Softpanorama

Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
May the source be with you, but remember the KISS principle ;-)
Skepticism and critical thinking is not panacea, but can help to understand the world better

The conversion of DNC "emails leak into Russian hack"  as Crowdstrike false flag operation in which  implanted CIA malware  was attributed to Russians

It looks more and more like a false flag operation by rogues intelligence agencies operatives, part of the large operation which later produced Jan. 6 intelligence “assessment”  Binney stated that if it were a “hack,” the NSA would have been able to detect it and make the evidence known.


Who are those Crowdstrike "experts"? Who tell us those were Russians? Are those the same "experts" who found weapons of mass destruction in Iraq? Or the same who claim that Hillary bathroom email server was never breached?

“The same people on the Clinton team who made enormous efforts to claim her private email server—which operated unencrypted over the Internet for three months, including during trips to China and Russia, and which contained top-secret national-security data — was not hacked by the Russians now are certain that the DNC server was hacked by the Russians” http://www.theamericanconservative.com/articles/unpacking-the-dnc-emails/

News CIA hacking and false flag cyber operations Recommended Links Do the US intelligence agencies attempt to influence the US Presidential elections ? Strzokgate FBI and CIA contractor Crowdstrike and very suspicious DNC leak saga Was Guccifer 2.0 a false flag operation?
Dmitri Alperovitch Seth Rich murder Vault 7 scandal Strzok-gate James "We are not weasels" Comey John "911 Coverup" Mueller Brennan elections machinations
 "Seventeen agencies" memo about Russian influence on elections Anti-Russian hysteria in connection with DNC leak Questions about Huma Abedin email forwarding History of American False Flag Operations Podesta emails hack Putin-did-it fiasco: Obama repeats Bush's WMD fiasco NeoMcCartyism
Hillary Clinton email scandal Nunes FISA Memo scandal FBI contractor Fusion GPS  FBI Mayberry Machiavellians: CIA globalists dirty games against Sanders and Trump Neocon foreign policy is a disaster for the USA Deception as an art form Fake news hysteria in US MSM as a method of uppressing dissent against neoliberalism and militarism
Fake News scare and US Crisis of Character A White House Secret Service Officer Discloses His Firsthand Experience with Hillary, Bill, and How They O Who hacked whom propaganda game The Clintons' War on Women Roger Stone, Robert Morrow Amazon.com Books Bill Clinton New Gilded Age President Patrick J. Maney 9780700621941 Amazon.com Books The Secret Life of Bill Clinton The Unreported Stories Ambrose Evans-Pritchard  Amazon.com Books Partners in Crime The Clintons' Scheme to Monetize the White House for Personal Profit Jerome Corsi  Amazon
Neoliberalism as a New Form of Corporatism Pathological lying Female Sociopaths American Exceptionalism Demonization of Putin Sandy Weill: the banker who bought Bill Clinton Financial Sector Induced Systemic Instability of Economy
Diplomacy by deception Corruption of Regulators The Deep State Machiavellism Noble Lie Hillary role in cover up of Bill Clinton sexapades Nation under attack meme
Neocolonialism as Financial Imperialism  Neocons Credibility Scam Leo Strauss and the Neocons Predator state The Iron Law of Oligarchy Elite [Dominance] Theory And the Revolt of the Elite Guccifer 2.0 false flag operation

Due to the size the introductory article was converted into a separate page: DNC false flag operation: conversion of the internal email leak into Russian hack using Crowdstrike


Top Visited
Switchboard
Latest
Past week
Past month

NEWS CONTENTS

Old News ;-)

Home 2020 2019 2018 2017 2016

For the list of top articles see Recommended Links section

[Feb 22, 2020] The Red Thread A Search for Ideological Drivers Inside the Anti-Trump Conspiracy by Diana West

Highly recommended!
She does not use the term neoliberalism but she provide interesting perspective about connection of neoliberalism and Trotskyism. It is amazing fact that most of them seriously studied communist ideology at universities.
Trotskyites are never constrained by morality and they are obsessed with raw power (especially political power) and forceful transformation of the society. They are for global dominance so they were early adherents of "Full spectrum Dominance" doctirne approporitated later be US neocons. Their Dream -- global run from Washington neoliberal empire is a mirror of the dream of Trotskyites of global communist empire run from Moscow (Trotsky "Permanent war" till the total victory of communism idea)
Inability to understand that neoliberal is undermines Diana West thinking, but still she is a good researcher and she managed to reveal some interesting facts and tendencies. She intuitively understand that both are globalist ideologies, but that about all she managed to understand. Bad for former DIA specialist on the USSR and former colleague of Colonel Lang (see Sic Semper Tyrannis)
It is funny that Sanders is being accused of being a 'self-identified' socialist, while neoliberal elite is shoulder-deep in socialism for the 1% and enjoy almost unlimited access to free Fed funds.
Feb 22, 2020 | www.amazon.com

Boston Bill , March 23, 2019

Programs, programs, get your program here.

I received my copy just a few days before the Mueller investigation closed shop. There is an old saying "You can't tell the players without a program." As the aftermath of the Mueller investigation begins, you need this book. Some pundits and observers of the political scene have observed that the Mueller investigation didn't come about because of any real concern about "Trump Russia collusion," it was manufactured to protect the deep state from a non-political interloper. That's the case Diana West makes and does it with her exceptional knowledge of the Cold War and the current jihad wars. Not to mention her deadly aim with her rhetorical darts.

Erving L. Briggs , April 2, 2019
History Repeats

The Red Thread by Diana West
Diana states, "the anti-Trump conspiracy is not about Democrats and Republicans. It is not about the ebb and flow of political power, lawfully and peacefully transferred. It is about globalists and nationalists, just as the president says. They are locked in the old and continuous Communist/anti-Communist struggle, and fighting to the end, whether We, the anti-Communists, recognize it or not."

Diana traces the Red Thread running through the swamp, she names names and relates the history of the Red players. She asks the questions, Why? Why so many Soviet-style acts of deception perpetrated from inside the federal government against the American electoral process? Why so many uncorroborated dossiers of Russian provenance influencing our politics? Why such a tangle of communist and socialist roots in the anti-Trump conspiracy?
In this book, these questions will be answered.

If you have read her book "American Betrayal," I'm sure you will have a good idea about what is going on. I did. I just didn't know the major players and the red history behind each of them.

The book is very interesting and short, only 104 pages, but it is not finished yet. Easy to read but very disturbing to know the length and width of the swamp, the depth, we may not know for a long time. I do feel better knowing that there are people like Diana uncovering and shining a light into the darkness. Get the book, we all need to know why this is happening and who the enemies are behind it. Our freedom depends on it.

[Feb 04, 2020] The FBI is the secret police force of the authoritarian (aching to be totalitarian) govt hidden behind "Truth, Justice the American Way"

Highly recommended!
Feb 04, 2020 | off-guardian.org

Jack_Garbo ,

OK, baby steps. The FBI is the secret police force of the authoritarian (aching to be totalitarian) govt hidden behind "Truth, Justice & the American Way". The "democratic" facade of the US politics is, in fact, close to the Greek original: A cabal of oligarchs who decide distribution of power without daggers, and naturally exclude slaves (workers), landless peons (minorities), women (grudgingly later included, once indoctrinated) to maintain the status quo.

The "vote" the oligarchs advertise as proof of their democratic credentials in allowing the hoi polloi to have a say is insultingly quaint and blatantly futile. All elections are rigged. Of course! The outcome is preordained. Would you let some naive do-gooder wreck your decades of building an empire? Never!

If a "ringer" sneaks through the gauntlet of oligarchic vetting and slips the leash, he (always HE) is put down and the Electoral College is invoked to re-establish the status quo with an acceptable front man.

Foreign policy? Long ago decided and continued regardless of who inhabits the White House this season. He follows the script, is handsomely paid and retires famous and breathing. Go off-script and doom is certain, the funeral subdued.

In closing the class, we can conclude that the FBI is not rogue; it is functioning as intended and professionally considering the gangly amateurs it has to herd along path.

Tea break.

[Feb 03, 2020] Did the FBI Sabotage Trump's Foreign Policy by Renee Parsons

Among other things there were way too many Polish guys in Flynn witch hunt squad... They usually can be certified as adamant Russophobes.
Pientka remains a central figure in the FBI scam against Flynn as well as other clandestine activities identified within the Crossfire operation – and there's more.
Notable quotes:
"... The IG Report confirms that, after the election, top FBI officials discussed 'interview strategies' regarding how to set Flynn up in an ostensibly innocent conversation. Former FBI Deputy Director Andrew McCabe arranged the meeting with the goal to walk Flynn into a well-laid trap without informing him that there was a criminal investigation underway or that he was a target. ..."
"... On January 24, 2017, four days after the Inaugural, Peter Strzok, former FBI Chief of counterespionage and the same unnamed SSA1 (Supervisory Special Agent) who led the August briefing met with Flynn for a friendly chat, more popularly referred to as the Ambush Interview. ..."
"... What does that tell you? Powell believes, based on sworn witness testimony, that the final 302 is not an accurate reflection of the 302 notes or Flynn's statements of January 24th. ..."
"... It is curious that an SSA1 whose identity remained cloaked in secrecy throughout the entire IG FISA Report continues to be mentioned as a significant participant in the Bureau's Crossfire Hurricane while his name remains redacted on official documents. Disguising his identity may simply be attributed to activities worth concealing. ..."
"... In an unexpected turn, it was Sen. Chuck Grassley, Chair of the Senate Judiciary Committee who outed the SSA1 as agent Joe Pientka in his May 11, 2018 letter to the Bureau . ..."
"... Grassley's May 11th letter confirms that Comey was aware that Flynn had not lied regarding the Kislyak conversation and further points out the stunning revelation that Pientka was 'on detail' as staff on the Judiciary Committee, presumably with the Democrats. For all his persistence, the FBI continues to rebuff Grassley's assertions for a transcript of the Kislyak conversation as well as demanding Pientka's presence "for a transcribed interview with Committee staff." ..."
Feb 03, 2020 | off-guardian.org

We now know that, before Donald Trump's inauguration on January 20, 2017, the FBI had the ouster of Lt. Gen. Michael Flynn, the President's National Security Adviser, in its sights. By February 13th, Flynn was out the door .

Think about it. Why was Flynn's removal of the utmost importance to the FBI, more vital than removal of any other cabinet officer like the Pentagon or State Department?

So crucial was it that they created a specific strategy willing to embrace prosecutorial misconduct and agency malfeasance to take Flynn down. Prosecutorial misdeeds are nothing new to the FBI as they have a well-founded history of corruption over the years with its warts now publicly displayed.

It does not take a poli sci major to figure out that Flynn's immediate removal from the Administration was essential to undermining Trump's entire foreign policy initiatives including no new interventionist wars, peace with Russia and US withdrawal from Syria and Afghanistan.

In retrospect, the entire fraudulent Russiagate conspiracy makes sense when viewed from the perspective of an effort to rein in Trump's foreign policy goals of which Flynn would have been a necessary, integral part.

The question is where did the first glimmer of setting up Flynn originate? Who had the most to gain by disrupting Trump's foreign policy agenda? A number of suspects come to mind including the evil Brennan/Clapper twins, a bureaucratically well-placed neocon, an interested foreign entity like Israel or somewhere deep within the dark bowels of the FBI, all of which are in sync with the Democratic leadership and its corporate media minions.

At the time, the Washington Post, a favorite CIA organ, was reporting that Flynn had 'hinted' to Russian Ambassador Sergey Kislyak that Trump might be willing to 'relax' sanctions against Russia. It was then claimed that Flynn had 'misled' VP Pence by denying that he had had a conversation regarding sanctions with Kislyak. None of it was true.

With Flynn removed, Trump never regained his footing on foreign policy – which no doubt was exactly as intended; thereby opening the door for the likes of Jared Kushner to assume the role of 'trusted adviser."

Let's examine how the FBI eliminated Flynn:

In August, 2016, an FBI 'strategic intelligence briefing' was conducted for candidate Trump with Flynn as his national security adviser in attendance. The briefing, which was not a traditional 'defensive' briefing in which a presidential candidate is alerted of a foreign government's effort to intercede in their campaign, was led by an anonymous "experienced FBI counter intelligence agent." According to the IG Report on FISA abuses, at that time Flynn was already a "subject in the ongoing Crossfire Hurricane investigation."

The IG Report confirms that, after the election, top FBI officials discussed 'interview strategies' regarding how to set Flynn up in an ostensibly innocent conversation. Former FBI Deputy Director Andrew McCabe arranged the meeting with the goal to walk Flynn into a well-laid trap without informing him that there was a criminal investigation underway or that he was a target.

Such a procedure is called 'entrapment' and considered illegal. (See Clint Eastwood's new film Richard Jewell for details on the FBI's entrapment techniques).

On January 24, 2017, four days after the Inaugural, Peter Strzok, former FBI Chief of counterespionage and the same unnamed SSA1 (Supervisory Special Agent) who led the August briefing met with Flynn for a friendly chat, more popularly referred to as the Ambush Interview.

At that time, either one or both agents took handwritten notes while neither provided the usual heads-up about penalties for making a false statement – since that would have tipped their hand. Since Flynn believed this was an informal visit, he did not feel the need to have an attorney present or inquire why, if this was a friendly get-to-know chat, the need to take notes.

That conversation led to Flynn being charged with 'lying to the FBI' regarding his conversation with Kislyak.

After the interview, preparation of a 302 form is normal procedure. A 302 is a summary of and a formalizing of those notes taken during the conversation. It is those original 302 notes which are in dispute and which the FBI refuses to provide to either the Senate Judiciary Committee or to Flynn's attorney, Sidney Powell.

What does that tell you? Powell believes, based on sworn witness testimony, that the final 302 is not an accurate reflection of the 302 notes or Flynn's statements of January 24th.

It is curious that an SSA1 whose identity remained cloaked in secrecy throughout the entire IG FISA Report continues to be mentioned as a significant participant in the Bureau's Crossfire Hurricane while his name remains redacted on official documents. Disguising his identity may simply be attributed to activities worth concealing.

In an unexpected turn, it was Sen. Chuck Grassley, Chair of the Senate Judiciary Committee who outed the SSA1 as agent Joe Pientka in his May 11, 2018 letter to the Bureau .

Pientka remains a central figure in the FBI scam against Flynn as well as other clandestine activities identified within the Crossfire operation – and there's more.

According to Strzok, Pientka was "primarily responsible" as the 'note taker' and prepared the 302 report of the interview on which Flynn's prosecution is based. Powell has challenged authorship since the final 302 version contains falsified statements never made in the original interview that are now being criminalized.

In a message to his paramour Lisa Page, Strzok thanked Page for her 'edits' on the 302 regarding the Flynn-Kislyak conversation on sanctions that never occurred while Strzok suggested that, at some future time, they discuss a 'media leak strategy.'

Soon after Flynn's resignation, a skeptical Grassley requested unredacted transcripts of the Flynn – Kislyak conversation with the FBI repeatedly refusing to comply.

Grassley's May 11th letter confirms that Comey was aware that Flynn had not lied regarding the Kislyak conversation and further points out the stunning revelation that Pientka was 'on detail' as staff on the Judiciary Committee, presumably with the Democrats. For all his persistence, the FBI continues to rebuff Grassley's assertions for a transcript of the Kislyak conversation as well as demanding Pientka's presence "for a transcribed interview with Committee staff."

In response to an 'insufficient' FBI reply, Grassley then let loose with a June 6th zinger detailing a compilation of FBI lies, failures and hypocrisies too numerous to be articulated (but worth reading) here .

While a review of the FBI's entire prosecution of Flynn raises considerable legal and ethical questions, the Bureau's consistent refusal to turnover evidentiary material is indicative of a deceitful agency protecting its own criminal behavior.

Why is the FBI embedding an SSA1 with the Senate Committee that has legislative jurisdiction over its mission? Does this strike anyone else like the tactic of a totalitarian state? How does Flynn's case move forward without the FBI providing the necessary exculpatory documents legally required for every defendant? How does a Congressional Committee provide effective oversight and accountability if they are continually stonewalled by the very agency within their legal authority? How can the FBI ever be rehabilitated if Congress, fearful of a constitutional crisis, has no political will to assert its proper authority and issue a Contempt of Congress subpoena? With the FBI out of control, Is this any way to run a country?

Renee Parsons has been a member of the ACLU's Florida State Board of Directors and President of the ACLU Treasure Coast Chapter. She has been an elected public official in Colorado, an environmental lobbyist with Friends of the Earth and staff member in the US House of Representatives in Washington, DC. Renee is also a student of the Quantum Field and may be reached at @reneedove31.

Antonym ,

Better ask: did Trump sabotage the foreign policy of the FBI – CIA – FED hydra?

Obama, the Clintons and the Bushes didn't.

[Feb 01, 2020] Has The FBI Been Lying About Seth Rich by Craig Murray

Notable quotes:
"... Finally, and perhaps this is the most important point, the FBI was at this time supposed to be in the early stages of an investigation into how the DNC emails were leaked to Wikileaks. The FBI here believed Wikileaks to be indicating the material had been leaked by Seth Rich who had then been murdered. Surely in any legitimate investigation, the investigators would have been absolutely compelled to check out the truth of this possibility, rather than treat it as a media issue? ..."
Authored by Craig Murray,

A persistent American lawyer has uncovered the undeniable fact that the FBI has been continuously lying , including giving false testimony in court, in response to Freedom of Information requests for its records on Seth Rich. The FBI has previously given affidavits that it has no records regarding Seth Rich.

A Freedom of Information request to the FBI which did not mention Seth Rich, but asked for all email correspondence between FBI Head of Counterterrorism Peter Strzok, who headed the investigation into the DNC leaks and Wikileaks, and FBI attorney Lisa Page, has revealed two pages of emails which do not merely mention Seth Rich but have "Seth Rich" as their heading. The emails were provided in, to say the least, heavily redacted form.

Before I analyze these particular emails, I should make plain that they are not the major point. The major point is that the FBI claimed it had no records mentioning Seth Rich, and these have come to light in response to a different FOIA request that was not about him. What other falsely denied documents does the FBI hold about Rich, that were not fortuitously picked up by a search for correspondence between two named individuals?

To look at the documents themselves, they have to be read from the bottom up, and they consist of a series of emails between members of the Washington Field Office of the FBI (WF in the telegrams) into which Strzok was copied in, and which he ultimately forwarded on to the lawyer Lisa Page.

The opening email, at the bottom, dated 10 August 2016 at 10.32am, precisely just one month after the murder of Seth Rich, is from the media handling department of the Washington Field Office. It references Wikileaks' offer of a reward for information on the murder of Seth Rich, and that Assange seemed to imply Rich was the source of the DNC leaks. The media handlers are asking the operations side of the FBI field office for any information on the case. The unredacted part of the reply fits with the official narrative. The redacted individual officer is "not aware of any specific involvement" by the FBI in the Seth Rich case. But his next sentence is completely redacted. Why?

It appears that "adding" references a new person added in to the list. This appears to have not worked, and probably the same person (precisely same length of deleted name) then tries again, with "adding for real" and blames the technology – "stupid Samsung". The interesting point here is that the person added appears not to be in the FBI – a new redacted addressee does indeed appear, and unlike all the others does not have an FBI suffix after their deleted email address. So who are they?

(This section on "adding" was updated after commenters offered a better explanation than my original one. See first comments below).

The fourth email, at 1pm on Wednesday August 10, 2016, is much the most interesting. It is ostensibly also from the Washington Field Office, but it is from somebody using a different classified email system with a very different time and date format than the others. It is apparently from somebody more senior, as the reply to it is "will do". And every single word of this instruction has been blanked. The final email, saying that "I squashed this with ..", is from a new person again, with the shortest name. That phrase may only have meant I denied this to a journalist, or it may have been reporting an operational command given.

As the final act in this drama, Strzok then sent the whole thread on to the lawyer, which is why we now have it. Why?

It is perfectly possible to fill in the blanks with a conversation that completely fits the official narrative. The deletions could say this was a waste of time and the FBI was not looking at the Rich case. But in that case, the FBI would have been delighted to publish it unredacted. (The small numbers in the right hand margins supposedly detail the exception to the FOIA under which deletion was made. In almost every case they are one or other category of invasion of privacy).

And if it just all said "Assange is talking nonsense. Seth Rich is nothing to do with the FBI" then why would that have to be sent on by Strzok to the FBI lawyer?

It is of course fortunate that Strzok did forward this one email thread on to the lawyer, because that is the only reason we have seen it, as a result of an FOI(A) request for the correspondence between those two.

Finally, and perhaps this is the most important point, the FBI was at this time supposed to be in the early stages of an investigation into how the DNC emails were leaked to Wikileaks. The FBI here believed Wikileaks to be indicating the material had been leaked by Seth Rich who had then been murdered. Surely in any legitimate investigation, the investigators would have been absolutely compelled to check out the truth of this possibility, rather than treat it as a media issue?

We are asked to believe that not one of these emails says "well if the publisher of the emails says Seth Rich was the source, we had better check that out, especially as he was murdered with no sign of a suspect". If the FBI really did not look at that, why on earth not? If the FBI genuinely, as they claim, did not even look at the murder of Seth Rich, that would surely be the most damning fact of all and reveal their "investigation" was entirely agenda driven from the start.

In June 2016 a vast cache of the DNC emails were leaked to Wikileaks. On 10 July 2016 an employee from the location of the leak was murdered without obvious motive, in an alleged street robbery in which nothing at all was stolen. Not to investigate the possibility of a link between the two incidents would be grossly negligent. It is worth adding that, contrary to a propaganda barrage, Bloomingdale where Rich was murdered is a very pleasant area of Washington DC and by no means a murder hotspot. It is also worth noting that not only is there no suspect in Seth Rich's murder, there has never been any semblance of a serious effort to find the killer. Washington police appear perfectly happy simply to write this case off.

I anticipate two responses to this article in terms of irrelevant and illogical whataboutery:

Firstly, it is very often the case that family members are extremely resistant to the notion that the murder of a relative may have wider political implications. This is perfectly natural. The appalling grief of losing a loved one to murder is extraordinary; to reject the cognitive dissonance of having your political worldview shattered at the same time is very natural. In the case of David Kelly, of Seth Rich, and of Wille Macrae, we see families reacting with emotional hostility to the notion that the death raises wider questions. Occasionally the motive may be still more mixed, with the prior relationship between the family and the deceased subject to other strains (I am not referencing the Rich case here).

You do occasionally get particularly stout hearted family who take the opposite tack and are prepared to take on the authorities in the search for justice, of which Commander Robert Green, son of Hilda Murrell, is a worthy example.

(As an interesting aside, I just checked his name in the Wikipedia article on Hilda, which I discovered describes Tam Dalyell "hounding" Margaret Thatcher over the Belgrano and the fact that ship was steaming away from the Falklands when destroyed with massive loss of life as a "second conspiracy theory", the first of course being the murder of Hilda Murrell. Wikipedia really has become a cesspool.)

We have powerful cultural taboos that reinforce the notion that if the family do not want the question of the death of their loved one disturbed, nobody else should bring it up. Seth Rich's parents, David Kelly's wife, Willie Macrae's brother have all been deployed by the media and the powers behind them to this effect, among many other examples. This is an emotionally powerful but logically weak method of restricting enquiry.

Secondly, I do not know and I deliberately have not inquired what are the views on other subjects of either Mr Ty Clevenger, who brought his evidence and blog to my attention, or Judicial Watch, who made the FOIA request that revealed these documents. I am interested in the evidence presented both that the FBI lied, and in the documents themselves. Those who obtained the documents may, for all I know, be dedicated otter baiters or believe in stealing ice cream from children. I am referencing the evidence they have obtained in this particular case, not endorsing – or condemning – anything else in their lives or work. I really have had enough of illogical detraction by association as a way of avoiding logical argument by an absurd extension of ad hominem argument to third parties.

* * *

Unlike his adversaries including the Integrity Initiative, the 77th Brigade, Bellingcat, the Atlantic Council and hundreds of other warmongering propaganda operations, Craig's blog has no source of state, corporate or institutional finance whatsoever. It runs entirely on voluntary subscriptions from its readers – many of whom do not necessarily agree with the every article, but welcome the alternative voice, insider information and debate. Subscriptions to keep Craig's blog going are gratefully received .


Smi1ey , 19 minutes ago link

It's weird how everybody except the Mockingbird Media knows.

Ed Butowsky on the ongoing Seth Rich controversy

JasperEllings , 32 minutes ago link

" We have powerful cultural taboos that reinforce the notion that if the family do not want the question of the death of their loved one disturbed, nobody else should bring it up. "

Yeah. We see that all the time on ID Network ... whenever a family member wants authorities to stop investigating their "loved one's" death, it usually means they're protecting the guilty party. But the cases are solved by good cops who ignore the family and do what's right.

Investigating and prosecuting murders is not all about the family. It's also about finding and removing murderers from society so they can't hurt anyone else.

Vesta , 37 minutes ago link

Craig is the former UK diplomat who says he picked up the thumb drive from the leaker. Craig has since deleted that post from his blog.

Lord Raglan , 1 hour ago link

And neither Mueller nor any other government official ever bothered to interview Julian Assange even though he agreed to do so. That Mueller didn't but took CrowdStrike's word for the fact that so-called "Russians" hacked the DNC computer and then gave it to Wikileaks tells you about all you need to know. Mueller knew who likely did it but didn't want to make it part of his Report or let it be made public. Meanwhile the Russia Collusion Hoax marched on, got a life of its own and is allowed to continue in its various forms like the impeachment of a Donald Trump.

Smi1ey , 1 hour ago link

Seymour Hersh says they have documents.

What I know comes off an FBI report.

- Seymour Hersh

https://www.youtube.com/watch?v=gYzB96_EK7s

hardmedicine , 30 minutes ago link

"Is it true that the hidden metadata contained within the FIRST WikiLeaks DNC files batch clearly shows sequential time stamps (on each file copied) proving that a very high speed transfer rate took place that could only be done with direct internal access to a DNC computer on the network (i.g., a USB thumb drive or NAS drive plugged directly into a local PC or a LAN network jack within the building) as opposed to the much slower file transfer rate that would be recorded in the metadata if Russia or other hackers had remotely accessed a DNC computer or local DNC network via a remote WAN/Internet connection (to transfer those files from the outside)? Another rumor that needs to be put to rest is a SECOND batch of files may exist (that is almost identical to the FIRST batch), except it includes some fake Russian breadcrumb "fingerprints" that may have been added to support the "Russian's hacked it" story that was circulated within the intelligence agencies and leaked out to the media. IDK, true or false? "

synopsis of the real whistleblower Bill Binney, ex-NSA Technical director who has had his life ruined because he published this info.

[Jan 30, 2020] DNC In Disarray After Chairman's Secret Golden Parachute Revealed

Jan 30, 2020 | www.zerohedge.com

DNC In Disarray After Chairman's Secret Golden Parachute Revealed by Tyler Durden Thu, 01/30/2020 - 17:20 0 SHARES The perpetually broke , deck-stacking DNC has been thrown into disarray just days before the Iowa caucus after Buzzfeed revealed that a cadre of top officials at the Democratic National Committee approved, then concealed a 'generous exit package for the party chair, Tom Perez, and two top lieutenants,' which has left Democrats 'confounded over the weekend by the optics and timing of the decision on the eve of the presidential primary."

The proposal, put forward as an official DNC resolution during a meeting of the party's budget and finance committee last Friday, would have arranged for Perez and two of his top deputies, CEO Seema Nanda and deputy CEO Sam Cornale, to each receive a lump-sum bonus equaling four months' salary within two weeks of the time they eventually leave their roles .

Senior DNC officers, including members of Perez's own executive committee, learned of the compensation package after its approval, through the rumor mill, setting off a furious exchange of emails and texts over the weekend to determine what had been proposed, and by whom . - Buzzfeed

And while four-months salary might be more of a 'bronze parachute', Perez rejected the "extra compensation" package for himself and his two lieutenants in an email to officials .

Perez says he will serve through the end of the 2020 election, while all three officials have denied having any prior knowledge of, or involvement in the pay package resolution .

"One-hundred percent of our resources are going towards beating Donald Trump," said DNC communications director Xochitl Hinojosa, who added "DNC leadership will not accept any extra compensation recommended by the budget committee, which didn't operate at the direction of DNC leadership. The resolution was crafted by the budget committee and did not involve the Chair, CEO, or Deputy CEO."

Taking the fall for the resolution are two members of the DNC's budget and finance committee - Daniel Halpern and Chris Korge, who described it as the first step in a "smooth transition" for Perez.

Halperin, an anti-minimum wage lobbyist , was appointed by Perez in 2017. He previously chaired Atlanta Mayor Kasim Reed's 2009 moyoral campaign, and was a trustee for Barack Obama's 2008 inaugural committee.

Chris Korge is a Florida attorney hired in May of 2019. He was one of the top fundraisers for Andrew Gillum, Hillary Clinton, Bill Clinton, and served as the co-chairman for the Kerry Edwards campaign in 2004.

For years, the 64-year-old attorney, developer and one-time county hall lobbyist has been an important fundraiser for Democrats. He has raised millions for both Hillary and Bill Clinton, served as national co-chairman for Kerry Edwards Victory in 2004 and this year was co-chairman of Miami's unsuccessful bid to bring the Democratic convention to South Florida next summer. - Miami Herald

According to Buzzfeed , Halpern and Korge both said the resolution was above-board and a common business practice.

The resolution, which only applies to the 2021 transition, states that the outgoing chair, CEO, and deputy CEO will help facilitate donor and "stakeholder" relations, and convey "institutional knowledge" to the next chair, but is less specific about the requirements of the transition than the details of the compensation package: a lump sum of four months' pay, paid within two weeks, unless either Perez, Nanda, or Cornale is terminated for "gross misconduct."

On Tuesday, Halpern said the resolution was meant to serve only as a "nonbinding" starting point to ensure "continuity" between Perez's tenure and the next party chair . - Buzzfeed

Top Democrats within the DNC's leadership speaking on condition of anonymity said that they were shocked to learn of the compensation package on the eve of a presidential primary , amid a massive fundraising defecit .

"I think it is completely short-sighted and really stupid," said one senior official.

The package would have paid Perez around $69,000, Nanda around $61,000, and Cornale $39,000.


Wakesetter , 5 minutes ago link

Money must be tight if $70K is a issue. The internal polling for the DNC is a train wreck. Panic.

NeitherStirredNorShaken , 6 minutes ago link

The infighting is indicative of the ongoing DNC implosion. These parties, like the entire world's governments, were terminated long ago. NOBODY wants or needs the fake drama bullsh*t. If it's not on one side or the other it's on both to distract everybody. Like the ongoing fake impeachment fraud. Chump was finished day one on the job. And even if not certainly the public conspiring with both parties to commit sedition and treason after Parkland ensured it.

pHObuk0wrEHob71Suwr2 , 16 minutes ago link

Tom Perez - member of the Obama Transition Project's Agency Review Working Group responsible for the justice, health and human services, veterans affairs, and housing and urban development agencies. He is Secretary of the Maryland Department of Labor, Licensing and Regulation under Governor Martin O'Malley.

He worked in a variety of civil rights positions at the Department of Justice, including Deputy Assistant Attorney General for Civil Rights under Attorney General Janet Reno.

He also served as Director of the Office for Civil Rights at the U.S. Department of Health and Human Services under Secretary Donna Shalala, and as Special Counsel to Senator Edward Kennedy. From 2001 until 2007, he was Assistant Professor of Law at the University of Maryland School of Law, and is an adjunct faculty member at the George Washington School of Public Health.

Walter Melon , 17 minutes ago link

Golden parachutes for a few years' work.

Even if it is only 4 months, apparently his annual salary of $276,000 wasn't enough for him to save up anything.

All meals paid for, all suits paid for, all transportation paid for ...

5fingerdiscount , 20 minutes ago link

$69 grand?

That's not even a parachute.

That's like jumping into the air and landing on the ground.

[Jan 30, 2020] The FBI Has Been Lying About Seth Rich - Craig Murray

Jan 30, 2020 | craigmurray.org.uk

Craig Murray

The FBI Has Been Lying About Seth Rich 144 28 Jan, 2020 in Uncategorized by craig | View Comments Of Coronavirus and Chartism 232 27 Jan, 2020 in Uncategorized by craig | View Comments The Troubling Decline of International Law 313 24 Jan, 2020 in Uncategorized by craig | View Comments Yes Minister Fan Fiction 433 18 Jan, 2020 in Uncategorized by craig | View Comments Westminster Cannot Block Scottish Independence 656 14 Jan, 2020 in Uncategorized by craig | View Comments A Window for Peace 1353 8 Jan, 2020 in Uncategorized by craig | View Comments Lies, the Bethlehem Doctrine, and the Illegal Murder of Soleimani 4 Jan, 2020 in Uncategorized by craig | View Comments The USA Doubles Down on its Saudi Allegiance 3 Jan, 2020 in Uncategorized by craig | View Comments The Terrifying Rise of the Zombie State Narrative 2 Jan, 2020 in Uncategorized by craig | View Comments My New Year Wishes 31 Dec, 2019 in Uncategorized by craig | View Comments 45 Years of Rebellion 27 Dec, 2019 in Uncategorized by craig | View Comments London Will Never Give Independence – We Must Take It 20 Dec, 2019 in Uncategorized by craig | View Comments Indigenous Eurasian Islamic Populations 19 Dec, 2019 in Uncategorized by craig | View Comments The Difficulty of Gender Issues 17 Dec, 2019 in Uncategorized by craig | View Comments Resolution 13 Dec, 2019 in Uncategorized by craig | View Comments A Very Difficult Night 12 Dec, 2019 in Uncategorized by craig | View Comments The Most Crucial Constituencies and How You Should Vote in Them to Block the Tories 12 Dec, 2019 in Uncategorized by craig | View Comments The Largest Vote Swings in British General Election History Censored Out By the BBC and Mainstream Media 11 Dec, 2019 in Uncategorized by craig | View Comments The Invisible Tories 9 Dec, 2019 in Uncategorized by craig | View Comments The Truth About this Election 7 Dec, 2019 in Uncategorized by craig | View Comments Jackrabbit , January 29, 2020 at 15:43

"Epstein belonged to intelligence"

Maybe Seth Rich did too?

Doesn't take a genius to figure out the game here.

Unless you don't want to see it.

Rich family strangely silent about the lack of investigation. LOL.

Also: The ONLY other person that we've heard about that was "disturbed" enough by Sanders (sheepdog) treatment in 2016 to take action was Tulsi Gabbard (she resigned from her senior position). But she says nothing about Rich.

John A , January 29, 2020 at 16:03

Epstein was killed to silence him.

Rich was killed to discourage other possible whistleblowers or leakers.

Big difference.

Jackrabbit , January 29, 2020 at 16:25

John A: your comment should've begun with "I've been told that "

I haven't seen Epstein's or Rich's body. Have you?

Rich's supposed death conveniently ensured that the true source of the "hacked" emails would not be available to testify.

The "hack" was blamed on Russia and contributed to "Russiagate" – a strategic initiative to create a new McCarthyism.

!!

Jackrabbit , January 29, 2020 at 17:22

For clarity: we've been led to believe certain things that may not actually be true:

1) That Epstein was murdered – ignoring the possibility that he might've been extracted:
– Epstein was identified by his brother, not dna (despite Epstein's having been a convicted sex offender);
– There was a number of strange occurrences surrounding the death, including: an internet message about his being "switched out", very limited info about the body (which some say doesn't match Epstein's), cc-video that went missing, the relative ease of killing Epstein BEFORE he was jailed (if someone was really concerned about the potential for Epstein's releasing info), etc.

2) That Rich was murdered – but the Rich family doesn't seem too interested in finding the truth of why.

We have numerous examples of intelligence agencies trying to shape our perception of events. The White Helmets being a good example. We should be skeptical of narratives that herd us into a certain understanding of events – especially when we find that there are inconsistencies and hidden info.

!!

squirrel , January 29, 2020 at 21:04

I definitely believe Epstein was switched. I have seen nothing reported as evidence from the autopsy identifying the body (rule of thumb – where evidence matches the official narrative, it is reported, where it doesn't, it is withheld).

As you mention there was the reddit post from the prison worker about the switch before his death was announced.

The CCTV footage from the reported first unsuccessful suicide attempt was admitted in court to have been destroyed. This suggests that the first 'suicide attempt' was not a suicide attempt. I would suggest that it was a 'convincer' to set up the body switch. Of course we don't have CCTV footage from the second one either.

lysias , January 29, 2020 at 21:56

I think it's highly significant that the media never mention the possibility that Epstein was extracted.

Christy , January 30, 2020 at 00:57

I've definitely wondered about Epstein being extracted, but my hope would be that he is in protective custody spilling everything and that would help to explain why Barr corroborated the suicide. One can dream.

Mosaic , January 30, 2020 at 02:39

"an internet message about his being "switched out""

Huh. First time I have heard of this!
Where is that info, and what did the internet message say?
'What is an "internet message"?
An email?

Jackrabbit , January 30, 2020 at 03:47

The message (on 4Chan):

Here's a discussion of it: Epstein's Death Was On 4Chan Before Officials Announced It -- Now Authorities Are Investigating

One guy in the discussion put together a timeline:
05:16:36 Jeffrey Epstein dead -- dont ask me how I know, but Epstein died an hour ago from hanging, cardiac arrest. Screencap this
05:21:58 -- Was called out as a cardiac arrest at the manhattan federal detention facility. Worked asystole for 40 mins
05:31:30 -- lets say I know. Dont need a glowie coming to my crib. But they declared death at New York Presbyterian Lower Manhattan ER
05:36:45 -- screencap this then brudda and post when the news breaks
05:42:21 -- hanging (in response to being asked cause of cardiac arrest)
05:44:55 -- (from a different poster than the OP) Not saying anything after this pls do not try to dox me but last night after 0415 count they took him medical in a wheelchair front cuffed but not 1 triage nurse says they spoke to him. Next thing we know a trip van shows up? We do not do releases on the weekends unless a judge orders it. Next thing we know, he's put in a single man cell and hangs himself? Heres the thing, the trip van did NOT sign in and we did not record the plate number and a guy in a green dress military outfit was in the back of the van according to the tower guy who let him thru the gate. You guys i am shaking right now but i think they switched him out.
05:47:56 -- worked asystole arrest for 40 minutes, als intubated in the field/epi/2 liters NS infused. Telemetry advised bicarb and D50 in field. Pt transported to Lower Manhattan ER and worked for 20 minutes and called. Hospital administrator was alerted, preparing statements

The first post confirming the news:
06:00:35 -- Holy # its true, check New York Post

Note that the above times are PDT/MST. Add three hours for EDT -- NY time.

!!

pretzelattack , January 29, 2020 at 22:22

i've seen reports of other prisoners' being whacked, none of prisoners being extracted and switched. but it makes for a netflix show. epstein and rich were both whacked to prevent them from telling what they knew. that's the simplest explanation, and absent evidence to the contrary i'll go with it.

Sid Finster , January 29, 2020 at 15:55

Of course the FBI was lying. Duh.

The problem is that the honorable judge will do nothing about it, other than deliver a stern admonition to the FBI not to get caught again.

Tom Welsh , January 29, 2020 at 16:19

Omerta, innit?

Cubby , January 29, 2020 at 16:48

Nigel Farage and his gang embarrassing themselves and the UK in the EU parliaments UK Withdrawal from the EU Debate. Prattling on about no democracy in the EU but standing there in a EU parliament as an MEP. But no doubt he will be in the undemocratic House of Lords pretty soon.

Saying he hates the EU.

Brexiteers leaving with no class or dignity waving their silly tiny Union flags. The Irish woman Maireed McGuinness in the chair showed the UK rabble how to behave with some class.

Deb O'Nair , January 29, 2020 at 17:02

"Nigel Farage and his gang embarrassing themselves and the UK in the EU parliaments but standing there in a EU parliament as an MEP"

The only people who need to be embarrassed by Farage and his gang of morons are the people who have repeatedly sent him there, either through implicit support by voting for them or tacit support by not voting at all in EU election – either way he's a f*cking embarrassment to the so called UK electorate and the UK political system as a whole.

Squeeth , January 29, 2020 at 20:35

Why not, he can't get in the undemocratic House of Commons?

Sean_Lamb , January 29, 2020 at 16:59

A couple of things.

The files that Guccifer 2.0 was distributing had a creation date a few days before Rich's death. Binney and others have claimed that the speed on the transfer ruled out an internet connection, but it couple have been using the Linux cp command. What he suggested that bootable linux on a USB could have been plugged into a DNC computer, this would over ride the MS security and then the files were copied using the cp command.
What I have suggested is that perhaps FBI (or others) may have done this same operation to Seth Rich's lap top and taken the materials from him. These were subsequently passed to Guccifer 2.0, who released them in September 2016.

The other suggestion I would have is don't rule out the possibility Russians (or Ukrainians) may have killed Seth Rich. If the buried scandal in the email leaks was Browder and the Ziff brothers filching money from Russia, then what would be more appropriate if Russian mafia provided the muscle to eliminate who they believed was the source of the leaks? Then if they ever did get caught, the FBI could blame Vladimir Putin

bj , January 29, 2020 at 17:08

Ever heard of Occam's Razor?

Sean_Lamb , January 29, 2020 at 17:26

Yes, its a process used to natural sciences to give preference to simpler explanations if they fully capture the complexity of a system. For example, if planetary orbits can be mapped by a couple of equations, that is to be preferred to a system of epicycles.

From the late 20th C it acquired a minor secondary use as a heuristic shortcut to reject explanations about politics or current events which cause the speaker discomfort

bj , January 29, 2020 at 17:54

I hope you are comfortable in your toy universe.

Squeeth , January 29, 2020 at 20:36

Simply and well put. ;O)

Roberto , January 30, 2020 at 04:50

It has nothing to do with the 'discomfort' caused by confronting what is more likely truth when only conjecture is possible, but rather the recognition that humans tend to complicate rather than simplify. From its inception, the principle was to be applied to all observations, not just those of the physical universe.
William of Ockham (1285-1347/49) stated that:
'plurality should not be posited without necessity.' (pluralitas non est ponenda sine necessitate)

Deb O'Nair , January 29, 2020 at 17:39

Occam's Razor is a philosophical approach that says the simple explanation is favoured over the complex. Occam's Razor is worse than pointless in political debates because political lies are often complexities dressed up a simplicities. When dealing with political discourse concerning matters of truth then dialectics is your friend.

Deb O'Nair , January 29, 2020 at 17:10

" bootable linux on a USB over ride the MS security"

MS has security?

This seems unlikely as hard drives containing IP and other sensitive info tend to be encrypted to avoid such simple compromises, but the NSA can get 'round that easily enough – and there's plenty of useless system administrators employed because they have the right 'attitude' rather than any technical expertise.

Deb O'Nair , January 29, 2020 at 17:15

If the drive is encrypted it could be copied onto a bootable USB drive using the linux command "dd", then the encryption key could be broken at leisure.

Sean_Lamb , January 29, 2020 at 17:21

"hard drives containing IP"

I have no idea what you are trying to say. However since the target here would have been Rich's laptop, there is no reason to think it would have been encrypted.

It wouldn't require FBI or NSA involvement, just a private investigator. If Rich had been identified as a suspect, the DNC could have targeted his lap-top when he was at lunch. The possibilities are endless

Deb O'Nair , January 29, 2020 at 17:29

Intellectual property – i.e. personal/professional stuff that you write or hold in your possession.

Many people are savvy about this just in case they lose a laptop and don't want people accessing their browser cache etc. for online banking details. When you install MS you have an option to encrypt the drive and it is recommended on laptops.

Sean_Lamb , January 29, 2020 at 17:31

As I said, if the only weak point is that is a slight but non-zero possibility Rich's laptop may have been encrypted, I think I am doing pretty well.

Deb O'Nair , January 29, 2020 at 18:08

" I think I am doing pretty well."

Yes, I'm sure you do.

Magic Robot , January 29, 2020 at 19:59

Deb O'Nair
January 29, 2020 at 17:29
I understood the abbreviation 'IP' stood for 'Internet Protocol'.
Since texting overtook typing, abbreviations have become ambiguous at best.

uncle tungsten , January 30, 2020 at 02:57

Encryption is a very loose term nowadays. My device asks for my 'encryption code' meaning the pattern on the three by three dot image at login. Crapification of older complex terms is what passes for cleverness in this IT world.

Deb O'Nair , January 29, 2020 at 17:24

either way system time-stamps are a poor indicator as to the what and how's – I once changed a mainframe's system time (when you had to reboot the system to change the time) in order to run a successful April fools joke many years ago – I never got caught even though a competent system manager could have seen that an unscheduled reboot had occurred twice and deduced that the system clock was changed to create a file in the future and then rebooted to set the clock again correctly.

Sean_Lamb , January 29, 2020 at 17:29

Again, since the time would be that on Seth Rich's lap top, there is no reason to think it is wrong. In any case, Binney's argument rested on speed of transfer.

Wandering through sysadmin pranks from the early 80s has great nostalgia value, but little practical use for 2016

Deb O'Nair , January 29, 2020 at 17:49

"Again, since the time would be that on Seth Rich's lap top"

The point I have been trying to make is what you keep doing – attaching importance to system times and making a big assumption regarding fairly normal IT practices of data security and normal human behaviour, e.g. "could have targeted his lap-top when he was at lunch". Craig has done it here also, suggesting that different 'email systems' are being used because of differing time-stamp formats – which are a product of the mail reader software (MUA) and not the email server software (MTA).

Sean_Lamb , January 29, 2020 at 18:08

Most personal computers and laptops have the correct date – which is the only important variable here – namely the rapid transfer of files was only a few days before Seth Rich's death (and well after the DNC IT systems are believed to have been compromised).

Saying that most people's computers have the correct date on them and few ordinary computer users encrypt their hard drives don't seem like big assumptions to me.

My point was not suggest I can prove Guccifer 2.0's September 2016 data dump was taken from Seth Rich's computer. Rather it was to suggest it was an avenue worth exploring and that had Seth Rich come under suspicion by the DNC, there would have been opportunities for investigators (law enforcement or private) to dumped the contents of his laptop without him necessarily knowing about it.

I guess, you are of the other opinion; namely people hardly ever have the right date on their laptops, always encrypt their hard drives and virtually never let it out of their sight.

So we can agree to differ

Deb O'Nair , January 29, 2020 at 18:20

Agreeing to differ is not the issue. The 'avenue' which you wish to explore is a dead-end and if you looked at the sign at the beginning of the avenue, which I have now pointed out, you would have seen that it's a dead-end.

Chatting about linux commands and bootable USB drives may give your argument weight and an air of authority to technically non-savvy people but, however the DNC emails surfaced, whether then came from Seth Rich's laptop or he is just being setup as patsy to cover deep state actors behaviour, is a moot point (obviously not for Seth Rich if that is indeed why he died) as they have since been found all over the place, e.g. on Anthony Weiner's laptop.

Sean_Lamb , January 29, 2020 at 18:28

"Chatting about linux commands and bootable USB drives may give your argument weight and an air of authority to technically non-savvy people"

It wasn't my suggestion, it was William Binney of the NSA who can assure you is far more technically savvy than you or me.

If Seth Rich had come under suspicion within the DNC there would have been ample opportunities for them to have accessed his laptop in the way William Binney has suggested.

Hypothetically someone could have invited him in for a meeting, while someone went through his laptop.

We aren't talking about the DNC emails, we are talking about Guccifer 2.0's September 2016 data-dump. Probably some of the difficulty you are having is you don't really know much about the actual events in 2016.

Deb O'Nair , January 30, 2020 at 00:21

"it was William Binney of the NSA who can assure you is far more technically savvy than you or me."

Yes, I'm sure he can.

Buffalo_Ken , January 29, 2020 at 20:16

I believe there is MUCH more to this story of which I just picked a "random" link of the following Google search "microsoft security flaw nsa". Sorry ads are there but it was randomly chosen and I'm sticking with it.

https://www.wired.com/story/nsa-windows-10-vulnerability-disclosure/

You just can't believe one thing you read these days and that is why it ain't easy separating fact from fiction. With that said there is SO MUCH noW that is SO OBVIOUS this joke on us is either rapidly going to come to an end ..OR – can you spell oblivion? Seems simple to me.

