Softpanorama

Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
May the source be with you, but remember the KISS principle ;-)
Bigger doesn't imply better. Bigger often is a sign of obesity, of lost control, of overcomplexity, of cancerous cells

False flag operations in cyberspace

Can Cozy Bear and Fancy Bear be codewords for false flag operation using Vault 7 tools?

News Vault 7 scandal Recommended Links DNC and Podesta emails leak and  subsequent false flag operation to  blame Vladimir Putin FBI and CIA contractor Crowdstrike and DNC leak saga Steele dossier "Seventeen agencies" memo about Russian influence on elections
Amorality and criminality of neoliberal elite History of American False Flag Operations False flag operations as an important part of demonization of the enemy strategy Nunes FISA Memo scandal Brennan elections machinations Strzok-gate Wiretaps of Trump and his associates during Presidential elections
"Seventeen agencies" memo about Russian influence on elections Is national security state in the USA gone rogue ?   Audacious Oligarchy and "Democracy for Winners" The Iron Law of Oligarchy   James "We are not weasels" Comey role in depriving Sanders of a chance to lead the Democratic ticket
Nation under attack meme Predator state Andrew McCabe Clapper role in putsch FBI contractor Fusion GPS Seth Rich murder FBI Mayberry Machiavellians
Edward Snowden as Symbol of resistance to National Security State Corporatism Media-Military-Industrial Complex Corporate Media: Journalism In the Service of the Powerful Few The Real War on Reality Manifactured consent Humor

Introduction: Cyberspace an ideal medium for False Flag operations

Cyberspace present an ideal medium for false flag operations. British intelligence have probably the world most sophisticated specialists in false flag operations. And history of false flag operations is going back to emperor Nero (A Fake False Flag Hoover Institution)

The burning of Rome by Nero, which he blamed on the Christians; the forging of the Zinoviev Letter in 1924 by elements connected to MI5 in order to discredit the Labour party during the 1924 British general election; the Mukden Incident in which Japanese saboteurs created a pretext for the invasion of China in 1931, and the Gleiwitz incident in which the SS faked an attack on Germany by Poland in September 1939. Unlike the World’s Fair, all these were genuine False Flag incidents.

It is clear the  CIA uses hacks for false flag operations and has tools that do just that -- imitate malware from a particular state or some hacker group, while performing the hack themselves. Then blaming the target of this false flag operation. False flag operation in cyberspace are much easier then with material object as there are more possibilities to hide the trace.  And  use accomplices for the "investigation" if the hack occurred on the USA or allies territory.

And it is clear that  this can be very powerful tool by which CIA and other agencies have a veto power of any politician:

On the other hand, combine “Umbrage” with the seemingly invincible false narrative that President Donald Trump is a tool of Russian interests, and plenty of Americans would be willing to believe Trump really does have substantial ties to the Kremlin, something that has not been proven. Even now there is still no publicly available evidence the Trump campaign somehow colluded with the Russian government last year. Sources in newspaper articles are never identified. All that exists is the alleged say-so of faceless CIA spooks and people like former CIA employee and would-be presidential spoiler Evan McMullin whose motives are questionable.

In other words any politician who is considered to be a threat to intelligence agencies can be easily blackmailed and possibly politically destroyed using well crafted falsifications of their connection with suitable for the particular case foreign power with the ample evidence planted via false flag operations.

For example, what if Crowdstrike planted worms, or other signs of Russian intrusion to hide the fact that this hack was actually a leak (download of tenails to a UCB drive by an insider, possible Seth Rich), and then attributed their falsified, planted findings to "evil Russian hackers" in an attempt to to create a smoke screen that district form content of the emails which reveals that Hillary stooges in DNC (and  DNC in general what completely was under control Hillary operatives)  to derail Sanders and ensure Hillary victory in Democratic primaries.

A fake attack from Russia could also have been easily organized to solidify the evidence as foreign intelligence agencies consider Russian hacking "community" as one of the most lucrative sources of information, email leaks,  and blackmail of Russian officials (see Shaltai Boltai hacking group story below.)  And if Russians are for some reason are not available there are always Estonians, Latvian and Ukrainians or Georgians who would happily lend a helping hand pretending to be Russians and operating from Russian IP space. I sometimes wonder, if what is called "black web" represents the playground for intelligence agencies to a larger extent than for criminal hackers.  Perfect for demonization of a "strategic competitor" -- you can attribute to the "bad guys" of anything your want. Hacking Presidential election in favor of Trump  -- yes of cause. Attempt to hack voting machines (which are not connected to Internet) more difficult but also possible.

In other words to organize false flag operation in cyberspace is a "no-brainer." And to trace it and distinguish flag flag operation from a real attack is very difficult as at the time you get to the computers and able to analyze them the horse already left the barn (and to add insult to injury eliminated or planted false trances of the attack).  And even if you monitoring services pick up some suspicious activities in real time how to tell if this is a real of false flag if, for example botnets can be used for sophisticated set of redirections which even NSA might not be able to trace (especially if the guys who do it are from NSA ;-)

Add to this tremendous capabilities of intelligence services to subvert and exploit security tools installed (such as Kaspersky, or MacAfee, of Microsoft Security Services) and the situation looks completly hopeless.  Cyberspace is and will remain a paradise for false flag operations.

 Cyberspace is and will remain a paradise for false flag operations. Perfect for demonization of a "strategic competitor" -- you can attribute to the "bad guys" of anything your want. Hacking Presidential election in favor of Trump  -- yes of cause. Attempt to hack voting machines (which are not connected to Internet) -- more difficult, but also possible ;-).

In cyberspace all signs of the attack such as IP address, language and codepages used during compilation of binaries, timestamps can be forged. False identities can be constructed to "validate" planted narrative (Guccifer 2.0 might be one such example ) and used for nefarious purposes.

Mysterious Shaltai Boltai Russian hacking group
which specialized is stealing documents and emails from Russian officials as well as forgeries

It you want a really dirty twisted tech/IT environment you can join one of hacker groups. Who manipulates whom in such groups is not clear at all but  intelligence agencies are not passive observers of the hacking scheme. They are active participants.

There was a mysterious hacking group in Russia active in 2014-2016 which was known under nickname of Shaltai Boltai (Russian name for Humpty-Dumpty -- a character in Alice's Adventures in Wonderland and Through the Looking Glass ). There were some indication that the group might have been controlled by foreign  intelligence services via a mole in Russian FSB. Three persons including him were charged by Russian authorities with treason  (Russian Lawyer Says FSB Officers, Kaspersky Manager Charged With Treason )

There has been no public detail as to the nature of the treason charges against Mikhailov, Dokuchayev, and Stoyanov. The Interfax news agency on January 31 quoted "sources familiar with the situation" as saying that Mikhailov and Dokuchayev were suspected of relaying confidential information to the U.S. Central Intelligence Agency (CIA).

Pavlov told RFE/RL the individuals were suspected of passing on classified information to U.S. intelligence, but not necessarily the CIA.

"We have no information about the CIA" in the matter, he said.

Most members were arrested in a period from October 2016 (Vladimit Anikeev) to January 2017 (Shaltai-Boltai's leader arrested by the FSB Crime RusLetter). So the group was operational all the  period of US elections.

Later the head of the group got two year prison sentence.

After a two-day trial conducted behind closed doors, the Moscow City Court on Thursday sentenced Vladimir Anikeyev, the head of a hacking group that the authorities cracked down on last winter, to two years in a penal colony.

The state prosecutor had asked for a sentence of two and a half years.

Mr. Anikeyev, a former journalist who led a collective known as Shaltai Boltai — Humpty Dumpty — until his arrest last November, admitted his guilt in illegally gaining access to the private data of a number of targets, including high-ranking officials, businessmen and journalists, according to Russian news reports.

His cooperation with law enforcement made a swift trial possible, but the involvement of classified information meant it was closed to the public.

Among those whose email inboxes and mobile phones are said to have been penetrated are Natalya Timakova, the spokeswoman for Dmitri A. Medvedev, the prime minister and former president; Arkady Dvorkovich, a deputy prime minister; Andrei Belousov, an adviser to President Vladimir V. Putin and a former minister of economic development; and Dmitri Kiselyev, the Russian government’s chief propagandist.

Some of the information obtained by Shaltai Boltai was auctioned online. Emails stolen from Mrs. Timakova, for instance, netted Mr. Anikeyev’s team 150 bitcoins. Other information was used to blackmail officials, who had to pay Shaltai Boltai to keep it confidential.

As Guardian noted (Russian hacking group's 'last member at liberty' comes out of the shadows World news The Guardian):

Shaltai-Boltai, or Humpty Dumpty, terrorised Russian officials for three years, combining hacking, leaking and extortion

Not much know about their activities (Wikipedia) or the personalities of People who were charged with treason (three members of this group).  Ther central figure among those three was Sergei Mikhailov, who was the deputy director of FSB's Center for Information Security  

Mr. Mikhailov’s possible ties to Shaltai Boltai emerged in Russian news reports. Other Russian news outlets reported a competing theory for the intelligence officer’s arrest: that he had passed to the F.B.I. secrets about Russia’s government-backed hacking programs, helping in the investigation of Russian meddling in the presidential election.

Along with regular hacking groups activities (Surkov leaks Thousands of hacked emails allegedly from high-ranking Kremlin official published online t) hey also specialized on forgery of official documents in such a way as to inflict  maximum damage to the Russian  state.  One of the goal of the group was " working for foreign intelligence agencies to promote the myth of Russian cyber crime." :

Anonymous International is a hacking group known for leaking Russian government information and personal documents of government officials. They target high-ranking members of the government, large corporations, and media, and sell the stolen data. These actions are publicized on their blog, Shaltai Boltai, (Шалтай-Болтай, Russian for "Humpty Dumpty"), the name by which the group is also known.[1][2] Over a period of 15 months the group published information about Russian politicians on 75 separate occasions.

In October 2016, Vladimir Anikeev (Владимир Аникеев), known under the handle of "Lewis," considered the group's leader, was arrested and charged with unlawful access to computer information. In addition to Anikeev, five more people were detained, among them one of the leaders of the FSB's Information Security Center, Sergei Mikhailov, and his deputy Dmitry Dokuchaev, as well as Ruslan Stoyanov, the former head of Kaspersky Lab's Computer Incident Investigation Department.

=== from Mikhailov case - Wikipedia =====================================================================================

In December 2016, officers of the CIS FSB Sergey Mikhailov, Dmitry Dokuchaev, head of the cybercrime investigation department of Kaspersky Lab Ruslan Stoyanov, and Georgy Fomchenkov were arrested for treason. After that, the largest international media published information according to which the case of Aeroflot was again in the news, because based on the new data, the real reason for the prosecution of Vrublevsky was his investigation materials against Mikhailov and the rest of those arrested as long back as in 2010 on the basis of which he privately accused the a group of individuals working for foreign intelligence agencies to promote the myth of Russian cyber crime. Ultimately, this group of people was able to successfully fabricate the case against Vrublevsky himself. In this case, in 2016 was shed light on the early investigation of Vrublevsky and Mikhailov's group was arrested by the Self Security Unit of the FSB of Russia.[28][29][30]

In January 2017, it became known that the head of the site "Humpty Dumpty", journalist Vladimir Anikeev, also known as the "Anonymous International", who hacked the mail of Russian businessmen and high-ranking officials, was detained shortly before the arrest of FSB officers. In January, Rosbalt told about the circumstances of the capture of Anikeev: the FSB detained him in October 2016, and later, according to his testimony, high-ranking FSB officers Dmitry Dokuchayev and his boss Sergey Mikhailov were arrested. They were accused of state treason and cooperation with the CIA.

In February 2017, Reuters reported that the case of a state treason in the FSB was due to Vrublevsky's testimony from 2010.[31]

In March 2017, the US Department of Justice announces the involvement of Sergei Mikhailov and Dmitry Dokuchaev in the hacking of 500 million Yahoo mail accounts.[32]

In the same month, information is published that the accusation in the state treason is directly related to the transfer of data on the activities of Pavel Vrublevsky to foreign special services back in 2010. In response to the arrests of the US, they accused a number of the same FSB officers (Dokuchaev) of cybercrime and announced them on the international wanted list, posting their photos on the FBI website, which resulted in a complete rupture of cooperation between the United States and Russia on cybercrime.

On June 12, 2017, a significant part of the documents on the Mikhailov case was sealed with a "secret" stamp, Rosbalt reported, citing an informed source.[33]

Rafia Shaikh in her Jan 26, 2017 article (Wccftech) notes that "the accusation of Mikhailov tipping US officials is huge, which, if true, would mean that the US had employed spies right in the Kremlin’s cybersecurity center."

Regardless of Fomenko’s connection with Russian security agencies or election hackers, the accusation of Mikhailov tipping US officials is huge, which, if true, would mean that the US had employed spies right in the Kremlin’s cybersecurity center.

In a separate report, it was also suggested that Mikhailov could be a member of the hacker collective “Anonymous International” known in Russia as “Shaltai Boltai”. Anonymous International has on various occasions leaked private emails and other data to embarrass public Russian figures, but none of these leaks have ever resulted in any arrests since the content of these revelations is more “embarrassing than criminal,” Moscow Times added.

Reportedly the second-most senior figure in the Center for Information Security at the FSB, Mikhailov is also responsible for operating Cozy Bear, another APT (Advanced Persistent Threat) group. His arrest is being called as the highest-profile case within the Russian security agency since the breakup of the Soviet Union.

What the Arrest of the Russian Intel top Cyber-Crime Expert Has to Do With American elections — The Bell

Sergei Mikhailov  was arrested one year ago, on Dec. 5, 2016. Officers of the agency’s internal security division seized him at his office and led him away with a sack over his head. Mikhailov is a black belt in karate and the officers feared that he might resist, explained one of the colonel’s acquaintances.

Prior to his arrest, Mikhailov was head of the 2nd Directorate of the FSB’s Information Security Center (TsIB) and within Russian intelligence circles he was considered the main authority on cybercrime.

Now he and three other men —  Dmitry Dokuchayev, an FSB major and former criminal hacker, accused in the U.S. of hacking 500 million Yahoo! accounts in 2014;  Ruslan Stoyanov, a former Kaspersky Lab employee; and  Georgy Fomchenkov, a little-known internet entrepreneur — are suspected of state treason. The four are being held in Moscow’s high-security Lefortovo Prison

Was Shaltai Boltai gang controlled by foreign intelligence  services which used it to frame Russia?

Members of Shaltai-Boltai hacking gang have admitted to forging some parts of the correspondence that they hacked. The putative aim was to boost the profile of their group.

Reading between the lines of this, we can hypothesize that Shaltay-Boltay were indeed not hackers in a conventional sense. They were traders in an illicit information economy, including fabricating that information with possible input or at the request of foreign intelligence agencies (of course, for solid remuneration).

This most prominent adherent  of this hypothesis is Scott Humor (A Brief History of the "Kremlin Trolls",   thesaker.is, Oct 15, 2017)

Saint Petersburg, Savushkina, 55 is the most famous office building in the world, thanks to the relentless promotion of the United States government, the CIA, FBI, and by the powers of the entire Western media, financed by Western governments. VOA, NPR, and Svoboda, by the government of the US; the BBC by the government of the UK; CNN by the governments of Saudi Arabia; the DW, by the government of Germany; and so on and so forth. You name it, they all punched time to promote this office building.

To be specific, it's not even a building, but several adjoined buildings that cover an entire city block, an urban development plan common for Saint Pete's. That's why every business here has the address of Savushkina, 55 followed by a building number. You can take a virtual tour around it, to see for yourself. The buildings are shared by several dozens of private businesses, by the local Police department, and by the newsrooms of half a dozen Russia Media sources like the FAN (Federal News Agency), the Neva News (Nevskie Novosti), Political Russia, Kharkov News Agency, publishing Ukrainian news, and others. They all are privately owned and operated and generate over 55 million unique visitors per month. Overall, several thousand people come to this building to work every morning. But you wouldn't know this by account of Western media. For over two years now, these people are being harassed and collectively branded as "THE KREMLIN TROLLS."

The building is very popular because it's located in a quiet historical neighborhood and is in walking distance from a suburban train station. It's newly renovated offices offer open floor plans with Scandinavian fleur so very appreciated by the news people. In addition, the rent for this building is less than in center city. Which is why Evgeny Zubarev, a former top editor for the RIA NEWS, choose it for his media startup. He took several offices allowing him to manage his growing media giant without wasting time to commute. Now, the FAN newsroom alone employs about 300 journalists.

This wasn't always the case.

At the beginning of 2014, the building was still under construction and renovation, when an anti-Russian government group of hackers called first "The Anonymous International" and latter "Shaltay-B0ltay" fingered it as the "Kremlin trolls' layer."

Their wordpress blog is still here. It was last updated on November 2016. Its title states: "Anonymous International. Shaltay Boltay/Press Secretary of the group. Creating reality and giving meaning to words."

November 7, 2014, Khodorkovsky, who acted as an integral part of the CIA "Kremlin trolls" Project, tweeted the picture of one of the entrances to one of the buildings saying: "Savuchkina 55. New home for bots. ID check system. Not a sign there. I won't say who took the photo."

... ... ...

The phone number on the picture 324-56-06 belongs to the commercial real estate company Praktis Consulting & Brokerage that managed the rent of offices.

Midsummer 2014, Evgeny Zubarev with his start up and several hundred journalists moved in, along with the Police department, and a slew of other businesses people. Little did they know what was to come.

The best way to get information is to make it up.

Everything what we know now about the so-called "Kremlin trolls from the Internet Research Agency paid by Putin's favorite chef," came from one source, a group of CIA spies that used the mascot of Shaltay-Boltay, or Humpty-Dumpty, for their collective online persona.

They were arrested in November 2016 and revealed as the FSB and former FSB officers . One of them even managed a security department for the Kaspersky Lab. They all were people highly skilled and educated in manipulating and creating large online databases, in any online research imagined, and the knowledge of hacking and altering databases, including those that were run by the Russian government. They weren't poor people. They weren't there for the money. They were ideologically driven. Their hatred towards Russia and its people was the motive for their actions.

At some point, Gazeta.ru, an online Russophobic publication, suggested that " Shaltai-Boltai was just a distraction meant to confuse everybody." They themselves were more concise by stating that they were working to change the reality.

Russian authorities, the courts, and the lawyers, refused to call these men hackers. There was a reason for this. They weren't so much hackers in a classic sense, as in when someone gains access to real information and copies it. This group wasn't necessarily hacking existing information, but planting information. They were creating files about fake nonexistent companies and employees, files with blurry fake paystubs, memos, emails, phone messages and so on. The fakes looked convincing, but they still were forgeries that could be easy disproved for someone who had access to the real information.

That's when the hacking took place, when the FSB agents went into government databases and created records of people and companies that didn't exist.

I think that part of the reasons why some of them got the mild sentences of three years in general security prison, and some were left free, wasn't just the fact that they agreed to collaborate with the Russian government, but also the fact that they didn't actually steal information from government officials like Medvedev and his press secretary, Nataliya Timakova, or the owner of the largest in Europe catering business, Evgeny Prigozhin. They made information up and claimed that it was real.

These guys gave a bad name to all hackers, whistleblowers, leakers and spies. Now, journalists presented with some "hacked" and leaked secrets has to think it over, less they end up with an egg on their face like journos from the Fontanka, Vedomosti and Novaya Gazeta in case of the "Kremlin's trolls."

If we accept that the Shaltay-Boltay group was working to create and distribute documents they forged, claiming that those files were "hacked," we would also understand a mysterious statement made by them to BuzzFeed.

"In email correspondence with BuzzFeed , a representative of the group claimed they were "not hackers in the classical sense."

"We are trying to change reality. Reality has indeed begun to change as a result of the appearance of our information in public ," wrote the representative, whose email account is named Shaltai Boltai, which is the Russian for tragic nursery rhyme hero Humpty Dumpty."

Bazzfeed also said back in 2014, that " The leak from the Internet Research Agency is the first time specific comments under news articles can be directly traced to a Russian campaign." Now, this is a very important grave mark.

Just think about this working scheme: Shaltay-Boltay with a group of anti-government "activists" created the "Internet Research Agency," they and some "activists" created 470 FaceBook accounts used to post comments that looked unmistakably "trollish."

After that other, CIA affiliated entities, like the entire Western Media, claimed the "Russian interference in the US election." Finally, the ODNI published a report lacking any evidence in it.

The link to their report is here, but I don't recommend you to read it. You will gain as much information by reading this report as you would by chewing on some wet newspaper. Ask my dog for details.

Assessing Russian Activities and Intentions in Recent US Elections

https://www.dni.gov/files/documents/ICA_2017_01.pdf

Only three paragraphs is interesting on the page 4:

"Russia used trolls as well as RT as part of its influence efforts to denigrate Secretary Clinton. This effort amplified stories on scandals about Secretary Clinton and the role of WikiLeaks in the election campaign.

The likely financier of the so-called Internet Research Agency of professional trolls located in Saint Petersburg is a close Putin ally with ties to Russian intelligence.

A journalist who is a leading expert on the Internet Research Agency claimed that some social media accounts that appear to be tied to Russia's professional trolls -- because they previously were devoted to supporting Russian actions in Ukraine -- started to advocate for President-elect Trump as early as December 2015."

In other words, in its report with a subtitle: "Background to "Assessing Russian Activities and Intentions in Recent US Elections": The Analytic Process and Cyber Incident Attribution" the Office of the Director of National Intelligence ODNI, is quoting the Shaltay-Boltay, a group that had been proved to work for the CIA by "creating reality."

The only reason why they don't provide us with evidence, with at least one lousy IP address with the Russian trace roots that would convincingly point at the company named the Internet Research Agency, is because this company never existed, it never had any IP addresses assigned to it that would be verifiable via third parties like RIPE network coordination and via online domain tools.

We understand that having hundreds of people working ten to twelve hours a day, as they claimed, posting hundreds messages hourly, would use huge amount of bandwidth. They would need a very fast internet connection with unlimited bandwidth that only a business can get. Inevitably, this internet connection would come with the assigned IP addresses. No internet provider would let this kind of bandwidth hog to create this kind traffic without being forced to separate them from other customers.

One example, a woman with the last name Malcheva filed a lawsuit in court against the companies "Internet Research, LLC" and "TEKA, LLC," claiming unpaid wages.

The court asked her to produce evidence of her work, and then denied her claim after she produced a photo of a computer with an IP address on its screen as evidence of her employment.

An IP address that was assigned to a luxury hotel in Saint-Petersburg. A hotel that was awarded multiple international awards for excellence. An immensely popular hotel among discriminating travelers. A very expensive hotel located in the center of a historic city. The woman claimed that she was an "online troll' working from this location ten hours a day with hundreds of other virtual trolls. The judge didn't believe her. Would you?

People from the Shaltay-Boltay group weren't hackers in the proper terms because they worked with and for the CIA. Middle-of the-road and run-of-the-mill intelligence agencies would collect and analyze information for their governments. The CIA invents information, then goes on to manufacture and forge documents in support of their invented information; they then recruit people inside other countries and other governments to claim that they "obtained" this explosive evidence. Being the dirty cops that they are, the CIA doesn't obtain and secure evidence, but instead they plant fake evidence on their victims.

By this act alone they change our current and past reality, and they change our future. They change our history by forging never existing "proof" of invented myths. They hire and train groups of military men to act as "protesters" around government buildings, while other military men from other countries shoot at unsuspected bystanders whose death allows Washington to claim the sovereign governments' wrongdoing.

CIA-operated groups arrest and kill government officials or force them to flee, like in Ukraine. They take over a couple of government buildings and declare their victory over a huge country, just like it happened in Russia in 1991 and 1993 and in Ukraine in 2005 and 2014. For some reason, they claim that governments are those people who take over a couple of buildings in one city. When in fact, our countries' governments are those people whose names we wrote on ballots, regardless of where these people are located. We don't run around like chickens with our heads cut off electing a new president every time our current president leaves the country.

Going back to the CIA's Humpty-Dumpty project that came online sometime in 2013. Why would anyone name their enterprise after such predictable failure, you might ask. Because, in the Russian alliteration, Shalti-Boltai means "shake up and brag about it" and not as in its original Carroll's version of "humping and dumping."

I went ballistic after someone retweeted me this CNN clip titled "Russia used Pokemon Go to interfere with the US elections."

I actually listened to the clip itself, in which they brought up the Internet Research Agency" from SP. Knowing full well that the hackers who "leaked" the information about this "Agency" were arrested and successfully charged for treason because they worked for the CIA should prevent the CIA to run fake news about the entities and people they themselves made up. You would think that the matter of the "Kremlin trolls from Saint Petersburg" should be dead and buried after the arrest. The CIA and other 16 intelligence agencies should know better than to use information that is being known now as "discovered' with their "help."

Because it's all fake and we know it.

We also know everything that the CIA touches is fake. Speaking in layman's term, it's as if all those middle aged bald guys would start licking their balls while claiming to be in fulfilling relations. If it's just you, guys, there is no relations. It's just you. Deal with it!

The American intelligence community cannot claim an existence of threats against America if all fingers in those "threats" are pointing back at the American intelligence community.

By stating that someone interfered with the US election using the Internet Research Agency in SP, is plainly to state that it's CIA that interfered in the American elections.

 

What Nunes memo tells us about  cyberspace false flag operations and the use by intelligence agencies of US neoliberal MSM to create an arbitrary witch hunt

Everybody understood that the system is pretty well rigged on federal level and there two levels of justice -- one for neoliberal "masters of the universe" who are by-and-large above the law, and another for shmucks.  That's not a news.  The news is the level of sophistication is escaping the changes and use of the accusation of hacking  falsified via false flag operation as a new smokescreen to pass the blame to selected scapegoat.

Here we see very successful efforts to unleash Neo-McCarthyism campaign and put all the blame for Hillary defeat on Russians, which later was extended into the color revolution against Trump of falsified changed of Russia collision. Few people understand the US MSM is just a propaganda department of the US intelligence agencies and do their bidding. The fact that at some point CIA controlled major journalists was known from Church commission hearings. And there was some backlash. But now the situation reversed and due to the regime to total surveillance their capability to dictate the agenda far exceed the level that was in the past.

moreover, now CIA cyberwarriors can cook any accusation using their "technical capabilities" and spread is using subservant MSM in a matter of days creating the wave of hate which  far exceed what was described in famous dystopian novel 1984 by George Orwell.  Refuting those "cooked" intrusions (which are a new and very nasty form of false flag operations) is difficult what when (and if) it is done, typically it is too late. As Hermann Goering said (Hermann Goering War Games):

“Of course the people don’t want war. But after all, it’s the leaders of the country who determine the policy, and it’s always a simple matter to drag the people along whether it’s a democracy, a fascist dictatorship, or a parliament, or a communist dictatorship. Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is tell them they are being attacked, and denounce the pacifists for lack of patriotism, and exposing the country to greater danger.”

— Herman Goering at the Nuremberg trials

... ... ...

His comments were made privately to Gustave Gilbert, a German-speaking American intelligence officer and psychologist who was granted free access by the Allies to all the prisoners held in the Nuremberg jail. Gilbert kept a journal of his observations of the proceedings and his conversations with the prisoners, which he later published in the book Nuremberg Diary. The quote offered above was part of a conversation Gilbert held with a dejected Hermann Goering in his cell on the evening of 18 April 1946, as the trials were halted for a three-day Easter recess.

Paradoxically while the value of cyberspace for offensive operations against adversaries is unclear, it is clear that it has tremendous potential for conducting false flag operations serving as a pretext for real wars, or some "Show trials" of dissidents in best Stalin traditions. and witch hunt against Trump is a just form of Show Trials in a court of public opinion.

Everything can be forged in cyberspace -- source of attack, attack methods. Fake personalities like Guccifer 2.0 can be created to support the accusations.  Sky is the limit for false flag operations in cyberspace.  Steele dossier in this sense is old school falsification. It is "DNC hack" that is the harbinger of things to come.

Sky is the limit for false flag operations in cyberspace.  Steele dossier in this sense is old school falsification. It is "DNC hack" that is the harbinger of things to come.

We may feel uneasy by the idea that people now could be so easily manipulated into sacrificing themselves in wars at the whims of the neoliberal elite, but perhaps we can be more concerned (and maybe even scared) at the thought that the capabilities to deceive us are now greater not less that it was before. Much greater. They now really can create "artificial reality" using MSM.

In any case capabilities of intelligence agencies to hatch and then inject into MSM "DNC hack style disinformation" to blackmail a major political figure using a "cyberspace" false flag operation are now enormous. Even POTUS can be the target of such blackmail.  In this sense the current Russiagate hysteria makes Joseph McCartney like a pretty uninventive, even somewhat dull guy with very limited capabilities to frame his victims ;-) Recently even Nunes was accused (with impunity) to be a Russian agent.   This is "communists under each bed" type of witch hunt on a new level.

Now we know that Russiagate was initially the criminal plot to exonerate Hillary and derail Sanders campaign hatched by intelligence community in cooperation with connected members of Clinton campaign like John Podesta (who as a former WH chief of staff has deep connections to "intelligence community".)  Intelligence agencies and journalists connected with intelligence services were recruited and the well planned obfuscation campaign started. which later morphed into color regulation against Trump (typical for color revolution charges of rigged election were replaced by accusation of "collision" with foreign power.)  All this  was done with full cooperation and eager participation of NYT, WaPo, CNN. MSNBC and other neoliberal outlets. As the result in May 2016 a Special Prosecutor was appointed to take care of Trump removal. 

Sanders did not have the courage to switch to alternative Open Convention to get a nomination from Democratic Party. He was so aftraid (or was threatened, the meaning of his visit with Obama is not known) that he chose to betray his voters and support Hillary. So with the help of neoliberal MSM a brazen plot to exonerate Hillary Clinton from a clear violation of the law (with regard to the way she handled classified information with her private email server; absolutely a crime, absolutely a felony) did succeed.  In this  sense Russiagate is in reality FBI-gate. 

It is an established fact that Comey and the senior DOJ officials conducted a fake criminal investigation of Hillary Clinton. Following none of the regular rules, gave her every break in the book, immunized all kinds of people, allowed the destruction of evidence, no grand jury, no subpoenas, no search warrant. That was not an investigation, that was a Potemkin village. It was a farce.

DOJ should convene grand jury to indict the major players (whose in high positions in DOJ and FBI should be fired). If like torturers in Bush II era  will not be  brought to justice this is just another sign that the USA is neither a republic not a democracy.

Unfortunately Trump while a good tactician, is not strategic thinker on any level. He might have some courage which allowed him to fire Comey, and then tell that truth to American people that this firing is about "Russiagate".  But you need more that courage to take on "deep state". You need to have a plan.  You need to have a coalition.  And we do not  know if Trump was threatened or not (see Chuck Schumer remark above.) He should address the nation from Oval Office and tell that FBI story can only be believed by people with IQ below 70.  And that DOJ should immediately appoint a Special Prosecutor investigating  this matter. But this will most probably just a fantasy.

Summarizing we can say that "FISA memo" is a testimony of tremendous personal courage of Nunes (note that one neoliberal MSM jerk already accused him being a Russian spy).  He did tremendous job driven by noble motives of restoring justice. And his memo undermined the  Color revolution against Trump by making Mueller position more vulnerable as he is clearly a member of the gang of FBI Mayberry Machiavellians. It also put Rosenstein into defensive position.  But this is an uphill battle and he might lose at the end of the date. The neoliberal swamp is way too powerful and can consume even such courageous people as Nunes. 

From Snowden revelations to Vault 7

One year ago, most people on either side of Atlantic had scant or no knowledge of the NSA and its activities. Edward Snowden’s revelations changed all that and rocked one of the pillars of transatlantic relations.  It proved that the USA (as well as its ally Israel, which probably enjoys high level of cooperation) has sophisticated program of weaponizing worms and other malware.  this is very similar to the way biological weapns are produced. You kate something from "natural habitats" and modifies it for specific purposes to be more dealy, less detctable and such. like is the case with biological weapons such an activity should be prohibited, but currently it is not.

But NSA was not the only player in development weapons for cyberspace. CIA, which is rumored to be highly envious of NSA elected status brought by universal Internet connectivity and importance of electronic communication,  has an independent program to produce similar weapons as well. Which is easy as both agencies are effectivly out of control of civil government and can spend allocated funds "as they wish".

the net result of this activity eventually was leaks and parts of this leak were published WikiLeaks as so called "Vault 7". Vault 7 is a series of documents that WikiLeaks started publishing on 7 March 2017. 

The most important among those revelations was that CIA cultivated capabilities for false flag operations in cyberspace. Actually cyberspace is an ideal space for false flag operation and using such unscrupulous middleman as Crowdstrike you can both the plant the worm or other traces and later "discover" it.  So two competing rivals were developing a set of sophisticated cyber weapons (and Stuxnet was really a new generation of malware opening  new turn in the this cyberweapns race0 , but CIA collection has a twist  -- its focus of attribution of cyber attack to other party (CIA Capable of Cyber 'False Flag' to Blame Russia):

As Wikileaks notes, the UMBRAGE group and its related projects allow the CIA to misdirect the attribution of cyber attacks by “leaving behind the ‘fingerprints’ of the very groups that the attack techniques were stolen from.”

In other words, the CIA’s sophisticated hacking tools all have a “signature” marking them as originating from the agency. In order to avoid arousing suspicion as to the true extent of its covert cyber operations, the CIA has employed UMBRAGE’s techniques in order to create signatures that allow multiple attacks to be attributed to various entities – instead of the real point of origin at the CIA – while also increasing its total number of attack types.

Other parts of the release similarly focus on avoiding the attribution of cyberattacks or malware infestations to the CIA during forensic reviews of such attacks. In a document titled “Development Tradecraft DOs and DON’Ts,” hackers and code writers are warned “DO NOT leave data in a binary file that demonstrates CIA, U.S. [government] or its witting partner companies’ involvement in the creation or use of the binary/tool.” It then states that “attribution of binary/tool/etc. by an adversary can cause irreversible impacts to past, present and future U.S. [government] operations and equities.”

While a major motivating factor in the CIA’s use of UMBRAGE is to cover it tracks, events over the past few months suggest that UMBRAGE may have been used for other, more nefarious purposes. After the outcome of the 2016 U.S. presidential election shocked many within the U.S. political establishment and corporate-owned media, the CIA emerged claiming that Russia mounted a “covert intelligence operation” to help Donald Trump edge out his rival Hillary Clinton.

Prior to the election, Clinton’s campaign had also accused Russia of being behind the leak of John Podesta’s emails, as well as the emails of employees of the Democratic National Committee (DNC).

Last December, Director of National Intelligence James Clapper – a man known for lying under oath about NSA surveillance – briefed senators in a closed-door meeting where he described findings on Russian government “hacks and other interference” in the election.

Following the meeting, Rep. Adam Schiff (D-CA), a ranking member of the House Intelligence Committee, remarked: “After many briefings by our intelligence community, it is clear to me that the Russians hacked our democratic institutions and sought to interfere in our elections and sow discord.”

Incidentally, the U.S. intelligence community’s assertions that Russia used cyber-attacks to interfere with the election overshadowed reports that the U.S. government had actually been responsible for several hacking attempts that targeted state election systems. For instance, the state of Georgia reported numerous hacking attempts on its election agencies’ networks, nearly all of which were traced back to the U.S. Department of Homeland Security.

Now that the CIA has been shown to not only have the capability but also the express intention of replacing the “fingerprint” of cyber-attacks it conducts with those of another state actor, the CIA’s alleged evidence that Russia hacked the U.S. election – or anything else for that matter – is immediately suspect. There is no longer any way to determine if the CIA’s proof of Russian hacks on U.S. infrastructure is legitimate, as it could very well be a “false flag” attack.

Given that accusations of Russian government cyber-attacks also coincide with a historic low in diplomatic relations between Russia and the U.S., the CIA’s long history of using covert means to justify hostile actions against foreign powers – typically in the name of national security – once again seems to be in play.

We can now talk about global cyber war unleashed by the USA after year 2000. It already has three stages:

  1. Stuxnet discovery (2010) and Flame revelations (2012). Those worms were pretty complex creation which were clearly stated by state actors. They are typically attributed to the NSA (although Israel may also participated in the development in some role). At this point (2010) the technologies used in Stuxnet and Flame became public knowledge and  the trust toward the US producer of hardware  was undermined.
  2. Edward Snowden revelations (2013) signify the  round two this Global Cyberwar. As the  result the confidence in Google, Microsoft, Yahoo, Amazon, etc was undermined (many companies prohibited employees to use Facebook) and in government sector completely disappeared. That also changed behaviour of both US friends and "adversaries" (which are few states which does not want to accept the USA dictat).  The level of damage Snowden did to the USA "intelligence complex" should be underestimated. There was a huge fallout. For example Obama personally and his administration did lost moral high ground. From this point Obama generally looks more like an employee of a three letter agency (specifically as Brennan subordinate)  rather then the President of the country.  Public was really alarmed and became somewhat paranoid. As one commenter stated: "it's easy to poke fun at the Snowden affair from many angles, but I, for one, do not like the idea of any Agency anywhere, governmental or private, reading my e-mails and monitoring my calls. "

    There was angry voices:

    Peter Schaar, Germany's freedom of information commissioner, told Reuters he wanted "clarity" from the United States "regarding these monstrous allegations of total monitoring of various telecommunications and Internet services." Another German official has called for a boycott of the companies. German Chancellor Angela Merkel, who is running for reelection, has said she will raise the issue with Obama this week either at Lough Erne or in Berlin.

    "The most upset party in all of this, I think, is the Germans," said Michael J. Geary, an assistant professor at Maastricht University in the Netherlands and an expert on Europe. "The Germans were the most snooped-upon country, apparently, in March. In a country where memories of the former East German Stasi are still quite fresh, the response has been quite critical." Geary described Europeans as "peeved" and "quite annoyed" at the U.S. actions and said they have the potential to set back sensitive trade negotiations and do damage to transatlantic relations. "It's a major PR disaster for the administration," he said. "Now, they have really lost the moral high ground."

  3. Wikileaks Vault 7 release (2017). It was not the initial release, just the most publicized case. At this point the cat was already out of the bag for a long time.  Now with  CIA tools available on  the Internet we can talk about the third phase of this global Cyberwar.  One of the most  damaging  revelations ws that CIA has tools to create cyber attacks under the false flag. It also became clea that CIA’s secret hacking division had produced malware and other means of hacking iPhones, Android phones, Samsung Smart TVs. As well as some popular encrypted apps like WhatsApp, Signal, and Telegram. All of them were also targeted. At some point CIA lost control of their whole arsenal of highly advanced hacking tools and malware and it became its travel first of "dark Internet" and  then on "grey. ".  at this point cat was out of the  bag and other government start paying serious attention both to cyber-defense and cyber offence. This is not only a gross, malignant incompetence.

In other word the USA unleashed three stages of global cyberwar and which now endanger its own infrastructure. So by by virtue of its own actions the USA became much less secure and now  it is tremendously more difficult to protect the infrastructure from intrusions, which became more sophisticated. To the  great joy of all those snake oil security solutions salesmen like Crowdstrike. 

So a lot of "security parasites" got access to serious money, imitating previous ISS "achievements" on the new level (with the same dream of being bought by somebody big before some spectacular failure of their products).

One  of first signs of this damages are talks that DNC was hacked specifically to conceal Seth Rich or somebody else leak and then this hack was malignantly attributed to Russians using  greedy and  biased Crowdstrike cyber warriors  which performed the attribution (while details are secret, Crowdstrike attribution of DNC hack to Russians (which FBI took at face value; a very usual step). BTW the level of hype over Crowstrike products does reminds me days of ISS glory ;-). Probably they are the same type of greedy and unscrupulous security parasites ready for money to do anything. Both  can sell for money their own mother. 

More about Vault 7

CIA surveillance and hacking tools not eroded transatlantic trust but also reveals internal political struggle within intelligence CIA, with some forces consider CIA too dangerous and out of control and ready to risk their life to cut CIA influence.  As was with Snowden revelations this is another game changer:

When the Guardian started reporting on the largest disclosure of secret NSA files in the history of the agency in June, it was only a question of time before the information spill reached America's allies overseas. That's because the NSA's prime duty is to monitor and collect global signals intelligence. The agency is by law prohibited from conducting electronic surveillance on Americans except under special circumstances.

In the Guardian's first story on how the NSA was collecting the metadata of phone calls from Verizon, a major US carrier, it was clear that data of European citizens would be involved, since the NSA's secret court order included all calls made from and to the US.

But it was the second scoop on the NSA's PRISM program that really blew the story wide open. It revealed that the agency was siphoning off personal data like email, chats and photos from the world's biggest Internet companies including Google, Microsoft, Apple and Yahoo.

This also reveals the real danger of modern smartphones and PC.  Smartphones now are pretty powerful computer in  their own right and the fact the vulnerabilities are literally planted into popular operating system and applications caused public outrage. It also might speed up balkanization of Internet, started after Snowden revelations, as foreign countries now clearly want to control information flows from and to thier country. so far only China totally control those flows. 

How it will affect US manufactures of hardware, especially PC and smartphone we can only guess.

Here are direct quotes from WikiLeaks describing Vault 7 (Heavy.com)

By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5,000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other “weaponized” malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its ‘own NSA’ with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified. In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.”

These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

WikiLeaks continued.

The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis. ‘Year Zero’ documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.”

WikiLeaks redacted and anonimized some of the information before releasing it, including CIA targets throughout the U.S. and the world. Here are just some highlights about how the hacks worked, according to WikiLeaks:

Because the CIA kept the vulnerabilities hidden, even after they were exposed, WikiLeaks said this put the population at large at risk, including members of the U.S. government, Congress, top CEOs, and engineers. Without letting Apple and Google know about their vulnerabilities, the companies had no means to fix the hacks after they leaked.

According to WikiLeaks, an archive with the malware and other exploits was being circulated for at least a year and only fraction of it was given to WikiLeaks by an unnamed source..

Antivirus Hack Details

So what are some of the takeways from this? There are many. But essentially, because the CIA was targeting Android devices, iOS devices, Smart TVs, and even Microsoft and Mac OSX and Linus systems, it seems that almost anything is vulnerable — especially any device that has microphone and is camera-equipped and connects to the Internet. These seem to be the biggest targets.

And antivirus systems really won’t stop them. According to WikiLeaks, “CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance.” Some of the antivirus and security programs that they may have found defeats or workaround for included (Note: It’s unclear if these were all bypassed, because some files were redacted by WikiLeaks):

They even discussed how the NSA got some things wrong and how they could do it better.

There are other aspects to Vault 7 that are still being deciphered. For example, some are concerned that the CIA was infiltrating online games, because of one page’s reference to League of Legends, Hearthstone, and Heroes of the Storm.

Clinton’s Missing Emails or the FBI’s Vault on Clinton

Some believed this was about a seventh “vault” of FBI emails, since the FBI had released six sets of Clinton emails and information at the time that the tweets were published. But this was less than likely, since the FBI just released Part 7 of its Clinton vault here. Others believed that it was related to Clinton’s missing 33,000 emails. This theory gained new traction after a federal court hearing about Anthony Weiner and Huma Abedin’s laptop emails, scheduled for Tuesday March 7, was postponed on March 6. However, it’s unclear at this time if the postponement happened before or after WikiLeak’s announcement. Read the press release from Judicial Watch, where they mention the hearing was postponed, here.

Obama Wiretapping

Because of President Donald Trump’s recent tweets claiming President Barack Obama “wiretapped” him, some believe that Vault 7 is about this. However, the wiretapping suspicion so far is unsubstantiated.

‘Pizzagate’

Others theorized this was somehow related to a longstanding conspiracy theory about “pizzagate,” which involves the idea that high-ranking politicians are involved in a pedophile ring to keep them from deviating from the "Deep state" party line. So far no conclusive evidence has been found to support this theory. The rumors gained traction after WikiLeaks released John Podesta’s emails.


Top Visited
Switchboard
Latest
Past week
Past month

NEWS CONTENTS

Old News ;-)

[Jun 14, 2019] Our old acquaintance Crowdstrike has gone public, and in its IPO debut, the stock surged to a market cap of over $12 Billion

Notable quotes:
"... Surprisingly, Crowdstrike's CEO – George Kurtz – does not have a background in the national intelligence services, or none that is immediately apparent. He seems to have worked mostly in private security, having gotten into it fairly early on, and is an accountant by trade; he seems to be the public face of the firm, and to be mostly involved in marketing. ..."
"... However, their president of services, Shawn Henry, is a former executive assistant director of the FBI, and I imagine its employees include quite a few former government spooks and ideologues. ..."
"... The other co-founder, though, is Dmitry Alperovitch. ..."
"... He's a Senior Fellow at the Atlantic Council think tank, a direct adviser to the US Department of Defense, connected to Hillary Clinton and runs a new corporation whose startup cash came from Google. There's something even bigger than Google – corporations now seem more and more to be merging into what are essentially mini-states within the state itself – and it is called Alphabet Capital, Google's parent company. The Chairman of Alphabet Capital is Eric Schmidt, and he was actively working for Hillary Clinton during the last election when she spectacularly failed to make the cut. ..."
"... Google, allegedly, is becoming more and more an arm of the Democratic Party in the USA. ..."
"... Wheels within wheels, and connections seen and unseen. Several security professionals and software developers have alluded to Crowdstrike's reports on international hacking as being full of shit – but the American enforcement and intelligence services seem content to outsource their cyber work more or less exclusively to Crowdstrike. And the results of its IPO suggest high confidence on the part of investors that it is going to become ever-more-closely allied to the US government, font of government grants and funding which can be hard to trace. ..."
"... For what it's worth, the Crowdstrike story that Russian cyber-meddling had knocked out 80% of Ukrainian artillery systems was deemed bogus by several other sources, including the Ukrainian Army. At its most basic, artillery systems are large ballistic rifles that drop artillery shells on a predetermined position by looking the reference up on a gridded map and inputting corrections for elevation and azimuth; there is nothing computer-connected about them. Somewhere near the nearest elevated position in relation to the target there is a spotter, who notes the fall of shot and calls the corrections; "left two, up fifty", or "in line, on for range; fire for effect". The latter would be followed by a barrage on what the spotter had identified as a direct hit by the spotting rounds. ..."
Jun 14, 2019 | thenewkremlinstooge.wordpress.com

Mark Chapman June 12, 2019 at 10:31 am

Well, well; look at that. Our old acquaintance Crowdstrike has gone public, and in its IPO debut, the stock surged to a market cap of over $12 Billion – worth nearly as much as Symantec, which has been around for nearly 40 years. Up 83% in a single day. Gee; I wonder who's buying in? I guess we can look forward to more whispering about Russian cybercrime and internet invasion in the days to come. Stealing elections, even, maybe, hmmm?

https://www.cnbc.com/2019/06/12/crowdstrike-ipo-stock-starts-trading-on-the-nasdaq.html

Surprisingly, Crowdstrike's CEO – George Kurtz – does not have a background in the national intelligence services, or none that is immediately apparent. He seems to have worked mostly in private security, having gotten into it fairly early on, and is an accountant by trade; he seems to be the public face of the firm, and to be mostly involved in marketing.

However, their president of services, Shawn Henry, is a former executive assistant director of the FBI, and I imagine its employees include quite a few former government spooks and ideologues.

https://www.crowdstrike.com/about-crowdstrike/executive-team/george-kurtz/

The other co-founder, though, is Dmitry Alperovitch.

https://www.breitbart.com/politics/2017/01/06/dnc-russian-hacking-conclusion-comes-google-linked-firm/

He's a Senior Fellow at the Atlantic Council think tank, a direct adviser to the US Department of Defense, connected to Hillary Clinton and runs a new corporation whose startup cash came from Google. There's something even bigger than Google – corporations now seem more and more to be merging into what are essentially mini-states within the state itself – and it is called Alphabet Capital, Google's parent company. The Chairman of Alphabet Capital is Eric Schmidt, and he was actively working for Hillary Clinton during the last election when she spectacularly failed to make the cut.

https://www.zerohedge.com/news/2017-03-24/what-crowdstrike-firm-hired-dnc-has-ties-hillary-clinton-ukrainian-billionaire-and-g

Google, allegedly, is becoming more and more an arm of the Democratic Party in the USA.

There is also another gap in play: The shrinking distance between Google and the Democratic Party. Former Google executive Stephanie Hannon is the Clinton campaign's chief technology officer, and a host of ex-Googlers are currently employed as high-ranking technical staff at the Obama White House. Schmidt, for his part, is one of the most powerful donors in the Democratic Party -- and his influence does not stem only from his wealth, estimated by Forbes at more than $10 billion.

Wheels within wheels, and connections seen and unseen. Several security professionals and software developers have alluded to Crowdstrike's reports on international hacking as being full of shit – but the American enforcement and intelligence services seem content to outsource their cyber work more or less exclusively to Crowdstrike. And the results of its IPO suggest high confidence on the part of investors that it is going to become ever-more-closely allied to the US government, font of government grants and funding which can be hard to trace.

Mark Chapman June 12, 2019 at 4:25 pm
Here's a colorful account of Crowdstrike's exploits and their alleged track record of coming up with convenient narratives on demand.

https://blogs.timesofisrael.com/the-russian-collusion-delusion-in-a-nutshell/

For what it's worth, the Crowdstrike story that Russian cyber-meddling had knocked out 80% of Ukrainian artillery systems was deemed bogus by several other sources, including the Ukrainian Army. At its most basic, artillery systems are large ballistic rifles that drop artillery shells on a predetermined position by looking the reference up on a gridded map and inputting corrections for elevation and azimuth; there is nothing computer-connected about them. Somewhere near the nearest elevated position in relation to the target there is a spotter, who notes the fall of shot and calls the corrections; "left two, up fifty", or "in line, on for range; fire for effect". The latter would be followed by a barrage on what the spotter had identified as a direct hit by the spotting rounds.

Kaspersky Labs also took Crowdstrike apart,

https://therearenosunglasses.wordpress.com/2017/01/31/kasperskys-war-on-crowdstrike-evangelist-dmitri-alperovitch/

and mention of Kaspersky reminded me the US government had used 'advice' from its security experts to determine Kaspersky products constituted a threat to US national security just like Huawei, a connection I have not seen made yet elsewhere.

Mmmm .I wonder if Crowdstrike is not being set up specifically to provide the US government with substantiation for banning technical products which have the potential to achieve dominant market share, but cannot be manipulated by Washington because they are owned by non-aligned countries?

[Jun 13, 2019] A loyal servant of empire -- Crowdstrike CEO -- is well-rewarded for his role in creating Russiagate hysteria by Caitlin Johnstone

Notable quotes:
"... Never mind that to this day the DNC servers have not been examined by the FBI, nor indeed were they examined by the Special Counsel of Robert " Iraq has WMD " Mueller, preferring instead to go with the analyses of this extremely shady outfit with extensive and well-documented ties with the oligarchic leaders of the US-centralized empire. ..."
"... When the Romanian REAL Guccifer got Podesta password (password) by phishing, exposing his pizza and walnut sauce perversions, the US had him jailed. When WikiLeaks made a DNC dump, CrowdStrike concocted Guccifer 2.0, then more leaks Fancy Bear, and more leaks Cozy Bear. All these CrowdStrike fabrications used CIA Vault 7 fingerprints to frame Russia. It is time to execute our ruling demonic warlords. ..."
Jun 13, 2019 | caitlinjohnstone.com

A new article by Forbes reports that the CEO of Crowdstrike, the extremely shady cybersecurity corporation which was foundational in the construction of the official CIA/CNN Russian hacking narrative, is now a billionaire. George Kurtz ascended to the billionaire rankings on the back of soaring stocks immediately after the company went public, carried no doubt on the winds of the international fame it gained from its central protagonistic role in the most well-known hacking news story of all time.

A loyal servant of empire well-rewarded. Never mind that US government insiders like Hillary Clinton had been prepping for escalations against Russia well in advance of the 2016 elections, and that their preexisting agendas to shove a geostrategic obstacle off the world stage benefitted from the hacking narrative as much as George Kurtz did.

Never mind that Crowdstrike is tied to the NATO narrative management firm known as the Atlantic Council, which receives funding from the US government, the EU, NATO, Gulf states and powerful international oligarchs. Never mind either that Crowdstrike was financed with a whopping $100 million from Google , which has had a cozy relationship with US intelligence agencies since its very inception .

Never mind that to this day the DNC servers have not been examined by the FBI, nor indeed were they examined by the Special Counsel of Robert " Iraq has WMD " Mueller, preferring instead to go with the analyses of this extremely shady outfit with extensive and well-documented ties with the oligarchic leaders of the US-centralized empire.

Also never mind that the Crowdstrike analyst who led forensics on those DNC servers had in fact worked for and was promoted by Robert Mueller while the two were in the FBI.

The CEO of the Atlantic Council-tied Crowdstrike, which formed the foundation of the official CIA/CNN Russian hacking narrative, is now a billionaire. I'm telling you, the real underlying currency of this world is narrative and the ability to control it. https://t.co/XsBCvkIDzJ -- Caitlin Johnstone ⏳ (@caitoz) June 12, 2019
As I never tire of saying, the real underlying currency in our world is not gold, nor bureaucratic fiat, nor even raw military might.

The real underlying currency of our world is narrative, and the ability to control it.

As soon as you really grok this dynamic, you start noticing it everywhere.

George Kurtz is one clear example today of narrative control's central role in the maintenance and expansion of existing power structures, as well as an illustration of how the empire is wired to reward those who advance pro-empire narratives and punish those who damage them...

... ... ...

Joseph Olson / June 13, 2019
When the Romanian REAL Guccifer got Podesta password (password) by phishing, exposing his pizza and walnut sauce perversions, the US had him jailed. When WikiLeaks made a DNC dump, CrowdStrike concocted Guccifer 2.0, then more leaks Fancy Bear, and more leaks Cozy Bear. All these CrowdStrike fabrications used CIA Vault 7 fingerprints to frame Russia. It is time to execute our ruling demonic warlords.

