Hillary Clinton’s Exploits in McCarthyism

The New Cold Warriors who surround Hillary Clinton have made Russia-bashing and McCarthyism the go-to tactics to silence the few voices warning of the grave and unnecessary risks of a new Cold War, notes James W Carden.

By James W Carden

Now that the 2016 election campaign is at long last over, an examination of the reckless, fact-free, innuendo-laden McCarthyite rhetoric which Hillary Clinton’s campaign surrogates deployed over the past several months is in order.

The first and most obvious point to be made is that the anti-Russia hysteria that characterized the election, particularly in its final weeks, did not come out of nowhere; in fact, it should be seen as part of a natural progression of the elite media’s Russophobia which took root in and around the Ukraine crisis of late 2013-early 2014 and led, almost ineffably, not only to charges of Russian election-rigging in the United States but in the identification, in the pages of Newsweek and the Washington Post, of Russian fifth-columns within the United States.

How the Ukraine crisis poisoned America political discourse is by now well known. As I reported in The Nation almost 18 months ago, the cottage industry of unscrupulous neo-McCarthyites which has grown up around Washington, London and Manhattan in recent years has sought to stifle debate by bandying charges of unpatriotic disloyalty against anyone questioning the wisdom of U.S. policy toward Russia. (It bears noting that something similar regarding Syria policy is happening as I write, driven, for the most part, by the usual suspects.)

As one long time political scientist told me at the time, “The atmosphere here in the U.S. created by the Ukraine crisis is poisonous – and I say this having been an academic for 37 years.”

The millennial careerists who help staff the ranks of the New Cold Warriors instinctually reach for ad hominem attacks over reasoned argument – and in so doing helped make way for the tactics the Clinton campaign unleashed in 2016.

By the time the nominating conventions rolled around this summer, the Clinton campaign was engaged in a Twenty-first Century witch hunt against any Trump adviser who had so much as visited Russia. Trump campaign manager Paul Manafort and foreign policy adviser Carter Page were both hounded out of the campaign by Clinton-inspired media smears.

Clinton’s campaign, which was run by Robby Mook, a 36-year-old hot shot who clearly relished his role as a kind of millennial Roy Cohn, repeatedly attacked former Ambassador to Germany and arms control negotiator under Ronald Reagan, Richard Burt.

Burt was singled out, not only by the Clinton camp, but by Salon and Newsweek, because he had served as an adviser to Alfa Bank, the Russian bank which played a starring role in former New Republic editor’s Franklin Foer’s thoroughly debunked article on the Trump Organization’s (non-existent) “secret” email server.

Yet what is most interesting isn’t so much the smears – phrases like “useful idiot” and “Kremlin stooge” which are mostly warmed-over fare from the first Cold War – but the mindset of the New Cold Warriors. How is it that these self-anointed crusaders for “humanitarian intervention” and “democratization,” these self-appointed enemies of tyranny, end up on the side of neo-Nazis in Ukraine, Al Qaeda and al-Nusra affiliate in Syria, all the while stirring up sectarian and nationalist pathologies across the Middle East and Eastern Europe?


Secrets of the US Election: Assange Talks to Pilger

WikiLeaks founder Julian Assange denies the Russian government was the source of leaked emails about Hillary Clinton and says her “neo-McCarthy” Russia-bashing is just part of a cover-up, in an interview with John Pilger.

By John Pilger

This interview was filmed in the Embassy of Ecuador in London – where Julian Assange is a political refugee – and broadcast on Nov. 5, 2016

John Pilger: What’s the significance of the FBI’s intervention in these last days of the U.S. election campaign, in the case against Hillary Clinton?

