I have been observing the hacker and hacktivist communities, at times very
closely, for many years. The exact definition of “hacker” and “hacktivist”
varies from author to author, so I shall make my interpretation of these words
very clear. Let us define a “hacker” as someone who utilizes their knowledge of
computers and of computer networks to make money via illegitimate means. Let us
define a “hacktivist” as someone who utilizes their knowledge of computers and
of computer networks to do justice when justice is not done by the state. I
have found that these two communities are inextricably linked, yet remain
completely separate entities. Many hackers double as hacktivists in their spare
time, although most hacktivists do not fancy themselves hackers.
Although hackers turned hacktivists have the very best of intentions, and their
input and expertise is of great value to the hacktivist community, they have
inadvertently suppressed the potential of the very community they are trying to
aid. The get-in-get-the-goods-get-out methodology of the stolen credit card
driven hacker community that has been transfered to the hacktivist community
via ideological osmosis has tragically affixed blinders to it. It has caused
the hacktivist community to think linearly and strive to do nothing more than
to blindly infiltrate target organizations and immediately leak whatever data
they happen to stumble across. This must change. Stealing and leaking data
makes a point, but it is sometimes necessary to do more than just make a point,
to inflict real, measurable damage. In certain, extreme cases an organization’s
disregard for human rights warrants its immediate and complete obliteration.
In this essay, I will discuss a multitude of ideological, operational, and
technical changes that ought to be made to the hacktivist community. These
proposed changes have been derived from my personal observations. Some will
find the ideas contained within this document to be the product of common
sense. I have found these people to be few in number. If the community accepts
my suggestions it will not only become more effective, but the risks associated
with participating in it will be drastically lowered. My intent in writing this
is not to aid criminals, but rather to aid people who wish to do battle with
governments and corporations that have become criminals. If freedom is to
remain on this earth, its people must be willing and able to take arms to
defend it, both physical and digital.
Personal Security
Sound operational security is the foundation from which all effective
cyber-offensives are launched. You should, at all times, put your own, personal
security above the success of your operations and interests. The security
precautions taken by most hacktivists I have met are mediocre at best, and
needlessly so. Maintaining sound personal security is by no means difficult. It
requires much caution but very little skill. I have devised a series of
security precautions that hactivists should take and divided them up into six
main categories: environmental, hardware, software, mental, pattern related,
and archaeological. We shall examine each individually.
(1) Environmental:
There are but two places you can work: at home or in public. Some people insist
that working at home is best and others insist that working in public is best.
The proper working environment debate has been raging on in the hacker
community for quite some time now, and has great relevance to the hacktivist
community, as most governments view hackers and hacktivists as one in the same.
Proponents of the “work in public” argument claim that by always working at a
different public location, you significantly lower your chances of being
apprehended. They argue that even if the authorities are able to trace many of
the cyber-attacks you took part in back to the public places where you took
part in them from, that does not bring them any closer to finding you. Most
retail stores and coffee shops do not keep surveillance footage for more than a
year at the most, and even if the authorities are able to get a photo of you
from some security camera, that does not necessarily lead them directly to your
front door, especially if you wore a hoody the entire time you where working
and the camera never got a clear shot of your face. On the other hand,
proponents of the “work at home” argument argue that the risk of being seen and
reported, or merely recorded while working in a public place far outweighs the
benefits of the significantly large increase in anonymity that working in
public provides. Both sides have legitimate points, and I urge you to consider
both of them.
If you decide to work in public, the number one threat you face is other
people. Numerous large criminal investigations have been solved using the
observations of average everyday citizens who just happened to remember seeing
something suspicious. If people sense that you are trying to hide something,
they will watch you more closely than they would otherwise. It is important to
always “keep your cool” as the old saying goes. Always try to sit in such a way
that your screen is facing away from the majority of the people in the room you
are sitting in. Corners are your friend. Try to blend in with the crowd. Dress
in plain cloths. Draw no attention. If you are in a coffee shop, sip some
coffee while you work. If you are in a burger joint, buy a burger. If you are
in a library or book store, set a few books beside your laptop. Also, be very
aware of security cameras, both inside the establishment you are working in as
well as on the street near it. Being captured on film is alright as long as the
camera can not see what is on your screen. Some store cameras are watched by
actual people who will undoubtedly report you if they find out what you are
doing. More and more governments are starting to place very high quality CCTV
cameras on their streets to monitor their citizens, and these devices can be a
problem if they are peering over your shoulder through a window you are sitting
beside. When working in public, it is possible that you may have to confront a
law enforcement officer face to face. Law enforcement officers can smell
uneasiness from a mile away, and if you look like you are up to no good it is
possible that a cop will come and talk to you. Always have some sort of cover
story made up before you leave home to explain why you are where you are. If
you are forced to confront a law enforcement officer you should be able to talk
your way out of the situation.
If you decide to work at home, the number one threat you face is your own ego.
Just because you are at home does not mean that your working environment is
secure. Be aware of windows in close proximity to your computer as well as your
security-illiterate or gossipy family members. Security issues in relation to
network configuration begin to come into play when you work at home. If your
computer were to somehow get compromised while you are working at home,
perhaps by your government, it would be nearly impossible for the person or
group of people rummaging around inside of your system to get your actual IP
address (provided that you adhere to the software security guidelines that we
will discuss later). However, if your wi-fi password (or the name of your
printer, or the name of another computer on the network) contains your actual
last name and part of your address, tracking you down becomes very easy. A lot
of people name their network devices and structure their network passwords in
this way.
It is also possible that if an attacker that has infiltrated your computer
notices other machines on your network they can pivot to them (infect them with
malware using your computer as a spring board of sorts) and use them to get
your IP address. A lot of Internet enabled household devices have cameras on
them (your smart TV, your Xbox, and your high tech baby monitor to name a few)
and said cameras can potentially be leveraged against you. It is in your best
interest to not have any other machines running on your home network while you
are working. Also, change your wi-fi password every once in awhile and make
sure that the password on the administrative interface of your router is
something other than the out-of-the-box default. If your computer gets
compromised, logging into your router using username “admin” and password
“admin” is elementary for a moderately skilled attacker. Most modern routers
list their WAN IP address on their control panels.
Regardless of where you decide to work, be aware of mirrors and glass picture
frames near your workplace. In the right light, both of these items have the
potential to reflect crystal clear images of your screen to onlookers across
the room. In addition to this, understand that modern cell phones are your
worst enemy. Not only are they always going to be the weakest link in your
security setup, but if they are somehow compromised they are equipped with a
camera and microphone. Recent studies suggest that it is possible for smart
phones to listen to the high pitched noise your CPU makes and deduce your PGP
private key. Furthermore, the metadata collected by your phone coupled with
pattern analysis techniques could potentially allow your government to link
your real life and online personas together after some time. We will discuss
this in depth later. Leave your phones at home and if possible keep all phones,
yours or otherwise, far away from your computer. Other portable devices such as
iPods and tablets potentially pose the same risk that phones do and should be
treated the same.
(2) Hardware:
Modern computers come equipped with microphones, speakers (which can be used as
microphones under the right circumstances), and cameras. All of these features
can potentially be leveraged to identify you if your computer is compromised.
To mitigate these risks, these features should be physically removed. Your
computer’s microphone and speakers should be ripped out of it, but you should
not rip out your web cam, as it will alter the outward appearance of your
computer and potentially draw attention to you. Instead, open your computer’s
screen and snip the wires that connect to your web cam. Wrap the ends of the
wires in electrical tape so sparks do not jump in between them. If you must
listen to an audio file while working, use headphones. Only keep your
headphones plugged into your computer when you are using them. The computer you
use for your hacktivist activities also should not contain a hard drive, as
they are unnecessary for our purposes.
(3) Software:
Always use a TOR enabled Linux live system when working. At the present moment,
Tails (The Amnesiac Incognito Live System) is by far the best live distribution
for your purposes. You can read more about TOR at www.torproject.org and you
can read more about acquiring, setting up, and using Tails at tails.boum.org.
The Tails operating system lives on a USB flash drive. Every time you start up
your computer, you must first insert your Tails flash drive into it. The Tails
website will guide you through making said flash drive. Tails will
automatically direct all of your outgoing traffic into the TOR network in an
effort to hide your IP address. If you use Tails you will be completely
anonymous and be able to work with impunity provided that:
* You keep your Tails USB up to date. New versions of the Tails
operating system are released every few months.
* You do not login into your “real world” accounts while using Tails.
Do not check your Twitter feed while you are working.
* You do not use Tails to create an account with an alias that you have
used before. If you have been “0pwn” for the past seven years, now
is a good time to stop being 0pwn.
* You do not alter Tails’ default security settings. They are the way
they are for a reason.
* You do not use Tails to create an online account with a password that
you have used before. Doing this only makes deanonymizing you easier.
* You do not install and use random packages that “look cool”; they
could be miscellaneous. Only use packages and scripts that you trust.
Tails is not bullet proof.
* If you decide to set a sudo password when starting up Tails, make
sure that it is very strong.
* You stay conscious of metadata analysis techniques. We will discuss
these later.
* You switch exit nodes every ten to fifteen minutes. This can be done
by double clicking the little green onion in the upper right hand
corner of your Tails desktop and hitting the “Use a New Identity”
button.
* You follow the communication guidelines laid out later in this
document.
More information can be found on the Tails warning page: https://tails.boum.org/
doc/about/warning/index.en.html. Be aware that it is very easy for your ISP
(which is probably working closely with your government) to tell that you are
using both TOR and Tails. It is probably in your best interest to use something
called “TOR bridge mode”. You can read more about how to configure Tails to
use TOR bridges here: https://tails.boum.org/doc/first_steps/startup_options/
bridge_mode/index.en.html.
Tails is unique in that it has a special feature that wipes your computer’s
memory before it shuts down. This is done in order to mitigate risks associated
with the dreaded “cold boot attack” (a forensics method in which a suspects RAM
is ripped out of his or her computer and then thrown into a vat of liquid
nitrogen to preserve its contents for later analysis). This feature is also
triggered if you pull your Tails flash drive out of your computer while you are
working. If while you are working you ever feel that the authorities are about
to move in on you, even if you have a seemingly irrational gut feeling, yank
your Tails flash drive out of your computer. Tails also has a feature that
allows it to disguises itself as a Windows desktop. Using this feature in
public will reduce your risk of capture significantly.
(4) Mental:
A skilled attacker is well disciplined and knows that he must keep his actions
and skills a secret in order to remain safe from harm. Do not flaunt the fact
that you are dissatisfied with your government, a foreign government, or a
particular corporation. Do not attend protests. Do not publicly advertise the
fact that you have an above average aptitude for computer security offensive or
otherwise. And whatever you do, do not tell anyone, even someone you think you
can trust, that you are planning to launch an organized cyber-attack on any
organization, big or small. If you draw attention to yourself no amount of
security precautions will keep you safe. Keep your “real” life mentally
isolated from your “hacktivist” life. One lapse in operational security could
end you.
Be alert and focused. Remain mentally strong. Come to terms with the illegality
of your actions and what will happen to you if you are apprehended. As a wise
man once said, “A warrior considers himself already dead, so there is nothing
to lose. The worst has already happened to him, therefore he’s clear and calm;
judging him by his acts or by his words, one would never suspect that he has
witnessed everything.” It is perfectly acceptable to be paranoid, but do not
let that paranoia consume you and slow your work. Even if you are extremely
cautious and follow this document’s advice to the letter, you still may be
hunted down and incarcerated, tortured, or killed. Some countries do not take
kindly to hacktivists. It is best that you be honest with yourself from the
beginning. In order to operate effectively you must be able to think clearly
and see the world as it actually is.
(5) Pattern Related:
When your online persona is active your real life persona ceases to exist, and
an observant adversary can use this to their advantage. If your ISP, bank, and
mobile phone provider are “cooperating” with your government and allowing them
to browse through all of their records (a fair assumption in this day and age)
then, eventually, they will be able to deduce your real identity by comparing
everyone’s data to information about your online persona. If the government
looks backs on all of the records they have collected in the past year and
notice that you never make a credit card purchase, watch Netflix, go on your
Facebook, Google, or Twitter account, or change your physical location while
1337Hax0r64 is online on some anti-government forum on the deep web, they will
assume that you are 1337Hax0r64. Even information about your home network’s
bandwidth usage can give away your real identity.
Luckily, performing the type of metadata analysis attack described above takes
time, usually many months. It is very important that you change aliases often,
preferably every three or four months. Shed your old names like a snake sheds
its skin. When you do change your online name, make sure your new identity
can not be tied back to your old one.
DO NOT not launch cyber-attacks from your own computer. Launch attacks only
from hacked servers, servers purchased with washed bitcoins, or free shell
accounts. Certain types of cyber-attacks produce a large amount of traffic over
a short amount of time. If the bandwidth usage of your home network spikes at
the same instant that a government or corporate server is attacked, the time it
takes to deanonymize you is reduced significantly. This is especially true if
you launch multiple attacks on multiple occasions. Launching attacks in this
way can be mentally exhausting. Configuring a new attack server with your tool
set every time your old attack server is banned (an inevitable occurrence) can
be a tedious task indeed. I personally recommend creating a bash script to
automatically install your favorite tools to make this transition process
easier. Most hackers and offensive security professionals use under thirty
non-standard tools to do their job, so configuring a new server with everything
you need should not take very long if you know what you are doing. Consider
equipping your server with TOR and a VNC server (for tools that require GUIs
such as most popular intercepting proxies) as well.
(6) Archaeological:
You must insure that there is no forensics evidence of your actions, digital or
otherwise. If the government breaks into your house and rummages through your
things, they should find nothing interesting. Make sure that you never make any
physical notes pertaining to your hacktivist activities. Never keep any
computer files pertaining to your hacktivist activities in your home. Keep all
of your compromising files, notes, scripts, and unusual attack tools (the ones
that can not be installed with apt-get or the like), and stolen information in
the cloud. It is recommended that you keep all of your files backed up on
multiple free cloud storage providers so that in the event that one of the
providers bans your account you still have all of your data. Do not name your
cloud accounts in such a way that they can be connected back to your online
persona. Never, under any circumstances, mention the names or locations of your
cloud accounts to the people you work with. Always hit the “Use New Identity”
button on your TOR control panel after accessing your cloud storage solutions.
Every time you shed your old alias, shed your old cloud accounts.
Security of Communications
The majority of hacktivists I have met communicate via public IRC. Using IRC is
fine for meeting other hacktivists, but as soon as you muster a team of other
hacktivists who wish to attack the same target as you, move to another more
secure form of communication. Some means of communication are more secure than
others, but completely secure communication does not exist. The following
guidelines are meant to work in conjunction with the personal security
guidelines that where discussed in the previous section. If proper personal
security measures are implemented effectively, compromised communication will
result in operational failure at worst and not complete deanonymization. Since
operational failure may very well set you and your cause back several months,
it is in your best interest to attempt to communicate securely:
* Remember that any of the people you meet on the clearnet, deep web,
or public IRC channels who claim to be on your side could actually
be government agents trying to sabotage your operations.
* If possible, communicate mainly via privacy friendly email accounts
(not Gmail, Yahoo, AT&T, etc.) and encrypt all of your messages with
PGP. When a cyber-attack is being carried out it is often necessary
to be able to communicate with your accomplices instantaneously.
Since encrypting, sending, receiving, and decrypting messages by hand
takes time, using PGP in time sensitive situations like this is not
feasible. If you have to confer in an IM environment, use a program
like TorChat that uses its own form of asymmetric encryption to send
and receive messages instantly.
* Use strong passwords for all of your online accounts. The best way to
make a strong password is to pick eight or nine random words and
string them together. Passwords like this are easy to remember but
hard to guess.
* Never give away any personal information (such as country, interests,
hobbies, health, etc.) or give insight into your feelings or
emotions. Your fellow hacktivists are not your friends and should
never be talked to as such. Giving away this sort of information will
make tracking you easier.
* When you receive messages, do not retain them, even if they are
encrypted. Read them, make note of any hard to remember details
(like long server passwords for example), and then delete them.
Having a mile long digital paper trail can not lead to anything good.
In some cases deleted messages on email serves can be recovered via
computer forensics, but deleting messages quickly may reduce the odds
that they can be.
* When typing messages, do so in a word processor on your computer.
Never write your message inside of a communication program (such as
an online email client, forum PM box, etc.). People have been known
to accidentally send unencrypted messages before. The effects of such
an error can be devastating.
* If you find yourself writing large swaths of text intended for public
release (like essays or manifestos) use a tool like Anonymouth to
obscure your writing style. Your writing style is as unique as a
finger print and can be used to identify you.
* Never, under any circumstances, execute a file on your computer or on
your server that has been given to you by a fellow hacktivist. You
should never run into a situation where doing this is necessary.
* Do not disclose information about your involvement in previous
hacktivist operations to people who where not also part of the same
operation.
* If one of the people that you are working with gets captured, assume
that the people who have captured them know everything that they do.
Philosophy of Attacking
The hacktivist community, like every community, has its own unique set of
philosophical musings, taboos, and dogmas. While I do not advocate the severe
alteration of the principles and philosophies on which the community was built,
I do wish to point out a number of flaws in certain aspects of their
composition. These flaws serve only to hold back the community and should be
openly discussed.
(1) When hacktivists target an organization, their goal is more often than not
to force said organization to stop functioning permanently, or at least for the
longest time possible, in an effort to stall unjust actions from being carried
out or to seek retribution for unjust actions done in the past. Leaking
databases, DoXing influential individuals, defacing websites, and launching
massive DDoS campaigns, four of the modern hacktivist community’s favorite
activities, accomplish this goal – to an extent. Infiltrating a target
organization and sowing discord within its ranks is magnitudes more effective
than leaking credit card numbers or putting a CEO’s social security number on
Pastebin, yet it is rarely, if ever, considered to be a viable course of
action. Subtly and silently fostering suspicion and distrust inside of your
target will have a longer lasting impact than simply pointing out that its
security policy has some weak points.
(2) Hacktivists crave publicity, yet they are the most effective when they
operate undetected. Stay hidden. Although it may seem tempting at times, do not
destroy large amounts of information on your target’s computers or servers.
Doing so will announce your arrival inside of your target’s network rather
loudly. Flashy, public displays of power have no place in the hacktivist
community. Just because you are hiding behind TOR does not mean that you should
not make an effort to cover your tracks. Conceal your attack not to mask your
identity, but to convince your target that no attack was carried out in the
first place.
(3) Once your hacktivist collective has decided to attack an organization,
strike fast and strike hard. Overwhelm your target. A well disciplined and well
organized team of attackers can penetrate most networks within a few hours.
Far too often I have seen hacktivist collectives declare all out war on someone
and then attack them slowly and gain entry into their network days, sometimes
even weeks later. By attacking slowly, you give your target time to react and
strengthen their defenses. Detecting an attack from a large hacktivist
collective is a trivial task, but as history has shown detecting the presence
of one inside of a network, especially a large network, can be tricky.
(4) Cyber-attacks seldom go as planned. If you are attempting to do anything
that involves the coordination of more than two people, keep this in mind. It
is not uncommon for tools to stop working in the middle of an attack. It is not
uncommon for reverse shells to die unexpectedly. It is not uncommon for
seemingly simple actions to take hours to perform. You must be ready to think
on your feet and quickly adjust your attack plan to accommodate the ever
changing conditions within the network you are attacking. Predefined
contingency plans are mostly useless.
(5) Remember that no system is impenetrable. On more than one occasion I have
seen hacktivists give up on trying to infiltrate a target network because their
Nessus scan did not yield any useful results. As a hacktivist, you are not
bound by the typical constraints of a pentester. If you can not successfully
attack a website, try attacking its hosting provider. Try attacking the
administrator’s email account. Try going after random social accounts belonging
to the administrator’s family. Try planting iframes in websites you suspect the
administrator frequents in an effort to infect him. If you cause extensive
collateral damage, who cares? It is not your problem. Sometimes the ends
justify the means. Be creative.
(6) Many hacktivists possess unrealistic, self-constructed mental images of the
ideal cyber-attack. In the majority of these movie-induced delusions, the ideal
attack utilizes numerous 0days, an arsenal of home made tools, and highly
advanced, unimaginably complex network intrusion techniques. In reality, this
type of thinking is incredibly dangerous and causes some hacktivists to attempt
to perform convoluted, elaborate attacks to gain the respect of their peers.
