Posts

Elmo’s Forced Marriage

I feel like a lot of the commentary about Elon Musk’s purchase of Twitter — which includes a great deal of Kremlinology about what Elmo says on Twitter — has forgotten how we got here.

Elmo entered what is effectively a forced marriage.

Consider this dramatic reenactment:

Twitter: Hey, Elon, can you come help build value in our platform? Jack said it’d be a good idea.

Elmo: It’s a deal!

Twitter: Oh wait, we have to do due diligence on you first.

Elmo: Fuck that. I’m buying you all out. Twitter sucks!!!

Twitter: Okaaayyyy… If you want to buy us without yourself doing due diligence, you got it.

Elmo: But wait! Bots! Twitter sucks!!!

Twitter: You said no due diligence.

Elmo: Deal is off! Bots! Twitter sucks!!

Twitter: See you in court.

Twitter: Huh. These emails you sent are really interesting. We really look forward to the deposition and trial.

Elmo: Uh … uh … uh, alright then, the deal is back on.

At this point, a week into Elmo’s ownership, it’s unclear whether he went through with the purchase because he really wanted to buy the joint, or because in the face of exposure in the spring (in the form of due diligence), and last month (in the form of a deposition and trial), he kept doubling down, effectively dodging scrutiny of his own suitability to run Twitter by throwing money at it, $44 billion instead of the billion he’d have to pay to back out of the deal. And for much of that time, Elmo responded to Twitter’s scrutiny by attacking the company.

Thus far, it seems clear that Elmo is not suitable to run Twitter.

If he were merely the richest man in the world and not instead a billionaire whose wealth is heavily invested in an existing company that is subject to the whim of the market, a company the value of which has been damaged by Elmo’s Twitter tantrum — if he were spending his own money on the purchase — it might have ended there. But to pull off the purchase, he added a bunch of new debt to a company already reeling under its existing debt load, making the dire financial situation of Twitter even worse, in the middle of a tech downturn.

To make matters still worse, the entire world knows that the richest man in the world just made one of the worst deals in history, buying a company worth maybe $20 billion — a company whose own worth he spent months diminishing — for $44 billion.

It’s got to rankle a thin-skinned egotist like Elmo, knowing that all the pinheads he attacked at the beginning of this process just watched him get utterly fleeced in a business deal.

The richest man in the world just got his ass handed to him, and in his first act after consummating this forced marriage, he fired the people who handed him his ass in such a way that Elmo will either have to pay severance or settle lawsuits for the way he fired them.

And that’s reason why I think people are investing far too much faith in what Elmo is saying on Twitter. Is he saying what he’s saying because he’s testing out an affirmative business plan? Or is he saying what he’s saying because he loathes many of the most prominent people on Twitter, who all told him he was wrong and just watched him make an epically bad business deal, but he nevertheless needs to con enough advertisers and funders and Twitter members in the interim to stave off further personal losses on the company?

One of his first instincts was to prove those pinheads wrong about disinformation by embracing conspiracy theories about the attempted kidnapping of Nancy Pelosi.

After deleting that with no acknowledgment of how stupid the tweet was, Elmo laughed it off by calling the NYT fake news, something that may have salved his ego but surely made advertisers even more wary of continuing to spend money with him.

Since then, Elmo has turned to making it look like There Is a Plan to charge for Twitter.

Elmo would later admit that verification would be replaced with notice of someone’s stature, akin to what is currently used by politicians. This exchange — getting put in his place by the creator of great horrors — really amounted to Elmo announcing the roll-out of the Twitter Blue program that he and Jack Dorsey talked about last spring.

Even in spite of getting rebuked by Stephen King, Elmo kept pitching the pay service — to the people he needs to keep on Twitter to retain its value — as a solution to problems other than that Twitter is over-leveraged.

In the process of his serial attempts to claim that forcing users to pay for what is free now, Elmo repeatedly revealed he either doesn’t understand or doesn’t much care about what brings value to Twitter, the free content from people like Stephen King. Similarly, he repeatedly claimed that his efforts to monetize Twitter were instead efforts to address things that the pinheads value, disinformation, and things he used to attack Twitter when trying to back out of the deal, the bots.

He has not admitted that the cost of Twitter Blue would now have to pay for his epically shitty business deal, on top of what it would have paid for in April, before he started his six month tantrum. How much of an $8 monthly fee amounts to bailing Elmo out of a deal that everyone knows was epically stupid?

Elmo’s top advisors aren’t any better. Here, David Sacks took a break from apologizing for Putin to ask why Jeff Bezos and other billionaires don’t give away the content that their own employees create for free, apparently not understanding that Twitter’s employees don’t create the content on offer.

All the while, both these inapt advisors and Elmo himself keep boasting as if they’re not the ones who just got their asses handed to them in a business deal.

I don’t know how this is going to go — other than downhill. Once I paint my walls I’ll start building up my presence at @[email protected]. I’ve got an account at CounterSocial but for now I’m focusing on Mastodon. I hope and expect alternatives to both will be rushed out to fill the role Twitter once did.

Until then, though, I think Elmo’s serial meltdown on Twitter is better explained by his discomfort in a new role, in which he needs to convince ordinary people and security-conscious celebrities to stay, rather than persuading venture capitalists and captive tech journalists of the brilliance of his grandiose ideas, all while trying to snooker everyone into believing that the pay system will address the problems with Twitter rather than the problems built into Elmo’s purchase of Twitter.

Elmo loathes precisely the people he needs most right now, and he loathes them, in part, because they just saw him make an epically shitty business deal, a deal so epically shitty, in part, because Elmo wanted to prevent anyone from looking at him too closely. His response to that is to invite their complaints, so long as they pay $8 to make them.

It’s a con, but for some reason Elmo thinks the people who just saw him get fleeced will fall for it.

Update: One thing I didn’t provide enough focus on in this is that — as Drew in Bronx notes — Elmo really didn’t have a choice just to pay $1 billion to get out of the deal because his other DE-based property (eg, in Tesla) could have been used to fulfill his obligations. Once he was convinced he would lose at trial, he was stuck.

I agree this is a forced marriage. But to be clear, there was absolutely no way that Musk was going to get out of it once he signed the contract. Delaware Chancery Court is its own special thing, and Musk got outlawyered at the outset because of his own impulsiveness. The (chief) Chancellor in Delaware is brilliant & tough and has no pity for white shoe law firms having to work long hours on short schedules. Also, since Tesla is a Delaware corporation, once a judgement was entered, if it wasn’t honored she would simply seize Musk’s shares in Tesla to satisfy it-no recourse for Elmo.

