Softpanorama

May the source be with you, but remember the KISS principle ;-)
Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and  bastardization of classic Unix

FBI and CIA contractor Crowdstrike and a very suspicious DNC leak saga

Can  Cozy Bear, Fancy Bear  be codewords for CIA false flag operation ?
Did Crowdstrike injected malware from CIA collection in DNC servers to implicate Russians?

News CIA hacking and false flag cyber operations Russiagate -- a color revolution against Trump Recommended Links Vault 7 scandal DNC "emails leak into Russian hack" false flag Do the US intelligence agencies attempt to influence the US Presidential elections ? Strzok-gate Andrew McCabe and his close circle of "fighters with organized crime"
Fake News scare and US NeoMcCartyism The problem of control of intelligence services in democratic societies Anti-Russian hysteria in connection emailgate and DNC leak Coordinated set of leaks as a color revolution tool Brennan elections machinations Hillary Clinton email scandal Anti Trump Hysteria Attempts to entrap Trump FBI Mayberry Machiavellians
Nation under attack meme The Deep State National Security State  American Exceptionalism  Media-Military-Industrial Complex Neoliberalism as Trotskyism for the rich Neocolonialism as Financial Imperialism Bernie Sanders betrayal of his supporters History of American False Flag Operations
Amorality and criminality of neoliberal elite  Audacious Oligarchy and "Democracy for Winners" Myth about intelligent voter Trump vs. Deep State Did Obama order wiretaps of Trump conversations Michael Flynn Doublespeak New American Militarism Bait and Switch
Deception as an art form The Iron Law of Oligarchy Principal-agent problem Neoliberalism Neocon foreign policy is a disaster for the USA Non-Interventionism Skeptic Quotations Humor Etc

As of Jan 12, 2018 it is clear that  Russiagate became FBI-gate -- an attempt of FBI brass  to subvert the US Presidential elections in favor of Hillary Clinton. And Ray McGovern  played an important role in this making this fact public, first of all discrediting the idea of DNC hack (which was actually an internal leak) which logically led to the analyses of Crowdstrike role and the hypothesis that Crowdstrike injected malware from CIA collection in DNC server(s) and later discovered it implicate Russians.  Performing  a classic false flag operation. See The FBI Hand Behind Russia-gate by Ray McGovern

We suddenly have documentary proof that key elements of the U.S. intelligence community were trying to short-circuit the U.S. democratic process. And that puts in a new and dark context the year-long promotion of Russia-gate. It now appears that it was not the Russians trying to rig the outcome of the U.S. election, but leading officials of the U.S. intelligence community, shadowy characters sometimes called the Deep State.

Ironically, the Strzok-Page texts provide something that the Russia-gate investigation has been sorely lacking: first-hand evidence of both corrupt intent and action. After months of breathless searching for "evidence" of Russian-Trump collusion designed to put Trump in the White House, what now exists is actual evidence that senior officials of the Obama administration colluded to keep Trump out of the White House – proof of what old-time gumshoes used to call "means, motive and opportunity."

Even more unfortunately for Russia-gate enthusiasts, the FBI lovers' correspondence provides factual evidence exposing much of the made-up "Resistance" narrative – the contrived storyline that The New York Times and much of the rest of the U.S. mainstream media deemed fit to print with little skepticism and few if any caveats, a scenario about brilliantly devious Russians that not only lacks actual evidence – relying on unverified hearsay and rumor – but doesn't make sense on its face.

The Russia-gate narrative always hinged on the preposterous notion that Russian President Vladimir Putin foresaw years ago what no American political analyst considered even possible, the political ascendancy of Donald Trump. According to the narrative, the fortune-telling Putin then risked creating even worse tensions with a nuclear-armed America that would – by all odds – have been led by a vengeful President Hillary Clinton.

 

Crowdstike and it founder are very interesting people indeed. This unknown to anybody startup managed to attact key people from FBI cyber intelligence unit.

CrowdStrike has brought on board senior FBI executives, such as Shawn Henry, former executive assistant director (EAD) of the FBI's Criminal, Cyber, Response and Services Branch, and Steve Chabinsky, former deputy assistant director of the FBI's Cyber Division. CrowdStrike has received $256 million in funding from Warburg Pincus, Accel Partners, and Google Capital.

There is a lot of information about both  founders George Kurtz and Dmirty Alperovich on Youtube (See Recommended Links). Alperovich is CTO so juggling him allow to judge the levle of the firm. There are a dozen or so of him presentations I think. Which allow to create some level of understanding what this guy is about.  The things that he is talking about make sense. But he of course he exaggerates and distort like a real slick marketer. In no way this is a "technical guru" type.

Note: in 2017 Alperovich is just 37. That's amazing career in a very difficult field. In which you need many-many years just to learn  networking protocols. So he probably do not know much outside narrow field of email and webmail.   And he did not study much iether. Alperovitch earned a M.S. in information security in 2003 and a B.S. in computer science in 2001, both from Georgia Institute of Technology. While BS in computer science from GeorgTech usually means that the guy is not an idiot, people who try to get MS in information  security are usually second-rate from the computer science perspective.  So he is not a bright star in computer science iether. All his career he was limited to Apple and Windows, which also limit person in a certain way.  So in comparison with top cybersecurity guys from FBI or CIA he probably is just a slick careerist with penchant of self-promotion and marketing.  Pretty reckless guy Dmitri Alperovitch - Offense as the Best Defense - AusCERT2013 - YouTube
He is pretty slick presenter, I give that to him.
 I wonder who sponsored him, as on his own he probably was unable to climb so fact so quickly on the management ladder.

CrowdStrike - Wikipedia

CrowdStrike, Inc. is an American cybersecurity technology company based in Sunnyvale, California, and a wholly owned subsidiary of CrowdStrike Holdings, Inc. The company provides endpoint security, threat intelligence, and incident response services to customers in more than 170 countries.[1][2] The company has been involved in response efforts to several high-profile cyber-attacks, including the Sony Pictures hack,[3] the 2016 Democratic National Committee email leak, and the Democratic National Committee cyber attacks. In the last case it concluded Russian state actors were responsible.[4]

CrowdStrike was co-founded by entrepreneur George Kurtz (CEO),[5][6] Dmitri Alperovitch (CTO),[7] and Gregg Marston (CFO, retired). In 2012, Shawn Henry, a former FBI executive who led both the FBI's criminal and cyber divisions, was hired to lead sister company CrowdStrike Services, Inc., which is focused on proactive and incident response services.[8]

The company gained recognition for providing threat intelligence and attribution to nation state actors[9] conducting economic espionage and IP theft. This includes the outing of state-sponsored Chinese group, Putter Panda, linked to China's spying on US defense and European satellite and aerospace industries.[10] In May 2014, supported by CrowdStrike's reports, the US Department of Justice charged five Chinese military hackers for economic cyber espionage against US corporations. Similarly, the firm is known for uncovering the activities of Energetic Bear, an adversary group with a nexus to the Russian Federation that conducts intelligence operations against a variety of global victims with a primary focus on the energy sector.

Following the very public Sony Pictures hack, CrowdStrike produced attribution to the government of North Korea within 48 hours and demonstrated how the attack was carried out step-by-step.[11] On May 2015, the company released Researcher Jason Geffner's discovery of VENOM, a critical flaw in open source hypervisor called Quick Emulator (QEMU),[12] which is used in a number of common virtualization products.

In 2013, the company launched the Falcon platform, a technology that stops breaches by combining next-generation antivirus, endpoint detection and response, and proactive hunting. In 2014, CrowdStrike was instrumental in identifying members of PLA Unit 61486 as the perpetrators of a number of cyberattacks on U.S. infrastructure.[13][14]

In July 2015, Google invested in the company's Series C funding round, which in total raised $100 million. To date, CrowdStrike has achieved total funding of $256 million with estimated annual revenue of $100 million and valuation more than $1 billion.[15] Investors include Telstra, March Capital Partners, Rackspace, Accel Partners and Warburg Pincus.[16][17] According to the company, its customers include three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.[18]

In 2016, the company was ranked #40 on the Deloitte Fast 500 North America list.[19]

Crowdstrike has figured prominently in the Democratic National Committee cyber attacks and the attribution of those attacks to Russian intelligence services. On March 20, 2017 during testimony before congress, James Comey stated "Crowdstrike, Mandiant, and ThreatConnect review[ed] the evidence of the hack and conclude[d] with high certainty that it was the work of APT 28 and APT 29 who are known to be Russian intelligence services."[20]

Industry recognition[edit]

Dmitri Alperovitch - Wikipedia

Alperovitch worked at a number of computer security startups in the late 1990s and early 2000s, including e-mail security startup CipherTrust, where he was one of the leading inventors of the TrustedSource reputation system. Upon acquisition of CipherTrust by Secure Computing in 2006, he led the research team and launched the Software-as-a-Service business for the company. Alperovitch took over as vice president of threat research at McAfee, when the company acquired Secure Computing in 2008.

In January 2010, he led the investigation into Operation Aurora, the Chinese intrusions into Google and two dozen other companies.[2] Subsequently, he led the investigation of Night Dragon espionage operation of the Western multinational oil and gas companies, and traced them to Song Zhiyue, a Chinese national living in Heze City, Shandong Province.[3]

In late 2011, along with entrepreneur George Kurtz[4][5] and Gregg Marston, Dmitri Alperovitch co-founded and became the chief technology officer of CrowdStrike,[6] a security technology company focused on helping enterprises and governments protect their intellectual property and secrets against cyberespionage and cybercrime. CrowdStrike has brought on board senior FBI executives, such as Shawn Henry, former executive assistant director (EAD) of the FBI's Criminal, Cyber, Response and Services Branch, and Steve Chabinsky, former deputy assistant director of the FBI's Cyber Division. CrowdStrike has received $256 million in funding from Warburg Pincus, Accel Partners, and Google Capital.

Alperovitch was awarded the prestigious Federal 100 Award for his contributions to the U.S. federal information security [7] and was recognized in 2013 and 2015 as one of Washingtonian (magazine)'s Tech Titans for his accomplishments in the field of cybersecurity.

In August 2013, he was selected as one of MIT Technology Review's Top 35 Innovators Under 35, an award previously won by Larry Page, Sergey Brin, and Mark Zuckerberg [8]

In 2016, Politico Magazine featured him as one of "Politico 50" influential thinkers, doers and visionaries transforming American politics[9]

In 2017, Fortune magazine listed Alperovitch in "40 Under 40" annual ranking of the most influential young people in business, along with Emmanuel Macron, Mark Zuckerberg and Serena Williams.[10]

He is a Senior Fellow at the Atlantic Council think tank and was named in December 2013 as one of Foreign Policy's Top 100 Leading Global Thinkers, along with Angela Merkel, John Kerry, Ben Bernanke and Jeff Bezos [11]


Top Visited
Switchboard
Latest
Past week
Past month

NEWS CONTENTS

Old News ;-)

[Oct 11, 2020] Does Perlosi wants to help Trump to win re-election by buying Crowdstyke stock?

Looks like we have an incestuous relationship of collusion between democrat politicians, democrat operatives in the executive branch, and MSM
Oct 11, 2020 | www.realclearinvestigations.com
Thinkitthrough larrydoyle 15 hours ago When you buy a companies stock you are effectively making a loan to the company with the expectation of gaining a return on your investment. Stock purchase price $129.25 Stock value now $142.97 gain on investment $13.72 per share $1,000,000 divided by the stock purchase price of $129.25 equals 7,737 shares. 7,737 multiplied by $13.72 equals a profit of $106,151.64 gained in only two months. Smells highly of insider trading. Somehow, you can tell us that this article is " Just sound and fury". Is the article "Just sound and fury" or is your comment "Just sound and fury" Reply merkinmuffy 16 hours ago "The Pig" may not have been aware of her husband's investments, but she and her Party sure benefitted from them. And don't think her husband didn't know it, either! And notice she's still plugging the Russia hoax! CrazyLady 11 hours ago On March 31, 2017 WikiLeaks released the most damaging disclosure up to that point from what it called "Vault 7" – a treasure trove of CIA cybertools leaked from CIA files. This disclosure featured the tool "Marble Framework," which enabled the CIA to hack into computers, disguise who hacked in, and falsely attribute the hack to someone else by leaving so-called telltale signs – like Cyrillic, for example.

The CIA documents also showed that the "Marble" tool had been employed in 2016. This is why the real reason CIA wants Assange. Why didn't Comey ever take the actual servers?

Comey explained "A Higher Loyalty." He wrote, "I was making decisions in an environment where Hillary Clinton was sure to be the next president." TGrade1 14 hours ago Dems wouldn't let the FBI examine the DNC server--only Crowdstrike, a company whose founder and CTO is Russian! Reply 9

cjones1 1 day ago Nancy Pelosi's Democrats had their emails exfiltrated by the Awan brothers and several national security sensitive email accounts of ranking House Democratic Committee members (Homeland Security, Foreign Affairs, & Intelligence) were accessed illegally. Perhaps CrowdStrike helped Nancy cover up the House Democrats with their email scandal when they muddied the truth concerning the DNC email scandal where the Awan brothers also operated. It could be the Pelosis are paying up. Reply 34
el tejano perdido 21 hours ago Decades ago concern was expressed about the revolving door between people in government and lobbyists. The relationship was too cozy and led to improprieties, and both major political parties were complicit. Nowadays we have an incestuous relationship of collusion between democrat politicians, democrat operatives in the executive branch, and democrat media. A case in point is Shawn Henry, CEO at CrowdStrike, at the center of the DNC data breach attempt and at the core of the democrat conspiracy to attack candidate Trump to skew the results of the 2016 election and when that failed, to overthrow a duly-elected president. Pelosi's conflict of interest aside (which she by law is supposed to report), Henry previously worked as assistant director to Rbt. Mueller at the FBI, and also previously worked for MSNBC. This is as cozy as it gets. DC truly is a swamp, exactly the type of corruption our Founding Fathers were trying to prevent.

