Softpanorama

Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
May the source be with you, but remember the KISS principle ;-)
Skepticism and critical thinking is not panacea, but can help to understand the world better

Superdelegates fraud at Democratic National Convention

News Neoliberal Brainwashing -- Journalism in the Service of the Powerful Few Recommended Links Demexit US Presidential Elections of 2016 Donald Trump  DNC emails leak: switfboating Bernie Sanders and blaming Vladimir Putin Hillary "Warmonger" Clinton Bernie Sanders
The Iron Law of Oligarchy Amorality and criminality of neoliberal elite The Deep State FBI Mayberry Machiavellians  American Exceptionalism Strzok-gate Nation under attack meme  Audacious Oligarchy and "Democracy for Winners" Pluralism as a myth
Principal-agent problem Corporatist Corruption Predator state Media-Military-Industrial Complex Resurgence of neo-fascism as reaction on neoliberalism Ethno-lingustic Nationalism Corporatism National Security State Neocons
Neoliberalism Media-Military-Industrial Complex "Fuck the EU": State Department neocons show EU its real place US Presidential Elections of 2012 Neocon foreign policy is a disaster for the USA Mayberry Machiavellians Skeptic Quotations Humor Etc

The purpose of superdelegates, according to DNC Chairwoman Debbie Wasserman Schultz, is to suppress grassroots candidates in favor of the establishment choice

It was essentally Hillary "insurance" (along with FBI Mayberry Machiavellians who cleared her from charges connected to her use of provate server).

One in 10 DNC superdelegates were registered lobbyists. ( Washington Examiner)

Nearly one in 10 superdelegates who voted in the Democratic presidential primaries were registered lobbyists, according to a new report, adding some support to Bernie Sanders's claim that "the system is rigged."

At least 63 of 712 superdelegates were registered at some point as lobbyists on the state or federal level, according to an analysis conducted this year by the nonpartisan, nonprofit Sunlight Foundation.

These individuals represented interests that span across big banks, healthcare insurers, the telecommunications industry and unions, including Goldman Sachs and Planned Parenthood.

The list includes former Senate Majority Leader Tom Daschle, who is currently registered for the healthcare insurance company Aetna, former House Minority Leader Richard Gephardt, a registered lobbyist with the Gephardt Group and former DNC General Chairman and Pennsylvania Gov. Ed Rendell, who was registered for Ballard Spahr LLP as recently as 2012.

Sunlight also found an additional 32 individuals it classified as "shadow lobbyists," which it says are superdelegates who "aren't officially registered as lobbyists, but are heavily involved in the influence industry."

This group includes the likes of former Vermont Gov. and DNC Chairman Howard Dean, who is a "senior adviser" for Dentons, a law firm.

While the rules surrounding superdelegates for the next presidential primary will see some changes — with Democrats agreeing to significantly reduce the number of superdelegates not bound by primary voters — critics of superdelegate system have complained that it put the establishment in a position to throw the 2016 Democratic nomination into Hillary Clinton's lap.

More than 600 superdelegates backed the former secretary of state, and in some cases handed her more delegates than Sanders in states where he won a majority of the primary vote. A total of 2,383 delegates were needed to clinch the nomination.

Much of Sanders' 14-month progressive campaign to become the Democratic Party's nominee was spent railing against a political system in which the wealthy and special interests determine the result of the election.

"In the year 2016, with a political campaign finance system that is corrupt and increasingly controlled by billionaires and special interests, I fear very much that, in fact, government of the people, by the people, and for the people is beginning to perish in the United States of America," Sanders said.

The findings of the Sunlight Foundation also show that despite a common refrain from Democrats that Republicans are controlled by lobbyists and special interests, such as the National Rifle Association, when it comes to delegates who are unaccountable to voters, the opposite is true. While the Republican Party does have its own version of superdelegates, they must vote for the candidate that their state's party members picked.

To view the Sunlight Foundation's entire list of lobbyist superdelegates, click here.

Superdelegate - Wikipedia, the free encyclopedia

In American politics, a "superdelegate" is a delegate to the Democratic National Convention that is seated automatically and chooses for whom they want to vote. These Democratic Party superdelegates include distinguished party leaders and elected officials, including all Democratic members of the House and Senate and sitting Democratic governors. Other superdelegates are chosen during the primary season. Democratic superdelegates are free to support any candidate for the nomination.

This contrasts with convention "pledged" delegates that are selected based on the party primaries and caucuses in each U.S. state, in which voters choose among candidates for the party's presidential nomination. Because they are free to support anyone they want, superdelegates could potentially swing the results to nominate a presidential candidate that did not receive the majority of votes during the primaries.

At least in name, superdelegates are not involved in the Republican Party nomination process. There are delegates to the Republican National Convention that are seated automatically, but they are limited to three per state, consisting of the state chairsperson and two district-level committee members. Republican Party superdelegates are obliged to vote for their state's popular vote winner under the rules of the party branch to which they belong.[1]

Although the term superdelegate was originally coined and created to describe a type of Democratic delegate, the term has become widely used to describe these delegates in both parties,[2] even though it is not an official term used by either party.

... ... ...

For Democrats, superdelegates fall into two categories:

For Republicans, there are delegates in each state, consisting of the state chairman and two RNC committee members. However, according to the RNC communications director Sean Spicer, convention rules obligate those RNC members to vote according to the result of primary elections held in their states.

... ... ...

Democratic Party rules distinguish pledged and unpledged delegates. Pledged delegates are selected based on their announced preferences in the contest for the presidential nomination. In the party primary elections and caucuses in each U.S. state, voters express their preference among the contenders for the party's nomination for President of the United States. Pledged delegates supporting each candidate are chosen in approximate ratio to their candidate’s share of the vote. They fall into three categories: district-level pledged delegates (usually by congressional districts);[4] at-large pledged delegates; and pledged PLEO (Party Leaders and Elected Officials) delegates.

In a minority of the states, delegates are legally required to support the candidate to whom they are pledged.[5] In addition to the states' requirements, the party rules state (Rule 12.J): "Delegates elected to the national convention pledged to a presidential candidate shall in all good conscience reflect the sentiments of those who elected them."[3]

By contrast, the unpledged PLEO delegates (Rule 9.A) are seated without regard to their presidential preferences, solely by virtue of being current or former elected officeholders and party officials. Many of them have chosen to announce endorsements, but they are not bound in any way. They may support any candidate they wish, including one who has dropped out of the presidential race.[6] The other superdelegates, the unpledged add-on delegates (Rule 9.B), who need not be PLEOs, are selected by the state parties after some of the pledged delegates are chosen,[3] but they resemble the unpledged PLEO delegates in being free to vote as they wish.

... ... ...

At the 2008 Democratic National Convention, superdelegates cast approximately 823.5 votes, with fractions arising because superdelegates from Michigan, Florida, and Democrats Abroad are entitled to half a vote each. Of the superdelegates' votes, 745 are from unpledged PLEO delegates and 78.5 are from unpledged add-on delegates, although the exact number in each category is subject to events.


Top Visited
Switchboard
Latest
Past week
Past month

NEWS CONTENTS

Old News ;-)

[Dec 22, 2019] Maybe they were worried someone had bear spray in their purse of backpack, when Fancy Bear and Cozy Bear showed and put their paw prints on the DNC computers.

Dec 22, 2019 | turcopolier.typepad.com

akaPatience , 20 December 2019 at 05:57 PM

SO, to assist Crowdstrike's efforts, "On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office."

Was this typical protocol when it comes to investigating possible hacking or were they looking for a leaker?

Factotum said in reply to akaPatience ... , 20 December 2019 at 07:11 PM
Maybe they were worried someone had bear spray in their purse of backpack, when Fancy Bear and Cozy Bear showed and put their paw prints on the DNC computers.
The Twisted Genius -> akaPatience ... , 20 December 2019 at 09:23 PM
AkaPatience, that is exactly how it is done. Once the decision is made to totally clean the network, it has to be done to EVERY computer and device on the network. Hackers leave dormant code throughout the network that allows them to reenter the network after they are booted out.
akaPatience -> The Twisted Genius ... , 20 December 2019 at 10:37 PM
Thank you. I suspected you would answer my question!
JamesT -> The Twisted Genius ... , 21 December 2019 at 10:39 PM
TTG,

I don't know if you care to comment on this, but I met a marine 10 years ago who talked about how he was administrating Windows Server when he was in the corps. I was flabbergasted. I don't understand why more effort has not been put into running a secure OS - something with a microkernel architecture and an application stack and GUI fully locked down with Mandatory Access Control . I presume that the assumption is that any advances we make will be quickly matched by Iran, Russia, and China, and that leadership is more interested in offence than defence.

[Dec 22, 2019] Gussifer 2.0 released nothing remotely damaging to the DNC and is arguably US based (timestamps), and is either CIA or Crowdstrike.

Dec 22, 2019 | turcopolier.typepad.com

Ed Snack , 21 December 2019 at 01:41 PM

Other points to note:

1.

Ed Snack , 20 December 2019 at 10:56 PM
Other points to note:

1. G2 released nothing remotely damaging to the DNC, the first document was even the DNC's oppo file on DJT
2. G2 did some copying and compress/decompress on files. Imbedded timestamps strongly suggest a US Timezone location
3. G2 released some files claiming to be from the DNC, but which demonstrably came from John Podesta's account
4. G2 did not claim to be involved with the Podesta account, which was phished and not hacked as such
5. As an aside, both the Fancy and Cosy Bear packages had been available for third parties to obtain since 2013-4 or so. So their use is not proof of Russian involvement. One or other has been used in bank exploits before 2016.

I believe that G2 is arguably US based (the timestamps are reasonably conclusive), and is either CIA or Crowdstrike. The existence of G2 is a diversionary one to strengthen the case for blaming the Russians. It may be connected to wanting to divert attention from Seth Rich and his subsequent murder, but may not be - that is Seth Rich's death may be just an unfortunate coincidence, we have inadequate information to conclude either way.

[Dec 22, 2019] So US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks. That's when the stratagem of attributing the impending Wikileaks release to a Russian hack was born -- distracting from the incriminating content of the emails, while vilifying the Deep State's favorite enemies, Assange and Russia, all in one neat scam

Highly recommended!
Looks like Brennan ears are all over this false flag operation...
Dec 22, 2019 | turcopolier.typepad.com

Mark McCarty , 21 December 2019 at 02:34 PM

Here's a key point - on June 12, Assange announces that Wikileaks will soon be releasing info pertinent to Hillary. HE DOES NOT SAY THAT HE WILL BE RELEASING DNC EMAILS.

And yet, on June 14, Crowdstrike reports a Russian hack of the DNC servers - and a day later, Guccifer 2.0 emerges and proclaims himself to be the hacker, takes credit for the upcoming Wikileaks DNC releases, publishes the Trump oppo research which Crowdstrike claimed he had taken, and intentionally adds "Russian footprints" to his metadata.

So how did Crowdstrike and G2.0 know that DNC EMAILS would be released?

Because, as Larry postulates, the US intelligence community had intercepted communications between Seth Rich and Wikileaks in which Seth had offered the DNC emails (consistent with the report of Sy Hersh's source within the FBI).

So US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks.

That's when the stratagem of attributing the impending Wikileaks release to a Russian hack was born - distracting from the incriminating content of the emails, while vilifying the Deep State's favorite enemies, Assange and Russia, all in one neat scam.

[Dec 20, 2019] Did John Brennan's CIA Create Guccifer 2.0 and DCLeaks by Larry C Johnson

Highly recommended!
Gossufer2.0 and CrowdStrike are the weakest links in this sordid story. CrowdStrike was nothing but FBI/CIA contractor.
So the hypothesis that CrowdStrike employees implanted malware to implicate Russians and created fake Gussifer 2.0 personality is pretty logical.
Notable quotes:
"... Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU--Guccifer 2.0 persona and DCLeaks.com. Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of then CIA Director John Brennan ..."
"... In October 2015 John Brennan reorganized the CIA . As part of that reorganization he created a new directorate--DIRECTORATE OF DIGITAL INNOVATION. Its mission was to "manipulate digital footprints." In other words, this was the Directorate that did the work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust. ..."
"... We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it appear like it was done by a foreign entity. Wikipedia describes the Vault 7 documents : ..."
"... Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside the file shows it was last edited by someone using the computer name "Феликс Эдмундович." That means the computer was configured to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, "Феликс Эдмундович" is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.) ..."
"... Why would the CIA do this? The CIA knew that Podesta's emails had been hacked and were circulating on the internet. But they had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA. ..."
"... The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich. Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign, would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia. ..."
"... The only source for the claim that Russia hacked the DNC is a private cyber security firm, CrowdStrike. ..."
"... Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch, but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June. That is 34 days of inexcusable inaction. ..."
"... The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham's team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham should be looking into as a potential act of "Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU. ..."
"... LJ bottom line: "The only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU." ..."
"... ICA which seemed to have been framed to allow journalists or the unwary to link the ICA with more rigorous standards used by more authentic assessments? ..."
"... With the Russians not having the advantages that the NSA does (back doors in all US-designed network hardware/software and taps all over the internet), would Russia reveal anything unless it involved an immediate major national security threat. I doubt that would cover Trump. ..."
Dec 20, 2019 | turcopolier.typepad.com

Special Counsel Robert Mueller's report insists that Guccifer 2.0 and DCLeaks were created by Russia's military intelligence organization, the GRU, as part of a Russian plot to meddle in the U.S. 2016 Presidential Election. But this is a lie. Guccifer 2.0 and DCLeaks were created by Brennan's CIA and this action by the CIA should be a target of U.S. Attorney John Durham's investigation. Let me explain why.

Let us start with the January 2017 Intelligence Community Assessment aka ICA. Only three agencies of the 17 in the U.S. intelligence community contributed to and coordinated on the ICA--the FBI, the CIA and NSA. In the preamble to the ICA, you can read the following explanation about methodology:

When Intelligence Community analysts use words such as "we assess" or "we judge," they are conveying an analytic assessment or judgment

To be clear, the phrase,"We assess", is intel community jargon for "opinion". If there was actual evidence or source material for a judgment the writer of the assessment would state, "According to a reliable source" or "knowledgeable source" or "documentary evidence."

Pay close attention to what the analysts writing the ICA stated about the GRU and Guccifer 2.0 and DCLeaks:

We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data obtained in cyber operations publicly and in exclusives to media outlets.

We assess with high confidence that the GRU relayed material it acquired from the DNC and senior Democratic officials to WikiLeaks. Moscow most likely chose WikiLeaks because of its self-proclaimed reputation for authenticity. Disclosures through WikiLeaks did not contain any evident forgeries.

Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU--Guccifer 2.0 persona and DCLeaks.com. Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of then CIA Director John Brennan.

Here's Mueller's take (I apologize for the lengthy quote but it is important that you read how the Mueller team presents this):

DCLeaks

"The GRU began planning the releases at least as early as April 19, 2016, when Unit 26165 registered the domain dcleaks.com through a service that anonymized the registrant.137 Unit 26165 paid for the registration using a pool of bitcoin that it had mined.138 The dcleaks.com landing page pointed to different tranches of stolen documents, arranged by victim or subject matter. Other dcleaks.com pages contained indexes of the stolen emails that were being released (bearing the sender, recipient, and date of the email). To control access and the timing of releases, pages were sometimes password-protected for a period of time and later made unrestricted to the public.


Starting in June 2016, the GRU posted stolen documents onto the website dcleaks.com, including documents stolen from a number of individuals associated with the Clinton Campaign. These documents appeared to have originated from personal email accounts (in particular, Google and Microsoft accounts), rather than the DNC and DCCC computer networks. DCLeaks victims included an advisor to the Clinton Campaign, a former DNC employee and Clinton Campaign employee, and four other campaign volunteers.139 The GRU released through dcleaks.com thousands of documents, including personal identifying and financial information, internal correspondence related to the"Clinton Campaign and prior political jobs, and fundraising files and information.140


GRU officers operated a Facebook page under the DCLeaks moniker, which they primarily used to promote releases of materials.141 The Facebook page was administered through a small number of preexisting GRU-controlled Facebook accounts.142


GRU officers also used the DCLeaks Facebook account, the Twitter account @dcleaks__, and the email account dcleaksproject@gmail.com to communicate privately with reporters and other U.S. persons. GRU officers using the DCLeaks persona gave certain reporters early access to archives of leaked files by sending them links and passwords to pages on the dcleaks.com website that had not yet become public. For example, on July 14, 2016, GRU officers operating under the DCLeaks persona sent a link and password for a non-public DCLeaks webpage to a U.S. reporter via the Facebook account.143 Similarly, on September 14, 2016, GRU officers sent reporters Twitter direct messages from @dcleaks_, with a password to another non-public part of the dcleaks.com website.144


The dcleaks.com website remained operational and public until March 2017."

Guccifer 2.0

On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents. In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as "Fancy Bear") were responsible for the breach.145 Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona Guccifer 2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into a Moscow-based server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including "some hundred sheets," "illuminati," and "worldwide known." Approximately two hours after the last of those searches, Guccifer 2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that the GRU officers had searched for that day.146

That same day, June 15, 2016, the GRU also used the Guccifer 2.0 WordPress blog to begin releasing to the public documents stolen from the DNC and DCCC computer networks.

The Guccifer 2.0 persona ultimately released thousands of documents stolen from the DNC and DCCC in a series of blog posts between June 15, 2016 and October 18, 2016.147 Released documents included opposition research performed by the DNC (including a memorandum analyzing potential criticisms of candidate Trump), internal policy documents (such as recommendations on how to address politically sensitive issues), analyses of specific congressional races, and fundraising documents. Releases were organized around thematic issues, such as specific states (e.g., Florida and Pennsylvania) that were perceived as competitive in the 2016 U.S. presidential election.

Beginning in late June 2016, the GRU also used the Guccifer 2.0 persona to release documents directly to reporters and other interested individuals. Specifically, on June 27, 2016, Guccifer 2.0 sent an email to the news outlet The Smoking Gun offering to provide "exclusive access to some leaked emails linked [to] Hillary Clinton's staff."148 The GRU later sent the reporter a password and link to a locked portion of the dcleaks.com website that contained an archive of emails stolen by Unit 26165 from a Clinton Campaign volunteer in March 2016.149 "That the Guccifer 2.0 persona provided reporters access to a restricted portion of the DCLeaks website tends to indicate that both personas were operated by the same or a closely-related group of people.150

The GRU continued its release efforts through Guccifer 2.0 into August 2016. For example, on August 15, 2016, the Guccifer 2.0 persona sent a candidate for the U.S. Congress documents related to the candidate's opponent.151 On August 22, 2016, the Guccifer 2.0 persona transferred approximately 2.5 gigabytes of Florida-related data stolen from the DCCC to a U.S. blogger covering Florida politics.152 On August 22, 2016, the Guccifer 2.0 persona sent a U.S. reporter documents stolen from the DCCC pertaining to the Black Lives Matter movement.153"

Wow. Sounds pretty convincing. The documents referencing communications by DCLeaks or Guccifer 2.0 with Wikileaks are real. What is not true is that these entities were GRU assets.

In October 2015 John Brennan reorganized the CIA . As part of that reorganization he created a new directorate--DIRECTORATE OF DIGITAL INNOVATION. Its mission was to "manipulate digital footprints." In other words, this was the Directorate that did the work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust.

We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it appear like it was done by a foreign entity. Wikipedia describes the Vault 7 documents :

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States' Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs,[1] web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA),[2][3][4] and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux[5][6

One of the tools in Vault 7 carries the innocuous name, MARBLE. Hackernews explains the purpose and function of MARBLE:

Dubbed "Marble," the part 3 of CIA files contains 676 source code files of a secret anti-forensic Marble Framework, which is basically an obfuscator or a packer used to hide the true source of CIA malware.
The CIA's Marble Framework tool includes a variety of different algorithm with foreign language text intentionally inserted into the malware source code to fool security analysts and falsely attribute attacks to the wrong nation.

Marble is used to hamper[ing] forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA," says the whistleblowing site.

"...for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion," WikiLeaks explains.

So guess what gullible techies "discovered" in mid-June 2016? The meta data in the Guccifer 2.0 communications had "Russian fingerprints."

We still don't know who he is or whether he works for the Russian government, but one thing is for sure: Guccifer 2.0 -- the nom de guerre of the person claiming he hacked the Democratic National Committee and published hundreds of pages that appeared to prove it -- left behind fingerprints implicating a Russian-speaking person with a nostalgia for the country's lost Soviet era.

Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside the file shows it was last edited by someone using the computer name "Феликс Эдмундович." That means the computer was configured to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, "Феликс Эдмундович" is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.)

Just use your common sense. If the Russians were really trying to carry out a covert cyberattack, do you really think they are so sloppy and incompetent to insert the name of the creator of the Soviet secret police in the metadata? No. The Russians are not clowns. This was a clumsy attempt to frame the Russians.

Why would the CIA do this? The CIA knew that Podesta's emails had been hacked and were circulating on the internet. But they had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA.

The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich. Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign, would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia.

It is essential to recall the timeline of the alleged Russian intrusion into the DNC network. The only source for the claim that Russia hacked the DNC is a private cyber security firm, CrowdStrike. Here is the timeline for the DNC "hack."

Here are the facts on the public record. They are at odds with the claims of the Intelligence Community:

  1. It was 29 April 2016 , when the DNC claims it became aware its servers had been penetrated. No claim yet about who was responsible. And no claim that there had been a prior warning by the FBI of a penetration of the DNC by Russian military intelligence.
  2. According to CrowdStrike founder , Dimitri Alperovitch, his company first supposedly detected the Russians mucking around inside the DNC server on 6 May 2016. A CrowdStrike intelligence analyst reportedly told Alperovitch that:
    • Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
  3. The Wikileaks data shows that the last message copied from the DNC network is dated Wed, 25 May 2016 08:48:35.
  4. 10 June 2016 --CrowdStrike waited until 10 June 2016 to take concrete steps to clean up the DNC network. Alperovitch told Esquire's Vicky Ward that: 'Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office."
  5. On June 14, 2016 , Ellen Nakamura, a Washington Post reporter who had been briefed by computer security company hired by the DNC -- Crowdstrike--, wrote:
    • Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.
    • The intruders so thoroughly compromised the DNC's system that they also were able to read all email and chat traffic, said DNC officials and the security experts.
    • The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available.
  6. 15 June, 2016 , an internet "personality" self-described as Guccifer 2.0 surfaces and claims to be responsible for the hacks but denies being Russian. The people/entity behind Guccifer 2.0:

The only thing that the Guccifer 2.0 character did not do to declare its Russian heritage was to take out full page ads in the New York Times and Washington Post. But the "forensic" fingerprints that Guccifer 2.0 was leaving behind is not the only inexplicable event.

Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch, but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June. That is 34 days of inexcusable inaction.

It is only AFTER Julian Assange announces on 12 June 2016 that WikiLeaks has emails relating to Hillary Clinton that DCLeaks or Guccifer 2.0 try to contact Assange.

The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham's team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham should be looking into as a potential act of "Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU.

Posted at 02:13 PM in Larry Johnson , Russiagate | Permalink


Factotum , 20 December 2019 at 02:45 PM

LJ bottom line: "The only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU."
Paul Damascene , 20 December 2019 at 02:54 PM
Larry, thanks -- vital clarifications and reminders. In your earlier presentation of this material did you not also distinguish between the way actually interagency assessments are titled, and ICA which seemed to have been framed to allow journalists or the unwary to link the ICA with more rigorous standards used by more authentic assessments?
walrus , 20 December 2019 at 03:51 PM
Thank you Larry. You have discovered one more vital key to the conspiracy. We now need the evidence of Julian Assange. He is kept incommunicado and He is being tortured by the British in jail and will be murdered by the American judicial system if he lasts long enough to be extradited.

You can be sure he will be "Epsteined" before he appears in open court because he knows the source of what Wikileaks published. Once he is gone, mother Clinton is in the clear.

Ghost Ship , 20 December 2019 at 04:04 PM
I can understand the GRU or SVR hacking the DNC and other e-mail servers because as intelligence services that is their job, but can anyone think of any examples of Russia (or the Soviet Union) using such information to take overt action?

With the Russians not having the advantages that the NSA does (back doors in all US-designed network hardware/software and taps all over the internet), would Russia reveal anything unless it involved an immediate major national security threat. I doubt that would cover Trump.

[Dec 20, 2019] NSA Whistleblower: "Mueller Report based on fabricated evidence" Former NSA technical chief, Bill Binney, says it looked like the CIA did this, and made it look like the Russians were doing the hack to implicate Russians by Eric Zuesse

Highly recommended!
Looks like CrowdStrike was was to plant the evidence of the Russian hack
Notable quotes:
"... All the evidence we're accumulating clearly says and implies, the US government -- namely the FBI, CIA, the DOJ, and of course State Department -- all these people involved in this hack, bought a dossier and all of the information going forward to the FISA court. ..."
"... All of them knew that this was a fake from the very beginning, because this Guccifer 2.0 character was fabricating it. They were using him plus the Internet Research Agency [IRA] as "supposed trolls of the Russian government". ..."
"... Well, when they sent their lawyers over to challenge that in a court of law, the government failed to prove they had any connection with the Russian government. ..."
"... Then the entire Rosenstein indictment is also a fabrication and a fake and a fraud for the same reasons. The judges seem to be involved in trying to keep this information out of the public domain. ..."
Dec 18, 2019 | off-guardian.org

Larry Johnson & Bill Binney Helping the President Dismantle the Empire - YouTube

Streamed live on Dec 12, 2019

On December 12th, the retired NSA whistleblower and former Technical Director of the NS A, Bill Binney asserted (at 39:00-44:00 in the above video):

BILL BINNEY: I basically have always been saying that all of this Russian hack never happened, but we have some more evidence coming out recently.

We haven't published it yet, but what we have seen is that there are at least five items that we've found that were produced by Guccifer 2.0 back on June 15th, where they had the Russian fingerprints in them, suggesting the Russians made the hack. Well, we found the same five items published by Wikileaks in the Podesta emails.

Those items do not have the Russian fingerprints, which directly implies that Guccifer 2.0 was inserting these into the files to make it look like the Russians did this hack. Taking that into account with all the other evidence we have; like the download speeds from Guccifer 2.0 were too fast, and they couldn't be managed by the web.

And that the files he was putting together and saying that he actually hacked, the two files he said he had were really one file, and he was playing with the data; moving it to two different files to claim two hacks.

Taking that into account with the fabrication of the Russian fingerprints, it leads us back to inferring that in fact the marble framework out of the Vault 7 compromise of CIA hacking routines was a possible user in this case.

In other words, it looked like the CIA did this, and that it was a matter of the CIA making it look like the Russians were doing the hack. So, when you look at that and also look at the DNC emails that were published by Wikileaks that have this phat file format in them, all 35,813 of these emails have rounded off times to the nearest even second.

That's a phat file format property; that argues that those files were, in fact, downloaded to a thumb drive or CD-rom and physically transported before Wikileaks posted them. Which again argues that it wasn't a hack.

So, all of the evidence we're finding is clearly evidence that the Russians were not in fact hacking; it was probably our own people. It's very hard for us to get this kind of information out. The mainstream media won't cover it; none of them will. It's very hard. We get some bloggers to do that and some radio shows.

Also, I put all of this into a sworn affidavit in the Roger Stone case. I did that because all of the attack on him was predicated on him being connected with this Russian hack which was false to being with.

All the evidence we're accumulating clearly says and implies, the US government -- namely the FBI, CIA, the DOJ, and of course State Department -- all these people involved in this hack, bought a dossier and all of the information going forward to the FISA court.

All of them knew that this was a fake from the very beginning, because this Guccifer 2.0 character was fabricating it. They were using him plus the Internet Research Agency [IRA] as "supposed trolls of the Russian government".

Well, when they sent their lawyers over to challenge that in a court of law, the government failed to prove they had any connection with the Russian government.

They basically were chastised by the judge for fabricating a charge against this company. So, if you take the IRA and the trolls away from that argument, and Guccifer 2.0, then the entire Mueller report is a provable fabrication; because it's based on Guccifer 2.0 and the IRA.

Then the entire Rosenstein indictment is also a fabrication and a fake and a fraud for the same reasons. The judges seem to be involved in trying to keep this information out of the public domain.

So, we have a really extensive shadow government here at work, trying to keep the understanding and knowledge of what's really happening away from the public of the United States. That's the really bad part. And the mainstream media is a participant in this; they're culpable.

The CIA-edited and written Wikipedia, in its article about Binney , accuses him by saying:

His dissent from the consensus view that Russia interfered with the 2016 US election appears to be based on Russian disinformation."

They provide no footnote or linked-to source for their allegation

Ever since Binney went public criticizing U.S. intelligence agencies, they have been trying to discredit him.

Thus far, however, their efforts have been nothing more than insinuations against his person, without any specific allegation of counter-evidence that discredits any of his actual assertions.


Martin Usher ,

The "Russia" thing was never able to differentiate between "Russians" and "the Russian state". Its a product of a Cold War mindset that can't conceive of that country without it being 150 million puppets all controlled by string from an office in the Kremlin. In reality its just another country, one that offers goods and services to the world just like anywhere else. So while we just assume that a company like SCL (Cambridge Analytica's parent) would have personnel from and offices in many countries and have contracts with various political parties in many countries we just can't seem to get our heads around the idea that a company operating inside -- or even headquartered -- in Russia isn't automatically some kind of Kremlin front. (Well, yes, it could be but the same way that a company in the UK could be a front for the UK government, e.g. the Gateside Mill story in Scotland's Daily Record).

Another factor that might come into play is the idea that 'analytics', the key to business on the Internet, is actually nothing more than a sophisticated form of traffic analysis, a well known espionage tool. Any government worth its salt that's likely to be on the receiving end of a propaganda campaign would be very interested in understanding the reach of such a tool and learning how to manage that reach. So its possible that if we find the Russian government taking out advertisements on Facebook through a front company to 'influence' people its likely that they're more interested in evaluating that reach than the simplistic view that they're 'trying to influence an election' (its not as if foreign interests or even governments ever try to influence elections)(color revolution, anyone?). Allowing unfettered access by these tools to one's nation is a bit like taking down one's defenses -- fine if you're happy with vassal state ("ally") status but not if you're potentially an adversary -- so its important to know how to control it, no less important than having a decent air defense system.

RobG ,

And in a further retort to all this nonsense, Harold Wilson, the last socialist leader of the Labour Party back in the 1970s, won four general elections, a feat that's never been repeated by any party leader.

Here's the Wiki nonsense/propaganda

https://en.wikipedia.org/wiki/Harold_Wilson

And here's a more historical record

https://www.gov.uk/government/history/past-prime-ministers/harold-wilson

This does directly relate to this thread, because the Americans overthrew Wilson. Just as they have done now with Corbyn. You really need to take your country back, whether you're a Brit or American.

paul ,

We are fortunate that there are still persons of integrity even in the spook organisations – Binney, Kyriakou, Manning, Snowden. Without them and Assange a lot of this criminality would never have seen the light of day.

Jack_Garbo ,

Diagnosing the disease does not imply the cure has been found. You simply know how much sicker you are. Not helpful. Nothing has changed despite all the revelations of intelligence shenanigans. Apologies do not cure the patient when they're still spreading the disease. In fact, the opposite.

paul ,

Wikipedia holds out the begging bowl to anybody who uses it now. I don't know why – they get plenty of CIA and Soros money.

RobG ,

All they've got to do now is wheel out the psychopath and war criminal, Tony Blair, to say: "it's the Russians wot dunnit".

Oh my God

Jen ,

They don't need to, they have Tony Blair's fellow Brit psycho Boris Johnson to go on autopilot and blame the Russians the moment something happens and just before London Met start their investigations.

ZigZagWanderer ,

@ 1.15.58 "Intelligence community has become a self licking ice cream cone"

Larry Johnson and Bill Binney always worth listening to. Try to find the time.

Antonym ,

True except for Trump. Just look how hard deep state tries to unseat him.
Damaging your own puppet is not normal for a puppeteer.

J_Garbo ,

I suspected that Deep State has at least two opposing factions. The Realistists want him to break up the empire, turn back into a republic; the Delusionals want to extend the empire, continue to exploit and destroy the world. If so, the contradictions, reversals, incoherence make sense. IMO as I said.

Gary Weglarz ,

I predict that all Western MSM will begin to accurately and vocally cover Mr. Binney's findings about this odious and treasonous U.S. government psyop at just about the exact time that – "hell freezes over" – as they say.

Thanks for posting this latest info.

[Dec 06, 2019] There is a 15% minimum threshold to receive any delegates. Those not receiving the minimum are excluded, with the delegate pool divided proportionately among those candidates receiving 15% or more.

Dec 06, 2019 | www.nakedcapitalism.com

Fiery Hunt , December 5, 2019 at 3:06 pm

Hey NCers I've got a question.

Does anyone know how the delegates are allocated based on the 15% threshold?

For example, today's CA poll has Sanders at leading with 24% and Warren the only other candidate above 15% (at 22%).
My preliminary search says if you get x% of the vote, you get x number of delegates .

So what happens to the 56% of delegates that correspond to votes for people other than Sanders and Warren? Or do Sanders and Warren split them somehow?

Fiery Hunt , December 5, 2019 at 3:16 pm

Nevermind I found it.

https://www.270towin.com/content/thresholds-for-delegate-allocation-2020-democratic-primary-and-caucus

[Dec 04, 2019] The central question of Ukrainegate is whether CrowdStrike actions on DNC leak were a false flag operation designed to open Russiagate and what was the level of participation of Poroshenko government and Ukrainian Security services in this false flag operation by Factotum

Highly recommended!
Highly recommended !
Republicans are afraid to raise this key question. Democrats are afraid of even mentioning CrowdStrike in Ukrainegate hearings. The Deep State wants to suppress this matter entirely.
Alperovisch connections to Ukraine and his Russophobia are well known. Did Alperovich people played the role of "Fancy Bear"? Or Ukrainian SBU was engaged? George Eliason clams that "I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators." ... "Since there is so much crap surrounding the supposed hack such as law enforcement teams never examining the DNC server or maintaining control of it as evidence, could the hacks have been a cover-up?"
Notable quotes:
"... So far at least I cannot rule out the possibility that that this could have involved an actual 'false flag' hack. A possible calculation would have been that this could have made it easier for Alperovitch and 'CrowdStrike', if more people had asked serious questions about the evidence they claimed supported the 'narrative' of GRU responsibility. ..."
"... What she suggested was that the FBI had found evidence, after his death, of a hack of Rich's laptop, designed as part of a 'false flag' operation. ..."
"... On this, see his 8 October, 'Motion for Discovery and Motion to Accept Supplemental Evidence' in Clevenger's own case against the DOJ, document 44 on the relevant 'Courtlistener' pages, and his 'Unopposed Motion for Stay', document 48. Both are short, and available without a 'PACER' subscription, and should be compulsory reading for anyone seriously interested in ascertaining the truth about 'Russiagate.' (See https://www.courtlistener.com/docket/6775665/clevenger-v-us-department-of-justice/ .) ..."
"... And here, is is also material that he may have had more than one laptop, that 'hard drives' can be changed, and that the level of computer skills that can be found throughout the former Soviet Union is very high. Another matter of some importance is that Ed Butowsky's 'Debunking Rod Wheeler's Claims' site is back up online. (See http://debunkingrodwheelersclaims.net ) ..."
"... The question of whether the 'timeline' produced by Hersh's FBI informant was accurate, or a deliberate attempt to disguise the fact that all kinds of people were well aware of Rich's involvement before his murder, and well aware of the fact of a leak before he was identified as its source, is absolutely central to how one interprets 'Russiagate.' ..."
"... Why did Crowdstrike conclude it was a "Russian breach", when other evidence does show it was an internal download. What was Crowdstrike's method and motivation to reach the "Russian" conclusion instead. Why has that methodology been sealed? ..."
"... Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers. ..."
"... What were the relationships between Crowdstrike, DNC, FBI and the Mueller team that conspired to reach this Russian conclusion. ..."
"... Why did the Roger Stone judge, who just sent Stone away for life, refuse Stone's evidentiary demand to ascertain how exactly Crowdstrike reached its Russsian hacking conclusion, that the court then linked to Stone allegedly lying about this Russian link ..."
"... Indeed, let's set out with full transparency the Ukraine -- Crowsdtrike player links and loyalties to see if there are any smoking guns yet undisclosed. Trump was asking for more information about Crowdstrike like a good lawyer - never ask a question when you don't already know the right answer. Crowdstrike is owned by a Ukrainian by birth ..."
"... Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike. ..."
"... In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives. ..."
"... His role in what we may define as "converting DNC leak into DNC hack" (I would agree with you that this probably was a false flag operation), which was supposedly designed to implicated Russians, and possibly involved Ukrainian security services, is very suspicious indeed. ..."
"... Mueller treatment of Crowdstrike with "kid gloves" may suggest that Alperovich actions were part of a larger scheme. After all Crowdstike was a FBI contactor at the time. ..."
Dec 04, 2019 | turcopolier.typepad.com

Originally from: The Intelligence Whistleblower protection Act did not apply to the phone call ... Reposted - Sic Semper Tyrannis


Factotum , 20 November 2019 at 01:02 PM

The favor was for Ukraine to investigate Crowdstrike and the 2016 DNC computer breach.

Reliance on Crowdstrike to investigate the DNC computer, and not an independent FBI investigation, was tied very closely to the years long anti-Trump Russiagate hoax and waste of US taxpayer time and money.

Why is this issue ignored by both the media and the Democrats. The ladies doth protest far too much.

vig -> Factotum... , 21 November 2019 at 11:00 AM
what exactly, to the extend I recall, could the Ukraine contribute the the DNC's server/"fake malware" troubles? Beyond, that I seem to vaguely recall, the supposed malware was distributed via an Ukrainan address.

On the other hand, there seems to be the (consensus here?) argument there was no malware breach at all, simply an insider copying files on a USB stick.

It seems to either or. No?

What basics am I missing?

David Habakkuk -> vig... , 21 November 2019 at 12:53 PM
vig,

There is no reason why it should be 'either/or'.

If people discovered there had been a leak, it would perfectly natural that in order to give 'resilience' to their cover-up strategies, they could have organised a planting of evidence on the servers, in conjunction with elements in Ukraine.

So far at least I cannot rule out the possibility that that this could have involved an actual 'false flag' hack. A possible calculation would have been that this could have made it easier for Alperovitch and 'CrowdStrike', if more people had asked serious questions about the evidence they claimed supported the 'narrative' of GRU responsibility.

The issues involved become all the more important, in the light of the progress of Ty Clevenger's attempts to exploit the clear contradiction between the claims by the FBI, in response to FOIA requests, to have no evidence relating to Seth Rich, and the remarks by Ms. Deborah Sines quoted by Michael Isikoff.

What she suggested was that the FBI had found evidence, after his death, of a hack of Rich's laptop, designed as part of a 'false flag' operation.

On this, see his 8 October, 'Motion for Discovery and Motion to Accept Supplemental Evidence' in Clevenger's own case against the DOJ, document 44 on the relevant 'Courtlistener' pages, and his 'Unopposed Motion for Stay', document 48. Both are short, and available without a 'PACER' subscription, and should be compulsory reading for anyone seriously interested in ascertaining the truth about 'Russiagate.' (See https://www.courtlistener.com/docket/6775665/clevenger-v-us-department-of-justice/ .)

It is eminently possible that Ms. Hines has simply made an 'unforced error.'

However, I do not – yet – feel able totally to discount the possibility that what is actually at issue is a 'ruse', produced as a contingency plan to ensure that if it becomes impossible to maintain the cover-up over Rich's involvement in its original form, his laptop shows 'evidence' compatible with the 'Russiagate' narrative.

And here, is is also material that he may have had more than one laptop, that 'hard drives' can be changed, and that the level of computer skills that can be found throughout the former Soviet Union is very high. Another matter of some importance is that Ed Butowsky's 'Debunking Rod Wheeler's Claims' site is back up online. (See http://debunkingrodwheelersclaims.net )

Looking at it from the perspective of an old television current affairs hack, I do think that, while it is very helpful to have some key material available in a single place, it would useful if more attention was paid to presentation.

In particular, it would be a most helpful 'teaching aid', if a full and accurate transcript was made of the conversation with Seymour Hersh which Ed Butowsky covertly recorded. What seems clear is that both these figures ended up in very difficult positions, and that the latter clearly engaged in 'sleight of hand' in relation to his dealings with the former. That said, the fact that Butowsky's claims about his grounds for believing that Hersh's FBI informant was Andrew McCabe are clearly disingenuous does not justify the conclusion that he is wrong.

It is absolutely clear to me – despite what 'TTG', following that 'Grub Street' hack Folkenflik, claimed – that when Hersh talked to Butowsky, he believed he had been given accurate information. Indeed, I have difficulty seeing how anyone whose eyes were not hopelessly blinded by prejudice, a\nd possibly fear of where a quest for the truth might lead, could not see that, in this conversation, both men were telling the truth, as they saw it.

However, all of us, including the finest and most honourable of journalists can, from time to time, fall for disinformation. (If anyone says they can always spot when they are being played, all I can say is, if you're right, you're clearly Superman, but it is more likely that you are a fool or knave, if not both.)

The question of whether the 'timeline' produced by Hersh's FBI informant was accurate, or a deliberate attempt to disguise the fact that all kinds of people were well aware of Rich's involvement before his murder, and well aware of the fact of a leak before he was identified as its source, is absolutely central to how one interprets 'Russiagate.'

Factotum -> vig... , 21 November 2019 at 01:45 PM
Several loose end issues about Crowdstrike:

1. Why did Crowdstrike conclude it was a "Russian breach", when other evidence does show it was an internal download. What was Crowdstrike's method and motivation to reach the "Russian" conclusion instead. Why has that methodology been sealed?

2. Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers.

3. What were the relationships between Crowdstrike, DNC, FBI and the Mueller team that conspired to reach this Russian conclusion.

4. Why did the Roger Stone judge, who just sent Stone away for life, refuse Stone's evidentiary demand to ascertain how exactly Crowdstrike reached its Russsian hacking conclusion, that the court then linked to Stone allegedly lying about this Russian link .

5. Indeed, let's set out with full transparency the Ukraine -- Crowsdtrike player links and loyalties to see if there are any smoking guns yet undisclosed. Trump was asking for more information about Crowdstrike like a good lawyer - never ask a question when you don't already know the right answer. Crowdstrike is owned by a Ukrainian by birth .

likbez said in reply to Factotum... , 04 December 2019 at 01:29 AM

Hi Factotum,
Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers.

Alperovich is really a very suspicious figure. Rumors are that he was involved in compromising PGP while in MacAfee( June 2nd, 2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams - YouTube ):

Investigative Journalist George Webb worked at MacAfee and Network Solutions in 2000 when the CEO Bill Larsen bought a small, Moscow based, hacking and virus writing company to move to Silicon Valley.

MacAfee also purchased PGP, an open source encryption software developed by privacy advocate to reduce NSA spying on the public.
The two simultaneous purchase of PGP and the Moscow hacking team by Metwork Solutions was sponsored by the CIA and FBI in order to crack encrypted communications to write a back door for law enforcement.

Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike.

In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives.

His role in what we may define as "converting DNC leak into DNC hack" (I would agree with you that this probably was a false flag operation), which was supposedly designed to implicated Russians, and possibly involved Ukrainian security services, is very suspicious indeed.

Mueller treatment of Crowdstrike with "kid gloves" may suggest that Alperovich actions were part of a larger scheme. After all Crowdstike was a FBI contactor at the time.

While all this DNC hack saga is completely unclear due to lack of facts and the access to the evidence, there are some stories on Internet that indirectly somewhat strengthen your hypothesis:

Enjoy and Happy Cyber Week shopping :-)

[Dec 04, 2019] Common Funding Themes Link 'Whistleblower' Complaint and CrowdStrike Firm Certifying DNC Russia 'Hack' by Aaron Klein

Highly recommended!
Notable quotes:
"... Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council, which takes a hawkish approach toward Russia. The Council in turn is financed by Google Inc. ..."
"... In a perhaps unexpected development, another Atlantic Council funder is Burisma, the natural gas company at the center of allegations regarding Joe Biden and his son, Hunter Biden. Those allegations were the subject of Trump's inquiry with Zelemsky related to Biden. The Biden allegations concern significant questions about Biden's role in Ukraine policy under the Obama administration. This took place during a period when Hunter Biden received $50,000 a month from Burisma. ..."
"... Google, Soros's Open Society Foundations, the Rockefeller Fund and an agency of the State Department each also finance a self-described investigative journalism organization repeatedly referenced as a source of information in the so-called whistleblower's complaint alleging Trump was "using the power of his office to solicit interference from a foreign country" in the 2020 presidential race. ..."
"... Another listed OCCRP funder is the Omidyar Network, which is the nonprofit for liberal billionaire eBay founder Pierre Omidyar. ..."
"... Together with Soros's Open Society, Omidyar also funds the Poynter Institute for Media Studies, which hosts the International Fact-Checking Network that partnered with Facebook to help determine whether news stories are "disputed." ..."
Sep 28, 2019 | www.breitbart.com

There are common threads that run through an organization repeatedly relied upon in the so-called whistleblower's complaint about President Donald Trump and CrowdStrike, the outside firm utilized to conclude that Russia hacked the Democratic National Committee's servers since the DNC would not allow the U.S. government to inspect the servers.

One of several themes is financing tied to Google, whose Google Capital led a $100 million funding drive that financed Crowdstrike. Google Capital, which now goes by the name of CapitalG, is an arm of Alphabet Inc., Google's parent company. Eric Schmidt, the chairman of Alphabet, has been a staunch and active supporter of Hillary Clinton and is a longtime donor to the Democratic Party.