By the way, have any of you noticed how much LESS helpful Google searches have become over the last few years. That ain't random either. The sad thing these days is so much information can only be processed by inference because there is essentially no such thing as journalism these days – at least from the so-called "professional journalist". Seems to me they are all OWNED.

Buffalo_Ken , January 29, 2020 at 21:00

By the way, the most crazy thing I read about this "security flaw" is MS had the audacity to say publicly that "nobody" had been compromised.

DO YOU THINK WE ARE STUPID?

Roberto , January 30, 2020 at 04:56

A certain former diplomat, who shall remain nameless, long ago insinuated that he passed the USB drive to Wikileaks.
Furthermore, Wikileaks' Assange clearly stated that the files did not come from a hack.

Sue , January 29, 2020 at 19:12

https://twitter.com/SharylAttkisson has a lawsuit against Rod Rosenstein.
You can read about it here https://davidharrisjr.com/lawrence-david/rosenstein-slammed-w-historic-lawsuit-over-stasi-style-spying-on-american-journalist-sharyl-attkisson-who-was-on-obama-admins-crimes/
Senate Homeland Security and Governmental Affairs Committee wrote to Bill Barr and Christopher Wray yesterday. Letter is here https://www.hsgac.senate.gov/media/majority-media/johnson-follows-up-on-unanswered-questions-from-reporters-lawsuit-regarding-obama-administrations-doj

https://twitter.com/Johnheretohelp/with_replies – This guy is the insider who worked under Rosenstein in Maryland. His story is remarkable.
One of his close friends was Molly MaCauley, a space economist specialising in satellites, who was murdered in 2017. https://en.wikipedia.org/wiki/Molly_K._MaCauley

He knows ALL about the Seth Rich assassination.

Dungroanin , January 29, 2020 at 20:02

Does Craig know what has happened to the Durham investigation?

I keep asking. It's turning into the dog that didn't bark

bj , January 29, 2020 at 20:35

Barking dogs don't bite.

Buffalo_Ken , January 29, 2020 at 21:23

@bj

Oh yes the do. I can prove it from personal experience and what better proof is there then that bj?

Buffalo_Ken , January 29, 2020 at 21:30

@bj

Here to lighten the mood I'll tell you a personal story. I had this crazy dog (some thought he was a "Boykin"). Basically a chocolate cocker spaniel out of SC. Man that dog was crazy and his name was Chester. We all loved him because we chose him knowingly and he was part of our family.

One time Chester and me got into a bit of a spat. He barked but then he ran away and hid under the bush. I was not pleased with this behavior and I took the end of a broomstick and shoved towards him. He remained steadfast under the bush so I reached down there and he bit the shit out of my hand. Hurt me bad, but I pulled his ass out of there and let him have it! I didn't go to the hospital because I know how to take care of myself (hydrogen peroxide is critical after a serious deep down bit like this). I think he may have gotten to my tendons, but they have healed and just like both of my two big toes which I'm pretty sure have been broke (that is another story or two), my healing just made me stronger. Through it all my love Chester never wavered.

I'm not gonna tell anybody publicly how Chester died, but that Vet in Blacksburg VA (or what it Christiansburg) was not a good vet. We should have amputated off his leg and then Chester might possible be sitting next to me just now. Instead he is dead and I miss him.

Buffalo_Ken , January 29, 2020 at 21:33

Sorry for all the typos above. Figure it out yourselves.

Chester was a good dog even if he was bat shit crazy. I loved him and I miss him.

Robyn , January 29, 2020 at 23:20

The Durham investigation is still under way:

https://dbdailyupdate.com/index.php/2019/12/20/john-durham-is-closing-in-on-the-coup-cabal-and-the-new-york-times-is-panicking/

Dungroanin , January 29, 2020 at 20:13

Btw – i'm waiting for CM's reaction to the EU parliament singing Auld lang in response to the poxy fartage petty brexiteers. Does seem to imply an indy scotland would be welcome.

d w kemp , January 29, 2020 at 21:24

That was my first or maybe second thought. Still cannae wait for nicola to get her erse in gear in time i fear

LinuxNerd , January 29, 2020 at 22:40

As much as I respect William Binney and his "Veteran Intelligence Professionals for Sanity" I have to say that their analysis of the DNC leak and their conclusion that the fast transfer rates indicates a local leak is nonsense. It perfectly possible and dare I say likely that a hacker looking to covertly exfiltrate data from a compromised network would first copy the files prior to compressing them with a utility such as tar. That would make the timestamps imply the fast transfer rate as is observed. Its also likely that this tar archive was then slowly exfiltrated over the course a few days so as not to flag up a highly unusual pattern of Gigabytes of data leaving the DNC network in a hurry. Regardless I actually think the offical story is BS and the leak probably was a local theft maybe even by Seth.

Buffalo_Ken , January 29, 2020 at 22:46

@LinuxNerd

Nice theory. You have yours and I have mine, but I ain't gonna tell. I ain't gonna tell not a one of you all.

J , January 29, 2020 at 23:19

You can precisely reproduce the metadata in the stolen files?

Deb O'Nair , January 30, 2020 at 00:36

The metadata contained in files are typically permissions, ownership and created/modified dates, all of which can be squashed by using a utility such as tar.

The only way to know how the data was extracted is to actually check the server logs and auditing system, which is the point I was trying to make earlier with Sean_Lamb- it is impossible to say, by looking at the files alone, how the files were copied, how long it took, who did it etc. etc.

Buffalo_Ken , January 30, 2020 at 00:53

Can someone explain this "tar" thing. Does that mean it is gunked up so that all the data is stuck together with no way to break it down piece by piece. I have a hunch that it can be broken down and further I have a lonely hunch that this is happening as we speak. I'll keep the rest of my hunches to myself – thank-you. Dignity is important to me but not as important as Justice and Liberty and with no ill will meant, somebody here tried to tell me the order of peace and harmony and all that fluff and I think they were a bit off with their premise, but I love them still because there is really no way to understand what someone is trying to communicate unless we are face-to-face. Sitting around at the table is the best and that is what I want.

So, one last goofy thing to throw out there that I have published elsewhere. Come to my place and lets talk directly face-to-face if we really want to get to know each other. But if you come uninvited be prepared for my defense. If you come with bad intent later on you will regret it assuming you are still alive and capable of thinking. If you cause harm of innocence then all I can say is be prepared for justified retribution. It is swift and fearsome and ruthless and efficient because it is justified. Simple.

Sheldon , January 29, 2020 at 23:35

Aaron Rich has participated in a grand jury investigating the murder of his brother Seth. If it was just a botched robbery then why is there a grand jury?

https://www.courthousenews.com/wp-content/uploads/2018/03/aaron-rich-DC-suit.pdf

Buffalo_Ken , January 30, 2020 at 00:20

@Sheldon

Nice very nice. I will read the whole legal statement when I get around to it because I think it is important and thank-you for the link.

You know when the Vikings were raping and pillaging as they were so competent in this behavior, there weren't all the laws and legal BS that we now have, but probably that is a good thing. One thing leads to another make the inferences you can, but don't consider them gospel because we should all know by now – if you weren't there when it happened, then how can you really know. Can't go back in time but we can imagine just a bit into the future and if we get together one community at a time then we can imagine further and let me tell you – there is POWER in that.

LinuxNerd , January 30, 2020 at 00:55

Here is the quote Sheldon is alluding to. This is what Aaron's lawyers say in a defamation lawsuit against various folks:

"Since the day he learned that he had lost his only sibling, Aaron has worked 4.diligently to assist law enforcement to bring Seth's murderer to justice. For well over a year, Aaron has devoted countless hours assisting state and federal law enforcement officials investigating the murder. He has provided law enforcement officials with access to all of Seth's property, followed up regularly with the officials regarding their investigation, and voluntarily testified under oath as a witness before a grand jury convened to investigate Seth's murder."
-- https://www.courthousenews.com/wp-content/uploads/2018/03/aaron-rich-DC-suit.pdf

Anyone here know why a grand jury would be convened to investigate Seth's murder?

Daniel , January 30, 2020 at 01:03

In America, it has now become routine for Federal officials to lie to the courts.
The most notable case . The DEA and the NSA had a co-operation to monitor drug traffickers. But, later, when it came time to go to court, Federal prosecutors knowingly filed false documents with the court claiming that the information came from elsewhere. IIRC, they claimed "anonymous informants". AFAIK, no action has ever been taken against these lawyers and legal representatives of the US government for deliberately lying to the courts.
There are numerous other cases. About once a generation the FBI Crime Lab gets busted and has to admit that it falsifies reports on evidence. That's happened enough in my lifetime that I've lost count of how many times.
This is the court system and government which is supposed to give Julian Assange a fair trial. Given that America imprisons more of its own people than anyone else in the world, there are a lot of Americans that would laugh at the idea of a fair trial in America.

Buffalo_Ken , January 30, 2020 at 02:42

Julian Assange should be freed to do as he wants and I'm watching to see what happens and that will inform my next move. Not kidding around and all you pompous MF fools better watch out because it could happen to you. It could happen in a heartbeat.

Free the man for fucks sake all he has done is tried to better facilitate communication and to whom is that a crime? The answer to that is telling.

Now, for me, nothing but a peasant trying to get by in the crazy world of maybe too much communication (Facebook should be split up) let me say, it is time for me to go bed.

Peace to all who want peace. For the rest of you you don't want it: fuck off. You are going to get what you deserve. Simple.

uncle tungsten , January 30, 2020 at 01:15

Well said Craig, every bloody sentence. As for wikipedia (spit) we need a site called OffWikipedia or some such. In the same vein as OffGuardian who perform a great service to thinkers.

Buffalo_Ken , January 30, 2020 at 01:30

uncle tungsten – can you elaborate on your troubles with wikipedia. Are you suggesting it is causing trouble? If so, explain yourself. If not, then what are you implying. I think I will call your bluff. I think on first reading that you are full of shi*. Explain yourself and prove me wrong if you don't mind. If don't speak up then I know about you that you do about me.

Buffalo_Ken , January 30, 2020 at 01:42

You know what uncle tungsten – disregarding the typos in my response I think you get the gist of what I was saying and honestly buddy if you don't care for Wikipedia then don't go there. But don't disparage one of the few places left to get good information.

Oh and by the way you old fart. I think you have a lot to learn and Wikipedia or somewhere else might help you with that or are you nothing but an old fart stuck in the past? That is a fair question.

Buffalo_Ken , January 30, 2020 at 02:02

Holy Moly I'm talking more than I should but lucky for me I'm nothing but a peasant.

So to keep it simple I'm thinking there are some leaders out there who are wondering if they might be fixing to suffer the same fate as that Iranian General who was taken out with a drone (along with his comrades most of whom must of been innocent). Anyhow, you are damn straight, if it could happen to him then obviously it could happen to you. How does this make you feel? Do you feel insecure? In general, I would say you get what you deserve and more than likely you deserve your insecurities because they must be coming out of your conscience. Merit is what matters and so don't try to pass on your leadership to a son or daughter because odds are they have less merit than you do.

Me – I am nothing but a peasant and for that I feel like I am blessed. Better to be a peasant than to be a target.

What do you all think – is the cliff nearby?

Buffalo_Ken , January 30, 2020 at 02:25

I said there were leaders from two countries who are the "top" psychopath ones as far as I can tell. I'd appreciate if someone could convince me otherwise and prove me wrong. Otherwise, these fuckers are gonna get what they deserve. In memory of that fine man killed in the Turkish embassy and even more in recognition of that fine Iranian General just trying to facilitate peace. He didn't deserve what he got, but he got it nonetheless.

Justified Retribution. This ain't no game.

Mosaic , January 30, 2020 at 03:00

"Holy Moly I'm talking more than I should"

You sure are, and you are an effing bore.
Find something else to do.

Buffalo_Ken , January 30, 2020 at 03:10

@Mosaic

Sad to say this cause I like what you call yourself, but to keep it simple your comment has been noted. Maybe you need to look in the mirror you puppet.

Now it truly is time to go to bed. We all could use some rest (I think). That is the only good thing about being in a prison. Plenty of rest to be had.

[Jan 30, 2020] FBI Lied to a Federal Court Regarding Seth Rich by Larry C Johnson - Sic Semper Tyrannis

Jan 30, 2020 | turcopolier.typepad.com

FBI Lied to a Federal Court Regarding Seth Rich by Larry C Johnson Larry Johnson-5x7

Thanks to Judicial Watch, a new batch of emails have surfaced that put the FBI in a whole lot of trouble with at least two Federal Judges. Attorney Ty Clevenger made repeated FOIA requests to the FBI for all emails and communications dealing with Seth Rich and his murder. The FBI denied they had any such communications. Whoops! There are now five emails and one text message that show that denial is not true. Let's dig into the details.

The FBI, in the person of David Hardy, affirmed in an affidavit that there were no responsive records. Hardy is the Section Chief of the Record/Information Dissemination Section ("RIDS"), Information Management Division ("IMD"),1 Federal Bureau of Investigation ("FBI"), in Winchester, Virginia. Here are the relevant portions of his first affidavit:

On September 30, 2017, by electronic submission via the OIP online portal, Plaintiff submitted an administrative appeal of the FBI's September 19, 2017 determination. Specifically, Plaintiff alleged the FBI limited its search to the Central Records System("CRS") for main file records. Additionally, Plaintiff noted that any responsive records likely would be found in emails, hard copy documents, and other files in the FBI's Washington Field Office; therefore, the FBI should be directed to conduct a thorough search, to include emails and other records in the Washington Field Office. . . .

(9) By letter executed on November 9, 2017, OIP advised Plaintiff it affirmed the FBI's determination. OIP further advised Plaintiff that to the extent his request sought access to records that would either confirm or deny an individual's placement on any government watch list, the FBI properly refused to confirm or deny the existence of any such records because their existence is protected from disclosure pursuant to 5 U.S.C. § 552(b)(7)(E). . . .

(19) CRS Search and Results. In response to Plaintiff's request dated September 1, 2017, RIDS conducted an index search of the CRS for responsive main and reference file records employing the UNI application of ACS. The FBI searched the subject's name, "Seth Conrad Rich," in order to identify files responsive to Plaintiff's request and subject to the FOIA. The FBI's searches included a three-way phonetic breakdown5 of the subject's name. These searches
located no main or reference records responsive to Plaintiff's FOIA request.

(20) Subsequently, the FBI conducted additional searches of the CRS via the UNI application of ACS and a Sentinel index search for both main and reference file records. The FBI used the same search terms it used in its original searches as described supra. This new search also resulted in no main or reference file records being located responsive to Plaintiff's FOIA request. . . .

(25) The FBI conducted an adequate and reasonable search for records responsive to Plaintiffs FOIA request; however, no records were located. First given its comprehensive nature and scope, the CRS is the principle records system searched by RIDS, to locate information responsive to most FOIA/Privacy Act requests, as the CRS is where the FBI indexes information about individuals, organizations, and events for future retrieval. See , 14, supra. Second, the CRS is the FBI recordkeeping system where investigative records responsive to this request would reasonably be found. Given Plaintiffs request sought information about an individual subject, Seth Conrad Rich, who was murdered in the District of Columbia on or about July 10, 2016, such information would reasonably be expected to be located in the CRS via the index search methodology. Finally, the office likely to conduct or assist in such an investigation -- WFO -- confirmed that it did not open an investigation or provide investigative or technical assistance into the murder of Seth Conrad Rich, as the matter was under investigation by the MPD, who declined the FBI's assistance.

Pursuant to 28 U.S.C. § 1746, I declare under penalty of perjury that the foregoing is true and correct, and that ibits A - E attached hereto are true and correct copies.

Well, guess what? Just as Ty Clevenger anticipated, the relevant emails were in the Washington Field Office. To make matters worse, some of these emails were sent to FBI Headquarters. David Hardy either is incompetent or he has lied. There is no middle ground. In either case, his submission was not true.

Here are the emails (I transcribed them and put them in chronological order to facilitate your ability to read them and understand what is being communicated).

10:32 am -- Message sent from FBI's Washington Field Office Public Affairs officer to at least three other Washington Field Office FBI Agents. In addition, there are three other blacked out areas in the addressee field, which appear to be the names of persons who do not work at the Washington Field Office.

I hope you are well. I heard from the front office that you are covering for BLANK this week. Various news outlets are reporting today that Julian Assange suggested during an overseas interview that DNC Staffer, Seth Rich, was a Wikileaks source and may have been killed because he leaked the DNC e-mails to his organization, and that Wikileaks is offering $20,000 for information regarding the death of Seth Rich last month. Based on this news, we anticipate additional press coverage on this matter. I hear that you are in a class today; however, when you have a moment can you give me a call to discuss what involvement the FBI has in the investigation.

12:53 pm -- Message replying to the 10:32 am message, sent from FBI Washington Field Office with at least four other Washington Field Office FBI Agents addressed on the message. There also are two other blacked out addresses, which may indicate personnel not in the Washington Field Office.

Adding BLANK (a name to the addressee list). I am aware of this reporting from earlier this week, but not any involvement in any related case. BLANKED OUT.

12:54 pm -- Message sent from FBI Washington Field Office with at least four other Washington Field Office FBI Agents addressed on the message. There also are two other blacked out addresses, which may indicate personnel not in the Washington Field Office.

Adding BLANK for real. Stupid Samsung. (Apparently the author of this message failed in the preceding message.)

1:00 pm -- Message replying to the 12:54 pm message, sent from FBI Washington Field Office with five other Washington Field Office FBI Agents addressed on the message.

Hi. (THE REST OF THE MESSAGE IS BLANKED OUT.)

1:25 pm -- Message replying to the 1:00 pm message, sent from FBI Washington Field Office with five other Washington Field Office FBI Agents addressed on the message. Plus, two other BLANKED out addressees not identified.

Thanks BLANK will do.

7:09 pm -- Message from FBI Washington Field Office to Jonathan Moffat and Peter Strzok of the FBI's Criminal Division and two other BLANKED out addressees.

FYSA (For Your Situational Awareness). I squashed this with BLANK

7:49 pm Text message from Peter Strzok to Lisa Page forwarding her this email chain.

The initial response to the query from the Public Affairs Office of the Washington Field Office is telling. The Agent could have responded very simply--The FBI was not involved in any facet of the Seth Rich investigation. This was a local matter handled by the DC Police.

But that is not how the Agent responded. And then he took the step of adding in people at FBI Headquarters. How do we know this? The message from the Washington Field Office at 7:09 pm was sent to the Criminal Division to Agents Moffat and Strzok.

Ty Clevenger now has ample ammunition to return to court and insist that the FBI be required to identify all agents involved in these email chains and to discuss what they knew about the Seth Rich case. David Hardy declared under the penalty of perjury that there were no such emails. I doubt that the two judges involved in the relevant cases on this matter will be happy to learn that the FBI stonewalled a valid FOIA request and a

Stay tuned.

Below is the copy of the email chain. You need to read from bottom to top.

Seth Rich Email Chain Complete

Posted at 08:32 AM in Larry Johnson | Permalink

Reblog (0) Comments Feed You can follow this conversation by subscribing to the comment feed for this post. Sid Finster I will be shocked if the judge does anything about it beyond a slap on the wrist an an admonition not to get caught again.

Posted by: Sid Finster | 29 January 2020 at 10:07 AM Vig Explain, would you? Maybe I didn't read carefully enough.

Strictly it had to be handled by DC police, nevertheless the FBI was made aware of it-- and should have taken over at that point?--and somewhere up the chronology ladder Peter Strzok got envolved, not quite the way he should have though, instead he only forwarded the latest mail to his "interior lover". Suggesting??? Peter Strzok as man in charge my have stopped the FBI from taking over?

Posted by: Vig | 29 January 2020 at 12:18 PM james thanks larry.. what are the chances seth rich was an intel asset?

Posted by: james | 29 January 2020 at 12:23 PM Larry Johnson Very unlikely that he was an intel asset.

Posted by: Larry Johnson | 29 January 2020 at 12:38 PM David Habakkuk Sid Finster,

I think it is premature to prejudge the question of how successful the FBI will be in heading off the attempts of Ty Clevenger and Ed Butowsky to penetrate the wall of silence which has been erected around the involvement of that organisation in covering up the truth about Seth Rich's murder, and his involvement in leaking the materials from the DNC published by 'WikiLeaks.'

It is also material here that other parts of the cover-up may be running into trouble.

Further indications that contingency plans to use Steele as a 'patsy' were made early on, and are now being implemented, come in an extraordinary article published in the latest edition of the 'Sunday Times' by the paper's Political Editor, Tim Shipman.

Important parts of this were reproduced in a piece by Daniel Chaitin in the 'Washington Examiner', headlined 'Top British spy report: "Strong possibility' that anti-Trump dossier was completely fabricated", which links to the original article.

(See https://www.washingtonexaminer.com/news/top-british-spy-report-strong-possibility-that-anti-trump-dossier-was-completely-fabricated .)

The original is, unfortunately, behind a paywall – but can be obtained if one is prepared to take the trouble to sign up for the free allowance allowed by the papers.

In fact, much more interesting than the fact that a well-known British writer about spies, Rupert Allason, aka 'Nigel West', who is clearly a conduit for elements in our security services, has been brought in in support of the strategy of making Steele the 'patsy', are paragraphs that make a claim which Chaitin does not appear to notice. These read:

'In November (2016 – DH], the FBI began checking out Steele and his sources. The inspector- general found that former colleagues described Steele as demonstrating "poor judgment" by "pursuing people with political risk but no intel value".

'More worryingly, they worked out that most of Steele's information came from a "primary sub-source", identified by American media as a Belarus-born businessman, Sergei Millian. The FBI interviewed Millian three times, in January, March and May 2017.

'He told the FBI that he was an unwitting source and much of what he had told Steele was "just talk", "word of mouth and hearsay" or conversations "had with friends over beers". The claims about Trump cavorting with prostitutes at the Ritz-Carlton were "rumour and speculation" or said "in jest". The inspector- general's report says Millian "made statements indicating that Steele misstated or exaggerated" what he had told him and that his reports were far more "conclusive" than was justified.'

As it happens, while I have seen Millian referred to as a source for the dossier attributed to Steele, I have – so far at least – not seen him identified with the supposed 'Primary Sub-source.'

A critical question is whether the 'Sunday Times' is right in claiming that the person whom the FBI are reported by Inspector-General Horowitz as interviewing in January, March and May 2017, in a version which that figure's report accepts, was in fact Millian.

What Glenn Simpson and Peter Fritsch have to say in the apologia they published last November under the title 'Crime in Progress', following their attempt to claim that there was serious sourcing for the 'golden showers' claim, seems worth bringing into the picture:

'Steele said that one of his collectors was among the finest he had ever worked with, an individual known to U.S. intelligence and law enforcement. Neither Simpson nor Fritsch was told the name of this source, nor the source's precise whereabouts, but Steele shared enough about the person's background and access that they believed the information they planned to pass along was credible.'

The suggestion seems clear that this was the 'Primary Sub-source.'

Anyone who did the most basic research into Millian would very rapidly realise that the notion that he could have the kind of 'background and access' making the claims made in the dossier attributed to Steele 'credible' was laughable.

A rather obvious hypothesis, I think, was that the 'Primary Sub-source' was actually – to hark back to the title of a book and film about a classic British disinformation operation – 'The Man Who Never Was.'

The actual truth, I think, is likely to have been well-summarised by Lee Smith in the opening paragraphs of his review of the Simpson/Fritsch book, which is headlined 'A crime still in progress':

'Crime in Progress is, inadvertently, the cruelest book ever written about the American media. Its authors, Glenn Simpson and Peter Fritsch, are the two former Wall Street Journal reporters who founded the DC-based consultancy Fusion GPS. In 2016, the Hillary Clinton campaign paid them to use their former media colleagues to push a conspiracy theory smearing her Republican opponent, Donald Trump. The crime is still in progress.

'To help top-notch journalists market the fantasy that one of the world's most familiar faces was a secret Russian spy, Fusion GPS co-ordinated with the FBI to forge a series of "intelligence reports". They attributed these lurid memos to a down-on-his-luck Brit, a former spy named Christopher Steele.'

(See https://spectator.us/crime-progress-russiagate-whistleblowers/ )

My only reservation about this is that I do not think that Steele was 'down-on-his-luck', until he found that his partners in the 'crime still in progress' were planning to wriggle out of their own responsibility by making him the 'patsy', or 'fall guy.'

To give intelligence credibility to a farrago which, as Smith suggests, is likely to have been cooked up in Fusion GPS, with the assistance of criminal elements in the U.S. law enforcement and intelligence apparatus, it was helpful to bring in an old confederate of both, Steele.

(One could also then appeal to that curious snobbery that often makes Americans take seriously precisely the kind of 'Brit' to whom they should give a very wide berth!)

This, ironically, created a situation where those criminal elements could then suggest that their only fault was in being credulous about claims made by a British intelligence officer whom it was suggested past experience gave them reason to trust.

A natural way of developing this strategy would be to find someone like Millian, and use him to buttress the central claims that the dossier 1. was actually produced by Steele, and 2. that it had actual sources, rather than being largely fabricated. (As so often, the W.C. Fields principle applies: 'Never give a sucker an even break.')

It seems clear that Horowitz has been prepared to go along with this strategy, and that a very large number of 'suckers' among those on the other side of the fence from Simpson and Fritsch have fallen for it, hook, line and sinker. (It might be invidious to name names.)

The likely reason why all this happened, of course, is that a succession of events – the discovery that material from the DNC had been leaked and was going to be published by 'WikiLeaks', the identification of Seth Rich as the figure responsible, and then his murder – produced an urgent need for a cover-up.

Inevitably, given the shortage of time, this was imperfect, and gave hostages to fortune.

It is clear that Clevenger and Butowsky have, and probably will continue to have, difficulties in getting judges to follow the evidence where it leads.

However, the former is a first-class 'ferret', and I think it is premature to rule out the possibility that some of the people who are adjudicating these cases may decide that they do not want to continue to cover up a 'crime still in progress.'

As it happens, Clevenger has written to John Durham, Richard Donague, and also Michael Horowitz, announcing that he wishes to file a criminal complaint in relation to the materials which Larry has discussed.

(An account with relevant links is given in a new post entitled 'We now have unequivocal proof that the FBI is hiding records about Seth Rich' on Clevenger's 'Lawflog' blog, subtitled 'Because some people just need a good flogging.'

See http://lawflog.com/?p=2282 .)

I would strongly recommend anyone seriously interested in seeing the truth about these matters exposed, and the conspiracy against the Constitution defeated, to sign up for alerts from Clevenger's blog.

Posted by: David Habakkuk | 29 January 2020 at 12:51 PM scott s. In fairness to the FBI, they didn't say there were no emails, they said they used a search of CRS and that didn't identify any emails. It isn't clear to me from what was provided in this post whether the search would have included records from the WFO.

Posted by: scott s. | 29 January 2020 at 12:54 PM David Habakkuk Larry and Pat,

I posted quite a long response to 'Sid Finster', which has gone into spam.

Have been reading both the Simpson/Fritsch apologia, and also the book-length version of Heidi Blake's attempt at 'escapology' on behalf of 'BuzzFeed.'

Both drive a point home: one simply cannot take on trust anything these people say.

This also includes material like the Bruce Ohr 302s. I know think that these were crafted, between him, Pientka, Strzok et al, as part of contingency plans to make Steele the 'patsy' if the attempt to 'escalate' with the conspiracy against the Trump failed.

Posted by: David Habakkuk | 29 January 2020 at 01:00 PM Diana Croissant The sorry fact is this: Out here in places like my town in flyover country, I could mention Seth Rich and no one would have the slightest idea who he was and why he should get justice--or at least that the truth about his life and death should be told.

Does he have family fighting for the truth about his death? Are there investigative reporters on the story?

Posted by: Diana Croissant | 29 January 2020 at 05:41 PM turcopolier Diana Croissant

Should we be silent about this?

Posted by: turcopolier | 29 January 2020 at 05:45 PM oldman22 David H et al
Re Christoper Steele, allow me to refresh your recollection with this piece from 3 years ago by John Helmer (too much detail to quote or attempt to summarize).
http://johnhelmer.net/when-going-to-bed-with-dogs-is-news-getting-up-with-fleas-is-a-scoop-heres-the-one-about-trumps-bed-putins-bed/print/

Posted by: oldman22 | 29 January 2020 at 10:56 PM English Outsider
Oldman22 -The article states - "Steele, who quit MI6 in 2009, never told his former bosses, what he was up to."

I believe this judgement would now be revised, if one can trust newspaper articles detailing an earlier meeting with Sir Richard Dearlove that have since come out.

Posted by: English Outsider | 30 January 2020 at 05:25 AM Sid Finster @David Habbakuk: I hope that you are right.


However, I have a little experience with how these things go down in the real world. I genuinely hope that this experience will prove misleading.

Posted by: Sid Finster | 30 January 2020 at 10:42 AM Flavius The omni-present Strzok/Page.
The DNC computer hack strikes me as another faux investigation identical in that regard to the Clinton e-mail investigation - half measures abounding. The question is why? The brief e-mail exchange between WFO and FBIHQ makes it perfectly clear that if the field investigators had not already taken an interest on following up on Rich as an obvious lead they certainly should have. It appears to me that they had not since the initial inquiry came down from the Public Affairs Office and seems somewhat less than urgent.
My question is why wasn't the FBI all over this obvious lead if they wanted to get to the actual bottom of the DNC hack?

Posted by: Flavius | 30 January 2020 at 11:40 AM

[Jan 28, 2020] Previously considered lost Seth Rich-related emails have been uncovered. These emails weren't just from anybody. These emails were between FBI lovebirds Peter Strzok and Lisa Page, the two most corrupt individuals involved in the Russia Collusion Hoax

Jan 28, 2020 | www.zerohedge.com

hooligan2009 , 39 seconds ago link

remember seth rich!

https://www.thegatewaypundit.com/2020/01/breaking-exclusive-christopher-wrays-fbi-caught-in-another-lie-and-cover-up-fbi-emails-on-seth-rich-uncovered/

"Today, January 27, 2020, we have a stunning update ==>>

After previously claiming no FBI records could be found related to Seth Rich, emails have been uncovered. These emails weren't just from anybody. These emails were between FBI lovebirds Peter Strzok and Lisa Page, the two most corrupt individuals involved in the Russia Collusion Hoax.

In a set of emails released by Judicial Watch on January 22, 2020, provided by a FOIA request on Peter Strzok and Lisa Page, two pages on emails refer to Seth Rich:"

https://www.judicialwatch.org/wp-content/uploads/2020/01/JW-v-DOJ-Strzok-Page-Prod-16-00154.pdf

[Jan 22, 2020] The Comey-Lynch Plausible Deniability Game – OffGuardian

Jan 22, 2020 | off-guardian.org

As the structure and form of institutions continue to breakdown offering new perspectives and unexpected revelations, it is fitting that former FBI Director James Comey continues to be scrutinized regarding his behavior on multiple aspects of the HRC email scandal, Russiagate and other adjacent activities.

Still under a dark cloud is the lack of a satisfactory explanation for Comey's unprecedented decision to usurp the announcement (away from AG Loretta Lynch) that HRC would not be prosecuted for her mishandling of classified material as Secretary of State. Related to that decision, the DOJ is currently reported to be investigating whether Comey, who has a history of leaking 'sensitive' data, also leaked a classified Russian intel document to reporters in 2017.

To better understand the depth of Comey's malfeasance, it is worth nothing that the IG Report "Investigation of Former Federal Bureau of Investigation Director James Comey's Disclosure of Sensitive Investigative Information and Handling of Certain Memoranda" of August 2019 determined that Comey willfully violated FBI rules and policies and was in violation of his Employment Agreement as he leaked 'sensitive' information including his personal communications with President Trump. The Report concluded that:

Former Director Comey failed to live up to this responsibility. By not safeguarding sensitive information obtained during the course of his FBI employment, and by using it to create public pressure for official action, Comey set a dangerous example "

And:

We have previously faulted Comey for acting unilaterally and inconsistent with Department policy. Comey's unauthorized disclosure of sensitive law enforcement information about the Flynn investigation merits similar criticism."

The Report's conclusions were forwarded to the DOJ which declined to prosecute Comey.

Fast forward to the current DOJ investigation which again questions Comey's penchant for the disclosure of "sensitive" information while opening a Pandora Box of unexpected proportions.

According to the Washington Post, in 2016, the Dutch secret services obtained a Russian intel document which contained a copy of an email in which then-DNC Chair Debbie Wasserman Schultz assured Leonard Bernardo of the Soros Open Society Foundation that Attorney General Loretta Lynch would not prosecute HRC for use of her personal server for classified government documents.

In the email, DWS also informed Benardo that Amanda Renteria, Clinton's National Political Director, had spoken with Lynch who offered further assurance that the FBI investigation "would not go too far."

While the document was forwarded to the FBI, it was dismissed as an unreliable Russian propaganda effort to influence the outcome of the HRC investigation.

As the FBI claimed the Russian document had no "investigative value," the Washington Post found that

Comey's defenders still insist that there is reason to believe the document is legitimate and that it rightly played a major role in the director's thinking."

Even in denial of its veracity, the document was taken seriously enough for Comey to use its existence as an excuse for making his extraordinary announcement, according to the Washington Post, "on his own, without Justice Department involvement" or informing the Attorney General that he was closing the case and that HRC would not be criminally prosecuted.

Comey's announcement came days after Lynch met with Bill Clinton on the tarmac in Phoenix and days before HRC was to be interviewed by the FBI and days before Comey made his shocking announcement.

June 29th Lynch – Bill Clinton meeting on tarmac in Phoenix; July 2nd FBI interview with HRC; July 5th Comey announced 'no prosecution'

Existence of the email provided the perfect foil for Lynch to avoid having to make and announce the decision as if it were on her own volition.

Allegedly, Comey decided to move forward with the announcement which was intended to prove that the no-prosecution decision had been made without any bias or interference.

If, so the thinking goes, Lynch had made and announced the decision after her meeting with Bill, she would have been accused of corruption or having been compromised and that a deal had been cut in HRCs favor. IG Horowitz found that Comey displayed a "troubling lack of direct substantive communication with AG Lorretta Lynch."

In other words, it was Lynch's responsibility, as Attorney General, to retain sole authority over a decision of such national significance and be willing take the heat, whatever the outcome. One wonders if Lynch ever protested to Comey that, without her approval, he usurped her job and made a highly controversial decision that the entire country was watching.

Where were the women libbers when a man on a lower rung of the totem pole, seized a significant function away from its rightful superior authority which, in this case, was a black female.

In other words, Comey saved Lynch's butt from charges of corruption by skillfully appropriating the announcement which otherwise would have been problematic for her to defend after having been caught publicly meeting with the defendant's husband.

Does anything about this strike you as credible?

Not surprisingly as the email was dismissed, the Bureau never pursued routine investigative tools that would have been second-nature in any such top-level investigation.

The FBI, as it dismissed the email as a fake, did not conduct a forensic exam to verify the document's origin just as the FBI never subpoenaed the DNC server to conduct a forensic exam to determine the source of the Wikileaks emails.

While all the parties involved denied that any of them ever knew each other, the Bureau apparently never confirmed that or pursued obtaining a copy of the email from any of the parties and, most importantly, the Bureau never interviewed any of the parties

In May, 2017, President Trump fired Comey as "no longer able to effectively lead the Bureau."

Here's one version of how this scam could have played out. It's called plausible deniability and is used routinely to shield a high level public office from public accountability. It is an old political trick and most of the public remains blind to how easy it is to manipulate public opinion.

Here's how it works: public official #1 is protected from 'knowing' the truth about a certain political reality and since #1 is never informed, they can honestly say "I didn't know" "No one told me" "We never talked about it" "it came as a surprise to me."

The invocation of plausible deniability is intentionally set up to allow an event to occur and yet prevent #1 from 'knowing' the facts thereby being publicly and legally immune from accountability since no hard evidence exists proving that #1 had any foreknowledge of the matter at hand.

Since The Big Bottom Line was protecting HRC from prosecution and Comey alleged that he had not discussed the matter with Lynch, he did the AG a huge favor and she owes Comey a Big One as does HRC. After Comey bit the bullet and saved Lynch from criticism that might have ruined her career, Lynch was free to play the plausible deniability game:

Golly Gee, since I might be accused of favoritism toward HRC after the meeting with Bill which coincidentally led to a favorable decision for his wife, it was best for Comey to announce the decision thereby avoiding any claim of bias or favoritism. I had no idea the charges against HRC would be dismissed.

See how that works?

To sum up: with the FBI blowing off the DWS email as a fraud and without Comey stepping up and bailing out the AG and HRC, it would have looked bad, the deal would have been questioned, everyone wondering but this way, with plausible deniability in play, everyone is cool..right?

Renee Parsons is a student of the Quantum Field. She has been a member of the ACLU's Florida State Board of Directors and President of the ACLU Treasure Coast Chapter. She has been an elected public official in Colorado, an environmental lobbyist with Friends of the Earth and staff member in the US House of Representatives in Washington, DC. She can be found on Twitter @reneedove31.

[Jan 01, 2020] DiGenova: Comey And Brennan Were 'Coup Leaders'

Brennan probably will take the bullet for Obama...
Jan 01, 2020 | www.zerohedge.com

https://www.dianomi.com/smartads.epl?id=4777 DiGenova: Comey And Brennan Were 'Coup Leaders' by Tyler Durden Wed, 01/01/2020 - 19:30 0 SHARES

Former US Attorney Joe diGenova told OANN 's John Hines that former FBI Director James Comey and former CIA Director John Brennan were "coup leaders" in an attempt to reverse the outcome of the 2016 US election.

DiGenova says the Obama Justice Department was corrupted under Attorneys General Eric Holder and Loretta Lynch, "with the authority and knowledge of then-president" Obama, and that a 'stupid and arrogant' Susan Rice was dumb enough to document his knowledge in a January 20th, 2017 email.

"And you'll never forget, I'm sure, that famous Susan Rice email on inauguration day of Donald Trump, where she sends an email to the file memorializing that there had been a meeting on January 5th with the president of the United States, all senior law enforcement and intelligence officials, where they reviewed the status of Crossfire Hurricane and the president announced - President Obama - that he was sure that everything had been done by the book.

I want to thank Susan Rice for being so stupid and so arrogant to write that email on January 20th because that's exhibit A for Barack Obama - who knew all about this from start to finish, and was more than happy to have the civil rights of a massive number of Americans violated so he could get Donald Trump." -Joe diGenova

Moreover, diGenova says that after "all this stuff involving Trump and Page and Papadopoulos and Michael Flynn," anyone who couldn't see that the "corrupt investigative process of the FBI and DOJ was basically being used to conduct a coup d'état" is an idiot.

"This was not hard. If you're a good prosecutor you look at the facts in the Trump case, and the Page case, the Flynn case. There's only one conclusion you can come to; none of this makes any sense. None of these people were evil. None of them. They were framed , and the whole process was playing out, and you knew it on July 5th 2016, when James Comey announced - usurping the functions of the Attorney General, that no reasonable prosecutor would bring a case against Hillary Clinton. That was ludicrous! She destroyed 30,000 emails that were under subpoena. If you or I did that, we would be in prison today . She got a break because she was Hillary Clinton, and James Comey was trying to kiss her fanny because he wanted something from her when she became president of the United States.

All of these people who watched that news conference and didn't think that it was a disgrace for the FBI. And then subsequently, watched all this stuff involving Trump and Page and Papadopoulos and Michael Flynn - and couldn't see that the corrupt investigative process of the FBI and the DOJ was basically being used to conduct a coup d'état . I mean you have to be an idiot. Any first year assistant US attorney would look at all these facts and say 'there's a coup underway. There's a conspiracy.'

But for those of us thought that, the Washington Post, the New York Times. We were 'conspiracy theorists.' You know what? Pretty damn good theory, it appears today.

" To what extent is the CIA involved in this? " asked Hines.

" Well there's no doubt that John Brennan was the primogenitor of the entire counterintelligence investigation, " replied diGenova. "It was John Brennan who went to James Comey and basically pummeled him into starting a counterintelligence investigation against Trump. Brennan's at the heart of this. He went around the world. He enlisted the help of foreign intelligence services. He's responsible for Joseph Mifsud and other people."

" People do not have even the beginning of an understanding of the role that John Brennan played in this . He is a monstrously important person, and I underscore monstrously important person. He has done more damage to the Central Intelligence Agency - it's equal to what James Comey has done to the FBI. It's pretty clear that James Comey will go down in history as the single worst FBI director in history, regardless of how Mr. Durham treats him."


gold_silver_as_money , 23 minutes ago link

Brennan was just the puppet. The real question is who the power brokers were behind the scenes pulling strings and giving all the government officials cover. That's probably what Durham is/needs to get to the bottom of. Hillary is untouchable until those guys get the book thrown at them. My guess is the Queen is involved, probably the Vatican and Mossad as well.

Leguran , 24 minutes ago link

Full agreement with Joe DiGenova. In addition, I believe President Obama was an instigator of this coup d'état. It could only happen in the intelligence field with his consent. His whole persona is based on his willingness to calculate political gain and he had no qualms or ethics. He was hailed as the first "black" President. His role in this coup was made possible by all the people who thought black people were inferior and needed an opportunity to get ahead. Depending upon how you look at that, that picture is in tatters. Black folks are incredibly fortunate to have President Trump who will not blame black folks for the travesties and destruction wrought by another black man. Would a died in the wool radical like Hillary Clinton think that way?

Schroedingers Cat , 48 minutes ago link

The good men of the agencies should punish Comey and Brennan. They have "six ways 'til Tuesday to get even." Why not teach them a lesson from the inside? Many MANY people in the agency have been insulted by this and they deserve justice against Comey and Brennan.

Dumpster Elite , 51 minutes ago link

Gotta give it to the OAN network. They're not dumb. If this actually DID pan out (indictments and such, as a result of this investigative stuff, with no help whatsoever from Barr, etc.), then OAN will be the lead network covering this.

Needless to say, it speaks VOLUMES upon VOLUMES, that Fox News isn't covering this (other than Hannity).

Md4 , 52 minutes ago link

"And you'll never forget, I'm sure, that famous Susan Rice email on inauguration day of Donald Trump, where she sends an email to the file memorializing that there had been a meeting on January 5th with the president of the United States, all senior law enforcement and intelligence officials, where they reviewed the status of Crossfire Hurricane and the president announced - President Obama - that he was sure that everything had been done by the book."

Now... let's, for a moment, imagine this scene.

We've already had a Watergate in our history, involving the spying of one party on another during a presidential campaign season.

These people know how that turned out.

Most of them are lawyers, and at least one is a supposed Constitutional scholar and professor of Constitutional law.

That's Blo.

Does Rice really expect us to believe they didn't know Crossfire Hurricane was based on Clinton Campaign-paid for ********?

Wouldn't a law professor president wanna know the basis, and the veracity of the details, of such a risky operation before authorizing it?

Or are we to believe he merely accepted the assembled "assurances" in this meeting?

Were there presidential meetings about spying on Trump that occurred well before this one?

[Jan 01, 2020] Is FBI unredeemably corrupted?

Jan 01, 2020 | www.moonofalabama.org

Paul Damascene , Dec 28 2019 22:58 utc | 36

FBI unredeemably corrupted...?

I think some my still hold out the hope or expectation that the DOJ will get to the bottom of national-security state malfeasance, beginning with FBI.

Kim Strassel of the WSJ quite pointedly asks why there was so little interest at the FIS court in the Nunez memo, which the IG report now bears out. Covering for malfeasance might just be the FISC's job one.

Now, a similarly gimlet-eyed view of the FBI, as arguably beyond saving ...

https://amgreatness.com/2019/12/22/the-fbis-darkest-hour/

[Dec 29, 2019] Some still hope that the DOJ will get to the bottom of national-security state malfeasance, beginning with FBI

Dec 29, 2019 | www.moonofalabama.org

Paul Damascene , Dec 28 2019 22:58 utc | 36

FBI unredeemably corrupted...?

I think some my still hold out the hope or expectation that the DOJ will get to the bottom of national-security state malfeasance, beginning with FBI.

Kim Strassel of the WSJ quite pointedly asks why there was so little interest at the FIS court in the Nunez memo, which the IG report now bears out. Covering for malfeasance might just be the FISC's job one.

Now, a similarly gimlet-eyed view of the FBI, as arguably beyond saving ...

https://amgreatness.com/2019/12/22/the-fbis-darkest-hour/

[Dec 25, 2019] The Great Cover Up Of The Biggest Scandal In American History

Dec 25, 2019 | www.zerohedge.com

Via The Z-Man blog,

Joe diGenova has been talking about the seditious plot to overturn the 2016 election for at least a year, maybe longer. Unlike a lot of the people commenting on this in the mass media, he is not using it to sell books or boost his cable career. He also knows how the FBI and DOJ works from a practical matter. Being knowledgeable makes him a rare guy in the commentariat. Most of the people brought on as experts for the cable chat shows know very little about their alleged areas of expertise.

Regardless, he has been one of the most hawkish people on the Barr investigation, claiming that it is a real investigation with real criminal targets. In this recent radio interview he goes into the details of both the Barr investigation and the ongoing impeachment fiasco. He is a Trump partisan, so his opinions on impeachment are predictable, but his thoughts on the conspiracy are interesting. He probably has access to information from the Trump White House.

https://www.youtube.com/embed/BpTvjkTsaCQ

The interesting thing about all of this is just how widespread the conspiracy was during the 2015-2016 period. In that interview he talks about former NSA Director Admiral Mike Rogers, who is allegedly cooperating with Barr and Durham. What makes the Rogers issue interesting is that he was the original whistle-blower. He is not treated as such, because the media hates Trump and anyone associated with him, but Rogers was the guy who blew the whistle on the spying to the Trump people.

What's also interesting about Rogers is he seems to have been a good guy, who decided to put an end to the shenanigans with regards to access to top-secret data by FBI contractors. He closed off their access at some point in 2016, which put him in bad odor with the Obama administration. He was eventually pushed out, which suggests the conspiracy has roots into the Obama inner-circle. That may explain why the easy cases to be made against the FBI conspirators are on hold.

That's the other thing about the Rogers case. As CTH explains in that post , his addition to the story reveals that the use of the NSA database by political contractors working for the Democrats goes back to at least 2012. It is an axiom of white-collar crime that the practice always goes back much further than the evidence initially reveals. Anyone who has done forensic accounting knows this. You find the first evidence of a crime, but it turns out that the pattern goes back much further.

That may be what lies beneath all of this. The great puzzle thus far has been the lack of prosecutions, despite ample evidence. The FBI agents are all guilty of crimes that have been detailed in public documents and the IG reports. There is now proof that Comey perjured himself many times. Just from a public relations perspective alone, rounding up these guys and charging them with corruption seems like a no-brainer. Almost a year into his tenure and Barr has charged no one with a crime.

One obvious explanation is that Barr is running a long con on Trump and the rest of the country, on behalf of the inner party. Robert Mueller was supposed to use his investigation to hoover up all the data so it could not be made public, in addition to harassing the Trump White House. His incompetence meant Barr took over the job and is now hoovering up all the information on the various parties. That way, everyone has an excuse for not doing anything about plot.

One bit of evidence in support of this is the handling of the James Wolfe issue. He was the Senate staffer caught leaking classified information to one of the prostitutes hired by the Washington Post. Big media hires good looking young women to sleep with flunkies like Wolf in order to get access to information. Wolf was caught and charged, but instead of getting a couple years in jail, he got two months . He will come out and land into a six-figure job as a reward for being a good soldier.

An alternative explanation is that what started as a straight forward political corruption case bumped into a long pattern of behavior. In the course of investigating that pattern, the trail went much further back than the 2016 election. If there is evidence of abuse going back to 2012, maybe it goes back further. It was the Bush people, after all, who pushed for the creation of secret courts and secret warrants. Maybe Dick Cheney was listening to your phone calls after all.

It is not just the linear aspect of this. The sheer number of people involved in just the FBI scandal is phenomenal. There are at least 20 FBI people named and dozens of bit players in the media and DOJ. So far, the "contractors" with access to the NSA database have not been revealed, but that could be hundreds of people, given that it seems to have been a free-for-all. The corruption may not only go back a long time, but cover a wide swath of official Washington.