[Oct 11, 2020] Pelosis Take a Big Stake in CrowdStrike, Democrat-Connected Linchpin of Russia Probe - RealClearInvestigations

Oct 11, 2020 | www.realclearinvestigations.com

The cybersecurity firm CrowdStrike rose to global prominence in mid-June 2016 when it publicly accused Russia of hacking the Democratic National Committee and stealing its data. The previously unknown company's explosive allegation set off a seismic chain of events that engulfs U.S. national politics to this day. The Hillary Clinton campaign seized on CrowdStrike's claim by accusing Russia of meddling in the election to help Donald Trump. U.S. intelligence officials would soon also endorse CrowdStrike's allegation and pursue what amounted to a multi-year, all-consuming investigation of Russian interference and Trump's potential complicity.

With the next presidential election now in its final weeks, the Democrats' national leader, House Speaker Nancy Pelosi, and her husband, Paul Pelosi, are endorsing the publicly traded firm in a different way. Recent financial disclosure filings show the couple have invested up to $1 million in CrowdStrike Holdings. The Pelosis purchased the stock at a share price of $129.25 on Sept. 3. At the time of this article's publication, the price has risen to $142.97.

Drew Hammill, spokesman for Pelosi, said: "Speaker Pelosi is not involved in her husband's investments and was not aware of the investment until the required filing was made. Mr. Pelosi is a private investor and has investments in a number of publicly traded companies. The Speaker fully complies with House Rules and the relevant statutory requirements."

The Pelosis' sizeable investment in CrowdStrike could revive scrutiny of the company's involvement in the Trump-Russia saga since the Democrats' 2016 election loss.

Dmitri Alperovitch: The CrowdStrike co-founder reportedly was thanked by a senior U.S. official "for pushing the government along" in its DNC hacking probe. CrowdStrike.com

After generating the hacking allegation against Russia in 2016, CrowdStrike played a critical role in the FBI's ensuing investigation of the DNC data theft. CrowdStrike executives shared intelligence with the FBI on a consistent basis, making dozens of contacts in the investigation's early months. According to Esquire, when U.S. intelligence officials first accused Russia of conducting malicious cyber activity in October 2016, a senior U.S. government official personally alerted CrowdStrike co-founder Dmitri Alperovitch and thanked him "for pushing the government along." The final reports of both Special Counsel Robert Mueller and the Senate Intelligence Committee cite CrowdStrike's forensics. The firm's centrality to Russiagate has drawn the ire of President Trump. During the fateful July 2019 phone call that would later trigger impeachment proceedings, Trump asked Ukraine's Volodymyr Zelensky to scrutinize CrowdStrike's role in the DNC server breach, suggesting that the company may have been involved in hiding the real perpetrators.

Pelosi's recent investment in CrowdStrike also adds a new partisan entanglement for a company with significant connections to Democratic Party and intelligence officials that drove Russiagate.

DNC law firm Perkins Coie hired CrowdStrike to investigate the breach in late April 2016. At the outset, Perkins Coie attorney Michael Sussmann personally informed CrowdStrike officials that Russia was suspected of breaching the server. By the time CrowdStrike went public with the Russian hacking allegation less than two months later, Perkins Coie had recently hired Fusion GPS, the opposition research firm that produced discredited Steele dossier alleging a longstanding conspiracy between Trump and Russia.

Shawn Henry: Behind closed doors, the CrowdStrike president admitted under oath in December 2017 that his firm "did not have concrete evidence" that Russian hackers actually stole any emails or other data from the DNC servers. "There's circumstantial evidence, but no evidence that they were actually exfiltrated." CrowdStrike.com

CrowdStrike President Shawn Henry, who led the team that remediated the DNC breach and blamed Russia for the hacking, previously served as assistant director at the FBI under Robert Mueller. Since June 2015, Henry has also worked as an analyst at MSNBC, the cable network that has promoted debunked Trump-Russia innuendo perhaps more than any other outlet. Alperovitch, the co-founder and former chief technology officer, is a former nonresident senior fellow at the Atlantic Council, the Washington organization that actively lobbies for a hawkish posture toward Russia.

Campaign disclosures also show that CrowdStrike contributed $100,000 to the Democratic Governors Association in 2016 and 2017.

The firm's multiple conflicts of interest in the Russia investigation coincide with a series of embarrassing disclosures that call into question its technical reliability.

In early 2017, CrowdStrike was forced to retract its allegation that Russia had hacked Ukrainian military equipment with the same malware the firm claimed to have discovered inside the DNC server.

During the FBI's investigation of the DNC breach, CrowdStrike never provided direct access to the pilfered servers, rebuffing multiple requests that came from officials all the way up to then-Director James Comey. The FBI had to rely on CrowdStrike's own images of the servers, as well as reports that Justice Department officials later acknowledged were delivered in incomplete, redacted form. James Trainor, who served as assistant director of the FBI's Cyber Division, complained to the Senate Intelligence Committee that the DNC's cooperation with the FBI's 2016 hack investigation was "slow and laborious in many respects" and that CrowdStrike's information was "scrubbed" before it was handed over. Alperovitch, the former CTO, has claimed that CrowdStrike installed its Falcon software to protect the DNC server on May 5, 2016. Yet the Democratic Party emails were stolen from the server three weeks later, from May 25 to June 1.

Yet the most damaging revelation calling into question CrowdStrike's Russian hacking allegations came with an admission early in the Russia probe that was only made public this year. Unsealed testimony from the House Intelligence Committee shows that Henry admitted under oath behind closed doors in December 2017 that the firm "did not have concrete evidence" that Russian hackers actually stole any emails or other data from the DNC servers. "There's circumstantial evidence, but no evidence that they were actually exfiltrated," Henry said. "There are times when we can see data exfiltrated, and we can say conclusively. But in this case it appears it was set up to be exfiltrated, but we just don't have the evidence that says it actually left."

The Henry testimony was among a trove of damning transcripts released by House Intelligence Committee Chairman Adam Schiff only after pressure from the then-acting Director of the Office of the Director of National Intelligence, Richard Grenell.

As RealClearInvestigations reported last month, Henry's House testimony also conflicts with his testimony before the Senate Intelligence Committee two months prior, in October 2017. According to the Senate report, Henry claimed that CrowdStrike was "able to see some exfiltration and the types of files that had been touched," but not the files' content. Yet two months later, Henry told the House that "we didn't see the data leave, but we believe it left, based on what we saw."

Notably, Henry's acknowledgment to the House that CrowdStrike did not have evidence of exfiltration came only after he was interrupted and prodded by his attorneys to correct an initial answer. Right before that intervention from CrowdStrike counsel, Henry had falsely asserted that he knew when Russian hackers had exfiltrated the stolen information:

Adam Schiff: CrowdStrike testimony was released by the House Intelligence Committee chairman only after pressure from the then-acting Director of National Intelligence, Richard Grenell. AP Photo/Alex Brandon

Adam Schiff: Do you know the date in which the Russians exfiltrated the data from the DNC?

Shawn Henry: I do. I have to just think about it. I don't know. I mean, it's in our report that I think the Committee has.

Schiff: And, to the best of your recollection, when would that have been?

Henry: Counsel just reminded me that, as it relates to the DNC, we have indicators that data was exfiltrated. We do not have concrete evidence that data was exfiltrated from the DNC, but we have indicators that it was exfiltrated.

Henry then improbably argued that, in the absence of evidence showing the emails leaving the DNC server, Russian hackers could have taken individual screenshots of each of the 44,053 emails and 17,761 attachments that were ultimately put out by WikiLeaks.

Keeping Henry's admission under wraps for nearly four years was highly consequential. The allegation of Russian hacking was elevated to a dire national security issue, and anyone who dared to question it – including President Trump – was accused of doing the Kremlin's bidding. The hacking allegation also helped plunge U.S.-Russia relations to new lows. Under persistent bipartisan pressure over allegations of Russian meddling, Trump has approved a series of punitive measures and aggressive policies toward Moscow, shunning his own campaign vow to seek cooperation.

Wikipedia/CrowdStrike.com

Meanwhile, during the several years that CrowdStrike's own uncertainty about its hacking allegation was kept from the public, the firm has enjoyed a stratospheric rise on Wall Street. In 2017, one year after lodging its Russia hacking allegations, CrowdStrike had a valuation of $1 billion. Three years later, after going public in 2019, the firm's valuation was set at $6.7 billion, and soon hit $11.4 billion. Just over a year later, its market cap was $31.37 billion. CrowdStrike has more than doubled its revenue on average every year, going from $52.75 million in 2017 to $481.41 million in 2020.

CrowdStrike and Fusion GPS, which spread Trump-Russia collusion allegations via the Steele dossier, are not the only private companies to play a critical and lucrative role in the Trump-Russia saga.

The firm New Knowledge, staffed by several former Democratic Party operatives and intelligence officials, authored a disputed report for the Senate Intelligence Committee that accused a Russian troll farm of a sophisticated social media interference campaign that duped millions of vulnerable Americans. Ironically, the company itself took part in a social media disinformation operation in the 2017 Alabama Senate race to help elect the ultimate victor, Democratic candidate Doug Jones. Just as the Democratic Party's impeachment proceedings were in full swing a year ago, another cybersecurity firm with Democratic Party ties, Area One, accused the Russian spy agency GRU of hacking into the Ukrainian company Burisma with the aim of uncovering dirt on Joe Biden. Graphika, a firm with extensive ties to the Atlantic Council and the Pentagon, has recently put out reports accusing Russians of impersonating left-wing and right-wing websites to fool hyper-partisan American audiences.

Having generated the seminal Russian hacking allegation, CrowdStrike sits at the top of what has become a booming cottage industry of firms and organizations to help shape the multi-year barrage of Russia fear-mongering and innuendo. And with her new investment in CrowdStrike, Nancy Pelosi -- the highest-ranking elected official of a party that has promoted Russiagate above all else -- is already profiting from its success.

This and all other original articles created by RealClearInvestigations may be republished for free with attribution. (These terms do not apply to outside articles linked on the site, nor to any photos or images that appear with articles.)

[Oct 11, 2020] The firm s multiple conflicts of interest in the Russia investigation coincide with a series of embarrassing disclosures that call into question its technical reliability.

Notable quotes:
"... WikiLeaks released the most damaging disclosure up to that point from what it called "Vault 7" – a treasure trove of CIA cybertools leaked from CIA files. This disclosure featured the tool "Marble Framework," which enabled the CIA to hack into computers, disguise who hacked in, and falsely attribute the hack to someone else by leaving so-called telltale signs – like Cyrillic, for example. The CIA documents also showed that the "Marble" tool had been employed in 2016. This is why the real reason CIA wants Assange. Why didn't Comey ever take the actual servers? Comey explained "A Higher Loyalty." He wrote, "I was making decisions in an environment where Hillary Clinton was sure to be the next president." ..."
"... BREAKING: Crowdstrike Payments Coincide With Deaths Of Seth Rich, Shawn Lucas – Disobedient Media ..."
"... The Pelosi family, like the Feinstein, Obama, Clinton, and Biden families, has grown filthy rich by trading on their political connections and high offices. ..."
"... All of these democrats, are Corrupt Billionaires, that cheat and steal from the American TaxPayers! ..."
Oct 11, 2020 | www.realclearinvestigations.com

Sargon 1 day ago "The firm's multiple conflicts of interest in the Russia investigation coincide with a series of embarrassing disclosures that call into question its technical reliability." Then you read this: "Meanwhile, during the several years that CrowdStrike's own uncertainty about its hacking allegation was kept from the public, the firm has enjoyed a stratospheric rise on Wall Street." Good work, if you can get it. Be incompetent at your job, and get rich.

[Oct 05, 2020] How The DNC Hired CrowdStrike To Frame Russia For The Hack- Excerpt -

Oct 05, 2020 | www.zerohedge.com

How The DNC Hired CrowdStrike To Frame Russia For The Hack: Excerpt

by Tyler Durden Sun, 10/04/2020 - 20:50 Twitter Facebook Reddit Email Print

Submitted by Thomas Farnan, originally published in The National Pulse

U.S. Director of National Intelligence John Ratcliffe recently declassified information indicating the CIA obtained intelligence in 2016 that the Russians believed the Clinton campaign was trying to falsely associate Russia with the so-called hack of DNC computers. CIA Director John Brennan shared the intelligence with President Obama. They knew, in other words, that the DNC was conducting false Russian flag operation against the Trump campaign . The following is an exclusive excerpt from The Russia Lie that tells the amazing story in detail:

On March 19, 2016, Hillary Clinton's campaign chairman, John Podesta, surrendered his emails to an unknown entity in a "spear phishing" scam. This has been called a "hack," but it was not. Instead, it was the sort of flim-flam hustle that happens to gullible dupes on the internet.

The content of the emails was beyond embarrassing. They showed election fraud and coordination with the media against the candidacy of Bernie Sanders. The DNC and the Clinton campaign needed a cover story.

Blaming Russia would be a handy way to deal with the Podesta emails. There was already an existing Russia operation that could easily be retrofitted to this purpose. The problem was that it was nearly impossible to identify the perpetrator in a phishing scheme using computer forensic tools.