Julian Assange: If you look at the history of the FBI, it has become effectively America’s political police. The FBI demonstrated this by taking down the former head of the CIA [General David Petraeus] over classified information given to his mistress. Almost no one is untouchable. The FBI is always trying to demonstrate that no one can resist us. But Hillary Clinton very conspicuously resisted the FBI’s investigation, so there’s anger within the FBI because it made the FBI look weak. We’ve published about 33,000 of Clinton’s emails when she was Secretary of State. They come from a batch of just over 60,000 emails, [of which] Clinton has kept about half – 30,000 — to herself, and we’ve published about half. Then there are the Podesta emails we’ve been publishing. [John] Podesta is Hillary Clinton’s primary campaign manager, so there’s a thread that runs through all these emails; there are quite a lot of pay-for-play, as they call it, giving access in exchange for money to states, individuals and corporations. [These emails are] combined with the cover-up of the Hillary Clinton emails when she was Secretary of State, [which] has led to an environment where the pressure on the FBI increases.

John Pilger: The Clinton campaign has said that Russia is behind all of this, that Russia has manipulated the campaign and is the source for WikiLeaks and its emails.

Julian Assange: The Clinton camp has been able to project that kind of neo-McCarthy hysteria: that Russia is responsible for everything. Hilary Clinton stated multiple times, falsely, that 17 U.S. intelligence agencies had assessed that Russia was the source of our publications. That is false; we can say that the Russian government is not the source.

WikiLeaks has been publishing for ten years, and in those ten years, we have published ten million documents, several thousand individual publications, several thousand different sources, and we have never got it wrong.

John Pilger: The emails that give evidence of access for money and how Hillary Clinton herself benefited from this and how she is benefitting politically, are quite extraordinary. I’m thinking of when the Qatari representative was given five minutes with Bill Clinton for a million dollar cheque.

Julian Assange: And twelve million dollars from Morocco …

John Pilger: Twelve million from Morocco yeah.

Julian Assange: For Hillary Clinton to attend [a party].

John Pilger: In terms of the foreign policy of the United States, that’s where the emails are most revealing, where they show the direct connection between Hillary Clinton and the foundation of jihadism, of ISIL, in the Middle East. Can you talk about how the emails demonstrate the connection between those who are meant to be fighting the jihadists of ISIL, are actually those who have helped create it.

Julian Assange: There’s an early 2014 email from Hillary Clinton, not so long after she left the State Department, to her campaign manager John Podesta that states ISIL is funded by the governments of Saudi Arabia and Qatar. Now this is the most significant email in the whole collection, and perhaps because Saudi and Qatari money is spread all over the Clinton Foundation. Even the U.S. government agrees that some Saudi figures have been supporting ISIL, or ISIS. But the dodge has always been that, well it’s just some rogue Princes, using their cut of the oil money to do whatever they like, but actually the government disapproves. But that email says that no, it is the governments of Saudi and Qatar that have been funding ISIS.

John Pilger: The Saudis, the Qataris, the Moroccans, the Bahrainis, particularly the Saudis and the Qataris, are giving all this money to the Clinton Foundation while Hilary Clinton is Secretary of State and the State Department is approving massive arms sales, particularly to Saudi Arabia.

Julian Assange: Under Hillary Clinton, the world’s largest ever arms deal was made with Saudi Arabia, [worth] more than $80 billion. In fact, during her tenure as Secretary of State, total arms exports from the United States in terms of the dollar value, doubled.

John Pilger: Of course the consequence of that is that the notorious terrorist group called ISIL or ISIS is created largely with money from the very people who are giving money to the Clinton Foundation.

Julian Assange: Yes.

John Pilger: That’s extraordinary.

Julian Assange: I actually feel quite sorry for Hillary Clinton as a person because I see someone who is eaten alive by their ambitions, tormented literally to the point where they become sick; they faint as a result of [the reaction] to their ambitions. She represents a whole network of people and a network of relationships with particular states. The question is how does Hilary Clinton fit in this broader network? She’s a centralizing cog. You’ve got a lot of different gears in operation from the big banks like Goldman Sachs and major elements of Wall Street, and Intelligence and people in the State Department and the Saudis.