When breaking into highly secured networks, such attacks only draw unnecessary
attention. The best attacks are the ones that work. They are usually simple and
take little time to execute. Using sqlmap to spawn a shell on your target’s
server by exploiting a flaw in their website’s search feature is a viable if
not ideal attack. It allows you to access the inside of your target’s network.
Exploiting a vulnerable FTP daemon on one of your target’s servers using public
exploit code is a viable if not ideal attack. It allows you to access the
inside of your target’s network. Using Metasploit in conjunction with a fresh
Gmail account to launch a phishing campaign against your target’s employees is
a viable if not ideal attack. It allows you to access the inside of your
target’s network. The media hates it when hacktivists use open source software
to do their work. Whenever a hacker or hacktivist is arrested for doing
something that involved using “someone else’s” tools, they are publicly
shammed. “Anyone could have done that” they say. “He’s just an unskilled script
kiddie” they say. Claiming that someone is less of a hacker solely because they
partially depend on someone else’s code borders on absurd. It amounts to
claiming that Picasso is a bad artist because he did not carve his own brushes,
synthesize his own paints, and weave his own canvas. Do not shy away from using
open source tools and publicly available information to accomplish your goals.
Hacking is an art, and nmap is your brush.
Organization and Formation
Most of the hacker and hacktivist groups I have observed are unorganized and
undisciplined. They claim to perform actions as a collective, yet when it comes
time to actually launch an attack they attempt to infiltrate their targets as
individuals, each member launching attacks of their own without making the
faintest attempt to coordinate their actions with others. Here I shall describe
a schema that could be easily adopted by any hacktivist collective to allow it
to facilitate highly coordinated attacks involving large numbers of attackers
with great ease. It will be presented as a series of steps.
Step One: Organize yourselves into multiple small groups. These groups shall be
referred to as strike teams. The ideal strike team is composed of three parts
attack specialists, two parts social engineering specialists. Attack
specialists should at least be able to identify and competently exploit
potential vulnerabilities in websites and be able to exploit vulnerable or
misconfigured services. Social engineering specialists should have at least
some real world experience before participating in a strike team. Attack
specialists should only concern themselves with launching attacks and social
engineering specialists should only concern themselves with social engineering.
Well-defined roles are the key to a strike team’s success. This configuration
will often create an abundance of social engineering specialists, and that is
perfectly acceptable. Having the capability to immediately launch multiple well
planned social engineering campaigns is crucial. The size of a strike team
will be determined by the skill of its members. Highly skilled individuals
should work in very small strike teams (five member teams are acceptable)
whereas unskilled individuals should work in larger strike teams (up to a few
dozen). The organization of strike teams should be coordinated as a collective.
No one person should be given the authority to sort people themselves. Strike
teams should function as “sub collectives” and be autonomous. Hacktivist
collectives are composed of people around the world, most of whom can not be
online all the time. This means that all strike teams should set themselves up
knowing that their members will pop on and offline and that it is possible new
members will have to be annexed at a later time.
Step Two: Within each strike team, agree upon a stratagem; a broad, realistic,
nonspecific plan of action that aims to accomplishes one, very specific goal.
Strike teams should only execute one stratagem at a time. Multiple strike teams
within the same hacktivist collective can execute different stratagems at the
same time in an effort to accomplish some sort of final goal (perhaps to
destabilize an organization or to acquire trade secrets). The next section of
this essay is devoted solely to exploring the concept of stratagems and how to
best form and use them. Strike teams should be allowed to do what they want,
but their initial stratagem should be approved by the collective so that no two
strike teams attempt to do the same thing at the same time.
Step Three: As a strike team, map your target’s attack surface. If multiple
strike teams are all attacking the same network, they should share information
very closely in this step. It is very possible that multiple strike teams
working together to accomplish the same goal could actually be attacking
different networks, in which case mapping should be done within individual
strike teams. Each member of a given strike team should attempt to map the
target network themselves, and then members should compare information. It is
very unlikely that anything will be overlooked by every single member of the
team.
Step Four: Divide your target network up into manageable chunks and assign
certain individuals within your team to each one of those chunks. Efficient
devision of labor is key to launching speedy attacks. Here is an example
involving a network composed of four servers (two SQL servers, a DNS server,
and a web server hosting a feature rich corporate site) and a strike team
composed of six attack specialists and four social engineering specialists:
* Have one attack specialist attack the SQL and DNS servers.
* Have one attack specialist attack the website’s multistage user
registration mechanism and login mechanism.
* Have one attack specialist attack the contact and session management
mechanism.
* Have one attack specialist attack any forms not assigned to other
attack specialists as well as any other potentially exploitable
scripts, pages, or mechanisms.
* Have one attack specialist and two social engineering specialists
attempt to launch some sort of phishing champaign against the
company’s employees.
* Have one attack specialist and two social engineering specialists
attempt to convince the company’s hosting provider that they are the
rightful owners of the company’s four servers and have been locked
out of their email account.
Step Five: Drill yourselves. This step is optional but highly recommended.
Procure a server with a large amount of RAM and multiple processors. Have one
member of your strike team set up a virtual network on it that, to the best of
your knowledge, mimics the network you are planning to attack. This one team
member should not participate in the drills themselves, and they should not
give other team members details pertaining to the virtual network. If you are
planning on attacking a large cooperation, set up the virtual network like a
large cooperate network with a labyrinth of firewalls, routers, switches, and
domain controllers. If you are planning on attacking a small cooperation or
home business, set up your network accordingly. You should never have to
visualize more than 12 workstations, even if your team is doing a complex
pivoting exercise. As a group, attempt to break into your virtual network and
execute your stratagem. The virtual network should be deliberately
misconfigured so that there is a way for your team to infiltrate it and
accomplish their simulated goal, but the misconfigurations should be extremely
subtle. The team should have to work very hard to find them. Run multiple
drills. After each drill, the misconfigurations in the network, and potentially
the layout of the network itself, should be altered to force your team to
attack it in a different way or to exercise a different skill. The purpose of
these drills are two fold. Firstly, they allow your team members to get
accustomed to working together. Secondly, they will prepare your team for the
day when they actually go up against your real target network.
Step Six: Execute your stratagem on your target network. Your strike team
should attack methodically and silently. Every member should know what they
need to do and how they need to do it. No mistakes should be made. Every tool
you use should be well honed and function flawlessly. Not a second should be
wasted. Use time to your advantage. Your target organization will be the most
unprepared for an attack in the middle of the night when all of its IT staff
are at home sound asleep. If your stratagem calls for being embedded in your
target network for a long period of time, tread very lightly once you
infiltrate it.
Interlocking Stratagems in Theory
In this section I will give multiple examples of stratagems that an actual
strike team could make use of. You should combine multiple stratagems to
accomplish your ultimate goal. Individual stratagems are like pieces of a
jigsaw puzzle, and are intended to be pieced together. A strike team should
execute multiple stratagems in succession, possibly in cooperation with other
strike teams in an effort to accomplish a common goal. This section is not
intended to be a play book. I encourage you to build off of my stratagems or,
better yet, devise your own. Some stratagems are:
(1) Collect information on individuals within the target organization. Mount a
phishing campaign against the organization and gain access to as many
workstations as possible. Once you have breached its network, do not pivot.
Attempt to locate any useful information on the workstations you have
compromised, and then remain in the network for as long as possible doing
nothing more than idly gathering intelligence.
(2) Take complete or partial control over the target organization’s main means
of communication (usually email). Review a few of their messages and learn how
they are structured and formatted. Then, send a number of blatantly false
messages to one or more members of the organization using the credentials of
another member of the organization. Multiple false messages should be sent over
some period of time. When members of the organization begin to receive false
messages from their colleagues, distrust will begin to take root.
(3) Take complete or partial control over the target organization’s main means
of communication (usually email). Review a few of their messages and learn how
they are structured and formatted. Then, devise some way to intercept and
inspect or modify messages in transit within the target organization
(essentially, perform a man in the middle attack). Every once in awhile, alter
a message in a subtle but disruptive way. Perhaps change a date or a time so
certain individuals do not arrive at their meetings on time or do not arrive at
all. Once you have reason to believe that your modifications have taken their
toll (i.e. the person you targeted missed their meeting), undo the changes you
made to the message you intercepted so upon audit it appears as though the
message was never tampered with. Doing this is usually hard to detect and will
slowly cause the target organization to destabilize itself as tensions between
individuals within it begin to rise and their employees begin to question their
own sanity.
(4) Take complete or partial control over the target organization’s main means
of communication (usually email). Review a few of their messages and learn how
they are structured and formatted. Use the credentials of a high ranking
individual within the target organization to distribute a message that appears
to be from them that claims a terrible tragedy has occurred that warrants an
immediate, brash, resource intensive response from the rest of the
organization. You will most likely not be able to pull this off more than once.
This stratagem works especially well against militant groups with poorly
defined command structures but has other applications as well.
(5) Once inside of the target organization’s network, acquire a small amount of
classified data intended for the eyes of high ranking personnel only.
Strategically plant the data on the computer of one or more lower ranking
individuals. Make it look like an espionage attempt. If many key individuals
within the target organization are accused of trying to siphon out its secrets,
it will be forced to suspend a large portion of its operations while an
investigation is done.
(6) Use a DDoS attack to disrupt the target organization’s communications for a
short period of time when they are most in need of it. For a corporation, this
could be during an important international Skype call. For a government, this
could be immediately following a devastating attack from an insurgency group.
Doing this will cause panic, which will make the target organization
temporarily more susceptible to other kinds of attacks.
(7) Pose as a legitimate company selling legitimate software and befriend the
target organization. Create a piece of software with a very hard to detect
security flaw in it and sell it to them. The flaw could be as simple as a
poorly implemented encryption library or as complex as an insecure multistage
parsing algorithm. It must be incredibly subtle. So subtle that if it is
detected you will be able to write it off as unintentional. It should be
plausibly deniable. Once the target organization installs the vulnerable
software on their machines, leverage it to perform targeted attacks on key
individuals within it. Do not use it to infect entire subnets, as that will
draw to much attention.
(8) Locate a small software provider your target organization already does
business with and infiltrate their network by using other stratagems. Modify
their source code slightly so that their software becomes vulnerable to remote
attack. Do not modify just any code you come across, study the software
provider’s development process and target code that has already been checked
for bugs and is days away from being released to customers. When the target
organization installs the latest version of software from the company that you
have infiltrated, they will become vulnerable. Leverage this vulnerability to
perform targeted attacks on key individuals within the target organization. Do
not use it to infect entire subnets, as that will draw to much attention.
(9) Locate a small software provider your target organization already does
business with and infiltrate their network by using other stratagems. Most
software companies offer rewards to security researchers who find
vulnerabilities in their products. Determine how reported vulnerabilities are
managed by the company you have infiltrated and devise a way to monitor them
in real time. As soon as a security researcher reports a major vulnerability
in a product your target organization uses, use it to perform targeted attacks
on key individuals within it. Do not use it to infect entire subnets, as that
will draw to much attention.
(10) Using other stratagems, infiltrate the computers of a number of influential
individuals within the target organization. Monitor their activity constantly
and closely. If possible, listen to them through their computer’s microphone.
When you believe that one of them has left their computer, undo things they
have just done. Delete the last sentence they wrote. Hit the back button on
their web browser. Close the program they just opened. Over time, this will
lead them to question their sanity.
(11) Using other stratagems, infiltrate the computers of a number of influential
individuals within the target organization. Most modern governments and
corporations are at least partially corrupt. Find evidence of this corruption
and use it to compel one or more of these influential individuals to aid your
cause. If you are unable to find any evidence of corruption, do not be afraid
to bluff. If you make a mysterious window pop up on, say, a CFO’s computer that
alludes to some sort of dirty secret, it is very possible that the CFO will
assume that the hacker who caused the widow to appear knows something about
them that they actually do not. A lot of powerful people have skeletons in the
closet. The media has instilled a fear of hackers into the general populace,
and this fear can be used to your advantage. Most normal people, upon being
confronted by a hacker that has gained complete control of their computer, will
be inclined to believe plausible sounding white lies. Having an “inside man”
within your target organization can be extremely useful.
Interlocking Stratagems in Practice
In this section I shell present an example of a plausible situation that could
warrant the involvement of hacktivists and a corresponding attack loosely built
upon the stratagems from the last section. I have tried to make the situation
realistic, but it is very likely that if you use my writing to plan and execute
your own attack it will play out nothing like the attack depicted below. Most
actual attacks are far more complex than the one presented here. The purpose
of this example is to demonstrate the way in which multiple strike teams should
work together. Notice how at all times each team has one or more specific
goals.
Situation: A hacktivist collective has decided to attack the terrorist
organization Bina Al-ar-mal after they captured and executed a tourist in
Syria. Bina Al-ar-mal is believed to consist of over 40,000 people, has
hundreds of public Twitter feeds and Facebook accounts, and runs a small
terrorist news site hosted on a Russian server. It has three known leaders, who
we shall refer to as Head Terrorist 1, Head Terrorist 2, and Head Terrorist 3.
Twenty-seven hacktivists have joined the effort. They have been split into
three teams: team 1 consists of five of the most highly skilled hacktivists,
team 2 consists of seven moderately skilled hacktivists, and team 3 consists of
fifteen amateur hacktivists.
Time Line:
(Day 1, Hour 1) Team 1 is initially tasked by the collective with infiltrating
as many terrorist Twitter and Facebook accounts as possible. The team starts
enumerating the accounts immediately. They decide that no drill will be
executed, as breaking into Facebook and Twitter accounts is a trivial task.
(Day 1, Hour 1) Team 2 is initially tasked by the collective with infiltrating
the web hosting provider hosting the terrorist group’s website. They begin
reconnaissance.
(Day 1, Hour 1) Team 3 is initially tasked by the collective with attacking
Bina Al-ar-mal’s website directly. They begin to map the website.
(Day 1, Hour 2) Team 1 finishes enumerating the terrorist Facebook and Twitter
accounts. They begin attempting to break into them.
(Day 1, Hour 2) Team 3 finishes mapping Bina Al-ar-mal’s website and begins to
attack.
(Day 1, Hour 3) Team 1 has breached a few terrorist Facebook and Twitter
accounts. After examining their contents they determine that the terrorists
are using SpookyMail email service to communicate off of social media. A few
terrorist email accounts are identified and the team begins to try to break
into those as well.
(Day 1, Hour 3) Team 3 gains read/write access to a limited portion of the
server Bina Al-ar-mal’s website is hosted on. The other teams are alerted.
They set up a simple php based IP logger script to capture the IP addresses of
Bina Al-ar-mal members attempting to check their organization’s news feed.
(Day 1, Hour 6) Team 2’s reconnaissance ends. They have located the web hosting
provider and gathered information on said provider’s website and servers. They
begin attacking them.
(Day 1, Hour 7) Team 1 breaches their first few terrorist email accounts.
(Day 1, Hour 9) Team 2 locates a vulnerability in the the terrorist’s web
hosting provider’s website. They are not able to fully compromise any of their
servers, but they are able to get a list of customer names, domain names, and
billing addresses by exploiting a flaw in the website’s shopping cart feature.
Upon inspecting the list, they discover that the person paying Bina Al-ar-mal’s
hosting bill has a British billing address. The other teams are alerted and
Scotland Yard is notified of the terrorist threat immediately.
(Day 1, Hour 23) Team 1 is able to get Head Terrorist 1’s email address off of
the “contact” pane of one of the hacked terrorist email accounts. They make
ready for a spear phishing attack against him, but decide to wait some time to
launch it, as it is currently the middle of the night where Head Terrorist 1 is
believed to be.
(Day 2, Hour 3) Team 3 has gathered over seven thousand IP addresses of people
viewing Bina Al-ar-mal’s news feed and tries to attack them all using known
router vulnerabilities. When all is said and done they have infected
thirty-seven routers and forty-six workstations. They determine that
thirty-four of these work stations belong to active members of Bina Al-ar-mal.
They observe these workstations passively, hoping to gather information. The
other two teams are briefed on their success.
(Day 2, Hour 8) Team 1 launched a spear phishing attack against Head Terrorist
1 using the hacked email account of another terrorist.
(Day 2, Hour 9) Team 1’s spear phishing attack against Head Terrorist 1 is a
success. They now have full control over his Windows XP laptop and inform the
other two teams of their success. After searching the laptop’s hard drive and
downloading a half gigabyte of confidential documents and IM logs, the team
decides to plant a PDF of the Christian Bible on it along with some real
looking fake papers from the CIA. After gleaning Head Terrorist 2’s and Head
Terrorist 3’s email addresses from the stolen IM logs, the team sends them both
emails from the hacked email account of a lower level terrorist claiming that
Head Terrorist 1 is dirty.
(Day 2, Hour 9) Team 3 decides to take the sensitive information stolen from
Head Terrorist 1’s computer stolen by Team 1 along with other fake CIA
documents and place it on all thirty-four of the terrorist workstations they
control. They use a hacked email account belonging to an uninvolved terrorist
to inform Head Terrorist 2 and Head Terrorist 3 that Head Terrorist 1 is a
traitor an he has at least thirty-four moles inside of their organization, all
of whom they mention by name.
(Day 2, Hour 10) Head Terrorist 1’s laptop is searched by security forces under
the control of Terrorist 2. Head Terrorist 1 is determined to be part of the
CIA and is placed into a cell to be used as leverage against the United States.
(Day 2, Hour 17) Head Terrorist 2 and Head Terrorist 3 raid all thirty-four of
the suspected moles and find the planted documents. They begin to interrogate
all thirty-four of them in order to find out how deep the CIA has penetrated
their organization. None of them know anything but most of them make up real
sounding false information to make the interrogations end.
(Day 3, Hour 3) Team 1 determines that most remaining Facebook and Twitter
accounts can not be breached. Several team members leave and a few stick around
to try and finish off the remaining accounts.
(Day 6, Hour 17) Scotland Yard arrests the person allegedly paying for Bina
Al-ar-mal’s web hosting. It is later determined that the person is actually
part of a London-based Bina Al-ar-mal cell.
(Day 6, hour 20) Team 2 destroys Bina Al-ar-mal’s web site after catching word
of the Scotland Yard raid.
End Result: One of three head terrorists is being held by their own
organization as a traitor and thirty-four unrelated terrorists are being held
by their own organization and brutally interrogated about actions they did not
commit. One terrorist is in the custody of the Scotland Yard, and a British
terror cell has been exposed. Bina Al-ar-mal’s entire communication network is
compromised (but they do not know that yet), and their website has been taken
offline permanently. All members of Bina Al-ar-mal are now becoming
increasingly suspicious of their fellow members and the hacktivist collective
is now in a position to launch further attacks on Bina Al-ar-mal (using the
compromised email and social media accounts) at a later time. This has all been
accomplished in under a week.
________________________________________________________________________________
Disclaimer: All information provided in this document is for educational
purposes only. The ideas presented here are solely academic and should never be
acted upon or put into practice. The author of this document will not be held
responsible in the event any criminal or civil charges be brought against any
individuals misusing the information in this document to break the law.
Meditation is nothing but a device to make you aware of your real self – which is not created by you which need not be created by you, which you already are. You are born with it. You are it! It needs to be discovered. If this is not possible, or if the society does not allow it to happen… and no society allows it to happen, because the real self is dangerous: dangerous for the established church, dangerous for the state, dangerous for the crowd, dangerous for the tradition, because once a man knows his real self, he becomes an individual.
He no longer belongs to the mob psychology; he will not be superstitious; and he cannot be exploited, and he cannot be led like cattle, he cannot be ordered and commanded. He will live according to his light; he will live from his own inwardness. His life will have tremendous beauty, integrity. But that is the fear of society.
Encryption has gained the attention of actors on both sides of the mass surveillance debate. For example in a speech at the Brookings Institution FBI Director James Comey complained that strong encryption was causing U.S. security services to “go dark.” Comey described encrypted data as follows:
“It’s the equivalent of a closet that can’t be opened, a safe deposit box that can’t be opened, a safe that can’t ever be cracked.”