Update: This account of how dysfunctional Twitter has been since Elmo took over is worth reading in full, especially the description of “psychological warfare” in lieu of management.

One Blind post from a Twitter worker, viewed by The Post on Wednesday, said simply, “This level of silent treatment is totally unprofessional.” Another Twitter employee replied, “It’s not silent treatment it is psychological warfare.”

Once Again Trump’s Self-Victimhood Distracts from His Negligence

It will be the subject of extensive discussion going forward how plans for an insurrection made in plain sight on social media went from being viewed, by the FBI and DHS, as First Amendment protected speech to so dangerous that social media shut down key influencer accounts and Apple and Google kicked entire platforms out of their stores within days. But that’s what happened.

On Thursday, a various law enforcement agencies tried to explain why they had allowed the Capitol to be overrun by terrorists, they claimed not to have seen the signs many of us were seeing of plans for violence.

Federal and local officials said Thursday they did not have intelligence suggesting any violent mob was preparing to attack the Capitol, even as demonstrators were publicly saying on social media they were not planning a typical protest.

Despite weeks of preparations, “obviously, what happened no one anticipated,” Michael Sherwin, acting US Attorney for the District of Columbia, told reporters in a telephone press conference Thursday. “Things could have been done better.”

[snip]

Police were caught flat-footed the next day. DC Police Chief Robert Contee told reporters Thursday there was no intelligence that suggested there would be a breach of the US Capitol on January 6. Three DHS sources, who usually receive such reports, were unaware of a threat assessment being shared from the DHS intelligence office ahead of Wednesday’s siege.

But just over a day later, Apple announced that it was giving Parler 24 hours to come into compliance with its moderations guidelines; Google just removed Parler from its stores entirely. Twitter first removed various QAnon supporters, including Sidney Powell and Mike Flynn. Then, finally, after allowing him to Tweet twice after a short-term ban, Twitter announced it was removing Trump permanently and those social media platforms that hadn’t already done so removed Trump as well.

Trump spent the night trying to find workarounds, using the POTUS account, attempting to have one of his sons tweet out his content, and having his social media staffer tweet on his own account. Unless the Tweet included a presidential message, the content was removed.

In response, Trump, his supporters, and the usual commentariat have decried a purportedly authoritarian “censorship” of Donald Trump. Indeed, most of the discussion since then has focused on whether Twitter and other social media platforms acted appropriately.

That has, as has happened so many times in the last four years, distracted from Trump’s own refusal to act.

Here’s Twitter’s description of why it found that Trump had violated Twitter’s Glorification of Violence prohibition.

Overview

On January 8, 2021, President Donald J. Trump tweeted:

“The 75,000,000 great American Patriots who voted for me, AMERICA FIRST, and MAKE AMERICA GREAT AGAIN, will have a GIANT VOICE long into the future. They will not be disrespected or treated unfairly in any way, shape or form!!!”

Shortly thereafter, the President tweeted:

“To all of those who have asked, I will not be going to the Inauguration on January 20th.”

Due to the ongoing tensions in the United States, and an uptick in the global conversation in regards to the people who violently stormed the Capitol on January 6, 2021, these two Tweets must be read in the context of broader events in the country and the ways in which the President’s statements can be mobilized by different audiences, including to incite violence, as well as in the context of the pattern of behavior from this account in recent weeks. After assessing the language in these Tweets against our Glorification of Violence policy, we have determined that these Tweets are in violation of the Glorification of Violence Policy and the user @realDonaldTrump should be immediately permanently suspended from the service.

Assessment

We assessed the two Tweets referenced above under our Glorification of Violence policy, which aims to prevent the glorification of violence that could inspire others to replicate violent acts and determined that they were highly likely to encourage and inspire people to replicate the criminal acts that took place at the U.S. Capitol on January 6, 2021.

This determination is based on a number of factors, including:

  • President Trump’s statement that he will not be attending the Inauguration is being received by a number of his supporters as further confirmation that the election was not legitimate and is seen as him disavowing his previous claim made via two Tweets (1, 2) by his Deputy Chief of Staff, Dan Scavino, that there would be an “orderly transition” on January 20th.
  • The second Tweet may also serve as encouragement to those potentially considering violent acts that the Inauguration would be a “safe” target, as he will not be attending.
  • The use of the words “American Patriots” to describe some of his supporters is also being interpreted as support for those committing violent acts at the US Capitol.
  • The mention of his supporters having a “GIANT VOICE long into the future” and that “They will not be disrespected or treated unfairly in any way, shape or form!!!” is being interpreted as further indication that President Trump does not plan to facilitate an “orderly transition” and instead that he plans to continue to support, empower, and shield those who believe he won the election.
  • Plans for future armed protests have already begun proliferating on and off-Twitter, including a proposed secondary attack on the US Capitol and state capitol buildings on January 17, 2021.

As such, our determination is that the two Tweets above are likely to inspire others to replicate the violent acts that took place on January 6, 2021, and that there are multiple indicators that they are being received and understood as encouragement to do so.

Effectively, Twitter is saying that these Tweets have been exploited by the terrorists supporting Trump as support for further violence. It specifically described plans, being made both on and off Twitter, for a follow-on attack no January 17 (apparently because Q is the 17th letter in the alphabet).

Twitter is not actually arguing that Trump intended to incite violence. Rather, they’re saying that his Tweets are being interpreted as encouragement of more violence that is already being actively planned, regardless of what Trump actually meant by it.

Now, maybe Trump didn’t intend that to be the effect, though Twitter makes a fair point that both the reference to a “GIANT VOICE” in the future — one that may depend on further terrorism — and the formal announcement that the inauguration could be targeted without endangering Trump himself might be seen as inviting more violence.

But if he didn’t mean to do so, the proper response of any marginally responsible adult would be to say, “Golly, I didn’t realize how my own words were being used in ways I didn’t intend. Let me take the next few weeks off to cool off, or better yet, let me find other ways to correct any misinterpretation that I supported violence.” The appropriate response for the Commander in Chief would be to say, “Wow, that was a totally unprecedented attack on our Capitol the other day, I’m deploying all the resources of the Federal government to ensure these planned follow-up attacks will not take place.”

Have you noticed that Trump hasn’t actually said he has ordered the government to prevent further violence?