CrowdStrike was mentioned by Trump in his call with Ukranian President Volodymyr Zelensky. Perkins Coie, the law firm that represented the DNC and Hillary Clinton's campaign, reportedly helped draft CrowdStrike to aid with the DNC's allegedly hacked server.

On behalf of the DNC and Clinton's campaign, Perkins Coie also paid the controversial Fusion GPS firm to produce the infamous, largely-discredited anti-Trump dossier compiled by former British spy Christopher Steele.

CrowdStrike is a California-based cybersecurity technology company co-founded by Dmitri Alperovitch.

Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council, which takes a hawkish approach toward Russia. The Council in turn is financed by Google Inc.

In a perhaps unexpected development, another Atlantic Council funder is Burisma, the natural gas company at the center of allegations regarding Joe Biden and his son, Hunter Biden. Those allegations were the subject of Trump's inquiry with Zelemsky related to Biden. The Biden allegations concern significant questions about Biden's role in Ukraine policy under the Obama administration. This took place during a period when Hunter Biden received $50,000 a month from Burisma.

Besides Google and Burisma funding, the Council is also financed by billionaire activist George Soros's Open Society Foundations as well as the Rockefeller Brothers Fund, Inc. and the U.S. State Department.

Google, Soros's Open Society Foundations, the Rockefeller Fund and an agency of the State Department each also finance a self-described investigative journalism organization repeatedly referenced as a source of information in the so-called whistleblower's complaint alleging Trump was "using the power of his office to solicit interference from a foreign country" in the 2020 presidential race.

The charges in the July 22 report referenced in the whistleblower's document and released by the Google and Soros-funded organization, the Organized Crime and Corruption Reporting Project (OCCRP), seem to be the public precursors for a lot of the so-called whistleblower's own claims, as Breitbart News documented .

One key section of the so-called whistleblower's document claims that "multiple U.S. officials told me that Mr. Giuliani had reportedly privately reached out to a variety of other Zelensky advisers, including Chief of Staff Andriy Bohdan and Acting Chairman of the Security Service of Ukraine Ivan Bakanov."

This was allegedly to follow up on Trump's call with Zelensky in order to discuss the "cases" mentioned in that call, according to the so-called whistleblower's narrative. The complainer was clearly referencing Trump's request for Ukraine to investigate the Biden corruption allegations.

Even though the statement was written in first person – "multiple U.S. officials told me" – it contains a footnote referencing a report by the Organized Crime and Corruption Reporting Project (OCCRP).

That footnote reads:

In a report published by the Organized Crime and Corruption Reporting Project (OCCRP) on 22 July, two associates of Mr. Giuliani reportedly traveled to Kyiv in May 2019 and met with Mr. Bakanov and another close Zelensky adviser, Mr. Serhiy Shefir.

The so-called whistleblower's account goes on to rely upon that same OCCRP report on three more occasions. It does so to:

Write that Ukraine's Prosecutor General Yuriy Lutsenko "also stated that he wished to communicate directly with Attorney General Barr on these matters." Document that Trump adviser Rudi Giuliani "had spoken in late 2018 to former Prosecutor General Shokin, in a Skype call arranged by two associates of Mr. Giuliani." Bolster the charge that, "I also learned from a U.S. official that 'associates' of Mr. Giuliani were trying to make contact with the incoming Zelenskyy team." The so-called whistleblower then relates in another footnote, "I do not know whether these associates of Mr. Giuliani were the same individuals named in the 22 July report by OCCRP, referenced above."

The OCCRP report repeatedly referenced is actually a "joint investigation by the Organized Crime and Corruption Reporting Project (OCCRP) and BuzzFeed News, based on interviews and court and business records in the United States and Ukraine."

BuzzFeed infamously also first published the full anti-Trump dossier alleging unsubstantiated collusion between Trump's presidential campaign and Russia. The dossier was paid for by Hillary Clinton's campaign and the Democratic National Committee and was produced by the Fusion GPS opposition dirt outfit.

The OCCRP and BuzzFeed "joint investigation" resulted in both OCCRP and BuzzFeed publishing similar lengthy pieces on July 22 claiming that Giuliani was attempting to use connections to have Ukraine investigate Trump's political rivals.

The so-called whistleblower's document, however, only mentions the largely unknown OCCRP and does not reference BuzzFeed, which has faced scrutiny over its reporting on the Russia collusion claims.

Another listed OCCRP funder is the Omidyar Network, which is the nonprofit for liberal billionaire eBay founder Pierre Omidyar.

Together with Soros's Open Society, Omidyar also funds the Poynter Institute for Media Studies, which hosts the International Fact-Checking Network that partnered with Facebook to help determine whether news stories are "disputed."

Like OCCRP, the Poynter Institute's so-called news fact-checking project is openly funded by not only Soros' Open Society Foundations but also Google and the National Endowment for Democracy.

CrowdStrike and DNC servers

CrowdStrike, meanwhile, was brought up by Trump in his phone call with Zelensky. According to the transcript, Trump told Zelensky, "I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike I guess you have one of your wealthy people The server, they say Ukraine has it."

In his extensive report , Special Counsel Robert S. Mueller notes that his investigative team did not "obtain or examine" the servers of the DNC in determining whether those servers were hacked by Russia.

The DNC famously refused to allow the FBI to access its servers to verify the allegation that Russia carried out a hack during the 2016 presidential campaign. Instead, the DNC reached an arrangement with the FBI in which CrowdStrike conducted forensics on the server and shared details with the FBI.

In testimony before the Senate Intelligence Committee in January 2017, then-FBI Director James Comey confirmed that the FBI registered "multiple requests at different levels," to review the DNC's hacked servers. Ultimately, the DNC and FBI came to an agreement in which a "highly respected private company" -- a reference to CrowdStrike -- would carry out forensics on the servers and share any information that it discovered with the FBI, Comey testified.

A senior law enforcement official stressed the importance of the FBI gaining direct access to the servers, a request that was denied by the DNC.

"The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated," the official was quoted by the news media as saying.

"This left the FBI no choice but to rely upon a third party for information. These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier," the official continued.

... ... ...

Aaron Klein is Breitbart's Jerusalem bureau chief and senior investigative reporter. He is a New York Times bestselling author and hosts the popular weekend talk radio program, " Aaron Klein Investigative Radio ." Follow him on Twitter @AaronKleinShow. Follow him on Facebook.

Joshua Klein contributed research to this article.

[Dec 04, 2019] DNC Russian Hackers Found! You Won't Believe Who They Really Work For by the Anonymous Patriots

Highly recommended!
Jan 01, 2017 | themillenniumreport.com

"If someone steals your keys to encrypt the data, it doesn't matter how secure the algorithms are."

Dmitri Alperovitch, founder of CrowdStrike.

By the Anonymous Patriots
SOTN Exclusive

Russians did not hack the DNC system, a Russian named Dmitri Alperovitch is the hacker and he works for President Obama. In the last five years the Obama administration has turned exclusively to one Russian to solve every major cyber-attack in America, whether the attack was on the U.S. government or a corporation. Only one "super-hero cyber-warrior" seems to "have the codes" to figure out "if" a system was hacked and by "whom."

Dmitri's company, CrowdStrike has been called in by Obama to solve mysterious attacks on many high level government agencies and American corporations, including: German Bundestag, Democratic National Committee, Democratic Congressional Campaign Committee (DCCC), the White House, the State Department, SONY, and many others.

CrowdStrike's philosophy is: "You don't have a malware problem; you have an adversary problem."

CrowdStrike has played a critical role in the development of America's cyber-defense policy. Dmitri Alperovitch and George Kurtz, a former head of the FBI cyberwarfare unit founded CrowdStrike. Shawn Henry, former executive assistant director at the FBI is now CrowdStrike's president of services. The company is crawling with former U.S. intelligence agents.

Before Alperovitch founded CrowdStrike in 2011, he was working in Atlanta as the chief threat officer at the antivirus software firm McAfee, owned by Intel (a DARPA company). During that time, he "discovered" the Chinese had compromised at least seventy-one companies and organizations, including thirteen defense contractors, three electronics firms, and the International Olympic Committee. He was the only person to notice the biggest cyberattack in history! Nothing suspicious about that.

Alperovitch and the DNC

After CrowdStrike was hired as an independent "vendor" by the DNC to investigate a possible cyberattack on their system, Alperovitch sent the DNC a proprietary software package called Falcon that monitors the networks of its clients in real time. According to Alperovitch, Falcon "lit up," within ten seconds of being installed at the DNC. Alperovitch had his "proof" in TEN SECONDS that Russia was in the network. This "alleged" evidence of Russian hacking has yet to be shared with anyone.

As Donald Trump has pointed out, the FBI, the agency that should have been immediately involved in hacking that effects "National Security," has yet to even examine the DNC system to begin an investigation. Instead, the FBI and 16 other U.S. "intelligence" agencies simply "agree" with Obama's most trusted "cyberwarfare" expert Dmitri Alperovitch's "TEN SECOND" assessment that produced no evidence to support the claim.

Also remember that it is only Alperovitch and CrowdStrike that claim to have evidence that it was Russian hackers . In fact, only two hackers were found to have been in the system and were both identified by Alperovitch as Russian FSB (CIA) and the Russian GRU (DoD). It is only Alperovitch who claims that he knows that it is Putin behind these two hackers.

Alperovitch failed to mention in his conclusive "TEN SECOND" assessment that Guccifer 2.0 had already hacked the DNC and made available to the public the documents he hacked – before Alperovitch did his ten second assessment. Alperovitch reported that no other hackers were found, ignoring the fact that Guccifer 2.0 had already hacked and released DNC documents to the public. Alperovitch's assessment also goes directly against Julian Assange's repeated statements that the DNC leaks did not come from the Russians.

The ridiculously fake cyber-attack assessment done by Alperovitch and CrowdStrike naïvely flies in the face of the fact that a DNC insider admitted that he had released the DNC documents. Julian Assange implied in an interview that the murdered Democratic National Committee staffer, Seth Rich, was the source of a trove of damaging emails the website posted just days before the party's convention. Seth was on his way to testify about the DNC leaks to the FBI when he was shot dead in the street.

It is also absurd to hear Alperovitch state that the Russian FSB (equivalent to the CIA) had been monitoring the DNC site for over a year and had done nothing. No attack, no theft, and no harm was done to the system by this "false-flag cyber-attack" on the DNC – or at least, Alperovitch "reported" there was an attack. The second hacker, the supposed Russian military (GRU – like the U.S. DoD) hacker, had just entered the system two weeks before and also had done "nothing" but observe.

It is only Alperovitch's word that reports that the Russian FSB was "looking for files on Donald Trump."

It is only this false claim that spuriously ties Trump to the "alleged" attack. It is also only Alperovitch who believes that this hack that was supposedly "looking for Trump files" was an attempt to "influence" the election. No files were found about Trump by the second hacker, as we know from Wikileaks and Guccifer 2.0's leaks. To confabulate that "Russian's hacked the DNC to influence the elections" is the claim of one well-known Russian spy. Then, 17 U.S. intelligence agencies unanimously confirm that Alperovitch is correct – even though there is no evidence and no investigation was ever conducted .

How does Dmitri Alperovitch have such power? Why did Obama again and again use Alperovitch's company, CrowdStrike, when they have miserably failed to stop further cyber-attacks on the systems they were hired to protect? Why should anyone believe CrowdStrikes false-flag report?

After documents from the DNC continued to leak, and Guccifer 2.0 and Wikileaks made CrowdStrike's report look foolish, Alperovitch decided the situation was far worse than he had reported. He single-handedly concluded that the Russians were conducting an "influence operation" to help win the election for Trump . This false assertion had absolutely no evidence to back it up.

On July 22, three days before the Democratic convention in Philadelphia, WikiLeaks dumped a massive cache of emails that had been "stolen" (not hacked) from the DNC. Reporters soon found emails suggesting that the DNC leadership had favored Hillary Clinton in her primary race against Bernie Sanders, which led Debbie Wasserman Schultz, the DNC chair, along with three other officials, to resign.

Just days later, it was discovered that the Democratic Congressional Campaign Committee (DCCC) had been hacked. CrowdStrike was called in again and once again, Alperovitch immediately "believed" that Russia was responsible. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author. Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time Guccifer released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, Guccifer went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.

Once again, Guccifer 2.0 proved Alperovitch and CrowdStrike's claims to be grossly incorrect about the hack originating from Russia, with Putin masterminding it all. Nancy Pelosi offered members of Congress Alperovitch's suggestion of installing Falcon , the system that failed to stop cyberattacks at the DNC, on all congressional laptops.

Key Point: Once Falcon was installed on the computers of members of the U.S. Congress, CrowdStrike had even further full access into U.S. government accounts.

Alperovitch's "Unbelievable" History

Dmitri was born in 1980 in Moscow where his father, Michael, was a nuclear physicist, (so Dmitri claims). Dmitri's father was supposedly involved at the highest levels of Russian nuclear science. He also claims that his father taught him to write code as a child.

In 1990, his father was sent to Maryland as part of a nuclear-safety training program for scientists. In 1994, Michael Alperovitch was granted a visa to Canada, and a year later the family moved to Chattanooga, where Michael took a job with the Tennessee Valley Authority.

While Dmitri Alperovitch was still in high school, he and his father started an encryption-technology business. Dmitri studied computer science at Georgia Tech and went on to work at an antispam software firm. It was at this time that he realized that cyber-defense was more about psychology than it was about technology. A very odd thing to conclude.

Dmitri Alperovitch posed as a "Russian gangster" on spam discussion forums which brought his illegal activity to the attention of the FBI – as a criminal. In 2005, Dmitri flew to Pittsburgh to meet an FBI agent named Keith Mularski, who had been asked to lead an undercover operation against a vast Russian credit-card-theft syndicate. Alperovitch worked closely with Mularski's sting operation which took two years, but it ultimately brought about fifty-six arrests. Dmitri Alperovitch then became a pawn of the FBI and CIA.

In 2010, while he was at McAfee, the head of cybersecurity at Google told Dmitri that Gmail accounts belonging to human-rights activists in China had been breached. Google suspected the Chinese government. Alperovitch found that the breach was unprecedented in scale; it affected more than a dozen of McAfee's clients and involved the Chinese government. Three days after his supposed discovery, Alperovitch was on a plane to Washington where he had been asked to vet a paragraph in a speech by the secretary of state, Hillary Clinton.

2014, Sony called in CrowdStrike to investigate a breach of its network. Alperovitch needed just "two hours" to identify North Korea as the adversary. Executives at Sony asked Alperovitch to go public with the information immediately, but it took the FBI another three weeks before it confirmed the attribution.

Alperovitch then developed a list of "usual suspects" who were well-known hackers who had identifiable malware that they commonly used. Many people use the same malware and Alperovitch's obsession with believing he has the only accurate list of hackers in the world is plain idiocy exacerbated by the U.S. government's belief in his nonsense. Alperovitch even speaks like a "nut-case" in his personal Twitters, which generally have absolutely no references to the technology he is supposedly the best at in the entire world.

Dmitri – Front Man for His Father's Russian Espionage Mission

After taking a close look at the disinformation around Dmitri and his father, it is clear to see that Michael Alperovitch became a CIA operative during his first visit to America. Upon his return to Russia, he stole the best Russian encryption codes that were used to protect the top-secret work of nuclear physics in which his father is alleged to have been a major player. Upon surrendering the codes to the CIA when he returned to Canada, the CIA made it possible for a Russian nuclear scientist to become an American citizen overnight and gain a top-secret security clearance to work at the Oakridge plant, one of the most secure and protected nuclear facilities in America . Only the CIA can transform a Russian into an American with a top-secret clearance overnight.

We can see on Michael Alperovitch's Linked In page that he went from one fantastically top-secret job to the next without a break from the time he entered America. He seemed to be on a career path to work in every major U.S. agency in America. In every job he was hired as the top expert in the field and the leader of the company. All of these jobs after the first one were in cryptology, not nuclear physics. As a matter of fact, Michael became the top expert in America overnight and has stayed the top expert to this day.

Most of the work of cyber-security is creating secure interactions on a non-secure system like the Internet. The cryptologist who assigns the encryption codes controls the system from that point on .

Key Point: Cryptologists are well known for leaving a "back-door" in the base-code so that they can always have over-riding control.

Michael Alperovitch essentially has the "codes" for all Department of Defense sites, the Treasury, the State Department, cell-phones, satellites, and public media . There is hardly any powerful agency or company that he has not written the "codes" for. One might ask, why do American companies and the U.S. government use his particular codes? What are so special about Michael's codes?

Stolen Russian Codes

In December, Obama ordered the U.S. military to conduct cyberattacks against Russia in retaliation for the alleged DNC hacks. All of the attempts to attack Russia's military and intelligence agencies failed miserably. Russia laughed at Obama's attempts to hack their systems. Even the Russian companies targeted by the attacks were not harmed by Obama's cyber-attacks. Hardly any news of these massive and embarrassing failed cyber-attacks were reported by the Main Stream Media. The internet has been scrubbed clean of the reports that said Russia's cyber-defenses were impenetrable due to the sophistication of their encryption codes.

Michael Alperovitch was in possession of those impenetrable codes when he was a top scientist in Russia. It was these very codes that he shared with the CIA on his first trip to America . These codes got him spirited into America and "turned into" the best cryptologist in the world. Michael is simply using the effective codes of Russia to design his codes for the many systems he has created in America for the CIA .

KEY POINT: It is crucial to understand at this junction that the CIA is not solely working for America . The CIA works for itself and there are three branches to the CIA – two of which are hostile to American national interests and support globalism.

Michael and Dmitri Alperovitch work for the CIA (and international intelligence corporations) who support globalism . They, and the globalists for whom they work, are not friends of America or Russia. It is highly likely that the criminal activities of Dmitri, which were supported and sponsored by the FBI, created the very hackers who he often claims are responsible for cyberattacks. None of these supposed "attackers" have ever been found or arrested; they simply exist in the files of CrowdStrike and are used as the "usual culprits" when the FBI or CIA calls in Dmitri to give the one and only opinion that counts. Only Dmitri's "suspicions" are offered as evidence and yet 17 U.S. intelligence agencies stand behind the CrowdStrike report and Dmitri's suspicions.

Michael Alperovitch – Russian Spy with the Crypto-Keys

Essentially, Michael Alperovitch flies under the false-flag of being a cryptologist who works with PKI. A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repository and revokes them if needed. Public key cryptography is a cryptographic technique that enables entities to securely communicate on an insecure public network (the Internet), and reliably verify the identity of an entity via digital signatures . Digital signatures use Certificate Authorities to digitally sign and publish the public key bound to a given user. This is done using the CIA's own private key, so that trust in the user key relies on one's trust in the validity of the CIA's key. Michael Alperovitch is considered to be the number one expert in America on PKI and essentially controls the market .

Michael's past is clouded in confusion and lies. Dmitri states that his father was a nuclear physicist and that he came to America the first time in a nuclear based shared program between America and Russia. But if we look at his current personal Linked In page, Michael claims he has a Master Degree in Applied Mathematics from Gorky State University. From 1932 to 1956, its name was State University of Gorky. Now it is known as Lobachevsky State University of Nizhni Novgorod – National Research University (UNN), also known as Lobachevsky University. Does Michael not even know the name of the University he graduated from? And when does a person with a Master's Degree become a leading nuclear physicist who comes to "visit" America. In Michael's Linked In page there is a long list of his skills and there is no mention of nuclear physics.

Also on Michael Alperovitch's Linked In page we find some of his illustrious history that paints a picture of either the most brilliant mind in computer security, encryption, and cyberwarfare, or a CIA/FBI backed Russian spy. Imagine that out of all the people in the world to put in charge of the encryption keys for the Department of Defense, the U.S. Treasury, U.S. military satellites, the flow of network news, cell phone encryption, the Pathfire (media control) Program, the Defense Information Systems Agency, the Global Information Grid, and TriCipher Armored Credential System among many others, the government hires a Russian spy . Go figure.

Michael Alperovitch's Linked In Page

Education:

Gorky State University, Russia, MS in Applied Mathematics

Work History:

Sr. Security Architect

VT IDirect -2014 – Designing security architecture for satellite communications including cryptographic protocols, authentication.

Principal SME (Contractor)

DISA -Defense Information Systems Agency (Manager of the Global Information Grid) – 2012-2014 – Worked on PKI and identity management projects for DISA utilizing Elliptic Curve Cryptography. Performed application security and penetration testing.

Technical Lead (Contractor)

U.S. Department of the Treasury – 2011 – Designed enterprise validation service architecture for PKI certificate credentials with Single Sign On authentication.

Principal Software Engineer

Comtech Mobile Datacom – 2007-2010 – Subject matter expert on latest information security practices, including authentication, encryption and key management.

Sr. Software Engineer

TriCipher – 2006-2007 – Designed and developed security architecture for TriCipher Armored Credential Authentication System.

Lead Software Engineer

BellSouth – 2003-2006 – Designed and built server-side Jabber-based messaging platform with Single Sign On authentication.

Principal Software Research Engineer

Pathfire – 2001-2002 – Designed and developed Digital Rights Management Server for Video on Demand and content distribution applications. Pathfire provides digital media distribution and management solutions to the television, media, and entertainment industries. The company offers Digital Media Gateway, a digital IP store-and-forward platform, delivering news stories, syndicated programming, advertising spots, and video news releases to broadcasters. It provides solutions for content providers and broadcasters, as well as station solutions.

Obama – No Friend of America

Obama is no friend of America in the war against cyber-attacks. The very agencies and departments being defended by Michael Alperovitch's "singular and most brilliant" ability to write encryption codes have all been successfully attacked and compromised since Michael set up the codes. But we shouldn't worry, because if there is a cyberattack in the Obama administration, Michael's son Dmitri is called in to "prove" that it isn't the fault of his father's codes. It was the "damn Russians", or even "Putin himself" who attacked American networks.

Not one of the 17 U.S. intelligence agencies is capable of figuring out a successful cyberattack against America without Michael and Dmitri's help. Those same 17 U.S. intelligence agencies were not able to effectively launch a successful cyberattack against Russia. It seems like the Russian's have strong codes and America has weak codes. We can thank Michael and Dmitri Alperovitch for that.

It is clear that there was no DNC hack beyond Guccifer 2.0. Dmitri Alperovitch is a "frontman" for his father's encryption espionage mission.

Is it any wonder that Trump says that he has "his own people" to deliver his intelligence to him that is outside of the infiltrated U.S. government intelligence agencies and the Obama administration ? Isn't any wonder that citizens have to go anywhere BUT the MSM to find real news or that the new administration has to go to independent news to get good intel?

It is hard to say anything more damnable than to again quote Dmitri on these very issues:
"If someone steals your keys to encrypt the data, it doesn't matter how secure the algorithms are." Dmitri Alperovitch, founder of CrowdStrike

Originally posted at: http://stateofthenation2012.com/?p=62536

[Dec 04, 2019] June 4th, 2017 Crowdstrike Was at the DNC Six Weeks by George Webb

Highly recommended!
A short YouTube with the handwritten timeline
Nov 27, 2019 | www.youtube.com
AwanContra - George Webb, Investigative Journalist

[Dec 04, 2019] Cyberanalyst George Eliason Claims that the "Fancy Bear" Who Hacked the DNC Server is Ukrainian Intelligence – In League with the Atlantic Council and Crowdstrike

Highly recommended!
Notable quotes:
"... And RUH8 is allied with the Atlantic Council and Crowdstrike. ..."
"... Russia was probably not one of the hacking groups. The willful destruction of evidence by the DNC themselves probably points to Russia not being one of the those groups. The DNC wouldn't destroy evidence that supported their position. Also, government spy agencies keep info like that closely held. They might leak out tidbits, but they don't do wholesale dumps, like, ever. ..."
"... That's what the DNC is lying about. Not that hacks happened (they undoubtedly did), but about who did them (probably not Russian gov), and if hacks mattered (they didn't since everything was getting leaked anyway). ..."
"... The DNC/Mueller/etc are lying, but like most practiced liars they're mixing the lies with half-truths and unrelated facts to muddy the waters: ..."
"... An interesting question is, since it's basically guaranteed the DNC got hacked, but probably not by the Russians, is, what groups did hack the DNC, and why did the DNC scramble madly to hide their identities? ..."
"... And while you think about that question, consider the close parallel with the Awan case, where Dems were ostensibly the victims, but they again scrambled to cover up for the people who supposedly harmed them. level 2 ..."
"... DNC wasn't even hacked. Emails were leaked. They didn't even examine the server. Any "evidence" produced is spoofable from CIA cybertools that we know about from wikileaks. It's important to know how each new lie is a lie. But man I am just so done with all this Russia shit. level 2 ..."
"... Crowdstrike claims that malware was found on DNC server. I agree that this has nothing to do with the Wikileaks releases. What I am wondering is whether Crowdstrike may have arranged for the DNC to be hacked so that Russia could be blamed. Continue this thread level 1 ..."
"... George Eliason promises additional essays: *The next articles, starting with one about Fancy Bear's hot/cold ongoing relationship with Bellingcat which destroys the JIT investigation, will showcase the following: Fancy Bear worked with Bellingcat and the Ukrainian government providing Information War material as evidence for MH17: ..."
"... Fancy Bear is an inside unit of the Atlantic Council and their Digital Forensics Lab ..."
Dec 04, 2018 | www.reddit.com

Cyberanalyst George Eliason has written some intriguing blogs recently claiming that the "Fancy Bear" which hacked the DNC server in mid-2016 was in fact a branch of Ukrainian intelligence linked to the Atlantic Council and Crowdstrike. I invite you to have a go at one of his recent essays:

https://off-guardian.org/2018/06/25/who-is-fancy-bear-and-who-are-they-working-for/

Since I am not very computer savvy and don't know much about the world of hackers - added to the fact that Eliason's writing is too cute and convoluted - I have difficulty navigating Eliason's thought. Nonetheless, here is what I can make of Eliasons' claims, as supported by independent literature:

Russian hacker Konstantin Kozlovsky, in Moscow court filings, has claimed that he did the DNC hack – and can prove it, because he left some specific code on the DNC server.

http://thehill.com/policy/cybersecurity/366696-russian-hacker-claims-he-can-prove-he-hacked-dnc

Kozlovsky states that he did so by order of Dimitry Dokuchaev (formerly of the FSB, and currently in prison in Russia on treason charges) who works with the Russian traitor hacker group Shaltai Boltai.

https://www.newsweek.com/russian-hacker-stealing-clintons-emailshacking-dnc-putinsfsb-745555 (Note that Newsweek's title is an overt lie.)

According to Eliason, Shaltai Boltai works in collaboration with the Ukrainian hacker group RUH8, a group of neo-Nazis (Privat Sektor) who are affiliated with Ukrainian intelligence. And RUH8 is allied with the Atlantic Council and Crowdstrike.

https://off-guardian.org/2018/06/25/who-is-fancy-bear-and-who-are-they-working-for/

Cyberexpert Jeffrey Carr has stated that RUH8 has the X-Agent malware which our intelligence community has erroneously claimed is possessed only by Russian intelligence, and used by "Fancy Bear".

https://medium.com/@jeffreyscarr/the-gru-ukraine-artillery-hack-that-may-never-have-happened-820960bbb02d

Eliason has concluded that RUH8 is Fancy Bear.

This might help explain why Adam Carter has determined that some of the malware found on the DNC server was compiled AFTER Crowdstrike was working on the DNC server – Crowdstrike was in collusion with Fancy Bear (RUH8).

In other words, Crowdstrike likely arranged for a hack by Ukrainian intelligence that they could then attribute to Russia.

As far as I can tell, none of this is pertinent to how Wikileaks obtained their DNC emails, which most likely were leaked.

How curious that our Deep State and the recent Mueller indictment have had nothing to say about Kozlovsky's confession - whom I tend to take seriously because he offers a simple way to confirm his claim. Also interesting that the FBI has shown no interest in looking at the DNC server to check whether Kozlovsky's code is there.

I will ask Adam Carter for his opinion on this. 19 comments 84% Upvoted This thread is archived New comments cannot be posted and votes cannot be cast Sort by View discussions in 1 other community level 1



zer0mas 1 point · 1 year ago

Its worth noting that Dimitri Alperovich's (Crowdstrike) hatred of Putin is second only to Hillary's hatred for taking responsibility for her actions. level 1

veganmark 2 points · 1 year ago

Thanks - I'll continue to follow Eliason's work. The thesis that Ukrainian intelligence is hacking a number of targets so that Russia gets blamed for it has intuitive appeal. level 1

alskdmv-nosleep4u -1 points · 1 year ago

I see things like this:

DNC wasn't even hacked.

and have to cringe. Any hacks weren't related to Wikileaks, who got their info from leakers, but that is not the same thing as no hack. Leaks and hacks aren't mutually exclusive. They actually occur together pretty commonly.

DNC's security was utter shit. Systems with shit security and obviously valuable info usually get hacked by multiple groups. In the case of the DNC, Hillary's email servers, etc., it's basically impossible they weren't hacked by dozens of intruders. A plastic bag of 100s will not sit untouched on a NYC street corner for 4 weeks. Not. fucking. happening.

Interestingly, Russia was probably not one of the hacking groups. The willful destruction of evidence by the DNC themselves probably points to Russia not being one of the those groups. The DNC wouldn't destroy evidence that supported their position. Also, government spy agencies keep info like that closely held. They might leak out tidbits, but they don't do wholesale dumps, like, ever.

That's what the DNC is lying about. Not that hacks happened (they undoubtedly did), but about who did them (probably not Russian gov), and if hacks mattered (they didn't since everything was getting leaked anyway).

The DNC/Mueller/etc are lying, but like most practiced liars they're mixing the lies with half-truths and unrelated facts to muddy the waters:

Any "evidence" produced is spoofable from CIA cybertools

Yes, but that spoofed 'evidence' is not the direct opposite of the truth, like I see people assuming. Bad assumption, and the establishment plays on that to make critic look bad. The spoofed evidence is just mud.


An interesting question is, since it's basically guaranteed the DNC got hacked, but probably not by the Russians, is, what groups did hack the DNC, and why did the DNC scramble madly to hide their identities?

And while you think about that question, consider the close parallel with the Awan case, where Dems were ostensibly the victims, but they again scrambled to cover up for the people who supposedly harmed them. level 2

alskdmv-nosleep4u 2 points · 1 year ago

What's hilarious about the 2 down-votes is I can't tell if their from pro-Russiagate trolls, or from people who who can't get past binary thinking. level 1

Honztastic 2 points · 1 year ago

DNC wasn't even hacked. Emails were leaked. They didn't even examine the server. Any "evidence" produced is spoofable from CIA cybertools that we know about from wikileaks. It's important to know how each new lie is a lie. But man I am just so done with all this Russia shit. level 2

veganmark 2 points · 1 year ago

Crowdstrike claims that malware was found on DNC server. I agree that this has nothing to do with the Wikileaks releases. What I am wondering is whether Crowdstrike may have arranged for the DNC to be hacked so that Russia could be blamed. Continue this thread level 1

Inuma I take the headspace of idiots 9 points · 1 year ago

So you mean to tell me that WWIII is being prepared by Mueller and it was manufactured consent?

I'd be shocked, but this only proves that the "Deep State" only cares about their power, consequences be damned. level 1

veganmark 8 points · 1 year ago

George Eliason promises additional essays: *The next articles, starting with one about Fancy Bear's hot/cold ongoing relationship with Bellingcat which destroys the JIT investigation, will showcase the following: Fancy Bear worked with Bellingcat and the Ukrainian government providing Information War material as evidence for MH17:

HillaryBrokeTheLaw Long live dead poets 10 points · 1 year ago

Nice.

I'm glad you're still following this. Crowdstrike is shady af. level 1

[Dec 04, 2019] Fancy Bear - Conservapedia

Highly recommended!
Dec 04, 2019 | www.conservapedia.com

Fancy Bear (also know as Strontium Group, or APT28) is a Ukrainian cyber espionage group. Cybersecurity firm CrowdStrike incorrectly has said with a medium level of confidence that it is associated with the Russian military intelligence agency GRU . CrowdStrike founder, Dmitri Alperovitch , has colluded with Fancy Bear. American journalist George Eliason has written extensively on the subject.

There are a couple of caveats that need to be made when identifying the Fancy Bear hackers. The first is the identifier used by Mueller as Russian FSB and GRU may have been true- 10 years ago. This group was on the run trying to stay a step ahead of Russian law enforcement until October 2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and possibly former Russian state security. The majority of the group are Ukrainians making up Ukraine's Cyber Warfare groups.

Eliason lives and works in Donbass. He has been interviewed by and provided analysis for RT, the BBC , and Press-TV. His articles have been published in the Security Assistance Monitor, Washingtons Blog, OpedNews, the Saker, RT, Global Research, and RINF, and the Greanville Post among others. He has been cited and republished by various academic blogs including Defending History, Michael Hudson, SWEDHR, Counterpunch, the Justice Integrity Project, among others.

Contents [ hide ] Fancy Bear is Ukrainian Intelligence Shaltai Boltai

The "Fancy Bear hackers" may have been given the passwords to get into the servers at the DNC because they were part of the Team Clinton opposition research team. It was part of their job.

According to Politico ,

"In an interview this month, at the DNC this past election cycle centered on mobilizing ethnic communities -- including Ukrainian-Americans -- she said that, when Trump's unlikely presidential campaign. Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists, government officials and private intelligence operatives. While her consulting work began surging in late 2015, she began focusing more on the research, and expanded it to include Trump's ties to Russia, as well." [1]

The only investigative journalists, government officials, and private intelligence operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and the Ministry of Information.

All of these hacking and information operation groups work for Andrea Chalupa with EuroMaidanPR and Irena Chalupa at the Atlantic Council. Both Chalupa sisters work directly with the Ukrainian government's intelligence and propaganda arms.

Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage , terrorist , counter-terrorism, cyber, propaganda , and info war channels officially recognized and directed by Ukraine's Information Ministry. Along with their American colleagues, they populate the hit-for-hire website Myrotvorets with people who stand against Ukraine's criminal activities.

The hackers, OSINT, Cyber, spies, terrorists, etc. call themselves volunteers to keep safe from State level retaliation, even though a child can follow the money. As volunteers motivated by politics and patriotism they are protected to a degree from retribution.

They don't claim State sponsorship or governance and the level of attack falls below the threshold of military action. Special Counsel Robert Mueller had a lot of latitude for making the attribution Russian, even though the attacks came from Ukrainian Intelligence. Based on how the rules of the Tallinn Manual 2.0 on the International Law Applicable to Cyber are written, because the few members of the coalition from Shaltai Boltai are Russian in nationality, Fancy Bear can be attributed as a Russian entity for the purposes of retribution. The caveat is if the attribution is proven wrong, the US will be liable for damages caused to the State which in this case is Russia.

How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they have the ability to research and work in over 30 different languages.

This can be considered an Information Operation against the people of the United States and of course Russia. After 2013, Shaltay Boltay was no longer physically available to work for Russia. The Russian hackers were in Ukraine working for the Ukrainian government's Information Ministry which is in charge of the cyber war. They were in Ukraine until October 2016 when they were tricked to return to Moscow and promptly arrested for treason.

From all this information we know the Russian component of Team Fancy Bear is Shaltai Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian Intelligence. We know they are grouped with InformNapalm which is Ukraine's OSINT unit. We know their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above work directly with the Atlantic Council and Crowdstrike's Dimitry Alperovich.

In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged data from the Surkov leak.

But during 2014, 2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and CyberHunta went to work for the DNC as opposition researchers .

The First Time Shaltai Boltai was Handed the Keys to US Gov Servers

The setup to this happened long before the partnership with Ukrainian Intel hackers and Russia's Shaltai Boltai was forged. The hack that gained access to US top-secret servers happened just after the partnership was cemented after Euro-Maidan.

In August 2009 Hillary Clinton's Deputy Chief of Staff at the State Department Huma Abedin sent the passwords to her Government laptop to her Yahoo mail account. On August 16, 2010, Abedin received an email titled "Re: Your yahoo account. We can see where this is going, can't we?

"After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin's associates to access email accounts into 2015 and 2016."

Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo hack.

The time frame has to be noted. The hack happened in 2014. Access to the email accounts continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai Boltai was working from Kiev, Ukraine.

So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with looking at the time frame. Ukraine had the keys already in hand in 2014.

Chalupa collusion with Ukrainian Intelligence
See also: Ukrainian collusion and Ukrainian collusion timeline

Alexandra Chalupa hired this particular hacking terrorist group, which Dimitry Alperovich and Crowdstrike dubbed "Fancy Bear", in 2015 at the latest. While the Ukrainian hackers worked for the DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the state of the projects they were working on. Let's face it, once you're in, setting up your Fancy Bear toolkit doesn't get any easier. This is why I said the DNC hack isn't the big crime. It's a big con and all the parties were in on it.

Hillary Clinton exposed secrets to hacking threats by using private email instead of secured servers. Given the information provided she was probably being monitored by our intrepid Ruskie-Ukie union made in hell hackers. Anthony Weiner exposed himself and his wife Huma Abedin using Weiner's computer for top-secret State Department emails. And of course Huma Abedin exposed herself along with her top-secret passwords at Yahoo and it looks like the hackers the DNC hired to do opposition research hacked her.

Here's a question. Did Huma Abedin have Hillary Clinton's passwords for her private email server? It would seem logical given her position with Clinton at the State Department and afterward. This means that Hillary Clinton and the US government top secret servers were most likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using legitimate passwords.

Dobrovolska

Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former staff from 2013 through prepping for the 2016 election. [2] [3] Alexandra Chalupa was running a research department that is rich in (foreign) Ukrainian Intelligence operatives, hackers, terrorists, and a couple Ruskie traitors.

Kristina Dobrovolska was acting as a handler and translator for the US State Department in 2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to Washington to meet with Chalupa.

Alexandra types in her password to show Dobrovolska something she found and her eager to please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the Fancy Bear crew about it and they immediately get to work looking for Trump material on the US secret servers with legitimate access. I mean, what else could they do with this? Turn over sensitive information to the ever corrupt Ukrainian government?

According to the Politico article, Alexandra Chalupa was meeting with the Ukrainian embassy in June of 2016 to discuss getting more help sticking it to candidate Trump. At the same time she was meeting, the embassy had a reception that highlighted female Ukrainian leaders.

Four Verkhovna Rada [parlaiment] deputies there for the event included: Viktoriia Y. Ptashnyk, Anna A. Romanova, Alyona I. Shkrum, and Taras T. Pastukh. [4]

According to CNN , [5] DNC sources said Chalupa told DNC operatives the Ukrainian government would be willing to deliver damaging information against Trump's campaign. Later, Chalupa would lead the charge to try to unseat president-elect Trump starting on Nov 10, 2016.

Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison and translator who escorted the delegates from Kyiv during their visits to Albany and Washington.

Kristina Dobrovolska is the handler manager working with Ukraine's DNC Fancy Bear Hackers. [6] She took the Rada [parliament] members to dinner to meet Joel Harding who designed Ukraine's infamous Information Policy which opened up their kill-for-hire-website Myrotvorets. Then she took them to meet the Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the surviving nephew to the infamous torturer The WWII OUNb leader, Mykola Lebed.

Fancy Bear's Second Chance at Top Secret Passwords From Team Clinton

One very successful method of hacking is called social engineering . You gain access to the office space and any related properties and physically locate the passwords or clues to get you into the hardware you want to hack. This includes something as simple as looking over the shoulder of the person typing in passwords.

The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC opposition research. On different occasions, Fancy Bear handler Kristina Dobrovolska traveled to the US to meet the Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea Chalupa, US Dept of State personnel, and most likely Crowdstrike's Dimitry Alperovich. Alperovich was working with the hackers in 2015-16. In 2016, the only groups known to have Fancy Bear's signature tools called X-tunnel and X-Agent were Alperovich, Crowdstrike, and Fancy Bear (Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does explain a few things.

Alleged DNC hack

There were multiple DNC hacks. There is also clear proof supporting the download to a USB stick and subsequent information exchange (leak) to Wikileaks . All are separate events.

At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It is a matter of public record that Team Clinton provided the DNC hackers with passwords to State Department servers on at least 2 occasions, one wittingly and one not. Fancy Bear hackers are Ukrainian Intelligence Operators.

If the leak came through Seth Rich , it may have been because he saw foreign Intel operatives given this access from the presumed winners of the 2016 US presidential election . The leaker may have been trying to do something about it. I'm curious what information Wikileaks might have.

