Friday, March 10, 2017

Do We Live in a Police State?


By Justin Raimondo - March 10, 2017 at 11:10AM

undefined

WikiLeaks and Julian Assange would have gone down in history as the greatest enemies of government oppression of all kinds in any case, but their latest release – a comprehensive exposé of the US intelligence community’s cyberwar tools and techniques – is truly the capstone of their career. And given that this release – dubbed “Vault 7” – amounts to just one percent of the documents they intend to publish, one can only look forward to the coming days with a mixture of joyful anticipation and ominous fear.

Fear because the power of the Deep State is even more forbidding – and seemingly invincible – than anyone knew. Joyful anticipation because, for the first time, it is dawning on the most unlikely people that we are, for all intents and purposes, living in a police state. I was struck by this while watching Sean Hannity’s show last [Wednesday] night – yes, Fox is my go-to news channel – and listening to both Hannity and his guests, including the ultra-conservative Laura Ingraham, inveigh against the “Deep State.” For people like Hannity, Ingraham, and Newt Gingrich (of all people!) to be talking about the Surveillance State with fear – and outrage – in their voices says two things about our current predicament: 1) Due to the heroic efforts of Julian Assange in exposing the power and ruthlessness of the Deep State, the political landscape in this country is undergoing a major realignment, with conservatives returning to their historic role as the greatest defenders of civil liberties, and 2) American “liberalism” – which now champions the Deep State as the savior of the country –   has become a toxic brew that is fundamentally totalitarian.

On the first point: yes, there are more than a few holdouts, like Bill O’Reilly and the neocons, but the latter are increasingly isolated, and the former is increasingly irrelevant. What we are seeing, as the role of the “intelligence community” in basically leading a seditious conspiracy against a sitting President is revealed, is a complete switch in the political polarities in this country: what passes for the “left” has become the biggest advocate of the Surveillance State, and the rising populist right is coming to the hard-won conclusion that we are rapidly becoming a police state.

Ah, but wait! That’s not the whole story: bear with me for a while.

The material in “Vault 7” is extensive: it ranges from examining the ways in which a Samsung television set that is seemingly turned off can be – and no doubt has been – used to spy on the conversations and activities of a room’s occupants, to the various ways in which our spooks infiltrate and subvert common electronic devices, such as the iPhone, in order to gather information. “Infected phones,” we are told in the introduction to the material, “can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.” The CIA is even working on remotely controlling the electronic steering systems installed in cars – a perfect route to pulling off an assassination that looks like an “accident.” Not that the intelligence services of the “leader of the Free World” would ever consider such an act.

The massive infection of commonly used software and electronic devices leads to a major problem: proliferation. As these viruses and other invasive programs are unleashed on an unsuspecting public, they fall into the hands of a variety of bad actors: foreign governments, criminals, and teenagers on a lark (not necessarily in descending order of malevolence). This plague is being spread over the Internet by a veritable army of CIA hackers: “By the end of 2016,” WikiLeaks tells us, “the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other ‘weaponized’ malware.” The inevitable end result: a world infected with so much malware that computers become almost useless – and this parlous condition is paid for by you, the American taxpayer.

This is, in effect, the cybernetic equivalent of the Iraq war – an invasion that led to such unintended consequences as the rise of ISIS, the devastation of Syria, and the empowerment of Iran. In short, a war that made us less safe.

One aspect of the Vault 7 data dump that’s drawing particular attention is the CIA’s Remote Devices Branch’s “Umbrage group,” which, we are told, “collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.” The idea is to mask the Agency’s cyberwar operations by attempting to hide the unique forensic attributes of its techniques. The process of attribution, WikiLeaks explains, is “analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.”

So how does the CIA hide its “fingerprints”?

It simply draws on computer code used by its adversaries – and not only Russia – and inserts it into its own handcrafted malware and other invasive programs, thus leaving Russian (or Chinese, or North Korean) fingerprints on the handiwork of CIA hackers.

Now you’ll recall that the attribution of the DNC/Podesta email hacks was “proved” by the DNC’s hired hands on the basis of the supposedly unique characteristics of the programs used by the supposed Russian hackers. One of these alleged Russians even left behind the name of Felix Dzerzhinsky – founder of the Soviet KGB – embedded in the code, hardly the height of subtlety. So now we learn that the CIA has perfected the art of imitating its rivals, mimicking the Russians – or whomever – in a perfect setup for a “false flag” scenario.

After months of the nonstop campaign to demonize the Russians as “subverting our democracy” and supposedly throwing the election to Donald Trump by hacking the DNC and Podesta, a new possibility begins to emerge. I say “possibility” because, despite the craziness that is fast becoming the norm, there has got to be a limit to it – or does there?

No, I’m not suggesting the CIA hacked the DNC and poor hapless John Podesta. Yet others are suggesting something even more explosive.

