Connect with us

Americas

TRUMPeting tight, the American Right

Nozomi Hayase

Published

on

The United States is in a major upheaval. Trump’s cabinet shake-up moves the country into an alarming direction. From the nomination of torturer Gina Haspel as the head of the Central Intelligence Agency to Mike Pompeo, former CIA Director and a vocal opponent of the nuclear deal with Iran as new secretary of state, his selection exposes the White House’s dangerous kill instincts.

An ultimatum came with the president’s appointment of John Bolton, the former American ambassador to the United Nations as his 3rd national security advisor. Bolton, who served in the George W. Bush administration is notorious for his hawkishness, with a great zeal for military action against Iran and North Korea. This rearranging of the deck chairs in the sinking empire signals the great calamity of foreign policy ahead with potential threats of war.

In this seeming free-fall toward despotism, what can ordinary people do? Tackling corruption of our political system and averting a doomed future requires us to truly understand the problems we are facing. The crisis of representation didn’t just arise with Trump, the new commander in chief. A glimpse of it was shown during the 2008 financial meltdown, which was covered up swiftly by bank bailouts and politics of ‘hope and change’. The truth is that seeds for dystopia have been inside this country all along. The roots of the issues that are now emerging in Trump’s America go back to the very beginning of this nation.

In its modern formation, the United States inspired the world with its torch of liberty and equality. At the same time, this beacon of light had its darkness within. From the onset, America contained internal contradictions manifested as the founder’s hypocrisy and the violation of its own ideals with genocide of natives, slavery of blacks and suppression of women. The Founding Fathers of the United States brought a victory of rejecting the power of the King’s monarchy and pioneered a path for one’s own self-determination. The concept of “a government of laws, not of men”was groundbreaking at that time. Yet without reconciling its own shadow, this nation of law failed to fully shield the republic from the tyranny of the Old World.

Supremacy of (t)reason

The unredeemed darkness found in America’s troubled past was a force inside Western civilization that tries to define history, subjugating other perspectives to its single vision. Europe, with its ethos of separation and objectivity set out to conquer the world, spreading its influence across many continents. This domineering power of reason found its new front of exploration in the New World.

America, driven by the monotheistic goal of Manifest Destiny, expanded its territory with brutality. It swallowed what is edible, assimilating immigrants one by one to its conception of what is civil, while spitting out those that it considered impala table, relegating them into three-fifths of a person or exterminating them from the earth altogether as savages.

This maddened head centricity was manifested in the structure of a new government. Sheldon Wolin, author of Democracy Inc noted how the framers of the Constitution created a so-called managed democracy, a system that favored elite rule and that “the American political system was not born a democracy, but born with a bias against democracy” (2008, p. 228).

The intellectual elites regarded the democratic majority rule as an irrational force and they feared the tyranny of popular majorities. While the faculty of reason positioned itself as a supreme force, a potential to account its autocratic power was found inside America.

The sovereign power of We the People

Expressed in the preamble of the Constitution “We the People” was faith in the wisdom of ordinary people to govern themselves. This was an intention to shift from the model of government that acts as authority of their lives to one that places power in the hands of ordinary people. In this government established under the rule of the people, the source of legitimacy was not derived from a god or king, but was meant to come from people themselves.

This arrangement of governance was not granted from above. It was first demanded by those who opposed the ratification of the 1787 Constitution that lacked the guarantee of individual liberties. The proponents of the Bill of Rights articulated essential parts of the sovereign power of We the People as a freedom of expression; freedom of speech, religion, assembly and the right to petition the government for a redress of grievances. By building upon First Amendment rights, further efforts emerged from below. From abolitionists’ defiance and the women’s suffrage movement to civil rights and free speech movements, people’s determination for individual autonomy persisted.

Assault on this power of ordinary people intensified with the rise of corporate power in the ‘60s. Manifest Destiny is now carried out with Nike’s slogan of “just do it”. With limited liability and having no human beings in charge, the abstraction of the head inside transnational corporations took flight from the communal ground, plundering their way into the globe, without ever having to take responsibility for the consequences of their actions. Giant corporations became a sponsor for this managed democracy, gaining control over media to manipulate public perception, keeping American voters in hostage with the lesser of the two evils charade politics.

WikiLeaks, the rise of cryptographic direct action

In the political winter of the post-911 war on terror, as fear and apathy spread around the globe, a new civic force surfaced online. The waves of whistleblowers began shedding light on the collaborative secrecy of elites that deceive and manipulate the public behind a façade of democracy.

WikiLeaks, with its motto of “privacy for the weak and transparency for the powerful”, opened a floodgate of a free flow of information.This world’s first global Fourth Estate embodies the philosophy of cypherpunks– a loosely tied group of online privacy advocates who saw the potential of cryptography to shift the balance of power between individuals and the state. With the idea that cryptography is the “ultimate form of non-violent direct action” (2012, p. 5), WikiLeaks founder and editor in chief Julian Assange built the system of scientific journalism that would give everyday people around the world tools to combat military might and confront the madness of fallen reason that censors free speech.

The invention of the anonymous drop box was truly revolutionary. It enabled anyone to send information securely without a trace of his or her identity. Through the robust decentralized infrastructure built around this game changing technology, WikiLeaks was able to provide unprecedented source protection in the history of journalism. Here, the organization that derived its source of inspiration in American founding ideas, freed the First Amendment that had been captured through a corporate monopoly and co-optation of the media, making it available to people all around the world.

