{"168729":{"id":"168729","parent":"168497","time":"1581171441","url":"http:\/\/newsnet.fr\/168729","source":"http:\/\/www.strategic-culture.org\/news\/2020\/02\/08\/how-government-and-media-prepping-america-for-failed-2020-election\/","category":"USA","title":"How Government and Media Are Prepping America for a Failed 2020 Election","catalog-images":"5\/\/3\/newsnet_168729_b52f5b.jpg\/newsnet_168729_939e38.jpg\/newsnet_168729_6b47ce.jpg\/newsnet_168729_9dfe89.jpg\/newsnet_168729_b8582e.jpg\/newsnet_168729_OmB7fmi8JwY.jpg\/newsnet_168729_ca-C3voZwpM.jpg\/newsnet_168729_4x2v0VwgxPc.jpg","image":"http:\/\/newsnet.fr\/img\/newsnet_168729_6b47ce.jpg","hub":"newsnet","url-explicit":"http:\/\/newsnet.fr\/art\/how-government-and-media-are-prepping-america-for-a-failed-2020-election","admin":"newsnet","views":"1056","priority":"3","length":"69990","lang":"en","content":"\u003Cp\u003E\u003Ci\u003ERussia, China and Iran are already being blamed for using tech to undermine the 2020 election. Yet, the very technologies they are allegedly using were created by a web of companies with deep ties to Israeli intelligence.\u003C\/i\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ci\u003EWhitney WEBB\u003C\/i\u003E\u003C\/p\u003E\u003Cp\u003EAs World War II drew to a close in Europe, British philosopher Bertrand Russell wrote that \"neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of a great fear.\"\u003C\/p\u003E\u003Cp\u003EThough numerous examples in the post-World War II era have proven Russell's point, perhaps one of the best examples was the U.S. public's willingness to swallow lie after lie about Saddam Hussein's Iraq due to the climate of fear that followed the September 11 attacks. Those lies, propagated by dubious intelligence, government officials and a compliant media, resulted in catastrophes - large and small, both abroad and at home.\u003C\/p\u003E\u003Cp\u003EToday, an analogous narrative is being crafted by many of the same players - both in media and government - yet it has avoided scrutiny, even from independent media.\u003C\/p\u003E\u003Cp\u003EOver the past several months and with a renewed zeal in just the last few weeks, anonymous intelligence officials, dubious \"experts\" and establishment media outlets have crafted a narrative about the coming \"chaos\" of the 2020 election, months before it takes place. Per that narrative, certain state actors will use specific technologies to target the \"American mind\" in order to undermine the coming presidential election. The narrative holds that those efforts will be so successful that the U.S. will never recover as a democracy.\u003C\/p\u003E\u003Cp\u003EThough these anonymous government sources and their stenographers have already named the countries who will be responsible and the technologies they will use, they also admit that no evidence yet exists to back up these claims, meaning they are - at best - pure speculation.\u003C\/p\u003E\u003Cp\u003EHeadlines such as \"\u003Ca href=\"https:\/\/www.rollingstone.com\/politics\/politics-features\/trump-election-hacking-russia-iran-ransomware-interference-938109\"\u003EHackers Are Coming for the 2020 Election - And We're Not Ready\u003C\/a\u003E,\" \"\u003Ca href=\"https:\/\/www.buzzfeednews.com\/article\/claudiakoerner\/2020-election-meddling-warning-russia-china-iran\"\u003EBasically Every US National Security Leader Is Warning About Foreign Interference In The 2020 Election\u003C\/a\u003E,\" and \"\u003Ca href=\"https:\/\/www.nbcnews.com\/politics\/national-security\/u-s-intel-agencies-russia-china-plotting-interfere-2020-election-n963896\"\u003EU.S. intel agencies\u003C\/a\u003E\" have become increasingly common, despite no available evidence, as have warnings that the American public is defenseless against the old scourge of \"fake news\" and the new scourge of \"deep fakes.\" Some media reports have gone so far to say that \u003Ci\u003Eactual\u003C\/i\u003E foreign meddling isn't even necessary as merely the \u003Ci\u003Efear\u003C\/i\u003E of foreign meddling could be enough to upend the American political system beyond repair.\u003C\/p\u003E\u003Cp\u003EHistorically, the goal of such fear-inducing narratives has been the trading of civil liberties for increased security, or rather, the \u003Ci\u003Eappearance\u003C\/i\u003E of increased security. Yet, when the need for security is felt due to a fear that is based on government-driven speculation and not on evidence, the goal of that narrative is not about protecting the public from a real, tangible threat but instead about the consolidation of power by the very groups responsible for crafting it - in this case, the intelligence community and other key players in the national security state.\u003C\/p\u003E\u003Cp\u003EHowever, what is particularly odd about this narrative surrounding imminent \"chaos\" and meddling in the upcoming 2020 election is the fact that, not only have the instruments of said meddling been named and described in detail, but their use in the election was recently simulated by a company with deep ties to both U.S. and Israeli intelligence. That simulation, \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-israel-tech-firm-doomsday-election-simulations\/263886\"\u003Eorganized and run by the Israeli-American company Cybereason\u003C\/a\u003E, ended with scores of Americans dead, the cancellation of the 2020 election, the imposition of martial law and a spike in fear among the American populace.\u003C\/p\u003E\u003Cp\u003EMany of the technologies used to create that chaotic and horrific scenario in the Cybereason simulation are the very same technologies that U.S. federal officials and corporate media outlets have promoted as the core of the very toolkit that they claim \u003Ci\u003Ewill\u003C\/i\u003E be used to undermine the coming election, such as deep fakes and hacks of critical infrastructure, consumer devices and even vehicles.\u003C\/p\u003E\u003Cp\u003EWhile the narrative in place has already laid the blame at the feet of U.S. rival states China, Russia and Iran, these very technologies are instead dominated by companies that are tied to the very same intelligence agencies as Cybereason, specifically Israeli military intelligence.\u003C\/p\u003E\u003Cp\u003EWith intelligence agencies in the U.S. and Israel not only crafting the narrative about 2020 foreign meddling, but also dominating these technologies and simulating their use to upend the coming election, it becomes crucial to consider the motivations behind this narrative and if these intelligence agencies have ulterior motives in promoting and simulating such outcomes that would effectively end American democracy and hand almost total power to the national security state.\u003C\/p\u003E\u003Cp\u003E\u003Cb\u003EMedia, intelligence foreshadow tech-powered doom for 2020\u003C\/b\u003E\u003C\/p\u003E\u003Cp\u003EEven though the 2020 U.S. election is still months away, a plethora of media reports over the past six months (and even before then) have been raising \u003Ca href=\"https:\/\/www.nj.com\/opinion\/2020\/01\/the-russian-hackers-are-back-will-they-tip-our-2020-election-editorial.html\"\u003Econcern\u003C\/a\u003E after \u003Ca href=\"https:\/\/www.dispatch.com\/news\/20200117\/experts-warn-of-foreign-disinformation-again-in-2020-election-to-ldquoannihilate-truthrdquo\"\u003Econcern\u003C\/a\u003E about how the U.S. election is still so vulnerable to \u003Ca href=\"https:\/\/www.newsweek.com\/feds-warn-that-russia-china-iran-will-try-hack-2020-elections-1469973\"\u003Eforeign meddling\u003C\/a\u003E that such meddling is \u003Ca href=\"https:\/\/www.rollingstone.com\/politics\/politics-features\/trump-election-hacking-russia-iran-ransomware-interference-938109\"\u003Eessentially an inevitability\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003EPart of the reason for the recent pick-up in fear mongering appears to have been the release of a joint statement issued by key members of the Trump administration last November. \u003Ca href=\"https:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/item\/2063-joint-statement-from-doj-dod-dhs-dni-fbi-nsa-and-cisa-on-ensuring-security-of-2020-elections\"\u003EThat statement\u003C\/a\u003E, authored by Attorney General Bill Barr, Defense Secretary Mark Esper, acting DHS Secretary Kevin McAleenan, acting Director of National Intelligence Joseph Maguire, FBI Director Christopher Wray, NSA Director Gen. Paul Nakasone, and Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs, claimed that foreign interference in 2020 was imminent despite admitting that there is no evidence of interference having taken place:\u003C\/p\u003E\u003Cblockquote\u003EOur adversaries want to undermine our democratic institutions, influence public sentiment and affect government policies. \u003Cb\u003ERussia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions\u003C\/b\u003E. Adversaries may try to accomplish their goals through a variety of means, including \u003Cb\u003Esocial media campaigns, directing disinformation operations or conducting disruptive or destructive cyber-attacks\u003C\/b\u003E on state and local infrastructure.\u003Cp\u003EWhile at this time \u003Cb\u003Ewe have no evidence\u003C\/b\u003E of a compromise or disruption to election infrastructure that would enable adversaries to prevent voting, change vote counts or disrupt the ability to tally votes, we continue to vigilantly monitor any threats to U.S. elections (emphasis added).\"\u003C\/blockquote\u003E\u003C\/p\u003E\u003Cp\u003EDespite the key caveat of there being no evidence at the time the statement was issued, media reports used the statement to claim that foreign interference in 2020 was imminent, such as in these reports from\u003Ca href=\"https:\/\/www.buzzfeednews.com\/article\/claudiakoerner\/2020-election-meddling-warning-russia-china-iran\"\u003EBuzzFeed\u003C\/a\u003E\u003Ci\u003E,\u003C\/i\u003E \u003Ca onclick=\"sj(this)\" data-j=\"popup_twit,call__3_https:\/\/twitter.com\/abc\/status\/1191840420906643457_\" class=\"txtx\"\u003E\u003Cspan class=\"philum ic-tw\" style=\"font-size:16px;\"\u003E\u003C\/span\u003E ABC News\u003C\/a\u003E, and \u003Ca href=\"https:\/\/www.newsweek.com\/feds-warn-that-russia-china-iran-will-try-hack-2020-elections-1469973\"\u003ENewsweek\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003EIn addition to the reports that have cast the involvement of state actors - namely Russia, Iran and China - as assured despite no evidence, other reports have made the claim that this allegedly imminent interference will inevitably be successful, largely due to claims that the tactics used will rely heavily on technology that the U.S. can't hope to successfully counter. \u003Ca href=\"https:\/\/www.csoonline.com\/article\/3514950\/us-elections-remain-vulnerable-to-attacks-despite-security-improvements.html\"\u003ECSO Online\u003C\/a\u003E, an online news outlets that provides news, analysis and research on security and risk management, recently warned that \"fixing America's voting and election infrastructure problems is a long-term proposition, one that won't be fixed in time for the election in November\" while\u003Ca href=\"https:\/\/www.nytimes.com\/2020\/01\/10\/us\/politics\/russia-hacking-disinformation-election.html\"\u003Ethe New York Times\u003C\/a\u003E warned of imminent chaos and that \"stealthier\" malevolent foreign actors had already created the foundation for \"an ugly campaign season marred by hacking and disinformation.