Got that? Comey essentially says that encryption is a sure bet. Likewise during an interview with James Bamford whistleblower Ed Snowden confidently announced that:
“We have the means and we have the technology to end mass surveillance without any legislative action at all, without any policy changes… By basically adopting changes like making encryption a universal standard—where all communications are encrypted bydefault—we can end mass surveillance not just in the United States but around the world.”
If you glanced over the above excerpts and took them at face value you’d probably come away thinking that all you needed to protect your civil liberties is the latest encryption widget. Right? Wow, let me get my check book out! PagingMr. Omidyar…
Not so fast bucko. There’s an important caveat, some fine print that Ed himself spelled out when he initially contacted film director Laura Poitras. In particular Snowden qualified that:
“If the device you store the private key and enter your passphrase on has been hacked, it is trivial to decrypt our communications.”
This corollary underscores the reality that, despite the high profile sales pitchthat’s being repeated endlessly, strong encryption alone isn’t enough. Hi-techsubversion is a trump card as the Heartbleed bug graphically illustrated. In light of the NSA’s mass subversion programsit would be naïve to think that there aren’t other critical bugs like Heartbleed, subtle intentional flaws, out in the wild being leveraged by spies.
The FBI’s Tell
James Comey’s performance at Brookings was an impressive public relations stunt. Yet recent history is chock full of instances where the FBI employed malware like Magic Lantern and CIPAV to foil encryption and identify people usingencryption-based anonymity software like Tor. If it’s expedient the FBI will go so far as to impersonate a media outletto fool suspects into infecting their own machines. It would seem that crooks aren’t the only attackers who wield social engineering techniques.
In fact the FBI has gotten so adept at hacking computers, utilizing what are referred to internally as Network Investigative Techniques, that the FBI wants to change the law to reflect this. The Guardian reportson how the FBI is asking the U.S. Advisory Committee on Rules and Criminal Procedure to move the legal goal posts, so to speak:
“The amendment [proposed by the FBI] inserts a clause that would allow a judge to issue warrants to gain ‘remote access’ to computers ‘located within or outside that district’ (emphasis added) in cases in which the ‘district where the media or information is located has been concealed through technological means’. The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.”
In other words the FBI wants to be able to hack into a computer when its exact location is shrouded by anonymity software. Once they compromise the targeted machine it’s pretty straightforward to install a software implant (i.e. malware) and exfiltrate whatever user data they want, including encryption passwords.
If encryption is really the impediment that director Comey makes it out to be then why is the FBI so keen to amend the rules in a manner which implies that they can sidestep it? In the parlance of poker this is a “tell.”
Denouncement
As a developer who has built malicious softwaredesigned to undermine security tools I can attest that there is a whole burgeoning industrywhich prays on naïve illusions of security. Companies like Hacking Teamhave found a lucrative niche offering products to the highest bidder that compromise security and… a drumroll please… defeat encryption.
There’s a moral to this story. Cryptome’s own curmudgeon, John Young, prudently observes:
“Protections of promises of encryption, proxy use, Tor-likeanonymity and ‘military- grade’ comsec technology are magic acts –ELINT, SIGINT and COMINT always prevail over comsec. The most widely trusted and promoted systems are the most likely to be penetrated, exploited, spied upon, successfully attacked, covertly compromised with faults hidden by promoters, operators, competitors, compromisers and attackers all of whom warn against the others while mutually benefiting from continuous alarms about security and privacy.”
When someone promises you turnkey anonymity and failsafe protection from spies, make like that guy on The Walking Dead and reach for your crossbow. Mass surveillance is a vivid expression of raw power and control. Hence what ails society is fundamentally a political problemwith economic and technical facets, such that safeguarding civil liberties on the Internet will take a lot more than just the right app.
Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.
The popular views attributed to Niccolo Machiavelli are not actually his own. Having not actually read him, the assumption by many is that he is known for advocating the notion that the ends justify any means, while rulers of state must have no scruples in achieving their ends. While Machiavelli was a pragmatist in many respects, his positions place him firmly within the classical Western tradition of statecraft. As a Renaissance thinker, the desire to revive classical Greek and Roman learning was in fashion, and it is within that milieu that we must situate him. He does not advocate tyranny and abuse, and his insights on intrigue, subterfuge and conspiracy illuminate and rebuke many of the errors of our degenerate, effeminate gaggle of so-called leaders. Machiavelli’s The Prince is well-known, but few are familiar with his Art of War and The Discourses, which contain a wealth of knowledge about the workings of the state and strategic designs, and it is to all of these we must look to gain deeper insight.
In The Discourses, Machiavelli describes the cycle through which most civil states go, from oligarchy to revolution to democracy to anarchy. Revolutionaries should take note, as the “revolution” they often seek to inflame often ends up bringing an even worse tyranny to follow. Revolutionaries, unfortunately, are not historically known for a keen understanding of human nature, allowing their ideals to override the real, and as a result, the Marxist state for example, finds itself frustrated and collapsing from within. Add to this the fact that most historical revolutionaries have been the tools of foreign and economic interests, and one begins to see why the pattern persists. We can also see something akin to the future ideas of Oswald Spengler, where patterns and cycles are crucial, timeless phenomenon for historical analysis.
Machiavelli writes of the cycle of the state in The Discourses on Livy, Book I:
“Having proposed to myself to treat of the kind of government established at Rome, and of the events that led to its perfection, I must at the beginning observe that some of the writers on politics distinguished three kinds of government, viz. the monarchical, the aristocratic, and the democratic; and maintain that the legislators of a people must choose from these three the one that seems to them most suitable. Other authors, wiser according to the opinion of many, count six kinds of governments, three of which are very bad, and three good in themselves, but so liable to be corrupted that they become absolutely bad. The three good ones are those which we have just named; the three bad ones result from the degradation of the other three, and each of them resembles its corresponding original, so that the transition from the one to the other is very easy. Thus monarchy becomes tyranny; aristocracy degenerates into oligarchy; and the popular government lapses readily into licentiousness. So that a legislator who gives to a state which he founds, either of these three forms of government, constitutes it but for a brief time; for no precautions can prevent either one of the three that are reputed good, from degenerating into its opposite kind; so great are in these the attractions and resemblances between the good and the evil.”
We see here a realistic perspective inherited from the ancients. All governments are liable to corruption and tyranny, although some more than others. The pattern for degeneration is monarchy becoming a tyranny, aristocracy becoming and oligarchy, and democracy becoming anarchy. This pattern also hearkens to Aristotle, who made a similar list in his Politics. History has seen many states, but all fall into these same basic forms. While some governments are certainly better in form than others, nothing can halt a corrupt, degenerate elite and populace from collapsing when moral degeneracy and corruption reign. However, there is an important realist corrective to modernity and progressive thinking here that cannot be passed over, which is that the reason for the collapse of any state is not the form of government itself, but the rise of corruption in men’s hearts. Modern liberalism, which is still the norm among most, in praxis at least, assumes that the solution to problems arises from changes in law and government. If we can only change our political leaders and get a new crop in! If we can only change the law to get proposition 666 passed, why then we would have our freedom and progress! Nothing could be further from the truth, as the problem ultimately lies not in externals, but in man’s own heart. Corruption is rooted in, and proceeds from, individuals and their decisions, not from external forms and systems. Classical liberalism and modern liberalism are rooted in the metaphysical error of attributing the location of evil in some institution, and not in man’s own decisions.
In this regard, Machiavelli is a pessimist with respect to human nature. While the Renaissance is often lauded for its high view of human nature adopted from the Greeks, Machiavelli does not see the populace as able to govern themselves. Heavily influenced by St. Augustine, Niccolo’s negative appraisal of human nature places him in a non-democratic tradition of classical republicanism. While critical of monarchy due to its liability to fall into tyranny through its hereditary descendants, it is certainly not the worst form of government, which is democracy. Early seeds of the U.S. Constitution can also be seen here, as Machiavelli is one of the most famous proponents of republicanism of the Italian tradition, and Madison and Hamilton had clearly read and been influenced by the Florentine thinker, as The Federalist Papersappear to show. Elucidating the cycle of collapse, Machiavelli comments, with hints of the nascent social contract theory:
“Chance has given birth to these different kinds of governments amongst men; for at the beginning of the world the inhabitants were few in number, and lived for a time dispersed, like beasts. As the human race increased, the necessity for uniting themselves for defence made itself felt; the better to attain this object, they chose the strongest and most courageous from amongst themselves and placed him at their head, promising to obey him. Thence they began to know the good and the honest, and to distinguish them from the bad and vicious; for seeing a man injure his benefactor aroused at once two sentiments in every heart, hatred against the ingrate and love for the benefactor. They blamed the first, and on the contrary honored those the more who showed themselves grateful, for each felt that he in turn might be subject to a like wrong; and to prevent similar evils, they set to work to make laws, and to institute punishments for those who contravened them. Such was the origin of justice. This caused them, when they had afterwards to choose a prince, neither to look to the strongest nor bravest, but to the wisest and most just. But when they began to make sovereignty hereditary and non-elective, the children quickly degenerated from their fathers; and, so far from trying to equal their virtues, they considered that a prince had nothing else to do than to excel all the rest in luxury, indulgence, and every other variety of pleasure. The prince consequently soon drew upon himself the general hatred. An object of hatred, he naturally felt fear; fear in turn dictated to him precautions and wrongs, and thus tyranny quickly developed itself. Such were the beginning and causes of disorders, conspiracies, and plots against the sovereigns, set on foot, not by the feeble and timid, but by those citizens who, surpassing the others in grandeur of soul, in wealth, and in courage, could not submit to the outrages and excesses of their princes.
Under such powerful leaders the masses armed themselves against the tyrant, and, after having rid themselves of him, submitted to these chiefs as their liberators. These, abhorring the very name of prince, constituted themselves a new government; and at first, bearing in mind the past tyranny, they governed in strict accordance with the laws which they had established themselves; preferring public interests to their own, and to administer and protect with greatest care both public and private affairs. The children succeeded their fathers, and ignorant of the changes of fortune, having never experienced its reverses, and indisposed to remain content with this civil equality, they in turn gave themselves up to cupidity, ambition, libertinage, and violence, and soon caused the aristocratic government to degenerate into an oligarchic tyranny, regardless of all civil rights. They soon, however, experienced the same fate as the first tyrant; the people, disgusted with their government, placed themselves at the command of whoever was willing to attack them, and this disposition soon produced an avenger, who was sufficiently well seconded to destroy them.
The memory of the prince and the wrongs committed by him being still fresh in their minds, and having overthrown the oligarchy, the people were not willing to return to the government of a prince. A popular government was therefore resolved upon, and it was so organized that the authority should not again fall into the hands of a prince or a small number of nobles. And as all governments are at first looked up to with some degree of reverence, the popular state also maintained itself for a time, but which was never of long duration, and lasted generally only about as long as the generation that had established it; for it soon ran into that kind of license which inflicts injury upon public as well as private interests. Each individual only consulted his own passions, and a thousand acts of injustice were daily committed, so that, constrained by necessity, or directed by the counsels of some good man, or for the purpose of escaping from this anarchy, they returned anew to the government of a prince, and from this they generally lapsed again into anarchy, step by step, in the same manner and from the same causes as we have indicated. Such is the circle which all republics are destined to run through.”
The cycle of collapse for the republic is similar to that of other forms of government, but is all the more relevant for our present day. Since the French Revolution, the majority of the world’s states operate under the auspices of being “republics,” but there is an important distinction to be made that Machiavelli could have never foreseen: global shadow government. In fact, it is Machiavellian realism that leads one to easily understand that our world is governed by international shadow entities that utilize nation states as fronts. We are far beyond the era of the outdated nation-state going to war against rival nation-state – ours is the era of global oligarchical cartels in competition, with the Anglo-American establishment currently at the top. Cartels and empires have always existed, but the world has never seen a global secret technocratic shadow government, and in that respect, we are in a unique situation. The issues of corruption and degeneracy, are not new, but even more rampant than anything in Machiavelli’s day, precisely because there are newer, more sophisticated means of technological tyranny and evil than in any previous age. We can see from this classical perspective that conspiracies and espionage are not surprising – they are synonymous with perennial statecraft.
On conspiracies, Machiavelli explains in The Prince:
“But concerning his subjects, when affairs outside are disturbed he has only to fear that they will conspire secretly, from which a prince can easily secure himself by avoiding being hated and despised, and by keeping the people satisfied with him, which it is most necessary for him to accomplish, as I said above at length. And one of the most efficacious remedies that a prince can have against conspiracies is not to be hated and despised by the people, for he who conspires against a prince always expects to please them by his removal; but when the conspirator can only look forward to offending them, he will not have the courage to take such a course, for the difficulties that confront a conspirator are infinite. And as experience shows, many have been the conspiracies, but few have been successful; because he who conspires cannot act alone, nor can he take a companion except from those whom he believes to be malcontents, and as soon as you have opened your mind to a malcontent you have given him the material with which to content himself, for by denouncing you he can look for every advantage; so that, seeing the gain from this course to be assured, and seeing the other to be doubtful and full of dangers, he must be a very rare friend, or a thoroughly obstinate enemy of the prince, to keep faith with you.
And, to reduce the matter into a small compass, I say that, on the side of the conspirator, there is nothing but fear, jealousy, prospect of punishment to terrify him; but on the side of the prince there is the majesty of the principality, the laws, the protection of friends and the state to defend him; so that, adding to all these things the popular goodwill, it is impossible that any one should be so rash as to conspire. For whereas in general the conspirator has to fear before the execution of his plot, in this case he has also to fear the sequel to the crime; because on account of it he has the people for an enemy, and thus cannot hope for any escape….
For this reason I consider that a prince ought to reckon conspiracies of little account when his people hold him in esteem; but when it is hostile to him, and bears hatred towards him, he ought to fear everything and everybody. And well-ordered states and wise princes have taken every care not to drive the nobles to desperation, and to keep the people satisfied and contented, for this is one of the most important objects a prince can have.”
Here Niccolo expounds the heart of conspiracy from the perspective of the ruler. Conspiracy need only be feared when the ruler is hated as a result of his tyranny or sadistic cruelty. Fear is a crucial key in the arsenal of the state, but fear must be tempered by virtue and security, and the imbalance in either direction leads to sedition from others and conspiracies become successful. For the ruler, conspiracy the maintenance of goodwill among subjects is obtained through the management of public perception and genuine goodwill by the ruler. It is not a license for doing anything and everything to maintain power, as many wrongly accuse Machiavelli, but as a balance of mercy and severity, and that power is maintained by fear. Contrary to popular opinion, Machiavelli firmly rebukes the notion of immorality and devious designs, opting instead for an approach of balance, with the ruler’s reputation standing on its own through virtue. Any other imbalance leads the ruler to fall prey to his own vices and overthrown by his own self-destructive folly.
Roman Catholicism through St. Augustine and classical virtue ethics also factor into Machiavelli’s tempering of the prince as it did for medieval warfare as a whole. This comes to the fore in his lesser known Art of War that was the first treatise on modern warfare that would revolutionize the field. For ancient and medieval leaders, the state, espionage, warfare and its deceptions, and the game of politics were considered “arts” that could only be mastered through study and practice. Systematizing everything from military camps, music, flags and colors, size and ranks, Machiavelli revolutionized the medieval army to become a hierarchical standard that would be the norm for future Europe. On another level, it also contains interesting aspects relating to psychological warfare, espionage and deception that are instructive for us in our day that help to grasp the level of deception we live under. The ancient arts of statecraft and deception are not forgotten, they have been perfected and through a high-tech overlay, are beyond anything Niccolo could have imagined.
He writes:
“Birds or dust have often discovered the enemy, for where the enemy comes to meet you, he will always raise a great dust which will point out his coming to you. Thus often a Captain when he sees in a place whence he ought to pass, pigeons taking off and other birds flying about freely, circling and not setting, has recognized this to be the place of any enemy ambush, and knowing this has sent his forces forward, saving himself and injuring the enemy. As to the second case, being drawn into it ((which our men call being drawn into a trap)) you ought to look out not to believe readily those things that appear to be less reasonable than they should be: as would be (the case) if an enemy places some booty before you, you would believe that it to be (an act of) love, but would conceal deceit inside it.”
Book VI is the best section for these machinations, and in it we see the following perennial tactics:
Consult a rising enemy or possible sedition to give the impression of heeding his ideas and win him by feigned interest
Send wise men into the enemy’s camp as fake attendants of a fake dignitary to assess the enemy
Use false defectors to be spies in the enemy’s camp
Conversely, capture the enemy’s commanders to gain intelligence on the opponent
If you have suspected spies in your camp, disseminate false information to various parties to see how the enemy reacts to which
Sacrifice a town or some pawns as a gambit to give the enemy a false sense of security
Utilize religious and superstitious omens as far as your soldiers revere them or invent them
Disguise your soldiers as the enemy
Give the appearance of retreat to lead the enemy into a trap
Leave an open encampment for the enemy with fresh, albeit poisoned, supplies
Never cause an enemy to despair, since he will only fight more desperately and possibly defeat you
Use a subterfuge of a fake illness in your camp that leads the enemy to think you are weak
Communicate among your generals and men with secret ciphers and codes the enemy cannot decode
Use propaganda and stories to create a boost of morale among your men
Many more could be listed, but these are the most interesting and in our day, these tricks are used by the elite, not on foreign powers primarily, but as the bases for mass deception, with a massive surveillance state, poisoned food and water, false media reports, and countless other ruses. One might think from this list Machiavelli is immoral and devious, but for him, these are necessary facts of war with the enemy, not on the populace itself. The goal of war is not virtue for him, but simply to win at all costs. Yet winning at all costs does not mean being sadistic or cruel or a brute, it means learning the art of war to be a just ruler and by so doing, win the admiration of your soldiers and homeland. Far from corruption, Machiavelli castigated the corrupt leaders of his day and it serves as an apt warning to ours. Corruption and effeminate degeneracy among the elite does not lead to power, it leads to the loss of power. As far as one concedes to evil and vice in his own heart, especially the ruler, to that degree does he lose his power and become subservient to the passions.
He concludes:
“But let us turn to the Italians, who, because they have not wise Princes, have not produced any good army; and because they did not have the necessity that the Spaniards had, have not undertaken it by themselves, so that they remain the shame of the world. And the people are not to blame, but their Princes are, who have been castigated, and by their ignorance have received a just punishment, ignominiously losing the State, (and) without any show of virtu….
Our Italian Princes, before they tasted the blows of the ultramontane wars, believed it was enough for them to know what was written, think of a cautious reply, write a beautiful letter, show wit and promptness in his sayings and in his words, know how to weave a deception, ornament himself with gems and gold, sleep and eat with greater splendor than others, keep many lascivious persons around, conduct himself avariciously and haughtily toward his subjects, become rotten with idleness, hand out military ranks at his will, express contempt for anyone who may have demonstrated any praiseworthy manner, want their words should be the responses of oracles; nor were these little men aware that they were preparing themselves to be the prey of anyone who assaulted them.”
“The Things that bother me is the hole in the Pentagon being too small for a plane, the lawn isn’t mussed up, and the government is not showing the plane hittingwhen many cameras photographed it. At the WTC, 3 buildings came down like demolitions, and two of them were hit by a plane, but the third one they said, “do you want us to pull it?” …and they pulled it, and it looked just like the other two! Those things bother me! In Pennsylvania, the plane that went down, it was just a hole in the ground! There wasn’t any wreckage, or skid marks, there wasn’t any tear in the earth…and no one’s ever really found out about that! So, every place there’s questions!”
“I’m very familiar with the 9/11 Truth movement, and I’m totally convinced that 9/11 was a fraud. There’s no doubt in my mind about that. At first I didn’t want to believe it. It’s such an ugly thing to believe.”
“Whistle-Blowers, Dissenters and Progressives Are the Patriots” -Phil Donahue
Well, I came to the realization that America has become, we are a nation of law unless we’re scared. And we’re scared. Nobody likes us. I think we’ve got our presidents–I don’t know how long it’s going to take before our president is going to have to visit a church picnic in a Bradley armored vehicle. You know, America, the ones who boast most about America are the ones turning their back on the jewel of America, which is the Constitution, the Bill of Rights. The framers were right: don’t let one man have the power to declare war. And, as you know, we haven’t done that since–. And if I’m scared, you can listen in on my phone; I’ve got nothing to hide. How many times have you heard that? Which is probably what they said in Nazi Germany, too, in advance of the rise of the Third Reich.
