Nearly one in 10 superdelegates who voted in the Democratic presidential primaries were registered
lobbyists, according to a new report, adding some support to Bernie Sanders's claim that "the system
is rigged."
At least 63 of 712 superdelegates were registered at some point as lobbyists on the state or federal
level, according to
an analysis conducted this year by the nonpartisan, nonprofit Sunlight Foundation.
These individuals represented interests that span across big banks, healthcare insurers, the telecommunications
industry and unions, including Goldman Sachs and Planned Parenthood.
The list includes former Senate Majority Leader Tom Daschle, who is currently registered for the
healthcare insurance company Aetna, former House Minority Leader Richard Gephardt, a registered lobbyist
with the Gephardt Group and former DNC General Chairman and Pennsylvania Gov. Ed Rendell, who was
registered for Ballard Spahr LLP as recently as 2012.
Sunlight also found an additional 32 individuals it classified as "shadow lobbyists," which it
says are superdelegates who "aren't officially registered as lobbyists, but are heavily involved
in the influence industry."
This group includes the likes of former Vermont Gov. and DNC Chairman Howard Dean, who is a "senior
adviser" for Dentons, a law firm.
While the rules surrounding superdelegates for the next presidential primary will see some changes
— with Democrats agreeing to significantly reduce the number of superdelegates not bound by primary
voters — critics of superdelegate system have complained that it put the establishment in a position
to throw the 2016 Democratic nomination into Hillary Clinton's lap.
More than 600 superdelegates backed the former secretary of state, and in some cases handed her
more delegates than Sanders in states where he won a majority of the primary vote. A total of 2,383
delegates were needed to clinch the nomination.
Much of Sanders' 14-month progressive campaign to become the Democratic Party's nominee was spent
railing against a political system in which the wealthy and special interests determine the result
of the election.
"In the year 2016, with a political campaign finance system that is corrupt and increasingly controlled
by billionaires and special interests, I fear very much that, in fact, government of the people,
by the people, and for the people is beginning to perish in the United States of America," Sanders
said.
The findings of the Sunlight Foundation also show that despite a common refrain from Democrats
that Republicans are controlled by lobbyists and special interests, such as the National Rifle Association,
when it comes to delegates who are unaccountable to voters, the opposite is true. While the Republican
Party does have its own version of superdelegates, they must vote for the candidate that their state's
party members picked.
To view the Sunlight Foundation's entire list of lobbyist superdelegates,
click here.
In American politics,
a "superdelegate" is a delegate
to the Democratic
National Convention that is seated automatically and chooses for whom they want to vote. These
Democratic
Party superdelegates include distinguished party leaders and elected officials, including all
Democratic members of the House and Senate and sitting Democratic governors. Other superdelegates
are chosen during the primary season. Democratic superdelegates are free to support any candidate
for the nomination.
This contrasts with convention "pledged" delegates that are selected based on the
partyprimaries and
caucuses in each
U.S. state, in which voters
choose among candidates for the party's
presidentialnomination. Because they are
free to support anyone they want, superdelegates could potentially swing the results to nominate
a presidential candidate that did not receive the majority of votes during the primaries.
At least in name, superdelegates are not involved in the
Republican
Party nomination process. There are delegates to the
Republican
National Convention that are seated automatically, but they are limited to three per state, consisting
of the state chairsperson and two district-level committee members. Republican Party superdelegates
are obliged to vote for their state's popular vote winner under the rules of the party branch to
which they belong.[1]
Although the term superdelegate was originally coined and created to describe a type of
Democratic delegate, the term has become widely used to describe these delegates in both parties,[2]
even though it is not an official term used by either party.
... ... ...
For Democrats, superdelegates fall into two categories:
delegates seated based on other positions they hold, who are formally described (in Rule 9.A)
as "unpledged party leader and elected official delegates"[3]
(unpledged PLEO delegates); and
additional unpledged delegates selected by each state party (in a fixed predetermined number),
who are formally described (in Rule 9.B) as "unpledged add-on delegates" and who need not hold
any party or elected position before their selection as delegates.[3]
For Republicans, there are delegates in each state, consisting of the state chairman and two RNC
committee members. However, according to the RNC communications director Sean Spicer, convention
rules obligate those RNC members to vote according to the result of primary elections held in their
states.
... ... ...
Democratic Party rules distinguish pledged and unpledged delegates. Pledged delegates are selected
based on their announced preferences in the contest for the presidential nomination. In the
partyprimary elections and
caucuses in each U.S. state, voters
express their preference among the contenders for the party's nomination for
President
of the United States. Pledged delegates supporting each candidate are chosen in approximate ratio
to their candidate’s share of the vote. They fall into three categories: district-level pledged delegates
(usually by congressional
districts);[4]
at-large pledged delegates; and pledged PLEO (Party Leaders and Elected Officials) delegates.
In a minority of the states, delegates are legally required to support the candidate to whom they
are pledged.[5]
In addition to the states' requirements, the party rules state (Rule 12.J): "Delegates elected to
the national convention pledged to a presidential candidate shall in all good conscience reflect
the sentiments of those who elected them."[3]
By contrast, the unpledged PLEO delegates (Rule 9.A) are seated without regard to their presidential
preferences, solely by virtue of being current or former elected officeholders and party officials.
Many of them have chosen to announce endorsements, but they are not bound in any way. They may
support any candidate they wish, including one who has dropped out of the presidential race.[6]
The other superdelegates, the unpledged add-on delegates (Rule 9.B), who need not be PLEOs, are selected
by the state parties after some of the pledged delegates are chosen,[3]
but they resemble the unpledged PLEO delegates in being free to vote as they wish.
... ... ...
At the
2008
Democratic National Convention, superdelegates cast approximately 823.5 votes, with fractions
arising because superdelegates from
Michigan,
Florida, and
Democrats Abroad are
entitled to half a vote each. Of the superdelegates' votes, 745 are from unpledged PLEO delegates
and 78.5 are from unpledged add-on delegates, although the exact number in each category is subject
to events.
The FBI has produced 68
pages relating to a Democrat National Committee (DNC) worker who was shot dead in 2016 in
Washington, including an investigative summary that appears to suggest someone could have paid
for his death.
... The newly
released files show top Department of Justice officials met in 2018 and discussed Rich's
murder. They reviewed Rich's financial records and did not identify any unusual deposits or
withdrawals.
...One witness saw an individual walking away from the location where Rich was killed but
thought Rich was merely drunk so did not alert authorities . They realized something bad had
happened when they saw a bloodstain on the ground in the same place the following day, as well
as police tape surrounding the scene.
A person whose name was redacted took Rich's personal laptop to his house , according to one
of the newly released documents. The page also indicates that authorities were not aware if the
person deleted or changed anything on Rich's personal laptop.
The FBI came into possession of Rich's work laptop, the bureau
previously revealed .
On another page, it was said that "given [redacted] it is conceivable that an individual or
group would want to pay for his death."
"That doesn't sound like a random street robbery," Ty Clevenger, a lawyer, told The Epoch
Times.
... ... ...
The files were released this week in a lawsuit filed on behalf of Texas resident Brian
Huddleston, who Clevenger represents.
Huddleston sued the FBI after it told him it would take 8 to 10 months in June 2020 to
respond to his Freedom of Information Act request. Huddleston asked the FBI to produce all
data, documents, records, or communications that reference Seth Rich or his brother, Aaron
Rich.
A federal judge earlier this year ordered the FBI to produce documents concerning Rich by
April 23. The FBI identified 576 relevant documents but only produced 68 of them to
Huddleston.
The FBI has declined to speak about the lawsuit. Attorneys for Rich's parents did not
immediately respond to requests for comment.
The documents show that some reporting on Rich's death was wrong, such as an ABC News
report
that claimed the FBI was not involved in investigating the murder.
Clevenger said he found concerning how the government apparently does not know whether
anything was deleted from Rich's personal laptop.
The documents were largely redacted but the information that did get through "shows that
their whole narrative is falling apart," he added. "It's a step in the right direction."
The attorney plans to ask U.S. District Judge Amos Mazzant, an Obama nominee, to produce
unredacted copies for his perusal. The judge could rule that some redactions were improper.
Defendants could also face repercussions for not producing all of the documents they have
concerning Rich, including fines.
U.S. Attorney Andrea Parker, who is representing the FBI, told the judge in a court filing
this week that the bureau can only process 500 pages per month for each Freedom of Information
Act request. She asked the court to give the bureau additional time to produce all of the
relevant records.
Clevenger told the judge in a court filing this week that the private sector routinely
processes 500 pages or more per day and that the government should be afforded no more than two
weeks to produce the remaining 1,063 pages.
RiverRoad 1 hour ago
Was a reward offered for solving his murder? A robbery murder with a nice reward attached
in DC gets solved pretty quickly. Is it correct that his parents were given a million dollars
by the FBI to agree that questions re his murder are only conspiracy theory?
Buzz-Kill 11 hours ago (Edited)
WoW! The FBI does exist. Wonder when they're gonna get on the Hunter Biden investigation.
Waiting with anticipation! /s
Brazillionaire 2 hours ago
I think Chris has that scheduled for 2025 early/mid summer. But, then again, no reasonable
prosecutor...
Nelbev 12 hours ago
And PETER STRZOK was the FBI agent handling the investigation? Not an important detail to
mention in article, guess he was familiar with Seth case after his work burying the Clinton
investigation, and obvious match, best FBI agent to pick for the investigation.;
Art link https://www.documentcloud.org/documents/20690299-fbi-documents-on-seth-rich
He seems to be everywhere doesn't he?
Hillary.....Seth....Trump.....and covering up for dems and attacking repubs 100% of the
time.
LetThemEatRand 12 hours ago
Crazy conspiracy theories for f's sake. It is totally common in a robbery not to take the
guy's wallet.
williambanzai7 PREMIUM 12 hours ago
They solve all the cases involving known terrorist suspects with connections to the FBI.
But everything else is a puzzle wrapped in an enigma.
hackjealousy 12 hours ago
If only the attacker had dropped his passport at the scene.
LetThemEatRand 12 hours ago
"A person whose name was redacted took Rich's personal laptop to his house, according to
one of the newly released documents. The page also indicates that authorities were not aware
if the person deleted or changed anything on Rich's personal laptop."
Happens all the time. Wear your mask, take your jab, 9/11, WMDs.
r0mulus 11 hours ago
Yes- why exactly would anybody be handling Rich's personal laptop after he died? And why
would they need to have their name redacted?
Seth Rich's murder was a political assassination. Did John Podesta have Seth Rich
murdered?
Soloamber 12 hours ago
Are the Kennedy's gun shy ?
Podesta wanted an example .
DNC ordered hit .
Seasmoke 12 hours ago remove link
Lost all respect for the FBI.
Tinfoil Masker 12 hours ago
You mean like 58 years ago right?
r0mulus 11 hours ago
At this point, it's been at least 75 years since they deserved any respect. Probably
longer.
lwilland1012 11 hours ago
Durham? What the Hell is a John Durham?
Dr Phuckit 11 hours ago
Summed up in three words
Russia Russia Russia
Redactions don't protect the Innocent, they protect the Guilty.
And it's obvious some people at the FBI were deeply involved.
sbin 11 hours ago
Epoch times
Surprised they didn't blame China.
Almost as believable as Bellingcat Gatestone White helmets or CNN.
DNC scum had Seth Rich murdered.
messystateofaffairs 10 hours ago
FBI released? Thats for disinformation purposes not part of a search for truth.
uhland62 9 hours ago
I thought NSA saves every keystroke people make. So when Seth's keystrokes happened, there
was a computer glitch?
ClamJammer 7 hours ago
Right, but they only use that for evidence to lock up the likes of you and me, not to
expose the crimes they themselves commit. Despite being funded by the tax-payer, i dont think
a FOI request works there.
El Chapo Read 12 hours ago
About as truthful as the 9/11 Commission Report.
Spare me.
NightWriter 12 hours ago
Just like the 2020 Election verdict:
The Deep State finds the Deep State not guilty.
Mzhen 12 hours ago
The Rich murder was a subject of discussion for FBI lovebirds Peter Strzok and Lisa
Page.
Gringo Viejo 10 hours ago
5 years after the fact. What's the FBI's motive in releasing this information at this
time?
... ... ...
Soloamber 10 hours ago
The FBI motive ...They were told to .
Kanzen Saimin 9 hours ago
It's a clever tactic used by professional liars. If you can distract people for long
enough they will forget about what happened in the first place.
... ... ...
uhland62 9 hours ago
Same thing happened in Australia. What made Australia has been privatized, deregulated,
and digitized. And now we are payment slaves to a handful of global billionaires.
But today we celebrate national militarism day, Anzac Day and we get softened up by the
politicians to accept a war against China.
Rich family representative, Brad Bauman, responding to the conspiracy theorists' claim
that the FBI was investigating the case said, " The FBI is not now and has never been a party
to this investigation. "
" The FBI has indirectly denied investigating the case , which Washington police consider
a robbery gone wrong."
" Snopes.com looked
into the matter and stated: "We were able to confirm the FBI is not investigating Rich's
murder "
Kanzen Saimin 9 hours ago
Wikipedia wasn't allowed to be referenced when I attended university years ago. The
co-founder disavows it now.
Half a decade later, they still can't find their own ***.
That's the way it will stay.
sbin 12 hours ago
Barr and Dunham are looking into it.
gcjohns1971 1 hour ago
Given the sordid, lawless, partisan, and seditious history of the FBI since its founding,
why should anyone suspect their actions here are benign?
ThanksIwillHaveAnother 3 hours ago
Seth Rich supported Bernie Sanders. He saw how Hillary and Dems piped in cheers for
Hillary and detuned the real cheers for Bernie. He saw how the powers behind the curtain
manipulated Hillary into being the nominee. He sent the files to WikiLeaks. Now ask
yourself...would someone want him killed???
Chief Joesph 3 hours ago remove link
Really can't help to think Hillary Clinton had a hand in Rich's murder. Afterall, Rich
knew about her financial affairs, along with the rest of the Democratic party, and was
passing it on to Wikileaks. It also stands to reason why the Democrats would like to see
Julian Assange murdered too. Needless to say, Assange will never see any prospects for Biden
to pardon him.
But what doesn't make sense is if this murder was at the hands of someone wanting to rob
Rich, then why didn't they take his computer along with his wallet? (Neither was taken). The
Police invented that story for public consumption.
Dragon Breath 3 hours ago (Edited)
We're certain that Director Wray at the FIB is burning the midnight oil trying to solve
Seth Rich's murder, Wiener's laptop crimes, Clinton's computer server crimes, and any day now
Hunter Biden's crimes with evidence on his laptop that he "lost" at the computer repair shop.
Wray and the FIB have it all under control...
It's all under control...
DayWear 3 hours ago
"the bureau can only process 500 pages per month"
that is so laughable I can't believe the fbi attorney even agreed to say it.
MaF 33 minutes ago
500/month = 25 pages/day = 3 pages/hr.
Sounds like only 1 govidiot is doing all the "work."
fleur de lis 2 hours ago remove link
As if the FBI would even dare issue parking tickets to the DNC psychopaths whom they know
very well to be the plotters.
The FBI ain't what it used to be.
Only listen to Comey for one minute.
The FBI is just a security guard agency for whomever has the biggest checks and best
benefits.
TheySayIAmOkay 3 hours ago
Smartest criminal in DC. No traffic cams. No store cams. No gunshots. No witnesses. He
even stole stuff that wasn't there.
Vandal 2 hours ago
Yep...and the American Gestapo(FBI) is complicit in the coverup. True Deepstate kind of
stuff.
Blurb 3 hours ago
Let's see here...
The FBI would have benefited from this guy getting killed, and they're the ones
investigating the murder...
The media reports that the FBI are not investigating, which turns out to be a lie.
The FBI somehow ends up with Seth Rich's laptop, even admitting that 'someone might have
deleted something'.
The FBI won't turn over documents, many of which had redacted content.
These are the people we got glimpses of from 2016 to 2020. Now, they are back in the
shadows.
I'll just leave this here, for anyone interested in a level of detail to this case that
most people aren't aware of.
tl;dr: The FBI may have provided the guns used to kill Rich. An FBI agent's car was broken
into the night of Rich's murder, and guns were stolen. Then the FBI ****** with the
timestamps of the event to make it look like it took place after the murder, when in fact, it
took place before.
Suzy Q 3 hours ago remove link
I remember that incident of the stolen guns. Very odd circumstances surrounding that
"theft" of FBI weapons.
TheRealBilboBaggins 4 hours ago
With all the obvious wrong-doing at the FBI, did any FBI agents come forward to denounce
it? Anyone? Anyone?
True Ferris Buehler moment looking for an FBI agent to testify against criminality.
Jung 5 hours ago
It was already a long while back when Julian Assange spoke about Rich and the so-called
Clinton email scandal: justice in the USA is worse than many a banana republic (more
sophisticated). Of course it was not Russia, it was proven to be no hack at all, but a
person, likely Seth Rich. At the end of time we'll know more.
US Banana Republic 4 hours ago
Guaranteed the Deep State (and that includes the FBI), the Clintons and the DNC all had
their fingers in it. But especially Hillary.
JOHNLGALT. 5 hours ago
Never mind. JOHN DURHAM is on the job. SARC.🆗
Fat Beaver 12 hours ago (Edited)
Never anything about the female fbi officer's duty weapon stolen off the front seat of her
suv 2 blocks away from the murder site 2 hours before the murder...she was apparently
shagging up with another agent and parked in his driveway and left the gun on the front seat
with passenger side window completely open...she reported it to police 2 hours before the
murder...this was found by a private investigator about a week after the murder and
published, never to be brought up again.
Nelbev 11 hours ago
It was a .40 caliber Glock and a rifle stolen out of the FBI vehicle, but no casings found
on ground at murder site, thus it is assumed that the murder weapon was a revolver (unless
someone picked up the casings).
Nelbev 11 hours ago remove link
Some informed person at the scene could have cleaned up, but doubt it. Rich was only
wounded at scene, not dead. As I remember there was funny business at the hospital too before
he died. I do not see reporting of the bullet's caliber.
JustSayNo 10 minutes ago
I don't need to read it. I won't believe a thing the FBI says and I also don't believe
that ANY US attorney actually does the job the American taxpayer pays them to do. I've got no
faith in any US attorney and the FBI has been a joke for longer ago than they shot that guys
wife and kid out west. FBI=coverup, period. And everyone knows it.
When I want to know what really happned to Seth Rich, the ZH comments section is actually
my best source
The federal bureaucracy, including the FBI, is now part of the democrat fascist regime in
TOTAL control in washington. Long ago these bureaucrats stopped working for the public and
began focusing on their own agenda where they don't have to answer to anyone. Reality is that
washington is a national Mafioso operation demanding extortion (protection) money from the
public, they serve themselves. The scary part is they don't just demand the protection money,
they demand everyone adhere to politically correct thoughts, speech, and actions, or you'll
be destroyed by the state.
Downhill from here 4 hours ago
What is the FBI's jurisdiction to conduct the investigation? He was not a state law
enforcement officer, he was not an interstate traveler, and was not a federal employee.
TheFederalistPapers 5 hours ago
The FBI is a brand and not a law enforcement agency.
rag_house 5 hours ago
Our government has a long history of having those that commit the crime then perform an
investigation on themselves. Wouldn't be surprised one bit if that is true here.
notfeelinthebern 12 hours ago remove link
All rats lead to Rome, is what they are not saying.
El Chapo Read 11 hours ago
All roads lead to Tel Aviv.
FIFY.
Dumpster Elite 23 minutes ago remove link
The FBI....they make the KGB look like a boy scout organization. Seriously...do you TRUST
the FBI, or do you view them as an enforcement tool of the Globalists.
DeeDeeTwo 25 minutes ago
Whew, it's a good thing Trump drained the swamp and declassified everything.
Totally_Disillusioned 26 minutes ago
The FBI has released their "findings" which we all know from previous "findings" released,
they are a mix of half-truth, manufactured evidence and outright lies. With our Federal law
enforcement, we will NEVER know the truth about matters they "investigate". Several quickly
come to mind such as Russiagate, Kennedy assassination, MLK assassination, explosion Murrah
Federal Building in Oklahoma City, 9/11, Justice Anton Scalia's murder, Ruby Ridge, Dividian
Compound, as well as so many more to list.
PT 5 hours ago
Only five years late. Who knows what progress they might make in another five years?
fishpoem 16 minutes ago
A person whose name was redacted took Rich's personal laptop to his house If one follows
the bread crumbs through the forest, it will certainly lead straight to the Witch's
house.
Angelo Misterioso 19 minutes ago
Strange that not a single house on that street had any video or ring doorbell or stuff
like that...
Print
The Federal Bureau of Investigation (
FBI
) has files from the
laptop computer belonging to Seth Rich, the Democratic National Committee employee who was killed, according to a new email.
The bureau also has tens of thousands of documents mentioning Rich.
The FBI "has completed the initial search identifying approximately 50 cross-reference serials, with attachments totaling
over 20,000 pages, in which Seth Rich is mentioned," Assistant U.S. Attorney Andrea Parker wrote in the message to attorney Ty
Clevenger, who is representing a plaintiff Huddleston v. Federal Bureau of Investigation, a case dealing with a Freedom of
Information Act request to the bureau.
"FBI has also located leads that indicate additional potential records that require further searching," Parker added.
The Epoch Times confirmed the email is legitimate.
Parker, who is representing the FBI in the case, didn't respond to an email or return a voicemail.
The bureau also confirmed it has files from Rich's laptop.
"FBI is also currently working on getting the files from Seth Rich's personal laptop into a format to be reviewed," Parker
said.
The disclosure came as part of a case brought in federal court by Texas resident Brian Huddleston, who filed a Freedom of
Information Act request in April asking the FBI to produce all data, documents, records, or communications that reference Seth
Rich or his brother, Aaron Rich.
The FBI told the plaintiff in June that it would take 8 to 10 months to provide a final response to the request, prompting the
filing of the case in the U.S District Court for the Eastern District of Texas.
Rich was working for the Democratic National Committee (DNC) when he was killed in Washington in 2016. His murder remains
unsolved.
The new email bolsters a key charge in Huddleston's filing: that David Hardy, the FBI's records chief, was wrong when he said
in two affidavits that the FBI searched for records pertaining to Rich but could not find any.
Rich is pictured on a poster created by police officials to urge people with information about his murder to come forward.
(Metropolitan Police Department)
The first sign that the testimony was erroneous came earlier this year
when the nonprofit watchdog Judicial Watch received emails exchanged by FBI agent Peter Strzok and Department of Justice lawyer
Lisa Page. The production
included
several emails
mentioning Rich.
Another sign came in March, when former Assistant U.S. Attorney Deborah Sines was deposed in a separate case, Ed Butowsky v.
David Folkenflik et. al.
Sines testified that the FBI conducted an investigation into possible hacking attempts on Seth Rich's electronic accounts
following his murder. She said FBI agents examined Rich's laptop as part of the probe and that a search should uncover emails
between her and FBI personnel. She also said she met with a prosecutor and an FBI agent assigned to special counsel Robert
Mueller's team.
The FBI declined to comment, citing a policy of not commenting on pending litigation.
The judge overseeing the Huddleston case in October ordered the defense to produce documents and an index.
In the new email, the government lawyer said the FBI has made "significant progress" in searching for documents mentioning
Rich, but still has much work left, including processing the approximately 50 cross-references, undertaking some level of review
of the laptop, and completing all remaining services.
The efforts are hampered by the FBI's Freedom of Information Act office being at 50 percent of its normal workforce due to the
COVID-19 pandemic.
The government is proposing an amended schedule that would give it three more months to produce the records.
WikiLeaks
founder Julian Assange arrives at court in London on May 1, 2019. (Daniel Leal-Olivas/AFP via Getty Images)
Clevenger, Huddleston's lawyer, told The Epoch Times via email that his client is hoping to find out why the FBI was involved in
the case, and why it originally denied involvement.
"We suspect the FBI may be right that the Metropolitan Police Dept. in D.C. was responsible for investigating Seth's murder,
so that leaves a couple of likely explanations for the FBI's role: it was investigating a counterintelligence matter or a
computer crime. Either scenario would be consistent with Seth transmitting DNC emails to
Wikileaks
,"
he added, referencing a theory put forth by Fox News in 2017 in a report that was later retracted.
A federal judge overseeing the case had earlier this year requested testimony from Wikileaks' founder Julian Assange.
Rich was killed less than two weeks before WikiLeaks "released a collection of thousands of internal emails and documents
taken from the DNC servers," according to a court filing. One month after Rich's murder, Assange referenced the DNC staffer in
an
interview
with a Dutch television
reporter when discussing the dangers faced by WikiLeaks sources. On Aug. 9, 2016, WikiLeaks offered $20,000 for information about
Rich's murder. The website increased the reward to $130,000 in January 2017.
The Metropolitan Police Department (MPD) several weeks after Rich was shot dead offered a reward for information. A
spokeswoman told The Epoch Times via email that the case "remains under active investigation."
The spokeswoman declined to answer whether the FBI assisted police with its probe. "MPD remains the lead investigative agency
over this homicide," she said.
Clevenger said he thinks the timing of the email from Parker, the assistant U.S. attorney, is significant.
"Some of my colleagues suspect the Trump Administration has pushed the release, but I doubt that," he wrote. "With the
purported election of Joe Biden, the FBI brass probably think they are in the clear, and nothing will ever happen to them, so
they no longer have any reason to hide what they did."
U.S. Director of National Intelligence John Ratcliffe recently declassified information
indicating the CIA obtained intelligence in 2016 that the Russians believed the Clinton
campaign was trying to falsely associate Russia with the so-called hack of DNC computers. CIA
Director John Brennan shared the intelligence with President Obama. They knew, in other words,
that the DNC was conducting false Russian flag operation against the Trump campaign . The
following is an exclusive excerpt from The Russia Lie that tells the amazing story in
detail:
On March 19, 2016, Hillary Clinton's campaign chairman, John Podesta, surrendered his emails
to an unknown entity in a "spear phishing" scam. This has been called a "hack," but it was not.
Instead, it was the sort of flim-flam hustle that happens to gullible dupes on the
internet.
The content of the emails was beyond embarrassing. They
showed election fraud and coordination with the media against the candidacy of Bernie
Sanders. The DNC and the Clinton campaign needed a cover story.
Blaming Russia would be a handy way to deal with the Podesta emails. There was already an
existing Russia operation that could easily be retrofitted to this purpose. The problem was
that it was nearly impossible to identify the perpetrator in a phishing scheme using computer
forensic tools.
The only way to associate Putin with the emails was circumstantially.
The DNC retained a company that called itself "CrowdStrike" to provide assistance.
CrowdStrike's chief technology officer and co-founder, Dmitri Alperovitch, is an anti-Putin,
Russian expat and a senior fellow at the Atlantic
Council .
With the Atlantic Council in 2016, all roads led to Ukraine. The Atlantic Council's list of
significant contributors includes
Ukrainian billionaire Victor Pinchuk.
The Ukrainian energy company that was paying millions to an entity that was funneling large
amounts to Hunter Biden months after he was discharged from the US Navy for drug use, Burisma,
also appears prominently on the Atlantic Council's donor list.
Arseniy Yatsenyuk, the Western puppet installed in Ukraine,
visited the Atlantic Council's Washington offices to make a speech weeks after the
coup.
Pinchuk was also a
big donor (between $10 million and $20 million) to the Clinton Foundation. Back in '15, the
Wall Street Journal published an investigative
piece , " Clinton Charity Tapped Foreign Friends ." The piece was about how Ukraine was
attempting to influence Clinton by making huge donations through Pinchuk. Foreign interference,
anyone?
On June 12, 2016, WikiLeaks founder Julian Assange
announced : "We have upcoming leaks in relation to Hillary Clinton . . . We have emails
pending publication."
Two days later, CrowdStrike fed the Washington Post a
story , headlined, "Russian government hackers penetrated DNC, stole opposition research on
Trump." The improbable tale was that the Russians had hacked the DNC computer servers and got
away with some opposition research on Trump. The article quoted Alperovitch of CrowdStrike and
the Atlantic Council.
The next day, a new blog – Guccifer 2.0 – appeared on the
internet and announced:
Worldwide known cyber security company CrowdStrike announced that the Democratic National
Committee (DNC) servers had been hacked by "sophisticated" hacker groups.
I'm very pleased the company appreciated my skills so highly))) But in fact, it was easy,
very easy.
Guccifer may have been the first one who penetrated Hillary Clinton's and other Democrats'
mail servers. But he certainly wasn't the last. No wonder any other hacker could easily get
access to the DNC's servers.
Shame on CrowdStrike: Do you think I've been in the DNC's networks for almost a year and
saved only 2 documents? Do you really believe it?
Here are just a few docs from many thousands I extracted when hacking into DNC's
network.
Guccifer 2.0 posted hundreds of pages of Trump opposition research allegedly hacked from the
DNC and emailed copies to Gawker and The Smoking Gun . In raw form, the opposition research was
one of the documents obtained in the Podesta emails, with a notable difference: It was widely
reported the document now contained "
Russian fingerprints ."
The three-parenthesis formulation from the original post ")))" is the Russian version of a
smiley face used
commonly on social media. In addition, the blog's author deliberately used a Russian
VPN service visible in its emails even though there would have been many options to hide
any national affiliation.
Under the circumstances, the FBI should have analyzed the DNC computers to confirm the
Guccifer hack. Incredibly, though, the inspection was done by CrowdStrike, the same Atlantic
Council-connected private contractor paid by the DNC that had already concluded in The
Washington Post that there was a hack and Putin was behind it.
CrowdStrike would declare the "hack" to be the work of sophisticated Russian spies.
Alperovitch described it as, " skilled
operational tradecraft ."
There is nothing skilled, though, in ham-handedly disclosing a Russian identity when trying
to hide it. The more reasonable inference is that this was a set-up. It certainly looks like
Guccifer 2.0 suddenly appeared in coordination with the Washington Post 's article that
appeared the previous day.
FBI Director James Comey
confirmed in testimony to the Senate Intelligence Committee in January 2017 that the FBI's
failure to inspect the computers was unusual to say the least. "We'd always prefer to have
access hands-on ourselves if that's possible," he said.
But the DNC rebuffed the FBI's request to inspect the hardware. Comey added that the DNC's
hand-picked investigator, CrowdStrike, is "a highly respected private company."
What he did not reveal was that CrowdStrike never corroborated a hack by forensic analysis.
In testimony released in 2020, it was revealed that CrowdStrike
admitted to Congressional investigators as early as 2017 that it had no direct evidence of
Russian hacking.
CrowdStrike's president Shawn Henry testified, "There's not evidence that [documents and
emails] were actually exfiltrated [from the DNC servers]. There's circumstantial evidence but
no evidence that they were actually exfiltrated."
NEVER MISS THE NEWS THAT MATTERS
MOST
ZEROHEDGE DIRECTLY TO YOUR INBOX
Receive a daily recap featuring a curated list of must-read stories.
The circumstantial evidence was Guccifer 2.0.
This was a crucial revelation because the thousand ships of Russiagate launched upon the
positive assertion that CrowdStrike had definitely proven a Russian hack. Yet this fact was
kept from the American public for more than three years.
The reasonable inference is that the DNC was trying to frame Russia and the FBI and
intelligence agencies were going along with the scheme because of political pressure.
Those who assert that it is a "conspiracy theory" to say that CrowdStrike would fabricate
the results of computer forensic testing to create a false Russian flag should know that it was
caught doing exactly that around the time it was inspecting the DNC computers.
On Dec. 22, 2016, CrowdStrike caused an international stir when it claimed to have uncovered
evidence that Russians hacked into a Ukrainian artillery computer app to help pro-Russian
separatists. Voice of America later determined the claim
was false , and CrowdStrike retracted its finding.
Ukraine's Ministry of Defense was forced to eat crow and admit that the hacking never
happened.
If you wanted a computer testing firm to fabricate a Russian hack for political reasons in
2016, CrowdStrike was who you went out and hired.
3 Awan brothers are named by Webb : Imran, Jamal and Abid. (A 4th brother and wife of one
of the Awan's are also believed to be involved).
Originally installed in congressional positions by Greg Meeks who is widely regarded as
the most corrupt member of congress.
I will preface this discussion by stating you will find some variation in the numbers cited.
I believe that is because I quoted from stories as the case was developing. The Daily Caller
was the primary source for most of the news on the net. I tried to be as accurate as possible
with the facts quoting the sources I found. I am posting this because I want answers, it is not
a definitive work. I do, however, believe the breach is every bit as consequential as the
hillary email server and the CIA Wikileak.
I know a bunch of shills will tear me up screaming, "ya got no proof," but indulge me in a
conspiracy theory. I think the greatest disservice the MSM had managed to perpetuate is the
fallacy that other than the obvious connection of all these people there is otherwise no
connection between these events.
Let's assume for the moment that the items described here are patterns of political belief
and criminal activity. They aren't individual acts, but on going criminal conspiracies. Let's
not look at this as an isolated event. While I'm detailing the actions of the Awan brothers. I
believe, but can not prove, those action may have been perpetuated in concert with other
individuals at work in the under belly of the government. It's almost as if disparate groups
come in contact occasionally when their objectives overlap. As I stated, I have no proof of
this, but it stands to reason the flood of cyber attacks and leaks may have overlapped through
the individuals linked in the different events. For example, Debbie Wasserman Schultz was an
integral player in the DNC Hacks and also introduced the Awan brothers to Congress. Is there a
connection? Maybe, maybe not. It is not that far fetched, this has happened before, see the
Silverman
group . Silverman associated with the CPUSA and knew
Jarrett's father, Dr. James Bowman and through
three degrees of separation used by the NSA is directly connected to Valerie
Jerrett . If it is good enough for the IC to open an inquiry why can't we indulge in some
similar speculation.
• The First anomalous fact is the Media. Why have they largely ignored the issue.
Before you cyber trolls jump on me, I would like you to consider two facts. Congress deals with
very sensitive and classified material all the time. The Awan brothers could never have had a
secret clearance for any other group than Congress. There is no news story there?
• The Second error is the "smoking gun." The evidence is always covered up with a
coincidence, a cover story if you will. While I believe the politicos in D.C. are pampered
rubes, they do have a good support staff, and some have been trained to support clandestine
operations. The rest have been hammered with political optics for the entirety of their career
in D.C.. They are all trained to control optics and the dissemination of the truth.
• The Third fallacy is the "bad guy." Why does everyone think an on going criminal
conspiracy can be distilled down to a single criminal committing a crime rather than a pattern
of criminal behavior with one or more groups profiting off the criminal activities. It is best
to think of their actions like organized crime and should be prosecuted like a RICO case. An
on going criminal enterprise by an organized group or groups of conspirators.
The Media
Why hasn't the media made this the top news story to at least go along with the Russian
hack. Let's face it, the media doesn't care about the damage to the country, they only care
about their partisan agenda. If they didn't they would cover stories damaging to the DNC.
With a
$600,000,000 CIA contract you would think the Washington Post could afford an
investigative journalist or two. Perhaps CNN will take up an interest as this rabbit hole
runs deep and wide. Don't hold your breath.
Snowflakes and "journalists" can call Trump a fascist, but there is nothing connecting an
enormous breach of the United States Security Apparatus by as many as 80 Democrat members of
Congress (past and present). We rail on about the Russians and Trump without specific
allegations backed up with evidence, but the media avoids providing nightly updates about these
5 spies that have compromised congress. The answer is simple, the Awan Brothers are Muslim and
the "victims"/dupes are Dems. Dupes who in fact abused their position of responsibility to end
up being compromised by their own "trusted" staff. Several of the Congressmen involved in the
breach have gone so far as to blame the allegations on
Islamophobia .
Meeks said he was hesitant to believe the accusations against Alvi, Imran Awan and the
three other staffers, saying their background as Muslim Americans, some with ties to
Pakistan, could make them easy targets for false charges.
This story damages the narrative that Muslims are benevolent members of the government and
Dems care about the country. It really shows the depth of the progressive aims to " fundamentally transforming
the United States of America .
This is where the conspiracy theory comes in. Give me a little latitude to connect the dots,
and let's see where this trail goes...
The mainstream media seemed far more interested in obfuscating the details regarding the
Tillerson terminations than they were in covering what could be one of the most dangerous
intelligence leaks in years, of which there has been but a peep out of any major news outlet.
Captain Joseph R. John (Navy-Ret.) has stated that he believes the Muslim Brotherhood "
fifth column" has "infiltrated U.S. Government ," and if he is correct, the Awan brothers
could very well be a part of this infiltration.
The media is
90% Democrat and I would argue that in recent years the mainline Dems have gone hard left,
almost Marxist. They have an almost suicidal pact with Islamists. Where does this scandal
connect with Middle Eastern Islamists?
One might well look at the set of circumstances laid out above and see in it a scandal
that would make Watergate look like a petty break-in. One might then scratch his or her head
and wonder -- why on earth would the New York Times or the Washington Post, which
incidentally just hired John Podesta (speaking of horrendous cybersecurity!) as a columnist,
have virtually no interest in the Awans at all?
Do Carlos Slim and Jeff Bezos, one might ask, really believe they can't sell papers with
such a story to tell?
Fox News is told the employees made "unauthorized access" to the House computer
system.
Further, there were instances where House information was discovered in an external
"cloud" server. The contractors in question reportedly were sending and storing House-related
information in that off-site server.
"That violates House rules and it puts the House at risk," a source familiar with the
investigation said.
It is unclear whether the access issues exposed the House's networks to potential hackers
or spying efforts by unfriendly nations or terrorist groups, at a time when Washington is on
high alert for such cyber-activity.
Actually the last statement has been refuted. It has been alleged that Imran Awan had
achieved a privilege escalation through
Social Engineering . Essentially Imran through the political clout of the Congressional
leaders he worked for managed to convinced the Capitol Hill IT staff to escalate the Awans to
super user privileges to work on the "Congressional Machines" in violation of accepted
practices on the network. One device in particular was the Wasserman iPad compromised in the
DNC Leak. It has been also alleged they may have had Podesta's password. Since the Dems
approved the privilege escalation it is now forensically difficult to determine if the Russians
leaked the emails or the "enormously trustworthy and drunken" Awan brothers sold access to the
DNC servers.
Imran Awan bullied central IT to bend the rules for him so there wouldn't be a paper trail
about the unusually high permissions he was requesting. And their actions were not logged, so
members have no way of knowing what information they may have taken, the central IT employee
said.
After obtaining access to the Capitol server system, the Awan brothers could control all
aspects of a congressman system. They sold and configured the hardware setting permissions and
remote access to maintain the devices remotely. Essentially the keys to the kingdom. Through
congressional requests they managed to completely compromise the network. They could read
email, transfer files, install applications (i.e. key loggers). The latter reports that the
systems and network were completely compromised. Beyond that, Imran had bypassed IT key loggers
and reporting systems by gaining remote access directly to congressional computers.
The central IT staffer said any suggestion that the brothers' access didn't span the full
gamut of congressional intrigue was silly because they were the ones giving out
permissions.
The problem is that once they bypassed internal security there was no
logging of their actions . House authorities set their sights on the possibility that a
remote server had been used to transfer files off of Congressional members computers. The
investigation revealed that Imran had been
stealing money, equipment, and over charging for services . In total for almost 10 years
and almost 80 Democrat members of Congress were compromised.
This is where things go hinkey. Rather than turning the case over to the FBI the case is
turned over to U.S.C. Police. They are investigating the theft, not the data breach.
Let's state that again...
The USCP are investigation the theft of Equipment not the Loss
Of Congressional Data.
"At the request of Members of Congress, the United States Capitol Police are investigating
the actions of House IT support staff," Malecki said in a statement. "No Members are being
investigated. No arrests have been made. It should be noted that, administratively, House
staff were asked to update their security settings as a best practice. We have no further
comment on the ongoing investigation at this time."
The Bad Guy Two of the brothers, Imran and Jamal, have been linked to an emerging
security breach
The Awan brothers managed to get access to the Dems committee computers by just asking for
the passwords. In addition the Awan brothers sold the congress outrageously priced equipment
and broke into members of Congress' offices to steal equipment and or data.
Five House employees are under criminal investigation amid allegations that they stole
equipment from more than 20 member offices and accessed House IT systems without lawmakers'
knowledge.
More than 20 members were victimized by the alleged procurement scam and chiefs of staff
for the lawmakers were briefed on the matter Thursday.
The former staffer said "Jamal was always there," but Imran would only work "odd
hours."
And who is investigating this fiasco?
Where is the FBI and why have they left it to the DC police? Is it a "limited hangout"
they hope to bury by the promoting the administration's ties to Boris and Natasha?
D.C. Metro police have been brought into the investigation rather than the F.B.I at the
request of the Congressional
members involved with the Awan Brothers.
A source in the briefing said the Sergeant-at-Arms confirmed the U.S. Capitol Police is
conducting an active criminal investigation but said no arrests have been made. The source
said the FBI is not involved in the investigation.
"At the request of members of Congress, the United States Capitol Police are investigating
the actions of House IT support staff. No members are being investigated. No arrests have
been made.
Why aren't the FBI involved? I can only speculate, but it would mean that a FBI forensic
team would have to comb through all of those congressional computers to determine the extent of
the security compromise and data lost. The Dems just didn't seem up for the inconvenience of
allowing the FBI investigation to go forward.
The Awan Brothers had the keys to the kingdom. Physical security is paramount to cyber
security. If a hacker has Physical access to a machine they own it. It is the simplest hack to
conduct. The Anwar Bros had Debbie Wasserman Schultz's machine, along with Schultz, at least 80
other Dems also hired the
Awan Brothers to provide IT support at significantly higher rates than normal IT
support.
Jamal, who public records suggest is only 22 years old and first began working in the
House when he was 20, was paid nearly $160,000 a year, or three times the average House IT
staff salary, according to InsideGov, which tracks congressional salaries. Abid was paid
$161,000 and Imran $165,000.
Despite the fact that these individuals, reportedly heavily in debt, would have failed
security clearances they were able to receive top salary from Dems including members of the
intelligence panel and members of the House Committee on Foreign Affairs were among the dozens
of members who employed the suspects on a shared basis. The two committees deal with many of
the nation's most sensitive issues, information and documents, including those related to the
war on terrorism.
Debbie Wasserman-Schultz, who was shamed for the Democratic National Committee conspiracy
against Bernie Sanders, recommended the Awan Brothers for their positions and Representative
Jackie Speier asked for their TOP SECRET CLEARANCE .
frontpagemag | Last year, eight members of the House Permanent Select Committee on
Intelligence issued a demand that their staffers be granted access to top secret classified
information.
The signatories to the letter were Andre
Carson, Luis Guiterez, Jim Himes, Terri Sewell, Jackie Speier, Mike Quigley, Eric Swalwell
and Patrick Murphy. All the signatories were Democrats. Some had a history of attempting to
undermine national security.
Beyond the debt, the brothers seemed to have, they had convictions for felony traffic
offenses including
DUI . Any one of these issues are enough to prevent or revoke a security clearance for
normal folks. I guess things just work differently on Capitol Hill. The American military or
college grads are denied clearances due similar issues in their record, but not these Pakistani
brothers. Any one of these offenses would have caused me to fail my FBI background check at
work, but congress can admit anybody. Do you see a problem here? Valerie Jarrett and
Huma Abedin are
perfect examples of the double standard in the government / Congress. Staffers of any
background history can get clearances, but Dems seem to be able to prevent Trump's staff from
getting clearance. What is going on here?
Multiple small businesses and individuals went unpaid as a result of the 2012 bankruptcy.
Abid also had an unpaid line of credit of $10,000 with the congressional credit union at the
time of bankruptcy.
Abid's record includes numerous driving- and alcohol-related legal problems, including
driving with a suspended or revoked license, court records show. He was found guilty of drunk
driving a month before he started at the House, and was arrested for public intoxication a
month after his first day.
with possibly opposing goals. A felon normally commits the felony tens of times, maybe
hundreds of times before they get caught. How many times does a Coke head commit a felony
buying coke before they get caught? If they ever get caught, how many years do they get away
with the crimes before they draw the attention of the authorities. The FBI, Congress, whatever
never find the full scope of criminal activity. They may just get enough evidence to convict of
a crime, but they never convict for all the crimes committed.
What is really becoming obvious is the Democrats have irresponsibly opened our congressional
security oversight to Middle Eastern Factions. These 5 are just one group that were exposed.
Hillary had Huma, Obama had Vallery. A sharia practicing terrorist that believes in female
circumcision leading a woman's March to equality in the 21st century. There are so many
examples that one has to be purposefully obtuse to ignore the contradictions.
While the nay sayers claim you can not connect the dots it is obvious that the dots were
there for all to see and could have been connected. I would say that the deviation from
standard security practices was intentional, but Podesta's password was password123 or some
such nonsense. Who knows, our leaders may really be that incompetent. They haven't even made it
to the minimum expectations to be employed in corporate America.
I really don't know what to make of two very different groups with nothing but vaguely
similar beliefs in Marxist ideals working together. Many of the thoughts I have on the subject
are almost too extreme to believe, but the evidence is almost unavoidable. None of it makes
sense unless someone is lying about their objectives.
Two House Democrats this week fired technology staffers linked to an ongoing
criminal investigation , more than a month after the couple in question was barred from
House computer networks.
Rep. Gregory Meeks (D-N.Y.) confirmed to Politico that Hina Alvi's last day as an IT
support staffer in his office was Tuesday. Her husband, Imran Awan, was working for Rep.
Marcia Fudge (D-Ohio) as of Tuesday evening, but a spokeswoman for Fudge said midday
Wednesday that Awan was no longer an employee.
This post has been updated and corrected with new information from US Capitol Police, which
said no arrests have been made but there is an active investigation ongoing into IT staff who
were involved in an alleged procurement scam. A lawmaker briefed on the situation had told
BuzzFeed News that arrests were made.
I believe Debbie Wasserman-Schultz was getting "schtupped" by at least one of the Awan
brothers.
Consider that even under heavy scrutiny, Debbie Wasserman Schultz fought like a mama grizzly
to keep these men on the job within the government. Why would she do this for a regular IT guy
on the payroll.
As The Daily Caller continues,
Awan was banned Feb. 2, 2017, from the congressional computer network because he is a
suspect in a cybersecurity investigation, but he still had access to House facilities because
Wasserman Schultz continued to employ him.
Outside of a couple of Congressional Black Caucus holdouts, every other Congressman fired
Awan when they found out he was under investigation. The CBC fired the later. Then the day
after the crap really hit the fan, Wasserman Schultz finally fired Awan.
... Why was the laptop found in the Rayburn building, when Wasserman Schultz's office and
every other Congressman for whom Awan worked office in the Longworth building?
Remember when Wasserman Schultz used a televised May 18, 2017 congressional hearing on the
Capitol Police budget to threaten "consequences" if Chief Matthew Verderosa did not give her
the laptop.
"If a member loses equipment," it should be given back, she said.
...
She tried the "executive immunity" argument that "If I'm not under investigation,
then you can't take away my SIDE PIECE!".
A couple month's later, Wasserman Schultz tried a different approach. Now she claimed to
protect the rights of Awan and the taxpayers.
If these political criminals were in the real world, this case would be over. But they work
in the world of politics where things are murky. Who knows what Wasserman Schultz has on
somebody else, who knows something about two other people. Thus, America gets the
run-around.
Politicians fight to protect each other. Because they know if America knew how dirty most of
the were, we'd disband government entirely.
As for Wasserman Schultz, hopefully the return of the mack, Awan sheds light on her dealings
with him. Moreover, let's hope this investigation uncovers what most Americans suspect of the
Democrats. We know in our hearts they are corrupt beyond belief. So let's prove it. Again.
Judicial Watch announced today that a federal court yesterday ordered a snap
hearing after the Justice Department submitted information under seal on Friday following the
court's demand for an explanation of why no records have been produced in the ongoing legal
battle for documents about the Congressional Democrat IT (information technology) scandal
involving the Awan brothers. The hearing is set for tomorrow, January 15, at 10 am.
In November 2018, Judicial Watch filed a Freedom of Information Act (FOIA)
lawsuit against the FBI over two FOIA requests for records related to the Awan brothers (
Judicial Watch
v. U.S. Department of Justice (No. 1:18-cv-02563)).
In August 2019, the Justice Department told the court that it would begin producing records
by November 5, 2019. After producing no records, on November 13, 2019, the agency told Judicial
Watch that it was having "technical difficulties," and in a recent email claimed that
"difficulties with the production remain."
In a joint status report
filed on December 5, 2019, Judicial Watch reported to the court that the DOJ claimed in a phone
call that it was now unable to produce any records to either of the FOIA requests "because the
agency was waiting for some unspecified action by Judge [Tanya S.] Chutkan in some other matter
so as to avoid having to produce records in this case." In that same report the DOJ told the
court that Judge Chutkan is "presiding over a related sealed criminal matter" that prohibits
the government from releasing the requested FOIA information.
In a hearing last month, U.S. District Court Judge Amit P. Mehta expressed frustration and
ordered the Justice Department to explain its failure to produce records by January 10 and to
provide Judicial Watch some details about the delay. Instead, the Justice Department made its
filing under seal and has yet to provide Judicial Watch with any details about its failure to
produce records as promised to the court.
"The cover-up of the Awan Brothers Democratic IT scandal shows the FBI and DOJ's penchant
for dishonesty isn't just limited to FISA abuse," stated Judicial Watch President Tom Fitton.
"The DOJ's handling of the Awan Brothers case has long been an issue of concern and now we are
expected believe some secret investigation prevents the public from knowing the full truth
about this scandal. We are skeptical."
Imran Awan and his family were banned from the House computer network in February 2017 after
the House's top law enforcement officer wrote that Imran was "an ongoing and serious risk to
the House of Representatives, possibly threatening the integrity of our information systems,"
and that a server containing evidence had gone "missing." The inspector general said server
logs showed "unauthorized access" and procurement records were falsified.
Imran Awan was Rep. Debbie Wasserman Schultz's (D-FL) top information technology aide. Most
lawmakers fired Awan in February, but Wasserman Schultz kept him on until he was
arrested in July 2017 , trying to board a flight for Pakistan.
In July 2018, Imran Awan was given a plea deal,
and pled guilty to federal bank fraud but prosecutors found no evidence that Awan "violated
federal law with respect to the House computer systems."
The Awan brothers reportedly "were not given
background checks before being given access to highly sensitive government information and no
explanations have been given as to why." Additionally, "If they would have run this background
check it would have found out not only multiple criminal convictions, but $1 million
bankruptcy, a dozen lawsuits it would have found a whole host of major red flags and the
Democrats didn't do any of those checks."
The Awan Brothers aided former DNC chief Debbie Wasserman Schultz in making threatening voice modulated phone calls to
attorneys suing the DNC for election fraud.
Lt. Colonel Tony Schaffer told
Fox
News
that Schultz ordered the Awan Brothers to scare off the lawyers due to the threat they pose in exposing widespread
election fraud committed by the Democratic Party in 2016.
Disobedientmedia.com
reports: If substantiated, the claims may have significance for the DNC fraud lawsuit proceedings,
and add to the growing controversy surrounding the recent arrest of Imran Awan on bank fraud charges.
Jared Beck, and attorney litigating the DNC Fraud Lawsuit noted
on Twitter
:
"We take an oath to protect and defend the Constitution from all enemies, foreign and
domestic. And sadly, the domestic enemies to our voting system and our honoring of the
Constitution are right at 1600 Pennsylvania Avenue with their allies in the Congress of the
United States".
Amazing that Pelosi is suddenly aware of her duty.
Thank you karlof1 - LMFAO - coffee all over the keyboard.
Perhaps Pelosi should take her own advice and discuss this belief of hers with Debbie
Wasserman Schultz. After all Schultz promoted the Awan family spy and blackmail ring to other
members of the Democrat caucus in Congress.
Another swamp pond yet to drain, take note Barr, there is still a lot of work ahead ha ha
ha.
"... The fresh orgy of anti-Russian invective in the lickspittle media (LSM) has the feel of fin de siècle . The last four reality-impaired years do seem as though they add up to a century. And no definitive fin is in sight, as long as most people don't know what's going on. ..."
"... The LSM should be confronted: "At long last have you left no sense of decency?" But who would hear the question -- much less any answer? ..."
"... Thus the reckless abandon with which The New York Times is leading the current full-court press to improve on what it regards as Special Counsel Robert Mueller's weak-kneed effort to blame the Russians for giving us Donald Trump. The press is on, and there are no referees to call the fouls. ..."
"... Incidentally, Mueller's report apparently was insufficient, only two years in the making, and just 448 pages. The Senate committee's magnum opus took three years, is almost 1,000 pages -- and fortified. So there. ..."
"... is a good offense, and the Senate Intelligence Committee's release of its study -- call it "Mueller (Enhanced)" -- and the propaganda fanfare -- come at a key point in the Russiagate/Spygate imbroglio. It also came, curiously, as the Democratic Convention was beginning, as if the Republican-controlled Senate was sending Trump a message. ..."
"... The cognoscenti and the big fish themselves may be guessing that Trump/Barr/Durham will not throw out heavier lines for former FBI Director James Comey, his deputy Andrew McCabe, CIA Director John Brennan, and Director of National Intelligence James Clapper, for example. But how can they be sure? What has become clear is that the certainty they all shared that Hillary Clinton would be the next president prompted them not only to take serious liberties with the Constitution and the law, but also to do so without taking rudimentary steps to hide their tracks. ..."
"... The incriminating evidence is there. And as Trump becomes more and more vulnerable and defensive about his ineptness -- particularly with regard to Covid-19 -- he may summon the courage to order Barr and Durham to hook the big fish, not just minnows like Clinesmith. The neuralgic reality is that no one knows at this point how far Trump will go. To say that this kind of uncertainty is unsettling to all concerned is to say the obvious. ..."
"... None of that takes us much beyond the Mueller report and other things generally well known -- even in the LSM. Nor does the drivel about people like Paul Manafort "sharing polling data with Russians" who might be intelligence officers. That data was "mostly public" the Times itself reported , and the paper had to correct a story that the data was intended for Russian oligarchs, when it was meant for Ukrainian oligarchs instead. That Manafort was working to turn Ukraine towards the West and not Russia is rarely mentioned. ..."
"... On the Steele Dossier, the committee also missed a ruling by a British judge against Christopher Steele, labeling his dossier an attempt to help Hillary Clinton get elected. Consortium News explained back in October 2017 that both CrowdStrike and Steele were paid for by the Democratic Party and Clinton campaign to push Russiagate. ..."
"... the description of #WikiLeaks ' publishing activities by this #SenateIntelligenceCommittee 's Report appears a true #EdgarHoover 's disinformation campaign to make a legitimate media org completely radioactive ..."
"... And that's not the half of it. In September 2018, Mazzetti and his NYT colleague Scott Shane wrote a 10,000-word feature, "The Plot to Subvert an Election," trying to convince readers that the Russian Internet Research Agency (IRA) had successfully swayed U.S. opinion during the 2016 election with 80,000 Facebook posts that they said had reached 126 million Americans. ..."
