Are you Promoting Fake News?

Mixing fine jewelry with costume jewelry gives the appearance it is all real, same with the news and who is promoting it or wearing it. So, how well did you read the WHOLE story and share it? Did you check it with other sources? Did you consider the original source or check the author?

Consider the following of which this site has previously published several times with warnings.

One more important item, the fake news and propaganda is NOT all political or simply centered about candidates or the election. This is where ‘group-think’ begins and festers, which is NOT thinking at all.

More and more, posts and commentaries on the Internet in Russia and even abroad are generated by professional trolls, many of whom receive a higher-than-average salary for perpetuating a pro-Kremlin dialogue online.

There are thousands of fake accounts on Twitter, Facebook, LiveJournal, and vKontakte, all increasingly focused on the war in Ukraine. Many emanate from Russia’s most famous “troll factory,” the Internet Research center, an unassuming building on St. Petersburg’s Savushkina Street, which runs on a 24-hour cycle. In recent weeks, former employees have come forward to talk to RFE/RL about life inside the factory, where hundreds of people work grinding, 12-hour shifts in exchange for 40,000 rubles ($700) a month or more.

St. Petersburg blogger Marat Burkhard spent two months working at Internet Research in the department tasked with clogging the forums on Russia’s municipal websites with pro-Kremlin comments. In the following interview, he describes a typical day and the type of assignments he encountered. The interview is here.

***** 

Russian propaganda effort helped spread ‘fake news’ during election, experts say

WaPo: The flood of “fake news” this election season got support from a sophisticated Russian propaganda campaign that created and spread misleading articles online with the goal of punishing Democrat Hillary Clinton, helping Republican Donald Trump and undermining faith in American democracy, say independent researchers who tracked the operation.

Russia’s increasingly sophisticated propaganda machinery — including thousands of botnets, teams of paid human “trolls,” and networks of websites and social-media accounts — echoed and amplified right-wing sites across the Internet as they portrayed Clinton as a criminal hiding potentially fatal health problems and preparing to hand control of the nation to a shadowy cabal of global financiers. The effort also sought to heighten the appearance of international tensions and promote fear of looming hostilities with nuclear-armed Russia.

Two teams of independent researchers found that the Russians exploited American-made technology platforms to attack U.S. democracy at a particularly vulnerable moment, as an insurgent candidate harnessed a wide range of grievances to claim the White House. The sophistication of the Russian tactics may complicate efforts by Facebook and Google to crack down on “fake news,” as they have vowed to do after widespread complaints about the problem.

There is no way to know whether the Russian campaign proved decisive in electing Trump, but researchers portray it as part of a broadly effective strategy of sowing distrust in U.S. democracy and its leaders. The tactics included penetrating the computers of election officials in several states and releasing troves of hacked emails that embarrassed Clinton in the final months of her campaign.

“They want to essentially erode faith in the U.S. government or U.S. government interests,” said Clint Watts, a fellow at the Foreign Policy Research Institute who along with two other researchers has tracked Russian propaganda since 2014. “This was their standard mode during the Cold War. The problem is that this was hard to do before social media.”

Watts’s report on this work, with colleagues Andrew Weisburd and J.M. Berger, appeared on the national security blog War on the Rocks this month under the headline “Trolling for Trump: How Russia Is Trying to Destroy Our Democracy.” Another group, called PropOrNot, a nonpartisan collection of researchers with foreign policy, military and technology backgrounds, planned to release its own findings Friday showing the startling reach and effectiveness of Russian propaganda campaigns.

The researchers used Internet analytics tools to trace the origins of particular tweets and mapped the connections among social-media accounts that consistently delivered synchronized messages. Identifying website codes sometimes revealed common ownership. In other cases, exact phrases or sentences were echoed by sites and social-media accounts in rapid succession, signaling membership in connected networks controlled by a single entity.

PropOrNot’s monitoring report, which was provided to The Washington Post in advance of its public release, identifies more than 200 websites as routine peddlers of Russian propaganda during the election season, with combined audiences of at least 15 million Americans. On Facebook, PropOrNot estimates that stories planted or promoted by the disinformation campaign were viewed more than 213 million times.

Some players in this online echo chamber were knowingly part of the propaganda campaign, the researchers concluded, while others were “useful idiots” — a term born of the Cold War to describe people or institutions that unknowingly assisted Soviet Union propaganda efforts.

The Russian campaign during this election season, researchers from both groups say, worked by harnessing the online world’s fascination with “buzzy” content that is surprising and emotionally potent, and tracks with popular conspiracy theories about how secret forces dictate world events.

Some of these stories originated with RT and Sputnik, state-funded Russian information services that mimic the style and tone of independent news organizations yet sometimes include false and misleading stories in their reports, the researchers say. On other occasions, RT, Sputnik and other Russian sites used social-media accounts to amplify misleading stories already circulating online, causing news algorithms to identify them as “trending” topics that sometimes prompted coverage from mainstream American news organizations.

The speed and coordination of these efforts allowed Russian-backed phony news to outcompete traditional news organizations for audience. Some of the first and most alarming tweets after Clinton fell ill at a Sept. 11 memorial event in New York, for example, came from Russian botnets and trolls, researchers found. (She was treated for pneumonia and returned to the campaign trail a few days later.)

This followed a spate of other misleading stories in August about Clinton’s supposedly troubled health. The Daily Beast debunked a particularly widely read piece in an article that reached 1,700 Facebook accounts and was read online more than 30,000 times. But the PropOrNot researchers found that the version supported by Russian propaganda reached 90,000 Facebook accounts and was read more than 8 million times. The researchers said the true Daily Beast story was like “shouting into a hurricane” of false stories supported by the Russians.

This propaganda machinery also helped push the phony story that an anti-Trump protester was paid thousands of dollars to participate in demonstrations, an allegation initially made by a self-described satirist and later repeated publicly by the Trump campaign. Researchers from both groups traced a variety of other false stories — fake reports of a coup launched at Incirlik Air Base in Turkey and stories about how the United States was going to conduct a military attack and blame it on Russia — to Russian propaganda efforts.

The final weeks of the campaign featured a heavy dose of stories about supposed election irregularities, allegations of vote-rigging and the potential for Election Day violence should Clinton win, researchers said.

“The way that this propaganda apparatus supported Trump was equivalent to some massive amount of a media buy,” said the executive director of PropOrNot, who spoke on the condition of anonymity to avoid being targeted by Russia’s legions of skilled hackers. “It was like Russia was running a super PAC for Trump’s campaign. . . . It worked.”

He and other researchers expressed concern that the U.S. government has few tools for detecting or combating foreign propaganda. They expressed hope that their research detailing the power of Russian propaganda would spur official action.

