Sandra Finley

Jul 092023
 

Dan writes:   Before anyone takes any drug made by Pfizer again, they ought to watch this.  A description of the company’s origins and their long criminal record.

drsambailey.com

The Story of Pfizer Inc. – Dr Sam Bailey

Dr. Bailey writes:

The Health Freedom Defense Fund published a devastating essay on the 19th of June, 2023:

“The Story of Pfizer Inc. – A Case Study in Pharmaceutical Empire and Corporate Corruption”

   and authorised me to produce this video version.

🔗 https://drsambailey.com/resources/videos/corruption-and-medicine/the-story-of-pfizer-inc/

 

(Sandra speaking)      God bless Dr. Sam Bailey!!   FINALLY, someone doing a comprehensive commentary.  Time required to watch:  less than 1/2 hour!

Below. I added what’s on my blog about Pfizer, in case anyone has doubts or doesn’t know.  There are postings that go back 18 years to 2005.  When Pfizer murdered (that’s the word that would have been used if a cult had done the job) all those Nigerian children.

Why, when what is known about Pfizer,  ANYONE would trust a word they say is beyond me.   It’s as if some people take pleasure in getting duped!  Short memory is a factor.  Mainstream media definitely plays a role in maintaining an uninformed (ignorant) population.

BUT PLEASE WATCH DR. BAILEY’S VIDEO AND PASS IT ON!

 

A search on my blog for “Pfizer” turns up the following, as at 2023-07-09. 

The word “Pfizer” should be in each of these postings.  But it’s not apparent from the title.  And I haven’t time to read through all of them to check!

2022

January

1.     2022-01-02 RCMP member sent on unpaid leave writes this powerful letter, Easton Spectator

2.     2022-01-04 Rogan and Malone: Most Important Interview of Our Time?

3.     2022-01-10 The Arrest & Persecution of Physician Activist Dr. Mel Bruchet – Update & Interview with Dr. Daniel Nagase & the ‘5th Doctor’, Sam Dubé – A shocking story of medical tyranny and out-of-control police powers

4.     2022-01-11 Autopsy Confirms 26-Year-Old’s Death From Myocarditis Directly Caused by Pfizer COVID Vaccine

5.     2022-01-20 Bill Gates, Indian Government Targeted in Lawsuit Alleging AstraZeneca Vaccine Killed 23-Year-Old

6.     2022-01-24 For your selection, Jan 24-27.  Rapid mobilizations

February

7.     2022-02-01 Joe Rogan Up Against ‘Powerful Interests,’ as More Musicians Threaten to Remove Music From Spotify

8.     2022-02-01 Trudeau used COVID to short circuit democracy in Canada.

9.     2022-02-04 ‘Vaccine Mania’: Fauci, Big Pharma Detail Plans for ‘Indefinite’ Rollout of Shots, meeting of the World Economic Forum

10.  2022-02-09 Pfizer Predicts Record Profits From COVID Products, Says Chances ‘Very High’ FDA Will Authorize Vaccine for Babies and Toddlers

11.  2022-02-09 Your recourse if covid vaccination harms your child

12.  2022-02-09 For your selection, February 09. Stoked

13.  2022-02-11 Canada and the Conflict of Interest. Canada owns the gene technology. UBC license agreement. Canada makes money on every injection (Pfizer, Moderna). David Martin takes on AP Fact-checker.

14.  2022-02-11 Breaking: FDA Postpones Meeting on COVID Shots for Kids Under 5 After Pfizer Says Not Enough Data. But Don’t Let Up on the fight!

15.  2022-02-14 U.S. Big pressure on the FDA, Pfizer vaccine for kids EUA, from citizens and Children’s Health Defense

16.  2022-02-17 Former Blackrock Portfolio Manager, Edward Dowd, Exposes Pfizer Fraud

17.  2022-02-26 For your selection Feb 26

MAY

18.  2022-05-19 Louisiana Governor Reverses ‘Insane Mandate’ Requiring COVID Vaccines for Students, CHD

OCTOBER

19.  2022-10-20 Set of postings related to Public Order Emergency Commission, Canada, in context of covid mandates   

2021

20.  2021-06-11 Dr. Mike Yeadon, former VP of Pfizer, interviewed by Del Bigtree

21.  2021-06-27 Battle to recover scientific honesty

22.  2021-08-17 Rutgers University Sued Over COVID Vaccine Mandate

23.  2021-08-24 Understand the dance behind “approved” and “Emergency Use Authorization” for Vaccines.

24.  2021-09-14 to 29 For your selection (most postings related to Forced covid inoculation and propaganda)

25.  2021-09-22 Biden’s Vaccine Mandate — Who’s Fighting Back, and How? includes video, commentary by Russell Brand

26.  2021-09-22 The submissions of now TWO ALBERTA PEDIATRICIANS challenge the mandated covid vaccination

27.  2021-10-05 Lawyer Jeffrey Rath, letter to College of Physicians and Surgeons demanding resignations over mandated vaccines, Melanie Risdon, Western Standard

28.  2021-10-08 Mandatory vaccination for B.C. school staff up to boards, says B.C. premier

29.  2021-12-09 Dr Daniel Nagase Shocking Stats from Pfizer Documents  AND We’ll all be dead before FDA releases full COVID vaccine record, plaintiffs say

30.  2021-12-13 Japan’s health ministry officially WARNS of myocarditis heart inflammation as a side-effect of Moderna and Pfizer COVID vaccines

31.  2021-12-17 Email sent to Vancouver Island, Chief Medical Health Officer

32.  2021-09-13 Response to Biden’s ‘Declaration of War Against Unvaccinated’

33.  2021-09-14 Vaccines: From Okanagan Health Professionals, B.C. Canada: Open Letter to Dr. Bonnie Henry, Adrian Dix, and Premier John Horgan

34.  2021-09-19 In the streets

 

2020

35.  2020-06-10 If I am making a choice about a vaccine, I want to know this.

36.  2020-08-08 To CBC re mandatory covid vaccine

37.   2020-08-14 Letter to activist organization re covid: You can bleat all you want; nothing changes if corruption is not addressed. Unholy alliances.

EARLIER

38.   2019-05-08 Letter to CBC, re interview, Tuberculosis “in northern Inuit communities”. Far away?

39.   2017-04-10 Big Pharma. Vaccines. Why would you not ask questions? (Why do we think We know everything?)

40.   2017-01-17 Vaccines. No doubt, serious fraud at the CDC. Brian Hooker, William Thompson.   And How are vaccines made? Henrietta Lacks. Attenuation. Anthrax.

41.   2016-04-25 Acne drug Accutane’s harm to fetus a worry despite prevention efforts, CBC

42.  2016-12-09 someone did internet search on “Saskatchewan and Constant Gardener”; came to my blog

43.   2016-12-09 Constant Gardener and Pfizer, my story (letter to LeCarre, Deaths (murder) of Nigerian children guinea-pigs, $US75 million Out-of-Court Settlement with Govt of Nigeria, Pfizer at the University of Saskatchewan)

44.   2012-02-19 Tuberculosis. Request for info. Input for people in Guatemala.

45.   2011-11-15 Entrants Aspire to Advance Parkinson’s and Diabetes Research, Create Stem Cell Knowledgebase, Improve Organic Photovoltaics for Solar Cells and Map Genomic Diversity   In the public interest?  Don’t be gullible.

46.  2010-01-21 A Gift for global citizens (ha ha!): U.S. Supreme Court gives corporations free spending on political campaigns. Resource list re democracy. Organizations involved.

47.   2009-11-29 NUKE: “Expert Review Panel” decision due. CONTENTS

48.   2009-04-06 $75 million. Pfizer settles Nigerian drug case out of court (criminal charges for deaths of children)

49.   2009-11-19 H1N1 (or nukes or gmo’s or energy) in the context of “Selling Out”: the larger issue. Immune systems. TB. Constant Gardener.

50.  2008-05-25 Bill C-51 is not about Natural Health Products

51.  2007-06-01 Tuberculosis story improbable ?? Same day, Nigerian Government brings criminal charges against Pfizer.

52.   2007-06-03 Doctors Get Drug Company Pay, New York Times June 3, 2007

53.   2005-04-30 Help for Drug Firm (Bayer) illegal, Washington Post

54.   2004-09-15 Racketeering charges against Monsanto re Aspartame. Rumsfeld. Artifical sweeteners.

Jul 082023
 
The Constant Gardener  is the title of a novel by John le Carré.  It became a movie.

From: Sandra Finley
Sent: December 9, 2016
To: mysteries and more   at   gmail.com
Subject: Your blogged review of The Constant Gardener   TO MR. SELNES

Dear Mr. Selnes,

Today,  someone did an internet search on the words “Saskatchewan and Constant Gardener”.

They arrived on my blog – maybe yours, too.

Not many people know the connection between John le Carré’s novel and the University of Saskatchewan.

I was curious as to what an internet search on “Saskatchewan and Constant Gardener” would generate.   Your blog is one of them.   Hence this email to you.

To me there remains mystery around le Carré’s choice of the U of Saskatchewan.   He is known for his meticulous research.   He writes in the book’s  afterword, “By comparison with the reality, my story [is] as tame as a holiday postcard.”   His story is brutal!

As you may know,  in mid-2007  the Govt of Nigeria brought criminal charges against Pfizer.  News, 2009:  Pfizer settles Nigerian drug case out of court (criminal charges for death of children) $75 million.   I have thought that Le Carré’s novel (2001) may have been instrumental.

Serendipitous events led me to The Constant Gardener:

  • 2005   I became quite sick, the eventual diagnosis (a shocker to me) was tuberculosis!  I had thought that TB had been eradicated  in Canada.  I remember the TB van that travelled even to rural communities in the 1950’s.
  • 2005   The first day I was strong enough,  I walked across the bridge to downtown Saskatoon.   A movie caught my eye, The Constant Gardener.   I’m a gardener.  What a treat this would be on this glorious day.   Afterwards, I walked back into the day, reeling.  I seriously wondered whether I was experiencing some kind of deluded state of mind.  The movie is about tuberculosis and intrigue.
  • 2007   There!  The Constant Gardener was back in my face.  This time it was the book, sitting on a small, tall table on the sidewalk in front of a used-things shop.  The book said,  “You have to read me.”  And I did.  Among eye-raising details >>  the movie, as I recall, doesn’t include events in the book that take place at a winter cold and dark northern University.  I knew of “VIDO” (Vaccine Infectious Disease Organization at the University of Saskatchewan.  VIDO became INTERVAC) – – more below.

Now, here it is 2016:  I have completed the maximum 6 years (2 terms)  as an elected member of the U of Saskatchewan Senate.

Back to the mystery of why le Carré would use the U of S in his book.   (I am a longtime activist;  I know why he chose Germany as the location in which to set part of the story.  Encapsulated in one word.  Bayer pharmaceuticals.)

Perhaps the answer to the mystery will become known.   The starting place for me is VIDO which has morphed into Intervac.

Vaccine and Infectious Disease Organization – International Vaccine Centre.   As I understand, things began in the College of Agriculture (Animal Health).  Veterinary Medicine for the prairie provinces (agricultural) was also centred at the U of S.   Animal and human immune systems are highly related.  Animal and human vaccines are related.  In high-school I worked part-time in the drugstore of my small-town home.  Drugs for animals were shelved in one corner.  Farmers and Ranchers came in for them.  From behind the drugstore counter, some of the same drugs, but designed for humans were dispensed by my employer, the pharmacist.   (I am reminded also, of the (off-topic!) link:   2009 – Rotavirus vaccine, contaminated with a pig virus, injected into more than a million kids in the U.S. alone.)

There is a VIDO-Intervac website, but my sense is of secrecy, limited transparency;  there is tight security,  I presume because of the highly-infectious organisms with which they work.

How did, and why did le Carre find out about the U of Saskatchewan’s role in vaccines? (I am reminded of the U of S’s role in the GMO (Triffid) flax debacle.  Not many people had any inkling that it would, or could be, a university, not a corporation, that was the culprit.)

While on Senate I hoped to help elevate the level of accountability and adherence to the Legislation that is supposed to govern the administration of the university.  I worked with other Senators.  We created Temporary tempests-in-a-teapot.  Maybe we caused even more of the malfeasance to go underground.

But enough!  You may be interested in skimming through some of following.

