Softpanorama

Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
May the source be with you, but remember the KISS principle ;-)
Skepticism and critical thinking is not panacea, but can help to understand the world better

FBI and CIA contractor Crowdstrike and a very suspicious DNC leak saga

Can  Cozy Bear, Fancy Bear  be codewords for CIA false flag operation ?
Did Crowdstrike injected malware from CIA collection in DNC servers to implicate Russians?

News CIA hacking and false flag cyber operations Russiagate -- a color revolution against Trump Recommended Links Vault 7 scandal DNC and Podesta emails leak and  subsequent false flag operation to  blame Vladimir Putin Do the US intelligence agencies attempt to influence the US Presidential elections ? Strzok-gate Andrew McCabe and his close circle of "fighters with organized crime"
Fake News scare and US NeoMcCartyism The problem of control of intelligence services in democratic societies Anti-Russian hysteria in connection emailgate and DNC leak Coordinated set of leaks as a color revolution tool Brennan elections machinations Hillary Clinton email scandal Anti Trump Hysteria Attempts to entrap Trump FBI Mayberry Machiavellians
Nation under attack meme The Deep State National Security State  American Exceptionalism  Media-Military-Industrial Complex Neoliberalism as Trotskyism for the rich Neocolonialism as Financial Imperialism Bernie Sanders betrayal of his supporters History of American False Flag Operations
Amorality and criminality of neoliberal elite  Audacious Oligarchy and "Democracy for Winners" Myth about intelligent voter Trump vs. Deep State Did Obama order wiretaps of Trump conversations Michael Flynn Doublespeak New American Militarism Bait and Switch
Deception as an art form The Iron Law of Oligarchy Principal-agent problem Neoliberalism Neocon foreign policy is a disaster for the USA Non-Interventionism Skeptic Quotations Humor Etc

As of Jan 12, 2018 it is clear that  Russiagate became FBI-gate -- an attempt of FBI brass  to subvert the US Presidential elections in favor of Hillary Clinton. And Ray McGovern  played an important role in this making this fact public, first of all discrediting the idea of DNC hack (which was actually an internal leak) which logically led to the analyses of Crowdstrike role and the hypothesis that Crowdstrike injected malware from CIA collection in DNC server(s) and later discovered it implicate Russians.  Performing  a classic false flag operation. See The FBI Hand Behind Russia-gate by Ray McGovern

We suddenly have documentary proof that key elements of the U.S. intelligence community were trying to short-circuit the U.S. democratic process. And that puts in a new and dark context the year-long promotion of Russia-gate. It now appears that it was not the Russians trying to rig the outcome of the U.S. election, but leading officials of the U.S. intelligence community, shadowy characters sometimes called the Deep State.

Ironically, the Strzok-Page texts provide something that the Russia-gate investigation has been sorely lacking: first-hand evidence of both corrupt intent and action. After months of breathless searching for "evidence" of Russian-Trump collusion designed to put Trump in the White House, what now exists is actual evidence that senior officials of the Obama administration colluded to keep Trump out of the White House – proof of what old-time gumshoes used to call "means, motive and opportunity."

Even more unfortunately for Russia-gate enthusiasts, the FBI lovers' correspondence provides factual evidence exposing much of the made-up "Resistance" narrative – the contrived storyline that The New York Times and much of the rest of the U.S. mainstream media deemed fit to print with little skepticism and few if any caveats, a scenario about brilliantly devious Russians that not only lacks actual evidence – relying on unverified hearsay and rumor – but doesn't make sense on its face.

The Russia-gate narrative always hinged on the preposterous notion that Russian President Vladimir Putin foresaw years ago what no American political analyst considered even possible, the political ascendancy of Donald Trump. According to the narrative, the fortune-telling Putin then risked creating even worse tensions with a nuclear-armed America that would – by all odds – have been led by a vengeful President Hillary Clinton.

 

Crowdstike and it founder are very interesting people indeed. This unknown to anybody startup managed to attact key people from FBI cyber intelligence unit.

CrowdStrike has brought on board senior FBI executives, such as Shawn Henry, former executive assistant director (EAD) of the FBI's Criminal, Cyber, Response and Services Branch, and Steve Chabinsky, former deputy assistant director of the FBI's Cyber Division. CrowdStrike has received $256 million in funding from Warburg Pincus, Accel Partners, and Google Capital.

There is a lot of information about both  founders George Kurtz and Dmirty Alperovich on Youtube (See Recommended Links). Alperovich is CTO so juggling him allow to judge the levle of the firm. There are a dozen or so of him presentations I think. Which allow to create some level of understanding what this guy is about.  The things that he is talking about make sense. But he of course he exaggerates and distort like a real slick marketer. In no way this is a "technical guru" type.

Note: in 2017 Alperovich is just 37. That's amazing career in a very difficult field. In which you need many-many years just to learn  networking protocols. So he probably do not know much outside narrow field of email and webmail.   And he did not study much iether. Alperovitch earned a M.S. in information security in 2003 and a B.S. in computer science in 2001, both from Georgia Institute of Technology. While BS in computer science from GeorgTech usually means that the guy is not an idiot, people who try to get MS in information  security are usually second-rate from the computer science perspective.  So he is not a bright star in computer science iether. All his career he was limited to Apple and Windows, which also limit person in a certain way.  So in comparison with top cybersecurity guys from FBI or CIA he probably is just a slick careerist with penchant of self-promotion and marketing.  Pretty reckless guy Dmitri Alperovitch - Offense as the Best Defense - AusCERT2013 - YouTube
He is pretty slick presenter, I give that to him.
 I wonder who sponsored him, as on his own he probably was unable to climb so fact so quickly on the management ladder.

CrowdStrike - Wikipedia

CrowdStrike, Inc. is an American cybersecurity technology company based in Sunnyvale, California, and a wholly owned subsidiary of CrowdStrike Holdings, Inc. The company provides endpoint security, threat intelligence, and incident response services to customers in more than 170 countries.[1][2] The company has been involved in response efforts to several high-profile cyber-attacks, including the Sony Pictures hack,[3] the 2016 Democratic National Committee email leak, and the Democratic National Committee cyber attacks. In the last case it concluded Russian state actors were responsible.[4]

CrowdStrike was co-founded by entrepreneur George Kurtz (CEO),[5][6] Dmitri Alperovitch (CTO),[7] and Gregg Marston (CFO, retired). In 2012, Shawn Henry, a former FBI executive who led both the FBI's criminal and cyber divisions, was hired to lead sister company CrowdStrike Services, Inc., which is focused on proactive and incident response services.[8]

The company gained recognition for providing threat intelligence and attribution to nation state actors[9] conducting economic espionage and IP theft. This includes the outing of state-sponsored Chinese group, Putter Panda, linked to China's spying on US defense and European satellite and aerospace industries.[10] In May 2014, supported by CrowdStrike's reports, the US Department of Justice charged five Chinese military hackers for economic cyber espionage against US corporations. Similarly, the firm is known for uncovering the activities of Energetic Bear, an adversary group with a nexus to the Russian Federation that conducts intelligence operations against a variety of global victims with a primary focus on the energy sector.

Following the very public Sony Pictures hack, CrowdStrike produced attribution to the government of North Korea within 48 hours and demonstrated how the attack was carried out step-by-step.[11] On May 2015, the company released Researcher Jason Geffner's discovery of VENOM, a critical flaw in open source hypervisor called Quick Emulator (QEMU),[12] which is used in a number of common virtualization products.

In 2013, the company launched the Falcon platform, a technology that stops breaches by combining next-generation antivirus, endpoint detection and response, and proactive hunting. In 2014, CrowdStrike was instrumental in identifying members of PLA Unit 61486 as the perpetrators of a number of cyberattacks on U.S. infrastructure.[13][14]

In July 2015, Google invested in the company's Series C funding round, which in total raised $100 million. To date, CrowdStrike has achieved total funding of $256 million with estimated annual revenue of $100 million and valuation more than $1 billion.[15] Investors include Telstra, March Capital Partners, Rackspace, Accel Partners and Warburg Pincus.[16][17] According to the company, its customers include three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.[18]

In 2016, the company was ranked #40 on the Deloitte Fast 500 North America list.[19]

Crowdstrike has figured prominently in the Democratic National Committee cyber attacks and the attribution of those attacks to Russian intelligence services. On March 20, 2017 during testimony before congress, James Comey stated "Crowdstrike, Mandiant, and ThreatConnect review[ed] the evidence of the hack and conclude[d] with high certainty that it was the work of APT 28 and APT 29 who are known to be Russian intelligence services."[20]

Industry recognition[edit]

Dmitri Alperovitch - Wikipedia

Alperovitch worked at a number of computer security startups in the late 1990s and early 2000s, including e-mail security startup CipherTrust, where he was one of the leading inventors of the TrustedSource reputation system. Upon acquisition of CipherTrust by Secure Computing in 2006, he led the research team and launched the Software-as-a-Service business for the company. Alperovitch took over as vice president of threat research at McAfee, when the company acquired Secure Computing in 2008.

In January 2010, he led the investigation into Operation Aurora, the Chinese intrusions into Google and two dozen other companies.[2] Subsequently, he led the investigation of Night Dragon espionage operation of the Western multinational oil and gas companies, and traced them to Song Zhiyue, a Chinese national living in Heze City, Shandong Province.[3]

In late 2011, along with entrepreneur George Kurtz[4][5] and Gregg Marston, Dmitri Alperovitch co-founded and became the chief technology officer of CrowdStrike,[6] a security technology company focused on helping enterprises and governments protect their intellectual property and secrets against cyberespionage and cybercrime. CrowdStrike has brought on board senior FBI executives, such as Shawn Henry, former executive assistant director (EAD) of the FBI's Criminal, Cyber, Response and Services Branch, and Steve Chabinsky, former deputy assistant director of the FBI's Cyber Division. CrowdStrike has received $256 million in funding from Warburg Pincus, Accel Partners, and Google Capital.

Alperovitch was awarded the prestigious Federal 100 Award for his contributions to the U.S. federal information security [7] and was recognized in 2013 and 2015 as one of Washingtonian (magazine)'s Tech Titans for his accomplishments in the field of cybersecurity.

In August 2013, he was selected as one of MIT Technology Review's Top 35 Innovators Under 35, an award previously won by Larry Page, Sergey Brin, and Mark Zuckerberg [8]

In 2016, Politico Magazine featured him as one of "Politico 50" influential thinkers, doers and visionaries transforming American politics[9]

In 2017, Fortune magazine listed Alperovitch in "40 Under 40" annual ranking of the most influential young people in business, along with Emmanuel Macron, Mark Zuckerberg and Serena Williams.[10]

He is a Senior Fellow at the Atlantic Council think tank and was named in December 2013 as one of Foreign Policy's Top 100 Leading Global Thinkers, along with Angela Merkel, John Kerry, Ben Bernanke and Jeff Bezos [11]


Top Visited
Switchboard
Latest
Past week
Past month

NEWS CONTENTS

Old News ;-)

[Jul 09, 2019] So what does a cybersecurity company that is hemorrhaging money and can't protect it's clients do? It does an IPO

Notable quotes:
"... So in the past three years Crowdstrike: ..."
"... a) detected the DNC server hack, but failed to stop it b) falsely accused the Russians of hacking Ukrainian artillery c) failed to prevent the NRCC from being hacked, even though that was why they were hired ..."
"... In other words, Crowdstrike is really bad at their job. In addition, Crowdstrike is really bad at business too. CrowdStrike recorded a net loss last year of $140 million on revenue of $249.8 million, and negative free cash flow of roughly $59 million. ..."
Jul 09, 2019 | caucus99percent.com

So in the past three years Crowdstrike:

a) detected the DNC server hack, but failed to stop it
b) falsely accused the Russians of hacking Ukrainian artillery
c) failed to prevent the NRCC from being hacked, even though that was why they were hired

In other words, Crowdstrike is really bad at their job. In addition, Crowdstrike is really bad at business too. CrowdStrike recorded a net loss last year of $140 million on revenue of $249.8 million, and negative free cash flow of roughly $59 million.

So what does a cybersecurity company that is hemorrhaging money and can't protect it's clients do? It does an IPO .

It just goes to show that "getting it right" is not the same thing as "doing a good job." If you tell the right people what they want to hear, the money will take care of itself.

[Jul 09, 2019] CrowdStrikeOut: Mueller's Own Report Undercuts Its Core Russia Meddling Claims.

Notable quotes:
"... There is strong reason to doubt Mueller's suggestion that an alleged Russian cutout called Guccifer 2.0 supplied the stolen emails to Assange. ..."
"... Mueller's decision not to interview Assange – a central figure who claims Russia was not behind the hack – suggests an unwillingness to explore avenues of evidence on fundamental questions. ..."
"... the government allowed CrowdStrike and the Democratic Party's legal counsel to submit redacted records, meaning CrowdStrike and not the government decided what could be revealed or not regarding evidence of hacking. ..."
"... John Brennan, then director of the CIA, played a seminal and overlooked role in all facets of what became Mueller's investigation: the suspicions that triggered the initial collusion probe; the allegations of Russian interference; and the intelligence assessment that purported to validate the interference allegations that Brennan himself helped generate. Yet Brennan has since revealed himself to be, like CrowdStrike and Steele, hardly a neutral party -- in fact a partisan with a deep animus toward Trump. ..."
Jul 09, 2019 | turcopolier.typepad.com

Which brings me to the newest piece to drop, CrowdStrikeOut: Mueller's Own Report Undercuts Its Core Russia Meddling Claims .

Most of the material in this article will be familiar to regular readers of SST because I wrote about it first. Here are the key conclusions:

I encourage you to read the piece. It is well written and provides an excellent overview of critical events in the flawed investigation.

[Jul 09, 2019] Crowdstrike mode of operation:

Jul 09, 2019 | caucus99percent.com

Whoops, you got hacked? Gee, nothing we could have done. More money please!

I think this is most of the IT biz right here

It just goes to show that "getting it right" is not the same thing as "doing a good job."

If you tell the right people what they want to hear, the money will take care of itself.

It's all about making the people at the top feel smart for having hired you and assuring them they don't need to waste their beautiful minds trying to understand what it is you do.

Whoops, you got hacked? Gee, nothing we could have done. More money please!

[Jun 20, 2019] FBI Never Saw CrowdStrike Unredacted or Final Report on Alleged Russian Hacking Because None was Produced – Consortiumnews

Notable quotes:
"... Yes, but in this particular witch hunt there were no "blind assumptions", as the process was agenda driven from the get-go. The task: Keep/Get Trump out of the White House by any means possible, blame the Russians, divert attention away from the leaked documents, and while you're at it, bury all the crime scene evidence we left lying around because we were so sure Hillary was going to be president. ..."
"... "In total, the amount of new controversies specifically exposed by Guccifer2.0's actions – was very little. The documents he posted online were a mixture of some from the public domain (eg. already been published by OpenSecrets.org in 2009), were manipulated copies of research documents originally created by Lauren Dillon (see attachments) and others or were legitimate, unique documents that were of little significant damage to the DNC. (Such as the DCCC documents) ..."
"... Of particular importance in this regard are the Forensicator's brilliant deductions that G2.0 has at various times been working in time zones corresponding to the US East Coast, West Coast, and Central Zone. (I note that Crowdstrike has facilities in Sunnyvale, CA, St.Louis and Minneapolis – and that the DNC servers are of course on the East Coast.) These findings are complementary to – and in my judgment, more compellingly definitive in dismissing the notion that G2.0 is Russian – than the discoveries highlighted by Bill Binney pointing to transferals by G2.0 and the source of the DNC Wikileaks emails passing through thumbdrives. ..."
"... You emphasize the important fact that G2.0 himself – supposedly a Russian hacker bent on destroying Hillary – posted nothing truly harmful to Hillary's campaign. ..."
"... Adam's linguistic analyses – endorsed by a professor who is expert in this regard – indicate that G2.0 has done a very poor and inconsistent job of mimicking the grammatical errors one would expect from a native Russian speaker communicating in English. ..."
Jun 20, 2019 | consortiumnews.com

Eric32 , June 19, 2019 at 16:04

I don't think this all that hard to understand.

1) The available metadata on the email files showing Hillary/Democrat election corruption that Wikileaks received indicates an in-office leak (maybe copying to a USB thumb drive drive), not an internet hack. That's what Binney is talking about, and he points out that as such, there is no EVIDENCE of Russian intelligence passing the email files showing Hillary/Demo party election corruption to Wikileaks.
Therefore, there is no EVIDENCE of Russia and evil Putin doing this "act of war on the US", as numerous media and politicized fools have claimed.
In normal human dealings, EVIDENCE, not just an accusation, is required before making judgments of guilt and invoking punishments.

2) If that metadata on the subject email files was faked to make it look like an in-office leak (by the Russians), then the FBI could request that NSA make available its data on hacked internet trace routes of packets of data from DNC servers to Russia, then show internet trace routes of packets of data from Russia to Wikileaks.
But apparently, Comey's FBI "investigation" didn't want to do that.

3) The subject DNC computer(s) were never turned over to the FBI. The first thing done in most investigations nowadays by local police, Federal authorities etc., is to seize relevant computers or any other comm. devices for forensic analysis.
No valid FBI investigation dealing with matters of national security, election hacking, validity of the election of a President, would hand off the computer forensics analysis to a company paid by and subject to retaliation by an entity (the Clinton machine, Democrat party) with a huge political stake in the results of the investigation, as was done in this "investigation".

4) The FBI wants leverage over the people they interview in criminal investigations – they have had enormous leverage over Assange, but they never interviewed Assange, who knew how the emails came into Wikileak's hands. They never interviewed Craig Murray, who says he knows a lot of what went on in the matter.

5) Hillary Clinton, the Democrat party, the FBI, the CIA had roles in paying British intelligence agent Steele (and others?), generate a fake dossier about Trump having Russian prostitues urinate on a bed the Obamas had used during a visit Russia, and depravely rolling around in it.
Top level FBI people used that fake dossier to get a FISA court judge to issue surrveilance warrants on Trump campaign/administration personnel in order to spy on them in hope of getting incriminating evidence. Among other things, that's a felony – that is, unless we live in a degenerated police state. That dossier was also leaked to the information media, which then widely gave it wide airing.

6) The attempted destruction of George Papadopoulos, a former Trump campaign adviser, by assorted intelligence operatives and the FBI, brings things down to an individual level.
Papadopoulos has been doing some interesting interviews. Here's one:
https://www.youtube.com/watch?v=ggNWpNZJjNg

hetro , June 19, 2019 at 20:21

Thank you for this:

We have Comey, close to the Crowdstrike chief forensics man (ex-FBI), we have Brennan pushing the Steele Dossier as THE evidence. And we have Mueller using these as main sources while being highly selective with witnesses. And we have FBI agents with Russian origin/double agents working people like Papadoupolis. Given Mueller must have known it was all going nowhere two years ago why the delay? Well, for one thing that delay certainly assisted brainwashing the American public into this hoax.

Bill , June 19, 2019 at 02:59

It looks like Mueller used the Crowdstrike report and just assumed it to be true.

John , June 19, 2019 at 14:57

The crowdstrike report was reviewer and verified by many IT security firms, and their conclusions were collaborated by the CIA, NSA, and every other national security agency in the country. What reason would he have had to doubt it?

Skip Scott , June 20, 2019 at 08:30

You're still trying to sell the "17 agencies" lie too? Unbelievable.

CitizenOne , June 19, 2019 at 01:11

Yup. In the game of disinformation what single characteristic of electronic documents would purveyors of disinformation make sure they did? Would it be to make sure they spell checked the document? Perhaps but more importantly they would be concerned about the ability to test the document by exploring the metadata. In fact since metadata is seldom questioned and is used as evidence for a documents origin it would naturally be a chief concern of the purveyors of disinformation. To not care about it would be the same possible misstep of a person that used a gun in some capacity which required forensic analysis of the weapon to determine who fired it.

Since everybody and their grandma knows that law enforcement looks for fingerprints on the recovered weapon there is generally not anybody who commits an illegal act with a gun who also does not scrupulously wipe down the weapon so it is sure to be free of any fingerprints. The actual occurrence of finding fingerprints on a weapon used in a crime is extremely low approaching zero.

The reason is everybody knows they have to wipe off the gun after firing it to remove their fingerprints. It is the same with metadata which are the electronic fingerprints on a document. Before publishing a document to be attributed to another party everybody knows that the metadata must be dealt with to pull off the con job. To leave this step out is the same thing as leaving ones fingerprints all over the document. Thus it would be a priority in any protocol to deal with this problem and I am sure there are folks in the government intelligence agencies that are skilled at manipulating the metadata on a bit by bit level to wipe off the real origin and to place fake electronic "fingerprints" on the document in order to attribute it to some other author or source.

Any investigation that concludes that a document comes from one source versus another based on metadata overlooks the similar capacity of a man with a gun that shoots another man killing him and then wipes off his fingerprints from the weapon, places the gun in the hands of the victim and claims after a "careful investigation" that the death was a suicide based on the fingerprints found on the gun.

Knowing this is possible the conclusions based on the metadata either assume that the author was an ignorant idiot lacking even the most basic understanding of criminal investigations not even knowing that the electronic fingerprints would get them in trouble or vastly more likely would have known such basic information about how electronic documents are tagged and would do their best to hide the truth by messing with the little ones and zeroes in the document to hide their involvement. They would even likely try to frame the victim as the perpetrator.

We call these situations kangaroo trials or witch hunts. They ignore the plausible reasons for the observed facts and just railroad the process with blind assumptions that the evidence presented is factual like believing a child that accuses the defendant "the bad witch" who cast a spell on her instead of looking at the possible ability and motives of the child to lie and then place appropriate weight on what are essentially unprovable accusations for what they are; impossible to prove.

Maxwell Quest , June 19, 2019 at 13:28

Yes, but in this particular witch hunt there were no "blind assumptions", as the process was agenda driven from the get-go. The task: Keep/Get Trump out of the White House by any means possible, blame the Russians, divert attention away from the leaked documents, and while you're at it, bury all the crime scene evidence we left lying around because we were so sure Hillary was going to be president.

Just like the evening news, this requires the expertise of keeping any facts which do not support your goals safely locked away, while others are manipulated or created out of thin air.

Curious , June 19, 2019 at 00:38

I am no fan of Mr Stone, but I wonder if his attorneys have the authority as a defense, to bring in Crowdstrike personnel and talk about their funding (I can hear the judge say 'inadmissible) and their full unredacted report. To whom did they give their research? Are the FBI that stupid or are they part of the plan?

While they are at it, bring in William Binney as a witness to talk about hacking in general, and the DNC servers in specific. Bring in Guccifer 2.0 himself as a witness, what the heck. Have a witness clarify on the record the very people Mueller never interviewed and make some very valid points as to why he didn't.

If Mr Stone wanted to spend some of his ill-gotten gains by blowing this ruse wide open I'm for it. He would probably recoup a lot of his money on a GoFundMe account if he did it correctly.

Of course he is against a corrupt judge who probably will not let it get that far, but why not try?

hetro , June 18, 2019 at 15:36

Many thanks to Ray's persistence; plus to Norumbega and Mark McCarty in comments below.

Particularly important (updated June 9, 2019), thanks for this link Mark McCarty!

http://g-2.space/

As to the puzzle of Guccifer 2.0 as false GRU hacker revealing damaging info on Clinton (a seeming inconsistency) I found the following (from the link just sited) helpful:

"In total, the amount of new controversies specifically exposed by Guccifer2.0's actions – was very little.
The documents he posted online were a mixture of some from the public domain (eg. already been published by OpenSecrets.org in 2009), were manipulated copies of research documents originally created by Lauren Dillon (see attachments) and others or were legitimate, unique documents that were of little significant damage to the DNC. (Such as the DCCC documents)

"The DCCC documents didn't reveal anything particularly damaging. It did include a list of fundraisers/bundlers but that wasn't likely to cause controversy (the fundraising totals, etc. are likely to end up on sites like OpenSecrets, etc within a year anyway). – It did however trigger 4chan to investigate and a correlation was found between the DNC's best performing bundlers and ambassadorships. – This revelation though, is to be credited to 4chan. – The leaked financial data wasn't, in itself, damaging – and some of the key data will be disclosed publicly in future anyway.

"All of his 'leaks' have been over-hyped non-controversies or were already in the public domain – the only exception being the apparent leaking of personal contact numbers and email addresses of 200 Democrats – and really that was more damaging to the reputation of Wikileaks than causing any real problems for Democrats. – Ultimately, it only really served to give the mainstream press the opportunity to announce that 'leaked emails include personal details of 200 Democrats', again, seemingly an effort to undermine other leaks being released at the same time by legitimate leak publishers."

Mark McCarty , June 18, 2019 at 18:32

Thanks for drawing further attention to Adam Carter's work and wonderful website – he has done a really heroic job of cataloging multiple lines of evidence pointing to Guccifer 2.0 being the furthest thing from a GRU hacker.

Of particular importance in this regard are the Forensicator's brilliant deductions that G2.0 has at various times been working in time zones corresponding to the US East Coast, West Coast, and Central Zone. (I note that Crowdstrike has facilities in Sunnyvale, CA, St.Louis and Minneapolis – and that the DNC servers are of course on the East Coast.) These findings are complementary to – and in my judgment, more compellingly definitive in dismissing the notion that G2.0 is Russian – than the discoveries highlighted by Bill Binney pointing to transferals by G2.0 and the source of the DNC Wikileaks emails passing through thumbdrives.

You emphasize the important fact that G2.0 himself – supposedly a Russian hacker bent on destroying Hillary – posted nothing truly harmful to Hillary's campaign.

Adam's linguistic analyses – endorsed by a professor who is expert in this regard – indicate that G2.0 has done a very poor and inconsistent job of mimicking the grammatical errors one would expect from a native Russian speaker communicating in English.

Adams' website also includes the Forensicator's discoveries showing that G2.0 intentionally placed "Russian fingerprints" in the meta-data of some of his postings. Beyond all this, if a GRU hacker were responsible for the Wikileaks releases, why on earth would he emerge publicly to brag about his exploit while intentionally leaving clues of his Russian origin? Would the GRU employ total nutcases?! Whereas G2.0's behavior makes perfect sense if his intention was to falsely incriminate Russia as the source of the Wikileaks releases.

I have to confess that I have little expertise in computer science, and hence would be susceptible to being bamboozled in this regard by propagandists. It's therefore important to note that I have gained the impression that both Adam Carter and Forensicator are functioning as honest scientific analysts, ready and indeed eager to disavow any of their previous conclusions when they realize they have erred. Intellectual integrity is a very valuable commodity, and my sad observation over the last several years is that it is far, far rarer than intelligence. So I commend Adam's website to those who seek an in-depth understanding on these matters, and are willing to cope with a measure of technical complexity.

John , June 19, 2019 at 00:42

Adam Carter and Foresnicator are frauds.
– "Forensicator" and Adam carter are both fake ID's created by created by a right-wing activist named Tim Leonard with a long history of working on disinformation campaigns.
– The "analysis" he did was gobbledygook to any seasoned IT engineer: Presumption of use of methods, tools and techniques nobody actually uses; essential variables glossed over, etc.
– The data file he "analyzed" was fabricated after the fact
– its creator also posted instructions on how to use it to "prove it wasn't a hack".
– The website where Leonard got the file from was managed by the GRU.

hetro , June 19, 2019 at 12:32

I would be very interested in following you information on this matter, so no need to hesitate longer on presenting whatever it is you have with the details we need to evaluate what you're saying, including links to authoritative sources. And–just a suggestion–leaving off the name-calling and overall emotional presentation you're offering would be a tad more persuasive. At this point, sorry to say, your arguments are thin and unconvincing.

Adam Carter , June 20, 2019 at 08:04

You're citing debunked bullshit invented by Duncan Campbell.

1. I'm left-libertarian, not right-wing.
2. Foreniscator is an American, I am a Brit. Although I write for a US audience, British spellings do sometimes slip into my articles. This doesn't happen in Foreniscator's work. An objective analysis of corpuses of both our work will make clear we're separate people.
3. Campbell is yet to actually debunk Forensicator's work as where Forensicator has debunked Campbell's "Forensicator Fraud" conspiracy theory and just recently dismantled Campbell's "Timestamp Tampering" technical theory too.
4. The NGP-VAN archive has long been available as a torrent (since the time the files were announced/released at a security conference in London), you're reference to "fabricated" here can only relate to Guccifer 2.0's releasing that evidence (though Campbell does try to engage in wordplay to mislead readers into thinking Forensicator or I may have fabricated something and even distorts Binney's testimony to try to make it look like Binney was accusing me of that – it's not true and, thankfully, Binney has cleared this up in an interview for anyone interested in reality.)
5. I got my copy of the NGP-VAN archive from a torrent posted to PirateBay, I don't think the GRU operate TPB.

For full details on how Campbell's nonsense has fallen to pieces, see: http://d3f.uk/duncan-campbell.html

hetro , June 19, 2019 at 15:39

Yes, it is saddening to see the intellectual integrity you speak of disappearing. In this respect I would like to acknowledge one more commenter below, deep in this thread–Eric32.

Seems to me Eric's statement here pierces the façade we've been discussing very well:

"No valid FBI investigation dealing with matters of national security, election hacking, validity of election of a President, would hand off the computer forensics analysis to a company paid by and subject to retaliation by the entity (the Democrat party) with a huge political stake in the results of the investigation."

geeyp , June 18, 2019 at 19:36

hetro – I just got to this material. Does any of it mention what happened to the man who was originally arrested as Guccifer 1.0?

hetro , June 19, 2019 at 12:33

It's my understanding that the original "Guccifer"–at just that, Guccifer, there is no 1.0 on it–, a Romanian, has been in jail for several years and is about to be released, or perhaps has been released. Someone may know.

As an aside (for some amusement only) I can't help noticing in studying this site indications the impersonator G2 was behaving a lot like David Atlee Philips, for those of you who have been looking into the JFK murder, and realize the significance of that name. Philips was fond of theatrics, as was G2 here according to the info on the site. This might suggest CIA creativity in play for this persona.

Again the site is:

http://g-2.space/

geeyp , June 20, 2019 at 00:15

hetro – Yes, I know there is no 1.0 on the original Guccifer's name. I only put it that way to make clear the individual I was timelining (look, I also just made up a new word).

geeyp , June 20, 2019 at 00:19

And ahh, yes. David Atlee Philips. A name that I recall quite well. I started my research into the JFK assassination in 1966.

DW Bartoo , June 18, 2019 at 15:15

The many excellent, informed and very educational, comments on this thread are much appreciated.

Reasoned, comprehensive, and thorough comments, fashioned by articulate, considerate commenters are stellar hallmarks of this site.

My deepest respect to all who contribute to maintaining such standards.

DW Bartoo , June 18, 2019 at 16:15

Especially, I thank, Adam Carter, Mark McCarty, and Norumbega for the education and insights you have provided on this thread and through other links.

Ray McGovern , June 18, 2019 at 21:06

Thanks, DW Bartoo.

And I add my thanks to what you have just expressed for the excellent, data-filled comments appearing under my article. I find the comments rich and instructive and, not for the first time, have learned a lot from them. Even most of the technical info comes through loud and clear to what Bill Binney calls, with sympathy, a "history major."

Dare I express -- again -- my frustration that we cannot get this story into any media that most folks access for their "news" about what's going on. Clearly, there are a lot of smart, knowledgeable people commenting here. Are none of us smart enough to figure out a way to get this story up and out?

I mean, DOJ, in an official Court filing, has just soaked James Comey in deep kimchi; THERE IS NO EVIDENCE THE RUSSIANS HACKED THE DNC. And we can't get that info out? Forgive me, but I fear the fault may not be so much in the stars, as in ourselves.

Let's address this key challenge like right here.

Ray

DW Bartoo , June 19, 2019 at 08:03

Ray, I read your response to my comment rather late last evening, well after eleven, and decided that although I quite agree with you, that the fault may very well be in ourselves and not our stars, that I ought sleep on it.

Odd as this may seem, for well over a decade, I have been chastising myself for having failed in the task I set for myself some sixty years ago.

I have long held it my responsibility to encourage people to think, not what to think or even how, but why, as human beings, living a finite life, on a planet that, for our purposes is paradise, we must engage in thought and consideration, not occasionally, not simply while in school or at work, but as our fundamental expression of consciousness.

Many of us, of a certain age have witnessed the harm our species may inflict upon the air, the water, the very soil around us.

Yet many are unable or unwilling to consider the the inner terrain may be as readily savaged, as callously ignored, as superficially dismissed as extraneous, as some internal "externality", if the thrust of society is dominance, unfettered acquisition, and narcissistic egoism.

Yes, you are absolutely correct, the current "narrative" that Russian hordes, genetically warped and mindlessly indifferent to all that is good, noble, and exceptional, have wrest "control" away from our natural betters, have infiltrated the empty minds of the deplorable, susceptible many, and hijacked the throne away from the anointed one, has led to a plethora of outrageous consequences.

Clearly, to some of us, this is obviously absurdity, but to those whose paychecks depend upon maintaining the tottering status quo, of Full Spectrum Dominance, over all aspects of life and especially over the thought processes of the many, this canard is as necessary as breathing if they are to go on with the comforts and perks of life they have come to depend upon, not merely for bodily well-being, but as proof that they are special, that they deserve to rule and lord it over the many.

So pervasive is this "sensibility", so deliberately inculcated is this sense of righteousness, this "right" to dominate and control,that it is nothing less than pathological.

That means that the larger narratives are shaped by a media owned by a handful of corporations, not just in the U$, but over much of the world, even as corporations, again a small and shrinking number, "own" and control governments, including the legal systems of those governments, readily control institutions of higher learning and so on.

Corporations control the voting systems of our pretend democracy making mock of the very notion of democracy itself, permitting a rising chorus to sing that the very idea of democracy is foolish.

In other words, our culture, our very language is being used to circumscribe thought, to delimit imagination and the formation of new, different, or alternative narratives of how to construct and maintain a sane, humane, and sustainable human future.

Frankly, in the U$, we have no longer even the pretense of an intellectual heritage, of any true openness to new thoughts or perspectives, and those who would dare expose the larger, more pervasive corruption that permits and sustains false narratives such as "Russia did it!", such as Julian Assange, Chelsea Manning, and others, not least the members of VIPS and the commenters here are, at worst, hounded, threatened, imprisioned, at best ignored, maligned, and dismissed as "too negative", or "conspiracy theorists".

Nonetheless.

I see few give up or knuckle under.

I have known more than a few who have died, while still trying.

Yet we still are, overall, a few.

So, what shall we do?

Realizing that our task is neither financially nor socially rewarding, how shall we become more effective at getting some necessary messages across or through walls of fear, indifference and, frankly, induced ignorance?

What, specifically, is our goal?

Is it "simply" to find some way past Mark Twain's observation that it is easier to fool people than to convince them they have been fooled, about some specific narrative?

Or does it require some broader examination of the means by which such narratives are induced, promulgated, and enforced?

Is it both these things and more?

If the inner terrain of consciousness is exploited, savaged, and ravaged, then how shall there be healing sufficient to combat the "learned helplessness" which is the overall intent of those who seek to control, generally not with outward brutality, but with subtle psychological coercion, the many?

It would seem, it would appear, that what we face, the manipulation of consciousness, the internalization of submission, dressed up to appear like patriotism or "common sense" that cannot, rationally, be argued with, an inculcated mesmerization of compliance and diminished curiosity, these things require far more than simply pointing out fallacious narratives to a society convinced that it is so special that it is beyond question of any sort, no matter what might be done in the name of the many.

What do we do?

Perhaps we should try to actually get together, meet each other, sit down and talk to one another.

For are we not vulnerable if we use an electronic, digital media subject to the control of those who may "ban" us, "de-platform" us, determine that we are unworthy of even having a voice, especially as larger "authority" moves to undercut the rule of law to such a degree as to render "law" into an empty form with which it may bludgeon any or all of us into silence whenever it feels like doing so?

Further, if we debunk narratives that need such debunking, what narratives of a better future have we prepared, have we honed, that might inspire a willingness to explore the possibilities of meaningful and vitally necessary change?

Who has coherent ideas about creating a more healthy and rewarding society based on something more like common empathy and mutual support?

Who is articulating visions that might encourage the young to feel that this world that we bequeath them is not royally fucked for the dubious benefit of a mere handful of individuals who care about nothing but themselves.

Certainly it must be appallingly obvious that those who seek dominance and wealth at the expense of others are not the best and brightest, that they are among the least able and least compassionate, in fact, the very ones whose pathology is detrimental to the continued existence of the human species, and that of many other species, as well.

How do we undo the madness, disarm the learned hostility and violence?

Do we simply TALK LOUDER?

Do we simply TOOT OUR OWN HORNS or BEAT OUR OWN DRUMS more obnoxiously?

Or, do we dare continue on, seeking ever more effective connection, ever more opportunities of one to one conversations, where we not only talk, but also, listen?

I agree, let us not curse our stars.

Let us not blame fickle fate, as so often do those who lead the many into war or privation, into precarity, or famine.

Let us not claim that the deteriorating environment is caused by Sun Spots or desperate peoples driven to the brink by exploitation and avarice.

However, let us not imagine that the many who still are comfortable, who still believe the nonsense, may not yet succumb to the siren calls for war, for punishment, however brutal, of those who would expose the secrets of power while exposing the comfortable to their own complicity – which might well be what the still-comfortable might consider to be the greater "crime".

Do I have answers?

No. However I do have questions that might suggest some ideas.

I am very certain that the same is true for most every one of us.

Let us share these ideas, even as we seek to debunk the deceits, as we provide the elite with opportunities to expose and reveal their lies and corruption.

No single one of us will solve much of anything. No one has all the answers.

Those who await saviors, wait in vain.

Our future is very iffy.

If someone has a theory or a plan, beyond keeping on, then please share it.

Do not prattle on about "hope".

Do not say, "Well, we have always muddled through before, and shall do so again."

For we are in territory, outwardly, because of our "abilities" to destroy ourselves unlike anything our species has confronted heretofore.

Yes, "Russiagate" must be debunked before it leads to war.

Yes, humanity is fast approaching a place where it can take no more ..,
for granted and without thought, from a finite world.

Neither can our species long endure further empires of brute power or subtle manipulation.

Do not say, "Well, that is just human nature", for it is learned attitude and prejudice to claim so.

To continue such excuse, for that is what it is, ensures extinction, even for the idiots who "get off" the First Strike.

Now, my intent is not to depress, nor to impress, merely to suggest that such future as we might have is up to us.

So, it might be of worth to not spend too much time cursing ourselves for failing to make much headway.

It might take calamity to shake the complacent from their happy stupor, it may well require catastrophe.

Perhaps, just perhaps, patient reason might prepare the way for changing minds.

It is the internal terrain that must be pondered, quite as much as the outer manifestations of behavioral absurdity.

Why do so many believe absolute nonsense?

Perhaps they simply cannot access enough imagination to consider anything else, especially if the external mythologies bolster their internal emptiness?

What do you think?

Pissedoffalese , June 20, 2019 at 03:01

You write well. A rarity.

Mark McCarty , June 19, 2019 at 17:20

The challenge we face, Ray, is that most MSM simply will refuse to report FACTS that contradict the official Russophobic Deep State-driven narrative. Note, for example, that the recent revelation that the OPCW censored its own technical experts in preparing its politically-biased conclusions on the Douma "gassing" incident, simply isn't being reported in MSM. Our MSM are now practicing a type of criminality that one would have expected from the "journalists" in Nazi Germany.

There may be one small ray of hope. Tucker Carlson at Fox has been notably contrarian on some issues, and has featured such luminaries as Aaron Mate, Glenn Greenwald, Michael Tracey, and Tulsi Gabbard. Tucker is definitely skeptical about arguments driving us into needless wars and conflicts – he got Iraq wrong, and, unlike most of the journalists who did, he is sincerely penitent – and just a couple of nights ago he actually dared to question whether there is real evidence supporting the "Russian meddling" claim, reporting the essence of THIS ESSAY of YOURS! It is not inconceivable to me that you or Bill Binney might be able to get onto his show. And this might become more likely if prosecutor John Durham begins to look seriously at the "evidence" which Brennan, Clapper, and Comey used to justify their fraudulent ICA.

Tucker's show has the highest ratings on Fox, and he is very skeptical of the rampant Russophobia of our day – he views China as a truer rival. I have no idea how you might get through to him, but perhaps Mate, Greenwald, or Tracey – all major Russiagate skeptics – might have some insights.

And let me take his opportunity to offer my heartfelt thanks for your wonderful essays and your political activism over the years. I've been following your work diligently ever since VIPS emerged in the run up to the Iraq catastrophe.

Fazsha , June 18, 2019 at 13:54

The corruption is well documented on the internet- Comey is immoral.

Carolyn , June 18, 2019 at 09:24

Guccifer 2.0 was another trick of the Dems, created to provide substantiation of Russian hacking of DNC computers. It was the Democrats who produced Guccifer 2.0.

John , June 18, 2019 at 09:51

By that logic, it was the Democrats who sabotaged Hillary Clinton's Convention by releasing supposedly anti-Clinton documents on Wikileaks a day before. That makes no sense.

Skip Scott , June 18, 2019 at 12:41

It makes complete sense, and is the origin of "RussiaGate". They knew Wikileaks was going to release the data they got from a LEAK, so they made up G2 to shift the story and blame it on Russia. With their MSM lackeys playing along it worked like a charm. No MSM ever mentions the damning CONTENTS of the DNC and Podesta emails, just RUSSIA, RUSSIA, RUSSIA! Only I think it was Brennan's baby, with DNC complicity.

DW Bartoo , June 18, 2019 at 16:50

Guccifer 2.0 may well have been Brennan's baby, Skip Scott, although I am more inclined to consider 'twas Crowdstrike which hatched the wee tyke, though Brennan could well have been Godfather.

John , June 19, 2019 at 00:22

Does anyone here have any evidence that Crowdstrike or Brennan created G2?

Stygg , June 19, 2019 at 15:15

Does anyone have any evidence that they didn't? If he's real, surely his existence rests on solid ground.

Adam Carter , June 20, 2019 at 08:20

CrowdStrike claimed Russians hacked in and grabbed opposition research from DNC. Next day Guccifer 2.0 turns up with the opposition research (with files apparently tainted by Russian metadata).

However we learned that the research (and the other document it was mangled with) really came from Podesta's attachments rather than the DNC and we know the Cyrillic metadata/stylesheet entries/etc were introduced through a process that was deliberate and not the result of simply mishandling the files.

So we know Guccifer 2.0 was fabricating evidence and doing so in accordance with the claims CrowdStrike had made the previous day.

Not hard proof but certainly a strange symbiosis. <img alt='' src='https://secure.gravatar.com/avatar/8343f58fddad1153baafd2f05fa5c098?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/8343f58fddad1153baafd2f05fa5c098?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Fazsha , June 18, 2019 at 13:56

Two words: Seth Rich.

Bob Van Noy , June 18, 2019 at 11:08

You're right Carolyn, and Bill Binney can prove it. See video in previous post

DW Bartoo , June 18, 2019 at 16:40

Clearly, Carolyn, Guccifer 2.0 was a confection. If not of the DNC, then, most likely, of CrowdStrike.

Just as clearly, Guccifer 2.0's announcement of being the "hacker" would be mightily useful for those claiming Russia did it, especially if incriminating little identity clues pointing toward unprofessional clumsiness, "Oh my Gawd! The Russians are hacking!", could be strewn about.

Determining such things, seizing upon contrived "sloppiness" and such things, is well beyond my knowledge base. However, imagining the means, the subterfuge that would be used to psychologically manipulate the many, especially considering both "manufactured consent" and "learned helplessness" are both part of the "methodology", we have all long observed, comes far more readily to mind.

Bob Van Noy , June 18, 2019 at 08:34

This article is also available at information clearinghouse and accompanied by a valuable video presentation and exchange that further clarifies what has happened. It also includes yet more insight by William Binney

http://www.informationclearinghouse.info/51776.htm

Bob Van Noy , June 18, 2019 at 08:48

Bill Binney, in that video, makes two very important points 1) That it's important to realize that when this began the opposition research assembled by the Hillary team was being assembled against all possible opposition including the Democrats own Bernie Sanders. And 2) Bill Binney extends the ultimate blame way back to President Ford pardoning Richard Nixon for his Crimes, thus creating the concept of pardoning all previous administrations of guilt. Keep in mind that Cheney and Rumsfeld were on that staff

DW Bartoo , June 18, 2019 at 13:24

Thank you for the link to that Bill Binney – Larry Johnson interview, Bob Van Noy.

It is absolutely a must-view history of what occurred around the Russiagate idiocy that was intentionally contrived to mislead, not only US citizens, but also British subjects and Europeans generally, with the deliberate intention of rekindling the Cold War and building a lock-step willingness among the people to engage in official hostile behavior by the governments involved toward Russia, specifically, but China as well, from the imposition of sanctions and tariffs, to the claims of the "necessity" of First Strike "options", all the way to nuclear warfare.

Beyond that, there are substantive questions that raise issues of criminal behavior, on the part of US intelligence officers, and others, ranging from the sedition of an attempted coup to outright treason.

Yes, it is that serious.

The CIA, the FBI, Brit intelligence, and possibly other "friendly" foreign intelligence agencies, "very likely", conspired to undermine the US election process of 2016 to ensure the election of Hillary Clinton, which many of the actors obviously considered would be a "slam dunk". Meaning simply that their illegal and unConstitutional activities would never be discovered or held to account.

My continuing appreciation to the members of VIPS, to Consortium News, and to other sites that have consistently dared examine, consider, and seek to hold to account those, including members of the political class, who have sought to undermine truth, justice, democracy, and trust for political power and financial gain. The degree of corruption, which must be exposed, held to account, AND punished, is of such a level and destructiveness that, were our society to fail to do these things, we would guarantee the likelihood of our future being nasty, brutish, and short.

OlyaPola , June 18, 2019 at 01:24

" the unintended consequence of poorly executed foreign policy could be the potential end of the U.S. dollar as the world's currency of choice in international trade as nations around the world attempt to minimize the impact of Washington's sanctions."

Unintended consequences are functions of both formulation and implementation both of which do not necessarily restrict the unintended consequences to the " the potential end of the U.S. dollar as the world's currency of choice", a component part of formulation being predicated on notions that " the U.S. dollar (was/is) as the world's currency of choice (rather than a function of coercion in myriad forms).

"Unintended consequences" are consequently functions of intended consequences – an example of the mantra that "The United States sometimes does bad things, but always with good intentions".

John Drake , June 17, 2019 at 21:03

Good follow up on your previous revelations Ray.
"I was making decisions in an environment where Hillary Clinton was sure to be the next president."(Comey) Certainly demonstrates the FBI director's lack of integrity and objectivity. A ladder climber not a real cop, only interested in his career trajectory; willing to fix the intelligence to get along.
So much for serving his country; but it speaks also to the incredible negative influence the Clintons have had on our nation.

David G , June 17, 2019 at 20:51

Has anyone ever asked Comey whether he sought, or why he didn't seek, a court order to seize the DNC server and other relevant hardware? Even the members of Congress who seem inclined to interrogate him a little on this subject are content to let him act like some helpless guy who would've liked to have gotten the computers, but aw shucks, he just couldn't swing it.

(I'm not sure a court order would even have been necessary: cops and the FBI take custody of evidence at crime scenes all the time on their own authority.)

jeffmontanye , June 17, 2019 at 22:46

the fbi also claims, to this day, that it never looked at seth rich's phone or computer.

John , June 18, 2019 at 09:16

You mean, "Why didn't the FBI try to cripple the DNC, but not the RNC, several weeks before a Presidential election, by seizing all the computer systems the national party uses to coordinate political activity and communicate with state party workers?"

Or do you mean seize them after the election, when the systems were already cleaned and/or wiped and rebuilt, all viable evidence long gone?

David G , June 18, 2019 at 12:06

I mean what I asked: why has no one ever put the question directly to Comey?

I'm not sure if your answers to the question I would like to see put to Comey make sense, but they're not an explanation of why he has been spared the effort of supplying such rationales (or possibly better ones) on his own.

David G , June 18, 2019 at 12:42

While you evaded the question I actually asked, your answers might be something like what Comey would say if he were ever confronted on the subject. Of course the only way to find out for sure

In any case, while they're not ridiculous answers, especially compared to what Russia-gate has accustomed us, I'm not ready to buy them either.

The Clinton campaign in its final weeks wasn't being run out of the DNC HQ in DC. It was being run from – brace yourself – the Clinton campaign HQ in Brooklyn (albeit dysfunctionally). The DNC fulfilled its key role months earlier when they rigged the race against Sanders. If you think some disruption at the DNC in the final weeks of the race would have unfairly crippled Hillary's campaign, you should explain exactly how.

For your second point, part of what one might ask Comey is why he didn't get a court order forbidding the DNC from having their systems "cleaned and/or wiped and rebuilt" before the FBI could get a look at them. I don't suppose any operation wants to keep malware (assuming such actually was present) on the premises, but law enforcement isn't known for being super solicitous about such inconveniences when conducting investigations, and the DNC are big boys and girls with more resources than most would have had to draw on to keep the lights on in a pinch – especially if it was for the *patriotic* cause of gathering evidence of the dastardly attack on Democracy Itself by the nefarious, onion-domed, Muscovite menace bearing down on every apple pie and baseball game in the land!

John , June 18, 2019 at 23:46

I didn't evade squat. I answered your implied comment, because your explicit "why didn't Comey" question had no explicit answer.
– No third-party can realistically know "why" anyone does anything, unless that person tells you. Comey didn't. And you asked the question at US, not him.
– Since the explicit question was unanswerable, that meant your question only had implicit answers.

When you asked why didn't Comey try to get a court order to seize the DNC computers, you implied he SHOULD HAVE attempted to seize them, (with a lesser implication that only some guilt or nefarious purpose was behind Comey's decision not to.)
– I simply provided some of the very realistic reasons why the FBI should NOT have atttempted the acts you implied Comey should have done.

John , June 19, 2019 at 00:00

And let me remind you – the DNC was not just assisting with the Clinton campaign.
– They were supporting Congressional, State and even local elections up-and-down the ticket.
– They were coordinating canvasing groups, running polls and supplying resources to all sorts of down-ticket efforts.

So your FBI seizing the DNC computers would have hamstrung EVERY Democratic candidate, not just Clinton.

And all your "big boys and girls" comments disregards the big problem – the DNC would have be DOWN. For a while.

DW Bartoo , June 19, 2019 at 11:40

Interesting assertion, John, that Hillary and the DNC were supporting local and state committees and candidates.

Likely you have neither seen nor heard of FEC (Federal Election Commission) records which paint a rather different picture?

The "Hillary Victory Fund" claimed that Clinton raised big "bundled" checks of $350,000.00, and more, some $84 million in total, of which the states got to keep 1% (such an elite number), according to the FEC, which regarded this money as "laundered" through "legal loopholes", using the state committees to pass the cash on to the Clinton Campaign.

Further, the FEC, revealed that the DNC has paid Clinton $1.65 million to rent access to her email list, voter data, and software produced by "Hillary For America" during her 2016 presidential campaign.

Now, you can argue an number of things.

You can just say, "It ain't so!", offering nothing to support your contentions, thus implying that the Legacy Political Parties AND the status quo are simply above question or reproach. That such parties are not only above the law, but owe no allegiance, in any way, to the many, that these two parties are Private Clubs, not public institutions, and can do, or not do, anything that they wish.

Or, you could say that the DNC owes Hillary because she financed the DNC, in 2016, and that the "Victory" funds and the "rental fee" are merely her due.

Of course, were you to claim the latter, then you would have to make clear that such financing involved neither control nor guid pro quo, that it was simple generosity in theone instance and merely "business", in the other.

Following on with quo, do you imagine, "looking forward", that Biden will win in 2020?

Should the Dems seriously fight for medical care (not insurance) for all?

Should the Dems call for an end to endless war, or go all in for drone, AI, and robots to further "humanitarian interevention" (of course, we have to kill some folks, how else to ensure peace)?

Should the Dems have interest in preserving the environment (you know, for the kids)?

Should the Dems be for an actual, functioning rule of law (not lip service; think Julian Assange and Chelsea Manning, are the receiving justice)?

Or, should the Dems just run on, "We ain't him!"

I realize that you would likely not wish to presume what the Dems should or should not do, that being speculative and not "normal"
procedure.

Having said all that, John, and realizing that your perspective differs greatly from the perspectives of many, here, I appreciate the civility of your comments. <img alt='' src='https://secure.gravatar.com/avatar/41a9461a080acb5ce5be55f471100a9e?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/41a9461a080acb5ce5be55f471100a9e?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

John , June 19, 2019 at 12:49

Nice cherry picking and misrepresentation, DW Bartoo.

The DNC did a whole bunch of other fundrasing besides the "Hillary Victory Fund".
– The "Hillary Victory Fund" was setup to take money excplicitly just for Clinton, and raise ~$85 million.
– However the DNC in total raised about $350 million for the 2016 campaign. The rest of the money went elsewhere.
– You cherry-picked the "Hillary Victory Fund" spending and made it look like it represented the entire DNC spending, when it didn't.

Misrepresnetations like this do nothing to boost your credibility. <img alt='' src='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

DW Bartoo , June 19, 2019 at 14:01

So, John, you are going with, "It just ain't so!".

Yet you have nothing to say about the Democrats being a Private Club which has no allegiance, of any sort, to the many?

That is the essential aspect which 2016 revealed.

2020 presents a perfect vision of total failure for the Di$mal Dollar Dem$.

A rallying cry of, "We ain't Trump, we Biden!",
will take you, all, down and out.

The Dustbin of History awaits, truly s most well-deserved, well-earned fate.

BTW, your accusatory comment, some distance up-thread, reveals not skill in honest debate, the factual refutation of or challenge to the perspective of others, but the slander of
ad-hominem assault. <img alt='' src='https://secure.gravatar.com/avatar/b6aff30e494a12fc94f4a2e6847c27b0?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/b6aff30e494a12fc94f4a2e6847c27b0?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Skip Scott , June 19, 2019 at 14:24

With the resources the DNC had at its disposal, the down time could have been minimal. Your telling me they couldn't afford to replace the equipment and have it set up and keep the down time to a matter of hours or less? <img alt='' src='https://secure.gravatar.com/avatar/113284c81cd9a82e0d194ce5f7039233?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/113284c81cd9a82e0d194ce5f7039233?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

philnc , June 19, 2019 at 18:31

" the DNC would have been DOWN. FOr a while." Doubtful. Any enterprise of the DNC's size, whatever e-mail service it uses, should maintain (or contract for) regular backups of their data and have a DR (Disaster Recovery) plan to restore service in the event the existing servers go offline without warning. If they failed to take those measures then it should raise questions about whether there was anything "big" about the people running that operation. <img alt='' src='https://secure.gravatar.com/avatar/e4ddc63bb6791a32d847a14c7f904a41?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/e4ddc63bb6791a32d847a14c7f904a41?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Pissedoffalese , June 20, 2019 at 03:35

I love you, the way you write anyway. Yer probably a one-toothed old shit living out in the middle of Kentucky, but you turn a nice phrase.

tom , June 19, 2019 at 16:24

Wasnt that a crime scene?

Mark McCarty , June 17, 2019 at 17:28

With respect to the creation of the Marble Framework program, I would like to ask: What can be the legal or ethical basis of creation of a tool that enables hacks to be falsely attributable to others? Such an action, even if used against a foe, would be intolerably vile. I suggest that anyone who engaged in the creation of this program should be fired, stripped of all pensions, indicted, tried, and sentenced to a lengthy prison term. Indeed, anyone in our government who would tolerate such conduct should be finding another line of work.

jeffmontanye , June 17, 2019 at 22:48

i'm willing to wait on that trial if we can expedite the mass murder trials of 9-11. trump has said it was bombs not planes that destroyed the wtc.

geeyp , June 18, 2019 at 19:43

Good one, Jeff. We should start where this all started.

Norumbega , June 18, 2019 at 06:08

To my understanding Marble Framework was a subset of tools within the what has been called Vault 7. One of the tools within that subset, I forget what its name actually is, is the language "obfuscation" tool that everybody talks about.

I would say "it just goes with the territory". Hacking as such is illegal by definition and it stands to reason that hackers will take what steps they can to disguise their own identity. Conversely, solid attribution to particular actors is said to be generally very difficult.

But see my reply to John, below, reporting a new discovery of fraud in the malware samples CrowdStrike put in its report. If confirmed, that would indeed be vile and shocking conduct. We're talking about ratcheting up tensions toward war as a result of this, and fundamentally deceiving the American people.

And see my reply to John A giving my opinion that the focus on Vault 7 misdirects attention that would better be directed toward the actual steps that were used to put those "Russian fingerprints" into some Guccifer 2.0 metadata, as already fairly well understood by analysts like Adam Carter.

Pissedoffalese , June 20, 2019 at 03:44

FIRED???

Firing SQUAD more like.

That'd be MY pleasure, but I'm kinda warped.

Jim Glover , June 17, 2019 at 16:54

Well this helps explain why Pelosi knows that Impeachment of Trump will not only fail but blow up in their face.

Andrew Thomas , June 17, 2019 at 18:53

Only because of their utterly imbecilic reliance on this made-up scenario. The Dems are obviously convinced that the made up crap about Muslims that has led to the outrage of the Muslim ban, the lies about the border emergency, the savaging of all of our laws by ICE on the border, the self-dealing, etc. etc. ad infinitum, though obviously impeachable offenses, wouldn't play well among soccer moms or hockey dads or whatever group it is counting on in 2020.

jeffmontanye , June 17, 2019 at 22:50

donald trump is a lucky man, but perhaps his greatest good fortune is history's choice of his opponents.

Eric32 , June 17, 2019 at 16:29

The Federal "justice" system can create crimes that never happened, avoid collecting evidence that would prove these crimes didn't happen, issue subpoenas and warrants, force people into bankruptcy hiring lawyers, interrogate people until they can entrap them in statements and actions that they can pretend are lies or obstructions to "justice", put innocent people in lockups with violent street criminals, into solitary confinement to debilitate them mentally and physically.

And why not? If you can publicly murder a President and then obviously cover it up and pin it on a patsy, with no consequences, then the Clinton coverups and political destruction operations are a small thing.

Washington networks have long deep histories.
Or is it just a coincidence that Mueller's wife is from the Cabell family – one of whom was the assistant CIA director who John Kennedy fired after the failed Bay of Pigs operation, and whose brother was mayor of Dallas when Kennedy was ambushed in rifle attacks, and was revealed in FOIA document releases to have been a CIA associate.

jaycee , June 17, 2019 at 16:26

From manufacturing consent to manufacturing reality There's been a determined effort to use portions of the Mueller Report to not just buttress the notion that an official Russian government operation indeed "hacked" the DNC to support the opposition candidate, but to assume this information as Established Fact. The revelation that the US government investigators relied entirely on a redacted draft from a private firm with huge conflicts of interest severely challenges this concept, and this obvious weak link now joins the sad list of unprofessional conduct including use of the Steele dossier to establish surveillance on a political campaign, and the description of a State Dept informant as a GRU agent even though Mueller's office had the proper information.