A former U.S. ambassador to Russia, Michael A. McFaul, said he was struck by the overt support that RT and Sputnik expressed for Trump during the campaign, even using the #CrookedHillary hashtag pushed by the candidate.

McFaul said Russian propaganda typically is aimed at weakening opponents and critics. Trump’s victory, though reportedly celebrated by Putin and his allies in Moscow, may have been an unexpected benefit of an operation that already had fueled division in the United States. “They don’t try to win the argument,” said McFaul, now director of the Freeman Spogli Institute for International Studies at Stanford University. “It’s to make everything seem relative. It’s kind of an appeal to cynicism.”

The Kremlin has repeatedly denied interfering in the U.S. election or hacking the accounts of election officials. “This is some sort of nonsense,” Dmitry Peskov, press secretary for Putin, said last month when U.S. officials accused Russia of penetrating the computers of the Democratic National Committee and other political organizations.

The findings about the mechanics of Russian propaganda operations largely track previous research by the Rand Corp. and George Washington University’s Elliott School of International Affairs.

“They use our technologies and values against us to sow doubt,” said Robert Orttung, a GWU professor who studies Russia. “It’s starting to undermine our democratic system.”

The Rand report — which dubbed Russian propaganda efforts a “firehose of falsehood” because of their speed, power and relentlessness — traced the country’s current generation of online propaganda work to the 2008 incursion into neighboring Georgia, when Russia sought to blunt international criticism of its aggression by pushing alternative explanations online.

The same tactics, researchers said, helped Russia shape international opinions about its 2014 annexation of Crimea and its military intervention in Syria, which started last year. Russian propaganda operations also worked to promote the “Brexit” departure of Britain from the European Union.

Another crucial moment, several researchers say, came in 2011 when the party of Russian President Vladimir Putin was accused of rigging elections, sparking protests that Putin blamed the Obama administration — and then-Secretary of State Clinton — for instigating.

Putin, a former KGB officer, announced his desire to “break the Anglo-Saxon monopoly on the global information streams” during a 2013 visit to the broadcast center for RT, formerly known as Russia Today.

“For them, it’s actually a real war, an ideological war, this clash between two systems,” said Sufian Zhemukhov, a former Russian journalist conducting research at GWU. “In their minds, they’re just trying to do what the West does to Russia.”

RT broadcasts news reports worldwide in several languages, but the most effective way it reaches U.S. audiences is online.

Its English-language flagship YouTube channel, launched in 2007, has 1.85 million subscribers and has had a total of 1.8 billion views, making it more widely viewed than CNN’s YouTube channel, according to a George Washington University report this month.

Though widely seen as a propaganda organ, the Russian site has gained credibility with some American conservatives. Trump sat for an interview with RT in September. His nominee for national security adviser, retired Lt. Gen. Michael T. Flynn, traveled to Russia last year for a gala sponsored by the network. He later compared it to CNN.

The content from Russian sites has offered ready fodder for U.S.-based websites pushing far-right conservative messages. A former contractor for one, the Next News Network, said he was instructed by the site’s founder, Gary S. Franchi Jr., to weave together reports from traditional sources such as the Associated Press and the Los Angeles Times with ones from RT, Sputnik and others that provided articles that often spread explosively online.

“The readers are more likely to share the fake stories, and they’re more profitable,” said Dyan Bermeo, who said he helped assemble scripts and book guests for Next News Network before leaving because of a pay dispute and concerns that “fake news” was crowding out real news.

In just the past 90 days — a period that has included the closing weeks of the campaign, Election Day and its aftermath — the YouTube audience of Next News Network has jumped from a few hundred thousand views a day to a few million, according to analytics firm Tubular Labs. In October alone, videos from Next News Network were viewed more than 56 million times.

Franchi said in an e-mail statement that Next News Network seeks “a global perspective” while providing commentary aimed at U.S. audiences, especially with regard to Russian military activity. “Understanding the threat of global war is the first step to preventing it,” he said, “and we feel our coverage assisted in preventing a possible World War 3 scenario.”

Soros 3 Day Secret Huddle in DC Underway

Full the 3 day agenda is packed full of communists, Marxists and progressives and is found here.

Soros bands with donors to resist Trump, ‘take back power’

Major liberal funders huddle behind closed doors with Pelosi, Warren, Ellison, and union bosses to lick wounds, retrench.

Politico: George Soros and other rich liberals who spent tens of millions of dollars trying to elect Hillary Clinton are gathering in Washington for a three-day, closed door meeting to retool the big-money left to fight back against Donald Trump.

The conference, which kicked off Sunday night at Washington’s pricey Mandarin Oriental hotel, is sponsored by the influential Democracy Alliance donor club, and will include appearances by leaders of most leading unions and liberal groups, as well as darlings of the left such as House Democratic leader Nancy Pelosi, Sen. Elizabeth Warren and Congressional Progressive Caucus co-chairman Keith Ellison, according to an agenda and other documents obtained by POLITICO.

The meeting is the first major gathering of the institutional left since Trump’s shocking victory over Hillary Clinton in last week’s presidential election, and, if the agenda is any indication, liberals plan full-on trench warfare against Trump from Day One. Some sessions deal with gearing up for 2017 and 2018 elections, while others focus on thwarting President-elect Trump’s 100-day plan, which the agenda calls “a terrifying assault on President Obama’s achievements — and our progressive vision for an equitable and just nation.”

Yet the meeting also comes as many liberals are reassessing their approach to politics — and the role of the Democracy Alliance, or DA, as the club is known in Democratic finance circles. The DA, its donors and beneficiary groups over the last decade have had a major hand in shaping the institutions of the left, including by orienting some of its key organizations around Clinton, and by basing their strategy around the idea that minorities and women constituted a so-called “rising American electorate” that could tip elections to Democrats.

That didn’t happen in the presidential election, where Trump won largely on the strength of his support from working-class whites. Additionally, exit polls suggested that issues like fighting climate change and the role of money in politics — which the DA’s beneficiary groups have used to try to turn out voters — didn’t resonate as much with the voters who carried Trump to victory.

“The DA itself should be called into question,” said one Democratic strategist who has been active in the group and is attending the meeting. “You can make a very good case it’s nothing more than a social club for a handful wealthy white donors and labor union officials to drink wine and read memos, as the Democratic Party burns down around them.”

Another liberal operative who has been active in the DA since its founding rejected the notion that the group — or the left, more generally — needed to completely retool its approach to politics.

“We should not learn the wrong lesson from this election,” said the operative, pointing out that Clinton is on track to win the popular vote and that Trump got fewer votes than the last GOP presidential nominee, Mitt Romney. “We need our people to vote in greater numbers. For that to happen, we need candidates who inspire them to go to the polls on Election Day.”