That may be the answer to the great cover up. That's what we are seeing. This is a great cover up of the biggest scandal in American history. To date, no one has been charged with a crime, despite hundreds of crimes being documented. Many of the principals are now enjoying high six figure lives, based on the fact they were part of the seditious plot to overturn the 2016 election. Instead of the scandal of the century, it is the celebration of the century for the inner party.

One of the signs of ruling class collapse is when they can no longer enforce the rules that maintain them as a ruling class. When the Romans started making exceptions to republican governance, it was a matter of time before someone simply decided the rules no longer applied to them. Perhaps the robot historians will consider Obama our Marius or Sulla. Maybe that person is in the near future. Either way, the rule of law is over and what comes next is the rule of men.

[Dec 22, 2019] Maybe they were worried someone had bear spray in their purse of backpack, when Fancy Bear and Cozy Bear showed and put their paw prints on the DNC computers.

Dec 22, 2019 | turcopolier.typepad.com

akaPatience , 20 December 2019 at 05:57 PM

SO, to assist Crowdstrike's efforts, "On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office."

Was this typical protocol when it comes to investigating possible hacking or were they looking for a leaker?

Factotum said in reply to akaPatience ... , 20 December 2019 at 07:11 PM
Maybe they were worried someone had bear spray in their purse of backpack, when Fancy Bear and Cozy Bear showed and put their paw prints on the DNC computers.
The Twisted Genius -> akaPatience ... , 20 December 2019 at 09:23 PM
AkaPatience, that is exactly how it is done. Once the decision is made to totally clean the network, it has to be done to EVERY computer and device on the network. Hackers leave dormant code throughout the network that allows them to reenter the network after they are booted out.
akaPatience -> The Twisted Genius ... , 20 December 2019 at 10:37 PM
Thank you. I suspected you would answer my question!
JamesT -> The Twisted Genius ... , 21 December 2019 at 10:39 PM
TTG,

I don't know if you care to comment on this, but I met a marine 10 years ago who talked about how he was administrating Windows Server when he was in the corps. I was flabbergasted. I don't understand why more effort has not been put into running a secure OS - something with a microkernel architecture and an application stack and GUI fully locked down with Mandatory Access Control . I presume that the assumption is that any advances we make will be quickly matched by Iran, Russia, and China, and that leadership is more interested in offence than defence.

[Dec 22, 2019] Gussifer 2.0 released nothing remotely damaging to the DNC and is arguably US based (timestamps), and is either CIA or Crowdstrike.

Dec 22, 2019 | turcopolier.typepad.com

Ed Snack , 21 December 2019 at 01:41 PM

Other points to note:

1.

Ed Snack , 20 December 2019 at 10:56 PM
Other points to note:

1. G2 released nothing remotely damaging to the DNC, the first document was even the DNC's oppo file on DJT
2. G2 did some copying and compress/decompress on files. Imbedded timestamps strongly suggest a US Timezone location
3. G2 released some files claiming to be from the DNC, but which demonstrably came from John Podesta's account
4. G2 did not claim to be involved with the Podesta account, which was phished and not hacked as such
5. As an aside, both the Fancy and Cosy Bear packages had been available for third parties to obtain since 2013-4 or so. So their use is not proof of Russian involvement. One or other has been used in bank exploits before 2016.

I believe that G2 is arguably US based (the timestamps are reasonably conclusive), and is either CIA or Crowdstrike. The existence of G2 is a diversionary one to strengthen the case for blaming the Russians. It may be connected to wanting to divert attention from Seth Rich and his subsequent murder, but may not be - that is Seth Rich's death may be just an unfortunate coincidence, we have inadequate information to conclude either way.

[Dec 22, 2019] So US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks. That's when the stratagem of attributing the impending Wikileaks release to a Russian hack was born -- distracting from the incriminating content of the emails, while vilifying the Deep State's favorite enemies, Assange and Russia, all in one neat scam

Highly recommended!
Looks like Brennan ears are all over this false flag operation...
Dec 22, 2019 | turcopolier.typepad.com

Mark McCarty , 21 December 2019 at 02:34 PM

Here's a key point - on June 12, Assange announces that Wikileaks will soon be releasing info pertinent to Hillary. HE DOES NOT SAY THAT HE WILL BE RELEASING DNC EMAILS.

And yet, on June 14, Crowdstrike reports a Russian hack of the DNC servers - and a day later, Guccifer 2.0 emerges and proclaims himself to be the hacker, takes credit for the upcoming Wikileaks DNC releases, publishes the Trump oppo research which Crowdstrike claimed he had taken, and intentionally adds "Russian footprints" to his metadata.

So how did Crowdstrike and G2.0 know that DNC EMAILS would be released?

Because, as Larry postulates, the US intelligence community had intercepted communications between Seth Rich and Wikileaks in which Seth had offered the DNC emails (consistent with the report of Sy Hersh's source within the FBI).

So US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks.

That's when the stratagem of attributing the impending Wikileaks release to a Russian hack was born - distracting from the incriminating content of the emails, while vilifying the Deep State's favorite enemies, Assange and Russia, all in one neat scam.

[Dec 20, 2019] Did John Brennan's CIA Create Guccifer 2.0 and DCLeaks by Larry C Johnson

Highly recommended!
Gossufer2.0 and CrowdStrike are the weakest links in this sordid story. CrowdStrike was nothing but FBI/CIA contractor.
So the hypothesis that CrowdStrike employees implanted malware to implicate Russians and created fake Gussifer 2.0 personality is pretty logical.
Notable quotes:
"... Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU--Guccifer 2.0 persona and DCLeaks.com. Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of then CIA Director John Brennan ..."
"... In October 2015 John Brennan reorganized the CIA . As part of that reorganization he created a new directorate--DIRECTORATE OF DIGITAL INNOVATION. Its mission was to "manipulate digital footprints." In other words, this was the Directorate that did the work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust. ..."
"... We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it appear like it was done by a foreign entity. Wikipedia describes the Vault 7 documents : ..."
"... Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside the file shows it was last edited by someone using the computer name "Феликс Эдмундович." That means the computer was configured to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, "Феликс Эдмундович" is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.) ..."
"... Why would the CIA do this? The CIA knew that Podesta's emails had been hacked and were circulating on the internet. But they had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA. ..."
"... The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich. Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign, would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia. ..."
"... The only source for the claim that Russia hacked the DNC is a private cyber security firm, CrowdStrike. ..."
"... Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch, but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June. That is 34 days of inexcusable inaction. ..."
"... The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham's team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham should be looking into as a potential act of "Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU. ..."
"... LJ bottom line: "The only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU." ..."
"... ICA which seemed to have been framed to allow journalists or the unwary to link the ICA with more rigorous standards used by more authentic assessments? ..."
"... With the Russians not having the advantages that the NSA does (back doors in all US-designed network hardware/software and taps all over the internet), would Russia reveal anything unless it involved an immediate major national security threat. I doubt that would cover Trump. ..."
Dec 20, 2019 | turcopolier.typepad.com

Special Counsel Robert Mueller's report insists that Guccifer 2.0 and DCLeaks were created by Russia's military intelligence organization, the GRU, as part of a Russian plot to meddle in the U.S. 2016 Presidential Election. But this is a lie. Guccifer 2.0 and DCLeaks were created by Brennan's CIA and this action by the CIA should be a target of U.S. Attorney John Durham's investigation. Let me explain why.

Let us start with the January 2017 Intelligence Community Assessment aka ICA. Only three agencies of the 17 in the U.S. intelligence community contributed to and coordinated on the ICA--the FBI, the CIA and NSA. In the preamble to the ICA, you can read the following explanation about methodology:

When Intelligence Community analysts use words such as "we assess" or "we judge," they are conveying an analytic assessment or judgment

To be clear, the phrase,"We assess", is intel community jargon for "opinion". If there was actual evidence or source material for a judgment the writer of the assessment would state, "According to a reliable source" or "knowledgeable source" or "documentary evidence."

Pay close attention to what the analysts writing the ICA stated about the GRU and Guccifer 2.0 and DCLeaks:

We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data obtained in cyber operations publicly and in exclusives to media outlets.

We assess with high confidence that the GRU relayed material it acquired from the DNC and senior Democratic officials to WikiLeaks. Moscow most likely chose WikiLeaks because of its self-proclaimed reputation for authenticity. Disclosures through WikiLeaks did not contain any evident forgeries.

Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU--Guccifer 2.0 persona and DCLeaks.com. Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of then CIA Director John Brennan.

Here's Mueller's take (I apologize for the lengthy quote but it is important that you read how the Mueller team presents this):

DCLeaks

"The GRU began planning the releases at least as early as April 19, 2016, when Unit 26165 registered the domain dcleaks.com through a service that anonymized the registrant.137 Unit 26165 paid for the registration using a pool of bitcoin that it had mined.138 The dcleaks.com landing page pointed to different tranches of stolen documents, arranged by victim or subject matter. Other dcleaks.com pages contained indexes of the stolen emails that were being released (bearing the sender, recipient, and date of the email). To control access and the timing of releases, pages were sometimes password-protected for a period of time and later made unrestricted to the public.


Starting in June 2016, the GRU posted stolen documents onto the website dcleaks.com, including documents stolen from a number of individuals associated with the Clinton Campaign. These documents appeared to have originated from personal email accounts (in particular, Google and Microsoft accounts), rather than the DNC and DCCC computer networks. DCLeaks victims included an advisor to the Clinton Campaign, a former DNC employee and Clinton Campaign employee, and four other campaign volunteers.139 The GRU released through dcleaks.com thousands of documents, including personal identifying and financial information, internal correspondence related to the"Clinton Campaign and prior political jobs, and fundraising files and information.140


GRU officers operated a Facebook page under the DCLeaks moniker, which they primarily used to promote releases of materials.141 The Facebook page was administered through a small number of preexisting GRU-controlled Facebook accounts.142


GRU officers also used the DCLeaks Facebook account, the Twitter account @dcleaks__, and the email account dcleaksproject@gmail.com to communicate privately with reporters and other U.S. persons. GRU officers using the DCLeaks persona gave certain reporters early access to archives of leaked files by sending them links and passwords to pages on the dcleaks.com website that had not yet become public. For example, on July 14, 2016, GRU officers operating under the DCLeaks persona sent a link and password for a non-public DCLeaks webpage to a U.S. reporter via the Facebook account.143 Similarly, on September 14, 2016, GRU officers sent reporters Twitter direct messages from @dcleaks_, with a password to another non-public part of the dcleaks.com website.144


The dcleaks.com website remained operational and public until March 2017."

Guccifer 2.0

On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents. In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as "Fancy Bear") were responsible for the breach.145 Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona Guccifer 2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into a Moscow-based server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including "some hundred sheets," "illuminati," and "worldwide known." Approximately two hours after the last of those searches, Guccifer 2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that the GRU officers had searched for that day.146

That same day, June 15, 2016, the GRU also used the Guccifer 2.0 WordPress blog to begin releasing to the public documents stolen from the DNC and DCCC computer networks.

The Guccifer 2.0 persona ultimately released thousands of documents stolen from the DNC and DCCC in a series of blog posts between June 15, 2016 and October 18, 2016.147 Released documents included opposition research performed by the DNC (including a memorandum analyzing potential criticisms of candidate Trump), internal policy documents (such as recommendations on how to address politically sensitive issues), analyses of specific congressional races, and fundraising documents. Releases were organized around thematic issues, such as specific states (e.g., Florida and Pennsylvania) that were perceived as competitive in the 2016 U.S. presidential election.

Beginning in late June 2016, the GRU also used the Guccifer 2.0 persona to release documents directly to reporters and other interested individuals. Specifically, on June 27, 2016, Guccifer 2.0 sent an email to the news outlet The Smoking Gun offering to provide "exclusive access to some leaked emails linked [to] Hillary Clinton's staff."148 The GRU later sent the reporter a password and link to a locked portion of the dcleaks.com website that contained an archive of emails stolen by Unit 26165 from a Clinton Campaign volunteer in March 2016.149 "That the Guccifer 2.0 persona provided reporters access to a restricted portion of the DCLeaks website tends to indicate that both personas were operated by the same or a closely-related group of people.150

The GRU continued its release efforts through Guccifer 2.0 into August 2016. For example, on August 15, 2016, the Guccifer 2.0 persona sent a candidate for the U.S. Congress documents related to the candidate's opponent.151 On August 22, 2016, the Guccifer 2.0 persona transferred approximately 2.5 gigabytes of Florida-related data stolen from the DCCC to a U.S. blogger covering Florida politics.152 On August 22, 2016, the Guccifer 2.0 persona sent a U.S. reporter documents stolen from the DCCC pertaining to the Black Lives Matter movement.153"

Wow. Sounds pretty convincing. The documents referencing communications by DCLeaks or Guccifer 2.0 with Wikileaks are real. What is not true is that these entities were GRU assets.

In October 2015 John Brennan reorganized the CIA . As part of that reorganization he created a new directorate--DIRECTORATE OF DIGITAL INNOVATION. Its mission was to "manipulate digital footprints." In other words, this was the Directorate that did the work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust.

We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it appear like it was done by a foreign entity. Wikipedia describes the Vault 7 documents :

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States' Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs,[1] web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA),[2][3][4] and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux[5][6

One of the tools in Vault 7 carries the innocuous name, MARBLE. Hackernews explains the purpose and function of MARBLE:

Dubbed "Marble," the part 3 of CIA files contains 676 source code files of a secret anti-forensic Marble Framework, which is basically an obfuscator or a packer used to hide the true source of CIA malware.
The CIA's Marble Framework tool includes a variety of different algorithm with foreign language text intentionally inserted into the malware source code to fool security analysts and falsely attribute attacks to the wrong nation.

Marble is used to hamper[ing] forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA," says the whistleblowing site.

"...for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion," WikiLeaks explains.

So guess what gullible techies "discovered" in mid-June 2016? The meta data in the Guccifer 2.0 communications had "Russian fingerprints."

We still don't know who he is or whether he works for the Russian government, but one thing is for sure: Guccifer 2.0 -- the nom de guerre of the person claiming he hacked the Democratic National Committee and published hundreds of pages that appeared to prove it -- left behind fingerprints implicating a Russian-speaking person with a nostalgia for the country's lost Soviet era.

Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside the file shows it was last edited by someone using the computer name "Феликс Эдмундович." That means the computer was configured to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, "Феликс Эдмундович" is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.)

Just use your common sense. If the Russians were really trying to carry out a covert cyberattack, do you really think they are so sloppy and incompetent to insert the name of the creator of the Soviet secret police in the metadata? No. The Russians are not clowns. This was a clumsy attempt to frame the Russians.

Why would the CIA do this? The CIA knew that Podesta's emails had been hacked and were circulating on the internet. But they had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA.

The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich. Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign, would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia.

It is essential to recall the timeline of the alleged Russian intrusion into the DNC network. The only source for the claim that Russia hacked the DNC is a private cyber security firm, CrowdStrike. Here is the timeline for the DNC "hack."

Here are the facts on the public record. They are at odds with the claims of the Intelligence Community:

  1. It was 29 April 2016 , when the DNC claims it became aware its servers had been penetrated. No claim yet about who was responsible. And no claim that there had been a prior warning by the FBI of a penetration of the DNC by Russian military intelligence.
  2. According to CrowdStrike founder , Dimitri Alperovitch, his company first supposedly detected the Russians mucking around inside the DNC server on 6 May 2016. A CrowdStrike intelligence analyst reportedly told Alperovitch that:
    • Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
  3. The Wikileaks data shows that the last message copied from the DNC network is dated Wed, 25 May 2016 08:48:35.
  4. 10 June 2016 --CrowdStrike waited until 10 June 2016 to take concrete steps to clean up the DNC network. Alperovitch told Esquire's Vicky Ward that: 'Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office."
  5. On June 14, 2016 , Ellen Nakamura, a Washington Post reporter who had been briefed by computer security company hired by the DNC -- Crowdstrike--, wrote:
    • Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.
    • The intruders so thoroughly compromised the DNC's system that they also were able to read all email and chat traffic, said DNC officials and the security experts.
    • The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available.
  6. 15 June, 2016 , an internet "personality" self-described as Guccifer 2.0 surfaces and claims to be responsible for the hacks but denies being Russian. The people/entity behind Guccifer 2.0:

The only thing that the Guccifer 2.0 character did not do to declare its Russian heritage was to take out full page ads in the New York Times and Washington Post. But the "forensic" fingerprints that Guccifer 2.0 was leaving behind is not the only inexplicable event.

Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch, but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June. That is 34 days of inexcusable inaction.

It is only AFTER Julian Assange announces on 12 June 2016 that WikiLeaks has emails relating to Hillary Clinton that DCLeaks or Guccifer 2.0 try to contact Assange.

The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham's team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham should be looking into as a potential act of "Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU.

Posted at 02:13 PM in Larry Johnson , Russiagate | Permalink


Factotum , 20 December 2019 at 02:45 PM

LJ bottom line: "The only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU."
Paul Damascene , 20 December 2019 at 02:54 PM
Larry, thanks -- vital clarifications and reminders. In your earlier presentation of this material did you not also distinguish between the way actually interagency assessments are titled, and ICA which seemed to have been framed to allow journalists or the unwary to link the ICA with more rigorous standards used by more authentic assessments?
walrus , 20 December 2019 at 03:51 PM
Thank you Larry. You have discovered one more vital key to the conspiracy. We now need the evidence of Julian Assange. He is kept incommunicado and He is being tortured by the British in jail and will be murdered by the American judicial system if he lasts long enough to be extradited.

You can be sure he will be "Epsteined" before he appears in open court because he knows the source of what Wikileaks published. Once he is gone, mother Clinton is in the clear.

Ghost Ship , 20 December 2019 at 04:04 PM
I can understand the GRU or SVR hacking the DNC and other e-mail servers because as intelligence services that is their job, but can anyone think of any examples of Russia (or the Soviet Union) using such information to take overt action?

With the Russians not having the advantages that the NSA does (back doors in all US-designed network hardware/software and taps all over the internet), would Russia reveal anything unless it involved an immediate major national security threat. I doubt that would cover Trump.

[Dec 20, 2019] NSA Whistleblower: "Mueller Report based on fabricated evidence" Former NSA technical chief, Bill Binney, says it looked like the CIA did this, and made it look like the Russians were doing the hack to implicate Russians by Eric Zuesse

Highly recommended!
Looks like CrowdStrike was was to plant the evidence of the Russian hack
Notable quotes:
"... All the evidence we're accumulating clearly says and implies, the US government -- namely the FBI, CIA, the DOJ, and of course State Department -- all these people involved in this hack, bought a dossier and all of the information going forward to the FISA court. ..."
"... All of them knew that this was a fake from the very beginning, because this Guccifer 2.0 character was fabricating it. They were using him plus the Internet Research Agency [IRA] as "supposed trolls of the Russian government". ..."
"... Well, when they sent their lawyers over to challenge that in a court of law, the government failed to prove they had any connection with the Russian government. ..."
"... Then the entire Rosenstein indictment is also a fabrication and a fake and a fraud for the same reasons. The judges seem to be involved in trying to keep this information out of the public domain. ..."
Dec 18, 2019 | off-guardian.org

Larry Johnson & Bill Binney Helping the President Dismantle the Empire - YouTube

Streamed live on Dec 12, 2019

On December 12th, the retired NSA whistleblower and former Technical Director of the NS A, Bill Binney asserted (at 39:00-44:00 in the above video):

BILL BINNEY: I basically have always been saying that all of this Russian hack never happened, but we have some more evidence coming out recently.

We haven't published it yet, but what we have seen is that there are at least five items that we've found that were produced by Guccifer 2.0 back on June 15th, where they had the Russian fingerprints in them, suggesting the Russians made the hack. Well, we found the same five items published by Wikileaks in the Podesta emails.

Those items do not have the Russian fingerprints, which directly implies that Guccifer 2.0 was inserting these into the files to make it look like the Russians did this hack. Taking that into account with all the other evidence we have; like the download speeds from Guccifer 2.0 were too fast, and they couldn't be managed by the web.

And that the files he was putting together and saying that he actually hacked, the two files he said he had were really one file, and he was playing with the data; moving it to two different files to claim two hacks.

Taking that into account with the fabrication of the Russian fingerprints, it leads us back to inferring that in fact the marble framework out of the Vault 7 compromise of CIA hacking routines was a possible user in this case.

In other words, it looked like the CIA did this, and that it was a matter of the CIA making it look like the Russians were doing the hack. So, when you look at that and also look at the DNC emails that were published by Wikileaks that have this phat file format in them, all 35,813 of these emails have rounded off times to the nearest even second.

That's a phat file format property; that argues that those files were, in fact, downloaded to a thumb drive or CD-rom and physically transported before Wikileaks posted them. Which again argues that it wasn't a hack.

So, all of the evidence we're finding is clearly evidence that the Russians were not in fact hacking; it was probably our own people. It's very hard for us to get this kind of information out. The mainstream media won't cover it; none of them will. It's very hard. We get some bloggers to do that and some radio shows.

Also, I put all of this into a sworn affidavit in the Roger Stone case. I did that because all of the attack on him was predicated on him being connected with this Russian hack which was false to being with.

All the evidence we're accumulating clearly says and implies, the US government -- namely the FBI, CIA, the DOJ, and of course State Department -- all these people involved in this hack, bought a dossier and all of the information going forward to the FISA court.

All of them knew that this was a fake from the very beginning, because this Guccifer 2.0 character was fabricating it. They were using him plus the Internet Research Agency [IRA] as "supposed trolls of the Russian government".

Well, when they sent their lawyers over to challenge that in a court of law, the government failed to prove they had any connection with the Russian government.

They basically were chastised by the judge for fabricating a charge against this company. So, if you take the IRA and the trolls away from that argument, and Guccifer 2.0, then the entire Mueller report is a provable fabrication; because it's based on Guccifer 2.0 and the IRA.

Then the entire Rosenstein indictment is also a fabrication and a fake and a fraud for the same reasons. The judges seem to be involved in trying to keep this information out of the public domain.

So, we have a really extensive shadow government here at work, trying to keep the understanding and knowledge of what's really happening away from the public of the United States. That's the really bad part. And the mainstream media is a participant in this; they're culpable.

The CIA-edited and written Wikipedia, in its article about Binney , accuses him by saying:

His dissent from the consensus view that Russia interfered with the 2016 US election appears to be based on Russian disinformation."

They provide no footnote or linked-to source for their allegation

Ever since Binney went public criticizing U.S. intelligence agencies, they have been trying to discredit him.

Thus far, however, their efforts have been nothing more than insinuations against his person, without any specific allegation of counter-evidence that discredits any of his actual assertions.


Martin Usher ,

The "Russia" thing was never able to differentiate between "Russians" and "the Russian state". Its a product of a Cold War mindset that can't conceive of that country without it being 150 million puppets all controlled by string from an office in the Kremlin. In reality its just another country, one that offers goods and services to the world just like anywhere else. So while we just assume that a company like SCL (Cambridge Analytica's parent) would have personnel from and offices in many countries and have contracts with various political parties in many countries we just can't seem to get our heads around the idea that a company operating inside -- or even headquartered -- in Russia isn't automatically some kind of Kremlin front. (Well, yes, it could be but the same way that a company in the UK could be a front for the UK government, e.g. the Gateside Mill story in Scotland's Daily Record).

Another factor that might come into play is the idea that 'analytics', the key to business on the Internet, is actually nothing more than a sophisticated form of traffic analysis, a well known espionage tool. Any government worth its salt that's likely to be on the receiving end of a propaganda campaign would be very interested in understanding the reach of such a tool and learning how to manage that reach. So its possible that if we find the Russian government taking out advertisements on Facebook through a front company to 'influence' people its likely that they're more interested in evaluating that reach than the simplistic view that they're 'trying to influence an election' (its not as if foreign interests or even governments ever try to influence elections)(color revolution, anyone?). Allowing unfettered access by these tools to one's nation is a bit like taking down one's defenses -- fine if you're happy with vassal state ("ally") status but not if you're potentially an adversary -- so its important to know how to control it, no less important than having a decent air defense system.

RobG ,

And in a further retort to all this nonsense, Harold Wilson, the last socialist leader of the Labour Party back in the 1970s, won four general elections, a feat that's never been repeated by any party leader.

Here's the Wiki nonsense/propaganda

https://en.wikipedia.org/wiki/Harold_Wilson

And here's a more historical record

https://www.gov.uk/government/history/past-prime-ministers/harold-wilson

This does directly relate to this thread, because the Americans overthrew Wilson. Just as they have done now with Corbyn. You really need to take your country back, whether you're a Brit or American.

paul ,

We are fortunate that there are still persons of integrity even in the spook organisations – Binney, Kyriakou, Manning, Snowden. Without them and Assange a lot of this criminality would never have seen the light of day.

Jack_Garbo ,

Diagnosing the disease does not imply the cure has been found. You simply know how much sicker you are. Not helpful. Nothing has changed despite all the revelations of intelligence shenanigans. Apologies do not cure the patient when they're still spreading the disease. In fact, the opposite.

paul ,

Wikipedia holds out the begging bowl to anybody who uses it now. I don't know why – they get plenty of CIA and Soros money.

RobG ,

All they've got to do now is wheel out the psychopath and war criminal, Tony Blair, to say: "it's the Russians wot dunnit".

Oh my God

Jen ,

They don't need to, they have Tony Blair's fellow Brit psycho Boris Johnson to go on autopilot and blame the Russians the moment something happens and just before London Met start their investigations.

ZigZagWanderer ,

@ 1.15.58 "Intelligence community has become a self licking ice cream cone"

Larry Johnson and Bill Binney always worth listening to. Try to find the time.

Antonym ,

True except for Trump. Just look how hard deep state tries to unseat him.
Damaging your own puppet is not normal for a puppeteer.

J_Garbo ,

I suspected that Deep State has at least two opposing factions. The Realistists want him to break up the empire, turn back into a republic; the Delusionals want to extend the empire, continue to exploit and destroy the world. If so, the contradictions, reversals, incoherence make sense. IMO as I said.

Gary Weglarz ,

I predict that all Western MSM will begin to accurately and vocally cover Mr. Binney's findings about this odious and treasonous U.S. government psyop at just about the exact time that – "hell freezes over" – as they say.

Thanks for posting this latest info.

[Dec 19, 2019] Senate hearings give impression that the whole sordid, nasty conspiracy seems on the verge of being exposed, maybe as high as Obama himself, although he is just a puppet himself

Dec 19, 2019 | www.moonofalabama.org

evilempire , Dec 18 2019 22:32 utc | 28

If anyone was watching The Horowitz hearing in the senate today it would be hard to conclude that RussiaGate and Ukrainegate will not have serious consequences going forward.

The whole sordid, nasty conspiracy seems on the verge of being exposed, maybe as high as Obama himself, although he is just a puppet himself, and indictments are sure to follow. I don't see how anyone could think that this will not be catastrophic for the democratic party.

[Dec 19, 2019] Thiessen to Comey You weren't sloppy, you intentionally falsified evidence

When tectonic plates of US politics shift, they can crash such a miserable puppets of CIA as Comey.
Notable quotes:
"... No no. These are not mistakes but rather deliberate criminal activity ..."
Dec 19, 2019 | www.youtube.com

Ballsdeep Singh , 2 days ago

This guy is neck deep in the attempted coup to overthrow a duly elected president

Nathan Pickrell , 2 days ago

Why continue this interview? He is still lying, he is so full of himself its nuts!

ensign j , 2 days ago

No no. These are not mistakes but rather deliberate criminal activity

Leigh Ann Everett , 1 day ago

Comey knew that everything was wrong and illegal. Once again, he is lying.

Red Oz , 1 day ago

Why is Roger Stone in prison and Comey is a free man?

[Dec 19, 2019] Barr Says Comey Lying Over Attempt To Distance Himself From FBI Quagmire

Dec 19, 2019 | www.zerohedge.com

James Comey's claim that the FBI's Trump-Russia investigation was run "seven layers" below him is a total lie according to Attorney General William Barr, who said that the FBI's probe was actually handled by a " very small group of very high level officials ."

To review, Comey told "Fox News Sunday" that as the director of the FBI, he was "seven layers" above the investigation, and that he left things to the career professionals when '17 serious errors' occurred which were later uncovered by the Inspector General.

https://www.youtube.com/embed/1yfXxeJn3Tc?start=488

Au contraire Comey

"The idea that this was seven layers below him is simply not true ," Barr told Fox 's Martha MacCallum in a Wednesday interview, adding "I think that one of the problems with what happened was precisely that they pulled the investigation up to the executive floors, and it was run and birddogged by a very small group of very high level officials ."

Watch:

AG Barr on Comey 'seven layers' above the investigation:

One of the problems that happened is the investigation was pulled up to the executive floors & was run by a very small group of very high level officials.
pic.twitter.com/0jA1eoM0kM

-- Red Nation Rising (@RedNationRising) December 19, 2019

According to the Inspector General's report, the FBI withheld exculpatory information on former Trump campaign aide Carter Page when submitting an application to the Foreign Intelligence Surveillance Court to spy on him.

And according to the Daily Caller , the report also noted that Comey was directly involved in plans to open operation Crossfire Hurricane after reviewing the initial FISA application on Page.

[Dec 19, 2019] Fitton accuses Comey of 'directly' spying on Trump - YouTube

Notable quotes:
"... The minute Comey granted Hillary immunity from prosecution for destroying her emails, he was done in my book. ..."
Dec 16, 2019 | www.youtube.com

President of Judicial Watch Tom Fitton discusses the 'lies' former FBI director James Comey reportedly said during his interview on Sunday and explains the Democrats' attempt to remove President Trump from office.


Brave Voice , 1 day ago

The minute Comey granted Hillary immunity from prosecution for destroying her emails, he was done in my book.

stanley 7 , 1 day ago

Well said T. Fitton. Comey is a dishonest Fool, lock him up.

EDWARD BROWN , 1 day ago

Comey is a snake and he keeps going on t.v. trying to get the public to believe his lying

[Dec 19, 2019] The New York Times reported tonight that federal prosecutor John Durham is investigating former CIA Director John Brennan's role in the 2016 election. Durham has called for Brennan's emails, call logs and other documents.

Dec 19, 2019 | www.zerohedge.com

Teamtc321 , 12 minutes ago link

BREAKING BIG: John Durham Is Investigating Former CIA Director John Brennan's Role in 2016 Election Interference and His LIES TO CONGRESS! (Video)

The New York Times reported tonight that federal prosecutor John Durham is investigating former CIA Director John Brennan's role in the 2016 election. Durham has called for Brennan's emails, call logs and other documents.

https://www.thegatewaypundit.com/2019/12/breaking-big-john-durham-is-investigating-former-cia-directors-role-in-russia-collusion-hoax-and-his-lies-to-congress-video/

[Dec 10, 2019] Those geriatric crazies like Pelosi, or Hillary, or completly corrupt, bought by lobbies politicos like Schumer or Schiff, and their stooges like "linguist" Ciaramella, "politruk", master of arts in Russian, Eastern European and Central Asian studies Vindman, or Soros-connected rabid neocon Fiona Hill do not know what seven minutes on launch means

They poisoned with the USA with Russophobia for decades to come, and that really increases the risk of nuclear confrontation, which would wipe out all this jerks, but also mass of innocent people.
Notable quotes:
"... The only way to prevent it, IMHO, is having a Western public shifting just 5 % of their "breads and circuses" paradigm to that issue. Just 5. Not holding my breath I am afraid. ..."
"... Which proves the main point of mine: access to information means shit in the real world of power play. Sheeple didn't care then; they care even less now (better distractions). ..."
Dec 10, 2019 | www.unz.com

peterAUS , says: December 10, 2019 at 8:07 pm GMT

O.K.

I was, actually, thinking about: https://en.wikipedia.org/wiki/Pershing_II#Protests Or, just follow this trend of "who has a bigger dick" as it is.

Sooner or later you'll have this, IMHO: Reaction time 7 minutes . You know, decision-making time to say "launch" or not. The decision-maker in the White House, Downing Street and Elysees Palace either a geriatric or one of this new multiracial breed. Just think about those people

Add to that the level of overall expertise by the crews manning those systems, its maintenance etc. Add increased automation of some parts of the launch process with hardware/software as it's produced now (you know, quality control etc.).

It will take a miracle not to have that launch sooner or later. Not big, say .80 KT. What happens after that is anybody's guess. Mine, taking the second point from the fourth paragraph .a big bang.

The only way to prevent it, IMHO, is having a Western public shifting just 5 % of their "breads and circuses" paradigm to that issue. Just 5.
Not holding my breath I am afraid.

My 2 cents, anyway.

Anon [138] Disclaimer , says: December 10, 2019 at 9:30 pm GMT
@peterAUS The rational actor false supposition has it that the biologics can't be used because they don't recognize friend from foe.

Rational actors? Where? Anthrax via the US mail.

One rational actor point of view is that you have to be able to respond to anything. Anything. In a measured or escalating response. Of course biologics are being actively pursued to the hilt. Just like you point out about Marburg.

But, the view from above is that general panic in the population cannot be allowed, and so all biologics have to be down played. "of course we would never do anything like that, it would be insane to endanger all of humanity". Just like nukes. So professors pontificate misdirection, and pundits punt.

So don't expect real disclosure, or honest analysis. "We only want the fear that results in more appropriations. Not the fear that sinks programs." Don't generate new Church commissions. Hence the fine line. some fear yes, other fears, no.

peterAUS , says: December 10, 2019 at 10:23 pm GMT
@Anon

Rational actors? Where?

Well Washington D.C.
Hahahahaha sorry, couldn't resist.

So don't expect real disclosure, or honest analysis.

I don't.

But I also probably forgot more about nuclear war than most of readers here will ever know. And chemical, when you think about it; had a kit with atropine on me all the time in all exercises. We didn't practice much that "biologics" stuff, though. We knew why, then. Same reason for today. Call it a "stoic option" to own inevitable demise.

Now, there is a big difference between the age of those protests I mentioned and today. The Internet. The access to information people, then, simply didn't have.

Which proves the main point of mine: access to information means shit in the real world of power play. Sheeple didn't care then; they care even less now (better distractions).

Well, they will care, I am sure. For about ..say in the USA ..several hours, on average.

We here where I am typing from will care for "how to survive the aftermath" .. for two months.Tops.

[Dec 04, 2019] The central question of Ukrainegate is whether CrowdStrike actions on DNC leak were a false flag operation designed to open Russiagate and what was the level of participation of Poroshenko government and Ukrainian Security services in this false flag operation by Factotum

Highly recommended!
Highly recommended !
Republicans are afraid to raise this key question. Democrats are afraid of even mentioning CrowdStrike in Ukrainegate hearings. The Deep State wants to suppress this matter entirely.
Alperovisch connections to Ukraine and his Russophobia are well known. Did Alperovich people played the role of "Fancy Bear"? Or Ukrainian SBU was engaged? George Eliason clams that "I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators." ... "Since there is so much crap surrounding the supposed hack such as law enforcement teams never examining the DNC server or maintaining control of it as evidence, could the hacks have been a cover-up?"
Notable quotes:
"... So far at least I cannot rule out the possibility that that this could have involved an actual 'false flag' hack. A possible calculation would have been that this could have made it easier for Alperovitch and 'CrowdStrike', if more people had asked serious questions about the evidence they claimed supported the 'narrative' of GRU responsibility. ..."
"... What she suggested was that the FBI had found evidence, after his death, of a hack of Rich's laptop, designed as part of a 'false flag' operation. ..."
"... On this, see his 8 October, 'Motion for Discovery and Motion to Accept Supplemental Evidence' in Clevenger's own case against the DOJ, document 44 on the relevant 'Courtlistener' pages, and his 'Unopposed Motion for Stay', document 48. Both are short, and available without a 'PACER' subscription, and should be compulsory reading for anyone seriously interested in ascertaining the truth about 'Russiagate.' (See https://www.courtlistener.com/docket/6775665/clevenger-v-us-department-of-justice/ .) ..."
"... And here, is is also material that he may have had more than one laptop, that 'hard drives' can be changed, and that the level of computer skills that can be found throughout the former Soviet Union is very high. Another matter of some importance is that Ed Butowsky's 'Debunking Rod Wheeler's Claims' site is back up online. (See http://debunkingrodwheelersclaims.net ) ..."
"... The question of whether the 'timeline' produced by Hersh's FBI informant was accurate, or a deliberate attempt to disguise the fact that all kinds of people were well aware of Rich's involvement before his murder, and well aware of the fact of a leak before he was identified as its source, is absolutely central to how one interprets 'Russiagate.' ..."
"... Why did Crowdstrike conclude it was a "Russian breach", when other evidence does show it was an internal download. What was Crowdstrike's method and motivation to reach the "Russian" conclusion instead. Why has that methodology been sealed? ..."
"... Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers. ..."
"... What were the relationships between Crowdstrike, DNC, FBI and the Mueller team that conspired to reach this Russian conclusion. ..."
"... Why did the Roger Stone judge, who just sent Stone away for life, refuse Stone's evidentiary demand to ascertain how exactly Crowdstrike reached its Russsian hacking conclusion, that the court then linked to Stone allegedly lying about this Russian link ..."
"... Indeed, let's set out with full transparency the Ukraine -- Crowsdtrike player links and loyalties to see if there are any smoking guns yet undisclosed. Trump was asking for more information about Crowdstrike like a good lawyer - never ask a question when you don't already know the right answer. Crowdstrike is owned by a Ukrainian by birth ..."
"... Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike. ..."
"... In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives. ..."
"... His role in what we may define as "converting DNC leak into DNC hack" (I would agree with you that this probably was a false flag operation), which was supposedly designed to implicated Russians, and possibly involved Ukrainian security services, is very suspicious indeed. ..."
"... Mueller treatment of Crowdstrike with "kid gloves" may suggest that Alperovich actions were part of a larger scheme. After all Crowdstike was a FBI contactor at the time. ..."
Dec 04, 2019 | turcopolier.typepad.com

Originally from: The Intelligence Whistleblower protection Act did not apply to the phone call ... Reposted - Sic Semper Tyrannis


Factotum , 20 November 2019 at 01:02 PM

The favor was for Ukraine to investigate Crowdstrike and the 2016 DNC computer breach.

Reliance on Crowdstrike to investigate the DNC computer, and not an independent FBI investigation, was tied very closely to the years long anti-Trump Russiagate hoax and waste of US taxpayer time and money.

Why is this issue ignored by both the media and the Democrats. The ladies doth protest far too much.

vig -> Factotum... , 21 November 2019 at 11:00 AM
what exactly, to the extend I recall, could the Ukraine contribute the the DNC's server/"fake malware" troubles? Beyond, that I seem to vaguely recall, the supposed malware was distributed via an Ukrainan address.

On the other hand, there seems to be the (consensus here?) argument there was no malware breach at all, simply an insider copying files on a USB stick.

It seems to either or. No?

What basics am I missing?

David Habakkuk -> vig... , 21 November 2019 at 12:53 PM
vig,

There is no reason why it should be 'either/or'.

If people discovered there had been a leak, it would perfectly natural that in order to give 'resilience' to their cover-up strategies, they could have organised a planting of evidence on the servers, in conjunction with elements in Ukraine.

So far at least I cannot rule out the possibility that that this could have involved an actual 'false flag' hack. A possible calculation would have been that this could have made it easier for Alperovitch and 'CrowdStrike', if more people had asked serious questions about the evidence they claimed supported the 'narrative' of GRU responsibility.

The issues involved become all the more important, in the light of the progress of Ty Clevenger's attempts to exploit the clear contradiction between the claims by the FBI, in response to FOIA requests, to have no evidence relating to Seth Rich, and the remarks by Ms. Deborah Sines quoted by Michael Isikoff.

What she suggested was that the FBI had found evidence, after his death, of a hack of Rich's laptop, designed as part of a 'false flag' operation.

On this, see his 8 October, 'Motion for Discovery and Motion to Accept Supplemental Evidence' in Clevenger's own case against the DOJ, document 44 on the relevant 'Courtlistener' pages, and his 'Unopposed Motion for Stay', document 48. Both are short, and available without a 'PACER' subscription, and should be compulsory reading for anyone seriously interested in ascertaining the truth about 'Russiagate.' (See https://www.courtlistener.com/docket/6775665/clevenger-v-us-department-of-justice/ .)

It is eminently possible that Ms. Hines has simply made an 'unforced error.'

However, I do not – yet – feel able totally to discount the possibility that what is actually at issue is a 'ruse', produced as a contingency plan to ensure that if it becomes impossible to maintain the cover-up over Rich's involvement in its original form, his laptop shows 'evidence' compatible with the 'Russiagate' narrative.

And here, is is also material that he may have had more than one laptop, that 'hard drives' can be changed, and that the level of computer skills that can be found throughout the former Soviet Union is very high. Another matter of some importance is that Ed Butowsky's 'Debunking Rod Wheeler's Claims' site is back up online. (See http://debunkingrodwheelersclaims.net )

Looking at it from the perspective of an old television current affairs hack, I do think that, while it is very helpful to have some key material available in a single place, it would useful if more attention was paid to presentation.

In particular, it would be a most helpful 'teaching aid', if a full and accurate transcript was made of the conversation with Seymour Hersh which Ed Butowsky covertly recorded. What seems clear is that both these figures ended up in very difficult positions, and that the latter clearly engaged in 'sleight of hand' in relation to his dealings with the former. That said, the fact that Butowsky's claims about his grounds for believing that Hersh's FBI informant was Andrew McCabe are clearly disingenuous does not justify the conclusion that he is wrong.

It is absolutely clear to me – despite what 'TTG', following that 'Grub Street' hack Folkenflik, claimed – that when Hersh talked to Butowsky, he believed he had been given accurate information. Indeed, I have difficulty seeing how anyone whose eyes were not hopelessly blinded by prejudice, a\nd possibly fear of where a quest for the truth might lead, could not see that, in this conversation, both men were telling the truth, as they saw it.

However, all of us, including the finest and most honourable of journalists can, from time to time, fall for disinformation. (If anyone says they can always spot when they are being played, all I can say is, if you're right, you're clearly Superman, but it is more likely that you are a fool or knave, if not both.)

The question of whether the 'timeline' produced by Hersh's FBI informant was accurate, or a deliberate attempt to disguise the fact that all kinds of people were well aware of Rich's involvement before his murder, and well aware of the fact of a leak before he was identified as its source, is absolutely central to how one interprets 'Russiagate.'

Factotum -> vig... , 21 November 2019 at 01:45 PM
Several loose end issues about Crowdstrike:

1. Why did Crowdstrike conclude it was a "Russian breach", when other evidence does show it was an internal download. What was Crowdstrike's method and motivation to reach the "Russian" conclusion instead. Why has that methodology been sealed?

2. Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers.

3. What were the relationships between Crowdstrike, DNC, FBI and the Mueller team that conspired to reach this Russian conclusion.

4. Why did the Roger Stone judge, who just sent Stone away for life, refuse Stone's evidentiary demand to ascertain how exactly Crowdstrike reached its Russsian hacking conclusion, that the court then linked to Stone allegedly lying about this Russian link .

5. Indeed, let's set out with full transparency the Ukraine -- Crowsdtrike player links and loyalties to see if there are any smoking guns yet undisclosed. Trump was asking for more information about Crowdstrike like a good lawyer - never ask a question when you don't already know the right answer. Crowdstrike is owned by a Ukrainian by birth .

likbez said in reply to Factotum... , 04 December 2019 at 01:29 AM

Hi Factotum,
Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers.

Alperovich is really a very suspicious figure. Rumors are that he was involved in compromising PGP while in MacAfee( June 2nd, 2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams - YouTube ):

Investigative Journalist George Webb worked at MacAfee and Network Solutions in 2000 when the CEO Bill Larsen bought a small, Moscow based, hacking and virus writing company to move to Silicon Valley.

MacAfee also purchased PGP, an open source encryption software developed by privacy advocate to reduce NSA spying on the public.
The two simultaneous purchase of PGP and the Moscow hacking team by Metwork Solutions was sponsored by the CIA and FBI in order to crack encrypted communications to write a back door for law enforcement.

Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike.

In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives.

His role in what we may define as "converting DNC leak into DNC hack" (I would agree with you that this probably was a false flag operation), which was supposedly designed to implicated Russians, and possibly involved Ukrainian security services, is very suspicious indeed.

Mueller treatment of Crowdstrike with "kid gloves" may suggest that Alperovich actions were part of a larger scheme. After all Crowdstike was a FBI contactor at the time.

While all this DNC hack saga is completely unclear due to lack of facts and the access to the evidence, there are some stories on Internet that indirectly somewhat strengthen your hypothesis:

Enjoy and Happy Cyber Week shopping :-)

[Dec 04, 2019] Common Funding Themes Link 'Whistleblower' Complaint and CrowdStrike Firm Certifying DNC Russia 'Hack' by Aaron Klein

Highly recommended!
Notable quotes:
"... Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council, which takes a hawkish approach toward Russia. The Council in turn is financed by Google Inc. ..."
"... In a perhaps unexpected development, another Atlantic Council funder is Burisma, the natural gas company at the center of allegations regarding Joe Biden and his son, Hunter Biden. Those allegations were the subject of Trump's inquiry with Zelemsky related to Biden. The Biden allegations concern significant questions about Biden's role in Ukraine policy under the Obama administration. This took place during a period when Hunter Biden received $50,000 a month from Burisma. ..."
"... Google, Soros's Open Society Foundations, the Rockefeller Fund and an agency of the State Department each also finance a self-described investigative journalism organization repeatedly referenced as a source of information in the so-called whistleblower's complaint alleging Trump was "using the power of his office to solicit interference from a foreign country" in the 2020 presidential race. ..."
"... Another listed OCCRP funder is the Omidyar Network, which is the nonprofit for liberal billionaire eBay founder Pierre Omidyar. ..."
"... Together with Soros's Open Society, Omidyar also funds the Poynter Institute for Media Studies, which hosts the International Fact-Checking Network that partnered with Facebook to help determine whether news stories are "disputed." ..."
Sep 28, 2019 | www.breitbart.com

There are common threads that run through an organization repeatedly relied upon in the so-called whistleblower's complaint about President Donald Trump and CrowdStrike, the outside firm utilized to conclude that Russia hacked the Democratic National Committee's servers since the DNC would not allow the U.S. government to inspect the servers.

One of several themes is financing tied to Google, whose Google Capital led a $100 million funding drive that financed Crowdstrike. Google Capital, which now goes by the name of CapitalG, is an arm of Alphabet Inc., Google's parent company. Eric Schmidt, the chairman of Alphabet, has been a staunch and active supporter of Hillary Clinton and is a longtime donor to the Democratic Party.

CrowdStrike was mentioned by Trump in his call with Ukranian President Volodymyr Zelensky. Perkins Coie, the law firm that represented the DNC and Hillary Clinton's campaign, reportedly helped draft CrowdStrike to aid with the DNC's allegedly hacked server.

On behalf of the DNC and Clinton's campaign, Perkins Coie also paid the controversial Fusion GPS firm to produce the infamous, largely-discredited anti-Trump dossier compiled by former British spy Christopher Steele.

CrowdStrike is a California-based cybersecurity technology company co-founded by Dmitri Alperovitch.

Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council, which takes a hawkish approach toward Russia. The Council in turn is financed by Google Inc.

In a perhaps unexpected development, another Atlantic Council funder is Burisma, the natural gas company at the center of allegations regarding Joe Biden and his son, Hunter Biden. Those allegations were the subject of Trump's inquiry with Zelemsky related to Biden. The Biden allegations concern significant questions about Biden's role in Ukraine policy under the Obama administration. This took place during a period when Hunter Biden received $50,000 a month from Burisma.

Besides Google and Burisma funding, the Council is also financed by billionaire activist George Soros's Open Society Foundations as well as the Rockefeller Brothers Fund, Inc. and the U.S. State Department.

Google, Soros's Open Society Foundations, the Rockefeller Fund and an agency of the State Department each also finance a self-described investigative journalism organization repeatedly referenced as a source of information in the so-called whistleblower's complaint alleging Trump was "using the power of his office to solicit interference from a foreign country" in the 2020 presidential race.

The charges in the July 22 report referenced in the whistleblower's document and released by the Google and Soros-funded organization, the Organized Crime and Corruption Reporting Project (OCCRP), seem to be the public precursors for a lot of the so-called whistleblower's own claims, as Breitbart News documented .