She’s the centralizer that inter-connects all these different cogs. She’s the smooth central representation of all that, and ‘all that’ is more or less what is in power now in the United States. It’s what we call the establishment or the DC consensus. One of the more significant Podesta emails that we released was about how the Obama cabinet was formed and how half the Obama cabinet was basically nominated by a representative from Citibank. This is quite amazing.


Election Officials Dig in to Hide Potential Proof of Electronic Vote Rigging on Tuesday

By Ralph Lopez

Election officials across the country have denied requests from citizens to view and count the digital ballot images which are automatically generated in the majority of US voting precincts. The digital ballot images are a little-known feature of most US voting systems.

Noted Arizona election activist Jim March Simpson has requested copies of the digital ballot images for a number of key counties and races in the upcoming vote, including Clark County NV, Kern County CA, Los Angeles CA, Colorado counties Mesa, Gunnison, Pitkin, Eagle, Chaffee, and Denver, WA counties Seattle, King County, PA counties Lancaster and Chester, IA counties Adair, Cedar, Mitchell, Pottawattamie and Hardin, and all of Ohio.

Joe Gloria, Registrar of Voters of the Clark County, NV Election Department, answered Mr. Simpson’s request by writing in an email, which was forwarded to this reporter:

I am unable to release this information to the public without a court order.

The existence of stored digital images of the ballots cast in most US precincts was recently discovered by election integrity activists,who last summer charged that the results of the 2016 Democratic primaries were riddled with evidence of fraud. The activists and experts, one of whom includes the 100th president of the American Statistical Association, suggest that Bernie Sanders actually won the Democratic nomination. In the report “Democracy Lost: A Report on the Fatally Flawed 2016 Democratic Primaries,” the authors called for:

“decertification of the 2016 Democratic primary results in every state in which we have established a reasonable doubt as to the accuracy of the vote tally.”

In the majority of paper ballot vote-counting machines, a marked ballot is fed into an optical device which reads and counts the votes and generates a digital image of the ballot all at once. The digital images are then stored in memory. The creation of digital ballot images was meant to serve as a back-up to the original paper ballot record. The images could be easily accessed, viewed, and counted without actually handling the paper ballots.

Pioneering election integrity activist Bev Harris of Black Box Voting recently called ballot images “a new way to verify if the results are true.”

The presence of digital ballot images provides an avenue for verifying machine-counted totals, which does not require the overtime costs and special skills required to perform hand-counts of paper ballots. The kind of optical scan, paper ballot vote-counting machines in use across much of the US have been roundly criticized as being vulnerable to “hacking.”

The New York Times reported last week in “Five Possible Hacks to Worry About Before Election Day”:

“the [Election Systems & Software] DS200, an optical scanning model used in many districts, comes with an optional wireless ability. The good news: They can report results automatically. The bad news: Any wireless connection is a vulnerability.”

Election integrity activists are puzzled as to why election officials would want to keep the images from public view, except as a precursor to massive election fraud.

The ease with which US vote-counting machines can be accessed and manipulated has been demonstrated in numerous films and documentaries, including by a team at Princeton and in the HBO documentary Hacking Democracy.


Fraction Magic – Part 1: Votes are being counted as fractions instead of as whole numbers

By Bev Harris

1 – Summary –

This report summarizes the results of our review of the GEMS election management system, which counts approximately 25 percent of all votes in the United States. The results of this study demonstrate that a fractional vote feature is embedded in each GEMS application which can be used to invisibly, yet radically, alter election outcomes by pre-setting desired vote percentages to redistribute votes. This tampering is not visible to election observers, even if they are standing in the room and watching the computer. Use of the decimalized vote feature is unlikely to be detected by auditing or canvass procedures, and can be applied across large jurisdictions in less than 60 seconds.