The only way to associate Putin with the emails was circumstantially.

The DNC retained a company that called itself "CrowdStrike" to provide assistance. CrowdStrike's chief technology officer and co-founder, Dmitri Alperovitch, is an anti-Putin, Russian expat and a senior fellow at the Atlantic Council .

With the Atlantic Council in 2016, all roads led to Ukraine. The Atlantic Council's list of significant contributors includes Ukrainian billionaire Victor Pinchuk.

The Ukrainian energy company that was paying millions to an entity that was funneling large amounts to Hunter Biden months after he was discharged from the US Navy for drug use, Burisma, also appears prominently on the Atlantic Council's donor list.

https://lockerdome.com/lad/13084989113709670?pubid=ld-dfp-ad-13084989113709670-0&pubo=https%3A%2F%2Fwww.zerohedge.com&rid=www.zerohedge.com&width=890

Arseniy Yatsenyuk, the Western puppet installed in Ukraine, visited the Atlantic Council's Washington offices to make a speech weeks after the coup.

Pinchuk was also a big donor (between $10 million and $20 million) to the Clinton Foundation. Back in '15, the Wall Street Journal published an investigative piece , " Clinton Charity Tapped Foreign Friends ." The piece was about how Ukraine was attempting to influence Clinton by making huge donations through Pinchuk. Foreign interference, anyone?

On June 12, 2016, WikiLeaks founder Julian Assange announced : "We have upcoming leaks in relation to Hillary Clinton . . . We have emails pending publication."

Two days later, CrowdStrike fed the Washington Post a story , headlined, "Russian government hackers penetrated DNC, stole opposition research on Trump." The improbable tale was that the Russians had hacked the DNC computer servers and got away with some opposition research on Trump. The article quoted Alperovitch of CrowdStrike and the Atlantic Council.

The next day, a new blog – Guccifer 2.0 – appeared on the internet and announced:

Worldwide known cyber security company CrowdStrike announced that the Democratic National Committee (DNC) servers had been hacked by "sophisticated" hacker groups.

I'm very pleased the company appreciated my skills so highly))) But in fact, it was easy, very easy.

Guccifer may have been the first one who penetrated Hillary Clinton's and other Democrats' mail servers. But he certainly wasn't the last. No wonder any other hacker could easily get access to the DNC's servers.

Shame on CrowdStrike: Do you think I've been in the DNC's networks for almost a year and saved only 2 documents? Do you really believe it?

Here are just a few docs from many thousands I extracted when hacking into DNC's network.

Guccifer 2.0 posted hundreds of pages of Trump opposition research allegedly hacked from the DNC and emailed copies to Gawker and The Smoking Gun . In raw form, the opposition research was one of the documents obtained in the Podesta emails, with a notable difference: It was widely reported the document now contained " Russian fingerprints ."

The document had been cut and pasted into a separate Russian Word template that yielded an abundance of Russian "error "messages . In the document's metadata was the name of the Russian secret police founder, Felix Dzerzhinsky, written in the Russian language.

The three-parenthesis formulation from the original post ")))" is the Russian version of a smiley face used commonly on social media. In addition, the blog's author deliberately used a Russian VPN service visible in its emails even though there would have been many options to hide any national affiliation.

Under the circumstances, the FBI should have analyzed the DNC computers to confirm the Guccifer hack. Incredibly, though, the inspection was done by CrowdStrike, the same Atlantic Council-connected private contractor paid by the DNC that had already concluded in The Washington Post that there was a hack and Putin was behind it.

CrowdStrike would declare the "hack" to be the work of sophisticated Russian spies. Alperovitch described it as, " skilled operational tradecraft ."

There is nothing skilled, though, in ham-handedly disclosing a Russian identity when trying to hide it. The more reasonable inference is that this was a set-up. It certainly looks like Guccifer 2.0 suddenly appeared in coordination with the Washington Post 's article that appeared the previous day.

FBI Director James Comey confirmed in testimony to the Senate Intelligence Committee in January 2017 that the FBI's failure to inspect the computers was unusual to say the least. "We'd always prefer to have access hands-on ourselves if that's possible," he said.

But the DNC rebuffed the FBI's request to inspect the hardware. Comey added that the DNC's hand-picked investigator, CrowdStrike, is "a highly respected private company."

What he did not reveal was that CrowdStrike never corroborated a hack by forensic analysis. In testimony released in 2020, it was revealed that CrowdStrike admitted to Congressional investigators as early as 2017 that it had no direct evidence of Russian hacking.

CrowdStrike's president Shawn Henry testified, "There's not evidence that [documents and emails] were actually exfiltrated [from the DNC servers]. There's circumstantial evidence but no evidence that they were actually exfiltrated."

NEVER MISS THE NEWS THAT MATTERS MOST

ZEROHEDGE DIRECTLY TO YOUR INBOX

Receive a daily recap featuring a curated list of must-read stories.

The circumstantial evidence was Guccifer 2.0.

This was a crucial revelation because the thousand ships of Russiagate launched upon the positive assertion that CrowdStrike had definitely proven a Russian hack. Yet this fact was kept from the American public for more than three years.

The reasonable inference is that the DNC was trying to frame Russia and the FBI and intelligence agencies were going along with the scheme because of political pressure.

Those who assert that it is a "conspiracy theory" to say that CrowdStrike would fabricate the results of computer forensic testing to create a false Russian flag should know that it was caught doing exactly that around the time it was inspecting the DNC computers.

On Dec. 22, 2016, CrowdStrike caused an international stir when it claimed to have uncovered evidence that Russians hacked into a Ukrainian artillery computer app to help pro-Russian separatists. Voice of America later determined the claim was false , and CrowdStrike retracted its finding.

Ukraine's Ministry of Defense was forced to eat crow and admit that the hacking never happened.

If you wanted a computer testing firm to fabricate a Russian hack for political reasons in 2016, CrowdStrike was who you went out and hired.

To read the rest of the story, click The Russia Lie: How the Military Industrial Complex Targeted Trump and buy the ebook for just $5.
play_arrow LEEPERMAX , 4 minutes ago

Nobody faces consequences

No one is gonna go ta jail

And everyone walks

[Sep 24, 2020] Why Crowdstrike's Russian Hacking Story Fell Apart- Say Hello to Fancy Bear Washington's Blog

Sep 24, 2020 | washingtonsblog.com

[Aug 19, 2020] The Committee Intelligence Committee relied on the same intelligence sources that fabricated the Russiagate scenario in the first place

Aug 19, 2020 | www.moonofalabama.org

Rob , Aug 19 2020 19:19 utc | 53

Actually, after only a quick review of some of the news reports, it appears that the Senate Committee placed great importance on the "fact" that Russia was involved in the "hacking" of emails from the DNC. This suggests that the Committee relied on the same intelligence sources that fabricated the Russiagate scenario in the first place. I guess that the Republicans on the Committee have not kept up with revelations that there is no evidence of any such hacking. Hence, the Committee's conclusions are likely based on the same old disinformation and can be readily dismissed.

[Aug 19, 2020] The Republican led Senate Select Committee on Intelligence repeats the lies about Guccifer 2.0

Highly recommended!
Looks like RussiaGate was a bipartisan affair. After all Parteigenosse Mueller was a Republican
Aug 19, 2020 | www.zerohedge.com
play_arrow

amnesia , 5 minutes ago

Very telling that ZH editors don't consider this newsworthy: key findings of the Republican led Senate Select Committee on Intelligence regarding Russia's 2016 election interference.

Manafort and Kilimnik talked almost daily during the campaign. They communicated through encrypted technologies set to automatically erase their correspondence; they spoke using code words and shared access to an email account. It's worth pausing on these facts: The chairman of the Trump campaign was in daily contact with a Russian agent, constantly sharing confidential information with him.

It did not find evidence that the Ukrainian government meddled in the 2016 election, as Trump alleged. "The Committee's efforts focused on investigating Russian interference in the 2016 election. However, during the course of the investigation, the Committee identified no reliable evidence that the Ukrainian government interfered in the 2016 U.S. election."

"Taken as a whole, Manafort's high-level access and willingness to share information with individuals closely affiliated with the Russian intelligence services, particularly [Konstantin] Kilimnik and associates of Oleg Deripaska, represented a grave counterintelligence threat," the report said.

Kilimnik "almost certainly helped arrange some of the first public messaging that Ukraine had interfered in the U.S. election."

Roger Stone was in communications with both WikiLeaks and the Russian hacker Guccifer 2.0 during the election; according to the Mueller report, Guccifer 2.0 was a conduit set up by Russian military intelligence to anonymously funnel stolen information to WikiLeaks.

The Senate Intelligence Committee's investigation found "significant evidence to suggest that, in the summer of 2016, WikiLeaks was knowingly collaborating with Russian government officials," the report said.

The FBI gave "unjustified credence" to the so-called Steele dossier, an explosive collections of uncorroborated memos alleging collusion between the Trump campaign and Russian government officials, the report said. The FBI did not take the "necessary steps to validate assumptions about Steele's credibility" before relying on the dossier to seek renewals of a surveillance warrant targeting the former Trump campaign aide, the report said.

Demeter55 , 47 minutes ago

It's the latest in 5 years of "Get Trump!", a sitcom featuring the Roadrunner (Trump) and the Wiley Coyote (Deep State/Never Trumpers / etc, etc.)

This classic scenario never fails to please those who realize that the roadrunner rules, and the coyote invariably ends up destroyed.

gene5722 , 2 hours ago

The lie msm won't let die.

[Aug 16, 2020] CIA Behind Guccifer Russiagate A Plausible Scenario

Highly recommended!
Aug 16, 2020 | www.zerohedge.com

If Zerohedge comment reflect general population sentiments this is clear sign of the crisis of legitimacy of neoliberal élite.

Via The Strategic Culture Foundation,

William Binney is the former technical director of the U.S. National Security Agency who worked at the agency for 30 years. He is a respected independent critic of how American intelligence services abuse their powers to illegally spy on private communications of U.S. citizens and around the globe.

Given his expert inside knowledge, it is worth paying attention to what Binney says.

In a media interview this week, he dismissed the so-called Russiagate scandal as a "fabrication" orchestrated by the American Central Intelligence Agency. Many other observers have come to the same conclusion about allegations that Russia interfered in the 2016 U.S. elections with the objective of helping Donald Trump get elected.

But what is particularly valuable about Binney's judgment is that he cites technical analysis disproving the Russiagate narrative. That narrative remains dominant among U.S. intelligence officials, politicians and pundits, especially those affiliated with the Democrat party, as well as large sections of Western media. The premise of the narrative is the allegation that a Russian state-backed cyber operation hacked into the database and emails of the Democrat party back in 2016. The information perceived as damaging to presidential candidate Hillary Clinton was subsequently disseminated to the Wikileaks whistleblower site and other U.S. media outlets.

A mysterious cyber persona known as "Guccifer 2.0" claimed to be the alleged hacker. U.S. intelligence and news media have attributed Guccifer as a front for Russian cyber operations.

Notably, however, the Russian government has always categorically denied any involvement in alleged hacking or other interference in the 2016 U.S. election, or elections thereafter.

William Binney and other independent former U.S. intelligence experts say they can prove the Russiagate narrative is bogus. The proof relies on their forensic analysis of the data released by Guccifer. The analysis of timestamps demonstrates that the download of voluminous data could not have been physically possible based on known standard internet speeds. These independent experts conclude that the data from the Democrat party could not have been hacked, as Guccifer and Russiagaters claim. It could only have been obtained by a leak from inside the party, perhaps by a disgruntled staffer who downloaded the information on to a disc. That is the only feasible way such a huge amount of data could have been released. That means the "Russian hacker" claims are baseless.

Wikileaks, whose founder Julian Assange is currently imprisoned in Britain pending an extradition trial to the U.S. to face espionage charges, has consistently maintained that their source of files was not a hacker, nor did they collude with Russian intelligence. As a matter of principle, Wikileaks does not disclose the identity of its sources, but the organization has indicated it was an insider leak which provided the information on senior Democrat party corruption.

about:blank

about:blank

me title=

William Binney says forensic analysis of the files released by Guccifer shows that the mystery hacker deliberately inserted digital "fingerprints" in order to give the impression that the files came from Russian sources. It is known from information later disclosed by former NSA whistleblower Edward Snowden that the CIA has a secretive program – Vault 7 – which is dedicated to false incrimination of cyber attacks to other actors. It seems that the purpose of Guccifer was to create the perception of a connection between Wikileaks and Russian intelligence in order to beef up the Russiagate narrative.

"So that suggested [to] us all the evidence was pointing back to CIA as the originator [of] Guccifer 2.0. And that Guccifer 2.0 was inside CIA I'm pointing to that group as the group that was probably the originator of Guccifer 2.0 and also this fabrication of the entire story of Russiagate," concludes Binney in his interview with Sputnik news outlet.

This is not the first time that the Russiagate yarn has been debunked . But it is crucially important to make Binney's expert views more widely appreciated especially as the U.S. presidential election looms on November 3. As that date approaches, U.S. intelligence and media seem to be intensifying claims about Russian interference and cyber operations. Such wild and unsubstantiated "reports" always refer to the alleged 2016 "hack" of the Democrat party by "Guccifer 2.0" as if it were indisputable evidence of Russian interference and the "original sin" of supposed Kremlin malign activity. The unsubstantiated 2016 "hack" is continually cited as the "precedent" and "provenance" of more recent "reports" that purport to claim Russian interference.

