of Russian money flowing into campaigns around the world: a 9.4-million-euro loan made to the French nationalist Marine Le Pens party; operatives arriving in Madagascar before an election with backpacks full of cash to buy TV ads on behalf of Russias preferred candidate and to pay journalists to cover his rallies.

Or take a case closer to home: Lev Parnas and Igor Frumanthe Soviet-born Americans who worked with Rudy Giuliani in his search for politically damaging material to deploy against former Vice President Joe Bidenwere charged with conspiring to funnel money from an unnamed Russian into American campaigns. Some of the cases cited by the Alliance for Securing Democracy are circumstantial, but they form a pattern. Since 2016, the group has identified at least 60 instances of Russia financing political campaigns beyond its borders. (The Kremlin denies meddling in foreign elections.)

When I asked Weintraub if she had a sense of how many such examples exist in American politics, she replied, We know theres stuff going on out there, and were just not doing anything. Since the Supreme Courts 2010 Citizens United decision, which lifted restrictions on campaign finance, hardly any systemic checks preclude foreigners from subsidizing politicians using the cover of anonymous shell companies. With that decision, the high court opened the door for Russia to pursue one of its favored methods of destabilizing global democracy. By covertly financing campaigns, the Russians have helped elevate extremist politicians and nurture corrosive social movements. Everyone knows there are loopholes in our campaign-finance system, Weintraub said. Why would we think that our adversaries, who have demonstrated a desire to muck around in our democracy, wouldnt be using those loopholes, too?

Problems of inattention, problems of coordination, and deep concerns about Novemberthese themes came up over and over in my interviews for this story. Indeed, at times everyone seemed to be sounding the same alarm. H. R. McMaster, who briefly served as Donald Trumps national security adviser, sounded it when he proposed a new task force to focus the governments often shambolic efforts to safeguard the election. Adam Schiff, the chairman of the House Intelligence Committee, sounded it when he realized how poorly the bureaucracy was sharing the information it was gathering about the Russian threat.

There was a moment that crystallized Schiffs sense of this disjointedness. In the summer of 2018, he attended a security conference in Aspen, Colorado, where Tom Burt revealed that Microsoft had detected Russian phishing attacks targeting Democratic senatorial candidates. When I went back to Washington, Schiff told me, I asked agency heads within the [intelligence community] whether they were aware of this. The answer was no. That the chairman of the House Intelligence Committee had to learn this elemental fact about his own branch of government at a public gathering is troubling; that the people charged with protecting the country didnt know it is flabbergasting.

The sprawling federal bureaucracy has never been particularly adept at the kind of coordination necessary to anticipate a wily adversarys next move. But there is another reason for the governments alarmingly inadequate response: a president who sees attempts to counter the Russia threat as a personal affront.

After McMaster was fired, having made little if any progress on Russia, the director of national intelligence, Dan Coats, took up the cause, installing in his office an election-security adviser named Shelby Pierson. This past February, Pierson briefed Schiffs committee that the Russians were planning to interfere in the upcoming election, and that Trump remained Moscows preferred candidate. Anyone who follows the president on Twitter knows this is a subject that provokes his fury. Indeed, the day after Piersons testimony, the president upbraided Coatss successor, Joseph Maguire, for Piersons assessment. A week later, he fired Maguire and installed in his place the ambassador to Germany, Richard Grenell, a loyalist with no intelligence experience. Grenell immediately set about confirming the wisdom behind Trumps choice. Three weeks into his tenure, a senior intelligence official in the Office of the DNI informed the Senate that Piersons assessment was mistaken.

Trump had graphically illustrated his recurring message to the intelligence community: He doesnt want to hear warnings about Russian interference. Mark Warner, the highest-ranking Democrat on the Senate Intelligence Committee, told me, A day doesnt go by that I dont hear from someone in the intelligence community saying, Oh my gosh, were worried about integrity, were worried about morale, were worried about willingness to speak truth to power. I asked Warner whether he could still trust the intelligence about Russia he receivedwhether he has faith that the government will render an accurate portrait of the Russian threat to the upcoming presidential election. As he considered his answer, he leaned toward me. I dont know the answer to that, he replied, and that bothers me.

Vladimir Putin dreams of discrediting the American democratic system, and he will never have a more reliable ally than Donald Trump. A democracy cant defend itself if it cant honestly describe the attacks against it. But the president hasnt just undermined his own countrys defenseshe has actively abetted the adversarys efforts. If Russia wants to tarnish the political process as hopelessly rigged, it has a bombastic amplifier standing behind the seal of the presidency, a man who reflexively depicts his opponents as frauds and any system that produces an outcome he doesnt like as fixed. If Russia wants to spread disinformation, the president continually softens an audience for it, by instructing the public to disregard authoritative journalism as the prevarications of a traitorous elite and by spouting falsehoods on Twitter.

In 2020, Russia might not need to push the U.S. for it to suffer a terrible election-year tumble. Even without interventions from abroad, it is shockingly easy to imagine how a pandemic might provide a pretext for indefinitely delaying an election or how this president, narrowly dispatched at the polls, might refuse to accept defeat. But restraint wouldnt honor Russias tradition of Active Measures. And there may never be a moment quite so ripe for taking the old hashtag out of storage and giving it a triumphalist turn. #DemocracyRIP.

This article appears in the June 2020 print edition with the headline The 2016 Election Was Just a Dry Run.

Read the rest here:
Putin Is Well on His Way to Stealing the Next Election - The Atlantic

RAY McGOVERN: New House Documents Sow Further Doubt That Russia Hacked the DNC – Consortium News

For two and a half years the House Intelligence Committee knew CrowdStrike didnt have the goods on Russia. Now the public knows too.

Twin Pillars of Russiagate Crumble

By Ray McGovernSpecial to Consortium News

House Intelligence Committee documents released Thursday reveal that the committee was told two and half years ago that the FBI had no concrete evidence that Russia hacked Democratic National Committee computers to filch the DNC emails published by WikiLeaks in July 2016.

The until-now-buried, closed-door testimony came on Dec. 5, 2017 from Shawn Henry, a protege of former FBI Director Robert Mueller (from 2001 to 2012), for whom Henry served as head of the Bureaus cyber crime investigations unit.

Henry retired in 2012 and took a senior position at CrowdStrike, the cyber security firm hired by the DNC and the Clinton campaign to investigate the cyber intrusions that occurred before the 2016 presidential election.

The following excerpts from Henrys testimony speak for themselves. The dialogue is not a paragon of clarity; but if read carefully, even cyber neophytes can understand:

Ranking Member Mr. [Adam] Schiff: Do you know the date on which the Russians exfiltrated the data from the DNC? when would that have been?