As exhibited in comments below, the partisan divide in America is as wide as it has ever been, with two camps hurling insults while believing only what they want to believe irregardless of factual evidence, and a third camp just trying to navigate through what can be objectively determined. In my observation, commentary over the past three years on this story by groups like VIPS have held up pretty well, while most of the legacy media and partisan bloggers such as empty wheel have embarrassed themselves.

Abby , June 18, 2019 at 01:53

The funny thing is that people who buy into this Russian propaganda nonsense is that they excuse Hillary for actually working with people from foreign countries. Steele who wrote the dossier is from the U.K.. He worked with people in Russia and elsewhere to create it. Hillary paid for him to get 'dirt' on her opponent which is against the law. Taking information or anything from a foreign country to advance her campaign. But the biggest stink here is that she used her party's intelligence agencies to spy on her opponent. This sure seems like shades of what Nixon did

But her supporters don't have any problem with that

Abe , June 17, 2019 at 16:18

Google has a cozy $100 million "shared kindred spirit" with "best in class" Crowdstrike.

In this video, Google Capital's Gene Frantz and Dmitri Alperovitch's buddy George Kurtz discuss what led to Google's decision to back Alperovitch and the Keystone Cops at Crowdstrike.
https://www.youtube.com/watch?v=CRMPZp70WVI

CrowdStrike received funding of $156 million from Google Capital, Accel Partners, and private equity firm Warburg Pincus.

According to the company, CrowdStrike customers include three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. CrowdStrike also keeps "Partners" like Amazon Web Services (AWS) and Google Cloud Platform out of the clutches of invisible bears.

CrowdStrike still "stands fully by its analysis and findings" (aka evidence-free allegations) of "Russian intelligence-affiliated adversaries present in the DNC network" in 2016.

Crowdstrike and Bellingcat benefactor Google, the company that runs the most visited website in the world, the company that owns YouTube, is very snugly in bed with the US military-industrial-surveillance complex.

In fact, Google was seed funded by the US National Security Agency (NSA) and Central Intelligence Agency (CIA). The company now enjoys lavish "partnerships" with military contractors like SAIC, Northrop Grumman and Blackbird.

Meanwhile, Crowdstrike is growing very fast. It achieved $250 million in revenue in fiscal year 2019 compared to $119 million in fiscal year 2018, 110% year-over-year growth.

In May 2019, Crowdstrike, filed a SEC Form S-1 to raise $100 million for their initial public offering. It is the first American cybersecurity company to file and IPO in 2019 and second overall after the Israeli company Tufin.

Crowdstrike believes it is creating a new category called the "security cloud."

Given the enormous cloud of smoke blown by Alperovitch and Crowdstrike, there definitely is truth in advertising.

David Otness , June 17, 2019 at 23:53

Thanks, Abe. Keep the truth coming -- while we are yet able.

"The funding of "The Trust Project" -- coming largely from big tech companies like Google; government-connected tech oligarchs like Pierre Omidyar; and the Knight Foundation, a key Newsguard investor -- suggests that an ulterior motive in its tireless promotion of "traditional" mainstream media outlets is to limit the success of dissenting alternatives.
Of particular importance is the fact that the Trust Project's "trust indicators" are already being used to control what news is promoted and suppressed by top search engines like Google and Bing and massive social-media networks like Facebook. Though the descriptions of these "trust indicators" -- eight of which are currently in use -- are publicly available, the way they are being used by major tech and social media companies is not."
" .Even if its effort to promote "trust" in establishment media fail, its embedded-code hidden within participating news sites allow those establishment outlets to skirt the same algorithms currently targeting their independent competition, making such issues of "trust" largely irrelevant as it moves to homogenize the online media landscape in favor of mainstream media."
https://www.mintpressnews.com/the-trust-project-big-media-and-silicon-valleys-weaponized-algorithms-silence-dissent/259030/?fbclid=IwAR26cfboaHlUptEt4Lnt4NToqFRRLfmC5xzqqJx6DAAgZTqZD8PDSJADwvQ

michael , June 18, 2019 at 07:17

Their more competent (and dangerous) partner:
https://www.nytimes.com/2019/01/13/business/media/democrats-disinformation-election-interference.html

https://techcrunch.com/2018/08/28/new-knowledge-just-raised-11-million-more-to-flag-and-fight-social-media-disinformation-meant-to-bring-down-companies/

hetro , June 17, 2019 at 15:58

The trolls/propagandists are arriving again with their silly BS about being patriots and not "communists" etc. plus assuming they're in a nest of Trump supporters and Putin lovers. Their ignorance of CN, and the pathetic, childlike quality of these comments, resembles the five year old disappointed with his birthday party.

I'm looking forward to a complete narrative of details on what has been revealed, piece by piece, going back to at least when Assange announced he had a leak on the Podesta emails and the DNC.

The case, in general, and putting it mildly, indicates Official Bias to discredit Trump–clung to, expanded, drummed home in the daily news, and given the semblance of seriousness by an already compromised Mueller investigation.

I realize that to want this case detailed, as part of the question what US official credibility is left, if any? is to be a horrible commie freak SOB supporter of Putin, when I should be saluting the flag and genuflecting toward Washington.

Abe , June 17, 2019 at 15:50

Actual espionage and infiltration of election systems by Israeli intelligence, not to mention direct interference in US electoral politics by the pro-Israel Lobby organizations backed by the Israeli government is being assiduously ignored by most mainstream and independent journalists, as well as veteran intelligence professionals.

Not a peep, nary a whisper from our vaunted VIPS about such matters as this:

"Following the 2016 election and the heavily promoted concerns about 'Russian hackers' infiltrating election systems, federal agencies like the NSA have used that threat to lobby for greater control over American democracy. For instance, during a 2017 hearing then-NSA Director Adm. Mike Rogers stated:

"'If we define election infrastructure as critical to the nation and we are directed by the president or the secretary, I can apply our capabilities in partnership with others – because we won't be the only ones, the Department of Homeland Security, the FBI – I can apply those capabilities proactively with some of the owners of those systems.'

"With Rogers – who is now employed by the Microsoft-funded and Israeli military intelligence-connected company Team8 – having lobbied for the direct involvement of U.S. government agencies, including the NSA and DHS, in supervising elections, it seems likely that ElectionGuard will help enable those agencies to surveill U.S. elections with particular ease, especially given Microsoft's past of behind-the-scenes collaboration with the NSA.

"Given that ElectionGuard's system as currently described is neither as 'secure' nor as 'verifiable' as Microsoft is claiming, it seems clear that the conflicts of interests of its developers, particularly their connections to the U.S. and Israeli militaries, are a recipe for disaster and tantamount to a takeover of the American election system by the military-industrial complex."

Microsoft's ElectionGuard a Trojan Horse for a Military-Industrial Takeover of US Elections
By Whitney Webb
https://www.mintpressnews.com/microsoft-electionguard-a-trojan-horse-for-a-military-industrial-takeover-of-us-elections/258732/

Skip Scott , June 18, 2019 at 07:29

Remember when Karl Rove (aka turd blossom) had his meltdown on fox news over the Ohio vote count. He just knew Romney was going to win that state, but somehow his fix got "unfixed" by the counter hacking group "anonymous". Well, now our so-called "Intelligence" agencies and their corporate sidekicks are going to make sure there are no more surprises. Elections are going to be even more of a useless show than they already are. Zappa was truly prescient when he said "politics is the entertainment division of the Military Industrial Complex."

Here's a good story on Rove in 2012:
https://truthout.org/articles/anonymous-karl-rove-and-2012-election-fix/

Realist , June 18, 2019 at 16:25

Good recollection, Skip. I had completely forgotten that little nugget, as probably did most other people. Our brains are so slipshod, we create our own memory holes big enough for the villains to drive a dumptruck through.

I can also appreciate your caution about all further elections. Will they be entirely orchestrated by the string pullers who make the final choice by simply creating the numbers out of thin air? If so, will the candidates themselves also be clued in to prevent a meltdown like Hillary Clinton's never-ending tirade?

John Hawk , June 17, 2019 at 15:06

Comey: lying through his butthole!, longtime bagman for the Demorat elites and a traitor to boot!

Abe , June 17, 2019 at 15:02

"Thousands of emails from the DNC server were published by WikiLeaks in July 2016 revealing that the DNC interfered in the Democratic primary process to favor former Secretary of State Hillary Clinton over Senator Bernie Sanders for the party's presidential nomination" notes veteran intelligence professional Ray McGovern.

Can't Say Why:

Two weeks ahead of the Democratic National Convention, celebrating a "revolution" worthy of the CIA, sheepdog Bernie pledged his fealty to Hillary: "I intend to do everything I can to make certain she will be the next president of the United States."

Hillary crowed, "Senator Sanders has brought people off the sidelines and into the political process. He has energized and inspired a generation of young people who care deeply about our country."

She imperiously declared, "To everyone here and everyone cross the country who poured your heart and soul into Senator Sanders' campaign: Thank you."

Bernie had performed his sheepdog function by exciting the Democratic Party's liberal base and winning young voters by large margins during the primary.

The Sanders campaign won primaries and caucuses in 22 states.

But Bernie spat in the face of his "revolution" by not energetically fighting efforts at black voter suppression, and not effectively contesting the votes in states like California and Arizona, as was his campaign's right by law.

Long after Hillary clinched the nomination with California, sheepdog Bernie continued to hold rallies and advocate for his "revolution", which not only served the interests of the Trump campaign, but very effectively delayed incensed Sanders supporters from migrating to third party tickets.

Green Party leader Jill Stein correctly remarked: "A revolution that goes back under Hillary Clinton's wing is not a revolution."

Black Agenda Report editor Glen Ford described the debacle:

"Bernie Sanders did not lie to his followers; they deceived themselves, just as most of them – the ones that were old enough – had fooled themselves into believing that Barack Obama was a peace candidate and a political progressive back in 2008, although Obama's actual record and policy pronouncements showed him clearly to be a corporate imperialist warmonger – a political twin of his principal primary election opponent, Hillary Clinton and her philandering, huckster husband.

"Back then, phony leftists like Bill Fletcher and Tom Hayden swore on their mothers' honor that Obama's campaign was really a people's movement, a prelude to revolution – as if the Democrats, a militarist corporate political party, could give birth to an anti-corporate, anti-militarist people's revolution.

"Real Fascist vs. Trump Cartoon Version

"Bernie Sanders threw around the word 'revolution' quite a bit. He was still using it in his surrender speech on Tuesday [July 12, 2016], assuring his flock that the revolution would continue as he marched arm in arm with the most dangerous person in the world, today – far more dangerous than Donald Trump [ ] Sanders' job is to shepherd his flock into a little leftwing corner of Hillary's Big Tent, right next to the latrine and alongside her loyal Black Democrats, who are so meek in the presence of power that they won't even complain about the smell."

https://www.blackagendareport.com/bernie_endorses_greatest_evil

Bernie's own behavior during and after the "revolution" belies this prattle about CIA "derailment" of a "Sanders insurgency".

A guy who once urged once urged abolishing CIA, Bernie now can't get enough of fact-free claims by "intelligence agencies".

Bloviating with Wolf Blitzer in CNN's Situation Room on 10 May 2017, Bernie declared: "Our intelligence agencies all agree that [Russia] interfered significantly in the American election."

"This is an investigation that has to go forward," he said.

Bernie wasn't so keen on investigation when American votes were at stake during the "revolution" in 2016.

To summarize:

What better way for the CIA to thwart a "revolution" against "intelligence agencies" than to have the Dems front an "insurgent" sheepdog candidate who would not only throw the "fight" at critical moments, but turn around and praise the BS produced by the very "intelligence agencies" he previously sought to abolish.

Put that in your vape and smoke it, kids.

And why is it that all these "intelligence agencies" have nothing whatsoever to say about Israeli intelligence operatives and Israeli interference in the US electoral process?

Let's hear our vaunted veteran intelligence professionals 'splain' that.

David Otness , June 18, 2019 at 00:01

Again, Abe -- Keep bringing it while we still can.
Thanks for your courage and honesty.

Abby , June 18, 2019 at 02:14

Outstanding comment, Abe! This is exactly who and what Bernie is and here he is doing it again. People who were upset with him doing that last time are once again getting ready to back his candidacy and when he betrays them again they will wonder why.

Bernie has signed on to the Russian interference nonsense and tells people that Vlad is controlling Trump and he also says that Madura must step down. He was asked after the election if Hillary had won it fair and square and he said yes knowing damn well that she rigged it against him.

As for the big elephant in the room no one ever talks about how Israel has congress in its pocket.

Maxwell Quest , June 18, 2019 at 23:03

Abe, thanks so much for ripping off Bernie's little revolutionary fig leaf and stomping it into the dirt. It really made my day.

EchoDelta , June 17, 2019 at 14:55

Garbage, embarrassing garbage and magical thinking from an Ahab with a fan club.

Address why Roger Stone is now claiming Russians did hack the DNC? And https://www.emptywheel.net/2019/05/15/cloud-computing-and-the-single-server/ splain this?

Otherwise admit you're a red hat brownshirt or profiteering like Alex Jones from gullible chuckleheads.

well oh boy , June 17, 2019 at 15:22

Emptywheel? Isn't this the same person who still thinks Russia elected Trump..? The one who revealed her source to the FBI? Doesn't seem like a journalist at all. What are her credentials?

certainquirk , June 17, 2019 at 15:28

Troll. Starve.

nwwoods , June 17, 2019 at 17:32

Indisputable fact:
Comey has committed purgery under oath
Clapper has commited purgery under oath
Brennan has commited purgery under oath
This is a matter of public record that is beyond dispute.
Your faith-based belief in the Russiagate conspiracy theory is entirely grounded in the baseless assertions of three confirmed liars who have provided precisely zero evidence in support of their claims.

Andrew Thomas , June 17, 2019 at 18:34

That is a completely inappropriate comment. Stone's lawyers filed a discovery request for the documents. That is not the same thing as expecting to believe their contents.

Anne Jaclard , June 17, 2019 at 18:58

This is a garbage comment. @EmptyWheel is just another blue-check pseudo-left journalist who outright promoted the idea that Trump is Putin's puppet before the Mueller Report revealed that to be untrue https://mobile.twitter.com/emptywheel/status/821348649108205569 . I don't know how much CN pays but I'm sure Ray isn't making the big bucks of conspiracy theorist Jones, let alone conspiracy theorists David Corn and Rachel Maddow.

Even the Democratic Party is focusing on propping up their neoliberal leader, Biden, and is not wishing to defend a failed theory exploited by the DNC as an excuse for why they failed to defeat Donald Trump. Their rigging of the primaries, detailed in the WikiLeaks documents, ensured a Trump victory which has seen massive ecological devistation, right-wing ghouls appointed to the Supreme Court, and multiple wars or war scares. I get that they want to hide their and Hillary's personal responsibility, and that the elite as a whole wants to cover up the failed system they have established, but we should be focused on the Sanders campaign and beating Trump in 2020, or grassroots work on saving the environment and helping organize working people.

I thought RussiaGate was false from the moment Hillary blamed Putin for the leaks this time three years ago. It's good to be vindicated, but I'm not really interested in the Trump-Barr counterinvestigation, either, I, like probably most other people, just want the whole thing to be over with.

But the fact that this fake narrative continues to be perpetuated makes me have second thoughts, sometimes.

Robbin Milne , June 17, 2019 at 19:37

Empty wheel Marcy wheeler isn't a credible source.

Michael Keenan , June 17, 2019 at 19:46

She forgot to keep her chastity belt on when she went to Mueller. Still not sure why.

Michael Keenan , June 17, 2019 at 19:39

No such claim dimwit.

Abby , June 18, 2019 at 02:17

lol! You're quoting emptywheel? Oh boy she is so far out there on this Russian propaganda nonsense I don't recognize her from when she was sane back on daily kos. But then they have bought into too.

I think that you are the one who needs to wake up. Tell us what evidence Mueller or anyone has shown us that proves Russia did the deed? I'll wait

DW Bartoo , June 18, 2019 at 18:14

Actually, Echo Delta, according to a link Realist has provided on the thread of a later article, here at CN, Stone and his attorneys are insisting that the government must provide actual proof that Russia hacked the DNC, and the government is claiming, apparently, that it is not subject to any such burden as providing actual proof.

This will be very interesting to observe.

Either the rule of law demands actual proof, or the "rule" has become so very bent that it has broken and disappeared entirely, leaving behind merely an empty nothing that may be shaped, twisted, or sculpted into whatever "authority" may wish, to whatever ends power desires or insists upon.

Vera Gottlieb , June 17, 2019 at 14:28

Oh, enough of this already. Keep distracting people so as not to pay attention to more important matters. Enough!

jmg , June 17, 2019 at 17:07

Vera, "this" is what started the "Russia has attacked us!" hysteria, the new McCarthyist xenophobia, the new Cold War, the new arms race, the Doomsday Clock's current "two minutes to midnight" (first time since 1953), etc. So, if in fact Russia didn't attack, it has some importance.

David G , June 17, 2019 at 20:21

Ikr? And this when people have already stopped arguing about the Game of Thrones finale. Get your priorities straight, everybody talking about things corporate media isn't instructing you to!

bjd , June 18, 2019 at 06:33

Go away and be an obedient believer then.

jb , June 17, 2019 at 13:33

Has VIPS said anything about the possibility of a hack first, followed by a leak? (The Nation?)

Michael Keenan , June 17, 2019 at 19:23

Password was used to enter DCCC and then DNC. George Webbs theory. So that would put us somewhere in between a hack and leak?
https://www.youtube.com/watch?v=sFbCiVzbVYE&t=426s

John , June 17, 2019 at 22:30

In fact, VIPS had some evidence (since discredited as falsified) of a possible leak. They hyped it as "disproving" any hack. If you want nuanced analysis, don't go to VIPS.

David Otness , June 18, 2019 at 00:06

"YOU" say–without any backup to your assertion.
Nice.
New around here, aincha?
I wonder why

Adam Carter , June 18, 2019 at 13:05

Some parties did make broad and sweeping assertions on evidence that really only related to Guccifer 2.0's releases and they probably should have been more cautious.

However, the underlying research (showing that Guccifer 2.0 moved files around via thumbdrive and then archived them almost 2 months later with Eastern timezone settings in effect) has not been discredited as falsified.

Someone did cook up a highly speculative conspiracy theory and a flawed technical theory to try to support the premise that there was a conspiracy and that files were tampered with but it didn't work out too well for them. (Forensicator debunked their primary conspiratorial claims within a month and just recently dismantled their timestamp tampering theory too.) :)

John , June 19, 2019 at 01:04

Tim Leonard (real name for Adam Carter): The "research" was gobbledygook.
– Even if someone believed every word of your "analysis", it still disregards many variables about how data is handle, and presumes that people used tools, methods and communication techniques no one actually uses in real life, making it stink to high heaven.
– And,of course, nothing can be realistically "proven" from a data file whose source cannot be verified.

And stop referring to yourself as "forensicator" in the third person. It's embarrassing.

Adam Carter , June 20, 2019 at 08:32

As my other response to your defamation here made clear. Forensicator and I are separate people and even a basic corpus analysis of our work outputs would make that clear.

Also, where have I (or Forensicator) "presumed that people used tools, methods and communication techniques no one actually uses in real life" specifically? <img alt='' src='https://secure.gravatar.com/avatar/60bc797ed7bf0b955e33c4c30a8cd58d?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/60bc797ed7bf0b955e33c4c30a8cd58d?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Eric32 , June 18, 2019 at 13:53

You're not very good at this.

The NSA probably has the greatest computer forensics capability in the world – Comey's FBI investigation never asked them to analyze these leaks?/hacks? by internet tracking and hard drive analysis.

No real investigation would depend on consultants paid by interested parties when it could do it itself or through the NSA.

As for hard drive forensic analysis, people who actually know about computer forensics say that the way to make hard disk data irretrievable is to PHYSICALLY destroy the HD plates. Drilling multiple holes through the HD including all the plates is what most of them do. "Cleaning"? No.

John , June 19, 2019 at 01:22

Actually A LOT of investigations rely heavily on computer security consultants and non-FBI security staff. It happen every day. Banks hand off forensic data collected by consultants all the time to the FBI. The word for it in court is "expert witness".

And while the only surefire way to destroy data is to destroy the HD, simply deleting and overwriting it would mangle the **** out of it, making it hard to determine what file the scraps of data are from, when they were written, and if they were ever executed. Basically making it useless to anyone wanting to build a case with it.

Eric32 , June 19, 2019 at 12:51

No, what you're saying does not hold up to analysis or common sense.
There's no big mystery about this – Binney and his retired intelligence associates figured it out early on.

No valid FBI investigation dealing with matters of national security, election hacking, validity of election of a President, would hand off the computer forensics analysis to a company paid by and subject to retaliation by the entity (the Democrat party) with a huge political stake in the results of the investigation.

The Clinton / Democrat party story line was Russian hacking, Russian influenced President Trump, poor victim Hillary.

Private businesses often do leak/hack investigations through private consultants because they fear the (business) consequences of the investigative information becoming public or into criminal prosecution, just like the people controlling the Democrat party feared having the actual method of the email data showing Clinton corruption and Democrat party corruption becoming public was due to an internal leak, not an over the internet hack.

The FBI wants leverage over the people they interview for info – they had enormous leverage over Assange, but they never interviewed Assange, who knew how the emails came into Wikileak's hands. They never interviewed Craig Murray, who says he knows lot of what went on in the matter.

There's no big mystery about this – Binney and his retired intelligence associates figured it out early on. <img alt='' src='https://secure.gravatar.com/avatar/fc8854fd58bb283290bad6a933dca5bd?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/fc8854fd58bb283290bad6a933dca5bd?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Curious , June 19, 2019 at 00:48

If it was a hack, or even a partial hack the NSA would have the forensics and the copies. Please explain why they have not released this information to anyone in authority.

Pancho Vanilla , June 17, 2019 at 13:20

Seth Rich

Lorri Strawser , June 17, 2019 at 13:18

If I hide someone who is being sought for murder, I will still be charged with harboring a fugitive, even if they later decide that the person Ic was hiding, didn't do it.
And instruction is Justice, is obstruction of Justice, no matter how the lawyers and politicians try to spin it.

LJ , June 17, 2019 at 19:22

Bill Walton, NBA Hall of Fame, sports announcer, dad and all that was once heard to utter on National Television, shortly after winning an NBA Title with the Portland Trailblazers, regarding possible guests of an A-Frame he owned out in the sticks somewhere (As I recall regarding SLA alums Jake and Emily Harris >), " I would never Co-operate with a Fascistic Organization like the CIA". Oh the Times they are a Changin' and have been for what 45 years now.

Pablo Diablo , June 17, 2019 at 11:45

All of this has been an effective distraction to WHAT was in those emails. Far worse than WHO hacked/leaked them.

AnneR , June 17, 2019 at 12:34

So very true, Pablo. And distraction from the content – so well managed by the MSM – was the intent behind this whole lying farrago.

Pancho Vanilla , June 17, 2019 at 13:21

Amen!

Ruth , June 17, 2019 at 14:04

That is so true.

David G , June 17, 2019 at 20:16

Can't be said too often. And the media misdirection began immediately after the DNC docs were published, largely crowding out coverage of the substance from then until today. Among other things, this is why it's so wrong to even credit/blame Wikileaks for Trump's victory.

Debbie Wasserman Schultz and Donna Brazile took one for the team, but the big story of DNC dishonesty was relegated to the vast sea of true things that, as Harold Pinter put it, "never happened".

John , June 18, 2019 at 09:56

WHAT was in those emails was basically nothing. No coordination with Clinton, no orders or actions to deliberately sabotage Sanders. Just a handful of snarky comments by a few staffers.

Linda Wood , June 18, 2019 at 13:52

No. DNC emails evidence crimes of money laundering and entering into agreements with state officials to close polling places in order to disadvantage Sanders voters.

http://thefederalist.com/2018/04/24/bombshell-fec-records-indicate-hillary-campaign-illegally-laundered-84-million

https://www.mockingbirdpaper.com/content/leaked-emails-prove-dnc-suppressed-voters-favor-clinton-rhode-island

http://linkis.com/wikileaks.org/dnc-em/zxSHn

Sent: Monday, April 25, 2016 6:30 PM To: CaucusGroup; Wilson, Erin; Wei, Shu-Yen; Miranda, Luis; Pratt Wiley; Jefferson, Deshundra Subject: Problem brewing in Rhode Island New report shows RI gov't opening only a fraction of polling locations: http://www.bustle.com/articles/156771-why-is-rhode-island-closing-its-primary-polls-voters-need-to-check-their-polling-locations Bernie leads Hillary by 4 in the latest poll: http://www.publicpolicypolling.com/main/2016/04/clinton-sanders-close-in-ctpari-trump-headed-for-big-wins.html If she outperforms this polling, the Bernie camp will go nuts and allege misconduct. They'll probably complain regardless, actually. We might want to get out in front of this one with an inquiry to the RI Gov, even though she's one of ours.

Linda Wood , June 18, 2019 at 15:03

The DNC emails include evidence of crimes of money laundering and of entering into agreements with state officials to close polling places in order to disadvantage Sanders voters.

http://thefederalist.com/2018/04/24/bombshell-fec-records-indicate-hillary-campaign-illegally-laundered-84-million

http://linkis.com/wikileaks.org/dnc-em/zxSHn

Skip Scott , June 19, 2019 at 06:55

John-

This comment, more than any other, exposes your goal to obfuscate the truth and further a propaganda narrative. They were not "basically nothing". They showed that Clinton holds "private" positions separate from her "public" positions, and is therefore a self-confessed liar. They showed that she used her position as SoS to get large donations from foreigners for the Clinton Foundation. They showed she was involved in cheating and given debate questions ahead of the actual debates. They showed coordination with the DNC to sabotage the Sanders campaign. They showed she had inside connections to quash the investigation into the use of her private server and mishandling of classified information as SoS. They showed her own staff was worried about her health and found her "often confused". I could go on. Here is a link with some of the more serious findings thanks to Wikileaks.

http://www.trueactivist.com/the-20-most-damning-revelations-from-wikileaks/2/

Skip Scott , June 20, 2019 at 05:38

HEY JOHN .. HEY JOHN .. Crickets.

John , June 17, 2019 at 11:06

Did anyone here actually read Crowdstrike's publicly issued report? The traffic patterns, malware examples and code samples were MORE than enough to conclude Russia did the hacking.

I doubt Crowdstrike even MADE a "unredacted" report everyone here is asking for.

Some data may have been excluded, like sniffed usernames and passwords, but a good security company never publishes use4rnames and passwords of their clients.

Ruth the Truth , June 17, 2019 at 12:58

RE: your question, "Did anyone read Crowdstrike's report?" Ray McGovern read it and so did the rest of VIPS, Veteran Intelligence Professionals for Sanity. I read parts of it, but don't know anything about computer hacking, so I have to depend on what experts say about it. You say you've seen enough evidence, can you help me understand how you know that Crowdstrike did not plant that evidence? I'm skeptical. Doesn't it bother you that the FBI did not do their own investigation? Why not? It seems to me that it's like me telling the police, "My house was robbed, and I know the Russian guys who live next door did it" "My evidence? Well, I destroyed the actual evidence, but I do have this report from my own private security company and they are really reliable. The best people." I'm sure in that instance, you would not accept my word for it- how is this situation different? I don't understand how a private security firms report is evidence. Why weren't the servers examined by law enforcement, which the FBI admits would have been best? Why wasn't Assange interviewed? There was not a thorough investigation-why not? I still need more evidence to draw a conclusion-Can you answer my questions?

michael , June 17, 2019 at 13:43

Essentially the DNC destroyed any evidence of a crime. As Hillary herself has said "No evidence, no crime". As federal judge Zloch noted, the DNC is not a government agency, it is not a public company, it is essentially like a yacht club or country club (that can do whatever it wants as far as backstabbing members and determining candidates). It follows that any crime against such a club is inconsequential, or the Federal Bureau of Investigation would have been all over it. Since it was trivial, why bother?
And Crowdstrike may not have had the skills to mimic Russian hacking, they sound like total incompetents (perfect for muddying the water).
But New Knowledge, which was reported by the New York Times to have interfered in the Alabama Senate Election by pretending to be Russian hackers, DID have the skills, as well as having former NSA employees familiar with Vault 7 tools. They're likely Guccifer 2.o and possibly the "only Russians" involved.

Ruth the Truth , June 17, 2019 at 14:08

Thank you. I'll google more about "New Knowledge" and Alabama Senate Election.

Skip Scott , June 17, 2019 at 14:37

Notice how John ignores questions he has no answer for. Typical acute TDS. Also examine who Crowdstrike is and ask yourself how they could ever be trusted.

John , June 17, 2019 at 14:12

I am exactly ZERO surprised the servers were not sent to the FBI.
– In 25 years of IT security and many virus/hack cleanups, I have NEVER NEVER NEVER seen servers shipped to the FBI for investigation.
– IN ALL CASES the hacked equipment was cleaned and reused. Even at Microsoft. THIS IS THE NORM.

I can't imaging the DNC shutting down all their systems, spending piles of money on new duplicate hardware, and terminating all campaign operations for a week while they recover on new hardware, weeks before a Presidential election.
– Especially since the systems were ALREADY CLEANED, and there was essentially nothing new for the FBI to learn from them.

Eric32 , June 17, 2019 at 17:11

LOL. From the FBI's site:

Computer Forensic Science

Computer forensic science was created to address the specific and articulated needs of law enforcement to make the most of this new form of electronic evidence. Computer forensic science is the science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media. As a forensic discipline, nothing since DNA technology has had such a large potential effect on specific types of investigations and prosecutions as computer forensic science.

Computer forensic science is, at its core, different from most traditional forensic disciplines. The computer material that is examined and the techniques available to the examiner are products of a market-driven private sector. Furthermore, in contrast to traditional forensic analyses, there commonly is a requirement to perform computer examinations at virtually any physical location, not only in a controlled laboratory setting. Rather than producing interpretative conclusions, as in many forensic disciplines, computer forensic science produces direct information and data that may have significance in a case. This type of direct data collection has wide-ranging implications for both the relationship between the investigator and the forensic scientist and the work product of the forensic computer examination

Piotr Berman , June 17, 2019 at 17:23

If the virus/hack cleanups you have witnessed lead to indictments. then I imagine it would be imperative to establish a custody chain for evidence. As a semi-layman, I imagine that it would suffice if FBI made copies of the content of the storage, confirmed that it has "hack signature" described by the private experts and made their own determination if this signature does constitute a proof. However, tracing a hacker is usually pointless and fruitless, so the systems are cleaned and that is that. NEVERTHELESS, Mueller made indictments based on the evidence that had no chain of custody but rather was "hearsay".

At least some elements of the "signature" were very suspicious to me. For example, using name Felix which is not a Russian name, but which belongs to Feliks Dzier?y?ski, a Pole who was the first head of a Soviet internal security and who died in 1926. Far a young Russian hacker it would be somewhat improbable, but to a foreigner who knows very few facts about Russia, Felix is easy to remember. Same with Bear. It was totally a trademark how a Western foreigner images Russians to behave. Same with switching from Latin to Cyrillic keyboard mode in the middle of coding to type a single Russian word.

Anne Jaclard , June 17, 2019 at 19:00

Hell, Felix's name is probably known among many hardcore Sanders supporters as a key Soviet socialist figure. <img alt='' src='https://secure.gravatar.com/avatar/41a9461a080acb5ce5be55f471100a9e?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/41a9461a080acb5ce5be55f471100a9e?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

John , June 17, 2019 at 23:01

Crowdstrike's technology for tracking hackers is impressive.
– They can follow every single command and data flow between hackers' command systems and the hacking victim's systems and security log it with timestamps in audited and access-controlled systems.
– Those logs follow chain-of-custody rules, and constitute some of the most powerful evidence a hacking victim can bring to court. <img alt='' src='https://secure.gravatar.com/avatar/11a4450c3a58a847d47fe0242886a044?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/11a4450c3a58a847d47fe0242886a044?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

David G , June 17, 2019 at 19:57

Those may be reasons the DNC wouldn't have wanted to give their hardware to the FBI, but they aren't reasons for the FBI not to have sought a court order and seized it.

John , June 18, 2019 at 09:21

So, if the FBI had crippled the DNC a few weeks before the election by seizing all the computers running their email systems, calendars, contacts, planning and legal documents, group schedules and coordination plans with state and local party workers, you would have happier? <img alt='' src='https://secure.gravatar.com/avatar/76bb487d22067fb08deace74db4f7c27?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/76bb487d22067fb08deace74db4f7c27?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Will , June 17, 2019 at 20:47

stop making sense John.

Andy W , June 17, 2019 at 21:10

You're missing the point, John. This has been portrayed as "an act of war against the United States of America" on par with the 9/11 terrorist attacks or the Japanese bombing of Pearl Harbor. The normal procedures for virus/hack cleanups don't apply because this isn't a normal event.

This isn't about some clown planting malware to mine bitcoins. This is supposed to be a dire threat to our national security, and it calls for a different response.

This isn't about normal IT work like removing malware and patching vulnerabilities so everybody can get back to work. This is about attribution and accurately identifying the hackers -- and since a nuclear superpower is the suspected culprit it's especially important that we get this right.

The investigation should have been led by the FBI, not by CrowdStrike. The FBI should have been the one sharing images of the DNC's servers with CrowdStrike, not the other way around. The FBI should have been the one sharing it's redacted findings with CrowdStrike, not the other way around.

John , June 17, 2019 at 22:40

Wrong – the behaviour of the DNC, Crowdstrike, and the FBI was completely about "normal IT work" for several quite a while.

It was not until WEEKS later, when Wikileaks began publishing internal DNC documents the day before the Convention that this became an issue.

HINDSITE IS 20/20. <img alt='' src='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

DW Bartoo , June 18, 2019 at 14:49

On April 11, 2019, NPR,
Nation Public Radio, carried story about WikiLeaks and Julian Assange by David Welna.

"12 Years of Disruption:
A WikiLeaks Timeline".

I am curious about your perspective about Jillian Assange, primarily because you said this.

"It was not until WEEKS later, when WikiLeaks began publishing internal DNC documents the day before the convention that this became an issue."

Would "this" be what you consider to be "normal IT work", John?

Essentially that any rigorous examination of the claim of "Russian hacking", BY the FBI, would have hindered what might be termed, based on your assertion, "business as usual"?

Especially, if the computers were to be considered evidence, as that, if I understand your grave concern, would have cost Crowdstrike too much time and money and would have harmed Hillary and the DNC, is that the gist of it?

Frankly, that seems quite akin to notion of "too big", too important, to be treated to an actual rule of law, reminiscent of "too big to fail, too big to jail".

Of course, as soon as the claim was made, not by WikiLeaks, but by politicians, that Russia had "hacked" those computers, some later even called the alleged "hack" an "act of war", then, at the moment of the assertion, the comfortable (and convenient) "normal IT work" perspective has, and had, no validity.

Under a functioning rule of law, a chain of evidence, not hearsay, is required.

Unless we accept either an empty form of law or a multi-tiered legal system, both of which make mock of rule of law, then evidence, genuine and actual, must take precedence over comfort, convenience, or convention.

The lack of substantive evidence regarding the "hack" is quite as destructive to the whole Russia did it BS as is the use of the Steele Dossier to establish "collusion".

For both taint the two cases, long held to be so related as to be conjoined.

The lack of evidence of hacking, cannot be made something by mere assertion, and the Dossier is evidence of what is known as a "poison tree" and all things growing from are known as "fruits of the poison tree.

So, John, my question for you is this.

Should Jullian Assange be locked up, not merely for offending official authority, but also for causing so much embarrassment for "normal IT work"? <img alt='' src='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

DW Bartoo , June 18, 2019 at 14:51

The comment above is addressed to, John. <img alt='' src='https://secure.gravatar.com/avatar/b9764e24a3ebbd21a94e2ab7bdb4ff3b?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/b9764e24a3ebbd21a94e2ab7bdb4ff3b?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Andy W , June 18, 2019 at 17:32

@John – No hindsight was needed. The DNC should have brought in the FBI the second they realized their internal files and communications had been compromised regardless of who did it or why. The theft of this data is the digital equivalent of Watergate, and the Democrats should have turned the matter over to the FBI to figure out who was responsible, not to some private IT company that they paid for themselves.

What if the shoe was on the other foot? What if internal documents from the Trump Organization had shown-up on Wikileaks. Suppose Donald Trump said the Democrats stole the documents and used that accusation to justify punitive measures against them. Then suppose Trump wiped his servers so the only evidence anyone had to go on was what a private cyber security company that he was paying provided. And suppose the co-founder of Trump's private cyber security company also happened to be a senior member of the Heritage Foundation. Would any of that arouse your suspicion, because that's basically what we're looking at here.

CrowdStrike's co-founder is a senior fellow at the Atlantic Council, which has a long standing animus towards Russia. CrowdStrike's findings are being used to justify sanctions and other punitive measures against Russia and nobody can independently corroborate CrowdStrike's findings because the servers have been wiped.

The Democratic party is a political organization with a political agenda, and so is the Atlantic Council. You can't just take them or their surrogates at their word. <img alt='' src='https://secure.gravatar.com/avatar/9950659fea3b1c6f3208f41c8cf53d42?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/9950659fea3b1c6f3208f41c8cf53d42?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

bjd , June 18, 2019 at 06:41

If you clean and reuse, you lose the license to make statements and allegations based on what you just bleachbitted.
Nice try to shift focus.
You're a believer and are out of line here on VIPS.
You're not even a competent IT professional, with your 'clean' and 'reuse'-mantra.

John , June 18, 2019 at 10:59

Actually, just telling you what I see. Nobody spends the money to buy new hardware after a hack attack.
– To my knowledge, only a handful of multi-billion dollar banks and defense contractors have ever preserved hardware after an attack, and only in exceptionally rare cases.
– Even when I have recommended full rebuild on new hardware, I was overridden by the customer or management.

Seeing something nefarious in the DNC having acted just like any other organization of its size in a similar situation is a sign you don't understand the subject. <img alt='' src='https://secure.gravatar.com/avatar/91a95ef8eb08348e0e20b1824a4f4a42?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/91a95ef8eb08348e0e20b1824a4f4a42?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

LJ , June 18, 2019 at 15:53

Oh brother? Are you a clown? Don't be silly. That is a leap of faith when Bill and Hillary were meeting publicly on a plane on a tarmac with Attorney General Lynch after an investigation was in progress. The reason there was an immediate investigation going on and Comey was compelled to intervene and whitewash the situation was to try and save the validity of the electoral process , the credibity of the Department of Justice and the credibility and objectivity of investigations by the FBI. And just what of the precedence of using an absurd and obviously phony and unverifiable dossier attributed to a BRIT Clown from MI6, hired by the Clinton Campaign, to secure a FISA warrant to investigate and hopefully discredit the campaign of the presumptive, no the actual nominee of the opposition party? Let's just forget all that. Your point is ridiculous and your experience is of no value in the real world that we all witnessed in real time. No doubt, the people and corporations that paid for your services and expertise knew what they were getting when they hired you and I have no doubt you did a bang up job. Keep it in your own lane. It's safe there. We don't want none of that Seth Rich business unless it is absolutely unavoidable.

Deniz , June 18, 2019 at 19:19

My guess is that John is here to protect the value of his stock options. <img alt='' src='https://secure.gravatar.com/avatar/00d3a299e0c6a14584450a161456a6e8?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/00d3a299e0c6a14584450a161456a6e8?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

David Otness , June 17, 2019 at 18:43

Bravo, Ruth. (I got a good chuckle from your straight-ahead, quite civil rebuke of what *John* posits.)
Now will he respond at all, let alone without deflection and/or obfuscation?
Yer move, Johnny

John , June 19, 2019 at 14:51

I am fairly confident Crowdstrike did NOT falsify claims or evidence based on a combination of the following reasons:
– Their reports, analysis and conclusions were made public, and were reviewed by several competing security firms. No firm with experience in IT forensics disagreed.
– Their report on tools and files found, infection and control methods and pwershell coding were technically viable and reasonable for a hacking attack. No "Where did they get this" moments you find in flimsier analyses.
– The reports were fat with background and supporting info to read as a "evidence leads to conclusions" report instead "conclusions lead to evidence" reports which tend to be fat with conclusions and skimpy on background info.
– There have been no murmurs or leaks of "they faked this" from inside Crowdstrike. All the "faking" claims are coming from people far outside the company with no security expertise.
– IT Security people tend to be pretty libertarian, so I doubt Crowdstrike could have actually "faked" anything without generating a mini-revolt by the people involved.
– Crowdstrike has MASSIVE incentives to deal honestly in the IT Security field. They do criminal and fraud investigation work for banks, and anything that risks that would be very stupid. (Note: motive evidence tends to be weak, but I included it anyway.)

Now if someone can present evidence that DID fake it, beyond association or speculation about motive, I'm willing to listen.

John A , June 17, 2019 at 14:08

Traffic patterns as in how Wikileaks has already shown the CIA can create false trails?

Norumbega , June 17, 2019 at 16:48

The CIA's ability to "create false trails" maybe somewhat interesting in itself, but I would urge caution in drawing a connection, even just a speculative one, between this capability and the "Russian fingerprints" in the metadata of some of the files released by Guccifer 2.0. As far as I can see, the two situations are completely different. This is a point on which I disagree with Ray McGovern, insofar as his repeated emphasis on the point has the effect of misleading many into looking in a direction which is very unlikely to be related to the actual solution of the Guccifer 2.0 "Russian fingerprints" issue. Most of the rest of his excellent article I agree with.

The CIA clearly has computer hacking capabilities. And one of the tools in its Marble Framework toolbox is software specifically engineered to _disguise its own hacking activities_ by leaving accompanying "clues" in several foreign languages (namely, ones spoken in so-considered adversary states).

With the G-2 materials, are we then possibly presented with something that was actually hacked by the CIA, the said hack having been disguised as the work of Russia by means of "Russian fingerprints" added by means of the automated software program revealed in Vault 7?

I cannot see how this could be so, given that I don't believe that the G-2 materials were obtained by means of a remote hack (even though Guccifer 2.0 did _claim_ to be a "lone hacker" and to have obtained his materials by that means). And if the G-2 materials were not obtained by a hack at all, then ipso facto they were not obtained by a CIA hack. Furthermore, although I am not an expert, it seems to me that researchers like Adam Carter have analyzed the series of steps that were actually taken to produce the "Russian fingerprints" in the metadata of the documents that G-2 released, and produced a plausible account of how this was done. This account does not include anything that relates to Vault 7 software. In my opinion, Ray McGovern would do well to direct people toward Adam Carter's work instead of misdirecting them toward Vault 7.

Norumbega , June 17, 2019 at 16:12

Are you aware that Bruce Leidl has claimed in the last few days to have discovered clear evidence that the malware samples CrowdStrike produced were fraudulently recycled from an earlier hack of the Joint Chiefs of Staff?

He wrote on Twitter, June 12: "There was no APT29 hack of the DNC at all. I know this because crowdstrike produced fraudulent malware samples, you know, like they always do."

"The seaduke samples are recycled from the joint chiefs incident. I (and others) know bc they dun goofed stripping the relevant metadata."

And (June 12): "I'll be deleting this tweet and the prior one soon due to suspected lurks on my TL. It's too late in the game for me to sock up."

"The samples were compiled (by cozybear) on 7/30/15 and 8/4/15"

"JCS email hack was 7/25/15 – 8/6/15"

"Not much room for plausible deniability there."

There followed some exchanges with Stephen McIntyre and Larry Beech, which may be of interest to people with technical backgrounds.

There are many other public reasons to suspect that something is amiss in the official version of the timeline, notably the highly implausible claim that WikiLeaks only received the supposedly hacked emails from Guccifer 2.0 during July 14 -18, 2016, leaving far too little time for WikiLeaks to review them for authenticity and publication value before they actually did release them on July 22, and after Julian Assange had already announced more than a month earlier that WikiLeaks already at that time possessed "leaks" related to Hillary Clinton, in the form of "emails" which it planned to publish.

Mark McCarty , June 17, 2019 at 18:45

For those who are technically proficient, this essay by Adam Carter provides evidence that 2/3 of the "Fancy Bear (APT28)" malware which Crowdstrike claimed had been implanted in the DNC in spring of 2016 had in fact been compiled AFTER the date on which Crowdstrike was brought into the DNC servers in early May 2016. In other words, this suggests that Crowdstrike may have created this supposed hack.

https://disobedientmedia.com/2017/12/fancy-frauds-bogus-bears-malware-mimicry/

Crowdstrike's claims also appear absurd in light of the fact that the latest DNC email published by Wikileaks was written on April 25 – three weeks AFTER Crowdstrike installed its Falcon anti-hacking program on the DNC computers.

I reason as follows: Adam Carter, Forensicator, and VIPS have provided a range of compelling evidence that, far from being a GRU hacker, Guccifer 2.0 was a construct, operating within US time zones and most likely controlled by Crowdstrike, intended to falsely incriminate Russian hackers as the source of the DNC emails subsequently released by Wikileaks.

http://g-2.space/

As Norumbega indicates, Mueller's tale of how G2.0 allegedly transferred the DNC emails to Wikileaks is absurd on its face.

https://caucus99percent.com/content/mueller%E2%80%99s-new-indictment%E2%80%8A%E2%80%94%E2%80%8Ado-feds-take-us-idiots

But there is a conundrum – Assange stated on June 12 that Wikileaks would soon be releasing "material related to Hillary" . But he did not indicate that this material was DNC emails (indeed, many may have thought he was referring to Hillary's erased SOS private server emails). It is clear that, when Crowdstrike and G2.0 made claims in the next 2-3 days that the DNC server had been hacked and that G2.0 had provided the hacked emails to Wikileaks (note the inconsistency with Mueller's claims!), that they had GUESSED that Assange had been referring to DNC emails. I propose that this was a very educated guess, and that our intelligence agencies had tipped the DNC off to the fact that someone at the DNC was proposing to send leaked emails to Wikileaks. This indeed seems likely if Sy Hersh's informant inside the FBI is correct, and Seth Rich had offered sample emails to Wikileaks, asking for payment for a subsequent large trove. It's reasonable to suspect that the NSA had been attempting to capture all communications to and from Wikileaks, and thus could have intercepted this communication. They could then have informed the DNC that someone on their staff was planning to leak to Wikileaks. That's when Crowdstrike was brought in, and the strategem hatched to fake a GRU hack and attribute the subsequent Wikileaks release to the Russian state.

https://caucus99percent.com/content/how-did-crowdstrikeguccifer-20-know-wikileaks-was-planning-release-dnc-emails

This scenario makes sense only if the DNC was not initially informed that Seth Rich was the source of the impending leak, presumably because he had not been legally unmasked at the time. Otherwise, Seth would have been summarily fired.

The creators of the G2.0 farce were betting Hillary's campaign on it. Which means that the real source of the leak would have to be silenced to prevent unmasking of their hoax. If the perpetrators of the hoax subsequently learned that Seth was the source, eliminating him would have been a high priority.

If someone has an alternative explanation of these facts, of equal or greater plausibility, I would be pleased to read it.

Skip Scott , June 18, 2019 at 08:06

Norumbega and Mark-

Thank you for your comments. I have seen this "John" around here before, and he always tries to make the case for Crowdstrike. I also notice that whenever there is something he can't account for he goes silent, or just goes back to regurgitating the same garbage.

One of the underlying themes of RussiaGate is that those evil Ruskies made Trump president, and that he is somehow beholden to them. This is an obvious psy-op with the purpose of distracting from the CONTENTS of the emails, which are mind blowing for their exposure of the shameless duplicity of the Hillary campaign and the DNC. And of course the secondary purpose is to prevent Trump from seeking detente with Russia. In my opinion, even if the Russians were the source, we'd owe them a big THANK YOU.

I believe in freedom of speech, and I think I should be free to speak my mind to anyone on any subject. I also believe that even the Russians have the same right. There is no way that freedom of speech can subvert democracy. In fact, it is essential.

The MSM's job is to control the narrative, and the internet is giving them fits. Sites like CN are a big thorn in their side. Thanks for being part of it. Your comments are invaluable.

Mark F. McCarty , June 18, 2019 at 11:21

Many thanks Skip. You make a point that I've also raised.

As you can imagine, I've quite a number of times been labeled a "Putin puppet" or "Russian troll" while trying to shed some light on the Russiagate hoax on social media. My response is that, if in fact I were in thrall to "the Russians", then I would be eager to give them CREDIT for doing the job that our MSM failed to do, revealing the crass bias of the DNC against Bernie. But I only give credit where credit is due! I suspect our thanks are due to poor Seth Rich.

As to all the "progressives" who are so enraged about the DNC/Podesta Wikileaks releases, may they rot in Hell. The REAL reason that Trump was elected was not the journalism of Wikileaks – revealing TRUTH that the public was entitled to – but to the DNC's efforts to ram Hillary – the most blood-drenched woman in history, a mega-grifter lacking in any intellectual integrity whatever, reviled by a high proportion of the American public – down the throats of the Democratic Party and the American people <img alt='' src='https://secure.gravatar.com/avatar/8f568de5ac740a16f5812668b8c4be09?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/8f568de5ac740a16f5812668b8c4be09?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Norumbega , June 18, 2019 at 21:46

These are interesting speculations, worth thinking about.

Two quick thoughts:

Bruce Leidl and Larry Beech are working on the hypothesis that the people behind G-2 didn't actually know (or have) what was in WikiLeaks' possession, until just prior to July 14, when the FBI reported results of its examination of SR's computer.

About possible NSA involvement and possible use of "masked" records. I would consider what we are now hearing regarding NSA database abuses by private FBI contractors, and their use in "unmaskings" of US citizens. I have even read one claim that CrowdStrike was among those private FBI contractors. The names are redacted in Judge Rosemary Collyer's April 26, 2017 FISA court opinion.

Skip Scott , June 20, 2019 at 05:47

I think this is a very important point, and explains motive for SR's murder, and for the timing of the creation of the G-2 propaganda ploy. If Barr really does pursue all possible leads, I think it will end up tying into SR's murder. However, I've seen this type of play before, and I expect more theater and very little truth from Barr. I pray I'm wrong. <img alt='' src='https://secure.gravatar.com/avatar/a0f545087d25ad6fe70115f62665de86?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/a0f545087d25ad6fe70115f62665de86?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Adam Carter , June 20, 2019 at 08:48

The first shift to using attachments that were later found in WikiLeaks' DNC emails observed in Guccifer 2.0's releases came at the very end of June 2016.

A few days later (July 6, 2016) he published a batch that was entirely DNC email attachments (including a document that revealed it had been edited using LibreOffice 6 by someone with Eastern timezone settings in effect). ;)

Source attribution and leak attachment correlation information is available at: https://theforensicator.wordpress.com/guccifer-2s-russian-breadcrumbs/ <img alt='' src='https://secure.gravatar.com/avatar/a0f545087d25ad6fe70115f62665de86?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/a0f545087d25ad6fe70115f62665de86?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Adam Carter , June 18, 2019 at 13:52

There were a bunch of out-of-context IOCs produced by CrowdStrike and when researching the malware samples, we learned most of the APT28 malware was compiled while CrowdStrike were installing Falcon at the DNC.

Putting questions that raises aside, the existence of the Marble framework shows us that relying on code and malware samples for attribution alone isn't entirely reliable.

More significant than all the above, though, is that we saw no incident specific evidence (evidence relating to email exfiltration events) or even had confirmation of the dates on which exfiltration of the DNC's emails occurred and these are things that CS, with Falcon installed across the network, should have recorded and been able to accurately report on.

The report lacked critical information regarding events and any observed/recorded malware activity (not much beyond identifying presence/discovery and what the malware was theoretically capable of).

Brian James , June 17, 2019 at 10:49

May 26, 2019 Trump Scares Swamp with Declassification Move

Ohr-Fusion GPS caught deleting emails; and yet ANOTHER Clinton email cover-up .Latest Judicial Watch Update

https://www.investmentwatchblog.com/trump-scares-swamp-with-declassification-move-ohr-fusion-gps-caught-deleting-emails-and-yet-another-clinton-email-cover-up-latest-judicial-watch-update/

Jeff Harrison , June 17, 2019 at 10:12

So much for the so-called "rule of law". The government has been playing Calvinball for some time now. Making up the rules as they went to make sure that they win and you lose.

dag , June 17, 2019 at 09:45

Regardless what people might think about Russia, Vladimir Putin, WikiLeaks, Donald Trump, Roger Stone or anyone else, it should be a major cause of concern that the FBI's "investigation" relied completely on the incomplete findings of a private tech company contracted by the DNC.

Had anyone even heard of CrowdStrike before Election 2016? It's absurd that some unknown IT company would be trusted to do forensic analysis of an alleged crime of any sort, much less one that has been described as an "act of war" by a "foreign adversary" and has sent the US political system into a perpetual state of crisis.

James Comey testified that "best practices" would have dictated that the FBI actually physically access the computers. That's the understatement of the century. In fact I would call it gross misconduct and malpractice for the FBI to outsource this responsibility to a private contractor paid for by the DNC. It calls the entire premise of Russiagate into question and anyone who can't see that is being willfully obtuse.

Thanks Ray McGovern for this report and keeping this fundamental issue in the spotlight.

worldblee , June 17, 2019 at 13:22

Like Bellingcat, the genius of CrowdStrike is that they can instantly confirm the results their paymasters have requested. It's so much more efficient than, you know, actually investigating evidence and following the information to an unbiased conclusion.

Noncomunist American Patriot , June 17, 2019 at 13:28

That doesn't change the fact that the Internet Research Agency (kept closely inline with Putin's wishes) interfered with the election, to help Trump and hurt Clinton, as well as the fact that Trumps campaign welcomed the help and had more secretive encounters with Russian agents than all other campaigns combined.
I remember when the Republicans DIDN'T like Russian meddling, and deeply distrusted Russian intentions. Yet less than a year after Russia HELPED Trump get elected – president Trump announces his great new epiphany to put Russia incharge of American cyber security?
Come on, let's elect a president who promises to brown nose our greatest enemy and hand them all of our greatest Intel!
Vote Trump/Putin for 2020!!

John A , June 17, 2019 at 14:11

You call yourself a noncomunist. What is a comunist?

AnneR , June 17, 2019 at 15:52

I think he/she cannot spell. But he/she clearly is Russophobic as well as being ahistorical, not seeming to be aware that Russia is no longer communist, no longer the USSR. But in that he/she hardly differs from the rest of the neo-liberal, Demrat/Republirat crowd.

Ruth the Truth , June 17, 2019 at 15:01

I don't see Russia as "our greatest enemy" and this Russia hysteria is a kind of resurgence of neo-McCarthyism. I think "Russian meddling" was a very minor issue compared to problems that exist within our own system. I'm more worried about voter suppression via "Cross Check", gerrymandering, etc. I'm more worried about campaign financing, and the fact that our elections are controlled by two political parties that apparently are under no obligation to hold fair and open primary elections. I think the Russian threat has been exaggerated and it distracts us from other issues with our election process. I couldn't find anything when I googled "Trump puts Russia in charge of American cyber security" Can you tell me more about this?

AnneR , June 17, 2019 at 16:14

Absolutely, Ruth the Truth. And that's even assuming that Russia did meddle (Russia, of course, seeming to "mean" the Kremlin always).

Yes, voter suppression, especially in the usual southern states is appallingly undemocratic (even assuming that what exists in the western world is, in fact democracy, which is questionable); gerrymandering, too.

And the corporate-capitalists together with two other nations, well, three, in fact: SA, IS and the UK, have far too much sway, one way or another the former two via money the latter via the cozy relationship between the secret services in our politics (and those of other nations).

The money should be stripped away – no lobbying, no donations, none of that. Simply a certain and small sum of money per candidate from the taxes and an electioneering period that is short. And candidates picked by the people, *not* by the party insiders.

David Otness , June 18, 2019 at 21:12

https://www.counterpunch.org/2018/07/27/the-grand-illusion-of-imperial-power/ <img alt='' src='https://secure.gravatar.com/avatar/ddfc8fe9d7877c2e0343c8f07d16df5f?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/ddfc8fe9d7877c2e0343c8f07d16df5f?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

AnneR , June 17, 2019 at 16:04

Your proof that the "IRA" interfered with the election in the Strumpet's favor?

Clearly you would seem to think that dearest Killary would have won but for the Russians – never mind that she ignored the three crucial swing states that determined the Electoral College outcome which in its turn decided which candidate won. The problem lies in both Killary's court and in the existence of the Electoral College – a deliberate stumbling block, erected by those much fawned over FFs to ensure that the great bewildered herd would *not* be the ones to decide, ultimately, who won the presidency.

Your proof that Russia is "our greatest enemy"?

Oh – they're Russian and they won't allow us, god's gift to humanity, to plunder and pillage their natural resources for our benefit not theirs. They want a multi-polar world in which every nation state is sovereign and not at under the hegemonic boot of the Anglo-Americans. Of course, they're our enemy, silly me for thinking that they have sensible people in their government and we have bloodthirsty, hypocritical psychopaths who are all linked arm in arm with the corporate-capitalist elites in ours.

And – talking about interfering in our election??? The sheer hypocrisy of menacing Russia over something that this country has done on a regular basis to other nations is, well, bloody mind-blowing.

Paul Merrell , June 17, 2019 at 17:54

@ "That doesn't change the fact that the Internet Research Agency (kept closely inline with Putin's wishes) interfered with the election, to help Trump and hurt Clinton "

Why so? Robert Mueller has a huge credibility problem and particularly so in his Internet Research Agency ("IRA") indictment, from the day of its announcement. See e.g., https://www.moonofalabama.org/2018/02/mueller-indictement-the-russian-influence-is-a-commercial-marketing-scheme.html

It was downhill from there. Mueller apparently assumed he would never have to prove his case since the U.S. has no extradition treaty with Russia and the indictment charged only 13 Russians and 3 Russian corporations. But surprise for him! One of the Russian corporations (Concord Management and Consulting ("Concord") showed up in court and asked to plead not guilty. Mueller immediately began backspinning, arguing that the court could not accept the plea because Concord had not been served with the indictment. The Court had no difficulty shutting down that spurious argument, properly ruling that it could attain jurisdiction over the defendant by accepting its not guilty plea.

Then Mueller began trying to avoid providing mandatory discovery allegedly because of an alleged threat to national security and because counsel for Concord might show the documents to other defendants who had not been served (more likely because he could not prove his case). That effort to deny discovery is still continuing. See e.g., government's June 12 motion. https://www.courtlistener.com/recap/gov.uscourts.dcd.193580/gov.uscourts.dcd.193580.24.0.pdf

Then it turned out that another of the charged corporations did not even exist. Mueller had indicted the proverbial ham sandwich.

No one yet knows how that case will turn out, but I would certainly not bet that Mueller got it right, particularly in a case he never thought he would have to prosecute.

@ "Come on, let's elect a president who promises to brown nose our greatest enemy and hand them all of our greatest Intel!"

