Softpanorama

May the source be with you, but remember the KISS principle ;-)
Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and  bastardization of classic Unix

Was Guccifer 2.0 a false flag operation?

News CIA hacking and false flag cyber operations Russiagate -- a color revolution against Trump Recommended Links Vault 7 scandal DNC and Podesta emails leak and  subsequent false flag operation to  blame Vladimir Putin FBI and CIA contractor Crowdstrike and very suspicious DNC leak saga Strzok-gate Mueller invokes ghosts of GRU operatives to help his and Brennan case
Fake News scare and US NeoMcCartyism The problem of control of intelligence services in democratic societies Anti-Russian hysteria in connection emailgate and DNC leak Coordinated set of leaks as a color revolution tool Brennan elections machinations Hillary Clinton email scandal Anti Trump Hysteria Michael Flynn FBI Mayberry Machiavellians
Nation under attack meme The Deep State National Security State  American Exceptionalism  Media-Military-Industrial Complex Neoliberalism as Trotskyism for the rich Neocolonialism as Financial Imperialism Bernie Sanders betrayal of his supporters History of American False Flag Operations
Amorality and criminality of neoliberal elite  Audacious Oligarchy and "Democracy for Winners" Myth about intelligent voter Trump vs. Deep State Did Obama order wiretaps of Trump conversations Do the US intelligence agencies attempt to influence the US Presidential elections ? Doublespeak New American Militarism Bait and Switch
Deception as an art form The Iron Law of Oligarchy Principal-agent problem Neoliberalism Neocon foreign policy is a disaster for the USA Non-Interventionism Skeptic Quotations Humor Etc
Recently the concensus emerged that Guccifer 2.0 was a false flag operation (Sic Semper Tyrannis Habakkuk on metadata):

Quite clearly, the ‘Guccifer 2.0’ persona is a crude fabrication by someone who has absolutely no understanding of, or indeed interest in, the bitter complexities of both of the history of Russia and of the ‘borderlands’, not only in the Soviet period but before and after.

richardstevenhack, July 18, 2018
Excellent post, especially the debunking of the ‘Gerasimov doctrine’ which I always thought was more hand-waving and Russian mind-reading.

It's important to realize that there are a number of people in the infosec community who have biases against Russia, just as there are in the general population. Then there are more cautious people, who recognize the difficulty in attributing a hack to any specific person absent solid, incontrovertible, non-circumstantial and non-spoofable (and preferably offline) evidence.

Tait doesn't appear to be one of the latter. Thomas Rid would be another. There are others.

Jeffrey Carr is one of the latter, and his familiarity with intelligence matters is clear from his organization of the annual "Suits and Spooks" Conference. I believe he was the first to raise questions about the DNC hack which didn't pass his smell test.

There are also a number of companies in infosec who rely on latching onto a particular strain of hacker, the more publicly exploitable for PR purposes the better, as a means of keeping the company name in front of potential high-profile and highly billable

mlnw , 2 days ago
The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues. The Guccifer 2.0 metadata was analyzed for its transmission speed, and based on the internet speeds to and from numerous test locations abroad and in the U.S., it was determined to have been impossible for the so-called Guccifer 2.0 to have hacked the DNC computers over the internet. The transmission speed however did correspond to the speed of the transfer to a thumb drive. Additionally, it was found that the data had been manipulated and split into two parts to simulate a July and a September transfer, when in fact the parts merge perfectly as single file, and where, according to Binney, according to Binney, the probability of the split being a coincidence would be one over 100 to the 50th power.

As for the crude trace fingerprints (e.g. the referencing of Dzerzinsky), one of the Wikileaks data dumps (Vault 7 Marble) during a period when Assange was negotiating with the Administration - there were two at the time (Vault 7 Marble and Vault 7 Grasshopper), the release of which apparently enraged Mike Pompeo- was designed to obfuscate, fabricate and frame countries such as Russia, Iran or North Korea by pretending to be the target country, including in the use of target's alphabet and language.

VIPs has written numerous articles on this in Consortium News. See also the report by Patrick Lawrence Smith in The Nation at: https://www.thenation.com/a... . (It was apparently so hot at the time- and disputed by several other VIPs members- that The Nation sought an independent assessment by third party, though those comments were easily addressed and dismissed in seriatim by Binney in an annex to the article.)

Binney has explained his forensic analysis and conclusions at numerous forums, and in a sit-down with Secretary Pompeo in October, 2017- though Mueller, the FBI, and mainstream and some of the alternative press seem either deaf, dumb and blind to it all, or interested in discrediting the study. The irony is, I'd venture to guess, that Binney, with his 40 years of experience, including as Technical Director and technical guru at the NSA, is, even in retirement, more sophisticated in these matters than any one at the Agency, or the FBI, or CIA, or certainly, the Congressional Intelligence Committees. So, it is astounding that any or all of them could have, but did not, invite him to testify as an expert.

Moreover, the NSA has a record of every transmission, and also would have it on backup files. And, the FBI has been sitting on Seth Rich's computer and his communications with Wikileaks, and presumably has a report that it has not released. And of course, as Trump asked in his press conference, where's the DNC server, any or all of which would put this question to rest.

A recent interview with Binney can be found at:

Play Hide

There were previous signs that Guccifer 2.0 persona was a false flag operation, the creation of Brennan CIA, specifically to propagate Russiagate story (Mueller’s Latest Indictment Contradicts Evidence In The Public Domain – Disobedient Media):  

As Mueller’s Latest Indictment Contradicts Evidence In The Public Domain – Disobedient Media states

It makes no sense that the GRU would have even used Guccifer 2.0 in the manner we now know he operated – it only caused any harm to Trump and served to undermine leaks due to the deliberate placement of Russian metadata that would give a false perception of Russians mishandling those documents (including the Trump research document found in Podesta’s emails).

... ... ...

Adam Carter

NOTE: There will likely be various amendments made to this article over the next 24 hours.

On July 13th, 2018, an indictment was filed by Special Counsel Robert Swan Mueller III.

This author is responding to the indictment because it features claims about Guccifer 2.0 that are inconsistent with what has been discovered about the persona, including the following:


The first piece of malware at the DNC identified by Crowdstrike as relating to “Fancy Bear,” was compiled on 25 April, 2016. This used a C2 (command and control) IP address that, for the purposes of the APT group, had been inoperable for over a year. It was useful mostly as a signature for attributing it to “Fancy Bear.”

Two additional pieces of malware were discovered at the DNC attributed to the same APT group. These were compiled on 5 May 2016 and 10 May 2016 while Robert Johnston was working with the DNC on CrowdStrike’s behalf to counter the intrusion reported at the end of April and install Falcon.

References to the evidence covering all of this are available in the article: “Fancy Fraud, Bogus Bears & Malware Mimicry“.

This could be inferred from a number of things. DCLeaks was re-registered on 19 April 2016, however, what they published included Republicans and individuals that were not connected to the DNC. In fact, DCLeaks didn’t start publishing anything relating to Clinton campaign staff until June/July 2016. There was also the fact that the daily frequency of emails in the DNC emails released by WikiLeaks increased dramatically from around 19 April 2016, however, this wasn’t indicative of the start of hacking activity but rather caused by a 30 day email retention policy combined with the fact that the emails were acquired between May 19th and May 25th.

There has been no technical evidence produced by those who had access to the DNC network demonstrating files were being manipulated or that malware was engaging in activity prior to this and by CrowdStrike’s own admissions, many of the devices at the DNC were wiped in June. As such, it’s unclear where this may have come from.

There’s an issue here with the conflation of Guccifer 2.0 and DCLeaks. Why would Guccifer 2.0 have had an account at DCLeaks with which he had restricted access and could only manage a subset of the leaks (and only those relating to the DNC) while DCLeaks featured leaks covering those unconnected to and even opposing the DNC?

It also appears there may have been an effort to have people perceive Guccifer 2.0 as being associated with someone that claimed to have root access to DCLeaks too, however, this could only be demonstrated through the use of multimedia props.

It makes no sense that the GRU would have even used Guccifer 2.0 in the manner we now know he operated – it only caused any harm to Trump and served to undermine leaks due to the deliberate placement of Russian metadata that would give a false perception of Russians mishandling those documents (including the Trump research document found in Podesta’s emails).

However, there is one interesting thing that does connect Podesta being phished with DCLeaks. As spotted by Stephen McIntyre – the syntax in the spearphishing emails for both Podesta and Rhinehart (whose leaked emails were published at DCLeaks) were identical.

So, in fairness, there is actually circumstantial evidence to suggest an overlap as Guccifer 2.0 clearly had Podesta’s emails and it looks like the spearphishing attack used to snare Podesta’s emails was identical to one that was attributed to the acquisition of emails published by DCLeaks.

Is there a reason for ambiguity when referencing WikiLeaks?

While he clearly had access to the Podesta emails (NOTE: CrowdStrike decided to start investigating the NGP-VAN breach within a week of Podesta’s emails being acquired, three months after the December 2015 incident), Guccifer 2.0 used those materials to fabricate evidence on 15 June 2016 implicating Russians and which, coincidentally appeared to support (but ultimately helped refute) multiple assertions made by CrowdStrike that the Trump Opposition report (actually sourced from Podesta’s emails) was targeted by Guccifer 2.0 at the DNC in April 2016 – and that the theft of this specific file from the DNC – which, again, could not have been stolen from the DNC – had set off the “first alarm” indicating a security breach.

On 6 July 2016, Guccifer 2.0 released a batch of documents that were exclusively attachments to DNC emails that would later be released by WikiLeaks.

Guccifer 2.0 certainly didn’t make a genuine effort to “conceal a Russian identity,” far from it. The persona made decisions that would leave behind a demonstrable trail of Russian-themed breadcrumbs, examples include:

We know that whoever had the Podesta emails had far more damaging content on Hillary than that produced by Guccifer 2.0 or DCLeaks and we know Guccifer 2.0 had access to Podesta’s emails. If it was the GRU and they wanted to harm Hillary, they had FAR better material do that with than what they chose to release.

DCLeaks featured leaks from those that were not involved in the US presidential election. Guccifer 2.0 only released content relating to the Democratic party and only content that was of little harm to the DNC leadership and Clinton’s campaign.

... .... ....

Also, if Guccifer 2.0 was Russian, why didn’t he struggle with indefinite and definite articles as a Russian struggling with English language would typically do?

Of course, ultimately, if he was working with the Russian state, why deliberately do so much to be perceived as Russian?

 


Top Visited
Switchboard
Latest
Past week
Past month

NEWS CONTENTS

Old News ;-)

[Oct 05, 2020] How The DNC Hired CrowdStrike To Frame Russia For The Hack- Excerpt -

Oct 05, 2020 | www.zerohedge.com

How The DNC Hired CrowdStrike To Frame Russia For The Hack: Excerpt

by Tyler Durden Sun, 10/04/2020 - 20:50 Twitter Facebook Reddit Email Print

Submitted by Thomas Farnan, originally published in The National Pulse

U.S. Director of National Intelligence John Ratcliffe recently declassified information indicating the CIA obtained intelligence in 2016 that the Russians believed the Clinton campaign was trying to falsely associate Russia with the so-called hack of DNC computers. CIA Director John Brennan shared the intelligence with President Obama. They knew, in other words, that the DNC was conducting false Russian flag operation against the Trump campaign . The following is an exclusive excerpt from The Russia Lie that tells the amazing story in detail:

On March 19, 2016, Hillary Clinton's campaign chairman, John Podesta, surrendered his emails to an unknown entity in a "spear phishing" scam. This has been called a "hack," but it was not. Instead, it was the sort of flim-flam hustle that happens to gullible dupes on the internet.

The content of the emails was beyond embarrassing. They showed election fraud and coordination with the media against the candidacy of Bernie Sanders. The DNC and the Clinton campaign needed a cover story.

Blaming Russia would be a handy way to deal with the Podesta emails. There was already an existing Russia operation that could easily be retrofitted to this purpose. The problem was that it was nearly impossible to identify the perpetrator in a phishing scheme using computer forensic tools.

The only way to associate Putin with the emails was circumstantially.

The DNC retained a company that called itself "CrowdStrike" to provide assistance. CrowdStrike's chief technology officer and co-founder, Dmitri Alperovitch, is an anti-Putin, Russian expat and a senior fellow at the Atlantic Council .

With the Atlantic Council in 2016, all roads led to Ukraine. The Atlantic Council's list of significant contributors includes Ukrainian billionaire Victor Pinchuk.

The Ukrainian energy company that was paying millions to an entity that was funneling large amounts to Hunter Biden months after he was discharged from the US Navy for drug use, Burisma, also appears prominently on the Atlantic Council's donor list.

https://lockerdome.com/lad/13084989113709670?pubid=ld-dfp-ad-13084989113709670-0&pubo=https%3A%2F%2Fwww.zerohedge.com&rid=www.zerohedge.com&width=890

Arseniy Yatsenyuk, the Western puppet installed in Ukraine, visited the Atlantic Council's Washington offices to make a speech weeks after the coup.

Pinchuk was also a big donor (between $10 million and $20 million) to the Clinton Foundation. Back in '15, the Wall Street Journal published an investigative piece , " Clinton Charity Tapped Foreign Friends ." The piece was about how Ukraine was attempting to influence Clinton by making huge donations through Pinchuk. Foreign interference, anyone?

On June 12, 2016, WikiLeaks founder Julian Assange announced : "We have upcoming leaks in relation to Hillary Clinton . . . We have emails pending publication."

Two days later, CrowdStrike fed the Washington Post a story , headlined, "Russian government hackers penetrated DNC, stole opposition research on Trump." The improbable tale was that the Russians had hacked the DNC computer servers and got away with some opposition research on Trump. The article quoted Alperovitch of CrowdStrike and the Atlantic Council.

The next day, a new blog – Guccifer 2.0 – appeared on the internet and announced:

Worldwide known cyber security company CrowdStrike announced that the Democratic National Committee (DNC) servers had been hacked by "sophisticated" hacker groups.

I'm very pleased the company appreciated my skills so highly))) But in fact, it was easy, very easy.

Guccifer may have been the first one who penetrated Hillary Clinton's and other Democrats' mail servers. But he certainly wasn't the last. No wonder any other hacker could easily get access to the DNC's servers.

Shame on CrowdStrike: Do you think I've been in the DNC's networks for almost a year and saved only 2 documents? Do you really believe it?

Here are just a few docs from many thousands I extracted when hacking into DNC's network.

Guccifer 2.0 posted hundreds of pages of Trump opposition research allegedly hacked from the DNC and emailed copies to Gawker and The Smoking Gun . In raw form, the opposition research was one of the documents obtained in the Podesta emails, with a notable difference: It was widely reported the document now contained " Russian fingerprints ."

The document had been cut and pasted into a separate Russian Word template that yielded an abundance of Russian "error "messages . In the document's metadata was the name of the Russian secret police founder, Felix Dzerzhinsky, written in the Russian language.

The three-parenthesis formulation from the original post ")))" is the Russian version of a smiley face used commonly on social media. In addition, the blog's author deliberately used a Russian VPN service visible in its emails even though there would have been many options to hide any national affiliation.

Under the circumstances, the FBI should have analyzed the DNC computers to confirm the Guccifer hack. Incredibly, though, the inspection was done by CrowdStrike, the same Atlantic Council-connected private contractor paid by the DNC that had already concluded in The Washington Post that there was a hack and Putin was behind it.

CrowdStrike would declare the "hack" to be the work of sophisticated Russian spies. Alperovitch described it as, " skilled operational tradecraft ."

There is nothing skilled, though, in ham-handedly disclosing a Russian identity when trying to hide it. The more reasonable inference is that this was a set-up. It certainly looks like Guccifer 2.0 suddenly appeared in coordination with the Washington Post 's article that appeared the previous day.

FBI Director James Comey confirmed in testimony to the Senate Intelligence Committee in January 2017 that the FBI's failure to inspect the computers was unusual to say the least. "We'd always prefer to have access hands-on ourselves if that's possible," he said.

But the DNC rebuffed the FBI's request to inspect the hardware. Comey added that the DNC's hand-picked investigator, CrowdStrike, is "a highly respected private company."

What he did not reveal was that CrowdStrike never corroborated a hack by forensic analysis. In testimony released in 2020, it was revealed that CrowdStrike admitted to Congressional investigators as early as 2017 that it had no direct evidence of Russian hacking.

CrowdStrike's president Shawn Henry testified, "There's not evidence that [documents and emails] were actually exfiltrated [from the DNC servers]. There's circumstantial evidence but no evidence that they were actually exfiltrated."

NEVER MISS THE NEWS THAT MATTERS MOST

ZEROHEDGE DIRECTLY TO YOUR INBOX

Receive a daily recap featuring a curated list of must-read stories.

The circumstantial evidence was Guccifer 2.0.

This was a crucial revelation because the thousand ships of Russiagate launched upon the positive assertion that CrowdStrike had definitely proven a Russian hack. Yet this fact was kept from the American public for more than three years.

The reasonable inference is that the DNC was trying to frame Russia and the FBI and intelligence agencies were going along with the scheme because of political pressure.

Those who assert that it is a "conspiracy theory" to say that CrowdStrike would fabricate the results of computer forensic testing to create a false Russian flag should know that it was caught doing exactly that around the time it was inspecting the DNC computers.

On Dec. 22, 2016, CrowdStrike caused an international stir when it claimed to have uncovered evidence that Russians hacked into a Ukrainian artillery computer app to help pro-Russian separatists. Voice of America later determined the claim was false , and CrowdStrike retracted its finding.

Ukraine's Ministry of Defense was forced to eat crow and admit that the hacking never happened.

If you wanted a computer testing firm to fabricate a Russian hack for political reasons in 2016, CrowdStrike was who you went out and hired.

To read the rest of the story, click The Russia Lie: How the Military Industrial Complex Targeted Trump and buy the ebook for just $5.
play_arrow LEEPERMAX , 4 minutes ago

Nobody faces consequences

No one is gonna go ta jail

And everyone walks

[Aug 19, 2020] The Committee Intelligence Committee relied on the same intelligence sources that fabricated the Russiagate scenario in the first place

Aug 19, 2020 | www.moonofalabama.org

Rob , Aug 19 2020 19:19 utc | 53

Actually, after only a quick review of some of the news reports, it appears that the Senate Committee placed great importance on the "fact" that Russia was involved in the "hacking" of emails from the DNC. This suggests that the Committee relied on the same intelligence sources that fabricated the Russiagate scenario in the first place. I guess that the Republicans on the Committee have not kept up with revelations that there is no evidence of any such hacking. Hence, the Committee's conclusions are likely based on the same old disinformation and can be readily dismissed.

[Aug 19, 2020] The Republican led Senate Select Committee on Intelligence repeats the lies about Guccifer 2.0

Highly recommended!
Looks like RussiaGate was a bipartisan affair. After all Parteigenosse Mueller was a Republican
Aug 19, 2020 | www.zerohedge.com
play_arrow

amnesia , 5 minutes ago

Very telling that ZH editors don't consider this newsworthy: key findings of the Republican led Senate Select Committee on Intelligence regarding Russia's 2016 election interference.

Manafort and Kilimnik talked almost daily during the campaign. They communicated through encrypted technologies set to automatically erase their correspondence; they spoke using code words and shared access to an email account. It's worth pausing on these facts: The chairman of the Trump campaign was in daily contact with a Russian agent, constantly sharing confidential information with him.

It did not find evidence that the Ukrainian government meddled in the 2016 election, as Trump alleged. "The Committee's efforts focused on investigating Russian interference in the 2016 election. However, during the course of the investigation, the Committee identified no reliable evidence that the Ukrainian government interfered in the 2016 U.S. election."

"Taken as a whole, Manafort's high-level access and willingness to share information with individuals closely affiliated with the Russian intelligence services, particularly [Konstantin] Kilimnik and associates of Oleg Deripaska, represented a grave counterintelligence threat," the report said.

Kilimnik "almost certainly helped arrange some of the first public messaging that Ukraine had interfered in the U.S. election."

Roger Stone was in communications with both WikiLeaks and the Russian hacker Guccifer 2.0 during the election; according to the Mueller report, Guccifer 2.0 was a conduit set up by Russian military intelligence to anonymously funnel stolen information to WikiLeaks.

The Senate Intelligence Committee's investigation found "significant evidence to suggest that, in the summer of 2016, WikiLeaks was knowingly collaborating with Russian government officials," the report said.

The FBI gave "unjustified credence" to the so-called Steele dossier, an explosive collections of uncorroborated memos alleging collusion between the Trump campaign and Russian government officials, the report said. The FBI did not take the "necessary steps to validate assumptions about Steele's credibility" before relying on the dossier to seek renewals of a surveillance warrant targeting the former Trump campaign aide, the report said.

Demeter55 , 47 minutes ago

It's the latest in 5 years of "Get Trump!", a sitcom featuring the Roadrunner (Trump) and the Wiley Coyote (Deep State/Never Trumpers / etc, etc.)

This classic scenario never fails to please those who realize that the roadrunner rules, and the coyote invariably ends up destroyed.

gene5722 , 2 hours ago

The lie msm won't let die.

[Aug 16, 2020] CIA Behind Guccifer Russiagate A Plausible Scenario

Highly recommended!
Aug 16, 2020 | www.zerohedge.com

If Zerohedge comment reflect general population sentiments this is clear sign of the crisis of legitimacy of neoliberal élite.

Via The Strategic Culture Foundation,

William Binney is the former technical director of the U.S. National Security Agency who worked at the agency for 30 years. He is a respected independent critic of how American intelligence services abuse their powers to illegally spy on private communications of U.S. citizens and around the globe.

Given his expert inside knowledge, it is worth paying attention to what Binney says.

In a media interview this week, he dismissed the so-called Russiagate scandal as a "fabrication" orchestrated by the American Central Intelligence Agency. Many other observers have come to the same conclusion about allegations that Russia interfered in the 2016 U.S. elections with the objective of helping Donald Trump get elected.

But what is particularly valuable about Binney's judgment is that he cites technical analysis disproving the Russiagate narrative. That narrative remains dominant among U.S. intelligence officials, politicians and pundits, especially those affiliated with the Democrat party, as well as large sections of Western media. The premise of the narrative is the allegation that a Russian state-backed cyber operation hacked into the database and emails of the Democrat party back in 2016. The information perceived as damaging to presidential candidate Hillary Clinton was subsequently disseminated to the Wikileaks whistleblower site and other U.S. media outlets.

A mysterious cyber persona known as "Guccifer 2.0" claimed to be the alleged hacker. U.S. intelligence and news media have attributed Guccifer as a front for Russian cyber operations.

Notably, however, the Russian government has always categorically denied any involvement in alleged hacking or other interference in the 2016 U.S. election, or elections thereafter.

William Binney and other independent former U.S. intelligence experts say they can prove the Russiagate narrative is bogus. The proof relies on their forensic analysis of the data released by Guccifer. The analysis of timestamps demonstrates that the download of voluminous data could not have been physically possible based on known standard internet speeds. These independent experts conclude that the data from the Democrat party could not have been hacked, as Guccifer and Russiagaters claim. It could only have been obtained by a leak from inside the party, perhaps by a disgruntled staffer who downloaded the information on to a disc. That is the only feasible way such a huge amount of data could have been released. That means the "Russian hacker" claims are baseless.

Wikileaks, whose founder Julian Assange is currently imprisoned in Britain pending an extradition trial to the U.S. to face espionage charges, has consistently maintained that their source of files was not a hacker, nor did they collude with Russian intelligence. As a matter of principle, Wikileaks does not disclose the identity of its sources, but the organization has indicated it was an insider leak which provided the information on senior Democrat party corruption.

about:blank

about:blank

me title=

William Binney says forensic analysis of the files released by Guccifer shows that the mystery hacker deliberately inserted digital "fingerprints" in order to give the impression that the files came from Russian sources. It is known from information later disclosed by former NSA whistleblower Edward Snowden that the CIA has a secretive program – Vault 7 – which is dedicated to false incrimination of cyber attacks to other actors. It seems that the purpose of Guccifer was to create the perception of a connection between Wikileaks and Russian intelligence in order to beef up the Russiagate narrative.

"So that suggested [to] us all the evidence was pointing back to CIA as the originator [of] Guccifer 2.0. And that Guccifer 2.0 was inside CIA I'm pointing to that group as the group that was probably the originator of Guccifer 2.0 and also this fabrication of the entire story of Russiagate," concludes Binney in his interview with Sputnik news outlet.

This is not the first time that the Russiagate yarn has been debunked . But it is crucially important to make Binney's expert views more widely appreciated especially as the U.S. presidential election looms on November 3. As that date approaches, U.S. intelligence and media seem to be intensifying claims about Russian interference and cyber operations. Such wild and unsubstantiated "reports" always refer to the alleged 2016 "hack" of the Democrat party by "Guccifer 2.0" as if it were indisputable evidence of Russian interference and the "original sin" of supposed Kremlin malign activity. The unsubstantiated 2016 "hack" is continually cited as the "precedent" and "provenance" of more recent "reports" that purport to claim Russian interference.

Given the torrent of Russiagate derivatives expected in this U.S. election cycle, which is damaging U.S.-Russia bilateral relations and recklessly winding up geopolitical tensions, it is thus of paramount importance to listen to the conclusions of honorable experts like William Binney.

The American public are being played by their own intelligence agencies and corporate media with covert agendas that are deeply anti-democratic.


me name=


lay_arrow desertboy , 13 hours ago

Well - who set up them up, converted from the OSS? The banksters.

"Wild Bill" Donovan worked for JP Morgan immediately after WWII.

"our" US intelligence agencies were set up by, and serve, the masters of high finance. Is this in dispute?

meditate_vigorously , 11 hours ago

They have seeded enough misinformation that apparently it is. But, you are correct. It is the Banksters.

Isisraelquaeda , 2 hours ago

Israel. The CIA was infiltrated by the Mossad long ago.

SurfingUSA , 15 hours ago

JFK was on to that truth, and would have been wise to mini-nuke Langley before his ill-fated journey to Dallas.

Andrew G , 11 hours ago

Except when there's something exceptionally evil (like pedo/blackmail rings such as Epstein), in which case it's Mossad / Aman

vova.2018 , 7 hours ago

Except when there's something exceptionally evil (like pedo/blackmail rings such as Epstein), in which case it's Mossad / Aman

The CIA & MOSSAD work hand in hand in all their clandestine operations. There is not doubt the CIA/MOSSAD are behind the creation, evolution, training, supplying weapons, logistic-planning & financing of the terrorists & the destruction of the Middle East. Anybody that believes the contrary has brain problems & need to have his head examined.

CIA/MOSAD has been running illegal activities in Colombia: drug, arms, organs & human (child-sex) trafficking. CIA/MOSAD is also giving training, logistic & arms to Colombia paramilitary for clandestine operation against Venezuela. After Bolsonaro became president, MOSSAD started running similar operation in Brazil. Israel & Brazil also recognizes Guaido as the legit president of Venezuela.

​​​​​​CIA/MOSSAD have a long time policy of assassinating & taking out pep who are a problem to the revisionist-zionist agenda, not just in the M-East but in the world. The CIA/MOSSAD organizations have many connections in other countries like the M-East, Saudi Arabia, UAE, et al but also to the UK-MI5.

The Israelis infiltrated the US to the highest levels a long time ago - Proof

  • Israel has & collects information (a database) of US citizens in coordination with the CIA & the 5 eyes.
  • Israel works with the NSA in the liaison-loophole operations
  • Mossad undercover operations in WDC & all over the world
  • The American Israel Public Affairs Committee – AIPAC
  • People with 2 citizenships (US/Israel) in WDC/NYC (the real Power)
  • From Steve Bannon a christian-zionist: Collusion between the Trump administration and Israel .
  • D-Trump, Ivanka Trump & husband Kushner (orthodox Juus)
  • Epstein & Ghislaine Maxwell, members of the MOSSAD ran their entire pedo-honey-pot operation for the CIA/Mossad
  • CIA/MOSSA want to punish Iran for its role in Syria's victory over ISIS (created by CIA/Mossad) - PROOF: McCain Armed ISIS https://www.youtube.com/watch?v=ziNlUuc167E

New book details Israel's secret history of assassinations
https://www.youtube.com/watch?v=ge-mnC2wGss

CIA Assassination Manual Revealed (CIA = Cover action agency)
https://www.youtube.com/watch?v=s3gQfoFCpPs

GreatUncle , 6 hours ago

Well I never expected anything different.

They have a hand in everything and probably the murder of JFK.

Hell the CIA have even had their own president.

They are supposed to be commanded by the president but personally I think they are a rogue operation controlled by somebody else.

Lyman54 , 16 hours ago

Millie Weavers documentary explains everything quite well. https://www.youtube.com/watch?v=9HFxVvrXjCg

sborovay07 , 15 hours ago

Funny how a number of the right wing conspiracy stories according to the MSM from a couple years back were true from the get go. 1 indictment over 4 years in the greatest attempted coup in this country's history. So sad that Binney and Assange were never listened to. They can try to silence us who know of the truth, but as Winston Churchill once said, 'Truth is incontrovertible. Panic may resent it. Ignorance may deride it. Malice may distort it. But there it is.' KDP still censors my book on their advertising platform as it promotes conspiratorial theories (about the Obama led coup) and calls out BLM and Antifa for what they are (marxists) . Yet the same platform still recommends BLM books stating there is a pandemic of cops killing innocent blacks. F them!!!! #RIPSeth #FreeJulian #FreeMillie

smacker , 11 hours ago

Yes, and we all know the name of the DNC leaker who downloaded and provided WikiLeaks
with evidence of CIA and DNC corruption.
He was assassinated to prevent him from naming who Guccifer 2.0 was and where he is located.

The Russia-gate farce itself provides solid evidence that the CIA and others are in bed with DNC
and went to extraordinary lengths to prevent Trump being elected. When that failed, they instigated
a program of x-gates to get him out of office any way they could. This continues to this day.

This is treason at the highest level.

ACMeCorporations , 12 hours ago

Hacking? What Russian hacking?

In recently released testimony, the CEO of CrowdStrike admitted in congressional testimony, under oath, that it actually has no direct evidence Russia stole the DNC emails.

Nelbev , 9 hours ago

"The proof relies on their forensic analysis of the data released by Guccifer. The analysis of timestamps demonstrates that the download of voluminous data could not have been physically possible based on known standard internet speeds. ... a disgruntled staffer who downloaded the information on to a disc. That is the only feasible way such a huge amount of data could have been released. ... William Binney says forensic analysis of the files released by Guccifer shows that the mystery hacker deliberately inserted digital "fingerprints" in order to give the impression that the files came from Russian sources. ... "

Any computer file is a bunch of 1s and 0s. Anyone can change anything with a hex editor. E.g. I had wrong dates on some photographs once, downloaded as opposed to when taken, just edited the time stamp. You cannot claim any time stamp is original. If true time stamps, then the DNC files were downloaded to a thumb drive at a computer on location and not to the internet via a phone line. However anyone can change the time stamps. Stating a "mystery hacker deliberately inserted digital [Russian] 'fingerprints' " is a joke if denying the file time stamps were not tampered with. The real thing is where the narrative came from, political spin doctors, Perkins Coie law firm hired by DNC and Hillary campaign who hired Crowdstrike [and also hired Fusion GPS before for pissgate dossier propaganda and FISC warrants to spy on political opponents] and Perkins Coie edited Crowdstrike report with Russian narrative. FBI never looked at DNC servers. This is like your house was broken into. You deny police the ability to enter and look at evidence like DNC computers. You hire a private investigator to say your neighbor you do not like did it and publicise accusations. Take word of political consultants hired, spin doctor propaganda, Crowdstrike narrative , no police investigation. Atlantic Council?

Vivekwhu , 8 hours ago

The Atlantic Council is another NATO fart. Nuff said!

The_American , 15 hours ago

God Damn traitor Obama!

Yen Cross , 14 hours ago

TOTUS

For the youngsters.

Teleprompter Of The United States.

Leguran , 6 hours ago

The CIA has gotten away with so much criminal behavior and crimes against the American public that this is totally believable. Congress just lets this stuff happen and does nothing. Which is worse - Congress or the CIA?

Congress set up the system. It is mandated to perform oversight. And it just sits on its thumbs and wallows in it privileges.

This time Congress went further than ever before. It was behind and engaged in an attempted coup d'état.

Know thy enemy , 10 hours ago

Link to ShadowGate (ShadowNet) documentary - which answers the question, what is the keystone,,,,,

https://www.pscp.tv/Tore_says/1RDGlrYynRgxL

"Comey here, and Holder, while I get a rope for Lynch, and don't forget Brennan."

Kudo's to Millie

DontHateMeBecauseImABureaucrat , 9 hours ago

Neither google nor Apple will open the link. Or it's not there.

bringonthebigone , 8 hours ago

currently it is up here: https://www.youtube.com/watch?v=9HFxVvrXjCg

I Claudius , 5 hours ago

It's time for Assange and Wikileaks to name the person who they rec'd the info from. By hiding behind the "we don't name names" Mantra they are helping destroy America by polarizing its citizens. Name the damn person, get it all out there so the left can see that they've been played by their leaders. Let's cut this crap.

freedommusic , 7 hours ago

...all the evidence was pointing back to CIA as the originator [of] Guccifer 2.0.

Yep, I knew since day one. I remember seeing Hillary Clinton talking about Guccifer . As soon as uttered the name, I KNEW she with the CIA were the brainchild of this bogus decoy.

They copy. They mimic. These are NOT creative individuals.

Perhaps hell is too good a place for them.

on target , 4 hours ago

This is old news but worth bringing up again. The CIA never wanted Trump in, and of course, they want him out. Their fingerprints were all over Russiagate, The Kavanaugh hearings, Ukrainegate, and on and on. They are just trying to cover their asses for a string of illegal "irregularities" in their operations for years. Trump should never have tried to be a get along type of guy. He should have purged the entire leadership of the CIA on day one and the FBI on day 2. They can not be trusted with an "America First" agenda. They are all New World Order types who know whats best for everyone.

fersur , 7 hours ago

Boom, Boom, Boom !

Three Reseachable Tweets thru Facebook, I cut all at once, Unedited !

"#SusanRice has as much trouble with her memory as #HillaryClinton. Rice testified in writing that she 'does not recall' who gave her key #Benghazi talking points she used on TV, 'does not recall' being in any meetings regarding Benghazi in five days following the attack, and 'does not recall' communicating with anyone in Clinton's office about Benghazi," Tom Fitton in Breitbart.

"Adam Schiff secretly subpoenaed, without court authorization, the phone records of Rudy Giuliani and then published the phone records of innocent Americans, including @realDonaldTrump 's lawyers, a member of Congress, and a journalist," @TomFitton .

BREAKING: Judicial Watch announced today that former #Obama National Security Advisor and U.S. Ambassador to the United Nations, Susan Rice, admitted in written responses given under oath that she emailed with former Secretary of State Hillary Clinton on Clinton's non-government email account and that she received emails related to government business on her own personal email account.

STONEHILLADY , 7 hours ago

It's not just the Democrats, the warmongering neocons of the Republican party are also in on it, the Bush/Romney McCain/McConnell/Cheney and many more. It's called "Kick Backs" Ever notice these so called retired Generals all end up working for all these spying companies that span the 5eyes to Israel. It seems our POTUS has got his hands full swimming up stream to get this stopped and actually get rid of the CIA. It's the number 1 reason he doesn't trust these people, they all try to tell him stuff that is mis-directed.

Liars, leakers, and thieves are running not only our nation but the world, as George Carlin said, "It's a Big Club, and we ain't in it." If you fall for this false narrative of mail in voting and not actually go and vote on election day, you better start learning Chinese for surely Peelosi and Schumer will have their way and mess up this election so they can drag Trump out of office and possible do him and his family some serious harm, all because so many of you listen to the MSM and don't research their phony claims.

Max21c , 7 hours ago

It's called "Kick Backs" Ever notice these so called retired Generals all end up working for all these spying companies that span the 5eyes to Israel.

American Generals & Admirals are a lot more corrupt today than they were a few generations back. Many of them are outright evil people in today's times. Many of these people are just criminals that will steal anything they can get their banana republic klepto-paws on. They're nothing but common criminals and thieves. No different than the Waffen SS or any other group of brigands, bandits, and criminal gangsters.

Max21c , 7 hours ago

The CIA, FBI, NSA, Military Intelligence, Pentagon Gestapo, defense contractors are mixed up in a lot of crimes and criminal activities on American soil against American citizens and American civilians. They do not recognize borders or laws or rights of liberty or property rights or ownership or intellectual property. They're all thieves and criminals in the military secret police and secret police gangsters cabal.

BandGap , 7 hours ago

I have seen Binney's input. He is correct in my view because he scientifically/mathematically proves his point.

The blinded masses do not care about this approach, just like wearing masks.

The truth is too difficult for many to fit into their understanding of the world.

So they repeat what they have been told, never stopping to consider the facts or how circumstances have been manipulated.

It is frustrating to watch, difficult to navigate at times for me. Good people who will not stop and think of what the facts show them.

otschelnik , 8 hours ago

It could have been the CIA or it could have been one of the cut-outs for plausible deniability, and of all the usual suspects it was probably CrowdStrike.

- CGI / Global Strategy Group / Analysis Corp. - John Brennan (former CEO)

- Dynology, Wikistrat - General James L. Jones (former chairman of Atlantic Council, NSA under Obama)

- CrowdStrike - Dmitri Alperovich and Shawn Henry (former chief of cyber forensics FBI)

- Clearforce - Michael Hayden (former dir. NSA under Clinton, CIA under Bush) and Jim Jones Jr. (son Gnrl James Jones)

- McChrystal Group - Stanley McChrystal (former chief of special operations DOD)

fersur , 8 hours ago

Unedited !

The Brookings Institute – a Deep State Hub Connected to the Fake Russia Collusion and Ukraine Scandals Is Now Also Connected to China Spying In the US

The Brookings Institute was heavily involved in the Democrat and Deep State Russia collusion hoax and Ukraine impeachment fraud. These actions against President Trump were criminal.

This institute is influenced from foreign donations from entities who don't have an America first agenda. New reports connect the Institute to Chinese spying.

As we reported previously, Julie Kelly at American Greatness released a report where she addresses the connections between the Brookings Institute, Democrats and foreign entities. She summarized her report as follows: Accepting millions from a state sponsor of terrorism, foisting one of the biggest frauds in history on the American people, and acting as a laundering agent of sorts for Democratic political contributions disguised as policy grants isn't a good look for such an esteemed institution. One would be hard-pressed to name a more influential think tank than the Brookings Institution. The Washington, D.C.-based nonprofit routinely ranks at the top of the list of the best think tanks in the world; Brookings scholars produce a steady flow of reports, symposiums, and news releases that sway the conversation on any number of issues ranging from domestic and economic policy to foreign affairs.

​​ Brookings is home to lots of Beltway power players: Ben Bernanke and Janet Yellen, former chairmen of the Federal Reserve, are Brookings fellows. Top officials from both Republican and Democrat presidential administrations lend political heft to the organization. From 2002 until 2017, the organization's president was Strobe Talbott. He's a longtime BFF of Bill Clinton; they met in the 1970s at Oxford University and have been tight ever since. Talbott was a top aide to both President Bill Clinton and Secretary of State Hillary Clinton.

Kelly continued:

Brookings-based fellows working at Lawfare were the media's go-to legal "experts" to legitimize the concocted crime; the outlet manipulated much of the news coverage on collusion by pumping out primers and guidance on how to report collusion events from Special Counsel Robert Mueller's appointment to his final report.

Now, testimony related to a defamation lawsuit against Christopher Steele, the author of the infamous "dossier" on Donald Trump, has exposed his direct ties to Talbott in 2016 when he was still head of Brookings. Talbott and Steele were in communication before and after the presidential election; Steele wanted Talbott to circulate the dossier to his pals in John Kerry's State Department, which reportedly is what Talbott did . Steele also briefed top state department officials in October 2016 about his work.

But this isn't the only connection between the Brookings Institute and the Russia collusion and Ukrainian scandals. We were the first to report that the Primary Sub-Source (PSS) in the Steele report, the main individual who supplied Steele with bogus information in his report was Igor Danchenko.

In November 2019, the star witness for the Democrat Representative Adam Schiff's impeachment show trial was announced. Her name was Fiona Hill.

Today we've uncovered that Hill is a close associate of the Primary Sub-Source (PSS) for the Steele dossier – Igor Danchenko – the individual behind most all the lies in the Steele dossier. No wonder Hill saw the Steele dossier before it was released. Her associate created it.

Both Fiona Hill and Igor Danchenko are connected to the Brookings Institute.

They gave a presentation together as Brookings Institute representatives:

Kelly writes about the foreign funding the Brookings Institute partakes:

So who and what have been funding the anti-Trump political operation at Brookings over the past few years? The think tank's top benefactors are a predictable mix of family foundations, Fortune 100 corporations, and Big Tech billionaires. But one of the biggest contributors to Brookings' $100 million-plus annual budget is the Embassy of Qatar. According to financial reports, Qatar has donated more than $22 million to the think tank since 2004. In fact, Brookings operates a satellite center in Doha, the capital of Qatar. The wealthy Middle Eastern oil producer spends billions on American institutions such as universities and other think tanks.

Qatar also is a top state sponsor of terrorism, pouring billions into Hamas, al-Qaeda, and the Muslim Brotherhood, to name a few. "The nation of Qatar, unfortunately, has historically been a funder of terrorism at a very high level," President Trump said in 2017. "We have to stop the funding of terrorism."

An email from a Qatari official, obtained by WikiLeaks, said the Brookings Institution was as important to the country as "an aircraft carrier."

Yesterday the Brookings Institute was connected to spying by Communist China in a post at the Washington Free Beacon :

Part 1 of 2

fersur , 8 hours ago

Part 2 of 2 !

The Brookings Institution, a prominent Washington, D.C., think tank, partnered with a Shanghai policy center that the FBI has described as a front for China's intelligence and spy recruitment operations, according to public records and federal court documents.

The Brookings Doha Center, the think tank's hub in Qatar, signed a memorandum of understanding with the Shanghai Academy of Social Sciences in January 2018, the institution said . The academy is a policy center funded by the Shanghai municipal government that has raised flags within the FBI.

The partnership raises questions about potential Chinese espionage activities at the think tank, which employs numerous former government officials and nearly two dozen current foreign policy advisers to Joe Biden's presidential campaign.

It is really frightening that one of two major political parties in the US is tied so closely with the Brookings Institute. It is even more frightening that foreign enemies of the United States are connected to this entity as well.

Let it Go , 8 hours ago

One thing for sure is these guys have far to much of our money to spend promoting their own good.

fersur , 7 hours ago

Unedited !

Mueller Indictments Tied To "ShadowNet," Former Obama National Security Advisor and Obama's CIA Director – Not Trump

By Patrick Bergy, Cyber-Security, Veteran & Former DoD Contractor

December 18th, 2018

According to a report in the Daily Beast, which cited the Wall Street Journal's reporting of Special Counsel Robert Mueller's investigation into two companies, Wikistrat and Psy Group, "The firm's advisory council lists former CIA and National Security Agency director Michael Hayden, former national security adviser James L. Jones."

According to numerous reporting from major news outlets like the Wall Street Journal and Daily Beast, both Wikistrat and Psy Group represent themselves as being social media analysts and black PSYOP organizations. Both Wikistrat and Psy Group have foreign ownership mixed between Israeli, Saudi (Middle East) and Russian. Here is what the Wall Street Journal, The Daily Beast and pretty much everyone else out there doesn't know (or won't tell you).

The fact Obama's former National Security Advisor, General James Jones, and former Obama CIA director, Gen. Michael Hayden, are both on Wikistrat's advisory board may not seem suspicious, but both of these general's have another thing in common, and that is the ShadowNet. The ShadowNet, and its optional companion relational database, iPsy, were both originally developed by the small, family owned defense contracting company, Dynology. The family that owns Dynology; Gen. James Jones. I would add Paul Manafort and Rick Davis was Dynology's partner at the time we were making the ShadowNet and iPsy commercially available.

After obtaining the contract in Iraq to develop social media psychological warfare capabilities, known in military nomenclature as Interactive Internet Activities, or IIA, Gen. Jones kept the taxpayer funded application we developed in Iraq for the 4th Psychological Operation Group, and made it commercially available under the trademark of the "ShadowNet" and the optional black PSYOP component, "iPsy." If you think it is interesting that one of the companies under Mueller's indictment is named, "Psy" Group, I did as well. In fact, literally everything both publicly described in news reports, and even their websites, are exactly the same as the ShadowNet and iPsy I helped build, and literally named.

The only thing different I saw as far as services offered by Wikistrat, and that of Dynology and the ShadowNet, was described by The Daily Beast as, "It also engaged in intelligence collection." Although iPsy was a relational database that allowed for the dissemination of whatever the required narrative was, "intelligence collection" struck another bell with me, and that's a company named ClearForce.

ClearForce was developed as a solution to stopping classified leaks following the Edward Snowden debacle in 2013. Changes in NISPOM compliance requirements forced companies and government agencies that had employees with government clearances to take preventive measure to mitigate the potential of leaking. Although the NISPOM compliance requirement almost certainly would have been influenced by either Hayden, Jones or both, they once again sought to profit from it.

Using components of the ShadowNet and iPsy, the ClearForce application (which the company, ClearForce, was named after,) was developed to provide compliance to a regulation I strongly suspect you will find Jones and Hayden had a hand in creating. In fact, I strongly suspect you will find General Jones had some influence in the original requirement for our Iraq contract Dynology won to build the ShadowNet – at taxpayer expense! Dynology worked for several years incorporating other collection sources, such as financial, law enforcement and foreign travel, and ties them all into your social media activity. Their relationship with Facebook and other social media giants would have been nice questions for congress to have asked them when they testified.

Part 1 of 2 !

fersur , 7 hours ago

Part 2 of 2 !

The ClearForce application combines all of these sources together in real-time and uses artificial intelligence to predictively determine if you are likely to steal or leak based on the behavioral profile ClearForce creates of you. It can be used to determine if you get a job, and even if you lose a job because a computer read your social media, credit and other sources to determine you were likely to commit a crime. It's important for you to stop for a moment and think about the fact it is privately controlled by the former CIA director and Obama's National Security Advisor/NATO Supreme Allied Commander, should scare the heck out of you.

When the ClearForce application was complete, Dynology handed it off to ClearForce, the new company, and Michael Hayden joined the board of directors along with Gen. Jones and his son, Jim, as the president of ClearForce. Doesn't that kind of sound like "intelligence collection" described by the Daily Beast in Wikistrat's services?

To wrap this all up, Paul Manafort, Rick Davis, George Nader, Wikistrat and Psy Group are all directly connected to Mueller's social media influence and election interreference in the 2016 presidential election. In fact, I believe all are under indictment, computers seized, some already sentenced. All of these people under indictment by Mueller have one key thing in common, General James Jones's and Michael Hayden's social media black PSYOP tools; the ShadowNet, iPsy and ClearForce.

A recent meeting I had with Congressman Gus Bilirakis' chief of staff, Elizabeth Hittos, is confirmation that they are reviewing my DoD memorandum stating the work I did on the IIA information operation in Iraq, the Dynology marketing slicks for the ShadowNet and iPsy, along with a screenshot of Goggle's Way-Back Machine showing Paul Manafort's partnership with Dynology in 2007 and later. After presenting to her these facts and making clear I have much more information that requires the highest classification SCIF to discuss and requires being read-on to the program, Elizabeth contacted the office of Congressman Devin Nunez to request that I brief the intelligence committee on this critical information pertaining directly to the 2010 Ukrainian elections, Michael Brown riots, 2016 election interference and the "Russia collusion" hoax. All of that is on top of numerous questionable ethical and potentially illegal profits from DoD contracts while servings as NATO Commander and Obama's National Security Advisor.

We also need to know if the ShadowNet and iPsy were allowed to fall into foreign hands, including Russia, Saudi Arabia and Israel. I'm pretty sure South America is going to have a few questions for Jones and Obama as well? Stay tuned!

Balance-Sheet , 4 hours ago

Intelligence Agencies of all countries endlessly wage war at all times especially 'Information Warfare' (propaganda/disinformation) and the primary target has always and will always be the domestic population of the Intelligence Agency's country.

Yes, of course the CIA does target ALL other countries but the primary target will always be the Americans themselves.

Balance-Sheet , 4 hours ago

Intelligence Agencies of all countries endlessly wage war at all times especially 'Information Warfare' (propaganda/disinformation) and the primary target has always and will always be the domestic population of the Intelligence Agency's country.

Yes, of course the CIA does target ALL other countries but the primary target will always be the Americans themselves.

Paralentor , 5 hours ago

A lot more detail can be found here:

https://banned.video/watch?id=5f37fcc2df77c4044ee2eb03

SHADOW GATE – FULL FILM

462,864 views

yerfej , 8 hours ago

The neoliberals own the media, courts, academia, and BUREAUCRACY (including CIA) and they will do anything to make sure they retain power over everyone. These control freaks work hard to create all sorts of enemies to justify their existence.

LaugherNYC , 15 hours ago

It is sad that this information has to be repeatedly published, over and over and over, by SCI and other Russian. outlets.

Because no legit AMERICAN news outlet will give Binney or Assange the time of day or any credence, this all becomes Kremlin-sponsored disinformation and denials. People roll their eyes and say "Oh God, not the whole 'Seth Rich was murdered by the CIA' crap again!! You know, his FAMILY has asked that people stop spreading these conspiracy theories and lies."

SCI is a garbage bin, nothing more than a dizinformatz machine for Putin, but in this case, they are likely right. It seems preposterous that the "best hackers in the world" would forget to use a VPN or leave a signature behind, and it makes far more sense that the emails were leaked by someone irate at the abuses of the DNC - the squashing of Bernie, the cheating for Hillary in the debates - behavior we saw repeated in 2020 with Bernie shoved aside again for the pathetic Biden.

Would that SOMEONE in the US who is not on the Kremlin payroll would pick up this thread. But all the "investigative journalists" now work indirectly for the DNC, and those that don't are cancelled by the left.

Stone_d_agehurler , 15 hours ago

I am Guccifer and I approve this message.

Sarc/

But i do share your opinion. They are likely right this time and most of the pundits and media in the U. S. know it. That's what makes this a sad story about how rotten the U. S. system has become.

Democrats will sacrifice the Union for getting Trump out of office.

If elections in Nov won't go their way, Civil War II might become a real thing in 2021.

PeterLong , 4 hours ago

If " digital "fingerprints" in order to give the impression that the files came from Russian sources" were inserted in the leak by "Guccifer", and if the leak to wikileaks came from Seth Rich, via whatever avenue, then the "Guccifer" release came after the wikileaks release, or after wikileaks had the files, and was a reaction to same attempting to diminish their importance/accuracy and cast doubt on Trump. Could CIA and/or DNC have known the files were obtained by wikileaks before wikileaks actually released them? In any case collusion of CIA with DNC seems to be a given.

RightlyIndignent , 4 hours ago

Because Seth had already given it to Wikileaks. There is no 'Fancy Bear'. There is no 'Cozy Bear'. Those were made up by CrowdStrike, and they tried the same crap on Ukraine, and Ukraine told them to pound sand. When push came to shove, and CrowdStrike was forced to say what they really had under oath, they said: "We have nothing."

novictim , 4 hours ago

You are leaving out Crowd Strike. Seth Rich was tasked by people at the DNC to copy data off the servers. He made a backup copy and gave a copy to people who then got it to Wiki leaks. He used highspeed file transfers to local drives to do his task.

Meanwhile, it was the Ukrainian company Crowd Strike that claimed the data was stolen over the internet and that the thieves were in Russia. That 'proof" was never verified by US Intelligence but was taken on its word as being true despite crowd strike falsifying Russian hacks and being caught for it in the past.

Joebloinvestor , 5 hours ago

The "five eyes" are convinced they run the world and try to.

That is what Brennan counted on for these agencies to help get President Trump.

As I said, it is time for the UK and the US to have a serious conversation about their current and ex-spies being involved in US elections.

Southern_Boy , 5 hours ago

It wasn't the CIA. It was John Brennan and Clapper. The CIA, NSA FBI, DOJ and the Ukrainian Intelligence Service just went along working together and followed orders from Brennan who got them from Hillary and Obama.

Oh, and don't forget the GOP Globalist RINOs who also participated in the coup attempt: McCain, Romney, Kasich, Boehner, Lee and Richard Burr.

With Kasich now performing as a puppy dog for Biden at the Democrat Convention as a Democrat DNC executive, the re-alignment is almost complete: Globalist Nationalist Socialist Bolshevism versus American Populism, i.e. Elites versus Deplorables or Academics versus Smelly Wal-Mart people.

on target , 5 hours ago

No way. CIA up to their eyeballs in this as well as the State Department. Impossible for Russiagate or Ukrainegate without direct CIA and State involvement.

RightlyIndignent , 4 hours ago

Following Orders? How did that argument go at Nuremberg? (hint: not very well)

LeadPipeDreams , 6 hours ago

LOL - the CIA's main mission - despite their "official" charter, has always been to destabilize the US and its citizens via psyops, false flags, etc.

Covid-1984 is their latest and it appears most successful project yet.

Iconoclast27 , 5 hours ago

The CIA received a $200 million initial investment from the Rockefeller and Carnegie foundations when it was first established, that should tell you everything you need to know how who they truly work for.

A_Huxley , 6 hours ago

CIA, MI6, 5 eye nations.

All wanted to sway the USA their own way.

Let it Go , 8 hours ago

Almost as frightening as the concentrated power held by companies such as Facebook and Google is the fact Jeff Bezos, CEO of Amazon and the world's richest man, is the person who owns and controls the Washington Post. It is silly to think Jeff Bezos purchased the Washington Post in 2013 because he expected newspapers to make a lucrative resurgence.

