Archive

Archive for the ‘Uncategorized’ Category

The Open Secret of Foreign Lobbying

Russia-gate has focused attention on requirements for US citizens acting as “foreign agents” to register with the Justice Department, but these rules have been sporadically or selectively enforced for decades. First of a series.

by Jonathan Marshall

Consortium News (May 19 2017)

The alleged hacking of the Hillary Clinton campaign’s emails and the numerous contacts of Donald Trump’s circle with Russian officials, oligarchs and mobsters have triggered any number of investigations into Moscow’s alleged efforts to influence the 2016 election and the new administration. With US-Russian relations at their lowest point since the Cold War, however, it would be tough to argue that Moscow has achieved any leverage in Washington.

In contrast, as journalist Robert Parry recently noted {1}, American politicians and the media have been notably silent about other examples of foreign interference in US national politics. In part that’s because supporters of more successful foreign pressure groups have enough clout to downplay or deny their very existence {2}. In part, it’s also because America’s political system is so riddled with big money that jaded insiders rarely question the status quo of influence peddling by other nations.

That wasn’t the case a century ago. In the run-up to US entry into World War One, millions of Americans became wildly alarmed {3} by the potential influence of pro-German fifth columnists. The success of the Bolshevik revolution in 1917 shifted much of that paranoia toward the Soviet Union, prompting the infamous Red Scare {4}.

Two decades later, Americans again became troubled by the growing influence {5} of fascist and Communist propaganda in this country. In response, Congress in 1938 passed a law regulating “foreign agents” and requiring disclosure of their political and public relations activities and spending. Willful failure to register can be punished by up to five years in prison and a $10,000 fine.

Since the end of World War Two, however, enforcement of the Foreign Agents Registration Act (“FARA”) has been notably lax. Its effectiveness has been stymied by political resistance from lobby supporters as well as by the law’s many loopholes – including Justice Department’s admission {6} that FARA “does not authorize the government to inspect records of those not registered under the Act”.

A 2016 audit {7} by the inspector general of the Department of Justice determined {8} that half of FARA registrations and 62 percent of initial registrations were filed late, and fifteen percent of registrants simply stopped filing for periods of six months or more. It also determined that the Department of Justice brought only seven criminal cases under FARA from 1966 to 2015, and filed no civil injunctions since 1991.

“FARA is violated more or less daily in Washington and largely ignored by authorities unless it involves someone without political connections”, commented {9} Matt Taibbi of Rolling Stone. “An awful lot of important people in Washington who appear to be making fortunes lobbying for foreign countries are merely engaged in ‘litigation support’ if you ask them”.

In addition, foreign governments find it easy to circumvent the act by tactics such as investing in influential foreign policy think tanks {10} like the Atlantic Council, Brookings Institution, and Center for Strategic and International Studies – buying credibility for their views without full disclosure.

In a rare exception to normal practice, the Atlantic Council’s foreign ties briefly came under close scrutiny {11} in 2013, when its chairman, Chuck Hagel, was nominated to become President Obama’s Secretary of Defense. The Atlantic Council’s major funders include the United Arab Emirates and Bahrain, several Turkish entities, the Ukrainian World Congress, Kazakhstan, and several of the biggest US defense corporations. Yet good luck finding any such disclosures at the end of the many op-ed columns its staff publish in The Washington Post and other outlets on relevant issues of US foreign policy.

The combination of lax enforcement and tremendously high stakes – including billions of dollars in foreign aid, arms sales, and economic sanctions – has led to intense foreign lobbying in the United States, some of it financed with recycled US aid. But there’s nothing new about this trend.

Forty years ago, in their book The Power Peddlers: How Lobbyists Mold American’s Foreign Policy {12}, Russell Warren Howe and Sarah Hays Trott reported that “the foreign lobby network is a high growth industry, both in terms of numbers and cash; there are at least fifteen thousand persons already engaged in foreign lobby activity … in Washington – thirty for every Member of Congress.”

Despite the serious implications for US foreign policy and American democracy, such investigations of foreign lobbying have been few and far between. Perhaps the most far-reaching official probe was launched by Senate Foreign Relations Committee Chairman J William Fulbright in 1963, led by special counsel Walter Pincus, who went on to a long career as an investigative reporter at The Washington Post. Among other things, the hearings exposed the lucrative, secretive work of lobbyists for various Caribbean nations to jack up US purchases of their sugar exports at above-market prices. Their efforts put millions of dollars in the pockets of ruthless dictators like Rafael Trujillo of the Dominican Republic.

After Trujillo’s assassination in 1961, his former intelligence chief disclosed that Trujillo bought the votes of leading members of Congress for a bigger sugar quota with millions of dollars in bribes and the services of prostitutes. Those members of Congress went unprosecuted, but the Kennedy Justice Department nailed Hearst society columnist Igor Cassini – brother of the First Lady’s favorite dress designer – for acting as an unregistered agent of the Trujillo regime. Three years earlier, the head of the Mutual Broadcasting System pleaded no contest to charges of accepting $750,000 from Trujillo to act as another unregistered agent.

Unmasking the Pro-Israel Lobby

In 1962, the Justice Department also took rare aim at the pro-Israel lobby {13} by forcing the American Zionist Council (“AZC”), formed in 1949 as a tax-exempt umbrella of American Jewish groups, to register as a foreign agent. Weeks later, supporters did an end run by folding AZC and incorporating the American Israel Public Affairs Committee (“AIPAC”) to continue acting as a de facto lobby – but without Israeli money and without filing as a foreign agent.

The Fulbright committee did not drop the case, however. It subpoenaed records of the AZC and determined that it had been “ostensibly controlled by American citizens but had its budget approved in Jerusalem”. Over a period of eight years, the committee learned, AZC took more than $5 million {14} from the Jewish Agency, a semi-official arm of the Israeli government, to disseminate pro-Israeli propaganda in the United States.

Grant Smith, a pioneering researcher on the origins of the pro-Israel lobby, has asked {15} “what might be different today if AIPAC, in particular, had been properly registered under the Act”:

 

 

When AIPAC director Morris Amitay was caught red-handed mishandling classified missile secrets in 1975, he could have been prosecuted under FARA. When AIPAC and an Israeli diplomat purloined the entire 300-page book of classified trade secrets compiled from seventy US industry groups opposed to unilateral trade concessions for Israel in 1984, they could have been prosecuted for failing to report their clandestine subversion of due process. When in 2005 [AIPAC officials] Steven J Rosen and Keith Weissman met with Israeli diplomats during efforts to pass classified information to the press they thought could trigger a US attack on Iran, FARA consequences would have awaited them all.

However, because the US Department of Justice has unilaterally abrogated its responsibility to enforce FARA, people, ideas, money and propaganda campaigns continue to secretly slosh freely between Tel Aviv and Israeli fronts in America with taxpayer funds thrown into the toxic brew.

 

 

The issue of foreign agents and their role in US politics resurfaced as a major issue in 2016, with speculation about Russian connections to the Trump campaign and reports of possible FARA violations by Trump’s campaign manager and chief foreign policy adviser. The American people are long overdue for another Fulbright-style investigation into foreign lobbies and the adequacy of current enforcement measures. To highlight some of the critical issues at stake, Consortiumnews.com over the next few days will publish a series of articles on some of the workings of lobbyists, pressure groups, and agents working on behalf of Taiwan, Israel, Saudi Arabia, Turkey, and Ukraine.

Next: The China Lobby

Links:

{1} https://consortiumnews.com/2017/04/20/why-not-a-probe-of-israel-gate/

{2} https://www.amazon.com/Deadliest-Lies-Israel-Jewish-Control/dp/1403984921

{3} https://en.wikipedia.org/wiki/American_Protective_League

{4} https://en.wikipedia.org/wiki/First_Red_Scare

{5} http://kleptocracyinitiative.org/2017/01/reforming-foreign-agents/

{6} https://sunlightfoundation.com/2016/08/25/foreign-influence-in-america-a-brief-explainer-on-fara/

{7} https://oig.justice.gov/press/2016/2016-09-07.pdf

{8} https://sunlightfoundation.com/2016/09/09/report-finds-delays-and-delinquencies-in-foreign-lobbying-disclosure/

{9} http://www.rollingstone.com/politics/features/taibbi-how-did-russiagate-start-w482262

{10} https://www.nytimes.com/2014/09/07/us/politics/foreign-powers-buy-influence-at-think-tanks.html

{11} https://newrepublic.com/article/112398/chuck-hagels-atlantic-council-foreign-donors-and-independence

{12} https://books.google.com/books/about/The_power_peddlers.html?id=a2aPAAAAMAAJ

{13} http://antiwar.com/blog/2013/03/21/1963-the-year-the-israel-lobby-transcended-us-law/