Has it ever occurred to you that Russia is only our "greatest enemy" because our government has made it so? The fact that the Democratic Party has teamed with the Deep State and military/industrial complex in a glaringly obvious propaganda campaign against Russia counsels restraint and suspicion in regarding Russia as an enemy, unless, of course, you're an unwitting target of the propaganda.

Or didn't you get the memo from Mueller about no collusion with the Russians?

Michael Keenan , June 17, 2019 at 19:30

Not to mention that those charged Russians showed up in court to the surprise of Mueller.

Matt , June 17, 2019 at 23:40

Yes, the IRA agency ran the Face Book Ads that did encourage Democrats to "stay home." But this is not an election "hack," it is a very successful influence campaign. I find it incredulous that Mueller failed to follow the money to the most obvious entity that purchased the services of IRA in the first place- maybe the guy that bought the firm that created the FB targeting algorithm . used to select very specifically the right voters in the right states?

Cambridge Analytica Bannon Mercer

It might be uncomfortable to admit that American Oligarchs and their henchmen exerted the lions share of election "influence."

David G , June 17, 2019 at 19:46

Indeed! When will the free peoples be rid of Putin and the plague of cute puppy pictures he loosed on the poor, helpless U.S.?

https://consortiumnews.com/2017/10/04/the-mystery-of-the-russia-gate-puppies/

bjd , June 18, 2019 at 06:49

In case you hadn't noticed, this isn't exactly the place for dimwits.

David Otness , June 17, 2019 at 19:50

So much of Comey's schtick is predicated on his Boy Scout image that he has cultivated in his many years as an insider Beltway creature and the same goes for Mueller. At least insofar as Mueller can pull off the choirboy effect with his own physical countenance.
As both are former Fibbie Directors (and significantly, buddies,) just think of what kind of dirt they likely hold over so many D.C. pols in their toolkits. J. Edgar Hoover showed the way for his successors and in incestuous D.C. its top sharks always win. Between them they likely have a threatening wherewithal that many careerists in Foggy Bottom fear. And in that incestuous temple we have Comey's brother employed as an attorney with the firm that's keeping financial score for Clinton Inc -- a "charitable" swamp of its own that has broken virtually every rule on what constitutes a legal U.S. non-profit.

It is patently absurd that an FBI Director would allow an outside entity to substitute for the Bureau's criminal investigation authority and its unparalleled means to attain "honest" and complete answers. If it were indeed 'justice' being sought.
Comey's time at the ultra-crooked HSBC bank must have yielded an interesting harvest of favors owed as well, let alone his $ six million dollar salary for his one year working for Lockheed-Martin.

Both of these guys are cover-up artists, 'fixers' frequently in demand, and for good reason, so the powerful can continue their systematic, multi-generational pillage of not only the U.S., but the world as well.
I think this is one of the largest scandals ever in the history of the United States, along with the Kennedy brothers' assassinations, and that of Martin Luther King. The knaves of both parties with their asses hanging out are going all-out to keep the lid on it. Because what's at stake here is the sanctity of the Empire's Matrix of Woo. Our perception of "exceptionalism" and all that rah-rah jazz. For if the believers that glue this country together get wind of the magnitude of its interior rot and far-advanced decline
A lot of people are doing anything and everything (inventing and exacerbating, inviting and callously so) even potential nuclear destruction in a craven attempt to salvage their dubious-already reputations and their place in their lifespan's pecking order. It's screw us and screw the country; and while they're at it: screw the world too.

https://www.counterpunch.org/2017/06/08/comey-and-mueller-russiagates-mythical-heroes/

https://digwithin.net/2018/04/08/muellers-history/

hetro , June 17, 2019 at 09:18

Also take a look at:

"And as the Conservative Treehouse notes: 'This means the FBI and DOJ, and all of the downstream claims by the intelligence apparatus; including the December 2016 Joint Analysis Report and January 2017 Intelligence Community Assessment, all the way to the Weissmann/Mueller report and the continued claims therein; were based on the official intelligence agencies of the U.S. government and the U.S. Department of Justice taking the word of a hired contractor for the Democrat party .. despite their inability to examine the server and/or actually see an unredacted technical forensic report from the investigating contractor'."

And:

"Meanwhile, the Crowdstrike analyst who led forensics on the DNC servers is a former FBI employee who Robert Mueller promoted while head of the agency. It should also be noted that the government of Ukraine admonished Crowdstrike for a report they later retracted and amended, claiming that Russia hacked Ukrainian military."

https://www.zerohedge.com/news/2019-06-16/us-governments-entire-russia-dnc-hacking-narrative-based-redacted-draft-crowdstrike

Skip Scott , June 17, 2019 at 09:01

I am trying to figure out how Julian Assange could prove that it was not Russia without revealing Wikileaks' source for the DNC emails. It is simple enough to prove that it was a leak instead of a hack, but how do you prove the person wasn't a Russian agent without disclosing their identity?

If they could prove that Guccifer 2's stuff was an intelligence agency "vault 7" ploy, it would lend a lot of credibility to the real leak being a disgruntled DNC employee, probably Seth Rich.

Ron , June 17, 2019 at 10:33

Silly. It was Seth Rich who leaked -- the LATE Seth Rich, killed as he recovered from Clinton/Podesta's assassin in an ICU unit that was invaded by a suspicious SWAT team. Craig Murray has broadly hinted so; so has Kim Dotcom.

Skip Scott , June 17, 2019 at 11:44

I am not saying that I believe it was a Russian spy, I am asking how anyone would prove it without divulging the actual leaker, which Wikileaks has claimed they will never do. How do you prove a negative?

Norumbega , June 18, 2019 at 06:39

Skip: Julian Assange could provide evidence that WikiLeaks possessed the DNC emails it published already early June 2016, i.e. by the time he announced that WikiLeaks would soon be publishing leaked emails related to Hillary Clinton.

He could provide internal WikiLeaks communications documenting that work was being done to review these materials for publication between early June and the July 22 release (and specifically prior to their alleged transfer by G-2 on July 14).

These could be done even if the lawyers for Seth's brother Aaron Rich refuse to release Assange from confidentiality obligations, as requested by Ed Butowski's attorney Ty Clevenger.

And, yes, exposure of the persons behind G-2 would certainly help, though I doubt WL will be the one to do that. But people need to stop thinking of "Vault 7 ploys" in this connection, and look instead at the actual work on G-2. My reasons are elaborated in a previous response to John A, above.

Skip Scott , June 18, 2019 at 12:52

I understand that revealing the timing would undercut the G2 story, but without identifying the source how could they prove that the leaker wasn't a Russian spy who infiltrated the DNC staff? I haven't heard them try to sell that one yet, but they might try it when the G2 story and the hacking story falls apart.

Norumbega , June 19, 2019 at 07:22

Comey has already testified that they "think" the "Russians" used a "cut-out". The Mueller report admits in passing that emails (in that context the Podesta emails or the second batch of DNC emails) may have been passed to WikiLeaks by an intermediary in the late summer of 2016. So some, at least may be contemplating such an allegation as a way out. Nevertheless, further information that underlined the falsity of the official timeline would be significant, I think.

Sally Snyder , June 17, 2019 at 07:44

As shown in this article, the entire anti-Russia narrative was built on a lie:

https://viableopposition.blogspot.com/2019/06/washingtons-duplicitous-approach-to.html

Here are, however, serious repercussions that are a result of this lie; the unintended consequence of poorly executed foreign policy could be the potential end of the U.S. dollar as the world's currency of choice in international trade as nations around the world attempt to minimize the impact of Washington's sanctions.

[Jun 19, 2019] Mueller and Russiagate story: The Eternal Witch-hunt

Apr 12, 2019 | counterpunch.org

Mueller looks more and more like a man looking in a black room for a black cat that isn't there, and finding it.

[Jun 18, 2019] Crowdstrike Never Produced Final Report on Alleged Russian Hacking by Ray McGovern

Jun 18, 2019
Notable quotes:
"... In other words CrowdStrike, upon which the FBI relied to conclude that Russia hacked the DNC, never completed a final report and only turned over three redacted drafts to the government. ..."
"... In Stone's motion his lawyers argued: "If the Russian state did not hack the DNC, DCCC, or [Clinton campaign chairman John] Podesta's servers, then Roger Stone was prosecuted for obstructing a congressional investigation into an unproven Russian state hacking conspiracy The issue of whether or not the DNC was hacked is central to the Defendant's defense." ..."
"... Suspicions grew as Comey started referring to CrowdStrike as the "pros that they hired." Doubts became more intense when he referred to CrowdStrike as "a high-class entity." In fact the company had a tarnished reputation for reliability and objectivity well before it was hired by the DNC. ..."
"... Dimitri Alperovitch, a CrowdStrike co-founder, is an opponent of Russian President Vladimir Putin and a senior fellow at the anti-Russian Atlantic Council think tank in Washington. CrowdStrike said it determined that Russia had hacked the DNC server because it found Cyrillic letters in the metadata, as well as the name of the first Soviet intelligence chief – clues an amateur might leave. ..."
"... But the software CrowdStrike used to blame Russia for hacking the DNC server was later revealed to be so faulty it had to be rewritten . ..."
"... VIPS does not believe the June 12, 14, & 15 timing was pure coincidence. Rather, it suggests the start of a preemptive move to associate Russia with anything WikiLeaks might have been about to publish and to "show" that it came from a Russian hack. ..."
"... Why did FBI Director James Comey not simply insist on access to the DNC computers? Surely he could have gotten the appropriate authorization. In early January 2017, reacting to media reports that the FBI never asked for access, Comey told the Senate Intelligence Committee there were "multiple requests at different levels" for access to the DNC servers. "Ultimately what was agreed to is the private company would share with us what they saw," he said. Comey described CrowdStrike as a "highly respected" cybersecurity company. ..."
"... More telling was earlier questioning by House Intelligence Committee member, Rep. Will Hurd (R-TX), who had been a CIA officer for a decade. On March 20, 2017 while he was still FBI director, Comey evidenced some considerable discomfort as he tried to explain to the committee why the FBI did not insist on getting physical access to the DNC computers and do its own forensics: ..."
"... On March 31, 2017 WikiLeaks released the most damaging disclosure up to that point from what it called "Vault 7" – a treasure trove of CIA cybertools leaked from CIA files. This disclosure featured the tool "Marble Framework," which enabled the CIA to hack into computers, disguise who hacked in, and falsely attribute the hack to someone else by leaving so-called telltale signs – like Cyrillic, for example. ..."
"... The CIA documents also showed that the "Marble" tool had been employed in 2016. ..."
"... As Russia-gate transmogrifies into Deep State-gate, the DOJ is launching a probe into the origins of Russia-gate and the intelligence agencies alleged role in it. It remains to be seen whether US Attorney for the District of Connecticut John Durham, who is leading the probe, will interview Assange, unlike Special Counsel Robert Mueller, who did not. ..."
Jun 18, 2019 | original.antiwar.com

The revelation came in a court filing by the government in the pretrial phase of Roger Stone, a longtime Republican operative who had an unofficial role in the campaign of candidate Donald Trump. Stone has been charged with misleading Congress, obstructing justice and intimidating a witness.

The filing was in response to a motion by Stone's lawyers asking for "unredacted reports" from CrowdStrike in an effort to get the government to prove that Russia hacked the DNC server. "The government does not possess the information the defendant seeks," the filing says.

In his motion, Stone's lawyers said he had only been given three redacted drafts. In a startling footnote in the government's response, the DOJ admits the drafts are all that exist. "Although the reports produced to the defendant are marked 'draft,' counsel for the DNC and DCCC informed the government that they are the last version of the report produced," the footnote says.

In other words CrowdStrike, upon which the FBI relied to conclude that Russia hacked the DNC, never completed a final report and only turned over three redacted drafts to the government.

These drafts were "voluntarily" given to the FBI by DNC lawyers, the filing says. "No redacted information concerned the attribution of the attack to Russian actors," the filing quotes DNC lawyers as saying.

In Stone's motion his lawyers argued: "If the Russian state did not hack the DNC, DCCC, or [Clinton campaign chairman John] Podesta's servers, then Roger Stone was prosecuted for obstructing a congressional investigation into an unproven Russian state hacking conspiracy The issue of whether or not the DNC was hacked is central to the Defendant's defense."

The DOJ responded: "The government does not need to prove at the defendant's trial that the Russians hacked the DNC in order to prove the defendant made false statements, tampered with a witness, and obstructed justice into a congressional investigation regarding election interference."

Thousands of emails from the DNC server were published by WikiLeaks in July 2016 revealing that the DNC interfered in the Democratic primary process to favor former Secretary of State Hillary Clinton over Senator Bernie Sanders for the party's presidential nomination. The U.S. indicted 12 Russian military intelligence agents in 2018 for allegedly hacking the DNC server and giving the emails to WikiLeaks.

Comey Can't Say Why

At a time of high tension in the 2016 presidential campaign, when the late Sen. John McCain and others were calling Russian "hacking" an "act of war," the FBI settled for three redacted "draft reports" from CrowdStrike rather than investigate the alleged hacking itself, the court document shows.

Then FBI Director James Comey admitted in congressional testimony that he chose not to take control of the DNC's "hacked" computers, and did not dispatch FBI computer experts to inspect them, but has had trouble explaining why.

In his testimony, he conceded that "best practices" would have dictated that forensic experts gain physical access to the computers. Nevertheless, the FBI decided to rely on forensics performed by a firm being paid for by the DNC.

Suspicions grew as Comey started referring to CrowdStrike as the "pros that they hired." Doubts became more intense when he referred to CrowdStrike as "a high-class entity." In fact the company had a tarnished reputation for reliability and objectivity well before it was hired by the DNC.

Dimitri Alperovitch, a CrowdStrike co-founder, is an opponent of Russian President Vladimir Putin and a senior fellow at the anti-Russian Atlantic Council think tank in Washington. CrowdStrike said it determined that Russia had hacked the DNC server because it found Cyrillic letters in the metadata, as well as the name of the first Soviet intelligence chief – clues an amateur might leave.

But the software CrowdStrike used to blame Russia for hacking the DNC server was later revealed to be so faulty it had to be rewritten .

CrowdStrike's Early Role

In a Memorandum for the President on July 24, 2017, Veteran Intelligence Professionals for Sanity referred prominently to this instructive time sequence:

VIPS does not believe the June 12, 14, & 15 timing was pure coincidence. Rather, it suggests the start of a preemptive move to associate Russia with anything WikiLeaks might have been about to publish and to "show" that it came from a Russian hack.

Bill Binney, a former NSA technical director and a VIPs member, filed an affidavit in Stone's case. Binney said: "WikiLeaks did not receive stolen data from the Russian government. Intrinsic metadata in the publicly available files on WikiLeaks demonstrates that the files acquired by WikiLeaks were delivered in a medium such as a thumb drive."

Preferring CrowdStrike; ' Splaining to Congress

Why did FBI Director James Comey not simply insist on access to the DNC computers? Surely he could have gotten the appropriate authorization. In early January 2017, reacting to media reports that the FBI never asked for access, Comey told the Senate Intelligence Committee there were "multiple requests at different levels" for access to the DNC servers. "Ultimately what was agreed to is the private company would share with us what they saw," he said. Comey described CrowdStrike as a "highly respected" cybersecurity company.

Asked by committee Chairman Richard Burr (R-NC) whether direct access to the servers and devices would have helped the FBI in their investigation, Comey said it would have. "Our forensics folks would always prefer to get access to the original device or server that's involved, so it's the best evidence," he said.

Five months later, after Comey had been fired, Burr gave him a Mulligan in the form of a few kid-gloves, clearly well-rehearsed, questions:

BURR: And the FBI, in this case, unlike other cases that you might investigate – did you ever have access to the actual hardware that was hacked? Or did you have to rely on a third party to provide you the data that they had collected?

COMEY: In the case of the DNC, we did not have access to the devices themselves. We got relevant forensic information from a private party, a high-class entity, that had done the work. But we didn't get direct access.

BURR: But no content?

COMEY: Correct.

BURR: Isn't content an important part of the forensics from a counterintelligence standpoint?

COMEY: It is, although what was briefed to me by my folks – the people who were my folks at the time is that they had gotten the information from the private party that they needed to understand the intrusion by the spring of 2016.

More telling was earlier questioning by House Intelligence Committee member, Rep. Will Hurd (R-TX), who had been a CIA officer for a decade. On March 20, 2017 while he was still FBI director, Comey evidenced some considerable discomfort as he tried to explain to the committee why the FBI did not insist on getting physical access to the DNC computers and do its own forensics:

HURD: So there was about a year between the FBI's first notification of some potential problems with the DNC network and then that information getting on – getting on WikiLeaks.

COMEY: Yes, sir.

HURD: when did the DNC provide access for – to the FBI for your technical folks to review what happened?

COMEY: Well we never got direct access to the machines themselves. The DNC in the spring of 2016 hired a firm that ultimately shared with us their forensics from their review of the system.

HURD: So, Director FBI notified the DNC early, before any information was put on WikiLeaks and when – you have still been – never been given access to any of the technical or the physical machines that were – that were hacked by the Russians.

COMEY: That's correct although we got the forensics from the pros that they hired which – again, best practice is always to get access to the machines themselves, but this – my folks tell me was an appropriate substitute.

Comey Spikes Deal With Assange

Director Comey's March 20, 2017 testimony to the House Intelligence Committee came at the same time he was scuttling months-long negotiations between Assange and lawyers representing the DOJ and CIA to grant some limited immunity for the WikiLeaks founder. In return, Assange offered to: (1) redact "some classified CIA information he might release in the future," and (2) "provide technical evidence and discussion regarding who did not engage in the DNC releases."

Investigative journalist John Solomon, quoting WikiLeaks ' intermediary with the government, broke this story, based on "interviews and a trove of internal DOJ documents turned over to Senate investigators. It would be a safe assumption that Assange was offering to prove that Russia was not WikiLeaks ' source of the DNC emails, something Assange has repeatedly said.

That, of course, would have been the last thing Comey would have wanted.

On March 31, 2017 WikiLeaks released the most damaging disclosure up to that point from what it called "Vault 7" – a treasure trove of CIA cybertools leaked from CIA files. This disclosure featured the tool "Marble Framework," which enabled the CIA to hack into computers, disguise who hacked in, and falsely attribute the hack to someone else by leaving so-called telltale signs – like Cyrillic, for example.

The CIA documents also showed that the "Marble" tool had been employed in 2016.

Two weeks later, then CIA Director Mike Pompeo branded WikiLeaks a "non-state hostile intelligence service," and the U.S. put pressure on Ecuador, which had given Assange asylum, to expel him from its London embassy. He was on April 11 when British police arrested him. On the same day he was convicted of skipping bail on a Swedish investigation that had since been dropped. Assange was sentenced to 50 weeks in London's max-security Belmarsh prison.

Comey, it seems a safe bet, still worries that Assange or one of his associates, will provide "technical evidence" enough to prove "who did not engage in the DNC releases."

What Were They Thinking?

At the March 20, 2017 House Intelligence Committee hearing, Congressman Trey Gowdy heaped effusive praise on then-FBI Director Comey, calling him "incredibly respected." At that early stage, no doubt Gowdy meant no double entendre . He might now.

As Russia-gate transmogrifies into Deep State-gate, the DOJ is launching a probe into the origins of Russia-gate and the intelligence agencies alleged role in it. It remains to be seen whether US Attorney for the District of Connecticut John Durham, who is leading the probe, will interview Assange, unlike Special Counsel Robert Mueller, who did not.

It is proving very difficult for some of my old FBI friends and others to believe that Comey and other justice, intelligence, and security officials at the very top could have played fast and loose with the Constitution and the law and lived a lie over the past few years.

"How did they ever think they could get away with it?" they ask. The answer is deceivingly simple. Comey himself has explained it in a moment of seemingly unintentional candor in his pretentious book, "A Higher Loyalty." He wrote, "I was making decisions in an environment where Hillary Clinton was sure to be the next president."

There would be no problem, of course, if Mrs. Clinton had won the election. That's what they all thought; and that probably explains their lack of care in keeping their activities off the written record and out of computers. Elementary tradecraft goes out the window with these upper-echelon, "high-class-entity" officials, when they are sure that she, and they, are going to be the inevitable winners – with promotions, not indictments in store for them.

Additional reporting by Joe Lauria

Background Reading on Deep State-Gate

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. His 27-year career as a CIA analyst includes serving as Chief of the Soviet Foreign Policy Branch and preparer/briefer of the President's Daily Brief. He is co-founder of Veteran Intelligence Professionals for Sanity (VIPS). This originally appeared at Consortium News .

Author: Ray McGovern

Ray McGovern works with Tell the Word, the publishing arm of the ecumenical Church of the Saviour in inner-city Washington. In the Sixties he served as an infantry/intelligence officer and then became a CIA analyst for the next 27 years. He is on the Steering Group of Veteran Intelligence Professionals for Sanity (VIPS). View all posts by Ray McGovern

[Jun 16, 2019] Rule of law in Murrika is kaput

Highly recommended!
Jun 16, 2019 | www.zerohedge.com

freedommusic , 23 minutes ago link

DEFENSE ATTORNEY: Agent Smith, you testified that the Russians hacked the DNC computers, is that correct?

FBI AGENT JOHN SMITH: That is correct.

DEF ATT: Upon what information did you base your testimony?

AGENT: Information found in reports analyzing the breach of the computers.

DEF ATT: So, the FBI prepared these reports?

AGENT: (cough) . (shift in seat) No, a cyber security contractor with the FBI.

DEF ATT: Pardon me, why would a contractor be preparing these reports? Do these contractors run the FBI laboratories where the server was examined?

AGENT: No.

DEF ATT: No? No what? These contractors don't run the FBI Laboratories?

AGENT: No. The laboratories are staffed by FBI personnel.

DEF ATT: Well I don't understand. Why would contractors be writing reports about computers that are forensically examined in FBI laboratories?

AGENT: Well, the servers were not examined in the FBI laboratory.

(silence)

DEF ATT: Oh, so the FBI examined the servers on site to determine who had hacked them and what was taken?

AGENT: Uh .. no.

DEF ATT: They didn't examine them on site?

AGENT: No.

DEF ATT: Well, where did they examine them?

AGENT: Well, uh .. the FBI did not examine them.

DEF ATT: What?

AGENT: The FBI did not directly examine the servers.

DEF ATT: Agent Smith, the FBI has presented to the Grand Jury and to this court and SWORN AS FACT that the Russians hacked the DNC computers. You are basing your SWORN testimony on a report given to you by a contractor, while the FBI has NEVER actually examined the computer hardware?

AGENT: That is correct.

DEF ATT: Agent Smith, who prepared the analysis reports that the FBI relied on to give this sworn testimony?

AGENT: Crowdstrike, Inc.

DEF ATT: So, which Crowdstrike employee gave you the report?

AGENT: We didn't receive the report directly from Crowdstrike.

DEF ATT: What?

AGENT: We did not receive the report directly from Crowdstrike.

DEF ATT: Well, where did you find this report?

AGENT: It was given to us by the people who hired Crowdstrike to examine and secure their computer network and hardware.

DEF ATT: Oh, so the report was given to you by the technical employees for the company that hired Crowdstrike to examine their servers?

AGENT: No.

DEF ATT: Well, who gave you the report?

AGENT: Legal counsel for the company that hired Crowdstrike.

DEF ATT: Why would legal counsel be the ones giving you the report?

AGENT: I don't know.

DEF ATT: Well, what company hired Crowdstrike?

AGENT: The Democratic National Committee.

DEF ATT: Wait a minute. Let me get this straight. You are giving SWORN testimony to this court that Russia hacked the servers of the Democratic National Committee. And you are basing that testimony on a report given to you by the LAWYERS for the Democratic National Committee. And you, the FBI, never actually saw or examined the computer servers?

AGENT: That is correct.

DEF ATT: Well, can you provide a copy of the technical report produced by Crowdstrike for the Democratic National Committee?

AGENT: No, I cannot.

DEF ATT: Well, can you go back to your office and get a copy of the report?

AGENT: No.

DEF ATT: Why? Are you locked out of your office?

AGENT: No.

DEF ATT: I don't understand. Why can you not provide a copy of this report?

AGENT: Because I do not have a copy of the report.

DEF ATT: Did you lose it?

AGENT: No.

DEF ATT: Why do you not have a copy of the report?

AGENT: Because we were never given a final copy of the report.

DEF ATT: Agent Smith, if you didn't get a copy of the report, upon what information are you basing your testimony?

AGENT: On a draft copy of the report.

DEF ATT: A draft copy?

AGENT: Yes.

DEF ATT: Was a final report ever delivered to the FBI?

AGENT: No.

DEF ATT: Agent Smith, did you get to read the entire report?

AGENT: No.

DEF ATT: Why not?

AGENT: Because large portions were redacted.

DEF ATT: Agent Smith, let me get this straight. The FBI is claiming that the Russians hacked the DNC servers. But the FBI never actually saw the computer hardware, nor examined it? Is that correct?

AGENT: That is correct.

DEF ATT: And the FBI never actually examined the log files or computer email or any aspect of the data from the servers? Is that correct?

AGENT: That is correct.

DEF ATT: And you are basing your testimony on the word of Counsel for the Democratic National Committee, the people who provided you with a REDACTED copy of a DRAFT report, not on the actual technical personnel who supposedly examined the servers?

AGENT: That is correct.

DEF ATT: Your honor, I have a few motions I would like to make at this time.

PRESIDING JUDGE: I'm sure you do, Counselor. (as he turns toward the prosecutors) And I feel like I am in a mood to grant them.

( source )

hooligan2009 , 14 minutes ago link

Brilliant! that sums it up nicely. of course, if the servers were not hacked and were instead "thumbnailed" that leads to a whole pile of other questions (including asking wiileaks for their source and about the murder of seth rich).

[Jun 16, 2019] US Govt's Entire Russia-DNC Hacking Narrative Based On Redacted Draft Of Crowdstrike Report

Jun 16, 2019 | www.zerohedge.com

It's been known for some time that the US Government based its conclusion that Russia hacked the Democratic National Committee (DNC) on a report by cybersecurity firm Crowdstrike, which the DNC paid over a million dollars to conduct forensic analysis and other work on servers they refused to hand over to the FBI.

CrowdStrike's report made its way into a joint FBI/DHS report on an Russia's " Grizzly Steppe ", which concluded Russia hacked the DNC's servers. At the time, Crowdstrike's claim drew much scrutiny from cybersecurity experts according to former Breitbart reporter Lee Stranahan.

Now, thanks to a new court filing by longtime Trump adviser Roger Stone requesting the full Crowdstrike analysis, we find out that the US government was given a redacted version of the report marked "Draft, " as reported by the Conservative Treehouse .

What makes the whole thing even more hokey is a footnote admitting that "counsel for the DNC and DCCC informed the government that they are the last version of the report produced. "

So to be clear - the entire narrative that Russia hacked the DNC is based on a redacted draft of a report which Crowdstrike appears not to have even finalized.

me title=

And as the Conservative Treehouse notes: "This means the FBI and DOJ, and all of the downstream claims by the intelligence apparatus; including the December 2016 Joint Analysis Report and January 2017 Intelligence Community Assessment, all the way to the Weissmann/Mueller report and the continued claims therein; were based on the official intelligence agencies of the U.S. government and the U.S. Department of Justice taking the word of a hired contractor for the Democrat party .. despite their inability to examine the server and/or actually see an unredacted technical forensic report from the investigating contractor."

The entire apparatus of the U.S. government just took their word for it

and used the claim therein as an official position .

which led to a subsequent government claim, in court, of absolute certainty that Russia hacked the DNC.

Think about that for a few minutes. - Conservative Treehouse

Meanwhile, the Crowdstrike analyst who led forensics on the DNC servers is a former FBI employee who Robert Mueller promoted while head of the agency. It should also be noted that the government of Ukraine admonished Crowdstrike for a report they later retracted and amended , claiming that Russia hacked Ukrainian military.

Sign in to comment filter_list Viewing Options arrow_drop_down

General Titus , 10 seconds ago link

Remember when Fugly Debbie " I Know Nothing" Sgt Shultz Washerwoman threatened that Chief of Police?

4medicinalpurposesonly , 17 seconds ago link

Amazing how the Dems are able to commit cyber spying yet Hillary and Lois Lerner lose all of their emails including back ups

Helg Saracen , 1 minute ago link

Oy wey! Do not make my **** laugh (I myself have long been unable to laugh from all this circus). Guys - not tired yet?

:)

Catullus , 5 minutes ago link

Remember that one time Hillary Clinton said on national television during a presidential debate that Russia needed to be held accountable for this? That 17 intelligence agreed they did it. And that we should take action to provoke a nuclear power. On TV.

All because we got to see how corrupt the DNC nomination process is.

brokebackbuck , 23 seconds ago link

its a very simple scheme. its what any child would do hide that they cheated and get out of trouble:

1) stop trumpo
2) fabricate the foreign meddling narrative to implicate trump as LONG as possible, so long it makes people sick to hear foreign meddling, even though it was the DNC that actually paid british people to fabricate compromat.
3) blame russia for everything

Mike Rotsch , 8 minutes ago link

Anyone remember that very brief news story about a California Senator returning from London with "bombshell" information that he had to get to the POTUS immediately? I waited to see if anything would ever come of that. Instead . . .

. . . scrubbed from the internet.

pHObuk0wrEHob71Suwr2 , 10 minutes ago link

Hooty Hoo

https://twitter.com/JakeWharton/status/1092425961361022976

MrBoompi , 12 minutes ago link

If it says Factual Background, it must be true. We are dealing with super trustworthy folks here, remember. How many more "factual reports" will we see that don't mention Seth Rich? The murderers are still running free.

yerfej , 13 minutes ago link

The bureaucracy owns the media, courts, and academia so naturally they can shape the law to meet their personal needs. The average taxpayer is just a tool to allow the bureaucrats to consolidate and maintain their ownership of everyone and everything.

RussianSniper , 13 minutes ago link

Trump enjoys drama and treats this entire treasonous coup as a television drama.

The issue is that ordinary American citizens are sick and tired of the powerful and wealthy having two sets of rules, theirs and those for everyone else.

I stopped watching television except for local sports and NHL.

I rarely look at ZH anymore.

Never watch Fox anymore

Would not consider any paper

My point is that the people who once were concerned, are losing interest.

Those who treat politics as religion will continue to treat those who disagree as criminals and cast offs.

What used to be a great country that a availed opportunity to all who tried, is now a kleptocracy and a club for leftist religious fanatics.

lisa.roy39 , 14 minutes ago link

𝐈'𝐦 ­­­­­­­­­ 𝐦𝐚𝐤𝐢𝐧𝐠 ­­­­­­­­­𝐨𝐯𝐞𝐫­­­­­­­­­ $𝟏𝟑𝐤­­­­­­­­­ 𝐢𝐧 𝐨𝐧𝐞 𝐦𝐨𝐧𝐭𝐡­­­­­­­­­ 𝐰𝐨𝐫𝐤𝐢𝐧𝐠­­­­­­­­­ 𝐩𝐚𝐫𝐭 ­­­­­­­­­𝐭𝐢𝐦𝐞. 𝐈 ­­­­­­­­­𝐤𝐞𝐩𝐭 ­­­­­­­­­𝐡𝐞𝐚𝐫𝐢𝐧𝐠 ­­­­­­­­­𝐨𝐭𝐡𝐞𝐫 ­­­­­­­­­𝐩𝐞𝐨𝐩𝐥𝐞 ­­­­­­­­­𝐭𝐞𝐥𝐥 ­­­­­­­­­𝐦𝐞 𝐡𝐨𝐰 𝐦𝐮𝐜𝐡 ­­­­­­­­­𝐦𝐨𝐧𝐞𝐲 ­­­­­­­­­𝐭𝐡𝐞𝐲 ­­­­­­­­­𝐜𝐚𝐧 ­­­­­­­­­𝐦𝐚𝐤𝐞 ­­­­­­­­­𝐨𝐧𝐥𝐢𝐧𝐞 𝐬𝐨 𝐈 ­­­­­­­­­𝐝𝐞𝐜𝐢𝐝𝐞𝐝 𝐭𝐨 𝐥𝐨𝐨𝐤­­­­­­­­­ 𝐢𝐧𝐭𝐨 𝐢𝐭. ­­­­­­­­­𝐖𝐞𝐥𝐥, 𝐢𝐭 𝐰𝐚𝐬­­­­­­­­­ 𝐚𝐥𝐥 𝐭𝐫𝐮𝐞­­­­­­­­­ 𝐚𝐧𝐝 𝐡𝐚𝐬 𝐭𝐨𝐭𝐚𝐥𝐥𝐲 ­­­­­­­­­𝐜𝐡𝐚𝐧𝐠𝐞𝐝 𝐦𝐲 ­­­­­­­­­𝐥𝐢𝐟𝐞.­­­­­­­­­𝐥𝐚𝐬𝐭 𝐦𝐨𝐧𝐭𝐡­­­­­­­­­ 𝐦𝐲 ­­­­­­­­­𝐩𝐚𝐲 𝐜­­­­­­­­­𝐡𝐞𝐜𝐤 𝐰𝐚𝐬 ­­­­­­­­­$𝟏𝟐𝟕𝟏𝟐 ­­­­­­­­­𝐣𝐮𝐬𝐭 ­­­­­­­­­𝐰𝐨𝐫𝐤𝐢𝐧𝐠 𝐨𝐧 𝐭𝐡𝐞 ­­­­­­­­­𝐥𝐚𝐩𝐭𝐨𝐩 𝐟𝐨𝐫­­­­­­­­­ 𝐚 𝐟𝐞𝐰 𝐡𝐨𝐮𝐫𝐬.𝐄𝐯𝐞𝐫𝐲 𝐩𝐞𝐫𝐬𝐨𝐧 𝐜𝐚𝐧 𝐧𝐨𝐰 𝐦𝐚𝐤𝐞𝐬 𝐠𝐨𝐨𝐝 𝐢𝐧𝐜𝐨𝐦𝐞 𝐨𝐧𝐥𝐢𝐧𝐞 𝐞𝐚𝐬𝐢𝐥𝐲 𝐛𝐲 𝐣𝐮𝐬𝐭 𝐟𝐨𝐥𝐥𝐨𝐰 𝐢𝐧𝐬𝐭𝐫𝐮𝐜𝐭𝐢𝐨𝐧𝐬 𝐨𝐧 𝐭𝐡𝐢𝐬 𝐥𝐢𝐧𝐤.....

click this link════►►► http://www.todaysfox.com

Bricker , 18 minutes ago link

#Resist will guarantee Trumps re-election, unless the 15 states who are going to use their pact to send their votes towards popular vote.

The United States of America is turning into a shithole Banana Republic with the ******* democrats.

This should be headline news on conservative stations, not including the new liberal news station, Fox News.

glenlloyd , 6 minutes ago link

I don't think states can arbitrarily decide to ignore the electoral college if they want to. Something tells me federal law governs national elections and they can whine and cry and act like triggered embiciles all they want but it doesn't change the law.

The Carbonator , 3 minutes ago link

It would end up going to SCOTUS. Lets hope that Trump gets the honor of replacing that treasonous bitch with a real constitutional judge. Lets keep hope alive!

Pussy Biscuit , 19 minutes ago link

That disgusting *** should be liquidated.

scaleindependent , 21 minutes ago link

Whatever we blame Russia for doing, we are in fact doing.

For example, we blame them for hacking our electrical grid. No proof was given, yet this morning we have evidence we have been messing and hacking Russia's electrical grid.

We blame them for interfering in our elections, when in fact we have been interfering in the world's elections and sovereign governments.


The ultimate hypocrites.

freedommusic , 21 minutes ago link

DEFENSE ATTORNEY: Agent Smith, you testified that the Russians hacked the DNC computers, is that correct?

FBI AGENT JOHN SMITH: That is correct.

DEF ATT: Upon what information did you base your testimony?

AGENT: Information found in reports analyzing the breach of the computers.

DEF ATT: So, the FBI prepared these reports?

AGENT: (cough) . (shift in seat) No, a cyber security contractor with the FBI.

DEF ATT: Pardon me, why would a contractor be preparing these reports? Do these contractors run the FBI laboratories where the server was examined?

AGENT: No.

DEF ATT: No? No what? These contractors don't run the FBI Laboratries?

AGENT: No. The laboratories are staffed by FBI personnel.

DEF ATT: Well I don't understand. Why would contractors be writing reports about computers that are forensically examined in FBI laboratories?

AGENT: Well, the servers were not examined in the FBI laboratory.

(silence)

DEF ATT: Oh, so the FBI examined the servers on site to determine who had hacked them and what was taken?

AGENT: Uh .. no.

DEF ATT: They didn't examine them on site?

AGENT: No.

DEF ATT: Well, where did they examine them?

AGENT: Well, uh .. the FBI did not examine them.

DEF ATT: What?

AGENT: The FBI did not directly examine the servers.

DEF ATT: Agent Smith, the FBI has presented to the Grand Jury and to this court and SWORN AS FACT that the Russians hacked the DNC computers. You are basing your SWORN testimony on a report given to you by a contractor, while the FBI has NEVER actually examined the computer hardware?

AGENT: That is correct.

DEF ATT: Agent Smith, who prepared the analysis reports that the FBI relied on to give this sworn testimony?

AGENT: Crowdstrike, Inc.

DEF ATT: So, which Crowdstrike employee gave you the report?

AGENT: We didn't receive the report directly from Crowdstrike.

DEF ATT: What?

AGENT: We did not receive the report directly from Crowdstrike.

DEF ATT: Well, where did you find this report?

AGENT: It was given to us by the people who hired Crowdstrike to examine and secure their computer network and hardware.

DEF ATT: Oh, so the report was given to you by the technical employees for the company that hired Crowdstrike to examine their servers?

AGENT: No.

DEF ATT: Well, who gave you the report?

AGENT: Legal counsel for the company that hired Crowdstrike.

DEF ATT: Why would legal counsel be the ones giving you the report?

AGENT: I don't know.

DEF ATT: Well, what company hired Crowdstrike?

AGENT: The Democratic National Committee.

DEF ATT: Wait a minute. Let me get this straight. You are giving SWORN testimony to this court that Russia hacked the servers of the Democratic National Committee. And you are basing that testimony on a report given to you by the LAWYERS for the Democratic National Committee. And you, the FBI, never actually saw or examined the computer servers?

AGENT: That is correct.

DEF ATT: Well, can you provide a copy of the technical report produced by Crowdstrike for the Democratic National Committee?

AGENT: No, I cannot.

DEF ATT: Well, can you go back to your office and get a copy of the report?

AGENT: No.

DEF ATT: Why? Are you locked out of your office?

AGENT: No.

DEF ATT: I don't understand. Why can you not provide a copy of this report?

AGENT: Because I do not have a copy of the report.

DEF ATT: Did you lose it?

AGENT: No.

DEF ATT: Why do you not have a copy of the report?

AGENT: Because we were never given a final copy of the report.

DEF ATT: Agent Smith, if you didn't get a copy of the report, upon what information are you basing your testimony?

AGENT: On a draft copy of the report.

DEF ATT: A draft copy?

AGENT: Yes.

DEF ATT: Was a final report ever delivered to the FBI?

AGENT: No.

DEF ATT: Agent Smith, did you get to read the entire report?

AGENT: No.

DEF ATT: Why not?

AGENT: Because large portions were redacted.

DEF ATT: Agent Smith, let me get this straight. The FBI is claiming that the Russians hacked the DNC servers. But the FBI never actually saw the computer hardware, nor examined it? Is that correct?

AGENT: That is correct.

DEF ATT: And the FBI never actually examined the log files or computer email or any aspect of the data from the servers? Is that correct?

AGENT: That is correct.

DEF ATT: And you are basing your testimony on the word of Counsel for the Democratic National Committee, the people who provided you with a REDACTED copy of a DRAFT report, not on the actual technical personnel who supposedly examined the servers?

AGENT: That is correct.

DEF ATT: Your honor, I have a few motions I would like to make at this time.

PRESIDING JUDGE: I'm sure you do, Counselor. (as he turns toward the prosecutors) And I feel like I am in a mood to grant them.

( source )

hooligan2009 , 14 minutes ago link

Brilliant! that sums it up nicely. of course, if the servers were not hacked and were instead "thumbnailed" that leads to a whole pile of other questions (including asking wiileaks for their source and about the murder of seth rich).

GALLGE , 1 minute ago link

There's no way to sweep it under the official rug at this point. Even kicking off WWIII as a distraction will flop.

Thebighouse , 22 minutes ago link

Lying demon-rats........liars liars liars.........just like cnn, and their affiliates...nbc, cbs abc msnbc...........all weaponized propaganda outlets........should lose fcc licenses and HANG THEIR LYING COLLUDING ANCHORS....hang 'em high........liars

DEDA CVETKO , 23 minutes ago link

As the ring of known Russiagate conspirators gets narrower and narrower, this anti-russian (which also happens to be anti-american and anti-world) clique's collective characteristics and traits are getting easier and easier to discern and quantify because their contours - previously carefully concealed by multiple layers of opaque veils and drapes - are now fully visible.

These people are all (A) privileged elites and dynastic social castes (B) share, more or less, the same social and divine cosmology (no, not Buddhist) (C) do not recognize ethics and morals as having any meaning or significance except on a purely nominal and declarative level, which - of course - applies to others, but not to themselves (D) firmly believe in survival of the fittest, law of the jungle and might-makes-right (E) are all members of the secret frats (F) performed important state functions and aspire to perform some more because, after all, greed is good and so is unlimited ambition (they also seem to enjoy very much their hard-earned social status and prominence) (G) belong to the same "liberal interventionist" war club (H) believe in Keynesian economics, but - absurdly, and in the same breath - in Ayn Rand's right-wing ideological nonsense, depending on what suits them the best at any given moment, (I) typically have background in banking or finance, corporate management or government lobbying (J) prefer to remain anonymous at any cost (K) have a very fluid and elastic perception of human sexuality and libidinal urges (L) Own Panama-or Cayman Islands- chartered tax havens (M) do not mingle with the non-elites or unwashed masses (N) firmly believe in their divine chosenness and messianic role (O) show pronounced, sustained propensity to Groupthink and consistent absence of any creative and constructive thought; (P) are always "centrists", "middle of the road" and "bipartisan" and never tend to stick out in any social milieu, preferring instead to dictate from the opaque deep end, (Q) maintain extremely high fake media visibility (R) do not believe in forgiveness, penitence or remorse - only in never-ending, bloody revenge.

This profile of humans cannot be properly socialized or resocialized, because the social ethos that created them made amply sure that they cannot be adjusted, bettered, improved or otherwise socially tweaked at any point in their lives: in essence, their characters and personalities are cast in stone, cemented unto all eternity and permanently immutable.. The best that we, the normal people, can do is kindly and gently quarantine them to a place where they can't inflict any significant damage and prevent them from rising to the top, which may turn out to be very different because they control (and have every intention of controlling in the future) every road that leads to the top.

hooligan2009 , 11 minutes ago link

well put sir/madam/it!!!

Amy G. Dala , 23 minutes ago link

So, the FBI "asked" the DNC for the servers, and the DNC said they never heard from the FBI.

Guess James Comey musta got Seth Rich on the line.

charliebrown , 24 minutes ago link

Treason including a coup against democracy

ATM , 22 minutes ago link

against the Republic.

Democracy is pure evil.

Government needs you to pay taxes , 24 minutes ago link

Rule of law in Murrika is kaput.

DirtySanchez , 26 minutes ago link

The entirety of the USA government, including the intel agencies, the judiciary, state dept, justice dept, congress, and the growing bureaucracy has been hijacked by a treacherous tribe of people, intent on destroying the nation from within.

Kill the tyrants before they kill you!

Thebighouse , 20 minutes ago link

Punish the tyrants and look at that well organized community...........if you don't think leggo-obummer didn't have a huge hand in this, you are very mis-informed.

ACMeCorporations , 27 minutes ago link

Perkins Coie, Perkins Coie, Perkins Coie. Follow the money. Perkins Coie paid Fusion GPS and CrowdStrike. Raid them like Michael Cohen was raided.

hooligan2009 , 26 minutes ago link

bang on!

SummerSausage , 20 minutes ago link

Raid them like Roger Stone was raided!

BIWEEE , 28 minutes ago link

Wasserman-Schultz = Khazar!!!

hooligan2009 , 25 minutes ago link

= futt bugly mowler honkey

Black Dog 32 , 30 minutes ago link

Crowdstrike just ipo'd this week. Cashing in. I think it was up 100% first day.

natxlaw , 30 minutes ago link

I'm bored, when is someone going to jail. I won't be sharing this information with blue pill normies they would not get it. Trump, you listening?

Joebloinvestor , 32 minutes ago link

The FBI was so "in the bag" with the DNC it is laughable.

Now you know why they wanted the Smollet investigation handed off to the FBI.

Bunch of ******* dirty corrupt cops.

hooligan2009 , 34 minutes ago link

just remember that, aside from the weaponization of federal agencies for political purposes by obama, biden and clinton (which merits waterboarding in guantanamo) - there are hundreds if not thousands of INNOCENTS who have been prosecuted and GUILTY still walking the streets.

the prosecution of the innocent and the releaseof the guilty may have been going on for decades, but, but now, it should be apparet, that in true KGB style, it ballooned to extreme proportions under Obama/Biden and Clinton.

and this is what the howler moneys in the clown car want to inflict on the US in 2020. after all, it's their turn right?

honk honk.

schroedingersrat , 32 minutes ago link

And it got much worse under Trump hiring all the war criminals form yesteryears back into office.

hooligan2009 , 23 minutes ago link

truth is a good way of triggering howler monkeys

Creative_Destruct , 35 minutes ago link

"....based on the official intelligence agencies of the U.S. government and the U.S. Department of Justice taking the word of a hired contractor for the Democrat party"

Hey, when you (the FBI, the entire executive branch) are partisan Never Trumpers and it's your party what else should we expect? After all, gotta concoct all the propaganda possible under the guise of an "objective" investigation for that "insurance policy."

novictim , 37 minutes ago link

Totally believable. The corruption is just as bad as the most pessimistic analysis has suggested.

We live in a time of universal lies and a press that supports illegal activities by treasonous elements of the US Government.

How do we turn this around without an honest Press rallying the public?

Amy G. Dala , 27 minutes ago link

Easy. Apply responsibilities that are commensurate with their constitutional right to publish. It's been three years of ******** and unsourced stories.

At a minimum, when a confidential source provides information that is demonstrated to be false, then that reporter is legally bound to identify them. Fuckers should be in jail.

Look at Assange. He publishes truth, and he's in jail. Tapper/Seltzer/et. al. are millionaire celebrities.

Thordoom , 38 minutes ago link

Why Russians who were sanctioned by US over this hoax are not suing US and asking for huge reparations is beyond me.

schroedingersrat , 37 minutes ago link

Most Russian sanctions are based on lies. Have a look at the Magnitsky Act :)

Thordoom , 36 minutes ago link

I know i follow Lee Stranahan's work about that hoax too for years.

Bill Browder blocked me on twater.

Ruff_Roll , 18 minutes ago link

Maybe they're blocked by sovereign immunity.

pparalegal , 39 minutes ago link

Another day another Hillary crowd-strikes.

[Jun 14, 2019] Our old acquaintance Crowdstrike has gone public, and in its IPO debut, the stock surged to a market cap of over $12 Billion

Notable quotes:
"... Surprisingly, Crowdstrike's CEO – George Kurtz – does not have a background in the national intelligence services, or none that is immediately apparent. He seems to have worked mostly in private security, having gotten into it fairly early on, and is an accountant by trade; he seems to be the public face of the firm, and to be mostly involved in marketing. ..."
"... However, their president of services, Shawn Henry, is a former executive assistant director of the FBI, and I imagine its employees include quite a few former government spooks and ideologues. ..."
"... The other co-founder, though, is Dmitry Alperovitch. ..."
"... He's a Senior Fellow at the Atlantic Council think tank, a direct adviser to the US Department of Defense, connected to Hillary Clinton and runs a new corporation whose startup cash came from Google. There's something even bigger than Google – corporations now seem more and more to be merging into what are essentially mini-states within the state itself – and it is called Alphabet Capital, Google's parent company. The Chairman of Alphabet Capital is Eric Schmidt, and he was actively working for Hillary Clinton during the last election when she spectacularly failed to make the cut. ..."
"... Google, allegedly, is becoming more and more an arm of the Democratic Party in the USA. ..."
"... Wheels within wheels, and connections seen and unseen. Several security professionals and software developers have alluded to Crowdstrike's reports on international hacking as being full of shit – but the American enforcement and intelligence services seem content to outsource their cyber work more or less exclusively to Crowdstrike. And the results of its IPO suggest high confidence on the part of investors that it is going to become ever-more-closely allied to the US government, font of government grants and funding which can be hard to trace. ..."
"... For what it's worth, the Crowdstrike story that Russian cyber-meddling had knocked out 80% of Ukrainian artillery systems was deemed bogus by several other sources, including the Ukrainian Army. At its most basic, artillery systems are large ballistic rifles that drop artillery shells on a predetermined position by looking the reference up on a gridded map and inputting corrections for elevation and azimuth; there is nothing computer-connected about them. Somewhere near the nearest elevated position in relation to the target there is a spotter, who notes the fall of shot and calls the corrections; "left two, up fifty", or "in line, on for range; fire for effect". The latter would be followed by a barrage on what the spotter had identified as a direct hit by the spotting rounds. ..."
Jun 14, 2019 | thenewkremlinstooge.wordpress.com

Mark Chapman June 12, 2019 at 10:31 am

Well, well; look at that. Our old acquaintance Crowdstrike has gone public, and in its IPO debut, the stock surged to a market cap of over $12 Billion – worth nearly as much as Symantec, which has been around for nearly 40 years. Up 83% in a single day. Gee; I wonder who's buying in? I guess we can look forward to more whispering about Russian cybercrime and internet invasion in the days to come. Stealing elections, even, maybe, hmmm?

https://www.cnbc.com/2019/06/12/crowdstrike-ipo-stock-starts-trading-on-the-nasdaq.html

Surprisingly, Crowdstrike's CEO – George Kurtz – does not have a background in the national intelligence services, or none that is immediately apparent. He seems to have worked mostly in private security, having gotten into it fairly early on, and is an accountant by trade; he seems to be the public face of the firm, and to be mostly involved in marketing.

However, their president of services, Shawn Henry, is a former executive assistant director of the FBI, and I imagine its employees include quite a few former government spooks and ideologues.

https://www.crowdstrike.com/about-crowdstrike/executive-team/george-kurtz/

The other co-founder, though, is Dmitry Alperovitch.

https://www.breitbart.com/politics/2017/01/06/dnc-russian-hacking-conclusion-comes-google-linked-firm/

He's a Senior Fellow at the Atlantic Council think tank, a direct adviser to the US Department of Defense, connected to Hillary Clinton and runs a new corporation whose startup cash came from Google. There's something even bigger than Google – corporations now seem more and more to be merging into what are essentially mini-states within the state itself – and it is called Alphabet Capital, Google's parent company. The Chairman of Alphabet Capital is Eric Schmidt, and he was actively working for Hillary Clinton during the last election when she spectacularly failed to make the cut.

https://www.zerohedge.com/news/2017-03-24/what-crowdstrike-firm-hired-dnc-has-ties-hillary-clinton-ukrainian-billionaire-and-g

Google, allegedly, is becoming more and more an arm of the Democratic Party in the USA.

There is also another gap in play: The shrinking distance between Google and the Democratic Party. Former Google executive Stephanie Hannon is the Clinton campaign's chief technology officer, and a host of ex-Googlers are currently employed as high-ranking technical staff at the Obama White House. Schmidt, for his part, is one of the most powerful donors in the Democratic Party -- and his influence does not stem only from his wealth, estimated by Forbes at more than $10 billion.

Wheels within wheels, and connections seen and unseen. Several security professionals and software developers have alluded to Crowdstrike's reports on international hacking as being full of shit – but the American enforcement and intelligence services seem content to outsource their cyber work more or less exclusively to Crowdstrike. And the results of its IPO suggest high confidence on the part of investors that it is going to become ever-more-closely allied to the US government, font of government grants and funding which can be hard to trace.

Mark Chapman June 12, 2019 at 4:25 pm
Here's a colorful account of Crowdstrike's exploits and their alleged track record of coming up with convenient narratives on demand.

https://blogs.timesofisrael.com/the-russian-collusion-delusion-in-a-nutshell/

For what it's worth, the Crowdstrike story that Russian cyber-meddling had knocked out 80% of Ukrainian artillery systems was deemed bogus by several other sources, including the Ukrainian Army. At its most basic, artillery systems are large ballistic rifles that drop artillery shells on a predetermined position by looking the reference up on a gridded map and inputting corrections for elevation and azimuth; there is nothing computer-connected about them. Somewhere near the nearest elevated position in relation to the target there is a spotter, who notes the fall of shot and calls the corrections; "left two, up fifty", or "in line, on for range; fire for effect". The latter would be followed by a barrage on what the spotter had identified as a direct hit by the spotting rounds.

Kaspersky Labs also took Crowdstrike apart,

https://therearenosunglasses.wordpress.com/2017/01/31/kasperskys-war-on-crowdstrike-evangelist-dmitri-alperovitch/

and mention of Kaspersky reminded me the US government had used 'advice' from its security experts to determine Kaspersky products constituted a threat to US national security just like Huawei, a connection I have not seen made yet elsewhere.

Mmmm .I wonder if Crowdstrike is not being set up specifically to provide the US government with substantiation for banning technical products which have the potential to achieve dominant market share, but cannot be manipulated by Washington because they are owned by non-aligned countries?

[Jun 13, 2019] A loyal servant of empire -- Crowdstrike CEO -- is well-rewarded for his role in creating Russiagate hysteria by Caitlin Johnstone

Notable quotes:
"... Never mind that to this day the DNC servers have not been examined by the FBI, nor indeed were they examined by the Special Counsel of Robert " Iraq has WMD " Mueller, preferring instead to go with the analyses of this extremely shady outfit with extensive and well-documented ties with the oligarchic leaders of the US-centralized empire. ..."
"... When the Romanian REAL Guccifer got Podesta password (password) by phishing, exposing his pizza and walnut sauce perversions, the US had him jailed. When WikiLeaks made a DNC dump, CrowdStrike concocted Guccifer 2.0, then more leaks Fancy Bear, and more leaks Cozy Bear. All these CrowdStrike fabrications used CIA Vault 7 fingerprints to frame Russia. It is time to execute our ruling demonic warlords. ..."
Jun 13, 2019 | caitlinjohnstone.com

A new article by Forbes reports that the CEO of Crowdstrike, the extremely shady cybersecurity corporation which was foundational in the construction of the official CIA/CNN Russian hacking narrative, is now a billionaire. George Kurtz ascended to the billionaire rankings on the back of soaring stocks immediately after the company went public, carried no doubt on the winds of the international fame it gained from its central protagonistic role in the most well-known hacking news story of all time.

A loyal servant of empire well-rewarded. Never mind that US government insiders like Hillary Clinton had been prepping for escalations against Russia well in advance of the 2016 elections, and that their preexisting agendas to shove a geostrategic obstacle off the world stage benefitted from the hacking narrative as much as George Kurtz did.

Never mind that Crowdstrike is tied to the NATO narrative management firm known as the Atlantic Council, which receives funding from the US government, the EU, NATO, Gulf states and powerful international oligarchs. Never mind either that Crowdstrike was financed with a whopping $100 million from Google , which has had a cozy relationship with US intelligence agencies since its very inception .

Never mind that to this day the DNC servers have not been examined by the FBI, nor indeed were they examined by the Special Counsel of Robert " Iraq has WMD " Mueller, preferring instead to go with the analyses of this extremely shady outfit with extensive and well-documented ties with the oligarchic leaders of the US-centralized empire.

Also never mind that the Crowdstrike analyst who led forensics on those DNC servers had in fact worked for and was promoted by Robert Mueller while the two were in the FBI.

The CEO of the Atlantic Council-tied Crowdstrike, which formed the foundation of the official CIA/CNN Russian hacking narrative, is now a billionaire. I'm telling you, the real underlying currency of this world is narrative and the ability to control it. https://t.co/XsBCvkIDzJ -- Caitlin Johnstone ⏳ (@caitoz) June 12, 2019
As I never tire of saying, the real underlying currency in our world is not gold, nor bureaucratic fiat, nor even raw military might.

The real underlying currency of our world is narrative, and the ability to control it.

As soon as you really grok this dynamic, you start noticing it everywhere.

George Kurtz is one clear example today of narrative control's central role in the maintenance and expansion of existing power structures, as well as an illustration of how the empire is wired to reward those who advance pro-empire narratives and punish those who damage them...

... ... ...

Joseph Olson / June 13, 2019
When the Romanian REAL Guccifer got Podesta password (password) by phishing, exposing his pizza and walnut sauce perversions, the US had him jailed. When WikiLeaks made a DNC dump, CrowdStrike concocted Guccifer 2.0, then more leaks Fancy Bear, and more leaks Cozy Bear. All these CrowdStrike fabrications used CIA Vault 7 fingerprints to frame Russia. It is time to execute our ruling demonic warlords.

[May 11, 2019] Crowdstrike planted the malware on DNC systems, which they discovered later

Highly recommended!
Notable quotes:
"... Also note: Crowdstrike planted the malware on DNC systems, which they "discovered" later - https://disobedientmedia.com/2017/12/fancy-frauds-bogus-bears-malware-m ..."
"... And look who else sits on the Atlantic Council - http://www.atlanticcouncil.org/about/experts/list/irene-chalupa why it's the sister of Andrea Chalupa, unregistered foreign agent employed by the DNC as a "Consultant", whose entire family is tied to Ukraine Intelligence. ..."
"... Irena Chalupa is also the news anchor for Ukraine's propaganda channel Stopfake.org She is a Ukrainian Diaspora leader. The Chalupas are the first family of Ukrainian propaganda. She works with and for Ukrainian Intelligence through the Atlantic Council, Stopfake.org, and her sisters Andrea (EuromaidanPR) and Alexandra. ..."
Mar 03, 2018 | www.zerohedge.com

mc888 Fri, 03/02/2018 - 20:06 Permalink

Thanks Tyler.

