British spying services violate human rights, court rules

This Associated Press video says about itself:

(13 September 2018) The campaign group Big Brother Watch hailed the “landmark judgement” on Thursday after the European Court of Human Rights ruled that the British government’s mass-surveillance system breaches human rights.

The court said there was insufficient oversight of the way the government handles bulk interception of phone records and other surveillance data.

Big Brother Watch has been fighting the case for five years, against the backdrop of revelations by the American whistleblower Edward Snowden.

Silkie Carlo, director of Big Brother Watch, said it was now time for the government to reform the system.

Another 13 September 2018 video used to say about itself:

UK mass surveillance regime violates human rights, declares landmark court ruling

The UK government’s mass surveillance regime violates human rights, Europe’s highest court ruled today. In a landmark 5-2 vote, the European Court of Human Rights declared there is “insufficient oversight” and “inadequate safeguards” over the government’s ‘bulk interception’ of its own citizens’ phone records.

It also found 6-1 that the UK’s regime for obtaining communications data from service providers “was not in accordance with the law”. And judges ruled there were “insufficient safeguards” for journalistic material in the UK government’s policy.

Today’s challenge, led by the campaign group Big Brother Watch, came in the wake of revelations about surveillance tactics by the US whistleblower Edward Snowden.

Judges found aspects of the UK policy breached two articles of the European Convention on Human Rights – Article 8 (the right to private life) and Article 10 (free expression).

Not every aspect of the challenge was successful. Judges said the operation of a bulk interception regime would not in itself breach the Convention. And there was no breach in the UK’s regime for sharing intelligence with foreign governments, judges said.

The European Court of Human Rights is separate to the EU and has more member states. The Convention was written into British law two decades ago by the last Labour government in the Human Rights act.

Translated from Dutch NOS TV today:

British intelligence service work violated human rights

The powers of the British intelligence services went too far and were in conflict with human rights. That is what the European Court of Human Rights judges. The verdict is a victory for the civil rights movements and journalist organizations that had filed the case.

The case was filed as a result of documents that were published via the American whistleblower Edward Snowden. This contained a lot of information about the activities of the British intelligence services.

The court ruled that intelligence services are allowed to collect private information on a large scale, but that there was too little oversight.


In addition, too little attention was paid to protecting confidential information of journalists. There were not enough guarantees to ensure that this information was kept safe.

On another point, the complainants did not get what they wanted. According to the court there was nothing wrong with the information exchange with other countries.

British spooks breached citizens’ right to privacy: here.

PRIVATE DATA from human rights organisation Privacy International (PI) was captured and read by Britain’s intelligence agencies, MI5 admitted yesterday. MI5 said the data was collected as part of its Bulk Communications Data (BCD) and Bulk Personal Datasets (BPD) programmes, which “hoover up” public information: here.

Torture victims unlawfully excluded by Home Office‘s new definition, High Court hears, by Sam Tobin in London.

Trump’s Big Bother anti-immigrant witch-hunt

This video from the USA says about itself:

ICE Teams Up With Big Brother

7 June 2018

ICE is watching you. Ana Kasparian, Kim Horcher, and Mark Thompson, hosts of The Young Turks, break it down.

“The U.S. Immigration and Customs Enforcement (ICE) agency has signed a $2.4 million contract with a little-known surveillance company that mines communications data and provides “real-time” tracking.

Data published on the U.S. government’s spending website shows the Department of Homeland Security contracted Pen-Link Ltd. (PenLink), a software company that develops communications surveillance collection systems, on June 4 with ICE listed as the contracting subagency.

PenLink provides software that allows enforcement bodies to collect and analyze “massive amounts of social media and internet communications data”, as well as collect wiretap intercepts “in real-time” for “tracking” and “live monitoring”, according to its website.

Julian Sanchez, a privacy and surveillance expert with the Cato Institute, said the company appears to specialize in telephone data analysis and geolocation data mining and tracking that could potentially determine where people are “within a block” of a cell tower.”