\" \u003Ca href=\"https:\/\/www.wired.com\/story\/election-security-2020\"\u003EWired claimed last year\u003C\/a\u003E that U.S. election security \"is still hurting at every level.\"\u003C\/p\u003E\u003Cp\u003E\u003Cspan class=\"philum ic-img2\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003EA trainer holds a booklet during an exercise for local election officials to simulate 2020 election scenarios in Springfield, Va. Dec. 16, 2019. Alex Brandon | AP\u003C\/p\u003E\u003Cp\u003EIn another example, \u003Ci\u003ERolling Stone\u003C\/i\u003E published an article earlier this month with the headline \"\u003Ca href=\"https:\/\/www.rollingstone.com\/politics\/politics-features\/trump-election-hacking-russia-iran-ransomware-interference-938109\"\u003EHackers Are Coming for the 2020 Election - And We're Not Ready\u003C\/a\u003E,\" which claims that \"the reality is that: \"We've made progress since the last election - but we're much less secure than we should be.\" The article goes on to say that claim that the goal isn't necessarily to hack voting machines or change results, but \"to merely create the impression of an attack as a way to undermine our faith in the electoral process.\"\u003C\/p\u003E\u003Cp\u003EIt continues:\u003C\/p\u003E\u003Cblockquote\u003EThe target is the minds of the American people,\" says Joshua Geltzer, a former counterterrorism director on the National Security Council. \"In some ways, we're less vulnerable than we were in 2016. In other ways, it's more.\" Nearly every expert agrees on this: The worst-case scenario, the one we need to prepare for, is a situation that causes Americans to question the bedrock of our democracy - free and fair elections.\"\u003C\/blockquote\u003E\u003Cp\u003EWell before this type of rhetoric made its way into the U.S. media, Israeli intelligence-linked tech firm Cybereason claiming in a release on its website that \"\u003Ca href=\"https:\/\/www.cybereason.com\/blog\/how-hackers-could-influnece-novembers-election-without-changing-a-vote\"\u003Emessing with a voter's mind\u003C\/a\u003E\" would have a bigger impact than changing vote totals, even before the 2016 election. That release, published by Cybereason prior to the last presidential election, was authored by the company's CEO, Lior Div, who used to lead offensive hacking operations against nation-states for Israeli military intelligence.\u003C\/p\u003E\u003Cp\u003ENotably, of all of these media reports, there is a clear consensus that one of the \u003Ca href=\"https:\/\/www.theaustralian.com.au\/subscribe\/news\/1\/?sourceCode=TAWEB_WRE170_a&dest=https%3A%2F%2Fwww.theaustralian.com.au%2Fbusiness%2Ftechnology%2Fdeepfakes-pose-challenge-for-us-presidential-elections%2Fnews-story%2Fa0ff4e1fd83c2c495daa95372b9958fe&memtype=anonymous&mode=premium&nk=801d475b81de91745dd4c48893967f48-1579790829\"\u003Emain tactics\u003C\/a\u003E that will soon be \u003Ca href=\"https:\/\/www.designnews.com\/artificial-intelligence\/deepfakes-looming-threat-2020\/109800999062105\"\u003Eused to meddle in the coming U.S. election\u003C\/a\u003E will be the use of so-called \"\u003Ca href=\"https:\/\/www.cnbc.com\/2019\/10\/15\/deepfakes-could-be-problem-for-the-2020-election.html\"\u003Edeep fakes\u003C\/a\u003E.\" Deriving its name from a combination of \"deep learning\" and \"fake,\" deep fakes involve video and audio that has been manipulated using artificial intelligence (AI) to create media that appears to be authentic, but is not. Concern about its use in the upcoming election has spurred not only a \u003Ca href=\"https:\/\/news.google.com\/search?q=deepfake%202020%20election&hl=en-US&gl=US&ceid=US%3Aen\"\u003Ewealth of media reports\u003C\/a\u003E on the matter but has prompted both \u003Ca href=\"https:\/\/www.strategic-culture.org\/video\/2020\/02\/07\/the-yalta-conference-was-a-meeting-of-triumphant-allies-but-good-will-would-collapse\"\u003Ethe U.S. military\u003C\/a\u003E and \u003Ca href=\"https:\/\/www.congress.gov\/bill\/115th-congress\/senate-bill\/3805\"\u003ECongress\u003C\/a\u003E to take action to limit its potential misuse.\u003C\/p\u003E\u003Cp\u003EOne thing that stands out about the media narrative regarding election meddling and deep fakes is that several news organizations \u003Ca href=\"https:\/\/www.chicagotribune.com\/sns-tns-bc-deepfakes-20191226-story.html\"\u003Ehave published articles\u003C\/a\u003E that state that deep fakes \u003Ca href=\"https:\/\/qz.com\/1660737\/deepfakes-will-influence-the-2020-election\"\u003Ewill be used\u003C\/a\u003E to \u003Ca href=\"https:\/\/edition.cnn.com\/2019\/06\/12\/tech\/deepfake-2020-detection\/index.html\"\u003Eundermine the 2020 election\u003C\/a\u003E, as opposed to stating that they could be used or that they are a phenomenon worthy of attention (though \u003Ca href=\"https:\/\/www.niemanlab.org\/2019\/06\/how-could-deepfakes-impact-the-2020-u-s-elections\"\u003Esome reports\u003C\/a\u003E \u003Ca href=\"https:\/\/www.cnbc.com\/2019\/10\/15\/deepfakes-could-be-problem-for-the-2020-election.html\"\u003Ehave taken\u003C\/a\u003E this more measured approach).\u003C\/p\u003E\u003Cp\u003EThe reason for this level of confidence may owe to statements made by prominent U.S. intelligence officials last year, including those made by Dan Coats, the former Director of National Intelligence (DNI), who claimed in the \u003Ca href=\"https:\/\/www.odni.gov\/files\/ODNI\/documents\/2019-ATA-SFR---SSCI.pdf\" target=\"_blank\"\u003E2019 Worldwide Threat Assessment for the U.S. Intelligence Community\u003C\/a\u003E that deep fakes and other hi-tech forms of fake media would be used to disrupt the 2020 election. Coats specifically stated:\u003C\/p\u003E\u003Cblockquote\u003EAdversaries and strategic competitors probably will attempt to use deep fakes or similar machine-learning technologies to create convincing-but false-image, audio, and video files to augment influence campaigns directed against the United States and our allies and partners.\"\u003C\/blockquote\u003E\u003Cp\u003ESince Coats made the warning, numerous media reports have promoted the concern with little scrutiny, representing just one of the numerous times in U.S. history where narratives first authored by U.S. intelligence are subsequently promoted heavily by U.S. media, even when the claim made by intelligence officials is speculative, as it is in this case. Indeed, the narratives being promoted with respect to the 2020 election involve many of the same intelligence agencies (\u003Ca href=\"https:\/\/www.telegraph.co.uk\/news\/worldnews\/middleeast\/iraq\/9937516\/Iraq-war-the-greatest-intelligence-failure-in-living-memory.html\"\u003EAmerican\u003C\/a\u003E and \u003Ca href=\"https:\/\/carnegieendowment.org\/2003\/12\/11\/israel-s-intelligence-failure-iraq-war-pub-14744\"\u003EIsraeli\u003C\/a\u003E) and \u003Ca href=\"https:\/\/www.amazon.com\/Tell-Me-Lies-Propaganda-Distortion\/dp\/0745322018\"\u003Emedia outlets who promoted claims that were later proven false\u003C\/a\u003E about \"weapons of mass destruction\" in Iraq prior to the 2003 invasion, \u003Ca href=\"https:\/\/consortiumnews.com\/2017\/09\/10\/echoes-of-iraq-wmd-fraud-in-syria\"\u003Eamong other pertinent examples\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003ENotably, deep fakes figured prominently and was the tool most used by malevolent hackers in \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-israel-tech-firm-doomsday-election-simulations\/263886\"\u003ECybereason's 2020 election simulation\u003C\/a\u003E, which saw both video and audio-only deep fakes used to spread misinformation on national and local TV channels in order to impersonate police officers and election officials and to create fake bomb threats by posing as the terror group Daesh (ISIS). Cybereason also happens to be a partner of the organization funding the most well-known creator and producer of deep fakes in the world, an organization that - much like Cybereason itself - is openly tied to Israeli intelligence.\u003C\/p\u003E\u003Cp\u003EAside from deep fakes, other technologies weaponized in Cybereason's election simulation have also been the subject of several media reports, such as the \u003Ca href=\"https:\/\/thehill.com\/opinion\/cybersecurity\/479316-2020-cybersecurity-predictions-evolving-vulnerabilities-on-the-horizon\"\u003Ehacking of Internet of Things (IoT) devices and appliances\u003C\/a\u003E and even \u003Ca href=\"https:\/\/www.eastbaytimes.com\/2019\/08\/01\/report-finds-2020-cars-vulnerable-to-hacks-that-could-result-in-thousands-of-deaths\"\u003Ethe hacking of vehicles\u003C\/a\u003E that have some form of internet connectivity. In the Cybereason simulation, IoT hacks were used to cut power to polling stations and disseminate disinformation while vehicles were hacked to conduct terror attacks against civilians waiting in line to vote, killing several and injuring hundreds.\u003C\/p\u003E\u003Cp\u003EMost media reports have claimed that these technologies will be part of the \u003Ca href=\"https:\/\/www.forbes.com\/sites\/steveandriole\/2020\/01\/14\/cyberwarfare-will-explode-in-2020-because-its-cheap-easy--effective\/#156cdf776781\"\u003Ecoming \"explosion\" in cyber warfare\u003C\/a\u003E in 2020 and do not specifically link them to imminent election meddling. Others, however, \u003Ca href=\"https:\/\/qz.com\/1766367\/how-electric-vehicles-could-be-used-to-hack-the-2020-election\"\u003Ehave made the link\u003C\/a\u003E to the election explicit.