It is more likely he purchased the long-trusted U.S. newspaper for the power it would ensure him in Washington when wielded as a propaganda mouthpiece to extend his ability to both shape and control public opinion. More on this subject in the article below.

https://Amazon, Jeff Bezos, And The Influential Washington Post_31.html

avoiceofliberty , 16 hours ago

The amazing thing about Binney's forensic analysis is that it has been around since 2018 .

It's also been clear since 2017 the hack of the DNC computers didn't hold up under scrutiny .

How it is the Democrats, the Deep State, and the legacy media are still able to cling to the remnants of these long discredited narratives is a mystery.

avoiceofliberty , 6 hours ago

At the official level, you have a point.

However, even before Mueller was appointed, a review of the materials in the extant public record of both the DNC "hack" and the history of Crowdstrike showed the narrative simply did not make sense. A detailed investigation of materials not made public was not necessary to shoot down the entire narrative.

Indeed, one of the great scandals of the Mueller probe is the way it did not bring prudential skepticism to the question of the DNC "hack". When building a case, either for public debate or for public trial, a dose of skepticism is healthy; it leads to a careful vetting of facts and reasoning.

Alice-the-dog , 6 hours ago

The CIA has been an agency wholly independent of the US government almost since its inception. It is not under any significant control by the government, and has its own agenda which may occasionally coincide with that of the government, but only coincidentally. It has its own view of how the world should look, and will not balk at any means necessary to achieve such. Including the murder of dis-favorable members of government.

snodgrass , 6 hours ago

It's the CIA and the FBI, Obama and people in his administration who cooked up Russiagate.

Floki_Ragnarsson , 7 hours ago

The CIA whacked JFK because he was going to slow the roll to Vietnam AND disband the CIA and reform it.

It is broken and needs to be disbanded and reformed along lines that actually WORK! The CIA missed the fall of the USSR, 9/11, etc. HTF does THAT happen?

DeportThemAll , 6 hours ago

The CIA didn't "miss" 9/11... they participated in it.

Let it Go , 8 hours ago

The CIA is a tool that when improperly used can do great damage.

Anyone who doesn't believe that countries use psychological warfare and propaganda to sway the opinions of people both in and outside of their country should be considered naive. Too many people America is more than a little hypocritical when they criticize other countries for trying to gain influence considering our history of meddling in the affairs of other countries.

Americans have every reason to be concerned and worried considering revelations of just how big the government intelligence agencies have grown since 9-11 and how unlimited their spying and surveillance operations have become. The article below explores this growth and questions whether we have lost control.

http://Psychological Warfare And Propaganda Out Of Control.html

tion , 16 hours ago

The idea of Binney and Jason Sullivan privately working to 'secure the vote' is something that I actually consider to be very eyebrow raising and alarming.

Son of Captain Nemo , 8 hours ago

Bill Binney under "B" in the only "yellow pages" that show a conscience and a soul!...

https://www.ae911truth.org/signatures/#/General/B/williambinneysevernMDUS

fliebinite , 9 hours ago

This is the dumbest article ever. Russiagate is a total fabrication of the FBI as per Clinesmith, CIA provided information that would have nipped it at the bud. Read the real news.

bringonthebigone , 9 hours ago

Wrong. this article is one small piece of the puzzle. Clinesmith is one small piece of the puzzle. The Flynn entrapment is one small piece of the puzzle. The Halper entrapment was one small piece of the puzzle.

Because Clinesmith at the FBI covered up the information saying Page was a CIA source does not mean it was a total FBI fabrication and does not mean the CIA was not involved and does not mean the DNC server hack is irrelevant.

Milley Weaver gets close in her recent video. https://www.youtube.com/watch?v=9HFxVvrXjCg

Sundance does a better job pulling it all together.

PKKA , 14 hours ago

Relations have already soured between Russia and the United States, and sanctions have been announced. Tensions have grown on the NATO-Russia border. The meat has already been rolled into the minced meat and it will not be possible to roll the minced meat back into the meat. The CIA got it. But the Russian people now absolutely understand that the United States will always be the enemy of Russia, no matter whether socialist or capitalist. But I like it even more than the feigned hypocritical "friendship". Russia has never reached such heights as during the good old Cold War. All Russians have a huge incentive, long live the new Cold War!

smacker , 12 hours ago

More and more people have worked out that the fabricated tensions between the US and Russia
and US and China have little to do with those two countries posing any sort of threat to world peace.

It is all about the US trying to remain in No.1 position as uni-polar top dog via the Anglo American Empire.
We see examples of this every day in the M/E, South China Sea, Taiwan, Libya all over Eastern Europe,
Ukraine, Iran and now Belaruse. HK was added along the way.

Both Russia and China openly want a multi-polar world order. But the US will never accept that.

Hence the prospect of war. The only unknown today is what and where the trigger will be.

smacker , 12 hours ago

More and more people have worked out that the fabricated tensions between the US and Russia
and US and China have little to do with those two countries posing any sort of threat to world peace.

It is all about the US trying to remain in No.1 position as uni-polar top dog via the Anglo American Empire.
We see examples of this every day in the M/E, South China Sea, Taiwan, Libya all over Eastern Europe,
Ukraine, Iran and now Belaruse. HK was added along the way.

Both Russia and China openly want a multi-polar world order. But the US will never accept that.

Hence the prospect of war. The only unknown today is what and where the trigger will be.

hang_the_banksters , 31 minutes ago

the best proof thAt Guccifer 2 was CIA hacking themselves to frame Wikileaks is this:

Guccifer has not yet been identified, indicted and arrested.

you'd think CIAFBINSA would be turning over every stone to the ends of the earth to bust Guccifer. we just had to endure 4 years of hysterical propaganda that Russia had hacked our election and that Trump was their secret agent. so Guccifer should be the Most Wanted Man on the planet. meanwhile, it's crickets from FBI. they arent even looking for him. because Guccifer is over at Langley. maybe someone outta ask Brennan where G2 is now.

remember when DOJ indicted all those GRU cybersoldiers? the evidence listed in the indictment was so stunning that i dont believe it. NSA so thoroughly hacked back into GRU that NSA was watching GRU through their own webcams and recording them doing Google searches to translate words which were written in Guccifer's blog posts about the DNC email leaks. NSA and DOJ must think we are all stupid, that we will believe NSA is so powerful to do that, yet they cant identify Guccifer.

i say i dont believe that for a second because no way Russian GRU are so stupid to even have webcams on the computers they use to hack, and it is absurd to think GRU soldiers on a Russian military base would be using Google instead of Yandex to translate words into English.

lay_arrow
ConanTheContrarian1 , 1 hour ago

As a confirmed conspiracy theorist since I came back from 'Nam, here's mine: The European nobility recognized with the American and French revolutions that they needed a better approach. They borrowed from the Tudors (who had to deal with Parliament) and began to rule by controlling the facade of representative government. This was enhanced by funding banks to control through currency, as well as blackmail and murder, and morphed into a complete propaganda machine like no other in history. The CIA, MI6 and Mossad, the mainstream media, deep plants in bureaucracy and "democratic" bodies all obey their dictates to create narratives that control our minds. Trump seems to offer hope, but remember, he could be their latest narrative.

greatdisconformity , 1 hour ago

A Democracy cannot function on a higher level than the general electorate.

The intelligence and education of the general electorate has been sliding for generations, because both political parties can play this to their advantage.

It is no accident that most of the messages coming from politicians are targeted to imbeciles.

[Jun 16, 2020] Veteran CIA Analyst- How An Internet 'Persona' Helped Birth Russiagate -

Jun 16, 2020 | www.zerohedge.com

Veteran CIA Analyst: How An Internet 'Persona' Helped Birth Russiagate


by Tyler Durden Tue, 06/16/2020 - 19:25 Twitter Facebook Reddit Email Print

Authored by Ray McGovern via ConsortiumNews.com,

Four years ago on June 15, 2016, a shadowy Internet persona calling itself "Guccifer 2.0" appeared out of nowhere to claim credit for hacking emails from the Democratic National Committee on behalf of WikiLeaks and implicate Russia by dropping "telltale" but synthetically produced Russian "breadcrumbs" in his metadata.

Thanks largely to the corporate media, the highly damaging story actually found in those DNC emails – namely, that the DNC had stacked the cards against Bernie Sanders in the party's 2016 primary – was successfully obscured .

The media was the message; and the message was that Russia had used G-2.0 to hack into the DNC, interfering in the November 2016 election to help Donald Trump win.

me frameborder=

Almost everybody still "knows" that – from the man or woman in the street to the forlorn super sleuth, Special Counsel Robert Swan Mueller III, who actually based indictments of Russian intelligence officers on Guccifer 2.0.

Blaming Russia was a magnificent distraction from the start and quickly became the vogue.

The soil had already been cultivated for "Russiagate" by Democratic PR gems like Donald Trump "kissing up" to former KGB officer Vladimir Putin and their "bromance" (bromides that former President Barack Obama is still using). Four years ago today, "Russian meddling" was off and running – on steroids – acquiring far more faux-reality than the evanescent Guccifer 2.0 persona is likely to get.

Here's how it went down :

about:blank

me frameborder=

Adding to other signs of fakery, there is hard evidence that G-2.0 was operating mostly in U.S. time zones and with local settings peculiar to a device configured for use within the US , as Tim Leonard reports here and here .)

Leonard is a software developer who started to catalog and archive evidence related to Guccifer 2.0 in 2017 and has issued detailed reports on digital forensic discoveries made by various independent researchers – as well as his own – over the past three years. Leonard points out that WikiLeaks said it did not use any of the emails G2.0 sent it, though it later published similar emails, opening the possibility that whoever created G2.0 knew what WikiLeaks had and sent it duplicates with the Russian fingerprints .

As Veteran Intelligence Professionals for Sanity (VIPS) told President Trump in a memorandum of July 24, 2017, titled "Was the 'Russian Hack' an Inside Job?":

"We do not think that the June 12, 14, & 15 timing was pure coincidence. Rather, it suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might have been ready to publish and to 'show' that it came from a Russian hack."

We added this about Guccifer 2.0 at the time:

"The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original 'Guccifer 2.0' material remains a mystery – as does the lack of any sign that the 'hand-picked analysts' from the FBI, CIA, and NSA, who wrote the misnomered 'Intelligence Community' Assessment dated January 6, 2017, gave any attention to forensics."

Guccifer 2.0 Seen As a Fraud

In our July 24, 2017 memorandum we also told President Trump that independent cyber investigators and VIPs had determined "that the purported 'hack' of the DNC by Guccifer 2.0 was not a hack, by Russia or anyone else. Rather it originated with a copy (onto an external storage device – a thumb drive, for example) by an insider. Information was leaked to implicate Russia. We do not know who or what the murky Guccifer 2.0 is. You may wish to ask the FBI. " [Emphasis added.].

Right. Ask the FBI. At this stage, President Trump might have better luck asking Attorney General William Barr, to whom the FBI is accountable – at least in theory. As for Barr, VIPs informed him in a June 5, 2020 memorandum that the head of CrowdStrike had admitted under oath on Dec. 5, 2017 that CrowdStrike has no concrete evidence that the DNC emails published by WikiLeaks on July 22, 2016 were hacked – by Russia or by anyone else. [Emphasis added.] This important revelation has so far escaped attention in the Russia-Russia-Russia "mainstream" media (surprise, surprise, surprise!).

Back to the Birth of G-2

It boggles the mind that so few Americans could see Russiagate for the farce it was. Most of the blame, I suppose, rests on a thoroughly complicit Establishment media. Recall: Assange's announcement on June 12, 2016 that he had Hillary Clinton-related emails came just six weeks before the Democratic convention. I could almost hear the cry go up from the DNC: Houston, We Have a Problem!

Here's how bad the problem for the Democrats was. The DNC emails eventually published by WikiLeaks on July 22, 2016, just three days before the Democratic convention, had been stolen on May 23 and 25. This would have given the DNC time to learn that the stolen material included documents showing how the DNC and Clinton campaign had manipulated the primaries and created a host of other indignities, such that Sanders' chances of winning the nomination amounted to those of a snowball's chance in the netherworld.

Clinton at the 2016 convention, via Wikimedia Commons.

To say this was an embarrassment would be the understatement of 2016. Worse still, given the documentary nature of the emails and WikiLeaks' enviable track record for accuracy, there would be no way to challenge their authenticity. Nevertheless, with the media in full support of the DNC and Clinton, however, it turned out to be a piece of cake to divert attention from the content of the emails to the "act of war" (per John McCain) that the Russian "cyber attack" was said to represent .

The outcome speaks as much to the lack of sophistication on the part of American TV watchers, as it does to the sophistication of the Democrats-media complicity and cover-up. How come so few could figure out what was going down?

It was not hard for some experienced observers to sniff a rat. Among the first to speak out was fellow Consortium News columnist Patrick Lawrence, who immediately saw through the Magnificent Diversion. I do not know if he fancies duck hunting, but he shot the Russiagate canard quite dead – well before the Democratic convention was over.

Magnificent Diversion

In late July 2016, Lawrence was sickened, as he watched what he immediately recognized as a well planned, highly significant deflection. The Clinton-friendly media was excoriating Russia for "hacking" DNC emails and was glossing over what the emails showed ; namely, that the Clinton Dems had pretty much stolen the nomination from Sanders.

It was already clear even then that the Democrats, with invaluable help from intelligence leaks and other prepping to the media, had made good use of those six weeks between Assange's announcement that he had emails "related to Hillary Clinton" and the opening of the convention.

The media was primed to castigate the Russians for "hacking," while taking a prime role in the deflection. It was a liminal event of historic significance, as we now know. The "Magnificent Diversion" worked like a charm – and then it grew like Topsy.

Lawrence said he had "fire in the belly" on the morning of July 25 as the Democratic convention began and wrote what follows pretty much "in one long, furious exhale" within 12 hours of when the media started really pushing the "the Russians-did-it" narrative.

Patrick Lawrence

Below is a slightly shortened text of his article :

"Now wait a minute, all you upper-case "D" Democrats. A flood light suddenly shines on your party apparatus, revealing its grossly corrupt machinations to fix the primary process and sink the Sanders campaign, and within a day you are on about the evil Russians having hacked into your computers to sabotage our elections

Is this a joke? Are you kidding? Is nothing beneath your dignity? Is this how lowly you rate the intelligence of American voters?

Clowns. Subversives. Do you know who you remind me of? I will tell you: Nixon, in his famously red-baiting campaign – a disgusting episode – during his first run for the Senate, in 1950. Your political tricks are as transparent and anti-democratic as his, it is perfectly fair to say.

I confess to a heated reaction to events since last Friday [July 22] among the Democrats, specifically in the Democratic National Committee. I should briefly explain

The Sanders people have long charged that the DNC has had its fingers on the scale, as one of them put it the other day, in favor of Hillary Clinton's nomination. The prints were everywhere – many those of Debbie Wasserman Schultz, who has repeatedly been accused of anti-Sanders bias. Schultz, do not forget, co-chaired Clinton's 2008 campaign against Barack Obama. That would be enough to disqualify her as the DNC's chair in any society that takes ethics seriously, but it is not enough in our great country. Chairwoman she has been for the past five years.

Last Friday WikiLeaks published nearly 20,000 DNC email messages providing abundant proof that Sanders and his staff were right all along. The worst of these, involving senior DNC officers, proposed Nixon-esque smears having to do with everything from ineptitude within the Sanders campaign to Sanders as a Jew in name only and an atheist by conviction.

NEVER MISS THE NEWS THAT MATTERS MOST

ZEROHEDGE DIRECTLY TO YOUR INBOX

Receive a daily recap featuring a curated list of must-read stories.

Wasserman fell from grace on Monday. Other than this, Democrats from President Obama to Clinton and numerous others atop the party's power structure have had nothing to say, as in nothing, about this unforgivable breach. They have, rather, been full of praise for Wasserman Schultz. Brad Marshall, the D.N.C.'s chief financial officer, now tries to deny that his Jew-baiting remark referred to Sanders. Good luck, Brad: Bernie is the only Jew in the room.

The caker came on Sunday, when Robby Mook, Clinton's campaign manager, appeared on ABC's "This Week" and CNN's "State of the Union" to assert that the D.N.C.'s mail was hacked "by the Russians for the purpose of helping Donald Trump." He knows this – knows it in a matter of 24 hours – because "experts" – experts he will never name – have told him so.

What's disturbing to us is that experts are telling us that Russian state actors broke into the DNC, stole these emails, and other experts are now saying that Russians are releasing these emails for the purpose of helping Donald Trump.

Is that what disturbs you, Robby? Interesting. Unsubstantiated hocus-pocus, not the implications of these events for the integrity of Democratic nominations and the American political process? The latter is the more pressing topic, Robby. You are far too long on anonymous experts for my taste, Robby. And what kind of expert, now that I think of it, is able to report to you as to the intentions of Russian hackers – assuming for a sec that this concocted narrative has substance?

Making lemonade out of a lemon, the Clinton campaign now goes for a twofer. Watch as it advances the Russians-did-it thesis on the basis of nothing, then shoots the messenger, then associates Trump with its own mess – and, finally, gets to ignore the nature of its transgression (which any paying-attention person must consider grave).

Preposterous, readers. Join me, please, in having absolutely none of it. There is no "Russian actor" at the bottom of this swamp, to put my position bluntly. You will never, ever be offered persuasive evidence otherwise.

Reluctantly, I credit the Clinton campaign and the DNC with reading American paranoia well enough such that they may make this junk stick. In a clear sign the entire crowd-control machine is up and running, The New York Times had a long, unprofessional piece about Russian culprits in its Monday editions. It followed Mook's lead faithfully: not one properly supported fact, not one identified "expert," and more conditional verbs than you've had hot dinners – everything cast as "could," "might," "appears," "would," "seems," "may." Nothing, once again, as to the very serious implications of this affair for the American political process.

Now comes the law. The FBI just announced that it will investigate – no, not the DNC's fraudulent practices (which surely breach statutes), but "those who pose a threat in cyberspace." it is the invocation of the Russians that sends me over the edge. My bones grow weary

We must take the last few days' events as a signal of what Clinton's policy toward Russia will look like should she prevail in November. Turning her party's latest disgrace into an occasion for another round of Russophobia is mere preface, but in it you can read her commitment to the new crusade.

Trump, to make this work, must be blamed for his willingness to negotiate with Moscow. This is now among his sins. Got that? Anyone who says he will talk to the Russians has transgressed the American code. Does this not make Hillary Clinton more than a touch Nixonian?

I am developing nitrogen bends from watching the American political spectacle. One can hardly tell up from down. Which way for a breath of air?"

A year later Lawrence interviewed several of us VIPs, including our two former NSA technical directors and on Aug. 9, 2017 published an article for The Nation titled, "A New Report Raises Big Questions About Last Year's DNC Hack."

Lawrence wrote, "Former NSA experts, now members of Veteran Intelligence Professionals for Sanity (VIPs), say it wasn't a hack at all, but a leak – an inside job by someone with access to the DNC's system."

And so it was. But, sadly, that cut across the grain of the acceptable Russia-gate narrative at The Nation at the time. Its staff, seriously struck by the HWHW (Hillary Would Have Won) virus, rose up in rebellion. A short time later, there was no more room at The Nation for his independent-minded writing.


Drop-Hammer , 2 hours ago

His name was (((Seth Rich))).

zoomie92 , 1 hour ago

Direct USB download to chip or portable HD was the only way to get those download speed shown on the file metadata. This has been proven in multiple independent ways. But the press is filled with ******* retards - and so is the country.

Franko , 1 hour ago

Rest in Peace Mr Seth.

I believe many US officials have enough and want to tell the others about this.

Question:were they should be go to spread the news?To which country before been assasinated?

To end like Julian Assange or like Snowden?

belogical , 2 hours ago

...Gucifer had much less to do with this than the Obama admin. They were using the intelligence community for no good and as their crimes became visible they had to commit bigger and bigger crimes to cover them up. In the end a large part of the DOJ, FBI and Obama admin should be held accountable for this, but when you get this high they likely won't. You can already see Lindsey Graham of the deep state finally holding hearing to spin the narrative before the Durham probe becomes public. Unfortunate but only a few will get their hands slapped and the true person, Obama who deserve to be prosecuted will likely skate.

PedroS , 2 hours ago

Crowdstrike. The owners should be in jail for their role.

Slaytheist , 2 hours ago

Crowdstrike IS Guccifer.

They were ordered by the criminal DNC org to cover the fact that the data was downloaded internally, in order to hide the connection to the Podesta/Clinton ordered hit on person who did it - Seth Rich.

Weedlord Bonerhitler , 3 hours ago

The computer of a DNC operative named Warren Flood was used to disseminate the Guccifer 2.0 disinfo tranche. Adam Carter had the analysis IIRC.

Giant Meteor , 3 hours ago

Always good to hear from Ray!

philipat , 39 minutes ago

Tick tock, still no indictments and soon the campaign will be in full swing so that everything will be attacked as "political". Is Durham done?

[May 27, 2020] Brennan ears over Guccifer 2.0 mask -- CIA is the most probable origin of Gussifer 2.0

If DNC was hack not a leak, then NSA would have all information about the hack.
May 27, 2020 | consortiumnews.com

www.youtube.com/watch?v=_j1qOs0dE4I


P. Michael Garber , May 26, 2020 at 22:21

I'm afraid it won't matter how thorough the alternative media debunking of Russiagate becomes – as long as mainstream media sticks to the story, the neoliberal majority will too, because it is like catnip to them, absolving responsibility for the defeat, casting Clinton as the victim of an evil foreign despot, and delegitimizing Trump. Truth is tossed to the wind by this freight train of powerful interests.

I have little hope Barr and Durham will indict anyone high level.

Ray twice mentioned something about Sanders getting hosed again in the 2020 primary. I thought it seemed weird how suddenly the primary was declared "over." If there is evidence of DNC shenanigans in 2020, that would be a very interesting and timely topic.

Mark McCarty , May 25, 2020 at 21:25

On June 12, Assange announces Wikileaks will soon be releasing "emails pertinent to Hillary". On June 14th, Crowdstrike announces: someone, probably the Russians, has hacked the DNC and taken a Trump opposition research document; the very next day, G2.0 makes his first public appearance and posts the DNC's Trump oppo research document, with "Russian fingerprints" intentionally implanted in its metadata. (We now know that he had actually acquired this from PODESTA's emails, where it appears as an attachment – oops!) Moreover, G2.0 announces that he was the source of the "emails pertinent to Hillary" – DNC emails – that Assange was planning to release.

This strongly suggests that the G2.0 persona was working in collusion with Crowdstrike to perpetrate the hoax that the GRU had hacked the DNC to provide their emails to Wikileaks. Consistent with this, multiple cyberanalyses point to G2.0 working at various points In the Eastern, Central, and Western US time zones. (A mere coincidence that the DNC is in the eastern zone, and that Crowdstrike has offices in the central and western zones?)

If Crowdstrike honestly believed that the DNC had been hacked by the GRU, would there have been any need for them to perpetrate this fraud?

It is therefore reasonable to suspect, as Ray McGovern has long postulated, that Crowdstrike may have FAKED a GRU hack, to slander Russia and Assange, while distracting attention from the content of the released emails.

As far as we know, the only "evidence" that Crowdstrike has for GRU being the perpetrator of the alleged hack is the presence of "Fancy Bear" malware on the DNC server. But as cyberanalysts Jeffrey Carr and George Eliason have pointed out, this software is also possessed by Ukrainian hackers working in concert with Russian traitors and the Atlantic Council – with which the founders of Crowdstrike are allied.

Here's a key question: When Assange announced the impending release of "emails pertinent to Hillary" on June 12, how did Crowdstrike and G2.0 immediately know he was referring to DNC emails? Many people – I, for example – suspected he was referring to her deleted Secretary of State emails.

Here's a reasonable hypothesis – Our intelligence agencies were monitoring all communications with Wikileaks. If so, they could have picked up the communications between SR and Wikileaks that Sy Hersh's FBI source described. They then alerted the DNC that their emails were about to leaked to Wikileaks. The DNC then contacted Crowdstrike, which arranged for a "Fancy Bear hack" of the DNC servers. Notably, cyberanalysts have determined that about 2/3 of the Fancy Bear malware found on the DNC servers had been compiled AFTER the date that Crowdstrike was brought in to "roust the hackers".

Of course, this elaborate hoax would have come to grief if the actual leaker had come forward. Which might have had something to do with the subsequent "botched robbery" in which SR was slain.

Tim , May 25, 2020 at 20:33

How does the murder of the DNC staffer fit in?

Linda Wood , May 26, 2020 at 23:00

DNC staffer Seth Rich was murdered on July 10, 2016, amid contoversy over who provided DNC emails to Wikileaks and over a pending lawsuit concerning voter suppression during the 2016 primaries. Wikileaks offered a $20,000 reward for information about his murder, leading some to believe he was their source for the DNC emails. He was reported to have been a potential witness in the voter suppression lawsuit filed the day after his death.

mockingbirdpaper (dot) com/content/local-activist-files-suit-access-exit-polling-data-dead-witness-blocks-path-truth

[May 24, 2020] Guccifer 2.0 was always John Brennan 1.0

Highly recommended!
Images deleted.
False flag operation by CIA or CrowdStrike as CIA constructor: CIA ears protrude above Gussifer 2.0 hat.
Notable quotes:
"... Guccifer 2.0 fabricated evidence to claim credit for hacking the DNC (using files that were really Podesta attachments) . ..."
"... Guccifer 2.0’s Russian breadcrumbs mostly came from deliberate processes & needless editing of documents . ..."
"... Guccifer 2.0’s Russian communications signals came from the persona choosing to use a proxy server in Moscow and choosing to use a Russian VPN service as end-points (and they used an email service that forwards the sender’s IP address, which made identifying that signal a relatively trivial task.) ..."
"... A considerable volume of evidence pointed at Guccifer 2.0’s activities being in American timezones (twice as many types of indicators were found pointing at Guccifer 2.0’s activities being in American timezones than anywhere else). ..."
"... The American timezones were incidental to other activities (eg. blogging , social media , emailing a journalist , archiving files , etc) and some of these were recorded independently by service providers. ..."
"... A couple of pieces of evidence with Russian indicators present had accompanying locale indicators that contradicted this which suggested the devices used hadn’t been properly set up for use in Russia (or Romania) but may have been suitable for other countries (including America) . ..."
"... On the same day that Guccifer 2.0 was plastering Russian breadcrumbs on documents through a deliberate process, choosing to use Russian-themed end-points and fabricating evidence to claim credit for hacking the DNC, the operation attributed itself to WikiLeaks. ..."
"... Guccifer 2.0 chose to use insecure communications to ask WikiLeaks to confirm receipt of “DNC emails” on July 6, 2016. Confirmation of this was not provided at that time but WikiLeaks did confirm receipt of a “1gb or so” archive on July 18, 2016. ..."
"... The alleged GRU officer we are told was part of an operation to deflect from Russian culpability suggested that Assange “may be connected with Russians”. ..."
"... Guccifer 2.0 fabricated evidence to claim credit for hacking the DNC, covered itself (and its files) in what were essentially a collection of “Made In Russia” labels through deliberate processes and decisions made by the persona, and, then, it attributed itself to WikiLeaks with a claim that was contradicted by subsequent communications between both parties. ..."
"... While we are expected to accept that Guccifer 2.0’s efforts between July 6 and July 18 were a sincere effort to get leaks to WikiLeaks, considering everything we now know about the persona, it seems fair to question whether Guccifer 2.0’s intentions towards WikiLeaks may have instead been malicious. ..."
"... Guccifer 2.0 was always John Brennan 1.0 ..."
"... Was Guccifer II part of the Stefan Halper organization that lured Papadopoulos and maliciously maligned others? ..."
"... I believe Guccifer 2.0 was created by the CIA to falsely pin blame on the Russians for info that Seth Rich gave to WikiLeaks. Read for yourself: http://g-2.space/ ..."
May 24, 2020 | www.zerohedge.com

Authored by Tim Leonard via ConsortiumNews.com,

Why would an alleged GRU officer - supposedly part of an operation to deflect Russian culpability - suggest that Assange “may be connected with Russians?”

In December, I reported on digital forensics evidence relating to Guccifer 2.0 and highlighted several key points about the mysterious persona that Special Counsel Robert Mueller claims was a front for Russian intelligence to leak Democratic Party emails to WikiLeaks:

On the same day that Guccifer 2.0 was plastering Russian breadcrumbs on documents through a deliberate process, choosing to use Russian-themed end-points and fabricating evidence to claim credit for hacking the DNC, the operation attributed itself to WikiLeaks.

This article questions what Guccifer 2.0’s intentions were in relation to WikiLeaks in the context of what has been discovered by independent researchers during the past three years.

Timing

On June 12, 2016, in an interview with ITV’s Robert Peston, Julian Assange confirmed that WikiLeaks had emails relating to Hillary Clinton that the organization intended to publish. This announcement was prior to any reported contact with Guccifer 2.0 (or with DCLeaks).

On June 14, 2016, an article was published in The Washington Post citing statements from two CrowdStrike executives alleging that Russian intelligence hacked the DNC and stole opposition research on Trump. It was apparent that the statements had been made in the 48 hours prior to publication as they referenced claims of kicking hackers off the DNC network on the weekend just passed (June 11-12, 2016).

On that same date, June 14, DCLeaks contacted WikiLeaks via Twitter DM and for some reason suggested that both parties coordinate their releases of leaks. (It doesn’t appear that WikiLeaks responded until September 2016).

On June 15, 2016, Guccifer 2.0 appeared for the first time. He fabricated evidence to claim credit for hacking the DNC (using material that wasn’t from the DNC), used a proxy in Moscow to carry out searches (for mostly English language terms including a grammatically incorrect and uncommon phrase that the persona would use in its first blog post) and used a Russian VPN service to share the fabricated evidence with reporters. All of this combined conveniently to provide false corroboration for several claims made by CrowdStrike executives that were published just one day earlier in The Washington Post.

[CrowdStrike President Shawn Henry testified under oath behind closed doors on Dec. 5, 2017 to the U.S. House intelligence committee that his company had no evidence that Russian actors removed anything from the DNC servers. This testimony was only released earlier this month.]

First Claim Versus First Contact

On the day it emerged, the Guccifer 2.0 operation stated that it had given material to WikiLeaks and asserted that the organization would publish that material soon:

By stating that WikiLeaks would “publish them soon” the Guccifer 2.0 operation implied that it had received confirmation of intent to publish.

However, the earliest recorded communication between Guccifer 2.0 and WikiLeaks didn’t occur until a week later (June 22, 2016) when WikiLeaks reached out to Guccifer 2.0 and suggested that the persona send any new material to them rather than doing what it was doing:

[Excerpt from Special Counsel Mueller’s report. Note: “stolen from the DNC” is an editorial insert by the special counsel.]

If WikiLeaks had already received material and confirmed intent to publish prior to this direct message, why would they then suggest what they did when they did? WikiLeaks says it had no prior contact with Guccifer 2.0 despite what Guccifer 2.0 had claimed.

Needing To Know What WikiLeaks Had

Fortunately, information that gives more insight into communications on June 22, 2016 was made available on April 29, 2020 via a release of the Roger Stone arrest warrant application.

Here is the full conversation on that date (according to the application):

@WikiLeaks: Do you have secure communications?

@WikiLeaks: Send any new material here for us to review and it will have a much higher impact than what you are doing. No other media will release the full material.

@GUCCIFER_2: what can u suggest for a secure connection? Soft, keys, etc? I’m ready to cooperate with you, but I need to know what’s in your archive 80gb? Are there only HRC emails? Or some other docs? Are there any DNC docs? If it’s not secret when you are going to release it?

@WikiLeaks: You can send us a message in a .txt file here [link redacted]

@GUCCIFER_2: do you have GPG?

Why would Guccifer 2.0 need to know what material WikiLeaks already had? Certainly, if it were anything Guccifer 2.0 had sent (or the GRU had sent) he wouldn’t have had reason to inquire.

The more complete DM details provided here also suggest that both parties had not yet established secure communications.

Further communications were reported to have taken place on June 24, 2016:

@GUCCIFER_2: How can we chat? Do u have jabber or something like that?

@WikiLeaks: Yes, we have everything. We’ve been busy celebrating Brexit. You can also email an encrypted message to [email protected]. They key is here.

and June 27, 2016:

@GUCCIFER_2: Hi, i’ve just sent you an email with a text message encrypted and an open key.

@WikiLeaks: Thanks.

@GUCCIFER_2: waiting for ur response. I send u some interesting piece.

Guccifer 2.0 said he needed to know what was in the 88GB ‘insurance’ archive that WikiLeaks had posted on June 16, 2016 and it’s clear that, at this stage, secure communications had not been established between both parties (which would seem to rule out the possibility of encrypted communications prior to June 15, 2016, making Guccifer 2.0’s initial claims about WikiLeaks even more doubtful).

Claims DCLeaks Is A Sub-Project Of WikiLeaks

On June 27, 2016, in an email chain to the Smoking Gun (exposing Guccifer 2.0 apparently being in the Central US timezone), Guccifer 2.0 claimed that DCLeaks was a “sub-project” of WikiLeaks.

There’s no evidence to support this. “Envoy le” is also a mistake as standard French emails read: “Envoye le.” Claims allegedly made by Guccifer 2.0 in a Twitter DM to DCLeaks on September 15, 2016 suggest that he knew this was nonsense:

There was no evidence of WikiLeaks mentioning this to Guccifer 2.0 nor any reason for why WikiLeaks couldn’t just send a DM to DCLeaks themselves if they had wanted to.

(It should also be noted that this Twitter DM activity between DCLeaks and Guccifer 2.0 is alleged by Mueller to be communications between officers within the same unit of the GRU, who, for some unknown reason, decided to use Twitter DMs to relay such information rather than just communicate face to face or securely via their own local network.)

Guccifer 2.0 lied about DCLeaks being a sub-project of WikiLeaks and then, over two months later, was seen trying to encourage DCLeaks to communicate with WikiLeaks by relaying an alleged request from WikiLeaks that there is no record of WikiLeaks ever making (and which WikiLeaks could have done themselves, directly, if they had wanted to).

The ‘About 1GB’ / ‘1Gb or So’ Archive

On July 4, 2016, Guccifer 2.0 contacted WikiLeaks:

@GUCCIFER_2: hi there, check up r email, waiting for reply.

This was followed up on July 6, 2016 with the following conversation:

@GUCCIFER_2: have you received my parcel?

@WikiLeaks: Not unless it was very recent. [we haven’ t checked in 24h].

@GUCCIFER_2: I sent it yesterday, an archive of about 1 gb. via [website link]. and check your email.

@WikiLeaks: Wil[l] check, thanks.

@GUCCIFER_2: let me know the results.

@WikiLeaks: Please don’t make anything you send to us public. It’s a lot of work to go through it and the impact is severely reduced if we are not the first to publish.

@GUCCIFER_2: agreed. How much time will it take?

@WikiLeaks: likely sometime today.

@GUCCIFER_2: will u announce a publication? and what about 3 docs sent u earlier?

@WikiLeaks: I don’t believe we received them. Nothing on ‘Brexit’ for example.

@GUCCIFER_2: wow. have you checked ur mail?

@WikiLeaks: At least not as of 4 days ago . . . . For security reasons mail cannot be checked for some hours.

@GUCCIFER_2: fuck, sent 4 docs on brexit on jun 29, an archive in gpg ur submission form is too fucking slow, spent the whole day uploading 1 gb.

@WikiLeaks: We can arrange servers 100x as fast. The speed restrictions are to anonymise the path. Just ask for custom fast upload point in an email.

@GUCCIFER_2: will u be able to check ur email?

@WikiLeaks: We’re best with very large data sets. e.g. 200gb. these prove themselves since they’re too big to fake.

@GUCCIFER_2: or shall I send brexit docs via submission once again?

@WikiLeaks: to be safe, send via [web link]

@GUCCIFER_2: can u confirm u received dnc emails?

@WikiLeaks: for security reasons we can’ t confirm what we’ve received here. e.g., in case your account has been taken over by us intelligence and is probing to see what we have.

@GUCCIFER_2: then send me an encrypted email.

@WikiLeaks: we can do that. but the security people are in another time zone so it will need to wait some hours.

@WikiLeaks: what do you think about the FBl’ s failure to charge? To our mind the clinton foundation investigation has always been the more serious. we would be very interested in all the emails/docs from there. She set up quite a lot of front companies. e.g in sweden.

@GUCCIFER_2: ok, i’ll be waiting for confirmation. as for investigation, they have everything settled, or else I don’t know how to explain that they found a hundred classified docs but fail to charge her.

@WikiLeaks: She’s too powerful to charge at least without something stronger. s far as we know, the investigation into the clinton foundation remains open e hear the FBI are unhappy with Loretta Lynch over meeting Bill, because he’s a target in that investigation.

@GUCCIFER_2: do you have any info about marcel lazar? There’ve been a lot of rumors of late.

@WikiLeaks: the death? [A] fake story.

@WikiLeaks: His 2013 screen shots of Max Blumenthal’s inbox prove that Hillary secretly deleted at least one email about Libya that was meant to be handed over to Congress. So we were very interested in his co-operation with the FBI.

@GUCCIFER_2: some dirty games behind the scenes believe Can you send me an email now?

@WikiLeaks: No; we have not been able to activate the people who handle it. Still trying.

@GUCCIFER_2: what about tor submission? [W]ill u receive a doc now?

@WikiLeaks: We will get everything sent on [weblink].” [A]s long as you see \”upload succseful\” at the end. [I]f you have anything hillary related we want it in the next tweo [sic] days prefable [sic] because the DNC is approaching and she will solidify bernie supporters behind her after.

@GUCCIFER_2: ok. I see.

@WikiLeaks: [W]e think the public interest is greatest now and in early october.

@GUCCIFER_2: do u think a lot of people will attend bernie fans rally in philly? Will it affect the dnc anyhow?

@WikiLeaks: bernie is trying to make his own faction leading up to the DNC. [S]o he can push for concessions (positions/policies) or, at the outside, if hillary has a stroke, is arrested etc, he can take over the nomination. [T]he question is this: can bemies supporters+staff keep their coherency until then (and after). [O]r will they dis[s]olve into hillary’ s camp? [P]resently many of them are looking to damage hilary [sic] inorder [sic] to increase their unity and bargaining power at the DNC. Doubt one rally is going to be that significant in the bigger scheme. [I]t seems many of them will vote for hillary just to prevent trump from winning.

@GUCCIFER_2: sent brexit docs successfully.

@WikiLeaks: :))).

@WikiLeaks: we think trump has only about a 25% chance of winning against hillary so conflict between bernie and hillary is interesting.

@GUCCIFER_2: so it is.

@WikiLeaks: also, it’ s important to consider what type of president hillary might be. If bernie and trump retain their groups past 2016 in significant number, then they are a restraining force on hillary.

[Note: This was over a week after the Brexit referendum had taken place, so this will not have had any impact on the results of that. It also doesn’t appear that WikiLeaks released any Brexit content around this time.]

On July 14, 2016, Guccifer 2.0 sent an email to WikiLeaks, this was covered in the Mueller report:

It should be noted that while the attachment sent was encrypted, the email wasn’t and both the email contents and name of the file were readable.

The persona then opted, once again, for insecure communications via Twitter DMs:

@GUCCIFER_2: ping. Check ur email. sent u a link to a big archive and a pass.

@WikiLeaks: great, thanks; can’t check until tomorrow though.

On July 17, 2016, the persona contacted WikiLeaks again:

@GUCCIFER_2: what bout now?

On July 18, 2016, WikiLeaks responded and more was discussed:

@WikiLeaks: have the 1 Gb or so archive.

@GUCCIFER_2: have u managed to extract the files?

@WikiLeaks: yes. turkey coup has delayed us a couple of days. [O]therwise all ready[.]

@GUCCIFER_2: so when r u about to make a release?

@WikiLeaks: this week. [D]o you have any bigger datasets? [D]id you get our fast transfer details?

@GUCCIFER_2: i’ll check it. did u send it via email?

@WikiLeaks: yes.

@GUCCIFER_2: to [web link]. [I] got nothing.

@WikiLeaks: check your other mail? this was over a week ago.

@GUCCIFER_2:oh, that one, yeah, [I] got it.

@WikiLeaks: great. [D]id it work?

@GUCCIFER_2:[I] haven’ t tried yet.

@WikiLeaks: Oh. We arranged that server just for that purpose. Nothing bigger?

@GUCCIFER_2: let’s move step by step, u have released nothing of what [I] sent u yet.

@WikiLeaks: How about you transfer it all to us encrypted. [T]hen when you are happy, you give us the decrypt key. [T]his way we can move much faster. (A]lso it is protective for you if we already have everything because then there is no point in trying to shut you up.

@GUCCIFER_2: ok, i’ll ponder it

Again, we see a reference to the file being approximately one gigabyte in size.

Guccifer 2.0’s “so when r u about to make a release?” seems to be a question about his files. However, it could have been inferred as generally relating to what WikiLeaks had or even material relating to the “Turkey Coup” that WikiLeaks had mentioned in the previous sentence and that were published by the following day (July 19, 2016).

The way this is reported in the Mueller report, though, prevented this potential ambiguity being known (by not citing the exact question that Guccifer 2.0 had asked and the context immediately preceding it.

Four days later, WikiLeaks published the DNC emails.

Later that same day, Guccifer 2.0 tweeted: “@wikileaks published #DNCHack docs I’d given them!!!”.

Guccifer 2.0 chose to use insecure communications to ask WikiLeaks to confirm receipt of “DNC emails” on July 6, 2016. Confirmation of this was not provided at that time but WikiLeaks did confirm receipt of a “1gb or so” archive on July 18, 2016.

Guccifer 2.0’s emails to WikiLeaks were also sent insecurely.

We cannot be certain that WikiLeaks statement about making a release was in relation to Guccifer 2.0’s material and there is even a possibility that this could have been in reference to the Erdogan leaks published by WikiLeaks on July 19, 2016.

Ulterior Motives?

While the above seems troubling there are a few points worth considering:

Considering all of this and the fact Guccifer 2.0 effectively covered itself in “Made In Russia” labels (by plastering files in Russian metadata and choosing to use a Russian VPN service and a proxy in Moscow for it’s activities) on the same day it first attributed itself to WikiLeaks, it’s fair to suspect that Guccifer 2.0 had malicious intent towards WikiLeaks from the outset.

If this was the case, Guccifer 2.0 may have known about the DNC emails by June 30, 2016 as this is when the persona first started publishing attachments from those emails.

Seth Rich Mentioned By Both Parties

WikiLeaks Offers Reward

On August 9, 2016, WikiLeaks tweeted:

ANNOUNCE: WikiLeaks has decided to issue a US$20k reward for information leading to conviction for the murder of DNC staffer Seth Rich.

— WikiLeaks (@wikileaks) August 9, 2016

In an interview with Nieuwsuur that was posted the same day, Julian Assange explained that the reward was for a DNC staffer who he said had been “shot in the back, murdered”. When the interviewer suggested it was a robbery Assange disputed it and stated that there were no findings.

When the interviewer asked if Seth Rich was a source, Assange stated, “We don’t comment on who our sources are”.

When pressed to explain WikiLeaks actions, Assange stated that the reward was being offered because WikiLeaks‘ sources were concerned by the incident. He also stated that WikiLeaks were investigating.

Speculation and theories about Seth Rich being a source for WikiLeaks soon propagated to several sites and across social media.

Guccifer 2.0 Claims Seth Rich As His Source

On August 25, 2016, approximately three weeks after the reward was offered, Julian Assange was due to be interviewed on Fox News on the topic of Seth Rich.

On that same day, in a DM conversation with the actress Robbin Young, Guccifer 2.0 claimed that Seth was his source (despite previously claiming he obtained his material by hacking the DNC).

Why did Guccifer 2.0 feel the need to attribute itself to Seth at this time?

[Note: I am not advocating for any theory and am simply reporting on Guccifer 2.0’s effort to attribute itself to Seth Rich following the propagation of Rich-WikiLeaks association theories online.]

Special Counsel Claims

In Spring, 2019, Special Counsel Robert Mueller, who was named to investigate Russian interference in the 2016 U.S. general election, delivered his final report.

It claimed:

Guccifer 2.0 contradicted his own hacking claims to allege that Seth Rich was his source and did so on the same day that Julian Assange was due to be interviewed by Fox News (in relation to Seth Rich).

No communications between Guccifer 2.0 and Seth Rich have ever been reported.

Suggesting Assange Connected To Russians

In the same conversation Guccifer 2.0 had with Robbin Young where Rich’s name is mentioned (on August 25, 2016), the persona also provided a very interesting response to Young mentioning “Julian” (in reference to Julian Assange):

The alleged GRU officer we are told was part of an operation to deflect from Russian culpability suggested that Assange “may be connected with Russians”.

Guccifer 2.0’s Mentions of WikiLeaks and Assange

Guccifer 2.0 mentioned WikiLeaks or associated himself with their output on several occasions:

  1. June 15, 2016: claiming to have sent WikiLeaks material on his blog.
  2. June 27, 2016: when he claimed DCLeaks was a sub-project of WikiLeaks.
  3. July 13, 2016: Joe Uchill of The Hill reported that Guccifer 2.0 had contacted the publication and stated: “The press gradually forget about me, [W]ikileaks is playing for time and have some more docs.”
  4. July 22nd, 2016: claimed credit when WikiLeaks published the DNC leaks.
  5. August 12, 2016: It was reported in The Hill that Guccifer 2.0 had released material to the publication. They reported: “The documents released to The Hill are only the first section of a much larger cache. The bulk, the hacker said, will be released on WikiLeaks.”
  6. August 12, 2016: Tweeted that he would “send the major trove of the #DCCC materials and emails to #wikileaks“.
  7. September 15, 2016: telling DCLeaks that WikiLeaks wanted to get in contact with them.
  8. October 4, 2016: Congratulating WikiLeaks on their 10th anniversary via its blog. Also states: “Julian, you are really cool! Stay safe and sound!”. (This was the same day on which Guccifer 2.0 published his “Clinton Foundation” files that were clearly not from the Clinton Foundation.)
  9. October 17, 2016: via Twitter, stating “i’m here and ready for new releases. already changed my location thanks @wikileaks for a good job!”

Guccifer 2.0 also made some statements in response to WikiLeaks or Assange being mentioned:

  1. June 17, 2016: in response to The Smoking Gun asking if Assange would publish the same material it was publishing, Guccifer 2.0 stated: “I gave WikiLeaks the greater part of the files, but saved some for myself,”
  2. August 22, 2016: in response to Raphael Satter suggesting that Guccifer 2.0 send leaks to WikiLeaks, the persona stated: “I gave wikileaks a greater part of docs”.
  3. August 25, 2016: in response to Julian Assange’s name being mentioned in a conversation with Robbin Young, Guccifer 2.0 stated: “he may be connected with Russians”.
  4. October 18, 2016: a BBC reported asked Guccifer 2.0 if he was upset that WikiLeaks had “stole his thunder” and “do you still support Assange?”. Guccifer 2.0 responded: “i’m glad, together we’ll make America great again.”.

Guccifer 2.0 fabricated evidence to claim credit for hacking the DNC, covered itself (and its files) in what were essentially a collection of “Made In Russia” labels through deliberate processes and decisions made by the persona, and, then, it attributed itself to WikiLeaks with a claim that was contradicted by subsequent communications between both parties.

Guccifer 2.0 then went on to lie about WikiLeaks, contradicted its own hacking claims to attribute itself to Seth Rich and even alleged that Julian Assange “may be connected with Russians”.

While we are expected to accept that Guccifer 2.0’s efforts between July 6 and July 18 were a sincere effort to get leaks to WikiLeaks, considering everything we now know about the persona, it seems fair to question whether Guccifer 2.0’s intentions towards WikiLeaks may have instead been malicious.


xxx 2 minutes ago (Edited)

Everything involving the Russian hoax was set up by the Deep States around the world. Implicate, discredit and destroy all those like Rich, Assange, Flynn and those who knew the truth. Kill the messenger....literally.

xxx 10 minutes ago

here's what really happened:

an American hacker breached Podesta's gmail on March 13 2016 and then uploaded it to Wikileaks via Tor sometime between April and May.

the NSA and CIA have hacked into Wikileaks' Tor file server to watch for new leaks to stay ahead of them to prepare. they saw Podesta's emails leaked and launched a counter infowar operation.

Brennan's CIA created the Guccifer 2.0 persona, with phony Russian metadata artifacts, using digital forgery techniques seen in Vault7. Crowdstrike was already on the premises of DNC since 2015, with their overly expensive security scanner watching the DNC network. Crowdstrike had access to any DNC files they wanted. CIA, FBI and Crowdstrike colluded to create a fake leak of DNC docs through their Guccifer 2.0 cutout. they didn't leak any docs of high importance, which is why we never saw any smoking guns from DNC leaks or DCLeaks.

you have to remember, the whole point of this CIAFBINSA operation has nothing to do with Hillary or Trump or influencing the election. the point was to fabricate criminal evidence to use against Assange to finally arrest him and extradite him as well as smear Wikileaks ahead of the looming leak of Podesta's emails.

if CIAFBINSA can frame Assange and Wikileaks as being criminal hackers and/or Russian assets ahead of the Podesta leaks, then they can craft a narrative for the MSM to ignore or distrust most of the Podesta emails. and that is exactly what happened, such as when Chris Cuomo said on CNN that it was illegal for you to read Wikileaks, but not CNN, so you should let CNN tell you what to think about Wikileaks instead of looking at evidence yourself.

this explains why Guccifer 2.0 was so sloppy leaving a trail of Twitter DMs to incriminate himself and Assange along with him.

if this CIAFBINSA entrapment/frame operation ever leaks, it will guarantee the freedom of Assange.

xxx 11 minutes ago

According to Wikipedia, "Guccifer" is Marcel Lazar Lehel, a Rumanian born in 1972, but "Guccifer 2.0" is someone else entirely.

Is that so?

xxx 20 minutes ago (Edited)

The guy from Cyrptome always asserted Assange was some type of deep state puppet, that he was connected somehow. This wouldn't be news to me and its probably why he was scared as hell. The guy is as good as dead, like S. Hussein. Seth Rich was just a puppet that got caught in the wrong game. He was expendable obviously too because well he had a big mouth, he was expendable from the beginning. Somebody mapped this whole **** out, thats for sure.

xxx 28 minutes ago

I am sick and tired of these Deep State and CIA-linked operations trying to put a wrench in the prosecution of people who were engaged in a coup d'etat.

xxx 29 minutes ago

********

xxx 33 minutes ago

At this point what difference does it make? We are all convinced since 2016. It is not going to convince the TDS cases roaming the wilderness.

No arrests, no subpoenas, no warrants, no barging in at 3 am, no perp walks, no tv glare...

Pres. Trump is playing a very risky game. Arrest now, or regret later. And you won't have much time to regret.

The swamp is dark, smelly and deep,

And it has grudges to keep.

xxx 37 minutes ago

Meanwhile- Guccifer 1.0 is still?

- In prison?

- Released?

- 48 month sentence in 2016. Obv no good behavior.

Nice article. Brennan is the dolt he appears.

xxx 41 minutes ago

+1,000 on the investigative work and analyzing it.

Sadly, none of the guilty are in jail. Instead. Assange sits there rotting away.

xxx 44 minutes ago

Why would an alleged GRU officer - supposedly part of an operation to deflect Russian culpability - suggest that Assange "may be connected with Russians?"

Because the AXIS powers of the CIA, Brit secret police and Israeli secret police pay for the campaign to tie Assange to the Russians...

xxx 45 minutes ago

@realDonaldTrump

A lot of interest in this story about Psycho Joe Scarborough. So a young marathon runner just happened to faint in his office, hit her head on his desk, & die? I would think there is a lot more to this story than that? An affair? What about the so-called investigator? Read story!

xxx 45 minutes ago

Why make it harder than it is? Guccifer II = Crowdstrike

xxx 51 minutes ago

Guccifer 2.0 was always John Brennan 1.0

xxx 58 minutes ago (Edited)

Was Guccifer II part of the Stefan Halper organization that lured Papadopoulos and maliciously maligned others?

xxx 1 hour ago

"His name was Seth Rich." The unofficial motto of ZeroHedge...

xxx 1 hour ago

James Guccifer Clapper.

xxx 1 hour ago

Mossad. And their subsidiary CIA.

xxx 1 hour ago

Crowd Strike CEO'S admission under oath that they had no evidence the DNC was hacked by the Russians should make the Russian Hoax predicate abundantly clear.

Justice for Seth Rich!

xxx 1 hour ago

Any influence Assange had on the election was so small that it wouldn't move the needle either way. The real influence and election tampering in the US has always come from the scores of lobbyists and their massive donations that fund the candidates election runs coupled with the wildly inaccurate and agenda driven collusive effort by the MSM. Anyone pointing fingers at the Russians is beyond blind to the unparalleled influence and power these entities have on swaying American minds.

xxx 1 hour ago

ObamaGate.

xxx 1 hour ago (Edited)

Uugh ONCE AGAIN... 4chan already proved guccifer 2.0 was a larp, and the files were not "hacked", they were leaked by Seth Rich. The metadata from the guccifer files is different from the metadata that came from the seth rich files. The dumb fuckers thought they were smart by modifying the author name of the files to make it look like it came from a russian source. They were so ******* inept, they must have forgot (or not have known) to modify the unique 16 digit hex key assigned to the author of the files when they were created..... The ones that seth rich copied had the system administrators name (Warren Flood) as the author and the 16 digit hex key from both file sources were the same - the one assigned to warren flood.

Really sloppy larp!!!

xxx 1 hour ago

This link has all the detail to show Guccifer 2.0 was not Russia. I believe Guccifer 2.0 was created by the CIA to falsely pin blame on the Russians for info that Seth Rich gave to WikiLeaks. Read for yourself: http://g-2.space/

xxx 1 hour ago

This is what people are. Now the species has more power than it can control and that it knows what to do with.

What do you think the result will be?