It is through WikiLeaks’ adamant commitment to the principle of free press that former U.S. Army intelligence analyst and whistleblower Chelsea Manning was able to exercise uncompromising free speech and engage in the American tradition of civil disobedience. Manning, whom the late attorney and President Emeritus of the Center for Constitutional Rights, Michael Ratner described as the “conscience of our nation”, let the American public see the US imperialism in action in the Middle East.

In her request for a presidential pardon, Manning stated her commitment to the ideal of America, saying how she was willing to pay the price if it would make this country be “truly conceived in liberty and dedicated to the proposition that all women and men are created equal.”Through her non-violent cryptographic direct action, she helped America find its conscience.

One individual’s act of courage brought another. Inspired by Manning, Edward Snowden came forward to inform people about the NSA’s mass surveillance. In one of the addresses he made, Snowden also described his act as a public service and connected it with Dr. King’s non-violent civil disobedience. Through his whistleblowing, the former NSA contractor defended individual privacy as fundamental civil rights for all people and tried to preserve the world where people can share creativity, love and friendship freely without every conversation and interaction being monitored and recorded.

Whistleblowers and their faith in ordinary people

From WikiLeaks disruptions to Snowden revelations, courageous act of truth-tellers renewed the faith in the wisdom of ordinary people to govern themselves. Both Manning and Snowden believed in the public’s right to know and held a view that when people are informed, they can make changes and determine their own destiny.

Faith is different than mere belief. It is not about one blindly trusting or passively accepting something. Faith is an active will that requires one to choose out of themselves to believe in something. When established media and trusted institutions failed, Manning chose to put her trust in the journalistic organization that was little known at that time. When the government’s internal mechanisms of accountability were broken, combined with the betrayal of Obama’s campaign promises and his war on whistleblowers, Snowden turned to American journalists whom he could trust by his own judgment of the integrity of their work. They placed faith not in political leaders or authority but in fellow men and women.

It is to this faith in the ability for the wise and knowledgeable public to govern themselves that fearless journalism responded. WikiLeaks, the publisher of last resort kept its promise to the source by publishing full archives with maximum political impact and bringing information back to the historical record. By doing so, it has become an enemy of the most powerful government in the world, being subjected to legal and extra-legal pressure. Through honoring Snowden’s wishes, journalists Glenn Greenwald, Laura Poitras and Barton Gellman broke the story of NSA surveillance and led the Guardian’s independent journalism, making the established media fulfill its duty. In the aftermath of Snowden’s disclosures, when this young whistleblower was stranded in Hong Kong, WikiLeaks demonstrated its extraordinary source protection with journalist Sarah Harrison risking her own liberty to help Snowden attain asylum.

With this faith given by peers, citizens around the world who have been distrusted by their own governments and made powerless began to claim their own power. By recognizing that someone believed in them and sacrificed their lives so that they can be free, they were able to believe in their own ability to protect those they love and preserve rights that they cherish. The will to respond to this faith in one another made it possible for ordinary people to carry out extraordinary acts.

Bitcoin, Innovation without Permission

Contagious courage lit by people’s faith created a fellowship that can withstand the state violence. It began to shift the balance of power, replacing the source of legitimacy from trusted institutions to ordinary people’s trust in one another. As the network of resistance grew, new attacks emerged. Following the release of U.S. diplomatic cables in 2010, WikiLeaks faced the unlawful financial blockade imposed by Bank of America, VISA, MasterCard, PayPal and Western Union. When this economic sanction starved the whistleblowing site, destroying 95% of their revenue, the flow of autonomy that helped the organization circumvent economic censorship came from fellow cypherpunks.

Bitcoin, as a peer-to-peer electronic cash was the holy grail of cypherpunks. With its defining feature of censorship resistance and permissionlessness, Bitcoin makes free speech an app that can be distributed across borders and used by anyone regardless of nationality, religion, race, gender or economic status. Here, imagination from computer science redeemed the reason that lost its connection to the heart, by synthesizing bits of isolated knowledge that had created separation and injustice, transforming them into a higher order of unification.

Networks of equal peers emerging around this invention opened up a new avenue of dissent in a form of decentralization. Adam Back, notable cryptographer whose work was cited in the Bitcoin white paper, described cypherpunks as “a state of mind” and explained its philosophy of “writing code” as a “proactive approach to societal change by doing: building and deploying tech – rather than by lobbying politicians or asking permission.”

This path toward decentralization was first taken by the creator of this technology. The anonymity of Satoshi Nakamoto represents the power of ordinary people. Through an act of publishing the white paper under a pseudonymous name and making the protocol open source, the mysterious author gave up ownership and simultaneously gave users control of the software, making it possible for each individual to use it as a tool to govern themselves.

What is enshrined in a piece of mathematics is wisdom of ordinary people that understands that man is corruptible, as well as perfectible and recognizes the security holes inherent in the existing model of governance that requires trust in third parties. It is the wisdom of history that teaches us how the best way to secure the system is not to have levers of control in the first place through which power concentrates, leading to despotism. With a consensus algorithm placed as a foundation, laws can be built that is more immune to man’s fallen nature. With this, idea of a government of laws, not of men can be truly realized. Governance of We the People now becomes possible, where rules of law are validated by consensus of ordinary people as opposed to elected officials having power over them.

