Washington Post’s ‘Fake News’ Guilt, by Robert Parry

Gathered together in one place, for easy access, an agglomeration of writings and images relevant to the Rapeutation phenomenon.

Re: Washington Post’s ‘Fake News’ Guilt, by Robert Parry

Postby admin » Wed Dec 28, 2016 11:43 pm

PropOrNot: Evidence of a CIA Psychological Operation
by Kurt Nimmo
December 15, 2016
Copyright © 2016 Boiling Frogs Post

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


On November 24, The Washington Post published a story citing the anonymous group PropOrNot. The story accused the Russians of building a large propaganda operation that worked to defeat Hillary Clinton and elect “insurgent candidate” Donald Trump. It claimed a large number of alternative news websites are acting as Russian agents, dupes, and useful idiots.

Prior to this, in March 2015, the Voice of America insisted Russia has organized “around-the-clock operation in which an army of trolls disseminated pro-Kremlin and anti-Western talking points on blogs and in the comments sections of news websites in Russia and abroad.”

Voice of America is a propaganda service created by the CIA during the Cold War.

In January, the Institute of Modern Russia and its Interpreter Mag teamed up with the CIA through Voice of America to combat “Kremlin disinformation and propaganda.” The Institute of Modern Russia maintains close relationships with many Russian opposition leaders.

Critics took The Washington Post to task for using PropOrNot as a source. The website and PropOrNot’s Facebook and Twitter accounts give no indication who is behind the effort. Despite this, the Post cited the site to make the argument many alternative websites are “fake news” sites working in tandem with the Russians.

PropOrNot has all the hallmarks of an intelligence operation run by the CIA, FBI, or one of a number of other intelligence agencies.

Following the terror attacks of September 11, 2001, the official narrative pushed by the government and echoed dutifully by the establishment media claimed Osama bin Laden and al-Qaeda masterminded the attack from a cave in Afghanistan. This and other elements of the official narrative were criticized, primarily by the alternative media. The government and its propaganda media dismissed the criticism of the official narrative and began characterizing critics as conspiracy theorists.

In early 2008, Cass Sunstein, a Harvard scholar and later the Administrator of the White House Office of Information and Regulatory Affairs in the Obama administration, wrote a paper with colleague Adrian Vermeule titled simply “Conspiracy Theories.” Sunstein and Vermeule argue the existence of conspiracy theories “may create serious risks, including risks of violence, and the existence of such theories raises significant challenges for policy and law.”

In addition to proposing outright censorship of information the government considers“extremist theories,” Sunstein and his co-author suggest using “cognitive infiltration” of groups and networks.

Instead of a covert operation resembling the FBI’s Operation COINTELPRO using physical infiltration to disrupt and discredit political groups, Sunstein proposed attacking targeted groups in cyberspace.

Sunstein and Vermeule write that “whatever the tactical details, there would seem to be ample reason for government efforts to introduce some cognitive diversity into the groups that generate conspiracy theories.”

In 2011, The Guardian reported the US military was developing software that would allow it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda.

General and later CIA director David Petraeus suggested using online psychological operations aimed at “countering extremist ideology and propaganda.” The objective of the Pentagon effort was “to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives,” according to the report.

The effort to counter alternative websites is not limited to the United States. In September 2014, writes noted researcher and author Thierry Meyssan, the British government created the 77th Brigade, a unit established to counter foreign propaganda.

“The brigade will be made up of warriors who don’t just carry weapons, but who are also skilled in using social media such as Twitter and Facebook, and the dark arts of ‘psyops’—psychological operations,” the BBC reported last January.

The unit works with British intelligence through MI6 and collaborates with the 361st Civil Affairs Brigade of the US Army. “These military units were used to disrupt Western websites trying to establish the truth… on September 11 [and] the war against Syria,” writes Meyssan.

MI6 is also involved in a European effort to undermine Russian and alternative media. In March 2015, the European Council asked High Representative Federica Mogherini to prepare a plan of “strategic communication” to denounce the disinformation campaigns of Russia about Ukraine.

The following month, Mogherini created within the European External Action Service a strategic information unit headed by Giles Portman, a British MI6 agent. It provides anti-Russian propaganda to European news services.

Others have called for an outright ban on what European governments consider “fake news” dispensed by Russia and its supposed operatives and dupes. In February 2015, the think tank of the French Socialist Party called for censorship and the French minister of education organized workshops to warn students about supposed conspiracy theories.

The Center for European Policy Analysis, a Washington think tank dedicated to the study of Central and Eastern Europe, also set-up an information warfare unit directed against the Russian Federation.

Its advisory council includes Zbigniew Brzezinski (former national security advisor and virulent Russophobe), Eliot Cohen (Bush era neocon and former adviser to the secretary of state Condoleezza Rice), and Madeleine Albright (Clinton administration secretary of state who said killing 500,000 Iraqi children was “worth it”).

Although PropOrNot strives to remain anonymous, it does reveal connections to Modern Russia and its Interpreter Mag and thus, through Voice of America, its association with the CIA. Interpreter Mag is listed under “Related Projects” on its website.

PropOrNot also collaborates with Polygraph Fact-Check, a purported fact-checking website produced by Radio Free Europe/Radio Liberty and Voice of America, in other words, the CIA.

Another so-called fact-checking operation is listed, Politifact. It is a project of the Tampa Bay Times and the Poynter Institute and shares a donor with the Clinton Foundation, the Omidyar Network, created by eBay founder Pierre Omidyar. He is a major donor of Kiev-based Hromadske TV, “the symbol of the info wars between Moscow and the Western world,” according to Forbes. The effort is also supported by the US State Department, a number of European governments, and NGOs involved in Ukraine prior to and after the US-sponsored coup.


[Narrator] So are all of these revolutions actually initiated by the Americans? We can look back at what happened during the Orange Revolution in the Ukraine for evidence. The events that took place in Kiev in 2005 appear to endorse this assumption.

Traditionally, the Ukraine was part of Russia, but by the end of 2004 the tide had turned.

The United States pumped millions of dollars into the opposition movements in favor of regime change.
We are meeting with the two former leaders of the Ukraine revolution. Just by being a member of the opposition movement, Pora, they received significant sums of money, together with training in civil disobedience. Finally, they were given the book.

[Mychailo Swystowitsch, Former Ukraine Activist] Oh yes, the book by Gene Sharp. We all used it. And it connected us with everybody. Without Pora in Serbia, the opposition movement in Belarus and Kmara in Georgia, ...

Image

[Narrator] It was in November, 2004, when hundreds of thousands of people flooded Independent Square in Kiev and demanded Viktor Yushchenko for their president. At the end of the revolution, the crowd got what they demanded. Yushchenko became president due to the massive support he received from the Western World.

[Dmytro Poteschin, Political Consultant] We had a number of great examples of dramatizing, as well as having fun on the streets.

[Narrator] The revolution as a celebration. This is the spirit of Gene Sharp. Every movement becomes a brand with its own symbolism.

Oranges in Ukraine, the Rose Revolution in Georgia, the Tulip Revolution in Kyrgyzstan, the Denim Revolution in Belarus.

All different symbols, but with the same concept and the same sponsor: The United States of America.

-- The Revolution Business, Report by Patrick A. Hafner, Alexander Steinbach -- Illustrated Screenplay


PropOrNot’s connections indicate the website and its effort to take down alternative media is a project initiated by the establishment and likely a psychological operation directed by the CIA either directly or through its circle of private contractors.

The defeat of Hillary Clinton has nothing to do with the effectiveness of Russian propaganda. More accurately, Clinton’s election loss is a direct result of her corruption and deep insider status. The alternative media played an instrumental role in exposing Clinton’s criminality and her penchant for war and mass murder, primarily in Libya and Syria.

The alternative media has done an effective job of exposing the crimes of the elite and its political class and this news coverage did, in fact, have an impact on the election. Alternative media is a serious threat to the ruling elite. It no longer controls the flow of information and its propaganda is now directly challenged on a daily basis.

The Washington Post and the establishment media have latched on to the ludicrous PropOrNot campaign to denounce alternative media as some sort of nefarious Russian plot to undermine the political system in the United States. Despite this, millions of Americans continue to read the alternative news and make their own informed decisions, a trend that has set off alarm bells in the deepest recesses of the establishment.
admin
Site Admin
 
Posts: 18033
Joined: Thu Aug 01, 2013 5:21 am

Re: Washington Post’s ‘Fake News’ Guilt, by Robert Parry

Postby admin » Wed Dec 28, 2016 11:56 pm

Who’s Behind PropOrNot’s Blacklist of News Websites
By Pam Martens and Russ Martens
December 7, 2016
© 2016 Wall Street On Parade.

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


A shadowy group called PropOrNot (shorthand for Propaganda Or Not) that has gone to a great deal of trouble to keep its funders and principals secret, is promulgating a blacklist of 200 alternative media websites that it has labeled “Russian propaganda outlets.” On Thanksgiving Day, Washington Post reporter Craig Timberg amplified this smear campaign in an article giving credence to the anonymous group’s research.

While a handful of state-funded sites are included on the list, both the Washington Post and PropOrNot have come under withering criticism for engaging in McCarthyism by including dozens of respected sites like Naked Capitalism, Truthout, Truthdig, Consortium News and, initially, CounterPunch, on the list. (CounterPunch has since been removed and Naked Capitalism’s lawyer has sent a scorching letter to the Washington Post demanding a retraction and an apology.) The widely read Paul Craig Roberts also landed on the blacklist. Roberts is a former Assistant Secretary of the U.S. Treasury for Economic Policy under President Ronald Reagan, a former Associate Editor of the Wall Street Journal and a former columnist at BusinessWeek. He held Top Secret clearance when he worked for the U.S. government.

Wall Street On Parade closely examined the report issued by PropOrNot, its related Twitter page, and its registration as a business in New Mexico, looking for “tells” as to the individual(s) behind it. We learned quite a number of interesting facts.

As part of its McCarthyite tactics, PropOrNot has developed a plugin to help readers censor material from the websites it has blacklisted. It calls that its YYYCampaignYYY. In that effort, it lists an official address of 530-B Harkle Road, Suite 100, Santa Fe, New Mexico 87505. That’s one of those agent addresses that serve as a virtual address for the creation of limited liability corporations that want to keep their actual principals secret. The address has dozens of businesses associated with it. There should also be a corresponding business listed in the online archives of the business registry at the Secretary of State of New Mexico. However, no business with the words Propaganda or PropOrNot or YYY exist in the New Mexico business registry, suggesting PropOrNot is using a double cloaking device to shield its identity by registering under a completely different name.

PropOrNot’s Twitter page provides a “tell” that its report may simply be a hodgepodge compilation of other people’s research that was used to arrive at its dangerous assertion that critical thinkers across America are a clandestine network of Russian propaganda experts. Its Tweet on November 7 indicates that the research of Peter Pomerantsev, a Senior Fellow at the Legatum Institute in London, who has also been cooperating on research with the Information Warfare Project of the Center for European Policy Analysis (CEPA) in Washington, D.C, inspired its efforts.

According to SourceWatch, the Legatum Institute “is a right-wing think tank promoting ‘free markets, free minds, and free peoples.’ ” SourceWatch adds that the Legatum Institute “is a project founded and funded by the Legatum Group, a private investment group based in Dubai.”


Barack Obama’s repeated insistence that Bashar al-Assad must leave office – and that there are ‘moderate’ rebel groups in Syria capable of defeating him – has in recent years provoked quiet dissent, and even overt opposition, among some of the most senior officers on the Pentagon’s Joint Staff. Their criticism has focused on what they see as the administration’s fixation on Assad’s primary ally, Vladimir Putin. In their view, Obama is captive to Cold War thinking about Russia and China, and hasn’t adjusted his stance on Syria to the fact both countries share Washington’s anxiety about the spread of terrorism in and beyond Syria; like Washington, they believe that Islamic State must be stopped.

The military’s resistance dates back to the summer of 2013, when a highly classified assessment, put together by the Defense Intelligence Agency (DIA) and the Joint Chiefs of Staff, then led by General Martin Dempsey, forecast that the fall of the Assad regime would lead to chaos and, potentially, to Syria’s takeover by jihadi extremists, much as was then happening in Libya. A former senior adviser to the Joint Chiefs told me that the document was an ‘all-source’ appraisal, drawing on information from signals, satellite and human intelligence, and took a dim view of the Obama administration’s insistence on continuing to finance and arm the so-called moderate rebel groups. By then, the CIA had been conspiring for more than a year with allies in the UK, Saudi Arabia and Qatar to ship guns and goods – to be used for the overthrow of Assad – from Libya, via Turkey, into Syria. The new intelligence estimate singled out Turkey as a major impediment to Obama’s Syria policy. The document showed, the adviser said, ‘that what was started as a covert US programme to arm and support the moderate rebels fighting Assad had been co-opted by Turkey, and had morphed into an across-the-board technical, arms and logistical programme for all of the opposition, including Jabhat al-Nusra and Islamic State. The so-called moderates had evaporated and the Free Syrian Army was a rump group stationed at an airbase in Turkey.’ The assessment was bleak: there was no viable ‘moderate’ opposition to Assad, and the US was arming extremists.

Lieutenant General Michael Flynn, director of the DIA between 2012 and 2014, confirmed that his agency had sent a constant stream of classified warnings to the civilian leadership about the dire consequences of toppling Assad. The jihadists, he said, were in control of the opposition. Turkey wasn’t doing enough to stop the smuggling of foreign fighters and weapons across the border. ‘If the American public saw the intelligence we were producing daily, at the most sensitive level, they would go ballistic,’ Flynn told me. ‘We understood Isis’s long-term strategy and its campaign plans, and we also discussed the fact that Turkey was looking the other way when it came to the growth of the Islamic State inside Syria.’ The DIA’s reporting, he said, ‘got enormous pushback’ from the Obama administration. ‘I felt that they did not want to hear the truth.’

‘Our policy of arming the opposition to Assad was unsuccessful and actually having a negative impact,’ the former JCS adviser said. ‘The Joint Chiefs believed that Assad should not be replaced by fundamentalists. The administration’s policy was contradictory. They wanted Assad to go but the opposition was dominated by extremists. So who was going to replace him? To say Assad’s got to go is fine, but if you follow that through – therefore anyone is better. It’s the “anybody else is better” issue that the JCS had with Obama’s policy.’ The Joint Chiefs felt that a direct challenge to Obama’s policy would have ‘had a zero chance of success’. So in the autumn of 2013 they decided to take steps against the extremists without going through political channels, by providing US intelligence to the militaries of other nations, on the understanding that it would be passed on to the Syrian army and used against the common enemy, Jabhat al-Nusra and Islamic State.

Germany, Israel and Russia were in contact with the Syrian army, and able to exercise some influence over Assad’s decisions – it was through them that US intelligence would be shared. Each had its reasons for co-operating with Assad: Germany feared what might happen among its own population of six million Muslims if Islamic State expanded; Israel was concerned with border security; Russia had an alliance of very long standing with Syria, and was worried by the threat to its only naval base on the Mediterranean, at Tartus. ‘We weren’t intent on deviating from Obama’s stated policies,’ the adviser said. ‘But sharing our assessments via the military-to-military relationships with other countries could prove productive. It was clear that Assad needed better tactical intelligence and operational advice. The JCS concluded that if those needs were met, the overall fight against Islamist terrorism would be enhanced. Obama didn’t know, but Obama doesn’t know what the JCS does in every circumstance and that’s true of all presidents.’

Once the flow of US intelligence began, Germany, Israel and Russia started passing on information about the whereabouts and intent of radical jihadist groups to the Syrian army; in return, Syria provided information about its own capabilities and intentions. There was no direct contact between the US and the Syrian military; instead, the adviser said, ‘we provided the information – including long-range analyses on Syria’s future put together by contractors or one of our war colleges – and these countries could do with it what they chose, including sharing it with Assad. We were saying to the Germans and the others: “Here’s some information that’s pretty interesting and our interest is mutual.” End of conversation. The JCS could conclude that something beneficial would arise from it – but it was a military to military thing, and not some sort of a sinister Joint Chiefs’ plot to go around Obama and support Assad. It was a lot cleverer than that. If Assad remains in power, it will not be because we did it. It’s because he was smart enough to use the intelligence and sound tactical advice we provided to others.’