Best wishes,

Sandra

= = = = = = =  = = = = =

EXCERPTS From the material on my blog  (links at bottom)

2009-11-19:

THE CONSTANT GARDENER.  VIDO (VACCINE INFECTIOUS DISEASES ORGANIZATION) AT THE UNIVERSITY OF SASKATCHEWAN.

I advise people to read the real life comments in “The Constant Gardener“. Le Carré says the story in his book is a holiday card version of what the pharmaceutical corporations do in the real world. His books are well researched.

(Another internationally-famous author, Henning Mankell, lives back-and-forth between Sweden and Africa, and has written a book similar to “The Constant Gardener“.  Thanks to Howard for drawing “Kennedy’s Brain” to attention.  I haven’t read it.    http://www.thenewpress.com/index.php?option=com_title&task=view_title&metaproductid=1673 )

(2020-06  The preceding link takes you to The New Press.  A Search on their blog takes you to   https://thenewpress.com/search/Kennedy%E2%80%99s%20Brain)  by Henning Mankell.

I am very curious about what John le Carré  knew, or intuited.  In “The Constant Gardener” part of the search to uncover the truth about the pharmaceutical-company-related deaths in Africa takes place in Canada, at the University of Saskatchewan.  It was pretty shocking to me to be reading about the U of S in “The Constant Gardener”!

(Wikipedia):  The Constant Gardener is a 2001 novel by John le Carré. It tells the story of Justin Quayle, a British diplomat whose activist wife is murdered. Believing that there is more behind the murder, he seeks to uncover the truth behind her death, and finds an international conspiracy of corrupt bureaucracy and pharmaceutical money.

John le Carré writes in the book’s afterword, “By comparison with the reality, my story [is] as tame as a holiday postcard.” [1])”

From a blog:  “An important part of Quayle’s quest takes him to Saskatchewan, where he finds one of the drug’s main developers.”

At the time of seeing the movie I was weak and in the early stages of overcoming the TB organisms in my body.  I thought I was going to see a gardening movie of some kind!

I walked out of the theatre thinking I had been on some outer space hallucinatory experience.  The movie was about tuberculosis in a spy-thriller John le Carré setting. It was a disease I had thought had been eradicated from Canada and most of elsewhere – – which I now had.  Part of the action was at the University of Saskatchewan where I had just been for medical attention.  The timing of seeing the movie was all too bizarre and disorienting.

I have always wondered why le Carré  placed part of the action in Saskatchewan?  The only thing I could think was that the U of S is a big centre for biotechnology (developing crops that are resistant to chemical applications) and I knew there are biotech pharmaceuticals at the U of S. That was the only link I could think of.  I thought that John le Carré might have known more?

Later, when I read that the Bill and Linda Gates Foundation was donating a lot of money to help find the cure for the renewed rising threat of tuberculosis in the world, I wanted to tell the Gates:  put your money into finding alternatives to “the cure”.

If my one experiment was successful in combating the disease without potent drugs, then it is POSSIBLE that it can be done.  But as long as the pharmaceutical corporations are involved, the ONLY avenue that will be explored is the drug option.  And it is a wrong-headed approach, obviously.  You might think you are God, but you cannot stop evolution (drug-resistant organisms).

I thought that John le Carré  (his pen name) would have a better chance of talking to and persuading the Gates than me (ha! HA!). Also, I wanted to thank David Cornwell (his real name) for his book. So I found an email address for the publisher.

I requested that the publisher forward my email.  After explanations and thanks, the email requested that Cornwell contact the Gates Foundation:  (UPDATE –  you can laugh!  Nothing like going to one of the foxes in the hen-house, ignorant me!)

Bill Gates should read “The Constant Gardener” to understand the lay of the land with the pharmaceutical corporations, their murderous ways, and he might re-consider where he wants to donate his money.

Why not ask?!  It gets it out of my system, and it is supportive of people like Cornwell (John le Carré).  He’s not only a good guy, he is putting his neck on the line.  He needs our support.

A reply was received:

Mon 21/05/2007 5:03 AM

Dear Ms Finley

Your message has found its way to me, John le Carre’s agent.  I shall make sure that he sees it.

Yours sincerely

Bruce Hunter

David Higham Associates

Visit our website at www.davidhigham.co.uk

Monsieur le Carré hasn’t let me know if he communicated on the matter with Mr. Gates!  Ha ha!   Oh well, my modus operandi is to “put it out there”.  And then let it go.  I don’t need to know what happened; that’s beyond my control.

That was all I knew, until this last week (Nov 2009). Howard Woodhouse’s book “Selling Out”, in the chapter on the synchrotron at the University of Saskatchewan talks about VIDO.

VIDO = Vaccine Infectious Diseases Organization at the University of Saskatchewan.   http://www.vido.org/

EXCERPTS:

VIDO is a not-for-profit organization owned by the University of Saskatchewan. A separate Board of Advisors contributes industry expertise and practical guidance. … VIDO continues to be competitive nationally and internationally, with more than 80 awarded U.S. patents.  . . . . .  VIDO is one of four Canadian teams offered funding through the Bill & Melinda Gates Foundation’s Grand Challenges in Global Health initiative.   (INSERT:  The Gates Foundation is heavily invested in VACCINES.)

(If you didn’t know that the University of Saskatchewan is a wholly-owned subsidiary of various corporations, or about to become so, you SHOULD know!)

MAYBE John le Carré knew about VIDO, the work being done at the University of Saskatchewan for the pharmaceutical corporations, when he wrote “The Constant Gardener”?  Take a Ramble through the VIDO website – it’s all there.

What University of Saskatchewan professor, Howard Woodhouse, makes clear in his book “Selling Out” and which is there again in the VIDO information is that WE citizens are paying the COSTS for the corporations, through Government Budgets.

The details and the extent, the amounts of the subsidies, are well documented in “Selling Out”.

It is “socialization of the costs and privatization of the profits” — for what is beneficial to the corporations, not what is necessarily beneficial for citizens.

The cost to students is financially large. There are “cutbacks” and higher tuition fees because the money is sucked up by the research for the pharmaceutical and other corporations. The University Administration hypes it as “Innovation”.

Conflicts-of-interest abound: professors in veterinary medicine who promote factory-size pig barns (origins of swine flu) receive money from that industry. That industry is now going into bankruptcy.  It was heavily subsidized by tax-payers, resisted by many communities.  It forced smaller, more humane and health-giving local meat producers out of production.  It also forced small producers in other countries out-of-business and into dependency upon imported cheap, inferior food from Canada. . . . Our Government and our University working for us in “public-private-partnerships”.

The “innovative” corporate model adopted by the University does not reflect our values. The conflicts-of-interest created by the “partnerships” should not be tolerated.  There was a time in Canada when the illegality of conflicts-of-interest was prosecuted.

Old-timers in our network know the story where I challenged a salaried full-time government scientist who works at “Innovation Place” at the University.  Simultaneously he makes “up to ten thousand dollars” per contract he does for the very corporations he is supposed to be regulating. And which he had been doing for 8 years at the time. I received a letter from a lawyer threatening to sue me if I should say such-and-such to Saskatoon City Council about the situation.  (The City had a pesticide bylaw under consideration. There was a serious conflict-of-interest involved.)  My reply to the lawyer was to compare his letter to mafia tactics.

The work at the University is NOT “innovative”, as they keep heralding and would have us believe.  The drug approach is the status quo.  The pharmaceutical corporations are corrupt.  And we are the silly ones putting up the money, in more ways than we know.  If more people knew, there would be a revolt. .. I think it’s under way.

= = = = = = =

These are links to the TB-related postings.   There is repetition of material because they cover a span of 6 years.   Also, they are too lengthy.   Hence the above excerpt.

/S

POSTINGS ON MY BLOG:

Jun 302023
 
      RECEIVED   – – REPLY  – –  CONTEXT

TRAVIS WRITES   (June 30, 2023)
Subject: the end of voting integrity in Saskatchewan

Funny – just yesterday I was telling a friend that Saskatchewan was one of the last places with a trustworthy voting system.

Soon to be a thing of the past though.

I was watching the Toronto mayor’s election on Monday and people were showing just how easy it was to get 2 or 3 ballots.

I realize I’m not allowed to be correct about anything (despite having about a .950 batting average) and that anyone who gets information from me will take the opposite view “just because”.

Enjoy the decline.

++++++++++++++++++

THE CBC REPORT

Elections CEO seeks approval to ‘modernize’ voting for 2024 in Sask. | CBC News

https://www.cbc.ca/news/canada/saskatchewan/election-ceo-polling-changes-1.6893082

= = = = = = = = = = = = = = = = = = =

From: Sandra Finley,   June 30, 2023
To: Travis

Thanks for the heads-up.   In reply:

11 postings, numbered, are APPENDED.   And I added 1 new one.

EXCERPT FROM POSTING  #11

I have been concerned about ELECTRONIC VOTING since the day in 2009 when I heard that Elections Canada is promoting electronic voting (e-voting).  What flashed in my mind was the election fraud in Florida through which George Bush became president of the U.S..

All of us are aware of the insecurity of computer systems.

Not everyone knows the story of Diebold Election Systems which morphed into Global Election Systems and is now called Premier Election Solutions.  (Why do corporations change their names? . .  to avoid linkage to bad deeds.)

NEW POSTING,  ADDED TODAY (2023-06-30):

2008-03-07   Defense Contractor to Buy Diebold (Premier) Election Systems

Return to EXCERPT:

Not everyone has seen the documentary,  “Murder, Spies & Voting Lies“.   (available on Netflix.)

Today (Sept, 2011) I sent an email to Canada’s Chief Electoral Officer,  Marc Mayrand.    I want to know the status of the electronic voting project in Canada.   I am hoping that the time, money and ego invested in e-voting in Canada will not cause deafness.

CONTENTS

    1. THE EXPERIENCE WITH E-VOTING FRAUD IN FLORIDA,  “Murder, Spies & Voting Lies“.    (See also:  2003-10-24 Diebold Memos Disclose Florida 2000 E-Voting Fraud)
    2. JANUARY 2010,  WORKSHOP “INTERNET VOTING – WHAT CAN CANADA LEARN?”, CONDUCTED BY THE “STRATEGIC KNOWLEDGE CLUSTER, CANADA – EUROPE TRANSATLANTIC DIALOGUE”  (ELECTIONS CANADA WEB-SITE)
    3. CHANGES TO EXISTING LEGISLATION WOULD NEED TO BE “SWEEPING AND WIDESPREAD”
    4. ELECTRONIC VOTING IN CANADA, GOOD INFORMATION ON WIKIPEDIA
    5. “THE PROBLEM IS WITH THE COMPUTER, NOT WITH THE FACT THAT THE COMPUTER IS BEING USED IN A VOTING SYSTEM”
    6. (BACKGROUND)  JUNE 2009, ELECTIONS CANADA BACKS ONLINE VOTING

APPENDED

1.      2012-03-27 Cyber attack on NDP leadership vote involved more than 10,000 computers

2.      2015-10-08 Calls for Electronic Voting. Election fraud. Canadians beware. Response to CBC.

3.      2013-04-30 Irregularities widespread in Canadian elections, report finds

4.      2012-11 How to rig an election, Harper’s Magazine, Victoria Collier

5.      2012-11-05 Electronic voting, U.S. Election, use of software patches in key swing stateElectronic voting, “Hacking Democracy” HBO documentary. Plus Michael Geist.

6.      2009-06-26 Elections Canada backs online voting, Toronto Star

7.      2012-03-24 Letter to Chief Electoral Officer, Follow-up on Project on Electronic Voting in Canada

8.      2003-10-24 Diebold Memos Disclose Florida 2000 E-Voting Fraud

9.      2011-09-07 E-voting: Letter to Elections Canada and reply

10.   E-voting in Canada: Online Voting and Hostile Deployment Environments by Christopher Parsons

11.   2011-09-03 Election fraud in the U.S., “Murder, Spies & Voting Lies”. E-voting in Canada.

Jun 282023
 

Most Popular Choices

Share on Facebook 20 Share on Twitter Printer Friendly Page More Sharing

Exclusive to OpEd News:
General News   

Defense Contractor to Buy Diebold (Premier) Election Systems

By G.E. Nordell  Posted by G.E. Nordell (about the submitter)       (Page 1 of 1 pages)   3 comments
Message G.E. Nordell

Charlie Black is a senior advisor to John McCain’s campaign and founder & chairman of the B.K.S.H. & Associates Worldwide telcom lobbying firm [www.bksh.com] that works for defense contractor United technologies [www.UTC.com].