As for these games of Secret - it's more game than anything truly significant. The significant exists in the bunkers, with the mobile units, in the submarines. Et. al.

But this is a game in which some of the players die - or wish they were dead.

xxx 1 hour ago

And.....?

Public figures and political parties warrant public scrutiny. And didn't his expose in their own words expose the democrats, the mass media, the bureaucracy to the corrupt frauds that they are?

xxx 1 hour ago

Other than the fact that they didn't steal the emails (unless you believe whistleblowers are thief's, one mans source is another mans thief, it's all about who's ox is being gored and you love "leaks" don't you? As long as they work in your favor. Stop with the piety.

xxx 15 minutes ago

That's not the story at all. Did you just read this article?

The democrats were super duper corrupt (before all of this).

They fucked around to ice Bernie out of the primary.

A young staffer Seth Rich knew it and didn't like it. He made the decision to leak the info to the most reputable org for leaks in the world Wikileaks.

IF the DNC had been playing fair, Seth Rich wouldn't have felt the need to leak.

So, the democrats did it to themselves.

And then they created Russiagate to cover it all up.

And murdered a young brave man ... as we know.

xxx 1 hour ago

Assange, another problem Trump failed to fix.

xxx 1 hour ago

Sounds like it came from the same source as the Trump dossier ... MI5.

[May 24, 2020] Guccifer 2.0's Hidden Agenda : looks like Gussifer 2.0 was a false flag operation designed to smear WikiLeaks and distract from the content of the stolen by Seth Rich or some other insider DNC emails

Highly recommended!
Notable quotes:
"... With the entirety of Russigate finally collapsing under the enormous weight and stench of its own BS, the picture that is beginning to emerge for me is one of an insider deep-state psy-op designed to cover for the crimes committed by the DNC, the Clinton Foundation and the 2016 Hillary campaign; kill for the foreseeable future any progressive threat to the neo-liberal world order; and take down a president that the bipartisan DC and corporate media elite fear and loathe. And why do they fear him? Because he is free to call them out on certain aspects of their criminality and corruption, and has. ..."
"... Hubris, cynicism and a basic belief in the stupidity of the US public all seem to have played a part in all this, enabled by a corporate media with a profit motive and a business model that depends on duping the masses. ..."
"... Anyone who still believes in democracy in the USA has his head in the sand (or someplace a lot smellier). ..."
"... The corruption in the USA is wide and deep and trump is NOT draining the swamp. ..."
"... A further point: the Mueller report insinuates that G2.0 had transferred the DNC emails to Wikileaks as of July 18th, and Wikileaks then published them on July 22nd. This is absurd for two reasons: There is no way in hell that Wikileaks could have processed the entire volume of those emails and attachments to insure their complete authenticity in 4 days. ..."
"... Indeed, when Crowdstrike's Shawn Henry had been chief of counterintelligence under Robert Mueller, he had tried to set Assange up by sending Wikileaks fraudulent material; fortunately, Wikileaks was too careful to take the bait. ..."
May 24, 2020 | consortiumnews.com

Daniel P , May 23, 2020 at 13:34

Fascinating, important and ultimately deeply disturbing. This is why I come to Consortium News.

With the entirety of Russigate finally collapsing under the enormous weight and stench of its own BS, the picture that is beginning to emerge for me is one of an insider deep-state psy-op designed to cover for the crimes committed by the DNC, the Clinton Foundation and the 2016 Hillary campaign; kill for the foreseeable future any progressive threat to the neo-liberal world order; and take down a president that the bipartisan DC and corporate media elite fear and loathe. And why do they fear him? Because he is free to call them out on certain aspects of their criminality and corruption, and has.

Hubris, cynicism and a basic belief in the stupidity of the US public all seem to have played a part in all this, enabled by a corporate media with a profit motive and a business model that depends on duping the masses.

Anonymous , May 22, 2020 at 12:01

These convos alone look like a script kiddie on IRC doing their low functioning version of sock puppetry. Didn't know anyone at all fell for that

Ash , May 22, 2020 at 17:21

Because smooth liars in expensive suits told them it was true in their authoritative TV voices? Sadly they don't even really need to try hard anymore, as people will evidently believe anything they're told.

Bob Herrschaft , May 22, 2020 at 12:00

The article goes a long way toward congealing evidence that Guccifer 2.0 was a shill meant to implicate Wikileaks in a Russian hack. The insinuation about Assange's Russian connection was over the top if Guccifer 2.0 was supposed to be a GRU agent and the mention of Seth Rich only contradicts his claims.

OlyaPola , May 22, 2020 at 10:40

Spectacles are popular.Although less popular, the framing and derivations of plausible belief are of more significance; hence the cloak of plausible denial over under-garments of plausible belief, in facilitation of revolutions of immersion in spectacles facilitating spectacles' popularity.

Some promoters of spectacles believe that the benefits of spectacles accrue solely to themselves, and when expectations appear to vary from outcomes, they resort to one-trick-ponyness illuminated by peering in the mirror.

Skip Scott , May 22, 2020 at 08:35

This is a great article. I think the most obvious conclusion is that Guccifer 2.0 was a creation to smear wikileaks and distract from the CONTENT of the DNC emails. The MSM spent the next 3 years obsessed by RussiaGate, and spent virtually no effort on the DNC and Hillary's collusion in subverting the Sander's campaign, among other crimes.

I think back to how many of my friends were obsessed with Rachel Madcow during this period, and how she and the rest of the MSM served the Empire with their propaganda campaign. Meanwhile, Julian is still in Belmarsh as the head of a "non-state hostile intelligence service," the Hillary camp still runs the DNC and successfully sabotaged Bernie yet again (along with Tulsi), and the public gets to choose between corporate sponsored warmonger from column A or B in 2020.

Anyone who still believes in democracy in the USA has his head in the sand (or someplace a lot smellier).

Guy , May 22, 2020 at 12:19

Totally agree .The corruption in the USA is wide and deep and trump is NOT draining the swamp.

Cal Lash , May 22, 2020 at 01:20

I take it the mentioned time zones are consistent with Langley.

treeinanotherlife , May 22, 2020 at 00:34

"Are there only HRC emails? Or some other docs? Are there any DNC docs?"

G2 is fishing to see if Wiki has DNC docs. Does not say "any DNC docs I sent you". And like most at time thought Assange's "related to hillary" phrase likely (hopefully for some) meant Hillary's missing private server emails. For certain G2 is not an FBI agent>s/he knows difference between HRC and DNC emails.

Thank you for fantastic work.

Mark McCarty , May 21, 2020 at 22:24

A further point: the Mueller report insinuates that G2.0 had transferred the DNC emails to Wikileaks as of July 18th, and Wikileaks then published them on July 22nd. This is absurd for two reasons: There is no way in hell that Wikileaks could have processed the entire volume of those emails and attachments to insure their complete authenticity in 4 days.

Indeed, it is reasonable to expect that Wikileaks had been processing those emails since at least June 12, when Assange announced their impending publication. (I recall waiting expectantly for a number of weeks as Wikileaks processed the Podesta emails.) Wikileaks was well aware that, if a single one of the DNC emails they released had been proved to have been fraudulent, their reputation would have been toast. Indeed, when Crowdstrike's Shawn Henry had been chief of counterintelligence under Robert Mueller, he had tried to set Assange up by sending Wikileaks fraudulent material; fortunately, Wikileaks was too careful to take the bait.

Secondly, it is inconceivable that a journalist as careful as Julian would, on June 12th, have announced the impending publication of documents he hadn't even seen yet. And of course there is no record of G2.0 having had any contact with Wikileaks prior to that date.

It is a great pleasure to see "Adam Carter"'s work at long last appear in such a distinguished venue as Consortium News. It does credit to them both.

Skip Edwards , May 22, 2020 at 12:33

How can we expect justice when there is no justification for what is being done by the US and British governments to Julian Assange!

[Mar 12, 2020] Did Joe Biden's Former IT Guy Masquerade as Guccifer 2.0 by Larry C Johnson

Highly recommended!
Notable quotes:
"... The computer used to create the original Warren Document (dated 2008) was a US Government computer issued to the Obama Presidential Transition Team by the General Services Administration. ..."
"... The Warren Document and the 1.DOC were created in the United States using Microsoft Word software (2007) that is registered to the GSA. ..."
"... The author of both 1.doc and the PDF version is identified as "WARREN FLOOD." ..."
"... "Russian" fingerprints were deliberately inserted into the text and the meta data of "1.doc." ..."
"... This begs a very important question. Did Warren Flood actually create these documents or was someone masquerading as Warren Flood? Unfortunately, neither the Intelligence Community nor the Mueller Special Counsel investigators provided any evidence to show they examined this forensic data. More troubling is the fact that the Microsoft Word processing software being used is listed as a GSA product. ..."
"... If this was truly a Russian GRU operation (as claimed by Mueller), why was the cyber spy tradecraft so sloppy? ..."
"... The name of Warren Flood, an Obama Democrat activist and Joe Biden's former Director of Information Technology, appears in at least three iterations of these documents. Did he actually masquerade as Guccifer 2.0? If so, did he do it on his own or was he hired by someone else? These remain open questions that deserve to be investigated by John Durham, the prosecutor investigating the attempted coup against Donald Trump, and/or relevant committees of the Congress. ..."
"... There are other critical unanswered questions. Obama's Attorney General, Loretta Lynch, sent a letter to James come on July 26, 2016 about the the DNC hack. Lynch wrote concerning press reports that Russia attacked the DNC: ..."
"... A genuine investigation of the DNC hack/leak should have included interviews with all DNC staff, John Podesta, Warren Flood and Ellen Nakashima, The Washington Post reporter who broke the story of the DNC hack. Based on what is now in the public record, the FBI failed to do a proper investigation. ..."
"... Resolving who was behind Guccifer 2.0 and DCLeaks seems to me to be a rather simple investigative exercise. That is, somebody registered and bought the names of G2 and DCL. One can't have a Wordpress blog without purchasing a url. So, there is a record of this registration, right? Simply subpoena the company who sold/rented the url. ..."
"... It's now obvious that we don't have a functioning intel/justice apparatus in the U.S. This is the message sent and received by the intel/justice shops over and again. They no longer work for Americans rather they work against us. ..."
Mar 12, 2020 | turcopolier.typepad.com

Why does the name of Joe Biden's former Internet Technology guru, Warren Flood, appear in the meta data of documents posted on the internet by Guccifer 2.0? In case you do not recall, Guccifer 2.0 was identified as someone tied to Russian intelligence who played a direct role in stealing emails from John Podesta. The meta data in question indicates the name of the person who actually copied the original document. We have this irrefutable fact in the documents unveiled by Guccifer 2.0--Warren Flood's name appears prominently in the meta data of several documents attributed to "Guccifer 2.0." When this transpired, Flood was working as the CEO of his own company, BRIGHT BLUE DATA. (brightbluedata.com). Was Flood tasked to masquerade as a Russian operative?

Give Flood some props if that is true--he fooled our Intelligence Community and the entire team of Mueller prosecutors into believing that Guccifer was part of a Russian military intelligence cyber attack. But a careful examination of the documents shows that it is highly unlikely that this was an official Russian cyber operation. Here's what the U.S. Intelligence Community wrote about Guccifer 2.0 in their very flawed January 2017 Intelligence Community Assessment:

We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data obtained in cyber operations publicly and in exclusives to media outlets.

The laxity of the Intelligence Community in dealing with empirical evidence was matched by a disturbing lack of curiosity on the part of the Mueller investigators and prosecutors. Here's the tall tale they spun about Guccifer 2.0:

On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents. In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as "Fancy Bear") were responsible for the breach. Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona Guccifer 2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into a Moscow-based server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including "some hundred sheets," "illuminati," and "worldwide known." Approximately two hours after the last of those searches, Guccifer 2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that the GRU officers had searched for that day.

[Apelbaum note--According to Crowdstrike and Special Counsel Mueller, both were present, APT28 AKA "Fancy Bear" and APT29 AKA "Cozy Bear".]

The claims by both the Intelligence Community and the Mueller team about Guccifer 2.0 are an astounding, incredible denial of critical evidence pointing to a U.S. actor, not a Russian or Romanian. No one in this "august" group took the time to examine the metadata on the documents posted by "Guccifer 2.0" to his website on June 15, 2016.

I wish I could claim credit for the following forensic analysis, but the honors are due to Yaacov Apelbaum. While there are many documents in the Podesta haul that match the following pattern, this analysis focuses only on a document originally created by the DNC's Director of Research, Lauren Dillon. This document is the Trump Opposition Report document.

According to Apelbaum , the Trump Opposition Report document, which was "published" by Guccifer 2.0, shows clear evidence of digital manipulation:

  1. A US based user (hereafter referred to as G2 ) operating initially from the West coast and then, subsequently, from the East coast, changes the MS Word 2007 and Operating System language settings to Russian.
  2. G2 opens and saves a document with the file name, "12192015 Trump Report - for dist-4.docx". The document bears the title, "Donald Trump Report" (which was originally composed by Lauren Dillon aka DILLON REPORT) as an RTF file and opens it again.
  3. G2 opens a second document that was attached to an email sent on December 21, 2008 to John Podesta from [email protected]. This WORD document lists prospective nominees for posts in the Department of Agriculture for the upcoming Obama Administration. It was generated by User--Warren Flood--on a computer registered to the General Services Administration (aka GSA) named "Slate_-_Domestic_-_USDA_-_2008-12-20-3.doc", which was kept by Podesta on his private Gmail account. (I refer to this as the "WARREN DOCUMENT" in this analysis.)
  4. G2 deletes the content of the 2008 Warren Document and saves the empty file as a RTF, and opens it again.
  5. G2 copies the content of the 'Dillon Report' (which is an RTF document) and pastes it into the 2008 Warren Document template, i.e. the empty RTF document.
  6. G2 user makes several modifications to the content of this document. For example, the Warren Document contained the watermark--"CONFIDENTIAL DRAFT". G2 deleted the word "DRAFT" but kept the "CONFIDENTIAL" watermark.
  7. G2 saves this document into a file called "1.doc". This document now contains the text of the original Lauren Dillon "Donald Trump Report" document, but also contains Russian language URL links that generate error messages.
  8. G2's 1.DOC (the Word version of the document) shows the following meta data authors:
    • Created at 6/15/2016 at 1:38pm by "WARREN FLOOD"
    • Last Modified at 6/15/2016 at 1:45pm by "Феликс Эдмундович" (Felix Edmundovich, the first and middle name of Dzerzhinsky, the creator of the predecessor of the KGB. It is assumed the Felix Edmundovich refers to Dzerzhinsky.)
  9. G2 also produces a pdf version of this document almost four hours later. It is created at 6/15/201`6 at 5:54:15pm by "WARREN FLOOD."
  10. G2 first publishes "1.doc" to various media outlets and then uploads a copy to the Guccifer 2.0 WordPress website (which is hosted in the United States).

There are several critical facts from the metadata that destroy the claim that Guccifer 2.0 was a Romanian or a Russian.

This begs a very important question. Did Warren Flood actually create these documents or was someone masquerading as Warren Flood? Unfortunately, neither the Intelligence Community nor the Mueller Special Counsel investigators provided any evidence to show they examined this forensic data. More troubling is the fact that the Microsoft Word processing software being used is listed as a GSA product.

If this was truly a Russian GRU operation (as claimed by Mueller), why was the cyber spy tradecraft so sloppy? A covert cyber operation is no different from a conventional human covert operation, which means the first and guiding principle is to not leave any fingerprints that would point to the origin of the operation. In other words, you do not mistakenly leave flagrant Russian fingerprints in the document text or metadata. A good cyber spy also will not use computers and servers based in the United States and then claim it is the work of a hacker ostensibly in Romania.

None of the Russians indicted by Mueller in his case stand accused of doing the Russian hacking while physically in the United States. No intelligence or evidence has been cited to indicate that the Russians stole a U.S. Government computer or used a GSA supplied copy of Microsoft Word to produce the G2 documents.

The name of Warren Flood, an Obama Democrat activist and Joe Biden's former Director of Information Technology, appears in at least three iterations of these documents. Did he actually masquerade as Guccifer 2.0? If so, did he do it on his own or was he hired by someone else? These remain open questions that deserve to be investigated by John Durham, the prosecutor investigating the attempted coup against Donald Trump, and/or relevant committees of the Congress.

There are other critical unanswered questions. Obama's Attorney General, Loretta Lynch, sent a letter to James come on July 26, 2016 about the the DNC hack. Lynch wrote concerning press reports that Russia attacked the DNC:

If foreign intelligence agencies are attempting to undermine that process, the U.S. government should treat such efforts even more seriously than standard espionage. These types ofcyberattacks are significant and pernicious crimes. Our government must do all that it can to stop such attacks and to seek justice for the attacks that have already occurred.

We are writing to request more information on this cyberattack in particular and more information in general on how the Justice Department, FBI, and NCIJTF attempt to prevent and punish these types ofcyberattacks. Accordingly, please respond to the following by August 9, 2016:

  1. When did the Department of Justice, FBI, and NCIJTF first learn of the DNC hack? Was the government aware ofthe intrusion prior to the media reporting it?
  2. Has the FBI deployed its Cyber Action Team to determine who hacked the DNC?
  3. Has the FBI determined whether the Russian government, or any other foreign
    government, was involved in the hack?
  4. In general, what actions, if any, do the Justice Department, FBI, and NCIJTF take to prevent cyberattacks on non-governmental political organizations in the U.S., such as campaigns and political parties? Does the government consult or otherwise communicate with the organizations to inform them ofpotential threats, relay best practices, or inform them ofdetected cyber intrusions.
  5. Does the Justice Department believe that existing statutes provide an adequate basis for addressing hacking crimes of this nature, in which foreign governments hack seemingly in order to affect our electoral processes?

So far no document from Comey to Lynch has been made available to the public detailing the FBI's response to Lynch's questions. Why was the Cyber Action Team not deployed to determine who hacked the DNC? A genuine investigation of the DNC hack/leak should have included interviews with all DNC staff, John Podesta, Warren Flood and Ellen Nakashima, The Washington Post reporter who broke the story of the DNC hack. Based on what is now in the public record, the FBI failed to do a proper investigation.

Recent Comments

h | 12 March 2020 at 12:08 PM

Of course sleepy Joe was in on the overall RussiaGate operation. And now another reasonable question by sleuth extraordinaire will fall into the memory hole b/c no one who has the authority and the power in DC is ever going to address, let alone, clean up and hold accountable any who created this awful mess.

Resolving who was behind Guccifer 2.0 and DCLeaks seems to me to be a rather simple investigative exercise. That is, somebody registered and bought the names of G2 and DCL. One can't have a Wordpress blog without purchasing a url. So, there is a record of this registration, right? Simply subpoena the company who sold/rented the url.

What's troubling to me is that even the most simplest investigative acts to find answers never seems to happen. Instead, more than three years later we're playing 'Whodunit.'

It's been over 3 years now and if we had a truly functioning intel/justice apparatus this simple act would have been done long ago and then made public. Yet, here we are more than three years later trying to unravel, figure out or resolve the trail of clues via metadata the pranksters left behind.

It's now obvious that we don't have a functioning intel/justice apparatus in the U.S. This is the message sent and received by the intel/justice shops over and again. They no longer work for Americans rather they work against us.

[Dec 22, 2019] Gussifer 2.0 released nothing remotely damaging to the DNC and is arguably US based (timestamps), and is either CIA or Crowdstrike.

Dec 22, 2019 | turcopolier.typepad.com

Ed Snack , 21 December 2019 at 01:41 PM

Other points to note:

1.

Ed Snack , 20 December 2019 at 10:56 PM
Other points to note:

1. G2 released nothing remotely damaging to the DNC, the first document was even the DNC's oppo file on DJT
2. G2 did some copying and compress/decompress on files. Imbedded timestamps strongly suggest a US Timezone location
3. G2 released some files claiming to be from the DNC, but which demonstrably came from John Podesta's account
4. G2 did not claim to be involved with the Podesta account, which was phished and not hacked as such
5. As an aside, both the Fancy and Cosy Bear packages had been available for third parties to obtain since 2013-4 or so. So their use is not proof of Russian involvement. One or other has been used in bank exploits before 2016.

I believe that G2 is arguably US based (the timestamps are reasonably conclusive), and is either CIA or Crowdstrike. The existence of G2 is a diversionary one to strengthen the case for blaming the Russians. It may be connected to wanting to divert attention from Seth Rich and his subsequent murder, but may not be - that is Seth Rich's death may be just an unfortunate coincidence, we have inadequate information to conclude either way.

[Dec 22, 2019] So US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks. That's when the stratagem of attributing the impending Wikileaks release to a Russian hack was born -- distracting from the incriminating content of the emails, while vilifying the Deep State's favorite enemies, Assange and Russia, all in one neat scam

Highly recommended!
Looks like Brennan ears are all over this false flag operation...
Dec 22, 2019 | turcopolier.typepad.com

Mark McCarty , 21 December 2019 at 02:34 PM

Here's a key point - on June 12, Assange announces that Wikileaks will soon be releasing info pertinent to Hillary. HE DOES NOT SAY THAT HE WILL BE RELEASING DNC EMAILS.

And yet, on June 14, Crowdstrike reports a Russian hack of the DNC servers - and a day later, Guccifer 2.0 emerges and proclaims himself to be the hacker, takes credit for the upcoming Wikileaks DNC releases, publishes the Trump oppo research which Crowdstrike claimed he had taken, and intentionally adds "Russian footprints" to his metadata.

So how did Crowdstrike and G2.0 know that DNC EMAILS would be released?

Because, as Larry postulates, the US intelligence community had intercepted communications between Seth Rich and Wikileaks in which Seth had offered the DNC emails (consistent with the report of Sy Hersh's source within the FBI).

So US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks.

That's when the stratagem of attributing the impending Wikileaks release to a Russian hack was born - distracting from the incriminating content of the emails, while vilifying the Deep State's favorite enemies, Assange and Russia, all in one neat scam.

[Dec 20, 2019] Did John Brennan's CIA Create Guccifer 2.0 and DCLeaks by Larry C Johnson

Highly recommended!
Gossufer2.0 and CrowdStrike are the weakest links in this sordid story. CrowdStrike was nothing but FBI/CIA contractor.
So the hypothesis that CrowdStrike employees implanted malware to implicate Russians and created fake Gussifer 2.0 personality is pretty logical.
Notable quotes:
"... Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU--Guccifer 2.0 persona and DCLeaks.com. Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of then CIA Director John Brennan ..."
"... In October 2015 John Brennan reorganized the CIA . As part of that reorganization he created a new directorate--DIRECTORATE OF DIGITAL INNOVATION. Its mission was to "manipulate digital footprints." In other words, this was the Directorate that did the work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust. ..."
"... We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it appear like it was done by a foreign entity. Wikipedia describes the Vault 7 documents : ..."
"... Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside the file shows it was last edited by someone using the computer name "Феликс Эдмундович." That means the computer was configured to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, "Феликс Эдмундович" is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.) ..."
"... Why would the CIA do this? The CIA knew that Podesta's emails had been hacked and were circulating on the internet. But they had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA. ..."
"... The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich. Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign, would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia. ..."
"... The only source for the claim that Russia hacked the DNC is a private cyber security firm, CrowdStrike. ..."
"... Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch, but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June. That is 34 days of inexcusable inaction. ..."
"... The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham's team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham should be looking into as a potential act of "Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU. ..."
"... LJ bottom line: "The only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU." ..."
"... ICA which seemed to have been framed to allow journalists or the unwary to link the ICA with more rigorous standards used by more authentic assessments? ..."
"... With the Russians not having the advantages that the NSA does (back doors in all US-designed network hardware/software and taps all over the internet), would Russia reveal anything unless it involved an immediate major national security threat. I doubt that would cover Trump. ..."
Dec 20, 2019 | turcopolier.typepad.com

Special Counsel Robert Mueller's report insists that Guccifer 2.0 and DCLeaks were created by Russia's military intelligence organization, the GRU, as part of a Russian plot to meddle in the U.S. 2016 Presidential Election. But this is a lie. Guccifer 2.0 and DCLeaks were created by Brennan's CIA and this action by the CIA should be a target of U.S. Attorney John Durham's investigation. Let me explain why.

Let us start with the January 2017 Intelligence Community Assessment aka ICA. Only three agencies of the 17 in the U.S. intelligence community contributed to and coordinated on the ICA--the FBI, the CIA and NSA. In the preamble to the ICA, you can read the following explanation about methodology:

When Intelligence Community analysts use words such as "we assess" or "we judge," they are conveying an analytic assessment or judgment

To be clear, the phrase,"We assess", is intel community jargon for "opinion". If there was actual evidence or source material for a judgment the writer of the assessment would state, "According to a reliable source" or "knowledgeable source" or "documentary evidence."

Pay close attention to what the analysts writing the ICA stated about the GRU and Guccifer 2.0 and DCLeaks:

We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data obtained in cyber operations publicly and in exclusives to media outlets.

We assess with high confidence that the GRU relayed material it acquired from the DNC and senior Democratic officials to WikiLeaks. Moscow most likely chose WikiLeaks because of its self-proclaimed reputation for authenticity. Disclosures through WikiLeaks did not contain any evident forgeries.

Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU--Guccifer 2.0 persona and DCLeaks.com. Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of then CIA Director John Brennan.

Here's Mueller's take (I apologize for the lengthy quote but it is important that you read how the Mueller team presents this):

DCLeaks

"The GRU began planning the releases at least as early as April 19, 2016, when Unit 26165 registered the domain dcleaks.com through a service that anonymized the registrant.137 Unit 26165 paid for the registration using a pool of bitcoin that it had mined.138 The dcleaks.com landing page pointed to different tranches of stolen documents, arranged by victim or subject matter. Other dcleaks.com pages contained indexes of the stolen emails that were being released (bearing the sender, recipient, and date of the email). To control access and the timing of releases, pages were sometimes password-protected for a period of time and later made unrestricted to the public.


Starting in June 2016, the GRU posted stolen documents onto the website dcleaks.com, including documents stolen from a number of individuals associated with the Clinton Campaign. These documents appeared to have originated from personal email accounts (in particular, Google and Microsoft accounts), rather than the DNC and DCCC computer networks. DCLeaks victims included an advisor to the Clinton Campaign, a former DNC employee and Clinton Campaign employee, and four other campaign volunteers.139 The GRU released through dcleaks.com thousands of documents, including personal identifying and financial information, internal correspondence related to the"Clinton Campaign and prior political jobs, and fundraising files and information.140


GRU officers operated a Facebook page under the DCLeaks moniker, which they primarily used to promote releases of materials.141 The Facebook page was administered through a small number of preexisting GRU-controlled Facebook accounts.142


GRU officers also used the DCLeaks Facebook account, the Twitter account @dcleaks__, and the email account [email protected] to communicate privately with reporters and other U.S. persons. GRU officers using the DCLeaks persona gave certain reporters early access to archives of leaked files by sending them links and passwords to pages on the dcleaks.com website that had not yet become public. For example, on July 14, 2016, GRU officers operating under the DCLeaks persona sent a link and password for a non-public DCLeaks webpage to a U.S. reporter via the Facebook account.143 Similarly, on September 14, 2016, GRU officers sent reporters Twitter direct messages from @dcleaks_, with a password to another non-public part of the dcleaks.com website.144


The dcleaks.com website remained operational and public until March 2017."

Guccifer 2.0

On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents. In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as "Fancy Bear") were responsible for the breach.145 Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona Guccifer 2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into a Moscow-based server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including "some hundred sheets," "illuminati," and "worldwide known." Approximately two hours after the last of those searches, Guccifer 2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that the GRU officers had searched for that day.146

That same day, June 15, 2016, the GRU also used the Guccifer 2.0 WordPress blog to begin releasing to the public documents stolen from the DNC and DCCC computer networks.

The Guccifer 2.0 persona ultimately released thousands of documents stolen from the DNC and DCCC in a series of blog posts between June 15, 2016 and October 18, 2016.147 Released documents included opposition research performed by the DNC (including a memorandum analyzing potential criticisms of candidate Trump), internal policy documents (such as recommendations on how to address politically sensitive issues), analyses of specific congressional races, and fundraising documents. Releases were organized around thematic issues, such as specific states (e.g., Florida and Pennsylvania) that were perceived as competitive in the 2016 U.S. presidential election.

Beginning in late June 2016, the GRU also used the Guccifer 2.0 persona to release documents directly to reporters and other interested individuals. Specifically, on June 27, 2016, Guccifer 2.0 sent an email to the news outlet The Smoking Gun offering to provide "exclusive access to some leaked emails linked [to] Hillary Clinton's staff."148 The GRU later sent the reporter a password and link to a locked portion of the dcleaks.com website that contained an archive of emails stolen by Unit 26165 from a Clinton Campaign volunteer in March 2016.149 "That the Guccifer 2.0 persona provided reporters access to a restricted portion of the DCLeaks website tends to indicate that both personas were operated by the same or a closely-related group of people.150

The GRU continued its release efforts through Guccifer 2.0 into August 2016. For example, on August 15, 2016, the Guccifer 2.0 persona sent a candidate for the U.S. Congress documents related to the candidate's opponent.151 On August 22, 2016, the Guccifer 2.0 persona transferred approximately 2.5 gigabytes of Florida-related data stolen from the DCCC to a U.S. blogger covering Florida politics.152 On August 22, 2016, the Guccifer 2.0 persona sent a U.S. reporter documents stolen from the DCCC pertaining to the Black Lives Matter movement.153"

Wow. Sounds pretty convincing. The documents referencing communications by DCLeaks or Guccifer 2.0 with Wikileaks are real. What is not true is that these entities were GRU assets.

In October 2015 John Brennan reorganized the CIA . As part of that reorganization he created a new directorate--DIRECTORATE OF DIGITAL INNOVATION. Its mission was to "manipulate digital footprints." In other words, this was the Directorate that did the work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust.

We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it appear like it was done by a foreign entity. Wikipedia describes the Vault 7 documents :

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States' Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs,[1] web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA),[2][3][4] and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux[5][6

One of the tools in Vault 7 carries the innocuous name, MARBLE. Hackernews explains the purpose and function of MARBLE:

Dubbed "Marble," the part 3 of CIA files contains 676 source code files of a secret anti-forensic Marble Framework, which is basically an obfuscator or a packer used to hide the true source of CIA malware.
The CIA's Marble Framework tool includes a variety of different algorithm with foreign language text intentionally inserted into the malware source code to fool security analysts and falsely attribute attacks to the wrong nation.

Marble is used to hamper[ing] forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA," says the whistleblowing site.

"...for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion," WikiLeaks explains.

So guess what gullible techies "discovered" in mid-June 2016? The meta data in the Guccifer 2.0 communications had "Russian fingerprints."

We still don't know who he is or whether he works for the Russian government, but one thing is for sure: Guccifer 2.0 -- the nom de guerre of the person claiming he hacked the Democratic National Committee and published hundreds of pages that appeared to prove it -- left behind fingerprints implicating a Russian-speaking person with a nostalgia for the country's lost Soviet era.

Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside the file shows it was last edited by someone using the computer name "Феликс Эдмундович." That means the computer was configured to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, "Феликс Эдмундович" is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.)

Just use your common sense. If the Russians were really trying to carry out a covert cyberattack, do you really think they are so sloppy and incompetent to insert the name of the creator of the Soviet secret police in the metadata? No. The Russians are not clowns. This was a clumsy attempt to frame the Russians.

Why would the CIA do this? The CIA knew that Podesta's emails had been hacked and were circulating on the internet. But they had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA.

The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich. Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign, would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia.

It is essential to recall the timeline of the alleged Russian intrusion into the DNC network. The only source for the claim that Russia hacked the DNC is a private cyber security firm, CrowdStrike. Here is the timeline for the DNC "hack."

Here are the facts on the public record. They are at odds with the claims of the Intelligence Community:

  1. It was 29 April 2016 , when the DNC claims it became aware its servers had been penetrated. No claim yet about who was responsible. And no claim that there had been a prior warning by the FBI of a penetration of the DNC by Russian military intelligence.
  2. According to CrowdStrike founder , Dimitri Alperovitch, his company first supposedly detected the Russians mucking around inside the DNC server on 6 May 2016. A CrowdStrike intelligence analyst reportedly told Alperovitch that:
    • Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
  3. The Wikileaks data shows that the last message copied from the DNC network is dated Wed, 25 May 2016 08:48:35.
  4. 10 June 2016 --CrowdStrike waited until 10 June 2016 to take concrete steps to clean up the DNC network. Alperovitch told Esquire's Vicky Ward that: 'Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office."
  5. On June 14, 2016 , Ellen Nakamura, a Washington Post reporter who had been briefed by computer security company hired by the DNC -- Crowdstrike--, wrote:
    • Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.
    • The intruders so thoroughly compromised the DNC's system that they also were able to read all email and chat traffic, said DNC officials and the security experts.
    • The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available.
  6. 15 June, 2016 , an internet "personality" self-described as Guccifer 2.0 surfaces and claims to be responsible for the hacks but denies being Russian. The people/entity behind Guccifer 2.0:

The only thing that the Guccifer 2.0 character did not do to declare its Russian heritage was to take out full page ads in the New York Times and Washington Post. But the "forensic" fingerprints that Guccifer 2.0 was leaving behind is not the only inexplicable event.

Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch, but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June. That is 34 days of inexcusable inaction.

It is only AFTER Julian Assange announces on 12 June 2016 that WikiLeaks has emails relating to Hillary Clinton that DCLeaks or Guccifer 2.0 try to contact Assange.

The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham's team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham should be looking into as a potential act of "Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU.

Posted at 02:13 PM in Larry Johnson , Russiagate | Permalink


Factotum , 20 December 2019 at 02:45 PM

LJ bottom line: "The only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU."
Paul Damascene , 20 December 2019 at 02:54 PM
Larry, thanks -- vital clarifications and reminders. In your earlier presentation of this material did you not also distinguish between the way actually interagency assessments are titled, and ICA which seemed to have been framed to allow journalists or the unwary to link the ICA with more rigorous standards used by more authentic assessments?
walrus , 20 December 2019 at 03:51 PM
Thank you Larry. You have discovered one more vital key to the conspiracy. We now need the evidence of Julian Assange. He is kept incommunicado and He is being tortured by the British in jail and will be murdered by the American judicial system if he lasts long enough to be extradited.

You can be sure he will be "Epsteined" before he appears in open court because he knows the source of what Wikileaks published. Once he is gone, mother Clinton is in the clear.

Ghost Ship , 20 December 2019 at 04:04 PM
I can understand the GRU or SVR hacking the DNC and other e-mail servers because as intelligence services that is their job, but can anyone think of any examples of Russia (or the Soviet Union) using such information to take overt action?

With the Russians not having the advantages that the NSA does (back doors in all US-designed network hardware/software and taps all over the internet), would Russia reveal anything unless it involved an immediate major national security threat. I doubt that would cover Trump.

[Dec 04, 2019] The central question of Ukrainegate is whether CrowdStrike actions on DNC leak were a false flag operation designed to open Russiagate and what was the level of participation of Poroshenko government and Ukrainian Security services in this false flag operation by Factotum

Highly recommended!
Highly recommended !
Republicans are afraid to raise this key question. Democrats are afraid of even mentioning CrowdStrike in Ukrainegate hearings. The Deep State wants to suppress this matter entirely.
Alperovisch connections to Ukraine and his Russophobia are well known. Did Alperovich people played the role of "Fancy Bear"? Or Ukrainian SBU was engaged? George Eliason clams that "I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators." ... "Since there is so much crap surrounding the supposed hack such as law enforcement teams never examining the DNC server or maintaining control of it as evidence, could the hacks have been a cover-up?"
Notable quotes:
"... So far at least I cannot rule out the possibility that that this could have involved an actual 'false flag' hack. A possible calculation would have been that this could have made it easier for Alperovitch and 'CrowdStrike', if more people had asked serious questions about the evidence they claimed supported the 'narrative' of GRU responsibility. ..."
"... What she suggested was that the FBI had found evidence, after his death, of a hack of Rich's laptop, designed as part of a 'false flag' operation. ..."
"... On this, see his 8 October, 'Motion for Discovery and Motion to Accept Supplemental Evidence' in Clevenger's own case against the DOJ, document 44 on the relevant 'Courtlistener' pages, and his 'Unopposed Motion for Stay', document 48. Both are short, and available without a 'PACER' subscription, and should be compulsory reading for anyone seriously interested in ascertaining the truth about 'Russiagate.' (See https://www.courtlistener.com/docket/6775665/clevenger-v-us-department-of-justice/ .) ..."
"... And here, is is also material that he may have had more than one laptop, that 'hard drives' can be changed, and that the level of computer skills that can be found throughout the former Soviet Union is very high. Another matter of some importance is that Ed Butowsky's 'Debunking Rod Wheeler's Claims' site is back up online. (See http://debunkingrodwheelersclaims.net ) ..."
"... The question of whether the 'timeline' produced by Hersh's FBI informant was accurate, or a deliberate attempt to disguise the fact that all kinds of people were well aware of Rich's involvement before his murder, and well aware of the fact of a leak before he was identified as its source, is absolutely central to how one interprets 'Russiagate.' ..."
"... Why did Crowdstrike conclude it was a "Russian breach", when other evidence does show it was an internal download. What was Crowdstrike's method and motivation to reach the "Russian" conclusion instead. Why has that methodology been sealed? ..."
"... Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers. ..."
"... What were the relationships between Crowdstrike, DNC, FBI and the Mueller team that conspired to reach this Russian conclusion. ..."
"... Why did the Roger Stone judge, who just sent Stone away for life, refuse Stone's evidentiary demand to ascertain how exactly Crowdstrike reached its Russsian hacking conclusion, that the court then linked to Stone allegedly lying about this Russian link ..."
"... Indeed, let's set out with full transparency the Ukraine -- Crowsdtrike player links and loyalties to see if there are any smoking guns yet undisclosed. Trump was asking for more information about Crowdstrike like a good lawyer - never ask a question when you don't already know the right answer. Crowdstrike is owned by a Ukrainian by birth ..."
"... Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike. ..."
"... In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives. ..."
"... His role in what we may define as "converting DNC leak into DNC hack" (I would agree with you that this probably was a false flag operation), which was supposedly designed to implicated Russians, and possibly involved Ukrainian security services, is very suspicious indeed. ..."
"... Mueller treatment of Crowdstrike with "kid gloves" may suggest that Alperovich actions were part of a larger scheme. After all Crowdstike was a FBI contactor at the time. ..."
Dec 04, 2019 | turcopolier.typepad.com

Originally from: The Intelligence Whistleblower protection Act did not apply to the phone call ... Reposted - Sic Semper Tyrannis


Factotum , 20 November 2019 at 01:02 PM

The favor was for Ukraine to investigate Crowdstrike and the 2016 DNC computer breach.

Reliance on Crowdstrike to investigate the DNC computer, and not an independent FBI investigation, was tied very closely to the years long anti-Trump Russiagate hoax and waste of US taxpayer time and money.

Why is this issue ignored by both the media and the Democrats. The ladies doth protest far too much.

vig -> Factotum... , 21 November 2019 at 11:00 AM
what exactly, to the extend I recall, could the Ukraine contribute the the DNC's server/"fake malware" troubles? Beyond, that I seem to vaguely recall, the supposed malware was distributed via an Ukrainan address.

On the other hand, there seems to be the (consensus here?) argument there was no malware breach at all, simply an insider copying files on a USB stick.

It seems to either or. No?

What basics am I missing?

David Habakkuk -> vig... , 21 November 2019 at 12:53 PM
vig,

There is no reason why it should be 'either/or'.

If people discovered there had been a leak, it would perfectly natural that in order to give 'resilience' to their cover-up strategies, they could have organised a planting of evidence on the servers, in conjunction with elements in Ukraine.

So far at least I cannot rule out the possibility that that this could have involved an actual 'false flag' hack. A possible calculation would have been that this could have made it easier for Alperovitch and 'CrowdStrike', if more people had asked serious questions about the evidence they claimed supported the 'narrative' of GRU responsibility.

The issues involved become all the more important, in the light of the progress of Ty Clevenger's attempts to exploit the clear contradiction between the claims by the FBI, in response to FOIA requests, to have no evidence relating to Seth Rich, and the remarks by Ms. Deborah Sines quoted by Michael Isikoff.

What she suggested was that the FBI had found evidence, after his death, of a hack of Rich's laptop, designed as part of a 'false flag' operation.

On this, see his 8 October, 'Motion for Discovery and Motion to Accept Supplemental Evidence' in Clevenger's own case against the DOJ, document 44 on the relevant 'Courtlistener' pages, and his 'Unopposed Motion for Stay', document 48. Both are short, and available without a 'PACER' subscription, and should be compulsory reading for anyone seriously interested in ascertaining the truth about 'Russiagate.' (See https://www.courtlistener.com/docket/6775665/clevenger-v-us-department-of-justice/ .)

It is eminently possible that Ms. Hines has simply made an 'unforced error.'

However, I do not – yet – feel able totally to discount the possibility that what is actually at issue is a 'ruse', produced as a contingency plan to ensure that if it becomes impossible to maintain the cover-up over Rich's involvement in its original form, his laptop shows 'evidence' compatible with the 'Russiagate' narrative.

And here, is is also material that he may have had more than one laptop, that 'hard drives' can be changed, and that the level of computer skills that can be found throughout the former Soviet Union is very high. Another matter of some importance is that Ed Butowsky's 'Debunking Rod Wheeler's Claims' site is back up online. (See http://debunkingrodwheelersclaims.net )

Looking at it from the perspective of an old television current affairs hack, I do think that, while it is very helpful to have some key material available in a single place, it would useful if more attention was paid to presentation.

In particular, it would be a most helpful 'teaching aid', if a full and accurate transcript was made of the conversation with Seymour Hersh which Ed Butowsky covertly recorded. What seems clear is that both these figures ended up in very difficult positions, and that the latter clearly engaged in 'sleight of hand' in relation to his dealings with the former. That said, the fact that Butowsky's claims about his grounds for believing that Hersh's FBI informant was Andrew McCabe are clearly disingenuous does not justify the conclusion that he is wrong.

It is absolutely clear to me – despite what 'TTG', following that 'Grub Street' hack Folkenflik, claimed – that when Hersh talked to Butowsky, he believed he had been given accurate information. Indeed, I have difficulty seeing how anyone whose eyes were not hopelessly blinded by prejudice, a\nd possibly fear of where a quest for the truth might lead, could not see that, in this conversation, both men were telling the truth, as they saw it.

However, all of us, including the finest and most honourable of journalists can, from time to time, fall for disinformation. (If anyone says they can always spot when they are being played, all I can say is, if you're right, you're clearly Superman, but it is more likely that you are a fool or knave, if not both.)

The question of whether the 'timeline' produced by Hersh's FBI informant was accurate, or a deliberate attempt to disguise the fact that all kinds of people were well aware of Rich's involvement before his murder, and well aware of the fact of a leak before he was identified as its source, is absolutely central to how one interprets 'Russiagate.'

Factotum -> vig... , 21 November 2019 at 01:45 PM
Several loose end issues about Crowdstrike:

1. Why did Crowdstrike conclude it was a "Russian breach", when other evidence does show it was an internal download. What was Crowdstrike's method and motivation to reach the "Russian" conclusion instead. Why has that methodology been sealed?

2. Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers.

3. What were the relationships between Crowdstrike, DNC, FBI and the Mueller team that conspired to reach this Russian conclusion.

4. Why did the Roger Stone judge, who just sent Stone away for life, refuse Stone's evidentiary demand to ascertain how exactly Crowdstrike reached its Russsian hacking conclusion, that the court then linked to Stone allegedly lying about this Russian link .

5. Indeed, let's set out with full transparency the Ukraine -- Crowsdtrike player links and loyalties to see if there are any smoking guns yet undisclosed. Trump was asking for more information about Crowdstrike like a good lawyer - never ask a question when you don't already know the right answer. Crowdstrike is owned by a Ukrainian by birth .

likbez said in reply to Factotum... , 04 December 2019 at 01:29 AM

Hi Factotum,
Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers.

Alperovich is really a very suspicious figure. Rumors are that he was involved in compromising PGP while in MacAfee( June 2nd, 2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams - YouTube ):

Investigative Journalist George Webb worked at MacAfee and Network Solutions in 2000 when the CEO Bill Larsen bought a small, Moscow based, hacking and virus writing company to move to Silicon Valley.

MacAfee also purchased PGP, an open source encryption software developed by privacy advocate to reduce NSA spying on the public.
The two simultaneous purchase of PGP and the Moscow hacking team by Metwork Solutions was sponsored by the CIA and FBI in order to crack encrypted communications to write a back door for law enforcement.

Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike.

In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives.

His role in what we may define as "converting DNC leak into DNC hack" (I would agree with you that this probably was a false flag operation), which was supposedly designed to implicated Russians, and possibly involved Ukrainian security services, is very suspicious indeed.

Mueller treatment of Crowdstrike with "kid gloves" may suggest that Alperovich actions were part of a larger scheme. After all Crowdstike was a FBI contactor at the time.

While all this DNC hack saga is completely unclear due to lack of facts and the access to the evidence, there are some stories on Internet that indirectly somewhat strengthen your hypothesis:

Enjoy and Happy Cyber Week shopping :-)

[Dec 04, 2019] Common Funding Themes Link 'Whistleblower' Complaint and CrowdStrike Firm Certifying DNC Russia 'Hack' by Aaron Klein

Highly recommended!
Notable quotes:
"... Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council, which takes a hawkish approach toward Russia. The Council in turn is financed by Google Inc. ..."
"... In a perhaps unexpected development, another Atlantic Council funder is Burisma, the natural gas company at the center of allegations regarding Joe Biden and his son, Hunter Biden. Those allegations were the subject of Trump's inquiry with Zelemsky related to Biden. The Biden allegations concern significant questions about Biden's role in Ukraine policy under the Obama administration. This took place during a period when Hunter Biden received $50,000 a month from Burisma. ..."
"... Google, Soros's Open Society Foundations, the Rockefeller Fund and an agency of the State Department each also finance a self-described investigative journalism organization repeatedly referenced as a source of information in the so-called whistleblower's complaint alleging Trump was "using the power of his office to solicit interference from a foreign country" in the 2020 presidential race. ..."
"... Another listed OCCRP funder is the Omidyar Network, which is the nonprofit for liberal billionaire eBay founder Pierre Omidyar. ..."
"... Together with Soros's Open Society, Omidyar also funds the Poynter Institute for Media Studies, which hosts the International Fact-Checking Network that partnered with Facebook to help determine whether news stories are "disputed." ..."
Sep 28, 2019 | www.breitbart.com

There are common threads that run through an organization repeatedly relied upon in the so-called whistleblower's complaint about President Donald Trump and CrowdStrike, the outside firm utilized to conclude that Russia hacked the Democratic National Committee's servers since the DNC would not allow the U.S. government to inspect the servers.

One of several themes is financing tied to Google, whose Google Capital led a $100 million funding drive that financed Crowdstrike. Google Capital, which now goes by the name of CapitalG, is an arm of Alphabet Inc., Google's parent company. Eric Schmidt, the chairman of Alphabet, has been a staunch and active supporter of Hillary Clinton and is a longtime donor to the Democratic Party.

CrowdStrike was mentioned by Trump in his call with Ukranian President Volodymyr Zelensky. Perkins Coie, the law firm that represented the DNC and Hillary Clinton's campaign, reportedly helped draft CrowdStrike to aid with the DNC's allegedly hacked server.

On behalf of the DNC and Clinton's campaign, Perkins Coie also paid the controversial Fusion GPS firm to produce the infamous, largely-discredited anti-Trump dossier compiled by former British spy Christopher Steele.

CrowdStrike is a California-based cybersecurity technology company co-founded by Dmitri Alperovitch.

Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council, which takes a hawkish approach toward Russia. The Council in turn is financed by Google Inc.

In a perhaps unexpected development, another Atlantic Council funder is Burisma, the natural gas company at the center of allegations regarding Joe Biden and his son, Hunter Biden. Those allegations were the subject of Trump's inquiry with Zelemsky related to Biden. The Biden allegations concern significant questions about Biden's role in Ukraine policy under the Obama administration. This took place during a period when Hunter Biden received $50,000 a month from Burisma.

Besides Google and Burisma funding, the Council is also financed by billionaire activist George Soros's Open Society Foundations as well as the Rockefeller Brothers Fund, Inc. and the U.S. State Department.

Google, Soros's Open Society Foundations, the Rockefeller Fund and an agency of the State Department each also finance a self-described investigative journalism organization repeatedly referenced as a source of information in the so-called whistleblower's complaint alleging Trump was "using the power of his office to solicit interference from a foreign country" in the 2020 presidential race.

The charges in the July 22 report referenced in the whistleblower's document and released by the Google and Soros-funded organization, the Organized Crime and Corruption Reporting Project (OCCRP), seem to be the public precursors for a lot of the so-called whistleblower's own claims, as Breitbart News documented .

One key section of the so-called whistleblower's document claims that "multiple U.S. officials told me that Mr. Giuliani had reportedly privately reached out to a variety of other Zelensky advisers, including Chief of Staff Andriy Bohdan and Acting Chairman of the Security Service of Ukraine Ivan Bakanov."

This was allegedly to follow up on Trump's call with Zelensky in order to discuss the "cases" mentioned in that call, according to the so-called whistleblower's narrative. The complainer was clearly referencing Trump's request for Ukraine to investigate the Biden corruption allegations.

Even though the statement was written in first person – "multiple U.S. officials told me" – it contains a footnote referencing a report by the Organized Crime and Corruption Reporting Project (OCCRP).

That footnote reads:

In a report published by the Organized Crime and Corruption Reporting Project (OCCRP) on 22 July, two associates of Mr. Giuliani reportedly traveled to Kyiv in May 2019 and met with Mr. Bakanov and another close Zelensky adviser, Mr. Serhiy Shefir.

The so-called whistleblower's account goes on to rely upon that same OCCRP report on three more occasions. It does so to:

Write that Ukraine's Prosecutor General Yuriy Lutsenko "also stated that he wished to communicate directly with Attorney General Barr on these matters." Document that Trump adviser Rudi Giuliani "had spoken in late 2018 to former Prosecutor General Shokin, in a Skype call arranged by two associates of Mr. Giuliani." Bolster the charge that, "I also learned from a U.S. official that 'associates' of Mr. Giuliani were trying to make contact with the incoming Zelenskyy team." The so-called whistleblower then relates in another footnote, "I do not know whether these associates of Mr. Giuliani were the same individuals named in the 22 July report by OCCRP, referenced above."

The OCCRP report repeatedly referenced is actually a "joint investigation by the Organized Crime and Corruption Reporting Project (OCCRP) and BuzzFeed News, based on interviews and court and business records in the United States and Ukraine."

BuzzFeed infamously also first published the full anti-Trump dossier alleging unsubstantiated collusion between Trump's presidential campaign and Russia. The dossier was paid for by Hillary Clinton's campaign and the Democratic National Committee and was produced by the Fusion GPS opposition dirt outfit.

The OCCRP and BuzzFeed "joint investigation" resulted in both OCCRP and BuzzFeed publishing similar lengthy pieces on July 22 claiming that Giuliani was attempting to use connections to have Ukraine investigate Trump's political rivals.

The so-called whistleblower's document, however, only mentions the largely unknown OCCRP and does not reference BuzzFeed, which has faced scrutiny over its reporting on the Russia collusion claims.

Another listed OCCRP funder is the Omidyar Network, which is the nonprofit for liberal billionaire eBay founder Pierre Omidyar.

Together with Soros's Open Society, Omidyar also funds the Poynter Institute for Media Studies, which hosts the International Fact-Checking Network that partnered with Facebook to help determine whether news stories are "disputed."

Like OCCRP, the Poynter Institute's so-called news fact-checking project is openly funded by not only Soros' Open Society Foundations but also Google and the National Endowment for Democracy.

CrowdStrike and DNC servers

CrowdStrike, meanwhile, was brought up by Trump in his phone call with Zelensky. According to the transcript, Trump told Zelensky, "I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike I guess you have one of your wealthy people The server, they say Ukraine has it."

In his extensive report , Special Counsel Robert S. Mueller notes that his investigative team did not "obtain or examine" the servers of the DNC in determining whether those servers were hacked by Russia.

The DNC famously refused to allow the FBI to access its servers to verify the allegation that Russia carried out a hack during the 2016 presidential campaign. Instead, the DNC reached an arrangement with the FBI in which CrowdStrike conducted forensics on the server and shared details with the FBI.

In testimony before the Senate Intelligence Committee in January 2017, then-FBI Director James Comey confirmed that the FBI registered "multiple requests at different levels," to review the DNC's hacked servers. Ultimately, the DNC and FBI came to an agreement in which a "highly respected private company" -- a reference to CrowdStrike -- would carry out forensics on the servers and share any information that it discovered with the FBI, Comey testified.

A senior law enforcement official stressed the importance of the FBI gaining direct access to the servers, a request that was denied by the DNC.

"The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated," the official was quoted by the news media as saying.

"This left the FBI no choice but to rely upon a third party for information. These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier," the official continued.

... ... ...

Aaron Klein is Breitbart's Jerusalem bureau chief and senior investigative reporter. He is a New York Times bestselling author and hosts the popular weekend talk radio program, " Aaron Klein Investigative Radio ." Follow him on Twitter @AaronKleinShow. Follow him on Facebook.

Joshua Klein contributed research to this article.

[Dec 04, 2019] DNC Russian Hackers Found! You Won't Believe Who They Really Work For by the Anonymous Patriots

Highly recommended!
Jan 01, 2017 | themillenniumreport.com

"If someone steals your keys to encrypt the data, it doesn't matter how secure the algorithms are."

Dmitri Alperovitch, founder of CrowdStrike.

