Seymour Hersh is scared to tell us what he knows about Seth Rich

The great investigative journalist has, in public, said two very different things about the Seth Rich mystery; and, when urged to fess up what he really knows about it (in a private conversation that, unbeknownst to him, was being recorded), said he certainly will not, because he lives in “the real world”—meaning that he knows better than to take so grave a risk.
This “real world” is one where US journalists had better stick the official line on story after story—a line that tends to be dictated by US intelligence —or else.

For more on this unfortunate reality, see this eye-opining piece that Paste ran not so long ago:

MCM  

Seymour Hersh Owes The World An Explanation For His Seth Rich Comments
by Caitlin Johnstone

Pulitzer Prize-winning journalist Seymour Hersh has given two radically different accounts of how much he knows about the murder of DNC staffer Seth Rich last year, and he owes the whole world a full clarification.

On Tuesday NPR released an exclusive report titled “Behind Fox News’ Baseless Seth Rich Story: The Untold Tale”. The centerpiece of the viral article is a legal complaint against Fox by one of its commentators, which contains among other things a very interesting quote by Hersh that the notoriously pro-establishment NPR conveniently omitted from its report. Luckily for us, the complaint is now publicly available, and the quote can be read by all:

55. During his conversation with Butowsky, Mr. Hersh claimed that he had received information from an “FBI report.” Mr. Hersh had not seen the report himself, but explained: “I have somebody on the inside who will go and read a file for me. And I know this person is unbelievably accurate and careful. He’s a very high level guy.”

56. According to Mr. Hersh, his source told him that the FBI report states that, shortly after Seth Rich’s murder, the D.C. police obtained a warrant to search his home. When they arrived at the home, the D.C. police found Seth Rich’s computer, but were unable to access it.The computer was then provided to the D.C. police Cyber Unit, who also were unable to access the computer. At that point, the D.C. police contacted the Cyber Unit at the FBI’s Washington D.C. field office. Again, according to the supposed FBI report, the Washington D.C. field office was able to get into the computer and found that in “late spring early summer [2016], [Seth Rich][made] contact with Wikileaks.” “They found what he had done. He had submitted a series of documents, of emails. Some juicy emails from the DNC.” Mr. Hersh told Butowsky that Seth Rich “offered a sample [to WikiLeaks][,] an extensive sample, you know I’m sure dozens, of emails, and said I want money.”

Wow.

NPR mentioned these massive allegations only briefly and in the abstract, without quoting any of it for mainstream American consumption. What it did do, however, is provide a quote of Hersh denying the whole thing when asked for comment:

In an interview this week, Hersh sounded unconvinced.

“I hear gossip,” Hersh tells NPR on Monday. “[Butowsky] took two and two and made 45 out of it.”

So there you go. Neither the plaintiff Rod Wheeler nor Ed Butowsky (the Republican surrogate named in the lawsuit) have the most sterling reputations at this point, and Sy Hersh himself denies the whole thing. It’d make perfect sense to dismiss this wacky conspiracy theory entirely, right?

Read More:

Google goes Chinese on 13 leftist (and quasi-leftist) websites

From Raju Das (via Bertell Ollman):

Technology has always been a tool in the hands of the capitalist class (even if it is not just that). The information technology is no exception.  

Many people rely on google searches to access information from progressive sources. Recent changes to Google’s algorithm have negatively impacted the volume of traffic to the progressive and Marxist websites. Google has said that its update of its search engine will block access to what it considers “offensive” sites, while working to surface more “authoritative content.”

The sites adversely affected, and the percent decline in the traffic during the three month period since May 2017, are as follows:

wsws.org fell by 67 percent

alternet.org fell by 63 percent

globalresearch.ca fell by 62 percent

consortiumnews.com fell by 47 percent

socialistworker.org fell by 47 percent

mediamatters.org fell by 42 percent

commondreams.org fell by 37 percent

internationalviewpoint.org fell by 36 percent

democracynow.org fell by 36 percent

wikileaks.org fell by 30 percent

truth-out.org fell by 25 percent

counterpunch.org fell by 21 percent

theintercept.com fell by 19 percent

 

source: wsws.org

Real reporter Sheryl Attkisson is suing Uncle Sam for “his” attack on her computer

NEW: Attkisson v. DOJ: The Computer Intrusion Lawsuit against the Federal Govt.

It “is not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack.” –David Scantling, cyber-security expert.

I’m frequently asked about the status of my lawsuit against the U.S. Department of Justice over the secret, unlawful intrusions into my computers, exposed in 2013. As my federal case moves slowly through court system, there is a new development: ongoing forensic work of my computer laptop system has revealed a second government Internet Protocol (IP) address used in the illegal cyber-attacks on my computer laptop system.

The IP addresses don’t belong there.