Given the torrent of Russiagate derivatives expected in this U.S. election cycle, which is damaging U.S.-Russia bilateral relations and recklessly winding up geopolitical tensions, it is thus of paramount importance to listen to the conclusions of honorable experts like William Binney.

The American public are being played by their own intelligence agencies and corporate media with covert agendas that are deeply anti-democratic.


me name=


lay_arrow desertboy , 13 hours ago

Well - who set up them up, converted from the OSS? The banksters.

"Wild Bill" Donovan worked for JP Morgan immediately after WWII.

"our" US intelligence agencies were set up by, and serve, the masters of high finance. Is this in dispute?

meditate_vigorously , 11 hours ago

They have seeded enough misinformation that apparently it is. But, you are correct. It is the Banksters.

Isisraelquaeda , 2 hours ago

Israel. The CIA was infiltrated by the Mossad long ago.

SurfingUSA , 15 hours ago

JFK was on to that truth, and would have been wise to mini-nuke Langley before his ill-fated journey to Dallas.

Andrew G , 11 hours ago

Except when there's something exceptionally evil (like pedo/blackmail rings such as Epstein), in which case it's Mossad / Aman

vova.2018 , 7 hours ago

Except when there's something exceptionally evil (like pedo/blackmail rings such as Epstein), in which case it's Mossad / Aman

The CIA & MOSSAD work hand in hand in all their clandestine operations. There is not doubt the CIA/MOSSAD are behind the creation, evolution, training, supplying weapons, logistic-planning & financing of the terrorists & the destruction of the Middle East. Anybody that believes the contrary has brain problems & need to have his head examined.

CIA/MOSAD has been running illegal activities in Colombia: drug, arms, organs & human (child-sex) trafficking. CIA/MOSAD is also giving training, logistic & arms to Colombia paramilitary for clandestine operation against Venezuela. After Bolsonaro became president, MOSSAD started running similar operation in Brazil. Israel & Brazil also recognizes Guaido as the legit president of Venezuela.

​​​​​​CIA/MOSSAD have a long time policy of assassinating & taking out pep who are a problem to the revisionist-zionist agenda, not just in the M-East but in the world. The CIA/MOSSAD organizations have many connections in other countries like the M-East, Saudi Arabia, UAE, et al but also to the UK-MI5.

The Israelis infiltrated the US to the highest levels a long time ago - Proof

  • Israel has & collects information (a database) of US citizens in coordination with the CIA & the 5 eyes.
  • Israel works with the NSA in the liaison-loophole operations
  • Mossad undercover operations in WDC & all over the world
  • The American Israel Public Affairs Committee – AIPAC
  • People with 2 citizenships (US/Israel) in WDC/NYC (the real Power)
  • From Steve Bannon a christian-zionist: Collusion between the Trump administration and Israel .
  • D-Trump, Ivanka Trump & husband Kushner (orthodox Juus)
  • Epstein & Ghislaine Maxwell, members of the MOSSAD ran their entire pedo-honey-pot operation for the CIA/Mossad
  • CIA/MOSSA want to punish Iran for its role in Syria's victory over ISIS (created by CIA/Mossad) - PROOF: McCain Armed ISIS https://www.youtube.com/watch?v=ziNlUuc167E

New book details Israel's secret history of assassinations
https://www.youtube.com/watch?v=ge-mnC2wGss

CIA Assassination Manual Revealed (CIA = Cover action agency)
https://www.youtube.com/watch?v=s3gQfoFCpPs

GreatUncle , 6 hours ago

Well I never expected anything different.

They have a hand in everything and probably the murder of JFK.

Hell the CIA have even had their own president.

They are supposed to be commanded by the president but personally I think they are a rogue operation controlled by somebody else.

Lyman54 , 16 hours ago

Millie Weavers documentary explains everything quite well. https://www.youtube.com/watch?v=9HFxVvrXjCg

sborovay07 , 15 hours ago

Funny how a number of the right wing conspiracy stories according to the MSM from a couple years back were true from the get go. 1 indictment over 4 years in the greatest attempted coup in this country's history. So sad that Binney and Assange were never listened to. They can try to silence us who know of the truth, but as Winston Churchill once said, 'Truth is incontrovertible. Panic may resent it. Ignorance may deride it. Malice may distort it. But there it is.' KDP still censors my book on their advertising platform as it promotes conspiratorial theories (about the Obama led coup) and calls out BLM and Antifa for what they are (marxists) . Yet the same platform still recommends BLM books stating there is a pandemic of cops killing innocent blacks. F them!!!! #RIPSeth #FreeJulian #FreeMillie

smacker , 11 hours ago

Yes, and we all know the name of the DNC leaker who downloaded and provided WikiLeaks
with evidence of CIA and DNC corruption.
He was assassinated to prevent him from naming who Guccifer 2.0 was and where he is located.

The Russia-gate farce itself provides solid evidence that the CIA and others are in bed with DNC
and went to extraordinary lengths to prevent Trump being elected. When that failed, they instigated
a program of x-gates to get him out of office any way they could. This continues to this day.

This is treason at the highest level.

ACMeCorporations , 12 hours ago

Hacking? What Russian hacking?

In recently released testimony, the CEO of CrowdStrike admitted in congressional testimony, under oath, that it actually has no direct evidence Russia stole the DNC emails.

Nelbev , 9 hours ago

"The proof relies on their forensic analysis of the data released by Guccifer. The analysis of timestamps demonstrates that the download of voluminous data could not have been physically possible based on known standard internet speeds. ... a disgruntled staffer who downloaded the information on to a disc. That is the only feasible way such a huge amount of data could have been released. ... William Binney says forensic analysis of the files released by Guccifer shows that the mystery hacker deliberately inserted digital "fingerprints" in order to give the impression that the files came from Russian sources. ... "

Any computer file is a bunch of 1s and 0s. Anyone can change anything with a hex editor. E.g. I had wrong dates on some photographs once, downloaded as opposed to when taken, just edited the time stamp. You cannot claim any time stamp is original. If true time stamps, then the DNC files were downloaded to a thumb drive at a computer on location and not to the internet via a phone line. However anyone can change the time stamps. Stating a "mystery hacker deliberately inserted digital [Russian] 'fingerprints' " is a joke if denying the file time stamps were not tampered with. The real thing is where the narrative came from, political spin doctors, Perkins Coie law firm hired by DNC and Hillary campaign who hired Crowdstrike [and also hired Fusion GPS before for pissgate dossier propaganda and FISC warrants to spy on political opponents] and Perkins Coie edited Crowdstrike report with Russian narrative. FBI never looked at DNC servers. This is like your house was broken into. You deny police the ability to enter and look at evidence like DNC computers. You hire a private investigator to say your neighbor you do not like did it and publicise accusations. Take word of political consultants hired, spin doctor propaganda, Crowdstrike narrative , no police investigation. Atlantic Council?

Vivekwhu , 8 hours ago

The Atlantic Council is another NATO fart. Nuff said!

The_American , 15 hours ago

God Damn traitor Obama!

Yen Cross , 14 hours ago

TOTUS

For the youngsters.

Teleprompter Of The United States.

Leguran , 6 hours ago

The CIA has gotten away with so much criminal behavior and crimes against the American public that this is totally believable. Congress just lets this stuff happen and does nothing. Which is worse - Congress or the CIA?

Congress set up the system. It is mandated to perform oversight. And it just sits on its thumbs and wallows in it privileges.

This time Congress went further than ever before. It was behind and engaged in an attempted coup d'état.

Know thy enemy , 10 hours ago

Link to ShadowGate (ShadowNet) documentary - which answers the question, what is the keystone,,,,,

https://www.pscp.tv/Tore_says/1RDGlrYynRgxL

"Comey here, and Holder, while I get a rope for Lynch, and don't forget Brennan."

Kudo's to Millie

DontHateMeBecauseImABureaucrat , 9 hours ago

Neither google nor Apple will open the link. Or it's not there.

bringonthebigone , 8 hours ago

currently it is up here: https://www.youtube.com/watch?v=9HFxVvrXjCg

I Claudius , 5 hours ago

It's time for Assange and Wikileaks to name the person who they rec'd the info from. By hiding behind the "we don't name names" Mantra they are helping destroy America by polarizing its citizens. Name the damn person, get it all out there so the left can see that they've been played by their leaders. Let's cut this crap.

freedommusic , 7 hours ago

...all the evidence was pointing back to CIA as the originator [of] Guccifer 2.0.

Yep, I knew since day one. I remember seeing Hillary Clinton talking about Guccifer . As soon as uttered the name, I KNEW she with the CIA were the brainchild of this bogus decoy.

They copy. They mimic. These are NOT creative individuals.

Perhaps hell is too good a place for them.

on target , 4 hours ago

This is old news but worth bringing up again. The CIA never wanted Trump in, and of course, they want him out. Their fingerprints were all over Russiagate, The Kavanaugh hearings, Ukrainegate, and on and on. They are just trying to cover their asses for a string of illegal "irregularities" in their operations for years. Trump should never have tried to be a get along type of guy. He should have purged the entire leadership of the CIA on day one and the FBI on day 2. They can not be trusted with an "America First" agenda. They are all New World Order types who know whats best for everyone.

fersur , 7 hours ago

Boom, Boom, Boom !

Three Reseachable Tweets thru Facebook, I cut all at once, Unedited !

"#SusanRice has as much trouble with her memory as #HillaryClinton. Rice testified in writing that she 'does not recall' who gave her key #Benghazi talking points she used on TV, 'does not recall' being in any meetings regarding Benghazi in five days following the attack, and 'does not recall' communicating with anyone in Clinton's office about Benghazi," Tom Fitton in Breitbart.

"Adam Schiff secretly subpoenaed, without court authorization, the phone records of Rudy Giuliani and then published the phone records of innocent Americans, including @realDonaldTrump 's lawyers, a member of Congress, and a journalist," @TomFitton .

BREAKING: Judicial Watch announced today that former #Obama National Security Advisor and U.S. Ambassador to the United Nations, Susan Rice, admitted in written responses given under oath that she emailed with former Secretary of State Hillary Clinton on Clinton's non-government email account and that she received emails related to government business on her own personal email account.

STONEHILLADY , 7 hours ago

It's not just the Democrats, the warmongering neocons of the Republican party are also in on it, the Bush/Romney McCain/McConnell/Cheney and many more. It's called "Kick Backs" Ever notice these so called retired Generals all end up working for all these spying companies that span the 5eyes to Israel. It seems our POTUS has got his hands full swimming up stream to get this stopped and actually get rid of the CIA. It's the number 1 reason he doesn't trust these people, they all try to tell him stuff that is mis-directed.

Liars, leakers, and thieves are running not only our nation but the world, as George Carlin said, "It's a Big Club, and we ain't in it." If you fall for this false narrative of mail in voting and not actually go and vote on election day, you better start learning Chinese for surely Peelosi and Schumer will have their way and mess up this election so they can drag Trump out of office and possible do him and his family some serious harm, all because so many of you listen to the MSM and don't research their phony claims.

Max21c , 7 hours ago

It's called "Kick Backs" Ever notice these so called retired Generals all end up working for all these spying companies that span the 5eyes to Israel.

American Generals & Admirals are a lot more corrupt today than they were a few generations back. Many of them are outright evil people in today's times. Many of these people are just criminals that will steal anything they can get their banana republic klepto-paws on. They're nothing but common criminals and thieves. No different than the Waffen SS or any other group of brigands, bandits, and criminal gangsters.

Max21c , 7 hours ago

The CIA, FBI, NSA, Military Intelligence, Pentagon Gestapo, defense contractors are mixed up in a lot of crimes and criminal activities on American soil against American citizens and American civilians. They do not recognize borders or laws or rights of liberty or property rights or ownership or intellectual property. They're all thieves and criminals in the military secret police and secret police gangsters cabal.

BandGap , 7 hours ago

I have seen Binney's input. He is correct in my view because he scientifically/mathematically proves his point.

The blinded masses do not care about this approach, just like wearing masks.

The truth is too difficult for many to fit into their understanding of the world.

So they repeat what they have been told, never stopping to consider the facts or how circumstances have been manipulated.

It is frustrating to watch, difficult to navigate at times for me. Good people who will not stop and think of what the facts show them.

otschelnik , 8 hours ago

It could have been the CIA or it could have been one of the cut-outs for plausible deniability, and of all the usual suspects it was probably CrowdStrike.

- CGI / Global Strategy Group / Analysis Corp. - John Brennan (former CEO)

- Dynology, Wikistrat - General James L. Jones (former chairman of Atlantic Council, NSA under Obama)

- CrowdStrike - Dmitri Alperovich and Shawn Henry (former chief of cyber forensics FBI)

- Clearforce - Michael Hayden (former dir. NSA under Clinton, CIA under Bush) and Jim Jones Jr. (son Gnrl James Jones)

- McChrystal Group - Stanley McChrystal (former chief of special operations DOD)

fersur , 8 hours ago

Unedited !

The Brookings Institute – a Deep State Hub Connected to the Fake Russia Collusion and Ukraine Scandals Is Now Also Connected to China Spying In the US

The Brookings Institute was heavily involved in the Democrat and Deep State Russia collusion hoax and Ukraine impeachment fraud. These actions against President Trump were criminal.

This institute is influenced from foreign donations from entities who don't have an America first agenda. New reports connect the Institute to Chinese spying.