[May 23, 2019] Guccifer 2.0 Was Not a Russian Creation by Larry C Johnson

Notable quotes:
"... The Word documents published in June 2016 by Guccifer 2 also show a "last saved as" user id written in Cyrillic. The Anglicized name is " Felix Edmundovich ", aka "Iron Felix" (the infamous director of an early Soviet spy agency). If you are a Russian cyber spy trying to conduct a covert operation, why do you sign your document with the name of one of the most infamous leaders of Russian intelligence? Robert Mueller wants you to believe that this was just Russian audacity. ..."
"... The phrase "personal beliefs about the competence or incompetence of the Russians" catches something important. Whether it was the Russians or somebody else that did this, whoever did it was pretty sloppy. What this report describes is almost as pathetic when considered a false flag operation as it is as a sabotage operation. So any theory of who stole and published the documents has to explain a capability to access the data combined with blissful obliviousness about handling them. I know of no reason to think the Russian, US, Israeli, or other intelligence communities incapable of such a combination. All of them have brilliant dedicated people but also seemingly endless supplies of mediocre time-servers. ..."
"... Scenario? Shutdown, closing of words with documents being automatically saved? Ok, otherwise there is apparently no precise saving time stamp on Winwords latest version. How much changed since 2016? ..."
"... The Vault7 leak of CIA tools also contained information on how to select any language environment. It's really a standard practice, even for normal criminals. ..."
May 23, 2019 | turcopolier.typepad.com

Russia did not hack the DNC. This is not an opinion. It is a conclusion that flows from one very specific claim made by the Special Counsel -- i.e., Guccifer 2.0 was a fictional identity created by Russian Military Intelligence, the GRU. If Guccifer was in fact a creation or creature of the GRU, then the forensic evidence should show that this entity was operating from Russia or under the direct control of the GRU. The forensic evidence shows something quite different -- the meta data in the Guccifer 2.0 documents were manipulated deliberately to plant Russian fignerprints. This was not an accident nor an oversight due to carelessness.

What is meta data? This is the information recorded when a document is created. This data includes things such as the date and time the document was created or modified. It tells you who created the document. It is like the Wizard of Oz, it is the information behind the curtain.

Special Counsel Robert Mueller's is correct in stating that Guccifer 2.0 was a "fictious online persona. " He is wrong in attributing that action to Russian Military Intelligence. While Guccifer 2.0 was a "fictious" entity, the information recorded about when, how and who created the document show that deliberate choices were made to present the info as if it was created by someone Russian.

Let us first stipulate and agree that Russia and the United States engage in cyber espionage and covert action against each other. This has been the case since computers and the internet came into existence. Within the U.S. Intelligence Community these activities generally are labeled with the acronym, CNO -- Computer Network Operations. The Russians and the United States have cadres of cyber "warriors" who sit at computer terminals and engage in operations commonly known as hacking. Other countries, such as China, Iran and Ukraine do this as well.

CNOs are classified at the highest level in the United States and normally are handled within special restricted categories commonly known as SAPs (i.e, Special Access Programs). A critical element of these kinds of operations is to avoid leaving any fingerprints or clues that would enable the activity to be traced back to the United States. But this is not unique to the United States. All professional intelligence services around the world understand and practice this principle -- leave no evidence behind that proves you were there.

The case implicating Russia in the hack of the DNC and Clinton emails, including those of her campaign Manager, John Podesta, rests on suspect forensic computer evidence -- is present in the meta data in the documents posted on line by Guccifer 2.0. According to Disobedient Media , "the files that Guccifer 2.0 initially pushed to reporters contain Russian metadata, a Russian stylesheet entry and in some cases embedded Russian error messages."

Why would the Russians make such a mistake, especially in such a high stake operation (targeting a national election with covert action most certainly is a high stake operation). Mueller and the U.S. intelligence community want you to believe that the Russians are just sloppy and careless buffoons. Those ideologically opposed to the Russians readily embrace this nonsenses. But for those who actually have dealt with Russian civilian and military intelligence operatives and operations, the Russians are sophisticated and cautious.

But we do not have to rely on our personal beliefs about the competence or incompetence of the Russians. We simply need to look at the forensic evidence contained in the documents posted by Guccifer 2.0. We will take Robert Mueller and his investigators at their word:

  • Beginning in or around June 2016, the Conspirators staged and released tens of thousands of the stolen emails and documents. They did so using fictitious online personas, including "DCLeaks" and "Guccifer 2.0." (p. 2-3)
  • The Conspirators also used the Guccifer 2.0 persona to release additional stolen documents through a website maintained by an organization ("Organization 1") [aka WIKILEAKS], that had previously posted documents stolen from U.S. persons, entities, and the U.S. government. (p. 3)
  • Between in or around June 2016 and October 2016, the Conspirators used Guccifer 2.0 to release documents through WordPress that they had stolen from the DCCC and DNC. The Conspirators, posing as Guccifer 2.0, also shared stolen documents with certain individuals. (p. 15)

An examination of those documents tells a very different story. While it does not reveal who or what was Guccifer 2.0, it does undermine Mueller's claim that it was the Russians who did these dastardly deeds.

One independent forensic computer investigator, who uses the name, "The Forensicator," examined the meta data in some of the documents posted by Guccifer 2.0 and discovered the following :

Guccifer 2.0 published a file on 13 September 2016 that was originally copied on 5 July 2016 at approximately 6:45 PM Eastern time. It was copied and appeared as the "NGP VAN" 7zip file.

The estimated speed of transfer was 23 MB/s. This means that this initial data transfer could have been done remotely over the Internet. Instead, it was likely done from a computer system that had direct access to the data. "By "direct access" we mean that the individual who was collecting the data either had physical access to the computer where the data was stored, or the data was copied over a local high-speed network (LAN)."

This initial copying activity was done on a system that used Eastern Daylight Time (EDT) settings and was likely initially copied to a computer running Linux, because the file last modified times all reflect the apparent time of the copy, which is a characteristic of the Linux 'cp' command (using default options).

On September 1, 2016, a subset of the initial large collection of DNC related content (the so-called NGP/VAN data), was transferred to working directories on a system running Windows. The .rar files included in the final 7zip file were built from those working directories.

The alleged Russian fingerprints appeared in the first document "leaked" by Guccifer 2.0-- 1.doc -- which was a report on Donald Trump . A forensic examination of the documents shows thatgiven the word processor program used to create the Donald Trump Document released by Guccifer 2.0, the author consciously and purposefully used formats that deliberately inserted "Russian fingerprints" into the document. In other words, the meta-data was purposely altered, and documents were pasted into a 'Russianified' word document with Russian language settings and style headings.

Here are the key facts:

The meta data shows that Slate_-_Domestic_-_USDA_-_2008-12-20.doc was the template for creating 1.doc , 2.doc and 3.doc . This template injected "Warren Flood" as the author value and "GSA" as the company value in those first three Word documents. This template also injected the title , the watermark and header/footer fields found in the final documents (with slight modifications).

The Word documents published in June 2016 by Guccifer 2 also show a "last saved as" user id written in Cyrillic. The Anglicized name is " Felix Edmundovich ", aka "Iron Felix" (the infamous director of an early Soviet spy agency). If you are a Russian cyber spy trying to conduct a covert operation, why do you sign your document with the name of one of the most infamous leaders of Russian intelligence? Robert Mueller wants you to believe that this was just Russian audacity.

But the meta data tells a different story. When we examine The Revision Session Identifiers aka 'RSID's, in the Guccifer document, we see the same Russian style-headings in 1.doc, 2.doc and 3.doc. The document creation timestamps on docs 1, 2 and 3 also are all identical.

Given that MS word assigns a new random 'RSID' with each save when an element is added or edited (this function allows one to track changes made to a Word document), the only way to obtain identical creation timestamps means that someone either directly edited the source document or that there was one empty document open and that individual documents were copy-pasted and saved-as (1.doc), then contents deleted and new doc pasted and saved-as (2.doc), etc. This process also explains identical style-sheet RSIDs .


joanna , 22 May 2019 at 08:54 AM

The document creation timestamps on docs 1, 2 and 3 also are all identical.

Curious, no doubt. But who of us did not consider Guccifer 2 curious. Put another way, what experts considered him solid proof for Russian involvement?

Are you suggesting Winword templates were used for the metadata?

As IT nitwit, how can I save three *doc files or their 2016 word equivalent at the same time? Any way to do that? Windows doesn't seem to have a solution to that.

Again: This is a nitwit user asking a question.

*******
I admittedly am not overly motivated to read the Mueller report. I'll read your contribution again to figure out what you may suggest in or between the lines.

fredw , 22 May 2019 at 09:26 AM
The phrase "personal beliefs about the competence or incompetence of the Russians" catches something important. Whether it was the Russians or somebody else that did this, whoever did it was pretty sloppy. What this report describes is almost as pathetic when considered a false flag operation as it is as a sabotage operation. So any theory of who stole and published the documents has to explain a capability to access the data combined with blissful obliviousness about handling them. I know of no reason to think the Russian, US, Israeli, or other intelligence communities incapable of such a combination. All of them have brilliant dedicated people but also seemingly endless supplies of mediocre time-servers.

Equally interesting is the fact that this analysis has come from such a private source. Surely all the major intelligence agencies have the skill to find the same indicators. And all have comparatively endless resources to apply to the analysis. But they all seem to not want to talk about it. For me the most suspicious thing about the handling of the theft was the FBI's near complete lack of interest in examining the server. I have always assumed that such indifference reflected that they already had all they needed in order to understand what happened. Maybe even watched the theft in real time. But this report demonstrates that you didn't need any special access to blow up the official story. (Note that the official story may be "true". It is just not proven by the cited evidence.)

Yet, whatever actually happened, nobody seems interested in challenging the narrative that Russians stole data and routed it through useful idiots to influence the 2016 elections. This report indicates that a persuasive challenge would not have been hard to produce.

Perhaps the false flag was intentionally clumsy, intended to be detected. Bait for a trap that no one wants to fall into. But I don't see where that thought leads.

joanna , 22 May 2019 at 09:58 AM
https://archive.fo/2dMfC#selection-683.213-687.434

This can be discovered by looking at things called 'rsid's or Revision Session Identifiers in Guccifer's document. In order to track changes, MS word assigns a new random 'rsid' with each save upon each element added or edited. The rsids for the Russian style-headings in 1.doc, 2.doc and 3.doc are all the same (styrsid11758497 in the raw source).

Moreover, the document creation timestamps on 1,2, and 3.docs are all identical too. This might imply there was one empty document open, with individual documents being copy-pasted and saved-as (1.doc), then contents deleted and new doc pasted and saved-as (2.doc), etc. This is the only way to go about obtaining identical creation timestamps short of direct editing of the source, and would also explain identical style-sheet RSIDs.

Scenario? Shutdown, closing of words with documents being automatically saved? Ok, otherwise there is apparently no precise saving time stamp on Winwords latest version. How much changed since 2016?

Empty doc open? What would that change?

But good to see that Winword now integrated some type of automatic saving option, didn't have it when I gave it up and shifted to Open Office. On the other hand, can I trust it to not confront me with an earlier revision version? I admittedly asked myself lately. In a 200 page file, mind you.

Karen Eliot , 22 May 2019 at 10:34 AM
As someone with a little bit of experience in that area I can assure you that language metadata artifacts are practically worthless for attribution. You would mention it in a report, but from it you can only conclude that
  • either the creator was an amateur and used his own language environment
  • or actually selected this particular language environment, either by running a - in this case - Russian copy of Office, or by changing the metadata manually.
  • or he used his own language environment because he doesn't care, and because he knows that this information is worthless for any forensics expert.

The Vault7 leak of CIA tools also contained information on how to select any language environment. It's really a standard practice, even for normal criminals.

Attribution is really hard and usually amounts to a lot of guessing who might be interested in the target of an attack, correlating information from other campaigns, and is only rarely based on hard evidence. Big state actors probably can do a little bit better when they have access to enough network taps. But in the end one bit looks like any other, and properties of static documents can always be forged and made to look real. Or simply buy a copy of MS Office in .

joanna said in reply to Karen Eliot... , 23 May 2019 at 09:51 AM
The document creation timestamps on docs 1, 2 and 3 also are all identical.

Ok doc creation times. Could one create a WinWord Macro? That does exactly that. ok, why would one do this? True. Minor detail, I know. But I see we have experts around now.

*******
More generally. Guccifer 2.0 was a bit of an odd occurrence, not least due to US intelligence considering Guccifer one or zero, if you like.

Fred , 23 May 2019 at 11:24 AM
fredw,

"..nobody seems interested in challenging the narrative that Russians..."

That's precisely what Larry has been doing for some time.

"Equally interesting is the fact that this analysis has come from such a private source."

How dare a private citizen challenge the narrative!

"Perhaps the false flag was intentionally clumsy..."

False flag, let's discuss that idea, brought up solely by you, and not discuss Larry's analysis.

[May 23, 2019] The language metadata artifacts are practically worthless for attribution

May 23, 2019 | turcopolier.typepad.com

Karen Eliot , 22 May 2019 at 10:34 AM

As someone with a little bit of experience in that area I can assure you that language metadata artifacts are practically worthless for attribution. You would mention it in a report, but from it you can only conclude that
  • either the creator was an amateur and used his own language environment
  • or actually selected this particular language environment, either by running a - in this case - Russian copy of Office, or by changing the metadata manually.
  • or he used his own language environment because he doesn't care, and because he knows that this information is worthless for any forensics expert.

The Vault7 leak of CIA tools also contained information on how to select any language environment. It's really a standard practice, even for normal criminals.

Attribution is really hard and usually amounts to a lot of guessing who might be interested in the target of an attack, correlating information from other campaigns, and is only rarely based on hard evidence.

Big state actors probably can do a little bit better when they have access to enough network taps. But in the end one bit looks like any other, and properties of static documents can always be forged and made to look real. Or simply buy a copy of MS Office.

[May 11, 2019] Crowdstrike planted the malware on DNC systems, which they discovered later

Highly recommended!
Notable quotes:
"... Also note: Crowdstrike planted the malware on DNC systems, which they "discovered" later - https://disobedientmedia.com/2017/12/fancy-frauds-bogus-bears-malware-m ..."
"... And look who else sits on the Atlantic Council - http://www.atlanticcouncil.org/about/experts/list/irene-chalupa why it's the sister of Andrea Chalupa, unregistered foreign agent employed by the DNC as a "Consultant", whose entire family is tied to Ukraine Intelligence. ..."
"... Irena Chalupa is also the news anchor for Ukraine's propaganda channel Stopfake.org She is a Ukrainian Diaspora leader. The Chalupas are the first family of Ukrainian propaganda. She works with and for Ukrainian Intelligence through the Atlantic Council, Stopfake.org, and her sisters Andrea (EuromaidanPR) and Alexandra. ..."
Mar 03, 2018 | www.zerohedge.com

mc888 Fri, 03/02/2018 - 20:06 Permalink

Thanks Tyler.

Also note: Crowdstrike planted the malware on DNC systems, which they "discovered" later - https://disobedientmedia.com/2017/12/fancy-frauds-bogus-bears-malware-m

(if that's too 'in the weeds' for you, ask your tech guys to read and verify)

And look who else sits on the Atlantic Council - http://www.atlanticcouncil.org/about/experts/list/irene-chalupa why it's the sister of Andrea Chalupa, unregistered foreign agent employed by the DNC as a "Consultant", whose entire family is tied to Ukraine Intelligence.

http://theantimedia.org/propornot-2017-biggest-fake-news-story/

Irena Chalupa is also the news anchor for Ukraine's propaganda channel Stopfake.org She is a Ukrainian Diaspora leader. The Chalupas are the first family of Ukrainian propaganda. She works with and for Ukrainian Intelligence through the Atlantic Council, Stopfake.org, and her sisters Andrea (EuromaidanPR) and Alexandra.

and lest we forget crazy eyes #1

http://theduran.com/adam-schiffs-collusion-with-oligarch-ukrainian-arms

[May 11, 2019] Why Crowdstrike's Russian Hacking Story Fell Apart -- Say Hello to Fancy Bear

Highly recommended!
Notable quotes:
"... Ukraine has been screaming for the US to start a war with Russia for the past 2 1/2 years. ..."
"... Is Ukrainian Intelligence trying to invent a reason for the US to take a hard-line stance against Russia? Are they using Crowdstrike to carry this out? ..."
"... Meet the real Fancy Bear and Cozy Bear, part of the groups that are targeting Ukrainian positions for the Donetsk and Lugansk People's Republics. These people were so tech savvy they didn't know the Ukrainian SBU (Ukrainian CIA/internal security) records every phone call and most internet use in Ukraine and Donbass. Donbass still uses Ukrainian phone and internet services. ..."
"... This is a civil war and people supporting either side are on both sides of the contact line. The SBU is awestruck because there are hundreds if not thousands of people helping to target the private volunteer armies supported by Ukrainian-Americans. ..."
"... If she was that close to the investigation Crowdstrike did how credible is she? Her sister Alexandra was named one of 16 people that shaped the election by Yahoo news. The DNC hacking investigation done by Crowdstrike concluded hacking was done by Russian actors based on the work done by Alexandra Chalupa? That is the conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the Russian government connection. These words mirror Dimitri Alperovitch's identification process in his interview with PBS Judy Woodruff. ..."
"... How close is Dimitri Alperovitch to DNC officials? Close enough professionally he should have stepped down from an investigation that had the chance of throwing a presidential election in a new direction. ..."
"... According to Esquire.com , Alperovitch has vetted speeches for Hillary Clinton about cyber security issues in the past. Because of his work on the Sony hack, President Barrack Obama personally called and said the measures taken were directly because of his work. ..."
"... Still, this is not enough to show a conflict of interest. Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian propagandists, and Ukrainian state supported hackers do. When it all adds up and you see it together, we have found a Russian that tried hard to influence the outcome of the US presidential election in 2016. ..."
"... According to Robert Parry's article At the forefront of people that would have taken senior positions in a Clinton administration and especially in foreign policy are the Atlantic Council. Their main goal is still a major confrontation with nuclear-armed Russia. ..."
"... The Atlantic Council is the think tank associated and supported by the CEEC (Central and Eastern European Coalition). The CEEC has only one goal which is war with Russia. Their question to candidates looking for their support in the election was "Are you willing to go to war with Russia?" Hillary Clinton has received their unqualified support throughout the campaign. ..."
"... What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the Atlantic Council would have taken senior cabinet and policy positions, his own fellowship status at the Atlantic Council and relationship with Irene Chalupa creates a definite conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or Homeland Security? ..."
"... Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence groups is where things really heat up. Noted above she works with Euromaidanpress.com and Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers. ..."
"... When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and its hackers individually . There is a mutual relationship. When you add up his work for the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be investigated to see if Ukraine is conspiring against the US government. ..."
"... Alperovitch and Fancy Bear tweet each other? ..."
"... Crowdstrike is part of Ukrainian nationalist hacker network ..."
"... In an interview with Euromaidanpress these hackers say they have no need for the CIA. They consider the CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance is a quasi-organization with the participation of several groups – RUH8, Trinity, Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the Myrotvorets site, Informnapalm analytical agency." ..."
"... Although OSINT Academy sounds fairly innocuous, it's the official twitter account for Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence. The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates journalists and other people for assassination. If you disagree with OUNb politics, you could be on the list. ..."
"... This single tweet on a network chart shows that out of all the Ukrainian Ministry of Information Minister's following, he only wanted the 3 hacking groups associated with both him and Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be shared heavily. If it was a victory for the hacking squad, it would be smart to keep it to themselves and not draw unwanted attention. ..."
"... Pravy Sektor Hackers and Crowdstrike? ..."
"... What sharp movements in international politics have been made lately? Let me spell it out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored, Russian language hackers in Eastern European time zones have shown with the Surkov hack they have the tools and experience to hack states that are looking out for it. They are also laughing at US intel efforts. ..."
"... The hackers also made it clear that they will do anything to serve Ukraine. Starting a war between Russia and the USA is the one way they could serve Ukraine best, and hurt Russia worst. Given those facts, if the DNC hack was according to the criteria given by Alperovitch, both he and these hackers need to be investigated. ..."
"... According to the Esquire interview "Alperovitch was deeply frustrated: He thought the government should tell the world what it knew. There is, of course, an element of the personal in his battle cry. "A lot of people who are born here don't appreciate the freedoms we have, the opportunities we have, because they've never had it any other way," he told me. "I have." ..."
"... While I agree patriotism is a great thing, confusing it with this kind of nationalism is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering a conflict with Russia that is against American interests, he's a patriot. He isn't serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to Ukraine. ..."
Dec 29, 2017 | www.washingtonsblog.com

In the wake of the JAR-16-20296 dated December 29, 2016 about hacking and influencing the 2016 election, the need for real evidence is clear. The joint report adds nothing substantial to the October 7th report. It relies on proofs provided by the cyber security firm Crowdstrike that is clearly not on par with intelligence findings or evidence. At the top of the report is an "as is" statement showing this.

The difference between Dmitri Alperovitch's claims which are reflected in JAR-1620296 and this article is that enough evidence is provided to warrant an investigation of specific parties for the DNC hacks. The real story involves specific anti-American actors that need to be investigated for real crimes.

For instance, the malware used was an out-dated version just waiting to be found. The one other interesting point is that the Russian malware called Grizzly Steppe is from Ukraine . How did Crowdstrike miss this when it is their business to know?

Later in this article you'll meet and know a little more about the real "Fancy Bear and Cozy Bear." The bar for identification set by Crowdstrike has never been able to get beyond words like probably, maybe, could be, or should be, in their attribution.

The article is lengthy because the facts need to be in one place. The bar Dimitri Alperovitch set for identifying the hackers involved is that low. Other than asking America to trust them, how many solid facts has Alperovitch provided to back his claim of Russian involvement?

The December 29th JAR adds a flowchart that shows how a basic phishing hack is performed. It doesn't add anything significant beyond that. Noticeably, they use both their designation APT 28 and APT 29 as well as the Crowdstrike labels of Fancy Bear and Cozy Bear separately.

This is important because information from outside intelligence agencies has the value of rumor or unsubstantiated information at best according to policy. Usable intelligence needs to be free from partisan politics and verifiable. Intel agencies noted back in the early 90's that every private actor in the information game was radically political.

The Hill.com article about Russia hacking the electric grid is a perfect example of why this intelligence is political and not taken seriously. If any proof of Russian involvement existed, the US would be at war. Under current laws of war, there would be no difference between an attack on the power grid or a missile strike.

According to the Hill "Private security firms provided more detailed forensic analysis, which the FBI and DHS said Thursday correlated with the IC's findings.

"The Joint Analysis Report recognizes the excellent work undertaken by
security companies and private sector network owners and operators, and provides new indicators of compromise and malicious infrastructure
identified during the course of investigations and incident response," read a statement. The report identities two Russian intelligence groups already named by CrowdStrike and other private security firms."

In an interview with Washingtonsblog , William Binney, the creator of the NSA global surveillance system said "I expected to see the IP's or other signatures of APT's 28/29 [the entities which the U.S. claims hacked the Democratic emails] and where they were located and how/when the data got transferred to them from DNC/HRC [i.e. Hillary Rodham Clinton]/etc. They seem to have been following APT 28/29 since at least 2015, so, where are they?"

According to the latest Washington Post story, Crowdstrike's CEO tied a group his company dubbed "Fancy Bear" to targeting Ukrainian artillery positions in Debaltsevo as well as across the Ukrainian civil war front for the past 2 years.

Alperovitch states in many articles the Ukrainians were using an Android app to target the self-proclaimed Republics positions and that hacking this app was what gave targeting data to the armies in Donbass instead.

Alperovitch first gained notice when he was the VP in charge of threat research with McAfee. Asked to comment on Alperovitch's discovery of Russian hacks on Larry King, John McAfee had this to say. "Based on all of his experience, McAfee does not believe that Russians were behind the hacks on the Democratic National Committee (DNC), John Podesta's emails, and the Hillary Clinton presidential campaign. As he told RT, "if it looks like the Russians did it, then I can guarantee you it was not the Russians."

How does Crowdstrike's story part with reality? First is the admission that it is probably, maybe, could be Russia hacking the DNC. " Intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to Wiki Leaks."

The public evidence never goes beyond the word possibility. While never going beyond that or using facts, Crowdstrike insists that it's Russia behind both Clinton's and the Ukrainian losses. NBC carried the story because one of the partners in Crowdstrike is also a consultant for NBC.

According to NBC the story reads like this." The company, Crowdstrike, was hired by the DNC to investigate the hack and issued a report publicly attributing it to Russian intelligence. One of Crowdstrike's senior executives is Shawn Henry, a former senior FBI official who consults for NBC News.

"But the Russians used the app to turn the tables on their foes, Crowdstrike says. Once a Ukrainian soldier downloaded it on his Android phone, the Russians were able to eavesdrop on his communications and determine his position through geo-location.

In June, Crowdstrike went public with its findings that two separate Russian intelligence agencies had hacked the DNC. One, which Crowdstrike and other researchers call Cozy Bear, is believed to be linked to Russia's CIA, known as the FSB. The other, known as Fancy Bear, is believed to be tied to the military intelligence agency, called the GRU."

The information is so certain the level of proof never rises above "believed to be." According to the December 12th Intercept article "Most importantly, the Post adds that "intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to WikiLeaks."

Because Ukrainian soldiers are using a smartphone app they activate their geolocation to use it. Targeting is from location to location. The app would need the current user location to make it work.

In 2015 I wrote an article that showed many of the available open source tools that geolocate, and track people. They even show street view. This means that using simple means, someone with freeware or an online website, and not a military budget can look at what you are seeing at any given moment.

Where Crowdstrike fails is insisting people believe that the code they see is (a) an advanced way to geolocate and (b) it was how a state with large resources would do it. Would you leave a calling card where you would get caught and fined through sanctions or worse? If you use an anonymous online resource at least Crowdstrike won't believe you are Russian and possibly up to something.

" Using open source tools this has been going on for years in the private sector. For geolocation purposes, your smartphone is one of the greatest tools to use. Finding and following you has never been easier . Let's face it if you are going to stalk someone, "street view" on a map is the next best thing to being there. In the following video, the software hacks your modem. It's only one step from your phone or computer."

If you read that article and watch the video you'll see that using "geo-stalker" is a better choice if you are on a low budget or no budget. Should someone tell the Russians they overpaid?

According to Alperovitch, the smartphone app plotted targets in about 15 seconds . This means that there is only a small window to get information this way.

Using the open source tools I wrote about previously, you could track your targets all-day. In 2014, most Ukrainian forces were using social media regularly. It would be easy to maintain a map of their locations and track them individually.

From my research into those tools, someone using Python scripts would find it easy to take photos, listen to conversations, turn on GPS, or even turn the phone on when they chose to. Going a step further than Alperovitch, without the help of the Russian government, GRU, or FSB, anyone could take control of the drones Ukraine is fond of flying and land them. Or they could download the footage the drones are taking. It's copy and paste at that point. Would you bother the FSB, GRU, or Vladimir Putin with the details or just do it?

In the WaPo article Alperovitch states "The Fancy Bear crew evidently hacked the app, allowing the GRU to use the phone's GPS coordinates to track the Ukrainian troops' position.

In that way, the Russian military could then target the Ukrainian army with artillery and other weaponry. Ukrainian brigades operating in eastern Ukraine were on the front lines of the conflict with Russian-backed separatist forces during the early stages of the conflict in late 2014, CrowdStrike noted. By late 2014, Russian forces in the region numbered about 10,000. The Android app was useful in helping the Russian troops locate Ukrainian artillery positions."

In late 2014, I personally did the only invasive passport and weapons checks that I know of during the Ukrainian civil war. I spent days looking for the Russian army every major publication said were attacking Ukraine. The keyword Cyber Security industry leader Alperovitch used is "evidently." Crowdstrike noted that in late 2014, there were 10,000 Russian forces in the region.

When I did the passport and weapons check, it was under the condition there would be no telephone calls. We went where I wanted to go. We stopped when I said to stop. I checked the documents and the weapons with no obstacles. The weapons check was important because Ukraine was stating that Russia was giving Donbass modern weapons at the time. Each weapon is stamped with a manufacture date. The results are in the articles above.

The government in Kiev agreed with my findings throughout 2014 and 2015. There were and are no Russian troops fighting in Donbass regardless of what Mr. Alperovitch asserts. There are some Russian volunteers which I have covered in detail.

Based on my findings which the CIA would call hard evidence, almost all the fighters had Ukrainian passports. There are volunteers from other countries. In Debaltsevo today, I would question Alperovitch's assertion of Russian troops based on the fact the passports will be Ukrainian and reflect my earlier findings. There is no possibly, could be, might be, about it.

The SBU, Olexander Turchinov, and the Ukrainian Ministry of Defense all agree that Crowdstrike is dead wrong in this assessment . Although subtitles aren't on it, the former Commandant of Ukrainian Army Headquarters thanks God Russia never invaded or Ukraine would have been in deep trouble.

How could Dimitri Alperovitch and Crowdstrike be this wrong on easily checked detail and still get this much media attention? Could the investment made by Google and some very large players have anything to do with the media Crowdstrike is causing?

In an interview with PBS newshour on December 22nd 2016, Dmitri Alperovitch finally produced the hard evidence he has for Russian involvement clearly. To be fair, he did state it several times before. It just didn't resonate or the media and US intelligence agencies weren't listening.

According to Alperovitch, the CEO of a $150 million dollar cyber security company "And when you think about, well, who would be interested in targeting Ukraine artillerymen in eastern Ukraine who has interest in hacking the Democratic Party, Russia government comes to mind, but specifically, Russian military that would have operational over forces in the Ukraine and would target these artillerymen."

That statement is most of the proof of Russian involvement he has. That's it, that's all the CIA, FBI have to go on. It's why they can't certify the intelligence. It's why they can't get beyond the threshold of maybe.

Woodruff then asked two important questions. She asked if Crowdstrike was still working for the DNC. Alperovitch responded "We're protecting them going forward. The investigation is closed in terms of what happened there. But certainly, we've seen the campaigns, political organizations are continued to be targeted, and they continue to hire us and use our technology to protect themselves."

Based on the evidence he presented Woodruff, there is no need to investigate further? Obviously, there is no need, the money is rolling in.

Second and most important Judy Woodruff asked if there were any questions about conflicts of interest, how he would answer? This is where Dmitri Alperovitch's story starts to unwind.

His response was "Well, this report was not about the DNC. This report was about information we uncovered about what these Russian actors were doing in eastern Ukraine in terms of locating these artillery units of the Ukrainian army and then targeting them. So, what we just did is said that it looks exactly as the same to the evidence we've already uncovered from the DNC, linking the two together."

Why is this reasonable statement going to take his story off the rails? First, let's look at the facts surrounding his evidence and then look at the real conflicts of interest involved. While carefully evading the question, he neglects to state his conflicts of interest are worthy of a DOJ investigation. Can you mislead the federal government about national security issues and not get investigated yourself?

If Alperovitch's evidence is all there is, then the US government owes some large apologies to Russia.

After showing who is targeting Ukrainian artillerymen, we'll look at what might be a criminal conspiracy.

Crowdstrike CEO Dmitri Alperovitch story about Russian hacks that cost Hillary Clinton the election was broadsided by the SBU (Ukrainian Intelligence and Security) in Ukraine. If Dimitri Alperovitch is working for Ukrainian Intelligence and is providing intelligence to 17 US Intelligence Agencies is it a conflict of interest?

Ukraine has been screaming for the US to start a war with Russia for the past 2 1/2 years. Using facts accepted by leaders on both sides of the conflict, the main proof Crowdstrike shows for evidence doesn't just unravel, it falls apart. Is Ukrainian Intelligence trying to invent a reason for the US to take a hard-line stance against Russia? Are they using Crowdstrike to carry this out?

Real Fancy Bear?

Real Fancy Bear?

Meet the real Fancy Bear and Cozy Bear, part of the groups that are targeting Ukrainian positions for the Donetsk and Lugansk People's Republics. These people were so tech savvy they didn't know the Ukrainian SBU (Ukrainian CIA/internal security) records every phone call and most internet use in Ukraine and Donbass. Donbass still uses Ukrainian phone and internet services.

These are normal people fighting back against private volunteer armies that target their homes, schools, and hospitals. The private volunteer armies like Pravy Sektor, Donbas Battalion, Azov, and Aidar have been cited for atrocities like child rape, torture, murder, and kidnapping. That just gets the ball rolling. These are a large swath of the Ukrainian servicemen Crowdstrike hopes to protect.

This story which just aired on Ukrainian news channel TCN shows the SBU questioning and arresting some of what they call an army of people in the Ukrainian-controlled areas. This news video shows people in Toretsk that provided targeting information to Donbass and people probably caught up in the net accidentally.

This is a civil war and people supporting either side are on both sides of the contact line. The SBU is awestruck because there are hundreds if not thousands of people helping to target the private volunteer armies supported by Ukrainian-Americans.

The first person they show on the video is a woman named Olga Lubochka. On the video her voice is heard from a recorded call saying " In the field, on the left about 130 degrees. Aim and you'll get it." and then " Oh, you hit it so hard you leveled it to the ground.""Am I going to get a medal for this?"

Other people caught up in the raid claim and probably were only calling friends they know. It's common for people to call and tell their family about what is going on around them. This has been a staple in the war especially in outlying villages for people aligned with both sides of the conflict. A neighbor calls his friend and says "you won't believe what I just saw."

Another "fancy bear," Alexander Schevchenko was caught calling friends and telling them that armored personnel carriers had just driven by.

Anatoli Prima, father of a DNR(Donetsk People's Republic) soldier was asked to find out what unit was there and how many artillery pieces.

One woman providing information about fuel and incoming equipment has a husband fighting on the opposite side in Gorlovka. Gorlovka is a major city that's been under artillery attack since 2014. For the past 2 1/2 years, she has remained in their home in Toretsk. According to the video, he's vowed to take no prisoners when they rescue the area.

When asked why they hate Ukraine so much, one responded that they just wanted things to go back to what they were like before the coup in February 2014.

Another said they were born in the Soviet Union and didn't like what was going on in Kiev. At the heart of this statement is the anti- OUN, antinationalist sentiment that most people living in Ukraine feel. The OUNb Bandera killed millions of people in Ukraine, including starving 3 million Soviet soldiers to death. The new Ukraine was founded in 1991 by OUN nationalists outside the fledgling country.

Is giving misleading or false information to 17 US Intelligence Agencies a crime? If it's done by a cyber security industry leader like Crowdstrike should that be investigated? If unwinding the story from the "targeting of Ukrainian volunteers" side isn't enough, we should look at this from the American perspective. How did the Russia influencing the election and DNC hack story evolve? Who's involved? Does this pose conflicts of interest for Dmitri Alperovitch and Crowdstrike? And let's face it, a hacking story isn't complete until real hackers with the skills, motivation, and reason are exposed.

In the last article exploring the DNC hacks the focus was on the Chalupas . The article focused on Alexandra, Andrea, and Irene Chalupa. Their participation in the DNC hack story is what brought it to international attention in the first place.

According to journalist and DNC activist Andrea Chalupa on her Facebook page " After Chalupa sent the email to Miranda (which mentions that she had invited this reporter to a meeting with Ukrainian journalists in Washington), it triggered high-level concerns within the DNC, given the sensitive nature of her work. "That's when we knew it was the Russians," said a Democratic Party source who has been directly involved in the internal probe into the hacked emails. In order to stem the damage, the source said, "we told her to stop her research."" July 25, 2016

If she was that close to the investigation Crowdstrike did how credible is she? Her sister Alexandra was named one of 16 people that shaped the election by Yahoo news. The DNC hacking investigation done by Crowdstrike concluded hacking was done by Russian actors based on the work done by Alexandra Chalupa? That is the conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the Russian government connection. These words mirror Dimitri Alperovitch's identification process in his interview with PBS Judy Woodruff.

How close is Dimitri Alperovitch to DNC officials? Close enough professionally he should have stepped down from an investigation that had the chance of throwing a presidential election in a new direction.

According to Esquire.com , Alperovitch has vetted speeches for Hillary Clinton about cyber security issues in the past. Because of his work on the Sony hack, President Barrack Obama personally called and said the measures taken were directly because of his work.

Still, this is not enough to show a conflict of interest. Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian propagandists, and Ukrainian state supported hackers do. When it all adds up and you see it together, we have found a Russian that tried hard to influence the outcome of the US presidential election in 2016.

In my previous article I showed in detail how the Chalupas fit into this. A brief bullet point review looks like this.

  • The Chalupas are not Democrat or Republican. They are OUNb. The OUNb worked hard to start a war between the USA and Russia for the last 50 years. According to the Ukrainian Weekly in a rare open statement of their existence in 2011, "Other statements were issued in the Ukrainian language by the leadership of the Organization of Ukrainian Nationalists (B) and the International Conference in Support of Ukraine. The OUN (Bandera wing) called for" What is OUNb Bandera? They follow the same political policy and platform that was developed in the 1930's by Stepan Bandera. When these people go to a Holocaust memorial they are celebrating both the dead and the OUNb SS that killed There is no getting around this fact. The OUNb have no concept of democratic values and want an authoritarian fascism.
  • Alexandra Chalupa- According to the Ukrainian Weekly , "The effort, known as Digital Miadan, gained momentum following the initial Twitter storms. Leading the effort were: Lara Chelak, Andrea Chalupa, Alexandra Chalupa, Constatin Kostenko and others." The Digital Maidan was also how they raised money for the coup. This was how the Ukrainian emigres bought the bullets that were used on Euromaidan. Ukraine's chubby nazi, Dima Yarosh stated openly he was taking money from the Ukrainian emigres during Euromaidan and Pravy Sektor still fundraises openly in North America. The "Sniper Massacre" on the Maidan in Ukraine by Dr. Ivan Katchanovski, University of Ottowa shows clearly detailed evidence how the massacre happened. It has Pravy Sektor confessions that show who created the "heavenly hundred. Their admitted involvement as leaders of Digital Maidan by both Chalupas is a clear violation of the Neutrality Act and has up to a 25 year prison sentence attached to it because it ended in a coup.
  • Andrea Chalupa-2014, in a Huff Post article Sept. 1 2016, Andrea Chalupa described Sviatoslav Yurash as one of Ukraine's important "dreamers." He is a young activist that founded Euromaidan Press . Beyond the gushing glow what she doesn't say is who he actually is. Sviatoslav Yurash was Dmitri Yarosh's spokesman just after Maidan. He is a hardcore Ukrainian nationalist and was rewarded with the Deputy Director position for the UWC (Ukrainian World Congress) in Kiev .

In January, 2014 when he showed up at the Maidan protests he was 17 years old. He became the foreign language media representative for Vitali Klitschko, Arseni Yatsenyuk, and Oleh Tyahnybok. All press enquiries went through Yurash. To meet Dimitri Yurash you had to go through Sviatoslav Yurash as a Macleans reporter found out.

At 18 years old, Sviatoslav Yurash became the spokesman for Ministry of Defense of Ukraine under Andrei Paruby. He was Dimitri Yarosh's spokesman and can be seen either behind Yarosh on videos at press conferences or speaking ahead of him to reporters. From January 2014 onward, to speak to Dimitri Yarosh, you set up an appointment with Yurash.

Andrea Chalupa has worked with Yurash's Euromaidan Press which is associated with Informnapalm.org and supplies the state level hackers for Ukraine.

  • Irene Chalupa- Another involved Chalupa we need to cover to do the story justice is Irene Chalupa. From her bio – Irena Chalupa is a nonresident fellow with the Atlantic Council's Dinu Patriciu Eurasia Center. She is also a senior correspondent at Radio Free Europe/Radio Liberty (RFE/RL), where she has worked for more than twenty years. Ms. Chalupa previously served as an editor for the Atlantic Council, where she covered Ukraine and Eastern Europe. Irena Chalupa is also the news anchor for Ukraine's propaganda channel org She is also a Ukrainian emigre leader.

According to Robert Parry's article At the forefront of people that would have taken senior positions in a Clinton administration and especially in foreign policy are the Atlantic Council. Their main goal is still a major confrontation with nuclear-armed Russia.

The Atlantic Council is the think tank associated and supported by the CEEC (Central and Eastern European Coalition). The CEEC has only one goal which is war with Russia. Their question to candidates looking for their support in the election was "Are you willing to go to war with Russia?" Hillary Clinton has received their unqualified support throughout the campaign.

What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the Atlantic Council would have taken senior cabinet and policy positions, his own fellowship status at the Atlantic Council and relationship with Irene Chalupa creates a definite conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or Homeland Security?

When you put someone that has so much to gain in charge of an investigation that could change an election, that is a conflict of interest. If the think tank is linked heavily to groups that want war with Russia like the Atlantic Council and the CEEC, it opens up criminal conspiracy.

If the person in charge of the investigation is a fellow at the think tank that wants a major conflict with Russia it is a definite conflict of interest. Both the Atlantic Council and clients stood to gain Cabinet and Policy positions based on how the result of his work affects the election. It clouds the results of the investigation. In Dmitri Alperovitch's case, he found the perpetrator before he was positive there was a crime.

Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence groups is where things really heat up. Noted above she works with Euromaidanpress.com and Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers.

When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and its hackers individually . There is a mutual relationship. When you add up his work for the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be investigated to see if Ukraine is conspiring against the US government.

Alperovitch and Fancy Bear tweet each other?

Alperovitch and Fancy Bear tweet each other?

Crowdstrike is also following their hack of a Russian government official after the DNC hack. It closely resembles the same method used with the DNC because it was an email hack.

ff-twitter-com-2016-12-30-02-24-54

Crowdstrike's product line includes Falcon Host, Falcon Intelligence, Falcon Overwatch and Falcon DNS. Is it possible the hackers in Falcons Flame are another service Crowdstrike offers? Although this profile says Virginia, tweets are from the Sofia, Bulgaria time zone and he writes in Russian. Another curiosity considering the Fancy Bear source code is in Russian. This image shows Crowdstrike in their network.

Crowdstrike is part of Ukrainian nationalist hacker network

In an interview with Euromaidanpress these hackers say they have no need for the CIA. They consider the CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance is a quasi-organization with the participation of several groups – RUH8, Trinity, Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the Myrotvorets site, Informnapalm analytical agency."

In the image it shows a network diagram of Crowdstrike following the Surkov leaks. The network communication goes through a secondary source. This is something you do when you don't want to be too obvious. Here is another example of that.

Ukrainian Intelligence and the real Fancy Bear?

Ukrainian Intelligence and the real Fancy Bear?

Although OSINT Academy sounds fairly innocuous, it's the official twitter account for Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence. The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates journalists and other people for assassination. If you disagree with OUNb politics, you could be on the list.

Should someone tell Dimitri Alperovitch that Gerashchenko, who is now in charge of Peacekeeper recently threatened president-elect Donald Trump that he would put him on his "Peacemaker" site as a target? The same has been done with Silvio Berscaloni in the past.

Trying not to be obvious, the Head of Ukraine's Information Ministry (UA Intelligence) tweeted something interesting that ties Alperovitch and Crowdstrike to the Ukrainian Intelligence hackers and the Information Ministry even tighter.

Trying to keep it hush hush?

Trying to keep it hush hush?

This single tweet on a network chart shows that out of all the Ukrainian Ministry of Information Minister's following, he only wanted the 3 hacking groups associated with both him and Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be shared heavily. If it was a victory for the hacking squad, it would be smart to keep it to themselves and not draw unwanted attention.

These same hackers are associated with Alexandra, Andrea, and Irene Chalupa through the portals and organizations they work with through their OUNb. The hackers are funded and directed by or through the same OUNb channels that Alperovitch is working for and with to promote the story of Russian hacking.

Pravy Sektor Hackers and Crowdstrike?

Pravy Sektor Hackers and Crowdstrike?

When you look at the image for the hacking group in the euromaidanpress article, one of the hackers identifies themselves as one of Dimitri Yarosh's Pravy Sektor members by the Pravy Sektor sweatshirt they have on. Noted above, Pravy Sektor admitted to killing the people at the Maidan protest and sparked the coup.

Going further with the linked Euromaidanpress article the hackers say" Let's understand that Ukrainian hackers and Russian hackers once constituted a single very powerful group. Ukrainian hackers have a rather high level of work. So the help of the USA I don't know, why would we need it? We have all the talent and special means for this. And I don't think that the USA or any NATO country would make such sharp movements in international politics."

What sharp movements in international politics have been made lately? Let me spell it out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored, Russian language hackers in Eastern European time zones have shown with the Surkov hack they have the tools and experience to hack states that are looking out for it. They are also laughing at US intel efforts.

The hackers also made it clear that they will do anything to serve Ukraine. Starting a war between Russia and the USA is the one way they could serve Ukraine best, and hurt Russia worst. Given those facts, if the DNC hack was according to the criteria given by Alperovitch, both he and these hackers need to be investigated.

According to the Esquire interview "Alperovitch was deeply frustrated: He thought the government should tell the world what it knew. There is, of course, an element of the personal in his battle cry. "A lot of people who are born here don't appreciate the freedoms we have, the opportunities we have, because they've never had it any other way," he told me. "I have."

While I agree patriotism is a great thing, confusing it with this kind of nationalism is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering a conflict with Russia that is against American interests, he's a patriot. He isn't serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to Ukraine.

The evidence presented deserves investigation because it looks like the case for conflict of interest is the least Dimitri Alperovitch should look forward to. If these hackers are the real Cozy Bear and Fancy Bear, they really did make sharp movements in international politics.

By pawning it off on Russia, they made a worldwide embarrassment of an outgoing President of the United States and made the President Elect the suspect of rumor.

From the Observer.com , " Andrea Chalupa -- the sister of DNC research staffer Alexandra Chalupa -- claimed on social media, without any evidence, that despite Clinton conceding the election to Trump, the voting results need to be audited to because Clinton couldn't have lost -- it must have been Russia. Chalupa hysterically tweeted to every politician on Twitter to audit the vote because of Russia and claimed the TV show The Americans , about two KGB spies living in America, is real."

Quite possibly now the former UK Ambassador Craig Murry's admission of being the involved party to "leaks" should be looked at. " Now both Julian Assange and I have stated definitively the leak does not come from Russia . Do we credibly have access? Yes, very obviously. Very, very few people can be said to definitely have access to the source of the leak. The people saying it is not Russia are those who do have access. After access, you consider truthfulness. Do Julian Assange and I have a reputation for truthfulness? Well in 10 years not one of the tens of thousands of documents WikiLeaks has released has had its authenticity successfully challenged. As for me, I have a reputation for inconvenient truth telling."


[May 10, 2019] Mueller Report - Expensive Estimations And Elusive Evidence by Adam Carter

Highly recommended!
Looks more and more like Crowdstrike conducted false flag operation to implicate Russians, not a real investigation.
I always assumed that #Guccifer2 was either a Crowdstryke construction at DNC request (that's probably why it was so badly, incompetently done) or a NSA construction (then, we somehow need to explain, why it was so badly done?). In both cases the goal was to implicate Russia in a DNC 'hack' ...
Craig Murray has stated he received the DNC files in Wash DC from a leaker. Mueller failed to interview him, which suggest the Mueller and his team were the part of cover-up, not the part of investigation.
Notable quotes:
"... We are told the GRU obtained files from the DNC network on April 22, 2016, (this is a little different to the Netyksho indictment that states the files were archived on April 22, 2016 and extracted later): ..."
"... The malware samples provided by CrowdStrike show that the earliest compile date of Fancy Bear malware reportedly discovered at the DNC was April 25, 2016 . ..."
"... Whoever was controlling the Guccifer 2.0 persona went out of their way to be perceived as Russian and made specious claims about having already sent WikiLeaks documents, even claiming that WikiLeaks would release them soon (all before Mueller records any initial contact between the parties) . ..."
"... The Special Counsel seems to have been impervious to critical pieces of countervailing evidence (some of which demonstrates that Guccifer 2.0 deliberately manufactured Russian breadcrumbs) and they have failed to accurately account for the acquisition of WikiLeaks' DNC emails (missing the date on which approximately 70% of them were collected) , which is, in itself, a stunning failure for a supposedly thorough investigation costing US taxpayers tens of millions of dollars. ..."
"... There should have been a proper, thorough, independent and impartial investigation into the Guccifer 2.0 persona. The Special Counsel certainly hasn't done that job and, in retrospect, looks to have been ill-equipped (and perhaps somewhat reluctant) to do so from the outset. ..."
May 06, 2019 | turcopolier.typepad.com

On April 18, 2019, a redacted version of Robert Mueller's report on "RussiaGate" related activities was released to the public.

This article focuses on Volume I Part III titled "Russian Hacking & Dumping Operations" and provides details of the errors made, critical omissions, lack of conclusive evidence and reliance on assumptions and speculation.

We will also look at problems relating to attribution methods used, countervailing evidence that has clearly been disregarded and other problems that are likely to have affected the quality of the investigation and the report.


The Mueller Report: Context & Contradiction

We start with a read-through of this section of the report, highlighting missing context, contradictions and errors.

Page 36

[To minimize repetition, we'll deal with statements made in this introduction where the basis is explained or details are provided on other pages ahead.]

Page 36

While the Netyksho indictment does provide details of intrusions and infrastructure used, it's still unclear how the infrastructure has been attributed back to individuals in the GRU and no conclusive evidence has been presented to support that in the indictment or the report.

Page 37

Some of the claims relating to state boards of elections are contradicted by the Department of Homeland Security , we'll return to this where it's covered in more detail later in the report.

Page 37

Whatever the sources are the GRU did their "learning" from they seem to have been outdated as many of the phishing emails were bounced due to being for individuals that were not involved in Clinton's 2016 campaign and that no longer had mailboxes on the relevant domains (they were involved in earlier campaigns in previous years) .

Page 39

In the Netyksho indictment it is stated that the "middle-servers" are overseas:

So, what was the point in having a US-based AMS Panel if you're using overseas servers as proxies?

This seems to be a needlessly noisy setup that somewhat defeats the purpose of having a US-based server for the AMS panel.

This setup makes the assets allegedly used by GRU officers subject to US laws, subject to Internet monitoring by US intelligence agencies and prone to being physically seized.

With the GRU using middle-servers, as alleged, there would have been absolutely no reason to have the AMS panel hosted on a server within the US and every reason to have it hosted elsewhere.

It almost seems like they wanted to get caught!

Page 40

We are told the GRU obtained files from the DNC network on April 22, 2016, (this is a little different to the Netyksho indictment that states the files were archived on April 22, 2016 and extracted later):

The problem with this is that it suggests the GRU had their implant on the DNC network earlier than what the available evidence supports.

The malware samples provided by CrowdStrike show that the earliest compile date of Fancy Bear malware reportedly discovered at the DNC was April 25, 2016 .

Perhaps they didn't discover all the malware until later? (Though, with their flagship product installed across the network, one would think they'd have detected all the malware present by the time they reported on discoveries).

Regarding the stolen opposition research, we've only seen the document as an attachment to one of Podesta's emails and a deliberately tainted version of the same document released by Guccifer 2.0.

The implication that this was stolen from the DNC is questionable due to this.

Going further, the story surrounding this changed in November 2017 when the Associated Press published a story titled " How Russians hacked the Democrats' emails " in which they cite an anonymous former DNC official who asserts that Guccifer 2.0's first document (the Trump opposition report) did not originate in the DNC as initially reported.

Another interesting point relating to this is the "HRC_pass.zip" archive released by Guccifer 2.0 on June 21, 2016 ( which also provided another US central timezone indication ) contained files with last modification dates of April 26, 2016. While this fits within the above timeframe, the transfer of the files individually, the apparent transfer speeds involved and the presence of FAT-like 2-second rounding artifacts ( noted elsewhere in Guccifer 2.0's releases ) when the files came from an NTFS system (and the ZIP implementation was not the cause) does not correlate well with what the report outlines.

In spite of its name ("HRC_pass.zip") this archive appears to contain files that can be sourced to the DNC. Out of 200 files, only one showed up as an attachment (in the Podesta emails) .

Regarding the May 25 - June 1 timeframe cited, this seems to exclude the date on which approximately 70% of the DNC's emails published on WikiLeaks' website were acquired (May 23, 2016)

What makes this interesting is that this is apparently being evaluated on evidence that was very likely to have been provided by CrowdStrike:

Page 40

How did Crowdstrike's evidence not inform the FBI and Special Counsel of the real initial acquisition date of WikiLeaks' DNC emails?

Was the May 23, 2016 activity not recorded?

Going back to the Netyksho indictment , we have also been told that Yermakov was searching for Powershell commands between the May 25 - June 1st period:

However, we know 70% of the DNC emails published by WikiLeaks had already been acquired prior to that time, before Yermakov had allegedly researched how to access and manage the Exchange server.

Page 41

We can tell from the use of "appear" here that the Special Counsel does not have conclusive evidence to demonstrate this.

Page 41

While the overlap between reported phishing victims and the output of DCLeaks cannot be denied, it is still unclear how bitcoin pools or leased infrastructure have been definitively tied back to any GRU officers or the GRU itself.

This isn't to say that there isn't evidence of it (I would assume there is some evidence or intelligence that supports the premise to some degree, at the very least) but we have no idea what that could be and there is no explanation of how associations to individual GRU officers were made (perhaps to protect HUMINT but this still leaves us completely in the dark as to how attributions were made) .

We know already that things are assumed by the Special Counsel on the basis of circumstantial evidence, so there is good reason to question whether the attributions made are based on conclusive evidence.

Page 42

This is the first point at which to recall Assange's announcement on 12 June that WikiLeaks was working on a release of "emails related to Hillary Clinton" - two days before the DNC goes public about being hacked by Russians, and three days before the appearance of Guccifer 2.0.

It's also approximately one month before Mueller says Guccifer 2.0 first successfully sent anything to WikiLeaks.

Whoever was controlling the Guccifer 2.0 persona went out of their way to be perceived as Russian and made specious claims about having already sent WikiLeaks documents, even claiming that WikiLeaks would release them soon (all before Mueller records any initial contact between the parties) .

While WikiLeaks did mention this via their Twitter feed on June 16, 2016, they were clearly skeptical of his claims to be a hacker and although they cite his claim about sending material to WikiLeaks, they don't confirm it:

It also seems a little odd that the GRU would do searches for already translated phrases (using Google translate to get English translations would be more understandable) and if it's Guccifer 2.0 doing it why did he not use the VPN he used for his other activities throughout the same day?

Why does the Mueller report not report on the IP address of the Moscow-based server from which searches occurred? It wouldn't really expose sources and methods to disclose it and it's unclear how it was determined to have been used and managed by a unit of the GRU. (Citation #146 references the Netyksho indictment, however, that fails to provide evidence or explanation of this too.)

Also, Guccifer 2.0 did not attribute the hack to a Romanian hacker in his first blog post , he didn't mention nationality until a week later (after he'd already gone out of his way to leave Russian breadcrumbs behind ) .

Page 43

The version of the opposition research document Guccifer 2.0 released was built using a prepared "Russian-tainted" template document .

The template was made by taking an attachment from one of John Podesta's emails (a document originally authored by Warren Flood in 2008) , stripping out the content, adding in Russian language stylesheet entries , altering "Confidential Draft" in the background of the document to "Confidential", altering the footer and then stripping out the body content.

The body content of a Trump Opposition research document (originally authored by Lauren Dillon) that was attached to another of Podesta's emails was then copied into the template document.