Read more here.

On Tuesday, some 200 agents from US Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) carried out Gestapo-style raids on two workplaces in northern Ohio. The heavily armed border agents arrested 114 people, including children and US citizens. Shocked and outraged co-workers shouted at the border police to let the arrested workers go, to no avail. By a single act of mass terror, the US government shattered the lives of hundreds of parents, children, spouses and siblings: here.

‘Mark Zuckerberg Hospital should be renamed’

This video says about itself:

Edward Snowden on the Importance of Privacy (11/10/2016)

Edward Snowden Q&A session on 11/10/2016, days after the 2016 election.

Here Snowden provides the perfect response to people who scoff at the issue of the invasive NSA surveillance we are subjected to in the United States. He describes how “privacy is not about something to hide, it’s about something to protect”. He describes privacy as being “the right to the self” and “the right to a free mind. He stresses the importance of individuals being able to explore ideas without the fear of judgement from the external society.

Another video used to say about itself:

Snowden’s Message on Facebook’s data leak scandal with Cambridge Analytica

23 March 2018

Whistleblower Edward Snowden speaks on Facebook’s data leak scandal with Cambridge Analytica within his recent interview on March 11, 2018. Snowden gives realistic understanding on the format of using user’s data by social networks, such as Facebook. So Snowden technically joined the #DELETEFACEBOOK movement.

From Business Insider:

Angry nurses want Mark Zuckerberg’s name removed from a San Francisco hospital

Rob Price

15 May 2018

Nurses at Zuckerberg San Francisco General Hospital are protesting having the Facebook founder’s name attached to the institution.

They’re concerned about Facebook’s privacy practices and worried that patients will associate the hospital with the social-networking company’s recent scandals.

One suggestion? Re-naming the hospital after José Sarria, a legendary San Francisco LGBTQ civil rights activist and drag queen.

With Facebook under scrutiny for its privacy practices, some nurses in San Francisco want to remove the name of the company’s founder from a local public hospital.

The nurses, many of whom work for the Priscilla Chan and Mark Zuckerberg San Francisco General Hospital And Trauma Center – commonly referred to as just the Zuckerberg San Francisco General Hospital – worry that patients will associate it with the social network and its recent scandal involving the leak of data to Cambridge Analytica. They’re also concerned about being connected with Zuckerberg and Facebook in light of some of the company’s ethically questionable practices in the past.

On Saturday, a small group of nurses staged a protest outside the hospital, taping over the word “Zuckerberg” on a sign.

“To give the name away to someone who has caused a great deal of harm in the world is entirely inappropriate”, nurse Sasha Cuttler told Business Insider.

The New York Times previously reported on the protest.

San Francisco General Hospital was renamed in 2015 after Zuckerberg and his wife, Dr. Priscilla Chan donated $75 million to the institution. The name change has aroused opposition since it was first announced.

A union that includes nursing employees from the hospital circulated a petition in 2015 urging the hospital allow city residents to have some say in the name. The petition noted that residents in 2008 had approved $887 million bond measure to support the hospital.

“Although Mr. Zuckerberg and Dr. Chan’s $75 million donation is appreciated and needed, we feel strongly that it is wrong to name the whole hospital for them”, the petition read.

Objections to using Zuckerberg’s name have been raised for years

The objections to the name have been reignited by the recent string of scandals for Facebook, particularly the one involving Cambridge Analytica. But they also reflect longstanding concerns about the company and its practices.

One thing the nurses pointed to was a 2015 study Facebook conducted in which its researchers manipulated users’ emotions without their knowledge or consent. That study was widely criticized after it became public, with many deeming it unethical.

The nurses are also worried that Facebook might use Zuckerberg’s relationship with the hospital to try to obtain data on its patients. They pointed to a CNBC report about how Facebook quietly tried to pursue data-sharing arrangements with other hospitals.