Andreas Antonopoulos, a technologist and one of the respected figures in Bitcoin, in his talk titled “Courage to Innovate”, captured new enthusiasm and passion ignited around this technology in a phrase “innovation without permission” and connected it with civil disobedience. He reminded the audience how “almost every important innovation in history starts out being illegal or unregulated” and interesting technology started out with people who forgot to ask permission. Describing technology’s core invention as a platform to scale trust, Antonopoulos described how this is a system that makes it possible for people to make social decisions without hierarchy, whether it is government bureaucracy, corporations or any other institution. This system Antonopoulos characterized as “rules without rulers” is being built by people around the world without central coordination.

Claiming our revolutionary spirit

Our Founding Fathers, no matter how imperfect they were, brought us ideas conceived in a revolutionary spirit. The genius of the Constitution is that it makes fundamental laws and principles of government amendable. The highest law of the land preserved space for people to not accept authority imposed on them and even to revolt against it when it is necessary, by giving ordinary people means to change rules. America indeed was founded on rebelliousness and distrust of their own government, demonstrated in the Declaration that reads “whenever any Form of Government becomes destructive… it is the Right of the People to alter or to abolish it, and institute a new Government…”

The government brought by our forebears not only allowed dissent, but depended on our rebellion. The realization of the Constitution as the fulfillment of ideals in the Declaration required individuals with a strong and independent mind. It demanded people to develop moral courage to defend these ideals against special interests of single groups or nations and any adversarial forces that try to deny them.

From the civil rights movement to whistleblowers at the frontier of digital liberation, we have seen the awakening of revolutionary spirit in people’s courageous civic action upholding the ideals of this country. The networks from below expands, converging together to build a new global civil society. Bitcoin developers around the world put their knowledge and skills together, making improvement proposals and fixing bugs, striving to meet the demands of all users.

Innovation without permission is enlivening entrepreneurship. Instead of waiting for problems to be solved by politicians or corporate CEOs, working class began to have faith in their ability to make changes, finding strength and resources within themselves. Around this currency, a new economy is now being bootstrapped, with startups and new businesses hiring people and providing them with skills and knowledge, while many other industries are stagnating.

Solutions to the crisis of representation are within us. Ordinary people, through freely associating with one another, can now give birth to the rule of a real democracy, securing Life, Liberty and the pursuit of Happiness for all.

The Dissident Voice just published an earlier version of this text under the tittle: America’s Descent Into Despotism: Finding Our Source of Power Within appeared

Nozomi Hayase, Ph.D, a native of Japan is a columnist and essayist, whose writing is dedicated to inspire the millennial generation that grew up on the Internet. She has been covering issues of free speech and transparency, including the vital role of whistleblowers and cryptocurrencies in strengthening civil society.

Continue Reading
Comments

Americas

USA at odds with Europe and not only with Europe

Published

on

The recent statement made by US Secretary of State Mike Pompeo to the effect that his country has failed to prevent the implementation of the Nord Stream – 2 gas pipeline project provides glaring proof of the ultimatum-type methods used by President Donald Trump’s administration to thwart unwelcome projects, deals or agreements and simultaneously impose their own products, goods and services on partners – from more expensive liquefied natural gas (LNG) to passenger and military aircraf,t and weapons systems. However, such efforts rarely hit success, exacerbating US relations even with its closest allies in Europe and NATO.

Addressing the Senate’s Foreign Relations Committee on April 10th, Mike Pompeo said Washington had done everything it could to talk European partners out of building Nord Stream 2 but these efforts suffered a fiasco. According to the head of the State Department, Berlin is set on pursuing the project and all attempts to dissuade the Europeans from building the gas pipeline have yielded no results. “It looks like Germany aims to continue the construction of the pipeline. We are working to find a way to supply some of the gas through Ukraine,” – Pompeo said: “We did our utmost to persuade the Europeans, and first of all Germany, not to build the Nord Stream 2 but to no avail.”

Earlier, the US Secretary of State pointed out that the United States “must continue to exert pressure in order to scrap Nord Stream 2.”

While Washington’s attempts to use political pressure to promote its own energy projects intensify differences between the United States and the European Union, and specifically Germany, similar efforts in the area of defense and military technology jeopardize the integrity and unity of the North Atlantic alliance. US Vice President Mike Pence has de facto presented an ultimatum to Turkey, one of the closest American allies in the Middle East. He warned Ankara against purchasing Russian S-400 anti-aircraft missile systems, calling on the Turkish leadership to choose between partnership with NATO and the deal. Acting Secretary of Defense Patrick Shanahan has made it clear that his country will do everything in its power to persuade Turkey to buy the American Patriot system instead of the Russian S-400 anti-aircraft missiles.

However, the United States could face a fiasco here. The first ultimatum declared by Turkey for the cancellation of the decision on the purchase of Russian anti-aircraft missiles ran out on February 15th . By February 15th US officials had sent a request to their Turkish partners in NATO to provide a clear answer to the American ultimatum which ran as follows: if Ankara does not terminate a contract with Russia on the purchase of S-400 systems, Washington will recall its offer on the sale of 3.5 billion dollars worth Patriot anti-aicraft missiles. In addition, the United States announced that a deal on the purchase by Turkey of Lockheed Martin F-35 fighters was under threat and that Turkey could face sanctions.