That’s all the more alarming, given that US law enforcement agencies increasingly share intelligence with the social media platforms, which suggests that Twitter’s reference to “a number of factors” doesn’t rule out specific intelligence about follow-on plans that aren’t visible on social media.

Twitter said, tucked away there in a fifth bullet, that one of the reasons they (and presumably Facebook and Apple and Google and everyone else) acted is because there are specific plans for future terrorist attacks.

And instead of talking about the fact that the man who remains President is doing nothing to prevent those follow-on attacks, we’re talking about what a victim he is.

Not All Influencers Are Celebrities on YouTube

[NB: Note the byline. ~Rayne]

There’s something hinky going on with news curation in Twitter. The story at the top of the Moments/Trends yesterday in the mobile app was this one:

We now know the GOP anticipated additional accusers when the story above was published. This morning the story at the top of Twitter’s mobile U.S. news feed is this one:

Which seems really odd that both of these stories push the White House/GOP angle promoting the troubled nomination of Brett Kavanaugh by attacking accuser Christine Blasey Ford’s credibility.*

Meanwhile, the New Yorker story by Jane Mayer and Ronan Farrow about a second victim alleging an assault by Kavanaugh published last evening set Twitter timelines ablaze immediately and overnight. Yet that story isn’t the one at the top of Twitter’s US News this morning.

Is this an example of poor or biased curation by Twitter? Or is this the effect of a public relations campaign (by a firm like CRC for which Ed Whelan has worked) paying to promote a news article without any indication to the public that this elevation has happened?

Would such a PR-elevated piece written by a news outlet ever fall under the scrutiny of the Federal Trade Commission as YouTube influencers’ embedded promotions have recently? Or would it slip by without the public’s awareness because it’s First Amendment-protected content?

The Federal Communications Commission won’t want to touch this subject because its chair Ajit Pai won’t want to open up a can of worms about the internet and its content as a regulated commodity like broadcast radio and television.

The Federal Election Commission hasn’t looked at news-as-campaign-ads when such content is produced in the U.S. related to an unelected/appointed official position.

Google News is a little better this morning:

Note the position of the New Yorker piece in the feed. But it’s not clear how any of the news related to Kavanaugh surfaces to the top of Google’s news feed due to a lack of transparency let alone a particular story. The public doesn’t know if there have been any attempts to manipulate the elevation/submersion of a news story favorable/unfavorable to any subject including unelected/appointed officials.

As a majority of Americans increasingly obtain their news online instead of by broadcast or print media, we’re going to need more clarity about social media’s role as a publishing platform and whether social media giants are still being used to manipulate public opinion.

__________

* First image is the expanded version as I didn’t realize at time of screenshot there would be a relationship between top of Twitter news feed on September 23 and this morning’s top of news feed. All images in this story are used under Fair Use for purposes of media criticism

Parkland and the Twittered Revolt

Marvel at the teen survivors of the mass shooting at Marjory Stoneham Douglas High School in Parkland, Florida. Their composed rage is terrifying to a generation or two which have not seen the like since the 1960s and early 1970s. They are leading a revolution — but note the platform they’re using to best effect.


I can’t tell you how much use they are making of Facebook as I haven’t used it in several years. What I find telling is the dearth of links to students’ and followers’ Facebook posts tweeted into my timeline. I also note at least one MSD student exited Facebook after receiving death threats.

Twitter’s platform allows the authenticity and immediacy of the students’ communications, as easy to use as texting. There’s no filter. For whatever reason, parents haven’t taken to Twitter as they did Facebook, leaving the micro-blogging platform a space without as much adult oversight.

These attributes terrify the right-wing. There’s nothing limiting the reach of students’ messages — no algorithms slow their tweets. The ability to communicate bluntly, efficiently, and yet with grace has further thrown the right. The right-wing’s inability to accept these students as legitimately speaking for themselves and for their fellow students across the country is an expression of the right’s cognitive dissonance.

The students’ use of Twitter redeems the platform, asserting its true value. It’s 180 degrees from the problems Twitter posed as a toxic cesspool filled with trolls and bots. Parkland’s tragedy exposes what Twitter should be, what Twitter must do to ensure it doesn’t backslide.

Minors shouldn’t have to put up with bullying — especially bullying by adults. Donnie Trump Jr. is one of the worst examples of this bullying and should be booted out of the platform. Other adult bullies have also emerged but Twitter’s user base is ruthless in its swiftness, dealing a coup de grâce to Laura Ingraham’s sponsorships.

If only Twitter itself was as swift in ejecting bullies and trolls. Troll bots continue to flourish even after a large number were removed recently. Victims of tragedies should expect an ethical social media platform to eliminate trolls and bots promptly along with bullies.

Ethical social media platforms also need to ask themselves whether they want to make profit off products intended to maim and kill. Should it allow certain businesses to use promoted tweets to promote deadly products, or allow accounts for lobbying organizations representing weapons manufacturers as well as owners? Should Twitter remove the NRA just as it doesn’t permit accounts representing tobacco products?

Not to mention avoiding Facebook’s ethical crisis — should Twitter be more proactive in protecting its users now that Parkland’s Marjory Stoneham Douglas High School students have revitalized its brand?

The Gizmo™: Correlation Doesn’t Equal Adversary Nation

For days, reporters have been mis-using The Gizmo™ (the name I use for the “disinformation dashboard” from the German Marshall Fund, a black box that purports to show “Russian propaganda efforts on Twitter in near-real time”) to claim that Russian-linked accounts are pushing the #ReleaseTheMemo campaign calling for the public release of Devin Nunes’ politicized memo attacking the FBI.

As the effort lead by some Republicans to curtail special counsel Robert S. Mueller III’s investigation into the election meddling has heated up, Russian-linked accounts helped amplify a Twitter hashtag calling for the release of a memo the group hopes will help discredit Mueller’s work, according to Hamilton 68, a research firm that tracks the malicious accounts. The #releasethememo hashtag was tweeted by these accounts nearly 4,000 times in the last couple of days, the firm said.

As always with such reporting, the articles don’t provide even the nuance the project’s most responsible contributor, JM Berger, lays out on their methodology page.

