Archive for the ‘propaganda’ Category
"The Making of Donald Trump": David Cay Johnston on Trump’s Ties to the Mob (video)
Nana’s Christmas Rant, 2015
Nana’s Christmas Rant
I wrote this rant, last year in December, 2014. To be honest not much has changed since then. In fact, it seems that some of the things mentioned in this post last year have gotten progressively worse!After reading it again, I could not help but think, “Play it Again, Sam!”There is an interesting twist to this year’s Christmas rant… Now we have to add “Justice Or Else” and “BlackLivesMatter” and aren’t we supposed to be boycotting? Whatever happened to hope and change? So, I am going to leave this Rant pretty much intact. All you really have to do is change the date from 2014 to 2015 and add, “More Of the Same” after every paragraph.I would like to add however, that this year has me aching in my heart because not only is this the biggest disinfo campaign of the past 2000 years, modern day man continues to deceive his/her children about some fat white dude coming down some chimney to bring them toys! Let’s just look at that aspect of this bizarre story. How many houses have chimneys anymore? I mean, we got condos and high-rise buildings and apartment complexes, and ain’t no damned chimneys nowhere in their homes! Why don’t these modern day children, with all manner of access to technology and information, tell their parents to stop lying to them? Sigh.
xmas traffic accident |
Christmas & White Supremacy/Capitalism/Consumerism
2. An obsession with grandiose or extravagant things or actions.
The Rise of the American-Muslim Totalitarian State
“The DOJ claims that in planning and waging the Iraq War, ex-President Bush and key members of his Administration were acting within the legitimate scope of their employment and are thus immune from suit,” chief counsel Inder Comar of Comar Law said. Source
CIA agent Robert Baer: “If you want a serious interrogation, you send a prisoner to Jordan. If you want them to be tortured, you send them to Syria. If you want someone to disappear — never to see them again — you send them to Egypt.” Source
“The report also shows that as many as 54 foreign governments reportedly participated in these operations in various ways, including by hosting CIA prisons on their territories; detaining, interrogating, torturing, and abusing individuals; assisting in the capture and transport of detainees; permitting the use of domestic airspace and airports for secret flights transporting detainees; providing intelligence leading to the secret detention and extraordinary rendition of individuals; and interrogating individuals who were secretly being held in the custody of other governments. Foreign governments also failed to protect detainees from secret detention and extraordinary rendition on their territories and to conduct effective investigations into agencies and officials who participated in these operations.
The 54 governments identified in this report span the continents of Africa, Asia, Australia, Europe, and North America, and include: Afghanistan, Albania, Algeria, Australia, Austria, Azerbaijan, Belgium, Bosnia-Herzegovina, Canada, Croatia, Cyprus, the Czech Republic, Denmark, Djibouti, Egypt, Ethiopia, Finland, Gambia, Georgia, Germany, Greece, Hong Kong, Iceland, Indonesia, Iran, Ireland, Italy, Jordan, Kenya, Libya, Lithuania, Macedonia, Malawi, Malaysia, Mauritania, Morocco, Pakistan, Poland, Portugal, Romania, Saudi Arabia, Somalia, South Africa, Spain, Sri Lanka, Sweden, Syria, Thailand, Turkey, United Arab Emirates, United Kingdom, Uzbekistan, Yemen, and Zimbabwe.” Source
Muslim-Americans are living in a totalitarian police state with worsening harassment, profiling, and surveillance. The United States’ government may claim liberty and justice for all; however, in practice, towards Muslims, it exhibits all four major characteristics of a totalitarian state: a war on terror that targets Muslims abroad, a totalitarian police state at home, public executions by drones and gulags outside the rule of law, and a strong reliance on propaganda and political demagoguery.
In 2007, a politician who was vehemently against the human rights abuses at Guantanamo Bay, explained what he would do about the torture camp if he ever became President:
American cinema and music have always been a remarkably effective means of whipping up xenophobic wartime sentiment. For example, the highest grossing war film in history, American Sniper, and President Obama’s favorite television show, Homeland, both engage in an overly broad generalization of Islam, and depict Muslims and terrorists in a way that is indicative of widespread Islamophobia in American culture.
precedent. The Chinese Exclusion Act of 1882 effectively banned all Chinese immigration to the US. This racist law remained in place for five decades and required all Chinese to carry identification certificates or face deportation. When Trump endorsed identification cards to be worn at all times by American Muslims, his popularity jumped almost 3 percentage points. If Donald Trump’s policies are viewed by Americans as odious and un-American, then why has he consistently gained popularity after every anti-Muslim outburst?