Nevertheless, the Turkish leadership chose to stick to its own position on this matter. The next day after the end of the American ultimatum, Turkish President Recep Tayyip Erdogan said that his country would not give up on its intention to buy S-400 anti-aircraft missile systems from Russia: “We struck a deal with Russia on the S-400, so there can be no turning back. That’s all”. According to the Turkish leader, Turkey will be ready to purchase Patriot systems provided such a deal meets Turkey’s interests. However, he added that some issues have yet to be settled with Washington. “The US administration favors early deliveries, but says nothing about joint production or a loan. We continue to work proceeding from the promise of supplying the S-400 in July,” – Recep Tayyip Erdogan said.

On April 10, Turkish Foreign Minister Mevlüt Çavuşoğlu stated that Ankara could acquire the second batch of Russian S-400 anti-aircraft missile systems if the United States refused to sell its Patriot anti-missile systems to Ankara. He also said Turkey will search for an alternative to American F-35 fighters if the United States does not resume their deliveries to Turkey.

Russia and Turkey signed an agreement on the supply of four S-400 divisions to the total value of $ 2.5 billion in December 2017. Under the deal, Turkey will be supplied with technology that will enable it to develop its own anti-missile systems. Initially, the supplies were scheduled for July this year, but Turkish President Recep Tayyip Erdogan gave it to understand that the systems could be delivered earlier.

Addressing a press conference following the Russian-Turkish high-level talks held on April 8 in the Kremlin, the Turkish president spoke at length on his vision of the US attempts to thwart the implementation of agreements with Russia: “We have already laid the road map for S-400, have made all the necessary steps in this direction, it is over. And after that, someone comes forward with suggestions and recommendations: reject this, turn down that, ignoring our opinion? If we have already agreed, signed a contract, naturally, we will continue to pursue it. This is our sovereign right. This is our decision. No one can demand that we change our mind. ”

“For Turkey, it is vital to buy S-400 missiles from Russia,” – the Turkish Aydinlik Gazetesi newspaper states. “S-400 guarantees a reliable shield not only in the face of pressure coming from NATO and the Atlantic, but it also meets a specific need,” since “S-300/400 missiles produced by the Russian Almaz-Antey Defense Technology Company are the best missile systems in the world”, – the newspaper says.

Civil aircraft building is yet another area of mounting confrontation between the United States and its closest allies, including France. A few days ago, French Minister of Economics and Finance Bruno Le Maire found it necessary to personally comment on Washington’s increasingly aggressive attempts to “push” American “Boeings” onto the world markets by ousting the French Airbuses. “The European Union and the United States cannot afford a conflict in aeronautics and must come to a settlement agreement following Washington’s threats to impose tax on Airbus,” – he said at a news conference at the French Ministry of Economics.

This statement came in response to earlier reports by US trade representatives that Washington is considering slapping new custom duties on imports from the European Union, which, in particular, may touch on civilian helicopters and airplanes. According to The Wall Street Journal, the total value of the goods to which the new duties may extend will be 11 billion dollars.

A new turn in the “trade war” between the United States and Europe could quickly destabilize the relations on both sides of the Atlantic and affect the general situation in the global financial and trade markets – even compared to the long-standing trade and economic confrontation between Washington and Beijing.

The US trade representatives have already warned that they will impose additional taxes on commodities imported into the United States from Europe if the European Union continues to subsidize Airbus, one of the world’s largest aviation corporations, and a Boeing competitor. The list of goods that will fall under the restrictions include aviation products, Airbus aircraft, as well as some products that are not directly related to aviation, including kitchen knives and bicycles.

In 2018, the United States introduced a number of duties on products from Europe, including steel and aluminum supplies.

It is no accident that it is now that Washington is tightening pressure on Europe in the area of aircraft manufacturing and is threatening Europeans with multibillion-dollar sanctions, despite the fact that the conflict over EU subsidies to its own aircraft manufacturers began as far back as in 2004. The current aggravation of relations between the United States and the European Union is the result of serious difficulties that the American company Boeing faced after a series of crashes of the Boeing 737 MAX 8. A number of air companies and some countries, including the United States, has introduced a ban on the use of this model and has forbidden it to fly over their air space.

Given the situation, the Donald Trump administration has opted to assume the lead in a number of areas which are key to the US trade and economic interests – energy, military supplies and civil aircraft manufacturing. The US administration counts on traditionally aggressive lobbying – which, under the 45th president, has clearly hit a new level – with the simultaneous use of political rhetoric in terms of spinning Euro-Atlantic solidarity and the “Russian” and “Chinese” threats.

Nevertheless, the attempts to use ultimatum to exert pressure in several areas at once may well result in a closer consolidation of Europeans as they unite to defend their own interests, in a further strengthening the economic ties between Russia and China, as well as in a more pronounced and independent policy by Turkey – and not only in defense and military technology. These recent moves on the part of the United States are tying the knot of conflict throughout an increasingly wider spectrum of geopolitical space. And for now, it is not clear where all this could lead to. 

First published in our partner International Affairs

Continue Reading

Americas

Highlights from the Mueller Report

Eric Zuesse

Published

on

Following are the passages that I consider to be the chief and most important allegations that are in the opening 11% (that’s up through page 49 of the of the 448-page document) of the “Report On The Investigation Into Russian Interference In The 2016 Presidential Election”. That’s Robert Mueller’s March 2019 report, which had been commissioned by the U.S. Congress to find grounds to charge U.S. President Donald Trump with being an agent of the Russian Government and to replace him with Vice President Mike Pence for that reason.