There is a failure to appreciate the whole purpose of the First Amendment. You know, if you can’t speak, if you can’t dissent, then stop sending our young men and women to war to protect these fabulous virtues of the American experience, which is to get a neo-Mussolini, and he’ll tell us what’s good for us, and people will make–old men will tell us what’s good for us behind closed doors. It’s amazing what you can do if you scare the people.
Voice biometrics—the use of voice-recognition software to record and use your speech patterns as a unique “fingerprint” that can be used to identify you—will be increasingly standardized for government and businesses in the next two to three years
Everybody has a unique voice—and it can now be used to track you.
That’s the burgeoning field of “voice biometrics,” and businesses and governments are increasingly using the technology to track individuals—an estimated 65 million voiceprints are now in corporate and government databases, according to the Associated Press. And the technology is now widely available, and spreading rapidly.
Among the companies that AP identifies as using biometrics are Barclays Bank, mutual fund manager Vanguard Group, and Turkish cell phone provider Turkcell. On the government side, US law enforcement uses voice biometrics to track inmates and paroled offenders, the Internal Revenue Department in New Zealand currently has 1 million voiceprints on record, and South Africa’s Social Security Agency has tallied 7 million voiceprints.
Via AP:
Activists worry that the popularity of voiceprinting has a downside.
“It’s more mass surveillance,” said Sadhbh McCarthy, an Irish privacy researcher. “The next thing you know, that will be given to border guards, and you’ll need to speak into a microphone when you get back from vacation.”
The legality of voice recording differs from country to country. In the United States, voice recording falls under state, rather than federal law, and rules differ from state to state. In 38 states and the District of Columbia, “conversations may be recorded if the person is party to the conversation, or if at least one of the people who are party to the conversation have given a third party consent to record the conversation. In California, Connecticut, Delaware, Florida, Illinois, Maryland, Massachusetts, Nevada, New Hampshire, Pennsylvania, Vermont, and Washington State, the consent of all parties of the conversation must be obtained in order to record a conversation,” according to Wikipedia.
Consent, of course, may be given without much thought—it might easily be buried in, for instance, a phone company’s terms of service, or an “all calls may be recorded for training purposes” notice on a phone call you sleep through.
Within the next two to three years, it’s expected that more and more companies will begin standardizing the use of voice biometrics as passwords—you’ll just speak your name or a phrase into the phone to identify yourself, instead of a password.
Of course, once locked in, voice biometrics could conceivably be used to track individuals in public places, meaning that the use of cell phones to monitor and track individuals could be obsolete, giving way to simply tracking any spoken word as long as it’s in the range of equipment sensitive enough to identify voice biometrics.
The Electronic Frontier Foundation has been sounding the alarm about biometrics and civil liberties violations since 2003—in this case, facial recognition technology. Documents released by Edward Snowden this summer reveal that the NSA collects over 55,000 facial recognition quality images a day through global surveillance programs—through e-mails, texts, social media, videoconferencing and more. As the NSA has been demonstrated to track and record nearly all cell phone calls, it presumably wouldn’t be much trouble to use that information for establishing a covert voice biometrics database.
Avram Noam Chomsky (/ˈnoʊmˈtʃɒmski/; born December 7, 1928) is an American linguist, philosopher,[21][22]cognitive scientist,logician,[23][24][25] political commentator and activist. Sometimes described as the “father of modern linguistics”,[26][27] Chomsky is also a major figure in analytic philosophy.[21] He has spent most of his career at the Massachusetts Institute of Technology (MIT), where he is currently Professor Emeritus, and has authored over 100 books. He has been described as a prominent cultural figure, and was voted the “world’s top public intellectual” in a 2005 poll.[28]In the 1990s, Chomsky embraced political activism to a greater degree than before.[113His far-reaching criticisms of U.S. foreign policy and the legitimacy of U.S. power have raised controversy.[114][115] Chomsky has received death threats because of his criticisms of U.S. foreign policy.[116] He has often received undercover police protection at MIT and when speaking on the Middle East, although he has refused uniformed police protection.[117]The Electronic Intifada website claims that theAnti-Defamation League “spied on” Chomsky’s appearances, and quotes Chomsky as being unsurprised at that discovery or the use of what Chomsky claims is “fantasy material” provided to Alan Dershowitz for debating him. Amused, Chomsky compares the ADL’s reports to FBI files.[118]
Chomsky resides in Lexington, Massachusetts, and travels, giving lectures on politics and linguistics.
Following leads on the anthrax trail took us across four continents – filming outside the high security perimeter fences of some of the world’s most secret germ war labs (and inside a couple), tracking down and talking to experts and scientists some of whom were members of the so called “International Bio-Weapons Mafia”. None was more chilling than the face to face we got with the man they call Doctor Death – Wouter Basson, the army scientist who headed apartheid South Africa’s secret germ war program – Project Coast.
Shrouded in mystery and hidden behind front companies that used worldwide intelligence connections, the shocking activities of the program only emerged after the fall of apartheid – revealing a shockingly sophisticated operation that had 200 scientists developing germ war agents to be used against the country’s black population.
This was one of the very few interviews Doctor Death has given and for the first time he talks candidly about the help the received from the West, his relationship with David Kelly and the creation of “the Black Bomb” an agent that could sterilize blacks without their knowledge.
And then there’s his strange relationship with Larry Ford, the Mormon gynecologist to Hollywood stars who was also moonlighting for the South Africans and had CIA connections.
Some experts are wondering whether Doctor Deaths’s program provided a convenient off-shore operation for Western germ war experimentation?
Operating out of South Africa during the Apartheid era in the early 1980’s, Dr. Wouter Basson launched a secret bioweapons project called Project Coast. The goal of the project was to develop biological and chemical agents that would either kill or sterilize the black population and assassinate political enemies. Among the agents developed were Marburg and Ebola viruses.
Basson is surrounded by cloak and dagger intrigue, as he told Pretoria High court in South Africa that “The local CIA agent in Pretoria threatened me with death on the sidewalk of the American Embassy in Schoeman Street.” According to a 2001 article in The New Yorker magazine, the American Embassy in Pretoria was “terribly concerned” that Basson would reveal deep connections between Project Coast and the United States.
In 2013, Basson was found guilty of “unprofessional conduct” by the South African health council.
Bioweapons expert Jeanne Guillemin writes in her book Biological Weapons: From the Invention of State-Sponsored Programs to Contemporary Bioterrorism, “The project‘s growth years were from 1982 to 1987, when it developed a range of biological agents (such as those for anthrax, cholera, and the Marburg and Ebola viruses and for botulinum toxin)…“
Basson’s bioweapons program officially ended in 1994, but there has been no independent verification that the pathogens created were ever destroyed. The order to destroy them went directly to Dr. Basson. According to the Wall Street Journal, “The integrity of the process rested solely on Dr. Basson’s honesty.”
Basson claims to have had contact with western agencies that provided “ideological assistance” to Project Coast. Basson stated in an interview shot for the documentary Anthrax War that he met several times with Dr. David Kelly, the infamous UN weapons inspector in Iraq. Kelly was a top bioweapons expert in the United Kingdom. He was found dead near his home in Oxfordshire in 2003. While the official story claims he committed suicide, medical experts highly doubt this story.
In a 2007 article from the Mail Online, it was reported that a week prior to his death, Dr. Kelly was to be interviewed by MI5 about his ties to Dr. Basson.
Dr. Timothy Stamps, Minister of Health of Zimbabwe, suspected that his country was under biological attack during the time that Basson was operating. Stamps told PBS Frontline in 1998 that “The evidence is very clear that these were not natural events. Whether they were caused by some direct or deliberate inoculation or not, is the question we have to answer.”
Stamps specifically named the Ebola and Marburg viruses as suspect. Stamps thinks that his country was being used as a testing ground for weaponized Ebola.
“I’m talking about anthrax and cholera in particular, but also a couple of viruses that are not endemic to Zimbabwe [such as] the Ebola type virus and, we think also, the Marburg virus. We wonder whether in fact these are not associated with biological warfare against this country during the hostilities…Ebola was along the line of the Zambezi [River], and I suspect that this may have been an experiment to see if a new virus could be used to directly infect people.”
The Ghanaian Times reported in early September on the recent Ebola outbreak, noting connections between Basson and bioweapons research. The article points out that, “…there are two types of scientists in the world: those who are so concerned about the pain and death caused to humans by illness that they will even sacrifice their own lives to try and cure deadly diseases, and those who will use their scientific skill to kill humans on the orders of… government…”
Indeed, these ideas are not new. Plato wrote over 2,000 years ago in his work The Republic that a ruling elite should guide society, “…whose aim will be to preserve the average of population.” He further stated, “There are many other things which they will have to consider, such as the effects of wars and diseases and any similar agencies, in order as far as this is possible to prevent the State from becoming either too large or too small.”
As revealed by The Age, Nobel prize winning Australian microbiologist Sir Macfarlane Burnet secretly urged the Australian government in 1947 to develop bio weapons for use against the “overpopulated countries of South-East Asia.” In a 1947 meeting with the New Weapons and Equipment Development Committee, the group recommended that “the possibilities of an attack on the food supplies of S-E Asia and Indonesia using B.W. agents should be considered by a small study group.”
This information gives us an interesting perspective on the recent unprecedented Ebola outbreak. Is it an organic natural phenomenon? Did this strain of Ebola accidentally escape from a bioweapons lab? Or, was it deliberately released?
Written by Krishnamurti in 1980 at the request of his biographer Mary Lutyens.
The core of Krishnamurti’s teaching is contained in the statement he made in 1929 when he said, “Truth is a pathless land”. Man cannot come to it through any organization, through any creed, through any dogma, priest or ritual, not through any philosophical knowledge or psychological technique. He has to find it through the mirror of relationship, through the understanding of the contents of his own mind, through observation and not through intellectual analysis or introspective dissection.
Man has built in himself images as a fence of security—religious, political, personal. These manifest as symbols, ideas, beliefs. The burden of these images dominates man’s thinking, his relationships, and his daily life. These images are the causes of our problems for they divide man from man. His perception of life is shaped by the concepts already established in his mind. The content of his consciousness is his entire existence. The individuality is the name, the form and superficial culture he acquires from tradition and environment. The uniqueness of man does not lie in the superficial but in complete freedom from the content of his consciousness, which is common to all humanity. So he is not an individual.
Freedom is not a reaction; freedom is not choice. It is man’s pretence that because he has choice he is free. Freedom is pure observation without direction, without fear of punishment and reward. Freedom is without motive; freedom is not at the end of the evolution of man but lies in the first step of his existence. In observation one begins to discover the lack of freedom. Freedom is found in the choiceless awareness of our daily existence and activity.
Thought is time. Thought is born of experience and knowledge, which are inseparable from time and the past. Time is the psychological enemy of man. Our action is based on knowledge and therefore time, so man is always a slave to the past. Thought is ever limited and so we live in constant conflict and struggle. There is no psychological evolution. When man becomes aware of the movement of his own thoughts, he will see the division between the thinker and thought, the observer and the observed, the experiencer and the experience. He will discover that this division is an illusion. Then only is there pure observation which is insight without any shadow of the past or of time. This timeless insight brings about a deep, radical mutation in the mind.
Total negation is the essence of the positive. When there is negation of all those things that thought has brought about psychologically, only then is there love, which is compassion and intelligence.
Just a few years ago he was doing well; as a trained Intelligence Analyst in the US Air National Guard he looked forward to a stable and glamorous career at the center of action, living inside a virtual videogame and fighting America’s enemies via drones. It was a heady combination of gamer geek dreams and the aspirations of a good boy who’d grown up in a military family, following his parents’ path to public service.
Now he sits in a cell in a foreign country, far from his Indiana roots, suffering from PTSD and recovering from two apparent suicide attempts. The last one by diving headfirst onto a concrete floor from a top bunk bed. He’s struggling hard to stay in that cell, too; or at least, never to return to the land of his birth, the land he once served so proudly.
In a series of clipped, yet eloquent, emails Major Paul DeHart, Matt’s father, talked to us about the struggles his family have been through in the days since. “No prison is a good prison. Depriving any human being much less one who has grown up under western law which in theory at least values human dignity and freedom above most things is punishment enough. I will say compared to the way human beings in general and prisoners specifically are treated in any US prison system, state or federal, Canadian prisoners seem to be treated as human beings with at least the potential for rehabilitation.”
“But, the US approach to warehousing prisoners and exploiting them as resources for labour and prison-industrial-complex businesses is no different than the way the US approaches old people in nursing homes or labour in general. From a corporatist standpoint, a human resource which is no longer productive is no longer of any value. The concept of intrinsic human value seems to have been forgotten.”
On his son’s complex situation and appeal for sanctuary: “It’s simple in our book. He was tortured by the US. That is a violation of international law. Does anyone doubt any more that the US tortures people? If they have done it overseas to supposed enemies – why not to their own citizens? Why is the US Senate report in CIA torture still not released. You figure it out. Along those lines – I reference what happened to Canadian citizen [Maher] Arar.”
As Matt himself explained to the National Post, “It’s not that I’m not patriotic — I am. I voted for Bush. My family is military, pretty gung ho. But everything has changed.”
The DeHart case (as explained in the masterful five-part National Post chronicle) is neither straightforward nor at first glance tremendously sympathetic. Of his own volition he walked into the Russian Embassy in Washington, DC. What happened there depends on which version of the stories he’s told you believe. Either he was there to look for work and a new start, having lost faith in the US, or he was there to mislead them about drone technology, deliberately handing them misinformation to protect the country he loved. But what does this have to do with the child pornography charges against him, the only charges which have been filed? And if he’s wanted on child pornography charges, why did the FBI interrogate him as part of an espionage investigation, as the documentation shows?
And what does this have to do with Anonymous?
It all started with Chanology. According to statements DeHart gave Adrian Humphreys of the National Post, he participated in Project Chanology, the original “moralfag” action which pitted Anonymous against the Church of Scientology. There were many aspects to the operation, but the most famous was the adoption of the Guy Fawkes mask, since become inextricably associated with the hacktivist collective. The statements DeHart gave were corroborated by operation founder Gregg Housh, although he could not specifically identify participants, having known them only via pseudonyms.
Chanology was DeHart’s first taste of activism, and he liked it. Getting deeper into the hacktivist scene, he eventually ran a server on which some files which may or may not have been destined for WikiLeaks resided.
His American lawer Tor Ekeland told us via email, “This whole matter revolves around a file that appeared in the fall of 2009 on a TOR server Matt was a co-sys admin. People speculate that it was enroute to Wikileaks, although I have not seen any confirmation of this fact. The file was unencrypted for the first two days on the server. According to published reports, it’s an FBI investigative file of domestic criminal activity by the CIA.”
Then came the raid.
That was 2010. No malware and no such mystery file was found on DeHart’s computer equipment; he’d long since deleted the file, which had been uploaded to the server by someone else.
“I opened the door and it was the police task force. Your stomach drops and your heart beats like crazy. It takes you by surprise, even though I had nothing to hide once the server was destroyed…
I was shook up,” Matt said. “I don’t know everything they took, but I know they took everything. After they had left I looked at the search warrant which was left on the couch. It was a generic warrant from the Memphis FBI field office and it said they were searching for child pornography.”
That was when he started to lose faith. Not too long after that he visited the Russian and Venezuelan embassies, looking for the future he could no longer see himself having in the USA. He didn’t find it there and decided to take the same route once taken by escaped slaves, the Underground Railway to the free environs of Canada.
Part of the reasoning, as his father told Humphreys, was that if there was any hold-up with the passport, they’d know the child porn incident wasn’t over. There was no problem with the passport. He left, signed up for a French Immersion course which to his chagrin didn’t take, then enrolled in technical college in scenic Prince Edward Island, intending to study welding. “I figured I’d try something that had nothing to do with computers. I felt good going to Canada,” he explained to the National Post.
All was going well, but in order to start school he needed a student visa, which he had to obtain from his home country.
You see this coming, don’t you?
He bussed across the St Croix river to the American side, where he spent the night at a hotel and took care of the paperwork. Then he headed back to Canada. Presenting his passport at the border, he anticipated no issues. The guard scanned it, checked the computer, scanned it again, went into an office to check something, and suddenly all hell broke loose.
While two guards threw themselves in front of the exit, blocking it, DeHart was cuffed and plopped in a chair. Soon he was tumbled into the back of a Border Patrol vehicle which was driven by an FBI agent and taken to an ICE detention center, where he was refused a lawyer and detained.
DeHart says he was strapped into a lab chair and drugged with an IV drip, before being aggressively questioned for hours. He was shown a new criminal complaint, charging him with soliciting child pornography; it was written that very day.
His father explained some anomalies. “We have repeatedly asked in court in the US for actual transcripts of his interrogations and have been told there are no audio or video records. Yeah right. Two agents are flown out from the national security section in DC to interrogate Matt and there are no records. Hmmm.”
He was transferred from the ICE detention center to another holding facility, where he collapsed and was taken to hospital, where the doctors determined him to be in a paranoid state, claiming persecution by the FBI. His symptoms were consistent with “drug induced psychosis” according to medical personnel.
Department of Justice documents show that DeHart was not actually detained on child porn charges; he was detained relating to an issue of national security/espionage. And he remained detained for months, until a judge added up the inconsistencies in the case, found DeHart a credible witness and not a flight risk, and ordered that he be released with a monitoring bracelet and curfew.
On November 5, Guy Fawkes Day, Million Mask March day, Matt DeHart filed a motion to dismiss the charges against him.
On April 2 of the next year, he and his family fled, driving north almost a full day and night to a border station in Fort Francis, Ontario, where they claimed refugee status and requested asylum from the Canadian government. Ekeland explained, “He and his family are seeking refugee status in Canada based on the fact that Matt was tortured by the FBI and that he cannot get a fair trial in the U.S.”
Paul DeHart said, “We came to Canada to seek protection from the US under international law. We know the tremendous courage it would take any Canadian official to stand up to Canada’s closest ally and biggest trading partner. However, it has been done before. In my generation Canada welcomed war protesters who disobeyed draft laws in the US and came to Canada where tens of thousands of them were granted immigrant status and protected.” In more recent, more Conservative times, however, the Canadian government has been rounding up and repatriating (ie returning to the US) AWOL American soldiers.
The next day the Canadian government from whom they were seeking aid charged Matt with espionage against Canada.
“There are Americans who try to sneak across the Canadian border to flee US law enforcement all the time,’” said Paul DeHart. CBSA [Canada Border Services Agency] I’m sure keeps stats. We did not sneak anywhere. We reported to a CBSA office and declared ourselves as asylum seekers under the UN Convention Against Torture (CAT). Matt was not detained by Canadian officials until the following day when a US Judge issued an arrest warrant for failing to appear at a schedule court hearing.”
And this, along with the still-unresolved child pornography charges, is why Matt DeHart has spent the last year in Canadian jail cells. At one point he won limited release, and was reunited with his family, but when the family moved to a different apartment Matt notified his corrections officer of the move in an incorrect manner: by notifying the company in charge of his electronic monitor, who then notified the officer. His father explained, “Someone in the CBSA made a decision to have him rearrested on a
reporting technicality which had nothing to do with flight risk or danger to the community and forfeit the $10,000 bond we put up. Money by the way we could not afford to lose.” He remains in custody. Rallies for his release have been unsuccessful, if high-profile.
Paul DeHart told us, “You should thank God as Canadians you seem to still have a mature and unbiased judiciary. The judge who reviewed Matt’s bond release in Sept 2013, after CBSA challenged it in court, wrote a very well-supported opinion which basically said in paraphrase – in Canada someone is innocent until proven guilty. If her 13-page opinion is indicative of the quality of
Canadian judges, then I’d say at least judicially, Canadians are in good hands.”
“We are awaiting two decisions by the Immigration and Refugee Board. First, we await the admissibility decision for Matt. He is opposed by the govt for the charges in TN. The final submissions were sent in middle of August. A negative decision will start a time clock on a shortened process to have Matt sent back to the US. Actually, it’s my understanding that he would just have to be deported from Canada. Theoretically it doesn’t have to be back to the US, but where else would he be sent?”