By the Anonymous Patriots
SOTN Exclusive

Russians did not hack the DNC system, a Russian named Dmitri Alperovitch is the hacker and he works for President Obama. In the last five years the Obama administration has turned exclusively to one Russian to solve every major cyber-attack in America, whether the attack was on the U.S. government or a corporation. Only one "super-hero cyber-warrior" seems to "have the codes" to figure out "if" a system was hacked and by "whom."

Dmitri's company, CrowdStrike has been called in by Obama to solve mysterious attacks on many high level government agencies and American corporations, including: German Bundestag, Democratic National Committee, Democratic Congressional Campaign Committee (DCCC), the White House, the State Department, SONY, and many others.

CrowdStrike's philosophy is: "You don't have a malware problem; you have an adversary problem."

CrowdStrike has played a critical role in the development of America's cyber-defense policy. Dmitri Alperovitch and George Kurtz, a former head of the FBI cyberwarfare unit founded CrowdStrike. Shawn Henry, former executive assistant director at the FBI is now CrowdStrike's president of services. The company is crawling with former U.S. intelligence agents.

Before Alperovitch founded CrowdStrike in 2011, he was working in Atlanta as the chief threat officer at the antivirus software firm McAfee, owned by Intel (a DARPA company). During that time, he "discovered" the Chinese had compromised at least seventy-one companies and organizations, including thirteen defense contractors, three electronics firms, and the International Olympic Committee. He was the only person to notice the biggest cyberattack in history! Nothing suspicious about that.

Alperovitch and the DNC

After CrowdStrike was hired as an independent "vendor" by the DNC to investigate a possible cyberattack on their system, Alperovitch sent the DNC a proprietary software package called Falcon that monitors the networks of its clients in real time. According to Alperovitch, Falcon "lit up," within ten seconds of being installed at the DNC. Alperovitch had his "proof" in TEN SECONDS that Russia was in the network. This "alleged" evidence of Russian hacking has yet to be shared with anyone.

As Donald Trump has pointed out, the FBI, the agency that should have been immediately involved in hacking that effects "National Security," has yet to even examine the DNC system to begin an investigation. Instead, the FBI and 16 other U.S. "intelligence" agencies simply "agree" with Obama's most trusted "cyberwarfare" expert Dmitri Alperovitch's "TEN SECOND" assessment that produced no evidence to support the claim.

Also remember that it is only Alperovitch and CrowdStrike that claim to have evidence that it was Russian hackers . In fact, only two hackers were found to have been in the system and were both identified by Alperovitch as Russian FSB (CIA) and the Russian GRU (DoD). It is only Alperovitch who claims that he knows that it is Putin behind these two hackers.

Alperovitch failed to mention in his conclusive "TEN SECOND" assessment that Guccifer 2.0 had already hacked the DNC and made available to the public the documents he hacked – before Alperovitch did his ten second assessment. Alperovitch reported that no other hackers were found, ignoring the fact that Guccifer 2.0 had already hacked and released DNC documents to the public. Alperovitch's assessment also goes directly against Julian Assange's repeated statements that the DNC leaks did not come from the Russians.

The ridiculously fake cyber-attack assessment done by Alperovitch and CrowdStrike naïvely flies in the face of the fact that a DNC insider admitted that he had released the DNC documents. Julian Assange implied in an interview that the murdered Democratic National Committee staffer, Seth Rich, was the source of a trove of damaging emails the website posted just days before the party's convention. Seth was on his way to testify about the DNC leaks to the FBI when he was shot dead in the street.

It is also absurd to hear Alperovitch state that the Russian FSB (equivalent to the CIA) had been monitoring the DNC site for over a year and had done nothing. No attack, no theft, and no harm was done to the system by this "false-flag cyber-attack" on the DNC – or at least, Alperovitch "reported" there was an attack. The second hacker, the supposed Russian military (GRU – like the U.S. DoD) hacker, had just entered the system two weeks before and also had done "nothing" but observe.

It is only Alperovitch's word that reports that the Russian FSB was "looking for files on Donald Trump."

It is only this false claim that spuriously ties Trump to the "alleged" attack. It is also only Alperovitch who believes that this hack that was supposedly "looking for Trump files" was an attempt to "influence" the election. No files were found about Trump by the second hacker, as we know from Wikileaks and Guccifer 2.0's leaks. To confabulate that "Russian's hacked the DNC to influence the elections" is the claim of one well-known Russian spy. Then, 17 U.S. intelligence agencies unanimously confirm that Alperovitch is correct – even though there is no evidence and no investigation was ever conducted .

How does Dmitri Alperovitch have such power? Why did Obama again and again use Alperovitch's company, CrowdStrike, when they have miserably failed to stop further cyber-attacks on the systems they were hired to protect? Why should anyone believe CrowdStrikes false-flag report?

After documents from the DNC continued to leak, and Guccifer 2.0 and Wikileaks made CrowdStrike's report look foolish, Alperovitch decided the situation was far worse than he had reported. He single-handedly concluded that the Russians were conducting an "influence operation" to help win the election for Trump . This false assertion had absolutely no evidence to back it up.

On July 22, three days before the Democratic convention in Philadelphia, WikiLeaks dumped a massive cache of emails that had been "stolen" (not hacked) from the DNC. Reporters soon found emails suggesting that the DNC leadership had favored Hillary Clinton in her primary race against Bernie Sanders, which led Debbie Wasserman Schultz, the DNC chair, along with three other officials, to resign.

Just days later, it was discovered that the Democratic Congressional Campaign Committee (DCCC) had been hacked. CrowdStrike was called in again and once again, Alperovitch immediately "believed" that Russia was responsible. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author. Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time Guccifer released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, Guccifer went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.

Once again, Guccifer 2.0 proved Alperovitch and CrowdStrike's claims to be grossly incorrect about the hack originating from Russia, with Putin masterminding it all. Nancy Pelosi offered members of Congress Alperovitch's suggestion of installing Falcon , the system that failed to stop cyberattacks at the DNC, on all congressional laptops.

Key Point: Once Falcon was installed on the computers of members of the U.S. Congress, CrowdStrike had even further full access into U.S. government accounts.

Alperovitch's "Unbelievable" History

Dmitri was born in 1980 in Moscow where his father, Michael, was a nuclear physicist, (so Dmitri claims). Dmitri's father was supposedly involved at the highest levels of Russian nuclear science. He also claims that his father taught him to write code as a child.

In 1990, his father was sent to Maryland as part of a nuclear-safety training program for scientists. In 1994, Michael Alperovitch was granted a visa to Canada, and a year later the family moved to Chattanooga, where Michael took a job with the Tennessee Valley Authority.

While Dmitri Alperovitch was still in high school, he and his father started an encryption-technology business. Dmitri studied computer science at Georgia Tech and went on to work at an antispam software firm. It was at this time that he realized that cyber-defense was more about psychology than it was about technology. A very odd thing to conclude.

Dmitri Alperovitch posed as a "Russian gangster" on spam discussion forums which brought his illegal activity to the attention of the FBI – as a criminal. In 2005, Dmitri flew to Pittsburgh to meet an FBI agent named Keith Mularski, who had been asked to lead an undercover operation against a vast Russian credit-card-theft syndicate. Alperovitch worked closely with Mularski's sting operation which took two years, but it ultimately brought about fifty-six arrests. Dmitri Alperovitch then became a pawn of the FBI and CIA.

In 2010, while he was at McAfee, the head of cybersecurity at Google told Dmitri that Gmail accounts belonging to human-rights activists in China had been breached. Google suspected the Chinese government. Alperovitch found that the breach was unprecedented in scale; it affected more than a dozen of McAfee's clients and involved the Chinese government. Three days after his supposed discovery, Alperovitch was on a plane to Washington where he had been asked to vet a paragraph in a speech by the secretary of state, Hillary Clinton.

2014, Sony called in CrowdStrike to investigate a breach of its network. Alperovitch needed just "two hours" to identify North Korea as the adversary. Executives at Sony asked Alperovitch to go public with the information immediately, but it took the FBI another three weeks before it confirmed the attribution.

Alperovitch then developed a list of "usual suspects" who were well-known hackers who had identifiable malware that they commonly used. Many people use the same malware and Alperovitch's obsession with believing he has the only accurate list of hackers in the world is plain idiocy exacerbated by the U.S. government's belief in his nonsense. Alperovitch even speaks like a "nut-case" in his personal Twitters, which generally have absolutely no references to the technology he is supposedly the best at in the entire world.

Dmitri – Front Man for His Father's Russian Espionage Mission

After taking a close look at the disinformation around Dmitri and his father, it is clear to see that Michael Alperovitch became a CIA operative during his first visit to America. Upon his return to Russia, he stole the best Russian encryption codes that were used to protect the top-secret work of nuclear physics in which his father is alleged to have been a major player. Upon surrendering the codes to the CIA when he returned to Canada, the CIA made it possible for a Russian nuclear scientist to become an American citizen overnight and gain a top-secret security clearance to work at the Oakridge plant, one of the most secure and protected nuclear facilities in America . Only the CIA can transform a Russian into an American with a top-secret clearance overnight.

We can see on Michael Alperovitch's Linked In page that he went from one fantastically top-secret job to the next without a break from the time he entered America. He seemed to be on a career path to work in every major U.S. agency in America. In every job he was hired as the top expert in the field and the leader of the company. All of these jobs after the first one were in cryptology, not nuclear physics. As a matter of fact, Michael became the top expert in America overnight and has stayed the top expert to this day.

Most of the work of cyber-security is creating secure interactions on a non-secure system like the Internet. The cryptologist who assigns the encryption codes controls the system from that point on .

Key Point: Cryptologists are well known for leaving a "back-door" in the base-code so that they can always have over-riding control.

Michael Alperovitch essentially has the "codes" for all Department of Defense sites, the Treasury, the State Department, cell-phones, satellites, and public media . There is hardly any powerful agency or company that he has not written the "codes" for. One might ask, why do American companies and the U.S. government use his particular codes? What are so special about Michael's codes?

Stolen Russian Codes

In December, Obama ordered the U.S. military to conduct cyberattacks against Russia in retaliation for the alleged DNC hacks. All of the attempts to attack Russia's military and intelligence agencies failed miserably. Russia laughed at Obama's attempts to hack their systems. Even the Russian companies targeted by the attacks were not harmed by Obama's cyber-attacks. Hardly any news of these massive and embarrassing failed cyber-attacks were reported by the Main Stream Media. The internet has been scrubbed clean of the reports that said Russia's cyber-defenses were impenetrable due to the sophistication of their encryption codes.

Michael Alperovitch was in possession of those impenetrable codes when he was a top scientist in Russia. It was these very codes that he shared with the CIA on his first trip to America . These codes got him spirited into America and "turned into" the best cryptologist in the world. Michael is simply using the effective codes of Russia to design his codes for the many systems he has created in America for the CIA .

KEY POINT: It is crucial to understand at this junction that the CIA is not solely working for America . The CIA works for itself and there are three branches to the CIA – two of which are hostile to American national interests and support globalism.

Michael and Dmitri Alperovitch work for the CIA (and international intelligence corporations) who support globalism . They, and the globalists for whom they work, are not friends of America or Russia. It is highly likely that the criminal activities of Dmitri, which were supported and sponsored by the FBI, created the very hackers who he often claims are responsible for cyberattacks. None of these supposed "attackers" have ever been found or arrested; they simply exist in the files of CrowdStrike and are used as the "usual culprits" when the FBI or CIA calls in Dmitri to give the one and only opinion that counts. Only Dmitri's "suspicions" are offered as evidence and yet 17 U.S. intelligence agencies stand behind the CrowdStrike report and Dmitri's suspicions.

Michael Alperovitch – Russian Spy with the Crypto-Keys

Essentially, Michael Alperovitch flies under the false-flag of being a cryptologist who works with PKI. A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repository and revokes them if needed. Public key cryptography is a cryptographic technique that enables entities to securely communicate on an insecure public network (the Internet), and reliably verify the identity of an entity via digital signatures . Digital signatures use Certificate Authorities to digitally sign and publish the public key bound to a given user. This is done using the CIA's own private key, so that trust in the user key relies on one's trust in the validity of the CIA's key. Michael Alperovitch is considered to be the number one expert in America on PKI and essentially controls the market .

Michael's past is clouded in confusion and lies. Dmitri states that his father was a nuclear physicist and that he came to America the first time in a nuclear based shared program between America and Russia. But if we look at his current personal Linked In page, Michael claims he has a Master Degree in Applied Mathematics from Gorky State University. From 1932 to 1956, its name was State University of Gorky. Now it is known as Lobachevsky State University of Nizhni Novgorod – National Research University (UNN), also known as Lobachevsky University. Does Michael not even know the name of the University he graduated from? And when does a person with a Master's Degree become a leading nuclear physicist who comes to "visit" America. In Michael's Linked In page there is a long list of his skills and there is no mention of nuclear physics.

Also on Michael Alperovitch's Linked In page we find some of his illustrious history that paints a picture of either the most brilliant mind in computer security, encryption, and cyberwarfare, or a CIA/FBI backed Russian spy. Imagine that out of all the people in the world to put in charge of the encryption keys for the Department of Defense, the U.S. Treasury, U.S. military satellites, the flow of network news, cell phone encryption, the Pathfire (media control) Program, the Defense Information Systems Agency, the Global Information Grid, and TriCipher Armored Credential System among many others, the government hires a Russian spy . Go figure.

Michael Alperovitch's Linked In Page

Education:

Gorky State University, Russia, MS in Applied Mathematics

Work History:

Sr. Security Architect

VT IDirect -2014 – Designing security architecture for satellite communications including cryptographic protocols, authentication.

Principal SME (Contractor)

DISA -Defense Information Systems Agency (Manager of the Global Information Grid) – 2012-2014 – Worked on PKI and identity management projects for DISA utilizing Elliptic Curve Cryptography. Performed application security and penetration testing.

Technical Lead (Contractor)

U.S. Department of the Treasury – 2011 – Designed enterprise validation service architecture for PKI certificate credentials with Single Sign On authentication.

Principal Software Engineer

Comtech Mobile Datacom – 2007-2010 – Subject matter expert on latest information security practices, including authentication, encryption and key management.

Sr. Software Engineer

TriCipher – 2006-2007 – Designed and developed security architecture for TriCipher Armored Credential Authentication System.

Lead Software Engineer

BellSouth – 2003-2006 – Designed and built server-side Jabber-based messaging platform with Single Sign On authentication.

Principal Software Research Engineer

Pathfire – 2001-2002 – Designed and developed Digital Rights Management Server for Video on Demand and content distribution applications. Pathfire provides digital media distribution and management solutions to the television, media, and entertainment industries. The company offers Digital Media Gateway, a digital IP store-and-forward platform, delivering news stories, syndicated programming, advertising spots, and video news releases to broadcasters. It provides solutions for content providers and broadcasters, as well as station solutions.

Obama – No Friend of America

Obama is no friend of America in the war against cyber-attacks. The very agencies and departments being defended by Michael Alperovitch's "singular and most brilliant" ability to write encryption codes have all been successfully attacked and compromised since Michael set up the codes. But we shouldn't worry, because if there is a cyberattack in the Obama administration, Michael's son Dmitri is called in to "prove" that it isn't the fault of his father's codes. It was the "damn Russians", or even "Putin himself" who attacked American networks.

Not one of the 17 U.S. intelligence agencies is capable of figuring out a successful cyberattack against America without Michael and Dmitri's help. Those same 17 U.S. intelligence agencies were not able to effectively launch a successful cyberattack against Russia. It seems like the Russian's have strong codes and America has weak codes. We can thank Michael and Dmitri Alperovitch for that.

It is clear that there was no DNC hack beyond Guccifer 2.0. Dmitri Alperovitch is a "frontman" for his father's encryption espionage mission.

Is it any wonder that Trump says that he has "his own people" to deliver his intelligence to him that is outside of the infiltrated U.S. government intelligence agencies and the Obama administration ? Isn't any wonder that citizens have to go anywhere BUT the MSM to find real news or that the new administration has to go to independent news to get good intel?

It is hard to say anything more damnable than to again quote Dmitri on these very issues:
"If someone steals your keys to encrypt the data, it doesn't matter how secure the algorithms are." Dmitri Alperovitch, founder of CrowdStrike

Originally posted at: http://stateofthenation2012.com/?p=62536

[Dec 04, 2019] June 4th, 2017 Crowdstrike Was at the DNC Six Weeks by George Webb

Highly recommended!
A short YouTube with the handwritten timeline
Nov 27, 2019 | www.youtube.com
AwanContra - George Webb, Investigative Journalist

[Dec 04, 2019] Cyberanalyst George Eliason Claims that the "Fancy Bear" Who Hacked the DNC Server is Ukrainian Intelligence – In League with the Atlantic Council and Crowdstrike

Highly recommended!
Notable quotes:
"... And RUH8 is allied with the Atlantic Council and Crowdstrike. ..."
"... Russia was probably not one of the hacking groups. The willful destruction of evidence by the DNC themselves probably points to Russia not being one of the those groups. The DNC wouldn't destroy evidence that supported their position. Also, government spy agencies keep info like that closely held. They might leak out tidbits, but they don't do wholesale dumps, like, ever. ..."
"... That's what the DNC is lying about. Not that hacks happened (they undoubtedly did), but about who did them (probably not Russian gov), and if hacks mattered (they didn't since everything was getting leaked anyway). ..."
"... The DNC/Mueller/etc are lying, but like most practiced liars they're mixing the lies with half-truths and unrelated facts to muddy the waters: ..."
"... An interesting question is, since it's basically guaranteed the DNC got hacked, but probably not by the Russians, is, what groups did hack the DNC, and why did the DNC scramble madly to hide their identities? ..."
"... And while you think about that question, consider the close parallel with the Awan case, where Dems were ostensibly the victims, but they again scrambled to cover up for the people who supposedly harmed them. level 2 ..."
"... DNC wasn't even hacked. Emails were leaked. They didn't even examine the server. Any "evidence" produced is spoofable from CIA cybertools that we know about from wikileaks. It's important to know how each new lie is a lie. But man I am just so done with all this Russia shit. level 2 ..."
"... Crowdstrike claims that malware was found on DNC server. I agree that this has nothing to do with the Wikileaks releases. What I am wondering is whether Crowdstrike may have arranged for the DNC to be hacked so that Russia could be blamed. Continue this thread level 1 ..."
"... George Eliason promises additional essays: *The next articles, starting with one about Fancy Bear's hot/cold ongoing relationship with Bellingcat which destroys the JIT investigation, will showcase the following: Fancy Bear worked with Bellingcat and the Ukrainian government providing Information War material as evidence for MH17: ..."
"... Fancy Bear is an inside unit of the Atlantic Council and their Digital Forensics Lab ..."
Dec 04, 2018 | www.reddit.com

Cyberanalyst George Eliason has written some intriguing blogs recently claiming that the "Fancy Bear" which hacked the DNC server in mid-2016 was in fact a branch of Ukrainian intelligence linked to the Atlantic Council and Crowdstrike. I invite you to have a go at one of his recent essays:

https://off-guardian.org/2018/06/25/who-is-fancy-bear-and-who-are-they-working-for/

Since I am not very computer savvy and don't know much about the world of hackers - added to the fact that Eliason's writing is too cute and convoluted - I have difficulty navigating Eliason's thought. Nonetheless, here is what I can make of Eliasons' claims, as supported by independent literature:

Russian hacker Konstantin Kozlovsky, in Moscow court filings, has claimed that he did the DNC hack – and can prove it, because he left some specific code on the DNC server.

http://thehill.com/policy/cybersecurity/366696-russian-hacker-claims-he-can-prove-he-hacked-dnc

Kozlovsky states that he did so by order of Dimitry Dokuchaev (formerly of the FSB, and currently in prison in Russia on treason charges) who works with the Russian traitor hacker group Shaltai Boltai.

https://www.newsweek.com/russian-hacker-stealing-clintons-emailshacking-dnc-putinsfsb-745555 (Note that Newsweek's title is an overt lie.)

According to Eliason, Shaltai Boltai works in collaboration with the Ukrainian hacker group RUH8, a group of neo-Nazis (Privat Sektor) who are affiliated with Ukrainian intelligence. And RUH8 is allied with the Atlantic Council and Crowdstrike.

https://off-guardian.org/2018/06/25/who-is-fancy-bear-and-who-are-they-working-for/

Cyberexpert Jeffrey Carr has stated that RUH8 has the X-Agent malware which our intelligence community has erroneously claimed is possessed only by Russian intelligence, and used by "Fancy Bear".

https://medium.com/@jeffreyscarr/the-gru-ukraine-artillery-hack-that-may-never-have-happened-820960bbb02d

Eliason has concluded that RUH8 is Fancy Bear.

This might help explain why Adam Carter has determined that some of the malware found on the DNC server was compiled AFTER Crowdstrike was working on the DNC server – Crowdstrike was in collusion with Fancy Bear (RUH8).

In other words, Crowdstrike likely arranged for a hack by Ukrainian intelligence that they could then attribute to Russia.

As far as I can tell, none of this is pertinent to how Wikileaks obtained their DNC emails, which most likely were leaked.

How curious that our Deep State and the recent Mueller indictment have had nothing to say about Kozlovsky's confession - whom I tend to take seriously because he offers a simple way to confirm his claim. Also interesting that the FBI has shown no interest in looking at the DNC server to check whether Kozlovsky's code is there.

I will ask Adam Carter for his opinion on this. 19 comments 84% Upvoted This thread is archived New comments cannot be posted and votes cannot be cast Sort by View discussions in 1 other community level 1



zer0mas 1 point · 1 year ago

Its worth noting that Dimitri Alperovich's (Crowdstrike) hatred of Putin is second only to Hillary's hatred for taking responsibility for her actions. level 1

veganmark 2 points · 1 year ago

Thanks - I'll continue to follow Eliason's work. The thesis that Ukrainian intelligence is hacking a number of targets so that Russia gets blamed for it has intuitive appeal. level 1

alskdmv-nosleep4u -1 points · 1 year ago

I see things like this:

DNC wasn't even hacked.

and have to cringe. Any hacks weren't related to Wikileaks, who got their info from leakers, but that is not the same thing as no hack. Leaks and hacks aren't mutually exclusive. They actually occur together pretty commonly.

DNC's security was utter shit. Systems with shit security and obviously valuable info usually get hacked by multiple groups. In the case of the DNC, Hillary's email servers, etc., it's basically impossible they weren't hacked by dozens of intruders. A plastic bag of 100s will not sit untouched on a NYC street corner for 4 weeks. Not. fucking. happening.

Interestingly, Russia was probably not one of the hacking groups. The willful destruction of evidence by the DNC themselves probably points to Russia not being one of the those groups. The DNC wouldn't destroy evidence that supported their position. Also, government spy agencies keep info like that closely held. They might leak out tidbits, but they don't do wholesale dumps, like, ever.

That's what the DNC is lying about. Not that hacks happened (they undoubtedly did), but about who did them (probably not Russian gov), and if hacks mattered (they didn't since everything was getting leaked anyway).

The DNC/Mueller/etc are lying, but like most practiced liars they're mixing the lies with half-truths and unrelated facts to muddy the waters:

Any "evidence" produced is spoofable from CIA cybertools

Yes, but that spoofed 'evidence' is not the direct opposite of the truth, like I see people assuming. Bad assumption, and the establishment plays on that to make critic look bad. The spoofed evidence is just mud.


An interesting question is, since it's basically guaranteed the DNC got hacked, but probably not by the Russians, is, what groups did hack the DNC, and why did the DNC scramble madly to hide their identities?

And while you think about that question, consider the close parallel with the Awan case, where Dems were ostensibly the victims, but they again scrambled to cover up for the people who supposedly harmed them. level 2

alskdmv-nosleep4u 2 points · 1 year ago

What's hilarious about the 2 down-votes is I can't tell if their from pro-Russiagate trolls, or from people who who can't get past binary thinking. level 1

Honztastic 2 points · 1 year ago

DNC wasn't even hacked. Emails were leaked. They didn't even examine the server. Any "evidence" produced is spoofable from CIA cybertools that we know about from wikileaks. It's important to know how each new lie is a lie. But man I am just so done with all this Russia shit. level 2

veganmark 2 points · 1 year ago

Crowdstrike claims that malware was found on DNC server. I agree that this has nothing to do with the Wikileaks releases. What I am wondering is whether Crowdstrike may have arranged for the DNC to be hacked so that Russia could be blamed. Continue this thread level 1

Inuma I take the headspace of idiots 9 points · 1 year ago

So you mean to tell me that WWIII is being prepared by Mueller and it was manufactured consent?

I'd be shocked, but this only proves that the "Deep State" only cares about their power, consequences be damned. level 1

veganmark 8 points · 1 year ago

George Eliason promises additional essays: *The next articles, starting with one about Fancy Bear's hot/cold ongoing relationship with Bellingcat which destroys the JIT investigation, will showcase the following: Fancy Bear worked with Bellingcat and the Ukrainian government providing Information War material as evidence for MH17:

HillaryBrokeTheLaw Long live dead poets 10 points · 1 year ago

Nice.

I'm glad you're still following this. Crowdstrike is shady af. level 1

[Dec 04, 2019] Fancy Bear - Conservapedia

Highly recommended!
Dec 04, 2019 | www.conservapedia.com

Fancy Bear (also know as Strontium Group, or APT28) is a Ukrainian cyber espionage group. Cybersecurity firm CrowdStrike incorrectly has said with a medium level of confidence that it is associated with the Russian military intelligence agency GRU . CrowdStrike founder, Dmitri Alperovitch , has colluded with Fancy Bear. American journalist George Eliason has written extensively on the subject.

There are a couple of caveats that need to be made when identifying the Fancy Bear hackers. The first is the identifier used by Mueller as Russian FSB and GRU may have been true- 10 years ago. This group was on the run trying to stay a step ahead of Russian law enforcement until October 2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and possibly former Russian state security. The majority of the group are Ukrainians making up Ukraine's Cyber Warfare groups.

Eliason lives and works in Donbass. He has been interviewed by and provided analysis for RT, the BBC , and Press-TV. His articles have been published in the Security Assistance Monitor, Washingtons Blog, OpedNews, the Saker, RT, Global Research, and RINF, and the Greanville Post among others. He has been cited and republished by various academic blogs including Defending History, Michael Hudson, SWEDHR, Counterpunch, the Justice Integrity Project, among others.

Contents [ hide ] Fancy Bear is Ukrainian Intelligence Shaltai Boltai

The "Fancy Bear hackers" may have been given the passwords to get into the servers at the DNC because they were part of the Team Clinton opposition research team. It was part of their job.

According to Politico ,

"In an interview this month, at the DNC this past election cycle centered on mobilizing ethnic communities -- including Ukrainian-Americans -- she said that, when Trump's unlikely presidential campaign. Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists, government officials and private intelligence operatives. While her consulting work began surging in late 2015, she began focusing more on the research, and expanded it to include Trump's ties to Russia, as well." [1]

The only investigative journalists, government officials, and private intelligence operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and the Ministry of Information.

All of these hacking and information operation groups work for Andrea Chalupa with EuroMaidanPR and Irena Chalupa at the Atlantic Council. Both Chalupa sisters work directly with the Ukrainian government's intelligence and propaganda arms.

Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage , terrorist , counter-terrorism, cyber, propaganda , and info war channels officially recognized and directed by Ukraine's Information Ministry. Along with their American colleagues, they populate the hit-for-hire website Myrotvorets with people who stand against Ukraine's criminal activities.

The hackers, OSINT, Cyber, spies, terrorists, etc. call themselves volunteers to keep safe from State level retaliation, even though a child can follow the money. As volunteers motivated by politics and patriotism they are protected to a degree from retribution.

They don't claim State sponsorship or governance and the level of attack falls below the threshold of military action. Special Counsel Robert Mueller had a lot of latitude for making the attribution Russian, even though the attacks came from Ukrainian Intelligence. Based on how the rules of the Tallinn Manual 2.0 on the International Law Applicable to Cyber are written, because the few members of the coalition from Shaltai Boltai are Russian in nationality, Fancy Bear can be attributed as a Russian entity for the purposes of retribution. The caveat is if the attribution is proven wrong, the US will be liable for damages caused to the State which in this case is Russia.

How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they have the ability to research and work in over 30 different languages.

This can be considered an Information Operation against the people of the United States and of course Russia. After 2013, Shaltay Boltay was no longer physically available to work for Russia. The Russian hackers were in Ukraine working for the Ukrainian government's Information Ministry which is in charge of the cyber war. They were in Ukraine until October 2016 when they were tricked to return to Moscow and promptly arrested for treason.

From all this information we know the Russian component of Team Fancy Bear is Shaltai Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian Intelligence. We know they are grouped with InformNapalm which is Ukraine's OSINT unit. We know their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above work directly with the Atlantic Council and Crowdstrike's Dimitry Alperovich.

In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged data from the Surkov leak.

But during 2014, 2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and CyberHunta went to work for the DNC as opposition researchers .

The First Time Shaltai Boltai was Handed the Keys to US Gov Servers

The setup to this happened long before the partnership with Ukrainian Intel hackers and Russia's Shaltai Boltai was forged. The hack that gained access to US top-secret servers happened just after the partnership was cemented after Euro-Maidan.

In August 2009 Hillary Clinton's Deputy Chief of Staff at the State Department Huma Abedin sent the passwords to her Government laptop to her Yahoo mail account. On August 16, 2010, Abedin received an email titled "Re: Your yahoo account. We can see where this is going, can't we?

"After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin's associates to access email accounts into 2015 and 2016."

Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo hack.

The time frame has to be noted. The hack happened in 2014. Access to the email accounts continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai Boltai was working from Kiev, Ukraine.

So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with looking at the time frame. Ukraine had the keys already in hand in 2014.

Chalupa collusion with Ukrainian Intelligence
See also: Ukrainian collusion and Ukrainian collusion timeline

Alexandra Chalupa hired this particular hacking terrorist group, which Dimitry Alperovich and Crowdstrike dubbed "Fancy Bear", in 2015 at the latest. While the Ukrainian hackers worked for the DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the state of the projects they were working on. Let's face it, once you're in, setting up your Fancy Bear toolkit doesn't get any easier. This is why I said the DNC hack isn't the big crime. It's a big con and all the parties were in on it.

Hillary Clinton exposed secrets to hacking threats by using private email instead of secured servers. Given the information provided she was probably being monitored by our intrepid Ruskie-Ukie union made in hell hackers. Anthony Weiner exposed himself and his wife Huma Abedin using Weiner's computer for top-secret State Department emails. And of course Huma Abedin exposed herself along with her top-secret passwords at Yahoo and it looks like the hackers the DNC hired to do opposition research hacked her.

Here's a question. Did Huma Abedin have Hillary Clinton's passwords for her private email server? It would seem logical given her position with Clinton at the State Department and afterward. This means that Hillary Clinton and the US government top secret servers were most likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using legitimate passwords.

Dobrovolska

Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former staff from 2013 through prepping for the 2016 election. [2] [3] Alexandra Chalupa was running a research department that is rich in (foreign) Ukrainian Intelligence operatives, hackers, terrorists, and a couple Ruskie traitors.

Kristina Dobrovolska was acting as a handler and translator for the US State Department in 2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to Washington to meet with Chalupa.

Alexandra types in her password to show Dobrovolska something she found and her eager to please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the Fancy Bear crew about it and they immediately get to work looking for Trump material on the US secret servers with legitimate access. I mean, what else could they do with this? Turn over sensitive information to the ever corrupt Ukrainian government?

According to the Politico article, Alexandra Chalupa was meeting with the Ukrainian embassy in June of 2016 to discuss getting more help sticking it to candidate Trump. At the same time she was meeting, the embassy had a reception that highlighted female Ukrainian leaders.

Four Verkhovna Rada [parlaiment] deputies there for the event included: Viktoriia Y. Ptashnyk, Anna A. Romanova, Alyona I. Shkrum, and Taras T. Pastukh. [4]

According to CNN , [5] DNC sources said Chalupa told DNC operatives the Ukrainian government would be willing to deliver damaging information against Trump's campaign. Later, Chalupa would lead the charge to try to unseat president-elect Trump starting on Nov 10, 2016.

Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison and translator who escorted the delegates from Kyiv during their visits to Albany and Washington.

Kristina Dobrovolska is the handler manager working with Ukraine's DNC Fancy Bear Hackers. [6] She took the Rada [parliament] members to dinner to meet Joel Harding who designed Ukraine's infamous Information Policy which opened up their kill-for-hire-website Myrotvorets. Then she took them to meet the Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the surviving nephew to the infamous torturer The WWII OUNb leader, Mykola Lebed.

Fancy Bear's Second Chance at Top Secret Passwords From Team Clinton

One very successful method of hacking is called social engineering . You gain access to the office space and any related properties and physically locate the passwords or clues to get you into the hardware you want to hack. This includes something as simple as looking over the shoulder of the person typing in passwords.

The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC opposition research. On different occasions, Fancy Bear handler Kristina Dobrovolska traveled to the US to meet the Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea Chalupa, US Dept of State personnel, and most likely Crowdstrike's Dimitry Alperovich. Alperovich was working with the hackers in 2015-16. In 2016, the only groups known to have Fancy Bear's signature tools called X-tunnel and X-Agent were Alperovich, Crowdstrike, and Fancy Bear (Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does explain a few things.

Alleged DNC hack

There were multiple DNC hacks. There is also clear proof supporting the download to a USB stick and subsequent information exchange (leak) to Wikileaks . All are separate events.

At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It is a matter of public record that Team Clinton provided the DNC hackers with passwords to State Department servers on at least 2 occasions, one wittingly and one not. Fancy Bear hackers are Ukrainian Intelligence Operators.

If the leak came through Seth Rich , it may have been because he saw foreign Intel operatives given this access from the presumed winners of the 2016 US presidential election . The leaker may have been trying to do something about it. I'm curious what information Wikileaks might have.

Alperovitch and Fancy Bear

George Eliason, Washingtonsblog: Why Crowdstrike's Russian Hacking Story Fell Apart- Say Hello to Fancy Bear. investigated. [7]

  • In the wake of the JAR-16-20296 dated December 29, 2016 about hacking and influencing the 2016 election, the need for real evidence is clear. The joint report adds nothing substantial to the October 7th report. It relies on proofs provided by the cyber security firm Crowdstrike that is clearly not on par with intelligence findings or evidence. At the top of the report is an "as is" statement showing this.
  • The difference bet enough evidence is provided to warrant an investigation of specific parties for the DNC hacks. The real story involves specific anti-American actors that need to be investigated for real crimes. For instance, the malware used was an out-dated version just waiting to be found. The one other interesting point is that the Russian malware called Grizzly Steppe is from Ukraine. How did Crowdstrike miss this when it is their business to know?
  • The bar for identification set by Crowdstrike has never been able to get beyond words like probably, maybe, could be, or should be, in their attribution. The bar Dimitri Alperovitch set for identifying the hackers involved is that low. Other than asking America to trust them, how many solid facts has Alperovitch provided to back his claim of Russian involvement?
  • information from outside intelligence agencies has the value of rumor or unsubstantiated information at best according to policy. Usable intelligence needs to be free from partisan politics and verifiable. Intel agencies noted back in the early 90's that every private actor in the information game was radically political.
  • Alperovitch first gained notice when he was the VP in charge of threat research with McAfee. Asked to comment on Alperovitch's discovery of Russian hacks on Larry King, John McAfee had this to say. "Based on all of his experience, McAfee does not believe that Russians were behind the hacks on the Democratic National Committee (DNC), John Podesta's emails, and the Hillary Clinton presidential campaign. As he told RT, "if it looks like the Russians did it, then I can guarantee you it was not the Russians."
  • How does Crowdstrike's story part with reality? First is the admission that it is probably, maybe, could be Russia hacking the DNC. "Intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to Wiki Leaks." The public evidence never goes beyond the word possibility. While never going beyond that or using facts, Crowdstrike insists that it's Russia behind both Clinton's and the Ukrainian losses.
  • NBC carried the story because one of the partners in Crowdstrike is also a consultant for NBC. According to NBC the story reads like this."The company, Crowdstrike, was hired by the DNC to investigate the hack and issued a report publicly attributing it to Russian intelligence. One of Crowdstrike's senior executives is Shawn Henry , a former senior FBI official who consults for NBC News.
  • In June, Crowdstrike went public with its findings that two separate Russian intelligence agencies had hacked the DNC. One, which Crowdstrike and other researchers call Cozy Bear, is believed to be linked to Russia's CIA, known as the FSB. The other, known as Fancy Bear, is believed to be tied to the military intelligence agency, called the GRU." The information is so certain the level of proof never rises above "believed to be." According to the December 12th Intercept article "Most importantly, the Post adds that "intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to WikiLeaks."
  • The SBU, Olexander Turchinov, and the Ukrainian Ministry of Defense all agree that Crowdstrike is dead wrong in this assessment. Although subtitles aren't on it, the former Commandant of Ukrainian Army Headquarters thanks God Russia never invaded or Ukraine would have been in deep trouble. How could Dimitri Alperovitch and Crowdstrike be this wrong on easily checked detail and still get this much media attention?
  • Crowdstrike CEO Dmitri Alperovitch story about Russian hacks that cost Hillary Clinton the election was broadsided by the SBU (Ukrainian Intelligence and Security) in Ukraine. If Dimitri Alperovitch is working for Ukrainian Intelligence and is providing intelligence to 17 US Intelligence Agencies is it a conflict of interest?
  • Is giving misleading or false information to 17 US Intelligence Agencies a crime? If it's done by a cyber security industry leader like Crowdstrike should that be investigated? If unwinding the story from the "targeting of Ukrainian volunteers" side isn't enough, we should look at this from the American perspective. How did the Russia influencing the election and DNC hack story evolve? Who's involved? Does this pose conflicts of interest for Dmitri Alperovitch and Crowdstrike? And let's face it, a hacking story isn't complete until real hackers with the skills, motivation, and reason are exposed.
  • According to journalist and DNC activist Andrea Chalupa on her Facebook page "After Chalupa sent the email to Miranda (which mentions that she had invited this reporter to a meeting with Ukrainian journalists in Washington), it triggered high-level concerns within the DNC, given the sensitive nature of her work. "That's when we knew it was the Russians," said a Democratic Party source who has been directly involved in the internal probe into the hacked emails. In order to stem the damage, the source said, "we told her to stop her research."" July 25, 2016
  • If she was that close to the investigation Crowdstrike did how credible is she? Her sister Alexandra was named one of 16 people that shaped the election by Yahoo news. The DNC hacking investigation done by Crowdstrike concluded hacking was done by Russian actors based on the work done by Alexandra Chalupa ? That is the conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the Russian government connection.
  • How close is Dimitri Alperovitch to DNC officials? Close enough professionally he should have stepped down from an investigation that had the chance of throwing a presidential election in a new direction. According to Esquire.com, Alperovitch has vetted speeches for Hillary Clinton about cyber security issues in the past. Because of his work on the Sony hack, President Barrack Obama personally called and said the measures taken were directly because of his work.
  • Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian propagandists, and Ukrainian state supported hackers [show a conflict of interest]. When it all adds up and you see it together, we have found a Russian that tried hard to influence the outcome of the US presidential election in 2016.
  • The Chalupas are not Democrat or Republican. They are OUNb. The OUNb worked hard to start a war between the USA and Russia for the last 50 years. According to the Ukrainian Weekly in a rare open statement of their existence in 2011, "Other statements were issued in the Ukrainian language by the leadership of the Organization of Ukrainian Nationalists (B) and the International Conference in Support of Ukraine. The OUN (Bandera wing) called for" What is OUNb Bandera? They follow the same political policy and platform that was developed in the 1930's by Stepan Bandera . When these people go to a Holocaust memorial they are celebrating both the dead and the OUNb SS that killed. [8] There is no getting around this fact. The OUNb have no concept of democratic values and want an authoritarian fascism .
  • Alexandra Chalupa- According to the Ukrainian Weekly , [9]
"The effort, known as Digital Miadan, gained momentum following the initial Twitter storms. Leading the effort were: Lara Chelak, Andrea Chalupa, Alexandra Chalupa, Constatin Kostenko and others." The Digital Maidan was also how they raised money for the coup. This was how the Ukrainian emigres bought the bullets that were used on Euromaidan. Ukraine's chubby nazi, Dima Yarosh stated openly he was taking money from the Ukrainian emigres during Euromaidan and Pravy Sektor still fundraises openly in North America. The "Sniper Massacre" on the Maidan in Ukraine by Dr. Ivan Katchanovski, University of Ottowa shows clearly detailed evidence how the massacre happened. It has Pravy Sektor confessions that show who created the "heavenly hundred. Their admitted involvement as leaders of Digital Maidan by both Chalupas is a clear violation of the Neutrality Act and has up to a 25 year prison sentence attached to it because it ended in a coup.
  • Andrea Chalupa-2014, in a Huff Post article Sept. 1 2016, Andrea Chalupa described Sviatoslav Yurash as one of Ukraine's important "dreamers." He is a young activist that founded Euromaidan Press. Beyond the gushing glow what she doesn't say is who he actually is. Sviatoslav Yurash was Dmitri Yarosh's spokesman just after Maidan. He is a hardcore Ukrainian nationalist and was rewarded with the Deputy Director position for the UWC (Ukrainian World Congress) in Kiev.
  • In January, 2014 when he showed up at the Maidan protests he was 17 years old. He became the foreign language media representative for Vitali Klitschko, Arseni Yatsenyuk, and Oleh Tyahnybok. All press enquiries went through Yurash. To meet Dimitri Yurash you had to go through Sviatoslav Yurash as a Macleans reporter found out.
  • At 18 years old, Sviatoslav Yurash became the spokesman for Ministry of Defense of Ukraine under Andrei Paruby. He was Dimitri Yarosh's spokesman and can be seen either behind Yarosh on videos at press conferences or speaking ahead of him to reporters. From January 2014 onward, to speak to Dimitri Yarosh, you set up an appointment with Yurash.
  • Andrea Chalupa has worked with Yurash's Euromaidan Press which is associated with Informnapalm.org and supplies the state level hackers for Ukraine.
  • Irene Chalupa- Another involved Chalupa we need to cover to do the story justice is Irene Chalupa. From her bio– Irena Chalupa is a nonresident fellow with the Atlantic Council's Dinu Patriciu Eurasia Center. She is also a senior correspondent at Radio Free Europe/Radio Liberty (RFE/RL), where she has worked for more than twenty years. Ms. Chalupa previously served as an editor for the Atlantic Council, where she covered Ukraine and Eastern Europe. Irena Chalupa is also the news anchor for Ukraine's propaganda channel org She is also a Ukrainian emigre leader.
  • According to Robert Parry's article [10] At the forefront of people that would have taken senior positions in a Clinton administration and especially in foreign policy are the Atlantic Council . Their main goal is still a major confrontation with nuclear-armed Russia.
  • The Atlantic Council is the think tank associated and supported by the CEEC (Central and Eastern European Coalition). The CEEC has only one goal which is war with Russia. Their question to candidates looking for their support in the election was "Are you willing to go to war with Russia?" Hillary Clinton has received their unqualified support throughout the campaign.
  • What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the Atlantic Council would have taken senior cabinet and policy positions, his own fellowship status at the Atlantic Council and relationship with Irene Chalupa creates a definite conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or Homeland Security?
  • When you put someone that has so much to gain in charge of an investigation that could change an election, that is a conflict of interest. If the think tank is linked heavily to groups that want war with Russia like the Atlantic Council and the CEEC, it opens up criminal conspiracy.
  • If the person in charge of the investigation is a fellow at the think tank that wants a major conflict with Russia it is a definite conflict of interest. Both the Atlantic Council and clients stood to gain Cabinet and Policy positions based on how the result of his work affects the election. It clouds the results of the investigation. In Dmitri Alperovitch's case, he found the perpetrator before he was positive there was a crime.
  • Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence groups is where things really heat up. Noted above she works with Euromaidanpress.com and Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers.
  • When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and its hackers individually. There is a mutual relationship. When you add up his work for the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be investigated to see if Ukraine is conspiring against the US government. Crowdstrike is also following their hack of a Russian government official after the DNC hack. It closely resembles the same method used with the DNC because it was an email hack.
  • Crowdstrike's product line includes Falcon Host, Falcon Intelligence, Falcon Overwatch and Falcon DNS. Is it possible the hackers in Falcons Flame are another service Crowdstrike offers?
  • In an interview with Euromaidanpress these hackers say they have no need for the CIA. [11] They consider the CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance is a quasi-organization with the participation of several groups – RUH8, Trinity, Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the Myrotvorets site, Informnapalm analytical agency."
Although this profile says Virginia, tweets are from the Sofia, Bulgaria time zone and he writes in Russian. Another curiosity considering the Fancy Bear source code is in Russian. This image shows Crowdstrike in their network. Crowdstrike is part of Ukrainian nationalist hacker network. In the image it shows a network diagram of Crowdstrike following the Surkov leaks. The network communication goes through a secondary source. Although OSINT Academy sounds fairly innocuous, it's the official twitter account for Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence. The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates journalists and other people for assassination. If you disagree with OUNb politics, you could be on the list.
  • Should someone tell Dimitri Alperovitch that Gerashchenko, who is now in charge of Peacekeeper recently threatened president-elect Donald Trump that he would put him on his "Peacemaker" site as a target? The same has been done with Silvio Berscaloni in the past.
  • Trying not to be obvious, the Head of Ukraine's Information Ministry (UA Intelligence) tweeted something interesting that ties Alperovitch and Crowdstrike to the Ukrainian Intelligence hackers and the Information Ministry even tighter. This single tweet on a network chart shows that out of all the Ukrainian Ministry of Information Minister's following, he only wanted the 3 hacking groups associated with both him and Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be shared heavily. If it was a victory for the hacking squad, it would be smart to keep it to themselves and not draw unwanted attention.
  • These same hackers are associated with Alexandra, Andrea, and Irene Chalupa through the portals and organizations they work with through their OUNb. The hackers are funded and directed by or through the same OUNb channels that Alperovitch is working for and with to promote the story of Russian hacking.
  • When you look at the image for the hacking group in the euromaidanpress article, one of the hackers identifies themselves as one of Dimitri Yarosh's Pravy Sektor members by the Pravy Sektor sweatshirt they have on. Noted above, Pravy Sektor admitted to killing the people at the Maidan protest and sparked the coup.
  • Going further with the linked Euromaidanpress article the hackers say "Let's understand that Ukrainian hackers and Russian hackers once constituted a single very powerful group. Ukrainian hackers have a rather high level of work. So the help of the USA I don't know, why would we need it? We have all the talent and special means for this. And I don't think that the USA or any NATO country would make such sharp movements in international politics."
  • What sharp movements in international politics have been made lately? Let me spell it out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored, Russian language hackers in Eastern European time zones have shown with the Surkov hack they have the tools and experience to hack states that are looking out for it. They are also laughing at US intel efforts.
  • The hackers also made it clear that they will do anything to serve Ukraine. Starting a war between Russia and the USA is the one way they could serve Ukraine best, and hurt Russia worst. Given those facts, if the DNC hack was according to the criteria given by Alperovitch, both he and these hackers need to be investigated.
  • According to the Esquire interview "Alperovitch was deeply frustrated: He thought the government should tell the world what it knew. There is, of course, an element of the personal in his battle cry. "A lot of people who are born here don't appreciate the freedoms we have, the opportunities we have, because they've never had it any other way," he told me. "I have."
  • While I agree patriotism is a great thing, confusing it with this kind of nationalism is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering a conflict with Russia that is against American interests, he's a patriot. He isn't serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to Ukraine.
  • The evidence presented deserves investigation because it looks like the case for conflict of interest is the least Dimitri Alperovitch should look forward to. If these hackers are the real Cozy Bear and Fancy Bear, they really did make sharp movements in international politics. By pawning it off on Russia, they made a worldwide embarrassment of an outgoing President of the United States and made the President Elect the suspect of rumor.
Obama, Brazile, Comey, and CrowdStrike

According to Obama the hacks continued until September 2016. According to ABC, Donna Brazile says the hacks didn't stop until after the elections in 2016. According to Crowdstrike the hacks continued into November.

Democratic National Committee Chair Donna Brazile said Russian hackers persisted in trying to break into the organization's computers "daily, hourly" until after the election -- contradicting President Obama's assertion that the hacking stopped in September after he warned Russian President Vladimir Putin to "cut it out."-ABC

This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney , the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best.

The DNC fiasco isn't that important of a crime. The reason I say this is the FBI would have taken control over material evidence right away. No law enforcement agency or Intel agency ever did. This means none of them considered it a crime Comey should have any part of investigating. That by itself presents the one question mark which destroys any hope Mueller has proving law enforcement maintained a chain of custody for any evidence he introduces.

It also says the US government under Barrack Obama and the victimized DNC saw this as a purely political event. They didn't want this prosecuted or they didn't think it was prosecutable.

Once proven it shows a degree of criminality that makes treason almost too light a charge in federal court. Rest assured this isn't a partisan accusation. Team Clinton and the DNC gets the spotlight but there are Republicans involved.

Further reading

[Dec 04, 2019] June 2nd, 2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams by George Webb

Highly recommended!
Nov 27, 2019 | www.youtube.com

Investigative Jouralist George Webb worked at MacAfee and Network Solutions in 2000 when the CEO Bill Larsen bought a small, Moscow based, hacking and virus writing company to move to Silicon Valley.

MacAfee also purchased PGP, an open source encryption software developed by privacy advocate to reduce NSA spying on the public.

The two simultaneous purchase of PGP and the Moscow hacking team by Metwork Solutions was sponsored by the CIA and FBI in order to crack encrypted communications to write a back door for law enforcement.

Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike.

In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives.

[Nov 30, 2019] Beyond The DNC - Leaks, Hacks, and Treason by George Eliason George Eliason

Notable quotes:
"... This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney, the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best. ..."
Nov 30, 2019 | www.mintpressnews.com

Here's what's different in the information I've compiled.

At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It is a matter of public record that Team Clinton provided the DNC hackers with passwords to State Department servers on at least 2 occasions, one wittingly and one not. I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators.

This gives some credence to the Seth Rich leak (DNC leak story) as an act of patriotism. If the leak came through Seth Rich, it may have been because he saw foreign Intel operatives given this access from the presumed winners of the 2016 US presidential election. No political operative is going to argue with the presumed president-elect over foreign policy. The leaker may have been trying to do something about it. I'm curious what information Wikileaks might have.

The real crime of the DNC hack wasn't the hack.

If only half of the following proved true in context and it's a matter of public record, that makes the argument to stop funding for Ukraine immediately barring an investigation of high crimes by Ukrainian Diaspora, Democrat, and Republican leaders in Congress, private Intel for hire, and Ukrainian Intel's attacks on the US government and political processes.

Perhaps it's time Donald J. Trump @realDonaldTrump should consider treason investigations across the board. Make America great again by bringing justice and civility back.

DNC Hack – High Crimes or Misdemeanors?

So what went on at the DNC way back in 2016? Do you know? Was it a hack or a leak? Does it matter?

Recently, an investigative journalist who writes under the name Adam Carter was raked over the coals. Carter writes at Disobedient Media and has been providing a lot of evidence supporting the DNC leak story former Ambassador Craig Murray and Wikileaks claim happened.

When the smear article came out and apparently it's blossoming into a campaign, a few people that read both of us wrote to the effect "looks like your work is the only thing left standing." I immediately rebuffed the idea and said Carter's work stands on its own . It has nothing to do with anything I've written, researched, or plan to.

I'd say the same about Scott Humor , Lee Stranahan , Garland Nixon , Petri Krohn , or Steve McIntyre . And there are many others. There has been a lot of good work on the DNC hacks and 2016 election interference. Oftentimes, what looks like contradictory information is complimentary because what each journalist is working on shows the story from a different angle.

https://www.youtube-nocookie.com/embed/q9W3QsO75mM?rel=0&showinfo=0

There are a lot of moving parts to the story and even a small change in focus brings an entirely new story because it comes from a different direction.

Here's what I mean. If the DNC hack was really a leak, does that kill the "hack" story? No, it doesn't and I blame a lot of activist journalists for making the assumption that it has to work this way. If Seth Rich gave Ambassador Craig Murray a USB stick with all the "hacked info," it doesn't change an iota of what I've written and the evidence you are about to read stands on its own. But, this has divided people into camps before the whole situation could be scrutinized and that's still not done yet.

If for example you have a leak on Jan 5th , can you have "a hack" on Jan 6th , 7th, or 8th? Since there is so much crap surrounding the supposed hack such as law enforcement teams never examining the DNC server or maintaining control of it as evidence, could the hacks have been a cover-up?

Hang em' High

According to Obama the hacks continued until September 2016. According to ABC, Donna Brazile says the hacks didn't stop until after the elections in 2016. According to Crowdstrike the hacks continued into November.

Democratic National Committee Chair Donna Brazile said Russian hackers persisted in trying to break into the organization's computers "daily, hourly" until after the election -- contradicting President Obama's assertion that the hacking stopped in September after he warned Russian President Vladimir Putin to "cut it out."-ABC

This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney, the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best.

https://www.youtube-nocookie.com/embed/L3cDZU9Tp7w?rel=0&showinfo=0

The DNC fiasco isn't that important of a crime. The reason I say this is the FBI would have taken control over material evidence right away. No law enforcement agency or Intel agency ever did. This means none of them considered it a crime Comey should have any part of investigating. That by itself presents the one question mark which destroys any hope Mueller has proving law enforcement maintained a chain of custody for any evidence he introduces.

It also says the US government under Barrack Obama and the victimized DNC saw this as a purely political event. They didn't want this prosecuted or they didn't think it was prosecutable.

Once proven it shows a degree of criminality that makes treason almost too light a charge in federal court. Rest assured this isn't a partisan accusation. Team Clinton and the DNC gets the spotlight but there are Republicans involved.

Identifying Team Fancy Bear

There are a couple of caveats that need to be made when identifying the Fancy Bear hackers . The first is the identifier used by Mueller as Russian FSB and GRU may have been true- 10 years ago. This group was on the run trying to stay a step ahead of Russian law enforcement until October 2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and possibly former Russian state security. The majority of the group are Ukrainians making up Ukraine's Cyber Warfare groups.