Mark Penn is the chief pollster of Hillary Clinton’s campaign and CEO of public relations firm Burson-Marsteller [www.burson-marsteller.com], whose clients include Diebold [www.diebold.com], manufacturer of the majority of voting machines in America.

United Technologies this week made a sudden buyout offer for the Diebold company, at 66% more than the current stock value. Diebold has refused the offer, but United is insisting that the deal will go through in 60 days, which may evolve into a hostile takeover.

Hmmm. Defense contractor attempts a takeover of the major manufacturer of hackable voting machines with the stated plan of closing the deal before the November national elections.

What could their intention possibly be?

Rate It | View Ratings

G.E. Nordell Social Media Pages: Facebook Page       Twitter page url on login Profile not filled in       Linked In Page       Instagram page url on login Profile not filled in

author / philosopher / revolutionary G.E. Nordell lives & works in rural New Mexico

The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines
Jun 262023
 

Hi,

You may be interested in the following sent to CBC today.

About their status quo reporting, failure to make a relevant connection – – IRVING.

/Sandra

Sent: June 26, 2023 10:47 AM
To: thecurrent     @      cbc.ca
Subject: re Child welfare services, New Brunswick and elsewhere in Canada

 

TO:  The Current

Regarding your coverage of our collective failure to create nurturing environments for our children, 2023-06-26.  (Child welfare services, New Brunswick and elsewhere in Canada)

  • A few years ago the same conversation might more likely have been in the context of First Nations kids, the abuses they suffered in dysfunctional communities.

Today, significant advances in the health of (some, not all) First Nations communities have been achieved.  The kids begin to shine.

More data, statistics and studies was the mantra of decades past.  Think of the First Nations.  “Whites” being well paid to study fetal alcohol syndrome on reserves.  Or water quality.  Or sexual abuse of children.  More outside expertise to solve problems.

It seems to me that experience speaks loudly:

  • It is when THE COMMUNITY throws off the chains of belief that “SOMEONE ELSE WILL FIND THE SOLUTIONS FOR US”  that dramatic progress starts to happen.  Progress that is contagious.
  • The CENTRALIZATION OF POWER that comes about through Policy Documents that call for “MORE Provincial money (meaning give responsibility to the Province)”,  “MORE Federal money (meaning give responsibility to the Feds)”,  MORE data, MORE research, MORE documents, when people haven’t time to read the contents of the existing files, is counter-productive.  It ensures that not much will be accomplished, no matter how great the need.

Systems of governance make a difference.  In the debate about the failure of the Child Protection function in New Brunswick there will be no mention of who runs the province and in whose interests.  Come on.  The Lords of the Province are notoriously the  Irvings.   Not only do they own the resources;  they own almost all the media.

I think you’re not a realist if you actually believe that the System of entrenched Corporate Governance in New Brunswick, will suddenly care about the “little girl (7 years old)” who, along with siblings, has been shamelessly abused.  With the awareness of “the System”.

What’s needed is an uprising of Mothers.  Not MORE data and studies that prolong denial and suffering.

Sandra Finley

= = = = = = = = = = = =

RELATED TO “SPEAKING UP” IN NEW BRUNSWICK

Jun 232023
 

I don’t forget Chrystia Freeland’s testimony at the Inquiry into the Invocation of the Emergency Measures Act in Canada.  I found it embarrassing as a Canadian to witness her servile attitude to the Americans.  Quisling #1, dependent on crumbs tossed by the overlords in Washington,  “I come crawling on my knees.”

The corruption of the Canadian Government by the American Military-Industrial-Congressional complex is the same as in the U.S.   Acquaint yourself with the article below.  The threat it poses only continues to grow, simultaneously growing the divides in our societies.   It is so absurd and crooked I have to laugh:  major U.S. newspapers advise people to invest in the “Defense Industry” (meaning the War industry),  in order to make the best dividends.  And guess what?  (the article below) – – that’s what the “defense industry” does!   They fleece tax-payers and pay out GREAT dividends to their shareholders!   Does that qualify as SANE  behavior?

We helped bring more awareness in Canada to the snake in our midst.  Did it help?  . . .take a look at Canada’s debt.  Take a look at the indebtedness of the USA.  Debt is a form of investment.  Invest in killing people?  Yeah that’s what we do.   I don’t think it matters if  you invest in killing people with drugs or with dropping bombs from drones, or convincing young people that it’s a worthy cause to assist war which is ruination so there can be lots more refugees?  Meanwhile we’re “servicing the debt” which means the Banksters make a killing.  And  . . . and.

Tomgram

Hartung and Gledhill, Throwing More Money at the Pentagon

NOTE:   There’s a sampling of William Hartung’s contributions in 2011 to our work, appended at the bottom.   I could not believe my good fortune at the time – – Hartung’s book on Lockheed Martin came out;  I was defending myself in Court.  What a timely gift!   It’s a pleasure to see that Hartung remains in the game!

With thanks to Tom Dispatch; to Julia Gledhill; and gratitude to 

Posted on

Recently, a new word burst into our political world. I’m thinking, of course, of “weaponization.” In response to the charges Special Counsel Jack Smith recently lodged against Donald Trump for misusing and abusing classified documents, Republicans like Ron DeSantis are now talking ominously about the “weaponization” of the Justice Department against the former president and 2024 presidential candidate. House Speaker Kevin McCarthy typically said, “House Republicans will hold this brazen weaponization of power accountable.” And when it comes to “weaponization,” that’s hardly been the end of it either. Another election loser who refused to concede, former Arizona gubernatorial candidate Kari Lake, offered this threatening response to those charges: “If you want to get to President Trump, you are going to have to go through me, and you are going to have to go through 75 million Americans just like me. And I’m going to tell you, most of us are card-carrying members of the N.R.A.”

There is, of course, something distinctly ominous in such language, especially since an estimated one-fifth of American households purchased guns, almost 60 million of them (including staggering numbers of AR-15 semi-automatic rifles), in the pandemic years. But when it comes to the buying of weaponry in a big-time fashion, none of that compares to the record of the Pentagon. To this day, it continues to weaponize our world by sinking staggering numbers of taxpayer dollars into weaponry of every devastating sort (including a possible $2 trillion, in the decades to come, for the “modernizing” of the American nuclear arsenal).

While Republicans may now be “weaponizing” the political scene, the Pentagon’s weaponization story has lasted forever and a day. As TomDispatch regulars and Pentagon experts William Hartung and Julia Gledhill point out, when it comes to major purchases of weaponry (and the “investment” of taxpayer dollars in the giant weapons-making corporations that produce them), there simply is no parallel on earth (or, best guess, anywhere else in the galaxy). After all, more than half of the taxpayer dollars that Congress appropriates every year now goes into what passes for “defense” in this country. More than half of that, according to the latest report from the invaluable Costs of War Project, goes directly to military contractors. And speaking about weaponization, much of that money lands directly in the pockets of the big five weapons-making corporations — Lockheed Martin ($39 billion), Boeing ($23 billion), Raytheon ($20.6 billion), General Dynamics ($16.6 billion), and Northrop Grumman ($14.7 billion).

And worse yet, as Hartung and Gledhill document today, despite congressional freezes or funding cuts in many programs in the debt-ceiling-debate moment, the Pentagon will continue to prove exempt from ceilings of any sort when it comes to the weaponization of our world. Tom

The Ultimate All-American Slush Fund

How A New Budget Loophole Could Send Pentagon Spending Soaring Even Higher

On June 3rd, President Joe Biden signed a bill into law that lifted the government’s debt ceiling and capped some categories of government spending. The big winner was — surprise, surprise! — the Pentagon.

Congress spared military-related programs any cuts while freezing all other categories of discretionary spending at the fiscal year 2023 level (except support for veterans). Indeed, lawmakers set the budget for the Pentagon and for other national security programs like nuclear-related work developing nuclear warheads at the Department of Energy at the level requested in the administration’s Fiscal Year 2024 budget proposal — a 3.3% increase in military spending to a whopping total of $886 billion. Consider that preferential treatment of the first order and, mind you, for the only government agency that’s failed to pass a single financial audit!

Even so, that $886 billion hike in Pentagon and related spending is likely to prove just a floor, not a ceiling, on what will be allocated for “national defense” next year. An analysis of the deal by the Wall Street Journal found that spending on the Pentagon and veterans’ care — neither of which is frozen in the agreement — is likely to pass $1 trillion next year.

Compare that to the $637 billion left for the rest of the government’s discretionary budget. In other words, public health, environmental protection, housing, transportation, and almost everything else the government undertakes will have to make do with not even 45% of the federal government’s discretionary budget, less than what would be needed to keep up with inflation. (Forget addressing unmet needs in this country.)

And count on one thing: national security spending is likely to increase even more, thanks to a huge (if little-noticed) loophole in that budget deal, one that hawks in Congress are already salivating over how best to exploit. Yes, that loophole is easy to miss, given the bureaucratese used to explain it, but its potential impact on soaring military budgets couldn’t be clearer. In its analysis of the budget deal, the Congressional Budget Office noted that “funding designated as an emergency requirement or for overseas contingency operations would not be constrained” by anything the senators and House congressional representatives had agreed to.

As we should have learned from the 20 years of all-American wars in Afghanistan and Iraq, the term “overseas contingency” can be stretched to cover almost anything the Pentagon wants to spend your tax dollars on. In fact, there was even an “Overseas Contingency Operations” (OCO) account supposedly reserved for funding this country’s seemingly never-ending post-9/11 wars. And it certainly was used to fund them, but hundreds of billions of dollars of Pentagon projects that had nothing to do with the conflicts in Iraq or Afghanistan were funded that way as well. The critics of Pentagon overspending quickly dubbed it that department’s “slush fund.”

So, prepare yourself for “Slush Fund II” (coming soon to a theater near you). This time the vehicle for padding the Pentagon budget is likely to be the next military aid package for Ukraine, which will likely be put forward as an emergency bill later this year.  Expect that package to include not only aid to help Ukraine fend off Russia’s ongoing brutal invasion but tens of billions of dollars more to — yes, of course! — pump up the Pentagon’s already bloated budget.

Senator Lindsey Graham (R-SC) made just such a point in talking with reporters shortly after the debt-ceiling deal was passed by Congress. “There will be a day before too long,” he told them, “where we’ll have to deal with the Ukrainian situation. And that will create an opportunity for me and others to fill in the deficiencies that exist from this budget deal.”

Senate Majority Leader Chuck Schumer (D-NY) made a similar point in a statement on the Senate floor during the debate over that deal. “The debt ceiling deal,” he said, “does nothing to limit the Senate’s ability to appropriate emergency/supplemental funds to ensure our military capabilities are sufficient to deter China, Russia, and our other adversaries and respond to ongoing and growing national security threats.”

One potential (and surprising) snag in the future plans of those Pentagon budget boosters in both parties may be the position of House Speaker Kevin McCarthy (R-CA). He has, in fact, described efforts to increase Pentagon spending beyond the level set in the recent budget deal as “part of the problem.” For the moment at least, he openly opposes producing an emergency package to increase the Pentagon budget, saying:

“The last five audits the Department of Defense [have] failed. So there’s a lot of places for reform [where] we can have a lot of savings. We’ve plussed it up. This is the most money we’ve ever spent on defense — this is the most money anyone in the world has ever spent on defense. So I don’t think the first answer is to do a supplemental.”

The Massive Overfunding of the Pentagon

The Department of Defense is, of course, already massively overfunded. That $886 billion figure is among the highest ever — hundreds of billions of dollars more than at the peak of the Korean or Vietnam wars or during the most intensely combative years of the Cold War. It’s higher than the combined military budgets of the next 10 countries combined, most of whom are, in any case, U.S. allies. And it’s estimated to be three times what the Chinese military, the Pentagon’s “pacing threat,” receives annually. Consider it an irony that actually “keeping pace” with China would involve a massive cut in military spending, not an increase in the Pentagon’s bloated budget.

It also should go without saying that preparations to effectively defend the United States and its allies could be achieved for so much less than is currently lavished on the Pentagon.  A new approach could easily save significantly more than $100 billion in fiscal year 2024, as proposed by Representatives Barbara Lee (D-CA) and Mark Pocan (D-WI) in the People Over Pentagon Act, the preeminent budget-cut proposal in Congress. An illustrative report released by the Congressional Budget Office (CBO) in late 2021 sketched out three scenarios, all involving a less interventionist, more restrained approach to defense that would include greater reliance on allies. Each option would reduce America’s 1.3-million-strong active military force (by up to one-fifth in one scenario). Total savings from the CBO’s proposed changes would, over a decade, be $1 trillion.