Petro-Politics = Russian military operation in Syria bolsters oil market, domestic stocks
NANA’S COMMENTARY
LOL, it’s all about the war, the fighting, the blood and the gore that makes the stocks rise and the blood boil in delirium. Funny how war makes the cash registers ring and the banksters happy, they don’t care who does it, just do it!! what a mad, mad, mad world we live in.
Not to mention this has gone on far too long and those folks are jumping ship, thousands at a time and finding their way into Europe.
And the reality is, when the war comes home, somebody says, wth??? We thought they would just kill them all off there, and have mass graves to bury them in, why are they escaping and why the hell are they coming here, hey wait a minute, nobody told us this would be the “blowback”!!! What the f*****k? And we all know they ain’t gonna go live with the Queen, nor is she gonna provide them a sovereign land to live on, even though she is the biggest land owner in the world, and she ain’t gonna roll over Beethoven and open up the Taj Mahal for them to hang out in, and forget it, tent cities all over Europe is an eyesore.
Forget the xenophobia, the antisemitism, the urban blight, the destruction of our way of life….? Keep they arses over thar where they belong (misspelling for emphasis). Hahahahah, I can’t stop laughing at this debacle. But funnier than that is the next stupid nation that sides with these war criminals, thinking they are gonna get more than crumbs from the pie. SMDH, when will they ever learn……???
Syrians waiting to cross into Turkey |
Russian military operation in Syria bolsters oil market, domestic stocks
Who Was Behind the Cyberattack on Sony?
Who Was Behind the Cyberattack on Sony?
by GREGORY ELICH
The cyberattack on Sony Pictures unleashed a torrent of alarmist media reports, evoking the image of North Korean perfidy. Within a month, the FBI issued a statement declaring the North Korean government “responsible for these actions.” Amid the media frenzy, several senators and congresspersons called for tough action. Arizona Senator John McCain blustered, “It’s a new form of warfare that we’re involved in, and we need to react and react vigorously.” President Barack Obama announced his administration planned to review the possibility of placing North Korea on the list of states sponsoring terrorism, a move that would further tighten the already harsh sanctions on North Korea. “They caused a lot of damage, and we will respond,” Obama warned darkly. “We will respond proportionally, and we’ll respond in a place and time and manner that we choose.”
In the rush to judgment, few were asking for evidence, and none was provided. Computer security analysts, however, were vocal in their skepticism.
In its statement, the FBI offered only a few comments to back its attribution of North Korean responsibility. “Technical analysis of the data deletion malware used in the attack revealed links to other malware that the FBI knows North Korean actors previously developed,” it reported, including “similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks.” The FBI went on to mention that the IP addresses used in the Sony hack were associated with “known North Korean infrastructure.” Tools used in the attack “have similarities to a cyberattack in March of last year against South Korean banks and media outlets, which was carried out by North Korea.”
The major problem with the evidence offered by the FBI is that it is self-referential, all of it pointing back to the 2013 attack on South Korean banks and media that was carried out by the DarkSeoul gang. At that time, without supplying any supporting evidence, the United States accused North Korea of being behind DarkSeoul. In effect, the FBI argues that because the U.S. spread the rumor of North Korean involvement in the earlier attack, and some of the code is related, this proves that North Korea is also responsible for the Sony hack. One rumor points to another rumor as ‘proof,’ rendering the argument meaningless.
The logical fallacies are many. To date, no investigation has uncovered the identity of DarkSeoul, and nothing is known about the group. The linking of DarkSeoul to North Korea is purely speculative. “One point that can’t be said enough,” emphasizes Risk Based Security, “is that ‘attribution is hard’ given the nature of computer intrusions and how hard it is to ultimately trace an attack back to a given individual or group. Past attacks on Sony have not been solved, even years later. The idea that a mere two weeks into the investigation and there is positive attribution, enough to call this an act of war, seems dangerous and questionable.”