The document was saved (with a Russian author name), its body content cleared and this was then re-used to produce two further "Russia-tainted" documents.

It was no accident that led to the documents being tainted in the way that they were and it looks like Guccifer 2.0's version of the Trump opposition research didn't really come from the DNC.

Page 43

The email sent to The Smoking Gun revealed that Guccifer 2.0 appeared to be operating from somewhere in the central (US) time zone . It is one of several inexplicable examples of US timezone indications from Guccifer 2.0.

Page 43

It should be noted that the data referenced above was also unrelated to the general election and didn't have any noticeable impact on it (the 2.5Gb of data Guccifer 2.0 provided to Aaron Nevins was unlikely to have hurt the Clinton campaign or affect the outcome of the general election) .

In the states that the data related to, general election results didn't flip between the time of the publication of the documents and the election:

Page 43

Interesting to note that Guccifer 2.0 lied about DCLeaks being a "sub project" of WikiLeaks.

Page 44

The only materials Mueller alleges that WikiLeaks confirmed receipt of was a "1gb or so" archive, for which, instructions to access were communicated in an attached message (none-too-discreetly titled "wk dnc link1.txt.gpg") and sent by Guccifer 2 via unencrypted email.

It is an assumption that this was an archive of DNC emails (it could have contained other files Guccifer 2.0 subsequently released elsewhere).

We don't even know for sure whether WikiLeaks released what had been sent to them by either entity.

Even if, theoretically, the archive contained the emails, it couldn't have been the whole collection because the whole collection, when compressed, exceeds 2Gb of data .

This, of course, doesn't rule out the possibility of it being a portion of the overall collection but what the persona had sent to WikiLeaks could also easily have been other material relating to the DNC that we know Guccifer 2.0 later released or shared with other parties.

Page 45

This is the second point at which to recall Assange's 12 June TV announcement of upcoming "emails related to Hillary Clinton", coming two days before Guccifer 2.0's colleagues at DCLeaks reach out to WikiLeaks via unencrypted means on 14 June 2016 to offer "sensitive information" on Clinton.

Then, seven days after Guccifer 2 had already claimed to have sent material to WikiLeaks and stated that they'd soon release it (which made it sound as though he'd had confirmation back), we see that WikiLeaks reaches out to Guccifer 2.0 and suggests he sends material to them (as though there's never been any prior contact or provision of materials previously discussed) .

Page 45

How is it "clear" that both the DNC and Podesta documents were transferred from the GRU to WikiLeaks when there is only around a gigabyte of data acknowledged as received (and we don't even know what that data is) and little is known about the rest (and the report just speculates at possibilities) ?

Page 46

We aren't provided the full dialogue between WikiLeaks and Guccifer 2.0. Instead we have just a few words selected from the communication that could easily be out of context. The Netyksho indictment did exactly the same thing. Neither the indictment nor the report provide the full DM conversation in context.

(It certainly wouldn't harm HUMINT resources or expose methods if this evidence was released in full context.)

Would the GRU really engage in internal communications (eg GRU Guccifer 2.0 to GRU DCLeaks) via Twitter DMs? Maybe, but it seems insanely sloppy with regards to operational security of a clandestine organization communicating between its own staff.

The statement that concludes on the following page (see below) also seems a little bizarre. Would WikiLeaks really ask Guccifer 2.0 to DM DCLeaks to pass on such a message on their behalf?

Why doesn't Mueller provide the comms evidence of WikiLeaks asking Guccifer 2.0 for assistance in contacting DCLeaks?

As written, we are expected to take the words of Guccifer 2.0 (stating that the media organisation wished to talk to DCLeaks) at face value.

The problem with this is that we are talking about a persona who lied publicly about when he first sent material to WikiLeaks ( claiming to have done so already on the day appeared ) , lied about the relationship between WikiLeaks and DCLeaks and who had gone to a great deal of trouble to leave false Russian fingerprints in his work output.

Page 47

It was actually the last-modification date, not the creation date that was recorded as 19 September, 2016.

This wasn't necessarily the creation date and is only indicative of the last recorded write/copy operation (unless last modification date is preserved when copying but there's no way to determine that based on the available evidence) .

The gap between email file timestamps and attachment timestamps may simply be explained by WikiLeaks extracting the attachments from the EML files at a later stage. With the DNC emails we observed last-modifications dates as far back as May 23, 2016 but the attachments had last-modification dates that were much later (eg. July 21, 2016).

The wording is also worth noting: "Based on information about Assange's computer and its possible operating system" [emphasis mine] does not sound like it's based on reliable and factual information, it sounds like this is based on assessment/estimation. This also seems to be relying on an assumption that the only person handling files for WikiLeaks is Assange.

How have the Special Counsel cited WikiLeaks metadata for evidence where it's suited them yet, somehow, have managed to miss the May 23, 2016 date on which the DNC emails were initially being collected?

Going further, the report, based on speculation, suggests that the GRU staged releases in July (for DNC emails) and September (for Podesta emails). However, going off the same logic as the Special Counsel, with last-modification dates indicating when the email files are "staged", the evidence would theoretically point to the DNC emails being "staged" in May 2016).

It doesn't seem so reliable when the rule is applied multilaterally.

Of course, if both assumptions about staging dates are true, then we're left wondering what Julian Assange could have been talking about on June 12, 2016 when mentioning having emails relating to Hillary Clinton.

The speculation in the final paragraph of the above section also shows us that the Special Counsel lacks certainty on sources.

Page 48

Really, this correlation of dates (March 21, 2016 and the reported phishing incident relating to March 19, 2016) is one of the best arguments for saying that emails published by WikiLeaks were acquired through phishing or hacking incidents reported.

However, this merely suggests the method of acquisition, it says nothing of how the material got to WikiLeaks. We can make assumptions, but that's all we can do because the available evidence is circumstantial rather than conclusive.

Page 48

Far from "discredit[ing] WikiLeaks' claims about the source of the material it posted", the file transfer evidence doesn't conclusively demonstrate that WikiLeaks published anything sent to it by Guccifer 2.0 or DCLeaks.

Although there are hints that what was sent by Guccifer 2.0 related to the DNC, we don't know if this contained DNC emails or the other DNC related content he later released and shared with others.

"The statements about Seth Rich implied falsely that he had been the source of the stolen DNC emails" is itself a false statement. The reason Assange gave for offering a reward for information leading to the conviction of Seth Rich's killers was "Our sources take risks and they become concerned when they see things occurring like that [the death of DNC worker Seth Rich]... We have to understand how high the stakes are in the United States" ( source ) .

This implies WikiLeaks is offering the reward for info about Seth Rich at the behest of its actual source/s.

Page 49

By the time Trump had made the statements cited above, it was already assumed that Hillary had been hacked by the Russians, so Trump saying he hoped the Russians would find the emails seems more likely to have been in reference to what he assumed was already in their possession.

Finding those 30,000 emails also wouldn't be achieved through hacking at that point in time as the emails had already been deleted by Hillary Clinton's IT consultants in March 2015 .

Page 50

What is being described here is, to a considerable extent, just common exploit scanning on web services, scanning that will almost certainly have come from other nodes based in other nations too .

These scans are typically done via compromised machines, often with machines that are in nations completely separate to the nationality of those running the scanning effort.

The Department of Homeland Security threw cold water on this a long time ago.

DHS would not characterize these efforts as attacks, only "simple scanning ... which occurs all the time".

Page 51

There was no alteration of ballots or results at all anywhere as of a testimony by DHS Secretary Jeh Johnson on June 21 2017 nor since that time, according to Brian Krebs, to the date of a hearing on November 27, 2017 .

The remaining pages in this section of the report include a lot of redactions and mostly cover the actions of individuals in the US in relation to communications they had with or in relation to WikiLeaks. As this article is about the technical claims made in relation to hacking and so much is redacted, we'll only look at those really relevant to this.

Page 52

By the time Assange made the announcement referenced above, the Hillary Clinton emails obtained through FOIA had already been published by WikiLeaks.

Considering what WikiLeaks subsequently published, it would seem that Assange was making a reference to at least one of the upcoming leaks.

At this time, there was no record of contact between WikiLeaks and either of the parties alleged to be the GRU.

Page 58

Regarding the timing of the leaks and the Access Hollywood tape, it's important to note that journalist Stefani Maurizi, who had worked with WikiLeaks on the Podesta leaks, has stated publicly that she knew of WikiLeaks intention to publish on that date on the evening prior to it .

WikiLeaks stated the "timing conspiracy theory" was the other way round: " The [Access Hollywood] tape was moved forward to the day of our release, which WikiLeaks had been teasing " and was " well-documented ".

[The remaining pages in this section have little relevance to the technical aspects of this section of the report and/or acquisition of materials that this article is intended to cover.]


Circumstantial Evidence & Understandable Assumptions

While the above does show numerous issues with the report, it's important not to fall into the trap of outright dismissing as false anything for which evidence is lacking or assuming there is no evidence at all to support assertions.

However, without knowing what evidence exists we're left to make assumptions about whether it's conclusive or circumstantial, we don't know if the source of evidence is dependable and it's clear in the report that the Special Counsel has relied on assumptions and made numerous statements on the basis of presuppositions.

There is also a considerable amount of circumstantial evidence that, although it doesn't conclusively prove what the report tries to convince us of, it does at least raise questions about relationships between different entities, especially with regards to any overlaps in resources and infrastructure used.

For example, based on the cited evidence, it is perfectly understandable that people will assume Guccifer 2.0 provided DNC emails to WikiLeaks and will also assume that WikiLeaks published whatever it was that Guccifer 2.0 had sent them (especially with Mueller presenting that conversation in the form of a couple of words devoid of all context) .

The apparent overlap between a VPN service used by Guccifer 2.0 and by DCLeaks does suggest the two could be associated beyond Guccifer 2.0 just being a source of leaks for them.

Also, DCLeaks publishing some DNC emails that later appeared in the DNC email collection (though not necessarily from the same mailboxes) also suggests that DCLeaks and WikiLeaks could have had access to some of the same material and/or sources.

The same is true for Guccifer 2.0 releasing Podesta and DNC email attachments before WikiLeaks released both collections. Unless given good reason to consider any ulterior motive, the implied explanation, on the surface, seems to be that it was this persona that was a source for those emails. If nothing else, that's how it appears based on the little information typically made available to us by the mainstream press.

However, despite all of this, we still have not seen conclusive evidence showing that either of the entities was really controlled by the GRU and, when the countervailing evidence (which seems to have been completely ignored by the Special Counsel's investigation) is considered, there is reason to give consideration to Guccifer 2.0's efforts to not just associate himself with WikiLeaks and DCLeaks but also to associate third parties with each other through false claims.


The Mystery Of The May 23, 2016 Omission

One of the most notable omissions is the date on which emails from several mailboxes (including Luis Miranda's) were originally collected.

We know, from analysis of metadata of files hosted by WikiLeaks that this was May 23, 2016.

Not only is this prior to the May 25, 2016 - June 1, 2016 timeframe given for the DNC's exchange server being hacked, this activity is unmentioned throughout the entire report.

How has this failed to come to the surface when it should have been apparent in evidence CrowdStrike provided to the FBI and also apparent based on the WikiLeaks metadata? How is it the Special Counsel can cite some of the metadata in relation to WikiLeaks releases yet somehow manage to miss this?


Countervailing Evidence

What the Special Counsel's investigation also seems to have completely disregarded is the volume of countervailing evidence that has been discovered by several independent researchers in relation to the Guccifer 2.0 persona.

It's worth considering what evidence the Special Counsel has brought to the surface and comparing it with the evidence that has come to the surface as a result of discoveries being made by independent researchers over the past two years and the differences between the two sets of evidence (especially with regards to falsifiability and verifiability of evidence) .

Some excellent examples are covered in the following articles:


Reliability Of Attribution Methods

Skip Folden (who introduced me to VIPS members and has been a good friend ever since) recently shared with me his assessment of problems with the current attribution methods being relied on by the Special Counsel and others.

It covered several important points and was far more concise than anything I would have written, so, with his permission, I'm publishing his comments on this topic:

No basis whatsoever

APT28, aka Fancy Bear, Sofacy, Strontium, Pawn Storm, Sednit, etc., and APT29, aka Cozy Bear, Cozy Duke, Monkeys, CozyCar,The Dukes, etc., are used as 'proof' of Russia 'hacking' by Russian Intelligence agencies GRU and FSB respectively.

There is no basis whatsoever to attribute the use of known intrusion elements to Russia, not even if they were once reverse routed to Russia, which claim has never been made by NSA or any other of our IC.

On June 15, 2016 Dmitri Alperovitch himself, in an Atlantic Council article, gave only "medium-level of confidence that Fancy Bear is GRU" and "low-level of confidence that Cozy Bear is FSB." These assessments, from the main source himself, that either APT is Russian intelligence, averages 37%-38% [(50 + 25) / 2].

Exclusivity :

None of the technical indicators, e.g., intrusion tools (such as X-Agent, X-Tunnel), facilities, tactics, techniques, or procedures, etc., of the 28 and 29 APTs can be uniquely attributed to Russia, even if one or more had ever been trace routed to Russia. Once an element of a set of intrusion tools is used in the public domain it can be reverse-engineered and used by other groups which precludes the assumption of exclusivity in future use. The proof that any of these tools have never been reverse engineered and used by others is left to the student - or prosecutor.

Using targets

Also, targets have been used as basis for attributing intrusions to Russia, and that is pure nonsense. Both many state and non-state players have deep interests in the same targets and have the technical expertise to launch intrusions. In Grizzly Steppe, page 2, second paragraph, beginning with, "Both groups have historically targeted ...," is there anything in that paragraph which can be claimed as unique to Russia or which excludes all other major state players in the world or any of the non-state organizations? No.

Key Logger Consideration

On the subject of naming specific GRU officers initiating specific actions on GRU Russian facilities on certain dates / times, other than via implanted ID chips under the finger tips of these named GRU officers, the logical assumption would be by installed key logger capabilities, physical or malware, on one or more GRU Russian computers.

The GRU is a highly advanced Russian intelligence unit. It would be very surprising were the GRU open to any method used to install key logger capabilities. It would be even more surprising, if not beyond comprehension that the GRU did not scan all systems upon start-up and in real time, including key logger protection and anomalies of performance degradation and data transmissions.

Foreign intelligence source

Other option would be via a foreign intelligence unit source with local GRU access. Any such would be quite anti-Russian and be another nail in the coffin of any chain of evidence / custody validity at Russian site.


Chain Of Custody - Without An Anchor There Is No Chain

Another big problem with the whole RussiaGate investigation is the reliance on a private firm, hired by the DNC, to be the source of evidence.

As I don't have a good understanding of US law and processes surrounding evidence collection and handling, I will, again, defer to something that my aforementioned contact shared:

Chain of Evidence / Custody at US end, i.e., DNC and related computing facilities

Summary: There is no US end Chain of Evidence / Custody

The anchor of any chain of evidence custody is the on-site crime scene investigation of a jurisdictional law enforcement agency and neutral jurisdictional forensic team which investigate, discover, identify where possible, log, mark, package, seal, or takes images there of, of all identified elements of potential evidence as discovered at the scene of a crime by the authorized teams. The chain of this anchor is then the careful, documented movement of each element of captured evidence from crime scene to court.

In the case of the alleged series of intrusions into the DNC computing facilities, there is no anchor to any chain of evidence / custody.

There has been no claim that any jurisdictional law enforcement agency was allowed access to the DNC computing facilities. The FBI was denied access to DNC facilities, thereby supposedly denying the FBI the ability to conduct any on-site investigation of the alleged crime scene for discovery or collection of evidence.

Nor did the FBI exercise its authority to investigate the crime scene of a purported federal crime. Since when does the FBI need permission to investigate an alleged crime site where it is claimed a foreign government's intelligence attacked political files in order to interfere in a US presidential election?

Instead, the FBI accepted images of purported crime scene evidence from a contractor hired by and, therefore, working for the DNC. On July 05, 2017 a Crowdstrike statement said that they had provided "... forensic images of the DNC system to the FBI." It was not stated when these images were provided. Crowdstrike was working for the DNC as a contractor at the time.

This scenario is analogous to an employee of a crime scene owner telling law enforcement, "Trust me; I have examined the crime scene for you and here's what I've found. It's not necessary for you to see the crime scene."

Crowdstrike cannot be accepted as a neutral forensic organization. It was working for and being paid by the DNC. It is neither a law enforcement agency nor a federal forensic organization. Further Crowdstrike has serious conflicts of interest when it comes to any investigation of Russia.

Crowdstrike co-founder and Director of Technology, Dimitri Alperovitch, is a Nonresident Senior Fellow, Cyber Statecraft Initiative, of the Atlantic Council. Alperovitch has made it clear of his dislike of the government of Putin, and The Atlantic Council can not be considered neutral to Russia, receiving funding from many very staunch and outspoken enemies of Russia.

Summary: Not only was no federal jurisdictional law enforcement agency allowed to investigate the alleged crime scene, but the organization which allegedly collected and provided the 'evidence' was not neutral by being employed by the owner of the alleged crime scene, but seriously compromised by strong anti-Russian links.

This issue of this substitute for an anchor then leads us to our next problem: an apparent conflict of interest from the investigation's outset.


Conflict of Interest Inherent In The Investigation?

Would it seem like a conflict of interest if the person in charge of an investigation were friends with a witness and source of critical evidence relied upon by that investigation?

This is effectively the situation we have with the Special Counsel investigation because Robert Mueller and CrowdStrike's CSO (and President) Shawn Henry are former colleagues and friends.

Their history at the FBI is well known and their continued association after Henry had left the agency ( having dinner together at an executive retreat ) has been noted.

If nothing else, it's understandable for people to feel that the Special Counsel would have struggled to be truly impartial due to such relationships.


Conclusion

The Special Counsel seems to have been impervious to critical pieces of countervailing evidence (some of which demonstrates that Guccifer 2.0 deliberately manufactured Russian breadcrumbs) and they have failed to accurately account for the acquisition of WikiLeaks' DNC emails (missing the date on which approximately 70% of them were collected) , which is, in itself, a stunning failure for a supposedly thorough investigation costing US taxpayers tens of millions of dollars.

There should have been a proper, thorough, independent and impartial investigation into the Guccifer 2.0 persona. The Special Counsel certainly hasn't done that job and, in retrospect, looks to have been ill-equipped (and perhaps somewhat reluctant) to do so from the outset.


This article may be republished/reproduced in part or in full on condition that content above is unaltered and that the author is credited (or, alternatively, that a link to the full article is included).

[Apr 25, 2019] Much of CrowdStrike's role is not really to provide any sort of relevant technical expertise or investigation, but to serve as an outside "expert" to provides the "correct" claims to form the basis of a desired media narrative

Apr 25, 2019 | www.unz.com

James Forrestal , says: April 24, 2019 at 10:59 pm GMT

@annamaria

Your whole tirade was triggered by a reference to CrowdStrike.

Interesting observation -- and appears to be true.

needless defiant

The word choice is quite revealing here. His objection has nothing to do with truth. He views you as " defying " the officially-endorsed narrative; committing the unpardonable crime of unauthorized noticing .

All that the notorious "17 intelligence agencies" canard ever amounted to was the heads of the 3 major inteligence agencies lining up and chanting "We believe Alperovitch!" in unison. Kind of ironic that the entire "Russian hackers" trope was based on the unsupported claim of an actual Russian hacker.

Regardless of how the Trump administration is working out, the simple fact that no US law enforcement agency ever examined the DNC's servers -- and that the officially-promoted media narrative skips over this fact, and minimizes the role of Alperovitch and CrowdStrike, demonstrates the extent of the deception involved in that narrative.

https://www.zerohedge.com/news/2017-03-24/what-crowdstrike-firm-hired-dnc-has-ties-hillary-clinton-ukrainian-billionaire-and-g

"The firm's CTO and co-founder, Dmitri Alperovitch, is a senior fellow at the Atlantic Council, a think tank with openly anti-Russian sentiments that is funded by Ukrainian billionaire (((Victor Pinchuk))), who also happened to donate at least $10 million to the Clinton Foundation."

CrowdStrike was pretty tight with Obama as well as Hillary.

https://archive.fo/6PEuq

"CrowdStrike Inc. today announced that Steven Chabinsky, CrowdStrike's general counsel and chief risk officer, has been appointed by the President to the Commission on Enhancing National Cybersecurity."

Crowdstrike has never made a profit, and does not disclose sales figures, but seems to have little difficulty in raising venture capital, and somehow reached a (private) valuation of $1B in 2017 -- and $3B a year later:

http://fortune.com/2018/06/19/cybersecurity-crowdstrike-funding-value/

Their first major round of investment was in 2015, with Google Capital, Warburg Pincus, and Rackspace as the major investors.

CrowdStrike and Alperovitch have promoted some other rather strange and improbable allegations about alleged "hackers" and "hacking":

https://medium.com/@jeffreycarr/the-gru-ukraine-artillery-hack-that-may-never-have-happened-820960bbb02d
https://www.voanews.com/a/crowdstrike-comey-russia-hack-dnc-clinton-trump/3776067.html
http://themillenniumreport.com/2017/01/dnc-russian-hackers-found/

Look at the cover of the Crowdstrike "report" on the imaginary "Fancy Bear" Ukrainian artillery hack that they tried to promote:

https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf

Looks like a comic book cover. Clown world.

It's also interesting to note that the metadata for the Guccifer 2.0 files is not consistent with a "hack" over the interwebz from Romania -- since it was transferred at 23 MB/s:

https://theforensicator.wordpress.com/guccifer-2-ngp-van-metadata-analysis/

that's thumb drive or LAN -- an internal leak, not a "hack."

CrowdStrike's role in the Russia conspiracy theory hacking/ meddling/ colluding allegations was minimized in favor of the even more authoritative-sounding "37 intelligence agencies" claim, but a large part of their usual role seems to to serve as a sort of "SPLC" for hacking attributions. Just as the SPLC provides the appearance of an "independent," "authoritative" source to designate so-called "hate groups" and "hate crimes," much of CrowdStrike's role is not really to provide any sort of relevant technical expertise or investigation, but to serve as an outside "expert" to provides the "correct" claims to form the basis of a desired media narrative.

See also the "Syrian Observatory for Human Rights," the "White Helmets," Rita Katz's "SITE Intelligence," etc

[Apr 25, 2019] Why did the DNC not allow the FBI to investigate the so-called" Russian hacked" emails? Rather, they hire Crowd Strike

Most probably because there was no hack: it was created by Crowdstrike out of plain cloth to fuel Russiagate.
Apr 25, 2019 | consortiumnews.com

Johnny Ryan S , April 22, 2019 at 13:38

Why did the DNC not allow the FBI to investigate the so-called" Russian hacked" emails? Rather, they hire Crowd Strike did you know:
1)Obama Appoints CrowdStrike Officer To Admin Post Two Months Before June 2016 Report On Russia Hacking DNC
2) CrowdStrike Co-Founder Is Fellow On Russia Hawk Group, Has Connections To George Soros, Ukrainian Billionaire
3) DNC stayed that the FBI never asked to investigate the servers -- that is a lie.
4) CrowdStrike received $100 million in investments led by Google Capital (since re-branded as CapitalG) in 2015. CapitalG is owned by Alphabet, and Eric Schmidt, Alphabet's chairman, was a supporter of Hillary Clinton in the 2016 election. More than just supporting Clinton, leaked emails from Wikileaks in November 2016 showed that in 2014 he wanted to have an active role in the campaign.

-daily caller and dan bongino have been bringing these points up since 2016.

[Apr 23, 2019] Crowdstrike and the reprise of the Iraq-WMD Fiasco

Notable quotes:
"... In May, the company, Crowdstrike, determined that the hack was the work of the Russians. As one unnamed intelligence official told BuzzFeed, "CrowdStrike is pretty good. There's no reason to believe that anything that they have concluded is not accurate ..."
"... Perhaps not. Yet Crowdstrike is hardly a disinterested party when it comes to Russia. Crowdstrike's founder and chief technology officer, Dmitri Alperovitch , is also a senior fellow at the Washington think tank, The Atlantic Council, which has been at the forefront of escalating tensions with Russia. ..."
"... As I reported in The Nation in early January , the connection between Alperovitch and the Atlantic Council is highly relevant given that the Atlantic Council is funded in part by the State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk. In recent years, it has emerged as a leading voice calling for a new Cold War with Russia. ..."
"... But meanwhile the steady drumbeat of "blame Russia" is having an effect. According to a recent you.gov/Economist poll, 58 percent of Americans view Russia as "unfriendly/enemy" while also finding that 52 percent of Democrats believed Russia "tampered with vote tallies." ..."
Feb 03, 2017 | consortiumnews.com

Originally from: A Reprise of the Iraq-WMD Fiasco -- Consortiumnews

... ... ...

A Dangerous Replay?

Today something eerily similar to the pre-war debate over Iraq is taking place regarding the allegations of Russian interference in the U.S. presidential election. Assurances from the intelligence community and from anonymous Obama administration "senior officials" about the existence of evidence is being treated as, well, actual evidence.

State Department spokesman John Kirby told CNN that he is "100% certain" of the role that Russia played in U.S. election. The administration's expressions of certainty are then uncritically echoed by the mainstream media. Skeptics are likewise written off, slandered as " Kremlin cheerleaders " or worse.

Unsurprisingly, The Washington Post is reviving its Bush-era role as principal publicist for the government's case. Yet in its haste to do the government's bidding, the Post has published two widely debunked stories relating to Russia (one on the scourge of Russian inspired "fake news", the other on a non-existent Russian hack of a Vermont electric utility) onto which the paper has had to append "editor's notes" to correct the original stories.

Yet, those misguided stories have not deterred the Post's opinion page from being equally aggressive in its depiction of Russian malfeasance. In late December, the Post published an op-ed by Rep. Adam Schiff and former Rep. Jane Harmon claiming "Russia's theft and strategic leaking of emails and documents from the Democratic Party and other officials present a challenge to the U.S. political system unlike anything we've experienced."

On Dec. 30, the Post editorial board chastised President-elect Trump for seeming to dismiss "a brazen and unprecedented attempt by a hostile power to covertly sway the outcome of a U.S. presidential election." The Post described Russia's actions as a "cyber-Pearl Harbor."

On Jan. 1, the neoconservative columnist Josh Rogin told readers that the recent announcement of sanctions against Russia "brought home a shocking realization that Russia is using hybrid warfare in an aggressive attempt to disrupt and undermine our democracy."

Meanwhile, many of the same voices who were among the loudest cheerleaders for the war in Iraq have also been reprising their Bush-era roles in vouching for the solidity of the government's case.

Jonathan Chait, now a columnist for New York magazine, is clearly convinced by what the government has thus far provided. "That Russia wanted Trump to win has been obvious for months," writes Chait.

"Of course it all came from the Russians, I'm sure it's all there in the intel," Charles Krauthammer told Fox News on Jan. 2. Krauthammer is certain.

And Andrew Sullivan is certain as to the motive. "Trump and Putin's bromance," Sullivan told MSNBC's Chris Matthews on Jan. 2, "has one goal this year: to destroy the European Union and to undermine democracy in Western Europe."

David Frum, writing in The Atlantic , believes Trump "owes his office in considerable part to illegal clandestine activities in his favor conducted by a hostile, foreign spy service."

Jacob Weisberg agrees, tweeting: "Russian covert action threw the election to Donald Trump. It's that simple." Back in 2008, Weisberg wrote that "the first thing I hope I've learned from this experience of being wrong about Iraq is to be less trusting of expert opinion and received wisdom." So much for that.

Foreign Special Interests

Another, equally remarkable similarity to the period of 2002-3 is the role foreign lobbyists have played in helping to whip up a war fever. As readers will no doubt recall, Ahmed Chalabi, leader of the Iraqi National Congress, which served, in effect as an Iraqi government-in-exile, worked hand in hand with the Washington lobbying firm Black, Kelly, Scruggs & Healey (BKSH) to sell Bush's war on television and on the op-ed pages of major American newspapers.

Chalabi was also a trusted source of Judy Miller of the Times, which, in an apology to its readers on May 26, 2004, wrote : "The most prominent of the anti-Saddam campaigners, Ahmad Chalabi, has been named as an occasional source in Times articles since at least 1991, and has introduced reporters to other exiles. He became a favorite of hard-liners within the Bush administration and a paid broker of information from Iraqi exiles." The pro-war lobbying of the American Israel Public Affairs Committee has also been exhaustively documented .

Though we do not know how widespread the practice has been as of yet, something similar is taking place today. Articles calling for confrontation with Russia over its alleged "hybrid war" with the West are appearing with increasing regularity . Perhaps the most egregious example of this newly popular genre appeared on Jan. 1 in Politico magazine. That essay, which claims, among many other things, that "we're in a war" with Russia comes courtesy of one Molly McKew.

McKew is seemingly qualified to make such a pronouncement because she, according to her bio on the Politico website, served as an "adviser to Georgian President Saakashvili's government from 2009-2013, and to former Moldovan Prime Minister Filat in 2014-2015." Seems reasonable enough. That is until one discovers that McKew is actually registered with the Department of Justice as a lobbyist for two anti-Russian political parties, Georgia's UMN and Moldova's PLDM.

Records show her work for the consulting firm Fianna Strategies frequently takes her to Capitol Hill to lobby U.S. Senate and Congressional staffers, as well as prominent U.S. journalists at The Washington Post and The New York Times, on behalf of her Georgian and Moldovan clients.

"The truth," writes McKew, "is that fighting a new Cold War would be in America's interest. Russia teaches us a very important lesson: losing an ideological war without a fight will ruin you as a nation. The fight is the American way." Or, put another way: the truth is that fighting a new Cold War would be in McKew's interest -- but perhaps not America's.

While you wouldn't know it from the media coverage (or from reading deeply disingenuous pieces like McKew's) as things now stand, the case against Russia is far from certain. New developments are emerging almost daily. One of the latest is a report from the cyber-engineering company Wordfence, which concluded that "The IP addresses that DHS [Department of Homeland Security] provided may have been used for an attack by a state actor like Russia. But they don't appear to provide any association with Russia."

Indeed, according to Wordfence, "The malware sample is old, widely used and appears to be Ukrainian. It has no apparent relationship with Russian intelligence and it would be an indicator of compromise for any website."

On Jan. 4, BuzzFeed reported that, according to the DNC, the FBI never carried out a forensic examination on the email servers that were allegedly hacked by the Russian government. "The FBI," said DNC spokesman Eric Walker, "never requested access to the DNC's computer servers."

What the agency did do was rely on the findings of a private-sector, third-party vendor that was brought in by the DNC after the initial hack was discovered. In May, the company, Crowdstrike, determined that the hack was the work of the Russians. As one unnamed intelligence official told BuzzFeed, "CrowdStrike is pretty good. There's no reason to believe that anything that they have concluded is not accurate . "

Perhaps not. Yet Crowdstrike is hardly a disinterested party when it comes to Russia. Crowdstrike's founder and chief technology officer, Dmitri Alperovitch , is also a senior fellow at the Washington think tank, The Atlantic Council, which has been at the forefront of escalating tensions with Russia.

As I reported in The Nation in early January , the connection between Alperovitch and the Atlantic Council is highly relevant given that the Atlantic Council is funded in part by the State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk. In recent years, it has emerged as a leading voice calling for a new Cold War with Russia.

Time to Rethink the 'Group Think'

And given the rather thin nature of the declassified evidence provided by the Obama administration, might it be time to consider an alternative theory of the case? William Binney, a 36-year veteran of the National Security Agency and the man responsible for creating many of its collection systems, thinks so. Binney believes that the DNC emails were leaked, not hacked, writing that "it is puzzling why NSA cannot produce hard evidence implicating the Russian government and WikiLeaks. Unless we are dealing with a leak from an insider, not a hack."

None of this is to say, of course, that Russia did not and could not have attempted to influence the U.S. presidential election. The intelligence community may have intercepted damning evidence of the Russian government's culpability. The government's hesitation to provide the public with more convincing evidence may stem from an understandable and wholly appropriate desire to protect the intelligence community's sources and methods. But as it now stands the publicly available evidence is open to question.

But meanwhile the steady drumbeat of "blame Russia" is having an effect. According to a recent you.gov/Economist poll, 58 percent of Americans view Russia as "unfriendly/enemy" while also finding that 52 percent of Democrats believed Russia "tampered with vote tallies."

With Congress back in session, Armed Services Committee chairman John McCain is set to hold a series of hearings focusing on Russian malfeasance, and the steady drip-drip-drip of allegations regarding Trump and Putin is only serving to box in the new President when it comes to pursuing a much-needed detente with Russia.

It also does not appear that a congressional inquiry will start from scratch and critically examine the evidence. On Friday, two senators -- Republican Lindsey Graham and Democrat Sheldon Whitehouse -- announced a Senate Judiciary subcommittee investigation into Russian interference in elections in the U.S. and elsewhere. But they already seemed to have made up their minds about the conclusion: "Our goal is simple," the senators said in a joint statement "To the fullest extent possible we want to shine a light on Russian activities to undermine democracy."

So, before the next round of Cold War posturing commences, now might be the time to stop, take a deep breath and ask: Could the rush into a new Cold War with Russia be as disastrous and consequential -- if not more so -- as was the rush to war with Iraq nearly 15 years ago? We may, unfortunately, find out.

James W Carden is a contributing writer for The Nation and editor of The American Committee for East-West Accord's eastwestaccord.com. He previously served as an advisor on Russia to the Special Representative for Global Inter-governmental Affairs at the US State Department.


Don G. , February 5, 2017 at 14:29

Questioning whether the Russians hacked or didn’t hack is playing into the US narrative to demonize Russia. (Putin)
It simple doesn’t matter as all nations hack as much as possible to enhance and protect their national interests. Surely Russia has hacked against the US no more than a tenth of what the US had done against Russia.

The narrative is nothing but a propaganda lie but it’s been accepted by the American people and mostly because of the fight that goes on due to domestic politics, one major party against the other.

There’s a very good reason to stop promoting the narrative because it only helps to bring Americans onside with more efforts to demonize Putin and to keep all sides in the US promoting their aggression worldwide. Americans are likely easily 90% prowar now and will show little or no resistance to the coming war on Iran. <img alt='' src='https://secure.gravatar.com/avatar/f05d2bb98b641e9e9ab8f3dc738e31a0?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/f05d2bb98b641e9e9ab8f3dc738e31a0?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

yugo , February 4, 2017 at 13:54

Hysteria has reached fever pitch. Russia’s fake news is apparently so beguiling that it even threatens western democratic discourse. Combine this with its cyber weaponry and Moscow, so we are told, may interfere in this year’s German elections to benefit the hard-right. Such incessant fear mongering has already prompted calls for the censorship of Russian propaganda. It won’t be long before a witch-hunt emerges, directed against ‘fellow travellers’, those who dare to doubt the Russian threat.

They insist the west made matters worse in Ukraine by not acknowledging that it was a classic example of a young state that didn’t naturally command the allegiance of all its peoples. Other examples are Georgia’s Abkhazians and South Ossetians, Moldova’s Trans-Dniester Slavs and Azerbaijan’s Nagorno-Karabakh Armenians.

They also doubt the Russian threat to the Baltic states. What is amazing is Moscow’s temperate response to Estonia and Latvia’s gross violation of international norms in denying citizenship to those of its Russian minority who are not conversant in Estonian and Latvian respectively. Nato and the EU turned a blind eye when membership was granted to these two states.

Fellow travellers furthermore claim the west will keep on floundering in the Middle East as long as it persists in treating Saudi Arabia as a valued ally, while viewing Iran as a permanent enemy. We have for far too long ignored Saudi Arabia’s promotion of Wahhabism and its playing of the destructive sectarian card against ‘apostate’ Shiites. Take the merciless attacks on Shiite worshippers by Sunni jihadis of a Wahhabist persuasion. It occurs with sickening regularity throughout the Middle East. The terrorists attacking westerners are invariably Sunni jihadis, not Shiites. Worse still, Saudi Arabia together with Nato member Turkey facilitated the emergence of Isis. We bizarrely gave priority to toppling Syria’s secular regime.

The first loyalty of these fellow travellers is to their nation state rather than unfettered globalism. No wonder the western elite disparage their national patriotism, calling it populism. It was, after all, the Achilles Heel of Homo Sovieticus. The elite fear the same fate awaits Homo Europaeus and globalist Homo Economicus.

Michael K Rohde , February 3, 2017 at 15:12

This is beginning to look exactly like Iraq 2 and why the same players that led us into that fake war which is still not paid for because the initiators made sure and get themselves a tax cut before they launched it are still being listened to makes it clear. Even with a change in administrations and party our government continues in the same wrong headed direction, to war with the enemies of Israel. When will it stop? When will we take back control of our foreign policy and destiny. <img alt='' src='https://secure.gravatar.com/avatar/cc900a84653501242923790946494dbc?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/cc900a84653501242923790946494dbc?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Michael Hoefler , February 3, 2017 at 23:29

As Ray McGovern said several times (not quoting): that Israel is the elephant in the room. Netayahu will not rest until he has all of the Arab states fighting among themselves. IMO he thinks that that will guarantee Israel protection.
IMO – all that does is put Israel into a continuing worse situation. There will always be someone stronger to come along to overcome them – someday – sometime. If they made peace with those nations and worked with them, traded with them – they would be much safer in the long run.

Banger , February 3, 2017 at 14:22

The mainstream media in th USA and, increasingly in the rest of the West are vehicles for propaganda from various factions within the Imperial Deep State. All these outlets are good for is to map the power relations between these factions at least this the case in the major issues of the day.

This misbehavior going on right now. One factions close to Trump wants to go to war with Iran because, of course there has to be war or the Deep State as a whole stuffers and the people will begin to look at their shakles. The other faction wishes to go to a brinksmanship sort of Cold War situation. The Trumpists believe that making friends with Russia and then destroying Iranian power is the best approach to controlling the MENA region by creating a loose alliance of KSA, Israel, Turkey and Russia in which a weak Iran would be forced to enter the Empire and Russia in return would be given more control of Ukraine and Eastern Europe. I suspect Trump may also want to undercut NATO and the EU. That is my guess. To put it another way, Russia is strong and well led and Iran is not.

stan , February 3, 2017 at 14:17

You can read chapter 6 of Mein Kampf if you want to see how this war propaganda stuff works. It is not group think or mistaken ideas. It is deliberate lies to scare you and a carefully crafted false narrative to make it all seem reasonable. People cannot believe that their leaders would tell such a big lie, and that’s why it works. The goal is murder and conquest to get territory, natural resources, and control of business and commerce. Controlling markets for drugs, gambling, and prostitution is for nickel and dime crooks. Controlling markets for natural resources, banking, and consumer and industrial goods is where the real money is. Think of governments as criminal business syndicates and you aren’t far off. Remember, President Obama had a hit list, flew around plane loads of secret cash to make illegal payoffs, and bragged about offing his opponent in the head and dumping his body in the river.

Jeremy , February 4, 2017 at 11:33

Yes, Stan,well put! you will never see this sort of talk in the articles here, as the consipiracy theorist label is always one to avoid, but I agree that when we think in terms of a group of people trying to attain “security” the same way any other gangster does, it becomes much less far fetched. George Carlin said, “It’s a big club, and you ain’t in it!” Men and women of power and wealth will always do what they have to in order to preserve that power and wealth for their children. There is really no conspiracy needed, just a bunch of people at the top looking after themselves and their families.

Tania Messina , February 3, 2017 at 14:13

Ah, yes, we’ve always needed a boogeyman to keep us all crazed with fear and the neocons busy with their destruction of society. If there is a crazy out there today, it is those neocons and their puppets who were so intent on destroying “seven countries in five years” and not being able to achieve that diabolical end as so neatly planned. And, now, they’re throwing temper tantrums, because, surprise of surprises! a non career politician comes along who uses common sense for a change and dares to say, “Why can’t we be friends with Russia?” With that comment many exhausted Americans perked up and listened while the Dulles boys turned somersaults in their graves!

The arrogance and superiority of those who constantly blame Russia for their alleged expansionist ambitions seem blinded to our own aggressions. Fifteen years in Iraq? We finally have a president who talks of peace and we demonize him as the warmonger ready to press the button, while I seem to remember that it was the other candidate who arrogantly referred to Putin as Hitler!

It is articles like this one by James Carden that we should be teaching in our schools, researching the facts and discussing in our classrooms so that hopefully a new generation might grow up with intelligent exchange rather than the brainwash that has been strangling our society for too many years.

Mark Thomason , February 3, 2017 at 13:04

This controversy is driven by Democratic denial of defeat, and infighting in which those defeated seek to hang on to power inside the Democratic Party. It is the Hillary crowd. It can be evidence free because it is driven by political calculation of private power needs, not truth.

And the WMD fiasco is a perfect comparison, because the same people drove the same sort of fact-free theme for private reasons, as Wolfowitz put it, the story around which varying separate interests could be rallied.

[Apr 21, 2019] NYT The Tables Have Turned -- Time To Investigate The FBI, Steele And The Rest Of The Witch Hunters

The country was divided before Mueller Report. Now it is even more divided.
Notable quotes:
"... We wouldn't know that a Clinton-linked operative, Joseph Mifsud, seeded Trump campaign aide George Papadopoulos with the rumor that Russia had 'Dirt' on Hillary Clinton - which would later be coaxed out of Papadopoulos by a Clinton-linked Australian ambassador, Alexander Downer, and that this apparent 'setup' would be the genesis of the FBI's " operation crossfire hurricane " operation against the Trump campaign. ..."
"... We wouldn't know about the role of Fusion GPS - the opposition research firm hired by Hillary Clinton's campaign to commission the Steele dossier. Fusion is also linked to the infamous Trump Tower meeting , and hired Nellie Ohr - the CIA-linked wife of the DOJ's then-#4 employee, Bruce Ohr. Nellie fed her husband Bruce intelligence she had gathered against Trump while working for Fusion , according to transcripts of her closed-door Congressional testimony. ..."
"... Now the dossier -- financed by Hillary Clinton's campaign and the Democratic National Committee , and compiled by the former British intelligence agent Christopher Steele -- is likely to face new, possibly harsh scrutiny from multiple inquiries . - NYT ..."
"... The report was debunked after internet sleuths traced the IP address to a marketing server located outside Philadelphia, leading Alfa Bank executives to file a lawsuit against Fusion GPS in October 2017, claiming their reputations were harmed by the Steele Dossier. ..."
"... And who placed the Trump-Alfa theory with various media outlets? None other than former FBI counterintelligence officer and Dianne Feinstein aide Dan Jones - who is currently working with Fusion GPS and Steele to continue their Trump-Russia investigation funded in part by George Soros . ..."
"... Of course, when one stops painting with broad brush strokes, it's clear that the dossier was fabricated bullshit. ..."
"... after a nearly two-year investigation by special counsel Robert Mueller and roughly 40 FBI agents and other specialists, no evidence was found to support the dossier's wild claims of "DNC moles, Romanian hackers, Russian pensioners, or years of Trump-Putin intelligence trading ," as the Times puts it. ..."
"... As there was spying, there must necessarily also have been channels to get the information thus gathered back to its original buyer - the Clinton campaign. Who passed the information back to Clinton, and what got passed? ..."
"... the NYTt prints all the news a scumbag would. remember Judith Miller, the Zionazi reporter the NYT ..."
"... There was no 'hack.' That is the big, anti-Russia, pro-MIC lie which all the other lies serve. ..."
"... Seth Rich had the means and the motive. So did Imran Awan, but it would make no sense for Awan to turn anything over to wikileaks . . .he would have kept them as insurance. ..."
"... Until the real criminals are processed and the media can be restored you don't have a United States. This corruption is beyond comprehension. You had the (((media)) providing kickbacks to the FBI for leaked information. These bribes are how CNN was on site during Roger Stones invasion. ..."
"... So now the narrative is, "We were wrong about Russian collusion, and that's Russia's fault"?! ..."
Apr 21, 2019 | www.zerohedge.com

As we now shift from the "witch hunt" against Trump to 'investigating the investigators' who spied on him - remember this; Donald Trump was supposed to lose the 2016 election by almost all accounts. And had Hillary won, as expected, none of this would have seen the light of day .

We wouldn't know that a hyper-partisan FBI had spied on the Trump campaign , as Attorney General William Barr put it during his April 10 Congressional testimony .

We wouldn't know that a Clinton-linked operative, Joseph Mifsud, seeded Trump campaign aide George Papadopoulos with the rumor that Russia had 'Dirt' on Hillary Clinton - which would later be coaxed out of Papadopoulos by a Clinton-linked Australian ambassador, Alexander Downer, and that this apparent 'setup' would be the genesis of the FBI's " operation crossfire hurricane " operation against the Trump campaign.

We wouldn't know about the role of Fusion GPS - the opposition research firm hired by Hillary Clinton's campaign to commission the Steele dossier. Fusion is also linked to the infamous Trump Tower meeting , and hired Nellie Ohr - the CIA-linked wife of the DOJ's then-#4 employee, Bruce Ohr. Nellie fed her husband Bruce intelligence she had gathered against Trump while working for Fusion , according to transcripts of her closed-door Congressional testimony.

And if not for reporting by the Daily Caller 's Chuck Ross and others, we wouldn't know that the FBI sent a longtime spook, Stefan Halper, to infiltrate and spy on the Trump campaign - after the Obama DOJ paid him over $400,000 right before the 2016 US election (out of more than $1 million he received while Obama was president).

According to the New York Times , the tables are turning, starting with the Steele Dossier.

[T]he release on Thursday of the report by the special counsel , Robert S. Mueller III, underscored what had grown clearer for months -- that while many Trump aides had welcomed contacts with the Russians, some of the most sensational claims in the dossier appeared to be false, and others were impossible to prove . Mr. Mueller's report contained over a dozen passing references to the document's claims but no overall assessment of why so much did not check out.

Now the dossier -- financed by Hillary Clinton's campaign and the Democratic National Committee , and compiled by the former British intelligence agent Christopher Steele -- is likely to face new, possibly harsh scrutiny from multiple inquiries . - NYT

While Congressional Republicans have vowed to investigate, the DOJ's Inspector General is considering whether the FBI improperly relied on the dossier when they used it to apply for a surveillance warrant on Trump campaign adviser Carter Page. The IG also wants to know about Steele's sources and whether the FBI disclosed any doubts as to the veracity of the dossier .

Attorney General Barr, meanwhile, said he will review the FBI's conduct in the Russia investigation after saying the agency spied on the Trump campaign .

Doubts over the dossier

The FBI's scramble to vet the dossier's claims are well known. According to an April, 2017 NYT report , the FBI agreed to pay Steele $50,000 for "solid corroboration" of his claims . Steele was apparently unable to produce satisfactory evidence - and was ultimately not paid for his efforts:

Mr. Steele met his F.B.I. contact in Rome in early October, bringing a stack of new intelligence reports. One, dated Sept. 14, said that Mr. Putin was facing "fallout" over his apparent involvement in the D.N.C. hack and was receiving "conflicting advice" on what to do.

The agent said that if Mr. Steele could get solid corroboration of his reports, the F.B.I. would pay him $50,000 for his efforts, according to two people familiar with the offer. Ultimately, he was not paid . - NYT

Still, the FBI used the dossier to obtain the FISA warrant on Page - while the document itself was heavily shopped around to various media outlets . The late Sen. John McCain provided a copy to Former FBI Director James Comey, who already had a version, and briefed President Trump on the salacious document. Comey's briefing to Trump was then used by CNN and BuzzFeed to justify reporting on and publishing the dossier following the election.

Let's not forget that in October, 2016, both Hillary Clinton and her campaign chairman John Podesta promoted the conspiracy theory that a secret Russian server was communicating with Trump Tower.

The report was debunked after internet sleuths traced the IP address to a marketing server located outside Philadelphia, leading Alfa Bank executives to file a lawsuit against Fusion GPS in October 2017, claiming their reputations were harmed by the Steele Dossier.

And who placed the Trump-Alfa theory with various media outlets? None other than former FBI counterintelligence officer and Dianne Feinstein aide Dan Jones - who is currently working with Fusion GPS and Steele to continue their Trump-Russia investigation funded in part by George Soros .

Dan Jones, George Soros, Glenn Simpson

Russian tricks? The Times notes that Steele "has not ruled out" that he may have been fed Russian disinformation while assembling his dossier.

That would mean that in addition to carrying out an effective attack on the Clinton campaign, Russian spymasters hedged their bets and placed a few land mines under Mr. Trump's presidency as well.

Oleg D. Kalugin, a former K.G.B. general who now lives outside Washington, saw that as plausible. "Russia has huge experience in spreading false information," he said. - NYT

In short, Steele is being given an 'out' with this admission.

A lawyer for Fusion GPS, Joshua Levy, says that the Mueller report substantiated the "core reporting" in the Steele memos - namely that "Trump campaign figures were secretly meeting Kremlin figures," and that Russia's president, Vladimir V. Putin, had directed "a covert operation to elect Donald J. Trump."

Of course, when one stops painting with broad brush strokes, it's clear that the dossier was fabricated bullshit.

The dossier tantalized Mr. Trump's opponents with a worst-case account of the president's conduct. And for those trying to make sense of the Trump-Russia saga, the dossier infused the quest for understanding with urgency.

In blunt prose, it suggested that a foreign power had fully compromised the man who would become the next president of the United States.

The Russians, it asserted, had tried winning over Mr. Trump with real estate deals in Moscow -- which he had not taken up -- and set him up with prostitutes in a Moscow hotel in 2013, filming the proceedings for future exploitation. A handful of aides were described as conspiring with the Russians at every turn.

Mr. Trump, it said, had moles inside the D.N.C. The memos claimed that he and the Kremlin had been exchanging intelligence for eight years and were using Romanian hackers against the Democrats , and that Russian pensioners in the United States were running a covert communications network . - NYT

And after a nearly two-year investigation by special counsel Robert Mueller and roughly 40 FBI agents and other specialists, no evidence was found to support the dossier's wild claims of "DNC moles, Romanian hackers, Russian pensioners, or years of Trump-Putin intelligence trading ," as the Times puts it.

Now that the shoe is on the other foot, and key Democrats backing away from talks of impeachment, let's see if lady justice will follow the rest of us down the rabbit hole.


Yippie21 , 2 minutes ago link

This is why the whole FISA court is a joke. What is their remedy if their power is abused? What happens. Well,... the FISA courts was lied to and found out about it in the early 2000's. Mueller was FBI chief. So they got a strongly worded dressing-down, a mark in their permanent record from high school, and NO ONE was fired... no one was sanctioned, no agent was transferred to Alaska.

Fast forward 10 or 12 years and the FBI is doing this **** again. Lying to the court... you know the court where there are no Democrat judges or Republican judges.. they are all super awesome.... and what is the remedy when the FISA court is told they've been lied to by the FBI and used in a intel operation with MI6, inserting assets, into a freaking domestic Presidential campaign!!! and then they WON. Good god.

And what do we hear from our court? Nadda. Do we hear of some Federal Judges hauling FBI and DOJ folks in front of them and throwing them in jail? Nope. It appears from here... that our Federal Justices are corrupt and have no problem letting illegal police-state actions go on with ZERO accountability or recourse. They could care less evidently. It's all secret you know... trust us they say.. Why aren't these judges publicly making loud noises about how the judiciary is complicit , with the press, in wholesale spying and leaking for political reasons AND a coup attempt when the wrong guy won.???

Where is awesome Justice Roberts? Why isn't he throwing down some truth on just how compromised the rule of law in his courts clearly are in the last 10 years? The FISA court is his baby. It does no good for them to assure us they are concerned too, and they've taken action and sent strongly worded letters. Pisses me off. ? Right? heck of rant...

San Pedro , 2 minutes ago link

When did Russians interfere in our elections?? 2016. Who was president when Russians interfered with elections?? oobama. Who was head of the CIA?? Brennan. Who was National Intelligence director?? Clapper. Who was head of the FBI when the Russians interfered in our elections?? Comey. The pattern is obvious. When Trump was a private citizen the oobama and all his cabinet appointees and Intel Managers had their hands on all the levers and instruments of Government..and did nothing . Your oobama is guilty of treason and failing his Oath Of Office...everybody knows this.

Scipio Africanuz , 4 minutes ago link

This article is still a roundabout gambit to blame Russia.

Fair enough, where's Bill Browder? In England. Browder's allegations were utilized to try and damage Russia, even though Russia (not the USSR), is about the most reliable friend America has.

Russia helped Lincoln, and were it not for that crucial help, there'd be no America to sanction Russia today. The Tsar paid for that help with his dynasty, when Nicholas II was murdered, and dethroned.

Americans are truly ungrateful brutes..

Now, sanctions, opprobrium, and hatred are heaped on Russia, most cogently by chauvinistic racists, who look down their noses at Rus (Russ) and yet, cannot sacrifice 25 millions of their own people, for the sake of others.

Russians are considered subhuman, and yet, the divine spark of humanity resides solely in their breasts. The zionists claim a false figure of 6 million for a faux holocaust, and yet, nobody pays attention to the true holocaust of 25 millions, or the many millions before that disastrous instigated war.

That the Russians are childlike, believing others to be like them, loyal, self sacrificing, and generous, has now brought the world to the brink of armageddon, and still, they bear the burden of proof, though their accusers, who ought provide the evidence, are bereft of any..

Thomas Jefferson it was, who observing whatever he observed, exclaimed in cogent agitation, that "I fear for my countrymen, when I remember that God is Just, and His Justice does not repose forever".

Investigate Jared and Ivanka Kushner, along with Charles Kushner, and much ought be clear, no cheers...

King of Ruperts Land , 5 minutes ago link

I don't buy that "Few bad apples at the top", "Good rank and file" Argument. I have never seen one. We should assume everyone from the top to the bottom of FBI, DOJ, and State, just to get started, probably every other three better agency is bad. At least incompotent, at worst treasonous.

Sanity Bear , 15 minutes ago link

As there was spying, there must necessarily also have been channels to get the information thus gathered back to its original buyer - the Clinton campaign. Who passed the information back to Clinton, and what got passed?

besnook , 20 minutes ago link

the NYTt prints all the news a scumbag would. remember Judith Miller, the Zionazi reporter the NYT used to push the Iraq war with all sorts of ********? after the war was determined to be started under a false premise and became common knowledge there were no wmds in iraq the nyt came forward and reported the war was ******** as if they were reporting breaking news.

they have done the same thing here. they pushed the russiagate story with both barrels even though the informed populace knew it was ******** before trump was sworn in as potus. now that the all the holes in the story are readily apparent the nyt comes forward with breaking revelation that something is wrong with the story.