And a more comprehensive approach that shifted away from the current “cover the globe” strategy of being able to fight (though, as the history of this century shows, not always win) wars virtually anywhere on Earth on short notice — without allies, if necessary — could save hundreds of billions more over the next decade. Cutting bureaucracy and making other changes in defense policy could also yield yet more savings. To cite just two examples, reducing the Pentagon’s cohort of more than half-a-million private contract employees and scaling back its nuclear weapons “modernization” program would save significantly more than $300 billion extra over a decade.

But none of this is even remotely likely without concerted public pressure to, as a start, keep members of Congress from adding tens of billions of dollars in spending on parochial military projects that channel funding into their states or districts. And it would also mean pushing back against the propaganda of Pentagon contractors who claim they need ever more money to provide adequate tools to defend the country.

Contractors Crying Wolf

While demanding ever more of our tax dollars, the giant military-industrial corporations are spending all too much of their time simply stuffing the pockets of their shareholders rather than investing in the tools needed to actually defend this country. A recent Department of Defense report found that, from 2010-2019, such companies increased by 73% over the previous decade what they paid their shareholders. Meanwhile, their investment in research, development, and capital assets declined significantly. Still, such corporations claim that, without further Pentagon funding, they can’t afford to invest enough in their businesses to meet future national security challenges, which include ramping up weapons production to provide arms for Ukraine.

In reality, however, the financial data suggests that they simply chose to reward their shareholders over everything and everyone else, even as they experienced steadily improving profit margins and cash generation. In fact, the report pointed out that those companies “generate substantial amounts of cash beyond their needs for operations or capital investment.” So instead of investing further in their businesses, they choose to eat their “seed corn” by prioritizing short-term gains over long-term investments and by “investing” additional profits in their shareholders. And when you eat your seed corn, you have nothing left to plant next year.

Never fear, though, since Congress seems eternally prepared to bail them out. Their businesses, in fact, continue to thrive because Congress authorizes funding for the Pentagon to repeatedly grant them massive contracts, no matter their performance or lack of internal investment. No other industry could get away with such maximalist thinking.

Military contractors outperform similarly sized companies in non-defense industries in eight out of nine key financial metrics — including higher total returns to shareholders (a category where they leave much of the rest of the S&P 500 in the dust). They financially outshine their commercial counterparts for two obvious reasons: first, the government subsidizes so many of their costs; second, the weapons industry is so concentrated that its major firms have little or no competition.

Adding insult to injury, contractors are overcharging the government for the basic weaponry they produce while they rake in cash to enrich their shareholders. In the past 15 years, the Pentagon’s internal watchdog has exposed price gouging by contractors ranging from Boeing and Lockheed Martin to lesser-known companies like TransDigm Group. In 2011, Boeing made about $13 million in excess profits by overcharging the Army for 18 spare parts used in Apache and Chinook helicopters. To put that in perspective, the Army paid $1,678.61 each for a tiny helicopter part that the Pentagon already had in stock at its own warehouse for only $7.71.

The Pentagon found Lockheed Martin and Boeing price gouging together in 2015. They overcharged the military by “hundreds of millions of dollars” for missiles. TransDigm similarly made $16 million by overcharging for spare parts between 2015 and 2017 and even more in the following two years, generating nearly $21 million in excess profits. If you can believe it, there is no legal requirement for such companies to refund the government if they’re exposed for price gouging.

Of course, there’s nothing new about such corporate price gouging, nor is it unique to the arms industry. But it’s especially egregious there, given how heavily the major military contractors depend on the government’s business. Lockheed Martin, the biggest of them, got a staggering 73% of its $66 billion in net sales from the government in 2022. Boeing, which does far more commercial business, still generated 40% of its revenue from the government that year. (Down from 51% in 2020.)

Despite their reliance on government contracts, companies like Boeing seem to be doubling down on practices that often lead to price gouging. According to Bloomberg News, between 2020 and 2021, Boeing refused to provide the Pentagon with certified cost and pricing data for nearly 11,000 spare parts on a single Air Force contract. Senator Elizabeth Warren (D-MA) and Representative John Garamendi (D-CA) have demanded that the Pentagon investigate since, without such information, the department will continue to be hard-pressed to ensure that it’s paying anything like a fair price, whatever its purchases.

Curbing the Special Interest Politics of “Defense”

Reining in rip-offs and corruption on the part of weapons contractors large and small could save the American taxpayer untold billions of dollars. And curbing special-interest politics on the part of the denizens of the military-industrial-congressional complex (MICC) could help open the way towards the development of a truly defensive global military strategy rather than the current interventionist approach that has embroiled the United States in the devastating and counterproductive wars of this century.

One modest step towards reining in the power of the arms lobby would be to revamp the campaign finance system by providing federal matching funds, thereby diluting the influential nature of the tens of millions in campaign contributions the arms industry makes every election cycle. In addition, prohibiting retiring top military officers from going to work for arms-making companies — or, at least, extending the cooling off period to at least four years before they can do so, as proposed by Senator Warren — would also help reduce the undue influence exerted by the MICC.

Last but not least, steps could be taken to prevent the military services from giving Congress their annual wish lists — officially known as “unfunded priorities lists” — of items they want added to the Pentagon budget. After all, those are but another tool allowing members of Congress to add billions more than what the Pentagon has even asked for to that department’s budget.

Whether such reforms alone, if adopted, would be enough to truly roll back excess Pentagon spending remains to be seen. Without them, however, count on one thing: the department’s budget will almost certainly continue to soar, undoubtedly reaching $1 trillion or more annually within just the next few years.  Americans can’t afford to let that happen.

Follow TomDispatch on Twitter and join us on Facebook. Check out the newest Dispatch Books, John Feffer’s new dystopian novel, Songlands (the final one in his Splinterlands series), Beverly Gologorsky’s novel Every Body Has a Story, and Tom Engelhardt’s A Nation Unmade by War, as well as Alfred McCoy’s In the Shadows of the American Century: The Rise and Decline of U.S. Global Power, John Dower’s The Violent American Century: War and Terror Since World War II, and Ann Jones’s They Were Soldiers: How the Wounded Return from America’s Wars: The Untold Story.

= = = =  = = = = = = =  =

RELATED,  from 2011, a sample of postings related to Hartung.  I was defending myself in Court at the time.

2011-03-10 Myths for Profit: Canada’s Role In Industries of War and Peace’ + “From Military-Industrial Complex to Permanent War State” + from William Hartung “Prophets of War: Lockheed Martin and the Making of the Military Industrial Complex.

2011-01-15 Census: Important interview with Hartung, author of “Prophets of War: Lockheed Martin and the Making of the Military-Industrial Complex”

2011-01-12 New book “Prophets of War: Lockheed Martin and the Making of the Military-Industrial Complex” by William Hartung. Timely – Judge’s decision due tomorrow!

2011-01-20 Amy Goodman (“Democracy Now”), Footage of President Dwight Eisenhower on the dangers of the military-industrial complex, followed by an interview with William Hartung.

2011-01-11 (U.S. Torture) Lockheed Martin’s role, supplying Contract Interrogators through subsidiary Sytex. From Hartung, Prophets of War.

Jun 092023
 

(Minor edits have been made)

SENT TO AN ORGANIZATION:

Your Call to Action uses data for accessing the backend of my blog.   There is only one way you could have that data on your data base.   It came to you from Facebook.

By using  the Facebook portal, you have identified to me that F/B has appropriated my username for gaining entry to the backend of my blog.  It is the ONLY place where I use this particular username.  I am flabbergasted that you have it.

I stopped using F/B and Twitter some time ago.  Speaking frankly, I am appalled by your trust of F/B.

I refer you to https://sandrafinley.ca/blog/?p=27731   – – Maria Ressa’s excellent book, How To Stand Up to a Dictator.

The book includes Ressa’s personal story about Zuckerberg and Facebook.  Collaboration with them may be convenient; it comes with very high costs to democracy.

Ressa has been awarded a Nobel prize for her work.  I suggest you read How To Stand Up to a Dictator.

Jun 012023
 

April 8 – 14, 2023  |  No. 444

Opinion

Jo Dyer
The political persecution of Julian Assange

Even as Stephen Smith paid a concerned visit to Julian Assange in Belmarsh prison this week, the new high commissioner to Britain said firmly that Australia was not “lobbying for a particular outcome”. Concerned Australians might ask, “Why the hell not?”

Assange is now entering his fifth year of incarceration in London, and Labor’s bland mantra, “It is time for this matter to be brought to a conclusion”, is wearing thin. Greens senator David Shoebridge late last month asked Foreign Affairs Minister Penny Wong point blank if the prime minister had used the March 14 AUKUS meeting to push for Assange’s release. Wong retreated behind the tired excuse of timid governments, citing ongoing legal processes in which executive governments can’t interfere. The Albanese government’s lack of interference is striking. Despite the prime minister’s assertions that “enough is enough”, former independent senator Rex Patrick’s freedom of information requests reveal that no official correspondence relating to the WikiLeaks founder has been exchanged between the Department of Foreign Affairs and Trade and the Australian embassy in Washington.

Assange is involved in “very many legal processes”, Wong has said, and “we are not able to alter the judicial processes of another country”. But no need to worry – in all the relevant countries, she assures us, “the rule of law applies”.

The supposedly sacrosanct rule of law in these “very many legal processes” warrants further investigation. While Wong may be confident about the rule of law in the relevant countries, meticulous research in award-winning Italian investigative journalist Stefania Maurizi’s Secret Power: WikiLeaks and its Enemies and former United Nations special rapporteur against torture Nils Melzer’s The Trial of Julian Assange: A Story of Persecution suggests that the rule of law in Sweden, Ecuador, Britain and the United States has been contorted to meet the political agendas of these countries’ authorities in relation to Assange: an unwavering commitment to assist the US in prosecuting him for the crime of journalism. At every stage of these “many legal processes”, perplexing decisions have been taken.

First, it is worth noting the singular success of Assange’s enemies in making the story all about him. Rather than the war crimes of major powers and the impunity with which they commit them, it is allegations about Assange’s sexual behaviour that have attracted headlines. The media has alternated between outraged insistence that WikiLeaks’ disclosures recklessly endangered the lives of the innocent, and distasteful reporting on Assange’s personal hygiene. Within a few months of WikiLeaks’ release in 2010 of Collateral Murder, footage taken from a US Apache helicopter of an attack on civilians in Baghdad leaked by US soldier Chelsea Manning, Assange was being transformed from a courageous if eccentric anti-authoritarian freedom fighter, to a capricious, shifty, potential rapist on the run.

For more than a decade, carefully cultivated narratives have been determining his fate.

“The persecution of Julian Assange is and always has been political, the law just a tool to enact it. The US government pressed their spurious charges against Assange to exact revenge on him for revealing their darkest secrets, and as a lesson to anyone else inclined to do the same.”

Assange’s legal peril begins with a Swedish investigation into accusations of rape and sexual misconduct, proceeded against the wishes of the alleged victims. Two young women who had sex with Assange when he visited Stockholm sought advice from the police on August 20, 2010, on how to require him to take an HIV test after disputes about condom use left them anxious about STDs. Before their initial interviews were completed, an arrest warrant was issued for Assange for raping one of them and molesting the other. The issuing of the warrant was immediately leaked to the press, where Assange first learnt of it. It was soon revoked. Sweden’s chief prosecutor closed the rape investigation as soon as she’d read the police reports summarising the women’s statements.

The reopening of the investigation into rape days later is the first of many oddities in Sweden’s legal response. The European arrest warrant (EAW) that became the basis for the Swedish extradition process was issued while the investigation was still at a preliminary stage. And Sweden simultaneously activated Interpol, which issued a red notice for Assange’s arrest even though charges had not been laid.

Assange swiftly grew suspicious of these anomalies and sought assurances that he would not be extradited to the US if he returned for questioning. Swedish authorities would provide no guarantees. They also repeatedly refused to interview him remotely by video conference or onsite in London under applicable European mutual legal assistance agreements. As Melzer notes, this dual refusal enabled Sweden to maintain an artificial impasse over the next six years.

The British Commonwealth Prosecution Service has a role in this stalemate. The CPS, which was then headed by the current Labour Party leader Keir Starmer, advised the Swedish Prosecution Authority as early as January 2011 that Assange’s case was “not … being dealt with as just another extradition request”. It was CPS’s advice that “it would not be prudent” for Swedish authorities to interview Assange in Britain, and the organisation displayed throughout an unusual and inordinate interest in how the Swedish authorities chose to handle a Swedish case that involved no British nationals.

