DECACS, Inc. and all its Initiatives

Archive for the ‘John McCain’ Category

How JFK Gave Us Donald J. Trump (Videos)

When image trumps ideology: How JFK created the template for the modern presidency

File 20170525 23279 1d42o23
President John F. Kennedy watches as planes conduct anti-sub operations during maneuvers off the North Carolina coast in April 1962. Associated Press

Steven Watts, University of Missouri-Columbia
Even at John F. Kennedy’s centennial on May 29, 2017, the 35th president remains an enigma. We still struggle to come to a clear consensus about a leader frozen in time – a man who, in our mind’s eye, is forever young and vigorous, cool and witty. The Conversation

While historians have portrayed him as everything from a nascent social justice warrior to a proto-Reaganite, his political record actually offers little insight into his legacy. A standard “Cold War liberal,” he endorsed the basic tenets of the New Deal at home and projected a stern, anti-Communist foreign policy. In fact, from an ideological standpoint, he differed little from countless other elected officials in the moderate wing of the Democratic Party or the liberal wing of the Republican Party.

Much greater understanding comes from adopting an altogether different strategy: approaching Kennedy as a cultural figure. From the beginning of his career, JFK’s appeal was always more about image than ideology, the emotions he channeled than the policies he advanced.


Generating an enthusiasm more akin to that of a popular entertainer than a candidate for national office, he was arguably America’s first “modern” president. Many subsequent presidents would follow the template he created, from Republicans Ronald Reagan and Donald Trump to Democrats Bill Clinton and Barack Obama.


A cultural icon

JFK pioneered the modern notion of the president as celebrity. The scion of a wealthy family, he became a national figure as a young congressman for his good looks, high-society diversions and status as an “eligible bachelor.”

He hobnobbed with Hollywood actors such as Frank Sinatra and Tony Curtis, hung out with models and befriended singers. He became a fixture in the big national magazines – Life, Look, Time, The Saturday Evening Post – which were more interested in his personal life than his political positions.


Later, Ronald Reagan, the movie actor turned politician, and Donald Trump, the tabloid fixture and star of “The Apprentice,” would translate their celebrity impulses into electoral success. Meanwhile, the saxophone-playing Bill Clinton and the smooth, “no drama” Obama – ever at ease on the talk show circuit – teased out variations of the celebrity role on the Democratic stage.


President Bill Clinton plays ‘Heartbreak Hotel’ on his saxophone during an episode of ‘The Arsenio Hall Show’ in 1992.AP Photo/Reed Saxon


After Kennedy, it was the candidate with the most celebrity appeal who often triumphed in the presidential sweepstakes.

A master of the media

Kennedy also forged a new path with his skillful utilization of media technology. With his movie-star good looks, understated wit and graceful demeanor, he was a perfect fit for the new medium of television.

He was applauded for his televised speeches at the 1956 Democratic convention, and he later prevailed in the famous television debates of the 1960 presidential election. His televised presidential press conferences became media works of art as he deftly answered complex questions, handled reporters with aplomb and laced his responses with wit, quoting literary figures like the Frenchwoman Madame de Staël.


John F. Kennedy gave the first live televised presidential press conference in history on Jan. 25, 1961. AP


Two decades later, Reagan proved equally adept with television, using his acting skills to convey an earnest patriotism, while the lip-biting Clinton projected the natural empathy and communication skills of a born politician. Obama’s eloquence before the cameras became legendary, while he also became an early adopter of social media to reach and organize his followers.

Trump, of course, emerged from a background in reality television and adroitly employed Twitter to circumvent a hostile media establishment, generate attention and reach his followers.


The vigorous male

Finally, JFK reshaped public leadership by exuding a powerful, masculine ideal. As I explore in my book, “JFK and the Masculine Mystique: Sex and Power on the New Frontier,” he emerged in a postwar era colored by mounting concern over the degeneration of the American male. Some blamed the shifting labor market for turning men from independent, manual laborers into corpulent, desk-bound drones within sprawling bureaucracies. Others pointed to suburban abundance for transforming men into diaper-changing denizens of the easy chair and backyard barbecue. And many thought that the advancement of women in the workplace would emasculate their male coworkers.