“The other decision is whether as a family we qualify under for protection from the Canadian government. Final submission for that hearing are due this month. No telling how long either decision will take. Considering the unusual nature of our claim, we suspect the Canadian government will be sure to make a very thorough examination of each and have detailed rationale for the decisions.” This is going to involve a lot of lawyers, though, and they are not inexpensive, particularly for a couple of new immigrants who left behind established careers. “The [child porn] case in Tennessee is suspended until/unless Matt returns to the US as we understand it.”
The governments in question don’t appear to be in any rush. Major DeHart raises an interesting question: extradition. “After being in Canada since April 2013, a year and a half, there has been no extradition request from the US. Since these are relatively routine it raises the question – why not?”
We asked DeHart about the extent to which the Canadian and US governments were cooperating on the case. “Who knows?” he replied. “Clearly the questions Matt was asked by both CSIS [Canadian Security Intelligence Service, the “Canadian FBI”] and the War Crimes unit of CBSA were focused on events in the US which had nothing to do with child pornography. Questions Leann and I were asked at the admissibility hearing by CBSA hearings officers seemed to have come directly from the US. And, that makes sense since US border personnel are on Canadian soil and work closely with CBSA.”
Their old government seems content to leave the entire family in the hands of the Canadians, despite maintaining an apparent interest in watching events unfold. “We have not been contacted by anyone from the US government since we came to Canada,” Paul DeHart told us. “I will say that the day after we crossed the border in Ft. Frances we noticed at least a dozen US Homeland Security vehicles parked in that relatively small town. I do know we did not feel safe from the US there.” As a former NSA employee, DeHart is well-equipped to identify HS vehicles.
On September 12 DeHart’s US attorney Tor Ekeland created an online fundraiser to cover his legal expenses. He chose the site GoFundMe, which often works with Anonymous fundraisers.
That same day, the fundraiser was shut down.
“We got an email from GoFundMe saying we’d violated their Terms of Service, and that our account was being terminated,” Ekelund told me via email. “When we asked for explanation we got none. By the time we’d received the email the account had already been deleted.”
Paul DeHart said, “Well, you can draw your own conclusions. Supposedly the site was taken down for a violation of terms of service. But, since it was started and run by a law firm, that makes little sense.”
Not wasting any time, Ekeland immediately rebuilt the fundraiser on Canadian site Fundrazr, which also hosts Julian Assange’s personal fundraiser. “We had the Fundrazr up in an hour or two, most of the time which was spent on looking at alternatives sites. It took about 15 minutes to actually get it up and running again. It stands at $550 of a $10,000 goal.
“No money was lost. Gofundme sent us everything. I really don’t focus on fundraising, and I usually go thousands of dollars out of pocket on the cases I have that are like this. I never make money of these types of cases, and I’m certainly not doing it for the money.”
The future is uncertain, obscured in a blizzard of paperwork, allegations, missing files, and, most recently, very specific publication bans (which we are probably breaking by reporting this). There are two powerful, often collusive, governments
Ekeland explained, “As of this writing, the U.S. government has not taken any action to extradite Matt. They will not try him in absentia.”
Paul DeHart sums it up. “Unless you have spent a large part of your adult life serving in the S military you would have a hard time understanding what an absolutely gut-wrenching, traumatic experience it is to have to fill out a basis of claim form for asylum against the country you love and served. But there is no excuse for what was done to our son, and no one in the US seemed to care about that.”
“It is our intention to remain in Canada and live out the rest of our lives in peace. If we are granted status we would never be allowed to return to the country of our birth. My own mother passed away in May 2013 after we came here. I was unable to attend her funeral.”
“If we are permitted to remain in Canada and Matt is allowed free to pursue life again, then our lives will resume. We will work, live, and make a new life in Canada. We have no ambitions beyond this: to live free from the fear of the US government. Imagine knowing that your head is in the sights of a sniper some 2 miles away. You know that at any moment a trigger can be pulled sending a 50 calibre bullet into your skull and exploding it. I know that’s graphic and perhaps hyperbole, but that is what it
feels like to know that our lives are in the sights of the most powerful government on earth.”
“You wonder if this is the day someone pulls the trigger.”
NOTE: Matt’s job description has been corrected. He was originally reported to be a drone pilot, but was actually an Intelligence Analyst. His father writes, “His job in the Air National Guard was equivalent to PFC Manning’s in the Army.”
Michael Fishbach, co-founder of The Great Whale Conservancy (GWC), narrates his encounter with a young humpback whale entangled in local fishing nets.
At first, the animal appeared to be dead, yet Fishbach investigated and quickly discovered that the poor creature was tangled in a fishing net.
The humans had to act fast; what began as a tragedy soon became a thrilling rescue as Fishbach and his crew labored to free the young whale.
The entire encounter was caught on videotape and later narrated by Fishbach himself.
Watch as the whale named Valentina by her rescuers goes from near death to freedom, then rewards her saviours with dozens of magnificent full-body breeches and tail flips.
Indeed, this video has the power to inspire action on behalf of other beings. In ways big and small, each of us can be the one who helps another.
Opportunities to be a hero for animals are all around. Where will your compassion take you next?
Unbelievable hidden messages and symbolism are found not just in Disney productions but also Hollywood in large in general. The entertainment industry may not even realize the severity of the situation with its effort to follow along in ‘cool’ and ‘hip’ trends like flashing the Devil Horns and promoting 666 satanic symbolism.
When communities attempt to police the police, they often get, well… policed.
In several states, organized groups that use police scanners and knowledge of checkpoints to collectively monitor police activities by legally and peacefully filming cops on duty have said they’ve experienced retaliation, including unjustified detainment and arrests as well as police intimidation.
The groups operate under many decentralized organizations, most notably CopWatch and Cop Block, and have proliferated across the United States in the last decade – and especially in the aftermath of the events that continue to unfold in Ferguson, Missouri, after officer Darren Wilson fatally shot unarmed, black teenager Michael Brown.
Many such groups have begun proactively patrolling their communities with cameras at various times during the week, rather than reactively turning on their cameras when police enter into their neighborhoods or when they happen to be around police activity.
Across the nation, local police departments are responding to organized cop watching patrols by targeting perceived leaders, making arrests, threatening arrests, yanking cameras out of hands and even labeling particular groups “domestic extremist” organizations and part of the sovereign citizens movement – the activities of which the FBI classifies as domestic terrorism.
Courts across the nation at all levels have upheld the right to film police activity. The American Civil Liberties Union (ACLU) and photographer’s associcationshave taken many similar incidents to court, consistently winning cases over the years. The Supreme Court has ruled police can’t search an individual’s cellphone data without a warrant. Police also can’t legally delete an individual’s photos or video images under any circumstances.
“Yet, a continuing stream of these incidents (often driven by police who have been fed ‘nonsense‘ about links between photography and terrorism) makes it clear that the problem is not going away,” writes Jay Stanley, a senior policy analyst at the ACLU’s Speech, Privacy & Technology Project.
Sources who have participated in various organized cop watching groups in cities such as New York; Chicago; Cleveland; Las Vegas; Oakland; Arlington, Texas; Austin and lastly Ferguson, Missouri, told Truthout they have experienced a range of police intimidation tactics, some of which have been caught on film. Cop watchers told Truthout they have been arrested in several states, including Texas, New York, Ohio and California in retaliation for their filming activity.
More recently, in September, three cop watchers were arrested while monitoring police activity during a traffic stop in Arlington, Texas. A group of about 20 people, a few of them associated with the Tarrant County Peaceful Streets Project, gathered at the intersection of South Cooper Street and Lynda Lane during a Saturday night on September 6 to film police as they conducted a traffic stop. A video of what happened next was posted at YouTube.
Arlington police charged Janie Lucero, her husband, Kory Watkins, and Joseph Tye with interference of public duties. Lucero and Watkins were charged with obstructing a highway while Tye was arrested on charges of refusing to identify himself.
Arlington police have defended the arrests of the three cop watchers, but the watchers say they weren’t interfering with police work, and were told to move 150 feet away from the officers – around the corner of a building where they couldn’t film the officers.
“When we first started [cop watching, the police] seemed kind of bothered a little bit,” Watkins told Truthout. “There was a change somewhere where [the police] started becoming a little bit more offended, and we started having more cop watchers so I guess they felt like they needed to start bringing more officers to traffic stops.”
On the night of Watkin’s arrest, his group had previously monitored two other traffic stops without any confrontation with Arlington police officers before the incident that led to the arrests.
Sometimes, though, retaliation against cop watching groups goes far beyond arresting cop watchers on patrol.
Cops Label Cop Watch Groups Domestic Terrorists
On New Year’s Day in 2012, Antonio Buehler, a West Point graduate and former military officer, witnessed two Austin police officers assaulting a woman. He pulled out his phone.
As he began photographing the officers and asking questions about their activities, the cops assaulted and arrested him. He was charged with spitting in a cop’s face – a felony crime.
However, two witness videos of the incident surfaced and neither of them showed that Buehler spit in Officer Patrick Oborski’s face. A grand jury was finally convened in March 2013 and concluded there was not enough evidence to indict Buehler on any of the crimes he was charged with.
A few months after the New Year’s Day incident, Buehler and other Austin-based activists started the Peaceful Streets Project (PSP), an all-volunteer organization dedicated to stopping police abuse. The group has held “Know Your Rights” trainings and a Police Accountability Summit. The group also regularly organizes cop watch patrols in Austin.
Since the PSP was launched, the movement has grown, with local chapters popping up in other cities and states across the United States, including Texas’ Tarrant County chapter, which the three cop watchers arrested in Arlington were affiliated with.
But as the Peaceful Streets movement spread, police retaliation against the groups, and particularly Buehler himself, also escalated.
“[The Austin Police Department (APD)] sees us as a threat primarily because we shine a spotlight on their crimes,” Buehler said.
The group recently obtained documents from the APD through a Freedom of Information Act (FOIA) request that reveal Austin police colluded to arrest Buehler and other cop watchers affiliated with the Peaceful Streets Project. Since the New Year’s Day incident, Buehler has been arrested three more times by APD officers. At least four other members of PSP have been arrested on charges of interference or failing to identify themselves during their cop watching activities.
The emails indicate APD officers monitored Buehler’s social media posts and attempted to justify arresting him for another felony crime of online impersonation over an obviously satirical post he made on Facebook, as well as reveal that some APD officers coordinated efforts to stop PSP members’ legal and peaceful activities, even suggesting reaching out to the District Attorney’s office to see if anything could be done to incarcerate members of the group.
Another internal email from APD senior officer Justin Berry identifies PSP as a “domestic extremist” organization. Berry writes that he believes police accountability groups including PSP, CopWatch and Cop Block are part of a “national domestic extremism trend.” He believes he found “mirror warning signs” in “FBI intel.” Berry makes a strange attempt to lump police accountability activists and the hacker-collective Anonymous in with sovereign citizens groups as a collective revolutionary movement.
“Sovereign citizens” groups generally believe federal, state and local governments are illegitimate and operate illegally. Some self-described sovereign citizens create fake license plates, identification and forms of currency to circumvent official government institutions. The FBI classifies the activities of sovereign citizens groups as domestic terrorism, considering the groups a growing “domestic threat” to law enforcement.
Buehler told Truthout the APD is working with a Department of Homeland Security (DHS) fusion center to attempt to identify PSP as a sovereign citizens group to associate its members with domestic terrorism with state and federal authorities. DHS fusion centers are designed to gather, analyze and promote the sharing of intelligence information between federal and state agencies.
“They have spent a fair amount of resources tracking us, spying on us and infiltrating our group, and we are just peaceful activists who are demanding accountability for the police,” Buehler told Truthout. “They have absolutely no evidence that we’ve engaged in any criminal activity or that we’ve tried to engage in criminal activity.”
APD officials did not respond to a request for comment.
“They’ve pushed us; they’ve assaulted us for filming them; they’ve used their horses against us and tried to run us into walls; they’ve driven their cars up on us; they illegally detained us and searched us; they get in our face and they yell at us; they threaten to use violent force against us,” Buehler said. “But we didn’t realize until these emails just how deep this intimidation, how deep these efforts were to harm us for trying to hold them accountable.”
Buehler also said the group has additional internal emails which have not been released yet that reveal the APD attempted to take another charge to the District Attorney against him for felony child endangerment over the activities of a teenaged member of PSP.
He said he and other members of PSP were interested in pursuing a joint civil action against the APD over their attempts to frame and arrest them for their First Amendment activities.
This is not the first time a municipal police department has labeled a local cop watching group as an extremist organization.
In 2002, internal files from the Denver Police Department’s (DPD) Intelligence Unit were leaked to the ACLU, revealing the unit had been spying on several activist groups in the city, and keeping extensive records about members of the activist groups. Many of these groups were branded as “criminal extremist” organizations in what later became a full-scale controversy widely known as the Denver police’s “spy files.” Some of the groups falsely branded as “criminal extremist” groups included three police accountability organizations: Denver CopWatch, End the Politics of Cruelty and Justice for Mena.
Again, from October 2003 through the Republican National Convention (RNC) in August 2004, intelligence digests produced by the New York City Police Department (NYPD) on dozens of activist groups, including several police accountability organizations, were made public under a federal court order. TheNYPD labeled participants of the “Operation CopWatch” effort as criminal extremists.
Those who participated in “Operation CopWatch” during the RNC hoped to identify undercover cops who might attempt to provoke violence during demonstrations and document police violence or misconduct against protesters.
Communities Benefiting From Cop Watch Patrols Resist Police Retaliation Against Watchers
In some major urban areas, rates of police harassment of individuals drop considerably after cop watchers take to the streets – and communities band together to defend cop watch patrols that experience police retaliation, say veteran cop watchers.
Veteran police accountability activist José Martín has trained and organized with several organizations that participate in cop watch activities. Martín has been detained and arrested several times while cop watching with organized patrols in New York and Chicago.
His arrests in New York are part of a widely documented problem in the city. In fact, retaliation in New York against cop watchers has been so widespread that the NYPD had to send out an official memo to remind officers that it is perfectly legal for civilians to film cops on duty.
Martín described an experience in Chicago in which he felt police unjustly retaliated against him after a local CopWatch group formed and began regularly patrolling Chicago’s Pilsen neighborhood. After the group became well-known by the Pilsen community, residents gathered around an officer who had detained Martín after a patrol one night in 2009, calling for his release. The officer let him go shortly after.
“When cop watchers are retaliated against, if the community is organized, if there is a strong relationship between cop watch patrols and the community, but most importantly, if the cop watchers are people of the community, that community has the power to push back against retaliation and prevent its escalation,” Martín said. “Retaliation doesn’t work if you stand together.”
Another veteran cop watcher, Jacob Crawford, co-founder of Oakland’s We Copwatch, is helping the community of Ferguson, Missouri, organize cop watch patrols and prepare the community for the potential of police retaliation. His group raised $6,000 to pass out 110 cameras to organizers and residents in Ferguson, and train them to monitor police activity in the aftermath of the upheavals that rocked the city after Wilson killed Brown.
“I do expect retaliation, I do expect that these things won’t be easy, but these folks are in it,” Crawford told Truthout. “This is something that makes more sense to them than not standing up for themselves.”
Ben Rich, the “Father of the Stealth Fighter-Bomber” and former head of Lockheed Skunk Works,had once let out information about Extraterrestrial UFO Visitors Are Real. He states “we’ve” been to the stars” and “have the technology to go to the stars”, however, put in context–as many insiders believe–we’ve been taken to other planets by means of extraterrestrial ships due to radiation belt, so while we have the technology to go, we have to be “taken due to radiation belt and our bodies would not handle it–i.e.–why some have proposed we ride along [?] … are taken [?]
In films that present humans alongside alien counterparts, we inevitably learn more about our own humanity than of the alien creature’s new perceptions. When we visit a new country far from home, we make just as many (if not more) discoveries about ourselves as we do about our host nation – as any traveler can attest, looking at our own culture from a distance allows for a better understanding of both its strengths and frailties, and opens it up to a greater dialogue about the world at large.
In 1977, the Voyager 2 probe was sent into space with a recorded message of peace (in 55 different languages) along with an eclectic collection of music and 116 images of life on this planet. John Carpenter, in his 1984 film Starman, explores what might have happened if an alien ship were to encounter this Earthling greeting. Alongside a sweet romance between the two lead characters, there is the story of how American government officials react to the appearance of the “Starman.” A socially-conscious piece of sci-fi, the naive and otherworldly Starman reveals both the government’s uneasiness with extraterrestrials (despite spending trillions on defense yearly) and the public’s split perspectives concerning the existence of real alien beings.
Many UFOlogical scenarios begin with a cataclysmic encounter that destroys the planet. Aliens are often depicted as a race evolutionarily superior to our own, with apocalyptic powers that can be used to levitate objects, save lives, start cars – different remarkable skills for different alien life forms. For years, comics, books, television shows and films have drawn people to the world of UFOs and extraterrestrial activities. In the 1940s and 50s, freakish events – the end of the Second World War, the unforgettable image of the atom bomb’s mushroom cloud and a pervasive storm of anticommunist sentiment – inspired the creation of a slew of sci-fi masterpieces. The Roswell Crash happened in 1947, only two years after the atomic bomb was dropped on Japanese citizens. These early B-movies put the nation’s fears of invasion and destruction on film. The reality of an alien invasion, after the paranoia and chaos of the era, did not seem so outside the realm of possibility.
The “mysterious” nature of aliens, and their continued unconfirmed legitimacy by the U.S. government only adds to their appeal. While many prominent scientists have attested to the likelihood of their existence, the proof of alien abductions and landings has been largely discredited. Carl Sagan, in one of his last interviews, said that extraterrestrial intelligence is a “wonderful prospect, but requires the most severe and rigorous standards of evidence.”
For most UFO enthusiasts, theories about advanced civilizations on other planets are a matter of sheer speculation, with little consideration for standards of scientific conjecture. That said, it is difficult to consider extraterrestrial life in terms of our own. Different types of thinking are needed to properly consider a race of beings capable of journeying among the stars – we need to be mentally flexible, as these beings are truly alien and, in all likelihood, of an appearance that our eyes will be completely untrained to see.
What reasons could there be to hide evidence of aliens? Since the Roswell, New Mexico incident, many believe that there are sweeping security measures and secrecy in place to keep the subject under wraps. But the public is not convinced. According to two National Geographic polls held in 2012, 36 percent of Americans believe UFO’s exist, and 79 percent believe a government coverup is responsible for withholding detailed alien information.
This past summer, microbiologists in California discovered bacteria that survive, not by eating “food” as we commonly think of it, but by feeding on electricity. NASA has theorized that beings in the “dark energy biosphere”, beneath deep sea beds, consume so little energy that their “means of living could theoretically be used by extraterrestrial life living in other areas of the solar system, or universe.” Both of these findings prove that limiting space exploration to “Earth-like” planets will limit our discovery of other living beings. If we are modeling our assumptions as to what an alien life needs on our own, isn’t that missing the entire point? Who knows what kind of conditions another life form needs to thrive? Astronomers from the government-backed SETI (Search for Extraterrestrial Intelligence) have recently conceded that the chance of discovering life on other planets is inevitable and will likely occur within the next 20 years.
If there are beings capable of harnessing pure energy, they may take the form of these electron-feasting bacteria. Certain species are also capable of producing electrons while metabolizing chemicals, leading scientists to believe that they may be an eventual source of natural energy.
Today, with energy prices skyrocketing, the environment in crisis mode, and no clear solution in sight, it could make sense toinvest in projects towards this end. While we haven’t yet been visited by other forms of life, by harnessing pure energy we may edge closer to a new kind of sustainability. Canadian science fiction writer Karl Schroeder has posited that “any sufficiently advanced technology is indistinguishable from nature” (borrowing from Arthur C. Clarke’s original, “any sufficiently advanced technology is indistinguishable from magic”). Aliens may blend seamlessly into the galaxy, their artificial systems no different from our natural ones. In Carpenter’s film, after finding the welcome messages from Voyager, the Starman heads to Earth – only to discover the hostility of American military men when he is shot down by the U.S. Air Force. But when Starman was released, we were living in a different time. There are hundreds of millions of galaxies in space, and within them millions and millions of stars. If even 1/100 of them contain “life” in any definition, that is still billions of planets with extraterrestrial beings. It’s time we found comfort, rather than fear, in the fact that we are not alone. And even if there aren’t others out there in space, the principle of coexisting peacefully can be applied equally back here on Earth
Published in Australian Biologist 6: 96 – 105, June 1993
Introduction
What might head a list of the defining characteristics of the human species? While our view of ourselves could hardly avoid highlighting our accomplishments in engineering, art, medicine, space travel and the like, in a more dispassionate assessment agriculture would probably displace all other contenders for top billing. Most of the other achievements of humankind have followed from this one. Almost without exception, all people on earth today are sustained by agriculture. With a minute number of exceptions, no other species is a farmer. Essentially all of the arable land in the world is under cultivation. Yet agriculture began just a few thousand years ago, long after the appearance of anatomically modern humans.