"... That turned out to be a grotesquely deceptive claim. Mazzetti and Shane failed to mention the fact that those 80,000 IRA posts (from early 2015 through 2017, meaning about half came after the election), had been engulfed in a vast ocean of more than 33 trillion Facebook posts in people's news feeds – 413 million times more than the IRA posts. Not to mention the lack of evidence that the IRA was the Russian government, as Mueller claimed. ..."
"... "Liberals are embracing every negative claim about Russia just because elements of the CIA, FBI and National Security Agency produced a report last Jan. 6 that blamed Russia for 'hacking' Democratic emails and releasing them to WikiLeaks ." ..."
The New York Times is leading the full-court press to improve on what it regards as Special Counsel Robert Mueller's weak-kneed
effort to blame the Russians for giving us Donald Trump...
The fresh orgy of anti-Russian invective in the lickspittle media (LSM) has the feel of fin de siècle . The last four reality-impaired
years do seem as though they add up to a century. And no definitive fin is in sight, as long as most people don't know what's going
on.
The LSM should be confronted: "At long last have you left no sense of decency?" But who would hear the question -- much less any
answer? The corporate media have a lock on what Americans are permitted or not permitted to hear. Checking the truth, once routine
in journalism, is a thing of the past.
Thus the reckless abandon with which The New York Times is leading the current full-court press to improve on what it regards
as Special Counsel Robert Mueller's weak-kneed effort to blame the Russians for giving us Donald Trump. The press is on, and there
are no referees to call the fouls.
The recent release of a 1,000-page, sans bombshells and already out-of-date report by the Senate Intelligence Committee has provided
the occasion to "catapult the propaganda," as President George W. Bush once put it.
As the the Times 's Mark Mazzetti put it in his
article Wednesday:
"Releasing the report less than 100 days before Election Day, Republican-majority senators hoped it would refocus attention
on the interference by Russia and other hostile foreign powers in the American political process, which has continued unabated."
Mazzetti is telling his readers, soto voce : regarding that interference four years ago, and the "continued-unabated" part, you
just have to trust us and our intelligence community sources who would never lie to you. And if, nevertheless, you persist in asking
for actual evidence, you are clearly in Putin's pocket.
Incidentally, Mueller's report apparently was insufficient, only two years in the making, and just 448 pages. The Senate committee's
magnum opus took three years, is almost 1,000 pages -- and fortified. So there.
Iron Pills
Recall how disappointed the LSM and the rest of the Establishment were with Mueller's anemic findings in spring 2019. His report
claimed that the Russian government "interfered in the 2016 presidential election in sweeping and systematic fashion" via a social
media campaign run by the Internet Research Agency (IRA) and by "hacking" Democratic emails. But the evidence behind those charges
could not bear close scrutiny.
You would hardly know it from the LSM, but the accusation against the IRA was thrown out of court when the U.S. government admitted
it could not prove that the IRA was working for the Russian government. Mueller's ipse dixit did not suffice, as we
explained a year ago
in "Sic Transit Gloria Mueller."
The Best Defense
is a good offense, and the Senate Intelligence Committee's release of its study -- call it "Mueller (Enhanced)" -- and the propaganda
fanfare -- come at a key point in the Russiagate/Spygate imbroglio. It also came, curiously, as the Democratic Convention was beginning,
as if the Republican-controlled Senate was sending Trump a message.
Durham
One chief worry, of course, derives from the uncertainty as to whether John Durham, the US Attorney investigating those FBI and
other officials who launched the Trump-Russia investigation will let some heavy shoes drop before the election. Barr has said he
expects "developments in Durham's investigation hopefully before the end of the summer."
FBI attorney Kevin Clinesmith already has decided to plead guilty to the felony of falsifying evidence used to support a warrant
from the Foreign Intelligence Surveillance Court to surveillance to spy on Trump associate Carter Page. It is abundantly clear that
Clinesmith was just a small cog in the deep-state machine in action against candidate and then President Trump. And those running
the machine are well known. The president has named names, and Barr has made no bones about his disdain for what he calls spying
on the president.
The cognoscenti and the big fish themselves may be guessing that Trump/Barr/Durham will not throw out heavier lines for former
FBI Director James Comey, his deputy Andrew McCabe, CIA Director John Brennan, and Director of National Intelligence James Clapper,
for example. But how can they be sure? What has become clear is that the certainty they all shared that Hillary Clinton would be
the next president prompted them not only to take serious liberties with the Constitution and the law, but also to do so without
taking rudimentary steps to hide their tracks.
The incriminating evidence is there. And as Trump becomes more and more vulnerable and defensive about his ineptness -- particularly
with regard to Covid-19 -- he may summon the courage to order Barr and Durham to hook the big fish, not just minnows like Clinesmith.
The neuralgic reality is that no one knows at this point how far Trump will go. To say that this kind of uncertainty is unsettling
to all concerned is to say the obvious.
So, the stakes are high -- for the Democrats, as well -- and, not least, the LSM. In these circumstances it would seem imperative
not just to circle the wagons but to mount the best offense/defense possible, despite the fact that virtually all the ammunition
(as in the Senate report) is familiar and stale ("enhanced" or not).
Black eyes might well be in store for the very top former law enforcement and intelligence officials, the Democrats, and the LSM
-- and in the key pre-election period. So, the calculation: launch "Mueller Report (Enhanced)" and catapult the truth now with propaganda,
before it is too late.
No Evidence of Hacking
The "hacking of the DNC" charge suffered a fatal blow three months ago when it became known that Shawn Henry, president of the
DNC-hired cyber-security firm CrowdStrike,
admitted under oath that his firm had no evidence that the DNC emails were hacked -- by Russia or anyone else.
(YouTube)
Henry gave his testimony on Dec. 5, 2017,
but House Intelligence Committee chair Adam Schiff was able to keep it hidden until May 7, 2020.
Here's a brief taste of how Henry's testimony went: Asked by Schiff for "the date on which the Russians exfiltrated the data",
Henry replied, "We just don't have the evidence that says it actually left."
You did not know that? You may be forgiven -- up until now -- if your information diet is limited to the LSM and you believe The
New York Times still publishes "all the news that's fit to print." I am taking bets on how much longer the NYT will be able to keep
Henry's testimony hidden; Schiff's record of 29 months will be hard to beat.
Putting Lipstick on the Pig of Russian 'Tampering'
Worse still for the LSM and other Russiagate diehards, Mueller's findings last year enabled Trump to shout "No Collusion" with
Russia. What seems clear at this point is that a key objective of the current catapulting of the truth is to apply lipstick to Mueller's
findings.
After all, he was supposed to find treacherous plotting between the Trump campaign and the Russians and failed miserably. Most
LSM-suffused Americans remain blissfully unaware of this, and the likes of Pulitzer Prize winner Mazzetti have been commissioned
to keep it that way.
In Wednesday's
article , for example, Mazzetti puts it somewhat plaintively:
"Like the special counsel the Senate report did not conclude that the Trump campaign engaged in a coordinated conspiracy with
the Russian government -- a fact that the Republicans seized on to argue that there was 'no collusion'."
How could they!
Mazzetti is playing with words. "Collusion," however one defines it, is not a crime; conspiracy is.
'Breathtaking' Contacts: Mueller (Enhanced)
Mark Mazzetti (YouTube)
Mazzetti emphasizes that the Senate report "showed extensive evidence of contacts between Trump campaign advisers and people tied
to the Kremlin," and Sen. Mark Warner (D-VA), the intelligence committee's vice chairman,
said the committee report details "a breathtaking level of contacts between Trump officials and Russian government operatives
that is a very real counterintelligence threat to our elections."
None of that takes us much beyond the Mueller report and other things generally well known -- even in the LSM. Nor does the drivel
about people like Paul Manafort "sharing polling data with Russians" who might be intelligence officers. That data was "mostly public"
the Times itself
reported
, and the paper had to correct
a story that the data was intended for Russian oligarchs, when it was meant for Ukrainian oligarchs instead. That Manafort was working
to turn Ukraine towards the West and not Russia is rarely mentioned.
Recent revelations regarding the false data given the FISA court by an FBI lawyer to "justify" eavesdropping on Trump associate
Carter Page show the Senate report to be not up to date and misguided in endorsing the FBI's decision to investigate Page. The committee
may wish to revisit that endorsement -- at least.
On the Steele Dossier, the committee also missed a ruling by a British judge against Christopher Steele,
labeling his dossier an attempt to help Hillary Clinton get elected. Consortium News
explained back in October 2017 that both CrowdStrike and Steele were paid for by the Democratic Party and Clinton campaign to
push Russiagate.
Also missed by the intelligence committee was a document released by the Senate Judiciary Committee last month that
revealed that Steele's "Primary Subsource and his friends peddled warmed-over rumors and laughable gossip that Steele dressed
up as formal intelligence memos."
Smearing WikiLeaks
The Intelligence Committee report also repeats thoroughly
debunked
myths about WikiLeaks and, like Mueller, the committee made no effort to interview Julian Assange before launching its smears.
Italian journalist Stefania Maurizi, who partnered with WikiLeaks in the publication of the Podesta emails, described the report's
treatment of WikiLeaks in this Twitter thread
:
2. the description of #WikiLeaks ' publishing activities
by this #SenateIntelligenceCommittee
's Report appears a true #EdgarHoover 's disinformation
campaign to make a legitimate media org completely radioactive
3. Clearly, to describe #WikiLeaks and its publishing activities the #SenateIntelligenceCommittee's Report completely rely
on #US intelligence community+ #MikePompeo's characterisation of #WikiLeaks. There is not even any pretense of an independent
approach
4. there are also unsubstantiated claims like:
– "[WikiLeaks'] disclosures have jeopardized the safety of individual Americans and foreign allies" (p.200)
– "WikiLeaks has passed information to U.S. adversaries" (p.201)
5. it's completely false that "#WikiLeaks does not seem to weigh whether its disclosures add any public interest value" (p.200)
and any longtime media partner like me could provide you dozens of examples on how wrong this characterisation [is].
Titillating
Mazzetti did add some spice to the version of his article that dominated the two top right columns of Wednesday's Times with the
blaring headline: "Senate Panel Ties Russian Officials to Trump's Aides: G.O.P.-Led Committee Echoes Mueller's Findings on Election
Tampering."
Those who make it to the end of Mazzetti's piece will learn that the Senate committee report "did not establish" that the Russian
government obtained any compromising material on Mr. Trump or that they tried to use such materials [that they didn't have] as leverage
against him." However, Mazzetti adds,
"According to the report, Mr. Trump met a former Miss Moscow at a party during one trip in 1996. After the party, a Trump associate
told others he had seen Mr. Trump with the woman on multiple occasions and that they 'might have had a brief romantic relationship.'
"The report also raised the possibility that, during that trip, Mr. Trump spent the night with two young women who joined him
the next morning at a business meeting with the mayor of Moscow."
This is journalism?
Another Pulitzer in Store?
The Times appends a note reminding us that Mazzetti was part of a team that won a Pulitzer Prize in 2018 for reporting on Donald
Trump's advisers and their connections to Russia.
And that's not the half of it. In September 2018, Mazzetti and his NYT colleague Scott Shane wrote a 10,000-word
feature, "The Plot to Subvert an Election," trying to convince readers that the Russian Internet Research Agency (IRA) had successfully
swayed U.S. opinion during the 2016 election with 80,000 Facebook posts that they said had reached 126 million Americans.
That turned out to be a grotesquely deceptive claim. Mazzetti and Shane failed to mention the
fact that those 80,000 IRA posts (from early 2015 through 2017, meaning about half came after the election), had been engulfed
in a vast ocean of more than 33 trillion Facebook posts in people's news feeds – 413 million times more than the IRA posts. Not to
mention the lack of evidence that the IRA was the Russian government, as Mueller claimed.
In exposing that chicanery, prize-winning investigative reporter Gareth Porter
commented :
"The descent of The New York Times into this unprecedented level of propagandizing for the narrative of Russia's threat to
U.S. democracy is dramatic evidence of a broader problem of abuses by corporate media Greater awareness of the dishonesty at the
heart of the Times' coverage of that issue is a key to leveraging media reform and political change."
Nothingburgers With Russian Dressing: the Backstory
The late Robert Parry.
"It's too much; it's just too much, too much", a sedated, semi-conscious Robert Parry kept telling me from his hospital bed in
late January 2018 a couple of days before he died. Bob was founder of Consortium News .
It was already clear what Bob meant; he had taken care to see to that. On Dec. 31, 2017 the reason for saying that came in what
he titled "An Apology
& Explanation" for "spotty production in recent days." A stroke on Christmas Eve had left Bob with impaired vision, but he was able
to summon enough strength to write an Apologia -- his vision for honest journalism and his dismay at what had happened to his profession
before he died on Jan. 27, 2018. The dichotomy was "just too much".
Parry rued the role that journalism was playing in the "unrelenting ugliness that has become Official Washington. Facts and logic
no longer mattered. It was a case of using whatever you had to diminish and destroy your opponent this loss of objective standards
reached deeply into the most prestigious halls of American media."
What bothered Bob most was the needless, dishonest tweaking of the Russian bear. "The U.S. media's approach to Russia," he wrote,
"is now virtually 100 percent propaganda. Does any sentient human being read The New York Times ' or The Washington Post 's coverage
of Russia and think that he or she is getting a neutral or unbiased treatment of the facts? Western journalists now apparently see
it as their patriotic duty to hide facts that otherwise would undermine the demonizing of Putin and Russia."
Parry, who was no conservative, continued:
"Liberals are embracing every negative claim about Russia just because elements of the CIA, FBI and National Security Agency
produced a report last Jan. 6 that blamed Russia for 'hacking' Democratic emails and releasing them to WikiLeaks ."
Bob noted that the 'hand-picked' authors "evinced no evidence and even admitted that they weren't asserting any of this as fact."
It was just too much.
Robert Parry's Last Article
Peter Strzok during congressional hearing in July 2018. (Wikimedia Commons)
Bob posted his last substantive article on Dec. 13, 2017, the day after text exchanges between senior FBI officials Peter Strzok
and Lisa Page were made public. (Typically, readers of The New York Times the following day would altogether
miss the
importance of the text-exchanges.)
Bob Parry rarely felt any need for a "sanity check." Dec. 12, 2017 was an exception. He called me about the Strzok-Page texts;
we agreed they were explosive. FBI Agent Peter Strzok was on Special Counsel Robert Mueller's staff investigating alleged Russian
interference, until Mueller removed him.
Strzok reportedly was a "hand-picked" FBI agent taking part in the Jan 2017 evidence-impoverished, rump, misnomered "intelligence
community" assessment that blamed Russia for hacking and other election meddling. And he had helped lead the investigation into Hillary
Clinton's misuse of her computer servers. Page was Deputy Director Andrew McCabe's right-hand lawyer.
His Dec. 13, 2017 piece
would be his fourth related article in less than two weeks; it turned out to be his last substantive article. All three of the earlier
ones are worth a re-read as examples of fearless, unbiased, perceptive journalism. Here
are the links .
Bob began his article
on the Strzok-Page bombshell:
"The disclosure of fiercely anti-Trump text messages between two romantically involved senior FBI officials who played key
roles in the early Russia-gate inquiry has turned the supposed Russian-election-meddling "scandal" into its own scandal, by providing
evidence that some government investigators saw it as their duty to block or destroy Donald Trump's presidency.?
"As much as the U.S. mainstream media has mocked the idea that an American 'deep state' exists and that it has maneuvered to
remove Trump from office, the text messages between senior FBI counterintelligence official Peter Strzok and senior FBI lawyer
Lisa Page reveal how two high-ranking members of the government's intelligence/legal bureaucracy saw their role as protecting
the United States from an election that might elevate to the presidency someone as unfit as Trump."
Not a fragment of Bob's or other Consortium News analysis made any impact on what Bob used to call the Establishment media. As
a matter of fact, eight months later during a talk in Seattle that I titled "Russia-gate: Can You Handle the Truth?", only three
out of a very progressive audience of some 150 had ever heard of Strzok and Page.
Lest I am accused of being "in Putin's pocket," let me add the explanatory note that we Veteran Intelligence Professionals for
Sanity included in our
most explosive Memorandum for President Trump, on "Russian hacking."
Full Disclosure: Over recent decades the ethos of our intelligence profession has eroded in the public mind to the point that
agenda-free analysis is deemed well nigh impossible. Thus, we add this disclaimer, which applies to everything we in VIPS say
and do: We have no political agenda; our sole purpose is to spread truth around and, when necessary, hold to account our former
intelligence colleagues.
We speak and write without fear or favor. Consequently, any resemblance between what we say and what presidents, politicians
and pundits say is purely coincidental. The fact we find it is necessary to include that reminder speaks volumes about these highly
politicized times.
somecallmetimmah , 1 hour ago
Only brain-washed losers read the new york times. Garbage propaganda for garbage people.
AtATrESICI , 43 minutes ago
"developments in Durham's investigation hopefully before the end of the summer." What summer? The summer of 2099.
Mouldy , 1 hour ago
So in a nutshell.. They just called half the USA too stupid to make an informed decision for themselves.
ominous , 1 hour ago
the disagreement is over which half is the stupid half
homeskillet , 25 minutes ago
The MIC's bogey man. What a crock of **** this whole country has become. Pravda puts out more truth than our MSM. I trust
Putin more than the Dem leaders at this point.
Demeter55 , 1 hour ago
The Globalist/New World Order/Deep State/Elitists (or whatever other arrogant subsection of the psychopaths among us you
wish to consider) have one great failing which will defeat them utterly in the end:
They do not know when to cut their losses.
As a result of that irrational stubbornness, born of a "Manifest Destiny" assumption of an eternal lock on the situation,
they will go too far.
Having more wealth than anyone is temporary.
Having more power than anyone is temporary.
Life is temporary.
And we outnumber them by several billion.
Even if they systematically try to destroy us, they will not have the ability unless we are complicit in our own destruction.
While there are many who have "taken the knee" to these tyrants in training, there are more who have no intention of doing
so.
Most nations are not so buffaloed as to fall for this propaganda, but the United States especially was created with the
notion that all men are created equal, and this is ingrained in the national character. We don't buy it.
And our numbers are growing daily, as people wake up and realize they have to take a side for themselves, their families,
their communities.
The global covid-panic was a masterful attack, but it will fail. Indeed, it has failed already. The building counter-attack
will take out those who chose to declare war on humanity. There really is no alternative for us, the humans. Live Free or Die,
as they say in New Hampshire.
And despite the full support of the MSM and the DNC, the Would-Be Masters of the Universe will not succeed.
sborovay07 , 1 hour ago
Sad Assange wasn't granted immunity to testify and was silenced just prior to the release of the Mueller report. Little
has been heard since except his health is horrific. Now, all the Deep State figures on both sides are just throwing as much
mud against Trump as possible to hide the truth. If Durnham does not indict the Deep State figures who participated in the
Obama led coup, all is for not. Only the foot soldiers marching in lock step will be charged.
wn , 1 hour ago
To sum it up.
Conclusion of the Democrats.
Americans need Russian brains to decide their leader in order to move forward.
nokilli , 25 minutes ago
Once the MO for "Russian hacking" is published to the international intelligence community, any (((party))) can pose as
a "Russian hacker."
This is the way computers work. Sybil is eponymous.
KuriousKat , 35 minutes ago
Mazzeti looks like the typical Gopher boy for the CIA Station Chiefs around the world..they retire or become contributors
to NewsWeek Wapo or NYT. ..not Any major network w/o one...Doing **** like this is mandatory..not elective.
Actually, after only a quick review of some of the news reports, it appears that the
Senate Committee placed great importance on the "fact" that Russia was involved in the
"hacking" of emails from the DNC. This suggests that the Committee relied on the same
intelligence sources that fabricated the Russiagate scenario in the first place. I guess that
the Republicans on the Committee have not kept up with revelations that there is no evidence
of any such hacking. Hence, the Committee's conclusions are likely based on the same old
disinformation and can be readily dismissed.
Very telling that ZH editors don't consider this newsworthy: key findings of the
Republican led Senate Select Committee on Intelligence regarding Russia's 2016 election
interference.
Manafort and Kilimnik talked almost daily during the campaign. They communicated through
encrypted technologies set to automatically erase their correspondence; they spoke using code
words and shared access to an email account. It's worth pausing on these facts: The chairman
of the Trump campaign was in daily contact with a Russian agent, constantly sharing
confidential information with him.
It did not find evidence that the Ukrainian government meddled in the 2016 election, as
Trump alleged. "The Committee's efforts focused on investigating Russian interference in
the 2016 election. However, during the course of the investigation, the Committee
identified no reliable evidence that the Ukrainian government interfered in the 2016 U.S.
election."
"Taken as a whole, Manafort's high-level access and willingness to share information with
individuals closely affiliated with the Russian intelligence services, particularly
[Konstantin] Kilimnik and associates of Oleg Deripaska, represented a grave
counterintelligence threat," the report said.
Kilimnik "almost certainly helped arrange some of the first public messaging that
Ukraine had interfered in the U.S. election."
Roger Stone was in communications with both WikiLeaks and the Russian hacker Guccifer 2.0
during the election; according to the Mueller report, Guccifer 2.0 was a conduit set up by
Russian military intelligence to anonymously funnel stolen information to WikiLeaks.
The Senate Intelligence Committee's investigation found "significant evidence to suggest
that, in the summer of 2016, WikiLeaks was knowingly collaborating with Russian government
officials," the report said.
The FBI gave "unjustified credence" to the so-called Steele dossier, an explosive
collections of uncorroborated memos alleging collusion between the Trump campaign and Russian
government officials, the report said. The FBI did not take the "necessary steps to validate
assumptions about Steele's credibility" before relying on the dossier to seek renewals of a
surveillance warrant targeting the former Trump campaign aide, the report said.
Demeter55 , 47 minutes ago
It's the latest in 5 years of "Get Trump!", a sitcom featuring the Roadrunner (Trump) and
the Wiley Coyote (Deep State/Never Trumpers / etc, etc.)
This classic scenario never fails to please those who realize that the roadrunner rules,
and the coyote invariably ends up destroyed.
William Binney is the former technical director of the U.S. National Security Agency who
worked at the agency for 30 years. He is a respected independent critic of how American
intelligence services abuse their powers to illegally spy on private communications of U.S.
citizens and around the globe.
Given his expert inside knowledge, it is worth paying attention to what Binney says.
In a media
interview this week, he dismissed the so-called Russiagate scandal as a "fabrication"
orchestrated by the American Central Intelligence Agency. Many other observers have come to
the same conclusion about allegations that Russia interfered in the 2016 U.S. elections with
the objective of helping Donald Trump get elected.
But what is particularly valuable about Binney's judgment is that he cites technical
analysis disproving the Russiagate narrative. That narrative remains dominant among U.S.
intelligence officials, politicians and pundits, especially those affiliated with the
Democrat party, as well as large sections of Western media. The premise of the narrative is
the allegation that a Russian state-backed cyber operation hacked into the database and
emails of the Democrat party back in 2016. The information perceived as damaging to
presidential candidate Hillary Clinton was subsequently disseminated to the Wikileaks
whistleblower site and other U.S. media outlets.
A mysterious cyber persona known as "Guccifer 2.0" claimed to be the alleged hacker. U.S.
intelligence and news media have attributed Guccifer as a front for Russian cyber
operations.
Notably, however, the Russian government has always categorically denied any involvement
in alleged hacking or other interference in the 2016 U.S. election, or elections
thereafter.
William Binney and other independent former U.S. intelligence experts say they can prove
the Russiagate narrative is bogus. The proof relies on their forensic analysis of the data
released by Guccifer. The analysis of timestamps demonstrates that the download of voluminous
data could not have been physically possible based on known standard internet speeds. These
independent experts conclude that the data from the Democrat party could not have been
hacked, as Guccifer and Russiagaters claim. It could only have been obtained by a leak from
inside the party, perhaps by a disgruntled staffer who downloaded the information on to a
disc. That is the only feasible way such a huge amount of data could have been released. That
means the "Russian hacker" claims are baseless.
Wikileaks, whose founder Julian Assange is currently imprisoned in Britain pending an
extradition trial to the U.S. to face espionage charges, has consistently maintained
that their source of files was not a hacker, nor did they collude with Russian intelligence.
As a matter of principle, Wikileaks does not disclose the identity of its sources, but the
organization has indicated it was an insider leak which provided the information on senior
Democrat party corruption.
William Binney says forensic analysis of the files released by Guccifer shows that the
mystery hacker deliberately inserted digital "fingerprints" in order to give the impression
that the files came from Russian sources. It is known from information later disclosed by
former NSA whistleblower Edward Snowden that the CIA has a secretive program – Vault 7
– which is dedicated to false incrimination of cyber attacks to other actors. It seems
that the purpose of Guccifer was to create the perception of a connection between Wikileaks
and Russian intelligence in order to beef up the Russiagate narrative.
"So that suggested [to] us all the evidence was pointing back to CIA as the originator
[of] Guccifer 2.0. And that Guccifer 2.0 was inside CIA I'm pointing to that group as the
group that was probably the originator of Guccifer 2.0 and also this fabrication of the
entire story of Russiagate," concludes Binney in his interview with Sputnik news
outlet.
This is not the first time that the Russiagate yarn has been debunked . But it is crucially important to make Binney's expert
views more widely appreciated especially as the U.S. presidential election looms on November
3. As that date approaches, U.S. intelligence and media seem to be intensifying claims about
Russian interference and cyber operations. Such wild and unsubstantiated "reports" always
refer to the alleged 2016 "hack" of the Democrat party by "Guccifer 2.0" as if it were
indisputable evidence of Russian interference and the "original sin" of supposed Kremlin
malign activity. The unsubstantiated 2016 "hack" is continually cited as the "precedent" and
"provenance" of more recent "reports" that purport to claim Russian interference.
Given the torrent of Russiagate derivatives expected in this U.S. election cycle, which is
damaging U.S.-Russia bilateral relations and recklessly winding up geopolitical tensions, it
is thus of paramount importance to listen to the conclusions of honorable experts like
William Binney.
The American public are being played by their own intelligence agencies and corporate
media with covert agendas that are deeply anti-democratic.
Well - who set up them up, converted from the OSS? The banksters.
"Wild Bill" Donovan worked for JP Morgan immediately after WWII.
"our" US intelligence agencies were set up by, and serve, the masters of high finance.
Is this in dispute?
meditate_vigorously , 11 hours ago
They have seeded enough misinformation that apparently it is. But, you are correct. It
is the Banksters.
Isisraelquaeda , 2 hours ago
Israel. The CIA was infiltrated by the Mossad long ago.
SurfingUSA , 15 hours ago
JFK was on to that truth, and would have been wise to mini-nuke Langley before his
ill-fated journey to Dallas.
Andrew G , 11 hours ago
Except when there's something exceptionally evil (like pedo/blackmail rings such as
Epstein), in which case it's Mossad / Aman
vova.2018 , 7 hours ago
Except when there's something exceptionally evil (like pedo/blackmail rings such as
Epstein), in which case it's Mossad / Aman
The CIA & MOSSAD work hand in hand in all their clandestine operations. There is not
doubt the CIA/MOSSAD are behind the creation, evolution, training, supplying weapons,
logistic-planning & financing of the terrorists & the destruction of the Middle
East. Anybody that believes the contrary has brain problems & need to have his head
examined.
CIA/MOSAD has been running illegal activities in Colombia: drug, arms, organs &
human (child-sex) trafficking. CIA/MOSAD is also giving training, logistic & arms to
Colombia paramilitary for clandestine operation against Venezuela. After Bolsonaro became
president, MOSSAD started running similar operation in Brazil. Israel & Brazil also
recognizes Guaido as the legit president of Venezuela.
CIA/MOSSAD have a long time policy of
assassinating & taking out pep who are a problem to the revisionist-zionist agenda, not
just in the M-East but in the world. The CIA/MOSSAD organizations have many connections in
other countries like the M-East, Saudi Arabia, UAE, et al but also to the UK-MI5.
The Israelis infiltrated the US to the highest levels a long time ago - Proof
Israel has & collects information (a database) of US citizens in coordination
with the CIA & the 5 eyes.
Israel works with the NSA in the liaison-loophole operations
Mossad undercover operations in WDC & all over the world
The American Israel Public Affairs Committee – AIPAC
People with 2 citizenships (US/Israel) in WDC/NYC (the real Power)
From Steve Bannon a christian-zionist: Collusion between the Trump administration and
Israel .
Funny how a number of the right wing conspiracy stories according to the MSM from a
couple years back were true from the get go. 1 indictment over 4 years in the greatest
attempted coup in this country's history. So sad that Binney and Assange were never
listened to. They can try to silence us who know of the truth, but as Winston Churchill
once said, 'Truth is incontrovertible. Panic may resent it. Ignorance may deride it. Malice
may distort it. But there it is.' KDP still censors my book on their advertising platform
as it
promotes conspiratorial theories (about the Obama led coup) and calls out BLM and Antifa
for what they are (marxists) . Yet the same platform still recommends BLM books stating
there is a pandemic of cops killing innocent blacks. F them!!!! #RIPSeth #FreeJulian
#FreeMillie
smacker , 11 hours ago
Yes, and we all know the name of the DNC leaker who downloaded and provided
WikiLeaks
with evidence of CIA and DNC corruption.
He was assassinated to prevent him from naming who Guccifer 2.0 was and where he is
located.
The Russia-gate farce itself provides solid evidence that the CIA and others are in bed
with DNC
and went to extraordinary lengths to prevent Trump being elected. When that failed, they
instigated
a program of x-gates to get him out of office any way they could. This continues to this
day.
This is treason at the highest level.
ACMeCorporations , 12 hours ago
Hacking? What Russian hacking?
In recently released testimony, the CEO of CrowdStrike admitted in congressional
testimony, under oath, that it actually has no direct evidence Russia stole the DNC
emails.
Nelbev , 9 hours ago
"The proof relies on their forensic analysis of the data released by Guccifer. The
analysis of timestamps demonstrates that the download of voluminous data could not have
been physically possible based on known standard internet speeds. ... a disgruntled
staffer who downloaded the information on to a disc. That is the only feasible way such a
huge amount of data could have been released. ... William Binney says forensic analysis
of the files released by Guccifer shows that the mystery hacker deliberately inserted
digital "fingerprints" in order to give the impression that the files came from Russian
sources. ... "
Any computer file is a bunch of 1s and 0s. Anyone can change anything with a hex editor.
E.g. I had wrong dates on some photographs once, downloaded as opposed to when taken, just
edited the time stamp. You cannot claim any time stamp is original. If true time stamps,
then the DNC files were downloaded to a thumb drive at a computer on location and not to
the internet via a phone line. However anyone can change the time stamps. Stating a
"mystery hacker deliberately inserted digital [Russian] 'fingerprints' " is a joke if
denying the file time stamps were not tampered with. The real thing is where the narrative
came from, political spin doctors, Perkins Coie law firm hired by DNC and Hillary campaign
who hired Crowdstrike [and also hired Fusion GPS before for pissgate dossier propaganda and
FISC warrants to spy on political opponents] and Perkins Coie edited Crowdstrike report
with Russian narrative. FBI never looked at DNC servers. This is like your house was broken
into. You deny police the ability to enter and look at evidence like DNC computers. You
hire a private investigator to say your neighbor you do not like did it and publicise
accusations. Take word of political consultants hired, spin doctor propaganda, Crowdstrike
narrative , no police investigation. Atlantic Council?
Vivekwhu , 8 hours ago
The Atlantic Council is another NATO fart. Nuff said!
The_American , 15 hours ago
God Damn traitor Obama!
Yen Cross , 14 hours ago
TOTUS
For the youngsters.
Teleprompter Of The United States.
Leguran , 6 hours ago
The CIA has gotten away with so much criminal behavior and crimes against the American
public that this is totally believable. Congress just lets this stuff happen and does
nothing. Which is worse - Congress or the CIA?
Congress set up the system. It is mandated to perform oversight. And it just sits on its
thumbs and wallows in it privileges.
This time Congress went further than ever before. It was behind and engaged in an
attempted coup d'état.
Know thy enemy , 10 hours ago
Link to ShadowGate (ShadowNet) documentary - which answers the question, what is the
keystone,,,,,
It's time for Assange and Wikileaks to name the person who they rec'd the info from. By
hiding behind the "we don't name names" Mantra they are helping destroy America by
polarizing its citizens. Name the damn person, get it all out there so the left can see
that they've been played by their leaders. Let's cut this crap.
freedommusic , 7 hours ago
...all the evidence was pointing back to CIA as the originator [of] Guccifer 2.0.
Yep, I knew since day one. I remember seeing Hillary Clinton talking about Guccifer . As
soon as uttered the name, I KNEW she with the CIA were the brainchild of this bogus
decoy.
They copy. They mimic. These are NOT creative individuals.
Perhaps hell is too good a place for them.
on target , 4 hours ago
This is old news but worth bringing up again. The CIA never wanted Trump in, and of
course, they want him out. Their fingerprints were all over Russiagate, The Kavanaugh
hearings, Ukrainegate, and on and on. They are just trying to cover their asses for a
string of illegal "irregularities" in their operations for years. Trump should never have
tried to be a get along type of guy. He should have purged the entire leadership of the CIA
on day one and the FBI on day 2. They can not be trusted with an "America First" agenda.
They are all New World Order types who know whats best for everyone.
fersur , 7 hours ago
Boom, Boom, Boom !
Three Reseachable Tweets thru Facebook, I cut all at once, Unedited !
"#SusanRice has as much trouble with her memory as #HillaryClinton. Rice testified in
writing that she 'does not recall' who gave her key #Benghazi talking points she used on
TV, 'does not recall' being in any meetings regarding Benghazi in five days following the
attack, and 'does not recall' communicating with anyone in Clinton's office about
Benghazi," Tom Fitton in Breitbart.
"Adam Schiff secretly subpoenaed, without court authorization, the phone records of Rudy
Giuliani and then published the phone records of innocent Americans, including
@realDonaldTrump 's lawyers, a member of Congress, and a journalist," @TomFitton .
BREAKING: Judicial Watch announced today that former #Obama National Security Advisor
and U.S. Ambassador to the United Nations, Susan Rice, admitted in written responses given
under oath that she emailed with former Secretary of State Hillary Clinton on Clinton's
non-government email account and that she received emails related to government business on
her own personal email account.
STONEHILLADY , 7 hours ago
It's not just the Democrats, the warmongering neocons of the Republican party are also
in on it, the Bush/Romney McCain/McConnell/Cheney and many more. It's called "Kick Backs"
Ever notice these so called retired Generals all end up working for all these spying
companies that span the 5eyes to Israel. It seems our POTUS has got his hands full swimming
up stream to get this stopped and actually get rid of the CIA. It's the number 1 reason he
doesn't trust these people, they all try to tell him stuff that is mis-directed.
Liars, leakers, and thieves are running not only our nation but the world, as George
Carlin said, "It's a Big Club, and we ain't in it." If you fall for this false narrative of
mail in voting and not actually go and vote on election day, you better start learning
Chinese for surely Peelosi and Schumer will have their way and mess up this election so
they can drag Trump out of office and possible do him and his family some serious harm, all
because so many of you listen to the MSM and don't research their phony claims.
Max21c , 7 hours ago
It's called "Kick Backs" Ever notice these so called retired Generals all end up
working for all these spying companies that span the 5eyes to Israel.
American Generals & Admirals are a lot more corrupt today than they were a few
generations back. Many of them are outright evil people in today's times. Many of these
people are just criminals that will steal anything they can get their banana republic
klepto-paws on. They're nothing but common criminals and thieves. No different than the
Waffen SS or any other group of brigands, bandits, and criminal gangsters.
Max21c , 7 hours ago
The CIA, FBI, NSA, Military Intelligence, Pentagon Gestapo, defense contractors are
mixed up in a lot of crimes and criminal activities on American soil against American
citizens and American civilians. They do not recognize borders or laws or rights of liberty
or property rights or ownership or intellectual property. They're all thieves and criminals
in the military secret police and secret police gangsters cabal.
BandGap , 7 hours ago
I have seen Binney's input. He is correct in my view because he
scientifically/mathematically proves his point.
The blinded masses do not care about this approach, just like wearing masks.
The truth is too difficult for many to fit into their understanding of the world.
So they repeat what they have been told, never stopping to consider the facts or how
circumstances have been manipulated.
It is frustrating to watch, difficult to navigate at times for me. Good people who will
not stop and think of what the facts show them.
otschelnik , 8 hours ago
It could have been the CIA or it could have been one of the cut-outs for plausible
deniability, and of all the usual suspects it was probably CrowdStrike.
- CGI / Global Strategy Group / Analysis Corp. - John Brennan (former CEO)
- Dynology, Wikistrat - General James L. Jones (former chairman of Atlantic Council, NSA
under Obama)
- CrowdStrike - Dmitri Alperovich and Shawn Henry (former chief of cyber forensics
FBI)
- Clearforce - Michael Hayden (former dir. NSA under Clinton, CIA under Bush) and Jim
Jones Jr. (son Gnrl James Jones)
- McChrystal Group - Stanley McChrystal (former chief of special operations DOD)
fersur , 8 hours ago
Unedited !
The Brookings Institute – a Deep State Hub Connected to the Fake Russia Collusion
and Ukraine Scandals Is Now Also Connected to China Spying In the US
The Brookings
Institute was heavily involved in the Democrat and Deep State Russia collusion hoax and
Ukraine impeachment fraud. These actions against President Trump were criminal.
This institute is influenced from foreign donations from entities who don't have an
America first agenda. New reports connect the Institute to Chinese spying.
As we reported previously, Julie Kelly at American Greatness
released a report where she addresses the connections between the Brookings Institute,
Democrats and foreign entities. She summarized her report as follows: Accepting millions
from a state sponsor of terrorism, foisting one of the biggest frauds in history on the
American people, and acting as a laundering agent of sorts for Democratic political
contributions disguised as policy grants isn't a good look for such an esteemed
institution. One would be hard-pressed to name a more influential think tank than the
Brookings Institution. The Washington, D.C.-based nonprofit routinely ranks at the top of
the list
of the best think tanks in the world; Brookings scholars produce a steady flow of reports,
symposiums, and news releases that sway the conversation on any number of issues ranging
from domestic and economic policy to foreign affairs.
Brookings is home to lots of Beltway power players: Ben
Bernanke and Janet Yellen, former chairmen of the Federal Reserve, are Brookings fellows.
Top officials from both Republican and Democrat presidential administrations lend political
heft to the organization. From 2002 until 2017, the organization's president was Strobe
Talbott. He's a longtime BFF of Bill Clinton; they met in the 1970s at Oxford University
and have been tight ever since. Talbott was a top aide to both President Bill Clinton and
Secretary of State Hillary Clinton.
Kelly continued:
Brookings-based fellows working at Lawfare were the media's go-to legal "experts" to
legitimize the concocted crime; the outlet manipulated much of the news coverage on
collusion by pumping out primers and guidance on how to report collusion events from
Special Counsel Robert Mueller's appointment to his final report.
Now, testimony related to a defamation lawsuit against Christopher Steele, the author of
the infamous "dossier" on Donald Trump, has exposed his direct ties to Talbott in 2016 when
he was still head of Brookings. Talbott and Steele were in communication before and after
the presidential election; Steele wanted Talbott to circulate the dossier to his pals in
John Kerry's State Department, which reportedly is what Talbott
did . Steele also briefed top state department officials in October 2016 about his
work.
But this isn't the only connection between the Brookings Institute and the Russia
collusion and Ukrainian scandals. We were the first to report that the Primary Sub-Source
(PSS) in the Steele report, the main individual who supplied Steele with bogus information
in his report was Igor Danchenko.
In November 2019, the star witness for the Democrat Representative Adam Schiff's
impeachment show trial was announced. Her name was Fiona Hill.
Today we've uncovered that Hill is a close associate of the Primary Sub-Source (PSS) for
the Steele dossier – Igor Danchenko – the individual behind most all the lies
in the Steele dossier. No wonder Hill saw the Steele dossier before it was released. Her
associate created it.
Both Fiona Hill and Igor Danchenko are connected to the Brookings Institute.
They gave a presentation together as Brookings Institute representatives:
Kelly writes about the foreign funding the Brookings Institute partakes:
So who and what have been funding the anti-Trump political operation at Brookings over
the past few years? The think tank's top benefactors are a predictable mix of family
foundations, Fortune 100 corporations, and Big Tech billionaires. But one of the biggest
contributors to Brookings' $100 million-plus annual budget is the Embassy of Qatar.
According to financial reports, Qatar has donated more than $22 million to the think tank
since 2004. In fact, Brookings operates a satellite center in Doha, the
capital of Qatar. The wealthy Middle Eastern oil producer
spends billions on American institutions such as universities and other think
tanks.
Qatar also is a top state sponsor of terrorism, pouring billions into Hamas, al-Qaeda,
and the Muslim Brotherhood, to name a few. "The nation of Qatar, unfortunately, has
historically been a funder of terrorism at a very high level," President Trump said in 2017. "We
have to stop the funding of terrorism."
An email from a Qatari official, obtained by WikiLeaks, said the Brookings
Institution was as important to the country as "an aircraft carrier."
The Brookings Institution, a prominent Washington, D.C., think tank, partnered with a
Shanghai policy center that the FBI has described as a front for China's intelligence and
spy recruitment operations, according to public records and federal court documents.
The Brookings Doha Center, the think tank's hub in Qatar, signed a memorandum of
understanding with the Shanghai Academy of Social Sciences in January 2018, the
institution said . The academy is a policy center funded by the Shanghai municipal
government that has raised flags within the FBI.
The partnership raises questions about potential Chinese espionage activities at the
think tank, which employs numerous former government officials and nearly two dozen
current foreign policy advisers to Joe Biden's presidential campaign.
It is really frightening that one of two major political parties in the US is tied so
closely with the Brookings Institute. It is even more frightening that foreign enemies of
the United States are connected to this entity as well.
Let it Go , 8 hours ago
One thing for sure is these guys have far to much of our money to spend promoting their
own good.
fersur , 7 hours ago
Unedited !
Mueller Indictments Tied To "ShadowNet," Former Obama National Security Advisor and
Obama's CIA Director – Not Trump
According to a report in the Daily Beast, which cited the Wall Street Journal's
reporting of Special Counsel Robert Mueller's investigation into two companies, Wikistrat
and Psy Group, "The firm's advisory council lists former CIA and National Security Agency
director Michael Hayden, former national security adviser James L. Jones."
According to numerous reporting from major news outlets like the Wall Street Journal and
Daily Beast, both Wikistrat and Psy Group represent themselves as being social media
analysts and black PSYOP organizations. Both Wikistrat and Psy Group have foreign ownership
mixed between Israeli, Saudi (Middle East) and Russian. Here is what the Wall Street
Journal, The Daily Beast and pretty much everyone else out there doesn't know (or won't
tell you).
The fact Obama's former National Security Advisor, General James Jones, and former Obama
CIA director, Gen. Michael Hayden, are both on Wikistrat's advisory board may not seem
suspicious, but both of these general's have another thing in common, and that is the
ShadowNet. The ShadowNet, and its optional companion relational database, iPsy, were both
originally developed by the small, family owned defense contracting company, Dynology. The
family that owns Dynology; Gen. James Jones. I would add Paul Manafort and Rick Davis was
Dynology's partner at the time we were making the ShadowNet and iPsy commercially
available.
After obtaining the contract in Iraq to develop social media psychological warfare
capabilities, known in military nomenclature as Interactive Internet Activities, or IIA,
Gen. Jones kept the taxpayer funded application we developed in Iraq for the 4th
Psychological Operation Group, and made it commercially available under the trademark of
the "ShadowNet" and the optional black PSYOP component, "iPsy." If you think it is
interesting that one of the companies under Mueller's indictment is named, "Psy" Group, I
did as well. In fact, literally everything both publicly described in news reports, and
even their websites, are exactly the same as the ShadowNet and iPsy I helped build, and
literally named.
The only thing different I saw as far as services offered by Wikistrat, and that of
Dynology and the ShadowNet, was described by The Daily Beast as, "It also engaged in
intelligence collection." Although iPsy was a relational database that allowed for the
dissemination of whatever the required narrative was, "intelligence collection" struck
another bell with me, and that's a company named ClearForce.
ClearForce was developed as a solution to stopping classified leaks following the Edward
Snowden debacle in 2013. Changes in NISPOM compliance requirements forced companies and
government agencies that had employees with government clearances to take preventive
measure to mitigate the potential of leaking. Although the NISPOM compliance requirement
almost certainly would have been influenced by either Hayden, Jones or both, they once
again sought to profit from it.
Using components of the ShadowNet and iPsy, the ClearForce application (which the
company, ClearForce, was named after,) was developed to provide compliance to a regulation
I strongly suspect you will find Jones and Hayden had a hand in creating. In fact, I
strongly suspect you will find General Jones had some influence in the original requirement
for our Iraq contract Dynology won to build the ShadowNet – at taxpayer expense!
Dynology worked for several years incorporating other collection sources, such as
financial, law enforcement and foreign travel, and ties them all into your social media
activity. Their relationship with Facebook and other social media giants would have been
nice questions for congress to have asked them when they testified.
Part 1 of 2 !
fersur , 7 hours ago
Part 2 of 2 !
The ClearForce application combines all of these sources together in real-time and uses
artificial intelligence to predictively determine if you are likely to steal or leak based
on the behavioral profile ClearForce creates of you. It can be used to determine if you get
a job, and even if you lose a job because a computer read your social media, credit and
other sources to determine you were likely to commit a crime. It's important for you to
stop for a moment and think about the fact it is privately controlled by the former CIA
director and Obama's National Security Advisor/NATO Supreme Allied Commander, should scare
the heck out of you.
When the ClearForce application was complete, Dynology handed it off to ClearForce, the
new company, and Michael Hayden joined the board of directors along with Gen. Jones and his
son, Jim, as the president of ClearForce. Doesn't that kind of sound like "intelligence
collection" described by the Daily Beast in Wikistrat's services?
To wrap this all up, Paul Manafort, Rick Davis, George Nader, Wikistrat and Psy Group
are all directly connected to Mueller's social media influence and election interreference
in the 2016 presidential election. In fact, I believe all are under indictment, computers
seized, some already sentenced. All of these people under indictment by Mueller have one
key thing in common, General James Jones's and Michael Hayden's social media black PSYOP
tools; the ShadowNet, iPsy and ClearForce.
A recent meeting I had with Congressman Gus Bilirakis' chief of staff, Elizabeth Hittos,
is confirmation that they are reviewing my DoD memorandum stating the work I did on the IIA
information operation in Iraq, the Dynology marketing slicks for the ShadowNet and iPsy,
along with a screenshot of Goggle's Way-Back Machine showing Paul Manafort's partnership
with Dynology in 2007 and later. After presenting to her these facts and making clear I
have much more information that requires the highest classification SCIF to discuss and
requires being read-on to the program, Elizabeth contacted the office of Congressman Devin
Nunez to request that I brief the intelligence committee on this critical information
pertaining directly to the 2010 Ukrainian elections, Michael Brown riots, 2016 election
interference and the "Russia collusion" hoax. All of that is on top of numerous
questionable ethical and potentially illegal profits from DoD contracts while servings as
NATO Commander and Obama's National Security Advisor.
We also need to know if the ShadowNet and iPsy were allowed to fall into foreign hands,
including Russia, Saudi Arabia and Israel. I'm pretty sure South America is going to have a
few questions for Jones and Obama as well? Stay tuned!
Balance-Sheet , 4 hours ago
Intelligence Agencies of all countries endlessly wage war at all times especially
'Information Warfare' (propaganda/disinformation) and the primary target has always and
will always be the domestic population of the Intelligence Agency's country.
Yes, of course the CIA does target ALL other countries but the primary target will
always be the Americans themselves.
Balance-Sheet , 4 hours ago
Intelligence Agencies of all countries endlessly wage war at all times especially
'Information Warfare' (propaganda/disinformation) and the primary target has always and
will always be the domestic population of the Intelligence Agency's country.
Yes, of course the CIA does target ALL other countries but the primary target will
always be the Americans themselves.
The neoliberals own the media, courts, academia, and BUREAUCRACY (including CIA) and
they will do anything to make sure they retain power over everyone. These control freaks
work hard to create all sorts of enemies to justify their existence.
LaugherNYC , 15 hours ago
It is sad that this information has to be repeatedly published, over and over and over,
by SCI and other Russian. outlets.
Because no legit AMERICAN news outlet will give Binney or Assange the time of day or any
credence, this all becomes Kremlin-sponsored disinformation and denials. People roll their
eyes and say "Oh God, not the whole 'Seth Rich was murdered by the CIA' crap again!! You
know, his FAMILY has asked that people stop spreading these conspiracy theories and
lies."
SCI is a garbage bin, nothing more than a dizinformatz machine for Putin, but in this
case, they are likely right. It seems preposterous that the "best hackers in the world"
would forget to use a VPN or leave a signature behind, and it makes far more sense that the
emails were leaked by someone irate at the abuses of the DNC - the squashing of Bernie, the
cheating for Hillary in the debates - behavior we saw repeated in 2020 with Bernie shoved
aside again for the pathetic Biden.
Would that SOMEONE in the US who is not on the Kremlin payroll would pick up this
thread. But all the "investigative journalists" now work indirectly for the DNC, and those
that don't are cancelled by the left.
Stone_d_agehurler , 15 hours ago
I am Guccifer and I approve this message.
Sarc/
But i do share your opinion. They are likely right this time and most of the pundits and
media in the U. S. know it. That's what makes this a sad story about how rotten the U. S.
system has become.
Democrats will sacrifice the Union for getting Trump out of office.
If elections in Nov won't go their way, Civil War II might become a real thing in
2021.
PeterLong , 4 hours ago
If " digital "fingerprints" in order to give the impression that the files came from
Russian sources" were inserted in the leak by "Guccifer", and if the leak to wikileaks came
from Seth Rich, via whatever avenue, then the "Guccifer" release came after the wikileaks
release, or after wikileaks had the files, and was a reaction to same attempting to
diminish their importance/accuracy and cast doubt on Trump. Could CIA and/or DNC have known
the files were obtained by wikileaks before wikileaks actually released them? In any case
collusion of CIA with DNC seems to be a given.
RightlyIndignent , 4 hours ago
Because Seth had already given it to Wikileaks. There is no 'Fancy Bear'. There is no
'Cozy Bear'. Those were made up by CrowdStrike, and they tried the same crap on Ukraine,
and Ukraine told them to pound sand. When push came to shove, and CrowdStrike was forced to
say what they really had under oath, they said: "We have nothing."
novictim , 4 hours ago
You are leaving out Crowd Strike. Seth Rich was tasked by people at the DNC to copy data
off the servers. He made a backup copy and gave a copy to people who then got it to Wiki
leaks. He used highspeed file transfers to local drives to do his task.
Meanwhile, it was the Ukrainian company Crowd Strike that claimed the data was stolen
over the internet and that the thieves were in Russia. That 'proof" was never verified by
US Intelligence but was taken on its word as being true despite crowd strike falsifying
Russian hacks and being caught for it in the past.
Joebloinvestor , 5 hours ago
The "five eyes" are convinced they run the world and try to.
That is what Brennan counted on for these agencies to help get President Trump.
As I said, it is time for the UK and the US to have a serious conversation about their
current and ex-spies being involved in US elections.
Southern_Boy , 5 hours ago
It wasn't the CIA. It was John Brennan and Clapper. The CIA, NSA FBI, DOJ and the
Ukrainian Intelligence Service just went along working together and followed orders from
Brennan who got them from Hillary and Obama.
Oh, and don't forget the GOP Globalist RINOs who also participated in the coup attempt:
McCain, Romney, Kasich, Boehner, Lee and Richard Burr.
With Kasich now performing as a puppy dog for Biden at the Democrat Convention as a
Democrat DNC executive, the re-alignment is almost complete: Globalist Nationalist
Socialist Bolshevism versus American Populism, i.e. Elites versus Deplorables or Academics
versus Smelly Wal-Mart people.
on target , 5 hours ago
No way. CIA up to their eyeballs in this as well as the State Department. Impossible for
Russiagate or Ukrainegate without direct CIA and State involvement.
RightlyIndignent , 4 hours ago
Following Orders? How did that argument go at Nuremberg? (hint: not very well)
LeadPipeDreams , 6 hours ago
LOL - the CIA's main mission - despite their "official" charter, has always been to
destabilize the US and its citizens via psyops, false flags, etc.
Covid-1984 is their latest and it appears most successful project yet.
Iconoclast27 , 5 hours ago
The CIA received a $200 million initial investment from the Rockefeller and Carnegie
foundations when it was first established, that should tell you everything you need to know
how who they truly work for.
A_Huxley , 6 hours ago
CIA, MI6, 5 eye nations.
All wanted to sway the USA their own way.
Let it Go , 8 hours ago
Almost as frightening as the concentrated power held by companies such as Facebook and
Google is the fact Jeff Bezos, CEO of Amazon and the world's richest man, is the person who
owns and controls the Washington Post. It is silly to think Jeff Bezos purchased the
Washington Post in 2013 because he expected newspapers to make a lucrative resurgence.
It is more likely he purchased the long-trusted U.S. newspaper for the power it would
ensure him in Washington when wielded as a propaganda mouthpiece to extend his ability to
both shape and control public opinion. More on this subject in the article below.
How it is the Democrats, the Deep State, and the legacy media are still able to cling to
the remnants of these long discredited narratives is a mystery.
avoiceofliberty , 6 hours ago
At the official level, you have a point.
However, even before Mueller was appointed, a review of the materials in the extant
public record of both the DNC "hack" and the history of Crowdstrike showed the narrative
simply did not make sense. A detailed investigation of materials not made public was not
necessary to shoot down the entire narrative.
Indeed, one of the great scandals of the Mueller probe is the way it did not bring
prudential skepticism to the question of the DNC "hack". When building a case, either for
public debate or for public trial, a dose of skepticism is healthy; it leads to a careful
vetting of facts and reasoning.
Alice-the-dog , 6 hours ago
The CIA has been an agency wholly independent of the US government almost since its
inception. It is not under any significant control by the government, and has its own
agenda which may occasionally coincide with that of the government, but only
coincidentally. It has its own view of how the world should look, and will not balk at any
means necessary to achieve such. Including the murder of dis-favorable members of
government.
snodgrass , 6 hours ago
It's the CIA and the FBI, Obama and people in his administration who cooked up
Russiagate.
Floki_Ragnarsson , 7 hours ago
The CIA whacked JFK because he was going to slow the roll to Vietnam AND disband the CIA
and reform it.
It is broken and needs to be disbanded and reformed along lines that actually WORK! The
CIA missed the fall of the USSR, 9/11, etc. HTF does THAT happen?
DeportThemAll , 6 hours ago
The CIA didn't "miss" 9/11... they participated in it.
Let it Go , 8 hours ago
The CIA is a tool that when improperly used can do great damage.
Anyone who doesn't believe that countries use psychological warfare and propaganda to
sway the opinions of people both in and outside of their country should be considered
naive. Too many people America is more than a little hypocritical when they criticize other
countries for trying to gain influence considering our history of meddling in the affairs
of other countries.
Americans have every reason to be concerned and worried considering revelations of just
how big the government intelligence agencies have grown since 9-11 and how unlimited their
spying and surveillance operations have become. The article below explores this growth and
questions whether we have lost control.