John F. Kennedy smokes a cigar and reads The New York Times on his boat off the coast of Hyannisport. U.S. National Archives and Records Administration

Enter Jack Kennedy, who promised a bracing revival of American manhood as youthful and vigorous, cool and sophisticated.

In his famous “New Frontier” speech, he announced that “young men are coming to power – men who are not bound by the traditions of the past – young men who can cast off the old slogans and delusions and suspicions.”


In a Sports Illustrated article titled “The Soft American,” he advocated a national physical fitness crusade. He endorsed a tough-minded realism to shape the counterinsurgency strategies that were deployed to combat Communism, and he embraced the buccaneering style of the CIA and the Green Berets. He championed the Mercury Seven astronauts as sturdy, courageous males who ventured out to conquer the new frontier of space.


JFK’s successors adopted many of these same masculine themes. Reagan positioned himself as a manly, tough-minded alternative to a weak, vacillating Jimmy Carter. Clinton presented himself as a pragmatic, assertive, virile young man whose hardscrabble road to success contrasted with the privileged, preppy George H.W. Bush. Obama impressed voters as a vigorous, athletic young man who scrimmaged with college basketball teams – a contrast to the cranky, geriatric John McCain and a stiff, pampered Mitt Romney.


More recently, of course, Trump’s outlandish masculinity appealed to many traditionalists unsettled by a wave of gender confusion, women in combat, weeping millennial “snowflakes” and declining numbers of physically challenging manufacturing jobs in the country’s post-industrial economy. No matter how crudely, the theatrically male businessman promised a remedy.


So as we look back at John F. Kennedy a century after his birth, it seems ever clearer that he ascended the national stage as our first modern president. Removed from an American political tradition of grassroots electioneering, sober-minded experience and bourgeois morality, this youthful, charismatic leader reflected a new political atmosphere that favored celebrity appeal, media savvy and masculine vigor. He was the first American president whose place in the cultural imagination dwarfed his political positions and policies.

Just as style made the man with Kennedy, it also remade the American presidency. It continues to do so today.

Steven Watts, Professor of History, University of Missouri-Columbia
This article was originally published on The Conversation. Read the original article.

LINKS OF INTEREST:

Advertisements

The Hypocrisy of Trump’s Attack On Syria (Videos)

The Hypocrisy of Trump’s Attack on Syria

Let’s start with the incessant look the other way when the US government, its pharmaceuticals, its AMA, its FDA and many other so called health organizations that allow experiments to go on unabated, many times with poor and unsuspecting candidates for the testing.
Some few years ago, I read a book called “The Outsiders”, I believe, it was about deviant behavior in American society. One of the experiments was to build projects. They first experimented with rats. Then they took it to the poor, piling them up in buildings living on top of one another to see what would happen. They also use colors and landscaping to create a prison like environment to see how folks would react. 
Of course the crime rate escalated along with various other animalies. Great way to depopulate, imprison, sicken, and retard a group of people.
Ironically, the mass of people in one area became a voting block. So they had to tear the buildings down so they could redistrict the masses. 
One of the things that amazes me about these “so called” experiments is how they really don’t see futuristically nor do they understand human nature.
A large group of people in one area can bolster the economy of that area as well. Imagine the economists, the social engineers and the politicians fighting around the table about what plan to implement next according to who will benefit. So we see the plan being put in place, dismantled and then re-implemented at various points in the cycle. However the goal is always the same. Remove the undesirables, benefit from their destruction and do it all in secret or under the onus of some kind of illusive humanitarian goal.