{14} http://www.israellobby.org/AZC/

{15} http://antiwar.com/blog/2013/03/21/1963-the-year-the-israel-lobby-transcended-us-law/

Jonathan Marshall is a regular contributor to Consortiumnews.com.

https://consortiumnews.com/2017/05/19/the-open-secret-of-foreign-lobbying/

Categories: Uncategorized

Keeping a Grip on Reality

Men and Machines: Which is Master, Which is Slave?

by Robert Henderson

https://livinginamadhouse.wordpress.com (September 08 2010)

The British public has become weary of state-run computer projects either failing to be completed in whole or part after immense amounts of public money has been spent or public service information technology (“IT”) systems being incompetently operated where they are put into use. Common as such failures are, the present fiasco with the Her Majesty’s Revenue and Customs (“HMRC”, the British equivalent of the USA’s IRS) attempting to recover tax from 1.5 million people that has been under-deducted in the past two years because incorrect tax codes were issued is probably the most spectacular operational failure to date besides having a projected final cost of 389 million GBP compared with the original cost projection of 140 GBP million and being introduced a year late. It is a classic instance of IT failure. There is the cost over-run, the delayed implementation, the failure to design the system properly, the inadequate training of staff and the seeming inability of anyone involved with the project to understand the system in its entity.

The operational failure was unsurprising because as an investigation by the National Audit Office (“NAO”) established that the new system was put into operation with more than fifty identified technical defects. Up to 500 staff had to be reassigned to carry out the “manual workarounds” that had to be devised to correct the errors, which included creating “erroneous work records” for many taxpayers and “The [NAO] audit discovered that data on taxpayers was loaded onto the new computer system last year without being checked for accuracy, raising the risk of workers being issued incorrect tax codes”. {1}

When the system went live in 2009 HMRC officials expected the new system to generate about thirteen million new tax code notices. In the event, it produced almost 26 million.

According to the National Audit Office, a “significant proportion” of those codes were wrong:

 

 

Many of the incorrect notices were generated because the new system allocated a new code for each job that a person had done. That led to many people receiving several different tax codes. {1}

 

 

The failure of the HMRC system was the result of (1) the IT professionals who designed the system not understanding the requirements of tax collection and/or the HMRC people in charge of the project not understanding computerised systems and (2) the staff running the system, especially those responsible for inputting of data, being inadequately trained. The circumstances also suggest that either the HMRC management in charge of the project allowed the system to go ahead despite knowing that there were many program shortcomings or the IT contractors did not properly inform the HMRC management of the defects in the system.

The consequences were the diversion of 500 people to make manual adjustments and God alone knows what further expenditure of time and money in the future to deal with the millions of incorrect codes being issued, many simply because the system had not been designed to link up multiple employments. Using a centralised computerised system has created a degree of chaos which no manual system could create nor in all probability that which could be created if computerised wage and accounting systems were used by HMRC at a local level to calculate tax because with small local systems problems such as different codes issued for multiple employments would be almost certainly spotted quickly.

Such monumental IT failures are symptomatic of a general problem with digital technology, namely, our ever-growing reliance on it and the increasing complexity of the hardware and software which outstrips both the expertise of so-called IT professionals and the abilities of the average person to simply operate the programs.

For the private computer user the frustration is even greater, because at least an organisation of any size will either have its own in-house computer expertise or can afford to buy in IT expertise to deal with IT problems. The private individual often has no access to such expertise because the cost is prohibitive, but even where cost is no barrier the expertise of supposed experts is often found wanting. (I have paid for two new computer systems to be installed in the past ten years and on both occasions the supposedly simple task took multiple visits. Both occasions involved large well-known retailers).

The general consequence of our ever growing reliance on digital technology is that we are increasingly being controlled by the needs of the technology rather than using technology to serve us. It is very difficult to escape such control. If a person is in work they will almost certainly have to use it. If they are in education they will definitely have to use it. Even if a person does not encounter digital technology in their work or education, they find it increasingly difficult to avoid it in their private lives even if they refuse to use a computer or a mobile phone, not least because businesses and government increasingly require those dealing with them to do so by computer.

But increasing numbers of people do buy computers and other digital equipment for private use. Why do they do that if the machines are so unreliable and demanding? Simple: once a significant minority uses a technology it becomes increasingly difficult for the rest to resist.

We have long passed the point where a handwritten document is likely to be read by most people in business. Now, except between social contacts, everything must be word-processed to be acceptable. A word processor or access to one has become a sine qua non for anyone who wishes to be taken seriously. Even amongst private individuals, a letter is increasingly seen as unusual or even quaint.

With emails, we have not come to the stage that telephone ownership reached a quarter of a century ago when not to have a phone became considered eccentric, but we are rapidly moving towards it. Employers increasingly wish to contact employees by email wherever they are and this means the choice is often between having a computer and email at home or not having a job.

Those with school age children, whatever they think of computers, find it next to impossible to deny their children not only a computer but access to the internet, both because the children want it to match their peers and because they have been brainwashed into believing that a computer is a necessary educational tool.

In short, people are increasingly being driven to become computer owners not because they actively want to, but because they feel isolated and excluded if they remain computerless. Again, as with the analogy between telephones and emails, within the foreseeable future, someone without a computer is in danger of becoming in the eyes of the majority as much as an oddity as someone without a TV is now considered.

Despite all these pressures, there are still a large number of people in Britain who have remained distant from the digital world. According to a recent Office for National Statistics report nine million British adults have never been online. Nor is this simply the elderly for “Only 45 per cent of adults without any formal qualifications had used the Internet, compared with 97 per cent of those with a degree” {2}. It is worth bearing in mind that approximately ten per cent of the British population (six million) have IQs of eighty or less, and an IQ of eighty is the point at which most psychologists working in the field of intelligence testing think a person would struggle to live an independent life in an advanced modern society such as Britain.

It is unreasonable in a civilised society to simply hang the computer ignorant or the intellectually underpowered out to dry as digital technology looms ever larger. Yet that is precisely what is happening.

Technology as Magic

To master computers to the degree where a person does not lie helplessly in the hands of experts is a demanding and continuing task. It is unlikely that many could or would manage it without making computers their profession. In fact, even supposed computer professionals are only knowledgeable in their specialist areas: a hardware specialist has no deep knowledge of software and vice versa.

The science fiction writer Arthur C Clarke pointed out a good few years ago that there comes a point with technology when it became indistinguishable from magic for all but the initiates. The dangers of that are obvious: that which is not generally understood gives the few who do understand a great power over those who do not. That potentially awards private corporations and governments a great stick with which to beat their customers and citizens into submission, either for profit or political power.

Where the technology is as vital and central to a society as computers have become, there is the further and more fundamental risk of society reaching a state where the technology can no longer be either properly maintained or controlled.

Computers are like no other machine ever invented. They have a unique combination of an unparalleled public and private use and a central importance to economic activity and public administration. The potential penalties for the failure of these machines are vastly greater than for any other piece of technology. Not only can an immediate application of a computer be ended, as can happen with all machines, but computer users also risk losing networking capacity and, if they have not useable backed up copies of their computer data, the loss of their entire records and conceivably the loss of the means to continue their business.

Computer users are also vulnerable to outside sabotage though hacking and viruses. No other machine has ever exposed a society to such risks through its ubiquity and vulnerability to outside influences.

Computers are also vastly more demanding of time and trouble than any other machine used by the general public. Technological change has been making increasingly severe demands on human beings for around 300 years. There was change before then of course, but it was slow and most people could live their lives without having to adapt to radically new ways of living.

The Industrial Revolution changed that and arguably someone living between 1815 and 1914 saw more radical technological qualitative change than any generation before or since. But that change was the difference between living in a still largely pre-industrial society (in 1815) and an industrial society in its early middle age (in 1914). Moreover, the change did not require the vast majority of the population to master complicated machines at their work, let alone in their own homes.

In 1914 the most complicated machine most people would have had to operate was probably the telephone and vast swathes of the population would not even have had to go that far into the world of technology. Not only that, because machines then were either mechanical or part mechanical, that is, not electric, just looking at the way a machine was made often allowed the intelligent observer to have a fair guess at how it worked and to see what had gone wrong if it malfunctioned. Even work-related machines which required skilled operators, such as machine lathes, were not fundamentally difficult to understand, although the dexterity required to operate them often took time to acquire.

In general terms, things stayed much the same until the age of the personal computer, and even beyond. Machines became more and more predominant in advanced societies but they were not, in most instances, complicated to use. This was particularly true of those machines used in private life.