As we reported previously, Julie Kelly at American Greatness released a report where she addresses the connections between the Brookings Institute, Democrats and foreign entities. She summarized her report as follows: Accepting millions from a state sponsor of terrorism, foisting one of the biggest frauds in history on the American people, and acting as a laundering agent of sorts for Democratic political contributions disguised as policy grants isn't a good look for such an esteemed institution. One would be hard-pressed to name a more influential think tank than the Brookings Institution. The Washington, D.C.-based nonprofit routinely ranks at the top of the list of the best think tanks in the world; Brookings scholars produce a steady flow of reports, symposiums, and news releases that sway the conversation on any number of issues ranging from domestic and economic policy to foreign affairs.

​​ Brookings is home to lots of Beltway power players: Ben Bernanke and Janet Yellen, former chairmen of the Federal Reserve, are Brookings fellows. Top officials from both Republican and Democrat presidential administrations lend political heft to the organization. From 2002 until 2017, the organization's president was Strobe Talbott. He's a longtime BFF of Bill Clinton; they met in the 1970s at Oxford University and have been tight ever since. Talbott was a top aide to both President Bill Clinton and Secretary of State Hillary Clinton.

Kelly continued:

Brookings-based fellows working at Lawfare were the media's go-to legal "experts" to legitimize the concocted crime; the outlet manipulated much of the news coverage on collusion by pumping out primers and guidance on how to report collusion events from Special Counsel Robert Mueller's appointment to his final report.

Now, testimony related to a defamation lawsuit against Christopher Steele, the author of the infamous "dossier" on Donald Trump, has exposed his direct ties to Talbott in 2016 when he was still head of Brookings. Talbott and Steele were in communication before and after the presidential election; Steele wanted Talbott to circulate the dossier to his pals in John Kerry's State Department, which reportedly is what Talbott did . Steele also briefed top state department officials in October 2016 about his work.

But this isn't the only connection between the Brookings Institute and the Russia collusion and Ukrainian scandals. We were the first to report that the Primary Sub-Source (PSS) in the Steele report, the main individual who supplied Steele with bogus information in his report was Igor Danchenko.

In November 2019, the star witness for the Democrat Representative Adam Schiff's impeachment show trial was announced. Her name was Fiona Hill.

Today we've uncovered that Hill is a close associate of the Primary Sub-Source (PSS) for the Steele dossier – Igor Danchenko – the individual behind most all the lies in the Steele dossier. No wonder Hill saw the Steele dossier before it was released. Her associate created it.

Both Fiona Hill and Igor Danchenko are connected to the Brookings Institute.

They gave a presentation together as Brookings Institute representatives:

Kelly writes about the foreign funding the Brookings Institute partakes:

So who and what have been funding the anti-Trump political operation at Brookings over the past few years? The think tank's top benefactors are a predictable mix of family foundations, Fortune 100 corporations, and Big Tech billionaires. But one of the biggest contributors to Brookings' $100 million-plus annual budget is the Embassy of Qatar. According to financial reports, Qatar has donated more than $22 million to the think tank since 2004. In fact, Brookings operates a satellite center in Doha, the capital of Qatar. The wealthy Middle Eastern oil producer spends billions on American institutions such as universities and other think tanks.

Qatar also is a top state sponsor of terrorism, pouring billions into Hamas, al-Qaeda, and the Muslim Brotherhood, to name a few. "The nation of Qatar, unfortunately, has historically been a funder of terrorism at a very high level," President Trump said in 2017. "We have to stop the funding of terrorism."

An email from a Qatari official, obtained by WikiLeaks, said the Brookings Institution was as important to the country as "an aircraft carrier."

Yesterday the Brookings Institute was connected to spying by Communist China in a post at the Washington Free Beacon :

Part 1 of 2

fersur , 8 hours ago

Part 2 of 2 !

The Brookings Institution, a prominent Washington, D.C., think tank, partnered with a Shanghai policy center that the FBI has described as a front for China's intelligence and spy recruitment operations, according to public records and federal court documents.

The Brookings Doha Center, the think tank's hub in Qatar, signed a memorandum of understanding with the Shanghai Academy of Social Sciences in January 2018, the institution said . The academy is a policy center funded by the Shanghai municipal government that has raised flags within the FBI.

The partnership raises questions about potential Chinese espionage activities at the think tank, which employs numerous former government officials and nearly two dozen current foreign policy advisers to Joe Biden's presidential campaign.

It is really frightening that one of two major political parties in the US is tied so closely with the Brookings Institute. It is even more frightening that foreign enemies of the United States are connected to this entity as well.

Let it Go , 8 hours ago

One thing for sure is these guys have far to much of our money to spend promoting their own good.

fersur , 7 hours ago

Unedited !

Mueller Indictments Tied To "ShadowNet," Former Obama National Security Advisor and Obama's CIA Director – Not Trump

By Patrick Bergy, Cyber-Security, Veteran & Former DoD Contractor

December 18th, 2018

According to a report in the Daily Beast, which cited the Wall Street Journal's reporting of Special Counsel Robert Mueller's investigation into two companies, Wikistrat and Psy Group, "The firm's advisory council lists former CIA and National Security Agency director Michael Hayden, former national security adviser James L. Jones."

According to numerous reporting from major news outlets like the Wall Street Journal and Daily Beast, both Wikistrat and Psy Group represent themselves as being social media analysts and black PSYOP organizations. Both Wikistrat and Psy Group have foreign ownership mixed between Israeli, Saudi (Middle East) and Russian. Here is what the Wall Street Journal, The Daily Beast and pretty much everyone else out there doesn't know (or won't tell you).

The fact Obama's former National Security Advisor, General James Jones, and former Obama CIA director, Gen. Michael Hayden, are both on Wikistrat's advisory board may not seem suspicious, but both of these general's have another thing in common, and that is the ShadowNet. The ShadowNet, and its optional companion relational database, iPsy, were both originally developed by the small, family owned defense contracting company, Dynology. The family that owns Dynology; Gen. James Jones. I would add Paul Manafort and Rick Davis was Dynology's partner at the time we were making the ShadowNet and iPsy commercially available.

After obtaining the contract in Iraq to develop social media psychological warfare capabilities, known in military nomenclature as Interactive Internet Activities, or IIA, Gen. Jones kept the taxpayer funded application we developed in Iraq for the 4th Psychological Operation Group, and made it commercially available under the trademark of the "ShadowNet" and the optional black PSYOP component, "iPsy." If you think it is interesting that one of the companies under Mueller's indictment is named, "Psy" Group, I did as well. In fact, literally everything both publicly described in news reports, and even their websites, are exactly the same as the ShadowNet and iPsy I helped build, and literally named.

The only thing different I saw as far as services offered by Wikistrat, and that of Dynology and the ShadowNet, was described by The Daily Beast as, "It also engaged in intelligence collection." Although iPsy was a relational database that allowed for the dissemination of whatever the required narrative was, "intelligence collection" struck another bell with me, and that's a company named ClearForce.

ClearForce was developed as a solution to stopping classified leaks following the Edward Snowden debacle in 2013. Changes in NISPOM compliance requirements forced companies and government agencies that had employees with government clearances to take preventive measure to mitigate the potential of leaking. Although the NISPOM compliance requirement almost certainly would have been influenced by either Hayden, Jones or both, they once again sought to profit from it.

Using components of the ShadowNet and iPsy, the ClearForce application (which the company, ClearForce, was named after,) was developed to provide compliance to a regulation I strongly suspect you will find Jones and Hayden had a hand in creating. In fact, I strongly suspect you will find General Jones had some influence in the original requirement for our Iraq contract Dynology won to build the ShadowNet – at taxpayer expense! Dynology worked for several years incorporating other collection sources, such as financial, law enforcement and foreign travel, and ties them all into your social media activity. Their relationship with Facebook and other social media giants would have been nice questions for congress to have asked them when they testified.

Part 1 of 2 !

fersur , 7 hours ago

Part 2 of 2 !

The ClearForce application combines all of these sources together in real-time and uses artificial intelligence to predictively determine if you are likely to steal or leak based on the behavioral profile ClearForce creates of you. It can be used to determine if you get a job, and even if you lose a job because a computer read your social media, credit and other sources to determine you were likely to commit a crime. It's important for you to stop for a moment and think about the fact it is privately controlled by the former CIA director and Obama's National Security Advisor/NATO Supreme Allied Commander, should scare the heck out of you.

When the ClearForce application was complete, Dynology handed it off to ClearForce, the new company, and Michael Hayden joined the board of directors along with Gen. Jones and his son, Jim, as the president of ClearForce. Doesn't that kind of sound like "intelligence collection" described by the Daily Beast in Wikistrat's services?

To wrap this all up, Paul Manafort, Rick Davis, George Nader, Wikistrat and Psy Group are all directly connected to Mueller's social media influence and election interreference in the 2016 presidential election. In fact, I believe all are under indictment, computers seized, some already sentenced. All of these people under indictment by Mueller have one key thing in common, General James Jones's and Michael Hayden's social media black PSYOP tools; the ShadowNet, iPsy and ClearForce.

A recent meeting I had with Congressman Gus Bilirakis' chief of staff, Elizabeth Hittos, is confirmation that they are reviewing my DoD memorandum stating the work I did on the IIA information operation in Iraq, the Dynology marketing slicks for the ShadowNet and iPsy, along with a screenshot of Goggle's Way-Back Machine showing Paul Manafort's partnership with Dynology in 2007 and later. After presenting to her these facts and making clear I have much more information that requires the highest classification SCIF to discuss and requires being read-on to the program, Elizabeth contacted the office of Congressman Devin Nunez to request that I brief the intelligence committee on this critical information pertaining directly to the 2010 Ukrainian elections, Michael Brown riots, 2016 election interference and the "Russia collusion" hoax. All of that is on top of numerous questionable ethical and potentially illegal profits from DoD contracts while servings as NATO Commander and Obama's National Security Advisor.

We also need to know if the ShadowNet and iPsy were allowed to fall into foreign hands, including Russia, Saudi Arabia and Israel. I'm pretty sure South America is going to have a few questions for Jones and Obama as well? Stay tuned!

Balance-Sheet , 4 hours ago

Intelligence Agencies of all countries endlessly wage war at all times especially 'Information Warfare' (propaganda/disinformation) and the primary target has always and will always be the domestic population of the Intelligence Agency's country.

Yes, of course the CIA does target ALL other countries but the primary target will always be the Americans themselves.

Balance-Sheet , 4 hours ago

Intelligence Agencies of all countries endlessly wage war at all times especially 'Information Warfare' (propaganda/disinformation) and the primary target has always and will always be the domestic population of the Intelligence Agency's country.

Yes, of course the CIA does target ALL other countries but the primary target will always be the Americans themselves.

Paralentor , 5 hours ago

A lot more detail can be found here:

https://banned.video/watch?id=5f37fcc2df77c4044ee2eb03

SHADOW GATE – FULL FILM

462,864 views

yerfej , 8 hours ago

The neoliberals own the media, courts, academia, and BUREAUCRACY (including CIA) and they will do anything to make sure they retain power over everyone. These control freaks work hard to create all sorts of enemies to justify their existence.

LaugherNYC , 15 hours ago

It is sad that this information has to be repeatedly published, over and over and over, by SCI and other Russian. outlets.

Because no legit AMERICAN news outlet will give Binney or Assange the time of day or any credence, this all becomes Kremlin-sponsored disinformation and denials. People roll their eyes and say "Oh God, not the whole 'Seth Rich was murdered by the CIA' crap again!! You know, his FAMILY has asked that people stop spreading these conspiracy theories and lies."

SCI is a garbage bin, nothing more than a dizinformatz machine for Putin, but in this case, they are likely right. It seems preposterous that the "best hackers in the world" would forget to use a VPN or leave a signature behind, and it makes far more sense that the emails were leaked by someone irate at the abuses of the DNC - the squashing of Bernie, the cheating for Hillary in the debates - behavior we saw repeated in 2020 with Bernie shoved aside again for the pathetic Biden.

Would that SOMEONE in the US who is not on the Kremlin payroll would pick up this thread. But all the "investigative journalists" now work indirectly for the DNC, and those that don't are cancelled by the left.

Stone_d_agehurler , 15 hours ago

I am Guccifer and I approve this message.

Sarc/

But i do share your opinion. They are likely right this time and most of the pundits and media in the U. S. know it. That's what makes this a sad story about how rotten the U. S. system has become.

Democrats will sacrifice the Union for getting Trump out of office.

If elections in Nov won't go their way, Civil War II might become a real thing in 2021.

PeterLong , 4 hours ago

If " digital "fingerprints" in order to give the impression that the files came from Russian sources" were inserted in the leak by "Guccifer", and if the leak to wikileaks came from Seth Rich, via whatever avenue, then the "Guccifer" release came after the wikileaks release, or after wikileaks had the files, and was a reaction to same attempting to diminish their importance/accuracy and cast doubt on Trump. Could CIA and/or DNC have known the files were obtained by wikileaks before wikileaks actually released them? In any case collusion of CIA with DNC seems to be a given.

RightlyIndignent , 4 hours ago

Because Seth had already given it to Wikileaks. There is no 'Fancy Bear'. There is no 'Cozy Bear'. Those were made up by CrowdStrike, and they tried the same crap on Ukraine, and Ukraine told them to pound sand. When push came to shove, and CrowdStrike was forced to say what they really had under oath, they said: "We have nothing."

novictim , 4 hours ago

You are leaving out Crowd Strike. Seth Rich was tasked by people at the DNC to copy data off the servers. He made a backup copy and gave a copy to people who then got it to Wiki leaks. He used highspeed file transfers to local drives to do his task.