Mr. Henry: Counsel just reminded me that, as it relates to the DNC, we have indicators that data was exfiltrated from the DNC, but we have no indicators that it was exfiltrated (sic). There are times when we can see data exfiltrated, and we can say conclusively. But in this case, it appears it was set up to be exfiltrated, but we just dont have the evidence that says it actually left.

Mr. [Chris] Stewart of Utah: Okay. What about the emails that everyone is so, you know, knowledgeable of? Were there also indicators that they were prepared but not evidence that they actually were exfiltrated?

Mr. Henry: Theres not evidence that they were actually exfiltrated. Theres circumstantial evidence but no evidence that they were actually exfiltrated.

Mr. Stewart: But you have a much lower degree of confidence that this data actually left than you do, for example, that the Russians were the ones who breached the security?

Mr. Henry: There is circumstantial evidence that that data was exfiltrated off the network.

Mr. Stewart: And circumstantial is less sure than the other evidence youve indicated.

Mr. Henry: We didnt have a sensor in place that saw data leave. We said that the data left based on the circumstantial evidence. That was the conclusion that we made.

In answer to a follow-up query on this line of questioning, Henry delivered this classic: Sir, I was just trying to be factually accurate, that we didnt see the data leave, but we believe it left, based on what we saw.

Inadvertently highlighting the tenuous underpinning for CrowdStrikes belief that Russia hacked the DNC emails, Henry added: There are other nation-states that collect this type of intelligence for sure, but the what we would call the tactics and techniques were consistent with what wed seen associated with the Russian state.

Not Transparent

Try as one may, some of the testimony remains opaque. Part of the problem is ambiguity in the word exfiltration.

The word can denote (1) transferring data from a computer via the Internet (hacking) or (2) copying data physically to an external storage device with intent to leak it.

As the Veteran Intelligence Professionals for Sanity has been reporting for more than three years, metadata and other hard forensic evidence indicate that the DNC emails were not hacked by Russia or anyone else.

Rather, they were copied onto an external storage device (probably a thumb drive) by someone with access to DNC computers. Besides, any hack over the Internet would almost certainly have been discovered by the dragnet coverage of the National Security Agency and its cooperating foreign intelligence services.

Henry testifies that it appears it [the theft of DNC emails] was set up to be exfiltrated, but we just dont have the evidence that says it actually left.

This, in VIPS view, suggests that someone with access to DNC computers set up selected emails for transfer to an external storage device a thumb drive, for example. The Internet is not needed for such a transfer. Use of the Internet would have been detected, enabling Henry to pinpoint any exfiltration over that network.

Binney

Bill Binney, a former NSA technical director and a VIPS member, filed a sworn affidavit in the Roger Stone case. Binney said: WikiLeaks did not receive stolen data from the Russian government. Intrinsic metadata in the publicly available files on WikiLeaks demonstrates that the files acquired by WikiLeaks were delivered in a medium such as a thumb drive.

The So-Called Intelligence Community Assessment

There is not much good to be said about the embarrassingly evidence-impoverished Intelligence Community Assessment (ICA) of Jan. 6, 2017 accusing Russia of hacking the DNC.

But the ICA did include two passages that are highly relevant and demonstrably true:

(1) In introductory remarks on cyber incident attribution, the authors of the ICA made a highly germane point: The nature of cyberspace makes attribution of cyber operations difficult but not impossible. Every kind of cyber operation malicious or not leaves a trail.

(2) When analysts use words such as we assess or we judge, [these] are not intended to imply that we have proof that shows something to be a fact. Assessments are based on collected information, which is often incomplete or fragmentary High confidence in a judgment does not imply that the assessment is a fact or a certainty; such judgments might be wrong. [And one might add that they commonly ARE wrong when analysts succumb to political pressure, as was the case with the ICA.]

The intelligence-friendly corporate media, nonetheless, immediately awarded the status of Holy Writ to the misnomered Intelligence Community Assessment (it was a rump effort prepared by handpicked analysts from only CIA, FBI, and NSA), and chose to overlook the banal, full-disclosure-type caveats embedded in the assessment itself.

>>PleaseDonatetoCNs 25th Anniversary Spring Fund Drive<<

Then National Intelligence Director James Clapper and the directors of the CIA, FBI, and NSA briefed President Obama on the ICA on Jan. 5, 2017, the day before they gave it personally to President-elect Donald Trump.

On Jan. 18, 2017, at his final press conference, Obama saw fit to use lawyerly language on the key issue of how the DNC emails got to WikiLeaks, in an apparent effort to cover his own derriere.

Obama: The conclusions of the intelligence community with respect to the Russian hacking were not conclusive as to whether WikiLeaks was witting or not in being the conduit through which we heard about the DNC e-mails that were leaked.

So we ended up with inconclusive conclusions on that admittedly crucial point. What Obama was saying is that U.S. intelligence did not knowor professed not to knowexactly how the alleged Russian transfer to WikiLeaks was supposedly made, whether through a third party, or cutout, and he muddied the waters by first saying it was a hack, and then a leak.

From the very outset, in the absence of any hard evidence, from NSA or from its foreign partners, of an Internet hack of the DNC emails, the claim that the Russians gave the DNC emails to WikiLeaks rested on thin gruel.

In November 2018 at a public forum, I asked Clapper to explain why President Obama still had serious doubts in late Jan. 2017, less than two weeks after Clapper and the other intelligence chiefs had thoroughly briefed the outgoing president about their high-confidence findings.

Clapper replied: I cannot explain what he [Obama] said or why. But I can tell you were, were pretty sure we know, or knew at the time, how WikiLeaks got those emails. Pretty sure?

Preferring CrowdStrike; Splaining to Congress

Comey briefs Obama, June 2016 (Flickr)

CrowdStrike already had a tarnished reputation for credibility when the DNC and Clinton campaign chose it to do work the FBI should have been doing to investigate how the DNC emails got to WikiLeaks. It had asserted that Russians hacked into a Ukrainian artillery app, resulting in heavy losses of howitzers in Ukraines struggle with separatists supported by Russia. A Voice of America report explained why CrowdStrike was forced to retract that claim.

Why did FBI Director James Comey not simply insist on access to the DNC computers? Surely he could have gotten the appropriate authorization. In early January 2017, reacting to media reports that the FBI never asked for access, Comey told the Senate Intelligence Committee there were multiple requests at different levels for access to the DNC servers.

Ultimately what was agreed to is the private company would share with us what they saw, he said. Comey described CrowdStrike as a highly respected cybersecurity company.