What gets me about these folks who think the US and its allies are their friends when they constantly turn against them when they don’t play ball. Syria is not part of the World Bank Organization.
Ironically, Syria was a great friend to the US during the first stages of the Iraq war when it was using its prisons for so called suspected terrorists. Extraordinary rendition, remember that? Assad was not president at the time. But their prisons were used to house these suspects without trial.
And do you remember when they gave Sadaam Hussein gas to poison the Kurds and to help in his war against Iran? And do you remember that they were already bombing Iraq and had severe sanctions on it, even before the so called fear mongering around WMD. Of course they had them, because the US gave them to them, but they got rid of them too. But that was old news.
So yeah, folks do have short memories and that is why folks are so easily lead down the crocked path to trouble.
If you know anything about war strategy and if we know anything about 911 and bombing Iraq under a false pretense, then you know it takes weeks and weeks of planning sometimes months and maybe even years to actually rain down the bombs.
This stuff was put into motion and at the ready long before Trump got in there, he is just another fall guy, another puppet for the globalist agenda. If his supporters don’t see this , we’ll they are a party to the same mania the Obamabots had/have. Statism is a disease that eats away at personal sovereignty.
Did Syria Receive Its Chemical Weapons from Saddam?
LEFTIST MYTH BUSTED: Saddam moved WMDs to Syria
Syria Crisis Changes Trump’s Worldview
Are Syria’s Chemical Weapons Iraq’s Missing WMD? Obama’s Director of Intelligence Thought So.
GOP Congressman Endorses Bogus Theory That Syria Got Its Chemical Weapons From Saddam
BREAKING: Order Out of Chaos – WH Press Secretary Has Freudian Slip on Real Reason US Is In Syria
Evidence Calls Western Narrative About Syrian Chemical Attack Into Question
Intelligence and Military Sources Who Warned About WMD Lies Before Iraq War Now Say that Assad Did NOT Use Chemical Weapons
For everyone that keeps arguing that the Government wouldn’t secretly poison Black people… First of all, you must not have heard of the Tuskegee experiment. And second, have you ever heard of Slavery? That was done by THIS Government you are defending as well. So was Jim Crow and a thousand other things. But this next story should make you understand how low they can, will, and DO go. Keep your guard down if you want to.

Who Was Behind the Cyberattack on Sony?

Who Was Behind the Cyberattack on Sony?

by GREGORY ELICH

The cyberattack on Sony Pictures unleashed a torrent of alarmist media reports, evoking the image of North Korean perfidy. Within a month, the FBI issued a statement declaring the North Korean government “responsible for these actions.” Amid the media frenzy, several senators and congresspersons called for tough action. Arizona Senator John McCain blustered, “It’s a new form of warfare that we’re involved in, and we need to react and react vigorously.” President Barack Obama announced his administration planned to review the possibility of placing North Korea on the list of states sponsoring terrorism, a move that would further tighten the already harsh sanctions on North Korea. “They caused a lot of damage, and we will respond,” Obama warned darkly. “We will respond proportionally, and we’ll respond in a place and time and manner that we choose.”

In the rush to judgment, few were asking for evidence, and none was provided. Computer security analysts, however, were vocal in their skepticism.

In its statement, the FBI offered only a few comments to back its attribution of North Korean responsibility. “Technical analysis of the data deletion malware used in the attack revealed links to other malware that the FBI knows North Korean actors previously developed,” it reported, including “similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.” The FBI went on to mention that the IP addresses used in the Sony hack were associated with “known North Korean infrastructure.” Tools used in the attack “have similarities to a cyberattack in March of last year against South Korean banks and media outlets, which was carried out by North Korea.”

The major problem with the evidence offered by the FBI is that it is self-referential, all of it pointing back to the 2013 attack on South Korean banks and media that was carried out by the DarkSeoul gang. At that time, without supplying any supporting evidence, the United States accused North Korea of being behind DarkSeoul. In effect, the FBI argues that because the U.S. spread the rumor of North Korean involvement in the earlier attack, and some of the code is related, this proves that North Korea is also responsible for the Sony hack. One rumor points to another rumor as ‘proof,’ rendering the argument meaningless.

The logical fallacies are many. To date, no investigation has uncovered the identity of DarkSeoul, and nothing is known about the group. The linking of DarkSeoul to North Korea is purely speculative. “One point that can’t be said enough,” emphasizes Risk Based Security, “is that ‘attribution is hard’ given the nature of computer intrusions and how hard it is to ultimately trace an attack back to a given individual or group. Past attacks on Sony have not been solved, even years later. The idea that a mere two weeks into the investigation and there is positive attribution, enough to call this an act of war, seems dangerous and questionable.”