In a new affidavit filed in federal court last week, cyber-security expert David Scantling states, “[T]he presence of these USPS addresses on [Attkisson’s] computer is not a mistake; it is not a random event; and it is not technically possible for these IP addresses to simply appear on her computer systems without activity by someone using them as part of the cyber-attack.”

Scantling served as a contractor for the National Security Agency (NSA), the Central Intelligence Agency (CIA), and as a Department of Defense (DoD) civilian employee. He’s familiar with “Advanced Persistent Threat” (“APT”) cyber-attacks. In fact, he developed and deployed similar APT cyber-attacks against foreign government, commercial, insurgent and terrorist targets. He also developed and deployed cyber-security countermeasures in the private sector to defend against such attacks.

Above: Excerpt from new affidavit filed in Attkisson v. DOJ

Interestingly, both government IP addresses found embedded deep in my computer system trace to the U.S. Postal Service (U.S.P.S.), which has been known to cooperate with intelligence agencies on various levels. The U.S.P.S. refused to cooperate with me, prior to my lawsuit, after my forensics expert recovered evidence of an IP address mysteriously residing in my computer. At the time, an agency official dismissed the forensics evidence as some sort of unexplainable mistake, and refused to help us learn how its IP addresses are maintained and accessed so we could identify the perpetrators.

Tracing the evidence of the government-related intrusion to individual participants hasn’t been easy. The attackers attempted to erase their tracks once they were discovered. And neither the U.S.P.S. nor the Department of Justice (DOJ) are voluntarily cooperating. But experts familiar with the tools and tradecraft that are proprietary to government intelligence agencies have painstakingly recovered and pieced together compelling forensic proof as to attribution.

“There can be no reasonable question that an [Advanced Persistent Threat]-style cyber-attack was carried on Attkisson’s computer systems and Internet connection,” stated Scantling in an affidavit filed last week. “Specifically, the APT methods deployed against [Attkisson’s] computers and Internet connection…were sophisticated and of the type only available to government-type activities and operations.”

This latest information builds upon earlier forensic examinations already conducted by: a confidential government-linked source, an independent forensics specialist hired by CBS, and a forensics expert consulting on my lawsuit.

snip>

READ MORE:

Who disappeared this long-awaited book about the CIA’s control of Western journalists? (Three guesses…)

I’ve been waiting for my copy of this book since its official publication date in May— and now I know why.

MCM

English Translation of Udo Ulfkotte’s “Bought Journalists” Suppressed?
By James F. Tracy

The English translation of German journalist Udo Ulfkotte’s best-selling book, Gekaufte Journalisten (Bought Journalists) appears to have been suppressed throughout North America and Europe.  On May 15, 2017 Next Revelation Press, an imprint of US-Canadian-based publisher Tayen Lane, released the English version of Bought Journalists, under the title, Journalists for Hire: How the CIA Buys the News.

Tayen Lane has since removed any reference to the title from its website. Correspondingly Amazon.com indicates the title is “currently unavailable,” with opportunities to purchase from independent sellers offering used copies for no less than $1309.09. The book’s subject matter and unexplained disappearance from the marketplace suggest how powerful forces are seeking to prevent its circulation.

Gekaufte Journalisten was almost completely ignored by mainstream German news media following its release in 2014. “No German mainstream journalist is allowed to report about [my] book,” Ulfkotte observed. “Otherwise he or she will be sacked. So we have a bestseller now that no German journalist is allowed to write or talk about.”{1]

Along these lines, publication of the English translation was repeatedly delayed. When this author contacted Ulfkotte in early December 2015 to inquire on the book’s pending translation, he responded,  “Please find the link to the English edition here,”

http://www.tayenlane.com/bought-journalists

The above address once providing the book’s description and anticipated publication date now leads to an empty page.[2] Tayen Lane has not responded to emails or telephone calls requesting an explanation for the title’s disappearance.

snip>

READ MORE: 

Hackers quickly demonstrate that “our” electoral democracy is nothing but a cybernetic fantasy.

This story comes from Lulu Friesdat, a (real) reporter who’s been digging into the corruption of our voting system nationwide.

She needs whatever help you might be able to provide, so she can keep on doing what she’s doing, entirely on her own:


Hello Friends,
This is my first report from the #DEFCON #VotingVillage. In some cases within minutes—and in other cases within a few hours—of the village doors’ opening, hackers in attendance said they had successfully penetrated some systems. The security investigators claimed to have breached or found major vulnerabilities in every voting system present.