But Gara LaMarche, the president of the DA, on Sunday evening told donors gathered at the Mandarin for a welcome dinner that some reassessment was in order. According to prepared remarks he provided to POLITICO, he said, “You don’t lose an election you were supposed to win, with so much at stake, without making some big mistakes, in assumptions, strategy and tactics.”

LaMarche added that the reassessment “must take place without recrimination and finger-pointing, whatever frustration and anger some of us feel about our own allies in these efforts,” and he said “It is a process we should not rush, even as we gear up to resist the Trump administration.”

LaMarche emailed the donors last week that the meeting would begin the process of assessing “what steps we will take together to resist the assaults that are coming and take back power, beginning in the states in 2017 and 2018.”

In addition to sessions focusing on protecting Obamacare and other pillars of Obama’s legacy against dismantling by President-elect Trump, the agenda includes panels on rethinking polling and the left’s approach to winning the working-class vote, as well as sessions stressing the importance of channeling cash to state legislative policy battles and races, where Republicans won big victories last week.

Democrats need to invest more in training officials and developing policies in the states, argued Rep. Ellison (D-Minn.) on a Friday afternoon donor conference call, according to someone on the call. The call was organized by a DA-endorsed group called the State Innovation Exchange (or SiX), which Ellison urged the donors to support.

Ellison, who is scheduled to speak on a Monday afternoon panel at the DA meeting on the challenge Democrats face in winning working-class votes, has been a leading liberal voice for a form of economic populism that Trump at times channeled more than Clinton.

As liberals look to rebuild the post-Clinton Democratic Party on a more aggressively liberal bearing, Ellison has emerged as a top candidate to take over the Democratic National Committee, and he figures to be in high demand at the DA meeting. An Ellison spokesman did not immediately respond to a request for comment on Sunday evening. Nor did a Trump spokesman.

Raj Goyle, a New York Democratic activist who previously served in the Kansas state legislature and now sits on SiX’s board, argued that many liberal activists and donors are “disconnected from working class voters’ concerns” because they’re cluster in coastal cities. “And that hurt us this election,” said Goyle, who is involved in the DA, and said its donors would do well to steer more cash to groups on the ground in landlocked states. “Progressive donors and organizations need to immediately correct the lack of investment in state and local strategies.”

The Democracy Alliance was launched after the 2004 election by Soros, the late insurance mogul Peter Lewis, and a handful of fellow Democratic mega-donors who had combined to spend tens of millions trying to boost then-Sen. John Kerry’s ultimately unsuccessful challenge to then-President George W. Bush.

The donors’ goal was to seed a set of advocacy groups and think tanks outside the Democratic Party that could push the party and its politicians to the left while also defending them against attack from the right.

The group requires its members — a group that now numbers more than 100 and includes finance titans like Soros, Tom Steyer and Donald Sussman, as well as major labor unions and liberal foundations — to contribute a total of at least $200,000 a year to recommended groups. Members also pay annual dues of $30,000 to fund the DA staff and its meetings, which include catered meals and entertainment (on Sunday, interested donors were treated to a VIP tour of the recently opened National Museum of African American History and Culture).

Since its inception in 2005, the DA has steered upward of $500 million to a range of groups, including pillars of the political left such as the watchdog group Media Matters, the policy advocacy outfit Center for American Progress and the data firm Catalist — all of which are run by Clinton allies who are expected to send representatives to the DA meeting.

The degree to which those groups will be able to adapt to the post-Clinton Democratic Party is not entirely clear, though some of the key DA donors have given generously to them for years.

That includes Soros, who, after stepping back a bit from campaign-related giving in recent years, had committed or donated $25 million to boosting Clinton and other Democratic candidates and causes in 2016. During the presidential primaries, Soros had argued that Trump and his GOP rival Ted Cruz were “doing the work of ISIS.”

A Soros spokesman declined to comment for this story.

But, given that the billionaire financier only periodically attends DA meetings and is seldom a part of the formal proceedings, his scheduled Tuesday morning appearance as a speaker suggests that he’s committed to investing in opposing President Trump.

The agenda item for a Tuesday morning “conversation with George Soros” invokes Soros’ personal experience living through the Holocaust and Soviet Communism in the context of preparing for a Trump presidency. The agenda notes that the billionaire currency trader, who grew up in Hungary, “has lived through Nazism and Communism, and has devoted his foundations to protecting the kinds of open societies around the world that are now threatened in the United States itself.”

LaMarche, who for years worked for Soros’s Open Society foundations, told POLITICO that the references to Nazism and Communism are “part of his standard bio.”

LaMarche, who is set to moderate the discussion with Soros, said the donor “does not plan to compare whatever we face under Trump to Nazism, I can tell you that.” LaMarche he also said, “I don’t think there is anyone who has looked at Trump, including many respected conservatives, who doesn’t think the experience of authoritarian states would not be important to learn from here. And to the extent that Soros and his foundations have experience with xenophobia in Europe, Brexit, etc., we want to learn from that as well.”

The Soros conversation was added to the agenda after Election Day. It was just one of many changes made on the fly to adjust for last week’s jarring result and the stark new reality facing liberals, who went from discussing ways to push an incoming President Clinton leftward, to instead discussing how to play defense.

A pre-election working draft of the DA’s agenda, obtained by POLITICO, featured a session on Clinton’s first 100 days and another on “moving a progressive national policy agenda in 2017.” Those sessions were rebranded so that the first instead will examine “what happened” on the “cataclysm of Election Day,” while the second will focus on “combating the massive threats from Trump and Congress in 2017.”

A session that before the election had been titled “Can Our Elections Be Hacked,” after the election was renamed “Was the 2016 Election Hacked” — a theory that has percolated without evidence on the left to explain the surprising result.

In his post-election emails to donors and operatives, LaMarche acknowledged the group had to “scrap many of the original plans for the conference,” explaining “while we made no explicit assumptions about the outcome, the conference we planned, and the agenda you have seen, made more sense in the event of a Hillary Clinton victory.”

Trust Even Less on the Internet Thanks to Real Russian Trolls

Daily, I am asked if this is true or that is true….admittedly it is getting harder each day to vet stories for accuracy and to dissect them for what is accurate and other parts being flatly false. That is what trolls do, mix accuracy with falsehoods so the reader assumes it is all factual….ah not so much.

So, what sites to do visit often and have come to rely on them? InfoWars or Zerohedge? Well what about people that are curiously appearing to be friends with you on Facebook or new followers on Twitter? Take caution and read carefully below, you reliance on truth and accuracy just got harder. Even some in the media are being punked.

Related reading: KGB Model: Army of Russia Trolls vs. America

Related reading: Even Russian Diplomats in DC are Trolling Obama Admin

Related reading: Are you Sick of Hearing About Russia? Putin Loves it

Here we go and hat tip to these fellas for taking many months of investigation to sound the warnings.