Report On The Investigation Into Russian Interference In The 2016 Presidential Election 

The Internet Research Agency (IRA) carried out the earliest Russian interference operations identified by the investigation — a social media campaign designed to provoke and amplify political and social discord in the United States. The IRA was based in St. Petersburg, Russia, and received funding from Russian oligarch Yevgeniy Prigozhin and companies he controlled. Prighozhin is widely reported to have ties to Russian President Vladimir Putin. …

The IRA later used social media accounts and interest groups to sow discord in the U.S. political system through what it termed “information warfare.” The campaign evolved from a generalized program designed in 2014 and 2015 to undermine the U.S. electoral system, to a targeted operation that by early 2016 favored candidate Trump and disparaged candidate Clinton.

The IRA’ s operation also included the purchase of political advertisements on social media in the names of U.S. persons and entities, as well as the staging of political rallies inside the United States. To organize those rallies, IRA employees posed as U.S. grassroots entities and persons and made contact with Trump supporters and Trump Campaign officials in the United States. The investigation did not identify evidence that any U.S. persons conspired or coordinated with the IRA. …

At the same time that the IRA operation began to focus on supporting candidate Trump in early 2016, the Russian government employed a second form of interference: cyber intrusions (hacking) and releases of hacked materials damaging to the Clinton Campaign. The Russian intelligence service known as the Main Intelligence Directorate of the General Staff of the Russian Army (GRU) carried out these operations.

In March 2016, the GRU began hacking the email accounts of Clinton Campaign volunteers and employees, including campaign chairman John Podesta. In April 2016, the GRU hacked into the computer networks of the Democratic Congressional Campaign Committee (DCCC) and the Democratic National Committee (DNC). The GRU stole hundreds of thousands of documents from the compromised email accounts and networks. Around the time that the DNC announced in mid-June 2016 the Russian government’s role in hacking its network, the GRU began disseminating stolen materials through the fictitious online personas “DCLeaks” and “Guccifer 2.0.” The GRU later released additional materials through the organization WikiLeaks. …

While the investigation identified numerous links between individuals with ties to the Russian government and individuals associated with the Trump Campaign, the evidence was not sufficient to support criminal charges. Among other things, the evidence was not sufficient to charge any Campaign official as an unregistered agent of the Russian government or other Russian principal. And our evidence about the June 9, 2016 meeting and WikiLeaks’s releases of hacked materials was not sufficient to charge a criminal campaign-finance violation. Further, the evidence was not sufficient to charge that any member of the Trump Campaign conspired with representatives of the Russian government to interfere in the 2016 election. …

The Office investigated several other events that have been publicly reported to involve potential Russia-related contacts. For example, the investigation established that interactions between Russian Ambassador Kislyak and Trump Campaign officials both at the candidate’s April 2016 foreign policy speech in Washington, D.C., and during the week of the Republican National Convention were brief, public, and non-substantive. And the investigation did not establish that one Campaign official’s efforts to dilute a portion of the Republican Party platform on providing assistance to Ukraine were undertaken at the behest of candidate Trump or Russia. The investigation also did not establish that a meeting between Kislyak and Sessions in September 2016 at Sessions’s Senate office included any more than a passing mention of the presidential campaign. …

Throughout 2016, IRA accounts published an increasing number of materials supporting the Trump Campaign and opposing the Clinton Campaign. For example, on May 31, 2016, the operational account “Matt Skiber” began to privately message dozens of pro-Trump Facebook groups asking them to help plan a “pro-Trump rally near Trump Tower.”55

To reach larger U.S. audiences, the IRA purchased advertisements from Facebook that promoted the IRA groups on the newsfeeds of U.S. audience members. According to Facebook, the IRA purchased over 3,500 advertisements, and the expenditures totaled approximately $100,000.56

During the U.S. presidential campaign, many IRA-purchased advertisements explicitly supported or opposed a presidential candidate or promoted U.S. rallies organized by the IRA (discussed below). As early as March 2016, the IRA purchased advertisements that overtly opposed the Clinton Campaign. For example, on March 18, 2016, the IRA purchased an advertisement depicting candidate Clinton and a caption that read in part, “If one day God lets this liar enter the White House as a president – that day would be a real national tragedy.”57

Similarly, on April 6, 2016, the IRA purchased advertisements for its account “Black Matters” calling for a “flashmob” of U.S. persons to “take a photo with #HillaryClintonForPrison2016 or #nohillary2016.”58 IRA-purchased advertisements featuring Clinton were, with very few exceptions, negative.59

IRA-purchased advertisements referencing candidate Trump largely supported his campaign. The first known IRA advertisement explicitly endorsing the Trump Campaign was purchased on April 19, 2016. The IRA bought an advertisement for its Instagram account “Tea Party News” asking U.S. persons to help them “make a patriotic team of young Trump supporters” by uploading photos with the hashtag “#KIDS4TRUMP.”60 In subsequent months, the IRA purchased dozens of advertisements supporting the Trump Campaign, predominantly through the Facebook groups “Being Patriotic,” “Stop All Invaders,” and “Secured Borders.” …

The IRA operated individualized Twitter accounts similar to the operation of its Facebook accounts, by continuously posting original content to the accounts while also communicating with U.S. Twitter users directly (through public tweeting or Twitter’s private messaging).

