[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Sign-in] [Mail] [Setup] [Help]
Status: Not Logged In; Sign In
(s)Elections See other (s)Elections Articles Title: Why a Shadowy Tech Firm With Ties to Israeli Intelligence Is Running Doomsday Election Simulations A shadowy tech firm with deep ties to Israeli intelligence and newly inked contracts to protect Pentagon computers is partnering with Lockheed Martin to gain unprecedented access to the heart of Americas democracy. Election Day 2020: 32 Americans dead, over 200 injured, martial law declared and the election itself is canceled. While this horrific scenario seems more like the plot of a Hollywood film, such was the end result of a recent simulation examining the preparedness of U.S. officials from the Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS) and the U.S. Secret Service against bad actors seeking to undermine the upcoming presidential election. Yet, this simulation was not a government-organized exercise but was instead orchestrated by a private company with deep ties to foreign and domestic intelligence services, a company that is also funded by investors with clear connections to individuals who would stand to benefit if such a catastrophic election outcome were to become reality. Much of the rhetoric since the last presidential election in 2016 has focused on the issue of foreign meddling by U.S. rival states like Russia, while China has emerged as the new meddler of choice in American corporate media as the 2020 election approaches. Though time has revealed that many of the post-2016 election meddling claims were not as significant as initially claimed, the constant media discussion of foreign threats to U.S. democracy and electoral processes whether real or imagined has undeniably created a climate of fear. Those fears have since been preyed upon by neoconservative groups and the U.S. military-industrial complex, both of which are hardly known for their love of demcratic processes, to offer a series of ready-made solutions to these threats that actually undermine key pillars of American democracy, including independent reporting and voting machine software. However, many of the very same media outlets and groups that frequently fretted about Russia, China or another rival state meddling in U.S. democracy have largely ignored the role of other nation states, such as Israel, in efforts to sway the last U.S. election in 2016 and meddle in numerous elections in Africa, Latin America and Asia in the years since. As a consequence of this climate of fear, it should be hardly surprising that the corporate media lauded the recent 2020 election simulation that ended in an abysmal failure for U.S. officials, the cancellation of the U.S. election and the imposition of martial law. Yet, none of those reports on the exercise noted that the company that hosted the simulation, called Cybereason, is led by ex-members of Israels military intelligence unit 8200, advised by former top and current officials in both Israeli military intelligence and the CIA. In addition, it is funded by and partnered with top U.S. weapons manufacturer and government contractor Lockheed Martin and financial institutions with clear and direct ties to Saudi Crown Prince Mohammed bin Salman and White House adviser and the presidents son-in-law Jared Kushner. Also left unmentioned in media reports on Cybereasons election simulations is the fact that Cybereasons CEO, Lior Div, has openly admitted that he views his work at Cybereason as a continuation of his service to Israels intelligence apparatus. With Cybereason planning to host more simulations in cooperation with federal agencies as the U.S. election inches closer, a deeper exploration of this company, its ties to intelligence and military contractors in the U.S. and Israel and its financial ties to key Trump allies both domestically and abroad warrants further investigation. In this two part series, MintPress will not only explore these aspects but also how many of the technologies wielded by the bad actors in the Cybereason election simulation have been pioneered and perfected, not by U.S. rival states, but by Israeli companies and start-ups with clear ties to that countrys intelligence apparatus. Also notable is the fact that Cybereason itself has covertly become a major software provider to the U.S. government and military through its direct partnership with Lockheed Martin, which followed the defense companys decision to open an office at the Israeli militarys new cyber operations hub in the Negev desert. In examining all of these interlocking pieces, a picture emerges of a potentially sinister motive for Cybereasons simulations aimed at gauging how U.S. federal officials respond to crisis situations on Election Day. Understanding Operation Blackout In early November, a team of hackers working for the private U.S.-based, Israeli-founded company Cybereason conducted a 2020 election simulation with members of various U.S. agencies, namely the DHS, FBI and the U.S. Secret Service. The simulation was organized by Cybereason and the law firm Venable and the U.S. agencies in attendance were invited and appear to not have been charged to participate. The simulation, titled Operation Blackout, was set in a fictional swing state called Adversaria and pitted ethical hackers from Cybereason against a team of federal and local law enforcement officials. The opposing teams were supervised by a white team composed of members of Cybereasons staff and Ari Schwartz a former member of the White Houses National Security Council and the National Institute of Standards and Technology (NIST) who set the rules of the simulation and would ultimately decide its outcome. Schwartz also used to work for the Center for Democracy and Technology (CDT), a major backer of Microsofts ElectionGuard software. Operation Blackout did not involve hackers targeting election software or voting machines, instead, it focused on civilian infrastructure and psychological operations against the American citizens in the fictitious Adversaria on election day. The hacker team was led by Cybereason co-founder Yonathan Striem-Amit, a former contractor for Israeli government agencies and a former operative for the elite Israeli military intelligence Unit 8200, best known for its cyber offensives against other governments. In a country as fragmented as the US, the number of people needed to influence an election is surprisingly small, Striem-Amit told Quartz of the exercise. We attempted to create havoc and show law enforcement that protecting the electoral process is much more than the machine. Streim-Amits team completely devastated the U.S. law enforcement team in Operation Blackout by not only causing chaos but murdering numerous civilians. Hackers took control of city buses, ramming them into civilians waiting in line at polling stations, killing 32 and injuring over 