Asked by committee Chairman Richard Burr (R-NC) whether direct access to the servers and devices would have helped the FBI in their investigation, Comey said it would have. Our forensics folks would always prefer to get access to the original device or server thats involved, so its the best evidence, he said.

Five months later, after Comey had been fired, Burr gave him a Mulligan in the form of a few kid-gloves, clearly well-rehearsed, questions:

BURR: And the FBI, in this case, unlike other cases that you might investigate did you ever have access to the actual hardware that was hacked? Or did you have to rely on a third party to provide you the data that they had collected?

COMEY: In the case of the DNC, we did not have access to the devices themselves. We got relevant forensic information from a private party, a high-class entity, that had done the work. But we didnt get direct access.

BURR: But no content?

COMEY: Correct.

BURR: Isnt content an important part of the forensics from a counterintelligence standpoint?

COMEY: It is, although what was briefed to me by my folks the people who were my folks at the time is that they had gotten the information from the private party that they needed to understand the intrusion by the spring of 2016.

In June last year it was revealed that CrowdStrike never produced an un-redacted or final forensic report for the government because the FBI never required it to, according to the Justice Department.

By any normal standard, former FBI Director Comey would now be in serious legal trouble, as should Clapper, former CIA Director John Brennan, et al. Additional evidence of FBI misconduct under Comey seems to surface every week whether the abuses of FISA, misconduct in the case against Gen. Michael Flynn, or misleading everyone about Russian hacking of the DNC. If I were attorney general, I would declare Comey a flight risk and take his passport. And I would do the same with Clapper and Brennan.

Schiff: Every ConfidenceBut No Evidence

Both pillars of Russiagatecollusion and a Russian hackhave now fairly crumbled.

Thursdays disclosure of testimony before the House Intelligence Committee shows Chairman Adam Schiff lied not only about Trump-Putin collusion, [which the Mueller report failed to prove and whose allegations were based on DNC and Clinton-financed opposition research] but also about the even more basic issue of Russian hacking of the DNC.

[See:The Democratic Money Behind Russia-gate republished today.]

Five days after Trump took office, I had an opportunity to confront Schiff personally about evidence that Russia hacked the DNC emails. He had repeatedly given that canard the patina of flat fact during an address at the old Hillary Clinton/John Podesta think tank, The Center for American Progress Action Fund.

Fortunately, the cameras were still on when I approached Schiff during the Q&A: You have every confidence but no evidence, is that right? I asked him. His answer was a harbinger of things to come. This video clip may be worth the four minutes needed to watch it.

Schiff and his partners in crime will be in for much tougher treatment if Trump allows Attorney General Barr and U.S. Attorney John Durham to bring their investigation into the origins of Russia-gate to a timely conclusion. Barrs dismissal on Thursday of charges against Flynn, after released FBI documents revealed that a perjury trap was set for him to keep Russiagate going, may be a sign of things to come.

Given the timid way Trump has typically bowed to intelligence and law enforcement officials, including those who supposedly report to him, however, one might rather expect that, after a lot of bluster, he will let the too-big-to-imprison ones off the hook. The issues are now drawn; the evidence is copious; will the Deep State, nevertheless, be able to prevail this time?

Ray McGovern works with Tell the Word, a publishing ministry of the ecumenical Church of the Saviour in inner-city Washington. A former CIA analyst, his retirement he co-founded Veteran Intelligence Professionals for Sanity.

Please DonatetoCNs 25thAnniversary Spring Fund DriveThank You

See the rest here:
RAY McGOVERN: New House Documents Sow Further Doubt That Russia Hacked the DNC - Consortium News

From the frying pan into the fire. The torture that awaits Julian Assange in the US. – The Canary

WikiLeaks founder Julian Assange is currently held in Belmarsh prison awaiting hearings that could see him extradited to the US to face prosecution for alleged espionage-related offences.

Award-winning US journalist Chris Hedges described the torture that would await Assange in the US prison system, adding they will attempt to psychologically destroy him. If extradited, Assange would likely be detained in accordance with Special Administrative Measures (SAMs). One report equates this to a regime of sensory deprivation and social isolation that may amount to torture.

US journalist Chris Hedges spoke about the treatment Assange is likely to receive in the US. He argues that the US authorities will psychologically destroy him and that conditions imposed could see him turned into a zombie to face life without parole:

Australian journalist John Pilger agrees:

If Julian is extradited to the US, a darkness awaits him. Hell be subjected to a prison regime called special administrative measures He will be placed in a cage in the bowels of a supermax prison, a hellhole. He will be cut off from all contact with the rest of humanity.

Assange is already in a precarious position, alongside all other UK prisoners. Belmarsh is a high-security Category A facility and, as with all other prisons in the UK, inmates there are at risk to infection from coronavirus (Covid-19).

On 28 April, the BBC reported that there were 1,783 possible/probable cases of coronavirus on top of 304 confirmed infections across jails in England and Wales. Also that there were 75 different custodial institutions, with 35 inmates treated in hospital and 15 deaths.

Vaughan Smith, who stood bail for Assange, reported that the virus was ripping through Belmarsh:

We know of two Covid-19 deaths in Belmarsh so far, though the Department of Justice have admitted to only one death. Julian told me that there have been more and that the virus is ripping through the prison.

Assange has a known chronic lung condition, which could lead to death should he become infected with coronavirus. Assanges lawyers requested he is released on bail to avoid succumbing to the virus, but that request was rejected.

As for the psychological effects of segregation, a European Committee for the Prevention of Torture and Inhuman or Degrading Treatment or Punishment report argued that it can can have an extremely damaging effect on the mental, somatic and social health of those concerned.

Its likely that Assange will be placed under SAMs if he is extradited to the US. The Darkest Corner, a report authored by the Allard K. Lowenstein International Human Rights Clinic and The Center for Constitutional Rights, describes how SAMs work.

In its summary, the report explains that:

SAMs are the darkest corner of the U.S. federal prison system, combining the brutality and isolation of maximum security units with additional restrictions that deny individuals almost any connection to the human world. Those restrictions include gag orders on prisoners, their family members, and their attorneys, effectively shielding this extreme use of government power from public view.

It continues:

SAMs deny prisoners the narrow avenues of indirect communication through sink drains or air vents available to prisoners in solitary confinement. They prohibit social contact with anyone except for a few immediate family members, and heavily regulate even those contacts. And they further prohibit prisoners from connecting to the social world via current media and news, limiting prisoners access to information to outdated, government-approved materials. Even a prisoners communications with his lawyer which are supposed to be protected by attorney-client privilege can be subject to monitoring by the FBI.