Meanwhile, it was the Ukrainian company Crowd Strike that claimed the data was stolen over the internet and that the thieves were in Russia. That 'proof" was never verified by US Intelligence but was taken on its word as being true despite crowd strike falsifying Russian hacks and being caught for it in the past.

Joebloinvestor , 5 hours ago

The "five eyes" are convinced they run the world and try to.

That is what Brennan counted on for these agencies to help get President Trump.

As I said, it is time for the UK and the US to have a serious conversation about their current and ex-spies being involved in US elections.

Southern_Boy , 5 hours ago

It wasn't the CIA. It was John Brennan and Clapper. The CIA, NSA FBI, DOJ and the Ukrainian Intelligence Service just went along working together and followed orders from Brennan who got them from Hillary and Obama.

Oh, and don't forget the GOP Globalist RINOs who also participated in the coup attempt: McCain, Romney, Kasich, Boehner, Lee and Richard Burr.

With Kasich now performing as a puppy dog for Biden at the Democrat Convention as a Democrat DNC executive, the re-alignment is almost complete: Globalist Nationalist Socialist Bolshevism versus American Populism, i.e. Elites versus Deplorables or Academics versus Smelly Wal-Mart people.

on target , 5 hours ago

No way. CIA up to their eyeballs in this as well as the State Department. Impossible for Russiagate or Ukrainegate without direct CIA and State involvement.

RightlyIndignent , 4 hours ago

Following Orders? How did that argument go at Nuremberg? (hint: not very well)

LeadPipeDreams , 6 hours ago

LOL - the CIA's main mission - despite their "official" charter, has always been to destabilize the US and its citizens via psyops, false flags, etc.

Covid-1984 is their latest and it appears most successful project yet.

Iconoclast27 , 5 hours ago

The CIA received a $200 million initial investment from the Rockefeller and Carnegie foundations when it was first established, that should tell you everything you need to know how who they truly work for.

A_Huxley , 6 hours ago

CIA, MI6, 5 eye nations.

All wanted to sway the USA their own way.

Let it Go , 8 hours ago

Almost as frightening as the concentrated power held by companies such as Facebook and Google is the fact Jeff Bezos, CEO of Amazon and the world's richest man, is the person who owns and controls the Washington Post. It is silly to think Jeff Bezos purchased the Washington Post in 2013 because he expected newspapers to make a lucrative resurgence.

It is more likely he purchased the long-trusted U.S. newspaper for the power it would ensure him in Washington when wielded as a propaganda mouthpiece to extend his ability to both shape and control public opinion. More on this subject in the article below.

https://Amazon, Jeff Bezos, And The Influential Washington Post_31.html

avoiceofliberty , 16 hours ago

The amazing thing about Binney's forensic analysis is that it has been around since 2018 .

It's also been clear since 2017 the hack of the DNC computers didn't hold up under scrutiny .

How it is the Democrats, the Deep State, and the legacy media are still able to cling to the remnants of these long discredited narratives is a mystery.

avoiceofliberty , 6 hours ago

At the official level, you have a point.

However, even before Mueller was appointed, a review of the materials in the extant public record of both the DNC "hack" and the history of Crowdstrike showed the narrative simply did not make sense. A detailed investigation of materials not made public was not necessary to shoot down the entire narrative.

Indeed, one of the great scandals of the Mueller probe is the way it did not bring prudential skepticism to the question of the DNC "hack". When building a case, either for public debate or for public trial, a dose of skepticism is healthy; it leads to a careful vetting of facts and reasoning.

Alice-the-dog , 6 hours ago

The CIA has been an agency wholly independent of the US government almost since its inception. It is not under any significant control by the government, and has its own agenda which may occasionally coincide with that of the government, but only coincidentally. It has its own view of how the world should look, and will not balk at any means necessary to achieve such. Including the murder of dis-favorable members of government.

snodgrass , 6 hours ago

It's the CIA and the FBI, Obama and people in his administration who cooked up Russiagate.

Floki_Ragnarsson , 7 hours ago

The CIA whacked JFK because he was going to slow the roll to Vietnam AND disband the CIA and reform it.

It is broken and needs to be disbanded and reformed along lines that actually WORK! The CIA missed the fall of the USSR, 9/11, etc. HTF does THAT happen?

DeportThemAll , 6 hours ago

The CIA didn't "miss" 9/11... they participated in it.

Let it Go , 8 hours ago

The CIA is a tool that when improperly used can do great damage.

Anyone who doesn't believe that countries use psychological warfare and propaganda to sway the opinions of people both in and outside of their country should be considered naive. Too many people America is more than a little hypocritical when they criticize other countries for trying to gain influence considering our history of meddling in the affairs of other countries.

Americans have every reason to be concerned and worried considering revelations of just how big the government intelligence agencies have grown since 9-11 and how unlimited their spying and surveillance operations have become. The article below explores this growth and questions whether we have lost control.

http://Psychological Warfare And Propaganda Out Of Control.html

tion , 16 hours ago

The idea of Binney and Jason Sullivan privately working to 'secure the vote' is something that I actually consider to be very eyebrow raising and alarming.

Son of Captain Nemo , 8 hours ago

Bill Binney under "B" in the only "yellow pages" that show a conscience and a soul!...

https://www.ae911truth.org/signatures/#/General/B/williambinneysevernMDUS

fliebinite , 9 hours ago

This is the dumbest article ever. Russiagate is a total fabrication of the FBI as per Clinesmith, CIA provided information that would have nipped it at the bud. Read the real news.

bringonthebigone , 9 hours ago

Wrong. this article is one small piece of the puzzle. Clinesmith is one small piece of the puzzle. The Flynn entrapment is one small piece of the puzzle. The Halper entrapment was one small piece of the puzzle.

Because Clinesmith at the FBI covered up the information saying Page was a CIA source does not mean it was a total FBI fabrication and does not mean the CIA was not involved and does not mean the DNC server hack is irrelevant.

Milley Weaver gets close in her recent video. https://www.youtube.com/watch?v=9HFxVvrXjCg

Sundance does a better job pulling it all together.

PKKA , 14 hours ago

Relations have already soured between Russia and the United States, and sanctions have been announced. Tensions have grown on the NATO-Russia border. The meat has already been rolled into the minced meat and it will not be possible to roll the minced meat back into the meat. The CIA got it. But the Russian people now absolutely understand that the United States will always be the enemy of Russia, no matter whether socialist or capitalist. But I like it even more than the feigned hypocritical "friendship". Russia has never reached such heights as during the good old Cold War. All Russians have a huge incentive, long live the new Cold War!

smacker , 12 hours ago

More and more people have worked out that the fabricated tensions between the US and Russia
and US and China have little to do with those two countries posing any sort of threat to world peace.

It is all about the US trying to remain in No.1 position as uni-polar top dog via the Anglo American Empire.
We see examples of this every day in the M/E, South China Sea, Taiwan, Libya all over Eastern Europe,
Ukraine, Iran and now Belaruse. HK was added along the way.

Both Russia and China openly want a multi-polar world order. But the US will never accept that.

Hence the prospect of war. The only unknown today is what and where the trigger will be.

smacker , 12 hours ago

More and more people have worked out that the fabricated tensions between the US and Russia
and US and China have little to do with those two countries posing any sort of threat to world peace.

It is all about the US trying to remain in No.1 position as uni-polar top dog via the Anglo American Empire.
We see examples of this every day in the M/E, South China Sea, Taiwan, Libya all over Eastern Europe,
Ukraine, Iran and now Belaruse. HK was added along the way.

Both Russia and China openly want a multi-polar world order. But the US will never accept that.

Hence the prospect of war. The only unknown today is what and where the trigger will be.

hang_the_banksters , 31 minutes ago

the best proof thAt Guccifer 2 was CIA hacking themselves to frame Wikileaks is this:

Guccifer has not yet been identified, indicted and arrested.

you'd think CIAFBINSA would be turning over every stone to the ends of the earth to bust Guccifer. we just had to endure 4 years of hysterical propaganda that Russia had hacked our election and that Trump was their secret agent. so Guccifer should be the Most Wanted Man on the planet. meanwhile, it's crickets from FBI. they arent even looking for him. because Guccifer is over at Langley. maybe someone outta ask Brennan where G2 is now.

remember when DOJ indicted all those GRU cybersoldiers? the evidence listed in the indictment was so stunning that i dont believe it. NSA so thoroughly hacked back into GRU that NSA was watching GRU through their own webcams and recording them doing Google searches to translate words which were written in Guccifer's blog posts about the DNC email leaks. NSA and DOJ must think we are all stupid, that we will believe NSA is so powerful to do that, yet they cant identify Guccifer.

i say i dont believe that for a second because no way Russian GRU are so stupid to even have webcams on the computers they use to hack, and it is absurd to think GRU soldiers on a Russian military base would be using Google instead of Yandex to translate words into English.

lay_arrow
ConanTheContrarian1 , 1 hour ago

As a confirmed conspiracy theorist since I came back from 'Nam, here's mine: The European nobility recognized with the American and French revolutions that they needed a better approach. They borrowed from the Tudors (who had to deal with Parliament) and began to rule by controlling the facade of representative government. This was enhanced by funding banks to control through currency, as well as blackmail and murder, and morphed into a complete propaganda machine like no other in history. The CIA, MI6 and Mossad, the mainstream media, deep plants in bureaucracy and "democratic" bodies all obey their dictates to create narratives that control our minds. Trump seems to offer hope, but remember, he could be their latest narrative.

greatdisconformity , 1 hour ago

A Democracy cannot function on a higher level than the general electorate.

The intelligence and education of the general electorate has been sliding for generations, because both political parties can play this to their advantage.

It is no accident that most of the messages coming from politicians are targeted to imbeciles.

[Jun 16, 2020] Veteran CIA Analyst- How An Internet 'Persona' Helped Birth Russiagate -

Jun 16, 2020 | www.zerohedge.com

Veteran CIA Analyst: How An Internet 'Persona' Helped Birth Russiagate


by Tyler Durden Tue, 06/16/2020 - 19:25 Twitter Facebook Reddit Email Print

Authored by Ray McGovern via ConsortiumNews.com,

Four years ago on June 15, 2016, a shadowy Internet persona calling itself "Guccifer 2.0" appeared out of nowhere to claim credit for hacking emails from the Democratic National Committee on behalf of WikiLeaks and implicate Russia by dropping "telltale" but synthetically produced Russian "breadcrumbs" in his metadata.

Thanks largely to the corporate media, the highly damaging story actually found in those DNC emails – namely, that the DNC had stacked the cards against Bernie Sanders in the party's 2016 primary – was successfully obscured .

The media was the message; and the message was that Russia had used G-2.0 to hack into the DNC, interfering in the November 2016 election to help Donald Trump win.

me frameborder=

Almost everybody still "knows" that – from the man or woman in the street to the forlorn super sleuth, Special Counsel Robert Swan Mueller III, who actually based indictments of Russian intelligence officers on Guccifer 2.0.

Blaming Russia was a magnificent distraction from the start and quickly became the vogue.

The soil had already been cultivated for "Russiagate" by Democratic PR gems like Donald Trump "kissing up" to former KGB officer Vladimir Putin and their "bromance" (bromides that former President Barack Obama is still using). Four years ago today, "Russian meddling" was off and running – on steroids – acquiring far more faux-reality than the evanescent Guccifer 2.0 persona is likely to get.

Here's how it went down :

about:blank

me frameborder=

Adding to other signs of fakery, there is hard evidence that G-2.0 was operating mostly in U.S. time zones and with local settings peculiar to a device configured for use within the US , as Tim Leonard reports here and here .)

Leonard is a software developer who started to catalog and archive evidence related to Guccifer 2.0 in 2017 and has issued detailed reports on digital forensic discoveries made by various independent researchers – as well as his own – over the past three years. Leonard points out that WikiLeaks said it did not use any of the emails G2.0 sent it, though it later published similar emails, opening the possibility that whoever created G2.0 knew what WikiLeaks had and sent it duplicates with the Russian fingerprints .

As Veteran Intelligence Professionals for Sanity (VIPS) told President Trump in a memorandum of July 24, 2017, titled "Was the 'Russian Hack' an Inside Job?":

"We do not think that the June 12, 14, & 15 timing was pure coincidence. Rather, it suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might have been ready to publish and to 'show' that it came from a Russian hack."

We added this about Guccifer 2.0 at the time:

"The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original 'Guccifer 2.0' material remains a mystery – as does the lack of any sign that the 'hand-picked analysts' from the FBI, CIA, and NSA, who wrote the misnomered 'Intelligence Community' Assessment dated January 6, 2017, gave any attention to forensics."

Guccifer 2.0 Seen As a Fraud

In our July 24, 2017 memorandum we also told President Trump that independent cyber investigators and VIPs had determined "that the purported 'hack' of the DNC by Guccifer 2.0 was not a hack, by Russia or anyone else. Rather it originated with a copy (onto an external storage device – a thumb drive, for example) by an insider. Information was leaked to implicate Russia. We do not know who or what the murky Guccifer 2.0 is. You may wish to ask the FBI. " [Emphasis added.].

Right. Ask the FBI. At this stage, President Trump might have better luck asking Attorney General William Barr, to whom the FBI is accountable – at least in theory. As for Barr, VIPs informed him in a June 5, 2020 memorandum that the head of CrowdStrike had admitted under oath on Dec. 5, 2017 that CrowdStrike has no concrete evidence that the DNC emails published by WikiLeaks on July 22, 2016 were hacked – by Russia or by anyone else. [Emphasis added.] This important revelation has so far escaped attention in the Russia-Russia-Russia "mainstream" media (surprise, surprise, surprise!).