Consider some of the other flaws in the FBI’s statement. The IP addresses that were hard-coded in the malware used in the Sony hack belonged to servers located in Thailand, Poland, Italy, Bolivia, Singapore, Cypress, and the United States. The FBI implies that only the Democratic People’s Republic of Korea (DPRK – the formal name for North Korea) could have used these servers. The Thai port is a proxy that is commonly used in sending spam and malware. The same is true of the Polish and Italian servers. All of the servers used in the Sony attack have been previously compromised and are among the many computers that are widely known and used by hackers and spam distributors. Anyone with the knowhow can use them.
Whether or not these machines were used is another matter. Hackers often use proxy machines with phony IP addresses to mislead investigators. No hackers use their own computers to launch an attack. Vulnerable systems are hijacked in order to route traffic. For the FBI to point to IP addresses either reveals a fundamental misunderstanding of cybersecurity or a cynical attempt to deliberately mislead the public.
The Sony hack also bears similarities with the 2012 Shamoon cyberattack on computers belonging to Saudi Aramco. Those responsible for that attack have never been identified either, although the United States accused Iran without providing any evidence. Using the FBI’s logic, one could just as easily argue that the Sony hack was the work of Iran. One groundless accusation is used to buttress another. As evidentiary matter, it is worthless. It should also be recalled that in 1998, the United States blamed Iraq for the Solar Sunrise hack into Defense Department computers, only for it be ultimately revealed that it was the act of a few teenagers.
Nor do the similarities in code between the Sony hack and the earlier Shamoon and DarkSeoul attacks indicate a shared responsibility. Malware is freely available on the black market. Hackers operate by purchasing or borrowing, and then tweaking commonly available software, including both illegal and legal components. Code is shared among hackers on forums, and malware is assembled by linking various elements together.
One of the components used in the Sony cyberattack was the RawDisk library from EldoS, a commercial application that allows direct access to Windows hardware bypassing security. Anyone can legally purchase this software. There is nothing to tie it to the DPRK.
“There’s a lot of malware that’s shared between different groups, and all malware is built on top of older malware,” reports Brian Martin of Risk Based Security. “They’re also built on top of hacking tools. For example, you’ll find lots of malware that uses pieces of code from popular tools like Nmap. Does that mean that the guy who wrote Nmap is a malware author? No. Does it mean he works for North Korea? No.”
Robert Graham of Errata Security regards the evidence offered by the FBI as “complete nonsense. It sounds like they’ve decided on a conclusion and are trying to make the evidence fit.” Graham adds: “There is nothing unique in the software. We know that hackers share malware on forums. Every hacker in the world has all the source code available.”
Trojan-Destover, the malware used in the Sony cyberattack, included at least six components utilized earlier by Shamoon and DarkSeoul. “Even in such damaging scenarios, the cyber attacker’s tools are reused,” points out Sariel Moshe of CyActive. “For them, if it worked once, tweak it a bit and it will work again. The attack on Sony demonstrates quite clearly that this method works quite well.” Indeed, while Shamoon and DarkSeoul are the most commonly mentioned predecessors to the Sony hack, it is thought that this software has been used on several occasions in the past against multiple targets.
The software utilized in the Sony cyberattack is atypical for a nation state. “It’s a night and day difference in quality,” says Craig Williams of Cisco’s Talos Security Intelligence and Research Group. “The code is simplistic, not very complex, and not very obfuscated.”
Four files used in the attack were compiled on a machine set to the Korean language. That fact proves nothing, notes computer security analyst Chris Davis. “That is pretty weak evidence. I could compile malware code that used Afrikaans and where the timestamp matched JoBerg in about five seconds.” Any reasonably competent hacker would change the language setting in order to misdirect investigators. Had North Korean conducted this attack, it certainly would have taken the basic step of changing the language setting on the machine used to compile code.
What about North Korean resentment over Sony Picture’s tasteless lowbrow comedy, The Interview, which portrays the assassination of DPRK leader Kim Jong-un? It is doubtful that Americans would find themselves any more amused by a foreign comedy on the subject of killing a U.S. president than the North Koreans are by The Interview.