  1. Not all content in this network is “created” by Russia. A significant amount—probably a majority—of content is created by third parties and then amplified by the network because it is relevant to Russian messaging themes.
  2. Not all content amplified by this network is pro-Russian. The network frequently mobilizes to criticize or attack individuals or news reports that it wishes to discredit.
  3. Because of the two points above, we emphasize it is NOT CORRECT to describe sites linked by this network as Russian propaganda sites. We are not claiming that content producers linked by this network are Russian propaganda sites. Rather, content linked by this network is RELEVANT to Russian messaging themes.

Such reports certainly don’t consider the validity of drawing conclusions from such analysis that the authors have refused to have vetted by a third party. What does it mean to openly profess to be pro-Russian, for example? Do non-consensus views on Syria or Ukraine count? Does skepticism about Russian involvement in the election count?

And the reports don’t note the serial false positives, such as the time Jim Lankford used The Gizmo™ to claim Russia was stoking tensions around NFL players taking a knee during the anthem. More responsible analysis showed that,

[B]oth #TakeAKnee and #BoycottNFL were genuinely viral movements, generating high volumes of traffic from large numbers of accounts, but both received an additional boost from bots.

The bots which amplified #TakeAKnee were primarily non-political; they appear to be bots for hire, repurposed to amplify specific posts. Of these, the most significant group is that which retweeted @DianneLogic, given its previous use in online harassment campaigns in the context of Russia and the far right. However, the evidence of its prior behavior is suggestive but not conclusive. It cannot be taken as proving Senator Lankford’s claim.

The accounts which amplifed #BoycottNFL are a different breed. They are largely cyborgs, rather than bots, posting authored content in between slews of retweets. They are also political, rather than commercial. Their sole purpose appears to be boosting far-right American posts.

In both cases, the bots were functionally anonymous, providing no verifiable information on the identity of the user behind them. There is thus no independent information which would allow us to say definitively whether they were American, linked somehow to Russia, or managed from another country entirely.

In short, in spite of this thing being shown to measure something entirely different from what reporters continue to report — correlated traffic (and that, based on unpublished criteria) rather than causal traffic — nevertheless Russia got credit for a campaign clearly driven by right wing Americans backed by a far more extensive propaganda infrastructure.

And then, even as Twitter started leaking initial analysis saying just that — that Russia wasn’t to blame …

[A] knowledgeable source says that Twitter’s internal analysis has thus far found that authentic American accounts, and not Russian imposters or automated bots, are driving #ReleaseTheMemo. There are no preliminary indications that the Twitter activity either driving the hashtag or engaging with it is either predominantly Russian.

In short, according to this source, who would not speak to The Daily Beast for attribution, the retweets are coming from inside the country.

… Two members of Congress from California, Adam Schiff and Dianne Feinstein, called on two California companies, Twitter and Facebook, to confess further manipulation by Russia.

We understand Facebook and Twitter have developed significant expertise in identifying inauthentic and malicious accounts.  Further, your forensic investigations into Russian government exploitation of your platforms during the 2016 U.S. election have helped expose to the American public the vast extent of Russia’s covert influence efforts. We therefore request that your companies conduct an in-depth forensic examination of this real-time activity on your platforms to determine:

  1. Whether and how many accounts linked to Russian influence operations are involved in this campaign;
  2. The frequency and volume of their postings on this topic; and
  3. How many legitimate Twitter and Facebook account holders have been exposed to this campaign.

Given the urgency of this matter, we ask that you provide a public report to Congress and the American public by January 26, 2018.  In addition, we urge your companies to immediately take necessary steps to expose and deactivate accounts involved in this influence operation that violate your respective user policies.

Nothing in this letter explains why Facebook should have to do this work, as The Gizmo™, the sole piece of evidence Schiff and Feinstein rely on, doesn’t track Facebook.

But even the demand to Twitter was based on yet another misreading of what The Gizmo™ actually measures. And, having never asked The Gizmo™ to explain the methodology behind its serial panics, a Senator representing both Facebook and Twitter demanded that they check its work, rather than vice versa.

If I were a forewoman in a Russian troll factory, there would be no easier way to boost my career prospects than to use a few of my bots to manipulate The Gizmo™’s sloppy methodology to claim credit for an obviously American-generated hoax. “Ивана! Давайте претендовать на последнюю республиканскую пропаганду!” Doing so would set off a self-fulfilling prophecy, precisely the kind of thing The Gizmo™’s authors claim to want to prevent, boosting Russia’s ability to sow discord with virtually no effort.

10 Years of emptywheel: Key Non-Surveillance Posts 2016-2017

Happy Birthday to me! To us! To the emptywheel community!

On December 3, 2007, emptywheel first posted as a distinct website. That makes us, me, we, ten today.

To celebrate, over the next few days, the emptywheel team will be sharing some of our favorite work from the last decade. I’ll be doing probably 3 posts featuring some of my most important or — in my opinion — resilient non-surveillance posts, plus a separate post bringing together some of my most important surveillance work. I think everyone else is teeing up their favorites, too.

Putting together these posts has been a remarkable experience to see where we’ve been and the breadth of what we’ve covered, on top of mainstays like surveillance. I’m really proud of the work I’ve done, and proud of the community we’ve maintained over the years.

For years, we’ve done this content ad free, relying on donations and me doing freelance work for others to fund the stuff you read here. I would make far more if I worked for some free-standing outlet, but I wouldn’t be able to do the weedy, iterative work that I do here, which would amount to not being able to do my best work.

If you’ve found this work valuable — if you’d like to ensure it remains available for the next ten years — please consider supporting the site.

2016

Why Doesn’t Dianne Feinstein Want to Prevent Murders Like those Robert Dear Committed?

I’ve written a lot about how the focus on Islamic terrorism, based on a claim it’s foreign, creates gross inequalities for Muslims in this country, and does nothing to address some of our most dangerous mass killers (as the Stephen Paddock massacre in Las Vegas makes all too clear). This post is one of that series. It focuses on how the ill-advised efforts to use the No Fly List to create a list of those who couldn’t own guns would be discriminatory and wouldn’t add much to safety.

“Only Facts Matter:” Jim Comey Is Not the Master Bureaucrat of Integrity His PR Sells Him As

From the periods when Jim Comey was universally revered as a boy scout through those when Democrats blamed him for giving us Trump (through the time Democrats predictably flip flopped on that point), I have consistently pointed to a more complicated story, particularly with regards to surveillance and torture. I think the lesson of Comey isn’t so much he’s a bad person — it’s that he’s human, and no human fits into the Manichean world of good guys and bad guys that he viewed justice through.