Given the rate and the scope of this revolution in human biology, it is quite extraordinary that there is no generally accepted model accounting for the origin of agriculture. Indeed, an increasing array of arguments over recent years has suggested that agriculture, far from being a natural and upward step, in fact led commonly to a lower quality of life. Hunter-gatherers typically do less work for the same amount of food, are healthier, and are less prone to famine than primitive farmers (Lee & DeVore 1968, Cohen 1977, 1989). A biological assessment of what has been called the puzzle of agriculture might phrase it in simple ethological terms: why was this behaviour (agriculture) reinforced (and hence selected for) if it was not offering adaptive rewards surpassing those accruing to hunter-gathering or foraging economies?
This paradox is responsible for a profusion of models of the origin of agriculture. ‘Few topics in prehistory’, noted Hayden (1990) ‘have engendered as much discussion and resulted in so few satisfying answers as the attempt to explain why hunter/gatherers began to cultivate plants and raise animals. Climatic change, population pressure, sedentism, resource concentration from desertification, girls’ hormones, land ownership, geniuses, rituals, scheduling conflicts, random genetic kicks, natural selection, broad spectrum adaptation and multicausal retreats from explanation have all been proffered to explain domestication. All have major flaws … the data do not accord well with any one of these models. ‘
Recent discoveries of potentially psychoactive substances in certain agricultural products – cereals and milk – suggest an additional perspective on the adoption of agriculture and the behavioural changes (‘civilisation’) that followed it. In this paper we review the evidence for the drug-like properties of these foods, and then show how they can help to solve the biological puzzle just described .
The emergence of agriculture and civilisation in the Neolithic
The transition to agriculture
From about 10,000 years ago, groups of people in several areas around the world began to abandon the foraging lifestyle that had been successful, universal and largely unchanged for millennia (Lee & DeVore 1968). They began to gather, then cultivate and settle around, patches of cereal grasses and to domesticate animals for meat, labour, skins and other materials, and milk.
Farming, based predominantly on wheat and barley, first appeared in the Middle East, and spread quickly to western Asia, Egypt and Europe. The earliest civilisations all relied primarily on cereal agriculture. Cultivation of fruit trees began three thousand years later, again in the MiddleEast, and vegetables and other crops followed (Zohari 1986). Cultivation of rice began in Asia about 7000 years ago (Stark 1986).
To this day, for most people, two-thirds of protein and calorie intake is cereal-derived. (In the west, in the twentieth century, cereal consumption has decreased slightly in favour of meat, sugar, fats and so on.) The respective contributions of each cereal to current total world production are: wheat (28 per cent), corn/maize (27 per cent), rice (25 per cent), barley (10 per cent), others (10 per cent) (Pedersen et al. 1989).
The change in the diet due to agriculture
The modern human diet is very different from that of closely related primates and, almost certainly, early hominids (Gordon 1987). Though there is controversy over what humans ate before the development of agriculture, the diet certainly did not include cereals and milk in appreciable quantities. The storage pits and processing tools necessary for significant consumption of cereals did not appear until the Neolithic (Washburn & Lancaster 1968). Dairy products were not available in quantity before the domestication of animals.
The early hominid diet (from about four million years ago), evolving as it did from that of primate ancestors, consisted primarily of fruits, nuts and other vegetable matter, and some meat – items that could be foraged for and eaten with little or no processing. Comparisons of primate and fossil-hominid anatomy, and of the types and distribution of plants eaten raw by modern chimpanzees, baboons and humans (Peters & O’Brien 1981, Kay 1985), as well as microscope analysis of wear patterns on fossil teeth (Walker 1981, Peuch et al.1983) suggest that australopithecines were ‘mainly frugivorous omnivores with a dietary pattern similar to that of modern chimpanzees’ (Susman 1987:171).
The diet of pre-agricultural but anatomically modern humans (from 30,000 years ago) diversified somewhat, but still consisted of meat, fruits, nuts, legumes, edible roots and tubers, with consumption of cereal seeds only increasing towards the end of the Pleistocene (e.g. Constantini 1989 and subsequent chapters in Harris and Hillman 1989).
The rise of civilisation
Within a few thousand years of the adoption of cereal agriculture, the old hunter-gatherer style of social organisation began to decline. Large, hierarchically organised societies appeared, centred around villages and then cities. With the rise of civilisation and the state came socioeconomic classes, job specialisation, governments and armies.
The size of populations living as coordinated units rose dramatically above pre-agricultural norms. While hunter-gatherers lived in egalitarian, autonomous bands of about 20 closely related persons, with at most a tribal level of organisation above that, early agricultural villages had 50 to 200 inhabitants, and early cities 10,000 or more. People ‘had to learn to curb deep-rooted forces which worked for increasing conflict and violence in large groups’ (Pfeiffer 1977:438).
Agriculture and civilisation meant the end of foraging – a subsistence method with shortterm goals and rewards – and the beginning (for most) of regular arduous work, oriented to future payoffs and the demands of superiors. ‘With the coming of large communities, families no longer cultivated the land for themselves and their immediate needs alone, but for strangers and for the future. They worked all day instead of a few hours a day, as hunter-gatherers had done. There were schedules, quotas, overseers, and punishments for slacking off’ (Pfeiffer 1977:21).
Explaining the origins of agriculture and civilisation
The phenomena of human agriculture and civilisation are ethologically interesting, because (1) virtually no other species lives this way, and (2) humans did not live this way until relatively recently. Why was this way of life adopted, and why has it become dominant in the human species?
Problems explaining agriculture
Until recent decades, the transition to farming was seen as an inherently progressive one: people learnt that planting seeds caused crops to grow, and this new improved food source led to larger populations, sedentary farm and town life, more leisure time and so to specialisation, writing, technological advances and civilisation. It is now clear that agriculture was adopted despite certain disadvantages of that lifestyle (e.g. Flannery 1973, Henry 1989). There is a substantial literature (e.g. Reed 1977), not only on how agriculture began, but why. Palaeopathological and comparative studies show that health deteriorated in populations that adopted cereal agriculture, returning to pre-agricultural levels only in modem times. This is in part attributable to the spread of infection in crowded cities, but is largely due to a decline in dietary quality that accompanied intensive cereal farming (Cohen 1989). People in many parts of the world remained hunter-gatherers until quite recently; though they were quite aware of the existence and methods of agriculture, they declined to undertake it (Lee & DeVore 1968, Harris 1977). Cohen (1977:141) summarised the problem by asking: ‘If agriculture provides neither better diet, nor greater dietary reliability, nor greater ease, but conversely appears to provide a poorer diet, less reliably, with greater labor costs, why does anyone become a farmer?’
Many explanations have been offered, usually centred around a particular factor that forced the adoption of agriculture, such as environmental or population pressure (for reviews see Rindos 1984, Pryor 1986, Redding 1988, Blumler & Byrne 1991). Each of these models has been criticised extensively, and there is at this time no generally accepted explanation of the origin of agriculture.
Problems explaining civilisation
A similar problem is posed by the post-agricultural appearance, all over the world, of cities and states, and again there is a large literature devoted to explaining it (e.g. Claessen & Skalnik 1978). The major behavioural changes made in adopting the civilised lifestyle beg explanation. Bledsoe (1987:136) summarised the situation thus:
‘There has never been and there is not now agreement on the nature and significance of the rise of civilisation. The questions posed by the problem are simple, yet fundamental. How did civilisation come about? What animus impelled man to forego the independence, intimacies, and invariability of tribal existence for the much larger and more impersonal political complexity we call the state? What forces fused to initiate the mutation that slowly transformed nomadic societies into populous cities with ethnic mixtures, stratified societies, diversified economies and unique cultural forms? Was the advent of civilisation the inevitable result of social evolution and natural laws of progress or was man the designer of his own destiny? Have technological innovations been the motivating force or was it some intangible factor such as religion or intellectual advancement?’
To a very good approximation, every civilisation that came into being had cereal agriculture as its subsistence base, and wherever cereals were cultivated, civilisation appeared. Some hypotheses have linked the two. For example, Wittfogel’s (1957) ‘hydraulic theory’ postulated that irrigation was needed for agriculture, and the state was in turn needed to organise irrigation. But not all civilisations used irrigation, and other possible factors (e.g. river valley placement, warfare, trade, technology, religion, and ecological and population pressure) have not led to a universally accepted model.
Pharmacological properties of cereals and milk
Recent research into the pharmacology of food presents a new perspective on these problems.
Exorphins: opioid substances in food
Prompted by a possible link between diet and mental illness, several researchers in the late 1970s began investigating the occurrence of drug-like substances in some common foodstuffs.
Dohan (1966, 1984) and Dohan et al. (1973, 1983) found that symptoms of schizophrenia were relieved somewhat when patients were fed a diet free of cereals and milk. He also found that people with coeliac disease – those who are unable to eat wheat gluten because of higher than normal permeability of the gut – were statistically likely to suffer also from schizophrenia. Research in some Pacific communities showed that schizophrenia became prevalent in these populations only after they became ‘partially westernised and consumed wheat, barley beer, and rice’ (Dohan 1984).
Groups led by Zioudrou (1979) and Brantl (1979) found opioid activity in wheat, maize and barley (exorphins), and bovine and human milk (casomorphin), as well as stimulatory activity in these proteins, and in oats, rye and soy. Cereal exorphin is much stronger than bovine casomorphin, which in turn is stronger than human casomorphin. Mycroft et al. (1982, 1987) found an analogue of MIF-1, a naturally occurring dopaminergic peptide, in wheat and milk. It occurs in no other exogenous protein. (In subsequent sections we use the term exorphin to cover exorphins, casomorphin, and the MIF-1 analogue. Though opioid and dopaminergic substances work in different ways, they are both ‘rewarding’, and thus more or less equivalent for our purposes.)
Since then, researchers have measured the potency of exorphins, showing them to be comparable to morphine and enkephalin (Heubner et al. 1984), determined their amino acid sequences (Fukudome &Yoshikawa 1992), and shown that they are absorbed from the intestine (Svedburg et al.1985) and can produce effects such as analgesia and reduction of anxiety which are usually associated with poppy-derived opioids (Greksch et al.1981, Panksepp et al.1984). Mycroft et al. estimated that 150 mg of the MIF-1 analogue could be produced by normal daily intake of cereals and milk, noting that such quantities are orally active, and half this amount ‘has induced mood alterations in clinically depressed subjects’ (Mycroft et al. 1982:895). (For detailed reviews see Gardner 1985 and Paroli 1988.)
Most common drugs of addiction are either opioid (e.g heroin and morphine) or dopaminergic (e.g. cocaine and amphetamine), and work by activating reward centres in the brain. Hence we may ask, do these findings mean that cereals and milk are chemically rewarding? Are humans somehow ‘addicted’ to these foods?
Problems in interpreting these findings
Discussion of the possible behavioural effects of exorphins, in normal dietary amounts, has been cautious. Interpretations of their significance have been of two types:
– where a pathological effect is proposed (usually by cereal researchers, and related to Dohan’s findings, though see also Ramabadran & Bansinath 1988), and
– where a natural function is proposed (by milk researchers, who suggest that casomorphin may help in mother-infant bonding or otherwise regulate infant development).
We believe that there can be no natural function for ingestion of exorphins by adult humans. It may be that a desire to find a natural function has impeded interpretation (as well as causing attention to focus on milk, where a natural function is more plausible) . It is unlikely that humans are adapted to a large intake of cereal exorphin, because the modern dominance of cereals in the diet is simply too new. If exorphin is found in cow’s milk, then it may have a natural function for cows; similarly, exorphins in human milk may have a function for infants. But whether this is so or not, adult humans do not naturally drink milk of any kind, so any natural function could not apply to them.
Our sympathies therefore lie with the pathological interpretation of exorphins, whereby substances found in cereals and milk are seen as modern dietary abnormalities which may cause schizophrenia, coeliac disease or whatever. But these are serious diseases found in a minority. Can exorphins be having an effect on humankind at large?
Other evidence for ‘drug-like’ effects of these foods
Research into food allergy has shown that normal quantities of some foods can have pharmacological, including behavioural, effects. Many people develop intolerances to particular foods. Various foods are implicated, and a variety of symptoms is produced. (The term ‘intolerance’ rather than allergy is often used, as in many cases the immune system may not be involved (Egger 1988:159). Some intolerance symptoms, such as anxiety, depression, epilepsy, hyperactivity, and schizophrenic episodes involve brain function (Egger 1988, Scadding & Brostoff 1988).
Radcliffe (1982, quoted in 1987:808) listed the foods at fault, in descending order of frequency, in a trial involving 50 people: wheat (more than 70 per cent of subjects reacted in some way to it), milk (60 per cent), egg (35 per cent), corn, cheese, potato, coffee, rice, yeast, chocolate, tea, citrus, oats, pork, plaice, cane, and beef (10 per cent). This is virtually a list of foods that have become common in the diet following the adoption of agriculture, in order of prevalence. The symptoms most commonly alleviated by treatment were mood change (>50 per cent) followed by headache, musculoskeletal and respiratory ailments.
One of the most striking phenomena in these studies is that patients often exhibit cravings, addiction and withdrawal symptoms with regard to these foods (Egger 1988:170, citing Randolph 1978; see also Radcliffe 1987:808-10, 814, Kroker 1987:856, 864, Sprague & Milam 1987:949, 953, Wraith 1987:489, 491). Brostoff and Gamlin (1989:103) estimated that 50 per cent of intolerance patients crave the foods that cause them problems, and experience withdrawal symptoms when excluding those foods from their diet. Withdrawal symptoms are similar to those associated with drug addictions (Radcliffe 1987:808). The possibility that exorphins are involved has been noted (Bell 1987:715), and Brostoff and Gamlin conclude (1989:230):
‘… the results so far suggest that they might influence our mood. There is certainly no question of anyone getting ‘high’ on a glass of milk or a slice of bread – the amounts involved are too small for that – but these foods might induce a sense of comfort and wellbeing, as food-intolerant patients often say they do. There are also other hormone-like peptides in partial digests of food, which might have other effects on the body.’
There is no possibility that craving these foods has anything to do with the popular notion of the body telling the brain what it needs for nutritional purposes. These foods were not significant in the human diet before agriculture, and large quantities of them cannot be necessary for nutrition. In fact, the standard way to treat food intolerance is to remove the offending items from the patient’s diet.
A suggested interpretation of exorphin research
But what are the effects of these foods on normal people? Though exorphins cannot have a naturally selected physiological function in humans, this does not mean that they have no effect. Food intolerance research suggests that cereals and milk, in normal dietary quantities, are capable of affecting behaviour in many people. And if severe behavioural effects in schizophrenics and coeliacs can be caused by higher than normal absorption of peptides, then more subtle effects, which may not even be regarded as abnormal, could be produced in people generally.
The evidence presented so far suggests the following interpretation.
The ingestion of cereals and milk, in normal modern dietary amounts by normal humans, activates reward centres in the brain. Foods that were common in the diet before agriculture (fruits and so on) do not have this pharmacological property. The effects of exorphins are qualitatively the same as those produced by other opioid and / or dopaminergic drugs, that is, reward, motivation, reduction of anxiety, a sense of wellbeing, and perhaps even addiction. Though the effects of a typical meal are quantitatively less than those of doses of those drugs, most modern humans experience them several times a day, every day of their adult lives.
Hypothesis: exorphins and the origin of agriculture and civilisation
When this scenario of human dietary practices is viewed in the light of the problem of the origin of agriculture described earlier, it suggests an hypothesis that combines the results of these lines of enquiry.
Exorphin researchers, perhaps lacking a long-term historical perspective, have generally not investigated the possibility that these foods really are drug-like, and have instead searched without success for exorphin’s natural function. The adoption of cereal agriculture and the subsequent rise of civilisation have not been satisfactorily explained, because the behavioural changes underlying them have no obvious adaptive basis.
These unsolved and until-now unrelated problems may in fact solve each other. The answer, we suggest, is this: cereals and dairy foods are not natural human foods, but rather are preferred because they contain exorphins. This chemical reward was the incentive for the adoption of cereal agriculture in the Neolithic. Regular self-administration of these substances facilitated the behavioural changes that led to the subsequent appearance of civilisation.
This is the sequence of events that we envisage.
Climatic change at the end of the last glacial period led to an increase in the size and concentration of patches of wild cereals in certain areas (Wright 1977). The large quantities of cereals newly available provided an incentive to try to make a meal of them. People who succeeded in eating sizeable amounts of cereal seeds discovered the rewarding properties of the exorphins contained in them. Processing methods such as grinding and cooking were developed to make cereals more edible. The more palatable they could be made, the more they were consumed, and the more important the exorphin reward became for more people.
At first, patches of wild cereals were protected and harvested. Later, land was cleared and seeds were planted and tended, to increase quantity and reliability of supply. Exorphins attracted people to settle around cereal patches, abandoning their nomadic lifestyle, and allowed them to display tolerance instead of aggression as population densities rose in these new conditions.
Though it was, we suggest, the presence of exorphins that caused cereals (and not an alternative already prevalent in the diet) to be the major early cultigens, this does not mean that cereals are ‘just drugs’. They have been staples for thousands of years, and clearly have nutritional value. However, treating cereals as ‘just food’ leads to difficulties in explaining why anyone bothered to cultivate them. The fact that overall health declined when they were incorporated into the diet suggests that their rapid, almost total replacement of other foods was due more to chemical reward than to nutritional reasons.
It is noteworthy that the extent to which early groups became civilised correlates with the type of agriculture they practised. That is, major civilisations (in south-west Asia, Europe, India, and east and parts of South-East Asia; central and parts of north and south America; Egypt, Ethiopia and parts of tropical and west Africa) stemmed from groups which practised cereal, particularly wheat, agriculture (Bender 1975:12, Adams 1987:201, Thatcher 1987:212). (The rarer nomadic civilisations were based on dairy farming.)
Groups which practised vegeculture (of fruits, tubers etc.), or no agriculture (in tropical and south Africa, north and central Asia, Australia, New Guinea and the Pacific, and much of north and south America) did not become civilised to the same extent.
Thus major civilisations have in common that their populations were frequent ingesters of exorphins. We propose that large, hierarchical states were a natural consequence among such populations. Civilisation arose because reliable, on-demand availability of dietary opioids to individuals changed their behaviour, reducing aggression, and allowed them to become tolerant of sedentary life in crowded groups, to perform regular work, and to be more easily subjugated by rulers. Two socioeconomic classes emerged where before there had been only one (Johnson & Earle 1987:270), thus establishing a pattern which has been prevalent since that time.
Discussion
The natural diet and genetic change
Some nutritionists deny the notion of a pre-agricultural natural human diet on the basis that humans are omnivorous, or have adapted to agricultural foods (e.g. Garn & Leonard 1989; for the contrary view see for example Eaton & Konner 1985) . An omnivore, however, is simply an animal that eats both meat and plants: it can still be quite specialised in its preferences (chimpanzees are an appropriate example). A degree of omnivory in early humans might have preadapted them to some of the nutrients contained in cereals, but not to exorphins, which are unique to cereals.
The differential rates of lactase deficiency, coeliac disease and favism (the inability to metabolise fava beans) among modern racial groups are usually explained as the result of varying genetic adaptation to post-agricultural diets (Simopoulos 1990:27-9), and this could be thought of as implying some adaptation to exorphins as well. We argue that little or no such adaptation has occurred, for two reasons: first, allergy research indicates that these foods still cause abnormal reactions in many people, and that susceptibility is variable within as well as between populations, indicating that differential adaptation is not the only factor involved. Second, the function of the adaptations mentioned is to enable humans to digest those foods, and if they are adaptations, they arose because they conferred a survival advantage. But would susceptibility to the rewarding effects of exorphins lead to lower, or higher, reproductive success? One would expect in general that an animal with a supply of drugs would behave less adaptively and so lower its chances of survival. But our model shows how the widespread exorphin ingestion in humans has led to increased population. And once civilisation was the norm, non-susceptibility to exorphins would have meant not fitting in with society. Thus, though there may be adaptation to the nutritional content of cereals, there will be little or none to exorphins. In any case, while contemporary humans may enjoy the benefits of some adaptation to agricultural diets, those who actually made the change ten thousand years ago did not.