GEMS vote-counting systems are and have been operated under five trade names: Global Election Systems, Diebold Election Systems, Premier Election Systems, Dominion Voting Systems, and Election Systems & Software, in addition to a number of private regional subcontractors. At the time of this writing, this system is used statewide in Alaska, Connecticut, Georgia, Mississippi, New Hampshire, Utah and Vermont, and for counties in Arizona, California, Colorado, Florida, Illinois, Indiana, Iowa, Kansas, Kentucky, Massachusetts, Michigan, Missouri, Ohio, Pennsylvania, Tennessee, Texas, Virginia, Washington, Wisconsin and Wyoming. It is also used in Canada.

Fractionalized vote:

Instead of “1” the vote is allowed to be 1/2,  or 1+7/8, or any other value that is not a whole number.

What fractionalized votes can do:

They allow “weighting” of races. Weighting a race removes the principle of “one person-one vote” to allow some votes to be counted as less than one or more than one. Regardless of what the real votes are, candidates can receive a set percentage of votes. Results can be controlled. For example, Candidate A can be assigned 44% of the votes, Candidate B 51%, and Candidate C the rest.

GEMS fractionalizes votes in three places:

  1. The “Summary” vote tally, which provides overall election totals for each race on Election Night
  2. The “Statement of Votes Cast”, which provides detailed results by precinct and voting method (ie. Polling, absentee, early, provisional)
  3. The “undervote” count

Fractions in results reports are not visible.Votes containing decimals are reported as whole numbers unless specifically instructed to reveal decimals (which is not the default setting). All evidence that fractional values ever existed can be removed instantly even from the underlying database using a setting in the GEMS data tables, in which case even instructing GEMS to show the decimals will fail to reveal they were used.


Now that one guy has dismissed my video as “conspiracy theory” (a charge suggesting that he’s either marvelously ignorant, or working as a troll), I offer this quick catalogue of evidence, not just that our elections CAN be stolen, but that it’s happened here already:

“Democracy Lost,” from Election Justice USA; Jonathan Simon’s CODE RED: ELECTION FRAUD AND THE NEW AMERICAN CENTURY; Mark Crispin Miller, FOOLED AGAIN: THE REAL CASE FOR ELECTORAL REFORM, and LOSER TAKE ALL: ELECTION FRAUD AND THE SUBVERSION OF DEMOCRACY, 2000-2008; Steven Freeman and Joel Bleifuss, WAS THE 2004 ELECTION STOLEN?; Harvey Wasserman, Robert Fitrakis and Steven Rosenfeld, WHAT WENT WRONG IN OHIO?; Richard Hayes Phillips, WITNESS TO A CRIME: A CITIZENS’ AUDIT OF AN AMERICAN ELECTION; Victoria Collier, “How to Rig an Election,” Harper’s, November, 2012; James Collier and Kenneth Collier, VOTESCAM: THE STEALING OF AMERICA (e-book now available from Open Road Media); Robert F. Kennedy, Jr., “Was the 2004 Election Stolen,” Rolling Stone, June, 2006, and “Will the Next Election Be Hacked?” Truthout, Sept. 21, 2006; and—last but not least—Greg Palast, THE BEST DEMOCRACY MONEY CAN BUY and BILLIONAIRES AND BALLOT BANDITS, as well as his recent expose, in Rolling Stone, of the Crosscheck system now being used to purge millions of (Democratic) voters from the voter rolls. And then there are the websites BradBlog (from Brad Friedman) and Black Box Voting (from Bev Harris).

And I also strongly recommend I VOTED?, the killer documentary by Jason Grant Smith, released in April of this year.

I hope that anyone whose work I may have failed to mention (there are several other first-rate documentaries on the subject) will forgive me for it, as I did this off the top of my head, and there’s surely work out there that I don’t know about.


Can US elections be stolen? Yes—and the threat lies NOT in “people voting 15 times” (as Donald Trump keeps charging), or in the Kremlin (as the Democrats and corporate press keep telling us).