****   

Trolling for Trump: How Russia Is Trying to Destroy Our Democracy

Trump isn’t the end of Russia’s information war against America. They are just getting started.

WotR: In spring 2014, a funny story crossed our social media feeds. A petition on whitehouse.gov called for“sending Alaska back to Russia,” and it quickly amassed tens of thousands of signatures. The media ran a number of amused stories on the event, and it was quickly forgotten.

The petition seemed odd to us, and so we looked at which accounts were promoting it on social media. We discovered that thousands of Russian-language bots had been repetitively tweeting links to the petition for weeks before it caught journalists’ attention.

Those were the days. Now, instead of pranking petitions, Russian influence networks online are interfering with the 2016 U.S. election. Many people, especially Hillary Clinton supporters, believe that Russia is actively trying to put Donald Trump in the White House.

And the evidence is compelling. A range of activities speaks to a Russian connection: the theft of emails from the Democratic National Committee and Clinton campaign officials, hacks surrounding voter rolls and possibly election machines, Putin’s overt praise for Trump, and the curious Kremlin connections of Trump campaign operatives Paul Manafort and Carter Page.

But most observers are missing the point. Russia is helping Trump’s campaign, yes, but it is not doing so solely or even necessarily with the goal of placing him in the Oval Office. Rather, these efforts seek to produce a divided electorate and a president with no clear mandate to govern. The ultimate objective is to diminish and tarnish American democracy. Unfortunately, that effort is going very well indeed.

Russia’s desire to sow distrust in the American system of government is not new. It’s a goal Moscow has pursued since the beginning of the Cold War. Its strategy is not new, either. Soviet-era “active measures” called for using the “force of politics” rather than the “politics of force”to erode American democracy from within.  What is new is the methods Russia uses to achieve these objectives.

We have been tracking Russian online information operations since 2014, when our interest was piqued by strange activity we observed studying online dimensions of jihadism and the Syrian civil war. When experts published content criticizing the Russian-supported Bashar al Assad regime, organized hordes of trolls would appear to attack the authors on Twitter and Facebook. Examining the troll social networks revealed dozens of accounts presenting themselves as attractive young women eager to talk politics with Americans, including some working in the national security sector. These “honeypot” social media accounts were linked to other accounts used by the Syrian Electronic Army hacker operation. All three elements were working together: the trolls to sow doubt, the honeypots to win trust, and the hackers (we believe) to exploit clicks on dubious links sent out by the first two.

Related reading: U.S. charges three suspected Syrian Electronic Army hackers

 

The Syrian network did not stand alone. Beyond it lurked closely interconnected networks tied to Syria’s allies, Iran and Russia. Many of these networks were aimed at U.S. political dissenters and domestic extremist movements, including militia groups, white nationalists, and anarchists.

Today, that network is still hard at work, running at peak capacity to destroy Americans’ confidence in their system of government. We’ve monitored more than 7,000 social media accounts over the last 30 months and at times engaged directly with them. Trump isn’t the end of Russia’s social media and hacking campaign against America, but merely the beginning.  Here is what we’ve learned.

The Russian Social Media Approach: Soviet Union’s “Active Measures” On Steroids

The United States and its European allies have always placed state-to-state relations at the forefront of their international strategies. The Soviet system’s effort to undermine those relations during the Cold War, updated now by modern Russia, were known as “active measures.”

A June 1992 U.S. Information Agency report on the strategy explained:

It was often very difficult for Westerners to comprehend this fundamentally different Soviet approach to international relations and, as a result, the centrality to the Soviets (now Russians) of active measures operations was gravely underappreciated.

Active measures employ a three-pronged approach that attempts to shape foreign policy by directing influence in the following ways: state-to-people, people-to-people, and state-to-state. More often than not, active measures sidestep traditional diplomacy and normal state-to-state relationships. The Russian government today employs the state-to-people and people-to-people approaches on social media and the internet, directly engaging U.S. and European audiences ripe for an anti-American message, including the alt-right and more traditional right-wing and fascist parties. It also targets left-wing audiences, but currently at a lower tempo.

Until recently, Western governments focused on state-to-state negotiations with Putin’s regime largely missed Russian state-to-people social media approaches. Russia’s social media campaigns seek five complementary objectives to strengthen Russia’s position over Western democracies:

  • Undermine citizen confidence in democratic governance;
  • Foment and exacerbate divisive political fractures;
  • Erode trust between citizens and elected officials and democratic institutions;
  • Popularize Russian policy agendas within foreign populations;
  • Create general distrust or confusion over information sources by blurring the lines between fact and fiction
  • In sum, these influence efforts weaken Russia’s enemies without the use of force. Russian social media propaganda pushes four general themes to advance Moscow’s influence objectives and connect with foreign populations they target.

    Political messages are designed to tarnish democratic leaders or undermine institutions. Examples include allegations of voter fraud, election rigging, and political corruption. Leaders can be specifically targeted, for instance by promoting unsubstantiated claims about Hillary Clinton’s health, or more obviously by leaking hacked emails.

Financial propaganda weakens citizen and investor confidence in foreign markets and posits the failure of capitalist economies. Stoking fears over the national debt, attacking institutions such as the Federal Reserve, and attempts to discredit Western financial experts and business leaders are all part of this arsenal.

In one example from August, Disneyland Paris was the site of a reported bomb scare. Social media accounts on Twitter reported that the park had been evacuated, and several news outlets — including Russian propaganda stations RT and Sputnik — published alarming stories based on the tweets, which escalated in hysteria as the afternoon stretched on. In fact, the park had not been evacuated. But that didn’t stop Disney’s stock from taking a temporary hit. This fluctuation could be exploited by someone who knew the fake scare was coming, but we do not have access to the data that would allow us to know whether this happened.

disney

Social issues currently provide a useful window for Russian messaging. Police brutality, racial tensions, protests, anti-government standoffs, online privacy concerns, and alleged government misconduct are all emphasized to magnify their scale and leveraged to undermine the fabric of society.

Finally, wide-ranging conspiracy theories promote fear of global calamity while questioning the expertise of anyone who might calm those fears. Russian propaganda operations since 2014 have stoked fears of martial law in the United States, for instance, by promoting chemtrails and Jade Helm conspiracy theories. More recently, Moscow turned to stoking fears of nuclear war between the United States and Russia.