NSA and CIA Hacked Enrique Peña Nieto before the 2012 Election

As Americans came to grips with the fact that Russia had hacked Democrats to influence last year’s election, many people forgot that the US does the same. And it’s not even just in the bad old days of Allen Dulles. The Snowden documents revealed that NSA and CIA hacked Enrique Peña Nieto in the weeks before he was elected in 2012. The big difference is we don’t know what our spooks did with that information.

Why Is HPSCI’s Snowden Report So Inexcusably Shitty?

In 2016, HPSCI released its Devin Nunes-led investigation into Edward Snowden’s leaks. It was shitty. Really shitty.

Now that the HPSCI investigation into the Russian hack (which has not been subjected to the same limitations as the Snowden investigation was) has proven to be such a shit show, people should go back and review how shitty this review was (including its reliance on Mike Flynn’s inflammatory claims). There absolutely should have been a review of Snowden’s leaks. But this was worse than useless.

Look Closer to Home: Russian Propaganda Depends on the American Structure of Social Media

As people began to look at the role of fake news in the election, I noted that we can’t separate the propaganda that supported Trump from the concentrated platforms that that propaganda exploited. A year later, that’s a big part of what the Intelligence Committees have concluded.

The Evidence to Prove the Russian Hack

In this post I did a comprehensive review of what we knew last December about the proof Russia was behind the tampering in last year’s election.

Obama’s Response to Russia’s Hack: An Emphasis on America’s More Generalized Vulnerability

Last year, in a speech on the hack, Obama focused more on America’s vulnerability that made it possible for Russia to do so much damage than he did on attacking Putin. I think it’s a really important point, one I’ve returned to a lot in the last year.

The Shadow Brokers: “A Nice Little NSA You’ve Got Here; It’d Be a Shame If…”

In December, I did a review of all the posts Shadow Brokers had done and suggested he was engaged in a kind of hostage taking, threatening to dump more NSA tools unless the government met his demands. I was particularly interested in whether such threats were meant to prevent the US from taking more aggressive measures to retaliate against Russia for the hack.

2017

On “Fake News”

After getting into a bunch of Twitter wars over whether we’re at a unique moment with Fake News, I did this post, which I’ve often returned to.

How Hal Martin Stole 75% of NSA’s Hacking Tools: NSA Failed to Implement Required Security Fixes for Three Years after Snowden

The government apparently is still struggling to figure out how its hacking tools (both NSA and CIA) got stolen. I noted back in January that an IG report from 2016 showed that in the three years after Snowden, the IC hadn’t completed really basic things to make itself more safe from such theft.

The Doxing of Equation Group Hackers Raises Questions about the Legal Role of Nation-State Hackers

One thing Shadow Brokers did that Snowden and WikiLeaks, with its Vault 7 releases, have not is to reveal the identities of NSA’s own hackers. Like DOJ’s prosecution of nation-state hackers, I think this may pose problems for the US’ own hackers.

Reasons Why Dems Have Been Fucking Stupid on the Steele Dossier: a Long Essay

I believe Democrats have been ill-advised to focus their Russia energy on the Steele dossier, not least because there has been so much more useful reporting on the Russia hack that the Steele dossier only makes their case more vulnerable to attack. In any case, I continue to post this link, because I continue to have to explain the dossier’s problems.

Other Key Posts Threads

10 Years of emptywheel: Key Non-Surveillance Posts 2008-2010

10 Years of emptywheel: Key Non-Surveillance Posts 2011-2012

10 Years of emptywheel: Key Non-Surveillance Posts 2013-2015

Richard Burr’s Tacit Warning to Christopher Steele

I’m just now catching up to Richard Burr and Mark Warner’s press conference on the Russia investigation yesterday. I saw some folks questioning why they did the presser, which surprises me. The answer seems obvious. They did the presser to release and apply pressure from specific areas of the investigation. For example, Burr exonerated those involved in the Mayflower Hotel meetings on April 2016 and further argued that the GOP platform was not changed to let Russia off the hook for Ukraine (I think the latter conclusion, in any case, is correct; I’m less persuaded about the first). Warner used the presser to push for Facebook to release the ads sold to Russia.

A particularly instance of this — one that I believe has been misunderstood by those who’ve reported it thus far — pertains to the Steele dossier. Here’s what Burr said about it, working off of prepared remarks (meaning issuing this tacit warning was one purpose of the presser; after 16:00):

As it relates to the Steele dossier: unfortunately the committee has hit a wall. We have on several occasions made attempts to contact Mr. Steele, to meet with Mr. Steele, to include, personally, the Vice Chairman and myself as two individuals, of making that connection. Those offers have gone unaccepted. The committee cannot really decide the credibility of the dossier without understanding things like who paid for it? who are your sources and sub-sources? We’re investigating a very expansive Russian network of interference in US elections. And though we have been incredibly enlightened at our ability to rebuild backwards, the Steele dossier up to a certain date, getting past that point has been somewhat impossible. And I say this because I don’t think we’re going to find any intelligence products that unlock that key to pre-June of ’16. My hope is that Mr. Steele will make a decision to meet with either Mark and I or the committee or both, so that we can hear his side of it, versus for us to depict in our findings what his intent or what his actions were. And I say that to you but I also say that to Chris Steele.

People seem to interpret this to mean SSCI hasn’t been able to corroborate the dossier — a point on which Burr is ambiguous. He references intelligence products that might unlock secrets of the dossier, which might suggest the committee has found intelligence products from later in the process that either confirms or doesn’t the events as the dossier as produced.

More important, however, is his reference to June 2016. While it seems like Burr might be suggesting the committee has found no evidence on collusion dating to before that date, that would seem to be inconsistent with the committee having received information on Michael Cohen’s discussions of financial dealings from before June (though given Burr’s exoneration of the Mayflower attendees, he may deem the earlier activities to be inconclusive).

So it seems more likely Burr raised the June 2016, along with his question about how paid for the report, to suggest he has real questions about whether its findings served as a partisan effort to taint Trump, paid for by a still undisclosed Hillary backer.

If Christopher Steele won’t talk about what intelligence he had on Trump before the time when, in June 2016, he reported on Russia providing kompromat (though not, at that point, hacked emails) on Hillary to Trump’s team, Burr seems to be saying, then it will be far easier to question his motivations and the conclusions of the report. And frankly, given some of the details on the Steele dossier — especially Steele’s briefings to journalists and his claim that the customers for the brief never read it — Burr is right to question that.