Also note: Crowdstrike planted the malware on DNC systems, which they "discovered" later - https://disobedientmedia.com/2017/12/fancy-frauds-bogus-bears-malware-m

(if that's too 'in the weeds' for you, ask your tech guys to read and verify)

And look who else sits on the Atlantic Council - http://www.atlanticcouncil.org/about/experts/list/irene-chalupa why it's the sister of Andrea Chalupa, unregistered foreign agent employed by the DNC as a "Consultant", whose entire family is tied to Ukraine Intelligence.

http://theantimedia.org/propornot-2017-biggest-fake-news-story/

Irena Chalupa is also the news anchor for Ukraine's propaganda channel Stopfake.org She is a Ukrainian Diaspora leader. The Chalupas are the first family of Ukrainian propaganda. She works with and for Ukrainian Intelligence through the Atlantic Council, Stopfake.org, and her sisters Andrea (EuromaidanPR) and Alexandra.

and lest we forget crazy eyes #1

http://theduran.com/adam-schiffs-collusion-with-oligarch-ukrainian-arms

[May 11, 2019] Why Crowdstrike's Russian Hacking Story Fell Apart -- Say Hello to Fancy Bear

Highly recommended!
Notable quotes:
"... Ukraine has been screaming for the US to start a war with Russia for the past 2 1/2 years. ..."
"... Is Ukrainian Intelligence trying to invent a reason for the US to take a hard-line stance against Russia? Are they using Crowdstrike to carry this out? ..."
"... Meet the real Fancy Bear and Cozy Bear, part of the groups that are targeting Ukrainian positions for the Donetsk and Lugansk People's Republics. These people were so tech savvy they didn't know the Ukrainian SBU (Ukrainian CIA/internal security) records every phone call and most internet use in Ukraine and Donbass. Donbass still uses Ukrainian phone and internet services. ..."
"... This is a civil war and people supporting either side are on both sides of the contact line. The SBU is awestruck because there are hundreds if not thousands of people helping to target the private volunteer armies supported by Ukrainian-Americans. ..."
"... If she was that close to the investigation Crowdstrike did how credible is she? Her sister Alexandra was named one of 16 people that shaped the election by Yahoo news. The DNC hacking investigation done by Crowdstrike concluded hacking was done by Russian actors based on the work done by Alexandra Chalupa? That is the conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the Russian government connection. These words mirror Dimitri Alperovitch's identification process in his interview with PBS Judy Woodruff. ..."
"... How close is Dimitri Alperovitch to DNC officials? Close enough professionally he should have stepped down from an investigation that had the chance of throwing a presidential election in a new direction. ..."
"... According to Esquire.com , Alperovitch has vetted speeches for Hillary Clinton about cyber security issues in the past. Because of his work on the Sony hack, President Barrack Obama personally called and said the measures taken were directly because of his work. ..."
"... Still, this is not enough to show a conflict of interest. Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian propagandists, and Ukrainian state supported hackers do. When it all adds up and you see it together, we have found a Russian that tried hard to influence the outcome of the US presidential election in 2016. ..."
"... According to Robert Parry's article At the forefront of people that would have taken senior positions in a Clinton administration and especially in foreign policy are the Atlantic Council. Their main goal is still a major confrontation with nuclear-armed Russia. ..."
"... The Atlantic Council is the think tank associated and supported by the CEEC (Central and Eastern European Coalition). The CEEC has only one goal which is war with Russia. Their question to candidates looking for their support in the election was "Are you willing to go to war with Russia?" Hillary Clinton has received their unqualified support throughout the campaign. ..."
"... What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the Atlantic Council would have taken senior cabinet and policy positions, his own fellowship status at the Atlantic Council and relationship with Irene Chalupa creates a definite conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or Homeland Security? ..."
"... Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence groups is where things really heat up. Noted above she works with Euromaidanpress.com and Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers. ..."
"... When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and its hackers individually . There is a mutual relationship. When you add up his work for the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be investigated to see if Ukraine is conspiring against the US government. ..."
"... Alperovitch and Fancy Bear tweet each other? ..."
"... Crowdstrike is part of Ukrainian nationalist hacker network ..."
"... In an interview with Euromaidanpress these hackers say they have no need for the CIA. They consider the CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance is a quasi-organization with the participation of several groups – RUH8, Trinity, Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the Myrotvorets site, Informnapalm analytical agency." ..."
"... Although OSINT Academy sounds fairly innocuous, it's the official twitter account for Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence. The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates journalists and other people for assassination. If you disagree with OUNb politics, you could be on the list. ..."
"... This single tweet on a network chart shows that out of all the Ukrainian Ministry of Information Minister's following, he only wanted the 3 hacking groups associated with both him and Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be shared heavily. If it was a victory for the hacking squad, it would be smart to keep it to themselves and not draw unwanted attention. ..."
"... Pravy Sektor Hackers and Crowdstrike? ..."
"... What sharp movements in international politics have been made lately? Let me spell it out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored, Russian language hackers in Eastern European time zones have shown with the Surkov hack they have the tools and experience to hack states that are looking out for it. They are also laughing at US intel efforts. ..."
"... The hackers also made it clear that they will do anything to serve Ukraine. Starting a war between Russia and the USA is the one way they could serve Ukraine best, and hurt Russia worst. Given those facts, if the DNC hack was according to the criteria given by Alperovitch, both he and these hackers need to be investigated. ..."
"... According to the Esquire interview "Alperovitch was deeply frustrated: He thought the government should tell the world what it knew. There is, of course, an element of the personal in his battle cry. "A lot of people who are born here don't appreciate the freedoms we have, the opportunities we have, because they've never had it any other way," he told me. "I have." ..."
"... While I agree patriotism is a great thing, confusing it with this kind of nationalism is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering a conflict with Russia that is against American interests, he's a patriot. He isn't serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to Ukraine. ..."
Dec 29, 2017 | www.washingtonsblog.com

In the wake of the JAR-16-20296 dated December 29, 2016 about hacking and influencing the 2016 election, the need for real evidence is clear. The joint report adds nothing substantial to the October 7th report. It relies on proofs provided by the cyber security firm Crowdstrike that is clearly not on par with intelligence findings or evidence. At the top of the report is an "as is" statement showing this.

The difference between Dmitri Alperovitch's claims which are reflected in JAR-1620296 and this article is that enough evidence is provided to warrant an investigation of specific parties for the DNC hacks. The real story involves specific anti-American actors that need to be investigated for real crimes.

For instance, the malware used was an out-dated version just waiting to be found. The one other interesting point is that the Russian malware called Grizzly Steppe is from Ukraine . How did Crowdstrike miss this when it is their business to know?

Later in this article you'll meet and know a little more about the real "Fancy Bear and Cozy Bear." The bar for identification set by Crowdstrike has never been able to get beyond words like probably, maybe, could be, or should be, in their attribution.

The article is lengthy because the facts need to be in one place. The bar Dimitri Alperovitch set for identifying the hackers involved is that low. Other than asking America to trust them, how many solid facts has Alperovitch provided to back his claim of Russian involvement?

The December 29th JAR adds a flowchart that shows how a basic phishing hack is performed. It doesn't add anything significant beyond that. Noticeably, they use both their designation APT 28 and APT 29 as well as the Crowdstrike labels of Fancy Bear and Cozy Bear separately.

This is important because information from outside intelligence agencies has the value of rumor or unsubstantiated information at best according to policy. Usable intelligence needs to be free from partisan politics and verifiable. Intel agencies noted back in the early 90's that every private actor in the information game was radically political.

The Hill.com article about Russia hacking the electric grid is a perfect example of why this intelligence is political and not taken seriously. If any proof of Russian involvement existed, the US would be at war. Under current laws of war, there would be no difference between an attack on the power grid or a missile strike.

According to the Hill "Private security firms provided more detailed forensic analysis, which the FBI and DHS said Thursday correlated with the IC's findings.

"The Joint Analysis Report recognizes the excellent work undertaken by
security companies and private sector network owners and operators, and provides new indicators of compromise and malicious infrastructure
identified during the course of investigations and incident response," read a statement. The report identities two Russian intelligence groups already named by CrowdStrike and other private security firms."

In an interview with Washingtonsblog , William Binney, the creator of the NSA global surveillance system said "I expected to see the IP's or other signatures of APT's 28/29 [the entities which the U.S. claims hacked the Democratic emails] and where they were located and how/when the data got transferred to them from DNC/HRC [i.e. Hillary Rodham Clinton]/etc. They seem to have been following APT 28/29 since at least 2015, so, where are they?"

According to the latest Washington Post story, Crowdstrike's CEO tied a group his company dubbed "Fancy Bear" to targeting Ukrainian artillery positions in Debaltsevo as well as across the Ukrainian civil war front for the past 2 years.

Alperovitch states in many articles the Ukrainians were using an Android app to target the self-proclaimed Republics positions and that hacking this app was what gave targeting data to the armies in Donbass instead.

Alperovitch first gained notice when he was the VP in charge of threat research with McAfee. Asked to comment on Alperovitch's discovery of Russian hacks on Larry King, John McAfee had this to say. "Based on all of his experience, McAfee does not believe that Russians were behind the hacks on the Democratic National Committee (DNC), John Podesta's emails, and the Hillary Clinton presidential campaign. As he told RT, "if it looks like the Russians did it, then I can guarantee you it was not the Russians."

How does Crowdstrike's story part with reality? First is the admission that it is probably, maybe, could be Russia hacking the DNC. " Intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to Wiki Leaks."

The public evidence never goes beyond the word possibility. While never going beyond that or using facts, Crowdstrike insists that it's Russia behind both Clinton's and the Ukrainian losses. NBC carried the story because one of the partners in Crowdstrike is also a consultant for NBC.

According to NBC the story reads like this." The company, Crowdstrike, was hired by the DNC to investigate the hack and issued a report publicly attributing it to Russian intelligence. One of Crowdstrike's senior executives is Shawn Henry, a former senior FBI official who consults for NBC News.

"But the Russians used the app to turn the tables on their foes, Crowdstrike says. Once a Ukrainian soldier downloaded it on his Android phone, the Russians were able to eavesdrop on his communications and determine his position through geo-location.

In June, Crowdstrike went public with its findings that two separate Russian intelligence agencies had hacked the DNC. One, which Crowdstrike and other researchers call Cozy Bear, is believed to be linked to Russia's CIA, known as the FSB. The other, known as Fancy Bear, is believed to be tied to the military intelligence agency, called the GRU."

The information is so certain the level of proof never rises above "believed to be." According to the December 12th Intercept article "Most importantly, the Post adds that "intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to WikiLeaks."

Because Ukrainian soldiers are using a smartphone app they activate their geolocation to use it. Targeting is from location to location. The app would need the current user location to make it work.

In 2015 I wrote an article that showed many of the available open source tools that geolocate, and track people. They even show street view. This means that using simple means, someone with freeware or an online website, and not a military budget can look at what you are seeing at any given moment.

Where Crowdstrike fails is insisting people believe that the code they see is (a) an advanced way to geolocate and (b) it was how a state with large resources would do it. Would you leave a calling card where you would get caught and fined through sanctions or worse? If you use an anonymous online resource at least Crowdstrike won't believe you are Russian and possibly up to something.

" Using open source tools this has been going on for years in the private sector. For geolocation purposes, your smartphone is one of the greatest tools to use. Finding and following you has never been easier . Let's face it if you are going to stalk someone, "street view" on a map is the next best thing to being there. In the following video, the software hacks your modem. It's only one step from your phone or computer."

If you read that article and watch the video you'll see that using "geo-stalker" is a better choice if you are on a low budget or no budget. Should someone tell the Russians they overpaid?

According to Alperovitch, the smartphone app plotted targets in about 15 seconds . This means that there is only a small window to get information this way.

Using the open source tools I wrote about previously, you could track your targets all-day. In 2014, most Ukrainian forces were using social media regularly. It would be easy to maintain a map of their locations and track them individually.

From my research into those tools, someone using Python scripts would find it easy to take photos, listen to conversations, turn on GPS, or even turn the phone on when they chose to. Going a step further than Alperovitch, without the help of the Russian government, GRU, or FSB, anyone could take control of the drones Ukraine is fond of flying and land them. Or they could download the footage the drones are taking. It's copy and paste at that point. Would you bother the FSB, GRU, or Vladimir Putin with the details or just do it?

In the WaPo article Alperovitch states "The Fancy Bear crew evidently hacked the app, allowing the GRU to use the phone's GPS coordinates to track the Ukrainian troops' position.

In that way, the Russian military could then target the Ukrainian army with artillery and other weaponry. Ukrainian brigades operating in eastern Ukraine were on the front lines of the conflict with Russian-backed separatist forces during the early stages of the conflict in late 2014, CrowdStrike noted. By late 2014, Russian forces in the region numbered about 10,000. The Android app was useful in helping the Russian troops locate Ukrainian artillery positions."

In late 2014, I personally did the only invasive passport and weapons checks that I know of during the Ukrainian civil war. I spent days looking for the Russian army every major publication said were attacking Ukraine. The keyword Cyber Security industry leader Alperovitch used is "evidently." Crowdstrike noted that in late 2014, there were 10,000 Russian forces in the region.

When I did the passport and weapons check, it was under the condition there would be no telephone calls. We went where I wanted to go. We stopped when I said to stop. I checked the documents and the weapons with no obstacles. The weapons check was important because Ukraine was stating that Russia was giving Donbass modern weapons at the time. Each weapon is stamped with a manufacture date. The results are in the articles above.

The government in Kiev agreed with my findings throughout 2014 and 2015. There were and are no Russian troops fighting in Donbass regardless of what Mr. Alperovitch asserts. There are some Russian volunteers which I have covered in detail.

Based on my findings which the CIA would call hard evidence, almost all the fighters had Ukrainian passports. There are volunteers from other countries. In Debaltsevo today, I would question Alperovitch's assertion of Russian troops based on the fact the passports will be Ukrainian and reflect my earlier findings. There is no possibly, could be, might be, about it.

The SBU, Olexander Turchinov, and the Ukrainian Ministry of Defense all agree that Crowdstrike is dead wrong in this assessment . Although subtitles aren't on it, the former Commandant of Ukrainian Army Headquarters thanks God Russia never invaded or Ukraine would have been in deep trouble.

How could Dimitri Alperovitch and Crowdstrike be this wrong on easily checked detail and still get this much media attention? Could the investment made by Google and some very large players have anything to do with the media Crowdstrike is causing?

In an interview with PBS newshour on December 22nd 2016, Dmitri Alperovitch finally produced the hard evidence he has for Russian involvement clearly. To be fair, he did state it several times before. It just didn't resonate or the media and US intelligence agencies weren't listening.

According to Alperovitch, the CEO of a $150 million dollar cyber security company "And when you think about, well, who would be interested in targeting Ukraine artillerymen in eastern Ukraine who has interest in hacking the Democratic Party, Russia government comes to mind, but specifically, Russian military that would have operational over forces in the Ukraine and would target these artillerymen."

That statement is most of the proof of Russian involvement he has. That's it, that's all the CIA, FBI have to go on. It's why they can't certify the intelligence. It's why they can't get beyond the threshold of maybe.

Woodruff then asked two important questions. She asked if Crowdstrike was still working for the DNC. Alperovitch responded "We're protecting them going forward. The investigation is closed in terms of what happened there. But certainly, we've seen the campaigns, political organizations are continued to be targeted, and they continue to hire us and use our technology to protect themselves."

Based on the evidence he presented Woodruff, there is no need to investigate further? Obviously, there is no need, the money is rolling in.

Second and most important Judy Woodruff asked if there were any questions about conflicts of interest, how he would answer? This is where Dmitri Alperovitch's story starts to unwind.

His response was "Well, this report was not about the DNC. This report was about information we uncovered about what these Russian actors were doing in eastern Ukraine in terms of locating these artillery units of the Ukrainian army and then targeting them. So, what we just did is said that it looks exactly as the same to the evidence we've already uncovered from the DNC, linking the two together."

Why is this reasonable statement going to take his story off the rails? First, let's look at the facts surrounding his evidence and then look at the real conflicts of interest involved. While carefully evading the question, he neglects to state his conflicts of interest are worthy of a DOJ investigation. Can you mislead the federal government about national security issues and not get investigated yourself?

If Alperovitch's evidence is all there is, then the US government owes some large apologies to Russia.

After showing who is targeting Ukrainian artillerymen, we'll look at what might be a criminal conspiracy.

Crowdstrike CEO Dmitri Alperovitch story about Russian hacks that cost Hillary Clinton the election was broadsided by the SBU (Ukrainian Intelligence and Security) in Ukraine. If Dimitri Alperovitch is working for Ukrainian Intelligence and is providing intelligence to 17 US Intelligence Agencies is it a conflict of interest?

Ukraine has been screaming for the US to start a war with Russia for the past 2 1/2 years. Using facts accepted by leaders on both sides of the conflict, the main proof Crowdstrike shows for evidence doesn't just unravel, it falls apart. Is Ukrainian Intelligence trying to invent a reason for the US to take a hard-line stance against Russia? Are they using Crowdstrike to carry this out?

Real Fancy Bear?

Real Fancy Bear?

Meet the real Fancy Bear and Cozy Bear, part of the groups that are targeting Ukrainian positions for the Donetsk and Lugansk People's Republics. These people were so tech savvy they didn't know the Ukrainian SBU (Ukrainian CIA/internal security) records every phone call and most internet use in Ukraine and Donbass. Donbass still uses Ukrainian phone and internet services.

These are normal people fighting back against private volunteer armies that target their homes, schools, and hospitals. The private volunteer armies like Pravy Sektor, Donbas Battalion, Azov, and Aidar have been cited for atrocities like child rape, torture, murder, and kidnapping. That just gets the ball rolling. These are a large swath of the Ukrainian servicemen Crowdstrike hopes to protect.

This story which just aired on Ukrainian news channel TCN shows the SBU questioning and arresting some of what they call an army of people in the Ukrainian-controlled areas. This news video shows people in Toretsk that provided targeting information to Donbass and people probably caught up in the net accidentally.

This is a civil war and people supporting either side are on both sides of the contact line. The SBU is awestruck because there are hundreds if not thousands of people helping to target the private volunteer armies supported by Ukrainian-Americans.

The first person they show on the video is a woman named Olga Lubochka. On the video her voice is heard from a recorded call saying " In the field, on the left about 130 degrees. Aim and you'll get it." and then " Oh, you hit it so hard you leveled it to the ground.""Am I going to get a medal for this?"

Other people caught up in the raid claim and probably were only calling friends they know. It's common for people to call and tell their family about what is going on around them. This has been a staple in the war especially in outlying villages for people aligned with both sides of the conflict. A neighbor calls his friend and says "you won't believe what I just saw."

Another "fancy bear," Alexander Schevchenko was caught calling friends and telling them that armored personnel carriers had just driven by.

Anatoli Prima, father of a DNR(Donetsk People's Republic) soldier was asked to find out what unit was there and how many artillery pieces.

One woman providing information about fuel and incoming equipment has a husband fighting on the opposite side in Gorlovka. Gorlovka is a major city that's been under artillery attack since 2014. For the past 2 1/2 years, she has remained in their home in Toretsk. According to the video, he's vowed to take no prisoners when they rescue the area.

When asked why they hate Ukraine so much, one responded that they just wanted things to go back to what they were like before the coup in February 2014.

Another said they were born in the Soviet Union and didn't like what was going on in Kiev. At the heart of this statement is the anti- OUN, antinationalist sentiment that most people living in Ukraine feel. The OUNb Bandera killed millions of people in Ukraine, including starving 3 million Soviet soldiers to death. The new Ukraine was founded in 1991 by OUN nationalists outside the fledgling country.

Is giving misleading or false information to 17 US Intelligence Agencies a crime? If it's done by a cyber security industry leader like Crowdstrike should that be investigated? If unwinding the story from the "targeting of Ukrainian volunteers" side isn't enough, we should look at this from the American perspective. How did the Russia influencing the election and DNC hack story evolve? Who's involved? Does this pose conflicts of interest for Dmitri Alperovitch and Crowdstrike? And let's face it, a hacking story isn't complete until real hackers with the skills, motivation, and reason are exposed.

In the last article exploring the DNC hacks the focus was on the Chalupas . The article focused on Alexandra, Andrea, and Irene Chalupa. Their participation in the DNC hack story is what brought it to international attention in the first place.

According to journalist and DNC activist Andrea Chalupa on her Facebook page " After Chalupa sent the email to Miranda (which mentions that she had invited this reporter to a meeting with Ukrainian journalists in Washington), it triggered high-level concerns within the DNC, given the sensitive nature of her work. "That's when we knew it was the Russians," said a Democratic Party source who has been directly involved in the internal probe into the hacked emails. In order to stem the damage, the source said, "we told her to stop her research."" July 25, 2016

If she was that close to the investigation Crowdstrike did how credible is she? Her sister Alexandra was named one of 16 people that shaped the election by Yahoo news. The DNC hacking investigation done by Crowdstrike concluded hacking was done by Russian actors based on the work done by Alexandra Chalupa? That is the conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the Russian government connection. These words mirror Dimitri Alperovitch's identification process in his interview with PBS Judy Woodruff.

How close is Dimitri Alperovitch to DNC officials? Close enough professionally he should have stepped down from an investigation that had the chance of throwing a presidential election in a new direction.

According to Esquire.com , Alperovitch has vetted speeches for Hillary Clinton about cyber security issues in the past. Because of his work on the Sony hack, President Barrack Obama personally called and said the measures taken were directly because of his work.

Still, this is not enough to show a conflict of interest. Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian propagandists, and Ukrainian state supported hackers do. When it all adds up and you see it together, we have found a Russian that tried hard to influence the outcome of the US presidential election in 2016.

In my previous article I showed in detail how the Chalupas fit into this. A brief bullet point review looks like this.

In January, 2014 when he showed up at the Maidan protests he was 17 years old. He became the foreign language media representative for Vitali Klitschko, Arseni Yatsenyuk, and Oleh Tyahnybok. All press enquiries went through Yurash. To meet Dimitri Yurash you had to go through Sviatoslav Yurash as a Macleans reporter found out.

At 18 years old, Sviatoslav Yurash became the spokesman for Ministry of Defense of Ukraine under Andrei Paruby. He was Dimitri Yarosh's spokesman and can be seen either behind Yarosh on videos at press conferences or speaking ahead of him to reporters. From January 2014 onward, to speak to Dimitri Yarosh, you set up an appointment with Yurash.

Andrea Chalupa has worked with Yurash's Euromaidan Press which is associated with Informnapalm.org and supplies the state level hackers for Ukraine.

According to Robert Parry's article At the forefront of people that would have taken senior positions in a Clinton administration and especially in foreign policy are the Atlantic Council. Their main goal is still a major confrontation with nuclear-armed Russia.

The Atlantic Council is the think tank associated and supported by the CEEC (Central and Eastern European Coalition). The CEEC has only one goal which is war with Russia. Their question to candidates looking for their support in the election was "Are you willing to go to war with Russia?" Hillary Clinton has received their unqualified support throughout the campaign.

What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the Atlantic Council would have taken senior cabinet and policy positions, his own fellowship status at the Atlantic Council and relationship with Irene Chalupa creates a definite conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or Homeland Security?

When you put someone that has so much to gain in charge of an investigation that could change an election, that is a conflict of interest. If the think tank is linked heavily to groups that want war with Russia like the Atlantic Council and the CEEC, it opens up criminal conspiracy.

If the person in charge of the investigation is a fellow at the think tank that wants a major conflict with Russia it is a definite conflict of interest. Both the Atlantic Council and clients stood to gain Cabinet and Policy positions based on how the result of his work affects the election. It clouds the results of the investigation. In Dmitri Alperovitch's case, he found the perpetrator before he was positive there was a crime.

Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence groups is where things really heat up. Noted above she works with Euromaidanpress.com and Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers.

When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and its hackers individually . There is a mutual relationship. When you add up his work for the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be investigated to see if Ukraine is conspiring against the US government.

Alperovitch and Fancy Bear tweet each other?

Alperovitch and Fancy Bear tweet each other?

Crowdstrike is also following their hack of a Russian government official after the DNC hack. It closely resembles the same method used with the DNC because it was an email hack.

ff-twitter-com-2016-12-30-02-24-54

Crowdstrike's product line includes Falcon Host, Falcon Intelligence, Falcon Overwatch and Falcon DNS. Is it possible the hackers in Falcons Flame are another service Crowdstrike offers? Although this profile says Virginia, tweets are from the Sofia, Bulgaria time zone and he writes in Russian. Another curiosity considering the Fancy Bear source code is in Russian. This image shows Crowdstrike in their network.

Crowdstrike is part of Ukrainian nationalist hacker network

In an interview with Euromaidanpress these hackers say they have no need for the CIA. They consider the CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance is a quasi-organization with the participation of several groups – RUH8, Trinity, Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the Myrotvorets site, Informnapalm analytical agency."

In the image it shows a network diagram of Crowdstrike following the Surkov leaks. The network communication goes through a secondary source. This is something you do when you don't want to be too obvious. Here is another example of that.

Ukrainian Intelligence and the real Fancy Bear?

Ukrainian Intelligence and the real Fancy Bear?

Although OSINT Academy sounds fairly innocuous, it's the official twitter account for Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence. The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates journalists and other people for assassination. If you disagree with OUNb politics, you could be on the list.

Should someone tell Dimitri Alperovitch that Gerashchenko, who is now in charge of Peacekeeper recently threatened president-elect Donald Trump that he would put him on his "Peacemaker" site as a target? The same has been done with Silvio Berscaloni in the past.

Trying not to be obvious, the Head of Ukraine's Information Ministry (UA Intelligence) tweeted something interesting that ties Alperovitch and Crowdstrike to the Ukrainian Intelligence hackers and the Information Ministry even tighter.

Trying to keep it hush hush?

Trying to keep it hush hush?

This single tweet on a network chart shows that out of all the Ukrainian Ministry of Information Minister's following, he only wanted the 3 hacking groups associated with both him and Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be shared heavily. If it was a victory for the hacking squad, it would be smart to keep it to themselves and not draw unwanted attention.

These same hackers are associated with Alexandra, Andrea, and Irene Chalupa through the portals and organizations they work with through their OUNb. The hackers are funded and directed by or through the same OUNb channels that Alperovitch is working for and with to promote the story of Russian hacking.

Pravy Sektor Hackers and Crowdstrike?

Pravy Sektor Hackers and Crowdstrike?

When you look at the image for the hacking group in the euromaidanpress article, one of the hackers identifies themselves as one of Dimitri Yarosh's Pravy Sektor members by the Pravy Sektor sweatshirt they have on. Noted above, Pravy Sektor admitted to killing the people at the Maidan protest and sparked the coup.

Going further with the linked Euromaidanpress article the hackers say" Let's understand that Ukrainian hackers and Russian hackers once constituted a single very powerful group. Ukrainian hackers have a rather high level of work. So the help of the USA I don't know, why would we need it? We have all the talent and special means for this. And I don't think that the USA or any NATO country would make such sharp movements in international politics."

What sharp movements in international politics have been made lately? Let me spell it out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored, Russian language hackers in Eastern European time zones have shown with the Surkov hack they have the tools and experience to hack states that are looking out for it. They are also laughing at US intel efforts.

The hackers also made it clear that they will do anything to serve Ukraine. Starting a war between Russia and the USA is the one way they could serve Ukraine best, and hurt Russia worst. Given those facts, if the DNC hack was according to the criteria given by Alperovitch, both he and these hackers need to be investigated.

According to the Esquire interview "Alperovitch was deeply frustrated: He thought the government should tell the world what it knew. There is, of course, an element of the personal in his battle cry. "A lot of people who are born here don't appreciate the freedoms we have, the opportunities we have, because they've never had it any other way," he told me. "I have."

While I agree patriotism is a great thing, confusing it with this kind of nationalism is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering a conflict with Russia that is against American interests, he's a patriot. He isn't serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to Ukraine.

The evidence presented deserves investigation because it looks like the case for conflict of interest is the least Dimitri Alperovitch should look forward to. If these hackers are the real Cozy Bear and Fancy Bear, they really did make sharp movements in international politics.

By pawning it off on Russia, they made a worldwide embarrassment of an outgoing President of the United States and made the President Elect the suspect of rumor.

From the Observer.com , " Andrea Chalupa -- the sister of DNC research staffer Alexandra Chalupa -- claimed on social media, without any evidence, that despite Clinton conceding the election to Trump, the voting results need to be audited to because Clinton couldn't have lost -- it must have been Russia. Chalupa hysterically tweeted to every politician on Twitter to audit the vote because of Russia and claimed the TV show The Americans , about two KGB spies living in America, is real."

Quite possibly now the former UK Ambassador Craig Murry's admission of being the involved party to "leaks" should be looked at. " Now both Julian Assange and I have stated definitively the leak does not come from Russia . Do we credibly have access? Yes, very obviously. Very, very few people can be said to definitely have access to the source of the leak. The people saying it is not Russia are those who do have access. After access, you consider truthfulness. Do Julian Assange and I have a reputation for truthfulness? Well in 10 years not one of the tens of thousands of documents WikiLeaks has released has had its authenticity successfully challenged. As for me, I have a reputation for inconvenient truth telling."


[May 10, 2019] Mueller Report - Expensive Estimations And Elusive Evidence by Adam Carter

Highly recommended!
Looks more and more like Crowdstrike conducted false flag operation to implicate Russians, not a real investigation.
I always assumed that #Guccifer2 was either a Crowdstryke construction at DNC request (that's probably why it was so badly, incompetently done) or a NSA construction (then, we somehow need to explain, why it was so badly done?). In both cases the goal was to implicate Russia in a DNC 'hack' ...
Craig Murray has stated he received the DNC files in Wash DC from a leaker. Mueller failed to interview him, which suggest the Mueller and his team were the part of cover-up, not the part of investigation.
Notable quotes:
"... We are told the GRU obtained files from the DNC network on April 22, 2016, (this is a little different to the Netyksho indictment that states the files were archived on April 22, 2016 and extracted later): ..."
"... The malware samples provided by CrowdStrike show that the earliest compile date of Fancy Bear malware reportedly discovered at the DNC was April 25, 2016 . ..."
"... Whoever was controlling the Guccifer 2.0 persona went out of their way to be perceived as Russian and made specious claims about having already sent WikiLeaks documents, even claiming that WikiLeaks would release them soon (all before Mueller records any initial contact between the parties) . ..."
"... The Special Counsel seems to have been impervious to critical pieces of countervailing evidence (some of which demonstrates that Guccifer 2.0 deliberately manufactured Russian breadcrumbs) and they have failed to accurately account for the acquisition of WikiLeaks' DNC emails (missing the date on which approximately 70% of them were collected) , which is, in itself, a stunning failure for a supposedly thorough investigation costing US taxpayers tens of millions of dollars. ..."
"... There should have been a proper, thorough, independent and impartial investigation into the Guccifer 2.0 persona. The Special Counsel certainly hasn't done that job and, in retrospect, looks to have been ill-equipped (and perhaps somewhat reluctant) to do so from the outset. ..."
May 06, 2019 | turcopolier.typepad.com

On April 18, 2019, a redacted version of Robert Mueller's report on "RussiaGate" related activities was released to the public.

This article focuses on Volume I Part III titled "Russian Hacking & Dumping Operations" and provides details of the errors made, critical omissions, lack of conclusive evidence and reliance on assumptions and speculation.

We will also look at problems relating to attribution methods used, countervailing evidence that has clearly been disregarded and other problems that are likely to have affected the quality of the investigation and the report.


The Mueller Report: Context & Contradiction

We start with a read-through of this section of the report, highlighting missing context, contradictions and errors.

Page 36

[To minimize repetition, we'll deal with statements made in this introduction where the basis is explained or details are provided on other pages ahead.]

Page 36

While the Netyksho indictment does provide details of intrusions and infrastructure used, it's still unclear how the infrastructure has been attributed back to individuals in the GRU and no conclusive evidence has been presented to support that in the indictment or the report.

Page 37

Some of the claims relating to state boards of elections are contradicted by the Department of Homeland Security , we'll return to this where it's covered in more detail later in the report.

Page 37

Whatever the sources are the GRU did their "learning" from they seem to have been outdated as many of the phishing emails were bounced due to being for individuals that were not involved in Clinton's 2016 campaign and that no longer had mailboxes on the relevant domains (they were involved in earlier campaigns in previous years) .

Page 39

In the Netyksho indictment it is stated that the "middle-servers" are overseas:

So, what was the point in having a US-based AMS Panel if you're using overseas servers as proxies?

This seems to be a needlessly noisy setup that somewhat defeats the purpose of having a US-based server for the AMS panel.

This setup makes the assets allegedly used by GRU officers subject to US laws, subject to Internet monitoring by US intelligence agencies and prone to being physically seized.

With the GRU using middle-servers, as alleged, there would have been absolutely no reason to have the AMS panel hosted on a server within the US and every reason to have it hosted elsewhere.

It almost seems like they wanted to get caught!

Page 40

We are told the GRU obtained files from the DNC network on April 22, 2016, (this is a little different to the Netyksho indictment that states the files were archived on April 22, 2016 and extracted later):

The problem with this is that it suggests the GRU had their implant on the DNC network earlier than what the available evidence supports.

The malware samples provided by CrowdStrike show that the earliest compile date of Fancy Bear malware reportedly discovered at the DNC was April 25, 2016 .

Perhaps they didn't discover all the malware until later? (Though, with their flagship product installed across the network, one would think they'd have detected all the malware present by the time they reported on discoveries).

Regarding the stolen opposition research, we've only seen the document as an attachment to one of Podesta's emails and a deliberately tainted version of the same document released by Guccifer 2.0.

The implication that this was stolen from the DNC is questionable due to this.

Going further, the story surrounding this changed in November 2017 when the Associated Press published a story titled " How Russians hacked the Democrats' emails " in which they cite an anonymous former DNC official who asserts that Guccifer 2.0's first document (the Trump opposition report) did not originate in the DNC as initially reported.

Another interesting point relating to this is the "HRC_pass.zip" archive released by Guccifer 2.0 on June 21, 2016 ( which also provided another US central timezone indication ) contained files with last modification dates of April 26, 2016. While this fits within the above timeframe, the transfer of the files individually, the apparent transfer speeds involved and the presence of FAT-like 2-second rounding artifacts ( noted elsewhere in Guccifer 2.0's releases ) when the files came from an NTFS system (and the ZIP implementation was not the cause) does not correlate well with what the report outlines.

In spite of its name ("HRC_pass.zip") this archive appears to contain files that can be sourced to the DNC. Out of 200 files, only one showed up as an attachment (in the Podesta emails) .

Regarding the May 25 - June 1 timeframe cited, this seems to exclude the date on which approximately 70% of the DNC's emails published on WikiLeaks' website were acquired (May 23, 2016)

What makes this interesting is that this is apparently being evaluated on evidence that was very likely to have been provided by CrowdStrike:

Page 40

How did Crowdstrike's evidence not inform the FBI and Special Counsel of the real initial acquisition date of WikiLeaks' DNC emails?

Was the May 23, 2016 activity not recorded?

Going back to the Netyksho indictment , we have also been told that Yermakov was searching for Powershell commands between the May 25 - June 1st period:

However, we know 70% of the DNC emails published by WikiLeaks had already been acquired prior to that time, before Yermakov had allegedly researched how to access and manage the Exchange server.

Page 41

We can tell from the use of "appear" here that the Special Counsel does not have conclusive evidence to demonstrate this.

Page 41

While the overlap between reported phishing victims and the output of DCLeaks cannot be denied, it is still unclear how bitcoin pools or leased infrastructure have been definitively tied back to any GRU officers or the GRU itself.

This isn't to say that there isn't evidence of it (I would assume there is some evidence or intelligence that supports the premise to some degree, at the very least) but we have no idea what that could be and there is no explanation of how associations to individual GRU officers were made (perhaps to protect HUMINT but this still leaves us completely in the dark as to how attributions were made) .

We know already that things are assumed by the Special Counsel on the basis of circumstantial evidence, so there is good reason to question whether the attributions made are based on conclusive evidence.

Page 42

This is the first point at which to recall Assange's announcement on 12 June that WikiLeaks was working on a release of "emails related to Hillary Clinton" - two days before the DNC goes public about being hacked by Russians, and three days before the appearance of Guccifer 2.0.

It's also approximately one month before Mueller says Guccifer 2.0 first successfully sent anything to WikiLeaks.

Whoever was controlling the Guccifer 2.0 persona went out of their way to be perceived as Russian and made specious claims about having already sent WikiLeaks documents, even claiming that WikiLeaks would release them soon (all before Mueller records any initial contact between the parties) .

While WikiLeaks did mention this via their Twitter feed on June 16, 2016, they were clearly skeptical of his claims to be a hacker and although they cite his claim about sending material to WikiLeaks, they don't confirm it:

It also seems a little odd that the GRU would do searches for already translated phrases (using Google translate to get English translations would be more understandable) and if it's Guccifer 2.0 doing it why did he not use the VPN he used for his other activities throughout the same day?

Why does the Mueller report not report on the IP address of the Moscow-based server from which searches occurred? It wouldn't really expose sources and methods to disclose it and it's unclear how it was determined to have been used and managed by a unit of the GRU. (Citation #146 references the Netyksho indictment, however, that fails to provide evidence or explanation of this too.)

Also, Guccifer 2.0 did not attribute the hack to a Romanian hacker in his first blog post , he didn't mention nationality until a week later (after he'd already gone out of his way to leave Russian breadcrumbs behind ) .

Page 43

The version of the opposition research document Guccifer 2.0 released was built using a prepared "Russian-tainted" template document .

The template was made by taking an attachment from one of John Podesta's emails (a document originally authored by Warren Flood in 2008) , stripping out the content, adding in Russian language stylesheet entries , altering "Confidential Draft" in the background of the document to "Confidential", altering the footer and then stripping out the body content.

The body content of a Trump Opposition research document (originally authored by Lauren Dillon) that was attached to another of Podesta's emails was then copied into the template document.

The document was saved (with a Russian author name), its body content cleared and this was then re-used to produce two further "Russia-tainted" documents.

It was no accident that led to the documents being tainted in the way that they were and it looks like Guccifer 2.0's version of the Trump opposition research didn't really come from the DNC.

Page 43

The email sent to The Smoking Gun revealed that Guccifer 2.0 appeared to be operating from somewhere in the central (US) time zone . It is one of several inexplicable examples of US timezone indications from Guccifer 2.0.

Page 43

It should be noted that the data referenced above was also unrelated to the general election and didn't have any noticeable impact on it (the 2.5Gb of data Guccifer 2.0 provided to Aaron Nevins was unlikely to have hurt the Clinton campaign or affect the outcome of the general election) .

In the states that the data related to, general election results didn't flip between the time of the publication of the documents and the election:

Page 43

Interesting to note that Guccifer 2.0 lied about DCLeaks being a "sub project" of WikiLeaks.

Page 44

The only materials Mueller alleges that WikiLeaks confirmed receipt of was a "1gb or so" archive, for which, instructions to access were communicated in an attached message (none-too-discreetly titled "wk dnc link1.txt.gpg") and sent by Guccifer 2 via unencrypted email.

It is an assumption that this was an archive of DNC emails (it could have contained other files Guccifer 2.0 subsequently released elsewhere).

We don't even know for sure whether WikiLeaks released what had been sent to them by either entity.

Even if, theoretically, the archive contained the emails, it couldn't have been the whole collection because the whole collection, when compressed, exceeds 2Gb of data .

This, of course, doesn't rule out the possibility of it being a portion of the overall collection but what the persona had sent to WikiLeaks could also easily have been other material relating to the DNC that we know Guccifer 2.0 later released or shared with other parties.

Page 45

This is the second point at which to recall Assange's 12 June TV announcement of upcoming "emails related to Hillary Clinton", coming two days before Guccifer 2.0's colleagues at DCLeaks reach out to WikiLeaks via unencrypted means on 14 June 2016 to offer "sensitive information" on Clinton.

Then, seven days after Guccifer 2 had already claimed to have sent material to WikiLeaks and stated that they'd soon release it (which made it sound as though he'd had confirmation back), we see that WikiLeaks reaches out to Guccifer 2.0 and suggests he sends material to them (as though there's never been any prior contact or provision of materials previously discussed) .

Page 45

How is it "clear" that both the DNC and Podesta documents were transferred from the GRU to WikiLeaks when there is only around a gigabyte of data acknowledged as received (and we don't even know what that data is) and little is known about the rest (and the report just speculates at possibilities) ?

Page 46

We aren't provided the full dialogue between WikiLeaks and Guccifer 2.0. Instead we have just a few words selected from the communication that could easily be out of context. The Netyksho indictment did exactly the same thing. Neither the indictment nor the report provide the full DM conversation in context.

(It certainly wouldn't harm HUMINT resources or expose methods if this evidence was released in full context.)

Would the GRU really engage in internal communications (eg GRU Guccifer 2.0 to GRU DCLeaks) via Twitter DMs? Maybe, but it seems insanely sloppy with regards to operational security of a clandestine organization communicating between its own staff.

The statement that concludes on the following page (see below) also seems a little bizarre. Would WikiLeaks really ask Guccifer 2.0 to DM DCLeaks to pass on such a message on their behalf?

Why doesn't Mueller provide the comms evidence of WikiLeaks asking Guccifer 2.0 for assistance in contacting DCLeaks?

As written, we are expected to take the words of Guccifer 2.0 (stating that the media organisation wished to talk to DCLeaks) at face value.

The problem with this is that we are talking about a persona who lied publicly about when he first sent material to WikiLeaks ( claiming to have done so already on the day appeared ) , lied about the relationship between WikiLeaks and DCLeaks and who had gone to a great deal of trouble to leave false Russian fingerprints in his work output.

Page 47

It was actually the last-modification date, not the creation date that was recorded as 19 September, 2016.

This wasn't necessarily the creation date and is only indicative of the last recorded write/copy operation (unless last modification date is preserved when copying but there's no way to determine that based on the available evidence) .

The gap between email file timestamps and attachment timestamps may simply be explained by WikiLeaks extracting the attachments from the EML files at a later stage. With the DNC emails we observed last-modifications dates as far back as May 23, 2016 but the attachments had last-modification dates that were much later (eg. July 21, 2016).

The wording is also worth noting: "Based on information about Assange's computer and its possible operating system" [emphasis mine] does not sound like it's based on reliable and factual information, it sounds like this is based on assessment/estimation. This also seems to be relying on an assumption that the only person handling files for WikiLeaks is Assange.

How have the Special Counsel cited WikiLeaks metadata for evidence where it's suited them yet, somehow, have managed to miss the May 23, 2016 date on which the DNC emails were initially being collected?

Going further, the report, based on speculation, suggests that the GRU staged releases in July (for DNC emails) and September (for Podesta emails). However, going off the same logic as the Special Counsel, with last-modification dates indicating when the email files are "staged", the evidence would theoretically point to the DNC emails being "staged" in May 2016).

It doesn't seem so reliable when the rule is applied multilaterally.

Of course, if both assumptions about staging dates are true, then we're left wondering what Julian Assange could have been talking about on June 12, 2016 when mentioning having emails relating to Hillary Clinton.

The speculation in the final paragraph of the above section also shows us that the Special Counsel lacks certainty on sources.

Page 48

Really, this correlation of dates (March 21, 2016 and the reported phishing incident relating to March 19, 2016) is one of the best arguments for saying that emails published by WikiLeaks were acquired through phishing or hacking incidents reported.

However, this merely suggests the method of acquisition, it says nothing of how the material got to WikiLeaks. We can make assumptions, but that's all we can do because the available evidence is circumstantial rather than conclusive.

Page 48

Far from "discredit[ing] WikiLeaks' claims about the source of the material it posted", the file transfer evidence doesn't conclusively demonstrate that WikiLeaks published anything sent to it by Guccifer 2.0 or DCLeaks.

Although there are hints that what was sent by Guccifer 2.0 related to the DNC, we don't know if this contained DNC emails or the other DNC related content he later released and shared with others.

"The statements about Seth Rich implied falsely that he had been the source of the stolen DNC emails" is itself a false statement. The reason Assange gave for offering a reward for information leading to the conviction of Seth Rich's killers was "Our sources take risks and they become concerned when they see things occurring like that [the death of DNC worker Seth Rich]... We have to understand how high the stakes are in the United States" ( source ) .

This implies WikiLeaks is offering the reward for info about Seth Rich at the behest of its actual source/s.

Page 49

By the time Trump had made the statements cited above, it was already assumed that Hillary had been hacked by the Russians, so Trump saying he hoped the Russians would find the emails seems more likely to have been in reference to what he assumed was already in their possession.

Finding those 30,000 emails also wouldn't be achieved through hacking at that point in time as the emails had already been deleted by Hillary Clinton's IT consultants in March 2015 .

Page 50

What is being described here is, to a considerable extent, just common exploit scanning on web services, scanning that will almost certainly have come from other nodes based in other nations too .

These scans are typically done via compromised machines, often with machines that are in nations completely separate to the nationality of those running the scanning effort.

The Department of Homeland Security threw cold water on this a long time ago.

DHS would not characterize these efforts as attacks, only "simple scanning ... which occurs all the time".

Page 51

There was no alteration of ballots or results at all anywhere as of a testimony by DHS Secretary Jeh Johnson on June 21 2017 nor since that time, according to Brian Krebs, to the date of a hearing on November 27, 2017 .

The remaining pages in this section of the report include a lot of redactions and mostly cover the actions of individuals in the US in relation to communications they had with or in relation to WikiLeaks. As this article is about the technical claims made in relation to hacking and so much is redacted, we'll only look at those really relevant to this.

Page 52

By the time Assange made the announcement referenced above, the Hillary Clinton emails obtained through FOIA had already been published by WikiLeaks.

Considering what WikiLeaks subsequently published, it would seem that Assange was making a reference to at least one of the upcoming leaks.

At this time, there was no record of contact between WikiLeaks and either of the parties alleged to be the GRU.

Page 58

Regarding the timing of the leaks and the Access Hollywood tape, it's important to note that journalist Stefani Maurizi, who had worked with WikiLeaks on the Podesta leaks, has stated publicly that she knew of WikiLeaks intention to publish on that date on the evening prior to it .

WikiLeaks stated the "timing conspiracy theory" was the other way round: " The [Access Hollywood] tape was moved forward to the day of our release, which WikiLeaks had been teasing " and was " well-documented ".

[The remaining pages in this section have little relevance to the technical aspects of this section of the report and/or acquisition of materials that this article is intended to cover.]


Circumstantial Evidence & Understandable Assumptions

While the above does show numerous issues with the report, it's important not to fall into the trap of outright dismissing as false anything for which evidence is lacking or assuming there is no evidence at all to support assertions.

However, without knowing what evidence exists we're left to make assumptions about whether it's conclusive or circumstantial, we don't know if the source of evidence is dependable and it's clear in the report that the Special Counsel has relied on assumptions and made numerous statements on the basis of presuppositions.

There is also a considerable amount of circumstantial evidence that, although it doesn't conclusively prove what the report tries to convince us of, it does at least raise questions about relationships between different entities, especially with regards to any overlaps in resources and infrastructure used.

For example, based on the cited evidence, it is perfectly understandable that people will assume Guccifer 2.0 provided DNC emails to WikiLeaks and will also assume that WikiLeaks published whatever it was that Guccifer 2.0 had sent them (especially with Mueller presenting that conversation in the form of a couple of words devoid of all context) .

The apparent overlap between a VPN service used by Guccifer 2.0 and by DCLeaks does suggest the two could be associated beyond Guccifer 2.0 just being a source of leaks for them.

Also, DCLeaks publishing some DNC emails that later appeared in the DNC email collection (though not necessarily from the same mailboxes) also suggests that DCLeaks and WikiLeaks could have had access to some of the same material and/or sources.

The same is true for Guccifer 2.0 releasing Podesta and DNC email attachments before WikiLeaks released both collections. Unless given good reason to consider any ulterior motive, the implied explanation, on the surface, seems to be that it was this persona that was a source for those emails. If nothing else, that's how it appears based on the little information typically made available to us by the mainstream press.

However, despite all of this, we still have not seen conclusive evidence showing that either of the entities was really controlled by the GRU and, when the countervailing evidence (which seems to have been completely ignored by the Special Counsel's investigation) is considered, there is reason to give consideration to Guccifer 2.0's efforts to not just associate himself with WikiLeaks and DCLeaks but also to associate third parties with each other through false claims.


The Mystery Of The May 23, 2016 Omission

One of the most notable omissions is the date on which emails from several mailboxes (including Luis Miranda's) were originally collected.

We know, from analysis of metadata of files hosted by WikiLeaks that this was May 23, 2016.

Not only is this prior to the May 25, 2016 - June 1, 2016 timeframe given for the DNC's exchange server being hacked, this activity is unmentioned throughout the entire report.

How has this failed to come to the surface when it should have been apparent in evidence CrowdStrike provided to the FBI and also apparent based on the WikiLeaks metadata? How is it the Special Counsel can cite some of the metadata in relation to WikiLeaks releases yet somehow manage to miss this?


Countervailing Evidence

What the Special Counsel's investigation also seems to have completely disregarded is the volume of countervailing evidence that has been discovered by several independent researchers in relation to the Guccifer 2.0 persona.

It's worth considering what evidence the Special Counsel has brought to the surface and comparing it with the evidence that has come to the surface as a result of discoveries being made by independent researchers over the past two years and the differences between the two sets of evidence (especially with regards to falsifiability and verifiability of evidence) .

Some excellent examples are covered in the following articles:


Reliability Of Attribution Methods

Skip Folden (who introduced me to VIPS members and has been a good friend ever since) recently shared with me his assessment of problems with the current attribution methods being relied on by the Special Counsel and others.

It covered several important points and was far more concise than anything I would have written, so, with his permission, I'm publishing his comments on this topic:

No basis whatsoever

APT28, aka Fancy Bear, Sofacy, Strontium, Pawn Storm, Sednit, etc., and APT29, aka Cozy Bear, Cozy Duke, Monkeys, CozyCar,The Dukes, etc., are used as 'proof' of Russia 'hacking' by Russian Intelligence agencies GRU and FSB respectively.

There is no basis whatsoever to attribute the use of known intrusion elements to Russia, not even if they were once reverse routed to Russia, which claim has never been made by NSA or any other of our IC.

On June 15, 2016 Dmitri Alperovitch himself, in an Atlantic Council article, gave only "medium-level of confidence that Fancy Bear is GRU" and "low-level of confidence that Cozy Bear is FSB." These assessments, from the main source himself, that either APT is Russian intelligence, averages 37%-38% [(50 + 25) / 2].

Exclusivity :

None of the technical indicators, e.g., intrusion tools (such as X-Agent, X-Tunnel), facilities, tactics, techniques, or procedures, etc., of the 28 and 29 APTs can be uniquely attributed to Russia, even if one or more had ever been trace routed to Russia. Once an element of a set of intrusion tools is used in the public domain it can be reverse-engineered and used by other groups which precludes the assumption of exclusivity in future use. The proof that any of these tools have never been reverse engineered and used by others is left to the student - or prosecutor.

Using targets

Also, targets have been used as basis for attributing intrusions to Russia, and that is pure nonsense. Both many state and non-state players have deep interests in the same targets and have the technical expertise to launch intrusions. In Grizzly Steppe, page 2, second paragraph, beginning with, "Both groups have historically targeted ...," is there anything in that paragraph which can be claimed as unique to Russia or which excludes all other major state players in the world or any of the non-state organizations? No.

Key Logger Consideration

On the subject of naming specific GRU officers initiating specific actions on GRU Russian facilities on certain dates / times, other than via implanted ID chips under the finger tips of these named GRU officers, the logical assumption would be by installed key logger capabilities, physical or malware, on one or more GRU Russian computers.

The GRU is a highly advanced Russian intelligence unit. It would be very surprising were the GRU open to any method used to install key logger capabilities. It would be even more surprising, if not beyond comprehension that the GRU did not scan all systems upon start-up and in real time, including key logger protection and anomalies of performance degradation and data transmissions.

Foreign intelligence source

Other option would be via a foreign intelligence unit source with local GRU access. Any such would be quite anti-Russian and be another nail in the coffin of any chain of evidence / custody validity at Russian site.


Chain Of Custody - Without An Anchor There Is No Chain

Another big problem with the whole RussiaGate investigation is the reliance on a private firm, hired by the DNC, to be the source of evidence.

As I don't have a good understanding of US law and processes surrounding evidence collection and handling, I will, again, defer to something that my aforementioned contact shared:

Chain of Evidence / Custody at US end, i.e., DNC and related computing facilities

Summary: There is no US end Chain of Evidence / Custody

The anchor of any chain of evidence custody is the on-site crime scene investigation of a jurisdictional law enforcement agency and neutral jurisdictional forensic team which investigate, discover, identify where possible, log, mark, package, seal, or takes images there of, of all identified elements of potential evidence as discovered at the scene of a crime by the authorized teams. The chain of this anchor is then the careful, documented movement of each element of captured evidence from crime scene to court.

In the case of the alleged series of intrusions into the DNC computing facilities, there is no anchor to any chain of evidence / custody.

There has been no claim that any jurisdictional law enforcement agency was allowed access to the DNC computing facilities. The FBI was denied access to DNC facilities, thereby supposedly denying the FBI the ability to conduct any on-site investigation of the alleged crime scene for discovery or collection of evidence.

Nor did the FBI exercise its authority to investigate the crime scene of a purported federal crime. Since when does the FBI need permission to investigate an alleged crime site where it is claimed a foreign government's intelligence attacked political files in order to interfere in a US presidential election?

Instead, the FBI accepted images of purported crime scene evidence from a contractor hired by and, therefore, working for the DNC. On July 05, 2017 a Crowdstrike statement said that they had provided "... forensic images of the DNC system to the FBI." It was not stated when these images were provided. Crowdstrike was working for the DNC as a contractor at the time.

This scenario is analogous to an employee of a crime scene owner telling law enforcement, "Trust me; I have examined the crime scene for you and here's what I've found. It's not necessary for you to see the crime scene."

Crowdstrike cannot be accepted as a neutral forensic organization. It was working for and being paid by the DNC. It is neither a law enforcement agency nor a federal forensic organization. Further Crowdstrike has serious conflicts of interest when it comes to any investigation of Russia.

Crowdstrike co-founder and Director of Technology, Dimitri Alperovitch, is a Nonresident Senior Fellow, Cyber Statecraft Initiative, of the Atlantic Council. Alperovitch has made it clear of his dislike of the government of Putin, and The Atlantic Council can not be considered neutral to Russia, receiving funding from many very staunch and outspoken enemies of Russia.

Summary: Not only was no federal jurisdictional law enforcement agency allowed to investigate the alleged crime scene, but the organization which allegedly collected and provided the 'evidence' was not neutral by being employed by the owner of the alleged crime scene, but seriously compromised by strong anti-Russian links.

This issue of this substitute for an anchor then leads us to our next problem: an apparent conflict of interest from the investigation's outset.


Conflict of Interest Inherent In The Investigation?

Would it seem like a conflict of interest if the person in charge of an investigation were friends with a witness and source of critical evidence relied upon by that investigation?

This is effectively the situation we have with the Special Counsel investigation because Robert Mueller and CrowdStrike's CSO (and President) Shawn Henry are former colleagues and friends.

Their history at the FBI is well known and their continued association after Henry had left the agency ( having dinner together at an executive retreat ) has been noted.

If nothing else, it's understandable for people to feel that the Special Counsel would have struggled to be truly impartial due to such relationships.


Conclusion

The Special Counsel seems to have been impervious to critical pieces of countervailing evidence (some of which demonstrates that Guccifer 2.0 deliberately manufactured Russian breadcrumbs) and they have failed to accurately account for the acquisition of WikiLeaks' DNC emails (missing the date on which approximately 70% of them were collected) , which is, in itself, a stunning failure for a supposedly thorough investigation costing US taxpayers tens of millions of dollars.

There should have been a proper, thorough, independent and impartial investigation into the Guccifer 2.0 persona. The Special Counsel certainly hasn't done that job and, in retrospect, looks to have been ill-equipped (and perhaps somewhat reluctant) to do so from the outset.


This article may be republished/reproduced in part or in full on condition that content above is unaltered and that the author is credited (or, alternatively, that a link to the full article is included).

[Apr 25, 2019] Much of CrowdStrike's role is not really to provide any sort of relevant technical expertise or investigation, but to serve as an outside "expert" to provides the "correct" claims to form the basis of a desired media narrative

Apr 25, 2019 | www.unz.com

James Forrestal , says: April 24, 2019 at 10:59 pm GMT

@annamaria

Your whole tirade was triggered by a reference to CrowdStrike.

Interesting observation -- and appears to be true.

needless defiant

The word choice is quite revealing here. His objection has nothing to do with truth. He views you as " defying " the officially-endorsed narrative; committing the unpardonable crime of unauthorized noticing .

All that the notorious "17 intelligence agencies" canard ever amounted to was the heads of the 3 major inteligence agencies lining up and chanting "We believe Alperovitch!" in unison. Kind of ironic that the entire "Russian hackers" trope was based on the unsupported claim of an actual Russian hacker.

Regardless of how the Trump administration is working out, the simple fact that no US law enforcement agency ever examined the DNC's servers -- and that the officially-promoted media narrative skips over this fact, and minimizes the role of Alperovitch and CrowdStrike, demonstrates the extent of the deception involved in that narrative.

https://www.zerohedge.com/news/2017-03-24/what-crowdstrike-firm-hired-dnc-has-ties-hillary-clinton-ukrainian-billionaire-and-g

"The firm's CTO and co-founder, Dmitri Alperovitch, is a senior fellow at the Atlantic Council, a think tank with openly anti-Russian sentiments that is funded by Ukrainian billionaire (((Victor Pinchuk))), who also happened to donate at least $10 million to the Clinton Foundation."

CrowdStrike was pretty tight with Obama as well as Hillary.

https://archive.fo/6PEuq

"CrowdStrike Inc. today announced that Steven Chabinsky, CrowdStrike's general counsel and chief risk officer, has been appointed by the President to the Commission on Enhancing National Cybersecurity."

Crowdstrike has never made a profit, and does not disclose sales figures, but seems to have little difficulty in raising venture capital, and somehow reached a (private) valuation of $1B in 2017 -- and $3B a year later:

http://fortune.com/2018/06/19/cybersecurity-crowdstrike-funding-value/

Their first major round of investment was in 2015, with Google Capital, Warburg Pincus, and Rackspace as the major investors.

CrowdStrike and Alperovitch have promoted some other rather strange and improbable allegations about alleged "hackers" and "hacking":

https://medium.com/@jeffreycarr/the-gru-ukraine-artillery-hack-that-may-never-have-happened-820960bbb02d
https://www.voanews.com/a/crowdstrike-comey-russia-hack-dnc-clinton-trump/3776067.html
http://themillenniumreport.com/2017/01/dnc-russian-hackers-found/

Look at the cover of the Crowdstrike "report" on the imaginary "Fancy Bear" Ukrainian artillery hack that they tried to promote:

https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf

Looks like a comic book cover. Clown world.

It's also interesting to note that the metadata for the Guccifer 2.0 files is not consistent with a "hack" over the interwebz from Romania -- since it was transferred at 23 MB/s:

https://theforensicator.wordpress.com/guccifer-2-ngp-van-metadata-analysis/

that's thumb drive or LAN -- an internal leak, not a "hack."

CrowdStrike's role in the Russia conspiracy theory hacking/ meddling/ colluding allegations was minimized in favor of the even more authoritative-sounding "37 intelligence agencies" claim, but a large part of their usual role seems to to serve as a sort of "SPLC" for hacking attributions. Just as the SPLC provides the appearance of an "independent," "authoritative" source to designate so-called "hate groups" and "hate crimes," much of CrowdStrike's role is not really to provide any sort of relevant technical expertise or investigation, but to serve as an outside "expert" to provides the "correct" claims to form the basis of a desired media narrative.