\u003C\/p\u003E\u003Cp\u003E\u003Cb\u003ENaming the culprits in advance\u003C\/b\u003E\u003C\/p\u003E\u003Cp\u003EIn addition to the apparent consensus on \u003Ci\u003Ehow\u003C\/i\u003E foreign meddling will occur during the 2020 election, there is also agreement regarding \u003Ci\u003Ewhich\u003C\/i\u003E countries will be responsible. Again, this is largely based on statements made by U.S. national security officials. For instance, the\u003Ca href=\"https:\/\/www.dni.gov\/index.php\/newsroom\/press-releases\/item\/2063-joint-statement-from-doj-dod-dhs-dni-fbi-nsa-and-cisa-on-ensuring-security-of-2020-elections\"\u003Ejoint statement\u003C\/a\u003E issued last November by the DOJ, DOD, DHS, DNI, FBI, NSA, and CISA regarding 2020 election security, states that \"Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions\" before adding \"at this time we have no evidence.\"\u003C\/p\u003E\u003Cp\u003ESimilarly, the \u003Ca href=\"https:\/\/www.odni.gov\/files\/ODNI\/documents\/2019-ATA-SFR---SSCI.pdf\" target=\"_blank\"\u003E2019 Worldwide Threat Assessment for the U.S. Intelligence Community\u003C\/a\u003E, written by then-Director of National Intelligence Dan Coats, names these same three countries in relation to imminent 2020 election interference and states that their interference in the 2020 election is \"almost certain.\" The assessment adds the following about each nation:\u003C\/p\u003E\u003Cp\u003E\u003Cul\u003E\u003Cli\u003ERussia: \"Russia's social media efforts will continue to focus on aggravating social and racial tensions, undermining trust in authorities, and criticizing perceived anti-Russia politicians.\"\u003C\/li\u003E\u003Cli\u003EChina: \"China will continue to use legal, political, and economic levers-such as the lure of Chinese markets-to shape the information environment. It is also capable of using cyber attacks against systems in the United States to censor or suppress viewpoints it deems politically sensitive.\"\u003C\/li\u003E\u003Cli\u003EIran: \"Iran, which has used social media campaigns to target audiences in both the United States and allied nations with messages aligned with Iranian interests, will continue to use online influence operations to try to advance its interests.\"\u003C\/li\u003E\u003C\/ul\u003E\u003C\/p\u003E\u003Cp\u003ECoats' assessment was enough to spawn numerous stories on the imminent threat that these three nations pose to the 2020 election, with headlines such as \"\u003Ca href=\"https:\/\/www.nbcnews.com\/politics\/national-security\/u-s-intel-agencies-russia-china-plotting-interfere-2020-election-n963896\"\u003EU.S. intel agencies\u003C\/a\u003E.\"\u003C\/p\u003E\u003Cp\u003EThe vast majority of warnings regarding future election interference have come from U.S. intelligence officials with a dubious record of trustworthiness and a history of using the media to spread propaganda and disinformation, most famously through Operation Mockingbird. Most - if not all - of the recent and numerous articles on imminent interference rely heavily on claims made by the two aforementioned government documents, documents crafted by U.S. intelligence agencies for public consumption, as well as claims made by anonymous U.S. officials.\u003C\/p\u003E\u003Cp\u003E\u003Cimg style=\"max-width:100%\" src=\"http:\/\/newsnet.fr\/img\/newsnet_168729_939e38.jpg\" \/\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ci\u003EA screenshot from the 2019 National Threat Assessment lists Russia, China and Iran as primary threats to the United States\u003C\/i\u003E\u003C\/p\u003E\u003Cp\u003EA recent \u003Ci\u003ENew York Times\u003C\/i\u003E article, for example, titled \"\u003Ca href=\"https:\/\/www.nytimes.com\/2020\/01\/10\/us\/politics\/russia-hacking-disinformation-election.html\"\u003EChaos Is the Point'\u003C\/a\u003E,\" is based almost entirely on \"interviews with dozens of officials and experts,\" though the only government official named in the article is Shelby Pierson, the intelligence community's election threats executive. The most quoted experts named in the article are Ben Nimmo, formerly of the hawkish, NATO-funded Atlantic Council and now with Graphika, and Laura Rosenberger, director of the neoconservative-created Alliance for Securing Democracy. The article nonetheless cites \"American officials\" and \"current and former officials\" several times to make claims about imminent election interference that paint a bleak picture of the current election season.\u003C\/p\u003E\u003Cp\u003EA recent article \u003Ca href=\"https:\/\/thehill.com\/policy\/cybersecurity\/478845-acting-dhs-secretary-says-he-expects-russia-to-attempt-to-interfere-in\"\u003Efrom The Hill\u003C\/a\u003E relies on the acting head of DHS, Chad Wolf, as its only source, citing Wolf's claim that \"we fully expect Russia to attempt to interfere in the 2020 elections to sow public discord and undermine our democratic institutions\" amid other warnings that Wolf gave about Chinese and Iranian cyber threats to U.S. elections. Other articles, including one titled \"\u003Ca href=\"https:\/\/www.rollcall.com\/news\/campaigns\/russia-china-plan-adjust-tactics-hack-influence-2020-elections\"\u003ERussia, China plan to adjust their tactics to hack, influence 2020 elections\u003C\/a\u003E\" cite only Shelby Pierson of the U.S. intelligence community as its source for that headline's claim. Another titled \"\u003Ca href=\"https:\/\/www.csmonitor.com\/USA\/Politics\/2019\/1030\/Russia-isn-t-the-only-threat-to-2020-elections-says-U.S.-intel\"\u003ERussia isn't the only threat to 2020 elections, says U.S. intel\u003C\/a\u003E\" cites only anonymous U.S. intelligence officials, as the headline suggests.\u003C\/p\u003E\u003Cp\u003EThough Russia and China have consistently been named as the most likely election meddlers, reports have also been drumming up the likelihood that Iran will emerge as 2020's foreign meddler of choice, especially in the months prior to and weeks after \u003Ca href=\"https:\/\/www.mintpressnews.com\/dubious-official-story-qassem-soleimani-assassination\/263869\"\u003Ethe killing of Iranian General Qassem Soleimani by the Trump administration\u003C\/a\u003E. A recent \"informal poll\" conducted by the \u003Ci\u003EWashington Post\u003C\/i\u003E asked hawkish think tank fellows, employees at companies like Raytheon and current and former federal officials if Iran would likely retaliate against the U.S. via cyberattack. The \u003Ci\u003EPost\u003C\/i\u003E ran the results of the poll under the headline \"\u003Ca href=\"https:\/\/www.washingtonpost.com\/news\/powerpost\/paloma\/the-cybersecurity-202\/2020\/01\/13\/the-cybersecurity-202-get-ready-for-serious-cyberattacks-from-iran-experts-say\/5e1b7ef288e0fa2262dcbc70\"\u003EGet ready for serious cyberattacks from Iran, experts say\u003C\/a\u003E.\"\u003C\/p\u003E\u003Cp\u003EDespite the media's \u003Ca href=\"https:\/\/www.politico.com\/news\/2020\/01\/03\/iran-retaliation-qassem-soleimani-093608\"\u003Enumerous\u003C\/a\u003E \u003Ca href=\"https:\/\/www.usatoday.com\/story\/tech\/2020\/01\/03\/how-much-damage-could-iran-cyber-attacks-do\/2803599001\"\u003Ewarnings of imminent\u003C\/a\u003E and \u003Ca href=\"https:\/\/www.timesofisrael.com\/iranian-cyberattacks-on-us-feared-after-soleimani-killing\"\u003E\"serious\" cyber-retaliation\u003C\/a\u003E from Iran, the only cyberattack attributed to the country after Soleimani's death was the vandalism of the Federal Depository Library Program website, a rather benign act that was nevertheless blasted across headlines such as \"\u003Ca href=\"https:\/\/www.usatoday.com\/story\/news\/nation\/2020\/01\/05\/iran-hack-homeland-security-website-hacked-image-bloody-trump\/2818308001\"\u003EUS government website hacked with pro-Iranian messages, image of bloodied Trump\u003C\/a\u003E.\" The U.S. government is quoted in that article as saying that \"At this time, there is no confirmation that this was the action of Iranian state-sponsored actors.\"\u003C\/p\u003E\u003Cp\u003EAlso notably absent from media reports is the fact that \u003Ca href=\"https:\/\/www.mintpressnews.com\/cia-umbrage-carry-false-flag-cyber-attacks\/225638\"\u003EWikiLeaks revealed in 2017\u003C\/a\u003E that the CIA had stockpiled a library of \"stolen\" cyberattack techniques produced in other nations, including Russia and Iran. Those revelations, part of the Vault 7 release, revealed that the CIA's UMBRAGE group was capable of \"misdirect[ing] attribution [for cyberattacks actually done by the CIA] by leaving behind the 'fingerprints' of the groups that the attack techniques were stolen from.\" In other words, the CIA was more than capable of conducting \"false flag\" cyber attacks and blaming them on foreign actors.\u003C\/p\u003E\u003Cp\u003ENotably, one of the viruses being \u003Ca href=\"https:\/\/www.scientificamerican.com\/article\/how-iran-can-still-use-cyber-and-drone-technology-to-attack-the-u-s\"\u003Eblamed on Iran for cyberattacks\u003C\/a\u003E targeting the U.S. ahead of the 2020 election - called Shamoon - was \"stolen\" by the CIA's UMBRAGE and \u003Ca href=\"https:\/\/wikileaks.org\/ciav7p1\/cms\/page_2621753.html\"\u003Ecited in the WikiLeaks release\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003E\u003Cb\u003EConflict of interest-ridden Microsoft \"defends democracy\"\u003C\/b\u003E\u003C\/p\u003E\u003Cp\u003ELast year saw the tech behemoth Microsoft join the effort to blame foreign state actors, specifically Iran, for cyberattacks against the U.S. This helped to bolster assertions that had largely originated with a handful of U.S. intelligence officials and hawkish, neoconservative-aligned think tanks as media reports on Microsoft's related claims treated the company as an independent private sector observer.\u003C\/p\u003E\u003Cp\u003EYet, as \u003Ci\u003EMintPress\u003C\/i\u003E investigations have revealed, Microsoft has clear conflicts of interest with respect to election interference. Its \"Defending Democracy\" program has spawned tools like \"\u003Ca href=\"https:\/\/www.mintpressnews.com\/newsguardneocon-backed-fact-checker-plans-to-wage-war-on-independent-media\/253687\"\u003ENewsGuard\u003C\/a\u003E\" and \"\u003Ca href=\"https:\/\/www.mintpressnews.com\/microsoft-electionguard-a-trojan-horse-for-a-military-industrial-takeover-of-us-elections\/258732\"\u003EElectionGuard\u003C\/a\u003E\" that it claims will help protect U.S. democracy, but - upon closer examination - instead have the opposite effect.