One key section of the so-called whistleblower's document claims that "multiple U.S. officials told me that Mr. Giuliani had reportedly privately reached out to a variety of other Zelensky advisers, including Chief of Staff Andriy Bohdan and Acting Chairman of the Security Service of Ukraine Ivan Bakanov."

This was allegedly to follow up on Trump's call with Zelensky in order to discuss the "cases" mentioned in that call, according to the so-called whistleblower's narrative. The complainer was clearly referencing Trump's request for Ukraine to investigate the Biden corruption allegations.

Even though the statement was written in first person – "multiple U.S. officials told me" – it contains a footnote referencing a report by the Organized Crime and Corruption Reporting Project (OCCRP).

That footnote reads:

In a report published by the Organized Crime and Corruption Reporting Project (OCCRP) on 22 July, two associates of Mr. Giuliani reportedly traveled to Kyiv in May 2019 and met with Mr. Bakanov and another close Zelensky adviser, Mr. Serhiy Shefir.

The so-called whistleblower's account goes on to rely upon that same OCCRP report on three more occasions. It does so to:

Write that Ukraine's Prosecutor General Yuriy Lutsenko "also stated that he wished to communicate directly with Attorney General Barr on these matters." Document that Trump adviser Rudi Giuliani "had spoken in late 2018 to former Prosecutor General Shokin, in a Skype call arranged by two associates of Mr. Giuliani." Bolster the charge that, "I also learned from a U.S. official that 'associates' of Mr. Giuliani were trying to make contact with the incoming Zelenskyy team." The so-called whistleblower then relates in another footnote, "I do not know whether these associates of Mr. Giuliani were the same individuals named in the 22 July report by OCCRP, referenced above."

The OCCRP report repeatedly referenced is actually a "joint investigation by the Organized Crime and Corruption Reporting Project (OCCRP) and BuzzFeed News, based on interviews and court and business records in the United States and Ukraine."

BuzzFeed infamously also first published the full anti-Trump dossier alleging unsubstantiated collusion between Trump's presidential campaign and Russia. The dossier was paid for by Hillary Clinton's campaign and the Democratic National Committee and was produced by the Fusion GPS opposition dirt outfit.

The OCCRP and BuzzFeed "joint investigation" resulted in both OCCRP and BuzzFeed publishing similar lengthy pieces on July 22 claiming that Giuliani was attempting to use connections to have Ukraine investigate Trump's political rivals.

The so-called whistleblower's document, however, only mentions the largely unknown OCCRP and does not reference BuzzFeed, which has faced scrutiny over its reporting on the Russia collusion claims.

Another listed OCCRP funder is the Omidyar Network, which is the nonprofit for liberal billionaire eBay founder Pierre Omidyar.

Together with Soros's Open Society, Omidyar also funds the Poynter Institute for Media Studies, which hosts the International Fact-Checking Network that partnered with Facebook to help determine whether news stories are "disputed."

Like OCCRP, the Poynter Institute's so-called news fact-checking project is openly funded by not only Soros' Open Society Foundations but also Google and the National Endowment for Democracy.

CrowdStrike and DNC servers

CrowdStrike, meanwhile, was brought up by Trump in his phone call with Zelensky. According to the transcript, Trump told Zelensky, "I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike I guess you have one of your wealthy people The server, they say Ukraine has it."

In his extensive report , Special Counsel Robert S. Mueller notes that his investigative team did not "obtain or examine" the servers of the DNC in determining whether those servers were hacked by Russia.

The DNC famously refused to allow the FBI to access its servers to verify the allegation that Russia carried out a hack during the 2016 presidential campaign. Instead, the DNC reached an arrangement with the FBI in which CrowdStrike conducted forensics on the server and shared details with the FBI.

In testimony before the Senate Intelligence Committee in January 2017, then-FBI Director James Comey confirmed that the FBI registered "multiple requests at different levels," to review the DNC's hacked servers. Ultimately, the DNC and FBI came to an agreement in which a "highly respected private company" -- a reference to CrowdStrike -- would carry out forensics on the servers and share any information that it discovered with the FBI, Comey testified.

A senior law enforcement official stressed the importance of the FBI gaining direct access to the servers, a request that was denied by the DNC.

"The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated," the official was quoted by the news media as saying.

"This left the FBI no choice but to rely upon a third party for information. These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier," the official continued.

... ... ...

Aaron Klein is Breitbart's Jerusalem bureau chief and senior investigative reporter. He is a New York Times bestselling author and hosts the popular weekend talk radio program, " Aaron Klein Investigative Radio ." Follow him on Twitter @AaronKleinShow. Follow him on Facebook.

Joshua Klein contributed research to this article.

[Dec 04, 2019] DNC Russian Hackers Found! You Won't Believe Who They Really Work For by the Anonymous Patriots

Highly recommended!
Jan 01, 2017 | themillenniumreport.com

"If someone steals your keys to encrypt the data, it doesn't matter how secure the algorithms are."

Dmitri Alperovitch, founder of CrowdStrike.

By the Anonymous Patriots
SOTN Exclusive

Russians did not hack the DNC system, a Russian named Dmitri Alperovitch is the hacker and he works for President Obama. In the last five years the Obama administration has turned exclusively to one Russian to solve every major cyber-attack in America, whether the attack was on the U.S. government or a corporation. Only one "super-hero cyber-warrior" seems to "have the codes" to figure out "if" a system was hacked and by "whom."

Dmitri's company, CrowdStrike has been called in by Obama to solve mysterious attacks on many high level government agencies and American corporations, including: German Bundestag, Democratic National Committee, Democratic Congressional Campaign Committee (DCCC), the White House, the State Department, SONY, and many others.

CrowdStrike's philosophy is: "You don't have a malware problem; you have an adversary problem."

CrowdStrike has played a critical role in the development of America's cyber-defense policy. Dmitri Alperovitch and George Kurtz, a former head of the FBI cyberwarfare unit founded CrowdStrike. Shawn Henry, former executive assistant director at the FBI is now CrowdStrike's president of services. The company is crawling with former U.S. intelligence agents.

Before Alperovitch founded CrowdStrike in 2011, he was working in Atlanta as the chief threat officer at the antivirus software firm McAfee, owned by Intel (a DARPA company). During that time, he "discovered" the Chinese had compromised at least seventy-one companies and organizations, including thirteen defense contractors, three electronics firms, and the International Olympic Committee. He was the only person to notice the biggest cyberattack in history! Nothing suspicious about that.

Alperovitch and the DNC

After CrowdStrike was hired as an independent "vendor" by the DNC to investigate a possible cyberattack on their system, Alperovitch sent the DNC a proprietary software package called Falcon that monitors the networks of its clients in real time. According to Alperovitch, Falcon "lit up," within ten seconds of being installed at the DNC. Alperovitch had his "proof" in TEN SECONDS that Russia was in the network. This "alleged" evidence of Russian hacking has yet to be shared with anyone.

As Donald Trump has pointed out, the FBI, the agency that should have been immediately involved in hacking that effects "National Security," has yet to even examine the DNC system to begin an investigation. Instead, the FBI and 16 other U.S. "intelligence" agencies simply "agree" with Obama's most trusted "cyberwarfare" expert Dmitri Alperovitch's "TEN SECOND" assessment that produced no evidence to support the claim.

Also remember that it is only Alperovitch and CrowdStrike that claim to have evidence that it was Russian hackers . In fact, only two hackers were found to have been in the system and were both identified by Alperovitch as Russian FSB (CIA) and the Russian GRU (DoD). It is only Alperovitch who claims that he knows that it is Putin behind these two hackers.

Alperovitch failed to mention in his conclusive "TEN SECOND" assessment that Guccifer 2.0 had already hacked the DNC and made available to the public the documents he hacked – before Alperovitch did his ten second assessment. Alperovitch reported that no other hackers were found, ignoring the fact that Guccifer 2.0 had already hacked and released DNC documents to the public. Alperovitch's assessment also goes directly against Julian Assange's repeated statements that the DNC leaks did not come from the Russians.

The ridiculously fake cyber-attack assessment done by Alperovitch and CrowdStrike naïvely flies in the face of the fact that a DNC insider admitted that he had released the DNC documents. Julian Assange implied in an interview that the murdered Democratic National Committee staffer, Seth Rich, was the source of a trove of damaging emails the website posted just days before the party's convention. Seth was on his way to testify about the DNC leaks to the FBI when he was shot dead in the street.

It is also absurd to hear Alperovitch state that the Russian FSB (equivalent to the CIA) had been monitoring the DNC site for over a year and had done nothing. No attack, no theft, and no harm was done to the system by this "false-flag cyber-attack" on the DNC – or at least, Alperovitch "reported" there was an attack. The second hacker, the supposed Russian military (GRU – like the U.S. DoD) hacker, had just entered the system two weeks before and also had done "nothing" but observe.

It is only Alperovitch's word that reports that the Russian FSB was "looking for files on Donald Trump."

It is only this false claim that spuriously ties Trump to the "alleged" attack. It is also only Alperovitch who believes that this hack that was supposedly "looking for Trump files" was an attempt to "influence" the election. No files were found about Trump by the second hacker, as we know from Wikileaks and Guccifer 2.0's leaks. To confabulate that "Russian's hacked the DNC to influence the elections" is the claim of one well-known Russian spy. Then, 17 U.S. intelligence agencies unanimously confirm that Alperovitch is correct – even though there is no evidence and no investigation was ever conducted .

How does Dmitri Alperovitch have such power? Why did Obama again and again use Alperovitch's company, CrowdStrike, when they have miserably failed to stop further cyber-attacks on the systems they were hired to protect? Why should anyone believe CrowdStrikes false-flag report?

After documents from the DNC continued to leak, and Guccifer 2.0 and Wikileaks made CrowdStrike's report look foolish, Alperovitch decided the situation was far worse than he had reported. He single-handedly concluded that the Russians were conducting an "influence operation" to help win the election for Trump . This false assertion had absolutely no evidence to back it up.

On July 22, three days before the Democratic convention in Philadelphia, WikiLeaks dumped a massive cache of emails that had been "stolen" (not hacked) from the DNC. Reporters soon found emails suggesting that the DNC leadership had favored Hillary Clinton in her primary race against Bernie Sanders, which led Debbie Wasserman Schultz, the DNC chair, along with three other officials, to resign.

Just days later, it was discovered that the Democratic Congressional Campaign Committee (DCCC) had been hacked. CrowdStrike was called in again and once again, Alperovitch immediately "believed" that Russia was responsible. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author. Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time Guccifer released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, Guccifer went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.

Once again, Guccifer 2.0 proved Alperovitch and CrowdStrike's claims to be grossly incorrect about the hack originating from Russia, with Putin masterminding it all. Nancy Pelosi offered members of Congress Alperovitch's suggestion of installing Falcon , the system that failed to stop cyberattacks at the DNC, on all congressional laptops.

Key Point: Once Falcon was installed on the computers of members of the U.S. Congress, CrowdStrike had even further full access into U.S. government accounts.

Alperovitch's "Unbelievable" History

Dmitri was born in 1980 in Moscow where his father, Michael, was a nuclear physicist, (so Dmitri claims). Dmitri's father was supposedly involved at the highest levels of Russian nuclear science. He also claims that his father taught him to write code as a child.

In 1990, his father was sent to Maryland as part of a nuclear-safety training program for scientists. In 1994, Michael Alperovitch was granted a visa to Canada, and a year later the family moved to Chattanooga, where Michael took a job with the Tennessee Valley Authority.

While Dmitri Alperovitch was still in high school, he and his father started an encryption-technology business. Dmitri studied computer science at Georgia Tech and went on to work at an antispam software firm. It was at this time that he realized that cyber-defense was more about psychology than it was about technology. A very odd thing to conclude.

Dmitri Alperovitch posed as a "Russian gangster" on spam discussion forums which brought his illegal activity to the attention of the FBI – as a criminal. In 2005, Dmitri flew to Pittsburgh to meet an FBI agent named Keith Mularski, who had been asked to lead an undercover operation against a vast Russian credit-card-theft syndicate. Alperovitch worked closely with Mularski's sting operation which took two years, but it ultimately brought about fifty-six arrests. Dmitri Alperovitch then became a pawn of the FBI and CIA.

In 2010, while he was at McAfee, the head of cybersecurity at Google told Dmitri that Gmail accounts belonging to human-rights activists in China had been breached. Google suspected the Chinese government. Alperovitch found that the breach was unprecedented in scale; it affected more than a dozen of McAfee's clients and involved the Chinese government. Three days after his supposed discovery, Alperovitch was on a plane to Washington where he had been asked to vet a paragraph in a speech by the secretary of state, Hillary Clinton.

2014, Sony called in CrowdStrike to investigate a breach of its network. Alperovitch needed just "two hours" to identify North Korea as the adversary. Executives at Sony asked Alperovitch to go public with the information immediately, but it took the FBI another three weeks before it confirmed the attribution.

Alperovitch then developed a list of "usual suspects" who were well-known hackers who had identifiable malware that they commonly used. Many people use the same malware and Alperovitch's obsession with believing he has the only accurate list of hackers in the world is plain idiocy exacerbated by the U.S. government's belief in his nonsense. Alperovitch even speaks like a "nut-case" in his personal Twitters, which generally have absolutely no references to the technology he is supposedly the best at in the entire world.

Dmitri – Front Man for His Father's Russian Espionage Mission

After taking a close look at the disinformation around Dmitri and his father, it is clear to see that Michael Alperovitch became a CIA operative during his first visit to America. Upon his return to Russia, he stole the best Russian encryption codes that were used to protect the top-secret work of nuclear physics in which his father is alleged to have been a major player. Upon surrendering the codes to the CIA when he returned to Canada, the CIA made it possible for a Russian nuclear scientist to become an American citizen overnight and gain a top-secret security clearance to work at the Oakridge plant, one of the most secure and protected nuclear facilities in America . Only the CIA can transform a Russian into an American with a top-secret clearance overnight.

We can see on Michael Alperovitch's Linked In page that he went from one fantastically top-secret job to the next without a break from the time he entered America. He seemed to be on a career path to work in every major U.S. agency in America. In every job he was hired as the top expert in the field and the leader of the company. All of these jobs after the first one were in cryptology, not nuclear physics. As a matter of fact, Michael became the top expert in America overnight and has stayed the top expert to this day.

Most of the work of cyber-security is creating secure interactions on a non-secure system like the Internet. The cryptologist who assigns the encryption codes controls the system from that point on .

Key Point: Cryptologists are well known for leaving a "back-door" in the base-code so that they can always have over-riding control.

Michael Alperovitch essentially has the "codes" for all Department of Defense sites, the Treasury, the State Department, cell-phones, satellites, and public media . There is hardly any powerful agency or company that he has not written the "codes" for. One might ask, why do American companies and the U.S. government use his particular codes? What are so special about Michael's codes?

Stolen Russian Codes

In December, Obama ordered the U.S. military to conduct cyberattacks against Russia in retaliation for the alleged DNC hacks. All of the attempts to attack Russia's military and intelligence agencies failed miserably. Russia laughed at Obama's attempts to hack their systems. Even the Russian companies targeted by the attacks were not harmed by Obama's cyber-attacks. Hardly any news of these massive and embarrassing failed cyber-attacks were reported by the Main Stream Media. The internet has been scrubbed clean of the reports that said Russia's cyber-defenses were impenetrable due to the sophistication of their encryption codes.

Michael Alperovitch was in possession of those impenetrable codes when he was a top scientist in Russia. It was these very codes that he shared with the CIA on his first trip to America . These codes got him spirited into America and "turned into" the best cryptologist in the world. Michael is simply using the effective codes of Russia to design his codes for the many systems he has created in America for the CIA .

KEY POINT: It is crucial to understand at this junction that the CIA is not solely working for America . The CIA works for itself and there are three branches to the CIA – two of which are hostile to American national interests and support globalism.

Michael and Dmitri Alperovitch work for the CIA (and international intelligence corporations) who support globalism . They, and the globalists for whom they work, are not friends of America or Russia. It is highly likely that the criminal activities of Dmitri, which were supported and sponsored by the FBI, created the very hackers who he often claims are responsible for cyberattacks. None of these supposed "attackers" have ever been found or arrested; they simply exist in the files of CrowdStrike and are used as the "usual culprits" when the FBI or CIA calls in Dmitri to give the one and only opinion that counts. Only Dmitri's "suspicions" are offered as evidence and yet 17 U.S. intelligence agencies stand behind the CrowdStrike report and Dmitri's suspicions.

Michael Alperovitch – Russian Spy with the Crypto-Keys

Essentially, Michael Alperovitch flies under the false-flag of being a cryptologist who works with PKI. A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repository and revokes them if needed. Public key cryptography is a cryptographic technique that enables entities to securely communicate on an insecure public network (the Internet), and reliably verify the identity of an entity via digital signatures . Digital signatures use Certificate Authorities to digitally sign and publish the public key bound to a given user. This is done using the CIA's own private key, so that trust in the user key relies on one's trust in the validity of the CIA's key. Michael Alperovitch is considered to be the number one expert in America on PKI and essentially controls the market .

Michael's past is clouded in confusion and lies. Dmitri states that his father was a nuclear physicist and that he came to America the first time in a nuclear based shared program between America and Russia. But if we look at his current personal Linked In page, Michael claims he has a Master Degree in Applied Mathematics from Gorky State University. From 1932 to 1956, its name was State University of Gorky. Now it is known as Lobachevsky State University of Nizhni Novgorod – National Research University (UNN), also known as Lobachevsky University. Does Michael not even know the name of the University he graduated from? And when does a person with a Master's Degree become a leading nuclear physicist who comes to "visit" America. In Michael's Linked In page there is a long list of his skills and there is no mention of nuclear physics.

Also on Michael Alperovitch's Linked In page we find some of his illustrious history that paints a picture of either the most brilliant mind in computer security, encryption, and cyberwarfare, or a CIA/FBI backed Russian spy. Imagine that out of all the people in the world to put in charge of the encryption keys for the Department of Defense, the U.S. Treasury, U.S. military satellites, the flow of network news, cell phone encryption, the Pathfire (media control) Program, the Defense Information Systems Agency, the Global Information Grid, and TriCipher Armored Credential System among many others, the government hires a Russian spy . Go figure.

Michael Alperovitch's Linked In Page

Education:

Gorky State University, Russia, MS in Applied Mathematics

Work History:

Sr. Security Architect

VT IDirect -2014 – Designing security architecture for satellite communications including cryptographic protocols, authentication.

Principal SME (Contractor)

DISA -Defense Information Systems Agency (Manager of the Global Information Grid) – 2012-2014 – Worked on PKI and identity management projects for DISA utilizing Elliptic Curve Cryptography. Performed application security and penetration testing.

Technical Lead (Contractor)

U.S. Department of the Treasury – 2011 – Designed enterprise validation service architecture for PKI certificate credentials with Single Sign On authentication.

Principal Software Engineer

Comtech Mobile Datacom – 2007-2010 – Subject matter expert on latest information security practices, including authentication, encryption and key management.

Sr. Software Engineer

TriCipher – 2006-2007 – Designed and developed security architecture for TriCipher Armored Credential Authentication System.

Lead Software Engineer

BellSouth – 2003-2006 – Designed and built server-side Jabber-based messaging platform with Single Sign On authentication.

Principal Software Research Engineer

Pathfire – 2001-2002 – Designed and developed Digital Rights Management Server for Video on Demand and content distribution applications. Pathfire provides digital media distribution and management solutions to the television, media, and entertainment industries. The company offers Digital Media Gateway, a digital IP store-and-forward platform, delivering news stories, syndicated programming, advertising spots, and video news releases to broadcasters. It provides solutions for content providers and broadcasters, as well as station solutions.

Obama – No Friend of America

Obama is no friend of America in the war against cyber-attacks. The very agencies and departments being defended by Michael Alperovitch's "singular and most brilliant" ability to write encryption codes have all been successfully attacked and compromised since Michael set up the codes. But we shouldn't worry, because if there is a cyberattack in the Obama administration, Michael's son Dmitri is called in to "prove" that it isn't the fault of his father's codes. It was the "damn Russians", or even "Putin himself" who attacked American networks.

Not one of the 17 U.S. intelligence agencies is capable of figuring out a successful cyberattack against America without Michael and Dmitri's help. Those same 17 U.S. intelligence agencies were not able to effectively launch a successful cyberattack against Russia. It seems like the Russian's have strong codes and America has weak codes. We can thank Michael and Dmitri Alperovitch for that.

It is clear that there was no DNC hack beyond Guccifer 2.0. Dmitri Alperovitch is a "frontman" for his father's encryption espionage mission.

Is it any wonder that Trump says that he has "his own people" to deliver his intelligence to him that is outside of the infiltrated U.S. government intelligence agencies and the Obama administration ? Isn't any wonder that citizens have to go anywhere BUT the MSM to find real news or that the new administration has to go to independent news to get good intel?

It is hard to say anything more damnable than to again quote Dmitri on these very issues:
"If someone steals your keys to encrypt the data, it doesn't matter how secure the algorithms are." Dmitri Alperovitch, founder of CrowdStrike

Originally posted at: http://stateofthenation2012.com/?p=62536

[Dec 04, 2019] June 4th, 2017 Crowdstrike Was at the DNC Six Weeks by George Webb

Highly recommended!
A short YouTube with the handwritten timeline
Nov 27, 2019 | www.youtube.com
AwanContra - George Webb, Investigative Journalist

[Dec 04, 2019] Cyberanalyst George Eliason Claims that the "Fancy Bear" Who Hacked the DNC Server is Ukrainian Intelligence – In League with the Atlantic Council and Crowdstrike

Highly recommended!
Notable quotes:
"... And RUH8 is allied with the Atlantic Council and Crowdstrike. ..."
"... Russia was probably not one of the hacking groups. The willful destruction of evidence by the DNC themselves probably points to Russia not being one of the those groups. The DNC wouldn't destroy evidence that supported their position. Also, government spy agencies keep info like that closely held. They might leak out tidbits, but they don't do wholesale dumps, like, ever. ..."
"... That's what the DNC is lying about. Not that hacks happened (they undoubtedly did), but about who did them (probably not Russian gov), and if hacks mattered (they didn't since everything was getting leaked anyway). ..."
"... The DNC/Mueller/etc are lying, but like most practiced liars they're mixing the lies with half-truths and unrelated facts to muddy the waters: ..."
"... An interesting question is, since it's basically guaranteed the DNC got hacked, but probably not by the Russians, is, what groups did hack the DNC, and why did the DNC scramble madly to hide their identities? ..."
"... And while you think about that question, consider the close parallel with the Awan case, where Dems were ostensibly the victims, but they again scrambled to cover up for the people who supposedly harmed them. level 2 ..."
"... DNC wasn't even hacked. Emails were leaked. They didn't even examine the server. Any "evidence" produced is spoofable from CIA cybertools that we know about from wikileaks. It's important to know how each new lie is a lie. But man I am just so done with all this Russia shit. level 2 ..."
"... Crowdstrike claims that malware was found on DNC server. I agree that this has nothing to do with the Wikileaks releases. What I am wondering is whether Crowdstrike may have arranged for the DNC to be hacked so that Russia could be blamed. Continue this thread level 1 ..."
"... George Eliason promises additional essays: *The next articles, starting with one about Fancy Bear's hot/cold ongoing relationship with Bellingcat which destroys the JIT investigation, will showcase the following: Fancy Bear worked with Bellingcat and the Ukrainian government providing Information War material as evidence for MH17: ..."
"... Fancy Bear is an inside unit of the Atlantic Council and their Digital Forensics Lab ..."
Dec 04, 2018 | www.reddit.com

Cyberanalyst George Eliason has written some intriguing blogs recently claiming that the "Fancy Bear" which hacked the DNC server in mid-2016 was in fact a branch of Ukrainian intelligence linked to the Atlantic Council and Crowdstrike. I invite you to have a go at one of his recent essays:

https://off-guardian.org/2018/06/25/who-is-fancy-bear-and-who-are-they-working-for/

Since I am not very computer savvy and don't know much about the world of hackers - added to the fact that Eliason's writing is too cute and convoluted - I have difficulty navigating Eliason's thought. Nonetheless, here is what I can make of Eliasons' claims, as supported by independent literature:

Russian hacker Konstantin Kozlovsky, in Moscow court filings, has claimed that he did the DNC hack – and can prove it, because he left some specific code on the DNC server.

http://thehill.com/policy/cybersecurity/366696-russian-hacker-claims-he-can-prove-he-hacked-dnc

Kozlovsky states that he did so by order of Dimitry Dokuchaev (formerly of the FSB, and currently in prison in Russia on treason charges) who works with the Russian traitor hacker group Shaltai Boltai.

https://www.newsweek.com/russian-hacker-stealing-clintons-emailshacking-dnc-putinsfsb-745555 (Note that Newsweek's title is an overt lie.)

According to Eliason, Shaltai Boltai works in collaboration with the Ukrainian hacker group RUH8, a group of neo-Nazis (Privat Sektor) who are affiliated with Ukrainian intelligence. And RUH8 is allied with the Atlantic Council and Crowdstrike.

https://off-guardian.org/2018/06/25/who-is-fancy-bear-and-who-are-they-working-for/

Cyberexpert Jeffrey Carr has stated that RUH8 has the X-Agent malware which our intelligence community has erroneously claimed is possessed only by Russian intelligence, and used by "Fancy Bear".

https://medium.com/@jeffreyscarr/the-gru-ukraine-artillery-hack-that-may-never-have-happened-820960bbb02d

Eliason has concluded that RUH8 is Fancy Bear.

This might help explain why Adam Carter has determined that some of the malware found on the DNC server was compiled AFTER Crowdstrike was working on the DNC server – Crowdstrike was in collusion with Fancy Bear (RUH8).

In other words, Crowdstrike likely arranged for a hack by Ukrainian intelligence that they could then attribute to Russia.

As far as I can tell, none of this is pertinent to how Wikileaks obtained their DNC emails, which most likely were leaked.

How curious that our Deep State and the recent Mueller indictment have had nothing to say about Kozlovsky's confession - whom I tend to take seriously because he offers a simple way to confirm his claim. Also interesting that the FBI has shown no interest in looking at the DNC server to check whether Kozlovsky's code is there.

I will ask Adam Carter for his opinion on this. 19 comments 84% Upvoted This thread is archived New comments cannot be posted and votes cannot be cast Sort by View discussions in 1 other community level 1



zer0mas 1 point · 1 year ago

Its worth noting that Dimitri Alperovich's (Crowdstrike) hatred of Putin is second only to Hillary's hatred for taking responsibility for her actions. level 1

veganmark 2 points · 1 year ago

Thanks - I'll continue to follow Eliason's work. The thesis that Ukrainian intelligence is hacking a number of targets so that Russia gets blamed for it has intuitive appeal. level 1

alskdmv-nosleep4u -1 points · 1 year ago

I see things like this:

DNC wasn't even hacked.

and have to cringe. Any hacks weren't related to Wikileaks, who got their info from leakers, but that is not the same thing as no hack. Leaks and hacks aren't mutually exclusive. They actually occur together pretty commonly.

DNC's security was utter shit. Systems with shit security and obviously valuable info usually get hacked by multiple groups. In the case of the DNC, Hillary's email servers, etc., it's basically impossible they weren't hacked by dozens of intruders. A plastic bag of 100s will not sit untouched on a NYC street corner for 4 weeks. Not. fucking. happening.

Interestingly, Russia was probably not one of the hacking groups. The willful destruction of evidence by the DNC themselves probably points to Russia not being one of the those groups. The DNC wouldn't destroy evidence that supported their position. Also, government spy agencies keep info like that closely held. They might leak out tidbits, but they don't do wholesale dumps, like, ever.

That's what the DNC is lying about. Not that hacks happened (they undoubtedly did), but about who did them (probably not Russian gov), and if hacks mattered (they didn't since everything was getting leaked anyway).

The DNC/Mueller/etc are lying, but like most practiced liars they're mixing the lies with half-truths and unrelated facts to muddy the waters:

Any "evidence" produced is spoofable from CIA cybertools

Yes, but that spoofed 'evidence' is not the direct opposite of the truth, like I see people assuming. Bad assumption, and the establishment plays on that to make critic look bad. The spoofed evidence is just mud.


An interesting question is, since it's basically guaranteed the DNC got hacked, but probably not by the Russians, is, what groups did hack the DNC, and why did the DNC scramble madly to hide their identities?

And while you think about that question, consider the close parallel with the Awan case, where Dems were ostensibly the victims, but they again scrambled to cover up for the people who supposedly harmed them. level 2

alskdmv-nosleep4u 2 points · 1 year ago

What's hilarious about the 2 down-votes is I can't tell if their from pro-Russiagate trolls, or from people who who can't get past binary thinking. level 1

Honztastic 2 points · 1 year ago

DNC wasn't even hacked. Emails were leaked. They didn't even examine the server. Any "evidence" produced is spoofable from CIA cybertools that we know about from wikileaks. It's important to know how each new lie is a lie. But man I am just so done with all this Russia shit. level 2

veganmark 2 points · 1 year ago

Crowdstrike claims that malware was found on DNC server. I agree that this has nothing to do with the Wikileaks releases. What I am wondering is whether Crowdstrike may have arranged for the DNC to be hacked so that Russia could be blamed. Continue this thread level 1

Inuma I take the headspace of idiots 9 points · 1 year ago

So you mean to tell me that WWIII is being prepared by Mueller and it was manufactured consent?

I'd be shocked, but this only proves that the "Deep State" only cares about their power, consequences be damned. level 1

veganmark 8 points · 1 year ago

George Eliason promises additional essays: *The next articles, starting with one about Fancy Bear's hot/cold ongoing relationship with Bellingcat which destroys the JIT investigation, will showcase the following: Fancy Bear worked with Bellingcat and the Ukrainian government providing Information War material as evidence for MH17:

HillaryBrokeTheLaw Long live dead poets 10 points · 1 year ago

Nice.

I'm glad you're still following this. Crowdstrike is shady af. level 1

[Dec 04, 2019] Fancy Bear - Conservapedia

Highly recommended!
Dec 04, 2019 | www.conservapedia.com

Fancy Bear (also know as Strontium Group, or APT28) is a Ukrainian cyber espionage group. Cybersecurity firm CrowdStrike incorrectly has said with a medium level of confidence that it is associated with the Russian military intelligence agency GRU . CrowdStrike founder, Dmitri Alperovitch , has colluded with Fancy Bear. American journalist George Eliason has written extensively on the subject.

There are a couple of caveats that need to be made when identifying the Fancy Bear hackers. The first is the identifier used by Mueller as Russian FSB and GRU may have been true- 10 years ago. This group was on the run trying to stay a step ahead of Russian law enforcement until October 2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and possibly former Russian state security. The majority of the group are Ukrainians making up Ukraine's Cyber Warfare groups.

Eliason lives and works in Donbass. He has been interviewed by and provided analysis for RT, the BBC , and Press-TV. His articles have been published in the Security Assistance Monitor, Washingtons Blog, OpedNews, the Saker, RT, Global Research, and RINF, and the Greanville Post among others. He has been cited and republished by various academic blogs including Defending History, Michael Hudson, SWEDHR, Counterpunch, the Justice Integrity Project, among others.

Contents [ hide ] Fancy Bear is Ukrainian Intelligence Shaltai Boltai

The "Fancy Bear hackers" may have been given the passwords to get into the servers at the DNC because they were part of the Team Clinton opposition research team. It was part of their job.

According to Politico ,

"In an interview this month, at the DNC this past election cycle centered on mobilizing ethnic communities -- including Ukrainian-Americans -- she said that, when Trump's unlikely presidential campaign. Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists, government officials and private intelligence operatives. While her consulting work began surging in late 2015, she began focusing more on the research, and expanded it to include Trump's ties to Russia, as well." [1]

The only investigative journalists, government officials, and private intelligence operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and the Ministry of Information.

All of these hacking and information operation groups work for Andrea Chalupa with EuroMaidanPR and Irena Chalupa at the Atlantic Council. Both Chalupa sisters work directly with the Ukrainian government's intelligence and propaganda arms.

Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage , terrorist , counter-terrorism, cyber, propaganda , and info war channels officially recognized and directed by Ukraine's Information Ministry. Along with their American colleagues, they populate the hit-for-hire website Myrotvorets with people who stand against Ukraine's criminal activities.

The hackers, OSINT, Cyber, spies, terrorists, etc. call themselves volunteers to keep safe from State level retaliation, even though a child can follow the money. As volunteers motivated by politics and patriotism they are protected to a degree from retribution.

They don't claim State sponsorship or governance and the level of attack falls below the threshold of military action. Special Counsel Robert Mueller had a lot of latitude for making the attribution Russian, even though the attacks came from Ukrainian Intelligence. Based on how the rules of the Tallinn Manual 2.0 on the International Law Applicable to Cyber are written, because the few members of the coalition from Shaltai Boltai are Russian in nationality, Fancy Bear can be attributed as a Russian entity for the purposes of retribution. The caveat is if the attribution is proven wrong, the US will be liable for damages caused to the State which in this case is Russia.

How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they have the ability to research and work in over 30 different languages.

This can be considered an Information Operation against the people of the United States and of course Russia. After 2013, Shaltay Boltay was no longer physically available to work for Russia. The Russian hackers were in Ukraine working for the Ukrainian government's Information Ministry which is in charge of the cyber war. They were in Ukraine until October 2016 when they were tricked to return to Moscow and promptly arrested for treason.

From all this information we know the Russian component of Team Fancy Bear is Shaltai Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian Intelligence. We know they are grouped with InformNapalm which is Ukraine's OSINT unit. We know their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above work directly with the Atlantic Council and Crowdstrike's Dimitry Alperovich.

In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged data from the Surkov leak.

But during 2014, 2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and CyberHunta went to work for the DNC as opposition researchers .

The First Time Shaltai Boltai was Handed the Keys to US Gov Servers

The setup to this happened long before the partnership with Ukrainian Intel hackers and Russia's Shaltai Boltai was forged. The hack that gained access to US top-secret servers happened just after the partnership was cemented after Euro-Maidan.

In August 2009 Hillary Clinton's Deputy Chief of Staff at the State Department Huma Abedin sent the passwords to her Government laptop to her Yahoo mail account. On August 16, 2010, Abedin received an email titled "Re: Your yahoo account. We can see where this is going, can't we?

"After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin's associates to access email accounts into 2015 and 2016."

Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo hack.

The time frame has to be noted. The hack happened in 2014. Access to the email accounts continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai Boltai was working from Kiev, Ukraine.

So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with looking at the time frame. Ukraine had the keys already in hand in 2014.

Chalupa collusion with Ukrainian Intelligence
See also: Ukrainian collusion and Ukrainian collusion timeline

Alexandra Chalupa hired this particular hacking terrorist group, which Dimitry Alperovich and Crowdstrike dubbed "Fancy Bear", in 2015 at the latest. While the Ukrainian hackers worked for the DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the state of the projects they were working on. Let's face it, once you're in, setting up your Fancy Bear toolkit doesn't get any easier. This is why I said the DNC hack isn't the big crime. It's a big con and all the parties were in on it.

Hillary Clinton exposed secrets to hacking threats by using private email instead of secured servers. Given the information provided she was probably being monitored by our intrepid Ruskie-Ukie union made in hell hackers. Anthony Weiner exposed himself and his wife Huma Abedin using Weiner's computer for top-secret State Department emails. And of course Huma Abedin exposed herself along with her top-secret passwords at Yahoo and it looks like the hackers the DNC hired to do opposition research hacked her.

Here's a question. Did Huma Abedin have Hillary Clinton's passwords for her private email server? It would seem logical given her position with Clinton at the State Department and afterward. This means that Hillary Clinton and the US government top secret servers were most likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using legitimate passwords.

Dobrovolska

Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former staff from 2013 through prepping for the 2016 election. [2] [3] Alexandra Chalupa was running a research department that is rich in (foreign) Ukrainian Intelligence operatives, hackers, terrorists, and a couple Ruskie traitors.

Kristina Dobrovolska was acting as a handler and translator for the US State Department in 2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to Washington to meet with Chalupa.

Alexandra types in her password to show Dobrovolska something she found and her eager to please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the Fancy Bear crew about it and they immediately get to work looking for Trump material on the US secret servers with legitimate access. I mean, what else could they do with this? Turn over sensitive information to the ever corrupt Ukrainian government?

According to the Politico article, Alexandra Chalupa was meeting with the Ukrainian embassy in June of 2016 to discuss getting more help sticking it to candidate Trump. At the same time she was meeting, the embassy had a reception that highlighted female Ukrainian leaders.

Four Verkhovna Rada [parlaiment] deputies there for the event included: Viktoriia Y. Ptashnyk, Anna A. Romanova, Alyona I. Shkrum, and Taras T. Pastukh. [4]

According to CNN , [5] DNC sources said Chalupa told DNC operatives the Ukrainian government would be willing to deliver damaging information against Trump's campaign. Later, Chalupa would lead the charge to try to unseat president-elect Trump starting on Nov 10, 2016.

Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison and translator who escorted the delegates from Kyiv during their visits to Albany and Washington.

Kristina Dobrovolska is the handler manager working with Ukraine's DNC Fancy Bear Hackers. [6] She took the Rada [parliament] members to dinner to meet Joel Harding who designed Ukraine's infamous Information Policy which opened up their kill-for-hire-website Myrotvorets. Then she took them to meet the Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the surviving nephew to the infamous torturer The WWII OUNb leader, Mykola Lebed.

Fancy Bear's Second Chance at Top Secret Passwords From Team Clinton

One very successful method of hacking is called social engineering . You gain access to the office space and any related properties and physically locate the passwords or clues to get you into the hardware you want to hack. This includes something as simple as looking over the shoulder of the person typing in passwords.

The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC opposition research. On different occasions, Fancy Bear handler Kristina Dobrovolska traveled to the US to meet the Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea Chalupa, US Dept of State personnel, and most likely Crowdstrike's Dimitry Alperovich. Alperovich was working with the hackers in 2015-16. In 2016, the only groups known to have Fancy Bear's signature tools called X-tunnel and X-Agent were Alperovich, Crowdstrike, and Fancy Bear (Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does explain a few things.

Alleged DNC hack

There were multiple DNC hacks. There is also clear proof supporting the download to a USB stick and subsequent information exchange (leak) to Wikileaks . All are separate events.

At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It is a matter of public record that Team Clinton provided the DNC hackers with passwords to State Department servers on at least 2 occasions, one wittingly and one not. Fancy Bear hackers are Ukrainian Intelligence Operators.

If the leak came through Seth Rich , it may have been because he saw foreign Intel operatives given this access from the presumed winners of the 2016 US presidential election . The leaker may have been trying to do something about it. I'm curious what information Wikileaks might have.

Alperovitch and Fancy Bear

George Eliason, Washingtonsblog: Why Crowdstrike's Russian Hacking Story Fell Apart- Say Hello to Fancy Bear. investigated. [7]

  • In the wake of the JAR-16-20296 dated December 29, 2016 about hacking and influencing the 2016 election, the need for real evidence is clear. The joint report adds nothing substantial to the October 7th report. It relies on proofs provided by the cyber security firm Crowdstrike that is clearly not on par with intelligence findings or evidence. At the top of the report is an "as is" statement showing this.
  • The difference bet enough evidence is provided to warrant an investigation of specific parties for the DNC hacks. The real story involves specific anti-American actors that need to be investigated for real crimes. For instance, the malware used was an out-dated version just waiting to be found. The one other interesting point is that the Russian malware called Grizzly Steppe is from Ukraine. How did Crowdstrike miss this when it is their business to know?
  • The bar for identification set by Crowdstrike has never been able to get beyond words like probably, maybe, could be, or should be, in their attribution. The bar Dimitri Alperovitch set for identifying the hackers involved is that low. Other than asking America to trust them, how many solid facts has Alperovitch provided to back his claim of Russian involvement?
  • information from outside intelligence agencies has the value of rumor or unsubstantiated information at best according to policy. Usable intelligence needs to be free from partisan politics and verifiable. Intel agencies noted back in the early 90's that every private actor in the information game was radically political.
  • Alperovitch first gained notice when he was the VP in charge of threat research with McAfee. Asked to comment on Alperovitch's discovery of Russian hacks on Larry King, John McAfee had this to say. "Based on all of his experience, McAfee does not believe that Russians were behind the hacks on the Democratic National Committee (DNC), John Podesta's emails, and the Hillary Clinton presidential campaign. As he told RT, "if it looks like the Russians did it, then I can guarantee you it was not the Russians."
  • How does Crowdstrike's story part with reality? First is the admission that it is probably, maybe, could be Russia hacking the DNC. "Intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to Wiki Leaks." The public evidence never goes beyond the word possibility. While never going beyond that or using facts, Crowdstrike insists that it's Russia behind both Clinton's and the Ukrainian losses.
  • NBC carried the story because one of the partners in Crowdstrike is also a consultant for NBC. According to NBC the story reads like this."The company, Crowdstrike, was hired by the DNC to investigate the hack and issued a report publicly attributing it to Russian intelligence. One of Crowdstrike's senior executives is Shawn Henry , a former senior FBI official who consults for NBC News.
  • In June, Crowdstrike went public with its findings that two separate Russian intelligence agencies had hacked the DNC. One, which Crowdstrike and other researchers call Cozy Bear, is believed to be linked to Russia's CIA, known as the FSB. The other, known as Fancy Bear, is believed to be tied to the military intelligence agency, called the GRU." The information is so certain the level of proof never rises above "believed to be." According to the December 12th Intercept article "Most importantly, the Post adds that "intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to WikiLeaks."
  • The SBU, Olexander Turchinov, and the Ukrainian Ministry of Defense all agree that Crowdstrike is dead wrong in this assessment. Although subtitles aren't on it, the former Commandant of Ukrainian Army Headquarters thanks God Russia never invaded or Ukraine would have been in deep trouble. How could Dimitri Alperovitch and Crowdstrike be this wrong on easily checked detail and still get this much media attention?
  • Crowdstrike CEO Dmitri Alperovitch story about Russian hacks that cost Hillary Clinton the election was broadsided by the SBU (Ukrainian Intelligence and Security) in Ukraine. If Dimitri Alperovitch is working for Ukrainian Intelligence and is providing intelligence to 17 US Intelligence Agencies is it a conflict of interest?
  • Is giving misleading or false information to 17 US Intelligence Agencies a crime? If it's done by a cyber security industry leader like Crowdstrike should that be investigated? If unwinding the story from the "targeting of Ukrainian volunteers" side isn't enough, we should look at this from the American perspective. How did the Russia influencing the election and DNC hack story evolve? Who's involved? Does this pose conflicts of interest for Dmitri Alperovitch and Crowdstrike? And let's face it, a hacking story isn't complete until real hackers with the skills, motivation, and reason are exposed.
  • According to journalist and DNC activist Andrea Chalupa on her Facebook page "After Chalupa sent the email to Miranda (which mentions that she had invited this reporter to a meeting with Ukrainian journalists in Washington), it triggered high-level concerns within the DNC, given the sensitive nature of her work. "That's when we knew it was the Russians," said a Democratic Party source who has been directly involved in the internal probe into the hacked emails. In order to stem the damage, the source said, "we told her to stop her research."" July 25, 2016
  • If she was that close to the investigation Crowdstrike did how credible is she? Her sister Alexandra was named one of 16 people that shaped the election by Yahoo news. The DNC hacking investigation done by Crowdstrike concluded hacking was done by Russian actors based on the work done by Alexandra Chalupa ? That is the conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the Russian government connection.
  • How close is Dimitri Alperovitch to DNC officials? Close enough professionally he should have stepped down from an investigation that had the chance of throwing a presidential election in a new direction. According to Esquire.com, Alperovitch has vetted speeches for Hillary Clinton about cyber security issues in the past. Because of his work on the Sony hack, President Barrack Obama personally called and said the measures taken were directly because of his work.
  • Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian propagandists, and Ukrainian state supported hackers [show a conflict of interest]. When it all adds up and you see it together, we have found a Russian that tried hard to influence the outcome of the US presidential election in 2016.
  • The Chalupas are not Democrat or Republican. They are OUNb. The OUNb worked hard to start a war between the USA and Russia for the last 50 years. According to the Ukrainian Weekly in a rare open statement of their existence in 2011, "Other statements were issued in the Ukrainian language by the leadership of the Organization of Ukrainian Nationalists (B) and the International Conference in Support of Ukraine. The OUN (Bandera wing) called for" What is OUNb Bandera? They follow the same political policy and platform that was developed in the 1930's by Stepan Bandera . When these people go to a Holocaust memorial they are celebrating both the dead and the OUNb SS that killed. [8] There is no getting around this fact. The OUNb have no concept of democratic values and want an authoritarian fascism .
  • Alexandra Chalupa- According to the Ukrainian Weekly , [9]
"The effort, known as Digital Miadan, gained momentum following the initial Twitter storms. Leading the effort were: Lara Chelak, Andrea Chalupa, Alexandra Chalupa, Constatin Kostenko and others." The Digital Maidan was also how they raised money for the coup. This was how the Ukrainian emigres bought the bullets that were used on Euromaidan. Ukraine's chubby nazi, Dima Yarosh stated openly he was taking money from the Ukrainian emigres during Euromaidan and Pravy Sektor still fundraises openly in North America. The "Sniper Massacre" on the Maidan in Ukraine by Dr. Ivan Katchanovski, University of Ottowa shows clearly detailed evidence how the massacre happened. It has Pravy Sektor confessions that show who created the "heavenly hundred. Their admitted involvement as leaders of Digital Maidan by both Chalupas is a clear violation of the Neutrality Act and has up to a 25 year prison sentence attached to it because it ended in a coup.
  • Andrea Chalupa-2014, in a Huff Post article Sept. 1 2016, Andrea Chalupa described Sviatoslav Yurash as one of Ukraine's important "dreamers." He is a young activist that founded Euromaidan Press. Beyond the gushing glow what she doesn't say is who he actually is. Sviatoslav Yurash was Dmitri Yarosh's spokesman just after Maidan. He is a hardcore Ukrainian nationalist and was rewarded with the Deputy Director position for the UWC (Ukrainian World Congress) in Kiev.
  • In January, 2014 when he showed up at the Maidan protests he was 17 years old. He became the foreign language media representative for Vitali Klitschko, Arseni Yatsenyuk, and Oleh Tyahnybok. All press enquiries went through Yurash. To meet Dimitri Yurash you had to go through Sviatoslav Yurash as a Macleans reporter found out.
  • At 18 years old, Sviatoslav Yurash became the spokesman for Ministry of Defense of Ukraine under Andrei Paruby. He was Dimitri Yarosh's spokesman and can be seen either behind Yarosh on videos at press conferences or speaking ahead of him to reporters. From January 2014 onward, to speak to Dimitri Yarosh, you set up an appointment with Yurash.
  • Andrea Chalupa has worked with Yurash's Euromaidan Press which is associated with Informnapalm.org and supplies the state level hackers for Ukraine.
  • Irene Chalupa- Another involved Chalupa we need to cover to do the story justice is Irene Chalupa. From her bio– Irena Chalupa is a nonresident fellow with the Atlantic Council's Dinu Patriciu Eurasia Center. She is also a senior correspondent at Radio Free Europe/Radio Liberty (RFE/RL), where she has worked for more than twenty years. Ms. Chalupa previously served as an editor for the Atlantic Council, where she covered Ukraine and Eastern Europe. Irena Chalupa is also the news anchor for Ukraine's propaganda channel org She is also a Ukrainian emigre leader.
  • According to Robert Parry's article [10] At the forefront of people that would have taken senior positions in a Clinton administration and especially in foreign policy are the Atlantic Council . Their main goal is still a major confrontation with nuclear-armed Russia.
  • The Atlantic Council is the think tank associated and supported by the CEEC (Central and Eastern European Coalition). The CEEC has only one goal which is war with Russia. Their question to candidates looking for their support in the election was "Are you willing to go to war with Russia?" Hillary Clinton has received their unqualified support throughout the campaign.
  • What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the Atlantic Council would have taken senior cabinet and policy positions, his own fellowship status at the Atlantic Council and relationship with Irene Chalupa creates a definite conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or Homeland Security?
  • When you put someone that has so much to gain in charge of an investigation that could change an election, that is a conflict of interest. If the think tank is linked heavily to groups that want war with Russia like the Atlantic Council and the CEEC, it opens up criminal conspiracy.
  • If the person in charge of the investigation is a fellow at the think tank that wants a major conflict with Russia it is a definite conflict of interest. Both the Atlantic Council and clients stood to gain Cabinet and Policy positions based on how the result of his work affects the election. It clouds the results of the investigation. In Dmitri Alperovitch's case, he found the perpetrator before he was positive there was a crime.
  • Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence groups is where things really heat up. Noted above she works with Euromaidanpress.com and Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers.
  • When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and its hackers individually. There is a mutual relationship. When you add up his work for the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be investigated to see if Ukraine is conspiring against the US government. Crowdstrike is also following their hack of a Russian government official after the DNC hack. It closely resembles the same method used with the DNC because it was an email hack.
  • Crowdstrike's product line includes Falcon Host, Falcon Intelligence, Falcon Overwatch and Falcon DNS. Is it possible the hackers in Falcons Flame are another service Crowdstrike offers?
  • In an interview with Euromaidanpress these hackers say they have no need for the CIA. [11] They consider the CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance is a quasi-organization with the participation of several groups – RUH8, Trinity, Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the Myrotvorets site, Informnapalm analytical agency."
Although this profile says Virginia, tweets are from the Sofia, Bulgaria time zone and he writes in Russian. Another curiosity considering the Fancy Bear source code is in Russian. This image shows Crowdstrike in their network. Crowdstrike is part of Ukrainian nationalist hacker network. In the image it shows a network diagram of Crowdstrike following the Surkov leaks. The network communication goes through a secondary source. Although OSINT Academy sounds fairly innocuous, it's the official twitter account for Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence. The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates journalists and other people for assassination. If you disagree with OUNb politics, you could be on the list.
  • Should someone tell Dimitri Alperovitch that Gerashchenko, who is now in charge of Peacekeeper recently threatened president-elect Donald Trump that he would put him on his "Peacemaker" site as a target? The same has been done with Silvio Berscaloni in the past.
  • Trying not to be obvious, the Head of Ukraine's Information Ministry (UA Intelligence) tweeted something interesting that ties Alperovitch and Crowdstrike to the Ukrainian Intelligence hackers and the Information Ministry even tighter. This single tweet on a network chart shows that out of all the Ukrainian Ministry of Information Minister's following, he only wanted the 3 hacking groups associated with both him and Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be shared heavily. If it was a victory for the hacking squad, it would be smart to keep it to themselves and not draw unwanted attention.
  • These same hackers are associated with Alexandra, Andrea, and Irene Chalupa through the portals and organizations they work with through their OUNb. The hackers are funded and directed by or through the same OUNb channels that Alperovitch is working for and with to promote the story of Russian hacking.
  • When you look at the image for the hacking group in the euromaidanpress article, one of the hackers identifies themselves as one of Dimitri Yarosh's Pravy Sektor members by the Pravy Sektor sweatshirt they have on. Noted above, Pravy Sektor admitted to killing the people at the Maidan protest and sparked the coup.
  • Going further with the linked Euromaidanpress article the hackers say "Let's understand that Ukrainian hackers and Russian hackers once constituted a single very powerful group. Ukrainian hackers have a rather high level of work. So the help of the USA I don't know, why would we need it? We have all the talent and special means for this. And I don't think that the USA or any NATO country would make such sharp movements in international politics."
  • What sharp movements in international politics have been made lately? Let me spell it out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored, Russian language hackers in Eastern European time zones have shown with the Surkov hack they have the tools and experience to hack states that are looking out for it. They are also laughing at US intel efforts.
  • The hackers also made it clear that they will do anything to serve Ukraine. Starting a war between Russia and the USA is the one way they could serve Ukraine best, and hurt Russia worst. Given those facts, if the DNC hack was according to the criteria given by Alperovitch, both he and these hackers need to be investigated.
  • According to the Esquire interview "Alperovitch was deeply frustrated: He thought the government should tell the world what it knew. There is, of course, an element of the personal in his battle cry. "A lot of people who are born here don't appreciate the freedoms we have, the opportunities we have, because they've never had it any other way," he told me. "I have."
  • While I agree patriotism is a great thing, confusing it with this kind of nationalism is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering a conflict with Russia that is against American interests, he's a patriot. He isn't serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to Ukraine.
  • The evidence presented deserves investigation because it looks like the case for conflict of interest is the least Dimitri Alperovitch should look forward to. If these hackers are the real Cozy Bear and Fancy Bear, they really did make sharp movements in international politics. By pawning it off on Russia, they made a worldwide embarrassment of an outgoing President of the United States and made the President Elect the suspect of rumor.
Obama, Brazile, Comey, and CrowdStrike

According to Obama the hacks continued until September 2016. According to ABC, Donna Brazile says the hacks didn't stop until after the elections in 2016. According to Crowdstrike the hacks continued into November.