Vegas is expensive. I also have other trips coming up and needed new camera equipment. Anything you can give to the GoFundMe account is greatly appreciated. I’m at over 25% of my goal, and the fund is trending! Very encouraging.
https://www.gofundme.com/election-integrity-work

Lulu

Watch: Hackers Demonstrate How to Crack Into Electronic Voting Machines in Minutes
Disturbing footage from the DEF CON 25 hacker convention.
By Lulu Friesdat / AlterNet

Who says America’s electronic voting machinery cannot be hacked?

One of the world’s largest and best-known hacker conventions, DEF CON, debuted an interactive “Voting Machine Hacker Village” this year at its annual gathering in Las Vegas. In some cases within minutes, and in other cases within a few hours, of the village doors’ opening, hackers in attendance said they had successfully breached some systems. The security investigators claimed to have found major vulnerabilities or claimed to have breached every voting machine and system present.

Members of the DEF CON hacking community said they took complete control of an e-poll book, a type of election equipment in use in dozens of states where voters arrive at precincts, sign in and receive their ballots. Other targets hackers claim had major security flaws include the Sequoia AVC Edge, currently in use in 13 states and the AccuVote TSX, in use in 19 states. (Those machine usages are according to Verified Voting, an election transparency advocacy group.)

The organizers of Voting Village emphasized that in the past, corporations had resisted acknowledging the security flaws surrounding computer systems. Since laws were passed requiring businesses to acknowledge security breaches, there has been a significant change in corporate security culture. DEF CON participants expressed the conviction that a similar trajectory is necessary for U.S. election officials.

snip>

READ MORE:

The awful truth obscured by “The White Helmets”

Here’s a devastating presentation by the excellent Vanessa Beeley, on the reality obscured completely by that little propaganda masterpiece.

Hollywood’s bestowal of an Oscar on that film is unforgivable. (What next? A posthumous Lifetime Achievement Award for Leni Riefenstahl?) We need a public drive imploring the Academy to take that Oscar back, and issue an apology for having so spectacularly blessed so gross a whitewash.

https://drive.google.com/file/d/0B_wNFlLPPsjGZUd2SEJnRTFLWTg/view?usp=sharing

Understanding US regime change in Syria – 2017 Panel

At the Left Forum late last month, I took part in a panel discussion of the US war on Syria, along with former CIA officer Phil Giraldi, and communications expert Jason Hirthler, the whole show organized and m.c.’d by Priya Reddy.

The panel was as lively as it was enlightening, not least because one member of the audience went absolutely ape-shit several minutes into my remarks, bellowing in fury at my argument that everything we’ve heard about Assad’s horrendous slaughter of his people is completely false.

Although the others in the audience were (understandably) put off by his behavior (he wouldn’t let me get a word in edgewise), and tried to shut  him up, the interruption proved to be quite valuable as what we call “a teaching moment.”

Here’s the link:

MCM on “conspiracy theory”

Conspiracy theories

One of the most divisive terms in the English language today is the phrase ‘conspiracy theory.’ Its stigma has a chilling effect on people and the label has the subtle power to shut down enquiring minds and, with them, any inconvenient conversations.

But where did the term come from, and how does this catch-all phrase affect independent thinkers, international debate and the media today?
Host Ross Ashcroft is joined by author and Professor of Media Studies at New York University Mark Crispin Miller.

Link: 

Please HELP FUND this documentary on JFK’s assassination!

This will be first documentary about Ruth Paine, a central figure in the JFK assassination, and one who has long kept her head way down (as has her husband/co-conspirator Michael Paine).
There’s only two days left in this Kickstarter drive to raise the necessary funds; so, if you want to see this film some day, please donate to this campaign now.
 
MCM

From filmmaker Max Good:

Hello,

We’d like to introduce you to a new documentary project that explores the story of Ruth & Michael Paine and their intriguing connections to the JFK assassination.  The Assassination and Mrs. Paine is a feature documentary that is now entering post-production after two years of filming.  The project was recently announced with a trailer and Kickstarter campaign.  You can see more here:

http://kck.st/2o9sqIe

www.JFKPaine.com

———

A longer synopsis:

The Assassination and Mrs. Paine is a provocative portrait of 84-year-old Ruth Paine and her inescapable connection to the assassination of president John F. Kennedy. The film juxtaposes Ruth’s personal experience of this tragedy against the wider cultural significance and controversy. Fifty-three years after the assassination, she is one of the few surviving central witnesses and her story offers an intimate window into this foundational event in American history.

At the heart of the film are the suspicions and accusations that have long beenaimed at Mrs. Paine and her former husband, Michael Paine. As benefactors of Marina and Lee Harvey Oswald, the Paines, became prime targets of conspiracy researchers, who view them as likely agents in a wider plot to frame Oswald. Ruth, in particular, is viewed as complicit in a vast and ongoing cover-up. Today, even as an anonymous resident of a Quaker retirement home in northern California, Ruth is still haunted by those who are convinced that she holds a secret to the crime of the century.