The IRA used many of these accounts to attempt to influence U.S. audiences on the election. Individualized accounts used to influence the U.S. presidential election included @TEN_ GOP ( described above); @jenn _ abrams ( claiming to be a Virginian Trump supporter with 70,000 followers); @Pamela_Moore13 (claiming to be a Texan Trump supporter with 70,000 followers); and @America:__Ist_ (an anti-immigration persona with 24,000 followers).67 In May 2016, the IRA created the Twitter account @march_for_trump, which promoted IRA-organized rallies in support of the Trump Campaign (described below).68 …

The IRA organized and promoted political rallies inside the United States while posing as U.S. grassroots activists. First, the IRA used one of its preexisting social media personas (Facebook groups and Twitter accounts, for example) to announce and promote the event. The IRA then sent a large number of direct messages to followers of its social media account asking them to attend the event. From those who responded with interest in attending, the IRA then sought a U.S. person to serve as the event’s coordinator. In most cases, the IRA account operator would tell the U.S. person that they personally could not attend the event due to some preexisting conflict or because they were somewhere else in the United States.82 The IRA then further promoted the event by contacting U.S. media about the event and directing them to speak with the coordinator.83

After the event, the IRA posted videos and photographs of the event to the IRA’s social media accounts. 84

The Office identified dozens of U.S. rallies organized by the IRA. The earliest evidence of a rally was a “confederate rally” in November 2015. 85 The IRA continued to organize rallies even after the 2016 U.S. presidential election. The attendance at rallies varied. Some rallies appear to have drawn few (if any) participants while others drew hundreds. …

From June 2016 until the end of the presidential campaign, almost all of the U.S. rallies organized by the IRA focused on the U.S. election, often promoting the Trump Campaign and opposing the Clinton Campaign. Pro-Trump rallies included three in New York; a series of pro-Trump rallies in Florida in August 2016; and a series of pro-Trump rallies in October 2016 in Pennsylvania. The Florida rallies drew the attention of the Trump Campaign, which posted about the Miami rally on candidate Trump’s Facebook account (as discussed below).86 …

Starting in June 2016, the IRA contacted different U.S. persons affiliated with the Trump Campaign in an effort to coordinate pro-Trump IRA-organized rallies inside the United States. In all cases, the IRA contacted the Campaign while claiming to be U.S. political activists working on behalf of a conservative grassroots organization. The IRA’s contacts included requests for signs and other materials to use at rallies, 107 as well as requests to promote the rallies and help coordinate Iogistics.108 While certain campaign volunteers agreed to provide the requested support (for example, agreeing to set aside a number of signs), the investigation has not identified evidence that any Trump Campaign official understood the requests were coming from foreign nationals.

III. RUSSIAN HACKING AND DUMPING OPERATIONS

Beginning in March 2016, units of the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU) hacked the computers and email accounts of organizations, employees, and volunteers supporting the Clinton Campaign, including the email account of campaign chairman John Podesta. Starting in April 2016, the GRU hacked into the computer networks of the Democratic Congressional Campaign Committee (DCCC) and the Democratic National Committee (DNC). The GRU targeted hundreds of email accounts used by Clinton Campaign employees, advisors, and volunteers. In total, the GRU stole hundreds of thousands of documents from the compromised email accounts and networks. 109 The GRU later released stolen Clinton Campaign and DNC documents through online personas, “DCLeaks” and “Guccifer 2.0,” and later through the organization WikiLeaks. The release of the documents was designed and timed to interfere with the 2016 U.S. presidential election and undermine the Clinton Campaign. …

By no later than April 12, 2016, the GRU had gained access to the DCCC computer network using the credentials stolen from a DCCC employee who had been successfully spearphished the week before. Over the ensuing weeks, the GRU traversed the network, identifying different computers connected to the DCCC network. By stealing network access credentials along the way (including those of IT administrators with unrestricted access to the system), the GRU compromised approximately 29 different computers on the DCCC network. 119

Approximately six days after first hacking into the DCCC network, on April 18, 2016, GRU officers gained access to the DNC network via a virtual private network (VPN) connection120 between the DCCC and DNC networks.121 Between April 18, 2016 and June 8, 2016, Unit 26165 compromised more than 30 computers on the DNC network, including the DNC mail server and shared file server.122

b. Implantation of Ma/ware on DCCC and DNC Networks

Unit 26165 implanted on the DCCC and DNC networks two types of customized malware, 123 known as “X-Agent” and “X-Tunnel”; Mimikatz, a credential-harvesting tool; and rar.exe, a tool used in these intrusions to compile and compress materials for exfiltration. X-Agent was a multi-function hacking tool that allowed Unit 26165 to log keystrokes, take screenshots, and gather other data about the infected computers (e.g., file directories, operating systems).124 XTunnel was a hacking tool that created an encrypted connection between the victim DCCC/DNC computers and GRU-controlled computers outside the DCCC and DNC networks that was capable of large-scale data transfers. 125 GRU officers then used X-Tunnel to exfiltrate stolen data from the victim computers. …

c. Theft of Documents from DNC and DCCC Networks

Officers from Unit 26165 stole thousands of documents from the DCCC and DNCnetworks, including significant amounts of data pertaining to the 2016 U.S. federal elections.

Stolen documents included internal strategy documents, fundraising data, opposition research, and emails from the work inboxes of DNC employees.