\u003C\/p\u003E\u003Cp\u003ELast January, \u003Ca href=\"https:\/\/www.mintpressnews.com\/newsguardneocon-backed-fact-checker-plans-to-wage-war-on-independent-media\/253687\"\u003EMintPress exposed\u003C\/a\u003E NewsGuard's neoconservative backers and how special interest groups were backing the program in an effort to censor independent journalism under the guise of the fight against \"fake news.\" \u003Ca href=\"https:\/\/www.mintpressnews.com\/microsoft-electionguard-a-trojan-horse-for-a-military-industrial-takeover-of-us-elections\/258732\"\u003ESubsequent investigations\u003C\/a\u003E revealed the risk that Microsoft's ElectionGuard poses to U.S. voting machines, which it claims to make more secure and how the platform was developed by companies closely tied to the Pentagon's infamous research branch DARPA and Israeli military intelligence Unit 8200.\u003C\/p\u003E\u003Cp\u003EElecionGuard software has since been adopted by numerous voting machine manufacturers and is slated to be used in some Democratic Primary votes. Notably, the push for the adoption of ElectionGuard software has been spearheaded by the recently created Cybersecurity and Infrastructure Security Agency (CISA), which is the federal agency tasked with overseeing election security and is headed by Christopher Krebs, \u003Ca href=\"https:\/\/www.cisa.gov\/ChristopherCKrebs\"\u003Ea former high level Microsoft executive\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003EIn recent months, Microsoft has also been at the center of claims that Iran attempted to hack U.S. presidential campaigns ahead of 2020 as well as claims that Iran plans to target the U.S. power grid and other critical infrastructure with cyberattacks.\u003C\/p\u003E\u003Cp\u003ELast October, Microsoft penned \u003Ca href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2019\/10\/04\/recent-cyberattacks-require-us-all-to-be-vigilant\"\u003Ea blog post\u003C\/a\u003E discussing a \"threat group\" it named Phosphorus that they \"believe originates from Iran and is linked to the Iranian government.\" The post went on to claim that Phosphorus attempted to target a U.S. presidential campaign, which later media reports claimed was President Trump's re-election campaign. Microsoft concluded that the attempt was \"not technically sophisticated\" and ultimately unsuccessful, but felt compelled to disclose it and link it to Iran's government.\u003C\/p\u003E\u003Cp\u003EThough it provided no evidence for the hack or its reasons for \"believing\" that the attack originated from Iran, media reports treated Microsoft's declaration as proof that Iran had begun actively meddling in the 2020 election. Headlines such as \"\u003Ca href=\"https:\/\/www.nytimes.com\/2019\/10\/04\/technology\/iranian-campaign-hackers\u003Cbr \/\u003E\nsoft.html\"\u003EIranian Hackers Target Trump Campaign as 2020 Threats Mount\u003C\/a\u003E,\" \"\u003Ca href=\"https:\/\/threatpost.com\/iran-linked-hackers-target-trump-2020-campaign\u003Cbr \/\u003E\nsoft-says\/148931\"\u003EIran-linked Hackers Target Trump 2020 Campaign, Microsoft says\u003C\/a\u003E\", \"\u003Ca href=\"https:\/\/www.usatoday.com\/story\/news\/politics\/elections\/2019\/10\/04\/election-2020-campaign-government-officials-targeted-iran-hackers\/3865817002\"\u003EMicrosoft\u003C\/a\u003E\" and \"\u003Ca href=\"https:\/\/www.npr.org\/2019\/10\/04\/767274042\/microsoft-says-iranians-tried-to-hack-u-s-presidential-campaign\"\u003EMicrosoft Says Iranians Tried To Hack U.S. Presidential Campaign\u003C\/a\u003E,\" were blasted across the front pages of American media. None of the reports scrutinized Microsoft's claims or noted the clear conflict of interest Microsoft had in making such claims due to its efforts to see its own ElectionGuard Software adopted nationwide.\u003C\/p\u003E\u003Cp\u003E\u003Cimg style=\"max-width:100%\" src=\"http:\/\/newsnet.fr\/img\/newsnet_168729_6b47ce.jpg\" \/\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ci\u003EMicrosoft CEO Satya Nadella discusses 740 alleged infiltration attempts by nation-state actors at a conference in Seattle, May 6, 2019. Elaine Thompson | AP\u003C\/i\u003E\u003C\/p\u003E\u003Cp\u003EMedia reports also left out the fact that Microsoft is a major government contractor for \u003Ca href=\"https:\/\/www.bloomberg.com\/news\/articles\/2018-05-16\/microsoft-wins-lucrative-cloud-deal-with-intelligence-community\"\u003Ethe U.S. intelligence community\u003C\/a\u003E and \u003Ca href=\"https:\/\/www.cnbc.com\/2019\/10\/31\/microsoft-wins-pentagons-jedi-contract-and-the-cloud-wars-heat-up.html\"\u003Ethe Pentagon\u003C\/a\u003E. Notably, the Trump campaign, which Microsoft said was the target of this attack, was later identified as \u003Ca href=\"https:\/\/threatpost.com\/iran-linked-hackers-target-trump-2020-campaign\u003Cbr \/\u003E\nsoft-says\/148931\"\u003Ethe only major presidential campaign\u003C\/a\u003E using Microsoft's \"\u003Ca href=\"https:\/\/www.microsoftaccountguard.com\/en-us\"\u003EAccountGuard\u003C\/a\u003E\" software, part of its dubious \"Defending Democracy\" program that also spawned NewsGuard and ElectionGuard. AccountGuard claims to protect campaign-linked emails and data from hackers.\u003C\/p\u003E\u003Cp\u003EMicrosoft surfaced not long after, again claiming that Iran was maliciously targeting the United States' civilian infrastructure. This subsequent claim was first published by \u003Ca href=\"https:\/\/www.wired.com\/story\/iran-apt33-industrial-control-systems\"\u003EWired\u003C\/a\u003E and \u003Ca href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2019\/11\/21\/iranian-hackers-could-be-going-after-a-disturbing-new-physical-target\"\u003Elater covered by other outlets\u003C\/a\u003E. Those reports cite a single person, Microsoft security researcher Ned Moran, who claimed that an Iran-backed hacking group called APT33 was targeting the U.S. \"physical control systems used in electric utilities, manufacturing, and oil refineries.\"\u003C\/p\u003E\u003Cp\u003E\"They're trying to deliver messages to their adversaries and trying to compel and change their adversaries' behavior,\" Moran told \u003Ci\u003EWired\u003C\/i\u003E. Moran also stated that \"Microsoft \u003Cb\u003Ehasn't seen direct evidence\u003C\/b\u003E of APT33 carrying out a disruptive cyberattack rather than mere espionage or reconnaissance, it's seen incidents where the group has \u003Cb\u003Eat least laid the groundwork\u003C\/b\u003E for those attacks (emphasis added).\"\u003C\/p\u003E\u003Cp\u003E\u003Cb\u003ECybereason helps craft the narrative\u003C\/b\u003E\u003C\/p\u003E\u003Cp\u003EWhile U.S. intelligence officials and media outlets alike have been largely responsible for setting the narrative that imminent meddling will be conducted by Russia, China and Iran, key components of that narrative, particularly with respect to China and Iran, have been laid by Cybereason, a company that recently ran \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-israel-tech-firm-doomsday-election-simulations\/263886\"\u003E2020 doomsday election simulations\u003C\/a\u003E and that has close ties to the intelligence communities of both the U.S. and Israel.\u003C\/p\u003E\u003Cp\u003E(1213209753368838144)\u003C\/p\u003E\u003Cp\u003EShortly after the killing of Iranian General Qassem Soleimani earlier this month, an operation \u003Ca href=\"https:\/\/www.jpost.com\/Middle-East\/Israeli-intel-helped-the-US-assassinate-Soleimani-report-613899\"\u003Econducted in concert with\u003C\/a\u003E Israeli intelligence, \u003Ca href=\"https:\/\/www.cybereason.com\/blog\/is-cyber-retaliation-from-iran-imminent\"\u003ECybereason warned\u003C\/a\u003E that Iran could imminently retaliate with a cyber threat and quoted its own employees who explained what and how Iran would likely target in retaliation. Cybereason's CSO Sam Curry, who actively participated in the firm's 2020 doomsday election simulations, \u003Ca href=\"https:\/\/www.cybereason.com\/blog\/is-cyber-retaliation-from-iran-imminent\"\u003Estated\u003C\/a\u003E:\u003C\/p\u003E\u003Cblockquote\u003EThis means that Iran's \"forceful revenge\" response is likely to be less about the flash and all about the bang. If you have connected systems that are responsible for kinetic world effects, like \u003Cb\u003EICS systems and critical infrastructure around water, energy or vital services\u003C\/b\u003E, it's time to pay attention. Iran and the US are engaged in Cyber brinksmanship, which means that \u003Cb\u003Ethe gloves are off as Iran picks it's targets\u003C\/b\u003E (emphasis added).\"\u003C\/blockquote\u003E\u003Cp\u003ECybereason \u003Ca href=\"https:\/\/www.cybereason.com\/blog\/is-cyber-retaliation-from-iran-imminent\"\u003Ealso quoted\u003C\/a\u003E visiting fellow for the National Security Institute and former advisor to the U.S. Secret Service (which participated in Cyberaeson's election simulations), Anne Marie Zettlemoyer, who claimed that Iran could soon target Wall Street and critical U.S. infrastructure like the power grid:\u003C\/p\u003E\u003Cblockquote\u003EAn attack against the financial systems can be devastating economically and weaken the confidence and viability of markets. However, we cannot ignore the physical consequences and manifestations that can come from a cyberattack, particularly against critical infrastructure like energy and industry control systems.\"\u003C\/blockquote\u003E\u003Cp\u003ECybereason's claims regarding Iran's interest in \"critical infrastructure\" systems likely originated with Microsoft, the claims were then parroted by the media in several reports, \u003Ca href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2019\/11\/21\/iranian-hackers-could-be-going-after-a-disturbing-new-physical-target\"\u003Emany of which quoted\u003C\/a\u003E Cybereason's Sam Curry. Curry is also \u003Ca href=\"https:\/\/www.forbes.com\/sites\/samcurry\/#874b6a524b69\"\u003Ea contributor\u003C\/a\u003E to major news outlets like \u003Ci\u003EForbes\u003C\/i\u003E where he writes \u003Ca href=\"https:\/\/www.forbes.com\/sites\/samcurry\/2019\/06\/26\/cyber-brinksmanship-iran-and-the-us-posture-on-the-cyber-front\/#497504619718\"\u003Eabout Iran's cyber warfare\u003C\/a\u003E capabilities.\u003C\/p\u003E\u003Cp\u003E(1197592560685985797)\u003C\/p\u003E\u003Cp\u003ENotably, in Cybereason's recent allegations against Iran, it states that \"it's clear that Iran has been preparing for\u003Ca href=\"https:\/\/www.forbes.com\/sites\/samcurry\/2019\/01\/14\/the-great-game-of-cyber-nations\"\u003Efuture geopolitical conflict\u003C\/a\u003E by gaining access to critical infrastructure and other important operations in the United States.