In other words, one point of the presser, it seems to me, was for Burr to warn Steele that his dossier will not be treated as a credible piece of work unless and until the committee gets more details about the background to it.

Update: Apparently, Steele responded to Burr’s comments by informing the committee he is willing to meet with Burr and Warner.

Twitter Asked to Tell Reality Winner the FBI Had Obtained Her Social Media Activity

Last week, the Augusta Chronicle reported that the government had unsealed notice that it had obtained access to Reality Winner’s phone and social media metadata. Altogether, the government obtained metadata from her AT&T cell phone, two Google accounts, her Facebook and Instagram accounts, and her Twitter account. Of those providers, it appears that only Twitter asked to tell Winner the government had obtained that information. The government obtained the 2703(d) order on June 13. On June 26, Twitter asked the FBI to rescind the non-disclosure order. In response, FBI got a 180-day deadline on lifting the gag; then on August 31, the FBI asked the court to unseal the order for Twitter, as well as the other providers.

The applications all include this language on Winner’s use of Tor, and more details about using a thumb drive with a computer last November.

During the search of her home, agents found spiral-bound notebooks in which the defendant had written information about setting up a single-use “burner” email account, downloading the TOR darkweb browser at its highest security setting, and unlocking a cell phone to enable the removal and replacement of its SIM card. Agents also learned, and the defendant admitted, that the defendant had inserted a thumb drive into a classified computer in November 2016, while on active duty with the U.S. Air Force and holding a Top Secret/SCI clearance. The defendant claimed to have thrown the thumb drive away in November 2016, and agents have not located the thumb drive.

Given that the FBI applied for and eventually unsealed the orders in all these cases, it provides a good way to compare what the FBI asks for from each provider — which gives you a sense of how the FBI actually uses these metadata requests to get a comprehensive picture of all the aliases, including IP addresses, someone might use. The MAC and IP addresses, in particular, would be very valuable to identify any of her otherwise unidentified device and Internet usage. Note, too, that AT&T gets asked to share all details of wire communications sent using the phone — so any information, including cell tower location, an app shares with AT&T would be included in that. AT&T, of course, tends to interpret surveillance requests broadly.

Though note: the prosecutor here pretty obviously cut and paste from the Google request for the social media companies, given that she copied over the Google language on cookies in her Twitter request.

AT&T

AT&T Corporation is required to disclose the following records and other information, if available, to the United States for each Account listed in Part I of this Attachment, for the time period beginning June 1, 2016, through and including June 7, 2017:

A. The following information about the customers or subscribers of the Account:
1. Names (including subscriber names, user names, and screen names);
2. Addresses (including mailing addresses, residential addresses, business addresses, and e-mail addresses);
3. Local and long distance telephone connection records;
4. Records of session times and durations, and the temporarily assigned network addresses (such as Internet Protocol (“IP”) addresses) associated with those sessions;
5. Length of service (including start date) and types of service utilized;
6. Telephone or instrument numbers (including MAC addresses. Electronic Serial Numbers (“ESN”), Mobile Electronic Identity Numbers (“MEIN”), Mobile Equipment Identifier (“MEID”), Mobile Identification Numbers (“MIN”), Subscriber Identity Modules (“SIM”), Mobile Subscriber Integrated Services Digital Network Number (“MSISDN”), International Mobile Subscriber Identifiers (“IMSl”), or International Mobile Equipment Identities (“IMEI”));
7. Other subscriber numbers or identities (including the registration Internet Protocol (“IP”) address); and
8. Means and source of payment for such service (including any credit card or bank account number) and billing records.

B. All records and other information (not including the contents of communications) relating to wire and electronic communications sent from or received by the Account, including the date and time of the communication, the method of communication, and the source and destination of the communication (such as source and destination email addresses, IP addresses, and telephone numbers), and including information regarding the cell towers and sectors through which the communications were sent or received.

Records of any accounts registered with the same email address, phone number(s), or method(s) of payment as the account listed in Part I.

Google

Google is required to disclose the following records and other information, if available, to the United States for each account or identifier listed in Part 1 of this Attachment (“Account”), for the time period beginning June 1, 2016, through and including June 7,2017:

A. The following information about the customers or subscribers of the Account:
1. Names (including subscriber names, user names, and screen names);
2. Addresses (including mailing addresses, residential addresses, business addresses, and e-mail addresses);
3. Local and long distance telephone connection records;
4. Records of session times and durations, and the temporarily assigned network addresses (such as Internet Protocol (“IP”) addresses) associated with those sessions;
5. Length of service (including start date) and types of service utilized;
6. Telephone or instrument numbers (including MAC addresses);
7. Other subscriber numbers or identities (including temporarily assigned network addresses and registration Internet Protocol (“IP”) addresses (including carrier grade natting addresses or ports)); and
8. Means and source of payment for such service (including any credit card or bank account number) and billing records.

B. All records and other information (not including the contents of communications) relating to the Account, including:
1. Records of user activity for each connection made to or from the Account, including log files; messaging logs; the date, time, length, and method of connections; data transfer volume; user names; and source and destination Internet Protocol addresses;
2. Information about each communication sent or received by the Account, including the date and time of the communication, the method of communication, and the source and destination of the communication (such as source and destination email addresses, IP addresses, and telephone numbers);
3. Records of any accounts registered with the same email address, phone number(s), method(s) of payment, or IP address as either of the accounts listed in Part 1; and Records of any accounts that are linked to either of the accounts listed in Part 1 by machine cookies (meaning all Google user IDs that logged into any Google account by the same machine as either of the accounts in Part

Facebook/Instagram

Facebook, Inc. is required to disclose tbe following records and other information, if available, to the United States for each account or identifier listed in Part 1 of this Attachment (“Account”),
for the time period beginning June 1, 2016, through and including June 7, 2017:

A. The following information about the customers or subscribers of the Account:
1. Names (including subscriber names, user names, and screen names);
2. Addresses (including mailing addresses, residential addresses, business addresses, and e-mail addresses);
3. Local and long distance telephone connection records;
4. Records of session times and durations, and the temporarily assigned network addresses (such as Intemet Protocol (“IP”) addresses) associated with those sessions;
5. Length of service (including start date) and types of service utilized;
6. Telephone or instrument numbers (including MAC addresses);
7. Other subscriber numbers or identities (including temporarily assigned network addresses and registration Intemet Protocol (“IP”) addresses (including carrier grade natting addresses or ports)); and
8. Means and source of payment for such service (including any credit card or bank account number) and billing records.