The British judge assigned to the Swedish extradition case is married to a Conservative lord and former chairman of the Defence select committee responsible for overseeing the British military, with ties to organisations and individuals exposed by WikiLeaks. Justice Emma Arbuthnot quickly affirmed Assange’s extradition to Sweden despite the EAW having been issued by a prosecutor rather than the required “judicial authority”.

When Assange sought asylum in the Ecuadorian embassy, British officials responded with fury. Then foreign secretary William Hague threatened to storm the embassy to seize Assange, writing to the Ecuadorians, “We very much hope not to get to this point.” The response from his counterpart, Ricardo Patiño, was unequivocal: “The colonial times are over.” Retreating from an unprecedented violation of diplomatic immunity, the British instead began a siege of the embassy, surrounding it with Metropolitan Police officers who kept a close and expensive eye on outgoing cars and bulging bags.

Money was no object, the CPS explained to the Swedes when, as years elapsed, they floated revoking the EAW. Later the CPS would misrepresent the extent of their interaction with the Swedes and unlawfully destroy their correspondence.

Despite the challenges of the modest embassy suddenly having a permanent, high-profile and extremely controversial house guest, Ecuador officials managed Assange’s stay well for the first five years. A change in government in May 2017 was Assange’s undoing. The new president, Lenín Moreno, made rapprochement with the US a primary aim, and he was instructed in an open letter from US congress to “first resolve a significant challenge created by your predecessor, Rafael Correa – the status of Julian Assange”.

Moreno moved to resolve it quickly. After isolating Assange within the embassy by depriving him of internet usage and severely restricting his visitors, a “special protocol” was developed to govern the rules of his asylum, a document of such complexity that it was nigh impossible to avoid transgressing.

Without any due process under any rule of law – no right to be heard, no right to legal counsel, no right to appeal to a judicial body – the Ecuadorian ambassador informed Assange on the morning of April 11, 2019, that his citizenship and asylum had been revoked and he was to leave within the hour. British police dragged him out in handcuffs and the US submitted an arrest warrant on the same day.

Three months prior to this, the embassy had confiscated Assange’s shaving kit, leaving him looking wild and unkempt for his perp walk. A more consequential humiliation was the illegal surveillance to which he was permanently subjected, first by the Spanish private security company employed by the embassy, UC Global – whose alleged spying on Assange spawned a criminal case in Spain and a civil suit in the US – and then by an Ecuadorian security company, Promsecurity, who allegedly recorded his meetings with lawyers and photographed the documents they brought with them.

From a legal perspective, Melzer notes that the permanent surveillance of Assange’s conversations with his lawyers and doctors renders any proceedings based on information gathered in this manner arbitrary. “If UC Global co-operated with an American intelligence service, this would fatally affect not only the Anglo-American extradition proceedings, but also the espionage charges of the US Department of Justice on which the extradition request is based,” he writes. The trial of Daniel Ellsberg failed because his psychiatrist’s records were stolen by investigators. How much more egregious is the behaviour of the Americans and Ecuadorians here?

Convicted of no crime, Assange is now approaching the fourth anniversary of his incarceration in Belmarsh, “England’s Guantanamo”. He’s often held in solitary confinement, ostensibly for health reasons, but where his health suffers terribly. His computer and the internet are withheld so he can’t liaise appropriately with lawyers. He wasn’t allowed out for the birth of his child or the funeral of his close friend. He remained locked up throughout the pandemic and following a stroke. Doctors say the conditions are killing him.

 

Wading through the details of Assange’s persecution can leave one feeling like an unhinged conspiracy theorist. What was it with the paralysis of the Swedish investigation? Why didn’t the British courts deal with an obvious perception of bias in Justice Arbuthnot? Was UC Global really spying for the CIA without Ecuadorian knowledge and, if so, why did the ubiquitous surveillance continue under their new team? What value should we give the Americans’ carefully qualified assurance they won’t subject Assange to “special administrative measures”?

Dismissed at the time as narcissistic paranoia, many of Assange’s fears have proved founded. The vast array of legal anomalies, oddities and outrages perpetrated by democratic governments in their pursuit of one man is jaw-dropping, leaving us to conclude that these four countries conspired to deliver Julian Assange to the Americans, with Australia a sometimes meek, sometimes gleeful, but generally disinterested bystander.

The persecution of Julian Assange has always been political, and the law just a tool to enact it. The US government pressed their spurious charges against Assange to exact revenge on him for revealing their darkest secrets, and as a lesson to anyone else inclined to do the same. It was former US secretary of state and CIA director Mike Pompeo who decided to aggressively pursue the case against Assange; President Joe Biden must drop it.

The US seeks to keep from the public the way they really play their politics, and fight their wars, and we have recently upended our foreign policy to throw our lot in with them. We’ve committed to paying incomprehensibly large sums to buy their submarines to bolster their own military strategy. They owe us and now is the time to call in the favour.  Assange needs to be released immediately, through negotiation by an Albanese administration currently in possession of a lot of political capital.

Let him come quietly home. The Australian people are sickened at the extended maltreatment of a man of courage, who is dying in jail for the crime of promoting transparency, accountability and truth.

This article was first published in the print edition of The Saturday Paper on April 8, 2023 as “The Assange outrages”.

Thanks for reading this free article.

For almost a decade, The Saturday Paper has published Australia’s leading writers and thinkers. We have pursued stories that are ignored elsewhere, covering them with sensitivity and depth. We have done this on refugee policy, on government integrity, on robo-debt, on aged care, on climate change, on the pandemic.

All our journalism is fiercely independent. It relies on the support of readers. By subscribing to The Saturday Paper, you are ensuring that we can continue to produce essential, issue-defining coverage, to dig out stories that take time, to doggedly hold to account politicians and the political class.

There are very few titles that have the freedom and the space to produce journalism like this. In a country with a concentration of media ownership unlike anything else in the world, it is vitally important.

 

Jun 012023
 
The Pentagon, the U.S. military headquarters in Washington, is being asked to fund civilian projects to build more reliable supply chains of critical minerals that are vital in everything from products like electronics, cars and batteries, to weapons. Canadian companies are entitled to apply. (Jason Reed/Reuters)

The United States military has been quietly soliciting applications for Canadian mining projects that want American public funding through a major national security initiative.

It’s part of an increasingly urgent priority of the U.S. government: lessening dependence on China for critical minerals that are vital in everything from civilian goods such as electronics, cars and batteries, to weapons.

It illustrates how Canadian mining is becoming the nexus of a colossal geopolitical struggle. Ottawa just pushed Chinese state-owned companies out of the sector, and the U.S. is now considering moving public funding in.

The American military has a new pot of money at its disposal to help private companies inaugurate new mining projects; it’s for funding feasibility studies, plant renovations, battery-recycling and worker training.

President Joe Biden invoked the 1950 Defense Production Act to expand the domestic mining sector, and the military received hundreds of millions of dollars to implement it.

This whirlwind of activity was prompted by a White House study last year warning that dependence on certain foreign-made products represents a national security risk to the U.S., and it cited semiconductors, batteries, medicines and 53 types of minerals.

U.S. President Joe Biden, shown speaking at a virtual roundtable in Washington in February, invoked the U.S. Defense Production Act in March to fund critical minerals projects needed for such technologies as electric vehicles. (Kevin Lamarque/Reuters)

An official from the U.S. Department of Defence this week provided a briefing on the program at a cross-border conference, and he made one thing clear about the funding: Canadians qualify.

That’s because Canada has, for decades, belonged to the U.S. military industrial base and is every bit as entitled to the cash as American mining projects.

“It’s really quite simple. It’s a matter of law,” said Matthew Zolnowski, a portfolio manager for the Defense Production Act program, speaking to a gathering of the Canada-United States Law Institute in Washington, D.C.

“So an investment in Alberta or Quebec or Nova Scotia would be no different than if it was in Nebraska or anywhere else in the United States. As a matter of law.”

Canadian government provides list of 70 projects

Zolnowski said the U.S. is actively reaching out to companies to explain the process, as many have no relationship with the U.S. government and might not realize how it works.

“We are actively engaging those firms,” he said, describing a flurry of recent activity by quoting an old movie line: “It’s a duck on a pond. It looks quiet on the surface, but there’s a lot happening.”

The Canadian government has been active, too. Canadian officials say they’ve already provided the U.S. with a list of 70 projects that could warrant U.S. funding.

Both countries describe this as a generational initiative still in its early stages: Canada, for now, is still a bit player in producing these minerals, which include lithium, cobalt and manganese.


But one Canadian official said this can change. Jeff Labonté, assistant deputy minister at Natural Resources Canada, told the conference that Western democracies are now engaged in industrial policy in a way they haven’t been for decades.

“We have this resource potential…. We also have a huge capacity,” he said, touting 200 mines and 10,000 potential products in the exploration phase.

“We have a skill set in this area. We have capital markets, we have engineering expertise, we have companies that operate around the country and around the world.”

Canada is also providing billions of dollars in public funds to the sector over the coming years through federal and provincial programs.

If it opens on time next March, the mine in La Corne, Que., will be one of the only functional lithium mines in North America. Electric vehicles are hugely reliant on minerals like lithium. (Sayona Québec )

What’s driving this sudden minerals rush?

The transition to electric cars is a key driver of this challenge. They’re hugely reliant on minerals like lithium, and current production is not close to meeting projected demands.

Making matters more complicated is China’s dominance of the market; it controls two-thirds of the world’s lithium processing capacity, for example.

Beijing has already revealed a willingness to cut off rivals from mineral exports, as it did a few years ago amid a fishing dispute with Japan.

The U.S. has, more recently, suspended semiconductor exports to China in an emerging digital cold war in which Canada is increasingly involved.

A worker in Inner Mongolia stokes pots of lanthanum in 2010, the year China cut off exports to Japan in a dispute over sea access. China dominates the critical minerals sector. (David Gray/Reuters)

In his talk, Zolnowski said countries spent decades leaving themselves in this vulnerable position; resolving it won’t happen overnight.

He said the U.S. government has a four-part strategy for this.

Part 1 is to stimulate domestic demand for these goods by designing new sustainability initiatives around these materials.

Part 2 is stimulating supply by funding new production and recycling, while Part 3 is building stockpiles. The final component involves working with allies.

Zolnowski noted that back in 1984, Robert Gates, at the time a U.S. intelligence official who went on to become secretary of defence to two presidents, articulated his fear in a speech that foreign government-funded companies would come to dominate the industry.

This worries the Pentagon for security reasons, both economic and military. Zolnowski called these minerals the building blocks of a thriving economy.

Two men talking
Prime Minister Justin Trudeau, left, speaks with a worker during a tour of Motrec International, a heavy-duty electric vehicle production facility in Sherbrooke, Que., in July. (Graham Hughes/The Canadian Press)

And in times of war, he said, industrialized nations that lack secure and reliable access to these materials have suffered mightily: “[They] have suffered significant performance tradeoffs, which contributed to their defeat.”

He said civilian goods will dominate the market, as well as receiving the lion’s share of Pentagon funding. Indeed, the language of the Defense Production Act stipulates that funds can be used for non-military purposes, including the U.S.’s general economic well-being.

Pentagon’s main role: Building market confidence?

Zolnowski said the U.S. is looking primarily at offering grants, not loans, and it’s willing to fund projects at various phases of implementation, as it views this as a long-term project.

One partner at an investment firm present at the conference said the Pentagon’s role is not to become a major investor.

What the private sector wants, he said, is help with confidence-building: Once you demonstrate that a project has the Pentagon’s imprimatur, he said, it’s easier to reassure investors this is a safe bet.

One attendee said there are still flaws to iron out in the program design of Canada’s own critical minerals strategy, including its 30 per cent tax credit.

Jonathan Garbutt, a Calgary-based tax lawyer, cited industry estimates that lithium extracts from brine deposits in Western Canada could produce hundreds of thousands of tonnes per year, but, under the current language of the Income Tax Act, the credit wouldn’t apply to those extracts.

Another speaker at the conference noted that this new conversation about cross-border co-operation carries historical echoes.