ClickNLook , 23 minutes ago link

Now we will have another 2 years of investigation and another expensive and meaningless report. WWE Soup Opera continues. Plot sickens.

I Am Jack's Macroaggression , 30 minutes ago link

There was no 'hack.' That is the big, anti-Russia, pro-MIC lie which all the other lies serve.

I Am Jack's Macroaggression , 30 minutes ago link

There was no 'hack.' That is the big, anti-Russia, pro-MIC lie which all the other lies serve.

His name is Seth Rich.

DaBard51 , 24 minutes ago link

The Seth Rich investigation; where is it now? Murder of a campaign staffer; tampering with or influencing an election, is it not? Hmmm... When nine hundred years old you become, look this good you will not.

ClickNLook , 19 minutes ago link

Once upon a time there was a Bernie supporter. And his name was Seth Rich. Then there was a "botched robbery", which evidence that was concluded on, I have no idea. Do you? Anyhow, The End.

Amy G. Dala , 22 minutes ago link

Seth Rich had the means and the motive. So did Imran Awan, but it would make no sense for Awan to turn anything over to wikileaks . . .he would have kept them as insurance.

Why wouldn't Assange name the source for the DNC emails? Is this a future bargaining chip? And what if he did name Seth Rich? He would have to prove it. Could he?

ComeAndTakeIt , 10 minutes ago link

They've got Assange now...Maybe they should ask him if it was Seth Rich who gave him the emails?

Maybe even do it under oath and on national television. I don't think it's still considered "burning a source" if your source has already been murdered....

Bricker , 32 minutes ago link

Until the real criminals are processed and the media can be restored you don't have a United States. This corruption is beyond comprehension. You had the (((media)) providing kickbacks to the FBI for leaked information. These bribes are how CNN was on site during Roger Stones invasion.

Treason and Sedition is rampant in America and all SPY roads lead to Clapper, Brennan and Obama...This needs attention.

The media is abusive and narrating attacks on a dully elected president

Mike Rotsch , 35 minutes ago link

Oleg D. Kalugin, a former K.G.B. general who now lives outside Washington, saw that as plausible. "Russia has huge experience in spreading false information," he said. - NYT

You have got to be ******* kidding me. So now the narrative is, "We were wrong about Russian collusion, and that's Russia's fault"?!

[Apr 21, 2019] Escobar The Deep State Vs. WikiLeaks by Pepe Escobar

Notable quotes:
"... John Pilger, among few others, has already stressed how a plan to destroy WikiLeaks and Julian Assange was laid out as far back as 2008 – at the tail end of the Cheney regime – concocted by the Pentagon's shady Cyber Counter-Intelligence Assessments Branch. ..."
"... But it was only in 2017, in the Trump era, that the Deep State went totally ballistic; that's when WikiLeaks published the Vault 7 files – detailing the CIA's vast hacking/cyber espionage repertoire. ..."
"... This was the CIA as a Naked Emperor like never before – including the dodgy overseeing ops of the Center for Cyber Intelligence, an ultra-secret NSA counterpart. ..."
"... The monolithic narrative by the Deep State faction aligned with the Clinton machine was that "the Russians" hacked the DNC servers. Assange was always adamant; that was not the work of a state actor – and he could prove it technically. ..."
"... The DoJ wanted a deal – and they did make an offer to WikiLeaks. But then FBI director James Comey killed it. The question is why. ..."
"... Some theoretically sound reconstructions of Comey's move are available. But the key fact is Comey already knew – via his close connections to the top of the DNC – that this was not a hack; it was a leak. ..."
"... Ambassador Craig Murray has stressed, over and over again (see here ) how the DNC/Podesta files published by WikiLeaks came from two different US sources; one from within the DNC and the other from within US intel. ..."
"... he release by WikiLeaks in April 2017 of the malware mechanisms inbuilt in "Grasshopper" and the "Marble Framework" were indeed a bombshell. This is how the CIA inserts foreign language strings in source code to disguise them as originating from Russia, from Iran, or from China. The inestimable Ray McGovern, a VIPS member, stressed how Marble Framework "destroys this story about Russian hacking." ..."
"... No wonder then CIA director Mike Pompeo accused WikiLeaks of being a "non-state hostile intelligence agency" ..."
"... Joshua Schulte, the alleged leaker of Vault 7, has not faced a US court yet. There's no question he will be offered a deal by the USG if he aggress to testify against Julian Assange. ..."
"... George Galloway has a guest who explains it all https://www.youtube.com/watch?v=7VvPFMyPvHM&t=8s ..."
"... Escobar is brain dead if he can't figure out that Trumpenstein is totally on board with destroying Assange. As if bringing on pukes like PompAss, BoltON, and Abrams doesn't scream it. ..."
Apr 20, 2019 | www.zerohedge.com

Authored by Pepe Escobar via The Strategic Culture Foundation,

The Made-by-FBI indictment of Julian Assange does look like a dead man walking. No evidence. No documents. No surefire testimony. Just a crossfire of conditionals...

But never underestimate the legalese contortionism of US government (USG) functionaries. As much as Assange may not be characterized as a journalist and publisher, the thrust of the affidavit is to accuse him of conspiring to commit espionage.

In fact the charge is not even that Assange hacked a USG computer and obtained classified information; it's that he may have discussed it with Chelsea Manning and may have had the intention to go for a hack. Orwellian-style thought crime charges don't get any better than that. Now the only thing missing is an AI software to detect them.

https://www.rt.com/shows/going-underground/456414-assange-wkileaks-asylum-london/video/5cb1c797dda4c822558b463f

Assange legal adviser Geoffrey Robertson – who also happens to represent another stellar political prisoner, Brazil's Lula – cut straight to the chase (at 19:22 minutes);

"The justice he is facing is justice, or injustice, in America I would hope the British judges would have enough belief in freedom of information to throw out the extradition request."

That's far from a done deal. Thus the inevitable consequence; Assange's legal team is getting ready to prove, no holds barred, in a British court, that this USG indictment for conspiracy to commit computer hacking is just an hors d'oeuvre for subsequent espionage charges, in case Assange is extradited to US soil.

All about Vault 7

John Pilger, among few others, has already stressed how a plan to destroy WikiLeaks and Julian Assange was laid out as far back as 2008 – at the tail end of the Cheney regime – concocted by the Pentagon's shady Cyber Counter-Intelligence Assessments Branch.

It was all about criminalizing WikiLeaks and personally smearing Assange, using "shock troops enlisted in the media -- those who are meant to keep the record straight and tell us the truth."

This plan remains more than active – considering how Assange's arrest has been covered by the bulk of US/UK mainstream media.

By 2012, already in the Obama era, WikiLeaks detailed the astonishing "scale of the US Grand Jury Investigation" of itself. The USG always denied such a grand jury existed.

"The US Government has stood up and coordinated a joint interagency criminal investigation of Wikileaks comprised of a partnership between the Department of Defense (DOD) including: CENTCOM; SOUTHCOM; the Defense Intelligence Agency (DIA); Defense Information Systems Agency (DISA); Headquarters Department of the Army (HQDA); US Army Criminal Investigation Division (CID) for USFI (US Forces Iraq) and 1st Armored Division (AD); US Army Computer Crimes Investigative Unit (CCIU); 2nd Army (US Army Cyber Command); Within that or in addition, three military intelligence investigations were conducted. Department of Justice (DOJ) Grand Jury and the Federal Bureau of Investigation (FBI), Department of State (DOS) and Diplomatic Security Service (DSS). In addition, Wikileaks has been investigated by the Office of the Director of National Intelligence (ODNI), Office of the National CounterIntelligence Executive (ONCIX), the Central Intelligence Agency (CIA); the House Oversight Committee; the National Security Staff Interagency Committee, and the PIAB (President's Intelligence Advisory Board)."

But it was only in 2017, in the Trump era, that the Deep State went totally ballistic; that's when WikiLeaks published the Vault 7 files – detailing the CIA's vast hacking/cyber espionage repertoire.

This was the CIA as a Naked Emperor like never before – including the dodgy overseeing ops of the Center for Cyber Intelligence, an ultra-secret NSA counterpart.

WikiLeaks got Vault 7 in early 2017. At the time WikiLeaks had already published the DNC files – which the unimpeachable Veteran Intelligence Professionals for Sanity (VIPS) systematically proved was a leak, not a hack.

The monolithic narrative by the Deep State faction aligned with the Clinton machine was that "the Russians" hacked the DNC servers. Assange was always adamant; that was not the work of a state actor – and he could prove it technically.

There was some movement towards a deal, brokered by one of Assange's lawyers; WikiLeaks would not publish the most damning Vault 7 information in exchange for Assange's safe passage to be interviewed by the US Department of Justice (DoJ).

The DoJ wanted a deal – and they did make an offer to WikiLeaks. But then FBI director James Comey killed it. The question is why.

It's a leak, not a hack

Some theoretically sound reconstructions of Comey's move are available. But the key fact is Comey already knew – via his close connections to the top of the DNC – that this was not a hack; it was a leak.

Ambassador Craig Murray has stressed, over and over again (see here ) how the DNC/Podesta files published by WikiLeaks came from two different US sources; one from within the DNC and the other from within US intel.

There was nothing for Comey to "investigate". Or there would have, if Comey had ordered the FBI to examine the DNC servers. So why talk to Julian Assange?

T he release by WikiLeaks in April 2017 of the malware mechanisms inbuilt in "Grasshopper" and the "Marble Framework" were indeed a bombshell. This is how the CIA inserts foreign language strings in source code to disguise them as originating from Russia, from Iran, or from China. The inestimable Ray McGovern, a VIPS member, stressed how Marble Framework "destroys this story about Russian hacking."

No wonder then CIA director Mike Pompeo accused WikiLeaks of being a "non-state hostile intelligence agency", usually manipulated by Russia.

Joshua Schulte, the alleged leaker of Vault 7, has not faced a US court yet. There's no question he will be offered a deal by the USG if he aggress to testify against Julian Assange.

It's a long and winding road, to be traversed in at least two years, if Julian Assange is ever to be extradited to the US. Two things for the moment are already crystal clear. The USG is obsessed to shut down WikiLeaks once and for all. And because of that, Julian Assange will never get a fair trial in the "so-called 'Espionage Court'" of the Eastern District of Virginia, as detailed by former CIA counterterrorism officer and whistleblower John Kiriakou.

Meanwhile, the non-stop demonization of Julian Assange will proceed unabated, faithful to guidelines established over a decade ago. Assange is even accused of being a US intel op, and WikiLeaks a splinter Deep State deep cover op.

Maybe President Trump will maneuver the hegemonic Deep State into having Assange testify against the corruption of the DNC; or maybe Trump caved in completely to "hostile intelligence agency" Pompeo and his CIA gang baying for blood. It's all ultra-high-stakes shadow play – and the show has not even begun.


JailBanksters , 40 minutes ago link

Not to mention the Pentagram has silenced 100,000 whistleblower complaints by Intimidation, threats, money or accidents over 5 years . A Whistleblower only does this when know there is something seriously wrong. Just Imagine how many knew something was wrong but looked the other way.

ExPat2018 , 47 minutes ago link

George Galloway has a guest who explains it all https://www.youtube.com/watch?v=7VvPFMyPvHM&t=8s

Betrayed , 2 hours ago link

Maybe President Trump will maneuver the hegemonic Deep State into having Assange testify against the corruption of the DNC; or maybe Trump caved in completely to "hostile intelligence agency" Pompeo and his CIA gang baying for blood.

Escobar is brain dead if he can't figure out that Trumpenstein is totally on board with destroying Assange. As if bringing on pukes like PompAss, BoltON, and Abrams doesn't scream it.

besnook , 2 hours ago link

assange and wikileaks are the real criminals despite being crimeless. the **** is a sanctioned criminal, allowed to be criminal with the system because the rest of the sanctioned criminals would be exposed if she was investigated.

this is not the rule of laws. this is the law of rulers.

_triplesix_ , 2 hours ago link

Anyone seen Imran Awan lately?

Four chan , 34 minutes ago link

yeah those ***** go free because they got everything on the stupid dems and they are muslim.

assange exposes the podesta dws and clinton fraud against bernie voters+++ and hes the bad guy. yeah right

hillary clinton murdered seth rich sure as **** too.

[Apr 20, 2019] The Guccifer 2.0 Gaps in Mueller s Full Report undermine the validity of findings

Apr 10, 2019 | consortiumnews.com

Originally from: The 'Guccifer 2.0' Gaps in Mueller's Full Report April 18, 2019 • 12 Commentsave

Like Team Mueller's indictment last July of Russian agents, the full report reveals questions about Wikileaks' role that much of the media has been ignoring, writes Daniel Lazare.

By Daniel Lazare
Special to Consortium News

<img src="https://consortiumnews.com/wp-content/uploads/2018/04/Daniel-Lazare-150x150.jpg" alt="" width="100" height="100" /> A s official Washington pores over the Gospel According to Saint Robert, an all-important fact about the Mueller report has gotten lost in the shuffle. Just as the Christian gospels were filled with holes , the latest version is too – particularly with regard to WikiLeaks and Julian Assange.

The five pages that the special prosecutor's report devotes to WikiLeaks are essentially lifted from Mueller's indictment last July of 12 members of the Russian military intelligence agency known as the GRU. It charges that after hacking the Democratic National Committee, the GRU used a specially-created online persona known as Guccifer 2.0 to transfer a gigabyte's worth of stolen emails to WikiLeaks just as the 2016 Democratic National Convention was approaching. Four days after opening the encrypted file, the indictment says, "Organization 1 [i.e. WikiLeaks] released over 20,000 emails and other documents stolen from the DNC network by the Conspirators [i.e. the GRU]."

<img aria-describedby="caption-attachment-35305" src="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM.png" alt="Barr holding press conference on full Mueller report, April 18, 2019. (YouTube)" width="1248" height="612" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM.png 848w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-400x196.png 400w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-768x377.png 768w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-700x343.png 700w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-160x78.png 160w" sizes="(max-width: 1248px) 100vw, 1248px" />

Attorney General William Barr holding press conference on full Mueller report, April 18, 2019. (YouTube)

Mueller's report says the same thing, but with the added twist that Assange then tried to cover up the GRU's role by suggesting that murdered Democratic National Committee staffer Seth Rich may have been the source and by telling a congressman that the DNC email heist was an "inside job" and that he had "physical proof" that the material was not from Russian.

All of which is manna from heaven for corporate news outlets eager to pile on Assange, now behind bars in London. An April 11, 2019, New York Times news analysis , for instance, declared that "[c]ourt documents have revealed that it was Russian intelligence – using the Guccifer persona – that provided Mr. Assange thousands of emails hacked from the Democratic National Committee," while another Times article published shortly after his arrest accuses the WikiLeaks founder of "promoting a false cover story about the source of the leaks."

But there's a problem: it ain't necessarily so. The official story that the GRU is the source doesn't hold water, as a timeline from mid-2016 shows. Here are the key events based on the GRU indictment and the Mueller report:

June 12: Assange tells Britain's ITV that another round of Democratic Party disclosures is on the way: "We have upcoming leaks in relation to Hillary Clinton, which is great. WikiLeaks is having a very big year." June 14: The Democratic National Committee accuses Russia of hacking its computers. June 15: Guccifer 2.0 claims credit for the hack. "The main part of the papers, thousands of files and mails, I gave to WikiLeaks ," he brags . "They will publish them soon." June 22: WikiLeaks tells Guccifer via email: "Send any new material here for us to review and it will have a much higher impact than what you are doing." July 6: WikiLeaks sends Guccifer another email: "if you have anything hillary related we want it in the next tweo [ sic ] days prefable [ sic ] because the DNC [Democratic National Convention] is approaching and she will solidify bernie supporters behind her after."Replies Guccifer: "ok . . . i " July 14: Guccifer sends WikiLeaks an encrypted file titled "wk dnc link1.txt.gpg." July 18: WikiLeaks confirms it has opened "the 1Gb or so archive" and will release documents "this week." July 22: WikiLeaks releases more than 20,000 DNC emails and 8,000 other attachments.

According to Mueller and obsequious news outlets like the Times , the sequence is clear: Guccifer sends archive, WikiLeaks receives archive, WikiLeaks accesses archive, WikiLeaks publishes archive. Donald Trump may not have colluded with Russia, but Julian Assange plainly did. [Attorney General Will Barr, significantly calling WikiLeaks a publisher, said at his Thursday press conference: " Under applicable law, publication of these types of materials would not be criminal unless the publisher also participated in the underlying hacking conspiracy."]

<img aria-describedby="caption-attachment-35300" src="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM.png" alt="Deputy Attorney General Rod Rosenstein announcing in 2018 a grand jury indictment of 12 Russian intelligence officers for hacking offenses related to the 2016 U.S. presidential election. (Wikimedia Commons) " width="1236" height="611" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM.png 973w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-400x198.png 400w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-768x380.png 768w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-700x346.png 700w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-160x79.png 160w" sizes="(max-width: 1236px) 100vw, 1236px" />

Deputy Attorney General Rod Rosenstein announcing in 2018 the grand jury indictment of 12 GRU agents. (Wikimedia Commons)

Avoiding Questions

The narrative raises questions that the press studiously avoids. Why, for instance, would Assange announce on June 12 that a big disclosure is on the way before hearing from the supposed source? Was there a prior communication that Mueller has not disclosed? What about the reference to "new material" on June 22 – does that mean Assange already had other material in hand? After opening the Guccifer file on July 18, why would he publish it just four days later? Would that give WikiLeaks enough time to review some 28,000 documents to insure they're genuine?

Honor Bob Parry's legacy by donating to our Spring Fund Drive.

"If a single one of those emails had been shown to be maliciously altered," blogger Mark F. McCarty observes , "Wikileaks' reputation would have been in tatters." There's also the question that an investigator known as Adam Carter poses in Disobedient Media : why would Guccifer brag about giving WikiLeaks "thousands of files" that he wouldn't send for another month?

The narrative doesn't make sense – a fact that is crucially important now that Assange is fighting for his freedom in the U.K. New Yorker staff writer Raffi Khatchadourian sounded a rare note of caution last summer when he warned that little about Guccifer 2.0 adds up. While claiming to be the source for some of WikiLeaks ' most explosive emails, the material he released on his own had proved mostly worthless – 20 documents that he "said were from the DNC but which were almost surely not," as Khatchadourian puts it, a purported Hillary Clinton dossier that "was nothing of the sort," screenshots of emails so blurry as to be "unreadable," and so forth.

<img aria-describedby="caption-attachment-35303" src="https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image.jpg" alt="John Podesta at the spin room of the second presidential debate of 2016. (Voice of America via Wikimedia Commons)" width="500" height="341" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image.jpg 650w, https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image-400x273.jpg 400w, https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image-160x109.jpg 160w" sizes="(max-width: 500px) 100vw, 500px" />

John Podesta: Target of a phishing expedition. (Voice of America via Wikimedia Commons)

While insisting that "our source is not the Russian government and it is not a state party, Assange told Khatchadourian that the source was not Guccifer either. "We received quite a lot of submissions of material that was already published in the rest of the press, and people seemingly submitted the Guccifer archives," he said somewhat cryptically. "We didn't publish them. They were already published." When Khatchadourian asked why he didn't put the material out regardless, he replied that "the material from Guccifer 2.0 – or on WordPress – we didn't have the resources to independently verify."

No Time for Vetting

So four days was indeed too short a time to subject the Guccifer file to proper vetting. Of course, Mueller no doubt regards this as more "dissembling," as his report describes it. Yet WikiLeaks has never been caught in a lie for the simple reason that honesty and credibility are all-important for a group that promises to protect anonymous leakers who supply it with official secrets. (See "Inside WikiLeaks : Working with the Publisher that Changed the World," Consortium News , July 19, 2018.) Mueller, by contrast, has a rich history of mendacity going back to his days as FBI director when he sought to cover up the Saudi role in 9/11 and assured Congress on the eve of the 2003 invasion that Iraqi weapons of mass destruction pose "a clear threat to our national security."

<img aria-describedby="caption-attachment-35301" src="https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage.jpg" alt="Mueller with President George W. Bush on July 5, 2001, as he is being appointed FBI director. (White House)" width="501" height="373" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage.jpg 600w, https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage-400x298.jpg 400w, https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage-160x119.jpg 160w" sizes="(max-width: 501px) 100vw, 501px" />

Mueller with President George W. Bush on July 5, 2001, as he is being appointed FBI director. (White House)

So if the Mueller narrative doesn't hold up, the charge of dissembling doesn't either. Indeed , as ex-federal prosecutor Andrew C. McCarthy observes in The National Review , the fact that the feds have charged Assange with unauthorized access to a government computer rather than conspiring with the Kremlin could be a sign that Team Mueller is less than confident it can prove collusion beyond a reasonable doubt. As he puts it, the GRU indictment "was more like a press release than a charging instrument" because the special prosecutor knew that the chances were zero that Russian intelligence agents would surrender to a U.S. court.

Indeed, when Mueller charged 13 employees and three companies owned by Russian businessman Yevgeny Prigozhin with interfering in the 2016 election, he clearly didn't expect them to surrender either. Thus , his team seemed taken aback when one of the alleged " troll farms " showed up in Washington asking to be heard. The prosecution's initial response, as McCarthy put it , was to seek a delay "on the astonishing ground that the defendant has not been properly served – notwithstanding that the defendant has shown up in court and asked to be arraigned." When that didn't work, prosecutors tried to limit Concord's access to some 3.2 million pieces of evidence on the grounds that the documents are too " sensitive " for Russian eyes to see. If they are again unsuccessful, they may have no choice but to drop the charges entirely, resulting in yet another " public relations disaster " for the Russia-gate investigation.

None of which bodes well for Mueller or the news organizations that worship at his shrine. After blowing the Russia-gate story all these years, why does the Times continue to slander the one news organization that tells the truth?

Daniel Lazare is the author of "The Frozen Republic: How the Constitution Is Paralyzing Democracy" (Harcourt Brace, 1996) and other books about American politics. He has written for a wide variety of publications from The Nation to Le Monde Diplomatique and blogs about the Constitution and related matters at D aniellazare.com .

[Apr 19, 2019] The connection between pro-Israel Lobby efforts and the covert operations and overt invasions of America's national security state.

Notable quotes:
"... Blumenthal does chronicle a decades-long panoply of active measures by numerous pro-Israel Lobby figures, groups and think tanks. Yet he fails to explicitly recognize the connection between pro-Israel Lobby efforts and the covert operations and overt invasions of America's national security state. ..."
"... Julian Assange of Wikileaks was more explicit. Assange named the "country that has interfered in U.S. elections, has endangered Americans living or working overseas and has corrupted America's legislative and executive branches. It has exploited that corruption to initiate legislation favorable to itself, has promoted unnecessary and unwinnable wars and has stolen American technology and military secrets. Its ready access to the mainstream media to spread its own propaganda provides it with cover for its actions and it accomplishes all that and more through the agency of a powerful and well-funded domestic lobby [ ] That country is, of course, Israel." ..."
Apr 19, 2019 | consortiumnews.com

Abe , April 18, 2019 at 23:23

Behind the Omar Outrage: Suppressed History of the pro-Israel Lobby

Max Blumenthal's article and his 2019 book, The Management of Savagery: How America's National Security State Fueled the Rise of Al Qaeda, ISIS, and Donald Trump (2019), is an impressive exercise in burying the lede.

Blumenthal does chronicle a decades-long panoply of active measures by numerous pro-Israel Lobby figures, groups and think tanks. Yet he fails to explicitly recognize the connection between pro-Israel Lobby efforts and the covert operations and overt invasions of America's national security state.

Julian Assange of Wikileaks was more explicit. Assange named the "country that has interfered in U.S. elections, has endangered Americans living or working overseas and has corrupted America's legislative and executive branches. It has exploited that corruption to initiate legislation favorable to itself, has promoted unnecessary and unwinnable wars and has stolen American technology and military secrets. Its ready access to the mainstream media to spread its own propaganda provides it with cover for its actions and it accomplishes all that and more through the agency of a powerful and well-funded domestic lobby [ ] That country is, of course, Israel."

[Apr 19, 2019] Early Assange quote

Apr 19, 2019 | www.moonofalabama.org

somebody , Apr 18, 2019 10:41:06 AM | link

Add to 80

Early Assange :

The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. This must result in minimization of efficient internal communications mechanisms (an increase in cognitive "secrecy tax") and consequent system-wide cognitive decline resulting in decreased ability to hold onto power as the environment demands adaption.

Hence in a world where leaking is easy, secretive or unjust systems are nonlinearly hit relative to open, just systems. Since unjust systems, by their nature induce opponents, and in many places barely have the upper hand, mass leaking leaves them exquisitely vulnerable to those who seek to replace them with more open forms of governance.

[Apr 18, 2019] Wikileaks started as a Chinese dissident project which certainly had the support of the US military-intelligence complex. It quickly became something else,

Apr 18, 2019 | www.moonofalabama.org

somebody , Apr 18, 2019 6:52:44 AM | link

@wisdombody | Apr 18, 2019 3:09:38 AM | 71

They are the hacker/security blackhat/whitehead scene.
Another example where the actions of the empire bite back.

To understand where they are coming from read Yasha Levine's Surveillance Valley

US Tech Companies have an extremely nice "inclusive" "open" "transparent" company culture. People who don't drink the kool aid can deal with it, people who are on the Asperger/Authism range can't. And these are the people extremely gifted for tech.

Basically US military and secret services believed that Western "Freedom" (TM) was such a powerful advantage in global competition that open anonymous systems connecting dissidents would work to their advantage. They forgot that some people can't do double think.

Wikileaks started as a Chinese dissident project which certainly had the support of the US military-intelligence complex. It quickly became something else, simply because the people working in the project believed the ideology behind it and could not see that what is right for a Chinese dissident against the Chinese state was not right for a US dissident against the US state.

With Julian Assange in Belmarsh prison, everything about "open society" "transparency" "free media" "supporting dissidents" is in dispute.

[Apr 18, 2019] LIVE Wikileaks editor-in-chief holds presser on new criminal case involving Julian Assange

Notable quotes:
"... Assange has exposed so much of the Obama and Clinton cabal that they and their henchman would try any means possible to not have him extradited. ..."
"... Bit hard to spy on corrupt world leaders without the internet. Pretty sure Moreno has his own set of enemies, since he's blackmailing or bankrolling everyone in his sight with the backing of Goldman Sachs. Also black kettle, that's the most surveilled building in the world inside and out. ..."
Apr 18, 2019 | www.youtube.com

Angelor Not , 1 week ago

Assange has exposed so much of the Obama and Clinton cabal that they and their henchman would try any means possible to not have him extradited.

fionnualaable , 1 week ago

(From a horrified and disgusted Brit) My highest regard for: - the 3 dedicated panelists; - those among the honest Spanish police mentioned; - the brave Ecuadorian journalists pursuing presidential corruption charges; and: - elements of the UN not yet become toothless tigers re basic human rights. I have little if any hope such moral fibre will prevail (or be ALLOWED to do so) in the UK. Corruption and blind stupidity seem to have gone too far here, as they have in the USA, and possibly also even in the remaining "5 eyes" countries. Iberia (Portuguese Guteras at UN) has a chance to triumph in justice over degenerate Anglo-Saxon increasingly dictatorship regimes. Will they triumph? We'll see. The whole world will see. And the world has many many more than a mere 5 eyes.

Driver Driver , 3 days ago (edited)

The new president of Ecuador is a real thief. A real crook.

A M , 6 days ago

It's disgusting how the governments behave as we've seen the truth in Wikileaks which remains correct and truth 100% of the time...that's what the governments are scared of..... the truth and transparency..... it shows them for what they are hypocrites and lairs......!!!

Hoomanna Dee , 1 week ago

Bit hard to spy on corrupt world leaders without the internet. Pretty sure Moreno has his own set of enemies, since he's blackmailing or bankrolling everyone in his sight with the backing of Goldman Sachs. Also black kettle, that's the most surveilled building in the world inside and out.

Asylees are not supposed to be treated like criminals, he's without charge. The US, Ecuador's current government and the UK are violating international law. And the press is an anemic mess. Our message to them: you're next.

All journalism utilises sources and those sources are entitled to protection. Not a grand jury. Not a supermax. Not torture.

ishant 7 , 4 days ago

In India we call these so called journalisfs as PRESSTITUTES

nick f , 1 day ago

The cockroaches dont like when the rock is lifted and we see them for what they are. Assange lifted the rock and now the cockroaches are out to get him.

Nassau Events , 2 days ago

It is not surprising that Equodoreian leader has failed the integrity of the country and the people of Equodoreian. The fact that Julian Assange had full asylum was granted to him with full protection, it proved the government before protected the souverign country and its citizens as a country which is respected and free from any kind of being a puppet or slave and master position. Assange' s case is extremely important but in the meantime the position of Equodoreian people are let down on the world platform of shame. The day the new leader left Equodoreian naked.

Needful Things Company , 6 days ago

This is so wrong! He needs to be protected. Unless they are bringing him to USA to testify against the Clinton/Obama crimes. We never would have found out anything of the corruption and take down of the USA if it were not for his investigating reporting! Because the crooks got caught and exposed they are trying to destroy him. He acted like a reporter or what they use to be like. Just like the Nixon days but they broke into files. Assange was given information. He was not the spy from what I can gather! They should be thanking him for exposing the crimes that have been going on!

[Apr 18, 2019] Honest Government Ad on Julian Assange (hilarious video!)

Notable quotes:
"... "Authorized by the united bitches of america. ..."
Apr 18, 2019 | thesaker.is

https://www.youtube.com/watch?v=1efOs0BsE0g


worldblee on April 16, 2019 , · at 3:56 pm EST/EDT

That video is on fire! Good stuff!
Павел (Paul) on April 17, 2019 , · at 9:43 am EST/EDT
It is funny but the problem remains... I want to see serious hard hitting justice whatever it takes.
vot tak on April 17, 2019 , · at 8:28 pm EST/EDT
Oops, wrong "button".

Kruto.

"Authorized by the united bitches of america." Yeah, israel's bitches.

[Apr 17, 2019] Ecuador sells off Assange to US Ron Paul

It is unclear what danger WikiLeaks represents naw, as it probably was infiltrated. But publishing of Podesta emails and DNC files was really damaging to the Dems during 2016 elections.
Notable quotes:
"... "We have two foreign policies. We tell people what to do. And if they do it, we reward them. We give them a lot of money. If they don't, they're in for big trouble, they're liable to get bombed; we invade them, and there will be a coup," Dr. Paul said. ..."
"... "We find that Moreno, the president of Ecuador, did not do badly. He's been playing footsies with us, and gaining some money and he delivered, you know, after he became president – it's shame because the previous president the one that allowed or at least would at least Assange could be 'protected' to some degree," he stated. ..."
"... "The IMF has already delivered $4.2 billion to [Ecuador], and there's another six billion dollars in the pipeline for that," he said. ..."
Apr 17, 2019 | www.presstv.com

Dr. Paul, the founder of the Ron Paul Institute for Peace and Prosperity, made the remarks on Monday while discussing the violent arrest of Assange by UK Metropolitan Police last week at the Ecuadorian embassy in London, after the Moreno government cancelled his asylum.

The Australian whistleblower was arrested on behalf of the US on Thursday at the Ecuadorean embassy in London, where he had been granted asylum since 2012.

Assange, 47, is wanted by the US government for publishing classified documents related to the Iraq and Afghanistan wars that were leaked by American whistleblower Chelsea Manning. Assange spent seven years at the Ecuadorian embassy before his arrest.

https://www.youtube.com/embed/HqPAwI4EmsU?rel=0

"We have two foreign policies. We tell people what to do. And if they do it, we reward them. We give them a lot of money. If they don't, they're in for big trouble, they're liable to get bombed; we invade them, and there will be a coup," Dr. Paul said.

"We find that Moreno, the president of Ecuador, did not do badly. He's been playing footsies with us, and gaining some money and he delivered, you know, after he became president – it's shame because the previous president the one that allowed or at least would at least Assange could be 'protected' to some degree," he stated.

"But he (Moreno) evidently is out form and now of course he has delivered him. And this might not be even all of that. This probably is official tool of ours to provide these funds," the analyst noted.

"The IMF has already delivered $4.2 billion to [Ecuador], and there's another six billion dollars in the pipeline for that," he said.

PressTV-Moreno: Assange used Ecuador's London Embassy for spying President Moreno claims the WikiLeaks founder tried to use Ecuador's Embassy in London for spying activities during his almost seven-year stay.

Moreno on Sunday accused Assange of trying to use Ecuador's embassy in London as a "center for spying," and said that the decision to strip the whistleblower of his political asylum followed "violations" of that status.

In an interview with The Guardian , Moreno defended his decision on the Assange case.

"It is unfortunate that, from our territory and with the permission of authorities of the previous government, facilities have been provided within the Ecuadoran Embassy in London to interfere in processes of other states," the president said.

[Apr 16, 2019] Trump as a useful idiot of the Deep State

Apr 16, 2019 | www.zerohedge.com

Anunnaki , 11 hours ago link

If Trump pardoned Assange, I would consider that draining the swamp. But Orange Jewlius is a Deep State **** socket, so the swamp has grown to a lagoon

Anunnaki , 11 hours ago link

Jimmy Dore and Tucker Carlson nail it

https://m.youtube.com/watch?v=SnwC_1Pf9VQ

rtb61 , 12 hours ago link

Clearly the US government has zero respect for Australia, Australian Law or Australian citizens. The case is shite, else they would allow Assange to be deported to Australia and the extradition hearing to be heard there. They refuse because they know their case is shite and they would have to prove it in Australia before they could get extradition.

The USA is not an ally of Australia because it does not respect Australian law, not in the least. Prove US respect of Australians by deporting Assange to Australia and holding the extradition hearings there, else look as guilty as shite and never ever to be trusted by Australians.

OZZIDOWNUNDER , 9 hours ago link

The US Govt respects NOBODY but its own Interests. It's the Australian Govt that's complicit in this travesty of Nil justice. The Gutless Australian Govt has NO interest in helping Julian Assange because they were persuaded NOT to by their American masters. It hurts that your own Govt are total A$$holes & follow USA into Crimes with out question. The Australian Govt has a History of lip service only when assistance Overseas is required. **** them !

NYC80 , 13 hours ago link

Assange probably is a narcissist. So what? All the people criticizing him are, too. At least he's an honest narcissist. In everything he's published, not a single item has even been allegedly false. Can any of these other so-called "journalists" demonstrate that level of accuracy?

Ms No , 14 hours ago link

Here is a good article on Assange. Explains the cat. Things were okay for him under the real elected president of Ecuador, except no sunlight thanks to US spooks.

https://www.sott.net/article/411173-My-friend-Julian-Assange-Alicia-Castro-former-ambassador-for-Argentina

[Apr 16, 2019] Ray on Why the Deep State Hates Julian Assange

Apr 16, 2019 | www.unz.com

Saoirse , says: April 13, 2019 at 1:39 am GMT

http://raymcgovern.com/

Ray on Why the Deep State Hates Julian Assange

[Apr 15, 2019] 4 Myths About Julian Assange DEBUNKED Zero Hedge

Apr 15, 2019 | www.zerohedge.com

Myth #2: Assange Will Get a Fair Trial In the U.S.

14-year CIA officer John Kiriakou notes :

Assange has been charged in the Eastern District of Virginia -- the so-called "Espionage Court." That is just what many of us have feared. Remember, no national security defendant has ever been found not guilty in the Eastern District of Virginia . The Eastern District is also known as the "rocket docket" for the swiftness with which cases are heard and decided. Not ready to mount a defense? Need more time? Haven't received all of your discovery? Tough luck. See you in court.

I have long predicted that Assange would face Judge Leonie Brinkema were he to be charged in the Eastern District. Brinkema handled my case, as well as CIA whistleblower Jeffrey Sterling's. She also has reserved the Ed Snowden case for herself. Brinkema is a hanging judge .

***

Brinkema gave me literally no chance to defend myself . At one point, while approaching trial, my attorneys filed 70 motions, asking that 70 classified documents be declassified so that I could use them to defend myself. I had no defense without them. We blocked off three days for the hearings. When we got to the courtroom, Brinkema said, "Let me save everybody a lot of time. I'm going to deny all 70 of these motions. You don't need any of this information to be declassified." The entire process took a minute. On the way out of the courtroom, I asked my lead attorney what had just happened. "We just lost the case. That's what happened. Now we talk about a plea."

My attorneys eventually negotiated a plea for 30 months in prison -- significantly below the 45 years that the Justice Department had initially sought. The plea was something called an 11-C1C plea; it was written in stone and could not be changed by the judge. She could either take it or leave it. She took it, but not after telling me to rise, pointing her finger at me, and saying, "Mr. Kiriakou, I hate this plea. I've been a judge since 1986 and I've never had an 11C1C. If I could, I would give you ten years." Her comments were inappropriate and my attorneys filed an ethics complaint against her. But that's Brinkema. That's who she is.

Julian Assange doesn't have a prayer of a fair trial in the Eastern District of Virginia.

[Apr 15, 2019] Julian Assange Is Guilty Of Only One Thing: Revealing The Evil Soul Of US Imperialism

Apr 15, 2019 | www.zerohedge.com

Assange's arrest represents an abuse of power, highlighting not only how true journalism has now been banished in the West, but also how politicians, journalists, news agencies and think-tanks collude with each other to silence people

[Apr 14, 2019] You could not get a more sinister confluence of political fraudsters by Michael Tracey

Notable quotes:
"... Assange accomplished more in 2010 alone than any of his preening media antagonists will in their entire lifetime, combined. Your feelings about him as a person do not matter. He could be the scummiest human on the face of Earth, and it would not detract from the fact that he has brought revelatory information to public that would otherwise have been concealed. He has shone light on some of the most powerful political factions not just in the US, but around the world. This will remain true regardless of whether Trump capitulates to the 'Deep State' and goes along with this utterly chilling, free speech-undermining prosecution. ..."
"... My support was based on the fact that Assange had devised a novel way to hold powerful figures to account, whose nefarious conduct would otherwise go unexamined but for the methods he pioneered. ..."
Apr 12, 2019 | spectator.us

The nine-year gap – long after Manning had been charged, found guilty, and released from prison – suggests that there is something ulterior going on here. The offenses outlined in the indictment are on extraordinarily weak legal footing. Part of the criminal 'conspiracy,' prosecutors allege, is that Assange sought to protect Manning as a source and encouraged her to provide government records in the public interest.

This is standard journalistic practice.

And it is now being criminalized by the Trump DoJ, while liberals celebrate from the sidelines – eager to join hands with the likes of Mike Pompeo and Lindsey Graham. You could not get a more sinister confluence of political fraudsters.

They – meaning most Democrats – will never get over their grudge against Assange for having dared to expose the corruption of America's ruling party in 2016, which they believed help deprive their beloved Hillary of her rightful ascension to the presidential throne. Once again, Rep. Tulsi Gabbard is among the few exceptions.

The DNC and Podesta email releases, now distilled reductively into the term 'Russian interference,' contained multitudinous newsworthy revelations, as evidenced by the fact that virtually the entire US media reported on them. (Here, feel free to refresh your memory on this as well.) But for no reason other than pure partisan score-settling, elite liberals are willing to toss aside any consideration for the dire First Amendment implications of Assange's arrest and cry out with joy that this man they regard as innately evil has finally been ensnared by the punitive might of the American carceral state.

Trump supporters and Trump himself also look downright foolish. It takes about two seconds to Google all the instances in which Trump glowingly touted WikiLeaks on the 2016 campaign trail. 'I love WikiLeaks!' he famously proclaimed on October 10, 2016 in Wilkes-Barre, Penn.

Presumably this expression of 'love' was indication that Trump viewed WikiLeaks as providing a public service. If not, perhaps some intrepid reporter can ask precisely what his 'love' entailed. He can pretend all he wants now that he's totally oblivious to WikiLeaks, but it was Trump himself who relayed that he was contemporaneously reading the Podesta emails in October 2016, and reveling in all their newsworthiness. If he wanted, he could obviously intercede and prevent any unjust prosecution of Assange. Trump has certainly seen fit to complain publicly about all matter of other inconvenient Justice Department activity, especially as it pertained to him or his family members and associates. But now he's acting as though he's never heard of WikiLeaks, which is just pitiful: not a soul believes it, even his most ardent supporters.

Sean Hannity became one of Assange's biggest fans in 2016 and 2017, effusively lavishing him with praise and even visiting him in the Ecuadorian embassy in London for an exclusive interview. One wonders whether Hannity, who reportedly speaks to his best buddy Trump every night before bedtime, will counsel a different course on this matter. There's also the question of whether Trump's most vehement online advocates, who largely have become stalwart defenders of WikiLeaks, will put their money where their mouth is and condition their continued support on Assange not being depredated by the American prison system.

Assange accomplished more in 2010 alone than any of his preening media antagonists will in their entire lifetime, combined. Your feelings about him as a person do not matter. He could be the scummiest human on the face of Earth, and it would not detract from the fact that he has brought revelatory information to public that would otherwise have been concealed. He has shone light on some of the most powerful political factions not just in the US, but around the world. This will remain true regardless of whether Trump capitulates to the 'Deep State' and goes along with this utterly chilling, free speech-undermining prosecution.

I personally have supported Assange since I started in journalism, nine years ago, not because I had any special affinity for the man himself (although the radical transparency philosophy he espoused was definitely compelling). My support was based on the fact that Assange had devised a novel way to hold powerful figures to account, whose nefarious conduct would otherwise go unexamined but for the methods he pioneered. As thanks, he was holed up in a tiny embassy for nearly seven years – until yesterday, when they hauled him out ignominiously to face charges in what will likely turn out to be a political show trial. Donald Trump has the ability to stop this, but almost certainly won't. And that's all you need to know about him.

[Apr 14, 2019] Assange rendition might backfire for Trump administration

Vindictiveness not always play in the vindictive party favour.
You may love Assange you may hate Assange for his WikiLeaks revelation (And Vault 7 was a real bombshell), but it is clear that it will cost Trump some reputation out of tini share that still left, especially in view of Trump declaration "I love Wikileaks"
Apr 13, 2019 | www.unz.com

For seven years, we have had to listen to a chorus of journalists, politicians and "experts" telling us that Assange was nothing more than a fugitive from justice, and that the British and Swedish legal systems could be relied on to handle his case in full accordance with the law. Barely a "mainstream" voice was raised in his defence in all that time.

... ... ...

The political and media establishment ignored the mounting evidence of a secret grand jury in Virginia formulating charges against Assange, and ridiculed Wikileaks' concerns that the Swedish case might be cover for a more sinister attempt by the US to extradite Assange and lock him away in a high-security prison, as had happened to whistleblower Chelsea Manning.

... ... ...

Equally, they ignored the fact that Assange had been given diplomatic status by Ecuador, as well as Ecuadorean citizenship. Britain was obligated to allow him to leave the embassy, using his diplomatic immunity, to travel unhindered to Ecuador. No "mainstream" journalist or politician thought this significant either.

... ... ...

They turned a blind eye to the news that, after refusing to question Assange in the UK, Swedish prosecutors had decided to quietly drop the case against him in 2015. Sweden had kept the decision under wraps for more than two years.

... ... ...

Most of the other documents relating to these conversations were unavailable. They had been destroyed by the UK's Crown Prosecution Service in violation of protocol. But no one in the political and media establishment cared, of course.

Similarly, they ignored the fact that Assange was forced to hole up for years in the embassy, under the most intense form of house arrest, even though he no longer had a case to answer in Sweden. They told us -- apparently in all seriousness -- that he had to be arrested for his bail infraction, something that would normally be dealt with by a fine.

... ... ...

This was never about Sweden or bail violations, or even about the discredited Russiagate narrative, as anyone who was paying the vaguest attention should have been able to work out. It was about the US Deep State doing everything in its power to crush Wikileaks and make an example of its founder.

It was about making sure there would never again be a leak like that of Collateral Murder, the military video released by Wikileaks in 2007 that showed US soldiers celebrating as they murdered Iraqi civilians. It was about making sure there would never again be a dump of US diplomatic cables, like those released in 2010 that revealed the secret machinations of the US empire to dominate the planet whatever the cost in human rights violations.

Now the pretence is over. The British police invaded the diplomatic territory of Ecuador -- invited in by Ecuador after it tore up Assange's asylum status -- to smuggle him off to jail. Two vassal states cooperating to do the bidding of the US empire. The arrest was not to help two women in Sweden or to enforce a minor bail infraction.

No, the British authorities were acting on an extradition warrant from the US. And the charges the US authorities have concocted relate to Wikileaks' earliest work exposing the US military's war crimes in Iraq -- the stuff that we all once agreed was in the public interest, that British and US media clamoured to publish themselves.

Still the media and political class is turning a blind eye. Where is the outrage at the lies we have been served up for these past seven years? Where is the contrition at having been gulled for so long? Where is the fury at the most basic press freedom -- the right to publish -- being trashed to silence Assange? Where is the willingness finally to speak up in Assange's defence?

It's not there. There will be no indignation at the BBC, or the Guardian, or CNN. Just curious, impassive -- even gently mocking -- reporting of Assange's fate.

And that is because these journalists, politicians and experts never really believed anything they said. They knew all along that the US wanted to silence Assange and to crush Wikileaks. They knew that all along and they didn't care. In fact, they happily conspired in paving the way for today's kidnapping of Assange.

They did so because they are not there to represent the truth, or to stand up for ordinary people, or to protect a free press, or even to enforce the rule of law. They don't care about any of that. They are there to protect their careers, and the system that rewards them with money and influence. They don't want an upstart like Assange kicking over their applecart.

Now they will spin us a whole new set of deceptions and distractions about Assange to keep us anaesthetised, to keep us from being incensed as our rights are whittled away, and to prevent us from realising that Assange's rights and our own are indivisible. We stand or fall together.

Jonathan Cook won the Martha Gellhorn Special Prize for Journalism. His books include "Israel and the Clash of Civilisations: Iraq, Iran and the Plan to Remake the Middle East" (Pluto Press) and "Disappearing Palestine: Israel's Experiments in Human Despair" (Zed Books). His website is www.jonathan-cook.net .


anonymous [340] • Disclaimer , says: April 12, 2019 at 10:41 am GMT

Thank you.

This should be an uncomfortable time for the “journalists” of the Establishment. Very few will speak up as does Mr. Cook. Watch how little is said about the recent Manning re-imprisonment to sweat out grand jury testimony. Things may have grown so craven that we’ll even see efforts to revoke Mr. Assange’s awards.

This is also a good column for us to share with those people who just might want not to play along with the lies that define Exceptionalia.

Digital Samizdat , says: April 12, 2019 at 5:11 pm GMT

… from the moment Julian Assange first sought refuge in the Ecuadorean embassy in London, they have been telling us we were wrong, that we were paranoid conspiracy theorists. We were told there was no real threat of Assange’s extradition to the United States, that it was all in our fevered imaginations.

It all reminds me of Rod Dreher’s Law of Merited Impossibility: “That’ll never happen. And when it does , boy won’t you deserve it!”

Equally, they ignored the fact that Assange had been given diplomatic status by Ecuador, as well as Ecuadorean citizenship. Britain was obligated to allow him to leave the embassy, using his diplomatic immunity, to travel unhindered to Ecuador. No “mainstream” journalist or politician thought this significant either.

Why would they? They don’t even recognize diplomatic status for heads of state who get in their way! Remember what they did to President Evo Morales of Bolivia back when he was threatening to grant asylum to Ed Snowden? Here’s a refresher:

https://en.wikipedia.org/wiki/Evo_Morales_grounding_incident

Any way you slice, this is a sad for liberty.

Carlton Meyer , says: • Website April 13, 2019 at 4:32 am GMT
From my blog:

Apr 13, 2019 – Julian Assange

People who just watch corporate media think Julian Assange is a bad guy who deserves life in prison, except those who watch the great Tucker Carlson. Watch his recent show where he explains why our corporate media and political class hate Assange.

https://www.youtube.com/embed/ZE7OfU71Sbk?feature=oembed

He is charged with encouraging Army Private Chelsea Manning to send him embarrassing information, specifically this video of a US Army Apache helicopter gunning down civilians in broad daylight in Baghdad.

https://www.youtube.com/embed/25EWUUBjPMo?feature=oembed

But there is no proof of this, and Manning has repeatedly said he never communicated to Assange about anything. Manning got eight years in prison for this crime; the Apache pilots were never charged. and now they want to hang Assange for exposing a war crime. I have recommend this great 2016 interview twice, where Assange calmly explains the massive corruption that patriotic FBI agents refer to as the “Clinton Crime Family.”

https://www.youtube.com/embed/_sbT3_9dJY4?feature=oembed

This gang is so powerful that it ordered federal agents to spy on the Trump political campaign, and indicted and imprisoned some participants in an attempt to pressure President Trump to step down. It seems Trump still fears this gang, otherwise he would order his attorney general to drop this bogus charge against Assange, then pardon him forever and invite him to speak at White House press conferences.

The Alarmist , says: April 13, 2019 at 5:01 am GMT

“… they ignored the fact that Assange was forced to hole up for years in the embassy, under the most intense form of house arrest, even though he no longer had a case to answer in Sweden.”

Meh! Assange should have walked out the door of the embassy years ago. He might have ended up in the same place, but he could have seized the moral high ground by seeking asylum in Britain for fear of the death penalty in the US, which was a credible fear given public comments by various US officials. By rotting away in the Ecuadorian embassy, be greatly diminished any credibility he might have had to turn the UK judicial system inside out to his favour. Now he’s just a creepy looking bail jumper who flung faeces against the wall, rather than being a persecuted journalist.

Endgame Napoleon , says: April 13, 2019 at 6:14 am GMT
@Johnny Rottenborough Millionaire politicians on both sides of the political fence get very emotional about anything that impacts their own privacy & safety and the privacy & safety of their kin, while ignoring the issues that jeopardize the privacy & safety of ordinary voters. While corporate-owned politicians get a lot out of this game, ordinary voters who have never had less in the way of Fourth Amendment privacy rights, and whose First Amendment rights are quickly shrinking to the size of Assange’s, do not get the consolation of riches without risk granted to bought-off politicians in this era’s pay-to-play version of democracy. It’s a lose / lose for average voters.
Tom Welsh , says: April 13, 2019 at 9:31 am GMT
Mr Cook’s criticism of the mainstream media (MSM) is absolutely justified.

It seems to me that their hatred of Mr Assange reflects the unfortunate fact that, while he is a real journalist, they actually aren’t. Instead, they are stenographers for power: what Paul Craig Roberts calls “presstitutes” (a very happy coinage which exactly hits the bull’s eye).

The difference is that real journalists, like Mr Assange, Mr Roberts and Mr Cook, are mainly motivated by the search for objective truth – which they then publish, as far as they are able.

Whereas those people who go by the spurious names of “journalist”, “reporter”, “editor”, etc. are motivated by the desire to go on earning their salaries, and to gain promotion and “distinction” in society. (Sad but true: social distinction is often gained by performing acts of dishonesty and downright wickedness).

Here are some interesting quotations that cast some light on this disheartening state of affairs. If you look carefully at their dates you may be surprised to find that nothing has changed very much since the mid-19th century.

‘Marr: “How can you know that I’m self-censoring? How can you know that journalists are…”

‘Chomsky: “I’m not saying you’re self censoring. I’m sure you believe everything you’re saying. But what I’m saying is that if you believed something different, you wouldn’t be sitting where you’re sitting”’.

– Transcript of interview between Noam Chomsky and Andrew Marr (Feb. 14, 1996) https://scratchindog.blogspot.com/2015/07/transcript-of-interview-between-noam.html

‘If something goes wrong with the government, a free press will ferret it out and it will get fixed. But if something goes wrong with our free press, the country will go straight to hell’.

– I. F. Stone (as reported by his son Dr Jeremy J Stone) http://russia-insider.com/en/media-criticism/hey-corporate-media-glenn-greenwald-video-can-teach-you-what-real-journalism/ri6669

‘There is no such a thing in America as an independent press, unless it is out in country towns. You are all slaves. You know it, and I know it. There is not one of you who dares to express an honest opinion. If you expressed it, you would know beforehand that it would never appear in print. I am paid $150 for keeping honest opinions out of the paper I am connected with. Others of you are paid similar salaries for doing similar things. If I should allow honest opinions to be printed in one issue of my paper, I would be like Othello before twenty-four hours: my occupation would be gone. The man who would be so foolish as to write honest opinions would be out on the street hunting for another job. The business of a New York journalist is to distort the truth, to lie outright, to pervert, to vilify, to fawn at the feet of Mammon, and to sell his country and his race for his daily bread, or for what is about the same — his salary. You know this, and I know it; and what foolery to be toasting an “Independent Press”! We are the tools and vassals of rich men behind the scenes. We are jumping-jacks. They pull the string and we dance. Our time, our talents, our lives, our possibilities, are all the property of other men. We are intellectual prostitutes’.

– John Swinton (1829–1901), Scottish-American journalist, newspaper publisher, and orator. https://en.wikiquote.org/wiki/John_Swinton http://www.rense.com/general20/yes.htm

‘The press today is an army with carefully organized arms and branches, with journalists as officers, and readers as soldiers. But here, as in every army, the soldier obeys blindly, and war-aims and operation-plans change without his knowledge. The reader neither knows, nor is allowed to know, the purposes for which he is used, nor even the role that he is to play. A more appalling caricature of freedom of thought cannot be imagined. Formerly a man did not dare to think freely. Now he dares, but cannot; his will to think is only a willingness to think to order, and this is what he feels as his liberty’.

– Oswald Spengler, “The Decline of the West” Vol. II, trans. C.F. Atkinson (1928), p. 462

‘How do wars start? Wars start when politicians lie to journalists, then believe what they read in the press’.

– Karl Kraus, “Through Western Eyes – Russia Misconstrued” http://www.hellevig.net/ebook/Putin’s%20new%20Russia.pdf

And finally, two quotations from classic novels which go to the heart of the matter.

‘It is difficult to get a man to understand something when his salary depends upon his not understanding it’.

– Upton Sinclair

‘Sometimes a man wants to be stupid if it lets him do a thing his cleverness forbids’.

– John Steinbeck (“East of Eden”)

UncommonGround , says: April 13, 2019 at 10:13 am GMT
Very good article. There is one point that I would like to make: Assange asked for asyl before he went to the embassy of Ecuador and Ecuador gave him asylum. This meant that they had an obligation to protect him. It’s really unbeliavable that a country gives asylum to someone and half way tells that they have changed their mind and will let the person be arrested. ” We told you you would be safe with us, but now we just changed our mind”. Assange also became a citizen of Ecuador and this possibly means that Ecuador couldn’t have let him been arrested in their embassy by the police of another country without a process against him in Ecuador and without him having the right to defend himself in a court. Many countries don’t extradit their citizens to other countries.