Other ‘non-nutritional’ origins of agriculture models
We are not the first to suggest a non-nutritional motive for early agriculture. Hayden (1990) argued that early cultigens and trade items had more prestige value than utility, and suggested that agriculture began because the powerful used its products for competitive feasting and accrual of wealth. Braidwood et al. (1953) and later Katz and Voigt (1986) suggested that the incentive for cereal cultivation was the production of alcoholic beer:
‘Under what conditions would the consumption of a wild plant resource be sufficiently important to lead to a change in behaviour (experiments with cultivation) in order to ensure an adequate supply of this resource? If wild cereals were in fact a minor part of the diet, any argument based on caloric need is weakened. It is our contention that the desire for alcohol would constitute a perceived psychological and social need that might easily prompt changes in subsistence behaviour’ (Katz & Voigt 1986:33).
This view is clearly compatible with ours. However there may be problems with an alcohol hypothesis: beer may have appeared after bread and other cereal products, and been consumed less widely or less frequently (Braidwood et al. 1953). Unlike alcohol, exorphins are present in all these products. This makes the case for chemical reward as the motive for agriculture much stronger. Opium poppies, too, were an early cultigen (Zohari 1986). Exorphin, alcohol, and opium are primarily rewarding (as opposed to the typically hallucinogenic drugs used by some hunter-gatherers) and it is the artificial reward which is necessary, we claim, for civilisation. Perhaps all three were instrumental in causing civilised behaviour to emerge.
Cereals have important qualities that differentiate them from most other drugs. They are a food source as well as a drug, and can be stored and transported easily. They are ingested in frequent small doses (not occasional large ones), and do not impede work performance in most people. A desire for the drug, even cravings or withdrawal, can be confused with hunger. These features make cereals the ideal facilitator of civilisation (and may also have contributed to the long delay in recognising their pharmacological properties).
Compatibility, limitations, more data needed
Our hypothesis is not a refutation of existing accounts of the origins of agriculture, but rather fits alongside them, explaining why cereal agriculture was adopted despite its apparent disadvantages and how it led to civilisation.
Gaps in our knowledge of exorphins limit the generality and strength of our claims. We do not know whether rice, millet and sorghum, nor grass species which were harvested by African and Australian hunter-gatherers, contain exorphins. We need to be sure that preagricultural staples do not contain exorphins in amounts similar to those in cereals. We do not know whether domestication has affected exorphin content or-potency. A test of our hypothesis by correlation of diet and degree of civilisation in different populations will require quantitative knowledge of the behavioural effects of all these foods.
We do not comment on the origin of noncereal agriculture, nor why some groups used a combination of foraging and farming, reverted from farming to foraging, or did not farm at all. Cereal agriculture and civilisation have, during the past ten thousand years, become virtually universal. The question, then, is not why they happened here and not there, but why they took longer to become established in some places than in others. At all times and places, chemical reward and the influence of civilisations already using cereals weighed in favour of adopting this lifestyle, the disadvantages of agriculture weighed against it, and factors such as climate, geography, soil quality, and availability of cultigens influenced the outcome. There is a recent trend to multi-causal models of the origins of agriculture (e.g. Redding 1988, Henry 1989), and exorphins can be thought of as simply another factor in the list. Analysis of the relative importance of all the factors involved, at all times and places, is beyond the scope of this paper.
Conclusion
‘An animal is a survival machine for the genes that built it. We too are animals, and we too are survival machines for our genes. That is the theory. In practice it makes a lot of sense when we look at wild animals…. It is very different when we look at ourselves. We appear to be a serious exception to the Darwinian law…. It obviously just isn’t true that most of us spend our time working energetically for the preservation of our genes’ (Dawkins 1989:138).
Many ethologists have acknowledged difficulties in explaining civilised human behaviour on evolutionary grounds, in some cases suggesting that modern humans do not always behave adaptively . Yet since agriculture began, the human population has risen by a factor of 1000: Irons (1990) notes that ‘population growth is not the expected effect of maladaptive behaviour’.
We have reviewed evidence from several areas of research which shows that cereals and dairy foods have drug-like properties, and shown how these properties may have been the incentive for the initial adoption of agriculture. We suggested further that constant exorphin intake facilitated the behavioural changes and subsequent population growth of civilisation, by increasing people’s tolerance of (a) living in crowded sedentary conditions, (b) devoting effort to the benefit of non-kin, and (c) playing a subservient role in a vast hierarchical social structure.
Cereals are still staples, and methods of artificial reward have diversified since that time, including today a wide range of pharmacological and non-pharmacological cultural artifacts whose function, ethologically speaking, is to provide reward without adaptive benefit. It seems reasonable then to suggest that civilisation not only arose out of self-administration of artificial reward, but is maintained in this way among contemporary humans. Hence a step towards resolution of the problem of explaining civilised human behaviour may be to incorporate into ethological models this widespread distortion of behaviour by artificial reward.
References
Adams, W .M., 1987, Cereals before cities except after Jacobs, in M. Melko & L.R. Scott eds, The boundaries of civilizations in space and time, University Press of America, Lanham.
Bell, I. R., 1987, Effects of food allergy on the central nervous system, in J. Brostoff and S. J. Challacombe, eds, Food allergy and intolerance, Bailliere Tindall, London.
Bender, B., 1975, Farming in prehistory: from hunter-gatherer to food producer, John Baker, London.
Bledsoe, W., 1987, Theories of the origins of civilization, in M. Melko and L. R. Scott, eds, The boundaries of civilizations in space and time, University Press of America, Lanham.
Blumler, M., & Byrne, R., 1991, The ecological genetics of domestication and the origins of agriculture, Current Anthropology 32: 2-35.
Braidwood, R. J., Sauer, J.D., Helbaek, H., Mangelsdorf, P.C., Cutler, H.C., Coon, C.S., Linton, R., Steward J. & Oppenheim, A.L., 1953, Symposium: did man once live by beer alone? American Anthropologist 55: 515-26.
Brostoff, J., & Gamlin, L., 1989, The complete guide to food allergy and intolerance, Bloomsbury, London.
Chang, T. T., 1989, Domestication and the spread of the cultivated rices, in D.R. Harris and G.C. Hillman, eds, Foraging and farming: the evolution of plant exploitation, Unwin Hyman, London.
Claessen, H. J. M. & Skalnik P., eds, 1978, The early state, Mouton, The Hague.
Cohen, M. N., 1977, Population pressure and the origins of agriculture: an archaeological example from the coast of Peru, in Reed, C.A., ed., The origins of agriculture, Mouton, The Hague.
Cohen, M. N., 1989, Health and the rise of civilization, Yale University Press, New Haven.
Constantini, L., 1989, Plant exploitation at Grotta dell’Uzzo, Sicily: new evidence for the transition from Mesolithic to Neolithic subsistence in southern Europe, in Harris, D. R. & Hillman, G. C., eds, Foraging and farming: the evolution of plant exploitation, Unwin Hyman, London.
Dawkins, R., 1989, Darwinism and human purpose, in Durant, J. R., ed., Human origins, Clarendon Press, Oxford.
Dohan, F., 1966, Cereals and schizophrenia: data and hypothesis, Acta Psychiatrica Scandinavica 42:125-52.
Dohan, F., 1983, More on coeliac disease as a model of schizophrenia, Biological Psychiatry 18:561-4.
Dohan, F. & Grasberger, J., 1973, Relapsed schizophrenics: earlier discharge from the hospital after cereal-free, milk-free diet, American Journal of Psychiatry 130:685-8.
Dohan, F., Harper, E., Clark, M., Ratigue, R., & Zigos, V., 1984, Is schizophrenia rare if grain is rare? Biological Psychiatry 19: 385-99.
Eaton, S. B. & Konner, M., 1985, Paleolithic nutrition – a consideration of its nature and current implications, New England Journal of Medicine 312: 283-90.
Egger, J., 1988, Food allergy and the central nervous system, in Reinhardt, D. & Schmidt E., eds, Food allergy, Raven, New York.
Flannery, K. V., 1973, The origins of agriculture, Annual Review of Anthropology 2:271-310.
Fukudome, S., & Yoshikawa, M., 1992, Opioid peptides derived from wheat gluten: their isolation and characterization, FEBS Letters 296:107-11.
Gardner, M. L. G., 1985, Production of pharmacologically active peptides from foods in the gut. in Hunter, J. & Alun-Jones, V., eds, Food and the gut,Bailliere Tindall, London.
Gam, S. M. & Leonard, W. R., 1989, What did our ancestors eat? Nutritional Reviews 47:337 45.
Gordon, K. D., 1987, Evolutionary perspectives on human diet, in Johnston, F., ed, Nutritional Anthropology, Alan R. Liss, New York.
Greksch, G., Schweiger C., Matthies, H., 1981, Evidence for analgesic activity of beta-casomorphin in rats, Neuroscience Letters 27:325~8.
Harlan, J. R., 1986, Plant domestication: diffuse origins and diffusion, in Barigozzi, G., ed., The origin and domestication of cultivated plants, Elsevier, Amsterdam.
Harris, D. R., 1977, Alternative pathways towards agriculture, in Reed, C. A., ed., The origins of agriculture, Mouton, The Hague.
Harris, D. R. & Hillman, G. C., eds, 1989, Foraging and farming: the evolution of plant exploitation, Unwin Hyman, London.
Hayden, B., 1990, Nimrods, piscators, pluckers, and planters: the emergence of food production, Journal of Anthropological Archaeology 9:31-69.
Henry, D. O., 1989, From foraging to agriculture: the Levant at the end of the ice age, University of Pennsylvania Press, Philadelphia.
Heubner, F., Liebeman, K., Rubino, R. & Wall, J., 1984, Demonstration of high opioid-like activity in isolated peptides from wheat gluten hydrolysates, Peptides 5:1139-47.
Irons, W., 1990, Let’s make our perspective broader rather than narrower, Ethology and Sociobiology 11: 361-74
Johnson, A. W. & Earle, T., 1987, The evolution of human societies: from foraging group to agrarian state, Stanford University Press, Stanford.
Katz, S. H. & Voigt, M. M., 1986, Bread and beer: the early use of cereals in the human diet, Expedition 28:23-34.
Kay, R. F., 1985, Dental evidence for the diet of Australopithecus, Annual Review of Anthropology 14:315 41.
Kroker, G. F., 1987, Chronic candiosis and allergy, in Brostoff, J. & Challacombe, S.J., eds, Food allergy and intolerance, Bailliere Tindall, London.
Lee, R. B. & DeVore, I., 1968, Problems in the study of hunters and gatherers, in Lee, R.B. & DeVore, I., eds, Man the hunter, Aldine, Chicago.
Mycroft, F. J., Wei, E. T., Bernardin, J. E. & Kasarda, D. D., 1982, MlF-like sequences in milk and wheat proteins, New England Journal of Medicine301:895.
Mycroft, F. J., Bhargava, H. N. & Wei, E. T., 1987, Pharmacalogical activities of the MIF-1 analogues Pro-Leu-Gly, Tyr-Pro-Leu-Gly and pareptide,Peptides 8:1051-5.
Panksepp, J., Normansell, L., Siviy, S., Rossi, J. & Zolovick, A., 1984, Casomorphins reduce separation distress in chicks, Peptides 5:829-83.
Paroli, E., 1988, Opioid peptides from food (the exorphins), World review of nutrition and dietetics 55:58-97.
Pedersen, B., Knudsen, K. E. B. & Eggum, B. 0., 1989, Nutritive value of cereal products with emphasis on the effect of milling, World review of nutrition and dietetics 60:1-91.
Peters, C. R. & O’Brien, E. M., 1981, The early hominid plant-food niche: insights from an analysis of plant exploitation by Homo, Pan, and Papio in eastern and southern Africa, Current Anthropology 22:127-40.
Peuch, P., Albertini, H. & Serratrice, C., 1983, Tooth microwear and dietary patterns in early hominids from Laetoli, Hadar, and Olduvai, Journal ofHuman Evolution 12:721-9.
Pfeiffer, J. E., 1977, The emergence of society: a prehistory of the establishment, McGraw Hill, New York.
Pryor, F. L., 1986, The adoption of agriculture: some theoretical and empirical evidence, American Anthropologist 88:879-97.
Radcliffe, M. J., 1987, Diagnostic use of dietary regimes, in Brostoff, J. & Challacombe, S. J., eds, Food allergy and intolerance, Bailliere Tindall, London.
Ramabadran, K. & Bansinath, M., 1988, Opioid peptides from milk as a possible cause of Sudden Infant Death Syndrome, Medical Hypotheses 27:181-7.
Randolph, T. G., 1978, Specific adaptation, in Annals of Allergy 40:333-45
Redding, R., 1988, A general explanation of subsistence change from hunting and gathering to food production, Journal of Anthropological Archaeology7:56-97.
Reed, C. A., ed., 1977, The origins of agriculture, Mouton, The Hague.
Rindos, D., 1984, The origins of agriculture: an evolutionary perspective, Academic Press, Orlando.
Scadding, G. K. & Brostoff, J., 1988, The dietic treatment of food allergy, in Reinhardt, D. & Schmidt, E., eds, Food allergy, Raven, New York.
Simopoulos, A. P., 1990, Genetics and nutrition: or what your genes can tell you about nutrition, World review of nutrition and dietetics 63:25-34.
Sprague, D. E. & Milam, M. J., 1987, Concept of an environmental unit, in Brostoff, J. & .Challacombe, S. J., eds, Food allergy and intolerance, Bailliere Tindall, London.
Stark, B. L., 1986, Origins of food production in the New World, in Meltzer, D. J., Fowler, D. D. & Sabloff, J. A., eds, American archaeology past and future, Smithsonian Institute Press, Washington.
Susman, R. L., 1987, Pygmy chimpanzees and common chimpanzees: models for the behavioural ecology of the earliest hominids, in Kinzey, W. G., ed., The evolution of human behaviour: primate models, State University of New York Press, Albany.
Svedburg, J., De Haas, J., Leimenstoll, G., Paul, F. & Teschemacher, H., 1985, Demonstration of betacasomorphin immunoreactive materials in in-vitro digests of bovine milk and in small intestine contents after bovine milk ingestion in adult humans, Peptides 6:825-30.
Thatcher, J. P., 1987, The economic base for civilization in the New World, in Melko, M. & Scott, L. R., eds, The boundaries of civilizations in space andtime, University Press of America, Lanham.
Walker, A., 1981, Dietary hypotheses and human evolution, Philosophical Transactions of the Royal Society of London B292:57-64.
Washburn, L. & Lancaster, C. S., 1968, The evolution of hunting, in Lee, R. B. & DeVore, I., eds, Man the hunter, Aldine, Chicago.
Wittfogel, K., 1957, Oriental Despotism, Yale University Press, New Haven.
Wraith, D. G., 1987, Asthma, in Brostoff, J. & Challacombe, S. J., eds, Food allergy and intolerance, Bailliere Tindall, London.
Wright, H. E., 1977, Environmental changes and the origin of agriculture in the Near East, in Reed, C. A., ed, The origins of agriculture, Mouton, The Hague.
Zioudrou, C., Streaty, R. & Klee, W., 1979, Opioid peptides derived from food proteins: the exorphins Journal of Biological Chemistry 254:244S9.
Zohari, D., 1986, The origin and early spread of agriculture in the Old World, in Barigozzi, G., ed., The origin and domestication of cultivated plants,Elsevier, Amsterdam
“What we committed in the Indies stands out among the most unpardonable offenses ever committed against God and mankind, and this trade [in Indian slaves] as one of the most unjust, evil, and cruel among them.” – Bartolomé de las Casas
Christopher Columbus
Age Of Exploration
Christopher Columbus was not the first to discover the Americas, nor was he the first to realize that the earth is round. He was the first, however, in other exploits, namely genocide and the transatlantic slave trade. Doesn’t sound familiar? Read on.
The Afro-Phoenicians are described as having sailed from Egypt to the coast of Mexico as early as 750 B.C. Though Columbus may not have been the first to discover the Americas, his exploits there marked a turning-point in European thought and conquest. Five factors made this new “Age of Exploration” possible:
Advances in military technology. Around 1400, due to ongoing wars, European rulers began to improve their guns and refine their warfare strategies, prompting a European arms race. Nations with less military ability would now easily succumb to the European nations who chose to conquer them.
The printing press. Increased information now allowed rulers to govern distant lands more easily. News of Columbus’ findings traveled quickly back to the King and Queen of Spain.
Winning esteem through wealth. The amassing of great wealth was now seen not just as something positive, but also as a way in which to dominate others and allow for their “salvation.”
Proselytizing religion. European Christianity believed that religion legitimatized conquest. They would land and say a few words (in an unfamiliar language) to get the inhabitants to convert to Christianity. If they were not instantly converted, the Europeans felt relieved of their religious duties, and free to do whatever they wanted with them.
Disease. European strains of smallpox and the plague were transmitted to those they met in their travels, allowing for easier and faster domination of them.
“Tomorrow morning before we depart, I intend to land and see what can be found in the neighborhood.” – Christopher Columbus
In 1492, Columbus “discovered” the Americas when he landed in Haiti and several islands in the Caribbean. The Arawak Indians inhabited these islands, and at first Columbus described them as “very handsome,” and went into great detail about their formidable wooden boats that could hold 40-45 men. In little time, though, and after noticing their gold nose rings, he got to the point: “I was very attentive to them, and strove to learn if they had any gold.” In search of this gold, he sailed the next day around the island, ending with the ominous statement: “I could conquer the whole of them with fifty men and govern them as I pleased.” On this first voyage, Columbus captured 20-25 Arawak slaves, who he then transported back to Spain.
For the second voyage to Haiti the following year (1493), Ferdinand and Isabella gave him the resources needed to subdue the population. When he returned to Haiti, Columbus demanded food, gold, and cotton thread, and was increasingly met with resistance. This resistance gave him the opportunity he needed to declare war on the Arawaks. According to Bartolomé de Las Casas, who was there with the Spanish, Columbus chose “200 foot soldiers and 20 cavalry, with many crossbows and small cannon, lances, and swords, and a still more terrible weapon against the Indians, in addition to the horses: this was 20 hunting dogs, who were turned loose and immediately tore the Indians apart.”
The Spanish won the war, of course, for the Arawaks had only rudimentary weapons. As Columbus still could not find the gold he sought, and having to bring something back to Spain, he rounded up 1,000 Arawaks to be used as slaves. Five hundred of these he brought back to Spain, and the remaining 500 he gave to the Spanish then “governing” the island.
“These people are very unskilled in arms; with 50 men they could all be subjected and made to do all that one wished.” – Christopher Columbus
Though now in control of the Arawak Indians and their island Haiti, Christopher Columbus still could not find the gold that he was sure was somewhere on the island. The Arawaks, I’m sure, were not very willing to tell him where it was. Therefore, he set up a “tribute system” which worked thus:
Every three months, each Haitian over 14 years of age would be required to pay Columbus with either 25 pounds in cotton or a large “hawk’s bell” of gold dust (a lot of gold dust.)
Once the slaves paid this, they would receive a metal token. This token was worn around their necks as a signal that they were home-free for another 3 months (during which time they saved up for their next token, of course.)
Those who did not pay had both of their hands chopped off.
“Gold is a treasure, and he who possesses it does all he wishes to in this world, and succeeds in helping souls into paradise.” – Christopher Columbus
Hispaniola – [get directions]is a major island in the Caribbean, [now] containing the two sovereign states of the Dominican Republic and Haiti
Genocide
Due to the tribute system, the Arawaks were forced to work in the mines instead of growing food in their fields, which led to generalized malnutrition. According to a letter written by Pedro de Cordoba to King Ferdinand, “As a result of the sufferings and hard labor they endured, the Indians choose and have chosen suicide. The women, exhausted by labor, have shunned conception and childbirth…Many, when pregnant, have taken something to abort and have aborted. Others after delivery have killed their children with their own hands, so as not to leave them in such oppressive slavery.”