200. They also took control of city traffic lights in order to cause traffic accidents, used so-called deepfakes to conduct psychological operations on the populace and created fake bomb threats posing as the terror group ISIS, which incidentally has its own ties to Israeli intelligence. Telecom networks and news outlets within the fictitious states were also hacked and flooded with deepfakes aimed at spreading disinformation and panic among U.S. citizens. Operation Blackout Cybereason A map of targets in Adverseria is shown during Operation Blackout in Bostons John Hancock Tower. Mark Albert | Twitter The supervising team, composed of Cybereason employees and former NSC member Ari Schwartz, decided that the outcome of the face-off between the hacker and law enforcement teams was the outright cancellation of the 2020 election, the declaration of martial law by authorities, the growth of public fear regarding terrorism and allegations of U.S. government collusion with a foreign actor. Cybereason has stated that they will soon conduct another 2020 election simulation with federal authorities as the election draws closer. Given how the simulation played out, it is quite clear that it is a far cry from the actual scope of alleged foreign meddling during the 2016 election, meddling which was allegedly the motivation behind Operation Blackout. Indeed, the extent of Russian interference in the 2016 election amounted to $100,000 worth of Facebook ads over three years, 25 percent of which were never seen by the public, and claims that Russian state actors were responsible for leaking emails from the then-Democratic presidential nominee Hillary Clinton and the Democratic National Committee (DNC). In contrast, Operation Blackout went well beyond any observed or even imagined foreign meddling related to the 2016 election and appears more like a terror attack targeting elections than a covert means of manipulating their outcomes. Several mainstream publications have covered Operation Blackout but have failed to note that the company behind them has deep ties to foreign intelligence outfits and governments with a documented history of manipulating elections around the world, including the 2016 U.S. election. Quartz framed the exercise as important for preparing for any and all possibilities in 2020, which has become an urgent task for US regulators and law enforcement. Similarly, CyberScoop treated the simulation as a sophisticated exercise to help secure the vote. Other articles took the same stance. A series of simulations In the weeks after the Washington area election simulation, Cybereason repeated the same exercise in London, this time with members of the U.K. Intelligence agency GCHQ, the U.K. Foreign Office and the Metropolitan Police. The law enforcement team in the exercise, which included the U.K. officials, was headed by a Cybereason employee Alessandro Telami, who formerly worked for the NATO Communications and Information Agency (NCI). Like the prior simulation conducted in the U.S., Cybereason did not appear to charge U.K. government agencies for their participation in the exercise. Cybereason has with little fanfare been promoting extreme election day scenarios since before the 2016 election. Cybereasons first mention of these tactics appears in a September 2016 blog post written by the companys CEO and former Israeli government contractor Lior Div a former leader of offensive cyberattacks for the IDFs elite Unit 8200 and a former development group leader at the controversial Israeli-American corporation Amdocs. Div wrote that hackers may target U.S. elections by breaking into the computers that operate traffic lighting systems and interfering with the ones around polling stations to create massive traffic jams, hacking polling companies, and targeting live election coverage on cable or network television stations. A follow-up post by Div from October 2016 added further meddling tactics such as cut power to polling stations and mess with a voters mind.div Two years later, Cybereason held its first election meddling simulation, touting many of these same tactics, in Boston. The simulation focused on local and state responses to such attacks and saw Boston-based Cybereason invite Massachusetts state and local officials as well as Boston police officers and a former police commissioner to participate. Twitter accounts spreading fake news, turning off a citys closed-circuit cameras, hacking self-driving cars and navigation apps, and targeting a citys 911 call center with a DDoS attack were all used in the simulation, which saw Cybereasons ethical hackers attempt to disrupt election day. Media coverage of the simulation at the time framed it as a necessary preparation for countering Russian threats to U.S. democracy. Like the more recent simulations, the mock election was canceled and voter confidence in the electoral process was devastated. This past July, Cybereason conducted a similar simulation with officials from the FBI, DHS and the Secret Service for the first time. That simulation, which also took place in Boston, was remarkably similar to that which occurred in November. One intelligence officer from DHS who participated in the July exercise called the simulation very realistic. Another claimed that the simulation was a way of applying lessons learned from 9/11 by preventing the governments failure of imagination that officials have long alleged was the reason for the governments inability to thwart the September 11 attacks. Notably, The U.S. military simulated a scenario in which terrorists flew airplanes into the Pentagon less than a year before the September 11 attacks. Operation Blackout Cybereason In this undated photo from Cybereasons website, a faux ballot box is shown in the companys Boston office. Participating government officials, Cybereason staff and the media have consistently touted the importance of these simulations in securing elections against extreme threats, threats which to date have never materialized due to the efforts of foreign or domestic actors on election day. After all, these exercises are only simulations of possibilities and, even if those possibilities seem implausible or unlikely, it is important to be prepared for any eventuality. But what if the very figures behind these simulations and the investors that fund them had a history of election meddling themselves? Cybereasons deep ties to Israeli intelligence, which has a documented history of aggressive espionage and election meddling in the United States and in several nations worldwide, warrant a deeper look into the firms possible motives and the myriad conflicts of interest that arise in giving it such unprecedented access to the heart of Americas democracy. What Does Cybereason Do? Post Comment Private Reply Ignore Thread
|
||
[Home]
[Headlines]
[Latest Articles]
[Latest Comments]
[Post]
[Sign-in]
[Mail]
[Setup]
[Help]
|