Back to the Birth of G-2

It boggles the mind that so few Americans could see Russiagate for the farce it was. Most of the blame, I suppose, rests on a thoroughly complicit Establishment media. Recall: Assange's announcement on June 12, 2016 that he had Hillary Clinton-related emails came just six weeks before the Democratic convention. I could almost hear the cry go up from the DNC: Houston, We Have a Problem!

Here's how bad the problem for the Democrats was. The DNC emails eventually published by WikiLeaks on July 22, 2016, just three days before the Democratic convention, had been stolen on May 23 and 25. This would have given the DNC time to learn that the stolen material included documents showing how the DNC and Clinton campaign had manipulated the primaries and created a host of other indignities, such that Sanders' chances of winning the nomination amounted to those of a snowball's chance in the netherworld.

Clinton at the 2016 convention, via Wikimedia Commons.

To say this was an embarrassment would be the understatement of 2016. Worse still, given the documentary nature of the emails and WikiLeaks' enviable track record for accuracy, there would be no way to challenge their authenticity. Nevertheless, with the media in full support of the DNC and Clinton, however, it turned out to be a piece of cake to divert attention from the content of the emails to the "act of war" (per John McCain) that the Russian "cyber attack" was said to represent .

The outcome speaks as much to the lack of sophistication on the part of American TV watchers, as it does to the sophistication of the Democrats-media complicity and cover-up. How come so few could figure out what was going down?

It was not hard for some experienced observers to sniff a rat. Among the first to speak out was fellow Consortium News columnist Patrick Lawrence, who immediately saw through the Magnificent Diversion. I do not know if he fancies duck hunting, but he shot the Russiagate canard quite dead – well before the Democratic convention was over.

Magnificent Diversion

In late July 2016, Lawrence was sickened, as he watched what he immediately recognized as a well planned, highly significant deflection. The Clinton-friendly media was excoriating Russia for "hacking" DNC emails and was glossing over what the emails showed ; namely, that the Clinton Dems had pretty much stolen the nomination from Sanders.

It was already clear even then that the Democrats, with invaluable help from intelligence leaks and other prepping to the media, had made good use of those six weeks between Assange's announcement that he had emails "related to Hillary Clinton" and the opening of the convention.

The media was primed to castigate the Russians for "hacking," while taking a prime role in the deflection. It was a liminal event of historic significance, as we now know. The "Magnificent Diversion" worked like a charm – and then it grew like Topsy.

Lawrence said he had "fire in the belly" on the morning of July 25 as the Democratic convention began and wrote what follows pretty much "in one long, furious exhale" within 12 hours of when the media started really pushing the "the Russians-did-it" narrative.

Patrick Lawrence

Below is a slightly shortened text of his article :

"Now wait a minute, all you upper-case "D" Democrats. A flood light suddenly shines on your party apparatus, revealing its grossly corrupt machinations to fix the primary process and sink the Sanders campaign, and within a day you are on about the evil Russians having hacked into your computers to sabotage our elections

Is this a joke? Are you kidding? Is nothing beneath your dignity? Is this how lowly you rate the intelligence of American voters?

Clowns. Subversives. Do you know who you remind me of? I will tell you: Nixon, in his famously red-baiting campaign – a disgusting episode – during his first run for the Senate, in 1950. Your political tricks are as transparent and anti-democratic as his, it is perfectly fair to say.

I confess to a heated reaction to events since last Friday [July 22] among the Democrats, specifically in the Democratic National Committee. I should briefly explain

The Sanders people have long charged that the DNC has had its fingers on the scale, as one of them put it the other day, in favor of Hillary Clinton's nomination. The prints were everywhere – many those of Debbie Wasserman Schultz, who has repeatedly been accused of anti-Sanders bias. Schultz, do not forget, co-chaired Clinton's 2008 campaign against Barack Obama. That would be enough to disqualify her as the DNC's chair in any society that takes ethics seriously, but it is not enough in our great country. Chairwoman she has been for the past five years.

Last Friday WikiLeaks published nearly 20,000 DNC email messages providing abundant proof that Sanders and his staff were right all along. The worst of these, involving senior DNC officers, proposed Nixon-esque smears having to do with everything from ineptitude within the Sanders campaign to Sanders as a Jew in name only and an atheist by conviction.

NEVER MISS THE NEWS THAT MATTERS MOST

ZEROHEDGE DIRECTLY TO YOUR INBOX

Receive a daily recap featuring a curated list of must-read stories.

Wasserman fell from grace on Monday. Other than this, Democrats from President Obama to Clinton and numerous others atop the party's power structure have had nothing to say, as in nothing, about this unforgivable breach. They have, rather, been full of praise for Wasserman Schultz. Brad Marshall, the D.N.C.'s chief financial officer, now tries to deny that his Jew-baiting remark referred to Sanders. Good luck, Brad: Bernie is the only Jew in the room.

The caker came on Sunday, when Robby Mook, Clinton's campaign manager, appeared on ABC's "This Week" and CNN's "State of the Union" to assert that the D.N.C.'s mail was hacked "by the Russians for the purpose of helping Donald Trump." He knows this – knows it in a matter of 24 hours – because "experts" – experts he will never name – have told him so.

What's disturbing to us is that experts are telling us that Russian state actors broke into the DNC, stole these emails, and other experts are now saying that Russians are releasing these emails for the purpose of helping Donald Trump.

Is that what disturbs you, Robby? Interesting. Unsubstantiated hocus-pocus, not the implications of these events for the integrity of Democratic nominations and the American political process? The latter is the more pressing topic, Robby. You are far too long on anonymous experts for my taste, Robby. And what kind of expert, now that I think of it, is able to report to you as to the intentions of Russian hackers – assuming for a sec that this concocted narrative has substance?

Making lemonade out of a lemon, the Clinton campaign now goes for a twofer. Watch as it advances the Russians-did-it thesis on the basis of nothing, then shoots the messenger, then associates Trump with its own mess – and, finally, gets to ignore the nature of its transgression (which any paying-attention person must consider grave).

Preposterous, readers. Join me, please, in having absolutely none of it. There is no "Russian actor" at the bottom of this swamp, to put my position bluntly. You will never, ever be offered persuasive evidence otherwise.

Reluctantly, I credit the Clinton campaign and the DNC with reading American paranoia well enough such that they may make this junk stick. In a clear sign the entire crowd-control machine is up and running, The New York Times had a long, unprofessional piece about Russian culprits in its Monday editions. It followed Mook's lead faithfully: not one properly supported fact, not one identified "expert," and more conditional verbs than you've had hot dinners – everything cast as "could," "might," "appears," "would," "seems," "may." Nothing, once again, as to the very serious implications of this affair for the American political process.

Now comes the law. The FBI just announced that it will investigate – no, not the DNC's fraudulent practices (which surely breach statutes), but "those who pose a threat in cyberspace." it is the invocation of the Russians that sends me over the edge. My bones grow weary

We must take the last few days' events as a signal of what Clinton's policy toward Russia will look like should she prevail in November. Turning her party's latest disgrace into an occasion for another round of Russophobia is mere preface, but in it you can read her commitment to the new crusade.

Trump, to make this work, must be blamed for his willingness to negotiate with Moscow. This is now among his sins. Got that? Anyone who says he will talk to the Russians has transgressed the American code. Does this not make Hillary Clinton more than a touch Nixonian?

I am developing nitrogen bends from watching the American political spectacle. One can hardly tell up from down. Which way for a breath of air?"

A year later Lawrence interviewed several of us VIPs, including our two former NSA technical directors and on Aug. 9, 2017 published an article for The Nation titled, "A New Report Raises Big Questions About Last Year's DNC Hack."

Lawrence wrote, "Former NSA experts, now members of Veteran Intelligence Professionals for Sanity (VIPs), say it wasn't a hack at all, but a leak – an inside job by someone with access to the DNC's system."

And so it was. But, sadly, that cut across the grain of the acceptable Russia-gate narrative at The Nation at the time. Its staff, seriously struck by the HWHW (Hillary Would Have Won) virus, rose up in rebellion. A short time later, there was no more room at The Nation for his independent-minded writing.


Drop-Hammer , 2 hours ago

His name was (((Seth Rich))).

zoomie92 , 1 hour ago

Direct USB download to chip or portable HD was the only way to get those download speed shown on the file metadata. This has been proven in multiple independent ways. But the press is filled with ******* retards - and so is the country.

Franko , 1 hour ago

Rest in Peace Mr Seth.

I believe many US officials have enough and want to tell the others about this.

Question:were they should be go to spread the news?To which country before been assasinated?

To end like Julian Assange or like Snowden?

belogical , 2 hours ago

...Gucifer had much less to do with this than the Obama admin. They were using the intelligence community for no good and as their crimes became visible they had to commit bigger and bigger crimes to cover them up. In the end a large part of the DOJ, FBI and Obama admin should be held accountable for this, but when you get this high they likely won't. You can already see Lindsey Graham of the deep state finally holding hearing to spin the narrative before the Durham probe becomes public. Unfortunate but only a few will get their hands slapped and the true person, Obama who deserve to be prosecuted will likely skate.

PedroS , 2 hours ago

Crowdstrike. The owners should be in jail for their role.

Slaytheist , 2 hours ago

Crowdstrike IS Guccifer.

They were ordered by the criminal DNC org to cover the fact that the data was downloaded internally, in order to hide the connection to the Podesta/Clinton ordered hit on person who did it - Seth Rich.

Weedlord Bonerhitler , 3 hours ago

The computer of a DNC operative named Warren Flood was used to disseminate the Guccifer 2.0 disinfo tranche. Adam Carter had the analysis IIRC.

Giant Meteor , 3 hours ago

Always good to hear from Ray!

philipat , 39 minutes ago

Tick tock, still no indictments and soon the campaign will be in full swing so that everything will be attacked as "political". Is Durham done?

[Jun 03, 2020] Rule of law in Murrika is kaput

Highly recommended!
Jun 16, 2019 | www.zerohedge.com

freedommusic , 23 minutes ago link

DEFENSE ATTORNEY: Agent Smith, you testified that the Russians hacked the DNC computers, is that correct?

FBI AGENT JOHN SMITH: That is correct.

DEF ATT: Upon what information did you base your testimony?

AGENT: Information found in reports analyzing the breach of the computers.

DEF ATT: So, the FBI prepared these reports?

AGENT: (cough) . (shift in seat) No, a cyber security contractor with the FBI.

DEF ATT: Pardon me, why would a contractor be preparing these reports? Do these contractors run the FBI laboratories where the server was examined?

AGENT: No.

DEF ATT: No? No what? These contractors don't run the FBI Laboratories?

AGENT: No. The laboratories are staffed by FBI personnel.

DEF ATT: Well I don't understand. Why would contractors be writing reports about computers that are forensically examined in FBI laboratories?

AGENT: Well, the servers were not examined in the FBI laboratory.

(silence)

DEF ATT: Oh, so the FBI examined the servers on site to determine who had hacked them and what was taken?

AGENT: Uh .. no.

DEF ATT: They didn't examine them on site?

AGENT: No.

DEF ATT: Well, where did they examine them?

AGENT: Well, uh .. the FBI did not examine them.

DEF ATT: What?

AGENT: The FBI did not directly examine the servers.

DEF ATT: Agent Smith, the FBI has presented to the Grand Jury and to this court and SWORN AS FACT that the Russians hacked the DNC computers. You are basing your SWORN testimony on a report given to you by a contractor, while the FBI has NEVER actually examined the computer hardware?

AGENT: That is correct.

DEF ATT: Agent Smith, who prepared the analysis reports that the FBI relied on to give this sworn testimony?

AGENT: Crowdstrike, Inc.

DEF ATT: So, which Crowdstrike employee gave you the report?

AGENT: We didn't receive the report directly from Crowdstrike.

DEF ATT: What?

AGENT: We did not receive the report directly from Crowdstrike.

DEF ATT: Well, where did you find this report?

AGENT: It was given to us by the people who hired Crowdstrike to examine and secure their computer network and hardware.

DEF ATT: Oh, so the report was given to you by the technical employees for the company that hired Crowdstrike to examine their servers?

AGENT: No.

DEF ATT: Well, who gave you the report?

AGENT: Legal counsel for the company that hired Crowdstrike.

DEF ATT: Why would legal counsel be the ones giving you the report?

AGENT: I don't know.

DEF ATT: Well, what company hired Crowdstrike?

AGENT: The Democratic National Committee.

DEF ATT: Wait a minute. Let me get this straight. You are giving SWORN testimony to this court that Russia hacked the servers of the Democratic National Committee. And you are basing that testimony on a report given to you by the LAWYERS for the Democratic National Committee. And you, the FBI, never actually saw or examined the computer servers?

AGENT: That is correct.

DEF ATT: Well, can you provide a copy of the technical report produced by Crowdstrike for the Democratic National Committee?

AGENT: No, I cannot.

DEF ATT: Well, can you go back to your office and get a copy of the report?

AGENT: No.

DEF ATT: Why? Are you locked out of your office?

AGENT: No.

DEF ATT: I don't understand. Why can you not provide a copy of this report?

AGENT: Because I do not have a copy of the report.

DEF ATT: Did you lose it?

AGENT: No.

DEF ATT: Why do you not have a copy of the report?

AGENT: Because we were never given a final copy of the report.

DEF ATT: Agent Smith, if you didn't get a copy of the report, upon what information are you basing your testimony?

AGENT: On a draft copy of the report.

DEF ATT: A draft copy?

AGENT: Yes.