The idea of Binney and Jason Sullivan privately working to 'secure the vote' is
something that I actually consider to be very eyebrow raising and alarming.
Son of Captain Nemo , 8 hours ago
Bill Binney under "B" in the only "yellow pages" that show a conscience and a
soul!...
This is the dumbest article ever. Russiagate is a total fabrication of the FBI as per
Clinesmith, CIA provided information that would have nipped it at the bud. Read the real
news.
bringonthebigone , 9 hours ago
Wrong. this article is one small piece of the puzzle. Clinesmith is one small piece of
the puzzle. The Flynn entrapment is one small piece of the puzzle. The Halper entrapment
was one small piece of the puzzle.
Because Clinesmith at the FBI covered up the information saying Page was a CIA source
does not mean it was a total FBI fabrication and does not mean the CIA was not involved and
does not mean the DNC server hack is irrelevant.
Sundance does a better job pulling it all together.
PKKA , 14 hours ago
Relations have already soured between Russia and the United States, and sanctions have
been announced. Tensions have grown on the NATO-Russia border. The meat has already been
rolled into the minced meat and it will not be possible to roll the minced meat back into
the meat. The CIA got it. But the Russian people now absolutely understand that the United
States will always be the enemy of Russia, no matter whether socialist or capitalist. But I
like it even more than the feigned hypocritical "friendship". Russia has never reached such
heights as during the good old Cold War. All Russians have a huge incentive, long live the
new Cold War!
smacker , 12 hours ago
More and more people have worked out that the fabricated tensions between the US and
Russia
and US and China have little to do with those two countries posing any sort of threat to
world peace.
It is all about the US trying to remain in No.1 position as uni-polar top dog via the
Anglo American Empire.
We see examples of this every day in the M/E, South China Sea, Taiwan, Libya all over
Eastern Europe,
Ukraine, Iran and now Belaruse. HK was added along the way.
Both Russia and China openly want a multi-polar world order. But the US will never
accept that.
Hence the prospect of war. The only unknown today is what and where the trigger will
be.
smacker , 12 hours ago
More and more people have worked out that the fabricated tensions between the US and
Russia
and US and China have little to do with those two countries posing any sort of threat to
world peace.
It is all about the US trying to remain in No.1 position as uni-polar top dog via the
Anglo American Empire.
We see examples of this every day in the M/E, South China Sea, Taiwan, Libya all over
Eastern Europe,
Ukraine, Iran and now Belaruse. HK was added along the way.
Both Russia and China openly want a multi-polar world order. But the US will never
accept that.
Hence the prospect of war. The only unknown today is what and where the trigger will
be.
hang_the_banksters , 31 minutes ago
the best proof thAt Guccifer 2 was CIA hacking themselves to frame Wikileaks is
this:
Guccifer has not yet been identified, indicted and arrested.
you'd think CIAFBINSA would be turning over every stone to the ends of the earth to bust
Guccifer. we just had to endure 4 years of hysterical propaganda that Russia had hacked our
election and that Trump was their secret agent. so Guccifer should be the Most Wanted Man
on the planet. meanwhile, it's crickets from FBI. they arent even looking for him. because
Guccifer is over at Langley. maybe someone outta ask Brennan where G2 is now.
remember when DOJ indicted all those GRU cybersoldiers? the evidence listed in the
indictment was so stunning that i dont believe it. NSA so thoroughly hacked back into GRU
that NSA was watching GRU through their own webcams and recording them doing Google
searches to translate words which were written in Guccifer's blog posts about the DNC email
leaks. NSA and DOJ must think we are all stupid, that we will believe NSA is so powerful to
do that, yet they cant identify Guccifer.
i say i dont believe that for a second because no way Russian GRU are so stupid to even
have webcams on the computers they use to hack, and it is absurd to think GRU soldiers on a
Russian military base would be using Google instead of Yandex to translate words into
English.
lay_arrow
ConanTheContrarian1 , 1 hour ago
As a confirmed conspiracy theorist since I came back from 'Nam, here's mine: The
European nobility recognized with the American and French revolutions that they needed a
better approach. They borrowed from the Tudors (who had to deal with Parliament) and began
to rule by controlling the facade of representative government. This was enhanced by
funding banks to control through currency, as well as blackmail and murder, and morphed
into a complete propaganda machine like no other in history. The CIA, MI6 and Mossad, the
mainstream media, deep plants in bureaucracy and "democratic" bodies all obey their
dictates to create narratives that control our minds. Trump seems to offer hope, but
remember, he could be their latest narrative.
greatdisconformity , 1 hour ago
A Democracy cannot function on a higher level than the general electorate.
The intelligence and education of the general electorate has been sliding for
generations, because both political parties can play this to their advantage.
It is no accident that most of the messages coming from politicians are targeted to
imbeciles.
From the document: "Binney is quoted as being convinced by Campbell's analysis and now
believes the DNC data was hacked."
This person gets it wrong. What Binney concluded was that the data was *manipulated" and
therefore can not be used to establish much of anything. However, the point that the data
could not be transmitted at the speed estimated in 2016 is still basically valid and that the
data was loaded onto removable storage is also still likely. *However*, that fact has always
been mostly irrelevant, since no one knows how many times it was moved and by what means.
Almost certainly it was moved by an external storage device at some point before ending up in
Wikileaks. Craig Murray pretty much said as much.
How I would have done it is sit outside the DNC server location with a decent high-speed
WiFi connection to their wireless network (I presume they have one, everyone does these
days), and after doing whatever was necessary, either as an employee or a spy, to connect to
the network, I would have downloaded the data to my wireless device (laptop, presumably). The
NSA would be oblivious to this transfer, although depending on my anti-forensics skill, it
might still have been detected internally by a computer forensics expert. CrowdStrike never
found the actual leaker or the exfiltration method AFAIK; all they found was some malware -
which means whoever took it was either authorized to do so (or used the credentials of
someone else authorized to do so - standard operating procedure for either external or
internal spies) or was very good at anti-forensics. Or CrowdStrike was simply incompetent. Or
all three.
What the data analysis *does* do is disprove the US allegation that Russians extracted the
data *over the Internet* *directly* to Wikileaks. Nothing in the Mueller report suggests the
data was moved by external storage media. Binney's statement that if it was moved over the
Internet, the NSA would know it and could prove it remains true. That they never have is one
huge red flag about the Mueller claims.
The rest of the conspiracy analysis in the linked document is only minimally interesting.
The 5G stuff just shows the writer to be a non-scientist, as they fully admit, while still
suggesting that 5G is some sort of health threat. I wouldn't be surprised if it is to some
degree. The problem is that no one outside the non-ionizing radiation scientific community
has any real clue to *what* degree. If the international organizations have concluded it is
not, it takes, as they say, "extraordinary evidence" to prove them wrong. None of that has
been forthcoming, in particular nothing by Snake here. So it's a waste of time to take it
seriously. I've asked Snake for *one* single experiment done by *anyone* with real
credentials that uses the actual level of radiation from either a 5G phone or a tower to
cause subjects to get the virus. AFAIK there is no such experiment done anywhere by anyone.
So there is no evidence it happens - or for that matter, no evidence it doesn't except
current recognized science. Which, as I say, has been dismissed by the real experts.
Everything else is speculation - and conspiracy theory.
In general, I like conspiracy theories. They provide a fertile field for investigation -
if someone has the means to do so. Most conspiracy theorists don't have the means. They just
regurgitate the available reports - which, by definition, are unreliable - and engage in
"analysis", which really means speculation. Only on the ground investigation can begin to get
at the truth.
Back in 1968 or 1969, I forget which, I actually went to Point Pleasant, West Virginia, to
talk to people about the legendary "Mothman" that journalist John Keel had written about. I
talked to the cops involved, a stringer reporter who had accompanied Keel in his
investigations, and some of the UFO witnesses in the area. I couldn't establish what actually
happened from this, but it *did* confirm what Keel had written was what he was told.
Keel was an "old-school" journalist who believed in "ground truth". The problem with most
conspiracy theorists is that most of them don't have either the technical expertise or the
resources to get "ground truth". Keel himself told me once that he would go to a location, do
some investigation, deliver a talk of some sort, and write off his expenses as tax
write-offs, which he said the IRS was not happy about. And he was by no means rich, his books
never sold that much. Without a significant income, it's next to impossible to determine the
truth of 99% of the events in any given conspiracy theory.
Or for that matter, the truth in 99% of the main stream news. But it's not 100%. The other
problem conspiracy theorists have - and we see it here daily - is that just because a report
comes from the MSM, it *has* to be false in its *entirety*. Which is ridiculous. Most of the
MSM news is valid reporting. It's just how much is left out and how the spin is applied from
the wording or who the source was that is the problem. A few things might be completely made
up, but most things aren't. But if the reporter hasn't himself done the leg-work to verify
the statements of the sources, then it has to be considered unreliable or at least
incomplete.
Four years ago on June 15, 2016, a shadowy Internet persona calling itself "Guccifer 2.0"
appeared out of nowhere to claim credit for hacking emails from the Democratic National
Committee on behalf of WikiLeaks and implicate Russia by dropping "telltale" but synthetically
produced Russian "breadcrumbs" in his metadata.
Thanks largely to the corporate media, the highly damaging story actually found in those DNC
emails – namely, that the DNC had stacked the cards against Bernie Sanders in the party's
2016 primary – was successfully obscured .
The media was the message; and the message was that Russia had used G-2.0 to hack into the
DNC, interfering in the November 2016 election to help Donald Trump win.
Almost everybody still "knows" that – from the man or woman in the street to the
forlorn super sleuth, Special Counsel Robert Swan Mueller III, who actually based indictments
of Russian intelligence officers on Guccifer 2.0.
Blaming Russia was a magnificent distraction from the start and quickly became the
vogue.
The soil had already been cultivated for "Russiagate" by Democratic PR gems like Donald
Trump "kissing up" to former KGB officer Vladimir Putin and their "bromance" (bromides that
former President Barack Obama is still using). Four years ago today, "Russian meddling" was off
and running – on steroids – acquiring far more faux-reality than the evanescent
Guccifer 2.0 persona is likely to get.
Here's how it went down :
June 12: WikiLeaks founder Julian Assange announced he had "emails related to Hillary
Clinton which are pending publication."
June 14: DNC contractor CrowdStrike tells the media that malware has been found on the
DNC server and claims there is evidence it was injected by Russians.
June 15: Guccifer 2.0 arises from nowhere; affirms the DNC/CrowdStrike allegations of the
day before; claims responsibility for hacking the DNC; claims to be a WikiLeaks source; and
posts a document that forensic examination shows was deliberately tainted with "Russian
fingerprints." This to "corroborate" claims made by CrowdStrike executives the day
before.
Adding to other signs of fakery, there is hard evidence that G-2.0 was operating mostly in
U.S. time zones and with local settings peculiar to a device configured for use within the US ,
as Tim Leonard reports here and here .)
Leonard is a software developer who started to catalog and archive evidence related to
Guccifer 2.0 in 2017 and has issued detailed reports on digital forensic discoveries made by
various independent researchers – as well as his own – over the past three years.
Leonard points out that WikiLeaks said it did not use any of the emails G2.0 sent it, though it
later published similar emails, opening the possibility that whoever created G2.0 knew what
WikiLeaks had and sent it duplicates with the Russian fingerprints .
As Veteran Intelligence Professionals for Sanity (VIPS) told President Trump in a memorandum
of July 24, 2017, titled "Was the 'Russian Hack' an Inside Job?":
"We do not think that the June 12, 14, & 15 timing was pure coincidence. Rather, it
suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might
have been ready to publish and to 'show' that it came from a Russian hack."
We added this about Guccifer 2.0 at the time:
"The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any
independent forensics on the original 'Guccifer 2.0' material remains a mystery – as
does the lack of any sign that the 'hand-picked analysts' from the FBI, CIA, and NSA, who
wrote the misnomered 'Intelligence Community' Assessment dated January 6, 2017, gave any
attention to forensics."
Guccifer 2.0 Seen As a Fraud
In our July 24, 2017 memorandum we also told President Trump that independent cyber
investigators and VIPs had determined "that the purported 'hack' of the DNC by Guccifer 2.0 was
not a hack, by Russia or anyone else. Rather it originated with a copy (onto an external
storage device – a thumb drive, for example) by an insider. Information was leaked to
implicate Russia. We do not know who or what the murky Guccifer 2.0 is. You may wish to ask the
FBI. " [Emphasis added.].
Right. Ask the FBI. At this stage, President Trump might have better luck asking Attorney
General William Barr, to whom the FBI is accountable – at least in theory. As for Barr,
VIPs informed him in a June 5, 2020
memorandum that the head of CrowdStrike had admitted under oath on Dec. 5, 2017 that
CrowdStrike has no concrete evidence that the DNC emails published by WikiLeaks on July 22,
2016 were hacked – by Russia or by anyone else. [Emphasis added.] This important
revelation has so far escaped attention in the Russia-Russia-Russia "mainstream" media
(surprise, surprise, surprise!).
Back to the Birth of G-2
It boggles the mind that so few Americans could see Russiagate for the farce it was. Most of
the blame, I suppose, rests on a thoroughly complicit Establishment media. Recall: Assange's
announcement on June 12, 2016 that he had Hillary Clinton-related emails came just six weeks
before the Democratic convention. I could almost hear the cry go up from the DNC: Houston, We
Have a Problem!
Here's how bad the problem for the Democrats was. The DNC emails eventually published by
WikiLeaks on July 22, 2016, just three days before the Democratic convention, had been stolen
on May 23 and 25. This would have given the DNC time to learn that the stolen material included
documents showing how the DNC and Clinton campaign had manipulated the primaries and created a
host of other indignities, such that Sanders' chances of winning the nomination amounted to
those of a snowball's chance in the netherworld.
To say this was an embarrassment would be the understatement of 2016. Worse still, given the
documentary nature of the emails and WikiLeaks' enviable track record for accuracy, there would
be no way to challenge their authenticity. Nevertheless, with the media in full support of the
DNC and Clinton, however, it turned out to be a piece of cake to divert attention from the
content of the emails to the "act of war" (per John McCain) that the Russian "cyber attack" was
said to represent .
The outcome speaks as much to the lack of sophistication on the part of American TV
watchers, as it does to the sophistication of the Democrats-media complicity and cover-up. How
come so few could figure out what was going down?
It was not hard for some experienced observers to sniff a rat. Among the first to speak out
was fellow Consortium News columnist Patrick Lawrence, who immediately saw through the
Magnificent Diversion. I do not know if he fancies duck hunting, but he shot the Russiagate
canard quite dead – well before the Democratic convention was over.
Magnificent Diversion
In late July 2016, Lawrence was sickened, as he watched what he immediately recognized as a
well planned, highly significant deflection. The Clinton-friendly media was excoriating Russia
for "hacking" DNC emails and was glossing over what the emails showed ; namely, that the
Clinton Dems had pretty much stolen the nomination from Sanders.
It was already clear even then that the Democrats, with invaluable help from intelligence
leaks and other prepping to the media, had made good use of those six weeks between Assange's
announcement that he had emails "related to Hillary Clinton" and the opening of the
convention.
The media was primed to castigate the Russians for "hacking," while taking a prime role in
the deflection. It was a liminal event of historic significance, as we now know. The
"Magnificent Diversion" worked like a charm – and then it grew like Topsy.
Lawrence said he had "fire in the belly" on the morning of July 25 as the Democratic
convention began and wrote what follows pretty much "in one long, furious exhale" within 12
hours of when the media started really pushing the "the Russians-did-it"
narrative.
Below is a slightly shortened text of his
article :
"Now wait a minute, all you upper-case "D" Democrats. A flood light suddenly shines on your
party apparatus, revealing its grossly corrupt machinations to fix the primary process and sink
the Sanders campaign, and within a day you are on about the evil Russians having hacked into
your computers to sabotage our elections
Is this a joke? Are you kidding? Is nothing beneath your dignity? Is this how lowly you rate
the intelligence of American voters?
Clowns. Subversives. Do you know who you remind me of? I will tell you: Nixon, in his
famously red-baiting campaign – a disgusting episode – during his first run for the
Senate, in 1950. Your political tricks are as transparent and anti-democratic as his, it is
perfectly fair to say.
I confess to a heated reaction to events since last Friday [July 22] among the Democrats,
specifically in the Democratic National Committee. I should briefly explain
The Sanders people have long charged that the DNC has had its fingers on the scale, as one
of them put it the other day, in favor of Hillary Clinton's nomination. The prints were
everywhere – many those of Debbie Wasserman Schultz, who has repeatedly been accused of
anti-Sanders bias. Schultz, do not forget, co-chaired Clinton's 2008 campaign against Barack
Obama. That would be enough to disqualify her as the DNC's chair in any society that takes
ethics seriously, but it is not enough in our great country. Chairwoman she has been for the
past five years.
Last Friday WikiLeaks published nearly 20,000 DNC email messages providing abundant proof
that Sanders and his staff were right all along. The worst of these, involving senior DNC
officers, proposed Nixon-esque smears having to do with everything from ineptitude within the
Sanders campaign to Sanders as a Jew in name only and an atheist by conviction.
NEVER
MISS THE NEWS THAT MATTERS MOST
ZEROHEDGE DIRECTLY TO YOUR INBOX
Receive a daily recap featuring a curated list of must-read stories.
Wasserman fell from grace on Monday. Other than this, Democrats from President Obama to
Clinton and numerous others atop the party's power structure have had nothing to say, as in
nothing, about this unforgivable breach. They have, rather, been full of praise for Wasserman
Schultz. Brad Marshall, the D.N.C.'s chief financial officer, now tries to deny that his
Jew-baiting remark referred to Sanders. Good luck, Brad: Bernie is the only Jew in the
room.
The caker came on Sunday, when Robby Mook, Clinton's campaign manager, appeared on ABC's
"This Week" and CNN's "State of the Union" to assert that the D.N.C.'s mail was hacked "by the
Russians for the purpose of helping Donald Trump." He knows this – knows it in a matter
of 24 hours – because "experts" – experts he will never name – have told him
so.
What's disturbing to us is that experts are telling us that Russian state actors broke into
the DNC, stole these emails, and other experts are now saying that Russians are releasing these
emails for the purpose of helping Donald Trump.
Is that what disturbs you, Robby? Interesting. Unsubstantiated hocus-pocus, not the
implications of these events for the integrity of Democratic nominations and the American
political process? The latter is the more pressing topic, Robby. You are far too long on
anonymous experts for my taste, Robby. And what kind of expert, now that I think of it, is able
to report to you as to the intentions of Russian hackers – assuming for a sec that this
concocted narrative has substance?
Making lemonade out of a lemon, the Clinton campaign now goes for a twofer. Watch as it
advances the Russians-did-it thesis on the basis of nothing, then shoots the messenger, then
associates Trump with its own mess – and, finally, gets to ignore the nature of its
transgression (which any paying-attention person must consider grave).
Preposterous, readers. Join me, please, in having absolutely none of it. There is no
"Russian actor" at the bottom of this swamp, to put my position bluntly. You will never, ever
be offered persuasive evidence otherwise.
Reluctantly, I credit the Clinton campaign and the DNC with reading American paranoia well
enough such that they may make this junk stick. In a clear sign the entire crowd-control
machine is up and running, The New York Times had a long, unprofessional piece about Russian
culprits in its Monday editions. It followed Mook's lead faithfully: not one properly supported
fact, not one identified "expert," and more conditional verbs than you've had hot dinners
– everything cast as "could," "might," "appears," "would," "seems," "may." Nothing, once
again, as to the very serious implications of this affair for the American political
process.
Now comes the law. The FBI just announced that it will investigate – no, not the DNC's
fraudulent practices (which surely breach statutes), but "those who pose a threat in
cyberspace." it is the invocation of the Russians that sends me over the edge. My bones grow
weary
We must take the last few days' events as a signal of what Clinton's policy toward Russia
will look like should she prevail in November. Turning her party's latest disgrace into an
occasion for another round of Russophobia is mere preface, but in it you can read her
commitment to the new crusade.
Trump, to make this work, must be blamed for his willingness to negotiate with Moscow. This
is now among his sins. Got that? Anyone who says he will talk to the Russians has transgressed
the American code. Does this not make Hillary Clinton more than a touch Nixonian?
I am developing nitrogen bends from watching the American political spectacle. One can
hardly tell up from down. Which way for a breath of air?"
A year later Lawrence interviewed several of us VIPs, including our two former NSA technical
directors and on Aug. 9, 2017 published an
article for The Nation titled, "A New Report Raises Big Questions About Last Year's DNC
Hack."
Lawrence wrote, "Former NSA experts, now members of Veteran Intelligence Professionals for
Sanity (VIPs), say it wasn't a hack at all, but a leak – an inside job by someone with
access to the DNC's system."
And so it was. But, sadly, that cut across the grain of the acceptable Russia-gate narrative
at The Nation at the time. Its staff, seriously struck by the HWHW (Hillary Would Have Won)
virus, rose up in rebellion. A short time later, there was no more room at The Nation for his
independent-minded writing.
Drop-Hammer , 2 hours ago
His name was (((Seth Rich))).
zoomie92 , 1 hour ago
Direct USB download to chip or portable HD was the only way to get those download speed
shown on the file metadata. This has been proven in multiple independent ways. But the press
is filled with ******* retards - and so is the country.
Franko , 1 hour ago
Rest in Peace Mr Seth.
I believe many US officials have enough and want to tell the others about this.
Question:were they should be go to spread the news?To which country before been
assasinated?
To end like Julian Assange or like Snowden?
belogical , 2 hours ago
...Gucifer had much less to do with this than the Obama admin. They were using the
intelligence community for no good and as their crimes became visible they had to commit
bigger and bigger crimes to cover them up. In the end a large part of the DOJ, FBI and Obama
admin should be held accountable for this, but when you get this high they likely won't. You
can already see Lindsey Graham of the deep state finally holding hearing to spin the
narrative before the Durham probe becomes public. Unfortunate but only a few will get their
hands slapped and the true person, Obama who deserve to be prosecuted will likely skate.
PedroS , 2 hours ago
Crowdstrike. The owners should be in jail for their role.
Slaytheist , 2 hours ago
Crowdstrike IS Guccifer.
They were ordered by the criminal DNC org to cover the fact that the data was downloaded
internally, in order to hide the connection to the Podesta/Clinton ordered hit on person who
did it - Seth Rich.
Weedlord Bonerhitler , 3 hours ago
The computer of a DNC operative named Warren Flood was used to disseminate the Guccifer
2.0 disinfo tranche. Adam Carter had the analysis IIRC.
Giant Meteor , 3 hours ago
Always good to hear from Ray!
philipat , 39 minutes ago
Tick tock, still no indictments and soon the campaign will be in full swing so that
everything will be attacked as "political". Is Durham done?
I'm afraid it won't matter how thorough the alternative media debunking of Russiagate
becomes – as long as mainstream media sticks to the story, the neoliberal majority will
too, because it is like catnip to them, absolving responsibility for the defeat, casting
Clinton as the victim of an evil foreign despot, and delegitimizing Trump. Truth is tossed to
the wind by this freight train of powerful interests.
I have little hope Barr and Durham will indict anyone high level.
Ray twice mentioned something about Sanders getting hosed again in the 2020 primary. I
thought it seemed weird how suddenly the primary was declared "over." If there is evidence of
DNC shenanigans in 2020, that would be a very interesting and timely topic.
On June 12, Assange announces Wikileaks will soon be releasing "emails pertinent to
Hillary". On June 14th, Crowdstrike announces: someone, probably the Russians, has hacked the
DNC and taken a Trump opposition research document; the very next day, G2.0 makes his first
public appearance and posts the DNC's Trump oppo research document, with "Russian
fingerprints" intentionally implanted in its metadata. (We now know that he had actually
acquired this from PODESTA's emails, where it appears as an attachment – oops!)
Moreover, G2.0 announces that he was the source of the "emails pertinent to Hillary" –
DNC emails – that Assange was planning to release.
This strongly suggests that the G2.0 persona was working in collusion with Crowdstrike to
perpetrate the hoax that the GRU had hacked the DNC to provide their emails to Wikileaks.
Consistent with this, multiple cyberanalyses point to G2.0 working at various points In the
Eastern, Central, and Western US time zones. (A mere coincidence that the DNC is in the
eastern zone, and that Crowdstrike has offices in the central and western zones?)
If Crowdstrike honestly believed that the DNC had been hacked by the GRU, would there have
been any need for them to perpetrate this fraud?
It is therefore reasonable to suspect, as Ray McGovern has long postulated, that
Crowdstrike may have FAKED a GRU hack, to slander Russia and Assange, while distracting
attention from the content of the released emails.
As far as we know, the only "evidence" that Crowdstrike has for GRU being the perpetrator
of the alleged hack is the presence of "Fancy Bear" malware on the DNC server. But as
cyberanalysts Jeffrey Carr and George Eliason have pointed out, this software is also
possessed by Ukrainian hackers working in concert with Russian traitors and the Atlantic
Council – with which the founders of Crowdstrike are allied.
Here's a key question: When Assange announced the impending release of "emails pertinent
to Hillary" on June 12, how did Crowdstrike and G2.0 immediately know he was referring to DNC
emails? Many people – I, for example – suspected he was referring to her deleted
Secretary of State emails.
Here's a reasonable hypothesis – Our intelligence agencies were monitoring all
communications with Wikileaks. If so, they could have picked up the communications between SR
and Wikileaks that Sy Hersh's FBI source described. They then alerted the DNC that their
emails were about to leaked to Wikileaks. The DNC then contacted Crowdstrike, which arranged
for a "Fancy Bear hack" of the DNC servers. Notably, cyberanalysts have determined that about
2/3 of the Fancy Bear malware found on the DNC servers had been compiled AFTER the date that
Crowdstrike was brought in to "roust the hackers".
Of course, this elaborate hoax would have come to grief if the actual leaker had come
forward. Which might have had something to do with the subsequent "botched robbery" in which
SR was slain.
DNC staffer Seth Rich was murdered on July 10, 2016, amid contoversy over who provided DNC
emails to Wikileaks and over a pending lawsuit concerning voter suppression during the 2016
primaries. Wikileaks offered a $20,000 reward for information about his murder, leading some
to believe he was their source for the DNC emails. He was reported to have been a potential
witness in the voter suppression lawsuit filed the day after his death.
False flag operation by CIA or CrowdStrike as CIA constructor: CIA ears protrude above Gussifer 2.0 hat.
Notable quotes:
"... Guccifer 2.0 fabricated evidence to claim credit for hacking the DNC (using files that were really Podesta attachments) . ..."
"... Guccifer 2.0’s Russian breadcrumbs mostly came from deliberate processes & needless editing of documents . ..."
"... Guccifer 2.0’s Russian communications signals came from the persona choosing to use a proxy server in Moscow and choosing to use a Russian VPN service as end-points (and they used an email service that forwards the sender’s IP address, which made identifying that signal a relatively trivial task.) ..."
"... A considerable volume of evidence pointed at Guccifer 2.0’s activities being in American timezones (twice as many types of indicators were found pointing at Guccifer 2.0’s activities being in American timezones than anywhere else). ..."
"... The American timezones were incidental to other activities (eg. blogging , social media , emailing a journalist , archiving files , etc) and some of these were recorded independently by service providers. ..."
"... A couple of pieces of evidence with Russian indicators present had accompanying locale indicators that contradicted this which suggested the devices used hadn’t been properly set up for use in Russia (or Romania) but may have been suitable for other countries (including America) . ..."
"... On the same day that Guccifer 2.0 was plastering Russian breadcrumbs on documents through a deliberate process, choosing to use Russian-themed end-points and fabricating evidence to claim credit for hacking the DNC, the operation attributed itself to WikiLeaks. ..."
"... Guccifer 2.0 chose to use insecure communications to ask WikiLeaks to confirm receipt of “DNC emails” on July 6, 2016. Confirmation of this was not provided at that time but WikiLeaks did confirm receipt of a “1gb or so” archive on July 18, 2016. ..."
"... The alleged GRU officer we are told was part of an operation to deflect from Russian culpability suggested that Assange “may be connected with Russians”. ..."
"... Guccifer 2.0 fabricated evidence to claim credit for hacking the DNC, covered itself (and its files) in what were essentially a collection of “Made In Russia” labels through deliberate processes and decisions made by the persona, and, then, it attributed itself to WikiLeaks with a claim that was contradicted by subsequent communications between both parties. ..."
"... While we are expected to accept that Guccifer 2.0’s efforts between July 6 and July 18 were a sincere effort to get leaks to WikiLeaks, considering everything we now know about the persona, it seems fair to question whether Guccifer 2.0’s intentions towards WikiLeaks may have instead been malicious. ..."
"... Guccifer 2.0 was always John Brennan 1.0 ..."
"... Was Guccifer II part of the Stefan Halper organization that lured Papadopoulos and maliciously maligned others? ..."
"... I believe Guccifer 2.0 was created by the CIA to falsely pin blame on the Russians for info that Seth Rich gave to WikiLeaks. Read for yourself: http://g-2.space/ ..."
Why would an alleged GRU officer - supposedly part of an operation to deflect Russian culpability - suggest that
Assange “may be connected with Russians?”
In December, I reported on digital forensics evidence
relating to Guccifer 2.0 and highlighted several key points about the mysterious persona that Special Counsel Robert Mueller
claims was a front for Russian intelligence to leak Democratic Party emails to WikiLeaks:
A considerable volume of evidence pointed at
Guccifer 2.0’s activities being in American timezones (twice as many types of indicators were found pointing at Guccifer
2.0’s activities being in American timezones than anywhere else).
A couple of pieces of evidence with Russian indicators present had accompanying
locale indicators that contradicted this which suggested the devices used hadn’t been properly set up for use in Russia (or
Romania) but may have been suitable for other countries (including America).
On the same day that Guccifer 2.0 was plastering Russian breadcrumbs on documents through a deliberate process, choosing to
use Russian-themed end-points and fabricating evidence to claim credit for hacking the DNC, the operation attributed itself to WikiLeaks.
This article questions what Guccifer 2.0’s intentions were in relation to WikiLeaks in the context of what has been
discovered by independent researchers during the past three years.
Timing
On June 12, 2016, in an interview
with ITV’s Robert Peston, Julian Assange confirmed that WikiLeaks had emails relating to Hillary Clinton that the
organization intended to publish. This announcement was prior to any reported contact with Guccifer 2.0 (or with DCLeaks).
On June 14, 2016, an article was published
in The Washington Post citing statements from two CrowdStrike executives alleging that Russian intelligence hacked
the DNC and stole opposition research on Trump. It was apparent that the statements had been made in the 48 hours prior to
publication as they referenced claims of kicking hackers off the DNC network on the weekend just passed (June 11-12, 2016).
On that same date, June 14, DCLeaks contacted WikiLeaks via Twitter DM and for some reason suggested that both parties
coordinate their releases of leaks. (It doesn’t appear that WikiLeaks responded until September 2016).
[CrowdStrike President Shawn Henry testified under
oath behind closed doors on Dec. 5, 2017 to the U.S. House intelligence committee that his company had no evidence that Russian
actors removed anything from the DNC servers. This testimony was only released earlier
this month.]
By stating that WikiLeaks would “publish them soon” the Guccifer 2.0 operation implied that it had received
confirmation of intent to publish.
However, the earliest recorded communication between Guccifer 2.0 and WikiLeaks didn’t occur until a week later (June
22, 2016) when WikiLeaks reached out to Guccifer 2.0 and suggested that the persona send any new material to them
rather than doing what it was doing:
[Excerpt from Special Counsel Mueller’s report. Note: “stolen from the DNC” is an editorial insert by the special
counsel.]
If WikiLeaks had already received material and confirmed intent to publish prior to this direct message, why would
they then suggest what they did when they did? WikiLeaks says it had no prior contact with Guccifer 2.0 despite what
Guccifer 2.0 had claimed.
Here is the full conversation on that date (according to the application):
@WikiLeaks: Do you have secure communications?
@WikiLeaks: Send any new material here for us to review and it will have a much higher impact than what
you are doing. No other media will release the full material.
@GUCCIFER_2: what can u suggest for a secure connection? Soft, keys, etc? I’m ready to cooperate with
you, but I need to know what’s in your archive 80gb? Are there only HRC emails? Or some other docs? Are there any DNC docs?
If it’s not secret when you are going to release it?
@WikiLeaks: You can send us a message in a .txt file here [link redacted]
@GUCCIFER_2: do you have GPG?
Why would Guccifer 2.0 need to know what material WikiLeaks already had? Certainly, if it were anything Guccifer 2.0
had sent (or the GRU had sent) he wouldn’t have had reason to inquire.
The more complete DM details provided here also suggest that both parties had not yet established secure communications.
Further communications were reported to have taken place on June 24, 2016:
@GUCCIFER_2: How can we chat? Do u have jabber or something like that?
@WikiLeaks: Yes, we have everything. We’ve been busy celebrating Brexit. You can also email an encrypted
message to [email protected]. They key is here.
and June 27, 2016:
@GUCCIFER_2: Hi, i’ve just sent you an email with a text message encrypted and an open key.
@WikiLeaks: Thanks.
@GUCCIFER_2: waiting for ur response. I send u some interesting piece.
Guccifer 2.0 said he needed to know what was in the 88GB ‘insurance’ archive that WikiLeaks had posted on June 16,
2016 and it’s clear that, at this stage, secure communications had not been established between both parties (which would
seem to rule out the possibility of encrypted communications prior to June 15, 2016, making Guccifer 2.0’s initial claims about WikiLeaks even
more doubtful).
There was no evidence of WikiLeaks mentioning this to Guccifer 2.0 nor any reason for why WikiLeaks couldn’t
just send a DM to DCLeaks themselves if they had wanted to.
(It should also be noted that this Twitter DM activity between DCLeaks and Guccifer 2.0 is alleged by Mueller to be
communications between officers within the same unit of the GRU, who, for some unknown reason, decided to use Twitter DMs to
relay such information rather than just communicate face to face or securely via their own local network.)
Guccifer 2.0 lied about DCLeaks being a sub-project of WikiLeaks and then, over two months later, was seen trying to
encourage DCLeaks to communicate with WikiLeaks by relaying an alleged request from WikiLeaks that there is no
record of WikiLeaks ever making (and which WikiLeaks could have done themselves, directly, if they had wanted
to).
@GUCCIFER_2: hi there, check up r email, waiting for reply.
This was followed up on July 6, 2016 with the following conversation:
@GUCCIFER_2: have you received my parcel?
@WikiLeaks: Not unless it was very recent. [we haven’ t checked in 24h].
@GUCCIFER_2: I sent it yesterday, an archive of about 1 gb. via [website link]. and check your email.
@WikiLeaks: Wil[l] check, thanks.
@GUCCIFER_2: let me know the results.
@WikiLeaks: Please don’t make anything you send to us public. It’s a lot of work to go through it and the
impact is severely reduced if we are not the first to publish.
@GUCCIFER_2: agreed. How much time will it take?
@WikiLeaks: likely sometime today.
@GUCCIFER_2: will u announce a publication? and what about 3 docs sent u earlier?
@WikiLeaks: I don’t believe we received them. Nothing on ‘Brexit’ for example.
@GUCCIFER_2: wow. have you checked ur mail?
@WikiLeaks: At least not as of 4 days ago . . . . For security reasons mail cannot be checked for some
hours.
@GUCCIFER_2: fuck, sent 4 docs on brexit on jun 29, an archive in gpg ur submission form is too fucking
slow, spent the whole day uploading 1 gb.
@WikiLeaks: We can arrange servers 100x as fast. The speed restrictions are to anonymise the path. Just
ask for custom fast upload point in an email.
@GUCCIFER_2: will u be able to check ur email?
@WikiLeaks: We’re best with very large data sets. e.g. 200gb. these prove themselves since they’re too
big to fake.
@GUCCIFER_2: or shall I send brexit docs via submission once again?
@WikiLeaks: to be safe, send via [web link]
@GUCCIFER_2: can u confirm u received dnc emails?
@WikiLeaks: for security reasons we can’ t confirm what we’ve received here. e.g., in case your account
has been taken over by us intelligence and is probing to see what we have.
@GUCCIFER_2: then send me an encrypted email.
@WikiLeaks: we can do that. but the security people are in another time zone so it will need to wait some
hours.
@WikiLeaks: what do you think about the FBl’ s failure to charge? To our mind the clinton foundation
investigation has always been the more serious. we would be very interested in all the emails/docs from there. She set up
quite a lot of front companies. e.g in sweden.
@GUCCIFER_2: ok, i’ll be waiting for confirmation. as for investigation, they have everything settled, or
else I don’t know how to explain that they found a hundred classified docs but fail to charge her.
@WikiLeaks: She’s too powerful to charge at least without something stronger. s far as we know, the
investigation into the clinton foundation remains open e hear the FBI are unhappy with Loretta Lynch over meeting Bill,
because he’s a target in that investigation.
@GUCCIFER_2: do you have any info about marcel lazar? There’ve been a lot of rumors of late.
@WikiLeaks: the death? [A] fake story.
@WikiLeaks: His 2013 screen shots of Max Blumenthal’s inbox prove that Hillary secretly deleted at least
one email about Libya that was meant to be handed over to Congress. So we were very interested in his co-operation with the
FBI.
@GUCCIFER_2: some dirty games behind the scenes believe Can you send me an email now?
@WikiLeaks: No; we have not been able to activate the people who handle it. Still trying.
@GUCCIFER_2: what about tor submission? [W]ill u receive a doc now?
@WikiLeaks: We will get everything sent on [weblink].” [A]s long as you see \”upload succseful\” at the
end. [I]f you have anything hillary related we want it in the next tweo [sic] days prefable [sic] because the DNC is
approaching and she will solidify bernie supporters behind her after.
@GUCCIFER_2: ok. I see.
@WikiLeaks: [W]e think the public interest is greatest now and in early october.
@GUCCIFER_2: do u think a lot of people will attend bernie fans rally in philly? Will it affect the dnc
anyhow?
@WikiLeaks: bernie is trying to make his own faction leading up to the DNC. [S]o he can push for
concessions (positions/policies) or, at the outside, if hillary has a stroke, is arrested etc, he can take over the
nomination. [T]he question is this: can bemies supporters+staff keep their coherency until then (and after). [O]r will they
dis[s]olve into hillary’ s camp? [P]resently many of them are looking to damage hilary [sic] inorder [sic] to increase their
unity and bargaining power at the DNC. Doubt one rally is going to be that significant in the bigger scheme. [I]t seems many
of them will vote for hillary just to prevent trump from winning.
@GUCCIFER_2: sent brexit docs successfully.
@WikiLeaks: :))).
@WikiLeaks: we think trump has only about a 25% chance of winning against hillary so conflict between
bernie and hillary is interesting.
@GUCCIFER_2: so it is.
@WikiLeaks: also, it’ s important to consider what type of president hillary might be. If bernie and
trump retain their groups past 2016 in significant number, then they are a restraining force on hillary.
[Note: This was over a week after the Brexit referendum had taken place, so this will not have had any impact on the
results of that. It also doesn’t appear that WikiLeaks released any Brexit content around this time.]
On July 14, 2016, Guccifer 2.0 sent an email to WikiLeaks, this was covered in the Mueller report:
It should be noted that while the attachment sent was encrypted, the email wasn’t and both the email contents and name of the
file were readable.
The persona then opted, once again, for insecure communications via Twitter DMs:
@GUCCIFER_2: ping. Check ur email. sent u a link to a big archive and a pass.
@WikiLeaks: great, thanks; can’t check until tomorrow though.
On July 17, 2016, the persona contacted WikiLeaks again:
@GUCCIFER_2: what bout now?
On July 18, 2016, WikiLeaks responded and more was discussed:
@WikiLeaks: have the 1 Gb or so archive.
@GUCCIFER_2: have u managed to extract the files?
@WikiLeaks: yes. turkey coup has delayed us a couple of days. [O]therwise all ready[.]
@GUCCIFER_2: so when r u about to make a release?
@WikiLeaks: this week. [D]o you have any bigger datasets? [D]id you get our fast transfer details?
@GUCCIFER_2: i’ll check it. did u send it via email?
@WikiLeaks: yes.
@GUCCIFER_2: to [web link]. [I] got nothing.
@WikiLeaks: check your other mail? this was over a week ago.
@GUCCIFER_2:oh, that one, yeah, [I] got it.
@WikiLeaks: great. [D]id it work?
@GUCCIFER_2:[I] haven’ t tried yet.
@WikiLeaks: Oh. We arranged that server just for that purpose. Nothing bigger?
@GUCCIFER_2: let’s move step by step, u have released nothing of what [I] sent u yet.
@WikiLeaks: How about you transfer it all to us encrypted. [T]hen when you are happy, you give us the
decrypt key. [T]his way we can move much faster. (A]lso it is protective for you if we already have everything because then
there is no point in trying to shut you up.
@GUCCIFER_2: ok, i’ll ponder it
Again, we see a reference to the file being approximately one gigabyte in size.
Guccifer 2.0’s “so when r u about to make a release?” seems to be a question about his files. However, it could have been
inferred as generally relating to what WikiLeaks had or even material relating to the “Turkey Coup” that WikiLeaks had
mentioned in the previous sentence and that were published by the following day (July 19, 2016).
The way this is reported in the Mueller report, though, prevented this potential ambiguity being known (by not citing the
exact question that Guccifer 2.0 had asked and the context immediately preceding it.
Four days later, WikiLeaks published the DNC emails.
Later that same day, Guccifer 2.0 tweeted: “@wikileaks published #DNCHack docs I’d
given them!!!”.
Guccifer 2.0 chose to use insecure communications to ask WikiLeaks to confirm receipt of “DNC emails” on July 6, 2016.
Confirmation of this was not provided at that time but WikiLeaks did confirm receipt of a “1gb or so” archive on July 18,
2016.
Guccifer 2.0’s emails to WikiLeaks were also sent insecurely.
We cannot be certain that WikiLeaks statement about making a release was in relation to Guccifer 2.0’s material and
there is even a possibility that this could have been in reference to the Erdogan leaks published by WikiLeaks on July
19, 2016.
Ulterior Motives?
While the above seems troubling there are a few points worth considering:
Guccifer 2.0’s initial claim about sending WikiLeaks material(and
that they would publish it soon) appears to have been made without justification and seems to be contradicted by
subsequent communications from WikiLeaks.
If the archive was “about 1GB” (as Guccifer 2.0 describes it) then it would be too small to have been all of the
DNC’s emails (as these, compressed, came to 1.8GB-2GB depending on compression method used, which, regardless, would be
“about 2GB” not “about 1GB”). If we assume that these were DNC emails, where did the rest of them come from?
Assange has maintained
that WikiLeaks didn’t publish the material that Guccifer 2.0 had sent to them. Of course, Assange could just be
lying about that but there are some other possibilities to consider. If true, there is always a possibility that Guccifer 2.0
could have sent them material they had already received from another source or other emails from the DNC that they didn’t
release (Guccifer 2.0 had access to a lot of content relating to the DNC and Democratic party and the persona also offered
emails of Democratic staffers to Emma Best, a self-described journalist, activist and ex-hacker, the month after WikiLeaks published
the DNC emails, which, logically, must have been different emails to still have any value at that point in time).
On July 6, 2016, the same day that Guccifer 2.0 was trying to get WikiLeaks to confirm receipt of DNC emails (and
on which Guccifer 2.0 agreed not to publish material he had sent them), the persona posted a series of files to his blog
that were exclusively DNC email attachments.
It doesn’t appear any further communications were reported between the parties following the July 18, 2016 communications
despite Guccifer 2.0 tweeting on August 12, 2016: “I’ll send the major trove of the
#DCCC materials and emails to #wikileaks keep following…” and, apparently, stating
this to The Hill too.
As there are no further communications reported beyond this point it’s fair to question whether getting confirmation of
receipt of the archive was the primary objective for Guccifer 2.0 here.
Even though WikiLeaks offered Guccifer 2.0 a fast server for large uploads, the persona later suggested he needed
to find a resource for publishing a large amount of data.
Despite later claiming he would send (or had sent) DCCC content to WikiLeaks,WikiLeaks never
published such content and there doesn’t appear to be any record of any attempt to send this material to WikiLeaks.
Considering all of this and the fact Guccifer 2.0 effectively covered itself in “Made In Russia” labels (by plastering
files in Russian metadata and choosing to use a
Russian VPN service and a proxy in Moscow for
it’s activities) on the same day it first attributed itself to WikiLeaks, it’s fair to suspect that Guccifer 2.0 had
malicious intent towards WikiLeaks from the outset.
If this was the case, Guccifer 2.0 may have known about the DNC emails by June 30, 2016 as this is when the persona first
started publishing attachments from those emails.
Seth Rich Mentioned By Both Parties
WikiLeaks Offers Reward
On August 9, 2016, WikiLeaks tweeted:
ANNOUNCE: WikiLeaks has decided to issue a US$20k reward for information
leading to conviction for the murder of DNC staffer Seth Rich.
In an interview with Nieuwsuur that was posted the same day, Julian
Assange explained that the reward was for a DNC staffer who he said had been “shot in the back, murdered”. When the interviewer
suggested it was a robbery Assange disputed it and stated that there were no findings.
When the interviewer asked if Seth Rich was a source, Assange stated, “We don’t comment on who our sources are”.
When pressed to explain WikiLeaks actions, Assange stated that the reward was being offered because WikiLeaks‘
sources were concerned by the incident. He also stated that WikiLeaks were investigating.
Speculation and theories about Seth Rich being a source for WikiLeaks soon propagated to several sites and across
social media.
On that same day, in a DM conversation with the actress Robbin Young, Guccifer 2.0 claimed that Seth was his source (despite
previously claiming he obtained his material by hacking the DNC).
Why did Guccifer 2.0 feel the need to attribute itself to Seth at this time?
[Note: I am not advocating for any theory and am simply reporting on Guccifer 2.0’s effort to attribute itself to Seth
Rich following the propagation of Rich-WikiLeaks association theories online.]
Special Counsel Claims
In Spring, 2019, Special Counsel Robert Mueller, who was named to investigate Russian interference in the 2016 U.S. general
election, delivered his final report.
It claimed:
Guccifer 2.0 contradicted his own hacking claims to allege that Seth Rich was his source and did so on the same day that
Julian Assange was due to be interviewed by Fox News (in relation to Seth Rich).
No communications between Guccifer 2.0 and Seth Rich have ever been reported.
Suggesting Assange Connected To Russians
In the same conversation Guccifer 2.0 had with Robbin Young where Rich’s name is mentioned (on August 25, 2016), the
persona also provided a very interesting response to Young mentioning “Julian” (in reference to Julian Assange):
The alleged GRU officer we are told was part of an operation to deflect from Russian culpability suggested that
Assange “may be connected with Russians”.
Guccifer 2.0’s Mentions of WikiLeaks and Assange
Guccifer 2.0 mentioned WikiLeaks or associated himself with their output on several occasions:
July 22nd, 2016: claimed credit when WikiLeaks published the DNC leaks.
August 12, 2016: It was reported in The Hill that Guccifer 2.0 had released material to the publication. They
reported: “The documents released to The Hill are only the first section of a much larger cache. The bulk, the hacker
said, will be released on WikiLeaks.”
August 12, 2016: Tweeted that he would “send the major trove of the #DCCC materials
and emails to #wikileaks“.
September 15, 2016: telling DCLeaks that WikiLeaks wanted to get in contact with them.
October 4, 2016: Congratulating WikiLeaks on their 10th anniversary via
its blog. Also states: “Julian, you are really cool! Stay safe and sound!”. (This was the same day on which Guccifer
2.0 published his “Clinton Foundation” files that were clearly
not from the Clinton Foundation.)
October 17, 2016: via Twitter, stating “i’m here and ready for new releases.
already changed my location thanks @wikileaks for a good job!”
Guccifer 2.0 also made some statements in response to WikiLeaks or Assange being mentioned:
June 17, 2016: in response to The Smoking Gun asking if Assange would publish the same material it was
publishing, Guccifer 2.0 stated: “I gave WikiLeaks the
greater part of the files, but saved some for myself,”
August 22, 2016: in response to Raphael Satter suggesting that Guccifer 2.0 send leaks to WikiLeaks,the
persona stated: “I gave wikileaks a greater part of docs”.
August 25, 2016: in response to Julian Assange’s name being mentioned in a conversation with Robbin Young, Guccifer
2.0 stated: “he may be connected with Russians”.
October 18, 2016: a BBC reported asked Guccifer 2.0 if he was upset that WikiLeaks had “stole his thunder” and “do
you still support Assange?”. Guccifer 2.0 responded: “i’m
glad, together we’ll make America great again.”.
Guccifer 2.0 fabricated evidence to claim credit for hacking the DNC, covered itself (and its files) in what were essentially
a collection of “Made In Russia” labels through deliberate processes and decisions made by the persona, and, then, it attributed
itself to WikiLeaks with a claim that was contradicted by subsequent communications between both parties.
Guccifer 2.0 then went on to lie about WikiLeaks, contradicted its own hacking claims to attribute itself to Seth Rich
and even alleged that Julian Assange “may be connected with Russians”.
While we are expected to accept that Guccifer 2.0’s efforts between July 6 and July 18 were a sincere effort to get
leaks to WikiLeaks, considering everything we now know about the persona, it seems fair to question whether Guccifer
2.0’s intentions towards WikiLeaks may have instead been malicious.
xxx 2 minutes ago (Edited)
Everything involving the Russian hoax was set up by the Deep States around the world.
Implicate, discredit and destroy all those like Rich, Assange, Flynn and those who knew the
truth. Kill the messenger....literally.
xxx 10 minutes ago
here's what really happened:
an American hacker breached Podesta's gmail on March 13 2016 and then uploaded it to
Wikileaks via Tor sometime between April and May.
the NSA and CIA have hacked into Wikileaks' Tor file server to watch for new leaks to stay
ahead of them to prepare. they saw Podesta's emails leaked and launched a counter infowar
operation.
Brennan's CIA created the Guccifer 2.0 persona, with phony Russian metadata artifacts,
using digital forgery techniques seen in Vault7. Crowdstrike was already on the premises of
DNC since 2015, with their overly expensive security scanner watching the DNC network.
Crowdstrike had access to any DNC files they wanted. CIA, FBI and Crowdstrike colluded to
create a fake leak of DNC docs through their Guccifer 2.0 cutout. they didn't leak any docs
of high importance, which is why we never saw any smoking guns from DNC leaks or DCLeaks.
you have to remember, the whole point of this CIAFBINSA operation has nothing to do with
Hillary or Trump or influencing the election. the point was to fabricate criminal evidence to
use against Assange to finally arrest him and extradite him as well as smear Wikileaks ahead
of the looming leak of Podesta's emails.
if CIAFBINSA can frame Assange and Wikileaks as being criminal hackers and/or Russian
assets ahead of the Podesta leaks, then they can craft a narrative for the MSM to ignore or
distrust most of the Podesta emails. and that is exactly what happened, such as when Chris
Cuomo said on CNN that it was illegal for you to read Wikileaks, but not CNN, so you should
let CNN tell you what to think about Wikileaks instead of looking at evidence yourself.
this explains why Guccifer 2.0 was so sloppy leaving a trail of Twitter DMs to incriminate
himself and Assange along with him.
if this CIAFBINSA entrapment/frame operation ever leaks, it will guarantee the freedom of
Assange.
xxx 11 minutes ago
According to Wikipedia, "Guccifer" is Marcel Lazar Lehel, a Rumanian born in 1972, but
"Guccifer 2.0" is someone else entirely.
Is that so?
xxx 20 minutes ago (Edited)
The guy from Cyrptome always asserted Assange was some type of deep state puppet, that he
was connected somehow. This wouldn't be news to me and its probably why he was scared as
hell. The guy is as good as dead, like S. Hussein. Seth Rich was just a puppet that got
caught in the wrong game. He was expendable obviously too because well he had a big mouth, he
was expendable from the beginning. Somebody mapped this whole **** out, thats for sure.
xxx 28 minutes ago
I am sick and tired of these Deep State and CIA-linked operations trying to put a wrench
in the prosecution of people who were engaged in a coup d'etat.
xxx 29 minutes ago
********
xxx 33 minutes ago
At this point what difference does it make? We are all convinced since 2016. It is not
going to convince the TDS cases roaming the wilderness.
No arrests, no subpoenas, no warrants, no barging in at 3 am, no perp walks, no tv
glare...
Pres. Trump is playing a very risky game. Arrest now, or regret later. And you won't have
much time to regret.
The swamp is dark, smelly and deep,
And it has grudges to keep.
xxx 37 minutes ago
Meanwhile- Guccifer 1.0 is still?
- In prison?
- Released?
- 48 month sentence in 2016. Obv no good behavior.
Nice article. Brennan is the dolt he appears.
xxx 41 minutes ago
+1,000 on the investigative work and analyzing it.
Sadly, none of the guilty are in jail. Instead. Assange sits there rotting away.
xxx 44 minutes ago
Why would an alleged GRU officer - supposedly part of an operation to deflect Russian
culpability - suggest that Assange "may be connected with Russians?"
Because the AXIS powers of the CIA, Brit secret police and Israeli secret police pay for
the campaign to tie Assange to the Russians...
A lot of interest in this story about Psycho Joe Scarborough. So a young marathon runner
just happened to faint in his office, hit her head on his desk, & die? I would think
there is a lot more to this story than that? An affair? What about the so-called
investigator? Read story!
xxx 45 minutes ago
Why make it harder than it is? Guccifer II = Crowdstrike
xxx 51 minutes ago
Guccifer 2.0 was always John Brennan 1.0
xxx 58 minutes ago (Edited)
Was Guccifer II part of the Stefan Halper organization that lured Papadopoulos and
maliciously maligned others?
xxx 1 hour ago
"His name was Seth Rich." The unofficial motto of ZeroHedge...
xxx 1 hour ago
James Guccifer Clapper.
xxx 1 hour ago
Mossad. And their subsidiary CIA.
xxx 1 hour ago
Crowd Strike CEO'S admission under oath that they had no evidence the DNC was hacked by
the Russians should make the Russian Hoax predicate abundantly clear.
Justice for Seth Rich!
xxx 1 hour ago
Any influence Assange had on the election was so small that it wouldn't move the needle
either way. The real influence and election tampering in the US has always come from the
scores of lobbyists and their massive donations that fund the candidates election runs
coupled with the wildly inaccurate and agenda driven collusive effort by the MSM. Anyone
pointing fingers at the Russians is beyond blind to the unparalleled influence and power
these entities have on swaying American minds.
xxx 1 hour ago
ObamaGate.
xxx 1 hour ago (Edited)
Uugh ONCE AGAIN... 4chan already proved guccifer 2.0 was a larp, and the files were not
"hacked", they were leaked by Seth Rich. The metadata from the guccifer files is different
from the metadata that came from the seth rich files. The dumb fuckers thought they were
smart by modifying the author name of the files to make it look like it came from a russian
source. They were so ******* inept, they must have forgot (or not have known) to modify the
unique 16 digit hex key assigned to the author of the files when they were created..... The
ones that seth rich copied had the system administrators name (Warren Flood) as the author
and the 16 digit hex key from both file sources were the same - the one assigned to warren
flood.