See also the "Syrian Observatory for Human Rights," the "White Helmets," Rita Katz's "SITE Intelligence," etc

[Apr 25, 2019] Why did the DNC not allow the FBI to investigate the so-called" Russian hacked" emails? Rather, they hire Crowd Strike

Most probably because there was no hack: it was created by Crowdstrike out of plain cloth to fuel Russiagate.
Apr 25, 2019 | consortiumnews.com

Johnny Ryan S , April 22, 2019 at 13:38

Why did the DNC not allow the FBI to investigate the so-called" Russian hacked" emails? Rather, they hire Crowd Strike did you know:
1)Obama Appoints CrowdStrike Officer To Admin Post Two Months Before June 2016 Report On Russia Hacking DNC
2) CrowdStrike Co-Founder Is Fellow On Russia Hawk Group, Has Connections To George Soros, Ukrainian Billionaire
3) DNC stayed that the FBI never asked to investigate the servers -- that is a lie.
4) CrowdStrike received $100 million in investments led by Google Capital (since re-branded as CapitalG) in 2015. CapitalG is owned by Alphabet, and Eric Schmidt, Alphabet's chairman, was a supporter of Hillary Clinton in the 2016 election. More than just supporting Clinton, leaked emails from Wikileaks in November 2016 showed that in 2014 he wanted to have an active role in the campaign.

-daily caller and dan bongino have been bringing these points up since 2016.

[Apr 24, 2019] Gaping holes in CrowdStrike's conclusions

Apr 24, 2019 | www.unz.com

Saoirse , says: April 24, 2019 at 2:30 am GMT

MEMORANDUM FOR : The President

FROM : Veteran Intelligence Professionals for Sanity (VIPS)

VIPS Fault Mueller Probe, Criticize Refusal to Interview Assange

" In that Memorandum we described the results of our own independent, agenda-free forensic investigation led by two former Technical Directors of the NSA, who avoid squishy "assessments," preferring to base their findings on fundamental principles of science and the scientific method . Our findings remain unchallenged; they reveal gaping holes in CrowdStrike's conclusions."

[ ]

"We recall that you were apprised of that Memorandum's key findings because you ordered then-CIA Director Mike Pompeo to talk to William Binney, one of our two former NSA Technical Directors and one of the principal authors of that Memorandum . On October 24, 2017, Pompeo began an hour-long meeting with Binney by explaining the genesis of the odd invitation to CIA Headquarters: " You are here because the president told me that if I really wanted to know about Russian hacking I needed to talk to you ."

"On the chance Pompeo has given you no report on his meeting with Binney, we can tell you that Binney, a plain-spoken, widely respected scientist, began by telling Pompeo that his (CIA) people were lying to him about Russian hacking and that he (Binney) could prove it . Pompeo reacted with disbelief, but then talked of following up with the FBI and NSA. We have no sign, though, that he followed through. And there is good reason to believe that Pompeo himself may have been reluctant to follow up with his subordinates in the Directorate of Digital Innovation created by CIA Director John Brennan in 2015. CIA malware and hacking tools are built by the Engineering Development Group, part of that relatively new Directorate. "

[ ]

William Binney , former Technical Director, World Geopolitical & Military Analysis, NSA; co-founder, SIGINT Automation Research Center (ret.)

Bogdan Dzakovic , former Team Leader of Federal Air Marshals and Red Team, FAA Security (ret.) (associate VIPS)

Philip Giraldi , CIA, Operations Officer (ret.)

Mike Gravel , former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator

James George Jatras , former U.S. diplomat and former foreign policy adviser to Senate leadership (Associate VIPS)

Larry Johnson , former CIA Intelligence Officer & former State Department Counter-Terrorism Official, (ret.)

Michael S. Kearns , Captain, USAF (ret.); ex-Master SERE Instructor for Strategic Reconnaissance Operations (NSA/DIA) and Special Mission Units (JSOC)

John Kiriakou , former CIA Counterterrorism Officer and former Senior Investigator, Senate Foreign Relations Committee

Karen Kwiatkowski , former Lt. Col., US Air Force (ret.), at Office of Secretary of Defense watching the manufacture of lies on Iraq, 2001-2003

Clement J. Laniewski , LTC, U.S. Army (ret.)

Linda Lewis , WMD preparedness policy analyst, USDA (ret.)

Edward Loomis , NSA Cryptologic Computer Scientist (ret.)

David MacMichael , former Senior Estimates Officer, National Intelligence Council (ret.)

Ray McGovern , former US Army infantry/intelligence officer & CIA presidential briefer (ret.)

Elizabeth Murray , former Deputy National Intelligence Officer for the Near East & CIA political analyst (ret.)

Todd E. Pierce , MAJ, US Army Judge Advocate (ret.)

Peter Van Buren ,U.S. Department of State, Foreign Service Officer (ret.) (associate VIPS)

Robert Wing , U.S. Department of State, Foreign Service Officer (former) (associate VIPS)

Ann Wright , U.S. Army Reserve Colonel (ret) and former U.S. Diplomat who resigned in 2003 in opposition to the Iraq War

https://consortiumnews.com/2019/04/16/vips-fault-mueller-probe-criticize-refusal-to-interview-assange/

{excerpt, emphasis added}

Skeptikal , says: April 24, 2019 at 2:32 am GMT
@Adrian E. Very interesting post.
tulsilookinggood , says: April 24, 2019 at 2:33 am GMT
Phil is on my wall of heroes
Saoirse , says: April 24, 2019 at 2:43 am GMT
@annamaria MEMORANDUM FOR: The Attorney General

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

"Recent forensic examination of the Wikileaks DNC files shows they were created on 23, 25 and 26 May 2016. (On June 12, Julian Assange announced he had them; WikiLeaks published them on July 22.) We recently discovered that the files reveal a FAT (File Allocation Table) system property. This shows that the data had been transferred to an external storage device, such as a thumb drive, before WikiLeaks posted them ."

"FAT is a simple file system named for its method of organization, the File Allocation Table. It is used for storage only and is not related to internet transfers like hacking. Were WikiLeaks to have received the DNC files via a hack, the last modified times on the files would be a random mixture of odd-and even-ending numbe rs."

"Why is that important? The evidence lies in the "last modified" time stamps on the Wikileaks files. When a file is stored under the FAT file system the software rounds the time to the nearest even-numbered second. Every single one of the time stamps in the DNC files on WikiLeaks' site ends in an even number. "

"We have examined 500 DNC email files stored on the Wikileaks site. All 500 files end in an even number -- 2, 4, 6, 8 or 0 . If those files had been hacked over the Internet, there would be an equal probability of the time stamp ending in an odd number . The random probability that FAT was not used is 1 chance in 2 to the 500th power . Thus, these data show that the DNC emails posted by WikiLeaks went through a storage device, like a thumb drive, and were physically moved before Wikileaks posted the emails on the World Wide Web ."

"This finding alone is enough to raise reasonable doubts, for example, about Mueller's indictment of 12 Russian intelligence officers for hacking the DNC emails given to WikiLeaks. A defense attorney could easily use the forensics to argue that someone copied the DNC files to a storage device like a USB thumb drive and got them physically to WikiLeaks -- not electronically via a hack."

Role of NSA

"For more than two years, we strongly suspected that the DNC emails were copied/leaked in that way, not hacked."

[ ]

For the steering group, Veteran Intelligence Professionals for Sanity:

William Binney, former NSA Technical Director for World Geopolitical & Military Analysis; Co-founder of NSA's Signals Intelligence Automation Research Center (ret.)

Richard H. Black, Senator of Virginia, 13th District; Colonel US Army (ret.); Former Chief, Criminal Law Division, Office of the Judge Advocate General, the Pentagon (associate VIPS)

Bogdan Dzakovic, former Team Leader of Federal Air Marshals and Red Team, FAA Security (ret.) (associate VIPS)

Philip Giraldi, CIA, Operations Officer (ret.)

Mike Gravel, former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator

James George Jatras, former U.S. diplomat and former foreign policy adviser to Senate leadership (Associate VIPS)

Larry C. Johnson, former CIA and State Department Counter Terrorism officer

John Kiriakou, former CIA Counterterrorism Officer and former senior investigator, Senate Foreign Relations Committee

Karen Kwiatkowski, former Lt. Col., US Air Force (ret.), at Office of Secretary of Defense watching the manufacture of lies on Iraq, 2001-2003

Edward Loomis, Cryptologic Computer Scientist, former Technical Director at NSA (ret.)

David MacMichael, Ph.D., former senior estimates officer, National Intelligence Council (ret.)

Ray McGovern, former US Army infantry/intelligence officer & CIA analyst; CIA Presidential briefer (ret.)

Elizabeth Murray, former Deputy National Intelligence Officer for the Near East, National Intelligence Council & CIA political analyst (ret.)

Todd E. Pierce, MAJ, US Army Judge Advocate (ret.)

Peter Van Buren, US Department of State, Foreign Service Officer (ret.) (associate VIPS)

Sarah G. Wilton, CDR, USNR, (ret.); Defense Intelligence Agency (ret.)

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA

Ann Wright, retired U.S. Army reserve colonel and former U.S. diplomat who resigned in 2003 in opposition to the Iraq War

Veteran Intelligence Professionals for Sanity (VIPS) is made up of former intelligence officers, diplomats, military officers and congressional staffers. The organization, founded in 2002, was among the first critics of Washington's justifications for launching a war against Iraq. VIPS advocates a US foreign and national security policy based on genuine national interests rather than contrived threats promoted for largely political reasons. An archive of VIPS memoranda is available at Consortiumnews.com.

VIPS: Mueller's Forensics-Free Findings

https://consortiumnews.com/2019/03/13/vips-muellers-forensics-free-findings/

[Apr 23, 2019] Crowdstrike and the reprise of the Iraq-WMD Fiasco

Notable quotes:
"... In May, the company, Crowdstrike, determined that the hack was the work of the Russians. As one unnamed intelligence official told BuzzFeed, "CrowdStrike is pretty good. There's no reason to believe that anything that they have concluded is not accurate ..."
"... Perhaps not. Yet Crowdstrike is hardly a disinterested party when it comes to Russia. Crowdstrike's founder and chief technology officer, Dmitri Alperovitch , is also a senior fellow at the Washington think tank, The Atlantic Council, which has been at the forefront of escalating tensions with Russia. ..."
"... As I reported in The Nation in early January , the connection between Alperovitch and the Atlantic Council is highly relevant given that the Atlantic Council is funded in part by the State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk. In recent years, it has emerged as a leading voice calling for a new Cold War with Russia. ..."
"... But meanwhile the steady drumbeat of "blame Russia" is having an effect. According to a recent you.gov/Economist poll, 58 percent of Americans view Russia as "unfriendly/enemy" while also finding that 52 percent of Democrats believed Russia "tampered with vote tallies." ..."
Feb 03, 2017 | consortiumnews.com

Originally from: A Reprise of the Iraq-WMD Fiasco -- Consortiumnews

... ... ...

A Dangerous Replay?

Today something eerily similar to the pre-war debate over Iraq is taking place regarding the allegations of Russian interference in the U.S. presidential election. Assurances from the intelligence community and from anonymous Obama administration "senior officials" about the existence of evidence is being treated as, well, actual evidence.

State Department spokesman John Kirby told CNN that he is "100% certain" of the role that Russia played in U.S. election. The administration's expressions of certainty are then uncritically echoed by the mainstream media. Skeptics are likewise written off, slandered as " Kremlin cheerleaders " or worse.

Unsurprisingly, The Washington Post is reviving its Bush-era role as principal publicist for the government's case. Yet in its haste to do the government's bidding, the Post has published two widely debunked stories relating to Russia (one on the scourge of Russian inspired "fake news", the other on a non-existent Russian hack of a Vermont electric utility) onto which the paper has had to append "editor's notes" to correct the original stories.

Yet, those misguided stories have not deterred the Post's opinion page from being equally aggressive in its depiction of Russian malfeasance. In late December, the Post published an op-ed by Rep. Adam Schiff and former Rep. Jane Harmon claiming "Russia's theft and strategic leaking of emails and documents from the Democratic Party and other officials present a challenge to the U.S. political system unlike anything we've experienced."

On Dec. 30, the Post editorial board chastised President-elect Trump for seeming to dismiss "a brazen and unprecedented attempt by a hostile power to covertly sway the outcome of a U.S. presidential election." The Post described Russia's actions as a "cyber-Pearl Harbor."

On Jan. 1, the neoconservative columnist Josh Rogin told readers that the recent announcement of sanctions against Russia "brought home a shocking realization that Russia is using hybrid warfare in an aggressive attempt to disrupt and undermine our democracy."

Meanwhile, many of the same voices who were among the loudest cheerleaders for the war in Iraq have also been reprising their Bush-era roles in vouching for the solidity of the government's case.

Jonathan Chait, now a columnist for New York magazine, is clearly convinced by what the government has thus far provided. "That Russia wanted Trump to win has been obvious for months," writes Chait.

"Of course it all came from the Russians, I'm sure it's all there in the intel," Charles Krauthammer told Fox News on Jan. 2. Krauthammer is certain.

And Andrew Sullivan is certain as to the motive. "Trump and Putin's bromance," Sullivan told MSNBC's Chris Matthews on Jan. 2, "has one goal this year: to destroy the European Union and to undermine democracy in Western Europe."

David Frum, writing in The Atlantic , believes Trump "owes his office in considerable part to illegal clandestine activities in his favor conducted by a hostile, foreign spy service."

Jacob Weisberg agrees, tweeting: "Russian covert action threw the election to Donald Trump. It's that simple." Back in 2008, Weisberg wrote that "the first thing I hope I've learned from this experience of being wrong about Iraq is to be less trusting of expert opinion and received wisdom." So much for that.

Foreign Special Interests

Another, equally remarkable similarity to the period of 2002-3 is the role foreign lobbyists have played in helping to whip up a war fever. As readers will no doubt recall, Ahmed Chalabi, leader of the Iraqi National Congress, which served, in effect as an Iraqi government-in-exile, worked hand in hand with the Washington lobbying firm Black, Kelly, Scruggs & Healey (BKSH) to sell Bush's war on television and on the op-ed pages of major American newspapers.

Chalabi was also a trusted source of Judy Miller of the Times, which, in an apology to its readers on May 26, 2004, wrote : "The most prominent of the anti-Saddam campaigners, Ahmad Chalabi, has been named as an occasional source in Times articles since at least 1991, and has introduced reporters to other exiles. He became a favorite of hard-liners within the Bush administration and a paid broker of information from Iraqi exiles." The pro-war lobbying of the American Israel Public Affairs Committee has also been exhaustively documented .

Though we do not know how widespread the practice has been as of yet, something similar is taking place today. Articles calling for confrontation with Russia over its alleged "hybrid war" with the West are appearing with increasing regularity . Perhaps the most egregious example of this newly popular genre appeared on Jan. 1 in Politico magazine. That essay, which claims, among many other things, that "we're in a war" with Russia comes courtesy of one Molly McKew.

McKew is seemingly qualified to make such a pronouncement because she, according to her bio on the Politico website, served as an "adviser to Georgian President Saakashvili's government from 2009-2013, and to former Moldovan Prime Minister Filat in 2014-2015." Seems reasonable enough. That is until one discovers that McKew is actually registered with the Department of Justice as a lobbyist for two anti-Russian political parties, Georgia's UMN and Moldova's PLDM.

Records show her work for the consulting firm Fianna Strategies frequently takes her to Capitol Hill to lobby U.S. Senate and Congressional staffers, as well as prominent U.S. journalists at The Washington Post and The New York Times, on behalf of her Georgian and Moldovan clients.

"The truth," writes McKew, "is that fighting a new Cold War would be in America's interest. Russia teaches us a very important lesson: losing an ideological war without a fight will ruin you as a nation. The fight is the American way." Or, put another way: the truth is that fighting a new Cold War would be in McKew's interest -- but perhaps not America's.

While you wouldn't know it from the media coverage (or from reading deeply disingenuous pieces like McKew's) as things now stand, the case against Russia is far from certain. New developments are emerging almost daily. One of the latest is a report from the cyber-engineering company Wordfence, which concluded that "The IP addresses that DHS [Department of Homeland Security] provided may have been used for an attack by a state actor like Russia. But they don't appear to provide any association with Russia."

Indeed, according to Wordfence, "The malware sample is old, widely used and appears to be Ukrainian. It has no apparent relationship with Russian intelligence and it would be an indicator of compromise for any website."

On Jan. 4, BuzzFeed reported that, according to the DNC, the FBI never carried out a forensic examination on the email servers that were allegedly hacked by the Russian government. "The FBI," said DNC spokesman Eric Walker, "never requested access to the DNC's computer servers."

What the agency did do was rely on the findings of a private-sector, third-party vendor that was brought in by the DNC after the initial hack was discovered. In May, the company, Crowdstrike, determined that the hack was the work of the Russians. As one unnamed intelligence official told BuzzFeed, "CrowdStrike is pretty good. There's no reason to believe that anything that they have concluded is not accurate . "

Perhaps not. Yet Crowdstrike is hardly a disinterested party when it comes to Russia. Crowdstrike's founder and chief technology officer, Dmitri Alperovitch , is also a senior fellow at the Washington think tank, The Atlantic Council, which has been at the forefront of escalating tensions with Russia.

As I reported in The Nation in early January , the connection between Alperovitch and the Atlantic Council is highly relevant given that the Atlantic Council is funded in part by the State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk. In recent years, it has emerged as a leading voice calling for a new Cold War with Russia.

Time to Rethink the 'Group Think'

And given the rather thin nature of the declassified evidence provided by the Obama administration, might it be time to consider an alternative theory of the case? William Binney, a 36-year veteran of the National Security Agency and the man responsible for creating many of its collection systems, thinks so. Binney believes that the DNC emails were leaked, not hacked, writing that "it is puzzling why NSA cannot produce hard evidence implicating the Russian government and WikiLeaks. Unless we are dealing with a leak from an insider, not a hack."

None of this is to say, of course, that Russia did not and could not have attempted to influence the U.S. presidential election. The intelligence community may have intercepted damning evidence of the Russian government's culpability. The government's hesitation to provide the public with more convincing evidence may stem from an understandable and wholly appropriate desire to protect the intelligence community's sources and methods. But as it now stands the publicly available evidence is open to question.

But meanwhile the steady drumbeat of "blame Russia" is having an effect. According to a recent you.gov/Economist poll, 58 percent of Americans view Russia as "unfriendly/enemy" while also finding that 52 percent of Democrats believed Russia "tampered with vote tallies."

With Congress back in session, Armed Services Committee chairman John McCain is set to hold a series of hearings focusing on Russian malfeasance, and the steady drip-drip-drip of allegations regarding Trump and Putin is only serving to box in the new President when it comes to pursuing a much-needed detente with Russia.

It also does not appear that a congressional inquiry will start from scratch and critically examine the evidence. On Friday, two senators -- Republican Lindsey Graham and Democrat Sheldon Whitehouse -- announced a Senate Judiciary subcommittee investigation into Russian interference in elections in the U.S. and elsewhere. But they already seemed to have made up their minds about the conclusion: "Our goal is simple," the senators said in a joint statement "To the fullest extent possible we want to shine a light on Russian activities to undermine democracy."

So, before the next round of Cold War posturing commences, now might be the time to stop, take a deep breath and ask: Could the rush into a new Cold War with Russia be as disastrous and consequential -- if not more so -- as was the rush to war with Iraq nearly 15 years ago? We may, unfortunately, find out.

James W Carden is a contributing writer for The Nation and editor of The American Committee for East-West Accord's eastwestaccord.com. He previously served as an advisor on Russia to the Special Representative for Global Inter-governmental Affairs at the US State Department.


Don G. , February 5, 2017 at 14:29

Questioning whether the Russians hacked or didn’t hack is playing into the US narrative to demonize Russia. (Putin)
It simple doesn’t matter as all nations hack as much as possible to enhance and protect their national interests. Surely Russia has hacked against the US no more than a tenth of what the US had done against Russia.

The narrative is nothing but a propaganda lie but it’s been accepted by the American people and mostly because of the fight that goes on due to domestic politics, one major party against the other.

There’s a very good reason to stop promoting the narrative because it only helps to bring Americans onside with more efforts to demonize Putin and to keep all sides in the US promoting their aggression worldwide. Americans are likely easily 90% prowar now and will show little or no resistance to the coming war on Iran. <img alt='' src='https://secure.gravatar.com/avatar/f05d2bb98b641e9e9ab8f3dc738e31a0?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/f05d2bb98b641e9e9ab8f3dc738e31a0?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

yugo , February 4, 2017 at 13:54

Hysteria has reached fever pitch. Russia’s fake news is apparently so beguiling that it even threatens western democratic discourse. Combine this with its cyber weaponry and Moscow, so we are told, may interfere in this year’s German elections to benefit the hard-right. Such incessant fear mongering has already prompted calls for the censorship of Russian propaganda. It won’t be long before a witch-hunt emerges, directed against ‘fellow travellers’, those who dare to doubt the Russian threat.

They insist the west made matters worse in Ukraine by not acknowledging that it was a classic example of a young state that didn’t naturally command the allegiance of all its peoples. Other examples are Georgia’s Abkhazians and South Ossetians, Moldova’s Trans-Dniester Slavs and Azerbaijan’s Nagorno-Karabakh Armenians.

They also doubt the Russian threat to the Baltic states. What is amazing is Moscow’s temperate response to Estonia and Latvia’s gross violation of international norms in denying citizenship to those of its Russian minority who are not conversant in Estonian and Latvian respectively. Nato and the EU turned a blind eye when membership was granted to these two states.

Fellow travellers furthermore claim the west will keep on floundering in the Middle East as long as it persists in treating Saudi Arabia as a valued ally, while viewing Iran as a permanent enemy. We have for far too long ignored Saudi Arabia’s promotion of Wahhabism and its playing of the destructive sectarian card against ‘apostate’ Shiites. Take the merciless attacks on Shiite worshippers by Sunni jihadis of a Wahhabist persuasion. It occurs with sickening regularity throughout the Middle East. The terrorists attacking westerners are invariably Sunni jihadis, not Shiites. Worse still, Saudi Arabia together with Nato member Turkey facilitated the emergence of Isis. We bizarrely gave priority to toppling Syria’s secular regime.

The first loyalty of these fellow travellers is to their nation state rather than unfettered globalism. No wonder the western elite disparage their national patriotism, calling it populism. It was, after all, the Achilles Heel of Homo Sovieticus. The elite fear the same fate awaits Homo Europaeus and globalist Homo Economicus.

Michael K Rohde , February 3, 2017 at 15:12

This is beginning to look exactly like Iraq 2 and why the same players that led us into that fake war which is still not paid for because the initiators made sure and get themselves a tax cut before they launched it are still being listened to makes it clear. Even with a change in administrations and party our government continues in the same wrong headed direction, to war with the enemies of Israel. When will it stop? When will we take back control of our foreign policy and destiny. <img alt='' src='https://secure.gravatar.com/avatar/cc900a84653501242923790946494dbc?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/cc900a84653501242923790946494dbc?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Michael Hoefler , February 3, 2017 at 23:29

As Ray McGovern said several times (not quoting): that Israel is the elephant in the room. Netayahu will not rest until he has all of the Arab states fighting among themselves. IMO he thinks that that will guarantee Israel protection.
IMO – all that does is put Israel into a continuing worse situation. There will always be someone stronger to come along to overcome them – someday – sometime. If they made peace with those nations and worked with them, traded with them – they would be much safer in the long run.

Banger , February 3, 2017 at 14:22

The mainstream media in th USA and, increasingly in the rest of the West are vehicles for propaganda from various factions within the Imperial Deep State. All these outlets are good for is to map the power relations between these factions at least this the case in the major issues of the day.

This misbehavior going on right now. One factions close to Trump wants to go to war with Iran because, of course there has to be war or the Deep State as a whole stuffers and the people will begin to look at their shakles. The other faction wishes to go to a brinksmanship sort of Cold War situation. The Trumpists believe that making friends with Russia and then destroying Iranian power is the best approach to controlling the MENA region by creating a loose alliance of KSA, Israel, Turkey and Russia in which a weak Iran would be forced to enter the Empire and Russia in return would be given more control of Ukraine and Eastern Europe. I suspect Trump may also want to undercut NATO and the EU. That is my guess. To put it another way, Russia is strong and well led and Iran is not.

stan , February 3, 2017 at 14:17

You can read chapter 6 of Mein Kampf if you want to see how this war propaganda stuff works. It is not group think or mistaken ideas. It is deliberate lies to scare you and a carefully crafted false narrative to make it all seem reasonable. People cannot believe that their leaders would tell such a big lie, and that’s why it works. The goal is murder and conquest to get territory, natural resources, and control of business and commerce. Controlling markets for drugs, gambling, and prostitution is for nickel and dime crooks. Controlling markets for natural resources, banking, and consumer and industrial goods is where the real money is. Think of governments as criminal business syndicates and you aren’t far off. Remember, President Obama had a hit list, flew around plane loads of secret cash to make illegal payoffs, and bragged about offing his opponent in the head and dumping his body in the river.

Jeremy , February 4, 2017 at 11:33

Yes, Stan,well put! you will never see this sort of talk in the articles here, as the consipiracy theorist label is always one to avoid, but I agree that when we think in terms of a group of people trying to attain “security” the same way any other gangster does, it becomes much less far fetched. George Carlin said, “It’s a big club, and you ain’t in it!” Men and women of power and wealth will always do what they have to in order to preserve that power and wealth for their children. There is really no conspiracy needed, just a bunch of people at the top looking after themselves and their families.

Tania Messina , February 3, 2017 at 14:13

Ah, yes, we’ve always needed a boogeyman to keep us all crazed with fear and the neocons busy with their destruction of society. If there is a crazy out there today, it is those neocons and their puppets who were so intent on destroying “seven countries in five years” and not being able to achieve that diabolical end as so neatly planned. And, now, they’re throwing temper tantrums, because, surprise of surprises! a non career politician comes along who uses common sense for a change and dares to say, “Why can’t we be friends with Russia?” With that comment many exhausted Americans perked up and listened while the Dulles boys turned somersaults in their graves!

The arrogance and superiority of those who constantly blame Russia for their alleged expansionist ambitions seem blinded to our own aggressions. Fifteen years in Iraq? We finally have a president who talks of peace and we demonize him as the warmonger ready to press the button, while I seem to remember that it was the other candidate who arrogantly referred to Putin as Hitler!

It is articles like this one by James Carden that we should be teaching in our schools, researching the facts and discussing in our classrooms so that hopefully a new generation might grow up with intelligent exchange rather than the brainwash that has been strangling our society for too many years.

Mark Thomason , February 3, 2017 at 13:04

This controversy is driven by Democratic denial of defeat, and infighting in which those defeated seek to hang on to power inside the Democratic Party. It is the Hillary crowd. It can be evidence free because it is driven by political calculation of private power needs, not truth.

And the WMD fiasco is a perfect comparison, because the same people drove the same sort of fact-free theme for private reasons, as Wolfowitz put it, the story around which varying separate interests could be rallied.

[Apr 20, 2019] The Guccifer 2.0 Gaps in Mueller s Full Report undermine the validity of findings

Apr 10, 2019 | consortiumnews.com

Originally from: The 'Guccifer 2.0' Gaps in Mueller's Full Report April 18, 2019 • 12 Commentsave

Like Team Mueller's indictment last July of Russian agents, the full report reveals questions about Wikileaks' role that much of the media has been ignoring, writes Daniel Lazare.

By Daniel Lazare
Special to Consortium News

<img src="https://consortiumnews.com/wp-content/uploads/2018/04/Daniel-Lazare-150x150.jpg" alt="" width="100" height="100" /> A s official Washington pores over the Gospel According to Saint Robert, an all-important fact about the Mueller report has gotten lost in the shuffle. Just as the Christian gospels were filled with holes , the latest version is too – particularly with regard to WikiLeaks and Julian Assange.

The five pages that the special prosecutor's report devotes to WikiLeaks are essentially lifted from Mueller's indictment last July of 12 members of the Russian military intelligence agency known as the GRU. It charges that after hacking the Democratic National Committee, the GRU used a specially-created online persona known as Guccifer 2.0 to transfer a gigabyte's worth of stolen emails to WikiLeaks just as the 2016 Democratic National Convention was approaching. Four days after opening the encrypted file, the indictment says, "Organization 1 [i.e. WikiLeaks] released over 20,000 emails and other documents stolen from the DNC network by the Conspirators [i.e. the GRU]."

<img aria-describedby="caption-attachment-35305" src="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM.png" alt="Barr holding press conference on full Mueller report, April 18, 2019. (YouTube)" width="1248" height="612" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM.png 848w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-400x196.png 400w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-768x377.png 768w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-700x343.png 700w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-160x78.png 160w" sizes="(max-width: 1248px) 100vw, 1248px" />

Attorney General William Barr holding press conference on full Mueller report, April 18, 2019. (YouTube)

Mueller's report says the same thing, but with the added twist that Assange then tried to cover up the GRU's role by suggesting that murdered Democratic National Committee staffer Seth Rich may have been the source and by telling a congressman that the DNC email heist was an "inside job" and that he had "physical proof" that the material was not from Russian.

All of which is manna from heaven for corporate news outlets eager to pile on Assange, now behind bars in London. An April 11, 2019, New York Times news analysis , for instance, declared that "[c]ourt documents have revealed that it was Russian intelligence – using the Guccifer persona – that provided Mr. Assange thousands of emails hacked from the Democratic National Committee," while another Times article published shortly after his arrest accuses the WikiLeaks founder of "promoting a false cover story about the source of the leaks."

But there's a problem: it ain't necessarily so. The official story that the GRU is the source doesn't hold water, as a timeline from mid-2016 shows. Here are the key events based on the GRU indictment and the Mueller report:

June 12: Assange tells Britain's ITV that another round of Democratic Party disclosures is on the way: "We have upcoming leaks in relation to Hillary Clinton, which is great. WikiLeaks is having a very big year." June 14: The Democratic National Committee accuses Russia of hacking its computers. June 15: Guccifer 2.0 claims credit for the hack. "The main part of the papers, thousands of files and mails, I gave to WikiLeaks ," he brags . "They will publish them soon." June 22: WikiLeaks tells Guccifer via email: "Send any new material here for us to review and it will have a much higher impact than what you are doing." July 6: WikiLeaks sends Guccifer another email: "if you have anything hillary related we want it in the next tweo [ sic ] days prefable [ sic ] because the DNC [Democratic National Convention] is approaching and she will solidify bernie supporters behind her after."Replies Guccifer: "ok . . . i " July 14: Guccifer sends WikiLeaks an encrypted file titled "wk dnc link1.txt.gpg." July 18: WikiLeaks confirms it has opened "the 1Gb or so archive" and will release documents "this week." July 22: WikiLeaks releases more than 20,000 DNC emails and 8,000 other attachments.

According to Mueller and obsequious news outlets like the Times , the sequence is clear: Guccifer sends archive, WikiLeaks receives archive, WikiLeaks accesses archive, WikiLeaks publishes archive. Donald Trump may not have colluded with Russia, but Julian Assange plainly did. [Attorney General Will Barr, significantly calling WikiLeaks a publisher, said at his Thursday press conference: " Under applicable law, publication of these types of materials would not be criminal unless the publisher also participated in the underlying hacking conspiracy."]

<img aria-describedby="caption-attachment-35300" src="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM.png" alt="Deputy Attorney General Rod Rosenstein announcing in 2018 a grand jury indictment of 12 Russian intelligence officers for hacking offenses related to the 2016 U.S. presidential election. (Wikimedia Commons) " width="1236" height="611" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM.png 973w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-400x198.png 400w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-768x380.png 768w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-700x346.png 700w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-160x79.png 160w" sizes="(max-width: 1236px) 100vw, 1236px" />

Deputy Attorney General Rod Rosenstein announcing in 2018 the grand jury indictment of 12 GRU agents. (Wikimedia Commons)

Avoiding Questions

The narrative raises questions that the press studiously avoids. Why, for instance, would Assange announce on June 12 that a big disclosure is on the way before hearing from the supposed source? Was there a prior communication that Mueller has not disclosed? What about the reference to "new material" on June 22 – does that mean Assange already had other material in hand? After opening the Guccifer file on July 18, why would he publish it just four days later? Would that give WikiLeaks enough time to review some 28,000 documents to insure they're genuine?

Honor Bob Parry's legacy by donating to our Spring Fund Drive.

"If a single one of those emails had been shown to be maliciously altered," blogger Mark F. McCarty observes , "Wikileaks' reputation would have been in tatters." There's also the question that an investigator known as Adam Carter poses in Disobedient Media : why would Guccifer brag about giving WikiLeaks "thousands of files" that he wouldn't send for another month?

The narrative doesn't make sense – a fact that is crucially important now that Assange is fighting for his freedom in the U.K. New Yorker staff writer Raffi Khatchadourian sounded a rare note of caution last summer when he warned that little about Guccifer 2.0 adds up. While claiming to be the source for some of WikiLeaks ' most explosive emails, the material he released on his own had proved mostly worthless – 20 documents that he "said were from the DNC but which were almost surely not," as Khatchadourian puts it, a purported Hillary Clinton dossier that "was nothing of the sort," screenshots of emails so blurry as to be "unreadable," and so forth.

<img aria-describedby="caption-attachment-35303" src="https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image.jpg" alt="John Podesta at the spin room of the second presidential debate of 2016. (Voice of America via Wikimedia Commons)" width="500" height="341" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image.jpg 650w, https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image-400x273.jpg 400w, https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image-160x109.jpg 160w" sizes="(max-width: 500px) 100vw, 500px" />

John Podesta: Target of a phishing expedition. (Voice of America via Wikimedia Commons)

While insisting that "our source is not the Russian government and it is not a state party, Assange told Khatchadourian that the source was not Guccifer either. "We received quite a lot of submissions of material that was already published in the rest of the press, and people seemingly submitted the Guccifer archives," he said somewhat cryptically. "We didn't publish them. They were already published." When Khatchadourian asked why he didn't put the material out regardless, he replied that "the material from Guccifer 2.0 – or on WordPress – we didn't have the resources to independently verify."

No Time for Vetting

So four days was indeed too short a time to subject the Guccifer file to proper vetting. Of course, Mueller no doubt regards this as more "dissembling," as his report describes it. Yet WikiLeaks has never been caught in a lie for the simple reason that honesty and credibility are all-important for a group that promises to protect anonymous leakers who supply it with official secrets. (See "Inside WikiLeaks : Working with the Publisher that Changed the World," Consortium News , July 19, 2018.) Mueller, by contrast, has a rich history of mendacity going back to his days as FBI director when he sought to cover up the Saudi role in 9/11 and assured Congress on the eve of the 2003 invasion that Iraqi weapons of mass destruction pose "a clear threat to our national security."

<img aria-describedby="caption-attachment-35301" src="https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage.jpg" alt="Mueller with President George W. Bush on July 5, 2001, as he is being appointed FBI director. (White House)" width="501" height="373" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage.jpg 600w, https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage-400x298.jpg 400w, https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage-160x119.jpg 160w" sizes="(max-width: 501px) 100vw, 501px" />

Mueller with President George W. Bush on July 5, 2001, as he is being appointed FBI director. (White House)

So if the Mueller narrative doesn't hold up, the charge of dissembling doesn't either. Indeed , as ex-federal prosecutor Andrew C. McCarthy observes in The National Review , the fact that the feds have charged Assange with unauthorized access to a government computer rather than conspiring with the Kremlin could be a sign that Team Mueller is less than confident it can prove collusion beyond a reasonable doubt. As he puts it, the GRU indictment "was more like a press release than a charging instrument" because the special prosecutor knew that the chances were zero that Russian intelligence agents would surrender to a U.S. court.

Indeed, when Mueller charged 13 employees and three companies owned by Russian businessman Yevgeny Prigozhin with interfering in the 2016 election, he clearly didn't expect them to surrender either. Thus , his team seemed taken aback when one of the alleged " troll farms " showed up in Washington asking to be heard. The prosecution's initial response, as McCarthy put it , was to seek a delay "on the astonishing ground that the defendant has not been properly served – notwithstanding that the defendant has shown up in court and asked to be arraigned." When that didn't work, prosecutors tried to limit Concord's access to some 3.2 million pieces of evidence on the grounds that the documents are too " sensitive " for Russian eyes to see. If they are again unsuccessful, they may have no choice but to drop the charges entirely, resulting in yet another " public relations disaster " for the Russia-gate investigation.

None of which bodes well for Mueller or the news organizations that worship at his shrine. After blowing the Russia-gate story all these years, why does the Times continue to slander the one news organization that tells the truth?

Daniel Lazare is the author of "The Frozen Republic: How the Constitution Is Paralyzing Democracy" (Harcourt Brace, 1996) and other books about American politics. He has written for a wide variety of publications from The Nation to Le Monde Diplomatique and blogs about the Constitution and related matters at D aniellazare.com .

[Apr 07, 2019] The story of Debbie Wasserman Schultz and an indicted IT staffer that's lighting up the right, explained by Amber Phillips

Notable quotes:
"... Six months later, the FBI arrests him as he's boarding a flight to Pakistan and charges him with bank fraud. ..."
"... The congresswoman says conservatives are making a big deal of this to distract from the much more real Russia investigation. "Undoubtedly, the easier path would have been to terminate Mr. Awan, despite the fact that I had not received any evidence of his alleged wrongdoing," she said in a statement issued last week, "but that is not the woman my constituents elected, and that is not the mother my children know me to be." ..."
"... February: Capitol Police accuse five IT staffers of trying to steal House equipment and violating House security policies, report BuzzFeed and Politico . They are shared employees who work for 30 or so members of Congress. Capitol Police ban the five from access to the House of Representatives network while it investigates. Investigators tell lawmakers that it's up to them to decide whether to fire the accused staffers. ..."
"... Awan is one of those staffers accused. Most of the others are related to him, including his wife, Hina Alvi. ..."
"... Wasserman Schultz remains quiet, other than to say Awan had been moved to an advisory role since he was no longer able to directly interact with the House network. She remains dubious about the accusations against Awan and does not see cause to fire him. She becomes increasingly concerned he was being singled out because of his religion. ..."
"... "When their investigation was reviewed with me, I was presented with no evidence of anything that they were being investigated for. And so that, in me, gave me great concern that his due process rights were being violated. That there were racial and ethnic profiling concerns that I had," she said. ..."
"... She later told the Sun-Sentinel she was asking about Awan's laptop: "He accidentally left it somewhere." ..."
"... Week of July 24: Awan's legal troubles deepen. The FBI arrests him at a D.C.-area airport on his way to Pakistan. Fox News's Chad Pergram first reports it, and conservative Daily Caller fleshes out the story . ..."
"... Awan was arrested while attempting to board a flight after wiring $283,00 to the country. His wife and their three children are already in Pakistan. An affidavit obtained by the Daily Caller alleges they tried to trick their bank, the Congressional Federal Credit Union, into giving them a second mortgage for a rental property by claiming it was their primary residency. ..."
"... Aug. 3 : Wasserman Schultz gives her first interview to the media. She tells the Fort Lauderdale Sun-Sentinel that she had initially only commented on the arrest via a spokesman since she had been on vacation. And she stands by her decision not to fire Awan after he was accused of stealing House equipment: "I believe that I did the right thing, and I would do it again," she says. ..."
"... Aug. 7: Wasserman Schultz's Democratic primary challenger, Tim Canova , accuses her of making "a lot of self-serving excuses for Awan." ..."
Aug 08, 2017 | www.washingtonpost.com

Here's one version of a story making headlines in conservative media over the past couple of weeks: A powerful Democratic congresswoman refuses to fire an information technology aide after he's accused of stealing House computer equipment and potentially breaching security protocols. Six months later, the FBI arrests him as he's boarding a flight to Pakistan and charges him with bank fraud.

Here's another version of the same topic, coming from Democratic lawmakers: Powerful Democratic congresswoman protects Muslim IT staffer from what she suspects is religious discrimination. She fires him after he is charged with a seemingly unrelated crime.

The case involving now-fired House Democratic information technology staffer Imran Awan and Rep. Debbie Wasserman Schultz (D-Fla.) underscores how easy it is to manipulate facts to suit one's political leaning.

The story has blown up on the right, with conservative website Daily Caller writing more than two dozen stories about it and Fox News hosts linking it, without any evidence, to the Russian WikiLeaks hack of DNC emails, which happened under Wasserman Schultz's tenure as chairwoman.

President Trump poured gasoline on the story when he retweeted a conservative site describing the "scandal engulfing" Wasserman Schultz and accusing the media of ignoring it.

Mainstream media outlets have covered the story, but not extensively. The Washington Post has published two articles: One reporting Awan's arrest and the other about a watchdog group seeking an investigation .

Left-leaning sites have either stayed away from it or defended Wasserman Schultz's account of it.

The congresswoman says conservatives are making a big deal of this to distract from the much more real Russia investigation. "Undoubtedly, the easier path would have been to terminate Mr. Awan, despite the fact that I had not received any evidence of his alleged wrongdoing," she said in a statement issued last week, "but that is not the woman my constituents elected, and that is not the mother my children know me to be."

Clearly, there are a lot of political accusations tied up in this nuanced story. Here's what we know about the timeline of accusations against Arwan, his arrest and his dismissal by Wasserman Schultz.

February: Capitol Police accuse five IT staffers of trying to steal House equipment and violating House security policies, report BuzzFeed and Politico . They are shared employees who work for 30 or so members of Congress. Capitol Police ban the five from access to the House of Representatives network while it investigates. Investigators tell lawmakers that it's up to them to decide whether to fire the accused staffers.

Awan is one of those staffers accused. Most of the others are related to him, including his wife, Hina Alvi.

February–March: Politico follows up on the fate of the staffers and finds some Democratic lawmakers have kept them on the payroll, Wasserman Schultz included. While Capitol Police claim there may have been potentially serious IT violations, these lawmakers see it differently.

The IT staffers have worked for many of the offices for more than a decade, and some Democratic lawmakers said they were concerned these staffers may have been targeted by Capitol investigators because they are Muslim and from Pakistan.

"As of right now, I don't see a smoking gun," Rep. Gregory W. Meeks (N.Y.) tells Politico , even as he confirms he has dismissed Alvi. "I wanted to be sure individuals are not being singled out because of their nationalities or their religion. We want to make sure everybody is entitled to due process."

Wasserman Schultz remains quiet, other than to say Awan had been moved to an advisory role since he was no longer able to directly interact with the House network. She remains dubious about the accusations against Awan and does not see cause to fire him. She becomes increasingly concerned he was being singled out because of his religion.

In an interview on Aug. 3 with the Fort Lauderdale Sun-Sentinel, she said she felt Awan had been nabbed on a technicality: He had been accused of using innocuous programs like Dropbox to transfer information, which doesn't clear House security protocols.

"When their investigation was reviewed with me, I was presented with no evidence of anything that they were being investigated for. And so that, in me, gave me great concern that his due process rights were being violated. That there were racial and ethnic profiling concerns that I had," she said.

A spokeswoman for Capitol Police declined to comment on the accusations, saying they do not comment on ongoing investigations. The police force is overseen by the congressionally appointed sergeant at arms, Congress itself and an inspector general.

May: In a budget hearing for Capitol Police, Wasserman Schultz starts asking Capitol Police Chief Matthew R. Verderosa why they confiscated a laptop related to the case and how she can get it back. "If the equipment belongs to the member, it has been lost, they say it's been lost and it's been identified as that member's, then the Capitol Police are supposed to return it." When the police chief says she can't have it back because there's an ongoing investigation related to it, she appears genuinely frustrated and says: "I think you're violating the rules when you conduct your business that way and you should expect that there will be consequences."

She later told the Sun-Sentinel she was asking about Awan's laptop: "He accidentally left it somewhere."

Week of July 24: Awan's legal troubles deepen. The FBI arrests him at a D.C.-area airport on his way to Pakistan. Fox News's Chad Pergram first reports it, and conservative Daily Caller fleshes out the story .

Awan was arrested while attempting to board a flight after wiring $283,00 to the country. His wife and their three children are already in Pakistan. An affidavit obtained by the Daily Caller alleges they tried to trick their bank, the Congressional Federal Credit Union, into giving them a second mortgage for a rental property by claiming it was their primary residency.

The FBI accuses Awan of trying to flee the country, but his lawyer later tells The Washington Post he had no intention of fleeing; he had bought a round-trip ticket and applied for unpaid leave from work. Awan pleads not guilty.

Same week: Immediately following the charges, Wasserman Schultz's office says Awan is fired.

Same week : The chairwoman of the Republican National Committee starts going on TV to question why Wasserman Schultz hadn't fired Awan earlier, when he was accused of stealing House equipment.

"Debbie Wasserman Schultz has obstructed at every level on something that affects potentially our national security," Ronna McDaniel says on Fox Business. She and other conservative groups call for Congress to hold hearings and Wasserman Schultz to testify.

The RNC sends emails to local media of the 30 Democratic lawmakers who had hired Awan or the other staffers, explaining the case and urging them to ask their lawmakers questions when they're back home for the August break.

Same week : Trump retweets this.

A week after Awan's arrest : A conservative group files a complaint with the House's independent ethics committee alleging Wasserman Schultz broke House rules by allowing Awan to stay on after he was banned from the House system.

Wasserman Schultz's office issues a statement calling the complaint "baseless" because they worked with House officials to make sure they were following the rules to keep him on to do things like help troubleshoot printers.

" It's no surprise that they would nonetheless file it, against one of Donald Trump's fiercest critics, at a time when the administration is trying to distract from its internal turmoil and destructive health care efforts," says Wasserman Schultz spokesman David Damron.

The Washington Post broke the story of the ethics complaint.

Aug. 3: Wall Street Journal columnist Kimberly Strassel calls attention to the drama by pointing out how much money Awan and his relatives were making. "The government, under the inattentive care of Democrats, may have been bilked for ages by a man the FBI has alleged to be a fraudster." Awan, his wife and their relatives were each making roughly $150,000 in annual salary working for more than two dozen House Democrats. Politico calculated Awan had earned more than $2 million since he started working for House Democrats in 2004.

Aug. 3 : Wasserman Schultz gives her first interview to the media. She tells the Fort Lauderdale Sun-Sentinel that she had initially only commented on the arrest via a spokesman since she had been on vacation. And she stands by her decision not to fire Awan after he was accused of stealing House equipment: "I believe that I did the right thing, and I would do it again," she says.

Meanwhile, Awan must stay within 50 miles of his Lorton home while he faces the bank fraud charges.

Aug. 7: Wasserman Schultz's Democratic primary challenger, Tim Canova , accuses her of making "a lot of self-serving excuses for Awan."

We will update this post as news develops.

[Apr 04, 2019] TEST IT YOURSELF, THE 2-SECOND-ROUNDING FACT PATTERN IN THE DNC EMAILS By William Binney and Larry Johnson

Highly recommended!
Notable quotes:
"... The random probability that FAT was not used is 1 chance in 2 to the 500th power or approximately 1 chance in 10 to the 150th power - in other words, an infinitely high order. ..."
Apr 04, 2019 | turcopolier.typepad.com

TEST IT YOURSELF, THE 2-SECOND-ROUNDING FACT PATTERN IN THE DNC EMAILS By William Binney and Larry Johnson Bill and I published a piece a few weeks back that provides actual evidence that challenges the claim that "Russia hacked the DNC." Yes, we know, the Mueller Report continues to insist that theft of emails from the DNC was done over the internet. But that conclusion rests on the opinion of third parties who offer no actual forensic evidence. We, by contrast, are offering up actual evidence that points to an alternative explanation. We do not ask you to take our word for it. Instead, we want to show you how you can test the data yourself ..

First, let's review our key findings from the original piece :

An examination of the Wikileaks DNC files shows they were created on 23 and 25 May and 26 August respectively. The fact that they appear in a FAT system format indicates the data was transfered to a storage device, such as a thumb drive.

How do we know? The truth lies in the "last modified" time stamps on the Wikileaks files. Every single one of these time stamps end in even numbers. If you are not familiar with the FAT file system, you need to understand that when a date is stored under this system the data rounds the time to the nearest even numbered second.

We have examined 500 DNC email files stored on Wikileaks and all 500 files end in an even number -- 2, 4, 6, 8 or 0. If a system other than FAT had been used, there would have been an equal probability of the time stamp ending with an odd number. But that is not the case with the data stored on the Wikileaks site. All end with an even number.

(For an overview of FAT please see this link-- http://www.ntfs.com/fat-systems.htm )

Here's what you need to do to replicate what we found.:

Step One -- Go to the Wikileaks DNC email database. Click here: https://wikileaks.org/dnc-emails/ ) Step Two -- Search the DNC database using the any word. We opted for "Clinton."

This will produce the following results (see link https://wikileaks.org/dnc-emails/?q=Clinton&mfrom=&mto=&title=&notitle=&date_from=&date_to=&nofrom=&noto=&count=50&sort=0#searchresult )

The first message in terms of "relevance" is number 100 (i.e., DOC ID 100)

Doc ID Date Subject From To
100 2016-05-23 21:17:55 +0000 POLITICO's 2016 Blast: Bernie's DNC concessions -- Hillary Clinton's fall preparations -- Trump and Clinton get personal again -- 5 Things You Need To Know 2016blast@politico.com kaplanj@dnc.org

Step Three -- Go to the websniffer site and direct it to "get/100". https://websniffer.cc/?url=https://wikileaks.org/dnc-emails//get/100 ... This is computer speak telling the program to find message 100 (which is titled POLITICO's 2016 Blast: Bernie's DNC concessions -- Hillary Clinton's fall preparations -- Trump and Clinton get personal again -- 5 Things You Need To Know .")

Step Four--Click on submit. That will take you to the following document:

DNC Source Example

Step Five--scroll down to the "HTTP response headers" section where you will find the "Last-Modified" timestamp.

Message 100 shows a Last Modified Timestamp of 05:22:00 GMT.

That time equates to 01:22:00 Eastern Daylight Time.

It ends in 0, an even number. Our search and analysis of all the messages from the DNCin the first Wikileaks release published July 22, 2016" show that all end in an even number.

If you wish, you can search each of the 500 messages from the DNC that we have examined for yourself. You should get the same result. Just go to https://websniffer.cc/?url=https://wikileaks.org/dnc-emails//get/105 (or any other message number you wish).

We repeat our conclusion from the original article:

The random probability that FAT was not used is 1 chance in 2 to the 500th power or approximately 1 chance in 10 to the 150th power - in other words, an infinitely high order.

This data alone does not prove that the emails were copied at the DNC headquarters. But it does show that the data/emails posted by Wikileaks did go through a storage device on the 25 th of May, like a thumbdrive, before Wikileaks posted the emails on the World Wide Web.

We do not know if a person or persons with access to the DNC server accessed the emails from their home. That is possible. What is certain, however, is that email message 100 demonstrates forensic evidence that indicates the email was physically copied onto a storage device, like a thumb drive or CD-Rom, with a last modified date of 05:22:00 GMT on Wednesday the 25 th of May 2016, before it was published on the Wikileaks site. The fact that these messages are in FAT format is not evidence that supports Mueller's claim a "hack."

Perhaps Mueller's team of investigators turned up forensic data that proves a Russian hack. There was no such evidence, however, presented in June and July of 2016 when the initial claim was made blaming Russian intelligence operatives.

We also are confident that there was no solid forensic evidence available in January 2017 to substantiate the Intelligence Community Assessment attributing the "hack" to the Russian Government because NSA analysts only agreed that they had "moderate confidence" in that claim. We know from our prior experience in producting such assessments that if there existed actual forensic evidence, such as tracing the packets back to a server operated by the Russian Government then there would be "strong confidence" in the conclusion.

Who was the person or persons who had access to the DNC server that were copying these messages to a storage device, like a thumb drive, early in the morning on Wednesday the 25 th of May? We have an opinion, but our focus is not on speculation. Let us first deal with the hard forensic evidence. We are certain of one thing -- the available evidence does not support the claim that the DNC emails were "hacked" via an internet cyber attack.

Posted at 12:57 PM in Larry Johnson , Russiagate | Permalink

Eric Newhill , 5 hours ago

Larry,

Since Assange lives in an embassy, would there be any value to looking into who visited him or mailed something to him between Wednesday the 25thof May 2016 and the date Wikileaks published the material (July 22, 2016)? Would the embassy have those records?

Also, I may be mistaken, but wasn't the same material passed to, and published by, DCleaks around the same time as the Wikileaks release? If that is correct, why does no one talk about or analyze the DCleaks aspect of the case?

Finally, what do you think about the idea that multiple penetrations of the server could have been occurring simultaneously by different parties? It is a juicy target, after all, and apparently not well protected. Perhaps the Russians were in there, but were not the source of the DCLeaks and/or Wikileaks material.

[Mar 25, 2019] Spygate The True Story of Collusion (plus Infographic) by Jeff Carlson

Highly recommended!
This is probably the most comprehensive outline of the color revolution against Trump. Bravo, simply bravo !!!
Reads like Agatha Christi Murder on the Orient Express ;-) Rosenstein role is completely revised from a popular narrative. Brennan role clarifies and detailed. Obama personal role hinted. Victoria Nuland role and the role of the State Department in Russiagate is documented for the first time, I think.
Notable quotes:
"... The "insurance policy" appears to have been the effort to legitimize the Trump–Russia collusion narrative so that an FBI investigation, led by McCabe, could continue unhindered. ..."
"... Ohr, one of the highest-ranking officials in the DOJ, was communicating on an ongoing basis with Steele, whom he had known since at least 2006 , well into mid-2017. He is also married to Nellie Ohr, an expert on Russia and Eurasia who began working for Fusion GPS sometime in late 2015 . Nellie Ohr likely played a significant role in the construction of the dossier. ..."
"... The Obama administration provided a simultaneous layer of protection and facilitation for the entire effort. One example is provided by Section 2.3 of Executive Order 12333 , also known as Obama's data-sharing order . With the passage of the order, agencies and individuals were able to ask the NSA for access to specific surveillance simply by claiming the intercepts contained relevant information that was useful to a particular mission. ..."
"... Leaking, including felony leaking of classified information, has been widespread. The Carter Page FISA warrant -- likely the unredacted version -- has been in the possession of The Washington Post and The New York Times since March 2017. Traditionally, the intelligence community leaked to The Washington Post while the DOJ leaked to sources within The New York Times. This was a historical pattern that stood until this election. The leaking became so widespread, even this tradition was broken. ..."
"... The information contained within both articles likely came via felony leaks from James Wolfe, former director of security for the Senate Select Committee on Intelligence, who was arrested on June 7, 2018, and charged with one count of lying to the FBI. Wolfe's indictment alleges that he was leaking classified information to multiple reporters over an extended period of time. ..."
"... The Steele dossier was fed into U.S. channels through several different sources. One such source was Sir Andrew Wood, the former British ambassador to Russia, who had been briefed about the dossier by Steele. Wood later relayed information regarding the dossier to Sen. John McCain, who dispatched David Kramer, a fellow at the McCain Institute, to London to meet with Steele in November 2016. McCain would later admit in a Jan. 11, 2017, statement that he had personally passed on the dossier to then-FBI Director James Comey. ..."
"... Trump, after issuing an order for the declassification of documents and text messages related to the Russia-collusion investigations -- including parts of the Carter Page FISA warrant application -- received phone calls from two U.S. allies saying, "Please, can we talk." Those "allies" were almost certainly the UK and Australia. ..."
"... Questions to be asked are why is it that two of our allies would find themselves so opposed to the release of these classified documents that a coordinated plea would be made directly to the president? And why would these same allies have even the slightest idea of what was contained in these classified U.S. documents? ..."
Oct 12, 2018 | www.theepochtimes.com
Spygate: The True Story of Collusion [Infographic] How America's most powerful agencies were weaponized against President Donald Trump

Although the details remain complex, the structure underlying Spygate -- the creation of the false narrative that candidate Donald Trump colluded with Russia, and the spying on his presidential campaign -- remains surprisingly simple:

  1. CIA Director John Brennan, with some assistance from Director of National Intelligence James Clapper, gathered foreign intelligence and fed it throughout our domestic Intelligence Community.
  2. The FBI became the handler of Brennan's intelligence and engaged in the more practical elements of surveillance.
  3. The Department of Justice facilitated investigations by the FBI and legal maneuverings, while providing a crucial shield of nondisclosure.
  4. The Department of State became a mechanism of information dissemination and leaks.
  5. Hillary Clinton's presidential campaign and the Democratic National Committee provided funding, support, and media collusion.
  6. Obama administration officials were complicit, and engaged in unmasking and intelligence gathering and dissemination.
  7. The media was the most corrosive element in many respects. None of these events could have transpired without their willing participation. Stories were pushed, facts were ignored, and narratives were promoted.

Let's start with a simple premise: The candidacy of Trump presented both an opportunity and a threat.

Initially not viewed with any real seriousness, Trump's campaign was seen as an opportunistic wedge in the election process. At the same time, and particularly as the viability of his candidacy increased, Trump was seen as an existential threat to the established political system.

The sudden legitimacy of Trump's candidacy was not welcomed by the U.S. political establishment. Here was a true political outsider who held no traditional allegiances. He was brash and boastful, he ignored political correctness, he couldn't be bought, and he didn't care what others thought of him -- he trusted himself.

Governing bodies in Britain and the European Union were also worried. Candidate Trump was openly challenging monetary policy, regulations, and the power of special interests. He challenged Congress. He challenged the United Nations and the European Union. He questioned everything.

Brennan played a crucial role in the creation of the Russia-collusion narrative and the spying on the Trump campaign. (Don Emmert/AFP/Getty Images)

Brennan became the point man in the operation to stop a potential Trump presidency. It remains unclear whether his role was self-appointed or came from above. To embark on such a mission without direct presidential authority seems both a stretch of the imagination and particularly foolhardy.

Brennan took unofficial foreign intelligence compiled by contacts, colleagues, and associates -- primarily from the UK , but also from other Five Eyes members, such as Australia.

Individuals in official positions in UK intelligence, such as Robert Hannigan -- head of the UK Government Communications Headquarters (GCHQ, Britain's equivalent of the National Security Agency) -- partnered with former UK foreign intelligence members. Former MI6 head Sir Richard Dearlove , former Ambassador Sir Andrew Wood, and private UK intelligence firm Hakluyt all played a role.

In the summer of 2016, Hannigan traveled to Washington to meet with Brennan regarding alleged communications between the Trump campaign and Moscow. On Jan. 23, 2017 -- three days after Trump's inauguration -- Hannigan abruptly announced his retirement. The Guardian openly speculated that Hannigan's resignation was directly related to the sharing of UK intelligence.

One method used to help establish evidence of collusion was the employment of "spy traps." Prominent among these were ones set for Trump campaign advisers George Papadopoulos and Carter Page. The intent was to provide or establish connections between the Trump campaign and Russia. The content and context mattered little as long as a connection could be established that could then be publicized. The June 2016 Trump Tower meeting was another such attempt.

Western intelligence assets were used to initiate and establish these connections, particularly in the cases of Papadopoulos and Page.

Ultimately, Brennan formed an inter-agency task force comprising an estimated six agencies and/or government departments. The FBI, Treasury, and DOJ handled the domestic inquiry into Trump and possible Russia connections. The CIA, Office of the Director of National Intelligence, and the National Security Agency (NSA) handled foreign and intelligence aspects.