Franklin D. Roosevelt, second from left, Winston Churchill and William Lyon Mackenzie King — leaders of the United States, Britain and Canada, respectively — are shown at the Quebec Conference in September 1944. Back then, Canada-U.S. military co-operation was built around aluminum. (The Canadian Press)

International trade lawyer Lawrence Herman, who is based in Toronto, noted that the precursor to the countries’ current military-industrial partnership was a 1940 agreement between the U.S. and Canadian leaders.

Back then, American funding discreetly helped turn Quebec aluminum into a global powerhouse.

Since then, Quebec aluminum has had mostly civilian uses. It also helped the U.S. build its arsenal for the Second World War.

Canada was heavily involved enough in that effort that Quebec became the site of the wartime allied leaders’ conference.

ABOUT THE AUTHOR

Alexander Panetta is a Washington-based correspondent for CBC News who has covered American politics and Canada-U.S. issues since 2013. He previously worked in Ottawa, Quebec City and internationally, reporting on politics, conflict, disaster and the Montreal Expos.

May 312023
 

You may wish to sign up for CRYPTO-GRAM from Bruce Schneier? (copy of recent one below)

Bruce Schneier is an internationally renowned security technologist, called a security guru by the Economist. He is the author of over one dozen books — including his latest, A Hacker’s Mind — as well as hundreds of articles, essays, and academic papers. His newsletter and blog are read by over 250,000 people. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.

“Schneier” entered into the search button on my blog:  first reference:

2011-09-03 Election fraud in the U.S., “Murder, Spies & Voting Lies”.  E-voting in Canada.

 

 

God bless Bruce Schneier for his longtime dedication to public education and activism.  I see that I haven’t really told him how much I appreciate and have used his contributions.   2016-04-02 Sent to Bruce Schneier, thwarting activists by intrusion into WordPress.

 

A monthly newsletter about cybersecurity and related topics.

Crypto-Gram
April 15, 2023

by Bruce Schneier
Fellow and Lecturer, Harvard Kennedy School
schneier@schneier.com
https://www.schneier.com

A free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise.

For back issues, or to subscribe, visit Crypto-Gram’s web page.

Read this issue on the web

These same essays and news items appear in the Schneier on Security blog, along with a lively and intelligent comment section. An RSS feed is available.

** *** ***** ******* *********** *************

In this issue:

If these links don’t work in your email client, try reading this issue of Crypto-Gram on the web.

  1. NetWire Remote Access Trojan Maker Arrested
  2. How AI Could Write Our Laws
  3. Upcoming Speaking Engagements
  4. US Citizen Hacked by Spyware
  5. ChatGPT Privacy Flaw
  6. Mass Ransomware Attack
  7. Exploding USB Sticks
  8. A Hacker’s Mind News
  9. Hacks at Pwn2Own Vancouver 2023
  10. Security Vulnerabilities in Snipping Tools
  11. The Security Vulnerabilities of Message Interoperability
  12. Russian Cyberwarfare Documents Leaked
  13. UK Runs Fake DDoS-for-Hire Sites
  14. North Korea Hacking Cryptocurrency Sites with 3CX Exploit
  15. FBI (and Others) Shut Down Genesis Market
  16. Research on AI in Adversarial Settings
  17. LLMs and Phishing
  18. Car Thieves Hacking the CAN Bus
  19. FBI Advising People to Avoid Public Charging Stations
  20. Bypassing a Theft Threat Model
  21. Gaining an Advantage in Roulette
  22. Hacking Suicide
  23. Upcoming Speaking Engagements

** *** ***** ******* *********** *************

NetWire Remote Access Trojan Maker Arrested

[2023.03.14] From Brian Krebs:

A Croatian national has been arrested for allegedly operating NetWire, a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as a stealthy way to spy on infected systems and siphon passwords. The arrest coincided with a seizure of the NetWire sales website by the U.S. Federal Bureau of Investigation (FBI). While the defendant in this case hasn’t yet been named publicly, the NetWire website has been leaking information about the likely true identity and location of its owner for the past 11 years.

The article details the mistakes that led to the person’s address.

** *** ***** ******* *********** *************

How AI Could Write Our Laws

[2023.03.14] Nearly 90% of the multibillion-dollar federal lobbying apparatus in the United States serves corporate interests. In some cases, the objective of that money is obvious. Google pours millions into lobbying on bills related to antitrust regulation. Big energy companies expect action whenever there is a move to end drilling leases for federal lands, in exchange for the tens of millions they contribute to congressional reelection campaigns.

But lobbying strategies are not always so blunt, and the interests involved are not always so obvious. Consider, for example, a 2013 Massachusetts bill that tried to restrict the commercial use of data collected from K-12 students using services accessed via the internet. The bill appealed to many privacy-conscious education advocates, and appropriately so. But behind the justification of protecting students lay a market-altering policy: the bill was introduced at the behest of Microsoft lobbyists, in an effort to exclude Google Docs from classrooms.

What would happen if such legal-but-sneaky strategies for tilting the rules in favor of one group over another become more widespread and effective? We can see hints of an answer in the remarkable pace at which artificial-intelligence tools for everything from writing to graphic design are being developed and improved. And the unavoidable conclusion is that AI will make lobbying more guileful, and perhaps more successful.

It turns out there is a natural opening for this technology: microlegislation.

“Microlegislation” is a term for small pieces of proposed law that cater — sometimes unexpectedly — to narrow interests. Political scientist Amy McKay coined the term. She studied the 564 amendments to the Affordable Care Act (“Obamacare”) considered by the Senate Finance Committee in 2009, as well as the positions of 866 lobbying groups and their campaign contributions. She documented instances where lobbyist comments — on health-care research, vaccine services, and other provisions — were translated directly into microlegislation in the form of amendments. And she found that those groups’ financial contributions to specific senators on the committee increased the amendments’ chances of passing.

Her finding that lobbying works was no surprise. More important, McKay’s work demonstrated that computer models can predict the likely fate of proposed legislative amendments, as well as the paths by which lobbyists can most effectively secure their desired outcomes. And that turns out to be a critical piece of creating an AI lobbyist.

Lobbying has long been part of the give-and-take among human policymakers and advocates working to balance their competing interests. The danger of microlegislation — a danger greatly exacerbated by AI — is that it can be used in a way that makes it difficult to figure out who the legislation truly benefits.

Another word for a strategy like this is a “hack.” Hacks follow the rules of a system but subvert their intent. Hacking is often associated with computer systems, but the concept is also applicable to social systems like financial markets, tax codes, and legislative processes.

While the idea of monied interests incorporating AI assistive technologies into their lobbying remains hypothetical, specific machine-learning technologies exist today that would enable them to do so. We should expect these techniques to get better and their utilization to grow, just as we’ve seen in so many other domains.

Here’s how it might work.

Crafting an AI microlegislator

To make microlegislation, machine-learning systems must be able to uncover the smallest modification that could be made to a bill or existing law that would make the biggest impact on a narrow interest.

There are three basic challenges involved. First, you must create a policy proposal — small suggested changes to legal text — and anticipate whether or not a human reader would recognize the alteration as substantive. This is important; a change that isn’t detectable is more likely to pass without controversy. Second, you need to do an impact assessment to project the implications of that change for the short- or long-range financial interests of companies. Third, you need a lobbying strategizer to identify what levers of power to pull to get the best proposal into law.

Existing AI tools can tackle all three of these.

The first step, the policy proposal, leverages the core function of generative AI. Large language models, the sort that have been used for general-purpose chatbots such as ChatGPT, can easily be adapted to write like a native in different specialized domains after seeing a relatively small number of examples. This process is called fine-tuning. For example, a model “pre-trained” on a large library of generic text samples from books and the internet can be “fine-tuned” to work effectively on medical literature, computer science papers, and product reviews.

Given this flexibility and capacity for adaptation, a large language model could be fine-tuned to produce draft legislative texts, given a data set of previously offered amendments and the bills they were associated with. Training data is available. At the federal level, it’s provided by the US Government Publishing Office, and there are already tools for downloading and interacting with it. Most other jurisdictions provide similar data feeds, and there are even convenient assemblages of that data.

Meanwhile, large language models like the one underlying ChatGPT are routinely used for summarizing long, complex documents (even laws and computer code) to capture the essential points, and they are optimized to match human expectations. This capability could allow an AI assistant to automatically predict how detectable the true effect of a policy insertion may be to a human reader.

Today, it can take a highly paid team of human lobbyists days or weeks to generate and analyze alternative pieces of microlegislation on behalf of a client. With AI assistance, that could be done instantaneously and cheaply. This opens the door to dramatic increases in the scope of this kind of microlegislating, with a potential to scale across any number of bills in any jurisdiction.

Teaching machines to assess impact

Impact assessment is more complicated. There is a rich series of methods for quantifying the predicted outcome of a decision or policy, and then also optimizing the return under that model. This kind of approach goes by different names in different circles — mathematical programming in management science, utility maximization in economics, and rational design in the life sciences.

To train an AI to do this, we would need to specify some way to calculate the benefit to different parties as a result of a policy choice. That could mean estimating the financial return to different companies under a few different scenarios of taxation or regulation. Economists are skilled at building risk models like this, and companies are already required to formulate and disclose regulatory compliance risk factors to investors. Such a mathematical model could translate directly into a reward function, a grading system that could provide feedback for the model used to create policy proposals and direct the process of training it.

The real challenge in impact assessment for generative AI models would be to parse the textual output of a model like ChatGPT in terms that an economic model could readily use. Automating this would require extracting structured financial information from the draft amendment or any legalese surrounding it. This kind of information extraction, too, is an area where AI has a long history; for example, AI systems have been trained to recognize clinical details in doctors’ notes. Early indications are that large language models are fairly good at recognizing financial information in texts such as investor call transcripts. While it remains an open challenge in the field, they may even be capable of writing out multi-step plans based on descriptions in free text.

Machines as strategists

The last piece of the puzzle is a lobbying strategizer to figure out what actions to take to convince lawmakers to adopt the amendment.

Passing legislation requires a keen understanding of the complex interrelated networks of legislative offices, outside groups, executive agencies, and other stakeholders vying to serve their own interests. Each actor in this network has a baseline perspective and different factors that influence that point of view. For example, a legislator may be moved by seeing an allied stakeholder take a firm position, or by a negative news story, or by a campaign contribution.

It turns out that AI developers are very experienced at modeling these kinds of networks. Machine-learning models for network graphs have been built, refined, improved, and iterated by hundreds of researchers working on incredibly diverse problems: lidar scans used to guide self-driving cars, the chemical functions of molecular structures, the capture of motion in actors’ joints for computer graphics, behaviors in social networks, and more.

In the context of AI-assisted lobbying, political actors like legislators and lobbyists are nodes on a graph, just like users in a social network. Relations between them are graph edges, like social connections. Information can be passed along those edges, like messages sent to a friend or campaign contributions made to a member. AI models can use past examples to learn to estimate how that information changes the network. Calculating the likelihood that a campaign contribution of a given size will flip a legislator’s vote on an amendment is one application.

McKay’s work has already shown us that there are significant, predictable relationships between these actions and the outcomes of legislation, and that the work of discovering those can be automated. Others have shown that graphs of neural network models like those described above can be applied to political systems. The full-scale use of these technologies to guide lobbying strategy is theoretical, but plausible.

Put together, these three components could create an automatic system for generating profitable microlegislation. The policy proposal system would create millions, even billions, of possible amendments. The impact assessor would identify the few that promise to be most profitable to the client. And the lobbying strategy tool would produce a blueprint for getting them passed.

What remains is for human lobbyists to walk the floors of the Capitol or state house, and perhaps supply some cash to grease the wheels. These final two aspects of lobbying — access and financing — cannot be supplied by the AI tools we envision. This suggests that lobbying will continue to primarily benefit those who are already influential and wealthy, and AI assistance will amplify their existing advantages.

The transformative benefit that AI offers to lobbyists and their clients is scale. While individual lobbyists tend to focus on the federal level or a single state, with AI assistance they could more easily infiltrate a large number of state-level (or even local-level) law-making bodies and elections. At that level, where the average cost of a seat is measured in the tens of thousands of dollars instead of millions, a single donor can wield a lot of influence — if automation makes it possible to coordinate lobbying across districts.

How to stop them

When it comes to combating the potentially adverse effects of assistive AI, the first response always seems to be to try to detect whether or not content was AI-generated. We could imagine a defensive AI that detects anomalous lobbyist spending associated with amendments that benefit the contributing group. But by then, the damage might already be done.