The CNBC report didn’t specifically cite any contact between the company and Zuckerberg San Francisco General Hospital. In a statement at the time, Facebook said the hospital data-sharing initiative didn’t progress past the “planning stage.”

“We are in charge of keeping our most vulnerable people private and protected … Now people wonder, ‘How much is my privacy protected at a hospital with that name on it?’” Heater Ali, an employee at Zuckerberg San Francisco General Hospital, told The New York Times.

One nurse thinks it should be renamed after an LGBTQ activist

But even some of the city’s political elite are starting to second-guess the decision to rename the hospital.

“Had we known what we know now, perhaps we wouldn’t have accepted the funds from Zuckerberg”, John Avalos, a former San Francisco supervisor, told The Times.

A Facebook spokesperson did not immediately respond to Business Insider’s request for comment.

The protesters don’t have a consensus pick for what the hospital should be named, if Zuckerberg’s name is removed. Instead, they believe San Francisco residents should get to choose a name in a citywide vote, Cuttler said.

Cuttler has a personal preference – José Sarria, an LGBTQ civil rights activist and drag queen. In 1961, Sarria, who went by the drag name “the Widow Norton”, became the first openly gay candidate to run for public office in the United States.

A Zuckerberg San Francisco General Hospital spokesperson did not immediately respond to Business Insider’s request for comment.

Anger that Zuckerberg discussion with European parliament is not public: here.

Tuesday’s appearance by Facebook CEO Mark Zuckerberg before European Parliament deputies revealed the close collaboration between European governments and intelligence agencies, and the American internet giant in censoring and monitoring the internet: here.

Mark Zuckerberg lost almost $16 billion of his personal fortune on Thursday, as Facebook posted one of the biggest one-day wipeouts in U.S. stock market history.

Zuckerberg Hospital Stuns Privately Insured Patients With Hefty Bills. January 7, 2019. By Alyssa Fisher.

Trump administration, more NSA spying

This video from the USA says about itself:

Trump Admin Puts Warrantless NSA Spying On Steroids

8 May 2018

The National Security Agency collected more than 530 million U.S. call records in 2017, representing a dramatic increase over the previous year.

According to an annual transparency report released Friday, the spy agency collected 534 million call records in 2017, more than three times the 151 million collected in 2016. The new statistics were first reported by Reuters.

The report, released Friday by the Office of the Director of National Intelligence, is mandated by the USA Freedom Act passed by Congress in 2015 that aimed to restrict and boost oversight of the spy agency’s surveillance program.

Read more here.

US House votes down amendment to block NSA collection of the personal communications of American citizens: here.

Leading Democrats forced a bipartisan bill onto the House floor that approves the continued spying on US citizens in violation of fundamental democratic rights: here.

New Facebook privacy scandal

This video says about itself:

Snowden’s Message on Facebook’s data leak scandal with Cambridge Analytica

23 March 2018

Whistleblower Edward Snowden speaks on Facebook’s data leak scandal with Cambridge Analytica within his recent interview on March 11, 2018. Snowden gives realistic understanding on the format of using user’s data by social networks, such as Facebook. So Snowden technically joined the #DELETEFACEBOOK movement.

From daily The Morning Star in Britain:

Tuesday, March 27, 2018

United States Facebook accused of harvesting Android users’ data

FACEBOOK faced new questions today about collecting phone numbers and text messages from Android devices.

The revelations are embarrassing following the US-based internet giant’s apologies in US and British newspapers for exposing users’ data to Cambridge Analytica, a consultancy firm which worked with the Donald Trump campaign in the US …

The website Ars Technica reports that Android users who checked data gathered by Facebook on them found that it had years of contact names, numbers, call lengths and text recipients.

Messages were left on Sunday seeking comment about security from Google officials, who make the Android operating system.