Telephones just required the user to dial; washing machines gave you a dial with a program on it and a start button; televisions and radios required simply needed switching on; cars were simply designed to travel. Even today, when they are increasingly packed with microprocessors and menus of function “options”, such machines are simple to use compared with a computer.

When did the computer rot set in? It is a stunningly recent phenomenon. Most people even in the West would not have used a computer before 1985. Probably a majority had not done so by 1990. By the end of the 1980s the nearest most would have got to a computer would probably have been bank ATM machines. The internet was esoteric and laborious, the web barely more than a gleam in Tim Berners-Lee’s eye. Even in the world of employment computers were still used sparingly.

As with computers, so with the other machines which cause most grief now. The mobile phone was a status symbol and the size of a brick, while landline phones were still phones boringly restricted to simply phoning rather than mini-computers with a tendency to bemuse. Microwaves had a simple choice of power. Refrigerators did not offer to remind you of what needed to be ordered. TVs tended to simply work when switched on.

In the past twenty years all this has dramatically changed. We are now in a world in which computers are absolutely integral to business and public administration and they are now the norm rather than the exception in homes. For most people, it is literally impossible to escape them. Worse, they have become ever more complex and demanding to use and invade ever more of our lives as microprocessors are inserted into the most unlikely things such as clothes. In fact, all machines are more and more demanding.

The Constant Learning Process

Personal computing began in the mid-seventies. A person starting them would have had to learn the BASIC programming language. By the early eighties they would have been using DOS. By 1990 Windows expertise was necessary. Since 1990 successive editions of Windows have varied considerably from the previous version requiring further learning.

What goes for operating systems applies also to most other programs, which when they are upgraded often bear surprisingly little resemblance to the version prior to them. Certainly, if one moves from an old program to a version which has been upgraded twice, the chances are that knowledge of the original program will be of little use in understanding the new one. In addition to this burden of learning and frustration, one added the need to familiarise oneself with the Internet and the Web.

Apart from the effort needed to constantly learn new programs and to attend to such things as installations of software and hardware, the other great drawback of computers is the amount of time which can be spent on purely maintaining and learning sufficient to use them. It is all too easy to find a day or two slip by just sorting out a single relatively simple computer problem or learning how to use a new program.

The Nature of What is to be Learned

The burden of learning is especially heavy because of the nature of that which is to be learned. This is what might be termed dead information. There is no intrinsic interest in what is to be learned. It is merely a means to an end. To operate a program all that is needed is a knowledge of the menus and function keys. That is precisely the type of information which is least palatable to the normal human mind. Hence, it is the least easy to learn for most people.

The computer is in effect forcing human beings to act like computers, something utterly alien to them. Intelligence is of little use when it comes gaining knowledge of the functionality of programs (how a person uses the program once the functionality is learned is a different matter). Computers are information-driven machines. Put the most intelligent man in the world before a computer and he will be utterly helpless if he has no computer experience. Even if the man has some computer experience, he will be as incapable of using an unfamiliar program as the dullard.

That computers are function- rather than intelligence-driven is objectively demonstrated by the fact that all of what might be called the administrative operations of a computer – file management, loading of programs et cetera – could be done by a computer program.

The Substitution of Function for Intellect

When I watch the young using computers, obvious or disguised in the shape of phones and the like, I get a feeling of deep unease. They so obediently pull down menus and select options that I wonder at the difference between them and a robot. The machine is driving the human being at least as much as the human being is driving the machine; brute machine functionality is replacing intellect.

There is only so much any human being can learn, both in terms of time and mental impetus. If increasing amounts of both are required by computers simply to operate them, where will that leave intellectual development? Worse, will the ability to operate machines become seen to be the most important activity of human beings?

The Myth of Youthful Expertise

It is true that those who have grown up with computers are more comfortable with the machines than those who came to them in adult life – the latter still comprise, incidentally, more than fifty per cent of the population. However, the idea that the young are have any deep understanding of computers is a myth.

The young know how to use the internet and the web, can work a word processor, and can use programs which really interest them such as social networking sites and games. But let their computer develop a fault which renders Windows unstable or unusable or a piece of hardware fails, and they are, in most cases, as helpless the generations which did not grow up with computers.

What the young do have which older people do not have is group knowledge. A schoolchild of today can call on the computer knowledge of their peer group and the assistance of teachers. Those a little older who are in work still have their peer group to help them if they get stuck. In addition, if they work for a large employer they can call on the expertise of the employer’s IT department or service contractors.

Computers have only been in schools since the mid-eighties. Anyone over the age of forty will not have a peer group on whom they can call for assistance with computers (and other machines) because almost all of those they know well will be of their approximate age – few people have close friendships with those who are much younger than themselves – and the people who are their age will have little computer experience or knowledge. The best they can hope for is assistance from their children if they have any, and then it is pot luck as to how computer competent those children are and how willing they are to help the parent. If an older person has no compliant computer literate children and does not work for a large employer, he or she will be utterly isolated from the knowledge needed to deal with even basic computer developments.

The True Cost of Computers

The common arguments for computers in business and public administration are that they increase efficiency by (1) reducing staff, (2) allowing faster working, including new working practices, and (3) producing information which would previously have been impossible to produce.

Despite the fact that experience has frequently shown these arguments to be invalid, they continue to be made in religious fashion by both the computer industry and the many uncomprehending executives who have bought into the computer dream without troubling themselves with even a basic understanding of the subject. (Thankfully we have at least got past the pipe dream of the paperless office.)

When computers first began to be generally used in business and public service the overwhelming majority of the people making the decisions about their introduction – businessmen, politicians and senior public servants – had absolutely no experience of computers, mainframe or otherwise. Not only did they lack experience they were terrified of anyone who did. This meant that the snake oil salesmen of the computer industry could sell them virtually anything. Things have not changed dramatically even now. That is one of the prime reasons why so many large computer systems, especially public service ones, go to Hell in a handcart. (One of the lesser known laws of C Northcote Parkinson states that the time spent on discussion of any agenda item in a committee meeting is inversely proportional to the knowledge of those present – discussion of a large computer system last five minutes because only the one expert present understands what is going on; discussion of the refreshments to be served at the meeting lasts 45 minutes).

Buying computer systems is an expensive business for any organisation. Buying a badly designed computer system is not merely expensive but potentially disastrous, because to prepare for its introduction the structure of the organisation will have been changed and the old system, manual or computer, will have been dumped. So, when the new computer system malfunctions neither can the organisation use it or revert to the previous system. The same applies, at least temporarily, when a computer system simply goes down for a limited period. Costs continue, but work ceases.

But even where the computer system is properly designed and works efficiently the costs are immense. The readily identifiable costs are frightening enough. There is the initial cost of the system (many public service systems run into billions), the cost of its maintenance, the cost of its upgrading, the cost in time and money of the initial and ongoing training of staff and the cost of the employment of new people in new supervisory posts to oversee the system.

There are also the less readily quantifiable costs. Computers generate vast amounts of data which is distributed promiscuously. This occupies time which would not otherwise be spent. Email means that substantial amounts of time are spent by employees answering or even simply deleting emails, not least because everyone is much more prone to send an email than a letter.

More generally, the structure of working within the organisation will tend to shape itself around the computer and employees will begin to develop a different sense of priorities with the computer looming largest in their mentality rather than the overall needs and ends of the organisation.

How often is any proper cost-benefit analysis done on the utility of a computer system? Very rarely, not least because once a computer system has been put in place with its concomitant staffing changes, it is a daunting and hideously expensive task to change matters. Nor will those who have made the decision to purchase a computer system willingly admit they were wrong. Not only that, but we still have the problem, which will never go away, of the people with the power within organisations knowing insufficient about computers to make any meaningful decision on the value of computers to the organisation. This ignorance also robs the powerful of the self-confidence to challenge the need for computers or the nature of systems being proposed by the “experts”.

The Problem of Long-Term Data Storage

Data storage bids fair to cause fundamental problems in both the medium and the long term. This is because the nature of the storage media, both hardware and software, is changing so rapidly.

Even in the twenty odd years of the widespread use of the personal computer, we have already had storage on hard disks, 5.25″ disks, 3.25″ disks, zip disks of various sizes, CDs, DVDs and USB memory sticks, with the saved in a wide variety of formats depending on the software used. To the problems of access to electronic data may be added the fact that fewer and fewer documents (as a percentage of the total number of documents created) are being and will be saved in hard copy form.

The implications for the future are profound. Until now, historians have been able to look at documents because they were written or printed. In the future, historians (or any other researcher) will find either no documents or ones which are inaccessible because they are only in an outdated electronic format.

There is also a standing temptation for those in positions of power and influence, especially politicians, to deliberately destroy any record of their misbehavior. This is made vastly easier if the documents are only held on computer.