The public history of relations between the US and Syria over the past few decades has been one of enmity. Assad condemned the 9/11 attacks, but opposed the Iraq War. George W. Bush repeatedly linked Syria to the three members of his ‘axis of evil’ – Iraq, Iran and North Korea – throughout his presidency. State Department cables made public by WikiLeaks show that the Bush administration tried to destabilise Syria and that these efforts continued into the Obama years. In December 2006, William Roebuck, then in charge of the US embassy in Damascus, filed an analysis of the ‘vulnerabilities’ of the Assad government and listed methods ‘that will improve the likelihood’ of opportunities for destabilisation. He recommended that Washington work with Saudi Arabia and Egypt to increase sectarian tension and focus on publicising ‘Syrian efforts against extremist groups’ – dissident Kurds and radical Sunni factions – ‘in a way that suggests weakness, signs of instability, and uncontrolled blowback’; and that the ‘isolation of Syria’ should be encouraged through US support of the National Salvation Front, led by Abdul Halim Khaddam, a former Syrian vice president whose government-in-exile in Riyadh was sponsored by the Saudis and the Muslim Brotherhood. Another 2006 cable showed that the embassy had spent $5 million financing dissidents who ran as independent candidates for the People’s Assembly; the payments were kept up even after it became clear that Syrian intelligence knew what was going on. A 2010 cable warned that funding for a London-based television network run by a Syrian opposition group would be viewed by the Syrian government ‘as a covert and hostile gesture toward the regime’.

But there is also a parallel history of shadowy co-operation between Syria and the US during the same period. The two countries collaborated against al-Qaida, their common enemy. A longtime consultant to the Joint Special Operations Command said that, after 9/11, ‘Bashar was, for years, extremely helpful to us while, in my view, we were churlish in return, and clumsy in our use of the gold he gave us. That quiet co-operation continued among some elements, even after the [Bush administration’s] decision to vilify him.’ In 2002 Assad authorised Syrian intelligence to turn over hundreds of internal files on the activities of the Muslim Brotherhood in Syria and Germany. Later that year, Syrian intelligence foiled an attack by al-Qaida on the headquarters of the US Navy’s Fifth Fleet in Bahrain, and Assad agreed to provide the CIA with the name of a vital al-Qaida informant. In violation of this agreement, the CIA contacted the informant directly; he rejected the approach, and broke off relations with his Syrian handlers. Assad also secretly turned over to the US relatives of Saddam Hussein who had sought refuge in Syria, and – like America’s allies in Jordan, Egypt, Thailand and elsewhere – tortured suspected terrorists for the CIA in a Damascus prison.

It was this history of co-operation that made it seem possible in 2013 that Damascus would agree to the new indirect intelligence-sharing arrangement with the US. The Joint Chiefs let it be known that in return the US would require four things: Assad must restrain Hizbullah from attacking Israel; he must renew the stalled negotiations with Israel to reach a settlement on the Golan Heights; he must agree to accept Russian and other outside military advisers; and he must commit to holding open elections after the war with a wide range of factions included. ‘We had positive feedback from the Israelis, who were willing to entertain the idea, but they needed to know what the reaction would be from Iran and Syria,’ the JCS adviser told me. ‘The Syrians told us that Assad would not make a decision unilaterally – he needed to have support from his military and Alawite allies. Assad’s worry was that Israel would say yes and then not uphold its end of the bargain.’ A senior adviser to the Kremlin on Middle East affairs told me that in late 2012, after suffering a series of battlefield setbacks and military defections, Assad had approached Israel via a contact in Moscow and offered to reopen the talks on the Golan Heights. The Israelis had rejected the offer. ‘They said, “Assad is finished,”’ the Russian official told me. ‘“He’s close to the end.”’ He said the Turks had told Moscow the same thing. By mid-2013, however, the Syrians believed the worst was behind them, and wanted assurances that the Americans and others were serious about their offers of help.

In the early stages of the talks, the adviser said, the Joint Chiefs tried to establish what Assad needed as a sign of their good intentions. The answer was sent through one of Assad’s friends: ‘Bring him the head of Prince Bandar.’ The Joint Chiefs did not oblige. Bandar bin Sultan had served Saudi Arabia for decades in intelligence and national security affairs, and spent more than twenty years as ambassador in Washington. In recent years, he has been known as an advocate for Assad’s removal from office by any means. Reportedly in poor health, he resigned last year as director of the Saudi National Security Council, but Saudi Arabia continues to be a major provider of funds to the Syrian opposition, estimated by US intelligence last year at $700 million.

In July 2013, the Joint Chiefs found a more direct way of demonstrating to Assad how serious they were about helping him. By then the CIA-sponsored secret flow of arms from Libya to the Syrian opposition, via Turkey, had been underway for more than a year (it started sometime after Gaddafi’s death on 20 October 2011).​* The operation was largely run out of a covert CIA annex in Benghazi, with State Department acquiescence. On 11 September 2012 the US ambassador to Libya, Christopher Stevens, was killed during an anti-American demonstration that led to the burning down of the US consulate in Benghazi; reporters for the Washington Post found copies of the ambassador’s schedule in the building’s ruins. It showed that on 10 September Stevens had met with the chief of the CIA’s annex operation. The next day, shortly before he died, he met a representative from Al-Marfa Shipping and Maritime Services, a Tripoli-based company which, the JCS adviser said, was known by the Joint Staff to be handling the weapons shipments.]

By the late summer of 2013, the DIA’s assessment had been circulated widely, but although many in the American intelligence community were aware that the Syrian opposition was dominated by extremists the CIA-sponsored weapons kept coming, presenting a continuing problem for Assad’s army. Gaddafi’s stockpile had created an international arms bazaar, though prices were high. ‘There was no way to stop the arms shipments that had been authorised by the president,’ the JCS adviser said. ‘The solution involved an appeal to the pocketbook. The CIA was approached by a representative from the Joint Chiefs with a suggestion: there were far less costly weapons available in Turkish arsenals that could reach the Syrian rebels within days, and without a boat ride.’ But it wasn’t only the CIA that benefited. ‘We worked with Turks we trusted who were not loyal to Erdoğan,’ the adviser said, ‘and got them to ship the jihadists in Syria all the obsolete weapons in the arsenal, including M1 carbines that hadn’t been seen since the Korean War and lots of Soviet arms. It was a message Assad could understand: “We have the power to diminish a presidential policy in its tracks.”’

The flow of US intelligence to the Syrian army, and the downgrading of the quality of the arms being supplied to the rebels, came at a critical juncture. The Syrian army had suffered heavy losses in the spring of 2013 in fighting against Jabhat al-Nusra and other extremist groups as it failed to hold the provincial capital of Raqqa. Sporadic Syrian army and air-force raids continued in the area for months, with little success, until it was decided to withdraw from Raqqa and other hard to defend, lightly populated areas in the north and west and focus instead on consolidating the government’s hold on Damascus and the heavily populated areas linking the capital to Latakia in the north-east. But as the army gained in strength with the Joint Chiefs’ support, Saudi Arabia, Qatar and Turkey escalated their financing and arming of Jabhat al-Nusra and Islamic State, which by the end of 2013 had made enormous gains on both sides of the Syria/Iraq border.

-- Military to Military – Seymour M. Hersh on US intelligence sharing in the Syrian war, by London Review of Books


According to the Internet Archive known as the Wayback Machine, the Center for European Policy Analysis previously indicated it was an affiliate of the National Center for Policy Analysis (NCPA). We can see why they might want to remove that affiliation now that the Koch brothers have been exposed as funders of a very real network of interrelated websites and nonprofits. According to Desmog, NCPA has received millions of dollars in funding from right wing billionaires like the Koch brothers and their related trusts along with the Lynde and Harry Bradley Foundation, the Sarah Scaife Foundation (heir to the Mellon fortune) along with corporations like ExxonMobil.

CEPA’s InfoWar Project is currently listed as a “Related Project” at PropOrNot’s website. Indeed, there are numerous references within the report issued by PropOrNot that sound a familiar refrain to Pomerantsev and/or CEPA. Both think the U.S. Congress is in denial on the rising dangers of Russian propaganda and want it to take more direct counter measures. Pages 31 and 32 of the PropOrNot report urge the American people to demand answers from the U.S. government about how much it knows about Russian propaganda. The report provides a detailed list of specific questions that should be asked.

In the August 2016 report released by CEPA (the same month the PropOrNot Twitter account was established) Pomerantsev and his co-author, Edward Lucas, recommend the establishment of “An international commission under the auspices of the Council of Europe on the lines of the Venice Commission” to “act as a broadcasting badge of quality. If an official body cannot be created, then an NGO could play a similar advisory role.”

On its website, PropOrNot recommends a much stronger censorship of independent media websites, writing:

“We call on the American public to… Obtain news from actual reporters, who report to an editor and are professionally accountable for mistakes. We suggest NPR, the BBC, the New York Times, the Wall Street Journal, the Washington Post, Buzzfeed News, VICE, etc, and especially your local papers and local TV news channels. Support them by subscribing, if you can!”


It has been the experience of Wall Street On Parade that the editors of the New York Times are more than willing to ignore brazen misreporting of critical facts, even when the errors are repeatedly brought to their attention; even when those erroneous facts are then repeated by the President of the United States. (See our report: President Obama Repeats the Falsehoods of the New York Times and Andrew Ross Sorkin on Restoring the Glass-Steagall Act.)

CounterPunch was quick to point out that the Washington Post’s former publisher, Philip Graham, supervised a disinformation network for the CIA during the Cold War, known as Mockingbird. Graham was reported to have died of a self-inflicted gunshot wound at his farm in 1963.

CEPA’s website indicates that on May 10 it hosted Senators Chris Murphy and Rob Portman to discuss “Russia’s sophisticated disinformation campaign.” CEPA’s President, A. Wess Mitchell is quoted as saying: “What’s missing is a significant effort on the part of the U.S. government. Not nearly enough has been done.”

Six days after Washington Post reporter Craig Timberg ran his first PropOrNot story, he published another article indicating that “Congressional negotiators on Wednesday approved an initiative to track and combat foreign propaganda amid growing concerns that Russian efforts to spread ‘fake news’ and disinformation threaten U.S. national security.” Quoted in the story was none other than the very Senator who had met with CEPA in May on that very topic, Senator Rob Portman.

Portman is quoted as follows: “This propaganda and disinformation threat is real, it’s growing, and right now the U.S. government is asleep at the wheel.” Among Portman’s top three donors to his 2016 Senate race were Citigroup and Goldman Sachs, two Wall Street behemoths that would very much like to pivot the national debate to anything other than Wall Street power and corruption.
admin
Site Admin
 
Posts: 18033
Joined: Thu Aug 01, 2013 5:21 am

Re: Washington Post’s ‘Fake News’ Guilt, by Robert Parry

Postby admin » Thu Dec 29, 2016 5:37 am

Dugin’s Occult Fascism and the Hijacking of Left Anti-Imperialism and Muslim Anti-Salafism
by Wahid Azal
February 10, 2016

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


Image
Eurasian Thunderbolt flag.

In his September 2015 CounterPunch piece, “A New Chapter in the Fascist Internationale,” Alexander Reid Ross highlighted the state of the Fascist Internationale in recent times, underscoring the role of Russian fascist and Fourth Position theorist Alexander Dugin and his networks in it. What is however not widely appreciated about the current state of activities by these Duginist networks, especially in social media, is their active recruitment efforts among the Left as well as among disparate groups of anti-Salafist Shiʿi and Sunni Muslims, particularly among supporters of the Resistance Axis. Rather than a legitimate alliance, this turn of events is arguably an attempt to muddy waters by certain behind the scenes power brokers that could potentially fracture (or otherwise neutralize) a united front against Empire from the grassroots and eventually redirect it to more sinister ends. Here a heretofore undiscussed facet of this development will be broached (a guiding feature informing the subtext of Duginism’s ‘beyond left and right’ ideological catchall); and, that is, the Duginist appropriation of a primarily western occultist framework (and specifically the worldview of Chaos magic) and its transformation by the Duginists into a strategy for political action in the service of the Fascist Internationale.

Whither Dugin’s Traditionalism?

Many discussions around Alexander Dugin in print have outlined his vast, often contradictory, influences, background and ideological trajectory. For example, Dugin’s ‘Traditionalism’ or ‘neo-Traditionalism’ – i.e. his adherence to the ideas of French Sufi Muslim convert René Guénon (d. 1951) and the Italian Julius Evola (d. 1974) – has been detailed by Mark Sedgwick and others (see, for instance, Sedgwick’s Against the Modern World, 2004: chapter 12). However, at least in more recent years, Dugin’s Traditionalism appears to be overstated, since his fanatical (almost messianic) Heideggerianism – face to face with the dismissive, often overtly hostile, views held by many eminent figures of the Traditionalist school towards Martin Heidegger – has seemingly placed him outside of the proverbial neo-Traditionalist pale. Comments made in an early chapter of his 2014 book, ‘Martin Heidegger: The Philosophy of Another Beginning’ (2014: 18), where Heidegger has been elevated by Dugin to the status of a culminating eschatological figure on par with the prophet of Islam, only reinforces such negatively held views about Dugin’s ‘anti-Traditionalism’ among some contemporary neo-Traditionalists.

As such Alexander Dugin’s purported Traditionalism, which used to serve at one point as his biographical headliner, is no longer a reliable feature which can be taken uncritically and at face value. If he once was, as of now at least, Dugin is no longer a neo-Traditionalist in any meaningful sense, which makes the use and appropriation of the term by North American white nationalist acolytes of Dugin, such as Matthew Heimbach, hold even less validity. Therefore, to continue discussing Dugin’s current ideas and stances in light of Guénonian-Evolian Traditionalism can in fact be misleading because he has in recent times moved in the opposite direction and into what some neo-Traditionalists would probably characterize as ‘counter-initiatic currents’ and the ‘Counter-Tradition’.

Chaos Magic as the True Duginist weltanschauung

The misanthropic ideas of British occultist and satanist Aleister Crowley (d. 1947) do however inform both the Duginist world view and its contemporary praxis. Indeed it is within the worldview of Chaos magic specifically (which is a spawn of Crowley’s Thelemic philosophy) where much of the paradoxes and seeming contradictions of the Duginist weltanschauung – and especially in its Fourth Positionist catchall of ‘beyond right or left’ – must be sought, since this is (whether explicitly articulated or not) the actual animating locus of the Duginist far-right praxis, beginning with its choice of symbology, i.e. his Eurasian flag of eight white or yellow thunderbolts (or arrows) shaped in a radial pattern and set behind a black background. This symbol by itself is alternatively referred to in Chaos magic as the ‘wheel of chaos’, ‘the symbol of chaos’, ‘arms of chaos’, ‘the arrows of chaos’, ‘the chaos star’, ‘the chaos cross’, ‘the chaosphere’ or ‘the symbol of eight’. Somewhat reminiscent of the Thule Society and then Hitler’s own appropriation of the swastika from the writings of Theosophical Society founder H.P. Blavatsky (d. 1891), Dugin derives his design from the popularizations of it made by western Chaos magicians during the 1970s-1980s who themselves appropriated it from the work of British science fiction and fantasy novelist Michael Moorcock.

It should be noted here that both the number eight as well as the color black play a pivotal role in all neo-Nazi/far-right symbology, not to mention that the ‘wheel of chaos’ itself maintains striking similarities to the well known ‘sun wheel’ symbol used by the SS and many contemporary neo-Nazis (likewise the symbol of the old Spanish Falangists). In his own defence, Dugin would probably assert that the number eight also holds important correspondences within esoteric Christianity as well where it refers to Christ. However, his obvious (or dubious, rather) choice of the ‘wheel of chaos’ over the cross would tend to refute that claim. In addition, as a self-proclaimed Russian nationalist, it is not clear exactly why Alexander Dugin would choose his chief symbol from sources located within the tradition of British occultism rather than from those of his native Russia or, for that matter, from the Eastern Orthodox Christianity that he claims to adhere to. This point alone, we believe, further reinforces the allegations regarding Dugin’s anti-traditionalism, while simultaneously locating him in a very different universe altogether than the one he claims to be speaking for.

Be that as it may, such behaviour in itself would be quite consistent with Chaos magic’s basic dictum regarding the malleability of all beliefs and their pliability as tools in the hands of the Chaos magician. Here it is the Nietzschean ‘will to power’ in-itself that becomes the prime motivation of the black magus turned political activist. Emerging from this, the next significant formula of Chaos magic is that of a continual paradigm shift or the constant arbitrary changing of beliefs, where holding contradictory positions simultaneously becomes the vehicle for self-realization and understanding of the coincidentia oppositorum underlying all phenomena. As a spiritual practice there are numerous correlations and comparisons that can be made with this specific idea among many traditions around the globe (i.e. Taoist, Sufi, Tantric, Zen, Hermeticism, etc.), and in and of itself it is neutral. Except that with Dugin and his acolytes the issue is not linked specifically to any spiritual practice and its realization per se but rather it is purely about political praxis and the will to power in its crudest form. In other words, for Dugin the alchemical laboratory and its ars operativa resides not in the self but rather in the greater world and the theatre of politics where the black magus acts to immanentize the eschaton and where this eschaton represents the inversion of all values.