It ominously adds that: Many prisoners remain under these conditions indefinitely, for years or in some cases even decades. Moreover, these conditions can be used as a weapon to force a prisoner to plead guilty:

In numerous cases, the Attorney General recommends lifting SAMs after the defendant pleads guilty. This practice erodes defendants presumption of innocence and serves as a tool to coerce them into cooperating with the government and pleading guilty.

The report provides further details on how SAMs incorporate sensory deprivation and social isolation measures that may amount to torture. Also, it argues that the SAMs regime contravenes both US and international laws.

Should the UK courts agree to extradite Assange, he could face months, if not decades, of psychological torture. However, Article 3 of the European Court of Human Rights states clearly: No one shall be subjected to torture or to inhuman or degrading treatment or punishment. Under that article, the US extradition request should be rejected by the UK courts.

For a publisher to be subjected to such a nightmare scenario would be intolerable.

Featured image via Mohamed Elmaazi

See the original post here:
From the frying pan into the fire. The torture that awaits Julian Assange in the US. - The Canary

Trump Was Never on a Glide Path to Re-Election Even Before the Virus – Washington Monthly

The Washington Post reports that Donald Trump is despondent these days. But not over the death, illness and economic calamity as a responsible, empathetic leader would be. Rather, hes upset over his supposedly declining electoral fortunes:

Some of Trumps advisers described the president as glum and shell-shocked by his declining popularity. In private conversations, he has struggled to process how his fortunes suddenly changed from believing he was on a glide path to reelection to realizing that he is losing to the likely Democratic nominee, former vice presidentJoe Biden, in virtually every poll, including his own campaigns internal surveys, advisers said. He also has been fretting about the possibility that a bad outbreak of the virus this fall could damage his standing in the November election, said the advisers, who along with other aides and allies requested anonymity to discuss internal deliberations.

The president is also eager to resume political travel in June, including holding his signature rallies by the end of the summer in areas where there are few cases, advisers said. Trumps political team has begun discussions about organizing a high-dollar, in-person fundraiser next month, as well as preliminary planning about staging rallies and what sort of screenings might be necessary, according to Republican National Committee officials and outsider advisers. One option being considered is holding rallies outdoors, rather than in enclosed arenas, a senior administration official said.

These two short paragraphs illustrate the cloud of delusion under which Trump operates.

First, there are no areas where there are few cases. Not only is COVID-19 running rampant in rural areas, and not only would it take only a few asymptomatic contagious individuals to infect dozens or even hundreds of other rallygoers, it would literally be nearly impossible given the dearth of testing to know whether an area had few cases or not. Second, given the fact that 72 people were infected likely after attending an anti-social-distancing gathering in Wisconsin, it seems highly unlikely that holding a rally outdoors will make much of a difference in terms of the safety of the attendees.

But even from the limited point of view of Trumps personal electoral self-interest, his perspective is grounded more in wishful narcissism than fact.

Trump was not, in fact, on a glide path to re-election prior to the arrival of the virus. Joe Biden has been leading Trump by the same wide margin since this time last year. If anything, Bidens average margin hasshrunk in recent polls as Trump briefly enjoyed a sympathetic bounce due to the crisis. Sanders also dominated Trump over the same year-long period by a slightly smaller margin, and Warren held a consistent, slim lead as well.

Of course, Hillary Clinton led by significant margins throughout the 2016 only to lose in the electoral college at the very end. But there were a number of unique factors in that election from Clintons negative favorability rating to the Russian hacking and release of her campaign emails via Wikileaks, to the final intervention by James Comey. Nor are Democrats likely to make the same mistake in overlooking electoral realignment trends and mistaking where the real swing states lay as they did in 2016, or to be complacent in the face of Trump.

Meanwhile, Democrats dominated Republicans in the 2018 midterms and in most special elections since then.

So there is little reason outside of unearned confidence for Trump to believe he had a clear path to victory. In fact, fear of Biden is why Trump attempted the Ukrainian coercion scheme that led to his impeachment.

If Trump does lose in November, he will certainly claim election fraud and a number of other conspiraciesbut insofar as he strays away from conspiracies he will likely blame the virus. But theres no reason to believe he would have won, regardless. Only the same narcissism and wishful thinking that permeates the rest of his worldview.

Read the original post:
Trump Was Never on a Glide Path to Re-Election Even Before the Virus - Washington Monthly

‘Enemies of the State’ Review – Hollywood Reporter

MOVIES

6:30 PM PDT 5/6/2020bySheri Linden

Befitting a documentary executive produced by Errol Morris, Enemies of the State is polished, assured and chilling. But as director Sonia Kennebeck traces a tale of hacker culture, government surveillance and extreme family loyalty, the smooth surface buckles. Paranoia and unreliable narrators begin to dominate the disquieting mix, and the viewer starts to question how and why the story is being told. That uncertainty is the film's primary, illuminating strength, exposing built-in biases (ours as well as those of onscreen figures) and underscoring the dangerous internet-age velocity with which one person's conspiracy charges can turn into a seemingly righteous cause.

The cause in this twisting, decade-long series of events is that of Matt DeHart, celebrated by some complete with fundraising merch as a whistleblower in the good fight against covert, anti-free-speech government activity. A digital native with definite ties to gaming and vaguely delineated connections to hacktivist collective Anonymous and WikiLeaks, DeHart claimed that the FBI framed him, harassed his family and tortured him in pursuit of classified information that crossed his screen when he ran a darknet server. After law enforcement ransacked the Indiana home where he lived with his parents, DeHart said they were looking for top-secret files relating to a shocking CIA operation; the authorities said they were looking for child pornography.

Leann and Paul DeHart, with their down-home embrace of God and country, are not people you'd expect to slip across the border under cover of night, as they did in April 2013 with their son, seeking asylum in Canada. Paul is a minister, and they're both veterans of military intelligence. So too is Matt, although his career was curtailed by mental health issues. The couple speak openly to the filmmaker, distraught over their son's treatment at the hands of authorities and stressing the need to watch the watchers. They believe Matt unequivocally. "We raised him to think critically," says Paul, who once drove his son to the Russian and Venezuelan embassies in Washington so that he could try to defect.

A crucial thumb drive goes missing, and only some of the troubling aspects of DeHart's case are substantiated, but given an already well-documented history of government abuses and dirty tactics against activists, his complaints draw the alarmed interest of experts, a number of whom appear in the film. They include a McGill professor, an investigative reporter, and a fascinating assortment of attorneys who run the gamut in terms of point of view.