Alperovitch and Fancy Bear

George Eliason, Washingtonsblog: Why Crowdstrike's Russian Hacking Story Fell Apart- Say Hello to Fancy Bear. investigated. [7]

  • In the wake of the JAR-16-20296 dated December 29, 2016 about hacking and influencing the 2016 election, the need for real evidence is clear. The joint report adds nothing substantial to the October 7th report. It relies on proofs provided by the cyber security firm Crowdstrike that is clearly not on par with intelligence findings or evidence. At the top of the report is an "as is" statement showing this.
  • The difference bet enough evidence is provided to warrant an investigation of specific parties for the DNC hacks. The real story involves specific anti-American actors that need to be investigated for real crimes. For instance, the malware used was an out-dated version just waiting to be found. The one other interesting point is that the Russian malware called Grizzly Steppe is from Ukraine. How did Crowdstrike miss this when it is their business to know?
  • The bar for identification set by Crowdstrike has never been able to get beyond words like probably, maybe, could be, or should be, in their attribution. The bar Dimitri Alperovitch set for identifying the hackers involved is that low. Other than asking America to trust them, how many solid facts has Alperovitch provided to back his claim of Russian involvement?
  • information from outside intelligence agencies has the value of rumor or unsubstantiated information at best according to policy. Usable intelligence needs to be free from partisan politics and verifiable. Intel agencies noted back in the early 90's that every private actor in the information game was radically political.
  • Alperovitch first gained notice when he was the VP in charge of threat research with McAfee. Asked to comment on Alperovitch's discovery of Russian hacks on Larry King, John McAfee had this to say. "Based on all of his experience, McAfee does not believe that Russians were behind the hacks on the Democratic National Committee (DNC), John Podesta's emails, and the Hillary Clinton presidential campaign. As he told RT, "if it looks like the Russians did it, then I can guarantee you it was not the Russians."
  • How does Crowdstrike's story part with reality? First is the admission that it is probably, maybe, could be Russia hacking the DNC. "Intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to Wiki Leaks." The public evidence never goes beyond the word possibility. While never going beyond that or using facts, Crowdstrike insists that it's Russia behind both Clinton's and the Ukrainian losses.
  • NBC carried the story because one of the partners in Crowdstrike is also a consultant for NBC. According to NBC the story reads like this."The company, Crowdstrike, was hired by the DNC to investigate the hack and issued a report publicly attributing it to Russian intelligence. One of Crowdstrike's senior executives is Shawn Henry , a former senior FBI official who consults for NBC News.
  • In June, Crowdstrike went public with its findings that two separate Russian intelligence agencies had hacked the DNC. One, which Crowdstrike and other researchers call Cozy Bear, is believed to be linked to Russia's CIA, known as the FSB. The other, known as Fancy Bear, is believed to be tied to the military intelligence agency, called the GRU." The information is so certain the level of proof never rises above "believed to be." According to the December 12th Intercept article "Most importantly, the Post adds that "intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to WikiLeaks."
  • The SBU, Olexander Turchinov, and the Ukrainian Ministry of Defense all agree that Crowdstrike is dead wrong in this assessment. Although subtitles aren't on it, the former Commandant of Ukrainian Army Headquarters thanks God Russia never invaded or Ukraine would have been in deep trouble. How could Dimitri Alperovitch and Crowdstrike be this wrong on easily checked detail and still get this much media attention?
  • Crowdstrike CEO Dmitri Alperovitch story about Russian hacks that cost Hillary Clinton the election was broadsided by the SBU (Ukrainian Intelligence and Security) in Ukraine. If Dimitri Alperovitch is working for Ukrainian Intelligence and is providing intelligence to 17 US Intelligence Agencies is it a conflict of interest?
  • Is giving misleading or false information to 17 US Intelligence Agencies a crime? If it's done by a cyber security industry leader like Crowdstrike should that be investigated? If unwinding the story from the "targeting of Ukrainian volunteers" side isn't enough, we should look at this from the American perspective. How did the Russia influencing the election and DNC hack story evolve? Who's involved? Does this pose conflicts of interest for Dmitri Alperovitch and Crowdstrike? And let's face it, a hacking story isn't complete until real hackers with the skills, motivation, and reason are exposed.
  • According to journalist and DNC activist Andrea Chalupa on her Facebook page "After Chalupa sent the email to Miranda (which mentions that she had invited this reporter to a meeting with Ukrainian journalists in Washington), it triggered high-level concerns within the DNC, given the sensitive nature of her work. "That's when we knew it was the Russians," said a Democratic Party source who has been directly involved in the internal probe into the hacked emails. In order to stem the damage, the source said, "we told her to stop her research."" July 25, 2016
  • If she was that close to the investigation Crowdstrike did how credible is she? Her sister Alexandra was named one of 16 people that shaped the election by Yahoo news. The DNC hacking investigation done by Crowdstrike concluded hacking was done by Russian actors based on the work done by Alexandra Chalupa ? That is the conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the Russian government connection.
  • How close is Dimitri Alperovitch to DNC officials? Close enough professionally he should have stepped down from an investigation that had the chance of throwing a presidential election in a new direction. According to Esquire.com, Alperovitch has vetted speeches for Hillary Clinton about cyber security issues in the past. Because of his work on the Sony hack, President Barrack Obama personally called and said the measures taken were directly because of his work.
  • Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian propagandists, and Ukrainian state supported hackers [show a conflict of interest]. When it all adds up and you see it together, we have found a Russian that tried hard to influence the outcome of the US presidential election in 2016.
  • The Chalupas are not Democrat or Republican. They are OUNb. The OUNb worked hard to start a war between the USA and Russia for the last 50 years. According to the Ukrainian Weekly in a rare open statement of their existence in 2011, "Other statements were issued in the Ukrainian language by the leadership of the Organization of Ukrainian Nationalists (B) and the International Conference in Support of Ukraine. The OUN (Bandera wing) called for" What is OUNb Bandera? They follow the same political policy and platform that was developed in the 1930's by Stepan Bandera . When these people go to a Holocaust memorial they are celebrating both the dead and the OUNb SS that killed. [8] There is no getting around this fact. The OUNb have no concept of democratic values and want an authoritarian fascism .
  • Alexandra Chalupa- According to the Ukrainian Weekly , [9]
"The effort, known as Digital Miadan, gained momentum following the initial Twitter storms. Leading the effort were: Lara Chelak, Andrea Chalupa, Alexandra Chalupa, Constatin Kostenko and others." The Digital Maidan was also how they raised money for the coup. This was how the Ukrainian emigres bought the bullets that were used on Euromaidan. Ukraine's chubby nazi, Dima Yarosh stated openly he was taking money from the Ukrainian emigres during Euromaidan and Pravy Sektor still fundraises openly in North America. The "Sniper Massacre" on the Maidan in Ukraine by Dr. Ivan Katchanovski, University of Ottowa shows clearly detailed evidence how the massacre happened. It has Pravy Sektor confessions that show who created the "heavenly hundred. Their admitted involvement as leaders of Digital Maidan by both Chalupas is a clear violation of the Neutrality Act and has up to a 25 year prison sentence attached to it because it ended in a coup.
  • Andrea Chalupa-2014, in a Huff Post article Sept. 1 2016, Andrea Chalupa described Sviatoslav Yurash as one of Ukraine's important "dreamers." He is a young activist that founded Euromaidan Press. Beyond the gushing glow what she doesn't say is who he actually is. Sviatoslav Yurash was Dmitri Yarosh's spokesman just after Maidan. He is a hardcore Ukrainian nationalist and was rewarded with the Deputy Director position for the UWC (Ukrainian World Congress) in Kiev.
  • In January, 2014 when he showed up at the Maidan protests he was 17 years old. He became the foreign language media representative for Vitali Klitschko, Arseni Yatsenyuk, and Oleh Tyahnybok. All press enquiries went through Yurash. To meet Dimitri Yurash you had to go through Sviatoslav Yurash as a Macleans reporter found out.
  • At 18 years old, Sviatoslav Yurash became the spokesman for Ministry of Defense of Ukraine under Andrei Paruby. He was Dimitri Yarosh's spokesman and can be seen either behind Yarosh on videos at press conferences or speaking ahead of him to reporters. From January 2014 onward, to speak to Dimitri Yarosh, you set up an appointment with Yurash.
  • Andrea Chalupa has worked with Yurash's Euromaidan Press which is associated with Informnapalm.org and supplies the state level hackers for Ukraine.
  • Irene Chalupa- Another involved Chalupa we need to cover to do the story justice is Irene Chalupa. From her bio– Irena Chalupa is a nonresident fellow with the Atlantic Council's Dinu Patriciu Eurasia Center. She is also a senior correspondent at Radio Free Europe/Radio Liberty (RFE/RL), where she has worked for more than twenty years. Ms. Chalupa previously served as an editor for the Atlantic Council, where she covered Ukraine and Eastern Europe. Irena Chalupa is also the news anchor for Ukraine's propaganda channel org She is also a Ukrainian emigre leader.
  • According to Robert Parry's article [10] At the forefront of people that would have taken senior positions in a Clinton administration and especially in foreign policy are the Atlantic Council . Their main goal is still a major confrontation with nuclear-armed Russia.
  • The Atlantic Council is the think tank associated and supported by the CEEC (Central and Eastern European Coalition). The CEEC has only one goal which is war with Russia. Their question to candidates looking for their support in the election was "Are you willing to go to war with Russia?" Hillary Clinton has received their unqualified support throughout the campaign.
  • What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the Atlantic Council would have taken senior cabinet and policy positions, his own fellowship status at the Atlantic Council and relationship with Irene Chalupa creates a definite conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or Homeland Security?
  • When you put someone that has so much to gain in charge of an investigation that could change an election, that is a conflict of interest. If the think tank is linked heavily to groups that want war with Russia like the Atlantic Council and the CEEC, it opens up criminal conspiracy.
  • If the person in charge of the investigation is a fellow at the think tank that wants a major conflict with Russia it is a definite conflict of interest. Both the Atlantic Council and clients stood to gain Cabinet and Policy positions based on how the result of his work affects the election. It clouds the results of the investigation. In Dmitri Alperovitch's case, he found the perpetrator before he was positive there was a crime.
  • Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence groups is where things really heat up. Noted above she works with Euromaidanpress.com and Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers.
  • When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and its hackers individually. There is a mutual relationship. When you add up his work for the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be investigated to see if Ukraine is conspiring against the US government. Crowdstrike is also following their hack of a Russian government official after the DNC hack. It closely resembles the same method used with the DNC because it was an email hack.
  • Crowdstrike's product line includes Falcon Host, Falcon Intelligence, Falcon Overwatch and Falcon DNS. Is it possible the hackers in Falcons Flame are another service Crowdstrike offers?
  • In an interview with Euromaidanpress these hackers say they have no need for the CIA. [11] They consider the CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance is a quasi-organization with the participation of several groups – RUH8, Trinity, Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the Myrotvorets site, Informnapalm analytical agency."
Although this profile says Virginia, tweets are from the Sofia, Bulgaria time zone and he writes in Russian. Another curiosity considering the Fancy Bear source code is in Russian. This image shows Crowdstrike in their network. Crowdstrike is part of Ukrainian nationalist hacker network. In the image it shows a network diagram of Crowdstrike following the Surkov leaks. The network communication goes through a secondary source. Although OSINT Academy sounds fairly innocuous, it's the official twitter account for Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence. The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates journalists and other people for assassination. If you disagree with OUNb politics, you could be on the list.
  • Should someone tell Dimitri Alperovitch that Gerashchenko, who is now in charge of Peacekeeper recently threatened president-elect Donald Trump that he would put him on his "Peacemaker" site as a target? The same has been done with Silvio Berscaloni in the past.
  • Trying not to be obvious, the Head of Ukraine's Information Ministry (UA Intelligence) tweeted something interesting that ties Alperovitch and Crowdstrike to the Ukrainian Intelligence hackers and the Information Ministry even tighter. This single tweet on a network chart shows that out of all the Ukrainian Ministry of Information Minister's following, he only wanted the 3 hacking groups associated with both him and Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be shared heavily. If it was a victory for the hacking squad, it would be smart to keep it to themselves and not draw unwanted attention.
  • These same hackers are associated with Alexandra, Andrea, and Irene Chalupa through the portals and organizations they work with through their OUNb. The hackers are funded and directed by or through the same OUNb channels that Alperovitch is working for and with to promote the story of Russian hacking.
  • When you look at the image for the hacking group in the euromaidanpress article, one of the hackers identifies themselves as one of Dimitri Yarosh's Pravy Sektor members by the Pravy Sektor sweatshirt they have on. Noted above, Pravy Sektor admitted to killing the people at the Maidan protest and sparked the coup.
  • Going further with the linked Euromaidanpress article the hackers say "Let's understand that Ukrainian hackers and Russian hackers once constituted a single very powerful group. Ukrainian hackers have a rather high level of work. So the help of the USA I don't know, why would we need it? We have all the talent and special means for this. And I don't think that the USA or any NATO country would make such sharp movements in international politics."
  • What sharp movements in international politics have been made lately? Let me spell it out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored, Russian language hackers in Eastern European time zones have shown with the Surkov hack they have the tools and experience to hack states that are looking out for it. They are also laughing at US intel efforts.
  • The hackers also made it clear that they will do anything to serve Ukraine. Starting a war between Russia and the USA is the one way they could serve Ukraine best, and hurt Russia worst. Given those facts, if the DNC hack was according to the criteria given by Alperovitch, both he and these hackers need to be investigated.
  • According to the Esquire interview "Alperovitch was deeply frustrated: He thought the government should tell the world what it knew. There is, of course, an element of the personal in his battle cry. "A lot of people who are born here don't appreciate the freedoms we have, the opportunities we have, because they've never had it any other way," he told me. "I have."
  • While I agree patriotism is a great thing, confusing it with this kind of nationalism is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering a conflict with Russia that is against American interests, he's a patriot. He isn't serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to Ukraine.
  • The evidence presented deserves investigation because it looks like the case for conflict of interest is the least Dimitri Alperovitch should look forward to. If these hackers are the real Cozy Bear and Fancy Bear, they really did make sharp movements in international politics. By pawning it off on Russia, they made a worldwide embarrassment of an outgoing President of the United States and made the President Elect the suspect of rumor.
Obama, Brazile, Comey, and CrowdStrike

According to Obama the hacks continued until September 2016. According to ABC, Donna Brazile says the hacks didn't stop until after the elections in 2016. According to Crowdstrike the hacks continued into November.

Democratic National Committee Chair Donna Brazile said Russian hackers persisted in trying to break into the organization's computers "daily, hourly" until after the election -- contradicting President Obama's assertion that the hacking stopped in September after he warned Russian President Vladimir Putin to "cut it out."-ABC

This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney , the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best.

The DNC fiasco isn't that important of a crime. The reason I say this is the FBI would have taken control over material evidence right away. No law enforcement agency or Intel agency ever did. This means none of them considered it a crime Comey should have any part of investigating. That by itself presents the one question mark which destroys any hope Mueller has proving law enforcement maintained a chain of custody for any evidence he introduces.

It also says the US government under Barrack Obama and the victimized DNC saw this as a purely political event. They didn't want this prosecuted or they didn't think it was prosecutable.

Once proven it shows a degree of criminality that makes treason almost too light a charge in federal court. Rest assured this isn't a partisan accusation. Team Clinton and the DNC gets the spotlight but there are Republicans involved.

Further reading

[Dec 04, 2019] June 2nd, 2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams by George Webb

Highly recommended!
Nov 27, 2019 | www.youtube.com

Investigative Jouralist George Webb worked at MacAfee and Network Solutions in 2000 when the CEO Bill Larsen bought a small, Moscow based, hacking and virus writing company to move to Silicon Valley.

MacAfee also purchased PGP, an open source encryption software developed by privacy advocate to reduce NSA spying on the public.

The two simultaneous purchase of PGP and the Moscow hacking team by Metwork Solutions was sponsored by the CIA and FBI in order to crack encrypted communications to write a back door for law enforcement.

Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike.

In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives.

[Nov 30, 2019] Beyond The DNC - Leaks, Hacks, and Treason by George Eliason George Eliason

Notable quotes:
"... This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney, the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best. ..."
Nov 30, 2019 | www.mintpressnews.com

Here's what's different in the information I've compiled.

At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It is a matter of public record that Team Clinton provided the DNC hackers with passwords to State Department servers on at least 2 occasions, one wittingly and one not. I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators.

This gives some credence to the Seth Rich leak (DNC leak story) as an act of patriotism. If the leak came through Seth Rich, it may have been because he saw foreign Intel operatives given this access from the presumed winners of the 2016 US presidential election. No political operative is going to argue with the presumed president-elect over foreign policy. The leaker may have been trying to do something about it. I'm curious what information Wikileaks might have.

The real crime of the DNC hack wasn't the hack.

If only half of the following proved true in context and it's a matter of public record, that makes the argument to stop funding for Ukraine immediately barring an investigation of high crimes by Ukrainian Diaspora, Democrat, and Republican leaders in Congress, private Intel for hire, and Ukrainian Intel's attacks on the US government and political processes.

Perhaps it's time Donald J. Trump @realDonaldTrump should consider treason investigations across the board. Make America great again by bringing justice and civility back.

DNC Hack – High Crimes or Misdemeanors?

So what went on at the DNC way back in 2016? Do you know? Was it a hack or a leak? Does it matter?

Recently, an investigative journalist who writes under the name Adam Carter was raked over the coals. Carter writes at Disobedient Media and has been providing a lot of evidence supporting the DNC leak story former Ambassador Craig Murray and Wikileaks claim happened.

When the smear article came out and apparently it's blossoming into a campaign, a few people that read both of us wrote to the effect "looks like your work is the only thing left standing." I immediately rebuffed the idea and said Carter's work stands on its own . It has nothing to do with anything I've written, researched, or plan to.

I'd say the same about Scott Humor , Lee Stranahan , Garland Nixon , Petri Krohn , or Steve McIntyre . And there are many others. There has been a lot of good work on the DNC hacks and 2016 election interference. Oftentimes, what looks like contradictory information is complimentary because what each journalist is working on shows the story from a different angle.

https://www.youtube-nocookie.com/embed/q9W3QsO75mM?rel=0&showinfo=0

There are a lot of moving parts to the story and even a small change in focus brings an entirely new story because it comes from a different direction.

Here's what I mean. If the DNC hack was really a leak, does that kill the "hack" story? No, it doesn't and I blame a lot of activist journalists for making the assumption that it has to work this way. If Seth Rich gave Ambassador Craig Murray a USB stick with all the "hacked info," it doesn't change an iota of what I've written and the evidence you are about to read stands on its own. But, this has divided people into camps before the whole situation could be scrutinized and that's still not done yet.

If for example you have a leak on Jan 5th , can you have "a hack" on Jan 6th , 7th, or 8th? Since there is so much crap surrounding the supposed hack such as law enforcement teams never examining the DNC server or maintaining control of it as evidence, could the hacks have been a cover-up?

Hang em' High

According to Obama the hacks continued until September 2016. According to ABC, Donna Brazile says the hacks didn't stop until after the elections in 2016. According to Crowdstrike the hacks continued into November.

Democratic National Committee Chair Donna Brazile said Russian hackers persisted in trying to break into the organization's computers "daily, hourly" until after the election -- contradicting President Obama's assertion that the hacking stopped in September after he warned Russian President Vladimir Putin to "cut it out."-ABC

This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney, the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best.

https://www.youtube-nocookie.com/embed/L3cDZU9Tp7w?rel=0&showinfo=0

The DNC fiasco isn't that important of a crime. The reason I say this is the FBI would have taken control over material evidence right away. No law enforcement agency or Intel agency ever did. This means none of them considered it a crime Comey should have any part of investigating. That by itself presents the one question mark which destroys any hope Mueller has proving law enforcement maintained a chain of custody for any evidence he introduces.

It also says the US government under Barrack Obama and the victimized DNC saw this as a purely political event. They didn't want this prosecuted or they didn't think it was prosecutable.

Once proven it shows a degree of criminality that makes treason almost too light a charge in federal court. Rest assured this isn't a partisan accusation. Team Clinton and the DNC gets the spotlight but there are Republicans involved.

Identifying Team Fancy Bear

There are a couple of caveats that need to be made when identifying the Fancy Bear hackers . The first is the identifier used by Mueller as Russian FSB and GRU may have been true- 10 years ago. This group was on the run trying to stay a step ahead of Russian law enforcement until October 2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and possibly former Russian state security. The majority of the group are Ukrainians making up Ukraine's Cyber Warfare groups.

Identifying the hackers as FSB or GRU today is as helpful and has the same validity as identifying Special Prosecutor Mueller as a cashier at McDonalds because he worked there during school. It's insulting and self-defeating, so stop it.

How Mueller is Making a Russian Attribution for the DNC Hackers

If you look at the attribution section for the Tallinn Manual 2.0 on the International Law Applicable to Cyber and specifically the section that deals with peacetime attributions of a non-state actor/ hacker we have an answer.

The hackers, OSINT, Cyber, spies, terrorists, etc call themselves volunteers to keep safe from State level retaliation, even though a child can follow the money. As volunteers motivated by politics and patriotism they are protected to a degree from retribution.

They don't claim State sponsorship or governance and the level of attack falls below the threshold of military action. Mueller has a lot of latitude for making the attribution Russian, even though the attacks came from Ukrainian Intel. Based on how the rules are written, because the few members of the coalition from Shaltai Boltai are Russian in nationality, Fancy Bear can be attributed as a Russian entity for the purposes of retribution. The caveat is if the attribution is proven wrong, the US will be liable for damages caused to the State which in this case is Russia.

How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they have the ability to research and work in over 30 different languages.

This can be considered an Information Operation against the people of the United States and of course Russia. We'll get to why shortly.

After 2013, Shaltay Boltay was no longer physically available to work for Russia . The Russian hackers were in Ukraine working for the Ukrainian government's Information Ministry which is in charge of the cyber war. They were in Ukraine until October 2016 when they were tricked to return to Moscow and promptly arrested for treason.

From all this information we know the Russian component of Team Fancy Bear is Shaltai Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian Intelligence. We know they are grouped with InformNapalm which is Ukraine's OSINT unit. We know their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above work directly with the Atlantic Council and Crowdstrike's Dimitry Alperovich.

In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged data from the Surkov leak.

But during 2014,2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and CyberHunta went to work for the DNC as opposition researchers.

The First Time Shaltai Boltai was Handed the Keys to US Gov Servers

The setup to this happened long before the partnership with Ukrainian Intel hackers and Russia's Shaltai Boltai was forged. The hack that gained access to US top-secret servers happened just after the partnership was cemented after Euro-Maidan.

In August 2009 Hillary Clinton's Deputy Chief of Staff at the State Department Huma Abedin sent the passwords to her Government laptop to her Yahoo mail account. On August 16, 2010, Abedin received an email titled "Re: Your yahoo account. We can see where this is going, can't we?

"After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin's associates to access email accounts into 2015 and 2016."

Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo hack.

The time frame has to be noted. The hack happened in 2014. Access to the email accounts continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai Boltai was working from Kiev, Ukraine.

So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with looking at the time frame. Ukraine had the keys already in hand in 2014.

The DNC's Team Fancy Bear

The "Fancy Bear hackers" may have been given the passwords to get into the servers at the DNC because they were part of the Team Clinton opposition research team. It was part of their job. Let that concept settle in for a moment.

According to Politico "In an interview this month, Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists , government officials and private intelligence operatives . While her consulting work at the DNC this past election cycle centered on mobilizing ethnic communities -- including Ukrainian-Americans -- she said that, when Trump's unlikely presidential campaign began surging in late 2015, she began focusing more on the research, and expanded it to include Trump's ties to Russia, as well ."

me title=

The only investigative journalists, government officials, and private intelligence operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and the Ministry of Information.

All of these hacking and information operation groups work for Andrea Chalupa with EuroMaidanPR and Irena Chalupa at the Atlantic Council . Both C halupa sisters work directly with the Ukrainian government's Intel and propaganda arms.

Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage, terrorist, counter-terrorism, cyber, propaganda, and info war channels officially recognized and directed by Ukraine's Information Ministry. Along with their American colleagues, they populate the hit-for-hire website Myrotvorets with people who stand against Ukraine's criminal activities.

Alexandra Chalupa hired this particular hacking terrorist group called Fancy Bear by Dimitry Alperovich and Crowdstrike at the latest in 2015. While the Ukrainian hackers worked for the DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the state of the projects they were working on. Let's face it, once you're in, setting up your Fancy Bear toolkit doesn't get any easier. This is why I said the DNC hack isn't the big crime. It's a big con and all the parties were in on it.

Indict Team Clinton for the DNC Hacks and RNC Hack

Hillary Clinton exposed secrets to hacking threats by using private email instead of secured servers. Given the information provided she was probably being monitored by our intrepid Ruskie-Ukie union made in hell hackers. Anthony Weiner exposed himself and his wife Huma Abedin using Weiner's computer for top-secret State Department emails. And of course Huma Abedin exposed herself along with her top-secret passwords at Yahoo and it looks like the hackers the DNC hired to do opposition research hacked her.

Here's a question. Did Huma Abedin have Hillary Clinton's passwords for her private email server? It would seem logical given her position with Clinton at the State Department and afterward. This means that Hillary Clinton and the US government top secret servers were most likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using legitimate passwords.

The RNC Hack

According to the Washington Post , "Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach."

In January 2017 , criminal proceedings started for Edward Nedelyaev under articles 335 'spying' and 343

'inciting hatred or enmity." He was a member of the Aidar battalion. Aidar members have been cited for torture and murder. Although the translation isn't available on the linked video the MGB (LNR equivalent to the FBI) ask Aidar's Nedelyaev about his relationship with Ukraine's SBU. The SBU asked him to hack US presidential candidate Donald Trump's election headquarters and he refused. Asked if this was through convictions, he says no, explaining that he is not a hacker. The video was published on January 10, 2017 .

Taken at face value it really does show the ineptness of the SBU after 2014. This is why Ukraine relied (s) on the Diaspora financed Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, RUH8, Bellingcat, Webradius, InformNapalm and associated parties.

The Ukrainians were hired to get the goods on Trump. Part of that is knowing where to start isn't it?

Fancy Bear's Second Chance at Top Secret Passwords From Team Clinton

How stupid would the Fancy Bear teams of Shaltai Boltai, CyberHunta, Ukrainian Cyber Alliance, and RUH8 be if they had access to the DNC servers which makes it easier to get into the US State servers and not do that if it was their goal?

One very successful method of hacking is called social engineering. You gain access to the office space and any related properties and physically locate the passwords or clues to get you into the hardware you want to hack. This includes something as simple as looking over the shoulder of the person typing in passwords.

Let's be clear. The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC opposition research. On different occasions, Fancy Bear handler Kristina Dobrovolska traveled to the US to meet the Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea Chalupa, US Dept of State personnel, and most likely Crowdstrike's Dimitry Alperovich. Alperovich was working with the hackers in 2015-16. In 2016, the only groups known to have Fancy Bear's signature tools called X-tunnel and X-Agent were Alperovich, Crowdstrike, and Fancy Bear (Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does explain a few things.

Here is where it goes from bad to outright Fancy Bear ugly. Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former staff for research purposes from 2013 through prepping for the 2016 election. Were any foreigners part of the opposition research team for Team Hillary in 2014-2015-2016? The Clinton's don't have a history of vetting security issues well.

Let's recap. Clinton keeps 6 top secret passwords for research staff. Alexandra Chalupa is running a research department that is rich in (foreign) Ukrainian Intelligence operatives, hackers, terrorists, and a couple Ruskie traitors.

Kristina Dobrovolska was acting as a handler and translator for the US State Department in 2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to Washington to meet with Chalupa.

Alexandra types in her password to show Dobrovolska something she found and her eager to please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the Fancy Bear crew about it and they immediately get to work looking for Trump material on the US secret servers with legitimate access. I mean, what else could they do with this? Turn over sensitive information to the ever corrupt Ukrainian government?

According to the Politico article , Alexandra Chalupa was meeting with the Ukrainian embassy in June of 2016 to discuss getting more help sticking it to candidate Trump. At the same time she was meeting, the embassy had a reception that highlighted female Ukrainian leaders.

Four Verkhovna Rada deputies there for the event included: Viktoriia Y. Ptashnyk, Anna A. Romanova, Alyona I. Shkrum, and Taras T. Pastukh.

According to CNN, DNC sources said Chalupa told DNC operatives the Ukrainian government would be willing to deliver damaging information against Trump's campaign . Later, Chalupa would lead the charge to try to unseat president-elect Trump starting on Nov 10, 2016.

Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison and translator who escorted the delegates from Kyiv during their visits to Albany and Washington.

Kristina Dobrovolska is the handler manager working with Ukraine's DNC Fancy Bear Hackers . She took the Rada members to dinner to meet Joel Harding who designed Ukraine's infamous Information Policy which opened up their kill-for-hire-website Myrotvorets. Then she took them to meet the Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the surviving nephew to the infamous torturer The WWII OUNb leader, Mykola Lebed.

The Podesta Hack – Don't Mess with OUNb Parkhomenko

I have no interest in reviewing his history except for a few points. Adam Parkhomenko, a Diaspora Ukrainian nationalist almost gained a position in the presumed Clinton White House. As a Ukrainian nationalist, his first loyalty, like any other Ukrainian nationalist, is to a fascist model of Ukraine which Stepan Bandera devised but with a win it would be in America.

During the 2016 primaries, it was Parkhomenko who accused Bernie Sanders of working for Vladimir Putin. Parkhomenko has never really had a job outside the Clinton campaign.

Adam Parkhomenko <img src="https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11.png" alt="Adam Parkhomenko" width="355" height="454" srcset="https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11.png 355w, https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11-235x300.png 235w" sizes="(max-width: 355px) 100vw, 355px" /> Before Clinton declared her candidacy, Parkhomenko started a PAC for Hillary Clinton with the goal of getting millions of people email lists so the support was ready for a Clinton run. After she declared her candidacy, Robby Mook, Hillary's campaign manager decided to sideline Parkhomenko and didn't take on his full staff as promised. He reduced Parkomenko to a quiet menial position when he was brought onboard.

Ultimately, Podesta became responsible for this because he gave Parkhomenko assurances that his staff would be brought on and there would be no gaps in their paycheck. Many of them including Parkhomenko's family moved to Brooklyn. And of course, that didn't happen. Podesta was hacked in March and the Ukrainian nationalist Adam Parkhomenko was hired April 1st .

Today, Parkhomenko is working as a #DigitalSherlock with the Atlantic Council along with the Fancy Bear hackers and many of the people associated with them. Why could this be a revenge hack?

The Ukrainian Intel hackers are Pravy Sektor Ukrainian nationalists. Alexandra Chalupa is also an OUNb Bandera Ukrainian nationalist. This Ukrainian nationalist was on his way to becoming one of the most powerful people in America. That's why.

The DNC Leak- A Patriotic Act

At the same time her aides were creating "loyalty scores ", Clinton, "instructed a trusted aide to access the campaign's server and download the messages sent and received by top staffers. She believed her campaign had failed her -- not the other way around -- and she wanted 'to see who was talking to who, who was leaking to who.2'" After personally reading the email correspondence of her staffers, she called them into interviews for the 2016 campaign, where she confronted them with some of the revelations."-

Forget about the DNC. The hackers may have spent months surfing the US secret servers downloading and delivering top secret diplomatic files to their own government. The people entrusted with this weren't just sloppy with security, this is beyond treason.

It doesn't matter if it was Seth Rich, though I hope it was ( for identification's sake), who downloaded data from the DNC servers. The reasons supporting a leak are described by the Veteran Intelligence Professionals for Sanity (VIPS). This shows clearly why the leak to Wikileaks is much more plausible than a hack for the files taken in what is commonly called the DNC hack. This leak was one "hack" of many that was going on.

Imagine being this person inside the situations described above with the reality hitting you that things were very wrong. Even if they only saw parts of it, how much is too much? US government secrets were being accessed and we know this because the passwords were given out to the research teams the hackers were on.

It is very possible that giving the files to Wikileaks was the only safe way to be a whistleblower with a Democrat president supporting Team Hillary even as Team Hillary was cannibalizing itself. For detail on how the leak happened, refer to Adam Carter at DisobedientMedia.com and the VIPS themselves.

Today, this isn't a Democrat problem. It could just as easily been an establishment Republican.

Ukraine needs to pay for what their Intel Operators/ hackers have done. Stop funding Ukraine other than verifiable humanitarian aid. Call your Congressional Rep.

Next up – We are going to look at who has oversight over this operation and who's footing the bills.

Over the last 4 years, I've researched and written many stories that are still breaking in media today. Over the past 7 months we:

If you want to support investigative research with a lot of depth, please support my Patreon page. You can also support my work through PayPal as we expand in new directions over the coming year. For the last 4 years, it's been almost entirely self-supportive effort which is something when you consider I live in Donbass.

Top Photo | Former Democratic National Committee chair Donna Brazile holds a copy of her book Hacks, detailing the hacking of the DNC, during a meeting of The Commonwealth Club, Nov. 9, 2017, in San Francisco. Marcio Jose Sanchez | AP

George Eliason is an American journalist that lives and works in Donbass. He has been interviewed by and provided analysis for RT, the BBC, and Press-TV. His articles have been published in the Security Assistance Monitor, Washingtons Blog, OpedNews, the Saker, RT, Global Research, and RINF, and the Greanville Post among others. He has been cited and republished by various academic blogs including Defending History, Michael Hudson, SWEDHR, Counterpunch, the Justice Integrity Project, among others.

Republish our stories! MintPress News is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 International License.

[Nov 28, 2019] Guccifer 2.0 certainly didn't make a genuine effort to "conceal a Russian identity," far from it

Nov 28, 2019 | www.reddit.com

Posted by u/PropagandaBot1 1 day ago

Guccifer 2.0 certainly didn't make a genuine effort to "conceal a Russian identity," far from it.

The persona made decisions that would leave behind a demonstrable trail of Russian-themed breadcrumbs, examples include: US politics (domestic)

PropagandaBot1 -1 points · 1 day ago

http://www.softpanorama.org/Skeptics/Political_skeptic/Neocons/Hillary/guccifer20_false_flag_operation.shtml

[Nov 27, 2019] Inside Hillary Clinton s Secret Takeover of the DNC

Notable quotes:
"... I told Bernie I had found Hillary's Joint Fundraising Agreement. I explained that the cancer was that she had exerted this control of the party long before she became its nominee. Had I known this, I never would have accepted the interim chair position, but here we were with only weeks before the election. ..."
Nov 27, 2019 | www.politico.com

Donna Brazile is the former interim chair of the Democratic National Committee. Excerpted from the book Hacks: The Inside Story of the Break-ins and Breakdowns that Put Donald Trump in the White House to be published on November 7, 2017 by Hachette Books, a division of Hachette Book Group. Copyright 2017 Donna Brazile.

Before I called Bernie Sanders, I lit a candle in my living room and put on some gospel music. I wanted to center myself for what I knew would be an emotional phone call.

I had promised Bernie when I took the helm of the Democratic National Committee after the convention that I would get to the bottom of whether Hillary Clinton's team had rigged the nomination process, as a cache of emails stolen by Russian hackers and posted online had suggested. I'd had my suspicions from the moment I walked in the door of the DNC a month or so earlier, based on the leaked emails. But who knew if some of them might have been forged? I needed to have solid proof, and so did Bernie.

So I followed the money. My predecessor, Florida Rep. Debbie Wasserman Schultz, had not been the most active chair in fundraising at a time when President Barack Obama's neglect had left the party in significant debt. As Hillary's campaign gained momentum, she resolved the party's debt and put it on a starvation diet. It had become dependent on her campaign for survival, for which she expected to wield control of its operations.

Debbie was not a good manager. She hadn't been very interested in controlling the party -- she let Clinton's headquarters in Brooklyn do as it desired so she didn't have to inform the party officers how bad the situation was. How much control Brooklyn had and for how long was still something I had been trying to uncover for the last few weeks.

By September 7, the day I called Bernie, I had found my proof and it broke my heart.

***

The Saturday morning after the convention in July, I called Gary Gensler, the chief financial officer of Hillary's campaign. He wasted no words. He told me the Democratic Party was broke and $2 million in debt.

"What?" I screamed. "I am an officer of the party and they've been telling us everything is fine and they were raising money with no problems."

That wasn't true, he said. Officials from Hillary's campaign had taken a look at the DNC's books. Obama left the party $24 million in debt -- $15 million in bank debt and more than $8 million owed to vendors after the 2012 campaign -- and had been paying that off very slowly. Obama's campaign was not scheduled to pay it off until 2016. Hillary for America (the campaign) and the Hillary Victory Fund (its joint fundraising vehicle with the DNC) had taken care of 80 percent of the remaining debt in 2016, about $10 million, and had placed the party on an allowance.

If I didn't know about this, I assumed that none of the other officers knew about it, either. That was just Debbie's way. In my experience she didn't come to the officers of the DNC for advice and counsel. She seemed to make decisions on her own and let us know at the last minute what she had decided, as she had done when she told us about the hacking only minutes before the Washington Post broke the news.

The Friday On the phone Gary told me the DNC had needed a $2 million loan, which the campaign had arranged.

"No! That can't be true!" I said. "The party cannot take out a loan without the unanimous agreement of all of the officers."

"Gary, how did they do this without me knowing?" I asked. "I don't know how Debbie relates to the officers," Gary said. He described the party as fully under the control of Hillary's campaign, which seemed to confirm the suspicions of the Bernie camp. The campaign had the DNC on life support, giving it money every month to meet its basic expenses, while the campaign was using the party as a fund-raising clearinghouse. Under FEC law, an individual can contribute a maximum of $2,700 directly to a presidential campaign. But the limits are much higher for contributions to state parties and a party's national committee.

Individuals who had maxed out their $2,700 contribution limit to the campaign could write an additional check for $353,400 to the Hillary Victory Fund -- that figure represented $10,000 to each of the 32 states' parties who were part of the Victory Fund agreement -- $320,000 -- and $33,400 to the DNC. The money would be deposited in the states first, and transferred to the DNC shortly after that. Money in the battleground states usually stayed in that state, but all the other states funneled that money directly to the DNC, which quickly transferred the money to Brooklyn.

"Wait," I said. "That victory fund was supposed to be for whoever was the nominee, and the state party races. You're telling me that Hillary has been controlling it since before she got the nomination?"

Gary said the campaign had to do it or the party would collapse.

"That was the deal that Robby struck with Debbie," he explained, referring to campaign manager Robby Mook. "It was to sustain the DNC. We sent the party nearly $20 million from September until the convention, and more to prepare for the election."

"What's the burn rate, Gary?" I asked. "How much money do we need every month to fund the party?"

The burn rate was $3.5 million to $4 million a month, he said.

I gasped. I had a pretty good sense of the DNC's operations after having served as interim chair five years earlier. Back then the monthly expenses were half that. What had happened? The party chair usually shrinks the staff between presidential election campaigns, but Debbie had chosen not to do that. She had stuck lots of consultants on the DNC payroll, and Obama's consultants were being financed by the DNC, too.

When we hung up, I was livid. Not at Gary, but at this mess I had inherited. I knew that Debbie had outsourced a lot of the management of the party and had not been the greatest at fundraising. I would not be that kind of chair, even if I was only an interim chair. Did they think I would just be a surrogate for them, get on the road and rouse up the crowds? I was going to manage this party the best I could and try to make it better, even if Brooklyn did not like this. It would be weeks before I would fully understand the financial shenanigans that were keeping the party on life support.

***

Right around the time of the convention , the leaked emails revealed Hillary's campaign was grabbing money from the state parties for its own purposes, leaving the states with very little to support down-ballot races. A Politico story published on May 2, 2016 , described the big fund-raising vehicle she had launched through the states the summer before, quoting a vow she had made to rebuild "the party from the ground up when our state parties are strong, we win. That's what will happen."

Yet the states kept less than half of 1 percent of the $82 million they had amassed from the extravagant fund-raisers Hillary's campaign was holding, just as Gary had described to me when he and I talked in August. When the Politico story described this arrangement as "essentially money laundering" for the Clinton campaign, Hillary's people were outraged at being accused of doing something shady. Bernie's people were angry for their own reasons, saying this was part of a calculated strategy to throw the nomination to Hillary.

I wanted to believe Hillary, who made campaign finance reform part of her platform, but I had made this pledge to Bernie and did not want to disappoint him. I kept asking the party lawyers and the DNC staff to show me the agreements that the party had made for sharing the money they raised, but there was a lot of shuffling of feet and looking the other way.

When I got back from a vacation in Martha's Vineyard, I at last found the document that described it all: the Joint Fund-Raising Agreement between the DNC, the Hillary Victory Fund, and Hillary for America.

The agreement -- signed by Amy Dacey, the former CEO of the DNC, and Robby Mook with a copy to Marc Elias -- specified that in exchange for raising money and investing in the DNC, Hillary would control the party's finances, strategy, and all the money raised. Her campaign had the right of refusal of who would be the party communications director, and it would make final decisions on all the other staff. The DNC also was required to consult with the campaign about all other staffing, budgeting, data, analytics, and mailings.

I had been wondering why it was that I couldn't write a press release without passing it by Brooklyn. Well, here was the answer.

When the party chooses the nominee, the custom is that the candidate's team starts to exercise more control over the party. If the party has an incumbent candidate, as was the case with Clinton in 1996 or Obama in 2012, this kind of arrangement is seamless because the party already is under the control of the president. When you have an open contest without an incumbent and competitive primaries, the party comes under the candidate's control only after the nominee is certain. When I was manager of Al Gore's campaign in 2000, we started inserting our people into the DNC in June. This victory fund agreement, however, had been signed in August 2015, just four months after Hillary announced her candidacy and nearly a year before she officially had the nomination.

I had tried to search out any other evidence of internal corruption that would show that the DNC was rigging the system to throw the primary to Hillary, but I could not find any in party affairs or among the staff. I had gone department by department, investigating individual conduct for evidence of skewed decisions, and I was happy to see that I had found none. Then I found this agreement.

The funding arrangement with HFA and the victory fund agreement was not illegal, but it sure looked unethical. If the fight had been fair, one campaign would not have control of the party before the voters had decided which one they wanted to lead. This was not a criminal act, but as I saw it, it compromised the party's integrity.

***

I had to keep my promise to Bernie . I was in agony as I dialed him. Keeping this secret was against everything that I stood for, all that I valued as a woman and as a public servant.

"Hello, senator. I've completed my review of the DNC and I did find the cancer," I said. "But I will not kill the patient."

I discussed the fundraising agreement that each of the candidates had signed. Bernie was familiar with it, but he and his staff ignored it. They had their own way of raising money through small donations. I described how Hillary's campaign had taken it another step.

I told Bernie I had found Hillary's Joint Fundraising Agreement. I explained that the cancer was that she had exerted this control of the party long before she became its nominee. Had I known this, I never would have accepted the interim chair position, but here we were with only weeks before the election.

Bernie took this stoically. He did not yell or express outrage. Instead he asked me what I thought Hillary's chances were. The polls were unanimous in her winning but what, he wanted to know, was my own assessment?

I had to be frank with him. I did not trust the polls, I said. I told him I had visited states around the country and I found a lack of enthusiasm for her everywhere. I was concerned about the Obama coalition and about millennials.

I urged Bernie to work as hard as he could to bring his supporters into the fold with Hillary, and to campaign with all the heart and hope he could muster. He might find some of her positions too centrist, and her coziness with the financial elites distasteful, but he knew and I knew that the alternative was a person who would put the very future of the country in peril. I knew he heard me. I knew he agreed with me, but I never in my life had felt so tiny and powerless as I did making that call.

When I hung up the call to Bernie, I started to cry, not out of guilt, but out of anger. We would go forward. We had to.

[Nov 09, 2019] They're gettin' the old gang back together

Nov 09, 2019 | caucus99percent.com

lotlizard on Fri, 11/08/2019 - 1:12am

@on the cusp
Debbie Wasserman Schultz could come roaring back as House Appropriations Committee chair.

https://www.miamiherald.com/news/politics-government/article236811358.html

[Nov 07, 2019] Rigged Again Dems, Russia, The Delegitimization Of America s Democratic Process by Elizabeth Vos

Highly recommended!
Images removed.
Notable quotes:
"... The Clinton camp was hardly absent from social media during the 2016 race. The barely-legal activities of Clintonite David Brock were previously reported by this author to have included $2 million in funding for the creation of an online " troll army " under the name Shareblue. The LA Times described the project as meant to "to appear to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid and highly tactical." In other words, the effort attempted to create a false sense of consensus in support for the Clinton campaign. ..."
"... In terms of interference in the actual election process, the New York City Board of Elections was shown to have purged over one hundred thousand Democratic voters in Brooklyn from the rolls before the 2016 primary, a move that the Department of Justice found broke federal law . Despite this, no prosecution for the breach was ever attempted. ..."
"... In 2017, the Observer reported that the DNC's defense counsel argued against claims that the party defrauded Sanders' supporters by favoring Clinton, reasoning that Sanders' supporters knew the process was rigged. Again: instead of arguing that the primary was neutral and unbiased in accordance with its charter, the DNC's lawyers argued that it was the party's right to select candidates. ..."
"... The DNC defense counsel's argument throughout the course of the DNC fraud lawsuit doubled down repeatedly in defense of the party's right to favor one candidate over another, at one point actually claiming that such favoritism was protected by the First Amendment . ..."
"... The DNC's shameless defense of its own rigging disemboweled the most fundamental organs of the U.S. body politic. This no indication that the DNC will not resort to the same tactics in the 2020 primary race, ..."
"... f Debbie Wasserman Schultz's role as disgraced chairwoman of the DNC and her forced 2016 resignation wasn't enough, serious interference was also alleged in the wake of two contests between Wasserman Schultz and professor Tim Canova in Florida's 23rd congressional district. Canova and Wasserman Schultz first faced off in a 2016 Democratic primary race, followed by a 2018 general congressional election in which Canova ran as an independent. ..."
"... Debacles followed both contests, including improper vote counts, illegal ballot destruction , improper transportation of ballots, and generally shameless displays of cronyism. After the controversial results of the initial primary race against Wasserman Schultz, Canova sought to have ballots checked for irregularities, as the Sun-Sentinel reported at the time: ..."
"... Ultimately, Canova was granted a summary judgment against Snipes, finding that she had committed what amounted to multiple felonies. Nonetheless, Snipes was not prosecuted and remained elections supervisor through to the 2018 midterms. ..."
"... Hillary Clinton's recent comments to the effect that Congresswoman Tulsi Gabbard is being "groomed" by Russia, and that the former Green Party Presidential candidate Dr. Jill Stein is a "Russian asset", were soon echoed by DNC-friendly pundits. These sentiments externalize what Gabbard called the "rot" in the Democratic party outward onto domestic critics and a nation across the planet. ..."
"... Newsweek provided a particularly glaring example of this phenomenon in a recent op-ed penned by columnist Naveed Jamali, a former FBI double agent whose book capitalizes on Russiagate. In an op-ed titled: " Hillary Clinton Is Right. Tulsi Gabbard Is A Perfect Russian Asset – And Would Be A Perfect Republican Agent," ..."
Nov 07, 2019 | www.zerohedge.com

Authored by Elizabeth Vos via ConsortiumNews.com,

Establishment Democrats and those who amplify them continue to project blame for the public's doubt in the U.S. election process onto outside influence, despite the clear history of the party's subversion of election integrity. The total inability of the Democratic Party establishment's willingness to address even one of these critical failures does not give reason to hope that the nomination process in 2020 will be any less pre-ordained.

The Democratic Party's bias against Sen. Bernie Sanders during the 2016 presidential nomination, followed by the DNC defense counsel doubling down on its right to rig the race during the fraud lawsuit brought against the DNC , as well as the irregularities in the races between former DNC Chairwoman Debbie Wasserman Schultz and Tim Canova, indicate a fatal breakdown of the U.S. democratic process spearheaded by the Democratic Party establishment. Influences transcending the DNC add to concerns regarding the integrity of the democratic process that have nothing to do with Russia, but which will also likely impact outcomes in 2020.

The content of the DNC and Podesta emails published by WikiLeaks demonstrated that the DNC acted in favor of Hillary Clinton in the lead up to the 2016 Democratic primary. The emails also revealed corporate media reporters acting as surrogates of the DNC and its pro-Clinton agenda, going so far as to promote Donald Trump during the GOP primary process as a preferred " pied-piper candidate ." One cannot assume that similar evidence will be presented to the public in 2020, making it more important than ever to take stock of the unique lessons handed down to us by the 2016 race.

Social Media Meddling

Election meddling via social media did take place in 2016, though in a different guise and for a different cause from that which are best remembered. Twitter would eventually admit to actively suppressing hashtags referencing the DNC and Podesta emails in the run-up to the 2016 presidential election. Additional reports indicated that tech giant Google also showed measurable "pro-Hillary Clinton bias" in search results during 2016, resulting in the alleged swaying of between 2 and 10 millions voters in favor of Clinton.

On the Republican side, a recent episode of CNLive! featured discussion of the Cambridge Analytica scandal, in which undecided voters were micro-targeted with tailored advertising narrowed with the combined use of big data and artificial intelligence known collectively as "dark strategy." CNLive! Executive Producer Cathy Vogan noted that SCL, Cambridge Analytica's parent company, provides data, analytics and strategy to governments and military organizations "worldwide," specializing in behavior modification. Though Cambridge Analytica shut down in 2018, related companies remain.

The Clinton camp was hardly absent from social media during the 2016 race. The barely-legal activities of Clintonite David Brock were previously reported by this author to have included $2 million in funding for the creation of an online " troll army " under the name Shareblue. The LA Times described the project as meant to "to appear to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid and highly tactical." In other words, the effort attempted to create a false sense of consensus in support for the Clinton campaign.

In terms of interference in the actual election process, the New York City Board of Elections was shown to have purged over one hundred thousand Democratic voters in Brooklyn from the rolls before the 2016 primary, a move that the Department of Justice found broke federal law . Despite this, no prosecution for the breach was ever attempted.

Though the purge was not explicitly found to have benefitted Clinton, the admission falls in line with allegations across the country that the Democratic primary was interfered with to the benefit of the former secretary of state. These claims were further bolstered by reports indicating that voting results from the 2016 Democratic primary showed evidence of fraud.

DNC Fraud Lawsuit

The proceedings of the DNC fraud lawsuit provide the most damning evidence of the failure of the U.S. election process, especially within the Democratic Party. DNC defense lawyers argued in open court for the party's right to appoint candidates at its own discretion, while simultaneously denying any "fiduciary duty" to represent the voters who donated to the Democratic Party under the impression that the DNC would act impartially towards the candidates involved.

In 2017, the Observer reported that the DNC's defense counsel argued against claims that the party defrauded Sanders' supporters by favoring Clinton, reasoning that Sanders' supporters knew the process was rigged. Again: instead of arguing that the primary was neutral and unbiased in accordance with its charter, the DNC's lawyers argued that it was the party's right to select candidates.