\" It backs these claims by citing an article authored by Curry for \u003Ci\u003EForbes\u003C\/i\u003E. Following Soleimani's death, numerous media reports, including in \u003Ca href=\"https:\/\/www.independent.co.uk\/voices\/iran-attack-revenge-world-war-three-ww3-us-what-next-now-latest-a9270631.html\"\u003Ethe UK's The Independent\u003C\/a\u003E and \u003Ca href=\"https:\/\/abcnews.go.com\/Politics\/experts-urge-vigilance-cyber-systems-amid-escalation-iran\/story?id=68095650\"\u003EABC News\u003C\/a\u003E, have cited Curry as an \"expert\" source in claiming that Iran would retaliate with cyberattacks.\u003C\/p\u003E\u003Cp\u003EMicrosoft's claims about foreign hackers and meddling - the evidence for which have never been made public but has been parroted as fact nonetheless - are frequently supported by Cybereason.\u003C\/p\u003E\u003Cp\u003ELast August, Microsoft claimed to have foiled Russian attempts at hacking two Republican-affiliated think tanks and, despite providing no evidence, Cybereason's then-senior director of intelligence services Ross Rustici was \u003Ca href=\"https:\/\/www.technewsworld.com\/story\/Microsoft-Foils-Russian-Attack-on-GOP-Think-Tanks-85524.html\"\u003Equoted as an expert\u003C\/a\u003E in several media reports as saying that such behavior was to be expected from Russia. In one such report, Rustici stated:\u003C\/p\u003E\u003Cblockquote\u003EWe're very good at fighting the last war, but the Russians are very good at evolving their game. I suspect if they're going to do a psychological operation around the elections, the way they do it will be different than what they did in 2016. How effective the defenses we've built for what they did in 2016 will be for those attacks is yet to be seen.\"\u003C\/blockquote\u003E\u003Cp\u003ENone of the media reports quoting Rustici mentioned Cybereason's ties to Israeli intelligence, referring to tech firms only a \"Boston-based cybersecurity company\" and similar variants. Cybereason's Intelligence Group \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-israel-tech-firm-doomsday-election-simulations\/263886\"\u003Eis stuffed\u003C\/a\u003E with former and \u003Ci\u003Eactive\u003C\/i\u003E members of U.S. and Israeli intelligence services and \u003Ca href=\"https:\/\/www.cybereason.com\/blog\/blog-russia-nation-state-hacking-the-countrys-dedicated-policy-of-strategic-ambiguity\"\u003Ehas released several\u003C\/a\u003E reports about nation-state hacking with a focus on Russia and China.\u003C\/p\u003E\u003Cp\u003ECybereason has also been at the forefront of claims that China has been engaged in aggressive cyberattacks against multinational companies that have also seen widespread coverage in U.S. media, despite the untransparent nature of the evidence for Cybereason's claims.\u003C\/p\u003E\u003Cp\u003EIn a story that received major coverage from outlets such as \u003Ca href=\"https:\/\/www.foxnews.com\/tech\/chinese-attacks-telecommunications-providers\"\u003EFox News\u003C\/a\u003E\u003Ci\u003E,\u003C\/i\u003E \u003Ca href=\"https:\/\/www.cnbc.com\/2019\/06\/25\/hackers-hit-telecommunications-firms-cybereason.html\"\u003EReuters, CNBC\u003C\/a\u003E and \u003Ca href=\"https:\/\/www.houstonchronicle.com\/techburger\/article\/Security-Firm-Says-High-Degree-of-Certainty-14044284.php\"\u003Eothers\u003C\/a\u003E, Cybereason unveiled what it called \"\u003Ca href=\"https:\/\/www.cybereason.com\/blog\/operation-soft-cell-a-worldwide-campaign-against-telecommunications-providers\"\u003EOperation Soft Cell\u003C\/a\u003E,\" an operation that stole mass troves of data from several global telecommunications companies. In each story, Cybereason is the sole source of the claim and declined to provide the name or location of any of the affected companies. The firm also claimed to have determined that the attack was \u003Ci\u003Elikely\u003C\/i\u003E perpetrated by someone \"backed by a nation state, and is affiliated with China.\" It further \u003Ca href=\"https:\/\/www.houstonchronicle.com\/techburger\/article\/Security-Firm-Says-High-Degree-of-Certainty-14044284.php\"\u003Eclaimed to have debriefed\u003C\/a\u003E and coordinated responses with U.S. intelligence.\u003C\/p\u003E\u003Cp\u003EIn an article for \u003Ca href=\"https:\/\/www.cnbc.com\/2019\/06\/25\/hackers-hit-telecommunications-firms-cybereason.html\"\u003EReuters\u003C\/a\u003E, Cybereason stated that \"this time as opposed to in the past we are sure enough to say that the attack originated in China\" while Cybereason separately told \u003Ca href=\"https:\/\/www.cyberscoop.com\/china-telecom-hacking-cybereason\"\u003ECyberScoop\u003C\/a\u003E that it had \"found hacking tools such as a modified web shell and a remote access trojan that are commonly associated with, but not unique to, Chinese hackers.\" Despite the incongruity, media reports laid the blame squarely on China, as seen in headlines such as \"\u003Ca href=\"https:\/\/www.cyberscoop.com\/china-telecom-hacking-cybereason\"\u003EChinese spies have been sucking up call records at multinational telecoms, researchers say\u003C\/a\u003E.\"\u003C\/p\u003E\u003Cp\u003EPrior to uncovering Operation Soft Cell, Cybereason had warned on its blogs in the months and years prior that China \u003Ca href=\"https:\/\/www.cybereason.com\/blog\/trade-war-china-us-cyberattack\"\u003Ewould imminently target\u003C\/a\u003E \u003Ca href=\"https:\/\/www.cybereason.com\/blog\/china-us-trade-war-cyberattack-increase\"\u003EU.S. companies\u003C\/a\u003E. The revelation of Operation Soft Cell - which originated exclusively with Cybereason - has been used to build the case that China is \u003Ca href=\"https:\/\/www.bostonherald.com\/2019\/07\/01\/cyber-warfare-is-here\"\u003Eopenly engaged in cyberwarfare\u003C\/a\u003E against its rival states, like the United States, and targeting \"\u003Ca href=\"https:\/\/www.lowyinstitute.org\/the-interpreter\/cyber-threats-go-beyond-hackers-and-scams-democracy-itself\"\u003Edemocracy itself\u003C\/a\u003E.\"\u003C\/p\u003E\u003Cp\u003E\u003Cb\u003EBest Known Deep Fake Creator is Funded by Israeli Intelligence\u003C\/b\u003E\u003C\/p\u003E\u003Cp\u003EWhile the media, and even Cybereason itself, have helped lay the foundation to blame specific state actors for 2020 election meddling well ahead of the fact, it is worth revisiting Cybereason's \"Operation Blackout\" election simulation and the tactics used by the \"bad actors\" in that scenario.\u003C\/p\u003E\u003Cp\u003EThat simulation, discussed in detail in the \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-israel-tech-firm-doomsday-election-simulations\/263886\"\u003Efirst installment of this series\u003C\/a\u003E, saw the weaponization of specific technologies, namely deep fakes, hacks of Internet of Things (IoT) devices and hacks of vehicles, in order to target the 2020 U.S. election, resulting in the cancellation of the election and the imposition of martial law.\u003C\/p\u003E\u003Cp\u003EGiven the current narrative regarding what state actors are likely to meddle in the 2020 election - namely Russia, China and Iran - and the tactics they will allegedly use, it is important to explore the sources of the technologies weaponized per that narrative as well as in \"Operation Blackout.\"\u003C\/p\u003E\u003Cp\u003EIndeed, if there is any clear overlap between the creators of those technologies and the state actors being blamed in advance for their imminent use, it would certainly lend credibility to the claims promoted by U.S. intelligence, the media and companies like Microsoft and Cybereason.\u003C\/p\u003E\u003Cp\u003EYet, upon closer examination, it becomes clear that the companies and state actors most involved in developing these technologies are the very ones claiming that Russia, China and Iran will use them to undermine the 2020 election.\u003C\/p\u003E\u003Cp\u003ETake for instance the use of deep fakes. Not only have numerous media reports focused on how deep fakes\u003Ca href=\"https:\/\/qz.com\/1660737\/deepfakes-will-influence-the-2020-election\"\u003Ewill be used\u003C\/a\u003E to meddle in the 2020 elections, but Cybereason's doomsday election simulation saw \"bad actors\" rely heavily on their use to spread disinformation and even make fake bomb threats. While much has been said of the coming election and deep fakes, remarkably few reports have bothered to look at the company best known for creating viral deep fakes.\u003C\/p\u003E\u003Cp\u003ECanny AI has garnered considerable media attention over the past few years for its persuasive deep fake videos that have frequently gone viral. In the last year alone, the tech firm's viral deep fakes have included a \u003Ca href=\"https:\/\/uk.pcmag.com\/news\/121244\/ai-created-video-tests-facebooks-efforts-to-stop-misinformation\"\u003Econtroversial video of Mark Zuckerberg\u003C\/a\u003E where the Facebook co-founder appears to be saying \"Imagine this for a second: One man, with total control of billions of people's stolen data, all their secrets, their lives, their futures,\" as well as a video \u003Ca href=\"https:\/\/www.wbur.org\/news\/2019\/11\/22\/mit-nixon-deep-fake\"\u003Eshowing Richard Nixon\u003C\/a\u003E giving a speech he never actually gave. More recently, Canny AI was behind \u003Ca href=\"https:\/\/www.businessinsider.com\/video-boris-johnson-endorses-jeremy-corbyn-in-convincing-deepfake-2019-11\"\u003Ethe viral videos immediately prior to the 2019 U.K. general election\u003C\/a\u003E that appeared to show Jeremy Corbyn and his rival Boris Johnson endorsing each other and another video that showed world leaders singing John Lennon's \"Imagine\".\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\"http:\/\/youtube.com\/watch?v=OmB7fmi8JwY\" target=\"_blank\"\u003E\u003Cspan class=\"philum ic-chain\"\u003E\u003C\/span\u003E youtube\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003EOddly, many of the media reports that discuss these viral videos fail to mention the role of Canny AI in creating these viral deep fakes and instead only mention the organization or artists with whom Canny AI partnered to create them. For instance, the Corbyn-Johnson videos were \u003Ca href=\"https:\/\/www.businessinsider.com\/video-boris-johnson-endorses-jeremy-corbyn-in-convincing-deepfake-2019-11\"\u003Ereported to have been produced\u003C\/a\u003E \u003Ca href=\"https:\/\/www.digitaltrends.com\/news\/uk-election-deepfake-video-boris-johnson-jeremy-corbyn-2020\"\u003Eby the group Future Advocacy\u003C\/a\u003E and artist Bill Posters, but it was actually Canny AI that \u003Ca href=\"https:\/\/www.cannyai.com\"\u003Ecreated those videos\u003C\/a\u003E for that group. Similarly, the Nixon Speech deep fake was reported \u003Ca href=\"https:\/\/www.wbur.org\/news\/2019\/11\/22\/mit-nixon-deep-fake\"\u003Eby several outlets\u003C\/a\u003E as having been solely created by MIT's Center for Advanced Virtuality. However, \u003Ca href=\"https:\/\/www.bostonglobe.com\/2019\/12\/14\/opinion\/moon-landing\"\u003Ethe Boston Globe noted\u003C\/a\u003E that \"the [MIT] team worked with Canny AI, an Israeli company that does Video Dialogue Replacement, and Respeecher, a Ukrainian startup specializing in speech-to-speech synthetic voice production\" to create the video.