The Philosopher’s Stone for Dugin is thus power over the world for its own sake and not over the self. This, including other features of his thinking, is what informs the paradigmatic ‘beyond left and right’ catchall latched on to by the Duginists. It is also what makes Duginism particularly dangerous as an ideology and a movement. In other words, in this worldview where Chaos magic acts as the ideological primum mobile, occultist principles are made to serve a fundamentally fascist political program. Some would also call this a form of Satanism and yet another manifestation of the very modernity and ‘materialist West’ that Alexander Dugin has otherwise railed against. Arguably, and whatever else Dugin says to criticize and distance himself from it, Hitlerian National Socialism attempted precisely the very same thing – animated also, as it was, by almost identical underlying ideological concerns and motivations.


That said, René Guénon alleged about Blavatsky and her Theosophical Society that during the nineteenth and early twentieth century they were essentially acting in the capacity of a colonialist trojan horse put up by the imperial British secret services in order to infiltrate and disrupt the traditional religious sub-cultures of the sub-continent (see his, Theosophy: The History of a Pseudo-Religion, 2004). Given Dugin’s networks in Iran, Lebanon, Syria and elsewhere in the Islamic world, not to mention Eastern Europe, it is not entirely out of the realm of possibility that similar patterns and inducements may be motivating and underlying the Duginists’ recruitment agenda whereby Dugin himself can be seen as the new Blavatsky with his networks the successor to the Theosophical Society-cum-British imperial trojan horse. Certainly their attempt to further break down the already fractured left/right spectrum in Europe in order to recruit for the far-right appears to speak to it directly given that their unambiguous racist and reactionary rhetoric on the immigration/refugee crisis, on the face of things, otherwise defies the alliances they have made inside the Islamic world among Iranians, Iraqis, Lebanese, Syrians and other sectors of the Resistance Axis.

Russia, the European refugee crisis and far-right Duginist geopolitics in action

Now, the instrumental role of NATO in the collapse of the Libyan state in 2011; the Syrian war that is now going into its fifth year; ISIS; Ukraine, and, above all, the European refugee crisis appears to have provided the Duginists a rare opportunity to exploit existing splits arising among cross-sections of the western antiwar Left as well as among activists in the Muslim community itself in order to recruit among these groups. This is especially in evidence in the recent talking points adopted by a number of otherwise progressive and left-leaning pundits who regularly appear on RT (Russia Today) and elsewhere in the alternative media where their usually consistent antiwar stance with regard to Syria specifically (and western imperialism generally) has, in paradoxical fashion, given way instead to a melange of reactionary narratives over the European refugee crisis. In short, we have a situation where certain progressives (and even some Muslims) have adopted the contemporary white supremacist kulturkampf rhetoric of fascists and fellow travellers that largely victimizes Mid East/North African immigrants and asylum seekers in Europe, and where rightwing hysteria over a perceived threat to ‘European culture’ and ‘its way of life’ is uncritically repeated, to varying degrees, parrot fashion.

Whereas some blame Russian state policy directly for such recent developments, the point of view of the present author is that such a turn of events ultimately benefits the agendas of Empire itself rather than Russia specifically such that these Duginists may in fact be sheepdogging for long-term Anglo-American Atlanticist policy initiatives rather than specifically Russian ones. Be that as it may, rumours abound that the Russian state has been a generous donor (and in a few cases has even outright financed for protracted periods) fascist/far-right groups such as Jobbik in Hungary and the Golden Dawn in Greece. Since 2014 in Germany, for instance, the AfD (Alternative für Deutschland), the NPD (Nationaldemokratische Partei Deutschlands) and PEGIDA are alleged to have received substantial financial support from Moscow as a means of destabilizing Merkel and the German center who were key actors in the sanctions imposed on Russia following its annexation of Crimea in March 2014. Similarly is held regarding Le Pen’s Front National in France. Certainly much of the anti-immigration/anti-refugee jingoism published regularly on the pages of RT (Russia Today) as of that time would on the face of things tend to support the allegations.

However, even with that, it is not clear exactly how such policies would strategically benefit Putin’s Russia in the long term either, since these very same forces that Russia ostensibly supports at the moment could quite easily be marshalled at any given point in the future by its Anglo-American geopolitical rival and used against Russia itself, as the case of Ukraine amply demonstrates. Certainly it can be argued that Russia and the Anglo-American Atlanticists are using competing far-right proxies against each other’s interests on the continent as a form of asymmetrical warfare, with Germany as one of the key battlegrounds and the refugee issue as the linchpin. But then this would tend to indicate some kind of split in the Fascist Internationale while also explaining one reason for the aggressive recruitment efforts presently undertaken by the Duginists (especially among Muslims and disenchanted Leftists without a home) on social media and elsewhere. Nevertheless in Greece, for instance, it was not with the Golden Dawn but with Syriza that Dugin personally invested the most time, and Syriza’s role during 2015 in further fracturing consensus among the Anglo-European Left has undeniably been a critical one.

Much more can be said, but whatever rhetoric the Duginists spin among assorted activist communities to draw them in, on its own merits Duginism is neither authentically anti-imperialist nor does it genuinely hold any leftwing values. Nor, for that matter, is it Traditionalism either. Rather, on all fronts Duginism actually represents a carefully smokescreened form of fascist white separatism, which is to say yet another ideological permutation of Euro-American white supremacy that has organized itself into a movement. Dugin’s own skewed definition of Eurasia, where in this scheme Eurasia merely represents the horizontal landmass between Vladivostok and Lisbon (and where all of south-west and south-east Asia are categorically excluded from it), reinforces the fact. As such the seductive dangers represented by Duginism and its networks to any united front against Empire among the anti-imperialist Left and anti-Salafist Muslims cannot be underestimated.

Wahid Azal is an independent scholar and political commentator living in Berlin, Germany. He can be reached on his email at wahidazal66@gmail.com
admin
Site Admin
 
Posts: 18033
Joined: Thu Aug 01, 2013 5:21 am

Re: Washington Post’s ‘Fake News’ Guilt, by Robert Parry

Postby admin » Thu Dec 29, 2016 8:52 pm

UNCLASSIFIED

Guideposts from Just War Theory: Managing Covert Political Action
by James A. Barry
Central Intelligence Agency
1993

In 1954, at the height of US concern about the threat from international communism, President Eisenhower appointed a panel to make recommendations regarding covert political action as an instrument of foreign policy. The panel, named after its chairman, General Jimmy Doolittle, included the following statement in its report:

It is now clear that we are facing an implacable enemy whose avowed objective is world domination by whatever means and at whatever costs. There are no rules in such a game. Hitherto acceptable norms of human conduct do not apply. If the US is to survive, longstanding American concepts of "fair play" must be reconsidered. We must develop effective espionage and counterespionage services and must learn to subvert, sabotage and destroy our enemies by more clever, more sophisticated means than those used against us. It may become necessary that the American people be made acquainted with, understand and support this fundamentally repugnant philosophy.1


In counseling such a radical departure from American norms, the authors of the Doolittle report adopted an argument that appears in hindsight to be extreme. But in the context of the times, it was consistent with several overlapping schools of thought in international affairs that formed the basis for many Cold War policies. The first was the "realist" tradition in international affairs, which traces its origins from the Greek historian Thucydides through the philosophies of Machiavelli, Hobbes, Spinoza and Rousseau to modern theorists such as Hans Morgenthau and Reinhold Neibuhr. Although realists differ significantly in their views, they tend to emphasize the primacy of power in international affairs, and to exclude morality from considerations of making foreign policy.2 Modern realism encompasses views ranging from George Kennan's proposals to combat communism through a patient policy of containment and a low-profile approach to moral issues to Henry Kissinger's opportunistic use of moral language coupled with a belief that moral norms could not govern the conduct of states. Reinforcing the views of the early Cold War realists were the arguments of ideological crusaders who conceived of the struggle with communism as kind of holy war, as well as those of American nationalists who, like General Sherman, believed that "war is hell" and that the merciful thing is in fact to wage it ruthlessly. Members of these several groups supported the need for covert action against communism either because they believed that the exceptional circumstances of the times required it or because they judged that it was simply one of the methods that states used to struggle with each other.3

But it is clear that even the authors of the Doolittle Report were uncomfortable with the "repugnant philosophy" that they deemed necessary. Indeed, although covert political action became an important tool of US policy America never completely abandoned its moral traditions. The threat of international communism, however, became a compelling rationale for covert action, to the extent that many operations needed no more specific justification. Thus the Cold War, and the perceived severity of the Soviet threat, made it possible for policymakers to ignore competing ethical considerations when they endorsed covert actions.

This Cold War rationale began to crumble in the late 1960s with popular opposition to the Vietnam War and the subsequent revelation in Congressional inquiries of abuses by the CIA. The result was that greater attention has been paid to the process of managing covert actions. Until recently, however, despite changes in decisionmaking and oversight mechanisms, the Soviet threat was a dominant consideration in most covert action decisions.

Covert Action and the New World Order

Since the dismantling of the Berlin Wall, the abortive coup in the Soviet Union, and the dissolution of the Soviet empire, the confluence of ideological, nationalist and realist thought that formed a compelling rationale for covert action in the early Cold War period has lost more validity. In a dangerous world, however, presidents probably will not eschew this particular element of foreign policy, even in a "new world order." The Persian Gulf War shows that aggression by hostile states remains a threat to US interests, and other challenges such as terrorism, narcotics trafficking and the potential for proliferation of weapons of mass destruction are likely to motivate the US to consider covert responses. What frame of reference, then, should replace the Cold War philosophy that has shaped covert action policy since the founding of the CIA?

Although the ideological crusade, American nationalism and political realism dominated US thinking about international affairs in the immediate post-World War II era, there are other enduring philosophical traditions. Some emphasize the ends of policy (utilitarianism and Marxism); others are "rule-based" (international law and Kant's rationalism are in this category4).

One of the "rule-based" traditions has received greater attention in recent years. This is the natural law tradition, and in particular its rules regarding the use of force by states, which fall under the rubric of "Just War Theory." Just War Theory was used extensively by the Bush Administration in explaining its decision to go to war, under UN auspices, against Iraq.5 More recently, a symposium of jurists, philosophers, theologians, government officials and military officers affirmed that Just War Theory is useful in deliberations regarding low-intensity conflict.6

Just War Theory

The origins of the Just War Theory can be traced to Saint Augustine in the 4th century A.D., and especially to Saint Thomas Aquinas, who extended and codified it in the 13th century. Just War Theory is in essence a set of guidelines for going to war (the so-called jus ad bellum), and for the conduct of hostilities (jus in bello).7 Though largely associated with Catholic scholars, Just War Theory is not a religious teaching per se, but rather part of a tradition of theological and philosophical thought, dating from Aristotle, that emphasized the importance of ethical processes in decisionmaking.

Aquinas specified three conditions for the decision to go to war: the action must be ordered by proper authority, the cause must be just, and the authority must have a right intention of promoting good or avoiding evil.8 Other authorities subsequently added three further criteria: the action must be a last resort and all peaceful alternatives must have been exhausted, there must be a reasonable probability of success, and the evil and damage which the war entails must be proportionate to the injury it is designed to avert or the injustice which occasions it.9

Once these conditions are met, the belligerent is subject to two further constraints in seeking his military objectives: his actions must be directed against the opponent, not against innocent people; and the means of combat must be proportionate to the just ends envisioned and must be under the control of a competent authority.10

The first of these constraints has been further refined, under the "principle of double effect," to encompass situations in which injury to innocent parties is unavoidable. Aquinas formulated the principle as follows:

There is nothing to hinder one act having two effects, of which one only is the intention of the agent, while the other is beside his intention. But moral acts receive their species from what is intended, not from what is beside the intention, as that is accidental.11


Under this principle, then, a belligerent may, if there is good reason, be justified in permitting incidental evil effects. The conditions governing this, however, are held by most commentators to be exceedingly strict. For example, the action taken must not be evil in itself; the good effect, and not the evil effect, must be intended, and the good effect must not arise out of the evil effect, but both must arise simultaneously from the action taken.12

Modern political theorists have continued the Just War tradition, and focused primarily on the criterion of just cause. Currently, the majority school of thought appears to favor the view that the only justifiable cause for armed conflict is to repel aggression. Traditionally, however, there were two other acceptable causes: to retake something wrongfully taken and to punish wrongdoing.13 Another area of debate has been whether forcible intervention in another state could be justified in order to reform that state's political system, for example in the case of flagrant human-rights abuses.14

The Theory and Covert Action

But what can an arcane theological and philosophical doctrine that is more than 1,600 years old and which was codified to regulate war during the Middle Ages have to do with covert action following the collapse of communism? At least one former practitioner, William Colby, has argued that "a standard for selection of covert actions that are just can be developed by analogy with the longstanding efforts to differentiate just from unjust wars."15 Perhaps more to the point, former Director of Central Intelligence (DCI) William Webster has noted that in its deliberations the CIA's Covert Action Review Group explores three key questions regarding a proposed covert action: "Is it entirely consistent with our laws? Is it consistent with American values as we understand them? And will it make sense to the American people?"16 With respect to the last two considerations, a reformulation of the Just War criteria in common-sense terms would probably appeal to the American people. It seems fair to conclude that the people would want the government to undertake covert actions only if:

The action is approved by the President, after due deliberation within the Executive Branch and with the full knowledge and concurrence of appropriate members of the Congress.
The intentions and objectives are clearly spelled out, reasonable, and just.
There is a reasonable probability of success.
The methods envisioned are commensurate with the objectives.


Moreover, in conducting covert action, it is reasonable to presume that the American people would approve of methods that minimize physical, economic, or psychological injury to innocent people and that are appropriate to the threat and under firm US control.17

Formulated this way, the Just War guidelines seem to be directly applicable to covert paramilitary operations or other actions involving the use of violence or coercion. Those who advocate or approve such covert actions, however, bear the additional burden of demonstrating why they must be conducted covertly. As ethicist Sissela Bok has pointed out, every state requires a measure of secrecy to defend itself, but when secrecy is invoked citizens lose the ordinary democratic checks on those matters that can affect them most strongly.18 In addition, a special problem of operational control can arise when intermediaries (agents) are employed — because their aims may differ from ours, and because the chain of command may be ambiguous or unreliable.19 Finally, most covert actions will necessarily lack the public legitimacy and legal status under international law of a declared, justifiable war. This makes it incumbent on those advocating such actions to take into account the consequences of possible public misunderstanding and international opprobrium.

The Chile Case

It would appear that a framework similar to the Just War Theory could be useful in evaluating covert actions that result in economic dislocation, distortion of political processes or manipulation of information, because these cause suffering or moral damage, as war causes physical destruction.20 To explore this, consider how the guidelines would have applied to two instances of covert US intervention in Chile, in 1964 and 1970.21

The 1964 Election Operation

As part of its worldwide buildup of covert action capabilities in the early 1950s, the CIA established a capacity to conduct covert propaganda and political influence operations in Chile. In 1961, President Kennedy established a hemispheric policy to promote the growth of democratic institutions, the Alliance for Progress. That same year, the President became convinced that the Chilean Christian Democratic Party shared his belief in democratic social reform and seemed to have the organizational competence to achieve their common goals. It lacked the resources, however, to compete with the extremist parties of the left and right.

During 1961, the CIA established relationships with key political parties in Chile, as well as propaganda and organizational mechanisms. In 1962, the Special Group (the interagency body charged with reviewing covert actions) approved two CIA proposals to provide support to the Christian Democrats. The program was modeled on that conducted in Italy in the late 1940s and 1950s, and it was intended to strengthen center-democratic forces against the leftist challenge from Salvador Allende, who was supported by the Soviet Union and Cuba. When President Johnson succeeded Kennedy, he continued the covert subsidies, with the objective of making Chile a model of democracy, as well as preventing the nationalization by a leftist government of the Chilean components of American multinational corporations.

The Chilean presidential election of 1964 came down to a battle between Allende and Eduardo Frei Montalva, a liberal Christian Democrat. The election was viewed with great alarm in Washington. The New York Times compared it to the Italian election of 1948, when the communists had threatened to take over the country through the ballot box and the US had intervened covertly to support democratic parties. Similarly, in 1964 the Johnson administration intervened in Chile, according to the Church Committee Report, to prevent or minimize the influence of Chilean communists or Marxists in the government that would emerge from the election. Cord Meyer, a former CIA covert action manager, argues that the intervention was for the purpose of preserving the Chilean constitutional order.

In considering the 1964 election operations, the Johnson administration used the established mechanism, the interagency Special Group. By 1963, according to Professor Gregory Treverton, the Special Group had developed criteria for evaluating covert action proposals. All expenditures of covert funds for the 1964 operation (some $3 million in all) were approved by the Group. (There is no indication that the Congress approved these expenditures, or was even informed in detail of the operation.) In addition, an interagency committee was set up in Washington to manage the operation, and it was paralleled by a group in the US Embassy in Santiago. Meyer contends that covert intervention on behalf of Christian Democratic candidates had wide support in the administration, and the Church Committee confirms that the covert action was decided upon at the highest levels of government.