Kennebeck talks briefly, and revealingly, to old friends of DeHart, some from his school days. Several of them try to put an amusing, benign slant on his behavior one compares him to Leave It to Beaver troublemaker Eddie Haskell but the picture that emerges is a disturbing one: telling glimpses of a self-dramatizing manipulator, lending further fuel to the "who to believe" fire.

Nagging questions percolate as the doc moves back and forth through the timeline: Are the national security case and the child porn case parallel or connected? Focusing at first on the espionage angle, Enemies of the State seems for a while to push aside the pornography charges as pure fabrication, as do the DeHarts. In Tennessee, yet another location in this multi-state, international saga, a prosecutor and a detective remain quietly unshakable in their conviction that Matt DeHart is a predatory pedophile.

In addition to the film's new interviews and footage of the family, Kennebeck stages re-creations of key events, in particular legal hearings on both sides of the border that use actual audio: The actors' lips move, convincingly, but the voices we hear belong to their real-life counterparts. Much of the new material is cast in a frosty blue palette that emphasizes the institutional layers of bureaucracy and stealth.

In her 2016 drone-warfare documentary, National Bird, Kennebeck chronicled whistleblowers; here her central protagonist lodges complaints that relate chiefly to his personal treatment and only in the broadest sense to a larger political picture. Pitting the heavy cloak of government secrecy against the openness of a mother and father, Enemies of the Statecertainly doesn't answer every question it poses, but it's a wake-up call for all of us keep asking them of government, of public figures, and of ourselves.

Production companies: Codebreaker FilmsDirector: Sonia KennebeckProducers: Ines Hofmann Kanna, Sonia KennebeckExecutive producer: Errol MorrisDirector of photography: Torsten LappEditor: Maxine GoedickeComposer: Insa RudolphCasting directors: Erica Hart, Maren PoitrasVenue: Tribeca Film Festival (Documentary Competition)Sales: Submarine

104 minutes

View original post here:
'Enemies of the State' Review - Hollywood Reporter

Assange’s US extradition, Threat to Future of Internet and Democracy – CounterPunch

Drawing by Nathaniel St. Clair

On Monday May 4, the British Court decided that the extradition hearing for WikiLeaks publisher Julian Assange, scheduled for May 18, would be moved to September. This four month delay was made after Assanges defense lawyer argued the difficulty of his receiving a fair hearing due to restrictions posed by the Covid-19 lockdown. Mondays hearing at Westminster Magistrates Court proceeded without enabling the phone link for press and observers waiting on the line, and without Assange who was not well enough to appear via videolink.

Sunday May 3rd marked World Press Freedom Day. As people around the globe celebrated with online debates and workshops, Assange was being held on remand in Londons Belmarsh prison for publishing classified documents which exposed US war crimes in Iraq and Afghanistan. On this day, annually observed by the United Nations to remind the governments of the importance of free press, Amnesty International renewed its call for the US to drop the charges against this imprisoned journalist.

The US case to extradite Assange is one of the most important press freedom cases of this century. The indictment against him under the Espionage Act is an unprecedented attack on journalism. This is a war on free speech that has escalated in recent years turning the Internet into a battleground.

Privatized censorship

While he was living in the Ecuadorian embassy in London, after being granted asylum in 2012, Assange alerted the public about the oppressive force that is now threatening press freedom around the world. In a statement that was read during the Organizing Resistance to Internet Censorship webinar in January 2018, Assange noted how multinational tech companies like Google and Facebook have evolved into powerful digital superstates. He warned that undetectable mass social influence powered by artificial intelligence is an existential threat to humanity.

Most who care about digital rights are well aware that tech giants like Google and Facebook have long been embroiled with Washington halls of power. Mark Zuckerberg, co-founder, chairman and CEO of Facebook has been candid about his pro-censorship stance. In his 2019 Washington Post op-ed Zuckerberg shared his belief that Facebook, the worlds largest social networking site with more than 800 million users, should take an active role to control content for governments.

In When Google Met WikiLeaks, published in 2014, Assange exposed the way Google executives used revolving doors within the US State Department, and highlighted their close ties to US intelligence agencies like the NSA. Googles internal research presentation, leaked to Breitbart News from the companys employees in 2018, revealed government requests for censorship have tripled since 2016. An 85-page briefing entitled The Good Censor concluded that the multinational search giant needs to move toward censorship if it wishes to continue to receive the support of national governments and continue its global expansion.

Google has been accused of discriminating against conservative viewpoints and suppressing free speech. YouTube, one of Googles subsidiaries, is now censoring the WikiLeaks Collateral Murder video. Real images of war that exposed the US militarys brutal killing of innocent Iraq civilians, including two Reuters journalists, is now assigned to the inappropriate for some users category, severely compromising its viewership. Meanwhile, the many millions of YouTube videos, of which tens of thousands depict violence, are allowed to be played without restriction.

Big Techs fight against misinformation

Now, amidst the ongoing Covid-19 pandemic, this privatized censorship via a monopoly on information became more overt and even normalized. On March 11, after the White House asked Big Tech for help in fighting the spread of false information about Covid-19, top tech industry players including Facebook, Google, LinkedIn, Microsoft, and Twitter and Reddit issued a joint statement on their collaborative efforts to battle against disinformation on their platforms.

As measures to quell the spread of inaccurate information and harmful content, Facebook implemented a new policy to direct users who have interacted with posts that contain harmful coronavirus misinformation to a myth busters page, maintained by the World Health Organization (WHO). In setting forth this companys new aggressive move to counter misinformation about Covid-19, Guy Rosen, Facebooks vice-president of integrity commented in a blogpost:

We want to connect people who may have interacted with harmful misinformation about the virus with the truth from authoritative sources in case they see or hear these claims again off of Facebook.

Google CEO Sundar Pichai also announced that the company is partnering with the US government in developing a website to educate about COVID-19 and provide resources nationwide. The blog post indicated that the multinational search giant would work under the guidance of the WHO and the Centers for Disease Control (CDC).

Silencing the voices of dissent

Since it declared a global pandemic on March 11, 2020, the World Health Organization positioned itself as a source of legitimacy, setting guidelines and recommendations to direct a worldwide response to Covid-19. Narratives put forward by this Geneva-based global health body began to rapidly shape the scenery of our everyday life.

Images of emergency rooms filled with those who are infected with novel coronavirus have quickly flooded into American homes through major cable news networks. With a daily report of death count increasing everyday, fear began to spread around the world. As doctors and nurses at the frontline fight to save the lives of victims in what has now become the War on Covid-19, views that challenge the mainstream discourse on the pandemic have emerged on the Internet. Physicians who disagree with the expert opinion of WHO on the transmission of Covid-19, efficacy of its treatment and/or management of the outbreak began speaking out.