B. All records and other information (not including the contents of communications) relating to the Account, including:
1. Records of user activity for each connection made to or from the Account, including log files; messaging logs; the date, time, length, and method of connections; data transfer volume; user names; and source and destination Intemet Protocol addresses;
2. Information about each communication sent or received by tbe Account, including tbe date and time of the communication, the method of communication, and the source and destination of the communication (such as source and destination email addresses, IP addresses, and telephone numbers). Records of any accounts registered with the same email address, phone number(s), method(s) of payment, or IP address as either of the accounts listed in Part I; and
3. Records of any accounts that are linked to either of the accounts listed in Part I by machine cookies (meaning all Facebook/Instagram user IDs that logged into any Facebook/Instagram account by the same machine as either of the accounts in Part I).

Twitter

Twitter, Inc. is required to disclose the following records and other information, if available, to the United States for each account or identifier listed in Part 1 of this Attachment (“Account”), for the time period beginning June 1,2016, through and including June 7,2017:

A. The following information about the customers or subscribers of the Account:
1. Names (including subscriber names, user names, and screen names);
2. Addresses (including mailing addresses, residential addresses, business addresses, and e-mail addresses);
3. Local and long distance telephone connection records;
4. Records of session times and durations, and the temporarily assigned network addresses (such as Internet Protocol (“IP”) addresses) associated with those sessions;
5. Length of service (including start date) and types of service utilized;
6. Telephone or instrument numbers (including MAC addresses);
7. Other subscriber numbers or identities (including temporarily assigned network addresses and registration Internet Protocol (“IP”) addresses (including carrier grade natting addresses or ports)); and
8. Means and source of payment for such service (including any credit card or bank account number) and billing records.

B. All records and other information (not including the contents of communications) relating to the Account, including:
1. Records of user activity for each connection made to or from the Account, including log files; messaging logs; the date, time, length, and method of connections; data transfer volume; user names; and source and destination Internet Protocol addresses;
2. Information about each communication sent or received by the Account, including the date and time of the communication, the method of communication, and the source and destination of the communication (such as source and destination email addresses, IP addresses, and telephone numbers).
3. Records of any accounts registered with the same email address, phone number(s), method(s) of payment, or IP address the account listed in Part I; and
4. Records of any accounts that are linked to the account listed in Part I by machine cookies (meaning all Google [sic] user IDs that logged into any Google [sic] account by the same machine as the account in Part I).

The Nine-Minute Gap [UPDATE-2]

[IMPORTANT: UPDATES AT BOTTOM]

Consider yourself warned: this won’t be a very long post.

There’s been a lot of chatter about the timing of the July 26 search warrant’s execution on Paul Manafort’s Alexandria VA residence. The Washington Post called it a “predawn raid.” Some have pooh-poohed this as hyperbole, claiming the warrant was probably executed sometime after 6:00 a.m. EDT. Sunrise happened to be 6:04 a.m. EDT that day, leaving a narrow four-minute window for both “predawn” and “daytime hours” (beginning at 6:00 a.m.) to be accurate.

Some have also noted Trump completely surprised his military leadership the same day as the raid by tweeting an unexpected ban on transgender individuals in the service.

You may also recall reports indicating members of the military sat with bated breath waiting for nine minutes between his first tweet and his next to determine if they were supposed to scramble or take other military action. That overlong ellipsis at the end of the first tweet left them wondering if they were to begin a North Korean strike.

But it wasn’t just the same day the raid and the tweets happened. Trump tweeted just as the raid must have been underway at Manafort’s house.

What happened to trigger the initial 5:55 a.m. EDT tweet of the series? We know Manafort wasn’t in contact with Trump at that time if he was still asleep when the FBI knocked on his bedroom door.

What happened in that nine minute gap between 5:55 a.m. and the 6:04 a.m. sunrise tweet containing the decisive wording about a transgender ban, while our military stood by, waiting a possible strike order?

And did any one or all of these tweets serve as a signal, not to the Department of Defense or transgender Americans an intent to change policy, but something else entirely different?

UPDATE — 12:15 a.m. EDT 10-AUG-2017 —

CNN’s Jim Sciutto confirmed the search warrant was “no-knock” — timing of the raid may have been earlier than 6:00 a.m. EDT. When did the raid begin and how long between the warrant being served and Trump’s tweets?

UPDATE — 1:30 p.m. EDT 10-AUG-2017 —

Jon Kimball says the time stamp on Trump’s tweets was PDT, not EDT.

Can somebody explain this back-and-forth timezone in tweets? The link Kimball shares to Trump’s tweet shows 8:55. The screenshot I took last night shows 6:55.

Ridiculous situation — I feel like Schroedinger’s dead/alive cat-in-a-box.

If Kimball’s right and the timestamp in my screenshot is PDT (I use EDT on my desktop, by the way), the nine-minute gap matters not. The deployment of an utterly unanticipated change in policy via tweets to distract from the raid on Paul Manafort’s residence is still absolutely relevant.

The Blame the Media Movement

screen-shot-2016-11-14-at-10-10-55-amThere was an odd moment yesterday on Twitter when a bunch of people were RTing screen caps of NYT’s front page the day after Jim Comey’s October 28 letter, blaming the media for Hillary’s loss.

I think the idea behind their complaints is that because the media — as embodied by the NYT — spent so much time focusing on Hillary’s emails, she lost.

I agree that “the media’s” focus on Hillary’s email contributed significantly to the loss. But the way in which people were complaining about it betrays a lack of understanding of the problem.

First, consider what they were complaining about. The NYT’s print edition had a topline story that “New emails jolt Clinton campaign in race’s last days.” That is almost exactly the Hillary camp’s preferred explanation for why they lost, that the Comey announcement roiled her campaign right at the end. The NYT also focused on Comey’s inappropriate behavior. And also reported what Trump said about the emails — again, reporting what the opposing candidate actually said.

Here’s how Media Matters — which because of close ties between the campaign and the organization, should be considered a house organ for the campaign — dealt with this treatment in real time.

Over the past two days, The New York Times has devoted five of its six above-the-fold articles to FBI director James Comey’s letter to congressional leaders indicating that the Bureau is reviewing additional “emails that appear to be pertinent to the investigation” of Democratic presidential nominee Hillary Clinton’s use of a private server as secretary of state. By providing such prominent coverage, the Times has indicated that the letter is news of the highest possible significance — in spite of the Times’ own reporting that FBI agents have yet to read the emails and determine if they are significant and the letter “did not reopen” the investigation.