The initial Arawak population was estimated at 8,000,000. By 1516 only around 12,000 were still alive. By 1542, less than 200 remained. By 1555, the Arawaks were all gone.
Thus, the crime of genocide began with our very own Christopher Columbus. He completely exterminated an entire race of 8,000,000 people –and that’s only counting one of the cultures he decimated. “Haiti under the Spanish is one of the primary instances of genocide in all human history.” – Dr. James W. Loewen
“After having dispatched a meal, I went ashore, and found no habitation save a single house, and that without an occupant; we had no doubt that the people had fled in terror at our approach, as the house was completely furnished.” – Christopher Columbus
Columbus wasn’t just into subjugating and decimating; he was also interested in the sexual aspect of slavery. According to a letter written by Michele de Cuneo, before his first voyage had even reached Haiti in 1492, “Columbus was rewarding his lieutenants with native women to rape.” Columbus wrote in 1500: “A hundred castellanoes are as easily obtained for a woman as for a farm, and it is very general and there are plenty of dealers who go about looking for girls; those from nine to ten are now in demand.” This is not exactly the character of Christopher Columbus that was portrayed in public school.
Aside from sexual slavery, there existed, of course, the aspect of using slavery for profit. When there were no more Arawaks to mine his gold for him–for they no longer existed–Columbus systematically depleted the Bahamas of their peoples for this task. Tens of thousands of slaves from the Bahamas were transported to Haiti, leaving the islands behind deserted. Peter Martyr reported in 1516: “Packed in below deck, with hatchways closed to prevent their escape, so many slaves died on the trip that a ship without a compass, chart, or guide, but only following the trail of dead Indians who had been thrown from the ships could find its way from the Bahamas to Hispaniola.”
After the new batch of slaves died, Columbus depleted Puerto Rico, and then Cuba. When they had all succumbed, he turned his eyes to Africa, thus establishing the transatlantic slave trade and the concept of “race.” Through his exploits in Haiti, Columbus lead the way for other European nations to begin seeking wealth through domination, conquest, and slavery. In essence, Columbus changed the world, and we recognize this in one way or another by delineating history as being either pre- or post-Columbian.
“Columbus’ government was characterized by a form of tyranny. Even those who loved him had to admit the atrocities that had taken place. Now one can understand why he was sacked and we can see that there were good reasons for doing so. The monarchs wanted someone who did not give them problems. Columbus did not solve problems, he created them.” – Francisco de Bobadilla
The second Monday of each October, The United States of America celebrates “Columbus Day” with a public holiday and parades. Grade school kids write about how wonderful he was, and high school students write reports proclaiming his brilliance and enduring courage. He is virtually made into a sort of God, carefully placed upon a pedestal of complete ignorance.
Many college students who take history classes, and many indigenous peoples, in contrast, opt to protest the holiday in respect for the countless nations decimated by Columbus. As George P. Horse Capture writes, “No sensible Indian person can celebrate the arrival of Columbus.” Nor, I should add, can any sensible person who knows anything of his history.
“The worshipful biographical vignettes of Columbus in our textbooks serve to indoctrinate students into a mindless endorsement of colonialism that is strikingly inappropriate in today’s post-colonial era.” – Dr. James W. Loewen
“Here was a man lived long ago,
Who dreamed a special dream –
Christopher Columbus,
Christopher Columbus,
Christopher Columbus,
Dreamed a special dream.”
What is impressive about Woody Harrelson is his obvious compassion. For the animals, for the planet and now – for the trees.
It is evident in most everything he does, on and away from the silver screen that he is passionate. Harrelson is a vegan and long time vegetarian, stating, “When I was 23, 24, I used to have a really bad runny nose, mucus, tons of acne, reddishness all over. A woman on a bus I took looked at me and said I was lactose intolerant. (She said), ‘Stop dairy for three days, and all this is going to go away.’ I stopped dairy, and sure enough it was gone three days later, never to return except when I get dairy accidentally.”
“I used to eat burgers and steak, and I would just be knocked out afterward; I had to give it up.”
Harrelson is a raw vegan, he doesn’t eat sugar, flour, dairy or meat. He lives with his family on a working organic farm on Maui — runs a biodiesel tractor, grows five different kinds of avocado trees, and tons of coconuts.
He is definitely an environmentalist – his company, Prairie Paper Ventures makes paper from crop waste instead of trees. Their website chants “Give Wheat a Chance.”
It took awhile to figure out how to turn leftover wheat and straw into paper, but he and his partners Jeff Golfman and Clayton Manness, figured it out and now there are 2 mills running in India – under the line “Step Forward“.
“Just know that two boxes of this paper saves one tree, so you can make a very real difference,” Harrelson says in a video on the company’s site promoting its “new paper paradigm.”
Staples has jumped on the bandwagon – they’re selling Prairie Paper in their stores in Canada and online. A ream, made of 80 percent wheat straw waste fiber and 20 percent wood fiber, sells for about $8.50.
What Harrelson will do next nobody knows, but for certain – it will be for the good of the planet.
We’re undergoing an amazing transformation. Absolutely diametrically opposed to the constant, gradual attempt by elitists to shut down humanity via eons of engineered subjugation, we’re being consciously and vibrationally liberated by the very nature of the Universe in spite of all their efforts.
It’s not readily apparent to most, but it’s very clearly there. It’s subtle and yet obvious at the same time.
Knowledge of this change or shift in consciousness is experiential. It appears in the form of social trends and changes, but once someone crosses that threshold of awakening they’re already living in that new reality. To what degree it affects their lifestyle will of course vary from person to person, but change they will. As will the lives they in turn affect.
And so it unfolds.
It’s Beyond Explanation
First of all, the natural mind, earthbound logic and reasoning, will not explain the important things in life. Explain love for example. Thankfully it’s wonderfully beyond words, as is all the important stuff. Really, words hardly suffice for real communication but are rather a limited means of information transfer. It’s only in our lower level density words take on such importance. And it’s there that they’re more a limiting and confining aspect of the matrix than a help. They certainly never quite cut the mustard when it comes to conveying Truth or true conscious awareness.
In the words of Lao Tzu:
Existence is beyond the power of words to define
Terms may be used
But are none of them absolute.
In the beginning of heaven and earth there were no words,
Words came out of the womb of matter;
And whether a man dispassionately sees to the core of life
Or passionately sees the surface,
The core and the surface are essentially the same,
Words making them seem different
Only to express appearance.
If name be needed, wonder names them both:
From wonder into wonder
Existence opens.
– Lao Tzu
Symptoms of the Shift
The point above – we’ll be witnessing physical changes as this shift takes place, but the true esoteric nature of the important inner change in humanity is hard to quantify. However, it’s not impossible amongst those who are experiencing this changeover. There’s a lot of chatter about this as some say we’re moving into a new dimension and others think it’s a move to another timeline.
I don’t know what it is. But I’m experiencing this vibrational change as well, most profoundly in an intuitive sense. I just know it because it’s happening to me, and then I read about and see it in others, as is the case of so many in the awakened community. While this is by no means complete, here are a few symptoms various people are experiencing to varying degrees, myself included.
– A different sense of time.
In most cases people are noticing time seems to be compressing, with the feeling that it’s moving quicker and quicker. There seems to be less time in a day, a week, a month and before you know it another year just flew by. This has been proven to be true in a physical sense, but not nearly as profound as this fleeting experience so many are experiencing.
– Sensory changes.
Some are experiencing heightened senses of smell and hearing, or fleeting shifts in what they’re looking at.
– Paranormal experiences.
Many are seeing shadow figures or fleeting ephemeral movements, often out of the corner of the eye. Some are seeing morphing entities they’ve never seen before, and several have reported having a sense of transparency come over them personally.
– Strange sleep cycles and increased dream activity.
This has been huge for me and I know many others. Every night there’s a new “movie” playing or several short ones. Some of the dreams don’t even feel like dreams, but just stepping into a another parallel world.
– Relationship changes.
Many things that have been suppressed seem to be coming to the surface for many. This is a good thing, although it can be disruptive while the information gets processed and reconciliation is reached.
– A sense of letting go.
The past and previous attachments seem to be falling away. And oh so naturally. It’s like letting go of a robe you were wearing and just leaving it behind as you walk towards to this gorgeous landscape, much like the picture at the top of moving into a wonderful, natural world.
– Increased openness to change and new truths.
While this is a fundamental element to waking up, this aspect I find is stepping up big time. There’s a wonderful bleed-over effect as I see it, where various information fields are merging. Maybe it’s just increased tolerance of differing takes from lightworkers to social activists, but the meld is on and it’s a beautiful thing.
– Moving away from dwelling on the dark side.
While it’s important to expose the tricks and lies of these feudal would-be overlords, the trend is moving towards emphasizing encouragement and positive solutions. Nothing wrong with a good rant at the right time or particularly perceptive exposes and take downs, but it’s becoming increasingly important to dwell on the bright side and work to strengthen this new awareness with positive, affirming words and actions. And it’s happening naturally, which to me is again this vibrational change we’re all experiencing working through each of us to manifest this evolving change in humanity.
Anyway, those are just a few aspects, and if you’d like to add your experiences and observations below it would be fun to chat about.
But it’s real. And fantastic!
Don’t Be Too Surprised…
… when strange things happen to you. They will. Learn to roll with it. Personally, I think the power of expectancy is huge. It has pulling power. When you’re aware of and even look around for these manifestations, whether a kind of voice in your mind’s ear, a strong intuitive pull, a fleeting glimpse of something, or another amazing synchronicity, it’s a blast! For some it goes way past that. But we all have that potential.
I guarantee you won’t be disappointed. And it’s way more than just the power of intention, which is cool enough in itself. Universe is just waiting to be manifest through each of us more and more, and continually. No angst there, just amazing potential waiting to be discovered by anyone and everyone.
And don’t be surprised if your life gets “disrupted”. This isn’t all puppies and flowers. This changeover comes with some expense.
Some are getting hit with health challenges they’ve never had, or work or money issues, or as I mentioned about relationship issues. Some are very anxious and nervous suddenly and need to learn to get a sounder grip on their spirituality. That, or detach from crap in their lives that Universe is trying shake them free of. There are lots of things going on.
The Matrix is Crumbling
This ugly matrix that we’ve been shoe-horned into is a very complex, controlling nasty thing. And it can’t hold up, just by the manufactured nature of it. It’s not real, it’s created, by ugly forces to harness and abuse others for its own satisfaction. No way it can last in the face of an inherently loving and natural creative Universe.
Much like earth. As hard as they try to control it for their own devices, Gaia will win out in the long run.
This is the reason they’re working feverishly to clamp down on humanity. And it always backfires. Little do they know they’re accelerating their own downfall and humanity’s awakening. The more freedoms they take away, the more people wake up to what they had – and want back. More than that, the more people step back and ask how things got this way, and how far back does this go.
That, my friends, is the recipe for awakening. You got questions? Universe has answers!
Yugas, Yogis and Cycles of Awakening
Did you know Buddha, Lao Tzu, Mahavira, Zoroaster and Heracletus were all contemporaries? That was the wake up of their day! Between 500 and 600 BC their awakening hit, and like the 100th monkey it was spontaneous in different parts of the world!
Siddhartha Gautama who become the Buddha was teaching in India at the same time Mahavira was expounding Jainism – both radical departures from the spiritual teachings of their day, both teaching about transcendence to an all-connected oneness, with Jainism emphasizing non-violence and respect for all living things. Around the same time, the teachings of Lao Tzu as summsarized in the amazing Tao Te Ching, were changing the direction and consciousness of China and eventually the entire world.
Meanwhile over in Persia there was Zoroaster teaching a new spirituality, while in Greece the pre-Socratic philosophers Heraclitus and Parmenodes and others were having an awakening of their own, espousing very esoteric teachings on the timeless and constantly changing nature of the Universe. These later morphed into the more heady Socratic discourses and philosophies, pulling further and further away from the transcendental dimension and inter-connectivity and oneness of the Universe espoused by the pre-Socratic teachers.
Pythagoras also lived in this time, believed to have had many mystical and alchemical insights and teachings that have been passed down through the mystery schools.
These were all within 100 years of each other, overlapping lifetimes, several apparently teaching simultaneously. Again, these “coincidental” awakenings prove the wave idea, where waves of vibrational change are somehow amplified by both Universe and the receptivity of those who awaken.
Clearly the momentous galactic alignment and shift out of the Piscean age we’re experiencing is both symbolic and largely causal of our awakening and changeover into a new, golden era – the one foretold by many a seer. After all, it’s a cycle.
Or should I say a spiral? Hmm.
Perfectly Put
I’ll end this with some quintessential David Icke, where he speaks about this wonderful shift we’re undergoing.
This awakening is for everyone! So pass it on!
Thank you, David. Your years of loving work have helped change the world.
A man with Ebola in Dallas was initially sent home from the hospital with antibiotics after seeking treatment for an unknown illness, officials said.
The man, whose name wasn’t released, is the first case of the deadly viral infection to be diagnosed outside of Africa. He traveled from Liberia and arrived in the U.S. on Sept. 20, the Centers for Disease Control and Prevention said yesterday.
The man is being kept in isolation in an intensive care unit. He had no symptoms when he left Liberia and began to show signs of the disease on Sept. 24, the CDC said. He sought care on Sept. 26, was hospitalized two days later at Texas Health Presbyterian Hospital and is critically ill, said CDC Director Thomas Frieden. The agency is working to identify anybody who had contact with the man and track them down, he said.
Medical officials in the United States announced on Tuesday the first case of Ebola to be diagnosed outside Africa during the latest outbreak, which has killed more than 3,000 people this year.
The patient, who has not yet been identified, is being treated in Dallas, Texas.
The Centers for Disease Control (CDC) said the patient left Liberia in west Africa on 19 September, but did not develop symptoms until a few days after arriving in the US. He was admitted to the Texas Health Presbyterian hospital in Dallas on Sunday.
Thomas Frieden, the director of the CDC, said the patient was being treated in strict isolation, and that all measures would be taken to ensure that the disease would not spread in the US
The telling sentence in NPR’s report that US attorney general Eric Holder plans to step down once a successor is confirmed came near the end of the story.
“Friends and former colleagues say Holder has made no decisions about his next professional perch,” NPR writes, “but they say it would be no surprise if he returned to the law firm Covington & Burling, where he spent years representing corporate clients.”
A large chunk of Covington & Burling’s corporate clients are mega-banks like JP Morgan Chase, Wells Fargo, Citigroup and Bank of America. Lanny Breuer, who ran the criminal division for Holder’s Justice Department, already returned to work there.
In March, Covington highlighted in marketing materials their award from the trade publication American Lawyer as “Litigation Department of the Year,” touting the law firm’s work in getting clients accused of financial fraud off with slap-on-the-wrist fines.
Covington, American Lawyer says, helps clients “get the best deal they can.”
Holder has a mixed legacy: excellent on civil and voting rights, bad on press freedom and transparency.
But if you want to understand what he did for the perpetrators of a cascade of financial fraud that blew up the nation’s economy in 2008, you only have to read that line from his former employer: he helped them “get the best deal they can.”
As for homeowners, they received a raw deal, in the form of little or no compensation for some of the greatest consumer abuses in American history.
Before Holder became Attorney General, banks fueled the housing bubble with predatory and at times, allegedly fraudulent practices.
As far back as 2004, the FBI warned of an “epidemic” of mortgage fraud, which they said would have “as much impact as the Savings & Loan crisis.”
They were wrong; it was worse.
Brian T Moynihan, chief executive officer of Bank of America Corp, one of the banks accused of extensive mortgage abuses. Very little of the money from its settlements has gone to help homeowners.Photograph: Bloomberg via Getty Images
And banks and lenders carried through that fraud to every level of the mortgage process. They committed origination fraud through faulty appraisals and undisclosed trickery.
They committed servicing fraud through illegal fees and unnecessary foreclosures.
They committed securities fraud by failing to inform investors of the poor underwriting on loans they packaged into securities.
They committed mass document fraud when they failed to follow the steps to create mortgage-backed securities, covering up with fabrications and forgeries to prove the standing to foreclose.
By the time the bubble collapsed, the recession hit and Holder took over the Justice Department, Wall Street was a target-rich environment for any federal prosecutor. Physical evidence to an untold number of crimes was available in court filings and county recording offices.
Financial audits revealed large lapses in underwriting standards as early as 2005. Provisions in the Sarbanes-Oxley Act, passed during the last set of financial scandals in 2002, could hold chief executives criminally responsible for misrepresenting their risk management controls to regulators.
Any prosecutor worth his salt could have gone up the chain of command and implicated top banking executives.
In 2009, Congress passed the Fraud Enforcement and Recovery Act, giving $165m to the Justice Department to staff the investigations necessary to bring those accountable for the financial crisis to justice.
Yet, despite the Justice Department’s claims to the contrary, not one major executive has been sent to jail for their role in the crisis.
The department has put real housewives in jail for mortgage fraud, but not real bankers, saving their firepower for people who manage to defraud banks, not for banks who manage to defraud people.
Most of the “investigations” of financial institutions over the past six years have swiftly moved to cash settlements, often without holding anyone responsible for admitting wrongdoing or providing a detailed description of what they did wrong.
The headline prices of these settlements usually bore no resemblance to the reality of what they cost the banks.
The National Mortgage Settlement, for example, was touted by Holder’s Justice Department as a $25bn deal. In reality, banks were able to pay one-quarter of that penalty with other people’s money, lowering principal balances on loans they didn’t even own.
Other penalties featured similarly inflated numbers that didn’t reflect the true cost. Banks could satisfy their obligations under the settlements through routine business practices (including some, like making loans to low-income homeowners, that make them money).
A recent series of securities fraud settlements with JP Morgan, Bank of America and Citigroup, which DoJ said cost the banks $36.65bn, actually cost them about $11.5bn. And shareholders, not executives, truly bear that cost.
Incidentally, the Wall Street Journal found last week that the Justice Department only collects around 25% of the fines they impose. So the banks may have gotten off even easier.
The Justice Department has reportedly collected only 25% of the fines it has imposed on banks.Photograph: Petros Giannakouris/AP
These settlements have actually perverted the notion of justice, turning accountability into a public relations vehicle. And Holder’s Justice Department has been guilty of cooking the books: they admitted last August to overstating the number of criminal financial fraud charges by over 80%.
The DoJ’s Inspector General criticized this in a March report, and also found that DoJ de-prioritized mortgage fraud, making it the“lowest-ranked criminal threat” from 2009-2011.
As for homeowners, the biggest victims of Wall Street misconduct, they received little relief. Victims who already lost their homes got checks in the National Mortgage Settlement for between $1,500-$2,000, compensating people wrongly foreclosed upon with barely enough money for two month’s rent.
Despite claims that 1m borrowers still in their homes would get principal reductions under the settlement, when the final numbers came in this March, just 83,000 families received such a benefit, an under-delivery of over 90%.
Considering that over five million families experienced foreclosures since the end of the crisis, that relief is a drop in the bucket.
For those still eligible for relief, thanks to the expiration of a law called the Mortgage Forgiveness Debt Relief Act, any principal forgiveness will count as earned income for tax purposes, meaning that homeowners struggling to avoid foreclosure will subsequently get hit with a tax bill they cannot afford.
The Justice Department only recognized this belatedly, creating a fund in a recent Bank of America settlement to “partially” defray tax costs.
For others without that benefit, the help the Justice Department provided will look more like harm.
More important, the settlements didn’t end the misconduct.
Homeowners today continue to lose their homes based on false documents. Because the Justice Department just put a band-aid over the fraud, and didn’t convict any of the ringleaders, the problems went unaddressed, and the root causes never got fixed.
In fact, the entire banking sector’s get-out-of-jail free card gives them confidence that they could commit the same crimes again, with little if any legal implications.
The decision to protect banks instead of homeowners should be laid at the feet of the president and his administration, not one man in the Justice Department. But Holder certainly carried out the policy, even if he didn’t devise it.
We’ll soon find out if Holder merely presided over DoJ in a pause between helping corporate clients at Covington & Burling. But the failure to prosecute during his time in office certainly makes it look like Holder’s sympathies were with those clients even while serving as attorney general.