Recently a call by two Californian doctors to reopen the economy and to examine the death rate of Covid-19 and justification of lockdown, created a wide sensation, attracting both support and criticism. A news conference held by Dr. Daniel W. Erickson and Dr. Artin Massih, co-owners of Accelerated Urgent Care in Bakersfield, was livestreamed by local television stations. When the online video went viral, being viewed millions of times, YouTube pulled the plug, stating that the doctors were disputing local health authority guidance.

In the first week of May, David Icke, the former football player and author of more than 20 books, got deplatformed from Facebook and Google for posting content that questioned the motives of WHO and countered the official narratives on the threat of Covid-19. In deleting his account, YouTube stated that the 68 year old UK citizen, often labeled a professional conspiracy theorist, violated their Community Guidelines on sharing information about coronavirus. Prior to deleting his account, a video of an interview of him by London Real was deleted. That video, discussing misdiagnosis and misclassification of death and economic consequences of the lockdown, is reported to have been viewed over 30 million times.

The disciplinary actions of these digital mega corporations against those who dont conform to the edicts of the designated health authority resemble the censorship of authoritarian states such as China. In a name of public safety, efforts to widen discourse and open up a democratic debate were uniformly shut down across major media platforms. This contravention of First Amendment principles does not stop with restriction of the freedom of speech. It also abridges the right of the people to peaceably assemble, prohibiting political dissent. Facebook has now confirmed that the company, after consulting with state governments, is banning promotions for protests that violate social distancing rules.

CIAs cyber-warfare

A little over a year before his arrest inside the embassy, Assange gave a dire warning: The future of humanity is the struggle between humans that control machines and machines that control humans. In this digital age, a battle for free speech is not fought on the political ground alone with legislators, corporate lobbyists, senators and presidents. Civil liberties are being eroded by an algorithmic control dictated by the Silicon Valley tech titans. They use AI in ways that act beneath conscious awareness, manipulating reality at a speed and level that humans can no longer keep up with, to control perception.

Now, the machines seem to be out of control, fueling cyber-warfare. In 2017, WikiLeaks released the largest publication of confidential documents, code-named Vault 7, sourced from the top-secret security network at the Cyber Intelligence Center. This release revealed that the CIA had lost control of the cyber-weapons it had developed.

What is alarming is that the CIA became aware of this loss but didnt warn the public about it. Now, this horrific arsenal that was designed to hide all traces of its own actions, is loosed upon the world and can be used for malicious purposes by cyber-mafias, foreign agents, hackers, and anyone else who eventually got their hands on it.

The CIAs covert hacking program and their weaponized exploits target a wide range of U.S. and European company products. The series of documents and files categorized in Year Zero revealed the specific CIA malware that grants the agency capacity to penetrate Googles Android phone and Apples iPhone software the very software that runs (or has run) presidential Twitter accounts and to avoid or manipulate fingerprints in any subsequent forensic review. An example of the abuse of this power is found in evidence of CIA espionage, targeting French political parties and candidates in the lead up to the 2012 presidential election.

Rage against the machine

The Framers of the US Constitution believed there is a seed of corruption inherent in humans. This is why Thomas Jefferson, the principal author of Americas founding document, emphasized the vital role of a free press in keeping government power in check. He said that if he had to choose between a government without newspapers or newspapers without a government, I should not hesitate a moment to prefer the latter.

Although the social and political landscape has significantly changed since his time, fundamentals of democracy have not changed. As our society quickly moves into a 1984 Orwellian technological dystopia, Jeffersons words that alarmed a nation back then should sound more loudly now. If people care about democracy, a healthy distrust of the government must be restored, awakening moral courage to ignite our rage against the machine.

Through his work with WikiLeaks, Assange aimed to hold people who run the machine to account. As a project of free software, he created an exemplar of scientific journalism on the platform of the Internet. It provided ordinary people with a formidable tool that can help them take back their power to control the machine and end its hostile takeover of society.

The whistleblower behind WikiLeaks publication of Vault 7 (allegedly Joshua Schulte, still held in custody in New York) disclosed CIA documents in an effort to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons. In releasing the material, Assange, as editor in chief of WikiLeaks, responded to his sources call for peacemaking, by affirming the organizations role as a neutral digital Switzerland for people all over the world, to provide protection against nation-states and cyber attacks.

After the whistleblowing site carefully redacted the actual codes of CIA hacking tools, anonymized names, and email addresses that were targeted, it contacted Apple, Microsoft, Google, Mozilla, and MicroTik, stating that WikiLeaks would work with tech companies by giving them exclusive access to appropriate material so they could help create a possible antidote to the CIAs breach of security and offer countermeasures.

Existential threat to democracy

For these efforts to end the military occupation of cyberspace, Assange is now being aggressively pursued by the Trump administration. At the time when WikiLeaks released a massive trove of documents that detailed the CIA hacking tools, Vice President Mike Pence vowed to use the full force of the law to hunt down those who released the Intelligence Agencys secret material. Calling WikiLeaks a non-state hostile intelligence service that needs to be shut down, Secretary of State and former CIA director Mike Pompeo has taken on and expanded Obamas war on whistleblowers to attack the publisher.

John Kiriakou, who became the first CIA officer to give evidence of the use of torture, repeatedly said that if Assange were extradited, he would receive no fair trial. The CIA whistleblower, who was jailed for calling this torture unconstitutional, noted that in the Eastern District of Virginia where Assange was charged, juries are made up of people from the CIA, the FBI, the Pentagon, the department of Homeland security and intelligence community contractors or their family members and that no national security defendant has ever won a case there.

In his fight against extradition to the US, where he faces 175 years in prison and being subjected to harsh conditions under Special Administrative Measures, Assange is rendered defenseless. He is in effective solitary confinement, being psychologically tortured inside Londons maximum-security prison. With the British governments refusal to release him temporarily into home detention, despite his deteriorating health and weak lung condition developed as consequences of long detention, Assange is now put at risk of contracting coronavirus. This threatens his life.

Now, as the world stands still and becomes silent in our collective self-quarantine, Assanges words spoken years ago in defense of a free internet call for our attention from behind the walls of Belmarsh prison:

Nuclear war, climate change or global pandemics are existential threats that we can work through with discussion and thought. Discourse is humanitys immune system for existential threats. Diseases that infect the immune system are usually fatal. In this case, at a planetary scale.