In an appearance on Sean Hannity’s Fox News television program, retired Lt. Col. Tony Shaffer, a former senior intelligence officer, told the audience that he had heard from his intelligence contacts that retired NSA officials were responsible for hacking the DNC and Podesta, and then releasing the materials to WikiLeaks His co-guest,William Binney, a former NSA insider who was among the first to expose the extent of that agency’s surveillance of American citizens, agreed.

This is nothing new: Judge Andrew Napolitano said the same thing months ago. The alleged motivation was animus toward Mrs. Clinton.

Although “the Russians did it” is now the accepted conventional wisdom, which hardly anyone bothers to question anymore, the level of evidence proffered to support this conclusion has been laughably inadequate. And you’ll note that, although the CIA and the FBI, along with other intelligence agencies, advanced this hypothesis with “high confidence,” the NSA demurred, awarding it with only “moderate” confidence.

And one more thing: I found it extremely odd that, when the hacking of the DNC and John Podesta’s email was discovered, party officials refused to let the FBI and other law enforcement agencies examine either their server or Podesta’s devices. Instead, they gave it over to CrowdStrike, a private firm that regularly does business with the DNC. CrowdStrike then came out with the now-accepted analysis that it was a Russian job.

Could it be that the “explanation” for the hacking was determined in advance?

I don’t know the answer to that question. Nor do I necessarily buy Col. Shaffer’s thesis. What I’m saying is that it’s entirely possible – indeed, it is just as likely, given what we know now, as pinning the blame Vladimir Putin.

So what is the lesson of all this?

We have created a monster, a Deep State with such unchecked power, armed with such Orwellian technology, that it represents a clear and present danger to our constitutional republic. This threat is underscored not only by the latest WikiLeaks revelations, but also by the intelligence community’s intervention in our domestic politics, which has been documented in the headlines of the nation’s newspapers for the past few months.

This cancer has been allowed to grow, undiagnosed and unopposed, within the vitals of our government in the name of “national security.” Accelerated by our foreign policy of perpetual war, the national security bureaucracy has accumulated immense power, and our elected leaders have neglected to provide any oversight. Indeed, they are at its mercy.

The latest WikiLeaks revelations should be a wake-up call for all of us who want to preserve what’s left of our constitutionally-guaranteed liberties. Either we slay the monster or it will enslave us.

Reprinted with permission from Antiwar.com.

from Ron Paul Institute Featured Articles

via IFTTT

No comments:

Post a Comment

Merchandise



See other gifts available on Zazzle.

Ron Paul America Cloud

Site Credits

Ron Paul America

is voluntarily affiliated with

Liberty Operations Group

______________________________

Site created, maintained and hosted by

Liberty Web Services

Tags

#TurnOnTheTruth 2008 2012 4th amendment 911 ACTION Afghanistan war Agency Aggression Principle al-Qaeda Alan Colmes Alert America America's Fault Americans antigun AR 15 assault weapon Audit Authoritarian bailouts Believe Big Brother big government bill of rights Blame blowback bubbles Bush Campaign for Liberty Career Politician Eric Cantor Central Bank Charity China churches collapse Collectivism Commission committee Compassion Congress Conservative constitution Crash dangerous person Democrat Democrats Donald Trump Donald Trump. Planned Parenthood drones economic Economy Edward Snowden End the Fed European Union Federal Reserve Floyd Bayne floyd bayne for congress force foreign interventionism free market free markets GOP Nominee GOP Presidential Debates Government Great Depression gun control House of Representatives housing bubble HR 1745 I like Ron Paul except on foreign policy If ye love wealth better than liberty IFTTT Individual Individualism Institute Irag Iran Iraq war ISIL ISIS Judge Andrew Napalitano libertarian Liberty Liberty Letters Liberty Report Lost mass Media meltdown metadata Micheal Moore Middle East Mitt Romney nap National Neocons New Ron Paul Ad New York Times Newsletters Newt Gingrich No Non non-interventionism NSA NSA Snooping Obama Overreach overthrow Patriot Act peace politicians Pope Francis President Presidential Presidential Race programs prosperity Race Racist Racist Newsletters Rand Paul Read the Bills Act recessions redistribution of wealth refugee crisis Repeal Obamacare Report Republican Republican Nomination Republican Nominee Republicans Revolution Rick Santorum Rick Santorum Exposed Ron Ron Paul Ron Paul Institute Ron Paul Institute Featured Articles Ron Paul Institute for Peace And Prosperity Ron Paul Institute Peace and Prosperity Articles Ron Paul Next Chapter Media Channel Ron Paul Racist Newsletters ron paul's foreign policy Ronald Reagan ronpaulchannel.com ronpaulinstitute.org Rosa DeLauro russia Samuel Adams Saudi Arabia Second Amendment Security Senate Senator September 11th attacks Show Soviet Spying stimulate Stock Market surveillance Syria tech bubble terrorist The the Fed the poor US US foreign policy Us troops USA Freedom Act Virginia Virginia Republican Primary voluntarism. Liberty Voluntary Warner Warning warrantless wiretaps YouTube