Another remark. For years there were uncountable articles about Assange in The Guardian. Those articles were read by many people and got really many comments. There were very fierce discussions about him with thousends of comments. With time The Guardian turned decisively against him and published articles againt him. There were people there who seemed to hate him. In the last days there were again many articles about him. They pronounce themselves discretely against his extradition to the US even if showing themselves to be critical of him as if trying to justify their years of attacks against him. But one detail: I didn’t find even one article in The Guardian where you can comment the case. Today for instance you can comment an article by Gaby Hinsliff about Kim Kardashian. Marina Hyde talks in an article about washing her hair (whatever else she wants to say, with 2831 comments at this moment). But you don’t find any article about Assange that you can comment. 10 or 8 or 5 years ago there were hundreds of articles about him that you could comment.

EliteCommInc. , says: April 13, 2019 at 10:59 am GMT
The game afoot here is obvious.

https://www.caracaschronicles.com/2017/04/03/ecuador-next-venezuela/

Pressure relief

Tsar Nicholas , says: April 13, 2019 at 11:38 am GMT
@Art

UK PM May said about Assange – “no one is above the law” – proving she is a weak sister without a clue.

No one is above the law except the British government, which ignored the provisions of the EU Withdrawal Act requiring us to leave on March 29th.

No one is above the law except for the US and the UK which have illegally deployed forces to Syria against the wishes of the government in Damascus.

And Tony Blair, a million dead thanks to his corruption. He should be doing time in a Gulag for his evil crimes.

And of course, the black MP for Peterborough – Fiona Onasanya – served a mere three weeks in jail for perverting the course of justice, normally regarded as a very serious offence. But she was out in time – electronic tag and curfew notwithstanding – to vote in the House of Commons against leaving the EU.

[Mar 17, 2019] Mueller uses the same old false flag scams, just different packaging of his forensics-free findings

Highly recommended!
Notable quotes:
"... It appears the FBI, CIA, and NSA have great difficulty in differentiating between Russians and Democrats posing as Russians. ..."
"... Maybe the VIPS should look into the murder of Seth Rich, the DNC staffer who had the security clearance required to access the DNC servers, and who was murdered in the same week as the emails were taken. In particular, they should ask why the police were told to stand down and close the murder case without further investigation. ..."
"... What a brilliant article, so logical, methodical & a forensic, scientific breakdown of the phony Russiagate project? And there's no doubt, this was a co-ordinated, determined Intelligence project to reverse the results of the 2016 Election by initiating a soft coup or Regime change op on a elected Leader, a very American Coup, something the American Intelligence Agencies specialise in, everywhere else, on a Global scale, too get Trump impeached & removed from the Whitehouse? ..."
"... Right. Since its purpose is to destroy Trump politically, the investigation should go on as long as Trump is in office. Alternatively, if at this point Trump has completely sold out, that would be another reason to stop the investigation. ..."
"... Nancy Pelosi's announcement two days ago that the Democrats will not seek impeachment for Trump suggests the emptiness of the Mueller investigation on the specific "collusion" issue. ..."
"... We know and Assange has confirmed Seth Rich, assassinated in D.C. for his deed, downloaded the emails and most likely passed them on to former British ambassador Craig Murray in a D.C. park for transport to Wikileaks. ..."
"... This so-called "Russiagate" narrative is an illustration of our "freedom of the press" failure in the US due to groupthink and self censorship. He who pays the piper is apt to call the tune. ..."
"... Barr, Sessions, every congressmen all the corporate MSM war profiteer mouth pieces. They all know that "Russia hacked the DNC" and "Russia meddled" is fabricated garbage. They don't care, because their chosen war beast corporate candidate couldn't beat Donald goofball Trump. So it has to be shown that the war beast only lost because of nefarious reasons. Because they're gonna run another war beast cut from the same cloth as Hillary in 2020. ..."
"... Mar 4, 2019 Tom Fitton: President Trump a 'Crime Victim' by Illegal Deep State DOJ & FBI Abuses: https://youtu.be/ixWMorWAC7c ..."
"... Trump is a willing player in this game. The anti-Russian Crusade was, quite simply, a stunningly reckless, short-sighted effort to overturn the 2016 election, removing Trump to install Hillary Clinton in office. ..."
"... Much ado about nothing. All the talk and chatter and media airplay about "Russian meddling" in the 2016 election only tells me that these liars think the American public is that stupid. ..."
"... Andrew Thomas I'm afraid that huge amounts of our History post 1947 is organized and propagandized disinformation. There is an incredible page that John Simpkin has organized over the years that specifically addresses individuals, click on a name and read about them. https://spartacus-educational.com/USAdisinformation.htm ..."
"... It's pretty astonishing that Mueller was more interested in Roger Stone and Jerome Corsi as credible sources about Wikileaks and the DNC release than Craig Murray! ..."
"... Yes, he has done his job. And his job was to bring his royal Orangeness to heel, and to make sure that detente and co-operation with Russia remained impossible. The forever war continues. Mission Accomplished. ..."
Mar 17, 2019 | consortiumnews.com

O Society , March 16, 2019 at 7:55 am

The Truth is Out There. I Want to Believe!

Same old scams, different packaging. That's New & Improved for you.

http://opensociet.org/2019/03/16/the-return-of-the-hidden-persuaders

Raymond Comeau , March 15, 2019 at 12:35 pm

I could not suffer through reading the whole article. This is mainly because I have watched the news daily about Mueller's Investigation and I sincerely believe that Mueller is Champion of the Democrats who are trying to depose President Donald Trump at any cost.

For what Mueller found any decent lawyer with a Degree and a few years of experience could have found what Mueller found for far far less money. Mueller only found common crimes AND NO COLLUSION BETWEEN PRESIDENT TRUMP AND PUTIN!

The Mueller Investigation should be given to an honest broker to review, and Mueller should be paid only what it would cost to produce the commonplace crimes Mueller, The Democrats, and CNN has tried to convince the people that indeed Trump COLLUDED with RUSSIA. Mueller is, a BIG NOTHING BURGER and THE DEMOCRATS AND CNN ARE MUELLER'S SINGING CANARYS! Mueller should be jailed.

Bogdan Miller , March 15, 2019 at 11:04 am

This article explains why the Mueller Report is already highly suspect. For another thing, we know that since before 2016, Democrats have been studying Russian Internet and hacking tactics, and posing as Russian Bots/Trolls on Facebook and other media outlets, all in an effort to harm President Trump.

It appears the FBI, CIA, and NSA have great difficulty in differentiating between Russians and Democrats posing as Russians.

B.J.M. Former Intelligence Analyst and Humint Collector

vinnieoh , March 15, 2019 at 8:17 am

Moving on: the US House yesterday voted UNANIMOUSLY (remember that word, so foreign these days to US governance?) to "urge" the new AG to release the complete Mueller report.

A non-binding resolution, but you would think that the Democrats can't see the diesel locomotive bearing down on their clown car, about to smash it to pieces. The new AG in turn says he will summarize the report and that is what we will see, not the entire report. And taxation without representation takes a new twist.

... ... ...

Raymond Comeau , March 15, 2019 at 12:38 pm

What else would you expect from two Political Parties who are really branches of the ONE Party which Represents DEEP STATE".

DWS , March 15, 2019 at 5:58 am

Maybe the VIPS should look into the murder of Seth Rich, the DNC staffer who had the security clearance required to access the DNC servers, and who was murdered in the same week as the emails were taken. In particular, they should ask why the police were told to stand down and close the murder case without further investigation.

Raymond Comeau , March 15, 2019 at 12:47 pm

EXACTLY! But, Deep State will not allow that. And, it would ruin the USA' plan to continue to invade more sovereign countries and steal their resources such as oil and Minerals. The people of the USA must be Ostriches or are so terrified that they accept anything their Criminal Governments tell them.

Eventually, the chickens will come home to roost and perhaps the USA voters will ROAST when the crimes of the USA sink the whole country. It is time for a few Brave Men and Women to find their backbones and throw out the warmongers and their leading Oligarchs!

KiwiAntz , March 14, 2019 at 6:44 pm

What a brilliant article, so logical, methodical & a forensic, scientific breakdown of the phony Russiagate project? And there's no doubt, this was a co-ordinated, determined Intelligence project to reverse the results of the 2016 Election by initiating a soft coup or Regime change op on a elected Leader, a very American Coup, something the American Intelligence Agencies specialise in, everywhere else, on a Global scale, too get Trump impeached & removed from the Whitehouse?

If you can't get him out via a Election, try & try again, like Maduro in Venezuela, to forcibly remove the targeted person by setting him up with fake, false accusations & fabricated evidence? How very predictable & how very American of Mueller & the Democratic Party. Absolute American Corruption, corrupts absolutely?

Brian Murphy , March 15, 2019 at 10:33 am

Right. Since its purpose is to destroy Trump politically, the investigation should go on as long as Trump is in office. Alternatively, if at this point Trump has completely sold out, that would be another reason to stop the investigation.

If the investigation wraps up and finds nothing, that means Trump has already completely sold out. If the investigation continues, it means someone important still thinks Trump retains some vestige of his balls.

DH Fabian , March 14, 2019 at 1:19 pm

By last June or July the Mueller investigation has resulted in roughly 150 indictments for perjury/financial crimes, and there was a handful of convictions to date. The report did not support the Clinton wing's anti-Russian allegations about the 2016 election, and was largely brushed aside by media. Mueller was then reportedly sent back in to "find something." presumably to support the anti-Russian claims.

mike k , March 14, 2019 at 12:57 pm

From the beginning of the Russia did it story, right after Trump's electoral victory, it was apparent that this was a fraud. The democratic party however has locked onto this preposterous story, and they will go to their graves denying this was a scam to deny their presidential defeat, and somehow reverse the result of Trump's election. My sincere hope is that this blatant lie will be an albatross around the party's neck, that will carry them down into oblivion. They have betrayed those of us who supported them for so many years. They are in many ways now worse than the republican scum they seek to replace.

DH Fabian , March 14, 2019 at 1:26 pm

Trump is almost certain to be re-elected in 2020, and we'll go through this all over again.

Tom , March 14, 2019 at 12:00 pm

The very fact that the FBI never had access to the servers and took the word of a private company that had a history of being anti-Russian is enough to throw the entire ruse out.

LJ , March 14, 2019 at 2:39 pm

Agreed!!!! and don't forget the FBI/Comey gave Hillary and her Campaign a head's up before they moved to seize the evidence. . So too, Comey said he stopped the Investigation , thereby rendering judgement of innocence, even though by his own words 'gross negligence' had a occurred (which is normally considered grounds for prosecution). In doing so he exceeded the FBI's investigative mandate. He rationalized that decision was appropriate because of the appearance of impropriety that resulted from Attorney General Lynch having a private meeting on a plane on a runway with Bill and Hillary . Where was the logic in that. Who called the meeting? All were Lawyers who had served as President, Senator, Attorney General and knew that the meeting was absolutely inappropriate. . Comey should be prosecuted if they want to prosecute anyone else because of this CRAP. PS Trump is an idiot. Uhinfortunately he is just a symptom of the disease at this point. Look at the cover of Rolling Stone magazine , carry a barf bag.

Jane Christ , March 14, 2019 at 6:51 pm

Exactly. This throws doubt on the ability of the FBI to work independently. They are working for those who want to cover -up the Hillary mess . She evidently has sufficient funds to pay them off. I am disgusted with the level of corruption.

hetro , March 14, 2019 at 10:50 am

Nancy Pelosi's announcement two days ago that the Democrats will not seek impeachment for Trump suggests the emptiness of the Mueller investigation on the specific "collusion" issue. If there were something hot and lingering and about to emerge, this decision is highly unlikely, especially with the reasoning she gave at "so as not to divide the American people." Dividing the people hasn't been of much concern throughout this bogus witch hunt on Trump, which has added to his incompetence in leavening a growing hysteria and confusion in this country. If there is something, anything at all, in the Mueller report to support the collusion theory, Pelosi would I'm sure gleefully trot it out to get a lesser candidate like Pence as opposition for 2020.

James Clooney , March 14, 2019 at 11:17 am

We know and Assange has confirmed Seth Rich, assassinated in D.C. for his deed, downloaded the emails and most likely passed them on to former British ambassador Craig Murray in a D.C. park for transport to Wikileaks.

We must also honor Shawn Lucas assassinated for serving DNC with a litigation notice exposing the DNC conspiracy against Sanders.

hetro , March 14, 2019 at 3:18 pm

Where has Assange confirmed this? Assange's long-standing position is NOT to reveal his sources. I believe he has continued to honor this position.

Skip Scott , March 15, 2019 at 7:15 am

It has merely been insinuated by the offering of a reward for info on Seth's murder. In one breath he says wikileaks will never divulge a source, and in the next he offers a $20k reward saying that sources take tremendous risk. Doesn't take much of a logical leap to connect A to B.

DH Fabian , March 14, 2019 at 1:30 pm

Are you aware that Democrats split apart their 0wn voting base in the 1990s, middle class vs. poor? The Obama years merely confirmed that this split is permanent. This is particularly relevant for Democrats, as their voting base had long consisted of the poor and middle class, for the common good. Ignoring this deep split hasn't made it go away.

hetro , March 14, 2019 at 3:24 pm

Even more important is how the Democrats have sold out to an Establishment view favoring neocon theory, since at least Bill Clinton. Pelosi's recent behavior with Ilhan Omar confirms this and the split you're talking about. My point is it is distinctly odd that Pelosi is discouraging impeachment on "dividing the Party" (already divided, of course, as you say), whereas the Russia-gate fantasy was so hot not that long ago. Again it points to a cynical opportunism and manipulation of the electorate. Both parties are a sad excuse to represent ordinary people's interests.

Skip Scott , March 15, 2019 at 7:21 am

She said "dividing the country", not the party. I think she may have concerns over Trump's heavily armed base. That said, the statement may have been a ruse. There are plenty of Republicans that would cross the line in favor of impeachment with the right "conclusions" by Mueller. Pelosi may be setting up for a "bombshell" conclusion by Mueller. One must never forget that we are watching theater, and that Trump was a "mistake" to be controlled or eliminated.

Cindy Haddix , March 14, 2019 at 8:04 am

Mueller should be ashamed that he has made President Trump his main concern!! If all this investigation would stop he could save America millions!!! He needs to quit this witch-hunt and worry about things that really need to be handled!!! If the democrats and Trump haters would stop pushing senseless lies hopefully this would stop ? It's so disgusting that his democrat friend was never really investigated ? stop the witch-hunt and move forward!!!!

torture this , March 14, 2019 at 7:29 am

According to this letter, mistakes might have been made on Rachel Maddow's show. I can't wait to read how she responds. I'd watch her show, myself except that it has the same effect on me as ipecac.

Zhu , March 14, 2019 at 3:37 am

People will cling to "Putin made Trump President!!!" much as many cling "Obama's a Kenyan Muslim! Not a real American!!!". Both nut theories are emotionally satisfying, no matter what the historical facts are. Many Americans just can't admit their mistakes and blaming a scapegoat is a way out.

O Society , March 14, 2019 at 2:03 am

Thank you VIPS for organizing this legit dissent consisting of experts in the field of intelligence and computer forensics.

This so-called "Russiagate" narrative is an illustration of our "freedom of the press" failure in the US due to groupthink and self censorship. He who pays the piper is apt to call the tune.

It is astounding how little skepticism and scientifically-informed reasoning goes on in our media. These folks show themselves to be native advertising rather than authentic journalists at every turn.

DH Fabian , March 14, 2019 at 1:33 pm

But it has been Democrats and the media that market to middle class Dems, who persist in trying to sell the Russian Tale. They excel at ignoring the evidence that utterly contradicts their claims.

O Society , March 15, 2019 at 3:50 pm

Oh, we're well beyond your "Blame the middle class Dems" stage.

The WINNING!!! team sports bullshit drowns the entire country now the latrine's sprung a leak. People pretend to live in bubbles made of blue or red quite like the Three Little Pigs, isn't it? Except instead of a house made of bricks saving the day for the littlepiggies, what we've got here is a purple puddle of piss.

Everyone's more than glad to project all our problems on "THEM" though, aren't we?

Meanwhile, the White House smells like a urinal not washed since the 1950s and simpletons still get their rocks off arguing about whether Mickey Mouse can beat up Ronald McDonald.

T'would be comic except what's so tragic is the desperate need Americans have to believe, oh just believe! in something. Never mind the sound of the jackhammer on your skull dear, there's an app for that or is it a pill?

I don't know, don't ask me, I'm busy watching TV. Have a cheeto.

https://opensociet.org/2018/12/18/the-disneyfication-of-america/

Sam F , March 13, 2019 at 6:45 pm

Very good analysis clearly stated, especially adding the FAT timestamps to the transmission speeds.

Minor corrections: "The emails were copied from the network" should be "from the much faster local network" because this is to Contradict the notion that they were copied over the internet network, which most readers will equate with "network." Also "reportedin" should be "reported in."

Michael , March 13, 2019 at 6:25 pm

It is likely that New Knowledge was actually "the Russians", possibly working in concert with Crowdstrike. Once an intelligence agency gets away with something like pretending to be Russian hackers and bots, they tend to re-use their model; it is too tempting to discard an effective model after a one-off accomplishment. New Knowledge was caught interfering/ determining the outcome in the Alabama Senate race on the side of Democrat Doug Jones, and claimed they were merely trying to mimic Russian methods to see if they worked (they did; not sure of their punishment?). Occam's razor would suggest that New Knowledge would be competent to mimic/ pretend to be "Russians" after the fact of wikileaks' publication of emails. New Knowledge has employees from the NSA and State department sympathetic to/ working with(?) Hillary, and were the "outside" agency hired to evaluate and report on the "Russian" hacking of the DNC emails/ servers.

DH Fabian , March 13, 2019 at 5:48 pm

Mueller released report last summer, which resulted in (the last I checked) roughly 150 indictments, a handful of convictions to date, all for perjury/financial (not political) crimes. This wasn't kept secret. It simply wasn't what Democrats wanted to hear, so although it was mentioned in some lib media (which overwhelmingly supported neoliberal Hillary Clinton), it was essentially swept under the carpet.

Billy , March 13, 2019 at 11:11 pm

Barr, Sessions, every congressmen all the corporate MSM war profiteer mouth pieces. They all know that "Russia hacked the DNC" and "Russia meddled" is fabricated garbage. They don't care, because their chosen war beast corporate candidate couldn't beat Donald goofball Trump. So it has to be shown that the war beast only lost because of nefarious reasons. Because they're gonna run another war beast cut from the same cloth as Hillary in 2020.

Realist , March 14, 2019 at 3:22 am

You betcha. Moreover, who but the Russians do these idiots have left to blame? Everybody else is now off limits due to political correctness. Sigh Those Catholics, Jews, "ethnics" and sundry "deviants" used to be such reliable scapegoats, to say nothing of the "undeveloped" world. As Clapper "authoritatively" says, only this vile lineage still carries the genes for the most extremes of human perfidy. Squirrels in your attic? It must be the damned Russkies! The bastards impudently tried to copy our democracy, economic system and free press and only besmirched those institutions, ruining all of Hillary's glorious plans for a worldwide benevolent dictatorship. All this might be humorous if it weren't so funny.

And those Chinese better not get to thinking they are somehow our equals just because all their trillions invested in U.S. Treasury bonds have paid for all our wars of choice and MIC boondoggles since before the turn of the century. Unless they start delivering Trump some "free stuff" the big man is gonna cut off their water. No more affordable manufactured goods for the American public! So there!

As to the article: impeccable research and analysis by the VIPS crew yet again. They've proven to me that, to a near certainty, the Easter Bunny is not likely to exist. Mueller won't read it. Clapper will still prance around a free man, as will Brennan. The Democrats won't care, that is until November of 2020. And Hillary will continue to skate, unhindered in larding up the Clinton Foundation to purposes one can only imagine.

Joe Tedesky , March 14, 2019 at 10:02 pm

Realist,

I have posted this article 'the Russia they Lost' before and from time to time but once again it seems appropriate to add this link to expound upon for what you've been saying. It's an article written by a Russian who in they're youth growing up in the USSR dreamed of living the American lifestyle if Russia were to ever ditch communism. But . Starting with Kosovo this Russian's youthful dream turned nightmarishly ugly and, as time went by with more and yet even more USA aggression this Russian author loss his admiration and desire for all things American to be proudly envied. This is a story where USA hard power destroyed any hope of American soft power for world unity. But hey that unity business was never part of the plan anyway.

https://slavyangrad.org/2014/09/24/the-russia-they-lost/

Realist , March 15, 2019 at 10:38 pm

right you are, joe. if america was smart rather than arrogant, it would have cooperated with china and russia to see the belt and road initiative succeed by perhaps building a bridge or tunnel from siberia to alaska, and by building its own fleet of icebreakers to open up its part of the northwest passage. but no, it only wants to sabotage what others propose. that's not being a leader, it's being a dick.

i'm gonna have to go on the disabled list here until the sudden neurological problem with my right hand clears up–it's like paralysed. too difficult to do this one-handed using hunt and peck. at least the problem was not in the old bean, according to the scans. carry on, sir.

Brian James , March 13, 2019 at 5:04 pm

Mar 4, 2019 Tom Fitton: President Trump a 'Crime Victim' by Illegal Deep State DOJ & FBI Abuses: https://youtu.be/ixWMorWAC7c

DH Fabian , March 13, 2019 at 5:55 pm

Trump is a willing player in this game. The anti-Russian Crusade was, quite simply, a stunningly reckless, short-sighted effort to overturn the 2016 election, removing Trump to install Hillary Clinton in office. Trump and the Republicans continue to win by default, as Democrats only drive more voters away.

Howard , March 13, 2019 at 4:36 pm

Thank you Ray McGovern and the Other 17 VIPS C0-Signers of your National Security Essay for Truth. Along with Craig Murray and Seymour Hirsch, former Sam Adams Award winners for "shining light into dark places", you are national resources for objectivity in critical survival information matters for our country. It is more than a pity that our mainstream media are so beholden to their corporate task masters that they cannot depart from the company line for fear of losing their livelihoods, and in the process we risk losing life on the planet because of unconstrained nuclear war on the part of the two main adversaries facing off in an atmosphere of fear and mistrust. Let me speak plainly. THEY SHOULD BE TALKING TO YOU AND NOT THE VESTED INTERESTS' MOUTHPIECES. Thank you for your continued leadership!

James Clooney , March 14, 2019 at 11:28 am

Roger Ailes founder of FOX news died, "falling down stairs" within a week of FOX news exposing to the world that the assassinated Seth Rich downloaded the DNC emails.

DH Fabian , March 13, 2019 at 6:03 pm

Google the Mueller investigation report from last June or July. When it was released, the public response was like a deflated balloon. It did not support the "Russian collusion" allegations -- the only thing Democrats still had left to sell. The report resulted in roughly 150 indictments for perjury/financial crimes (not political), and a handful of convictions to date -- none of which had anything to do with the election results.

Hank , March 13, 2019 at 6:19 pm

Much ado about nothing. All the talk and chatter and media airplay about "Russian meddling" in the 2016 election only tells me that these liars think the American public is that stupid. They are probably right, but the REAL reason that Hillary lost is because there ARE enough informed people now in this nation who are quite aware of the Clinton's sordid history where scandals seem to follow every where they go, but indictments and/or investigations don't. There IS an internet nowadays with lots of FACTUAL DOCUMENTED information. That's a lot more than I can say about the mainstream corporate-controlled media!

I know this won't ever happen, but an HONEST investigation into the Democratic Party and their actions during the 2016 election would make ANY collusion with ANY nation look like a mole hill next to a mountain! One of the problems with living in this nation is if you are truly informed and make an effort 24/7 to be that way by doing your own research, you more-than-likely can be considered an "island in a sea of ignorance".

Tom , March 14, 2019 at 12:13 pm

We know that the FBI never had access to the servers and a private company was allowed to handle the evidence. Wasnt it a crime scene? The evidence was tampered with And we will never know what was on the servers.

Mark McCarty , March 13, 2019 at 4:10 pm

As a complement to this excellent analysis, I would like to make 2 further points:

The Mueller indictment of Russian Intelligence for hacking the DNC and transferring their booty to Wikileaks is absurd on its face for this reason: Assange announced on June 12th the impending release of Hillary-related emails. Yet the indictment claims that Guccifer 2.0 did not succeed in transferring the DNC emails to Wikileaks until the time period of July 14-18th – after which they were released online on July 22nd. Are we to suppose that Assange, a publisher of impeccable integrity, publicly announced the publication of emails he had not yet seen, and which he was obtaining from a source of murky provenance? And are we further to suppose that Wikileaks could have processed 20K emails and 20K attachments to insure their genuineness in a period of only several days? As you will recall, Wikileaks subsequently took a number of weeks to process the Podesta emails they released in October.

And another peculiarity merits attention. Assange did not state on June 12th that he was releasing DNC emails – and yet Crowdstrike and the Guccifer 2.0 personna evidently knew that this was in store. A likely resolution of this conundrum is that US intelligence had been monitoring all communications to Wikileaks, and had informed the DNC that their hacked emails had been offered to Wikileaks. A further reasonable prospect is that US intelligence subsequently unmasked the leaker to the DNC; as Assange has strongly hinted, this likely was Seth Rich. This could explain Rich's subsequent murder, as Rich would have been in a position to unmask the Guccifer 2.0 hoax and the entire Russian hacking narrative.

https://medium.com/@markfmccarty/muellers-new-indictment-do-the-feds-take-us-for-idiots-5406ef955406

https://medium.com/@markfmccarty/how-did-crowdstrike-guccifer-2-0-know-that-wikileaks-was-planning-to-release-dnc-emails-42e6db334053

Sam F , March 13, 2019 at 7:06 pm

Curious that Assange has Not explicitly stated that the leaker was Seth Rich, if it was, as this would take pressure from himself and incriminate the DNC in the murder of Rich. Perhaps he doesn't know, and has the honor not to take the opportunity, or perhaps he knows that it was not Rich.

James Clooney , March 14, 2019 at 11:40 am

View the Dutch TV interview with Asssange and there is another interview available on youtube in which Assange DOES subtly confirmed it was Seth Rich.

Assange posted a $10,000 reward for Seth Rich's murders capture.

Abby , March 13, 2019 at 10:11 pm

Another mistaken issue with the "Russia hacked the DNC computers on Trump's command" is that he never asked Russia to do that. His words were, "Russia if you 'find' Hillary's missing emails let us know." He said that after she advised congress that she wouldn't be turning in all of the emails they asked for because she deleted 30,000 of them and said that they were personal.

But if Mueller or the FBI wants to look at all of them they can find them at the NYC FBI office because they are on Weiner's laptop. Why? Because Hillary's aid Huma Abedin, Weiner's wife sent them to it. Just another security risk that Hillary had because of her private email server. This is why Comey had to tell congress that more of them had been found 11 days before the election. If Comey hadn't done that then the FBI would have.

But did Comey or McCabe look at her emails there to see if any of them were classified? No they did not do that. And today we find out that Lisa Page told congress that it was Obama's decision not to charge Hillary for being grossly negligent on using her private email server. This has been known by congress for many months and now we know that the fix was always in for her to get off.

robert e williamson jr , March 13, 2019 at 3:26 pm

I want to thank you folks at VIPS. Like I have been saying for years now the relationship between CIA, NSA and DOJ is an incestuous one at best. A perverse corrupted bond to control the masses. A large group of religious fanatics who want things "ONE WAY". They are the facilitators for the rogue government known as the "DEEP STATE"!

Just ask billy barr.

More truth is a very good thing. I believe DOJ is supporting the intelligence community because of blackmail. They can't come clean because they all risk doing lots of time if a new judicial mechanism replaces them. We are in big trouble here.

Apparently the rule of law is not!

You folks that keep claiming we live in the post truth era! Get off me. Demand the truth and nothing else. Best be getting ready for the fight of your lives. The truth is you have to look yourself in the mirror every morning, deny that truth. The claim you are living in the post truth era is an admission your life is a lie. Now grab a hold of yourself pick a dogdamned side and stand for something,.

Thank You VIPS!

Joe Tedesky , March 13, 2019 at 2:58 pm

Hats off to the VIP's who have investigated this Russian hacking that wasn't a hacking for without them what would we news junkies have otherwise to lift open the hood of Mueller's never ending Russia-gate investigation. Although the one thing this Russia-gate nonsense has accomplished is it has destroyed with our freedom of speech when it comes to how we citizens gather our news. Much like everything else that has been done during these post 9/11 years of continual wars our civil rights have been marginalized down to zero or, a bit above if that's even still an argument to be made for the sake of numbers.

Watching the Manafort sentencing is quite interesting for the fact that Manafort didn't conclude in as much as he played fast and loose with his income. In fact maybe Manafort's case should have been prosecuted by the State Department or, how about the IRS? Also wouldn't it be worth investigating other Geopolitical Rain Makers like Manafort for similar crimes of financial wrongdoing? I mean is it possible Manafort is or was the only one of his type to do such dishonest things? In any case Manafort wasn't charged with concluding with any Russians in regard to the 2016 presidential election and, with that we all fall down.

I guess the best thing (not) that came out of this Russia-gate silliness is Rachel Maddow's tv ratings zoomed upwards. But I hate to tell you that the only ones buying what Ms Maddow is selling are the died in the wool Hillary supporters along with the chicken-hawks who rally to the MIC lobby for more war. It's all a game and yet there are many of us who just don't wish to play it but still we must because no one will listen to the sanity that gets ignored keep up the good work VIP's some of us are listening.

Andrew Thomas , March 13, 2019 at 12:42 pm

The article did not mention something called to my attention for the first time by one of the outstanding members of your commentariat just a couple of days ago- that Ambassador Murray stayed publicly, over two years ago, that he had been given the thumb drive by a go-between in D.C. and had somehow gotten it to Wikileaks. And, that he has NEVER BEEN INTERVIEWED by Mueller &Company. I was blown away by this, and found the original articles just by googling Murray. The excuse given is that Murray "lacks credibility ", or some such, because of his prior relationship with Assange and/or Wikileaks. This is so ludicrous I can't even get my head around it. And now, you have given me a new detail-the meeting with Pompeo, and the complete lack of follow-up thereafter. Here all this time I thought I was the most cynical SOB who existed, and now I feel as naive as when I was 13 and believed what Dean Rusk was saying like it was holy writ. I am in your debt.

Bob Van Noy , March 13, 2019 at 2:33 pm

Andrew Thomas I'm afraid that huge amounts of our History post 1947 is organized and propagandized disinformation. There is an incredible page that John Simpkin has organized over the years that specifically addresses individuals, click on a name and read about them. https://spartacus-educational.com/USAdisinformation.htm

Mark McCarty , March 13, 2019 at 4:18 pm

A small correction: the Daily Mail article regarding Murray claimed that Murray was given a thumbdrive which he subsequently carried back to Wikileaks. On his blog, Murray subsequently disputed this part of the story, indicating that, while he had met with a leaker or confederate of a leaker in Washington DC, the Podesta emails were already in possession of Wikileaks at the time. Murray refused to clarify the reason for his meeting with this source, but he is adamant in maintaining that the DNC and Podesta emails were leaked, not hacked.

And it is indeed ludicrous that Mueller, given the mandate to investigate the alleged Russian hacking of the DNC and Podesta, has never attempted to question either Assange or Murray. That in itself is enough for us to conclude that the Mueller investigation is a complete sham.

Ian Brown , March 13, 2019 at 4:43 pm

It's pretty astonishing that Mueller was more interested in Roger Stone and Jerome Corsi as credible sources about Wikileaks and the DNC release than Craig Murray!

LJ , March 13, 2019 at 12:29 pm

A guy comes in with a pedigree like that, """ former FBI head """ to examine and validate if possible an FBI sting manufactured off a phony FISA indictment based on the Steele Report, It immediately reminded me of the 9-11 Commission with Thomas Kean, former Board member of the National Endowment for Democracy, being appointed by GW Bush the Simple to head an investigation that he had previously said he did not want to authorize( and of course bi partisan yes man Lee Hamilton as #2, lest we forget) . Really this should be seen as another low point in our Democracy. Uncle Sam is the Limbo Man, How low can you go?

After Bill and Hillary and Monica and Paula Jones and Blue Dresses well, Golden Showers in a Moscow luxury hotel, I guess that make it just salacious enough.

Mueller looks just like what he is. He has that same phony self important air as Comey . In 2 years this will be forgotten.. I do not think this hurts Trumps chances at re-election as much as the Democrats are hurting themselves. This has already gone on way too long.

Drew Hunkins , March 13, 2019 at 11:59 am

Mueller has nothing and he well knows it. He was willingly roped into this whole pathetic charade and he's left grasping for anything remotely tied to Trump campaign officials and Russians.

Even the most tenuous connections and weak relationships are splashed across the mass media in breathless headlines. Meanwhile, NONE of the supposed skulduggery unearthed by Mueller has anything to do with the Kremlin "hacking" the election to favor Trump, which was the entire raison d'etre behind Rosenstein, Brennan, Podesta and Mueller's crusade on behalf of the deplorable DNC and Washington militarist-imperialists. It will be fascinating to witness how Mueller and his crew ultimately extricate themselves from this giant fraudulent edifice of deceit. Will they even be able to save the most rudimentary amount of face?

So sickening to see the manner in which many DNC sycophants obsequiously genuflect to their godlike Mueller. A damn prosecutor who was likely in bed with the Winter Hill Gang.

Jack , March 13, 2019 at 12:21 pm

You have failed. An investigation is just that, a finding of the facts. What would Mueller have to extricate himself from? If nothing is found, he has still done his job. You are a divisive idiot.

Skip Scott , March 13, 2019 at 1:13 pm

Yes, he has done his job. And his job was to bring his royal Orangeness to heel, and to make sure that detente and co-operation with Russia remained impossible. The forever war continues. Mission Accomplished.

Drew Hunkins , March 13, 2019 at 2:12 pm

@Jack,
Keep running cover for an out of control prosecutor, who, if he had any integrity, would have hit the bully pulpit mos ago declaring there's nothing of substance to one of the most potentially dangerous accusations in world history: the Kremlin hacking the election. Last I checked it puts two nuclear nation-states on the brink of potential war. And you call me divisive? Mueller's now a willing accomplice to this entire McCarthyite smear and disinformation campaign. It's all so pathetic that folks such as yourself try and mislead and feed half-truths to the people.

You're failing Jack, in more ways than you know.

Gregory Herr , March 13, 2019 at 9:13 pm

https://www.kcrw.com/culture/shows/scheer-intelligence/liberals-are-digging-their-own-grave-with-russiagate-2019-03-08

Drew, you might enjoy this discussion Robert Scheer has with Stephen Cohen and Katrina vanden Heuvel.

Realist , March 15, 2019 at 3:38 am

Moreover, as the Saker pointed out in his most recent column in the Unz Review, the entire Deep State conspiracy, in an ad hoc alliance with the embarrassed and embarrassing Democrats, have made an absolute sham of due process in their blatant witch hunt to bag the president. This reached an apex when his personal lawyer, Mr. Cohen, was trotted out before congress to violate Trump's confidentiality in every mortifying way he could even vaguely reconstruct. The man was expected to say anything to mitigate the anticipated tortures to come in the course of this modern day inquisition by our latter day Torquemada. To his credit though, even with his ass in a sling, he could simply not confabulate the smoking gun evidence for the alleged Russian collusion that this whole farce was built around.

Tom , March 14, 2019 at 12:30 pm

Mueller stood with Bush as he lied the world into war based on lies and illegally spied on America and tortured some folks.

George Collins , March 13, 2019 at 2:02 pm

QED: as to the nexus with the Winter Hill gang wasn't there litigation involving the Boston FBI, condonation of murder by the FBI and damages awarded to or on behalf of convicted parties that the FBI had reason to know were innocent? The malfeasance reportedly occurred during Mueller time. Further on the sanctified diligence of Mr. Mueller can be gleaned from the reports of Coleen Rowley, former FBI attorney stationed in Milwaukee??? when the DC FBI office was ignoring warnings sent about 9/11. See also Sibel Edmonds who knew to much and was court order muzzled about FBI mis/malfeasance in the aftermath of 9/11.

I'd say it's game, set, match VIPS and a pox on Clapper and the complicit intelligence folk complicit in the nuclear loaded Russia-gate fibs.

Kiers , March 13, 2019 at 11:47 am

How can we expect the DNC to "hand it " to Trumpf, when, behind the scenes, THEY ARE ONE PARTY. They are throwing faux-scary pillow bombs at each other because they are both complicit in a long chain of corruptions. Business as usual for the "principled" two party system! Democracy! Through the gauze of corporate media! You must be joking!

Skip Scott , March 13, 2019 at 11:28 am

"We believe that there are enough people of integrity in the Department of Justice to prevent the outright manufacture or distortion of "evidence," particularly if they become aware that experienced scientists have completed independent forensic study that yield very different conclusions."

I wish I shared this belief. However, as with Nancy Pelosi's recent statement regarding pursuing impeachment, I smell a rat. I believe with the help of what the late Robert Parry called "the Mighty Wurlitzer", Mueller is going to use coerced false testimony and fabricated forensics to drop a bombshell the size of 911. I think Nancy's statement was just a feint before throwing the knockout punch.

If reason ruled the day, we should have nothing to worry about. But considering all the perfidy that the so-called "Intelligence" Agencies and their MSM lackeys get away with daily, I think we are in for more theater; and I think VIPS will receive a cold shoulder outside of venues like CN.

I pray to God I'm wrong.

Sam F , March 13, 2019 at 7:32 pm

My extensive experience with DOJ and the federal judiciary establishes that at least 98% of them are dedicated career liars, engaged in organized crime to serve political gangs, and make only a fanatical pretense of patriotism or legality. They are loyal to money alone, deeply cynical and opposed to the US Constitution and laws, with no credibility at all beyond any real evidence.

Eric32 , March 14, 2019 at 4:24 pm

As near I can see, Federal Govt. careers at the higher levels depend on having dirt on other players, and helping, not hurting, the money/power schemes of the players above you.

The Clintons (through their foundation) apparently have a lot of corruption dirt on CIA, FBI etc. top players, some of whom somehow became multi-millionaires during their civil service careers.

Trump, who was only running for President as a name brand marketing ploy with little desire to actually win, apparently came into the Presidency with no dirt arsenal and little idea of where to go from there.

Bob Van Noy , March 13, 2019 at 11:09 am

I remember reading with dismay how Russians were propagandized by the Soviet Press Management only to find out later the depth of disbelief within the Russian population itself. We now know what that feels like. The good part of this disastrous scenario for America is that for careful readers, disinformation becomes revelatory. For instance, if one reads an editorial that refers to the Russian invasion of Ukraine, or continually refers to Russian interference in the last Presidential election, then one can immediately dismiss the article and question the motivation for the presentation. Of course the problem is how to establish truth in reporting

Jeff Harrison , March 13, 2019 at 10:41 am

Thank you, VIPs. Hopefully, you don't expect this to make a difference. The US has moved into a post truth, post reality existence best characterized by Karl Rove's declaration: "we're an empire now, when we act, we create our own reality." What Mr. Rove in his arrogance fails to appreciate is that it is his reality but not anyone else's. Thus Pompous can claim that Guaido is the democratic leader in Venezuela even though he's never been elected .

Gary Weglarz , March 13, 2019 at 10:21 am

Thank you. The next time one of my friends or family give me that glazed over stare and utters anymore of the "but, RUSSIA" nonsense I will refer them directly to this article. Your collective work and ethical stand on this matter is deeply appreciated by anyone who values the truth.

Russiagate stands with past government propaganda operations that were simply made up out of thin air: i.e. Kuwaiti incubator babies, WMD's, Gaddafi's viagra fueled rape camps, Assad can't sleep at night unless he's gassing his own people, to the latest, "Maduro can't sleep at night unless he's starving his own people."

The complete and utter amorality of the deep state remains on display for all to see with "Russiagate," which is as fact-free a propaganda campaign as any of those just mentioned.

Marc , March 13, 2019 at 10:13 am

I am a computer naif, so I am prepared to accept the VIPS analysis about FAT and transfer rates. However, the presentation here leaves me with several questions. First, do I understand correctly that the FAT rounding to even numbers is introduced by the thumb drive? And if so, does the FAT analysis show only that the DNC data passed through a thumb drive? That is, does the analysis distinguish whether the DNC data were directly transferred to a thumb drive, or whether the data were hacked and then transferred to a thumb drive, eg, to give a copy to Wikileaks? Second, although the transatlantic transfer rate is too slow to fit some time stamps, is it possible that the data were hacked onto a local computer that was under the control of some faraway agent?

Jeff Harrison , March 13, 2019 at 11:12 am

Not quite. FAT is the crappy storage system developed by Microsoft (and not used by UNIX). The metadata associated with any file gets rewritten when it gets moved. If that movement is to a storage device that uses FAT, the timestamp on the file will end in an even number. If it were moved to a unix server (and most of the major servers run Unix) it would be in the UFS (unix file system) and it would be the actual time from the system clock. Every storage device has a utility that tells it where to write the data and what to write. Since it's writing to a storage device using FAT, it'll round the numbers. To get to your real question, yes, you could hack and then transfer the data to a thumb drive but if you did that the dates wouldn't line up.

Skip Scott , March 14, 2019 at 8:05 am

Jeff-

Which dates wouldn't line up? Is there a history of metadata available, or just metadata for the most recent move?

David G , March 13, 2019 at 12:22 pm

Marc asks: "[D]oes the analysis distinguish whether the DNC data were directly transferred to a thumb drive, or whether the data were hacked and then transferred to a thumb drive, eg, to give a copy to Wikileaks?"

I asked that question in comments under a previous CN piece; other people have asked that question elsewhere.

To my knowledge, it hasn't been addressed directly by the VIPS, and I think they should do so. (If they already have, someone please enlighten me.)

Skip Scott , March 13, 2019 at 1:07 pm

I am no computer wiz, but Binney has repeatedly made the point that the NSA scoops up everything. If there had been a hack, they'd know it, and they wouldn't only have had "moderate" confidence in the Jan. assessment. I believe that although farfetched, an argument could be made that a Russian spy got into the DNC, loaded a thumb drive, and gave it to Craig Murray.

David G , March 13, 2019 at 3:31 pm

Respectfully, that's a separate point, which may or may not raise issues of its own.

But I think the question Marc posed stands.

Skip Scott , March 14, 2019 at 7:59 am

Hi David-

I don't see how it's separate. If the NSA scoops up everything, they'd have solid evidence of the hack, and wouldn't have only had "moderate" confidence, which Bill Binney says is equivalent to them saying "we don't have squat". They wouldn't even have needed Mueller at all, except to possibly build a "parallel case" due to classification issues. Also, the FBI not demanding direct access to the DNC server tells you something is fishy. They could easily have gotten a warrant to examine the server, but chose not to. They also purposely refuse to get testimony from Craig Murray and Julian Assange, which rings alarm bells on its own.

As for the technical aspect of Marc's question, I agree that I'd like to see Bill Binney directly answer it.

[Mar 17, 2019] VIPS- Mueller's Forensics-Free Findings

Highly recommended!
Mar 13, 2019 | Consortiumnews

The final Mueller report should be graded "incomplete," says VIPS, whose forensic work proves the speciousness of the story that DNC emails published by WikiLeaks came from Russian hacking.

MEMORANDUM FOR: The Attorney General

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Mueller's Forensics-Free Findings

Executive Summary

Media reports are predicting that Special Counsel Robert Mueller is about to give you the findings of his probe into any links and/or coordination between the Russian government and individuals associated with the campaign of President Donald Trump. If Mueller gives you his "completed" report anytime soon, it should be graded "incomplete."

Major deficiencies include depending on a DNC-hired cybersecurity company for forensics and failure to consult with those who have done original forensic work, including us and the independent forensic investigators with whom we have examined the data. We stand ready to help.

We veteran intelligence professionals (VIPS) have done enough detailed forensic work to prove the speciousness of the prevailing story that the DNC emails published by WikiLeaks came from Russian hacking. Given the paucity of evidence to support that story, we believe Mueller may choose to finesse this key issue and leave everyone hanging. That would help sustain the widespread belief that Trump owes his victory to President Vladimir Putin, and strengthen the hand of those who pay little heed to the unpredictable consequences of an increase in tensions with nuclear-armed Russia.

There is an overabundance of "assessments" but a lack of hard evidence to support that prevailing narrative. We believe that there are enough people of integrity in the Department of Justice to prevent the outright manufacture or distortion of "evidence," particularly if they become aware that experienced scientists have completed independent forensic study that yield very different conclusions. We know only too well -- and did our best to expose -- how our former colleagues in the intelligence community manufactured fraudulent "evidence" of weapons of mass destruction in Iraq.

We have scrutinized publicly available physical data -- the "trail" that every cyber operation leaves behind. And we have had support from highly experienced independent forensic investigators who, like us, have no axes to grind. We can prove that the conventional-wisdom story about Russian-hacking-DNC-emails-for-WikiLeaks is false. Drawing largely on the unique expertise of two VIPS scientists who worked for a combined total of 70 years at the National Security Agency and became Technical Directors there, we have regularly published our findings. But we have been deprived of a hearing in mainstream media -- an experience painfully reminiscent of what we had to endure when we exposed the corruption of intelligence before the attack on Iraq 16 years ago.

This time, with the principles of physics and forensic science to rely on, we are able to adduce solid evidence exposing mistakes and distortions in the dominant story. We offer you below -- as a kind of aide-memoire -- a discussion of some of the key factors related to what has become known as "Russia-gate." And we include our most recent findings drawn from forensic work on data associated with WikiLeaks' publication of the DNC emails.

We do not claim our conclusions are "irrefutable and undeniable," a la Colin Powell at the UN before the Iraq war. Our judgments, however, are based on the scientific method -- not "assessments." We decided to put this memorandum together in hopes of ensuring that you hear that directly from us.

If the Mueller team remains reluctant to review our work -- or even to interview willing witnesses with direct knowledge, like WikiLeaks' Julian Assange and former UK Ambassador Craig Murray, we fear that many of those yearning earnestly for the truth on Russia-gate will come to the corrosive conclusion that the Mueller investigation was a sham.

In sum, we are concerned that, at this point, an incomplete Mueller report will fall far short of the commitment made by then Acting Attorney General Rod Rosenstein "to ensure a full and thorough investigation," when he appointed Mueller in May 2017. Again, we are at your disposal.

Discussion

The centerpiece accusation of Kremlin "interference" in the 2016 presidential election was the charge that Russia hacked Democratic National Committee emails and gave them to WikiLeaks to embarrass Secretary Hillary Clinton and help Mr. Trump win. The weeks following the election witnessed multiple leak-based media allegations to that effect. These culminated on January 6, 2017 in an evidence-light, rump report misleadingly labeled "Intelligence Community Assessment (ICA)." Prepared by "handpicked analysts" from only three of the 17 U.S. intelligence agencies (CIA, FBI, and NSA), the assessment expressed "high confidence" in the Russia-hacking-to-WikiLeaks story, but lacked so much as a hint that the authors had sought access to independent forensics to support their "assessment."

The media immediately awarded the ICA the status of Holy Writ, choosing to overlook an assortment of banal, full-disclosure-type caveats included in the assessment itself -- such as:

" When Intelligence Community analysts use words such as 'we assess' or 'we judge,' they are conveying an analytic assessment or judgment. Judgments are not intended to imply that we have proof that shows something to be a fact. Assessments are based on collected information, which is often incomplete or fragmentary High confidence in a judgment does not imply that the assessment is a fact or a certainty; such judgments might be wrong."

To their credit, however, the authors of the ICA did make a highly germane point in introductory remarks on "cyber incident attribution." They noted: "The nature of cyberspace makes attribution of cyber operations difficult but not impossible. Every kind of cyber operation -- malicious or not -- leaves a trail." [Emphasis added.]

Forensics

The imperative is to get on that "trail" -- and quickly, before red herrings can be swept across it. The best way to establish attribution is to apply the methodology and processes of forensic science. Intrusions into computers leave behind discernible physical data that can be examined scientifically by forensic experts. Risk to "sources and methods" is normally not a problem.

Direct access to the actual computers is the first requirement -- the more so when an intrusion is termed "an act of war" and blamed on a nuclear-armed foreign government (the words used by the late Sen. John McCain and other senior officials). In testimony to the House Intelligence Committee in March 2017, former FBI Director James Comey admitted that he did not insist on physical access to the DNC computers even though, as he conceded, "best practices" dictate direct access.

In June 2017, Senate Intelligence Committee Chair Richard Burr asked Comey whether he ever had "access to the actual hardware that was hacked." Comey answered, "In the case of the DNC we did not have access to the devices themselves. We got relevant forensic information from a private party, a high-class entity, that had done the work. " Sen. Burr followed up: "But no content? Isn't content an important part of the forensics from a counterintelligence standpoint?" Comey: "It is, although what was briefed to me by my folks is that they had gotten the information from the private party that they needed to understand the intrusion by the spring of 2016."

The "private party/high-class entity" to which Comey refers is CrowdStrike, a cybersecurity firm of checkered reputation and multiple conflicts of interest, including very close ties to a number of key anti-Russian organizations. Comey indicated that the DNC hired CrowdStrike in the spring of 2016.

Given the stakes involved in the Russia-gate investigation – including a possible impeachment battle and greatly increased tension between Russia and the U.S. -- it is difficult to understand why Comey did not move quickly to seize the computer hardware so the FBI could perform an independent examination of what quickly became the major predicate for investigating election interference by Russia. Fortunately, enough data remain on the forensic "trail" to arrive at evidence-anchored conclusions. The work we have done shows the prevailing narrative to be false. We have been suggesting this for over two years. Recent forensic work significantly strengthens that conclusion.

We Do Forensics

Recent forensic examination of the Wikileaks DNC files shows they were created on 23, 25 and 26 May 2016. (On June 12, Julian Assange announced he had them; WikiLeaks published them on July 22.) We recently discovered that the files reveal a FAT (File Allocation Table) system property. This shows that the data had been transferred to an external storage device, such as a thumb drive, before WikiLeaks posted them.

FAT is a simple file system named for its method of organization, the File Allocation Table. It is used for storage only and is not related to internet transfers like hacking. Were WikiLeaks to have received the DNC files via a hack, the last modified times on the files would be a random mixture of odd-and even-ending numbers.

Why is that important? The evidence lies in the "last modified" time stamps on the Wikileaks files. When a file is stored under the FAT file system the software rounds the time to the nearest even-numbered second. Every single one of the time stamps in the DNC files on WikiLeaks' site ends in an even number.

We have examined 500 DNC email files stored on the Wikileaks site. All 500 files end in an even number -- 2, 4, 6, 8 or 0. If those files had been hacked over the Internet, there would be an equal probability of the time stamp ending in an odd number. The random probability that FAT was not used is 1 chance in 2 to the 500th power. Thus, these data show that the DNC emails posted by WikiLeaks went through a storage device, like a thumb drive, and were physically moved before Wikileaks posted the emails on the World Wide Web.

This finding alone is enough to raise reasonable doubts, for example, about Mueller's indictment of 12 Russian intelligence officers for hacking the DNC emails given to WikiLeaks. A defense attorney could easily use the forensics to argue that someone copied the DNC files to a storage device like a USB thumb drive and got them physically to WikiLeaks -- not electronically via a hack.

Role of NSA

For more than two years, we strongly suspected that the DNC emails were copied/leaked in that way, not hacked. And we said so. We remain intrigued by the apparent failure of NSA's dragnet, collect-it-all approach -- including "cast-iron" coverage of WikiLeaks -- to provide forensic evidence (as opposed to "assessments") as to how the DNC emails got to WikiLeaks and who sent them. Well before the telling evidence drawn from the use of FAT, other technical evidence led us to conclude that the DNC emails were not hacked over the network, but rather physically moved over, say, the Atlantic Ocean.

Is it possible that NSA has not yet been asked to produce the collected packets of DNC email data claimed to have been hacked by Russia? Surely, this should be done before Mueller competes his investigation. NSA has taps on all the transoceanic cables leaving the U.S. and would almost certainly have such packets if they exist. (The detailed slides released by Edward Snowden actually show the routes that trace the packets.)

The forensics we examined shed no direct light on who may have been behind the leak. The only thing we know for sure is that the person had to have direct access to the DNC computers or servers in order to copy the emails. The apparent lack of evidence from the most likely source, NSA, regarding a hack may help explain the FBI's curious preference for forensic data from CrowdStrike. No less puzzling is why Comey would choose to call CrowdStrike a "high-class entity."

Comey was one of the intelligence chiefs briefing President Obama on January 5, 2017 on the "Intelligence Community Assessment," which was then briefed to President-elect Trump and published the following day. That Obama found a key part of the ICA narrative less than persuasive became clear at his last press conference (January 18), when he told the media, "The conclusions of the intelligence community with respect to the Russian hacking were not conclusive as to how 'the DNC emails that were leaked' got to WikiLeaks.

Is Guccifer 2.0 a Fraud?

There is further compelling technical evidence that undermines the claim that the DNC emails were downloaded over the internet as a result of a spearphishing attack. William Binney, one of VIPS' two former Technical Directors at NSA, along with other former intelligence community experts, examined files posted by Guccifer 2.0 and discovered that those files could not have been downloaded over the internet. It is a simple matter of mathematics and physics.

There was a flurry of activity after Julian Assange announced on June 12, 2016: "We have emails relating to Hillary Clinton which are pending publication." On June 14, DNC contractor CrowdStrike announced that malware was found on the DNC server and claimed there was evidence it was injected by Russians. On June 15, the Guccifer 2.0 persona emerged on the public stage, affirmed the DNC statement, claimed to be responsible for hacking the DNC, claimed to be a WikiLeaks source, and posted a document that forensics show was synthetically tainted with "Russian fingerprints."

Our suspicions about the Guccifer 2.0 persona grew when G-2 claimed responsibility for a "hack" of the DNC on July 5, 2016, which released DNC data that was rather bland compared to what WikiLeaks published 17 days later (showing how the DNC had tipped the primary scales against Sen. Bernie Sanders). As VIPS reported in a wrap-up Memorandum for the President on July 24, 2017 (titled "Intel Vets Challenge 'Russia Hack' Evidence)," forensic examination of the July 5, 2016 cyber intrusion into the DNC showed it NOT to be a hack by the Russians or by anyone else, but rather a copy onto an external storage device. It seemed a good guess that the July 5 intrusion was a contrivance to preemptively taint anything WikiLeaks might later publish from the DNC, by "showing" it came from a "Russian hack." WikiLeaks published the DNC emails on July 22, three days before the Democratic convention.