During the early 1960s, the US pursued a dual-track policy in Chile, conducting covert action in support of broader, overt objectives. Overtly, the US undertook a variety of development programs, and Chile was chosen to become a showcase of such programs under the Alliance for Progress. Between 1964 and 1969, Chile received well over $1 billion in direct, overt US aid — more per capita than any other country in the hemisphere. Moreover, funding to support the Frei candidacy was funnelled overtly through the Agency for International Development, as well as secretly through the CIA. Frei also received covert aid from a group of American corporations known as the Business Group for Latin America. Thus, the US used a variety of mechanisms to assist Frei. Covert support apparently was justified by the US Government on the grounds that Frei would be discredited if it were known that even more substantial support was flowing from the US.

That the 1964 covert action had a reasonable probability of success is evident from the outcome — Frei won a clear majority (56 percent) of the vote. According to Church Committee records, a CIA post mortem concluded that the covert campaign had a decisive impact. It is not clear from the available records whether a calculation of the likelihood of success was a specific part of the decisionmaking process. According to Treverton, the CIA was required under Special Group procedures to make such an estimate, and it is likely that its view would have been optimistic, because by the mid-1960s the Agency had managed to penetrate all significant elements of the Chilean Government and political parties.

In the 1964 operation, the CIA used virtually its entire arsenal of nonlethal methods:

Funds were passed through intermediaries to the Christian Democrats for their own use.
The CIA provided a consultant to assist the Christian Democrats in running an American-style campaign, which included polling, voter registration and get-out-the-vote drives.
Political action operations, including polls and grassroots organizing, were conducted among slum dwellers, peasants, organized labor, and dissident Socialists.
CIA-controlled assets placed propaganda in major Chilean newspapers and on radio, erected wall posters, passed out political leaflets, and organized demonstrations. According to the Church Committee, some of this propaganda used "scare tactics" to link Allende to Soviet and Cuban atrocities.
Other assets manufactured "black propaganda," material falsely purporting to be from Allende and his supporters, and intended to discredit them.22


Significant constraints were imposed, however. Paramilitary and other lethal methods were not used. The CIA explicitly rejected a proposal from the Chilean Defense Council to carry out a coup if Allende won. The Department of State turned down a similar proposal from a Chilean Air Force officer. Moreover, the Special Group turned down an offer from a group of American businessmen to provide funds for covert disbursement by the CIA. According to the Church Committee, the Group considered this "neither a secure nor an honorable way of doing business."

The 1970 Elections and "Track II"

Under Chilean law, Frei could not serve two consecutive terms as president. As the 1970 elections approached, the US faced a dilemma. The Christian Democrats had drifted to the left, and they were out of step with the Nixon administration's policy views. (The principal architect of those views was Henry Kissinger, who as an academic had been a prominent member of the realist school.) The conservative candidate, Jorge Allessandri, was not particularly attractive to the US, but there was even greater concern about an Allende victory.

The CIA began to warn policymakers early in 1969 that an Allende victory was likely. In March 1970, the 303 Committee (successor to the Special Group) decided that the US would not support any particular candidate. Instead, it authorized the CIA to conduct a "spoiling operation," aimed at discrediting Allende through propaganda. The effort failed when Allende won a slim plurality in the 4 September election. Because no candidate won a clear majority, the election was referred to a joint session of Congress, which in the past had always endorsed the candidate who had received the highest popular vote. The joint session was set for 24 October 1970. Senior US officials maintained that their preoccupation with Allende was defensive, and aimed at allaying fears of a communist victory both abroad and at home. As Nixon noted in a New York Times interview:

There was a great deal of concern expressed in 1964 and again in 1970 by neighboring South American countries that if Mr. Allende were elected president, Chile would quickly become a haven for Communist operatives who could infiltrate and undermine independent governments throughout South America.23


Kissinger noted that what worried the US was Allende's proclaimed hostility and his perceived intention to create "another Cuba." He maintained that nationalization of American-owned property was not the issue, though he did emphasize US interest in adequate compensation.

The Intelligence Community, however, held a more nuanced view. According to an assessment by the CIA's Directorate of Intelligence:

Regarding threats to US interests, we conclude that:

The US has no vital national interests in Chile. There would, however, be tangible economic losses.
The world balance of power would not be significantly altered by an Allende government.
An Allende victory would, however, create considerable political and psychological costs:


Hemispheric cohesion would be threatened by the challenge that an Allende government would pose to the OAS, and by the reactions that it would create in other countries. We do not see, however, any likely threat to the peace of the region.
An Allende victory would represent a definite psychological setback to the US and a definite psychological advance for the Marxist idea.24


Kissinger tacitly acknowledged the lack of vital US interests in Chile when he called it "a dagger pointed at the heart of Antarctica.

When Allende won a plurality of the popular vote, the thrust of US covert action shifted to preventing his accession to the presidency. The objective had now become to stop Allende by manipulation of the congressional vote. The committee asked Edward Korry, the US Ambassador in Santiago, for a "coldblooded assessment" of the likelihood of mounting a coup and organizing an effective opposition to Allende. With negative evaluations from both Korry and the CIA, the committee met on 14 September and explored a "Rube Goldberg" gambit, in which Alessandri would be elected by the Congress and then resign, thus allowing Frei to run in a second election. The ploy was turned down.

By this time, Nixon had taken a personal role. He met on 15 September with Donald Kendall, chief executive officer of Pepsi Cola, and Augustine Edwards, an influential Chilean publisher who had supported Frei during the 1964 election. According, to Kissinger, Nixon was incensed by what he heard, and decided that more direct action was necessary. As a result, he called in DCI Richard Helms and ordered a major effort to prevent Allende's accession. The CIA was instructed to play a direct role in organizing a military coup. Further, Helms was directed not to coordinate the CIA's activities with the Departments of State and Defense and not to inform Ambassador Korry. The 40 Committee was not informed, nor was the Congress. This activity became known as "Track II," to distinguish it from the 40 Committee program, "Track I."25

Track II was a carefully guarded secret, but US displeasure with the prospect of an Allende victory was not. According to Kissinger, all agencies were working to prevent the election. The Chilean Government was threatened with economic reprisals, and steps were taken to inform the Chilean armed forces that military aid would be cut off. Separately from the CIA's effort, several large American companies had financed Alessandri's campaign. One company, ITT, offered the CIA $1 million, but Helms turned it down.

When Helms left the Oval Office on 15 September, he had a page of handwritten notes. The first entry read, "less than one in ten chance of success." His pessimistic assessment was echoed by Ambassador Korry. According to his correspondence with the Church Committee, Korry consistently warned the Nixon administration that the Chilean military was, no policy alternative. From Santiago, according to the Church Committee documents, the CIA reported: "Military action is impossible; the military is incapable and unwilling to seize power. We have no capability to motivate or instigate a coup."

This view was shared by the managers of Track II. According to David Phillips, chief of the CIA's Chile Task Force, both he and his immediate supervisor were convinced that Track II was unworkable. The CIA's Deputy Director for Plans, Thomas Karamessines, was adamant that the Agency should not refuse the assignment, but he personally briefed Nixon several times on the progress of the operation, always pessimistically.26

Track I included funding to bribe Chilean congressmen, propaganda and economic activities, and contacts with Frei and elements of the military to foster opposition to Allende. Track II was more direct, stressing active CIA involvement in and support for a coup without Frei's knowledge. The CIA specifically offered encouragement to dissident Chilean military officers who opposed Allende, but who recognized that General Rene Schneider, the Chilean Chief of Staff, would not support a coup. These dissidents developed a plan to kidnap Schneider and take over the government, and this became known to CIA officials. Two unsuccessful kidnap attempts were made, and on the third attempt, on 22 October 1970, General Schneider was shot and subsequently died. Both the Church Committee and the Chilean inquiry concluded that the weapons used were not supplied by the US and that American officials did not desire or encourage Schneider's death. Neither, however, did they prevent it.

Unlike 1964, the 1970 covert operation did not involve extensive public-opinion polling, grass-roots organizing or direct funding of any candidate. Moreover, Helms made it clear that assassination of Allende was not an option. And when a rightwing Chilean fanatic, General Arturo Marshall, offered to help prevent Allende's confirmation, the CIA declined because of his earlier involvement in bombings in Santiago.

Evaluating the Two Operations

A Just War theorist reviewing the two covert operation would likely reach two conclusions: first, the 1964 operation was more justifiable than the 1970 activity, which would not have been approved if the officials concerned were natural law advocates rather than realists or ideological crusaders; and, second, both operations would have benefited from a more rigorous application of the jus ad bellum and jus in bello criteria.

US authorities probably would have considered that their covert intervention in the 1964 election was generally consistent with the jus ad bellum. It had clear objectives: preservation of an important democratic force in Chile, and defense against the establishment of another communist stronghold in the Western hemisphere. These were set by President Kennedy, based on his assessment of the commonality of US and Chilean interests. While not strictly speaking a last resort, it was conducted in the context of, and consistently with, an overall overt policy (the Alliance for Progress); was likely to be successful; and the overall effort was limited in scope and generally proportionate to the perceived threat. It was approved in accordance with the established procedures, though in retrospect the process would have been strengthened if the Congress had been consulted.

Some doubts can be raised regarding consistency with the jus in bello. The need for "scare tactics" and "black propaganda" is not obvious. (If indeed Allende's affinities for the USSR and Cuba were on the public record, promulgation of this truthful information should have been adequate.) Such activities inherently carry the possibility of distortion and deception. As Sissela Bok notes, lying and deception carry a "negative weight." They require explanation and justification, while the truth, including presumably the "truth" promulgated through propaganda mechanisms, does not.27 If not clearly justifiable in terms of necessity or to respond to Cuban or Soviet activities, such deceptive actions would not meet the test of proportionality of the jus in bello.

The 1970 Track II operation, in contrast, violated virtually all of the Just War guidelines, though this might not have been of great consequence to those who directed it. Its objective was to prevent Allende's confirmation, but little thought apparently was given to the consequences for the Chilean people or the political system. The normal consultative process was bypassed, and Nixon made the fateful Track II decision in a state of high emotion.28 No expert believed that success was likely. The methods chosen were initially inadequate and subsequently, when support for coup plotting took center stage, the intermediaries could not be controlled. What began as a nonlethal action quickly turned lethal. Despite the fact that injury to innocent parties was a foreseeable outcome of the envisioned coup, no advance provision was made to prevent or minimize it. In light of the intelligence assessment that the US lacked vital interests in Chile, it is hard to rationalize support for a potentially violent military coup as a proportionate response.

In sum, the Chile case shows that Just War Theory can provide a useful framework for evaluating covert political action by asking certain penetrating questions: Is the operation directed at a just cause, properly authorized, necessary and proportionate? Is it likely to succeed, and how will it be controlled? Is it a last resort, a convenience or merely an action taken in frustration? In the case of the 1964 operation, the answers to most of these questions were satisfactory; in 1970, they were not.

Reforms Since the 1970S

In the more than two decades since Track II, significant improvements have been made in controlling covert action. The old doctrine of "plausible denial," which allowed senior officials to disclaim responsibility for their actions, has been replaced by one intended to secure direct presidential accountability. Beginning with the Hughes-Ryan Amendment of 1974, a series of laws has been enacted requiring the president personally to "find" that proposed covert actions are important to the national security, and to report such operations to Congress in a timely manner. (Debate has continued over what constitutes a timely notification.) In the wake of the Iran-Contra scandal, it became obvious that the system of presidential "Findings" needed to be strengthened, and even more stringent procedures were implemented, first by the Executive Branch and then by the Congress.

Under the current system, established by the Reagan administration in 1987 and refined by legislation in 1991, a written Finding must be signed before a covert action operation commences, except that in extreme circumstances an oral Finding may be made and then immediately documented in writing. A Memorandum of Notification (MON), also approved by the president, is required for a significant change in the means of implementation, level of resources, assets, operational conditions, cooperating foreign countries or risks associated with a covert action. Each Finding or MON includes a statement of policy objectives and goals; a description of the actions authorized., resources required, and participating organizations, a statement that indicates whether private individuals or organizations of foreign governments will be involved; and an assessment of risk. Each proposed Finding or MON is reviewed by a senior committee of the National Security Council (NSC), and coordinated with the NSC Legal Adviser and with the Counsel to the President. Copies of Findings and MONs are provided to the Congress at the time of notification, except in rare cases of extreme sensitivity.29

An Approach for the 1990s

These reforms are positive, especially with regard to the criterion of proper authority, because they provide for broader consultation, a legal review, presidential accountability and Congressional involvement in covert action decisions. However, the content of Findings and MONs, as described above, leaves much to be desired from the perspective of Just War Theory. If, as the Chile case suggests, explicit use of Just War guidelines can strengthen the ethical content of covert action, more emphasis should be placed on the substance of discussions, not just the mechanics of the process. Further, the now widely accepted view that Just War Theory can be used to justify and explain resort to armed force strongly suggest that a similar approach would be useful in framing substantive debate on covert political action. In short, the current system addresses the legality, feasibility and political sensitivity of proposed covert actions.30 It does not, however, ensure that they are right, according to a widely accepted. ethical standard.

To come closer to this ideal, it is important that, at each stage in the covert action approval process, difficult questions be asked about the objectives, intentions, methods and management of a proposed operation. It is equally important that they be answered in detail, with rigor, and in writing — even (perhaps especially) when time is of the essence. Covert operators are understandably reluctant to commit sensitive details to paper, but this seems essential if the US is to meet high standards of morality and accountability in an era in which the easy rationalization of fighting communism is no longer available.

A decisionmaking process structured explicitly around Just War guidelines is, in many ways, simply a restatement of Judge Webster's criteria of consistency with law, American values and public mores. In that sense, Just War criteria merely reiterate the obvious, and make explicit the goals that the US has striven toward in its reforms of the covert action process since the mid-1970s. But there is value to building a more systematic framework for substantive debate, constructed from specific questions derived from Just War Theory, even if many of these questions are already considered in the CIA's Covert Action Review Group, the senior NSC groups or the oversight committees. The questions of concern include:

Just cause. Exactly what are the objectives of the operation? Is it defensive — to repel an identifiable threat — or is it intended to redress a wrong, to punish wrongdoing or to reform a foreign country? Who or what are we conducting the operation against? Who are we for? What specific changes in the behavior or policy of the target country, group or individual do we seek?
Just Intention. What will be the likely result in the target country and in other foreign countries? How will we or the international community be better off? How will we know if we have succeeded? What will we do if we win? If we lose?
Proper Authority. Who has reviewed the proposal? Are there dissents? What is the view of intelligence analysts on the problem being considered? Have senior government officials discussed the proposal in detail? Has the Congress been advised of all significant aspects of the covert activity? If notification has been restricted, what is the justification?
Last Resort. What other policies have been tried? Why have they not been effective? What overt policy options are being considered? What are their strengths and weaknesses? Why is covert action necessary? Why must the proposed activity be secret?
Probability of Success. What is the likelihood that the action will succeed? Are there differing views of the probability of success? Is the view of disinterested observers different from that of advocates or opponents? Why? What is the evidence?
Proportionality. What specific methods are being considered? Does the proposal envision the use of lethal force, sabotage, economic disruption or false information? Why are these methods necessary? Are they the same as those being used by the adversary, or are they potentially more damaging or disruptive? If so, what is the justification?
Discrimination and Control. What steps will be taken to safeguard the innocent against death, injury, economic hardship or psychological damage? What will be done to protect political institutions and processes against disproportionate damage? If some damage is inevitable, what steps are being taken to minimize it? What controls does the US exercise over the agents to be employed? What steps will be taken if they disregard our directions? What steps will be taken to protect the agents, and what are our obligations to them? How will the operation be terminated if its objectives are achieved? How will it be terminated if it fails?


Each of these questions should be investigated at some step of the initial approval process, though some clearly exceed the competence of the CIA. Perhaps the NSC Staff and the Congressional oversight committees are the most appropriate bodies to probe these issues. Not all may be answerable at the outset, though this fact alone should signal caution. In addition, they should be posed again whenever there is a significant change in objectives, methods or circumstances. The current management process calls for an annual review of all covert actions by the NSC, as well as periodic examinations by the oversight committees. These questions can guide such reviews as well.

The Casuistry of Covert Action

Rigorous examination of the questions enumerated above would emulate the technique of moral reasoning recommended by the natural law tradition. This method, known as casuistry, is acknowledged by scholars to be complex and difficult, especially in cases involving politics and international affairs.31 Moreover, in the hands of advocates, Just War criteria can deteriorate into mere rationalizations of intended actions. Just War Theory, then, can be exceedingly useful as an organizing principle, but in itself does not necessarily provide clear answers.32 How can the inherent uncertainty of this casuistry, and its potential misuse, be minimized?

William Colby has suggested that our process of moral reasoning concentrate primarily on the criteria of just cause and proportionality.33 These fundamental points do indeed appear to be the keys to an effective process of policy formulation. With respect to just cause, a recent report by a panel of distinguished scholars has recommended that covert action should be undertaken only in support of a publicly articulated policy.34 Such an approach would ensure that the objectives of the policy could be debated publicly, even though some of the exact methods to be employed might be known only to a small group of elected and appointed officials. Open, public debate would go a long way toward determining whether a proposed course of action could be construed as a just cause. The need for such debate is so fundamental to the casuistry of covert action that, if it cannot be conducted, this in itself would seem to be grounds for rejection of any suggested operation.