The GRU began stealing DCCC data shortly after it gained access to the network. On April 14, 2016 (approximately three days after the initial intrusion) GRU officers downloaded rar.exe onto the DCCC’s document server. The following day, the GRU searched one compromised DCCC computer for files containing search terms that included “Hillary,” “DNC,” “Cruz,” and “Trump.”131 On April 25, 2016, the GRU collected and compressed PDF and Microsoft documents from folders on the DCCC’s shared file server that pertained to the 2016 election.132 The GRU appears to have compressed and exfiltrated over 70 gigabytes of data from this file server.133

The GRU also stole documents from the DNC network shortly after gaining access. On April 22, 2016, the GRU copied files from the DNC network to GRU-controlled computers. Stolen documents included the DNC’ s opposition research into candidate Trump.134 Between approximately May 25, 2016 and June 1, 2016, GRU officers accessed the DNC’s mail server from a GRU-controlled computer leased inside the United States.135 During these connections, Unit 26165 officers appear to have stolen thousands of emails and attachments, which were later released by WikiLeaks in July 2016.136

B. Dissemination of the Hacked Materials

The GRU began planning the releases at least as early as April 19, 2016, when Unit 26165 registered the domain dcleaks.com through a service that anonymized the registrant.137 Unit 26165 paid for the registration using a pool of bitcoin that it had mined. 138 The dcleaks.com landing page pointed to different tranches of stolen documents, arranged by victim or subject matter. Other dcleaks.com pages contained indexes of the stolen emails that were being released (bearing the sender, recipient, and date of the email). To control access and the timing of releases, pages were sometimes password-protected for a period of time and later made unrestricted to the public.

Starting in June 2016, the GRU posted stolen documents onto the website dcleaks.com, including documents stolen from a number of individuals associated with the Clinton Campaign.

These documents appeared to have originated from personal email accounts (in particular, Google and Microsoft accounts), rather than the DNC and DCCC computer networks. DCLeaks victims included an advisor to the Clinton Campaign, a former DNC employee and Clinton Campaign employee, and four other campaign volunteers. 139 The GRU released through dcleaks.com thousands of documents, including personal identifying and financial information, internal correspondence related to the Clinton Campaign and prior political jobs, and fundraising files and information.140 …

2. Guccifer 2.0

On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents. In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as “Fancy Bear”) were responsible for the breach. 145 Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona Guccifer 2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into a Moscow-based server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including “some hundred sheets,” “illuminati,” and “worldwide known.” Approximately two hours after the last of those searches, Guccifer 2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that the GRU officers had searched for that day. 146 …

3. Use of WikiLeaks

In order to expand its interference in the 20 I 6 U.S. presidential election, the GRU units transferred many of the documents they stole from the DNC and the chairman of the Clinton Campaign to WikiLeaks. GRU officers used both the DCLeaks and Guccifer 2.0 personas to 

communicate with WikiLeaks through Twitter private messaging and through encrypted channels, including possibly through WikiLeaks’s private communication system. …

c. The GRU’s Transfer of Stolen Materials to WikiLeaks 

Both the GRU and WikiLeaks sought to hide their communications, which has limited the Office’s ability to collect all of the communications between them. Thus, although it is clear that the stolen DNC and Podesta documents were transferred from the GRU to WikiLeaks, [REDACTED] …

An analysis of the metadata collected from the WikiLeaks site revealed that the stolen Podesta emails show a creation date of September 19, 2016.171 Based on information about Assange’s computer and its possible operating system, this date may be when the GRU staged the stolen Podesta emails for transfer to WikiLeaks (as the GRU had previously done in July 2016 for the DNC emails). 172 The WikiLeaks site also released PDFs and other documents taken from Podesta that were attachments to emails in his account; these documents had a creation date of October 2, 2016, which appears to be the date the attachments were separately staged by WikiLeaks on its site. 173

Beginning on September 20, 2016, WikiLeaks and DCLeaks resumed communications in a brief exchange. On September 22, 2016, a DCLeaks email account dcleaksproject@gmail.com sent an email to a WikiLeaks account with the subject “Submission” and the message “Hi from DCLeaks.” The email contained a PGP-encrypted with the filename “wiki_mail.txt.gpg.” 174 …

d. WikiLeaks Statements Dissembling About the Source of Stolen Materials

As reports attributing the DNC and DCCC hacks to the Russian government emerged, WikiLeaks and Assange made several public statements apparently designed to obscure the source of the materials that WikiLeaks was releasing. The file-transfer evidence described above and other information uncovered during the investigation discredit WikiLeaks’s claims about the source of material that it posted.

Beginning in the summer of 2016, Assange and WikiLeaks made a number of statements about Seth Rich, a former DNC staff member who was killed in July 2016. The statements about Rich implied falsely that he had been the source of the stolen DNC emails. On August 9, 2016, the @WikiLeaks Twitter account posted: “ANNOUNCE: WikiLeaks has decided to issue a US$20k reward for information leading to conviction for the murder ofDNC staffer Seth Rich.” 180

Likewise, on August 25, 2016, Assange was asked in an interview, “Why are you so interested in Seth Rich’s killer?” and responded, “We’re very interested in anything that might be a threat to alleged Wikileaks sources.” The interviewer responded to Assange’s statement by commenting, “I know you don’t want to reveal your source, but it certainly sounds like you’re suggesting a man who leaked information to WikiLeaks was then murdered.” Assange replied, “If there’s someone who’s potentially connected to our publication, and that person has been murdered in suspicious circumstances, it doesn’t necessarily mean that the two are connected. But it is a very serious matter … that type of allegation is very serious, as it’s taken very seriously by us.”181

After the U.S. intelligence community publicly announced its assessment that Russia was behind the hacking operation, Assange continued to deny that the Clinton materials released by WikiLeaks had come from Russian hacking. According to media reports, Assange told a U.S. congressman that the DNC hack was an “inside job,” and purported to have “physical proof” that Russians did not give materials to Assange. 182

Those are highlights from the opening 11% of the report, which is up through page 49 in the 448-page document. These are a prosecutor’s allegations; they are not necessarily true. Robert Mueller has a lengthy history of publicly alleging things that subsequently have come to be widely recognized to have been false. Furthermore, there are very serious reasons to doubt some of the most basic aspects of the Mueller report’s accounts of how information came to Wikileaks from Hillary Clinton’s and her campaign’s computers. Mueller even has been condemned by the FISA court for having violated the law and deceived that court. But these are his main allegations in Mueller’s ‘Russiagate’ report.