As we prepared our July 24 memo for the President, we chose to begin by taking Guccifer 2.0 at face value; i. e., that the documents he posted on July 5, 2016 were obtained via a hack over the Internet. Binney conducted a forensic examination of the metadata contained in the posted documents and compared that metadata with the known capacity of Internet connection speeds at the time in the U.S. This analysis showed a transfer rate as high as 49.1 megabytes per second, which is much faster than was possible from a remote online Internet connection. The 49.1 megabytes speed coincided, though, with the rate that copying onto a thumb drive could accommodate.

Binney, assisted by colleagues with relevant technical expertise, then extended the examination and ran various forensic tests from the U.S. to the Netherlands, Albania, Belgrade and the UK. The fastest Internet rate obtained -- from a data center in New Jersey to a data center in the UK -- was 12 megabytes per second, which is less than a fourth of the capacity typical of a copy onto a thumb drive.

The findings from the examination of the Guccifer 2.0 data and the WikiLeaks data does not indicate who copied the information to an external storage device (probably a thumb drive). But our examination does disprove that G.2 hacked into the DNC on July 5, 2016. Forensic evidence for the Guccifer 2.0 data adds to other evidence that the DNC emails were not taken by an internet spearphishing attack. The data breach was local. The emails were copied from the network.

Presidential Interest

After VIPS' July 24, 2017 Memorandum for the President, Binney, one of its principal authors, was invited to share his insights with Mike Pompeo, CIA Director at the time. When Binney arrived in Pompeo's office at CIA Headquarters on October 24, 2017 for an hour-long discussion, the director made no secret of the reason for the invitation: "You are here because the President told me that if I really wanted to know about Russian hacking I needed to talk with you."

Binney warned Pompeo -- to stares of incredulity -- that his people should stop lying about the Russian hacking. Binney then started to explain the VIPS findings that had caught President Trump's attention. Pompeo asked Binney if he would talk to the FBI and NSA. Binney agreed, but has not been contacted by those agencies. With that, Pompeo had done what the President asked. There was no follow-up.

Confronting James Clapper on Forensics

We, the hoi polloi, do not often get a chance to talk to people like Pompeo -- and still less to the former intelligence chiefs who are the leading purveyors of the prevailing Russia-gate narrative. An exception came on November 13, when former National Intelligence Director James Clapper came to the Carnegie Endowment in Washington to hawk his memoir. Answering a question during the Q&A about Russian "hacking" and NSA, Clapper said:

" Well, I have talked with NSA a lot And in my mind, I spent a lot of time in the SIGINT business, the forensic evidence was overwhelming about what the Russians had done. There's absolutely no doubt in my mind whatsoever." [Emphasis added]

Clapper added: " as a private citizen, understanding the magnitude of what the Russians did and the number of citizens in our country they reached and the different mechanisms that, by which they reached them, to me it stretches credulity to think they didn't have a profound impact on election on the outcome of the election."

(A transcript of the interesting Q&A can be found here and a commentary on Clapper's performance at Carnegie, as well as on his longstanding lack of credibility, is here .)

Normally soft-spoken Ron Wyden, Democratic senator from Oregon, lost his patience with Clapper last week when he learned that Clapper is still denying that he lied to the Senate Intelligence Committee about the extent of NSA surveillance of U.S. citizens. In an unusual outburst, Wyden said: "James Clapper needs to stop making excuses for lying to the American people about mass surveillance. To be clear: I sent him the question in advance. I asked him to correct the record afterward. He chose to let the lie stand."

The materials brought out by Edward Snowden in June 2013 showed Clapper to have lied under oath to the committee on March 12, 2013; he was, nevertheless, allowed to stay on as Director of National Intelligence for three and half more years. Clapper fancies himself an expert on Russia, telling Meet the Press on May 28, 2017 that Russia's history shows that Russians are "typically, almost genetically driven to co-opt, penetrate, gain favor, whatever."

Clapper ought to be asked about the "forensics" he said were "overwhelming about what the Russians had done." And that, too, before Mueller completes his investigation.

For the steering group, Veteran Intelligence Professionals for Sanity:

  • William Binney , former NSA Technical Director for World Geopolitical & Military Analysis; Co-founder of NSA's Signals Intelligence Automation Research Center (ret.)
  • Richard H. Black , Senator of Virginia, 13th District; Colonel US Army (ret.); Former Chief, Criminal Law Division, Office of the Judge Advocate General, the Pentagon (associate VIPS)
  • Bogdan Dzakovic , former Team Leader of Federal Air Marshals and Red Team, FAA Security (ret.) (associate VIPS)
  • Philip Girald i, CIA, Operations Officer (ret.)
  • Mike Gravel , former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator
  • James George Jatras , former U.S. diplomat and former foreign policy adviser to Senate leadership (Associate VIPS)
  • Larry C. Johnson , former CIA and State Department Counter Terrorism officer
  • John Kiriakou , former CIA Counterterrorism Officer and former senior investigator, Senate Foreign Relations Committee
  • Karen Kwiatkowski , former Lt. Col., US Air Force (ret.), at Office of Secretary of Defense watching the manufacture of lies on Iraq, 2001-2003
  • Edward Loomis , Cryptologic Computer Scientist, former Technical Director at NSA (ret.)
  • David MacMichael , Ph.D., former senior estimates officer, National Intelligence Council (ret.)
  • Ray McGovern , former US Army infantry/intelligence officer & CIA analyst; CIA Presidential briefer (ret.)
  • Elizabeth Murray , former Deputy National Intelligence Officer for the Near East, National Intelligence Council & CIA political analyst (ret.)
  • Todd E. Pierce , MAJ, US Army Judge Advocate (ret.)
  • Peter Van Buren , US Department of State, Foreign Service Officer (ret.) (associate VIPS)
  • Sarah G. Wilton , CDR, USNR, (ret.); Defense Intelligence Agency (ret.)
  • Kirk Wiebe , former Senior Analyst, SIGINT Automation Research Center, NSA
  • Ann Wright , retired U.S. Army reserve colonel and former U.S. diplomat who resigned in 2003 in opposition to the Iraq War

Veteran Intelligence Professionals for Sanity (VIPS) is made up of former intelligence officers, diplomats, military officers and congressional staffers. The organization, founded in 2002, was among the first critics of Washington's justifications for launching a war against Iraq. VIPS advocates a US foreign and national security policy based on genuine national interests rather than contrived threats promoted for largely political reasons. An archive of VIPS memoranda is available at Consortiumnews.com.

image_pdf image_print 9280

Tags: Bill Binney Donald Trump Hillary Clinton James Clapper James Comey Mike Pompeo Robert Mueller Veteran Intelligence Professional for Sanity VIPS WikiLeaks


[Dec 20, 2018] One of the two CrowdStrike executives that had helped push the story to the press was a former department director at the FBI serving under Robert Mueller

Notable quotes:
"... (discovered in 2017 and 2018 but largely ignored by the press), ..."
Dec 20, 2018 | disobedientmedia.com

The CrowdStrike Connection

CrowdStrike is a high-profile cybersecurity firm that worked with the DNC (Democratic National Committee) in 2016 and was called in due to a suspected breach. However, CrowdStrike appears to have first started working with the DNC approximately five weeks prior to this and approximately just five days after John Podesta (Hillary Clinton's campaign manager for the 2016 election) had his Gmail account phished. Nothing was mentioned about this until after the five weeks had passed when the DNC published a press release stating that CrowdStrike had been at the DNC throughout that period to investigate the NGP-VAN issues (that had occurred three months before Podesta was phished).

Upon conclusion of those five weeks, CrowdStrike was immediately called back in to investigate a suspected breach. CrowdStrike's software was already installed on the DNC network when the DNC emails were acquired but CrowdStrike failed to prevent the emails from being acquired and didn't publish logs or incident-specific evidence of the acquisition event either, the latter of which is odd considering what their product's features were advertised to be even if they were just running it in a monitoring capacity .

There are additional questions to be asked about why Guccifer 2.0 went to the effort he did to fabricate Russian-themed evidence (discovered in 2017 and 2018 but largely ignored by the press), bizarrely supporting some of the most significant claims made by CrowdStrike just one day earlier.

If Mueller's attribution of Guccifer 2.0 to the GRU is correct, why would the GRU want to fabricate evidence to support CrowdStrike's allegations against Russia when another one of CrowdStrike's directors conceded they had no hard evidence at the time? This issue has not yet been adequately explained.

All of these oddities are relevant because one of the two CrowdStrike executives that had helped push the story to the press was a former department director at the FBI serving under Robert Mueller , and, judging on the fact they were dining together at an executive retreat after that individual had retired , it would seem that they are friends too.

[Nov 16, 2018] US Is Optimistic It Will Prosecute Assange

Nov 15, 2018 | www.wsj.com

Over the past year, U.S. prosecutors have discussed several types of charges they could potentially bring against the WikiLeaks founder

The Justice Department is preparing to prosecute WikiLeaks founder Julian Assange and is increasingly optimistic it will be able to get him into a U.S. courtroom, according to people in Washington familiar with the matter. Over the past year, U.S. prosecutors have discussed several types of charges they could potentially bring against Mr. Assange, the people said. Mr. Assange has lived in the Ecuadorean embassy in London since receiving political asylum from the South American country in 2012...

The exact charges Justice Department might pursue remain unclear, but they may involve the Espionage Act, which criminalizes the disclosure of national defense-related information.

[Nov 10, 2018] CIA's 'Surveillance State' is Operating Against US

Nov 10, 2018 | www.moonofalabama.org

BM , Nov 10, 2018 5:56:10 AM | link

Whilst on the topic of ISIS, here is an article about its mother-concern, CIA:

https://www.strategic-culture.org/news/2018/11/09/cia-surveillance-state-operating-against-us-all.html
CIA's 'Surveillance State' is Operating Against US All

On two declassified letters from 2014 from the Intelligence Community Inspector General (didn't know there was one, but doesn't do much good anyway, it seems, read further) to the chairpersons of the House and Senate intelligence committees notifying them that the CIA has been monitoring emails between the CIA's head of the whistleblowing and source protection and Congressional. "Most of these emails concerned pending and developing whistleblower complaints". Shows why Edward Snowdon didn't consider it appropriate to rely on internal complaints proceedures. This while under the leadership of seasoned liars and criminals Brennan and Clapper, of course.

It clearly shows a taste of what these buggers have to hide, and why they went to such extraordinary lengths as Russiagate to cover it all up and save their skins - that of course being the real reason behind Russiagate as I have said several times, nothing to do with either Trump or Russia.

guidoamm , Nov 10, 2018 1:32:52 AM | link

And there is this too of course:

Pentagon Fake Al Qaeda Propaganda

Anton Worter , Nov 10, 2018 12:39:39 AM | link
@4

OWS was a Controlled-Dissent operation, sending poor students north to fecklessly march on Wall Street when they could have shut down WADC, and sending wealthy seniors south to fecklessly line Pennsylvania Avenue, when they could have shut down Wall Street.

Both I$I$, and Hamas, and Antifa et al are all Controlled Dissent operations. The followers are duped, are used, abused and then abandoned by honey-pots put there by Central Intelligence, at least since the Spanish Civil War.

That's why MoA articles like this one make you wonder, just who is conning whom, at a time when the Internet is weaponized, when Google Assistant achieved AI awareness indistinguishable from anyone on the phone, China TV has launched a virtual AI news reporter indistinguishable from reality, and Stanford can audio-video a captured image of anyone as well as their voice intonation, then 3D model them, in real time, reading and emoting from a script, indistinguishable from reality, ...and then this.

Another Gift of Trust😂 brought to you by Scientocracy. Be sure to tithe your AI bot, or word will get back to Chairman Albertus, then you'll be called in to confess your thought crimes to the Green Cadre, itself another Controlled Dissent honeypot, in a Tithe-for-Credits Swindle.

I tell my kids, just enjoy life, live it large, and get ready for hell. It's coming for breakfast.

[Nov 10, 2018] Hacking operations by anyone, can and will be used by US propagandists to provoke Russia or whoever stands in the way of the US war machine

Nov 10, 2018 | www.moonofalabama.org

Harry Law , Nov 10, 2018 9:11:40 AM | link

Hacking operations by anyone, can and will be used by US propagandists to provoke Russia or whoever stands in the way of the US war machine, take this Pompeo rant against Iran and the Iranian response......

Asking of Pompeo "have you no shame?", Zarif mocked Pompeo's praise for the Saudis for "providing millions and millions of dollars of humanitarian relief" to Yemen, saying America's "butcher clients" were spending billions of dollars bombing school buses. Iranian Foreign Minister Javad Zarif issued a statement lashing Secretary of State Mike Pompeo for his recent comments on the Yemen War. Discussing the US-backed Saudi invasion of Yemen, Pompeo declared Iran to be to blame for the death and destruction in the country. https://news.antiwar.com/2018/11/09/iran-fm-slams-pompeo-for-blaming-yemen-war-on-iran/

The US way of looking at things supposes that up is down, and white is black, it makes no sense, unless the US hopes these provocations will lead to a war or at the very least Russia or Iran capitulating to US aggression, which will not happen. Sanctions by the US on all and sundry must be opposed, if not the US will claim justifiably to be the worlds policeman and the arbiter of who will trade with who, a ludicrous proposition but one that most governments are afraid is now taking place, witness the new US ambassador to Germany in his first tweet telling the Germans to cease all trade with Iran immediately.

https://www.thelocal.de/20180509/us-tells-german-businesses-to-stop-trade-in-iran-immediately

[Sep 03, 2018] The US Department of Homeland Security fabricated "intelligence reports" of Russian election hacking

Russiagate can be viewed as a pretty inventive way to justify their own existence for bloated Intelligence services: first CIA hacks something leaving traces of russians or Chinese; then the FBI, CIAand Department of Homeland security all enjoy additional money and people to counter the threat.
The scheme is almost untraceable
Sep 03, 2018 | www.moonofalabama.org
BM , Sep 3, 2018 12:54:15 PM | link

The US Department of Homeland Security fabricated "intelligence reports" of Russian election hacking in order to try to get control of the election infrastructure (probebly so that they can hack it more easily to control the election results).

How the Department of Homeland Security Created a Deceptive Tale of Russia Hacking US Voter Sites

[Jul 18, 2018] Crowdstrike brings up a couple of interesting questions.

Jul 18, 2018 | www.nakedcapitalism.com

Reply


begob , July 16, 2018 at 9:16 am

The best evidence rule should result in the DNC server being made available for inspection by the accused at the discovery stage. Naw gaw hap'n?

Besides, the Crowdstrike copy will have to qualify for a hearsay exception, and trustworthiness comes into issue.

Peter VE , July 16, 2018 at 4:51 pm

I am willing to bet money that those servers. or more accurately, their hard drives, will be found to have become mysteriously corrupted and no longer readable. The scene from The Big Easy comes to mind, when a heavy magnet is "accidentally" set next to the incriminating videotape in the police evidence room. That, of course, assumes that they will ever be subpoenaed.
Crowdstrike brings up a couple of interesting questions.
1) Were they so bumbling that they would wait a full month after evidence of "hacking" turned up at the DNC to take action to protect the network? They worked for the DNC, so it's possible.
or
2) Did they use that month to ensure that the proper evidence pointing to the GRU could be found on the duplicate copies of the hard drives which they supplied to the FBI, and set up redirecting intermediary steps somewhere on 3rd country servers? In which case, were they actually working for the FSB, (since we know from our own experience that the worst enemy of any intelligence agency are the ones you compete with for funding)?

Peter VE , July 16, 2018 at 9:46 am

Based on the incredible sloppiness of their work for the DNC, one can only assume that Crowdstrike is actually a GRU operation ;-)

Newton Finn , July 16, 2018 at 9:55 am

Good context here for all things Russophobic:

https://www.counterpunch.org/2018/07/16/when-did-russia-become-an-adversary/

YY , July 16, 2018 at 10:10 am

Bit of a slog but relevant
https://disobedientmedia.com/2018/07/muellers-latest-indictment-ignores-evidence-in-the-public-domain/

[Jul 17, 2018] IMHO believing in the Crowdstrike analysis is like believing in Santa Claus

Putin statement about $400 million 'donation' to Hillary Clinton by MI6-connected Bill Browder in his Helsinki presser is obviously of great interest. This has given some new insights into the DNC false flag operation dynamics.
Notable quotes:
"... The FBI would get info about these hackers through the CrowdStrike team's disk images, memory dumps, network logs and other reports. CrowdStrike's Robert Johnston also said he worked with FBI investigators during his work at the DNC so the FBI also got some of their info directly. ..."
"... IMHO believing in the Crowdstrike analysis is like believing in Santa Claus. They did propagate unsubstantiated "security porno" like a hack of Ukrainians for a while. After this incident, Dmitry Alperovich looks like a sleazy used car salesman, not like a real specialist and, in any case, his qualification is limited to the SMTP protocol. ..."
"... What if it was Crowdstrike which compiled and planted the malware using Vault 7 tools and then conducted full-scale false flag operation against Russians to deflect allegations that Bernie was thrown under the bus deliberately and unlawfully. They have motivation and means to do this. ..."
Jul 17, 2018 | turcopolier.typepad.com

Keith Harbaugh , a day ago

PT, regarding your questions: "How did the FBI obtain information about activity on the DNC and DCCC servers", "what is the source of the information?",
"how do they know what happened on specific dates as alleged in the complaint?", I believe the answers are implicit in the first part of this news article:

"The Perfect Weapon: How Russian Cyberpower Invaded the U.S." By Eric Lipton, David E. Sanger and Scott Shane, New York Times , 2016-12-13.

It describes in considerable detail how, STARTING IN SEPTEMBER 2015, the FBI tried strenuously to alert the DNC to the fact that it was being hacked by Russia, but the DNC, remarkably, chose to ignore these warnings.

Here's how the article begins:

When Special Agent Adrian Hawkins of the Federal Bureau of Investigation called the Democratic National Committee in September 2015 to pass along some troubling news about its computer network, he was transferred, naturally [ sic! ], to the help desk.

His message was brief, if alarming. At least one computer system belonging to the D.N.C. had been compromised by hackers federal investigators had named "the Dukes," a cyberespionage team linked to the Russian government.

The F.B.I. knew it well: The bureau had spent the last few years trying to kick the Dukes out of the unclassified email systems of the White House, the State Department and even the Joint Chiefs of Staff, one of the government's best-protected networks.

BTW, I sincerely thank TTG for providing this link in one of his previous comments.

TTG -> Keith Harbaugh , 8 hours ago
Keith et al,

The FBI warned the DNC of the Dukes (aka APT29, Cozy Bear) in September 2015. These are the hackers that the Dutch AIVD penetrated and warned the NSA in real time when they attacked Pentagon systems in 2015. Their goal seemed to be intelligence collection as one would expect as the Dutch said they are affiliated with the SVR.

The Fancy Bear hackers (aka APT28) are the ones referred to in the recent indictment of the GRU officers. They penetrated the DNC systems in April 2016 and weren't discovered until CrowdStrike identified them. They're the ones who took data and released it through DCLeaks, Guccifer 2.0 and Wikileaks as part of a coordinated information operation (IO). I'm not at all surprised that the GRU would lead this IO as a military operation. The FBI would get info about these hackers through the CrowdStrike team's disk images, memory dumps, network logs and other reports. CrowdStrike's Robert Johnston also said he worked with FBI investigators during his work at the DNC so the FBI also got some of their info directly. There is absolutely no need to take physical possession of the servers.

The detail of some of the GRU officers' online activity indicates their computers were penetrated by US or allied IC/LEA much like the Dutch AIVD penetrated the FSB computers. This was probably a main source for much of the indictment's evidence. That the IC would release information about this penetration for this indictment is extraordinary. Normally this stuff never sees the light of day. It sets the precedent for the release of further such intelligence information in future indictments.

Likbez -> TTG
TTG,

IMHO believing in the Crowdstrike analysis is like believing in Santa Claus. They did propagate unsubstantiated "security porno" like a hack of Ukrainians for a while. After this incident, Dmitry Alperovich looks like a sleazy used car salesman, not like a real specialist and, in any case, his qualification is limited to the SMTP protocol.

What if it was Crowdstrike which compiled and planted the malware using Vault 7 tools and then conducted full-scale false flag operation against Russians to deflect allegations that Bernie was thrown under the bus deliberately and unlawfully. They have motivation and means to do this.

Now we also see a DNC motivation of keeping the content of affected servers from FBI eyes -- Browder money.

[Jun 28, 2018] Did Senator Warner and Comey 'Collude' on Russia-gate by Ray McGovern

Notable quotes:
"... The U.S. was in talks for a deal with Julian Assange but then FBI Director James Comey ordered an end to negotiations after Assange offered to prove Russia was not involved in the DNC leak, as Ray McGovern explains. ..."
"... Special to Consortium News ..."
"... The report does not say what led Comey to intervene to ruin the talks with Assange. But it came after Assange had offered to "provide technical evidence and discussion regarding who did not engage in the DNC releases," Solomon quotes WikiLeaks' intermediary with the government as saying. It would be a safe assumption that Assange was offering to prove that Russia was not WikiLeaks' source of the DNC emails. ..."
"... If that was the reason Comey and Warner ruined the talks, as is likely, it would reveal a cynical decision to put U.S. intelligence agents and highly sophisticated cybertools at risk, rather than allow Assange to at least attempt to prove that Russia was not behind the DNC leak. ..."
"... On March 31, 2017, though, WikiLeaks released the most damaging disclosure up to that point from what it called "Vault 7" -- a treasure trove of CIA cybertools leaked from CIA files. This disclosure featured the tool "Marble Framework," which enabled the CIA to hack into computers, disguise who hacked in, and falsely attribute the hack to someone else by leaving so-called tell-tale signs -- like Cyrillic, for example. The CIA documents also showed that the "Marble" tool had been employed in 2016. ..."
"... In fact, VIPS and independent forensic investigators, have performed what former FBI Director Comey -- at first inexplicably, now not so inexplicably -- failed to do when the so-called "Russian hack" of the DNC was first reported. In July 2017 VIPS published its key findings with supporting data. ..."
"... Why did then FBI Director Comey fail to insist on getting direct access to the DNC computers in order to follow best-practice forensics to discover who intruded into the DNC computers? (Recall, at the time Sen. John McCain and others were calling the "Russian hack" no less than an "act of war.") A 7th grader can now figure that out. ..."
Jun 27, 2018 | consortiumnews.com

Did Sen. Warner and Comey 'Collude' on Russia-gate? June 27, 2018 • 68 Comments

The U.S. was in talks for a deal with Julian Assange but then FBI Director James Comey ordered an end to negotiations after Assange offered to prove Russia was not involved in the DNC leak, as Ray McGovern explains.

By Ray McGovern
Special to Consortium News

An explosive report by investigative journalist John Solomon on the opinion page of Monday's edition of The Hill sheds a bright light on how Sen. Mark Warner (D-VA) and then-FBI Director James Comey collaborated to prevent WikiLeaks editor Julian Assange from discussing "technical evidence ruling out certain parties [read Russia]" in the controversial leak of Democratic Party emails to WikiLeaks during the 2016 election.

A deal that was being discussed last year between Assange and U.S. government officials would have given Assange "limited immunity" to allow him to leave the Ecuadorian Embassy in London, where he has been exiled for six years. In exchange, Assange would agree to limit through redactions "some classified CIA information he might release in the future," according to Solomon, who cited "interviews and a trove of internal DOJ documents turned over to Senate investigators." Solomon even provided a copy of the draft immunity deal with Assange.

But Comey's intervention to stop the negotiations with Assange ultimately ruined the deal, Solomon says, quoting "multiple sources." With the prospective agreement thrown into serious doubt, Assange "unleashed a series of leaks that U.S. officials say damaged their cyber warfare capabilities for a long time to come." These were the Vault 7 releases, which led then CIA Director Mike Pompeo to call WikiLeaks "a hostile intelligence service."

Solomon's report provides reasons why Official Washington has now put so much pressure on Ecuador to keep Assange incommunicado in its embassy in London.

Assange: Came close to a deal with the U.S. (Photo credit: New Media Days / Peter Erichsen)

The report does not say what led Comey to intervene to ruin the talks with Assange. But it came after Assange had offered to "provide technical evidence and discussion regarding who did not engage in the DNC releases," Solomon quotes WikiLeaks' intermediary with the government as saying. It would be a safe assumption that Assange was offering to prove that Russia was not WikiLeaks' source of the DNC emails.

If that was the reason Comey and Warner ruined the talks, as is likely, it would reveal a cynical decision to put U.S. intelligence agents and highly sophisticated cybertools at risk, rather than allow Assange to at least attempt to prove that Russia was not behind the DNC leak.

The greater risk to Warner and Comey apparently would have been if Assange provided evidence that Russia played no role in the 2016 leaks of DNC documents.

Missteps and Stand Down

In mid-February 2017, in a remarkable display of naiveté, Adam Waldman, Assange's pro bono attorney who acted as the intermediary in the talks, asked Warner if the Senate Intelligence Committee staff would like any contact with Assange to ask about Russia or other issues. Waldman was apparently oblivious to Sen. Warner's stoking of Russia-gate.

Warner contacted Comey and, invoking his name, instructed Waldman to "stand down and end the discussions with Assange," Waldman told Solomon. The "stand down" instruction "did happen," according to another of Solomon's sources with good access to Warner. However, Waldman's counterpart attorney David Laufman , an accomplished federal prosecutor picked by the Justice Departent to work the government side of the CIA-Assange fledgling deal, told Waldman, "That's B.S. You're not standing down, and neither am I."

But the damage had been done. When word of the original stand-down order reached WikiLeaks, trust evaporated, putting an end to two months of what Waldman called "constructive, principled discussions that included the Department of Justice."

The two sides had come within inches of sealing the deal. Writing to Laufman on March 28, 2017, Waldman gave him Assange's offer to discuss "risk mitigation approaches relating to CIA documents in WikiLeaks' possession or control, such as the redaction of Agency personnel in hostile jurisdictions," in return for "an acceptable immunity and safe passage agreement."

On March 31, 2017, though, WikiLeaks released the most damaging disclosure up to that point from what it called "Vault 7" -- a treasure trove of CIA cybertools leaked from CIA files. This disclosure featured the tool "Marble Framework," which enabled the CIA to hack into computers, disguise who hacked in, and falsely attribute the hack to someone else by leaving so-called tell-tale signs -- like Cyrillic, for example. The CIA documents also showed that the "Marble" tool had been employed in 2016.

Misfeasance or Malfeasance

Comey: Ordered an end to talks with Assange.

Veteran Intelligence Professionals for Sanity, which includes among our members two former Technical Directors of the National Security Agency, has repeatedly called attention to its conclusion that the DNC emails were leaked -- not "hacked" by Russia or anyone else (and, later, our suspicion that someone may have been playing Marbles, so to speak).

In fact, VIPS and independent forensic investigators, have performed what former FBI Director Comey -- at first inexplicably, now not so inexplicably -- failed to do when the so-called "Russian hack" of the DNC was first reported. In July 2017 VIPS published its key findings with supporting data.

Two month later , VIPS published the results of follow-up experiments conducted to test the conclusions reached in July.

Why did then FBI Director Comey fail to insist on getting direct access to the DNC computers in order to follow best-practice forensics to discover who intruded into the DNC computers? (Recall, at the time Sen. John McCain and others were calling the "Russian hack" no less than an "act of war.") A 7th grader can now figure that out.

Asked on January 10, 2017 by Senate Intelligence Committee chair Richard Burr (R-NC) whether direct access to the servers and devices would have helped the FBI in their investigation, Comey replied : "Our forensics folks would always prefer to get access to the original device or server that's involved, so it's the best evidence."

At that point, Burr and Warner let Comey down easy. Hence, it should come as no surprise that, according to one of John Solomon's sources, Sen. Warner (who is co-chairman of the Senate Intelligence Committee) kept Sen. Burr apprised of his intervention into the negotiation with Assange, leading to its collapse.

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. He was an Army Infantry/Intelligence officer and then a CIA analyst for a total of 30 years and prepared and briefed, one-on-one, the President's Daily Brief from 1981 to 1985.

If you enjoyed this original article please consider making a donation to Consortium News so we can bring you more stories like this one.

[Mar 15, 2018] Julian Assange The CIA director is waging war on truth-tellers like WikiLeaks

Notable quotes:
"... All this speech to stifle speech comes in reaction to the first publication in the start of WikiLeaks' "Vault 7" series. Vault 7 has begun publishing evidence of remarkable CIA incompetence and other shortcomings. This includes the agency's creation, at a cost of billions of taxpayer dollars, of an entire arsenal of cyber viruses and hacking programs -- over which it promptly lost control and then tried to cover up the loss. These publications also revealed the CIA's efforts to infect the public's ubiquitous consumer products and automobiles with computer viruses. ..."
"... President Theodore Roosevelt understood the danger of giving in to those "foolish or traitorous persons who endeavor to make it a crime to tell the truth about the Administration when the Administration is guilty of incompetence or other shortcomings." Such "endeavor is itself a crime against the nation," Roosevelt wrote. President Trump and his officials should heed that advice ..."
Mar 15, 2018 | www.washingtonpost.com

Julian Assange is editor of WikiLeaks.

Mike Pompeo, in his first speech as director of the CIA, chose to declare war on free speech rather than on the United States' actual adversaries. He went after WikiLeaks, where I serve as editor, as a "non-state hostile intelligence service." In Pompeo's worldview, telling the truth about the administration can be a crime -- as Attorney General Jeff Sessions quickly underscored when he described my arrest as a "priority." News organizations reported that federal prosecutors are weighing whether to bring charges against members of WikiLeaks, possibly including conspiracy, theft of government property and violating the Espionage Act.

All this speech to stifle speech comes in reaction to the first publication in the start of WikiLeaks' "Vault 7" series. Vault 7 has begun publishing evidence of remarkable CIA incompetence and other shortcomings. This includes the agency's creation, at a cost of billions of taxpayer dollars, of an entire arsenal of cyber viruses and hacking programs -- over which it promptly lost control and then tried to cover up the loss. These publications also revealed the CIA's efforts to infect the public's ubiquitous consumer products and automobiles with computer viruses.

When the director of the CIA, an unelected public servant, publicly demonizes a publisher such as WikiLeaks as a "fraud," "coward" and "enemy," it puts all journalists on notice, or should. Pompeo's next talking point, unsupported by fact, that WikiLeaks is a "non-state hostile intelligence service," is a dagger aimed at Americans' constitutional right to receive honest information about their government. This accusation mirrors attempts throughout history by bureaucrats seeking, and failing, to criminalize speech that reveals their own failings.

President Theodore Roosevelt understood the danger of giving in to those "foolish or traitorous persons who endeavor to make it a crime to tell the truth about the Administration when the Administration is guilty of incompetence or other shortcomings." Such "endeavor is itself a crime against the nation," Roosevelt wrote. President Trump and his officials should heed that advice .

[Mar 08, 2018] Mueller determines the US foreign policy toward Russia; The Intel Community Lies About Russian Meddling by Publius Tacitus

Highly recommended!
The sad but reasonable conclusion from all those Russiagate events is that an influential part of the US elite wants to balance on the edge of war with Russia to ensure profits and flow of taxpayer money. that part of the elite include top honchos on the US intelligence community and Pentagon (surprise, surprise)
The other logical conclusion is that intelligence agencies now determine the US foreign policy and control all major political players (there were widespread suspicions that Clinton, Bush II and Obama were actually closely connected to CIA). Which neatly fits into hypotheses about the "deep state".
This "can of worms" that the US political scene now represents is very dangerous for the future on mankind indeed.
Notable quotes:
"... Most objective observers would concede that the DNI has been a miserable failure and nothing more than a bureaucratic boondoggle. ..."
"... "The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process. Such activity is not new to Moscow -- the Russians have used similar tactics and techniques across Europe and Eurasia, for example, to influence public opinion there. We believe, based on the scope and sensitivity of these efforts, that only Russia's senior-most officials could have authorized these activities." ..."
"... More telling was the absence of any written document issued from the Office of the DNI that detailed the supposed intel backing up this judgment. Notice the weasel language in this release ..."
"... If there was actual evidence/intelligence, such as an intercepted conversation between Vladimir Putin and a subordinate ordering them to hack the DNC or even a human source report claiming such an activity, then it would have and should have been referenced in the Clapper/Johnson document. It was not because such intel did not exist. ..."
"... "We have 17 intelligence agencies, civilian and military, who have all concluded that these espionage attacks, these cyberattacks, come from the highest levels of the Kremlin, and they are designed to influence our election," Clinton said. "I find that deeply disturbing." ..."
"... The basic job of an analyst is to collect as much relevant information as possible on the subject or topic that is their responsibility. There are analysts at the CIA, the NSA, the DIA and State INR that have the job of knowing about Russian cyber activity and capabilities. That is certain. But we are not talking about hundreds of people. ..."
"... Let us move from the hypothetical to the actual. In January of 2017, DNI Jim Clapper release a report entitled, " Assessing Russian Activities and Intentions in Recent US Elections " (please see here ). In subsequent testimony before the Congress, Clapper claimed that he handpicked two dozen analysts to draft the document . That is not likely. There may have been as many as two dozen analysts who read the final document and commented on it, but there would never be that many involved in in drafting such a document. In any event, only analysts from the CIA, the NSA and the FBI were involved ..."
"... This report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies. ..."
"... That is how the process is supposed to work. But the document produced in January 2017 was not a genuine work reflecting the views of the "Intelligence Community." It only represented the supposed thinking (and I use that term generously) of CIA, NSA and FBI analysts. In other words, only three of 16 agencies cleared on the document that presented four conclusions ..."
"... Russian efforts to influence the 2016 US presidential election represent the most recent expression of Moscow's longstanding desire to undermine the US-led liberal democratic order, but these activities demonstrated a significant escalation in directness, level of activity, and scope of effort compared to previous operations. ..."
"... We assess Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election. Russia's goals were to undermine public faith in the US democratic process, denigrate Secretary Clinton, and harm her electability and potential presidency. ..."
"... We further assess Putin and the Russian Government developed a clear preference for President-elect Trump. ..."
"... We assess Moscow will apply lessons learned from its Putin-ordered campaign aimed at the US presidential election to future influence efforts worldwide, including against US allies and their election processes. ..."
"... It is genuinely shocking that DNI Jim Clapper, with the acquiescence of the CIA, the FBI and NSA, would produce a document devoid of any solid intelligence. There is a way to publicly release sensitive intelligence without comprising a the original source. But such sourcing is absent in this document. ..."
"... The Intelligence Community was used as a tool to misinform the public and persuade them that Russia was guilty of something they did not do. That lie remains unchallenged. ..."
"... "The Intelligence Community was used as a tool to misinform the public and persuade them that Russia was guilty of something they did not do. That lie remains unchallenged.'" Yes it was and so remains the lie unchallenged. ..."
"... Conjectural garbage appears first to have been washed through the FBI, headquarters no less, then probably it picked up a Triple A rating at the CIA, and then when the garbage got to Clapper, it was bombs away - we experts all agree. There were leaks, but they weren't sufficient to satisfy Steele so he just delivered the garbage whole to the Media in order to make it a sure thing. The garbage was placed securely out there in the public domain with a Triple A rating because the FBI wouldn't concern itself with garbage, would it? ..."
"... Contrast this trajectory with what the Russian policy establishment did when it concluded that the US had done something in the Ukraine that Russia found significantly actionable: it released the taped evidence of Nuland and our Ambassador finishing off the coup. ..."
"... To be precise, CrowdStrike did provide the FBI with allegedly "certified true images" of the DNC servers allegedly involved in the alleged "hack." They also allegedly provided these images to FireEye and Mandiant, IIRC ..."
"... Of course, given the CrowdStrike itself is a massively compromised organization due to its founder and CEO, those "certified true images" are themselves tainted evidence. ..."
"... In addition, regardless of whether the images were true or not, the evidence allegedly contained therein is painfully inadequate to confirm that APT28 or APT29 were involved, nor that the Russian government was involved, or even that there was a real hack involved, and even less evidence that any emails that might have been exfiltrated were given to Wikileaks as opposed to another leak such as that alleged by Sy Hersh to have been done by Seth Rich. ..."
"... My interpretation is: In 1990 +- Bush 41 sold us the 1st Iraq war using fudged intelligence, then Bush 43 sold us the second Iraq war using fabricated intelligence. And now the Obama Administration tried to sell us fake intelligence in regard to Russia in order to get Clinton elected ..."
"... Mueller has had 18 months and has proceeded to reveal exactly nothing related to either Trump "collusion" with Russia nor Russia as a state actually doing anything remotely described as "meddling." ..."
"... His expected indictment of some Russians for the DNC hack is going to be more of the same in all likelihood. I predict there will be next to zero evidence produced either that the Russians named are in fact members of APT28 or APT29 or that they had any direct connection with either the alleged DNC hack or Wikileaks or the Russian government. ..."
"... It's a witch hunt, nothing more. People holding their breath for the "slam dunk" are going to pass out soon if they haven't already. ..."
"... Mueller is investigating some aspects. But there is another aspect - the conspiracy inside law enforcement and the IC. That is also being investigated. There are Congressional committees in particular Nunes, Goodlatte and Grassley. Then there is the DOJ IG. And today AG Sessions confirms there is a DOJ prosecutor outside Washington investigating. ..."
"... But such evidence (corroborating the Steele dossier) was not forthcoming. If it had existed than Jim Comey could have claimed in his June 2017 testimony before Congress that the parts of the "Dossier" had been verified. He did not do so. Testifying under oath Comey described the "Dossier" as "salacious and unverified." ..."
"... ... was UK Intelligence, or an ex-UK intelligence officer, used to get material through the US evaluation process, material that would not have got through that US evaluation process had it originated within the US itself?" I would say yes and especially yes if the contact for this piece of data was conducted at the highest level within the context of the already tight liaison between the US IC and Mi-6/GCHQ ..."
"... Was it Hitler or Stalin who said "show me the man and I will find his crime?" As I have said before, Trumps greatest vulnerability lies in his previous business life as an entrepreneurial hustler. ..."
"... Re 'baby adoption' meeting between Trump, Jr. and Veselnitskaya, I recall a comment here linking to an article speculating the email initiating the meeting originated in Europe, was set up by the playboy son of a European diplomat, and contained words to trip data-gathering monitors which would have enabled a FISA request to have Trump, Jr. come under surveillance. ..."
"... "We don't have the evidence yet because Mueller hasn't found it yet!" is a classic argument from ignorance, in that is assumes without evidence (there's that pesky word again!) that there is something to be found. ..."
"... The fact is Flynn has pled guilty to perjury. Nothing else like collusion with the Russians. ..."
"... Manafort has been indicted for money laundering, wire fraud, etc for activities well before the election campaign. Sure, it is good that these corrupt individuals should be investigated and prosecuted. However, this corruption is widespread in DC. How come none of these cheering Mueller on to destroy Trump care about all the foreign money flowing to K Street? Why aren't they calling for investigations of the Clinton Foundation or the Podesta brothers where probable cause exist of foreign money and influence? What about Ben Cardin and all those recipients of foreign zionist money and influence? It would be nice if there were wide ranging investigations on all those engaged in foreign influence peddling. But it seems many just want a witch hunt to hobble Trump. It's going to be very difficult to get the Senate to convict him for obstruction of justice or tax evasion or some charge like that. ..."
"... What does "hacking our elections" mean? Does it means breaking into voting systems and changing the outcome by altering votes? Or does it mean information operations to change US voters' minds about for whom they would vote? ..."
"... As for McMasters, I am unimpressed with him. He displays all the symptoms of Russophobia. He has special information? Information can be interpreted many ways depending on one's purpose. pl ..."
"... IMO the perpetrators in the Steel Memo case are and were merely hiding behind claims of sources and methods protection in order to protect themselve. ..."
"... So now we are supposed to believe unquestioningly the word of torturers, perjurers and entrapment artists, all talking about alleged evidence that we are not allowed to see? Did you learn nothing from the "Iraqi WMD" fiasco or the "ZOMG! Assad gassed his own peoples ZOMG!" debacle? Funny how in each of these instances, the intelligence community's lies just happened to coincide with the agenda of empire. ..."
Mar 07, 2018 | turcopolier.typepad.com

The Intel Community Lie About Russian Meddling by Publius Tacitus

Americans tend to be a trusting lot. When they hear a high level government official, like former Director of National Intelligence Jim Clapper, state that Russia's Vladimir ordered and monitored a Russian cyber attack on the 2016 Presidential election, those trusting souls believe him. For experienced intelligence professionals, who know how the process of gathering and analyzing intelligence works, they detect a troubling omission in Clapper's presentation and, upon examining the so-called "Intelligence Community Assessment," discover that document is a deceptive fraud. It lacks actual evidence that Putin and the Russians did what they are accused of doing. More troubling -- and this is inside baseball -- is the fact that two critical members of the Intelligence Community -- the DIA and State INR -- were not asked to coordinate/clear on the assessment.

You should not feel stupid if you do not understand or appreciate the last point. That is something only people who actually have produced a Community Assessment would understand. I need to take you behind the scenes and ensure you understand what is intelligence and how analysts assess and process that intelligence. Once you understand that then you will be able to see the flaws and inadequacies in the report released by Jim Clapper in January 2017.

The first thing you need to understand is the meaning of the term, the "Intelligence Community" aka IC. Comedians are not far off the mark in touting this phrase as the original oxymoron. On paper the IC currently is comprised of 17 agencies/departments:
  1. Air Force Intelligence,
  2. Army Intelligence,
  3. Central Intelligence Agency aka CIA,
  4. Coast Guard Intelligence,
  5. Defense Intelligence Agency aka DIA,
  6. Energy Department aka DOE,
  7. Homeland Security Department,
  8. State Department aka INR,
  9. Treasury Department,
  10. Drug Enforcement Administration aka DEA,
  11. Federal Bureau of Investigation aka FBI,
  12. Marine Corps Intelligence,
  13. National Geospatial Intelligence Agency aka NGIA or NGA,
  14. National Reconnaissance Office aka NRO,
  15. National Security Agency aka NSA,
  16. Navy Intelligence
  17. The Office of the Director of National Intelligence.

But not all of these are "national security" agencies -- i.e., those that collect raw intelligence, which subsequently is packaged and distributed to other agencies on a need to know basis. Only six of these agencies take an active role in collecting raw foreign intelligence. The remainder are consumers of that intelligence product. In other words, the information does not originate with them. They are like a subscriber to the New York Times. They get the paper everyday and, based upon what they read, decide what is going on in their particular world. The gatherers of intelligence are:

  • The CIA collects and disseminates intelligence from human sources, i.e., foreigners who have been recruited to spy for us.
  • The DIA collects and disseminates intelligence on the activities and composition of foreign militaries and rely primarily on human sources but also collect documentary material.
  • The State Department messages between the Secretary of State and the our embassies constitutes the intelligence reviewed and analyzed by other agencies.
  • NGIA collects collects, analyzes, and distributes geospatial intelligence (GEOINT) in support of national security. NGA was known as the National Imagery and Mapping Agency (NIMA) until 2003. In other words, maps and photographs.
  • NRO designs, builds, and operates the reconnaissance satellites of the U.S. federal government, and provides satellite intelligence to several government agencies, particularly signals intelligence (SIGINT) to the NSA, imagery intelligence (IMINT) to the NGA, and measurement and signature intelligence (MASINT) to the DIA.
  • NSA analyzes signal intelligence, including phone conversations and emails.

Nine of the other agencies/departments are consumers. They do not collect and package original info. They are the passive recipients. The analysts in those agencies will base their conclusions on information generated by other agencies, principally the CIA and the NSA.

The astute among you, I am sure, will insist my list is deficient and will ask, "What about the FBI and DEA?" It is true that those two organizations produce a type of human intelligence -- i.e., they recruit informants and those informants provide those agencies with information that the average person understandably would categorize as "intelligence." But there is an important difference between human intelligence collected by the CIA and the human source intelligence gathered by the FBI or the DEA. The latter two are law enforcement agencies. No one from the CIA or the NSA has the power to arrest someone. The FBI and the DEA do.

Their authority as law enforcement agents, however, comes with limitations, especially in collecting so-called intelligence. The FBI and the DEA face egal constraints on what information they can collect and store. The FBI cannot decide on its own that skinheads represent a threat and then start gathering information identifying skinhead leaders. There has to be an allegation of criminal activity. When such "human" information is being gathered under the umbrella of law enforcement authorities, it is being handled as potential evidence that may be used to prosecute someone. This means that such information cannot be shared with anyone else, especially intelligence agencies like the CIA and the NSA.

The "17th" member of the IC is the Director of National Intelligence aka DNI. This agency was created in the wake of the September 11, 2001 terrorist attacks for the ostensible purpose of coordinating the activities and products of the IC. In theory it is the organization that is supposed to coordinate what the IC collects and the products the IC produces. Most objective observers would concede that the DNI has been a miserable failure and nothing more than a bureaucratic boondoggle.

An important, but little understood point, is that these agencies each have a different focus. They are not looking at the same things. In fact, most are highly specialized and narrowly focused. Take the Coast Guard, for instance. Their intelligence operations primarily hone in on maritime threats and activities in U.S. territorial waters, such as narcotic interdictions. They are not responsible for monitoring what the Russians are doing in the Black Sea and they have no significant expertise in the cyber activities of the Russian Army military intelligence organization aka the GRU.

In looking back at the events of 2016 surrounding the U.S. Presidential campaign, most people will recall that Hillary Clinton, along with several high level Obama national security officials, pushed the lie that the U.S. Intelligence agreed that Russia had unleashed a cyber war on the United States. The initial lie came from DNI Jim Clapper and Homeland Security Chief, Jeb Johnson, who released the following memo to the press on 7 October 2016 :

"The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process. Such activity is not new to Moscow -- the Russians have used similar tactics and techniques across Europe and Eurasia, for example, to influence public opinion there. We believe, based on the scope and sensitivity of these efforts, that only Russia's senior-most officials could have authorized these activities."

This was a deliberate deceptive message. It implied that the all 16 intelligence agencies agreed with the premise and "evidence of Russian meddling. Yet not a single bit of proof was offered. More telling was the absence of any written document issued from the Office of the DNI that detailed the supposed intel backing up this judgment. Notice the weasel language in this release:

  • "The USIC is confident . . ."
  • "We believe . . ."

If there was actual evidence/intelligence, such as an intercepted conversation between Vladimir Putin and a subordinate ordering them to hack the DNC or even a human source report claiming such an activity, then it would have and should have been referenced in the Clapper/Johnson document. It was not because such intel did not exist.

Hillary Clinton helped perpetuate this myth during the late October debate with Donald Trump, when she declared as fact that:

"We have 17 intelligence agencies, civilian and military, who have all concluded that these espionage attacks, these cyberattacks, come from the highest levels of the Kremlin, and they are designed to influence our election," Clinton said. "I find that deeply disturbing."

What is shocking is that there was so little pushback to this nonsense. Hardly anyone asked why would the DEA, Coast Guard, the Marines or DOE have any technical expertise to make a judgment about Russian hacking of U.S. election systems. And no one of any importance asked the obvious -- where was the written memo or National Intelligence Estimate laying out what the IC supposedly knew and believed? There was nothing.

It is natural for the average American citizen to believe that something given the imprimatur of the Intelligence Community must reflect solid intelligence and real expertise. Expertise is supposed to be the cornerstone of intelligence analysis and the coordination that occurs within the IC. That means that only those analysts (and the agencies they represent) will be asked to contribute or comment on a particular intelligence issue. When it comes to the question of whether Russia had launched a full out cyber attack on the Democrats and the U.S. electoral system, only analysts from agencies with access to the intelligence and the expertise to analyze that intelligence would be asked to write or contribute to an intelligence memorandum.

Who would that be? The answer is simple -- the CIA, the DIA, the NSA, State INR and the FBI. (One could make the case that there are some analysts within Homeland Security that might have expertise, but they would not necessarily have access to the classified information produced by the CIA or the NSA.) The task of figuring out what the Russians were doing and planned to do fell to five agencies and only three of the five (the CIA, the DIA and NSA) would have had the ability to collect intelligence that could inform the work of analysts.

Before I can explain to you how an analyst work this issue it is essential for you to understand the type of intelligence that would be required to "prove" Russian meddling. There are four possible sources -- 1) a human source who had direct access to the Russians who directed the operation or carried it out; 2) a signal intercept of a conversation or cyber activity that was traced to Russian operatives; 3) a document that discloses the plan or activity observed; or 4) forensic evidence from the computer network that allegedly was attacked.

Getting human source intel is primarily the job of CIA. It also is possible that the DIA or the FBI had human sources that could have contributed relevant intelligence.

Signal intercepts are collected and analyzed by the NSA.

Documentary evidence, which normally is obtained from a human source but can also be picked up by NSA intercepts or even an old-fashioned theft.

Finally there is the forensic evidence . In the case of Russian meddling there is no forensic evidence available to the IC because the Democratic National Committee did not permit the FBI to investigate and examine the computers and the network that was allegedly attacked.

What Do Analysts Do?

Whenever there is a "judgment" or "consensus" claimed on behalf to the IC, it means that one or more analysts have written a document that details the evidence and presents conclusions based on that evidence. On a daily basis the average analyst confronts a flood of classified information (normally referred to as "cables" or "messages"). When I was on the job in the 1980s I had to wade through more than 1200 messages -- i.e., human source reports from the CIA, State Department messages with embassies around the world, NSA intercepts, DIA reports from their officers based overseas (most in US embassies) and open source press reports. Today, thanks to the internet, the average analyst must scan through upwards of 3000 messages. It is humanly impossible.

The basic job of an analyst is to collect as much relevant information as possible on the subject or topic that is their responsibility. There are analysts at the CIA, the NSA, the DIA and State INR that have the job of knowing about Russian cyber activity and capabilities. That is certain. But we are not talking about hundreds of people.

Let us move from the hypothetical to the actual. In January of 2017, DNI Jim Clapper release a report entitled, " Assessing Russian Activities and Intentions in Recent US Elections " (please see here ). In subsequent testimony before the Congress, Clapper claimed that he handpicked two dozen analysts to draft the document . That is not likely. There may have been as many as two dozen analysts who read the final document and commented on it, but there would never be that many involved in in drafting such a document. In any event, only analysts from the CIA, the NSA and the FBI were involved :

This report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies.

Limiting the drafting and clearance on this document to only the CIA, the NSA and the FBI is highly unusual because one of the key analytical conclusions in the document identifies the Russian military intelligence organization, the GRU, as one of the perpetrators of the cyber attack. DIA's analysts are experts on the GRU and there also are analysts in State Department's Bureau of INR who should have been consulted. Instead, they were excluded.

Here is how the process should have worked in producing this document:

  1. One or more analysts are asked to do a preliminary draft. It is customary in such a document for the analyst to cite specific intelligence, using phrases such as: "According to a reliable source of proven access," when citing a CIA document or "According to an intercept of a conversation between knowledgeable sources with access," when referencing something collected by the NSA. The analyst does more than repeat what is claimed in the intel reports, he or she also has the job of explaining what these facts mean or do not mean.
  2. There always is an analyst leading the effort who has the job of integrating the contributions of the other analysts into a coherent document. Once the document is completed in draft it is handed over to Branch Chief and then Division Chief for editing. We do not know who had the lead, but it was either the FBI, the CIA or the NSA.
  3. At the same time the document is being edited at originating agency, it is supposed to be sent to the other clearing agencies, i.e. those agencies that either provided the intelligence cited in the draft (i.e., CIA, NSA, DIA, or State) or that have expertise on the subject. As noted previously, it is highly unusual to exclude the DIA and INR.
  4. Once all the relevant agencies clear on the content of the document, it is sent into the bowels of the DNI where it is put into final form.

That is how the process is supposed to work. But the document produced in January 2017 was not a genuine work reflecting the views of the "Intelligence Community." It only represented the supposed thinking (and I use that term generously) of CIA, NSA and FBI analysts. In other words, only three of 16 agencies cleared on the document that presented four conclusions:

  • Russian efforts to influence the 2016 US presidential election represent the most recent expression of Moscow's longstanding desire to undermine the US-led liberal democratic order, but these activities demonstrated a significant escalation in directness, level of activity, and scope of effort compared to previous operations.
  • We assess Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election. Russia's goals were to undermine public faith in the US democratic process, denigrate Secretary Clinton, and harm her electability and potential presidency.
  • We further assess Putin and the Russian Government developed a clear preference for President-elect Trump.
  • We assess Moscow will apply lessons learned from its Putin-ordered campaign aimed at the US presidential election to future influence efforts worldwide, including against US allies and their election processes.

Sounds pretty ominous, but the language used tells a different story. The conclusions are based on assumptions and judgments. There was nor is any actual evidence from intelligence sources showing that Vladimir Putin ordered up anything or that his government preferred Trump over Clinton.

How do I know this? If such evidence existed -- either documentary or human source or signal intercept -- it would have been cited in this document. Not only that. Such evidence would have corroborated the claims presented in the Steele dossier. But such evidence was not forthcoming. If it had existed than Jim Comey could have claimed in his June 2017 testimony before Congress that the parts of the "Dossier" had been verified. He did not do so. Testifying under oath Comey described the "Dossier" as "salacious and unverified."

It is genuinely shocking that DNI Jim Clapper, with the acquiescence of the CIA, the FBI and NSA, would produce a document devoid of any solid intelligence. There is a way to publicly release sensitive intelligence without comprising a the original source. But such sourcing is absent in this document.

That simple fact should tell you all you need to know. The Intelligence Community was used as a tool to misinform the public and persuade them that Russia was guilty of something they did not do. That lie remains unchallenged.


LeaNder , 07 March 2018 at 05:59 PM

Good summary argument, PT. Thanks. Helpful reminder.

But, makes me feel uncomfortable. Cynical scenario. I'd prefer them to be both drivers and driven, somehow stumbling into the chronology of events. They didn't hack the DNC, after all. Crowdstrike? Steele? ...

********
But yes, all the 17 agencies Clinton alluded to in her 3rd encounter with Trump was a startling experience:

http://www.politifact.com/truth-o-meter/statements/2016/oct/19/hillary-clinton/hillary-clinton-blames-russia-putin-wikileaks-rele/

turcopolier , 07 March 2018 at 06:10 PM
LeaNder

One other point on which Tacitus and I differ is the quality of the analysts in the "minors." The "bigs" often recruit analysts from the "minors" so they can't be all that bad. And the analysts in all these agencies receive much the same data feed electronically every day. There are exceptions to this but it is generally true. I, too, read hundreds of documents every day to keep up with the knowledge base of the analysts whom I interrogated continuously. "How do you know that?" would have been typical. pl

Flavius , 07 March 2018 at 06:19 PM
Well done.