The Failure of the Market

There is no better modern example of the market failing to provide what the customer both needs and wants. If it was driven by the customer, the computer industry would produce hardware and software which was easy to install, had continuity of use, was simple to use and was supported by adequate help lines and manuals. The industry signally fails to do any of these things.

Hardware and software are of course purchased in ever greater volume and computer services, including maintenance, continue to swell. But that is not an indication of computer satisfaction. Rather, it is simply a reflection of how computers have become an inescapable part of our lives, not only as obvious computers but also in the guise of so many of the other machines we use – everything from phones to intelligent clothes. Business and public administration have become so dependent on their use that they cannot do without them. That being so, whatever is on offer, however unsatisfactory, is bought out of sheer necessity. The computer companies have the modern world over a barrel.

The power deriving from the ubiquity and utility of the computer is bolstered by the fact that the computer industry is in some respects a natural monopoly. Once a single operating system (“OS”) gained dominance, the chances of any other system effectively competing were very small. This is because the weight of programs available to run under the dominant OS soon became much greater than those which could be run under any other OS. Thus, it became inefficient to choose any other OS. That, in turn, meant most of the software was written in a way to make in “friendly” to the dominant OS systems’ users. This further excluded OS competitors and the software to run under them because users, especially employers, did not want to spend the time training their employees on completely new systems.

What Needs to be Done?

In a sane world, governments would act to prevent the introduction of massive centralised networked computer systems providing vital services because of the dangers of a general failure of such systems from cyber attacks. This applies especially in public services but also to privatised business such as the water and energy companies and to private enterprise businesses such as banks. Governments should also take the lead in both costing their own computer projects honestly (see above) and encouraging large businesses and not-for-profit organisations to do the same.

As for the private user, they will be asking themselves questions such as these: why should using a computer be such a demanding and hit and miss business? Why should we tolerate a machine which is not in any meaningful sense “fit for purpose”, in the words of our current consumer protection law? Why do we allow ourselves to be fobbed off with precious little information about how to operate programs, both in terms of free instruction by the vendor and in the laughably inadequate instruction manuals, whether in hard copy or from the all too frequently risibly named “help” functions? Why do we put up with hardware and software which go out of date (and hence become unusable) in a year or three? Why do we have to pay an arm and a leg for computer training or repair? These problems could be substantially ameliorated by legislation to ensure that:

1. Windows (or any other operating system) is written so that any version of Windows will encompass every previous version of Windows. Users should be able to choose from a menu which version of Windows they use. The already vast and rapidly increasing storage capacity on computer drives means that an increase in the size of the programmes would not be impractical. The effect of this would be to reduce the need to constantly learn to use new software.

2. Windows is written to ensure that all software written to operate under Windows can operate under any version of Windows. The effect of this would be to (1) reduce the need to learn new software and (2) reduce the need to buy new software.

3. Windows is designed to accept any peripheral regardless of age.

4. Hardware is designed so that any hardware can continue to be used for as long as it works.

Are any of these four things likely to happen? Sadly, no. The problem is simple: no single country, not even the USA, could insist on such laws globally.

There is one thing the government of any advanced country can and should do: create circumstances in which those who cannot come to terms with digital technology can live in an ever more computer-controlled world. They can do this by maintaining non-computer access to state-funded organisations and forcing, through legislation, larger businesses and not-for-profit organisations to do the same. A good start would be to knock on the head the clearing banks’ proposal to stop clearing checks by 2018.

Links:

{1} http://www.telegraph.co.uk/finance/personalfinance/consumertips/tax/7983495/Taxmans-new-computer-spotted-errors.html

{2} http://www.telegraph.co.uk/technology/internet/7968703/Nine-million-British-adults-have-never-been-online-ONS-says.html)

See Also:

https://livinginamadhouse.wordpress.com/2011/07/01/robotics-and-the-real-sorry-karl-you-got-it-wrong-final-crisis-of-capitalism/

https://livinginamadhouse.wordpress.com/2010/10/13/the-geepees-a-cautionary-tale/

https://livinginamadhouse.wordpress.com/2010/09/08/men-and-machines-which-is-master-which-is-slave/

Categories: Uncategorized

America’s Reign of Terror

A Nation Reaps What It Sows

by John Whitehead via The Rutherford Institute

Zero Hedge (May 16 2017)

 

 

The means of defense against foreign danger have been always the instruments of tyranny at home.

– James Madison

 

 

Who designed the malware worm that is now wreaking havoc on tens of thousands of computers internationally {1} by hackers demanding a king’s ransom? The US government.

Who is the biggest black market buyer and stockpiler of cyber weapons {2} (weaponized malware that can be used to hack into computer systems, spy on citizens, and destabilize vast computer networks)? The US government.

What country has one the deadliest arsenals of weapons of mass destruction {3}? The US government.

Who is the largest weapons manufacturer and exporter {4} in the world, such that they are literally arming the world? The US government.

Which is the only country to ever use a nuclear weapon in wartime {5}? The United States.

How did Saddam Hussein build Iraq’s massive arsenal {6} of tanks, planes, missiles, and chemical weapons during the 1980s? With help from the US government.

Who gave Osama bin Laden and al-Qaida “access to a fortune in covert funding and top-level combat weaponry” {7}? The US government.

What country has a pattern and practice of entrapment {8} that involves targeting vulnerable individuals, feeding them with the propaganda, know-how and weapons intended to turn them into terrorists, and then arresting them as part of an elaborately orchestrated counterterrorism sting? The US government.

Where did ISIS get many of their deadliest weapons {9}, including assault rifles and tanks to anti-missile defenses? The US government.

Which country has a history of secretly testing out dangerous weapons and technologies {10} on its own citizens? The US government.

Are you getting the picture yet?

The US government isn’t protecting us from terrorism.

The US government is creating the terror. It is, in fact, the source of the terror.

Just think about it for a minute: almost every tyranny being perpetrated against the citizenry – purportedly to keep us safe and the nation secure – has come about as a result of some threat manufactured in one way or another by our own government.

Cyberwarfare. Terrorism.

Bio-chemical attacks. The nuclear arms race.

Surveillance. The drug wars.

In almost every instance, the US government has in its typical Machiavellian fashion sown the seeds of terror domestically and internationally in order to expand its own totalitarian powers.

It’s time to wake up and stop being deceived by government propaganda.

We’re not dealing with a government that exists to serve its people, protect their liberties and ensure their happiness. Rather, these are the diabolical machinations of a make-works program carried out on an epic scale whose only purpose is to keep the powers-that-be permanently (and profitably) employed.

Case in point: For years now, the US government has been creating what one intelligence insider referred to as a cyber-army capable of offensive attacks.

As Reuters reported back in 2013:

 

 

Even as the US government confronts rival powers over widespread Internet espionage, it has become the biggest buyer in a burgeoning gray market where hackers and security firms sell tools for breaking into computers. The strategy is spurring concern in the technology industry and intelligence community that Washington is in effect encouraging hacking and failing to disclose to software companies and customers the vulnerabilities exploited by the purchased hacks. That’s because US intelligence and military agencies aren’t buying the tools primarily to fend off attacks. Rather, they are using the tools to infiltrate computer networks overseas, leaving behind spy programs and cyber-weapons that can disrupt data or damage systems.

 

 

As part of this cyberweapons programs, government agencies such as the NSA have been stockpiling all kinds of nasty malware, viruses and hacking tools that can “steal financial account passwords, turn an iPhone into a listening device, or, in the case of Stuxnet, sabotage a nuclear facility” {11}.

And now we learn that the NSA is responsible for the latest threat {1} posed by the “WannaCry” or “Wanna Decryptor” malware worm which – as a result of hackers accessing the government’s arsenal – has hijacked more than 57,000 computers and crippled health care, communications infrastructure, logistics, and government entities in more than seventy countries already.

All the while the government was repeatedly warned about the dangers of using criminal tactics to wage its own cyberwars.

It was warned about the consequences of blowback should its cyber weapons get into the wrong hands.

The government chose to ignore the warnings.

That’s exactly how the 9/11 attacks unfolded.

First, the government helped to create the menace that was al-Qaida and then, when bin Laden had left the nation reeling in shock (despite countless warnings that fell on tone-deaf ears {12}), it demanded – and was given – immense new powers in the form of the USA Patriot Act in order to fight the very danger it had created.

This has become the shadow government’s modus operandi regardless of which party controls the White House: the government creates a menace – knowing full well the ramifications such a danger might pose to the public – then without ever owning up to the part it played in unleashing that particular menace on an unsuspecting populace, it demands additional powers in order to protect “we the people” from the threat.

Yet the powers-that-be don’t really want us to feel safe.

They want us cowering and afraid and willing to relinquish every last one of our freedoms in exchange for their phantom promises of security.