Really sloppy larp!!!
xxx 1 hour ago
This link has all the detail to show Guccifer 2.0 was not Russia. I believe Guccifer 2.0
was created by the CIA to falsely pin blame on the Russians for info that Seth Rich gave to
WikiLeaks. Read for yourself: http://g-2.space/
xxx 1 hour ago
This is what people are. Now the species has more power than it can control and that it
knows what to do with.
What do you think the result will be?
As for these games of Secret - it's more game than anything truly significant. The
significant exists in the bunkers, with the mobile units, in the submarines. Et. al.
But this is a game in which some of the players die - or wish they were dead.
xxx 1 hour ago
And.....?
Public figures and political parties warrant public scrutiny. And didn't his expose in
their own words expose the democrats, the mass media, the bureaucracy to the corrupt frauds
that they are?
xxx 1 hour ago
Other than the fact that they didn't steal the emails (unless you believe whistleblowers
are thief's, one mans source is another mans thief, it's all about who's ox is being gored
and you love "leaks" don't you? As long as they work in your favor. Stop with the piety.
xxx 15 minutes ago
That's not the story at all. Did you just read this article?
The democrats were super duper corrupt (before all of this).
They fucked around to ice Bernie out of the primary.
A young staffer Seth Rich knew it and didn't like it. He made the decision to leak the
info to the most reputable org for leaks in the world Wikileaks.
IF the DNC had been playing fair, Seth Rich wouldn't have felt the need to leak.
So, the democrats did it to themselves.
And then they created Russiagate to cover it all up.
And murdered a young brave man ... as we know.
xxx 1 hour ago
Assange, another problem Trump failed to fix.
xxx 1 hour ago
Sounds like it came from the same source as the Trump dossier ... MI5.
"... With the entirety of Russigate finally collapsing under the enormous weight and stench of its own BS, the picture that is beginning
to emerge for me is one of an insider deep-state psy-op designed to cover for the crimes committed by the DNC, the Clinton Foundation
and the 2016 Hillary campaign; kill for the foreseeable future any progressive threat to the neo-liberal world order; and take down
a president that the bipartisan DC and corporate media elite fear and loathe. And why do they fear him? Because he is free to call them
out on certain aspects of their criminality and corruption, and has. ..."
"... Hubris, cynicism and a basic belief in the stupidity of the US public all seem to have played a part in all this, enabled by
a corporate media with a profit motive and a business model that depends on duping the masses. ..."
"... Anyone who still believes in democracy in the USA has his head in the sand (or someplace a lot smellier). ..."
"... The corruption in the USA is wide and deep and trump is NOT draining the swamp. ..."
"... A further point: the Mueller report insinuates that G2.0 had transferred the DNC emails to Wikileaks as of July 18th, and Wikileaks
then published them on July 22nd. This is absurd for two reasons: There is no way in hell that Wikileaks could have processed the entire
volume of those emails and attachments to insure their complete authenticity in 4 days. ..."
"... Indeed, when Crowdstrike's Shawn Henry had been chief of counterintelligence under Robert Mueller, he had tried to set Assange
up by sending Wikileaks fraudulent material; fortunately, Wikileaks was too careful to take the bait. ..."
Fascinating, important and ultimately deeply disturbing. This is why I come to Consortium News.
With the entirety of Russigate finally collapsing under the enormous weight and stench of its own BS, the picture that
is beginning to emerge for me is one of an insider deep-state psy-op designed to cover for the crimes committed by the DNC, the
Clinton Foundation and the 2016 Hillary campaign; kill for the foreseeable future any progressive threat to the neo-liberal world
order; and take down a president that the bipartisan DC and corporate media elite fear and loathe. And why do they fear him? Because
he is free to call them out on certain aspects of their criminality and corruption, and has.
Hubris, cynicism and a basic belief in the stupidity of the US public all seem to have played a part in all this, enabled
by a corporate media with a profit motive and a business model that depends on duping the masses.
Anonymous , May 22, 2020 at 12:01
These convos alone look like a script kiddie on IRC doing their low functioning version of sock puppetry. Didn't know anyone
at all fell for that
Ash , May 22, 2020 at 17:21
Because smooth liars in expensive suits told them it was true in their authoritative TV voices? Sadly they don't even really
need to try hard anymore, as people will evidently believe anything they're told.
Bob Herrschaft , May 22, 2020 at 12:00
The article goes a long way toward congealing evidence that Guccifer 2.0 was a shill meant to implicate Wikileaks in a Russian
hack. The insinuation about Assange's Russian connection was over the top if Guccifer 2.0 was supposed to be a GRU agent and the
mention of Seth Rich only contradicts his claims.
OlyaPola , May 22, 2020 at 10:40
Spectacles are popular.Although less popular, the framing and derivations of plausible belief are of more significance; hence
the cloak of plausible denial over under-garments of plausible belief, in facilitation of revolutions of immersion in spectacles
facilitating spectacles' popularity.
Some promoters of spectacles believe that the benefits of spectacles accrue solely to themselves, and when expectations appear
to vary from outcomes, they resort to one-trick-ponyness illuminated by peering in the mirror.
Skip Scott , May 22, 2020 at 08:35
This is a great article. I think the most obvious conclusion is that Guccifer 2.0 was a creation to smear wikileaks and distract
from the CONTENT of the DNC emails. The MSM spent the next 3 years obsessed by RussiaGate, and spent virtually no effort on the
DNC and Hillary's collusion in subverting the Sander's campaign, among other crimes.
I think back to how many of my friends were obsessed with Rachel Madcow during this period, and how she and the rest of the
MSM served the Empire with their propaganda campaign. Meanwhile, Julian is still in Belmarsh as the head of a "non-state hostile
intelligence service," the Hillary camp still runs the DNC and successfully sabotaged Bernie yet again (along with Tulsi), and
the public gets to choose between corporate sponsored warmonger from column A or B in 2020.
Anyone who still believes in democracy in the USA has his head in the sand (or someplace a lot smellier).
Guy , May 22, 2020 at 12:19
Totally agree .The corruption in the USA is wide and deep and trump is NOT draining the swamp.
I take it the mentioned time zones are consistent with Langley.
treeinanotherlife , May 22, 2020 at 00:34
"Are there only HRC emails? Or some other docs? Are there any DNC docs?"
G2 is fishing to see if Wiki has DNC docs. Does not say "any DNC docs I sent you". And like most at time thought Assange's
"related to hillary" phrase likely (hopefully for some) meant Hillary's missing private server emails. For certain G2 is not an
FBI agent>s/he knows difference between HRC and DNC emails.
A further point: the Mueller report insinuates that G2.0 had transferred the DNC emails to Wikileaks as of July 18th, and Wikileaks
then published them on July 22nd. This is absurd for two reasons: There is no way in hell that Wikileaks could have processed
the entire volume of those emails and attachments to insure their complete authenticity in 4 days.
Indeed, it is reasonable to expect that Wikileaks had been processing those emails since at least June 12, when Assange announced
their impending publication. (I recall waiting expectantly for a number of weeks as Wikileaks processed the Podesta emails.) Wikileaks
was well aware that, if a single one of the DNC emails they released had been proved to have been fraudulent, their reputation
would have been toast. Indeed, when Crowdstrike's Shawn Henry had been chief of counterintelligence under Robert Mueller,
he had tried to set Assange up by sending Wikileaks fraudulent material; fortunately, Wikileaks was too careful to take the bait.
Secondly, it is inconceivable that a journalist as careful as Julian would, on June 12th, have announced the impending publication
of documents he hadn't even seen yet. And of course there is no record of G2.0 having had any contact with Wikileaks prior to
that date.
It is a great pleasure to see "Adam Carter"'s work at long last appear in such a distinguished venue as Consortium News. It
does credit to them both.
Skip Edwards , May 22, 2020 at 12:33
How can we expect justice when there is no justification for what is being done by the US and British governments to Julian
Assange!
"... The computer used to create the original Warren Document (dated 2008) was a US Government computer issued to the Obama Presidential
Transition Team by the General Services Administration. ..."
"... The Warren Document and the 1.DOC were created in the United States using Microsoft Word software (2007) that is registered
to the GSA. ..."
"... The author of both 1.doc and the PDF version is identified as "WARREN FLOOD." ..."
"... "Russian" fingerprints were deliberately inserted into the text and the meta data of "1.doc." ..."
"... This begs a very important question. Did Warren Flood actually create these documents or was someone masquerading as Warren
Flood? Unfortunately, neither the Intelligence Community nor the Mueller Special Counsel investigators provided any evidence to show
they examined this forensic data. More troubling is the fact that the Microsoft Word processing software being used is listed as a GSA
product. ..."
"... If this was truly a Russian GRU operation (as claimed by Mueller), why was the cyber spy tradecraft so sloppy? ..."
"... The name of Warren Flood, an Obama Democrat activist and Joe Biden's former Director of Information Technology, appears in
at least three iterations of these documents. Did he actually masquerade as Guccifer 2.0? If so, did he do it on his own or was he hired
by someone else? These remain open questions that deserve to be investigated by John Durham, the prosecutor investigating the attempted
coup against Donald Trump, and/or relevant committees of the Congress. ..."
"... There are other critical unanswered questions. Obama's Attorney General, Loretta Lynch, sent a letter to James come on July
26, 2016 about the the DNC hack. Lynch wrote concerning press reports that Russia attacked the DNC: ..."
"... A genuine investigation of the DNC hack/leak should have included interviews with all DNC staff, John Podesta, Warren Flood
and Ellen Nakashima, The Washington Post reporter who broke the story of the DNC hack. Based on what is now in the public record, the
FBI failed to do a proper investigation. ..."
"... Resolving who was behind Guccifer 2.0 and DCLeaks seems to me to be a rather simple investigative exercise. That is, somebody
registered and bought the names of G2 and DCL. One can't have a Wordpress blog without purchasing a url. So, there is a record of this
registration, right? Simply subpoena the company who sold/rented the url. ..."
"... It's now obvious that we don't have a functioning intel/justice apparatus in the U.S. This is the message sent and received
by the intel/justice shops over and again. They no longer work for Americans rather they work against us. ..."
Why does the name of Joe Biden's former Internet Technology guru, Warren Flood, appear in the meta data of documents posted on
the internet by Guccifer 2.0? In case you do not recall, Guccifer 2.0 was identified as someone tied to Russian intelligence who
played a direct role in stealing emails from John Podesta. The meta data in question indicates the name of the person who actually
copied the original document. We have this irrefutable fact in the documents unveiled by Guccifer 2.0--Warren Flood's name appears
prominently in the meta data of several documents attributed to "Guccifer 2.0." When this transpired, Flood was working as the CEO
of his own company, BRIGHT BLUE DATA. (brightbluedata.com). Was Flood tasked to masquerade as a Russian operative?
Give Flood some props if that is true--he fooled our Intelligence Community and the entire team of Mueller prosecutors into believing
that Guccifer was part of a Russian military intelligence cyber attack. But a careful examination of the documents shows that it
is highly unlikely that this was an official Russian cyber operation. Here's what the U.S. Intelligence Community wrote about Guccifer
2.0 in their very flawed January 2017 Intelligence Community Assessment:
We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data
obtained in cyber operations publicly and in exclusives to media outlets.
Guccifer 2.0, who claimed to be an independent Romanian hacker, made multiple contradictory statements and false claims about
his likely Russian identity throughout the election. Press reporting suggests more than one person claiming to be Guccifer 2.0
interacted with journalists.
Content that we assess was taken from e-mail accounts targeted by the GRU in March 2016 appeared on DCLeaks.com starting in
June.
The laxity of the Intelligence Community in dealing with empirical evidence was matched by a disturbing lack of curiosity on the
part of the Mueller investigators and prosecutors. Here's the tall tale they spun about Guccifer 2.0:
On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents.
In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as "Fancy Bear") were
responsible for the breach. Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona Guccifer
2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into a Moscow-based
server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including "some hundred
sheets," "illuminati," and "worldwide known." Approximately two hours after the last of those searches, Guccifer 2.0 published its
first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that
the GRU officers had searched for that day.
[Apelbaum note--According to Crowdstrike and Special Counsel Mueller, both were present, APT28 AKA "Fancy Bear" and APT29 AKA
"Cozy Bear".]
The claims by both the Intelligence Community and the Mueller team about Guccifer 2.0 are an astounding, incredible denial of
critical evidence pointing to a U.S. actor, not a Russian or Romanian. No one in this "august" group took the time to examine the
metadata on the documents posted by "Guccifer 2.0" to his website on June 15, 2016.
I wish I could claim credit for the following forensic analysis, but the honors are due to Yaacov Apelbaum. While there are many
documents in the Podesta haul that match the following pattern, this analysis focuses only on a document originally created by the
DNC's Director of Research, Lauren Dillon. This document is the Trump Opposition Report document.
According to Apelbaum , the Trump Opposition
Report document, which was "published" by Guccifer 2.0, shows clear evidence of digital manipulation:
A US based user (hereafter referred to as G2 ) operating initially from the West coast and then, subsequently, from the East
coast, changes the MS Word 2007 and Operating System language settings to Russian.
G2 opens and saves a document with the file name, "12192015 Trump Report - for dist-4.docx". The document bears the title,
"Donald Trump Report" (which was originally composed by Lauren Dillon aka DILLON REPORT) as an RTF file and opens it again.
G2 opens a second document that was attached to an email sent on December 21, 2008 to John Podesta from [email protected].
This WORD document lists prospective nominees for posts in the Department of Agriculture for the upcoming Obama Administration.
It was generated by User--Warren Flood--on a computer registered to the General Services Administration (aka GSA) named "Slate_-_Domestic_-_USDA_-_2008-12-20-3.doc",
which was kept by Podesta on his private Gmail account. (I refer to this as the "WARREN DOCUMENT" in this analysis.)
G2 deletes the content of the 2008 Warren Document and saves the empty file as a RTF, and opens it again.
G2 copies the content of the 'Dillon Report' (which is an RTF document) and pastes it into the 2008 Warren Document template,
i.e. the empty RTF document.
G2 user makes several modifications to the content of this document. For example, the Warren Document contained the watermark--"CONFIDENTIAL
DRAFT". G2 deleted the word "DRAFT" but kept the "CONFIDENTIAL" watermark.
G2 saves this document into a file called "1.doc". This document now contains the text of the original Lauren Dillon "Donald
Trump Report" document, but also contains Russian language URL links that generate error messages.
G2's 1.DOC (the Word version of the document) shows the following meta data authors:
Created at 6/15/2016 at 1:38pm by "WARREN FLOOD"
Last Modified at 6/15/2016 at 1:45pm by "Феликс Эдмундович" (Felix Edmundovich, the first and middle name of Dzerzhinsky,
the creator of the predecessor of the KGB. It is assumed the Felix Edmundovich refers to Dzerzhinsky.)
G2 also produces a pdf version of this document almost four hours later. It is created at 6/15/201`6 at 5:54:15pm by "WARREN
FLOOD."
G2 first publishes "1.doc" to various media outlets and then uploads a copy to the Guccifer 2.0 WordPress website (which is
hosted in the United States).
There are several critical facts from the metadata that destroy the claim that Guccifer 2.0 was a Romanian or a Russian.
The computer used to create the original Warren Document (dated 2008) was a US Government computer issued to the Obama
Presidential Transition Team by the General Services Administration.
The Warren Document and the 1.DOC were created in the United States using Microsoft Word software (2007) that is registered
to the GSA.
The author of both 1.doc and the PDF version is identified as "WARREN FLOOD."
The copy of "1.doc" was uploaded to a server hosted in the United States.
"Russian" fingerprints were deliberately inserted into the text and the meta data of "1.doc."
This begs a very important question. Did Warren Flood actually create these documents or was someone masquerading as Warren
Flood? Unfortunately, neither the Intelligence Community nor the Mueller Special Counsel investigators provided any evidence to show
they examined this forensic data. More troubling is the fact that the Microsoft Word processing software being used is listed as
a GSA product.
If this was truly a Russian GRU operation (as claimed by Mueller), why was the cyber spy tradecraft so sloppy? A covert
cyber operation is no different from a conventional human covert operation, which means the first and guiding principle is to not
leave any fingerprints that would point to the origin of the operation. In other words, you do not mistakenly leave flagrant Russian
fingerprints in the document text or metadata. A good cyber spy also will not use computers and servers based in the United States
and then claim it is the work of a hacker ostensibly in Romania.
None of the Russians indicted by Mueller in his case stand accused of doing the Russian hacking while physically in the United
States. No intelligence or evidence has been cited to indicate that the Russians stole a U.S. Government computer or used a GSA supplied
copy of Microsoft Word to produce the G2 documents.
The name of Warren Flood, an Obama Democrat activist and Joe Biden's former Director of Information Technology, appears in
at least three iterations of these documents. Did he actually masquerade as Guccifer 2.0? If so, did he do it on his own or was he
hired by someone else? These remain open questions that deserve to be investigated by John Durham, the prosecutor investigating the
attempted coup against Donald Trump, and/or relevant committees of the Congress.
If foreign intelligence agencies are attempting to undermine that process, the U.S. government should treat such efforts even
more seriously than standard espionage. These types ofcyberattacks are significant and pernicious crimes. Our government must do
all that it can to stop such attacks and to seek justice for the attacks that have already occurred.
We are writing to request more information on this cyberattack in particular and more information in general on how the Justice
Department, FBI, and NCIJTF attempt to prevent and punish these types ofcyberattacks. Accordingly, please respond to the following
by August 9, 2016:
When did the Department of Justice, FBI, and NCIJTF first learn of the DNC hack? Was the government aware ofthe intrusion
prior to the media reporting it?
Has the FBI deployed its Cyber Action Team to determine who hacked the DNC?
Has the FBI determined whether the Russian government, or any other foreign
government, was involved in the hack?
In general, what actions, if any, do the Justice Department, FBI, and NCIJTF take to prevent cyberattacks on non-governmental
political organizations in the U.S., such as campaigns and political parties? Does the government consult or otherwise communicate
with the organizations to inform them ofpotential threats, relay best practices, or inform them ofdetected cyber intrusions.
Does the Justice Department believe that existing statutes provide an adequate basis for addressing hacking crimes of this
nature, in which foreign governments hack seemingly in order to affect our electoral processes?
So far no document from Comey to Lynch has been made available to the public detailing the FBI's response to Lynch's questions.
Why was the Cyber Action Team not deployed to determine who hacked the DNC? A genuine investigation of the DNC hack/leak should
have included interviews with all DNC staff, John Podesta, Warren Flood and Ellen Nakashima, The Washington Post reporter who broke
the story of the DNC hack. Based on what is now in the public record, the FBI failed to do a proper investigation.
Of course sleepy Joe was in on the overall RussiaGate operation. And now another reasonable question by sleuth extraordinaire
will fall into the memory hole b/c no one who has the authority and the power in DC is ever going to address, let alone, clean
up and hold accountable any who created this awful mess.
Resolving who was behind Guccifer 2.0 and DCLeaks seems to me to be a rather simple investigative exercise. That is, somebody
registered and bought the names of G2 and DCL. One can't have a Wordpress blog without purchasing a url. So, there is a record
of this registration, right? Simply subpoena the company who sold/rented the url.
What's troubling to me is that even the most simplest investigative acts to find answers never seems to happen. Instead, more
than three years later we're playing 'Whodunit.'
It's been over 3 years now and if we had a truly functioning intel/justice apparatus this simple act would have been done long
ago and then made public. Yet, here we are more than three years later trying to unravel, figure out or resolve the trail of clues
via metadata the pranksters left behind.
It's now obvious that we don't have a functioning intel/justice apparatus in the U.S. This is the message sent and received
by the intel/justice shops over and again. They no longer work for Americans rather they work against us.
An alternative view that has been circulating for several years suggests that it was not a
hack at all, that it was a deliberate whistleblower-style
leak of information carried out by an as yet unknown party, possibly Rich, that may have
been provided to WikiLeaks for possible political reasons, i.e. to express disgust with the DNC
manipulation of the nominating process to damage Bernie Sanders and favor Hillary Clinton.
There are, of course, still other equally non-mainstream explanations for how the bundle of
information got from point A to point B, including that the intrusion into the DNC server was
carried out by the CIA which then made it look like it had been the Russians as
perpetrators. And then there is the hybrid point of view, which is essentially that the
Russians or a surrogate did indeed intrude into the DNC computers but it was all part of normal
intelligence agency probing and did not lead to anything. Meanwhile and independently, someone
else who had access to the server was downloading the information, which in some fashion made
its way from there to WikiLeaks.
Both the hack vs. leak viewpoints have marshaled considerable technical analysis in the
media to bolster their arguments, but the analysis suffers from the decidedly strange fact that
the FBI never even examined the DNC servers that may have been involved. The hack school of
thought has stressed that Russia had both the ability and motive to interfere in the election
by exposing the stolen material while the leakers have recently asserted that the sheer volume of
material downloaded indicates that something like a higher speed thumb drive was used,
meaning that it had to be done by someone with actual physical direct access to the DNC system.
Someone like Seth Rich.
... ... ...
Given all of that back story, it would be odd to find Trump making an offer that focuses
only on one issue and does not actually refute the broader claims of Russian interference,
which are based on a number of pieces of admittedly often dubious evidence, not just the
Clinton and Podesta emails.
Which brings the tale back to Seth Rich. If Rich was indeed responsible for the theft of the
information and was possibly killed for his treachery, it most materially impacts on the
Democratic Party as it reminds everyone of what the Clintons and their allies are capable
of.
It will also serve as a warning of what might be coming at the Democratic National
Convention in Milwaukee in July as the party establishment uses fair means or foul to stop
Bernie Sanders. How this will all play out is anyone's guess, but many of those who pause to
observe the process will be thinking of Seth Rich.
I don't ascribe to the idea that the intel agencies kill American citizens without a great
deal of thought, but in Rich's case, they probably felt like they had no choice. Think about
it: The DNC had already rigged the primary against Bernie, the Podesta emails had already
been sent to Wikileaks, and if Rich's cover was blown, then he would publicly identify
himself as the culprit (which would undermine the Russiagate narrative) which would split the
Democratic party in two leaving Hillary with no chance to win the election.
I can imagine Hillary and her intel connections looking for an alternative to whacking
Rich but eventually realizing that there was no other way to deflect responsibility for the
emails while paving the way for an election victory.
If Seth Rich went public, then Hillary would certainly lose.
I imagine this is what they were thinking when they decided there was really only one
option.
"I have watched incredulous as the CIA's blatant lie has grown and grown as a media story
– blatant because the CIA has made no attempt whatsoever to substantiate it. There is
no Russian involvement in the leaks of emails showing Clinton's corruption." https://www.craigmurray.org.uk/archives/2016/12/cias-absence-conviction/
@plantman It's more than Hillary losing. It would have been easy to connect the dots of
the entire plot to get Trump. Furthermore, it would have linked Obama and his cohorts in ways
that the country might have exploded. This was the beginning of a Coup De'tat that would have
shown the American political process is a complete joke.
To understand why the DNC mobsters and the Deep State hate him, watch this great 2016
interview where Assange calmly explains the massive corruption that patriotic FBI agents
refer to as the "Clinton Crime Family." This gang is so powerful that it ordered federal
agents to spy on the Trump political campaign, and indicted and imprisoned some participants
in an attempt to pressure President Trump to step down. It seems Trump still fears this gang,
otherwise he would order his attorney general to drop this bogus charge against Assange, then
pardon him forever and invite him to speak at White House press conferences.
Well, here was my own take on the controversy a couple of years ago, and I really haven't
seen anything to change my mind:
Well, DC is still a pretty dangerous city, but how many middle-class whites were
randomly murdered there that year while innocently walking the streets? I wouldn't be
surprised if Seth Rich was just about the only one.
Julian Assange has strongly implied that Seth Rich was the source of the DNC emails that
cost Hillary Clinton the presidency. So if Seth Rich died in a totally random street
killing not long afterward, isn't that just the most astonishing coincidence in all of
American history?
Consider that the leaks effectively nullified the investment of the $2 billion or so
that her donors had provided, and foreclosed the flood of good jobs and appointments to her
camp-followers, not to mention the oceans of future graft. Seems to me that's a pretty good
motive for murder.
Here's my own plausible speculation from a couple of months ago:
Incidentally, I'd guess that DC is a very easy place to arrange a killing, given that
until the heavy gentrification of the last dozen years or so, it was one of America's
street-murder capitals. It seems perfectly plausible that some junior DNC staffer was at
dinner somewhere, endlessly cursing Seth Rich for having betrayed his party and
endangered Hillary's election, when one of his friends said he knew somebody who'd be
willing to "take care of the problem" for a thousand bucks
Let's say a couple of hundred thousand middle-class whites lived in DC around then, and
Seth Rich was about the only one that year who died in a random street-killing, occurring not
long after the leak.
Wouldn't that seem like a pretty unlikely coincidence?
"If Rich was indeed responsible for the theft of the information and was possibly killed for
his treachery ."
Heroism is the proper term for what Seth Rich did. He saw the real treachery, against
Bernie Sanders and the democratic faithful who expect at least a modicum of integrity from
their Party leaders (even if that expectation is utterly fanciful, wishful thinking), and he
decided to act. He paid for it with his life. A young, noble life.
In every picture I've seen of him, he looks like a nice guy, a guy who cared. And now he's
dead. And the assholes at the DNC simply gave him a small plaque over a bike rack, as I
understand it.
Seth Rich: American Hero. A Truth-Teller who paid the ultimate price.
Great reporting, Phil. Another home run.
(And thanks to Ron for chiming in. Couldn't agree more. As a Truth-Teller extraordinaire,
please watch your back, Bro. And Phil, too. You both know what these murderous scum are
capable of.)
Because the {real} killers of JFK, MLK and RFK were never detained and jailed/hanged, why
would one expect a lesser known, more ordinary individual's murder [Seth] to be solved?
Seymour Hersh, in a taped phone conversation, claimed to have access to an FBI report on the
murder. According to Hersh, the report indicated tha FBI Cyber Unit examined Rich's computer
and found he had contacted Wikileaks with the intention of selling the emails.
Another reason Assange may not want to reveal it, if Seth Rich was a source for Wikileaks,
could be that Seth Rich didn't act alone, and revealing Seth's involvement would compromise
the other(s).
Or it could simply be that Wikileaks has promised to never reveal a source, even after
that source's death, as a promise to future potential sources, who may never want their
identities revealed, to avoid the thought of embarrassment or repercussions to their
associates or families.
Incidentally, they only started really going after Assange after the Vault 7 leaks of the
CIA's active bag of software tricks. I think, for Assange's sake, they should instead have
held on to that, and made it the payload of a dead man's switch.
I'm not sure how credible the source is but Ellen Ratner, the sister of Assange's former
lawyer and a journalist, told Ed Butowsky that Assange told her that it was Seth Rich. She
asked Butowsky to contact Rich's parents. She confirms the Assange meeting in an interview,
link below. Butowsky does not seem to be a credible source but Ratner does. If it was Seth
Rich then I have no doubt that his brother knows the details and the family does not want to
lose another son.
"According to Assange's lawyers, Rohrabacher offered a pardon from President Trump if Assange
were to provide information that would attribute the theft or hack of the Democratic National
Committee emails to someone other than the Russians."
Not to quibble on semantics but Rohrabacher met with Assange to ask if he would be willing
to reveal the source of the emails then Rohrabacher would contact Trump and try to make deal
for Assange's freedom. Rohrabacher clarified that he never talked to Trump or that he was
authorized by Trump to make any offer.
The MSM has been using the "amnesty if you say it was not the Russians" narrative to hint
at a coverup by Russian agent Trump. Normal for the biased MSM.
Giraldi's link "Assange did not take the offer" has nothing to do with Rohrabacher's
contact. It's just a general piece on Assange acting as a journalist should act.
I'm of the opinion Ron Unz seems to share, that Rich was not a particularly "big hitter" in
the DNC hierarchy and that his murder was more likely the result of a very nasty inter-party
squabble. I seem to recall a LOT of very nasty talk between the Jewish neocons in the Bush
era and the decent, traditional "small-government" style Republicans who greatly resented the
neocons' hijacking of the GOP for their demonic zionist agenda.
Common sense would suggest that the zionist types who have (obviously) hijacked the DNC
are at least as nasty and ruthless as the neocons who destroyed any decency or fair-play
within the GOP. It's not exactly hard to believe that these Murder, Inc. types (also lefties
of their era) wouldn't hesitate to whack someone like Rich for merely uttering a criticism of
Israel, for example.
Hell, Meyer Lansky ordered the hit-job on Bugsy Seigel for forgetting to bring bagels to a
sit-down ! There was a great web-site by a mobster of that era, long since taken down, who
described the story in detail. I forget the names .. but I'll see if I can't find a copy of
some of the pieces posted at least a decade ago .
It's not exactly hard to imagine some very nasty words being exchanged between the Rahm
Emmanuel types and decent Chicago citizens, for example, who genuinely cared for their city
and weren't afraid of The Big Jew and his mobster cronies . to their detriment I'm sure.
We're talking about organized crime, here, folks. The zionists make the so-called (mostly
fictitious) Sicilian Mafia look like newborn puppies. They wouldn't hesitate to whack a guy
like Rich for taking their favorite space in the bicycle rack.
My only trouble with the Seth Rich thing is, it seems a bit extreme, they seem quite callous
in murdering foreigners but US citizens in the US who are their staffers? If they really were
prepared to go out and kill in this way, they're be a lot more suspicious deaths.
What makes the case most compelling is the very quick investigation by police that looks
like they were told by somebody concerned about how the whole thing looked to close up the
case nice and quickly. That and the fact that he was shot in the back, which doesn't make
sense for an attempted robbery turned murder.
However, it may also be that as in so many cities in the US, murder clearance rates for
street shootings (Little forensic evidence, can only go by witness accounts or through poor
alibis from usual suspects and their associates. In this case there is also no connection
between Rich and any possible shooter with no witnesses.) are just so very low that DC police
don't bother and Seth Rich's death just happened to be one such case that attracted some
scrutiny.
But then maybe for the reasons above a place like DC is perfect to just murder somebody on
the street and that's why they were so brazen about it.
Seth Rich's death just happened to be one such case that attracted some scrutiny.
Well, upthread someone posted a recording of a Seymour Hersh phone call that confirmed
Seth Rich was the fellow who leaked the DNC emails to Wikileaks, thereby possibly swinging
the presidential election to Trump and overcoming $2 billion of Democratic campaign
advertising.
Shortly afterwards, he probably became about the only middle-class white in DC who died in
a "random street killing" that year. If you doubt this, see if you can find any other such
cases that year.
I think it is *extraordinarily* unlikely that these two elements are unconnected and
merely happened together by chance.
.. GOP strategist and avid Never Trumper Rick Wilson said ... Obama needs to throw his
full weight behind Biden before Super Tuesday in a way that will shake up the race ... Obama
can transform this race in a hot second. ... It's now or never ... Biden beat Sanders like a
rented mule. The exit polls told the tale; it was a crushing defeat across almost every
demographic group ...
Gotta love these Republicans who have our best interests at heart.
Last week in Nevada it was Sanders who beat Biden like a rented mule, inflicting a crushing
defeat across almost every demographic group. But that was then, this is now, and a Republican
stratigist says "It's now or never" to defeat Sanders Trump.
Super Tuesday is ... Tuesday. Biden, as I noted yesterday, hasn't visited any Super Tuesday
state in a month, has almost no money, is not on the air, has little or no ground game. Early
voting is already in progress in several states. What can be done in one day to turn
things around?
Realistically, nothing. Yes, a big endorsement by Obama could have an impact, but how many
voters would even hear about it before voting? Biden will definitely get a bounce from his win
in SC, but how big will it be? How much did Sanders' win in Nevada help him in SC?
Team Biden believes having Klobuchar in the race through Super Tuesday is incredibly
helpful to them.
Why? It blocks Bernie Sanders in the Minnesota primary on Tuesday.
"If Amy gets out, that gives Minnesota to Bernie,"
...
Four years ago, Sanders crushed Hillary Clinton in Minnesota, winning 62% to 38% ...
The Biden campaign wants Warren to be in the race through Super Tuesday, when Massachusetts
voters weigh in.
Not to win. Not to hoard delegates for a convention fight. But just taking every opportunity
to slow Bernie down.
Finally, and I only saw one tweet about this and can't find any confirmation, that Bloomberg
hasn't made any ad buys beyond Super Tuesday. Anyone know anything about this?
Steyer has spent $200 million, got nothing for it, and has dropped out. I'm hoping that's
what we see for Bloomberg as well. Is Bloomberg trying to win? Or just to stop Bernie? Super
Tuesday will tell the tale.
@WoodsDweller -- Biden, Bloomberg, Warren, Klobuchar -- is stepping in to do his or
her part for the overall goal of stopping Bernie. They are 100% loyal to the Dem
establishment which is 100% loyal to the neocon, neoliberal, oligarchic, globalist Deep
State. They know the Dem establishment will reward them -- and you can practically smell the
certainty of that knowledge on Liz. She'll do and say whatever they ask of her.
with anything but a full on assault by the DNC, the media, and their respective
surrogates. What I didn't expect, especially from dubious "progressives" like Warren, was to
hear non-viable candidates openly talking about blunting Bernie's momentum with their only
goal being to collect delegates into the convention. Yes, most of us anticipated this was
going to turn into a contested convention by design, but I don't know how many of us believed
they'd tip their hand so blatantly and so soon into the process. Now that they have, it gives
Bernie time to prepare his own strategy for meeting their threat at the convention. Maybe
someone could refresh his memory on how effective the bus loads of people that GWB arranged
were in shaping the media narrative of "civil disruption vs. accurate counting" in Florida?
Taking a page out of that playbook, Bernie's people really need to start thinking about
organizing an army of supporters in strength that rivals his numbers at his rallys, and
descend onto Wisconsin. And maybe as an added bonus, conjure up the image of the 1968
convention Buttigieg seems to believe Bernie is so nostalgic about resurrecting. If the
Establishment is going to twart the will of the people, let the will of the people be
heard.
First, a wild methodological error. Bernie actually received more votes yesterday than in
2016. Perhaps only people who voted in 2016 were polled.
Second, everyone knows that Bernie is the person most likely to defeat Trump and Biden is
the worst possible candidate. Perhaps thousands of Trump supporters came out pretending to be
Democrats to vote for Biden. This has supposedly happened before.
Third, the quisling Democrats have given up all pretense of being honest and are blatantly
stealing the nomination from Bernie. This is the most likely.
.
In many ways, this race is now the same exact contest that was fought back in 2016. It has
come down to Joe Biden -- The Establishment choice -- despite his obvious Ukraine corruption,
family payoffs, obstruction of justice and abuse of office, etc. -- and despite Biden being
100% wrong on every issue from the Iraq War to NAFTA to the TPP to Syria (more Regime
Change) to Libya to saying China is not an economic threat , etc. -- and despite him
being a bumbling buffoon and gaffe machine who doesn't even know what State he is in, and
constantly mangles sentences, and arrogantly yells at or insults prospective voters -- and
despite him on multiple occasions caught sniffing the hair and fondling young girls in
public.
How is this different from Hillary Clinton .. just without the Cackle ?
Bernie Sanders, as in 2016, is the only other option now that has a multi-state Campaign
support structure. While Mike Bloomberg can buy million dollar Ads and saturate them
everywhere across TV and the Internet .. he has no real voter base, a phony message, and no
charisma.
So it is Sanders .vs. Biden , which is essentially a rematch between Sanders and
Clinton -- or -- essentially a rematch between Sanders and the DNC Establishment (who also
control the rules of the game).
My question is, who in earth would ever want to vote for the doddering and incoherent Joe
Biden under any circumstance? Clearly, Biden just represents the anti-Sanders vote here, and
The Establishment, with Bloomberg, Buttiburger, and Klobachar all failing, has closed ranks
to consolidate around the one dog-faced, pony soldier left standing in the race: Quid Pro
Joe.
Come on man! Get down and do some pushups Jack. I don't want your vote.
Polls and Votes and super delegates and Media narratives will all now be fixed around
Biden from this point on (if they weren't already). So expect a whole lot of Malarkey
upcoming, and this means that Sanders will have to win by big margins, and win a whole lot
more States than he did in 2016, in order to survive.
"... But in the wake of Sanders' landslide victory in Nevada, a brokered convention would mean the end of the Democrat Party pretense to represent the 99 Percent. The American voting system would be seen to be as oligarchic as that of Rome on the eve of the infighting that ended with Augustus becoming Emperor in 27 BC. ..."
"... Last year I was asked to write a scenario for what might happen with a renewed DNC theft of the election's nomination process. To be technical, I realize, it's not called theft when it's legal. In the aftermath of suits over the 2016 power grab, the courts ruled that the Democrat Party is indeed controlled by the DNC members, not by the voters. When it comes to party machinations and decision-making, voters are subsidiary to the superdelegates in their proverbial smoke-filled room (now replaced by dollar-filled foundation contracts). ..."
"... I could not come up with a solution that does not involve dismantling and restructuring the existing party system. We have passed beyond the point of having a solvable "problem" with the Democratic National Committee (DNC). That is what a quandary is. A problem has a solution – by definition. A quandary does not have a solution. There is no way out. The conflict of interest between the Donor Class and the Voting Class has become too large to contain within a single party. It must split. ..."
"... A second-ballot super-delegate scenario would mean that we are once again in for a second Trump term. That option was supported by five of the six presidential contenders on stage in Nevada on Wednesday, February 20. When Chuck Todd asked whether Michael Bloomberg, Elizabeth Warren, Joe Biden, Pete Buttigieg and Amy Klobuchar would support the candidate who received the most votes in the primaries (now obviously Bernie Sanders), or throw the nomination to the super-delegates held over from the Obama-Clinton neoliberals (75 of whom already are said to have pledged their support to Bloomberg), each advocated "letting the process play out." That was a euphemism for leaving the choice to the Tony-Blair style leadership that have made the Democrats the servants' entrance to the Republican Party. Like the British Labour Party behind Blair and Gordon Brown, its role is to block any left-wing alternative to the Republican program on behalf of the One Percent. ..."
To hear the candidates debate, you would think that their fight was over who could best beat
Trump. But when Trump's billionaire twin Mike Bloomberg throws a quarter-billion dollars into
an ad campaign to bypass the candidates actually running for votes in Iowa, New Hampshire and
Nevada, it's obvious that what really is at issue is the future of the Democrat Party.
Bloomberg is banking on a brokered convention held by the Democratic National Committee (DNC)
in which money votes. (If "corporations are people," so is money in today's political
world.)
Until Nevada, all the presidential candidates except for Bernie Sanders were playing for a
brokered convention. The party's candidates seemed likely to be chosen by the Donor Class, the
One Percent and its proxies, not the voting class (the 99 Percent). If, as Mayor Bloomberg has
assumed, the DNC will sell the presidency to the highest bidder, this poses the great question:
Can the myth that the Democrats represent the working/middle class survive? Or, will the Donor
Class trump the voting class?
This could be thought of as "election interference" – not from Russia but from the DNC
on behalf of its Donor Class. That scenario would make the Democrats' slogan for 2020 "No Hope
or Change." That is, no change from today's economic trends that are sweeping wealth up to the
One Percent.
All this sounds like Rome at the end of the Republic in the 1st century BC. The way Rome's
constitution was set up, candidates for the position of consul had to pay their way through a
series of offices. The process started by going deeply into debt to get elected to the position
of aedile, in charge of staging public games and entertainments. Rome's neoliberal fiscal
policy did not tax or spend, and there was little public administrative bureaucracy, so all
such spending had to be made out of the pockets of the oligarchy. That was a way of keeping
decisions about how to spend out of the hands of democratic politics. Julius Caesar and others
borrowed from the richest Bloomberg of their day, Crassus, to pay for staging games that would
demonstrate their public spirit to voters (and also demonstrate their financial liability to
their backers among Rome's One Percent). Keeping election financing private enabled the leading
oligarchs to select who would be able to run as viable candidates. That was Rome's version of
Citizens United.
But in the wake of Sanders' landslide victory in Nevada, a brokered convention would mean
the end of the Democrat Party pretense to represent the 99 Percent. The American voting system
would be seen to be as oligarchic as that of Rome on the eve of the infighting that ended with
Augustus becoming Emperor in 27 BC.
Today's pro-One Percent media – CNN, MSNBC and The New York Times have been busy
spreading their venom against Sanders. On Sunday, February 23, CNN ran a slot, "Bloomberg needs
to take down Sanders, immediately." Given Sanders' heavy national lead, CNN warned, the race
suddenly is almost beyond the vote-fixers' ability to fiddle with the election returns. That
means that challengers to Sanders should focus their attack on him; they will have a chance to
deal with Bloomberg later (by which CNN means, when it is too late to stop him).
The party's Clinton-Obama recipients of Donor Class largesse pretend to believe that Sanders
is not electable against Donald Trump. This tactic seeks to attack him at his strongest point.
Recent polls show that he is the only candidate who actually would defeat Trump – as they
showed that he would have done in 2016.
The DNC knew that, but preferred to lose to Trump than to win with Bernie. Will history
repeat itself? Or to put it another way, will this year's July convention become a replay of
Chicago in 1968?
A quandary, not a problem
Last year I was asked to write a scenario for what might happen with a renewed DNC theft of
the election's nomination process. To be technical, I realize, it's not called theft when it's
legal. In the aftermath of suits over the 2016 power grab, the courts ruled that the Democrat
Party is indeed controlled by the DNC members, not by the voters. When it comes to party
machinations and decision-making, voters are subsidiary to the superdelegates in their
proverbial smoke-filled room (now replaced by dollar-filled foundation contracts).
I could not come up with a solution that does not involve dismantling and restructuring the
existing party system. We have passed beyond the point of having a solvable "problem" with the
Democratic National Committee (DNC). That is what a quandary is. A problem has a solution
– by definition. A quandary does not have a solution. There is no way out. The conflict
of interest between the Donor Class and the Voting Class has become too large to contain within
a single party. It must split.
A second-ballot super-delegate scenario would mean that we are once again in for a second
Trump term. That option was supported by five of the six presidential contenders on stage in
Nevada on Wednesday, February 20. When Chuck Todd asked whether Michael Bloomberg, Elizabeth
Warren, Joe Biden, Pete Buttigieg and Amy Klobuchar would support the candidate who received
the most votes in the primaries (now obviously Bernie Sanders), or throw the nomination to the
super-delegates held over from the Obama-Clinton neoliberals (75 of whom already are said to
have pledged their support to Bloomberg), each advocated "letting the process play out." That
was a euphemism for leaving the choice to the Tony-Blair style leadership that have made the
Democrats the servants' entrance to the Republican Party. Like the British Labour Party behind
Blair and Gordon Brown, its role is to block any left-wing alternative to the Republican
program on behalf of the One Percent.
"... Finally, and perhaps this is the most important point, the FBI was at this time supposed to be in the early stages of an investigation into how the DNC emails were leaked to Wikileaks. The FBI here believed Wikileaks to be indicating the material had been leaked by Seth Rich who had then been murdered. Surely in any legitimate investigation, the investigators would have been absolutely compelled to check out the truth of this possibility, rather than treat it as a media issue? ..."
A persistent American lawyer has uncovered the undeniable fact that the FBI has been
continuously lying , including giving
false testimony in court, in response to Freedom of Information requests for its records on
Seth Rich. The FBI has previously given affidavits
that it has no records regarding Seth Rich.
A Freedom of Information request to the FBI which did not mention Seth Rich, but asked for
all email correspondence between FBI Head of Counterterrorism Peter Strzok, who headed the
investigation into the DNC leaks and Wikileaks, and FBI attorney Lisa Page, has revealed two
pages of emails which do not merely mention Seth Rich but have "Seth Rich" as their heading.
The emails were provided in, to say the least, heavily redacted form.
Before I analyze these particular emails, I should make plain that they are not the major
point. The major point is that the FBI claimed it had no records mentioning Seth Rich, and
these have come to light in response to a different FOIA request that was not about him. What
other falsely denied documents does the FBI hold about Rich, that were not fortuitously picked
up by a search for correspondence between two named individuals?
To look at the documents themselves, they have to be read from the bottom up, and they
consist of a series of emails between members of the Washington Field Office of the FBI (WF in
the telegrams) into which Strzok was copied in, and which he ultimately forwarded on to the
lawyer Lisa Page.
The opening email, at the bottom, dated 10 August 2016 at 10.32am, precisely just one month
after the murder of Seth Rich, is from the media handling department of the Washington Field
Office. It references Wikileaks' offer of a reward for information on the murder of Seth Rich,
and that Assange seemed to imply Rich was the source of the DNC leaks. The media handlers are
asking the operations side of the FBI field office for any information on the case. The
unredacted part of the reply fits with the official narrative. The redacted individual officer
is "not aware of any specific involvement" by the FBI in the Seth Rich case. But his next
sentence is completely redacted. Why?
It appears that "adding" references a new person added in to the list. This appears to have
not worked, and probably the same person (precisely same length of deleted name) then tries
again, with "adding for real" and blames the technology – "stupid Samsung". The
interesting point here is that the person added appears not to be in the FBI – a new
redacted addressee does indeed appear, and unlike all the others does not have an FBI suffix
after their deleted email address. So who are they?
(This section on "adding" was updated after commenters offered a better explanation than my
original one. See first comments below).
The fourth email, at 1pm on Wednesday August 10, 2016, is much the most interesting. It is
ostensibly also from the Washington Field Office, but it is from somebody using a different
classified email system with a very different time and date format than the others. It is
apparently from somebody more senior, as the reply to it is "will do". And every single word of
this instruction has been blanked. The final email, saying that "I squashed this with ..", is
from a new person again, with the shortest name. That phrase may only have meant I denied this
to a journalist, or it may have been reporting an operational command given.
As the final act in this drama, Strzok then sent the whole thread on to the lawyer, which is
why we now have it. Why?
It is perfectly possible to fill in the blanks with a conversation that completely fits the
official narrative. The deletions could say this was a waste of time and the FBI was not
looking at the Rich case. But in that case, the FBI would have been delighted to publish it
unredacted. (The small numbers in the right hand margins supposedly detail the exception to the
FOIA under which deletion was made. In almost every case they are one or other category of
invasion of privacy).
And if it just all said "Assange is talking nonsense. Seth Rich is nothing to do with the
FBI" then why would that have to be sent on by Strzok to the FBI lawyer?
It is of course fortunate that Strzok did forward this one email thread on to the lawyer,
because that is the only reason we have seen it, as a result of an FOI(A) request for the
correspondence between those two.
Finally, and perhaps this is the most important point, the FBI was at this time supposed to
be in the early stages of an investigation into how the DNC emails were leaked to Wikileaks.
The FBI here believed Wikileaks to be indicating the material had been leaked by Seth Rich who
had then been murdered. Surely in any legitimate investigation, the investigators would have
been absolutely compelled to check out the truth of this possibility, rather than treat it as a
media issue?
We are asked to believe that not one of these emails says "well if the publisher of the
emails says Seth Rich was the source, we had better check that out, especially as he was
murdered with no sign of a suspect". If the FBI really did not look at that, why on earth not?
If the FBI genuinely, as they claim, did not even look at the murder of Seth Rich, that would
surely be the most damning fact of all and reveal their "investigation" was entirely agenda
driven from the start.
In June 2016 a vast cache of the DNC emails were leaked to Wikileaks. On 10 July 2016 an
employee from the location of the leak was murdered without obvious motive, in an alleged
street robbery in which nothing at all was stolen. Not to investigate the possibility of a link
between the two incidents would be grossly negligent. It is worth adding that, contrary to a
propaganda barrage, Bloomingdale where Rich was murdered is a very pleasant area of Washington
DC and by no means a murder hotspot. It is also worth noting that not only is there no suspect
in Seth Rich's murder, there has never been any semblance of a serious effort to find the
killer. Washington police appear perfectly happy simply to write this case off.
I anticipate two responses to this article in terms of irrelevant and illogical
whataboutery:
Firstly, it is very often the case that family members are extremely resistant to the
notion that the murder of a relative may have wider political implications. This is perfectly
natural. The appalling grief of losing a loved one to murder is extraordinary; to reject the
cognitive dissonance of having your political worldview shattered at the same time is very
natural. In the case of David Kelly, of Seth Rich, and of Wille Macrae, we see families
reacting with emotional hostility to the notion that the death raises wider questions.
Occasionally the motive may be still more mixed, with the prior relationship between the
family and the deceased subject to other strains (I am not referencing the Rich case
here).
You do occasionally get particularly stout hearted family who take the opposite tack and
are prepared to take on the authorities in the search for justice, of which Commander Robert
Green, son of Hilda Murrell, is a worthy example.
(As an interesting aside, I just checked his name in the Wikipedia article on Hilda, which
I discovered describes Tam Dalyell "hounding" Margaret Thatcher over the Belgrano and the
fact that ship was steaming away from the Falklands when destroyed with massive loss of life
as a "second conspiracy theory", the first of course being the murder of Hilda Murrell.
Wikipedia really has become a cesspool.)
We have powerful cultural taboos that reinforce the notion that if the family do not want
the question of the death of their loved one disturbed, nobody else should bring it up. Seth
Rich's parents, David Kelly's wife, Willie Macrae's brother have all been deployed by the
media and the powers behind them to this effect, among many other examples. This is an
emotionally powerful but logically weak method of restricting enquiry.
Secondly, I do not know and I deliberately have not inquired what are the views on other
subjects of either Mr Ty Clevenger, who brought his evidence and blog to my attention, or
Judicial Watch, who made the FOIA request that revealed these documents. I am interested in
the evidence presented both that the FBI lied, and in the documents themselves. Those who
obtained the documents may, for all I know, be dedicated otter baiters or believe in stealing
ice cream from children. I am referencing the evidence they have obtained in this particular
case, not endorsing – or condemning – anything else in their lives or work. I
really have had enough of illogical detraction by association as a way of avoiding logical
argument by an absurd extension of ad hominem argument to third parties.
* * *
Unlike his adversaries including the Integrity Initiative, the 77th Brigade, Bellingcat, the
Atlantic Council and hundreds of other warmongering propaganda operations, Craig's blog has no
source of state, corporate or institutional finance whatsoever. It runs entirely on voluntary
subscriptions from its readers – many of whom do not necessarily agree with the every
article, but welcome the alternative voice, insider information and debate. Subscriptions to
keep Craig's blog going are gratefully received .
" We have powerful cultural taboos that reinforce the notion that if the family do not
want the question of the death of their loved one disturbed, nobody else should bring it
up. "
Yeah. We see that all the time on ID Network ... whenever a family member wants
authorities to stop investigating their "loved one's" death, it usually means they're
protecting the guilty party. But the cases are solved by good cops who ignore the family and
do what's right.
Investigating and prosecuting murders is not all about the family. It's also about finding
and removing murderers from society so they can't hurt anyone else.
And neither Mueller nor any other government official ever bothered to interview Julian
Assange even though he agreed to do so. That Mueller didn't but took CrowdStrike's word for
the fact that so-called "Russians" hacked the DNC computer and then gave it to Wikileaks
tells you about all you need to know. Mueller knew who likely did it but didn't want to make
it part of his Report or let it be made public. Meanwhile the Russia Collusion Hoax marched
on, got a life of its own and is allowed to continue in its various forms like the
impeachment of a Donald Trump.
"Is it true that the hidden metadata contained within the FIRST WikiLeaks DNC files batch
clearly shows sequential time stamps (on each file copied) proving that a very high speed
transfer rate took place that could only be done with direct internal access to a DNC
computer on the network (i.g., a USB thumb drive or NAS drive plugged directly into a local
PC or a LAN network jack within the building) as opposed to the much slower file transfer
rate that would be recorded in the metadata if Russia or other hackers had remotely accessed
a DNC computer or local DNC network via a remote WAN/Internet connection (to transfer those
files from the outside)? Another rumor that needs to be put to rest is a SECOND batch of
files may exist (that is almost identical to the FIRST batch), except it includes some fake
Russian breadcrumb "fingerprints" that may have been added to support the "Russian's hacked
it" story that was circulated within the intelligence agencies and leaked out to the media.
IDK, true or false? "
synopsis of the real whistleblower Bill Binney, ex-NSA Technical director who has had his
life ruined because he published this info.
DNC In Disarray After Chairman's Secret Golden Parachute Revealed by Tyler Durden Thu, 01/30/2020 -
17:20 0 SHARES The
perpetually broke ,
deck-stacking DNC has been thrown into disarray just days before the Iowa caucus after
Buzzfeed
revealed that a cadre of top officials at the Democratic National Committee approved, then
concealed a 'generous exit package for the party chair, Tom Perez, and two top lieutenants,'
which has left Democrats 'confounded over the weekend by the optics and timing of the decision
on the eve of the presidential primary."
The proposal, put forward as an official DNC resolution during a meeting of the party's
budget and finance committee last Friday, would have arranged for Perez and two of his top
deputies, CEO Seema Nanda and deputy CEO Sam Cornale, to each receive a lump-sum bonus
equaling four months' salary within two weeks of the time they eventually leave their roles
.
Senior DNC officers, including members of Perez's own executive committee, learned of the
compensation package after its approval, through the rumor mill, setting off a furious
exchange of emails and texts over the weekend to determine what had been proposed, and by
whom . - Buzzfeed
And while four-months salary might be more of a 'bronze parachute', Perez rejected the
"extra compensation" package for himself and his two lieutenants in an email to officials .
Perez says he will serve through the end of the 2020 election, while all three officials
have denied having any prior knowledge of, or involvement in the pay package resolution .
"One-hundred percent of our resources are going towards beating Donald Trump," said DNC
communications director Xochitl Hinojosa, who added "DNC leadership will not accept any extra
compensation recommended by the budget committee, which didn't operate at the direction of DNC
leadership. The resolution was crafted by the budget committee and did not involve the Chair,
CEO, or Deputy CEO."
Taking the fall for the resolution are two members of the DNC's budget and finance committee
- Daniel Halpern and Chris Korge, who described it as the first step in a "smooth transition"
for Perez.
Halperin, an
anti-minimum wage lobbyist , was appointed by Perez in 2017. He previously chaired Atlanta
Mayor Kasim Reed's 2009 moyoral campaign, and was a trustee for Barack Obama's 2008 inaugural
committee.
Chris Korge is a Florida
attorney hired in May of 2019. He was one of the top fundraisers for Andrew Gillum, Hillary
Clinton, Bill Clinton, and served as the co-chairman for the Kerry Edwards campaign in
2004.
For years, the 64-year-old attorney, developer and one-time county hall lobbyist has been
an important fundraiser for Democrats. He has raised millions for both Hillary and Bill
Clinton, served as national co-chairman for Kerry Edwards Victory in 2004 and this year was
co-chairman of Miami's unsuccessful bid to bring the Democratic convention to South Florida
next summer. - Miami
Herald
According to Buzzfeed , Halpern and Korge both said the resolution was above-board
and a common business practice.
The resolution, which only applies to the 2021 transition, states that the outgoing chair,
CEO, and deputy CEO will help facilitate donor and "stakeholder" relations, and convey
"institutional knowledge" to the next chair, but is less specific about the requirements of
the transition than the details of the compensation package: a lump sum of four months' pay,
paid within two weeks, unless either Perez, Nanda, or Cornale is terminated for "gross
misconduct."