Among the emails leaked by the cyberattack on Sony was a message from Bruce Bennett of the Rand Corporation. Bennett was a consultant on the film and opposed toning down the film’s ending. “I have been clear that the assassination of Kim Jong-un is the most likely path to a collapse of the North Korean government,” he wrote, adding that DVD leaks of the film into North Korea “will start some real thinking.” In another message, Sony CEO Michael Lynton responded: “Bruce – Spoke to someone very senior in State (confidentially). He agreed with everything you have been saying. Everything.” Lynton was also communicating with Robert King, U.S. Special Envoy for North Korean Human Rights Issues in regard to the film.
The Western media portray North Korean reaction to The Interview as overly sensitive and irrational, while U.S. officials and a Rand Corporation consultant saw the film as having the potential to inspire the real-life assassination of Kim Jong-un. The scene of Kim’s assassination was not intended merely for so-called ‘entertainment.’
The mass media raced to attribute the Sony hack to the DPRK, based on its reaction to the Sony film. A closer look at the cyberattack reveals a more likely culprit, however. The group taking responsibility for the hack calls itself ‘Guardians of Peace’, and in one of the malware files the alternate name of ‘God’sApstls’ is also used. In the initial attack, no reference was made to the film, nor was it mentioned in subsequent emails the attackers sent to Sony. Instead, the hackers attempted to extort money: “Monetary compensation we want. Pay the damage, or Sony Pictures will be bombarded as whole.”
In an interview with CSO Online, a person represented as belonging to Guardians of Peace said the group is “an international organization…not under the direction of any state,” and included members from several nations. “Our aim is not at the film The Interview as Sony Pictures suggests,” the hacker wrote, but mentioned that the release of a film that had the potential of threatening peace was an example of the “greed of Sony Pictures.”
For two weeks following the cyberattack, the media harped on the subject of North Korean culpability. Only after that point did the Guardians of Peace (GOP) make its first public reference to The Interview, denying any connection with the DPRK. Yet another week passed before the GOP denounced the movie and threatened to attack theaters showing the film.
It appears that the narrative of North Korean involvement repeated ad nauseam by the media and the U.S. government presented a gift to the hackers too tempting to pass up. The GOP played to the dominant theme and succeeded in solidifying the tendency to blame the DPRK, with the effect of ensuring that no investigation would pursue the group.
For its part, the Obama Administration chose to seize the opportunity to bolster its anti-North Korea policy in preference over tracking down the culprits.
There are strong indications that the cyberattack involved one or more disgruntled Sony employees or ex-employees, probably working together with experienced hackers. The malware used against Sony had been modified to include hard-coded file paths and server names. System administrator user names and passwords were also hard-coded. Only someone having full access with system administrator privileges to Sony’s computer network could have obtained this information.
The GOP could have hacked into the Sony system months beforehand in order to gather that data. But it is more likely that someone with knowledge of Sony’s network configuration provided the information. Arguing against the possibility that critical information had been siphoned beforehand through a hack, cybersecurity expert Hemanshu Nigam observes, “If terabytes of data left the Sony networks, their network detection systems would have noticed easily. It would also take months for a hacker to figure out the topography of the Sony networks to know where critical assets are stored and to have access to the decryption keys needed to open up the screeners that have been leaked.”
The most likely motivation for the attack was revenge on the part of current or former Sony employees. “My money is on a disgruntled (possibly ex) employee of Sony,” Marc Rogers of CloudFlare wrote. “Whoever did this is in it for the revenge. The info and access they had could have easily been used to cash out, yet, instead, they are making every effort to burn Sony down. Just think what they could have done with passwords to all of Sony’s financial accounts.”
Nation states never conduct such noisy hacking operations. Their goal is to quietly infiltrate a system and obtain information without detection. Sony had no data that would have been of interest to a nation state. Computer security blogger The Grugq wrote, “I can’t see the DPRK putting this sort of valuable resource onto what is essentially a petty attack against a company that has no strategic value.”