As a result, it’s the American people who pay the price for the government’s insatiable greed and quest for power.

We’re the ones to suffer the blowback.

 

 

Blowback: A term originating from within the American Intelligence community, denoting the unintended consequences, unwanted side-effects, or suffered repercussions of a covert operation that fall back on those responsible for the aforementioned operations.

 

 

As historian Chalmers Johnson explains, “blowback is another way of saying that a nation reaps what it sows” {13}.

Unfortunately, “we the people” are the ones who keep reaping what the government sows.

We’re the ones who suffer every time, directly and indirectly, from the blowback.

We’re made to pay trillions of dollars in blood money to a military industrial complex that kills without conscience. We’ve been saddled with a crumbling infrastructure, impoverished cities and a faltering economy while our tax dollars are squandered on lavish military installations and used to prop up foreign economies. We’ve been stripped of our freedoms. We’re treated like suspects and enemy combatants. We’re spied on by government agents: our communications read, our movements tracked, our faces mapped, our biometrics entered into a government database. We’re terrorized by militarized police who roam our communities and SWAT teams that break into our homes. We’re subjected to invasive patdowns in airports, roadside strip searches and cavity probes, forced blood draws.

This is how tyranny rises and freedom falls.

We can persuade ourselves that life is still good, that America is still beautiful, and that “we the people” are still free.

However, as I make clear in my book Battlefield America: The War on the American People {14}, the moment you tune out the carefully constructed distractions – the year-round sports entertainment, the political theatrics, the military’s war cries, the president’s chest-thumping, and the techno-gadgets and social media that keep us oblivious to what’s really going on in the world around us – you quickly find that the only credible threat to our safety and national security is, in fact, the government itself.

As science fiction writer Philip K Dick warned,

 

 

Don’t believe what you see; it’s an enthralling – [and] destructive, evil snare. Under it is a totally different world, even placed differently along the linear axis.

 

 

In other words, all is not as it seems.

The powers-that-be are not acting in our best interests.

“We the people” are not free.

The government is not our friend.

And America will never be safe or secure as long as our government continues to pillage and plunder and bomb and bulldoze and kill and create instability and fund insurgencies and police the globe.

So what can we do to stop the blowback, liberate the country from the iron-clad grip of the military-industrial complex, and get back to a point where freedom actually means something?

For starters, get your priorities in order. As long as Americans are more inclined to be offended over the fate of a Confederate statue {15} rather than the government’s blatant disregard for the Constitution and human rights, then the status quo will remain.

Stop playing politics with your principles. As long as Americans persist in thinking like Republicans and Democrats – refusing to recognize that every administration in recent years has embraced and advanced the government’s authoritarian tactics – then the status quo will remain.

Value all human life as worthy of protection. As long as Americans, including those who claim to value the sanctity of human life, not only turn a blind eye to the government’s indiscriminate killings of innocent civilians but champion them, then the status quo will remain.

Recognize that in the eyes of the government, we’re all expendable. As long as we allow the government to play this dangerous game in which “we the people” are little more than pawns to be used, abused, easily manipulated and just as easily discarded – whether it’s under the guise of national security, the war on terror, the war on drugs, or any other manufactured bogeyman it can dream up – then the status quo will remain.

Demand that the government stop creating, stockpiling and deploying weapons of mass destruction: nuclear, chemical, biological, cyber, et cetera. As long as the government continues to use our tax dollars to create, stockpile and deploy weapons of mass destruction – whether those weapons are meant to kill, maim or disable (as in the case of the WannaCry computer virus) – we will be vulnerable to anyone who attempts to use those weapons against us and the status quo will remain.

Finally, stop supporting the war machine and, as Chalmers Johnson suggests, “bring our rampant militarism under control” {16}:

 

 

From George Washington’s “farewell address” to Dwight Eisenhower’s invention of the phrase “military-industrial complex”, American leaders have warned about the dangers of a bloated, permanent, expensive military establishment that has lost its relationship to the country because service in it is no longer an obligation of citizenship. Our military operates the biggest arms sales operation on earth; it rapes girls, women and schoolchildren in Okinawa; it cuts ski-lift cables in Italy, killing twenty vacationers, and dismisses what its insubordinate pilots have done as a “training accident”; it allows its nuclear attack submarines to be used for joy rides for wealthy civilian supporters and then covers up the negligence that caused the sinking of a Japanese high school training ship; it propagandizes the nation with Hollywood films glorifying military service (Pearl Harbor); and it manipulates the political process to get more carrier task forces, antimissile missiles, nuclear weapons, stealth bombers and other expensive gadgets for which we have no conceivable use. Two of the most influential federal institutions are not in Washington but on the south side of the Potomac River – the Defense Department and the Central Intelligence Agency. Given their influence today, one must conclude that the government outlined in the Constitution of 1787 no longer bears much relationship to the government that actually rules from Washington. Until that is corrected, we should probably stop talking about “democracy” and “human rights”. {16}

 

 

Links:

{1} https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/

{2} https://www.theverge.com/2013/5/10/4319278/us-government-hacking-threatens-cybersecurity-former-officials-say

{3} http://theweek.com/articles/460030/americas-weapons-mass-destruction-by-numbers

{4} http://www.motherjones.com/politics/2016/07/tomdispatch-dc-congress-defense-international-arms-business

{5} http://www.icanw.org/the-facts/the-nuclear-age/

{6} http://www.pbs.org/wgbh/pages/frontline/shows/longroad/etc/arming.html

{7} http://www.nbcnews.com/id/3340101/t/bin-laden-comes-home-roost/#.WRntIFUrK70

{8} https://theintercept.com/2015/03/16/howthefbicreatedaterrorist/

{9} http://www.cnn.com/2015/12/08/politics/amnesty-international-isis-weapons-u-s-/

{10} http://www.businessinsider.com/military-government-secret-experiments-biological-chemical-weapons-2016-9

{11} http://www.reuters.com/article/us-usa-cyberweapons-specialreport-idUSBRE9490EL20130510

{12} http://www.nytimes.com/2012/09/11/opinion/the-bush-white-house-was-deaf-to-9-11-warnings.html

{13} http://www.ditext.com/johnson-c/blowback.html

{14} https://www.amazon.com/Battlefield-America-War-American-People/dp/1590793099

{15} https://www.nytimes.com/2017/05/14/us/confederate-statue-protests-virginia.html

{16} https://www.thenation.com/article/blowback/

https://www.rutherford.org/publications_resources/john_whiteheads_commentary/americas_bloody_reign_of_terror_a_nation_reaps_what_it_sows

http://www.zerohedge.com/news/2017-05-16/americas-reign-terror-nation-reaps-what-it-sows

Categories: Uncategorized

Fire Burn and Cauldron Bubble for Trump

by Eric Margolis

https://ericmargolis.com (May 20 2017)

 

 

Double, double toil and trouble;
Fire burn and cauldron bubble.

– The witches in Macbeth

 

President Trump’s administration is now at a high boil as he faces intense heat from all sides. The Republican Party has backed away from their embattled president. US intelligence agencies are baying for his blood. The US media plays the role of the witches in “Macbeth” as it plots against Trump.

One increasingly hears whispers about impeachment or the wonderful 1964 film about a military coup in Washington, “Seven Days in May”.

As in Shakespeare’s King Lear, Trump stands almost alone on a blasted heath, howling that he has been betrayed. The world watches on in dismay and shock.

One thing is clear: the US presidency has become too powerful when far-fetched talk of possibly Russian involvement in Trump’s campaign could send world financial markets into a crash dive. And when Trump’s ill informed, off the cuff remarks can endanger the fragile global balance of power.

Trump has made this huge mess and must now live with it. Yes, he is being treated unfairly by appointment of a special prosecutor when the titanic sleaze of the Clintons was never investigated. But that’s what happens when you are widely detested. No mercy for Trump, a man without any mercy for others.

Trump is not a Manchurian candidate put into office by Moscow though his bungling aides and iffy financial deals often made it appear so. His choice of the fanatical Islamophobe General Michael Flynn was an awful blunder. Flynn was revealed to have taken money from Turkey to alter US Mideast policy. Who else paid off Flynn? Disgraceful.

But what about all the politicians and officials who took and take money from the Saudis and Gulf emirates, or Sheldon Adelson, the ardent advocate of Greater Israel? What about political payoffs to the flat-earth Republicans who now act as Israel’s amen chorus in Washington?

The growing scandals that are engulfing Trump’s presidency seem likely to delay if not defeat the president’s laudatory proposals to lower taxes, prune the bureaucracy, clean up intelligence, end America’s foreign wars, and impose some sort of peace in the Mideast.