On Tuesday, Halpern said the resolution was meant to serve only as a "nonbinding" starting
point to ensure "continuity" between Perez's tenure and the next party chair . - Buzzfeed
Top Democrats within the DNC's leadership speaking on condition of anonymity said that they
were shocked to learn of the compensation package on the eve of a presidential primary , amid a
massive fundraising defecit .
"I think it is completely short-sighted and really stupid," said one senior official.
The package would have paid Perez around $69,000, Nanda around $61,000, and Cornale
$39,000.
The infighting is indicative of the ongoing DNC implosion. These parties, like the entire
world's governments, were terminated long ago. NOBODY wants or needs the fake drama bullsh*t.
If it's not on one side or the other it's on both to distract everybody. Like the ongoing
fake impeachment fraud. Chump was finished day one on the job. And even if not certainly the
public conspiring with both parties to commit sedition and treason after Parkland ensured
it.
Tom Perez - member of the Obama Transition Project's Agency Review Working Group
responsible for the justice, health and human services, veterans affairs, and housing and
urban development agencies. He is Secretary of the Maryland Department of Labor, Licensing
and Regulation under Governor Martin O'Malley.
He worked in a variety of civil rights positions at the Department of Justice, including
Deputy Assistant Attorney General for Civil Rights under Attorney General Janet Reno.
He also served as Director of the Office for Civil Rights at the U.S. Department of Health
and Human Services under Secretary Donna Shalala, and as Special Counsel to Senator Edward
Kennedy. From 2001 until 2007, he was Assistant Professor of Law at the University of
Maryland School of Law, and is an adjunct faculty member at the George Washington School of
Public Health.
FBI Lied to a Federal Court Regarding Seth Rich by Larry C Johnson
Thanks to Judicial Watch, a new batch of emails have surfaced that put the FBI in a whole
lot of trouble with at least two Federal Judges. Attorney Ty Clevenger made repeated FOIA
requests to the FBI for all emails and communications dealing with Seth Rich and his murder.
The FBI denied they had any such communications. Whoops! There are now five emails and one text
message that show that denial is not true. Let's dig into the details.
The FBI, in the person of David Hardy, affirmed in an affidavit that there were no
responsive records. Hardy is the Section Chief of the Record/Information Dissemination Section
("RIDS"), Information Management Division ("IMD"),1 Federal Bureau of Investigation ("FBI"), in
Winchester, Virginia. Here are the relevant portions of his first affidavit:
On September 30, 2017, by electronic submission via the OIP online portal, Plaintiff
submitted an administrative appeal of the FBI's September 19, 2017 determination. Specifically,
Plaintiff alleged the FBI limited its search to the Central Records System("CRS") for main file
records. Additionally, Plaintiff noted that any responsive records likely would be found in
emails, hard copy documents, and other files in the FBI's Washington Field Office; therefore,
the FBI should be directed to conduct a thorough search, to include emails and other records in
the Washington Field Office. . . .
(9) By letter executed on November 9, 2017, OIP advised Plaintiff it affirmed the FBI's
determination. OIP further advised Plaintiff that to the extent his request sought access to
records that would either confirm or deny an individual's placement on any government watch
list, the FBI properly refused to confirm or deny the existence of any such records because
their existence is protected from disclosure pursuant to 5 U.S.C. § 552(b)(7)(E). . .
.
(19) CRS Search and Results. In response to Plaintiff's request dated September 1, 2017,
RIDS conducted an index search of the CRS for responsive main and reference file records
employing the UNI application of ACS. The FBI searched the subject's name, "Seth Conrad Rich,"
in order to identify files responsive to Plaintiff's request and subject to the FOIA. The FBI's
searches included a three-way phonetic breakdown5 of the subject's name. These searches
located no main or reference records responsive to Plaintiff's FOIA request.
(20) Subsequently, the FBI conducted additional searches of the CRS via the UNI application
of ACS and a Sentinel index search for both main and reference file records. The FBI used the
same search terms it used in its original searches as described supra. This new search also
resulted in no main or reference file records being located responsive to Plaintiff's FOIA
request. . . .
(25) The FBI conducted an adequate and reasonable search for records responsive to
Plaintiffs FOIA request; however, no records were located. First given its comprehensive nature
and scope, the CRS is the principle records system searched by RIDS, to locate information
responsive to most FOIA/Privacy Act requests, as the CRS is where the FBI indexes information
about individuals, organizations, and events for future retrieval. See , 14, supra. Second, the
CRS is the FBI recordkeeping system where investigative records responsive to this request
would reasonably be found. Given Plaintiffs request sought information about an individual
subject, Seth Conrad Rich, who was murdered in the District of Columbia on or about July 10,
2016, such information would reasonably be expected to be located in the CRS via the index
search methodology. Finally, the office likely to conduct or assist in such an investigation --
WFO -- confirmed that it did not open an investigation or provide investigative or technical
assistance into the murder of Seth Conrad Rich, as the matter was under investigation by the
MPD, who declined the FBI's assistance.
Pursuant to 28 U.S.C. § 1746, I declare under penalty of perjury that the foregoing is
true and correct, and that ibits A - E attached hereto are true and correct copies.
Well, guess what? Just as Ty Clevenger anticipated, the relevant emails were in the
Washington Field Office. To make matters worse, some of these emails were sent to FBI
Headquarters. David Hardy either is incompetent or he has lied. There is no middle ground. In
either case, his submission was not true.
Here are the emails (I transcribed them and put them in chronological order to facilitate
your ability to read them and understand what is being communicated).
10:32 am -- Message sent from FBI's Washington Field Office Public Affairs officer to at
least three other Washington Field Office FBI Agents. In addition, there are three other
blacked out areas in the addressee field, which appear to be the names of persons who do not
work at the Washington Field Office.
I hope you are well. I heard from the front office that you are covering for BLANK this
week. Various news outlets are reporting today that Julian Assange suggested during an overseas
interview that DNC Staffer, Seth Rich, was a Wikileaks source and may have been killed because
he leaked the DNC e-mails to his organization, and that Wikileaks is offering $20,000 for
information regarding the death of Seth Rich last month. Based on this news, we anticipate
additional press coverage on this matter. I hear that you are in a class today; however, when
you have a moment can you give me a call to discuss what involvement the FBI has in the
investigation.
12:53 pm -- Message replying to the 10:32 am message, sent from FBI Washington Field Office
with at least four other Washington Field Office FBI Agents addressed on the message. There
also are two other blacked out addresses, which may indicate personnel not in the Washington
Field Office.
Adding BLANK (a name to the addressee list). I am aware of this reporting from earlier this
week, but not any involvement in any related case. BLANKED OUT.
12:54 pm -- Message sent from FBI Washington Field Office with at least four other
Washington Field Office FBI Agents addressed on the message. There also are two other blacked
out addresses, which may indicate personnel not in the Washington Field Office.
Adding BLANK for real. Stupid Samsung. (Apparently the author of this message failed in the
preceding message.)
1:00 pm -- Message replying to the 12:54 pm message, sent from FBI Washington Field Office
with five other Washington Field Office FBI Agents addressed on the message.
Hi. (THE REST OF THE MESSAGE IS BLANKED OUT.)
1:25 pm -- Message replying to the 1:00 pm message, sent from FBI Washington Field Office
with five other Washington Field Office FBI Agents addressed on the message. Plus, two other
BLANKED out addressees not identified.
Thanks BLANK will do.
7:09 pm -- Message from FBI Washington Field Office to Jonathan Moffat and Peter Strzok of
the FBI's Criminal Division and two other BLANKED out addressees.
FYSA (For Your Situational Awareness). I squashed this with BLANK
7:49 pm Text message from Peter Strzok to Lisa Page forwarding her this email chain.
The initial response to the query from the Public Affairs Office of the Washington Field
Office is telling. The Agent could have responded very simply--The FBI was not involved in any
facet of the Seth Rich investigation. This was a local matter handled by the DC Police.
But that is not how the Agent responded. And then he took the step of adding in people at
FBI Headquarters. How do we know this? The message from the Washington Field Office at 7:09 pm
was sent to the Criminal Division to Agents Moffat and Strzok.
Ty Clevenger now has ample ammunition to return to court and insist that the FBI be required
to identify all agents involved in these email chains and to discuss what they knew about the
Seth Rich case. David Hardy declared under the penalty of perjury that there were no such
emails. I doubt that the two judges involved in the relevant cases on this matter will be happy
to learn that the FBI stonewalled a valid FOIA request and a
Stay tuned.
Below is the copy of the email chain. You need to read from bottom to top.
Reblog (0)Comments You can follow this conversation by
subscribing to the
comment feed for this post. I will be shocked if the
judge does anything about it beyond a slap on the wrist an an admonition not to get caught
again.
Strictly it had to be handled by DC police, nevertheless the FBI was made aware of it-- and
should have taken over at that point?--and somewhere up the chronology ladder Peter Strzok got
envolved, not quite the way he should have though, instead he only forwarded the latest mail to
his "interior lover". Suggesting??? Peter Strzok as man in charge my have stopped the FBI from
taking over?
I think it is premature to prejudge the question of how successful the FBI will be in
heading off the attempts of Ty Clevenger and Ed Butowsky to penetrate the wall of silence which
has been erected around the involvement of that organisation in covering up the truth about
Seth Rich's murder, and his involvement in leaking the materials from the DNC published by
'WikiLeaks.'
It is also material here that other parts of the cover-up may be running into trouble.
Further indications that contingency plans to use Steele as a 'patsy' were made early on,
and are now being implemented, come in an extraordinary article published in the latest edition
of the 'Sunday Times' by the paper's Political Editor, Tim Shipman.
Important parts of this were reproduced in a piece by Daniel Chaitin in the 'Washington
Examiner', headlined 'Top British spy report: "Strong possibility' that anti-Trump dossier was
completely fabricated", which links to the original article.
The original is, unfortunately, behind a paywall – but can be obtained if one is
prepared to take the trouble to sign up for the free allowance allowed by the papers.
In fact, much more interesting than the fact that a well-known British writer about spies,
Rupert Allason, aka 'Nigel West', who is clearly a conduit for elements in our security
services, has been brought in in support of the strategy of making Steele the 'patsy', are
paragraphs that make a claim which Chaitin does not appear to notice. These read:
'In November (2016 – DH], the FBI began checking out Steele and his sources. The
inspector- general found that former colleagues described Steele as demonstrating "poor
judgment" by "pursuing people with political risk but no intel value".
'More worryingly, they worked out that most of Steele's information came from a "primary
sub-source", identified by American media as a Belarus-born businessman, Sergei Millian. The
FBI interviewed Millian three times, in January, March and May 2017.
'He told the FBI that he was an unwitting source and much of what he had told Steele was
"just talk", "word of mouth and hearsay" or conversations "had with friends over beers". The
claims about Trump cavorting with prostitutes at the Ritz-Carlton were "rumour and speculation"
or said "in jest". The inspector- general's report says Millian "made statements indicating
that Steele misstated or exaggerated" what he had told him and that his reports were far more
"conclusive" than was justified.'
As it happens, while I have seen Millian referred to as a source for the dossier attributed
to Steele, I have – so far at least – not seen him identified with the supposed
'Primary Sub-source.'
A critical question is whether the 'Sunday Times' is right in claiming that the person whom
the FBI are reported by Inspector-General Horowitz as interviewing in January, March and May
2017, in a version which that figure's report accepts, was in fact Millian.
What Glenn Simpson and Peter Fritsch have to say in the apologia they published last
November under the title 'Crime in Progress', following their attempt to claim that there was
serious sourcing for the 'golden showers' claim, seems worth bringing into the picture:
'Steele said that one of his collectors was among the finest he had ever worked with, an
individual known to U.S. intelligence and law enforcement. Neither Simpson nor Fritsch was told
the name of this source, nor the source's precise whereabouts, but Steele shared enough about
the person's background and access that they believed the information they planned to pass
along was credible.'
The suggestion seems clear that this was the 'Primary Sub-source.'
Anyone who did the most basic research into Millian would very rapidly realise that the
notion that he could have the kind of 'background and access' making the claims made in the
dossier attributed to Steele 'credible' was laughable.
A rather obvious hypothesis, I think, was that the 'Primary Sub-source' was actually –
to hark back to the title of a book and film about a classic British disinformation operation
– 'The Man Who Never Was.'
The actual truth, I think, is likely to have been well-summarised by Lee Smith in the
opening paragraphs of his review of the Simpson/Fritsch book, which is headlined 'A crime still
in progress':
'Crime in Progress is, inadvertently, the cruelest book ever written about the American
media. Its authors, Glenn Simpson and Peter Fritsch, are the two former Wall Street Journal
reporters who founded the DC-based consultancy Fusion GPS. In 2016, the Hillary Clinton
campaign paid them to use their former media colleagues to push a conspiracy theory smearing
her Republican opponent, Donald Trump. The crime is still in progress.
'To help top-notch journalists market the fantasy that one of the world's most familiar
faces was a secret Russian spy, Fusion GPS co-ordinated with the FBI to forge a series of
"intelligence reports". They attributed these lurid memos to a down-on-his-luck Brit, a former
spy named Christopher Steele.'
My only reservation about this is that I do not think that Steele was 'down-on-his-luck',
until he found that his partners in the 'crime still in progress' were planning to wriggle out
of their own responsibility by making him the 'patsy', or 'fall guy.'
To give intelligence credibility to a farrago which, as Smith suggests, is likely to have
been cooked up in Fusion GPS, with the assistance of criminal elements in the U.S. law
enforcement and intelligence apparatus, it was helpful to bring in an old confederate of both,
Steele.
(One could also then appeal to that curious snobbery that often makes Americans take
seriously precisely the kind of 'Brit' to whom they should give a very wide berth!)
This, ironically, created a situation where those criminal elements could then suggest that
their only fault was in being credulous about claims made by a British intelligence officer
whom it was suggested past experience gave them reason to trust.
A natural way of developing this strategy would be to find someone like Millian, and use him
to buttress the central claims that the dossier 1. was actually produced by Steele, and 2. that
it had actual sources, rather than being largely fabricated. (As so often, the W.C. Fields
principle applies: 'Never give a sucker an even break.')
It seems clear that Horowitz has been prepared to go along with this strategy, and that a
very large number of 'suckers' among those on the other side of the fence from Simpson and
Fritsch have fallen for it, hook, line and sinker. (It might be invidious to name names.)
The likely reason why all this happened, of course, is that a succession of events –
the discovery that material from the DNC had been leaked and was going to be published by
'WikiLeaks', the identification of Seth Rich as the figure responsible, and then his murder
– produced an urgent need for a cover-up.
Inevitably, given the shortage of time, this was imperfect, and gave hostages to
fortune.
It is clear that Clevenger and Butowsky have, and probably will continue to have,
difficulties in getting judges to follow the evidence where it leads.
However, the former is a first-class 'ferret', and I think it is premature to rule out the
possibility that some of the people who are adjudicating these cases may decide that they do
not want to continue to cover up a 'crime still in progress.'
As it happens, Clevenger has written to John Durham, Richard Donague, and also Michael
Horowitz, announcing that he wishes to file a criminal complaint in relation to the materials
which Larry has discussed.
(An account with relevant links is given in a new post entitled 'We now have unequivocal
proof that the FBI is hiding records about Seth Rich' on Clevenger's 'Lawflog' blog, subtitled
'Because some people just need a good flogging.'
I would strongly recommend anyone seriously interested in seeing the truth about these
matters exposed, and the conspiracy against the Constitution defeated, to sign up for alerts
from Clevenger's blog.
Posted by: David Habakkuk |
29 January 2020 at 12:51 PM In fairness to the FBI, they
didn't say there were no emails, they said they used a search of CRS and that didn't identify
any emails. It isn't clear to me from what was provided in this post whether the search would
have included records from the WFO.
I posted quite a long response to 'Sid Finster', which has gone into spam.
Have been reading both the Simpson/Fritsch apologia, and also the book-length version of
Heidi Blake's attempt at 'escapology' on behalf of 'BuzzFeed.'
Both drive a point home: one simply cannot take on trust anything these people say.
This also includes material like the Bruce Ohr 302s. I know think that these were crafted,
between him, Pientka, Strzok et al, as part of contingency plans to make Steele the 'patsy' if
the attempt to 'escalate' with the conspiracy against the Trump failed.
Posted by: David Habakkuk |
29 January 2020 at 01:00 PM The sorry fact is this: Out
here in places like my town in flyover country, I could mention Seth Rich and no one would have
the slightest idea who he was and why he should get justice--or at least that the truth about
his life and death should be told.
Does he have family fighting for the truth about his death? Are there investigative
reporters on the story?
Posted by: oldman22 |
29 January 2020 at 10:56 PM
Oldman22 -The article states - "Steele, who quit MI6 in 2009, never told his former bosses,
what he was up to."
I believe this judgement would now be revised, if one can trust newspaper articles detailing
an earlier meeting with Sir Richard Dearlove that have since come out.
However, I have a little experience with how these things go down in the real world. I
genuinely hope that this experience will prove misleading.
Posted by: Sid Finster |
30 January 2020 at 10:42 AM The omni-present
Strzok/Page.
The DNC computer hack strikes me as another faux investigation identical in that regard to the
Clinton e-mail investigation - half measures abounding. The question is why? The brief e-mail
exchange between WFO and FBIHQ makes it perfectly clear that if the field investigators had not
already taken an interest on following up on Rich as an obvious lead they certainly should
have. It appears to me that they had not since the initial inquiry came down from the Public
Affairs Office and seems somewhat less than urgent.
My question is why wasn't the FBI all over this obvious lead if they wanted to get to the
actual bottom of the DNC hack?
"Today, January 27, 2020, we have a stunning update ==>>
After previously claiming no FBI records could be found related to Seth Rich, emails have
been uncovered. These emails weren't just from anybody. These emails were between FBI
lovebirds Peter Strzok and Lisa Page, the two most corrupt individuals involved in the Russia
Collusion Hoax.
In a set of
emails released by Judicial Watch on January 22, 2020, provided by a FOIA request on
Peter Strzok and Lisa Page, two pages on emails refer to Seth Rich:"
Maybe they were worried someone had bear spray in their purse of backpack, when Fancy Bear
and Cozy Bear showed and put their paw prints on the DNC computers.
AkaPatience, that is exactly how it is done. Once the decision is made to totally clean the
network, it has to be done to EVERY computer and device on the network. Hackers leave dormant
code throughout the network that allows them to reenter the network after they are booted
out.
I don't know if you care to comment on this, but I met a marine 10 years ago who talked
about how he was administrating Windows Server when he was in the corps. I was flabbergasted.
I don't understand why more effort has not been put into running a secure OS - something with
a microkernel architecture and an application stack and GUI fully locked down with Mandatory Access
Control . I presume that the assumption is that any advances we make will be quickly
matched by Iran, Russia, and China, and that leadership is more interested in offence than
defence.
1. G2 released nothing remotely damaging to the DNC, the first document was even the DNC's
oppo file on DJT
2. G2 did some copying and compress/decompress on files. Imbedded timestamps strongly suggest
a US Timezone location
3. G2 released some files claiming to be from the DNC, but which demonstrably came from John
Podesta's account
4. G2 did not claim to be involved with the Podesta account, which was phished and not hacked
as such
5. As an aside, both the Fancy and Cosy Bear packages had been available for third parties to
obtain since 2013-4 or so. So their use is not proof of Russian involvement. One or other has
been used in bank exploits before 2016.
I believe that G2 is arguably US based (the timestamps are reasonably conclusive), and is
either CIA or Crowdstrike. The existence of G2 is a diversionary one to strengthen the case
for blaming the Russians. It may be connected to wanting to divert attention from Seth Rich
and his subsequent murder, but may not be - that is Seth Rich's death may be just an
unfortunate coincidence, we have inadequate information to conclude either way.
Here's a key point - on June 12, Assange announces that Wikileaks will soon be releasing
info pertinent to Hillary. HE DOES NOT SAY THAT HE WILL BE RELEASING DNC EMAILS.
And yet, on June 14, Crowdstrike reports a Russian hack of the DNC servers - and a day later, Guccifer
2.0 emerges and proclaims himself to be the hacker, takes credit for the upcoming Wikileaks
DNC releases, publishes the Trump oppo research which Crowdstrike claimed he had taken, and
intentionally adds "Russian footprints" to his metadata.
So how did Crowdstrike and G2.0 know
that DNC EMAILS would be released?
Because, as Larry postulates, the US intelligence
community had intercepted communications between Seth Rich and Wikileaks in which Seth had
offered the DNC emails (consistent with the report of Sy Hersh's source within the FBI).
So
US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks.
That's when the stratagem of attributing the impending Wikileaks release to a Russian hack
was born - distracting from the incriminating content of the emails, while vilifying the Deep
State's favorite enemies, Assange and Russia, all in one neat scam.
Gossufer2.0 and CrowdStrike are the weakest links in this sordid story. CrowdStrike was nothing but FBI/CIA contractor.
So the hypothesis that CrowdStrike employees implanted malware to implicate Russians and created fake Gussifer 2.0 personality
is pretty logical.
Notable quotes:
"... Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU--Guccifer 2.0 persona and DCLeaks.com. Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of then CIA Director John Brennan ..."
"... In October 2015 John Brennan reorganized the CIA . As part of that reorganization he created a new directorate--DIRECTORATE OF DIGITAL INNOVATION. Its mission was to "manipulate digital footprints." In other words, this was the Directorate that did the work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust. ..."
"... We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it appear like it was done by a foreign entity. Wikipedia describes the Vault 7 documents : ..."
"... Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside the file shows it was last edited by someone using the computer name "Феликс Эдмундович." That means the computer was configured to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, "Феликс Эдмундович" is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.) ..."
"... Why would the CIA do this? The CIA knew that Podesta's emails had been hacked and were circulating on the internet. But they had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA. ..."
"... The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich. Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign, would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia. ..."
"... The only source for the claim that Russia hacked the DNC is a private cyber security firm, CrowdStrike. ..."
"... Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch, but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June. That is 34 days of inexcusable inaction. ..."
"... The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham's team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham should be looking into as a potential act of "Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU. ..."
"... LJ bottom line: "The only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU." ..."
"... ICA which seemed to have been framed to allow journalists or the unwary to link the ICA with more rigorous standards used by more authentic assessments? ..."
"... With the Russians not having the advantages that the NSA does (back doors in all US-designed network hardware/software and taps all over the internet), would Russia reveal anything unless it involved an immediate major national security threat. I doubt that would cover Trump. ..."
Special Counsel Robert Mueller's report insists that Guccifer 2.0 and DCLeaks were created by Russia's military intelligence organization,
the GRU, as part of a Russian plot to meddle in the U.S. 2016 Presidential Election. But this is a lie. Guccifer 2.0 and DCLeaks
were created by Brennan's CIA and this action by the CIA should be a target of U.S. Attorney John Durham's investigation. Let me
explain why.
Let us start with the January 2017 Intelligence Community Assessment aka ICA. Only three agencies of the 17 in the U.S. intelligence
community contributed to and coordinated on the ICA--the FBI, the CIA and NSA. In the preamble to the ICA, you can read the following
explanation about methodology:
When Intelligence Community analysts use words such as "we assess" or "we judge," they are conveying an analytic assessment or
judgment
To be clear, the phrase,"We assess", is intel community jargon for "opinion". If there was actual evidence or source material
for a judgment the writer of the assessment would state, "According to a reliable source" or "knowledgeable source" or "documentary
evidence."
Pay close attention to what the analysts writing the ICA stated about the GRU and Guccifer 2.0 and DCLeaks:
We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data
obtained in cyber operations publicly and in exclusives to media outlets.
Guccifer 2.0, who claimed to be an independent Romanian hacker, made multiple contradictory statements and false claims
about his likely Russian identity throughout the election. Press reporting suggests more than one person claiming to be Guccifer
2.0 interacted with journalists.
Content that we assess was taken from e-mail accounts targeted by the GRU in March 2016 appeared on DCLeaks.com starting
in June.
We assess with high confidence that the GRU relayed material it acquired from the DNC and senior Democratic officials to WikiLeaks.
Moscow most likely chose WikiLeaks because of its self-proclaimed reputation for authenticity. Disclosures through WikiLeaks did
not contain any evident forgeries.
Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or
electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU--Guccifer 2.0 persona and
DCLeaks.com. Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump
campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks
were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of
then CIA Director John Brennan.
Here's Mueller's take (I apologize for the lengthy quote but it is important that you read how the Mueller team presents this):
DCLeaks
"The GRU began planning the releases at least as early as April 19, 2016, when Unit 26165 registered the domain dcleaks.com
through a service that anonymized the registrant.137 Unit 26165 paid for the registration using a pool of bitcoin that it had
mined.138 The dcleaks.com landing page pointed to different tranches of stolen documents, arranged by victim or subject matter.
Other dcleaks.com pages contained indexes of the stolen emails that were being released (bearing the sender, recipient, and date
of the email). To control access and the timing of releases, pages were sometimes password-protected for a period of time and
later made unrestricted to the public.
Starting in June 2016, the GRU posted stolen documents onto the website dcleaks.com, including documents stolen from a number
of individuals associated with the Clinton Campaign. These documents appeared to have originated from personal email accounts
(in particular, Google and Microsoft accounts), rather than the DNC and DCCC computer networks. DCLeaks victims included an advisor
to the Clinton Campaign, a former DNC employee and Clinton Campaign employee, and four other campaign volunteers.139 The GRU released
through dcleaks.com thousands of documents, including personal identifying and financial information, internal correspondence
related to the"Clinton Campaign and prior political jobs, and fundraising files and information.140
GRU officers operated a Facebook page under the DCLeaks moniker, which they primarily used to promote releases of materials.141
The Facebook page was administered through a small number of preexisting GRU-controlled Facebook accounts.142
GRU officers also used the DCLeaks Facebook account, the Twitter account @dcleaks__, and the email account [email protected]
to communicate privately with reporters and other U.S. persons. GRU officers using the DCLeaks persona gave certain reporters
early access to archives of leaked files by sending them links and passwords to pages on the dcleaks.com website that had not
yet become public. For example, on July 14, 2016, GRU officers operating under the DCLeaks persona sent a link and password for
a non-public DCLeaks webpage to a U.S. reporter via the Facebook account.143 Similarly, on September 14, 2016, GRU officers sent
reporters Twitter direct messages from @dcleaks_, with a password to another non-public part of the dcleaks.com website.144
The dcleaks.com website remained operational and public until March 2017."
Guccifer 2.0
On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents.
In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as "Fancy Bear")
were responsible for the breach.145 Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona
Guccifer 2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into
a Moscow-based server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including
"some hundred sheets," "illuminati," and "worldwide known." Approximately two hours after the last of those searches, Guccifer
2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English
words and phrases that the GRU officers had searched for that day.146
That same day, June 15, 2016, the GRU also used the Guccifer 2.0 WordPress blog to begin releasing to the public documents
stolen from the DNC and DCCC computer networks.
The Guccifer 2.0 persona ultimately released thousands of documents stolen from the DNC and DCCC in a series of blog posts
between June 15, 2016 and October 18, 2016.147 Released documents included opposition research performed by the DNC (including
a memorandum analyzing potential criticisms of candidate Trump), internal policy documents (such as recommendations on how to
address politically sensitive issues), analyses of specific congressional races, and fundraising documents. Releases were organized
around thematic issues, such as specific states (e.g., Florida and Pennsylvania) that were perceived as competitive in the 2016
U.S. presidential election.
Beginning in late June 2016, the GRU also used the Guccifer 2.0 persona to release documents directly to reporters and other
interested individuals. Specifically, on June 27, 2016, Guccifer 2.0 sent an email to the news outlet The Smoking Gun offering
to provide "exclusive access to some leaked emails linked [to] Hillary Clinton's staff."148 The GRU later sent the reporter a
password and link to a locked portion of the dcleaks.com website that contained an archive of emails stolen by Unit 26165 from
a Clinton Campaign volunteer in March 2016.149 "That the Guccifer 2.0 persona provided reporters access to a restricted portion
of the DCLeaks website tends to indicate that both personas were operated by the same or a closely-related group of people.150
The GRU continued its release efforts through Guccifer 2.0 into August 2016. For example, on August 15, 2016, the Guccifer
2.0 persona sent a candidate for the U.S. Congress documents related to the candidate's opponent.151 On August 22, 2016, the Guccifer
2.0 persona transferred approximately 2.5 gigabytes of Florida-related data stolen from the DCCC to a U.S. blogger covering Florida
politics.152 On August 22, 2016, the Guccifer 2.0 persona sent a U.S. reporter documents stolen from the DCCC pertaining to the
Black Lives Matter movement.153"
Wow. Sounds pretty convincing. The documents referencing communications by DCLeaks or Guccifer 2.0 with Wikileaks are real. What
is not true is that these entities were GRU assets.
In October 2015 John Brennan reorganized the CIA . As part of that reorganization he created a new directorate--DIRECTORATE
OF DIGITAL INNOVATION. Its mission was to "manipulate digital footprints." In other words, this was the Directorate that did the
work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust.
We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it
appear like it was done by a foreign entity. Wikipedia describes the
Vault 7 documents :
Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the
United States' Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016,
include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs,[1] web browsers (including
Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA),[2][3][4] and the operating systems of most smartphones (including
Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux[5][6
One of the tools in Vault 7 carries the innocuous name, MARBLE.
Hackernews explains the purpose and function
of MARBLE:
Dubbed "Marble," the part 3 of CIA files contains 676 source code files of a secret anti-forensic Marble Framework, which is basically
an obfuscator or a packer used to hide the true source of CIA malware.
The CIA's Marble Framework tool includes a variety of different algorithm with foreign language text intentionally inserted into
the malware source code to fool security analysts and falsely attribute attacks to the wrong nation.
Marble is used to hamper[ing] forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks
to the CIA," says the whistleblowing site.
"...for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then
showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion," WikiLeaks
explains.
So guess what
gullible techies "discovered" in mid-June 2016? The meta data in the Guccifer 2.0 communications had "Russian fingerprints."
We still don't know who he is or whether he works for the Russian government, but one thing is for sure: Guccifer 2.0 -- the nom
de guerre of the person claiming he hacked the Democratic National Committee and published hundreds of pages that appeared to prove
it -- left behind fingerprints implicating a Russian-speaking person with a nostalgia for the country's lost Soviet era.
Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside
the file shows it was last edited by someone using the computer name "Феликс Эдмундович." That means the computer was configured
to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, "Феликс Эдмундович"
is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the
Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren
Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.)
Just use your common sense. If the Russians were really trying to carry out a covert cyberattack, do you really think they
are so sloppy and incompetent to insert the name of the creator of the Soviet secret police in the metadata? No. The Russians are
not clowns. This was a clumsy attempt to frame the Russians.
Why would the CIA do this? The CIA knew that Podesta's emails had been hacked and were circulating on the internet. But they
had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA.
The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering
those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich.
Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign,
would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia.
It is essential to recall the timeline of the alleged Russian intrusion into the DNC network. The only source for the claim
that Russia hacked the DNC is a private cyber security firm, CrowdStrike. Here is the timeline for the DNC "hack."
Here are the facts on the public record. They are at odds with the claims of the Intelligence Community:
It was
29 April 2016 , when the DNC claims it became aware its servers had been penetrated. No claim yet about who was responsible.
And no claim that there had been a prior warning by the FBI of a penetration of the DNC by Russian military intelligence.
According to CrowdStrike founder , Dimitri Alperovitch, his company first supposedly detected the Russians mucking around
inside the DNC server on 6 May 2016. A CrowdStrike intelligence analyst reportedly told Alperovitch that:
Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated
with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
The Wikileaks data shows that the last message copied from the DNC network is dated Wed, 25 May 2016 08:48:35.
10 June 2016 --CrowdStrike waited until 10 June 2016 to take concrete steps to clean up the DNC network. Alperovitch told
Esquire's Vicky Ward that: 'Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC.
Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave
their laptops in the office."
On June 14, 2016 , Ellen Nakamura, a Washington Post reporter who had been briefed by computer security company hired by the
DNC -- Crowdstrike--, wrote:
Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the
entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security
experts who responded to the breach.
The intruders so thoroughly compromised the DNC's system that they also were able to read all email and chat traffic, said
DNC officials and the security experts.
The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential
candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political
action committees, U.S. officials said. But details on those cases were not available.
15 June, 2016 , an internet "personality" self-described as Guccifer 2.0 surfaces and claims to be responsible for the hacks
but denies being Russian. The people/entity behind Guccifer 2.0:
Used a Russian VPN service provider to conceal their identity.
Created an email account with AOL.fr (a service that exposes the sender's IP address) and contacted the press (exposing his
VPN IP address in the process).
Contacted various media outlets through this set up and claimed credit for hacking the DNC, sharing copies of files purportedly
from the hack (one of which had Russian error messages embedded in them) with reporters from Gawker, The Smoking Gun and other
outlets.
Carried out searches for terms that were mostly in English, several of which would appear in Guccifer 2.0's first blog post.
They chose to do this via a server based in Moscow. (this is from the indictment,
"On or about June 15, 2016, the Conspirators logged into a Moscow-based server used and managed by Unit 74455")
Created a blog and made an initial blog post claiming to have hacked the DNC, providing links to various documents as proof.
Carelessly dropped a "Russian Smiley" into his first blog post.
Managed to add the name "Феликс Эдмундович" (which translates to Felix Dzerzhinsky, also known as "Iron Felix") to the metadata
of several documents. (Several sources went beyond what the evidence shows and made claims about Guccifer 2.0 using a Russian
keyboard, however, these claims are just assumptions made in response to the presence of cyrillic characters.)
The only thing that the Guccifer 2.0 character did not do to declare its Russian heritage was to take out full page ads in the
New York Times and Washington Post. But the "forensic" fingerprints that Guccifer 2.0 was leaving behind is not the only inexplicable
event.
Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch,
but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June.
That is 34 days of inexcusable inaction.
It is only AFTER Julian Assange announces on 12 June 2016 that WikiLeaks has emails relating to Hillary Clinton that DCLeaks or
Guccifer 2.0 try to contact Assange.
The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham's
team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source
of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham
should be looking into as a potential act of "Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that
the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA,
not the GRU.
LJ bottom line: "The only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential
election was the CIA, not the GRU."
Larry, thanks -- vital clarifications and reminders. In your earlier presentation of this material did you not also distinguish
between the way actually interagency assessments are titled, and ICA which seemed to have been framed to allow journalists or
the unwary to link the ICA with more rigorous standards used by more authentic assessments?
Thank you Larry. You have discovered one more vital key to the conspiracy. We now need the evidence of Julian Assange. He is kept
incommunicado and He is being tortured by the British in jail and will be murdered by the American judicial system if he lasts
long enough to be extradited.
You can be sure he will be "Epsteined" before he appears in open court because he knows the source of what Wikileaks published.
Once he is gone, mother Clinton is in the clear.
I can understand the GRU or SVR hacking the DNC and other e-mail servers because as intelligence services that is their job, but
can anyone think of any examples of Russia (or the Soviet Union) using such information to take overt action?
With the Russians
not having the advantages that the NSA does (back doors in all US-designed network hardware/software and taps all over the internet),
would Russia reveal anything unless it involved an immediate major national security threat. I doubt that would cover Trump.
Looks like CrowdStrike was was to plant the evidence of the Russian hack
Notable quotes:
"... All the evidence we're accumulating clearly says and implies, the US government -- namely the FBI, CIA, the DOJ, and of course State Department -- all these people involved in this hack, bought a dossier and all of the information going forward to the FISA court. ..."
"... All of them knew that this was a fake from the very beginning, because this Guccifer 2.0 character was fabricating it. They were using him plus the Internet Research Agency [IRA] as "supposed trolls of the Russian government". ..."
"... Well, when they sent their lawyers over to challenge that in a court of law, the government failed to prove they had any connection with the Russian government. ..."
"... Then the entire Rosenstein indictment is also a fabrication and a fake and a fraud for the same reasons. The judges seem to be involved in trying to keep this information out of the public domain. ..."
BILL BINNEY: I basically have always been saying that all of this Russian hack never
happened, but we have some more evidence coming out recently.
We haven't published it yet, but what we have seen is that there are at least five items
that we've found that were produced by Guccifer 2.0 back on June 15th, where they had the
Russian fingerprints in them, suggesting the Russians made the hack. Well, we found the same
five items published by Wikileaks in the Podesta emails.
Those items do not have the Russian fingerprints, which directly implies that Guccifer 2.0
was inserting these into the files to make it look like the Russians did this hack. Taking that
into account with all the other evidence we have; like the download speeds from Guccifer 2.0
were too fast, and they couldn't be managed by the web.
And that the files he was putting together and saying that he actually hacked, the two files
he said he had were really one file, and he was playing with the data; moving it to two
different files to claim two hacks.
Taking that into account with the fabrication of the Russian fingerprints, it leads us back
to inferring that in fact the marble framework out of the Vault 7 compromise of CIA hacking
routines was a possible user in this case.
In other words, it looked like the CIA did this, and that it was a matter of the CIA making
it look like the Russians were doing the hack. So, when you look at that and also look at the
DNC emails that were published by Wikileaks that have this phat file format in them, all 35,813
of these emails have rounded off times to the nearest even second.
That's a phat file format property; that argues that those files were, in fact, downloaded
to a thumb drive or CD-rom and physically transported before Wikileaks posted them. Which again
argues that it wasn't a hack.
So, all of the evidence we're finding is clearly evidence that the Russians were not in fact
hacking; it was probably our own people. It's very hard for us to get this kind of information
out. The mainstream media won't cover it; none of them will. It's very hard. We get some
bloggers to do that and some radio shows.
Also, I put all of this into a sworn affidavit in the Roger Stone case. I did that because
all of the attack on him was predicated on him being connected with this Russian hack which was
false to being with.
All the evidence we're accumulating clearly says and implies, the US government --
namely the FBI, CIA, the DOJ, and of course State Department -- all these people involved in
this hack, bought a dossier and all of the information going forward to the FISA
court.
All of them knew that this was a fake from the very beginning, because this Guccifer 2.0
character was fabricating it. They were using him plus the Internet Research Agency [IRA] as
"supposed trolls of the Russian government".
Well, when they sent their lawyers over to challenge that in a court of law, the
government failed to prove they had any connection with the Russian government.
They basically were chastised by the judge for fabricating a charge against this company.
So, if you take the IRA and the trolls away from that argument, and Guccifer 2.0, then the
entire Mueller report is a provable fabrication; because it's based on Guccifer 2.0 and the
IRA.
Then the entire Rosenstein indictment is also a fabrication and a fake and a fraud for
the same reasons. The judges seem to be involved in trying to keep this information out of the
public domain.
So, we have a really extensive shadow government here at work, trying to keep the
understanding and knowledge of what's really happening away from the public of the United
States. That's the really bad part. And the mainstream media is a participant in this; they're
culpable.
His dissent from the consensus view that Russia interfered with the 2016 US election
appears to be based on Russian disinformation."
They provide no footnote or linked-to source for their allegation
Ever since Binney went public criticizing U.S. intelligence agencies, they have been trying
to discredit him.
Thus far, however, their efforts have been nothing more than insinuations against his
person, without any specific allegation of counter-evidence that discredits any of his actual
assertions.
Martin Usher ,
The "Russia" thing was never able to differentiate between "Russians" and "the Russian
state". Its a product of a Cold War mindset that can't conceive of that country without it
being 150 million puppets all controlled by string from an office in the Kremlin. In reality
its just another country, one that offers goods and services to the world just like anywhere
else. So while we just assume that a company like SCL (Cambridge Analytica's parent) would
have personnel from and offices in many countries and have contracts with various political
parties in many countries we just can't seem to get our heads around the idea that a company
operating inside -- or even headquartered -- in Russia isn't automatically some kind of
Kremlin front. (Well, yes, it could be but the same way that a company in the UK could be a
front for the UK government, e.g. the Gateside Mill story in Scotland's Daily Record).
Another factor that might come into play is the idea that 'analytics', the key to business
on the Internet, is actually nothing more than a sophisticated form of traffic analysis, a
well known espionage tool. Any government worth its salt that's likely to be on the receiving
end of a propaganda campaign would be very interested in understanding the reach of such a
tool and learning how to manage that reach. So its possible that if we find the Russian
government taking out advertisements on Facebook through a front company to 'influence'
people its likely that they're more interested in evaluating that reach than the simplistic
view that they're 'trying to influence an election' (its not as if foreign interests or even
governments ever try to influence elections)(color revolution, anyone?). Allowing unfettered
access by these tools to one's nation is a bit like taking down one's defenses -- fine if
you're happy with vassal state ("ally") status but not if you're potentially an adversary --
so its important to know how to control it, no less important than having a decent air
defense system.
And in a further retort to all this nonsense, Harold Wilson, the last socialist leader of the
Labour Party back in the 1970s, won four general elections, a feat that's never been
repeated by any party leader.
This does directly relate to this thread, because the Americans overthrew Wilson. Just as they have done now with Corbyn. You really need to take your country back, whether you're a Brit or American.
paul ,
We are fortunate that there are still persons of integrity even in the spook organisations
– Binney, Kyriakou, Manning, Snowden. Without them and Assange a lot of this
criminality would never have seen the light of day.
Jack_Garbo ,
Diagnosing the disease does not imply the cure has been found. You simply know how much
sicker you are. Not helpful.
Nothing has changed despite all the revelations of intelligence shenanigans. Apologies do not
cure the patient when they're still spreading the disease. In fact, the opposite.
paul ,
Wikipedia holds out the begging bowl to anybody who uses it now.
I don't know why – they get plenty of CIA and Soros money.
All they've got to do now is wheel out the psychopath and war criminal, Tony Blair, to say:
"it's the Russians wot dunnit".
Oh my God
Jen ,
They don't need to, they have Tony Blair's fellow Brit psycho Boris Johnson to go on
autopilot and blame the Russians the moment something happens and just before London Met
start their investigations.
ZigZagWanderer ,
@ 1.15.58 "Intelligence community has become a self licking ice cream cone"
Larry Johnson and Bill Binney always worth listening to. Try to find the time.
Antonym ,
True except for Trump. Just look how hard deep state tries to unseat him.
Damaging your own puppet is not normal for a puppeteer.
J_Garbo ,
I suspected that Deep State has at least two opposing factions. The Realistists want him to
break up the empire, turn back into a republic; the Delusionals want to extend the empire,
continue to exploit and destroy the world. If so, the contradictions, reversals, incoherence
make sense. IMO as I said.
Gary Weglarz ,
I predict that all Western MSM will begin to accurately and vocally cover Mr. Binney's
findings about this odious and treasonous U.S. government psyop at just about the exact time
that – "hell freezes over" – as they say.
Does anyone know how the delegates are allocated based on the 15% threshold?
For example, today's CA poll has Sanders at leading with 24% and Warren the only other
candidate above 15% (at 22%).
My preliminary search says if you get x% of the vote, you get x number of delegates .
So what happens to the 56% of delegates that correspond to votes for people other than
Sanders and Warren? Or do Sanders and Warren split them somehow?
Republicans are afraid to raise this key question. Democrats are afraid of even mentioning CrowdStrike in Ukrainegate hearings.
The Deep State wants to suppress this matter entirely.
Alperovisch connections to Ukraine and his Russophobia are well known. Did Alperovich people played the role of "Fancy Bear"? Or
Ukrainian SBU was engaged? George Eliason clams that
"I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators." ... "Since there is so much crap surrounding
the supposed hack such as law enforcement teams never examining the DNC server or maintaining control of it as evidence, could the hacks
have been a cover-up?"
Notable quotes:
"... So far at least I cannot rule out the possibility that that this could have involved an actual 'false flag' hack. A possible calculation would have been that this could have made it easier for Alperovitch and 'CrowdStrike', if more people had asked serious questions about the evidence they claimed supported the 'narrative' of GRU responsibility. ..."
"... What she suggested was that the FBI had found evidence, after his death, of a hack of Rich's laptop, designed as part of a 'false flag' operation. ..."
"... On this, see his 8 October, 'Motion for Discovery and Motion to Accept Supplemental Evidence' in Clevenger's own case against the DOJ, document 44 on the relevant 'Courtlistener' pages, and his 'Unopposed Motion for Stay', document 48. Both are short, and available without a 'PACER' subscription, and should be compulsory reading for anyone seriously interested in ascertaining the truth about 'Russiagate.' (See https://www.courtlistener.com/docket/6775665/clevenger-v-us-department-of-justice/ .) ..."
"... And here, is is also material that he may have had more than one laptop, that 'hard drives' can be changed, and that the level of computer skills that can be found throughout the former Soviet Union is very high. Another matter of some importance is that Ed Butowsky's 'Debunking Rod Wheeler's Claims' site is back up online. (See http://debunkingrodwheelersclaims.net ) ..."
"... The question of whether the 'timeline' produced by Hersh's FBI informant was accurate, or a deliberate attempt to disguise the fact that all kinds of people were well aware of Rich's involvement before his murder, and well aware of the fact of a leak before he was identified as its source, is absolutely central to how one interprets 'Russiagate.' ..."
"... Why did Crowdstrike conclude it was a "Russian breach", when other evidence does show it was an internal download. What was Crowdstrike's method and motivation to reach the "Russian" conclusion instead. Why has that methodology been sealed? ..."
"... Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers. ..."
"... What were the relationships between Crowdstrike, DNC, FBI and the Mueller team that conspired to reach this Russian conclusion. ..."
"... Why did the Roger Stone judge, who just sent Stone away for life, refuse Stone's evidentiary demand to ascertain how exactly Crowdstrike reached its Russsian hacking conclusion, that the court then linked to Stone allegedly lying about this Russian link ..."
"... Indeed, let's set out with full transparency the Ukraine -- Crowsdtrike player links and loyalties to see if there are any smoking guns yet undisclosed. Trump was asking for more information about Crowdstrike like a good lawyer - never ask a question when you don't already know the right answer. Crowdstrike is owned by a Ukrainian by birth ..."
"... Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike. ..."
"... In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives. ..."
"... His role in what we may define as "converting DNC leak into DNC hack" (I would agree with you that this probably was a false flag operation), which was supposedly designed to implicated Russians, and possibly involved Ukrainian security services, is very suspicious indeed. ..."
"... Mueller treatment of Crowdstrike with "kid gloves" may suggest that Alperovich actions were part of a larger scheme. After all Crowdstike was a FBI contactor at the time. ..."
The favor was for Ukraine to investigate Crowdstrike and the 2016 DNC computer breach.
Reliance on Crowdstrike to investigate the DNC computer, and not an independent FBI investigation, was tied very closely to
the years long anti-Trump Russiagate hoax and waste of US taxpayer time and money.
Why is this issue ignored by both the media and the Democrats. The ladies doth protest far too much.
what exactly, to the extend I recall, could the Ukraine contribute the the DNC's server/"fake malware" troubles? Beyond, that
I seem to vaguely recall, the supposed malware was distributed via an Ukrainan address.
On the other hand, there seems to be the (consensus here?) argument there was no malware breach at all, simply an insider copying
files on a USB stick.
If people discovered there had been a leak, it would perfectly natural that in order to give 'resilience' to their cover-up
strategies, they could have organised a planting of evidence on the servers, in conjunction with elements in Ukraine.
So far at least I cannot rule out the possibility that that this could have involved an actual 'false flag' hack. A possible
calculation would have been that this could have made it easier for Alperovitch and 'CrowdStrike', if more people had asked serious
questions about the evidence they claimed supported the 'narrative' of GRU responsibility.
The issues involved become all the more important, in the light of the progress of Ty Clevenger's attempts to exploit the clear
contradiction between the claims by the FBI, in response to FOIA requests, to have no evidence relating to Seth Rich, and the
remarks by Ms. Deborah Sines quoted by Michael Isikoff.
What she suggested was that the FBI had found evidence, after his death, of a hack of Rich's laptop, designed as part of
a 'false flag' operation.
On this, see his 8 October, 'Motion for Discovery and Motion to Accept Supplemental Evidence' in Clevenger's own case against
the DOJ, document 44 on the relevant 'Courtlistener' pages, and his 'Unopposed Motion for Stay', document 48. Both are short,
and available without a 'PACER' subscription, and should be compulsory reading for anyone seriously interested in ascertaining
the truth about 'Russiagate.' (See
https://www.courtlistener.com/docket/6775665/clevenger-v-us-department-of-justice/
.)
It is eminently possible that Ms. Hines has simply made an 'unforced error.'
However, I do not – yet – feel able totally to discount the possibility that what is actually at issue is a 'ruse', produced
as a contingency plan to ensure that if it becomes impossible to maintain the cover-up over Rich's involvement in its original
form, his laptop shows 'evidence' compatible with the 'Russiagate' narrative.
And here, is is also material that he may have had more than one laptop, that 'hard drives' can be changed, and that the
level of computer skills that can be found throughout the former Soviet Union is very high. Another matter of some importance
is that Ed Butowsky's 'Debunking Rod Wheeler's Claims' site is back up online. (See
http://debunkingrodwheelersclaims.net )
Looking at it from the perspective of an old television current affairs hack, I do think that, while it is very helpful to
have some key material available in a single place, it would useful if more attention was paid to presentation.
In particular, it would be a most helpful 'teaching aid', if a full and accurate transcript was made of the conversation with
Seymour Hersh which Ed Butowsky covertly recorded. What seems clear is that both these figures ended up in very difficult positions,
and that the latter clearly engaged in 'sleight of hand' in relation to his dealings with the former. That said, the fact that
Butowsky's claims about his grounds for believing that Hersh's FBI informant was Andrew McCabe are clearly disingenuous does not
justify the conclusion that he is wrong.
It is absolutely clear to me – despite what 'TTG', following that 'Grub Street' hack Folkenflik, claimed – that when Hersh
talked to Butowsky, he believed he had been given accurate information. Indeed, I have difficulty seeing how anyone whose eyes
were not hopelessly blinded by prejudice, a\nd possibly fear of where a quest for the truth might lead, could not see that, in
this conversation, both men were telling the truth, as they saw it.
However, all of us, including the finest and most honourable of journalists can, from time to time, fall for disinformation.
(If anyone says they can always spot when they are being played, all I can say is, if you're right, you're clearly Superman, but
it is more likely that you are a fool or knave, if not both.)
The question of whether the 'timeline' produced by Hersh's FBI informant was accurate, or a deliberate attempt to disguise
the fact that all kinds of people were well aware of Rich's involvement before his murder, and well aware of the fact of a leak
before he was identified as its source, is absolutely central to how one interprets 'Russiagate.'
1. Why did Crowdstrike conclude it was a "Russian breach", when other evidence does show it was an internal download. What
was Crowdstrike's method and motivation to reach the "Russian" conclusion instead. Why has that methodology been sealed?
2. Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently
put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to
help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers.
3. What were the relationships between Crowdstrike, DNC, FBI and the Mueller team that conspired to reach this Russian
conclusion.
4. Why did the Roger Stone judge, who just sent Stone away for life, refuse Stone's evidentiary demand to ascertain how
exactly Crowdstrike reached its Russsian hacking conclusion, that the court then linked to Stone allegedly lying about this Russian
link .
5. Indeed, let's set out with full transparency the Ukraine -- Crowsdtrike player links and loyalties to see if there are
any smoking guns yet undisclosed. Trump was asking for more information about Crowdstrike like a good lawyer - never ask a question
when you don't already know the right answer. Crowdstrike is owned by a Ukrainian by birth .
Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently
put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted
to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers.
Alperovich is really a very suspicious figure. Rumors are that he was involved in compromising PGP while in MacAfee( June 2nd,
2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams - YouTube ):
Investigative Journalist George Webb worked at MacAfee and Network Solutions in 2000 when the CEO Bill Larsen bought a small,
Moscow based, hacking and virus writing company to move to Silicon Valley.
MacAfee also purchased PGP, an open source encryption software developed by privacy advocate to reduce NSA spying on the
public.
The two simultaneous purchase of PGP and the Moscow hacking team by Metwork Solutions was sponsored by the CIA and FBI in order
to crack encrypted communications to write a back door for law enforcement.
Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would
go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike.
In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted
communications for covert action operatives.
His role in what we may define as "converting DNC leak into DNC hack" (I would agree with you that this probably was a
false flag operation), which was supposedly designed to implicated Russians, and possibly involved Ukrainian security services,
is very suspicious indeed.
Mueller treatment of Crowdstrike with "kid gloves" may suggest that Alperovich actions were part of a larger scheme. After
all Crowdstike was a FBI contactor at the time.
While all this DNC hack saga is completely unclear due to lack of facts and the access to the evidence, there are some stories
on Internet that indirectly somewhat strengthen your hypothesis:
"... Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council, which takes a hawkish approach toward Russia. The Council in turn is financed by Google Inc. ..."
"... In a perhaps unexpected development, another Atlantic Council funder is Burisma, the natural gas company at the center of allegations regarding Joe Biden and his son, Hunter Biden. Those allegations were the subject of Trump's inquiry with Zelemsky related to Biden. The Biden allegations concern significant questions about Biden's role in Ukraine policy under the Obama administration. This took place during a period when Hunter Biden received $50,000 a month from Burisma. ..."
"... Google, Soros's Open Society Foundations, the Rockefeller Fund and an agency of the State Department each also finance a self-described investigative journalism organization repeatedly referenced as a source of information in the so-called whistleblower's complaint alleging Trump was "using the power of his office to solicit interference from a foreign country" in the 2020 presidential race. ..."
"... Another listed OCCRP funder is the Omidyar Network, which is the nonprofit for liberal billionaire eBay founder Pierre Omidyar. ..."
"... Together with Soros's Open Society, Omidyar also funds the Poynter Institute for Media Studies, which hosts the International Fact-Checking Network that partnered with Facebook to help determine whether news stories are "disputed." ..."
There are common threads that run through an organization repeatedly relied upon in the
so-called whistleblower's complaint about President Donald Trump and CrowdStrike, the outside
firm utilized to conclude that Russia hacked the Democratic National Committee's servers
since the DNC would not allow the U.S. government to inspect the servers.
One of several themes is financing tied to Google, whose Google Capital led a $100 million
funding drive that financed Crowdstrike. Google Capital, which now goes by the name of
CapitalG, is an arm of Alphabet Inc., Google's parent company. Eric Schmidt, the chairman of
Alphabet, has been a staunch and active supporter of Hillary Clinton and is a longtime donor
to the Democratic Party.
CrowdStrike was mentioned by Trump in his call with Ukranian President Volodymyr Zelensky.
Perkins Coie, the law firm that represented the DNC and Hillary Clinton's campaign,
reportedly helped draft CrowdStrike to aid with the DNC's allegedly hacked server.
On behalf of the DNC and Clinton's campaign, Perkins Coie also paid the controversial
Fusion GPS firm to produce the infamous, largely-discredited anti-Trump dossier compiled by
former British spy Christopher Steele.
CrowdStrike is a California-based cybersecurity technology company co-founded by Dmitri
Alperovitch.
Alperovitch is a nonresident senior fellow of the
Cyber Statecraft Initiative at the Atlantic Council, which takes a hawkish approach toward
Russia. The Council in turn is financed
by Google Inc.