In general, methods for detecting the work of AI tend not to keep pace with its ability to generate convincing content. And these strategies won’t be implemented by AIs alone. The lobbyists will still be humans who take the results of an AI microlegislator and further refine the computer’s strategies. These hybrid human-AI systems will not be detectable from their output.

But the good news is: the same strategies that have long been used to combat misbehavior by human lobbyists can still be effective when those lobbyists get an AI assist. We don’t need to reinvent our democracy to stave off the worst risks of AI; we just need to more fully implement long-standing ideals.

First, we should reduce the dependence of legislatures on monolithic, multi-thousand-page omnibus bills voted on under deadline. This style of legislating exploded in the 1980s and 1990s and continues through to the most recent federal budget bill. Notwithstanding their legitimate benefits to the political system, omnibus bills present an obvious and proven vehicle for inserting unnoticed provisions that may later surprise the same legislators who approved them.

The issue is not that individual legislators need more time to read and understand each bill (that isn’t realistic or even necessary). It’s that omnibus bills must pass. There is an imperative to pass a federal budget bill, and so the capacity to push back on individual provisions that may seem deleterious (or just impertinent) to any particular group is small. Bills that are too big to fail are ripe for hacking by microlegislation.

Moreover, the incentive for legislators to introduce microlegislation catering to a narrow interest is greater if the threat of exposure is lower. To strengthen the threat of exposure for misbehaving legislative sponsors, bills should focus more tightly on individual substantive areas and, after the introduction of amendments, allow more time before the committee and floor votes. During this time, we should encourage public review and testimony to provide greater oversight.

Second, we should strengthen disclosure requirements on lobbyists, whether they’re entirely human or AI-assisted. State laws regarding lobbying disclosure are a hodgepodge. North Dakota, for example, only requires lobbying reports to be filed annually, so that by the time a disclosure is made, the policy is likely already decided. A lobbying disclosure scorecard created by Open Secrets, a group researching the influence of money in US politics, tracks nine states that do not even require lobbyists to report their compensation.

Ideally, it would be great for the public to see all communication between lobbyists and legislators, whether it takes the form of a proposed amendment or not. Absent that, let’s give the public the benefit of reviewing what lobbyists are lobbying for — and why. Lobbying is traditionally an activity that happens behind closed doors. Right now, many states reinforce that: they actually exempt testimony delivered publicly to a legislature from being reported as lobbying.

In those jurisdictions, if you reveal your position to the public, you’re no longer lobbying. Let’s do the inverse: require lobbyists to reveal their positions on issues. Some jurisdictions already require a statement of position (a ‘yea’ or ‘nay’) from registered lobbyists. And in most (but not all) states, you could make a public records request regarding meetings held with a state legislator and hope to get something substantive back. But we can expect more — lobbyists could be required to proactively publish, within a few days, a brief summary of what they demanded of policymakers during meetings and why they believe it’s in the general interest.

We can’t rely on corporations to be forthcoming and wholly honest about the reasons behind their lobbying positions. But having them on the record about their intentions would at least provide a baseline for accountability.

Finally, consider the role AI assistive technologies may have on lobbying firms themselves and the labor market for lobbyists. Many observers are rightfully concerned about the possibility of AI replacing or devaluing the human labor it automates. If the automating potential of AI ends up commodifying the work of political strategizing and message development, it may indeed put some professionals on K Street out of work.

But don’t expect that to disrupt the careers of the most astronomically compensated lobbyists: former members Congress and other insiders who have passed through the revolving door. There is no shortage of reform ideas for limiting the ability of government officials turned lobbyists to sell access to their colleagues still in government, and they should be adopted and — equally important — maintained and enforced in successive Congresses and administrations.

None of these solutions are really original, specific to the threats posed by AI, or even predominantly focused on microlegislation — and that’s the point. Good governance should and can be robust to threats from a variety of techniques and actors.

But what makes the risks posed by AI especially pressing now is how fast the field is developing. We expect the scale, strategies, and effectiveness of humans engaged in lobbying to evolve over years and decades. Advancements in AI, meanwhile, seem to be making impressive breakthroughs at a much faster pace — and it’s still accelerating.

The legislative process is a constant struggle between parties trying to control the rules of our society as they are updated, rewritten, and expanded at the federal, state, and local levels. Lobbying is an important tool for balancing various interests through our system. If it’s well-regulated, perhaps lobbying can support policymakers in making equitable decisions on behalf of us all.

This article was co-written with Nathan E. Sanders and originally appeared in MIT Technology Review.

** *** ***** ******* *********** *************

Upcoming Speaking Engagements

[2023.03.14] This is a current list of where and when I am scheduled to speak:

  • I’m speaking on “How to Reclaim Power in the Digital World” at EPFL in Lausanne, Switzerland, on Thursday, March 16, 2023, at 5:30 PM CET.
  • I’ll be discussing my new book A Hacker’s Mind: How the Powerful Bend Society’s Rules at Harvard Science Center in Cambridge, Massachusetts, USA, on Friday, March 31, 2023, at 6:00 PM EDT.
  • I’ll be discussing my book A Hacker’s Mind with Julia Angwin at the Ford Foundation Center for Social Justice in New York City, on Thursday, April 6, 2023, at 6:30 PM EDT. Register here
  • I’m speaking at IT-S Now 2023 in Vienna, Austria, on June 2, 2023, at 8:30 AM CEST.

The list is maintained on this page.

** *** ***** ******* *********** *************

US Citizen Hacked by Spyware

[2023.03.21] The New York Times is reporting that a US citizen’s phone was hacked by Predator spyware.

A U.S. and Greek national who worked on Meta’s security and trust team while based in Greece was placed under a yearlong wiretap by the Greek national intelligence service and hacked with a powerful cyberespionage tool, according to documents obtained by The New York Times and officials with knowledge of the case.

The disclosure is the first known case of an American citizen being targeted in a European Union country by the advanced snooping technology, the use of which has been the subject of a widening scandal in Greece. It demonstrates that the illicit use of spyware is spreading beyond use by authoritarian governments against opposition figures and journalists, and has begun to creep into European democracies, even ensnaring a foreign national working for a major global corporation.

The simultaneous tapping of the target’s phone by the national intelligence service and the way she was hacked indicate that the spy service and whoever implanted the spyware, known as Predator, were working hand in hand.

** *** ***** ******* *********** *************

ChatGPT Privacy Flaw

[2023.03.22] OpenAI has disabled ChatGPT’s privacy history, almost certainly because it had a security flaw where users were seeing each others’ histories.

** *** ***** ******* *********** *************

Mass Ransomware Attack

[2023.03.23] A vulnerability in a popular data transfer tool has resulted in a mass ransomware attack:

TechCrunch has learned of dozens of organizations that used the affected GoAnywhere file transfer software at the time of the ransomware attack, suggesting more victims are likely to come forward.

However, while the number of victims of the mass-hack is widening, the known impact is murky at best.

Since the attack in late January or early February — the exact date is not known — Clop has disclosed less than half of the 130 organizations it claimed to have compromised via GoAnywhere, a system that can be hosted in the cloud or on an organization’s network that allows companies to securely transfer huge sets of data and other large files.

** *** ***** ******* *********** *************

Exploding USB Sticks

[2023.03.24] In case you don’t have enough to worry about, people are hiding explosives — actual ones — in USB sticks:

In the port city of Guayaquil, journalist Lenin Artieda of the Ecuavisa private TV station received an envelope containing a pen drive which exploded when he inserted it into a computer, his employer said.

Artieda sustained slight injuries to one hand and his face, said police official Xavier Chango. No one else was hurt.

Chango said the USB drive sent to Artieda could have been loaded with RDX, a military-type explosive.

More:

According to police official Xavier Chango, the flash drive that went off had a 5-volt explosive charge and is thought to have used RDX. Also known as T4, according to the Environmental Protection Agency (PDF), militaries, including the US’s, use RDX, which “can be used alone as a base charge for detonators or mixed with other explosives, such as TNT.” Chango said it comes in capsules measuring about 1 cm, but only half of it was activated in the drive that Artieda plugged in, which likely saved him some harm.

Reminds me of assassination by cell phone.

** *** ***** ******* *********** *************

A Hacker’s Mind News

[2023.03.24] My latest book continues to sell well. Its ranking hovers between 1,500 and 2,000 on Amazon. It’s been spied in airports.

Reviews are consistently good. I have been enjoying giving podcast interviews. It all feels pretty good right now.

You can order a signed book from me here.

** *** ***** ******* *********** *************

Hacks at Pwn2Own Vancouver 2023

[2023.03.27] An impressive array of hacks were demonstrated at the first day of the Pwn2Own conference in Vancouver:

On the first day of Pwn2Own Vancouver 2023, security researchers successfully demoed Tesla Model 3, Windows 11, and macOS zero-day exploits and exploit chains to win $375,000 and a Tesla Model 3.

The first to fall was Adobe Reader in the enterprise applications category after Haboob SA’s Abdul Aziz Hariri (@abdhariri) used an exploit chain targeting a 6-bug logic chain abusing multiple failed patches which escaped the sandbox and bypassed a banned API list on macOS to earn $50,000.

The STAR Labs team (@starlabs_sg) demoed a zero-day exploit chain targeting Microsoft’s SharePoint team collaboration platform that brought them a $100,000 reward and successfully hacked Ubuntu Desktop with a previously known exploit for $15,000.

Synacktiv (@Synacktiv) took home $100,000 and a Tesla Model 3 after successfully executing a TOCTOU (time-of-check to time-of-use) attack against the Tesla-Gateway in the Automotive category. They also used a TOCTOU zero-day vulnerability to escalate privileges on Apple macOS and earned $40,000.

Oracle VirtualBox was hacked using an OOB Read and a stacked-based buffer overflow exploit chain (worth $40,000) by Qrious Security’s Bien Pham (@bienpnn).

Last but not least, Marcin Wiązowski elevated privileges on Windows 11 using an improper input validation zero-day that came with a $30,000 prize.

The con’s second and third days were equally impressive.

** *** ***** ******* *********** *************

Security Vulnerabilities in Snipping Tools

[2023.03.28] Both Google’s Pixel’s Markup Tool and the Windows Snipping Tool have vulnerabilities that allow people to partially recover content that was edited out of images.

EDITED TO ADD (4/14): Steven Murdoch has a good explanation as to why this happened — and to two very different snipping tools.

** *** ***** ******* *********** *************

The Security Vulnerabilities of Message Interoperability

[2023.03.29] Jenny Blessing and Ross Anderson have evaluated the security of systems designed to allow the various Internet messaging platforms to interoperate with each other:

The Digital Markets Act ruled that users on different platforms should be able to exchange messages with each other. This opens up a real Pandora’s box. How will the networks manage keys, authenticate users, and moderate content? How much metadata will have to be shared, and how?

In our latest paper, One Protocol to Rule Them All? On Securing Interoperable Messaging, we explore the security tensions, the conflicts of interest, the usability traps, and the likely consequences for individual and institutional behaviour.

Interoperability will vastly increase the attack surface at every level in the stack from the cryptography up through usability to commercial incentives and the opportunities for government interference.

It’s a good idea in theory, but will likely result in the overall security being the worst of each platform’s security.

** *** ***** ******* *********** *************

Russian Cyberwarfare Documents Leaked

[2023.03.30] Now this is interesting:

Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet.

The company’s work is linked to the federal security service or FSB, the domestic spy agency; the operational and intelligence divisions of the armed forces, known as the GOU and GRU; and the SVR, Russia’s foreign intelligence organisation.

Lots more at the link.

The documents are in Russian, so it will be a while before we get translations.

EDITED TO ADD (4/1): More information.

** *** ***** ******* *********** *************

UK Runs Fake DDoS-for-Hire Sites

[2023.04.03] Brian Krebs is reporting that the UK’s National Crime Agency is setting up fake DDoS-for-hire sites as part of a sting operation:

The NCA says all of its fake so-called “booter” or “stresser” sites – which have so far been accessed by several thousand people — have been created to look like they offer the tools and services that enable cyber criminals to execute these attacks.

“However, after users register, rather than being given access to cyber crime tools, their data is collated by investigators,” reads an NCA advisory on the program. “Users based in the UK will be contacted by the National Crime Agency or police and warned about engaging in cyber crime. Information relating to those based overseas is being passed to international law enforcement.”

The NCA declined to say how many phony booter sites it had set up, or for how long they have been running. The NCA says hiring or launching attacks designed to knock websites or users offline is punishable in the UK under the Computer Misuse Act 1990.

“Going forward, people who wish to use these services can’t be sure who is actually behind them, so why take the risk?” the NCA announcement continues.