Reports of the data collection came as Facebook CEO Mark Zuckerberg took out ads in multiple US and British Sunday newspapers to apologise for the Cambridge Analytica scandal.

The ads say the social media platform doesn’t deserve to hold personal information if it can’t protect it.

According to the ads, a quiz app built by a Cambridge University researcher leaked Facebook data of millions of people four years ago.

Cambridge Analytica got the data from a researcher who paid 270,000 Facebook users to complete a psychological profile quiz in 2014. But the quiz gathered information on their friends as well, bringing the total number of people affected to about 50 million.

The Trump campaign paid the firm $6 million (£4.2m) during the 2016 election.

Why Facebook’s scandals won’t go away.

Why people are staying on Facebook despite it’s obvious awfulness.

Britain: Police ‘hoovering up’ personal data from innocent’s mobile phones: here.

Young people don’t want to become spies

This video says about itself:

Welcome to Haven: Snowden launches spy-blocking smart phone app

26 December 2017

A new app developed by NSA whistleblower Edward Snowden promises to harness the surveillance power of your smart phone and turn it into a tiny security system to physically guard your data. Read more here.

Translated from Dutch NOS radio today:

For the British intelligence service GCHQ finds it more and more difficult to recruit staff, because well-trained cyberspecialists more often opt for better paid jobs at tech giants like Facebook and Google. They pay up to five times more than the government, according to a study by a British parliamentary committee.

The GCHQ (Government Communications Headquarters) says they need more and more staff …

The staff shortage among cyberspecialists at the GHCQ is around 20 percent. In 2016, 51 experts worked at the service and by 2018, according to the service, they should be 110. …

The intelligence services in the Netherlands also find it difficult to find staff. The military spying service MIVD also said early this year that a lot of young talent chooses to work in business.

“After all the revelations by, for example, Snowden, which exposed secret spying activities of the American intelligence service NSA, many cyberspecialists in training have their reservations about being hired by national intelligence services. Do I really want to work for such an organization? they think”, says [Delft university cybersecurity professor] Van Eeten in the NOS Radio 1 news.

British, Dutch governments spying on citizens

This 2014 video is called NSA whistleblower Edward Snowden says UK surveillance law “defies belief” | Guardian Interview.

By Julian Vigo in Britain:

British and Dutch states challenged on snooping

Thursday 23rd November 2017

As Liberty in the UK and Sleepwet in the Netherlands challenge the extent of state surveillance, JULIAN VIGO calls for public advocacy and local activism to protect the rights of privacy

The UK’s new web spying rules are taking shape despite the legislation governing it, the Investigatory Powers Act (IPA), having become law late last year. There is so much left unresolved about what this Act represents.

For instance, the IPA, also known as the “snoopers’ charter”, represents a massive extension of the surveillance power of the state. It requires internet companies to keep customers’ web traffic history for 12 months.

It also gives spying agencies and police powers the ability to conduct the mass hacking of IT infrastructures, personal computers, smartphones and any electronic device.

Just a year ago, National Security Agency (NSA) whistleblower Edward Snowden labelled this as “the most extreme surveillance in the history of Western democracy. It goes further than many autocracies.”

So why are the British not reacting?

The Dutch are set to have a national referendum about similar mass-surveillance after opponents of this “dragnet law,” or Sleepwet, gained enough signatures to demand a public vote.

According to Dutch law the government must hold a non-binding referendum on any issue if the country’s voting commission receives 300,000 signatures in request of such a vote. The campaigners of Sleepwet got over 417,000 signatures of which, the commission said, 384,126 were valid.

The regulator recommended in October that the referendum should take place on March 21 in order to coincide with municipal elections.

In July of this year, the Dutch senate cleared the Intelligence and Security Agencies Act which is quite similar to the UK’s Investigatory Powers Act.

It expands the governments’ powers to monitor all the data which moves through the country’s internet infrastructure.