Democratic National Committee Chair Donna Brazile said Russian hackers persisted in trying to break into the organization's computers "daily, hourly" until after the election -- contradicting President Obama's assertion that the hacking stopped in September after he warned Russian President Vladimir Putin to "cut it out."-ABC

This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney , the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best.

The DNC fiasco isn't that important of a crime. The reason I say this is the FBI would have taken control over material evidence right away. No law enforcement agency or Intel agency ever did. This means none of them considered it a crime Comey should have any part of investigating. That by itself presents the one question mark which destroys any hope Mueller has proving law enforcement maintained a chain of custody for any evidence he introduces.

It also says the US government under Barrack Obama and the victimized DNC saw this as a purely political event. They didn't want this prosecuted or they didn't think it was prosecutable.

Once proven it shows a degree of criminality that makes treason almost too light a charge in federal court. Rest assured this isn't a partisan accusation. Team Clinton and the DNC gets the spotlight but there are Republicans involved.

Further reading

[Dec 04, 2019] June 2nd, 2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams by George Webb

Highly recommended!
Nov 27, 2019 | www.youtube.com

Investigative Jouralist George Webb worked at MacAfee and Network Solutions in 2000 when the CEO Bill Larsen bought a small, Moscow based, hacking and virus writing company to move to Silicon Valley.

MacAfee also purchased PGP, an open source encryption software developed by privacy advocate to reduce NSA spying on the public.

The two simultaneous purchase of PGP and the Moscow hacking team by Metwork Solutions was sponsored by the CIA and FBI in order to crack encrypted communications to write a back door for law enforcement.

Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike.

In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives.

[Nov 30, 2019] CrowdStrike: a Conspiracy Wrapped in a Conspiracy Inside a Conspiracy by Oleg Atbashian

Highly recommended!
Notable quotes:
"... Only a computer illiterate would think that CrowdStrike needed to take the physical DNC server to Ukraine in order to analyze it. Any computer can be cloned and its digital image can be sent within minutes anywhere on the planet in the form of ones and zeroes. It can also exist in multiple digital copies, carrying not just confidential archives, but also history logs and other content that can reveal to an expert whether the hacking occurred, and if so, by whom. ..."
"... The copies of the DNC server on CrowdStrike computers are likely to hold the key to understanding what really happened during the 2016 election, the origin of the anti-Trump witch hunt, and the toxic cloud of lies that had been hanging over the world and poisoning minds during the last three years. ..."
"... And now the new Ukrainian government might subpoena these copies from CrowdStrike and finally pass them to FBI experts, which should've been done three years ago. The danger of this happening is a much greater incentive for the Democrats to preemptively destroy Trump than all the dirt Joe Biden had been rolling in as Obama's vice president. ..."
"... I would like you to do us a favor though because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike... I guess you have one of your wealthy people... The server, they say Ukraine has it. There are a lot of things that went on, the whole situation. ..."
"... The fraudulent "CrowdStrike conspiracy" deflection is not a show of the Democrats' strength. Instead, It betrays their desperation and panic, which tells us that Trump is squarely over the target. ..."
"... Yet DOJ Mueller conclusively signed off on the unsubtaniated fact the Russians had hacked the DNC computers in his final Weissman Report. Just one more part of the curious Mueller report that was far more a CYA hit piece against future claims of Obama crimes, than an investigation of past Trump ones. ..."
Nov 29, 2019 | www.frontpagemag.com

The conspiracy theory that exposes the Democrats' desperation and panic.

Fri Nov 29, 2019 Oleg Atbashian 133 In the last few days, media talking heads have been saying the word "CrowdStrike" a lot, defining it as a wild conspiracy theory originating in Moscow. They were joined by Chris Wallace at Fox News, who informed us that president Trump and his ill-informed fans believe in a crazy idea that the DNC wasn't hacked by the Russians but by some Ukrainian group named CrowdStrike that stole the DNC server and brought it to Ukraine , and that it was Ukraine that meddled in our 2016 election and not Russia.

A crazy idea indeed. Except that neither Trump nor his fans had ever heard of it until the Democrat-media complex condescendingly informed them that these are their beliefs.

Let's look at the facts:

None of these facts was ever disputed by anyone. The media largely ignored them except for the part about the Russian hackers, which boosted their own, now debunked, wild conspiracy theory that Trump was a Russian agent.

Now that Trump had asked the newly elected Ukrainian president Zelensky to look into CrowdStrike during that fateful July phone call, the media all at once started telling us that "CrowdStrike" is a code word for a conspiracy theory so insane that only Trump could believe in it, which is just more proof of how insane he is.

But if Trump had really said what Mr. Wallace and the media claim, Ukrainians would be the first to call him on it and the impeachment would've been over by now. Instead, Ukrainians back Trump every step of the way.

So where did this pretzel-shaped fake news come from, and why is it being peddled now ?

Note this is a classic case study of propaganda and media manipulation:

  1. Take an idea or a story that you wish to go away and make up an obviously bogus story with the same names and details as the real one.
  2. Start planting it simultaneously on media channels until the fake story supplants the real one, while claiming this is what your opponents really believe.
  3. Have various fact-checking outlets debunk your fake story as an absurd conspiracy theory. Ridicule those who allegedly believe in it. Better yet, have late night comedians do it for you.
  4. Once your opponent is brought down, mercilessly plant your boot on his face and never let up.

This mass manipulation technology had been tested and perfected by the Soviet propaganda machine, both domestically and overseas, where it was successfully deployed by the KGB. The Kremlin still uses it, although it can no longer afford it on the same grandiose scale. In this sense, the Democratic think tanks are the true successors of the KGB in deviousness, scope, and worldwide reach of fake narratives. How they inherited these methods from the KGB is a story for another day.

For a long time this technology was allowing the Democrats to delegitimize opposition by convincing large numbers of Americans that Republicans are

The Soviet communists had aptly named it "disinformation," which a cut above the English word "misinformation." It includes a variety of methods for a variety of needs, from bringing down an opponent to revising history to creating a new historical reality altogether. In this sense, most Hollywood movies on historical subjects today disinform us about history, supplanting it with a bogus "progressive" narrative. The Soviet term for such art was "socialist realism."

Long story short, the Democrat-media complex has successfully convinced one half of the world that Trump is a Russian agent. Now they're acting as if they'd spent the last three years in a coma, unaware of any bombshell stories about collusion. And bombshell stories without any continuation are a telltale sign of fake narratives. The only consequence of these bombshells is mass amnesia among the foot soldiers.

The Trump-Russian outrage is dead, long live the Trump-Ukraine outrage. And when that outrage is dead, the next outrage that will be just outrageous.

The current impeachment narrative alleges that Trump used military aid as leverage in asking Ukraine to dig up dirt on Joe Biden (which implies the Democrats know Biden is dirty, otherwise why bother?). What's not in this picture is CrowdStrike. Even though Trump mentioned it in the phone call, it has nothing to do with the Bidens nor the Javelin missiles. CrowdStrike has nothing to do with impeachment. We're told it's just a silly conspiracy theory in Trump's head, that it's a nonissue.

But then why fabricate fake news about it and plant blatant lies simultaneously in all media outlets from Mother Jones to Fox News? Why risk being exposed over such a nonissue? Perhaps because it's more important than the story suggests.

Only a computer illiterate would think that CrowdStrike needed to take the physical DNC server to Ukraine in order to analyze it. Any computer can be cloned and its digital image can be sent within minutes anywhere on the planet in the form of ones and zeroes. It can also exist in multiple digital copies, carrying not just confidential archives, but also history logs and other content that can reveal to an expert whether the hacking occurred, and if so, by whom.

The copies of the DNC server on CrowdStrike computers are likely to hold the key to understanding what really happened during the 2016 election, the origin of the anti-Trump witch hunt, and the toxic cloud of lies that had been hanging over the world and poisoning minds during the last three years.

And now the new Ukrainian government might subpoena these copies from CrowdStrike and finally pass them to FBI experts, which should've been done three years ago. The danger of this happening is a much greater incentive for the Democrats to preemptively destroy Trump than all the dirt Joe Biden had been rolling in as Obama's vice president.

This gives the supposedly innocuous reference to CrowdStrike during Trump's call a lot more gravity and the previously incoherent part of the transcript begins to make sense.

PRESIDENT TRUMP: I would like you to do us a favor though because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike... I guess you have one of your wealthy people... The server, they say Ukraine has it. There are a lot of things that went on, the whole situation.

If you read the transcript on the day it was released, you probably didn't understand what Trump was even talking about, let alone what had caused such a disproportionate outrage, complete with whistle blowing and calls for impeachment. What in that mild conversation could possibly terrify the Democrats so much? They were terrified because, unlike most Americans, the Democrats knew exactly what Trump was talking about. And now you know, too.

The fraudulent "CrowdStrike conspiracy" deflection is not a show of the Democrats' strength. Instead, It betrays their desperation and panic, which tells us that Trump is squarely over the target.

It also helps us to see who at Fox News can be trusted to tell us the truth. And it ain't Chris Wallace.


NAHALKIDES a day ago ,

Fine dissection of the CrowdStrike story. Of course if the DNC was serious about finding out who breached their security they would have allowed the FBI to investigate. They didn't - which means they're covering something up.

coolit10 NAHALKIDES a day ago ,

And who doesn't have at least one backup system running constantly, I have two and am just a home user and the DNC would not have been dumb enough not to have one on the premises and one off site for safety and preservation and the FBI could have gotten to either one if they wanted to. DWS was involved in something very similar and the FBI backed off again. I thought the DNC and the FBI were on the same page and would have liked to find out how the "transfer" happened?

🕊jr🕊 " Deep State Target " coolit10 13 hours ago ,

Let's be honest, that FBI made no attempt to investigate it in the first place as they were as culpable in this crime as the DNC.

Herman Young 🕊jr🕊 " Deep State Target " 12 hours ago ,

Yet DOJ Mueller conclusively signed off on the unsubtaniated fact the Russians had hacked the DNC computers in his final Weissman Report. Just one more part of the curious Mueller report that was far more a CYA hit piece against future claims of Obama crimes, than an investigation of past Trump ones.

SteveTn6b NAHALKIDES 16 hours ago ,

They know who breached their security. He'd dead!

Herman Young SteveTn6b 12 hours ago ,

Seth Rich - paper trail to Wikilinks needs to come out in any Senate impeachment trail since Democrats claim the Ukraine phone call was Trump's alleged downfall. CROWDSTRIKE was the only favor Trumps asked for.

Karen Herman Young 9 hours ago ,

We all know it was Seth Rich

Clasvi SteveTn6b 13 hours ago ,

you are spot on. it is amazing how they shut down the Seth Rich murder. The media was all to happy to shut it down.

Karen Clasvi 9 hours ago ,

Fox helped with that cover up

undrprsr Clasvi 6 hours ago ,

Yep, and Donna Brazile wrote in her book she feared for her life after Seth Rich was murdered, why's that if it was just a random attack?

El Cid NAHALKIDES 15 hours ago ,

There are two important facts to glean from this article:

1) Crowdstrike, the DNC contractor, is Ukrainian
2) that the famous server may have been backed up in Ukraine and not tampered with.

From the MSM we were given the 'interpretation' that Trump is an idiot who believes that the DNC shipped the server with no changes to the Ukraine. No folks. He 'gets' technology and security. He actual ran a business! (imagine).

I'd love to hear that in Hillary's own voice. :) You know, cleaned with a cloth?

Joe Clear NAHALKIDES 12 hours ago ,

They sure are, that being the killing of Seth Rich who copied the data to flash drive and gave it to Wikileaks.

stanley castleberry NAHALKIDES 12 hours ago ,

They found out right away. Hence Rich was assassinated.

Herman Young NAHALKIDES 12 hours ago • edited ,

That pretty much sums it up. MSM in total cahoots on this too since they put the entire topic of the CROWDSTRIKE part of the phone call into the cone of silence.

No Bread or Circuses a day ago ,

The Left and media (One and the same within the "Deep State") have been playing "Three Card Monte" with America for a while; it stops now!

The "Impeachment" media show being run by the Lefty tool cretins in the House has NOTHING to do with wrong doing by President Trump. It has EVERYTHING to do with the fear that President Trump will expose the depth of the swamp and bring the criminals on the Left down to Justice!

We are s close to getting to the bottom of the conspiracies that threaten our nation. Time to make the America haters pay for the harm they have done to our nation!

We need open and in depth prosecution of the criminal activities of the Left. There needs to be LONG prison sentences and, yes, even executions for those that seek to undermine our nation.

People need to know that there our GRAVE penalties for betraying our nation!

God Bless President Trump!
God Bless America!

Anacleto Mitraglia 21 hours ago • edited ,

In fact, when I first heard this story - that is: very recently - I was puzzled: why should a major party in the Country that invented IT and is still at its leading edge, ask an obscure firm of a crumbling, remote foreign State to do their IT security research? I'm not saying that Ukraine is a s++thole Country, but... you get me.

Either they have very much to hide, or they fear some closeted rightwing geek that works in any of the many leftist US technofirms. Or, CrowdStrike were involved from the beginning of the story, from the Steele dossier perhaps?

Herman Young Anacleto Mitraglia 12 hours ago ,

The whole Crowdstrike fiasco has been around for years - plus became a solid CYA part of the Mueller report too - just in case the Democrats needed to bury it later.

El Cid Anacleto Mitraglia 15 hours ago • edited ,

don't you get it? The DNC is completely infiltrated by Ukrainian graft. Even Joe Biden was on the take. Why won't they run their IT? (there is no Research in IT here, just office software)

Cynthia Campbell 19 hours ago ,

If you want to sell and deliver State Secrets and Intel to our enemies, then you (Obama, the Clintons, the DNC) simply make it easier for THEM to access. They have done this for years, and this is why they had to fill the DOJ, the FBI and the State Department with traitors and haters of America and American principles. Barack Hussein Obama, the Clintons, their evil administrations and even two-faced RINOS like McCain, Romney, and Jeff Sessions were actively involved. This is treason pure and simple, and all of the above could be legitimately and justifiably hung or shot without recourse, and rightly so!

doc_who_cuts 20 hours ago ,

not seizing the DNC and hillary servers is the clearest case of OBSTRUCTION OF JUSTICE I know of in the last few years.

Herman Young doc_who_cuts 12 hours ago ,

Isn't it ironic, the Dems accuse Trump of "obstruction of justice".

FRANCES LOUISE a day ago ,

I have known about "Crowdstrike" since Dec. 2017. Pres. Trump is just subtlety introducing background on what will be the biggest story of treachery, subversion, treason and corruption ever. QAnon that the fakenews tries to vilify as a LARP has been dropping crumbs about "Crowdstrike", Perkins Coir, Fusion GPS, FVEY and so much more! Crowdstrike mentioned 7x in the last 2 years. I can't urge people enough to actually investigate the Q posts for themselves! You will be stunned at what you have been missing. Q which says "future proves past" and "news will unlock" what I see in the media now is old news to those of us following Q. Q told us that "Senate was the prize" "Senate meant more" that the investigations started in the House would now move to the Senate and all this that the Dems and Rinos have been trying to hide is going to be exposed. Fakenews corporate media has litterally written hundreds of hit pieces against Q - me knows "they doth protest to much" - Recent Q post told "Chairman Graham its time. Senate was the target"

Keep up with the Q posts and Pres. Trump's tweets in once place: https://qmap.pub/ - And if you are still having a hard time believing this is legit Pres. Trump himself has confirmed Q posts by "Zero Delta" drops - if you think this is fake - try and tweet within 1 minute of when Pres. Trump does BUT your tweet has to anticipate his! YOU have to tweet first and HE has to follow you within 1 minute. MATHEMATICAL IMPOSSIBILITY UNLESS you are in the same immediate space or communicating at the time of the tweets! To all you doubters that think Q is just a by chance scam - NO WAY. There have been MANY, MANY of these ZERO DELTA PROOFS over the last 2 years. The most recent was Nov. 20th.

Link will show you how much attention has been given to "debunking" Q - gotta wonder why
https://cdn.qmap.pub/images...

elephant4life FRANCES LOUISE 19 hours ago ,

Perkins-Coie is the real-world Milton, Chadwick & Waters. I'm willing to bet their industrial-sized shredders are working overtime.

Herman Young elephant4life 12 hours ago ,

Unless Bleach-Bit got there first.

Herman Young FRANCES LOUISE 12 hours ago ,

Crowdstrike in the dog who did not bark. The Democrat cone of silence they put on even the mention of the word has been the most damning clue this is where the real action is.

Grant Hodges a day ago ,

The assertion that a digital image of the computer can be transmitted quickly all around the world is not necessarily correct in my experience as a cyber security analyst. I'm not an upper echelon type, but I am aware that it can take up to weeks to transmit such images depending on the hard disk, where it is, and the connections/network to your device creating the image. The FBI should have physically taken the device since there was a suspicion of wrong doing by Hillary Clinton. Had it been Donald Trump's computer I do not doubt the FBI would either have imaged it on the spot or taken the device.

coolit10 Grant Hodges a day ago ,

Last night I completely removed Catalina-Safari on my older Mac Book Air and re-installed Mohave-Safari from my backup to the day before I installed Catalina including the data and system just like it was before. It took around 5 hours and was cabled and not on Wi-Fi and it was perfect and reset the clock, my old e-mails and the newer ones as well. I can't believe being hooked into real broadband or fiber couldn't do the same in a relatively short period of time, but still significantly longer than a thumb drive or external hard drive.

Grant Hodges coolit10 a day ago ,

One variable is how big your hard drive is. If it is a big drive at a remote location, say somewhere in California to the Midwest, it can take weeks for a forensic backup. I only say that because . . . well, I'm not allowed to say. But you get it.

El Cid Grant Hodges 14 hours ago • edited ,

The assertion is a figure of speech. Today's IT infrastructure companies sell the service of maintaining clones in real-time in two or more locations for safety purposes. VMware and other off-the-shelf products makes this kind of setup easy to deploy. Did Crowdstrike offer that service and did the DNC buy it, that is the question? And, if so, did Crowdstrike keep the image on their backups in Ukraine?

(Note: it is not obvious that such a setup would preserve the forensic data the FBI would be looking for, but its a start).

[Nov 30, 2019] Beyond The DNC - Leaks, Hacks, and Treason by George Eliason George Eliason

Notable quotes:
"... This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney, the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best. ..."
Nov 30, 2019 | www.mintpressnews.com

Here's what's different in the information I've compiled.

At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It is a matter of public record that Team Clinton provided the DNC hackers with passwords to State Department servers on at least 2 occasions, one wittingly and one not. I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators.

This gives some credence to the Seth Rich leak (DNC leak story) as an act of patriotism. If the leak came through Seth Rich, it may have been because he saw foreign Intel operatives given this access from the presumed winners of the 2016 US presidential election. No political operative is going to argue with the presumed president-elect over foreign policy. The leaker may have been trying to do something about it. I'm curious what information Wikileaks might have.

The real crime of the DNC hack wasn't the hack.

If only half of the following proved true in context and it's a matter of public record, that makes the argument to stop funding for Ukraine immediately barring an investigation of high crimes by Ukrainian Diaspora, Democrat, and Republican leaders in Congress, private Intel for hire, and Ukrainian Intel's attacks on the US government and political processes.

Perhaps it's time Donald J. Trump @realDonaldTrump should consider treason investigations across the board. Make America great again by bringing justice and civility back.

DNC Hack – High Crimes or Misdemeanors?

So what went on at the DNC way back in 2016? Do you know? Was it a hack or a leak? Does it matter?

Recently, an investigative journalist who writes under the name Adam Carter was raked over the coals. Carter writes at Disobedient Media and has been providing a lot of evidence supporting the DNC leak story former Ambassador Craig Murray and Wikileaks claim happened.

When the smear article came out and apparently it's blossoming into a campaign, a few people that read both of us wrote to the effect "looks like your work is the only thing left standing." I immediately rebuffed the idea and said Carter's work stands on its own . It has nothing to do with anything I've written, researched, or plan to.

I'd say the same about Scott Humor , Lee Stranahan , Garland Nixon , Petri Krohn , or Steve McIntyre . And there are many others. There has been a lot of good work on the DNC hacks and 2016 election interference. Oftentimes, what looks like contradictory information is complimentary because what each journalist is working on shows the story from a different angle.

https://www.youtube-nocookie.com/embed/q9W3QsO75mM?rel=0&showinfo=0

There are a lot of moving parts to the story and even a small change in focus brings an entirely new story because it comes from a different direction.

Here's what I mean. If the DNC hack was really a leak, does that kill the "hack" story? No, it doesn't and I blame a lot of activist journalists for making the assumption that it has to work this way. If Seth Rich gave Ambassador Craig Murray a USB stick with all the "hacked info," it doesn't change an iota of what I've written and the evidence you are about to read stands on its own. But, this has divided people into camps before the whole situation could be scrutinized and that's still not done yet.

If for example you have a leak on Jan 5th , can you have "a hack" on Jan 6th , 7th, or 8th? Since there is so much crap surrounding the supposed hack such as law enforcement teams never examining the DNC server or maintaining control of it as evidence, could the hacks have been a cover-up?

Hang em' High

According to Obama the hacks continued until September 2016. According to ABC, Donna Brazile says the hacks didn't stop until after the elections in 2016. According to Crowdstrike the hacks continued into November.

Democratic National Committee Chair Donna Brazile said Russian hackers persisted in trying to break into the organization's computers "daily, hourly" until after the election -- contradicting President Obama's assertion that the hacking stopped in September after he warned Russian President Vladimir Putin to "cut it out."-ABC

This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney, the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best.

https://www.youtube-nocookie.com/embed/L3cDZU9Tp7w?rel=0&showinfo=0

The DNC fiasco isn't that important of a crime. The reason I say this is the FBI would have taken control over material evidence right away. No law enforcement agency or Intel agency ever did. This means none of them considered it a crime Comey should have any part of investigating. That by itself presents the one question mark which destroys any hope Mueller has proving law enforcement maintained a chain of custody for any evidence he introduces.

It also says the US government under Barrack Obama and the victimized DNC saw this as a purely political event. They didn't want this prosecuted or they didn't think it was prosecutable.

Once proven it shows a degree of criminality that makes treason almost too light a charge in federal court. Rest assured this isn't a partisan accusation. Team Clinton and the DNC gets the spotlight but there are Republicans involved.

Identifying Team Fancy Bear

There are a couple of caveats that need to be made when identifying the Fancy Bear hackers . The first is the identifier used by Mueller as Russian FSB and GRU may have been true- 10 years ago. This group was on the run trying to stay a step ahead of Russian law enforcement until October 2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and possibly former Russian state security. The majority of the group are Ukrainians making up Ukraine's Cyber Warfare groups.

Identifying the hackers as FSB or GRU today is as helpful and has the same validity as identifying Special Prosecutor Mueller as a cashier at McDonalds because he worked there during school. It's insulting and self-defeating, so stop it.

How Mueller is Making a Russian Attribution for the DNC Hackers

If you look at the attribution section for the Tallinn Manual 2.0 on the International Law Applicable to Cyber and specifically the section that deals with peacetime attributions of a non-state actor/ hacker we have an answer.

The hackers, OSINT, Cyber, spies, terrorists, etc call themselves volunteers to keep safe from State level retaliation, even though a child can follow the money. As volunteers motivated by politics and patriotism they are protected to a degree from retribution.

They don't claim State sponsorship or governance and the level of attack falls below the threshold of military action. Mueller has a lot of latitude for making the attribution Russian, even though the attacks came from Ukrainian Intel. Based on how the rules are written, because the few members of the coalition from Shaltai Boltai are Russian in nationality, Fancy Bear can be attributed as a Russian entity for the purposes of retribution. The caveat is if the attribution is proven wrong, the US will be liable for damages caused to the State which in this case is Russia.

How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they have the ability to research and work in over 30 different languages.

This can be considered an Information Operation against the people of the United States and of course Russia. We'll get to why shortly.

After 2013, Shaltay Boltay was no longer physically available to work for Russia . The Russian hackers were in Ukraine working for the Ukrainian government's Information Ministry which is in charge of the cyber war. They were in Ukraine until October 2016 when they were tricked to return to Moscow and promptly arrested for treason.

From all this information we know the Russian component of Team Fancy Bear is Shaltai Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian Intelligence. We know they are grouped with InformNapalm which is Ukraine's OSINT unit. We know their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above work directly with the Atlantic Council and Crowdstrike's Dimitry Alperovich.

In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged data from the Surkov leak.

But during 2014,2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and CyberHunta went to work for the DNC as opposition researchers.

The First Time Shaltai Boltai was Handed the Keys to US Gov Servers

The setup to this happened long before the partnership with Ukrainian Intel hackers and Russia's Shaltai Boltai was forged. The hack that gained access to US top-secret servers happened just after the partnership was cemented after Euro-Maidan.

In August 2009 Hillary Clinton's Deputy Chief of Staff at the State Department Huma Abedin sent the passwords to her Government laptop to her Yahoo mail account. On August 16, 2010, Abedin received an email titled "Re: Your yahoo account. We can see where this is going, can't we?

"After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin's associates to access email accounts into 2015 and 2016."

Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo hack.

The time frame has to be noted. The hack happened in 2014. Access to the email accounts continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai Boltai was working from Kiev, Ukraine.

So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with looking at the time frame. Ukraine had the keys already in hand in 2014.

The DNC's Team Fancy Bear

The "Fancy Bear hackers" may have been given the passwords to get into the servers at the DNC because they were part of the Team Clinton opposition research team. It was part of their job. Let that concept settle in for a moment.

According to Politico "In an interview this month, Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists , government officials and private intelligence operatives . While her consulting work at the DNC this past election cycle centered on mobilizing ethnic communities -- including Ukrainian-Americans -- she said that, when Trump's unlikely presidential campaign began surging in late 2015, she began focusing more on the research, and expanded it to include Trump's ties to Russia, as well ."

me title=

The only investigative journalists, government officials, and private intelligence operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and the Ministry of Information.

All of these hacking and information operation groups work for Andrea Chalupa with EuroMaidanPR and Irena Chalupa at the Atlantic Council . Both C halupa sisters work directly with the Ukrainian government's Intel and propaganda arms.

Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage, terrorist, counter-terrorism, cyber, propaganda, and info war channels officially recognized and directed by Ukraine's Information Ministry. Along with their American colleagues, they populate the hit-for-hire website Myrotvorets with people who stand against Ukraine's criminal activities.

Alexandra Chalupa hired this particular hacking terrorist group called Fancy Bear by Dimitry Alperovich and Crowdstrike at the latest in 2015. While the Ukrainian hackers worked for the DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the state of the projects they were working on. Let's face it, once you're in, setting up your Fancy Bear toolkit doesn't get any easier. This is why I said the DNC hack isn't the big crime. It's a big con and all the parties were in on it.

Indict Team Clinton for the DNC Hacks and RNC Hack

Hillary Clinton exposed secrets to hacking threats by using private email instead of secured servers. Given the information provided she was probably being monitored by our intrepid Ruskie-Ukie union made in hell hackers. Anthony Weiner exposed himself and his wife Huma Abedin using Weiner's computer for top-secret State Department emails. And of course Huma Abedin exposed herself along with her top-secret passwords at Yahoo and it looks like the hackers the DNC hired to do opposition research hacked her.

Here's a question. Did Huma Abedin have Hillary Clinton's passwords for her private email server? It would seem logical given her position with Clinton at the State Department and afterward. This means that Hillary Clinton and the US government top secret servers were most likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using legitimate passwords.

The RNC Hack

According to the Washington Post , "Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach."

In January 2017 , criminal proceedings started for Edward Nedelyaev under articles 335 'spying' and 343

'inciting hatred or enmity." He was a member of the Aidar battalion. Aidar members have been cited for torture and murder. Although the translation isn't available on the linked video the MGB (LNR equivalent to the FBI) ask Aidar's Nedelyaev about his relationship with Ukraine's SBU. The SBU asked him to hack US presidential candidate Donald Trump's election headquarters and he refused. Asked if this was through convictions, he says no, explaining that he is not a hacker. The video was published on January 10, 2017 .

Taken at face value it really does show the ineptness of the SBU after 2014. This is why Ukraine relied (s) on the Diaspora financed Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, RUH8, Bellingcat, Webradius, InformNapalm and associated parties.

The Ukrainians were hired to get the goods on Trump. Part of that is knowing where to start isn't it?

Fancy Bear's Second Chance at Top Secret Passwords From Team Clinton

How stupid would the Fancy Bear teams of Shaltai Boltai, CyberHunta, Ukrainian Cyber Alliance, and RUH8 be if they had access to the DNC servers which makes it easier to get into the US State servers and not do that if it was their goal?

One very successful method of hacking is called social engineering. You gain access to the office space and any related properties and physically locate the passwords or clues to get you into the hardware you want to hack. This includes something as simple as looking over the shoulder of the person typing in passwords.

Let's be clear. The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC opposition research. On different occasions, Fancy Bear handler Kristina Dobrovolska traveled to the US to meet the Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea Chalupa, US Dept of State personnel, and most likely Crowdstrike's Dimitry Alperovich. Alperovich was working with the hackers in 2015-16. In 2016, the only groups known to have Fancy Bear's signature tools called X-tunnel and X-Agent were Alperovich, Crowdstrike, and Fancy Bear (Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does explain a few things.

Here is where it goes from bad to outright Fancy Bear ugly. Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former staff for research purposes from 2013 through prepping for the 2016 election. Were any foreigners part of the opposition research team for Team Hillary in 2014-2015-2016? The Clinton's don't have a history of vetting security issues well.

Let's recap. Clinton keeps 6 top secret passwords for research staff. Alexandra Chalupa is running a research department that is rich in (foreign) Ukrainian Intelligence operatives, hackers, terrorists, and a couple Ruskie traitors.

Kristina Dobrovolska was acting as a handler and translator for the US State Department in 2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to Washington to meet with Chalupa.

Alexandra types in her password to show Dobrovolska something she found and her eager to please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the Fancy Bear crew about it and they immediately get to work looking for Trump material on the US secret servers with legitimate access. I mean, what else could they do with this? Turn over sensitive information to the ever corrupt Ukrainian government?

According to the Politico article , Alexandra Chalupa was meeting with the Ukrainian embassy in June of 2016 to discuss getting more help sticking it to candidate Trump. At the same time she was meeting, the embassy had a reception that highlighted female Ukrainian leaders.

Four Verkhovna Rada deputies there for the event included: Viktoriia Y. Ptashnyk, Anna A. Romanova, Alyona I. Shkrum, and Taras T. Pastukh.

According to CNN, DNC sources said Chalupa told DNC operatives the Ukrainian government would be willing to deliver damaging information against Trump's campaign . Later, Chalupa would lead the charge to try to unseat president-elect Trump starting on Nov 10, 2016.

Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison and translator who escorted the delegates from Kyiv during their visits to Albany and Washington.

Kristina Dobrovolska is the handler manager working with Ukraine's DNC Fancy Bear Hackers . She took the Rada members to dinner to meet Joel Harding who designed Ukraine's infamous Information Policy which opened up their kill-for-hire-website Myrotvorets. Then she took them to meet the Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the surviving nephew to the infamous torturer The WWII OUNb leader, Mykola Lebed.

The Podesta Hack – Don't Mess with OUNb Parkhomenko

I have no interest in reviewing his history except for a few points. Adam Parkhomenko, a Diaspora Ukrainian nationalist almost gained a position in the presumed Clinton White House. As a Ukrainian nationalist, his first loyalty, like any other Ukrainian nationalist, is to a fascist model of Ukraine which Stepan Bandera devised but with a win it would be in America.

During the 2016 primaries, it was Parkhomenko who accused Bernie Sanders of working for Vladimir Putin. Parkhomenko has never really had a job outside the Clinton campaign.

Adam Parkhomenko <img src="https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11.png" alt="Adam Parkhomenko" width="355" height="454" srcset="https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11.png 355w, https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11-235x300.png 235w" sizes="(max-width: 355px) 100vw, 355px" /> Before Clinton declared her candidacy, Parkhomenko started a PAC for Hillary Clinton with the goal of getting millions of people email lists so the support was ready for a Clinton run. After she declared her candidacy, Robby Mook, Hillary's campaign manager decided to sideline Parkhomenko and didn't take on his full staff as promised. He reduced Parkomenko to a quiet menial position when he was brought onboard.

Ultimately, Podesta became responsible for this because he gave Parkhomenko assurances that his staff would be brought on and there would be no gaps in their paycheck. Many of them including Parkhomenko's family moved to Brooklyn. And of course, that didn't happen. Podesta was hacked in March and the Ukrainian nationalist Adam Parkhomenko was hired April 1st .

Today, Parkhomenko is working as a #DigitalSherlock with the Atlantic Council along with the Fancy Bear hackers and many of the people associated with them. Why could this be a revenge hack?

The Ukrainian Intel hackers are Pravy Sektor Ukrainian nationalists. Alexandra Chalupa is also an OUNb Bandera Ukrainian nationalist. This Ukrainian nationalist was on his way to becoming one of the most powerful people in America. That's why.

The DNC Leak- A Patriotic Act

At the same time her aides were creating "loyalty scores ", Clinton, "instructed a trusted aide to access the campaign's server and download the messages sent and received by top staffers. She believed her campaign had failed her -- not the other way around -- and she wanted 'to see who was talking to who, who was leaking to who.2'" After personally reading the email correspondence of her staffers, she called them into interviews for the 2016 campaign, where she confronted them with some of the revelations."-

Forget about the DNC. The hackers may have spent months surfing the US secret servers downloading and delivering top secret diplomatic files to their own government. The people entrusted with this weren't just sloppy with security, this is beyond treason.

It doesn't matter if it was Seth Rich, though I hope it was ( for identification's sake), who downloaded data from the DNC servers. The reasons supporting a leak are described by the Veteran Intelligence Professionals for Sanity (VIPS). This shows clearly why the leak to Wikileaks is much more plausible than a hack for the files taken in what is commonly called the DNC hack. This leak was one "hack" of many that was going on.

Imagine being this person inside the situations described above with the reality hitting you that things were very wrong. Even if they only saw parts of it, how much is too much? US government secrets were being accessed and we know this because the passwords were given out to the research teams the hackers were on.

It is very possible that giving the files to Wikileaks was the only safe way to be a whistleblower with a Democrat president supporting Team Hillary even as Team Hillary was cannibalizing itself. For detail on how the leak happened, refer to Adam Carter at DisobedientMedia.com and the VIPS themselves.

Today, this isn't a Democrat problem. It could just as easily been an establishment Republican.

Ukraine needs to pay for what their Intel Operators/ hackers have done. Stop funding Ukraine other than verifiable humanitarian aid. Call your Congressional Rep.

Next up – We are going to look at who has oversight over this operation and who's footing the bills.

Over the last 4 years, I've researched and written many stories that are still breaking in media today. Over the past 7 months we:

If you want to support investigative research with a lot of depth, please support my Patreon page. You can also support my work through PayPal as we expand in new directions over the coming year. For the last 4 years, it's been almost entirely self-supportive effort which is something when you consider I live in Donbass.

Top Photo | Former Democratic National Committee chair Donna Brazile holds a copy of her book Hacks, detailing the hacking of the DNC, during a meeting of The Commonwealth Club, Nov. 9, 2017, in San Francisco. Marcio Jose Sanchez | AP

George Eliason is an American journalist that lives and works in Donbass. He has been interviewed by and provided analysis for RT, the BBC, and Press-TV. His articles have been published in the Security Assistance Monitor, Washingtons Blog, OpedNews, the Saker, RT, Global Research, and RINF, and the Greanville Post among others. He has been cited and republished by various academic blogs including Defending History, Michael Hudson, SWEDHR, Counterpunch, the Justice Integrity Project, among others.

Republish our stories! MintPress News is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 International License.

[Nov 28, 2019] Guccifer 2.0 certainly didn't make a genuine effort to "conceal a Russian identity," far from it

Nov 28, 2019 | www.reddit.com

Posted by u/PropagandaBot1 1 day ago

Guccifer 2.0 certainly didn't make a genuine effort to "conceal a Russian identity," far from it.

The persona made decisions that would leave behind a demonstrable trail of Russian-themed breadcrumbs, examples include: US politics (domestic)

PropagandaBot1 -1 points · 1 day ago

http://www.softpanorama.org/Skeptics/Political_skeptic/Neocons/Hillary/guccifer20_false_flag_operation.shtml

[Nov 28, 2019] WSJ story reopens the claim Comey had a report there was an email exchange between Loretta Lynch and Clinton claiming Lynch promised her the DOJ would go easy on Clinton.

Highly recommended!
Notable quotes:
"... does the author think this alleged Lynch-Clinton campaign exchange will be part of the upcoming Horowitz report? ..."
Nov 28, 2019 | turcopolier.typepad.com

Factotum , 27 November 2019 at 11:57 AM

WSJ columnist today raises an old obscure issue today about the Clinton emails and Comey's calculated exoneration of Clinton's culpability.

This story reopens the claim Comey had a report there was an email exchange between Loretta Lynch and Clinton claiming Lynch promised her the DOJ would go easy on Clinton. Comey claimed when confronted with this memo, Lynch merely smiled like the Cheshire cat and nothing more was done.

This memo was later discredited as an alleged planted Russian hoax. Yet the memo story is again put in lead position on the opinion pages of the WSJ this very morning. Why was that? Not clear, but does the author think this alleged Lynch-Clinton campaign exchange will be part of the upcoming Horowitz report?

(WSJ: 11/27/19 - Holman Jenkins, Jr. - "Who will turn over the 2016 rocks")

[Nov 27, 2019] Inside Hillary Clinton s Secret Takeover of the DNC

Notable quotes:
"... I told Bernie I had found Hillary's Joint Fundraising Agreement. I explained that the cancer was that she had exerted this control of the party long before she became its nominee. Had I known this, I never would have accepted the interim chair position, but here we were with only weeks before the election. ..."
Nov 27, 2019 | www.politico.com

Donna Brazile is the former interim chair of the Democratic National Committee. Excerpted from the book Hacks: The Inside Story of the Break-ins and Breakdowns that Put Donald Trump in the White House to be published on November 7, 2017 by Hachette Books, a division of Hachette Book Group. Copyright 2017 Donna Brazile.

Before I called Bernie Sanders, I lit a candle in my living room and put on some gospel music. I wanted to center myself for what I knew would be an emotional phone call.

I had promised Bernie when I took the helm of the Democratic National Committee after the convention that I would get to the bottom of whether Hillary Clinton's team had rigged the nomination process, as a cache of emails stolen by Russian hackers and posted online had suggested. I'd had my suspicions from the moment I walked in the door of the DNC a month or so earlier, based on the leaked emails. But who knew if some of them might have been forged? I needed to have solid proof, and so did Bernie.

So I followed the money. My predecessor, Florida Rep. Debbie Wasserman Schultz, had not been the most active chair in fundraising at a time when President Barack Obama's neglect had left the party in significant debt. As Hillary's campaign gained momentum, she resolved the party's debt and put it on a starvation diet. It had become dependent on her campaign for survival, for which she expected to wield control of its operations.

Debbie was not a good manager. She hadn't been very interested in controlling the party -- she let Clinton's headquarters in Brooklyn do as it desired so she didn't have to inform the party officers how bad the situation was. How much control Brooklyn had and for how long was still something I had been trying to uncover for the last few weeks.

By September 7, the day I called Bernie, I had found my proof and it broke my heart.

***

The Saturday morning after the convention in July, I called Gary Gensler, the chief financial officer of Hillary's campaign. He wasted no words. He told me the Democratic Party was broke and $2 million in debt.

"What?" I screamed. "I am an officer of the party and they've been telling us everything is fine and they were raising money with no problems."

That wasn't true, he said. Officials from Hillary's campaign had taken a look at the DNC's books. Obama left the party $24 million in debt -- $15 million in bank debt and more than $8 million owed to vendors after the 2012 campaign -- and had been paying that off very slowly. Obama's campaign was not scheduled to pay it off until 2016. Hillary for America (the campaign) and the Hillary Victory Fund (its joint fundraising vehicle with the DNC) had taken care of 80 percent of the remaining debt in 2016, about $10 million, and had placed the party on an allowance.

If I didn't know about this, I assumed that none of the other officers knew about it, either. That was just Debbie's way. In my experience she didn't come to the officers of the DNC for advice and counsel. She seemed to make decisions on her own and let us know at the last minute what she had decided, as she had done when she told us about the hacking only minutes before the Washington Post broke the news.

The Friday On the phone Gary told me the DNC had needed a $2 million loan, which the campaign had arranged.

"No! That can't be true!" I said. "The party cannot take out a loan without the unanimous agreement of all of the officers."

"Gary, how did they do this without me knowing?" I asked. "I don't know how Debbie relates to the officers," Gary said. He described the party as fully under the control of Hillary's campaign, which seemed to confirm the suspicions of the Bernie camp. The campaign had the DNC on life support, giving it money every month to meet its basic expenses, while the campaign was using the party as a fund-raising clearinghouse. Under FEC law, an individual can contribute a maximum of $2,700 directly to a presidential campaign. But the limits are much higher for contributions to state parties and a party's national committee.

Individuals who had maxed out their $2,700 contribution limit to the campaign could write an additional check for $353,400 to the Hillary Victory Fund -- that figure represented $10,000 to each of the 32 states' parties who were part of the Victory Fund agreement -- $320,000 -- and $33,400 to the DNC. The money would be deposited in the states first, and transferred to the DNC shortly after that. Money in the battleground states usually stayed in that state, but all the other states funneled that money directly to the DNC, which quickly transferred the money to Brooklyn.

"Wait," I said. "That victory fund was supposed to be for whoever was the nominee, and the state party races. You're telling me that Hillary has been controlling it since before she got the nomination?"

Gary said the campaign had to do it or the party would collapse.

"That was the deal that Robby struck with Debbie," he explained, referring to campaign manager Robby Mook. "It was to sustain the DNC. We sent the party nearly $20 million from September until the convention, and more to prepare for the election."

"What's the burn rate, Gary?" I asked. "How much money do we need every month to fund the party?"

The burn rate was $3.5 million to $4 million a month, he said.

I gasped. I had a pretty good sense of the DNC's operations after having served as interim chair five years earlier. Back then the monthly expenses were half that. What had happened? The party chair usually shrinks the staff between presidential election campaigns, but Debbie had chosen not to do that. She had stuck lots of consultants on the DNC payroll, and Obama's consultants were being financed by the DNC, too.

When we hung up, I was livid. Not at Gary, but at this mess I had inherited. I knew that Debbie had outsourced a lot of the management of the party and had not been the greatest at fundraising. I would not be that kind of chair, even if I was only an interim chair. Did they think I would just be a surrogate for them, get on the road and rouse up the crowds? I was going to manage this party the best I could and try to make it better, even if Brooklyn did not like this. It would be weeks before I would fully understand the financial shenanigans that were keeping the party on life support.

***

Right around the time of the convention , the leaked emails revealed Hillary's campaign was grabbing money from the state parties for its own purposes, leaving the states with very little to support down-ballot races. A Politico story published on May 2, 2016 , described the big fund-raising vehicle she had launched through the states the summer before, quoting a vow she had made to rebuild "the party from the ground up when our state parties are strong, we win. That's what will happen."

Yet the states kept less than half of 1 percent of the $82 million they had amassed from the extravagant fund-raisers Hillary's campaign was holding, just as Gary had described to me when he and I talked in August. When the Politico story described this arrangement as "essentially money laundering" for the Clinton campaign, Hillary's people were outraged at being accused of doing something shady. Bernie's people were angry for their own reasons, saying this was part of a calculated strategy to throw the nomination to Hillary.