Brennan's inter-agency task force is not to be confused with the July 2016 FBI counterintelligence investigation, which was formed later at Brennan's urging.

During this time, Brennan also employed the use of reverse targeting , which relates to the targeting of a foreign individual with the intent of capturing data on a U.S. citizen. This effort was uncovered and made public by Rep. Devin Nunes (R-Calif.) in a March 2017 press conference :

"I have seen intelligence reports that clearly show the president-elect and his team were monitored and disseminated out in intelligence-reporting channels. Details about persons associated with the incoming administration, details with little apparent foreign-intelligence value were widely disseminated in intelligence community reporting.

"From what I know right now, it looks like incidental collection. We don't know exactly how that was picked up but we're trying to get to the bottom of it."

As this foreign intelligence -- unofficial in nature and outside of any traditional channels -- was gathered, Brennan began a process of feeding his gathered intelligence to the FBI. Repeated transfers of foreign intelligence from the CIA director pushed the FBI toward the establishment of a formal counterintelligence investigation. Brennan repeatedly noted this during a May 23, 2017, congressional testimony :

"I made sure that anything that was involving U.S. persons, including anything involving the individuals involved in the Trump campaign, was shared with the [FBI]."

Brennan also admitted that his intelligence helped establish the FBI investigation:

"I was aware of intelligence and information about contacts between Russian officials and U.S. persons that raised concerns in my mind about whether or not those individuals were cooperating with the Russians, either in a witting or unwitting fashion, and it served as the basis for the FBI investigation to determine whether such collusion [or] cooperation occurred."

This admission is important, as no official intelligence was used to open the FBI's investigation.

Once the FBI began its counterintelligence investigation on July 31, 2016, Brennan shifted his focus. Through a series of meetings in August and September 2016, Brennan informed the congressional Gang of Eight regarding intelligence and information he had gathered. Notably, each Gang of Eight member was briefed separately, calling into question whether each of the members received the same information. Efforts to block the release of the transcripts from each meeting remain ongoing.

The last major segment of Brennan's efforts involved a series of three reports and greater participation from Clapper. The first report, the "Joint Statement from the Department Of Homeland Security and Office of the Director of National Intelligence on Election Security ," was released on Oct. 7, 2016. The second report, "GRIZZLY STEPPE -- Russian Malicious Cyber Activity ," was released on Dec. 29, 2016. The third report, "Assessing Russian Activities and Intentions in Recent U.S. Elections " -- also known as the Intelligence Community Assessment (ICA) -- was released on Jan. 6, 2017.

This final report was used to continue pushing the Russia-collusion narrative following the election of President Donald Trump. Notably, Admiral Mike Rogers of the NSA publicly dissented from the findings of the ICA, assigning only a moderate confidence level.

https://www.youtube.com/embed/bMcNbum93cU?wmode=transparent&wmode=opaque

Federal Bureau of Investigation

Although the FBI is technically part of the DOJ, it is best for the purposes of this article that the FBI and DOJ be viewed as separate entities, each with its own related ties.

The FBI itself was comprised of various factions, with a particularly active element that has come to be known as the "insurance policy group." It appears that this faction was led by FBI Deputy Director Andrew McCabe and comprised other notable names such as FBI agent Peter Strzok, FBI lawyer Lisa Page, and FBI general counsel James Baker.

The FBI established the counterintelligence investigation into alleged Russia collusion with the Trump campaign on July 31, 2016. Comey initially refused to say whether the FBI was investigating possible connections between members of the Trump campaign and Russia. He would continue to refuse to provide answers until March 20, 2017, when he disclosed the existence of the FBI investigation during congressional testimony.

Comey also testified that he did not provide notification to the Gang of Eight until early March 2017 -- less than one month earlier. This admission was in stark contrast to actions taken by Brennan, who had notified members of the Gang of Eight individually during August and September 2016. It's likely that Brennan never informed Comey that he had briefed the Gang of Eight in 2016. Comey did note that the DOJ "had been aware" of the investigation all along.

Comey opened the counterintelligence investigation into Trump on the urging of CIA Director John Brennan.
Following Comey's firing on May 9, 2017, the FBI's investigation was transferred to special counsel Robert Mueller. The Mueller investigation remains ongoing.

The FBI's formal involvement with the Steele dossier began on July 5, 2016, when Mike Gaeta, an FBI agent and assistant legal attaché at the US Embassy in Rome, was dispatched to visit former MI6 spy Christopher Steele in London. Gaeta would return from this meeting with a copy of Steele's first memo. This memo was given to Victoria Nuland at the State Department, who passed it along to the FBI.

Gaeta, who also headed the FBI's Eurasian Organized Crime unit, had known Steele since at least 2010, when Steele had provided assistance to the FBI's investigation into the FIFA corruption scandal .

Prior to the London meeting, Gaeta may also have met on a less formal basis with Steele several weeks earlier. "In June, Steele flew to Rome to brief the FBI contact with whom he had cooperated over FIFA," The Guardian reported. "His information started to reach the bureau in Washington."

It's worth noting that there was no "dossier" until it was fully compiled in December 2016. There was only a sequence of documents from Steele -- documents that were passed on individually -- as they were created. Therefore, from the FBI's legal perspective, they didn't use the dossier. They used individual documents.

For the next month and a half, there appeared to be little contact between Steele and the FBI. However, the FBI's interest in the dossier suddenly accelerated in late August 2016, when the bureau asked Steele "for all information in his possession and for him to explain how the material had been gathered and to identify his sources."

In September 2016, Steele traveled back to Rome to meet with the FBI's Eurasian squad once again. It's likely that the meeting included several other FBI officials as well. According to a House Intelligence Committee minority memo , Steele's reporting reached the FBI counterintelligence team in mid-September 2016 -- the same time as Steele's September trip to Rome.

The reason for the FBI's renewed interest had to do with an adviser to the Trump campaign -- Carter Page -- who had been in contact with Stefan Halper, a CIA and FBI source, since July 2016. Halper arranged to meet with Page for the first time on July 11, 2016, at a Cambridge symposium , just three days after Page took a trip to Moscow. Speakers at the symposium included Madeleine Albright, Vin Webber, and Sir Richard Dearlove, the former head of MI6.

Page was now the FBI's chosen target for a FISA warrant that would be obtained on Oct. 21, 2016. The Steele dossier would be the primary evidence used in obtaining the FISA warrant, which would be renewed three separate times, including after Trump took office, finally expiring in September 2017.

Former volunteer Trump campaign adviser Carter Page on Nov. 2, 2017. The FBI obtained a retroactive FISA spy warrant on Page.

After being in contact with Page for 14 months, Halper stopped contact exactly as the final FISA warrant on Page expired. Page, who has steadfastly maintained his innocence, was never charged with any crime by the FBI. Efforts for the declassification of the Page FISA application are currently ongoing through the DOJ's Office of the Inspector General.

Peter Strzok and Lisa Page

Peter Strzok and Lisa Page were two prominent members of the FBI's "insurance policy" group. Strzok, a senior FBI agent, was the deputy assistant director of FBI's Counterintelligence Division. Lisa Page, an FBI lawyer, served as special counsel to FBI Deputy Director Andrew McCabe.

Strzok was in charge of the investigation into Hillary Clinton's use of a private email server for government business. He helped FBI Director James Comey draft the statement exonerating Clinton and was personally responsible for changing specific wording within that statement that reduced Clinton's legal liability. Specifically, Strzok changed the words "grossly negligent," which could be a criminal offense, to "extremely careless."

Strzok also personally led the FBI's counterintelligence investigation into the alleged Trump–Russia collusion and signed the documents that opened the investigation on July 31, 2016. He was one of the FBI agents who interviewed Trump's national security adviser, Gen. Michael Flynn. Strzok met multiple times with DOJ official Bruce Ohr and received information from Steele at those meetings.

Following the firing of FBI Director James Comey, Strzok would join the team of special counsel Robert Mueller. Two months later, he was removed from that team after the DOJ inspector general discovered a lengthy series of texts between Strzok and Page that contained politically charged messages. Strzok would be fired from the FBI in August 2018.

Both Strzok and Page engaged in strategic leaking to the press. Page did so at the direction of McCabe, who directly authorized Page to share information with Wall Street Journal reporter Devlin Barrett. That information was used in an Oct. 30, 2016, article headlined "FBI in Internal Feud Over Hillary Clinton Probe ." Page leaked to Barrett thinking she had been granted legal and official authorization to do so.

McCabe would later initially deny providing such authorization to the Office of Inspector General. Page, when confronted with McCabe's denials, produced texts refuting his statement. It was these texts that led to the inspector general uncovering the texts between Strzok and Page.

The two exchanged thousands of texts, some of them indicating surveillance activities, over a two-year period. Texts sent between Aug. 21, 2015, and June 25, 2017, have been made public . The series comes to an end with a final text by Page telling Strzok, "Don't ever text me again."

On Aug. 8, 2016, Stzrok wrote that they would prevent candidate Trump from becoming president:

Page: "[Trump is] not ever going to become president, right? Right?!"

Strzok: "No. No he won't. We'll stop it."

On Aug. 15, 2016, Strzok sent a text referring to an "insurance policy":

"I want to believe the path you threw out for consideration in Andy's office -- that there's no way [Trump] gets elected -- but I'm afraid we can't take that risk. It's like an insurance policy in the unlikely event you die before you're 40."

The "insurance policy" appears to have been the effort to legitimize the Trump–Russia collusion narrative so that an FBI investigation, led by McCabe, could continue unhindered.

Department of Justice

The Department of Justice, which comprises 60 agencies , was transformed during the Obama years. The department is forbidden by federal law from hiring employees based on political affiliation.

However, a series of investigative articles by PJ Media published during Eric Holder's tenure as attorney general revealed an unsettling pattern of ideological conformity among new hires at the DOJ: Only lawyers from the progressive left were hired. Not one single moderate or conservative lawyer made the cut. This is significant as the DOJ enjoys significant latitude in determining who will be subject to prosecution.

The DOJ's job in Spygate was to facilitate the legal side of surveillance while providing a protective layer of cover for all those involved. The department became a repository of information and provided a protective wall between the investigative efforts of the FBI and the legislative branch. Importantly, it also served as the firewall within the executive branch, serving as the insulating barrier between the FBI and Obama officials. The department had become legendary for its stonewalling tactics with Congress.

DOJ Official Bruce Ohr on Aug. 28, 2018. Ohr passed on information from Christopher Steele to the FBI.

The DOJ, which was fully aware of the actions being taken by James Comey and the FBI, also became an active element acting against members of the Trump campaign. Deputy Attorney General Sally Yates, along with Mary McCord, the head of the DOJ's National Security Division, was actively involved in efforts to remove Gen. Michael Flynn from his position as national security adviser to President Trump.

To this day, it remains unknown which individual was responsible for making public Flynn's call with the Russian ambassador. Flynn ultimately pleaded guilty to a process crime: lying to the FBI. There have been questions raised in Congress regarding the possible alteration of FD-302s, the written notes of Flynn's FBI interviews. Special counsel Robert Mueller has repeatedly deferred Flynn's sentencing hearing.

David Laufman, deputy assistant attorney general in charge of counterintelligence at the DOJ's National Security Division, played a key role in both the Clinton email server and Russia hacking investigations. Laufman is currently the attorney for Monica McLean, the long-time friend of Christine Blasey Ford, who recently accused Judge Brett Kavanaugh of sexually assaulting her while in high school. McLean was also employed by the FBI for 24 years.

Bruce Ohr was a significant DOJ official who played a key role in Spygate. Ohr held two important positions at the DOJ: associate deputy attorney general, and director of the Organized Crime Drug Enforcement Task Force. As associate deputy attorney general, Ohr was just four offices away from then-Deputy Attorney General Sally Yates, and he reported directly to her. As director of the task force, he was in charge of a program described as "the centerpiece of the attorney general's drug strategy."

Ohr, one of the highest-ranking officials in the DOJ, was communicating on an ongoing basis with Steele, whom he had known since at least 2006 , well into mid-2017. He is also married to Nellie Ohr, an expert on Russia and Eurasia who began working for Fusion GPS sometime in late 2015 . Nellie Ohr likely played a significant role in the construction of the dossier.

According to testimony from FBI agent Peter Strzok, he and Ohr met at least five times during 2016 and 2017. Strzok was working directly with then-Deputy FBI Director Andrew McCabe.

Additionally, Ohr met with the FBI at least 12 times between late November 2016 and May 2017 for a series of interviews. These meetings could have been used to transmit information from Steele to the FBI. This came after the FBI had formally severed contact with Steele in late October or early November 2016.

John Carlin is another notable figure with the DOJ. Carlin was an assistant attorney general and the head of the DOJ's National Security Division until October 2016. His role will be discussed below in the section on FISA abuse.

The Battle Between Rosenstein and McCabe

Deputy FBI Director Andrew McCabe held a pivotal role in what has become known as "Spygate." He directed the activities of Peter Strzok and Lisa Page and was involved in all aspects of the Russia investigation. He was also mentioned in the infamous "insurance policy" text message.

McCabe was a major component of the insurance policy.

On April 26, 2017, Rosenstein found himself appointed as the new deputy attorney general. He was placed into a somewhat chaotic situation, as Attorney General Jeff Sessions had recused himself from the ongoing Russia investigation a little less than two months earlier, on March 2, 2017. This effectively meant that no one in the Trump administration had any oversight of the ongoing investigation being conducted by the FBI and the DOJ.

Additionally, the leadership of then-FBI Director James Comey was coming under increased scrutiny as the result of actions taken leading up to and following the election, particularly Comey's handling of the Clinton email investigation.

On May 9, 2017, Rosenstein wrote a memorandum recommending that Comey be fired. The subject of the memo was "Restoring Public Confidence in the FBI." Comey was fired that day. McCabe was now the acting director of the FBI and was immediately under consideration for the permanent position.

On the same day Comey was fired, McCabe would lie during an interview with agents from the FBI's Inspection Division (INSD) regarding apparent leaks that were used in an Oct. 30, 2016, Wall Street Journal article, "FBI in Internal Feud Over Hillary Clinton Probe" by Devlin Barrett. This would later be disclosed in the inspector general report, "A Report of Investigation of Certain Allegations Relating to Former Deputy FBI Director Andrew McCabe."

At the time, nobody, including the INSD agents, knew that McCabe had lied, nor were the darker aspects of McCabe's role in Spygate fully known.

In late April or early May 2016, McCabe opened a federal criminal investigation on Sessions, regarding potential lack of candor before Congress in relation to Sessions's contacts with Russians. Sessions was unaware of the investigation.

Sessions would later be cleared of any wrongdoing by special counsel Robert Mueller.

On the morning of May 16, 2017, Rosenstein reportedly suggested to McCabe that he secretly record President Trump. This remark was reported in a New York Times article that was sourced from memos from the now-fired McCabe, along with testimony taken from former FBI general counsel James Baker, who relayed a conversation he had with McCabe about the occurrence. Rosenstein issued a statement denying the accusations.

The alleged comments by Rosenstein occurred at a meeting where McCabe was "pushing for the Justice Department to open an investigation into the president." An unnamed participant at the meeting, in comments to The Washington Post, framed the conversation somewhat differently, noting Rosenstein responded sarcastically to McCabe, saying, "What do you want to do, Andy, wire the president?"

Later, on the same day that Rosenstein had his meetings with McCabe, President Trump met with Mueller, reportedly as an interview for the FBI director job. On May 17, 2017, the day after President Trump's meeting with Mueller -- and the day after Rosenstein's encounters with McCabe -- Rosenstein appointed Mueller as special counsel.

The May 17 appointment of Mueller in effect shifted control of the Russia investigation from the FBI and McCabe to Mueller. Rosenstein would retain ultimate authority for the probe and any expansion of Mueller's investigation required authorization from Rosenstein.

Interestingly, without Comey's memo leaks, a special counsel might not have been appointed -- the FBI, and possibly McCabe, would have remained in charge of the Russia investigation. McCabe was probably not going to become the permanent FBI director, but he was reportedly under consideration. Regardless, without Comey's leak, McCabe would have retained direct involvement and the FBI would have retained control.

On July 28, 2017, McCabe lied to Inspector General Michael Horowitz while under oath regarding authorization of the leaking to The Wall Street Journal. At this point, Horowitz knew McCabe was lying, but did not yet know of the May 9 INSD interview with McCabe.

On Aug. 2, 2017, Rosenstein secretly issued Mueller a revised memo on "the scope of investigation and definition of authority" that remains heavily redacted. The full purpose of this memo remains unknown. On this same day, Christopher Wray was named as the new FBI director.

Two days later, on Aug. 4, 2017, Sessions announced that the FBI had created a new leaks investigation unit. Rosenstein and Wray were tasked with overseeing all leak investigations.

That Aug. 2 memo from Rosenstein to Mueller may have been specifically designed to remove any residual FBI influence -- specifically that of McCabe -- from the Russia investigation. The appointment of Wray as FBI director helped cement this. McCabe was finally completely neutralized.

On March 16, 2018, McCabe was fired for lying under oath at least three different times and is currently the subject of a grand jury investigation.

State Department

The State Department, with its many contacts within foreign governments, became a conduit for the flow of information. The transfer of Christopher Steele's first dossier memo was personally facilitated by Victoria Nuland, the assistant secretary of state for European and Eurasian affairs. Nuland gave approval for FBI agent Michael Gaeta to travel to London to obtain the memo from Steele. The memo may have passed directly from her to FBI leadership. Secretary of State John Kerry was also given a copy.

Steele was already well-known within the State Department. Following Steele's involvement in the FIFA scandal investigation, he began to provide reports informally to the State Department. The reports were written for a "private client" but were "shared widely within the U.S. State Department, and sent up to Secretary of State John Kerry and Assistant Secretary of State Victoria Nuland, who was in charge of the U.S. response to Putin's annexation of Crimea and covert invasion of eastern Ukraine," the Guardian reported.

Nuland passed on parts of the Steele dossier to the FBI. (Mark Wilson/Getty Images)

In July 2016, when the FBI wanted to send Gaeta to visit Steele in London, the bureau sought permission from the office of Nuland, who provided this version of events during a Feb. 4, 2018, appearance on CBS's "Face the Nation":

"In the middle of July, when [Steele] was doing this other work and became concerned, he passed two to four pages of short points of what he was finding and our immediate reaction to that was, this is not in our purview. This needs to go to the FBI if there is any concern here that one candidate or the election as a whole might be influenced by the Russian Federation. That's something for the FBI to investigate."

Steele also met with Jonathan Winer, a former deputy assistant secretary of state for international law enforcement and former special envoy for Libya. Steele and Winer had known each other since at least 2010. In an opinion article in The Washington Post, Winer wrote the following:

"In September 2016, Steele and I met in Washington and discussed the information now known as the 'dossier.' Steele's sources suggested that the Kremlin not only had been behind the hacking of the Democratic National Committee and the Hillary Clinton campaign but also had compromised Trump and developed ties with his associates and campaign."

In a strange turn of events, Winer also received a separate dossier , very similar to Steele's, from long-time Clinton confidant Sidney Blumenthal. This "second dossier" had been compiled by another longtime Clinton operative, former journalist Cody Shearer, and echoed claims made in the Steele dossier. Winer then met with Steele in late September 2016 and gave Steele a copy of the "second dossier." Steele went on to share this second dossier with the FBI, which may have used it to corroborate his dossier.

Winer passed on memos from Christopher Steele to Victoria Nuland. (State Department)

Other foreign officials also used conduits into the State Department. Alexander Downer, Australia's high commissioner to the UK, reportedly funneled his conversation with Trump campaign adviser George Papadopoulos -- later used as a reason to open the FBI's counterintelligence investigation -- directly to the U.S. Embassy in London.

"The Downer details landed with the embassy's then-chargé d'affaires, Elizabeth Dibble, who previously served as a principal deputy assistant secretary in Mrs. Clinton's State Department," The Wall Street Journal's Kimberley Strassel wrote in a May 31, 2018, article .

If true, this would mean that neither Australian intelligence nor the Australian government alerted the FBI to the Papadopoulos information. What happened with the Downer details, and to whom they were ultimately relayed, remains unknown.

Curiously, details surprisingly similar to the Papadopoulos–Downer conversation show up in the first memo written by Steele on June 20, 2016:

"A dossier of compromising information on Hillary Clinton has been collated by the Russian Intelligence Services over many years and mainly comprises bugged conversations she had on various visits to Russia and intercepted phone calls. It has not yet been distributed abroad, including to Trump."

Clinton Campaign and the DNC

The Clinton campaign and the Democratic National Committee both occupied a unique position. They had the most to gain but they also had the most to lose. And they stood willing and ready to do whatever was necessary to win. Hillary Clinton's campaign manager, Robby Mook, is credited with being the first to raise the specter of candidate Donald Trump's alleged collusion with Russia.

The entire Clinton campaign willfully promoted the narrative of Russia–Trump collusion despite the uncomfortable fact that they were the ones who had engaged the services of Fusion GPS and Christopher Steele through their law firm Perkins Coie. Information flowed from the campaign -- sometimes through Perkins Coie, other times through affiliates -- ultimately making its way into the media and sometimes to the FBI. Information from the Clinton campaign may also have ended up in the Steele dossier.

Jennifer Palmieri, the communications director for the Clinton campaign, in tandem with Jake Sullivan, the senior policy adviser to the campaign, took the lead in briefing the press on the Trump–Russia collusion story.

Another example of this behavior can be seen from an instance when Perkins Coie lawyer Michael Sussmann leaked information from Steele and Fusion GPS to Franklin Foer of Slate magazine. This event is described in the House Intelligence Committee's final report on Russian active measures , in footnote 43 on page 57. Foer then published the article "Was a Trump Server Communicating With Russia? " on Oct. 31, 2016. The article concerns allegations regarding a server in the Trump Tower.

The Slate article managed to attract the immediate attention of Clinton, who posted a tweet on the same day the article was published:

"Computer scientists have apparently uncovered a covert server linking the Trump Organization to a Russian-based bank."

Attached to her tweet was a statement from Sullivan:

"This could be the most direct link yet between Donald Trump and Moscow. Computer scientists have apparently uncovered a covert server linking the Trump Organization to a Russian-based bank.

"This secret hotline may be the key to unlocking the mystery of Trump's ties to Russia. It certainly seems the Trump Organization felt it had something to hide, given that it apparently took steps to conceal the link when it was discovered by journalists."

These statements, which were later proven to be incorrect, are all the more disturbing with the hindsight knowledge that it was a senior Clinton/DNC lawyer who helped plant the story. And given the prepared statement by Sullivan, the Clinton campaign knew this.

This type of behavior would be engaged in repeatedly -- damning leaks leading to media stories, followed by ready attacks from the Clinton campaign.

Alexandra Chalupa is a Ukrainian-American operative who was consulting for the Democratic National Committee. Chalupa met with top officials in the Ukrainian Embassy in Washington in an effort to expose ties between Trump, Paul Manafort, and Russia. Chalupa began investigating Manafort in 2014. In late 2015, Chalupa expanded her opposition research on Manafort to include Trump's ties to Russia. In January 2016, Chalupa shared her information with a senior DNC official.

Chalupa's meetings with DNC and Ukrainian officials would continue. On April 26, 2016, investigative reporter Michael Isikoff published a story on Yahoo News about Manafort's business dealings with Russian oligarch Oleg Deripaska. It was later learned from a DNC email leaked by Wikileaks that Chalupa had been working with Isikoff -- the same journalist Christopher Steele leaked to in September 2016. Manafort would later be indicted for Foreign Agents Registration Act violations that occurred during the Obama administration.

Perkins Coie

International law firm Perkins Coie served as the legal arm for both the Clinton campaign and the DNC. Ties to Perkins Coie extended beyond the DNC into the Obama White House.

Bob Bauer, a partner at the law firm and founder of its political law practice, served as White House counsel to President Barack Obama throughout 2010 and 2011. Bauer was also general counsel to Obama's campaign organization, Obama for America, in 2008 and 2012.

Perkins Coie partners Marc Elias and Michael Sussmann each played critical roles and were the ones who hired Fusion GPS and Steele. Sussmann personally handled the alleged hack of the DNC server. He also transmitted information, likely from Steele and Fusion GPS, to James Baker, then-chief counsel at the FBI, and to several members of the press.

Perkins Coie partner Michael Sussmann. Sussmann transmitted information to FBI chief counsel James Baker and several journalists. (Courtesy Perkins Coie)

According to a letter dated Oct. 24, 2017, written by Matthew Gehringer, general counsel at Perkins Coie, the firm was approached by Fusion GPS founder Glenn Simpson in early March 2016 regarding the possibility of hiring Fusion GPS to continue opposition research into the Trump campaign. Simpson's overtures were successful, and in April 2016, Perkins Coie hired Fusion GPS on behalf of the DNC.

Sometime in April or May 2016, Fusion GPS hired Christopher Steele. During this same period, Fusion also reportedly hired Nellie Ohr, the wife of Associate Deputy Attorney General Bruce Ohr. Steele would complete his first memo on June 20, 2016, and send it to Fusion via enciphered mail.

Perkins Coie appears to have also been acting as a conduit between the DNC and the FBI. Documents suggest that Sussmann was feeding information to FBI general counsel James Baker and at least one journalist ahead of the FBI's application for a FISA warrant on the Trump campaign.

The information provided by Sussmann may have been used by the FBI as "corroborating information."

Obama Administration

The Obama administration provided a simultaneous layer of protection and facilitation for the entire effort. One example is provided by Section 2.3 of Executive Order 12333 , also known as Obama's data-sharing order . With the passage of the order, agencies and individuals were able to ask the NSA for access to specific surveillance simply by claiming the intercepts contained relevant information that was useful to a particular mission.

Section 2.3 had been expected to be finalized by early to mid-2016. Instead, Director of National Intelligence James Clapper didn't sign off on Section 2.3 until Dec. 15, 2016. The order was finalized when Attorney General Loretta Lynch signed it on Jan. 3, 2017.

The reason for the delay could relate to the fact that while the executive order made it easier to share intelligence between agencies, it also limited certain types of information from going to the White House.

An example of this was provided by Evelyn Farkas during a March 2, 2017, MSNBC interview , where she detailed how the Obama administration gathered and disseminated intelligence on the Trump team:

"I was urging my former colleagues and, frankly speaking, the people on the Hill 'Get as much information as you can. Get as much intelligence as you can before President Obama leaves the administration.'

"The Trump folks, if they found out how we knew what we knew about the Trump staff's dealing with Russians, [they] would try to compromise those sources and methods, meaning we would no longer have access to that intelligence. That's why you have the leaking."

Deputy Assistant Secretary of Defense for Russia/Ukraine/Eurasia Evelyn Farkas on May 6, 2014. (Alex Wong/Getty Images)

Many of the Obama administration's efforts appear to have been structural in nature, such as establishing new procedures or creating impediments to oversight that enabled much of the surveillance abuse to occur.

DOJ Inspector General Michael Horowitz was appointed by Obama in 2011. From the very start, he found his duties throttled by the attorney general's office. According to congressional testimony by Horowitz:

"We got access to information up to 2010 in all of these categories. No law changed in 2010. No policy changed. It was simply a decision by the General Counsel's Office in 2010 that they viewed, now, the law differently. And as a result, they weren't going to give us that information."

These new restrictions were put in place by Attorney General Eric Holder and Deputy Attorney General James Cole.

On Aug. 5, 2014, Horowitz and other inspectors general sent a letter to Congress asking for unimpeded access to all records. Deputy Attorney General Sally Yates responded on July 20, 2015, with a 58-page memorandum . The memo specifically denied the inspector general access to any information collected under Title III -- including intercepted communications and national security letters.

The New York Times recently disclosed that national security letters were used in the surveillance of the Trump campaign.

At other times, the Obama administration's efforts were more direct. The Intelligence Community assessment was released internally on Jan. 5, 2017. On this same day, Obama held an undisclosed White House meeting to discuss the dossier with national security adviser Susan Rice, FBI Director James Comey, and Yates. Rice would later send herself an email documenting the meeting.

The following day, Brennan, Clapper, and Comey attached a written summary of the Steele dossier to the classified briefing they gave Obama. Comey then met with President-elect Trump to inform him of the dossier. This meeting took place just hours after Comey, Brennan, and Clapper formally briefed Obama on both the Intelligence Community assessment and the Steele dossier.

Comey would only inform Trump of the "salacious" details contained within the dossier. He later explained on CNN in an April 2018 interview why:

"Because that was the part that the leaders of the Intelligence Community agreed he needed to be told about."

Shortly after Comey's meeting with Trump, both the Trump–Comey meeting and the existence of the dossier were leaked to CNN. The significance of the meeting was material, as Comey noted in a Jan. 7 memo he wrote:

"Media like CNN had them and were looking for a news hook. I said it was important that we not give them the excuse to write that the FBI has the material."

Clapper leaked information to CNN, after which he publicly condemned the leaks. (Alex Wong/Getty Images)

The media had widely dismissed the dossier as unsubstantiated and, therefore, unreportable. It was only after learning that Comey briefed Trump that CNN reported on the dossier. It was later revealed that DNI James Clapper personally leaked Comey's meeting with Trump to CNN.

The Obama administration also directly participated in a series of intelligence unmaskings , the process whereby a U.S. citizen's identity is revealed from collected surveillance. U.S. Ambassador to the U.N. Samantha Power reportedly engaged in hundreds of unmasking requests. Rice has admitted to doing the same.

The Obama administration engaged in the ultimately successful effort to oust Trump's newly appointed national security adviser, Gen. Michael Flynn. Yates, along with Mary McCord, head of the DOJ's National Security Division, led that effort .

Executive Order 13762

President Barack Obama issued a last-minute executive order on Jan. 13, 2017, that altered the line of succession within the DOJ. The action was not done in consultation with the incoming Trump administration.

Acting Attorney General Sally Yates was fired on Jan. 30, 2017, by a newly inaugurated President Trump for refusing to uphold the president's executive order limiting travel from certain terror-prone countries. Yates was initially supposed to serve in her position until Jeff Sessions was confirmed as attorney general.

Obama's executive order placed the U.S. attorney for the District of Columbia next in line behind the department's senior leadership. The attorney at the time was Channing Phillips.

Phillips was first hired by former Attorney General Eric Holder in 1994 for a position in the D.C. U.S. attorney's office. Phillips, after serving as a senior adviser to Holder, stayed on after he was replaced by Attorney General Loretta Lynch.

It appears the Obama administration was hoping the Russia investigation would default to Channing in the event Sessions was forced to recuse himself from the investigation. Sessions, whose confirmation hearings began three days before the order, was already coming under intense scrutiny.

The implementation of the order may also tie into Yates's efforts to remove Gen. Michael Flynn over his call with the Russian ambassador.

Trump ignored the succession order, as he is legally allowed to do, and instead appointed Dana Boente, the U.S. attorney for the Eastern District of Virginia, as acting attorney general on Jan. 30, 2017, the same day Yates was fired.

Trump issued a new executive order on Feb. 9, 2017, the same day Sessions was sworn in, reversing Obama's prior order.

On March 10, 2017, Trump fired 46 Obama-era U.S. attorneys, including Preet Bharara, the U.S. attorney in Manhattan. These firings appear to have been unexpected.

Media

In some respects, the media has played the most disingenuous of roles. Areas of investigation that historically would have proven irresistible to reporters of the past have been steadfastly ignored. False narratives have been all-too-willingly promoted and facts ignored. Fusion GPS personally made a series of payments to several as-of-yet- unnamed reporters .

The majority of the mainstream media has represented positions of the DNC and the Clinton campaign.

Steele met with members of certain media with relative frequency. In September 2016 , he met with a number of U.S. journalists for "The New York Times, the Washington Post, Yahoo! News, the New Yorker and CNN," according to The Guardian. It was during this period that Steele met with Michael Isikoff of Yahoo News.

In mid-October 2016, Steele returned to New York and met with reporters again. Toward the end of October, Steele spoke via Skype with Mother Jones reporter David Corn.

Leaking, including felony leaking of classified information, has been widespread. The Carter Page FISA warrant -- likely the unredacted version -- has been in the possession of The Washington Post and The New York Times since March 2017. Traditionally, the intelligence community leaked to The Washington Post while the DOJ leaked to sources within The New York Times. This was a historical pattern that stood until this election. The leaking became so widespread, even this tradition was broken.

On April 3, 2017, BuzzFeed reporter Ali Watkins wrote the article " A Former Trump Adviser Met With a Russian Spy ." In the article, she identified "Male-1," referred to in court documents relating to the case of Russian spy Evgeny Buryakov, as Trump campaign adviser Carter Page, who had provided the FBI with assistance in the case. Just over a week later, on April 11, 2017, a Washington Post article, " FBI Obtained FISA Warrant to Monitor Former Trump Adviser Carter Page ," confirmed the existence of the October 2016 Page FISA warrant.

The information contained within both articles likely came via felony leaks from James Wolfe, former director of security for the Senate Select Committee on Intelligence, who was arrested on June 7, 2018, and charged with one count of lying to the FBI. Wolfe's indictment alleges that he was leaking classified information to multiple reporters over an extended period of time.

Reporter Ali Watkins likely received the undredacted FISA application on Carter Page from James Wolfe.
It appears probable that Wolfe leaked unredacted copies of the Page FISA application. According to the indictment , Wolfe exchanged 82 text messages with Watkins on March 17, 2017. That same evening they engaged in a 28-minute phone call. The original Page FISA application is 83 pages long, including one final signatory page.

In the public version of the application, there are 37 fully redacted pages. In addition to that, several other pages have redactions for all but the header. There are only two pages in the entire document that contain no redactions.

Why would Wolfe bother to send 37 pages of complete redactions? It seems more than plausible that Wolfe took pictures of the original unredacted FISA application and sent them by text to Watkins.

House Intelligence Committee Chairman Devin Nunes has repeatedly stated that evidence within the FISA application shows the counterintelligence agencies were abused by the Obama administration. Most of the mainstream media has known this.

Despite this, most major news organizations for over two years have promoted the Russia-collusion narrative. Despite ample evidence having come out to the contrary, they have not admitted they were wrong, likely because doing so would mean they would have to admit their complicity.

Foreign Intelligence

UK and Australian intelligence agencies also played meaningful roles during the 2016 presidential election.

Britain's GCHQ was involved in collecting information regarding then-candidate Trump and transmitting it to the United States. In the summer of 2016, Robert Hannigan, the head of GCHQ, flew from London to meet personally with then-CIA Director John Brennan, The Guardian reported.

Former GCHQ head Robert Hannigan in this file photo. Hannigan transmitted information regarding Donald Trump to John Brennan in the summer of 2016. (Romeo Gacad/AFP/Getty Images)

Hannigan's meeting was noteworthy because Brennan wasn't Hannigan's counterpart. That position belonged to NSA Director Mike Rogers. In the following year, Hannigan abruptly announced his retirement on Jan. 23, 2017 -- three days after Trump's inauguration.

As GCHQ was gathering intelligence, low-level Trump campaign foreign-policy adviser George Papadopoulos appears to have been targeted after a series of highly coincidental meetings. Maltese professor Josef Mifsud, Australian diplomat Alexander Downer, FBI informant Stefan Halper, and officials from the UK's Foreign and Commonwealth Office (FCO) all crossed paths with Papadopoulos -- some repeatedly so.

Christopher Steele, who authored the dossier on Trump, was an MI6 agent while the agency was headed by Sir Richard Dearlove. Steele retains close ties with Dearlove.

Dearlove has ties to most of the parties mentioned. It was he who advised Steele and his business partner, Chris Burrows, to work with a top British government official to pass along information to the FBI in the fall of 2016. He also was a speaker at the July 2016 Cambridge symposium that Halper invited Carter Page to attend.

Dearlove knows Halper through their mutual association at the Cambridge Intelligence Seminar. Dearlove also knows Sir Iain Lobban, a former head of GCHQ, who is an advisory board member at British strategic intelligence and advisory firm Hakluyt , which was founded by former MI6 members and retains close ties to UK intelligence services.

Halper has historical connections to Hakluyt through Jonathan Clarke, with whom he has co-authored two books.

Downer, who met Papadopoulos in a May 2016 meeting established through a chain of two intermediaries, served on the advisory board of Hakluyt from 2008 to 2014. He reportedly still maintains contact with Hakluyt officials. Information from his meeting with Papadopoulos was later used by the FBI to establish the bureau's counterintelligence investigation into Trump–Russia collusion. Downer has changed his version of events multiple times.

The Steele dossier was fed into U.S. channels through several different sources. One such source was Sir Andrew Wood, the former British ambassador to Russia, who had been briefed about the dossier by Steele. Wood later relayed information regarding the dossier to Sen. John McCain, who dispatched David Kramer, a fellow at the McCain Institute, to London to meet with Steele in November 2016. McCain would later admit in a Jan. 11, 2017, statement that he had personally passed on the dossier to then-FBI Director James Comey.

Trump, after issuing an order for the declassification of documents and text messages related to the Russia-collusion investigations -- including parts of the Carter Page FISA warrant application -- received phone calls from two U.S. allies saying, "Please, can we talk." Those "allies" were almost certainly the UK and Australia.

In a Twitter post , Trump wrote that the "key Allies called to ask not to release" the documents.

Questions to be asked are why is it that two of our allies would find themselves so opposed to the release of these classified documents that a coordinated plea would be made directly to the president? And why would these same allies have even the slightest idea of what was contained in these classified U.S. documents?

Britain and Australia appear to know full well what those documents contain, and their attempt to prevent their public release appears to be because they don't want their role in events surrounding the 2016 presidential election to be made public.

Fusion GPS/Orbis/Christopher Steele

Glenn Simpson, a former Wall Street Journal reporter, is co-founder of Fusion GPS, along with Peter Fritsch and Tom Catan. Fusion was hired by the DNC and the Clinton campaign through law firm Perkins Coie to produce and disseminate the Steele dossier used against Trump. The dossier would later be the primary evidence used to obtain a FISA warrant on Carter Page on Oct. 21, 2016.

The company was hired by the Clinton campaign and the DNC–through law firm Perkins Coie–to produce the dossier on Trump.

Christopher Steele, who retains close ties to UK intelligence, worked for MI6 from 1987 until his retirement in 2009, when he and his partner, Chris Burrows, founded Orbis Intelligence. Steele maintains contact with British intelligence, Sir Richard Dearlove , and UK intelligence firm Hakluyt.

Steele appears to have been represented by lawyer Adam Waldman, who also represented Russian oligarch Oleg Deripaska. We know this from texts sent by Waldman. On April 10, 2017, Waldman sent this to Sen. Mark Warner:

"Hi. Steele: would like to get a bi partisan letter from the committee; Assange: I convinced him to make serious and important concessions and am discussing those w DOJ; Deripaska: willing to testify to congress but interested in state of play w Manafort. I will be with him next tuesday for a week."

Steele also appears to have lobbied on behalf of Deripaska, who was discussed in emails between Bruce Ohr and Steele that were recently disclosed by the Washington Examiner:

"Steele said he was 'circulating some recent sensitive Orbis reporting' on Deripaska that suggested Deripaska was not a 'tool' of the Kremlin. Steele said he would send the reporting to a name that is redacted in the email."

Fusion GPS was also employed by Russian lawyer Natalia Veselnitskaya in a previous case. Veselnitskaya was involved in litigation pitting Russian firm Prevezon Holdings against British-American financier William Browder. Veselnitskaya hired U.S. law firm BakerHostetler, who, in turn, hired Fusion GPS to dig up dirt on Browder. Veselnitskaya was one of the participants at the June 2016 Trump Tower meeting, at which she discussed the Magnitsky Act .

Fox News reported on Nov. 9, 2017, that Simpson met with Veselnitskaya immediately before and after the Trump Tower meeting.

A declassified top-secret Foreign Intelligence Surveillance Court report released on April 26, 2017, revealed that government agencies, including the FBI, CIA, and NSA, had improperly accessed Americans' communications. The FBI specifically provided outside contractors with access to raw surveillance data on American citizens without proper oversight.

Communications and other data of members of the Trump campaign may have been accessed in this way.


Nellie Ohr, the wife of high-ranking DOJ official Bruce Ohr, was hired by Fusion GPS to work on the dossier on Trump.

Bruce and Nellie Ohr have known Simpson since at least 2010 and have known Steele since at least 2006. The Ohrs and Simpson worked together on a DOJ report in 2010 . In that report, Nellie Ohr's biography lists her as working for Open Source Works, which is part of the CIA. Simpson met with Bruce Ohr before and after the 2016 election.

Bruce Ohr had been in contact repeatedly with Steele during the 2016 presidential campaign -- while Steele was constructing his dossier. Ohr later actively shared information he received from Steele with the FBI, after the agency had terminated Steele as a source. Interactions between Ohr and Steele stretched for months into the first year of Trump's presidency and were documented in a number of FD-302s -- memos that summarize interviews with him by the FBI.

Spy Traps

In an effort to put forth evidence of collusion between the Trump campaign and Russia, it appears that several different spy traps were set, with varying degrees of success. Many of these efforts appear to center around Trump campaign adviser George Papadopoulos and involve London-based professor Joseph Mifsud, who has ties to Western intelligence, particularly in the UK.

Papadopoulos and Mifsud both worked at the London Centre of International Law Practice (LCILP). Mifsud appears to have joined LCILP around November 2015 . Papadopoulos reportedly joined LCILP sometime in late February 2016 after leaving Ben Carson's presidential campaign. However, some reports indicate Papadopoulos joined LCILP in November or December of 2015. Mifsud and Papadopoulos reportedly never crossed paths until March 14, 2016, in Italy.

Mifsud introduced Papadopoulos to several Russians, including Olga Polonskaya, whom Mifsud introduced as "Putin's niece," and Ivan Timofeev, an official at a state-sponsored think tank called the Russian International Affairs Council. Both Papadopoulos and Mifsud were interviewed by the FBI. Papadopoulos was ultimately charged with a process crime and was recently sentenced to 14 days in prison for lying to the FBI. Mifsud was never charged by the FBI.

Throughout this period, Papadopoulos continuously pushed for meetings between Trump campaign officials and Russian contacts but was ultimately unsuccessful in establishing any meetings.

Papadopoulos met with Australian diplomat Alexander Downer on May 10, 2016. The Papadopoulos–Downer meeting has been portrayed as a chance encounter in a bar. That does not appear to be the case.

Papadopoulos was introduced to Downer through a chain of two intermediaries who said Downer wanted to meet with Papadopoulos. Another individual happened to be in London at exactly the same time: the FBI's head of counterintelligence, Bill Priestap. The purpose of Priestap's visit remains unknown.

The Papadopoulos–Downer meeting was later used to establish the FBI's counterintelligence investigation into Trump–Russia collusion. It was repeatedly reported that Papadopoulos told Downer that Russia had Hillary Clinton's emails. This is incorrect.

Foreign policy adviser to the Trump campaign was approached by several individuals with ties to UK and U.S. intelligence agencies. (Mandel Ngan/AFP/Getty Images)

According to Downer, Papadopoulos at some point mentioned the Russians had damaging information on Hillary Clinton.

"During that conversation, he [Papadopoulos] mentioned the Russians might use material that they have on Hillary Clinton in the lead-up to the election, which may be damaging,'' Downer told The Australian about the Papadopoulos meeting in an April 2018 article. "He didn't say dirt, he said material that could be damaging to her. No, he said it would be damaging. He didn't say what it was."

Downer, while serving as Australia's foreign minister, was responsible for one of the largest foreign donations to the Clinton Foundation: $25 million from the Australian government.

Unconfirmed media reports, including a Jan. 12, 2017, BBC article , have suggested that the FBI attempted to obtain two FISA warrants in June and July 2016 that were denied by the FISA court. It's likely that Papadopoulos was an intended target of these failed FISAs.

Interestingly, there is no mention of Papadopoulos in the Steele dossier. Paul Manafort, Carter Page, former Trump lawyer Michael Cohen, Gen. Michael Flynn, and former Trump campaign manager Corey Lewandowski are all listed in the Steele dossier.

Papadopoulos may have started out assisting the FBI or CIA and later discovered that he was being set up for surveillance himself.

After failing to obtain a spy warrant on the Trump campaign using Papadopoulos, the FBI set its sights on campaign volunteer Carter Page. By this time, the counterintelligence investigation was in the process of being established, and we know now that it was formalized with no official intelligence. The FBI needed some sort of legal cover. They needed a retroactive warrant. And they got one on Oct. 21, 2016. The Page FISA warrant would be renewed three times and remain in force until September 2017.

Stefan Halper met with Page for the first time on July 11, 2016, at a Cambridge symposium , just three days after Page's July 2016 Moscow trip. As noted previously, former MI6 head Sir Richard Dearlove was a speaker at the symposium. Halper and Dearlove have known each other for years and maintain several mutual associations.

Page was already known to the FBI. The Page FISA warrant application references the Buryakov spy case and an FBI interview with Page. Current information suggests there was only one meeting between Page and the FBI in 2016. It happened on March 2, 2016. It was in relation to Victor Podobnyy, who was named in the Buryakov case.

Page, who cooperated with the FBI on the case, almost certainly was providing testimony or details against Podobnyy. Page had been contacted by Podobnyy in 2013 and had previously provided information to the FBI. Buryakov pleaded guilty on March 11, 2016 -- nine days after Page met with the FBI on the case -- and was sentenced to 30 months in prison on May 25, 2016. On April 5, 2017, Buryakov was granted early release and was deported to Russia.

FBI informant Stefan Halper approached Trump campaign advisers George Papadopoulos and Carter Page.

House Intelligence Committee Chairman Devin Nunes said in August that exculpatory evidence on Page exists that wasn't included by the DOJ and the FBI in the FISA application and subsequent renewals. The exculpatory evidence likely relates specifically to Page's role in the Buryakov case.

If the FBI failed to disclose Page's cooperation with the bureau or materially misrepresented his involvement in its application to the FISA Court, it means that the FBI's Woods procedures, which govern FISA applications, were violated.

Page has not been arrested or charged with any crime related to the investigation.

FISA Abuse

Admiral Mike Rogers, while director of the NSA, was personally responsible for uncovering an unprecedented level of FISA abuse that would later be documented in a 99-page unsealed FISA court ruling . As the FISA court noted in the April 26, 2017, ruling, the abuses had been occurring since at least November 2015:

"The FBI had disclosed raw FISA information, including but not limited to Section 702-acquired information, to private contractors.

"Private contractors had access to raw FISA information on FBI storage systems.

"Contractors had access to raw FISA information that went well beyond what was necessary to respond to the FBI's requests."

The FISA Court report is particularly focused on the FBI:

"The Court is concerned about the FBI's apparent disregard of minimization rules and whether the FBI may be engaging in similar disclosures of raw Section 702 information that have not been reported."

The FISA Court disclosed that illegal NSA database searches were endemic. Private contractors, employed by the FBI, were given full access to the NSA database. Once in the contractors' possession, the data couldn't be traced.

In April 2016, after Rogers became aware of improper contractor access to raw FISA data on March 9, 2016, he directed the NSA's Office of Compliance to conduct a "fundamental baseline review of compliance associated with 702."

On April 18, 2016, Rogers shut down all outside contractor access to raw FISA information -- specifically outside contractors working for the FBI.

Then-NSA Director Adm. Mike Rogers on May 23, 2017. Rogers uncovered widespread abuse of FISA data by the FBI. (Saul Loeb/AFP/Getty Images)

DOJ National Security Division (NSD) head John Carlin filed the government's proposed 2016 Section 702 certifications on Sept. 26, 2016. Carlin knew the general status of compliance review by Rogers. The NSD was part of the review. Carlin failed to disclose a critical Jan. 7, 2016, report by the Office of the Inspector General and associated FISA abuse to the FISA Court in his 2016 certification. Carlin also failed to disclose Rogers's ongoing Section 702 compliance review.

The following day, on Sept. 27, 2016, Carlin announced his resignation, effective Oct. 15, 2016.

After receiving a briefing by the NSA compliance officer on Oct. 20, 2016, detailing numerous "about query" violations from the 702 NSA compliance audit, Rogers shut down all "about query" activity the next day and reported his findings to the DOJ. "About queries" are searches based on communications containing a reference "about" a surveillance target but that are not "to" or "from" the target.

On Oct. 21, 2016, the DOJ and the FBI sought and received a Title I FISA probable-cause order authorizing electronic surveillance on Carter Page from the FISA Court.

At this point, the FISA Court was still unaware of the Section 702 violations.

On Oct. 24, 2016, Rogers verbally informed the FISA Court of his findings. On Oct. 26, 2016, Rogers appeared formally before the FISA Court and presented the written findings of his audit.

The FISA Court had been unaware of the query violations until they were presented to the court by Rogers.

Carlin didn't disclose his knowledge of FISA abuse in the annual Section 702 certifications in order to avoid raising suspicions at the FISA Court ahead of receiving the Page FISA warrant.

The FBI and the NSD were literally racing against Rogers's investigation in order to obtain a FISA warrant on Carter Page.

While all this was transpiring, DNI James Clapper and Defense Secretary Ash Carter submitted a recommendation that Rogers be removed from his post as NSA director.

The move to fire Rogers, which ultimately failed, originated sometime in mid-October 2016 -- exactly when Rogers was preparing to present his findings to the FISA Court.

The Insurance Policy

Ever since the release of FBI text messages revealing the existence of an "insurance policy," the term has been the subject of wide speculation.

Some observers have suggested that the insurance policy was the FISA spy warrant used to monitor Trump campaign adviser Carter Page and, by extension, other members of the Trump campaign. This interpretation is too narrow and fails to capture the underlying meaning of the text.

The insurance policy was the actual process of establishing the Trump–Russia collusion narrative.

It encompassed actions undertaken in late 2016 and early 2017, including the leaking of the Steele dossier and James Clapper's leaks of James Comey's briefing to President Trump. The intent behind these actions was simple. The legitimization of the investigation into the Trump campaign.

The strategy involved the recusal of Trump officials with the intent that Andrew McCabe would end up running the investigation.

The Steele dossier, which was paid for by the Clinton presidential campaign and the Democratic National Committee, served as the foundation for the Russia narrative.

The intelligence community, led by CIA Director John Brennan and DNI James Clapper, used the dossier as a launching pad for creating their Intelligence Community assessment.

This report, which was presented to Obama in December 2016, despite NSA Director Mike Rogers having only moderate confidence in its assessment, became one of the core pieces of the narrative that Russia interfered with the 2016 elections.

Through intelligence community leaks, and in collusion with willing media outlets, the narrative that Russia helped Trump win the elections was aggressively pushed throughout 2017.

Spygate

Spygate represents the biggest political scandal in our nation's history. A sitting administration actively colluded with a political campaign to affect the outcome of a U.S. presidential election. Government agencies were weaponized and a complicit media spread intelligence community leaks as facts.

But a larger question remains: How long has the United States been subject to interference from the intelligence community and our political agencies? Was the 2016 presidential election a one-time aberration, or is this episode symptomatic of a larger pattern extending back decades?

The intensity, scale, and coordination suggest something greater than overzealous actions taken during a single election. They represent a unified reaction of the establishment to a threat posed by a true outsider -- a reaction that has come to be known as Spygate.

Jeff Carlson is a regular contributor to The Epoch Times. He also runs the website TheMarketsWork.com and can be followed on Twitter @themarketswork.

[Mar 20, 2019] Wasserman Schultz Proves She's A Sociopath - Lies About Venezuela

Mar 20, 2019 | www.unz.com

Tina Smith 3 days ago Only reason she's not already in prison is because she's a useful Military Industrial Complex tool.

Cant_Touch_This 3 days ago DWS rigged in order to win her district just like she rigged against Bernie Sanders on behalf of Hilary Clinton.

Daniel Clint 3 days ago Remove the sanctions you psychopaths. DWS belongs in jail.

[Mar 17, 2019] Mueller uses the same old false flag scams, just different packaging of his forensics-free findings

Highly recommended!
Notable quotes:
"... It appears the FBI, CIA, and NSA have great difficulty in differentiating between Russians and Democrats posing as Russians. ..."
"... Maybe the VIPS should look into the murder of Seth Rich, the DNC staffer who had the security clearance required to access the DNC servers, and who was murdered in the same week as the emails were taken. In particular, they should ask why the police were told to stand down and close the murder case without further investigation. ..."
"... What a brilliant article, so logical, methodical & a forensic, scientific breakdown of the phony Russiagate project? And there's no doubt, this was a co-ordinated, determined Intelligence project to reverse the results of the 2016 Election by initiating a soft coup or Regime change op on a elected Leader, a very American Coup, something the American Intelligence Agencies specialise in, everywhere else, on a Global scale, too get Trump impeached & removed from the Whitehouse? ..."
"... Right. Since its purpose is to destroy Trump politically, the investigation should go on as long as Trump is in office. Alternatively, if at this point Trump has completely sold out, that would be another reason to stop the investigation. ..."
"... Nancy Pelosi's announcement two days ago that the Democrats will not seek impeachment for Trump suggests the emptiness of the Mueller investigation on the specific "collusion" issue. ..."
"... We know and Assange has confirmed Seth Rich, assassinated in D.C. for his deed, downloaded the emails and most likely passed them on to former British ambassador Craig Murray in a D.C. park for transport to Wikileaks. ..."
"... This so-called "Russiagate" narrative is an illustration of our "freedom of the press" failure in the US due to groupthink and self censorship. He who pays the piper is apt to call the tune. ..."
"... Barr, Sessions, every congressmen all the corporate MSM war profiteer mouth pieces. They all know that "Russia hacked the DNC" and "Russia meddled" is fabricated garbage. They don't care, because their chosen war beast corporate candidate couldn't beat Donald goofball Trump. So it has to be shown that the war beast only lost because of nefarious reasons. Because they're gonna run another war beast cut from the same cloth as Hillary in 2020. ..."
"... Mar 4, 2019 Tom Fitton: President Trump a 'Crime Victim' by Illegal Deep State DOJ & FBI Abuses: https://youtu.be/ixWMorWAC7c ..."
"... Trump is a willing player in this game. The anti-Russian Crusade was, quite simply, a stunningly reckless, short-sighted effort to overturn the 2016 election, removing Trump to install Hillary Clinton in office. ..."
"... Much ado about nothing. All the talk and chatter and media airplay about "Russian meddling" in the 2016 election only tells me that these liars think the American public is that stupid. ..."
"... Andrew Thomas I'm afraid that huge amounts of our History post 1947 is organized and propagandized disinformation. There is an incredible page that John Simpkin has organized over the years that specifically addresses individuals, click on a name and read about them. https://spartacus-educational.com/USAdisinformation.htm ..."
"... It's pretty astonishing that Mueller was more interested in Roger Stone and Jerome Corsi as credible sources about Wikileaks and the DNC release than Craig Murray! ..."
"... Yes, he has done his job. And his job was to bring his royal Orangeness to heel, and to make sure that detente and co-operation with Russia remained impossible. The forever war continues. Mission Accomplished. ..."
Mar 17, 2019 | consortiumnews.com

O Society , March 16, 2019 at 7:55 am

The Truth is Out There. I Want to Believe!

Same old scams, different packaging. That's New & Improved for you.

http://opensociet.org/2019/03/16/the-return-of-the-hidden-persuaders

Raymond Comeau , March 15, 2019 at 12:35 pm

I could not suffer through reading the whole article. This is mainly because I have watched the news daily about Mueller's Investigation and I sincerely believe that Mueller is Champion of the Democrats who are trying to depose President Donald Trump at any cost.

For what Mueller found any decent lawyer with a Degree and a few years of experience could have found what Mueller found for far far less money. Mueller only found common crimes AND NO COLLUSION BETWEEN PRESIDENT TRUMP AND PUTIN!

The Mueller Investigation should be given to an honest broker to review, and Mueller should be paid only what it would cost to produce the commonplace crimes Mueller, The Democrats, and CNN has tried to convince the people that indeed Trump COLLUDED with RUSSIA. Mueller is, a BIG NOTHING BURGER and THE DEMOCRATS AND CNN ARE MUELLER'S SINGING CANARYS! Mueller should be jailed.

Bogdan Miller , March 15, 2019 at 11:04 am

This article explains why the Mueller Report is already highly suspect. For another thing, we know that since before 2016, Democrats have been studying Russian Internet and hacking tactics, and posing as Russian Bots/Trolls on Facebook and other media outlets, all in an effort to harm President Trump.

It appears the FBI, CIA, and NSA have great difficulty in differentiating between Russians and Democrats posing as Russians.

B.J.M. Former Intelligence Analyst and Humint Collector

vinnieoh , March 15, 2019 at 8:17 am

Moving on: the US House yesterday voted UNANIMOUSLY (remember that word, so foreign these days to US governance?) to "urge" the new AG to release the complete Mueller report.

A non-binding resolution, but you would think that the Democrats can't see the diesel locomotive bearing down on their clown car, about to smash it to pieces. The new AG in turn says he will summarize the report and that is what we will see, not the entire report. And taxation without representation takes a new twist.

... ... ...

Raymond Comeau , March 15, 2019 at 12:38 pm

What else would you expect from two Political Parties who are really branches of the ONE Party which Represents DEEP STATE".

DWS , March 15, 2019 at 5:58 am

Maybe the VIPS should look into the murder of Seth Rich, the DNC staffer who had the security clearance required to access the DNC servers, and who was murdered in the same week as the emails were taken. In particular, they should ask why the police were told to stand down and close the murder case without further investigation.

Raymond Comeau , March 15, 2019 at 12:47 pm

EXACTLY! But, Deep State will not allow that. And, it would ruin the USA' plan to continue to invade more sovereign countries and steal their resources such as oil and Minerals. The people of the USA must be Ostriches or are so terrified that they accept anything their Criminal Governments tell them.

Eventually, the chickens will come home to roost and perhaps the USA voters will ROAST when the crimes of the USA sink the whole country. It is time for a few Brave Men and Women to find their backbones and throw out the warmongers and their leading Oligarchs!

KiwiAntz , March 14, 2019 at 6:44 pm

What a brilliant article, so logical, methodical & a forensic, scientific breakdown of the phony Russiagate project? And there's no doubt, this was a co-ordinated, determined Intelligence project to reverse the results of the 2016 Election by initiating a soft coup or Regime change op on a elected Leader, a very American Coup, something the American Intelligence Agencies specialise in, everywhere else, on a Global scale, too get Trump impeached & removed from the Whitehouse?

If you can't get him out via a Election, try & try again, like Maduro in Venezuela, to forcibly remove the targeted person by setting him up with fake, false accusations & fabricated evidence? How very predictable & how very American of Mueller & the Democratic Party. Absolute American Corruption, corrupts absolutely?

Brian Murphy , March 15, 2019 at 10:33 am

Right. Since its purpose is to destroy Trump politically, the investigation should go on as long as Trump is in office. Alternatively, if at this point Trump has completely sold out, that would be another reason to stop the investigation.

If the investigation wraps up and finds nothing, that means Trump has already completely sold out. If the investigation continues, it means someone important still thinks Trump retains some vestige of his balls.