Like the IPA, this law would also grant the government broad device-hacking powers, which means, practically speaking, that the government would have the legal authority to hack an entire town if it so chooses.

The organisers of Sleepwet claim that they are not trying to abolish the law, but they insist that there needs to be a legal basis for any targeted surveillance and they worry about the infringement of the basic rights to privacy and security.

As in the UK, one of the major concerns is the “untargeted interception of cable traffic and automated analysis of that data, which is basically mass surveillance,” according to Nina Boelsums, one of the five university students who initiated the call for a referendum.

Boelsums also calls into the question the hacking of third parties which she calls “an incentive for the intelligence agencies to collect zero-day vulnerabilities,” adding, “security experts are worried that that will actually make us less secure.”

What this also means is that data from all personal social media accounts, banking details, online purchases, social media, and personal information (ie sexual preferences, where your children go to school, etc) will be accessible to the government.

Like Sleepwet in the Netherlands, Liberty in the United Kingdom received more than 200,000 signatures on a petition calling for the repeal of the IPA after it became law last year.

Liberty has launched a legal challenge against the British government and this summer received the go-ahead from the High Court to challenge part of the government’s extreme mass surveillance regime with a judicial review of the IPA.

While groups like Amnesty International have called for an end to such legislation in the UK, they have been equally active in the Netherlands where the referendum was welcomed as a victory, albeit temporary, over the mass surveillance of people who pose no threat to national security.

The outcomes of Liberty’s lawsuit in the UK and Sleepwet’s referendum in the Netherlands are yet to be seen. But it will take public advocacy and local activism if we are to protect the basic rights of privacy and freedom from surveillance.

Britain: Liberty battles to stop ‘illegal’ state snooping. Human Rights Group heads to High Court for landmark bid to halt ‘intrusive’ Investigatory Power Act: here.

Britain: The dangers of data collection. JULIAN VIGO assesses the importance of Liberty’s challenge to the government’s Investigatory Powers Act.

United States NSA-derived malware damaging Internet again

This video says about itself:

28 June 2017

The latest cyberattack has spread rapidly across the world, affecting banks, retailers and major energy firms. Experts say ransomware known as Petya appears to be behind the computer meltdown. And whistleblower Edward Snowden says the US government [the NSA] developed the sophisticated hacking tools that are being used in this attack. Sara Firth reports.

By Kevin Reed:

Petya ransomware attack shuts down computers in 65 countries

29 June 2017

In the second massive cyberattack in 44 days, both originating from malicious software developed by the US National Security Agency, personal computers in at least 65 countries were shut down Tuesday by an epidemic of ransomware known as Petya.

The attack had its greatest impact and first manifestation in Ukraine, where an estimated 12,500 computer systems were infected. Initial reports of the malware came when Ukrainian computer users attempted to update their copies of the tax and accounting software MeDoc. From there, the ransomware spread quickly all over the world, with major outages reported in Belgium, Brazil, Germany, Russia and the United States.

Among the corporations hit by the attack were the American pharmaceutical giant Merck, the British advertising agency WPP, the French multinational Saint-Gobain, the Russian steel and mining company Evraz and the Australian factory of the chocolate company Cadbury. In Ukraine, government ministries, ATMs and transit and airports systems were paralyzed and workers at the Chernobyl nuclear disaster site were forced to monitor radiation levels manually because their computers became inoperable.

In the US, Heritage Valley Health Systems, a Pennsylvania health care provider, was forced to cancel operations at its hospitals in Beaver and Sewickley due to the computer outage caused by Petya. According to some security experts, the latest ransomware attack represents a more sophisticated and lethal application of the malware than previously encountered.

The Petya ransomware causes computers to stop functioning and brings up a red screen with white letters that says the hard disks on the system have been encrypted with “military grade encryption.” The files on the system will be restored, the message explains, only in exchange for a payment of $300 in bitcoin electronic currency to a specified email address. It is not clear if making the ransom payment leads to the restoration of file access.