For the Kremlin, this is not just focused on the outside world. Russian news organizations bombard Russian citizens with the same combination of content. Steve Rosenberg, a BBC News correspondent in Moscow, filmed the Russian domestic equivalent of this approach on November 1, showing Russian language news headlines inciting fears such as impending nuclear war, a U.S.-Russia confrontation in Syria, and the potential for an assassination of Donald Trump.

russia_active_measures

The Confluence of Information and Cyberspace

Russian active measures use a blend of overt and covert channels to distribute political, financial, social, and calamitous messages (see above). During the Soviet era, “white” active measures were overt information outlets directly attributable to the Central Committee of the Communist Party of the Soviet Union. Today, RT and Sputnik push Kremlin-approved English-language news on television and the Internet. These outlets broadcast a mix of true information (the vast majority of content), manipulated or skewed stories, and strategically chosen falsehoods. RT’s slogan, “Question More,” aptly fits their reporting style — seeding ideas of conspiracy or wrongdoing without actually proving anything.

This “white” content provides ammunition for “gray” measures, which employ less overt outlets controlled by Russia, as well as so-called useful idiots that regurgitate Russian themes and “facts” without necessarily taking direction from Russia or collaborating in a fully informed manner.

During the Cold War, gray measures used semi-covert Communist parties, friendship societies, and non-governmental organizations to engage in party-to-party and people-to-people campaigns. Today, gray measures on social media include conspiracy websites, data dump websites, and seemingly credible news aggregators that amplify disinformation and misinformation.

Conspiracy sites include outlets such as InfoWars and Zero Hedge, along with a host of lesser-known sites that repeat and repackage the same basic content for both right- and left-wing consumers. Sometimes, these intermediaries will post the same stories on sites with opposite political orientations.

Data dump websites, such as Wikileaks and DC Leaks, overtly claim to be exposing corruption and promoting transparency by uploading private information stolen during hacks. But the timing and targets of their efforts help guide pro-Russian themes and shape messages by publishing compromising information on selected adversaries.

The people who run these sites do not necessarily know they are participants in Russian agitprop, or at least it is very difficult to prove conclusively that they do. Some sites likely receive direct financial or operational backing, while others may be paid only with juicy information.

Sincere conspiracy theorists can get vacuumed up into the social networks that promote this material. In at least one case, a site described by its creator as parody was thoroughly adopted by Russian influence operators online and turned into an unironic component of their promoted content stream, at least as far as the network’s targeted “news” consumers are concerned.

A small army of social media operatives — a mix of Russian-controlled accounts, useful idiots, and innocent bystanders— are deployed to promote all of this material to unknowing audiences. Some of these are real people, others are bots, and some present themselves as innocent news aggregators, providing “breaking news alerts” to happenings worldwide or in specific cities. The latter group is a key tool for moving misinformation and disinformation from primarily Russian-influenced circles into the general social media population. We saw this phenomenon at play in recent reports of a second military coup in Turkey and unsubstantiated reports of an active shooter that led to the shutdown of JFK Airport. Some news aggregators may be directly controlled by Russia, while other aggregators that use algorithmic collection may be the victims of manipulation.

“Black” active measures are now easier to execute than they were for the Soviets. During the Cold War, according to the 1992 USIA report, these included:

… the use of agents of influence, forgeries, covert media placements and controlled media to covertly introduce carefully crafted arguments, information, disinformation, and slogans into the discourse in government, media, religious, business, economic, and public arenas in targeted countries.

Black active measures create both risks and costs. Agents deployed into the West must avoid detection or risk state-to-state consequences. The KGB’s Cold War efforts to keep these operations secret bore significant financial costs while producing little quantifiable benefit. Stories were difficult to place in mainstream media outlets, and the slow process made it challenging to create momentum behind any one theme.

On social media, this process is far easier, more effective, and relatively difficult to attribute. Without stepping foot in America, Russia’s coordinated hackers, honeypots, and hecklers influence Americans through people-to-people engagement.

Hackers provide the fuel for themes and narratives. Initially, hackers concentrated on defacements, denial of service, and misinformation posted on compromised social media accounts. By 2015, the Kremlin’s hacking efforts were much more sophisticated, coalescing into two distinct, competing hacking collectives: Fancy Bear (APT 28), possibly operated by Russian military intelligence (GRU), and Cozy Bear (APT 29), possibly operated by Russia’s foreign intelligence service (FSB).

The most notorious Russian-linked hacker, using the handle Guccifer2.0, targets current and former U.S. government officials, American security experts, and media personalities by seeking access to their private communications and records. Former Secretary of State Colin Powell and Clinton campaign chairman John Podesta provide two current examples, but there will be many more to come. Today, Guccifer2.0 posts threats of election meddling this coming Tuesday.

guccif
Guccifer 2.0 Warning on Election Posted to Social Media

In addition to phishing and cracking attacks, these hackers are aided by honeypots, a Cold War term of art referring to an espionage operative who sexually seduced or compromised targets. Today’s honeypots may include a component of sexual appeal or attraction, but they just as often appear to be people who share a target’s political views, obscure personal hobbies, or issues related to family history. Through direct messaging or email conversations, honeypots seek to engage the target in conversations seemingly unrelated to national security or political influence.

These honeypots often appear as friends on social media sites, sending direct messages to their targets to lower their defenses through social engineering. After winning trust, honeypots have been observed taking part in a range of behaviors, including sharing content from white and gray active measures websites, attempting to compromise the target with sexual exchanges, and most perilously, inducing targets to click on malicious links or download attachments infected with malware.

One of us directly experienced how social media direct messages from hackers or influencers seek to compromise or sway a target by using social engineering to build a rapport. Operators may engage the target’s friends or acquaintances, drawing them into conversations to encourage trust. Once conversations are started, an agent of influence will be introduced into the group and will subsequently post on Russian themes from grey outlets or introduce malicious links.

When targets click on malicious links, Fancy Bear and Cozy Bear extract personal information from public officials, media personalities, and American experts and selectively dump the content obtained at opportune times. The goal is to increase popular mistrust of political leaders and people with expertise or influence in specific circles of interest to Russia, such as national security. In some cases, experts criticizing Russia have had their computers mysteriously compromised by destructive malware and their research destroyed.

Online hecklers, commonly referred to as trolls, energize Russia’s active measures. Ringleader accounts designed to look like real people push organized harassment — including threats of violence — designed to discredit or silence people who wield influence in targeted realms, such as foreign policy or the Syrian civil war. Once the organized hecklers select a target, a variety of volunteers will join in, often out of simple antisocial tendencies. Sometimes, they join in as a result of the target’s gender, religion, or ethnic background, with anti-Semitic and misogynistic trolling particularly prevalent at the moment. Our family members and colleagues have been targeted and trolled in this manner via Facebook and other social media.

Hecklers and honeypots can also overlap. For instance, we identified hundreds of accounts of ostensibly American anti-government extremists that are actually linked to Russian influence operations. These accounts create noise and fear, but may also draw actual anti-government extremists into compromising situations. Based on our observations, the latter effort has not been widely successful so far among anti-government extremists, who tend to stay in their own social networks and are less likely to interact with Russian influence accounts, but our analysis points to greater overlap with networks involving American white nationalists.