By recklessly proposing these reforms at the same time, Trump earned the hatred of the media, federal government, all intelligence agencies, and the Israel lobby, not to mention ecologists, free-thinkers, cultured people, academia and just about everyone else who does not raise cotton or abuse animals for a living.

No wonder Trump stands almost alone, like Rome’s Horatio at the Bridge. One increasingly hears in Washington “what Trump needs is a little war”.

That would quickly wrong-foot his critics and force the neocon media – Washington Post, Wall Street Journal, New York Times, and CNN – to back him. We already saw this happen when Trump fired salvos of cruise missiles at Syria. It would also provide welcome distraction from the investigations of Trump that are beginning.

Trump has appeared to be pawing the ground in a desire to attack naughty North Korea or Syria, and maybe even Yemen, Somalia or Sudan. A war against any of these small nations would allow the president to don military gear and beat his chest – as did the dunce George W Bush. Bomb the usual Arabs!

The Pentagon wants 50,000 more troops for Afghanistan. US warplanes are buzzing angry North Korea. In Syria, the US and Russia are a falafel’s length from open clashes. Now is the time for extreme caution, but an enraged President Trump, who avoided military service in his youth, is ready to lash out.

For Trump, next week’s visit to the Mideast should prove a welcome respite after the madness of Washington. But isolated and besieged as Trump is, he may have to depend more on support from Israel and its American partisans rather than forcing a Mideast peace settlement. Israel insists there be no change to the status quo that leaves Palestine an open air prison.

America has not so far become great again.

Copyright Eric S Margolis 2017

https://ericmargolis.com/2017/05/fire-burn-and-cauldron-bubble-for-trump/

Categories: Uncategorized

The Assault on Trump

by Paul Craig Roberts

http://www.paulcraigroberts.org (May 18 2017)

 

We are witnessing an assault by the national security state and its liberal media on a President of the United States that is unprecedented.

Wild and unsupported accusations of treasonous or illegal Russian connections have been the mainstay of the news since Trump’s campaign for president. These accusations have reached the point that there is an impeachment movement driven by the national security state and its liberal media and endorsed by Democrats, the American left wing which has turned against the working class as “Trump deplorables”, and luminaries such as Harvard Law Professor Larry Tribe. The Washington Post, which was not present at the meeting of President Trump with Russian Foreign Minister Lavrov, purports to know that Trump gave Lavrov US national security information.

The Russian government has offered the presstitute media a transcript of the meeting, but, of course, the presstitutes are not interested.

The latest story is that Trump tried to bribe FBI Director Comey, before he fired him, not to investigate Trump as part of the “Russian investigation”. Clearly, there is no intelligence left in the American media. The President doesn’t need to bribe someone he can fire.

What we are witnessing is the determination of the national security state to keep their prized “Russian Threat” in its assigned role as the Number One Threat to the US. The liberal media, owned by the CIA since the 1950s is in accord with this goal.

The American media is so accustomed to its enslavement by the national security state that it does not think of the consequences. But Professor Stephen Cohen does. I agree with him that the greatest threat to national security “is this assault on President Trump”: http://www.informationclearinghouse.info/47076.htm

Cohen said that there is a fourth branch of government, the intelligence community, which obstructs the management of American foreign affairs by the executive branch and Congress.

As an example, he reminded us that:

 

 

In 2016, President Obama worked out a deal with Russian President Putin for military cooperation in Syria. He said he was going to share intelligence with Russia, just like Trump and the Russians were supposed to do the other day. Our department of defense said it wouldn’t share intelligence. And a few days later, they killed Syrian soldiers, violating the agreement, and that was the end of that. So, we can ask, who is making our foreign policy in Washington today?

 

 

In the 1960s, President John F Kennedy thought he was in charge, and he was assassinated for his belief. JFK blocked an invasion of Cuba, the Northwoods project, a preemptive nuclear strike on the Soviet Union, and spoke of ending the Cold War.

In the 1970s President Nixon was driven from office because he thought he was in charge of foreign policy. Like Kennedy, Nixon was a threat to the national security state. Nixon pushed through SALT 1 and the anti-ABM Treaty, and he opened to China, defusing those tensions as well. The military/security complex saw its budget dwindling as the threat dwindled. Nixon also determined to withdraw from Vietnam, but was constrained by the national security state. Nixon, the most knowledgeable president about foreign affairs, was forced from office because his efforts in behalf of peace constituted a threat to the power and profit of the military/security complex.

It is important to understand that there is no evidence whatsoever against Nixon in The Washington Post “investigation”. The Post’s reporters simply put together a collection of innuendoes that cast aspersion on Nixon, whose “crime” was to say that he learned of the Watergate burglary at a later date than he actually did. Nixon kept the burglary quiet until after his reelection because he knew that the CIA’s Washington Post would use it in an effort to prevent his reelection.

The “crime” for which Nixon was really removed was his success in establishing more peaceful and stable relations with Russia and China.

Trump, being in real estate and entertainment, was unaware of the landmines on which he was stepping when he said it was time to normalize relations with Russia and to rethink the purpose of Nato.

The US military/security complex sits on a budget extracted from very hard-pressed American taxpayers of $1,000 billion dollars annually. By threatening to normalize relations with the enemy which was created in order to justify this vast budget, Trump presented the major threat to the American National Security State’s power and profit.

This is why Trump will be broken and/or removed as President of the United States.

Once again democracy in American is proving to be powerless. There is no one in Washington who can help Trump. Those who could help him, such as myself, cannot be confirmed by the US Senate, which is owned lock, stock, and barrel by the military/security complex, Wall Street, and the Israel Lobby.

Trump tried to connect the suffering American people to their government, an act of treason against the oligarchy, who are making an example of Trump that will dissuade politicians in the future from making populist appeals to the people.

Copyright (c) 2016 PaulCraigRoberts.org. All rights reserved.

http://www.paulcraigroberts.org/2017/05/18/the-assault-on-trump/

Categories: Uncategorized

Technology is the Master of Modern Slavery

by Tom Chtham

Project Chesapeake (May 13 2017)

Zero Hedge (May 19 2017)

The recent cyber attack on computers worldwide is just the latest wake-up call to the future we are blindly building for ourselves. The vast majority of humanity embraces technology like it is their next breath of air. Without it, they feel like they will die.

Technology is a double-edged sword that we wield that must be handled with care, less we cut off one of our own limbs. Technology allows us to be more productive and work faster than without it but as we embrace more technology to relieve us of many manual tasks we must not let it rule our very existence.

Technology must be used as a lever, not a crutch. When we give up our ability to function in daily life and allow technology to rule our every move, we ultimately give up our freedom. To allow technology to dictate what we can do and when we can do it is to reduce ourselves to nothing more than compliant slaves to it.

When a hospital cannot perform operations or even see patients because their computers are down or we cannot communicate or travel because of computer hacking, we have allowed technology to become a crutch that prevents us from falling on our faces in its absence. When we cannot buy food or fuel or depend on electrical power for basic needs we have become too dependent on the technology we invented to assist us.

The use of technology is a good thing that allows us to move forward and build things we never dreamed of before but when it becomes a weakness, we need to reexamine our use of it. If we become so dependant on technology that we cannot function without it, we are preparing ourselves for a doomsday scenario when it eventually fails and we are helpless to care for ourselves.

It is only logical to have backup systems to utilize in the event our technology fails for some reason. This is the whole reason we have people to warn us before hand such as the EMP Commission to tell us we are in danger if certain events happen. Technology provides us with many good things but it also leaves us susceptible to many bad things as well if we ignore our responsibility to use it wisely and not become too dependent on it.

Many people today can actually have withdrawal symptoms if they lose access to their technology for any length of time. This should be an alarm to society but most just brush it off as fear mongering. When the loss of technology causes a business to completely stop operations, that should be an indication they do not have sufficient backup systems to fall back on.

One of the prime tenants of the prepper movement is that they have multiple backup systems to rely on if technology stops working. This is just a logical step taken by people that have taken the time to analyze the threats posed by the loss our technology and determine action is warranted for the preservation of life following certain events. The less technology you require to take care of daily activities, the more freedom you have to live a normal life.

Most people still do not take the threat of technological disruptions to society seriously. They think that if something happens, someone will fix it and life will go on as normal. What they refuse to contemplate is if something happens and nobody can fix it. As society moves along this technological road they become more dependent on it and the risk to their lives increases as they lose the ability to do basic tasks. Hopefully, this latest cyber attack will instill in people the need to have backup systems in place to continue their daily activities and live life as a free person and not be a slave to the technology they so eagerly seek.

https://projectchesapeake.wordpress.com/2017/05/13/technology-is-the-master-of-modern-slavery/

http://www.zerohedge.com/news/2017-05-19/technology-master-modern-slavery

Categories: Uncategorized

Seth Rich, Craig Murray and …

… the Sinister Stewards of the National Security State

by Mike Whitney

CounterPunch (May 19 2017)


Photo by Obama-Biden Transition | CC BY 2.0

Why is it a “conspiracy theory” to think that a disgruntled Democratic National Committee staffer gave WikiLeaks the Democratic National Committee (“DNC”) emails, but not a conspiracy theory to think the emails were provided by Russia?