In his October 28 letter, Comey wrote that the FBI has “learned of the existence of emails that appear to be pertinent to the investigation” while investigating an unrelated case and is taking “appropriate investigative steps designed to allow investigators to review these emails to determine whether they contain classified information, as well as to assess their importance to our investigation.” He added that the “FBI cannot yet assess whether or not this material may be significant, and I cannot predict how long it will take us to complete.”

Despite the paucity of information Comey indicated was available, the letter triggered a firestorm of speculative media coverage.

The Times, which has both a responsibility as the leading national newspaper to put the story in appropriate context, and a long history of applying excessive and disproportionate scrutiny to news about Bill and Hillary Clinton, led the media’s feeding frenzy.

On Saturday, the entirety of the Times’ front page above the fold was dedicated to three separate articles about Comey’s letter. The lead story declared, “New Emails Jolt Clinton Campaign In Race’s Last Days; FBI Looks at Messages Found During Inquiry.” But as that article noted, it is not clear whether the emails are “new” or duplicates of emails previously reviewed by the FBI; the FBI “had not yet examined” the emails.

The front page also featured articles on Trump’s response to the news and on Republican and Democratic lawmakers’ criticism of Comey in light of the letter.

The Times front page drew criticism for providing such prominent coverage before it was clear whether the emails in question were even relevant to the investigation.

The MM piece does raise two absolutely fair content complaints: that the NYT said FBI “reopened” the investigation (though I’m not sure the distinction is as important as they make out, especially since the FBI had at least one other open investigation during this period), and that the headline said the emails were new when that was not yet clear.

Fair points. But.

MM is also absolutely obsessed with the way NYT has emphasized this on their front page. You know? A dead tree front page? Not just any dead tree, but the NYT’s dead tree?

Of the 100,000 or so people who decided this election, how many of them get their news from the NYT, much less the dead tree version of the NYT? In both the rural and urban areas where Hillary lost MI, you’d have to go to a store, and even then the Sunday Times might be the only thing you could get in dead tree form in timely fashion. I’m sure it’s easier to get the dead tree NYT in Philly, but not in Erie, PA, two other places where Hillary lost this election. So while the NYT’s coverage surely matters, its relative placement on the dead tree is not the thing you should focus on.

You want to track what caused the undue influence of the Comey letter on the election? A far better place to focus is on Bret Baier’s claim, a few days later, that two sources had told him with 99% certainty that Hillary was going to be indicted. MM did cover that, for several days straight, including showing that Fox kept reporting on the claim even after Baier retracted it.

screen-shot-2016-11-14-at-11-27-51-am

But that’s not the other thing you need to track.

Obviously, you need to track Breitbart, the Steve Bannon site that legitimized white supremacy.

Particularly given that the rural areas where Hillary underperformed have often lost their local press (which might otherwise have exposed them to the AP version) you also need to account for social media. It would be bad enough if that consisted solely of people consuming the conspiracy theories their buddies pass on. But, as has increasingly been discussed both during and since the election, those have been hijacked.

On both, people — even some without any stake in the election, such as kids in Macedonia — created false claims to generate clicks to make money.

“This is the news of the millennium!” said the story on WorldPoliticus.com. Citing unnamed FBI sources, it claimed Hillary Clinton will be indicted in 2017 for crimes related to her email scandal.

“Your Prayers Have Been Answered,” declared the headline.

For Trump supporters, that certainly seemed to be the case. They helped the baseless story generate over 140,000 shares, reactions, and comments on Facebook.

Meanwhile, roughly 6,000 miles away in a small town in the former Yugoslav Republic of Macedonia, a young man watched as money began trickling into his Google AdSense account.

[snip]

Most of the posts on these sites are aggregated, or completely plagiarized, from fringe and right-wing sites in the US. The Macedonians see a story elsewhere, write a sensationalized headline, and quickly post it to their site. Then they share it on Facebook to try and generate traffic. The more people who click through from Facebook, the more money they earn from ads on their website.

Earlier in the year, some in Veles experimented with left-leaning or pro–Bernie Sanders content, but nothing performed as well on Facebook as Trump content.

“People in America prefer to read news about Trump,” said a Macedonian 16-year-old who operates BVANews.com.

BuzzFeed News’ research also found that the most successful stories from these sites were nearly all false or misleading.

Far more troublingly, Facebook’s algorithm that influences what news people see not only doesn’t sort out fake news, but they purposely avoided fixing the problem during the election because that would have disproportionately affected conservative “news.”

[I]t’s hard to visit Facebook without seeing phony headlines like “FBI Agent Suspected in Hillary Email Leaks Found Dead in Apparent Murder-Suicide” or “Pope Francis Shocks World, Endorses Donald Trump for President, Releases Statement” promoted by no-name news sites like the Denver Guardian and Ending The Fed.

Gizmodo has learned that the company is, in fact, concerned about the issue, and has been having a high-level internal debate since May about how the network approaches its role as the largest news distributor in the US. The debate includes questions over whether the social network has a duty to prevent misinformation from spreading to the 44 percent of Americans who get their news from the social network.

According to two sources with direct knowledge of the company’s decision-making, Facebook executives conducted a wide-ranging review of products and policies earlier this year, with the goal of eliminating any appearance of political bias. One source said high-ranking officials were briefed on a planned News Feed update that would have identified fake or hoax news stories, but disproportionately impacted right-wing news sites by downgrading or removing that content from people’s feeds. According to the source, the update was shelved and never released to the public.

It’s unclear if the update had other deficiencies that caused it to be scrubbed.

“They absolutely have the tools to shut down fake news,” said the source, who asked to remain anonymous citing fear of retribution from the company. The source added, “there was a lot of fear about upsetting conservatives after Trending Topics,” and that “a lot of product decisions got caught up in that.”

A similar effect is happening as we speak, spreading the false claim that Trump won the popular vote.

We actually don’t know what the media diet of the average person who normally would have voted Democratic is — I sincerely hope it’s something we get a handle on. But we need to understand that we would be lucky if the dead tree NYT is what we need to worry about.

And given that Trump is likely to overturn net neutrality, it is likely to get worse before it gets better.

Update: Fixed the Buzzfeed blockquote.