Consider some of the other flaws in the FBI’s statement. The IP addresses that were hard-coded in the malware used in the Sony hack belonged to servers located in Thailand, Poland, Italy, Bolivia, Singapore, Cypress, and the United States. The FBI implies that only the Democratic People’s Republic of Korea (DPRK – the formal name for North Korea) could have used these servers. The Thai port is a proxy that is commonly used in sending spam and malware. The same is true of the Polish and Italian servers. All of the servers used in the Sony attack have been previously compromised and are among the many computers that are widely known and used by hackers and spam distributors. Anyone with the knowhow can use them.

Whether or not these machines were used is another matter. Hackers often use proxy machines with phony IP addresses to mislead investigators. No hackers use their own computers to launch an attack. Vulnerable systems are hijacked in order to route traffic. For the FBI to point to IP addresses either reveals a fundamental misunderstanding of cybersecurity or a cynical attempt to deliberately mislead the public.

The Sony hack also bears similarities with the 2012 Shamoon cyberattack on computers belonging to Saudi Aramco. Those responsible for that attack have never been identified either, although the United States accused Iran without providing any evidence. Using the FBI’s logic, one could just as easily argue that the Sony hack was the work of Iran. One groundless accusation is used to buttress another. As evidentiary matter, it is worthless. It should also be recalled that in 1998, the United States blamed Iraq for the Solar Sunrise hack into Defense Department computers, only for it be ultimately revealed that it was the act of a few teenagers.

Nor do the similarities in code between the Sony hack and the earlier Shamoon and DarkSeoul attacks indicate a shared responsibility. Malware is freely available on the black market. Hackers operate by purchasing or borrowing, and then tweaking commonly available software, including both illegal and legal components. Code is shared among hackers on forums, and malware is assembled by linking various elements together.

One of the components used in the Sony cyberattack was the RawDisk library from EldoS, a commercial application that allows direct access to Windows hardware bypassing security. Anyone can legally purchase this software. There is nothing to tie it to the DPRK.

“There’s a lot of malware that’s shared between different groups, and all malware is built on top of older malware,” reports Brian Martin of Risk Based Security. “They’re also built on top of hacking tools. For example, you’ll find lots of malware that uses pieces of code from popular tools like Nmap. Does that mean that the guy who wrote Nmap is a malware author? No. Does it mean he works for North Korea? No.”

Robert Graham of Errata Security regards the evidence offered by the FBI as “complete nonsense. It sounds like they’ve decided on a conclusion and are trying to make the evidence fit.” Graham adds: “There is nothing unique in the software. We know that hackers share malware on forums. Every hacker in the world has all the source code available.”

Trojan-Destover, the malware used in the Sony cyberattack, included at least six components utilized earlier by Shamoon and DarkSeoul. “Even in such damaging scenarios, the cyber attacker’s tools are reused,” points out Sariel Moshe of CyActive. “For them, if it worked once, tweak it a bit and it will work again. The attack on Sony demonstrates quite clearly that this method works quite well.” Indeed, while Shamoon and DarkSeoul are the most commonly mentioned predecessors to the Sony hack, it is thought that this software has been used on several occasions in the past against multiple targets.

The software utilized in the Sony cyberattack is atypical for a nation state. “It’s a night and day difference in quality,” says Craig Williams of Cisco’s Talos Security Intelligence and Research Group. “The code is simplistic, not very complex, and not very obfuscated.”

Four files used in the attack were compiled on a machine set to the Korean language. That fact proves nothing, notes computer security analyst Chris Davis. “That is pretty weak evidence. I could compile malware code that used Afrikaans and where the timestamp matched JoBerg in about five seconds.” Any reasonably competent hacker would change the language setting in order to misdirect investigators. Had North Korean conducted this attack, it certainly would have taken the basic step of changing the language setting on the machine used to compile code.

What about North Korean resentment over Sony Picture’s tasteless lowbrow comedy, The Interview, which portrays the assassination of DPRK leader Kim Jong-un? It is doubtful that Americans would find themselves any more amused by a foreign comedy on the subject of killing a U.S. president than the North Koreans are by The Interview.

Among the emails leaked by the cyberattack on Sony was a message from Bruce Bennett of the Rand Corporation. Bennett was a consultant on the film and opposed toning down the film’s ending. “I have been clear that the assassination of Kim Jong-un is the most likely path to a collapse of the North Korean government,” he wrote, adding that DVD leaks of the film into North Korea “will start some real thinking.” In another message, Sony CEO Michael Lynton responded: “Bruce – Spoke to someone very senior in State (confidentially). He agreed with everything you have been saying. Everything.” Lynton was also communicating with Robert King, U.S. Special Envoy for North Korean Human Rights Issues in regard to the film.