I wanted to believe Hillary, who made campaign finance reform part of her platform, but I had made this pledge to Bernie and did not want to disappoint him. I kept asking the party lawyers and the DNC staff to show me the agreements that the party had made for sharing the money they raised, but there was a lot of shuffling of feet and looking the other way.

When I got back from a vacation in Martha's Vineyard, I at last found the document that described it all: the Joint Fund-Raising Agreement between the DNC, the Hillary Victory Fund, and Hillary for America.

The agreement -- signed by Amy Dacey, the former CEO of the DNC, and Robby Mook with a copy to Marc Elias -- specified that in exchange for raising money and investing in the DNC, Hillary would control the party's finances, strategy, and all the money raised. Her campaign had the right of refusal of who would be the party communications director, and it would make final decisions on all the other staff. The DNC also was required to consult with the campaign about all other staffing, budgeting, data, analytics, and mailings.

I had been wondering why it was that I couldn't write a press release without passing it by Brooklyn. Well, here was the answer.

When the party chooses the nominee, the custom is that the candidate's team starts to exercise more control over the party. If the party has an incumbent candidate, as was the case with Clinton in 1996 or Obama in 2012, this kind of arrangement is seamless because the party already is under the control of the president. When you have an open contest without an incumbent and competitive primaries, the party comes under the candidate's control only after the nominee is certain. When I was manager of Al Gore's campaign in 2000, we started inserting our people into the DNC in June. This victory fund agreement, however, had been signed in August 2015, just four months after Hillary announced her candidacy and nearly a year before she officially had the nomination.

I had tried to search out any other evidence of internal corruption that would show that the DNC was rigging the system to throw the primary to Hillary, but I could not find any in party affairs or among the staff. I had gone department by department, investigating individual conduct for evidence of skewed decisions, and I was happy to see that I had found none. Then I found this agreement.

The funding arrangement with HFA and the victory fund agreement was not illegal, but it sure looked unethical. If the fight had been fair, one campaign would not have control of the party before the voters had decided which one they wanted to lead. This was not a criminal act, but as I saw it, it compromised the party's integrity.

***

I had to keep my promise to Bernie . I was in agony as I dialed him. Keeping this secret was against everything that I stood for, all that I valued as a woman and as a public servant.

"Hello, senator. I've completed my review of the DNC and I did find the cancer," I said. "But I will not kill the patient."

I discussed the fundraising agreement that each of the candidates had signed. Bernie was familiar with it, but he and his staff ignored it. They had their own way of raising money through small donations. I described how Hillary's campaign had taken it another step.

I told Bernie I had found Hillary's Joint Fundraising Agreement. I explained that the cancer was that she had exerted this control of the party long before she became its nominee. Had I known this, I never would have accepted the interim chair position, but here we were with only weeks before the election.

Bernie took this stoically. He did not yell or express outrage. Instead he asked me what I thought Hillary's chances were. The polls were unanimous in her winning but what, he wanted to know, was my own assessment?

I had to be frank with him. I did not trust the polls, I said. I told him I had visited states around the country and I found a lack of enthusiasm for her everywhere. I was concerned about the Obama coalition and about millennials.

I urged Bernie to work as hard as he could to bring his supporters into the fold with Hillary, and to campaign with all the heart and hope he could muster. He might find some of her positions too centrist, and her coziness with the financial elites distasteful, but he knew and I knew that the alternative was a person who would put the very future of the country in peril. I knew he heard me. I knew he agreed with me, but I never in my life had felt so tiny and powerless as I did making that call.

When I hung up the call to Bernie, I started to cry, not out of guilt, but out of anger. We would go forward. We had to.

[Nov 22, 2019] Will IG Horowitz Drop the Hammer on the FBI For FISA Abuse by Larry C Johnson - Sic Semper Tyrannis

Nov 22, 2019 | turcopolier.typepad.com

Will IG Horowitz Drop the Hammer on the FBI For FISA Abuse? by Larry C Johnson Larry Johnson-5x7

There is great impatience, even frustration, over the slow roll out of the results of Inspector General Horowitz's investigation of the FBI's use of FISA. From what we already know from the public record, there was clear abuse and even criminal conduct by former FBI Director Jim Comey and his Deputy, Andy McCabe. They claimed in a filing with the FISA court that the Steele Dossier was verified. Yet, Jim Comey subsequently testified under oath before Congress that the so-called Dossier was "unverified." Okay Jimmy, which is it?

We have some clues that Horowitz is not doing a whitewash. Reports last week, based in part on the whining of people reportedly linked to Comey and McCabe and others at the FBI and DOJ, stated that persons substantively discussed in the report were given the chance to review their portion of the report but they had to do so after signing a Non-Disclosure Agreement and were not permitted to submit written responses.

Then we have Attorney General Barr's speech last Friday to the Federalist Society. You can read the full transcript at The Conservative Treehouse . It is magnificent. Barr understands that there has been an attempted coup against the Presidency of Donald Trump. Here are some key excerpts:

As I have said, the Framers fully expected intense pulling and hauling between the Congress and the President. Unfortunately, just in the past few years, we have seen these conflicts take on an entirely new character.

Immediately after President Trump won election, opponents inaugurated what they called "The Resistance," and they rallied around an explicit strategy of using every tool and maneuver available to sabotage the functioning of his Administration. Now, "resistance" is the language used to describe insurgency against rule imposed by an occupying military power. It obviously connotes that the government is not legitimate. This is a very dangerous – indeed incendiary – notion to import into the politics of a democratic republic. What it means is that, instead of viewing themselves as the "loyal opposition," as opposing parties have done in the past, they essentially see themselves as engaged in a war to cripple, by any means necessary, a duly elected government.

A prime example of this is the Senate's unprecedented abuse of the advice-and-consent process. The Senate is free to exercise that power to reject unqualified nominees, but that power was never intended to allow the Senate to systematically oppose and draw out the approval process for every appointee so as to prevent the President from building a functional government.

Yet that is precisely what the Senate minority has done from his very first days in office. As of September of this year, the Senate had been forced to invoke cloture on 236 Trump nominees -- each of those representing its own massive consumption of legislative time meant only to delay an inevitable confirmation. How many times was cloture invoked on nominees during President Obama's first term? 17 times. The Second President Bush's first term? Four times. It is reasonable to wonder whether a future President will actually be able to form a functioning administration if his or her party does not hold the Senate. . . .

The costs of this constant harassment are real. For example, we all understand that confidential communications and a private, internal deliberative process are essential for all of our branches of government to properly function. Congress and the Judiciary know this well, as both have taken great pains to shield their own internal communications from public inspection. There is no FOIA for Congress or the Courts. Yet Congress has happily created a regime that allows the public to seek whatever documents it wants from the Executive Branch at the same time that individual congressional committees spend their days trying to publicize the Executive's internal decisional process. That process cannot function properly if it is public, nor is it productive to have our government devoting enormous resources to squabbling about what becomes public and when, rather than doing the work of the people. . . .

One of the ironies of today is that those who oppose this President constantly accuse this Administration of "shredding" constitutional norms and waging a war on the rule of law. When I ask my friends on the other side, what exactly are you referring to? I get vacuous stares, followed by sputtering about the Travel Ban or some such thing. While the President has certainly thrown out the traditional Beltway playbook, he was upfront about that beforehand, and the people voted for him. What I am talking about today are fundamental constitutional precepts. The fact is that this Administration's policy initiatives and proposed rules, including the Travel Ban, have transgressed neither constitutional, nor traditional, norms, and have been amply supported by the law and patiently litigated through the Court system to vindication.

Indeed, measures undertaken by this Administration seem a bit tame when compared to some of the unprecedented steps taken by the Obama Administration's aggressive exercises of Executive power – such as, under its DACA program, refusing to enforce broad swathes of immigration law.

The fact of the matter is that, in waging a scorched earth, no-holds-barred war of "Resistance" against this Administration, it is the Left that is engaged in the systematic shredding of norms and the undermining of the rule of law. This highlights a basic disadvantage that conservatives have always had in contesting the political issues of the day. It was adverted to by the old, curmudgeonly Federalist, Fisher Ames, in an essay during the early years of the Republic.

Bill Barr's speech is a reminder that we still have men and women of integrity and wisdom battling in the public sphere to uphold the essence of our Republic. Barr's speech laid down a very clear marker of how he sees this battle for the soul of America. He is a man grounded in the law and committed to upholding it. He understands that justice must be blind and applied without bias if the fabric of this country is to remain intact.

We will know in the coming weeks if Barr delivers. I think he will. I have bet a bottle of fine bourbon with a wise hero of our Republic that high level people will be indicted. I hope for the sake of our country I am right. And if I am right, I am still going to buy that hero a bottle of fine bourbon.

Posted at 09:03 AM | Permalink

Reblog (0) Comments


Diana C , 19 November 2019 at 09:28 AM

Barr gives me hope that my grandchildren may grow up in a country that is still founded on the Constitution.
Barbara Ann , 19 November 2019 at 09:56 AM
Heroes of the Republic should drink together, come what may. I pray you are right LJ.
Bill H , 19 November 2019 at 09:56 AM
It was a fine speech, but it was made to a private audience and not reported to any significant degree by the media. I saw nothing in it to give me any hope that actual action will be taken against those who are participating in the coup against the properly elected president of this nation.
Cortes said in reply to Bill H ... , 19 November 2019 at 06:03 PM
The size of the forum seems less important to me than the quality of audience members.

Were the founders of the US Republic many? Were they insignificant people? Were they ignorant of their own faults and the likely faults of their interlocutors?

The reaction to Barr's comments will be telling in real time. Not TV or internet instant demand reaction time. Cattle are not the only creatures which have to ruminate, I think. The implications of Barr's remarks have to be digested by folks accustomed to being surrounded by lackeys.

h , 19 November 2019 at 10:08 AM
AG Barr's speech is definitely worth one's time to watch/listen or read. It's an excellent history lesson not to mention a kick in the radical Left's derriere.

It seems many in the alt news arena are placing bets on the IG's Report as well but I haven't seen a fine bottle of bourbon as the prize...very classy. If I were to place a bet my money would be on the IG fully exposing the entirety of this coup cooked up by Brennan (approved by Obama), simmered by Comey and team then carried out by the Resistance cadre.

It's unimaginable to believe Horowitz, let alone Barr, would whitewash or go half way when detailing such an extremely significant political event in our countries history. It's also impossible to right any of this mess without full disclosure which then must lead to holding accountable those who deliberately intended to harm this country and The President.

Here's to hoping Barr/Horowitz and team adhere to the DOJ/FBI's motto - Fidelity, Bravery, Integrity...

JerseyJeffersonian , 19 November 2019 at 11:04 AM
It was an impressive address. Hard to work up hope when so many parts of government that should ne helping are corrupted, though.
notlurking , 19 November 2019 at 12:38 PM
Hey Larry what fine bourbon do you recommend...
Larry Johnson -> notlurking... , 19 November 2019 at 12:48 PM
Pappy Van Winkle.
Jack said in reply to Larry Johnson ... , 19 November 2019 at 01:35 PM
An excellent choice, if you can get it.
Tidewater said in reply to Larry Johnson ... , 19 November 2019 at 02:25 PM
Pappy Van Winkle 23 year old 2016 750 ml $3,899.99

Wow! You guys are definitely playing hardball.

Barbara Ann said in reply to Tidewater... , 19 November 2019 at 03:43 PM
For what this bet represents - hopefully a first step towards saving the Republic, the stake seems wholly appropriate.
Tidewater said in reply to Barbara Ann... , 20 November 2019 at 04:56 PM
Yes, you are quite right. And very nicely put. I have had a grubby kind of adult life keeping one eye out for cheap, acceptable booze. So I emitted a kind of inadvertent Rorshach. Besides, I think the fiery, precious Kaintuck will be shared among a group of very smart, worldly wise, and hard old spooky guv'mint guys, sometime after Thanksgiving. Like a meeting of the Norwegian Resistance. To be a fly on the wall as to the toasts...
turcopolier -> Tidewater... , 19 November 2019 at 08:57 PM
tidewater
Why do you think the bet is with LJ?
Terry said in reply to turcopolier ... , 20 November 2019 at 06:41 AM
Altho multiple bets are possible, I agree with tidewater -

"I have a side bet with a friend. I no longer believe that the duopoly of parties in the US will indict anyone over the matter of this article.

I hope I lose the bet." pl (Nov 17 2019)

"I have bet a bottle of fine bourbon with a wise hero of our Republic that high level people will be indicted. " - LJ (Nov 19 2019)

I will be 78 on the 31st. I attribute my longevity to; the right genes. a robust outdoor life in youth, and a steady regime of cigars, bourbon and red meat. pl (May 25 2018)

However a commenter named Jack did once mention getting Pappy's for his birthday.


:-)


Jack said in reply to Terry... , 20 November 2019 at 12:20 PM
Terry,

I'm not a party to this bet.

However, your memory is correct, I did receive a bottle of Pappy's for my birthday some moons ago before it went cult. SWMBO paid $95 for it then. As you can see from Tidewater's comment the price has escalated significantly if you can even snag one from a retailer that can get an allocation from the wholesaler. It sure is a fine bourbon. Craft spirits have definitely pushed the envelope on quality and there are now many fine spirits available.

Tidewater said in reply to Terry... , 20 November 2019 at 04:59 PM
You 'multiple' covers you, but not me, and thanks for the comment. But it was a trap. Interesting, too.
Tidewater said in reply to turcopolier ... , 20 November 2019 at 04:32 PM
Sir,

Ah so!, as Mr. Moto would say. I see. "How do you know that?" A question oft asked in one of the past vocations, as I recall. Well, I didn't know, actually. Careless. (Was this a little lesson in close reading?) And there was one glitch in the profile that did puzzle me and should have been a caution. Though I was bedazzled by a lot of surprising insights into the amber which I knew as Rebel Yell or Virginia Gentleman (from A. Smith Bowman who I just found out had the first name of Abram) from the time that I never had hangovers, till the time that I did, when I had to give bourbon up, switch to Scotch, and then had to give that up too, move on to the grape, where I should have been to begin with. (Though it always took me three glasses of jug wine and a little gagging before I got right with it. And then one day the wine in the groceries, like the peanuts, and the cheese, got a lot better.)

It was the Kaintuck angle that I should have noticed. That was not in the profile as developed. Still the glitch could be overlooked as a kind of grunt-ish foible, maybe. Or would have to do with the more er rambunctious LJ than his SST pix indicates, or perhaps the old stomping grounds. Appropriately symbolic, too. Camp on the Watauga, Hannah's Cowpens, King's Mountain, the Presbyterian invention of the pew (to slide out of in a hurry), the origin of the Rangers, the steady Overhill militia at Guilford Court House with homemade rifles lined up on the lowest rail of the split rail fence. And bourbon went there with them, I think that is certain enough.

Still, what the profile suggested to me was that it should have been a bet about something, say, from the Haut Medoc, perhaps a bottle of Chateau Petrus from Pomerol (Bordeux) maybe about 2012, and not the 1945 (a new Mercedes), just something more reasonable I see knocked down at $2499.99 at one loci. Or a Domaine Leroy Chambertin Grand Cru Cote de Nuits (Burgundy) for $1400.00. That could be considered gruntish, too. Napoleon is said to have drunk Chambertin every day. If he wasn't allowed to get it shipped in to him on St. Helena it wasn't the intense humidity of the rainy island climate on the arsenic in the wallpaper that did for him. And that would be really perfidious. Though thinking about it, I can see his jailors finding the steady predictable arrival of the Chambertin by mail packet like from Chewy.com a good thing for one and all...

Maybe I am right about this one, though: Someone here has a bet with Mr. William Binney.

Could it be a bottle of wine?

English Outsider -> Tidewater... , 20 November 2019 at 08:06 PM

Napoleon either did a lot of entertaining on St Helena or he hit the bottle seriously hard. He had hogsheads of Constantia wine delivered from nearby Groot Constantia to the amount of thirty bottles a month. Other sources say two or three bottles a day. "A floral desert wine that, 200 years ago, was one of the most sought after of its day. Crates were shipped to the royal courts of Europe". (Alex Perry, "The Rift".)

They still make it -

https://www.kleinconstantia.com/our-wines/vin-de-constance

The sales pitch quotes Jane Austen as warranting its "healing powers on a disappointed heart" but I reckon those healing powers would have to be quite something to make up for that final cry of "La Garde Recule!"

I liked your alcoholic Odyssey above. May it long continue.

Tidewater said in reply to English Outsider ... , 21 November 2019 at 12:35 AM
For a bit there I thought Groot Constantia was an island near St. Helena that I had never heard of! I looked up Cape Town--Constantia on Wiki and got the picture. So the Dutch were making a good wine in Constantia by the mid-seventeenth century. Nineteen hundred miles seems to me not nearby, though I admit it is a routine passage for a sailing ship. Lot of sugar in a dessert wine. Thank you for your comments.

Did you ever hear the story that the Napoleon at St. Helena out there in the Atlantic off the Namibia coast was a double? The real Napoleon made his escape to the other St. Helena Island, in Beaufort County, South Carolina, according to Gullah legend.

English Outsider -> Tidewater... , 21 November 2019 at 12:36 PM

I doubt that on the grounds that if he'd made it to the States the US would now stretch from Siberia to Tierra del Fuego. A great captain, Napoleon, and had rotten luck at Waterloo. A damn close run thing indeed.

Trouble is he was also a complete bastard and very light on the touchy-feely stuff. You get that sort on the Continent every now and again so we have to go over regularly and sort them out. Gets to be a bore but Noblesse Oblige and all that.

Put that last in in case Vig, who may just possibly be LeaNder though the style's slightly different, wants some English Exceptionalism to knock.

On the drinks front I have to confess to being a complete fraud, from the viewpoint of the average SSTer with his or her well stocked cellar. At present I'm occupied with palming off some decidedly weird home brewed cider on unsuspecting guests. Not always successfully. My home brewed beer's OK though. Compares well with German beer, which is for me the Gold Standard. A decent Single Malt every now and again and that's about it.

So I can admire your Odyssey, and the recollections that go with it, but not emulate it.

JMH said in reply to Tidewater... , 20 November 2019 at 07:04 AM
Buffalo Trace is the poor man's Pappy's.

https://www.buffalotracedistillery.com/
https://www.buffalotracedistillery.com/brands/buffalo-trace
https://www.buffalotracedistillery.com/brands/van-winkle

Jack , 19 November 2019 at 12:41 PM
Larry

The proof will be in the pudding. It seems the IG report will be released after Thanksgiving. Considering the previous report that Horowitz issued where the executive summary said something similar to Comey's exoneration of Hillary, it will be interesting to see the tone of this report.

Barr made a fine speech but talk is cheap. What has he done to clean up his own department? Roger Stone was arrested by a SWAT team in a dramatic made for TV show and has now been convicted of lying. Why hasn't the same standard been applied to all the muckety mucks in DC?

Sbin , 19 November 2019 at 12:57 PM
All useless noise without real action.
Doubt Barr will do anything of substance.
English Outsider , 19 November 2019 at 02:47 PM
I don't think I've ever seen such an impressive overview of the constitutional background before. It applies to both sides of the Atlantic but more chance of it resulting in something concrete on yours. The video contains some interesting asides that are not in the printed transcript, in particular a reference to Trump's style of leadership and a dig at the convoluted legislation that sometimes emerges from Congress.


I was more interested in the constitutional implications of the lecture, but your article above poses the urgent question arising from it. AG Barr has nailed his colours to the mast and cleared the decks for action. Is that all, or will action follow?

Factotum , 19 November 2019 at 06:30 PM
Obama perfected Cloward-Pivens strategies to get what he wanted starting back in 2008.

Obama storm-troopers would over-whelm local elections offices flooding them the voter registration requests they knew included fake registrations, just in order to prevent proper vetting of each registrant which allowed a lot of fraudulent voters to get a free pass.

Cloward-Pivens is intended to overwhelm a system "legally" to render it ineffectual. They are doing the same now with "expanded" voting rights like vote-harvesting and same day registration.

Just one more part of the Democrats use of Saul Alinksy Rules for Radicals. Glad Barr pointed all of this intentionally obstructionist out in such direct and data backed terms. We indeed are a fragile republic - losing a shared ethical common denominator every day - diversity is not our strength - in fact, it exposes our endemic weaknesses the more we move from the Founders values into third world values.

edding , 19 November 2019 at 07:57 PM
Am guessing that win or lose a bottle of Jefferson's bourbon is destined for Col. Lang, correct?
turcopolier -> edding... , 19 November 2019 at 08:56 PM
edding

Why do you think that?

English Outsider -> turcopolier ... , 20 November 2019 at 09:12 AM

Probably. Colonel, that guess results from putting two and two together about a bet you also made a little while ago, the one you are hoping to lose. I wouldn't say that constitutes proof but there's definitely a smoking gun there.
J , 19 November 2019 at 08:39 PM
'If' the 'Establishment' [aka Deep state] decided to prosecute its own, it would have been setting a dangerous precedence for themselves, and I fear that is the reason for the slow, s-l-o-w roll out, instead of prompt arrest, jail, prosecute, and upon conviction they become Bubb'a shower soap.

I hate to say it, but I fear that the Colonel is right, nothing will be done with all this. It's all circus meant to distract us and get our hopes up.

akaPatience , 19 November 2019 at 09:42 PM
I hope you win your bet Larry. Without enforcement, what good are laws?

And I swear, if the malefactors get away with what they've done, at the very least I'll join others to march on Washington in protest. Wars aside, this is THE worst political scandal of my lifetime - a nightmare come true of the US government at its most corrupt and tyrannical.

[Nov 09, 2019] They're gettin' the old gang back together

Nov 09, 2019 | caucus99percent.com

lotlizard on Fri, 11/08/2019 - 1:12am

@on the cusp
Debbie Wasserman Schultz could come roaring back as House Appropriations Committee chair.

https://www.miamiherald.com/news/politics-government/article236811358.html

[Nov 07, 2019] Rigged Again Dems, Russia, The Delegitimization Of America s Democratic Process by Elizabeth Vos

Highly recommended!
Images removed.
Notable quotes:
"... The Clinton camp was hardly absent from social media during the 2016 race. The barely-legal activities of Clintonite David Brock were previously reported by this author to have included $2 million in funding for the creation of an online " troll army " under the name Shareblue. The LA Times described the project as meant to "to appear to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid and highly tactical." In other words, the effort attempted to create a false sense of consensus in support for the Clinton campaign. ..."
"... In terms of interference in the actual election process, the New York City Board of Elections was shown to have purged over one hundred thousand Democratic voters in Brooklyn from the rolls before the 2016 primary, a move that the Department of Justice found broke federal law . Despite this, no prosecution for the breach was ever attempted. ..."
"... In 2017, the Observer reported that the DNC's defense counsel argued against claims that the party defrauded Sanders' supporters by favoring Clinton, reasoning that Sanders' supporters knew the process was rigged. Again: instead of arguing that the primary was neutral and unbiased in accordance with its charter, the DNC's lawyers argued that it was the party's right to select candidates. ..."
"... The DNC defense counsel's argument throughout the course of the DNC fraud lawsuit doubled down repeatedly in defense of the party's right to favor one candidate over another, at one point actually claiming that such favoritism was protected by the First Amendment . ..."
"... The DNC's shameless defense of its own rigging disemboweled the most fundamental organs of the U.S. body politic. This no indication that the DNC will not resort to the same tactics in the 2020 primary race, ..."
"... f Debbie Wasserman Schultz's role as disgraced chairwoman of the DNC and her forced 2016 resignation wasn't enough, serious interference was also alleged in the wake of two contests between Wasserman Schultz and professor Tim Canova in Florida's 23rd congressional district. Canova and Wasserman Schultz first faced off in a 2016 Democratic primary race, followed by a 2018 general congressional election in which Canova ran as an independent. ..."
"... Debacles followed both contests, including improper vote counts, illegal ballot destruction , improper transportation of ballots, and generally shameless displays of cronyism. After the controversial results of the initial primary race against Wasserman Schultz, Canova sought to have ballots checked for irregularities, as the Sun-Sentinel reported at the time: ..."
"... Ultimately, Canova was granted a summary judgment against Snipes, finding that she had committed what amounted to multiple felonies. Nonetheless, Snipes was not prosecuted and remained elections supervisor through to the 2018 midterms. ..."
"... Hillary Clinton's recent comments to the effect that Congresswoman Tulsi Gabbard is being "groomed" by Russia, and that the former Green Party Presidential candidate Dr. Jill Stein is a "Russian asset", were soon echoed by DNC-friendly pundits. These sentiments externalize what Gabbard called the "rot" in the Democratic party outward onto domestic critics and a nation across the planet. ..."
"... Newsweek provided a particularly glaring example of this phenomenon in a recent op-ed penned by columnist Naveed Jamali, a former FBI double agent whose book capitalizes on Russiagate. In an op-ed titled: " Hillary Clinton Is Right. Tulsi Gabbard Is A Perfect Russian Asset – And Would Be A Perfect Republican Agent," ..."
Nov 07, 2019 | www.zerohedge.com

Authored by Elizabeth Vos via ConsortiumNews.com,

Establishment Democrats and those who amplify them continue to project blame for the public's doubt in the U.S. election process onto outside influence, despite the clear history of the party's subversion of election integrity. The total inability of the Democratic Party establishment's willingness to address even one of these critical failures does not give reason to hope that the nomination process in 2020 will be any less pre-ordained.

The Democratic Party's bias against Sen. Bernie Sanders during the 2016 presidential nomination, followed by the DNC defense counsel doubling down on its right to rig the race during the fraud lawsuit brought against the DNC , as well as the irregularities in the races between former DNC Chairwoman Debbie Wasserman Schultz and Tim Canova, indicate a fatal breakdown of the U.S. democratic process spearheaded by the Democratic Party establishment. Influences transcending the DNC add to concerns regarding the integrity of the democratic process that have nothing to do with Russia, but which will also likely impact outcomes in 2020.

The content of the DNC and Podesta emails published by WikiLeaks demonstrated that the DNC acted in favor of Hillary Clinton in the lead up to the 2016 Democratic primary. The emails also revealed corporate media reporters acting as surrogates of the DNC and its pro-Clinton agenda, going so far as to promote Donald Trump during the GOP primary process as a preferred " pied-piper candidate ." One cannot assume that similar evidence will be presented to the public in 2020, making it more important than ever to take stock of the unique lessons handed down to us by the 2016 race.

Social Media Meddling

Election meddling via social media did take place in 2016, though in a different guise and for a different cause from that which are best remembered. Twitter would eventually admit to actively suppressing hashtags referencing the DNC and Podesta emails in the run-up to the 2016 presidential election. Additional reports indicated that tech giant Google also showed measurable "pro-Hillary Clinton bias" in search results during 2016, resulting in the alleged swaying of between 2 and 10 millions voters in favor of Clinton.

On the Republican side, a recent episode of CNLive! featured discussion of the Cambridge Analytica scandal, in which undecided voters were micro-targeted with tailored advertising narrowed with the combined use of big data and artificial intelligence known collectively as "dark strategy." CNLive! Executive Producer Cathy Vogan noted that SCL, Cambridge Analytica's parent company, provides data, analytics and strategy to governments and military organizations "worldwide," specializing in behavior modification. Though Cambridge Analytica shut down in 2018, related companies remain.

The Clinton camp was hardly absent from social media during the 2016 race. The barely-legal activities of Clintonite David Brock were previously reported by this author to have included $2 million in funding for the creation of an online " troll army " under the name Shareblue. The LA Times described the project as meant to "to appear to be coming organically from people and their social media networks in a groundswell of activism, when in fact it is highly paid and highly tactical." In other words, the effort attempted to create a false sense of consensus in support for the Clinton campaign.

In terms of interference in the actual election process, the New York City Board of Elections was shown to have purged over one hundred thousand Democratic voters in Brooklyn from the rolls before the 2016 primary, a move that the Department of Justice found broke federal law . Despite this, no prosecution for the breach was ever attempted.

Though the purge was not explicitly found to have benefitted Clinton, the admission falls in line with allegations across the country that the Democratic primary was interfered with to the benefit of the former secretary of state. These claims were further bolstered by reports indicating that voting results from the 2016 Democratic primary showed evidence of fraud.

DNC Fraud Lawsuit

The proceedings of the DNC fraud lawsuit provide the most damning evidence of the failure of the U.S. election process, especially within the Democratic Party. DNC defense lawyers argued in open court for the party's right to appoint candidates at its own discretion, while simultaneously denying any "fiduciary duty" to represent the voters who donated to the Democratic Party under the impression that the DNC would act impartially towards the candidates involved.

In 2017, the Observer reported that the DNC's defense counsel argued against claims that the party defrauded Sanders' supporters by favoring Clinton, reasoning that Sanders' supporters knew the process was rigged. Again: instead of arguing that the primary was neutral and unbiased in accordance with its charter, the DNC's lawyers argued that it was the party's right to select candidates.

The Observer noted the sentiments of Jared Beck, the attorney representing the plaintiffs of the lawsuit:

"People paid money in reliance on the understanding that the primary elections for the Democratic nominee -- nominating process in 2016 were fair and impartial, and that's not just a bedrock assumption that we would assume just by virtue of the fact that we live in a democracy, and we assume that our elections are run in a fair and impartial manner. But that's what the Democratic National Committee's own charter says. It says it in black and white."

The DNC defense counsel's argument throughout the course of the DNC fraud lawsuit doubled down repeatedly in defense of the party's right to favor one candidate over another, at one point actually claiming that such favoritism was protected by the First Amendment . The DNC's lawyers wrote:

"To recognize any of the causes of action that Plaintiffs allege would run directly contrary to long-standing Supreme Court precedent recognizing the central and critical First Amendment rights enjoyed by political parties, especially when it comes to selecting the party's nominee for public office ." [Emphasis added]

The DNC's shameless defense of its own rigging disemboweled the most fundamental organs of the U.S. body politic. This no indication that the DNC will not resort to the same tactics in the 2020 primary race,

Tim Canova's Allegations

If Debbie Wasserman Schultz's role as disgraced chairwoman of the DNC and her forced 2016 resignation wasn't enough, serious interference was also alleged in the wake of two contests between Wasserman Schultz and professor Tim Canova in Florida's 23rd congressional district. Canova and Wasserman Schultz first faced off in a 2016 Democratic primary race, followed by a 2018 general congressional election in which Canova ran as an independent.

Debacles followed both contests, including improper vote counts, illegal ballot destruction , improper transportation of ballots, and generally shameless displays of cronyism. After the controversial results of the initial primary race against Wasserman Schultz, Canova sought to have ballots checked for irregularities, as the Sun-Sentinel reported at the time:

"[Canova] sought to look at the paper ballots in March 2017 and took Elections Supervisor Brenda Snipes to court three months later when her office hadn't fulfilled his request. Snipes approved the destruction of the ballots in September, signing a certification that said no court cases involving the ballots were pending."

Ultimately, Canova was granted a summary judgment against Snipes, finding that she had committed what amounted to multiple felonies. Nonetheless, Snipes was not prosecuted and remained elections supervisor through to the 2018 midterms.

Republicans appear no more motivated to protect voting integrity than the Democrats, with The Nation reporting that the GOP-controlled Senate blocked a bill this week that would have "mandated paper-ballot backups in case of election machine malfunctions."

Study of Corporate Power

A 2014 study published by Princeton University found that corporate power had usurped the voting rights of the public: "Economic elites and organized groups representing business interests have substantial independent impacts on U.S. government policy, while average citizens and mass-based interest groups have little or no independent influence."

In reviewing this sordid history, we see that the Democratic Party establishment has done everything in its power to disrespect voters and outright overrule them in the democratic primary process, defending their right to do so in the DNC fraud lawsuit. We've noted that interests transcending the DNC also represent escalating threats to election integrity as demonstrated in 2016.

Despite this, establishment Democrats and those who echo their views in the legacy press continue to deflect from their own wrongdoing and real threats to the election process by suggesting that mere discussion of it represents a campaign by Russia to attempt to malign the perception of the legitimacy of the U.S. democratic process.

Hillary Clinton's recent comments to the effect that Congresswoman Tulsi Gabbard is being "groomed" by Russia, and that the former Green Party Presidential candidate Dr. Jill Stein is a "Russian asset", were soon echoed by DNC-friendly pundits. These sentiments externalize what Gabbard called the "rot" in the Democratic party outward onto domestic critics and a nation across the planet.

Newsweek provided a particularly glaring example of this phenomenon in a recent op-ed penned by columnist Naveed Jamali, a former FBI double agent whose book capitalizes on Russiagate. In an op-ed titled: " Hillary Clinton Is Right. Tulsi Gabbard Is A Perfect Russian Asset – And Would Be A Perfect Republican Agent," Jamali argued :

"Moscow will use its skillful propaganda machine to prop up Gabbard and use her as a tool to delegitimize the democratic process. " [Emphasis added]

Jamali surmises that Russia intends to "attack" our democracy by undermining the domestic perception of its legitimacy. This thesis is repeated later in the piece when Jamali opines : "They want to see a retreat of American influence. What better way to accomplish that than to attack our democracy by casting doubt on the legitimacy of our elections." [Emphasis added]

The only thing worth protecting, according to Jamali and those who amplify his work (including former Clinton aide and establishment Democrat Neera Tanden), is the perception of the democratic process, not the actual functioning vitality of it. Such deflective tactics ensure that Russia will continue to be used as a convenient international pretext for silencing domestic dissent as we move into 2020.

Given all this, how can one expect the outcome of a 2020 Democratic Primary -- or even the general election – to be any fairer or transparent than 2016?

* * *

Elizabeth Vos is a freelance reporter, co-host of CN Live! and regular contributor to Consortium News. If you value this original article, please consider making a donation to Consortium News so we can bring you more stories like this one.

[Nov 07, 2019] DNC Lawyers Argue Primary Rigging Is Protected by the First Amendment

Notable quotes:
"... They also failed to note the voice-modulated phone calls received by the law offices of the Becks which contained a caller-ID corresponding to the law offices of Debbie Wasserman Schultz, a defendant in the case. In light of this context, the Becks hardly appear to be peddlers of conspiracy theory. ..."
Nov 07, 2019 | archive.is

The defense counsel also took issue with Jared Beck for what they termed as: " Repeatedly promoted patently false and deeply offensive conspiracy theories about the deaths of a former DNC staffer and Plaintiffs' process server in an attempt to bolster attention for this lawsuit." This author was shocked to find that despite the characterization of the Becks as peddlers of conspiracy theory, the defense counsel failed to mention the motion for protection filed by the Becks earlier in the litigation process.

They also failed to note the voice-modulated phone calls received by the law offices of the Becks which contained a caller-ID corresponding to the law offices of Debbie Wasserman Schultz, a defendant in the case. In light of this context, the Becks hardly appear to be peddlers of conspiracy theory.

The DNC defense lawyers then argued:

" There is no legitimate basis for this litigation, which is, at its most basic, an improper attempt to forge the federal courts into a political weapon to be used by individuals who are unhappy with how a political party selected its candidate in a presidential campaign ."

The brief continued:

" To recognize any of the causes of action that Plaintiffs allege based on their animating theory would run directly contrary to long-standing Supreme Court precedent recognizing the central and critical First Amendment rights enjoyed by political parties, especially when it comes to selecting the party's nominee for public office."

It appears that the defendants in the DNC Fraud Lawsuit are attempting to argue that cheating a candidate in the primary process is protected under the first amendment. If all that weren't enough, DNC representatives argued that the Democratic National Committee had no established fiduciary duty "to the Plaintiffs or the classes of donors and registered voters they seek to represent." It seems here that the DNC is arguing for its right to appoint candidates at its own discretion while simultaneously denying any "fiduciary duty" to represent the voters who donated to the Democratic Party under the belief that the DNC would act impartially towards the candidates involved.

Adding to the latest news regarding the DNC Fraud Lawsuit was the recent finding by the UK Supreme Court, which stated that Wikileaks Cables were admissible as evidence in legal proceedings.

If Wikileaks' publication of DNC emails are found to be similarly admissible in a United States court of law, then the contents of the leaked emails could be used to argue that, contrary to the defendant's latest brief, the DNC did in favor the campaign of Hillary Clinton over Senator Sanders and that they acted to sabotage Sanders' campaign.

The outcome of the appeal of the DNC Fraud Lawsuit remains to be seen.

Elizabeth Vos is the Co-Founder and Editor in Chief at Disobedient Media .

[Nov 03, 2019] Growing Indicators of Brennan's CIA Trump Task Force by Larry C Johnson - Sic Semper Tyrannis

Highly recommended!
Notable quotes:
"... The Task Force also could carry out other covert actions, such as information operations. A nice sounding euphemism for propaganda, and computer network operations. There has been some informed speculation that Guccifer 2.0 was a creation of this Task Force. ..."
Nov 03, 2019 | turcopolier.typepad.com

Growing Indicators of Brennan's CIA Trump Task Force by Larry C Johnson Larry Johnson-5x7

The average American has no idea how alarming is the news that former CIA Director John Brennan reportedly created and staffed a CIA Task Force in early 2016 that was named, Trump Task Force, and given the mission of spying on and carrying out covert actions against the campaign of candidate Donald Trump.

This was not a simple gathering of a small number of disgruntled Democrats working at the CIA who got together like a book club to grouse and complain about the brash real estate guy from New York. It was a specially designed covert action to try to destroy Donald Trump.

A "Task Force" is a special bureaucratic creation that provides a vehicle for bring case officers and analysts together, along with admin support, for a limited term project. But it also can be expanded to include personnel from other agencies, such as the FBI, DIA and NSA. Task Forces have been used since the inception of the CIA in 1947. Here's a recently declassified memo outlining the considerations in the creation of a task force in 1958. The author, L.K. White, talks about the need for a coordinating Headquarters element and an Operational unit "in the field", i.e. deployed around the world.

A Task Force operates independent of the CIA " Mission Centers " (that's the jargon for the current CIA organization chart).

So what did John Brennan do? I am told by an knowledgeable source that Brennan created a Trump Task Force in early 2016. It was an invitation only Task Force. Specific case officers (i.e., men and women who recruit and handle spies overseas), analysts and admin personnel were recruited. Not everyone invited accepted the offer. But many did.

This was not a CIA only operation. Personnel from the FBI also were assigned to the Task Force. We have some clues that Christopher Steele's FBi handler, Michael Gaeta, may have been detailed to the Trump Task Force ( see here ).

So what kind of things would this Task Force do? The case officers would work with foreign intelligence services such as MI-6, the Italians, the Ukrainians and the Australians on identifying intelligence collection priorities. Task Force members could task NSA to do targeted collection. They also would have the ability to engage in covert action, such as targeting George Papadopoulos. Joseph Mifsud may be able to shed light on the CIA officers who met with him, briefed on operational objectives regarding Papadopoulos and helped arrange monitored meetings. I think it is highly likely that the honey pot that met with George Papadopoulos, a woman named Azra Turk, was part of the CIA Trump Task Force.

The Task Force also could carry out other covert actions, such as information operations. A nice sounding euphemism for propaganda, and computer network operations. There has been some informed speculation that Guccifer 2.0 was a creation of this Task Force.

In light of what we have learned about the alleged CIA whistleblower, Eric Ciaramella, there should be a serious investigation to determine if he was a part of this Task Force or, at minimum, reporting to them.

When I described this to one friend, a retired CIA Chief of Station, his first response was, "My God, that's illegal." We then reminisced about another illegal operation carried out under the auspices of the CIA Central American Task Force back in the 1980s. That became known to Americans as the Iran Contra scandal.

I sure hope that John Durham and his team are looking at this angle. If true it marks a new and damning indictment of the corruption of the CIA. Rather than spying on genuine foreign threats, this Task Force played a critical role in creating and feeding the meme that Donald Trump was a tool of the Russians and a puppet of Putin.

[Sep 10, 2019] Being called a narcissist by Jim Comey is akin to being accused of having sex with underage girls by the late Jeffrey Epstein by Larry C Johnsons

Highly recommended!
Sep 04, 2019 | turcopolier.typepad.com

Diana C ,

"Being called a narcissist by Jim Comey is akin to being accused of having sex with underage girls by the late Jeffrey Epstein."

As usual, your analogy here is spot on. I'm still giggling.

[Jul 27, 2019] Understanding the Roots of the Obama Coup Against Trump by Larry C Johnson

Highly recommended!
Evidence accumulates that Obama was the real leader of this color revolution against Trump with Brannan as his chief lieutenant and Comey as a willing accomplice.
Now that the dust has settled, one must ask why the Deep State wanted Trump gone. Why does the Obama-Clinton mafia hates him so much? Is this due to Trump committed an unforgivable sin in suggesting we “get along with Russia” and thus potentially cut the revenues of military-industrial complex ? This is not true -- Trump inflated the Pentagon budget to astronomical height. Then why ?
Notable quotes:
"... The full details of the plot to take out Donald Trump remain to be revealed. But there should now be no doubt that his effort was not the work of a few rogue intelligence and law enforcement officials acting on their own. This was a full blown covert action undertaken with the full knowledge and blessing of Barack Obama. ..."
"... Operation Crossfire Hurricane was launched the end of July 2016. CIA Director John Brennan briefed key Democrat members of Congress in early August on allegations that Donald Trump was colluding with Vladimir Putin. And Peter Strzok traveled to London in early August 2016 to meet with the CIA and with Alexander Downer, who was claiming that George Papadopolous was talking up the Russians. Following that trip Strozk texted the following to his mistress, Lisa Page : ..."
"... We also know that Senior Obama Administration officials, such as NSC Director Susan Rice and UN Ambassdor Samantha Power, were pushing to "unmask" Trump campaign officials who were named in US intelligence documents. ..."
"... Let us look at this from another angle. If the Russians were actually trying to interfere in the 2016 election, then it was known to both US intelligence and law enforcement. Hell, we are told in the Mueller report that the FBI detected the Russians trying to hack the DNC way back in 2015. If there really was intelligence on Russian efforts to meddle why did the Obama Administration do nothing other than sanction FBI's Crossfire Hurricane? ..."
"... On what basis did Barack Obama insist it was impossible to rig the US Presidential election? This is a critical anomaly. Why was the Obama team asleep at the switch, especially on the intel front, it the Russians actually were engaged in rigging the election to install Donald Trump? ..."
"... Obama seemed to have got a taste for spying on his domestic political opponents from monitoring Israeli attempts to block the Iran nuclear deal. I think the lock her up stuff really scared the Obama people, who had much to hide. ..."
Jul 27, 2019 | turcopolier.typepad.com

The full details of the plot to take out Donald Trump remain to be revealed. But there should now be no doubt that his effort was not the work of a few rogue intelligence and law enforcement officials acting on their own. This was a full blown covert action undertaken with the full knowledge and blessing of Barack Obama.

As I have written previously , the claim that Russia tried to hijack our election is a damn lie. But you do not have to take my word for it. Just listen to Barack Obama speaking in October 2016 in response to Donald Trump's expressed concerns about election meddling :

"There is no serious person out there who would suggest that you could even rig America's elections, in part because they are so decentralized. There is no evidence that that has happened in the past, or that there are instances that that could happen this time," the president said to the future president in October 2016.

"Democracy survives because we recognize that there is something more important than any individual campaign, and that is making sure the integrity and trust in our institutions sustains itself. Becasue Democracy works by consent, not by force," Obama said.

"I have never seen in my lifetime or in modern political history, any presidential candidate trying to discredit the elections and the election process before votes have even taken place. It is unprecedented. It happens to be based on no fact. Every expert regardless of political party... who has ever examined these issues in a serious way will tell you that instances of significant voter fraud are not to be found. Keep in mind elections are run by state and local officials."

It is important to remember what had transpired in the Trump/Russia collusion case by this point. Operation Crossfire Hurricane was launched the end of July 2016. CIA Director John Brennan briefed key Democrat members of Congress in early August on allegations that Donald Trump was colluding with Vladimir Putin. And Peter Strzok traveled to London in early August 2016 to meet with the CIA and with Alexander Downer, who was claiming that George Papadopolous was talking up the Russians. Following that trip Strozk texted the following to his mistress, Lisa Page :

Strzok: And hi. Went well, best we could have expected. Other than [REDACTED] quote: " the White House is running this. " My answer, "well, maybe for you they are." And of course, I was planning on telling this guy, thanks for coming, we've got an hour, but with Bill [Priestap] there, I've got no control .

Page: Yeah, whatever (re the WH comment). We've got the emails that say otherwise.

The White House clearly knew. But Strzok's text is not the only evidence. We also know that Senior Obama Administration officials, such as NSC Director Susan Rice and UN Ambassdor Samantha Power, were pushing to "unmask" Trump campaign officials who were named in US intelligence documents.

There are only two possibilities:

  1. Obama was being briefed by Susan Rice and DNI James Clapper and CIA Director about the project to take out Trump, or
  2. Obama was kept in the dark.

Let us look at this from another angle. If the Russians were actually trying to interfere in the 2016 election, then it was known to both US intelligence and law enforcement. Hell, we are told in the Mueller report that the FBI detected the Russians trying to hack the DNC way back in 2015. If there really was intelligence on Russian efforts to meddle why did the Obama Administration do nothing other than sanction FBI's Crossfire Hurricane?

On what basis did Barack Obama insist it was impossible to rig the US Presidential election? This is a critical anomaly. Why was the Obama team asleep at the switch, especially on the intel front, it the Russians actually were engaged in rigging the election to install Donald Trump?


turcopolier , 26 July 2019 at 04:19 PM

All

My wife was for many years an election official in Virginia. IMO Obama was right in saying that a US presidential election is impossible to "rig." The US Constitution requires that federal elections be run by the states WITHOUT federal supervision. As a result the methods and equipment in the states and the various parts of the states vary widely and the state systems are not tied together with a national electronic network as, for example, the system is in France where the result of a national election is reported on TeeVee immediately when the polls close.

Bill H , 26 July 2019 at 04:51 PM
Asking the question, "Can you cite one specific case where a single vote was definitively changed by Russian meddling?" causes panic in a person who is declaiming about the evils of Russian meddling in our elections.
Alexandria , 26 July 2019 at 07:02 PM
Bill H,

When you ask that question, the invariable retort is that the Russians are so clever that you wouldn't know that you were being gulled; or, when I say that I have never seen a Russian produced facebook ad, the rejoinder is that the Russians concentrated on Pennsylvania, Wisconsin, Ohio and, of course, I would have been privy to the bot-sent emails and facebook ads generated by the Internet Research Agency.

Jack said in reply to The Twisted Genius ... , 27 July 2019 at 12:41 AM
TTG

You've maintained all along that the Russians interfered in the election, yet I believe it is your position that the Russians did not change a single vote. Is that correct or do you believe the Russians changed the votes before tabulation?

What did the Russians do that the Trump and Hillary campaigns did not do? Did they also turnout the tens of thousands who showed up for Trump rallies that Hillary could never muster? Are they still turning out thousands at recent Trump rallies? I'm curious how come Brennan and Clapper could not turn out thousands to Hillary's rallies when according to our German friend "b", the omnipotent US Intel services just turned out a quarter of the population of Hong Kong to protest CCP authoritarianism?

Did the Israeli, Saudi and Chinese governments interfere in the election? How would you compare what they did to what you believe the Russians did?

uieter about it. All that is very different from the absolute covert nature of the Russian IO in the 2016 election. I have no idea what China did or is doing.

Larry Johnson -> The Twisted Genius ... , 27 July 2019 at 11:36 AM
You have no evidence for the so-called Russian IO. It is a fabrication. The lies on this are enormous. If the FBI really had detected GRU hacking of the DNC in 2015, which is claimed in the fabricated meme, then you would expect the FBI and the other counter intel elements of the USG to take action. THEY DID NOTHING.

The issue of Russian hacking only emerged when Hillary and the DNC learned that DNC emails were going to be put out by WIKILEAKS. Again, not one shred of actual evidence that the Russians did it, but blaming the Russians became a convenient excuse in a bid to divert attention from the real story--i.e,. Hillary and the DNC colluded to defeat Bernie Sanders.

The only real solid evidence of colluding with foreigners, in this case the Ukraine, comes courtesy of Hillary and her campaign. Hiring a foreign intel officer (ie. Steele) who then takes info from Russians of questionable background and spread it around as "truth". That was not a Russian IO. Pure Clinton IO.

blue peacock said in reply to The Twisted Genius ... , 27 July 2019 at 12:29 PM
"What the Russians did was insert misattributed information and disinformation into the election cycle...That is what separates the Russian IO from anything Clinton, Trump or any of their supporters did."