Identifying the hackers as FSB or GRU today is as helpful and has the same validity as identifying Special Prosecutor Mueller as a cashier at McDonalds because he worked there during school. It's insulting and self-defeating, so stop it.

How Mueller is Making a Russian Attribution for the DNC Hackers

If you look at the attribution section for the Tallinn Manual 2.0 on the International Law Applicable to Cyber and specifically the section that deals with peacetime attributions of a non-state actor/ hacker we have an answer.

The hackers, OSINT, Cyber, spies, terrorists, etc call themselves volunteers to keep safe from State level retaliation, even though a child can follow the money. As volunteers motivated by politics and patriotism they are protected to a degree from retribution.

They don't claim State sponsorship or governance and the level of attack falls below the threshold of military action. Mueller has a lot of latitude for making the attribution Russian, even though the attacks came from Ukrainian Intel. Based on how the rules are written, because the few members of the coalition from Shaltai Boltai are Russian in nationality, Fancy Bear can be attributed as a Russian entity for the purposes of retribution. The caveat is if the attribution is proven wrong, the US will be liable for damages caused to the State which in this case is Russia.

How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they have the ability to research and work in over 30 different languages.

This can be considered an Information Operation against the people of the United States and of course Russia. We'll get to why shortly.

After 2013, Shaltay Boltay was no longer physically available to work for Russia . The Russian hackers were in Ukraine working for the Ukrainian government's Information Ministry which is in charge of the cyber war. They were in Ukraine until October 2016 when they were tricked to return to Moscow and promptly arrested for treason.

From all this information we know the Russian component of Team Fancy Bear is Shaltai Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian Intelligence. We know they are grouped with InformNapalm which is Ukraine's OSINT unit. We know their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above work directly with the Atlantic Council and Crowdstrike's Dimitry Alperovich.

In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged data from the Surkov leak.

But during 2014,2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and CyberHunta went to work for the DNC as opposition researchers.

The First Time Shaltai Boltai was Handed the Keys to US Gov Servers

The setup to this happened long before the partnership with Ukrainian Intel hackers and Russia's Shaltai Boltai was forged. The hack that gained access to US top-secret servers happened just after the partnership was cemented after Euro-Maidan.

In August 2009 Hillary Clinton's Deputy Chief of Staff at the State Department Huma Abedin sent the passwords to her Government laptop to her Yahoo mail account. On August 16, 2010, Abedin received an email titled "Re: Your yahoo account. We can see where this is going, can't we?

"After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin's associates to access email accounts into 2015 and 2016."

Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo hack.

The time frame has to be noted. The hack happened in 2014. Access to the email accounts continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai Boltai was working from Kiev, Ukraine.

So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with looking at the time frame. Ukraine had the keys already in hand in 2014.

The DNC's Team Fancy Bear

The "Fancy Bear hackers" may have been given the passwords to get into the servers at the DNC because they were part of the Team Clinton opposition research team. It was part of their job. Let that concept settle in for a moment.

According to Politico "In an interview this month, Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists , government officials and private intelligence operatives . While her consulting work at the DNC this past election cycle centered on mobilizing ethnic communities -- including Ukrainian-Americans -- she said that, when Trump's unlikely presidential campaign began surging in late 2015, she began focusing more on the research, and expanded it to include Trump's ties to Russia, as well ."

me title=

The only investigative journalists, government officials, and private intelligence operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and the Ministry of Information.

All of these hacking and information operation groups work for Andrea Chalupa with EuroMaidanPR and Irena Chalupa at the Atlantic Council . Both C halupa sisters work directly with the Ukrainian government's Intel and propaganda arms.

Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage, terrorist, counter-terrorism, cyber, propaganda, and info war channels officially recognized and directed by Ukraine's Information Ministry. Along with their American colleagues, they populate the hit-for-hire website Myrotvorets with people who stand against Ukraine's criminal activities.

Alexandra Chalupa hired this particular hacking terrorist group called Fancy Bear by Dimitry Alperovich and Crowdstrike at the latest in 2015. While the Ukrainian hackers worked for the DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the state of the projects they were working on. Let's face it, once you're in, setting up your Fancy Bear toolkit doesn't get any easier. This is why I said the DNC hack isn't the big crime. It's a big con and all the parties were in on it.

Indict Team Clinton for the DNC Hacks and RNC Hack

Hillary Clinton exposed secrets to hacking threats by using private email instead of secured servers. Given the information provided she was probably being monitored by our intrepid Ruskie-Ukie union made in hell hackers. Anthony Weiner exposed himself and his wife Huma Abedin using Weiner's computer for top-secret State Department emails. And of course Huma Abedin exposed herself along with her top-secret passwords at Yahoo and it looks like the hackers the DNC hired to do opposition research hacked her.

Here's a question. Did Huma Abedin have Hillary Clinton's passwords for her private email server? It would seem logical given her position with Clinton at the State Department and afterward. This means that Hillary Clinton and the US government top secret servers were most likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using legitimate passwords.

The RNC Hack

According to the Washington Post , "Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach."

In January 2017 , criminal proceedings started for Edward Nedelyaev under articles 335 'spying' and 343

'inciting hatred or enmity." He was a member of the Aidar battalion. Aidar members have been cited for torture and murder. Although the translation isn't available on the linked video the MGB (LNR equivalent to the FBI) ask Aidar's Nedelyaev about his relationship with Ukraine's SBU. The SBU asked him to hack US presidential candidate Donald Trump's election headquarters and he refused. Asked if this was through convictions, he says no, explaining that he is not a hacker. The video was published on January 10, 2017 .

Taken at face value it really does show the ineptness of the SBU after 2014. This is why Ukraine relied (s) on the Diaspora financed Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, RUH8, Bellingcat, Webradius, InformNapalm and associated parties.

The Ukrainians were hired to get the goods on Trump. Part of that is knowing where to start isn't it?

Fancy Bear's Second Chance at Top Secret Passwords From Team Clinton

How stupid would the Fancy Bear teams of Shaltai Boltai, CyberHunta, Ukrainian Cyber Alliance, and RUH8 be if they had access to the DNC servers which makes it easier to get into the US State servers and not do that if it was their goal?

One very successful method of hacking is called social engineering. You gain access to the office space and any related properties and physically locate the passwords or clues to get you into the hardware you want to hack. This includes something as simple as looking over the shoulder of the person typing in passwords.

Let's be clear. The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC opposition research. On different occasions, Fancy Bear handler Kristina Dobrovolska traveled to the US to meet the Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea Chalupa, US Dept of State personnel, and most likely Crowdstrike's Dimitry Alperovich. Alperovich was working with the hackers in 2015-16. In 2016, the only groups known to have Fancy Bear's signature tools called X-tunnel and X-Agent were Alperovich, Crowdstrike, and Fancy Bear (Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does explain a few things.

Here is where it goes from bad to outright Fancy Bear ugly. Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former staff for research purposes from 2013 through prepping for the 2016 election. Were any foreigners part of the opposition research team for Team Hillary in 2014-2015-2016? The Clinton's don't have a history of vetting security issues well.

Let's recap. Clinton keeps 6 top secret passwords for research staff. Alexandra Chalupa is running a research department that is rich in (foreign) Ukrainian Intelligence operatives, hackers, terrorists, and a couple Ruskie traitors.

Kristina Dobrovolska was acting as a handler and translator for the US State Department in 2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to Washington to meet with Chalupa.

Alexandra types in her password to show Dobrovolska something she found and her eager to please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the Fancy Bear crew about it and they immediately get to work looking for Trump material on the US secret servers with legitimate access. I mean, what else could they do with this? Turn over sensitive information to the ever corrupt Ukrainian government?

According to the Politico article , Alexandra Chalupa was meeting with the Ukrainian embassy in June of 2016 to discuss getting more help sticking it to candidate Trump. At the same time she was meeting, the embassy had a reception that highlighted female Ukrainian leaders.

Four Verkhovna Rada deputies there for the event included: Viktoriia Y. Ptashnyk, Anna A. Romanova, Alyona I. Shkrum, and Taras T. Pastukh.

According to CNN, DNC sources said Chalupa told DNC operatives the Ukrainian government would be willing to deliver damaging information against Trump's campaign . Later, Chalupa would lead the charge to try to unseat president-elect Trump starting on Nov 10, 2016.

Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison and translator who escorted the delegates from Kyiv during their visits to Albany and Washington.

Kristina Dobrovolska is the handler manager working with Ukraine's DNC Fancy Bear Hackers . She took the Rada members to dinner to meet Joel Harding who designed Ukraine's infamous Information Policy which opened up their kill-for-hire-website Myrotvorets. Then she took them to meet the Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the surviving nephew to the infamous torturer The WWII OUNb leader, Mykola Lebed.

The Podesta Hack – Don't Mess with OUNb Parkhomenko

I have no interest in reviewing his history except for a few points. Adam Parkhomenko, a Diaspora Ukrainian nationalist almost gained a position in the presumed Clinton White House. As a Ukrainian nationalist, his first loyalty, like any other Ukrainian nationalist, is to a fascist model of Ukraine which Stepan Bandera devised but with a win it would be in America.

During the 2016 primaries, it was Parkhomenko who accused Bernie Sanders of working for Vladimir Putin. Parkhomenko has never really had a job outside the Clinton campaign.

Adam Parkhomenko <img src="https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11.png" alt="Adam Parkhomenko" width="355" height="454" srcset="https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11.png 355w, https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11-235x300.png 235w" sizes="(max-width: 355px) 100vw, 355px" /> Before Clinton declared her candidacy, Parkhomenko started a PAC for Hillary Clinton with the goal of getting millions of people email lists so the support was ready for a Clinton run. After she declared her candidacy, Robby Mook, Hillary's campaign manager decided to sideline Parkhomenko and didn't take on his full staff as promised. He reduced Parkomenko to a quiet menial position when he was brought onboard.

Ultimately, Podesta became responsible for this because he gave Parkhomenko assurances that his staff would be brought on and there would be no gaps in their paycheck. Many of them including Parkhomenko's family moved to Brooklyn. And of course, that didn't happen. Podesta was hacked in March and the Ukrainian nationalist Adam Parkhomenko was hired April 1st .

Today, Parkhomenko is working as a #DigitalSherlock with the Atlantic Council along with the Fancy Bear hackers and many of the people associated with them. Why could this be a revenge hack?

The Ukrainian Intel hackers are Pravy Sektor Ukrainian nationalists. Alexandra Chalupa is also an OUNb Bandera Ukrainian nationalist. This Ukrainian nationalist was on his way to becoming one of the most powerful people in America. That's why.

The DNC Leak- A Patriotic Act

At the same time her aides were creating "loyalty scores ", Clinton, "instructed a trusted aide to access the campaign's server and download the messages sent and received by top staffers. She believed her campaign had failed her -- not the other way around -- and she wanted 'to see who was talking to who, who was leaking to who.2'" After personally reading the email correspondence of her staffers, she called them into interviews for the 2016 campaign, where she confronted them with some of the revelations."-

Forget about the DNC. The hackers may have spent months surfing the US secret servers downloading and delivering top secret diplomatic files to their own government. The people entrusted with this weren't just sloppy with security, this is beyond treason.

It doesn't matter if it was Seth Rich, though I hope it was ( for identification's sake), who downloaded data from the DNC servers. The reasons supporting a leak are described by the Veteran Intelligence Professionals for Sanity (VIPS). This shows clearly why the leak to Wikileaks is much more plausible than a hack for the files taken in what is commonly called the DNC hack. This leak was one "hack" of many that was going on.

Imagine being this person inside the situations described above with the reality hitting you that things were very wrong. Even if they only saw parts of it, how much is too much? US government secrets were being accessed and we know this because the passwords were given out to the research teams the hackers were on.

It is very possible that giving the files to Wikileaks was the only safe way to be a whistleblower with a Democrat president supporting Team Hillary even as Team Hillary was cannibalizing itself. For detail on how the leak happened, refer to Adam Carter at DisobedientMedia.com and the VIPS themselves.

Today, this isn't a Democrat problem. It could just as easily been an establishment Republican.

Ukraine needs to pay for what their Intel Operators/ hackers have done. Stop funding Ukraine other than verifiable humanitarian aid. Call your Congressional Rep.

Next up – We are going to look at who has oversight over this operation and who's footing the bills.

Over the last 4 years, I've researched and written many stories that are still breaking in media today. Over the past 7 months we:

If you want to support investigative research with a lot of depth, please support my Patreon page. You can also support my work through PayPal as we expand in new directions over the coming year. For the last 4 years, it's been almost entirely self-supportive effort which is something when you consider I live in Donbass.

Top Photo | Former Democratic National Committee chair Donna Brazile holds a copy of her book Hacks, detailing the hacking of the DNC, during a meeting of The Commonwealth Club, Nov. 9, 2017, in San Francisco. Marcio Jose Sanchez | AP

George Eliason is an American journalist that lives and works in Donbass. He has been interviewed by and provided analysis for RT, the BBC, and Press-TV. His articles have been published in the Security Assistance Monitor, Washingtons Blog, OpedNews, the Saker, RT, Global Research, and RINF, and the Greanville Post among others. He has been cited and republished by various academic blogs including Defending History, Michael Hudson, SWEDHR, Counterpunch, the Justice Integrity Project, among others.

Republish our stories! MintPress News is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 International License.

[Nov 28, 2019] Guccifer 2.0 certainly didn't make a genuine effort to "conceal a Russian identity," far from it

Nov 28, 2019 | www.reddit.com

Posted by u/PropagandaBot1 1 day ago

Guccifer 2.0 certainly didn't make a genuine effort to "conceal a Russian identity," far from it.

The persona made decisions that would leave behind a demonstrable trail of Russian-themed breadcrumbs, examples include: US politics (domestic)

PropagandaBot1 -1 points · 1 day ago

http://www.softpanorama.org/Skeptics/Political_skeptic/Neocons/Hillary/guccifer20_false_flag_operation.shtml

[Nov 03, 2019] Growing Indicators of Brennan's CIA Trump Task Force by Larry C Johnson - Sic Semper Tyrannis

Highly recommended!
Notable quotes:
"... The Task Force also could carry out other covert actions, such as information operations. A nice sounding euphemism for propaganda, and computer network operations. There has been some informed speculation that Guccifer 2.0 was a creation of this Task Force. ..."
Nov 03, 2019 | turcopolier.typepad.com

Growing Indicators of Brennan's CIA Trump Task Force by Larry C Johnson Larry Johnson-5x7

The average American has no idea how alarming is the news that former CIA Director John Brennan reportedly created and staffed a CIA Task Force in early 2016 that was named, Trump Task Force, and given the mission of spying on and carrying out covert actions against the campaign of candidate Donald Trump.

This was not a simple gathering of a small number of disgruntled Democrats working at the CIA who got together like a book club to grouse and complain about the brash real estate guy from New York. It was a specially designed covert action to try to destroy Donald Trump.

A "Task Force" is a special bureaucratic creation that provides a vehicle for bring case officers and analysts together, along with admin support, for a limited term project. But it also can be expanded to include personnel from other agencies, such as the FBI, DIA and NSA. Task Forces have been used since the inception of the CIA in 1947. Here's a recently declassified memo outlining the considerations in the creation of a task force in 1958. The author, L.K. White, talks about the need for a coordinating Headquarters element and an Operational unit "in the field", i.e. deployed around the world.

A Task Force operates independent of the CIA " Mission Centers " (that's the jargon for the current CIA organization chart).

So what did John Brennan do? I am told by an knowledgeable source that Brennan created a Trump Task Force in early 2016. It was an invitation only Task Force. Specific case officers (i.e., men and women who recruit and handle spies overseas), analysts and admin personnel were recruited. Not everyone invited accepted the offer. But many did.

This was not a CIA only operation. Personnel from the FBI also were assigned to the Task Force. We have some clues that Christopher Steele's FBi handler, Michael Gaeta, may have been detailed to the Trump Task Force ( see here ).

So what kind of things would this Task Force do? The case officers would work with foreign intelligence services such as MI-6, the Italians, the Ukrainians and the Australians on identifying intelligence collection priorities. Task Force members could task NSA to do targeted collection. They also would have the ability to engage in covert action, such as targeting George Papadopoulos. Joseph Mifsud may be able to shed light on the CIA officers who met with him, briefed on operational objectives regarding Papadopoulos and helped arrange monitored meetings. I think it is highly likely that the honey pot that met with George Papadopoulos, a woman named Azra Turk, was part of the CIA Trump Task Force.

The Task Force also could carry out other covert actions, such as information operations. A nice sounding euphemism for propaganda, and computer network operations. There has been some informed speculation that Guccifer 2.0 was a creation of this Task Force.

In light of what we have learned about the alleged CIA whistleblower, Eric Ciaramella, there should be a serious investigation to determine if he was a part of this Task Force or, at minimum, reporting to them.

When I described this to one friend, a retired CIA Chief of Station, his first response was, "My God, that's illegal." We then reminisced about another illegal operation carried out under the auspices of the CIA Central American Task Force back in the 1980s. That became known to Americans as the Iran Contra scandal.

I sure hope that John Durham and his team are looking at this angle. If true it marks a new and damning indictment of the corruption of the CIA. Rather than spying on genuine foreign threats, this Task Force played a critical role in creating and feeding the meme that Donald Trump was a tool of the Russians and a puppet of Putin.

[Jun 14, 2019] This is Crystal Clear -- Find the Creator of the Guccifer 2.0 Hoax, and You Find the Murderer of Seth Rich by veganmark

Notable quotes:
"... Let's start with this very reasonable supposition: Guccifer 2.0 is an entity operating within US time zones who has gone out of his way to pose as a Russian hacker who was the source for the Wikileaks DNC/Podesta releases. ..."
"... villain du jour ..."
"... The subsequent mysterious death of Shawn Lucas by a weird drug cocktail might also be related. Shawn had been the process server for the class-action lawsuit against the DNC. According to Sy Hersh's FBI source, Seth indicated that he had allies who were aware of the drop box he was providing Wikileaks. It would have been necessary to eliminate these allies. Was Shawn one of these allies, and did the creator of G2.0 know this? Shawn, who was not known to be a drug user, died suddenly about a month after Seth. ..."
"... So who created G2.0? G2.0 appears to have worked in coordination with Crowdstrike. One day after Crowdstrike announced that the DNC had been hacked (with Russia the chief suspect) and that the hackers had grabbed a file of Trump Opposition Research, G2.0 makes his first public appearance, claiming to be the hacker, posting Trump Opposition Research -- and purposely leaving "Russian fingerprints" on the meta-data of his release. ..."
"... Crowdstrike was also in a position to concoct the "Russian hack" that they claimed to be investigating. Cyberanalysts have determined that two-thirds of the allegedly "Russian malware" which Crowdstrike "found" on the DNC servers had in fact been compiled subsequent to the date that Crowdstrike was brought in to investigate the "hack". In other words, there is reason to believe that Crowdstrike itself concocted this "hack" -- likely because they had been warned that Wikileaks was going to release leaked DNC emails. ..."
"... Also notable is the fact that Shawn Henry, co-founder of Crowdstrike, is a master of cyberfuckery. Prior to founding Crowdstrike, Henry served under Robert Mueller as head of FBI counterintelligence -- in which capacity he engaged in efforts to entrap and discredit Julian Assange. Indeed, others have suspected that Henry was behind G2.0, in light of the fact that G2.0's behavior was reminiscent of that of "Sabu" (Hector Monsignor), a hacker who, after secretly being arrested by the FBI during Henry's tenure there, worked under FBI direction to entrap other hackers. And the G2.0 hoax is clearly another - so far, highly successful - attempt to smear Assange. ..."
"... @The Voice In the Wilderness ..."
"... After the Popodouplous interview by Mark Steyn, there was clarity after following Russiagate since it really started before the election of 2016. The deep state actors were trying to setup some significant figure in the Trump as having ties with the Russian government. ..."
"... The irony is that we have McCarthyism once again and not one Russian is guilty of what they are being accused of. They were set up as the fall guys, and of course in the future nuclear war. ..."
Jun 14, 2019 | caucus99percent.com

Let's start with this very reasonable supposition: Guccifer 2.0 is an entity operating within US time zones who has gone out of his way to pose as a Russian hacker who was the source for the Wikileaks DNC/Podesta releases. The notion that this absurdly preening entity is a GRU hacker is idiotic.

The Mueller report's tale of how G2.0 allegedly transferred the DNC emails to Wikileaks is absurd on its face -- which is to say, Mueller is acting as an accomplice to G2.0 in his fraud.

The evident purpose of the G2.0 fraud was to detract attention from the incriminating content of the DNC/Podesta releases, by blaming those releases on Russian government hackers operating in cahoots with Julian Assange. This accomplishes 3 goals dear to the hearts of the Deep State actors behind G2.0: minimizing the damage to Hillary's campaign inflicted by the released emails; smearing the reputation of Assange, who has made an unparalleled contribution to unmasking the egregious crimes of the Western Deep State; and further defaming "the Russians", the villain du jour which our Military-Industrial-Congressional-Intelligence-Media-Academia-Think Tank* complex needs to justify the continuing rape of American taxpayers on behalf of our grotesque overspending on military hardware and our bloated global military empire.

But what was the evident fly-in-the-ointment for this brilliantly diabolic plan? The ACTUAL source of the Wikileaks releases could have blown it sky high. And if G2.0 and the Russian hacking tale had been unmasked prior to the election, the blowback on Hillary's campaign would have been enormous. Which is why the creators of G2.0 needed to eliminate the source.

There are a number of reasons to suspect that Seth Rich was the source, or a confederate of the source:

Hints dropped by Assange;

Award for info on Seth's killer offered by Wikileaks;

Wikileaks re-tweeting essays speculating that Seth was the leaker;

Craig Murray's repeated assurances that DNC/Podesta releases resulted from leaks, not hacks;

Kim Dotcom's claim that he helped Seth with the leak;

Sy Hersh's secretly recorded phone call in which he stated that a trusted source within the FBI claims to have seen an FBI memo describing an FBI analysis of Seth's laptop -- this revealed that Seth had offered to sell DNC emails to Wikileaks, and subsequently conveyed the docs to Wikileaks via drop box;

Claims by Ed Butowsky, Larry Johnson, and Bill Binney indicating that they have sources inside the intel community verifying that Seth was the leaker -- in conjunction with brother Aaron;

Jared Beck's claim that both Seth and Shawn Lucas were planning to testify in the class-action lawsuit against the DNC -- speaks to Seth's possible motive for leaking;

Claim by Rod Wheeler that, according to a source inside the DC police, the police have been ordered to "stand down" on the Seth Rich investigation;

Frenzied reaction of Donna Brazile on learning that Wheeler was investigating the Seth Rich murder - and her overt lie regarding her whereabouts on the morning of the murder.

https://caucus99percent.com/content/why-did-donna-lie-again

Some have speculated that, in line with an email by John Podesta, Seth was murdered "to make an example of him". I reject this explanation. They could have made an example by firing him and suing him. As it stands, no example was made, as the DNC claims that Russians, not Seth, were responsible for the Wikileaks DNC releases.

If the puppetmaster of G2.0 knew or believed that Seth was the leaker, Seth had to be murdered to insure success of the G2.0 hoax.

(The alternative is that G2.0 did not know that, and that Seth was beaten up and murdered in a robbery so "botched" that no valuables were taken. Yeah, right!)

The subsequent mysterious death of Shawn Lucas by a weird drug cocktail might also be related. Shawn had been the process server for the class-action lawsuit against the DNC. According to Sy Hersh's FBI source, Seth indicated that he had allies who were aware of the drop box he was providing Wikileaks. It would have been necessary to eliminate these allies. Was Shawn one of these allies, and did the creator of G2.0 know this? Shawn, who was not known to be a drug user, died suddenly about a month after Seth.

Curiously, the day after Seth died, and again the day after Shawn died, the DNC made payments of about $100K to Crowdstrike. Sheer coincidence? Maybe.

So who created G2.0? G2.0 appears to have worked in coordination with Crowdstrike. One day after Crowdstrike announced that the DNC had been hacked (with Russia the chief suspect) and that the hackers had grabbed a file of Trump Opposition Research, G2.0 makes his first public appearance, claiming to be the hacker, posting Trump Opposition Research -- and purposely leaving "Russian fingerprints" on the meta-data of his release. Unfortunately, this little dog-and-pony show turned out to be a screw-up, as it was subsequently revealed that (by the DNC itself!) that the Opposition Research document had been an attachment in Podesta's emails, and hadn't been hacked from the DNC. It is also notable that releasing Trump Opposition Research would do nothing to damage the chances of Hillary -- the alleged intent of the mythical Russian hackers. Indeed, nothing that G2.0 subsequently released was notably harmful to Hillary.

Crowdstrike was also in a position to concoct the "Russian hack" that they claimed to be investigating. Cyberanalysts have determined that two-thirds of the allegedly "Russian malware" which Crowdstrike "found" on the DNC servers had in fact been compiled subsequent to the date that Crowdstrike was brought in to investigate the "hack". In other words, there is reason to believe that Crowdstrike itself concocted this "hack" -- likely because they had been warned that Wikileaks was going to release leaked DNC emails.

https://caucus99percent.com/content/how-did-crowdstrikeguccifer-20-know-...

It bears repeating that the latest dated DNC email which Wikileaks published was written on April 25th -- several weeks after Crowdstrike had been brought in to investigate the alleged hack. Anti-hacking programs do not stop leaks .

Also notable is the fact that Shawn Henry, co-founder of Crowdstrike, is a master of cyberfuckery. Prior to founding Crowdstrike, Henry served under Robert Mueller as head of FBI counterintelligence -- in which capacity he engaged in efforts to entrap and discredit Julian Assange. Indeed, others have suspected that Henry was behind G2.0, in light of the fact that G2.0's behavior was reminiscent of that of "Sabu" (Hector Monsignor), a hacker who, after secretly being arrested by the FBI during Henry's tenure there, worked under FBI direction to entrap other hackers. And the G2.0 hoax is clearly another - so far, highly successful - attempt to smear Assange.

https://caucus99percent.com/content/shawn-henry-crowdstrike-was-fingered...

Whether or not Crowdstrike concocted G2.0, we need to find out who did -- the answer should be highly pertinent to unraveling Seth's murder.

And let's bear in mind that the creator of G2.0 has also played an integral role in concocting a Second Cold War with Russia - luring an entire generation of "leftists" into hating both Russia and Wikileaks, on completely spurious grounds. The evil of that is HUGE.

*Ray McGovern's brilliant formulation.


Linda Wood on Tue, 06/11/2019 - 2:56pm

I think your assertiveness

about hammering on these points is productive of narrowing in on the truth, whatever it may be. That's my awkward way of saying that you're not just on to something but that your precision, where you're hammering, is getting to the truth. I say that as a person who isn't convinced that Seth Rich was the DNC leaker, but who thinks he may have been murdered because he was a potential witness in a DNC voter suppression lawsuit , which amounts to the same thing really.

The strength of your outlook for me is that you emphasize the stupidity of the G2.0 revelations, the stupidity of Russian cyber-fingerprints, the vapidity of the released Opposition Research, and the timeliness of this junk evidence. It matches in tone and stupidity the evidence used to convince the American people that Saddam gave the anthrax to Mohamed Atta in Prague. Turns out Atta was not in Prague, turns out the anthrax was not Saddam's, but ours, turns out the Vice President of the United States lied about it on camera. Doesn't matter. Once the scene of the transfer to Atta was fixed in the minds of some American people, even if just a few Americans half believed it, the narrative was written.

The other strength of your essay for me is your hammering on Seth Rich's murder as eliminating a possible contradiction of the Russia narrative. The death of his associate Lucas only adds to that possibility. Clearly Seth Rich's murder was timely and important. It could very well have been a random street crime, but why he was out on the street in the middle of the night just before the filing of a lawsuit that could have involved him and the DNC is worth asking. The problem is that the media, and as far as we can tell, our government, are not asking.

I just want to thank you again for focusing on the weak points of the narrative. Each time you do, I think you bring us closer to the truth.

Here is a good report on the false evidence generated on the anthrax attack.

https://www.youtube.com/watch?v=BP2G-cejYhI

The Voice In th... on Tue, 06/11/2019 - 5:30pm
Murder seems to follow Her Highness around, doesn't it?

up 11 users have voted.

Bob In Portland on Wed, 06/12/2019 - 2:30pm
@The Voice In the Wilderness Yes, but I'd suggest it's

@The Voice In the Wilderness

Yes, but I'd suggest it's because she's lived a career in the Deep State. Hilz never really was a Dem. She was an undercover Republican/CIA when she started out. In 1968 she started the year as a volunteer for Clean Gene McCarthy, the "anti-Vietnam" Dem candidate who went on to endorse Ronald Reagan.

She then went to the the Republican convention in Miami, then spent that summer as an intern for House Republicans, where she wrote a speech about Vietnam for Representative Melvin Laird. Melvin Laird was Nixon's Secretary of Defense, who oversaw a lot of the bludgeoning of Southeast Asia.

So when she was anti-war with McCarthy was she really anti-war (subsequently there have been stories about how infiltrated McCarthy's '68 campaign was riddled with CIA infiltrators), or was she pro-war, writing speeches for Mel Laird? I suggest she never gave a shit about all those napalmed deplorables in Southeast Asia. It was a pose. I'd don't think that Bill was anti-war either. Like a lot of future politicians he didn't want his ass shot there.

She and Bill worked their way up the ladder among CIA-owned politicians. Ultimately, they were in place to deliver the Democratic Party to the Agency.

[comment:body]

MrWebster on Tue, 06/11/2019 - 9:04pm
The unwilling patsy are the Russians

After the Popodouplous interview by Mark Steyn, there was clarity after following Russiagate since it really started before the election of 2016. The deep state actors were trying to setup some significant figure in the Trump as having ties with the Russian government.

This include Flynn, the meeting at Trump Towers, and Popodouplos. So many details now fall in place like the Russian lawyer Natalia Veselnitskaya meeting with Fusion after the Trump Tower meeting. Say what?

Or just bullshit like US intelligence found out GRU agents were doing the hacking because some GRU master computer jock forgot to login into his VPN. G2 does seem to be an invention.

The irony is that we have McCarthyism once again and not one Russian is guilty of what they are being accused of. They were set up as the fall guys, and of course in the future nuclear war.

As for Seth Rich all I can speculate is that he was involved somehow. And if his murder was not random, he was about to blow apart the entire conspiracy to such a level, action had to be taken against him.

[May 23, 2019] Guccifer 2.0 Was Not a Russian Creation by Larry C Johnson

Notable quotes:
"... The Word documents published in June 2016 by Guccifer 2 also show a "last saved as" user id written in Cyrillic. The Anglicized name is " Felix Edmundovich ", aka "Iron Felix" (the infamous director of an early Soviet spy agency). If you are a Russian cyber spy trying to conduct a covert operation, why do you sign your document with the name of one of the most infamous leaders of Russian intelligence? Robert Mueller wants you to believe that this was just Russian audacity. ..."
"... The phrase "personal beliefs about the competence or incompetence of the Russians" catches something important. Whether it was the Russians or somebody else that did this, whoever did it was pretty sloppy. What this report describes is almost as pathetic when considered a false flag operation as it is as a sabotage operation. So any theory of who stole and published the documents has to explain a capability to access the data combined with blissful obliviousness about handling them. I know of no reason to think the Russian, US, Israeli, or other intelligence communities incapable of such a combination. All of them have brilliant dedicated people but also seemingly endless supplies of mediocre time-servers. ..."
"... Scenario? Shutdown, closing of words with documents being automatically saved? Ok, otherwise there is apparently no precise saving time stamp on Winwords latest version. How much changed since 2016? ..."
"... The Vault7 leak of CIA tools also contained information on how to select any language environment. It's really a standard practice, even for normal criminals. ..."
May 23, 2019 | turcopolier.typepad.com

Russia did not hack the DNC. This is not an opinion. It is a conclusion that flows from one very specific claim made by the Special Counsel -- i.e., Guccifer 2.0 was a fictional identity created by Russian Military Intelligence, the GRU. If Guccifer was in fact a creation or creature of the GRU, then the forensic evidence should show that this entity was operating from Russia or under the direct control of the GRU. The forensic evidence shows something quite different -- the meta data in the Guccifer 2.0 documents were manipulated deliberately to plant Russian fignerprints. This was not an accident nor an oversight due to carelessness.

What is meta data? This is the information recorded when a document is created. This data includes things such as the date and time the document was created or modified. It tells you who created the document. It is like the Wizard of Oz, it is the information behind the curtain.

Special Counsel Robert Mueller's is correct in stating that Guccifer 2.0 was a "fictious online persona. " He is wrong in attributing that action to Russian Military Intelligence. While Guccifer 2.0 was a "fictious" entity, the information recorded about when, how and who created the document show that deliberate choices were made to present the info as if it was created by someone Russian.

Let us first stipulate and agree that Russia and the United States engage in cyber espionage and covert action against each other. This has been the case since computers and the internet came into existence. Within the U.S. Intelligence Community these activities generally are labeled with the acronym, CNO -- Computer Network Operations. The Russians and the United States have cadres of cyber "warriors" who sit at computer terminals and engage in operations commonly known as hacking. Other countries, such as China, Iran and Ukraine do this as well.

CNOs are classified at the highest level in the United States and normally are handled within special restricted categories commonly known as SAPs (i.e, Special Access Programs). A critical element of these kinds of operations is to avoid leaving any fingerprints or clues that would enable the activity to be traced back to the United States. But this is not unique to the United States. All professional intelligence services around the world understand and practice this principle -- leave no evidence behind that proves you were there.

The case implicating Russia in the hack of the DNC and Clinton emails, including those of her campaign Manager, John Podesta, rests on suspect forensic computer evidence -- is present in the meta data in the documents posted on line by Guccifer 2.0. According to Disobedient Media , "the files that Guccifer 2.0 initially pushed to reporters contain Russian metadata, a Russian stylesheet entry and in some cases embedded Russian error messages."

Why would the Russians make such a mistake, especially in such a high stake operation (targeting a national election with covert action most certainly is a high stake operation). Mueller and the U.S. intelligence community want you to believe that the Russians are just sloppy and careless buffoons. Those ideologically opposed to the Russians readily embrace this nonsenses. But for those who actually have dealt with Russian civilian and military intelligence operatives and operations, the Russians are sophisticated and cautious.

But we do not have to rely on our personal beliefs about the competence or incompetence of the Russians. We simply need to look at the forensic evidence contained in the documents posted by Guccifer 2.0. We will take Robert Mueller and his investigators at their word:

An examination of those documents tells a very different story. While it does not reveal who or what was Guccifer 2.0, it does undermine Mueller's claim that it was the Russians who did these dastardly deeds.

One independent forensic computer investigator, who uses the name, "The Forensicator," examined the meta data in some of the documents posted by Guccifer 2.0 and discovered the following :

Guccifer 2.0 published a file on 13 September 2016 that was originally copied on 5 July 2016 at approximately 6:45 PM Eastern time. It was copied and appeared as the "NGP VAN" 7zip file.

The estimated speed of transfer was 23 MB/s. This means that this initial data transfer could have been done remotely over the Internet. Instead, it was likely done from a computer system that had direct access to the data. "By "direct access" we mean that the individual who was collecting the data either had physical access to the computer where the data was stored, or the data was copied over a local high-speed network (LAN)."

This initial copying activity was done on a system that used Eastern Daylight Time (EDT) settings and was likely initially copied to a computer running Linux, because the file last modified times all reflect the apparent time of the copy, which is a characteristic of the Linux 'cp' command (using default options).

On September 1, 2016, a subset of the initial large collection of DNC related content (the so-called NGP/VAN data), was transferred to working directories on a system running Windows. The .rar files included in the final 7zip file were built from those working directories.

The alleged Russian fingerprints appeared in the first document "leaked" by Guccifer 2.0-- 1.doc -- which was a report on Donald Trump . A forensic examination of the documents shows thatgiven the word processor program used to create the Donald Trump Document released by Guccifer 2.0, the author consciously and purposefully used formats that deliberately inserted "Russian fingerprints" into the document. In other words, the meta-data was purposely altered, and documents were pasted into a 'Russianified' word document with Russian language settings and style headings.

Here are the key facts:

The meta data shows that Slate_-_Domestic_-_USDA_-_2008-12-20.doc was the template for creating 1.doc , 2.doc and 3.doc . This template injected "Warren Flood" as the author value and "GSA" as the company value in those first three Word documents. This template also injected the title , the watermark and header/footer fields found in the final documents (with slight modifications).

The Word documents published in June 2016 by Guccifer 2 also show a "last saved as" user id written in Cyrillic. The Anglicized name is " Felix Edmundovich ", aka "Iron Felix" (the infamous director of an early Soviet spy agency). If you are a Russian cyber spy trying to conduct a covert operation, why do you sign your document with the name of one of the most infamous leaders of Russian intelligence? Robert Mueller wants you to believe that this was just Russian audacity.

But the meta data tells a different story. When we examine The Revision Session Identifiers aka 'RSID's, in the Guccifer document, we see the same Russian style-headings in 1.doc, 2.doc and 3.doc. The document creation timestamps on docs 1, 2 and 3 also are all identical.

Given that MS word assigns a new random 'RSID' with each save when an element is added or edited (this function allows one to track changes made to a Word document), the only way to obtain identical creation timestamps means that someone either directly edited the source document or that there was one empty document open and that individual documents were copy-pasted and saved-as (1.doc), then contents deleted and new doc pasted and saved-as (2.doc), etc. This process also explains identical style-sheet RSIDs .


joanna , 22 May 2019 at 08:54 AM

The document creation timestamps on docs 1, 2 and 3 also are all identical.

Curious, no doubt. But who of us did not consider Guccifer 2 curious. Put another way, what experts considered him solid proof for Russian involvement?

Are you suggesting Winword templates were used for the metadata?

As IT nitwit, how can I save three *doc files or their 2016 word equivalent at the same time? Any way to do that? Windows doesn't seem to have a solution to that.

Again: This is a nitwit user asking a question.

*******
I admittedly am not overly motivated to read the Mueller report. I'll read your contribution again to figure out what you may suggest in or between the lines.

fredw , 22 May 2019 at 09:26 AM
The phrase "personal beliefs about the competence or incompetence of the Russians" catches something important. Whether it was the Russians or somebody else that did this, whoever did it was pretty sloppy. What this report describes is almost as pathetic when considered a false flag operation as it is as a sabotage operation. So any theory of who stole and published the documents has to explain a capability to access the data combined with blissful obliviousness about handling them. I know of no reason to think the Russian, US, Israeli, or other intelligence communities incapable of such a combination. All of them have brilliant dedicated people but also seemingly endless supplies of mediocre time-servers.

Equally interesting is the fact that this analysis has come from such a private source. Surely all the major intelligence agencies have the skill to find the same indicators. And all have comparatively endless resources to apply to the analysis. But they all seem to not want to talk about it. For me the most suspicious thing about the handling of the theft was the FBI's near complete lack of interest in examining the server. I have always assumed that such indifference reflected that they already had all they needed in order to understand what happened. Maybe even watched the theft in real time. But this report demonstrates that you didn't need any special access to blow up the official story. (Note that the official story may be "true". It is just not proven by the cited evidence.)

Yet, whatever actually happened, nobody seems interested in challenging the narrative that Russians stole data and routed it through useful idiots to influence the 2016 elections. This report indicates that a persuasive challenge would not have been hard to produce.

Perhaps the false flag was intentionally clumsy, intended to be detected. Bait for a trap that no one wants to fall into. But I don't see where that thought leads.

joanna , 22 May 2019 at 09:58 AM
https://archive.fo/2dMfC#selection-683.213-687.434

This can be discovered by looking at things called 'rsid's or Revision Session Identifiers in Guccifer's document. In order to track changes, MS word assigns a new random 'rsid' with each save upon each element added or edited. The rsids for the Russian style-headings in 1.doc, 2.doc and 3.doc are all the same (styrsid11758497 in the raw source).

Moreover, the document creation timestamps on 1,2, and 3.docs are all identical too. This might imply there was one empty document open, with individual documents being copy-pasted and saved-as (1.doc), then contents deleted and new doc pasted and saved-as (2.doc), etc. This is the only way to go about obtaining identical creation timestamps short of direct editing of the source, and would also explain identical style-sheet RSIDs.

Scenario? Shutdown, closing of words with documents being automatically saved? Ok, otherwise there is apparently no precise saving time stamp on Winwords latest version. How much changed since 2016?

Empty doc open? What would that change?

But good to see that Winword now integrated some type of automatic saving option, didn't have it when I gave it up and shifted to Open Office. On the other hand, can I trust it to not confront me with an earlier revision version? I admittedly asked myself lately. In a 200 page file, mind you.

Karen Eliot , 22 May 2019 at 10:34 AM
As someone with a little bit of experience in that area I can assure you that language metadata artifacts are practically worthless for attribution. You would mention it in a report, but from it you can only conclude that

The Vault7 leak of CIA tools also contained information on how to select any language environment. It's really a standard practice, even for normal criminals.

Attribution is really hard and usually amounts to a lot of guessing who might be interested in the target of an attack, correlating information from other campaigns, and is only rarely based on hard evidence. Big state actors probably can do a little bit better when they have access to enough network taps. But in the end one bit looks like any other, and properties of static documents can always be forged and made to look real. Or simply buy a copy of MS Office in .

joanna said in reply to Karen Eliot... , 23 May 2019 at 09:51 AM
The document creation timestamps on docs 1, 2 and 3 also are all identical.

Ok doc creation times. Could one create a WinWord Macro? That does exactly that. ok, why would one do this? True. Minor detail, I know. But I see we have experts around now.

*******
More generally. Guccifer 2.0 was a bit of an odd occurrence, not least due to US intelligence considering Guccifer one or zero, if you like.

Fred , 23 May 2019 at 11:24 AM
fredw,

"..nobody seems interested in challenging the narrative that Russians..."

That's precisely what Larry has been doing for some time.

"Equally interesting is the fact that this analysis has come from such a private source."

How dare a private citizen challenge the narrative!

"Perhaps the false flag was intentionally clumsy..."

False flag, let's discuss that idea, brought up solely by you, and not discuss Larry's analysis.

[May 18, 2019] Daniel Lazare's recent work on Assange indicated via chronological sequencing it's much more likely Guccifer 2.0 was the phony he was suspected to be at the time

May 18, 2019 | consortiumnews.com

hetro , May 15, 2019 at 15:08

I found the first of these statements as "chilling" as the second:

"Schumer thus greeted Assange's April 11 arrest by tweeting his "hope [that] he will soon be held to account for his meddling in our elections on behalf of Putin and the Russian government," while, in a truly chilling statement, Democratic Sen. Joe Manchin of West Virginia declared that "[i]t will be really good to get him back on United States soil [so] we can get the facts and the truth from him."

Daniel Lazare's recent work on Assange indicated via chronological sequencing it's much more likely Guccifer 2.0 was the phony he was suspected to be at the time, let alone Assange's denial it was not the Russians, nor any State operation, plus as we have discussed pointing toward Seth Rich (an insider-as-leak interpretation subsequently buttressed by William Binney et al.)

In short, there is and has been ample information to suspend leaping to the hysterical tar and feather him approach mouthed by Schumer, spittle presumably flying out of his mouth at the time.

It is disgusting to see supposed leaders in the government advocating guilty until proved innocent in this lynch-mob manner in a country with supposedly an advanced system of justice. It reminds me of the Rosenberg case and the McCarthy era and the Salem witch trials before that.

"Monstrous offspring" indeed.

[May 10, 2019] #Guccifer2 hashtag on Twitter

Notable quotes:
"... In both cases # Assange had announced the release before allegedly getting material from # Guccifer2 (aka GRU). There might be other sources other than # G2 . # MuellerReport pic.twitter.com/bPN7NHpM9N ..."
"... Good Lord, @ Birgittaj , not you as well? That timeline is rubbish. Ask yourself, how could # Assange tell UK TV on 12 June # WikiLeaks already had possession of # DNCLeaks if # Mueller says "source" # Guccifer2 didn't send anything to WL until 14 July? http://www. itv.com/news/update/20 16-06-12/assange-on-peston-on-sunday-more-clinton-leaks-to-come/ # SaySorry pic.twitter.com/B0WRAjv15G ..."
"... LINDSEY GRAHAM FORGOT TO MENTION THAT SPEAKER PAUL RYAN SHUT DOWN # HouseIntelInvestigations into # Awan # Guccifer2 and # ClintonEmails . ..."
"... Always assumed that # Guccifer2 was either a DNC construction (as it was so badly done) or a NSA construction ..."
"... Says VIPs analyzed the @ wikileaks docs; via metadata discovered it had to be a thumb drive download. 2 years ago VIPs said # Guccifer2 docs had that character. ? Mr. President -- Listen to Bill Binney. Russiagate is a Worse Hoax than You Thought https:// youtu.be/-9TyASfZV0c # RussiaGate ..."
May 10, 2019 | twitter.com

PamelaDrew ‏ 28 Dec 2018

Fab recap of the hoax behind # Guccifer2 with forensics to identify changes made to support false attribution for # Russia but trust the corp news who sold WMD lies because # CIA wouldn't use # Vault7 tools or deceive the public, right? https:// disobedientmedia.com/2018/12/guccif er-2-0-game-over-year-end-review/

Robbin Young ‏ 7:51 PM - 18 Apr 2019

# MuellerReport # Guccifer2 # SethRich # JulianAssange # Wikileaks # Russia # Russians 8/25/16 DMs: "his name is seth, he was my whistleblower" - Guccifer 2.0 "Can't you trust Julian?" - Robbin Young "he may be connected to russians, i don't like it though he's my hero" - Guccifer 2.0 pic.twitter.com/LlBo413q2h

4:27 PM - 4 May 2019

In April 2016, the # GRU hacked into the computers of the @ DCCC & @ DNC & stole 100s of 1000s of docs. In mid-June 2016 the GRU began disseminating stolen materials through the fictitious online personas " # DCLeaks " and " # Guccifer2 .0." and then through @ WikiLeaks . - # MuellerReport

Ferez Nallaseth ‏ 10:26 AM - 26 Jan 2019

# SpecialCounselMueller # Guccifer2 # 2016Elections # Law # Constitution # Justice # CompromisingDemocracyGlobally # Cybersecurity "The clear implication is that any truly incriminating communications would have been conducted in encrypted https:// lnkd.in/e4zvKYX https:// lnkd.in/eh-WJ-k

Emma Best (U//FOUO) ‏ 3:54 PM - 30 Jan 2019

This is an interesting thread. Also note that Mueller has already released portions of logs of communications between # WikiLeaks and # Guccifer2 , a contact first reported by @ KevinCollier using logs I provided. pic.twitter.com/lVjeq9nTA2

4:04 PM - 4 May 2019

The @ DNC , etc docs that # Guccifer2 .0 provided to @ wikileaks prove that Hillary promoted Trump because she thought she could beat him (mistake) and the @ DNC rigged the primary so Hillary would win the nomination (mistake). All of this is talked about in the # MuellerReport .

craig slingsby ‏ 2:53 AM - 29 Apr 2019

The Transaction for a year of VPN from the same Netyksho et al. Wallet indictment but not the guccifer 2.0 alleged VPN https://www. blockchain.com/en/btc/tx/e33a 3951183d86eb7e6c214fe1c320e6322774663a17b5bea3c74785f23477ad # RussiaInvestigation # bitcoin # Guccifer2

Cristiano Arienti ‏ 9:05 AM - 18 Apr 2019

# Mueller does not t offer clear cronology (how and when) @ wikileaks got the # DNCleak and the # Podestaemails .

In both cases # Assange had announced the release before allegedly getting material from # Guccifer2 (aka GRU). There might be other sources other than # G2 . # MuellerReport pic.twitter.com/bPN7NHpM9N

Augury IT ‏ 7:24 PM - 23 Apr 2019

"Among those who clicked on a bogus link in an email was Podesta, Clinton campaign chairman, along with several other junior campaign volunteers, informal campaign advisers and one DNC employee." https:// freebeacon.com/national-secur ity/gru-spearphishing-emails-fooled-democrats-clinton-campaign-in-2016/ # malware # Democrats # GRU # Guccifer2 # WikiLeaks # ITsecurity

Sharry Wilson ‏ 8:42 PM - 15 Feb 2019

Special counsel prosecutors say they have communications of Stone with WikiLeaks # RogerStone # WikiLeaks # JulianAssange # Guccifer2 .0 # RobertMueller # Russia # DNC # HillaryClinton # RussiaInvestigation # US https:// cnn.it/2SUSdXM

Bella Magnani 5:46 AM - 26 Apr 2019

Good Lord, @ Birgittaj , not you as well? That timeline is rubbish. Ask yourself, how could # Assange tell UK TV on 12 June # WikiLeaks already had possession of # DNCLeaks if # Mueller says "source" # Guccifer2 didn't send anything to WL until 14 July? http://www. itv.com/news/update/20 16-06-12/assange-on-peston-on-sunday-more-clinton-leaks-to-come/ # SaySorry pic.twitter.com/B0WRAjv15G

Oeishik M.G. C. JD ‏ 1:41 AM - 1 May 2019

# LessonsfromtheMuellerReport # Guccifer2 is a problem child. In other news, did they get the name by combining @ Gucci & # Lucifer ?? - If so, both parties have cause of action against @ KremlinRussia_E @ realDonaldTrump & all their poisonous branches.

#BlackWomenForBernie2020 ‏ 1:24 PM - 14 Mar 2019

LINDSEY GRAHAM FORGOT TO MENTION THAT SPEAKER PAUL RYAN SHUT DOWN # HouseIntelInvestigations into # Awan # Guccifer2 and # ClintonEmails .

THEN # ChristopherWray final FBI recommendation is to RETRAIN THE FBI TO NOT EMBARRASS THEMSELVES "cough" GOP for # WealthClass # COMEY ! # BERNITDOWN https:// twitter.com/thedailybeast/ status/1106286631173148673

Michael Holloway - Schroedinger's Cyclist ‏ 12:25 PM - 13 Mar 2019

Always assumed that # Guccifer2 was either a DNC construction (as it was so badly done) or a NSA construction (or 2 working together); in both cases designed to implicate Russia in a DNC 'hack' ...while @ CraigMurrayOrg has stated he received the DNC files in Wash DC from a leaker.

Are You Cardigan? ‏ 10 Dec 2018

# HisNameWasSethRich # itallbeginshere ... # Guccifer2 .0 # Wikileaks # Podesta # Clinton >>> JAIL >>> https://www. youtube.com/edit?o=U&video _id=VYdch94KC9E pic.twitter.com/PmecvFXxdX

Donny Deplorable ‏ 8:36 AM - 3 Dec 2018

# RogerStone admitted (bragged) that he was in contact with # Guccifer2 .0. His goose is already cooked @ realDonaldTrump https:// twitter.com/realDonaldTrum p/status/1069619316319035392

Michael Holloway - Schroedinger's Cyclist ‏ 12:17 PM - 13 Mar 2019

Says VIPs analyzed the @ wikileaks docs; via metadata discovered it had to be a thumb drive download. 2 years ago VIPs said # Guccifer2 docs had that character. ? Mr. President -- Listen to Bill Binney. Russiagate is a Worse Hoax than You Thought https:// youtu.be/-9TyASfZV0c # RussiaGate

Bella Magnani 6:18 AM - 26 Apr 2019

Ah, bad link. Try this one: https://www. youtube.com/watch?v=x7UvbE TwpwU # Assange announcing # WikiLeaks possession of # DNCLeaks on 12 June, which # Mueller says "source" # Guccifer2 didn't send until 14 July. Relevant now: see his comments on UK trying to foist his US extradition onto # EU (ie # Sweden )

5:07 PM - 4 May 2019

Did you read any of the dos that were leaked by # Guccifer2 .0, # DCLeaks , or @ Wikeleaks ? If not, let me hip you to something. Corrupt Dems in the @ DCCC and the @ DNC , as well as crooked @ HillaryClinton , are the main reasons Trump is in the White House. Dems blew it. Face the truth.

#BlackWomenForBernie2020 ‏ 3:17 PM - 14 Mar 2019

*cough* Former Speaker Paul Ryan closed down HOUSE INTEL INVESTIGATIONS. Including # AWAN and # GUCCIFER2

Bella Magnani 4:36 PM - 26 Apr 2019

LoL. You've really got that "classic hindsight bias" nailed there, @ KPoulsen . And tsk! you're supposed to be a 'tech editor' & you say "you've lost me there" when I link you the digital forensic evidence # WikiLeaks didn't get # DNCLeaks from # Guccifer2 ? https:// theforensicator.wordpress.com/sorting-the-wi kileaks-dnc-emails/

ᴘᴀᴛᴛɪᴇ ɢᴀʀᴅɴᴇʀ 2:32 PM - 30 Dec 2018

How did # Guccifer2 .0 get "I-T's" @ DNC "Leaks" from "we suspect" @ JohnBrennan & James Clapper [•] Reporting on # Unity4J @ Unity4J is @ raymcgovern in -plainspeak- To @ wikileaks ? "Thumb drive to @ AssangeDefence " https:// youtu.be/2moVxa2oGJI "break it into a thousand pieces..." # QAnon

Baba Yaga ‏ 8:54 PM - 18 Apr 2019

The 'Guccifer 2.0' Gaps in Mueller's Full Report via @ Consortiumnews Mueller indictments of GRU for # Guccifer2 & 13 # Russians with dank means lack evidence https:// consortiumnews.com/2019/04/18/the -guccifer-2-0-gaps-in-muellers-full-report/ @ mtracey @ mtaibbi @ aaronjmate # MuellerReport # MuellerGoofs

Thread Reader App ‏ 4:11 PM - 6 May 2019

Hello, the unroll you asked for: Thread by @ with_integrity : "The Mueller Report - Expensive Estimations And Elusive Evidence http:// g-2.space/muellerreport/ [ ]" # Guccifer2 # RussiaGate https:// threadreaderapp.com/thread/1125435 714563452929.html Talk to you soon.