The Western media portray North Korean reaction to The Interview as overly sensitive and irrational, while U.S. officials and a Rand Corporation consultant saw the film as having the potential to inspire the real-life assassination of Kim Jong-un. The scene of Kim’s assassination was not intended merely for so-called ‘entertainment.’

The mass media raced to attribute the Sony hack to the DPRK, based on its reaction to the Sony film. A closer look at the cyberattack reveals a more likely culprit, however. The group taking responsibility for the hack calls itself ‘Guardians of Peace’, and in one of the malware files the alternate name of ‘God’sApstls’ is also used. In the initial attack, no reference was made to the film, nor was it mentioned in subsequent emails the attackers sent to Sony. Instead, the hackers attempted to extort money: “Monetary compensation we want. Pay the damage, or Sony Pictures will be bombarded as whole.”

In an interview with CSO Online, a person represented as belonging to Guardians of Peace said the group is “an international organization…not under the direction of any state,” and included members from several nations. “Our aim is not at the film The Interview as Sony Pictures suggests,” the hacker wrote, but mentioned that the release of a film that had the potential of threatening peace was an example of the “greed of Sony Pictures.”

For two weeks following the cyberattack, the media harped on the subject of North Korean culpability. Only after that point did the Guardians of Peace (GOP) make its first public reference to The Interview, denying any connection with the DPRK. Yet another week passed before the GOP denounced the movie and threatened to attack theaters showing the film.

It appears that the narrative of North Korean involvement repeated ad nauseam by the media and the U.S. government presented a gift to the hackers too tempting to pass up. The GOP played to the dominant theme and succeeded in solidifying the tendency to blame the DPRK, with the effect of ensuring that no investigation would pursue the group.

For its part, the Obama Administration chose to seize the opportunity to bolster its anti-North Korea policy in preference over tracking down the culprits.

There are strong indications that the cyberattack involved one or more disgruntled Sony employees or ex-employees, probably working together with experienced hackers. The malware used against Sony had been modified to include hard-coded file paths and server names. System administrator user names and passwords were also hard-coded. Only someone having full access with system administrator privileges to Sony’s computer network could have obtained this information.

The GOP could have hacked into the Sony system months beforehand in order to gather that data. But it is more likely that someone with knowledge of Sony’s network configuration provided the information. Arguing against the possibility that critical information had been siphoned beforehand through a hack, cybersecurity expert Hemanshu Nigam observes, “If terabytes of data left the Sony networks, their network detection systems would have noticed easily. It would also take months for a hacker to figure out the topography of the Sony networks to know where critical assets are stored and to have access to the decryption keys needed to open up the screeners that have been leaked.”

The most likely motivation for the attack was revenge on the part of current or former Sony employees. “My money is on a disgruntled (possibly ex) employee of Sony,” Marc Rogers of CloudFlare wrote. “Whoever did this is in it for the revenge. The info and access they had could have easily been used to cash out, yet, instead, they are making every effort to burn Sony down. Just think what they could have done with passwords to all of Sony’s financial accounts.”

Nation states never conduct such noisy hacking operations. Their goal is to quietly infiltrate a system and obtain information without detection. Sony had no data that would have been of interest to a nation state. Computer security blogger The Grugq wrote, “I can’t see the DPRK putting this sort of valuable resource onto what is essentially a petty attack against a company that has no strategic value.”

It would have been reckless for a North Korean team to draw attention to itself. Cybersecurity specialist Chris Davis says, “All the activity that was reported screams Script Kiddie to me. Not advanced state-sponsored attack.” Davis adds, “Well, the stupid skeleton pic they splashed on all the screens on the workstations inside Sony…is not something a state-sponsored attack would do…Would ANY self-respecting state-sponsored actor use something as dumb as that?” The consensus among cybersecurity experts is clear, Davis argues. “The prevalent theory I am seeing in the closed security mailing lists is an internet group of laid off Sony employees.”