I believe supporters of both candidates did exactly what you say the Russians did - insert misattributed information & disinformation into the media stream. If you watch MSNBC or Fox on any given day there is much assertion & opinion masquerading as news. And the Twitter & Facebook and blog universe are teeming with stories and innuendo that are more fiction than fact all from anonymous accounts.

The Russia Collusion hysteria is replete with examples of "misattributed information and disinformation". It seems that yellow journalism is as American as apple pie.

The whole opaque PAC structure with names like "Americans for Democracy" funded by chain structures hiding the real financiers and calling up down is something that we see growing in every election cycle and is already of significant scale both in terms of financing and dubiousness.

It is also rather common that "experts" who are called upon to opine on issues routinely never disclose their conflicts of interest. Jeffrey Sachs and so many others on the payroll of CCP entities never disclose those payments as they extoll the virtues of offshoring our industrial base to China and are apologists for CCP espionage.

The Twisted Genius -> blue peacock... , 27 July 2019 at 01:42 PM
Blue peacock, supporters of Clinton and Trump did not put out misattributed info. They both put out truth, innuendo, exaggerations, misleading info and even outright lies, but they put it out as themselves. They didn't represent themselves as someone other than who they were. The PAC structure comes close to skirting this requirement for truthful attribution, but a quick internet search blows away the facades of these PACs. What the Russians did was pure black propaganda.
Fred -> The Twisted Genius ... , 27 July 2019 at 09:23 AM
TTG,

You mean the kindly grandmother, Loretta Lynch, Attorney General of the United States, did not inform President Obama that the FBI had obtained a FISA warrant to surveil the Republican candidate for the presidency and members of his staff becasue he was working with Russians? Or do you mean that James Comey failed to tell his boss, Loretta Lynch; or do you mean John Brennan failed to tell Obama about that Steele dossier from Fusion GPS that Mueller know anything about; or do you mean that James Clapper failed to tell Jeh Johnson about that too? The Russians made them do all those things as part of an interference campaign, right? It couldn't have been they were corrupt and incompetant.

"Instead, Obama...." made an "If you like your doctor, you can keep you doctor" statement that he knew was completely false. Trump didn't win, Russians influenced Americans to vote for Trump, just ask the losers of the election, their paid sources and their colleagues in Congress. In fact Americans love Hilary so much she's just where in the polls right now?

catherine , 27 July 2019 at 12:20 AM
I continue to be astounded by the outrage at "Russian meddling". So some Russians used the internet to post true or false information on candidates in a election.... so what?...millions of American partisan trolls were doing the same thing for or against a candidate. We had tons of fake info written by American bloggers and posters all over the net, Facebook, twitter etc..

Its not like Putin came to the US and gave a speech to congress in favor of Trump ...as Netanyahu did in appearing before the US congress and urging them to go against President Obama's Syria policy for heaven's sake.
It is so ridiculous I have given up hope of finding enough IQs above that of a cabbage to form a sane government.

LondonBob , 27 July 2019 at 06:57 AM
Obama seemed to have got a taste for spying on his domestic political opponents from monitoring Israeli attempts to block the Iran nuclear deal. I think the lock her up stuff really scared the Obama people, who had much to hide.
J , 27 July 2019 at 12:27 PM
This has shown two things IMO

1. The FBI cannot be trusted to uphold defend and protect our Constitution, as they sought actively to overturn a duly elected POTUS.; and

2 - Mueller's incompetence is astounding.

Is the only entity of the Defense Department called the U.S. Army the only ones left actually upholding, defending, and protecting our Constitution and our Constitution processes? I don't see the other entities of the DOD called Navy and Air Force doing their jobs upholding our Constitution!

Thumbs up to the Army, thumbs down to the Navy and Air Force!

Mark Logan said in reply to J... , 27 July 2019 at 02:14 PM
J,

I'm a little more charitable to the FBI. The Trumps lied their asses off to the FBI about their foreign contacts. Which IMO, wrong or right, left the FBI all but no recourse but to investigate those lies. Even if the lies were simply based in long-seated personal habits, it takes investigation to prove that is the case.

plantman , 27 July 2019 at 12:55 PM
I believe Larry Johnson is right when he says:

"You have no evidence for the so-called Russian IO. It is a fabrication." In fact, Putin rejects the claim many times publicly saying that Russia does not meddle in foreign elections as a matter of policy. Maybe I'm gullible, but I find his disclaimer pretty convincing....

My question for Larry Johnson requires some speculation on his part: How did the claims of "Russia meddling" which began with the DNC and Hillary campaign, take root at the FBI, CIA and NSA???

Is there an unseen connection between the Democrat leadership and the Intel agencies??? And --if there is-- does that mean we are headed for a one-party system???

rg , 27 July 2019 at 01:46 PM
Larry, sorry to nitpick, but I have such regard for your work that it pains me to see the typographical error in your second sentence, where you say "his error" shortly after referring to Trump. I'm guessing that you meant to say "this error", but it reads as if it means "Trump's error".

And while I'm at it, your last sentence has "it" instead of "if".

Keep up your great work for this excellent website.

turcopolier , 27 July 2019 at 03:35 PM
Mark Logan

Sadly naive in that you think the conspirators were actually acting in good faith. You think they were right when they used the Steele Dossier in applying for a FISA warrant in Colyyer's Star Chamber? Steele was a paid informant for the FBI as was Page.

turcopolier , 27 July 2019 at 03:35 PM
Mark Logan

How do you know "they lied their asses off?" Mueller's report stated that no American had conspired with the Russians,

[Jun 30, 2019] USG's Bizarre Change of Position in the Roger Stone Case by Larry C Johnson

Highly recommended!
Notable quotes:
"... Given these facts you would think it would be easy for Robert Mueller to explain how the Russians got their hands on the DNC emails and then passed them on to Wikileaks. But it is not easy because the foundation of the case against the Russians rests on assumptions and beliefs. No solid facts. ..."
"... To reiterate a point I have raised in previous posts, the only entity to have forensic access to the DNC computers, i.e. CrowdStrike, is on the record in the person of the CrowdStrike CEO, Dimitri Alperovitch admitting they don't know how the Russians got access. ..."
"... CrowdStrike is not sure how the hackers got in. The firm suspects they may have targeted DNC employees with "spearphishing" emails. These are communications that appear legitimate -- often made to look like they came from a colleague or someone trusted -- but that contain links or attachments that when clicked on deploy malicious software that enables a hacker to gain access to a computer. " But we don't have hard evidence ," Alperovitch said. ..."
"... If CrowdStrike actually had conducted a legitimate forensic examination of the DNC server/servers then they absolutely would have had "hard evidence." ..."
"... The government produced the CrowdStrike reports because the Indictment in this case referenced, as background, CrowdStrike's statements about the DNC hack. Stone's statement that the government has no other evidence is not only irrelevant to this proceeding but is also mistaken. ..."
"... It is a horrible irony that Stone is being persecuted with prosecution based on an even bigger lie -- i.e., the Russians hacked the DNC. Russia did not hack the DNC. Let's hope that Stone's lawyers get a chance to demand the US Government put up the evidence or shut up. ..."
Jun 30, 2019 | turcopolier.typepad.com

There is zero forensic evidence in the public arena that supports the US Government's assertion that the Russian Government hacked the DNC. In fact, the forensic computer evidence that is available indicates that the emails from the DNC were downloaded onto something like a thumb drive.

There also is zero forensic evidence in the public arena that the Russians passed/delivered the DNC emails to Julian Assange/Wikileaks. There are only two ways to get DNC emails into the hands of Wiki people--an electronic transfer or a physical/human transfer. That's it.

And here is what we know for certain. First, since Edward Snowden absconded with the NSA's family jewels with the help of Wikileaks, U.S. and British intelligence assets have been monitoring every single electronic communication to and from Wikileaks/Julian Assange. They also have been conducting surveillance on all personal contacts with Assange and other key members of the Wikileaks staff.

Given these facts you would think it would be easy for Robert Mueller to explain how the Russians got their hands on the DNC emails and then passed them on to Wikileaks. But it is not easy because the foundation of the case against the Russians rests on assumptions and beliefs. No solid facts.

To reiterate a point I have raised in previous posts, the only entity to have forensic access to the DNC computers, i.e. CrowdStrike, is on the record in the person of the CrowdStrike CEO, Dimitri Alperovitch admitting they don't know how the Russians got access. Alperovitch told Washington Post Reporter Ellen Nakashima on June 14, 2016 the following :

CrowdStrike is not sure how the hackers got in. The firm suspects they may have targeted DNC employees with "spearphishing" emails. These are communications that appear legitimate -- often made to look like they came from a colleague or someone trusted -- but that contain links or attachments that when clicked on deploy malicious software that enables a hacker to gain access to a computer. " But we don't have hard evidence ," Alperovitch said.

If CrowdStrike actually had conducted a legitimate forensic examination of the DNC server/servers then they absolutely would have had "hard evidence."

Then, 13 months later, we have FBI Director Jim Comey admitting that the FBI relied on CrowdStrike for its "evidence." Jim Comey testified to the House Intelligence Committee in March 2017 and stated the following :

"we never got direct access to the machines themselves. The DNC in the spring of 2016 hired a firm that ultimately shared with us their forensics from their review of the system."

Now take a look at a very significant reversal of the US Government's position in the case against Roger Stone. On 20 June 2019, US Attorney Jessie Liu filed a motion attempting to rebut the argument presented by Stone's attorneys that there was no supporting evidence for the claim that Russia hacked the DNC. Here are the key snippets from her filing:

As the government has argued (Doc. 122, at 6, 9, 14), Russia's role in the DNC hack is not material to the eighteen findings of probable cause that Stone appears to be challenging. . . . The government produced the CrowdStrike reports because the Indictment in this case referenced, as background, CrowdStrike's statements about the DNC hack. Stone's statement that the government has no other evidence is not only irrelevant to this proceeding but is also mistaken.

Yet, when you read the original indictment, Roger Stone was put in the cross hairs because he was allegedly communicating with Wikileaks/Julian Assange about the DNC emails. And those emails are identified in the indictment as "stolen." The Government is hoping to nail Stone on the charge of "lying" to Congress. Good luck with that.

It is a horrible irony that Stone is being persecuted with prosecution based on an even bigger lie -- i.e., the Russians hacked the DNC. Russia did not hack the DNC. Let's hope that Stone's lawyers get a chance to demand the US Government put up the evidence or shut up.

[Jun 16, 2019] Rule of law in Murrika is kaput

Highly recommended!
Jun 16, 2019 | www.zerohedge.com

freedommusic , 23 minutes ago link

DEFENSE ATTORNEY: Agent Smith, you testified that the Russians hacked the DNC computers, is that correct?

FBI AGENT JOHN SMITH: That is correct.

DEF ATT: Upon what information did you base your testimony?

AGENT: Information found in reports analyzing the breach of the computers.

DEF ATT: So, the FBI prepared these reports?

AGENT: (cough) . (shift in seat) No, a cyber security contractor with the FBI.

DEF ATT: Pardon me, why would a contractor be preparing these reports? Do these contractors run the FBI laboratories where the server was examined?

AGENT: No.

DEF ATT: No? No what? These contractors don't run the FBI Laboratories?

AGENT: No. The laboratories are staffed by FBI personnel.

DEF ATT: Well I don't understand. Why would contractors be writing reports about computers that are forensically examined in FBI laboratories?

AGENT: Well, the servers were not examined in the FBI laboratory.

(silence)

DEF ATT: Oh, so the FBI examined the servers on site to determine who had hacked them and what was taken?

AGENT: Uh .. no.

DEF ATT: They didn't examine them on site?

AGENT: No.

DEF ATT: Well, where did they examine them?

AGENT: Well, uh .. the FBI did not examine them.

DEF ATT: What?

AGENT: The FBI did not directly examine the servers.

DEF ATT: Agent Smith, the FBI has presented to the Grand Jury and to this court and SWORN AS FACT that the Russians hacked the DNC computers. You are basing your SWORN testimony on a report given to you by a contractor, while the FBI has NEVER actually examined the computer hardware?

AGENT: That is correct.

DEF ATT: Agent Smith, who prepared the analysis reports that the FBI relied on to give this sworn testimony?

AGENT: Crowdstrike, Inc.

DEF ATT: So, which Crowdstrike employee gave you the report?

AGENT: We didn't receive the report directly from Crowdstrike.

DEF ATT: What?

AGENT: We did not receive the report directly from Crowdstrike.

DEF ATT: Well, where did you find this report?

AGENT: It was given to us by the people who hired Crowdstrike to examine and secure their computer network and hardware.

DEF ATT: Oh, so the report was given to you by the technical employees for the company that hired Crowdstrike to examine their servers?

AGENT: No.

DEF ATT: Well, who gave you the report?

AGENT: Legal counsel for the company that hired Crowdstrike.

DEF ATT: Why would legal counsel be the ones giving you the report?

AGENT: I don't know.

DEF ATT: Well, what company hired Crowdstrike?

AGENT: The Democratic National Committee.

DEF ATT: Wait a minute. Let me get this straight. You are giving SWORN testimony to this court that Russia hacked the servers of the Democratic National Committee. And you are basing that testimony on a report given to you by the LAWYERS for the Democratic National Committee. And you, the FBI, never actually saw or examined the computer servers?

AGENT: That is correct.

DEF ATT: Well, can you provide a copy of the technical report produced by Crowdstrike for the Democratic National Committee?

AGENT: No, I cannot.

DEF ATT: Well, can you go back to your office and get a copy of the report?

AGENT: No.

DEF ATT: Why? Are you locked out of your office?

AGENT: No.

DEF ATT: I don't understand. Why can you not provide a copy of this report?

AGENT: Because I do not have a copy of the report.

DEF ATT: Did you lose it?

AGENT: No.

DEF ATT: Why do you not have a copy of the report?

AGENT: Because we were never given a final copy of the report.

DEF ATT: Agent Smith, if you didn't get a copy of the report, upon what information are you basing your testimony?

AGENT: On a draft copy of the report.

DEF ATT: A draft copy?

AGENT: Yes.

DEF ATT: Was a final report ever delivered to the FBI?

AGENT: No.

DEF ATT: Agent Smith, did you get to read the entire report?

AGENT: No.

DEF ATT: Why not?

AGENT: Because large portions were redacted.

DEF ATT: Agent Smith, let me get this straight. The FBI is claiming that the Russians hacked the DNC servers. But the FBI never actually saw the computer hardware, nor examined it? Is that correct?

AGENT: That is correct.

DEF ATT: And the FBI never actually examined the log files or computer email or any aspect of the data from the servers? Is that correct?

AGENT: That is correct.

DEF ATT: And you are basing your testimony on the word of Counsel for the Democratic National Committee, the people who provided you with a REDACTED copy of a DRAFT report, not on the actual technical personnel who supposedly examined the servers?

AGENT: That is correct.

DEF ATT: Your honor, I have a few motions I would like to make at this time.

PRESIDING JUDGE: I'm sure you do, Counselor. (as he turns toward the prosecutors) And I feel like I am in a mood to grant them.

( source )

hooligan2009 , 14 minutes ago link

Brilliant! that sums it up nicely. of course, if the servers were not hacked and were instead "thumbnailed" that leads to a whole pile of other questions (including asking wiileaks for their source and about the murder of seth rich).

[Jun 05, 2019] Do Spies Run the World by Israel Shamir

Highly recommended!
Notable quotes:
"... Within America, the alphabet agencies from NSA to CIA to FBI had betrayed their country as obviously as Figuera did, though they didn't run away, yet. Our colleagues Mike Whitney and Philip Giraldi described the conspiracy organised by John Brennan of CIA with active participation of FBI's James Comey, to regime-change the US. ..."
"... The CIA spies in England and passes the results to the British Intelligence. MI6 spies in the US and passes the results to CIA. They became integrated to unbelievable extent in the worldwide network of spies. ..."
"... It is not the Deep State anymore; it is world spooks who had united against their legitimate masters. Instead of staying loyal to their country, the spooks betrayed their countries. They are not only strictly-for-cash – they think they know better what is good for you. In a way, they are a new incarnation of the Cecil Rhodes Society . Democratically-elected politicians and statesmen have to obey them or meet their displeasure, as Corbyn and Trump did. ..."
"... Everywhere, in the US, the UK, and Russia, the spooks became too powerful to handle. The CIA stood behind assassination of JFK and tried to take down Trump. The British Intelligence undermined Jeremy Corbyn, after assisting the CIA in pushing for the Iraq war. They created the Steele Dossier, invented the Skripal hoax and had brought Russia and the West to the brink of nuclear war. ..."
"... In the Ukraine, the heads of their state security, SBU had plotted against the last legitimate president Mr Victor Yanukovych. They helped to organise and run the Maidan 2014 manifestations and misled their President, until he was forced to escape abroad. The Maidan manifestations could be compared with the Yellow Vests movement; however, Macron, an appointee of the Network, had support of his spies, and stayed in power, while Yanukovych had been betrayed and overthrown. ..."
"... You'd ask me, were they so stupid that they believed their own propaganda of inevitable Clinton's victory? Yes, they were and are stupid. They are no sages, evil or benevolent. My main objection to the conspiracy theorists is that they usually view the plotters as omniscient and all-powerful. They are too greedy to be all-powerful, and they are too silly to be omniscient. ..."
"... Now, however, the secret services' cohesion and integration increased to the next level, making it difficult to deal with them. ..."
"... People are fickle and not always know what is good for them; there are many demagogues to mislead the crowd. And still, elected legitimate officials should have precedence in governing, while non-elected ones should obey – and it means the Network spooks and media men should know their place. ..."
"... How did John Brennan, James Clapper, James Comey, Andrew McCabe, Christopher Steele and other Spygate principals manage to rise to the top of the intelligence bureaucracy? ..."
"... These characters have indulged in an orgy of highly conspicuous partisan political meddling and ranting that has created the strong public impression that they engaged in an attempted coup to overthrow a sitting American president on the basis of a frame-up that was largely fueled by Russian disinformation. ..."
"... Brennan in particular: can you imagine any previous CIA director comporting himself in this manner? Throwing all caution to the winds? Inconceivable. Brennan, Comey and Clapper have inflicted serious damage on the reputation of the CIA, FBI and ODNI. ..."
"... It's not just illegal surveillance and blackmail that gives the spies power, it's impunity for even the gravest crimes. If you don't get the message of blackmail you can be tortured or shot, with a bullet like JFK and RFK and Reagan, or with illegal biological weapons like Daschel and Leahy. Institutionalized impunity stares us in the face from US state papers. ..."
"... It's not that CIA and other neo-Gestapos escaped control. They were designed from inception for totalitarian control. The one poor bastard in Congress who pointed that out, Tydings, had McCarthy sicced on him for his cheek. CIA is not out of control; it's firmly IN control. ..."
"... It was funny during the Cold war (the original one) – whenever each side unveiled that a spy from the other side has defected to them – they would say it was because of ideology – i.e. the spy defected to them because he "believed" in "democracy" or socialism – depending on the case. ..."
"... And in order to discredit their own spies when they defected to the other side – they would say that they did it for money, because they were greedy and that they betrayed "democracy" or socialism ..."
"... The other crucial role that spies usually play is that they allow the adversaries to keep technological balance via industrial espionage. By transferring top military secrets, they don't allow any side to gain crucial strategic advantage that might encourage them to do something foolish – like start a nuclear war. Prime example of this were probably the Rosenbergs – who helped USSR close the nuclear weapons gap with US and kept the world in a shaky nuclear arms balance. ..."
"... Profound analysis by Mr. Shamir. It confirms that one of the important reasons for the decline of freemasonry is the monopolization of political conspiracy by the intelligence services. Who needs the lodge when you have the CIA. ..."
"... Spooks are everywhere, from secretaries "losing" important communications to CNN news anchors roleplaying with crisis actors, but they are at their most powerful when they are appointed to powerful positions. President Trump's National Security Advisor is a spook and he does what he wants. ..."
"... John le Carre described it perfectly in "A Perfect Spy". The spooks form their own country. They are only loyal to themselves. ..."
"... A global supra-powerful, organized and united, privately directed, publicly backed society of high technology robin hood_mercenary_spooks who conduct sub-legal "scratch-my-back-I'll-scratch-your-back [in the nation of the other] routines"; who ignore duty to country, its constitutions, its laws and human rights. The are evil, global acting, high technology nomads with a monopoly on extortion and terror. ..."
"... Your statement "spooks and ex-spooks feel more proximity to their enemies and colleagues in other countries than to their fellow citizens" fails makes clear the importance of containment-of-citizen access to information. Nation states are armed, rule making structures that invent propaganda and control access to information. Information containment and filtering is the essence of the political and economic power of a national leader and it is more import to the evil your article addresses. ..."
"... Control of the media is 50 times more important than control of the government? Nearly all actions of consequence are intended to drain the governed masses and such efforts can only be successful if the lobbying, false-misleading mind controlling privately owned (92% own by just 6 entities) centrally directed media can effectively control the all information environments. ..."
"... While understanding the mechanics is helpful don't neglect the purpose. Why is more important than how. The why is control. They don't care what you believe, but only what you do. You can be on the left, right, mainstream, or fringe and they won't care as long as you eat what they serve. Take a minute to think about what they want you to do and strongly consider not doing it. ..."
May 22, 2019 | www.unz.com

... ... ...

Conspiratorially-minded writers envisaged the Shadow World Government as a board of evil sages surrounded by the financiers and cinema moguls. That would be bad enough; in infinitely worse reality, our world is run by the Junior Ganymede that went berserk. It is not a government, but a network, like freemasonry of old, and it consists chiefly of treacherous spies and pens-for-hire, two kinds of service personnel, that collected a lot of data and tools of influence, and instead of serving their masters loyally, had decided to lead the world in the direction they prefer.

German Admiral Wilhelm Canaris, the last head of the Abwehr, Hitler's Military Intelligence, had been such a spy with political ambitions. He supported Hitler as the mighty enemy of Communism; on a certain stage he came to conclusion that the US will do the job better and switched to the Anglo-American side. He was uncovered and executed for treason. His colleague General Reinhard Gehlen also betrayed his Führer and had switched to the American side. After the war, he continued his war against Soviet Russia, this time for CIA instead of Abwehr.

The spies are treacherous by their nature. They contact people who betrayed their countries; they work under cover, pretending to be somebody else; for them the switch of loyalty is as usual and normal as the gender change operation for a Moroccan doctor who is doing that 8 to 5 every day. They mix with foreign spies, they kill people with impunity; they break every law, human or divine. They are extremely dangerous if they do it for their own country. They are infinitely more dangerous if they work for themselves and still keep their institutional capabilities and international network.

Recently we had a painful reminding of their treacherous nature. Venezuela's top spy, the former director of the Bolivarian National Intelligence Service (Sebin), Manuel Cristopher Figuera , had switched sides during the last coup attempt and escaped abroad as the coup failed. He discovered that his membership on the Junior Ganymede of the spooks is more important for him than his duty to his country and its constitution.

Within America, the alphabet agencies from NSA to CIA to FBI had betrayed their country as obviously as Figuera did, though they didn't run away, yet. Our colleagues Mike Whitney and Philip Giraldi described the conspiracy organised by John Brennan of CIA with active participation of FBI's James Comey, to regime-change the US. In the conspiracy, foreign intelligence agencies, primarily the British GCHQ, played an important role. As by law, these spies aren't allowed to operate on their home ground, they go into you-scratch-my-back-I'll-scratch-your-back routine. The CIA spies in England and passes the results to the British Intelligence. MI6 spies in the US and passes the results to CIA. They became integrated to unbelievable extent in the worldwide network of spies.

It is not the Deep State anymore; it is world spooks who had united against their legitimate masters. Instead of staying loyal to their country, the spooks betrayed their countries. They are not only strictly-for-cash – they think they know better what is good for you. In a way, they are a new incarnation of the Cecil Rhodes Society . Democratically-elected politicians and statesmen have to obey them or meet their displeasure, as Corbyn and Trump did.

Everywhere, in the US, the UK, and Russia, the spooks became too powerful to handle. The CIA stood behind assassination of JFK and tried to take down Trump. The British Intelligence undermined Jeremy Corbyn, after assisting the CIA in pushing for the Iraq war. They created the Steele Dossier, invented the Skripal hoax and had brought Russia and the West to the brink of nuclear war.

Russian spooks are in a special relations mode with the global network – for many years. In Russia, persistent rumours claim the perilous Perestroika of Mikhail Gorbachev had been designed and initiated by the KGB chief (1967 – 1982) Yuri Andropov . He and his appointees dismantled the socialist state and prepared the takeover of 1991 in the interests of the One World project.

Andropov (who had stepped into Brezhnev's shoes in 1982 and died in 1984) had advanced Gorbachev and his architect of glasnost, Alexander Yakovlev . Andropov also promoted the arch-traitor KGB General Oleg Kalugin to head its counter-intelligence. Later, Kalugin betrayed his country, escaped to the US and delivered all Russian spies he knew of to the FBI hands.

In late 1980s-early 1990s, the KGB, originally the guarding dog of the Russian working class, had betrayed its Communist masters and switched to work for the Network. But for their betrayal, Gorbachev would not be able to destroy his country so fast: the KGB neutralised or misinformed the Communist leadership.

They allowed Chernobyl to explode; they permitted a German pilot to land on the Red Square – this was used by Gorbachev as an excuse to sack the whole lot of patriotic generals. The KGB people were active in subverting other socialist states, too. They executed the Romanian leader Ceausescu and his wife; they brought down the GDR, the socialist Germany; they plotted with Yeltsin against Gorbachev and with Gorbachev against Romanov. As the result of their plotting, the USSR fell apart.

The KGB plotters of 1991 had thought that post-Communist Russia would be treated by the West like the prodigal son, with a fattened calf being slaughtered for the welcome feast. To their disappointment, the stupid bastards discovered that their country was to play the part of the fattened calf at the feast, and they were turned from unseen rulers into billionaires' bodyguards. Years later, Vladimir Putin came to power in Russia with the blessing of the world spooks and bankers, but being too independent a man to submit, he took his country into its present nationalist course, trying to regain some lost ground. The dissatisfied spooks supported him.

Only recently Putin began to trim the wild growth of his own intelligence service, the FSB. It is possible the cautious president had been alerted by the surprising insistence of the Western media that the alleged attempt on Skripal and other visible cases had been attributed to the GRU, the relatively small Russian Military Intelligence, while the much bigger FSB had been forgotten. The head of FSB cybercrime department had been arrested and sentenced for lengthy term of imprisonment, and two FSB colonels had been arrested as the search of their premises revealed immense amounts of cash , both Russian and foreign currency. Such piles of roubles and dollars could be assembled only for an attempt to change the regime, as it was demanded by the Network.

In the Ukraine, the heads of their state security, SBU had plotted against the last legitimate president Mr Victor Yanukovych. They helped to organise and run the Maidan 2014 manifestations and misled their President, until he was forced to escape abroad. The Maidan manifestations could be compared with the Yellow Vests movement; however, Macron, an appointee of the Network, had support of his spies, and stayed in power, while Yanukovych had been betrayed and overthrown.

In the US, the spooks allowed Donald Trump to become the leading Republican candidate, for they thought he would certainly lose to Mme Clinton. Surprisingly, he had won, and since then, this man who was advanced as an easy prey, as a buffoon, had been hunted by the spooks-and-scribes freemasonry.

You'd ask me, were they so stupid that they believed their own propaganda of inevitable Clinton's victory? Yes, they were and are stupid. They are no sages, evil or benevolent. My main objection to the conspiracy theorists is that they usually view the plotters as omniscient and all-powerful. They are too greedy to be all-powerful, and they are too silly to be omniscient.

Their knowledge of official leaders' faults gives them their feeling of power, but this knowledge can be translated into actual control only for weak-minded men. Strong leaders do not submit easily. Putin has had his quota of imprudent or outright criminal acts in his past, but he never allowed the blackmailers to dictate him their agenda. Netanyahu, another strong man of modern politics, also had managed to survive blackmail. Meanwhile, Trump defeated all attempts to unseat him, though his enemies had used his alleged lack of delicacy in relation to women, blacks and Jews to its utmost. He waded through the deep pond of Russiagate like Gulliver. But he has to purge the alphabet agencies to reach safety.

In Russia, the problem is acute. Many Russian spooks and ex-spooks feel more proximity to their enemies and colleagues in other countries than to their fellow citizens. There is a freemasonic quality in their camaraderie. Such a quality could be commendable in soldiers after the war is over, but here the war is going on. Russian spooks are particularly besotted with their declared enemies; apparently it is the Christian quality of the Russian soul, but a very annoying one.

When Snowden reached Moscow after his daring escape from Hong Kong, the Russian TV screened a discussion that I participated in, among journalists, members of parliament and ex-spies. The Russian spooks said that Snowden is a traitor; a person who betrayed his agency can't be trusted and should be sent to the US in shackles. They felt they belong to the Spy World, with its inner bond, while their loyalty to Russia was a distant second.

During recent visit of Mike Pompeo to Sochi, the head of SVR, the Russian Foreign Intelligence Service, Mr Sergey Naryshkin proposed the State Secretary Mike Pompeo, the ex-CIA director, to expand contacts between Russian and US special services at a higher level. He clarified that he actively interacted with Pompeo during the period when he was the head of the CIA. Why would he need contacts with his adversary? It would be much better to avoid contacts altogether.

Even president Putin, who is first of all a Russian nationalist (or a patriot, as they say), who has granted Snowden asylum in Moscow at a high price of seriously worsening relations with Obama's administration, even Putin has told Stone that Snowden shouldn't have leaked the documents the way he did. "If he didn't like anything at his work he should have simply resigned, but he went further", a response proving he didn't completely freed himself from the spooks' freemasonry.

While the spooks plot, the scribes justify their plots. Media is also a weapon, and a mighty one. In Richard Wagner's opera Lohengrin , the protagonist is defeated by the smear campaign in the media. Despite his miraculous arrival, despite his glorious victory, the evil witch succeeds to poison minds of the hero's wife and of the court. The pen can counter the sword. When the two are integrated, as in the union of spooks and scribes, it is too dangerous tool to leave intact.

In many countries of Europe, editorial international policies had been outsourced to the spooky Atlantic Council, the Washington-based think tank. The Atlantic Council is strongly connected with NATO alliance and with Brussels bureaucracy, the tools of control over Europe. Another tool is The Integrity Initiative , where the difference between spies and journalists is blurred . And so is the difference between the left and the right. The left and the right-wing media use different arguments, surprisingly leading to the same bottom line, because both are tools of warfare for the same Network.

In 1930s, they were divided. The German and the British agents pulled and pushed in the opposite directions. The Russian military became so friendly with the Germans, that at a certain time, Hitler believed the Russian generals would side with him against their own leader. The Russian spooks were befriended by the Brits, and had tried to push Russia to confront Hitler. The cautious Marshal Stalin had purged the Red Army's pro-German Generals, and the NKVD's pro-British spooks, and delayed the outbreak of hostilities as much as he could. Now, however, the secret services' cohesion and integration increased to the next level, making it difficult to deal with them.

If they are so powerful, integrated and united, shouldn't we throw a towel in the ring and surrender? Hell, no! Their success is their undoing. They plot, but Allah is the best plotter, – our Muslim friends say. Indeed, when they succeed to suborn a party, the people vote with their feet. The Brexit is the case to consider. The Network wanted to undermine the Brexit; so they neutralised Corbyn by the antisemitism pursuit while May had made all she could to sabotage the Brexit while calling for it in public. Awfully clever of them – but the British voter responded with dropping both established parties. So their clever plot misfired.

People are fickle and not always know what is good for them; there are many demagogues to mislead the crowd. And still, elected legitimate officials should have precedence in governing, while non-elected ones should obey – and it means the Network spooks and media men should know their place.


Sean McBride , says: May 21, 2019 at 3:18 pm GMT

Side note:

How did John Brennan, James Clapper, James Comey, Andrew McCabe, Christopher Steele and other Spygate principals manage to rise to the top of the intelligence bureaucracy?

Spymasters are usually renowned for their inscrutability and for playing their cards close to their vests.

These characters have indulged in an orgy of highly conspicuous partisan political meddling and ranting that has created the strong public impression that they engaged in an attempted coup to overthrow a sitting American president on the basis of a frame-up that was largely fueled by Russian disinformation.

Brennan in particular: can you imagine any previous CIA director comporting himself in this manner? Throwing all caution to the winds? Inconceivable. Brennan, Comey and Clapper have inflicted serious damage on the reputation of the CIA, FBI and ODNI.

Forthcoming books will no doubt get into all the remarkable and bizarre details.

Donald Trump has demonstrated the ability to troll and goad many of his opponents into a state of imbecility. It's a negotiating tactic -- knock them off balance, provoke them to lose control. No matter how smart they are, some people take the bait.

Ding ding ding , says: May 21, 2019 at 4:04 pm GMT
I am sitting here pointing to my nose. Spies run the world – contemporary history in a nutshell. A few provisos:

It's not just illegal surveillance and blackmail that gives the spies power, it's impunity for even the gravest crimes. If you don't get the message of blackmail you can be tortured or shot, with a bullet like JFK and RFK and Reagan, or with illegal biological weapons like Daschel and Leahy. Institutionalized impunity stares us in the face from US state papers.

It's not that CIA and other neo-Gestapos escaped control. They were designed from inception for totalitarian control. The one poor bastard in Congress who pointed that out, Tydings, had McCarthy sicced on him for his cheek. CIA is not out of control; it's firmly IN control.

– There is a crucial difference between US and Russian spies. Russians can go over the head of their government to the world. That's the only effective check on state criminal enterprise like CIA. Article 17 of the Russian Constitution says "in the Russian Federation rights and freedoms of person and citizen are recognized and guaranteed pursuant to the generally recognized principles and norms of international law and in accordance with this Constitution." Article 18 states that rights and freedoms of the person and citizen are directly applicable, which prevents the kind of bad-faith tricks the USA pulls, like declaring "non-self executing" treaties, or making legally void reservations, declarations, understandings, and provisos to screw you out of your rights. Article 46(3) guarantees citizens a constitutional right to appeal to inter-State bodies for the protection of human rights and freedoms if internal legal redress has been exhausted. Ratified international treaties including the ICCPR supersede any domestic legislation stipulating otherwise.

Endgame Napoleon , says: May 21, 2019 at 6:14 pm GMT
Isn't it just collusion that holds certain elite groups together, including in some businesses where a lot of chicanery goes on. The most important thing is to be in on it as one of them, not as a person who can be trusted not to say anything, but as one of the gang. It's exactly how absenteeism-friendly offices full of crony parents with crony-parent managers work.

The only problem for the guy at the tippy top is what would happen if such a tight group turned on him / her? Maybe, some leaders see the value in protecting a few brave individuals, like Snowden, letting any coup-stirring spooks know that some people are watching the Establishment's rights violators, too. Those with technical knowledge have more capacity than most to do it or, at least, to understand how it works.

In a country founded on individual liberties, including Fourth Amendment privacy rights that were protected by less greedy generations, the US should have elected leaders that put the US Constitution first, but that is too much to ask in an era when the top dogs in business & government are all colluding for money.

Digital Samizdat , says: May 21, 2019 at 6:40 pm GMT

In Russia, persistent rumours claim the perilous Perestroika of Mikhail Gorbachev had been designed and initiated by the KGB chief (1967 – 1982) Yuri Andropov.

FWIW, I have heard the exact same thing from Russian commenters myself. Some have insisted that, if Andropov had lived long enough, he would have carried glasnost and perestroika himself.

Cyrano , says: May 21, 2019 at 7:09 pm GMT
Spies are loathsome bunch, with questionable loyalties and personal integrity. But I believe that overall they play a positive role. They play a positive role because they help adversaries gain insight into their adversary's activities.

If it wasn't for the spies, paranoia about what the other side is doing can get out of hand and cause wrong actions to take place. The problem with the spies is also that no one knows how much they can be trusted and on whose side they are really on.

It was funny during the Cold war (the original one) – whenever each side unveiled that a spy from the other side has defected to them – they would say it was because of ideology – i.e. the spy defected to them because he "believed" in "democracy" or socialism – depending on the case.

And in order to discredit their own spies when they defected to the other side – they would say that they did it for money, because they were greedy and that they betrayed "democracy" or socialism.

The other crucial role that spies usually play is that they allow the adversaries to keep technological balance via industrial espionage. By transferring top military secrets, they don't allow any side to gain crucial strategic advantage that might encourage them to do something foolish – like start a nuclear war. Prime example of this were probably the Rosenbergs – who helped USSR close the nuclear weapons gap with US and kept the world in a shaky nuclear arms balance.

Kirt , says: May 21, 2019 at 10:01 pm GMT
Profound analysis by Mr. Shamir. It confirms that one of the important reasons for the decline of freemasonry is the monopolization of political conspiracy by the intelligence services. Who needs the lodge when you have the CIA.

An aspect of the rule of spies that Mr. Shamir does not touch on is the legitimization of this rule through popular culture. This started with the James Bond novels and movies and by now has become ubiquitous. Spies and assassins are the heroes of the masses. While secrecy is still needed for tactical reasons in the case of specific operations, overall secrecy is not needed nor even desirable. So you have thugs like Pompeo actually boasting of their villainy before audiences of college students at Texas A&M and you have the Mossad supporting the publication of the book Rise and Kill First which is an extensive account of their world-wide assassination policy. They have the power; now they want the perks that go with it, including being treated like rock stars.

israel shamir , says: May 22, 2019 at 4:06 am GMT
@Kirt

Who needs the lodge when you have the CIA

Good explanation of freemasonry's decline, Kirt! As for popular culture – almost all latest cinema characters are spies – like Avengers))

anno nimus , says: May 22, 2019 at 4:44 am GMT
dear mr Shamir, the criminals are not only stupid but also utterly wicked. they will be stricken down in the twinkling of the eye and will cry out why God? all the righteous will shout for joy and give thanks to the Almighty for judging Babylon. woe unto them! they will have no place to hide or run to.

Ezekiel 9 (NKJV)
The Wicked Are Slain
9 Then He called out in my hearing with a loud voice, saying, "Let those who have charge over the city draw near, each with a deadly weapon in his hand." 2 And suddenly six men came from the direction of the upper gate, which faces north, each with his battle-ax in his hand. One man among them was clothed with linen and had a writer's inkhorn at his side. They went in and stood beside the bronze altar.

3 Now the glory of the God of Israel had gone up from the cherub, where it had been, to the threshold of the temple. And He called to the man clothed with linen, who had the writer's inkhorn at his side; 4 and the Lord said to him, "Go through the midst of the city, through the midst of Jerusalem, and put a mark on the foreheads of the men who sigh and cry over all the abominations that are done within it."

5 To the others He said in my hearing, "Go after him through the city and kill; do not let your eye spare, nor have any pity. 6 Utterly slay old and young men, maidens and little children and women; but do not come near anyone on whom is the mark; and begin at My sanctuary." So they began with the elders who were before the temple. 7 Then He said to them, "Defile the temple, and fill the courts with the slain. Go out!" And they went out and killed in the city.

8 So it was, that while they were killing them, I was left alone; and I fell on my face and cried out, and said, "Ah, Lord God! Will You destroy all the remnant of Israel in pouring out Your fury on Jerusalem?"

9 Then He said to me, "The iniquity of the house of Israel and Judah is exceedingly great, and the land is full of bloodshed, and the city full of perversity; for they say, 'The Lord has forsaken the land, and the Lord does not see!' 10 And as for Me also, My eye will neither spare, nor will I have pity, but I will recompense their deeds on their own head."

11 Just then, the man clothed with linen, who had the inkhorn at his side, reported back and said, "I have done as You commanded me."

Antares , says: May 22, 2019 at 5:01 am GMT
Espionage depends on contra-espionage. We will never get that hold on Jewish spies as they can have on our spies.
Paul Bennett , says: May 22, 2019 at 5:38 am GMT
Great article.

E Michael Jones was just warning President Trump about the possibility of this in the Straits of Hormuz. https://youtu.be/iIm3WuJAVEE?t=272

Spooks are everywhere, from secretaries "losing" important communications to CNN news anchors roleplaying with crisis actors, but they are at their most powerful when they are appointed to powerful positions. President Trump's National Security Advisor is a spook and he does what he wants.

John le Carre described it perfectly in "A Perfect Spy". The spooks form their own country. They are only loyal to themselves.

Yarkob , says: May 22, 2019 at 7:52 am GMT
@Antares that's because the Mossad isn't like "our" spy agencies. it's closer to the old paradigm of the hashishim or true assassins. Mossad "agents" don't gad around wearing dark glasses and tapping phones; they run proper deep cover operations. "sleepers" is a term used in the USA. they have jobs. they look "normal". They integrate
MarkU , says: May 22, 2019 at 8:45 am GMT
Do spies run the world? No not really, bankers run the world.

Bankers constitute most of the deep state in the US/UK in particular and most of Europe. It is the bankers/deep state which control the intelligence agencies. The ethnicity of a hefty proportion of said bankers is plain to see for anyone with functioning critical faculties. How else can a tiny country in the middle east have such influence in the US? How else do we explain why 2/3 of the UK parliament are "friends of Israel" How come financial institutions can commit felonies and no one does jail time? why is Israel allowed to commit war crimes and break international law with total impunity? who got bailed out of their gambling debts at the expense of inflicting "austerity" on most of the western world?

I am open to any sensible alternative hypothesis.

Realist , says: May 22, 2019 at 8:48 am GMT
@Sean McBride

How did John Brennan, James Clapper, James Comey, Andrew McCabe, Christopher Steele and other Spygate principals manage to rise to the top of the intelligence bureaucracy?

Shit floats.

Sally , says: May 22, 2019 at 9:06 am GMT
A global supra-powerful, organized and united, privately directed, publicly backed society of high technology robin hood_mercenary_spooks who conduct sub-legal "scratch-my-back-I'll-scratch-your-back [in the nation of the other] routines"; who ignore duty to country, its constitutions, its laws and human rights. The are evil, global acting, high technology nomads with a monopoly on extortion and terror.

Since winning, Trump has been hunted by the spooks-and-scribes freemasonry. <fallacy is that Trump could have gained the assistence of every American, had Trump just used his powers to declassify all secret information and make it available to the public, instead he chases Assange, and continues to conduct the affairs of his office in secret.

Propaganda preys on belief.. it is more powerful than an atomic weapon.. when the facts are hidden or when the facts are changed, distorted or destroyed.

Your statement "spooks and ex-spooks feel more proximity to their enemies and colleagues in other countries than to their fellow citizens" fails makes clear the importance of containment-of-citizen access to information. Nation states are armed, rule making structures that invent propaganda and control access to information. Information containment and filtering is the essence of the political and economic power of a national leader and it is more import to the evil your article addresses.

https://theintercept.com/2019/05/08/josh-gottheimer-democrats-yemen/ <i wrote IRT to the article, that contents appearing in private media supported monopoly powered corporations and distributed to the public, direct the use of military and the willingness of soldiers of 22 different countries.

Control of the media is 50 times more important than control of the government? Nearly all actions of consequence are intended to drain the governed masses and such efforts can only be successful if the lobbying, false-misleading mind controlling privately owned (92% own by just 6 entities) centrally directed media can effectively control the all information environments.

I am bothered by you article because it looks to be Trumped weighted and failes to make clear it is these secret apolitical, human rights abusers, that direct the contents of the media distributed articles that appear in the privately owmed, media distributed to the public. Also not explained is how the cost of advertising is shared by the monopoly powered corporations, and it is that advertising that is the source of support that keeps the fake news in business, the nation state propaganda in line, and the support of robin -hood terror.

Monopoly powered global corporation advertising funds the fake and misleading private media, that is why the open internet has been shut in tight. In order for the evil, global acting, high technology nomads to continue their extortion and terror activities they need the media, its their only real weapon. I have never meet a member of any of the twenty two agencies that was not a trained, certified mental case terrorist.

Anon [295] Disclaimer , says: May 22, 2019 at 9:08 am GMT
I think the interplay between the spooks and scribes warrants a deeper explanation. Covert action refers to anything in which the author can disclaim his responsibility, ie it looks like someone else or something else. The handler in a political operation cannot abuse his agent because the agent is the actor. The handler in an intelligence gathering operation can abuse his agent because the agent merely enables action.

The political operations in this case are propaganda. The Congress of Cultural Freedom is the most clearly described one to date. Propaganda is necessary in any mass society to ensure that voters care about the right issues, the right way, at the right time. Propaganda can be true, false, or a mix of the two. Black propaganda deals in falsehoods, ie the Steele Dossier. Black propaganda works best when it enables a pre-planned operation, but it pollutes the intelligence gathering process with disinformation.

Intelligence gathering is colloquially called investigative reporting. If anyone knows about Gary Webb, Alan Frankovich, or Michael Hastings they know you can't really do that job well for very long. So how do the old timers last so long? It's a back and forth. The reporter brings all of his information on a subject to his intelligence source (handler). The source then says, "print this, print that, sit on that, and since you've been a good boy here's a little something you didn't know." The true role of the investigative reporter is to conduct counterintelligence and package it as a limited hangout.

While understanding the mechanics is helpful don't neglect the purpose. Why is more important than how. The why is control. They don't care what you believe, but only what you do. You can be on the left, right, mainstream, or fringe and they won't care as long as you eat what they serve. Take a minute to think about what they want you to do and strongly consider not doing it.

https://www.nytimes.com/1977/12/26/archives/worldwide-propaganda-network-built-by-the-cia-a-worldwide-network.html

http://danwismar.com/uploads/Bernstein%20-%20CIA%20and%20Media.htm

joeshittheragman , says: May 22, 2019 at 9:29 am GMT
Do Spies Run the World?
-- -- -- -- -- -- -- -- -- –
If they're Jewish spies – then yes.
Vojkan , says: May 22, 2019 at 9:45 am GMT
Not usually a big fan of Israel Shamir's pieces but this one on spooks is truly excellent. The article is spot on.
9/11 Inside job , says: May 22, 2019 at 10:37 am GMT
Spies do not run the world , they are merely agents of the "families" who use them to retain and increase their control ,power and wealth .
cowherd , says: May 22, 2019 at 10:46 am GMT
@Sean McBride And now Trump should have then all rounded up and hung from the trees in the front of the Whitehouse. Anything less should be seen as encouragement.
atlantis_dweller , says: May 22, 2019 at 11:26 am GMT
Don't agree.

[Should don't agree, agree, troll, and lol "buttons" for columns be added? I think it would be a nice extra].

mike k , says: May 22, 2019 at 11:49 am GMT
The worst among us rule over the rest of us. As Plato said, this needs to change. How to do that? We don't know, but we desperately need to find out ..
Anon [421] Disclaimer , says: May 22, 2019 at 12:41 pm GMT
@Sean McBride

Obama was a very effective promoter of what might be called the "globalist" agenda. He of course didn't invent it but did appoint those three.

Wayne Madsen gave a convincing account in his speculation that both Obama's parent's were CIA operatives. So it's "all the family" and in the details one might conclude with the author that indeed "spies run the world."

[May 30, 2019] Whatever you may think of Trump, the people who set out to 'get him' are the scum of the Earth

Highly recommended!
Notable quotes:
"... "All political analysis which favors either the Democratic Party or the Republican Party is inherently worthless, because both parties are made of swamp and exist in service of the swamp. If you can't see that the entire system is one unified block of corruption and that ordinary people need to come together and unite against it, then you really don't understand what you're looking at." ..."
May 30, 2019 | www.moonofalabama.org
ben , May 29, 2019 10:45:47 PM | 2

SteveK9 , May 29, 2019 6:54:20 PM | 0

Whatever you may think of Trump, the people who set out to 'get him' are the scum of the Earth. I recommend listening to the two-part interview of George Papadopoulos with Mark Steyn, where he describes the convoluted plot to use him to bring down Trump.

What they did to this guy is truly disgusting. Brennan belongs in a prison cell, and he should be sharing it with Mueller. Papadopoulos also has written a book about his experiences called 'Deep State Target, How I got caught in the crosshairs of the plot to bring down President Trump.

And, a final comment. Hillary Clinton proved beyond all doubt that she and not Trump was not fit to be President. To engage in this scheme and then to raise tensions through the roof with a nuclear superpower, which can destroy this country, is about as low and selfish as it is possible to be.