̼ ̼̼̼̼̼̼̼ ̼̼̼̼̼̼̼ 1:49 AM - 27 Dec 2018

"the # Guccifer2 .0 # persona was operated by # someone that # fabricated # evidence & # falsified # claims in support of statements made by @ CrowdStrike executives. They # wanted to be perceived as # Russian & wanted to be attributed to @ WikiLeaks from the day they emerged" # RussiaGate ? pic.twitter.com/EIfiO9NuZ2

Baba Yaga ‏ 10:07 AM - 29 Apr 2019

Crowdstrike had to abandon claims about the same Russian hackers in Ukraine https:// theforensicator.wordpress.com/2019/04/29/mor e-evidence-that-guccifer-2-planted-his-russian-breadcrumbs/amp/?__twitter_impression=true # Guccifer2 # RussiaGate @ ggreenwald @ mtracey @ aaronjmate @ mtaibbi

watchful one ‏ 9:48 AM - 29 Apr 2019

will anything in Mueller's report stand the test of time? https:// theforensicator.wordpress.com/2019/04/29/mor e-evidence-that-guccifer-2-planted-his-russian-breadcrumbs/ (via @ with_integrity ) # Guccifer2

Adam Carter ‏ 9:40 AM - 29 Apr 2019

More Evidence That Guccifer 2 Planted His Russian Breadcrumbs https:// theforensicator.wordpress.com/2019/04/29/mor e-evidence-that-guccifer-2-planted-his-russian-breadcrumbs/ # Guccifer2 # Forensicator # MuellerReport # Russiagate

Adam Carter ‏ 1:13 PM - 28 Apr 2019

It has been 800 days since the first cracks really started to emerge in the # Guccifer2 facade: https:// archive.fo/2dMfC We now have more evidence pointing to the persona operating from within US timezones than elsewhere: http:// g-2.space/ustimezones Let's see what this week brings. pic.twitter.com/ZtEObd9hmk

Ophelia PGlasser #Bernie2020 ‏ 7:16 AM - 26 Apr 2019

On this discussion, here's Bill Binney & @ jimmy_dore on # MuellerReport & DNC lies & cover-ups by # Guccifer2 https:// twitter.com/opheliapg/stat us/1121778691032223746?s=21

[Apr 20, 2019] The Guccifer 2.0 Gaps in Mueller s Full Report undermine the validity of findings

Apr 10, 2019 | consortiumnews.com

Originally from: The 'Guccifer 2.0' Gaps in Mueller's Full Report April 18, 2019 • 12 Commentsave

Like Team Mueller's indictment last July of Russian agents, the full report reveals questions about Wikileaks' role that much of the media has been ignoring, writes Daniel Lazare.

By Daniel Lazare
Special to Consortium News

<img src="https://consortiumnews.com/wp-content/uploads/2018/04/Daniel-Lazare-150x150.jpg" alt="" width="100" height="100" /> A s official Washington pores over the Gospel According to Saint Robert, an all-important fact about the Mueller report has gotten lost in the shuffle. Just as the Christian gospels were filled with holes , the latest version is too – particularly with regard to WikiLeaks and Julian Assange.

The five pages that the special prosecutor's report devotes to WikiLeaks are essentially lifted from Mueller's indictment last July of 12 members of the Russian military intelligence agency known as the GRU. It charges that after hacking the Democratic National Committee, the GRU used a specially-created online persona known as Guccifer 2.0 to transfer a gigabyte's worth of stolen emails to WikiLeaks just as the 2016 Democratic National Convention was approaching. Four days after opening the encrypted file, the indictment says, "Organization 1 [i.e. WikiLeaks] released over 20,000 emails and other documents stolen from the DNC network by the Conspirators [i.e. the GRU]."

<img aria-describedby="caption-attachment-35305" src="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM.png" alt="Barr holding press conference on full Mueller report, April 18, 2019. (YouTube)" width="1248" height="612" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM.png 848w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-400x196.png 400w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-768x377.png 768w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-700x343.png 700w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-160x78.png 160w" sizes="(max-width: 1248px) 100vw, 1248px" />

Attorney General William Barr holding press conference on full Mueller report, April 18, 2019. (YouTube)

Mueller's report says the same thing, but with the added twist that Assange then tried to cover up the GRU's role by suggesting that murdered Democratic National Committee staffer Seth Rich may have been the source and by telling a congressman that the DNC email heist was an "inside job" and that he had "physical proof" that the material was not from Russian.

All of which is manna from heaven for corporate news outlets eager to pile on Assange, now behind bars in London. An April 11, 2019, New York Times news analysis , for instance, declared that "[c]ourt documents have revealed that it was Russian intelligence – using the Guccifer persona – that provided Mr. Assange thousands of emails hacked from the Democratic National Committee," while another Times article published shortly after his arrest accuses the WikiLeaks founder of "promoting a false cover story about the source of the leaks."

But there's a problem: it ain't necessarily so. The official story that the GRU is the source doesn't hold water, as a timeline from mid-2016 shows. Here are the key events based on the GRU indictment and the Mueller report:

June 12: Assange tells Britain's ITV that another round of Democratic Party disclosures is on the way: "We have upcoming leaks in relation to Hillary Clinton, which is great. WikiLeaks is having a very big year." June 14: The Democratic National Committee accuses Russia of hacking its computers. June 15: Guccifer 2.0 claims credit for the hack. "The main part of the papers, thousands of files and mails, I gave to WikiLeaks ," he brags . "They will publish them soon." June 22: WikiLeaks tells Guccifer via email: "Send any new material here for us to review and it will have a much higher impact than what you are doing." July 6: WikiLeaks sends Guccifer another email: "if you have anything hillary related we want it in the next tweo [ sic ] days prefable [ sic ] because the DNC [Democratic National Convention] is approaching and she will solidify bernie supporters behind her after."Replies Guccifer: "ok . . . i " July 14: Guccifer sends WikiLeaks an encrypted file titled "wk dnc link1.txt.gpg." July 18: WikiLeaks confirms it has opened "the 1Gb or so archive" and will release documents "this week." July 22: WikiLeaks releases more than 20,000 DNC emails and 8,000 other attachments.

According to Mueller and obsequious news outlets like the Times , the sequence is clear: Guccifer sends archive, WikiLeaks receives archive, WikiLeaks accesses archive, WikiLeaks publishes archive. Donald Trump may not have colluded with Russia, but Julian Assange plainly did. [Attorney General Will Barr, significantly calling WikiLeaks a publisher, said at his Thursday press conference: " Under applicable law, publication of these types of materials would not be criminal unless the publisher also participated in the underlying hacking conspiracy."]

<img aria-describedby="caption-attachment-35300" src="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM.png" alt="Deputy Attorney General Rod Rosenstein announcing in 2018 a grand jury indictment of 12 Russian intelligence officers for hacking offenses related to the 2016 U.S. presidential election. (Wikimedia Commons) " width="1236" height="611" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM.png 973w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-400x198.png 400w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-768x380.png 768w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-700x346.png 700w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-160x79.png 160w" sizes="(max-width: 1236px) 100vw, 1236px" />

Deputy Attorney General Rod Rosenstein announcing in 2018 the grand jury indictment of 12 GRU agents. (Wikimedia Commons)

Avoiding Questions

The narrative raises questions that the press studiously avoids. Why, for instance, would Assange announce on June 12 that a big disclosure is on the way before hearing from the supposed source? Was there a prior communication that Mueller has not disclosed? What about the reference to "new material" on June 22 – does that mean Assange already had other material in hand? After opening the Guccifer file on July 18, why would he publish it just four days later? Would that give WikiLeaks enough time to review some 28,000 documents to insure they're genuine?

Honor Bob Parry's legacy by donating to our Spring Fund Drive.

"If a single one of those emails had been shown to be maliciously altered," blogger Mark F. McCarty observes , "Wikileaks' reputation would have been in tatters." There's also the question that an investigator known as Adam Carter poses in Disobedient Media : why would Guccifer brag about giving WikiLeaks "thousands of files" that he wouldn't send for another month?

The narrative doesn't make sense – a fact that is crucially important now that Assange is fighting for his freedom in the U.K. New Yorker staff writer Raffi Khatchadourian sounded a rare note of caution last summer when he warned that little about Guccifer 2.0 adds up. While claiming to be the source for some of WikiLeaks ' most explosive emails, the material he released on his own had proved mostly worthless – 20 documents that he "said were from the DNC but which were almost surely not," as Khatchadourian puts it, a purported Hillary Clinton dossier that "was nothing of the sort," screenshots of emails so blurry as to be "unreadable," and so forth.

<img aria-describedby="caption-attachment-35303" src="https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image.jpg" alt="John Podesta at the spin room of the second presidential debate of 2016. (Voice of America via Wikimedia Commons)" width="500" height="341" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image.jpg 650w, https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image-400x273.jpg 400w, https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image-160x109.jpg 160w" sizes="(max-width: 500px) 100vw, 500px" />

John Podesta: Target of a phishing expedition. (Voice of America via Wikimedia Commons)

While insisting that "our source is not the Russian government and it is not a state party, Assange told Khatchadourian that the source was not Guccifer either. "We received quite a lot of submissions of material that was already published in the rest of the press, and people seemingly submitted the Guccifer archives," he said somewhat cryptically. "We didn't publish them. They were already published." When Khatchadourian asked why he didn't put the material out regardless, he replied that "the material from Guccifer 2.0 – or on WordPress – we didn't have the resources to independently verify."

No Time for Vetting

So four days was indeed too short a time to subject the Guccifer file to proper vetting. Of course, Mueller no doubt regards this as more "dissembling," as his report describes it. Yet WikiLeaks has never been caught in a lie for the simple reason that honesty and credibility are all-important for a group that promises to protect anonymous leakers who supply it with official secrets. (See "Inside WikiLeaks : Working with the Publisher that Changed the World," Consortium News , July 19, 2018.) Mueller, by contrast, has a rich history of mendacity going back to his days as FBI director when he sought to cover up the Saudi role in 9/11 and assured Congress on the eve of the 2003 invasion that Iraqi weapons of mass destruction pose "a clear threat to our national security."

<img aria-describedby="caption-attachment-35301" src="https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage.jpg" alt="Mueller with President George W. Bush on July 5, 2001, as he is being appointed FBI director. (White House)" width="501" height="373" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage.jpg 600w, https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage-400x298.jpg 400w, https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage-160x119.jpg 160w" sizes="(max-width: 501px) 100vw, 501px" />

Mueller with President George W. Bush on July 5, 2001, as he is being appointed FBI director. (White House)

So if the Mueller narrative doesn't hold up, the charge of dissembling doesn't either. Indeed , as ex-federal prosecutor Andrew C. McCarthy observes in The National Review , the fact that the feds have charged Assange with unauthorized access to a government computer rather than conspiring with the Kremlin could be a sign that Team Mueller is less than confident it can prove collusion beyond a reasonable doubt. As he puts it, the GRU indictment "was more like a press release than a charging instrument" because the special prosecutor knew that the chances were zero that Russian intelligence agents would surrender to a U.S. court.

Indeed, when Mueller charged 13 employees and three companies owned by Russian businessman Yevgeny Prigozhin with interfering in the 2016 election, he clearly didn't expect them to surrender either. Thus , his team seemed taken aback when one of the alleged " troll farms " showed up in Washington asking to be heard. The prosecution's initial response, as McCarthy put it , was to seek a delay "on the astonishing ground that the defendant has not been properly served – notwithstanding that the defendant has shown up in court and asked to be arraigned." When that didn't work, prosecutors tried to limit Concord's access to some 3.2 million pieces of evidence on the grounds that the documents are too " sensitive " for Russian eyes to see. If they are again unsuccessful, they may have no choice but to drop the charges entirely, resulting in yet another " public relations disaster " for the Russia-gate investigation.

None of which bodes well for Mueller or the news organizations that worship at his shrine. After blowing the Russia-gate story all these years, why does the Times continue to slander the one news organization that tells the truth?

Daniel Lazare is the author of "The Frozen Republic: How the Constitution Is Paralyzing Democracy" (Harcourt Brace, 1996) and other books about American politics. He has written for a wide variety of publications from The Nation to Le Monde Diplomatique and blogs about the Constitution and related matters at D aniellazare.com .

[Mar 24, 2019] The manner in which Guccifer 2.0's English was broken, did not follow the typical errors one would expect if Guccifer 2.0's first language was Russian.

Highly recommended!
Notable quotes:
"... "After reading several articles, it seemed clear that key difficulties for Russians communicating in English include: definite and indefinite articles, the use of presuppositions and correct usage of say/tell and said/told. Throughout 2017, I constructed a corpus of Guccifer 2.0's communications and analyzed the frequency of different types of mistakes. The results of this work corroborate Professor Connolly's assessment. ..."
"... Overall, it appears Guccifer 2.0 could communicate in English quite well but chose to use inconsistently broken English at times in order to give the impression that it wasn't his primary language. The manner in which Guccifer 2.0's English was broken, did not follow the typical errors one would expect if Guccifer 2.0's first language was Russian. ..."
"... Access and motive . . .here are two who had both: Seth Rich and Imran Awan. That our fake news organizations have no interest in either, that should tell you something. ..."
Mar 24, 2019 | www.zerohedge.com

Tunga , 2 hours ago link

"I didn't really address the case that Russia hacked the DNC, content to stipulate it for now." - exce

The State Department paused its investigation of the Secretary's emails so as not to interfere with the Mueller investigation. Here we see Taibbi writes an exhaustive condemnation of the Western press while leaving out the very crux of the story, the very source of the stolen DNC emails was Clapper and Brennan pretending to be Guccifer 2.0.

Pitiful attempt at redemption there Matt. Seriously, go **** your self.

"After reading several articles, it seemed clear that key difficulties for Russians communicating in English include: definite and indefinite articles, the use of presuppositions and correct usage of say/tell and said/told. Throughout 2017, I constructed a corpus of Guccifer 2.0's communications and analyzed the frequency of different types of mistakes. The results of this work corroborate Professor Connolly's assessment.

Overall, it appears Guccifer 2.0 could communicate in English quite well but chose to use inconsistently broken English at times in order to give the impression that it wasn't his primary language. The manner in which Guccifer 2.0's English was broken, did not follow the typical errors one would expect if Guccifer 2.0's first language was Russian.

To date, Connolly's language study has not drawn any significant objections or criticism."

https://www.zerohedge.com/news/2018-12-25/guccifer-20-game-over-year-end-review-0

Any G Dala,

DNC emails were downloaded at 22.3Mbs, a speed which is not possible to achieve remotely, or even local. It is the exact download speed of a thumb drive.

All russian "fingerprints" were embedded in error codes, which had to be affirmatively copied. They were not an accident.

And please remind me, who exactly was it that examined the DNC servers and pointed at Russia?

Access and motive . . .here are two who had both: Seth Rich and Imran Awan. That our fake news organizations have no interest in either, that should tell you something.

[Feb 16, 2019] Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA

Feb 16, 2019 | disobedientmedia.com

Paul E. Merrell, J.D. , May 31, 2018 at 4:53 am

Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA: https://disobedientmedia.com/2018/05/guccifer-2-0s-american-fingerprints-reveal-an-operation-made-in-the-usa/

[Dec 20, 2018] Forensicator Guccifer 2.0 Returns To The East Coast by Elizabeth Lea Vos

Once is happenstance. Twice is coincidence. Three times is enemy action. ~ Ian Fleming
Notable quotes:
"... We believe that in all three cases Guccifer 2 was unlikely to anticipate that this Eastern timezone setting could be derived from the metadata of the documents that he published. However, one vocal critic with significant media reach objected to our East Coast finding as it related to our analysis of the ngpvan .7z file. This critic concluded instead that Guccifer 2 deliberately planted that clue to implicate a DNC worker who would die under suspicious circumstances a few days later on July 10, 2016. ..."
"... Now, we have this additional East Coast indication, which appears just one day after the ngpvan.7z files were collected. This new East Coast indication is found in a completely different group of files that Guccifer 2 published on his blog site. Further, this East Coast finding has its own unique and equally unlikely method of derivation. ..."
"... If we apply our critic's logic, what do we now conclude? That Guccifer 2 also deliberately planted this new East Coast indication? To what end? We wonder: Will this new evidence compel our out-spoken critic to retract his unsubstantiated claims and accusations? ..."
Dec 20, 2018 | www.zerohedge.com
Elizabeth Lea Vos Tue, 12/18/2018 - 22:43 45 SHARES

Via Disobedient Media.

Editorial Note: The Forensicator recently published a report, titled " Guccifer 2 Returns To The East Coast ." Forensicator provided the following introduction to his latest findings, reproduced here with the permission of the author.

In this post, we announce a new finding that confirms our previous work and is the basis for an update that we recently made to Guccifer 2's Russian Breadcrumbs . In our original publication of that report, we posited that there were indications of a GMT+4 timezone offset (legacy Moscow DST) in a batch of files that Guccifer 2 posted on July 6, 2016. At the time, we viewed that as a "Russian breadcrumb" that Guccifer 2 intentionally planted.

Now, based on new information, we have revised that conclusion: The timezone offset was in fact GMT-4 (US Eastern DST) . Here, we will describe how we arrived at this new, surprising conclusion and relate it to our prior work.

A month/so after publication, Stephen McIntyre ( @ClimateAudit ) replicated our analysis. He ran a few experiments and found an error in our original conclusion.

We mistakenly interpreted the last modified time that LibreOffice wrote as "2015-08-25T23:07:00Z" as a GMT time value. Typically, the trailing "Z" means " Zulu Time ", but in this case, LibreOffice incorrectly added the "Z". McIntyre's tests confirm that LibreOffice records the "last modified" time as local time (not GMT). The following section describes the method that we used to determine the timezone offset in force when the document was saved.

LibreOffice Leaks the Time Zone Offset in Force when a Document was Last Written

Modern Microsoft Office documents are generally a collection of XML files and image files. This collection of files is packaged as a Zip file. LibreOffice can save documents in a Microsoft Office compatible format, but its file format differs in two important details: (1) the GMT time that the file was saved is recorded in the Zip file components that make up the final document and (2) the document internal last saved time is recorded as local time (unlike Microsoft Word, which records it as a GMT [UTC] value).

If we open up a document saved by Microsoft Office using the modern Office file format ( .docx or .xlsx ) as a Zip file, we see something like the following.

LibreOffice , as shown below, will record the GMT time that the document components were saved. This time will display as the same value independent of the time zone in force when the Zip file metadata is viewed.

For documents saved by LibreOffice we can compare the local "last saved" time recorded in the document's properties with the GMT time value recorded inside the document (when viewed as a Zip file). We demonstrate this derivation using the file named potus-briefing-05-18-16_as-edits.docx that Guccifer 2 changed using LibreOffice and then uploaded to his blog site on July 6, 2016 (along with several other files).

Above, we calculate a time zone offset of GMT-4 (EDT) was in force, by subtracting the last saved time expressed in GMT (2016-07-06 17:10:58) from the last saved time expressed as local time (2016-07-06 13:10:57).

We've Been Here Before

The Eastern timezone setting found in Guccifer 2's documents published on July 6, 2016 is significant, because as we showed in Guccifer 2.0 NGP/Van Metadata Analysis , Guccifer 2 was likely on the East Coast the previous day, when he collected the DNC-related files found in the ngpvan.7z Zip file. Also, recall that Guccifer 2 was likely on the East Coast a couple of months later on September 1, 2016 when he built the final ngpvan.7z file.

We believe that in all three cases Guccifer 2 was unlikely to anticipate that this Eastern timezone setting could be derived from the metadata of the documents that he published. However, one vocal critic with significant media reach objected to our East Coast finding as it related to our analysis of the ngpvan .7z file. This critic concluded instead that Guccifer 2 deliberately planted that clue to implicate a DNC worker who would die under suspicious circumstances a few days later on July 10, 2016.

Further, this critic accused the Forensicator (and Adam Carter ) of using this finding to amplify the impact of Forensicator's report in an effort to spread disinformation. He implied that Forensicator's report was supplied by Russian operatives via a so-called "tip-off file." The Forensicator addresses those baseless criticisms and accusations in The Campbell Conspiracy .

Now, we have this additional East Coast indication, which appears just one day after the ngpvan.7z files were collected. This new East Coast indication is found in a completely different group of files that Guccifer 2 published on his blog site. Further, this East Coast finding has its own unique and equally unlikely method of derivation.

If we apply our critic's logic, what do we now conclude? That Guccifer 2 also deliberately planted this new East Coast indication? To what end? We wonder: Will this new evidence compel our out-spoken critic to retract his unsubstantiated claims and accusations?

Closing Thought: Once is happenstance. Twice is coincidence. Three times is enemy action. ~ Ian Fleming


tion , 12 hours ago link

It is curious how those running vpn's often don't bother appropriately setting their device time zones.

Regarding the closing thought, that was my thinking regarding the Byzantine Vegetable 'ally' at /qr in a non-American time zone who repeatedly attacked me.

Perhaps I have shared some harsh words with you and William, but I do sincerely care for your well being and my appreciation for the work you both have done remains. The Optics have been understandably difficult to swallow for many, but I hope that in your own time, you both will be willing to take another look at Q.

Q is Stephen Miller, and Q+ is POTUS.

Best Wishes to you both.

Q's tion

Bastiat , 12 hours ago link

Interesting to see Fleming -- as time goes on, it is pretty clear that he was telling us a few things about how power really works--psychopathic oligarchs with private wetworkers. Of course now we have governments competing to hire the same mercenaries -- and the uniformed mercenaries working oligarchs with government complicity.

Etymology , 21 hours ago link

In short, not a Hack by "Ruski's" a leak by an insider due to the impossibility to data transfer rates.

When will we see a rational investigation and prosecution of these criminals?

boattrash , 13 hours ago link

" When will we see a rational investigation and prosecution of these criminals? "

40 years from now, when **** gets declassified, and the Globalists up in Yanktown have accomplished their mission of destruction.

[Aug 17, 2018] What is definitely conclusive is the Gucci 2 entity forged the inclusion of Russian fingerprints in the leaked version of the documents by pasting it into a Russian language Word template.

Notable quotes:
"... What is definitely conclusive is the Gucci 2 entity forged the inclusion of Russian fingerprints in the leaked version of the documents by pasting it into a Russian language Word template. With 70 years of experience in espionage, there is no way Russian spy agencies are that sloppy and moreover, and if they were it would be absolutely unprecedented. ..."
"... the central conclusion of William Binnery's forensic analysis: that Gucifer 2.0 was a fabrication, and that the DNC emails were downloaded, not hacked by Russia. ..."
"... Were Assange be allowed to testify before the Senate Intelligence Committee later this month, the lid could be blown off the entire sordid operation. ..."
"... From before the CIA's formation the US intelligence activities have been the province of the Republican Party (there are plenty of exceptions, but please follow). Allen Dulles and his ilk were friends with and shared goals with German industrialists long before World War II. These relationships continued through WWII and afterwards. The CIA has functioned as an international coal and iron police, overthrowing governments around the world that have stood in the way of corporate profits. ..."
"... This edition of Covert Action Information Bulletin, in 1990, happened just before a shift in Washington. Almost all of the operations run by our government to destabilize Eastern Europe and the USSR in 1990 were organized by the political right and run by people such as Paul Weyrich. But the nineties showed a rise in Democratic activity in these settings. I would guess that a mental image of this would be our then-First Lady lying about dodging bullets on an airstrip during the destruction of Yugoslavia. It marked the successful CIA takeover of the Democratic Party. ..."
"... The 2016 Russiagate hysteria has been an intelligence operation which has been by all measures successful. I presumed initially that the scam was done to put Hillary into the White House, but now wonder if having Trump as President was part of the long-term strategy. ..."
"... Please note that the DNC backed over fifty new candidates for Congress who have intelligence backgrounds. How do you think they will vote for the coming war resolution against Russia? ..."
"... Not sure about the theory of installing Trump in the WH is part of a long term strategy of the deep state, but the latter seems to be adapting to the disruption quite well. ..."
"... Additional info: Stephen Kinzer's "The Brothers" which documents the Dulles brother's creation of the Cold War mentality and activities. Shouldn't we add Carter and Zbigniew Brzezinski. ..."
"... Citing a book from almost 30 years ago that implicated ONLY the Republicans in the CIAs machinations ignores LBJ and the CIA's involvement in Vietnam and possibly in the JFK assassination. ..."
"... One suspects that the President has revealed far less than he knows, perhaps wary of being accused of "obstruction" by Mueller in concert with the controlled media. He actually requested that William Binney present his analysis to then CIA Director Pompeo, who has since sat on it. ..."
"... But actually, to your point, the reverse is true. If the DNC and Podesta were hacked by Russians, the NSA would have been able to demonstrate that fact through evidentiary proof, a point made repeatedly by Binney. ..."
"... No such proof was or has ever been offered. Instead the main document presented to the American public was the January 6, 2017 "assessment" by analysts hand-picked by John Brennan, who has played a key role in the illegal operation against President Trump. ..."
"... I was struck by one comment particularly, why not ask Assange about the leak. ..."
"... Keeping him incommunicado certainly serves the leaders of the lynch mob and thanks goes to the new Ecuadorian President. He was asked to shut the guy up and he did. ..."
"... Herman, Assange has been asked about the identity of the leaker and replied that he couldn't comment because Wikileaks has a strict policy of maintaining sources' confidentiality. No potential source would ever trust Assange if he violated that policy. Instead, Assange offered a $20,000 reward for information leading to the arrest and conviction of Seth Richards' murderer. So this was his way of answering the question indirectly. ..."
Aug 17, 2018 | consortiumnews.com

Paul N August 14, 2018 at 2:36 pm

I don't believe the Russians did this. I think there are perhaps millions of people in the US capable of carrying out this action and many more with motive. Furthermore, if they did, I am happy that the information was made available so I can't see why I would care.

That said, I am unconvinced by this evidence. I am quite familiar with file systems on different operating systems and I would at least need to know what device we are talking about here. Did it come from Assange? Why doesn't somebody say so? What sort of device is it? The simple fact that it was copied from a computer doesn't prove that the computer was the DNC server. It might have been copied from Putin's iMac. I believe in one reading the writer acknowledged that the dates on the drive could be manipulated and I am certain that this is true. While this may still leave it above the level of evidence that the FBI or "intelligence" agencies have presented (or even claimed to have) it is not conclusive. Reply

GM , August 14, 2018 at 5:10 pm

What is definitely conclusive is the Gucci 2 entity forged the inclusion of Russian fingerprints in the leaked version of the documents by pasting it into a Russian language Word template. With 70 years of experience in espionage, there is no way Russian spy agencies are that sloppy and moreover, and if they were it would be absolutely unprecedented.

Furthermore, I have no reason to disbelieve Craig Murray that the docs were handed to him directly and transferred by him to Wikileaks. Quite the contrary, in fact, since his reputation would undoubtedly be irreconcilably demolished for all time if the Russiagaters ever came up with hard proof to support their conspiracy theory.

GM , August 14, 2018 at 5:12 pm

Please forgive all the typos, posted on my little bitty phone :)

j. D. D. , August 14, 2018 at 2:21 pm

The crucial premise of the ongoing British-instigated coup against President Trump and the chief legal ground for Robert Mueller's operation against the President, is the claim that the Russians hacked the emails of the DNC and, John Podesta, and provided the results to WikiLeaks which published them. The authenticity of such emails showing Hillary Clinton to be a craven puppet of Wall Street who had cheated Bernie Sanders of the nomination were never disputed, by Clinton, or anyone else.

Nor has the central conclusion of William Binnery's forensic analysis: that Gucifer 2.0 was a fabrication, and that the DNC emails were downloaded, not hacked by Russia.

Furthermore, the only people who really know where and by whom the download occurred are Julian Assange, whose life is now in peril, and former British Ambassador Craig Murray.

Were Assange be allowed to testify before the Senate Intelligence Committee later this month, the lid could be blown off the entire sordid operation.

paul g. , August 14, 2018 at 3:03 pm

Craig stated he was merely a go between, who was given the data in the woods by American University by probably another go between. Lots of cut outs here but the data was transferred physically by thumb drive(s).

David G , August 15, 2018 at 8:27 am

"The crucial premise is the claim that the Russians hacked the emails of the DNC and, John Podesta, and provided the results to WikiLeaks which published them."

Don't forget about the Facebook puppy videos. https://consortiumnews.com/2017/10/04/the-mystery-of-the-russia-gate-puppies/

Bob In Portland , August 14, 2018 at 1:25 pm

I would like to call attention to a little slice of history of US the destabilization of Eastern Europe and the USSR that would help to explain what is happening today.

From before the CIA's formation the US intelligence activities have been the province of the Republican Party (there are plenty of exceptions, but please follow). Allen Dulles and his ilk were friends with and shared goals with German industrialists long before World War II. These relationships continued through WWII and afterwards. The CIA has functioned as an international coal and iron police, overthrowing governments around the world that have stood in the way of corporate profits.

Russ Bellant's book, Old Nazis, the New Right, and the Republican Party, points to the political relationship between the Republican Party and fascists around the world. You can read a short article by Bellant here: https://archive.org/details/CovertActionInformationBulletinNo35TheCIAInEasternEurope

This edition of Covert Action Information Bulletin, in 1990, happened just before a shift in Washington. Almost all of the operations run by our government to destabilize Eastern Europe and the USSR in 1990 were organized by the political right and run by people such as Paul Weyrich. But the nineties showed a rise in Democratic activity in these settings. I would guess that a mental image of this would be our then-First Lady lying about dodging bullets on an airstrip during the destruction of Yugoslavia. It marked the successful CIA takeover of the Democratic Party.

The 2016 Russiagate hysteria has been an intelligence operation which has been by all measures successful. I presumed initially that the scam was done to put Hillary into the White House, but now wonder if having Trump as President was part of the long-term strategy.

Please note that the DNC backed over fifty new candidates for Congress who have intelligence backgrounds. How do you think they will vote for the coming war resolution against Russia?

GM , August 14, 2018 at 5:16 pm

Not sure about the theory of installing Trump in the WH is part of a long term strategy of the deep state, but the latter seems to be adapting to the disruption quite well.

Diana Lee , August 14, 2018 at 8:52 pm

Additional info: Stephen Kinzer's "The Brothers" which documents the Dulles brother's creation of the Cold War mentality and activities.
Shouldn't we add Carter and Zbigniew Brzezinski.

michael , August 15, 2018 at 6:33 am

Citing a book from almost 30 years ago that implicated ONLY the Republicans in the CIAs machinations ignores LBJ and the CIA's involvement in Vietnam and possibly in the JFK assassination. Later, Carter was the only Democrat President who may or may not have been heavily involved with the CIA. The Clintons were likely involved with the CIA early on in their Mena, Arkansas drug-smuggling schemes, and the CIA was definitely closely involved in their presidential anti-Slavic foreign policy. The Clintons' neoliberal agenda fit well with the older neocons and consolidated the Duopoly support for the crazed think tank ideas in DC.

jeff montanye , August 17, 2018 at 7:45 am

all perhaps true, but the cia, etc. have terribly neglected their republican base (ftr: registered democrat, sanders and trump voter) and it is baying at their heels, drool swinging from gnashing fangs. that is a political change as profound and radical as anything i observed around the tear gas and batons of the sixties.

Dan Kuhn , August 14, 2018 at 1:19 pm

"They have passed the point of no return; there is no walking it back now. If it fails heads will roll, but most importantly these trusted institutions will have flushed their last vestiges of credibility down the drain. Then what?"

Then nothing. It puts one mind of the comment made by one of the Robber Barons when they were caught with their hands in the cookie jar. His comment " All that was lost was honour" In the present mess even if eventually it all comes to light no one is going to be held answerable. No one is going to jail. Truth does not matter. The propaganda is what matters. if it is proven wrong it is merely swept under the rug. With the short attention spans of Americans it would be forgotten in a New York Minute.

GM , August 14, 2018 at 5:19 pm

Perhaps this explains the need for the likely false flag poison attack in Britain and the fake Douma nerve gas attack. Russiagate hasn't really been panning out so well and too much info has been emerging to challenge the narrative.

David G , August 15, 2018 at 8:29 am

I fully agree.

Peter de Klerk , August 14, 2018 at 1:06 pm

If Russian hacking is a hoax, why has it not been exposed by all the Trump appointed intelligence and FBI heads? Trump's people could shut it down with a public single statement. Y'all are deep into a conspiracy theory that makes no sense.

AnthraxSleuth , August 14, 2018 at 1:27 pm

Pffft!

It was shown to be a hoax by Clinton's own campaign staff in their book released after the election titled "shattered".

"Within 24 hours of her concession speech, [campaign chair John Podesta and manager Robby Mook] assembled her communications team at the Brooklyn headquarters to engineer the case that the election wasn't entirely on the up-and-up. For a couple of hours, with Shake Shack containers littering the room, they went over the script they would pitch to the press and the public. Already, Russian hacking was the centerpiece of the argument."

The plan, according to the book, was to push journalists to cover how "Russian hacking was the major unreported story of the campaign," and it succeeded to a fare-thee-well. After the election, coverage of the Russian "collusion" story was relentless, and it helped pressure investigations and hearings on Capitol Hill and even the naming of a special counsel, which in turn has triggered virtually nonstop coverage.

https://nypost.com/2017/10/26/how-team-hillary-played-the-press-for-fools-on-russia/

Guess the only conspiracy theororist here is you. Goebbels would be so proud. You drank the kool-aid bruh!

Peter de Klerk , August 14, 2018 at 2:19 pm

My comment applies equally well to your response. Why doesn't Nunes, Pompeo, or Coates, etc ever say anything about these theories?

AnthraxSleuth , August 14, 2018 at 4:28 pm

It's no longer a theory when the conspirators confess to it in their own writing. Which I demonstrated to you in the previous post.

Peter de Klerk , August 14, 2018 at 6:18 pm

This very slanted article amplifies a few post-election statements. I'm sure Podesta and Mook wanted to play this up. Some of that was sour grapes but most people are inclined to think it was also true. These guys controlling most media outlets and most of the intelligence community seems absurd to me. But I guess we all believe what we want to believe now.

jdd , August 14, 2018 at 2:30 pm

One suspects that the President has revealed far less than he knows, perhaps wary of being accused of "obstruction" by Mueller in concert with the controlled media. He actually requested that William Binney present his analysis to then CIA Director Pompeo, who has since sat on it.

But actually, to your point, the reverse is true. If the DNC and Podesta were hacked by Russians, the NSA would have been able to demonstrate that fact through evidentiary proof, a point made repeatedly by Binney.

No such proof was or has ever been offered. Instead the main document presented to the American public was the January 6, 2017 "assessment" by analysts hand-picked by John Brennan, who has played a key role in the illegal operation against President Trump.

jeff montanye , August 17, 2018 at 7:54 am

And Donald Trump has more training in show business than most politicians or even internet commenters. I suspect there is a fall premiere of quite an extravaganza leading up to the midterm elections.

Herman , August 14, 2018 at 1:03 pm

Read half the most intelligent commentary and had to quick. I was struck by one comment particularly, why not ask Assange about the leak. Too simple but too much to ask, I guess. Keeping him incommunicado certainly serves the leaders of the lynch mob and thanks goes to the new Ecuadorian President. He was asked to shut the guy up and he did.

Modawg , August 14, 2018 at 3:28 pm

I think he has been asked and has politely refused to reveal. But his innuendo is that it was from inside the US and definitely not the Russkies.

alley cat , August 14, 2018 at 4:44 pm

Herman, Assange has been asked about the identity of the leaker and replied that he couldn't comment because Wikileaks has a strict policy of maintaining sources' confidentiality. No potential source would ever trust Assange if he violated that policy. Instead, Assange offered a $20,000 reward for information leading to the arrest and conviction of Seth Richards' murderer. So this was his way of answering the question indirectly.

A Solomonic solution that is technically not a violation of confidentiality

Andy Wilcoxson , August 14, 2018 at 12:36 pm

Can I play devil's advocate and ask a question. Can we rule out the possibility that a hacker in Russia, China, or wherever had remote control of a computer in the United States that they used to hack the DNC?

49.1 megabytes per second is almost 400 mbps, which is a very fast transfer speed, but there were one gigabit (1000 mbps) connections available in several US markets when these e-mails were stolen. You might not have been able to transfer the files directly from Washington D.C. to Russia at those speeds, but you certainly could have transferred them between computers within the United States at those speeds using gigabit internet connections.

Is there something I'm missing? How does the file transfer speed prove this was a USB download and not a hack when gigabit internet connections existed that could have accommodated those transfer speeds -- maybe not directly to Russia or Europe, but certainly to another US-based computer that foreign hackers may have have remotely controlled.

Desert Dave , August 14, 2018 at 6:09 pm

Actually a byte is 10 bits total because there is overhead (start and stop bits). So 49.1 MBps is about 491 Mbps. The question of whether the DNC server was attached to a network that fast would be easy to answer, if the FBI or anybody else wanted to check.

AnthraxSleuth , August 15, 2018 at 1:11 am

A byte is 8 bits.

[Jul 31, 2018] The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues.

Jul 31, 2018 | turcopolier.typepad.com

mlnw , 13 days ago

The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues. The Guccifer 2.0 metadata was analyzed for its transmission speed, and based on the internet speeds to and from numerous test locations abroad and in the U.S., it was determined to have been impossible for the so-called Guccifer 2.0 to have hacked the DNC computers over the internet. The transmission speed however did correspond to the speed of the transfer to a thumb drive. Additionally, it was found that the data had been manipulated and split into two parts to simulate a July and a September transfer, when in fact the parts merge perfectly as single file, and where, according to Binney, the probability of the split being a coincidence would be 100 to the 50th power.

As for the crude trace fingerprints (e.g. the referencing of Dzerzinsky), one of the Wikileaks data dumps (Vault 7 Marble) during a period when Assange was negotiating with the Administration - there were two at the time (Vault 7 Marble and Vault 7 Grasshopper), the release of which apparently enraged Mike Pompeo- was designed to obfuscate, fabricate and frame countries such as Russia, Iran or North Korea by pretending to be the target country, including in the use of target's alphabet and language.

VIPs has written numerous articles on this in Consortium News. See also the report by Patrick Lawrence Smith in The Nation at: https://www.thenation.com/a... . (It was apparently so hot at the time- and disputed by several other VIPs members- that The Nation sought an independent assessment by third party, though those comments were easily addressed and dismissed in seriatim by Binney in an annex to the article.)

Binney has explained his forensic analysis and conclusions at numerous forums, and in a sit-down with Secretary Pompeo in October, 2017- though Mueller, the FBI, and mainstream and some of the alternative press seem either deaf, dumb and blind to it all, or interested in discrediting the study. The irony is, I'd venture to guess, that Binney, with his 40 years of experience, including as Technical Director and technical guru at the NSA, is, even in retirement, more sophisticated in these matters than any one at the Agency, or the FBI, or CIA, or certainly, the Congressional Intelligence Committees. So, it is astounding that any or all of them could have, but did not, invite him to testify as an expert.

Moreover, the NSA has a record of every transmission, and also would have it on backup files. And, the FBI has been sitting on Seth Rich's computer and his communications with Wikileaks, and presumably has a report that it has not released. And of course, as Trump asked in his press conference, where's the DNC server, any or all of which would put this question to rest.

A recent interview with Binney can be found at:

Play Hide
mlnw -> mlnw , 11 days ago
The last clause of the first paragraph should have said: "according to Binney, the probability of the split being a coincidence would be one over 100 to the 50th power

[Jul 31, 2018] Guccifer 2.0 and GCHQ

Notable quotes:
"... There is a pattern of abuse of formerly well regarded institutions to achieve the propaganda aims of the Deep State establishment. The depths that were plumbed to push the Iraq WMD falsehoods are well known. Yet no one was held to account nor was there any honest accounting of the abuse. There have been pretenses like the Owen inquiry that you note. ..."
"... We see the same situation of sweeping under the rug malfeasance and even outright criminality through obfuscation and obstruction in the case of the meddling in the 2016 election by top officials in intelligence and law enforcement. Clearly less and less people are buying what the Deep State sells despite their overwhelming control of the media channels. ..."
"... What is to be gained by the leadership in Britain in promoting these biological weapons cases since Litvinenko? In the US it is quite apparent that the Deep State have become extremely powerful and the likelihood that Trump recognizes that resistance is futile is very high. Schumer may be proven right that they have six ways from Sunday to make you kowtow to their dictats. ..."
Jul 31, 2018 | turcopolier.typepad.com

If you look at the 'Lawfare' blog, in which a key figure is James Comey's crony Benjamin Wittes, you will find a long piece published last Friday, entitled 'Russia Indictment 2.0: What to Make of Mueller's Hacking Indictment.'

Among the authors, in addition to Wittes himself, is the sometime GCHQ employee Matt Tait. It appears that the former head of that organisation, the Blairite 'trusty' Robert Hannigan, who must know where a good few skeletons are buried, is a figure of some moment in the conspiracy.

(See https://www.lawfareblog.com... .)

It was Matt Tait who, using the 'Twitter' handle @pwnallthethings, identified the name and patronymic of Dzerzhinsky in the 'metadata' of the 'Guccifer 2.0' material on 15 June 2016, the day after Ellen Nakashima first disseminated the BS from 'CrowdStrike' in the 'WP.'

The story was picked up the following day in a report on the 'Ars Technica' site, and Tait's own account appeared on the 'Lawfare' site, to which he has been a regular contributor, on 28 July.

(See https://arstechnica.com/inf... ; https://www.lawfareblog.com... .)

According to the CV provided in conjunction with the new article:

'Matt Tait is a senior cybersecurity fellow at the Robert S. Strauss Center for International Security and Law at the University of Texas at Austin. Previously he was CEO of Capital Alpha Security, a consultancy in the UK, worked at Google Project Zero, was a principal security consultant for iSEC Partners, and NGS Secure, and worked as an information security specialist for GCHQ.'


blue peacock , 13 days ago

How does the objective truth get disclosed in an environment of extreme deceit by so many parties?

How to trust western intelligence when they have such a long and sordid track record of deceit, lies and propaganda? At the same time there is such a long history of Russian and Chinese intelligence and information operations against the west.

Then there is the nexus among the highest levels of US law enforcement and intelligence as well as political elites in both parties and key individuals in the media complex.

We are living in a hall of mirrors and it seems the trend is towards confirmation bias in information consumption.

richardstevenhack , 13 days ago
Excellent post, especially the debunking of the 'Gerasimov doctrine' which I always thought was more hand-waving and Russian mind-reading.

It's important to realize that there are a number of people in the infosec community who have biases against Russia, just as there are in the general population. Then there are more cautious people, who recognize the difficulty in attributing a hack to any specific person absent solid, incontrovertible, non-circumstantial and non-spoofable (and preferably offline) evidence.

Tait doesn't appear to be one of the latter. Thomas Rid would be another. There are others.

Jeffrey Carr is one of the latter, and his familiarity with intelligence matters is clear from his organization of the annual "Suits and Spooks" Conference. I believe he was the first to raise questions about the DNC hack which didn't pass his smell test.

There are also a number of companies in infosec who rely on latching onto a particular strain of hacker, the more publicly exploitable for PR purposes the better, as a means of keeping the company name in front of potential high-profile and highly billable clients. CrowdStrike and its Russia obsession isn't the only one that's been tagged with that propensity.

Mandiant could be referred to as the "Chinese, all the time" company, for example. Richard Bejtlich was at Fireeye and the became Chief Security Officer when they acquired Mandiant. He spent quite a bit of effort on his blog warning about the Chinese military buildup as a huge threat to the US. He's former USAF so perhaps that's not surprising.

Bottom line: Confirmation bias is a real thing.

Barbara Ann , 13 days ago
Glad David's comment has been reproduced as a post in its own right, this is a critically important topic.

IMO Matt Tait plays the role of midwife in this conspiracy. His Twitter thread

View Hide
mlnw , 13 days ago
The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues. The Guccifer 2.0 metadata was analyzed for its transmission speed, and based on the internet speeds to and from numerous test locations abroad and in the U.S., it was determined to have been impossible for the so-called Guccifer 2.0 to have hacked the DNC computers over the internet. The transmission speed however did correspond to the speed of the transfer to a thumb drive. Additionally, it was found that the data had been manipulated and split into two parts to simulate a July and a September transfer, when in fact the parts merge perfectly as single file, and where, according to Binney, the probability of the split being a coincidence would be 100 to the 50th power.

As for the crude trace fingerprints (e.g. the referencing of Dzerzinsky), one of the Wikileaks data dumps (Vault 7 Marble) during a period when Assange was negotiating with the Administration - there were two at the time (Vault 7 Marble and Vault 7 Grasshopper), the release of which apparently enraged Mike Pompeo- was designed to obfuscate, fabricate and frame countries such as Russia, Iran or North Korea by pretending to be the target country, including in the use of target's alphabet and language.

VIPs has written numerous articles on this in Consortium News. See also the report by Patrick Lawrence Smith in The Nation at: https://www.thenation.com/a... . (It was apparently so hot at the time- and disputed by several other VIPs members- that The Nation sought an independent assessment by third party, though those comments were easily addressed and dismissed in seriatim by Binney in an annex to the article.)

Binney has explained his forensic analysis and conclusions at numerous forums, and in a sit-down with Secretary Pompeo in October, 2017- though Mueller, the FBI, and mainstream and some of the alternative press seem either deaf, dumb and blind to it all, or interested in discrediting the study. The irony is, I'd venture to guess, that Binney, with his 40 years of experience, including as Technical Director and technical guru at the NSA, is, even in retirement, more sophisticated in these matters than any one at the Agency, or the FBI, or CIA, or certainly, the Congressional Intelligence Committees. So, it is astounding that any or all of them could have, but did not, invite him to testify as an expert.

Moreover, the NSA has a record of every transmission, and also would have it on backup files. And, the FBI has been sitting on Seth Rich's computer and his communications with Wikileaks, and presumably has a report that it has not released. And of course, as Trump asked in his press conference, where's the DNC server, any or all of which would put this question to rest.

A recent interview with Binney can be found at:

Play Hide
mlnw -> mlnw , 11 days ago
The last clause of the first paragraph should have said:
"according to Binney, the probability of the split being a coincidence would be one over 100 to the 50th power
David Habakkuk , 11 days ago
All,

More evidence for the at least passive complicity of GCHQ – for which Matt Tait used to work, and which Robert Hannigan used to run – in corrupt 'information operations' comes in a report yesterday on CNN.

(See https://edition.cnn.com/201... )

It opens:

'Police have identified two suspects in the poisoning of former Russian double agent Sergei Skripal and his daughter Yulia, a source with knowledge of the investigation told CNN on Thursday.

'The pair left the UK in the wake of the attack on what is believed to have been a commercial flight, the source added.

'Their departure was revealed in a coded Russian message to Moscow sent after the attack, which was intercepted by a British base in Cyprus, the source said. The British government blames the Skripals' poisoning on Russia.'

The base in question is high up in the Troodos mountains, and is formally run by the RAF but actually a key resource for both GCHQ and NSA in monitoring communications over a wide area. According to an internal document from the former organisation, it has 'long been regarded as a 'Jewel in the Crown' by NSA as it offers unique access to the Levant, North Africa, and Turkey'.

(See https://theintercept.com/20... .)

That the quote comes a report in 'The Intercept' in January 2016 revealing that one of the uses of the Troodos facility is to intercept live video feeds from Israeli drones and fighter jets brings out how paradoxical the world is. For it also appears to have emerged as an important resource in 'information operations' in support of 'Borgist' agendas.

The claim about intercepts incriminating the Russians over the Salisbury incident was first made in a piece by Marco Giannangeli in the Daily Express on 9 April, which followed up the claims which Colonel de Bretton-Gordon had been instrumental in disseminating, and was then widely picked up by the MSM.

(See https://www.express.co.uk/n... .)

It was headlined: 'REVEALED: The bombshell Russian message intercepted on DAY of Skripal poisonings,' and opened: 'AN ELECTRONIC message to Moscow sent on the day former Russian spy Sergei Skripal and his daughter Yulia were poisoned with a nerve agent in Salisbury included the phrase "the package has been delivered".'

Supposedly, this 'prompted a young Flight Lieutenant to recall a separate message that had been intercepted and discounted on the previous day.' The messages were 'understood to have formed "just one part" of the intelligence packet which later allowed Prime Minister Theresa May to state it was "highly likely" that Russia was behind the attacks.'

As it happens, the same writer – Marco Giannangeli – had disseminated a parallel piece of palpable fiction on 1 September 2013, in the 'Sunday Express', in relation to the Ghouta 'false flag.'

(See https://www.express.co.uk/n... .)

This one was headlined, even more melodramatically, 'Senior Syrian military chiefs tell captain: fire chemicals or be shot; BRITISH intelligence chiefs have intercepted radio messages in which senior Syrian military chiefs are heard ordering the use of chemical weapons.'

Part of the story of how bogus claims about 'smoking gun' evidence from 'SIGINT' were used to support the attempt to use the Ghouta 'false flag' to inveigle the British and Americans into destroying the Syrian government was told in my SST post on the incident. However, to mix metaphors, I only scratched the surface of a can of worms.

In a report on the 'Daily Caller' site on 29 August 2013, Kenneth Timmerman claimed that the sequence had started with an actual intercept by Unit 8200 – the Israeli equivalent of GCHQ and NSA.

(See http://dailycaller.com/2013... .)

Claiming to base his account on Western intelligence sources, he suggested that:

'According to these officers, who served in top positions in the United States, Britain, France, Israel, and Jordan, a Syrian military communication intercepted by Israel's famed Unit 8200 electronic intelligence outfit has been doctored so that it leads a reader to just the opposite conclusion reached by the original report.'

While I am not in a position to establish whether his claim is or is not accurate, an AP report on the same day quoted 'U.S. intelligence officials' explaining that 'an intercept of Syrian military officials discussing the strike was among low-level staff, with no direct evidence tying the attack back to an Assad insider or even a senior Syrian commander'.

(See https://www.salon.com/2013/... )

Meanwhile, Timmerman's claim that 'The doctored report was picked up on Israel's Channel 2 TV on Aug. 24, then by Focus magazine in Germany, the Times of Israel, and eventually by The Cable in Washington, DC' is supported by links to the relevant stories, which say what he claims they say.

Moreover, it seems clear that the 1 September 2013 report was an attempt to counter a – somewhat devastating – critique made in a 31 August post entitled 'The Troodos Conundrum' by the former British Ambassador Craig Murray, who had been closely involved with the facility during his time at the Foreign Office (and has written invaluable material on the Salisbury incident.)

(See https://www.craigmurray.org... .)

Precisely because of the closeness of the GCHQ/NSA collaboration, Murray brought out, there was indeed a major problem explaining why claims about 'SIGINT' had been central to the case made in the 'Government Assessment' released by the White House on 30 August 2013, but not even mentioned in the Joint Intelligence Community 'Assessment' produced two days before.

The answer, Murray suggested, was that the 'intelligence' came from Mossad, and so would not have been automatically shared with the British. But, given the superior capabilities of Troodos, if Mossad had it, the British should have also. So his claims 'meshed' with those by Timmerman and the AP, and the 'Express' report looks like a lame attempt at a cover-up.

Again however, one finds the world is a paradoxical place. As I noted in my SST post, detailed demolitions of the claims about 'SIGINT' in relation to Ghouta were provided both Seymour Hersh, in the 'Whose sarin?' article, and also on the 'Who Attacked Ghouta?' site masterminded by one 'sasa wawa.'

Later, it became clear that this was likely to be the Israeli technology entrepreneur Saar Wilf, a former employee of Unit 8200. So this may – or may not – be an indication of deep divisions within Israeli intelligence.

Between 18 March and 31 April, a fascinating series of posts on the Salisbury incident appeared on the 'Vineyard of the Saker' blog. The author, who used the name 'sushi', was a self-professed IT professsional, who had however obviously acquired an extensive familiarity with 'chemical forensics' and appeared to have some experience of 'SIGINT.'

(See https://thesaker.is/tag/sushi/ .)

In a 14 April post, 'sushi' produced a dismissal of the claims about 'SIGINT' implicating the Russians over the Salisbury incident quite as contemptuous as that which 'sasa wawa' had produced in relation to the claims about it incriminating the Syrian government over Ghouta. Pointing to the implausibility of the story disseminated by the 'Express', he remarked that:

'It is doubted that any message traffic is processed on Cyprus. It is more likely that the entire take is transmitted back to GCHQ in Cheltenham via a fibre optic link. There exabytes of take are processed, not by a bored flight lieutenant, but by banks of high speed computers.

'Clearly someone in Cheltenham has committed a programming error. Anyone with any knowledge of secret communications knows that the code phrase used to confirm a murder in Salisbury is "small pizza, no anchovies." '

Interestingly, another paper in the 'Express' group made a parallel claim in relation to the Khan Sheikhoun incident to that about the Ghouta incident, but the story was not picked up and may indeed have been suppressed.

On 9 April, the paper published a report headlined 'Brit spies' lead role in Syrian air strikes; RAF BASE IS 'WEAPON.' This claimed that 'within an hour of the airstrike', Troodos had intercepted communications revealing that nerve gas had been used, and had been delivered by jets from the Syrian Arab Air Force's Shayrat Air Base.

(See

View Hide
David Habakkuk , 12 days ago
All,

I was drafting a response to the comment by 'Barbara Ann' – thanks for the link to the recent posts by Adam Carter – before going out. Returning and reading some very interesting comments, I think what I wanted to say has more general relevance.

One reason I am reading so much into 'this Dzerzhinsky thing' is the body of accumulating evidence that people like Tait are part of a system of networks which combine sanctimoniousness, corruption and stupidity in about equal measures. So some more examples may be to the point.