Following his cybersecurity firm’s investigation, Kurt Stammberger of Norse echoes that view. “Sony was not just hacked. This is a company that was essentially nuked from the inside. We are very confident that this was not an attack master-minded by North Korea and that insiders were key to the implementation of one of the most devastating attacks in history.”

“What is striking here is how well they knew to exploit Sony’s vulnerabilities,” reports Nimrod Kozlovski of JVP Labs. “The malware itself is not creative or new; there are plenty of actors that could have manifested this particular attack.” The hackers “knew more about the company, Sony, and its vulnerabilities than they knew, or needed to know, about hacking.”

As an indication of the hacker’s real motivation, it should be noted that the first communications focused on a different issue than the Sony film. The content of an email sent by the GOP to the IDG News Service refers to Sony’s restructuring, in which thousands of employees lost their jobs: “Sony and Sony Pictures have made terrible racial discrimination and human rights violation, indiscriminate tyranny and restructuring in recent years. It has brought damage to a lot of people, some of whom are among us. Nowadays, Sony Pictures is about to prey on the weak with a plan of another indiscriminate restructuring for their own benefits. This became a decisive motive for our action.” In an email to The Verge, the GOP wrote, “We want equality. Sony doesn’t…We worked with other staff with similar interests to get in.”

Seeking to diffuse tensions, North Korea proposed to conduct a joint investigation with the United States into the Sony cyberattack. Predictably, the United States quickly rebuffed the offer. National Security Council spokesman Mark Stroh arrogantly responded, “If the North Korean government wants to help, they can admit their culpability and compensate Sony for the damages this attack caused.” North Korea can hardly be expected to accept blame for an act it did not commit. But getting to the truth of the matter was the farthest thing from the Obama Administration’s mind. Similarly, U.S. officials are ignoring requests from cybersecurity experts to be allowed to analyze the Destover code. “They’re worried we’ll prove them wrong,” Robert Graham concludes.

The Obama Administration’s outrage over the Sony attack contains more than a small measure of hypocrisy. It was the United States that launched the Stuxnet attack that destroyed many of Iran’s nuclear centrifuges. According to a Washington Post article published in 2013, the United States conducted 231 cyber operations throughout the world two years before. The National Security Agency, as is now well known, regularly hacks into computer networks, scooping up vast amounts of data. The GENIE program, the Post reported, was projected to have broken into and installed implants in 85,000 computers by the end of 2013. It was reported that GENIE’s next phase would implement an automated system that could install “potentially millions of implants” for gathering data “and active attack.” According to former deputy of defense secretary William J. Lynn III, “The policy debate has moved so that offensive options are more prominent now.”

Contrast the mild treatment the media gave to the recent large-scale hacks into Target, Home Depot and JP Morgan, in which millions of credit cards and personal information were stolen, with the coverage of the cyberattack on Sony Pictures. It is impossible to avoid the conclusion that political considerations are driving the media furor over the latter case.

After six years in office, the Obama Administration has yet to engage in dialogue or diplomacy with North Korea. It prefers to maintain a wall of hostility, blocking any prospect of progress or understanding between the two nations.

Already, North Korean websites have been targeted by persistent denial of service operations. Whether the attacks were launched by a U.S. government cyber team or independent hackers inspired by media reports is not known. In any case, President Obama has already promised to take unspecified action against the DPRK. Actual responsibility for the Sony attack is irrelevant. Backed by media cheerleading, U.S officials are using the cyberattack as a pretext to ratchet up pressure on North Korea. Any action the Obama Administration takes is likely to trigger a response, and we could enter a dangerous feedback loop of action/counteraction.

Gregory Elich is on the Board of Directors of the Jasenovac Research Institute and the Advisory Board of the Korea Policy Institute. He is a member of the Committee to Defend Democracy in South Korea and a columnist for Voice of the People. He is also one of the co-authors of Killing Democracy: CIA and Pentagon Operations in the Post-Soviet Period, published in the Russian language.

Gregory Elich is on the Board of Directors of the Jasenovac Research Institute and the Advisory Board of the Korea Policy Institute. He is a member of the Committee to Defend Democracy in South Korea and a columnist for Voice of the People. He is also one of the co-authors ofKilling Democracy: CIA and Pentagon Operations in the Post-Soviet Period, published in the Russian language.

Tag Cloud