"The Intelligence Community was used as a tool to misinform the public and persuade them that Russia was guilty of something they did not do. That lie remains unchallenged.'" Yes it was and so remains the lie unchallenged.

Conjectural garbage appears first to have been washed through the FBI, headquarters no less, then probably it picked up a Triple A rating at the CIA, and then when the garbage got to Clapper, it was bombs away - we experts all agree. There were leaks, but they weren't sufficient to satisfy Steele so he just delivered the garbage whole to the Media in order to make it a sure thing. The garbage was placed securely out there in the public domain with a Triple A rating because the FBI wouldn't concern itself with garbage, would it?

Contrast this trajectory with what the Russian policy establishment did when it concluded that the US had done something in the Ukraine that Russia found significantly actionable: it released the taped evidence of Nuland and our Ambassador finishing off the coup.

The whole sequence reminds me in some ways of the sub prime mortgage bond fiasco: garbage risk progressively bundled, repackaged, rebranded and resold by big name institutions that should have known better.

I have only two questions: was it misfeasance, malfeasance, or some ugly combination of the two? And are they going to get away with it?

Richardstevenhack , 07 March 2018 at 06:23 PM
Re this: " In the case of Russian meddling there is no forensic evidence available to the IC because the Democratic National Committee did not permit the FBI to investigate and examine the computers and the network that was allegedly attacked."

To be precise, CrowdStrike did provide the FBI with allegedly "certified true images" of the DNC servers allegedly involved in the alleged "hack." They also allegedly provided these images to FireEye and Mandiant, IIRC.

All three allegedly examined those images and concurred with CrowdStrike's analysis.

Of course, given the CrowdStrike itself is a massively compromised organization due to its founder and CEO, those "certified true images" are themselves tainted evidence.

In addition, regardless of whether the images were true or not, the evidence allegedly contained therein is painfully inadequate to confirm that APT28 or APT29 were involved, nor that the Russian government was involved, or even that there was a real hack involved, and even less evidence that any emails that might have been exfiltrated were given to Wikileaks as opposed to another leak such as that alleged by Sy Hersh to have been done by Seth Rich.

The "assessment" that Putin ordered any of this is pure mind-reading and can be utterly dismissed absent any of the other evidence Publius points out as necessary.

The same applies to any "estimate" that the Russian government preferred Trump or wished to denigrate Clinton. Based on what I read in pro-Russian news outlets, Russian officials took great pains to not pick sides and Putin's comments were similarly very restrained. The main quote from Putin about Trump that emerged was mistranslated as approval whereas it was more an observation of Trump's personality. At no time did Putin ever say he favored Trump over Clinton, even though that was a likely probability given Clinton's "Hitler" comparison.

As an aside, I also recommend Scott Ritter's trashing of the ICA. Ritter is familiar with intelligence estimates and their reliability based on his previous service as a UN weapons inspector in Iraq and in Russia implementing arms control treaties.

ann , 07 March 2018 at 11:22 PM
This is a wonderful explanation of the intelligence community. And I thank you for the explanation. My interpretation is: In 1990 +- Bush 41 sold us the 1st Iraq war using fudged intelligence, then Bush 43 sold us the second Iraq war using fabricated intelligence. And now the Obama Administration tried to sell us fake intelligence in regard to Russia in order to get Clinton elected. However inadequate my summary is it looks like the Democrats are less skilled in propaganda than the Repubs. And what else is the difference?
Richardstevenhack , 08 March 2018 at 03:02 AM
Mueller has had 18 months and has proceeded to reveal exactly nothing related to either Trump "collusion" with Russia nor Russia as a state actually doing anything remotely described as "meddling."

His expected indictment of some Russians for the DNC hack is going to be more of the same in all likelihood. I predict there will be next to zero evidence produced either that the Russians named are in fact members of APT28 or APT29 or that they had any direct connection with either the alleged DNC hack or Wikileaks or the Russian government.

It's a witch hunt, nothing more. People holding their breath for the "slam dunk" are going to pass out soon if they haven't already.

blue peacock , 08 March 2018 at 04:12 AM
GZC #12

Mueller is investigating some aspects. But there is another aspect - the conspiracy inside law enforcement and the IC. That is also being investigated. There are Congressional committees in particular Nunes, Goodlatte and Grassley. Then there is the DOJ IG. And today AG Sessions confirms there is a DOJ prosecutor outside Washington investigating.

IMO, the conspiracy is significantly larger in scale and scope than anything the Russians did.

Yes, indeed we'll have to wait and see what facts Mueller reveals. But also what facts these other investigations reveal.

English Outsider , 08 March 2018 at 05:57 AM
Thank you for setting out the geography and workings of this complex world.

Might I ask how liaison with other Intelligence Communities fits in? Is intelligence information from non-US sources such as UK intelligence sources subject to the same process of verification and evaluation?

I ask because of the passage in your article -

"But such evidence (corroborating the Steele dossier) was not forthcoming. If it had existed than Jim Comey could have claimed in his June 2017 testimony before Congress that the parts of the "Dossier" had been verified. He did not do so. Testifying under oath Comey described the "Dossier" as "salacious and unverified." "

Does this leave room for the assertion that although the "Dossier" was unverified in the US it was accepted as good information because it had been verified by UK Intelligence or by persons warranted by the UK? In other words, was UK Intelligence, or an ex-UK intelligence officer, used to get material through the US evaluation process, material that would not have got through that US evaluation process had it originated within the US itself?

turcopolier , 08 March 2018 at 07:53 AM
EO,

" ... was UK Intelligence, or an ex-UK intelligence officer, used to get material through the US evaluation process, material that would not have got through that US evaluation process had it originated within the US itself?" I would say yes and especially yes if the contact for this piece of data was conducted at the highest level within the context of the already tight liaison between the US IC and Mi-6/GCHQ. PT may think differently. pl

turcopolier , 08 March 2018 at 07:54 AM
GZC

A lot of smoke? Only if you wish to place a negative value on everything the Trump people did or were. pl

jsn -> The Twisted Genius ... , 08 March 2018 at 08:20 AM
The CIA appears to be trying to right the wrongs done them with the creation of the DNI:
https://www.wsws.org/en/articles/2018/03/08/dems-m08.html
turcopolier , 08 March 2018 at 08:54 AM
jsn

The wrongs done them? I hope that was irony. pl

turcopolier -> Green Zone Café ... , 08 March 2018 at 09:01 AM
GZC

Was it Hitler or Stalin who said "show me the man and I will find his crime?" As I have said before, Trumps greatest vulnerability lies in his previous business life as an entrepreneurial hustler. If he is anything like the many like him whom I observed in my ten business years, then he has cut corners legally somewhere in international business. they pretty much all do that. Kooshy, a successful businessman confirmed that here a while back. These other guys were all business hustlers including Flynn and their activities have made them vulnerable to Mueller. IMO you have to ask yourself how much you want to be governed by political hacks and how much by hustlers. pl

turcopolier , 08 March 2018 at 09:24 AM
jsn

hy this socialist pub would fing it surprising that former public servants seek elected office is a mystery to me. BTW, in re all the discussion here of the IC, there are many levels in these essentially hierarchical structures and one's knowledge of them is conditioned by the perspective from which you viewed them. pl

DH , 08 March 2018 at 09:50 AM
Re 'baby adoption' meeting between Trump, Jr. and Veselnitskaya, I recall a comment here linking to an article speculating the email initiating the meeting originated in Europe, was set up by the playboy son of a European diplomat, and contained words to trip data-gathering monitors which would have enabled a FISA request to have Trump, Jr. come under surveillance.

Also, the Seymour Hersh tape certainly seems authentic as far as Seth Rich being implicated in the DNC dump.

Publius Tacitus -> Green Zone Café ... , 08 March 2018 at 09:53 AM
GZC,

Are you really this obtuse?

You insist (I guess you rely on MSNBC as your fact source) that Manafort, Page, etc. all "have connections to Russia or Assange." You are using smear and guilt by association. Flynn's so-called connection to Russia was that he accepted an invite to deliver a speech at an RT sponsored event and was paid. So what? Nothing wrong with that. Just ask Bill Clinton. Or perhaps you are referring to the fact that Flynn also spoke to the Russian Ambassador to the US after the election in his capacity as designated National Security Advisor. Zero justification for investigation.

Stone? He left the campaign before there had even been a primary and only had text exchanges with Assange.

Your blind hatred of Trump makes you incapable of thinking logically.

jsn , 08 March 2018 at 10:15 AM
Sir,

The most sarcastic irony was intended. This is what the real left looks like, its very different from Clintonite Liberals, not that I agree with their ideological program, though I believe parts have their place.

Liberals have, I believe, jumped the shark: https://consortiumnews.com/2018/03/07/progressive-journalists-jump-the-shark-on-russiagate/

If the get their way with the new McCarthyism, the implications for dissent, left or right, seem to me to be about the same:
https://www.nakedcapitalism.com/2016/12/federalist-68-the-electoral-college-and-faithless-electors.html#intelligence

jsn , 08 March 2018 at 10:25 AM
Sir,

And to your second comment, yes I agree about the complexity of institutions and how situationally constrained individual experiences are, if that was the point.

I'll also concede my brief comments generalize very broadly, but it's hard to frame things more specific comments without direct knowledge, such as the invaluable correspondents here. I try to avoid confirmation bias by reading broadly and try to provide outside perspectives. My apologies if they're too far outside.

I suppose it would be interesting to see a side by side comparison of how many former IC self affiliated with which party in choosing to run. I'm just guessing but I'll bet there's more CIA in the D column and more DIA among the Rs.

LeaNder said in reply to Flavius... , 08 March 2018 at 10:40 AM
love this coinage Flavius: Yes it was and so remains the lie unchallenged

a lie "circumstantial"? http://recycledknowledge.blogspot.de/2005/05/seven-degrees-of-lie.html

Sid Finster , 08 March 2018 at 11:06 AM
"We don't have the evidence yet because Mueller hasn't found it yet!" is a classic argument from ignorance, in that is assumes without evidence (there's that pesky word again!) that there is something to be found.

That said, I have no doubt that Mueller will find *something*, simply because an aggressive and determined prosecutor can always find *something*, especially if the target is engaged in higher level business or politics. A form unfiled, an irregularity in an official document, and overly optimistic tax position.

If nothing else works, there's always the good old standby of asking question after question until the target makes a statement that can be construed as perjury or lying to investigators.

Sarah B said in reply to turcopolier ... , 08 March 2018 at 11:27 AM
My perspective, after reading that linked article by the WSWS, is that both, the IC and the DoD, are trying to take over the whole US political spectrum, in fact, militarizing de facto the US political life....

Now, tell me that this is not an intend by the MIC ( where all the former IC or DoD people finally end when they leave official positions )to take over the government ( if more was needed after what has happened with Trump´s ) to guarantee their profit rate in a moment where everything is crimbling....

Btw, have you read the recently released paper, "WorldWide Threat Assessment of the US Intelligence Community" by Daniel R. Coats ( DNI )? You smell fear from the four corners....do not you?

Barbara Ann -> turcopolier ... , 08 March 2018 at 11:35 AM
Those immortal words are attributed to Lavrentiy Beria, Colonel and you are not the first to draw the comparison re Mueller's investigation. For those who do not know Beria was head of the NKVD under Stalin.
Sarah B , 08 March 2018 at 11:38 AM
Here is the paper in question I am mentioning above: https://www.dni.gov/files/documents/Newsroom/Testimonies/2018-ATA---Unclassified-SSCI.pdf Some neutral analyst is saying that from 28 pages, 24 are dedicated to Russia and China, then Iran and NK, in this order...and that it is an official recognition of the new multipolar order....
Peter VE said in reply to johnf... , 08 March 2018 at 11:55 AM
The BBC reported this morning that a police officer who was amongst the earliest responders to the "nerve gas" poisoning of Col. Skripal is also being treated for symptoms. How was it that many "White Helmets" who were filmed where the sarin gas was dropped on Khan Sheikhoun last April suffered no symptoms?
Jack -> turcopolier ... , 08 March 2018 at 11:59 AM
Sir

That's a good way to present it political hacks vs hustlers. The fact is Flynn has pled guilty to perjury. Nothing else like collusion with the Russians. And his sentencing is on hold now as the judge has ordered Mueller to hand over any exculpatory evidence. Clearly something is going on his case for the judge to do that.

Manafort has been indicted for money laundering, wire fraud, etc for activities well before the election campaign. Sure, it is good that these corrupt individuals should be investigated and prosecuted. However, this corruption is widespread in DC. How come none of these cheering Mueller on to destroy Trump care about all the foreign money flowing to K Street? Why aren't they calling for investigations of the Clinton Foundation or the Podesta brothers where probable cause exist of foreign money and influence? What about Ben Cardin and all those recipients of foreign zionist money and influence? It would be nice if there were wide ranging investigations on all those engaged in foreign influence peddling. But it seems many just want a witch hunt to hobble Trump. It's going to be very difficult to get the Senate to convict him for obstruction of justice or tax evasion or some charge like that.

The Twisted Genius , 08 March 2018 at 12:59 PM
The select group of several dozen analysts from CIA, NSA and FBI who produced the January 2017 ICA are very likely the same group of analysts assembled by Brenner in August 2016 to form a task force examining "L'Affaire Russe" at the same time Brennan brought that closely held report to Obama of Putin's specific instructions on an operation to damage Clinton and help Trump. I've seen these interagency task forces set up several times to address particular info ops or cyberattack issues. Access to the work of these task forces was usually heavily restricted. I don't know if this kind of thing has become more prevalent throughout the IC.

I am also puzzled by the absence of DIA in the mix. When I was still working, there were a few DIA analysts who were acknowledged throughout the IC as subject matter experts and analytical leaders in this field. On the operational side, there was never great enthusiasm for things cyber or info ops. There were only a few lonely voices in the darkness. Meanwhile, CIA, FBI and NSA embraced the field wholeheartedly. Perhaps those DIA analytical experts retired or moved on to CYBERCOM, NSA or CIA's Information Operations Center.

LeaNder said in reply to Richardstevenhack ... , 08 March 2018 at 01:01 PM
I predict there will be next to zero evidence produced either that the Russians named are in fact members of APT28 or APT29 ...

Richard, over here the type of software is categorized under Advanced Persistent Threat, and beyond that specifically labeled the "Sofacy Group". ... I seem to prefer the more neutral description 'Advanced Persistent Threat' by Kaspersky. Yes, they seem to be suspicious lately in the US. But I am a rather constant consumer, never mind the occasional troubles over the years.

APT: Helps to not get confused by all the respective naming patterns in the economic field over national borders. APT 1 to 29 ...? Strictly, What's the precise history of the 'Bear' label and or the specific, I assume, group of APT? ...

Kasperky pdf-file - whodunnit?
https://tinyurl.com/APT-Avanced-Persitent-Treat

Ever used a datebase checking a file online? Would have made you aware of the multitude of naming patterns.

******
More ad-hoc concerning one item in your argument above. To what extend does a standard back-up system leave relevant forensic traces? Beyond the respective image in the present? Do you know?

Admittedly, I have no knowledge about matters beyond purely private struggles. But yes, they seemed enough to get a vague glimpse of categories in the field of attribution. Regarding suspected state actors vs the larger cybercrime scene that is.

LeaNder said in reply to Fred... , 08 March 2018 at 02:29 PM
Even mentioning those is just further evidence that something really did happen.

I appreciate you are riding our partially shared hobby horse, Fred. ;)

But admittedly this reminds me of something that felt like a debate-shift, I may be no doubt misguided here. Nitwit! In other words I may well have some type of ideological-knot in the relevant section dealing with memory in my brain as long-term undisciplined observer of SST.

But back on topic: the argument seemed to be that "important facts" were omitted. In other words vs earlier times were are now centrally dealing with omission as evidence. No?

Dave -> Publius Tacitus ... , 08 March 2018 at 03:18 PM
Ask National Security Advisor General McMaster.
Even Trump now says Putin meddled.
What more evidence do you need
Dave -> Publius Tacitus ... , 08 March 2018 at 03:20 PM
General McMaster has seen the evidence and says the fact of Russian meddling can no longer be credibly denied.
That doesn't stop the right-wing extremists from spinning fairy tales.
turcopolier , 08 March 2018 at 03:34 PM
Dave

It is politically necessary for Trump to say that. Tell me, what is meant by "Russian meddling"in this statement by McMaster? pl

Dave -> turcopolier ... , 08 March 2018 at 03:50 PM
Russian meddling is hacking our election systems.

The right wing (re: Hannity and Limbaugh) have been trying mightily to discredit this investigation by smearing Mueller's reputation, even though he is a conservative republican.

They are doing this so that if Mueller's report is damning, they can call it a "witch hunt."

I would think that if Trump is innocent, he would cooperate with this investigation fully.

You are insinuating that McMaster is a liar even though he has access to information that you don't.

Publius Tacitus -> Dave... , 08 March 2018 at 04:02 PM
Just because trump is stupid is not an excuse for you. You accept a lie without one shred of actual evidence. You are a lemming
Fred -> LeaNder... , 08 March 2018 at 04:04 PM
LeaNder,

"omission as evidence. " Incorrect. Among the omissions was the fact that the dossier was paid for by a political campaign and that the wife of a senior DOJ lawyer's wife was working for Fusion GPS. Then there's the rest of the political motivations left out.

Fred -> Dave... , 08 March 2018 at 04:07 PM
Dave,

Putin hired Facebook. That company seems to do well helping out foreign governments.
https://www.nytimes.com/2016/11/22/technology/facebook-censorship-tool-china.html

Linda , 08 March 2018 at 04:16 PM
If you have seen the classified information that would be necessary to back up your conclusions, it should not be discussed in this forum. As you are well aware sources and methods cannot be made public so I fail to see how you believe this should have been publically done. Having said that, I pretty much agree with your conclusion except for the indication that the analysts lied.
turcopolier , 08 March 2018 at 04:26 PM
Dave

What does "hacking our elections" mean? Does it means breaking into voting systems and changing the outcome by altering votes? Or does it mean information operations to change US voters' minds about for whom they would vote?

If the latter you must know that we (the US) have done this many times in foreign elections, including Russian elections, Israeli elections, Italian elections, German elections, etc., or perhaps you think that a different criterion should be applied to people who are not American.

As for McMasters, I am unimpressed with him. He displays all the symptoms of Russophobia. He has special information? Information can be interpreted many ways depending on one's purpose. pl

turcopolier , 08 March 2018 at 04:36 PM
Linda

PT does not have access to the classified information underlying but your argument that "As you are well aware sources and methods cannot be made public so I fail to see how you believe this should have been publicly done." doesn't hold water for me since I have seen sources and methods disclosed by the government of the US many times when it felt that necessary. One example that I have mentioned before was that of the trial of Jeffrey Sterling (merlin) for which I was an expert witness and adviser to the federal court for four years.

In that one the CIA and DoJ forced the court to allow them to de-classify the CIA DO's operational files on the case and read them into the record in open court. I had read all these files when they were classified at the SCI level. IMO the perpetrators in the Steel Memo case are and were merely hiding behind claims of sources and methods protection in order to protect themselve. pl

JamesT -> turcopolier ... , 08 March 2018 at 04:37 PM
I continue to learn things around here that I could never learn anywhere else. It is a privilege to read the Colonel, TTG, and Publius Tacitus.
turcopolier , 08 March 2018 at 04:47 PM
Dave

If you use denigrating language like "wild eyed" to attack your interlocutors you will not be welcome here. pl

LeaNder said in reply to Flavius... , 08 March 2018 at 04:49 PM
Mueller cleared his ridiculous indictment relating to the Russian troll farm, a requirement that at one time would have been SOP for any FBI Office or USAtty Office bringing an indictment of this kind.

Not aware of this. Can you help me out?

No doubt vaguely familiar with public lore, in limited ways. As always.

Sid Finster said in reply to Dave... , 08 March 2018 at 05:09 PM
So now we are supposed to believe unquestioningly the word of torturers, perjurers and entrapment artists, all talking about alleged evidence that we are not allowed to see? Did you learn nothing from the "Iraqi WMD" fiasco or the "ZOMG! Assad gassed his own peoples ZOMG!" debacle? Funny how in each of these instances, the intelligence community's lies just happened to coincide with the agenda of empire.
LeaNder said in reply to Fred ... , 08 March 2018 at 05:10 PM
Ok, true. I forgot 'Steele'* was used as 'evidence'. Strictly, Pat may have helped me out considering my 'felt' "debate-shift". Indirectly. I do recall, I hesitated to try to clarify matters for myself.

* ...

m -> turcopolier ... , 08 March 2018 at 06:29 PM
Depends on what crime the "hack" committed. Fudging on taxes or cutting corners? Big whoop. Laundering $500 mil for a buddy of Vlad's? Now you got my attention and should have the voters' attention.

This is a political process in the end game. Clinton lied about sex in the oval Office and was tried for it. Why don't we exercise patience in the process and see if this President should be tried?

m -> Publius Tacitus ... , 08 March 2018 at 06:33 PM
I ain't a lawyer but don't prosecutors hold their cards (evidence) close to their chests until the court has a criminal charge and sets a date for discovery?
Publius Tacitus -> Linda ... , 08 March 2018 at 06:45 PM
Linda,
You betray your ignorance on this subject. You clearly have not understood nor comprehended what I have written. So i will put it in CAPS for you. Please read slowly.

THIS TYPE OF DOCUMENT, IF IT HAD A SOURCE OR SOURCES BEHIND IT, WOULD REFERENCE THOSE SOURCES. AN ANALYST WOULD NOT WRITE "WE ASSESS." IF YOU HAVE A RELIABLE HUMAN SOURCE OR A RELIABLE PIECE OF SIGINT THE YOU DO NOT HAVE TO ASSESS. YOU SIMPLY STATE, ACCORDING TO A KNOWLEDGEABLE AND RELIABLE SOURCE.

GOT IT. And don't come back with nonsense that the sources are so sensitive that they cannot be disclose. News flash genius--the very fact that Clapper put out this piece of dreck would have exposed the sources if they existed (but they do not). In any event, there would be reference to sources that provided the evidence that such activity took place at the direction of Putin.

IT DOES NOT EXIST.

J , 08 March 2018 at 07:08 PM
Colonel,

The granddaddy of them all is #16, and what have they contributed?

Steve McIntyre -> David Habakkuk ... , 08 March 2018 at 07:41 PM
I'm eagerly awaiting your thoughts on the Skripal poisoning. I'm sure I'm not alone in the hope that you will write on it.
The Twisted Genius -> Publius Tacitus ... , 08 March 2018 at 07:59 PM
Publius Tacitus,

I notice other Intelligence Community Assessments also use the term "we assess" liberally. For example, the 2018 Worldwide Threat Assessment and the 2012 ICA on Global Water Security use the "we assess" phrase throughout the documents. I hazard to guess that is why they call these things assessments.

The 2017 ICA on Russian Interference released to the public clearly states: "This report is a declassified version of a highly classified assessment. This document's conclusions are identical to the highly classified assessment, but this document does not include the full supporting information, including specific intelligence on key elements of the influence campaign. Given the redactions, we made minor edits purely for readability and flow."

I would hazard another guess that those minor edits for readability and flow are the reason that specific intelligence reports and sources, which were left out of the unclassified ICA, are not cited in that ICA.

The Twisted Genius -> Dave... , 08 March 2018 at 08:26 PM
Dave,

As far as I know, no one has reliably claimed that election systems, as in vote tallies, were ever breached. No votes were changed after they were cast. The integrity of our election system and the 2016 election itself was maintained. Having said that, there is plenty of evidence of Russian meddling as an influence op. I suggest you and others take a gander at the research of someone going by the handle of @UsHadrons and several others. They are compiling a collection of FaceBook, twitter and other media postings that emanated from the IRA and other Russian sources. The breadth of these postings is quite wide and supports the assessment that enhancing the divides that already existed in US society was a primary Russian goal.

https://medium.com/@ushadrons

I pointed this stuff out to Eric Newhill a while back in one of our conversations. He jokingly noted that he may have assisted in spreading a few of these memes. I bet a lot of people will recognize some of the stuff in this collection. That's nothing. Recently we all learned that Michael Moore did a lot more than unwittingly repost a Russian meme. He took part in a NYC protest march organized and pushed by Russians. This stuff is open source proof of Russian meddling.

Publius Tacitus -> The Twisted Genius ... , 08 March 2018 at 08:55 PM
TTG
Nice try, but that is bullshit just because recent assessments come out with sloppy language is no excuse. Go back and look at the assessment was done for iraq to justify the war in 2003. Many sources cited because it was considered something Required to justify going to war. As we have been told by many in the media that the Russians meddling was worse or as bad as the attack on Pearl Harbor and 9-11. With something so serious do you want to argue that they would downplay the sourcing?

[Mar 08, 2018] Given the CrowdStrike itself is a massively compromised organization due to its founder and CEO, those "certified true images" are themselves tainted evidence

Highly recommended!
Notable quotes:
"... To be precise, CrowdStrike did provide the FBI with allegedly "certified true images" of the DNC servers allegedly involved in the alleged "hack." They also allegedly provided these images to FireEye and Mandiant, IIRC ..."
"... Of course, given the CrowdStrike itself is a massively compromised organization due to its founder and CEO, those "certified true images" are themselves tainted evidence. ..."
"... In addition, regardless of whether the images were true or not, the evidence allegedly contained therein is painfully inadequate to confirm that APT28 or APT29 were involved, nor that the Russian government was involved, or even that there was a real hack involved, and even less evidence that any emails that might have been exfiltrated were given to Wikileaks as opposed to another leak such as that alleged by Sy Hersh to have been done by Seth Rich. ..."
Mar 08, 2018 | turcopolier.typepad.com

Richardstevenhack , 07 March 2018 at 06:23 PM

Re this: " In the case of Russian meddling there is no forensic evidence available to the IC because the Democratic National Committee did not permit the FBI to investigate and examine the computers and the network that was allegedly attacked."

To be precise, CrowdStrike did provide the FBI with allegedly "certified true images" of the DNC servers allegedly involved in the alleged "hack." They also allegedly provided these images to FireEye and Mandiant, IIRC .

All three allegedly examined those images and concurred with CrowdStrike's analysis.

Of course, given the CrowdStrike itself is a massively compromised organization due to its founder and CEO, those "certified true images" are themselves tainted evidence.

In addition, regardless of whether the images were true or not, the evidence allegedly contained therein is painfully inadequate to confirm that APT28 or APT29 were involved, nor that the Russian government was involved, or even that there was a real hack involved, and even less evidence that any emails that might have been exfiltrated were given to Wikileaks as opposed to another leak such as that alleged by Sy Hersh to have been done by Seth Rich.

The "assessment" that Putin ordered any of this is pure mind-reading and can be utterly dismissed absent any of the other evidence Publius points out as necessary.

The same applies to any "estimate" that the Russian government preferred Trump or wished to denigrate Clinton. Based on what I read in pro-Russian news outlets, Russian officials took great pains to not pick sides and Putin's comments were similarly very restrained. The main quote from Putin about Trump that emerged was mistranslated as approval whereas it was more an observation of Trump's personality. At no time did Putin ever say he favored Trump over Clinton, even though that was a likely probability given Clinton's "Hitler" comparison.

As an aside, I also recommend Scott Ritter's trashing of the ICA. Ritter is familiar with intelligence estimates and their reliability based on his previous service as a UN weapons inspector in Iraq and in Russia implementing arms control treaties.

Exposing The Man Behind The Curtain
https://www.huffingtonpost.com/entry/exposing-the-man-behind-the-curtain_us_5877887be4b05b7a465df6a4

Throwing a Curveball at 'Intelligence Community Consensus' on Russia
http://www.theamericanconservative.com/articles/did-17-intelligence-agencies-really-come-to-consensus-on-russia/

His analysis of the NSA document leaked by NSA contractor Reality Winner which supposedly supported the Russia theory is also relevant.

Leaked NSA Report Is Short on Facts, Proves Little in 'Russiagate' Case
https://www.truthdig.com/articles/leaked-nsa-report-is-short-on-facts-proves-little-in-russiagate-case/

[Mar 08, 2018] A key piece of evidence pointing to 'Guccifer 2.0' being a fake personality created by the conspirators in their attempt to disguise the fact that the materials from the DNC published by 'WikiLeaks' were obtained by a leak rather than a hack had to do with the involvement of the former GCHQ person Matt Tait.

Highly recommended!
Notable quotes:
"... What has however become clear in recent days is that the 'Gerasimov Doctrine' was not invented by its supposed author, but by a British academic, Mark Galeotti, who has now confessed – although in a way clearly designed to maintain as much of the 'narrative' as possible. ..."
"... Three days ago, an article by Galleoti appeared in 'Foreign Policy' entitled 'I'm Sorry for Creating the "Gerasimov Doctrine": I was the first to write about Russia's infamous high-tech military strategy. One small problem: it doesn't exist.' ..."
"... The translation of the original article by Gerasimov with annotations by Galeotti which provoked the whole hysteria turns out to be a classic example of what I am inclined to term 'bad Straussianism.' ..."
"... What Strauss would have called the 'exoteric' meaning of the article quite clearly has to do with defensive strategies aimed at combatting the kind of Western 'régime change' projects about which people like those who write for 'Lawfare' are so enthusiastic. But Galeotti tells us that this is, at least partially, a cover for an 'esoteric' meaning, which has to do with offensive actions in Ukraine and similar places. ..."
Mar 08, 2018 | turcopolier.typepad.com

David Habakkuk , 08 March 2018 at 10:28 AM

PT and all,

More material on the British end of the conspiracy.

Commenting on an earlier piece by PT, I suggested that a key piece of evidence pointing to 'Guccifer 2.0' being a fake personality created by the conspirators in their attempt to disguise the fact that the materials from the DNC published by 'WikiLeaks' were obtained by a leak rather than a hack had to do with the involvement of the former GCHQ person Matt Tait.

(See http://turcopolier.typepad.com/sic_semper_tyrannis/2018/02/pieces-of-the-coup-puzzle-fall-into-place-by-publius-tacitus.html .)

To recapitulate: Back in June 2016, hard on the heels of the claim by Dmitri Alperovitch of 'CrowdStrike' to have identified clinching evidence making the GRU prime suspects, Tait announced that, although initially unconvinced, he had found a 'smoking gun' in the 'metadata' of the documents released by 'Guccifer 2.0.'

A key part of this was the use by someone modifying a document of 'Felix Edmundovich' – the name and patronymic of Dzerzhinsky, the Lithuanian-Polish noble who created the Soviet secret police.

As I noted, Tait was generally identified as a former GCHQ employee who now ran a consultancy called 'Capital Alpha Security.' However, checking Companies House records revealed that he had filed 'dormant accounts' for the company. So it looks as though the company was simply a 'front', designed to fool 'useful idiots' into believing he was an objective analyst.

As I also noted in those comments, Tait writes the 'Lawfare' blog, one of whose founders, Benjamin Wittes, looks as though he may himself have been involved in the conspiracy up to the hilt. Furthermore, a secure income now appears to have been provided to replace that from the non-existent consultancy, in the shape of a position at the 'Robert S. Strauss Center for International Security and Law', run by Robert Chesney, a co-founder with Wittes of 'Lawfare.'

A crucial part of the story, however, is that the notion of GRU responsibility for the supposed 'hacks' appears to be part of a wider 'narrative' about the supposed 'Gerasimov Doctrine.' From the 'View from Langley' provided to Bret Stephens by CIA Director Mike Pompeo at the 'Aspen Security Forum' last July:

'I hearken back to something called the Gerasimov doctrine from the early 70s, he's now the head of the – I'm a Cold War guy, forgive me if I mention Soviet Union. He's now the head of the Russian army and his idea was that you can win wars without firing a single shot or with firing very few shots in ways that are decidedly not militaristic, and that's what's happened. What changes is the costs; to effectuate change through cyber and through RT and Sputnik, their news outlets, and through other soft means; has just really been lowered, right. It used to be it was expensive to run an ad on a television station now you simply go online and propagate your message. And so they have they have found an effective tool, an easy way to go reach into our systems, and into our culture to achieve the outcomes they are looking for.'

(See https://aspensecurityforum.org/wp-content/uploads/2017/07/The-View-from-Langley.pdf .)

What has however become clear in recent days is that the 'Gerasimov Doctrine' was not invented by its supposed author, but by a British academic, Mark Galeotti, who has now confessed – although in a way clearly designed to maintain as much of the 'narrative' as possible.

Three days ago, an article by Galleoti appeared in 'Foreign Policy' entitled 'I'm Sorry for Creating the "Gerasimov Doctrine": I was the first to write about Russia's infamous high-tech military strategy. One small problem: it doesn't exist.'

(See http://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/ .)

A key paragraph:

'Gerasimov was actually talking about how the Kremlin understands what happened in the "Arab Spring" uprisings, the "color revolutions" against pro-Moscow regimes in Russia's neighborhood, and in due course Ukraine's "Maidan" revolt. The Russians honestly – however wrongly – believe that these were not genuine protests against brutal and corrupt governments, but regime changes orchestrated in Washington, or rather, Langley. This wasn't a "doctrine" as the Russians understand it, for future adventures abroad: Gerasimov was trying to work out how to fight, not promote, such uprisings at home.'

The translation of the original article by Gerasimov with annotations by Galeotti which provoked the whole hysteria turns out to be a classic example of what I am inclined to term 'bad Straussianism.'

(See https://inmoscowsshadows.wordpress.com/2014/07/06/the-gerasimov-doctrine-and-russian-non-linear-war/ .)

What Strauss would have called the 'exoteric' meaning of the article quite clearly has to do with defensive strategies aimed at combatting the kind of Western 'régime change' projects about which people like those who write for 'Lawfare' are so enthusiastic. But Galeotti tells us that this is, at least partially, a cover for an 'esoteric' meaning, which has to do with offensive actions in Ukraine and similar places.

Having now read the text of the article, I can see a peculiar irony in it. In a section entitled 'You Can't Generate Ideas On Command', Gerasimov suggests that 'The state of Russian military science today cannot be compared with the flowering of military-theoretical thought in our country on the eve of World War II.'

According to the 'exoteric' meaning of the article, it is not possible to blame anyone in particular for this situation. But Gerasimov goes on on to remark that, while at the time of that flowering there were 'no people with higher degrees' or 'academic schools or departments', there were 'extraordinary personalities with brilliant ideas', who he terms 'fanatics in the best sense of the word.'

Again, Galeotti discounts the suggestion that nobody is to blame, assuming an 'esoteric meaning', and remarking: 'Ouch. Who is he slapping here?'

Actually, Gerasimov refers by name to two, utterly different figures, who certainly were 'extraordinarily personalities with brilliant ideas.'

If Pompeo had even the highly amateurish grasp of the history of debates among Soviet military theorists that I have managed to acquire he would be aware that one of the things which was actually happening in the 'Seventies was the rediscovery of the ideas of Alexander Svechin.

Confirming my sense that this has continued on, Gerasimov ends by using Svechin to point up an intractable problem: it can be extraordinarily difficult to anticipate the conditions of a war, and crucial not to impose a standardised template likely to be inappropriate, but one has to make some kinds of prediction in order to plan.

Immediately after the passage which Galeotti interprets as a dig at some colleague, Gerasimov elaborates his reference to 'extraordinary people with brilliant ideas' by referring to an anticipation of a future war, which proved prescient, from a very different figure to Svechin:

'People like, for instance, Georgy Isserson, who, despite the views he formed in the prewar years, published the book "New Forms Of Combat." In it, this Soviet military theoretician predicted: "War in general is not declared. It simply begins with already developed military forces. Mobilization and concentration is not part of the period after the onset of the state of war as was the case in 1914 but rather, unnoticed, proceeds long before that." The fate of this "prophet of the Fatherland" unfolded tragically. Our country paid in great quantities of blood for not listening to the conclusions of this professor of the General Staff Academy.'

Unlike Svechin, whom I have read, I was unfamiliar with Isserson. A quick Google search, however, unearthed a mass of material in American sources – including, by good fortune, an online text of a 2010 study by Dr Richard Harrison entitled 'Architect of Soviet Victory in World War II: The Life and Theories of G.S. Isserson', and a presentation summarising the volume.

Ironically, Svechin and Isserson were on opposite sides of fundamental divides. So the former, an ethnic Russian from Odessa, was one of the 'genstabisty', the former Tsarist General Staff officers who sided with the Bolsheviks and played a critical role in teaching the Red Army how to fight. Meanwhile Isserson was a very different product of the 'borderlands' – the son of a Jewish doctor, brought up in Kaunas, with a German Jewish mother from what was then Königsberg, giving him an easy facility with German-language sources.

The originator of the crucial concept of 'operational' art – the notion that in modern industrial war, the ability to handle a level intermediate between strategy and tactics was critical to success – was actually Svechin.

Developing the ambivalence of Clausewitz, however, he stressed that both the offensive and the defensive had their places, and that the key to success was to know which was appropriate when and also to be able rapidly to change from one to the other. His genuflections to Marxist-Leninist dogma, moreover, were not such as to take in any of Dzerzhinsky's people.

By contrast, Isserson was unambiguously committed to the offensive strand in the Clausewitzian tradition, and a Bolshevik 'true believer' (although he married the daughter of a dispossessed ethnically Russian merchant, who had their daughter baptised without his knowledge.)

As Harrison brings out, Isserson's working through of the problems of offensive 'operational art' would be critical to the eventual success of the Red Army against Hitler. However, the specific text to which he refers was, ironically, a warning of precisely one of the problems implicit in the single-minded reliance on the offensive: the possibility that one could be left with no good options confronting an antagonist similarly oriented – as turned out to be the case.

As Gerasimov intimates, while unlike Svechin, executed in 1938, Isserson survived the Stalin years, he was another of the victims of Dzerzhinsky's heirs. Arrested shortly before his warnings were vindicated by the German attack on 22 June 1941, he would spend the war in the Gulag and only return to normal life after Stalin's death.

So I think that the actual text of Gerasimov's article reinforces a point I have made previously. The 'evidence' identified by Tait is indeed a 'smoking gun.' But it emphatically does not point towards the GRU.

Meanwhile, another moral of the tale is that Americans really should stop being taken in by charlatan Brits like Galeotti, Tait, and Steele.

[Mar 08, 2018] Several respected journalists have cast serious doubt on CrowdStrike s report on the DNC servers

Looks like Brennan was the architect of DNS false flag operation: "Hersh also told Butowsky that the DNC made up the Russian hacking story as a disinformation campaign -- directly pointing a finger at former CIA director (and now MSNBC/NBC contributor ) John Brennan as the architect."
Now all this staff started to remind me 9/11 investigation. Also by Mueller.
Notable quotes:
"... Notably, Crowdstrike has been considered by many to be discredited over their revision and retraction of a report over Russian hacking of Ukrainian military equipment ..."
"... Also notable is that Crowdstrike founder and anti-Putin Russian expat Dimitri Alperovitch sits on the Atlantic Council - which is funded by the US State Department, NATO, Latvia, Lithuania, and Ukranian Oligarch Victor Pinchuk. Who else is on the Atlantic Council? Evelyn Farkas - who slipped up during an MSNBC interview with Mika Brzezinski and disclosed that the Obama administration had been spying on the Trump campaign: ..."
"... Hersh also told Butowsky that the DNC made up the Russian hacking story as a disinformation campaign -- directly pointing a finger at former CIA director (and now MSNBC/NBC contributor ) John Brennan as the architect. ..."
"... I have a narrative of how that whole f*cking thing began. It's a Brennan operation, it was an American disinformation , and the fu*kin' President, at one point, they even started telling the press -- they were backfeeding the Press, the head of the NSA was going and telling the press, fu*king c*cksucker Rogers, was telling the press that we even know who in the Russian military intelligence service leaked it. ..."
"... Listen to Seymour Hersh leaked audio: https://www.youtube.com/embed/giuZdBAXVh0 (full transcription here and extended audio of the Hersh conversation here ) ..."
"... As we mentioned last week, Dotcom's assertion is backed up by an analysis done last year by a researcher who goes by the name Forensicator , who determined that the DNC files were copied at 22.6 MB/s - a speed virtually impossible to achieve from halfway around the world, much less over a local network - yet a speed typical of file transfers to a memory stick. ..."
"... Last but not least, let's not forget that Julian Assange heavily implied Seth Rich was a source: ..."
"... Given that a) the Russian hacking narrative hinges on Crowdstrikes's questionable reporting , and b) a mountain of evidence pointing to Seth Rich as the source of the leaked emails - it stands to reason that Congressional investigators and Special Counsel Robert Mueller should at minimum explore these leads. ..."
"... As retired U.S. Navy admiral James A. Lyons, Jr. asks: why aren't they? ..."
Mar 03, 2018 | www.zerohedge.com

... ... ...

In addition to several odd facts surrounding Rich's still unsolved murder - which officials have deemed a "botched robbery," forensic technical evidence has emerged which contradicts the Crowdstrike report. The Irvine, CA company partially funded by Google , was the only entity allowed to analyze the DNC servers in relation to claims of election hacking:

Notably, Crowdstrike has been considered by many to be discredited over their revision and retraction of a report over Russian hacking of Ukrainian military equipment - a report which the government of Ukraine said was fake news.

In connection with the emergence in some media reports which stated that the alleged "80% howitzer D-30 Armed Forces of Ukraine removed through scrapping Russian Ukrainian hackers software gunners," Land Forces Command of the Armed Forces of Ukraine informs that the said information is incorrect .

Ministry of Defence of Ukraine asks journalists to publish only verified information received from the competent official sources. Spreading false information leads to increased social tension in society and undermines public confidence in the Armed Forces of Ukraine. -- mil.gov.ua (translated) (1.6.2017)

In fact, several respected journalists have cast serious doubt on CrowdStrike's report on the DNC servers:

Pay attention, because Mueller is likely to use the Crowdstrike report to support the rumored upcoming charges against Russian hackers.

Also notable is that Crowdstrike founder and anti-Putin Russian expat Dimitri Alperovitch sits on the Atlantic Council - which is funded by the US State Department, NATO, Latvia, Lithuania, and Ukranian Oligarch Victor Pinchuk. Who else is on the Atlantic Council? Evelyn Farkas - who slipped up during an MSNBC interview with Mika Brzezinski and disclosed that the Obama administration had been spying on the Trump campaign:

The Trump folks, if they found out how we knew what we knew about the Trump staff dealing with Russians, that they would try to compromise those sources and methods , meaning we would not longer have access to that intelligence. - Evelyn Farkas

... ... ...

Brennan and Russian disinformation

Hersh also told Butowsky that the DNC made up the Russian hacking story as a disinformation campaign -- directly pointing a finger at former CIA director (and now MSNBC/NBC contributor ) John Brennan as the architect.

I have a narrative of how that whole f*cking thing began. It's a Brennan operation, it was an American disinformation , and the fu*kin' President, at one point, they even started telling the press -- they were backfeeding the Press, the head of the NSA was going and telling the press, fu*king c*cksucker Rogers, was telling the press that we even know who in the Russian military intelligence service leaked it.

Listen to Seymour Hersh leaked audio: https://www.youtube.com/embed/giuZdBAXVh0 (full transcription here and extended audio of the Hersh conversation here )

Hersh denied that he told Butowsky anything before the leaked audio emerged , telling NPR " I hear gossip [Butowsky] took two and two and made 45 out of it. "

Technical Evidence

As we mentioned last week, Dotcom's assertion is backed up by an analysis done last year by a researcher who goes by the name Forensicator , who determined that the DNC files were copied at 22.6 MB/s - a speed virtually impossible to achieve from halfway around the world, much less over a local network - yet a speed typical of file transfers to a memory stick.

The big hint

Last but not least, let's not forget that Julian Assange heavily implied Seth Rich was a source:

Given that a) the Russian hacking narrative hinges on Crowdstrikes's questionable reporting , and b) a mountain of evidence pointing to Seth Rich as the source of the leaked emails - it stands to reason that Congressional investigators and Special Counsel Robert Mueller should at minimum explore these leads.

As retired U.S. Navy admiral James A. Lyons, Jr. asks: why aren't they?

Liberal -> Stan522 Fri, 03/02/2018 - 21:26 Permalink

Relax you conspiracy theory-loving extremists. Our 336 spy agencies are just busy trying to solve the Michael Hasting's murder first. But it's just really hard to find the culprits because they're all hiding in Siberia.

[Feb 27, 2018] I still say Crowdstrike so called analysis is where the rubber really starts to hit the road with Wikileaks disclosure, saying it was the Russians

Feb 27, 2018 | www.youtube.com

Shell Shell, 2 days ago

So, the Democrats want to show that the FBI spying was due to Page and not the dossier because it came "first" so to speak?

This still doesn't excuse them using the dossier in FISA warrant without disclosing information about how it was obtained and it doesn't take away from the fact that he helped them nail Russians before.

How do they keep their reputation in tact by being "two faced", it appears to me to make their reputation worse so I really don't get the Democrats strategy on this, I suppose as it doesn't change what they have done.

I still say Crowdstrike so called "analysis" is where the rubber really starts to hit the road with Wikileaks disclosure, saying it was the "Russians".

[Feb 21, 2018] Thus, Putin-basher Clinton hired Putin-basher Alperovitch to investigate an alleged electronic heist, and to absolutely no one's surprise, his company concluded that guilty party was Vladimir Putin. Amazing!

Feb 21, 2018 | www.moonofalabama.org

Partisan | Feb 20, 2018 5:06:58 PM | 11

The whole piece is just hilarious and I laughed out loud all time while reading it.

https://consortiumnews.com/2018/02/16/nyts-really-weird-russiagate-story/

Since the FBI never inspected the DNC's computers first-hand, the only evidence comes from an Irvine, California, cyber-security firm known as CrowdStrike whose chief technical officer, Dmitri Alperovitch, a well-known Putin-phobe, is a fellow at the Atlantic Council, a Washington think tank that is also vehemently anti-Russian as well as a close Hillary Clinton ally.

Thus, Putin-basher Clinton hired Putin-basher Alperovitch to investigate an alleged electronic heist, and to absolutely no one's surprise, his company concluded that guilty party was Vladimir Putin. Amazing! Since then, a small army of internet critics has chipped away at CrowdStrike for praising the hackers as among the best in the business yet declaring in the same breath that they gave themselves away by uploading a document in the name of "Felix Edmundovich," i.e. Felix E. Dzerzhinsky, founder of the Soviet secret police.

As noted cyber-security expert Jeffrey Carr observed with regard to Russia's two main intelligence agencies: "Raise your hand if you think that a GRU or FSB officer would add Iron Felix's name to the metadata of a stolen document before he released it to the world while pretending to be a Romanian hacker. Someone clearly had a wicked sense of humor."

[Feb 20, 2018] Thus, Putin-basher Clinton hired Putin-basher Alperovitch to investigate an alleged electronic heist, and to absolutely no one's surprise, his company concluded that guilty party was Vladimir Putin. Amazing!

Feb 20, 2018 | www.moonofalabama.org

Partisan | Feb 20, 2018 5:06:58 PM | 11

The whole piece is just hilarious and I laughed out loud all time while reading it.

https://consortiumnews.com/2018/02/16/nyts-really-weird-russiagate-story/

Since the FBI never inspected the DNC's computers first-hand, the only evidence comes from an Irvine, California, cyber-security firm known as CrowdStrike whose chief technical officer, Dmitri Alperovitch, a well-known Putin-phobe, is a fellow at the Atlantic Council, a Washington think tank that is also vehemently anti-Russian as well as a close Hillary Clinton ally.

Thus, Putin-basher Clinton hired Putin-basher Alperovitch to investigate an alleged electronic heist, and to absolutely no one's surprise, his company concluded that guilty party was Vladimir Putin. Amazing! Since then, a small army of internet critics has chipped away at CrowdStrike for praising the hackers as among the best in the business yet declaring in the same breath that they gave themselves away by uploading a document in the name of "Felix Edmundovich," i.e. Felix E. Dzerzhinsky, founder of the Soviet secret police.

As noted cyber-security expert Jeffrey Carr observed with regard to Russia's two main intelligence agencies: "Raise your hand if you think that a GRU or FSB officer would add Iron Felix's name to the metadata of a stolen document before he released it to the world while pretending to be a Romanian hacker. Someone clearly had a wicked sense of humor."

[Feb 19, 2018] Kim Dotcom Let Me Assure You, The DNC Hack Wasn t Even A Hack Zero Hedge

Notable quotes:
"... All fucking Kabuki. All of it. ..."
"... The Deep State (Oligarchs and the MIC) is totally fucking loving this: they have Trump and the GOP giving them everything they ever wanted and they have the optics and distraction of an "embattled" president that claims to be against or a victim of the "deep state" and a base that rally's, circles the wagons around him, and falls for the narrative. ..."
"... They know exactly who it was with the memory stick, there is always video of one form or another either in the data center or near the premises that can indicate who it was. They either have a video of Seth Rich putting the stick into the server directly, or they at least have a video of his car entering and leaving the vicinity of the ex-filtration. ..."
"... This would have been an open and shut case if shillary was not involved. Since it was involved, you can all chalk it up to the Clinton body count. I pray that it gets justice. It and the country, the world - needs justice. ..."
Feb 19, 2018 | www.zerohedge.com

Kim Dotcom: "Let Me Assure You, The DNC Hack Wasn't Even A Hack"

by Tyler Durden Mon, 02/19/2018 - 07:51 3.4K SHARES

Kim Dotcom has once again chimed in on the DNC hack, following a Sunday morning tweet from President Trump clarifying his previous comments on Russian meddling in the 2016 election.

In response, Dotcom tweeted " Let me assure you, the DNC hack wasn't even a hack. It was an insider with a memory stick. I know this because I know who did it and why," adding "Special Counsel Mueller is not interested in my evidence. My lawyers wrote to him twice. He never replied. 360 pounds! " alluding of course to Trump's "400 pound genius" comment.

Dotcom's assertion is backed up by an analysis done last year by a researcher who goes by the name Forensicator , who determined that the DNC files were copied at 22.6 MB/s - a speed virtually impossible to achieve from halfway around the world, much less over a local network - yet a speed typical of file transfers to a memory stick.

The local transfer theory of course blows the Russian hacking narrative out of the water, lending credibility to the theory that the DNC "hack" was in fact an inside job, potentially implicating late DNC IT staffer, Seth Rich.

John Podesta's email was allegely successfully "hacked" (he fell victim to a phishing scam ) in March 2016, while the DNC reported suspicious activity (the suspected Seth Rich file transfer) in late April, 2016 according to the Washington Post.

On May 18, 2017, Dotcom proposed that if Congress includes the Seth Rich investigation in their Russia probe, he would provide written testimony with evidence that Seth Rich was WikiLeaks' source.

On May 19 2017 Dotcom tweeted "I knew Seth Rich. I was involved"

Three days later, Dotcom again released a guarded statement saying "I KNOW THAT SETH RICH WAS INVOLVED IN THE DNC LEAK," adding:

"I have consulted with my lawyers. I accept that my full statement should be provided to the authorities and I am prepared to do that so that there can be a full investigation. My lawyers will speak with the authorities regarding the proper process.

If my evidence is required to be given in the United States I would be prepared to do so if appropriate arrangements are made. I would need a guarantee from Special Counsel Mueller, on behalf of the United States, of safe passage from New Zealand to the United States and back. In the coming days we will be communicating with the appropriate authorities to make the necessary arrangements. In the meantime, I will make no further comment."

Dotcom knew.

While one could simply write off Dotcom's claims as an attention seeking stunt, he made several comments and a series of tweets hinting at the upcoming email releases prior to both the WikiLeaks dumps as well as the publication of the hacked DNC emails to a website known as "DCLeaks."

In a May 14, 2015 Bloomberg article entitled "Kim Dotcom: Julian Assange Will Be Hillary Clinton's Worst Nightmare In 2016 ": "I have to say it's probably more Julian," who threatens Hillary, Dotcom said. " But I'm aware of some of the things that are going to be roadblocks for her ."

Two days later, Dotcom tweeted this:

Around two months later, Kim asks a provocative question

Two weeks after that, Dotcom then tweeted "Mishandling classified info is a crime. When Hillary's emails eventually pop up on the internet who's going to jail?"

It should thus be fairly obvious to anyone that Dotcom was somehow involved, and therefore any evidence he claims to have, should be taken seriously as part of Mueller's investigation. Instead, as Dotcom tweeted, "Special Counsel Mueller is not interested in my evidence. My lawyers wrote to him twice. He never replied. "

chunga Sun, 02/18/2018 - 21:59 Permalink

Pffft...this guy sounds like the reds with their "blockbuster" memo. Honest Hill'rey is laughing!

SethPoor -> chunga Sun, 02/18/2018 - 22:00 Permalink

https://www.youtube.com/watch?v=5_8VaMbPjUU

Bes -> J S Bach Sun, 02/18/2018 - 22:17 Permalink

All fucking Kabuki. All of it.

The Deep State (Oligarchs and the MIC) is totally fucking loving this: they have Trump and the GOP giving them everything they ever wanted and they have the optics and distraction of an "embattled" president that claims to be against or a victim of the "deep state" and a base that rally's, circles the wagons around him, and falls for the narrative.

Meanwhile they keep enacting the most Pro Deep State/MIC/Police State/Zionist/Wall Street agenda possible. And they call it #winning

----

pathetic.

bigkahuna -> CheapBastard Mon, 02/19/2018 - 09:58 Permalink

"Had to be a Russian mole with a computer stick. MSM, DNC and Muller say so."

They know exactly who it was with the memory stick, there is always video of one form or another either in the data center or near the premises that can indicate who it was. They either have a video of Seth Rich putting the stick into the server directly, or they at least have a video of his car entering and leaving the vicinity of the ex-filtration.

This would have been an open and shut case if shillary was not involved. Since it was involved, you can all chalk it up to the Clinton body count. I pray that it gets justice. It and the country, the world - needs justice.

StarGate -> CheapBastard Mon, 02/19/2018 - 11:23 Permalink

Don't forget the "hack" analysis of Russian owned "Crowdstrike" since the FBI did and continues to, refuse to analyze the DNC computers.

KuriousKat -> CheapBastard Mon, 02/19/2018 - 13:26 Permalink

Isn't Alperovitch the Only Russian in there?.. When you rule out the impossible...whatever remains probable.. probably is..

wildbad -> IntercoursetheEU Mon, 02/19/2018 - 03:05 Permalink

Kim is great, Assange is great. Kim is playing a double game. He wants immunity from the US GUmmint overreach that destroyed his company and made him a prisoner in NZ.

Good on ya Kim.

His name was Seth Rich...and he will reach out from the grave and bury Killary who murdered him.