Why?

Which is the more likely scenario: That a frustrated employee leaked damaging emails to embarrass his bosses or a that foreign government hacked DNC computers for some still-unknown reason?

That’s a no-brainer, isn’t it?

Former-DNC employee, Seth Rich, not only had access to the emails, but also a motive. He was pissed about the way the Clinton crowd was “sandbagging” Bernie Sanders. In contrast, there’s neither evidence nor motive connecting Russia to the emails. On top of that, WikiLeaks founder, Julien Assange (a man of impeccable integrity) has repeatedly denied that Russia gave him the emails which suggests the government investigation is completely misdirected. The logical course of action, would be to pursue the leads that are most likely to bear fruit, not those that originate from one’s own political bias. But, of course, logic has nothing to do with the current investigation, it’s all about politics and geopolitics.

We don’t know who killed Seth Rich and we’re not going to speculate on the matter here. But we find it very strange that neither the media nor the FBI have pursued leads in the case that challenge the prevailing narrative on the Russia hacking issue. Why is that? Why is the media so eager to blame Russia when Rich looks like the much more probable suspect?

And why have the mainstream news organizations put so much energy into discrediting the latest Fox News report, when – for the last ten months – they’ve showed absolutely zero interest in Rich’s death at all?

According to Fox News:

 

 

The Democratic National Committee staffer who was gunned down on July 10 on a Washington, DC street just steps from his home had leaked thousands of internal emails to WikiLeaks, law enforcement sources told Fox News.

A federal investigator who reviewed an FBI forensic report detailing the contents of DNC staffer Seth Rich’s computer generated within 96 hours after his murder, said Rich made contact with WikiLeaks through Gavin MacFadyen, a now-deceased American investigative reporter, documentary filmmaker, and director of WikiLeaks who was living in London at the time …

Rod Wheeler, a retired Washington homicide detective and Fox News contributor investigating the case on behalf of the Rich family, made the WikiLeaks claim, which was corroborated by a federal investigator who spoke to Fox News …

“I have seen and read the emails between Seth Rich and Wikileaks”, the federal investigator told Fox News, confirming the MacFadyen connection. He said the emails are in possession of the FBI, while the stalled case is in the hands of the Washington Police Department. {1}

Okay, so where’s the computer? Who’s got Rich’s computer? Let’s do the forensic work and get on with it.

But The Washington Post and the other bogus news organizations aren’t interested in such matters because it doesn’t fit with their political agenda. They’d rather take pot-shots at Fox for running an article that doesn’t square with their goofy Russia hacking story. This is a statement on the abysmal condition of journalism today. Headline news has become the province of perception mandarins who use the venue to shape information to their own malign specifications, and any facts that conflict with their dubious storyline, are savagely attacked and discredited. Journalists are no longer investigators that keep the public informed, but paid assassins who liquidate views that veer from the party-line.

WikiLeaks never divulges the names of the people who provide them with information. Even so, Assange has not only shown an active interest in the Seth Rich case, but also offered a $20,000 reward for anyone providing information leading to the arrest and conviction of Rich’s murder. Why? And why did he post a link to the Fox News article on his Twitter account on Tuesday?

I don’t know, but if I worked for the FBI or The Washington Post, I’d sure as hell be beating the bushes to find out. And not just because it might help in Rich’s murder investigation, but also, because it could shed light on the Russia fiasco which is being used to lay the groundwork for impeachment proceedings. So any information that challenges the government version of events, could actually change the course of history.

Have you ever heard of Craig Murray?

Murray should be the government’s star witness in the DNC hacking scandal, instead, no one even knows who he is. But if we trust what Murray has to say, then we can see that the Russia hacking story is baloney. The emails were “leaked” by insiders not “hacked” by a foreign government. Here’s the scoop from Robert Parry at Consortium News:

 

 

Former British Ambassador to Uzbekistan Craig Murray, has suggested that the DNC leak came from a “disgruntled” Democrat upset with the DNC’s sandbagging of the Sanders campaign and that the Podesta leak came from the US intelligence community … He (Murray) appears to have undertaken a mission for WikiLeaks to contact one of the sources (or a representative) during a September 25 visit to Washington where he says he met with a person in a wooded area of American University …

Though Murray has declined to say exactly what the meeting in the woods was about, he may have been passing along messages about ways to protect the source from possible retaliation, maybe even an extraction plan if the source was in some legal or physical danger … Murray also suggested that the DNC leak and the Podesta leak came from two different sources, neither of them the Russian government.

“The Podesta emails and the DNC emails are, of course, two separate things and we shouldn’t conclude that they both have the same source”, Murray said. “In both cases we’re talking of a leak, not a hack, in that the person who was responsible for getting that information out had legal access to that information …

Scott Horton then asked, “Is it fair to say that you’re saying that the Podesta leak came from inside the intelligence services, NSA [the electronic spying National Security Agency] or another agency?”

“I think what I said was certainly compatible with that kind of interpretation, yeah”, Murray responded. “In both cases they are leaks by Americans”. {2}

With all the hullabaloo surrounding the Russia hacking case, you’d think that Murray’s eyewitness account would be headline news, but not in Homeland Amerika where the truth is kept as far from the front page as humanly possible.

Bottom line: The government has a reliable witness (Murray) who can positively identify the person who hacked the DNC emails and, so far, they’ve showed no interest in his testimony at all. Doesn’t that strike you as a bit weird?

Did you know that after a ten-month-long investigation, there’s still no hard evidence that Russia hacked the 2016 elections? In fact, when the Intelligence agencies were pressed on the matter, they promised to release a report that would provide iron-clad proof of Russian meddling. On January 6 2017, the Director of National Intelligence, James Clapper, released that report. It was called The Intelligence Community Assessment (“ICA”). Unfortunately, the report fell far-short of the public’s expectations. Instead of a smoking gun, Clapper produced a tedious 25-page compilation of speculation, hearsay, innuendo and gobbledygook. Here’s how veteran journalist Robert Parry summed it up:

 

 

The report contained no direct evidence that Russia delivered hacked emails from the Democratic National Committee and Hillary Clinton’s campaign chairman John Podesta to WikiLeaks … The DNI report … as presented, is one-sided and lacks any actual proof. Further, the continued use of the word “assesses” … suggests that the underlying classified information also may be less than conclusive because, in intelligence-world-speak, “assesses” often means “guesses”. {3}

Repeat: “the report contained no direct evidence”, no “actual proof”, and a heckuva a lot of “guessing”. That’s some “smoking gun”, eh?

If this “thin gruel” sounds like insufficient grounds for removing a sitting president and his administration, that’s because it is. But the situation is even worse than it looks, mainly because the information in the assessment is not reliable. The ICA was corrupted by higher-ups in the Intelligence food-chain who selected particular analysts who could be trusted to produce a document that served their broader political agenda. Think I’m kidding? Take a look at this excerpt from an article at Fox News:

 

 

On January 6 2017, the US Intelligence Community issued an Intelligence Community Assessment (“ICA”) that found Russia deliberately interfered in the 2016 presidential election to benefit Trump’s candidacy … (but) there are compelling reasons to believe this ICA was actually a politicized analysis that violated normal rules for crafting intelligence assessments … to ensure this one reached the bottom line conclusion that the Obama administration was looking for …

… Director of National Intelligence James Clapper explained in his testimony that two dozen or so “seasoned experts” were “handpicked” from the contributing agencies and drafted the ICA “under the aegis of his former office” … While Clapper claimed these analysts were given “complete independence” to reach their findings, he added that their conclusions “were thoroughly vetted and then approved by the directors of the three agencies and me”.

This process drastically differed from the Intelligence Community’s normal procedures. Hand-picking a handful of analysts from just three intelligence agencies to write such a controversial assessment went against standing rules to vet such analyses throughout the Intelligence Community within its existing structure. The idea of using hand-picked intelligence analysts selected through some unknown process to write an assessment on such a politically sensitive topic carries a strong stench of politicization …

A major problem with this process is that it gave John Brennan, CIA’s hyper-partisan former director, enormous influence over the drafting of the ICA. Given Brennan’s scathing criticism of Mr Trump before and after the election, he should have had no role whatsoever in the drafting of this assessment. Instead, Brennan probably selected the CIA analysts who worked on the ICA and reviewed and approved their conclusions …

The unusual way that the January 6 2017 Intelligence Community Assessment was drafted raises major questions as to whether it was rigged by the Obama administration to produce conclusions that would discredit the election outcome and Mr Trump’s presidency. {4}

Repeat: “A politicized analysis that violated normal rules for crafting intelligence assessments”. That says it all, doesn’t it?