As I stated on the open thread, to paraphrase Muller;

I don't give a s###. figure it out yourself, Im f***ing outta' here.

The whole point of impeachment, is to have a show trial, not actually impeach. If the thing is on TV, the American people may watch it, and that would be interesting.

Not to worry though, Pelosi and Schumer won't let that happen. Appeasing their donors,is all they care about.

psycho @ 2 quoting C. Johnston stated;

"All political analysis which favors either the Democratic Party or the Republican Party is inherently worthless, because both parties are made of swamp and exist in service of the swamp. If you can't see that the entire system is one unified block of corruption and that ordinary people need to come together and unite against it, then you really don't understand what you're looking at."

That, my friends, is the clearest truth of all..

[May 27, 2019] The Campaign to Paint Trump as a Russian Stooge Started on May 4, 2016 by Larry C Johnson

Highly recommended!
Notable quotes:
"... The Clinton campaign and the DNC retained the law firm of Perkins Coie; in turn, one of its partners, Marc E. Elias, retained Fusion GPS. We don't know how much Fusion GPS was paid, but the Clinton campaign and the DNC paid $9.1 million to Perkins Coie during the 2016 campaign (i.e., between mid-2015 and late 2016). ..."
"... Fusion GPS then "hired" FBI Informant Christopher Steele in May 2016. More about that later. ..."
"... As Lisa Page and Peter Strzok noted in their text exchange, Ted Cruz dropping out of the race in early May was the catalyst for focusing all resources on Donald Trump. This effort, which I label, the Trump Russia covert action, involved the CIA, the NSA, the FBI and British Intelligence ..."
"... May 4, 2016, George Papadopolous forwarded to Corey Lewandowski an email from Timofeev [who was introduced to Papadopolous by Joseph Mifsud] raising the possibility of a meeting in Moscow ..."
"... May 4, 2016, FBI Informant Felix Sater followed up with Michael Cohen re Trump Tower Moscow Project: ..."
"... John Brennan convened a secret task force at CIA headquarters composed of several dozen analysts and officers from the CIA, the NSA and the FBI. ..."
"... The unit functioned as a sealed compartment, its work hidden from the rest of the intelligence community. Those brought in signed new non-disclosure agreements to be granted access to intelligence from all three participating agencies ..."
"... It was manufactured as part of a broader plan to paint Trump as a tool of Putin and a servant of Russia ..."
"... We must take a new look at the story told about the so-called Russian hack of the DNC. I believe that Crowd Strike is lying about its role and the timeline. Here is the "official" story ..."
"... We are asked to believe that the Russians were in the DNC network on the 6 th of May and that Crowd Strike knew it. But what steps did Crowd Strike take to shut down the "Russians." Short answer -- nothing until June 10 th ..."
"... The DNC emails were taken on the 25 th of May 2016. That is the last date for the DNC emails posted on Wikileaks ..."
"... CrowdStrike effort did not shut down the DNC network until 10 June. If you know on May 6 th that the "Russians" are in the network, why does any credible, competent cyber security company wait until the 10 th of June to shut the system down? ..."
"... Seth Rich, a DNC employee and Bernie Sanders supporter, downloaded the emails and then gave them to Wikileaks. Rich was in contact with Wikileaks. That is not my opinion. We know that courtesy of a FOIA request by lawyer Ty Clevenger to the NSA filed in November 2017, who requested any information regarding Seth Rich and Julian Assange. ..."
"... NSA has records of communications between Seth Rich and Julian Assange. ..."
"... the CIA had a task force set up. I believe this intelligence was communicated to the Clinton campaign and that a bogus story, with Crowd Strike in a starring role, was cooked up. Implausible? ..."
"... It was Crowd Strike with the help of the Washington Post that went public and pinned the blame on the Russians ..."
"... But that was not the only active measure in place. Christopher Steele, a fully signed up FBI informant, was hired by Fusion GPS and produced his first block buster report on June 20 th claiming Trump was under the thumb of Vladimir Putin ..."
"... Things should get very interesting with the declassification in force. Can you see the NSA/Seth Rich/Wikileaks material being made declassified as well (albeit redacted for methods, etc of course)? ..."
"... Can Barr declassify the Rich/Assange material? Also, was Skripal one of Steele's "sources"? ..."
"... Joseph Mifsud is missing in this time line. He always appeared to be the most curious player. Any reason he is left out? ..."
"... This is the second time in the past few weeks I've read about surveillance on Sanders. Is there a link to a reliable source? ..."
"... I believe it's established that a guy from the UK worked in his campaign, and is now on the Integrity Initiative payroll. And the investigation into his wife's role in the financial affairs of the college she works for seems mysteriously to have run into the sands ..."
"... Before joining Manafort in Kiev, Kliminik worked for almost a decade in Moscow for the International Republican Institute, effectively running that office for some of those years. The IRI is part of the NED/USAID network. There is no way an identified "GRU agent" would be permitted as a long time employee of such an organization. ..."
"... To avoid the conflict [of interest] President Trump designates the U.S. Attorney General as arbiter and decision-maker for the purposes of declassifying evidence within the investigation ..."
"... I realize Larry Johnson's already alluded to the existence of NSA files about communications between Seth Rich and Julian Assange, but the implications are finally sinking in as to how evil this whole mess is. ..."
"... I've always been dismissive of those who've made comments about "Arkancide" in connection with the Clintons, but I may have to revise my POV. I wonder who was involved in the process of getting rid of Mr. Rich? ..."
"... Declassify the list of persons "Samantha Powers" asked FISA courts to unmask during the 11th hours of the Obama administration. Or learn who signed her name to these requests, if in fact she did not as she claimed. ..."
"... Redstate reports the 260 FISA unmasking requests in 2016 in Samantha Power name were perhaps for an Israel Settlesment-gate; not Russiagate? https://www.redstate.com/elizabeth-vaughn/2019/05/25/samantha-powers-unmasked-260-americans-2016-soon-well-learn/ ..."
May 24, 2019 | turcopolier.typepad.com

Forget July 31, 2016 as the alleged start date for the full blown Trump counter intelligence investigation. That day is a sham. The actual campaign to paint Trump as a full fledged stooge of Russia started in early May 2016. We now know the start date thanks to the text messages between star-crossed lovers Strzok and Page and the timeline buried in the Mueller Report:

It is important to understand that the collection of intelligence on U.S. Presidential candidates was not limited to Donald Trump. The collection effort started in the summer of 2015 and included the main Republican candidates and, according to a knowledgeable source, also targeted Bernie Sanders.

Also remember that the Presidential campaign is a dynamic event that changes over time. In the summer of 2015, the conventional wisdom touted Jeb Bush as the likely nominee. But as the months passed the field narrowed. By March of 2016, Donald Trump was the leader and appeared likely to garner the nomination.

April was the turning point where the foundation for attacking Trump was being laid. The law firm, Perkins Coie, hired Fusion GPS on behalf of Hillary Clinton's campaign . Andy McMarthy reported on the details of this arrangement in October 2017:

The Clinton campaign and the DNC retained the law firm of Perkins Coie; in turn, one of its partners, Marc E. Elias, retained Fusion GPS. We don't know how much Fusion GPS was paid, but the Clinton campaign and the DNC paid $9.1 million to Perkins Coie during the 2016 campaign (i.e., between mid-2015 and late 2016).

Fusion GPS then "hired" FBI Informant Christopher Steele in May 2016. More about that later.

As Lisa Page and Peter Strzok noted in their text exchange, Ted Cruz dropping out of the race in early May was the catalyst for focusing all resources on Donald Trump. This effort, which I label, the Trump Russia covert action, involved the CIA, the NSA, the FBI and British Intelligence. How do we know? Just look at the Robert Mueller Report:

Then we have this little tidbit courtesy of the Washington Post that the CIA acted, perhaps as early as June 2016 :

John Brennan convened a secret task force at CIA headquarters composed of several dozen analysts and officers from the CIA, the NSA and the FBI.

The unit functioned as a sealed compartment, its work hidden from the rest of the intelligence community. Those brought in signed new non-disclosure agreements to be granted access to intelligence from all three participating agencies.

They worked exclusively for two groups of "customers," officials said. The first was Obama and fewer than 14 senior officials in government. The second was a team of operations specialists at the CIA, NSA and FBI who took direction from the task force on where to aim their subsequent efforts to collect more intelligence on Russia.

Investigators must get the date that this CIA task force was established. They also need to identify and interview the people who participated and were cleared to work on this task force. President Trump must understand that this was not a legitimate intelligence operation. It was weaponizing the intel community to act against a Presidential candidate. It was manufactured as part of a broader plan to paint Trump as a tool of Putin and a servant of Russia.

We must take a new look at the story told about the so-called Russian hack of the DNC. I believe that Crowd Strike is lying about its role and the timeline. Here is the "official" story

May 6, 2016, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network. (From Esquire-- Esquire Magazine offers a different timeline)

We are asked to believe that the Russians were in the DNC network on the 6 th of May and that Crowd Strike knew it. But what steps did Crowd Strike take to shut down the "Russians." Short answer -- nothing until June 10 th .

The DNC emails were taken on the 25 th of May 2016. That is the last date for the DNC emails posted on Wikileaks.

Washington Post reporter Ellen Nakashima and Esquire magazine each reported that that the CrowdStrike effort did not shut down the DNC network until 10 June. If you know on May 6 th that the "Russians" are in the network, why does any credible, competent cyber security company wait until the 10 th of June to shut the system down?

I believe this is a cover story. Here is what I think really happened.

Seth Rich, a DNC employee and Bernie Sanders supporter, downloaded the emails and then gave them to Wikileaks. Rich was in contact with Wikileaks. That is not my opinion. We know that courtesy of a FOIA request by lawyer Ty Clevenger to the NSA filed in November 2017, who requested any information regarding Seth Rich and Julian Assange. The NSA informed Clevenger in a letter dated 4 October 2018 that:

Your request has been processed under the provisions of the FOIA. Fifteen documents (32 pages) responsive to your request have been reviewed by this Agency as required by the FOIA and have found to be currently and properly classified in accordance with Executive Order 13526. These documents meet the criteria for classification as set forth in Subparagraph © of Section 1.4 and remains classified TOP SECRET and SECRET."

Former NSA Technical Director, William Binney commented on this revelation:

Ty Clevenger has FOIAed information from NSA asking for any data that involved both Seth Rich and also Julian Assange. And they responded by saying we've got 15 files, 32 pages, but they're all classified in accordance with executive order 13526 covering classification, and therefore you can't have them.

That says that NSA has records of communications between Seth Rich and Julian Assange. I mean, that's the only business that NSA is in  --  copying communications between people and devices.

We already know, as noted above, that the CIA had a task force set up. I believe this intelligence was communicated to the Clinton campaign and that a bogus story, with Crowd Strike in a starring role, was cooked up. Implausible? Not as implausible as a supposed cracker jack cyber security company waiting almost six weeks before taking common sense steps to shut down and clean the DNC servers.

It was Crowd Strike with the help of the Washington Post that went public and pinned the blame on the Russians.

But that was not the only active measure in place. Christopher Steele, a fully signed up FBI informant, was hired by Fusion GPS and produced his first block buster report on June 20 th claiming Trump was under the thumb of Vladimir Putin.

This is not a complete timeline. More remains to be discovered. But there are key facts that most of the media and punditry have ignored. Donald Trump's announcement tonight (Thursday, 23 May 2019) to start declassifying documents on the Trump counter intelligence investigation and directing the intelligence agencies to cooperate may be the final straw that ends the conspiracy of ignorance.

Posted at 07:53 AM in Larry Johnson , Russiagate | Permalink


Eric Newhill , 24 May 2019 at 10:42 AM

Larry,

Once again, thank you for the good work on this important topic. Looking forward to your future installments.

Things should get very interesting with the declassification in force. Can you see the NSA/Seth Rich/Wikileaks material being made declassified as well (albeit redacted for methods, etc of course)?

O'Shawnessey , 24 May 2019 at 11:22 AM

Can Barr declassify the Rich/Assange material? Also, was Skripal one of Steele's "sources"?

The Twisted Genius -> O'Shawnessey... , 24 May 2019 at 09:49 PM

O'Shawnessey, if the Rich/Assange material establishes communication between the two, I would expect it to be declassified to bolster the "Russia didn't do it" narrative. Even if that communication was't specifically about transferring DNC files or the actual transference of DNC files, it would be useful to Russia and/or Trump supporters.

If, OTOH, the file NSA files consist of Assange discussing the use of Rich as a useful scapegoat, the files will never see the light of day. According to what Larry has written, Clevenger asked for files with information involving Rich and Assange and did not specify communications between Assange and Rich.

Clevenger should have at least specified a cut off date. If the NSA files were produced before Rich's death, it would be a gold mine for Barr and Trump. If the documents covered the time after Rich's death, not so much.

My theory is that the Rich as leaker story is similar to the whole G2 story. They muddy the water and create chaos. Classic maskirovka.

Factotum , 24 May 2019 at 12:14 PM

Joseph Mifsud is missing in this time line. He always appeared to be the most curious player. Any reason he is left out?

Larry Johnson -> Factotum... , 24 May 2019 at 12:47 PM

If you re-read closely I reference Timofeev who was introduced to Papadopolous by MIFSUD. He's there.
Thanks for asking

Doggrotter , 24 May 2019 at 12:44 PM

Siht, I hadn't even thought about classified info on SR. I had thought about how it would be interesting if it turned out Sanders had been spied on. Seriously explosive stuff. Something about Robert Duvall using the other N word, quote from Apocalypse Now.

begob -> Doggrotter... , 25 May 2019 at 02:03 AM

This is the second time in the past few weeks I've read about surveillance on Sanders. Is there a link to a reliable source?

I believe it's established that a guy from the UK worked in his campaign, and is now on the Integrity Initiative payroll. And the investigation into his wife's role in the financial affairs of the college she works for seems mysteriously to have run into the sands.

jjc , 24 May 2019 at 02:41 PM

Before joining Manafort in Kiev, Kliminik worked for almost a decade in Moscow for the International Republican Institute, effectively running that office for some of those years. The IRI is part of the NED/USAID network. There is no way an identified "GRU agent" would be permitted as a long time employee of such an organization.

The Mueller team deliberately seeded the suspicion, and credulous journalists speculated on polling data without pause. Kliminik was, in effect, Manafort's deputy in Kiev, working very closely with him - so again for the Mueller team to suggest there was anything at all sinister in the two men holding meetings, whether tied to campaign events or not, is unfounded speculation, which should have been obvious to all.

Tidewater -> Keith Harbaugh... , 24 May 2019 at 04:32 PM

I've been waiting for that one. Next comes Papadopoulos. I think the British Fraud Act of 2006 is quite relevant to what Halper was doing. Cambridge University, Magdalene College, even Pembroke College would seem to me to be at risk for lawsuits. Fraud Act 2006 Wikipedia explains why litigation is now appropriate.

Please see: Fraud Act 2006 Wikipedia

begob -> Keith Harbaugh... , 25 May 2019 at 02:05 AM

I believe Glenn Greenwald has weighed in on this one. You should be able to find his views in an online search.

Keith Harbaugh , 24 May 2019 at 03:14 PM

Sundance provides quite a bit of information regarding Trump's declassification memorandum:

"President Trump's Declassification Directive Outlines Specific Process and Direction ." , by sundance, 2019-05-24

To avoid the conflict [of interest] President Trump designates the U.S. Attorney General as arbiter and decision-maker for the purposes of declassifying evidence within the investigation
...
[etc.]
akaPatience , 24 May 2019 at 06:41 PM

I realize Larry Johnson's already alluded to the existence of NSA files about communications between Seth Rich and Julian Assange, but the implications are finally sinking in as to how evil this whole mess is.

I've always been dismissive of those who've made comments about "Arkancide" in connection with the Clintons, but I may have to revise my POV. I wonder who was involved in the process of getting rid of Mr. Rich?

It's horrible to even ponder...

joanna -> akaPatience ... , 25 May 2019 at 12:43 PM

Wasn't there a "murder case" in DC itself? In other words do you really need to lead us down to Arkansas, murky real estate deals, drugs, extramarital relationships bordering on rapes and other shady associate networks? But I agree, suicided may not fit all too well.

ex-PFC Chuck , 24 May 2019 at 09:41 PM

I am struck by the irony of the Trump administration is prosecuting Julian Assange under the Espionage Act for actions that are common journalistic practices, while simultaneously conducting an investigation that is closing in on malefactors of high position for probable actions that threaten the very core of our democracy and which in all likelihood would still be unknown to the public were it not for the work of that same heterodox journalist.

Ghost Ship -> ex-PFC Chuck... , 26 May 2019 at 05:56 AM

I suspect that the Trump government really doesn't want Assange extradited but feels it has to be seen to have gone through the motions. 17+ indictments might be effective in the American judicial system but here in good old Blighty it's way too many and they might all be thrown out as being oppressive.
But then again the Conservative government after Brexit will be a bunch of craven shits desperate for a trade deal from Trump and will reply "how high" when he says jump.

Factotum , 24 May 2019 at 10:53 PM

Declassify the list of persons "Samantha Powers" asked FISA courts to unmask during the 11th hours of the Obama administration. Or learn who signed her name to these requests, if in fact she did not as she claimed.

walrus , 25 May 2019 at 07:53 PM

I'm concerned that Assange may not live long enough to stand trial because he is capable of closing too many open investigations.

Factotum , 25 May 2019 at 11:56 PM

Redstate reports the 260 FISA unmasking requests in 2016 in Samantha Power name were perhaps for an Israel Settlesment-gate; not Russiagate? https://www.redstate.com/elizabeth-vaughn/2019/05/25/samantha-powers-unmasked-260-americans-2016-soon-well-learn/

[May 13, 2019] US Foreign Policy as Bellicose as Ever by Serge Halimi

Highly recommended!
Notable quotes:
"... Historians will study this period when there was a convergence in the objectives of the US intelligence agencies, the leaders of the Hillary Clinton wing of the Democratic Party, the majority of Republican politicians and the anti-Trump media. That common objective was stopping any entente between Moscow and Washington. ..."
"... Each group had its own motive. The intelligence community and elements in the Pentagon feared a rapprochement between Trump and Putin would deprive them of a 'presentable' enemy once ISIS's military power was destroyed. The Clinton camp was keen to ascribe an unexpected defeat to a cause other than the candidate and her inept campaign; Moscow's alleged hacking of Democratic Party emails fitted the bill. And the neocons, who 'promoted the Iraq war, detest Putin and consider Israel's security non-negotiable' ( 8 ), hated Trump's neo-isolationist instincts. ..."
"... This is why the Democratic Party data hack, which the US intelligence services allege is the work of the Russians, obsesses the party, and the press. It strikes two targets: delegitimising Trump's election and stopping his promotion of a thaw with Russia. Has Washington's aggrieved reaction to a foreign power's interference in a state's domestic affairs, and its elections, struck no one as odd? Why do just a handful of people point out that, not long ago, Angela Merkel's phone was tapped not by the Kremlin but by the Obama administration? ..."
"... Now the Times is in the vanguard of those preparing psychologically for conflict with Russia. There is almost no remaining resistance to its line. On the right, as the Wall Street Journal called for the US to arm Ukraine on 3 August, Vice-President Mike Pence spoke on a visit to Estonia about 'the spectre of [Russian] aggression', encouraged Georgia to join NATO, and paid tribute to Montenegro, NATO's newest member. ..."
"... At this stage, it doesn't matter any more what Trump thinks. He is no longer able to get his way on the issue. Moscow has noted this and is drawing its own conclusions. ..."
May 10, 2019 | www.counterpunch.org

... ... ...

Trump was after a good deal from Russia. A new partnership would have reversed deteriorating relations between the powers by encouraging their alliance against ISIS and recognising the importance of Ukraine to Russia's security. Current US paranoia about everything Kremlin-related has encouraged amnesia about what President Barack Obama said in 2016, after the annexation of the Crimea and Russia's direct intervention in Syria. He too put the danger posed by President Vladimir Putin into perspective: the interventions in Ukraine and the Middle East were, Obama said, improvised 'in response to a client state that was about to slip out of his grasp' ( 5 ).

Obama went on: 'The Russians can't change us or significantly weaken us. They are a smaller country, they are a weaker country, their economy doesn't produce anything that anybody wants to buy, except oil and gas and arms.' What he feared most about Putin was the sympathy he inspired in Trump and his supporters: '37% of Republican voters approve of Putin, the former head of the KGB. Ronald Reagan would roll over in his grave' ( 6 ).

By January 2017, Reagan's eternal rest was no longer threatened. 'Presidents come and go but the policy never changes,' Putin concluded ( 7 ). Historians will study this period when there was a convergence in the objectives of the US intelligence agencies, the leaders of the Hillary Clinton wing of the Democratic Party, the majority of Republican politicians and the anti-Trump media. That common objective was stopping any entente between Moscow and Washington.

Each group had its own motive. The intelligence community and elements in the Pentagon feared a rapprochement between Trump and Putin would deprive them of a 'presentable' enemy once ISIS's military power was destroyed. The Clinton camp was keen to ascribe an unexpected defeat to a cause other than the candidate and her inept campaign; Moscow's alleged hacking of Democratic Party emails fitted the bill. And the neocons, who 'promoted the Iraq war, detest Putin and consider Israel's security non-negotiable' ( 8 ), hated Trump's neo-isolationist instincts.

The media, especially the New York Times and Washington Post, eagerly sought a new Watergate scandal and knew their middle-class, urban, educated readers loathe Trump for his vulgarity, affection for the far right, violence and lack of culture ( 9 ). So they were searching for any information or rumour that could cause his removal or force a resignation. As in Agatha Christie's Murder on the Orient Express, everyone had his particular motive for striking the same victim.

The intrigue developed quickly as these four areas have fairly porous boundaries. The understanding between Republican hawks such as John McCain, chairman of the Senate Armed Services Committee, and the military-industrial complex was a given. The architects of recent US imperial adventures, especially Iraq, had not enjoyed the 2016 campaign or Trump's jibes about their expertise. During the campaign, some 50 intellectuals and officials announced that, despite being Republicans, they would not support Trump because he 'would put at risk our country's national security and wellbeing.' Some went so far as to vote for Clinton ( 10 ).

Ambitions of a 'deep state'?

The press feared that Trump's incompetence would threaten the US-dominated international order. It had no problem with military crusades, especially when emblazoned with grand humanitarian, internationalist or progressive principles. According to the press criteria, Putin and his predilection for rightwing nationalists were obvious culprits. But so were Saudi Arabia or Israel, though that did not prevent the Saudis being able to count on the ferociously anti-Russian Wall Street Journal, or Israel enjoying the support of almost all US media, despite having a far-right element in its government.

Just over a week before Trump took office, journalist Glenn Greenwald, who broke the Edward Snowden story that revealed the mass surveillance programmes run by the National Security Agency, warned of the direction of travel. He observed that the US media had become the intelligence services' 'most valuable instrument, much of which reflexively reveres, serves, believes, and sides with hidden intelligence officials.' This at a time when 'Democrats, still reeling from their unexpected and traumatic election loss as well as a systemic collapse of their party, seemingly divorced further and further from reason with each passing day, are willing -- eager -- to embrace any claim, cheer any tactic, align with any villain, regardless of how unsupported, tawdry and damaging those behaviours might be' ( 11 ).

The anti-Russian coalition hadn't then achieved all its objectives, but Greenwald already discerned the ambitions of a 'deep state'. 'There really is, at this point,' he said 'obvious open warfare between this unelected but very powerful faction that resides in Washington and sees presidents come and go, on the one hand, and the person that the American democracy elected to be the president on the other.' One suspicion, fed by the intelligence services, galvanised all Trump's enemies: Moscow had compromising secrets about Trump -- financial, electoral, sexual -- capable of paralysing him should a crisis between the two countries occur ( 12 ).

Covert opposition to Trump

The suspicion of such a murky understanding, summed up by the pro-Clinton economist Paul Krugman as a 'Trump-Putin ticket', has transformed the anti-Russian activity into a domestic political weapon against a president increasingly hated outside the ultraconservative bloc. It is no longer unusual to hear leftwing activists turn FBI or CIA apologists, since these agencies became a home for a covert opposition to Trump and the source of many leaks.

This is why the Democratic Party data hack, which the US intelligence services allege is the work of the Russians, obsesses the party, and the press. It strikes two targets: delegitimising Trump's election and stopping his promotion of a thaw with Russia. Has Washington's aggrieved reaction to a foreign power's interference in a state's domestic affairs, and its elections, struck no one as odd? Why do just a handful of people point out that, not long ago, Angela Merkel's phone was tapped not by the Kremlin but by the Obama administration?

The silence was once broken when the Republican representative for North Carolina, Tom Tillis, questioned former CIA director James Clapper in January: 'The United States has been involved in one way or another in 81 different elections since World War II. That doesn't include coups or the regime changes, some tangible evidence where we have tried to affect an outcome to our purpose. Russia has done it some 36 times.' This perspective rarely disturbs the New York Times 's fulminations against Moscow's trickery.

The Times also failed to inform younger readers that Russia's president Boris Yeltsin, who picked Putin as his successor in 1999, had been re-elected in 1996, though seriously ill and often drunk, in a fraudulent election conducted with the assistance of US advisers and the overt support of President Bill Clinton. The Times hailed the result as 'a victory for Russian democracy' and declared that 'the forces of democracy and reform won a vital but not definitive victory in Russia yesterday For the first time in history, a free Russia has freely chosen its leader.'

Now the Times is in the vanguard of those preparing psychologically for conflict with Russia. There is almost no remaining resistance to its line. On the right, as the Wall Street Journal called for the US to arm Ukraine on 3 August, Vice-President Mike Pence spoke on a visit to Estonia about 'the spectre of [Russian] aggression', encouraged Georgia to join NATO, and paid tribute to Montenegro, NATO's newest member.

No longer getting his way

But the Times, far from worrying about these provocative gestures coinciding with heightened tensions between great powers (trade sanctions against Russia, Moscow's expulsion of US diplomats), poured oil on the fire. On 2 August it praised the reaffirmation of 'America's commitment to defend democratic nations against those countries that would undermine them' and regretted that Mike Pence's views 'aren't as eagerly embraced and celebrated by the man he works for back in the White House.'

At this stage, it doesn't matter any more what Trump thinks. He is no longer able to get his way on the issue. Moscow has noted this and is drawing its own conclusions.

... ... ...

[May 11, 2019] Doug Ross @ Journal A TIMELINE OF TREASON How the DNC and FBI Leadership Tried to Fix a Presidential Election [Updated]

Highly recommended!
This was clearly an attempt to entrap Trump in connections to Russia and fuel anti-Russian hysteria and defense spending. Both goals were accomplished under Trump without much resistance. Still Russiagate persists. Why?
Notable quotes:
"... 05/03/16 Email from DNC contractor Ali Chalupa states she connected Michael Isikoff of Yahoo News "to the Ukrainians" DNC https://wikileaks.org/dnc-emails/emailid/3962 ..."
"... 05/15/16 Crowdstrike claims it investigated DNC hacking and that Russians were responsible; FBI still denied access to server to confirm Crowdstrike https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/ ..."
Jan 04, 2018 | directorblue.blogspot.com
  1. Date Description Source Link
  2. 07/23/14 House Select Committee on Benghazi reaches agreement with State Dept. to produce Clinton emails relevant to their investigation USNews https://www.usnews.com/news/articles/2016-09-19/paul-combetta-computer-specialist-who-deleted-hillary-clinton-emails-may-have-asked-reddit-for-tips
  3. 07/24/14 Clinton IT aide Paul Combetta, using the alias "stonetear", requests assistance on Reddit for deleting VIP email addresses USNews https://www.usnews.com/news/articles/2016-09-19/paul-combetta-computer-specialist-who-deleted-hillary-clinton-emails-may-have-asked-reddit-for-tips
  4. 10/15/14 Clinton team instructs Datto to begin purging emails from their backup storage devices, which they apparently failed to do Exam http://www.washingtonexaminer.com/clintons-tech-firm-worried-about-involvement-in-cover-up/article/2573526
  5. 03/02/15 News that Hillary Clinton exclusively used a private email server for official State Dept. business is disclosed in the New York Times NYT https://www.nytimes.com/2015/03/03/us/politics/hillary-clintons-use-of-private-email-at-state-department-raises-flags.html
  6. 03/03/15 Clinton aides call Platte River Networks, which operated her email server, to confirm all emails were deleted per their 2014 order NYT https://www.nytimes.com/2016/09/09/us/politics/hillary-clinton-emails-investigation.html?_r=1&mtrref=undefined
  7. 03/09/15 Clinton associate Terry McCauliffe meets with Andrew McCabe's wife Jill to encourage her to run for office JW https://www.judicialwatch.org/press-room/press-releases/judicial-watch-new-fbi-records-show-fbi-leaderships-conflicts-interest-discussions-clinton-email-investigation/
  8. 03/12/15 Jill McCabe announces her candidacy for the state senate in Virginia JW https://www.judicialwatch.org/press-room/press-releases/judicial-watch-new-fbi-records-show-fbi-leaderships-conflicts-interest-discussions-clinton-email-investigation/
  9. 03/31/15 Clinton IT specialist Paul Combetta realizes he had not deleted all of Clinton's emails, uses BleachBit software to do so Politico https://www.politico.com/story/2016/09/best-of-clinton-fbi-report-227692
  10. 05/19/15 DOJ official Peter Kadzik, writing from personal email account, emails John Podesta to warn of House probe into Clinton's emails Wikileaks https://wikileaks.org/podesta-emails/emailid/43150
  11. 06/24/15 Discovery of classified information on Clinton's private email server announced; the matter is referred to the FBI Time http://time.com/4774278/james-comey-fired-timeline/
  12. 07/15/15 FBI opens criminal investigation into Clinton's email server and mishandling of classified data led by Andrew McCabe in DC office FBI https://vault.fbi.gov/october-2016-application-affidavit-and-search-warrant-related-to-email-server-investigation/October%202016%20Application%20Affidavit%20and%20Search%20Warrant%20Related%20to%20Email%20Server%20Investigation%20Part%2001%20of%2001
  13. 07/20/15 DOJ DAG Sally Yates writes to Inspector General, saying the National Security Division of DOJ is not subject to IG review DOJ https://www.ignet.gov/sites/default/files/files/OLC%20IG%20Act%20Opinion%20-%207-20-15%20.pdf
  14. 07/24/15 State Dept. and other officials make security referral related to classified information possessed by Clinton and associates WaPo https://www.washingtonpost.com/news/fact-checker/wp/2017/10/20/timeline-james-comeys-decision-making-on-the-clinton-probe/?utm_term=.0cead386f5ef
  15. 07/24/15 After complaints from Clinton camp, New York Times edits story about email probe, removing "criminal" references TheWrap https://www.thewrap.com/new-york-times-alters-hillary-clinton-story-in-response-to-complaints-we-received-from-the-clinton-camp/
  16. 08/15/15 McCabe uses his official FBI email to promote his wife's candidacy for the State Senate in Virginia JW https://www.judicialwatch.org/document-archive/jw-v-doj-mccabe-2-production-01494-pg-24-25/
  17. 10/01/15 FBI official Andrew McCabe's wife Jill starts receiving bulk of $700,000 from Clinton associate Gov. Terry McCauliffe's political entities Ballotopedia https://ballotpedia.org/Jill_McCabe https://truepundit.com/fbi-director-lobbied-against-criminal-charges-for-hillary-after-clinton-insider-paid-his-wife-700k/
  18. 10/03/15 FBI seizes the Platte River Networks server as well as the "Pagliano" server, which were used to host Clinton email services Thompson http://www.thompsontimeline.com/tag/david-kendall/
  19. 10/05/15 FBI's Strzok sends letter to Datto, Inc. demanding the newly discovered backup server be turned over DOJ https://twitter.com/TruthinGov2016/status/945115416736796673
  20. 10/06/15 FBI receives backup of Clinton emails held by Datto, Inc. (possibly claimed by Agent Strzok) McClatchy http://www.mcclatchydc.com/news/nation-world/national/article37968711.html
  21. 10/15/15 On or around this date, McCabe emails investigators that Clinton will get an "HQ Special" (special or lenient treatment) Fox https://twitter.com/FoxNews/status/944439946416340992
  22. 10/11/15 On 60 Minutes , President Obama absolves Hillary Clinton of blame for her private email server: did not pose "a national security problem" CNN http://www.cnn.com/2015/10/11/politics/barack-obama-60-minutes-hillary-clinton/index.html
  23. 01/15/16 John Giacalone, head of FBI's National Security Division, retires after reportedly seeing Clinton probe go "sideways" TruePundit https://truepundit.com/fbi-director-lobbied-against-criminal-charges-for-hillary-after-clinton-insider-paid-his-wife-700k/
  24. 01/19/16 Intelligence Community Inspector General reports Clinton's private email server had SAP (highest classification level) data on it Fox http://www.foxnews.com/politics/2016/01/19/inspector-general-clinton-emails-had-intel-from-most-secretive-classified-programs.html
  25. 01/29/16 FBI director James Comey names Andrew McCabe deputy director, with responsibility for oversight of Clinton investigation FBI https://www.fbi.gov/news/pressrel/press-releases/andrew-mccabe-named-deputy-director-of-the-fbi
  26. 02/15/16 State Dept. finds that 2,115 of the 30,490 emails produced by Clinton were classified and therefore grossly mishandled FBI https://vault.fbi.gov/october-2016-application-affidavit-and-search-warrant-related-to-email-server-investigation/October%202016%20Application%20Affidavit%20and%20Search%20Warrant%20Related%20to%20Email%20Server%20Investigation%20Part%2001%20of%2001
  27. 03/04/16 FBI's Peter Strzok texts his mistress Lisa Page, an FBI attorney, calling Trump "an idiot", whose nomination would be "good for Hillary" DC http://dailycaller.com/2017/12/14/strzoks-texts-and-the-clinton-trump-investigations-a-definitive-timeline/
  28. 03/06/16 Former Hillary State Dept. representative George Papadopoulos learns he will join Trump campaign as a low-level foreign policy adviser DOJ https://www.justice.gov/file/1007346/download
  29. 03/15/16 Between this date and 9/15/16, Papadopoulos tries 6 times to arrange meetings between Trump campaign and Russians, all are rejected ABC http://abcnews.go.com/Politics/us-russian-businessman-source-key-trump-dossier-claims/story?id=45019603
  30. 03/19/16 Hackers gain access to emails of Democrat operative John Podesta CNN http://www.cnn.com/2017/11/14/politics/donald-trump-jr-wikileaks-timeline/index.html
  31. 03/28/16 Paul Manafort hired as Trump campaign manager (Fusion GPS's Simpson and wife had reported on Manafort's Russian ties in 2008) Tablet http://www.tabletmag.com/jewish-news-and-politics/251897/obama-steele-dossier-russiagate
  32. 04/05/16 FBI's Strzok interviews Clinton aide Huma Abedin DC http://dailycaller.com/2017/12/14/strzoks-texts-and-the-clinton-trump-investigations-a-definitive-timeline/
  33. 04/09/16 FBI's Strzok interviews Clinton aide Cheryl Mills DC http://dailycaller.com/2017/12/14/strzoks-texts-and-the-clinton-trump-investigations-a-definitive-timeline/
  34. 04/12/16 Law firm Perkins Coie, using money from the Clinton campaign and DNC, hires Fusion GPS to find incriminating data on Trump FEC http://dailycaller.com/2017/10/28/finally-a-definitive-timeline-showing-when-clinton-dnc-started-the-russian-dossier/
  35. 04/19/16 Wife of Fusion GPS founder Simpson, Mary Jacoby, visits White House and meets with Obama and/or Obama aides CTH https://theconservativetreehouse.com/2017/12/21/oh-dear-trail-of-russian-dossier-origination-now-directly-leads-to-the-obama-white-house/
  36. 04/25/16 Obama campaign organization makes first of its payments to Perkins Coie (OFA payments to firm would total $972,000) FEC http://thefederalist.com/2017/10/29/obamas-campaign-gave-972000-law-firm-funneled-money-fusion-gps/#.WjwY4L_iThg.twitter
  37. 04/25/16 FBI's James Baker and DOJ's FISA attorneys visit White House for two back-to-back meetings White House https://twitter.com/ckadoodldooUS/status/944982488497172482
  38. 04/26/16 Low-level Trump staffer George Papadopoulos meets with Russian contact in London and is reportedly offered "dirt" on Clinton NRO http://www.nationalreview.com/article/453264/donald-trump-george-papadopoulos-indictment-exculpatory-trump
  39. 04/30/16 DNC IT staff reports suspected hacking on its server(s) to FBI, but fails to turn over the server to the agency, instead hires Crowdstrike Politico https://www.politico.com/story/2016/06/russian-government-hackers-broke-into-dnc-servers-stole-trump-oppo-224315
  40. 05/02/16 FBI director Comey drafts statement exonerating Clinton before interviewing her or other key witnesses WaPo https://www.washingtonpost.com/news/fact-checker/wp/2017/10/20/timeline-james-comeys-decision-making-on-the-clinton-probe/?utm_term=.0cead386f5ef
  41. 05/03/16 Trump becomes the presumptive Republican nominee for the office of president Wikipedia https://en.wikipedia.org/wiki/Donald_Trump%E2%80%93Russia_dossier
  42. 05/03/16 Clinton IT specialist Paul Combetta admits lying to the FBI about erasing emails using BleachBit but is not charged for the crime WaPo https://www.washingtonpost.com/news/fact-checker/wp/2017/10/20/timeline-james-comeys-decision-making-on-the-clinton-probe/?utm_term=.0cead386f5ef
  43. 05/03/16 Email from DNC contractor Ali Chalupa states she connected Michael Isikoff of Yahoo News "to the Ukrainians" DNC https://wikileaks.org/dnc-emails/emailid/3962
  44. 05/05/16 FBI's Lisa Page and James Baker meet with Obama deputy at White House, likely topic is forthcoming FISA request White House https://twitter.com/ckadoodldooUS/status/944982488497172482
  45. 05/05/16 Washington Post reports there is "scant evidence" of a crime committed by Clinton through her use of a private email server WaPo https://www.washingtonpost.com/news/fact-checker/wp/2017/10/20/timeline-james-comeys-decision-making-on-the-clinton-probe/?utm_term=.0cead386f5ef
  46. 05/15/16 Crowdstrike claims it investigated DNC hacking and that Russians were responsible; FBI still denied access to server to confirm Crowdstrike https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/
  47. 05/16/16 Draft statement by FBI directory Comey exonerating Clinton, before key interviews, is circulated to FBI leadership WaPo https://www.washingtonpost.com/news/fact-checker/wp/2017/10/20/timeline-james-comeys-decision-making-on-the-clinton-probe/?utm_term=.0cead386f5ef
  48. 05/15/16 Nellie Ohr, wife of DOJ executive Bruce Ohr, is secretly hired by Fusion GPS, presumably to work on Russian "Dossier" Fox http://www.foxnews.com/politics/2017/12/11/wife-demoted-doj-official-worked-for-firm-behind-anti-trump-dossier.html
  49. 05/21/16 According to Mueller investigation, Trump campaign official refuses Papadopoulos offer to broker meetings with Russian officials NRO http://www.nationalreview.com/article/453264/donald-trump-george-papadopoulos-indictment-exculpatory-trump
  50. 05/23/16 Nellie Ohr applies for HAM radio license, presumably to create covert communication channel and avoid government surveillance FCC http://wireless2.fcc.gov/UlsApp/LicArchive/license.jsp?archive=Y&licKey=12382876
  51. 06/04/16 Ellen Nakashima of the Washington Post reports, via anonymous sources, that Russians hacked the DNC WaPo https://www.washingtonpost.com/world/national-security/russian-government-hackers-penetrated-dnc-stole-opposition-research-on-trump/2016/06/14/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html?hpid=hp_no-name_no-name:page/breaking-news-bar&tid=a_breakingnews&utm_term=.94b04ef12773
  52. 06/09/16 Donald Trump Jr. meets with Russian attorney after being lured by the promise of opposition research NYT https://www.nytimes.com/2017/07/08/us/politics/trump-russia-kushner-manafort.html
  53. 06/09/16 After meeting with Bernie Sanders in White House, President Obama endorses Hillary Clinton USA Today https://www.usatoday.com/story/news/politics/elections/2016/2016/06/09/barack-obama-bernie-sanders-hillary-clinton-democratic-party/85639104/
  54. 06/12/16 Wikileaks' Assange warns that Clinton emails will be leaked ITV http://www.itv.com/news/update/2016-06-12/assange-on-peston-on-sunday-more-clinton-leaks-to-come/
  55. 06/15/16 Ex-MI-6 agent Christopher Steele is hired by Hillary Clinton's campaign through Fusion GPS, according to UK court filings UK https://drive.google.com/file/d/0Bzgzy2KXyxqtVUxEb2pwRmphOXM/view?usp=sharing
  56. 06/15/16 Romanian hacker "Guccifer" claims to have hacked DNC; analysis indicates faux "Russian" fingerprints were inserted into some files The Nation https://www.washingtonpost.com/world/national-security/guccifer-20-claims-credit-for-dnc-hack/2016/06/15/abdcdf48-3366-11e6-8ff7-7b6c1998b7a0_story.html?utm_term=.b2fbd3eadc9c
  57. 06/15/16 FBI agent Peter Strzok changes wording of Clinton charges from criminal designation "grossly negligent" to "extremely careless" Fox http://www.foxnews.com/politics/2017/12/04/fbi-agent-fired-from-russia-probe-oversaw-flynn-interviews-changed-comey-memos-on-clinton-charges.html
  58. 06/20/16 Fusion GPS contractor Christopher Steele releases first memo related to Russian "Dossier" DC http://dailycaller.com/2017/10/28/finally-a-definitive-timeline-showing-when-clinton-dnc-started-the-russian-dossier/
  59. 06/27/16 A.G. Loretta Lynch secretly meets with Bill Clinton on an airport tarmac; they later deny discussing the investigation Time http://time.com/4774278/james-comey-fired-timeline/
  60. 07/02/16 Clinton interviewed by FBI and Peter Strzok for 3.5 hours; she is not placed under oath nor recorded WaPo https://www.washingtonpost.com/news/fact-checker/wp/2017/10/20/timeline-james-comeys-decision-making-on-the-clinton-probe/?utm_term=.0cead386f5ef
  61. 07/05/16 FISA Court denies FBI request for surveillance of Trump campaign NRO http://www.nationalreview.com/article/443768/obama-fisa-trump-wiretap
  62. 07/05/16 Fusion GPS contractor Christopher Steele shares Russian "Dossier" with the FBI DC http://dailycaller.com/2017/10/28/finally-a-definitive-timeline-showing-when-clinton-dnc-started-the-russian-dossier/
  63. 07/05/16 FBI director Comey announces he does not recommend charges against Hillary Clinton for use of her email server Time http://time.com/4774278/james-comey-fired-timeline/
  64. 07/05/16 Romanian hacker "Guccifer" claims to have hacked DNC again The Nation https://www.washingtonpost.com/world/national-security/guccifer-20-claims-credit-for-dnc-hack/2016/06/15/abdcdf48-3366-11e6-8ff7-7b6c1998b7a0_story.html?utm_term=.b2fbd3eadc9c
  65. 07/05/16 Date that forensics indicate that DNC emails were copied by an insider via USB and not hacked via external actors The Nation https://www.thenation.com/article/a-new-report-raises-big-questions-about-last-years-dnc-hack/
  66. 07/06/16 A.G. Loretta Lynch accepts Comey's recommendation not to charge Clinton for mishandling classified information USA Today https://www.usatoday.com/story/news/politics/onpolitics/2017/06/07/james-comey-testimony-a-timeline-fbi/102581874/
  67. 07/10/16 DNC staffer Seth Rich murdered in as yet unsolved case Wikipedia https://en.wikipedia.org/wiki/Murder_of_Seth_Rich
  68. 07/22/16 Wikileaks releases archive of emails stolen from Democrat National Committee (DNC) that show undermining of Sanders campaign Wikipedia https://en.wikipedia.org/wiki/2016_Democratic_National_Committee_email_leak
  69. 07/24/16 Debbie Wasserman Schultz resigns as Chair of DNC due to Wikileaks revelations about Sanders WaPo https://www.washingtonpost.com/politics/hacked-emails-cast-doubt-on-hopes-for-party-unity-at-democratic-convention/2016/07/24/a446c260-51a9-11e6-b7de-dfe509430c39_story.html?utm_term=.d6ba79f39f23
  70. 07/24/16 Clinton aide Robbie Mook claims Russians hacked DNC and Clinton campaign to aid Trump Politico https://www.politico.com/story/2016/07/robby-mook-russians-emails-trump-226084
  71. 07/25/16 Wikileaks' Assange says he timed release of DNC emails to impact convention; says "no one" knows who provided emails NYT https://www.nytimes.com/2016/07/27/us/politics/assange-timed-wikileaks-release-of-democratic-emails-to-harm-hillary-clinton.html
  72. 07/25/16 FBI announces it will investigate the DNC hack revealed by Wikileaks, Peter Strzok handpicked to lead investigation Wikipedia https://en.wikipedia.org/wiki/2016_Democratic_National_Committee_email_leak
  73. 07/30/16 FBI opens counterintelligence investigation into possible Russian "collusion" with Trump campaign led bt Peter Strzok DC http://dailycaller.com/2017/10/28/finally-a-definitive-timeline-showing-when-clinton-dnc-started-the-russian-dossier/
  74. 08/06/16 FBI investigator Strzok texts mistress about a "menace", presumably meaning Trump DC http://dailycaller.com/2017/12/14/strzoks-texts-and-the-clinton-trump-investigations-a-definitive-timeline/
  75. 08/10/16 Bernie Sanders reported to have purchased a $575,000 lakeside home WaPo https://www.washingtonpost.com/news/reliable-source/wp/2016/08/10/bernie-sanders-buys-a-half-million-dollar-vacation-home-and-the-internet-cries-hypocrisy/?utm_term=.63d263792364
  76. 08/10/16 Washington Post implies John Brennan may have shared "Dossier" with President Obama around this date WaPo https://www.washingtonpost.com/graphics/2017/world/national-security/obama-putin-election-hacking/?utm_term=.fcda779022f5
  77. 08/15/16 FBI investigator Strzok texts mistress about needing an "insurance policy" against Trump CNN https://amp.cnn.com/cnn/2017/12/12/politics/peter-strzok-texts-released/index.html?__twitter_impression=true
  78. 08/16/16 FBI writes Congress defending decision not to prosecute Clinton, stating it was 'extreme carelessness' and not 'gross negligence' WaPo https://www.washingtonpost.com/news/post-politics/wp/2017/05/09/comey-timeline-everything-that-led-up-to-his-firing/?utm_term=.1d521047582b
  79. 08/17/16 On this day, NBC's Dilanian, Windrem, Arkin report claim M. Flynn clashed with intel officials during initial briefing with Trump team NBC https://www.nbcnews.com/politics/2016-election/u-s-official-donald-trump-s-body-language-claim-doesn-n644856
  80. 08/25/16 CIA director James Brennan informs Senate Minority Leader Harry Reid about possible Russian "collusion" with Trump campaign DC http://dailycaller.com/2017/10/28/finally-a-definitive-timeline-showing-when-clinton-dnc-started-the-russian-dossier/
  81. 08/27/16 Reid sends a letter to Comey referencing allegations made about Carter Page in the dossier DC http://dailycaller.com/2017/12/14/strzoks-texts-and-the-clinton-trump-investigations-a-definitive-timeline/
  82. 09/05/16 Hillary Clinton accuses Russia of interfering with U.S. election NYT https://www.nytimes.com/2016/09/06/us/politics/hillary-clinton-russia.html
  83. 09/08/16 NYT reports that Paul Combetta, Clinton's IT specialist, mass-deleted emails from her server in spite of records preservation request NYT https://www.nytimes.com/2016/09/09/us/politics/hillary-clinton-emails-investigation.html?_r=1&mtrref=undefined
  84. 09/15/16 Papadoulos emails Russian contact Boris Epshteyn trying to connect him with Sergei Millian, author of much of the Fusion GPS "Dossier" WaPo https://www.washingtonpost.com/politics/for-low-level-volunteer-papadopoulos-sought-high-profile-as-trump-adviser/2