As Mark Crispin Miller explains in this 8-minute video, election theft in the United States today is based on an insidious “one-two punch”
of vote suppression AND computerized election fraud—a clear and present danger that’s been too long laughed off as a “conspiracy theory.”

It doesn’t matter who you’re voting for. If you believe that the United States should be a real electoral democracy, please send this link to everyone you know, so we can face the awful truth about our wretched voting system, and finally take the proper steps to make it work, and so return this country to its people.


 By Noah Higdon

The 2016 Media Freedom Summit celebrated 40 years of Project Censored. The event also brought together independent journalists, media activists, professors, students, and members of the public to discuss the links between media power and political power, and to share effective strategies for advancing social justice by promoting media freedom and critical media literacy.

The round-table for the 2016 Media Freedom Summit took place at Sonoma State University on October 21, 2016. The speakers included Abby Martin (Empire Files) with Mnar Muhawesh (Mint Press News), David Talbot (journalist, author and media entrepreneur), and Mark Crispin Miller (New York University)

I appeared on RT today, along with radio host/peace activist Don DeBar, and Bruce Fein, a lawyer who worked in the Reagan administration, and who’s been highly critical of Bush, Clinton and Obama.

Although our topic was James Comey’s volte-face, and its likely impact on the presidential race, I spoke at length about election fraud, and the dire need for real reform of our abysmal voting system (something I would never be allowed to talk about on CNN, MSNBC, or in the New York Times, Washington Post, Newsweek, Time, you name it).


US Propaganda and the “Putin” Threat: Interview with Mark Crispin Miller

New York University Mark Crispin Miller talks about US government propaganda, the corporate media, the CIA and the Russian “Putin” threat. Miller talks about how Rupert Murdoch’s VICE tried to get him fired, using a graduate student in NYU’s journalism department. He also discusses the role of the CIA and the US government in their organized effort to demonize Putin and Russia and create a wave of war hysteria reminiscent of the 1950s.

This interview was done during the Project Censored 40th anniversary at Sonoma State University on October 22, 2016 by Pacifica KPFA WorkWeek host Steve Zeltzer.

‘Abject failure of US press’: Media reports on Russian involvement in leaks despite no evidence

Hillary Clinton’s camp has again decided to play the Russian card. But this time it’s not only Moscow that’s behind the leak of DNC and Podesta emails – somehow RT is also involved, Clinton’s team claims. This after Defense Intelligence Agency Director James Clapper – who was proven wrong on NSA spying after the Snowden leaks – accused Russia of being behind the Podesta and DNC leaks. Mark Crispin Miller, professor of Media Studies at New York University, joins RT America’s Manila Chan to weigh in.

Forbidden Bookshelf

Forbidden Bookshelf

“While We Were Sleeping”

While We Were Sleeping is an urgent call to save Greenwich Village from New York University's uncontrolled expansion.

Click here to donate to NYUFASP and receive a copy of "While We Were Sleeping: NYU and the Destruction of New York" (minimum donation to receive a book is $10 plus $8 shipping).

Orwell Rolls In His Grave, featuring MCM – Buy the DVD

About News From Underground

News From Underground is a daily e-news service run by Mark Crispin Miller, a Professor of Culture and Communication at NYU. It is based on his belief that academics, like reporters, have a civic obligation to help keep the people well-informed, so that American democracy might finally work.

If you'd like to receive updates delivered to your inbox daily, sign up for News From Underground Alerts:

Help News From Underground!

Message from Mark: "I am a one-man operation, although assisted greatly by some volunteers, and, now and then, by people paid by others for one-time projects. There is no shortage of skilled, dedicated folks out there who want to help me. There is, however, nothing I can pay them with, unless you decide you can contribute something."

Please donate via the PayPal button above or via PayPal by email to: markcrispinmiller@gmail.com

Recent Posts

Recent Comments

Popular Posts


Need a bigger font size?

Sponsored Links

  • Your link could be here too, contact us for pricing details.