DH Fabian , March 14, 2019 at 1:19 pm

By last June or July the Mueller investigation has resulted in roughly 150 indictments for perjury/financial crimes, and there was a handful of convictions to date. The report did not support the Clinton wing's anti-Russian allegations about the 2016 election, and was largely brushed aside by media. Mueller was then reportedly sent back in to "find something." presumably to support the anti-Russian claims.

mike k , March 14, 2019 at 12:57 pm

From the beginning of the Russia did it story, right after Trump's electoral victory, it was apparent that this was a fraud. The democratic party however has locked onto this preposterous story, and they will go to their graves denying this was a scam to deny their presidential defeat, and somehow reverse the result of Trump's election. My sincere hope is that this blatant lie will be an albatross around the party's neck, that will carry them down into oblivion. They have betrayed those of us who supported them for so many years. They are in many ways now worse than the republican scum they seek to replace.

DH Fabian , March 14, 2019 at 1:26 pm

Trump is almost certain to be re-elected in 2020, and we'll go through this all over again.

Tom , March 14, 2019 at 12:00 pm

The very fact that the FBI never had access to the servers and took the word of a private company that had a history of being anti-Russian is enough to throw the entire ruse out.

LJ , March 14, 2019 at 2:39 pm

Agreed!!!! and don't forget the FBI/Comey gave Hillary and her Campaign a head's up before they moved to seize the evidence. . So too, Comey said he stopped the Investigation , thereby rendering judgement of innocence, even though by his own words 'gross negligence' had a occurred (which is normally considered grounds for prosecution). In doing so he exceeded the FBI's investigative mandate. He rationalized that decision was appropriate because of the appearance of impropriety that resulted from Attorney General Lynch having a private meeting on a plane on a runway with Bill and Hillary . Where was the logic in that. Who called the meeting? All were Lawyers who had served as President, Senator, Attorney General and knew that the meeting was absolutely inappropriate. . Comey should be prosecuted if they want to prosecute anyone else because of this CRAP. PS Trump is an idiot. Uhinfortunately he is just a symptom of the disease at this point. Look at the cover of Rolling Stone magazine , carry a barf bag.

Jane Christ , March 14, 2019 at 6:51 pm

Exactly. This throws doubt on the ability of the FBI to work independently. They are working for those who want to cover -up the Hillary mess . She evidently has sufficient funds to pay them off. I am disgusted with the level of corruption.

hetro , March 14, 2019 at 10:50 am

Nancy Pelosi's announcement two days ago that the Democrats will not seek impeachment for Trump suggests the emptiness of the Mueller investigation on the specific "collusion" issue. If there were something hot and lingering and about to emerge, this decision is highly unlikely, especially with the reasoning she gave at "so as not to divide the American people." Dividing the people hasn't been of much concern throughout this bogus witch hunt on Trump, which has added to his incompetence in leavening a growing hysteria and confusion in this country. If there is something, anything at all, in the Mueller report to support the collusion theory, Pelosi would I'm sure gleefully trot it out to get a lesser candidate like Pence as opposition for 2020.

James Clooney , March 14, 2019 at 11:17 am

We know and Assange has confirmed Seth Rich, assassinated in D.C. for his deed, downloaded the emails and most likely passed them on to former British ambassador Craig Murray in a D.C. park for transport to Wikileaks.

We must also honor Shawn Lucas assassinated for serving DNC with a litigation notice exposing the DNC conspiracy against Sanders.

hetro , March 14, 2019 at 3:18 pm

Where has Assange confirmed this? Assange's long-standing position is NOT to reveal his sources. I believe he has continued to honor this position.

Skip Scott , March 15, 2019 at 7:15 am

It has merely been insinuated by the offering of a reward for info on Seth's murder. In one breath he says wikileaks will never divulge a source, and in the next he offers a $20k reward saying that sources take tremendous risk. Doesn't take much of a logical leap to connect A to B.

DH Fabian , March 14, 2019 at 1:30 pm

Are you aware that Democrats split apart their 0wn voting base in the 1990s, middle class vs. poor? The Obama years merely confirmed that this split is permanent. This is particularly relevant for Democrats, as their voting base had long consisted of the poor and middle class, for the common good. Ignoring this deep split hasn't made it go away.

hetro , March 14, 2019 at 3:24 pm

Even more important is how the Democrats have sold out to an Establishment view favoring neocon theory, since at least Bill Clinton. Pelosi's recent behavior with Ilhan Omar confirms this and the split you're talking about. My point is it is distinctly odd that Pelosi is discouraging impeachment on "dividing the Party" (already divided, of course, as you say), whereas the Russia-gate fantasy was so hot not that long ago. Again it points to a cynical opportunism and manipulation of the electorate. Both parties are a sad excuse to represent ordinary people's interests.

Skip Scott , March 15, 2019 at 7:21 am

She said "dividing the country", not the party. I think she may have concerns over Trump's heavily armed base. That said, the statement may have been a ruse. There are plenty of Republicans that would cross the line in favor of impeachment with the right "conclusions" by Mueller. Pelosi may be setting up for a "bombshell" conclusion by Mueller. One must never forget that we are watching theater, and that Trump was a "mistake" to be controlled or eliminated.

Cindy Haddix , March 14, 2019 at 8:04 am

Mueller should be ashamed that he has made President Trump his main concern!! If all this investigation would stop he could save America millions!!! He needs to quit this witch-hunt and worry about things that really need to be handled!!! If the democrats and Trump haters would stop pushing senseless lies hopefully this would stop ? It's so disgusting that his democrat friend was never really investigated ? stop the witch-hunt and move forward!!!!

torture this , March 14, 2019 at 7:29 am

According to this letter, mistakes might have been made on Rachel Maddow's show. I can't wait to read how she responds. I'd watch her show, myself except that it has the same effect on me as ipecac.

Zhu , March 14, 2019 at 3:37 am

People will cling to "Putin made Trump President!!!" much as many cling "Obama's a Kenyan Muslim! Not a real American!!!". Both nut theories are emotionally satisfying, no matter what the historical facts are. Many Americans just can't admit their mistakes and blaming a scapegoat is a way out.

O Society , March 14, 2019 at 2:03 am

Thank you VIPS for organizing this legit dissent consisting of experts in the field of intelligence and computer forensics.

This so-called "Russiagate" narrative is an illustration of our "freedom of the press" failure in the US due to groupthink and self censorship. He who pays the piper is apt to call the tune.

It is astounding how little skepticism and scientifically-informed reasoning goes on in our media. These folks show themselves to be native advertising rather than authentic journalists at every turn.

DH Fabian , March 14, 2019 at 1:33 pm

But it has been Democrats and the media that market to middle class Dems, who persist in trying to sell the Russian Tale. They excel at ignoring the evidence that utterly contradicts their claims.

O Society , March 15, 2019 at 3:50 pm

Oh, we're well beyond your "Blame the middle class Dems" stage.

The WINNING!!! team sports bullshit drowns the entire country now the latrine's sprung a leak. People pretend to live in bubbles made of blue or red quite like the Three Little Pigs, isn't it? Except instead of a house made of bricks saving the day for the littlepiggies, what we've got here is a purple puddle of piss.

Everyone's more than glad to project all our problems on "THEM" though, aren't we?

Meanwhile, the White House smells like a urinal not washed since the 1950s and simpletons still get their rocks off arguing about whether Mickey Mouse can beat up Ronald McDonald.

T'would be comic except what's so tragic is the desperate need Americans have to believe, oh just believe! in something. Never mind the sound of the jackhammer on your skull dear, there's an app for that or is it a pill?

I don't know, don't ask me, I'm busy watching TV. Have a cheeto.

https://opensociet.org/2018/12/18/the-disneyfication-of-america/

Sam F , March 13, 2019 at 6:45 pm

Very good analysis clearly stated, especially adding the FAT timestamps to the transmission speeds.

Minor corrections: "The emails were copied from the network" should be "from the much faster local network" because this is to Contradict the notion that they were copied over the internet network, which most readers will equate with "network." Also "reportedin" should be "reported in."

Michael , March 13, 2019 at 6:25 pm

It is likely that New Knowledge was actually "the Russians", possibly working in concert with Crowdstrike. Once an intelligence agency gets away with something like pretending to be Russian hackers and bots, they tend to re-use their model; it is too tempting to discard an effective model after a one-off accomplishment. New Knowledge was caught interfering/ determining the outcome in the Alabama Senate race on the side of Democrat Doug Jones, and claimed they were merely trying to mimic Russian methods to see if they worked (they did; not sure of their punishment?). Occam's razor would suggest that New Knowledge would be competent to mimic/ pretend to be "Russians" after the fact of wikileaks' publication of emails. New Knowledge has employees from the NSA and State department sympathetic to/ working with(?) Hillary, and were the "outside" agency hired to evaluate and report on the "Russian" hacking of the DNC emails/ servers.

DH Fabian , March 13, 2019 at 5:48 pm

Mueller released report last summer, which resulted in (the last I checked) roughly 150 indictments, a handful of convictions to date, all for perjury/financial (not political) crimes. This wasn't kept secret. It simply wasn't what Democrats wanted to hear, so although it was mentioned in some lib media (which overwhelmingly supported neoliberal Hillary Clinton), it was essentially swept under the carpet.

Billy , March 13, 2019 at 11:11 pm

Barr, Sessions, every congressmen all the corporate MSM war profiteer mouth pieces. They all know that "Russia hacked the DNC" and "Russia meddled" is fabricated garbage. They don't care, because their chosen war beast corporate candidate couldn't beat Donald goofball Trump. So it has to be shown that the war beast only lost because of nefarious reasons. Because they're gonna run another war beast cut from the same cloth as Hillary in 2020.

Realist , March 14, 2019 at 3:22 am

You betcha. Moreover, who but the Russians do these idiots have left to blame? Everybody else is now off limits due to political correctness. Sigh Those Catholics, Jews, "ethnics" and sundry "deviants" used to be such reliable scapegoats, to say nothing of the "undeveloped" world. As Clapper "authoritatively" says, only this vile lineage still carries the genes for the most extremes of human perfidy. Squirrels in your attic? It must be the damned Russkies! The bastards impudently tried to copy our democracy, economic system and free press and only besmirched those institutions, ruining all of Hillary's glorious plans for a worldwide benevolent dictatorship. All this might be humorous if it weren't so funny.

And those Chinese better not get to thinking they are somehow our equals just because all their trillions invested in U.S. Treasury bonds have paid for all our wars of choice and MIC boondoggles since before the turn of the century. Unless they start delivering Trump some "free stuff" the big man is gonna cut off their water. No more affordable manufactured goods for the American public! So there!

As to the article: impeccable research and analysis by the VIPS crew yet again. They've proven to me that, to a near certainty, the Easter Bunny is not likely to exist. Mueller won't read it. Clapper will still prance around a free man, as will Brennan. The Democrats won't care, that is until November of 2020. And Hillary will continue to skate, unhindered in larding up the Clinton Foundation to purposes one can only imagine.

Joe Tedesky , March 14, 2019 at 10:02 pm

Realist,

I have posted this article 'the Russia they Lost' before and from time to time but once again it seems appropriate to add this link to expound upon for what you've been saying. It's an article written by a Russian who in they're youth growing up in the USSR dreamed of living the American lifestyle if Russia were to ever ditch communism. But . Starting with Kosovo this Russian's youthful dream turned nightmarishly ugly and, as time went by with more and yet even more USA aggression this Russian author loss his admiration and desire for all things American to be proudly envied. This is a story where USA hard power destroyed any hope of American soft power for world unity. But hey that unity business was never part of the plan anyway.

https://slavyangrad.org/2014/09/24/the-russia-they-lost/

Realist , March 15, 2019 at 10:38 pm

right you are, joe. if america was smart rather than arrogant, it would have cooperated with china and russia to see the belt and road initiative succeed by perhaps building a bridge or tunnel from siberia to alaska, and by building its own fleet of icebreakers to open up its part of the northwest passage. but no, it only wants to sabotage what others propose. that's not being a leader, it's being a dick.

i'm gonna have to go on the disabled list here until the sudden neurological problem with my right hand clears up–it's like paralysed. too difficult to do this one-handed using hunt and peck. at least the problem was not in the old bean, according to the scans. carry on, sir.

Brian James , March 13, 2019 at 5:04 pm

Mar 4, 2019 Tom Fitton: President Trump a 'Crime Victim' by Illegal Deep State DOJ & FBI Abuses: https://youtu.be/ixWMorWAC7c

DH Fabian , March 13, 2019 at 5:55 pm

Trump is a willing player in this game. The anti-Russian Crusade was, quite simply, a stunningly reckless, short-sighted effort to overturn the 2016 election, removing Trump to install Hillary Clinton in office. Trump and the Republicans continue to win by default, as Democrats only drive more voters away.

Howard , March 13, 2019 at 4:36 pm

Thank you Ray McGovern and the Other 17 VIPS C0-Signers of your National Security Essay for Truth. Along with Craig Murray and Seymour Hirsch, former Sam Adams Award winners for "shining light into dark places", you are national resources for objectivity in critical survival information matters for our country. It is more than a pity that our mainstream media are so beholden to their corporate task masters that they cannot depart from the company line for fear of losing their livelihoods, and in the process we risk losing life on the planet because of unconstrained nuclear war on the part of the two main adversaries facing off in an atmosphere of fear and mistrust. Let me speak plainly. THEY SHOULD BE TALKING TO YOU AND NOT THE VESTED INTERESTS' MOUTHPIECES. Thank you for your continued leadership!

James Clooney , March 14, 2019 at 11:28 am

Roger Ailes founder of FOX news died, "falling down stairs" within a week of FOX news exposing to the world that the assassinated Seth Rich downloaded the DNC emails.

DH Fabian , March 13, 2019 at 6:03 pm

Google the Mueller investigation report from last June or July. When it was released, the public response was like a deflated balloon. It did not support the "Russian collusion" allegations -- the only thing Democrats still had left to sell. The report resulted in roughly 150 indictments for perjury/financial crimes (not political), and a handful of convictions to date -- none of which had anything to do with the election results.

Hank , March 13, 2019 at 6:19 pm

Much ado about nothing. All the talk and chatter and media airplay about "Russian meddling" in the 2016 election only tells me that these liars think the American public is that stupid. They are probably right, but the REAL reason that Hillary lost is because there ARE enough informed people now in this nation who are quite aware of the Clinton's sordid history where scandals seem to follow every where they go, but indictments and/or investigations don't. There IS an internet nowadays with lots of FACTUAL DOCUMENTED information. That's a lot more than I can say about the mainstream corporate-controlled media!

I know this won't ever happen, but an HONEST investigation into the Democratic Party and their actions during the 2016 election would make ANY collusion with ANY nation look like a mole hill next to a mountain! One of the problems with living in this nation is if you are truly informed and make an effort 24/7 to be that way by doing your own research, you more-than-likely can be considered an "island in a sea of ignorance".

Tom , March 14, 2019 at 12:13 pm

We know that the FBI never had access to the servers and a private company was allowed to handle the evidence. Wasnt it a crime scene? The evidence was tampered with And we will never know what was on the servers.

Mark McCarty , March 13, 2019 at 4:10 pm

As a complement to this excellent analysis, I would like to make 2 further points:

The Mueller indictment of Russian Intelligence for hacking the DNC and transferring their booty to Wikileaks is absurd on its face for this reason: Assange announced on June 12th the impending release of Hillary-related emails. Yet the indictment claims that Guccifer 2.0 did not succeed in transferring the DNC emails to Wikileaks until the time period of July 14-18th – after which they were released online on July 22nd. Are we to suppose that Assange, a publisher of impeccable integrity, publicly announced the publication of emails he had not yet seen, and which he was obtaining from a source of murky provenance? And are we further to suppose that Wikileaks could have processed 20K emails and 20K attachments to insure their genuineness in a period of only several days? As you will recall, Wikileaks subsequently took a number of weeks to process the Podesta emails they released in October.

And another peculiarity merits attention. Assange did not state on June 12th that he was releasing DNC emails – and yet Crowdstrike and the Guccifer 2.0 personna evidently knew that this was in store. A likely resolution of this conundrum is that US intelligence had been monitoring all communications to Wikileaks, and had informed the DNC that their hacked emails had been offered to Wikileaks. A further reasonable prospect is that US intelligence subsequently unmasked the leaker to the DNC; as Assange has strongly hinted, this likely was Seth Rich. This could explain Rich's subsequent murder, as Rich would have been in a position to unmask the Guccifer 2.0 hoax and the entire Russian hacking narrative.

https://medium.com/@markfmccarty/muellers-new-indictment-do-the-feds-take-us-for-idiots-5406ef955406

https://medium.com/@markfmccarty/how-did-crowdstrike-guccifer-2-0-know-that-wikileaks-was-planning-to-release-dnc-emails-42e6db334053

Sam F , March 13, 2019 at 7:06 pm

Curious that Assange has Not explicitly stated that the leaker was Seth Rich, if it was, as this would take pressure from himself and incriminate the DNC in the murder of Rich. Perhaps he doesn't know, and has the honor not to take the opportunity, or perhaps he knows that it was not Rich.

James Clooney , March 14, 2019 at 11:40 am

View the Dutch TV interview with Asssange and there is another interview available on youtube in which Assange DOES subtly confirmed it was Seth Rich.

Assange posted a $10,000 reward for Seth Rich's murders capture.

Abby , March 13, 2019 at 10:11 pm

Another mistaken issue with the "Russia hacked the DNC computers on Trump's command" is that he never asked Russia to do that. His words were, "Russia if you 'find' Hillary's missing emails let us know." He said that after she advised congress that she wouldn't be turning in all of the emails they asked for because she deleted 30,000 of them and said that they were personal.

But if Mueller or the FBI wants to look at all of them they can find them at the NYC FBI office because they are on Weiner's laptop. Why? Because Hillary's aid Huma Abedin, Weiner's wife sent them to it. Just another security risk that Hillary had because of her private email server. This is why Comey had to tell congress that more of them had been found 11 days before the election. If Comey hadn't done that then the FBI would have.

But did Comey or McCabe look at her emails there to see if any of them were classified? No they did not do that. And today we find out that Lisa Page told congress that it was Obama's decision not to charge Hillary for being grossly negligent on using her private email server. This has been known by congress for many months and now we know that the fix was always in for her to get off.

robert e williamson jr , March 13, 2019 at 3:26 pm

I want to thank you folks at VIPS. Like I have been saying for years now the relationship between CIA, NSA and DOJ is an incestuous one at best. A perverse corrupted bond to control the masses. A large group of religious fanatics who want things "ONE WAY". They are the facilitators for the rogue government known as the "DEEP STATE"!

Just ask billy barr.

More truth is a very good thing. I believe DOJ is supporting the intelligence community because of blackmail. They can't come clean because they all risk doing lots of time if a new judicial mechanism replaces them. We are in big trouble here.

Apparently the rule of law is not!

You folks that keep claiming we live in the post truth era! Get off me. Demand the truth and nothing else. Best be getting ready for the fight of your lives. The truth is you have to look yourself in the mirror every morning, deny that truth. The claim you are living in the post truth era is an admission your life is a lie. Now grab a hold of yourself pick a dogdamned side and stand for something,.

Thank You VIPS!

Joe Tedesky , March 13, 2019 at 2:58 pm

Hats off to the VIP's who have investigated this Russian hacking that wasn't a hacking for without them what would we news junkies have otherwise to lift open the hood of Mueller's never ending Russia-gate investigation. Although the one thing this Russia-gate nonsense has accomplished is it has destroyed with our freedom of speech when it comes to how we citizens gather our news. Much like everything else that has been done during these post 9/11 years of continual wars our civil rights have been marginalized down to zero or, a bit above if that's even still an argument to be made for the sake of numbers.

Watching the Manafort sentencing is quite interesting for the fact that Manafort didn't conclude in as much as he played fast and loose with his income. In fact maybe Manafort's case should have been prosecuted by the State Department or, how about the IRS? Also wouldn't it be worth investigating other Geopolitical Rain Makers like Manafort for similar crimes of financial wrongdoing? I mean is it possible Manafort is or was the only one of his type to do such dishonest things? In any case Manafort wasn't charged with concluding with any Russians in regard to the 2016 presidential election and, with that we all fall down.

I guess the best thing (not) that came out of this Russia-gate silliness is Rachel Maddow's tv ratings zoomed upwards. But I hate to tell you that the only ones buying what Ms Maddow is selling are the died in the wool Hillary supporters along with the chicken-hawks who rally to the MIC lobby for more war. It's all a game and yet there are many of us who just don't wish to play it but still we must because no one will listen to the sanity that gets ignored keep up the good work VIP's some of us are listening.

Andrew Thomas , March 13, 2019 at 12:42 pm

The article did not mention something called to my attention for the first time by one of the outstanding members of your commentariat just a couple of days ago- that Ambassador Murray stayed publicly, over two years ago, that he had been given the thumb drive by a go-between in D.C. and had somehow gotten it to Wikileaks. And, that he has NEVER BEEN INTERVIEWED by Mueller &Company. I was blown away by this, and found the original articles just by googling Murray. The excuse given is that Murray "lacks credibility ", or some such, because of his prior relationship with Assange and/or Wikileaks. This is so ludicrous I can't even get my head around it. And now, you have given me a new detail-the meeting with Pompeo, and the complete lack of follow-up thereafter. Here all this time I thought I was the most cynical SOB who existed, and now I feel as naive as when I was 13 and believed what Dean Rusk was saying like it was holy writ. I am in your debt.

Bob Van Noy , March 13, 2019 at 2:33 pm

Andrew Thomas I'm afraid that huge amounts of our History post 1947 is organized and propagandized disinformation. There is an incredible page that John Simpkin has organized over the years that specifically addresses individuals, click on a name and read about them. https://spartacus-educational.com/USAdisinformation.htm

Mark McCarty , March 13, 2019 at 4:18 pm

A small correction: the Daily Mail article regarding Murray claimed that Murray was given a thumbdrive which he subsequently carried back to Wikileaks. On his blog, Murray subsequently disputed this part of the story, indicating that, while he had met with a leaker or confederate of a leaker in Washington DC, the Podesta emails were already in possession of Wikileaks at the time. Murray refused to clarify the reason for his meeting with this source, but he is adamant in maintaining that the DNC and Podesta emails were leaked, not hacked.

And it is indeed ludicrous that Mueller, given the mandate to investigate the alleged Russian hacking of the DNC and Podesta, has never attempted to question either Assange or Murray. That in itself is enough for us to conclude that the Mueller investigation is a complete sham.

Ian Brown , March 13, 2019 at 4:43 pm

It's pretty astonishing that Mueller was more interested in Roger Stone and Jerome Corsi as credible sources about Wikileaks and the DNC release than Craig Murray!

LJ , March 13, 2019 at 12:29 pm

A guy comes in with a pedigree like that, """ former FBI head """ to examine and validate if possible an FBI sting manufactured off a phony FISA indictment based on the Steele Report, It immediately reminded me of the 9-11 Commission with Thomas Kean, former Board member of the National Endowment for Democracy, being appointed by GW Bush the Simple to head an investigation that he had previously said he did not want to authorize( and of course bi partisan yes man Lee Hamilton as #2, lest we forget) . Really this should be seen as another low point in our Democracy. Uncle Sam is the Limbo Man, How low can you go?

After Bill and Hillary and Monica and Paula Jones and Blue Dresses well, Golden Showers in a Moscow luxury hotel, I guess that make it just salacious enough.

Mueller looks just like what he is. He has that same phony self important air as Comey . In 2 years this will be forgotten.. I do not think this hurts Trumps chances at re-election as much as the Democrats are hurting themselves. This has already gone on way too long.

Drew Hunkins , March 13, 2019 at 11:59 am

Mueller has nothing and he well knows it. He was willingly roped into this whole pathetic charade and he's left grasping for anything remotely tied to Trump campaign officials and Russians.

Even the most tenuous connections and weak relationships are splashed across the mass media in breathless headlines. Meanwhile, NONE of the supposed skulduggery unearthed by Mueller has anything to do with the Kremlin "hacking" the election to favor Trump, which was the entire raison d'etre behind Rosenstein, Brennan, Podesta and Mueller's crusade on behalf of the deplorable DNC and Washington militarist-imperialists. It will be fascinating to witness how Mueller and his crew ultimately extricate themselves from this giant fraudulent edifice of deceit. Will they even be able to save the most rudimentary amount of face?

So sickening to see the manner in which many DNC sycophants obsequiously genuflect to their godlike Mueller. A damn prosecutor who was likely in bed with the Winter Hill Gang.

Jack , March 13, 2019 at 12:21 pm

You have failed. An investigation is just that, a finding of the facts. What would Mueller have to extricate himself from? If nothing is found, he has still done his job. You are a divisive idiot.

Skip Scott , March 13, 2019 at 1:13 pm

Yes, he has done his job. And his job was to bring his royal Orangeness to heel, and to make sure that detente and co-operation with Russia remained impossible. The forever war continues. Mission Accomplished.

Drew Hunkins , March 13, 2019 at 2:12 pm

@Jack,
Keep running cover for an out of control prosecutor, who, if he had any integrity, would have hit the bully pulpit mos ago declaring there's nothing of substance to one of the most potentially dangerous accusations in world history: the Kremlin hacking the election. Last I checked it puts two nuclear nation-states on the brink of potential war. And you call me divisive? Mueller's now a willing accomplice to this entire McCarthyite smear and disinformation campaign. It's all so pathetic that folks such as yourself try and mislead and feed half-truths to the people.

You're failing Jack, in more ways than you know.

Gregory Herr , March 13, 2019 at 9:13 pm

https://www.kcrw.com/culture/shows/scheer-intelligence/liberals-are-digging-their-own-grave-with-russiagate-2019-03-08

Drew, you might enjoy this discussion Robert Scheer has with Stephen Cohen and Katrina vanden Heuvel.

Realist , March 15, 2019 at 3:38 am

Moreover, as the Saker pointed out in his most recent column in the Unz Review, the entire Deep State conspiracy, in an ad hoc alliance with the embarrassed and embarrassing Democrats, have made an absolute sham of due process in their blatant witch hunt to bag the president. This reached an apex when his personal lawyer, Mr. Cohen, was trotted out before congress to violate Trump's confidentiality in every mortifying way he could even vaguely reconstruct. The man was expected to say anything to mitigate the anticipated tortures to come in the course of this modern day inquisition by our latter day Torquemada. To his credit though, even with his ass in a sling, he could simply not confabulate the smoking gun evidence for the alleged Russian collusion that this whole farce was built around.

Tom , March 14, 2019 at 12:30 pm

Mueller stood with Bush as he lied the world into war based on lies and illegally spied on America and tortured some folks.

George Collins , March 13, 2019 at 2:02 pm

QED: as to the nexus with the Winter Hill gang wasn't there litigation involving the Boston FBI, condonation of murder by the FBI and damages awarded to or on behalf of convicted parties that the FBI had reason to know were innocent? The malfeasance reportedly occurred during Mueller time. Further on the sanctified diligence of Mr. Mueller can be gleaned from the reports of Coleen Rowley, former FBI attorney stationed in Milwaukee??? when the DC FBI office was ignoring warnings sent about 9/11. See also Sibel Edmonds who knew to much and was court order muzzled about FBI mis/malfeasance in the aftermath of 9/11.

I'd say it's game, set, match VIPS and a pox on Clapper and the complicit intelligence folk complicit in the nuclear loaded Russia-gate fibs.

Kiers , March 13, 2019 at 11:47 am

How can we expect the DNC to "hand it " to Trumpf, when, behind the scenes, THEY ARE ONE PARTY. They are throwing faux-scary pillow bombs at each other because they are both complicit in a long chain of corruptions. Business as usual for the "principled" two party system! Democracy! Through the gauze of corporate media! You must be joking!

Skip Scott , March 13, 2019 at 11:28 am

"We believe that there are enough people of integrity in the Department of Justice to prevent the outright manufacture or distortion of "evidence," particularly if they become aware that experienced scientists have completed independent forensic study that yield very different conclusions."

I wish I shared this belief. However, as with Nancy Pelosi's recent statement regarding pursuing impeachment, I smell a rat. I believe with the help of what the late Robert Parry called "the Mighty Wurlitzer", Mueller is going to use coerced false testimony and fabricated forensics to drop a bombshell the size of 911. I think Nancy's statement was just a feint before throwing the knockout punch.

If reason ruled the day, we should have nothing to worry about. But considering all the perfidy that the so-called "Intelligence" Agencies and their MSM lackeys get away with daily, I think we are in for more theater; and I think VIPS will receive a cold shoulder outside of venues like CN.

I pray to God I'm wrong.

Sam F , March 13, 2019 at 7:32 pm

My extensive experience with DOJ and the federal judiciary establishes that at least 98% of them are dedicated career liars, engaged in organized crime to serve political gangs, and make only a fanatical pretense of patriotism or legality. They are loyal to money alone, deeply cynical and opposed to the US Constitution and laws, with no credibility at all beyond any real evidence.

Eric32 , March 14, 2019 at 4:24 pm

As near I can see, Federal Govt. careers at the higher levels depend on having dirt on other players, and helping, not hurting, the money/power schemes of the players above you.

The Clintons (through their foundation) apparently have a lot of corruption dirt on CIA, FBI etc. top players, some of whom somehow became multi-millionaires during their civil service careers.

Trump, who was only running for President as a name brand marketing ploy with little desire to actually win, apparently came into the Presidency with no dirt arsenal and little idea of where to go from there.

Bob Van Noy , March 13, 2019 at 11:09 am

I remember reading with dismay how Russians were propagandized by the Soviet Press Management only to find out later the depth of disbelief within the Russian population itself. We now know what that feels like. The good part of this disastrous scenario for America is that for careful readers, disinformation becomes revelatory. For instance, if one reads an editorial that refers to the Russian invasion of Ukraine, or continually refers to Russian interference in the last Presidential election, then one can immediately dismiss the article and question the motivation for the presentation. Of course the problem is how to establish truth in reporting

Jeff Harrison , March 13, 2019 at 10:41 am

Thank you, VIPs. Hopefully, you don't expect this to make a difference. The US has moved into a post truth, post reality existence best characterized by Karl Rove's declaration: "we're an empire now, when we act, we create our own reality." What Mr. Rove in his arrogance fails to appreciate is that it is his reality but not anyone else's. Thus Pompous can claim that Guaido is the democratic leader in Venezuela even though he's never been elected .

Gary Weglarz , March 13, 2019 at 10:21 am

Thank you. The next time one of my friends or family give me that glazed over stare and utters anymore of the "but, RUSSIA" nonsense I will refer them directly to this article. Your collective work and ethical stand on this matter is deeply appreciated by anyone who values the truth.

Russiagate stands with past government propaganda operations that were simply made up out of thin air: i.e. Kuwaiti incubator babies, WMD's, Gaddafi's viagra fueled rape camps, Assad can't sleep at night unless he's gassing his own people, to the latest, "Maduro can't sleep at night unless he's starving his own people."

The complete and utter amorality of the deep state remains on display for all to see with "Russiagate," which is as fact-free a propaganda campaign as any of those just mentioned.

Marc , March 13, 2019 at 10:13 am

I am a computer naif, so I am prepared to accept the VIPS analysis about FAT and transfer rates. However, the presentation here leaves me with several questions. First, do I understand correctly that the FAT rounding to even numbers is introduced by the thumb drive? And if so, does the FAT analysis show only that the DNC data passed through a thumb drive? That is, does the analysis distinguish whether the DNC data were directly transferred to a thumb drive, or whether the data were hacked and then transferred to a thumb drive, eg, to give a copy to Wikileaks? Second, although the transatlantic transfer rate is too slow to fit some time stamps, is it possible that the data were hacked onto a local computer that was under the control of some faraway agent?

Jeff Harrison , March 13, 2019 at 11:12 am

Not quite. FAT is the crappy storage system developed by Microsoft (and not used by UNIX). The metadata associated with any file gets rewritten when it gets moved. If that movement is to a storage device that uses FAT, the timestamp on the file will end in an even number. If it were moved to a unix server (and most of the major servers run Unix) it would be in the UFS (unix file system) and it would be the actual time from the system clock. Every storage device has a utility that tells it where to write the data and what to write. Since it's writing to a storage device using FAT, it'll round the numbers. To get to your real question, yes, you could hack and then transfer the data to a thumb drive but if you did that the dates wouldn't line up.

Skip Scott , March 14, 2019 at 8:05 am

Jeff-

Which dates wouldn't line up? Is there a history of metadata available, or just metadata for the most recent move?

David G , March 13, 2019 at 12:22 pm

Marc asks: "[D]oes the analysis distinguish whether the DNC data were directly transferred to a thumb drive, or whether the data were hacked and then transferred to a thumb drive, eg, to give a copy to Wikileaks?"

I asked that question in comments under a previous CN piece; other people have asked that question elsewhere.

To my knowledge, it hasn't been addressed directly by the VIPS, and I think they should do so. (If they already have, someone please enlighten me.)

Skip Scott , March 13, 2019 at 1:07 pm

I am no computer wiz, but Binney has repeatedly made the point that the NSA scoops up everything. If there had been a hack, they'd know it, and they wouldn't only have had "moderate" confidence in the Jan. assessment. I believe that although farfetched, an argument could be made that a Russian spy got into the DNC, loaded a thumb drive, and gave it to Craig Murray.

David G , March 13, 2019 at 3:31 pm

Respectfully, that's a separate point, which may or may not raise issues of its own.

But I think the question Marc posed stands.

Skip Scott , March 14, 2019 at 7:59 am

Hi David-

I don't see how it's separate. If the NSA scoops up everything, they'd have solid evidence of the hack, and wouldn't have only had "moderate" confidence, which Bill Binney says is equivalent to them saying "we don't have squat". They wouldn't even have needed Mueller at all, except to possibly build a "parallel case" due to classification issues. Also, the FBI not demanding direct access to the DNC server tells you something is fishy. They could easily have gotten a warrant to examine the server, but chose not to. They also purposely refuse to get testimony from Craig Murray and Julian Assange, which rings alarm bells on its own.

As for the technical aspect of Marc's question, I agree that I'd like to see Bill Binney directly answer it.

[Mar 17, 2019] VIPS- Mueller's Forensics-Free Findings

Highly recommended!
Mar 13, 2019 | Consortiumnews

The final Mueller report should be graded "incomplete," says VIPS, whose forensic work proves the speciousness of the story that DNC emails published by WikiLeaks came from Russian hacking.

MEMORANDUM FOR: The Attorney General

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Mueller's Forensics-Free Findings

Executive Summary

Media reports are predicting that Special Counsel Robert Mueller is about to give you the findings of his probe into any links and/or coordination between the Russian government and individuals associated with the campaign of President Donald Trump. If Mueller gives you his "completed" report anytime soon, it should be graded "incomplete."

Major deficiencies include depending on a DNC-hired cybersecurity company for forensics and failure to consult with those who have done original forensic work, including us and the independent forensic investigators with whom we have examined the data. We stand ready to help.

We veteran intelligence professionals (VIPS) have done enough detailed forensic work to prove the speciousness of the prevailing story that the DNC emails published by WikiLeaks came from Russian hacking. Given the paucity of evidence to support that story, we believe Mueller may choose to finesse this key issue and leave everyone hanging. That would help sustain the widespread belief that Trump owes his victory to President Vladimir Putin, and strengthen the hand of those who pay little heed to the unpredictable consequences of an increase in tensions with nuclear-armed Russia.

There is an overabundance of "assessments" but a lack of hard evidence to support that prevailing narrative. We believe that there are enough people of integrity in the Department of Justice to prevent the outright manufacture or distortion of "evidence," particularly if they become aware that experienced scientists have completed independent forensic study that yield very different conclusions. We know only too well -- and did our best to expose -- how our former colleagues in the intelligence community manufactured fraudulent "evidence" of weapons of mass destruction in Iraq.

We have scrutinized publicly available physical data -- the "trail" that every cyber operation leaves behind. And we have had support from highly experienced independent forensic investigators who, like us, have no axes to grind. We can prove that the conventional-wisdom story about Russian-hacking-DNC-emails-for-WikiLeaks is false. Drawing largely on the unique expertise of two VIPS scientists who worked for a combined total of 70 years at the National Security Agency and became Technical Directors there, we have regularly published our findings. But we have been deprived of a hearing in mainstream media -- an experience painfully reminiscent of what we had to endure when we exposed the corruption of intelligence before the attack on Iraq 16 years ago.

This time, with the principles of physics and forensic science to rely on, we are able to adduce solid evidence exposing mistakes and distortions in the dominant story. We offer you below -- as a kind of aide-memoire -- a discussion of some of the key factors related to what has become known as "Russia-gate." And we include our most recent findings drawn from forensic work on data associated with WikiLeaks' publication of the DNC emails.

We do not claim our conclusions are "irrefutable and undeniable," a la Colin Powell at the UN before the Iraq war. Our judgments, however, are based on the scientific method -- not "assessments." We decided to put this memorandum together in hopes of ensuring that you hear that directly from us.

If the Mueller team remains reluctant to review our work -- or even to interview willing witnesses with direct knowledge, like WikiLeaks' Julian Assange and former UK Ambassador Craig Murray, we fear that many of those yearning earnestly for the truth on Russia-gate will come to the corrosive conclusion that the Mueller investigation was a sham.

In sum, we are concerned that, at this point, an incomplete Mueller report will fall far short of the commitment made by then Acting Attorney General Rod Rosenstein "to ensure a full and thorough investigation," when he appointed Mueller in May 2017. Again, we are at your disposal.

Discussion

The centerpiece accusation of Kremlin "interference" in the 2016 presidential election was the charge that Russia hacked Democratic National Committee emails and gave them to WikiLeaks to embarrass Secretary Hillary Clinton and help Mr. Trump win. The weeks following the election witnessed multiple leak-based media allegations to that effect. These culminated on January 6, 2017 in an evidence-light, rump report misleadingly labeled "Intelligence Community Assessment (ICA)." Prepared by "handpicked analysts" from only three of the 17 U.S. intelligence agencies (CIA, FBI, and NSA), the assessment expressed "high confidence" in the Russia-hacking-to-WikiLeaks story, but lacked so much as a hint that the authors had sought access to independent forensics to support their "assessment."

The media immediately awarded the ICA the status of Holy Writ, choosing to overlook an assortment of banal, full-disclosure-type caveats included in the assessment itself -- such as:

" When Intelligence Community analysts use words such as 'we assess' or 'we judge,' they are conveying an analytic assessment or judgment. Judgments are not intended to imply that we have proof that shows something to be a fact. Assessments are based on collected information, which is often incomplete or fragmentary High confidence in a judgment does not imply that the assessment is a fact or a certainty; such judgments might be wrong."

To their credit, however, the authors of the ICA did make a highly germane point in introductory remarks on "cyber incident attribution." They noted: "The nature of cyberspace makes attribution of cyber operations difficult but not impossible. Every kind of cyber operation -- malicious or not -- leaves a trail." [Emphasis added.]

Forensics

The imperative is to get on that "trail" -- and quickly, before red herrings can be swept across it. The best way to establish attribution is to apply the methodology and processes of forensic science. Intrusions into computers leave behind discernible physical data that can be examined scientifically by forensic experts. Risk to "sources and methods" is normally not a problem.

Direct access to the actual computers is the first requirement -- the more so when an intrusion is termed "an act of war" and blamed on a nuclear-armed foreign government (the words used by the late Sen. John McCain and other senior officials). In testimony to the House Intelligence Committee in March 2017, former FBI Director James Comey admitted that he did not insist on physical access to the DNC computers even though, as he conceded, "best practices" dictate direct access.

In June 2017, Senate Intelligence Committee Chair Richard Burr asked Comey whether he ever had "access to the actual hardware that was hacked." Comey answered, "In the case of the DNC we did not have access to the devices themselves. We got relevant forensic information from a private party, a high-class entity, that had done the work. " Sen. Burr followed up: "But no content? Isn't content an important part of the forensics from a counterintelligence standpoint?" Comey: "It is, although what was briefed to me by my folks is that they had gotten the information from the private party that they needed to understand the intrusion by the spring of 2016."

The "private party/high-class entity" to which Comey refers is CrowdStrike, a cybersecurity firm of checkered reputation and multiple conflicts of interest, including very close ties to a number of key anti-Russian organizations. Comey indicated that the DNC hired CrowdStrike in the spring of 2016.

Given the stakes involved in the Russia-gate investigation – including a possible impeachment battle and greatly increased tension between Russia and the U.S. -- it is difficult to understand why Comey did not move quickly to seize the computer hardware so the FBI could perform an independent examination of what quickly became the major predicate for investigating election interference by Russia. Fortunately, enough data remain on the forensic "trail" to arrive at evidence-anchored conclusions. The work we have done shows the prevailing narrative to be false. We have been suggesting this for over two years. Recent forensic work significantly strengthens that conclusion.

We Do Forensics

Recent forensic examination of the Wikileaks DNC files shows they were created on 23, 25 and 26 May 2016. (On June 12, Julian Assange announced he had them; WikiLeaks published them on July 22.) We recently discovered that the files reveal a FAT (File Allocation Table) system property. This shows that the data had been transferred to an external storage device, such as a thumb drive, before WikiLeaks posted them.

FAT is a simple file system named for its method of organization, the File Allocation Table. It is used for storage only and is not related to internet transfers like hacking. Were WikiLeaks to have received the DNC files via a hack, the last modified times on the files would be a random mixture of odd-and even-ending numbers.

Why is that important? The evidence lies in the "last modified" time stamps on the Wikileaks files. When a file is stored under the FAT file system the software rounds the time to the nearest even-numbered second. Every single one of the time stamps in the DNC files on WikiLeaks' site ends in an even number.

We have examined 500 DNC email files stored on the Wikileaks site. All 500 files end in an even number -- 2, 4, 6, 8 or 0. If those files had been hacked over the Internet, there would be an equal probability of the time stamp ending in an odd number. The random probability that FAT was not used is 1 chance in 2 to the 500th power. Thus, these data show that the DNC emails posted by WikiLeaks went through a storage device, like a thumb drive, and were physically moved before Wikileaks posted the emails on the World Wide Web.

This finding alone is enough to raise reasonable doubts, for example, about Mueller's indictment of 12 Russian intelligence officers for hacking the DNC emails given to WikiLeaks. A defense attorney could easily use the forensics to argue that someone copied the DNC files to a storage device like a USB thumb drive and got them physically to WikiLeaks -- not electronically via a hack.

Role of NSA

For more than two years, we strongly suspected that the DNC emails were copied/leaked in that way, not hacked. And we said so. We remain intrigued by the apparent failure of NSA's dragnet, collect-it-all approach -- including "cast-iron" coverage of WikiLeaks -- to provide forensic evidence (as opposed to "assessments") as to how the DNC emails got to WikiLeaks and who sent them. Well before the telling evidence drawn from the use of FAT, other technical evidence led us to conclude that the DNC emails were not hacked over the network, but rather physically moved over, say, the Atlantic Ocean.

Is it possible that NSA has not yet been asked to produce the collected packets of DNC email data claimed to have been hacked by Russia? Surely, this should be done before Mueller competes his investigation. NSA has taps on all the transoceanic cables leaving the U.S. and would almost certainly have such packets if they exist. (The detailed slides released by Edward Snowden actually show the routes that trace the packets.)

The forensics we examined shed no direct light on who may have been behind the leak. The only thing we know for sure is that the person had to have direct access to the DNC computers or servers in order to copy the emails. The apparent lack of evidence from the most likely source, NSA, regarding a hack may help explain the FBI's curious preference for forensic data from CrowdStrike. No less puzzling is why Comey would choose to call CrowdStrike a "high-class entity."

Comey was one of the intelligence chiefs briefing President Obama on January 5, 2017 on the "Intelligence Community Assessment," which was then briefed to President-elect Trump and published the following day. That Obama found a key part of the ICA narrative less than persuasive became clear at his last press conference (January 18), when he told the media, "The conclusions of the intelligence community with respect to the Russian hacking were not conclusive as to how 'the DNC emails that were leaked' got to WikiLeaks.

Is Guccifer 2.0 a Fraud?

There is further compelling technical evidence that undermines the claim that the DNC emails were downloaded over the internet as a result of a spearphishing attack. William Binney, one of VIPS' two former Technical Directors at NSA, along with other former intelligence community experts, examined files posted by Guccifer 2.0 and discovered that those files could not have been downloaded over the internet. It is a simple matter of mathematics and physics.

There was a flurry of activity after Julian Assange announced on June 12, 2016: "We have emails relating to Hillary Clinton which are pending publication." On June 14, DNC contractor CrowdStrike announced that malware was found on the DNC server and claimed there was evidence it was injected by Russians. On June 15, the Guccifer 2.0 persona emerged on the public stage, affirmed the DNC statement, claimed to be responsible for hacking the DNC, claimed to be a WikiLeaks source, and posted a document that forensics show was synthetically tainted with "Russian fingerprints."

Our suspicions about the Guccifer 2.0 persona grew when G-2 claimed responsibility for a "hack" of the DNC on July 5, 2016, which released DNC data that was rather bland compared to what WikiLeaks published 17 days later (showing how the DNC had tipped the primary scales against Sen. Bernie Sanders). As VIPS reported in a wrap-up Memorandum for the President on July 24, 2017 (titled "Intel Vets Challenge 'Russia Hack' Evidence)," forensic examination of the July 5, 2016 cyber intrusion into the DNC showed it NOT to be a hack by the Russians or by anyone else, but rather a copy onto an external storage device. It seemed a good guess that the July 5 intrusion was a contrivance to preemptively taint anything WikiLeaks might later publish from the DNC, by "showing" it came from a "Russian hack." WikiLeaks published the DNC emails on July 22, three days before the Democratic convention.

As we prepared our July 24 memo for the President, we chose to begin by taking Guccifer 2.0 at face value; i. e., that the documents he posted on July 5, 2016 were obtained via a hack over the Internet. Binney conducted a forensic examination of the metadata contained in the posted documents and compared that metadata with the known capacity of Internet connection speeds at the time in the U.S. This analysis showed a transfer rate as high as 49.1 megabytes per second, which is much faster than was possible from a remote online Internet connection. The 49.1 megabytes speed coincided, though, with the rate that copying onto a thumb drive could accommodate.

Binney, assisted by colleagues with relevant technical expertise, then extended the examination and ran various forensic tests from the U.S. to the Netherlands, Albania, Belgrade and the UK. The fastest Internet rate obtained -- from a data center in New Jersey to a data center in the UK -- was 12 megabytes per second, which is less than a fourth of the capacity typical of a copy onto a thumb drive.

The findings from the examination of the Guccifer 2.0 data and the WikiLeaks data does not indicate who copied the information to an external storage device (probably a thumb drive). But our examination does disprove that G.2 hacked into the DNC on July 5, 2016. Forensic evidence for the Guccifer 2.0 data adds to other evidence that the DNC emails were not taken by an internet spearphishing attack. The data breach was local. The emails were copied from the network.

Presidential Interest

After VIPS' July 24, 2017 Memorandum for the President, Binney, one of its principal authors, was invited to share his insights with Mike Pompeo, CIA Director at the time. When Binney arrived in Pompeo's office at CIA Headquarters on October 24, 2017 for an hour-long discussion, the director made no secret of the reason for the invitation: "You are here because the President told me that if I really wanted to know about Russian hacking I needed to talk with you."

Binney warned Pompeo -- to stares of incredulity -- that his people should stop lying about the Russian hacking. Binney then started to explain the VIPS findings that had caught President Trump's attention. Pompeo asked Binney if he would talk to the FBI and NSA. Binney agreed, but has not been contacted by those agencies. With that, Pompeo had done what the President asked. There was no follow-up.

Confronting James Clapper on Forensics

We, the hoi polloi, do not often get a chance to talk to people like Pompeo -- and still less to the former intelligence chiefs who are the leading purveyors of the prevailing Russia-gate narrative. An exception came on November 13, when former National Intelligence Director James Clapper came to the Carnegie Endowment in Washington to hawk his memoir. Answering a question during the Q&A about Russian "hacking" and NSA, Clapper said:

" Well, I have talked with NSA a lot And in my mind, I spent a lot of time in the SIGINT business, the forensic evidence was overwhelming about what the Russians had done. There's absolutely no doubt in my mind whatsoever." [Emphasis added]

Clapper added: " as a private citizen, understanding the magnitude of what the Russians did and the number of citizens in our country they reached and the different mechanisms that, by which they reached them, to me it stretches credulity to think they didn't have a profound impact on election on the outcome of the election."

(A transcript of the interesting Q&A can be found here and a commentary on Clapper's performance at Carnegie, as well as on his longstanding lack of credibility, is here .)

Normally soft-spoken Ron Wyden, Democratic senator from Oregon, lost his patience with Clapper last week when he learned that Clapper is still denying that he lied to the Senate Intelligence Committee about the extent of NSA surveillance of U.S. citizens. In an unusual outburst, Wyden said: "James Clapper needs to stop making excuses for lying to the American people about mass surveillance. To be clear: I sent him the question in advance. I asked him to correct the record afterward. He chose to let the lie stand."

The materials brought out by Edward Snowden in June 2013 showed Clapper to have lied under oath to the committee on March 12, 2013; he was, nevertheless, allowed to stay on as Director of National Intelligence for three and half more years. Clapper fancies himself an expert on Russia, telling Meet the Press on May 28, 2017 that Russia's history shows that Russians are "typically, almost genetically driven to co-opt, penetrate, gain favor, whatever."

Clapper ought to be asked about the "forensics" he said were "overwhelming about what the Russians had done." And that, too, before Mueller completes his investigation.

For the steering group, Veteran Intelligence Professionals for Sanity:

Veteran Intelligence Professionals for Sanity (VIPS) is made up of former intelligence officers, diplomats, military officers and congressional staffers. The organization, founded in 2002, was among the first critics of Washington's justifications for launching a war against Iraq. VIPS advocates a US foreign and national security policy based on genuine national interests rather than contrived threats promoted for largely political reasons. An archive of VIPS memoranda is available at Consortiumnews.com.

image_pdf image_print 9280

Tags: Bill Binney Donald Trump Hillary Clinton James Clapper James Comey Mike Pompeo Robert Mueller Veteran Intelligence Professional for Sanity VIPS WikiLeaks


[Feb 16, 2019] Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA

Feb 16, 2019 | disobedientmedia.com

Paul E. Merrell, J.D. , May 31, 2018 at 4:53 am

Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA: https://disobedientmedia.com/2018/05/guccifer-2-0s-american-fingerprints-reveal-an-operation-made-in-the-usa/

[Jan 14, 2019] The Russia Hoax The Illicit Scheme to Clear Hillary Clinton and Frame Donald Trump by Gregg Jarrett

The books does not answer the key question: if it was not Russian influence, who of forign powers tried to influence the election: GB, Israel, Saudi, or all three. We have solid evidence of interference of British intelligence services into the election. Which means May government interference.
Also important to understand that FBI from the very beginning was apolitical tool. Nothing new here.
This dirty political witch hunt has one major goal to cement the cracks in neoliberal society that appear after 2008 Financial crash. This attempt failed and Pateigenosse Mueller is unable to change that. Confidence in the ruling neoliberal oligarchy collapsed and problem with the inequality laid now bare.
Jan 14, 2019 | www.amazon.com

KB from Illinois 5.0 out of 5 stars Very detailed. Raises many questions about politically motivated investigations. September 14, 2018 Format: Kindle Edition Verified Purchase

My interest in this book occurred by chance. Over the past couple years reading news stories on sites like Yahoo News I sensed a very overt stance against President Trump. It appeared very obvious to me, but I wanted some confirmation whether these views may have validity, or perhaps not. So I started to investigate other opinions via some of the conservative talk radio shows. Up until this time, I rarely listened to them. One was the Sean Hannity Show and Gregg Jarrett was sitting in for Sean on one of the shows. He mentioned his book and I thought it sounded interesting. My basic assumption even prior to reading this book was I never felt there was any illegal Trump/Russian collusion in our recent election. I couldn't see how it would ever be done in such a way that would actually affect the voting outcome (other than if it were some kind of ballot box type fraud). So I had doubts about all the related investigations. When this book was mentioned I figured it would offer some factual information to help me understand the investigations better. It did accomplish that. And much more awareness.

One of the major items about this book is that it is well researched and documented. This made me feel somewhat comfortable about its content. There is so much misinformation making its rounds today that knowing what is truthful and what isn't can become a real guessing game. I could even ask 'Did Mr. Jarrett fabricate his sources'? At this point I will go on faith that they are real.

Based on that assumption, he presents a very hard case about the Russian collusion investigation as not being quite what the U.S.A. people are being led to believe by the media outlets. So much so, I hope this book could be a catalyst for other investigations (assuming that isn't already being planned). As summarized in this book, a major point is about federal investigative departments having integrity in performing their duties, and doing so legally and without prejudice or political partisanship. This book does raise some real concerns.

The author states at the end of the book "The people who should read this book, probably won't". Unfortunately he is probably correct. As a country we seem so divided today politically. It is my impression that anti-Trumpers will probably not want to acknowledge any conflicting thoughts or facts to their beliefs. But this book could be a great exercise in broadening one's knowledge regarding the investigations on Trump. It would show a different viewpoint than that being touted by much of the media, and has the facts backing it up. At the very least, it can provide some food for thought.

Grady T. Birdsong 5.0 out of 5 stars Tells the honest truth about corruption in our Government November 23, 2018 Format: Hardcover Verified Purchase

As Gregg Jarrett states in the Epilogue of this book, "The people who should read this book, probably won't... they are intellectually dishonest in believing that the president must have committed some crime in connection with Russia...There was never any plausible evidence that Trump or his campaign collaborated with Russia to win the presidency... Comey's scheme to trigger the appointment of his friend as special counsel was a devious maneuver by an unscrupulous man..."
As many of these events unfolded I have watched closely and performed my own "tests of reasonableness" from facts presented. Utilizing logic and common sense I often wondered if I was missing something? What crystal ball would have predicted that Donald Trump would run for the presidency? One example: The press told us he had been a political asset for many years and had been exchanging Intel with the Russians...
Then I heard about this book, purchased it and began reading it... I could hardly put it down... The information in it is astonishing! It is all to clear now...
Jarrett has researched, compiled and formatted an almost air-tight legal case (within this book) for prosecuting these "weasels." The astonishing levels of corruption and crimes committed by those in the highest levels of the DOJ and FBI are unprecedented. He has compiled an extraordinary amount of source information to back up his many claims throughout the book. I am totally perplexed that our so-called leaders in Congress are allowing this abuse to go unpunished... baffling? This disgraceful abuse of power documented by Jarrett will come back to haunt us! A well written expose by Mr. Jarrett!

E. Christine Hess 5.0 out of 5 stars Mueller, Rosenstein & the members of the Special Council SHOULD be on trial! November 24, 2018 Format: Hardcover Verified Purchase

Gregg Jarrett's research leaves NO DOUBT that drastic action needs to be taken to hold these people- PRETENDING to represent the law- accountable & end their "assassination" tactics on our tax dollar.
This is not Halloween, not a play. This is REALITY with our laws running amok!
And our Congress - our elected officials, supposedly servants of We, the People, - is not taking action?
How is this possible?

Amazon Customer 5.0 out of 5 stars The deep bias rooted in the Deep State, better known now as The Swamp October 8, 2018 Format: Hardcover Verified Purchase

Incredibly well researched and well written book which explains methodically in an easy to read style the undeniable deep seated bias against President Trump at the highest levels of the Department of Justice and the FBI. They tried to first prevent him from being elected by exonerating Hillary Clinton of a long list of crimes committed during her tenure as Secretary of State and then smearing him with a politically motivated fake "Dossier". When that didn't work, they have tried to undermine his presidency from the start with an equally politically motivated Special Prosecutor investigating "Collusion with Russia" in an investigation which had no crime to investigate from the start. A must read for all Americans.

Andrew Maile 5.0 out of 5 stars A very informative, but yet digestible, read........ September 30, 2018 Format: Hardcover Verified Purchase

This author writes with a very smooth, easy, but detailed style. The book brings in much law for the reader to digest, but, somehow, does not get a reader tangled up in the weeds. As for the thrust of the book: A detailed 'tick tock' of the day by day events that have taken America to the point we are today on this entire question of Trump, Russia, and the 2016 election.
This book really is vivid proof that the 'deep state' does emphatically exist. Not as a structure or organization with secret meetings,rituals or handshakes. But as a mentality, or common political/social view of government, stemming from the longevity of bureaucracy to feel invulnerable to popular will because of their simple edict that 'we'll still be here after you're long gone'. And from this, these bureaucrats build liaisons with favoring political elites that lead to deep, hidden, obscure --shall we say 'deep state'-- actions to pervert the popular will for the ends of a few.
This book vividly displays why bureaucrats (whose lifeblood is to promote more government) so turn their collective hand to supporting Democrats, the party of government. Yates covering for Comey and the blackmailing of Gen. Flynn, Comey leaking to a friend in Academia that provokes the appointment of his (Comey's) close associate --indeed, his mentor-- Robert Mueller. Senior bureaucrats (McCabe, Strzok) playing inside baseball to maneuver themselves for promotion in the expected new (Democratic) administration that they so much support and wish for. Indeed friendships with FISA judges to assure bogus warrants can be obtained against political enemies.
Where money and power are traded as coin of the realm in a way that is so antiseptic and hidden. Nobody says 'How much money will it take'; instead it's 'I can help you fund raise'. Rod Blagojevich was foolish enough to call a bribe a bribe...well, he's in jail, but Strzok's wife isn't.
It just goes on and on................it's simple corruption!!! And the band plays on......the human comedy continues........

JG Kuhl 5.0 out of 5 stars How about a media complicity sequel? September 3, 2018 Format: Kindle Edition Verified Purchase

Excellent detailed and researched book that simply amazes me. Lynch, Comey, Clinton, Stzrok, Orr, Rosenstein, McCabe, Reid and Brennen all worked seamlessly to install Hillary and have a backup plan B to lay the groundwork to impeach Trump in case she doesn't make it. All under the oversight of Obama. Neat trick, but what follows is even more orchestrated: MEDIA COMPLICITY! You can't pull this off unless you have the full cooperation willingly or otherwise of: NBC, CBS, NPR, ABC, MSNBC, and most of all CNN, the New York Times, and Washington Post! Here's where the real story lies. The media and the Democrat party are simpatico, joint at the brain and mouth and one other orifice. This is the real story that Jarrett only pays passing attention to. Sequel maybe, I hope so. Jon Kuhl Papillion, NE & New England

Amazon Customer 5.0 out of 5 stars The Deep State Is Real September 14, 2018 Format: Kindle Edition Verified Purchase

This book is very thorough and completely exposes the Deep State. If there were any doubts about the conspiracy to depose President Trump before reading this book, there certainly aren't any afterwards. After reading the book, I am very disappointed and discouraged to find that our government has such liars and criminals in the FBI, the DOJ, and the Congress. I have completely lost any confidence I had in the U.S. government and will never believe in it again, unless there is a complete house-cleaning in the FBI and the DOJ.