Russia’s honeypots, hecklers, and hackers have run amok for at least two years, achieving unprecedented success in poisoning America’s body politic and creating deep dissent, including a rise in violent extremist activity and visibility. Posting hundreds of times a day on social media, thousands of Russian bots and human influence operators pump massive amounts of disinformation and harassment into public discourse.

This “computational propaganda,” a term coined by Philip Howard, has the cumulative effect of creating Clayton A. Davis at Indiana University calls a“majority illusion, where many people appear to believe something ….which makes that thing more credible.” The net result is an American information environment where citizens and even subject-matter experts are hard-pressed to distinguish fact from fiction. They are unsure who to trust and thus more willing to believe anything that supports their personal biases and preferences.

The United States disbanded the U.S. Information Agency after the Cold War and currently fields no apparatus to detect and mitigate Russia’s social media influence campaign. As seen in America’s disjointed counter narratives against the Islamic State, efforts to create any kind of U.S. information strategy are plagued by disparate and uncoordinated efforts strewn among many military, diplomatic, and intelligence commands. American cyber operations and hacking reside separately with the National Security Agency. Russia, on the other hand, seamlessly integrates the two efforts to devastating effect.

After Election Day: What to do about Russia’s Active Measures?

The most overwhelming element of Russia’s online active measures over the last year relate to the presidential campaign of Donald Trump. Russian promotion of Trump not only plagues Clinton, but likely helped sideline other GOP candidates in early 2016 with a more traditional anti-Russia view of foreign policy. It is impossible to assess whether Donald Trump is even fully aware of these efforts, let alone complicit. Setting aside that question for a moment, some readers will immediately ask how we are so sure all this activity goes back to Russia?

There are a number of technical indicators, most tellingly the synchronization of messaging and disinformation with “white” outlets such as RT and Sputnik, as well as the shocking consistency of messaging through specific social networks we have identified.

Dmitri Alperovich of the cyber-security firm Crowdstrike first attributed the DNC hacks to Russia. He explained in a recent War on the Rocks podcast:

The important thing about attribution…is that it’s not that much different from the physical world. Just like someone can plan a perfect bank heist and get away with it, you can do that in the cyber-domain, but you can almost never actually execute a series of bank heists over the course of many years and get away with it. In fact, the probability of you not getting caught is miniscule. And the same thing is true in cyber-space because eventually you make mistakes. Eventually you repeat tradecraft. It’s hard to sort of hide the targets you’re going after…

There are other, less subtle indications as well, for instance, a notification from Google: “We believe we detected government backed attackers trying to steal your password. This happens to less than 0.1% of all Gmail users.” When one of us receives these messages, we feel confident we’re on the right trail.

Sid Blumenthal was POC for Libya, Muslim Brotherhood

 Leader of LIFG, Belhadj

Base of Operation:Mountain territory near Benghazi and al-Akhdar aside the Libyan northeast coasts. The Libyan Islamic Fighting Group began formation from return Libyan Afghans from the war against the soviets ending in 1989; however, was not officially established as a group until the year of 1995. Between then and the present, the group has gone through several mischievous movements of acting out against the government. Per the United Nations under the direction of the U.S. State Department during the Bush administration:

LIFG is believed to have several hundred members or supporters, mostly in the Middle East and Europe. Since the late 1990s, many LIFG members have fled from Libya to various Asian, Arabian Gulf, African, and European countries, particularly the United Kingdom. It is likely that LIFG has maintained a presence in eastern Libya and has facilitated the transfer of foreign fighters to Iraq.

Hillary Clinton Knew She Was Helping Islamists Move Into Power In Libya

Howley/DC: Hillary Clinton received intelligence that her effort to bring down Libyan president Muammar Gaddafi was leading to the rise of al-Qaeda militants and the Muslim Brotherhood in the country, according to emails released by WikiLeaks.

More than a year before the Benghazi attack, Clinton learned that al-Qaeda terrorists were infiltrating the post-Gadaffi transitional government. Clinton also acknowledged that the Muslim Brotherhood wielded the “real power” in the rebel movement that Clinton was supporting — and that their Brotherhood allies in Egypt were waiting in the wings to move into Libya’s oil sector.

Clinton received a “CONFIDENTIAL” memo from Sidney Blumenthal on March 27, 2011. The subject of the email was “Re: Lots of new intel; Libyan army possibly on verge of collapse.”

Blumenthal explained that “radical/terrorist” groups were “infiltrating the NLC,” or National Libyan Council, a rebel quasi-government that earned French recognition as Libya’s governing body that very same month. Clinton was warned that al-Qaeda could become major players in the region.

Blumenthal wrote:

“This situation has become increasingly frustrating for French President Nicolas Sarkozy, who, according to knowledgeable individuals, is pressing to have France emerge from this crisis as the principal foreign ally of any new government that takes power. Sarkozy is also concerned about continuing reports that radical/terrorist groups such as the Libyan Fighting Groups and Al Qa’ida in the Islamic Maghreb (AQIM) are infiltrating the NLC and its military command. Accordingly, he asked sociologist who has long established ties to Israel, Syria, and other B6 nations in the Middle East, to use his contacts to determine the level of influence AQIM and other. terrorist groups have inside of the NLC. Sarkozy also asked for reports setting out a clear picture of the role of the Muslim Brotherhood in the rebel leadership…

…(Source Comment: Senior European security officials caution that AQIM is watching developments in Libya, and elements of that organization have been in touch with tribes in the southeastern part of the country. These officials are concerned that in a post-Qaddafi Libya, France and other western European countries must move quickly to ensure that the new government does not allow AQIM and others to set up small, semi- autonomous local entities—or “Caliphates”—in the oil and gas producing regions of southeastern Libya.)”

On May 30, 2011, Hillary aide Jake Sullivan sent the secretary of state a full list of known “Libya emissaries.” By then, the National Libyan Council had given way to the Transitional National Council (TNC), but the “real power” still lay with the Muslim Brotherhood.

Sullivan’s intelligence memo noted:

“The Qadhafi regime has also met with the Libyan Muslim Brotherhood leadership in Egypt. According to Qadhafi chief of staff Fouad Zlitni, the Muslim Brotherhood asserts that TNC may be the political leadership of the opposition, but the real power lies with the Libyan Brotherhood and they are apparently willing to bide their time. The Qadhafi regime also offered to send senior tribal leaders to Benghazi to negotiate with the TNC, but the TNC rejected the proposal.”

Clinton forwarded that email to an aide, acknowledging that she had received it and assessed its contents.

Sidney Blumenthal wrote to Clinton again on July 3, 2012, two months before Benghazi, to talk about the upcoming election. The election, Blumenthal noted, was how the Muslim Brotherhood in Egypt was hoping to use the new Brotherhood party in Libya to get into the Libyan oil game.