Prosecution of WikiLeaks is an attack on the free press that is supposed to promote the discourse necessary to maintain the health of our society. A potential US extradition of Assange poses existential threats to democracy. We must fight to stop it, for without each individuals ability to speak freely, the tyranny of the authoritarian technocracy will become inevitable. It will be the extinction of free human beings everywhere in the world.

View original post here:
Assange's US extradition, Threat to Future of Internet and Democracy - CounterPunch

Help Us Cover the Julian Assange Story – Consortium News

With corporate TV and press abandoning the imprisoned WikiLeaks publisher, Consortium News has been in the forefront among alternative media in chronicling his plight. But we cant do it without you.

Assange outside UK Supreme Court in 2011. (Flickr)

Except for a brief moment after his dramatic arrest, the mainstream media has abandoned Julian Assange. They do this at their own peril.

Thats because the arrest and espionage indictment of Assange for practicing journalism is a danger to all journalists everywhere.

Consortium News started covering the Assange case on Dec. 16, 2010 with an article by founding editor Robert Parry, one of the leading investigative reporters of his generation. Bob argued that Assange was practicing journalism in the exact way that he did. He wrote:

the process for reporters obtaining classified information about crimes of state most often involves a journalist persuading some government official to break the law either by turning over classified documents or at least by talking about the secret information. There is almost always some level of conspiracy between reporter and source.

Though some elements of this suspected Assange-Manning collaboration may be technically unique because of the Internets role and that may be a relief to more traditional news organizations like the Times which has published some of the WikiLeaks documents the underlying reality is that what WikiLeaks has done is essentially the same wine of investigative journalism in a new bottle of the Internet.

By shunning WikiLeaks as some deviant journalistic hybrid, mainstream U.S. news outlets may breathe easier now but may find themselves caught up in a new legal precedent that could be applied to them later.

Since that first article, Consortium News has published more than 200 articles and 57 videos on Assange and WikiLeaks, 205 of the articles and all of the videos coming in the past two years alone. Thats because this website has recognized the historic importance of the case against Assange, which has justly been compared to the trials of John Peter Zenger and Alfred Dreyfus.

Our Assange coverage has not just scratched the surface, but has dug deeply into the meaning of the case, legally, politically and historically. We are committed to continuing this in-depth coverage of Assanges ongoing extradition ordeal at the hands of the Trump administration.

But we cant do it alone. You have an immense role to play as readers and viewers, our only source of support. Please join our team, or reaffirm your commitment to it, with a generous donation today to our 25th Anniversary Spring Fund Drive.

Here (in reverse chronological order) is the full archive of CNs stories on WikiLeaks and Assange. There are more than 200 articles on Assange in the past two years. CN Live! has produced 57 videos on the WikiLeaks publisher.

PleaseDonate Today

More:
Help Us Cover the Julian Assange Story - Consortium News

FBI Got Everything It Asked for in DNC Investigation, Refuting ‘Missing Server’ Myth – Defense One

New transcripts released by the House intelligence committee shed light on Russias interference in 2016 election.

I would like you to do us a favor, though, President Donald Trump told his Ukranian counterpart in the infamous July 2019 phone conversation that led to his impeachment. Because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike The server, they say Ukraine hasit.

Trump was only the latest to perpetuate a myth surrounding Russian hackers 2016 theft of emails from the Democratic National Committee: that the theft was an inside job, that a server mysteriously disappeared in a purported coverup. In fact, all available evidence says the theft was carried out by two groups allegedly connected to Moscows intelligence agencies: APT-28 and APT-29, aka Fancy Bear and CozyBear.

The pile of evidence grew deeper on Thursday evening, when the House Permanent Select Committee on Intelligence released more than 50 transcripts of FBI interviews conducted in 2017 and 208 under Robert Muellers investigation into Russias meddling in the 2016 election. One in particular stands out.

The interview with Yared Tamene Wolde Yohannes, who ran the DNCs IT in 2015 and 2016, reveals a few important facts. It confirms that the FBI knew that at least one Russian actor, Cozy Bear, had penetrated the DNC network by the fall of 2015 and, Yohannes suggests, possibly as far back as July. It also reveals that the FBI wasnt direct or forthcoming with DNC about what they were seeing. They asked for information without telling the DNC who really was afterthem.

Subscribe

Receive daily email updates:

Subscribe to the Defense One daily.

Be the first to receive updates.

I would say that the information that the FBI was providing, honestly, was frustrating in how redacted it was, Yohannes complains. He said the FBI agent who told him about the intrusion didnt say Russian state-sponsored actor. He said Russians in general. The FBI didnt even hand over data that could have helped Yohannes secure his network like timestamped screenshots of documents or emails or network logs until February2016.

The DNC only learned that the Russian government was targeting them in the spring of 2016, from Crowdstrike, a cybersecuritycompany.

The transcript also reveals that the DNC gave the FBI everything it asked for: roughly 15 gigabytes of server logs and related metadata showing intrusionactivity.

We eventually delivered those logs. I think the actual date that we were able to get it to the FBI was 10 days later. So like April 29, I think, was the date that we actually sent them the logs. And the FBI agent confirmed receipt by sending me a text message saying: You know, thank you for sending that. Thats great, very helpful. Ill let you know what we find, Yohannes says in thetranscript

Yohannes concludes the interview with a wish that the FBI would have shared more about what it knew was happening to theDNC.

What I would like to seeis better sharing of information at the declassified level, I mean, they do that already. They have websites, they have maybe even seminars, that kind of stuff. But these are not readily available, easily digestible, well-marketed. I would love to see, you know, a small organization like the DNC, which has a really big profile but its a really small nonprofit organization, can use that kind of assistance from the U.S. intelligence community and others, potentially, right? Yeah, so I would love to see that kind ofthing.

The transcript confirms what others have reported via anonymous sources: that the U.S. intelligence community was well aware that Russians had penetrated DNC networks longbefore the group knew it had beencompromised.

The emails were dumped to Wikileaks in the summer and fall of 2016. The IC might have announced then that the thieves were Russian, and that the theft was part of a coordinated effort to sway the upcoming election. Instead, the IC made its first formal statement on the matter on Oct. 7. That delay allowed someone to sow doubt in the publics mind about what really happened, doubt that persiststoday.

In some ways, the intelligence community appears to have learned from this failure. In July 2018, the NSA formed a group to disrupt Russian active measures aimed at the UnitedStates.

But other signs show that the Intelligence community is still not forthcoming about the attacks that the country faces. Earlier this week, The U.S. Cybersecurity and Infrastructure Security Agency and UKs National Cyber Security Centre released a joint statement saying that powerful cybercriminals were targeting healthcare organizations amid the pandemic. But officials with both organizations rebuffed repeated requests to identify who those attackers were, showing that old habits, even unhelpful ones, are hard topurge.