S. Martin Shelton 4.0 out of 5 stars This attack to undermine our democracy is unparalleled in the history of our republic. October 1, 2018 Format: Hardcover Verified Purchase

Jarrett pens a comprehensive review of the Deep State's inordinate fraud on our Constitution -- perhaps the greatest attack on our constitutional republic in the history of our country. He writes in clear and empathetic style. His narrative evolves in a coherent and logical progression that details the conspirators' skullduggery in an "ABC" type of progression. He cites exactly who violated the relevant federal statute and why and how it was violated. Unfortunately, as of 30 September 2018 -- the date I'm preparing the review -- none of the miscreants have been indicted even though the documentation of evidence is ponderous.

Larry A. Whited 4.0 out of 5 stars One Less than Five Stars August 8, 2018 Format: Hardcover Verified Purchase

Gregg Jarrett's study -- and that is what this book is, a study -- covers two main aspects of recent history. First and foremost it is an in-depth look at the tactics and forces arrayed against President Trump. Intertwined with this comes by necessity a parallel look at Hillary Clinton's tenure as Secretary of State, her presidential run, as well as a broader look at the activities of the Clintons with the nearly full support of those same forces that are now aligned against the presidency of Donald Trump. The nature of the often overlapping issues and the personnel involved has resulted in a fair amount of repetition of key points. This was not a lazy attempt to achieve a book-length manuscript, as Jarrett's original copy by his own admission in the acknowledgments was a hefty 100,000 words before the publisher encouraged him to trim things down.

It is unfortunate that this book will be dismissed by so many who are unwilling to understand and accept that the pervasive high-level animosity against President Trump has evolved into a direct and active threat against our country -- and this threat is compounded by a complicit media that is eager to pounce. The rule of law has been twisted and contorted if not completely abandoned. Trump is the primary target, but whether by design or happenstance it is the U.S. Constitution that is being the most assaulted. The danger of this cannot be overemphasized -- we are at a critical crossroads. Gregg Jarret understands this and was motivated to bring this truth to light. He is no sycophant of President Trump. His loyalty is to the rule of law and to our Constitution rather than to political agendas on either side.

I withheld one star because a great opportunity was lost. This book will never appear in classrooms, and it will likely be stocked in few law libraries. It most certainly should be, and it needs to be read and studied. The flagrant abuses of power by the DOJ, the FBI, and others need to be brought out into a bright light and the corruption purged. As a people we need to get our head out of the sand and realize what has been going on behind closed doors -- our future is most definitely at stake. The lost opportunity that I am alluding to comes down to the expressed (albeit well deserved) disdain and disgust that Gregg Jarrett now has towards those who are participating in this hoax that he has so thoroughly revealed. I fear even the preface itself will turn away those who most need to read this book.

What will be perceived as bias before the facts are presented and developed will allow or even cause those who need to read this book to close their minds, giving them the excuse they want to dismiss the evidence. If strictly the evidence and history had alone been presented with Jarrett's (again, well-deserved) animosity being held in check and edited out, then perhaps this book could have become a classic for later generations to study assuming that we survive these perilously subversive times. I did the math, and there are 771 supporting references -- an average of 70 per chapter -- documenting Jarrett's research, plus 12 references even in the epilogue. Obviously, we are not talking about willfully blind opinion with no basis in fact.

The antagonists who post their 1-star reviews with almost all of them having obviously never read the book (Re. few verified purchases) reveal a dangerous willful ignorance that they are happy to embrace. Their mindset should concern us all.

[Jan 06, 2019] DNC Emails--A Seth Attack Not a Russian Hack by Publius Tacitus

CIApedia story is a complete fabrication. And there might be connection between Seth murder and Avan brothers.
Notable quotes:
"... Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange ..."
"... While the content of these documents remain classified for now, they may provide documentary proof that Seth Rich "dropped boxed" the emails to Julian. If these documents are declassified, a big hole could be blown in the claim that Russia hacked the DNC. ..."
"... Is it really plausible that the perps would kill one person, fail to get anything of value from the homicide, then say "Oh shucks, that didn't work, won't do that again."? ..."
"... Yet there is no discussion of this of which I am aware, and the Wikipedia editors controlling the Wikipedia page for the murder of Seth Rich absolutely prohibit discussion, even on their "Talk Page" of such questions. E.g., their deletion of the question I asked here, under the heading "Why the "conspiracy theory" pejorative?" (which resulted in not only being deleted but a "Sanction" against me for daring to ask the question). ..."
"... CIA/NSA is already watching wikileaks due to Manning, etc) and "sees' that Rich has passed files. ..."
"... Intel filters up to Obama, Brennan, NSA people, Clinton and others that Rich has passed info to Wikileaks and then wikileaks announces and publishes the material. ..."
"... The DNC + Obama and other leftist deep staters concoct the Russian hacking meme to distract from the content of the material as well as to begin discredit Trump (and perhaps even develop a means of deposing him should he actually be elected). ..."
"... There is a connection between Seth and the Pakistani guy who had free rein with a lot of dem congresspeople's computers!!! His protector, Lil Debbie WS!!! There is a Podesta email where he states something to the effect that the person be taught a lesson as an example, guilty or not! ..."
Oct 23, 2018 | turcopolier.typepad.com

If Russia had actually "hacked" the DNC emails then the National Security Agency would have had proof of such activity. In fact, the NSA could have tracked such activity. But they did not do that. That lack of evidence did not prevent a coordinated media campaign from spinning up to pin the blame on Russia for the "theft" and to portray Donald Trump as Putin's lackey and beneficiary.

Any effort to tell an alternative story has met with stout opposition. Fox News, for example, came under withering fire after it published an article in May 2017 claiming that Seth Rich, a young Democrat operative, had leaked DNC emails to Julian Assange at Wikileaks. The family of Seth Rich reacted with fury and sued Fox, Malia Zimmerman and Ed Butowsky, but that suit subsequently was dismissed.

Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange.

While the content of these documents remain classified for now, they may provide documentary proof that Seth Rich "dropped boxed" the emails to Julian. If these documents are declassified, a big hole could be blown in the claim that Russia hacked the DNC.


Keith Harbaugh , 2 months ago

There is a local angle to the Seth Rich murder story I have not seen discussed. Consider:
But the circumstances and facts surrounding the murder were strange. Seth was shot in the back. Nothing was taken from his body -- not his watch, not his wallet and not his credit cards.

The story promulgated by the MSM and Wikipedia is that the Washington DC MPD believe the crime was a botched robbery.

But attempted robberies are not normally a unique event. If it was a botched robbery, it seems almost certain that the perpetrator(s) would, having failed in this attempt, try again to execute a robbery.

And use the same MO (modus operandi). But I have seen no reports of other such homicide/robbery combinations. If this was truly a unique event, how would that be possible? Is it really plausible that the perps would kill one person, fail to get anything of value from the homicide, then say "Oh shucks, that didn't work, won't do that again."? There certainly are reports of serial robberies in Washington. Very hard to believe this is an exception.

Yet there is no discussion of this of which I am aware, and the Wikipedia editors controlling the Wikipedia page for the murder of Seth Rich absolutely prohibit discussion, even on their "Talk Page" of such questions. E.g., their deletion of the question I asked here, under the heading "Why the "conspiracy theory" pejorative?" (which resulted in not only being deleted but a "Sanction" against me for daring to ask the question).

Eric Newhill , 2 months ago
PT,

So is the theory, more or less, that

  1. As a Sanders supporter, Rich was appalled by how the DNC screwed Sanders (and maybe some other things he learned also contributed to his decision to engage in espionage against the DNC)
  2. Rich decides to expose DNC corruption.
  3. Rich downloads the files locally and then passes them to wikileaks.
  4. CIA/NSA is already watching wikileaks due to Manning, etc) and "sees' that Rich has passed files.
  5. Intel filters up to Obama, Brennan, NSA people, Clinton and others that Rich has passed info to Wikileaks and then wikileaks announces and publishes the material.
  6. The DNC + Obama and other leftist deep staters concoct the Russian hacking meme to distract from the content of the material as well as to begin discredit Trump (and perhaps even develop a means of deposing him should he actually be elected).
  7. Rich is the wild card. He could confess that he did it all by himself - and he could create a spectacle by explaining why.
  8. 8. They kill Rich to remove the only serious threat to their nefarious plot....?
Larry McDonald , 2 months ago
"Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange."

What's your source?

Publius Tacitus -> Larry McDonald , 2 months ago
The source is the letter that the lawyer, Ty Clevenger, received from the NSA. I have seen the letter.
Pat Lang Mod -> Larry McDonald , 2 months ago
You don't really expect him to tell you, do you?
KatieWeddington -> Larry McDonald , 2 months ago
Letter has been released. http://lawflog.com/?attachm...
Walrus , 2 months ago
Another case of "Arkancide"?
jnewman -> Walrus , 2 months ago
Vince Foster?
Pat Lang Mod -> Walrus , 2 months ago
The Serb?
amuncat -> Walrus , 2 months ago
There is a connection between Seth and the Pakistani guy who had free rein with a lot of dem congresspeople's computers!!! His protector, Lil Debbie WS!!! There is a Podesta email where he states something to the effect that the person be taught a lesson as an example, guilty or not!

[Jan 02, 2019] The malware sample claimed to Russian in DNC "hack" is actually appear to be Ukrainian and was possible planted by Crowstrike to implicate Russians

Notable quotes:
"... War or the threat of war is needed to distract attention from rapidly devolving societal bonds and immense economic inequality. ..."
Jan 02, 2019 | www.moonofalabama.org

Partisan , Feb 21, 2018 3:38:27 AM | link

https://www.wordfence.com/blog/2016/12/russia-malware-ip-hack/

Conclusion regarding IP address data: What we're seeing in this IP data is a wide range of countries and hosting providers. 15% of the IP addresses are Tor exit nodes. These exit nodes are used by anyone who wants to be anonymous online, including malicious actors.

Overall Conclusion: The IP addresses that DHS provided may have been used for an attack by a state actor like Russia. But they don't appear to provide any association with Russia. They are probably used by a wide range of other malicious actors, especially the 15% of IP addresses that are Tor exit nodes.

The malware sample is old, widely used and appears to be Ukrainian. It has no apparent relationship with Russian intelligence and it would be an indicator of compromise for any website.

WJ , Feb 21, 2018 6:38:11 AM | link
War or the threat of war is needed to distract attention from rapidly devolving societal bonds and immense economic inequality.
JC , Feb 21, 2018 9:20:58 AM | link
Interesting, too, that the Dark State appears to be sending out talking points this week to the effect that the alleged hacking of the DNC is an "act of war." IfI'm not mistaken, the US recently revised war policy to include cyber attacks, whether they actually happened or not, as being the same as a kinetic attack. Looks to me like we are seeing the beginning of a long-term pysop/PR campaign to build support for a "preemptive" strike against Russia and China that would, presumably, include nukes.

[Dec 20, 2018] One of the two CrowdStrike executives that had helped push the story to the press was a former department director at the FBI serving under Robert Mueller

Notable quotes:
"... (discovered in 2017 and 2018 but largely ignored by the press), ..."
Dec 20, 2018 | disobedientmedia.com

The CrowdStrike Connection

CrowdStrike is a high-profile cybersecurity firm that worked with the DNC (Democratic National Committee) in 2016 and was called in due to a suspected breach. However, CrowdStrike appears to have first started working with the DNC approximately five weeks prior to this and approximately just five days after John Podesta (Hillary Clinton's campaign manager for the 2016 election) had his Gmail account phished. Nothing was mentioned about this until after the five weeks had passed when the DNC published a press release stating that CrowdStrike had been at the DNC throughout that period to investigate the NGP-VAN issues (that had occurred three months before Podesta was phished).

Upon conclusion of those five weeks, CrowdStrike was immediately called back in to investigate a suspected breach. CrowdStrike's software was already installed on the DNC network when the DNC emails were acquired but CrowdStrike failed to prevent the emails from being acquired and didn't publish logs or incident-specific evidence of the acquisition event either, the latter of which is odd considering what their product's features were advertised to be even if they were just running it in a monitoring capacity .

There are additional questions to be asked about why Guccifer 2.0 went to the effort he did to fabricate Russian-themed evidence (discovered in 2017 and 2018 but largely ignored by the press), bizarrely supporting some of the most significant claims made by CrowdStrike just one day earlier.

If Mueller's attribution of Guccifer 2.0 to the GRU is correct, why would the GRU want to fabricate evidence to support CrowdStrike's allegations against Russia when another one of CrowdStrike's directors conceded they had no hard evidence at the time? This issue has not yet been adequately explained.

All of these oddities are relevant because one of the two CrowdStrike executives that had helped push the story to the press was a former department director at the FBI serving under Robert Mueller , and, judging on the fact they were dining together at an executive retreat after that individual had retired , it would seem that they are friends too.

[Dec 20, 2018] Forensicator Guccifer 2.0 Returns To The East Coast by Elizabeth Lea Vos

Once is happenstance. Twice is coincidence. Three times is enemy action. ~ Ian Fleming
Notable quotes:
"... We believe that in all three cases Guccifer 2 was unlikely to anticipate that this Eastern timezone setting could be derived from the metadata of the documents that he published. However, one vocal critic with significant media reach objected to our East Coast finding as it related to our analysis of the ngpvan .7z file. This critic concluded instead that Guccifer 2 deliberately planted that clue to implicate a DNC worker who would die under suspicious circumstances a few days later on July 10, 2016. ..."
"... Now, we have this additional East Coast indication, which appears just one day after the ngpvan.7z files were collected. This new East Coast indication is found in a completely different group of files that Guccifer 2 published on his blog site. Further, this East Coast finding has its own unique and equally unlikely method of derivation. ..."
"... If we apply our critic's logic, what do we now conclude? That Guccifer 2 also deliberately planted this new East Coast indication? To what end? We wonder: Will this new evidence compel our out-spoken critic to retract his unsubstantiated claims and accusations? ..."
Dec 20, 2018 | www.zerohedge.com
Elizabeth Lea Vos Tue, 12/18/2018 - 22:43 45 SHARES

Via Disobedient Media.

Editorial Note: The Forensicator recently published a report, titled " Guccifer 2 Returns To The East Coast ." Forensicator provided the following introduction to his latest findings, reproduced here with the permission of the author.

In this post, we announce a new finding that confirms our previous work and is the basis for an update that we recently made to Guccifer 2's Russian Breadcrumbs . In our original publication of that report, we posited that there were indications of a GMT+4 timezone offset (legacy Moscow DST) in a batch of files that Guccifer 2 posted on July 6, 2016. At the time, we viewed that as a "Russian breadcrumb" that Guccifer 2 intentionally planted.

Now, based on new information, we have revised that conclusion: The timezone offset was in fact GMT-4 (US Eastern DST) . Here, we will describe how we arrived at this new, surprising conclusion and relate it to our prior work.

A month/so after publication, Stephen McIntyre ( @ClimateAudit ) replicated our analysis. He ran a few experiments and found an error in our original conclusion.

We mistakenly interpreted the last modified time that LibreOffice wrote as "2015-08-25T23:07:00Z" as a GMT time value. Typically, the trailing "Z" means " Zulu Time ", but in this case, LibreOffice incorrectly added the "Z". McIntyre's tests confirm that LibreOffice records the "last modified" time as local time (not GMT). The following section describes the method that we used to determine the timezone offset in force when the document was saved.

LibreOffice Leaks the Time Zone Offset in Force when a Document was Last Written

Modern Microsoft Office documents are generally a collection of XML files and image files. This collection of files is packaged as a Zip file. LibreOffice can save documents in a Microsoft Office compatible format, but its file format differs in two important details: (1) the GMT time that the file was saved is recorded in the Zip file components that make up the final document and (2) the document internal last saved time is recorded as local time (unlike Microsoft Word, which records it as a GMT [UTC] value).

If we open up a document saved by Microsoft Office using the modern Office file format ( .docx or .xlsx ) as a Zip file, we see something like the following.

LibreOffice , as shown below, will record the GMT time that the document components were saved. This time will display as the same value independent of the time zone in force when the Zip file metadata is viewed.

For documents saved by LibreOffice we can compare the local "last saved" time recorded in the document's properties with the GMT time value recorded inside the document (when viewed as a Zip file). We demonstrate this derivation using the file named potus-briefing-05-18-16_as-edits.docx that Guccifer 2 changed using LibreOffice and then uploaded to his blog site on July 6, 2016 (along with several other files).

Above, we calculate a time zone offset of GMT-4 (EDT) was in force, by subtracting the last saved time expressed in GMT (2016-07-06 17:10:58) from the last saved time expressed as local time (2016-07-06 13:10:57).

We've Been Here Before

The Eastern timezone setting found in Guccifer 2's documents published on July 6, 2016 is significant, because as we showed in Guccifer 2.0 NGP/Van Metadata Analysis , Guccifer 2 was likely on the East Coast the previous day, when he collected the DNC-related files found in the ngpvan.7z Zip file. Also, recall that Guccifer 2 was likely on the East Coast a couple of months later on September 1, 2016 when he built the final ngpvan.7z file.

We believe that in all three cases Guccifer 2 was unlikely to anticipate that this Eastern timezone setting could be derived from the metadata of the documents that he published. However, one vocal critic with significant media reach objected to our East Coast finding as it related to our analysis of the ngpvan .7z file. This critic concluded instead that Guccifer 2 deliberately planted that clue to implicate a DNC worker who would die under suspicious circumstances a few days later on July 10, 2016.

Further, this critic accused the Forensicator (and Adam Carter ) of using this finding to amplify the impact of Forensicator's report in an effort to spread disinformation. He implied that Forensicator's report was supplied by Russian operatives via a so-called "tip-off file." The Forensicator addresses those baseless criticisms and accusations in The Campbell Conspiracy .

Now, we have this additional East Coast indication, which appears just one day after the ngpvan.7z files were collected. This new East Coast indication is found in a completely different group of files that Guccifer 2 published on his blog site. Further, this East Coast finding has its own unique and equally unlikely method of derivation.

If we apply our critic's logic, what do we now conclude? That Guccifer 2 also deliberately planted this new East Coast indication? To what end? We wonder: Will this new evidence compel our out-spoken critic to retract his unsubstantiated claims and accusations?

Closing Thought: Once is happenstance. Twice is coincidence. Three times is enemy action. ~ Ian Fleming


tion , 12 hours ago link

It is curious how those running vpn's often don't bother appropriately setting their device time zones.

Regarding the closing thought, that was my thinking regarding the Byzantine Vegetable 'ally' at /qr in a non-American time zone who repeatedly attacked me.

Perhaps I have shared some harsh words with you and William, but I do sincerely care for your well being and my appreciation for the work you both have done remains. The Optics have been understandably difficult to swallow for many, but I hope that in your own time, you both will be willing to take another look at Q.

Q is Stephen Miller, and Q+ is POTUS.

Best Wishes to you both.

Q's tion

Bastiat , 12 hours ago link

Interesting to see Fleming -- as time goes on, it is pretty clear that he was telling us a few things about how power really works--psychopathic oligarchs with private wetworkers. Of course now we have governments competing to hire the same mercenaries -- and the uniformed mercenaries working oligarchs with government complicity.

Etymology , 21 hours ago link

In short, not a Hack by "Ruski's" a leak by an insider due to the impossibility to data transfer rates.

When will we see a rational investigation and prosecution of these criminals?

boattrash , 13 hours ago link

" When will we see a rational investigation and prosecution of these criminals? "

40 years from now, when **** gets declassified, and the Globalists up in Yanktown have accomplished their mission of destruction.

[Oct 25, 2018] DNC Emails--A Seth Attack Not a Russian Hack by Publius Tacitus

Highly recommended!
Notable quotes:
"... Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange. While the content of these documents remain classified for now, they may provide documentary proof that Seth Rich "dropped boxed" the emails to Julian. If these documents are declassified, a big hole could be blown in the claim that Russia hacked the DNC. ..."
"... Another case of "Arkancide"? ..."
"... I came to this summary today after I had turned my T.V. off since all the news is now about the "bombs" being mailed to the Clintons and Obamas. (I was afraid a story line would soon continue that the bombs were from Russia via the White House. I can no longer feel certain that anything reported in the "news" is true and wonder what part of it is made up from thin air. ..."
"... And I am sad that such a huge number of American citizens simply no longer care what is true or what is not true. They believe only what they want to believe. Mostly I am sad that Seth Rich lived and died and few seem to want to know the facts surrounding his death. ..."
"... Guccifer 2.0 was nothing but an elaborate joke. ..."
Oct 25, 2018 | turcopolier.typepad.com

Tacitus01

If Russia had actually "hacked" the DNC emails then the National Security Agency would have had proof of such activity. In fact, the NSA could have tracked such activity. But they did not do that. That lack of evidence did not prevent a coordinated media campaign from spinning up to pin the blame on Russia for the "theft" and to portray Donald Trump as Putin's lackey and beneficiary.

Any effort to tell an alternative story has met with stout opposition. Fox News, for example, came under withering fire after it published an article in May 2017 claiming that Seth Rich, a young Democrat operative, had leaked DNC emails to Julian Assange at Wikileaks. The family of Seth Rich reacted with fury and sued Fox, Malia Zimmerman and Ed Butowsky, but that suit subsequently was dismissed.

Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange. While the content of these documents remain classified for now, they may provide documentary proof that Seth Rich "dropped boxed" the emails to Julian. If these documents are declassified, a big hole could be blown in the claim that Russia hacked the DNC.


Walrus , a day ago

Another case of "Arkancide"?
jnewman -> Walrus , 12 hours ago
Vince Foster?
DianaLC , 13 hours ago
PT, thank for the very detailed description of the entire story surrounding the supposed Russian hack of the DNC emails.

I always find myself screaming at the T.V. whenever a supposed reporter mentions the supposed Russian hack of the DNC computers as if such an event is settled history.

I came to this summary today after I had turned my T.V. off since all the news is now about the "bombs" being mailed to the Clintons and Obamas. (I was afraid a story line would soon continue that the bombs were from Russia via the White House. I can no longer feel certain that anything reported in the "news" is true and wonder what part of it is made up from thin air.

And I am sad that such a huge number of American citizens simply no longer care what is true or what is not true. They believe only what they want to believe. Mostly I am sad that Seth Rich lived and died and few seem to want to know the facts surrounding his death.

Snow Flake -> Lefty , 12 hours ago
Ellipsis, linguistically? Don't you automatically add what is omitted? ... Russia had (n't) anything ...

Guccifer 2.0 was nothing but an elaborate joke.

[Sep 19, 2018] Trump Says FBI Is A Cancer In Our Country

That's a bold statement but cancerous growth is typical of any intelligence agency, especially CIA: all of them want more and more budget money and try to influence both domestic and foreign policy. That's signs of cancel.
FBI actually has dual mandate: suppressing political dissent (STASI functions) and fight with criminals and organized crime.
The fact the President does not control his own administration, especially State Department isclearly visible now. He is more like a ceremonial figura that is allowed to rant on Twitter, but can't change any thing of substance in forign policy. and Is a typucal Repiblican in domenstic policy, betraying the electorate like Obama did
Notable quotes:
"... Sessions recused himself from the "Russia Collusion" investigation. Now that it is known to have been an extension of Democratic election rigging, and DC bureaucratic "Resistance," he could be initiate a broad sweep investigation into Washington, DC based bureaucratic bias and corruption. ..."
Sep 19, 2018 | www.zerohedge.com

Shifting from Sessions to the much-maligned FBI, Trump said the agency was "a cancer" and that uncovering deep-seated corruption in the FBI may be remembered as the "crowning achievement" of his administration, per the Hill .

"What we've done is a great service to the country, really," Trump said in a 45-minute, wide-ranging interview in the Oval Office.

"I hope to be able put this up as one of my crowning achievements that I was able to ... expose something that is truly a cancer in our country."

Moreover, Trump insisted that he never trusted former FBI Director James Comey, and that he had initially planned to fire Comey shortly after the inauguration, but had been talked out of it by his aides.

Trump also said he regretted not firing former FBI Director James Comey immediately instead of waiting until May 2017, confirming an account his lawyer, Rudy Giuliani, gave Hill.TV earlier in the day that Trump was dismayed in 2016 by the way Comey handled the Hillary Clinton email case and began discussing firing him well before he became president.

"If I did one mistake with Comey, I should have fired him before I got here. I should have fired him the day I won the primaries," Trump said. "I should have fired him right after the convention, say I don't want that guy. Or at least fired him the first day on the job. ... I would have been better off firing him or putting out a statement that I don't want him there when I get there."

The FISA Court judges who approved the initial requests allowing the FBI to surveil employees of the Trump Campaign also came in for some criticism, with Trump claiming they used "poor Carter Page, who nobody even knew, and who I feel very badly for...as a foil...to surveil a candidate or the presidency of the United States." Trump added that he felt the judges had been "misled" by the FBI.

He criticizing the Foreign Intelligence Surveillance Act (FISA) court's approval of the warrant that authorized surveillance of Carter Page, a low-level Trump campaign aide, toward the end of the 2016 election, suggesting the FBI misled the court.

"They know this is one of the great scandals in the history of our country because basically what they did is, they used Carter Page, who nobody even knew, who I feel very badly for, I think he's been treated very badly. They used Carter Page as a foil in order to surveil a candidate for the presidency of the United States."

As for the judges on the secret intelligence court: "It looks to me just based on your reporting, that they have been misled," the president said, citing a series of columns in The Hill newspaper identifying shortcomings in the FBI investigation. "I mean I don't think we have to go much further than to say that they've been misled."

"One of the things I'm disappointed in is that the judges in FISA didn't, don't seem to have done anything about it. I'm very disappointed in that Now, I may be wrong because, maybe as we sit here and talk, maybe they're well into it. We just don't know that because I purposely have not chosen to get involved," Trump said.

Trump continued the assault on Sessions during a brief conference with reporters Wednesday morning. When asked whether he was planning to fire Sessions, Trump replied that "we're looking into lots of different things."

To be sure, Sessions has managed to hang on thus far. And if he can somehow manage to survive past Nov. 6, his fate will perversely rest on the Democrats' success. Basically, if they wrest back control of the Senate (which, to be sure, is unlikely), Sessions chances of staying on would rise dramatically. But then again, how much abuse can a man realistically endure before he decides that the costs of staying outweigh the benefits of leaving?


DingleBarryObummer , 19 minutes ago

Sessions works for Trump, because Trump is running the uniparty russia-gate stormy-gate anti-trump show. Sessions was intentionally placed there to stonewall and make sure the kabuki goes on. Rosenstein is a Trump appointee. This **** garners sympathy for him as the persecuted underdog, rallies his base; and distracts from the obvious zio-bankster influence over his admin and his many unfulfilled campaign promises. He's deceiving you. Why do you think Giuliani acts like such a buffoon? It's because that's what he was hired for. All distractions and bullshit. He will not get impeached, Hillary is not going to jail, nothing will happen. The zio-Banksters will continue to stay at the top of the pyramid, because that's who trump works for, NOT you and me.

"While Trump's fascination with the White House still burned within him [re: 2011], he also had The Apprentice to deal with--and it wasn't as easy as you might think. He loved doing the show and was reluctant to give it up. At one point, he was actually thinking of hosting it from the oval office if he made it all the way to the White House. He even discussed it with Stephen Burke, the CEO at NBCUniversal, telling Burke he would reconsider running if the network was concerned about his candidacy." -Roger Stone

"To some people the notion of consciously playing power games-no matter how indirect-seems evil, asocial, a relic of the past. They believe they can opt out of the game by behaving in ways that have nothing to do with power. You must beware of such people, for while they express such opinions outwardly, they are often among the most adept players at power. They utilize strategies that cleverly disguise the nature of the manipulation involved. These types, for example, will often display their weakness and lack of power as a kind of moral virtue. But true powerlessness, without any motive of self-interest, would not publicize its weakness to gain sympathy or respect. Making a show of one's weakness is actually a very effective strategy, subtle and deceptive, in the game of power." -Robert Greene

Sparkey , 31 minutes ago

This is why the 'little' people love President 'The Donald' Trump, he says the things they would like to say, but have no platform to speak from, Mushroom man The Donald has no fear he has got Mushroom power, and he has my support in what ever he does!

Secret Weapon , 43 minutes ago

Is Sessions a Deep State firewall? Starting to look that way.

TrustbutVerify , 48 minutes ago

Sessions recused himself from the "Russia Collusion" investigation. Now that it is known to have been an extension of Democratic election rigging, and DC bureaucratic "Resistance," he could be initiate a broad sweep investigation into Washington, DC based bureaucratic bias and corruption.

I suspect Sessions will last until after the mid-term elections. Then Trump will fire him and bring someone like Gowdy in to head the DOJ and to bring about investigations.

And, my gosh, there seems to be so much to investigate. And to my mind prosecute.

loop, 49 minutes ago

"I've never seen a President - I don't care who he is - stand up to them (Israel). It just boggles the mind. They always get what they want. The Israelis know what is going on all the time. I got to the point where I wasn't writing anything down. If the American people understood what a grip these people have got on our government, they would rise up in arms.

Our citizens certainly don't have any idea what goes on."

- U.S. Navy Admiral and former head of the Joint Chiefs of Staff Thomas Moorer

mendigo, 59 minutes ago

Cool stuff. But really the cancer goes much deeper. That is the scary part. Trump is now largely controlled by the Borg.

Government employees and elected officials have a choice: can either play along and become wealthy and powerful or have their careers destroyed, or worse.

[Sep 16, 2018] Looks like the key players in Steele dossier were CIA assets

Highly recommended!
'Assume, for the sake of argument, that powerful, connected people in the intelligence community and in politics worried that a wildcard Trump presidency, unlike another Clinton or Bush, might expose a decade-plus of questionable practices. Disrupt long-established money channels. Reveal secret machinations that could arguably land some people in prison.
'What exactly might an "insurance policy" against Donald Trump look like?'
All this leads me back to the suspicion that Steele's involvement may have been less in crafting the dossier, than making it possible to conceal its actual origins while giving it an appearance of credibility. It could also be the case that Nellie Ohr's sudden interest in radio transmissions had to do with communications inside the United States, rather than with Steele.
Notable quotes:
"... A great deal of evidence, I think, suggests that practically all those involved in 'Russiagate' were caught totally unprepared by Trump's victory, that they then went rushing around like headless chickens, and that part of this process involved a decision being taken to publish the dossier, without consulting British intelligence. If people like Younger were not consulted, then it would seem to me unlikely that Steele was. ..."
"... And I have immense difficulty seeing how any competent media lawyer would not have recommended, at the minimum, the redaction of the names of Aleksej Gubarev and his company from the final December 2016 memorandum. This would have made legal action unlikely, without greatly diminishing the effect of the claims. ..."
"... But if this was so, and if what they thought was accurate information was actually disinformation, the likely conduit would not have been through Steele, but from FSB cybersecurity people to their FBI counterparts. ..."
"... It it is I think material that intelligence agencies commonly include a great variety of people, ranging from very able analysts and operators to complete dolts. So, the CIA has employed both Philip Giraldi and John Brennan, MI6 both Alastair Crooke and also Christopher Steele and Alex Younger. ..."
"... It is however somewhat revealing that one now finds Giraldi and Crooke appearing on a Russian site, 'Strategic Culture Foundation', while Brennan and Younger are treated as authoritative figures by the MSM. ..."
"... My strong suspicion is that 'Russiagate' is a kind of nemesis, arising from the fact that key figures in British and American intelligence have, over a protracted period of time, got involved in intrigues where they are way out of their depth. The unintended consequences of these have meant that people like Brennan and Younger, and also Hannigan, have ended up having to resort to desperate measures to cover their backsides. ..."
"... There are many aspects to this story that don't make any sense to me if one looks at it from a rational perspective. One of course being concerns about libel litigation and the related legal discovery that you note. The second being no real contingency planning in the event Hillary loses the election. Admittedly they must have bought the media line and Nate Silver's forecast of a greater than 75% probability of a Hillary win. ..."
"... The purported "arms length" relationships don't make any sense. There's Fusion GPS and Glenn Simpson playing a central role. They hire Nellie Ohr, a possible CIA asset and the wife of Bruce Ohr, the 4th highest ranking official at the DOJ. ..."
"... Glenn Simpson also hires Christopher Steele who he knows from previous "spook" associations. Steele had numerous and continuous communications including telephone, Skype, email and personal meetings with Bruce and Nellie Ohr during all this. ..."
"... Then there is Mifsud and Halper. Apparently both are CIA and FBI assets. ..."
"... You have Brennan ginning up concerns giving super secret and individual briefings to the Gang of 8 in Congress. There's Democratic Senator Mark Warner, the minority leader on the Senate Intelligence Committee texting and calling Adam Waldman, Deripaska's US attorney about setting up clandestine meetings with Steele. ..."
"... Not to be left behind there's Sen. McCain doing the same. His top aide even travels to London to meet Steele. And then there's Strzok and his mistress Lisa Page busily spending every waking moment texting each other about every twist and turn in all the political games being played. Of course there's Admiral Rogers investigating unusual searches by FBI officials and contractors on the NSA database. And he briefs President-elect Trump at Trump Tower which prompts the entire transition team to move to Trump's golf course in NJ. ..."
"... In fact the IG report on the Clinton "investigation" states that many at the FBI were accepting "gifts" from various media personalities for a quid pro quo ..."
"... There's Rod Rosenstein, Bruce Ohr's direct boss who testifies he knew nothing about Ohr being a conduit to Strzok for Steele. Of course he knew nothing but signed the FISA application on Carter Page. ..."
"... At this point I don't buy that Christopher Steele dug up real intelligence from his contacts at the highest levels of the Russian government, which caught Brennan, Clapper, Comey and Lynch's pants on fire, who then launched a formal investigation of Russia collusion with Trump. Many things just don't pass the smell test. Now of course I have no qualifications nor experience in spookdom. ..."
"... I agree that it (and Skripalmania) are almost impossible to make sense of unless you think of a bunch of highly politicised not very bright people sinking deeper and deeper into what looked like a bright idea at the time. ..."
"... I ask because, if one tries to look at it in a non-partisan way, the Western IC seemed to be a failure when it came to predicting Russian reactions in the Donbass, the Crimea, and it seems in Syria. I link this to various comments from Colonel Lang indicating that true experts were replaced over the years by less experienced and knowledgeable people. Does being "highly politicised" mean that they're not up to much when it comes to minding the shop? ..."
"... I thought I detected a protest against the politicisation of the US in the world some years ago. And we must not forget that Gen Flynn (DIA) and Adm Rogers (NSA) acted strongly against this. Flynn was the first casualty of the Trump/Russia hysteria and the Clapper claque tried to fire Rogers. ..."
"... I was born in the Depression and have seen vitriolic politics but never have seen such a massive opposition by the media, the pundits and the establishment of both parties. Over 500 print publications endorsed Hillary. Only some 20 endorsed Trump. Yet he confounds the pundits by winning the election. Clearly many voters are at odds with the political media class. ..."
"... I think there is an ideological background to this, on which the piece by Alastair Crooke – himself former MI6 – to which Patrick Armstrong links, and the piece by James George Jatras to which Crooke links, are both to the point. The 'end of history' crowd thought they were inhabiting a realised utopia, and cannot cope with the fact that their dream is collapsing. ..."
"... In relation to the millenarian undercurrents on which Crooke focuses, however, it is also worth noting that a traditional conservative suspicion has been that millenarianism is naturally linked to antinomianism: the belief that the moral law is not binding on the elect. ..."
"... It is obviously possible that Ohr did not report up the chain of command, and if so, he and his wife become pivotal figures in the conspiracy. Alternatively, it could be that Rosenstein is lying – in which case, we have large questions about who else is implicated, and specifically whether the termination of Steele by the FBI was anything more than a ruse. ..."
"... 'Yet, Simpson allegedly acknowledged that most of the information Fusion GPS and British intelligence operative Christopher Steele developed did not come from sources inside Moscow. "Much of the collection about the Trump campaign ties to Russia comes from a former Russian intelligence officer (? not entirely clear) who lives in the U.S.," Ohr scribbled in his notes.' ..."
"... And it confirms my strong suspicion that the dossier is actually a composite product, much of it assembled at Fusion, which could indeed contain material from a range of people from the former Soviet space, who could living in the United States, Britain, or elsewhere – Ukraine and the Baltics being obvious possibilities. ..."
"... So Sergei Skripal and Sergei Millian, neither of whom fit the description by Simpson, have been mentioned as possible sources, and there is also the very curiously ambiguous role of Rinat Akhmetshin. ..."
"... All these people, obviously, could simply have fabricated material or retailed gossip, and Steele himself was involved in fabricating material on an industrial scale to cover up what actually happened to Alexander Litvinenko. ..."
"... All this leads me back to the suspicion that Steele's involvement may have been less in crafting the dossier, than making it possible to conceal its actual origins while giving it an appearance of credibility. It could also be the case that Nellie Ohr's sudden interest in radio transmissions had to do with communications inside the United States, rather than with Steele. ..."
"... Apparently that organisation is doing rather well in sustaining the claiming that 'fair report privilege' could circumvent any requirement to prove truth – and a key question now is whether documents which the DOJ is being forced to produce will establish that the dossier was being used by officials in ways that would trigger the privilege as of 10 January 2017. ..."
"... That said, what Ohr reports Simpson as telling him raises fundamental questions about how anyone could have relied upon the dossier for anything – and should push people back to actually asking hard questions about its origins. ..."
"... To add: Steele was on the FBI's payroll, in addition to being on Fusion GPS's payroll. And on the payroll of Her Majesty's Government. After he got caught leaking to the media he was apparently "fired" by the FBI. But he was continuing to communicate and brief through Bruce Ohr at the DOJ. ..."
"... I think the circle of Glenn Simpson. Chris Steele, Bruce & Nellie Ohr, Adam Waldman. Peter Strzok, and Sen. Mark Warner will be very interesting to pursue. ..."
"... The other circle that should be investigated is the Brennan, Clapper, Lynch, Comey, Yates, Susan Rice. ..."
"... No investigation can exclude the active participation of key people from the media complex including people like Comey's good friend Benjamin Wittes. ..."
"... In its original version, the 'Statement of Principles' explained, among other things, that the Society: 'Believes that only modern liberal democratic states are truly legitimate, and that any international organization which admits undemocratic states on an equal basis is fundamentally flawed.' ..."
"... Ironically, it was shortly after the publication of the dossier that Anatol Lieven published in the 'National Interest' an article entitled 'Is America Becoming a Third World Country?' (See https://nationalinterest.or... .) ..."
"... Also in June, Sergei Karaganov published a piece in 'Russia in Global Affairs', of which he is publisher, entitled 'Ideology of Eastward Turn.' ..."
"... I do not think Karaganov's article is simply a reflection of changes in Russian attitudes. The changes, it seems to me, are global. ..."
"... I do think that we in the West really blew it. In 1990, we could have said, in all humility, that our way of life (IMO the key word is pluralism) had proven more survivable. So we should welcome the others into the tent. Instead, we were right and that was that. ..."
"... Just as you're asking about the origins of the dossier I wonder if it was orchestrated or something that evolved organically? If it was orchestrated, then who was the mastermind? Did Brennan, Clapper and Come sit down and hatch it or was Simpson the brains? What is astounding is the scale. So many people involved. Were they all motivated by ideology or by the need to protect their racket? ..."
"... It seems there are many sub-plots. There's the Deripaska, Steele, Waldman, Mueller, Sen. Warner angle. Then there's the Simpson, Steele, Ohr, Strzok, Page, McCabe angle. There's also the Simpson, Steele, media reporters angle. Then there's the whole Mifsud, Halper, Carter Page, Papadopolous, Downer bit. There's the Comey, Rosenstein, Yates, Strzok FISA application piece. Then there's all the stuff happening in the UK including Hannigan's resignation as soon as Trump is elected. Of course the whole Mueller appointment and the obstruction of justice thread to tie Trump's hand. There are so many elements. Who initiated and coordinated? Was each element separate? ..."
"... Together, these methods are likely to have produced a mass of information. It is important to remember, for example, that at the time of his mysterious death on 23 March 2013 Boris Berezovsky was negotiating to return to Russia, and that his head of security, Sergei Sokolov did return, with a 'cache' of documents. ..."
"... The purpose was to demonstrate that Alexei Navalny was the instrument of a 'régime change' plot in which William Browder was acting as an agent of MI6. ..."
"... An important role in the Apelbaum piece is played by the private security company Hakluyt. A quick look at the entries on Wikipedia and Powerbase will make clear that, if there is a British 'deep state', this is likely to be at its core. ..."
"... It is against this background that on has to see a specific claim which Apelbaum makes, for which I do not think any evidence is produced, about two figures whose role in 'Russiagate' is clearly central. So Luke Harding is described as 'A Guardian reporter and a Hakluyt and Orbis contractor' (note word.) Meanwhile, Edward Baumgartner is described as 'Co-founder of Edward Austin. Contractor at Orbis and Hakluyt.' ..."
"... That Harding is corrupt, as also Sir Robert Owen's 'Inquiry' into the death of the late Alexander Litvinenko, I can prove. When Owen's report was published in January 2016, a preliminary response by me was posted here on SST, which among other things listed some of the evidence establishing that the interviews supposedly recorded with Litvinenko by Detective Inspector Brent Hyatt immediately before his death were blatant forgeries. ..."
"... In relation to that part of the evidence discussed in my January 2016 post which exposes the fumbling attempts by Steele and his colleagues to cover up the truth about when and how Litvinenko travelled into central London on the day he was supposedly killed, most of this had been among a mass of material submitted by me to the Inquiry Team, which I have e-mails to prove was read. ..."
"... Further study of Owen's report has confirmed my suspicion that a strong 'prima facie case' of conspiracy to pervert the course of justice exists against very many of those involved in it. ..."
"... At the same time, materials produced on the Russian side have confirmed my suspicion that the reason why Steele and others have been able to get away with their cover-up is that the Russian intelligence services are no more enthusiastic than their British counterparts about having anything like the whole truth about how Litvinenko lived and died made public. ..."
"... Additionally, the text itself displays an odd parallelism with his assertion regarding the Steele Dossier- that is, the likelihood of multiple authors, of diverse origins. ..."
"... My curiosity about who Apelbaum might be is reinforced by the fact that the intimations he gives about his background in his responses to comments, while not incompatible with what he has said in the past, do not sit so easily with it. ..."
"... So, questions naturally arise about Apelbaum's intelligence career, in particular, who he is likely to have been employed by, and associated with, in the past, and whether he is still involved with any of those agencies which have employed him. ..."
"... 'Also, there is a large Hakluyt/Orbis "commercial intelligence" network in the US that regularly services political and federal agencies and has the power to summon Nazgûls the likes of John Brennan. So Steele is not the new kid on the block, he has been doing this type of work long before 2016. This is also why he has such a cozy relationship with the brass at the DOJ and state.' ..."
"... This is that he, the Ukrainian nationalist former KGB person Yuri Shvets, the convicted Italian disinformation peddler Mario Scaramella, and quite possibly the sometime key FBI expert on Mogilevich, Robert 'Bobby' Levinson, were involved in trying to suggest that Mogilevich was an instrument of a plot by Putin to equip Al Qaeda with a 'mini nuclear bomb.' ..."
"... In his prepared statement, Lugovoi claimed that his supposed victim used to say that everyone in Britain were ''retards', to use the translation submitted in evidence to Owen's Inquiry, or 'idiots', to use that by RT. And according to this version, the British believed in everything that 'we' – that is, the Berezovky group – said was happening in Russia. ..."
"... Whether or not Litvinenko expressed this cynical contempt, the credulity with which the claims of the 'information operations' people around Berezovsky have been accepted – well illustrated by Owen's report and perhaps most ludicrous in Harding's journalism – makes clear it is justified. ..."
"... Perhaps then, cartoons about Trump as a puppet, with the strings pulled by another puppet representing Manafort, whose strings are in turn pulled by Putin, should be replaced by ones in which Mueller is seen as a puppet manipulated by the ghost of Boris Berezovsky. ..."
"... But that is the irony. The relationship with Berezovsky blew up in the faces of all concerned, when in the wake of the successsful corruption of the investigation into the death of Litvinenko by him and his 'information operations' people, he attempted to recoup his fortunes by suing Roman Abramovich, and got taken to pieces by Lord Sumption. ..."
"... The 'Vesti Nedeli' piece uses what Elizaveta Berezovskaya says in support of the claim that Berezovsky was murdered by British 'special forces', because he was planning to return to Russia, and he 'knew too much about them.' ..."
"... One of the things I've never understood about the Trump Dossier story is the lack of any forensic analysis of its content and style anywhere in the media, even the alt media. Who was supposed to have actually written it? Steele? The style does not match someone of his background and education, and the formatting and syntax were atrocious. The font actually varied from "report" to "report." It certainly did not give me the impression of being the product of a high-end, Belgravia consultancy. ..."
"... I wonder whether it was produced by an American of one sort or another and then "laundered" by being accorded association with the UK firm. Given that Steele just happened to be hired by the USG to help in the anti-FIFA skulduggery, he and his firm seem very much to be a concern that does dirty little jobs that need discretely to be done, though in this case, the discretion was undermined. ..."
"... Most of the memos were issued before October and Fusion/Simpson authorized Steele to release information to the FBI starting in July. The question is why the memos were released after the election when a release before the election would have been enough to sink Trump. Instead the FBI and presumably those paying Fusion on Hillarys behalf sat on it, and Comey comes out days before the election ..."
"... Kind of looks like they all wanted Trump in office and the disclosure was to give Trump the excuse needed to back track on his promises to improve relations with Russia and blame that on pressure from the Deep State and Russia Gate. ..."
"... Looking at Trumps history with Sater (FBI/CIA asset) and his political aspirations that began following his Moscow visit in 1987 it seems likely Trump has been a Deep State asset for 30 years and fed intelligence to CIA/FBI on Russian oligarchs and mafia . Indeed he may well have duped Russians into believing he was working for them when in fact it was the CIA/FBI who had the best Kompromat with US RICO laws that could have beggared him ..."
"... One thing to remember about the FBI is Sy Hersh. Hersh claims the FBI has been sitting on a report for two years that fingers murdered DNC staffer Seth Rich as the Wikileaks DNC email leaker (or one of them, at least.) ..."
"... I suspect the decision to publish the dossier was political. It was required to enable Clapper, Brennan, and others to opine on national media and create further media hysteria prior to the vote as well as to justify the counter-intelligence investigations underway. They were throwing the kitchen sink to sink Trump's electoral chances. I don't think a lot of thought was given about the legal ramifications. ..."
"... This seems to be a pattern. Leak information. Then use the leaked story to justify actions like apply for a FISA warrant or fan the media flames. ..."
"... I find it incredulous that former leaders of the intelligence and law enforcement agencies have gained paid access to powerful media platforms and they have used it to launch vicious attacks on a POTUS. ..."
"... I find it amazing that McCabe and Peter Strzok are raising hundreds of thousands of dollars on social media platforms. ..."
"... If the GOP retains the House and Jim Jordan becomes speaker, then there may be a possibility that Sessions, Rosenstein and Wray may be fired and another special counsel appointed who will then convene a grand jury. ..."
Aug 23, 2018 | turcopolier.typepad.com

My strong impression is that nobody on the British side vetted the dossier for publication. A striking feature of the early news coverage is that there appeared to be total confusion, with some of the reporting suggesting that the sources quoted wanted to hang him out to dry, others that they wanted to defend him.

An interesting aspect is that not only were anonymous sources linked to MI6 quoted on both sides of the argument -- which could have been explained by disagreements within the organisation: in different stories, not however far apart in date, its head, Sir Alex Younger, was portrayed as holding radically different views.

When CNN publicised the existence of the dossier on 10 January 2017, the same day that it was published by 'BuzzFeed', it suggested that the author was British. The following day, the WSJ named Steele.

On 13 January, Martin Robinson, UK Chief Reporter for 'Mail Online', published a report whose headlines seem worth quoting in full:

'I introduced him to my wife as James Bond': Former spy Chris Steele's friends describe a "show-off" 007 figure but MI6 bosses brand him "an idiot" for an "appalling lack of judgement" over the Trump "dirty dossier": Intelligence expert Nigel West says friend is like Ian Fleming's famous character; He said: "He's James Bond. I actually introduced him to my wife as James Bond'; Mr West says Steele dislikes Putin and Kremlin for ignoring rules of espionage; Angry spy source calls him 'idiot' and blasts decision to take on the Trump work; Current MI6 boss Sir Alex Younger is said to be livid about reputation damage.'

(See http://www.dailymail.co.uk/... . )

On 15 January, however, Kim Sengupta, Defence Editor of the 'Independent', produced a report headlined: 'Head of MI6 used information from Trump dossier in first public speech; Warnings on cyberattacks show ex-spy's work is respected.'

(See https://www.independent.co.... .)

A great deal of evidence, I think, suggests that practically all those involved in 'Russiagate' were caught totally unprepared by Trump's victory, that they then went rushing around like headless chickens, and that part of this process involved a decision being taken to publish the dossier, without consulting British intelligence. If people like Younger were not consulted, then it would seem to me unlikely that Steele was.

This leads me on to another puzzle about the dossier to which I have been having a difficulty finding a solution. Long years ago I was reasonably familiar with libel law in relation to journalism. Anyone who 'served indentures', as very many of us did in those days, had to study it. Later, I got involved in a protracted libel suit -- successfully, I hasten to add -- in relation to a programme I made, and had the sobering experience of having a top-class libel barrister requiring me to justify every assertion I had made.

In the jargon then, a crucial question when an article, or programme, was being 'vetted' before publication was whether it represented a 'fair business risk.' This involved both the technical legal issues, and also judgements as to whether people were likely to sue, and how if they did the case would be likely to pan out.

On the face of things, one would not have expected that people at 'BuzzFeed' would have gone ahead and make the dossier public, without having it 'vetted' by competent lawyers. And I have difficulty seeing how, if they did, the advice could have been to publish what they published.

I have some difficulty seeing how the advice could have been to include the memorandum with the claims about the Alfa Group oligarchs, unless either these could be seriously defended or it was assumed that contesting them effectively would involve revealing more 'dirty linen' than these wanted to see aired in public.

And I have immense difficulty seeing how any competent media lawyer would not have recommended, at the minimum, the redaction of the names of Aleksej Gubarev and his company from the final December 2016 memorandum. This would have made legal action unlikely, without greatly diminishing the effect of the claims.

Trying to make sense of why such an obvious precaution was not taken, I find myself wondering whether, in fact, the reason may have been that the people responsible for the dossier may have actually believed this part of it at least.

If that is so, however, the most plausible explanation I can see is that while other claims in the dossier may well be total fabrication, either by the people at Fusion and Steele or by some of their questionable contacts, this information at least did come from what Glenn Simpson, Nellie Ohr et al thought were reliable Russian government sources.

But if this was so, and if what they thought was accurate information was actually disinformation, the likely conduit would not have been through Steele, but from FSB cybersecurity people to their FBI counterparts.

I think that the cases involving Karim Baratov and Dmitri Dokuchaev and his colleagues may be much more complex than is apparent from what looks to me like patent disinformation put out both on the Western and Russian sides.

It it is I think material that intelligence agencies commonly include a great variety of people, ranging from very able analysts and operators to complete dolts. So, the CIA has employed both Philip Giraldi and John Brennan, MI6 both Alastair Crooke and also Christopher Steele and Alex Younger.

It is however somewhat revealing that one now finds Giraldi and Crooke appearing on a Russian site, 'Strategic Culture Foundation', while Brennan and Younger are treated as authoritative figures by the MSM.

If you want to get a clear picture of quite how low-grade the latter figure is, incidentally, it is worth looking at the speech to which Kim Sengupta refers.

(See https://www.sis.gov.uk/medi... .)

A favourite line of mine comes in Younger's discussion of the -- actually largely mythical -- notion of 'hybrid warfare': 'In this arena, our opponents are often states whose very survival owes to the strength of their security capabilities; the work is complex and risky, often with the full weight of the State seeking to root us out.'

Leaving aside the fact that this is borderline illiterate, what it amazing is Younger's apparent blindness to clearly unintended implications of what he writes. If indeed, the 'very survival' of the Russian state 'owes to the strength of [its] security capabilities', the conclusions, seen from a Russian point of view, would seem rather obvious: vote Putin, and give medals to Patrushev and Bortnikov.

My strong suspicion is that 'Russiagate' is a kind of nemesis, arising from the fact that key figures in British and American intelligence have, over a protracted period of time, got involved in intrigues where they are way out of their depth. The unintended consequences of these have meant that people like Brennan and Younger, and also Hannigan, have ended up having to resort to desperate measures to cover their backsides.

Posted at 01:19 PM in Habakkuk , Intelligence | Permalink

Jack , 4 days ago

David

There are many aspects to this story that don't make any sense to me if one looks at it from a rational perspective. One of course being concerns about libel litigation and the related legal discovery that you note. The second being no real contingency planning in the event Hillary loses the election. Admittedly they must have bought the media line and Nate Silver's forecast of a greater than 75% probability of a Hillary win.

The purported "arms length" relationships don't make any sense. There's Fusion GPS and Glenn Simpson playing a central role. They hire Nellie Ohr, a possible CIA asset and the wife of Bruce Ohr, the 4th highest ranking official at the DOJ.

Glenn Simpson also hires Christopher Steele who he knows from previous "spook" associations. Steele had numerous and continuous communications including telephone, Skype, email and personal meetings with Bruce and Nellie Ohr during all this. They even have discussions about Deripaska and about his visa application to visit the US. Bruce is a conduit to Strzok at FBI. Glenn Simpson also is part of these discussions with Steele and the Ohrs.

Simpson also arranges for Steele to brief "reporters" like David Corn and others at the NY Times, WaPo, WSJ, Politico and others. Then there is Mifsud and Halper. Apparently both are CIA and FBI assets. They are communicating with Carter Page and Papadopolous, who in turn is drinking and yapping with Aussie ambassador Downer.

You have Brennan ginning up concerns giving super secret and individual briefings to the Gang of 8 in Congress. There's Democratic Senator Mark Warner, the minority leader on the Senate Intelligence Committee texting and calling Adam Waldman, Deripaska's US attorney about setting up clandestine meetings with Steele. There's Sen. Harry Reid passing on the Steele "dossier" to Comey.

Not to be left behind there's Sen. McCain doing the same. His top aide even travels to London to meet Steele. And then there's Strzok and his mistress Lisa Page busily spending every waking moment texting each other about every twist and turn in all the political games being played. Of course there's Admiral Rogers investigating unusual searches by FBI officials and contractors on the NSA database. And he briefs President-elect Trump at Trump Tower which prompts the entire transition team to move to Trump's golf course in NJ.

Oh, there is also Nellie Ohr setting up ham radio to avoid detection in her communications with Steele. Then we have everyone leaking and spinning to their "cohorts" in the premier media like the NY Times, CNN and WaPo.

Comey even has his buddy a professor and ostensibly his legal counsel on the payroll of the FBI as a contractor with access to all the sensitive databases leaking to the media.

Andy McCabe has his legal counsel Lisa Page spin stories around his wife's huge campaign contributions from Clinton consigliere McAuliffe.

In fact the IG report on the Clinton "investigation" states that many at the FBI were accepting "gifts" from various media personalities for a quid pro quo.

As if all this was not enough there's AG Loretta Lynch, meeting with Bill Clinton on a tarmac ostensibly to discuss their grandkids. Not to forget there were these "unmaskings" of surveillance information by Susan Rice, Samantha Power.

There's Rod Rosenstein, Bruce Ohr's direct boss who testifies he knew nothing about Ohr being a conduit to Strzok for Steele. Of course he knew nothing but signed the FISA application on Carter Page. Then there are the FISC judges who never believed their mandate required them to verify the evidence before issuing sweeping surveillance warrants. Now all this is what I as an old farmer and winemaker have read. Those more in tune would easily add to these convoluted machinations.

I don't know how to make sense of all this. All I see is the extent of effort to prevent Donald Trump from being elected and after he won from governing. The most obvious observation is that the leadership in our law enforcement and intelligence agencies are so busy politicking spinning and leaking they have neither the time or the inclination let alone competence to do their real job for which they get paid a handsome wage and sterling benefits.

At this point I don't buy that Christopher Steele dug up real intelligence from his contacts at the highest levels of the Russian government, which caught Brennan, Clapper, Comey and Lynch's pants on fire, who then launched a formal investigation of Russia collusion with Trump. Many things just don't pass the smell test. Now of course I have no qualifications nor experience in spookdom.

If you have any speculative theories that connects some of the dots it would be my great pleasure to read.

Patrick Armstrong -> Jack , 3 days ago

I agree that it (and Skripalmania) are almost impossible to make sense of unless you think of a bunch of highly politicised not very bright people sinking deeper and deeper into what looked like a bright idea at the time.

Confident that their horse is going to win the race and that the media will cover it all up and nobody will ever hear anything about anything. Now that the unexpected happened, they're just spinning and denying faster hoping the Dems win in Nov and stop all the investigations. And, they're getting nervous wondering who's going to sell out whom next. Up and down, around and around. Gerbils -- there really isn't anything very consistent, planned or thought-out.

In this respect, this piece attempts to make sense (on a very large scale) of their panic. https://www.strategic-cultu...

English Outsider -> Patrick Armstrong , a day ago

"I agree that it (and Skripalmania) are almost impossible to make sense of unless you think of a bunch of highly politicised not very bright people sinking deeper and deeper into what looked like a bright idea at the time."

I believe your summary of what's happening is more accurate than Alastair Crooke's as set out in the article linked to.

But bright or not, what are these people in the IC doing being "highly politicised"? Does that not render them considerably less efficient?

I ask because, if one tries to look at it in a non-partisan way, the Western IC seemed to be a failure when it came to predicting Russian reactions in the Donbass, the Crimea, and it seems in Syria. I link this to various comments from Colonel Lang indicating that true experts were replaced over the years by less experienced and knowledgeable people. Does being "highly politicised" mean that they're not up to much when it comes to minding the shop?

Patrick Armstrong -> English Outsider , 5 hours ago

I thought I detected a protest against the politicisation of the US in the world some years ago. And we must not forget that Gen Flynn (DIA) and Adm Rogers (NSA) acted strongly against this. Flynn was the first casualty of the Trump/Russia hysteria and the Clapper claque tried to fire Rogers.

https://russia-insider.com/...

Jack -> Patrick Armstrong , 3 days ago

Patrick

Usually the incumbent party loses the mid-term election. The Democrats lost big in Obama's first mid-term. The Republicans won the House and gained six senators. While the punditry claims a Blue Wave and Nate Silver is giving the Dems the odds. I'm not so sure. I think the GOP will increase their majority in the Senate putting any conviction of Trump out of question.

I was born in the Depression and have seen vitriolic politics but never have seen such a massive opposition by the media, the pundits and the establishment of both parties. Over 500 print publications endorsed Hillary. Only some 20 endorsed Trump. Yet he confounds the pundits by winning the election. Clearly many voters are at odds with the political media class.

Patrick Armstrong -> Jack , 2 days ago

Yeah. My bet is that the Repubs hold onto both. 1) the economy is getting better 2) what do the Dems have to offer other than this crazy Trump/Russia thing?

Rob -> Patrick Armstrong ,