Different cases in which I have taken an interest come together in a post by Tait on the 'Lawfare' site on 13 March, entitled 'U.K. Prime Minister's Speech on the Russian Poisoning of Sergei Skripal: Decoding the Signals.'

(See https://www.lawfareblog.com... .)

In support of the claim that in accusing Russia of a pioneering act of chemical terrorism Theresa May was relying upon accurate analysis from the 'U.K. intelligence community', Tait wrote that:

'May then explained that Skripal was poisoned by a "military-grade nerve agent of a type developed by Russia one of a group of nerve agents known as 'Novichok.'" She is laying out the basic groundwork for the government's attribution to a nation state and, more specifically, Russia. At Porton Down, the U.K. has one of the world's best forensic labs for analyzing chemical, biological and nuclear weapons. With the poisoning of Alexander Litvinenko in 2006, this lab not only established that Polonium-210 was used but also which reactor in Russia it came from.'

In the event, as is by now well know, Boris Johnson's claim that Porton Down scientists had told him that the agent which poisoned the Skripals came from Russia was specifically repudiated by the head of that organisation, Gary Aitkenhead, on 3 April. Our Foreign Secretary told a flagrant lie, and was exposed.

(See https://www.craigmurray.org... .)

As I have shown in previous posts on this site, the 'Inquiry' conducted by Sir Robert Owen into the death of Litvinenko was patently corrupt. Moreover, it seems highly likely that, in fabricating 'evidence' to cover up what actually happened, Christopher Steele was doing a 'dry-run' for the fabrication of material in the dossier published by 'BuzzFeed.'

In fact, however, Owen's report made quite clear that the role of Porton Down was marginal. Furthermore, 'Scientist A1' from the Atomic Weapons Establishment at Aldermaston quite specifically rejected the claim that 'impurity profiling' made it possible to establish that the source of the polonium was the Avangard facility at Sarov, her arguments being accepted by Owen. Either Tait has not bothered to read the report or very much of the coverage, or he is lying.

(For the report, see http://webarchive.nationala... . For some of the mass of evidence which Owen chose to ignore, see my discussions at http://turcopolier.typepad.... ; http://turcopolier.typepad....

What Porton Down did do was to use 'impurity profiling', which can produce 'spectra' identifying even the tiniest traces of substances, to frustrate the attempt to use the 'false flag' attack at Ghouta on 21 August 2013 to inveigle the American and British governments into destroying the Assad 'régime' and handing the country over to jihadists.

It may well be that this display of competence and integrity led to a 'clampdown' at the organisation, which encouraged Boris Johnson to believe he could get away with lying about what its scientists told him.

(See my defence and development of the crucial reporting by Seymour Hersh, at http://turcopolier.typepad.... .)

A general pattern which emerges is that the same small group of 'disinformation peddlers' resurfaces in different contexts – and the pattern whereby 'private security companies' are used to create a spurious impression of independence also recurs.

As I bring out in my piece on Ghouta, two figures who were critical in shaping the 'narrative' acccording to which Syrian government responsibility for the atrocity had been conclusively proved, were Colonel Hamish de Bretton-Gordon, formerly the former commanding officer of the UK Chemical, Biological, Radiological and Nuclear Regiment, and also NATO's Rapid Reaction CBRN Battalion, and Dan Kaszeta.

Immediately after the story of the poisoning of the Skripals on 4 March broke, the same duo reappeared, and have been as critical to shaping the 'narrative' about the later incident as they were to that about the former.

(For the piece by Kaszeta on 'Bellingcat' which introduced the 'Novichok' theme four days later, see https://www.bellingcat.com/... .)

This makes it particular interesting to look at the website of Kaszeta's consultancy, 'Strongpoint Security Limited', in conjunction with the 'Companies House' documentation on the company.

(See http://strongpointsecurity.... ; https://beta.companieshouse... .)

One would have thought from the website that his company was a small, but hardly insignificant, player, in the field of 'physical and operational security.' As it happens, having filed 'Total exemption small company accounts' since its incorporation in May 2011, last December it filed 'Micro company accounts' for the year to 31 May 2017.

With a turnover of £20,000, staff costs of a bit more than half of that, and a profit of £394, we can see that although unlike Matt Tait's, Kaszeta's company did trade, if indeed it was his sole source of income, this pivotal figure in Anglo-American 'disinformation operations' was living on something less than $15,000 a year, at current exchange rates. (Pull the other one, as we say in Britain.)

This is all the more ironic, as the website brings out quite how critical a figure Kaszeta has been in obscuring the truth. From the bio he gives, we learn that having started as a Chemical Officer in the U.S. Army, he worked for 12 years in the White House, dealing with CBRN matters, before moving to Britain in 2008.

Among the articles to which he links on the site, we see his response in 'NOW Lebanon' in December 2013 to Hersh's original 'Whose sarin?' piece on Ghouta, -- in which Kaszeta first introduced the famous 'hexamine hypothesis.'

This – patently preposterous – suggestion that the presence of a single 'impurity' is a 'smoking gun' incriminating the Syrian government has echoed on into the clearly corrupt OPCW documents purporting to demonstrate that it was responsible for the 4 April 2017 Khan Sheikhoun attack.

Of some interest in understanding where Kaszeta he is coming from is what he describes as his 'oldest (and most footnoted on Wikipedia)' piece, which is an article published in 1988 on a site called 'Lituanus', on 'Lithuanian Resistance to Foreign Occupation 1940-52.'

(See http://www.lituanus.org/198... .)

As to Colonel de Bretton-Gordon, it is of interest to look at the attempt to 'finger' the GRU over the Skripal poisoning published under the title 'UK Poisoning Inquiry turns to Russian Agency in Mueller Indictments' in the 'New York Times' last Sunday, and the response by the Russian Embassy in London to a question about it.

(See https://www.nytimes.com/201... ; https://www.rusemb.org.uk/f... .)

The response objects that 'while the British authorities keep concealing all information concerning the investigation into the Salisbury incident, the newspaper has quoted "one former US official familiar with the inquiry".'

It also asserts that that crucial evidence which has not been made available to the Russians – and here, as with Ghouta and Khan Sheikhoun, the results of 'impurity profiling' are critical – appears to have been shared not just with inappropriate Americans, but with all kinds of others.

And indeed, the Embassy is quite right in suggesting that the claim made by the supposed creator of 'Novichok', Vladimir Uglev, to the BBC in April about 'all the spectrum data I was sent recently' has neither been confirmed nor denied. This seems a general pattern – the 'spectra' which may actually be able to provide definitive answers to questions of responsibility are only provided to people who can be relied upon to give the 'right' answers.

The Embassy response also quite fairly refers to a report in the 'Times' also in April, about the 'intelligence' which had been 'used to persuade world leaders that Moscow was behind the poisoning' and that the 'Novichok' had been manufactured at the Shikhany facility at in southwest Russia, which stated that de Bretton-Gordon, 'who had seen the intelligence, called it very compelling.' He has a long history of lying about CW in Syria – so is obviously the right person to lie about them in the UK.

(See https://www.bbc.co.uk/news/... ; https://www.thetimes.co.uk/... .)

It thus becomes interesting to probe into what lies behind the opening of de Bretton-Gordon's entry on the 'Military Speakers' website ('Real Heroes; Real Stories.') According to this, he is 'Chief Operating Office of SecureBio Ltd a commercial company offering CBRN Resilience, consultancy and deployable capabilities.'

(See http://www.militaryspeakers... .)

From 'Companies House', we learn that the liquidation of 'Secure Bio', which started in in June 2015, was concluded in August last year. The really interesting thing about the records, however, is that at the time of the liquidation the company had very large debts, which were written off, of a kind and in a manner which suggested that de Bretton-Gordon's activities may have been largely funded by loans from untraceable sources which were not meant to be repaid.

(See https://beta.companieshouse... – in particular the 'Statement of affairs' dated 30 June 2015.)

Actually, with the 'NYT' report we come full circle. Among those quoted is Mark Galeotti – apparently his admission that he had totally misrepresented the thinking of the Russian General Staff has not him made more cautious about making extravagant claims about its Main Intelligence Directorate (misreported as Main Directorate by the 'NYT.')

Also quoted are two figures who play key roles in Owen's Report – the Soviet era-GRU defector 'Viktor Suvorov' (real name 'Vladimir Rezun') and the former KGB operative Yuri Shvets. Both of these feature prominently in the posts on the Litvinenko affair to which I have linked, and both were key members of the 'information operations' network centred around the late Boris Berezovsky. This now seems to have taken control of American policy, as of British.

The role of 'Suvorov'/Rezun in attempting to defend the interpretations of Stalin's policy put forward by MI6 in the run-up to the Second World War, and those asserted later by General Keitel, and the way he was demolished by the leading American historian of the War in the East, Colonel David Glantz, and the Israeli historian Gabriel Gorodetsky, is too large a subject to go into here.

(For a brief review, see https://networks.h-net.org/... .)

However, it provides further reason to wonder whether the misreadings of Stalin's policy which caused MI6 to give advice to Chamberlain which helped destroy the last chances of preventing the Nazi-Soviet Pact, may still be the 'house view' of that organisation. It was, obviously, the Pact which spelled 'curtains' both for Poland and the Baltics.

Jack -> David Habakkuk , 12 days ago
David

There is a pattern of abuse of formerly well regarded institutions to achieve the propaganda aims of the Deep State establishment. The depths that were plumbed to push the Iraq WMD falsehoods are well known. Yet no one was held to account nor was there any honest accounting of the abuse. There have been pretenses like the Owen inquiry that you note.

We see the same situation of sweeping under the rug malfeasance and even outright criminality through obfuscation and obstruction in the case of the meddling in the 2016 election by top officials in intelligence and law enforcement. Clearly less and less people are buying what the Deep State sells despite their overwhelming control of the media channels.

It seems that we are marching towards a credibility crisis similar to what was experienced in the Soviet Union when no one trusted the contents in Pravda.

What is to be gained by the leadership in Britain in promoting these biological weapons cases since Litvinenko? In the US it is quite apparent that the Deep State have become extremely powerful and the likelihood that Trump recognizes that resistance is futile is very high. Schumer may be proven right that they have six ways from Sunday to make you kowtow to their dictats.

Fred -> Jack , 12 days ago
Jack,

"Yet no one was held to account"

That was one of the changes being hoped for when Obama was first elected. Instead we got little, except for things such as bailed out bankers and the IRS scandal which lasted until the end of his 2nd term. The panic from the left over the 2016 election issues the are still going on is that the expected candidate isn't in office and they are being exposed. Whether they get prosecuted is another story.

http://taxprof.typepad.com/...

[Jul 31, 2018] More evidence for the at least passive complicity of GCHQ for which Matt Tait used to work, and which Robert Hannigan used to run in corrupt 'information operations' comes in a report yesterday on CNN.

Notable quotes:
"... As it happens, the same writer – Marco Giannangeli – had disseminated a parallel piece of palpable fiction on 1 September 2013, in the 'Sunday Express', in relation to the Ghouta 'false flag.' ..."
Jul 31, 2018 | turcopolier.typepad.com

David Habakkuk , 11 days ago

All,

More evidence for the at least passive complicity of GCHQ – for which Matt Tait used to work, and which Robert Hannigan used to run – in corrupt 'information operations' comes in a report yesterday on CNN.

(See https://edition.cnn.com/201... )

It opens:

'Police have identified two suspects in the poisoning of former Russian double agent Sergei Skripal and his daughter Yulia, a source with knowledge of the investigation told CNN on Thursday.

'The pair left the UK in the wake of the attack on what is believed to have been a commercial flight, the source added.

'Their departure was revealed in a coded Russian message to Moscow sent after the attack, which was intercepted by a British base in Cyprus, the source said. The British government blames the Skripals' poisoning on Russia.'

The base in question is high up in the Troodos mountains, and is formally run by the RAF but actually a key resource for both GCHQ and NSA in monitoring communications over a wide area. According to an internal document from the former organisation, it has 'long been regarded as a 'Jewel in the Crown' by NSA as it offers unique access to the Levant, North Africa, and Turkey'.

(See https://theintercept.com/20... .)

That the quote comes a report in 'The Intercept' in January 2016 revealing that one of the uses of the Troodos facility is to intercept live video feeds from Israeli drones and fighter jets brings out how paradoxical the world is. For it also appears to have emerged as an important resource in 'information operations' in support of 'Borgist' agendas.

The claim about intercepts incriminating the Russians over the Salisbury incident was first made in a piece by Marco Giannangeli in the Daily Express on 9 April, which followed up the claims which Colonel de Bretton-Gordon had been instrumental in disseminating, and was then widely picked up by the MSM.

(See https://www.express.co.uk/n... .)

It was headlined: 'REVEALED: The bombshell Russian message intercepted on DAY of Skripal poisonings,' and opened: 'AN ELECTRONIC message to Moscow sent on the day former Russian spy Sergei Skripal and his daughter Yulia were poisoned with a nerve agent in Salisbury included the phrase "the package has been delivered".'

Supposedly, this 'prompted a young Flight Lieutenant to recall a separate message that had been intercepted and discounted on the previous day.' The messages were 'understood to have formed "just one part" of the intelligence packet which later allowed Prime Minister Theresa May to state it was "highly likely" that Russia was behind the attacks.'

As it happens, the same writer – Marco Giannangeli – had disseminated a parallel piece of palpable fiction on 1 September 2013, in the 'Sunday Express', in relation to the Ghouta 'false flag.'

(See https://www.express.co.uk/n... .)

This one was headlined, even more melodramatically, 'Senior Syrian military chiefs tell captain: fire chemicals or be shot; BRITISH intelligence chiefs have intercepted radio messages in which senior Syrian military chiefs are heard ordering the use of chemical weapons.'

Part of the story of how bogus claims about 'smoking gun' evidence from 'SIGINT' were used to support the attempt to use the Ghouta 'false flag' to inveigle the British and Americans into destroying the Syrian government was told in my SST post on the incident. However, to mix metaphors, I only scratched the surface of a can of worms.

In a report on the 'Daily Caller' site on 29 August 2013, Kenneth Timmerman claimed that the sequence had started with an actual intercept by Unit 8200 – the Israeli equivalent of GCHQ and NSA.

(See http://dailycaller.com/2013... .)

Claiming to base his account on Western intelligence sources, he suggested that:

'According to these officers, who served in top positions in the United States, Britain, France, Israel, and Jordan, a Syrian military communication intercepted by Israel's famed Unit 8200 electronic intelligence outfit has been doctored so that it leads a reader to just the opposite conclusion reached by the original report.'

While I am not in a position to establish whether his claim is or is not accurate, an AP report on the same day quoted 'U.S. intelligence officials' explaining that 'an intercept of Syrian military officials discussing the strike was among low-level staff, with no direct evidence tying the attack back to an Assad insider or even a senior Syrian commander'.

(See https://www.salon.com/2013/... )

Meanwhile, Timmerman's claim that 'The doctored report was picked up on Israel's Channel 2 TV on Aug. 24, then by Focus magazine in Germany, the Times of Israel, and eventually by The Cable in Washington, DC' is supported by links to the relevant stories, which say what he claims they say.

Moreover, it seems clear that the 1 September 2013 report was an attempt to counter a – somewhat devastating – critique made in a 31 August post entitled 'The Troodos Conundrum' by the former British Ambassador Craig Murray, who had been closely involved with the facility during his time at the Foreign Office (and has written invaluable material on the Salisbury incident.)

(See https://www.craigmurray.org... .)

Precisely because of the closeness of the GCHQ/NSA collaboration, Murray brought out, there was indeed a major problem explaining why claims about 'SIGINT' had been central to the case made in the 'Government Assessment' released by the White House on 30 August 2013, but not even mentioned in the Joint Intelligence Community 'Assessment' produced two days before.

The answer, Murray suggested, was that the 'intelligence' came from Mossad, and so would not have been automatically shared with the British. But, given the superior capabilities of Troodos, if Mossad had it, the British should have also. So his claims 'meshed' with those by Timmerman and the AP, and the 'Express' report looks like a lame attempt at a cover-up.

Again however, one finds the world is a paradoxical place. As I noted in my SST post, detailed demolitions of the claims about 'SIGINT' in relation to Ghouta were provided both Seymour Hersh, in the 'Whose sarin?' article, and also on the 'Who Attacked Ghouta?' site masterminded by one 'sasa wawa.'

Later, it became clear that this was likely to be the Israeli technology entrepreneur Saar Wilf, a former employee of Unit 8200. So this may – or may not – be an indication of deep divisions within Israeli intelligence.

Between 18 March and 31 April, a fascinating series of posts on the Salisbury incident appeared on the 'Vineyard of the Saker' blog. The author, who used the name 'sushi', was a self-professed IT professsional, who had however obviously acquired an extensive familiarity with 'chemical forensics' and appeared to have some experience of 'SIGINT.'

(See https://thesaker.is/tag/sushi/ .)

In a 14 April post, 'sushi' produced a dismissal of the claims about 'SIGINT' implicating the Russians over the Salisbury incident quite as contemptuous as that which 'sasa wawa' had produced in relation to the claims about it incriminating the Syrian government over Ghouta.

Pointing to the implausibility of the story disseminated by the 'Express', he remarked that:

'It is doubted that any message traffic is processed on Cyprus. It is more likely that the entire take is transmitted back to GCHQ in Cheltenham via a fibre optic link. There exabytes of take are processed, not by a bored flight lieutenant, but by banks of high speed computers.

'Clearly someone in Cheltenham has committed a programming error. Anyone with any knowledge of secret communications knows that the code phrase used to confirm a murder in Salisbury is "small pizza, no anchovies." '

Interestingly, another paper in the 'Express' group made a parallel claim in relation to the Khan Sheikhoun incident to that about the Ghouta incident, but the story was not picked up and may indeed have been suppressed.

On 9 April, the paper published a report headlined 'Brit spies' lead role in Syrian air strikes; RAF BASE IS 'WEAPON.' This claimed that 'within an hour of the airstrike', Troodos had intercepted communications revealing that nerve gas had been used, and had been delivered by jets from the Syrian Arab Air Force's Shayrat Air Base.

(See

View Hide
David Habakkuk , 12 days ago
All,

I was drafting a response to the comment by 'Barbara Ann' – thanks for the link to the recent posts by Adam Carter – before going out. Returning and reading some very interesting comments, I think what I wanted to say has more general relevance.

One reason I am reading so much into 'this Dzerzhinsky thing' is the body of accumulating evidence that people like Tait are part of a system of networks which combine sanctimoniousness, corruption and stupidity in about equal measures. So some more examples may be to the point.

Different cases in which I have taken an interest come together in a post by Tait on the 'Lawfare' site on 13 March, entitled 'U.K. Prime Minister's Speech on the Russian Poisoning of Sergei Skripal: Decoding the Signals.'

(See https://www.lawfareblog.com... .)

In support of the claim that in accusing Russia of a pioneering act of chemical terrorism Theresa May was relying upon accurate analysis from the 'U.K. intelligence community', Tait wrote that:

'May then explained that Skripal was poisoned by a "military-grade nerve agent of a type developed by Russia one of a group of nerve agents known as 'Novichok.'" She is laying out the basic groundwork for the government's attribution to a nation state and, more specifically, Russia. At Porton Down, the U.K. has one of the world's best forensic labs for analyzing chemical, biological and nuclear weapons. With the poisoning of Alexander Litvinenko in 2006, this lab not only established that Polonium-210 was used but also which reactor in Russia it came from.'

In the event, as is by now well know, Boris Johnson's claim that Porton Down scientists had told him that the agent which poisoned the Skripals came from Russia was specifically repudiated by the head of that organisation, Gary Aitkenhead, on 3 April. Our Foreign Secretary told a flagrant lie, and was exposed.

(See https://www.craigmurray.org... .)

As I have shown in previous posts on this site, the 'Inquiry' conducted by Sir Robert Owen into the death of Litvinenko was patently corrupt. Moreover, it seems highly likely that, in fabricating 'evidence' to cover up what actually happened, Christopher Steele was doing a 'dry-run' for the fabrication of material in the dossier published by 'BuzzFeed.'

In fact, however, Owen's report made quite clear that the role of Porton Down was marginal. Furthermore, 'Scientist A1' from the Atomic Weapons Establishment at Aldermaston quite specifically rejected the claim that 'impurity profiling' made it possible to establish that the source of the polonium was the Avangard facility at Sarov, her arguments being accepted by Owen. Either Tait has not bothered to read the report or very much of the coverage, or he is lying.

(For the report, see http://webarchive.nationala... . For some of the mass of evidence which Owen chose to ignore, see my discussions at http://turcopolier.typepad.... ; http://turcopolier.typepad....

What Porton Down did do was to use 'impurity profiling', which can produce 'spectra' identifying even the tiniest traces of substances, to frustrate the attempt to use the 'false flag' attack at Ghouta on 21 August 2013 to inveigle the American and British governments into destroying the Assad 'régime' and handing the country over to jihadists.

It may well be that this display of competence and integrity led to a 'clampdown' at the organisation, which encouraged Boris Johnson to believe he could get away with lying about what its scientists told him.

(See my defence and development of the crucial reporting by Seymour Hersh, at http://turcopolier.typepad.... .)

A general pattern which emerges is that the same small group of 'disinformation peddlers' resurfaces in different contexts – and the pattern whereby 'private security companies' are used to create a spurious impression of independence also recurs.

As I bring out in my piece on Ghouta, two figures who were critical in shaping the 'narrative' acccording to which Syrian government responsibility for the atrocity had been conclusively proved, were Colonel Hamish de Bretton-Gordon, formerly the former commanding officer of the UK Chemical, Biological, Radiological and Nuclear Regiment, and also NATO's Rapid Reaction CBRN Battalion, and Dan Kaszeta.

Immediately after the story of the poisoning of the Skripals on 4 March broke, the same duo reappeared, and have been as critical to shaping the 'narrative' about the later incident as they were to that about the former.

(For the piece by Kaszeta on 'Bellingcat' which introduced the 'Novichok' theme four days later, see https://www.bellingcat.com/... .)

This makes it particular interesting to look at the website of Kaszeta's consultancy, 'Strongpoint Security Limited', in conjunction with the 'Companies House' documentation on the company.

(See http://strongpointsecurity.... ; https://beta.companieshouse... .)

One would have thought from the website that his company was a small, but hardly insignificant, player, in the field of 'physical and operational security.' As it happens, having filed 'Total exemption small company accounts' since its incorporation in May 2011, last December it filed 'Micro company accounts' for the year to 31 May 2017.

With a turnover of £20,000, staff costs of a bit more than half of that, and a profit of £394, we can see that although unlike Matt Tait's, Kaszeta's company did trade, if indeed it was his sole source of income, this pivotal figure in Anglo-American 'disinformation operations' was living on something less than $15,000 a year, at current exchange rates. (Pull the other one, as we say in Britain.)

This is all the more ironic, as the website brings out quite how critical a figure Kaszeta has been in obscuring the truth. From the bio he gives, we learn that having started as a Chemical Officer in the U.S. Army, he worked for 12 years in the White House, dealing with CBRN matters, before moving to Britain in 2008.

Among the articles to which he links on the site, we see his response in 'NOW Lebanon' in December 2013 to Hersh's original 'Whose sarin?' piece on Ghouta, -- in which Kaszeta first introduced the famous 'hexamine hypothesis.'

This – patently preposterous – suggestion that the presence of a single 'impurity' is a 'smoking gun' incriminating the Syrian government has echoed on into the clearly corrupt OPCW documents purporting to demonstrate that it was responsible for the 4 April 2017 Khan Sheikhoun attack.

Of some interest in understanding where Kaszeta he is coming from is what he describes as his 'oldest (and most footnoted on Wikipedia)' piece, which is an article published in 1988 on a site called 'Lituanus', on 'Lithuanian Resistance to Foreign Occupation 1940-52.'

(See http://www.lituanus.org/198... .)

As to Colonel de Bretton-Gordon, it is of interest to look at the attempt to 'finger' the GRU over the Skripal poisoning published under the title 'UK Poisoning Inquiry turns to Russian Agency in Mueller Indictments' in the 'New York Times' last Sunday, and the response by the Russian Embassy in London to a question about it.

(See https://www.nytimes.com/201... ; https://www.rusemb.org.uk/f... .)

The response objects that 'while the British authorities keep concealing all information concerning the investigation into the Salisbury incident, the newspaper has quoted "one former US official familiar with the inquiry".'

It also asserts that that crucial evidence which has not been made available to the Russians – and here, as with Ghouta and Khan Sheikhoun, the results of 'impurity profiling' are critical – appears to have been shared not just with inappropriate Americans, but with all kinds of others.

And indeed, the Embassy is quite right in suggesting that the claim made by the supposed creator of 'Novichok', Vladimir Uglev, to the BBC in April about 'all the spectrum data I was sent recently' has neither been confirmed nor denied. This seems a general pattern – the 'spectra' which may actually be able to provide definitive answers to questions of responsibility are only provided to people who can be relied upon to give the 'right' answers.

The Embassy response also quite fairly refers to a report in the 'Times' also in April, about the 'intelligence' which had been 'used to persuade world leaders that Moscow was behind the poisoning' and that the 'Novichok' had been manufactured at the Shikhany facility at in southwest Russia, which stated that de Bretton-Gordon, 'who had seen the intelligence, called it very compelling.' He has a long history of lying about CW in Syria – so is obviously the right person to lie about them in the UK.

(See https://www.bbc.co.uk/news/... ; https://www.thetimes.co.uk/... .)

It thus becomes interesting to probe into what lies behind the opening of de Bretton-Gordon's entry on the 'Military Speakers' website ('Real Heroes; Real Stories.') According to this, he is 'Chief Operating Office of SecureBio Ltd a commercial company offering CBRN Resilience, consultancy and deployable capabilities.'

(See http://www.militaryspeakers... .)

From 'Companies House', we learn that the liquidation of 'Secure Bio', which started in in June 2015, was concluded in August last year. The really interesting thing about the records, however, is that at the time of the liquidation the company had very large debts, which were written off, of a kind and in a manner which suggested that de Bretton-Gordon's activities may have been largely funded by loans from untraceable sources which were not meant to be repaid.

(See https://beta.companieshouse... – in particular the 'Statement of affairs' dated 30 June 2015.)

Actually, with the 'NYT' report we come full circle. Among those quoted is Mark Galeotti – apparently his admission that he had totally misrepresented the thinking of the Russian General Staff has not him made more cautious about making extravagant claims about its Main Intelligence Directorate (misreported as Main Directorate by the 'NYT.')

Also quoted are two figures who play key roles in Owen's Report – the Soviet era-GRU defector 'Viktor Suvorov' (real name 'Vladimir Rezun') and the former KGB operative Yuri Shvets. Both of these feature prominently in the posts on the Litvinenko affair to which I have linked, and both were key members of the 'information operations' network centred around the late Boris Berezovsky. This now seems to have taken control of American policy, as of British.

The role of 'Suvorov'/Rezun in attempting to defend the interpretations of Stalin's policy put forward by MI6 in the run-up to the Second World War, and those asserted later by General Keitel, and the way he was demolished by the leading American historian of the War in the East, Colonel David Glantz, and the Israeli historian Gabriel Gorodetsky, is too large a subject to go into here.

(For a brief review, see https://networks.h-net.org/... .)

However, it provides further reason to wonder whether the misreadings of Stalin's policy which caused MI6 to give advice to Chamberlain which helped destroy the last chances of preventing the Nazi-Soviet Pact, may still be the 'house view' of that organisation. It was, obviously, the Pact which spelled 'curtains' both for Poland and the Baltics.

Jack -> David Habakkuk , 12 days ago

David

There is a pattern of abuse of formerly well regarded institutions to achieve the propaganda aims of the Deep State establishment. The depths that were plumbed to push the Iraq WMD falsehoods are well known. Yet no one was held to account nor was there any honest accounting of the abuse. There have been pretenses like the Owen inquiry that you note.

We see the same situation of sweeping under the rug malfeasance and even outright criminality through obfuscation and obstruction in the case of the meddling in the 2016 election by top officials in intelligence and law enforcement. Clearly less and less people are buying what the Deep State sells despite their overwhelming control of the media channels.

It seems that we are marching towards a credibility crisis similar to what was experienced in the Soviet Union when no one trusted the contents in Pravda.

What is to be gained by the leadership in Britain in promoting these biological weapons cases since Litvinenko? In the US it is quite apparent that the Deep State have become extremely powerful and the likelihood that Trump recognizes that resistance is futile is very high. Schumer may be proven right that they have six ways from Sunday to make you kowtow to their dictats.

[Jul 20, 2018] The Day That Guccifer 2.0 Quit Hacking The DNC

So the DNC announced Russia hacked them, and "proved" it with a file they say was stolen. But that file was not the DNC's. So the "proof" of Russia hacking the DNC is nonexistent.
Notable quotes:
"... they cite an anonymous former DNC official who asserts that Guccifer 2.0's first document (the Trump opposition report) did not originate in the DNC as initially reported. ..."
"... The importance of this contradiction, combined with earlier allegations of hacking the DNC made by Guccifer 2.0, cannot be overstated. ..."
"... " There were signs of dishonesty from the start. The first document Guccifer 2.0 published on June 15 came not from the DNC as advertised but from Podesta's inbox, according to a former DNC official who spoke on condition of anonymity because he was not authorized to speak to the press." ..."
"... By classifying Guccifer 2.0's claim to have obtained the Trump Opposition Report through a breach of the DNC as a sign of dishonesty, the Associated Press uses the Guccifer 2.0 persona's widely held claim as an example of contradiction with their new version of the 'official' Russian hacking narrative. In so doing, the AP makes the hacking allegations entirely nebulous: a fantasy narrative that can be neither proven nor disproven but easily edited and rearranged when convenient. Incredibly, the AP's article also contradicts the claims made by the DNC themselves, and so-called papers of record, including the Washington Post. ..."
"... [Fancy Bear] broke into the network in late April and targeted the opposition research files. It was this breach that set off the alarm. The hackers stole two files,[Shawn] Henry said." ..."
"... "Investigators would have been able to rapidly determine if there were textual differences between Guccifer 2.0's document and the DNC's. If there were no textual differences, an initial determination might have been difficult, because Guccifer 2.0 went to some trouble to obscure internal metadata, known as Revision Save ID's (RSID's), which can be used to uniquely identify sections of text that have been changed and added into a Word document. However, when the Podesta emails were published in October 2016, investigators should have been able to source Guccifer 2.0's document to the Podesta emails quickly. They would have been able to do this before the 2016 election, a full year ahead of the AP report." [Emphasis Added] ..."
"... Ultimately, it is the DNC's claim that they were breached by Russian hackers, who stole the Trump opposition report, which directly belies their allegation - because the document did not come from the DNC, but from John Podesta's emails. ..."
"... What is interesting here is that the AP admits that such elements of the document's publication had been fabricated, but did not then follow that realization by questioning other possibly fabricated elements of the documents, such as the Russian-language error messages. The AP certainly did not concern themselves with why a Russian state-sponsored hacker would benefit from airbrushing "confidential" onto such a report. Their claim that it was to attract media attention seems quite weak. ..."
"... AP surmised that Guccifer 2.0 "air-brush[ed]" the word "confidential" into the document to "catch the reporter's attention." Both Carter and the Forensicator have explained that Guccifer 2.0 used a complex process, involving an intermediate template document, to inject this "alluring" fake. The Forensicator told this author that they take the position that this intermediate template file (ostensibly needed to add "CONFIDENTIAL" to the document) had an additional purpose. ..."
"... The Forensicator explained that, for some readers and researchers, the copy/paste of an intermediate (RTF) copy of the Trump opposition report into a template document might be interpreted simply as an unconventional method for injecting "confidential" into 1.doc. However, the Forensicator added, it can also be interpreted as a "cover" for the final copy/paste operation which was a necessary step in the evolution of Guccifer 2.0's first document. It was needed to embed the Russian error messages into the final document (1.doc). ..."
"... In their full analysis, the Forensicator wrote that it was surprising that neither outlet reported on the easily viewed "Last Saved By" property, which listed "Феликс Эдмундович" (aka "Iron Felix") as the user who last saved the document. This unique name was noticed by various social media observers that same day and by Ars Technica the following day. How did the journalists miss this, and why? ..."
"... Both Gawker and The Smoking Gun published Guccifer 2.0's Trump opposition report in full as a PDF file. Their PDF files have the now infamous Cyrillic error messages in them; they appear in the last few pages of their PDF files. Ars Technica dubbed these error messages, "Russian fingerprints." ..."
"... Ars Technica reported on Guccifer 2.0's publication of the Trump Opposition Report the day after Guccifer 2.0 arrived on the scene. They quickly noted that there were Russian language error messages in the PDF file posted by Gawker. They also noticed that when they viewed 1.doc themselves, they didn't see the Russian error messages. The Forensicator told Disobedient Media that this was because Ars Technica used Word for Windows, which displayed the error messages in English. ..."
"... So the DNC announced Russia hacked them, and "proved" it with a file they say was stolen.But that file was not the DNC's. So the "proof" of Russia hacking the DNC is nonexistent. ..."
May 23, 2018 | www.zerohedge.com

Disobedient Media recently reported on discoveries made by the Forensicator in their report, Media Mishaps: Early Guccifer 2 Coverage . In our previous coverage of the Forensicator's work, we discussed the essential role played by the media in ensuring that the Guccifer 2.0 persona received wide recognition by successfully linking Guccifer 2.0's documents with the DNC's claims that Russian state-sponsored hackers had breached their servers.

This report will focus on an unreported story: After the fact, the DNC quietly changed an important theme in their Russian hacking narrative. Initially, the DNC passively supported the notion that Guccifer 2.0 stole a copy of a Trump opposition report by penetrating the DNC at the behest of the Russian state. Then over a year later, an un-named ex-DNC official tells us that this document in fact came from Podesta's emails, not the DNC. This single statement by a DNC official invalidated the circumstantial evidence that had been used to support the DNC's Russian hacking claims, and represents a groundbreaking contradiction that has gone unobserved by establishment press outlets.

This report will also discuss numerous mistakes made by various legacy press outlets in their obsessive focus on the Russian hacking narrative and their rush to judgment in the matter.

A Late (and Quiet) Change in the DNC Russian Hacking Narrative

In November 2017, the DNC changed their Russian hacking narrative via their proxies in the legacy media. The Associated Press published, Inside story: How Russians hacked the Democrats' emails ; they cite an anonymous former DNC official who asserts that Guccifer 2.0's first document (the Trump opposition report) did not originate in the DNC as initially reported.

The importance of this contradiction, combined with earlier allegations of hacking the DNC made by Guccifer 2.0, cannot be overstated.

The Associated Press wrote in November 2017:

" There were signs of dishonesty from the start. The first document Guccifer 2.0 published on June 15 came not from the DNC as advertised but from Podesta's inbox, according to a former DNC official who spoke on condition of anonymity because he was not authorized to speak to the press."

By classifying Guccifer 2.0's claim to have obtained the Trump Opposition Report through a breach of the DNC as a sign of dishonesty, the Associated Press uses the Guccifer 2.0 persona's widely held claim as an example of contradiction with their new version of the 'official' Russian hacking narrative. In so doing, the AP makes the hacking allegations entirely nebulous: a fantasy narrative that can be neither proven nor disproven but easily edited and rearranged when convenient. Incredibly, the AP's article also contradicts the claims made by the DNC themselves, and so-called papers of record, including the Washington Post.

By returning to the genesis of the Russian hacking narrative, we find that the AP's November report runs contrary to the DNC's initial claims, as reported by The Washington Post , in an article titled, Russian Government Hackers Penetrated DNC, Stole Opposition Research On Trump . When reviewing this early history of the matter, it becomes clear that it is logically impossible to separate the Guccifer 2.0 persona from the allegations of a Kremlin-backed hack of the DNC. Critical statements in that initial report by the Washington Post are highlighted below for emphasis:

"Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP Presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach

[Fancy Bear] broke into the network in late April and targeted the opposition research files. It was this breach that set off the alarm. The hackers stole two files,[Shawn] Henry said."

By taking this later (2017) stance, the Associated Press contradicts the "official" Russian hacking narrative involving Guccifer 2.0 (as implied by the DNC's own security firm) and which had, until that point, been characterized by the corporate press as Russian-hacking-gospel-truth. By seamlessly excising Guccifer 2.0 from culpability within a new timeline of events, the Associated Press makes the entire hacking story a fantasy narrative that can be neither proven nor disproven but must not be questioned.

The Forensicator explained to Disobedient Media:

"Investigators would have been able to rapidly determine if there were textual differences between Guccifer 2.0's document and the DNC's. If there were no textual differences, an initial determination might have been difficult, because Guccifer 2.0 went to some trouble to obscure internal metadata, known as Revision Save ID's (RSID's), which can be used to uniquely identify sections of text that have been changed and added into a Word document. However, when the Podesta emails were published in October 2016, investigators should have been able to source Guccifer 2.0's document to the Podesta emails quickly. They would have been able to do this before the 2016 election, a full year ahead of the AP report." [Emphasis Added]

The Forensicator then referred this author to a table in his report, depicting the metadata for Podesta's version of the Trump opposition report:

As we can see, the document was saved by Tony Carrk, who worked as Research Director for Hillary for America at the time. This document was attached to this Podesta email .

The Forensicator continued, saying: "We can see that Mr. Carrk made some change that took less than one minute to complete. If investigators compared Carrk's version of the document to the original DNC document, they should have been able to quickly determine that Guccifer 2's document is sourced from Podesta's emails and not directly from the DNC. For this, an RSID correlation would have probably been telling."

Why did the DNC, their security consultant firm Crowdstrike, and government investigators wait so long to tell us that Guccifer 2.0 did not obtain their copy of the Trump opposition report directly from the DNC? Why did Crowdstrike tell the Washington Post that the opposition report files had been stolen specifically from the DNC network if that were not the case?

The legacy press chorus had initially linked Guccifer 2.0's first document, and the "Russian fingerprints" therein to the Trump opposition report that the DNC claimed to have been stolen by Russian state-sponsored hackers. What prompted them to change their story, contradicting not only Guccifer 2.0 but the DNC themselves? Should we now assess the DNC's claim that the document had been taken by Russian hackers to be untrue?

Ultimately, it is the DNC's claim that they were breached by Russian hackers, who stole the Trump opposition report, which directly belies their allegation - because the document did not come from the DNC, but from John Podesta's emails.

Is it possible that Mueller's investigation may have taken a closer look into the origin of Guccifer 2.0's initial document, realizing that it was sourced from Podesta's email? The DNC and government investigators may have then decided that the best way to obscure the resulting contradictory evidence was by letting it quietly leak via a "former DNC official who spoke on the condition of anonymity," in the November 2017 article published by the Associated Press.

Given the repeated contradictions from the DNC and corporate media in their description of Russian interference in the 2016 US Presidential race, how can the public be expected to believe that their other claims have any legitimacy whatsoever?

The AP's November 2017 article also noticed that Guccifer 2.0's first published document contained the word CONFIDENTIAL, while the original document did not. This was old news to anyone who had been paying attention; Adam Carter analyzed this artifact nine months earlier:

What is interesting here is that the AP admits that such elements of the document's publication had been fabricated, but did not then follow that realization by questioning other possibly fabricated elements of the documents, such as the Russian-language error messages. The AP certainly did not concern themselves with why a Russian state-sponsored hacker would benefit from airbrushing "confidential" onto such a report. Their claim that it was to attract media attention seems quite weak.

AP surmised that Guccifer 2.0 "air-brush[ed]" the word "confidential" into the document to "catch the reporter's attention." Both Carter and the Forensicator have explained that Guccifer 2.0 used a complex process, involving an intermediate template document, to inject this "alluring" fake. The Forensicator told this author that they take the position that this intermediate template file (ostensibly needed to add "CONFIDENTIAL" to the document) had an additional purpose.

The Forensicator explained that, for some readers and researchers, the copy/paste of an intermediate (RTF) copy of the Trump opposition report into a template document might be interpreted simply as an unconventional method for injecting "confidential" into 1.doc. However, the Forensicator added, it can also be interpreted as a "cover" for the final copy/paste operation which was a necessary step in the evolution of Guccifer 2.0's first document. It was needed to embed the Russian error messages into the final document (1.doc).

Once again, establishment media failed to pursue their cited evidence with due diligence. This is a grave mistake, especially given the way in which Guccifer 2.0's alleged 'hacking' has been used as a major bolstering point for increased tensions between the United States and Russia.

Initially, Gawker and The Smoking Gun Didn't Notice Iron Felix

Guccifer 2.0 made his noisy debut on June 15, 2016 (the day after the DNC publicly claimed it had been breached by Russian state-sponsored hackers). It also appears that Guccifer 2.0 gave advanced copies of their doctored version of the Trump opposition report to two media outlets, The Smoking Gun and Gawker.

In their full analysis, the Forensicator wrote that it was surprising that neither outlet reported on the easily viewed "Last Saved By" property, which listed "Феликс Эдмундович" (aka "Iron Felix") as the user who last saved the document. This unique name was noticed by various social media observers that same day and by Ars Technica the following day. How did the journalists miss this, and why?

Initially, Gawker and The Smoking Gun Didn't Notice the Russian Error Messages

Both Gawker and The Smoking Gun published Guccifer 2.0's Trump opposition report in full as a PDF file. Their PDF files have the now infamous Cyrillic error messages in them; they appear in the last few pages of their PDF files. Ars Technica dubbed these error messages, "Russian fingerprints."

Although both outlets reviewed this document in some detail, neither outlet noticed the Russian error messages in their first reports. The Forensicator suggests that, given their choice of word processing applications, they would have seen the Russian error messages, if only they had viewed the last few pages of each file. That is, unless (perhaps) they received their PDF's directly from Guccifer 2.0 or another third party and they just passed them along.

Ars Technica was Confused When They Didn't See the Russian Error Messages in Guccifer 2.0's Word Document

Ars Technica reported on Guccifer 2.0's publication of the Trump Opposition Report the day after Guccifer 2.0 arrived on the scene. They quickly noted that there were Russian language error messages in the PDF file posted by Gawker. They also noticed that when they viewed 1.doc themselves, they didn't see the Russian error messages. The Forensicator told Disobedient Media that this was because Ars Technica used Word for Windows, which displayed the error messages in English.

Ars Technica suggested that The Smoking Gun's PDF may have been generated by Guccifer 2.0 on a system that had Russian language settings enabled.

While this explanation appears reasonable, it is surprising (if that was the case) that Gawker didn't tell us that their PDF came directly from Guccifer 2.0 . The Smoking Gun also published a PDF with Russian error messages in it. Are we to believe that The Smoking Gun also received their PDF from Guccifer 2.0 or a third party, and failed to report on this fact?

IVN: Did Gawker Outsource Their Analysis to Russia?

An obscure media outlet, Independent Voter Network , raised various theories on the initial reporting done by The Smoking Gun and Gawker. One of their wilder theories suggested that Gawker had outsourced their analysis to a Russian sub-contractor. The Forensicator evaluated that claim, ultimately concluding that Independent Voter Network had gone on a wild goose chase because the "clue" they followed pointed to Gawker's document management service known as "DocumentCloud." DocumentCloud uses a technology that they call "CloudCrowd," which is what IVN saw in the PDF that Gawker uploaded. The Forensicator referred to a DocumentCloud job advertisement for confirmation of his conclusion.

The Forensicator told Disobedient Media: "We found CloudCrowd; it is not an outsourcing company. Probably not Russian, either."

Business Insider: Did Guccifer 2.0 Photoshop "Confidential" Into his Document Screenshots?

When Business Insider noted the presence of "CONFIDENTIAL" in Guccifer 2.0's document, they claimed that Guccifer 2.0 might have "photoshopped" his screenshots (placed on his blog site) to create the watermark and page footer with "confidential" in them.

The Forensicator countered that claim by pointing out that the Business Insider journalist likely viewed the document with "Full-Screen Reading" selected.

This mode will disable the display of the watermark and page headers and footers when viewed by the journalist, but they will be displayed when printed to PDF. No Photoshop required.

Conclusion

The close timing of the DNC announcement and Guccifer 2.0's publication of the Trump report, as well as reports of "Russian fingerprints" in those documents, created a strong link between Guccifer 2.0 and the Russian hackers who allegedly stole DNC files. Over a year later, the Associated Press tells us that this first narrative was wrong, contradicting the DNC's claims as well as much of the early legacy press reports on the issue. Must we concurrently accept the narrative that Russians hacked the DNC if claims that they had done so were not only based on flimsy evidence but have now been contradicted completely?

As far as documented evidence of election interference goes, one does not have to stray far from the actors in the Russian hacking saga to discover that the DNC and establishment Democrats were, instead of victims of meddling, the perpetrators of such abuse of the American Democratic process. In 2017 the NYC Board of Elections admitted that it had illegally purged hundreds of thousands of Democratic voters from the election roles, preventing them from voting in the 2016 Democratic primaries. This abuse of power represents just one in a constellation of legitimate examples of abuse that took place at the hands of corporatized Democrats in order to unfairly and illegally ensure a Clinton nomination.


GunnyG Wed, 05/23/2018 - 18:28 Permalink

Podesta the Molesta gets the Vince Foster invitation to jog at Fort Marcy Park very soon.

honest injun Wed, 05/23/2018 - 18:57 Permalink

This is too complicated for the average demon rat nitwit to follow. They don't want to know this so showing them facts has to be dumbed down. Otherwise, all new revelations will be ignored.

DrLucindaX Wed, 05/23/2018 - 19:10 Permalink

Really good work and reporting here that will never be understood by the masses. Everything that's going on is far too complex, too many moving parts, too much compartmentalization. Trump is doing a good job dumbing it down.

Justapleb Wed, 05/23/2018 - 19:54 Permalink

So the DNC announced Russia hacked them, and "proved" it with a file they say was stolen.But that file was not the DNC's. So the "proof" of Russia hacking the DNC is nonexistent.

Gotta dumb it down.

[Jul 20, 2018] A comment from Spooks Spooking Themselves

Notable quotes:
"... Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA: https://disobedientmedia.com/2018/05/guccifer-2-0s-american-fingerprints-reveal-an-operation-made-in-the-usa/ ..."
"... Sez who, ask I? Sez the trustworthy American media that would never lie to the public, sez they. You know, professional paragons of virtue like Rachel Maddow and her merry band. ..."
"... These old pols recognise a good demonizing when they see it, especially when directed at them. ..."
"... our democracy WAS hijacked, but it was NOT by the Russians. ..."
Jun 09, 2018 | consortiumnews.com

Paul E. Merrell, J.D. , May 31, 2018 at 4:53 am

Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA: https://disobedientmedia.com/2018/05/guccifer-2-0s-american-fingerprints-reveal-an-operation-made-in-the-usa/

Realist , May 31, 2018 at 9:21 am

Unfortunately, what this guy says is what most Americans still seem to believe. When I ask people what is the actual hard evidence for "Russiagate" (because I don't know of any that has been corroborated), I get a response that there have been massive examples of Russian hacks, Russian posts, tweets and internet adverts–all meant to sabotage Hillary's candidacy, and very effective, mind you. Putin has been an evil genius worthy of a comic book villain (to date myself, a regular Lex Luthor). Sez who, ask I? Sez the trustworthy American media that would never lie to the public, sez they. You know, professional paragons of virtue like Rachel Maddow and her merry band.

Nobody seems aware of the recent findings about Halpern, none seem to have a realistic handle on the miniscule scope of the Russian "offenses" against American democracy. Rachel, the NY Times and WaPo have seen to that with their sins of both commission and omission. Even the Republican party is doing a half-hearted job of defending its own power base with rigorous and openly disseminated fact checking. It's like even many of the committee chairs with long seniority are reluctant to buck the conventional narrative peddled by the media. Many have chosen to retire rather than fight the media and the Deep State. What's a better interpretation of events? Or is one to believe that the silent voices, curious retirements and political heat generated by the Dems, the prosecutors and the media are all independent variables with no connections? These old pols recognise a good demonizing when they see it, especially when directed at them.

Personally, I think that not only the GOPers should be fighting like the devil to expose the truth (which should benefit them in this circumstance) but so should the media and all the watchdog agencies (ngo's) out there because our democracy WAS hijacked, but it was NOT by the Russians.

Worse than that, it was done by internal domestic enemies of the people who must be outed and punished to save the constitution and the republic, if it is not too late. All the misinformation by influential insiders and the purported purveyors of truth accompanied by the deliberate silence by those who should be chirping like birds suggests it may well be far too late.

[Jul 20, 2018] So many (ex-) MI6 operators (Steele, Tait, etc) involved in the story. It is interesting that the media don t question the intense involvement of the British in all this. And of course, the British haven t been laggards in adding fuel to the fire by the whole novichok hoax

Highly recommended!
So British were involved in fabricating of 'Guccifer 2.0' persona. Nice...
Notable quotes:
"... It was Matt Tait who, using the 'Twitter' handle @pwnallthethings, identified the name and patronymic of Dzerzhinsky in the 'metadata' of the 'Guccifer 2.0' material on 15 June 2016, the day after Ellen Nakashima first disseminated the BS from 'CrowdStrike' in the 'WP.' ..."
"... 'Matt Tait is a senior cybersecurity fellow at the Robert S. Strauss Center for International Security and Law at the University of Texas at Austin. Previously he was CEO of Capital Alpha Security, a consultancy in the UK, worked at Google Project Zero, was a principal security consultant for iSEC Partners, and NGS Secure, and worked as an information security specialist for GCHQ.' ..."
"... As I have noted before on SST, a cursory examination of records at 'Companies House' establishes that 'Capital Alpha Security', which was supposed to have provided Tait with an – independent – source of income at the time he unearthed this 'smoking gun' incriminating the GRU, never did any business at all. So, a question arises: how was Tait making ends meet at that time: busking on the London underground, perhaps? ..."
"... The document, when available, may clarify a few loose ends, but the general picture seems clear. Last November, Tait filed 'dormant company accounts' for the company's first year in existence, up until February 2017. One can only do this if one has absolutely no revenue, and absolutely no expenditure. Not even the smallest contract to sort out malware on someone's computer, or to buy equipment for the office. ..."
"... He then failed to file the 'Confirmation statement', which every company must is legally obliged to produce annually, if it is not to be struck off. This failure led to a 'First Gazette notice for compulsory strike-off' in May. ..."
"... However, Tait may well anticipate that there is there will never be any call for him to go back into the big wide world, as the large organisation in which he has now found employment is part of a 'Borgist' network. So much is evident from another entry on the 'Lawfare' site: ..."
"... Also relevant here is the fact that, rather transparently, this placing of the GRU centre stage is bound up with the attempt to suggest that there is some kind of 'Gerasimov doctrine', designed to undermine the West by 'hybrid warfare.' Unfortunately, the original author of this claptrap, Mark Galeotti, who, I regret to say, is, like Tait, British, has now recanted and confessed. In March, he published a piece on the 'Foreign Policy' site, under the title: 'I'm Sorry for Creating the 'Gerasimov Doctrine'; I was the first to write about Russia's infamous high-tech military strategy. One small problem: it doesn't exist.' ..."
"... Quite clearly, the 'Guccifer 2.0' persona is a crude fabrication by someone who has absolutely no understanding of, or indeed interest in, the bitter complexities of both of the history of Russia and of the 'borderlands', not only in the Soviet period but before and after. ..."
"... Jeffrey Carr is one of the latter, and his familiarity with intelligence matters is clear from his organization of the annual "Suits and Spooks" Conference. I believe he was the first to raise questions about the DNC hack which didn't pass his smell test. ..."
"... One quick way to know their bias is the AC test. Google their name plus "Atlantic Council". Ridd fails badly. ..."
"... The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues. The Guccifer 2.0 metadata was analyzed for its transmission speed, and based on the internet speeds to and from numerous test locations abroad and in the U.S., it was determined to have been impossible for the so-called Guccifer 2.0 to have hacked the DNC computers over the internet. The transmission speed however did correspond to the speed of the transfer to a thumb drive. Additionally, it was found that the data had been manipulated and split into two parts to simulate a July and a September transfer, when in fact the parts merge perfectly as single file, and where, according to Binney, the probability of the split being a coincidence would be 100 to the 50th power. ..."
"... There is a pattern of abuse of formerly well regarded institutions to achieve the propaganda aims of the Deep State establishment. The depths that were plumbed to push the Iraq WMD falsehoods are well known. Yet no one was held to account nor was there any honest accounting of the abuse. There have been pretenses like the Owen inquiry that you note. ..."
"... It seems that we are marching towards a credibility crisis similar to what was experienced in the Soviet Union when no one trusted the contents in Pravda. ..."
"... What is to be gained by the leadership in Britain in promoting these biological weapons cases since Litvinenko? In the US it is quite apparent that the Deep State have become extremely powerful and the likelihood that Trump recognizes that resistance is futile is very high. Schumer may be proven right that they have six ways from Sunday to make you kowtow to their dictats. ..."
"... I agree that taken by itself, the Dzerzinsky thing would be an anomaly only and could be dismissed as "black humor" of a kind often found in hackers. However, taken with all the other evidence produced by Adam Carter, it becomes much more obviously an attempt to support a false flag "Russian hacker" narrative that otherwise is porous. ..."
"... You want us to believe that the GRU are so sloppy and so inexperienced that they would launch a hack on the DNC and not take every measure to ensure there was no link whatsoever to anything Russian? Any former intel officer worth a damn knows that an operation to disrupt the election in a country the size of the United States would start with a risk/reward assessment, would require a team of at least 100 persons and would not be writing any code that could in any way be traced to Russia. ..."
"... Doctrine-mongering and repeating birth of new faux-academic "entities", such as a "hybrid war" (any war is hybrid by definition), is a distinct feature of the Western "political science-military history" establishment. Galeotti, who for some strange reason passes as Russia "expert" is a perfect example of such "expertise" and doctrine-mongering. Military professionals largely met this "hybrid warfare" BS with disdain. ..."
"... I have to say that the more I look into this whole Russiagate affair, which is mostly in the minds of democrats (and a few republicans) and the MSM, the more it seems that there is indeed a foreign conspiracy to meddle in the internal affairs of the US (and in the presidential elections) but the meddling entity is not Russia. It is the British! ..."
"... So many (ex-) MI6 operators (Steele, Tait, etc) involved in the story. It is interesting that the media don't question the intense involvement of the British in all this. And of course, the British haven't been laggards in adding fuel to the fire by the whole novichok hoax. ..."
Jul 20, 2018 | turcopolier.typepad.com

As some commenters on SST seem still to have difficulty grasping that the presence of 'metadata' alluding to 'Iron Felix' in the 'Guccifer 2.0' material is strong evidence that the GRU were being framed over a leak, rather than that they were responsible for a hack, an update on the British end of the conspiracy seems in order.