Once cybersecurity experts identified the email account, it was shut down.

The virus attacks Windows-based computers by taking advantage of the EternalBlue vulnerability. EternalBlue is known as an “exploit” or “bug” in the Windows operating system that can be used to cause unexpected behavior. Although Microsoft had released security updates to address the EternalBlue issue when they became aware of the problem last March, the latest attack is a “new variant” of Petya that can circumvent previous software patches.

Once a single system has been infected, the ransomware has the ability to move from computer to computer on a network without users doing anything. The Petya virus also has the ability to utilize unprotected machines to access networking features and infect machines that have been previously protected. Because of these innovations, some security experts are referring to the new ransomware as GoldenEye.

It is well known that the EternalBlue exploit was developed by the NSA as part of its arsenal of cyberwarfare weaponry for use against the rivals of US imperialism. Due to a combination of recklessness and stupidity, however, the NSA’s arsenal servers were hacked earlier this year and the tools were stolen by as-of-yet unidentified hackers.

In April, an Internet group known as Shadow Brokers published information about the NSA arsenal, including details about exploits that take advantage of vulnerabilities in enterprise firewalls, anti-virus products and Microsoft software.

The Petya attack comes less than two months after the outbreak in early May of the WannaCry ransomware, which spread around the world in a similar manner. In that instance, the malware shut down hundreds of thousands of computers in more than 150 countries.

So far, the NSA has not acknowledged any responsibility for the malware code that has now disrupted the economy in countless countries and endangered the lives of millions of people on two separate occasions. Computer security experts are coming forward in increasing numbers to demand that the NSA work with specialists to help defend computer systems from the destructive mayhem that the agency has unleashed upon society.

Mexican government uses malware to spy on journalists and political opponents: here.

WannaCry ransomware, ‘thank you’, NSA!

This 15 May 2017 video is about WannaCry ransomware and NSA whistleblower Edward Snowden.

By Andre Damon in the USA:

The global ransomware attack and the crimes of the US spy agencies

16 May 2017

Over the past four days, some 350,000 computers have been infected by the so-called “WannaCry” malware, including 70,000 devices such as MRI scanners, blood storage refrigerators and operating equipment used by Britain’s National Health Service. As a result of the attack, the NHS was forced to turn away emergency room patients and divert ambulances, potentially resulting in serious illnesses and even fatalities.

The worm is a piece of “ransomware” that encrypts users’ data until the creators receive a payment. It uses “exploits” developed by the US National Security Agency as just a small part of the NSA’s catalog of hacking tools.

When NSA researchers discovered the vulnerability in the Windows operating system targeted by “WannaCry,” they refused to inform Microsoft. The company found out about the existence of the vulnerability only shortly before the general public, when it was leaked by the Shadow Brokers hacker group on April 14 of this year.

On Saturday, Microsoft President Brad Smith, in a tersely worded blog post, faulted the NSA for failing to share its knowledge of the exploit. “This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem,” he wrote, adding that “this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today—nation-state action and organized criminal action.”

He concluded, “We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits.”

Microsoft is far from blameless when it comes to the NSA’s operations. It has established a standing practice of reporting bugs to the US government before they are repaired and publicly acknowledged, allowing the NSA to use these vulnerabilities to break into systems.

Regardless, Smith’s statement represents a stinging indictment of the operations of the US intelligence apparatus, implying that its actions are only once removed from those of criminals.

The hacking tools used in the “WannaCry” malware serve an even more malevolent purpose than any ransomware: illegal spying on the population of the whole world as part of a systematic practice of subversion and cyber aggression.

In May 2013, NSA contractor Edward Snowden revealed that the US intelligence apparatus collects, processes, reads and catalogs a vast quantity of private communications, both in the United States and internationally. Snowden explained that the stated aim of the NSA, the “signals intelligence” arm of the US intelligence apparatus, is unfettered access to all private information. Its mottos are, according to a leaked internal presentation, “Collect it All,” “Process it All,” “Exploit it All, “Sniff it All” and “Know it All.”