\u003C\/p\u003E\u003Cp\u003EThe Zuckerberg deep fake that Canny AI created led to lots of positive press for the company, with \u003Ca href=\"https:\/\/www.sciencetimes.com\/articles\/24140\/20191023\/israeli-tech-firm-uses-deepfake-dub-videos-language.htm\"\u003Eseveral media reports\u003C\/a\u003E dubbing them as the company using \"deep fakes for good\" and that \u003Ca href=\"https:\/\/www.newscientist.com\/article\/2220628-deepfakes-are-being-used-to-dub-adverts-into-different-languages\"\u003Euses the controversial technology \"responsibly.\"\u003C\/a\u003E The Zuckerberg deep fake has been cited as one of the main drivers behind Facebook's\u003Ca href=\"https:\/\/www.forbes.com\/sites\/johnbbrandon\/2020\/01\/13\/facebook-bans-deepfake-videos-that-could-sway-voters-but-is-it-enough\/#7e66a55a476b\"\u003Enew \"deep fake\" policy\u003C\/a\u003E, which only bans \u003Ci\u003Esome\u003C\/i\u003E deep fake videos and has been criticized by U.S. lawmakers as insufficient. Notably, neither Facebook nor Facebook-owned Instagram \u003Ca href=\"https:\/\/www.technologyreview.com\/f\/613690\/facebook-deepfake-zuckerberg-instagram-social-media-election-video\"\u003Eever took down\u003C\/a\u003E Canny AI's deep fake of Zuckerburg.\u003C\/p\u003E\u003Cp\u003EGiven the concern over deep fakes in relation to the coming election and Canny AI standing out as the main producer of deep fakes that have gone viral over the past year, it is important to point out that Canny AI has ties to a state actor with a history of election meddling: the state of Israel.\u003C\/p\u003E\u003Cp\u003EIndeed, Canny AI is \u003Ca href=\"https:\/\/finder.startupnationcentral.org\/company_page\/canny-ai\"\u003E100 percent funded\u003C\/a\u003E by an Israeli start-up accelerator called\u003Ca href=\"https:\/\/www.tauventures.co.il\/programs\/the-xcelerator\"\u003EXcelerator\u003C\/a\u003E, a joint venture between Tel Aviv University and Israeli intelligence agency Shin Bet (sometimes called Shabak). \u003Ca href=\"https:\/\/finder.startupnationcentral.org\/program_page\/xcelerator\"\u003EAccording to Start Up Nation Central\u003C\/a\u003E, the Paul Singer-created organization that \u003Ca href=\"https:\/\/www.mintpressnews.com\/neocon-billionaire-paul-singer-driving-outsourcing-us-tech-jobs-israel\/259147\"\u003Epromotes\u003C\/a\u003E Israeli technology start ups, Xcelerator-funded \"start-ups participating in the program benefit from \u003Cb\u003Eclose mentoring from content and technology experts from the Shabak\u003C\/b\u003E, experts from Tel Aviv University, and industry leaders. \u003Cb\u003EThe connection to the Shabak also provides the entrepreneurs with ways to test the capabilities of their technologies\u003C\/b\u003E and cooperation opportunities (emphasis added).\"\u003C\/p\u003E\u003Cp\u003EIn addition, \u003Ca href=\"https:\/\/www.tauventures.co.il\/partners\"\u003EXcelerator is partnered\u003C\/a\u003E not only with Israeli intelligence directly, but also with Cybereason, \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-israel-tech-firm-doomsday-election-simulations\/263886\"\u003Ethe very company\u003C\/a\u003E that explored the use of deep fakes in the 2020 U.S. presidential election that saw the election cancelled and martial law declared as well as a company that itself has \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-israel-tech-firm-doomsday-election-simulations\/263886\"\u003Edeep ties to Israeli intelligence\u003C\/a\u003E. \u003Ca href=\"https:\/\/www.tauventures.co.il\/partners\"\u003EOther notable partners of Xcelerator\u003C\/a\u003E include NEC Corp, \u003Ca href=\"https:\/\/www.thetechrevolutionist.com\/2017\/08\/nec-contributes-to-softbanks-new-twin.html\"\u003Ewhich has\u003C\/a\u003E \u003Ca href=\"http:\/\/www.iotleague.com\/softbank-partners-with-nec-for-its-iotm2m-service-platform-connexive\"\u003Eintimate ties\u003C\/a\u003E to \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-investors-offer-israeli-spy-classified-intelligence\/264095\"\u003Etop Cybereason investor Softbank\u003C\/a\u003E; Check Point Technologies, which has ties to Israeli military intelligence Unit 8200; and the Israeli start-up accelerator Team8. In previous \u003Ca href=\"https:\/\/www.mintpressnews.com\/neocon-billionaire-paul-singer-driving-outsourcing-us-tech-jobs-israel\/259147\"\u003Ereports published by MintPress\u003C\/a\u003E, Team8 was discussed in detail, particularly their recent hire of former director of the NSA and former head of U.S. Cyber Command Mike Rogers, and their close ties to Paul Singer's \u003Ci\u003EStart Up Nation Central\u003C\/i\u003E, which itself has \u003Ca href=\"https:\/\/www.mintpressnews.com\/neocon-billionaire-paul-singer-driving-outsourcing-us-tech-jobs-israel\/259147\"\u003Edeep ties to U.S. neoconservatives\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003EIt is also worth noting that Xcelerator \u003Ca href=\"https:\/\/www.tauventures.co.il\/programs\/the-xcelerator\"\u003Ealso backs\u003C\/a\u003E an \"anti-fake news\" start-up called Cyabra, which has \u003Ca href=\"https:\/\/www.calcalistech.com\/ctech\/articles\/0,7340,L-3740002,00.html\"\u003Edirect ties to Israel's Mossad\u003C\/a\u003E and offers its AI-driven \"disinformation protection\" to government agencies as well as politicians, particularly during election seasons. Two of Cyabra's co-founders previously \u003Ca href=\"https:\/\/en.globes.co.il\/en\/article-identifying-fraud-in-business-intelligence-1001246345\"\u003Eco-founded Psy-Group\u003C\/a\u003E, which attempted to interfere in the 2016 U.S. election by weaponizing \"fake news\" and social media and later \u003Ca href=\"https:\/\/www.chicagotribune.com\/nation-world\/ct-mueller-trump-jr-israel-meeting-20180522-story.html\"\u003Eclosed down its operations\u003C\/a\u003E after U.S. government scrutiny into its activities began as part of the Mueller investigation.\u003C\/p\u003E\u003Cp\u003EPsy-Group also engaged in doxxing campaigns targeting Palesintian rights activists in the U.S. which were \u003Ca href=\"https:\/\/www.businessinsider.com\/psy-group-mossad-who-courted-trump-conducted-local-election-campaigns-2019-2\"\u003Eplanned in conjunction\u003C\/a\u003E with Ram Ben-Barak, the former deputy director of the Mossad who now advises Cyabra. Given that much of the concern ahead of the next election is related not only to deep fakes but also \"fake news,\" Cyabra's rise and its clear ties to Mossad and the now defunct Psy-Group are important to note.\u003C\/p\u003E\u003Cp\u003EFurthermore, in examining the other technologies weaponized during Cybereason's 2020 election simulation and cited in the aforementioned media narrative regarding 2020 meddling, a pattern similar to that of Canny AI emerges.\u003C\/p\u003E\u003Cp\u003EIndeed, the other technologies linked to these \"bad actors\" and foreign meddlers - namely hacking IoT devices and hacking vehicles - are also pioneered by companies with deep ties to Israeli military intelligence, specifically Unit 8200, and Israeli tech companies that have aggressively spied on U.S. government institutions in collusion with Israeli intelligence in the past, \u003Ca href=\"https:\/\/www.mintpressnews.com\/genesis-jeffrey-epstein-bill-clinton-relationship\/261455\"\u003Enamely Comverse (now Verint) and Amdocs\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003E\u003Cb\u003EHacking the Internet of Things\u003C\/b\u003E\u003C\/p\u003E\u003Cp\u003EIn Cybereason's doomsday election simulation, another of the tactics used was the hacking of devices and appliances connected to the internet, often referred to as the Internet of Things (IoT) and which includes everything from smartphones to power grid infrastructure to city traffic lights.\u003C\/p\u003E\u003Cp\u003EWhile most reports on IoT hacks to date have focused on \"lone wolf\" or non-state-aligned actors, one company has stood out for its efforts to create a tool that would allow governments and intelligence agencies to hack these devices with ease. That company, called Toka, \u003Ca href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/07\/15\/toka-will-hack-internet-of-things-for-government-intelligence-agencies\/#531ca9501d0c\"\u003Eannounced in 2018\u003C\/a\u003E that it planned to offer \"a one-stop hacking shop for governments that require extra capability to fight terrorists and other threats to national security in the digital domain,\" with \"a special focus on [hacking] the so-called Internet of Things (IoT), covering tech like Amazon Echo, Nest connected home products, as well as connected fridges, thermostats and alarms.\"\u003C\/p\u003E\u003Cp\u003EThe Israel-based company, which \u003Ca href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/07\/15\/toka-will-hack-internet-of-things-for-government-intelligence-agencies\/#531ca9501d0c\"\u003Eraised $12.5 million\u003C\/a\u003E within months of launching, has since been busy marketing its services to governments around the world, most recently France where it described its product portfolio as \"empower[ing] governments, Intelligence, and law enforcement agencies to enhance Homeland Security with groundbreaking cyber-intelligence and operational capabilities\" \u003Ca href=\"https:\/\/www.linkedin.com\/posts\/tokacyber_5d037-toka-cybercapacitybuilding-activity-6581862784689065984-C6hX\"\u003Eduring an exposition in Paris last November\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003EEven though Toka openly markets the ability to hack private consumer devices to governments and law enforcement agencies around the world, the clear threat to privacy has gone ignored by media outlets as the company has garnered nearly no media attention since it launched nearly two years ago.