Continue Reading

Americas

Trump’s coming trade war “deal” is a dud

Published

on

In typically bullish style, Donald Trump has told the world he expects a resolution to his trade war with China within four weeks. The U.S. President claims the deal “has a very good chance of happening,” and, when it does, it will be “the Grand Daddy of them all.” But key concerns linger:  China has made several concessions to the U.S. over the endless rounds of talks, but there is little sign of Beijing reining in its support for industries such as steel and aluminium – one of the key reasons for the stand-off in the first place. If the Chinese delegation refuses to give way, and to stop dumping cheap products on global markets, even Trump’s staunchest supporters might wonder whether the whole dispute has been worth it.

While the trade war cost the U.S. economy an estimated $7.8 billion in lost GDP last year, the toll has been far greater on China, whose economic growth among other reasons was drastically hit by the steep American tariff walls. Growth has already slowed to its lowest level since 1990, and industrial production has hit a 10-year nadir. Despite Beijing’s best efforts,  latest employment figures show a spike in the number of people out of work, pressuring Xi’s government to arrest the slide.

The IMF did at least provide some good news, revising up its 2019 growth forecast for the Chinese economy. However it also warned that, if the trade war escalates and both sides impose 25% tariffs on all each other’s goods, China’s losses will be bigger. U.S. GDP would fall by up to 0.6% in such a scenario, while China’s could plunge by more than double that figure. Around 1% of the U.S. workforce in sectors such as agriculture and transportation could lose their jobs – a major blow to those rural communities Trump has pledged to revive. In China’s manufacturing sectors, around 5% of people could find themselves suddenly out of work.

Signs of progress

This stark reality explains the raft of climbdowns brokered by Xi’s negotiators, which have gone some way to repairing the damage in some of the worst-hit U.S. sectors. China has proposed buying an extra $30 billion worth of U.S. agricultural products a year, including soybeans, as a concession to U.S. farmers facing soaring stockpiles. On top of that, Beijing has cut tariffs on U.S. cars, news which will have been welcomed by the beleaguered American automobile industry.

But what about China’s trade policies, which have long been central to the U.S. grievance, particularly unfair industrial subsidies? On that it’s hard to see what China has really offered. Xi’s team has made a general commitment to stop subsidizing domestic industries and drowning global markets, but it’s been making these promises for the last 10 years without much action on it, so analysts would be forgiven for being cynical. Observers describe the latest pledges as light on detail, particularly as China offers little information about how it would go about implementing subsidy cuts.

All the indications suggest that China will continue pumping out aluminium and steel, two of America’s – and the EU’s – keenest focus areas. Even after Trump slapped huge tariffs on the two metals last year, Chinese manufacturers continued to ramp up production. For example, in the first two months of 2019 unwrought aluminium and aluminium product exports reached multi-year highs as producers responded to slack domestic demand by dumping their product overseas.

The effect this will have on the international market will continue to be serious, particularly in the aluminium sector already decimated by years of Chinese over-production. The resultant price slump has effectively wiped out entire industries in countries such as the U.K. and the Netherlands. Worse, the tide shows little sign of turning, with aluminium prices on the London Metal Exchange hovering near multi-year lows. With experts suggesting that around 40% of the world’s smelters are now losing money, the ripple effect from China’s subsidies extends far beyond the U.S deep into Europe’s industrial heartland.

Long-term interest

Of course, this doesn’t mean Trump will necessarily force China to stop dumping in the global, or even national, interest. Considering his desire for simple, easy-to-sell results, he will likely accept a deal if China simply agrees to buy more U.S. goods. In that case, he would likely skirt round the fundamental issues about market distortion – a serious risk that is becoming ever more acute as Trump’s image as a cunning dealmaker is showing cracks in the wake of the failed nuclear summit with North Korea, increasing his desperation to prove himself.

As most recent reports suggest, Washington’s will to hold out for the sake of a “great” trade deal is indeed weakening. Although the thorniest issue, insider sources say U.S. negotiators are backpedalling on the demand that China cut subsidies in a move to push a trade agreement in the next month. This is in line with former White House advisor Gary Cohn’s claim that Trump is mostly interested in closing a deal to boost stock markets and give himself the ideal fillip for his re-election campaign.

Yet, for the long-term health of the global community, Trump must press China on this issue. A quick-fix deal will doubtless cheer the global economy subjected to serious collateral damage from the trans-Pacific spat. But it risks stoking further conflict in the future, and ultimately a renewal of the stand-off. China may have been hurting to secure an agreement, but now it may about to be handed one with terms more beneficial than Beijing had imagined from the outset.

Rather than giving in with the end in sight, Trump needs to go all out for total victory, one that justifies the turmoil his trade war has caused. If he doesn’t, his deal may only be a ceasefire.

Continue Reading

Latest

Trending

Copyright © 2019 Modern Diplomacy