It would have been reckless for a North Korean team to draw attention to itself. Cybersecurity specialist Chris Davis says, “All the activity that was reported screams Script Kiddie to me. Not advanced state-sponsored attack.” Davis adds, “Well, the stupid skeleton pic they splashed on all the screens on the workstations inside Sony…is not something a state-sponsored attack would do…Would ANY self-respecting state-sponsored actor use something as dumb as that?” The consensus among cybersecurity experts is clear, Davis argues. “The prevalent theory I am seeing in the closed security mailing lists is an internet group of laid off Sony employees.”
Following his cybersecurity firm’s investigation, Kurt Stammberger of Norse echoes that view. “Sony was not just hacked. This is a company that was essentially nuked from the inside. We are very confident that this was not an attack master-minded by North Korea and that insiders were key to the implementation of one of the most devastating attacks in history.”
“What is striking here is how well they knew to exploit Sony’s vulnerabilities,” reports Nimrod Kozlovski of JVP Labs. “The malware itself is not creative or new; there are plenty of actors that could have manifested this particular attack.” The hackers “knew more about the company, Sony, and its vulnerabilities than they knew, or needed to know, about hacking.”
As an indication of the hacker’s real motivation, it should be noted that the first communications focused on a different issue than the Sony film. The content of an email sent by the GOP to the IDG News Service refers to Sony’s restructuring, in which thousands of employees lost their jobs: “Sony and Sony Pictures have made terrible racial discrimination and human rights violation, indiscriminate tyranny and restructuring in recent years. It has brought damage to a lot of people, some of whom are among us. Nowadays, Sony Pictures is about to prey on the weak with a plan of another indiscriminate restructuring for their own benefits. This became a decisive motive for our action.” In an email to The Verge, the GOP wrote, “We want equality. Sony doesn’t…We worked with other staff with similar interests to get in.”
Seeking to diffuse tensions, North Korea proposed to conduct a joint investigation with the United States into the Sony cyberattack. Predictably, the United States quickly rebuffed the offer. National Security Council spokesman Mark Stroh arrogantly responded, “If the North Korean government wants to help, they can admit their culpability and compensate Sony for the damages this attack caused.” North Korea can hardly be expected to accept blame for an act it did not commit. But getting to the truth of the matter was the farthest thing from the Obama Administration’s mind. Similarly, U.S. officials are ignoring requests from cybersecurity experts to be allowed to analyze the Destover code. “They’re worried we’ll prove them wrong,” Robert Graham concludes.
The Obama Administration’s outrage over the Sony attack contains more than a small measure of hypocrisy. It was the United States that launched the Stuxnet attack that destroyed many of Iran’s nuclear centrifuges. According to a Washington Post article published in 2013, the United States conducted 231 cyber operations throughout the world two years before. The National Security Agency, as is now well known, regularly hacks into computer networks, scooping up vast amounts of data. The GENIE program, the Post reported, was projected to have broken into and installed implants in 85,000 computers by the end of 2013. It was reported that GENIE’s next phase would implement an automated system that could install “potentially millions of implants” for gathering data “and active attack.” According to former deputy of defense secretary William J. Lynn III, “The policy debate has moved so that offensive options are more prominent now.”
Contrast the mild treatment the media gave to the recent large-scale hacks into Target, Home Depot and JP Morgan, in which millions of credit cards and personal information were stolen, with the coverage of the cyberattack on Sony Pictures. It is impossible to avoid the conclusion that political considerations are driving the media furor over the latter case.
After six years in office, the Obama Administration has yet to engage in dialogue or diplomacy with North Korea. It prefers to maintain a wall of hostility, blocking any prospect of progress or understanding between the two nations.
Already, North Korean websites have been targeted by persistent denial of service operations. Whether the attacks were launched by a U.S. government cyber team or independent hackers inspired by media reports is not known. In any case, President Obama has already promised to take unspecified action against the DPRK. Actual responsibility for the Sony attack is irrelevant. Backed by media cheerleading, U.S officials are using the cyberattack as a pretext to ratchet up pressure on North Korea. Any action the Obama Administration takes is likely to trigger a response, and we could enter a dangerous feedback loop of action/counteraction.
Gregory Elich is on the Board of Directors of the Jasenovac Research Institute and the Advisory Board of the Korea Policy Institute. He is a member of the Committee to Defend Democracy in South Korea and a columnist for Voice of the People. He is also one of the co-authors of Killing Democracy: CIA and Pentagon Operations in the Post-Soviet Period, published in the Russian language.