\u003C\/p\u003E\u003Cp\u003EYet, Toka is not only notable for what it offers but also for its founders and investors. Indeed, the co-founders of Toka have been described as an \"all-star\" team, largely because of the role of former Israeli Prime Minister and former head of Israeli military intelligence, Ehud Barak. Barak, \u003Ca href=\"https:\/\/www.tokagroup.com\"\u003Ein addition to co-founding the company\u003C\/a\u003E, serves as its director and is also the chairman of the board of the controversial Israeli company \u003Ca href=\"https:\/\/www.mintpressnews.com\/neocon-billionaire-paul-singer-driving-outsourcing-us-tech-jobs-israel\/259147\"\u003ECarbyne911\u003C\/a\u003E, which markets software to emergency call centers in the United States. Interestingly, Cybereason's 2020 doomsday election simulation also dealt with the hacking and weaponization of 911 call centers. Also of note is the fact that another of Carbyne911's leadership team, former Unit 8200 commander Pinchas Buchris, is an adviser to Cybereason.\u003C\/p\u003E\u003Cp\u003E\u003Cimg style=\"max-width:100%\" src=\"http:\/\/newsnet.fr\/img\/newsnet_168729_9dfe89.jpg\" \/\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ci\u003EToka's top brass is a who's who of former Israeli military and intelligence officials\u003C\/i\u003E\u003C\/p\u003E\u003Cp\u003EIn addition to Barak, Toka was \u003Ca href=\"https:\/\/www.tokagroup.com\"\u003Eco-founded by\u003C\/a\u003E retired Brigadier General Yaron Rosen, former Chief of the IDF's cyber staff, where he was \"the lead architect of all [IDF] cyber activities\" including those executed by Israeli military intelligence Unit 8200. Rosen, who now serves as Toka's CEO, has stated that Toka's technology will only be sold to countries allied with the U.S. and Israel,\u003Ca href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/07\/15\/toka-will-hack-internet-of-things-for-government-intelligence-agencies\/#531ca9501d0c\"\u003Etelling Forbes\u003C\/a\u003E that \"Russia, China and 'other enemy countries' would never be customers.\"\u003C\/p\u003E\u003Cp\u003EToka's leadership and software architects are similarly tied into Israel's national security state. Several - including the \"architect\" of its hacking software - \u003Ca href=\"https:\/\/www.linkedin.com\/in\/moty-zaltsman\"\u003Epreviously worked\u003C\/a\u003E for Israel's Prime Minister's Office and developed \"\u003Ca href=\"https:\/\/www.linkedin.com\/in\/sofiabelikovetsky\"\u003Eoffensive technologies\u003C\/a\u003E\" for Israel's head of state and other top Toka employees and executives share \u003Ca href=\"https:\/\/www.tokagroup.com\"\u003Enumerous connections\u003C\/a\u003E to Unit 8200, other divisions of Israeli military intelligence and Unit 8200-connected tech companies like Check Point Technologies.\u003C\/p\u003E\u003Cp\u003EThough Toka's leadership team makes its ties to Israeli military intelligence abundantly clear, important connections also appear in examining Toka's investors. One of the major investors in Toka is Dell technologies, one of the world's largest technology companies that was founded by Michael Dell, \u003Ca href=\"https:\/\/www.breakingisraelnews.com\/52318\/exclusive-americas-top-20-richest-pro-israel-zionaires-technology-and-business\"\u003Ea well-known pro-Israel partisan\u003C\/a\u003E who has donated millions of dollars to the Friends of the IDF and \u003Ca href=\"https:\/\/theintercept.com\/2019\/06\/01\/israel-texas-government-relationship\"\u003Eone of the top supporters\u003C\/a\u003E of the so-called \"anti-BDS\" bills that prevent publicly employed individuals or public institutions from supporting non-violent boycotts of Israel, even on humanitarian grounds. It goes without saying that a major technology company investing in a company that markets the hacking of that very technology (computers, IoT, smartphones, etc.) should be a red flag.\u003C\/p\u003E\u003Cp\u003EWith a major foot in the door through its connections to Dell, whose products are used by the private and public sectors around the world, other investors in Toka again reveal its ties to Israel's military intelligence and the same controversial Israeli tech companies that have aggressively spied on the U.S. government in the past - Amdocs and Comverse. For instance, Entr\u00e8e Capital, a venture capital fund that is one of Toka's main investors, \u003Ca href=\"https:\/\/www.entreecap.com\/we\"\u003Eis managed by\u003C\/a\u003E Aviad Eyal and Ran Achituv. The latter, who manages Entr\u00e9e's investment in Toka and \u003Ca href=\"https:\/\/www.linkedin.com\/in\/rachituv\"\u003Esits on Toka's board of directors\u003C\/a\u003E, is the founder of the IDF's satellite-based signals intelligence unit and also \u003Ca href=\"https:\/\/www.linkedin.com\/in\/rachituv\"\u003Ea former senior Vice President\u003C\/a\u003E at both Amdocs and Comverse Infosys (Verint).\u003C\/p\u003E\u003Cp\u003EAnother notable investor in Toka is the venture capital firm Andreesen Horowitz, which is \u003Ca href=\"https:\/\/gigaom.com\/2011\/06\/29\/larry-summers-to-join-vc-firm-andreessen-horowitz\"\u003Eadvised by former Secretary of the Treasury Larry Summers\u003C\/a\u003E, a close friend of the infamous pedophile Jeffery Epstein, whose own ties to Israeli military intelligence have been discussed in several \u003Ci\u003EMintPress\u003C\/i\u003E reports. Epstein was also a close friend of Ehud Barak, co-founder and director of Toka, and invested at least $1 million in another company with close ties to Barak, Carbyne911. The remaining investors in Toka are Launch Capital, which is \u003Ca href=\"https:\/\/www.launchcapital.com\/about\"\u003Edeeply tied to the Pritzker family\u003C\/a\u003E - one of the wealthiest families in the U.S. with close ties to the \u003Ca href=\"https:\/\/www.sj-r.com\/news\/20181001\/clinton-campaigns-in-chicago-for-pritzker\"\u003EClintons\u003C\/a\u003E and \u003Ca href=\"https:\/\/mondoweiss.net\/2013\/05\/pritzkers-support-crucial\"\u003EObamas\u003C\/a\u003E as well as \u003Ca onclick=\"sj(this)\" data-j=\"popup_twit,call__3_https:\/\/twitter.com\/MaxBlumenthal\/status\/1060235976491053056_\" class=\"txtx\"\u003E\u003Cspan class=\"philum ic-tw\" style=\"font-size:16px;\"\u003E\u003C\/span\u003E the U.S.' pro-Israel lobby\u003C\/a\u003E, and \u003Ca href=\"https:\/\/www.redherring.com\/finance\/ray-rothrock-venture-capitalist-cause\"\u003ERay Rothrock\u003C\/a\u003E, a venture capitalist who spent nearly three decades at VenRock, the \u003Ca href=\"https:\/\/fortune.com\/2018\/04\/06\/crypto-vc-venrock-coinfund\"\u003ERockefeller family venture capital fund\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003E\u003Cb\u003EUnit 8200 - From Hacking Cars to Protecting Them?\u003C\/b\u003E\u003C\/p\u003E\u003Cp\u003EArguably the most disturbing aspect of Cybereason's \"Operation Blackout\" election simulation was the hacking of vehicles that were then rammed into civilians waiting in line to vote at polling stations. In the simulation, this led to scores of dead Americans and hundreds of injuries.\u003C\/p\u003E\u003Cp\u003EAs was the case with other technologies used to undermine the 2020 election in the simulation, this technology - the hacking of vehicles - is the bread and butter of an Israeli cybersecurity firm called Upstream Security that specializes in automobiles and boasts deep ties to the country's military intelligence service.\u003C\/p\u003E\u003Cp\u003EThough vehicle hacking seemed out of left field when the 2020 election simulation took place last November, media reports about the imminent dangers of \"car hacking\" began to emerge just a month after the exercise took place, most of which cited a December 2019 report created by Upstream. Some of those reports have warned that \u003Ca href=\"https:\/\/qz.com\/1766367\/how-electric-vehicles-could-be-used-to-hack-the-2020-election\"\u003Ecar hacking could be used\u003C\/a\u003E to undermine the coming U.S. election.\u003C\/p\u003E\u003Cp\u003EOne report titled \"\u003Ca href=\"https:\/\/www.darkreading.com\/edge\/theedge\/car-hacking-hits-the-streets\/b\/d-id\/1336730\"\u003ECar Hacking Hits the Streets\u003C\/a\u003E,\" cites only Upstream's report to claim that \"In 2020, the connected-car market will reach a tipping point, with the majority of vehicles already connected to the Internet when sold in the United States, representing a large base of potential targets for attacks.\" Another report, titled \"\u003Ca href=\"https:\/\/www.cnet.com\/roadshow\/news\/2019-automotive-cyber-hack-security-study-upstream\"\u003ENew study shows just how bad vehicle hacking has gotten\u003C\/a\u003E,\" uses Upstream's report (i.e. study) to claim that hacks of regular vehicles have exploded since 2016 and that most of the cars on U.S. roads today are vulnerable to hackers and that over 80 percent of those hacks occur remotely.\u003C\/p\u003E\u003Cp\u003ENeither report noted Upstream's ties to Israeli military intelligence. Equally notable is the fact that both reports that covered the Upstream-written study say that only manufacturers can address the problem by partnering with a company like Upstream.\u003C\/p\u003E\u003Cp\u003E\u003Cspan class=\"philum ic-img2\"\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ci\u003EA screenshot from an Upstream promotional video\u003C\/i\u003E\u003C\/p\u003E\u003Cp\u003ELucky for Upstream, they have already partnered with a slew of auto manufacturers, including \u003Ca href=\"https:\/\/www.upstream.auto\/company\"\u003EHyundai, Volvo, Renault\u003C\/a\u003E and even U.S. auto insurance giants like \u003Ca href=\"https:\/\/www.bizjournals.com\/columbus\/news\/2019\/10\/22\/nationwide-invests-in-israeli-cybersecurity-firm.html\"\u003ENationwide\u003C\/a\u003E, who now number among Upstream's most important investors. The company's original investors are Charles River Ventures, one of Cybereason's first investors, and Israeli venture capital firm Glilot Capital.\u003C\/p\u003E\u003Cp\u003EGlilot Capital's interest in Upstream is telling given the firm's deep ties to Israel's Unit 8200. Glilot was founded by two former Israeli military intelligence officers and has \"a heavy focus on the cyber sector and the entrepreneurs who emerge from the elite Unit 8200,\" according to \u003Ca href=\"https:\/\/www.jpost.com\/Business-and-Innovation\/Tech\/IDF-vets-of-intel-unit-8200-behind-one-of-the-top-10-VCs-in-the-world-476945\"\u003Ethe Jerusalem Post\u003C\/a\u003E. Even the name of the firm is an homage to Unit 8200, as the unit's main base is located in Glilot, near Herzliya.