The Observer noted the sentiments of Jared Beck, the attorney representing the plaintiffs of the lawsuit:

"People paid money in reliance on the understanding that the primary elections for the Democratic nominee -- nominating process in 2016 were fair and impartial, and that's not just a bedrock assumption that we would assume just by virtue of the fact that we live in a democracy, and we assume that our elections are run in a fair and impartial manner. But that's what the Democratic National Committee's own charter says. It says it in black and white."

The DNC defense counsel's argument throughout the course of the DNC fraud lawsuit doubled down repeatedly in defense of the party's right to favor one candidate over another, at one point actually claiming that such favoritism was protected by the First Amendment . The DNC's lawyers wrote:

"To recognize any of the causes of action that Plaintiffs allege would run directly contrary to long-standing Supreme Court precedent recognizing the central and critical First Amendment rights enjoyed by political parties, especially when it comes to selecting the party's nominee for public office ." [Emphasis added]

The DNC's shameless defense of its own rigging disemboweled the most fundamental organs of the U.S. body politic. This no indication that the DNC will not resort to the same tactics in the 2020 primary race,

Tim Canova's Allegations

If Debbie Wasserman Schultz's role as disgraced chairwoman of the DNC and her forced 2016 resignation wasn't enough, serious interference was also alleged in the wake of two contests between Wasserman Schultz and professor Tim Canova in Florida's 23rd congressional district. Canova and Wasserman Schultz first faced off in a 2016 Democratic primary race, followed by a 2018 general congressional election in which Canova ran as an independent.

Debacles followed both contests, including improper vote counts, illegal ballot destruction , improper transportation of ballots, and generally shameless displays of cronyism. After the controversial results of the initial primary race against Wasserman Schultz, Canova sought to have ballots checked for irregularities, as the Sun-Sentinel reported at the time:

"[Canova] sought to look at the paper ballots in March 2017 and took Elections Supervisor Brenda Snipes to court three months later when her office hadn't fulfilled his request. Snipes approved the destruction of the ballots in September, signing a certification that said no court cases involving the ballots were pending."

Ultimately, Canova was granted a summary judgment against Snipes, finding that she had committed what amounted to multiple felonies. Nonetheless, Snipes was not prosecuted and remained elections supervisor through to the 2018 midterms.

Republicans appear no more motivated to protect voting integrity than the Democrats, with The Nation reporting that the GOP-controlled Senate blocked a bill this week that would have "mandated paper-ballot backups in case of election machine malfunctions."

Study of Corporate Power

A 2014 study published by Princeton University found that corporate power had usurped the voting rights of the public: "Economic elites and organized groups representing business interests have substantial independent impacts on U.S. government policy, while average citizens and mass-based interest groups have little or no independent influence."

In reviewing this sordid history, we see that the Democratic Party establishment has done everything in its power to disrespect voters and outright overrule them in the democratic primary process, defending their right to do so in the DNC fraud lawsuit. We've noted that interests transcending the DNC also represent escalating threats to election integrity as demonstrated in 2016.

Despite this, establishment Democrats and those who echo their views in the legacy press continue to deflect from their own wrongdoing and real threats to the election process by suggesting that mere discussion of it represents a campaign by Russia to attempt to malign the perception of the legitimacy of the U.S. democratic process.

Hillary Clinton's recent comments to the effect that Congresswoman Tulsi Gabbard is being "groomed" by Russia, and that the former Green Party Presidential candidate Dr. Jill Stein is a "Russian asset", were soon echoed by DNC-friendly pundits. These sentiments externalize what Gabbard called the "rot" in the Democratic party outward onto domestic critics and a nation across the planet.

Newsweek provided a particularly glaring example of this phenomenon in a recent op-ed penned by columnist Naveed Jamali, a former FBI double agent whose book capitalizes on Russiagate. In an op-ed titled: " Hillary Clinton Is Right. Tulsi Gabbard Is A Perfect Russian Asset – And Would Be A Perfect Republican Agent," Jamali argued :

"Moscow will use its skillful propaganda machine to prop up Gabbard and use her as a tool to delegitimize the democratic process. " [Emphasis added]

Jamali surmises that Russia intends to "attack" our democracy by undermining the domestic perception of its legitimacy. This thesis is repeated later in the piece when Jamali opines : "They want to see a retreat of American influence. What better way to accomplish that than to attack our democracy by casting doubt on the legitimacy of our elections." [Emphasis added]

The only thing worth protecting, according to Jamali and those who amplify his work (including former Clinton aide and establishment Democrat Neera Tanden), is the perception of the democratic process, not the actual functioning vitality of it. Such deflective tactics ensure that Russia will continue to be used as a convenient international pretext for silencing domestic dissent as we move into 2020.

Given all this, how can one expect the outcome of a 2020 Democratic Primary -- or even the general election – to be any fairer or transparent than 2016?

* * *

Elizabeth Vos is a freelance reporter, co-host of CN Live! and regular contributor to Consortium News. If you value this original article, please consider making a donation to Consortium News so we can bring you more stories like this one.

[Nov 07, 2019] DNC Lawyers Argue Primary Rigging Is Protected by the First Amendment

Notable quotes:
"... They also failed to note the voice-modulated phone calls received by the law offices of the Becks which contained a caller-ID corresponding to the law offices of Debbie Wasserman Schultz, a defendant in the case. In light of this context, the Becks hardly appear to be peddlers of conspiracy theory. ..."
Nov 07, 2019 | archive.is

The defense counsel also took issue with Jared Beck for what they termed as: " Repeatedly promoted patently false and deeply offensive conspiracy theories about the deaths of a former DNC staffer and Plaintiffs' process server in an attempt to bolster attention for this lawsuit." This author was shocked to find that despite the characterization of the Becks as peddlers of conspiracy theory, the defense counsel failed to mention the motion for protection filed by the Becks earlier in the litigation process.

They also failed to note the voice-modulated phone calls received by the law offices of the Becks which contained a caller-ID corresponding to the law offices of Debbie Wasserman Schultz, a defendant in the case. In light of this context, the Becks hardly appear to be peddlers of conspiracy theory.

The DNC defense lawyers then argued:

" There is no legitimate basis for this litigation, which is, at its most basic, an improper attempt to forge the federal courts into a political weapon to be used by individuals who are unhappy with how a political party selected its candidate in a presidential campaign ."

The brief continued:

" To recognize any of the causes of action that Plaintiffs allege based on their animating theory would run directly contrary to long-standing Supreme Court precedent recognizing the central and critical First Amendment rights enjoyed by political parties, especially when it comes to selecting the party's nominee for public office."

It appears that the defendants in the DNC Fraud Lawsuit are attempting to argue that cheating a candidate in the primary process is protected under the first amendment. If all that weren't enough, DNC representatives argued that the Democratic National Committee had no established fiduciary duty "to the Plaintiffs or the classes of donors and registered voters they seek to represent." It seems here that the DNC is arguing for its right to appoint candidates at its own discretion while simultaneously denying any "fiduciary duty" to represent the voters who donated to the Democratic Party under the belief that the DNC would act impartially towards the candidates involved.

Adding to the latest news regarding the DNC Fraud Lawsuit was the recent finding by the UK Supreme Court, which stated that Wikileaks Cables were admissible as evidence in legal proceedings.

If Wikileaks' publication of DNC emails are found to be similarly admissible in a United States court of law, then the contents of the leaked emails could be used to argue that, contrary to the defendant's latest brief, the DNC did in favor the campaign of Hillary Clinton over Senator Sanders and that they acted to sabotage Sanders' campaign.

The outcome of the appeal of the DNC Fraud Lawsuit remains to be seen.

Elizabeth Vos is the Co-Founder and Editor in Chief at Disobedient Media .

[Nov 03, 2019] Growing Indicators of Brennan's CIA Trump Task Force by Larry C Johnson - Sic Semper Tyrannis

Highly recommended!
Notable quotes:
"... The Task Force also could carry out other covert actions, such as information operations. A nice sounding euphemism for propaganda, and computer network operations. There has been some informed speculation that Guccifer 2.0 was a creation of this Task Force. ..."
Nov 03, 2019 | turcopolier.typepad.com

Growing Indicators of Brennan's CIA Trump Task Force by Larry C Johnson Larry Johnson-5x7

The average American has no idea how alarming is the news that former CIA Director John Brennan reportedly created and staffed a CIA Task Force in early 2016 that was named, Trump Task Force, and given the mission of spying on and carrying out covert actions against the campaign of candidate Donald Trump.

This was not a simple gathering of a small number of disgruntled Democrats working at the CIA who got together like a book club to grouse and complain about the brash real estate guy from New York. It was a specially designed covert action to try to destroy Donald Trump.

A "Task Force" is a special bureaucratic creation that provides a vehicle for bring case officers and analysts together, along with admin support, for a limited term project. But it also can be expanded to include personnel from other agencies, such as the FBI, DIA and NSA. Task Forces have been used since the inception of the CIA in 1947. Here's a recently declassified memo outlining the considerations in the creation of a task force in 1958. The author, L.K. White, talks about the need for a coordinating Headquarters element and an Operational unit "in the field", i.e. deployed around the world.

A Task Force operates independent of the CIA " Mission Centers " (that's the jargon for the current CIA organization chart).

So what did John Brennan do? I am told by an knowledgeable source that Brennan created a Trump Task Force in early 2016. It was an invitation only Task Force. Specific case officers (i.e., men and women who recruit and handle spies overseas), analysts and admin personnel were recruited. Not everyone invited accepted the offer. But many did.

This was not a CIA only operation. Personnel from the FBI also were assigned to the Task Force. We have some clues that Christopher Steele's FBi handler, Michael Gaeta, may have been detailed to the Trump Task Force ( see here ).

So what kind of things would this Task Force do? The case officers would work with foreign intelligence services such as MI-6, the Italians, the Ukrainians and the Australians on identifying intelligence collection priorities. Task Force members could task NSA to do targeted collection. They also would have the ability to engage in covert action, such as targeting George Papadopoulos. Joseph Mifsud may be able to shed light on the CIA officers who met with him, briefed on operational objectives regarding Papadopoulos and helped arrange monitored meetings. I think it is highly likely that the honey pot that met with George Papadopoulos, a woman named Azra Turk, was part of the CIA Trump Task Force.

The Task Force also could carry out other covert actions, such as information operations. A nice sounding euphemism for propaganda, and computer network operations. There has been some informed speculation that Guccifer 2.0 was a creation of this Task Force.

In light of what we have learned about the alleged CIA whistleblower, Eric Ciaramella, there should be a serious investigation to determine if he was a part of this Task Force or, at minimum, reporting to them.

When I described this to one friend, a retired CIA Chief of Station, his first response was, "My God, that's illegal." We then reminisced about another illegal operation carried out under the auspices of the CIA Central American Task Force back in the 1980s. That became known to Americans as the Iran Contra scandal.

I sure hope that John Durham and his team are looking at this angle. If true it marks a new and damning indictment of the corruption of the CIA. Rather than spying on genuine foreign threats, this Task Force played a critical role in creating and feeding the meme that Donald Trump was a tool of the Russians and a puppet of Putin.

[Aug 28, 2019] Fabricating the Russian DNC Hack by Larry C Johnson

Aug 28, 2019 | turcopolier.typepad.com

I will make this very simple. The DNC emails that ultimately were published on Wikileaks likely originated with a DNC staffer, Seth Rich. It was not the Russians. The decision to blame the Russians was an intelligence construct that was concocted once U.S. and British intelligence officials plotting against Donald Trump realized that Rich had downloaded the emails and was communicating with Julian Assange and his cohorts.

Here are the facts:

  1. It was 29 April 2016 , when the DNC claims it became aware its servers had been penetrated. No claim yet about who was responsible.
  2. According to CrowdStrike founder , Dimitri Alperovitch, his company first supposedly detected the Russians mucking around inside the DNC server on 6 May 2016. A CrowdStrike intelligence analyst reportedly told Alperovitch that:
    1. Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
  3. The Wikileaks data shows that the last message copied from the DNC network is dated Wed, 25 May 2016 08:48:35.
  4. 10 June 2016--CrowdStrike waited until 10 June 2016 to take concrete steps to clean up the DNC network. Alperovitch told Esquire's Vicky Ward that: 'Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office."
  5. On June 14, 2016, Ellen Nakamura, a Washington Post reporter who had been briefed by computer security company hired by the DNC -- Crowdstrike--, wrote:
    1. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.
    2. The intruders so thoroughly compromised the DNC's system that they also were able to read all email and chat traffic, said DNC officials and the security experts.
    3. The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available.
  6. 15 June, 2016, an internet "personality" self-described as Guccifer 2.0 surfaces and claims to be responsible for the hacks but denies being Russian. However, the meta data in the documents posted by Guccifer 2.0 appear to be deliberately crafted to show "Russian" involvement.
  7. The DNC emails that were released on July 22, 2016 by Wikileaks covered the period from January 2015 thru 25 May 2016.

Continue reading "Fabricating the Russian DNC Hack by Larry C Johnson" "

Posted at 02:14 AM in Larry Johnson , Russiagate | Permalink | Comments (2)

Mightypeon , 28 August 2019 at 03:48 AM

The FSB is not really Ruusias CIA equvalent though. It is more akin to an unholy alliance of homeland security and the FBI. GRU is kind of like DIA + the army, navy, air force and marine intelligence. Closest thing to the CIA Russia has would be the SVR, but their overall remit is still somewhat different.
Oscar Peterson , 28 August 2019 at 11:23 AM
Nice laydown. One really needs this sort of step-by-step letdown to get and keep the facts straight.

Some sort of link chart/diagram that could be updated as needed would be great.

Between the DNC emails, the Steele faux-dossier, Seth Rich, Guccifer 2.0, and whatever connection there might be to Skripal and the British, it's really challenging to keep all the players and actions in the right relationship to one another.

One side question: Where does DC Leaks fit into this?

[Aug 19, 2019] The Seth Rich story tells us how corruption spreads. The Mayor of DC, Muriel Bowser, tells Peter Newsham, the guy in charge of the Seth Rich investigation, to shut it down.

Aug 19, 2019 | www.unz.com

si1ver1ock , says: August 17, 2019 at 10:42 pm GMT

The Seth Rich story is coming back to life. A fellow named Butowski is exposing things.

He claims that Ellen Ratner of Fox News told him that Seth Rich and his brother Aaron gave Wikileaks Hillary's emails. Julian Assange is said to have told Ellen Ratner.

The story is that the cover-up came down from now disgraced FBI agent, Andrew McCabe, to the Mayor of DC and on down to the police. They were told to sit on the case.

https://www.youtube.com/embed/0M3Z4eE6cJA?feature=oembed

Twodees Partain , says: August 18, 2019 at 3:27 pm GMT
@si1ver1ock Here's a link to a detailed written article about the Butowski story and the lawsuit he has filed.

https://forbiddenknowledgetv.net/deep-state-have-finally-met-their-match-ed-butowsky/?utm_source=newsletter&utm_medium=email&utm_campaign=Deep+State+Have+Finally+Met+their+Match+-+Ed+Butowsky

Not everyone prefers viewing a video.

Si1ver1ock , says: August 18, 2019 at 1:58 pm GMT
The Seth Rich story tells us how corruption spreads. The Mayor of DC, Muriel Bowser, tells Peter Newsham, the guy in charge of the Seth Rich investigation, to shut it down.

Then, a year later she promotes him to Chief of Police.

[Aug 12, 2019] RAY McGOVERN Rich's Ghost Haunts the Courts Consortiumnews

Notable quotes:
"... That epithet has a sordid history in the annals of U.S. intelligence. Legendary CIA Director Allen Dulles used the "brand-them-conspiracy-theorists" ploy following the assassination of President John F. Kennedy when many objected -- understandably -- to letting him pretty much run the Warren Commission, even though the CIA was suspected of having played a role in the murder. The "conspiracy theorist" tactic worked like a charm then, and now. Well, up until just now. ..."
"... U.S. Courts apply far tougher standards to evidence than do the intelligence community and the pundits who loll around lazily, feeding from the intelligence PR trough. This (hardly surprising) reality was underscored when a Dallas financial adviser named Ed Butowsky sued National Public Radio and others for defaming him about the role he played in controversial stories relating to Rich. On August 7, NPR suffered a setback, when U.S. District Court Judge Amos Mazzant affirmed a lower court decision to allow Butowsky's defamation lawsuit to proceed. ..."
"... NPR gave Isikoff 37 minutes on its popular Fresh Air program to spin his yarn about how the Seth Rich story got started. You guessed it; the Russians started it . No, we are not making this up. ..."
"... It is far from clear that Isikoff can be much help to NPR in the libel case against it. Isikoff's own writings on Russiagate are notably lacking in "verifiable statements of fact" -- information that cannot be verified. ..."
"... In any case, The Washington Post , had already debunked Isikoff's claim (which later in his article he switched to being only "purported") by pointing out that Americans had already tweeted the theory of Rich's murder days before the alleged Russian intervention. ..."
"... Butowsky's libel lawsuit can now proceed to discovery, which will include demands for documents and depositions that are likely to shed light on whatever role Rich may have played in leaking to WikiLeaks . If the government obstructs or tries to slow-roll the case, we shall have to wait and see, for example, if the court will acquiesce to the familiar government objection that information regarding Rich's murder must be withheld as a state secret? Hmmm. What would that tell us? ..."
"... During discovery in a separate court case, the government was unable to produce a final forensic report on the "hacking" of the Democratic National Committee. The DNC-hired cyber firm, CrowdStrike, failed to complete such a report, and that was apparently okay with then FBI Director James Comey, who did not require one. ..."
"... The thorny question of "persuasive sourcing," came up even more starkly on July 1, when federal Judge Dabney Friedrich ordered Robert Mueller to stop pretending he had proof that the Russian government was behind the Internet Research Agency's supposed attempt to interfere via social media in the 2016 election. Middle school-level arithmetic can prove the case that the IRA's use of social media to support Trump is ludicrous on its face. ..."
"... As journalist Patrick Lawrence put it recently: "Three years after the narrative we call Russiagate was framed and incessantly promoted, it crumbles into rubble as we speak." ..."
"... In a long interview with Lauria a few months ago in New Zealand aired this month on CN Live! , Kim Dotcom provided a wealth of detail, based on what he described as first-hand knowledge, regarding how Democratic National Committee documents were leaked to WikiLeaks in 2016. ..."
"... The major takeaway: the evidence presented by Dotcom about Seth Rich can be verified or disproven if President Trump summons the courage to order the director of NSA to dig out the relevant data, including the conversations Dotcom says he had with Rich and Rich may have had with WikiLeaks publisher Julian Assange. ..."
"... Dotcom said he put Rich in touch with a middleman to transfer the DNC files to WikiLeaks . ..."
"... Mark Twain is said to have warned, "How easy it is to make people believe a lie, and [how] hard it is to undo that work again!" After three years of "Russia-Russia-Russia" in the corporate -- and even in some "progressive" -- media, this conditioning will not be easy to reverse. ..."
Aug 12, 2019 | consortiumnews.com

Simply letting the name "Seth Rich" pass your lips can condemn you to the leper colony built by the Washington Establishment for "conspiracy theorists," (the term regularly applied to someone determined to seek tangible evidence, and who is open to alternatives to "Russia-did-it.")

Rich was a young DNC employee who was murdered on a street in Washington, DC, on July 10, 2016. Many, including me, suspect that Rich played some role in the leaking of DNC emails to WikiLeaks . There is considerable circumstantial evidence that this may have been the case. Those who voice such suspicions, however, are, ipso facto , branded "conspiracy theorists."

That epithet has a sordid history in the annals of U.S. intelligence. Legendary CIA Director Allen Dulles used the "brand-them-conspiracy-theorists" ploy following the assassination of President John F. Kennedy when many objected -- understandably -- to letting him pretty much run the Warren Commission, even though the CIA was suspected of having played a role in the murder. The "conspiracy theorist" tactic worked like a charm then, and now. Well, up until just now.

Rich Hovers Above the Courts

U.S. Courts apply far tougher standards to evidence than do the intelligence community and the pundits who loll around lazily, feeding from the intelligence PR trough. This (hardly surprising) reality was underscored when a Dallas financial adviser named Ed Butowsky sued National Public Radio and others for defaming him about the role he played in controversial stories relating to Rich. On August 7, NPR suffered a setback, when U.S. District Court Judge Amos Mazzant affirmed a lower court decision to allow Butowsky's defamation lawsuit to proceed.

Judge Mazzant ruled that NPR had stated as "verifiable statements of fact" information that could not be verified , and that the plaintiff had been, in effect, accused of being engaged in wrongdoing without persuasive sourcing language.

Isikoff: Russians started it. (Wikipedia)

Imagine! -- "persuasive sourcing" required to separate fact from opinion and axes to grind! An interesting precedent to apply to the ins and outs of Russiagate. In the courts, at least, this is now beginning to happen. And NPR and others in similarly vulnerable positions are scurrying around for allies.??The day after Judge Mazzant's decision, NPR enlisted help from discredited Yahoo! News pundit Michael Isikoff (author, with David Corn, of the fiction-posing-as-fact novel Russian Roulette ). NPR gave Isikoff 37 minutes on its popular Fresh Air program to spin his yarn about how the Seth Rich story got started. You guessed it; the Russians started it . No, we are not making this up.

It is far from clear that Isikoff can be much help to NPR in the libel case against it. Isikoff's own writings on Russiagate are notably lacking in "verifiable statements of fact" -- information that cannot be verified. Watch, for example, his recent interview with Consortium News Editor Joe Lauria on CN Live!

Isikoff admitted to Lauria that he never saw the classified Russian intelligence document reportedly indicating that three days after Rich's murder the Russian SVR foreign intelligence service planted a story about Rich having been the leaker and was killed for it. This Russian intelligence "bulletin," as Isikoff called it, was supposedly placed on a bizarre website that Isikoff admitted was an unlikely place for Russia to spread disinformation. He acknowledged that he only took the word of the former prosecutor in the Rich case about the existence of this classified Russian document.

In any case, The Washington Post , had already debunked Isikoff's claim (which later in his article he switched to being only "purported") by pointing out that Americans had already tweeted the theory of Rich's murder days before the alleged Russian intervention.

' Persuasive Sourcing' & Discovery ??

Butowsky's libel lawsuit can now proceed to discovery, which will include demands for documents and depositions that are likely to shed light on whatever role Rich may have played in leaking to WikiLeaks . If the government obstructs or tries to slow-roll the case, we shall have to wait and see, for example, if the court will acquiesce to the familiar government objection that information regarding Rich's murder must be withheld as a state secret? Hmmm. What would that tell us?

Butowsky: Suit could reveal critical information. (Flickr)

During discovery in a separate court case, the government was unable to produce a final forensic report on the "hacking" of the Democratic National Committee. The DNC-hired cyber firm, CrowdStrike, failed to complete such a report, and that was apparently okay with then FBI Director James Comey, who did not require one.

The incomplete, redacted, draft, second-hand "forensics" that Comey settled for from CrowdStrike does not qualify as credible evidence -- much less "persuasive sourcing" to support the claim that the Russians "hacked" into the DNC. Moreover, CrowdStrike has a dubious reputation for professionalism and a well known anti-Russia bias.

The thorny question of "persuasive sourcing," came up even more starkly on July 1, when federal Judge Dabney Friedrich ordered Robert Mueller to stop pretending he had proof that the Russian government was behind the Internet Research Agency's supposed attempt to interfere via social media in the 2016 election. Middle school-level arithmetic can prove the case that the IRA's use of social media to support Trump is ludicrous on its face.

Russia-gate Rubble

As journalist Patrick Lawrence put it recently: "Three years after the narrative we call Russiagate was framed and incessantly promoted, it crumbles into rubble as we speak." Falling syllogism! Step nimbly to one side.

The "conspiracy theorist" epithet is not likely to much longer block attention to the role, if any, played by Rich -- the more so since some players who say they were directly involved with Rich are coming forward.

In a long interview with Lauria a few months ago in New Zealand aired this month on CN Live! , Kim Dotcom provided a wealth of detail, based on what he described as first-hand knowledge, regarding how Democratic National Committee documents were leaked to WikiLeaks in 2016.

The major takeaway: the evidence presented by Dotcom about Seth Rich can be verified or disproven if President Trump summons the courage to order the director of NSA to dig out the relevant data, including the conversations Dotcom says he had with Rich and Rich may have had with WikiLeaks publisher Julian Assange.

Dotcom said he put Rich in touch with a middleman to transfer the DNC files to WikiLeaks . Sadly, Trump has flinched more than once rather than confront the Deep State -- and this time there are a bunch of very well connected, senior Deep State practitioners who could face prosecution .

Another sign that Rich's story is likely to draw new focus is the virulent character assassination indulged in by former investigative journalist James Risen.

Not Risen to the Challenge

Risen: Called Binney a "conspiracy theorist." (Flickr)

On August 5, in an interview on The Hill's "Rising," Risen chose to call former NSA Technical Director Bill Binney -- you guessed it -- a "conspiracy theorist" on Russia-gate, with no demurral, much less pushback, from the hosts.

The having-done-good-work-in-the-past-and-now-not-so-much Risen can be considered a paradigm for what has happened to so many Kool-Aid drinking journalists. Jim's transition from investigative journalist to stenographer is, nonetheless unsettling. Contributing causes? It appears that the traditional sources within the intelligence agencies, whom Risen was able to cultivate discreetly in the past, are too fearful now to even talk to him, lest they get caught by one or two of the myriad surveillance systems in play.

Those at the top of the relevant agencies, however, are only too happy to provide grist. Journalists have to make a living, after all. Topic A, of course, is Russian "interference" in the 2016 election. And, of course, "There can be little doubt" the Russians did it.

"Big Jim" Risen, as he is known, jumped on the bandwagon as soon as he joined The Intercept , with a fulsome article on February 17, 2018 titled " Is Donald Trump a Traitor? " Here's an excerpt:

"The evidence that Russia intervened in the election to help Trump win is already compelling, and it grows stronger by the day.

"There can be little doubt now that Russian intelligence officials were behind an effort to hack the DNC's computers and steal emails and other information from aides to Hillary Clinton as a means of damaging her presidential campaign. Russian intelligence also used fake social media accounts and other tools to create a global echo chamber both for stories about the emails and for anti-Clinton lies dressed up to look like news.

"To their disgrace, editors and reporters at American news organizations greatly enhanced the Russian echo chamber, eagerly writing stories about Clinton and the Democratic Party based on the emails, while showing almost no interest during the presidential campaign in exactly how those emails came to be disclosed and distributed." (sic)

Poor Jim. He shows himself just as susceptible as virtually all of his fellow corporate journalists to the epidemic-scale HWHW virus (Hillary Would Have Won) that set in during Nov. 2016 and for which the truth seems to be no cure. From his perch at The Intercept , Risen will continue to try to shape the issues. Russiagaters major ally, of course, is the corporate media which has most Americans pretty much under their thumb.

Incidentally, neither The New York Times, The Washington Post , nor The Wall Street Journal has printed or posted a word about Judge Mazzant's ruling on the Butowsky suit.

Mark Twain is said to have warned, "How easy it is to make people believe a lie, and [how] hard it is to undo that work again!" After three years of "Russia-Russia-Russia" in the corporate -- and even in some "progressive" -- media, this conditioning will not be easy to reverse.

Here's how one astute observer with a sense of humor described the situation last week, in a comment under one of my recent pieces on Consortium News:

" One can write the most thought-out and well documented academic-like essays, articles and reports and the true believers in Russiagate will dismiss it all with a mere flick of their wrist. The mockery and scorn directed towards those of us who knew the score from day one won't relent. They could die and go to heaven and ask god what really happened during the 2016 election. God would reply to them in no uncertain terms that Putin and the Russians had absolutely nothing to do with anything in '16, and they'd all throw up their hands and say, 'aha! So, God's in on this too!' It's the great lie that won't die."

I'm not so sure. It is likely to be a while though before this is over.

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. Ray was a CIA analyst for 27 years; in retirement he co-founded Veteran Intelligence Professionals for Sanity (VIPS).

[Jul 31, 2019] The democrats are finished as a party of progress since their constitutional change with super delegates etc

Jul 31, 2019 | www.moonofalabama.org

Mathias Alexander , Jul 30 2019 8:13 utc | 74

You want to start looking at the election laws which favout the Democrat/Republican duopoly. The democrats are finished as a party of progress since their constitutional change with super delegates etc. Also consider this analysis


https://archive.org/details/IndispensableEnemies/page/n16

[Jul 28, 2019] Has it crossed anyone's mind that the reason the FBI weren't allowed to view the DNC servers was because they would discover evidence of massive DNC illegality

Notable quotes:
"... Perhaps evidence of direct communication between clapper, brennan, steele, Downer and the British IC in preparation for the attack on the Trump campaign? ..."
"... What if the RussiaGate campaign was planned to go ahead BEFORE the DNC was actually hacked, using faked evidence? What if Seth Rich became aware of this operation and tried to spike it? What if the DNC planned to fake the Russian penetration evidence themselves, but Seth Rich dumped the real stuff? ..."
"... Of course the FBI wasn't allowed to see the actual evidence nor did they request a subpoena to obtain it. ..."
Jul 28, 2019 | turcopolier.typepad.com

walrus , 28 July 2019 at 02:07 AM

Has it crossed anyone's mind that the reason the FBI weren't allowed to view the DNC servers was because they would discover evidence of massive DNC illegality in the form of unattributable clickbait operations and suchlike? Perhaps evidence as well of direct collusion between the DOJ and IC community to destroy Trumps campaign as well?

Perhaps evidence of direct communication between clapper, brennan, steele, Downer and the British IC in preparation for the attack on the Trump campaign?

What if the RussiaGate campaign was planned to go ahead BEFORE the DNC was actually hacked, using faked evidence? What if Seth Rich became aware of this operation and tried to spike it? What if the DNC planned to fake the Russian penetration evidence themselves, but Seth Rich dumped the real stuff?

Fred -> walrus ... , 28 July 2019 at 02:07 AM
Walrus,

Of course the FBI wasn't allowed to see the actual evidence nor did they request a subpoena to obtain it.

[Jul 24, 2019] RAY McGOVERN A Non-Hack That Raised Hillary's Hackles – Consortiumnews

Jul 22, 2019 | consortiumnews.com

On the third anniversary of the release by WikiLeaks of the DNC emails, Ray McGovern looks back at how the DNC diverted the damaging contents into a trumped up conspiracy blaming Russia with no evidence at all.

By Ray McGovern
Special to Consortium News

T hree years ago Monday WikiLeaks published a trove of highly embarrassing emails that had been leaked from inside the Democratic National Committee. As has been the case with every leak revealed by WikiLeaks , the emails were authentic. These particular ones, however, could not have come at a worse time for top Democratic Party officials.

The emails made it unmistakably clear that the DNC had tipped the scales sharply against Democratic insurgent Bernie Sanders, giving him a snowball's chance in hell for the nomination. The posting of the DNC emails is also widely seen as having harmed the the electoral prospects of Hillary Clinton, who could not escape responsibility completely, while a handful of the very top DNC officials were forced to immediately resign.

Relatively few Americans read the actual emails, their attention diverted to the incessant media-fostered question: Why Did the Russians Hack the DNC to Hurt Hillary? For the millions of once enthusiastic Democrats who favored Sanders, however, the disclosure that the nomination process had been fixed came as a bitter pill, leaving a sour taste in their mouths and a passive-aggressive reluctance to promote the candidacy of one they considered a usurper. Having had a huge stake in Bernie's candidacy, they had little trouble seeing through the diversion of attention from the content of the emails.

Clinton Prevails

A mere four days after the WikiLeaks release, a well orchestrated Democratic Convention nominated Clinton, while many Sanders supporters loudly objected. Thus, she began her campaign under a cloud, and as more and more Americans learned of the fraud that oozed through the DNC email correspondence -- including the rigging of the Democratic primaries -- the cloud grew larger and darker.

On June 12, 2016, six weeks before the convention, WikiLeaks publisher Julian Assange had announced in an interview on British TV, "We have upcoming leaks in relation to Hillary Clinton We have emails pending publication."

Independent forensic investigations demonstrated two years ago that the DNC emails were not hacked over the Internet, but had been copied onto an external storage device -- probably a thumb drive. Additional work over recent months has yielded more evidence that the intrusion into the DNC computers was a copy, not a hack, and that it took place on May 23 and 25, 2016.

The DNC almost certainly knew what had happened -- not only that someone with physical access to DNC computers had copied thousands of emails, but also which ones they had copied, and thus how prejudicial to the Clinton campaign they would be when they saw the light of day.

And so, candidate Clinton, the DNC, and the mainstream media (forever quoting anonymous "current and former intelligence officials") appear to have colluded, deciding the best defense would be a good offense. No one knew how soon WikiLeaks would publish the emails, but the DNC offense/defense would surely have to be put in place before the convention scheduled to begin on July 25. That meant there were, at most, six weeks to react. On July 24, about 48 hours after the leaks were published, and a day before the convention, the DNC first blamed Russia for hacking their emails and giving them to WikiLeaks to sabotage Clinton.

A Magnificent Diversion

Clinton: Already blaming the Russians at DNC 2016 convention. (Wikipedia)

Granted, it was a stretch -- and the DNC would have to hire a pliable cybersecurity firm to back up their claim. But they had good reason to believe that CrowdStrike would perform that service. It was the best Clinton campaign manager Robbie Mook and associates could apparently come up with. If they hurried, there would be just enough time to prepare a PR campaign before the convention and, best of all, there was little doubt that the media could be counted on to support the effort full bore.

When WikiLeaks published the emails on July 22, 2016, just three days before the Democratic convention, the propagandists were ready to deflect attention from the damning content of the DNC emails by repeating incessantly that the Russians hacked the emails and gave them to WikiLeaks to hurt Clinton.

It pretty much worked like a charm. The late Senator John McCain and others were quick to call the Russian "hack" an "an act of war." Evidence? None. For icing on the cake, then-FBI Director James Comey decided not to seize and inspect the DNC computers. Nor, as we now know, did Comey even require a final report from CrowdStrike.

Eight months after the convention, in remarks at the Clinton/Podesta Center for American Progress on April 6, 2017, Clinton's PR director, Jennifer Palmieri, could scarcely contain her pride that, after a difficult start, she was ultimately successful in keeping the Russian bear front and center.

Transcribed below (verbatim) are some of Palmieri's more telling remarks when asked to comment, from her insider perspective, on "what was actually going on in late summer/early fall."

" I did appreciate that for the press to absorb the idea that behind the stage that the Trump campaign was coordinating with Russia to defeat Hillary Clinton was too fantastic for people to, um, for the press to process, to absorb . But then we go back to Brooklyn and heard from the -- mostly our sources were other intelligence, with the press who work in the intelligence sphere, and that's where we heard things and that's where we learned about the dossier and the other story lines that were swirling about And along the way the administration started confirming various pieces of what they were concerned about what Russia was doing. [Emphasis added.]

"And we did finally get to the point on October 7, when the administration came out with a very stunning [memorandum]. How stunning it was for both the Director of National Intelligence and the Director of Homeland Security to put out a statement – a long statement – that said with high confidence that Russia was interfering in the election and they were also directing the timing of the leaks. And it named the institutions – WikiLeaks, DC Leaks, and Guccifer – as being Russian-led, and how stunning that was to be that certain and that public. So I do think that the answer for the Democrats now in both the House and the Senate is to talk about it more and make it more real ."

And so, the Magnificent Diversion worked as intended.

Recognizing Liminal Time

But not all journalists fell for it. Patrick Lawrence (once of The Nation , now of Consortium News ) was onto the ruse from the start. He says he had "fire in the belly" on the morning of July 25, 2016, the day the Democratic convention began, and that he dashed off an article "in one long, furious exhale" within 12 hours of when the media started really pushing the "the Russians-did-it" narrative. The title of his article, pointed out to me a few months ago by VIPS member Todd Pierce, was "How the DNC fabricated a Russian hacker conspiracy to deflect blame for its email scandal a disturbing resemblance to Cold War red-baiting."

Lawrence's off-the-cuff ruminations , which Salon published the next day are extraordinarily prescient and worth reading in full. He instinctively recognized the email disclosure-cum-media-obfuscation campaign as a liminal event. Here are some excerpts, reprinted here with Lawrence's permission:

"Now wait a minute, all you upper-case "D" Democrats. A flood light suddenly shines on your party apparatus, revealing its grossly corrupt machinations to fix the primary process and sink the Sanders campaign, and within a day you are on about the evil Russians having hacked into your computers to sabotage our elections Is this how lowly you rate the intelligence of American voters?

The Sanders people have long charged that the DNC has had its fingers on the scale in favor of Hillary Clinton's nomination. The prints were everywhere Last Friday WikiLeaks published nearly 20,000 DNC email messages providing abundant proof that Sanders and his staff were right all along. The worst of these, involving senior DNC officers, proposed Nixon-esque smears having to do with everything from ineptitude within the Sanders campaign to Sanders as a Jew in name only and an atheist by conviction.

The caker came on Sunday, when Robby Mook appeared on ABC's "This Week" and CNN's "State of the Union" to assert that the D.N.C.'s mail was hacked "by the Russians for the purpose of helping Donald Trump." He knows this because "experts" -- experts he will never name -- have told him so.

the Clinton campaign now goes for a twofer. Watch as it advances the Russians-did-it thesis on the basis of nothing, then shoots the messenger, then associates Trump with its own mess -- and, finally, gets to ignore the nature of its transgression (which any paying-attention person must consider grave). Preposterous, readers. Join me, please, in having absolutely none of it. There is no "Russian actor" at the bottom of this swamp, to put my position bluntly. You will never, ever be offered persuasive evidence otherwise. [Emphasis added.]

Trump, to make this work, must be blamed for his willingness to negotiate with Moscow. This is now among his sins. Got that? Anyone who says he will talk to the Russians has transgressed the American code. I am developing nitrogen bends Which way for a breath of air?"

Sad Sequel

A year later Lawrence was commissioned by The Nation to write an investigative report on the so-called "Russian hack." On August 9, 2017, after he interviewed several Veteran Intelligence Professionals for Sanity, among others, The Nation published his findings in an article entitled "A New Report Raises Big Questions About Last Year's DNC Hack." Lawrence wrote, "Former NSA experts, now members of Veteran Intelligence Professionals for Sanity (VIPS), say it wasn't a hack at all, but a leak -- an inside job by someone with access to the DNC's system."

Again, Lawrence got it right -- this time relying less on his own experience and intuition than on applied science as practiced by real technical experts with no axes to grind. But, sadly, that cut across the grain of the acceptable Russia-gate narrative, and a furor erupted among Hillary followers still licking their wounds over her loss. It proved simply too much for them to entertain the notion that Clinton was quite capable, with help from the likes of Mook, to snatch defeat out of the jaws of victory -- without any help from Vladimir Putin.

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. An ex-CIA analyst, his expertise on Russia goes back a half-century. He prepared and briefed The President's Daily Brief for Presidents Nixon, Ford, and Reagan, and in retirement he co-founded Veteran Intelligence Professionals for Sanity (VIPS).

If you value this original article, please consider making a donation to Consortium News so we can bring you more stories like this one.

8197

Tags: DNC Hillary Clinton James Comey John McCain Patrick Lawrence Ray McGovern Robby Mook WikiLeaks

Post navigation ← PATRICK LAWRENCE: Brighter US-Iran Prospects When Warriors Become Saints → 77 comments for "RAY McGOVERN: A Non-Hack That Raised Hillary's Hackles"

Hide Comments


Curious , July 23, 2019 at 23:34

My comment went in where and landed in the ether. If it does get posted as a reply to Realist I apologize for the redundancy. Please delete second attempt

Curious , July 23, 2019 at 23:31

Test

Carolyn Grassi , July 23, 2019 at 23:31

Thanks again Ray for your detailed comprehensive coverage on what may be called The DNC coverup. If only my progressive left-leaning friends in California could see the light of day on this fiasco of Russian hacking. Several times I've sent your excellent analysis to these folks, whose only reply is Silence! Sad really that hatred of Trump and Hillary's loss has blinded them. So like in the McCarthy era out to get folks and today, of all things, with the help of the intelligence community, they used to criticize. I wonder what John le Carre would write about the state of affairs in America. Ray, you have company with Glenn Greenwald and Stephen F. Cohen. I call you Voices in the Wilderness. Keep on writing, speaking out. The country needs you more than ever! sincere thanks, Carolyn Grassi, Pacifica, CA

Hawaiiguy , July 23, 2019 at 16:28

Still waiting for her indictments to roll in, until I see one for jaywalking I'm in firm belief the deep state isn't as close to peril as some may think. Heck Jeffrey Epstein is long gone from the media and he was absolutely the most powerful pedophile walking thr streets. But the Borg is all mighty as defending silence proves once again.

Meremark , July 23, 2019 at 16:10

When the post is the truth, (Mr. McGovern: huzzah, huzzah!), then trolls clog the comments, usually (as in the present case) with by VOLUME, QUANTITY, arguing against a certain Clear Quality of tone in the sound of the ring of Truth.

When the post has little or no truth, then comments are few or self-defeating and the trolls needn't bother fogging the pen and so they don't?

IMO this post seems to have waaaay more comments than usual. hmmmm .

O Society , July 23, 2019 at 14:47

All I can do is shake my head. The 2020 election is on the visible horizon and not only did the actors who rigged the 2016 election for Donald Trump go unpunished and off the hook, we've allowed them to grow bigger and better, and we're going to let them do it again.

http://osociety.org/2019/07/22/the-great-hack-the-film-that-goes-behind-the-scenes-of-the-facebook-data-scandal

emma peele , July 23, 2019 at 18:03

But, but, but Putin

LIBERAL PROF: Big Tech moved 'rock bottom minimum' of 2.6 million votes to Hillary in 2016

A liberal professor and "very strong public supporter of Hillary Clinton" is raising the alarms about Google manipulation of millions of unwitting voters in recent elections, as well as the potential impact for 2020.
Dr. Robert Epstein, former editor of Psychology Today and acclaimed psychologist who founded the Cambridge Center for Behavioral Studies, discussed his research before a subcommittee of the Senate Judiciary Committee on Tuesday, and his testimony was mind-boggling.

"You testified before this committee that Google's manipulation of votes gave at least 2.6 million additional votes to Hillary Clinton in the year 2016. Is that correct?" Sen. Ted Cruz questioned

https://youtu.be/rNvgl38TLvI

robert e williamson jr , July 23, 2019 at 14:45

SWEET! HOWEVER–>> On my local cable satellite channel Vice channel carried a story all about how the russians did it.

You folks out there taking VICE at is word are being played, again, by the MSM.

But how sweet it is caught a clinton behaving worse that NIXON, have the repugniklans right where they belong but alas the dims are still clueless on who to run. So much for our highly touted and worthless 2 party system.

You cannot make this shit up. And to Bobby Kwasnik I can only say "What in the hell are you drinking son?"

Hawaiiguy , July 23, 2019 at 16:31

Took you long 3nough to figure that out, I did the first time they focused on hot Israeli women in forces. It's a total zionist rag.

Drew Hunkins , July 23, 2019 at 14:14

Great comment.

I especially liked "my late husband and I kept asking: where and when are they going to actually start discussing the *content* of the emails themselves? Never."

Alas, so true.

Stay strong AnneR. Don't let them get you down.

Dan , July 23, 2019 at 12:39

You're putting a lot of faith on former experts who got the DNC forensic evidence , how?
and assume that the evidence was not a breadcrumb left to mislead and implicate Seth Rich.
( In some circumstances the perfect hack would have no traces, but if the data will be leaked, the leaker would leave behind misleading evidence.)
Its within russian spycraft to leave behind misleading evidence, implicate someone and
have them killed to cover it up.
I have never seen why these experts have done more than fall for it.
don't know, just say'n

Rob Roy , July 23, 2019 at 14:31

Proof? Julian Assange said several times I heard him myself .so there you are. The emails were leaked from inside the DNC, not hacked by the Russians. That's why JA is being killed off and not allowed any access to the public. BTW, the DNC computers were never examined by the investigators. Why? The day Hillary said, "Seventeen intelligence agencies .." I knew it was a lie that she would build on forever. Besides, I know Putin.

David , July 23, 2019 at 14:46

You are putting a lot of faith in a dubious private entity in the hire of the DNC. No US legal authority examined the DNC's server. Crowdstrike, the dubious entity in the pay of the DNC made a claim that there was a Russian hack but provided no evidence. Not only did they not provide evidence, we have recently learned that they didn't even generate a report. CrowdSstrike claimed that it knew it was a Russian hack because they found Cyrillic writing and the name of a former KGB head. Sounds damned clumsy of the Russians.
William Binney, the former chief technical officer of the NSA was able to determine from the information that is available that it was technically infeasible for their to have been a hack originating in Russia. The material was down loaded internally on to a thumb drive. Binney's assessment corroborates ambassador Graig Muarry's assertion that he received the down loaded material. Both Maurry and Assange publicly requested that they be interviewed by the FBI. The FBI chose not to examine the DNC server. Mueller also chose to decline Maurry and Assange's request for an interview. Mueller stated that "It would have been better to have the FBI forensic experts examine the server but CrowdStrike is a high class outfit." It decidedly is not. Basing his conclusions on the claims of a private entity that was far from being a disinterested party is at best negligent and at worst corrupt. Mueller took extraordinary measures to avoid taking any steps that could yield a result different from what was claimed in his report.

It gets worst for the believers of Russian interference. A federal judge has threatened prosecutors with contempt of court making claims against the Russian internet company whose advertisements were alleged to be efforts to interfered in the US presidential elections that it has no evidence to support. The "Russian interference" hoax has been exposed.