Read more:
FBI Got Everything It Asked for in DNC Investigation, Refuting 'Missing Server' Myth - Defense One

Donald Trump’s defense of Michael Flynn and Roger Stone is a giant gaslight – The Media Hell

Donald Trump receives questions from journalists on April 30.Jim Loscalzo / CNP via ZUMA Wire

For much-needed reporting on the coronavirus crisis and more, subscribe to Mother Jones newsletters.

A full-fledged right-wing freakout in the announcement planned by the FBI for the hope that then-National Security Advisor Michael Flynn would lie in a January 2016 interview, was, inevitably, drawn to political operative Roger Stone. President Donald Trump on Thursday suggested he could forgive Flynn and Stone, who have each been found to have lied to federal investigators about the Russia Russia scandal.

What they did to Gen. Flynn, and by the way, to Roger Stone and others, was a disaster and a disgrace, and it should not be allowed to happen again in this country, Trump said when asked about forgiveness to Flynn.

(embedded) https://www.youtube.com/watch?v=6LTVOYYeZ60 (/ embedded)

Interestingly, Trump and his supporters, are not saying that Flynn and Stone are not lying to federal investigators. Instead they indicate that lying to investigators is not important.

Trump and his supporters begin on the premise that the Trump-Russia scandal is a fornication, a claim that has been initiated by the failure of special counsel Robert Mueller and congressional Democrats to prove a criminal conspiracy between Trump and Russia campaign. As a result, Tump and company say, investigations into their behavior are unfair, with any resulting product prosecution being overstated.

This is Trumps main gaslight. The lies of Flynn and Stone, and Trump himself, helped prevent investigators from finding out what really happened during the Trump and Russia campaign in 2016, benefiting Trumps first and foremost, who misrepresented so much that losses. In the pardon of Stone and Flynn, the president will reward them for that service, and will use the pandemonium and its mass of supporters to drown anyone who has noticed the con.

The argument that Flynn and Stone were railroads, long popular talking points on the right, came to light Wednesday, when the federal prosecutor in Flynns case revealed handwritten letters Bill Priestap, head of the FBIs counterintelligence, made before FBI agents in an interview with Flynn in the White House in January 2016. Agents know that Flynn spoke in December 2016 to Sergey Kislyak, the ambassador of Russia in the US, about sanctions imposed by President Barack Obama on Russia, is a clear violation of the Logan Act. Preistap wrote: What is our purpose? Truth / Admittance or for him to lie, so we can chase him or shoot him?

Those are material missteps in the investigation of Russian election interference.

While conservative pundits treat these records as smoking evidence that framed Flynn, legal experts say the FBIs tactics against Flynn are unusual. Federal agents often try to catch targets in situations where they will admit crimes or lies, which will open themselves up to prosecution. In a guilty plea, Flynn admitted to lying to FBI agents. (He also said under oath that he did not believe the FBI had entered him.) Flynns lawyers are trying to move his plea not to trespass, and also demand that the case be dismissed. The judge handling the case was not ruled on those requests.

Trump also confirms in Stones lawyers arguments that the self-described dirty cheater has been unfairly convicted because the DCs premier female judge in social media posts criticized Trump; the judge in the case denied this contention.

Stone and Flynns lies are part of a pattern. Muellers report, despite its oppressive conclusions, has undeniably revealed that the president and his advisers reacted to the declarations of Russias campaigns in perpetuity. Some lies are public: Trump claims there is no business in Russia. In fact, at the time his employees were looking for the Kremlin helped promote a Trump-branded project there. Trumps campaign spokesman Hope Hicks said in November 2016 that there was no communication between the campaign and any foreign entity during the campaign. Mueller mentioned more than 100 contacts by campaign in Russia alone.

Along with Stone and Flynn, former Trump attorney Michael Cohen and former Trump campaign aide George Papadopoulos went to jail for lying to federal agents or lawmakers. Former Trump campaign aide Rick Gates and campaign chairman Paul Manafort have been found lying to investigators, among other crimes. The Justice Department said in February that it was looking into whether Erik Prince, the founder of Blackwater and Trumps campaign adviser, had lied to the House Intelligence testimony in the 2017 testimony.

Reliable Trump boosters like Sen. Lindsey Graham (RS.C.), Rush Limbaugh, and Alan Dershowitz laughed at the perjury charges as a process of crime, suggesting they were charges brought by prosecutors because they couldnt find more serious thing. However, Mueller and prosecutors have repeatedly said that the Trump associates falsity is detrimental to their efforts. The investigation established that many individuals associated with the Trump Campaign lied to the Office, and to Congress, about their contact with Russia-related individuals and related matters, Mueller wrote. Those are material missteps in the investigation of Russian election interference.

Trump has no passive observer. He actively encouraged the organizations stonewall Mueller and Congress, hoping for forgiveness for those who refused to cooperate. Muellers report examined 10 instances in which Trump could have interfered with justice to interrupt the investigation. That includes Trumps pressure on former-FBI James Comey to stop investigating Flynn in 2017. And one of Trumps lawyers, John Dowd, left Flynns attorney in late 2017 suggesting that Trump would have supported Flynn if he had not been given evidence by prosecutors about Trump. (Dowd denies that this is an explicit offer of a pardon in exchange for silence.)

Trump himself declined to be interviewed by Mueller. And as reported by Mother Jones, the president appears to have lied to the written answers he gave Mueller in which he claimed to miss Stones 2016 communications about WikiLeaks. Stones trial testimony by Gates and former Trump campaign chairman Steve Bannon revealed that Trump spoke during a campaign with Stone about WikiLeaks, and campaign officials viewed Stone as a conduit to WikiLeaks.

Flynn and Stones attorneys argued that because prosecutors did not prove that their clients had conspired with Russia, their lies to investigators should be set aside. So most of this case has to do with the question: So what? Stone attorney Bruce Rogow said in his closing comments on Stones trial. Prosecutors and judges in those cases have repeatedly denied those claims.

Federal District Court Judge Amy Berman Jackson, at Stones sentencing, spoke at length on Stones dishonesty, saying he had stopped a key part of the Russia House investigation. His pride in his own lies is a threat to our most fundamental institutions, he said, to the very foundation of our democracy.

He was not accused, as some have complained, for standing up for the president, Jackson said. He has been accused of disguise for president.

The rest is here:
Donald Trump's defense of Michael Flynn and Roger Stone is a giant gaslight - The Media Hell