Assessments of proportionality are not susceptible to the same kind of open scrutiny, because they involve specific descriptions of secret methods. Nevertheless, it is important to ensure that proposed activities meet strict tests of consistency with American values and mores. Just War Theory does not offer specific guidance for such choices, despite its stress on necessity and minimal damage to innocent parties. Loch Johnson, a longtime commentator on intelligence activities, has suggested that, in addition to having a sound ethical framework, decisions on covert action must take into account other factors, such as the type of target regime and the severity and imminence of the threat that is to be countered.35 These would seem to be useful guides to evaluating proportionality, to which could be added the types of actions, overt or covert, being undertaken by the target regime against US interests.

Johnson has also tried to rank-order various types of covert operations into a 38-rung "ladder of escalation," and he introduces a useful concept of "thresholds" that involve different degrees of risk and interference in foreign countries.36 Following Johnson's concept, proposed covert activities could be arrayed for debate under thresholds of increasing ethical concern as follows:

Limited Concern. Benign provision of truthful information or support to existing political forces; intervention to keep election processes honest.
Significant Concern. Manipulative use of information; rigging of elections or other distortion of political processes; creating new opposition forces or increasing the strength of existing ones out of proportion to their indigenous support.
Serious Concern. Deceptive use of information, nonlethal sabotage and economic disruption.
Grave Concern. Use of lethal force; forcible changes in government.


Such actions are often taken in combination, rather than step by step in a scenario of escalation. Moreover, the amount or degree of covert support provided will vary in significance and moral weight depending on the nature of the foreign countries involved. And, as noted above, it is necessary to justify the actions proposed and the need to carry them out secretly. But clarity about what is being done, and whether or not it is proportional to the threat and proposed objectives, is a key element in sound policymaking.

Conclusion

Such an application of the Just War framework would not end controversy regarding covert action, nor would it guarantee that inappropriate or unethical actions will not be taken in the future. Debate over just cause and proportionality are likely to be particularly difficult — especially when, as was the case in US policy in Central America, there is no political consensus — but these are precisely the elements that most require informed scrutiny. Those who oppose covert action in all forms will not be reassured by a process based on the Just War framework; realists or crusaders will see it as unnecessary and unduly restrictive; Executive Branch officials and members of Congress may perceive that they already probe these questions in one way or another; and bureaucrats will regard it as just another "paper exercise." The claim for a conscious application of Just War guidelines is a modest one: it will help to make more rigorous Judge Webster's common-sense criteria, and to improve the quality of decisions regarding one of the most controversial aspects of US national security policy.

More generally, in light of recurring problems in the use of covert action as an instrument of policy, and the fact that it is likely to remain in the arsenal of states for the foreseeable future, greater rigor and structure in debates over specific proposals are essential. Reforming the process along the lines suggested would signal that the US is concerned — even in secret activities — with issues of right and wrong and not merely with power. It would promote openness and accountability, and underscore that we firmly reject the "repugnant philosophy" of the Doolittle Report.

_______________

NOTES:

1. "Report of the Special Study Group (Doolittle Committee) on the Covert Activities of the Central Intelligence Agency, 30 September 1954 (excerpts)" in William M. Leary, ed., The Central Intelligence Agency, History and Documents; (The University of Alabama Press; 1984); p. 144.

2. Jack Donnelly, "Twentieth-Century Realism", in Nardin and Mapel, eds., Traditions of International Ethics; (Cambridge University Press, 1992); p. 93.

3. The author is indebted to Rev. John P. Langan for this typology of Cold War political thought. Letter to the author, 28 May 1992.

4. A penetrating assessment of covert action from the perspective of international law can be found in W. Michael Riesman and James E. Baker, Regulating Covert Action (New Haven, Yale University Press, 1992).

5. See James Turner Johnson and George Weigel, Just War and the Gulf War (Washington, Ethics and Public Policy Center, 1991).

6. Symposium on Moral and Legal Constraints on Low-Intensity Conflict, sponsored by the Office of the Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict; US Naval War College; Newport, Rhode Island; 9-10 April 1992.

7. National Conference of Catholic Bishops, The Challenge of Peace (Washington, US Catholic Conference, 1983), pp. 25-29.

8. Thomas Aquinas, Summa Theologica, Joseph Rickaby, S.J., trans. (London, Burns and Gates, 1892), Question XL, Article 1.

9. National Conference of Catholic Bishops, Op. Cit., pp. 29-32.

10. Aquinas, Q. XLI, Art. 1.

11. Aquinas, Q. XLIV, Art. VII.\

12. Paul Ramsey, War and the Christian Conscience (Duke University Press, 1969), pp. 47-8.

13. The classic modern work on Just War Theory is Michael Walzer, Just and Unjust Wars (New York, Basic Books, 1977).

14. Charles R. Beitz, "Recent International Thought", Ethics and International Affairs, 1989, Vol. 3, p. 190.

15. William E. Colby, "Public Policy, Secret Action," Ethics and International Affairs, 1989, Vol. 3, p. 63.

16. Address to the Eighth Circuit Judicial Conference, 12 July 1991.

17. There is some empirical research that suggests a correlation between these classic Just War criteria and American attitudes regarding war and peace. See Donald Secrest, Gregory G. Brunk and Howard Tamashiro, "Moral Justification for Resort to War With Nicaragua: The Attitudes of Three American Elite Groups," Western Political Quarterly, September 1991, pp. 541-559.

18. Secrets: On the Ethics of Concealment and Revelation (New York, Pantheon Books, 1982), p. 191.

19. Charles R. Beitz, "Covert Intervention as a Moral Problem." Ethics and International Affairs, 1989, Vol. 3, pp. 49-50.

20. Langan notes that Just War Theory has both material and formal aspects, and that the formal aspects, such as just intention and proportionality, are applicable to a broad range of situations where one has to do harm to another, including punishment, surgery and — by extension — political or economic intervention. (Langan, Op. Cit.)

21. The following discussion is drawn primarily from documents of the Church Commitee, which investigated CIA covert actions in the mid-1970s, as well as memoirs of some of the participants and other government officials and commentators. (These include William Colby, Henry Kissinger, Cord Meyer, David Atlee Phillips and Arthur Schlesinger.) A summary of the Church Committee's findings, and recommendations for reform, can be found in Gregory Treverton, Covert Action: The Limits of Intervention in the Postwar World (New York, Basic Books, 1987). A case study based on Treverton's research has been published by the Carnegie Council on Ethics and International Affairs; an abridged version appeared in Studies In Intelligence, Winter 1992.

22. United States Senate, Staff Report of the Select Committee to Study Government Operations with Respect to Intelligence Activities: Covert Actions in Chile, 1963-73. (Washington, US Government Printing Office, 1975) pp. 15-17.

23. 12 March 1976.

24. Assessment dated 7 September 1970, declassified and quoted in the Church Committee report.

25. The US decision process is described in detail in the Church Committee Report, Alleged Assassination Attempts Involving Foreign Leaders, as well as in Kissinger's memoirs and John Ranelagh, The Agency: The Rise and Decline of the CIA (New York, Simon and Schuster, 1986), pp. 514-520.

26.David Atlee Philips, The Night Watch (New York, Ballantine Books, 1977), pp. 283-287.

27.Lying: Moral Choice in Public and Private Life (New York, Random House, 1978), p. 30.

28.Another tenet of the natural law tradition, the notion of prudentia or prudence in statecraft, cautions against such hasty and passionate decisions. See Alberto R. Coll, "Normative Prudence as a Tradition of Statecraft," Ethics and International Affairs, 1991, Vol. 5, pp. 36-7.

29.National Security Decision Directive (NSDD) 286, partially declassified on 15 December 1987; Intelligence Authorization Act, Fiscal Year 1991, Title VI.

30."Political sensitivity" can sometimes become a euphemism for morally questionable activities. This semantic twist means that such activities are then discussed as though they were merely political rather than ethical issues.

31.Joseph Boyle, "Natural Law and International Ethics," in Nardin and Mapel, Op. Cit., p. 115.

32.The author is indebted to Joel Rosenthal of the Carnegie Council on Ethics and International Affairs for this point. (Letter to the author dated 12 May 1992)

33. Colby, Op. Cit. Colby concentrates on the selfdefense aspect of just cause.

34. Report of the Twentieth Century Fund Task Force on Covert Action and American Democracy (New York, Twentieth Century Press, 1992) p. 8.

35. Loch K. Johnson, "On Drawing a Bright Line for Covert Operations," American Journal of International Law, Vol. 86, No. 2, April 1992. pp. 296-7.

36. Ibid. p. 286. Johnson's analysis is complicated by his mixing of traditional intelligence collection activities with covert actions, and his attempt to rank-order both categories hierarchically. At the lowest level of escalation ladder, Johnson enumerates routine, passive activities to collect information. Above his first threshold of risk and interference he lists the placement of truthful, benign information in the foreign press and low-level funding of friendly political groups. His second threshold involves the placement of "contentious information" in the media, large-scale funding of foreign groups, economic disruption without loss of life, limited supplies of arms, small-scale hostage-rescue attempts, and disinformation. Above his highest threshold are large-scale and potentially violent acts, including major secret wars, assassination plots, and hostage taking. Johnson argues that actions in this category should never be undertaken by the US. He also includes in this list of proscribed actions the supply of sophisticated weapons. This, however, would appear to be an option that might be considered in response to specific, serious threats.

UNCLASSIFIED

Historical Document
Posted: May 08, 2007 08:48 AM
Last Updated: Aug 04, 2011 12:48 PM
admin
Site Admin
 
Posts: 18033
Joined: Thu Aug 01, 2013 5:21 am


Re: Washington Post’s ‘Fake News’ Guilt, by Robert Parry

Postby admin » Sat Dec 31, 2016 2:57 am

Deserving Trust
by Ken White
December 15, 2016

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


"Fake news" is the slogan of the day. As a concept, it's typical: it has a grain of truth and descriptive value, but has been wantonly overused and twisted for partisan ends. Will you run into "news" that is based on simply false facts? Yes. Will you also see people using "fake news" to describe anything they don't like? Absolutely.

The heart of this is a surge of mistrust in the media. Some of that mistrust is well-earned, and some of it is promoted for political reasons — to cripple the press' ability to limit government power through questioning it. The press — including both nominally factual reporters and commentators — don't deserve to be trusted without question, and ought not be by a free people. People who write about current events, descriptively or (deliberately) persuasively, ought to be self-critical and think about why they are or aren't believed. That includes bloggers, who have an increasingly large role in public debate.

You cannot make people trust you or believe you. But you can work to be worthy of trust, and hope that the trust follows.

How could you earn trust, even as a commentator?

Focus on values. The best path to deserving trust is focusing on values rather than personalities or factions. Values can be principled; factions can't. Which values? That's up to you. What do you care about? It might be due process of law and equality before it, or limited government, or freedom of expression. If you are open about what values are important to you, open to discussing why those values are worthy and how heavily they should weigh in the balance, and open in your analysis of why particular policies promote or weaken those values, you can earn trust and credibility. If you focus instead on teams, and treat the virtues of one team as self-evident, you won't. The goal is not to persuade everyone or to "win." Some righteous values are unpopular and always will be. The goal is to offer the clearest, the best-supported, the most principled defense of the values you care about.

Question essentialism. Part of focusing on values is being skeptical of essentialism. Essentialism is the belief (for instance) that Trump is bad because Trump is bad and therefore things Trump proposes must be bad. Essentialism is the loudest voice in our political culture. The Koch brothers support that, it must be bad! That's a Hillary Clinton proposal, so it's liberal and awful! Essentialism is popular and persuasive with people who already agree with you, but to everyone else it's a signal not to trust you, because your analysis is nothing more than "red team is bad." Essentialism is also seductive, because it carries with it a feeling of belonging.

Asking who proposed a policy — or asking cui bono — can be a good starting point, but it's not an endpoint. The endpoint has to be an analysis of the act or policy, not just the source of it. Essentialism writes off a large segment of America — be it "conservative" or "liberal" — as irredeemable, and therefore abandons any effort to persuade those people that your values are the right ones, or that you are worthy of trust.1

Praise what is right. If you focus on values, you'll support policies that promote those values, even if you don't like the source. A politician you don't like will probably do some things right. Praise them when that happens. It's the right thing to do, it promotes the value you care about, and it earns trust.

Criticize what is wrong. People you support will make wrong choices that are bad for your values. Say so. Ignore party loyalists who complain you are "concern trolling." In fact, this ought to be your first priority. Start with the mote in your own eye. It's essential to trust.

Be skeptical. There's tons of misinformation out there. Much of it will support your views. Be skeptical. When you bite on a bogus story — and we all will — be forthright afterwards in noting that the story was false and you bit on it.

Promote knowledge. You have specialized knowledge of some sort. That knowledge can be relevant to policy debates. Support the debates by sharing the knowledge. Provide primary documentary support for the knowledge — in a world of easy hyperlinks, there's no excuse not to — and try to make the knowledge accessible. In other words, "here's the facts, and here are the sources of the facts, and here's how to read the sources" is preferable to "I'm right because I'm an expert." (Except on Twitter, obviously).

You can do absolutely everything right and some people will still belittle you because of who you are or what values you support. That's fine. Get over it. The goal isn't forcing people to agree. The goal is offering the best possible defense of the values you care about, and — hopefully — in the process earning trust from people who can be persuaded, from people willing to change their minds.

I say question essentialism because it's probably not worthwhile or realistic to abandon it entirely. I'm not telling you to devote yourself to converting, say, white nationalists. I'm suggesting you question the categories of people you think are unreachable or inherently wrong.
admin
Site Admin
 
Posts: 18033
Joined: Thu Aug 01, 2013 5:21 am

Re: Washington Post’s ‘Fake News’ Guilt, by Robert Parry

Postby admin » Mon Jan 16, 2017 3:27 am

Russian operation hacked a Vermont utility, showing risk to U.S. electrical grid security, officials say
By Juliet Eilperin and Adam Entous
December 31, 2016

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


Editor’s Note: An earlier version of this story incorrectly said that Russian hackers had penetrated the U.S. electric grid. Authorities say there is no indication of that so far. The computer at Burlington Electric that was hacked was not attached to the grid.

A code associated with the Russian hacking operation dubbed Grizzly Steppe by the Obama administration has been detected within the system of a Vermont utility, according to U.S. officials.

While the Russians did not actively use the code to disrupt operations, according to officials who spoke on the condition of anonymity to discuss a security matter, the discovery underscores the vulnerabilities of the nation’s electrical grid. And it raises fears in the U.S. government that Russian government hackers are actively trying to penetrate the grid to carry out potential attacks.

Officials in government and the utility industry regularly monitor the grid because it is highly computerized and any disruptions can have disastrous implications for the country’s medical and emergency services.

Burlington Electric said in a statement that the company detected a malware code used in the Grizzly Steppe operation in a laptop that was not connected to the organization’s grid systems. The firm said it took immediate action to isolate the laptop and alert federal authorities.

Friday night, Vermont Gov. Peter Shumlin (D) called on federal officials “to conduct a full and complete investigation of this incident and undertake remedies to ensure that this never happens again.”

“Vermonters and all Americans should be both alarmed and outraged that one of the world’s leading thugs, Vladimir Putin, has been attempting to hack our electric grid, which we rely upon to support our quality-of-life, economy, health, and safety,” Shumlin said in a statement. “This episode should highlight the urgent need for our federal government to vigorously pursue and put an end to this sort of Russian meddling.”

Sen. Patrick J. Leahy (D-Vt.) said he was briefed on the attempts to penetrate the electric grid by Vermont State Police on Friday evening. “This is beyond hackers having electronic joy rides — this is now about trying to access utilities to potentially manipulate the grid and shut it down in the middle of winter,” Leahy said in a statement. “That is a direct threat to Vermont and we do not take it lightly.”

Rep. Peter Welch (D-Vt.) said the attack shows how rampant Russian hacking is. “It’s systemic, relentless, predatory,” Welch said . “They will hack everywhere, even Vermont, in pursuit of opportunities to disrupt our country. We must remain vigilant, which is why I support President Obama’s sanctions against Russia and its attacks on our country and what it stands for.”

American officials, including one senior administration official, said they are not yet sure what the intentions of the Russians might have been. The incursion may have been designed to disrupt the utility’s operations or as a test to see whether they could penetrate a portion of the grid.

Officials said that it is unclear when the code entered the Vermont utility’s computer, and that an investigation will attempt to determine the timing and nature of the intrusion, as well as whether other utilities were similarly targeted.

“The question remains: Are they in other systems and what was the intent?” a U.S. official said.