\u003C\/p\u003E\u003Cp\u003E\"It's as if Americans called a VC Fort Meade Capital [the US Army base in Maryland where the National Security Agency and the United States Cyber Command are headquartered], some VC names are meant to be symbolic, as in our case. Glilot is the home of several of the best intelligence and technology units in the IDF, it's where we came from and it is where we find our best entrepreneurs,\" Glilot Capital co-founder Arik Kleinstein \u003Ca href=\"https:\/\/www.jpost.com\/Business-and-Innovation\/Tech\/IDF-vets-of-intel-unit-8200-behind-one-of-the-top-10-VCs-in-the-world-476945\"\u003Etold the Jerusalem Post\u003C\/a\u003E in 2016.\u003C\/p\u003E\u003Cp\u003EUpstream is certainly the type of company that Glilot Capital is used to investing in. It was founded by two Israelis \u003Ca href=\"https:\/\/www.cyberscoop.com\/upstream-security-9-million-series-a-funding\"\u003Ewho both served\u003C\/a\u003E in the IDF, with one of them serving in an elite intelligence unit. Upstream's co-founders, Yoav Levy and Yonathan Appel, \u003Ca href=\"https:\/\/www.cyberscoop.com\/upstream-security-9-million-series-a-funding\"\u003Emet while working\u003C\/a\u003E at Check Point Technologies, the Unit 8200 alumni-founded company with deep ties to Israel's military intelligence and military-industrial complex as well as the IoT hacking company Toka. Notably, Upstream \u003Ca href=\"https:\/\/www.securityinformed.com\/news\/fujitsu-upstream-security-partnership-vehicle-cyber-security-co-714-ga-co-1579262666-ga.1579264187.html\"\u003Erecently partnered\u003C\/a\u003E with the Japanese company Fujitsu, \u003Ca href=\"https:\/\/asia.nikkei.com\/Business\/Fujitsu-SoftBank-to-let-consumers-simultaneously-use-multiple-payment-services-at-checkout\"\u003Ea longtime partner\u003C\/a\u003E \u003Ca href=\"https:\/\/variety.com\/2014\/biz\/asia\/why-japans-softbank-wants-to-buy-dreamworks-animation-1201315573\"\u003Ewith Softbank\u003C\/a\u003E - Cybereason's main investor.\u003C\/p\u003E\u003Cp\u003ESoftbank \u003Ca href=\"https:\/\/techcrunch.com\/2017\/07\/07\/what-its-like-to-drive-a-car-while-its-being-hacked\"\u003Ehas also invested heavily\u003C\/a\u003E in another Unit 8200-founded vehicle security start-up called Argus Cyber Security, a firm known for its numerous demonstrations showing \u003Ca href=\"https:\/\/techcrunch.com\/2017\/07\/07\/what-its-like-to-drive-a-car-while-its-being-hacked\"\u003Ehow easy it is\u003C\/a\u003E to hack vehicles. Argus is \u003Ca href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2014\/09\/05\/meet-the-former-israeli-cyber-soldiers-hoping-to-stop-hackers-causing-car-crashes\/#79fd667b38e0\"\u003Ealso backed by\u003C\/a\u003E Nadav Zafrir, the former Unit 8200 commander who now runs Team8. Argus' CEO Ofer Ben-Noon, a former captain in Unit 8200, \u003Ca href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2014\/09\/05\/meet-the-former-israeli-cyber-soldiers-hoping-to-stop-hackers-causing-car-crashes\/#79fd667b38e0\"\u003Etold Forbes\u003C\/a\u003E in 2014 that \"Everything will be hacked in every single [car] brand. It will take time, it might be weeks, months, or a couple of years, but eventually it will happen.\"\u003C\/p\u003E\u003Cp\u003ESince then, Unit 8200 alumni from Argus, Upstream and other Israeli automobile cybersecurity firms have shown media outlets around the world how much easier hacking vehicles has become in the years since Ben-Noon first made the claim. \u003Ca href=\"http:\/\/youtube.com\/watch?v=ca-C3voZwpM\" target=\"_blank\"\u003E\u003Cspan class=\"philum ic-chain\"\u003E\u003C\/span\u003E One such report from VICE\u003C\/a\u003E includes a vehicle hacking demonstration, courtesy of a Unit 8200 alumni, and notes that \"most cars today are susceptible to hacker attacks.\"\u003C\/p\u003E\u003Cp\u003EOf course, Unit 8200 isn't the only intelligence agency known to be experts at hacking vehicles. Indeed, in 2017, \u003Ca href=\"https:\/\/thefreethoughtproject.com\/cia-wikileaks-hastings-car-assassination\"\u003EWikiLeaks revealed\u003C\/a\u003E that the CIA was capable of hacking vehicles and exploring their use in committing \"undetectable assassinations.\"\u003C\/p\u003E\u003Cp\u003E\u003Cb\u003E\"Bring down nations to their knees\"\u003C\/b\u003E\u003C\/p\u003E\u003Cp\u003EAt the Tel Aviv Cybertech Conference in 2017, Israeli Prime Minister Benjamin Netanyahu \u003Ca href=\"http:\/\/youtube.com\/watch?v=4x2v0VwgxPc\" target=\"_blank\"\u003E\u003Cspan class=\"philum ic-chain\"\u003E\u003C\/span\u003E stated the following\u003C\/a\u003E:\u003C\/p\u003E\u003Cblockquote\u003EToday warfare has changed dramatically...With a click of a button, you can bring down nations to their knees very rapidly if you so desire and if you're willing to take the risks, because every system can be hacked. Our hospitals, our airplanes, our cars, our banks. The most important word here is our data banks, they can be hacked.\"\u003C\/blockquote\u003E\u003Cp\u003EMedia reports and even members of the Israeli public and private sector \u003Ca href=\"https:\/\/foreignpolicy.com\/2018\/08\/31\/the-rise-of-the-cyber-mercenaries-israel-nso\"\u003Ehave openly acknowledged\u003C\/a\u003E that Israel's intelligence apparatus - from Unit 8200 to the Mossad - remains directly linked to many of the private technology companies founded by its former members, especially in the field of cybersecurity. Though reports on the matter often praise this merging of Israel's public and private spheres, they rarely acknowledge the \u003Ca href=\"https:\/\/www.richardsilverstein.com\/2016\/02\/08\/breaking-unit-8200-hackers-investigated-for-computer-theft\"\u003Edocumented corruption\u003C\/a\u003E within Unit 8200, the unit's dark past in \u003Ca href=\"https:\/\/www.richardsilverstein.com\/2010\/09\/30\/idf-cyber-warfare-unit-8200-press-ganged-felonious-hackers-and-pedophiles-for-service\"\u003Erecruiting felons and even pedophiles\u003C\/a\u003E to join its ranks, or the danger posed by having companies directly linked to foreign intelligence being given access to the U.S. government's \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-investors-offer-israeli-spy-classified-intelligence\/264095\"\u003Emost classified and sensitive systems and data\u003C\/a\u003E.\u003C\/p\u003E\u003Cp\u003EThe last omission is particularly troubling given that Israeli intelligence has not only been caught aggressively \u003Ca href=\"https:\/\/archive.org\/details\/CensoredIsraeliSoftwareSpyingOnUSAmDocsComverseInfosysCarlCameronDec2001\"\u003Eusing private tech companies\u003C\/a\u003E to spy on U.S. federal agencies and networks, but also intercepting \u003Ca href=\"https:\/\/www.timesofisrael.com\/netanyahu-said-to-have-offered-lewinsky-tapes-for-pollard\"\u003Ethe private communications\u003C\/a\u003E \u003Ca href=\"https:\/\/www.juancole.com\/2019\/09\/israel-caught-electronically.html\"\u003Eof at least two U.S. presidents\u003C\/a\u003E and using \u003Ca href=\"https:\/\/www.mintpressnews.com\/category\/epstein-investigation\"\u003Ea notorious pedophile\u003C\/a\u003E to sexually blackmail American politicians.\u003C\/p\u003E\u003Cp\u003EAs was mentioned in the first installment of this series, Cybereason's CEO Lior Div offers a clear example of this worrisome bridge between Israel's public and private sector, as Div \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-israel-tech-firm-doomsday-election-simulations\/263886\"\u003Ehas openly stated\u003C\/a\u003E that he views his work at Cybereason as a \"continuation\" of his service to Israeli military intelligence, where he led offensive cyberattacks against other nations.\u003C\/p\u003E\u003Cp\u003EGiven Div's past statements and his company's \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-israel-tech-firm-doomsday-election-simulations\/263886\"\u003Eclear ties\u003C\/a\u003E to both Israeli and U.S. intelligence, Cybereason's simulation of the 2020 U.S. election - which involved terrorist attacks and led to the election's cancellation and the imposition of martial law - is highly concerning. This is particularly so considering that Cybereason's investors have \u003Ca href=\"https:\/\/www.mintpressnews.com\/cybereason-investors-offer-israeli-spy-classified-intelligence\/264095\"\u003Edirect ties\u003C\/a\u003E to individuals who would benefit from the election's cancellation and also considering the clear narrative that has emerged in recent months regarding how the coming election will inevitably fall victim to tech-driven \"chaos\" in coming months.\u003C\/p\u003E\u003Cp\u003EThe clear overlap between Cybereason's simulation and the intelligence-driven media narrative is clear cause for concern, especially considering that the technologies that they highlight as ultimately upending the election are dominated by the very same intelligence agencies simulating and crafting that narrative.\u003C\/p\u003E\u003Cp\u003EThe keyword that has been used to describe the end result of both Cybereason's simulation and the prevailing media narrative regarding the 2020 election is \"chaos,\" chaos so imminent, widespread and unruly that it will shake American democracy to its core.\u003C\/p\u003E\u003Cp\u003EWhat has been left unsaid, however, is that a government's solution to \"chaos\" is always the imposition of \"order.\" This means that - whatever \"chaos\" ultimately ensues prior to or on election day - will result in a government response that will do much more to crush freedom and undermine democracy than any act of foreign meddling has, be it real or imagined.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\"https:\/\/www.mintpressnews.com\/media-israel-intelligence-2020-elections-cyber-security\/264361\"\u003Emintpressnews.com\u003C\/a\u003E\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\"http:\/\/www.strategic-culture.org\/news\/2020\/02\/08\/how-government-and-media-prepping-america-for-failed-2020-election\/\"\u003Estrategic-culture.org\u003C\/a\u003E\u003C\/p\u003E","_links":{"parent_art":[{"title":"Campagne pr\u00e9sidentielle am\u00e9ricaine : les primaires d\u00e9mocrates tournent au fiasco","url":"http:\/\/newsnet.fr\/apicom\/id:168497,json:1"}],"related_art":[{"title":"Campagne pr\u00e9sidentielle am\u00e9ricaine : les primaires d\u00e9mocrates tournent au fiasco","url":"http:\/\/newsnet.fr\/apicom\/id:168497,json:1"}]}}}