Let’s take a minute and review the main points in the article:

1. Was the Intelligence Community Assessment the summary work of all seventeen US Intelligence Agencies?

No, it was not. “In his May 8 testimony to a Senate Judiciary subcommittee hearing, Clapper confirmed … (that) the ICA reflected the views of only three intelligence agencies – CIA, NSA and FBI – not all seventeen”.

2. Did any of the analysts challenge the findings in the ICA?

No, the document failed to acknowledge any dissenting views, which suggests that the analysts were screened in order to create consensus.

3. Were particular analysts chosen to produce the ICA?

Yes, they were “handpicked from the contributing agencies” and drafted the ICA “under the aegis of his former office” (the Office of the Director of National Intelligence.)

4. Was their collaborative work released to the public in its original form?

No, their conclusions “were thoroughly vetted and then approved by the directors of the three agencies and me” (Clapper). This of course suggests that the document was political in nature and crafted to deliver a particular message.

5. Were Clapper’s methods “normal” by Intelligence agency standards?

Definitely not. “This process drastically differed from the Intelligence Community’s normal procedures”.

6. Are Clapper and Brennan partisans who have expressed their opposition to Trump many times in the past calling into question their ability to be objective in executing their duties as heads of their respective agencies?

Absolutely. Check out this clip from Monday’s ArkansasOnline:

 

 

“I think, in many ways, our institutions are under assault, both externally – and that’s the big news here, is the Russian interference in our election system”, said James Clapper, the former director of national intelligence. “I think as well our institutions are under assault internally”.

When he was asked, “Internally, from the president?” Clapper said, “Exactly”. {5}

 

 

Brennan has made numerous similar statements. (Note: It is particularly jarring that Clapper – who oversaw the implementation of the modern surveillance police state – feels free to talk about “the assault on our institutions”)

7. Does the ICA prove that anyone on the Trump campaign colluded with Russia or that Russia meddled in the 2016 elections?

No, it doesn’t. What it shows is that – even while Clapper and Brennan may have been trying to produce an assessment that would “kill two birds with one stone” (incriminate Russia and smear Trump at the same time), the ICA achieved neither. So far, there’s no proof of anything. Now take a look at this list I found in an article at The American Thinker:

 

 

Twelve prominent public statements by those on both sides of the aisle who reviewed the evidence or been briefed on it confirmed there was no evidence of Russia trying to help Trump in the election or colluding with him:

The New York Times (Nov 1, 2016);
House Speaker Paul Ryan (Feb, 26, 2017);
Former DNI James Clapper , March 5, 2017);
Devin Nunes Chairman of the House Intelligence Committee, March 20, 2017);
James Comey, March 20, 2017;
Rep. Chris Stewart, House Intelligence Committee, March 20, 2017;
Rep. Adam Schiff, House Intelligence committee, April 2, 2017);
Senator Dianne Feinstein, Senate Intelligence Committee, May 3, 2017);
Sen. Joe Manchin Senate Intelligence Committee, May 8, 2017;
James Clapper (again) (May 8, 2017);
Rep. Maxine Waters, May 9, 2017);
President Donald Trump,(May 9, 2017).
Senator Grassley, Chairman of the Senate Judiciary committee, indicated that his briefing confirmed Dianne Feinstein’s view that the President was not under investigation for colluding with the Russians. {6}

Keep in mind, this is a list of the people who actually “reviewed the evidence”, and even they are not convinced. It just goes to show that the media blitz is not based on any compelling proof, but on the determination of behind-the-scenes elites who want to destroy their political rivals. Isn’t that what’s really going on?

How does former FBI Director James Comey fit into all this?

First of all, we need to set the record straight on Comey so readers don’t get the impression that he’s the devoted civil servant and all-around stand-up guy he’s made out to be in the media. Here’s a short clip from an article by Human Rights First that will help to put things into perspective:

 

 

Five former FBI agents … raised concerns about his (Comey’s) support for a legal memorandum justifying torture and his defense of holding an American citizen indefinitely without charge. They note that Comey concurred with a May 10 2005, Office of Legal Counsel opinion that authorized torture. While the agents credited Comey for opposing torture tactics in combination and on policy grounds, they note that Comey still approved the legal basis for use of specific torture tactics.

“These techniques include cramped confinement, wall-standing, water dousing, extended sleep deprivation, and waterboarding, all of which constitute torture or cruel, inhuman, or degrading treatment in contravention of domestic and international law”, the letter states.

Those signing the letter to the committee also objected to Comey’s defense of detaining Americans without charge or trial and observed, “Further, Mr Comey vigorously defended the Bush administration’s decision to hold Jose Padilla, a United States citizen apprehended on US soil, indefinitely without charge or trial for years in a military brig in Charleston, South Carolina.” {7}

Get the picture?

Comey is a vicious political opportunist who doesn’t mind breaking a few legs if it’ll advance his career plans. I wouldn’t trust the man as far as I could throw him. Which isn’t far.

American Thinker’s Clarice Feldman explains why Comey launched his counter-intel investigation in July 2016 but failed to notify Congress until March 2017, a full eight months later. Here’s what she said:

 

 

There is only one reasonable explanation for FBI Director James Comey to be launching a counter-intel investigation in July 2016, notifying the White House and Clapper, and keeping it under wraps from congress. Comey was a participant in the intelligence gathering for political purposes – wittingly, or unwittingly. {8}

 

 

Are we suggesting that the heads of the so called Intelligence Community are at war with the Trump Administration and paving the way for impeachment proceedings?

Yep, we sure are. The Russia hacking fiasco is a regime change operation no different than the CIA’s fifty-or-so other oustings in the last seventy years. The only difference is that this operation is on the home field which is why everyone is so flustered. These things are only suppose to happen in those “other” countries.

Does this analysis make me a Donald Trump supporter?

Never. The idea is ridiculous. Trump might be the worst US president of all time, in fact, he probably is. But that doesn’t mean there aren’t other nefarious forces at work behind the smokescreen of democratic government. There are. In fact, this whole flap suggests that there’s an alternate power-structure that operates completely off the public’s radar and has the elected-government in its death-grip. This largely invisible group of elites controls the likes of Brennan, Clapper and Comey. And, apparently, they have enough influence to challenge and maybe even remove an elected president from office. (We’ll see.)

And what’s more surprising, is that the Democrats have aligned themselves with these deep state puppetmasters. They’ve cast their lot with the sinister stewards of the national security state and hopped on the impeachment bandwagon. But is that a wise choice for the Dems?

Author Michael J Glennon doesn’t think so. Here’s what he says in the May edition of Harper’s Magazine:

 

 

Those who would counter the illiberalism of Trump with the illiberalism of unfettered bureaucrats would do well to contemplate the precedent their victory would set …

American history is not silent about the proclivities of unchecked security forces, a short list of which includes the Palmer Raids, the FBI’s blackmailing of civil rights leaders, Army surveillance of the antiwar movement, the NSA’s watch lists, and the CIA’s waterboarding … Who would trust the authors of past episodes of repression as a reliable safeguard against future repression? {9}

 

 

“Who?”

The Democrats, that’s who.

Links:

{1} http://www.foxnews.com/politics/2017/05/16/slain-dnc-staffer-had-contact-with-wikileaks-investigator-says.html

{2} https://consortiumnews.com/2016/12/18/a-spy-coup-in-america

{3} https://consortiumnews.com/2017/01/07/us-report-still-lacks-proof-on-russia-hack/

{4} http://www.foxnews.com/opinion/2017/05/12/more-indications-intel-assessment-russian-interference-in-election-was-rigged.html

{5} http://www.arkansasonline.com/news/2017/may/15/clapper-calls-trump-democracy-assailant/

{6} http://www.americanthinker.com/articles/2017/05/russian_hacking_and_collusion_put_the_cards_on_the_table_.html

{7} http://www.humanrightsfirst.org/press-release/fbi-agents-urge-senate-judiciary-committee-question-comey-torture-indefinite-detention

{8} http://www.americanthinker.com/articles/2017/05/russian_hacking_and_collusion_put_the_cards_on_the_table_.html

{9} https://harpers.org/archive/2017/06/security-breach/3/
http://www.counterpunch.org/2017/05/19/seth-rich-craig-murray-and-the-sinister-stewards-of-the-national-security-state/

Categories: Uncategorized