Blumenthal wrote:

“Source Comment: In the opinion of a knowledgeable individual, the division of the 200 seats in the GNC lies at the heart of this matter, with 120 seats allotted for the Tripolitania, 60 for Barqa, and 18 for the Fezzan area. At present, the Libyan Muslim Brotherhood (LMB) and its political arm, the Justice and Construction Party (JCP), are attempting to mount a national campaign, receiving discreet advice and technical support from the Egyptian Muslim Brotherhood (EMB). With this assistance, Jalil is convinced that the JCP is the party that operates most effectively throughout the country. Jalil has established ties to the EMB, from whom he has learned that JCP leader Mohamad Sowan and his associates are working with the leadership of the EMB.) 4.According to his sources, Jalil believes that he can work with Sowan and the LMB/JCP; however, he is concerned that Mohammed Morsi, the newly elected EMB President of Egypt, and EMB Supreme Guide Mohammed Badie are focused on developing Egyptian influence in Libya. Jalil has been informed privately that these EMB leaders want to establish a strong position in Libya, particularly in the oil services sector as part of their effort to improve Egypt’s economic situation.

Over in Egypt, Clinton helped spur the uprising that led to the Muslim Brotherhood briefly taking power in that country around the same time. And a young Clinton Foundation employee, Gehad El-Haddad, was already working in Cairo to help the Muslim Brotherhood gain power.

El-Haddad was arrested in 2013, following the brief and disastrous reign of Muslim Brotherhood leader Mohammed Morsi, for inciting violence. He was reportedly one of Morsi’s top advisers. El-Haddad was sentenced to life in prison in 2015.

 

 

Contractors: ” Hillary Broke all the Rules”

Primer: JWICS =

The Joint Worldwide Intelligence Communications System, is a Top Secret/SCI network run by the United States’ Defense Intelligence Agency and used across the Department of Defense, Department of State, Department of Homeland Security and Department of Justice to transmit especially sensitive classified information.

FNC/EXCLUSIVETwo State Department contractors, with decades of experience protecting the United States’ most sensitive secrets, are speaking out for the first time about Hillary Clinton’s tenure as secretary of state and how the rules for government security clearance holders did not seem to apply to Clinton and her team.

“The State Department was her oyster and it was great for the [Clinton] foundation and great for the Clintons to be able to have such a great position,” Dave Whitnah told Fox News.

Whitnah said he worked within the State Department’s Office of Security Technology which is responsible for cameras and alarms and sweeping for bugs. Whitnah said everyone understood the secretary of state is the primary target of foreign intelligence services.

“The number one person would be the secretary of state and their communications,” Whitnah explained. “You can think of the Iran negotiations, nuclear negotiation, negotiations with Russia, talks with Russia. You know, anything to do with foreign policy.”

Whitnah emphasized that tens of millions of dollars were spent on technical security for Clinton that apparently was disregarded as her team traveled around the world on official U.S. government business.

“It was unfathomable that [her BlackBerry] would be used for anything other than just unclassified communication,” Whitnah said. Clinton’s devices were not certified as secure by the State Department. As for her use of a non-secure BlackBerry, Whitnah stressed that email can be intercepted and, “Even if turned off, it’s still a listening device so that’s why you take out the batteries.”

As Clinton was sworn in as secretary in January 2009, government contractor Amel Smith said he was also working at the department and: “State Department rules are clear. I helped write those rules.”

Smith says his 30 years of experience includes serving in the U.S. Army’s 82nd Airborne, before becoming a counter-intelligence and counter-espionage investigator at State tracking down breaches of classified materials. He reviewed some of the FBI witness interviews from the Clinton email investigation with Fox News, and questioned those who claimed not to have the proper training in handling sensitive information.

“I hear things like, well, I forgot, um, I don’t know that I was trained, I don’t know this. You know — every single person that had access to that information when it was sent is in violation,” Smith emphasized.

The FBI witness interviews also show secure facilities for classified information — known as SCIFs — were specially built for Clinton in her in Washington, D.C., and Chappaqua, N.Y., homes. Doors that were supposed to be locked were left open.

“If you’ve got an uncleared person in there, it’s automatically a compromise,” Smith said.

Another FBI interview summary said there were personally owned desktop computers in the secure facilities at Clinton’s homes, yet she told the FBI that she did not have a computer of any kind in these facilities.

“If somebody said they’re there, then they probably were there, and you know, the reason you would deny it was because you probably didn’t have approval,” Smith said.

Having unapproved computers in a SCIF would automatically call for a security investigation.

Asked for his reaction to Clinton’s claim that nothing she sent or received was marked classified, Whitnah called that assertion a “misrepresentation.” Fox News was first to report in June that at least one of the emails contained a classified information portion marking for “c” which is confidential. FBI Director James Comey later said in July when he recommended against criminal charges that a handful of Clinton emails contained classified markings.

But more than 2,100 emails with classified information, and at least 22 at the “top secret” level, passed through Clinton’s unsecured private server. Asked how it happened, Smith said, “Personally, there had to have been somebody moving classified information from C-LAN, C-LAN again is Secret, Confidential only, and JWICS. JWICS is where all top secret information is.”

After new emails were found in the Anthony Weiner sexting case belonging to his estranged wife Clinton aide Huma Abedin, the FBI reopened the Clinton email investigation. On Sunday, Comey said the emails did not change his recommendation against criminal charges because his investigators did not find intent to move classified materials outside secure government channels

“Whether it’s the private email server, whether it’s this private laptop. If there’s classified — one document on there — that’s classified, it’s a violation. Somebody violated [the] law,” Smith said. “Throw all the politics out the window, what we’re talking about is the defense of this nation.”

Asked about Smith and Whitnah, who filed a complaint against the State Department, a department spokesman said they were not direct hires — adding that the head of diplomatic security told the FBI that Clinton was “very responsive to security issues.”

****

And her State Department approved that security team in Benghazi

Benghazi guards turned on US diplomats in 2012 attack, sources say

stevenspic1Expand / Contract

Stevens, shown in rear wearing black, with several of the guards sources say turned on him. (Special to Fox News)

FNC: An obscure private firm hired by the State Department over internal objections to protect U.S. diplomats in Benghazi just months before the American ambassador and three others were killed was staffed with hastily recruited locals with terror ties who helped carry out the attack, multiple sources told Fox News.

The explosive charge against Wales-based Blue Mountain Group comes from several sources, including an independent security specialist who has implemented training programs at U.S. Consulates around the world, including in Benghazi, where he trained a local militia that preceded Blue Mountain. The source, who spoke on condition of anonymity, said Blue Mountain used local newspaper ads to assemble a team of 20 guards, many of whom had terror ties, after securing a $9.2 million annual contract.