In a perhaps unexpected development, another Atlantic Council
funder is Burisma, the natural gas company at the center of allegations regarding Joe
Biden and his son, Hunter Biden. Those allegations were the subject of Trump's inquiry with
Zelemsky related to Biden. The Biden allegations concern significant questions about Biden's
role in Ukraine policy under the Obama administration. This took place during a period when
Hunter Biden received $50,000 a month from Burisma.
Besides Google and Burisma funding, the Council is also financed by billionaire activist
George Soros's Open Society Foundations as well as the Rockefeller Brothers Fund, Inc. and
the U.S. State Department.
Google, Soros's Open Society Foundations, the Rockefeller Fund and an agency of the State
Department each also finance a self-described investigative journalism organization
repeatedly referenced as a source of information in the so-called whistleblower's complaint
alleging Trump was "using the power of his office to solicit interference from a foreign
country" in the 2020 presidential race.
The charges in the July 22 report referenced in the whistleblower's document and released
by the Google and Soros-funded organization, the Organized Crime and Corruption Reporting
Project (OCCRP), seem to be the public precursors for a lot of the so-called whistleblower's
own claims, as Breitbart News
documented .
One key section of the so-called whistleblower's document claims that "multiple U.S.
officials told me that Mr. Giuliani had reportedly privately reached out to a variety of
other Zelensky advisers, including Chief of Staff Andriy Bohdan and Acting Chairman of the
Security Service of Ukraine Ivan Bakanov."
This was allegedly to follow up on Trump's call with Zelensky in order to discuss the
"cases" mentioned in that call, according to the so-called whistleblower's narrative. The
complainer was clearly referencing Trump's request for Ukraine to investigate the Biden
corruption allegations.
Even though the statement was written in first person – "multiple U.S. officials
told me" – it contains a footnote referencing a report by the Organized Crime and
Corruption Reporting Project (OCCRP).
That footnote reads:
In a report published by the Organized Crime and Corruption Reporting Project (OCCRP) on
22 July, two associates of Mr. Giuliani reportedly traveled to Kyiv in May 2019 and met
with Mr. Bakanov and another close Zelensky adviser, Mr. Serhiy Shefir.
The so-called whistleblower's account goes on to rely upon that same OCCRP report on three
more occasions. It does so to:
Write that Ukraine's Prosecutor General Yuriy Lutsenko
"also stated that he wished to communicate directly with Attorney General Barr on these
matters." Document that Trump adviser Rudi Giuliani "had spoken in late 2018 to former
Prosecutor General Shokin, in a Skype call arranged by two associates of Mr. Giuliani."
Bolster the charge that, "I also learned from a U.S. official that 'associates' of Mr.
Giuliani were trying to make contact with the incoming Zelenskyy team." The so-called
whistleblower then relates in another footnote, "I do not know whether these associates of
Mr. Giuliani were the same individuals named in the 22 July report by OCCRP, referenced
above."
The OCCRP
report repeatedly referenced is actually a "joint investigation by the Organized Crime
and Corruption Reporting Project (OCCRP) and BuzzFeed News, based on interviews and court and
business records in the United States and Ukraine."
BuzzFeed infamously also first
published the full anti-Trump dossier alleging unsubstantiated collusion between Trump's
presidential campaign and Russia. The dossier was paid for by Hillary Clinton's campaign and
the Democratic National Committee and was produced by the Fusion GPS opposition dirt
outfit.
The OCCRP and BuzzFeed "joint investigation" resulted in both OCCRP and BuzzFeed
publishing similar lengthy pieces on July 22 claiming that Giuliani was attempting to use
connections to have Ukraine investigate Trump's political rivals.
The so-called whistleblower's document, however, only mentions the largely unknown OCCRP
and does not reference BuzzFeed, which has faced scrutiny over its reporting on the Russia
collusion claims.
Another listed OCCRP funder is the Omidyar Network, which is the nonprofit for liberal
billionaire eBay founder Pierre Omidyar.
Together with Soros's Open Society, Omidyar also
funds the Poynter Institute for Media Studies, which hosts the International
Fact-Checking Network that partnered with Facebook to help determine whether news stories are
"disputed."
Like OCCRP, the Poynter Institute's so-called news fact-checking project is openly
funded by not only Soros' Open Society Foundations but also Google and the National
Endowment for Democracy.
CrowdStrike and DNC servers
CrowdStrike, meanwhile, was brought up by Trump in his phone call with Zelensky. According to the transcript, Trump told Zelensky, "I would like you to find out what
happened with this whole situation with Ukraine, they say CrowdStrike I guess you have one of
your wealthy people The server, they say Ukraine has it."
In his extensive
report , Special Counsel Robert S. Mueller notes that his investigative team did not
"obtain or examine" the servers of the DNC in determining whether those servers were hacked
by Russia.
The DNC famously refused to allow the FBI to access its servers to verify the allegation
that Russia carried out a hack during the 2016 presidential campaign. Instead, the DNC
reached an arrangement with the FBI in which CrowdStrike conducted forensics on the server
and shared details with the FBI.
In testimony before the Senate Intelligence Committee in January 2017, then-FBI Director
James Comey
confirmed that the FBI registered "multiple requests at different levels," to review the
DNC's hacked servers. Ultimately, the DNC and FBI came to an agreement in which a "highly
respected private company" -- a reference to CrowdStrike -- would carry out forensics on the
servers and share any information that it discovered with the FBI, Comey testified.
A senior law enforcement official stressed the importance of the FBI gaining direct access
to the servers, a request that was denied by the DNC.
"The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to
servers and data, only to be rebuffed until well after the initial compromise had been
mitigated," the official was quoted by the news media as saying.
"This left the FBI no choice but to rely upon a third party for information. These actions
caused significant delays and inhibited the FBI from addressing the intrusion earlier," the
official continued.
... ... ...
Aaron Klein is Breitbart's Jerusalem bureau chief and senior investigative reporter.
He is a New York Times bestselling author and hosts the popular weekend talk radio program, "
Aaron Klein Investigative
Radio ." Follow him on Twitter @AaronKleinShow. Follow him on Facebook.
Joshua Klein contributed research to this article.
Russians did not hack the DNC system, a Russian named Dmitri Alperovitch is the hacker
and he works for President Obama. In the last five years the Obama administration has
turned exclusively to one Russian to solve every major cyber-attack in America, whether the
attack was on the U.S. government or a corporation. Only one "super-hero cyber-warrior" seems
to "have the codes" to figure out "if" a system was hacked and by "whom."
Dmitri's company, CrowdStrike has been called in by Obama to solve mysterious attacks on
many high level government agencies and American corporations, including: German Bundestag,
Democratic National Committee, Democratic Congressional Campaign Committee (DCCC), the White
House, the State Department, SONY, and many others.
CrowdStrike's philosophy is: "You don't have a malware problem; you have an adversary
problem."
CrowdStrike has played a critical role in the development of America's cyber-defense policy.
Dmitri Alperovitch and George Kurtz, a former head of the FBI cyberwarfare unit founded
CrowdStrike. Shawn Henry, former executive assistant director at the FBI is now CrowdStrike's
president of services. The company is crawling with former U.S. intelligence agents.
Before Alperovitch founded CrowdStrike in 2011, he was working in Atlanta as the chief
threat officer at the antivirus software firm McAfee, owned by Intel (a DARPA company). During
that time, he "discovered" the Chinese had compromised at least seventy-one companies and
organizations, including thirteen defense contractors, three electronics firms, and the
International Olympic Committee. He was the only person to notice the biggest cyberattack in
history! Nothing suspicious about that.
Alperovitch and the DNC
After CrowdStrike was hired as an independent "vendor" by the DNC to investigate a possible
cyberattack on their system, Alperovitch sent the DNC a proprietary software package called
Falcon that monitors the networks of its clients in real time. According to Alperovitch,
Falcon "lit up," within ten seconds of being installed at the DNC. Alperovitch had his
"proof" in TEN SECONDS that Russia was in the network. This "alleged" evidence of Russian
hacking has yet to be shared with anyone.
As Donald Trump has pointed out, the FBI, the agency that should have been immediately
involved in hacking that effects "National Security," has yet to even examine the DNC system to
begin an investigation. Instead, the FBI and 16 other U.S. "intelligence" agencies simply
"agree" with Obama's most trusted "cyberwarfare" expert Dmitri Alperovitch's "TEN SECOND"
assessment that produced no evidence to support the claim.
Also remember that it is only Alperovitch and CrowdStrike that claim to have evidence
that it was Russian hackers . In fact, only two hackers were found to have been in the
system and were both identified by Alperovitch as Russian FSB (CIA) and the Russian GRU (DoD).
It is only Alperovitch who claims that he knows that it is Putin behind these two hackers.
Alperovitch failed to mention in his conclusive "TEN SECOND" assessment that Guccifer 2.0
had already hacked the DNC and made available to the public the documents he hacked –
before Alperovitch did his ten second assessment. Alperovitch reported that no other hackers
were found, ignoring the fact that Guccifer 2.0 had already hacked and released DNC documents
to the public. Alperovitch's assessment also goes directly against Julian Assange's repeated
statements that the DNC leaks did not come from the Russians.
The ridiculously fake cyber-attack assessment done by Alperovitch and CrowdStrike
naïvely flies in the face of the fact that a DNC insider admitted that he had released the
DNC documents. Julian Assange implied in an interview that the murdered Democratic
National Committee staffer, Seth Rich, was the source of a trove of damaging emails the website
posted just days before the party's convention. Seth was on his way to testify about the DNC
leaks to the FBI when he was shot dead in the street.
It is also absurd to hear Alperovitch state that the Russian FSB (equivalent to the CIA) had
been monitoring the DNC site for over a year and had done nothing. No attack, no theft, and no
harm was done to the system by this "false-flag cyber-attack" on the DNC – or at least,
Alperovitch "reported" there was an attack. The second hacker, the supposed Russian military
(GRU – like the U.S. DoD) hacker, had just entered the system two weeks before and also
had done "nothing" but observe.
It is only Alperovitch's word that reports that the Russian FSB was "looking for files on
Donald Trump."
It is only this false claim that spuriously ties Trump to the "alleged"
attack. It is also only Alperovitch who believes that this hack that was supposedly "looking
for Trump files" was an attempt to "influence" the election. No files were found about Trump by
the second hacker, as we know from Wikileaks and Guccifer 2.0's leaks. To confabulate that
"Russian's hacked the DNC to influence the elections" is the claim of one well-known Russian
spy. Then, 17 U.S. intelligence agencies unanimously confirm that Alperovitch is correct
– even though there is no evidence and no investigation was ever conducted .
How does Dmitri Alperovitch have such power? Why did Obama again and again use Alperovitch's
company, CrowdStrike, when they have miserably failed to stop further cyber-attacks on the
systems they were hired to protect? Why should anyone believe CrowdStrikes false-flag
report?
After documents from the DNC continued to leak, and Guccifer 2.0 and Wikileaks made
CrowdStrike's report look foolish, Alperovitch decided the situation was far worse than he had
reported. He single-handedly concluded that the Russians were conducting an "influence
operation" to help win the election for Trump . This false assertion had absolutely no
evidence to back it up.
On July 22, three days before the Democratic convention in Philadelphia, WikiLeaks dumped a
massive cache of emails that had been "stolen" (not hacked) from the DNC. Reporters soon found
emails suggesting that the DNC leadership had favored Hillary Clinton in her primary race
against Bernie Sanders, which led Debbie Wasserman Schultz, the DNC chair, along with three
other officials, to resign.
Just days later, it was discovered that the Democratic Congressional Campaign Committee
(DCCC) had been hacked. CrowdStrike was called in again and once again, Alperovitch immediately
"believed" that Russia was responsible. A lawyer for the DCCC gave Alperovitch permission to
confirm the leak and to name Russia as the suspected author. Two weeks later, files from the
DCCC began to appear on Guccifer 2.0's website. This time Guccifer released information about
Democratic congressional candidates who were running close races in Florida, Ohio, Illinois,
and Pennsylvania. On August 12, Guccifer went further, publishing a spreadsheet that included
the personal email addresses and phone numbers of nearly two hundred Democratic members of
Congress.
Once again, Guccifer 2.0 proved Alperovitch and CrowdStrike's claims to be grossly incorrect
about the hack originating from Russia, with Putin masterminding it all. Nancy Pelosi offered
members of Congress Alperovitch's suggestion of installing Falcon , the system that
failed to stop cyberattacks at the DNC, on all congressional laptops.
Key Point: Once Falcon was installed on the computers of members of the U.S.
Congress, CrowdStrike had even further full access into U.S. government accounts.
Alperovitch's "Unbelievable" History
Dmitri was born in 1980 in Moscow where his father, Michael, was a nuclear physicist, (so
Dmitri claims). Dmitri's father was supposedly involved at the highest levels of Russian
nuclear science. He also claims that his father taught him to write code as a child.
In 1990, his father was sent to Maryland as part of a nuclear-safety training program for
scientists. In 1994, Michael Alperovitch was granted a visa to Canada, and a year later the
family moved to Chattanooga, where Michael took a job with the Tennessee Valley Authority.
While Dmitri Alperovitch was still in high school, he and his father started an
encryption-technology business. Dmitri studied computer science at Georgia Tech and went on to
work at an antispam software firm. It was at this time that he realized that cyber-defense was
more about psychology than it was about technology. A very odd thing to conclude.
Dmitri Alperovitch posed as a "Russian gangster" on spam discussion forums which brought his
illegal activity to the attention of the FBI – as a criminal. In 2005, Dmitri flew to
Pittsburgh to meet an FBI agent named Keith Mularski, who had been asked to lead an undercover
operation against a vast Russian credit-card-theft syndicate. Alperovitch worked closely with
Mularski's sting operation which took two years, but it ultimately brought about fifty-six
arrests. Dmitri Alperovitch then became a pawn of the FBI and CIA.
In 2010, while he was at McAfee, the head of cybersecurity at Google told Dmitri that Gmail
accounts belonging to human-rights activists in China had been breached. Google suspected the
Chinese government. Alperovitch found that the breach was unprecedented in scale; it affected
more than a dozen of McAfee's clients and involved the Chinese government. Three days after his
supposed discovery, Alperovitch was on a plane to Washington where he had been asked to vet a
paragraph in a speech by the secretary of state, Hillary Clinton.
2014, Sony called in CrowdStrike to investigate a breach of its network. Alperovitch needed
just "two hours" to identify North Korea as the adversary. Executives at Sony asked Alperovitch
to go public with the information immediately, but it took the FBI another three weeks before
it confirmed the attribution.
Alperovitch then developed a list of "usual suspects" who were well-known hackers who had
identifiable malware that they commonly used. Many people use the same malware and
Alperovitch's obsession with believing he has the only accurate list of hackers in the world is
plain idiocy exacerbated by the U.S. government's belief in his nonsense. Alperovitch even
speaks like a "nut-case" in his personal Twitters, which generally have absolutely no
references to the technology he is supposedly the best at in the entire world.
Dmitri – Front Man for His Father's Russian Espionage Mission
After taking a close look at the disinformation around Dmitri and his father, it is clear to
see that Michael Alperovitch became a CIA operative during his first visit to America.
Upon his return to Russia, he stole the best Russian encryption codes that were used to protect
the top-secret work of nuclear physics in which his father is alleged to have been a major
player. Upon surrendering the codes to the CIA when he returned to Canada, the CIA made it
possible for a Russian nuclear scientist to become an American citizen overnight and gain a
top-secret security clearance to work at the Oakridge plant, one of the most secure and
protected nuclear facilities in America . Only the CIA can transform a Russian into an
American with a top-secret clearance overnight.
We can see on Michael Alperovitch's Linked In page that he went from one fantastically
top-secret job to the next without a break from the time he entered America. He seemed to be on
a career path to work in every major U.S. agency in America. In every job he was hired as the
top expert in the field and the leader of the company. All of these jobs after the first one
were in cryptology, not nuclear physics. As a matter of fact, Michael became the top expert in
America overnight and has stayed the top expert to this day.
Most of the work of cyber-security is creating secure interactions on a non-secure system
like the Internet. The cryptologist who assigns the encryption codes controls the system
from that point on .
Key Point: Cryptologists are well known for leaving a "back-door" in the base-code so
that they can always have over-riding control.
Michael Alperovitch essentially has the "codes" for all Department of Defense sites, the
Treasury, the State Department, cell-phones, satellites, and public media . There is hardly
any powerful agency or company that he has not written the "codes" for. One might ask, why do
American companies and the U.S. government use his particular codes? What are so special about
Michael's codes?
Stolen Russian Codes
In December, Obama ordered the U.S. military to conduct cyberattacks against Russia in
retaliation for the alleged DNC hacks. All of the attempts to attack Russia's military and
intelligence agencies failed miserably. Russia laughed at Obama's attempts to hack their
systems. Even the Russian companies targeted by the attacks were not harmed by Obama's
cyber-attacks. Hardly any news of these massive and embarrassing failed cyber-attacks were
reported by the Main Stream Media. The internet has been scrubbed clean of the reports that
said Russia's cyber-defenses were impenetrable due to the sophistication of their encryption
codes.
Michael Alperovitch was in possession of those impenetrable codes when he was a top
scientist in Russia. It was these very codes that he shared with the CIA on his first trip
to America . These codes got him spirited into America and "turned into" the best
cryptologist in the world. Michael is simply using the effective codes of Russia to design
his codes for the many systems he has created in America for the CIA .
KEY POINT: It is crucial to understand at this junction that the CIA is not solely working
for America . The CIA works for itself and there are three branches to the CIA – two of
which are hostile to American national interests and support globalism.
Michael and Dmitri Alperovitch work for the CIA (and international intelligence
corporations) who support globalism . They, and the globalists for whom they work, are
not friends of America or Russia. It is highly likely that the criminal activities of Dmitri,
which were supported and sponsored by the FBI, created the very hackers who he often claims are
responsible for cyberattacks. None of these supposed "attackers" have ever been found or
arrested; they simply exist in the files of CrowdStrike and are used as the "usual culprits"
when the FBI or CIA calls in Dmitri to give the one and only opinion that counts. Only Dmitri's
"suspicions" are offered as evidence and yet 17 U.S. intelligence agencies stand behind the
CrowdStrike report and Dmitri's suspicions.
Michael Alperovitch – Russian Spy with the Crypto-Keys
Essentially, Michael Alperovitch flies under the false-flag of being a cryptologist who
works with PKI. A public key infrastructure (PKI) is a system for the creation, storage, and
distribution of digital certificates which are used to
verify that a particular public key belongs to a certain entity. The PKI creates digital
certificates which map public keys to entities, securely stores these certificates in a central
repository and revokes them if needed. Public key cryptography is a
cryptographic
technique that enables entities to securely communicate on an insecure
public network (the Internet), and reliably verify the identity of an entity via digital signatures .
Digital signatures use Certificate Authorities to digitally sign and publish the public key
bound to a given user. This is done using the CIA's own private key, so that trust in the user
key relies on one's trust in the validity of the CIA's key. Michael Alperovitch is
considered to be the number one expert in America on PKI and essentially controls the
market .
Michael's past is clouded in confusion and lies. Dmitri states that his father was a nuclear
physicist and that he came to America the first time in a nuclear based shared program between
America and Russia. But if we look at his current personal Linked In page, Michael claims he
has a Master Degree in Applied Mathematics from Gorky State University. From 1932 to 1956, its
name was State University of Gorky. Now it is known as Lobachevsky State University of Nizhni
Novgorod – National Research University (UNN), also known as Lobachevsky University. Does
Michael not even know the name of the University he graduated from? And when does a person with
a Master's Degree become a leading nuclear physicist who comes to "visit" America. In Michael's
Linked In page there is a long list of his skills and there is no mention of nuclear
physics.
Also on Michael Alperovitch's Linked In page we find some of his illustrious history that
paints a picture of either the most brilliant mind in computer security, encryption, and
cyberwarfare, or a CIA/FBI backed Russian spy. Imagine that out of all the people in the world
to put in charge of the encryption keys for the Department of Defense, the U.S. Treasury, U.S.
military satellites, the flow of network news, cell phone encryption, the Pathfire (media control)
Program, the Defense Information Systems Agency, the Global Information Grid, and TriCipher
Armored Credential System among many others, the government hires a Russian spy . Go
figure.
Michael Alperovitch's Linked In Page
Education:
Gorky State University, Russia, MS in Applied Mathematics
VT
IDirect -2014 – Designing security architecture for satellite communications
including cryptographic protocols, authentication.
Principal SME (Contractor)
DISA
-Defense Information Systems Agency (Manager of the Global Information Grid) – 2012-2014
– Worked on PKI and identity management projects for DISA utilizing Elliptic Curve
Cryptography. Performed application security and penetration testing.
Technical Lead (Contractor)
U.S.
Department of the Treasury – 2011 – Designed enterprise validation service
architecture for PKI certificate credentials with Single Sign On authentication.
Comtech Mobile
Datacom – 2007-2010 – Subject matter expert on latest information security
practices, including authentication, encryption and key management.
BellSouth – 2003-2006 – Designed and built server-side Jabber-based messaging
platform with Single Sign On authentication.
Principal Software Research Engineer
Pathfire – 2001-2002
– Designed and developed Digital Rights Management Server for Video on Demand and content
distribution applications. Pathfire provides digital media distribution and management
solutions to the television, media, and entertainment industries. The company offers Digital
Media Gateway, a digital IP store-and-forward platform, delivering news stories, syndicated
programming, advertising spots, and video news releases to broadcasters. It provides solutions
for content providers and broadcasters, as well as station solutions.
Obama – No Friend of America
Obama is no friend of America in the war against cyber-attacks. The very agencies and
departments being defended by Michael Alperovitch's "singular and most brilliant" ability to
write encryption codes have all been successfully attacked and compromised since Michael set up
the codes. But we shouldn't worry, because if there is a cyberattack in the Obama
administration, Michael's son Dmitri is called in to "prove" that it isn't the fault of his
father's codes. It was the "damn Russians", or even "Putin himself" who attacked American
networks.
Not one of the 17 U.S. intelligence agencies is capable of figuring out a successful
cyberattack against America without Michael and Dmitri's help. Those same 17 U.S. intelligence
agencies were not able to effectively launch a successful cyberattack against Russia. It seems
like the Russian's have strong codes and America has weak codes. We can thank Michael and
Dmitri Alperovitch for that.
It is clear that there was no DNC hack beyond Guccifer 2.0. Dmitri Alperovitch is a
"frontman" for his father's encryption espionage mission.
Is it any wonder that Trump says that he has "his own people" to deliver his intelligence
to him that is outside of the infiltrated U.S. government intelligence agencies and the Obama
administration ? Isn't any wonder that citizens have to go anywhere BUT the MSM to find
real news or that the new administration has to go to independent news to get good intel?
It is hard to say anything more damnable than to again quote Dmitri on these very
issues: "If someone steals your keys to encrypt the data, it doesn't matter how secure the
algorithms are." Dmitri Alperovitch, founder of CrowdStrike
"... And RUH8 is allied with the Atlantic Council and Crowdstrike. ..."
"... Russia was probably not one of the hacking groups. The willful destruction of evidence by the DNC themselves probably points to Russia not being one of the those groups. The DNC wouldn't destroy evidence that supported their position. Also, government spy agencies keep info like that closely held. They might leak out tidbits, but they don't do wholesale dumps, like, ever. ..."
"... That's what the DNC is lying about. Not that hacks happened (they undoubtedly did), but about who did them (probably not Russian gov), and if hacks mattered (they didn't since everything was getting leaked anyway). ..."
"... The DNC/Mueller/etc are lying, but like most practiced liars they're mixing the lies with half-truths and unrelated facts to muddy the waters: ..."
"... An interesting question is, since it's basically guaranteed the DNC got hacked, but probably not by the Russians, is, what groups did hack the DNC, and why did the DNC scramble madly to hide their identities? ..."
"... And while you think about that question, consider the close parallel with the Awan case, where Dems were ostensibly the victims, but they again scrambled to cover up for the people who supposedly harmed them. level 2 ..."
"... DNC wasn't even hacked. Emails were leaked. They didn't even examine the server. Any "evidence" produced is spoofable from CIA cybertools that we know about from wikileaks. It's important to know how each new lie is a lie. But man I am just so done with all this Russia shit. level 2 ..."
"... Crowdstrike claims that malware was found on DNC server. I agree that this has nothing to do with the Wikileaks releases. What I am wondering is whether Crowdstrike may have arranged for the DNC to be hacked so that Russia could be blamed. Continue this thread level 1 ..."
"... George Eliason promises additional essays: *The next articles, starting with one about Fancy Bear's hot/cold ongoing relationship with Bellingcat which destroys the JIT investigation, will showcase the following: Fancy Bear worked with Bellingcat and the Ukrainian government providing Information War material as evidence for MH17: ..."
"... Fancy Bear is an inside unit of the Atlantic Council and their Digital Forensics Lab ..."
Cyberanalyst George Eliason has written some intriguing blogs recently claiming that the
"Fancy Bear" which hacked the DNC server in mid-2016 was in fact a branch of Ukrainian intelligence linked to the Atlantic
Council and Crowdstrike. I invite you to have a go at one of his recent essays:
Since I am not very computer savvy and don't know much about the world of hackers - added
to the fact that Eliason's writing is too cute and convoluted - I have difficulty navigating Eliason's thought. Nonetheless,
here is what I can make of Eliasons' claims, as supported by independent literature:
Russian hacker Konstantin Kozlovsky, in Moscow court filings, has claimed that he did the
DNC hack – and can prove it, because he left some specific code on the DNC server.
Kozlovsky states that he did so by order of Dimitry Dokuchaev (formerly of the FSB, and
currently in prison in Russia on treason charges) who works with the Russian traitor hacker group Shaltai Boltai.
According to Eliason, Shaltai Boltai works in collaboration with the Ukrainian hacker group
RUH8, a group of neo-Nazis (Privat Sektor) who are affiliated with Ukrainian intelligence.
And RUH8 is allied with the Atlantic Council and Crowdstrike.
Cyberexpert Jeffrey Carr has stated that RUH8 has the X-Agent malware which our
intelligence community has erroneously claimed is possessed only by Russian intelligence, and used by "Fancy Bear".
This might help explain why Adam Carter has determined that some of the malware found on
the DNC server was compiled AFTER Crowdstrike was working on the DNC server – Crowdstrike was in collusion with Fancy Bear
(RUH8).
In other words, Crowdstrike likely arranged for a
hack by Ukrainian intelligence that they could then attribute to Russia.
As far as I can tell, none of this is pertinent to how Wikileaks obtained their DNC emails,
which most likely were leaked.
How curious that our Deep State and the recent Mueller indictment have had nothing to say
about Kozlovsky's confession - whom I tend to take seriously because he offers a simple way to confirm his claim. Also
interesting that the FBI has shown no interest in looking at the DNC server to check whether Kozlovsky's code is there.
Its worth noting that Dimitri Alperovich's (Crowdstrike) hatred of Putin is
second only to Hillary's hatred for taking responsibility for her actions.
level 1
Thanks - I'll continue to follow Eliason's work. The thesis that Ukrainian
intelligence is hacking a number of targets so that Russia gets blamed for it has intuitive appeal.
level 1
and have to cringe.
Any hacks weren't related to Wikileaks, who got their info from leakers, but
that is not the same thing as no hack. Leaks and hacks aren't mutually exclusive. They actually occur together
pretty commonly.
DNC's security was utter shit. Systems with shit security and obviously
valuable info usually get hacked by multiple groups. In the case of the DNC, Hillary's email servers, etc.,
it's basically impossible they weren't hacked by dozens of intruders. A plastic bag of 100s will not sit
untouched on a NYC street corner for 4 weeks. Not. fucking. happening.
Interestingly, Russia was probably not
one of the hacking groups. The willful destruction of evidence by the DNC themselves probably points to Russia
not being one of the those groups. The DNC wouldn't destroy evidence that supported their position. Also,
government spy agencies keep info like that closely held. They might leak out tidbits, but they don't do
wholesale dumps, like, ever.
That's
what the DNC is lying about.
Not that hacks
happened
(they undoubtedly did), but about
who
did them (probably not Russian gov), and if hacks mattered
(they didn't since everything was getting leaked anyway).
The DNC/Mueller/etc are lying, but like most practiced liars they're mixing
the lies with half-truths and unrelated facts to muddy the waters:
Any "evidence" produced is spoofable from CIA cybertools
Yes, but that spoofed 'evidence' is not the direct opposite of the truth,
like I see people assuming. Bad assumption, and the establishment plays on that to make critic look bad. The
spoofed evidence is just mud.
An interesting question is, since it's basically guaranteed the DNC got
hacked, but probably not by the Russians, is, what groups
did
hack the
DNC, and why did the DNC scramble madly to hide their identities?
And while you think about that question, consider the close parallel with
the Awan case, where Dems were ostensibly the victims, but they again scrambled to cover up for the people who
supposedly harmed them.
level 2
What's hilarious about the 2 down-votes is I can't tell if their from
pro-Russiagate trolls, or from people who who can't get past binary thinking.
level 1
DNC wasn't even hacked. Emails were leaked. They didn't even examine the
server.
Any "evidence" produced is spoofable from CIA cybertools that we know about
from wikileaks. It's important to know how each new lie is a lie. But man I am just so done
with all this Russia shit.
level 2
Crowdstrike claims that malware was found on DNC server. I agree that this
has nothing to do with the Wikileaks releases. What I am wondering is whether Crowdstrike may have arranged for
the DNC to be hacked so that Russia could be blamed.
Continue this thread
level 1
George Eliason promises additional essays: *The next articles, starting with one about Fancy Bear's hot/cold ongoing
relationship with Bellingcat which destroys the JIT investigation, will showcase the following: Fancy Bear worked with Bellingcat and the Ukrainian government providing
Information War material as evidence for MH17:
Fancy Bear is an inside unit of the Atlantic Council and their Digital
Forensics Lab
Fancy Bear worked with Crowdstrike and Dimitri Alperovich Fancy Bear is
Ukrainian Intelligence
How Fancy Bear tried to sway the US election for Team Hillary
Fancy Bear worked against US Intel gathering by providing consistently
fraudulent data
Fancy Bear contributed to James Clapper's January 2017 ODNI Report on Fancy
Bear and Russian Influence. [You really can't make this shit up.]
Fancy Bear had access to US government secure servers while working as
foreign spies.*
level 1
Fancy Bear (also know as Strontium Group, or APT28) is a Ukrainian cyber espionage group. Cybersecurity firm CrowdStrike incorrectly has said
with a medium level of confidence that it is associated with the Russian military intelligence
agency GRU . CrowdStrike
founder,
Dmitri Alperovitch , has colluded with Fancy Bear. American journalist
George Eliason has written extensively on the subject.
There are a couple of caveats that need to be made when identifying the Fancy Bear hackers.
The first is the identifier used by Mueller as Russian FSB and GRU may have been true- 10 years
ago. This group was on the run trying to stay a step ahead of Russian law enforcement until
October 2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and
possibly former Russian state security. The majority of the group are Ukrainians making up
Ukraine's Cyber Warfare groups.
Eliason lives and works in Donbass. He has been interviewed by and provided analysis for RT,
the BBC , and Press-TV. His
articles have been published in the Security Assistance Monitor, Washingtons Blog, OpedNews,
the Saker, RT, Global Research, and RINF, and the Greanville Post among others. He has been
cited and republished by various academic blogs including Defending History, Michael Hudson,
SWEDHR, Counterpunch, the Justice Integrity Project, among others.
Fancy Bear is Ukrainian IntelligenceShaltai Boltai
The "Fancy Bear hackers" may have been given the passwords to get into the servers at the
DNC because they were part of the Team Clinton opposition research team. It was part of their
job.
According to Politico ,
"In an interview this month, at the DNC this past election cycle centered on mobilizing
ethnic communities -- including Ukrainian-Americans -- she said that, when Trump's unlikely
presidential campaign. Chalupa told Politico she had developed a network of sources in Kiev
and Washington, including investigative journalists, government officials and private
intelligence operatives. While her consulting work began surging in late 2015, she began
focusing more on the research, and expanded it to include Trump's ties to Russia, as well."
[1]
The only investigative journalists, government officials, and private intelligence
operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta, Ukraine
Cyber Alliance, and the Ministry of Information.
All of these hacking and information operation groups work for Andrea
Chalupa with EuroMaidanPR and Irena
Chalupa at the Atlantic Council. Both Chalupa sisters work directly with the Ukrainian
government's intelligence and propaganda arms.
Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage , terrorist , counter-terrorism, cyber, propaganda , and info war channels
officially recognized and directed by Ukraine's Information Ministry. Along with their American
colleagues, they populate the hit-for-hire website Myrotvorets with people who stand against
Ukraine's criminal activities.
The hackers, OSINT, Cyber, spies, terrorists, etc. call themselves volunteers to keep safe
from State level retaliation, even though a child can follow the money. As volunteers motivated
by politics and patriotism they are protected to a degree from retribution.
They don't claim State sponsorship or governance and the level of attack falls below the
threshold of military action. Special Counsel Robert Mueller had a lot of latitude for
making the attribution Russian, even though the attacks came from Ukrainian Intelligence. Based
on how the rules of the Tallinn Manual 2.0 on the International Law Applicable to Cyber are
written, because the few members of the coalition from Shaltai Boltai are Russian in
nationality, Fancy Bear can be attributed as a Russian entity for the purposes of retribution.
The caveat is if the attribution is proven wrong, the US will be liable for damages caused to
the State which in this case is Russia.
How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they
have the ability to research and work in over 30 different languages.
This can be considered an Information Operation against the people of the United States and
of course Russia. After 2013, Shaltay Boltay was no longer physically available to work for
Russia. The Russian hackers were in Ukraine working for the Ukrainian government's Information
Ministry which is in charge of the cyber war. They were in Ukraine until October 2016 when they
were tricked to return to Moscow and promptly arrested for treason.
From all this information we know the Russian component of Team Fancy Bear is Shaltai
Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance
which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian
Intelligence. We know they are grouped with InformNapalm which is Ukraine's OSINT unit. We know
their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above work
directly with the Atlantic Council and Crowdstrike's Dimitry Alperovich.
In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to
very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged
data from the Surkov leak.
But during 2014, 2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and CyberHunta
went to work for the DNC as opposition researchers .
The
First Time Shaltai Boltai was Handed the Keys to US Gov Servers
The setup to this happened long before the partnership with Ukrainian Intel hackers and
Russia's Shaltai Boltai was forged. The hack that gained access to US top-secret servers
happened just after the partnership was cemented after Euro-Maidan.
In August 2009 Hillary Clinton's Deputy Chief of Staff at the State Department Huma Abedin
sent the passwords to her Government laptop to her Yahoo mail account. On August 16, 2010,
Abedin received an email titled "Re: Your yahoo account. We can see where this is going, can't
we?
"After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a
billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence
agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin's
associates to access email accounts into 2015 and 2016."
Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo
hack.
The time frame has to be noted. The hack happened in 2014. Access to the email accounts
continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai
Boltai was working from Kiev, Ukraine.
So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with looking
at the time frame. Ukraine had the keys already in hand in 2014.
Alexandra
Chalupa hired this particular hacking terrorist group, which Dimitry Alperovich and
Crowdstrike dubbed "Fancy Bear", in 2015 at the latest. While the Ukrainian hackers worked for
the DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the
state of the projects they were working on. Let's face it, once you're in, setting up your
Fancy Bear toolkit doesn't get any easier. This is why I said the DNC hack isn't the big crime.
It's a big con and all the parties were in on it.
Hillary Clinton exposed secrets to hacking threats by using private email instead of secured
servers. Given the information provided she was probably being monitored by our intrepid
Ruskie-Ukie union made in hell hackers. Anthony Weiner exposed himself and his wife
Huma Abedin using
Weiner's computer for top-secret State Department emails. And of course Huma Abedin exposed
herself along with her top-secret passwords at Yahoo and it looks like the hackers the DNC hired to
do opposition research hacked her.
Here's a question. Did Huma Abedin have Hillary Clinton's passwords for her private email
server? It would seem logical given her position with Clinton at the State Department and
afterward. This means that Hillary Clinton and the US government top secret servers were most
likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using legitimate
passwords.
Dobrovolska
Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former
staff from 2013 through prepping for the 2016 election. [2][3] Alexandra Chalupa was
running a research department that is rich in (foreign) Ukrainian Intelligence operatives,
hackers, terrorists, and a couple Ruskie traitors.
Kristina Dobrovolska was acting as a handler and translator for the US State Department in
2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to Washington
to meet with Chalupa.
Alexandra types in her password to show Dobrovolska something she found and her eager to
please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the
Fancy Bear crew about it and they immediately get to work looking for Trump material on the US
secret servers with legitimate access. I mean, what else could they do with this? Turn over
sensitive information to the ever corrupt Ukrainian government?
According to the Politico article, Alexandra Chalupa was meeting with the Ukrainian embassy
in June of 2016 to discuss getting more help sticking it to candidate Trump. At the same time
she was meeting, the embassy had a reception that highlighted female Ukrainian leaders.
Four Verkhovna Rada [parlaiment] deputies there for the event included: Viktoriia Y.
Ptashnyk, Anna A. Romanova, Alyona I. Shkrum, and Taras T. Pastukh. [4]
According to CNN ,
[5] DNC sources said Chalupa
told DNC operatives the Ukrainian government would be willing to deliver damaging information
against Trump's campaign. Later, Chalupa would lead the charge to try to unseat president-elect
Trump starting on Nov 10, 2016.
Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison
and translator who escorted the delegates from Kyiv during their visits to Albany and
Washington.
Kristina Dobrovolska is the handler manager working with Ukraine's DNC Fancy Bear Hackers.
[6] She took the Rada
[parliament] members to dinner to meet Joel Harding who designed Ukraine's infamous Information
Policy which opened up their kill-for-hire-website Myrotvorets. Then she took them to meet the
Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the surviving nephew to the
infamous torturer The WWII OUNb leader, Mykola Lebed.
Fancy Bear's Second Chance at Top
Secret Passwords From Team Clinton
One very successful method of hacking is called
social engineering . You gain access to the office space and any related properties and
physically locate the passwords or clues to get you into the hardware you want to hack. This
includes something as simple as looking over the shoulder of the person typing in
passwords.
The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC opposition research.
On different occasions, Fancy Bear handler Kristina Dobrovolska traveled to the US to meet the
Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea Chalupa, US Dept of State
personnel, and most likely Crowdstrike's Dimitry Alperovich. Alperovich was working with the
hackers in 2015-16. In 2016, the only groups known to have Fancy Bear's signature tools called
X-tunnel and X-Agent were Alperovich, Crowdstrike, and Fancy Bear (Shaltai Boltai, CyberHunta,
Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does explain a few things.
Alleged DNC
hack
There were multiple DNC hacks. There is also clear proof supporting the download to a USB
stick and subsequent information exchange (leak) to Wikileaks . All are separate events.
The group I previously identified as Fancy Bear was given access to request password
privileges at the DNC. And it looks like the DNC provided them with it.
the Podesta email hack looks like a revenge hack.
The reason Republican opposition research files were stolen can be put into context now
because we know who the hackers are and what motivates them.
At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It
is a matter of public record that Team Clinton provided the DNC hackers with passwords to
State Department
servers on at least 2 occasions, one wittingly and one not. Fancy Bear hackers are Ukrainian
Intelligence Operators.
If the leak came through Seth Rich , it may have been because he saw
foreign Intel operatives given this access from the presumed winners of the 2016 US presidential
election . The leaker may
have been trying to do something about it. I'm curious what information Wikileaks might
have.
Alperovitch and Fancy Bear
George Eliason, Washingtonsblog: Why Crowdstrike's Russian Hacking Story Fell
Apart- Say Hello to Fancy Bear. investigated. [7]
In the wake of the JAR-16-20296 dated December 29, 2016 about hacking and influencing
the 2016 election, the need for real evidence is clear. The joint report adds nothing
substantial to the October 7th report. It relies on proofs provided by the cyber security
firm Crowdstrike that is clearly not on
par with intelligence findings or evidence. At the top of the report is an "as is"
statement showing this.
The difference bet enough evidence is provided to warrant an investigation of
specific parties for the DNC hacks. The real story involves specific anti-American actors
that need to be investigated for real crimes. For instance, the malware used was an
out-dated version just waiting to be found. The one other interesting point is that the
Russian malware called Grizzly Steppe is from Ukraine. How did Crowdstrike miss this when
it is their business to know?
The bar for identification set by Crowdstrike has never been able to get beyond words
like probably, maybe, could be, or should be, in their attribution. The bar Dimitri
Alperovitch set for identifying the hackers involved is that low. Other than asking
America to trust them, how many solid facts has Alperovitch provided to back his claim of
Russian involvement?
information from outside intelligence agencies has the value of rumor or
unsubstantiated information at best according to policy. Usable intelligence needs to be
free from partisan politics and verifiable. Intel agencies noted back in the early 90's
that every private actor in the information game was radically political.
Alperovitch first gained notice when he was the VP in charge of threat research with
McAfee. Asked to comment on Alperovitch's discovery of Russian hacks on Larry King, John
McAfee had this to say. "Based on all of his experience, McAfee does not believe that
Russians were behind the hacks on the Democratic National Committee (DNC), John Podesta's
emails, and the Hillary Clinton presidential campaign. As he told RT, "if it looks like
the Russians did it, then I can guarantee you it was not the Russians."
How does Crowdstrike's story part with reality? First is the admission that it is
probably, maybe, could be Russia hacking the DNC. "Intelligence agencies do not have
specific intelligence showing officials in the Kremlin 'directing' the identified
individuals to pass the Democratic emails to Wiki Leaks." The public evidence never goes
beyond the word possibility. While never going beyond that or using facts, Crowdstrike
insists that it's Russia behind both Clinton's and the Ukrainian losses.
NBC carried the story because one of the partners in Crowdstrike is also a consultant
for NBC. According to NBC the story reads like this."The company, Crowdstrike, was hired
by the DNC to investigate the hack and issued a report publicly attributing it to Russian
intelligence. One of Crowdstrike's senior executives is Shawn Henry , a former senior FBI
official who consults for NBC News.
In June, Crowdstrike went public with its findings that two separate Russian
intelligence agencies had hacked the DNC. One, which Crowdstrike and other researchers
call Cozy Bear, is believed to be linked to Russia's CIA, known as the FSB. The other,
known as Fancy Bear, is believed to be tied to the military intelligence agency, called
the GRU." The information is so certain the level of proof never rises above "believed to
be." According to the December 12th Intercept article "Most importantly, the Post
adds that "intelligence agencies do not have specific intelligence showing officials in
the Kremlin 'directing' the identified individuals to pass the Democratic emails to
WikiLeaks."
The SBU, Olexander Turchinov, and the Ukrainian Ministry of Defense all agree that
Crowdstrike is dead wrong in this assessment. Although subtitles aren't on it, the former
Commandant of Ukrainian Army Headquarters thanks God Russia never invaded or Ukraine
would have been in deep trouble. How could Dimitri Alperovitch and Crowdstrike be this
wrong on easily checked detail and still get this much media attention?
Crowdstrike CEO Dmitri Alperovitch story about Russian hacks that cost Hillary
Clinton the election was broadsided by the SBU (Ukrainian Intelligence and Security) in
Ukraine. If Dimitri Alperovitch is working for Ukrainian Intelligence and is providing
intelligence to 17 US Intelligence Agencies is it a conflict of interest?
Is giving misleading or false information to 17 US Intelligence Agencies a crime? If
it's done by a cyber security industry leader like Crowdstrike should that be
investigated? If unwinding the story from the "targeting of Ukrainian volunteers" side
isn't enough, we should look at this from the American perspective. How did the Russia
influencing the election and DNC hack story evolve? Who's involved? Does this pose
conflicts of interest for Dmitri Alperovitch and Crowdstrike? And let's face it, a
hacking story isn't complete until real hackers with the skills, motivation, and reason
are exposed.
According to journalist and DNC activist Andrea Chalupa on her Facebook page "After
Chalupa sent the email to Miranda (which mentions that she had invited this reporter to a
meeting with Ukrainian journalists in Washington), it triggered high-level concerns
within the DNC, given the sensitive nature of her work. "That's when we knew it was the
Russians," said a Democratic Party source who has been directly involved in the internal
probe into the hacked emails. In order to stem the damage, the source said, "we told her
to stop her research."" July 25, 2016
If she was that close to the investigation Crowdstrike did how credible is she? Her
sister Alexandra was named one of 16 people that shaped the election by Yahoo news.
The DNC hacking investigation done by Crowdstrike concluded hacking was done by
Russian actors based on the work done byAlexandra Chalupa? That is the
conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the
Russian government connection.
How close is Dimitri Alperovitch to DNC officials? Close enough professionally he
should have stepped down from an investigation that had the chance of throwing a
presidential election in a new direction. According to Esquire.com, Alperovitch has
vetted speeches for Hillary Clinton about cyber security issues in the past. Because of
his work on the Sony hack, President Barrack Obama personally called and said the
measures taken were directly because of his work.
Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian
propagandists, and Ukrainian state supported hackers [show a conflict of interest]. When
it all adds up and you see it together, we have found a Russian that tried hard to
influence the outcome of the US presidential election in 2016.
The Chalupas are not Democrat or Republican. They are OUNb. The OUNb worked hard
to start a war between the USA and Russia for the last 50 years. According to the
Ukrainian Weekly in a rare open statement of their existence in 2011, "Other
statements were issued in the Ukrainian language by the leadership of the
Organization of Ukrainian Nationalists (B) and the International Conference in
Support of Ukraine. The OUN (Bandera wing) called for" What is
OUNb Bandera? They follow the same political policy and platform that was developed
in the 1930's by Stepan Bandera . When these
people go to a Holocaust memorial they are celebrating
both the dead and the OUNb SS that killed.[8] There is no
getting around this fact. The OUNb have no concept of democratic values and want an
authoritarian
fascism .
Alexandra Chalupa- According to the Ukrainian Weekly , [9]
"The effort, known as Digital Miadan, gained momentum following the initial Twitter storms.
Leading the effort were: Lara Chelak, Andrea Chalupa, Alexandra Chalupa, Constatin Kostenko
and others." The Digital Maidan was also how they raised money for the coup. This was how the
Ukrainian emigres bought the bullets that were used on Euromaidan. Ukraine's chubby nazi,
Dima Yarosh stated openly he was taking money from the Ukrainian emigres during Euromaidan
and Pravy Sektor still fundraises openly in North America. The "Sniper Massacre" on the
Maidan in Ukraine by Dr. Ivan Katchanovski, University of Ottowa shows clearly detailed
evidence how the massacre happened. It has Pravy Sektor confessions that show who created the
"heavenly hundred. Their admitted involvement as leaders of Digital Maidan by both Chalupas
is a clear violation of the Neutrality Act and has up to a 25 year prison sentence attached
to it because it ended in a coup.
Andrea Chalupa-2014, in a Huff Post article Sept. 1 2016, Andrea Chalupa
described Sviatoslav Yurash as one of Ukraine's important "dreamers." He is a young
activist that founded Euromaidan Press. Beyond the gushing glow what she doesn't say
is who he actually is. Sviatoslav Yurash was Dmitri Yarosh's spokesman just after
Maidan. He is a hardcore Ukrainian nationalist and was rewarded with the Deputy
Director position for the UWC (Ukrainian World Congress) in Kiev.
In January, 2014 when he showed up at the Maidan protests he was 17 years old. He
became the foreign language media representative for Vitali Klitschko, Arseni
Yatsenyuk, and Oleh Tyahnybok. All press enquiries went through Yurash. To meet
Dimitri Yurash you had to go through Sviatoslav Yurash as a Macleans reporter found
out.
At 18 years old, Sviatoslav Yurash became the spokesman for Ministry of Defense
of Ukraine under Andrei Paruby. He was Dimitri Yarosh's spokesman and can be seen
either behind Yarosh on videos at press conferences or speaking ahead of him to
reporters. From January 2014 onward, to speak to Dimitri Yarosh, you set up an
appointment with Yurash.
Andrea Chalupa has worked with Yurash's Euromaidan Press which is associated with
Informnapalm.org and supplies the state level hackers for Ukraine.
Irene Chalupa- Another involved Chalupa we need to cover to do the story justice
is Irene Chalupa. From her bio– Irena Chalupa is a nonresident fellow with the
Atlantic Council's Dinu Patriciu Eurasia Center. She is also a senior correspondent
at Radio Free Europe/Radio Liberty (RFE/RL), where she has worked for more than
twenty years. Ms. Chalupa previously served as an editor for the Atlantic Council,
where she covered Ukraine and Eastern Europe. Irena Chalupa is also the news anchor
for Ukraine's propaganda channel org She is also a Ukrainian emigre leader.
According to Robert Parry's article [10] At the forefront
of people that would have taken senior positions in a Clinton administration and
especially in foreign policy are the Atlantic Council . Their main
goal is still a major confrontation with nuclear-armed Russia.
The Atlantic Council is the think tank associated and supported by the CEEC (Central
and Eastern European Coalition). The CEEC has only one goal which is war with Russia.
Their question to candidates looking for their support in the election was "Are you
willing to go to war with Russia?" Hillary Clinton has received their unqualified support
throughout the campaign.
What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the
Atlantic Council would have taken senior cabinet and policy positions, his own fellowship
status at the Atlantic Council and relationship with Irene Chalupa creates a definite
conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground
and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or
Homeland Security?
When you put someone that has so much to gain in charge of an investigation that
could change an election, that is a conflict of interest. If the think tank is linked
heavily to groups that want war with Russia like the Atlantic Council and the CEEC, it
opens up criminal conspiracy.
If the person in charge of the investigation is a fellow at the think tank that wants
a major conflict with Russia it is a definite conflict of interest. Both the Atlantic
Council and clients stood to gain Cabinet and Policy positions based on how the result of
his work affects the election. It clouds the results of the investigation. In Dmitri
Alperovitch's case, he found the perpetrator before he was positive there was a
crime.
Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence
groups is where things really heat up. Noted above she works with Euromaidanpress.com and
Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers.
When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the
CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and
its hackers individually. There is a mutual relationship. When you add up his work for
the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be
investigated to see if Ukraine is conspiring against the US government. Crowdstrike is
also following their hack of a Russian government official after the DNC hack. It closely
resembles the same method used with the DNC because it was an email hack.
Crowdstrike's product line includes Falcon Host, Falcon Intelligence, Falcon
Overwatch and Falcon DNS. Is it possible the hackers in Falcons Flame are another service
Crowdstrike offers?
In an interview with Euromaidanpress these hackers say they have no need for the CIA.
[11] They consider the
CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance
is a quasi-organization with the participation of several groups – RUH8, Trinity,
Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the
Myrotvorets site, Informnapalm analytical agency."
Although this profile says Virginia, tweets are from the Sofia, Bulgaria time zone and he
writes in Russian. Another curiosity considering the Fancy Bear source code is in Russian. This
image shows Crowdstrike in their network. Crowdstrike is part of Ukrainian nationalist hacker
network. In the image it shows a network diagram of Crowdstrike following the Surkov leaks. The
network communication goes through a secondary source. Although OSINT Academy sounds fairly innocuous, it's the official twitter account for
Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence.
The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates
journalists and other people for assassination. If you disagree with OUNb politics, you could
be on the list.
Should someone tell Dimitri Alperovitch that Gerashchenko, who is now in charge of
Peacekeeper recently threatened president-elect Donald Trump that he would put him on his
"Peacemaker" site as a target? The same has been done with Silvio Berscaloni in the
past.
Trying not to be obvious, the Head of Ukraine's Information Ministry (UA
Intelligence) tweeted something interesting that ties Alperovitch and Crowdstrike to the
Ukrainian Intelligence hackers and the Information Ministry even tighter. This single
tweet on a network chart shows that out of all the Ukrainian Ministry of Information
Minister's following, he only wanted the 3 hacking groups associated with both him and
Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or
shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be
shared heavily. If it was a victory for the hacking squad, it would be smart to keep it
to themselves and not draw unwanted attention.
These same hackers are associated with Alexandra, Andrea, and Irene Chalupa through
the portals and organizations they work with through their OUNb. The hackers are funded
and directed by or through the same OUNb channels that Alperovitch is working for and
with to promote the story of Russian hacking.
When you look at the image for the hacking group in the euromaidanpress article,
one of the hackers identifies themselves as one of Dimitri Yarosh's Pravy Sektor
members by the Pravy Sektor sweatshirt they have on. Noted above, Pravy Sektor
admitted to killing the people at the Maidan protest and sparked the coup.
Going further with the linked Euromaidanpress article the hackers say "Let's
understand that Ukrainian hackers and Russian hackers once constituted a single very
powerful group. Ukrainian hackers have a rather high level of work. So the help of
the USA I don't know, why would we need it? We have all the talent and special means
for this. And I don't think that the USA or any NATO country would make such sharp
movements in international politics."
What sharp movements in international politics have been made lately? Let me spell it
out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored,
Russian language hackers in Eastern European time zones have shown with the Surkov hack
they have the tools and experience to hack states that are looking out for it. They are
also laughing at US intel efforts.
The hackers also made it clear that they will do anything to serve Ukraine. Starting
a war between Russia and the USA is the one way they could serve Ukraine best, and hurt
Russia worst. Given those facts, if the DNC hack was according to the criteria given by
Alperovitch, both he and these hackers need to be investigated.
According to the Esquire interview "Alperovitch was deeply frustrated: He thought
the government should tell the world what it knew. There is, of course, an element of
the personal in his battle cry. "A lot of people who are born here don't appreciate
the freedoms we have, the opportunities we have, because they've never had it any
other way," he told me. "I have."
While I agree patriotism is a great thing, confusing it with this kind of nationalism
is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering
a conflict with Russia that is against American interests, he's a patriot. He isn't
serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to
Ukraine.
The evidence presented deserves investigation because it looks like the case for
conflict of interest is the least Dimitri Alperovitch should look forward to. If these
hackers are the real Cozy Bear and Fancy Bear, they really did make sharp movements in
international politics. By pawning it off on Russia, they made a worldwide embarrassment
of an outgoing President of the United States and made the President Elect the suspect of
rumor.
Obama, Brazile, Comey, and CrowdStrike
According to Obama the
hacks continued until September 2016. According to ABC, Donna Brazile says the hacks didn't stop
until after the elections in 2016. According to Crowdstrike the hacks continued into
November.
Democratic National Committee Chair Donna Brazile said Russian hackers persisted in trying
to break into the organization's computers "daily, hourly" until after the election --
contradicting President Obama's assertion that the hacking stopped in September after he warned
Russian President Vladimir Putin to "cut it out."-ABC
This time frame gives a lot of latitude to both hacks and leaks happening on that server and
still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to
Bill
Binney , the former Technical Director for the NSA, the only way that data could move off
the server that fast was through a download to a USB stick. The transfer rate of the file does
not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking
ridiculous and impossible at best.
The DNC fiasco isn't that important of a crime. The reason I say this is the FBI would have
taken control over material evidence right away. No law enforcement agency or Intel agency ever
did. This means none of them considered it a crime Comey should have any part of investigating.
That by itself presents the one question mark which destroys any hope Mueller has proving law
enforcement maintained a chain of custody for any evidence he introduces.