This week, officials from the Department of Homeland Security, FBI and the Office of the Director of National Intelligence shared the Grizzly Steppe malware code with executives from 16 sectors nationwide, including the financial, utility and transportation industries, a senior administration official said. Vermont utility officials identified the code within their operations and reported it to federal officials Friday, the official said.

The DHS and FBI also publicly posted information about the malware Thursday as part of a joint analysis report, saying that the Russian military and civilian services’ activity “is part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens.”

Another senior administration official, who also spoke on the condition of anonymity to discuss security matters, said in an email that “by exposing Russian malware” in the joint analysis report, “the administration sought to alert all network defenders in the United States and abroad to this malicious activity to better secure their networks and defend against Russian malicious cyber activity.”

According to the report by the FBI and DHS, the hackers involved in the Russian operation used fraudulent emails that tricked their recipients into revealing passwords.

Russian hackers, U.S. intelligence agencies say, earlier obtained a raft of internal emails from the Democratic National Committee, which were later released by WikiLeaks during this year’s presidential campaign.

President-elect Donald Trump has repeatedly questioned the veracity of U.S. intelligence pointing to Russia’s responsibility for hacks in the run-up to the Nov. 8 election. He also has spoken highly of Russian President Vladimir Putin, despite President Obama’s suggestion that the approval for hacking came from the highest levels of the Kremlin.

Trump spokesman Sean Spicer said it would be “highly inappropriate to comment” on the incident given the fact that Spicer has not been briefed by federal authorities at this point.

Obama has been criticized by lawmakers from both parties for not retaliating against Russia before the election. But officials said the president was concerned that U.S. countermeasures could prompt a wider effort by Moscow to disrupt the counting of votes on Election Day, potentially leading to a wider conflict.

Officials said Obama also was concerned that taking retaliatory action before the election would be perceived as an effort to help the campaign of Democratic presidential nominee Hillary Clinton.

On Thursday, when Obama announced new economic measures against Russia and the expulsion of 35 Russian officials from the United States in retaliation for what he said was a deliberate attempt to interfere with the election, Trump told reporters, “It’s time for our country to move on to bigger and better things.”

Trump has agreed to meet with U.S. intelligence officials next week to discuss allegations surrounding Russia’s online activity.

Russia has been accused in the past of launching a cyberattack on Ukraine’s electrical grid, something it has denied. Cybersecurity experts say a hack in December 2015 destabilized Kiev’s power grid, causing a blackout in part of the Ukrainian capital. On Thursday, Ukrainian President Petro ­Poroshenko accused Russia of waging a hacking war on his country that has entailed 6,500 attacks against Ukrainian state institutions over the past two months.

Since at least 2009, U.S. authorities have tracked efforts by China, Russia and other countries to implant malicious software inside computers used by U.S. utilities. It is unclear if the code used in those earlier attacks was similar to what was found in the Vermont case. In November 2014, for example, federal authorities reported that a Russian malware known as BlackEnergy had been detected in the software controlling electric turbines in the United States.

The Russian Embassy did not immediately respond to a request for comment. Representatives for the Energy Department and DHS declined to comment Friday.

Alice Crites, Carol Morello and Ellen Nakashima contributed to this report.

*********************************************************************

Russian government hackers do not appear to have targeted Vermont utility, say people close to investigation
By Ellen Nakashima and Juliet Eilperin
January 2, 2017

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


The investigation by officials began Friday, when the Vermont utility reported its alert to federal authorities, some of whom told The Washington Post that code associated with the Russian hackers had been discovered within the system of an unnamed Vermont utility. (Kirill Kudryavtsev/AFP/Getty Images)


As federal officials investigate suspicious Internet activity found last week on a Vermont utility computer, they are finding evidence that the incident is not linked to any Russian government effort to target or hack the utility, according to experts and officials close to the investigation.

An employee at Burlington Electric Department was checking his Yahoo email account Friday and triggered an alert indicating that his computer had connected to a suspicious IP address associated by authorities with the Russian hacking operation that infiltrated the Democratic Party. Officials told the company that traffic with this particular address is found elsewhere in the country and is not unique to Burlington Electric, suggesting the company wasn’t being targeted by the Russians. Indeed, officials say it is possible that the traffic is benign, since this particular IP address is not always connected to malicious activity.

Yahoo says one billion accounts exposed in newly discovered security breach
By Jim Finkle and Anya George Tharakan
Dec 15, 2016

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


Yahoo Inc warned on Wednesday that it had uncovered yet another massive cyber attack, saying data from more than 1 billion user accounts was compromised in August 2013, making it the largest breach in history.

The number of affected accounts was double the number implicated in a 2014 breach that the internet company disclosed in September and blamed on hackers working on behalf of a government. News of that attack, which affected at least 500 million accounts, prompted Verizon Communication Inc to say in October that it might withdraw from an agreement to buy Yahoo's core internet business for $4.83 billion.

Following the latest disclosure, Verizon said, "we will review the impact of this new development before reaching any final conclusions."

A Yahoo spokesman told Reuters that the company has been in communication with Verizon during its investigation into the breach and that it is confident the incident will not affect the pending acquisition.

Yahoo required all of its customers to reset their passwords - a stronger measure than it took after the previous breach was discovered, when it only recommended a password reset.

Yahoo also said Wednesday that it believes hackers responsible for the previous breach had also accessed the company’s proprietary code to learn how to forge "cookies" that would allow hackers to access an account without a password.

"Yahoo badly screwed up," said Bruce Schneier, a cryptologist and one of the world's most respected security experts. "They weren't taking security seriously and that's now very clear. I would have trouble trusting Yahoo going forward."

Yahoo was tentative in its description of new problems, saying the incident was "likely" distinct from the one it reported in September and that stolen information "may have included" names, e-mail addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers.

It said it had not yet identified the intrusion that led to the massive data theft and noted that payment-card data and bank account information were not stored in the system the company believes was affected.

Yahoo said it discovered the breach while reviewing data provided to the company by law enforcement. FireEye Inc’s Mandiant unit and Aon Plc's Stroz Friedberg are assisting in the investigation, the Yahoo spokesman told Reuters.

The breach is the latest setback for Yahoo, an internet pioneer that has fallen on hard times in recent years after being eclipsed by younger, fast-growing rivals including Alphabet Inc's Google and Facebook Inc.

Hours before it announced the breach on Wednesday, executives with Google, Facebook and other large U.S. technology companies met with President-elect Donald Trump in New York. Reflecting its diminished stature, Yahoo was not invited to the summit, according to people familiar with the meeting.

The Yahoo spokesman said Chief Executive Marissa Mayer was at the company's Sunnyvale, California headquarters to assist in addressing the new breach.

Yahoo shares were down 2.4 percent to $39.91 in extended trading. Verizon shares were little changed from their close at $51.63.

(Reporting by Jim Finkle in Boston and Anya George Tharakan in Bengaluru; Additional reporting by Dustin Volz in Washington and Jessica Toonkel in New York; Editing by Savio D'Souza, Bernard Orr)


The investigation by officials began Friday, when the Vermont utility reported its alert to federal authorities, some of whom told The Washington Post that code associated with the Russian hackers had been discovered within the system of an unnamed Vermont utility. On Friday evening, The Post published its report, and Burlington Electric released a statement identifying itself as the utility in question and saying the firm had “detected the malware” in a single laptop. The company said in its statement that the laptop was not connected to its grid systems.

The Post initially reported incorrectly that the country’s electric grid had been penetrated through a Vermont utility. After Burlington Electric released its statement saying that the potentially compromised laptop had not been connected to the grid, The Post immediately corrected its article and later added an editor’s note explaining the change.

Officials say Russian government hackers do not appear to have targeted Burlington Electric, a Vermont utility. Editor’s Note: An earlier version of this video incorrectly said that Russian hackers had penetrated the U.S. electric grid. Authorities say there is no indication of that so far. The computer at Burlington Electric that was hacked was not attached to the grid. (Victoria Walker/The Washington Post)


U.S. officials are continuing to investigate the laptop. In the course of their investigation, though, they have found on the device a package of software tools commonly used by online criminals to deliver malware. The package, known as Neutrino, does not appear to be connected with Grizzly Steppe, which U.S. officials have identified as the Russian hacking operation. The FBI, which declined to comment, is continuing to investigate how the malware got onto the laptop.

Initially, company officials publicly said they had detected code that had been linked by the Department of Homeland Security to Grizzly Steppe.

Over the weekend, the company issued a statement, saying only that it had “detected suspicious Internet traffic” on the computer in question.

The murkiness of the information underlines the difficulties faced by officials as they try to root out Grizzly Steppe and share with the public their findings on how the operation works. Experts say the situation was made worse by a recent government report, which they described as a genuine effort to share information with the industry but criticized as rushed and prone to causing confusion. Authorities also were leaking information about the utility without having all the facts and before law enforcement officials were able to investigate further.

The incident comes as President-elect Donald Trump has cast doubt on the findings of intelligence officials that the Russians conducted a hacking operation designed to help him win the White House.

Experts also said that because Yahoo’s mail servers are visited by millions of people each day, the fact that a Burlington Electric employee checking email touched off an alert is not an indication that the Russian government was targeting the utility.

“It’s not descriptive of anything in particular,” said Robert M. Lee, chief executive of Dragos, a cybersecurity firm.

The company said it was told much the same thing by authorities. “Federal officials have indicated that the specific type of Internet traffic, related to recent malicious cyber activity that was reported by us [on Friday], also has been observed elsewhere in the country and is not unique to Burlington Electric,” company spokesman Mike Kanarick said in a statement.

The FBI and DHS released a report last week intended to prompt companies to search their systems for any evidence of a Russian hacking operation that they concluded had infiltrated Democratic Party servers. The document was intended to help companies mitigate Russian hacking and report any suspicious activity to the government. That report itself contained a caution regarding the suspicious IP addresses it listed: “Upon reviewing the traffic from these IPs, some traffic may correspond to malicious activity, and some may correspond to legitimate activity.”

The discovery of the laptop issue has prompted criticism that the government provided overly broad information to companies that was not effective in isolating Russian government hacking.

“That report offered no technical value for defenders,” Lee said. “It was very much high level and nothing in there was specifically descriptive of Russian activity.”

Some in the administration are concerned that this episode with the Vermont utility will cause industry officials to avoid sharing information with the government, for fear that it will be leaked. The company in this case, the U.S. official said, “did what it was supposed to do.”

Experts also expressed concerns regarding the report released by DHS and the FBI on the Russian hacking operation. The report said it was providing “technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence services” to “compromise and exploit” political, government and private computer networks. The government released the document on the same day it announced a series of measures taken to punish the Russian government for its interference in the 2016 presidential election, including the DNC hacks.

But a range of cybersecurity experts say that although the intention of the report was good, it lacked specific details that would enable firms to detect Russian government hackers.

At least 30 percent of the IP addresses listed were commonly used sites such as public proxy servers used to mask a user’s location, and servers run by Amazon.com and Yahoo. (Amazon’s founder and chief executive, Jeffrey P. Bezos, owns The Washington Post.) The IP address information alone is not useful, experts noted. Moreover, a server that is used by Russian spies one year might be used by “granny’s bake shop” the next, Lee said.

“No one should be making any attribution conclusions purely from the indicators in the [government] report,” tweeted Dmitri Alperovitch, chief technology officer of CrowdStrike, which investigated the DNC hack and attributed it to the Russian government. “It was all a jumbled mess.’’

A senior DHS official, speaking on the condition of anonymity to discuss a sensitive security matter, defended the report.

“We know the Russians are a highly capable adversary who conduct technical operations in a manner intended to blend into legitimate traffic,” the official said. The indicators of compromise contained in the report, he said, “are indicative of that. That’s why it’s so important for net defenders to leverage the recommended mitigations contained in the [report], implement best practices, and analyze their logs for traffic emanating from those IPs, because the Russians are going to try and hide evidence of their intrusion and presence in the network.”

The official said the information shared was “precisely the type of information DHS should be sharing, particularly since we know that cybersecurity capabilities differ among companies and organizations.”

The nation’s electrical grid is not a physical entity, but rather a series of networks that generate, transmit and distribute electricity. There are three primary networks--the Eastern Interconnect, Western Interconnect and the Electric Reliability Council of Texas--and smaller grids within those three groups. Each amounts to an industrial control system that dispatches electricity from where it is generated to the consumers who use it.

While these systems include redundancies to prevent any disruptions in service, and human operators oversee them, the functioning of the country’s grid is also highly automated. Experts say that this results in the system being more vulnerable to hacking attacks.

Utilities connected to the grid are routinely subjected to penetration efforts, but the U.S. electrical grid has never lost its transmission capacity because of such attempts.

“This is an example of the system working, and us getting bad things off our system as soon as they’re known,” said Nathan Mitchell Sr., who directs electric reliability standards and security at the American Public Power Association.

Shumlin: Vermont Better Off Without Nuclear Plant
by Mike Faher
December 26, 2016

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


VERNON – At a recent economic development announcement in Brattleboro, Gov. Peter Shumlin confidently declared that Windham County has an advantage because “we can do cash.”

He was referring to a multimillion-dollar pot of money – the Windham County Economic Development Program – that was created via a shutdown settlement agreement with Vermont Yankee owner Entergy.

As he prepares to leave office two years after the Vernon nuclear plant stopped producing power, Shumlin says he is confident that the regional and state economy is headed in the right direction even without Yankee’s 600-plus jobs in the mix.

And from an energy standpoint, Shumlin contends the state is better off without Vermont Yankee’s 605 megawatts of power production due to a new emphasis on renewables and efficiency.

“There’s no question that running an aging, leaking nuclear power plant beyond its design life was not in Vermont’s best interest,” Shumlin said.

Shumlin never made any secret of his opposition to the nuclear plant that operated for 42 years in his home county.

As a state senator, he led a 2010 vote to block Vermont Yankee’s requested 20-year relicensing. Against a backdrop of tritium leaks at the plant, Yankee shutdown was a key issue in Shumlin’s Democratic gubernatorial campaign that same year.

Shumlin carried that advocacy into the governor’s office, contending Vermonters had lost faith in the plant’s corporate owners – whom he referred to as “Entergy Louisiana.”

During a recent interview with VTDigger.org, Shumlin said his opposition to Vermont Yankee was based partly on tritium leak scandal. But he also believed that the plant should not operate beyond its initial, 40-year licensure period.

“I felt strongly like, in a state where your word is your bond, the deal had been changed after it had been agreed to,” Shumlin said. “It should be retired on time as promised to Vermonters.”

Ultimately, the state didn’t close the plant. The federal Nuclear Regulatory Commission granted a renewed license for Vermont Yankee in 2011, and a federal judge subsequently ruled that the facility could continue to operate beyond a March 21, 2012 shutdown date that had been set by the state.

When Entergy in 2013 announced Vermont Yankee’s planned closure, the company cited financial reasons including the price of natural gas and the costs of operating the plant. There was no mention of the state’s long-standing opposition.

Shumlin, however, still believes that the state played a role. He says it’s no coincidence that Vermont Yankee’s closure came first in a series of nuclear shutdown announcements for Entergy.

“It was a very unhappy relationship” between the state and Entergy, Shumlin said. “And I’m sure that when they made the decision based on economics … to shut a plant down, we had a shiny gold star on our heads.”

Whatever the reason for Entergy’s decision, Shumlin believes it was for the best.

As he exits the governor’s office after three terms, Shumlin often touts his track record in boosting renewable energy sources such as wind and solar. Though the state still buys nuclear power from a plant in New Hampshire, Shumlin says emphasizing renewables and energy efficiency is the right thing to do environmentally and economically.

“We are an example of how to reduce your carbon footprint and do electric generation right,” he said.

The governor said the loss of Vermont Yankee employees has been “a heartbreaking and tragic thing for all of us to go through,” and he said he is not denying the economic impact of the plant’s closure.

At the same time, though, he sees renewable energy as an economic engine for the future. “Now, in Vermont, if you have 17 people in a room, one of them is working in the renewable energy sector,” Shumlin said. “And they tend to be young, vigorous, excited about living in Vermont.”

Shumlin says he’s also proud of a 2013 shutdown agreement the state struck with Entergy. The deal allocated at least $2.6 million in Entergy money for clean energy development activities “in or for the benefit of Windham County.”

Some of that cash has gone toward a wood-heat initiative, and another $400,000 recently was awarded to start a renewable energy grant program in the county.

The state settlement deal also committed Entergy to paying $2 million a year for five years to boost economic development in Windham County. The resulting Windham County Economic Development Program has funded a variety of projects including major expansions at Chroma Technologies in Bellows Falls and G.S. Precision and Commonwealth Dairy in Brattleboro.

“This is the kind of economic incentive that Windham County needs to continue to be economically prosperous,” the governor said.

For the most part, the Shumlin administration has been unsuccessful when attempting to intervene in the federally regulated Vermont Yankee decommissioning process. But officials can still point to the 2013 settlement deal with Entergy as an important victory with long-lasting impacts.