“The guards who were hired were locals who were part of the Ansar al-Sharia and Al Qaeda groups operating in Benghazi,” said the source, whose assignment in Benghazi had ended in November 2011. “Whoever approved contracts at the State Department hired Blue Mountain Group and then allowed Blue Mountain Group to hire local Libyans who were not vetted.”

TIMELINE OF CLINTON’S BENGHAZI STATEMENTS

Many were members of the Libyan government-financed February 17th Martyrs Brigade, an Islamist militia that had previously guarded Americans before being replaced by Blue Mountain.

John “Tig” Tiegen, one of the CIA contractors that responded to the Sept. 11, 2012 attack and co-author of “13 Hours: The Inside Account of What Really Happened in Benghazi,” confirmed to Fox News that the local Libyans who attacked the consulate that night included guards working for Blue Mountain.

“Many of the local Libyans who attacked the consulate on the night of Sept. 11, 2012, were the actual  guards that the State Department under Hillary Clinton hired to protect the Consulate in Benghazi,” Tiegen told Fox News. “The guards were unvetted and were locals with basically no background at all in providing security. Most of them never had held a job in security in the past.

“Blue Mountain Libya, at the time of being awarded the contract by our State Department, had no employees so they quickly had to find people to work, regardless of their backgrounds,” he said.

One former guard who witnessed the attack, Weeam Mohamed, confirmed in an email sent to the Citizens Commission on Benghazi and obtained by Fox News, that at least four of the guards hired by Blue Mountain took part in the attack after opening doors to allow their confederates in.

“In the U.S. Mission, there were four people [who] belonged to the battalion February 17,” Mohamed wrote to the Commission, an independent body formed with Accuracy in Media to investigate the attack and the administration’s handling of it.

“Always armed. And they are free to move anywhere inside a building mission.

“And therefore, they had a chance to do an attack on the mission’s headquarters. They have all the details about the place. At the same time they have given the United States a painful blow,” Mohamed wrote.

Blue Mountain officials did not return multiple requests for comment. The State Department acknowledged in internal emails obtained by FoxNews.com the local recruits fell short of their duty, but discounted the claim any took an active role in the attack that resulted in the deaths of Ambassador Christopher Stevens, Foreign Service Information Officer Sean Smith and CIA contractors and former Navy SEALs Tyrone Woods and Glen Doherty.

“While the Accountability Review Board report and other reports were critical of our local guards’ performance, we are not aware of any evidence that they participated in the attacks themselves,” said State Department spokesman John Kirby.

Blue Mountain was hired in February 2012, following an uprising that ended Col. Muammar Gaddafi’s 42-year rule and plunged Libya into violent chaos. Congressional testimony in the wake of the attack on a consular office in Benghazi revealed that Stevens and his staff had made hundreds of requests for security upgrades but had been ignored by officials in Washington.

“We kept asking for additional support, including a 50-caliber mounted machine gun, but the State Department would not give it to us, because they said it would upset the locals,” the source told Fox News. “Instead, the State Department hired a company that doesn’t have employees, which then hired terrorists.”

Clare Lopez, a member of Citizens’ Commission on Benghazi, said the Clinton State Department bears blame for the security situation.

“Think about it: Hillary Clinton’s State Department actually hired the very people who, along with their jihadist allies in Benghazi, attacked us and killed U.S. Ambassador Chris Stevens and Sean Smith as well as CIA contractors Glen Doherty and Ty Woods,” Lopez said.

According to government records obtained by the Washington-based Judicial Watch, the State Department was in a “rush” to hire Blue Mountain UK, and its affiliate, Blue Mountain Libya, which together formed The Blue Mountain Group to secure the Benghazi contract.

“I understand there was a tremendous rush to get the original contract awarded, and the Service level agreement was most likely overlooked in the rush,” wrote State Department contracting officer Jan Visintainer, in a June 6, 2012, email. Emails obtained from [missing word] after the attack showed Visintainer urged Blue Mountain officials not to talk to the media.

Blue Mountain UK was formed in 2008 by David Nigel Thomas, a former Special Air Service official. Charles Tiefer, a commissioner at the Commission on Wartime Contracting, told Reuters the company was not well known.

“Blue Mountain was virtually unknown to the circles that studied private security contractors working for the United States, before the events in Benghazi,” Tiefer said.

Despite the size of the operation, and having no staff or track record with the State Department, Blue Mountain Group landed the $767,767-per-month contract to protect the Benghazi consular office, beginning on Feb. 17, 2012.

The company solicited applications in local newspapers and on websites, and very little, if any, screening of guards was done, the security specialist told Fox News. The lack of vetting led to several potentially dangerous hires beginning in March of 2012, he said.

“One of those guards hired by Blue Mountain was the younger brother of the leader of Al Qaeda of Benghazi,” he said.

In an email obtained by Judicial Watch, Jairo Saravia of the Regional Security office for the U.S. Embassy in Tripoli, told his superiors in Washington that Blue Mountain had held and lost security contracts in Tripoli, with the Corinthian Hotel and Palm City complex.

“The latest information is Blue Mountain is not licensed by the GOL (Government of Libya) to provide security services in Libya,” Saravia wrote. “I would advise not to use their services to provide security for any of our annexes and/or offices due to the sensitivity this issue has with the current GOL.”

Prior to Blue Mountain, security for Americans in Benghazi had been provided by the February 17th Martyrs Brigade under a direct agreement with the State Department. Despite its Islamist orientation, the militia included dozens of locals who had been carefully cultivated and trained by the U.S., according to the source. The majority of the February 17 Militia guards were fired without warning when Blue Mountain was hired, leading some members to turn against the Americans, he said. The State Department kept on at least three February 17 employees for patrol.

Eric Nordstrom, the regional security officer in Libya who has vast, first-hand knowledge of some 600 security requests denied to the U.S. diplomatic mission in Libya, testified on May 8, 2013, before the Congressional Committee On Oversight & Government Reform that he was aware that employees with both February 17 Martyrs Brigade and Blue Mountain had ties to Islamist terrorists.

“I had met with some of my agents and then also with some annex personnel. We discussed that,” Nordstrom told lawmakers.

Nordstrom testified that the “ferocity and intensity” of the 13-hour, four-phase attack, on the 11th anniversary of 9/11, was nothing that they had seen in Libya, or that he had seen in his time in the Diplomatic Security Service, with as many as 60 attackers in the consulate.

“I am stunned that the State Department was relying on [locals] with extremist ties to protect American diplomats,” U.S. Rep. Blake Farenthold, R-Texas, told Fox News. “That doesn’t make any sense. How does that happen?”

Fox News was able to verify through a former Libyan guard the identities of several February 17 employees hired despite terrorist ties, who he said participated in the attack. While their identities have been provided to federal authorizes, none have been prosecuted.