Gregory Elich is on the Board of Directors of the Jasenovac Research Institute and the Advisory Board of the Korea Policy Institute. He is a member of the Committee to Defend Democracy in South Korea and a columnist for Voice of the People. He is also one of the co-authors ofKilling Democracy: CIA and Pentagon Operations in the Post-Soviet Period, published in the Russian language.
NB Commentary "Ebola outbreak: call to send in military to west Africa to help curb epidemic"
Medical workers of the John F Kennedy hospital of Monrovia show the aprons they have been wearing during a strike. Photograph: Dominique Faget/AFP/Getty Images |
It seems that the militarization and military dominance of the Western World Powers are in full swing. Of course they experiment first on the least able to resist their control and then move towards the higher stakes.
Read Full Guardian Article Here
Ebola outbreak: call to send in military to west Africa to help curb epidemic
While the “Obama Trojan” horse was set loose on
unknowing masses of Blacks in Africa, the Black leaders are lining their pockets with promises of riches, Western riches…. Ignoring their own profitability in their home grown resources as well as ingenuity. Euro-American Powers want to trump the advancement of China into Africa. This is a war on many fronts and all not done with weapons of mass destruction as they have been deployed in the past.
Sankofa!
Self Reliance!
Deporting any and all Euro-American ideology in all its forms. Taking back its true nature from the vulture who consumed it.
Until then, Africa will drown in the sinking ship of Western Imperialism.
Denial ain’t just a River in Egypt.
Published on Jul 19, 2012http://www.JoshTolley.com Investigator, Doug Hagmann (from Hagmann and Hagmann) exposes that the top conspiracy theories are not theories after all! The Middle East, Government watch list, Money Manipulation, Privacy, TSA, and even the conspiracy that the government in Washington D.C. isn’t actually our government.!
http://www.homelandsecurityus.com/
I find it interesting how like this one and many other so-called patriotic programs seem to overlook the very essence of why this stuff is happening now. They mention the founding Fathers and their intent over and over again, but these so-called Founding Fathers DID NOT intend for their “document” to include blacks, native Americans or women….. it was a document created for White Anglo-Saxon aristocracy.
They also forget to mention the atrocity of the Slave Trade and the Institution of Slavery, Racism and White Supremacy that sustained it for 300+ years. To me they miss the ELEPHANT in the room by overlooking these simple facts of history.
A nation built on the backs, blood, sweat and tears of an annihilated enslaved people can not stand for long. The European was given the false notion that he was superior to his “Slave” and therefore it was hardly a thing to mention the “rights’ of these enslaved people. The indigenous people were considered savages, therefore, no mention of them or their rights. The Constitution/Bill of Rights is an exclusive document written specifically for those intended not for the so-called “We the People”. Until this is identified, the now “We the People” will continue to grope in the dark for an answer as to why their “Freedoms” are being taken away.
Instead take a hard long look at how these “Freedoms” were taken away by force from the Indigenous People and the African people who were captured and brought thousands of miles from their homeland. These atrocities were perpetrated by the Forefathers of those who now complain about their “Freedoms” being taken away.
How long could such a house of cards last? Once this is faced with an open and serious eye, folks will continue to complain about how their “rights” are being taken away. Now, the descendants of the perpetrators of colonialism, death and destruction here in North & South America are seeing what it feels like to be discriminated against because of the way they think, act, believe or social status.
These Patriots need to take a long hard look at what their Forefathers and Founding Fathers did and continue to do; to Indigenous and African peoples over the past 500+ years and then they will see why, as Malcolm X once said, “The chickens come home to roost.”
I often wonder if when these Patriots spout out their patriotic dribble, do they have the same tunnel vision as their Forefathers? Are they willing to address the discrimination, oppression, racism and white supremacy that has spearheaded this train wreck? Are they brave enough, willing enough, capable enough to speak truth to power and admit that they are in the same hell their Forefathers perpetrated on other human beings? Can they honestly write an narrative that demonstrates how the present day Patriot got himself/herself in this cycle of oppression? Without looking at the root cause of the destruction of America/Western Society.. they will continue to bark at the Moon about the rights they are denied while ignoring how these same rights were denied others.