Chris Recchia, whom Shumlin appointed in 2012 to lead the Vermont Public Service Department, echoed the governor in praising Entergy’s recent willingness to negotiate with the state.

“I’ve been very pleased with the discussions we had with Entergy in recent years. I think the (2013) settlement was a good outcome for Vermont,” Recchia said.

Like Shumlin, Recchia also believes the state is “better off without relying on (nuclear) power.”

VERNON RESIDENTS PUSH BACK

Not everyone shares those sentiments. In Vernon, there remains resentment about the state’s fight against Vermont Yankee and doubt about Shumlin’s economic development efforts.

A few months after Entergy announced Vermont Yankee’s pending closure, Vernon resident Josh Unruh titled his first batch of home brew “Shumlin’s Shutdown.” The bottle’s label proclaimed that the beer had been “brewed in Montpelier by politics and ignorance.”

Now a member of Vernon Selectboard, Unruh’s ire hasn’t abated. He says the Shumlin administration’s focus on closing Vermont Yankee “was a short-sighted view.”

As for the impact on Vernon, “my personal view is, I don’t think they care a whole lot,” Unruh said of state officials.

State Rep. Mike Hebert, R-Vernon, says that impact has been “devastating to Vernon and to Windham County in general.”

In addition to employment and tax revenue losses, Hebert said, “people have lost a lot of friends. And we’ve lost a lot of brainpower and a lot of volunteers for organizations in Windham County.”

Hebert isn’t sure the state played much role in Vermont Yankee’s shutdown. But he believes state officials could have done much more to prevent it.

“Had (Shumlin) made efforts as he did with other businesses to keep them in the state, something could have been done to make it easier to have stayed here,” Hebert said.

Hebert and Unruh also question the effectiveness and intent of the Windham County Economic Development Program. That money, they argue, should be doing more to boost entrepreneurs and small businesses – especially in Vernon.

Shumlin doesn’t shy away from criticism, acknowledging that he has denied grants and loans to many applicants because he didn’t feel they had enough economic impact.

“I didn’t want it frittered away on projects that all had good intentions but wouldn’t have resulted necessarily in real jobs for hard-working people,” Shumlin said.

SHUMLIN TOUTS DECOMMISSIONING PLAN

Economics aren’t the only beef some have with Shumlin’s Vermont Yankee policies.

The Brattleboro-based anti-nuclear group New England Coalition won’t give the governor a ringing endorsement as he departs. Coalition trustee and staff member Clay Turnbull argues that Shumlin and his staff should have worked to set site restoration standards and to ensure spent nuclear fuel was stored in a different location than the one Entergy chose.

“It would have been so much better if his legacy was that the waste was much farther from the Connecticut River,” Turnbull said.

While Turnbull said the state deserves some credit for opposing Vermont Yankee’s continued operation, he doesn’t think that was a deciding factor in Entergy’s shutdown decision.

“Every bit of resistance made it easier for them to throw in the towel,” Turnbull said. “But ultimately, if there was money to be made, they would still be operating. That’s the bottom line.”

State Rep. Mike Mrowicki, D-Putney, is more complimentary of Shumlin’s Vermont Yankee work. While there were “a lot of factors” contributing to shutdown, Mrowicki said, “I don’t think Peter’s contribution can be ignored.”

Asked whether he agreed with Shumlin’s declaration that the state is better off without Vermont Yankee, Mrowicki responded that he would “have to say yes, in the long term.”

“The big question mark is, will it get cleaned up … on time and on budget,” Mrowicki said.

The answer to that question may lie with New York-based NorthStar Group Services, which has promised to have most of the Vermont Yankee site cleared by 2030 if state and federal regulators approve its purchase of the property.

Shumlin won’t have a direct role in vetting that sale. But he said the NorthStar deal has the potential to ensure that the plant won’t “sit there rotting” for decades before cleanup work begins.

“If they can really get …. that plant decommissioned as quickly as possible so that we can (develop) that site for another use, that’s a huge help to Windham County,” Shumlin said.


He added that while federal authorities inform utilities on a daily basis about potential threats to the grid, when it came to Thursday’s joint report, “A presidential directive and a high-profile release on this brought it to the forefront.”

Adam Entous contributed to this report.
admin
Site Admin
 
Posts: 18033
Joined: Thu Aug 01, 2013 5:21 am

Re: Washington Post’s ‘Fake News’ Guilt, by Robert Parry

Postby admin » Sun Jan 29, 2017 8:30 pm

Glenn Greenwald: Mainstream U.S. media is culpable for disseminating fake & deceitful news on Russia. "Any story that bolsters the prevailing D.C. orthodoxy on the Russia Threat, no matter how dubious, is spread far and wide."
by Amy Goodman
January 5, 2017

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


We are joined by Glenn Greenwald, Pulitzer Prize-winning journalist and one of the founding editors of The Intercept. His latest article is headlined “WashPost Is Richly Rewarded for False News About Russia Threat While Public Is Deceived.” In it, he writes, “Any story that bolsters the prevailing D.C. orthodoxy on the Russia Threat, no matter how dubious, is spread far and wide. And then, as has happened so often, when the story turns out to be false or misleading, little or nothing is done to correct the deceitful effects.”

TRANSCRIPT: This is a rush transcript. Copy may not be in its final form.

NERMEEN SHAIKH: We’re talking about WikiLeaks founder Julian Assange and allegations of Russian cyber-attacks. During his interview with Fox News’ Sean Hannity this week, Assange was asked whether mainstream media in the U.S. is dishonest.

JULIAN ASSANGE: It’s very dishonest. “Corrupt” is interesting; it depends on your definition. If you look at what we published in the Podesta emails—

SEAN HANNITY: Wait a minute. If they’re colluding with Hillary, that’s not corrupt?

JULIAN ASSANGE: It’s an ethical corruption.

SEAN HANNITY: They’re not identifying it to their audiences. They claim that they’re objective journalists.

JULIAN ASSANGE: It’s ethically corrupt, corrupt by its – “corruption” also means something in law, which is that you’re taking money in exchange.

SEAN HANNITY: OK.

JULIAN ASSANGE: So I don’t that—

SEAN HANNITY: Collusion.

JULIAN ASSANGE: They’re colluding, yeah.

SEAN HANNITY: Because they share her political agenda. Well, why else would they collude? Or they hate Donald Trump.

JULIAN ASSANGE: I think that’s an optimistic interpretation, that they share the political agenda.

SEAN HANNITY: Well, explain that.

JULIAN ASSANGE: It’s more like, “You rub my back, I’ll rub yours.” I’ll give you – you know, I’ll give you information. You’ll be – you’ll come to my – I’ll invite you to my child’s christening or our next big party or – do you know what I mean?


AMY GOODMAN: That’s WikiLeaks founder Julian Assange on Fox News. Glenn Greenwald, your latest article for The Intercept is headlined “WashPost Is Richly Rewarded for False News About Russia Threat While Public Is Deceived.” So, could you comment on what Assange said and your own findings regarding mainstream media coverage of alleged Russian cyber-attacks?

GLENN GREENWALD: So let’s focus on the extraordinary behavior of The Washington Post for the moment. They have produced two of the most humiliating debacles in American journalism over the last several years. And these two humiliations have taken place just within the last six weeks, both of which were about completely fictitious and fabricated claims about the threat posed by Vladimir Putin and Russia.

The first was on November 24th, when they claimed, based on a newly formed anonymous group, that there has been a very widespread, successful effort to implant Kremlin propaganda in the American discourse. And they accomplish this by giving credence to this secret list that this anonymous group of cowards had created in which they claim that a whole range of American media outlets and websites, such as the Drudge Report and other libertarian critics of Hillary Clinton on the right and long-standing left-wing critics of the Democratic Party, like Naked Capitalism and Truthout and Truthdig on the left – they decree them to be tools of Kremlin propaganda. And The Washington Post created this huge story, that went all over the place, based upon giving credence to this list and saying that Russian propaganda had been viewed more than 200 million times in the United States. Journalists all over Twitter, throughout the American media, mindlessly spread it, aggressively endorsed it. It became a huge story. And over the course of the next two weeks, the story completely collapsed, and there’s now a major editor’s note at the top of the article disclaiming the key source, saying that they did not intend to in any way vouch for the validity of the findings of the source on which the entire story was based.

But even more embarrassing was this weekend, when the Post trumpeted this story on Friday night that Vladimir Putin and Russia had hacked into the electric grid of the United States through a Vermont utility, which caused Vermont officials like the governor and Senator Pat Leahy to issue statements saying Vladimir Putin is trying to endanger the safety and the welfare of Vermonters by stealing their heat in the winter. The whole story, from start to finish, turned out to be a complete fabrication. There was no invasion of the American electric grid. The malware that was found on one laptop had nothing to do with Russia. The story was completely false. And again, the American media, in this hysteria, kept spreading and endorsing it.

And in both cases, the retractions were barely noted. So you have millions of people being misled into this hysteria, into this view that Russia is this grave threat, and when the story journalistically collapses, they barely hear about it. And it happened over and over through the election, with Slate saying that a secret server had been found between Donald Trump and a Russian bank, which turned out to be completely false. The Post aired allegations that Putin had poisoned Hillary Clinton on the day that she collapsed on 9/11. And so, it’s not really just dishonesty. It’s the kind of behavior we saw in 2002, where American media outlets are willing to publish anything that the U.S. government tells them to publish, to inflate and expand the threat posed by Russia, to raise fear levels to the highest possible degree. And it’s an incredibly irresponsible and dangerous form of behavior that media outlets, led by The Washington Post, are engaging in.


AMY GOODMAN: And you talk about how retractions obviously don’t get anything like the play of the story, that also has to do with what’s tweeted by the publication, even when they retract, and what isn’t, Glenn.

GLENN GREENWALD: Right. So let me just give you two examples of just the corruption that’s at play here. So, when the Post unveiled their huge story about Russia fake news based on this McCarthyite list that has been proven to be a fraud, they had Marty Baron, the executive editor, the widely respected executive editor of the paper, go onto Twitter and announce this huge exposé. And predictably, it got tweeted and retweeted and shared thousands and thousands of times by all of the biggest journalists with the biggest social media followings. When the story collapsed over the next two weeks and they appended this huge editor’s note, The Washington Post did nothing to bring anyone’s attention to the fact that the key claims of the story have been gutted. Marty Baron refused to answer any questions over that two weeks about what the paper did, and he uttered not one syllable on Twitter or anywhere else to tell all the followers that he alerted to this story that the story had collapsed.

With the story that I just talked about over the weekend of the – of how Putin had wanted to steal the heat from Vermonters to make them suffer in the winter, Brent Staples, who works for The New York Times editorial page, went on Twitter and said, “Our friend Putin has invaded the U.S. electric grid.” And when that story collapsed and The Washington Post retracted it, he did something even worse: He just went and quietly deleted his tweet a day later, as though it never happened, and also failed to tell his 30,000 followers that what he had just told them the day before, that caused them to run around and share with all their friends on Facebook and Twitter that this has happened, was in fact a complete fiction.

And you see this over and over and over again. And remember, these are the people who keep saying that fake news is a huge problem, that Facebook has to suppress it. And yet it’s America’s leading journalistic outlets that are doing more to disseminate false and deceitful stories than Macedonian teenagers by a huge amount. And when they do it and it turns out that the stories are discredited, they take very little to no steps to alert the people that they’ve misled about the fact that the stories were false. And it’s incredibly reckless journalistically. And these are the same people pretending to be crusaders against fake news, who are themselves disseminating it more aggressively than anyone else.


NERMEEN SHAIKH: Well, Glenn Greenwald, let me ask you about the possible use of Twitter for the dissemination of other kinds of possibly fake information. You’ve repeatedly emphasized, as you just did, the role of Twitter in spreading false news by news media outlets. But this may be the first time in global history that a head of state, and that, too, of the most powerful state in the world, seems likely to use precisely this medium as one of his principal modes of communication. Do you think there are similar risks involved with official pronouncement conveyed through Twitter as you say and have explained are with journalistic use of this medium?

GLENN GREENWALD: So I think there are two sides to this. One is, there’s a potential – a potential virtue to having politicians being able to communicate directly to their constituents and the people they represent without having to be mediated by American media outlets, especially ones that have proven to be untrustworthy. So, in some sense, I actually think it’s positive, under the right circumstances, for a political leader – not Donald Trump, but just for political officials generally – to have a means to communicate directly to the people who they’re supposed to be representing and who can then hear feedback back from those people. I mean, in theory, that would be a good model.

The problem with Donald Trump using this is twofold. One is that when you’re the actual president of the world’s largest superpower with a massive nuclear arsenal, using Twitter is an extremely dangerous venue because it inherently has all kinds of ambiguities and possibilities for being misunderstood and for misleading people into what your actual intentions are. And that has happened over and over, where so many of his tweets are not even susceptible to reasoned discourse, where you don’t even know what he means. And when a president is issuing those kinds of ambiguous statements, those are the kinds of things that can ratchet up tensions unintentionally and even spark wars.

But I think there’s another sort of more pernicious aspect to it, which is what Trump is doing is he’s trying to discredit every single source of information other than Donald Trump. So, he’s telling his followers, “Don’t listen to the American media, because they’re liars.” He’s telling them, “Don’t listen to the intelligence community, because they defrauded you with Iraq.” He’s telling them, “Don’t listen to experts, because these experts are all corrupted and they’re part of the D.C. swamp,” that he wants to drain. “The only truth that you should trust comes from me, Donald Trump.” And that is a very dangerous framework. It’s pure authoritarianism when a political leader also becomes the only source of information that the population trusts. But, unfortunately, his biggest allies in that are media outlets who have done the kinds of things that I just explained The Washington Post having done and journalists having helped them. They’re the reason why people are losing faith in American media outlets. And that’s what gives space to a demagogue like Donald Trump to say, “I’m the only person who you can trust.” And his use of Twitter is really a weapon, a powerful weapon, in achieving that dangerous state of affairs.

AMY GOODMAN: China’s state news agency Xinhua said, “Twitter should not become an instrument of foreign policy,” warning President-elect Trump. But, Glenn, as we wrap up, your concerns right now? In the headline, we just said that Donald Trump says he’s going to overhaul the intelligence agencies, which many might think is a good thing, cutting back Virginia, the headquarters, less computer internet surveillance, more human surveillance, getting more spies out on the streets. Where is this country going now, Glenn? Your perspective, from outside now, though as an American?

GLENN GREENWALD: I mean, I think it really remains to be seen, but there are definitely fundamental changes taking place. If you look, for example, at recent polling, what you find is that the CIA is now one of the most admired and defended institutions among Democrats, while Republicans don’t like the CIA and actually prefer Vladimir Putin even to Barack Obama. You have radical shifts taking place in coalitions, in alliances, in alignments, and it can – it’s very unpredictable how it can play out. Sometimes instability could produce positive outcomes. Trump abrogated the TPP. He wants to limit Boeing and Lockheed and the amount of money that’s spent on them. He wants to bring jobs back to the U.S. But it can also have very dangerous outcomes, as well, because of its unpredictability. And so, I think it’s a very dangerous time for the United States, and it’s one of the reasons why I’m hoping Democrats find their footing and become a lot more focused and reasoned and stop sort of wallowing in these radical conspiracy theories that make them appear unhinged, because Donald Trump needs a cohesive and focused and effective opposition.

AMY GOODMAN: We’re going to leave it there, Glenn Greenwald. Thanks so much for being with us, Pulitzer Prize-winning journalist, one of the founding editors of The Intercept. We’ll link to your pieces, most recently, “WashPost Is Richly Rewarded for False News About Russia Threat While Public Is Deceived.”
admin
Site Admin
 
Posts: 18033
Joined: Thu Aug 01, 2013 5:21 am

Re: Washington Post’s ‘Fake News’ Guilt, by Robert Parry

Postby admin » Mon Jan 30, 2017 10:29 pm

'Fake News' And How The Washington Post Rewrote Its Story On Russian Hacking Of The Power Grid
by Kalev Leetaru
Jan 1, 2017

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


On Friday the Washington Post sparked a wave of fear when it ran the breathless headline “Russian hackers penetrated U.S. electricity grid through a utility in Vermont, U.S. officials say.” The lead sentence offered “A code associated with the Russian hacking operation dubbed Grizzly Steppe by the Obama administration has been detected within the system of a Vermont utility, according to U.S. officials” and continued “While the Russians did not actively use the code to disrupt operations of the utility, according to officials who spoke on condition of anonymity in order to discuss a security matter, the penetration of the nation’s electrical grid is significant because it represents a potentially serious vulnerability.”

Yet, it turns out this narrative was false and as the chronology below will show, illustrates how effectively false and misleading news can ricochet through the global news echo chamber through the pages of top tier newspapers that fail to properly verify their facts.