Andrew Thomas , July 23, 2019 at 14:48

Dan, Ray I think if you go back and read everything that Ray was only able to summarize in this particular post, you will discover that the scenario you outlined just does not fit the known facts.

EricT , July 23, 2019 at 15:24

Misleading evidence being left behind is also within our own intelligence agencies as well. See the vault 7 releases.

Eddie , July 23, 2019 at 11:46

What is overlooked in all these shenanigans is the utter depravity that Mdm. Clinton and her cabal of fellow psychopaths reached in order obscure their crimes and to seize power. By blaming Russia and Vladimir Putin for "hacking" into DNC's emails, the Clinton crime family and their useful idiots in the corporate media increased tensions that could have led to a nuclear holocaust.

Clinton and the rest of the fetid cesspool that ran her campaign were willing to risk annihilating the planet so that Clinton could slither in the White House where the gravy train of bribes could flow like the Amazon River. Meanwhile, the corrupt to its core FBI fixed things so that Mdm. Clinton and her cronies did not wind up in the gulag that her husband created when he ran the gravy train.

Roland James , July 23, 2019 at 11:03

In the Dec 5, 2016 issue of The Nation is a column 'En la Lucha' (The fight continues) by Cesar Vargas, co-director of the Dream Action Coalition: "I had known that Trump would become president once it was revealed the Democratic Party had rigged the primary in favor of Hillary Clinton."
Clinton beat Sanders by 3.7 million votes. Sanders has never said that the Democratic primary was rigged, nor has he questioned the legitimacy of the result. Yes, the DNC was biased in favor of Clinton, who has been a Democrat her entire adult life, unlike Sanders, an Independent until he wanted to run for president. ("Progressives who refused to vote for Hillary Clinton in the general election made a 'bad mistake'."-Noam Chomsky. // In a 50R/50D country with a winner-take-all system, 3rd party candidates are the marginal difference. Especially this year in Wi, Mi and Pa.) More below**
My central concern over the last couple of decades has been the Global Climate Crisis, which will likely swamp everything else; the CO2 "bullets" from the Big American Way of Life are already causing death and destruction around the world. In 2015, though i was a Sanders supporter, i was worried that Sanders would 'sow the wind' but likely wouldn't win the Democratic primary. Then many of his energized supporters wouldn't support the Democratic nominee with their votes and/or with their poisonous and conspiratorial rhetoric adding to the Clinton pile-on led by the right wing hate machine. Therefore, the country and the whole world would 'reap the whirlwind' with 'climate change is a hoax' Donald Trump, accelerating the race to catastrophe.

Roland James

** "The infamous hack of DNC emails that "proved" the organization had its thumb on the scale for Clinton? Perhaps nothing has been more frustrating for people in the politics business to address, because the conspiracy is based on ignorance. Almost every email that set off the "rigged" accusations was from May 2016. (One was in late April; I'll address that below.)
Even in the most ridiculous of dream worlds, Sanders could not have possibly won the nomination after May 3 -- at that point, he needed 984 more pledged delegates, but there were only 933 available in the remaining contests. And political pros could tell by the delegate math that the race was over on April 19, since a victory would require him to win almost every single delegate after that, something no rational person could believe. Sanders voters proclaimed that superdelegates, elected officials and party regulars who controlled thousands of votes, could flip their support and instead vote for the candidate with the fewest votes.
In other words, they wanted the party to overthrow the will of the majority of voters.
That Sanders fans were wishing for an establishment overthrow of the electorate more common in banana republics or dictatorships is obscene. (One side note: Sanders supporters also made a big deal out of the fact that many of the superdelegates had expressed support for Clinton early in the campaign. They did the same thing in 2008, then switched to Obama when he won the most pledged delegates. Same thing would have happened with Sanders if he had persuaded more people to vote for him.)
This is important because it shows Sanders supporters were tricked into believing a false narrative. Once only one candidate can win the nomination, of course the DNC gets to work on that person's behalf. Of course emails from that time would reflect support for the person who would clearly be the nominee. And given that their jobs are to elect Democrats, of course DNC officials were annoyed that Sanders would not tell his followers he could not possibly be the nominee. Battling for the sake of battling gave his supporters a false belief that they could still win -- something that added to their increasingly embittered feelings.
According to a Western European intelligence source, Russian hackers, using a series of go-betweens, transmitted the DNC emails to WikiLeaks with the intent of having them released on the verge of the Democratic Convention in hopes of sowing chaos. And that's what happened -- just a couple of days before Democrats gathered in Philadelphia, the emails came out, and suddenly the media was loaded with stories about trauma in the party. Crews of Russian propagandists -- working through an array of Twitter accounts and websites, started spreading the story that the DNC had stolen the election from Sanders. (An analysis provided to Newsweek by independent internet and computer specialists using a series of algorithms show that this kind of propaganda, using the same words, went from Russian disinformation sources [like duran] to comment sections on more than 200 sites catering to liberals, conservatives, white supremacists, nutritionists and an amazing assortment of other interest groups.)
The fact that the dates of the most controversial emails -- May 3, May 4, May 5, May 9, May 16, May 17, May 18, May 21 -- were after it was impossible for Sanders to win was almost never mentioned, and was certainly ignored by the propagandists trying to sell the "primaries were rigged" narrative. (Yes, one of them said something inappropriate about his religious beliefs. So a guy inside the DNC was a jerk; that didn't change the outcome.) Two other emails -- one from April 24 and May 1 -- were statements of fact. In the first, responding to Sanders saying he would push for a contested convention (even though he would not have the delegates to do so), a DNC official wrote, "So much for a traditional presumptive nominee." Yeah, no kidding. The second stated that Sanders didn't know what the DNC's job actually was -- which he didn't, apparently because he had not ever been a Democrat before his run.
Bottom line: The "scandalous" DNC emails were hacked by people working with the Kremlin, then misrepresented online by Russian propagandists to gullible fools who never checked the dates of the documents. And the media, which in the flurry of breathless stories about the emails would occasionally mention that they were all dated after any rational person knew the nomination was Clinton's, fed into the misinformation.In the real world, here is what happened: Clinton got 16.9 million votes in the primaries, compared with 13.2 million for Sanders. The rules were never changed to stop him, even though Sanders supporters started calling for them to be changed as his losses piled up."-Kurt Eichenwald

AnneR , July 23, 2019 at 14:07

Would you by chance be a Dem shill? You certainly seem to be acting as such.

Russia (by which every Dem seems to mean "the Kremlin" "Putin") did *not* interfere in that election for or against the Strumpet, for or against HRC. Talk about "misinformation"!

So now you (and your ilk?) are blaming Sanders' supporters??

So far as I'm aware the neither the DNC (bought by the Clintons) nor HRC herself ever pointed the finger at Bernie's supporters or Bernie himself as culpable of the story you've come up with.

Andrew Thomas , July 23, 2019 at 15:00

You guys never give up, do you? If there is any actual "evidence" of a Russian, or for that matter any other "hack" that comes out tomorrow, I will be utterly amazed and happy to come back to this page to apologize. There will not be any. Mueller may try to suggest that it exists somewhere in the "redactions." But that will be bullshit.

emma peele , July 23, 2019 at 16:30

Trump and Clinton were the 2 most hated candidates in US history and Hillary even picked TRUMP .

with the help of the MSNBC and CNN both in the bag for Clinton,that helped give Trump 6 BILLION in free airtime

and MSNBC fired Ed Shultz fro wanting to cover Sanders ..but that not tampering in election right?

Americans' Distaste For Both Trump And Clinton Is Record-Breaking

No past candidate comes close to Clinton, and especially Trump, in terms of engendering strong dislike a little more than six months before the election.

https://fivethirtyeight.com/features/americans-distaste-for-both-trump-and-clinton-is-record-breaking/

RECORD BREAKING!!

Hillary Clinton is more unpopular than Donald Trump. Let that sink in

"Donald Trump is one of the least popular politicians in the history of the United States. Yet, Trump is still more popular than Hillary Clinton. Let that sink in.

According to the latest Bloomberg National Poll, Trump has a net favorability of 41% whereas Clinton has a net favorability of 39%. If Democrats are to escape the political wilderness, they will have to leave Clinton and her brand of politics in the woods. "

https://www.theguardian.com/commentisfree/2017/jul/19/hillary-clinton-donald-trump-unpopular-polling

There was plenty of fraud during the nomination process My parents waited in line for 6 hrs in AZ because they closed 90% of the polling places in Maricopa country and people had their parties changed from Democrat to republican.Even employees in the state house.

That never happened before.

Paul Merrell , July 23, 2019 at 16:43

Roland, you'll never convince me that Hillary Clinton was preferable to Donald Trump. Both were the product of scraping the bottom of the U.S political barrel, but Trump was never the war-monger that war criminal Hillary Clinton blatantly was and is. Since even Trump was equivocal about his willingness to use military force, neither one was qualified to be president in my book. I do not vote for war criminals or war criminal wannabes. (I've personally experienced war.) You have to be a Peace candidate to cross my threshold of eligibility. Maybe you are different, eager to have more blood on your hands. But do you realize that the U.S. has killed some 20 million foreign people since World War II ended? Do you feel no responsibility for that when you choose for whom to vote?

As for your Russia-Gate B.S., you are visiting the web site that has done more to prove that Russia-Gate has no basis in reality than any other. To begin your encounter with Russia-Gate reality, I recommend the following Google search query:

site: https://consortiumnews.com/ "Consortium News' Record on Russia-gate"

And perhaps top that off with https://consortiumnews.com/2019/07/12/concord-management-and-the-end-of-russiagate/

jmg , July 23, 2019 at 10:38

So, in summary, Brennan, Comey, Clinton, etc. didn't accept the lawful election results, and decided to just lie, like it's nothing, in order to -- in fact -- try to suspend American democracy, start an extremely lucrative -- for some -- second cold war with Russia as the chosen and needed "enemy", and give the power back to the deep state and war profiteers. Simple as that.

George Hebbard , July 23, 2019 at 10:31

This whole story is getting more bizarre. Beside the lying and the false news, and the questions about the potential thumb drive download by Seth Rich (who was later killed, like Jody Foster..) now we see https://www.zerohedge.com/news/2019-07-22/cia-wants-make-it-easier-jail-journalists-congress-isnt-stopping-it which says the government is complicit in destroying our first amendment rights to sensor their evil ways .
Ungh!

jmg , July 23, 2019 at 10:29

So, in summary, Brennan, Comey, Clinton, etc. didn't accept the lawful election results, and decided to just lie, like it's nothing, in order to -- in fact -- try to suspend American democracy and give the power back to the deep state and war profiteers. Simple as that.

jmg , July 23, 2019 at 16:35

Sorry, duplicate post. You can delete this one, thank you.

Perry Logan , July 23, 2019 at 07:19

"A forensic report claiming to show that a Democratic National Committee insider, not Russia, stole files from the DNC is full of holes, say cybersecurity experts.

"In short, the theory is flawed," said FireEye's John Hultquist, director of intelligence analysis at FireEye, a firm that provides forensic analysis and other cybersecurity services."

https://thehill.com/policy/cybersecurity/346468-why-the-latest-theory-about-the-dnc-not-being-a-hack-is-probably-wrong

David , July 23, 2019 at 17:20

Perry, why do you think the FBI chose not to use its own forensic experts? Why would Mueller base his highly inflammatory claims exclusively the of statements made by a private company that was hired by the DNC, a dubious entity that asserts it failed to even generate a report outlining it's conclusions? Why did the FBI decline the requests of Ambassador Maurry and Julian Assange for an interview? The fact is, Mueller failed to produce anything that a reasonable person would define as evidence. For some people, the lack of evidence does not matter. They are certain in the way that religious believers are certain.

Mueller worked assiduously to minimize the risk that he would find evidence that contradicted the result he intended to provide when he undertook his "investigation."

Realist , July 23, 2019 at 05:04

.

Marko , July 23, 2019 at 01:37

I smell a rat in the Hersh / Butowsky saga. Apparently there was a second phone call between Hersh and Butowsky, after the initial one that was so revealing , and which Butowsky wisely recorded. In the second call – not recorded as far we know – Hersh informs Butowsky that Andrew McCabe was his "Deep Throat" in the FBI , who fed him the info and/or documents. This looks like a poison pill to me , one that Hersh went along with either willingly ( more likely – so as to save his own skin ) , or unwillingly as a useful idiot (unlikely – Hersh isn't that dumb ).

The idea that McCabe was a "White Hat" feeding Hersh the info saying that Aaron and Seth Rich were the DNC leakers is laughable , and I think it's quite likely that Isikoff and/or Hersh will use this poison pill to paint Butowsky ( and , by extension , Ty Clevenger , his attorney) as conspiracy cranks. All Hersh has to do is say " Look , I fed this guy a bunch of crap , and he scarfed it up. Only a complete nutjob could believe that McCabe was my source. "

The first , recorded , call may have been all true , or it could have been a set-up from the beginning. I suspect the former. My guess is someone got to Hersh between the first and second call and suggested that he better remove himself from the battlefield , lest something unfortunate happen. The McCabe "poison pill' was his getaway ticket , and he was happy to use it.

Hersh appears to be throwing Butowsky under the bus , and Isikoff will describe the resulting carnage with glee.

I hope I'm wrong about all this.

Dr. William Fusfield , July 23, 2019 at 09:59

Marko you raise several interesting issues about Hersh's role in all this, but it is hard to say what it might actually be without having a transcript of the second phone call with Butowsky. Does such a transcript exist? Or are you going on some other source?

Rob Roy , July 23, 2019 at 14:47

Marko, first of all, Sy Hersh doesn't "throw people under the bus." Never. Second, he's the purist of all journalists. If you think otherwise, you don't know the man, a reporter of whom no other has higher standards in his profession.

geeyp , July 22, 2019 at 23:57

The DNC literally did shoot the messenger in my opinion. Innocent until proven guilty, I know. Hillary Clinton and her underlings need to ask for forgiveness from many, many people in this country. One of the saddest historical footnotes in our history. She is such a pant load.

Dr. William Fusfield , July 22, 2019 at 23:30

I also want to say how much I enjoyed the comments on this and Ray's previous articles. Evidently Consortium readers are an intelligent, clever, and sardonic bunch!!

Dr. William Fusfield , July 22, 2019 at 23:27

Another very fine article, Ray!! The simple truth of this sordid matter is finally going to get a hearing I believe. As for me, who like you and a few others, especially Patrick Lawrence, Glen Greenwald, Aaron Mate and Caitlin Johnstone, could smell the bullshit all the way from the chicken coup from the git-go, I can't wait to sit back, pour myself a nice Guiness in a tall glass, and watch Mr. Mueller fumble around nervously attempting to deal with all of the pointed questions from angry Dems who will be accusing him of not lying enough on behalf of their Russiagate ghost! Anyway, great work, as usual, Ray!!

Ray McGovern , July 23, 2019 at 16:08

Thanks Dr. Fusfield,

Just between us, I only drink on even-numbered days.*** So -- for me, at least -- it was GREAT news that the Mueller testimony would be tomorrow, the 24th, and not the 17th as formerly scheduled. Tomorrow will be a two-Guinness day. My tall glass is crystal-clean and the Guinness is already hidden away in the back of the refrigerator.

I cannot recall ever having had lower expectations from Congressional hearings, but it is, I suppose, always possible that something instructive might inadvertently escape. If so, I am confident the Guinness will be more help than hindrance as muse to any writing I might undertake at that point.

Ray

*** Re the even-numbered days: It's a self-imposed discipline -- a sensible way of coping with my problem of liking "the creature " (as one of my Irish grandmothers called it) far too much. Slainte!

Bill , July 22, 2019 at 22:07

What did Obama know and when did he know it?

Realist , July 23, 2019 at 05:01

Obama knew he was sandbagging the Russians to set them up as all-purpose fall guys later when he spoke to Medvedev about his "flexibility" of action in foreign policy prior to the 2012 election. (First I'll get re-elected, then we'll have a "reset," you'll bend over backwards to accommodate me, and you guys will never know what hit you when I deliver the sucker punch.) In fact, it started long before that conversation.

As soon as he was elected every action he took was against Russian interests or to besmirch their reputation in the public arena, even as Putin took several actions to save Obama's hide, such as giving him the opportunity to duck his rash "red line" statements on Syria when it was clear neither the American people nor the Congress wanted this country in another middle eastern war. Putin also bent over backwards to accommodate American sanctions against Iran in its phony crusade against Iran's non-existent nuclear weapons program.

He rolled Putin on anti-ballistic missile deployments in Romania and Poland, after Dubya had stuck the shiv in by "withdrawing" from the ABM treaty (otherwise known as breaking your word).

He, under the influence of Hitlery, lied to Putin about his true intentions to overthrow and assassinate Gaddaffi rather than simply protect some poor civilians caught between the gunsights of the "evil dictator" and the "brave freedom fighters" defending Benghazi, aka the head choppers from al Qaeda (or whatever their nom du jour). Springtime for Hitlery and al Nusra, winter for Gaddaffi and Libya. This is what happens to suckers who believe anything Washington says.

He and Hitlery set Victoria Nuland and John McCain loose on Ukraine where their minions overthrew the elected government in a bloody coup on the Maidan. Because he wasn't going to be fooled again, Putin acted quickly to preserve critical Russian interests (i.e., their only warm-water naval base and access to the Mediterranean in Crimea). Putin refrained from intervening on the side of the Russian population in the Donbass, nor did he entertain their pleas for annexation by Russia, though he got blamed for these things all the same by Obomber's propaganda machine.

Obama knew definitively that it was Ukraine that shot down the Malaysian passenger plane with a Buk missile, yet he suppressed all evidence of such in the kangaroo court that was held to smear Russia for this terrible event. In fact, I wouldn't put it past his den of spook advisors to have actually had a hand in Ukraine's actions, just as they had in the Maidan. Why does the president of Malaysia believe this? And why were they, the owners of the aircraft, not allowed to participate in the investigation? Just as Russia, which did have significant evidence to present, was not allowed any role in the process, while Ukraine was given a free hand to withhold and manipulate data? Bigger hoax here than the JFK, RFK, and MLK assassinations rolled into one.

Obama's propaganda machine repeatedly blamed Syria for using chemical weapons against civilians, and as a pretext for American involvement in the armed conflict on the side of his mercenary headchoppers, when he knew damned well Syria had no such weapons because the American navy had incinerated them after Assad turned them over via the agreement brokered by the Russians. Always more deception and betrayal directed against Putin and Russia. Are we seeing a pattern that started long before Hitlery masterminded "Russiagate" in the wake of the Wikileaks revelations?

Obama often used John Kerry in the many bait and switch ruses used against Putin and Assad. Putin lobbied hard both in Washington and at the UN for an alliance with the American backstabbers to contain "Isis/Daesh/al Nusra/ al Qaeda" terrorists within Syria. How many times did Putin and Assad think they had a deal, a carefully defined ceasefire, only to have the Syrian army strafed and decimated by American air forces long before the ink dried on the worthless agreements?

Who put the Turks up to downing the Russian fighter bomber as it approached, but didn't cross, the Turkish border? Cui bono? How did that help Turkey? Rather, whose agenda did it actually help? What did Hitlery promise but to escalate that tactic a hundred-fold with the irresponsible "no fly" zone she proposed as part of her foreign policy during the campaign? No doubt that reckless rush to start World War III took a lot of votes away from the witch.

Who helped the internal opposition inside of Turkey to organize the unsuccessful coup against Erdogan? Sure wasn't Putin who apparently saved the guy's life by warning him of more Washington skullduggery. If the Washington Deep State wants to blame someone for Erdogan's purchase of the Russian S-400 missiles defense system and his very fortunate escape from being saddled with that gigantic F-35 contract, blame Obomber and Hitlery for their ill-conceived strikes against foreign leaders. They both need to go back and re-read "the Prince" for comprehension.

I'm sure I'm forgetting most of the outrages and provocations that Obama and Madame President Clinton directed at Putin and Russia (which actual President Trump mindlessly continues). But the point is that this very virulent and focussed anti-Russian movement was hard core policy of the nominally-ruling Democrats from the day they received the baton from Dubya Bush. Obama continued it long after the catastrophic election that Hitlery lost. He continued it till the day Trump was inaugurated, stridently blaming the Russians for stealing the election from Hitlery and punishing them with massive diplomatic expulsions during the height of the holidays and the seizure of millions of dollars worth of uncompensated properties.

All without one iota of proof. Ever. Just like the ever-growing snowball of anti-Russian economic sanctions that Obama, and now Trump with the enthusiastic participation of Congress, started immediately after the coup in Ukraine never had a justifiable foundation and will seemingly never end. How could I nearly have forgotten the sanctions? I guess they get lost in the enormous mass of other groundless actions taken against Russia by Obomber and his muse Hitler. I wonder, will he be proud that he made it all possible if the nuclear-tipped missiles do start flying? Words do not describe how I have come to loathe that deceiving traitor to every principle he ran for office on.

Carry on, Mr. McGovern. I don't know how you can maintain the spirit to face the arduous task of trying to uncover all these depredations every day whilst the perpetrators work overtime trying to deceive and mislead you and other truth-seekers. It must be a stunning experience (not a joyful one) whenever you are able to turn over a relevant rock to expose the vile creatures underneath. Get them, Ray, get them all, before they take down the world in their pursuit of MIC profits and every last resource offered by the planet.

Rob Roy , July 23, 2019 at 14:54

Marko, first of all, Sy Hersh doesn't "throw people under the bus." Never. Second, he's the purist of all journalists. If you think otherwise, you don't know the man, a reporter of whom no other has higher standards in his profession.

Rob Roy , July 23, 2019 at 14:58

Wonderful commentary, Realist, per usual. You speak for me.
One caveat..according to an investigation by a German aeronautical engineer, a BUK didn't take down the airplane it was shot down from the air by another aircraft, not a Russian one.
He offers extensive proof.

Realist , July 23, 2019 at 16:50

Yes, I'm familiar with that possibility. Either could be correct. I didn't want to become too verbose and picayune. We'd need the actual data that Washington and the EU are suppressing to zero in on the truth. The only hypothesis that ought to be discarded upon cursory inspection is that Russia deliberately shot that plane down. That's as crazy as the claim that Putin invaded Ukraine to seize the Donbass. You'd have to assume he loves unnecessary and expensive quagmires the way the conflict has unfolded, when his troops could have occupied Kiev within 48 hours if he did invade. Quagmires are the hallmark of American military actions. Inquiring minds want to know why the Ukie pilot of the jet fighter prowling the vicinity at the time of the shoot-down never testified and later committed suicide. Parsimony says to me: guilty conscience.

Nearly forgot Obama's incendiary goodbye kiss to Putin when he promised retaliatory American action against Russia, perhaps in the form of a cyber attack "at a time and place of our choosing," for its alleged theft of the presidential election. Putin had too much character to use that threat as a constant all-purpose foil against never-ending American provocations. He simply moved on, always trying to improve relations, which some observers, such as PCR, feel is a mistake.

Thanks for the input, RR.

Anonymot , July 23, 2019 at 16:47

Essentially I agree with you, but even you are still riding the surface details. I've been writing for over a decade about this, but since I'm neither a journalist, politician or celebrity, no one pay much attention. That makes me a conspiracy theorist with all of its negative connotations. I'm not that either. Suffice it to say that I'm an American who has lived and worked in many places in the world and politics, domestic and international are a pet passion that I've followed for decades.

Obama and Hillary's anti-Russia drive has its roots in pre-WW II anti-communism when many significant capitalists were friends and financiers of Nazi-Germany. After the war the Dulles brothers took over all American foreign policy as Secretary of State and Director of the CIA. They were joined by many Senators from Joe McCarthy to Sen. Prescott Bush. No one else had the ear of Truman, Eisenhower, Kennedy and Johnson on foreign matters other than State and the CIA with the CIA having information to whisper deeper than State's. That's why we went in to lose Korea, , the Bay of Pigs, and Vietnam. Losses all, they still generates massive profits for the MIC and installed that state of mind throughout the DC bureaucracy. Then came Prescott's son, the CIA in person.

It is my personal assessment, having worked in Arkansas when Clinton was Governor and corruption was just part of the landscape, that the powers of the day had little trouble convincing Bill that he could become very, very wealthy if he just left foreign policy decisions to them and role played. They were right. And when Prescott's grandson, George, was mature enough, he stepped in with his extreme right wing crowd, ready to install regime changes everywhere.

After Bush, when a zebra with Democrat stripes could have won given the catastrophe of baby Bush, I am perfectly convinced that they sought two different minority figures, a woman obsessed by the idea of wealth and fame and very pro- a certain kind of feminism, plus a man who desired wealth, but also had the cause of the blacks to promote. "The loser at the DNC Convention will be President after the winner serves his or her term(s), but the foreign policy is ours and you will enunciate it." Bingo.

Hillary lost because she was unbelievably inept at lying and covering her double-tongued role with Democrats' speeches and Wall Street speeches. She also clearly didn't know anything about foreign affairs despite her flying all over the world for photo ops that gave the impression she did.

When Assange exposed her professional ineptitude and implied he had more (that might include her personal affairs,) who had the anti-Putin idea of returning to the Cold War? It certainly wasn't the well spoken, but ill-informed Hillary. It was classic intelligence agency.

And she lost to a different kind of mad person who thinks walking a tightrope is good foreign policy no matter what the risk. The mindset of the MIC and intelligence agencies have almost got him under control after 2 1/2 years, but the Democrats, still ruled by the Clinton crowd are so inept that we may end up crowded between a Trump win in 2020 or a straightforward coup d'etat.

Ray McGovern , July 23, 2019 at 21:42

Dear Anonymot,

Very helpful remarks: between you and Realist et al. -- what a rich, instructive discussion.

Ray

Ray McGovern , July 23, 2019 at 21:38

Dear Realist,

An excellent tutorial. Very much appreciated.

Ray

Curious , July 23, 2019 at 23:29

Realist, one of your best of the best comments.
Not only did the Nobel Peace winner gladly get involved in the Ukraine coup with 'Victory' Nuland, but they had to do it during Russia's shining moment to the world, the Winter Olympics in Sochi. What arrogance. And, when Obama said about Russia, "well, they don't make anything" my blood curdled.
You make another good point about the tragic downed airliner. Why send the black boxes to the UK? All we heard was 'there was nothing of interest in them', Right. We know Putin was flying back from Brazil that day and with the skill level shown by Ukraine these past few years, they could have mixed up planes. It's hard to say.

And then to have the USB lead the investigation (as Robert reported) with the Netherlands (and the Aussies. Again, why?) when it was reported the USB were the very organization that went to all the ATC towers and confiscated the recording tapes? Russia sent the raw radar data to the investigation team in the Netherlands and they came back with the retort "we can't read them" Russia offered technical experts to help and this was ignored, as was the 2 tests done by the makers of the Buks, Almez-Antey proving the blast pattern was an old model no longer in Russias' inventory but in Ukraines. And they get away with all this crap?
One last thought: Putin heads a country that has 11 time zones, and we have 3. Why do so many people think he is just sitting around twiddling his thumbs trying to upset a US election? And he raised a good point when he said, at that time the House and the Senate were Republican controlled. Did he do that too?
He sees the US invalidating international agreements left and right, causing more and more military activity on his borders because of NATO needing an enemy to stay relevant, not to mention the increased funding of course, which is many times more than his own military funding.
Why meddle in an election? He has enough on his plate with all his ethic issues, and now the encroachment on his borders by the 'good guys with guns and missiles'.
The US population has become more provincial and ethnocentric than I have ever witnessed and most of them don't know how large Russia is. It's a wonderful country.
Because of US ignorance about Russia it's almost as if they perceive it as a little country where Putin has all the time in the world to play games, instead of his real purpose. Which is now to protect his country from the US/NATO military propaganda machine and its hardware surrounding his country. This must take up all of his time, but the ignorant still think he has time to meddle in the corrupt US election system.
It's foolishness to the core. Only Mueller and his ilk have that kind of time and tax money to screw around with wasted time.

Annie , July 22, 2019 at 21:58

Immediately after the leak Robbie Mook immediately said the Russians did it, and I remember thinking how does he know, and saw it as ridiculous, laughable. I was a Sanders supporter, and I knew the Democratic party who is known to side lines their liberals wanted him gone from the beginning. MSNBC helped a lot, since throughout his campaign they would often refer to him as an old curmudgeon.

mbob , July 22, 2019 at 21:49

"Thus, she began her campaign under a cloud, and as more and more Americans learned of the fraud that oozed through the DNC email correspondence -- including the rigging of the Democratic primaries -- the cloud grew larger and darker."

Dear Ray,

The most detailed description of how the DNC rigged the primary process -- and the evidence in favor of it -- is in "Democracy Lost: A Report on the Fatally Flawed 2016 Democratic Primaries." (You can find it on the web.) It's independent of Wikileaks.

It provides at least 6 different sources of evidence supporting its allegation of DNC rigging. [1] Direct voter suppression that disproportionately affected Sanders. [2] Registration tampering (with photocopies of altered ballots.) [3] Inaccurate voting machine counts favoring Clinton (Clinton received unaccountably more votes in precincts using the most "hackable" machines. In all states, Clinton performed best on machines that don't leave a paper trail.) [4] Exit poll discrepancies of a unprecedented amount, which did not occur in Republican primaries held on the same day! [5] Eyewitness caucus abuses, as in Iowa and Nevada. [6] DNC collusion with media to smear Sanders.

It states that the combined effects of the rigging was more than enough to have thrown the nomination to Clinton.

I've never seen any debunking of this report which (at least superficially, appears sound and) was written by credible authors.

But, on the other hand, I've seen no independent validation of the report by anyone, including Consortium News.

Do you know anything about it?

Yours

mbob

John Drake , July 22, 2019 at 21:46

Way to go Ray. I find the comment about " Is this how lowly you rate the intelligence of American voters" interesting because it is so accurate-the lowly bit that is. With the assistance (collusion) of the MSM the whole sordid scam has become the dominant paradigm, especially as liberals grasp at the American tradition of red baiting (even though those former reds are devout capitalists) to find sketchy ways of ousting Trumpenfuhrer. Unfortunately these efforts are by passing his more real faults and making the Democrats looking like fools and sore losers. Now he can play the" oh poor me I am being picked on game."
The Clinton family has done tremendous damage to our nation, from financial deregulation, the bombing of Yugoslavia and Libya, influence peddling and fixing the election among many other sins.

Litchfield , July 23, 2019 at 11:51

Agree.
Only an idiot could think that trying to bring Trump down by, basically, bringing false charges against him was a good long-term strategy. Of course, they t hought the strategy only had to be short-term, until Hillary won the election, became president, and could then really deliver the corpse of Trump.

But some on the "left" are still hewing to this concept that Trump is so bad that Mueller must be right about *something.* They still do not get that this false accusation has *helped* Trump, not hurt him. Meanwhile he has gotten away with murder in another part of the forest.

These smart folks are so stupid.

Jeff Harrison , July 22, 2019 at 20:40

Thank you, Ray for a very good summary and thank you also for highlighting how shabbily The Nation treated Patrick after he gave them some very fine work. Now all we need is for people who write the narrative in the MSM to start telling the truth and that would be a neat trick.

Gary Steinberg , July 23, 2019 at 05:54

Once one sells his soul, he doesn't get it back And today, Brenner and Crapper work for MSM. RT probably more reality-based than CNN. This news coup is more than 50 years in the making and has taken quite a toll on the state of the American mind. So, quite a trick,
indeed.

Heman , July 22, 2019 at 19:08

Through all this, the media never focused on the emails themselves, at least to any real extent. Whether the information became available through a hack or download seems a minor issue that someone is deliberately trying to right the election of the president of the United States.

If for example, the worst sort of person fingered an actual murderer, would you ignore the murderer and go after the person who fingered them. It could only be accomplished if those who had the power to do that actually conspired to do it.

M. McGovern does an excellent job in the article making clear what happened. But was it really important, at least as important, that the evil Russians did or did not do it. An objective observer would be grateful that someone or some agency bought the information to light.

Of on top of it all is the gross hypocrisy surrounding the issue. We make Russia look like pikers when it comes to interference and comparing parties that interfere with our elections, do we really want to focus only on Russia?

AboutWhich , July 23, 2019 at 11:30

Heman, I'm surprised no one has attempted to respond to your two comments. They are both inane. Trolling are you?

As for Tulsi, she left the DNC way before these leaked emails, and for the same reason as what they exposed but which DEM-Americans ignored. What does her leaving say about her? That she's not easily duped. Honest truth-seekers usually aren't.

To Ray, great article!

Jack Schiht , July 22, 2019 at 18:18

All this resulting in the Seth Rich murder cover up, even Donna Brazille is still disturbed by the Seth Rich murder, but no one else in Washington DC is permitted to even remember the Seth Rich murder.
This cover up turned into an excuse for losing the election, and immediately after the election it was the outline of the coup, fleshed out by the professionals who do this to normally protect our country. This is a plot worthy of the professionals who wrote the script and starred in the roles.
The coup is ongoing and given legitimacy and dignity by all but a few in Washington DC.
No one dares do anything about it, Barr is waiting for the election to see if perhaps he can drop the charade of concern over this coup.
It may be up to we the people to stop this coup, and we don't have use of the courts. We have other options.

Uros Ruma , July 22, 2019 at 18:02

Brilliant article!

Eric32 , July 22, 2019 at 17:55

How much of this bizarre behavior and story lining can be compared to the behavior of drug addicts and alcoholics being told they're messed up – that they have a problem?

They're inside a fantasy, they need the fantasy, they're being told that it is a fantasy. Many people have seen how bizarre the antics, lying, avoidance, deception can get with such individuals. I think we're seeing it being played out by a group.

Anonymous , July 22, 2019 at 20:17

There is a massive difference – one uses it as a crutch to cover up a wound and make it through the day, the other uses it as a pogo stick. Politicians and bigshots don't need this fantasy – they knowingly use it as a weapon.

Nathan Mulcahy , July 22, 2019 at 17:46

Russian Collusion = Saddam's WMD 2.0.

Also a test to recognize the sheetlet from the thinking.

Heman , July 22, 2019 at 17:42

"Is this how lowly you rate the intelligence of American voters? " Quoted above from Lawrence article. That was 2016, it is now 2019, so now you know. Maybe something better to describe us than intelligence. Gullible,, conditioned, intellectually lazy and just too much to think about, all come to mind.

In all this Tulsi Gabbard comes to mind, resigning in protest. What does that say about her as a presidential candidate?

Fran Macadam , July 22, 2019 at 16:55

If only the truth could make it to the bought corporate media hacks, and not be spiked.

evelync , July 22, 2019 at 16:33

Thank you Ray (Veteran Intelligence Professional for Sanity) McGovern.
Your recounting of what really happened is like a balm for the open wound of having to hear the bullcrap shoveled on us ad nauseum .
And perhaps the saddest part of this very sad tale of the loss of a progressive candidate who could have changed the course of this country for the better – (victims of that kneecapping of the Sanders campaign include our democracy, the millions of people who lost so much as the neoliberal DNC machine including the Clintons helped shift the country away from New Deal protections and also include the millions of people around the world dislocated or destroyed by our corrupt foreign policy that feeds our MICIMATT)- the saddest part is that the political candidate who had fought for working people against the corruption of the DNC machine was then turned on for biting his lip and saying that Mrs Clinton was a better choice than Mr Trump possibly because Sanders may have considered it important, for example, that a Clinton Supreme Court choice would not have included a Kavanaugh .
Senator Sanders' key supporter then and now, philosopher Cornel West, did not follow that lead (nor did I but it was easy in Texas to cast a protest vote)

Human history I'm sure is filled with this kind of chicanery.
We're living a nasty lesson not least of which is how our courageous whistleblowers and their publishers are punished for simply sharing the truth when that truth hurts powerful people ..

Lies, cleverly spun, seem to be more easily accepted. Even though they never quite pass the smell test.
Yes, General Powell, that smell test included your sorry performance at the U.N.

And Secretary Clinton – if you had spun around in 2016 during that ill-fated presidential debate and said "back off fat man" more voters might have trusted you enough to cast their ballot for you.
But true to form for you, calculated political correctness, apparently, meant more to you than the honesty and courage to show your unhappiness with Trump's ill manners

ethan allen , July 22, 2019 at 20:51

Re: evelync
Excellent comment!! And thanks to Ray McGovern for acknowledging the prescience and professional journalism of Patrick Lawrence, not only his seeing through the duplicity and cowardly corruption of the political operatives and their sycophantic media stenographers, but for being determined to inform a disillusioned, confused and too often hostile electorate.
As Usual,
EA

Bobby Kwasnik , July 23, 2019 at 00:48

Please don't try to disguise your insanity in a veiled love-fest with Mr. McGovern. As evidenced by this weeks news about the inability for Sanders to even run the economics of his own 2020 campaign, why do you think that he could run the economics of a nation? And after everything Mr. McGovern has written, you still acquiesce to Clinton as the shining light on the hill. Delusional! All things being equal, at the very least, if President Trump was not elected none of us would even know about all the shams and shenanigans of Clinton and the DNC.

Susan J Leslie , July 23, 2019 at 08:32

Talk about delusional – you are the epitome. Trump is no better than the rest – he just can't stop his tiny fingers from twittering and his orange mouth from blithering

Blessthebeasts , July 23, 2019 at 12:12

It's unfortunate that the Republicans, like Mueller, are going along with the Russian meddling BS. This is the central piece of the whole sordid affair and of course has no basis in fact. Pull it out of the narrative and it all comes tumbling down. Tomorrow's testimony is the perfect setting to expose the sham but sadly, the Republicans will not seize the opportunity.

Mangy vermen , July 23, 2019 at 15:29

A man uncovers massive coordinated INTERNAL election fraud and corruption within the democratic party and was silenced to protect and secure the biggest election fraud in U S history, the 2016 DNC primary .the evidence on the DNC servers would not only reveal the insider who leaked, it could have exposed a hell of a lot of worse crimes..like voting infrastructure Fixing predicted outcomes..but also who covered it up,and the intelligence agencies involvement, including their MSM spokesman ..

evelync , July 23, 2019 at 12:33

Sorry Bobby Kwasnik, I did not intend to imply that Hillary Diane Rodham Clinton is a shining light – far from it. I am unable to come up with anything she stood for or accomplished that did not seem calculated to achieve personal power for herself. Many of the policies she supported both foreign and domestic obviously served the financial interests of the oligarchs who are taking us down a dangerous path leading to unsustainability and planetary destruction.
The dangerous path I'm referring to is covered in today's Tomgram written by Andrew Bacevich.
Typing this into your search engine, if you're interested, should bring it up for you:
"Tomdispatch Andrew Bacevich future history"
Btw, as you may know, retired army colonel and Boston University history prof. Andrew Bacevich is I think a true conservative, so rare today.
Are you sure that Donald Trump's election had anything to do with the exposure of the "shams and shenanigans"? I think a lot of that credit goes to the work done by wikileaks and their sources.
(There are plenty of other publications that expose the Clinton machine – Clinton Cash by Peter Schweizer is one. BTW, the sleazy way Donald Trump earned his wealth is nothing to be proud of either.)
We're all caught up in a maelstrom of insanity, IMO. Believing that Donald Trump is anything but a self promoter and smooth talker and genius political manipulator may eventually leave you disappointed. He may occasionally do the right thing by the people of this country but only when he thinks it will serve his own momentary/monetary interests.
I'm willing to openly admit to you that my mental health is no better or worse than most ..
It's a wonder that we're not all running around screaming, lol.
Cheers.

b.grand , July 23, 2019 at 20:38

" .the saddest part is that [Sanders] . was then turned on for biting his lip and saying that Mrs Clinton was a better choice than Mr Trump "

No, he got what [the disdain] he deserved. The real saddest part was that he didn't really fight for the nomination. He was the PC "gentleman" who gave the Hildabeast an easy ride. Bobby Kwasnik got you more right than you realize. Trump was the better choice. Without him, all the DNC shenanigans would have been swept under the rug and almost everyone would have gone back to sleep. Instead of pussy hatted marchers, the "women" would have been swooning, like the Blacks swooned for Obama.

Bad as it is, this beats Pres. Hilligula, and Sanders weakness lost him much support that's not coming back, and shouldn't.

Clark M Shanahan , July 23, 2019 at 12:49

Sorry Bobby, Trump did win the electoral college.
and:
"As evidenced by this weeks news about the inability for Sanders to even run the economics of his own 2020 campaign,"

I really was annoyed with all those "Hillary's got the Chops" trolls, in 2016.

And today: Many in the "Cult of Mueller" need to acknowledge, just as Noam Chomsky stated, that Russiagate has probably procured the 2020 election for Trump.
The snark from the Cult is simply abusive. Besides being wrong with your contention, Sanders belongs nowhere in the subject at hand.

Stygg , July 23, 2019 at 13:40

So you think the President "runs the economics of a nation"?

Val Taire , July 23, 2019 at 13:08

Regarding your concluding paragraph: Hillary would never state "back off fat man" because it was she, Bill and DNC who approved Trump as her Presidential "Pied Piper" opponent. Any doubt, view Robert Reich's blog from early 206 to General Election 2016. Comments on his blog are littered with HRC trolls demanding our votes while we steadfastly maintained she was not worthy of our votes. Yes, based on her Wikileaks, based on her usurping Bernie, based on her CF, based on her support of rapist spouse while labeling us "misogynists", based on her Pied Piper Strategy -- we informed Reichwing HRC Camp that Trump would win the Presidency.

Hilly was lazy. Pied Piper campaign required no effort and MSM was more than happy to water carry the Pied Piper Strategy for Hilly. Hilly could though, campaign in Hollywood, Harvey's and Rothschild's Creme de la creme fundraisers in Cape Cod, Martha's Vineyard and Hamptons -- but ignore Wisconsin and PA, correct?

I'll point out other points regarding her "ill-fated Presidential debate". Demanding Bernie"s tax records while CF had their CF charity license revoked in State of Massachusetts for financial and other irregularities; simultaneously, Eric Schneiderman was intentionally withholding investigation of CF. I'm fact, Clinton's were forced to revile NY CF tax records.

Goldman Sachs paid speeches by Hillary was the other Huuuge point raised during that "ill-fated" debate. She promised to release these yet failed to do so. How did we receive content of those speeches? Through leakers, yes GS employees and excerpts from WL.

Furthermore, it wasn't "political correctness" that kept Hilly from yelling "back off fat man". It was fear of being exposed for Pied Piper Strategy; after all, even WL had evidence of her Pied Piper gem. You refer also to Trump's ill manners in your last paragraph while ignoring Hillary's legendary ill manners. Eighteen years post BillyBoy's Cigar Capers, she has Vanity Fair disinvite Monica Lewinsky from a NY Gala which Monica had already RSVP'd to. There are man ex-SS employees who can attest to her ill manners as well.

In closing, I'll leave you with two names that speak volumes about Hilly's ill manners and seething anger upon being exposed for her lies and corruption. Harmon Wilfred and Julian Assange. Harmon was Hilly's first political refugee, simply because he had records of Gov. Clinton's financial corruption. He was forced to flee to Canada, where Hilly sent Michael Horowitz and other prosecutor goons to falsely imprison and litigate him. Later, when serving in DC, same Michael Horowitz (now IG Horowitz), had Harmon"s children removed from him. Yes, Horowitz was serving on a Child Abuse Advisory Board (voluntary position) and arranged for that gross miscarriage of justice. Twenty years later, Harmon sits in NZ, stateless, without a passport, imprisoned by Hilly's and Five Eyes Mafiaosa type agreement. Should Harmon attempt to leave NZ , he faces immediate extradition to US. Should his Canadian wife attempt to visit him, she is banned at most ports. She will face arrest.

Trump will win 2020. Bernie is not an option, he has been fully co-opted courtesy of Hilly and DNC. DNC has intentionally flooded Presidential race with twenty-one candidates, one of whom is an AWAN House Dem, Tim "AWAN" Ryan. Julian Castro is twin brother of Joacquin "AWAN" Castro. Should Castro win Presidency, or be selected VP, Castro would have ability to pardon his twin and thirty-one House AWAN Dems. And to be clear, we know this flooding of race is to keep Bernie from receiving highest number of electoral votes. So keep flooding, keep jerking with SuperDelegate rules. I DemExited 2016. The Pied Piper has won. Deal with it.

h , July 22, 2019 at 16:01

Hey Ray, have you read Ed Butowsky's lawsuit? If not, I highly recommend you and your team do so – https://www.scribd.com/document/417578836/Butowsky-Complaint

Chet Roman , July 22, 2019 at 23:27

And Ray should see the short video of Ellen Ratner confirming at a symposium on Nov. 9, 2016 that she had a 3-hour conversation with Assange a few days before (Nov. 5, 2016) and he said that it was not the Russians (as he has been saying for a long time) but was an inside job. In the video she doesn't state that it was Seth and Aaron Rich who gave the emails to Assange but Butowsky claims in his lawsuit that is exactly what Assange told Ratner and asked her to tell Rich's parents to give them some perspective regarding Seth's murder.

https://www.youtube.com/watch?v=0M3Z4eE6cJA

Anonymous , July 22, 2019 at 15:55

If you are an individual and you invent and publish conspiracy theories, you could get sent off to a psychiatric ward and deprived of liberty (including religious liberty in many states) and property without due process – something which is otherwise reserved for enemy combatants ("terrorists") and now (at least seemingly) illegal immigrants.

If you work in mainstream journalism, politics, or public relations, you might get a promotion.

Drew Hunkins , July 22, 2019 at 15:43

The whole notion the Kremlin hacked the '16 prez election or that Moscow somehow interfered in it is the biggest propaganda accomplishment I've ever witnessed. In some ways it's even beyond the 2002/'03 "Saddam has WMD! Saddam's in bed with al-Qaeda" business.