It also says the US government under Barrack Obama and the victimized DNC saw this as a
purely political event. They didn't want this prosecuted or they didn't think it was
prosecutable.
Once proven it shows a degree of criminality that makes treason almost too light a charge in
federal court. Rest assured this isn't a partisan accusation. Team Clinton and the DNC gets the
spotlight but there are Republicans involved.
Investigative Jouralist George Webb worked at MacAfee and Network Solutions in 2000 when the
CEO Bill Larsen bought a small, Moscow based, hacking and virus writing company to move to
Silicon Valley.
MacAfee also purchased PGP, an open source encryption software developed by privacy advocate
to reduce NSA spying on the public.
The two simultaneous purchase of PGP and the Moscow hacking team by Metwork Solutions was
sponsored by the CIA and FBI in order to crack encrypted communications to write a back door
for law enforcement.
Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named
Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking
scandal - Crowdstrike.
In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry
platform to provide encrypted communications for covert action operatives.
"... This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney, the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best. ..."
Here's what's different in the information I've compiled.
The group I previously identified as Fancy Bear was given access to request password
privileges at the DNC. And it looks like the DNC provided them with it.
I'll show why the Podesta email hack looks like a revenge hack.
The reason Republican opposition research files were stolen can be put into context now
because we know who the hackers are and what motivates them.
At the same time this story developed, it overshadowed the Hillary Clinton email scandal.
It is a matter of public record that Team Clinton provided the DNC hackers with passwords to
State Department servers on at least 2 occasions, one wittingly and one not. I have already
clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators.
This gives some credence to the Seth Rich leak (DNC leak story) as an act of patriotism.
If the leak came through Seth Rich, it may have been because he saw foreign Intel operatives
given this access from the presumed winners of the 2016 US presidential election. No
political operative is going to argue with the presumed president-elect over foreign policy.
The leaker may have been trying to do something about it. I'm curious what information
Wikileaks might have.
The real crime of the DNC hack wasn't the hack.
If only half of the following proved true in context and it's a matter of public record,
that makes the argument to stop funding for Ukraine immediately barring an investigation of
high crimes by Ukrainian Diaspora, Democrat, and Republican leaders in Congress, private
Intel for hire, and Ukrainian Intel's attacks on the US government and political
processes.
Perhaps it's time Donald J. Trump @realDonaldTrump should consider treason investigations
across the board. Make America great again by bringing justice and civility back.
DNC
Hack – High Crimes or Misdemeanors?
So what went on at the DNC way back in 2016? Do you know? Was it a hack or a leak? Does it
matter?
Recently, an investigative journalist who writes under the name Adam Carter was raked over
the coals. Carter writes at Disobedient
Media and has been providing a lot of
evidence supporting the DNC leak story former Ambassador Craig Murray and Wikileaks claim
happened.
When the smear article came out and apparently it's blossoming into a campaign, a few
people that read both of us wrote to the effect "looks like your work is the only thing left
standing." I immediately rebuffed the idea and said Carter's work stands on its own . It has nothing to do with
anything I've written, researched, or plan to.
I'd say the same about Scott Humor ,
Lee Stranahan ,
Garland Nixon ,
Petri
Krohn , or Steve McIntyre
. And there are many others. There has been a lot of good work on the DNC hacks and 2016
election interference. Oftentimes, what looks like contradictory information is complimentary
because what each journalist is working on shows the story from a different angle.
There are a lot of moving parts to the story and even a small change in focus brings an
entirely new story because it comes from a different direction.
Here's what I mean. If the DNC hack was really a leak, does that kill the "hack" story?
No, it doesn't and I blame a lot of activist journalists for making the assumption that it
has to work this way. If Seth Rich gave Ambassador Craig Murray a USB stick with all the
"hacked info," it doesn't change an iota of what I've written and the evidence you are about
to read stands on its own. But, this has divided people into camps before the whole situation
could be scrutinized and that's still not done yet.
If for example you have a leak on Jan 5th , can you have "a hack" on Jan 6th , 7th, or
8th? Since there is so much crap surrounding the supposed hack such as law enforcement teams
never examining the DNC server or maintaining control of it as evidence, could the hacks have
been a cover-up?
Democratic National Committee Chair Donna Brazile said Russian hackers persisted in
trying to break into the organization's computers "daily, hourly" until after the election
-- contradicting President Obama's assertion that the hacking stopped in September after he
warned Russian President Vladimir Putin to "cut it out."-ABC
This time frame gives a lot of latitude to both hacks and leaks happening on that server
and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to
Bill Binney, the former Technical Director for the NSA, the only way that data could move
off the server that
fast was through a download to a USB stick. The transfer rate of the file does not agree
with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous
and impossible at best.
The DNC fiasco isn't that important of a crime. The reason I say this is the FBI would
have taken control over material evidence right away. No law enforcement agency or Intel
agency ever did. This means none of them considered it a crime Comey should have any part of
investigating. That by itself presents the one question mark which destroys any hope Mueller
has proving law enforcement maintained a chain of custody for any evidence he introduces.
It also says the US government under Barrack Obama and the victimized DNC saw this as a
purely political event. They didn't want this prosecuted or they didn't think it was
prosecutable.
Once proven it shows a degree of criminality that makes treason almost too light a charge
in federal court. Rest assured this isn't a partisan accusation. Team Clinton and the DNC
gets the spotlight but there are Republicans involved.
Identifying Team Fancy Bear
There are a couple of caveats that need to be made when
identifying the Fancy Bear hackers . The first is the
identifier used by Mueller as Russian FSB and GRU may have been true- 10 years ago. This
group was on the run trying to stay a step ahead of Russian law enforcement until October
2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and
possibly former Russian state security. The majority of the group are Ukrainians making up
Ukraine's Cyber Warfare groups.
The hackers, OSINT, Cyber, spies, terrorists, etc call themselves volunteers to keep safe
from State level retaliation, even though a child can follow the money. As volunteers
motivated by politics and patriotism they are protected to a degree from retribution.
They don't claim State sponsorship or governance and the level of attack falls below the
threshold of military action. Mueller has a lot of latitude for making the attribution
Russian, even though the attacks came from Ukrainian Intel. Based on how the rules are
written, because the few members of the coalition from Shaltai Boltai are Russian in
nationality, Fancy Bear can be attributed as a Russian entity for the purposes of
retribution. The caveat is if the attribution is proven wrong, the US will be liable for
damages caused to the State which in this case is Russia.
How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they
have the ability to research and work in over 30 different languages.
This can be considered an Information Operation against the people of the United States
and of course Russia. We'll get to why shortly.
From all this information we know the Russian component of Team Fancy Bear is Shaltai
Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance
which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian
Intelligence. We know they are grouped with InformNapalm which is Ukraine's OSINT unit. We
know their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above
work directly with the Atlantic Council and Crowdstrike's Dimitry Alperovich.
In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to
very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged
data from the Surkov leak.
But during 2014,2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and
CyberHunta went to work for the DNC as opposition researchers.
The First Time Shaltai
Boltai was Handed the Keys to US Gov Servers
The setup to this happened long before the partnership with Ukrainian Intel hackers and
Russia's Shaltai Boltai was forged. The hack that gained access to US top-secret servers
happened just after the partnership was cemented after Euro-Maidan.
"After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a
billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence
agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin's
associates to access email accounts into 2015 and 2016."
Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo
hack.
The time frame has to be noted. The hack happened in 2014. Access to the email accounts
continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai
Boltai was working from Kiev, Ukraine.
So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with
looking at the time frame. Ukraine had the keys already in hand in 2014.
The DNC's Team
Fancy Bear
The "Fancy Bear hackers" may have been given the passwords to get into the servers at the
DNC because they were part of the Team Clinton opposition research team. It was part of their
job. Let that concept settle in for a moment.
According to
Politico "In an interview this month, Chalupa told Politico she had developed a network
of sources in Kiev and Washington, including investigative journalists , government officials
and private intelligence operatives . While her consulting work at the DNC this past election
cycle centered on mobilizing ethnic communities -- including Ukrainian-Americans -- she said
that, when Trump's unlikely presidential campaign began surging in late 2015, she began
focusing more on the research, and expanded it to include Trump's ties to Russia, as well
."
The only investigative journalists, government officials, and private intelligence
operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta,
Ukraine Cyber Alliance, and the Ministry of Information.
Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage, terrorist,
counter-terrorism, cyber, propaganda, and info war channels officially recognized and
directed by Ukraine's Information Ministry. Along with their American colleagues, they
populate the hit-for-hire website Myrotvorets with people who stand against Ukraine's
criminal activities.
Alexandra
Chalupa hired this particular hacking terrorist group called Fancy Bear by Dimitry
Alperovich and Crowdstrike at the latest in 2015. While the Ukrainian hackers worked for the
DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the
state of the projects they were working on. Let's face it, once you're in, setting up your
Fancy Bear toolkit doesn't get any easier. This is why I said the DNC hack isn't the big
crime. It's a big con and all the parties were in on it.
Indict Team Clinton for the
DNC Hacks and RNC Hack
Hillary Clinton
exposed secrets to hacking threats by using private email instead of secured servers.
Given the information provided she was probably being monitored by our intrepid Ruskie-Ukie
union made in hell hackers. Anthony Weiner exposed himself and his wife
Huma Abedin using Weiner's computer for top-secret State Department emails. And of course
Huma Abedin exposed herself along with her top-secret passwords at Yahoo and it looks like
the hackers the DNC hired to do opposition research hacked her.
Here's a question. Did Huma Abedin have Hillary Clinton's passwords for her private email
server? It would seem logical given her position with Clinton at the State Department and
afterward. This means that Hillary Clinton and the US government top secret servers were most
likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using
legitimate passwords.
The RNC Hack
According to the Washington Post , "Russian government hackers penetrated the computer
network of the Democratic National Committee and gained access to the entire database of
opposition research on GOP presidential candidate Donald Trump, according to committee
officials and security experts who responded to the breach."
In January
2017 , criminal proceedings started for Edward Nedelyaev under articles 335 'spying' and
343
'inciting hatred or enmity." He was a member of the Aidar battalion. Aidar members have
been cited for torture and murder. Although the translation isn't available on the linked
video the MGB (LNR equivalent to the FBI) ask Aidar's Nedelyaev about his relationship with
Ukraine's SBU. The SBU asked him to hack US presidential candidate Donald Trump's election
headquarters and he refused. Asked if this was through convictions, he says no, explaining
that he is not a hacker.
The video was published on January 10, 2017 .
Taken at face value it really does show the ineptness of the SBU after 2014. This is why
Ukraine relied (s) on the Diaspora financed Shaltai Boltai, CyberHunta, Ukraine Cyber
Alliance, RUH8, Bellingcat, Webradius, InformNapalm and associated parties.
The Ukrainians were hired to get the goods on Trump. Part of that is knowing where to
start isn't it?
Fancy Bear's Second Chance at Top Secret Passwords From Team
Clinton
How stupid would the Fancy Bear teams of Shaltai Boltai, CyberHunta, Ukrainian Cyber
Alliance, and RUH8 be if they had access to the DNC servers which makes it easier to get into
the US State servers and not do that if it was their goal?
One very successful method of hacking is called social engineering. You gain access to the
office space and any related properties and physically locate the passwords or clues to get
you into the hardware you want to hack. This includes something as simple as looking over the
shoulder of the person typing in passwords.
Let's be clear. The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC
opposition research. On different occasions, Fancy Bear handler Kristina Dobrovolska traveled
to the US to meet the Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea
Chalupa, US Dept of State personnel, and most likely Crowdstrike's Dimitry Alperovich.
Alperovich was working with the hackers in 2015-16. In 2016, the only groups known to have
Fancy Bear's signature tools called X-tunnel and X-Agent were Alperovich, Crowdstrike, and
Fancy Bear (Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does
explain a few things.
Here is where it goes from bad to outright Fancy Bear ugly.
Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former
staff for research purposes from 2013 through prepping for the 2016 election. Were any
foreigners part of the opposition research team for Team Hillary in 2014-2015-2016? The
Clinton's don't have a history of vetting security issues well.
Let's recap. Clinton keeps 6 top secret passwords for research staff. Alexandra Chalupa is
running a research department that is rich in (foreign) Ukrainian Intelligence operatives,
hackers, terrorists, and a couple Ruskie traitors.
Kristina Dobrovolska was acting as a handler and translator for the US State Department in
2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to
Washington to meet with Chalupa.
Alexandra types in her password to show Dobrovolska something she found and her eager to
please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the
Fancy Bear crew about it and they immediately get to work looking for Trump material on the
US secret servers with legitimate access. I mean, what else could they do with this? Turn
over sensitive information to the ever corrupt Ukrainian government?
According to
the Politico article , Alexandra Chalupa was meeting with the Ukrainian embassy in June
of 2016 to discuss getting more help sticking it to candidate Trump. At the same time she was
meeting, the embassy had a reception that highlighted female Ukrainian leaders.
Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison
and translator who escorted the delegates from Kyiv during their visits to Albany and
Washington.
Kristina Dobrovolska is the handler manager working with Ukraine's DNC Fancy Bear Hackers
. She took the Rada members to dinner to meet Joel Harding who designed Ukraine's infamous
Information Policy which opened up their kill-for-hire-website Myrotvorets. Then she took
them to meet the Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the
surviving nephew to the infamous torturer The WWII OUNb leader, Mykola Lebed.
The
Podesta Hack – Don't Mess with OUNb Parkhomenko
I have no interest in reviewing his history except for a few points. Adam
Parkhomenko, a Diaspora Ukrainian nationalist almost gained a position in the presumed
Clinton White House. As a Ukrainian nationalist, his first loyalty, like any other Ukrainian
nationalist, is to a fascist model of Ukraine which Stepan Bandera devised but with a win it
would be in America.
During the 2016 primaries, it was Parkhomenko who accused Bernie Sanders of working for
Vladimir Putin. Parkhomenko has never really had a job outside the Clinton campaign.
<img
src="https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11.png"
alt="Adam Parkhomenko" width="355" height="454"
srcset="https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11.png
355w,
https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11-235x300.png
235w" sizes="(max-width: 355px) 100vw, 355px" /> Before Clinton declared her candidacy,
Parkhomenko started a PAC for Hillary Clinton with the goal of getting millions of people
email lists so the support was ready for a Clinton run. After she declared her candidacy,
Robby Mook, Hillary's campaign manager decided to sideline Parkhomenko and didn't take on his
full staff as promised. He reduced Parkomenko to a quiet menial position when he was brought
onboard.
Ultimately, Podesta became responsible for this because he gave Parkhomenko assurances
that his staff would be brought on and there would be no gaps in their paycheck. Many of them
including Parkhomenko's family moved to Brooklyn. And of course, that didn't happen. Podesta
was hacked in March and the Ukrainian nationalist Adam Parkhomenko was hired April 1st .
Today, Parkhomenko is working as a #DigitalSherlock with the Atlantic Council along with
the Fancy Bear hackers and many of the people associated with them. Why could this be a
revenge hack?
The Ukrainian Intel hackers are Pravy Sektor Ukrainian nationalists. Alexandra Chalupa is
also an OUNb Bandera Ukrainian nationalist. This Ukrainian nationalist was on his way to
becoming one of the most powerful people in America. That's why.
The DNC Leak- A
Patriotic Act
At the same time her aides were creating "loyalty scores ", Clinton, "instructed a
trusted aide to access the campaign's server and download the messages sent and received by
top staffers. She believed her campaign had failed her -- not the other way around -- and
she wanted 'to see who was talking to who, who was leaking to who.2'" After personally
reading the email correspondence of her staffers, she called them into interviews for the
2016 campaign, where she confronted them with some of the revelations."-
Forget about the DNC. The hackers may have spent months surfing the US secret servers
downloading and delivering top secret diplomatic files to their own government. The people
entrusted with this weren't just sloppy with security, this is beyond treason.
It doesn't matter if it was Seth Rich, though I hope it was ( for identification's sake),
who downloaded data from the DNC servers. The reasons supporting a leak are described by the
Veteran Intelligence Professionals for Sanity (VIPS). This shows clearly why the leak to
Wikileaks is much more plausible than a hack for the files taken in what is commonly called
the DNC hack. This leak was one "hack" of many that was going on.
Imagine being this person inside the situations described above with the reality hitting
you that things were very wrong. Even if they only saw parts of it, how much is too much? US
government secrets were being accessed and we know this because the passwords were given out
to the research teams the hackers were on.
It is very possible that giving the files to Wikileaks was the only safe way to be a
whistleblower with a Democrat president supporting Team Hillary even as Team Hillary was
cannibalizing itself. For detail on how the leak happened, refer to Adam Carter at
DisobedientMedia.com and the VIPS themselves.
Today, this isn't a Democrat problem. It could just as easily been an establishment
Republican.
Ukraine needs to pay for what their Intel Operators/ hackers have done. Stop funding
Ukraine other than verifiable humanitarian aid. Call your Congressional Rep.
Next up – We are going to look at who has oversight over this operation and who's
footing the bills.
Showed clearly why Mueller's evidence is rife with fraudulent data.
We solved the DNC Hack-Leaks and showed the how and why of what went on.
If you want to support investigative research with a lot of depth, please support my
Patreon page. You can also
support my work through PayPal as we expand in new directions over the coming year. For the
last 4 years, it's been almost entirely self-supportive effort which is something when you
consider I live in Donbass.
Top Photo | Former Democratic National Committee chair Donna Brazile holds a copy of her
book Hacks, detailing the hacking of the DNC, during a meeting of The Commonwealth Club, Nov.
9, 2017, in San Francisco. Marcio Jose Sanchez | AP
George Eliason is an American journalist that lives and works in Donbass. He has been
interviewed by and provided analysis for RT, the BBC, and Press-TV. His articles have been
published in the Security Assistance Monitor, Washingtons Blog, OpedNews, the Saker, RT,
Global Research, and RINF, and the Greanville Post among others. He has been cited and
republished by various academic blogs including Defending History, Michael Hudson, SWEDHR,
Counterpunch, the Justice Integrity Project, among others.
Republish our stories! MintPress News is licensed under a
Creative Commons Attribution-NonCommercial-ShareAlike 3.0 International License.
Guccifer 2.0
certainly didn't make a genuine effort to "conceal a Russian identity," far from it.
The
persona made decisions that would leave behind a demonstrable trail of Russian-themed
breadcrumbs, examples include:
US politics (domestic)
Choosing the Russian VPN Service (using the publicly accessible default server in France) in combination with a mail service provider that would forward the sender's IP address.
Creating a blog and dropping a Russian emoticon in the second paragraph of the first post, something he only ever did one other time over months of activity (in which he used at a far higher frequency).
Tainting documents with Russian language metadata.
Going through considerable effort to ensure Russian language errors were in the first documents provided to the press.
Probable use of a VM set to Russian timezone while manipulating documents so that datastore objects with timestamps implying a Russian timezone setting are saved (in one of the documents, change tracking had been left on and recorded someone in a PST timezone saving one of Guccifer 2.0's documents after the documents had being manipulated in the Russian timezones!)
The deliberate and inconsistent mangling of English language (which was actually inconsistent with aspects of English language that Russians typically struggle with).
Guccifer 2.0 claimed credit for a hack that was already being attributed to Russians without making any effort to counter that perception and only denied it when outright questioned on it.
"... I told Bernie I had found Hillary's Joint Fundraising Agreement. I explained that the cancer was that she had exerted this control of the party long before she became its nominee. Had I known this, I never would have accepted the interim chair position, but here we were with only weeks before the election. ..."
Before I called Bernie Sanders, I lit a candle in my living room and put on some gospel music. I wanted to center myself for what
I knew would be an emotional phone call.
I had promised Bernie when I took the helm of the Democratic National Committee after the convention that I would get to the bottom
of whether Hillary Clinton's team had rigged the nomination process, as a cache of emails stolen by Russian hackers and posted online
had suggested. I'd had my suspicions from the moment I walked in the door of the DNC a month or so earlier, based on the leaked emails.
But who knew if some of them might have been forged? I needed to have solid proof, and so did Bernie.
So I followed the money. My predecessor, Florida Rep. Debbie Wasserman Schultz, had not been the most active chair in fundraising
at a time when President Barack Obama's neglect had left the party in significant debt. As Hillary's campaign gained momentum, she
resolved the party's debt and put it on a starvation diet. It had become dependent on her campaign for survival, for which she expected
to wield control of its operations.
Debbie was not a good manager. She hadn't been very interested in controlling the party -- she let Clinton's headquarters in Brooklyn
do as it desired so she didn't have to inform the party officers how bad the situation was. How much control Brooklyn had and for
how long was still something I had been trying to uncover for the last few weeks.
By September 7, the day I called Bernie, I had found my proof and it broke my heart.
***
The Saturday morning after the convention in July, I called Gary Gensler, the chief financial officer of Hillary's campaign.
He wasted no words. He told me the Democratic Party was broke and $2 million in debt.
"What?" I screamed. "I am an officer of the party and they've been telling us everything is fine and they were raising money with
no problems."
That wasn't true, he said. Officials from Hillary's campaign had taken a look at the DNC's books. Obama left the party $24 million
in debt -- $15 million in bank debt and more than $8 million owed to vendors after the 2012 campaign -- and had been paying that
off very slowly. Obama's campaign was not scheduled to pay it off until 2016. Hillary for America (the campaign) and the Hillary
Victory Fund (its joint fundraising vehicle with the DNC) had taken care of 80 percent of the remaining debt in 2016, about $10 million,
and had placed the party on an allowance.
If I didn't know about this, I assumed that none of the other officers knew about it, either. That was just Debbie's way. In my
experience she didn't come to the officers of the DNC for advice and counsel. She seemed to make decisions on her own and let us
know at the last minute what she had decided, as she had done when she told us about the hacking only minutes before the Washington
Post broke the news.
The Friday On the phone
Gary told me the DNC had needed a $2 million loan, which the campaign had arranged.
"No! That can't be true!" I said. "The party cannot take out a loan without the unanimous agreement of all of the officers."
"Gary, how did they do this without me knowing?" I asked. "I don't know how Debbie relates to the officers," Gary said. He described
the party as fully under the control of Hillary's campaign, which seemed to confirm the suspicions of the Bernie camp. The campaign
had the DNC on life support, giving it money every month to meet its basic expenses, while the campaign was using the party as a
fund-raising clearinghouse. Under FEC law, an individual can contribute a maximum of $2,700 directly to a presidential campaign.
But the limits are much higher for contributions to state parties and a party's national committee.
Individuals who had maxed out their $2,700 contribution limit to the campaign could write an additional check for $353,400 to
the Hillary Victory Fund -- that figure represented $10,000 to each of the 32 states' parties who were part of the Victory Fund agreement
-- $320,000 -- and $33,400 to the DNC. The money would be deposited in the states first, and transferred to the DNC shortly after
that. Money in the battleground states usually stayed in that state, but all the other states funneled that money directly to the
DNC, which quickly transferred the money to Brooklyn.
"Wait," I said. "That victory fund was supposed to be for whoever was the nominee, and the state party races. You're telling me
that Hillary has been controlling it since before she got the nomination?"
Gary said the campaign had to do it or the party would collapse.
"That was the deal that Robby struck with Debbie," he explained, referring to campaign manager Robby Mook. "It was to sustain
the DNC. We sent the party nearly $20 million from September until the convention, and more to prepare for the election."
"What's the burn rate, Gary?" I asked. "How much money do we need every month to fund the party?"
The burn rate was $3.5 million to $4 million a month, he said.
I gasped. I had a pretty good sense of the DNC's operations after having served as interim chair five years earlier. Back then
the monthly expenses were half that. What had happened? The party chair usually shrinks the staff between presidential election campaigns,
but Debbie had chosen not to do that. She had stuck lots of consultants on the DNC payroll, and Obama's consultants were being financed
by the DNC, too.
When we hung up, I was livid. Not at Gary, but at this mess I had inherited. I knew that Debbie had outsourced a lot of the management
of the party and had not been the greatest at fundraising. I would not be that kind of chair, even if I was only an interim chair.
Did they think I would just be a surrogate for them, get on the road and rouse up the crowds? I was going to manage this party the
best I could and try to make it better, even if Brooklyn did not like this. It would be weeks before I would fully understand the
financial shenanigans that were keeping the party on life support.
***
Right around the time of the convention , the leaked emails revealed Hillary's campaign was grabbing money from the state
parties for its own purposes, leaving the states with very little to support down-ballot races. A
Politico
story published on May 2, 2016, described the big fund-raising vehicle she had launched through the states the summer
before, quoting a vow she had made to rebuild "the party from the ground up when our state parties are strong, we win. That's what
will happen."
Yet the states kept less than half of 1 percent of the $82 million they had amassed from the extravagant fund-raisers Hillary's
campaign was holding, just as Gary had described to me when he and I talked in August. When the Politico story described this
arrangement as "essentially money laundering" for the Clinton campaign, Hillary's people were outraged at being accused of doing
something shady. Bernie's people were angry for their own reasons, saying this was part of a calculated strategy to throw the nomination
to Hillary.
I wanted to believe Hillary, who made campaign finance reform part of her platform, but I had made this pledge to Bernie and did
not want to disappoint him. I kept asking the party lawyers and the DNC staff to show me the agreements that the party had made for
sharing the money they raised, but there was a lot of shuffling of feet and looking the other way.
When I got back from a vacation in Martha's Vineyard, I at last found the document that described it all: the Joint Fund-Raising
Agreement between the DNC, the Hillary Victory Fund, and Hillary for America.
The agreement -- signed by Amy Dacey, the former CEO of the DNC, and Robby Mook with a copy to Marc Elias -- specified that in
exchange for raising money and investing in the DNC, Hillary would control the party's finances, strategy, and all the money raised.
Her campaign had the right of refusal of who would be the party communications director, and it would make final decisions on all
the other staff. The DNC also was required to consult with the campaign about all other staffing, budgeting, data, analytics, and
mailings.
I had been wondering why it was that I couldn't write a press release without passing it by Brooklyn. Well, here was the answer.
When the party chooses the nominee, the custom is that the candidate's team starts to exercise more control over the party. If
the party has an incumbent candidate, as was the case with Clinton in 1996 or Obama in 2012, this kind of arrangement is seamless
because the party already is under the control of the president. When you have an open contest without an incumbent and competitive
primaries, the party comes under the candidate's control only after the nominee is certain. When I was manager of Al Gore's campaign
in 2000, we started inserting our people into the DNC in June. This victory fund agreement, however, had been signed in August 2015,
just four months after Hillary announced her candidacy and nearly a year before she officially had the nomination.
I had tried to search out any other evidence of internal corruption that would show that the DNC was rigging the system to throw
the primary to Hillary, but I could not find any in party affairs or among the staff. I had gone department by department, investigating
individual conduct for evidence of skewed decisions, and I was happy to see that I had found none. Then I found this agreement.
The funding arrangement with HFA and the victory fund agreement was not illegal, but it sure looked unethical. If the fight had
been fair, one campaign would not have control of the party before the voters had decided which one they wanted to lead. This was
not a criminal act, but as I saw it, it compromised the party's integrity.
***
I had to keep my promise to Bernie . I was in agony as I dialed him. Keeping this secret was against everything that I
stood for, all that I valued as a woman and as a public servant.
"Hello, senator. I've completed my review of the DNC and I did find the cancer," I said. "But I will not kill the patient."
I discussed the fundraising agreement that each of the candidates had signed. Bernie was familiar with it, but he and his staff
ignored it. They had their own way of raising money through small donations. I described how Hillary's campaign had taken it another
step.
I told Bernie I had found Hillary's Joint Fundraising Agreement. I explained that the cancer was that she had exerted this
control of the party long before she became its nominee. Had I known this, I never would have accepted the interim chair position,
but here we were with only weeks before the election.
Bernie took this stoically. He did not yell or express outrage. Instead he asked me what I thought Hillary's chances were. The
polls were unanimous in her winning but what, he wanted to know, was my own assessment?
I had to be frank with him. I did not trust the polls, I said. I told him I had visited states around the country and I found
a lack of enthusiasm for her everywhere. I was concerned about the Obama coalition and about millennials.
I urged Bernie to work as hard as he could to bring his supporters into the fold with Hillary, and to campaign with all the heart
and hope he could muster. He might find some of her positions too centrist, and her coziness with the financial elites distasteful,
but he knew and I knew that the alternative was a person who would put the very future of the country in peril. I knew he heard me.
I knew he agreed with me, but I never in my life had felt so tiny and powerless as I did making that call.
When I hung up the call to Bernie, I started to cry, not out of guilt, but out of anger. We would go forward. We had to.
"... The Clinton camp was hardly absent from social media during the 2016 race. The barely-legal activities of Clintonite David Brock were previously reported by this author to have included $2 million in funding for the creation of an online " troll army " under the name Shareblue. The LA Times described the project as meant to "to appear to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid and highly tactical." In other words, the effort attempted to create a false sense of consensus in support for the Clinton campaign. ..."
"... In terms of interference in the actual election process, the New York City Board of Elections was shown to have purged over one hundred thousand Democratic voters in Brooklyn from the rolls before the 2016 primary, a move that the Department of Justice found broke federal law . Despite this, no prosecution for the breach was ever attempted. ..."
"... In 2017, the Observer reported that the DNC's defense counsel argued against claims that the party defrauded Sanders' supporters by favoring Clinton, reasoning that Sanders' supporters knew the process was rigged. Again: instead of arguing that the primary was neutral and unbiased in accordance with its charter, the DNC's lawyers argued that it was the party's right to select candidates. ..."
"... The DNC defense counsel's argument throughout the course of the DNC fraud lawsuit doubled down repeatedly in defense of the party's right to favor one candidate over another, at one point actually claiming that such favoritism was protected by the First Amendment . ..."
"... The DNC's shameless defense of its own rigging disemboweled the most fundamental organs of the U.S. body politic. This no indication that the DNC will not resort to the same tactics in the 2020 primary race, ..."
"... f Debbie Wasserman Schultz's role as disgraced chairwoman of the DNC and her forced 2016 resignation wasn't enough, serious interference was also alleged in the wake of two contests between Wasserman Schultz and professor Tim Canova in Florida's 23rd congressional district. Canova and Wasserman Schultz first faced off in a 2016 Democratic primary race, followed by a 2018 general congressional election in which Canova ran as an independent. ..."
"... Debacles followed both contests, including improper vote counts, illegal ballot destruction , improper transportation of ballots, and generally shameless displays of cronyism. After the controversial results of the initial primary race against Wasserman Schultz, Canova sought to have ballots checked for irregularities, as the Sun-Sentinel reported at the time: ..."
"... Ultimately, Canova was granted a summary judgment against Snipes, finding that she had committed what amounted to multiple felonies. Nonetheless, Snipes was not prosecuted and remained elections supervisor through to the 2018 midterms. ..."
"... Hillary Clinton's recent comments to the effect that Congresswoman Tulsi Gabbard is being "groomed" by Russia, and that the former Green Party Presidential candidate Dr. Jill Stein is a "Russian asset", were soon echoed by DNC-friendly pundits. These sentiments externalize what Gabbard called the "rot" in the Democratic party outward onto domestic critics and a nation across the planet. ..."
"... Newsweek provided a particularly glaring example of this phenomenon in a recent op-ed penned by columnist Naveed Jamali, a former FBI double agent whose book capitalizes on Russiagate. In an op-ed titled: " Hillary Clinton Is Right. Tulsi Gabbard Is A Perfect Russian Asset – And Would Be A Perfect Republican Agent," ..."
Establishment Democrats and those who amplify them continue to project
blame for the public's doubt in the U.S. election process onto outside influence, despite the clear history of the party's subversion
of election integrity. The total inability of the Democratic Party establishment's willingness to address even one of these critical
failures does not give reason to hope that the nomination process in 2020 will be any less pre-ordained.
The Democratic Party's bias against Sen. Bernie Sanders during the 2016 presidential nomination, followed by the DNC defense counsel
doubling down on its right to rig the race during the
fraud lawsuit brought
against the DNC , as well as the irregularities in the races between former DNC Chairwoman Debbie Wasserman Schultz and Tim Canova,
indicate a fatal breakdown of the U.S. democratic process spearheaded by the Democratic Party establishment. Influences transcending
the DNC add to concerns regarding the integrity of the democratic process that have nothing to do with Russia, but which will also
likely impact outcomes in 2020.
The content of the DNC and
Podesta emails published by WikiLeaks demonstrated that the DNC
acted in favor of Hillary Clinton in the lead up to the 2016 Democratic primary. The emails also revealed corporate media reporters
acting as surrogates of the DNC and its pro-Clinton agenda, going so far as
to promote Donald Trump during the GOP primary process as a preferred " pied-piper
candidate ." One cannot assume that similar evidence will be presented to the public in 2020, making it more important than ever
to take stock of the unique lessons handed down to us by the 2016 race.
Social Media Meddling
Election meddling via social media did take place in 2016, though in a different guise and for a different cause from that which
are best remembered. Twitter would eventually admit to actively suppressing
hashtags referencing the DNC and Podesta emails in the run-up to the 2016 presidential election. Additional
reports indicated that tech giant Google also showed measurable "pro-Hillary
Clinton bias" in search results during 2016, resulting in the alleged swaying of between 2 and 10 millions voters in favor of Clinton.
On the Republican side, a recent episode of CNLive! featured discussion
of the Cambridge Analytica scandal, in which undecided voters were micro-targeted with tailored advertising narrowed with the combined
use of big data and artificial intelligence known collectively as "dark strategy." CNLive! Executive Producer Cathy Vogan noted that
SCL, Cambridge Analytica's parent company, provides data, analytics and strategy to governments and military organizations "worldwide,"
specializing in behavior modification. Though Cambridge Analytica shut down in 2018, related companies remain.
The Clinton camp was hardly absent from social media during the 2016 race. The
barely-legal activities of Clintonite David Brock
were previously reported by this author to have included $2 million in funding
for the creation of an online " troll army " under the name Shareblue. The
LA Times described the project as meant to "to appear
to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid
and highly tactical." In other words, the effort attempted to create a false sense of consensus in support for the Clinton campaign.
In terms of interference in the actual election process, the New York City Board of Elections was shown to have
purged over one hundred thousand Democratic voters in Brooklyn from the rolls
before the 2016 primary, a move that the Department of Justice found
broke federal law . Despite this, no prosecution
for the breach was ever attempted.
Though the purge was not explicitly found to have benefitted Clinton, the admission falls in line with allegations across the
country that the Democratic primary was interfered with to the benefit of the former secretary of state. These claims were further
bolstered by reports indicating that voting results from the 2016 Democratic
primary showed evidence of fraud.
DNC Fraud Lawsuit
The proceedings of the DNC fraud lawsuit provide the most damning evidence of the failure of the U.S. election process, especially
within the Democratic Party. DNC defense lawyers argued in open court for the party's
right to appoint candidates at its own discretion, while simultaneously denying
any "fiduciary duty" to represent the voters who donated to the Democratic Party under the impression that the DNC would act impartially
towards the candidates involved.
In 2017, the Observer reported that the DNC's defense counsel argued
against claims that the party defrauded Sanders' supporters by favoring Clinton, reasoning that Sanders' supporters knew the process
was rigged. Again: instead of arguing that the primary was neutral and unbiased in accordance with its charter, the DNC's lawyers
argued that it was the party's right to select candidates.
The Observer noted the sentiments of Jared Beck, the attorney representing the plaintiffs of the lawsuit:
"People paid money in reliance on the understanding that the primary elections for the Democratic nominee -- nominating process
in 2016 were fair and impartial, and that's not just a bedrock assumption that we would assume just by virtue of the fact that
we live in a democracy, and we assume that our elections are run in a fair and impartial manner. But that's what the Democratic
National Committee's own charter says. It says it in black and white."
The DNC defense counsel's argument throughout the course of the DNC fraud lawsuit doubled down repeatedly in defense of the party's
right to favor one candidate over another, at one point actually claiming that such favoritism was
protected by the First Amendment . The DNC's lawyers wrote:
"To recognize any of the causes of action that Plaintiffs allege would run directly contrary to long-standing Supreme Court
precedent recognizing the central and critical First Amendment rights enjoyed by political parties, especially when it comes to
selecting the party's nominee for public office ." [Emphasis added]
The DNC's shameless defense of its own rigging disemboweled the most fundamental organs of the U.S. body politic. This no indication
that the DNC will not resort to the same tactics in the 2020 primary race,
Tim Canova's Allegations
If Debbie Wasserman Schultz's role as disgraced chairwoman of the DNC and her forced 2016 resignation wasn't enough, serious interference
was also alleged in the wake of two contests between Wasserman Schultz and professor Tim Canova in Florida's 23rd congressional district.
Canova and Wasserman Schultz first faced off in a 2016 Democratic primary race, followed by a 2018 general congressional election
in which Canova ran as an independent.
Debacles followed both contests, including improper vote counts, illegal
ballot destruction , improper
transportation of ballots, and generally
shameless displays of cronyism. After the controversial
results of the initial primary race against Wasserman Schultz, Canova sought to have ballots checked for irregularities, as the
Sun-Sentinel reported at the time:
"[Canova] sought to look at the paper ballots in March 2017 and took Elections Supervisor Brenda Snipes to court three months
later when her office hadn't fulfilled his request. Snipes approved the destruction of the ballots in September, signing a certification
that said no court cases involving the ballots were pending."
Ultimately, Canova was granted a summary judgment against Snipes, finding that she had committed what amounted to multiple felonies.
Nonetheless, Snipes was not prosecuted and remained elections supervisor through to the 2018 midterms.
Republicans appear no more motivated to protect voting integrity than the Democrats, with
The Nation reporting that the GOP-controlled Senate
blocked a bill this week that would have "mandated paper-ballot backups in case of election machine malfunctions."
Study of Corporate Power
A 2014
study published by Princeton University found that corporate power had usurped the voting rights of the public: "Economic elites
and organized groups representing business interests have substantial independent impacts on U.S. government policy, while average
citizens and mass-based interest groups have little or no independent influence."
In reviewing this sordid history, we see that the Democratic Party establishment has done everything in its power to disrespect
voters and outright overrule them in the democratic primary process, defending their right to do so in the DNC fraud lawsuit. We've
noted that interests transcending the DNC also represent escalating threats to election integrity as demonstrated in 2016.
Despite this, establishment Democrats and those who echo their views in the legacy press continue to deflect from their own wrongdoing
and real threats to the election process by suggesting that mere discussion of it represents a campaign by Russia to attempt to malign
the perception of the legitimacy of the U.S. democratic process.
Hillary Clinton's recent comments to the effect that Congresswoman Tulsi Gabbard is being "groomed" by Russia, and that the former
Green Party Presidential candidate Dr. Jill Stein is a "Russian asset", were soon echoed by DNC-friendly pundits. These sentiments
externalize what Gabbard called the "rot"
in the Democratic party outward onto domestic critics and a nation across the planet.
Newsweek provided a particularly glaring example of this phenomenon in a
recent op-ed penned by columnist Naveed Jamali, a former FBI double agent whose book capitalizes on Russiagate. In an op-ed titled:
" Hillary Clinton Is Right. Tulsi Gabbard Is A Perfect Russian Asset – And Would Be A Perfect Republican Agent," Jamali
argued :
"Moscow will use its skillful propaganda machine to prop up Gabbard and use her as a tool to delegitimize the democratic process.
" [Emphasis added]
Jamali surmises that Russia intends to "attack" our democracy by undermining the domestic perception of its legitimacy. This thesis
is repeated later in the piece when Jamali opines : "They want to see a retreat
of American influence. What better way to accomplish that than to attack our democracy by casting doubt on the legitimacy of our
elections." [Emphasis added]
The only thing worth protecting, according to Jamali and those who amplify his work (including former Clinton aide and establishment
Democrat Neera Tanden), is the perception of the democratic process, not the actual functioning vitality of it. Such deflective tactics
ensure that Russia will continue to be used as a convenient international pretext for
silencing domestic dissent as we move into 2020.
Given all this, how can one expect the outcome of a 2020 Democratic Primary -- or even the general election – to be any fairer
or transparent than 2016?
* * *
Elizabeth Vos is a freelance reporter, co-host of CN Live! and regular contributor to Consortium News. If you value this
original article, please consider
making
a donation to Consortium News so we can bring you more stories like this one.
"... They also failed to note the voice-modulated phone calls received by the law offices of the Becks which contained a caller-ID corresponding to the law offices of Debbie Wasserman Schultz, a defendant in the case. In light of this context, the Becks hardly appear to be peddlers of conspiracy theory. ..."
The defense counsel also took issue with Jared Beck for what they termed as: " Repeatedly promoted patently false and deeply offensive
conspiracy theories about the deaths of a former DNC staffer and Plaintiffs' process server in an attempt to bolster attention for
this lawsuit." This author was shocked to find that despite the characterization of the Becks as peddlers of conspiracy theory, the
defense counsel failed to mention the motion for protection filed by the Becks earlier in the litigation process.
They also failed to note the voice-modulated phone calls received by the law offices of the Becks which contained a caller-ID
corresponding to the law offices of Debbie Wasserman Schultz, a defendant in the case. In light of this context, the Becks hardly
appear to be peddlers of conspiracy theory.
The DNC defense lawyers then argued:
" There is no legitimate basis for this litigation, which is, at its most basic, an improper attempt to forge the federal courts
into a political weapon to be used by individuals who are unhappy with how a political party selected its candidate in a presidential
campaign ."
The brief continued:
" To recognize any of the causes of action that Plaintiffs allege based on their animating theory would run directly contrary
to long-standing Supreme Court precedent recognizing the central and critical First Amendment rights enjoyed by political parties,
especially when it comes to selecting the party's nominee for public office."
It appears that the defendants in the DNC Fraud Lawsuit are attempting to argue that cheating a candidate in the primary process
is protected under the first amendment. If all that weren't enough, DNC representatives argued that the Democratic National Committee
had no established fiduciary duty "to the Plaintiffs or the classes of donors and registered voters they seek to represent." It seems
here that the DNC is arguing for its right to appoint candidates at its own discretion while simultaneously denying any "fiduciary
duty" to represent the voters who donated to the Democratic Party under the belief that the DNC would act impartially towards the
candidates involved.
Adding to the latest news regarding the DNC Fraud Lawsuit was the recent
finding by the UK Supreme
Court, which stated that Wikileaks Cables were admissible as evidence in legal proceedings.
If Wikileaks' publication of DNC emails are found to be similarly admissible in a United States court of law, then the contents
of the leaked emails could be used to argue that, contrary to the defendant's latest brief, the DNC did in favor the campaign of
Hillary Clinton over Senator Sanders and that they acted to sabotage Sanders' campaign.
The outcome of the appeal of the DNC Fraud Lawsuit remains to be seen.
Elizabeth Vos is the Co-Founder and Editor in Chief at
Disobedient Media .
"... The Task Force also could carry out other covert actions, such as information operations. A nice sounding euphemism for propaganda, and computer network operations. There has been some informed speculation that Guccifer 2.0 was a creation of this Task Force. ..."
The average American has no idea how alarming is the news that former CIA Director John
Brennan reportedly created and staffed a CIA Task Force in early 2016 that was named, Trump
Task Force, and given the mission of spying on and carrying out covert actions against the
campaign of candidate Donald Trump.
This was not a simple gathering of a small number of disgruntled Democrats working at the
CIA who got together like a book club to grouse and complain about the brash real estate guy
from New York. It was a specially designed covert action to try to destroy Donald Trump.
A "Task Force" is a special bureaucratic creation that provides a vehicle for bring case
officers and analysts together, along with admin support, for a limited term project. But it
also can be expanded to include personnel from other agencies, such as the FBI, DIA and NSA.
Task Forces have been used since the inception of the CIA in 1947. Here's a recently
declassified memo outlining the considerations in the creation of a task force in 1958. The
author, L.K. White, talks about the need for a coordinating Headquarters element and an
Operational unit "in the field", i.e. deployed around the world.
A Task Force operates independent of the CIA " Mission Centers
" (that's the jargon for the current CIA organization chart).
So what did John Brennan do? I am told by an knowledgeable source that Brennan created a
Trump Task Force in early 2016. It was an invitation only Task Force. Specific case officers
(i.e., men and women who recruit and handle spies overseas), analysts and admin personnel were
recruited. Not everyone invited accepted the offer. But many did.
This was not a CIA only operation. Personnel from the FBI also were assigned to the Task
Force. We have some clues that Christopher Steele's FBi handler, Michael Gaeta, may have been
detailed to the Trump Task Force ( see here
).
So what kind of things would this Task Force do? The case officers would work with foreign
intelligence services such as MI-6, the Italians, the Ukrainians and the Australians on
identifying intelligence collection priorities. Task Force members could task NSA to do
targeted collection. They also would have the ability to engage in covert action, such as
targeting George Papadopoulos. Joseph Mifsud may be able to shed light on the CIA officers who
met with him, briefed on operational objectives regarding Papadopoulos and helped arrange
monitored meetings. I think it is highly likely that the honey pot that met with George
Papadopoulos, a woman named Azra Turk, was part of the CIA Trump Task Force.
The Task Force also could carry out other covert actions, such as information
operations. A nice sounding euphemism for propaganda, and computer network operations. There
has been some informed speculation that Guccifer 2.0 was a creation of this Task
Force.
In light of what we have learned about the alleged CIA whistleblower, Eric Ciaramella, there
should be a serious investigation to determine if he was a part of this Task Force or, at
minimum, reporting to them.
When I described this to one friend, a retired CIA Chief of Station, his first response was,
"My God, that's illegal." We then reminisced about another illegal operation carried out under
the auspices of the CIA Central American Task Force back in the 1980s. That became known to
Americans as the Iran Contra scandal.
I sure hope that John Durham and his team are looking at this angle. If true it marks a new
and damning indictment of the corruption of the CIA. Rather than spying on genuine foreign
threats, this Task Force played a critical role in creating and feeding the meme that Donald
Trump was a tool of the Russians and a puppet of Putin.
I will make this very simple. The DNC emails that ultimately were published on Wikileaks
likely originated with a DNC staffer, Seth Rich. It was not the Russians. The decision to blame
the Russians was an intelligence construct that was concocted once U.S. and British
intelligence officials plotting against Donald Trump realized that Rich had downloaded the
emails and was communicating with Julian Assange and his cohorts.
Here are the facts:
It was
29 April 2016 , when the DNC claims it became aware its servers had been penetrated. No
claim yet about who was responsible.
According to CrowdStrike founder , Dimitri Alperovitch, his company first supposedly
detected the Russians mucking around inside the DNC server on 6 May 2016. A CrowdStrike
intelligence analyst reportedly told Alperovitch that:
Falcon had identified not one but two Russian intruders: Cozy Bear, a group
CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA;
and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
The Wikileaks data shows that the last message copied from the DNC network is dated Wed,
25 May 2016 08:48:35.
10 June 2016--CrowdStrike waited until 10 June 2016 to take concrete steps to clean up
the DNC network. Alperovitch told Esquire's Vicky Ward that: 'Ultimately, the teams decided
it was necessary to replace the software on every computer at the DNC. Until the network was
clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were
instructed to leave their laptops in the office."
On June 14, 2016, Ellen Nakamura, a Washington Post reporter who had been briefed by
computer security company hired by the DNC -- Crowdstrike--, wrote:
Russian government hackers penetrated the computer network of the Democratic National
Committee and gained access to the entire database of opposition research on GOP
presidential candidate Donald Trump, according to committee officials and security
experts who responded to the breach.
The intruders so thoroughly compromised the DNC's system that they also were able to
read all email and chat traffic, said DNC officials and the security experts.
The intrusion into the DNC was one of several targeting American political
organizations. The networks of presidential candidates Hillary Clinton and Donald Trump
were also targeted by Russian spies, as were the computers of some Republican political
action committees, U.S. officials said. But details on those cases were not
available.
15 June, 2016, an internet "personality" self-described as Guccifer 2.0 surfaces and
claims to be responsible for the hacks but denies being Russian. However, the meta data in
the documents posted by Guccifer 2.0 appear to be deliberately crafted to show "Russian"
involvement.
The DNC emails that were released on July 22, 2016 by Wikileaks covered the period from
January 2015 thru 25 May 2016.
The FSB is not really Ruusias CIA equvalent though. It is more akin to an unholy alliance of
homeland security and the FBI. GRU is kind of like DIA + the army, navy, air force and marine
intelligence. Closest thing to the CIA Russia has would be the SVR, but their overall remit
is still somewhat different.
Nice laydown. One really needs this sort of step-by-step letdown to get and keep the facts
straight.
Some sort of link chart/diagram that could be updated as needed would be great.
Between the DNC emails, the Steele faux-dossier, Seth Rich, Guccifer 2.0, and whatever
connection there might be to Skripal and the British, it's really challenging to keep all the
players and actions in the right relationship to one another.
One side question: Where does DC Leaks fit into this?
The Seth Rich story is coming back to life. A fellow named Butowski is exposing things.
He claims that Ellen Ratner of Fox News told him that Seth Rich and his brother Aaron gave
Wikileaks Hillary's emails. Julian Assange is said to have told Ellen Ratner.
The story is that the cover-up came down from now disgraced FBI agent, Andrew McCabe, to
the Mayor of DC and on down to the police. They were told to sit on the case.
The Seth Rich story tells us how corruption spreads. The Mayor of DC, Muriel Bowser, tells
Peter Newsham, the guy in charge of the Seth Rich investigation, to shut it down.
Then, a year later she promotes him to Chief of Police.
"... That epithet has a sordid history in the annals of U.S. intelligence. Legendary CIA Director Allen Dulles used the "brand-them-conspiracy-theorists" ploy following the assassination of President John F. Kennedy when many objected -- understandably -- to letting him pretty much run the Warren Commission, even though the CIA was suspected of having played a role in the murder. The "conspiracy theorist" tactic worked like a charm then, and now. Well, up until just now. ..."
"... U.S. Courts apply far tougher standards to evidence than do the intelligence community and the pundits who loll around lazily, feeding from the intelligence PR trough. This (hardly surprising) reality was underscored when a Dallas financial adviser named Ed Butowsky sued National Public Radio and others for defaming him about the role he played in controversial stories relating to Rich. On August 7, NPR suffered a setback, when U.S. District Court Judge Amos Mazzant affirmed a lower court decision to allow Butowsky's defamation lawsuit to proceed. ..."
"... NPR gave Isikoff 37 minutes on its popular Fresh Air program to spin his yarn about how the Seth Rich story got started. You guessed it; the Russians started it . No, we are not making this up. ..."
"... It is far from clear that Isikoff can be much help to NPR in the libel case against it. Isikoff's own writings on Russiagate are notably lacking in "verifiable statements of fact" -- information that cannot be verified. ..."
"... In any case, The Washington Post , had already debunked Isikoff's claim (which later in his article he switched to being only "purported") by pointing out that Americans had already tweeted the theory of Rich's murder days before the alleged Russian intervention. ..."
"... Butowsky's libel lawsuit can now proceed to discovery, which will include demands for documents and depositions that are likely to shed light on whatever role Rich may have played in leaking to WikiLeaks . If the government obstructs or tries to slow-roll the case, we shall have to wait and see, for example, if the court will acquiesce to the familiar government objection that information regarding Rich's murder must be withheld as a state secret? Hmmm. What would that tell us? ..."
"... During discovery in a separate court case, the government was unable to produce a final forensic report on the "hacking" of the Democratic National Committee. The DNC-hired cyber firm, CrowdStrike, failed to complete such a report, and that was apparently okay with then FBI Director James Comey, who did not require one. ..."
"... The thorny question of "persuasive sourcing," came up even more starkly on July 1, when federal Judge Dabney Friedrich ordered Robert Mueller to stop pretending he had proof that the Russian government was behind the Internet Research Agency's supposed attempt to interfere via social media in the 2016 election. Middle school-level arithmetic can prove the case that the IRA's use of social media to support Trump is ludicrous on its face. ..."
"... As journalist Patrick Lawrence put it recently: "Three years after the narrative we call Russiagate was framed and incessantly promoted, it crumbles into rubble as we speak." ..."
"... In a long interview with Lauria a few months ago in New Zealand aired this month on CN Live! , Kim Dotcom provided a wealth of detail, based on what he described as first-hand knowledge, regarding how Democratic National Committee documents were leaked to WikiLeaks in 2016. ..."
"... The major takeaway: the evidence presented by Dotcom about Seth Rich can be verified or disproven if President Trump summons the courage to order the director of NSA to dig out the relevant data, including the conversations Dotcom says he had with Rich and Rich may have had with WikiLeaks publisher Julian Assange. ..."
"... Dotcom said he put Rich in touch with a middleman to transfer the DNC files to WikiLeaks . ..."
"... Mark Twain is said to have warned, "How easy it is to make people believe a lie, and [how] hard it is to undo that work again!" After three years of "Russia-Russia-Russia" in the corporate -- and even in some "progressive" -- media, this conditioning will not be easy to reverse. ..."
Simply letting the name "Seth Rich" pass your lips can condemn you to the leper colony built
by the Washington Establishment for "conspiracy theorists," (the term regularly applied to
someone determined to seek tangible evidence, and who is open to alternatives to
"Russia-did-it.")
Rich was a young DNC employee who was murdered on a street in Washington, DC, on July 10,
2016. Many, including me, suspect that Rich played some role in the leaking of DNC emails to
WikiLeaks . There is considerable circumstantial evidence that this may have been the
case. Those who voice such suspicions, however, are, ipso facto , branded "conspiracy
theorists."
That epithet has a sordid history in the annals of U.S. intelligence. Legendary CIA Director
Allen Dulles used the "brand-them-conspiracy-theorists" ploy following the assassination of
President John F. Kennedy when many objected -- understandably -- to letting him pretty much
run the Warren Commission, even though the CIA was suspected of having played a role in the
murder. The "conspiracy theorist" tactic worked like a charm then, and now. Well, up until just
now.
Rich Hovers Above the Courts
U.S. Courts apply far tougher standards to evidence than do the intelligence community and
the pundits who loll around lazily, feeding from the intelligence PR trough. This (hardly
surprising) reality was underscored when a Dallas financial adviser named Ed Butowsky sued
National Public Radio and others for defaming him about the role he played in controversial
stories relating to Rich. On August 7, NPR suffered a setback, when U.S. District Court Judge
Amos Mazzant affirmed a lower court decision to allow Butowsky's defamation lawsuit to
proceed.
Judge Mazzant ruled that NPR had stated as "verifiable statements of fact" information that
could not be
verified , and that the plaintiff had been, in effect, accused of being engaged in
wrongdoing without persuasive sourcing language.
Isikoff: Russians started it. (Wikipedia)
Imagine! -- "persuasive sourcing" required to separate fact from opinion and axes to grind!
An interesting precedent to apply to the ins and outs of Russiagate. In the courts, at least,
this is now beginning to happen. And NPR and others in similarly vulnerable positions are
scurrying around for allies.??The day after Judge Mazzant's decision, NPR enlisted help from
discredited Yahoo! News pundit Michael Isikoff (author, with David Corn, of the
fiction-posing-as-fact novel Russian Roulette ). NPR gave Isikoff 37 minutes on its
popular Fresh Air program to spin his yarn about how the Seth Rich story got started.
You guessed it; the Russians started it . No, we are not making this up.