** *** ***** ******* *********** *************

North Korea Hacking Cryptocurrency Sites with 3CX Exploit

[2023.04.04] News:

Researchers at Russian cybersecurity firm Kaspersky today revealed that they identified a small number of cryptocurrency-focused firms as at least some of the victims of the 3CX software supply-chain attack that’s unfolded over the past week. Kaspersky declined to name any of those victim companies, but it notes that they’re based in “western Asia.”

Security firms CrowdStrike and SentinelOne last week pinned the operation on North Korean hackers, who compromised 3CX installer software that’s used by 600,000 organizations worldwide, according to the vendor. Despite the potentially massive breadth of that attack, which SentinelOne dubbed “Smooth Operator,” Kaspersky has now found that the hackers combed through the victims infected with its corrupted software to ultimately target fewer than 10 machines — at least as far as Kaspersky could observe so far — and that they seemed to be focusing on cryptocurrency firms with “surgical precision.”

** *** ***** ******* *********** *************

FBI (and Others) Shut Down Genesis Market

[2023.04.05] Genesis Market is shut down:

Active since 2018, Genesis Market’s slogan was, “Our store sells bots with logs, cookies, and their real fingerprints.” Customers could search for infected systems with a variety of options, including by Internet address or by specific domain names associated with stolen credentials.

But earlier today, multiple domains associated with Genesis had their homepages replaced with a seizure notice from the FBI, which said the domains were seized pursuant to a warrant issued by the U.S. District Court for the Eastern District of Wisconsin.

The U.S. Attorney’s Office for the Eastern District of Wisconsin did not respond to requests for comment. The FBI declined to comment.

But sources close to the investigation tell KrebsOnSecurity that law enforcement agencies in the United States, Canada and across Europe are currently serving arrest warrants on dozens of individuals thought to support Genesis, either by maintaining the site or selling the service bot logs from infected systems.

The seizure notice includes the seals of law enforcement entities from several countries, including Australia, Canada, Denmark, Germany, the Netherlands, Spain, Sweden and the United Kingdom.

Slashdot story.

** *** ***** ******* *********** *************

Research on AI in Adversarial Settings

[2023.04.06] New research: “Achilles Heels for AGI/ASI via Decision Theoretic Adversaries”:

As progress in AI continues to advance, it is important to know how advanced systems will make choices and in what ways they may fail. Machines can already outsmart humans in some domains, and understanding how to safely build ones which may have capabilities at or above the human level is of particular concern. One might suspect that artificially generally intelligent (AGI) and artificially superintelligent (ASI) will be systems that humans cannot reliably outsmart. As a challenge to this assumption, this paper presents the Achilles Heel hypothesis which states that even a potentially superintelligent system may nonetheless have stable decision-theoretic delusions which cause them to make irrational decisions in adversarial settings. In a survey of key dilemmas and paradoxes from the decision theory literature, a number of these potential Achilles Heels are discussed in context of this hypothesis. Several novel contributions are made toward understanding the ways in which these weaknesses might be implanted into a system.

** *** ***** ******* *********** *************

LLMs and Phishing

[2023.04.10] Here’s an experiment being run by undergraduate computer science students everywhere: Ask ChatGPT to generate phishing emails, and test whether these are better at persuading victims to respond or click on the link than the usual spam. It’s an interesting experiment, and the results are likely to vary wildly based on the details of the experiment.

But while it’s an easy experiment to run, it misses the real risk of large language models (LLMs) writing scam emails. Today’s human-run scams aren’t limited by the number of people who respond to the initial email contact. They’re limited by the labor-intensive process of persuading those people to send the scammer money. LLMs are about to change that. A decade ago, one type of spam email had become a punchline on every late-night show: “I am the son of the late king of Nigeria in need of your assistance….” Nearly everyone had gotten one or a thousand of those emails, to the point that it seemed everyone must have known they were scams.

So why were scammers still sending such obviously dubious emails? In 2012, researcher Cormac Herley offered an answer: It weeded out all but the most gullible. A smart scammer doesn’t want to waste their time with people who reply and then realize it’s a scam when asked to wire money. By using an obvious scam email, the scammer can focus on the most potentially profitable people. It takes time and effort to engage in the back-and-forth communications that nudge marks, step by step, from interlocutor to trusted acquaintance to pauper.

Long-running financial scams are now known as pig butchering, growing the potential mark up until their ultimate and sudden demise. Such scams, which require gaining trust and infiltrating a target’s personal finances, take weeks or even months of personal time and repeated interactions. It’s a high stakes and low probability game that the scammer is playing.

Here is where LLMs will make a difference. Much has been written about the unreliability of OpenAI’s GPT models and those like them: They “hallucinate” frequently, making up things about the world and confidently spouting nonsense. For entertainment, this is fine, but for most practical uses it’s a problem. It is, however, not a bug but a feature when it comes to scams: LLMs’ ability to confidently roll with the punches, no matter what a user throws at them, will prove useful to scammers as they navigate hostile, bemused, and gullible scam targets by the billions. AI chatbot scams can ensnare more people, because the pool of victims who will fall for a more subtle and flexible scammer — one that has been trained on everything ever written online — is much larger than the pool of those who believe the king of Nigeria wants to give them a billion dollars.

Personal computers are powerful enough today that they can run compact LLMs. After Facebook’s new model, LLaMA, was leaked online, developers tuned it to run fast and cheaply on powerful laptops. Numerous other open-source LLMs are under development, with a community of thousands of engineers and scientists.

A single scammer, from their laptop anywhere in the world, can now run hundreds or thousands of scams in parallel, night and day, with marks all over the world, in every language under the sun. The AI chatbots will never sleep and will always be adapting along their path to their objectives. And new mechanisms, from ChatGPT plugins to LangChain, will enable composition of AI with thousands of API-based cloud services and open source tools, allowing LLMs to interact with the internet as humans do. The impersonations in such scams are no longer just princes offering their country’s riches. They are forlorn strangers looking for romance, hot new cryptocurrencies that are soon to skyrocket in value, and seemingly-sound new financial websites offering amazing returns on deposits. And people are already falling in love with LLMs.

This is a change in both scope and scale. LLMs will change the scam pipeline, making them more profitable than ever. We don’t know how to live in a world with a billion, or 10 billion, scammers that never sleep.

There will also be a change in the sophistication of these attacks. This is due not only to AI advances, but to the business model of the internet — surveillance capitalism — which produces troves of data about all of us, available for purchase from data brokers. Targeted attacks against individuals, whether for phishing or data collection or scams, were once only within the reach of nation-states. Combine the digital dossiers that data brokers have on all of us with LLMs, and you have a tool tailor-made for personalized scams.

Companies like OpenAI attempt to prevent their models from doing bad things. But with the release of each new LLM, social media sites buzz with new AI jailbreaks that evade the new restrictions put in place by the AI’s designers. ChatGPT, and then Bing Chat, and then GPT-4 were all jailbroken within minutes of their release, and in dozens of different ways. Most protections against bad uses and harmful output are only skin-deep, easily evaded by determined users. Once a jailbreak is discovered, it usually can be generalized, and the community of users pulls the LLM open through the chinks in its armor. And the technology is advancing too fast for anyone to fully understand how they work, even the designers.

This is all an old story, though: It reminds us that many of the bad uses of AI are a reflection of humanity more than they are a reflection of AI technology itself. Scams are nothing new — simply intent and then action of one person tricking another for personal gain. And the use of others as minions to accomplish scams is sadly nothing new or uncommon: For example, organized crime in Asia currently kidnaps or indentures thousands in scam sweatshops. Is it better that organized crime will no longer see the need to exploit and physically abuse people to run their scam operations, or worse that they and many others will be able to scale up scams to an unprecedented level?

Defense can and will catch up, but before it does, our signal-to-noise ratio is going to drop dramatically.

This essay was written with Barath Raghavan, and previously appeared on Wired.com.

** *** ***** ******* *********** *************

Car Thieves Hacking the CAN Bus

[2023.04.11] Car thieves are injecting malicious software into a car’s network through wires in the headlights (or taillights) that fool the car into believing that the electronic key is nearby.

News articles.

** *** ***** ******* *********** *************

FBI Advising People to Avoid Public Charging Stations

[2023.04.12] The FBI is warning people against using public phone-charging stations, worrying that the combination power-data port can be used to inject malware onto the devices:

Avoid using free charging stations in airports, hotels, or shopping centers. Bad actors have figured out ways to use public USB ports to introduce malware and monitoring software onto devices that access these ports. Carry your own charger and USB cord and use an electrical outlet instead.

How much of a risk is this, really? I am unconvinced, although I do carry a USB condom for charging stations I find suspicious.

News article.

** *** ***** ******* *********** *************

Bypassing a Theft Threat Model

[2023.04.13] Thieves cut through the wall of a coffee shop to get to an Apple store, bypassing the alarms in the process.

I wrote about this kind of thing in 2000, in Secrets and Lies (page 318):

My favorite example is a band of California art thieves that would break into people’s houses by cutting a hole in their walls with a chainsaw. The attacker completely bypassed the threat model of the defender. The countermeasures that the homeowner put in place were door and window alarms; they didn’t make a difference to this attack.

The article says they took half a million dollars worth of iPhones. I don’t understand iPhone device security, but don’t they have a system of denying stolen phones access to the network?

EDITED TO ADD (4/13): A commenter says: “Locked idevices will still sell for 40-60% of their value on eBay and co, they will go to Chinese shops to be stripped for parts. A aftermarket ‘oem-quality’ iPhone 14 display is $400+ alone on ifixit.”

** *** ***** ******* *********** *************

Gaining an Advantage in Roulette

[2023.04.14] You can beat the game without a computer:

On a perfect [roulette] wheel, the ball would always fall in a random way. But over time, wheels develop flaws, which turn into patterns. A wheel that’s even marginally tilted could develop what Barnett called a ‘drop zone.’ When the tilt forces the ball to climb a slope, the ball decelerates and falls from the outer rim at the same spot on almost every spin. A similar thing can happen on equipment worn from repeated use, or if a croupier’s hand lotion has left residue, or for a dizzying number of other reasons. A drop zone is the Achilles’ heel of roulette. That morsel of predictability is enough for software to overcome the random skidding and bouncing that happens after the drop.”

** *** ***** ******* *********** *************

Hacking Suicide

[2023.04.14] Here’s a religious hack:

You want to commit suicide, but it’s a mortal sin: your soul goes straight to hell, forever. So what you do is murder someone. That will get you executed, but if you confess your sins to a priest beforehand you avoid hell. Problem solved.

This was actually a problem in the 17th and 18th centuries in Northern Europe, particularly Denmark. And it remained a problem until capital punishment was abolished for murder.

It’s a clever hack. I didn’t learn about it in time to put it in my book, A Hacker’s Mind, but I have several other good hacks of religious rules.

** *** ***** ******* *********** *************

Upcoming Speaking Engagements

[2023.04.14] This is a current list of where and when I am scheduled to speak:

  • I’m speaking on “Cybersecurity Thinking to Reinvent Democracy” at RSA Conference 2023 in San Francisco, California, on Tuesday, April 25, 2023, at 9:40 AM PT.
  • I’m speaking at IT-S Now 2023 in Vienna, Austria, on June 2, 2023 at 8:30 AM CEST.

The list is maintained on this page.

** *** ***** ******* *********** *************

Since 1998, CRYPTO-GRAM has been a free monthly newsletter providing summaries, analyses, insights, and commentaries on security technology. To subscribe, or to read back issues, see Crypto-Gram’s web page.

You can also read these articles on my blog, Schneier on Security.

Please feel free to forward CRYPTO-GRAM, in whole or in part, to colleagues and friends who will find it valuable. Permission is also granted to reprint CRYPTO-GRAM, as long as it is reprinted in its entirety.

Bruce Schneier is an internationally renowned security technologist, called a security guru by the Economist. He is the author of over one dozen books — including his latest, A Hacker’s Mind — as well as hundreds of articles, essays, and academic papers. His newsletter and blog are read by over 250,000 people. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.

Copyright © 2023 by Bruce Schneier.

** *** ***** ******* *********** *************

Mailing list hosting graciously provided by MailChimp. Sent without web bugs or link tracking.

This email was sent to:  (removed)
You are receiving this email because you subscribed to the Crypto-Gram newsletter.

Bruce Schneier · Harvard Kennedy School · 1 Brattle Square · Cambridge, MA 02138 · USA