Despite there being absolutely no credible evidence that any such interference existed, millions of otherwise semi-intelligent liberal minded folks have been lapping up this canard as if it were their mother's milk. Mueller's left with egg on his face after his report embarrassingly stated that the Russian's interfered. What a load of malarkey that judge Friedrich has easily seen as having no substance prompting her to slap a well deserved gag order on the prosecutor. A prosecutor who was probably aligned with the Winter Hill gang to one degree or another!

This disconcerting group-think from the liberal intelligentsia should elicit gales of laughter if it weren't so utterly imbecilic and dangerous.

AnneR , July 23, 2019 at 09:40

Yes, Drew H, the "liberal Intelligentsia" continue to indulge in this bizarro groupthink and clearly willingly. One might say, so much for being members of the (self designated) "intelligentsia."

As soon as this whole farrago hit the MSM fan and they began spraying out their DNC cover bullshit, my late husband and I kept asking: where and when are they going to actually start discussing the *content* of the emails themselves? Never.

So one can only conclude that the liberal intelligentsia (of whom many include my late husband's friends – few of whom have continued to be in touch with me because I am far more abrasive than he) are *true* Dem party supporters: i.e. thoroughly bourgeois, very soft left (identitarian politics with a little generalized medicare help for the masses thrown in) and Russophobic under their thin patina of "progressiveness" (whatever that really means).

One might be forgiven, surely, for asking: to what significant end all of that highly expensive secondary and tertiary education if you have fallen for, and remain wedded to, the Clintonite-DNC lies and more lies of Russiagate?

The only answer I can come up with is: that it fits in with their underlying worldview; that it allows them to continue to support the imaginary "left" headed side of the single party. Sanders is hardly a Leninist, but he was, it seems a little too "revolutionary" for the property-owning, deeply corporate-capitalist leaning liberal intelligentsia (as of course, being liberal they would be).

Skip Scott , July 23, 2019 at 15:05

The reason it fits with their "underlying world view" is they are passive consumers of MSM propaganda. They are not critical thinkers. They are also mostly isolated within their little clique, and are purposely separated from the seeing the horrible consequences of our war machine. As long as they can sip on their lattes in Starbucks, check their portfolio on their smart phone, and nobody does a drone strike on them, all is good with their world. The reason they hate Trump so much is that he has ripped off the mask and revealed the hypocrisy. When our "war criminal in chief" was a smooth talking blackish man it was easy to ignore the ugly underbelly of unrestrained capitalism seeking global hegemony. You could put a "Coexist" bumper sticker on your car and forget Obama was having his "Terror Tuesdays" in the company of John Brennan.

b.grand , July 23, 2019 at 21:36

AnneR, there are no heroes: Bernie endorses Russiagate. He's only revolutionary in rhetoric, most of which would never pass any Congress. The way he deferred to Hillary, what hope that he's stand up to R2P & hawkish Dems and the MIC?

[Jul 18, 2019] Brennan used using Dmitri Alperovitch of 'Crowdstrike' as a tool to corrupt the processes of investigation of DNC leaks.

Notable quotes:
"... Moreover, if, as the memorandum asserted, 'British officials' were also aware that the 'most reliable intelligence' exonerated the Syrian government, rather fundamental questions arose as to how the JIC had felt able to claim precisely the reverse in support of David Cameron's unsuccessful attempt on 29 August to win Commons' support for British participation in air strikes. ..."
"... At the time, the Director General, Defence and Intelligence at the FCO was one Robert Hannigan, who in April 2014 would be appointed as Director of GCHQ. The National Security Adviser was a certain Sir Kim Darroch, whose appointment as Ambassador to the U.S. would be announced in August 2015. Both have been in the news, in relation to 'Russiagate.' ..."
"... Obviously, the same question arises about both of them as about Brennan: are they 'Gleiwitz types', who were actively complicit in preparing a murderous 'false flag', or were they simply part of a rather stupid Anglo-American 'dog', whom the 'tail', in the shape of the jihadists and their Turkish, Saudi and Qatari backers, could 'wag', as they chose? ..."
"... From the articles which Seymour Hersh published in the 'London Review of Books', and other materials, it became evident that the Defense Intelligence Agency, then headed by General Flynn, had been aware of the likelihood of fresh 'false flags' -- after the small scale incidents in spring 2013. ..."
"... An argument that 'Sundance' has repeatedly made is that a lot of what was happening in mid-2016, including the dossier attributed to Steele, had to do with the need to find justifications for these questionable surveillance operations. ..."
"... While I think there is something in this, I have long thought that the discovery that a mass of material exfiltrated from the DNC, and was going to be published by 'WikiLeaks', and the subsequent murder of Seth Rich, are likely to have been critically important triggers. ..."
"... panic-stricken improvisation found alike in the dossier, and the claims about the 'digital forensics' made by Dmitri Alperovitch of 'CrowdStrike', and the former GCHQ person Matt Tait. ..."
"... A week later, Butowsky filed a new action, in which the suggestion of a very-wide ranging conspiracy to suppress the truth about both the DNC leaks and Rich's murder was turned into a catalogue of defamation claims against a long list of people, including, as well as a variety of lawyers involved, CNN, the'Nw York Times', Vox, and the DNC. ..."
"... 'That Seth Rich was wacked because he stole the DNC emails and transferred them to Wikileaks is a conspiracy theory. It is possible and even plausible, but there is no evidence to confirm it. Many people seem to believe it because it makes more sense than the competing conspiracy theory, that Russia hacked the DNC and handed the emails to Wikileaks. Isikoff's claim, that Russia planted the Rich conspiracy theory, has no sound base. That theory existed before anything "Russian" mentioned it.' ..."
"... Reading the full text of Ms. Craven's report, I can see quite how well justified was Larry's suggestion in his post that Folkenflik and NPR were on a very sticky wicket indeed (as we say in England.) ..."
"... However, 'fools rush in', as the saying goes, so Isikoff decided to conspire with Deborah Sines, apparently the former U.S. assistant attorney in charge of investigating Seth Rich's murder, to suggest that suggestions that the victim had been the source of the material from the DNC published by 'WikiLeaks' originated as just another Russian plot. ..."
"... It appears that prior to the publication of his 'report', Isikoff talked to Butowsky, who in his efforts to dissuade him explained that his involvement in the whole affair began when Ellen Ratner, a news analyst with Fox, and sister of the late Michael Ratner, who had been an attorney for Assange, contacted him in Fall 2016 about a meeting she had with her that figure. ..."
"... And then, not particularly surprisingly, Butowsky and Clevenger abandoned their inhibitions about identifying Ellen Ratner as a source, and filled in a lot of 'blanks' in their 'narrative' about how Seth Rich lived and died. ..."
"... Among the many problems for Brennan and his co-conspirators -- among whom, on the British side, Hannigan and Darroch, and also Sedwill, are very important -- one relates to the way that the capabilities of 'scientific forensics', in all kinds of areas, have increased by leaps and bounds in recent years. ..."
"... This has meant that they have had little option but to corrupt the processes of investigation. The ludicrous claims by Dmitri Alperovitch of 'Crowdstrike' and the former GCHQ person Matt Tait, which nobody but a fool -- congenital 'useful idiot' one might say -- or a knave would dare to defend in public, are only one of many cases in point. ..."
Jul 18, 2019 | turcopolier.typepad.com

David Habakkuk , 16 July 2019 at 01:14 PM

Larry,

One does not like to admit to having been one of John Brennan's 'useful idiots' -- I had thought I could see through any of the 'active measures' which he and his co-conspirators, on both sides of the Atlantic, could dream up. But I had swallowed whole the notion that Michael Flynn had been stupid enough knowingly to get involved in Erdoğan's feud with Gülen.

In fairness, however, I do think that when dealing with spiders like the former head of the CIA, a prudent fly needs to be sure he, or she, gets competent legal advice at the outset.

It may perhaps be interesting to put your account together with a post by 'Sundance' on the 'Conservative Treehouse' site on 14 July, headlined 'Devin Nunes Discusses Upcoming Mueller Testimony '

This takes up the issue, on which its author has commented extensively, of illegitimate access by contractors to the databases of NSA intercepts -- an issue which is clearly bound up with that of the use of such material to create the 'web' in which Flynn found himself hopelessly entangled.

The post by 'Sundance' suggests, just as you do, that the driving force behind what has happened was actually John Brennan. The April 2017 ruling by FISA Court Presiding Judge Rosemary Collyer does not definitely establish that the illegitimate access of contractors started in 2012, but it definitely strongly suggests that it did.

Reading the 6 September 'Veteran Intelligence Professionals for Sanity' memorandum to Obama, entitled 'Is Syria a Trap?', whose signatories included both you and Colonel Lang, it seemed overwhelmingly likely to some of us who were familiar with both your writings that Brennan had to have been involved in a conspiracy with the Turks, Saudis, and Qataris.

(To my surprise, this can no longer be accessed at the 'Consortium News' site. However, it is still available at http://www.shoah.org.uk/2013/09/10/page/2/ .)

One relevant question related to whether the role of the Americans involved in this conspiracy was simply 'ex post facto' exploitation of the patent 'false flag' sarin atrocity at Ghouta the previous 21 August to attempt to inveigle the United States into toppling Assad, or whether there was 'ex ante' complicity.

Moreover, if, as the memorandum asserted, 'British officials' were also aware that the 'most reliable intelligence' exonerated the Syrian government, rather fundamental questions arose as to how the JIC had felt able to claim precisely the reverse in support of David Cameron's unsuccessful attempt on 29 August to win Commons' support for British participation in air strikes.

At the time, the Director General, Defence and Intelligence at the FCO was one Robert Hannigan, who in April 2014 would be appointed as Director of GCHQ. The National Security Adviser was a certain Sir Kim Darroch, whose appointment as Ambassador to the U.S. would be announced in August 2015. Both have been in the news, in relation to 'Russiagate.'

Obviously, the same question arises about both of them as about Brennan: are they 'Gleiwitz types', who were actively complicit in preparing a murderous 'false flag', or were they simply part of a rather stupid Anglo-American 'dog', whom the 'tail', in the shape of the jihadists and their Turkish, Saudi and Qatari backers, could 'wag', as they chose?

From the articles which Seymour Hersh published in the 'London Review of Books', and other materials, it became evident that the Defense Intelligence Agency, then headed by General Flynn, had been aware of the likelihood of fresh 'false flags' -- after the small scale incidents in spring 2013.

And it was clear enough, if one bothered to study the 'open source' material at all carefully, that the DIA had been a key locus of opposition to the strategies being pursued by Brennan, together with his British co-conspirators.

Accordingly, the fact that an 'interagency memorandum of understanding', which according to Collyer's judgement looks as though it may well date from 2012 -- the year Brennan was appointed to head the CIA -- appears to have led, in that year, to the granting of access to the material, through the FBI, to outside contractors, looks somewhat interesting. (This is well covered by 'Sundance'.)

So, I find myself asking whether in fact this gross abuse of the role of the NSA was not linked at the outset to the divisions within the American intelligence apparatus and military about policy towards the Middle East, and also whether this may not be relevant to assessing the role of Robert Mueller, who was FBI Director through until September 2013.

An argument that 'Sundance' has repeatedly made is that a lot of what was happening in mid-2016, including the dossier attributed to Steele, had to do with the need to find justifications for these questionable surveillance operations.

While I think there is something in this, I have long thought that the discovery that a mass of material exfiltrated from the DNC, and was going to be published by 'WikiLeaks', and the subsequent murder of Seth Rich, are likely to have been critically important triggers.

Among other things, I do not think that the version given by 'Sundance' can explain the air of panic-stricken improvisation found alike in the dossier, and the claims about the 'digital forensics' made by Dmitri Alperovitch of 'CrowdStrike', and the former GCHQ person Matt Tait.

I see that there has now been a dramatic escalation in the legal battles which began when Ed Butowsky bought his initial action against David Folkenflik and his 'NPR' colleagues in June 2018. The discovery process in that action was followed by an 'Amended Complaint' on 5 March this year.

A week later, Butowsky filed a new action, in which the suggestion of a very-wide ranging conspiracy to suppress the truth about both the DNC leaks and Rich's murder was turned into a catalogue of defamation claims against a long list of people, including, as well as a variety of lawyers involved, CNN, the'Nw York Times', Vox, and the DNC.

On 9 July, Michael Isikoff published a story alleging that the claims about Rich and his murder were the result of a Russian 'active measures' operation -- to use a favourite phrase of TTG's.

A useful account, with links, is provided by our colleague 'b', at 'Moon of Alabama', at https://www.moonofalabama.org/2019/07/isikoff-who-first-peddled-the-fake-steele-dossier-invents-new-russian-influence-story.html .

Concluding his piece, 'b' wrote:

'That Seth Rich was wacked because he stole the DNC emails and transferred them to Wikileaks is a conspiracy theory. It is possible and even plausible, but there is no evidence to confirm it. Many people seem to believe it because it makes more sense than the competing conspiracy theory, that Russia hacked the DNC and handed the emails to Wikileaks. Isikoff's claim, that Russia planted the Rich conspiracy theory, has no sound base. That theory existed before anything "Russian" mentioned it.'

As it happens, Butowsky and his lawyer, Ty Clevenger, obviously decided it was time to, as it were, 'unmask their batteries', and provide some of the evidence they have been accumulating.

There is another useful post by 'Sundance', which in turn links to a very interesting post on the Gateway Pundit' site. From there, you can access both Clevenger's blog post, and the text of the 'Amended Complaint.'

(See https://theconservativetreehouse.com/2019/07/15/lawsuit-claims-julian-assange-confirmed-dnc-emails-received-from-seth-rich-not-a-russian-hack/ .)

It seems likely that Butowsky and Clevenger were pushed into acting a bit sooner than they had intended. The fact that the name of Ellen Ratner, clearly a pivotal participant, was misspellled 'Rattner' in the 'Amended Complaint', is likely to be an indication of this.

However, I also think that Clevenger, who seems to me a first-class 'ferret', could do with the services of an old-style secretary, who checked his productions before they went out.

turcopolier , 16 July 2019 at 02:34 PM
As I have previously mentioned, I testified several times in Collyer's Washington district court on non-FISA matters. My impression was that she is a very ambitious woman who wishes always to do DoJ's bidding.

David Habakkuk -> turcopolier ... , 18 July 2019 at 01:28 PM

Pat,

Your recollections of Collyer had, unfortunately, slipped my mind when I posted my comment above. So, unfortunately, had Larry's post on Judge Caroline M. Craven's denial in her report dated 17 April 2019 of the Motion to Dismiss filed by David Folkenflik and his NPR colleagues in the defamation case brought against them by Ed Butowsky.

At the time of his post, the full text of the judgement was only available on PACER, which requires a subscription. However, looking at the 'Court Listener' site, I now see that both it and some other key documents in the case are freely available.

(See https://www.courtlistener.com/docket/7244731/butowsky-v-folkenflik/ .)

Reading the full text of Ms. Craven's report, I can see quite how well justified was Larry's suggestion in his post that Folkenflik and NPR were on a very sticky wicket indeed (as we say in England.)

And I can also see more clearly why, following the judgement, Butowsky and Ty Clevenger felt they were in a position to launch an action both against some of the major legal players in the cover-up of the fact that the materials published by the DNC were leaked by Seth Rich, not hacked by the Russians, and also key disseminators of the cover-up, CNN, the NYT, and Vox.

The most important documents in that case are also now free available on 'Court Listener', at https://www.courtlistener.com/docket/14681570/butowsky-v-gottlieb/ .

What looks to have happened subsequently is a natural enough process of escalation.

Among those who rather actively promoted the hogwash attributed to Christopher Steele was Michael Isikoff, who is, apparently, chief investigative correspondent for Yahoo News. In April, he was reported in 'Vanity Fair' conceding that 'I think it's fair to say that all of us should have approached this, in retrospect, with more skepticism'.

(See https://www.vanityfair.com/news/2019/04/the-steele-dossiers-moment-of-truth-arrives-journalists-argue-its-impact .)

Any 'investigative reporter' worth his or her salt would have done elementary checks on the dossier immediately, and not touched it with a bargepole -- again, as we used to say in England. Also, even among the incompetent and corrupt, common prudence might have suggested caution.

However, 'fools rush in', as the saying goes, so Isikoff decided to conspire with Deborah Sines, apparently the former U.S. assistant attorney in charge of investigating Seth Rich's murder, to suggest that suggestions that the victim had been the source of the material from the DNC published by 'WikiLeaks' originated as just another Russian plot.

(See https://news.yahoo.com/exclusive-the-true-origins-of-the-seth-rich-conspiracy-a-yahoo-news-investigation-100000831.html .)

It appears that prior to the publication of his 'report', Isikoff talked to Butowsky, who in his efforts to dissuade him explained that his involvement in the whole affair began when Ellen Ratner, a news analyst with Fox, and sister of the late Michael Ratner, who had been an attorney for Assange, contacted him in Fall 2016 about a meeting she had with her that figure.

Although Butowsky intended the conversation to be 'off the record', and the idea was emphatically not that Isikoff would contact Ellen Ratner, he did. It seems that -- not particularly surprisingly, in the current climate -- she lied to him, and he was stupid enough to think that this meant he could get away with publishing his story.

(See https://www.thegatewaypundit.com/2019/07/breaking-lawsuit-outs-reporter-ellen-ratner-as-source-for-seth-rich-information/ .)

And then, not particularly surprisingly, Butowsky and Clevenger abandoned their inhibitions about identifying Ellen Ratner as a source, and filled in a lot of 'blanks' in their 'narrative' about how Seth Rich lived and died.

I am still in the process of digesting the new information. However, a couple of preliminary observations about the implications may be worth making.

Among the many problems for Brennan and his co-conspirators -- among whom, on the British side, Hannigan and Darroch, and also Sedwill, are very important -- one relates to the way that the capabilities of 'scientific forensics', in all kinds of areas, have increased by leaps and bounds in recent years.

This has meant that they have had little option but to corrupt the processes of investigation. The ludicrous claims by Dmitri Alperovitch of 'Crowdstrike' and the former GCHQ person Matt Tait, which nobody but a fool -- congenital 'useful idiot' one might say -- or a knave would dare to defend in public, are only one of many cases in point.

What is really dangerous for the conspirators, however, is when the problems they have in contesting rational arguments about the 'scientific forensics' come together with problems relating to more 'old-fashioned' kinds of evidence: crucially, 'witness testimony'.

This, I think, may now be happening.

It also seems to me quite likely that some of those 'in the know' -- including perhaps Rosemary Collyer -- had seen what was liable to happen a good while ago, and decided that a prudent 'rat' keeps its options open.

[Jul 17, 2019] Sic Transit Gloria Mueller by Ray McGovern

Mueller looks more and more like dirty Clinton fixer.
Notable quotes:
"... The Feb. 2018 indictment referred repeatedly to the IRA simply as a "Russian organization." But in Mueller's report 14 months later, the "Russian organization" had somehow morphed into "Russia." The IRA's lawyers argued, in effect, that Mueller's ipse-dixit "Russia did it" does not suffice as proof of Russian government involvement. Federal Judge Friedrich agreed and ordered Mueller to cease promoting his evidence-less charge against the IRA; she added that "any future violations of her order will trigger a range of potential sanctions." ..."
"... In testimony to Congress in October 2017, Facebook General Counsel Colin Stretch had cautioned earlier that from 2015 to 2017, "Americans using Facebook were exposed to, or 'served,' a total of over 33 trillion stories in their News Feeds." Shamefully misleading "analysis" by Times reporters Scott Shane and Mark Mazzetti in a 10,000-word article on September 20, 2018 made the case that the IRA's 80,000 posts helped deliver the presidency to Trump. ..."
"... Shane and Mazzetti neglected to report the 33 trillion number for needed context, even though the Times ' own coverage of Stretch's 2017 testimony stated outright: "Facebook cautioned that the Russia-linked posts represented a minuscule amount of content compared with the billions of posts that flow through users' News Feeds everyday." ..."
"... CrowdStrike, the controversial cybersecurity firm that the Democratic National Committee chose over the FBI in 2016 to examine its compromised computer servers, never produced an un-redacted or final forensic report for the government because the FBI never required it to, the Justice Department admitted. ..."
"... With Erin Ratner being named as a conduit between Seth Rich and Wikileaks in a lawsuit yesterday – the second flimsy leg of Mueller's claims – gets cut off at the knees. ..."
Jul 17, 2019 | consortiumnews.com

... ... ...

Requiem for 'Interference'

Daniel Lazare's July 12 Consortium News piece shatters one of the twin prongs in Mueller's case that "the Russian government interfered in the 2016 presidential election in sweeping and systematic fashion." It was the prong dripping with incessant drivel about the Kremlin using social media to help Trump win in 2016.

Mueller led off his Russiagate report, a redacted version of which was published on April 18, with the dubious claim that his investigation had

" established that Russia interfered in the 2016 election principally through two operations. First, a Russian entity carried out a social media campaign that favored presidential candidate Donald J. Trump and disparaged presidential candidate Hillary Clinton. Second, a Russian intelligence service conducted computer-intrusion operations against entities, employees, and volunteers working in the Clinton campaign, and then released stolen documents."

Judge to Mueller: Put Up or Shut Up

Mueller: Needs more time. (Flickr)

Regarding the social-media accusation, Judge Friederich has now told Mueller, in effect, to put up or shut up. What happened was this: On February 16, 2018 a typically credulous grand jury -- the usual kind that cynics say can be persuaded to indict the proverbial ham sandwich -- was convinced by Mueller to return 16 indictments of the Internet Research Agency (IRA) and associates in St. Petersburg, giving his all-deliberate-speed investigation some momentum and a much-needed, if short-lived, "big win" in "proving" interference by Russia in the 2016 election. It apparently never occurred to Mueller and the super-smart lawyers around him that the Russians would outsmart them by hiring their own lawyers to show up in U.S. court and seek discovery. Oops.

The Feb. 2018 indictment referred repeatedly to the IRA simply as a "Russian organization." But in Mueller's report 14 months later, the "Russian organization" had somehow morphed into "Russia." The IRA's lawyers argued, in effect, that Mueller's ipse-dixit "Russia did it" does not suffice as proof of Russian government involvement. Federal Judge Friedrich agreed and ordered Mueller to cease promoting his evidence-less charge against the IRA; she added that "any future violations of her order will trigger a range of potential sanctions."

More specifically, at the conclusion of a hearing held under seal on May 28, Judge Friedrich ordered the government "to refrain from making or authorizing any public statement that links the alleged conspiracy in the indictment to the Russian government or its agencies." The judge ordered further that "any public statement about the allegations in the indictment . . . must make clear that, one, the government is summarizing the allegations in the indictment which remain unproven, and, two, the government does not express an opinion on the defendant's guilt or innocence or the strength of the evidence in this case."

Reporting Thursday on Judge Friedrich's ruling, former CIA and State Department official Larry C. Johnson described it as a "potential game changer," observing that Mueller "has not offered one piece of solid evidence that the defendants were involved in any way with the government of Russia." After including a lot of useful background material, Johnson ends by noting:

"Some readers will insist that Mueller and his team have actual intelligence but cannot put that in an indictment. Well boys and girls, here is a simple truth–if you cannot produce evidence that can be presented in court then you do not have a case. There is that part of the Constitution that allows those accused of a crime to confront their accusers."

IRA Story a 'Stretch'

Last fall, investigative journalist Gareth Porter dissected and debunked The New York Times 's far-fetched claim that 80,000 Facebook posts by the Internet Research Agency helped swing the election to Donald Trump. What the Times story neglected to say is that the relatively paltry 80,000 posts were engulfed in literally trillions of posts on Facebook over the two-year period in question -- before and after the 2016 election.

Stretch and executives from Facebook, Twitter and Google hauled before a Senate Judiciary subcommittee on crime and terrorism on Oct. 31, 2017.

In testimony to Congress in October 2017, Facebook General Counsel Colin Stretch had cautioned earlier that from 2015 to 2017, "Americans using Facebook were exposed to, or 'served,' a total of over 33 trillion stories in their News Feeds." Shamefully misleading "analysis" by Times reporters Scott Shane and Mark Mazzetti in a 10,000-word article on September 20, 2018 made the case that the IRA's 80,000 posts helped deliver the presidency to Trump.

Shane and Mazzetti neglected to report the 33 trillion number for needed context, even though the Times ' own coverage of Stretch's 2017 testimony stated outright: "Facebook cautioned that the Russia-linked posts represented a minuscule amount of content compared with the billions of posts that flow through users' News Feeds everyday."

The chances that Americans saw any of these IRA ads -- let alone were influenced by them -- are infinitismal. Porter and others did the math and found that over the two-year period, the 80,000 Russian-origin Facebook posts represented just 0.0000000024 of total Facebook content in that time. Porter commented that this particular Times contribution to the Russiagate story "should vie in the annals of journalism as one of the most spectacularly misleading uses of statistics of all time."

And now we know, courtesy of Judge Friederich, that Mueller has never produced proof, beyond his say-so, that the Russian government was responsible for the activities of the IRA -- feckless as they were. That they swung the election is clearly a stretch.

The Other Prong: Hacking the DNC

The second of Mueller's two major accusations of Russian interference, as noted above, charged that "a Russian intelligence service conducted computer-intrusion operations against entities, employees, and volunteers working in the Clinton campaign, and then released stolen documents." Sadly for Russiagate aficionados, the evidence behind that charge doesn't hold water either.

CrowdStrike, the controversial cybersecurity firm that the Democratic National Committee chose over the FBI in 2016 to examine its compromised computer servers, never produced an un-redacted or final forensic report for the government because the FBI never required it to, the Justice Department admitted.

The revelation came in a court filing by the government in the pre-trial phase of Roger Stone, a long-time Republican operative who had an unofficial role in the campaign of candidate Donald Trump. Stone has been charged with misleading Congress, obstructing justice and intimidating a witness.

The filing was in response to a motion by Stone's lawyers asking for "unredacted reports" from CrowdStrike challenging the government to prove that Russia hacked the DNC server. "The government does not possess the information the defendant seeks," the DOJ filing says.

Small wonder that Mueller had hoped to escape further questioning. If he does testify on July 24, the committee hearings will be well worth watching.

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. He was a CIA analyst for 27 years and a presidential briefer. In retirement he co-founded Veteran Intelligence Professionals for Sanity. His colleagues and he have been following closely the ins and outs of Russiagate.


Carlos , July 17, 2019 at 12:52

With Erin Ratner being named as a conduit between Seth Rich and Wikileaks in a lawsuit yesterday – the second flimsy leg of Mueller's claims – gets cut off at the knees.

cletus , July 17, 2019 at 05:29

just read your article at lewrockwell on 7/17.

you gave all the facts that irrefutably condemn the mueller hoax and reveal what a con man he is. I salute you for this.

unfortutunately, you then come to a conclusion that cannot be supported by an reasonable person.

you think that mueller's con will be called out by the republicans on the committee.

what a joke. They will avoid like the plague revealling that the russia claims by mueller are a hoax.
they'll focus completely on ' you did conclude that trump didn't collude with the russians, right?"

anyone who's been paying attention at all knows this.

Robert G. Hilton , July 17, 2019 at 01:13

There was no expert report showing hacking because the expert had found that the Russians did not hack. Simple as that. The way it works is, that an expert puts nothing in writing until AFTER orally consulting with the attorney who hired him. If the news is bad for said attorney, then the expert is instructed NEVER to put the bad news in writing. I used to hire experts when I litigated patent infringement cases, and that is the way it works. If you pay the expert, then you make the rules. The judge may understand this too. I'm pretty sure that the Crowd Strike expert also gave Muller (Andrew Wiseman?) the same news about no hacking.

michael weddle , July 16, 2019 at 22:41

Why, shortly after Random Juan claimed the presidency, was a Crowdstrike employee trying to stoke the Venezuelan coup?

https://steemit.com/venezuela/@michaelweddle/crowdstrike-employee-tweeting-pro-coup-propaganda-on-venezuela

Bailey , July 16, 2019 at 20:27

I wish that this constant debunking of Russia Gate would be doing some good. Sadly it's not. Most of the members of daily kos believe everything about Russia Gate and even after reading some of the great essays written here that debunks it they instead say that this website has been bought out by Russia.

I once thought that if people really looked at the evidence or lack of it that they would wake up and smell the propaganda. It has always been so obvious to me that there was never any there there and I couldn't understand how people bought into it. But I think it has to do with who people voted for in the last election. Hillary's supporters just can't believe that she could have lost without outside interference. Sad.

ex-PFC Chuck , July 16, 2019 at 18:08

A post yesterday at The Conservative Treehouse expands on a Gateway Pundit post about an amended filing to the court in a Texas libel suit that could blow the whole Russia-gate hoax wide open, taking with it whatever shred of credibility the Mueller Report might still have. Not to mention the rationale for silencing Assange, General Flynn's prosecution, and the murder of Seth Rich.

https://theconservativetreehouse.com/2019/07/15/lawsuit-claims-julian-assange-confirmed-dnc-emails-received-from-seth-rich-not-a-russian-hack/

Vera Moldt , July 16, 2019 at 17:13

It looks like this fraudulent fable has finally been debunked by the US judicial system. Now the Hillary bots will have to come up with another excuse for her wealthy donors as to why she lost the election to a much maligned TV host that spent a small fraction of her campaign funding. This also takes some of the fuel out of using the Russiagate fraud for a march to war with Russia that was accompanied by large defense spending increases. Russiagate was the perfect gift to the Clinton campaign apologists and the MIC that needs a causus belli to feed the public war machine. That gift box has now been unraveled to display an empty box. I'm surprised Ray McGovern did not bring up the issue of the alleged hacking of DNC emails to have been contrary to the capability of the internet at that time. The rate of transfer was consistent with downloading to a flash drive but impossible for transfer of packets across an IP network – further debunking the Russia hacking narrative. This whole house of cards has crashed in and it seems that it will be impossible for the Russiagate fraudsters to reconstruct their tawdry myth.

jaycee , July 16, 2019 at 14:08

Perceptive bloggers identified the IRA as a commercial clickbait operation two years ago. Everything about that operation was consistent with that description. Describing the IRA as a Russian government psy-op program, in turn, was inconsistent with the evidence at hand and so required the assumption that its purpose was to "sow chaos", or similar guesswork. It should be remembered that the Facebook / Twitter people were initially reluctant to go along with the latter theory, and only came on board after a great deal of pressure from members of Congress such as Mark Warner. So this whole nonsensical story was magnified at the insistence of powerful Democratic congressional persons, and Mueller was simply bolstering their arguments – which was his job it appears. The result has been not only a false consciousness deliberately seeded through the public, but also a raft of social media and alternative news censorship which has been silencing both alt-right and progressive voices.

Jeff Harrison , July 16, 2019 at 13:45

Thanx, Ray. I've said from the outset that Russiagate was bullshit perpetrated by Three Names who just couldn't stand the fact that this was the latest in a long string of failures that this incompetent, arrogant woman perpetrated on the American people. It was bullshit from jump street because Three Names won the election by 3M votes but in the American presidential election you not only need the votes, you need the distribution. Distribution she didn't have. Russia (or any other actor sufficiently large and determined) can sway votes for one candidate or another but they can't sway distribution. I personally thought the claim that Russia via the Internet Research Agency sought to sway the election by disparaging Three Names and pumping up Thump. Three Names won by 3M votes. Looks like Russia's IRA did a spectacularly poor job of meddling.

There are some take aways from this that the government should be looking into/doing something about.
1. Russiagate never had any legs. The legs that it got came from an effort by the deep state to create them out of thin air. The deep state tried to take on the role of the Praetorian Guard in old Rome. Their role originally was to protect the emperor but it morphed over the years into picking who would be the emperor. The likes of Comey, Brennan, Clapper, Struck (however you spell it) and his femme fatale (at a minimum, there may be more) should all be marched off to jail and locked up for a considerable period of time for their attempts to destroy our democracy (or republic – a distinction without a difference).

2. Seth Rich's murder needs to be actually investigated now that he has been outed as the source of the leak to Wikileaks.

3. The Republican party needs to be banned as a political party. Any clear eyed view of the 2016 election will conclude that the decades old effort by the Republicans at voter suppression and gerrymandering are what resulted in the 2016 results. 80,000 votes in three states that the Republicans have invested great voter suppression efforts – Wisconsin, Michigan, and Pennsylvania would have changed the election results. This should have been a major neon sign that winner take all for electoral votes is a bad idea. If proportional EC votes were mandated, third parties would have a chance and our presidential elections might become actual contests. Otherwise, we'll continue to have elections that are between two candidates – worse and worser.

John Puma , July 16, 2019 at 12:36

The proportion of IRA "stories" among total Facebook postings
in the period in question, can be expressed in manner a bit more
readily grasped: on average, one IRA posting appeared among
every 412 million total. For perspective the US population is now
about 330 million.

The FBIs bungling with Crowdstrike information is reminiscent
of its reported 9-11 careless incompetence.

Jill , July 16, 2019 at 13:06

This may be why NPR featured that story:

"Businessman Ed Butowsky filed a lawsuit on Monday that outed FOX News reporter Ellen Ratner was his source for the Seth Rich information.

This comes after Michael Isikoff's report last week that labeled Butowsky as a Russian source."

https://www.thegatewaypundit.com/2019/07/breaking-lawsuit-outs-reporter-ellen-ratner-as-source-for-seth-rich-information/

Chet Roman , July 16, 2019 at 13:12

Yahoo's reporter Michael Isikoff is a sock puppet for the CIA/FBI that provided the info to NPR and was one of the first to spread the lies told to him by Steele about Russian interference. He must have tried to head off the lawsuit filed today. Ed Butowsky filed a lawsuit against the liberal media claiming defamation and business disparagement. He claims that Assange told Ellen Ratner (Fox News analyst and sister of Assange's lawyer who passed away) that Seth and Aaron Rich provided the emails to Wikileaks.

https://theconservativetreehouse.com/2019/07/15/lawsuit-claims-julian-assange-confirmed-dnc-emails-received-from-seth-rich-not-a-russian-hack/

Kieron , July 16, 2019 at 17:22

I don't think anyone with a couple of brain cells would dismiss the idea that an insider with the DNC having access to delicate, perhaps damaging material, being what seems on the surface, to be the victim of a motiveless murder would ask the question, was there any connection between Seth Rich's demise and the crap storm that ensued after the Wikileaks release. Really hello !

LarcoMarco , July 16, 2019 at 17:46

"NPR's Steve Inskeep talks to Michael Isikoff" – what a predictable farce! "We talked to Deborah Sines, who was the federal prosecutor in charge of the investigation into Seth Rich's death. She was an assistant U.S. attorney in the U.S. attorney's office in the District of Columbia, which prosecutes local murders. And she would see these conspiracy theories about her case circulating on the Web. She was – she wanted to find out where they were coming from."

At least we now know that Seth Rich's death is/was a Federal case. No more claiming the DCPD has jurisdiction. But no disclosures of the contents of Seth Rich's cell phone and laptop.

Eric32 , July 16, 2019 at 10:38

The author seems consumed by this carnival of politicized legalized covert intelligence operations, by people and entities trying to retain money and power.

What's important is that the system hasn't been working for decades, and there's going to be increasingly serious problems, maybe fatal ones, rising if a big overhaul doesn't occur.

Al Pinto , July 16, 2019 at 09:43

The DNC and MSM sold, and sold well, the Russiagate to the general public. Does it really matter, if the "Russian interference in the 2016 U.S. presidential election has now come apart at the seams"? Neither the DNC, nor the MSM will report/mention either of the court case, pretty much a blackout for the general public.

Even, if these court cases are widely reported, do you really believe that the majority of the people would change their mind? After almost three years, there's no way that these people will change their mind. The only change that widely reporting these court cases would result in is, that Trump and HRC supporters would hate each other even more.

This Russiagate will be with us pretty much forever, it'll morph in to accusing people of being Russian agents and/or Russian Bots. We already see this taking place and just wait, until next year. It's not going to be pretty

michael , July 16, 2019 at 12:40

Aaron Mate has done a brilliant job researching and debunking Russiagate. Unfortunately for him, he is now ostracized and has to survive on the margins, with other people with critical thinking skills.

Blessthebeasts , July 16, 2019 at 13:28

You're right. The truth doesn't matter, just the BS narrative that has been shoved down our throats for the last few years. It never made any sense to anyone who really thought about it but the media whores just keep spewing total nonsense and they surely won't change their ways now. The fact that the entire crock is really irrelevant to the majority of our citizens doesn't matter to them a bit.

AnneR , July 16, 2019 at 09:42

Thank you again Mr McGovern for another article on this never ending saga. While I hope that sanity begins to dawn among the so-called progressives, I have serious doubts.

1. Neither the BBC World Service nor NPR have mentioned (at least while I've been listening) Judge Friedrich's ruling vis a vis provide the evidence (discovery) to the IRA 12's lawyers or tear up the indictment (essentially). Indeed, I've not heard, on the MSM, anything about those 12 IRA folks employing a lawyer and challenging Mueller's indictment. Silence works as well as obfuscation, lies.

2. The Demrats simply will not let their Russophobia go. I gather (from RT – tut tut I must be an RU bottle) that Ms Harris AIPAC schmoozer, keen and eager lock 'em up and throw away the key, corporate-capitalist crony Kamala has been accusing the Russians of stirring up the controversy surrounding Kaepernick's bending of the knee. The Russians and their bots did it.

3. And then this morning on NPR – a Steve Inskip interview with Michael Isikoff focusing on the Seth Rich "conspiracy theory" and of course the whole thing (or that segment which I could stomach hearing) presumed as a matter of established, and thus true, fact that everything that went wrong for the DNC's HRC campaign was caused by the Russians – for which read Putin. Isikoff was there as an "investigative" journalist for "Yahoo News" – and his "investigation" had shown that the Russians were – who else – behind the conspiracy theory that Seth Rich was killed by HRC thugs in order to keep him permanently quiet about corruption in the DNC. (Corruption – a rather mealy-mouthed way of avoiding bringing into NPR daylight what the DNC were actually doing: determining who would be the Dem candidate willy nilly of who the voters wanted. But this mealy-mouthedness is fully in keeping with NPR's basic silence on what Wikileaks revealed via that insider download.)

Orwellian. Propaganda at its Bernays, Goebbels best. Despair . This business is *not* going away. The Demrats – both in DC and their bourgeois/progressive supporters have far too much invested in the whole confabulation for them to admit that the former deliberately lied and the latter were willing? hoodwinked.

Ray McGovern , July 16, 2019 at 14:57

Dear AnneR,

Thanks for your comment. I would like it if somehow "despair," could be disallowed.

There are enough of us, after all. And, as Annie Dillard put it, "There never was anybody but us."

I also take some inspiration from the dismal-sounding, yet somehow uplifting words of I. F. Stone:

"The only kinds of fights worth fighting are those you're going to lose, because somebody has to fight them and lose and lose and lose until someday, somebody who believes as you do wins."

THE CHALLENGE IS TO ACCEPT THAT, AND FIND JOY IN TRYING -- AND EVEN IN LOSING.

I believe the losing does not last forever; think we all need to do our part in the "interim."

Best regards,

Ray

DW Bartoo , July 16, 2019 at 19:44

That sums things up precisely, Ray.

None of us may live to see a complete turn-around, yet it is the honest effort to encourage and build the foundation for that fundamental systemic change to conscious and principled human awareness which is the measure we must make of ourselves.

Your sense of moral presence, Ray, is very much appreciated.

It serves as inspiration for all, and especially the young, who already understand, and encourages, as example, those who are coming to understand.

DW

AnneR , July 17, 2019 at 08:33

Dear Mr McGovern – thank you for reading and replying to my comment.

And, yes, I do understand the objection to despair – though not, might I add, any thought that its frank expression be expunged!

Were it only the whole Russiagate fabrication, delusions, time and money waste (oh well, only taxpayers' money) and fallout that was so dreadfully wrong, being heinously enacted. Indeed were it all that our taxes were being wasted on.

Perhaps that's it – Russiagate while distracting from the things that the DNC and HRC did, said, *also* makes for good deflection from the war crimes we are committing, the never ending imperialist warmongering we are engaged in, from the fact that many Demrats voted for those nice tax breaks given to the wealthiest tiers in our society, that many of those Demrats voted to hand over to the MIC *even more* loot even as the Pentagon can't account for the billions, or whatever fantastikal amount, it has already received over the years, deflection from the fact that despite such a "good" economy increasing numbers of people are living ever more economically precarious lives, rents rise astronomically, healthcare is a joke (or would be were its lack not so serious for so many). And that's not to mention the realities of climate change or the continuing (and MSM ignored) 70 plus year plight of Palestinians, among so many others.

My late husband used to tell me to write to NPR, the BBC, to let them know that they weren't codding everyone with their disinformation, non-information, lack of objectivity – their propaganda. And I did, often and used to ask for a response. Did I even get those? You must be joking

AnneR , July 17, 2019 at 14:08

In case someone might think that I expected either the BBC or NPR to alter their ways because of my "letters" (interestingly the BBC only allows/ed for around 1000 characters or something equally useless) – no. But when (in the case of the BBC) you can tick the "please reply" box and get total silence, not even a "thank you for your blah blah we shan't pay any attention to your complaints ," in response it is pretty frustrating.

As for NPR – I stopped our contributions. Why would we *pay* for the privilege of being propagandized? I just wish we had stopped them years earlier

Anyway, thank you Mr McGovern for your continuing coverage of this whole affair. I just wish my late partner in life and love had known of this website.

ML , July 16, 2019 at 09:24

Each morning when I arise, I get my coffee and settle down to read Consortium News. I also make a habit of a quick perusal of what the stenographers are jawing about on CNN today, there is a real doozy smearing Assange. The spinners are working overtime to patch over all the holes in their hoax story. I couldn't get through the whole thing because it's another smear piece and a long one including the old saw that Assange smeared feces on the Ecuadorian embassy's walls. I had to stop reading. Gosh, I can't abide those people. Thanks Ray, for telling the truth. We are drowning in $h** out there in la-la land. CN offers a much-needed dose of reality medicine. Thank you kindly, all.

Skip Scott , July 16, 2019 at 10:19

Here's a good essay by Caitlin Johnstone regarding the Assange hit-piece.

https://medium.com/@caityjohnstone/new-cnn-assange-smear-piece-is-amazingly-dishonest-even-for-cnn-e7c361d98639

Marko , July 16, 2019 at 07:31

Even worse news for the Russiahoaxers is the recent revelation , documented in a lawsuit , that Ellen Ratner , sister of deceased Wikileaks' lawyer Michael Ratner, met with Assange in the fall of 2016 and was told by him that Aaron and Seth Rich provided the DNC leaks to Wikileaks. Ed Butowsky was made aware of this , with instructions by Ms. Ratner for him to relay the information to the Rich family. When he did so , in December 2016 , he was told by Joel Rich , Seth's father , that he was already aware of his sons' involvement.

This is no longer conspiracy talk , folks. Ed Butowsky is not dumb enough to make these claims on court documents without knowing he can back them up. Shit is about to get real for Mueller and the DNC.

"BREAKING: Lawsuit Outs Reporter Ellen Ratner as Source for Seth Rich Information" @ Gateway Pundit

Skip Scott , July 16, 2019 at 08:43

Wow! Thanks Marko. Here's the link.

https://www.thegatewaypundit.com/2019/07/breaking-lawsuit-outs-reporter-ellen-ratner-as-source-for-seth-rich-information/

DW Bartoo , July 16, 2019 at 09:37

Well, Skip Scott, either this revelation will put "paid" to the "Russia-did-it!" charade, or else the Voracious Memory Hole will act like a giant black hole and the event horizon will be swallowed into total nothingness as a new Middle-Eastern Adventure captures the hearts and minds of the happy warriors and consumers of U$ Imperialism.

Whatever happens, it will be wholey interesting times ahead.

DW

jmg , July 16, 2019 at 10:01

There was a related, extensive 2018 interview about Butowsky's private investigation into the Seth Rich case to help the family, what they found, and what happened (the DNC assigned someone to represent the family, etc.; the mentioned lawsuits were later dropped/dismissed). It included, without naming Ratner, the unverified mention: "his friend came back from London with information that he said he wanted to get to the Rich family." Since this alleged private message appears to be not only doubtful, but of course also not confirmed by WikiLeaks, we can't really know if it happened or not.

Ed Butowsky Sits Down With Gateway Pundit for First Interview After Being Sued by Family in Seth Rich Murder Mystery -- March 19, 2018
https://www.thegatewaypundit.com/2018/03/ed-butowsky-sits-first-interview-gateway-pundit-sued-family-seth-rich-murder-mystery/

Eric32 , July 16, 2019 at 11:17

I wonder why Seth's murder hasn't been solved?
I wonder why there's almost no media attention paid?

O Society , July 16, 2019 at 17:32

Marko, polo! Here it is:

Seth Rich, disgruntled DNC worker, blows the whistle on HillBillary Clinton rigging the Democratic presidential primary against Bernie Sanders, so he gives data supporting his discovery of rigging to Wikileaks. Rich got the data on a thumdrive downloaded at DNC HQ itself.

No Russians, no hacking, just a whistleblower on the fraud ironically called US "democracy." We've all seen the data Rich leaked. Emails detailing HillBillary Clinton's graft and fraud and collusion against Sanders.

No wonder no other candidates besides Sanders ran against HillBillary, for they all knew the fix was in from its inception!

I dunno who killed Seth Rich, but I do know the Democratic party stole the election from Bernie, then projected its own crimes onto Russia, same way a kid projects his own crime of breaking a cookie jar on his brother when he tells Momma "He dit it –> He ate the cookies and broke the jar!" Meanwhile, there's chocolate smeared all over the DNC's face.

We have evidence for this, the leaked emails themselves tell the story

Gregory Herr , July 16, 2019 at 18:15

Seth Rich copied and leaked the DNC e-mails and was murdered for it. For this to become irrefutable common knowledge will be quite one godsend of a reality check. Maddow might not be able to get out of bed for weeks.