If you look at the 'Lawfare' blog, in which a key figure is James Comey's crony Benjamin Wittes, you will find a long piece published last Friday, entitled 'Russia Indictment 2.0: What to Make of Mueller's Hacking Indictment.'

Among the authors, in addition to Wittes himself, is the sometime GCHQ employee Matt Tait. It appears that the former head of that organisation, the Blairite 'trusty' Robert Hannigan, who must know where a good few skeletons are buried, is a figure of some moment in the conspiracy.

(See https://www.lawfareblog.com... .)

It was Matt Tait who, using the 'Twitter' handle @pwnallthethings, identified the name and patronymic of Dzerzhinsky in the 'metadata' of the 'Guccifer 2.0' material on 15 June 2016, the day after Ellen Nakashima first disseminated the BS from 'CrowdStrike' in the 'WP.'

The story was picked up the following day in a report on the 'Ars Technica' site, and Tait's own account appeared on the 'Lawfare' site, to which he has been a regular contributor, on 28 July.

(See https://arstechnica.com/inf... ; https://www.lawfareblog.com... .)

According to the CV provided in conjunction with the new article:

'Matt Tait is a senior cybersecurity fellow at the Robert S. Strauss Center for International Security and Law at the University of Texas at Austin. Previously he was CEO of Capital Alpha Security, a consultancy in the UK, worked at Google Project Zero, was a principal security consultant for iSEC Partners, and NGS Secure, and worked as an information security specialist for GCHQ.'

As I have noted before on SST, a cursory examination of records at 'Companies House' establishes that 'Capital Alpha Security', which was supposed to have provided Tait with an – independent – source of income at the time he unearthed this 'smoking gun' incriminating the GRU, never did any business at all. So, a question arises: how was Tait making ends meet at that time: busking on the London underground, perhaps?

(See https://beta.companieshouse... .)

Actually, there has been a recent update in the records. Somewhat prematurely perhaps, there is an entry dated 24 July 2018, entitled 'Final Gazette dissolved via compulsory strike-off. This document is being processed and will be available in 5 days.'

The document, when available, may clarify a few loose ends, but the general picture seems clear. Last November, Tait filed 'dormant company accounts' for the company's first year in existence, up until February 2017. One can only do this if one has absolutely no revenue, and absolutely no expenditure. Not even the smallest contract to sort out malware on someone's computer, or to buy equipment for the office.

He then failed to file the 'Confirmation statement', which every company must is legally obliged to produce annually, if it is not to be struck off. This failure led to a 'First Gazette notice for compulsory strike-off' in May.

It is, of course, possible that at the time Tait set up the company he was genuinely intending to try to make a go of a consultancy, and simply got sidetracked by other opportunities.

However – speaking from experience – people who have set up small 'one man band' companies to market skills learnt in large organisations, and then go back into such organisations, commonly think it worth their while to spend the minimal amount of time required to file the documentation required to keep the company alive.

If one sees any realistic prospect that one may either want to or need to go back into the big wide world again, this is the sensible course of action: particularly now when, with the internet, filing the relevant documentation takes about half an hour a year, and costs a trivial sum.

However, Tait may well anticipate that there is there will never be any call for him to go back into the big wide world, as the large organisation in which he has now found employment is part of a 'Borgist' network. So much is evident from another entry on the 'Lawfare' site:

'Bobby Chesney is the Charles I. Francis Professor in Law and Associate Dean for Academic Affairs at the University of Texas School of Law. He also serves as the Director of UT-Austin's interdisciplinary research center the Robert S. Strauss Center for International Security and Law. His scholarship encompasses a wide range of issues relating to national security and the law, including detention, targeting, prosecution, covert action, and the state secrets privilege; most of it is posted here. Along with Ben Wittes and Jack Goldsmith, he is one of the co-founders of the blog.'

(See https://www.lawfareblog.com... .)

Also relevant here is the fact that, rather transparently, this placing of the GRU centre stage is bound up with the attempt to suggest that there is some kind of 'Gerasimov doctrine', designed to undermine the West by 'hybrid warfare.' Unfortunately, the original author of this claptrap, Mark Galeotti, who, I regret to say, is, like Tait, British, has now recanted and confessed. In March, he published a piece on the 'Foreign Policy' site, under the title: 'I'm Sorry for Creating the 'Gerasimov Doctrine'; I was the first to write about Russia's infamous high-tech military strategy. One small problem: it doesn't exist.'

(See https://foreignpolicy.com/2... .)

If anyone wants to grasp what the Chief of the General Staff of the Armed Forces of the Russian Federation, General Valery Gerasimov, was actually saying in the crucial February 2013 article which Galeotti was discussing, and how his thinking has developed subsequently, the place to look is, as so often, the Foreign Military Studies Office at Fort Leavenworth.

Informed discussions by Charles Bartles and Roger McDermott are at https://www.armyupress.army... ; http://www.worldinwar.eu/wp... ; and https://jamestown.org/progr... .

In relation to the ongoing attempt to frame the GRU, it is material that, in his 2013 piece, Gerasimov harks back to two pivotal figures in the arguments of the interwar years. Of these, Georgy Isserson, the Jewish doctor's son from Kaunas who became a Civil War 'political commissar' and then a key associate of Mikhail Tukhachevsky, was the great pioneer theorist of 'deep operations.'

The ideas of the other, Aleksandr Svechin, the former Tsarist 'genstabist', born in Odessa into an ethnically Russian military family, who was the key opponent of Tukhachevky and Isserson in the arguments of the 'Twenties, provided key parts of the intellectual basis of the Gorbachev-era 'new thinking.'

The 'Ars Technica' article in which Tait's claims were initially disseminated opened:

'We still don't know who he is or whether he works for the Russian government, but one thing is for sure: Guccifer 2.0 – the nom de guerre of the person claiming he hacked the Democratic National Committee and published hundreds of pages that appeared to prove it – left behind fingerprints implicating a Russian-speaking person with a nostalgia for the country's lost Soviet era.'

In his 2013 article, Gerasimov harks back to the catastrophe which overcame the Red Army in June 1941. Ironically, this was the product of the Stalinist leadership's disregard of the cautions produced not only by Svechin, but by Isserson. In regard to the latter, the article remarks that:

'The fate of this "prophet of the Fatherland" unfolded tragically. Our country paid in great quantities of blood for not listening to the conclusions of this professor of the General Staff Academy.'

As it happens, while both Svechin and Tukhachevsky were shot by the heirs of 'Felix Edmundovich', the sentence of death on Isserson was commuted, and he spent the war in prison and labour camps, while others used his ideas to devastating effect against the Germans.

Quite clearly, the 'Guccifer 2.0' persona is a crude fabrication by someone who has absolutely no understanding of, or indeed interest in, the bitter complexities of both of the history of Russia and of the 'borderlands', not only in the Soviet period but before and after.

Using this criterion as a 'filter', the obvious candidates are traditional Anglo-Saxon 'Russophobes', like Sir Richard Dearlove and Christopher Steele, or the 'insulted and injured' of the erstwhile Russian and Soviet empires, so many of them from the 'borderlands', of the type of Victoria Nuland, or the various Poles, Ukrainians and Balts and Jews who have had so much influence on American policy.

(I should note that other Jews, not only in Russia, but outside, including in Israel, think quite differently, in particular as they are very well aware, as Isserson would have been, of the extent to which 'borderlands' nationalists were enthusiastic collaborators with the Germans in the 'Final Solution'. On this, there is a large and growing academic literature.)

It is not particularly surprising that many of the victims of the Russian and Soviet empires have enjoyed seeing the tables turned, and getting their own back. But it is rather far from clear that this makes for good intelligence or sound policy. We were unable to load Disqus. If you are a moderator please see our troubleshooting guide .


blue peacock , 2 days ago
How does the objective truth get disclosed in an environment of extreme deceit by so many parties?

How to trust western intelligence when they have such a long and sordid track record of deceit, lies and propaganda? At the same time there is such a long history of Russian and Chinese intelligence and information operations against the west.

Then there is the nexus among the highest levels of US law enforcement and intelligence as well as political elites in both parties and key individuals in the media complex.

We are living in a hall of mirrors and it seems the trend is towards confirmation bias in information consumption.

richardstevenhack , 2 days ago
Excellent post, especially the debunking of the 'Gerasimov doctrine' which I always thought was more hand-waving and Russian mind-reading.

It's important to realize that there are a number of people in the infosec community who have biases against Russia, just as there are in the general population. Then there are more cautious people, who recognize the difficulty in attributing a hack to any specific person absent solid, incontrovertible, non-circumstantial and non-spoofable (and preferably offline) evidence.

Tait doesn't appear to be one of the latter. Thomas Rid would be another. There are others.

Jeffrey Carr is one of the latter, and his familiarity with intelligence matters is clear from his organization of the annual "Suits and Spooks" Conference. I believe he was the first to raise questions about the DNC hack which didn't pass his smell test.

There are also a number of companies in infosec who rely on latching onto a particular strain of hacker, the more publicly exploitable for PR purposes the better, as a means of keeping the company name in front of potential high-profile and highly billable clients. CrowdStrike and its Russia obsession isn't the only one that's been tagged with that propensity.

Mandiant could be referred to as the "Chinese, all the time" company, for example. Richard Bejtlich was at Fireeye and the became Chief Security Officer when they acquired Mandiant. He spent quite a bit of effort on his blog warning about the Chinese military buildup as a huge threat to the US. He's former USAF so perhaps that's not surprising.

Bottom line: Confirmation bias is a real thing.

David Blake -> richardstevenhack , 5 hours ago
One quick way to know their bias is the AC test. Google their name plus "Atlantic Council". Ridd fails badly.
Barbara Ann , 2 days ago
Glad David's comment has been reproduced as a post in its own right, this is a critically important topic. IMO Matt Tait plays the role of midwife in this conspiracy. His Twitter thread

View Hide

mlnw , 2 days ago
The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues. The Guccifer 2.0 metadata was analyzed for its transmission speed, and based on the internet speeds to and from numerous test locations abroad and in the U.S., it was determined to have been impossible for the so-called Guccifer 2.0 to have hacked the DNC computers over the internet. The transmission speed however did correspond to the speed of the transfer to a thumb drive. Additionally, it was found that the data had been manipulated and split into two parts to simulate a July and a September transfer, when in fact the parts merge perfectly as single file, and where, according to Binney, the probability of the split being a coincidence would be 100 to the 50th power.

As for the crude trace fingerprints (e.g. the referencing of Dzerzinsky), one of the Wikileaks data dumps (Vault 7 Marble) during a period when Assange was negotiating with the Administration - there were two at the time (Vault 7 Marble and Vault 7 Grasshopper), the release of which apparently enraged Mike Pompeo- was designed to obfuscate, fabricate and frame countries such as Russia, Iran or North Korea by pretending to be the target country, including in the use of target's alphabet and language.

VIPs has written numerous articles on this in Consortium News. See also the report by Patrick Lawrence Smith in The Nation at: https://www.thenation.com/a... . (It was apparently so hot at the time- and disputed by several other VIPs members- that The Nation sought an independent assessment by third party, though those comments were easily addressed and dismissed in seriatim by Binney in an annex to the article.)

Binney has explained his forensic analysis and conclusions at numerous forums, and in a sit-down with Secretary Pompeo in October, 2017- though Mueller, the FBI, and mainstream and some of the alternative press seem either deaf, dumb and blind to it all, or interested in discrediting the study. The irony is, I'd venture to guess, that Binney, with his 40 years of experience, including as Technical Director and technical guru at the NSA, is, even in retirement, more sophisticated in these matters than any one at the Agency, or the FBI, or CIA, or certainly, the Congressional Intelligence Committees. So, it is astounding that any or all of them could have, but did not, invite him to testify as an expert.

Moreover, the NSA has a record of every transmission, and also would have it on backup files. And, the FBI has been sitting on Seth Rich's computer and his communications with Wikileaks, and presumably has a report that it has not released. And of course, as Trump asked in his press conference, where's the DNC server, any or all of which would put this question to rest.

A recent interview with Binney can be found at:

Play Hide
mlnw -> mlnw , 2 hours ago
The last clause of the first paragraph should have said: "according to Binney, the probability of the split being a coincidence would be one over 100 to the 50th power
Jack -> David Habakkuk , a day ago
David

There is a pattern of abuse of formerly well regarded institutions to achieve the propaganda aims of the Deep State establishment. The depths that were plumbed to push the Iraq WMD falsehoods are well known. Yet no one was held to account nor was there any honest accounting of the abuse. There have been pretenses like the Owen inquiry that you note.

We see the same situation of sweeping under the rug malfeasance and even outright criminality through obfuscation and obstruction in the case of the meddling in the 2016 election by top officials in intelligence and law enforcement. Clearly less and less people are buying what the Deep State sells despite their overwhelming control of the media channels.

It seems that we are marching towards a credibility crisis similar to what was experienced in the Soviet Union when no one trusted the contents in Pravda.

What is to be gained by the leadership in Britain in promoting these biological weapons cases since Litvinenko? In the US it is quite apparent that the Deep State have become extremely powerful and the likelihood that Trump recognizes that resistance is futile is very high. Schumer may be proven right that they have six ways from Sunday to make you kowtow to their dictats.

Fred -> Jack , a day ago
Jack,

"Yet no one was held to account"

That was one of the changes being hoped for when Obama was first elected. Instead we got little, except for things such as bailed out bankers and the IRS scandal which lasted until the end of his 2nd term. The panic from the left over the 2016 election issues the are still going on is that the expected candidate isn't in office and they are being exposed. Whether they get prosecuted is another story.

http://taxprof.typepad.com/...

TTG , a day ago
I think Matt Tait, David Habakkuk and many others are reading far more into this Dzerzinsky thing than what it warrants. The government dependent ID cards used by my family while I was working as a clandestine case officer overseas were signed by Robert Ludlum. Intelligence officers often have an odd sense of humor.

On a different note, I fully endorse David Habakkuk's recommendation of the writings of Bartles, McDermott and many others at the Foreign Military Studies Office at Fort Leavenworth. They are top notch. I learned a lot from Tim Thomas many years ago.

richardstevenhack -> TTG , a day ago
I agree that taken by itself, the Dzerzinsky thing would be an anomaly only and could be dismissed as "black humor" of a kind often found in hackers. However, taken with all the other evidence produced by Adam Carter, it becomes much more obviously an attempt to support a false flag "Russian hacker" narrative that otherwise is porous.

I believe there is a phrase going something like "an attempt to add verisimilitude to an otherwise bald and unconvincing narrative."

Publius Tacitus -> TTG , a day ago
TTG,

You want us to believe that the GRU are so sloppy and so inexperienced that they would launch a hack on the DNC and not take every measure to ensure there was no link whatsoever to anything Russian? Any former intel officer worth a damn knows that an operation to disrupt the election in a country the size of the United States would start with a risk/reward assessment, would require a team of at least 100 persons and would not be writing any code that could in any way be traced to Russia.

smoothieX12 . , a day ago
Unfortunately, the original author of this claptrap, Mark Galeotti, who, I regret to say, is, like Tait, British, has now recanted and confessed.

Doctrine-mongering and repeating birth of new faux-academic "entities", such as a "hybrid war" (any war is hybrid by definition), is a distinct feature of the Western "political science-military history" establishment. Galeotti, who for some strange reason passes as Russia "expert" is a perfect example of such "expertise" and doctrine-mongering. Military professionals largely met this "hybrid warfare" BS with disdain.

ancient archer , a day ago
I have to say that the more I look into this whole Russiagate affair, which is mostly in the minds of democrats (and a few republicans) and the MSM, the more it seems that there is indeed a foreign conspiracy to meddle in the internal affairs of the US (and in the presidential elections) but the meddling entity is not Russia. It is the British!

So many (ex-) MI6 operators (Steele, Tait, etc) involved in the story. It is interesting that the media don't question the intense involvement of the British in all this. And of course, the British haven't been laggards in adding fuel to the fire by the whole novichok hoax.

This needs to be looked at in more detail by the alternative media and well informed commentators like the host of this site.

[Jul 17, 2018] IMHO believing in the Crowdstrike analysis is like believing in Santa Claus

Putin statement about $400 million 'donation' to Hillary Clinton by MI6-connected Bill Browder in his Helsinki presser is obviously of great interest. This has given some new insights into the DNC false flag operation dynamics.
Notable quotes:
"... The FBI would get info about these hackers through the CrowdStrike team's disk images, memory dumps, network logs and other reports. CrowdStrike's Robert Johnston also said he worked with FBI investigators during his work at the DNC so the FBI also got some of their info directly. ..."
"... IMHO believing in the Crowdstrike analysis is like believing in Santa Claus. They did propagate unsubstantiated "security porno" like a hack of Ukrainians for a while. After this incident, Dmitry Alperovich looks like a sleazy used car salesman, not like a real specialist and, in any case, his qualification is limited to the SMTP protocol. ..."
"... What if it was Crowdstrike which compiled and planted the malware using Vault 7 tools and then conducted full-scale false flag operation against Russians to deflect allegations that Bernie was thrown under the bus deliberately and unlawfully. They have motivation and means to do this. ..."
Jul 17, 2018 | turcopolier.typepad.com

Keith Harbaugh , a day ago

PT, regarding your questions: "How did the FBI obtain information about activity on the DNC and DCCC servers", "what is the source of the information?",
"how do they know what happened on specific dates as alleged in the complaint?", I believe the answers are implicit in the first part of this news article:

"The Perfect Weapon: How Russian Cyberpower Invaded the U.S." By Eric Lipton, David E. Sanger and Scott Shane, New York Times , 2016-12-13.

It describes in considerable detail how, STARTING IN SEPTEMBER 2015, the FBI tried strenuously to alert the DNC to the fact that it was being hacked by Russia, but the DNC, remarkably, chose to ignore these warnings.

Here's how the article begins:

When Special Agent Adrian Hawkins of the Federal Bureau of Investigation called the Democratic National Committee in September 2015 to pass along some troubling news about its computer network, he was transferred, naturally [ sic! ], to the help desk.

His message was brief, if alarming. At least one computer system belonging to the D.N.C. had been compromised by hackers federal investigators had named "the Dukes," a cyberespionage team linked to the Russian government.

The F.B.I. knew it well: The bureau had spent the last few years trying to kick the Dukes out of the unclassified email systems of the White House, the State Department and even the Joint Chiefs of Staff, one of the government's best-protected networks.

BTW, I sincerely thank TTG for providing this link in one of his previous comments.

TTG -> Keith Harbaugh , 8 hours ago
Keith et al,

The FBI warned the DNC of the Dukes (aka APT29, Cozy Bear) in September 2015. These are the hackers that the Dutch AIVD penetrated and warned the NSA in real time when they attacked Pentagon systems in 2015. Their goal seemed to be intelligence collection as one would expect as the Dutch said they are affiliated with the SVR.

The Fancy Bear hackers (aka APT28) are the ones referred to in the recent indictment of the GRU officers. They penetrated the DNC systems in April 2016 and weren't discovered until CrowdStrike identified them. They're the ones who took data and released it through DCLeaks, Guccifer 2.0 and Wikileaks as part of a coordinated information operation (IO). I'm not at all surprised that the GRU would lead this IO as a military operation. The FBI would get info about these hackers through the CrowdStrike team's disk images, memory dumps, network logs and other reports. CrowdStrike's Robert Johnston also said he worked with FBI investigators during his work at the DNC so the FBI also got some of their info directly. There is absolutely no need to take physical possession of the servers.

The detail of some of the GRU officers' online activity indicates their computers were penetrated by US or allied IC/LEA much like the Dutch AIVD penetrated the FSB computers. This was probably a main source for much of the indictment's evidence. That the IC would release information about this penetration for this indictment is extraordinary. Normally this stuff never sees the light of day. It sets the precedent for the release of further such intelligence information in future indictments.

Likbez -> TTG
TTG,

IMHO believing in the Crowdstrike analysis is like believing in Santa Claus. They did propagate unsubstantiated "security porno" like a hack of Ukrainians for a while. After this incident, Dmitry Alperovich looks like a sleazy used car salesman, not like a real specialist and, in any case, his qualification is limited to the SMTP protocol.

What if it was Crowdstrike which compiled and planted the malware using Vault 7 tools and then conducted full-scale false flag operation against Russians to deflect allegations that Bernie was thrown under the bus deliberately and unlawfully. They have motivation and means to do this.

Now we also see a DNC motivation of keeping the content of affected servers from FBI eyes -- Browder money.

[May 29, 2018] Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA by Elizabeth Lea Vos

Highly recommended!
May 29, 2018 | www.zerohedge.com

Authored by Elizabeth Lea Vos via Disobedient Media,

In his final report in a three-part series, Guccifer 2's West Coast Fingerprint , the Forensicator discovers evidence that at least one operator behind the Guccifer 2.0 persona worked from the West Coast of the United States.

The Forensicator's earlier findings stated that Guccifer 2.0's NGP-VAN files were accessed locally on the East Coast, and in another analysis they suggested that a file published by Guccifer 2.0 was created in the Central time zone of the United States. Most recently, a former DNC official refuted the DNC's initial allegations that Trump opposition files had been ex-filtrated from the DNC by Russian state-sponsored operatives.

So, if Guccifer 2.0's role was negated by the statements of the DNC's own former "official" in a 2017 report by the Associated Press , why do we now return our attention to the Guccifer 2.0 persona, as we reflect on the last section of new findings from the Forensicator?

The answer: Despite almost two years having passed since the appearance of the Guccifer 2.0 persona, legacy media is still trotting out the shambling corpse of Guccifer 2.0 to revive the legitimacy of the Russian hacking narrative. In other words, it is necessary to hammer the final nail into the coffin of the Guccifer 2.0 persona.

As previously noted, In his final report in a three-part series, the Forensicator discusses concrete evidence that at least one operator behind the Guccifer 2.0 persona worked from the West Coast of the United States. He writes:

"Finally, we look at one particular Word document that Guccifer 2 uploaded, which had "track changes" enabled. From the tracking metadata we deduce the timezone offset in effect when Guccifer 2 made that change -- we reach a surprising conclusion: The document was likely saved by Guccifer 2 on the West Coast, US ."

The Forensicator spends the first part of his report evaluating indications that Guccifer 2.0 may have operated out of Russia. Ultimately, the Forensicator discards those tentative results. He emphatically notes:

"The PDT finding draws into question the premise that Guccifer 2 was operating out of Russia, or any other region that would have had GMT+3 timezone offsets in force. Essentially, the Pacific Timezone finding invalidates the GMT+3 timezone findings previously described."

The Forensicator's new West Coast finding is not the first evidence to indicate that operators behind the Guccifer 2.0 persona were based in the US. Nine months ago, Disobedient Media , reported on the Forensicator's analysis , which showed (among other things) that Guccifer 2.0's "ngpvan" archive was created on the East Coast. While that report received the vast majority of attention from the public and legacy media, Disobedient Media later reported on another analysis done by the Forensicator, which found that a file published by Guccifer 2.0 (on a different occasion) was probably created in the Central Timezone of the US.

Adding to all of this, UK based analyst and independent journalist Adam Carter presented his own analysis which also showed that the Guccifer 2.0 Twitter persona interacted on a schedule which was best explained by having been based within the United States.

The chart above shows a box which spans regular working hours. It indicates that unless Guccifer 2.0 worked the night shift, they were likely working out of the US. Though this last data point is circumstantial, it is corroborated by the previously discussed pieces of independently verifiable hard evidence described by the Forensicator.

When taking all of these separate pieces into account, one observes a convergence of evidence that multiple US-based operators were behind the Guccifer 2.0 persona and its publications. This is incredibly significant because it is based on multiple pieces of concrete data; it does not rely on "anonymous sources within the government," nor contractors hired by the DNC. As a result, much of the prior legacy press coverage of Guccifer 2.0 as a Russia-based agent can be readily debunked.

Such tangible evidence stands in contrast to the claims made in a recently published Daily Beast article, which reads more like a gossip column than serious journalism. In the Daily Beast's recital, the outlet cites an anonymous source who claims that a Moscow-based GRU agent was behind the Guccifer 2.0 operation, writing :

"Guccifer 2.0, the "lone hacker" who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia's military intelligence directorate (GRU), The Daily Beast has learned. It's an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

But on one occasion, The Daily Beast has learned, Guccifer failed to activate the VPN client before logging on. As a result, he left a real, Moscow-based Internet Protocol address in the server logs of an American social media company, according to a source familiar with the government's Guccifer investigation.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency's headquarters on Grizodubovoy Street in Moscow."

[The Daily Beast , March 22, 2018]

Clearly, the claim made in the Daily Beast's report is in direct contradiction with the growing mound of evidence suggesting that Guccifer 2.0 operated out of the United States. A detailed technical breakdown of the evidence confirming a West-Coast "last saved" time and how this counters the claims of the Daily Beast can be found in the Forensicator's work.

The Forensicator explained to Disobedient Media that their discovery process was initiated by the following Tweet by Matt Tait ( @pwnallthings ), a security blogger and journalist. Tait noticed a change revision entry in one of the Word documents published in Guccifer 2.0's second batch of documents, (uploaded 3 days after Guccifer 2.0 first appeared on the scene).

The Forensicator corrects Tait, stating that the timestamp is in "wall time," (local time) not UTC. The Forensicator explains that Tait's mistake is understandable because the "Z" suffix usually implies "Zulu" (GMT) time, but that isn't the case for "track changes" timestamps. The Forensicator writes that the document Tait refers to in his Tweet is named Hillary-for-America-fundraising-guidelines-from-agent-letter.docx ; it has Word's "track changes" feature enabled. Guccifer 2.0 made a trivial change to the document, using the pseudonym, "Ernesto Che," portrayed below:

The Forensicator correlated that timestamp ("12:56:00 AM") with the document's "last saved" timestamp expressed in GMT, as shown below courtesy of the Forensicator's study :

Based on the evidence discussed above, the Forensicator concludes that Guccifer 2.0 saved this file on a system that had a timezone offset of -7 hours (the difference between 0:56 AM and 7:56 AM GMT). Thus, the system where this document was last changed used Pacific Timezone settings.

The logical conclusion drawn from the preceding analysis is that Guccifer 2.0 was operating somewhere on the West Coast of the United States when they made their change to that document . This single finding throws into shambles any other conclusions that might indicate that Guccifer 2.0 was operating out of Russia. This latest finding also adds to the previously cited evidence that the persona was probably operated by multiple individuals located in the United States.

Taken all together, the factual basis of the Russian hacking story totally collapses. We are left instead with multiple traces of a US-based operation that created the appearance of evidence that Kremlin-allied hackers had breached the DNC network. Publicly available data suggests that Guccifer 2.0 is a US-based operation. To this, we add:

In the course of the last nine months this outlet has documented the work of the Forensicator, which has indicated that not only were Guccifer 2.0's "ngp-van" files accessed locally on the East Coast of the US, but also that several files published by the Guccifer 2.0 persona were altered and saved within the United States. The "Russian fingerprints" left on Guccifer 2.0's first document have been debunked, as has the claim that the file itself was extracted from the DNC network in the first place. On top of all this, a former DNC official withdrew the DNC's initial allegations that supported the "Russian hack" claim in the first place.

One hopes that with all of this information in mind, the long-suffering Guccifer 2.0 saga can be laid to rest once and for all, at least for unbiased and critically thinking observers.


Chris2 Tue, 05/29/2018 - 22:15 Permalink

Snowden talked about the NSA or is it CIA, had the ability to leave Russian fingerprints.

All of this was the "insurance" to frame Trump who they knew would win when they saw that Hillary rallies had 20 people only showing up few old lesbians and nobody else.

beemasters -> Chris2 Tue, 05/29/2018 - 22:18 Permalink

The hunt for the messenger has certainly proven to be an effective distraction.

LetThemEatRand Tue, 05/29/2018 - 22:16 Permalink

Meanwhile, Snowden risked his life and liberty to show us evidence that the NSA developed technology to make it appear even with expert analysis that NSA hacking originated from a foreign power.

[Feb 19, 2018] Kim Dotcom Let Me Assure You, The DNC Hack Wasn t Even A Hack Zero Hedge

Notable quotes:
"... All fucking Kabuki. All of it. ..."
"... The Deep State (Oligarchs and the MIC) is totally fucking loving this: they have Trump and the GOP giving them everything they ever wanted and they have the optics and distraction of an "embattled" president that claims to be against or a victim of the "deep state" and a base that rally's, circles the wagons around him, and falls for the narrative. ..."
"... They know exactly who it was with the memory stick, there is always video of one form or another either in the data center or near the premises that can indicate who it was. They either have a video of Seth Rich putting the stick into the server directly, or they at least have a video of his car entering and leaving the vicinity of the ex-filtration. ..."
"... This would have been an open and shut case if shillary was not involved. Since it was involved, you can all chalk it up to the Clinton body count. I pray that it gets justice. It and the country, the world - needs justice. ..."
Feb 19, 2018 | www.zerohedge.com

Kim Dotcom: "Let Me Assure You, The DNC Hack Wasn't Even A Hack"

by Tyler Durden Mon, 02/19/2018 - 07:51 3.4K SHARES

Kim Dotcom has once again chimed in on the DNC hack, following a Sunday morning tweet from President Trump clarifying his previous comments on Russian meddling in the 2016 election.

In response, Dotcom tweeted " Let me assure you, the DNC hack wasn't even a hack. It was an insider with a memory stick. I know this because I know who did it and why," adding "Special Counsel Mueller is not interested in my evidence. My lawyers wrote to him twice. He never replied. 360 pounds! " alluding of course to Trump's "400 pound genius" comment.

Dotcom's assertion is backed up by an analysis done last year by a researcher who goes by the name Forensicator , who determined that the DNC files were copied at 22.6 MB/s - a speed virtually impossible to achieve from halfway around the world, much less over a local network - yet a speed typical of file transfers to a memory stick.

The local transfer theory of course blows the Russian hacking narrative out of the water, lending credibility to the theory that the DNC "hack" was in fact an inside job, potentially implicating late DNC IT staffer, Seth Rich.

John Podesta's email was allegely successfully "hacked" (he fell victim to a phishing scam ) in March 2016, while the DNC reported suspicious activity (the suspected Seth Rich file transfer) in late April, 2016 according to the Washington Post.

On May 18, 2017, Dotcom proposed that if Congress includes the Seth Rich investigation in their Russia probe, he would provide written testimony with evidence that Seth Rich was WikiLeaks' source.

On May 19 2017 Dotcom tweeted "I knew Seth Rich. I was involved"

Three days later, Dotcom again released a guarded statement saying "I KNOW THAT SETH RICH WAS INVOLVED IN THE DNC LEAK," adding:

"I have consulted with my lawyers. I accept that my full statement should be provided to the authorities and I am prepared to do that so that there can be a full investigation. My lawyers will speak with the authorities regarding the proper process.

If my evidence is required to be given in the United States I would be prepared to do so if appropriate arrangements are made. I would need a guarantee from Special Counsel Mueller, on behalf of the United States, of safe passage from New Zealand to the United States and back. In the coming days we will be communicating with the appropriate authorities to make the necessary arrangements. In the meantime, I will make no further comment."

Dotcom knew.

While one could simply write off Dotcom's claims as an attention seeking stunt, he made several comments and a series of tweets hinting at the upcoming email releases prior to both the WikiLeaks dumps as well as the publication of the hacked DNC emails to a website known as "DCLeaks."

In a May 14, 2015 Bloomberg article entitled "Kim Dotcom: Julian Assange Will Be Hillary Clinton's Worst Nightmare In 2016 ": "I have to say it's probably more Julian," who threatens Hillary, Dotcom said. " But I'm aware of some of the things that are going to be roadblocks for her ."

Two days later, Dotcom tweeted this:

Around two months later, Kim asks a provocative question

Two weeks after that, Dotcom then tweeted "Mishandling classified info is a crime. When Hillary's emails eventually pop up on the internet who's going to jail?"

It should thus be fairly obvious to anyone that Dotcom was somehow involved, and therefore any evidence he claims to have, should be taken seriously as part of Mueller's investigation. Instead, as Dotcom tweeted, "Special Counsel Mueller is not interested in my evidence. My lawyers wrote to him twice. He never replied. "

chunga Sun, 02/18/2018 - 21:59 Permalink

Pffft...this guy sounds like the reds with their "blockbuster" memo. Honest Hill'rey is laughing!

SethPoor -> chunga Sun, 02/18/2018 - 22:00 Permalink

https://www.youtube.com/watch?v=5_8VaMbPjUU

Bes -> J S Bach Sun, 02/18/2018 - 22:17 Permalink

All fucking Kabuki. All of it.

The Deep State (Oligarchs and the MIC) is totally fucking loving this: they have Trump and the GOP giving them everything they ever wanted and they have the optics and distraction of an "embattled" president that claims to be against or a victim of the "deep state" and a base that rally's, circles the wagons around him, and falls for the narrative.

Meanwhile they keep enacting the most Pro Deep State/MIC/Police State/Zionist/Wall Street agenda possible. And they call it #winning

----

pathetic.

bigkahuna -> CheapBastard Mon, 02/19/2018 - 09:58 Permalink

"Had to be a Russian mole with a computer stick. MSM, DNC and Muller say so."

They know exactly who it was with the memory stick, there is always video of one form or another either in the data center or near the premises that can indicate who it was. They either have a video of Seth Rich putting the stick into the server directly, or they at least have a video of his car entering and leaving the vicinity of the ex-filtration.

This would have been an open and shut case if shillary was not involved. Since it was involved, you can all chalk it up to the Clinton body count. I pray that it gets justice. It and the country, the world - needs justice.

StarGate -> CheapBastard Mon, 02/19/2018 - 11:23 Permalink

Don't forget the "hack" analysis of Russian owned "Crowdstrike" since the FBI did and continues to, refuse to analyze the DNC computers.

KuriousKat -> CheapBastard Mon, 02/19/2018 - 13:26 Permalink

Isn't Alperovitch the Only Russian in there?.. When you rule out the impossible...whatever remains probable.. probably is..

wildbad -> IntercoursetheEU Mon, 02/19/2018 - 03:05 Permalink

Kim is great, Assange is great. Kim is playing a double game. He wants immunity from the US GUmmint overreach that destroyed his company and made him a prisoner in NZ.

Good on ya Kim.

His name was Seth Rich...and he will reach out from the grave and bury Killary who murdered him.

NumberNone -> wildbad Mon, 02/19/2018 - 10:04 Permalink

There are so many nuances to this and all are getting mentioned but the one that also stands out is that in an age of demands for gun control by the Dems, Seth Rich is never, ever mentioned. He should be the poster child for gun control. Young man, draped in a American flag, helping democracy, gunned down...it writes itself.

They either are afraid of the possible racial issues should it turn out to be a black man killing a white man (but why should that matter in a gun control debate?) or they just don't want people looking at this case. I go for #2.

Socratic Dog -> Buckaroo Banzai Mon, 02/19/2018 - 12:09 Permalink

Funny that George Webb can figure it out, but Trump, Leader of the Free World, is sitting there with his dick in his hand waiting for someone to save him.

Whatever he might turn out to be, this much is clear: Trump is a spineless weakling. He might be able to fuck starlets, but he hasn't got the balls to defend either himself or the Republic.

verumcuibono -> Buckaroo Banzai Mon, 02/19/2018 - 14:26 Permalink

Webb's research is also...managed. But a lot of it was/is really good (don't follow it anymore) and I agree re: SR piece of it.

I think SR is such an interesting case. It's not really an anomaly because SO many Bush-CFR-related hits end the same way and his had typical signatures. But his also squeels of a job done w/out much prior planning because I think SR surprised everyone. If, in fact, that was when he was killed. Everything regarding the family's demeanor suggests no.

verumcuibono -> NumberNone Mon, 02/19/2018 - 12:41 Permalink

MANY patterns in shootings: failure in law enforcement/intelligence who were notified of problem individuals ahead of time, ARs, mental health and SSRIs, and ongoing resistance to gun control in DC ----these are NOT coincidences. Nor are distractions in MSM's version of events w/ controlled propaganda.

Children will stop being killed when America wakes the fuck up and starts asking the right questions, making the right demands. It's time.

KJWqonfo7 -> wildbad Mon, 02/19/2018 - 11:15 Permalink

Kim is awesome to watch, I remember his old website of pics of him on yachts with hot girls and racing the Gumball Rally.

verumcuibono -> wildbad Mon, 02/19/2018 - 14:28 Permalink

I don't think you know how these hackers have nearly ALL been intercepted by CIA--for decades now. DS has had backdoor access to just about all of them. I agree that Kim is great, brilliant and was sabotaged but he's also cooperating. Otherwise he'd be dead.

StarGate -> Billy the Poet Mon, 02/19/2018 - 11:48 Permalink

Bes is either "disinfo plant" or energy draining pessimist. Result is the same - to deflate your power to create a new future.

Trump saw the goal of the Fed Reserve banksters decades ago and spoke often about it. Like Prez Kennedy he wants to return USA economy to silver or gold backed dollar then transition to new system away from the Black Magic fed reserve/ tax natl debt machine.

The Globalist Cabal has been working to destroy the US economy ever since they income tax April 15th Lincoln at the Ford theater. 125 years. But Bes claims because Trump cannot reverse 125 years of history in one year that it is kabuki.

Pessimism is its own reward.

[Jan 22, 2018] Joe diGenova Brazen Plot to Frame Trump

Highly recommended!
Brilliant summary of the situation. You should listen this interview. False Russiagate was from the beginning a plot to derail and then depose Trump. They created false facts.
Brazen port to exonerate Hillary Clinton and then derail Trump
Notable quotes:
"... It is rare to see a man of integrity and a lawyer who speaks in plain English and speaks about facts and conclusions of law. The problem we face today is far too many lawyers with no integrity in positions of government that protect blatant criminals holding public office who are also lawyers. Lawyers always protect other lawyers, except this wonderful man! ..."
Jan 22, 2018 | www.youtube.com

Rick W , 1 day ago

It is rare to see a man of integrity and a lawyer who speaks in plain English and speaks about facts and conclusions of law. The problem we face today is far too many lawyers with no integrity in positions of government that protect blatant criminals holding public office who are also lawyers. Lawyers always protect other lawyers, except this wonderful man!

Charles H , 1 day ago

Breathtaking information. Thanks so much for airing.

Walter 1408 , 1 day ago

All those Clinton Foundation millions bought a lot of FBI agents. They need a major house cleaning.

Caleb Engineering, LLC , 1 day ago

The punishments should be harsh to deter future attempts to do the same to future presidents.

Patricia Herman , 1 day ago

Love Joe to bad he can't become the new AG and why isn't this interview on the news at least Fox, Hannity, Tucker, Laura. And we know CNN, MSNBC, and the rest are all in the bag for Obummer and Killary. 😎

Teddy Dunford , 1 day ago

Remember HRC said if he (( Trump )) wins we are all going to HANG and I hope this is one time the Satan worshiping witch told the truth .

The last iconoclast , 1 day ago

Three heroes will go down in history: Journalist Julian Asange Adm. Mike Rogers Rep. Devin Nunes

Elisabeth Vancamp , 1 day ago

I am speechless. Best cohesive explanation! Man reaps what he sows.

James Stamulis , 1 day ago

All because Trump is MAGA and that was not the cabals game plan.

eh10000 , 1 day ago

RELEASE THE MEMO

Peter Sprague , 1 day ago

NY Times Buzzfeed Washington Post CNN ABC CBS NBC are all complicit in perpetrating these lies Just watch Colbert Jimmy Farrel or Jimmy Kimmel These bad actors pretending to be entertainers need to hang

Wide Awake , 1 day ago

Never forget what Hilary said: If Trump wins, we'll all hang. And so they should.

Pat Defeo , 15 hours ago

Joe D should have been our AG he is tough and has the ability to explain WTH is going on in plain english

Robin Ricks , 1 day ago

Mueller carried the sample of Uranium to the Russians. Mueller was paid off, as was Comey. So glad President Trump can confiscate all their money. Now to catch Daddy Bush and Jr for having all those people in New York killed on 9/11! Go Trump!!

David Gray , 1 day ago

# Release The Memo.

FindLiberty , 1 day ago

OUTSTANDING RESCUE OF THE AMERICAN REPUBLIC - (...proceed to lock 'em all up)

Thomas Rocco , 1 day ago

Fantastic interview. Saw it's entirety

Jeffrey Robert-Dicken , 1 day ago

treason

Samuel Anderson , 1 day ago

There needs to be an arrest of ALL the top MSM owners and chairpeople of all the affiliates including those who stand in front of the camera pushing false information. Their license needs to be rescinded and taken away. Bankrupt the news affiliates and sell off their assets.

Jerk Joker , 1 day ago

This is a truly excellent and clear explanation of how our government was corrupted by Team Hillary. I reckon she needs to pay the Ultimate price: a thorough investigation into her crimes: A fair trial... and maybe execution, followed by her being reviled down the centuries as one of the most evil women in History. Every little girl should be told: Do not be like this woman!

John Brooks , 1 day ago

A hell storm is coming !!! People need to be tried and possibly executed to send a massage that ALL these swamp creatures will understand.

Jeffrey Robert-Dicken , 1 day ago

you have a jezabel clinton the most dangerous couple ever ...what happened to JFK junior ?

Giant Sequoia , 1 day ago

Excellent, excellent, excellent report Bill!!!

Rachael SOJ , 1 day ago

Thank you, Mr. Still, for reporting on this, it was a very informative video!💛

james goodwin , 1 day ago

Thank god she didn't win

FilthyMcDumpin'Clips , 1 day ago

Bill, don't forget to mention that those same entities also include those working for CNN and MSNBC who were funded by Clinton donations to push the false media on the country. Can you say lawsuits?

DrewTronics , 1 day ago

Holy wow, thanks for posting Bill!

Noel B , 1 day ago (edited)

What about Clapper and Brennan they started this before they were replaced. They also are to blame.

Granville Higgins , 1 day ago

Trump let them dig their own graves.

Suzie Smith , 1 day ago

Amazing piece! Pulls so many things together! Thank you!

snowbunny20328 , 1 day ago

What a very important review of what this country has endured!!! Thank you Joe!

Jeffrey Robert-Dicken , 1 day ago

can someone wake sessions up?

James Pope , 1 day ago

This is the guy who should be the Director of tbe FBI, or AG

Susan Bennett , 1 day ago

Hillary will NEVER be exonerated, or ANY of those treasonous swamp rat sycophants!!!

JUNITO84 , 1 day ago

Thank you very much admiral Rodgers! the american people love you and appreciate you stress/gutsy actions to do the right thing 🙂

Tom Smith , 1 day ago

The last thing Seth Rich saw before he was murdered was an FBI special agents badge.

AVALON DEJAVU , 1 day ago

THANKS for explaining this so clearly!!! #LockThemUp No JUSTICE No PEACE!

ak6781fan , 1 day ago

Mr. Still you are very astute and observant. Your statement that this is the darkest hour for our great country since the Civil War is spot-on.

Rich P , 1 day ago

Do you have any doubt these people are capable of genociding all who disagree with there Marxist agenda?

[Jan 22, 2018] Joe diGenova Brazen Plot to Frame Trump

You should listen this interview. As one commenter said "Three heroes will go down in history: Journalist Julian Asange, Adm. Mike Rogers, Rep. Devin Nunes"
False Russiagate was from the beginning a plot to derail and then depose Trump. They created false facts.
Jan 22, 2018 | www.youtube.com

Rick W , 1 day ago

It is rare to see a man of integrity and a lawyer who speaks in plain English and speaks about facts and conclusions of law. The problem we face today is far too many lawyers with no integrity in positions of government that protect blatant criminals holding public office who are also lawyers. Lawyers always protect other lawyers, except this wonderful man!

Charles H , 1 day ago

Breathtaking information. Thanks so much for airing.

Walter 1408 , 1 day ago

All those Clinton Foundation millions bought a lot of FBI agents. They need a major house cleaning.

Caleb Engineering, LLC , 1 day ago

The punishments should be harsh to deter future attempts to do the same to future presidents.

Patricia Herman , 1 day ago

Love Joe to bad he can't become the new AG and why isn't this interview on the news at least Fox, Hannity, Tucker, Laura. And we know CNN, MSNBC, and the rest are all in the bag for Obummer and Killary. 😎

Teddy Dunford , 1 day ago

Remember HRC said if he (( Trump )) wins we are all going to HANG and I hope this is one time the Satan worshiping witch told the truth .

The last iconoclast , 1 day ago

Three heroes will go down in history: Journalist Julian Asange Adm. Mike Rogers Rep. Devin Nunes

Elisabeth Vancamp , 1 day ago

I am speechless. Best cohesive explanation! Man reaps what he sows.

James Stamulis , 1 day ago

All because Trump is MAGA and that was not the cabals game plan.

eh10000 , 1 day ago

RELEASE THE MEMO

Peter Sprague , 1 day ago

NY Times Buzzfeed Washington Post CNN ABC CBS NBC are all complicit in perpetrating these lies Just watch Colbert Jimmy Farrel or Jimmy Kimmel These bad actors pretending to be entertainers need to hang

Wide Awake , 1 day ago

Never forget what Hilary said: If Trump wins, we'll all hang. And so they should.

Pat Defeo , 15 hours ago

Joe D should have been our AG he is tough and has the ability to explain WTH is going on in plain english

Robin Ricks , 1 day ago

Mueller carried the sample of Uranium to the Russians. Mueller was paid off, as was Comey. So glad President Trump can confiscate all their money. Now to catch Daddy Bush and Jr for having all those people in New York killed on 9/11! Go Trump!!

David Gray , 1 day ago

# Release The Memo.

FindLiberty , 1 day ago

OUTSTANDING RESCUE OF THE AMERICAN REPUBLIC - (...proceed to lock 'em all up)

Thomas Rocco , 1 day ago

Fantastic interview. Saw it's entirety

Jeffrey Robert-Dicken , 1 day ago

treason

Samuel Anderson , 1 day ago

There needs to be an arrest of ALL the top MSM owners and chairpeople of all the affiliates including those who stand in front of the camera pushing false information. Their license needs to be rescinded and taken away. Bankrupt the news affiliates and sell off their assets.

Jerk Joker , 1 day ago

This is a truly excellent and clear explanation of how our government was corrupted by Team Hillary. I reckon she needs to pay the Ultimate price: a thorough investigation into her crimes: A fair trial... and maybe execution, followed by her being reviled down the centuries as one of the most evil women in History. Every little girl should be told: Do not be like this woman!

John Brooks , 1 day ago

A hell storm is coming !!! People need to be tried and possibly executed to send a massage that ALL these swamp creatures will understand.

Jeffrey Robert-Dicken , 1 day ago

you have a jezabel clinton the most dangerous couple ever ...what happened to JFK junior ?

Giant Sequoia , 1 day ago

Excellent, excellent, excellent report Bill!!!

Rachael SOJ , 1 day ago

Thank you, Mr. Still, for reporting on this, it was a very informative video!💛

james goodwin , 1 day ago

Thank god she didn't win

FilthyMcDumpin'Clips , 1 day ago

Bill, don't forget to mention that those same entities also include those working for CNN and MSNBC who were funded by Clinton donations to push the false media on the country. Can you say lawsuits?

DrewTronics , 1 day ago

Holy wow, thanks for posting Bill!

Noel B , 1 day ago (edited)

What about Clapper and Brennan they started this before they were replaced. They also are to blame.

Granville Higgins , 1 day ago

Trump let them dig their own graves.

Suzie Smith , 1 day ago

Amazing piece! Pulls so many things together! Thank you!

snowbunny20328 , 1 day ago

What a very important review of what this country has endured!!! Thank you Joe!

Jeffrey Robert-Dicken , 1 day ago

can someone wake sessions up?

James Pope , 1 day ago

This is the guy who should be the Director of tbe FBI, or AG

Susan Bennett , 1 day ago

Hillary will NEVER be exonerated, or ANY of those treasonous swamp rat sycophants!!!

JUNITO84 , 1 day ago

Thank you very much admiral Rodgers! the american people love you and appreciate you stress/gutsy actions to do the right thing 🙂

Tom Smith , 1 day ago

The last thing Seth Rich saw before he was murdered was an FBI special agents badge.

AVALON DEJAVU , 1 day ago

THANKS for explaining this so clearly!!! #LockThemUp No JUSTICE No PEACE!

ak6781fan , 1 day ago

Mr. Still you are very astute and observant. Your statement that this is the darkest hour for our great country since the Civil War is spot-on.

Rich P , 1 day ago

Do you have any doubt these people are capable of genociding all who disagree with there Marxist agenda?

Recommended Links

Google matched content

Softpanorama Recommended

Top articles

[Aug 19, 2020] The Republican led Senate Select Committee on Intelligence repeats the lies about Guccifer 2.0 Published on Aug 19, 2020 | www.zerohedge.com

[Aug 16, 2020] CIA Behind Guccifer Russiagate A Plausible Scenario Published on Aug 16, 2020 | www.zerohedge.com

[May 24, 2020] Guccifer 2.0 was always John Brennan 1.0 Published on May 24, 2020 | www.zerohedge.com

[May 24, 2020] Guccifer 2.0's Hidden Agenda : looks like Gussifer 2.0 was a false flag operation designed to smear WikiLeaks and distract from the content of the stolen by Seth Rich or some other insider DNC emails Published on May 24, 2020 | consortiumnews.com

[Mar 12, 2020] Did Joe Biden's Former IT Guy Masquerade as Guccifer 2.0 by Larry C Johnson Published on Mar 12, 2020 | turcopolier.typepad.com

[Dec 22, 2019] So US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks. That's when the stratagem of attributing the impending Wikileaks release to a Russian hack was born -- distracting from the incriminating content of the emails, while vilifying the Deep State's favorite enemies, Assange and Russia, all in one neat scam Published on Dec 22, 2019 | turcopolier.typepad.com

[Dec 20, 2019] Did John Brennan's CIA Create Guccifer 2.0 and DCLeaks by Larry C Johnson Published on Dec 20, 2019 | turcopolier.typepad.com

[Dec 04, 2019] The central question of Ukrainegate is whether CrowdStrike actions on DNC leak were a false flag operation designed to open Russiagate and what was the level of participation of Poroshenko government and Ukrainian Security services in this false flag operation by Factotum Published on Dec 04, 2019 | turcopolier.typepad.com

[Dec 04, 2019] Common Funding Themes Link 'Whistleblower' Complaint and CrowdStrike Firm Certifying DNC Russia 'Hack' by Aaron Klein Published on Sep 28, 2019 | www.breitbart.com

[Dec 04, 2019] DNC Russian Hackers Found! You Won't Believe Who They Really Work For by the Anonymous Patriots Published on Jan 01, 2017 | themillenniumreport.com

[Dec 04, 2019] June 4th, 2017 Crowdstrike Was at the DNC Six Weeks by George Webb Published on Nov 27, 2019 | www.youtube.com

[Dec 04, 2019] Cyberanalyst George Eliason Claims that the "Fancy Bear" Who Hacked the DNC Server is Ukrainian Intelligence – In League with the Atlantic Council and Crowdstrike Published on Dec 04, 2018 | www.reddit.com

[Dec 04, 2019] Fancy Bear - Conservapedia Published on Dec 04, 2019 | www.conservapedia.com

[Dec 04, 2019] June 2nd, 2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams by George Webb Published on Nov 27, 2019 | www.youtube.com

[Nov 03, 2019] Growing Indicators of Brennan's CIA Trump Task Force by Larry C Johnson - Sic Semper Tyrannis Published on Nov 03, 2019 | turcopolier.typepad.com

[Mar 24, 2019] The manner in which Guccifer 2.0's English was broken, did not follow the typical errors one would expect if Guccifer 2.0's first language was Russian. Published on Mar 24, 2019 | www.zerohedge.com

[Jul 20, 2018] So many (ex-) MI6 operators (Steele, Tait, etc) involved in the story. It is interesting that the media don t question the intense involvement of the British in all this. And of course, the British haven t been laggards in adding fuel to the fire by the whole novichok hoax Published on Jul 20, 2018 | turcopolier.typepad.com

[May 29, 2018] Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA by Elizabeth Lea Vos Published on May 29, 2018 | www.zerohedge.com

[Jan 22, 2018] Joe diGenova Brazen Plot to Frame Trump Published on Jan 22, 2018 | www.youtube.com

Sites

The CrowdStrike Story - YouTube

Crowstrike connections

"Conspiracy theories"

Wikileak

Alperovich presentations on YouTube

Crowdstrike products



Etc

Society

Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers :   Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism  : The Iron Law of Oligarchy : Libertarian Philosophy

Quotes

War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda  : SE quotes : Language Design and Programming Quotes : Random IT-related quotesSomerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose BierceBernard Shaw : Mark Twain Quotes

Bulletin:

Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 :  Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method  : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law

History:

Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds  : Larry Wall  : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOSProgramming Languages History : PL/1 : Simula 67 : C : History of GCC developmentScripting Languages : Perl history   : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history

Classic books:

The Peter Principle : Parkinson Law : 1984 : The Mythical Man-MonthHow to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite

Most popular humor pages:

Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor

The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D


Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.

FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.

This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...

You can use PayPal to to buy a cup of coffee for authors of this site

Disclaimer:

The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.

Last modified: June, 18, 2020