Illegal domestic surveillance operations authorized by the Bush administration after 9/11 resulted in the vastly expanded scale of government spying that was exposed by Snowden. With the collaboration, both voluntary and coerced, of the major telecommunications companies, the US government was able to vacuum up nearly all phone conversations, email and chat messages exchanged on digital devices.

In subsequent years, common communications platforms substantially improved their security capabilities, with nearly all Internet communication systems enabling encryption by default. These developments prompted US intelligence officials to complain of the Internet “going dark” to the NSA and CIA, prompting repeated calls by politicians, including Democratic presidential candidate Hillary Clinton, to criminalize the use of encryption.

The NSA responded by vastly expanding its use of “Tailored Access Operations,” the arm of the NSA devoted to “computer network exploitation,” commonly known as hacking. The agency adopted the slogan, “Your data is our data, your equipment is our equipment—anytime, any place.”

The NSA worked to build up a catalog of cyber weapons, known as “exploits,” which allow it to easily break into almost any Internet-connected device. One internal NSA document from 2012 claimed that the NSA worked with the largest telecommunications and technology companies in the world to “insert vulnerabilities into commercial encryption systems, IT systems, networks and endpoint communications devices used by targets.”

The NSA’s massive team of security researchers—the largest in the world—also worked to discover and exploit vulnerabilities within existing products, keeping these bugs a secret from manufacturers in order to allow the NSA to exploit them to gain access to computers, networks and Internet-connected devices before other researchers could discover them and recommend fixes to manufacturers.

In addition to using these tools to carry out mass surveillance, the NSA weaponized them in order to carry out cyberattacks against Washington’s geopolitical adversaries. The most notorious of these efforts was the release of the Stuxnet worm in 2010, which ruined some 1,000 Iranian nuclear centrifuges. The cyberattack was coordinated with a series of car bomb murders, attributed by the media to the US and Israel, which killed at least three Iranian nuclear physicists.

The fact that over 70 percent of the initially reported “WannaCry” infections took place in Russia raises the very real possibility that the current disaster is the result of a Stuxnet-like cyberattack by the United States. The other country disproportionately affected was China.

Speaking in Beijing on Monday, Russian President Vladimir Putin said, “As for the source of these threats, Microsoft’s leadership stated this directly. They said the source of the virus was the special services of the United States.”

White House Homeland Security adviser Tom Bossert declared that finding those responsible for cyberattacks is “something that sometimes eludes us. Attribution can be difficult here.”

Bossert’s statement contrasts sharply with the declaration by the director of national intelligence in October 2016 that the US spy agencies were “confident that the Russian Government directed… recent compromises” of emails related to the Clinton campaign.

That declaration was part of a vast campaign by the Democratic Party, the media and much of the political establishment aimed at demonizing Russia by claiming it had “hacked” the 2016 US elections. As part of that campaign, media outlets, led by the New York Times, sought to present Russia as a global hacking powerhouse, subverting the spotless US electoral system.

One can only imagine what would have happened if, instead of the current malware attack mainly affecting Russia and largely bypassing the US in its initial stages, the situation had been reversed. The media would be up in arms about Russian “hackers,” with demands that the Trump administration retaliate with sanctions, cyberattacks and more menacing military moves. The Democrats would be in the forefront of calls for new war-mongering resolutions in Congress.

An examination of the facts exposed by the “WannaCry” attack, however, show that the world’s biggest band of cyber criminals by far is headquartered in Washington, D.C.

The cyberattack that hit some 200,000 computers around the world last Friday, apparently using malicious software developed by the US National Security Agency, is only expected to escalate and spread with the start of the new workweek: here.

What accounts for the success of the WannaCrypt ransomware attack on Britain’s National Health Service? Here.