It is far from clear that Isikoff can be much help to NPR in the libel case against it.
Isikoff's own writings on Russiagate are notably lacking in "verifiable statements of fact" --
information that cannot be verified. Watch, for example, his recent interview with Consortium
News Editor Joe Lauria on CN Live!
Isikoff admitted to Lauria that he never saw the classified Russian intelligence document
reportedly indicating that three days after Rich's murder the Russian SVR foreign intelligence
service planted a story about Rich having been the leaker and was killed for it. This Russian
intelligence "bulletin," as Isikoff called it, was supposedly placed on a bizarre website that
Isikoff admitted was an unlikely place for Russia to spread disinformation. He acknowledged
that he only took the word of the former prosecutor in the Rich case about the existence of
this classified Russian document.
In any case, The Washington Post , had already
debunked Isikoff's claim (which later in his article he switched to being only "purported")
by pointing out that Americans had already tweeted the theory of Rich's murder days before the
alleged Russian intervention.
' Persuasive Sourcing' & Discovery ??
Butowsky's libel lawsuit can now proceed to discovery, which will include demands for
documents and depositions that are likely to shed light on whatever role Rich may have played
in leaking to WikiLeaks . If the government obstructs or tries to slow-roll the case, we
shall have to wait and see, for example, if the court will acquiesce to the familiar government
objection that information regarding Rich's murder must be withheld as a state secret? Hmmm.
What would that tell us?
Butowsky: Suit could reveal critical information. (Flickr)
During discovery in a separate court case, the government was unable to produce a final
forensic report on the "hacking" of the Democratic National Committee. The DNC-hired cyber
firm, CrowdStrike, failed to complete such a report, and that was apparently
okay with then FBI Director James Comey, who did not require one.
The incomplete, redacted, draft, second-hand "forensics" that Comey settled for from
CrowdStrike does not qualify as credible evidence -- much less "persuasive sourcing" to support
the claim that the Russians "hacked" into the DNC. Moreover, CrowdStrike has a dubious
reputation for professionalism and a well known anti-Russia bias.
The thorny question of "persuasive sourcing," came up even more starkly on July 1, when
federal Judge Dabney Friedrich ordered Robert Mueller to stop pretending he had proof that the
Russian government was behind the Internet Research Agency's supposed attempt to interfere via
social media in the 2016 election. Middle school-level arithmetic can
prove the case that the IRA's use of social media to support Trump is ludicrous on its
face.
Russia-gate Rubble
As journalist Patrick Lawrence put
it recently: "Three years after the narrative we call Russiagate was framed and incessantly promoted, it crumbles into
rubble as we speak." Falling syllogism! Step nimbly to one side.
The "conspiracy theorist" epithet is not likely to much longer block attention to the role,
if any, played by Rich -- the more so since some players who say they were directly involved
with Rich are coming forward.
In a long interview with Lauria a few
months ago in New Zealand aired this month on CN Live! , Kim Dotcom provided a
wealth of detail, based on what he described as first-hand knowledge, regarding how Democratic
National Committee documents were leaked to WikiLeaks in 2016.
The major takeaway: the evidence presented by Dotcom about Seth Rich can be verified or
disproven if President Trump summons the courage to order the director of NSA to dig out the
relevant data, including the conversations Dotcom says he had with Rich and Rich may have had with
WikiLeaks publisher Julian Assange.
Dotcom said he put Rich in touch with a middleman to
transfer the DNC files to WikiLeaks . Sadly, Trump has flinched more than once rather
than confront the Deep State -- and this time there are a bunch of very well connected, senior
Deep State practitioners who could face
prosecution .
Another sign that Rich's story is likely to draw new focus is the virulent character
assassination indulged in by former investigative journalist James Risen.
Not Risen to the Challenge
Risen: Called Binney a "conspiracy theorist." (Flickr)
On August 5, in an interview on The Hill's "Rising,"
Risen chose to call former NSA Technical Director Bill Binney -- you guessed it -- a
"conspiracy theorist" on Russia-gate, with no demurral, much less pushback, from the hosts.
The having-done-good-work-in-the-past-and-now-not-so-much Risen can be considered a paradigm
for what has happened to so many Kool-Aid drinking journalists. Jim's transition from
investigative journalist to stenographer is, nonetheless unsettling. Contributing causes? It
appears that the traditional sources within the intelligence agencies, whom Risen was able to
cultivate discreetly in the past, are too
fearful now to even talk to him, lest they get caught by one or two of the myriad
surveillance systems in play.
Those at the top of the relevant agencies, however, are only too happy to provide grist.
Journalists have to make a living, after all. Topic A, of course, is Russian "interference" in
the 2016 election. And, of course, "There can be little doubt" the Russians did it.
"Big Jim" Risen, as he is known, jumped on the bandwagon as soon as he joined The
Intercept , with a fulsome article
on February 17, 2018 titled " Is Donald Trump a Traitor? " Here's an excerpt:
"The evidence that Russia intervened in the election to help Trump win is already
compelling, and it grows stronger by the day.
"There can be little doubt now that Russian intelligence officials were behind an effort
to hack the DNC's computers and steal emails and other information from aides to Hillary
Clinton as a means of damaging her presidential campaign. Russian intelligence also used fake
social media accounts and other tools to create a global echo chamber both for stories about
the emails and for anti-Clinton lies dressed up to look like news.
"To their disgrace, editors and reporters at American news organizations greatly enhanced
the Russian echo chamber, eagerly writing stories about Clinton and the Democratic Party
based on the emails, while showing almost no interest during the presidential campaign in
exactly how those emails came to be disclosed and distributed." (sic)
Poor Jim. He shows himself just as susceptible as virtually all of his fellow corporate
journalists to the epidemic-scale HWHW virus (Hillary Would Have Won) that set in during Nov.
2016 and for which the truth seems to be no cure. From his perch at The Intercept ,
Risen will continue to try to shape the issues. Russiagaters major ally, of course, is the
corporate media which has most Americans pretty much under their thumb.
Incidentally, neither The New York Times, The Washington Post , nor The Wall
Street Journal has printed or posted a word about Judge Mazzant's ruling on the Butowsky
suit.
Mark Twain is said to have warned, "How easy it is to make people believe a lie, and [how]
hard it is to undo that work again!" After three years of "Russia-Russia-Russia" in the
corporate -- and even in some "progressive" -- media, this conditioning will not be easy to
reverse.
Here's how one astute observer with a sense of humor described the situation last week, in a
comment under one of my recent pieces on Consortium News:
" One can write the most thought-out and well documented academic-like essays, articles
and reports and the true believers in Russiagate will dismiss it all with a mere flick of
their wrist. The mockery and scorn directed towards those of us who knew the score from day
one won't relent. They could die and go to heaven and ask god what really happened during
the 2016 election. God would reply to them in no uncertain terms that Putin and the Russians
had absolutely nothing to do with anything in '16, and they'd all throw up their hands and
say, 'aha! So, God's in on this too!' It's the great lie that won't die."
I'm not so sure. It is likely to be a while though before this is over.
Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the
Saviour in inner-city Washington. Ray was a CIA analyst for 27 years; in retirement he
co-founded Veteran Intelligence Professionals for Sanity (VIPS).
You want to start looking at the election laws which favout the Democrat/Republican duopoly.
The democrats are finished as a party of progress since their constitutional change with
super delegates etc. Also consider this analysis
"... Perhaps evidence of direct communication between clapper, brennan, steele, Downer and the British IC in preparation for the attack on the Trump campaign? ..."
"... What if the RussiaGate campaign was planned to go ahead BEFORE the DNC was actually hacked, using faked evidence? What if Seth Rich became aware of this operation and tried to spike it? What if the DNC planned to fake the Russian penetration evidence themselves, but Seth Rich dumped the real stuff? ..."
"... Of course the FBI wasn't allowed to see the actual evidence nor did they request a subpoena to obtain it. ..."
Has it crossed anyone's mind that the reason the FBI weren't allowed to view the DNC servers
was because they would discover evidence of massive DNC illegality in the form of
unattributable clickbait operations and suchlike? Perhaps evidence as well of direct
collusion between the DOJ and IC community to destroy Trumps campaign as well?
Perhaps
evidence of direct communication between clapper, brennan, steele, Downer and the British IC
in preparation for the attack on the Trump campaign?
What if the RussiaGate campaign was planned to go ahead BEFORE the DNC was actually
hacked, using faked evidence? What if Seth Rich became aware of this operation and tried to
spike it? What if the DNC planned to fake the Russian penetration evidence themselves, but
Seth Rich dumped the real stuff?
On the third anniversary of
the release by WikiLeaks of the DNC emails, Ray McGovern looks back at how the DNC diverted the damaging contents
into a trumped up conspiracy blaming Russia with no evidence at all.
T
hree
years ago Monday
WikiLeaks
published a trove of highly embarrassing emails that had been leaked from inside
the Democratic National Committee. As has been the case with every leak revealed by
WikiLeaks
, the emails were
authentic. These particular ones, however, could not have come at a worse time for top Democratic Party officials.
The emails made it
unmistakably clear that the DNC had tipped the scales sharply against Democratic insurgent Bernie Sanders, giving him
a snowball's chance in hell for the nomination. The posting of the DNC emails is also widely seen as having harmed
the the electoral prospects of Hillary Clinton, who could not escape responsibility completely, while a handful of
the very top DNC officials were forced to immediately resign.
Relatively few Americans
read the actual emails, their attention diverted to the incessant media-fostered question: Why Did the Russians Hack
the DNC to Hurt Hillary? For the millions of once enthusiastic Democrats who favored Sanders, however, the disclosure
that the nomination process had been fixed came as a bitter pill, leaving a sour taste in their mouths and a
passive-aggressive reluctance to promote the candidacy of one they considered a usurper. Having had a huge stake in
Bernie's candidacy, they had little trouble seeing through the diversion of attention from the content of the emails.
Clinton Prevails
A mere four days after the
WikiLeaks
release, a well orchestrated Democratic Convention nominated Clinton, while many Sanders supporters
loudly objected. Thus, she began her campaign under a cloud, and as more and more Americans learned of the fraud that
oozed through the DNC email correspondence -- including the rigging of the Democratic primaries -- the cloud grew
larger and darker.
On June 12, 2016, six weeks
before the convention,
WikiLeaks
publisher Julian Assange had
announced
in an interview on British TV, "We have upcoming leaks in relation to Hillary Clinton We have
emails pending publication."
Independent forensic
investigations
demonstrated two years ago that the DNC emails were not hacked over the Internet, but had
been copied onto an external storage device -- probably a thumb drive. Additional work over recent months has yielded
more evidence that the intrusion into the DNC computers was a copy, not a hack, and that it took place on May 23 and
25, 2016.
The DNC almost certainly
knew what had happened -- not only that someone with physical access to DNC computers had copied thousands of emails,
but also which ones they had copied, and thus how prejudicial to the Clinton campaign they would be when they saw the
light of day.
And so, candidate Clinton,
the DNC, and the mainstream media (forever quoting anonymous "current and former intelligence officials") appear to
have colluded, deciding the best defense would be a good offense. No one knew how soon
WikiLeaks
would publish
the emails, but the DNC offense/defense would surely have to be put in place before the convention scheduled to begin
on July 25. That meant there were, at most, six weeks to react. On July 24, about 48 hours after the leaks were
published, and a day before the convention, the DNC first
blamed Russia
for hacking their emails and giving them to
WikiLeaks
to sabotage Clinton.
A Magnificent Diversion
Clinton: Already blaming the Russians at DNC
2016 convention.
(Wikipedia)
Granted, it was a stretch --
and the DNC would have to hire a pliable cybersecurity firm to back up their claim. But they had good reason to
believe
that CrowdStrike would perform that service. It was the best Clinton campaign manager Robbie Mook
and associates could apparently come up with. If they hurried, there would be just enough time to prepare a PR
campaign before the convention and, best of all, there was little doubt that the media could be counted on to support
the effort full bore.
When
WikiLeaks
published
the emails on July 22, 2016, just three days before the Democratic convention, the propagandists were ready to
deflect attention from the damning content of the DNC emails by repeating incessantly that the Russians hacked the
emails and gave them to
WikiLeaks
to hurt Clinton.
It pretty much worked like
a charm. The late Senator John McCain and others were quick to call the Russian "hack" an "an act of war." Evidence?
None. For icing on the cake, then-FBI Director James Comey decided not to seize and inspect the DNC computers. Nor,
as we now know, did Comey even
require
a final report from CrowdStrike.
Eight months after the
convention, in remarks at the Clinton/Podesta Center for American Progress on April 6, 2017, Clinton's PR director,
Jennifer Palmieri, could scarcely contain her pride that, after a difficult start, she was ultimately successful in
keeping the Russian bear front and center.
Transcribed below
(verbatim) are some of Palmieri's more telling
remarks
when asked to
comment, from her insider perspective, on "what was actually going on in late summer/early fall."
" I did appreciate that
for the press to absorb the idea that behind the stage that the Trump campaign was coordinating with Russia to
defeat Hillary Clinton was too fantastic for people to, um, for the press to process, to absorb .
But then
we go back to Brooklyn and heard from the -- mostly our sources were other intelligence, with the press who work in
the intelligence sphere, and that's where we heard things and that's where we learned about the dossier and the
other story lines that were swirling about And along the way the administration started confirming various
pieces of what they were concerned about what Russia was doing.
[Emphasis added.]
"And we did finally get
to the point on October 7, when the administration came out with a very stunning [memorandum]. How stunning it was
for both the Director of National Intelligence and the Director of Homeland Security to put out a statement – a
long statement – that said with high confidence that Russia was interfering in the election and they were also
directing the timing of the leaks. And it named the institutions – WikiLeaks, DC Leaks, and Guccifer – as being
Russian-led, and how stunning that was to be that certain and that public. So I do think that the answer for the
Democrats now in both the House and the Senate is to talk about it more and make it more real ."
And so, the Magnificent
Diversion worked as intended.
Recognizing Liminal Time
But
not all journalists fell for it. Patrick Lawrence (once of
The Nation
, now of
Consortium News
)
was onto the ruse from the start. He says he had "fire in the belly" on the morning of July 25, 2016, the day the
Democratic convention began, and that he dashed off an article "in one long, furious exhale" within 12 hours of when
the media started really pushing the "the Russians-did-it" narrative. The title of his article, pointed out to me a
few months ago by VIPS member Todd Pierce, was "How the DNC fabricated a Russian hacker conspiracy to deflect blame
for its email scandal a disturbing resemblance to Cold War red-baiting."
Lawrence's off-the-cuff
ruminations
, which
Salon
published
the next day are extraordinarily prescient and worth reading in full. He instinctively
recognized the email disclosure-cum-media-obfuscation campaign as a liminal event. Here are some excerpts, reprinted
here with Lawrence's permission:
"Now wait a minute, all
you upper-case "D" Democrats. A flood light suddenly shines on your party apparatus, revealing its grossly corrupt
machinations to fix the primary process and sink the Sanders campaign, and within a day you are on about the evil
Russians having hacked into your computers to sabotage our elections Is this how lowly you rate the intelligence
of American voters?
The Sanders people have
long charged that the DNC has had its fingers on the scale in favor of Hillary Clinton's nomination. The prints
were everywhere Last Friday WikiLeaks published nearly 20,000 DNC email messages providing abundant proof that
Sanders and his staff were right all along. The worst of these, involving senior DNC officers, proposed
Nixon-esque smears having to do with everything from ineptitude within the Sanders campaign to Sanders as a Jew in
name only and an atheist by conviction.
The caker came on
Sunday, when Robby Mook appeared on ABC's "This Week" and CNN's "State of the Union" to assert that the
D.N.C.'s mail was hacked "by the Russians for the purpose of helping Donald Trump." He knows this because
"experts" -- experts he will never name -- have told him so.
the Clinton campaign
now goes for a twofer. Watch as it advances the Russians-did-it thesis on the basis of nothing, then shoots the
messenger, then associates Trump with its own mess -- and, finally, gets to ignore the nature of its transgression
(which any paying-attention person must consider grave). Preposterous, readers. Join me, please, in having
absolutely none of it. There is no "Russian actor" at the bottom of this swamp, to put my position bluntly. You
will never, ever be offered persuasive evidence otherwise.
[Emphasis added.]
Trump, to make this
work, must be blamed for his willingness to negotiate with Moscow. This is now among his sins. Got that? Anyone
who says he will talk to the Russians has transgressed the American code. I am developing nitrogen bends Which
way for a breath of air?"
Sad Sequel
A year later Lawrence was
commissioned by
The Nation
to write an investigative report on the so-called "Russian hack." On August 9,
2017, after he interviewed several Veteran Intelligence Professionals for Sanity, among others,
The Nation
published
his findings in an
article
entitled "A New Report Raises Big Questions About Last Year's DNC Hack." Lawrence wrote, "Former
NSA experts, now members of Veteran Intelligence Professionals for Sanity (VIPS), say it wasn't a hack at all, but a
leak -- an inside job by someone with access to the DNC's system."
Again, Lawrence got it
right -- this time relying less on his own experience and intuition than on applied science as practiced by real
technical experts with no axes to grind. But, sadly, that cut across the grain of the acceptable Russia-gate
narrative, and a furor erupted among Hillary followers still licking their wounds over her loss. It proved simply
too much for them to entertain the notion that Clinton was quite capable, with help from the likes of Mook, to
snatch defeat out of the jaws of victory -- without any help from Vladimir Putin.
Ray McGovern works with
Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. An ex-CIA analyst,
his expertise on Russia goes back a half-century. He prepared and briefed
The President's Daily Brief
for
Presidents Nixon, Ford, and Reagan, and in retirement he co-founded Veteran Intelligence Professionals for Sanity
(VIPS).
If you
value this original article, please consider
making
a donation
to Consortium News so we can bring you more stories like this one.
My comment went in where and landed in the ether. If it does get posted as a reply to Realist I
apologize for the redundancy. Please delete second attempt
Curious
,
July 23, 2019 at 23:31
Test
Carolyn Grassi
,
July 23, 2019 at 23:31
Thanks again Ray for your detailed comprehensive coverage on what may be called The DNC coverup. If
only my progressive left-leaning friends in California could see the light of day on this fiasco of
Russian hacking. Several times I've sent your excellent analysis to these folks, whose only reply is
Silence! Sad really that hatred of Trump and Hillary's loss has blinded them. So like in the McCarthy
era out to get folks and today, of all things, with the help of the intelligence community, they used
to criticize. I wonder what John le Carre would write about the state of affairs in America. Ray, you
have company with Glenn Greenwald and Stephen F. Cohen. I call you Voices in the Wilderness. Keep on
writing, speaking out. The country needs you more than ever! sincere thanks, Carolyn Grassi, Pacifica,
CA
Hawaiiguy
,
July 23, 2019 at 16:28
Still waiting for her indictments to roll in, until I see one for jaywalking I'm in firm belief the
deep state isn't as close to peril as some may think. Heck Jeffrey Epstein is long gone from the media
and he was absolutely the most powerful pedophile walking thr streets. But the Borg is all mighty as
defending silence proves once again.
Meremark
,
July 23, 2019 at 16:10
When the post is the truth, (Mr. McGovern: huzzah, huzzah!), then trolls clog the comments, usually
(as in the present case) with by VOLUME, QUANTITY, arguing against a certain Clear Quality of tone in
the sound of the ring of Truth.
When the post has little or no truth, then comments are few or
self-defeating and the trolls needn't bother fogging the pen and so they don't?
IMO this post seems to have waaaay more comments than usual. hmmmm .
All I can do is shake my head. The 2020 election is on the visible horizon and not only did the actors
who rigged the 2016 election for Donald Trump go unpunished and off the hook, we've allowed them to
grow bigger and better, and we're going to let them do it again.
LIBERAL PROF: Big Tech moved 'rock bottom minimum' of 2.6 million votes to
Hillary in 2016
A liberal professor and "very strong public supporter of Hillary Clinton" is raising the alarms
about Google manipulation of millions of unwitting voters in recent elections, as well as the
potential impact for 2020.
Dr. Robert Epstein, former editor of Psychology Today and acclaimed psychologist who founded the
Cambridge Center for Behavioral Studies, discussed his research before a subcommittee of the Senate
Judiciary Committee on Tuesday, and his testimony was mind-boggling.
"You testified before this committee that Google's manipulation of votes gave at least 2.6
million additional votes to Hillary Clinton in the year 2016. Is that correct?" Sen. Ted Cruz
questioned
SWEET! HOWEVER–>> On my local cable satellite channel Vice channel carried a story all about how the
russians did it.
You folks out there taking VICE at is word are being played, again, by the MSM.
But how sweet it is caught a clinton behaving worse that NIXON, have the repugniklans right where
they belong but alas the dims are still clueless on who to run. So much for our highly touted and
worthless 2 party system.
You cannot make this shit up. And to Bobby Kwasnik I can only say "What in the hell are you
drinking son?"
Hawaiiguy
,
July 23, 2019 at 16:31
Took you long 3nough to figure that out, I did the first time they focused on hot Israeli women in
forces. It's a total zionist rag.
Drew Hunkins
,
July 23, 2019 at 14:14
Great comment.
I especially liked "my late husband and I kept asking: where and when are they going
to actually start discussing the *content* of the emails themselves? Never."
Alas, so true.
Stay strong AnneR. Don't let them get you down.
Dan
,
July 23, 2019 at 12:39
You're putting a lot of faith on former experts who got the DNC forensic evidence , how?
and assume that the evidence was not a breadcrumb left to mislead and implicate Seth Rich.
( In some circumstances the perfect hack would have no traces, but if the data will be leaked, the
leaker would leave behind misleading evidence.)
Its within russian spycraft to leave behind misleading evidence, implicate someone and
have them killed to cover it up.
I have never seen why these experts have done more than fall for it.
don't know, just say'n
Rob Roy
,
July 23, 2019 at 14:31
Proof? Julian Assange said several times I heard him myself .so there you are. The emails were
leaked from inside the DNC, not hacked by the Russians. That's why JA is being killed off and not
allowed any access to the public. BTW, the DNC computers were never examined by the investigators.
Why? The day Hillary said, "Seventeen intelligence agencies .." I knew it was a lie that she would
build on forever. Besides, I know Putin.
David
,
July 23, 2019 at 14:46
You are putting a lot of faith in a dubious private entity in the hire of the DNC. No US legal
authority examined the DNC's server. Crowdstrike, the dubious entity in the pay of the DNC made a
claim that there was a Russian hack but provided no evidence. Not only did they not provide
evidence, we have recently learned that they didn't even generate a report. CrowdSstrike claimed
that it knew it was a Russian hack because they found Cyrillic writing and the name of a former KGB
head. Sounds damned clumsy of the Russians.
William Binney, the former chief technical officer of the NSA was able to determine from the
information that is available that it was technically infeasible for their to have been a hack
originating in Russia. The material was down loaded internally on to a thumb drive. Binney's
assessment corroborates ambassador Graig Muarry's assertion that he received the down loaded
material. Both Maurry and Assange publicly requested that they be interviewed by the FBI. The FBI
chose not to examine the DNC server. Mueller also chose to decline Maurry and Assange's request for
an interview. Mueller stated that "It would have been better to have the FBI forensic experts
examine the server but CrowdStrike is a high class outfit." It decidedly is not. Basing his
conclusions on the claims of a private entity that was far from being a disinterested party is at
best negligent and at worst corrupt. Mueller took extraordinary measures to avoid taking any steps
that could yield a result different from what was claimed in his report.
It gets worst for the believers of Russian interference. A federal judge has threatened
prosecutors with contempt of court making claims against the Russian internet company whose
advertisements were alleged to be efforts to interfered in the US presidential elections that it
has no evidence to support. The "Russian interference" hoax has been exposed.
Andrew Thomas
,
July 23, 2019 at 14:48
Dan, Ray I think if you go back and read everything that Ray was only able to summarize in this
particular post, you will discover that the scenario you outlined just does not fit the known
facts.
EricT
,
July 23, 2019 at 15:24
Misleading evidence being left behind is also within our own intelligence agencies as well. See the
vault 7 releases.
Eddie
,
July 23, 2019 at 11:46
What is overlooked in all these shenanigans is the utter depravity that Mdm. Clinton and her cabal of
fellow psychopaths reached in order obscure their crimes and to seize power. By blaming Russia and
Vladimir Putin for "hacking" into DNC's emails, the Clinton crime family and their useful idiots in
the corporate media increased tensions that could have led to a nuclear holocaust.
Clinton and the
rest of the fetid cesspool that ran her campaign were willing to risk annihilating the planet so that
Clinton could slither in the White House where the gravy train of bribes could flow like the Amazon
River. Meanwhile, the corrupt to its core FBI fixed things so that Mdm. Clinton and her cronies did
not wind up in the gulag that her husband created when he ran the gravy train.
Roland James
,
July 23, 2019 at 11:03
In the Dec 5, 2016 issue of The Nation is a column 'En la Lucha' (The fight continues) by Cesar
Vargas, co-director of the Dream Action Coalition: "I had known that Trump would become president once
it was revealed the Democratic Party had rigged the primary in favor of Hillary Clinton."
Clinton beat Sanders by 3.7 million votes. Sanders has never said that the Democratic primary was
rigged, nor has he questioned the legitimacy of the result. Yes, the DNC was biased in favor of
Clinton, who has been a Democrat her entire adult life, unlike Sanders, an Independent until he wanted
to run for president. ("Progressives who refused to vote for Hillary Clinton in the general election
made a 'bad mistake'."-Noam Chomsky. // In a 50R/50D country with a winner-take-all system, 3rd party
candidates are the marginal difference. Especially this year in Wi, Mi and Pa.) More below**
My central concern over the last couple of decades has been the Global Climate Crisis, which will
likely swamp everything else; the CO2 "bullets" from the Big American Way of Life are already causing
death and destruction around the world. In 2015, though i was a Sanders supporter, i was worried that
Sanders would 'sow the wind' but likely wouldn't win the Democratic primary. Then many of his
energized supporters wouldn't support the Democratic nominee with their votes and/or with their
poisonous and conspiratorial rhetoric adding to the Clinton pile-on led by the right wing hate
machine. Therefore, the country and the whole world would 'reap the whirlwind' with 'climate change is
a hoax' Donald Trump, accelerating the race to catastrophe.
Roland James
** "The infamous hack of DNC emails that "proved" the organization had its thumb on the scale for
Clinton? Perhaps nothing has been more frustrating for people in the politics business to address,
because the conspiracy is based on ignorance. Almost every email that set off the "rigged" accusations
was from May 2016. (One was in late April; I'll address that below.)
Even in the most ridiculous of dream worlds, Sanders could not have possibly won the nomination after
May 3 -- at that point, he needed 984 more pledged delegates, but there were only 933 available in the
remaining contests. And political pros could tell by the delegate math that the race was over on April
19, since a victory would require him to win almost every single delegate after that, something no
rational person could believe. Sanders voters proclaimed that superdelegates, elected officials and
party regulars who controlled thousands of votes, could flip their support and instead vote for the
candidate with the fewest votes.
In other words, they wanted the party to overthrow the will of the majority of voters.
That Sanders fans were wishing for an establishment overthrow of the electorate more common in banana
republics or dictatorships is obscene. (One side note: Sanders supporters also made a big deal out of
the fact that many of the superdelegates had expressed support for Clinton early in the campaign. They
did the same thing in 2008, then switched to Obama when he won the most pledged delegates. Same thing
would have happened with Sanders if he had persuaded more people to vote for him.)
This is important because it shows Sanders supporters were tricked into believing a false narrative.
Once only one candidate can win the nomination, of course the DNC gets to work on that person's
behalf. Of course emails from that time would reflect support for the person who would clearly be the
nominee. And given that their jobs are to elect Democrats, of course DNC officials were annoyed that
Sanders would not tell his followers he could not possibly be the nominee. Battling for the sake of
battling gave his supporters a false belief that they could still win -- something that added to their
increasingly embittered feelings.
According to a Western European intelligence source, Russian hackers, using a series of go-betweens,
transmitted the DNC emails to WikiLeaks with the intent of having them released on the verge of the
Democratic Convention in hopes of sowing chaos. And that's what happened -- just a couple of days before
Democrats gathered in Philadelphia, the emails came out, and suddenly the media was loaded with
stories about trauma in the party. Crews of Russian propagandists -- working through an array of Twitter
accounts and websites, started spreading the story that the DNC had stolen the election from Sanders.
(An analysis provided to Newsweek by independent internet and computer specialists using a series of
algorithms show that this kind of propaganda, using the same words, went from Russian disinformation
sources [like duran] to comment sections on more than 200 sites catering to liberals, conservatives,
white supremacists, nutritionists and an amazing assortment of other interest groups.)
The fact that the dates of the most controversial emails -- May 3, May 4, May 5, May 9, May 16, May 17,
May 18, May 21 -- were after it was impossible for Sanders to win was almost never mentioned, and was
certainly ignored by the propagandists trying to sell the "primaries were rigged" narrative. (Yes, one
of them said something inappropriate about his religious beliefs. So a guy inside the DNC was a jerk;
that didn't change the outcome.) Two other emails -- one from April 24 and May 1 -- were statements of fact.
In the first, responding to Sanders saying he would push for a contested convention (even though he
would not have the delegates to do so), a DNC official wrote, "So much for a traditional presumptive
nominee." Yeah, no kidding. The second stated that Sanders didn't know what the DNC's job actually
was -- which he didn't, apparently because he had not ever been a Democrat before his run.
Bottom line: The "scandalous" DNC emails were hacked by people working with the Kremlin, then
misrepresented online by Russian propagandists to gullible fools who never checked the dates of the
documents. And the media, which in the flurry of breathless stories about the emails would
occasionally mention that they were all dated after any rational person knew the nomination was
Clinton's, fed into the misinformation.In the real world, here is what happened: Clinton got 16.9
million votes in the primaries, compared with 13.2 million for Sanders. The rules were never changed
to stop him, even though Sanders supporters started calling for them to be changed as his losses piled
up."-Kurt Eichenwald
AnneR
,
July 23, 2019 at 14:07
Would you by chance be a Dem shill? You certainly seem to be acting as such.
Russia (by which every Dem seems to mean "the Kremlin" "Putin") did *not* interfere in that
election for or against the Strumpet, for or against HRC. Talk about "misinformation"!
So now you (and your ilk?) are blaming Sanders' supporters??
So far as I'm aware the neither the DNC (bought by the Clintons) nor HRC herself ever pointed
the finger at Bernie's supporters or Bernie himself as culpable of the story you've come up with.
Andrew Thomas
,
July 23, 2019 at 15:00
You guys never give up, do you? If there is any actual "evidence" of a Russian, or for that matter
any other "hack" that comes out tomorrow, I will be utterly amazed and happy to come back to this
page to apologize. There will not be any. Mueller may try to suggest that it exists somewhere in
the "redactions." But that will be bullshit.
Trump and Clinton were the 2 most hated candidates in US history and Hillary even picked TRUMP .
with the help of the MSNBC and CNN both in the bag for Clinton,that helped give Trump 6 BILLION in
free airtime
and MSNBC fired Ed Shultz fro wanting to cover Sanders ..but that not tampering in election
right?
Americans' Distaste For Both Trump And Clinton Is Record-Breaking
No past candidate comes close to Clinton, and especially Trump, in terms of engendering strong
dislike a little more than six months before the election.
Hillary Clinton is more unpopular than Donald Trump. Let that sink in
"Donald Trump is one of the least popular politicians in the history of the United States. Yet,
Trump is still more popular than Hillary Clinton. Let that sink in.
According to the latest Bloomberg National Poll, Trump has a net favorability of 41% whereas
Clinton has a net favorability of 39%. If Democrats are to escape the political wilderness, they
will have to leave Clinton and her brand of politics in the woods. "
There was plenty of fraud during the nomination process My parents waited in line for 6 hrs in
AZ because they closed 90% of the polling places in Maricopa country and people had their parties
changed from Democrat to republican.Even employees in the state house.
Roland, you'll never convince me that Hillary Clinton was preferable to Donald Trump. Both were the
product of scraping the bottom of the U.S political barrel, but Trump was never the war-monger that
war criminal Hillary Clinton blatantly was and is. Since even Trump was equivocal about his
willingness to use military force, neither one was qualified to be president in my book. I do not
vote for war criminals or war criminal wannabes. (I've personally experienced war.) You have to be
a Peace candidate to cross my threshold of eligibility. Maybe you are different, eager to have more
blood on your hands. But do you realize that the U.S. has killed some 20 million foreign people
since World War II ended? Do you feel no responsibility for that when you choose for whom to vote?
As for your Russia-Gate B.S., you are visiting the web site that has done more to prove that
Russia-Gate has no basis in reality than any other. To begin your encounter with Russia-Gate
reality, I recommend the following Google search query:
So, in summary, Brennan, Comey, Clinton, etc. didn't accept the lawful election results, and decided
to just lie, like it's nothing, in order to -- in fact -- try to suspend American democracy, start an
extremely lucrative -- for some -- second cold war with Russia as the chosen and needed "enemy", and give
the power back to the deep state and war profiteers. Simple as that.
So, in summary, Brennan, Comey, Clinton, etc. didn't accept the lawful election results, and decided
to just lie, like it's nothing, in order to -- in fact -- try to suspend American democracy and give the
power back to the deep state and war profiteers. Simple as that.
jmg
,
July 23, 2019 at 16:35
Sorry, duplicate post. You can delete this one, thank you.
Perry Logan
,
July 23, 2019 at 07:19
"A forensic report claiming to show that a Democratic National Committee insider, not Russia, stole
files from the DNC is full of holes, say cybersecurity experts.
"In short, the theory is flawed," said FireEye's John Hultquist, director of intelligence analysis
at FireEye, a firm that provides forensic analysis and other cybersecurity services."
Perry, why do you think the FBI chose not to use its own forensic experts? Why would Mueller base
his highly inflammatory claims exclusively the of statements made by a private company that was
hired by the DNC, a dubious entity that asserts it failed to even generate a report outlining it's
conclusions? Why did the FBI decline the requests of Ambassador Maurry and Julian Assange for an
interview? The fact is, Mueller failed to produce anything that a reasonable person would define as
evidence. For some people, the lack of evidence does not matter. They are certain in the way that
religious believers are certain.
Mueller worked assiduously to minimize the risk that he would
find evidence that contradicted the result he intended to provide when he undertook his
"investigation."
Realist
,
July 23, 2019 at 05:04
.
Marko
,
July 23, 2019 at 01:37
I smell a rat in the Hersh / Butowsky saga. Apparently there was a second phone call between Hersh and
Butowsky, after the initial one that was so revealing , and which Butowsky wisely recorded. In the
second call – not recorded as far we know – Hersh informs Butowsky that Andrew McCabe was his "Deep
Throat" in the FBI , who fed him the info and/or documents. This looks like a poison pill to me , one
that Hersh went along with either willingly ( more likely – so as to save his own skin ) , or
unwillingly as a useful idiot (unlikely – Hersh isn't that dumb ).
The idea that McCabe was a "White
Hat" feeding Hersh the info saying that Aaron and Seth Rich were the DNC leakers is laughable , and I
think it's quite likely that Isikoff and/or Hersh will use this poison pill to paint Butowsky ( and ,
by extension , Ty Clevenger , his attorney) as conspiracy cranks. All Hersh has to do is say " Look ,
I fed this guy a bunch of crap , and he scarfed it up. Only a complete nutjob could believe that
McCabe was my source. "
The first , recorded , call may have been all true , or it could have been a set-up from the
beginning. I suspect the former. My guess is someone got to Hersh between the first and second call
and suggested that he better remove himself from the battlefield , lest something unfortunate happen.
The McCabe "poison pill' was his getaway ticket , and he was happy to use it.
Hersh appears to be throwing Butowsky under the bus , and Isikoff will describe the resulting
carnage with glee.
Marko you raise several interesting issues about Hersh's role in all this, but it is hard to say
what it might actually be without having a transcript of the second phone call with Butowsky. Does
such a transcript exist? Or are you going on some other source?
Rob Roy
,
July 23, 2019 at 14:47
Marko, first of all, Sy Hersh doesn't "throw people under the bus." Never. Second, he's the purist
of all journalists. If you think otherwise, you don't know the man, a reporter of whom no other has
higher standards in his profession.
geeyp
,
July 22, 2019 at 23:57
The DNC literally did shoot the messenger in my opinion. Innocent until proven guilty, I know. Hillary
Clinton and her underlings need to ask for forgiveness from many, many people in this country. One of
the saddest historical footnotes in our history. She is such a pant load.
I also want to say how much I enjoyed the comments on this and Ray's previous articles. Evidently
Consortium readers are an intelligent, clever, and sardonic bunch!!
Another very fine article, Ray!! The simple truth of this sordid matter is finally going to get a
hearing I believe. As for me, who like you and a few others, especially Patrick Lawrence, Glen
Greenwald, Aaron Mate and Caitlin Johnstone, could smell the bullshit all the way from the chicken
coup from the git-go, I can't wait to sit back, pour myself a nice Guiness in a tall glass, and watch
Mr. Mueller fumble around nervously attempting to deal with all of the pointed questions from angry
Dems who will be accusing him of not lying enough on behalf of their Russiagate ghost! Anyway, great
work, as usual, Ray!!
Just between us, I only drink on even-numbered days.*** So -- for me, at
least -- it was GREAT news that the Mueller testimony would be tomorrow, the 24th, and not the 17th
as formerly scheduled. Tomorrow will be a two-Guinness day. My tall glass is crystal-clean and the
Guinness is already hidden away in the back of the refrigerator.
I cannot recall ever having had lower expectations from Congressional hearings, but it is, I
suppose, always possible that something instructive might inadvertently escape. If so, I am
confident the Guinness will be more help than hindrance as muse to any writing I might undertake at
that point.
Ray
*** Re the even-numbered days: It's a self-imposed discipline -- a sensible way of coping with my
problem of liking "the creature " (as one of my Irish grandmothers called it) far too much.
Slainte!
Bill
,
July 22, 2019 at 22:07
What did Obama know and when did he know it?
Realist
,
July 23, 2019 at 05:01
Obama knew he was sandbagging the Russians to set them up as all-purpose fall guys later when he
spoke to Medvedev about his "flexibility" of action in foreign policy prior to the 2012 election.
(First I'll get re-elected, then we'll have a "reset," you'll bend over backwards to accommodate
me, and you guys will never know what hit you when I deliver the sucker punch.) In fact, it started
long before that conversation.
As soon as he was elected every action he took was against Russian
interests or to besmirch their reputation in the public arena, even as Putin took several actions
to save Obama's hide, such as giving him the opportunity to duck his rash "red line" statements on
Syria when it was clear neither the American people nor the Congress wanted this country in another
middle eastern war. Putin also bent over backwards to accommodate American sanctions against Iran
in its phony crusade against Iran's non-existent nuclear weapons program.
He rolled Putin on anti-ballistic missile deployments in Romania and Poland, after Dubya had
stuck the shiv in by "withdrawing" from the ABM treaty (otherwise known as breaking your word).
He, under the influence of Hitlery, lied to Putin about his true intentions to overthrow and
assassinate Gaddaffi rather than simply protect some poor civilians caught between the gunsights of
the "evil dictator" and the "brave freedom fighters" defending Benghazi, aka the head choppers from
al Qaeda (or whatever their nom du jour). Springtime for Hitlery and al Nusra, winter for Gaddaffi
and Libya. This is what happens to suckers who believe anything Washington says.
He and Hitlery set Victoria Nuland and John McCain loose on Ukraine where their minions
overthrew the elected government in a bloody coup on the Maidan. Because he wasn't going to be
fooled again, Putin acted quickly to preserve critical Russian interests (i.e., their only
warm-water naval base and access to the Mediterranean in Crimea). Putin refrained from intervening
on the side of the Russian population in the Donbass, nor did he entertain their pleas for
annexation by Russia, though he got blamed for these things all the same by Obomber's propaganda
machine.
Obama knew definitively that it was Ukraine that shot down the Malaysian passenger plane with a
Buk missile, yet he suppressed all evidence of such in the kangaroo court that was held to smear
Russia for this terrible event. In fact, I wouldn't put it past his den of spook advisors to have
actually had a hand in Ukraine's actions, just as they had in the Maidan. Why does the president of
Malaysia believe this? And why were they, the owners of the aircraft, not allowed to participate in
the investigation? Just as Russia, which did have significant evidence to present, was not allowed
any role in the process, while Ukraine was given a free hand to withhold and manipulate data?
Bigger hoax here than the JFK, RFK, and MLK assassinations rolled into one.
Obama's propaganda machine repeatedly blamed Syria for using chemical weapons against civilians,
and as a pretext for American involvement in the armed conflict on the side of his mercenary
headchoppers, when he knew damned well Syria had no such weapons because the American navy had
incinerated them after Assad turned them over via the agreement brokered by the Russians. Always
more deception and betrayal directed against Putin and Russia. Are we seeing a pattern that started
long before Hitlery masterminded "Russiagate" in the wake of the Wikileaks revelations?
Obama often used John Kerry in the many bait and switch ruses used against Putin and Assad.
Putin lobbied hard both in Washington and at the UN for an alliance with the American backstabbers
to contain "Isis/Daesh/al Nusra/ al Qaeda" terrorists within Syria. How many times did Putin and
Assad think they had a deal, a carefully defined ceasefire, only to have the Syrian army strafed
and decimated by American air forces long before the ink dried on the worthless agreements?
Who put the Turks up to downing the Russian fighter bomber as it approached, but didn't cross,
the Turkish border? Cui bono? How did that help Turkey? Rather, whose agenda did it actually help?
What did Hitlery promise but to escalate that tactic a hundred-fold with the irresponsible "no fly"
zone she proposed as part of her foreign policy during the campaign? No doubt that reckless rush to
start World War III took a lot of votes away from the witch.
Who helped the internal opposition inside of Turkey to organize the unsuccessful coup against
Erdogan? Sure wasn't Putin who apparently saved the guy's life by warning him of more Washington
skullduggery. If the Washington Deep State wants to blame someone for Erdogan's purchase of the
Russian S-400 missiles defense system and his very fortunate escape from being saddled with that
gigantic F-35 contract, blame Obomber and Hitlery for their ill-conceived strikes against foreign
leaders. They both need to go back and re-read "the Prince" for comprehension.
I'm sure I'm forgetting most of the outrages and provocations that Obama and Madame President
Clinton directed at Putin and Russia (which actual President Trump mindlessly continues). But the
point is that this very virulent and focussed anti-Russian movement was hard core policy of the
nominally-ruling Democrats from the day they received the baton from Dubya Bush. Obama continued it
long after the catastrophic election that Hitlery lost. He continued it till the day Trump was
inaugurated, stridently blaming the Russians for stealing the election from Hitlery and punishing
them with massive diplomatic expulsions during the height of the holidays and the seizure of
millions of dollars worth of uncompensated properties.
All without one iota of proof. Ever. Just like the ever-growing snowball of anti-Russian
economic sanctions that Obama, and now Trump with the enthusiastic participation of Congress,
started immediately after the coup in Ukraine never had a justifiable foundation and will seemingly
never end. How could I nearly have forgotten the sanctions? I guess they get lost in the enormous
mass of other groundless actions taken against Russia by Obomber and his muse Hitler. I wonder,
will he be proud that he made it all possible if the nuclear-tipped missiles do start flying? Words
do not describe how I have come to loathe that deceiving traitor to every principle he ran for
office on.
Carry on, Mr. McGovern. I don't know how you can maintain the spirit to face the arduous task of
trying to uncover all these depredations every day whilst the perpetrators work overtime trying to
deceive and mislead you and other truth-seekers. It must be a stunning experience (not a joyful
one) whenever you are able to turn over a relevant rock to expose the vile creatures underneath.
Get them, Ray, get them all, before they take down the world in their pursuit of MIC profits and
every last resource offered by the planet.
Rob Roy
,
July 23, 2019 at 14:54
Marko, first of all, Sy Hersh doesn't "throw people under the bus." Never. Second, he's the
purist of all journalists. If you think otherwise, you don't know the man, a reporter of whom no
other has higher standards in his profession.
Rob Roy
,
July 23, 2019 at 14:58
Wonderful commentary, Realist, per usual. You speak for me.
One caveat..according to an investigation by a German aeronautical engineer, a BUK didn't take
down the airplane it was shot down from the air by another aircraft, not a Russian one.
He offers extensive proof.
Realist
,
July 23, 2019 at 16:50
Yes, I'm familiar with that possibility. Either could be correct. I didn't want to become too
verbose and picayune. We'd need the actual data that Washington and the EU are suppressing to
zero in on the truth. The only hypothesis that ought to be discarded upon cursory inspection
is that Russia deliberately shot that plane down. That's as crazy as the claim that Putin
invaded Ukraine to seize the Donbass. You'd have to assume he loves unnecessary and expensive
quagmires the way the conflict has unfolded, when his troops could have occupied Kiev within
48 hours if he did invade. Quagmires are the hallmark of American military actions. Inquiring
minds want to know why the Ukie pilot of the jet fighter prowling the vicinity at the time of
the shoot-down never testified and later committed suicide. Parsimony says to me: guilty
conscience.
Nearly forgot Obama's incendiary goodbye kiss to Putin when he promised
retaliatory American action against Russia, perhaps in the form of a cyber attack "at a time
and place of our choosing," for its alleged theft of the presidential election. Putin had too
much character to use that threat as a constant all-purpose foil against never-ending
American provocations. He simply moved on, always trying to improve relations, which some
observers, such as PCR, feel is a mistake.
Thanks for the input, RR.
Anonymot
,
July 23, 2019 at 16:47
Essentially I agree with you, but even you are still riding the surface details. I've been
writing for over a decade about this, but since I'm neither a journalist, politician or
celebrity, no one pay much attention. That makes me a conspiracy theorist with all of its
negative connotations. I'm not that either. Suffice it to say that I'm an American who has lived
and worked in many places in the world and politics, domestic and international are a pet
passion that I've followed for decades.
Obama and Hillary's anti-Russia drive has its roots in
pre-WW II anti-communism when many significant capitalists were friends and financiers of
Nazi-Germany. After the war the Dulles brothers took over all American foreign policy as
Secretary of State and Director of the CIA. They were joined by many Senators from Joe McCarthy
to Sen. Prescott Bush. No one else had the ear of Truman, Eisenhower, Kennedy and Johnson on
foreign matters other than State and the CIA with the CIA having information to whisper deeper
than State's. That's why we went in to lose Korea, , the Bay of Pigs, and Vietnam. Losses all,
they still generates massive profits for the MIC and installed that state of mind throughout the
DC bureaucracy. Then came Prescott's son, the CIA in person.
It is my personal assessment, having worked in Arkansas when Clinton was Governor and
corruption was just part of the landscape, that the powers of the day had little trouble
convincing Bill that he could become very, very wealthy if he just left foreign policy decisions
to them and role played. They were right. And when Prescott's grandson, George, was mature
enough, he stepped in with his extreme right wing crowd, ready to install regime changes
everywhere.
After Bush, when a zebra with Democrat stripes could have won given the catastrophe of baby
Bush, I am perfectly convinced that they sought two different minority figures, a woman obsessed
by the idea of wealth and fame and very pro- a certain kind of feminism, plus a man who desired
wealth, but also had the cause of the blacks to promote. "The loser at the DNC Convention will
be President after the winner serves his or her term(s), but the foreign policy is ours and you
will enunciate it." Bingo.
Hillary lost because she was unbelievably inept at lying and covering her double-tongued role
with Democrats' speeches and Wall Street speeches. She also clearly didn't know anything about
foreign affairs despite her flying all over the world for photo ops that gave the impression she
did.
When Assange exposed her professional ineptitude and implied he had more (that might include
her personal affairs,) who had the anti-Putin idea of returning to the Cold War? It certainly
wasn't the well spoken, but ill-informed Hillary. It was classic intelligence agency.
And she lost to a different kind of mad person who thinks walking a tightrope is good foreign
policy no matter what the risk. The mindset of the MIC and intelligence agencies have almost got
him under control after 2 1/2 years, but the Democrats, still ruled by the Clinton crowd are so
inept that we may end up crowded between a Trump win in 2020 or a straightforward coup d'etat.
Realist, one of your best of the best comments.
Not only did the Nobel Peace winner gladly get involved in the Ukraine coup with 'Victory'
Nuland, but they had to do it during Russia's shining moment to the world, the Winter Olympics
in Sochi. What arrogance. And, when Obama said about Russia, "well, they don't make anything" my
blood curdled.
You make another good point about the tragic downed airliner. Why send the black boxes to the
UK? All we heard was 'there was nothing of interest in them', Right. We know Putin was flying
back from Brazil that day and with the skill level shown by Ukraine these past few years, they
could have mixed up planes. It's hard to say.
And then to have the USB lead the investigation (as Robert reported) with the Netherlands
(and the Aussies. Again, why?) when it was reported the USB were the very organization that went
to all the ATC towers and confiscated the recording tapes? Russia sent the raw radar data to the
investigation team in the Netherlands and they came back with the retort "we can't read them"
Russia offered technical experts to help and this was ignored, as was the 2 tests done by the
makers of the Buks, Almez-Antey proving the blast pattern was an old model no longer in Russias'
inventory but in Ukraines. And they get away with all this crap?
One last thought: Putin heads a country that has 11 time zones, and we have 3. Why do so many
people think he is just sitting around twiddling his thumbs trying to upset a US election? And
he raised a good point when he said, at that time the House and the Senate were Republican
controlled. Did he do that too?
He sees the US invalidating international agreements left and right, causing more and more
military activity on his borders because of NATO needing an enemy to stay relevant, not to
mention the increased funding of course, which is many times more than his own military funding.
Why meddle in an election? He has enough on his plate with all his ethic issues, and now the
encroachment on his borders by the 'good guys with guns and missiles'.
The US population has become more provincial and ethnocentric than I have ever witnessed and
most of them don't know how large Russia is. It's a wonderful country.
Because of US ignorance about Russia it's almost as if they perceive it as a little country
where Putin has all the time in the world to play games, instead of his real purpose. Which is
now to protect his country from the US/NATO military propaganda machine and its hardware
surrounding his country. This must take up all of his time, but the ignorant still think he has
time to meddle in the corrupt US election system.
It's foolishness to the core. Only Mueller and his ilk have that kind of time and tax money to
screw around with wasted time.
Annie
,
July 22, 2019 at 21:58
Immediately after the leak Robbie Mook immediately said the Russians did it, and I remember thinking
how does he know, and saw it as ridiculous, laughable. I was a Sanders supporter, and I knew the
Democratic party who is known to side lines their liberals wanted him gone from the beginning. MSNBC
helped a lot, since throughout his campaign they would often refer to him as an old curmudgeon.
mbob
,
July 22, 2019 at 21:49
"Thus, she began her campaign under a cloud, and as more and more Americans learned of the fraud that
oozed through the DNC email correspondence -- including the rigging of the Democratic primaries -- the
cloud grew larger and darker."
Dear Ray,
The most detailed description of how the DNC rigged the primary process -- and the evidence in favor
of it -- is in "Democracy Lost: A Report on the Fatally Flawed 2016 Democratic Primaries." (You can
find it on the web.) It's independent of Wikileaks.
It provides at least 6 different sources of evidence supporting its allegation of DNC rigging. [1]
Direct voter suppression that disproportionately affected Sanders. [2] Registration tampering (with
photocopies of altered ballots.) [3] Inaccurate voting machine counts favoring Clinton (Clinton
received unaccountably more votes in precincts using the most "hackable" machines. In all states,
Clinton performed best on machines that don't leave a paper trail.) [4] Exit poll discrepancies of a
unprecedented amount, which did not occur in Republican primaries held on the same day! [5] Eyewitness
caucus abuses, as in Iowa and Nevada. [6] DNC collusion with media to smear Sanders.
It states that the combined effects of the rigging was more than enough to have thrown the
nomination to Clinton.
I've never seen any debunking of this report which (at least superficially, appears sound and) was
written by credible authors.
But, on the other hand, I've seen no independent validation of the report by anyone, including
Consortium News.
Do you know anything about it?
Yours
mbob
John Drake
,
July 22, 2019 at 21:46
Way to go Ray. I find the comment about " Is this how lowly you rate the intelligence of American
voters" interesting because it is so accurate-the lowly bit that is. With the assistance (collusion)
of the MSM the whole sordid scam has become the dominant paradigm, especially as liberals grasp at the
American tradition of red baiting (even though those former reds are devout capitalists) to find
sketchy ways of ousting Trumpenfuhrer. Unfortunately these efforts are by passing his more real faults
and making the Democrats looking like fools and sore losers. Now he can play the" oh poor me I am
being picked on game."
The Clinton family has done tremendous damage to our nation, from financial deregulation, the bombing
of Yugoslavia and Libya, influence peddling and fixing the election among many other sins.
Litchfield
,
July 23, 2019 at 11:51
Agree.
Only an idiot could think that trying to bring Trump down by, basically, bringing false charges
against him was a good long-term strategy. Of course, they t hought the strategy only had to be
short-term, until Hillary won the election, became president, and could then really deliver the
corpse of Trump.
But some on the "left" are still hewing to this concept that Trump is so bad
that Mueller must be right about *something.* They still do not get that this false accusation has
*helped* Trump, not hurt him. Meanwhile he has gotten away with murder in another part of the
forest.
These smart folks are so stupid.
Jeff Harrison
,
July 22, 2019 at 20:40
Thank you, Ray for a very good summary and thank you also for highlighting how shabbily The Nation
treated Patrick after he gave them some very fine work. Now all we need is for people who write the
narrative in the MSM to start telling the truth and that would be a neat trick.
Gary Steinberg
,
July 23, 2019 at 05:54
Once one sells his soul, he doesn't get it back And today, Brenner and Crapper work for MSM. RT
probably more reality-based than CNN. This news coup is more than 50 years in the making and has
taken quite a toll on the state of the American mind. So, quite a trick,
indeed.
Through all this, the media never focused on the emails themselves, at least to any real extent.
Whether the information became available through a hack or download seems a minor issue that someone
is deliberately trying to right the election of the president of the United States.
If for example,
the worst sort of person fingered an actual murderer, would you ignore the murderer and go after the
person who fingered them. It could only be accomplished if those who had the power to do that actually
conspired to do it.
M. McGovern does an excellent job in the article making clear what happened. But was it really
important, at least as important, that the evil Russians did or did not do it. An objective observer
would be grateful that someone or some agency bought the information to light.
Of on top of it all is the gross hypocrisy surrounding the issue. We make Russia look like pikers
when it comes to interference and comparing parties that interfere with our elections, do we really
want to focus only on Russia?
AboutWhich
,
July 23, 2019 at 11:30
Heman, I'm surprised no one has attempted to respond to your two comments. They are both inane.
Trolling are you?
As for Tulsi, she left the DNC way before these leaked emails, and for the same reason as what
they exposed but which DEM-Americans ignored. What does her leaving say about her? That she's not
easily duped. Honest truth-seekers usually aren't.
All this resulting in the Seth Rich murder cover up, even Donna Brazille is still disturbed by the
Seth Rich murder, but no one else in Washington DC is permitted to even remember the Seth Rich murder.
This cover up turned into an excuse for losing the election, and immediately after the election it was
the outline