Repeat after me Rachel there was no Russian hack, there was no Russian hack, there was no Russian hack

jmg , July 16, 2019 at 07:13

From the Brennan–Comey–Rogers assessment/opinion (January 6, 2017):

"We also assess Putin and the Russian Government aspired to help President-elect Trump's election chances when possible by discrediting Secretary Clinton and publicly contrasting her unfavorably to him. All three agencies agree with this judgment. CIA and FBI have high confidence in this judgment; NSA has moderate confidence. . . .

"- High confidence generally indicates that judgments are based on high-quality information from multiple sources. High confidence in a judgment does not imply that the assessment is a fact or a certainty; such judgments might be wrong.

"- Moderate confidence generally means that the information is credibly sourced and plausible but not of sufficient quality or corroborated sufficiently to warrant a higher level of confidence."

Assessing Russian Activities and Intentions in Recent US Elections
https://www.dni.gov/files/documents/ICA_2017_01.pdf

-- -- –

"When they say they have 'high confidence', that means they don't have any evidence!"
-- Bill Binney, former NSA Technical Director

DW Bartoo , July 16, 2019 at 07:10

Thank you, Ray McGovern for this splendid article laying out the facts which make clear the absurdities of these last several years. One hopes, now that the "Russia-did-it" canard is fully exposed, by US courts, that the truth may finally get through, over or around, the media wall of enforced ignorance and Mueller hero-worship, and reach the ears and eyes of the people.

Should that actually happen, it might even be possible that other truth, long subject to media manipulation and distortion, the cases of Julian Assange and Chelsea Manning come readily to mind, could be seen in the honest light of day after an almost eight year protracted nightmare of media driven deceit, psychological torture, and deliberately vicious character assassination is revealed, in Assange's case, as it might well be, by Nils Melzer's report to the UN.

The legacy U$ corporate media have much to answer for, from promulgating lies that led to war, to missile attacks, and to brutal economic sanctions, a form of economic warfare, to efforts to start a new Cold War, and to aggrandize intelligence agencies which have sought to pervert justice and to illegally influence the political process by falsely accusing, on the flimsy words of partisan political operatives, another nation of the very actions those agencies have used, repeatedly and for many decades,to destroy the political processes of other nations, including the very nation singled out to take the blame for Hillary Clinton's abysmal and pathetic failure in the 2016 election.

What a waste of time, resources, trust, and energy it has bee, these last years, yet it was all so very profitable and lucrative for the media, even if it were "not good" for the country.

The media have damned and convicted themselves.

The U$ intelligence agencies have exposed themselves as corrupt, completely dishonest, vindictive, petty, and thoroughly untrustworthy.

It remains to be seen if the people have learned anything, and whether they will do anything with this costly, yet necessary, education.

DW

Allan , July 16, 2019 at 07:04

Will Adam Schiff spend the week with Bob Mueller to get their story straight

UserFriendly , July 16, 2019 at 05:18

?Unfortunately this is partially bunk. The first bit the judge didn't rule that there was no evidence, she ruled that Mueller publicly saying that the IRA = kremlin and they did try to help Trump win was prejudicial in the case against the IRA (quite obviously so). But him not being able to say that during his testimony should go over well with the democrats. Of course if he actually wanted to explain all he would have to do is drop the case against the IRA because it's never going to trial anyways. Almost makes you wonder if he filed those charges expressly so he wouldn't have to connect the imaginary dotts.

Aiya , July 16, 2019 at 11:03

What they called "trying to help Trump" was a miniscule amount of social media posts, 56% of which were made AFTER the election. And Facebook had to look 3 times to come up with ANYTHING–what they finally reported were posts coming from Russia or eastern Europe, posts in Cyrillic language, and posts from people with Russian/European names.

[Jul 17, 2019] Reasons to Suspect that Seth Rich Participated in the Leaking of the DNC Emails to Wikileaks

Notable quotes:
"... Sy Hersh stated that he has a trusted source inside the FBI who told him that he had seen a secret FBI report regarding an analysis of Seth's laptop, on which they found evidence that Seth had offered samples of DNC emails to WIkileaks and offered a much larger batch in return for payment; and that Seth subsequently had provided the DNC emails to Wikileaks via a drop box. ..."
"... Seth Rich was murdered, for no clear reason – no valuable belongings taken - several weeks after the DNC emails were exfiltrated from the DNC. The creator of the Guccifer 2.0 hoax would have had strong motivation to eliminate (or otherwise silence) the actual leaker, to prevent his hoax from being unmasked. Unmasking the hoax could have had a devastating impact on Hillary's campaign. ..."
"... Murray states that he had a meeting in Washington DC in September 2016 with someone involved in this leak - hence he may have privileged insight on this issue. ..."
"... Mueller's tale of how he allegedly transferred the emails to Wikileaks is overtly absurd ..."
Jul 07, 2019 | caucus99percent.com

Reasons to Suspect that Seth Rich Participated in the Leaking of the DNC Emails to Wikileaks


veganmark on Fri, 07/05/2019 - 10:38pm

The evidence that Russian intelligence hacked the DNC to provide the DNC emails which Wikileaks published is wholly unconvincing. In particular, the Guccifer 2.0 persona identified by the ICA and the Mueller report as the hacker, is clearly no Russian, and Mueller's tale of how he allegedly transferred the emails to Wikileaks is overtly absurd.

Julian Assange has strongly hinted that Seth Rich could be the leaker, and offered a reward for info leading to the apprehension of his killer. He further asserts, quite definitively, that Russian government hackers were not the source.

Wikileaks has repeatedly retweeted essays implying that Seth was the leaker.

Craig Murray, Julian's close associate, assures us that the Wikileaks DNC and Podesta releases were the result of leaks by individuals with legal access to the material, not hacks.

Sy Hersh stated that he has a trusted source inside the FBI who told him that he had seen a secret FBI report regarding an analysis of Seth's laptop, on which they found evidence that Seth had offered samples of DNC emails to WIkileaks and offered a much larger batch in return for payment; and that Seth subsequently had provided the DNC emails to Wikileaks via a drop box.

Larry Johnson, former CIA agent, claims that he has two inside sources that confirm this.

Kim Dotcom claims that Seth was the leaker, and that he assisted him in this effort.

Ed Bukowsky claims that a source close to Julian told him confidentially that Seth and Aaron Rich were the sources of the released DNC emails, and asked him to contact Seth's parents about this. Bukowsky claims that, when he informed Seth's father about this, he said "I already know that". It was only after the DNC "helpfully" provided the Rich family with "crisis consultant" Brad Bauman that the Rich family publicly denounced any suspicion that Seth had been the leaker. Reportedly, the Riches have become persuaded that the Wikileaks releases were responsible for the election of Trump, and they don't want to admit that Seth could have had anything to do with that.

Seth Rich was murdered, for no clear reason – no valuable belongings taken - several weeks after the DNC emails were exfiltrated from the DNC. The creator of the Guccifer 2.0 hoax would have had strong motivation to eliminate (or otherwise silence) the actual leaker, to prevent his hoax from being unmasked. Unmasking the hoax could have had a devastating impact on Hillary's campaign.

As to the source of the Podesta emails published by Wikileaks, Craig Murray assures us that the well known spearphishing of Podesta's computer is a red herring. Rather, he states that Podesta was being monitored by the NSA owing to his business ties to Ukraine.

Someone in the NSA who had access to these emails - presumably someone upset with Hillary's campaign - leaked them to Wikileaks. Murray states that he had a meeting in Washington DC in September 2016 with someone involved in this leak - hence he may have privileged insight on this issue.

This...

Mueller's tale of how he allegedly transferred the emails to Wikileaks is overtly absurd

was explained in the report by saying that someone from Trump's campaign gave Julian the information when they went to London. Did Robert get that information from the guardian article written by Luke Harding? If so, lol! Wikileaks debunked this article the minute it came out and no one from the Ecuadorian embassy or from London's many CCTV cameras showed any video evidence of it happening.

There are so many holes in this whole Russia Gate saga that I'm surprised anyone is believing it. Guess you cross posted this on ToP right?

Anja Geitz on Sat, 07/06/2019 - 11:41am
If that is indeed the reason Seth Rich's parents

Have denied Seth's involvement with WikiLeaks, its a shame they lack the courage and moral conviction their son had.

TheOtherMaven on Sat, 07/06/2019 - 11:44am
Lost one son, don't want to lose the other?

@Anja Geitz

A reminder from an old-time Illuminati game player: "Government" and "Criminal" are not opposites. They are sometimes co-attributes.

[Jun 30, 2019] USG's Bizarre Change of Position in the Roger Stone Case by Larry C Johnson

Highly recommended!
Notable quotes:
"... Given these facts you would think it would be easy for Robert Mueller to explain how the Russians got their hands on the DNC emails and then passed them on to Wikileaks. But it is not easy because the foundation of the case against the Russians rests on assumptions and beliefs. No solid facts. ..."
"... To reiterate a point I have raised in previous posts, the only entity to have forensic access to the DNC computers, i.e. CrowdStrike, is on the record in the person of the CrowdStrike CEO, Dimitri Alperovitch admitting they don't know how the Russians got access. ..."
"... CrowdStrike is not sure how the hackers got in. The firm suspects they may have targeted DNC employees with "spearphishing" emails. These are communications that appear legitimate -- often made to look like they came from a colleague or someone trusted -- but that contain links or attachments that when clicked on deploy malicious software that enables a hacker to gain access to a computer. " But we don't have hard evidence ," Alperovitch said. ..."
"... If CrowdStrike actually had conducted a legitimate forensic examination of the DNC server/servers then they absolutely would have had "hard evidence." ..."
"... The government produced the CrowdStrike reports because the Indictment in this case referenced, as background, CrowdStrike's statements about the DNC hack. Stone's statement that the government has no other evidence is not only irrelevant to this proceeding but is also mistaken. ..."
"... It is a horrible irony that Stone is being persecuted with prosecution based on an even bigger lie -- i.e., the Russians hacked the DNC. Russia did not hack the DNC. Let's hope that Stone's lawyers get a chance to demand the US Government put up the evidence or shut up. ..."
Jun 30, 2019 | turcopolier.typepad.com

There is zero forensic evidence in the public arena that supports the US Government's assertion that the Russian Government hacked the DNC. In fact, the forensic computer evidence that is available indicates that the emails from the DNC were downloaded onto something like a thumb drive.

There also is zero forensic evidence in the public arena that the Russians passed/delivered the DNC emails to Julian Assange/Wikileaks. There are only two ways to get DNC emails into the hands of Wiki people--an electronic transfer or a physical/human transfer. That's it.

And here is what we know for certain. First, since Edward Snowden absconded with the NSA's family jewels with the help of Wikileaks, U.S. and British intelligence assets have been monitoring every single electronic communication to and from Wikileaks/Julian Assange. They also have been conducting surveillance on all personal contacts with Assange and other key members of the Wikileaks staff.

Given these facts you would think it would be easy for Robert Mueller to explain how the Russians got their hands on the DNC emails and then passed them on to Wikileaks. But it is not easy because the foundation of the case against the Russians rests on assumptions and beliefs. No solid facts.

To reiterate a point I have raised in previous posts, the only entity to have forensic access to the DNC computers, i.e. CrowdStrike, is on the record in the person of the CrowdStrike CEO, Dimitri Alperovitch admitting they don't know how the Russians got access. Alperovitch told Washington Post Reporter Ellen Nakashima on June 14, 2016 the following :

CrowdStrike is not sure how the hackers got in. The firm suspects they may have targeted DNC employees with "spearphishing" emails. These are communications that appear legitimate -- often made to look like they came from a colleague or someone trusted -- but that contain links or attachments that when clicked on deploy malicious software that enables a hacker to gain access to a computer. " But we don't have hard evidence ," Alperovitch said.

If CrowdStrike actually had conducted a legitimate forensic examination of the DNC server/servers then they absolutely would have had "hard evidence."

Then, 13 months later, we have FBI Director Jim Comey admitting that the FBI relied on CrowdStrike for its "evidence." Jim Comey testified to the House Intelligence Committee in March 2017 and stated the following :

"we never got direct access to the machines themselves. The DNC in the spring of 2016 hired a firm that ultimately shared with us their forensics from their review of the system."

Now take a look at a very significant reversal of the US Government's position in the case against Roger Stone. On 20 June 2019, US Attorney Jessie Liu filed a motion attempting to rebut the argument presented by Stone's attorneys that there was no supporting evidence for the claim that Russia hacked the DNC. Here are the key snippets from her filing:

As the government has argued (Doc. 122, at 6, 9, 14), Russia's role in the DNC hack is not material to the eighteen findings of probable cause that Stone appears to be challenging. . . . The government produced the CrowdStrike reports because the Indictment in this case referenced, as background, CrowdStrike's statements about the DNC hack. Stone's statement that the government has no other evidence is not only irrelevant to this proceeding but is also mistaken.

Yet, when you read the original indictment, Roger Stone was put in the cross hairs because he was allegedly communicating with Wikileaks/Julian Assange about the DNC emails. And those emails are identified in the indictment as "stolen." The Government is hoping to nail Stone on the charge of "lying" to Congress. Good luck with that.

It is a horrible irony that Stone is being persecuted with prosecution based on an even bigger lie -- i.e., the Russians hacked the DNC. Russia did not hack the DNC. Let's hope that Stone's lawyers get a chance to demand the US Government put up the evidence or shut up.

[Jun 19, 2019] Mueller and Russiagate story: The Eternal Witch-hunt

Apr 12, 2019 | counterpunch.org

Mueller looks more and more like a man looking in a black room for a black cat that isn't there, and finding it.

[Jun 18, 2019] Wikileaks CIA Stole Russian Malware, Uses It to Misdirect Attribution of Cyber Attacks

Notable quotes:
"... So perhaps the DNC was hacked by the CIA and it was blamed on the Russians. ..."
"... How can we trust any investigation when the investigation can be doctored to scapegoat Russia? This is embarrassing. ..."
"... Clapper is a known perjurer. ..."
"... Of course it was the Obama CIA, pros like the Russians or Chinese, never leave behind "fingerprints" they are smart enough to cover their tracks. As a cyber analyst I can tell you that when you see "fingerprints or breadcrumbs" leading to a source, it's usually deceptive and intentional. Let that sink in! ..."
Jun 12, 2019 | russia-insider.com

From the Wikileaks "Year Zero" dump:

The CIA's Remote Devices Branch 's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.

UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

Everyone knew it. Now we have proof. "Fingerprints" are meaningless. It's now clear that the CIA is able to "pose" as "Russian hackers" whenever it so chooses. Just something to think about. All allegations of "digital fingerprints" left behind by Russian hackers must now be dismissed as either fake or meaningless


ChasMoDee • 2 years ago ,

So perhaps the DNC was hacked by the CIA and it was blamed on the Russians.

Disco Obama ChasMoDee • 2 years ago ,

How can we trust any investigation when the investigation can be doctored to scapegoat Russia? This is embarrassing.

disqus_ayvQwhvS6h Disco Obama • 2 years ago ,

Since 2002. You sheep have had the wool pulled over since 2002. It's been 15 years. Imagine how much you won't find out til the next 15.

Tom • 2 years ago ,

So the CIA obtained FISA Warrants for the millions of devices hacked? Guess we now know how Trump Tower was wiretapped when DNI Clapper said there was no such order given.

JackBootedThug✓ Tom • 2 years ago ,

Clapper is a known perjurer.

American Freeman • 2 years ago ,

Now we know how Obama's administration got through the FISA Court to tape Trump.

4ever&anon • 2 years ago ,

So! It now becomes clear what Obama and the Democrats were planning for the Trump Administration. They could hack away at anything and everything and leave Russian "fingerprints" to make it appear that the Russians did it. It's really no telling what is already planted. Thst's why some Democrat's seem so supremely confident that Trump will be impeached.

I don't think that it's really sunk in for most people that this was a plan for World Domination by a force more evil than the average person could ever imagine. We're still in grave danger but thank Heaven for Julian Assange and Wikileaks. Not only have they saved America but perhaps the whole world from domination that heretofore couldn't even be imagined except in science fiction.

Our problem will now be how to build enough gallows to accomodate the traitors and seditionists who have participated in this dark plan.

Mike John Elissen • 2 years ago ,

Hysteria in Oceania. The same goons blaming Russia for robbing the local candy store (without producing evidence) are robbing the candy factory 24/7. All of a sudden, the MSM has found issues and terms like `non-verified documents` and `non-verifiable, anonymous sources` to be of the utmost importance, in contrast to when they were copy-pasting the ` information` about Russian hacking. I wonder how much time it takes for the Ministries of Information and their docile press-clowns to (again) turn the story around and blame WikiLeaks for being a `Russian tool` to discard their own obvious crimes.

Elevator2TheTop • 2 years ago ,

This whole Russian hacking thing is sounding more and more like the anti-Muslim video that sparked the Benghazi attacks.

Bad Hombre • 2 years ago ,

They wiretapped the entire Trump team thinking they would come up with an October surprise...and found NOTHING. If they had ANYTHING, it would have been used prior to the election. And, since Hillary was supposed to win, the illegal wire taps would never have been disclosed.

Now Trump has exposed the Obama admin and democrats are hyperventilating over Russia to deflect from the crimes they committed.

ruadh Bad Hombre • 2 years ago ,

We always knew that, were told we were crazy, now we have proof. The MSM has been gas-lighting us. I wonder how many red pills you have to swallow to get to the other side of this Rabbit Hole?

middleclasstaxpayer • 2 years ago ,

It seems our government really is the most corrupt entity on this planet.

lou Guest • 2 years ago ,

Well BO moved to Washington so it will be easy for the Press to shout these questions at him at his home or a restaurant or a ballgame. We need answers BO, and right now. No BS. anymore. Or go back to Indonesia and hide out.

Peter Shoobridge ن ruadh • 2 years ago ,

It's really not fun. The intelligence agencies are unaccountable and cloak their criminality with the secrecy of national security. They're not going to back down. They're ruthless. And they kill people for sport. This will not end well unless the military is called in to round them up, which has huge risks of its own...

TGFD • 2 years ago ,

TGFD here.
As far as I'm concerned. death becomes anyone in the effing CIA. Same goes for their parasitic family members. Death's image would look good on them.
There is NO secret in the CIA that I would not expose if I could.

I never heard of the term, "Deep State" prior to 2 months ago, and I don't like what I hear, either. I pray that somehow, God will enable TRUMP to vanquish all the filth in the deep state.

William Dickerson • 2 years ago ,

I knew it - the documents I looked over, the IP addresses I checked, the supposed "malware" that the US said "was the same as we know Russia had used" and more - and it just did not add up.

Now to be sure the American population is dumb when it comes to technology - and they usually blindly believe what the CIA, and media, tells them. But me - being in IT for some decades and having worked with Russian people for 6 years (in an electronics engineering company founded by a Russian immigrant to the U.S.) and being a network security administrator for a small government agency, something smelled odd.

The IP addresses - hahaha - really? Try again - up until the spring of 2016 American company Verizon routed 1 million stolen IP addresses - used by cyber-criminals in the USA........ so guess where some of those IP addresses REALLY belonged. Further, the "CIA" and other spooks included - honestly? TOR exit node addresses. If you use TOR browser, you will find some of those same addresses in your own logs (unless you are smart and either purge or don't log, etc.)
So try again, U.S. spooks - the malware? HAHA - what a JOKE. Really. I mean older software that John Q. Public can download for FREE? Sorry, Russians are far far smarter and they'd not use OLD software that works on WordPress based on PHP servers when the target isn't based on blogging software.

Sorry, silly Americans - including and especially McCain and others in our congress who are, say what? members of INTELLIGENCE committees? Really?

You help guide the intelligence and security operations of a major country and you fall for the BS that was presented to you? Did you not ask questions? I did - I did my own research and I guess that proves I'm as smart or smarter than any member of and house or Senate intelligence committee. Do these people even know where the power button is on their computer? Smart - they hire unvetted IT people to take care of congressional computers....... and some of the equipment ends up missing, and these people have full free access as admins to computers used by congressional members of armed services committees and more!

That's how smart our U.S. congress is. Hire your brother-in-laws IT geek, give 'em full admin access, let them come and go freely........... and fall for intelligence reports about Russian hacking...... all the while our own CIA is doing MORE and WORSE.

While this topic is still fresh (thanks to the Democrats) - election interference - Election or campaign interference scores according to political scientist Dov Levin of Carnegie Mellon University: Russia - 36 times, U.S.A - 81 times

The USA's score number doesn't include military coups and regime change efforts following the election of candidates the U.S. didn't like, notably those in Iran, Guatemala and Chile. Nor does it include general assistance with the electoral process, such as election monitoring.

So who exactly is it that interferes or "Helps" with elections? Yeah, I thought so.

President Vladimir Putin must go home each night shaking his head in disbelief at how gullible we are here.

By the way - Podesta was NOT HACKED. He fell for a simple phishing scam. Yes, the email wasn't even very well done. It appeared more like it came out of Nigeria than any professional group, it was lame, didn't even look real, didn't sound real and the URL or link was so obvious, geesh, a fool could have seen it was phishing. Oh, wait, we're talking Podesta here. The man gave away his password (which for a while was indeed 'password'. Worse - he used what for his campaign work? Did you say GMAIL? You have to be kidding! A free consumer email, based in the cloud, and not only that, at least 3 others had account access to his Gmail. He kept documents, calendar, task lists and more in it. The phishing scammer got access to his Gmail inbox, sent items, attachments, calendar, Google Drive, Google Docs, you name it! No hacking needed since this is CLOUD BASED. No one had to touch his computer or iPad.

I really laughed when I found in those emails the admin credentials for his Wi-Fi, and even more funny - the admin credentials for his building security system. Yes, all that in his cloud-based Gmail account. As Bugs Bunny would say- what a maroon!

No wonder he's mad and trying to blame everyone else. He has to know he was scammed and he fell for it and it was all HIS FAULT, no one else but him. Using Gmail for such important work is STUPID as it is - but then to fall for phishing. He got what he deserved, and if it was Russians, tell those teenagers congratulations! That's all it took to phish Podesta - the skill set of KIDS in their early teens.

I could go on about the stupidity involved in all of this, but won't (I hear a collective sigh of relief!)

rayg • 2 years ago ,

So, did the Russians hack the election? Or did the Obama CIA hack the election and just did a pizz-poor job of it? Or perhaps Obama really did not want Hillary to win.

This might make those congressional investigations into the alleged hacking of the election by Russians a lot more interesting. That is, of course, assuming that the investigations are really about finding the truth.

Michael K rayg • 2 years ago ,

Obama Hates Hillary but could not openly control her. With Trump elected he could work openly to damage his administration, and with the help of MSM demonize him, and make him look like a tool of the Russians as well as his appointees. Notice, there was no talk of Russian hacking prior to the election. The "intelligence" agencies waited for the election results to come out with their charges.

Use delaying tactics to prevent approval of appointees, attack and possibly remove approved appointees eroding confidence in the current government. With the help of RINOs delay legislation. Pay protestors to protest everything Trump does using labels such as sexist, racist, Nazi, etc.

Obama's and DNC's goal: Prevent any progress till the mid term elections and try and overturn the balance in Congress to get the liberal agenda back on track. Get poised for the 2020 election and run a more palatable candidate than Hillary.

Gonzogal Michael K • 2 years ago ,

"Obama's and DNC's goal: Prevent any progress till the mid term elections and try and overturn the balance in Congress to get the liberal agenda back on track. Get poised for the 2020 election and run a more palatable candidate than Hillary."

Or, according to Obomber's club make it so that Trump "either resigns or is impeached"
http://www.zerohedge.com/ne...
http://www.zerohedge.com/ne...

Geoff Caldwell • 2 years ago ,

Let's unpack this. All those rumors about the Obama's hating the Clinton's? TRUE BUT, he couldn't let DOJ go through with indictment so instead gets Clapper, Brennan and the boys to use Russian fingerprints to hack and then sits back and watches the chaos unfold. When you go back to how he got his start in Chicago its exactly how he operates.

Marsha Moore • 2 years ago ,

I am furious. I read the original re CIA attempting to influence French elections. But this is CLEAR TREASON by Obama Administration. I NEVER trusted Brennen. violation for CIA to operate inside US.

rlqretired • 2 years ago ,

Looks like this is an example of Obama/CIA preparation for Treason?

The thing that really pisses me off is that the factual basis for all of this criminal and treasonous activity by the Obama Administration, that is being exposed today, remains covered-up by everyone in a position of responsibility to expose it. That factual basis is that every identification document Obama has presented to prove he is a citizen of the USA is a forgery. Based upon the totality of his record as president he is an agent of foreign Islamic allegiance and everything he has done in the Middle East always ends up in favor of radical Islam and refuses to even acknowledge radical Islamic terrorism exists. The same goes for his refusal to acknowledge domestic Islamic terrorism exists.

Factual answers for these three questions will clear up why we are having this treasonous activity. (1) Why does Obama have and need a forged birth certificate as he posted on his POTUS website? (2) Why does Obama's first officially issued copy of his Selective Service Registration Card have a forged 2 digit postal stamp? (3) Why is Obama using a SS# that was first issued to someone else? These three questions must be answered by Congress as the researched information verifying forgery is readily available and will expose the basis of this treason.

Play Hide
Spyplane • 2 years ago ,

Let's not forget that logging into an email server because of a weak password and getting a copy of emails does not scream CIA. Also John Podesta's email password was extremely weak. So it did not take a covert CIA hacking program to initiate. We keep hearing Russia hacked our election. Yet have ZERO proof! First the majority of election machines are decentralized and not connected to internet. There was not a single instance where vote the count was effected. This was also immediately stated by Obamas DNI. Claiming they ran a propaganda attack on Hillary Clinton is pathetic. They are claiming the American people did not see who Hillary Clinton truly was. The opposite is true.

Hillary Clinton had made her own propaganda against herself. She is who the American people see. Not what the Russians programmed Us to see. The American people made a choice based on her actions no one else's. The liberals continually attacking someone with false claims without proof is a standard Liberal / Alyinsky strategy. It requires no proof if all liberal extremist continually repeat the same attack which is then amplified by the Liberal propaganda media (CNN, MSNBC, CBS, The New York Times, The Washington Post, BBC, etc)

The Russian collusion claim is the exact same scenario. Make the claim which we already knew the Trump campaign speaks with Russian diplomats. Most people in politics interact with all countries diplomat and ambassadors. So instantly the claim is impossible to debunk. The Liberal party has become a party willing to use any and all tactics to avoid listening to the American people. This whole Russian drama is created to go against what the American people voted for. The democrat party is as much a threat to The United States as Communism ever was. It has been said if fascism ever comes back to the United States it will come in the form of liberalism. So the American people have a choice.

Use common sense and stop the liberal extremist party from destroying our democracy or deal with the consequences of America becoming ineffective and divided. The majority of the Democrat party and it's supporters have become so ideologically perverted they have lost sight of morality and what America stands for.

The Russians have not hypnotized Americans to vote for Donald Trump. It wasn't possible for the Russians to manipulate voter data and yes the Trump campaign speaks with Russian diplomats.

But it was the same Russian ambassador that Obama left in the country while expelling all others. The same Russian ambassador Obama scheduled meetings with for Jeff sessions. The same rushing ambassador that all Democrat spend time with. Make a claim that's true then find a way to turn it negative.

Typical Saul Alinsky. Everyone needs to remember anything the Liberals attack someone for the opposite is true.

Today Is The Day We Get Trump Spyplane • 2 years ago ,

The point of the Wikileaks is that "proof" is easily manufactured.

DanJR • 2 years ago ,

And now you know that the CIA (via Obama's orders or tacit approval) was the one that created the ruse of Trump emailing a Russian bank as a pretext to persuade FISA judges to sign off on the warrants to keep surveillance on him and his contacts.

If I were Obama I'd be seeking the nearest airport and fly to any country offering asylum... it's good night, good riddance for him and the rest of the Deep State Globalists.

seanster5977 • 2 years ago ,

Kind of funny where this started. Remember Hillary stole a server from the government secure server facility and set it up in her basement without proper security software and monitoring for hacking. Proven. And she had idiots in her staff so stupid they used passwords like "p@ssword". Proven. So any 11 year old computer expert could have hacked that server.

And she lied about the content of the messages being transferred. Top secret and classified info was lost due to her illegal actions. But Comey gave the pig a pass.

LH • 2 years ago ,

Of course it was the Obama CIA, pros like the Russians or Chinese, never leave behind "fingerprints" they are smart enough to cover their tracks. As a cyber analyst I can tell you that when you see "fingerprints or breadcrumbs" leading to a source, it's usually deceptive and intentional. Let that sink in!

[Jun 16, 2019] Rule of law in Murrika is kaput

Highly recommended!
Jun 16, 2019 | www.zerohedge.com

freedommusic , 23 minutes ago link

DEFENSE ATTORNEY: Agent Smith, you testified that the Russians hacked the DNC computers, is that correct?

FBI AGENT JOHN SMITH: That is correct.

DEF ATT: Upon what information did you base your testimony?

AGENT: Information found in reports analyzing the breach of the computers.

DEF ATT: So, the FBI prepared these reports?

AGENT: (cough) . (shift in seat) No, a cyber security contractor with the FBI.

DEF ATT: Pardon me, why would a contractor be preparing these reports? Do these contractors run the FBI laboratories where the server was examined?

AGENT: No.

DEF ATT: No? No what? These contractors don't run the FBI Laboratories?

AGENT: No. The laboratories are staffed by FBI personnel.

DEF ATT: Well I don't understand. Why would contractors be writing reports about computers that are forensically examined in FBI laboratories?

AGENT: Well, the servers were not examined in the FBI laboratory.

(silence)

DEF ATT: Oh, so the FBI examined the servers on site to determine who had hacked them and what was taken?

AGENT: Uh .. no.

DEF ATT: They didn't examine them on site?

AGENT: No.

DEF ATT: Well, where did they examine them?

AGENT: Well, uh .. the FBI did not examine them.

DEF ATT: What?

AGENT: The FBI did not directly examine the servers.

DEF ATT: Agent Smith, the FBI has presented to the Grand Jury and to this court and SWORN AS FACT that the Russians hacked the DNC computers. You are basing your SWORN testimony on a report given to you by a contractor, while the FBI has NEVER actually examined the computer hardware?

AGENT: That is correct.

DEF ATT: Agent Smith, who prepared the analysis reports that the FBI relied on to give this sworn testimony?

AGENT: Crowdstrike, Inc.

DEF ATT: So, which Crowdstrike employee gave you the report?

AGENT: We didn't receive the report directly from Crowdstrike.

DEF ATT: What?

AGENT: We did not receive the report directly from Crowdstrike.

DEF ATT: Well, where did you find this report?

AGENT: It was given to us by the people who hired Crowdstrike to examine and secure their computer network and hardware.

DEF ATT: Oh, so the report was given to you by the technical employees for the company that hired Crowdstrike to examine their servers?

AGENT: No.

DEF ATT: Well, who gave you the report?

AGENT: Legal counsel for the company that hired Crowdstrike.

DEF ATT: Why would legal counsel be the ones giving you the report?

AGENT: I don't know.

DEF ATT: Well, what company hired Crowdstrike?

AGENT: The Democratic National Committee.

DEF ATT: Wait a minute. Let me get this straight. You are giving SWORN testimony to this court that Russia hacked the servers of the Democratic National Committee. And you are basing that testimony on a report given to you by the LAWYERS for the Democratic National Committee. And you, the FBI, never actually saw or examined the computer servers?

AGENT: That is correct.

DEF ATT: Well, can you provide a copy of the technical report produced by Crowdstrike for the Democratic National Committee?

AGENT: No, I cannot.

DEF ATT: Well, can you go back to your office and get a copy of the report?

AGENT: No.

DEF ATT: Why? Are you locked out of your office?

AGENT: No.

DEF ATT: I don't understand. Why can you not provide a copy of this report?

AGENT: Because I do not have a copy of the report.

DEF ATT: Did you lose it?

AGENT: No.

DEF ATT: Why do you not have a copy of the report?

AGENT: Because we were never given a final copy of the report.

DEF ATT: Agent Smith, if you didn't get a copy of the report, upon what information are you basing your testimony?

AGENT: On a draft copy of the report.

DEF ATT: A draft copy?

AGENT: Yes.

DEF ATT: Was a final report ever delivered to the FBI?

AGENT: No.

DEF ATT: Agent Smith, did you get to read the entire report?

AGENT: No.

DEF ATT: Why not?

AGENT: Because large portions were redacted.

DEF ATT: Agent Smith, let me get this straight. The FBI is claiming that the Russians hacked the DNC servers. But the FBI never actually saw the computer hardware, nor examined it? Is that correct?

AGENT: That is correct.

DEF ATT: And the FBI never actually examined the log files or computer email or any aspect of the data from the servers? Is that correct?

AGENT: That is correct.

DEF ATT: And you are basing your testimony on the word of Counsel for the Democratic National Committee, the people who provided you with a REDACTED copy of a DRAFT report, not on the actual technical personnel who supposedly examined the servers?

AGENT: That is correct.

DEF ATT: Your honor, I have a few motions I would like to make at this time.

PRESIDING JUDGE: I'm sure you do, Counselor. (as he turns toward the prosecutors) And I feel like I am in a mood to grant them.

( source )

hooligan2009 , 14 minutes ago link

Brilliant! that sums it up nicely. of course, if the servers were not hacked and were instead "thumbnailed" that leads to a whole pile of other questions (including asking wiileaks for their source and about the murder of seth rich).

[Jun 15, 2019] Why Didn't Mueller Investigate Seth Rich

Parteigenosse Mueller mission was to derail Trump. Investigation of real DNC scandal was outside of scope of this tool of the Deep State. From comments: "Mueller was brought in as the Cleaner! It is a massive cover-up for which most of those who are complicit should be behind bars! "
Mueller report was concocted with only goal: to sink Trump. Objective investigation of events was beyond the scope. Moreover it looks like Mueller investigators were instrumental in setting an entrapment for members of Trump team and as such might be criminally liable for this abuse of their status.
Images deleted.
Notable quotes:
"... No one knows who killed Rich in Washington, D.C., on July 10, 2016. All we know is that he was found at 4:19 a.m. in the Bloomingdale neighborhood "with apparent gunshot wound(s) to the back" according to the police report . Conscious and still breathing, he was rushed to a nearby hospital where he was pronounced dead at 5:57. ..."
"... Rich's mother, Mary, told local TV news that her son struggled with his assailants: "His hands were bruised, his knees are bruised, his face is bruised, and yet he had two shots to his back, and yet they never took anything . They took his life for literally no reason. They didn't finish robbing him, they just took his life." ..."
"... But cops said shortly after the killing that they had no immediate indication that robbery was a motive. Despite his mother's report of two shots in the back, all the local medical examiner would say is that the cause of death was a gunshot wound to the torso. According to Rich's brother, Aaron , Seth "was very aware, very talkative," when police found him lying on the pavement. Yet cops have refused to say if he described his assailant. A month later, they put out a statement that "there is no indication that Seth Rich's death is connected to his employment at the DNC," but refused to elaborate. ..."
"... all the Mueller report did was replace one conspiracy theory with another involving the Kremlin and its minions that is equally unconvincing. ..."
"... there's nothing in the Mueller report indicating that the special counselor independently reviewed the forensic evidence or questioned family members and friends. ..."
"... He certainly didn't interview Assange, the person in the best position to know who supplied the data, even though Craig Murray, the ex-British diplomat who serves as an unofficial WikiLeaks spokesman, says the WikiLeaks founder would have been "very willing to give evidence to Mueller" while holed up in the Ecuadorian embassy in London, "which could have been done by video-link, by interview in the Embassy, or by written communication." ..."
"... This was as close as Assange could come to confirming that Rich was tied up with the leak without actually saying it. Hours later, WikiLeaks tweeted about the $20k reward. ..."
"... Four months after that, Craig Murray told the Libertarian Institute's Scott Horton: "Don't get me wrong, I'm not saying that he [Rich] was the source of the leaks. What I'm saying is that it's probably not an unfair indication to draw that WikiLeaks believe[s] that he may have been killed by someone who thought he was the source of the leaks." (Quote begins at 11:20 .) ..."
"... But if speculation refuses to die, it's for a simple reason. If the DNC email disclosure was a hack, then Rich clearly had nothing to do with it, which means his death was no more than a robbery gone awry. But if it was a leak, then – based on broad hints dropped by Assange and Murray – it looks like the story could well be more complicated. This proves nothing in and of itself. But it guarantees that questions will grow as long as the Washington police make zero progress in its investigation and the Mueller report continues to fall apart. ..."
"... And that's just what's happening. Mueller's account of how Russian intelligence supposedly supplied WikiLeaks with stolen data makes no sense because, according to the report's chronology, the transfer left WikiLeaks with just four days to review some 28,000 emails and other electronic documents to make sure that they were genuine and unaltered – a clear impossibility. ..."
"... The FBI assessment that Paul Manafort associate Konstantin Kilimnik "has ties to Russian intelligence" – which Mueller cites (vol. 1, p. 133) in order to justify holding Manafort in solitary confinement during the Russia-gate investigation – is similarly disintegrating amid reports that Kilimnik actually served as an important State Department intelligence source. ..."
"... "Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth." Arthur Conan Doyle ..."
"... No need for arrests, extradition requests, or 17 espionage charges. A simple email phone call might just do the trick... It shows once again that Trump is a similar fascist as Hillary and the DNC! ..."
"... Why would an assassin leave him alive on the sidewalk? ..."
"... Today we've learned that the FBI didn't, inexplicably, go and grab the DNC server but also never even saw the report from Crowdstrike that was used as the basis for blaming everything on Russia. ..."
"... Of course, the FBI admitted that it never examined the DNC servers and just revealed in court that it never saw a detailed report from Crowdstrike showing that Russians hacked the server. That's why Mueller never investigated. He knew it was a lie but one the entire 3 years, Obama admin, Hillary, the DNC & corrupt cabal depend on maintaining. ..."
"... If you followed the story, the Rich family was very much doubted this was a random robbery until political operators had a long chat with them. Their stories changed and cooperation with the independent investigation ended. This neighborhood has cameras everywhere. Suddenly, none of them worked. ..."
"... Not only did the FBI never get the DNC server for forensic investigation, it turns out the FBI never even got a finalized report on "DNC hacking" from Crowdstrike. Every conclusion drawn by the various agencies within the Intelligence Community is based on a redacted copy of a draft report from Crowdstrike, and this report was never finalized from its draft form. And even the draft was never unredacted for the FBI. ..."
"... 'Why Didn't Mueller Investigate Seth Rich?' Occam's razor. Why would a paid lackey disobey direct orders by the chief architects of this Criminal Conspiracy and risk his own life in the process? It makes no sense on any level. ..."
Jun 15, 2019 | www.zerohedge.com

Authored by Daniel Lazare via ConsortiumNews.com,

The idea that the DNC email disclosures were produced by a hack - not a leak - makes less and less sense...

After bungling every last aspect of Russia-gate since the day the pseudo-scandal broke, the corporate press is now seizing on the Mueller report to shut down debate on one of the key questions still outstanding from the 2016 presidential election: the murder of Democratic National Committee staffer Seth Rich.

No one knows who killed Rich in Washington, D.C., on July 10, 2016. All we know is that he was found at 4:19 a.m. in the Bloomingdale neighborhood "with apparent gunshot wound(s) to the back" according to the police report . Conscious and still breathing, he was rushed to a nearby hospital where he was pronounced dead at 5:57.

[ Image deleted ]
Slain Democratic National Committee staffer Seth Rich. (LinkedIn)

Police have added to the confusion by releasing information only in the tiniest dribs and drabs. Rich's mother, Mary, told local TV news that her son struggled with his assailants: "His hands were bruised, his knees are bruised, his face is bruised, and yet he had two shots to his back, and yet they never took anything . They took his life for literally no reason. They didn't finish robbing him, they just took his life."

But cops said shortly after the killing that they had no immediate indication that robbery was a motive. Despite his mother's report of two shots in the back, all the local medical examiner would say is that the cause of death was a gunshot wound to the torso. According to Rich's brother, Aaron , Seth "was very aware, very talkative," when police found him lying on the pavement. Yet cops have refused to say if he described his assailant. A month later, they put out a statement that "there is no indication that Seth Rich's death is connected to his employment at the DNC," but refused to elaborate.

The result is a scattering of disconnected facts that can be used to support just about any theory from a random killing to a political assassination. Nonetheless, Robert Mueller is dead certain that the murder had nothing to do with the emails -- just as he was dead certain in 2003 that Iraq was bristling with weapons of mass destruction " pos[ing] a clear threat to our national security .

Scene of the crime. (YouTube)

Mueller's Theory About Assange 'Dissembling'

Mueller is equally positive that, merely by expressing concern that the murder may have had something to do with the release of thousands of DNC emails less than two weeks later, WikiLeaks founder Julian Assange was trying to protect the real source, which of course is Russia.

Here's how the Mueller report puts it:

"Beginning in the summer of 2016, Assange and WikiLeaks made a number of statements about Seth Rich, a former DNC staff member who was killed in July 2016. The statements about Rich implied falsely that he had been the source of the stolen DNC emails. On August 9, 2016, the @WikiLeaks Twitter accounted posted: 'ANNOUNCE: WikiLeaks has decided to issue a US$20k reward for information leading to conviction for the murder of DNC staffer Seth Rich.'

Likewise, on August 25, 2016, Assange was asked in an interview, 'Why are you so interested in Seth Rich's killer?' and responded, 'We're very interested in anything that might be a threat to alleged WikiLeaks sources.' The interviewer responded to Assange's statement by commenting, 'I know you don't want to reveal your source, but it certainly sounds like you're suggesting a man who leaked information to WikiLeaks was then murdered.'

Assange replied, 'If there's someone who's potentially connected to our publication, and that person has been murdered in suspicious, circumstances, it doesn't necessarily mean that the two are connected. But it is a very serious matter that type of allegation is very serious, as it's taken very seriously by us'" (vol. 1, pp. 48-49).

Mueller: Says Assange's real source was Russia. (All Your Breaking News Here via Flickr)

This is what the Mueller report calls "dissembling." The conclusion caused jubilation in corporate newsrooms where hostility to both Russia and WikiLeaks runs high. "The Seth Rich conspiracy theory needs to end now," declared Vox.com. "The special counsel's report confirmed this week that Seth Rich was not the source," said The New York Times . "The Mueller report might not end the debate over what President Donald Trump did," the Poynter Institute's Politifact added ,"but it has scuttled one conspiracy theory involving a murdered Democratic party staffer and WikiLeaks."

One Conspiracy Theory for Another

But all the Mueller report did was replace one conspiracy theory with another involving the Kremlin and its minions that is equally unconvincing.

Remarkably, there's nothing in the Mueller report indicating that the special counselor independently reviewed the forensic evidence or questioned family members and friends.

He certainly didn't interview Assange, the person in the best position to know who supplied the data, even though Craig Murray, the ex-British diplomat who serves as an unofficial WikiLeaks spokesman, says the WikiLeaks founder would have been "very willing to give evidence to Mueller" while holed up in the Ecuadorian embassy in London, "which could have been done by video-link, by interview in the Embassy, or by written communication."

Bike rack and plaque outside DNC headquarters. (Johanna745, CC0 via Wikimedia Commons)

Murray says Mueller's team made no effort to contact him either even though he has publicly stated that he met clandestinely with an associate of the leaker near the American University campus in Washington.

Why not? Because Mueller didn't want anything that might disturb his a priori assumption that Russia is the guilty party. If he had bucked the intelligence community finding – set forth in a formal assessment in January 2017 – that Russian President Vladimir Putin ordered an influence campaign aimed at undermining Hillary Clinton's candidacy -- it would have been front-page news since an anti-Trump press had already accepted the assessment as gospel. ButMueller is far too much of an establishmentarian to do anything so reckless.

So he selected evidence in support of the official theory that "[t]he Russian government interfered in the 2016 presidential election in sweeping and systematic fashion," as the report states on its very first page. And since Assange had consistently maintained that the data was the result of an inside leak rather than internal hack and that "[o]ur source is not the Russian government," he cherry picked evidence to show that Assange is a liar, not only about Russia but about Seth Rich.

Cryptic Exchange

It's a self-serving myth that corporate media have swallowed whole because it serves their interests too. One problem in exposing it, however, is Assange's pledge – intrinsic to the WikiLeaks mission – to safeguard the identities of whistleblowers who furnish it with information. The upshot has been a good deal of beating around the bush. A month after the murder, the WikiLeaks founder appeared on a Dutch program called "Nieuwsuur" and took part in a cryptic exchange with journalist Eelco Bosch van Rosenthal:

Assange during exchange with Rosenthal. (YouTube)

Assange: Whistle blowers go to significant efforts to get us material and often very significant risks. There's a 27-year-old – works for the DNC – who was shot in the back, murdered, just a few weeks ago for unknown reasons as he was walking down the street in Washington, so .

Rosenthal: That was just a robbery, I believe, wasn't it?

Assange: No, there's no finding, so –

Rosenthal: What are you suggesting?

Assange: I'm suggesting that our sources take risks, and they become concerned to see things occurring like that.

Rosenthal: But was he one of your sources then? I mean –

Assange: We don't comment about who our sources are.

Rosenthal: But why make the suggestion about a young guy being shot in the streets of Washington?

Assange: Because we have to understand how high the stakes are in the United States and that our sources, you know, face serious risks. That's why they come to us – so we can protect their anonymity.

Rosenthal: But it's quite something to suggest a murder. That's basically what you're doing.

This was as close as Assange could come to confirming that Rich was tied up with the leak without actually saying it. Hours later, WikiLeaks tweeted about the $20k reward.