The original article was posted online on the Washington Post's website at 7:55PM EST. Using the Internet Archive's Wayback Machine, we can see that sometime between 9:24PM and 10:06PM the Post updated the article to indicate that multiple computer systems at the utility had been breached ("computers" plural), but that further data was still being collected: “Officials said that it is unclear when the code entered the Vermont utility’s computers, and that an investigation will attempt to determine the timing and nature of the intrusion.” Several paragraphs of additional material were added between 8PM and 10PM, claiming and contextualizing the breach as part of a broader campaign of Russian hacking against the US, including the DNC and Podesta email breaches.

Despite the article ballooning from 8 to 18 paragraphs, the publication date of the article remained unchanged and no editorial note was appended, meaning that a reader being forwarded a link to the article would have no way of knowing the article they were seeing was in any way changed from the original version published 2 hours prior.

Yet, as the Post’s story ricocheted through the politically charged environment, other media outlets and technology experts began questioning the Post’s claims and the utility company itself finally issued a formal statement at 9:37PM EST, just an hour and a half after the Post's publication, pushing back on the Post’s claims: “We detected the malware in a single Burlington Electric Department laptop not connected to our organization’s grid systems. We took immediate action to isolate the laptop and alerted federal officials of this finding.”

From Russian hackers burrowed deep within the US electrical grid, ready to plunge the nation into darkness at the flip of a switch, an hour and a half later the story suddenly became that a single non-grid laptop had a piece of malware on it and that the laptop was not connected to the utility grid in any way.

However, it was not until almost a full hour after the utility’s official press release (at around 10:30PM EST) that the Post finally updated its article, changing the headline to the more muted “Russian operation hacked a Vermont utility, showing risk to U.S. electrical grid security, officials say” and changed the body of the article to note “Burlington Electric said in a statement that the company detected a malware code used in the Grizzly Steppe operation in a laptop that was not connected to the organization’s grid systems. The firm said it took immediate action to isolate the laptop and alert federal authorities.” Yet, other parts of the article, including a later sentence claiming that multiple computers at the utility had been breached, remained intact.

The following morning, nearly 11 hours after changing the headline and rewriting the article to indicate that the grid itself was never breached and the “hack” was only an isolated laptop with malware, the Post still had not appended any kind of editorial note to indicate that it had significantly changed the focus of the article.

This is significant, as one driving force of fake news is that as much of 60% of the links shared on social media are shared based on the title alone, with the sharer not actually reading the article itself. Thus, the title assigned to an article becomes the story itself and the Post’s incorrect title meant that the story that spread virally through the national echo chamber was that the Russians had hacked into the US power grid.

Only after numerous outlets called out the Post’s changes did the newspaper finally append an editorial note at the very bottom of the article more than half a day later saying “An earlier version of this story incorrectly said that Russian hackers had penetrated the U.S. electric grid. Authorities say there is no indication of that so far. The computer at Burlington Electric that was hacked was not attached to the grid.”

Yet, even this correction is not a true reflection of public facts as known. The utility indicated only that a laptop was found to contain malware that has previously been associated with Russian hackers. As many pointed out, the malware in question is actually available for purchase online, meaning anyone could have used it and its mere presence is not a guarantee of Russian government involvement. Moreover, a malware infection can come from many sources, including visiting malicious websites and thus the mere presence of malware on a laptop computer does not necessarily indicate that Russian government hackers launched a coordinated hacking campaign to penetrate that machine - the infection could have come from something as simple as an employee visiting an infected website on a work computer.

Moreover, just as with the Santa Claus and the dying child story, the Post story went viral and was widely reshared, leading to embarrassing situations like CNBC tweeting out the story and then having to go back and retract the story.

Particularly fascinating that the original Post story mentioned that there were only two major power utilities in Vermont and that Burlington Electric was one of them, meaning it would have been easy to call both companies for comment. However, while the article mentions contacting DHS for comment, there is no mention of any kind that the Post reached out to either of the two utilities for comment. Given that Burlington issued its formal statement denying the Post’s claims just an hour and a half later, this would suggest that had the Post reached out to the company it likely could have corrected its story prior to publication.

When I reached out to Kris Coratti, Vice President of Communications and Events for the Washington Post for comment, she responded that regarding the headline change, “Headlines aren’t written by story authors. When editors realized it overreached, as happens from time to time with headlines, it was corrected.” She also indicated that posting the editor’s note at the bottom of the article instead of the top was a mistake and indeed this was corrected shortly after my email to her inquiring about it.

Ms. Coratti’s response regarding the article headline is a fascinating reminder of just how many different people and processes combine to produce a single article in a newspaper – that contrary to popular belief, a reporter doesn’t sit down and write a story, choose a headline and then hit “Publish” and have the story go live on the newspaper website. Most newspapers, like the Washington Post, either employ dedicated headline writers or have their editors write the headlines for each piece and articles typically go through an elaborate review process designed to catch these sorts of issues prior to publication.

It is also interesting to note that the Post said it was an error for the editorial note to be buried at the very bottom of the page instead of at the top of the article, as was done for the Santa Claus story. This reflects the chaotic nature of newsrooms in which an editorial note is frequently added by an editor simply logging into a CMS portal and updating a live page, rather than a templated system which automatically places all editorial notes in the same place with the same style and formatting to ensure consistency.

Equally fascinating, neither Ms. Coratti nor Post Public Relations responded to any of my remaining queries regarding the article’s fact checking process. In particular, the Post did not respond when I asked how headlines are fact checked and if headline writers conduct any form of fact checking to ensure their summarized version is consistent with known facts. The Post also did not respond to a request for comment on why it took nearly half a day from the time the article was rewritten until an editorial note was finally appended acknowledging that the conclusions of the original article were false and that the article had been substantively rewritten to support a different conclusion, nor did the Post comment on why the editor’s note was originally placed at the bottom of the article and only moved after I inquired about its location.

Yet, perhaps most intriguing is that, as with the Santa Claus story, the Post did not respond to repeated requests for comment regarding how it conducts fact checking for its stories. This marks twice in a row that the Post has chosen not to respond in any fashion to my requests for more detail on its fact checking processes. Given the present atmosphere in which trust in media is in freefall and mainstream outlets like the Post are positioning themselves as the answer to “fake news” it certainly does not advance trust in the media when a newspaper will not even provide the most cursory of insight into how it checks its facts.

As with the Santa Claus story, the Post appears to have run this story without even attempting to perform the most basic of fact checks before publication. The original story noted that there were only two utilities in Vermont and yet the article states that the Post only attempted to contact DHS and does not mention any attempt to contact either of the utilities. Standard journalistic practice would have required that the Post mention that it attempted to reach either utility even if neither responded. The Post did not respond to a request for comment when I asked if it had attempted to reach either utility for comment prior to publication.

Putting this all together, what can we learn from this? The first is that, as with the Santa Claus and PropOrNot stories, the journalism world tends to rely far more on trust than fact checking. When one news outlet runs a story, the rest of the journalism world tends to follow suit, each writing their own version of the story without ever going back to the original sources for verification. In short – once a story enters the journalism world it spreads without further restraint as each outlet assumes that the one before performed the necessary fact checking.

The second is that the news media is overly dependent on government sources. Glenn Greenwald raises the fantastic point that journalists must be more cautious in treating the word of governments as absolute truth. Indeed, a certain fraction of the world’s false and misleading news actually comes from the mouths of government spokespeople. Yet, in the Post’s case, it appears that a government source tipped off the post about a sensational story of Russians hacking the US power grid and instead of reaching out to the utilities themselves or gathering further detail, the Post simply published the story as fed to them by the government officials.

The third is that breaking news is a source of a tremendous amount of false and misleading news as rumors and falsehoods spread like wildfire in the absence of additional information. Top tier newspapers like the Washington Post are supposed to be a bulwark against these falsehoods, by not publishing anything until it has been thoroughly fact checked against multiple sources. Yet, it appears this is not the case – in the rush to be the first to break a story and not be scooped, reporters even at the nation’s most prestigious news outlets will take shortcuts and rush a story out the door. What would have happened in the Post had waited another day or two to collect responses from all involved, including Burlington Electric? It would have avoided publishing false information, but it also likely would have been scooped by another newspaper who wanted to be the first to break the story.

Indeed, “breaking news” is a tremendous problem for mainstream outlets in which they frequently end up propagating “fake news” in their rush to be the first to break a story. In a world beset by false and misleading news, do top tier news outlets have a professional responsibility to step back from breaking stories and only report on them after all details are known and they have had an opportunity to speak with all parties involved and understand more definitively what has happened? Financially this would likely be devastating in a share-first click-first world in which to the victor go the advertising dollars, but it would seem the only way to truly stop “fake news” from spreading.
admin
Site Admin
 
Posts: 18033
Joined: Thu Aug 01, 2013 5:21 am

Re: Washington Post’s ‘Fake News’ Guilt, by Robert Parry

Postby admin » Mon Jan 30, 2017 10:43 pm

What Santa And The Dying Child Story Teaches Us About Fake News, Data And Verification
By Kalev Leetaru
December 15, 2016

NOTICE: THIS WORK MAY BE PROTECTED BY COPYRIGHT

YOU ARE REQUIRED TO READ THE COPYRIGHT NOTICE AT THIS LINK BEFORE YOU READ THE FOLLOWING WORK, THAT IS AVAILABLE SOLELY FOR PRIVATE STUDY, SCHOLARSHIP OR RESEARCH PURSUANT TO 17 U.S.C. SECTION 107 AND 108. IN THE EVENT THAT THE LIBRARY DETERMINES THAT UNLAWFUL COPYING OF THIS WORK HAS OCCURRED, THE LIBRARY HAS THE RIGHT TO BLOCK THE I.P. ADDRESS AT WHICH THE UNLAWFUL COPYING APPEARED TO HAVE OCCURRED. THANK YOU FOR RESPECTING THE RIGHTS OF COPYRIGHT OWNERS.


Some of the world’s most prestigious and reputable news outlets took a moment this week to carry the heartwarming story of a Santa Claus actor who held a boy in his arms at the hospital before he died, offering him comforting words in the spirit of the Christmas season. Outlets covering the story included a veritable who’s who of the media world both in the US and across the world, including the Washington Post, BBC, CNN, NBC, Daily Mail, Japan Times, Today, People, Cosmopolitan, Mashable, BuzzFeed and many many more. However, last night the Knoxville News Sentinel, the originator of the story, published a note from its editor warning that after further investigation it could not verify the substance and details of the story and was no longer standing by its contents. While stopping short of saying the story did not happen, the paper noted that each of the major hospitals in the area had confirmed that the events as described did not occur in their facility, casting doubt on key details of the account, even as the actor himself stood by his story.

While in an ordinary week such a story might simply be written off as another possible viral hoax, what makes this series of events so remarkable is that they occurred in a week saturated with discussion of “fake news” and the need to do a better job of fact checking and verifying the information we consume. Indeed, several of the same outlets carrying the Santa Claus story have also run pieces this week and last arguing that citizens must turn to mainstream media to protect themselves against “fake news” because of the immense amount of verification and fact checking that journalists at these outlets do before reporting on a story. Slate went so far as to create a browser plugin where its editors will screen news coverage and flag articles they believe to be fake. Yet, if some of the world’s most respected news outlets like the Washington Post, BBC and CNN all freely published an unverified story, how could we trust them to somehow do so much better on other stories?

First, its important to ask how such a story went viral in the midst of journalism’s soul searching about “fake news.” It all started with a news outlet: the Knoxville News Sentinel, which ran the original story. The News Sentinel is part of the USA Today Network and the story was rapidly picked up by its other properties and then from there went viral across the national and international news spheres. The News Sentinel’s editor wrote last night that the paper had not performed additional fact checking before running the story and only after the article went viral and outlets like Snopes began to question its veracity, did the newspaper finally reach out to local hospitals and determine that the events as written in the article did not occur at any of their facilities. As each additional news outlet rushed to cover the viral story, they too failed to perform basic journalistic diligence in picking up the phone and calling around to local hospitals for verification and more detail. Instead, essentially a giant trust game played out in that each outlet wrote about the story because it trusted that the earlier outlet had performed the necessary due diligence on it.

The News Sentinel did not respond to a request for a comment on why it did not perform additional verification on the story until after it had gone viral nor what its standard policies on pre-publication verification are. The Washington Post also did not respond to a request for comment as to why, in at least the second time in the last few weeks, it ran a major story without performing additional steps to verify it.

In the case of the Washington Post's earlier PropOrNot story, the newspaper initially strongly defended its work, arguing that it had thoroughly vetted its reporting, offering “The Post reviewed its findings, and our questions about them were answered satisfactorily during the course of multiple interviews.” Only after extensive reporting by other outlets did the Post reverse its stance to claim it performed no verification of any kind, saying in an Editor’s Note “The Post … does not itself vouch for the validity of PropOrNot’s findings regarding any individual media outlet, nor did the article purport to do.”

When asked to comment on the Post’s pre-publication verification and vetting processes and why it did not ask for comment from other researchers in the field to offer additional perspectives before publishing the PropOrNot story, a Post spokeswoman offered only that the paper would have no further comment on the matter. The Post also declined to outline its verification workflow or the steps it takes to verify a story prior to publication.

Such silence is especially troubling in an era when newspapers like the Post are positioning themselves as a bulwark against “fake news” by arguing that their immense verification and vetting workflows ensure they have positively confirmed all elements of a story prior to publication and thus readers can rest assured that a story that appears on their pages has undergone the most rigorous fact checking imaginable. Yet, the reality appears to be precisely the opposite: in the Post’s case, it first claimed to have rigorously investigated the PropOrNot story, only to reverse itself in the face of criticism and say it was merely reporting what it had been told and not standing behind the results in any way.

In the case of the Santa Claus story, it appears the Post similarly did not perform the most basic of due diligence to call around to the local hospitals in the area to confirm the basic details of the story before running it. Yet, more concerningly, the editorial note it subsequently appended to the story places the blame solely on the News Sentinel, while not saying a word about why the Post itself didn’t do any fact checking of its own. In short, the Post’s argument is that it simply trusted another outlet to do due diligence and that once a story enters the news cycle, no other outlet bears responsibility to verify it. This is remarkably similar to the castle defense formerly popular in cyber security circles, in which a company would assume that the outer layers of its network would verify that incoming network traffic was trusted and that once traffic entered the network it could be trusted without additional verification.

Of course, one might argue that it simply isn’t worth the time of a newspaper like the Post to expend precious journalistic resources verifying the minute details of a personal interest story. On the other hand, most would likely agree that publishing a media blacklist like the PropOrNot story certainly does deserve extensive fact checking. The problem is that there is no way to know, when reading a typical newspaper story, how much (if any) fact checking the details of that story underwent. There is no appendix that lists all of the details the reporter did or did not confirm. Indeed, this is the case in all major Western news outlets, but this practice creates the illusion of trust that the reporter must have verified the story before the newspaper would even think of publishing it.

In many ways, the Santa Claus story that went viral without a bit of verification is merely a reflection of the broader problems facing both the news industry and the data science world as a whole. As I noted last week, the inverted pyramid of journalism allows stories like this to flourish by placing the emphasis on conclusions and story rather than underlying facts. Similarly, in our information-saturated realtime-focused society, we’re more interested in short punchy conclusions than we are in the reams of data and caveats that accompany them.

In the case of a large data analysis, the original analytic report might contain pages of caveats, nuances, assumptions and explanations on how to interpret the result. In turn, that result and a few of the caveats are repacked for the next level of decision making, which in turn strips out even more detail to present to the next level of management, until at the highest level of decision making authority, only the final strengthened conclusion remains, absent all of the critical evidence that might call it into question. A single analyst’s tentative conclusion, offered with just 20% probability of being correct, might, through a giant game of telephone, become a definitive answer supported by the entire analytic community.

Here, it appears that each news outlet covering this story simply assumed that the one before had performed the necessary fact checking and as the number of major outlets covering the story grew, so too did its perceived trustworthiness, as readers assumed that all of these outlets had independently verified the details, subjecting it to an ever greater collection of fact checking and verification.

At the end of the day, we simply don’t know if this heartwarming story is true or false or somewhere in between and the Santa Claus actor at the heart of the story stands firmly by his account. However, what we do know is that of the myriad news outlets covering the story, including some of the world’s best-known and most reputable brands in journalism, not one of them made even the most basic of efforts to verify the story before publishing it, content instead to happily spread a viral feel-good holiday narrative. Moreover, in their post-postmortems this morning, not one of these major outlets has accepted ownership over this failure to verify, placing the blame instead on the News Sentinel. In a world besieged by “fake news” how can these same news outlets ask the world’s citizens to turn to them as skilled fact checkers and arbiters of the truth if they can’t be bothered to make a few fact checking phone calls before rushing a story out the door?
admin
Site Admin
 
Posts: 18033
Joined: Thu Aug 01, 2013 5:21 am

PreviousNext

Return to A Growing Corpus of Analytical Materials

Who is online

Users browsing this forum: Baidu [Spider] and 1 guest

cron