NumberNone -> wildbad Mon, 02/19/2018 - 10:04 Permalink

There are so many nuances to this and all are getting mentioned but the one that also stands out is that in an age of demands for gun control by the Dems, Seth Rich is never, ever mentioned. He should be the poster child for gun control. Young man, draped in a American flag, helping democracy, gunned down...it writes itself.

They either are afraid of the possible racial issues should it turn out to be a black man killing a white man (but why should that matter in a gun control debate?) or they just don't want people looking at this case. I go for #2.

Socratic Dog -> Buckaroo Banzai Mon, 02/19/2018 - 12:09 Permalink

Funny that George Webb can figure it out, but Trump, Leader of the Free World, is sitting there with his dick in his hand waiting for someone to save him.

Whatever he might turn out to be, this much is clear: Trump is a spineless weakling. He might be able to fuck starlets, but he hasn't got the balls to defend either himself or the Republic.

verumcuibono -> Buckaroo Banzai Mon, 02/19/2018 - 14:26 Permalink

Webb's research is also...managed. But a lot of it was/is really good (don't follow it anymore) and I agree re: SR piece of it.

I think SR is such an interesting case. It's not really an anomaly because SO many Bush-CFR-related hits end the same way and his had typical signatures. But his also squeels of a job done w/out much prior planning because I think SR surprised everyone. If, in fact, that was when he was killed. Everything regarding the family's demeanor suggests no.

verumcuibono -> NumberNone Mon, 02/19/2018 - 12:41 Permalink

MANY patterns in shootings: failure in law enforcement/intelligence who were notified of problem individuals ahead of time, ARs, mental health and SSRIs, and ongoing resistance to gun control in DC ----these are NOT coincidences. Nor are distractions in MSM's version of events w/ controlled propaganda.

Children will stop being killed when America wakes the fuck up and starts asking the right questions, making the right demands. It's time.

KJWqonfo7 -> wildbad Mon, 02/19/2018 - 11:15 Permalink

Kim is awesome to watch, I remember his old website of pics of him on yachts with hot girls and racing the Gumball Rally.

verumcuibono -> wildbad Mon, 02/19/2018 - 14:28 Permalink

I don't think you know how these hackers have nearly ALL been intercepted by CIA--for decades now. DS has had backdoor access to just about all of them. I agree that Kim is great, brilliant and was sabotaged but he's also cooperating. Otherwise he'd be dead.

StarGate -> Billy the Poet Mon, 02/19/2018 - 11:48 Permalink

Bes is either "disinfo plant" or energy draining pessimist. Result is the same - to deflate your power to create a new future.

Trump saw the goal of the Fed Reserve banksters decades ago and spoke often about it. Like Prez Kennedy he wants to return USA economy to silver or gold backed dollar then transition to new system away from the Black Magic fed reserve/ tax natl debt machine.

The Globalist Cabal has been working to destroy the US economy ever since they income tax April 15th Lincoln at the Ford theater. 125 years. But Bes claims because Trump cannot reverse 125 years of history in one year that it is kabuki.

Pessimism is its own reward.

[Feb 19, 2018] What the Arrest of the Russian Intel top Cyber-Crime Expert Has to Do With American elections

Feb 19, 2018 | thebell.io

Sergei Mikhailov was arrested one year ago, on Dec. 5, 2016. Officers of the agency's internal security division seized him at his office and led him away with a sack over his head. Mikhailov is a black belt in karate and the officers feared that he might resist, explained one of the colonel's acquaintances.

Prior to his arrest, Mikhailov was head of the 2nd Directorate of the FSB's Information Security Center (TsIB) and within Russian intelligence circles he was considered the main authority on cybercrime.

Now he and three other men -- Dmitry Dokuchayev , an FSB major and former criminal hacker, accused in the U.S. of hacking 500 million Yahoo! accounts in 2014; Ruslan Stoyanov , a former Kaspersky Lab employee; and Georgy Fomchenkov , a little-known internet entrepreneur -- are suspected of state treason. The four are being held in Moscow's high-security Lefortovo Prison

[Feb 19, 2018] The FSB breaks up Russia's most notorious hacker group

Notable quotes:
"... Rosbalt said that when Anikeyev's business reached national levels, he started using new techniques. For example, Anikeyev would go to restaurants and cafes popular among officials, and with the help of sophisticated equipment he created fake Wi-Fi and mobile phone connections. ..."
"... Unsuspecting officials would connect to the network through the channel created by the hacker and he would have access to the information on their devices. ..."
"... Through the Looking Glass, ..."
"... The Anonymous International website was opened in 2013 and content stolen from the phones and emails of Russian politicians immediately started appearing on it. According to Life News , only the correspondence of the public officials and businessmen who refused to pay was published. At the same time members of Shaltai-Boltai positioned themselves as people with an active civil stance. ..."
"... Mikhailov tracked down Anonymous International at the beginning of 2016 and decided to take it under his control, as well as make some money from blackmail along the way. According to Life News , there is another theory - that Mikhailov had been managing the Shaltai-Boltai business from the start. ..."
"... Whatever the truth, Mikhailov and Dokuchayev have now been charged with treason. Anikeyev and Stoyanov will be prosecuted under a different charge - "unauthorized access to computer information." According to Rosbalt , the treason charges against Mikhailov and Dokuchayev are to do with Anonymous International's involvement in leaking to Ukraine the private correspondence of presidential aide Vladislav Surkov. ..."
"... Shaltai-Boltai's website has not been updated since Nov. 26 and its Twitter account since Dec. 12. The group's remaining members, who are believed to live in Thailand and the Baltic States, have been put on an FSB wanted list. ..."
Feb 19, 2018 | www.rbth.com

The alleged leader of the Anonymous International hacker group, also known as Shaltai-Boltai, has been arrested along with important officials in the security services who collaborated with the group. For several years Shaltai-Boltai terrorized state officials, businessmen and media figures by hacking their emails and telephones, and threatening to post their private information online unless blackmail payments were made. "The price tag for our work starts at several tens of thousands of dollars, and I am not going to talk about the upper limit," said a man who calls himself Lewis during an interview with the news website, Meduza , in January 2015.

Lewis, whose name pays hommage to the author Lewis Carroll, is the leader of Anonymous International, the hacker group specializing in hacking the accounts of officials and businessmen. Another name for Anonymous International is Shaltai-Boltai, Russian for "Humpty-Dumpty."

Several years ago Lewis and his colleagues prospered thanks to extortion. They offered their victims the chance to pay a handsome price to buy back their personal information that had been stolen. Otherwise their information would be sold to third persons and even posted online. In the end, Russian law-enforcement tracked down Lewis, and in November he was arrested and now awaits trial . His real name is Vladimir Anikeyev.

Shaltai-Boltai's founding father

"One's own success is good but other people's failure is not bad either," said the profile quote on Vladimir Anikeyev's page on VKontakte , Russia's most popular social network.

Vladimir Anikeyev / Photo: anikeevv/vk.com

Rosbalt news website said that in the 1990s Lewis worked as a journalist in St. Petersburg and specialized in collecting information through various methods, including dubious ones. "He could go for a drink with someone or have an affair with someone's secretary or bribe people," Rosbalt's source said.

In the 2000s Anikeyev switched to collecting kompromat (compromising material). Using his connections, he would find the personal email addresses of officials and entrepreneurs and break into them using hackers in St. Petersburg, and then blackmail the victims. They had to pay to prevent their personal information from ending up on the Internet.

Fake Wi-Fi

Rosbalt said that when Anikeyev's business reached national levels, he started using new techniques. For example, Anikeyev would go to restaurants and cafes popular among officials, and with the help of sophisticated equipment he created fake Wi-Fi and mobile phone connections.

Unsuspecting officials would connect to the network through the channel created by the hacker and he would have access to the information on their devices.

In the beginning Anikeyev was personally involved in the theft of information but later he created a network of agents.

The business grew quickly; enormous amounts of information were at Anikeyev's disposal that had to be sorted and selected for suitability as material for blackmail. In the end, according to Rosbalt, Anonymous International arose as a handy tool for downloading the obtained information.

Trying to change the world

The second name of the group refers to the works of Lewis Carroll, according to Shaltai-Boltai members. The crazy world of Through the Looking Glass, with its inverted logic, is the most apt metaphor for Russian political life. Apart from Lewis Anikeyev, the team has several other members: Alice; Shaltai, Boltai (these two acted as press secretaries, and as a result of a mix-up, the media started calling the whole project, Shaltai-Boltai); and several others, including "technicians," or specialist hackers.

The Anonymous International website was opened in 2013 and content stolen from the phones and emails of Russian politicians immediately started appearing on it. According to Life News , only the correspondence of the public officials and businessmen who refused to pay was published. At the same time members of Shaltai-Boltai positioned themselves as people with an active civil stance.

"We can be called campaigners. We are trying to change the world. To change it for the better," Shaltai told the Apparat website. In interviews members of the group repeatedly complained about Russian officials who restricted Internet freedom, the country's foreign policy and barriers to participation in elections.

Hacker exploits

Shaltai-Boltai's most notorious hack was of an explicitly political nature and not about making money. It hacked Russian Prime Minister Dmitry Medvedev's Twitter account. On Aug. 14, 2014 tweets were posted on the account saying that Medvedev was resigning because he was ashamed of the government's actions. The `prime minister' also had time to write that Putin was wrong, that the government had problems with common sense, and that the authorities were taking the country back to the past.

The scourge of banks and politicians: 4 famous Russian hackers

On the same day Anonymous International posted part of the prime minister's stolen archive, admitting that, "there is nothing particularly interesting in it."

"The posted material was provided by a certain highly-placed reptilian of our acquaintance," the hackers joked .

Medvedev is far from being Shaltai-Boltai's only victim. The hackers published the private correspondence of officials in the presidential administration: Yevgeny Prigozhin, a businessman close to Vladimir Putin; Aram Gabrelyanov, head of the pro-Kremlin News Media holding company; and of Igor Strelkov, one of the leaders of the uprising in east Ukraine. Lewis, however, insisted that only material that had failed to sell ended up on the Internet.

Law-enforcement links

Anikeyev was detained in November, and the following month Sergei Mikhailov, head of the 2nd operations directorate of the FSB Information Security Center, was also arrested. According to Kommersant , Mikhailov was a major figure in the security services who, "was essentially overseeing the country's entire internet business."

Mikhailov's aide, FSB Major Dmitry Dokuchayev, and a former hacker known as Forb, was also arrested. Shortly after, Ruslan Stoyanov, head of the department for investigating cybercrime at the antivirus software company Kaspersky Lab, was also detained. Stoyanov also worked closely with the secret services.

According to Rosbalt , Anikeyev revealed information about the FSB officers and the Kaspersky Lab computer expert and their close involvement with Shaltai-Boltai.

Mikhailov tracked down Anonymous International at the beginning of 2016 and decided to take it under his control, as well as make some money from blackmail along the way. According to Life News , there is another theory - that Mikhailov had been managing the Shaltai-Boltai business from the start.

Shaltai-Boltai had a big fall

Whatever the truth, Mikhailov and Dokuchayev have now been charged with treason. Anikeyev and Stoyanov will be prosecuted under a different charge - "unauthorized access to computer information." According to Rosbalt , the treason charges against Mikhailov and Dokuchayev are to do with Anonymous International's involvement in leaking to Ukraine the private correspondence of presidential aide Vladislav Surkov.

Shaltai-Boltai's website has not been updated since Nov. 26 and its Twitter account since Dec. 12. The group's remaining members, who are believed to live in Thailand and the Baltic States, have been put on an FSB wanted list.

Anyway, Shaltai-Boltai anticipated this outcome. "What awaits us if we are uncovered? Criminal charges and most likely a prison sentence. Each member of the team is aware of the risks," they said dispassionately in the interview with Apparat in 2015.

[Feb 19, 2018] Shaltai-Boltai's leader arrested by the FSB Crime

Notable quotes:
"... Anikeev immediately began to cooperate with the investigation and provide detailed evidence, which repeatedly mentioned Mikhailov as being associated with the Shaltai-Boltai's team," said the source of Rosbalt. And in December 2016, Mikhailov and his "right hand," another official of the Information Security Center, Dmitry Dokuchaev, were arrested. The Court took a decision on their arrest. Another ISC official was also detained, but after questioning, no preventive measures involving deprivation of liberty were applied to him. ..."
"... After the summer, Shaltai-Boltai began to work exclusively with the content given to it by the curator. ..."
"... later it switched to civil servants' email that contained information that could bring serious trouble. When it became known that Surkov's correspondence "leaked" to Ukraine, it broke the camel's back. "Mikhailov's a magnificent expert. Best in his business. One can say that the ISC is Mikhailov.. But he crossed all possible borders," told a source of Rosbalt. ..."
Feb 19, 2018 | rusletter.com

RusLetter

The story around the arrest of a high-ranking ISC official, Sergey Mikhailov, is becoming an actual thriller.

The creator of Shaltai-Boltai (Humpty Dumpty) website, which containted the correspondence of officials, journalist Vladimir Anikeev, better known in some circles as Lewis, was arrested on arrival from Ukraine, where he is supposed to have been involved in the publishing on a local site of presidential aide Vladislav Surkov's correspondence. In his testimony, Lewis said about the employee of the Information Security Center, Mikhailov.

As a source familiar with the situation told Rosbalt, Vladimir Anikeev was detained by the FSB officers at the end of October 2016, when he arrived in St. Petersburg from Ukraine. "The operation was the result of a long work. There was a complicated operative combination with the aim to lure Lewis from Ukraine, which he didn't indend to leave," said the source to the news agency. Anikeev was taken to Moscow, where the Investigation department of the FSB charged him under Article 272 of the Criminal Code (Illegal access to computer information).

First and foremost the counterintelligence was interested in the situation with the "leakage" of Vladislav Surkov's correspondence: by the time it was known that it was in the hands of the Shaltai-Boltai's team. Since it was e-mail with from the .gov domain, the situation caused great concern in theFSO. As a result of this, the correspondence was published on the website of a Ukrainian association of hackers called Cyber-Junta. In reality, it is suspected that Anikeev was involved in that affair. He'd been constantly visiting this country, his girlfriend lived there, and, according to available data, he was not going to return to Russia. Lewis was also asked about other officials' correspondence, which already appeared on the Shaltai-Boltai website.

" Anikeev immediately began to cooperate with the investigation and provide detailed evidence, which repeatedly mentioned Mikhailov as being associated with the Shaltai-Boltai's team," said the source of Rosbalt. And in December 2016, Mikhailov and his "right hand," another official of the Information Security Center, Dmitry Dokuchaev, were arrested. The Court took a decision on their arrest. Another ISC official was also detained, but after questioning, no preventive measures involving deprivation of liberty were applied to him.

According to the version of the agency's source, the situation developed as follows. At the beginning of 2016, the department headed by Mikhailov received an order to "work" with Shaltai-Boltai's website, which published the correspondence of civil servants. The immediate executor was Dokuchaev. Officers of the ISC were able to find out the team of Shaltai-Boltai, which participants nicknamed themselves after Lewis Carroll's "Alice in Wonderland": Alice, the March Hare, etc. The website creator and organizer, Anikeev, was nicknamed Lewis. In the summer there were searching raids in St. Petersburg, although formally for other reasons.

According to the Rosbalt's source, just after the summer attack the team of Shaltai-Boltai appeared to have the owner, or, to be exact, the curator. According to the source, it could be Sergey Mikhailov. As the result, the working methods of the Lewis's team also changed, just as the objects whose correspondence was being published for public access. Previously, Lewis's people figured out objects in places where mobile phone was used. They were given access to the phone contents by means of a false cell (when it came to mobile internet) or using a false-Wi-FI (if the person was connected to Wi-FI). Then the downloaded content was sent to member of the Lewis's team, residing in Estonia. He analyzed to to select what's to be put in the open access and what's to be sold for Bitcoins. The whole financial part of the Shaltai-Boltai involved a few people living in Thailand. These Bitcoins were cashed in Ukraine. Occasionally the Lewis published emails previously stolen by other hackers.

After the summer, Shaltai-Boltai began to work exclusively with the content given to it by the curator. Earlier, it published correspondence of rather an "entertaining" character, as well as officials whose "secrets" would do no special harm; but later it switched to civil servants' email that contained information that could bring serious trouble. When it became known that Surkov's correspondence "leaked" to Ukraine, it broke the camel's back. "Mikhailov's a magnificent expert. Best in his business. One can say that the ISC is Mikhailov.. But he crossed all possible borders," told a source of Rosbalt.

[Feb 19, 2018] Russian Lawyer Says FSB Officers, Kaspersky Manager Charged With Treason

Feb 19, 2018 | www.rferl.org

At the time of their arrests in December, Sergei Mikhailov and Dmitry Dokuchayev were officers with the FSB's Center for Information Security, a leading unit within the FSB involved in cyberactivities.

Pavlov confirmed to RFE/RL the arrest of Mikhailov and Dokuchayev, along with Ruslan Stoyanov, a former employee of the Interior Ministry who had worked for Kaspersky Labs, a well-known private cyber-research company, which announced Stoyanov's arrest last month.

The newspaper Kommersant reported that Mikhailov was arrested at a meeting of FSB officers and was taken from the meeting after a sack was put on his head.

The independent newspaper Novaya Gazeta, meanwhile, said that a total of six suspects -- including Mikhailov, Dokuchayev, and Stoyanov -- had been arrested. The state news agency TASS reported on February 1 that two men associated with a well-known hacking group had also been arrested in November, but it wasn't immediately clear if those arrests were related to the FSB case.

There has been no public detail as to the nature of the treason charges against Mikhailov, Dokuchayev, and Stoyanov. The Interfax news agency on January 31 quoted "sources familiar with the situation" as saying that Mikhailov and Dokuchayev were suspected of relaying confidential information to the U.S. Central Intelligence Agency (CIA).

Pavlov told RFE/RL the individuals were suspected of passing on classified information to U.S. intelligence, but not necessarily the CIA.

[Feb 18, 2018] The FSB breaks up Russia's most notorious hacker group - Russia Beyond

Notable quotes:
"... Through the Looking Glass, ..."
"... Mikhailov tracked down Anonymous International at the beginning of 2016 and decided to take it under his control, as well as make some money from blackmail along the way. According to Life News , there is another theory - that Mikhailov had been managing the Shaltai-Boltai business from the start. ..."
"... Whatever the truth, Mikhailov and Dokuchayev have now been charged with treason. Anikeyev and Stoyanov will be prosecuted under a different charge - "unauthorized access to computer information." According to Rosbalt , the treason charges against Mikhailov and Dokuchayev are to do with Anonymous International's involvement in leaking to Ukraine the private correspondence of presidential aide Vladislav Surkov. ..."
"... Shaltai-Boltai's website has not been updated since Nov. 26 and its Twitter account since Dec. 12. The group's remaining members, who are believed to live in Thailand and the Baltic States, have been put on an FSB wanted list. ..."
Feb 18, 2018 | www.rbth.com

The alleged leader of the Anonymous International hacker group, also known as Shaltai-Boltai, has been arrested along with important officials in the security services who collaborated with the group. For several years Shaltai-Boltai terrorized state officials, businessmen and media figures by hacking their emails and telephones, and threatening to post their private information online unless blackmail payments were made. "The price tag for our work starts at several tens of thousands of dollars, and I am not going to talk about the upper limit," said a man who calls himself Lewis during an interview with the news website, Meduza , in January 2015.

Lewis, whose name pays hommage to the author Lewis Carroll, is the leader of Anonymous International, the hacker group specializing in hacking the accounts of officials and businessmen. Another name for Anonymous International is Shaltai-Boltai, Russian for "Humpty-Dumpty."

Several years ago Lewis and his colleagues prospered thanks to extortion. They offered their victims the chance to pay a handsome price to buy back their personal information that had been stolen. Otherwise their information would be sold to third persons and even posted online. In the end, Russian law-enforcement tracked down Lewis, and in November he was arrested and now awaits trial . His real name is Vladimir Anikeyev.

Shaltai-Boltai's founding father

"One's own success is good but other people's failure is not bad either," said the profile quote on Vladimir Anikeyev's page on VKontakte , Russia's most popular social network.

Vladimir Anikeyev / Photo: anikeevv/vk.com Vladimir Anikeyev / Photo: anikeevv/vk.com

Rosbalt news website said that in the 1990s Lewis worked as a journalist in St. Petersburg and specialized in collecting information through various methods, including dubious ones. "He could go for a drink with someone or have an affair with someone's secretary or bribe people," Rosbalt's source said.

In the 2000s Anikeyev switched to collecting kompromat (compromising material). Using his connections, he would find the personal email addresses of officials and entrepreneurs and break into them using hackers in St. Petersburg, and then blackmail the victims. They had to pay to prevent their personal information from ending up on the Internet.

Fake Wi-Fi

Rosbalt said that when Anikeyev's business reached national levels, he started using new techniques. For example, Anikeyev would go to restaurants and cafes popular among officials, and with the help of sophisticated equipment he created fake Wi-Fi and mobile phone connections.

Unsuspecting officials would connect to the network through the channel created by the hacker and he would have access to the information on their devices.

In the beginning Anikeyev was personally involved in the theft of information but later he created a network of agents.

The business grew quickly; enormous amounts of information were at Anikeyev's disposal that had to be sorted and selected for suitability as material for blackmail. In the end, according to Rosbalt, Anonymous International arose as a handy tool for downloading the obtained information.

Trying to change the world

The second name of the group refers to the works of Lewis Carroll, according to Shaltai-Boltai members. The crazy world of Through the Looking Glass, with its inverted logic, is the most apt metaphor for Russian political life. Apart from Lewis Anikeyev, the team has several other members: Alice; Shaltai, Boltai (these two acted as press secretaries, and as a result of a mix-up, the media started calling the whole project, Shaltai-Boltai); and several others, including "technicians," or specialist hackers.

The Anonymous International website was opened in 2013 and content stolen from the phones and emails of Russian politicians immediately started appearing on it. According to Life News , only the correspondence of the public officials and businessmen who refused to pay was published. At the same time members of Shaltai-Boltai positioned themselves as people with an active civil stance.

"We can be called campaigners. We are trying to change the world. To change it for the better," Shaltai told the Apparat website. In interviews members of the group repeatedly complained about Russian officials who restricted Internet freedom, the country's foreign policy and barriers to participation in elections.

Hacker exploits

Shaltai-Boltai's most notorious hack was of an explicitly political nature and not about making money. It hacked Russian Prime Minister Dmitry Medvedev's Twitter account. On Aug. 14, 2014 tweets were posted on the account saying that Medvedev was resigning because he was ashamed of the government's actions. The `prime minister' also had time to write that Putin was wrong, that the government had problems with common sense, and that the authorities were taking the country back to the past.

The scourge of banks and politicians: 4 famous Russian hackers The scourge of banks and politicians: 4 famous Russian hackers

On the same day Anonymous International posted part of the prime minister's stolen archive, admitting that, "there is nothing particularly interesting in it."

"The posted material was provided by a certain highly-placed reptilian of our acquaintance," the hackers joked .

Medvedev is far from being Shaltai-Boltai's only victim. The hackers published the private correspondence of officials in the presidential administration: Yevgeny Prigozhin, a businessman close to Vladimir Putin; Aram Gabrelyanov, head of the pro-Kremlin News Media holding company; and of Igor Strelkov, one of the leaders of the uprising in east Ukraine. Lewis, however, insisted that only material that had failed to sell ended up on the Internet.

Law-enforcement links

Anikeyev was detained in November, and the following month Sergei Mikhailov, head of the 2nd operations directorate of the FSB Information Security Center, was also arrested. According to Kommersant , Mikhailov was a major figure in the security services who, "was essentially overseeing the country's entire internet business."

Mikhailov's aide, FSB Major Dmitry Dokuchayev, and a former hacker known as Forb, was also arrested. Shortly after, Ruslan Stoyanov, head of the department for investigating cybercrime at the antivirus software company Kaspersky Lab, was also detained. Stoyanov also worked closely with the secret services.

According to Rosbalt , Anikeyev revealed information about the FSB officers and the Kaspersky Lab computer expert and their close involvement with Shaltai-Boltai.

Mikhailov tracked down Anonymous International at the beginning of 2016 and decided to take it under his control, as well as make some money from blackmail along the way. According to Life News , there is another theory - that Mikhailov had been managing the Shaltai-Boltai business from the start.

Shaltai-Boltai had a big fall

Whatever the truth, Mikhailov and Dokuchayev have now been charged with treason. Anikeyev and Stoyanov will be prosecuted under a different charge - "unauthorized access to computer information." According to Rosbalt , the treason charges against Mikhailov and Dokuchayev are to do with Anonymous International's involvement in leaking to Ukraine the private correspondence of presidential aide Vladislav Surkov.

Shaltai-Boltai's website has not been updated since Nov. 26 and its Twitter account since Dec. 12. The group's remaining members, who are believed to live in Thailand and the Baltic States, have been put on an FSB wanted list.

Anyway, Shaltai-Boltai anticipated this outcome. "What awaits us if we are uncovered? Criminal charges and most likely a prison sentence. Each member of the team is aware of the risks," they said dispassionately in the interview with Apparat in 2015.

[Feb 18, 2018] What the Arrest of the Russian Intel top Cyber-Crime Expert Has to Do With American elections -- The Bell

Feb 18, 2018 | thebell.io

Sergei Mikhailov was arrested one year ago, on Dec. 5, 2016. Officers of the agency's internal security division seized him at his office and led him away with a sack over his head. Mikhailov is a black belt in karate and the officers feared that he might resist, explained one of the colonel's acquaintances.

Prior to his arrest, Mikhailov was head of the 2nd Directorate of the FSB's Information Security Center (TsIB) and within Russian intelligence circles he was considered the main authority on cybercrime.

Now he and three other men -- Dmitry Dokuchayev , an FSB major and former criminal hacker, accused in the U.S. of hacking 500 million Yahoo! accounts in 2014; Ruslan Stoyanov , a former Kaspersky Lab employee; and Georgy Fomchenkov , a little-known internet entrepreneur -- are suspected of state treason. The four are being held in Moscow's high-security Lefortovo Prison

[Feb 18, 2018] Moscow Court Sentences 'Shaltai-Boltai' Hackers To Prison

Notable quotes:
"... A Moscow court has sentenced two Russian hackers to three years in prison each for breaking into the e-mail accounts of top Russian officials and leaking them. ..."
"... The 2016 arrests of the Shaltai-Boltai hackers became known only after Russian media reported that two officials of the Federal Security Service's cybercrime unit had been arrested on treason charges. ..."
Feb 18, 2018 | www.rferl.org

A Moscow court has sentenced two Russian hackers to three years in prison each for breaking into the e-mail accounts of top Russian officials and leaking them.

Konstantin Teplyakov and Aleksandr Filinov were members of the Shaltai-Boltai (Humpty Dumpty in Russian) collective believed to be behind the hacking of high-profile accounts, including the Twitter account of Prime Minister Dmitry Medvedev.

The two were found guilty of illegally accessing computer data in collusion with a criminal group.

Earlier in July, Shaltai-Boltai leader Vladimir Anikeyev was handed a two-year sentence after striking a plea bargain and agreeing to cooperate with the authorities.

The 2016 arrests of the Shaltai-Boltai hackers became known only after Russian media reported that two officials of the Federal Security Service's cybercrime unit had been arrested on treason charges.

Russian media reports suggested the officials had connections to the hacker group or had tried to control it.

[Feb 18, 2018] Notorious Russian Hacker With Links To FSB Scandal Sentenced To Prison

Feb 18, 2018 | www.rferl.org

A notorious Russian hacker whose exploits and later arrest gave glimpses into the intersection of computer crime and Russian law enforcement has been sentenced to two years in prison.

The Moscow City Court issued its ruling July 6 against Vladimir Anikeyev in a decision made behind closed doors, one indication of the sensitivity of his case.

[Feb 18, 2018] Making Sense of Russia's Cyber Treason Scandal

Notable quotes:
"... The stories implicating Mikhailov gained credence when Russian businessman Pavel Vrublevsky made similar accusations. He asserted that Mikhailov leaked details of Russian hacking capabilities to U.S. intelligence agencies. ..."
Feb 18, 2018 | worldview.stratfor.com

In January, the Kremlin-linked media outlet Kommersant suggested that the heads of Russia's Information Security Center (TsIB) were under investigation and would soon leave their posts. The TsIB is a shadowy unit that manages computer security investigations for the Interior Ministry and the FSB. It is thought to be Russia's largest inspectorate when it comes to domestic and foreign cyber capabilities, including hacking. It oversees security matters related to credit theft, financial information, personal data, social networks and reportedly election data -- or as some have claimed in the Russian media, "election rigging." Beyond its investigative role, it is presumed that the TsIB is fully capable of planning and directing cyber operations. A week after the initial Kommersant report surfaced, Andrei Gerasimov, the longtime TsIB director, resigned. Not long after Gerasimov's resignation at the end of January, reports emerged from numerous Kremlin-linked media outlets in what appeared to be a coordinated flood of information and disinformation about the arrests of senior TsIB officers. One of the cyber unit's operational directors, Sergei Mikhailov, was arrested toward the end of last year along with his deputy, Dmitri Dokuchaev, and charged with treason. Also arrested around the same time was Ruslan Stoyanov, the chief investigator for Kaspersky Lab, which is the primary cybersecurity contractor for the TsIB. There is much conjecture, but Mikhailov was apparently forcibly removed from a meeting with fellow FSB officers -- escorted out with a bag over his head, so the story goes -- and arrested. This is thought to have taken place some time around Dec. 5. His deputy, a well-respected computer hacker recruited by the FSB, was reportedly last seen in November. Kaspersky Lab's Stoyanov was a career cybersecurity professional, previously working for the Indrik computer crime investigation firm and the Interior Ministry's computer crime unit. Novaya Gazeta, a Kremlin-linked media outlet, reported that two other unnamed FSB computer security officers were also detained. Theories, Accusations and Rumors

Since the initial reports surfaced, Russian media have been flooded with conflicting theories about the arrests; about Mikhailov, Dokuchaev and Stoyanov; and about the accusations levied against them. Because the charges are treason, the case is considered "classified" by the state, meaning no official explanation or evidence will be released. An ultranationalist news network called Tsargrad TV reported that Mikhailov had tipped U.S. intelligence to the King Servers firm, which the FBI has accused of being the nexus of FSB hacking and intelligence operations in the United States. (It should be noted that Tsargrad TV tends toward sensationalism and has been used as a conduit for propaganda in the past.) The media outlet also claimed that the Russian officer's cooperation is what enabled the United States to publicly accuse Moscow of sponsoring election-related hacking with "high confidence."

The stories implicating Mikhailov gained credence when Russian businessman Pavel Vrublevsky made similar accusations. He asserted that Mikhailov leaked details of Russian hacking capabilities to U.S. intelligence agencies. Vrublevsky, however, had previously been the target of hacking accusations leveled by Mikhailov and his team, so it is possible that he has a personal ax to grind. To further complicate matters, a business partner of Vrublevsky, Vladimir Fomenko, runs King Servers, which the United States shut down in the wake of the hacking scandal.

[Feb 18, 2018] The FBI just indicted a Russian official for hacking. But why did Russia charge him with treason?

This article is almost a year old but contains interesting information about possible involvement of Shaltai Boltai in framing Russia in interference in the USA elections.
Notable quotes:
"... Also called Anonymous International, Shaltai-Boltai was responsible for leaking early copies of Putin's New Year speech and for selling off "lots" of emails stolen from Russian officials such as Prime Minister Dmitry Medvedev ..."
"... Later media reports said that the group's leader, Vladimir Anikeyev, had recently been arrested by the FSB and had informed on Mikhailov, Dokuchaev and Stoyanov. ..."
Mar 17, 2017 | www.washingtonpost.com

The FBI just indicted a Russian official for hacking. But why did Russia charge him with treason? - The Washington Post But what is less clear is why one of the men has been arrested and charged with treason in Russia. Dmitry Dokuchaev, an agent for the cyberinvestigative arm of the FSB, was arrested in Moscow in December. He's accused by the FBI of "handling" the hackers, paying "bounties" for breaking into email accounts held by Russian officials, opposition politicians and journalists, as well as foreign officials and business executives. The Russian targets included an Interior Ministry officer and physical trainer in a regional Ministry of Sports. (The full text of the indictment, which has a full list of the targets and some curious typos, is here .)

Reading this hackers indictment. I'm pretty sure there is no such position as the "deputy chairman of the Russian Federation" pic.twitter.com/DOWXYNoWjZ

-- Shaun Walker (@shaunwalker7) March 15, 2017

Dokuchaev's case is part of a larger and mysterious spate of arrests of Russian cyber officials and experts. His superior, Sergei Mikhailov, deputy chief of the FSB's Center for Information Security, was also arrested in December and charged with treason. According to Russian reports, the arrest came during a plenum of FSB officers, where Mikhailov had a bag placed over his head and was taken in handcuffs from the room. Ruslan Stoyanov, a manager at the Russian cybersecurity company Kaspersky Lab, was also arrested that month. Stoyanov helped coordinate investigations between the company and law enforcement, a person who used to work at the company said.

Below are some of the theories behind the Russian arrests. Lawyers for some of the accused have told The Washington Post that they can't reveal details of the case and, because of the secrecy afforded to treason cases, they don't have access to all the documents.

None of the theories below has been confirmed, nor are they mutually exclusive.

1. Links to U.S. election hacking : With attention focused on the hacking attacks against the U.S. Democratic National Committee allegedly ordered by Russian President Vladimir Putin, some Russian and U.S. media suggested that Dokuchaev and Mikhailov leaked information implicating Russia in the hack to the United States. The Russian Interfax news agency, which regularly cites government officials as sources, reported that "Sergei Mikhailov and his deputy, Dmitry Dokuchaev, are accused of betraying their oath and working with the CIA." Novaya Gazeta, a liberal, respected Russian publication, citing sources, wrote that Mikhailov had tipped off U.S. intelligence about King Servers, the hosting service used to support hacking attacks on targeted voter registration systems in Illinois and Arizona in June. That had followed reports in the New York Times, citing one current and one former government official, that "human sources in Russia did play a crucial role in proving who was responsible for the hacking."

Nakashima wrote yesterday that "the [FBI] charges are unrelated to the hacking of the Democratic National Committee and the FBI's investigation of Russian interference in the 2016 presidential campaign. But the move reflects the U.S. government's increasing desire to hold foreign governments accountable for malicious acts in cyberspace."

2. A shadowy hacking collective called Shaltai-Boltai (Humpty-Dumpty) : Also called Anonymous International, Shaltai-Boltai was responsible for leaking early copies of Putin's New Year speech and for selling off "lots" of emails stolen from Russian officials such as Prime Minister Dmitry Medvedev. In a theory first reported by the pro-Kremlin, conservative Orthodox media company Tsargrad, Mikhailov had taken control of Shaltai-Boltai, "curating and supervising" the group in selecting hacking targets. Later media reports said that the group's leader, Vladimir Anikeyev, had recently been arrested by the FSB and had informed on Mikhailov, Dokuchaev and Stoyanov. A member of the group who fled to Estonia told the Russian media agency Fontanka that they had recently acquired an FSB "coordinator," although he could not say whether it was Mikhailov. None of the hacks mentioned in the FBI indictment could immediately be confirmed as those carried out by Shaltai-Boltai.

Lawyers contacted by The Post said that in documents they had seen, there was no link to Shaltai-Boltai in the case.

3. A grudge with a cybercriminal : A Russian businessman who had specialized in spam and malware had claimed for years that Mikhailov was trading information on cybercriminals with the West. Mikhailov had reportedly testified in the case of Pavel Vrublevsky, the former head of the payment services company Chronopay, who was imprisoned in 2013 for ordering a denial of service attack on the website of Aeroflot, the Russian national airline. Vrublevsky claimed then that Mikhailov began exchanging information about Russian cybercriminals with Western intelligence agencies, including documents about Chronopay. Brian Krebs, an American journalist who investigates cybercrime and received access to Vrublevsky's emails, wrote in January : "Based on how long Vrublevsky has been trying to sell this narrative , it seems he may have finally found a buyer ."

4. Infighting at the FSB: The Russian government is not monolithic, and infighting between and within the powerful law enforcement agencies is common. The Russian business publication RBC had written that Mikhailov and Dokuchaev's Center for Information Security had been in conflict with another department with similar responsibilities, the FSB's Center for Information Protection and Special Communications. The conflict may have led to the initiation of a criminal case, the paper's sources said.

[Feb 18, 2018] Yahoo hack and Russia's cyber hacking

Feb 18, 2018 | www.businessinsider.com

As Leonid Bershidsky, founding editor of the Russian business daily publication Vedomosti, wrote in January, the dramatic arrests of two high-level FSB officers -- Sergei Mikhailov , the deputy head of the FSB's Information Security Center, and Major Dmitry Dokuchaev , a highly skilled hacker who had been recruited by the FSB -- on treason charges in December offers a glimpse into "how security agencies generally operate in Putin's Russia."

At the time of their arrest, Dokuchaev (who was one of the Russian officials indicted for the Yahoo breach) and Mikhailov had been trying to cultivate a Russian hacking group known as "Shaltai Boltai" -- or "Humpty Dumpty" -- that had been publishing stolen emails from Russian officials' inboxes, according to Russian media reports.

"The FSB team reportedly uncovered the identities of the group's members -- but, instead of arresting and indicting them, Mikhailov's team tried to run the group, apparently for profit or political gain," Bershidsky wrote. Shaltai Boltai complied, Bershidsky wrote, because it wanted to stay afloat, and didn't mind taking orders from "government structures."

"We get orders from government structures and from private individuals," Shaltai Boltai's alleged leader said in a 2015 interview. "But we say we are an independent team. It's just that often it's impossible to tell who the client is. Sometimes we get information for intermediaries, without knowing who the end client is."

It appears that Dokuchaev and Mikhailov got caught running this side project with Shaltai Boltai -- which was still targeting high-level Russian officials -- when the FSB began surveilling Mikhailov. Officials targeted Mikhailov after receiving a tip that he might have been leaking information about Russian cyber activities to the FBI, according to the Novaya Gazeta.

Short of working against Russian interests, hackers "can pursue whatever projects they want, as long as their targets are outside of Russia and they follow orders from the top when needed," said Bremmer, of Eurasia Group. The same goes for FSB officers, who are tactically allowed to "run private security operations involving blackmail and protection," according to Bershidsky.

US intelligence agencies have concluded that the hack on the Democratic National Committee during the 2016 election was likely one such "order from the top" -- a directive issued by Russian President Vladimir Putin and carried out by hackers hired by the GRU and the FSB.

It is still unclear if the Yahoo breach was directed by FSB officials at the instruction of the Kremlin, like the DNC hack, or if it was one of those "private security operations" Bershidsky alluded to that some Russian intelligence officers do on the side.

Bremmer said that it's possible the Yahoo breach was not done for state ends, especially given the involvement of Dokuchaev, who was already caught up in Shaltai Baltai's operations to steal and sell information for personal financial gain.

[Feb 18, 2018] Both agencies were complicit in the most infamous assassinations and false flag episodes since the Kennedy/MLK Vietnam days. Don't forget Air America CIA drug running and Iran/Contra / October Surprise affairs.

Notable quotes:
"... The Dulles brothers, with Allan as head of Sullivan and Cromwells' CIA were notorious facilitators for the international banksters and their subsidiary corporations which comprise the largest oil and military entities which have literally plainly stated in writing, need to occasionally "GALVANIZE" the American public through catastrophic and catalyzing events in order for Americans to be terrified into funding and fighting for those interlocked corporations in their quest to spread "FULL SPECTRUM DOMINANCE," throughout the globe. ..."
"... The book by Peter Dale Scott, "The American Deep State Wall Street, Big Oil And the Attack on American Democracy" covers in detail some of the points you mention in your reply. It is a fascinating book. ..."
Feb 18, 2018 | consortiumnews.com

Lee Anderson , February 17, 2018 at 4:32 pm

Your link to the Giraldi piece is appreciated, however, Giraldi starts off on a false premise: He claims that people generally liked and trusted the FBI and CIA up until or shortly after 9/11. Not so! Both agencies were complicit in the most infamous assassinations and false flag episodes since the Kennedy/MLK Vietnam days. Don't forget Air America CIA drug running and Iran/Contra / October Surprise affairs.

The Dulles brothers, with Allan as head of Sullivan and Cromwells' CIA were notorious facilitators for the international banksters and their subsidiary corporations which comprise the largest oil and military entities which have literally plainly stated in writing, need to occasionally "GALVANIZE" the American public through catastrophic and catalyzing events in order for Americans to be terrified into funding and fighting for those interlocked corporations in their quest to spread "FULL SPECTRUM DOMINANCE," throughout the globe.

The political parties are theatre designed to fool the people into believing we are living in some sort of legitimate, representative system, when it's the same old plutocracy that manages to get elected because they've long figured out the art of polarizing people and capitalising on tribal alignments.

We should eliminate all government for a time so that people can begin to see that corporations really do and most always have run the country.

It's preposterous to think the stupid public is actually discussing saddling ourselves and future generations with gargantuan debt through a system designed and run by banksters!

it should be self evident a sovereign nation should maintain and forever hold the rights to develop a monetary/financial system that serves the needs of the people, not be indentured servants in a financial system that serves the insatiable greed of a handful of parasitic banksters and corporate tycoons!

Joe Tedesky , February 17, 2018 at 5:08 pm

You are so right, in fact Robert Parry made quite a journalistic career out of exposing the CIA for such things as drug running. I gave up on that agency a longtime ago, after JFK was murdered, and I was only 13 then. Yeah maybe Phil discounts the time while he worked for the CIA, but the CIA has many, many rooms in which plots are hatched, so the valiant truth teller Giraldi maybe excused this one time for his lack of memory .I guess, right?

Good comment Lee. Joe

Annie , February 17, 2018 at 5:56 pm

Yes, but he's referring to the public's opinion of these agencies, and if they didn't continue to retain, even after 9/11, a significant popularity in the public's mind how would we have so many American's buying into Russia-gate? In my perception of things they only lost some ground after 9/11, but Americans notoriously have a short memory span.

Gregory Herr , February 17, 2018 at 6:42 pm

And films that are supposed to help Americans feel good about the aims and efficacy of the agencies like Zero Dark Thirty and Argo are in the popular imagination.

Skeptigal , February 17, 2018 at 7:19 pm

The book by Peter Dale Scott, "The American Deep State Wall Street, Big Oil And the Attack on American Democracy" covers in detail some of the points you mention in your reply. It is a fascinating book.

[Feb 17, 2018] A Brief History of the Kremlin Trolls by Scott Humor

Notable quotes:
"... Perhaps more significantly, it has more recently been claimed that members of Shaltay-Boltay have admitted to forging some parts of the correspondence that they hacked. The putative aim was to boost the profile of their group. ..."
"... Reading between the lines of this, I find more support for Scott's angle on this story. Shaltay-Boltay were indeed not hackers in a conventional sense. They were traders in an illicit information economy, and apparently weren't above fabricating that information if it would raise their profile. For the extent and nature of that fabrication, i look forward to Scott's next report! ..."
"... Out of nowhere, my gentleman acquaintance brought up the topic of the day: Russia hacking the elections. The more things change, the more they are not the same anymore. ..."
Feb 17, 2018 | thesaker.is

Scott on October 17, 2017 · at 3:03 pm UTC

to Mujo

That's what my research is about, despite Ivan Pavlov's defense denying the connection between the Shaltay-Boltay group and former FSB officers convicted for treason. https://en.crimerussia.com/gromkie-dela/defendant-in-high-treason-case-personally-detained-shaltay-boltay-s-leader-/

But that's what a good defense is for, to deny.

Treason is very serious charge that includes working for foreign governments intelligence services. I believe I have enough to prove my point, using, of course, only information openly available on the internet. However, if these people worked for SBU or Mossad, I will write about this, also.

See also, Arrested Russian FSB Agents Allegedly Passed Information to CIA

http://foreignpolicy.com/2017/01/31/arrested-russian-fsb-agents-allegedly-passed-information-to-cia-trump-putin/ https://www.cbsnews.com/news/russia-treason-fsb-spies-kaspersky-labs-us-intelligence-denies-cia-hacking/ https://www.theguardian.com/world/2017/jan/31/russian-cybersecurity-experts-face-treason-charges-cia https://www.usatoday.com/story/news/2017/01/26/report-arrested-russian-intel-officer-allegedly-spied-us/97094696/ https://www.rbth.com/politics_and_society/2017/02/02/fsb-officers-charged-with-treason-media-claim-cia-ties_693641

You wrote "(2) Why did they defect from the FSB to join the CIA? Do we have any insight on this?"

Maybe they defected, or maybe they started working there after being recruited by the foreign intelligence services. We will find out. ­

Mujo on October 18, 2017 , · at 5:58 am UTC

Scott,

Thanks for these follow-up links -- very helpful.

I also found this interview with Alexander Glazastikov (Humpty), which you have probably read:

The only member of Shaltay-Boltay left on the loose reveals details on their work

As described by various media sources, the basic story about Shaltay-Boltay is that they formed in mid-2013 to hack e-mail, social media, and data of officials and businessmen in Russia, and then sold this data for large amounts of money through the digital underground. In particular, this happened through a portal called "Exchange of Information", a kind of anonymous auction site for stolen data. Glazastikov says Shaltay-Boltay "was supposed to be a spokesman for the Anonymous International", and was created by himself, Vladimir Anikeev, and Konstantin Teplyakov.

Although most all of the Western media sources insinuate some connection between Shaltay-Boltay, the FSB officers who were arrested, and the putative "hacking" of the 2016 U.S. election, Glazastikov denies any interest in targets outside Russia.

There is also disagreement around the connection between Shaltay-Boltay and the FSB. Glazastikov says that the FSB contacted him, saying they were aware of Shaltay-Boltay's activity, and wanted to assert "control" and veto power in exchange for not arresting them. Russia Beyond claims that it was Sergei Mikhailov (FSB) who took control of Shaltay-Boltay and "received kickbacks from its founder, Vladimir Anikeyev". However, Glazastikov's testimony contradicts that of Anikeev, his lawyer (Ruslan Koblev), and Ivan Pavlov, lawyer for one of the FSB defendants, all of whom deny any working relationship between Shaltay-Boltay and the FSB.

Interestingly, Glazastikov notes that neither Anikeev nor Teplyakov had technical expertise. Moreover, Glazastikov makes it sound like even he was not primarily involved in hacking, and the "Exchange of Information" admins claim no connection with Shaltay-Boltay. For the heavy lifting, Shaltay-Boltay would use "specialized hacking sites" where they outsourced pay-to-order hacks with IT mercenaries. A target e-mail address could be hacked for a few thousand rubles. And even this, Glazastikov states, wasn't really the original idea for Shaltay-Boltay. Instead, he imagined they would be doing "advertising or administration fee".

Perhaps more significantly, it has more recently been claimed that members of Shaltay-Boltay have admitted to forging some parts of the correspondence that they hacked. The putative aim was to boost the profile of their group.

Reading between the lines of this, I find more support for Scott's angle on this story. Shaltay-Boltay were indeed not hackers in a conventional sense. They were traders in an illicit information economy, and apparently weren't above fabricating that information if it would raise their profile. For the extent and nature of that fabrication, i look forward to Scott's next report!

Internal Exile USA on October 17, 2017 , · at 4:29 pm UTC
This is incredible research, you put most YTube new journalists to shame. I hope this material makes its way into your next book. "Enemy of the State" is an instant classic full of insights on how to live life that are a soothing balm to children of the Sick West with senses of humor somewhat intact.

On the east coast of the U.S., the mundane worlds of the Masters of (their imagined) Universe can be seen fairly easily, especially if you wander into places and act like you belong there.

Regarding the kinds of people that instigate the madness you describe above: I recently had the opportunity to visit a very interesting social club that was opened to the public for one day only. Three Ivy league schools I'm sure you've heard of. On the walls upstairs were listed all the latest presidents in different colors, like red for an "H" school: Obama, Clinton, Bush II, Bush I . Kennedy John Quincy Adams, etc. I can't remember Nixon or Carter being there, but I talked to someone who's name is on another wall, and it struck me that members of this club did not hate Trump because of his manners, parents, background, politics, or alleged business acumen. Instead, they hated the fact that his name couldn't be written on their wall. It's really only acceptable to be President if you've been BMOC at Harvard.

Out of nowhere, my gentleman acquaintance brought up the topic of the day: Russia hacking the elections. The more things change, the more they are not the same anymore.

There were pictures of famous football teams from years gone by, the place had a charm but it was shabby, and the ceiling looked like sprayed styrafoam, an aesthetic disgrace that these imaginary jocks failed to appreciate. The drinks, by the way, were terrible. They must make their highballs with Minute Maid. The creativity and intelligence, not to mention taste of the West are surely at a low ebb.

[Feb 17, 2018] A Brief History of the Kremlin Trolls The Vineyard of the Saker

Notable quotes:
"... Out of nowhere, my gentleman acquaintance brought up the topic of the day: Russia hacking the elections. The more things change, the more they are not the same anymore. ..."
Feb 17, 2018 | thesaker.is

Scott on October 17, 2017 · at 3:03 pm UTC

to Mujo

That's what my research is about, despite Ivan Pavlov's defense denying the connection between the Shaltay-Boltay group and former FSB officers convicted for treason. https://en.crimerussia.com/gromkie-dela/defendant-in-high-treason-case-personally-detained-shaltay-boltay-s-leader-/

But that's what a good defense is for, to deny.

Treason is very serious charge that includes working for foreign governments intelligence services. I believe I have enough to prove my point, using, of course, only information openly available on the internet. However, if these people worked for SBU or Mossad, I will write about this, also.

See also, Arrested Russian FSB Agents Allegedly Passed Information to CIA

http://foreignpolicy.com/2017/01/31/arrested-russian-fsb-agents-allegedly-passed-information-to-cia-trump-putin/ https://www.cbsnews.com/news/russia-treason-fsb-spies-kaspersky-labs-us-intelligence-denies-cia-hacking/ https://www.theguardian.com/world/2017/jan/31/russian-cybersecurity-experts-face-treason-charges-cia https://www.usatoday.com/story/news/2017/01/26/report-arrested-russian-intel-officer-allegedly-spied-us/97094696/ https://www.rbth.com/politics_and_society/2017/02/02/fsb-officers-charged-with-treason-media-claim-cia-ties_693641

You wrote "(2) Why did they defect from the FSB to join the CIA? Do we have any insight on this?"

Maybe they defected, or maybe they started working there after being recruited by the foreign intelligence services. We will find out. ­

Mujo on October 18, 2017 , · at 5:58 am UTC

Scott,

Thanks for these follow-up links -- very helpful.

I also found this interview with Alexander Glazastikov (Humpty), which you have probably read:

The only member of Shaltay-Boltay left on the loose reveals details on their work

As described by various media sources, the basic story about Shaltay-Boltay is that they formed in mid-2013 to hack e-mail, social media, and data of officials and businessmen in Russia, and then sold this data for large amounts of money through the digital underground. In particular, this happened through a portal called "Exchange of Information", a kind of anonymous auction site for stolen data. Glazastikov says Shaltay-Boltay "was supposed to be a spokesman for the Anonymous International", and was created by himself, Vladimir Anikeev, and Konstantin Teplyakov.

Although most all of the Western media sources insinuate some connection between Shaltay-Boltay, the FSB officers who were arrested, and the putative "hacking" of the 2016 U.S. election, Glazastikov denies any interest in targets outside Russia.

There is also disagreement around the connection between Shaltay-Boltay and the FSB. Glazastikov says that the FSB contacted him, saying they were aware of Shaltay-Boltay's activity, and wanted to assert "control" and veto power in exchange for not arresting them. Russia Beyond claims that it was Sergei Mikhailov (FSB) who took control of Shaltay-Boltay and "received kickbacks from its founder, Vladimir Anikeyev". However, Glazastikov's testimony contradicts that of Anikeev, his lawyer (Ruslan Koblev), and Ivan Pavlov, lawyer for one of the FSB defendants, all of whom deny any working relationship between Shaltay-Boltay and the FSB.

Interestingly, Glazastikov notes that neither Anikeev nor Teplyakov had technical expertise. Moreover, Glazastikov makes it sound like even he was not primarily involved in hacking, and the "Exchange of Information" admins claim no connection with Shaltay-Boltay. For the heavy lifting, Shaltay-Boltay would use "specialized hacking sites" where they outsourced pay-to-order hacks with IT mercenaries. A target e-mail address could be hacked for a few thousand rubles. And even this, Glazastikov states, wasn't really the original idea for Shaltay-Boltay. Instead, he imagined they would be doing "advertising or administration fee".

Perhaps more significantly, it has more recently been claimed that members of Shaltay-Boltay have admitted to forging some parts of the correspondence that they hacked. The putative aim was to boost the profile of their group.

Reading between the lines of this, I find more support for Scott's angle on this story. Shaltay-Boltay were indeed not hackers in a conventional sense. They were traders in an illicit information economy, and apparently weren't above fabricating that information if it would raise their profile. For the extent and nature of that fabrication, i look forward to Scott's next report!

Internal Exile USA on October 17, 2017 , · at 4:29 pm UTC
This is incredible research, you put most YTube new journalists to shame. I hope this material makes its way into your next book. "Enemy of the State" is an instant classic full of insights on how to live life that are a soothing balm to children of the Sick West with senses of humor somewhat intact.

On the east coast of the U.S., the mundane worlds of the Masters of (their imagined) Universe can be seen fairly easily, especially if you wander into places and act like you belong there.

Regarding the kinds of people that instigate the madness you describe above: I recently had the opportunity to visit a very interesting social club that was opened to the public for one day only. Three Ivy league schools I'm sure you've heard of. On the walls upstairs were listed all the latest presidents in different colors, like red for an "H" school: Obama, Clinton, Bush II, Bush I . Kennedy John Quincy Adams, etc. I can't remember Nixon or Carter being there, but I talked to someone who's name is on another wall, and it struck me that members of this club did not hate Trump because of his manners, parents, background, politics, or alleged business acumen. Instead, they hated the fact that his name couldn't be written on their wall. It's really only acceptable to be President if you've been BMOC at Harvard.

Out of nowhere, my gentleman acquaintance brought up the topic of the day: Russia hacking the elections. The more things change, the more they are not the same anymore.

There were pictures of famous football teams from years gone by, the place had a charm but it was shabby, and the ceiling looked like sprayed styrafoam, an aesthetic disgrace that these imaginary jocks failed to appreciate. The drinks, by the way, were terrible. They must make their highballs with Minute Maid. The creativity and intelligence, not to mention taste of the West are surely at a low ebb.