Four months after that, Craig Murray told the Libertarian Institute's Scott Horton: "Don't get me wrong, I'm not saying that he [Rich] was the source of the leaks. What I'm saying is that it's probably not an unfair indication to draw that WikiLeaks believe[s] that he may have been killed by someone who thought he was the source of the leaks." (Quote begins at 11:20 .)

Thanks to such foggy rhetoric, it was all but inevitable that conspiracy theories would ignite. Two months after the killing, an ultra-conservative talk-radio host named Jack Burkman – best known for organizing a protest campaign against the Dallas Cowboys' hiring of an openly gay football player named Michael Sam – approached members of the Rich family and offered to launch an investigation in their behalf.

The family said yes, but then backed off when Burkman grandly announced that the murder was a Kremlin hit. Things turned even more bizarre a year later when Kevin Doherty, an ex-Marine whom Burkman had hired to look into the case, lured his ex-boss to a Marriott hotel in Arlington, Virgina, where he shot him twice in the buttocks and then tried to run him down with a rented SUV. Doherty received a nine-year sentence last December.

The rightwing Washington Times meanwhile reported that WikiLeaks had paid Seth and Aaron Rich an undisclosed sum, a story it was forced to retract , and Fox News named Seth as the source as well. (A sympathetic judge dismissed a lawsuit filed by the Rich family on technical grounds.) But still the speculation bubbled on, with conservative nuts blaming everyone from ex-DNC chair Debbie Wasserman Schultz to acting DNC chairwoman Donna Brazile, Clinton campaign chairman John Podesta, and Bill and Hillary themselves.

All of which plays into the hands of a corporate press happy to write off any and all suspicion as a product of alt-right paranoia.

But if speculation refuses to die, it's for a simple reason. If the DNC email disclosure was a hack, then Rich clearly had nothing to do with it, which means his death was no more than a robbery gone awry. But if it was a leak, then – based on broad hints dropped by Assange and Murray – it looks like the story could well be more complicated. This proves nothing in and of itself. But it guarantees that questions will grow as long as the Washington police make zero progress in its investigation and the Mueller report continues to fall apart.

And that's just what's happening. Mueller's account of how Russian intelligence supposedly supplied WikiLeaks with stolen data makes no sense because, according to the report's chronology, the transfer left WikiLeaks with just four days to review some 28,000 emails and other electronic documents to make sure that they were genuine and unaltered – a clear impossibility. (See " The 'Guccifer 2.0' Gaps in Mueller's Full Report ," April 18.)

The FBI assessment that Paul Manafort associate Konstantin Kilimnik "has ties to Russian intelligence" – which Mueller cites (vol. 1, p. 133) in order to justify holding Manafort in solitary confinement during the Russia-gate investigation – is similarly disintegrating amid reports that Kilimnik actually served as an important State Department intelligence source.

So the idea of a hack makes less and less sense and an inside leak seems more and more plausible, which is why questions about the Rich case will not go away.

Bottom line: you don't have to be a loony rightist to suspect that there is more to the murder than Robert Mueller would like us to believe.


Reaper , 6 minutes ago link

"Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth." Arthur Conan Doyle

The FBI/Mueller/Comey are the Federal Key Stone Cops.

CanadaGoose , 8 minutes ago link

Mueller was brought in as the Cleaner! It is a massive cover-up for which most of those who are complicit should be behind bars!

Kotzbomber747 , 15 minutes ago link

Question: why is the Trump Administration still actively PERSECUTING Julian Assange?

"...Craig Murray, the ex-British diplomat who serves as an unofficial WikiLeaks spokesman, says the WikiLeaks founder would have been "very willing to give evidence to Mueller" while holed up in the Ecuadorian embassy in London, "which could have been done by video-link, by interview in the Embassy, or by written communication."

No need for arrests, extradition requests, or 17 espionage charges. A simple email phone call might just do the trick... It shows once again that Trump is a similar fascist as Hillary and the DNC!

DaBard51 , 20 minutes ago link

Mueller: "The [Wikileaks] statements about Rich implied falsely that he had been the source of the stolen DNC emails."

For this assertion, what evidence did Mueller find?

<crickets>

When nine hundred years old you become, look this good you will not.

mpcascio , 23 minutes ago link

I'm sure the Kenyan was deep in the mix.

847328_3527 , 16 minutes ago link

The best thing a person can do if anything happens to them is try to document it and send it to a friendly media outlet since the police and FBI may cover it up. Perhaps dump it directly on to the internet so at least some folks hear/see the truth before it all vanishes.

gay troll , 23 minutes ago link

Why would an assassin leave him alive on the sidewalk?

chunga , 22 minutes ago link

Why didn't the red team make him do it, or do it themselves?

Today we've learned that the FBI didn't, inexplicably, go and grab the DNC server but also never even saw the report from Crowdstrike that was used as the basis for blaming everything on Russia.

fackbankz , 19 minutes ago link

Mueller is a lifelong dirty cop and cover up artist. That's why.

fackbankz , 20 minutes ago link

The killers are most likely dead themselves.

neidermeyer , 14 minutes ago link

Guatemalans or MS-13 subcontractors to the CIA who would have been killed after the job.

SummerSausage , 23 minutes ago link

Of course, the FBI admitted that it never examined the DNC servers and just revealed in court that it never saw a detailed report from Crowdstrike showing that Russians hacked the server. That's why Mueller never investigated. He knew it was a lie but one the entire 3 years, Obama admin, Hillary, the DNC & corrupt cabal depend on maintaining.

curbjob , 32 minutes ago link

The author quotes Seth Rich's brother to support his theory.

According to Rich's brother, Aaron , Seth "was very aware, very talkative," when police found him lying on the pavement.

... but then fails to quote his brothers press statement ?

Which is:

The special counsel has now provided hard facts that demonstrate this conspiracy is false. I hope that the people who pushed, fueled, spread, ran headlines, articles, interviews, talk and opinion shows, or in any way used my family's tragedy to advance their political agendas -- despite our pleas that what they were saying was not based on any facts -- will take responsibility for the unimaginable pain they have caused us. We will continue to pursue justice for Seth's murderers, as well as those who used his murder to advance their personal or political agendas by advancing false conspiracy theories

Aaron Rich

SummerSausage , 29 minutes ago link

If you followed the story, the Rich family was very much doubted this was a random robbery until political operators had a long chat with them. Their stories changed and cooperation with the independent investigation ended. This neighborhood has cameras everywhere. Suddenly, none of them worked.

curbjob , 20 minutes ago link

So you're saying the family was coerced into changing their story?

MadelynMarie , 20 minutes ago link

yes, I thought the family spokesperson was from the DNC

pelican , 24 minutes ago link

Where was SA Peter Strzok when he was murdered? Just wondering

RiverDrifter , 4 minutes ago link

Feel like I'm reading a question from the future.....

navy62802 , 28 minutes ago link

Not only did the FBI never get the DNC server for forensic investigation, it turns out the FBI never even got a finalized report on "DNC hacking" from Crowdstrike. Every conclusion drawn by the various agencies within the Intelligence Community is based on a redacted copy of a draft report from Crowdstrike, and this report was never finalized from its draft form. And even the draft was never unredacted for the FBI.

The whole thing was a sham from the start, as many people suspected. The Mueller operation was never seeking to uncover truth; it was an impeachment investigation by any other name. Why Mueller didn't carry it over the goal line will forever remain a mystery to me.

SummerSausage , 22 minutes ago link

Yet that did not stop Mueller from a pre-dawn raid of Stone's house with 27 armed officers & CNN claiming he helped Wikileaks get the DNC emails from Russian hackers. It isn't stopping the corrupt cabal from prosecuting Stone & Assange for that continued lie.

Consuelo , 25 minutes ago link

'Why Didn't Mueller Investigate Seth Rich?' Occam's razor. Why would a paid lackey disobey direct orders by the chief architects of this Criminal Conspiracy and risk his own life in the process? It makes no sense on any level.

DudleyjouWrite , 26 minutes ago link

The many 'Mueller' questions: Whitey Bulger, Cause of death‎: ‎Blunt force trauma

Freddie , 26 minutes ago link

Funny how we hear about all the great whistle blower-leakers in Wastergate and the wonder cub reporters aka CI$$A shills like Woodward, Bernstein and Ben Bradley who were and are CI$$A puppets. Watergate was Deepstate Rockefellers/Rothschilds taking Nixon out for tariffs and ending the gravy train Vietnam war with endless opium and heroin.

But when you have Seth Rich murdered and Wiki Leaks saying he is the guy then "democracy dies in the darkness" with the fake *** USA news media aka Operation Mockingbird Wa Post, NY Times, AP and the rest.

joego1 , 29 minutes ago link

The FBI never saw the forensic report on DNC computer. https://theconservativetreehouse.com/2019/06/15/doj-admits-fbi-never-saw-crowdstrike-report-on-dnc-russian-hacking-claim/ They really really didn't want to know the truth.

chunga , 16 minutes ago link

The significance of that can't be overstated. The investigations that have been going on NON-STOP for three years are all fake and *everybody* in DC knows it.

MartinG , 26 minutes ago link

page 48 of the mueller report does mention seth rich as the source of the hack. As quoted by Julian Assange and Mueller casually mentioned that it's untrue with no further investigation.

[Jun 14, 2019] This is Crystal Clear -- Find the Creator of the Guccifer 2.0 Hoax, and You Find the Murderer of Seth Rich by veganmark

Notable quotes:
"... Let's start with this very reasonable supposition: Guccifer 2.0 is an entity operating within US time zones who has gone out of his way to pose as a Russian hacker who was the source for the Wikileaks DNC/Podesta releases. ..."
"... villain du jour ..."
"... The subsequent mysterious death of Shawn Lucas by a weird drug cocktail might also be related. Shawn had been the process server for the class-action lawsuit against the DNC. According to Sy Hersh's FBI source, Seth indicated that he had allies who were aware of the drop box he was providing Wikileaks. It would have been necessary to eliminate these allies. Was Shawn one of these allies, and did the creator of G2.0 know this? Shawn, who was not known to be a drug user, died suddenly about a month after Seth. ..."
"... So who created G2.0? G2.0 appears to have worked in coordination with Crowdstrike. One day after Crowdstrike announced that the DNC had been hacked (with Russia the chief suspect) and that the hackers had grabbed a file of Trump Opposition Research, G2.0 makes his first public appearance, claiming to be the hacker, posting Trump Opposition Research -- and purposely leaving "Russian fingerprints" on the meta-data of his release. ..."
"... Crowdstrike was also in a position to concoct the "Russian hack" that they claimed to be investigating. Cyberanalysts have determined that two-thirds of the allegedly "Russian malware" which Crowdstrike "found" on the DNC servers had in fact been compiled subsequent to the date that Crowdstrike was brought in to investigate the "hack". In other words, there is reason to believe that Crowdstrike itself concocted this "hack" -- likely because they had been warned that Wikileaks was going to release leaked DNC emails. ..."
"... Also notable is the fact that Shawn Henry, co-founder of Crowdstrike, is a master of cyberfuckery. Prior to founding Crowdstrike, Henry served under Robert Mueller as head of FBI counterintelligence -- in which capacity he engaged in efforts to entrap and discredit Julian Assange. Indeed, others have suspected that Henry was behind G2.0, in light of the fact that G2.0's behavior was reminiscent of that of "Sabu" (Hector Monsignor), a hacker who, after secretly being arrested by the FBI during Henry's tenure there, worked under FBI direction to entrap other hackers. And the G2.0 hoax is clearly another - so far, highly successful - attempt to smear Assange. ..."
"... @The Voice In the Wilderness ..."
"... After the Popodouplous interview by Mark Steyn, there was clarity after following Russiagate since it really started before the election of 2016. The deep state actors were trying to setup some significant figure in the Trump as having ties with the Russian government. ..."
"... The irony is that we have McCarthyism once again and not one Russian is guilty of what they are being accused of. They were set up as the fall guys, and of course in the future nuclear war. ..."
Jun 14, 2019 | caucus99percent.com

Let's start with this very reasonable supposition: Guccifer 2.0 is an entity operating within US time zones who has gone out of his way to pose as a Russian hacker who was the source for the Wikileaks DNC/Podesta releases. The notion that this absurdly preening entity is a GRU hacker is idiotic.

The Mueller report's tale of how G2.0 allegedly transferred the DNC emails to Wikileaks is absurd on its face -- which is to say, Mueller is acting as an accomplice to G2.0 in his fraud.

The evident purpose of the G2.0 fraud was to detract attention from the incriminating content of the DNC/Podesta releases, by blaming those releases on Russian government hackers operating in cahoots with Julian Assange. This accomplishes 3 goals dear to the hearts of the Deep State actors behind G2.0: minimizing the damage to Hillary's campaign inflicted by the released emails; smearing the reputation of Assange, who has made an unparalleled contribution to unmasking the egregious crimes of the Western Deep State; and further defaming "the Russians", the villain du jour which our Military-Industrial-Congressional-Intelligence-Media-Academia-Think Tank* complex needs to justify the continuing rape of American taxpayers on behalf of our grotesque overspending on military hardware and our bloated global military empire.

But what was the evident fly-in-the-ointment for this brilliantly diabolic plan? The ACTUAL source of the Wikileaks releases could have blown it sky high. And if G2.0 and the Russian hacking tale had been unmasked prior to the election, the blowback on Hillary's campaign would have been enormous. Which is why the creators of G2.0 needed to eliminate the source.

There are a number of reasons to suspect that Seth Rich was the source, or a confederate of the source:

Hints dropped by Assange;

Award for info on Seth's killer offered by Wikileaks;

Wikileaks re-tweeting essays speculating that Seth was the leaker;

Craig Murray's repeated assurances that DNC/Podesta releases resulted from leaks, not hacks;

Kim Dotcom's claim that he helped Seth with the leak;

Sy Hersh's secretly recorded phone call in which he stated that a trusted source within the FBI claims to have seen an FBI memo describing an FBI analysis of Seth's laptop -- this revealed that Seth had offered to sell DNC emails to Wikileaks, and subsequently conveyed the docs to Wikileaks via drop box;

Claims by Ed Butowsky, Larry Johnson, and Bill Binney indicating that they have sources inside the intel community verifying that Seth was the leaker -- in conjunction with brother Aaron;

Jared Beck's claim that both Seth and Shawn Lucas were planning to testify in the class-action lawsuit against the DNC -- speaks to Seth's possible motive for leaking;

Claim by Rod Wheeler that, according to a source inside the DC police, the police have been ordered to "stand down" on the Seth Rich investigation;

Frenzied reaction of Donna Brazile on learning that Wheeler was investigating the Seth Rich murder - and her overt lie regarding her whereabouts on the morning of the murder.

https://caucus99percent.com/content/why-did-donna-lie-again

Some have speculated that, in line with an email by John Podesta, Seth was murdered "to make an example of him". I reject this explanation. They could have made an example by firing him and suing him. As it stands, no example was made, as the DNC claims that Russians, not Seth, were responsible for the Wikileaks DNC releases.

If the puppetmaster of G2.0 knew or believed that Seth was the leaker, Seth had to be murdered to insure success of the G2.0 hoax.

(The alternative is that G2.0 did not know that, and that Seth was beaten up and murdered in a robbery so "botched" that no valuables were taken. Yeah, right!)

The subsequent mysterious death of Shawn Lucas by a weird drug cocktail might also be related. Shawn had been the process server for the class-action lawsuit against the DNC. According to Sy Hersh's FBI source, Seth indicated that he had allies who were aware of the drop box he was providing Wikileaks. It would have been necessary to eliminate these allies. Was Shawn one of these allies, and did the creator of G2.0 know this? Shawn, who was not known to be a drug user, died suddenly about a month after Seth.

Curiously, the day after Seth died, and again the day after Shawn died, the DNC made payments of about $100K to Crowdstrike. Sheer coincidence? Maybe.

So who created G2.0? G2.0 appears to have worked in coordination with Crowdstrike. One day after Crowdstrike announced that the DNC had been hacked (with Russia the chief suspect) and that the hackers had grabbed a file of Trump Opposition Research, G2.0 makes his first public appearance, claiming to be the hacker, posting Trump Opposition Research -- and purposely leaving "Russian fingerprints" on the meta-data of his release. Unfortunately, this little dog-and-pony show turned out to be a screw-up, as it was subsequently revealed that (by the DNC itself!) that the Opposition Research document had been an attachment in Podesta's emails, and hadn't been hacked from the DNC. It is also notable that releasing Trump Opposition Research would do nothing to damage the chances of Hillary -- the alleged intent of the mythical Russian hackers. Indeed, nothing that G2.0 subsequently released was notably harmful to Hillary.

Crowdstrike was also in a position to concoct the "Russian hack" that they claimed to be investigating. Cyberanalysts have determined that two-thirds of the allegedly "Russian malware" which Crowdstrike "found" on the DNC servers had in fact been compiled subsequent to the date that Crowdstrike was brought in to investigate the "hack". In other words, there is reason to believe that Crowdstrike itself concocted this "hack" -- likely because they had been warned that Wikileaks was going to release leaked DNC emails.

https://caucus99percent.com/content/how-did-crowdstrikeguccifer-20-know-...

It bears repeating that the latest dated DNC email which Wikileaks published was written on April 25th -- several weeks after Crowdstrike had been brought in to investigate the alleged hack. Anti-hacking programs do not stop leaks .

Also notable is the fact that Shawn Henry, co-founder of Crowdstrike, is a master of cyberfuckery. Prior to founding Crowdstrike, Henry served under Robert Mueller as head of FBI counterintelligence -- in which capacity he engaged in efforts to entrap and discredit Julian Assange. Indeed, others have suspected that Henry was behind G2.0, in light of the fact that G2.0's behavior was reminiscent of that of "Sabu" (Hector Monsignor), a hacker who, after secretly being arrested by the FBI during Henry's tenure there, worked under FBI direction to entrap other hackers. And the G2.0 hoax is clearly another - so far, highly successful - attempt to smear Assange.

https://caucus99percent.com/content/shawn-henry-crowdstrike-was-fingered...

Whether or not Crowdstrike concocted G2.0, we need to find out who did -- the answer should be highly pertinent to unraveling Seth's murder.

And let's bear in mind that the creator of G2.0 has also played an integral role in concocting a Second Cold War with Russia - luring an entire generation of "leftists" into hating both Russia and Wikileaks, on completely spurious grounds. The evil of that is HUGE.

*Ray McGovern's brilliant formulation.


Linda Wood on Tue, 06/11/2019 - 2:56pm

I think your assertiveness

about hammering on these points is productive of narrowing in on the truth, whatever it may be. That's my awkward way of saying that you're not just on to something but that your precision, where you're hammering, is getting to the truth. I say that as a person who isn't convinced that Seth Rich was the DNC leaker, but who thinks he may have been murdered because he was a potential witness in a DNC voter suppression lawsuit , which amounts to the same thing really.

The strength of your outlook for me is that you emphasize the stupidity of the G2.0 revelations, the stupidity of Russian cyber-fingerprints, the vapidity of the released Opposition Research, and the timeliness of this junk evidence. It matches in tone and stupidity the evidence used to convince the American people that Saddam gave the anthrax to Mohamed Atta in Prague. Turns out Atta was not in Prague, turns out the anthrax was not Saddam's, but ours, turns out the Vice President of the United States lied about it on camera. Doesn't matter. Once the scene of the transfer to Atta was fixed in the minds of some American people, even if just a few Americans half believed it, the narrative was written.

The other strength of your essay for me is your hammering on Seth Rich's murder as eliminating a possible contradiction of the Russia narrative. The death of his associate Lucas only adds to that possibility. Clearly Seth Rich's murder was timely and important. It could very well have been a random street crime, but why he was out on the street in the middle of the night just before the filing of a lawsuit that could have involved him and the DNC is worth asking. The problem is that the media, and as far as we can tell, our government, are not asking.

I just want to thank you again for focusing on the weak points of the narrative. Each time you do, I think you bring us closer to the truth.

Here is a good report on the false evidence generated on the anthrax attack.

https://www.youtube.com/watch?v=BP2G-cejYhI

The Voice In th... on Tue, 06/11/2019 - 5:30pm
Murder seems to follow Her Highness around, doesn't it?

up 11 users have voted.

Bob In Portland on Wed, 06/12/2019 - 2:30pm
@The Voice In the Wilderness Yes, but I'd suggest it's

@The Voice In the Wilderness

Yes, but I'd suggest it's because she's lived a career in the Deep State. Hilz never really was a Dem. She was an undercover Republican/CIA when she started out. In 1968 she started the year as a volunteer for Clean Gene McCarthy, the "anti-Vietnam" Dem candidate who went on to endorse Ronald Reagan.

She then went to the the Republican convention in Miami, then spent that summer as an intern for House Republicans, where she wrote a speech about Vietnam for Representative Melvin Laird. Melvin Laird was Nixon's Secretary of Defense, who oversaw a lot of the bludgeoning of Southeast Asia.

So when she was anti-war with McCarthy was she really anti-war (subsequently there have been stories about how infiltrated McCarthy's '68 campaign was riddled with CIA infiltrators), or was she pro-war, writing speeches for Mel Laird? I suggest she never gave a shit about all those napalmed deplorables in Southeast Asia. It was a pose. I'd don't think that Bill was anti-war either. Like a lot of future politicians he didn't want his ass shot there.

She and Bill worked their way up the ladder among CIA-owned politicians. Ultimately, they were in place to deliver the Democratic Party to the Agency.

[comment:body]

MrWebster on Tue, 06/11/2019 - 9:04pm
The unwilling patsy are the Russians

After the Popodouplous interview by Mark Steyn, there was clarity after following Russiagate since it really started before the election of 2016. The deep state actors were trying to setup some significant figure in the Trump as having ties with the Russian government.

This include Flynn, the meeting at Trump Towers, and Popodouplos. So many details now fall in place like the Russian lawyer Natalia Veselnitskaya meeting with Fusion after the Trump Tower meeting. Say what?

Or just bullshit like US intelligence found out GRU agents were doing the hacking because some GRU master computer jock forgot to login into his VPN. G2 does seem to be an invention.

The irony is that we have McCarthyism once again and not one Russian is guilty of what they are being accused of. They were set up as the fall guys, and of course in the future nuclear war.

As for Seth Rich all I can speculate is that he was involved somehow. And if his murder was not random, he was about to blow apart the entire conspiracy to such a level, action had to be taken against him.

[Jun 03, 2019] More Evidence of the Russian Meddling Lie by Larry C Johnson

Notable quotes:
"... So there was about a year between the FBI's first notification of some potential problems with the DNC network and then that information getting on -- getting on Wikileaks. . ..."
"... Ten months? So the FBI notified the DNC of the hack and it was not until 10 months later that you had any details about what was actually going on forensically on their network? ..."
"... Whoa!!! How did the FBI know that the DNC was "hacked" in August 2015? The FBI does not have a "Hacking Monitor" team that sits around identifying attempted hacks within the United States. There are only a few possibilities that would account for the FBI's knowledge of this alleged event: ..."
"... The FBI had an informant who was connected to the hacker. ..."
"... The FBI had an informant inside the DNC that alerted them to the hack. ..."
"... The FBI had an active counter intelligence investigation of the person/group that was conducting this hack. ..."
"... Regardless of how the FBI learned of the August 2015 hack, the natural and unanswered question is why did the FBI not act to warn the DNC and to pursue the person or entity responsible for the hack? ..."
"... Given that Comey admitted that the FBI did not have forensic access to any of the DNC computers or network, how could Comey know that the same person/entity was responsible for the unspecified activities in August 2015? ..."
Jun 03, 2019 | turcopolier.typepad.com

The American public, with the enthusiastic support of most of the media, have been sold a big lie about Russian meddling in the 2016 Presidential election. As I have noted in previous pieces, there was nothing new nor special nor unique about Russian espionage activities inside the United States, including information and computer network operations, in 2016. Russian espionage and covert action against the United States has been a matter of fact since 1919. And the United States has been similarly engaged in such activities inside Russia.

What made 2016 unique and dangerous is that US law enforcement and intelligence agencies decide to use the ruse of Russia as a weapon to attack the candidacy and then the Presidency of Donald Trump. This attack entailed creating evidence that Trump was soliciting Russian assistance and the creation of the myth that Russia hacked the DNC. Anyone who challenges this lie is branded immediately as a Russian stooge and puppet of Putin.

We have very specific evidence regarding the fraud perpetrated about the so-called "hacking" of the DNC. Bill Binney and I have posted two pieces--one showing that the forensic evidence in the metadata of the DNC documents posted at Wikileaks could not have transferred over the internet and one showing that Guccifer 2.0 was the creation of some person or entity other than Russia.

There is another piece of public evidence that provides circumstantial evidence that the intelligence community case against Russia with respect to the allegation of extraordinary meddling is a fabrication. I am referring to the January 2017 Intelligence Community Assessment-- Assessing Russian Activities and Intentions in Recent US Elections .

I want to focus on one of the more important Key Judgements:

We assess with high confidence that Russian military intelligence (General Staff Main Intelligence Directorate or GRU) used the Guccifer 2.0 persona and DCLeaks.com to release US victim data obtained in cyber operations publicly and in exclusives to media outlets and relayed material to WikiLeaks.

It is natural and understandable to assume that this judgment is based on real intelligence held in classified channels. But it is not. Bill Binney and I have shown that Guccifer 2.0 was a fabrication. But we also have the testimony of NSA Director Admiral Mike Rogers and FBI Director Jim Comey on the "evidence" underlying the so-called hack. This key judgment was based on unverified and uncorroborated information provided by CrowdStrike.

Three months after the ICA was published, Rogers and Comey testified before the House Intelligence Committee. They were asked specifically about the proof that the DNC was hacked by the Russians. Here is the key part of that testimony:

HURD: So there was about a year between the FBI's first notification of some potential problems with the DNC network and then that information getting on -- getting on Wikileaks.

COMEY: Yes, sir.

HURD: Have you been able to -- when did the DNC provide access for -- to the FBI for your technical folks to review what happened?

COMEY: Well we never got direct access to the machines themselves. The DNC in the spring of 2016 hired a firm that ultimately shared with us their forensics from their review of the system.

HURD: Director Rogers, did the NSA ever get access to the DNC hardware?

ROGERS: The NSA didn't ask for access. That's not in our job...

HURD: Good copy. So director FBI notified the DNC early, before any information was put on Wikileaks and when -- you have still been -- never been given access to any of the technical or the physical machines that were -- that were hacked by the Russians.

COMEY: That's correct although we got the forensics from the pros that they hired which -- again, best practice is always to get access to the machines themselves, but this -- my folks tell me was an appropriate substitute.

HURD: The -- at what point did the company and the DNC use -- share that forensic information to you?

COMEY: I don't remember for sure. I think June. I could be wrong about that. . . .

HURD: So -- so that was -- how long after the first notification of -- that the FBI did of the DNC?

COMEY: Ten months.

HURD: Ten months? So the FBI notified the DNC of the hack and it was not until 10 months later that you had any details about what was actually going on forensically on their network?

COMEY: That's correct, assuming I have the dates about right. But it was -- it was some months later.

Neither the FBI nor the NSA got "direct access to the machines". Their words, not mine.

And where did the forensic data come from? CrowdStrike.

So much for the intelligence community relying on real intelligence. They were given information from a cyber security firm that waited at least 5 weeks before allegedly taking steps to disconnect the DNC computers from the infected network.

Even in an unclassified setting, Admiral Rogers and Director Comey could have stated that they had other information from intelligence sources that corroborated the CrowdStrike findings. They did not testify to this. This is more than curious, it is a tacit admission that they were relying on information from a firm hired by the Democrats and the law firm working for Hillary Clinton. This is not an independent, reliable source of information.

This fact alone does not prove the lie. But when considered as part of the entire evidence available, including the metadata from the documents posted at Wikileaks, the case for fabrication grows.

UPDATE--Thanks to "H" for spotting the obvious. I missed this completely but "H" is quite correct that this statement by Comey raises more disturbing questions. Let's go to the transcript:

HURD: Copy, I apologize. Director Comey, when was the first time the FBI notified the DNC of the hack? Roughly.

COMEY: I think august of 2015.

HURD: And was that prior to information being leaked to -- being sent on -- put on WikiLeaks?

COMEY: Yes the -- the first Russian directed releases where middle of June of the next year by D.C. leaks and this Guccifer 2.0 persona and then that was followed by Wikileaks. So about a year. A little less than a year really.

HURD: So there was about a year between the FBI's first notification of some potential problems with the DNC network and then that information getting on -- getting on Wikileaks. . . .

HURD: So -- so that was -- how long after the first notification of -- that the FBI did of the DNC?

COMEY: Ten months.

HURD: Ten months? So the FBI notified the DNC of the hack and it was not until 10 months later that you had any details about what was actually going on forensically on their network?

COMEY: That's correct, assuming I have the dates about right. But it was -- it was some months later.

HURD: Knowing what we know now, would the FBI have done anything different in trying to notify the DNC of what happened?

COMEY: Oh Sure.

HURD: What -- what -- what measures would you have done differently?

COMEY: We'd have set up a much larger flare. Yeah we'd have just kept banging and banging on the door, knowing what I know now. We made extensive efforts to notify, we'd have -- I might have walked over there myself, knowing what I know now. But I think the efforts we made, that are agents made were reasonable at the time.

Whoa!!! How did the FBI know that the DNC was "hacked" in August 2015? The FBI does not have a "Hacking Monitor" team that sits around identifying attempted hacks within the United States. There are only a few possibilities that would account for the FBI's knowledge of this alleged event:

  1. The FBI had an informant who was connected to the hacker.
  2. The FBI had an informant inside the DNC that alerted them to the hack.
  3. The FBI had an active counter intelligence investigation of the person/group that was conducting this hack.

Regardless of how the FBI learned of the August 2015 hack, the natural and unanswered question is why did the FBI not act to warn the DNC and to pursue the person or entity responsible for the hack? Moreover, how did the FBI know that the person/entity doing the hack of the DNC in August 2015 was the same one responsible for the May 2016 "theft" of emails? Given that Comey admitted that the FBI did not have forensic access to any of the DNC computers or network, how could Comey know that the same person/entity was responsible for the unspecified activities in August 2015?


Ligurio , 03 June 2019 at 08:03 AM

I am wondering what Larry Johnson and others make of this recent analysis by b at Moon of Alabama: to wit, that there is an existing log of communications between Obama administration and Putin government the publication of which would clearly exculpate Russia from these accusations?

https://www.moonofalabama.org/2019/05/trump-administration-withholds-information-that-could-debunk-russian-interference-claims.html

This information would seem to corroborate and help explain the utterly ridiculous chain-of-evidence collapse and timeline at the basis of Comey's "investigation" of the DNC leak.

JJackson , 03 June 2019 at 10:03 AM

I read some of the McCabe testimony and recall an interchange in which he said the FBI was determined to get hold of two laptops (which had been used to sort the emails into those deemed relevant to the investigation, and those not) and that the FBI would not close the investigation until they had. It came up as an example of FBI/DoJ differences - FBI wanting to subpoena the Doj preferring to negotiate for access - in the end they did get the units by negotiation. What I did not see (I did not read all of it) was any mention of efforts to get the servers.
My question to all is has anyone else seen anything on attempts to get the servers or, if none, why the same effort had not been made?

h , 03 June 2019 at 11:10 AM

Here's a question that seemingly goes unanswered when anyone writes about the hack of the DNC servers - How did the FBI even know the DNC servers had been compromised in the first place? How did they know to warn them?

The DNC is a private corporation NOT a government entity. Are all registered political corporations tethered to a governmental system by law or by contract that the FBI is monitoring? If so, what is that system and why?

If not, then how did the FBI even know their system was compromised?

The reading public is left to assume a lot in how the FBI even knew to warn them a full 10 months before the FBI's vendor, Crowdstrike, released its hack report.

Larry, can you or Bill answer this question? If they have a contract of some sort for monitoring the corporate political parties great. It'd be nice to know. But if they don't, then how in the world did they know to warn them?

Larry Johnson -> h ... , 03 June 2019 at 12:03 PM

I'm not sure I have an answer. You ask an excellent question. Let me give it some thought. I think you are on to another part of the lie.

joanna -> Larry Johnson ... , 03 June 2019 at 01:07 PM

Larry, would you along the lines give some thought to the argument, considering time frames between FBI alert as published and discovery. Ideally what additional "IT intelligence" may have resulted from cutting servers and whatever connected periphery, at, at what point in time?, off and analyze it.

JJ may want to know.

h , 03 June 2019 at 12:36 PM

Funny that! I can't imagine the DNC, let alone any other private entity, permitting the FBI to monitor their systems daily activity 365 days out of the year. If they do, well, how stupid of them. If they don't then indeed St Comey may have told the biggest lie of them all. Crazy.

I sincerely look forward to reading what you learn.

You're doing great work here and I thank the good Colonel for hosting you.

akaPatience , 03 June 2019 at 12:36 PM

At this point I wonder if it's even true that the DNC was hacked in August, 2015. Could a false accusation have been planted to serve as a component of the plan to subvert Trump's candidacy/presidency?

The DNC/Clinton campaign's "Pied Piper" strategy to promote Trump, Cruz and Carson (thinking either of them would be the easiest for her to defeat) was launched in April, 2015 . Cruz announced in March, 2015. Carson in May, 2015. Trump announced in June 2015. How did the DNC/Clinton camp even know Carson would be a candidate a month before his announcement, or that Trump would be a candidate 2 months before he announced?

I hope AG Barr and US Att'y. Durham are digging deeply.

[May 27, 2019] The Campaign to Paint Trump as a Russian Stooge Started on May 4, 2016 by Larry C Johnson

Highly recommended!
Notable quotes:
"... The Clinton campaign and the DNC retained the law firm of Perkins Coie; in turn, one of its partners, Marc E. Elias, retained Fusion GPS. We don't know how much Fusion GPS was paid, but the Clinton campaign and the DNC paid $9.1 million to Perkins Coie during the 2016 campaign (i.e., between mid-2015 and late 2016). ..."
"... Fusion GPS then "hired" FBI Informant Christopher Steele in May 2016. More about that later. ..."
"... As Lisa Page and Peter Strzok noted in their text exchange, Ted Cruz dropping out of the race in early May was the catalyst for focusing all resources on Donald Trump. This effort, which I label, the Trump Russia covert action, involved the CIA, the NSA, the FBI and British Intelligence ..."
"... May 4, 2016, George Papadopolous forwarded to Corey Lewandowski an email from Timofeev [who was introduced to Papadopolous by Joseph Mifsud] raising the possibility of a meeting in Moscow ..."
"... May 4, 2016, FBI Informant Felix Sater followed up with Michael Cohen re Trump Tower Moscow Project: ..."
"... John Brennan convened a secret task force at CIA headquarters composed of several dozen analysts and officers from the CIA, the NSA and the FBI. ..."
"... The unit functioned as a sealed compartment, its work hidden from the rest of the intelligence community. Those brought in signed new non-disclosure agreements to be granted access to intelligence from all three participating agencies ..."
"... It was manufactured as part of a broader plan to paint Trump as a tool of Putin and a servant of Russia ..."
"... We must take a new look at the story told about the so-called Russian hack of the DNC. I believe that Crowd Strike is lying about its role and the timeline. Here is the "official" story ..."
"... We are asked to believe that the Russians were in the DNC network on the 6 th of May and that Crowd Strike knew it. But what steps did Crowd Strike take to shut down the "Russians." Short answer -- nothing until June 10 th ..."
"... The DNC emails were taken on the 25 th of May 2016. That is the last date for the DNC emails posted on Wikileaks ..."
"... CrowdStrike effort did not shut down the DNC network until 10 June. If you know on May 6 th that the "Russians" are in the network, why does any credible, competent cyber security company wait until the 10 th of June to shut the system down? ..."
"... Seth Rich, a DNC employee and Bernie Sanders supporter, downloaded the emails and then gave them to Wikileaks. Rich was in contact with Wikileaks. That is not my opinion. We know that courtesy of a FOIA request by lawyer Ty Clevenger to the NSA filed in November 2017, who requested any information regarding Seth Rich and Julian Assange. ..."
"... NSA has records of communications between Seth Rich and Julian Assange. ..."
"... the CIA had a task force set up. I believe this intelligence was communicated to the Clinton campaign and that a bogus story, with Crowd Strike in a starring role, was cooked up. Implausible? ..."
"... It was Crowd Strike with the help of the Washington Post that went public and pinned the blame on the Russians ..."
"... But that was not the only active measure in place. Christopher Steele, a fully signed up FBI informant, was hired by Fusion GPS and produced his first block buster report on June 20 th claiming Trump was under the thumb of Vladimir Putin ..."
"... Things should get very interesting with the declassification in force. Can you see the NSA/Seth Rich/Wikileaks material being made declassified as well (albeit redacted for methods, etc of course)? ..."
"... Can Barr declassify the Rich/Assange material? Also, was Skripal one of Steele's "sources"? ..."
"... Joseph Mifsud is missing in this time line. He always appeared to be the most curious player. Any reason he is left out? ..."
"... This is the second time in the past few weeks I've read about surveillance on Sanders. Is there a link to a reliable source? ..."
"... I believe it's established that a guy from the UK worked in his campaign, and is now on the Integrity Initiative payroll. And the investigation into his wife's role in the financial affairs of the college she works for seems mysteriously to have run into the sands ..."
"... Before joining Manafort in Kiev, Kliminik worked for almost a decade in Moscow for the International Republican Institute, effectively running that office for some of those years. The IRI is part of the NED/USAID network. There is no way an identified "GRU agent" would be permitted as a long time employee of such an organization. ..."
"... To avoid the conflict [of interest] President Trump designates the U.S. Attorney General as arbiter and decision-maker for the purposes of declassifying evidence within the investigation ..."
"... I realize Larry Johnson's already alluded to the existence of NSA files about communications between Seth Rich and Julian Assange, but the implications are finally sinking in as to how evil this whole mess is. ..."
"... I've always been dismissive of those who've made comments about "Arkancide" in connection with the Clintons, but I may have to revise my POV. I wonder who was involved in the process of getting rid of Mr. Rich? ..."
"... Declassify the list of persons "Samantha Powers" asked FISA courts to unmask during the 11th hours of the Obama administration. Or learn who signed her name to these requests, if in fact she did not as she claimed. ..."
"... Redstate reports the 260 FISA unmasking requests in 2016 in Samantha Power name were perhaps for an Israel Settlesment-gate; not Russiagate? https://www.redstate.com/elizabeth-vaughn/2019/05/25/samantha-powers-unmasked-260-americans-2016-soon-well-learn/ ..."
May 24, 2019 | turcopolier.typepad.com

Forget July 31, 2016 as the alleged start date for the full blown Trump counter intelligence investigation. That day is a sham. The actual campaign to paint Trump as a full fledged stooge of Russia started in early May 2016. We now know the start date thanks to the text messages between star-crossed lovers Strzok and Page and the timeline buried in the Mueller Report:

It is important to understand that the collection of intelligence on U.S. Presidential candidates was not limited to Donald Trump. The collection effort started in the summer of 2015 and included the main Republican candidates and, according to a knowledgeable source, also targeted Bernie Sanders.

Also remember that the Presidential campaign is a dynamic event that changes over time. In the summer of 2015, the conventional wisdom touted Jeb Bush as the likely nominee. But as the months passed the field narrowed. By March of 2016, Donald Trump was the leader and appeared likely to garner the nomination.

April was the turning point where the foundation for attacking Trump was being laid. The law firm, Perkins Coie, hired Fusion GPS on behalf of Hillary Clinton's campaign . Andy McMarthy reported on the details of this arrangement in October 2017:

The Clinton campaign and the DNC retained the law firm of Perkins Coie; in turn, one of its partners, Marc E. Elias, retained Fusion GPS. We don't know how much Fusion GPS was paid, but the Clinton campaign and the DNC paid $9.1 million to Perkins Coie during the 2016 campaign (i.e., between mid-2015 and late 2016).

Fusion GPS then "hired" FBI Informant Christopher Steele in May 2016. More about that later.

As Lisa Page and Peter Strzok noted in their text exchange, Ted Cruz dropping out of the race in early May was the catalyst for focusing all resources on Donald Trump. This effort, which I label, the Trump Russia covert action, involved the CIA, the NSA, the FBI and British Intelligence. How do we know? Just look at the Robert Mueller Report:

Then we have this little tidbit courtesy of the Washington Post that the CIA acted, perhaps as early as June 2016 :

John Brennan convened a secret task force at CIA headquarters composed of several dozen analysts and officers from the CIA, the NSA and the FBI.

The unit functioned as a sealed compartment, its work hidden from the rest of the intelligence community. Those brought in signed new non-disclosure agreements to be granted access to intelligence from all three participating agencies.

They worked exclusively for two groups of "customers," officials said. The first was Obama and fewer than 14 senior officials in government. The second was a team of operations specialists at the CIA, NSA and FBI who took direction from the task force on where to aim their subsequent efforts to collect more intelligence on Russia.

Investigators must get the date that this CIA task force was established. They also need to identify and interview the people who participated and were cleared to work on this task force. President Trump must understand that this was not a legitimate intelligence operation. It was weaponizing the intel community to act against a Presidential candidate. It was manufactured as part of a broader plan to paint Trump as a tool of Putin and a servant of Russia.

We must take a new look at the story told about the so-called Russian hack of the DNC. I believe that Crowd Strike is lying about its role and the timeline. Here is the "official" story

May 6, 2016, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network. (From Esquire-- Esquire Magazine offers a different timeline)

We are asked to believe that the Russians were in the DNC network on the 6 th of May and that Crowd Strike knew it. But what steps did Crowd Strike take to shut down the "Russians." Short answer -- nothing until June 10 th .

The DNC emails were taken on the 25 th of May 2016. That is the last date for the DNC emails posted on Wikileaks.

Washington Post reporter Ellen Nakashima and Esquire magazine each reported that that the CrowdStrike effort did not shut down the DNC network until 10 June. If you know on May 6 th that the "Russians" are in the network, why does any credible, competent cyber security company wait until the 10 th of June to shut the system down?

I believe this is a cover story. Here is what I think really happened.

Seth Rich, a DNC employee and Bernie Sanders supporter, downloaded the emails and then gave them to Wikileaks. Rich was in contact with Wikileaks. That is not my opinion. We know that courtesy of a FOIA request by lawyer Ty Clevenger to the NSA filed in November 2017, who requested any information regarding Seth Rich and Julian Assange. The NSA informed Clevenger in a letter dated 4 October 2018 that:

Your request has been processed under the provisions of the FOIA. Fifteen documents (32 pages) responsive to your request have been reviewed by this Agency as required by the FOIA and have found to be currently and properly classified in accordance with Executive Order 13526. These documents meet the criteria for classification as set forth in Subparagraph © of Section 1.4 and remains classified TOP SECRET and SECRET."

Former NSA Technical Director, William Binney commented on this revelation:

Ty Clevenger has FOIAed information from NSA asking for any data that involved both Seth Rich and also Julian Assange. And they responded by saying we've got 15 files, 32 pages, but they're all classified in accordance with executive order 13526 covering classification, and therefore you can't have them.

That says that NSA has records of communications between Seth Rich and Julian Assange. I mean, that's the only business that NSA is in  --  copying communications between people and devices.

We already know, as noted above, that the CIA had a task force set up. I believe this intelligence was communicated to the Clinton campaign and that a bogus story, with Crowd Strike in a starring role, was cooked up. Implausible? Not as implausible as a supposed cracker jack cyber security company waiting almost six weeks before taking common sense steps to shut down and clean the DNC servers.

It was Crowd Strike with the help of the Washington Post that went public and pinned the blame on the Russians.

But that was not the only active measure in place. Christopher Steele, a fully signed up FBI informant, was hired by Fusion GPS and produced his first block buster report on June 20 th claiming Trump was under the thumb of Vladimir Putin.

This is not a complete timeline. More remains to be discovered. But there are key facts that most of the media and punditry have ignored. Donald Trump's announcement tonight (Thursday, 23 May 2019) to start declassifying documents on the Trump counter intelligence investigation and directing the intelligence agencies to cooperate may be the final straw that ends the conspiracy of ignorance.

Posted at 07:53 AM in Larry Johnson , Russiagate | Permalink


Eric Newhill , 24 May 2019 at 10:42 AM

Larry,

Once again, thank you for the good work on this important topic. Looking forward to your future installments.

Things should get very interesting with the declassification in force. Can you see the NSA/Seth Rich/Wikileaks material being made declassified as well (albeit redacted for methods, etc of course)?

O'Shawnessey , 24 May 2019 at 11:22 AM

Can Barr declassify the Rich/Assange material? Also, was Skripal one of Steele's "sources"?

The Twisted Genius -> O'Shawnessey... , 24 May 2019 at 09:49 PM

O'Shawnessey, if the Rich/Assange material establishes communication between the two, I would expect it to be declassified to bolster the "Russia didn't do it" narrative. Even if that communication was't specifically about transferring DNC files or the actual transference of DNC files, it would be useful to Russia and/or Trump supporters.

If, OTOH, the file NSA files consist of Assange discussing the use of Rich as a useful scapegoat, the files will never see the light of day. According to what Larry has written, Clevenger asked for files with information involving Rich and Assange and did not specify communications between Assange and Rich.

Clevenger should have at least specified a cut off date. If the NSA files were produced before Rich's death, it would be a gold mine for Barr and Trump. If the documents covered the time after Rich's death, not so much.

My theory is that the Rich as leaker story is similar to the whole G2 story. They muddy the water and create chaos. Classic maskirovka.

Factotum , 24 May 2019 at 12:14 PM

Joseph Mifsud is missing in this time line. He always appeared to be the most curious player. Any reason he is left out?

Larry Johnson