DEF ATT: Was a final report ever delivered to the FBI?

AGENT: No.

DEF ATT: Agent Smith, did you get to read the entire report?

AGENT: No.

DEF ATT: Why not?

AGENT: Because large portions were redacted.

DEF ATT: Agent Smith, let me get this straight. The FBI is claiming that the Russians hacked the DNC servers. But the FBI never actually saw the computer hardware, nor examined it? Is that correct?

AGENT: That is correct.

DEF ATT: And the FBI never actually examined the log files or computer email or any aspect of the data from the servers? Is that correct?

AGENT: That is correct.

DEF ATT: And you are basing your testimony on the word of Counsel for the Democratic National Committee, the people who provided you with a REDACTED copy of a DRAFT report, not on the actual technical personnel who supposedly examined the servers?

AGENT: That is correct.

DEF ATT: Your honor, I have a few motions I would like to make at this time.

PRESIDING JUDGE: I'm sure you do, Counselor. (as he turns toward the prosecutors) And I feel like I am in a mood to grant them.

( source )

hooligan2009 , 14 minutes ago link

Brilliant! that sums it up nicely. of course, if the servers were not hacked and were instead "thumbnailed" that leads to a whole pile of other questions (including asking wiileaks for their source and about the murder of seth rich).

[May 27, 2020] Brennan ears over Guccifer 2.0 mask -- CIA is the most probable origin of Gussifer 2.0

If DNC was hack not a leak, then NSA would have all information about the hack.
May 27, 2020 | consortiumnews.com

www.youtube.com/watch?v=_j1qOs0dE4I


P. Michael Garber , May 26, 2020 at 22:21

I'm afraid it won't matter how thorough the alternative media debunking of Russiagate becomes – as long as mainstream media sticks to the story, the neoliberal majority will too, because it is like catnip to them, absolving responsibility for the defeat, casting Clinton as the victim of an evil foreign despot, and delegitimizing Trump. Truth is tossed to the wind by this freight train of powerful interests.

I have little hope Barr and Durham will indict anyone high level.

Ray twice mentioned something about Sanders getting hosed again in the 2020 primary. I thought it seemed weird how suddenly the primary was declared "over." If there is evidence of DNC shenanigans in 2020, that would be a very interesting and timely topic.

Mark McCarty , May 25, 2020 at 21:25

On June 12, Assange announces Wikileaks will soon be releasing "emails pertinent to Hillary". On June 14th, Crowdstrike announces: someone, probably the Russians, has hacked the DNC and taken a Trump opposition research document; the very next day, G2.0 makes his first public appearance and posts the DNC's Trump oppo research document, with "Russian fingerprints" intentionally implanted in its metadata. (We now know that he had actually acquired this from PODESTA's emails, where it appears as an attachment – oops!) Moreover, G2.0 announces that he was the source of the "emails pertinent to Hillary" – DNC emails – that Assange was planning to release.

This strongly suggests that the G2.0 persona was working in collusion with Crowdstrike to perpetrate the hoax that the GRU had hacked the DNC to provide their emails to Wikileaks. Consistent with this, multiple cyberanalyses point to G2.0 working at various points In the Eastern, Central, and Western US time zones. (A mere coincidence that the DNC is in the eastern zone, and that Crowdstrike has offices in the central and western zones?)

If Crowdstrike honestly believed that the DNC had been hacked by the GRU, would there have been any need for them to perpetrate this fraud?

It is therefore reasonable to suspect, as Ray McGovern has long postulated, that Crowdstrike may have FAKED a GRU hack, to slander Russia and Assange, while distracting attention from the content of the released emails.

As far as we know, the only "evidence" that Crowdstrike has for GRU being the perpetrator of the alleged hack is the presence of "Fancy Bear" malware on the DNC server. But as cyberanalysts Jeffrey Carr and George Eliason have pointed out, this software is also possessed by Ukrainian hackers working in concert with Russian traitors and the Atlantic Council – with which the founders of Crowdstrike are allied.

Here's a key question: When Assange announced the impending release of "emails pertinent to Hillary" on June 12, how did Crowdstrike and G2.0 immediately know he was referring to DNC emails? Many people – I, for example – suspected he was referring to her deleted Secretary of State emails.

Here's a reasonable hypothesis – Our intelligence agencies were monitoring all communications with Wikileaks. If so, they could have picked up the communications between SR and Wikileaks that Sy Hersh's FBI source described. They then alerted the DNC that their emails were about to leaked to Wikileaks. The DNC then contacted Crowdstrike, which arranged for a "Fancy Bear hack" of the DNC servers. Notably, cyberanalysts have determined that about 2/3 of the Fancy Bear malware found on the DNC servers had been compiled AFTER the date that Crowdstrike was brought in to "roust the hackers".

Of course, this elaborate hoax would have come to grief if the actual leaker had come forward. Which might have had something to do with the subsequent "botched robbery" in which SR was slain.

Tim , May 25, 2020 at 20:33

How does the murder of the DNC staffer fit in?

Linda Wood , May 26, 2020 at 23:00

DNC staffer Seth Rich was murdered on July 10, 2016, amid contoversy over who provided DNC emails to Wikileaks and over a pending lawsuit concerning voter suppression during the 2016 primaries. Wikileaks offered a $20,000 reward for information about his murder, leading some to believe he was their source for the DNC emails. He was reported to have been a potential witness in the voter suppression lawsuit filed the day after his death.

mockingbirdpaper (dot) com/content/local-activist-files-suit-access-exit-polling-data-dead-witness-blocks-path-truth

[May 24, 2020] Guccifer 2.0 was always John Brennan 1.0

Highly recommended!
Images deleted.
False flag operation by CIA or CrowdStrike as CIA constructor: CIA ears protrude above Gussifer 2.0 hat.
Notable quotes:
"... Guccifer 2.0 fabricated evidence to claim credit for hacking the DNC (using files that were really Podesta attachments) . ..."
"... Guccifer 2.0’s Russian breadcrumbs mostly came from deliberate processes & needless editing of documents . ..."
"... Guccifer 2.0’s Russian communications signals came from the persona choosing to use a proxy server in Moscow and choosing to use a Russian VPN service as end-points (and they used an email service that forwards the sender’s IP address, which made identifying that signal a relatively trivial task.) ..."
"... A considerable volume of evidence pointed at Guccifer 2.0’s activities being in American timezones (twice as many types of indicators were found pointing at Guccifer 2.0’s activities being in American timezones than anywhere else). ..."
"... The American timezones were incidental to other activities (eg. blogging , social media , emailing a journalist , archiving files , etc) and some of these were recorded independently by service providers. ..."
"... A couple of pieces of evidence with Russian indicators present had accompanying locale indicators that contradicted this which suggested the devices used hadn’t been properly set up for use in Russia (or Romania) but may have been suitable for other countries (including America) . ..."
"... On the same day that Guccifer 2.0 was plastering Russian breadcrumbs on documents through a deliberate process, choosing to use Russian-themed end-points and fabricating evidence to claim credit for hacking the DNC, the operation attributed itself to WikiLeaks. ..."
"... Guccifer 2.0 chose to use insecure communications to ask WikiLeaks to confirm receipt of “DNC emails” on July 6, 2016. Confirmation of this was not provided at that time but WikiLeaks did confirm receipt of a “1gb or so” archive on July 18, 2016. ..."
"... The alleged GRU officer we are told was part of an operation to deflect from Russian culpability suggested that Assange “may be connected with Russians”. ..."
"... Guccifer 2.0 fabricated evidence to claim credit for hacking the DNC, covered itself (and its files) in what were essentially a collection of “Made In Russia” labels through deliberate processes and decisions made by the persona, and, then, it attributed itself to WikiLeaks with a claim that was contradicted by subsequent communications between both parties. ..."
"... While we are expected to accept that Guccifer 2.0’s efforts between July 6 and July 18 were a sincere effort to get leaks to WikiLeaks, considering everything we now know about the persona, it seems fair to question whether Guccifer 2.0’s intentions towards WikiLeaks may have instead been malicious. ..."
"... Guccifer 2.0 was always John Brennan 1.0 ..."
"... Was Guccifer II part of the Stefan Halper organization that lured Papadopoulos and maliciously maligned others? ..."
"... I believe Guccifer 2.0 was created by the CIA to falsely pin blame on the Russians for info that Seth Rich gave to WikiLeaks. Read for yourself: http://g-2.space/ ..."
May 24, 2020 | www.zerohedge.com

Authored by Tim Leonard via ConsortiumNews.com,

Why would an alleged GRU officer - supposedly part of an operation to deflect Russian culpability - suggest that Assange “may be connected with Russians?”

In December, I reported on digital forensics evidence relating to Guccifer 2.0 and highlighted several key points about the mysterious persona that Special Counsel Robert Mueller claims was a front for Russian intelligence to leak Democratic Party emails to WikiLeaks:

On the same day that Guccifer 2.0 was plastering Russian breadcrumbs on documents through a deliberate process, choosing to use Russian-themed end-points and fabricating evidence to claim credit for hacking the DNC, the operation attributed itself to WikiLeaks.

This article questions what Guccifer 2.0’s intentions were in relation to WikiLeaks in the context of what has been discovered by independent researchers during the past three years.

Timing

On June 12, 2016, in an interview with ITV’s Robert Peston, Julian Assange confirmed that WikiLeaks had emails relating to Hillary Clinton that the organization intended to publish. This announcement was prior to any reported contact with Guccifer 2.0 (or with DCLeaks).

On June 14, 2016, an article was published in The Washington Post citing statements from two CrowdStrike executives alleging that Russian intelligence hacked the DNC and stole opposition research on Trump. It was apparent that the statements had been made in the 48 hours prior to publication as they referenced claims of kicking hackers off the DNC network on the weekend just passed (June 11-12, 2016).

On that same date, June 14, DCLeaks contacted WikiLeaks via Twitter DM and for some reason suggested that both parties coordinate their releases of leaks. (It doesn’t appear that WikiLeaks responded until September 2016).

On June 15, 2016, Guccifer 2.0 appeared for the first time. He fabricated evidence to claim credit for hacking the DNC (using material that wasn’t from the DNC), used a proxy in Moscow to carry out searches (for mostly English language terms including a grammatically incorrect and uncommon phrase that the persona would use in its first blog post) and used a Russian VPN service to share the fabricated evidence with reporters. All of this combined conveniently to provide false corroboration for several claims made by CrowdStrike executives that were published just one day earlier in The Washington Post.

[CrowdStrike President Shawn Henry testified under oath behind closed doors on Dec. 5, 2017 to the U.S. House intelligence committee that his company had no evidence that Russian actors removed anything from the DNC servers. This testimony was only released earlier this month.]

First Claim Versus First Contact

On the day it emerged, the Guccifer 2.0 operation stated that it had given material to WikiLeaks and asserted that the organization would publish that material soon:

By stating that WikiLeaks would “publish them soon” the Guccifer 2.0 operation implied that it had received confirmation of intent to publish.

However, the earliest recorded communication between Guccifer 2.0 and WikiLeaks didn’t occur until a week later (June 22, 2016) when WikiLeaks reached out to Guccifer 2.0 and suggested that the persona send any new material to them rather than doing what it was doing:

[Excerpt from Special Counsel Mueller’s report. Note: “stolen from the DNC” is an editorial insert by the special counsel.]

If WikiLeaks had already received material and confirmed intent to publish prior to this direct message, why would they then suggest what they did when they did? WikiLeaks says it had no prior contact with Guccifer 2.0 despite what Guccifer 2.0 had claimed.

Needing To Know What WikiLeaks Had

Fortunately, information that gives more insight into communications on June 22, 2016 was made available on April 29, 2020 via a release of the Roger Stone arrest warrant application.

Here is the full conversation on that date (according to the application):

@WikiLeaks: Do you have secure communications?

@WikiLeaks: Send any new material here for us to review and it will have a much higher impact than what you are doing. No other media will release the full material.

@GUCCIFER_2: what can u suggest for a secure connection? Soft, keys, etc? I’m ready to cooperate with you, but I need to know what’s in your archive 80gb? Are there only HRC emails? Or some other docs? Are there any DNC docs? If it’s not secret when you are going to release it?

@WikiLeaks: You can send us a message in a .txt file here [link redacted]

@GUCCIFER_2: do you have GPG?

Why would Guccifer 2.0 need to know what material WikiLeaks already had? Certainly, if it were anything Guccifer 2.0 had sent (or the GRU had sent) he wouldn’t have had reason to inquire.

The more complete DM details provided here also suggest that both parties had not yet established secure communications.

Further communications were reported to have taken place on June 24, 2016:

@GUCCIFER_2: How can we chat? Do u have jabber or something like that?

@WikiLeaks: Yes, we have everything. We’ve been busy celebrating Brexit. You can also email an encrypted message to [email protected]. They key is here.

and June 27, 2016:

@GUCCIFER_2: Hi, i’ve just sent you an email with a text message encrypted and an open key.

@WikiLeaks: Thanks.

@GUCCIFER_2: waiting for ur response. I send u some interesting piece.

Guccifer 2.0 said he needed to know what was in the 88GB ‘insurance’ archive that WikiLeaks had posted on June 16, 2016 and it’s clear that, at this stage, secure communications had not been established between both parties (which would seem to rule out the possibility of encrypted communications prior to June 15, 2016, making Guccifer 2.0’s initial claims about WikiLeaks even more doubtful).

Claims DCLeaks Is A Sub-Project Of WikiLeaks

On June 27, 2016, in an email chain to the Smoking Gun (exposing Guccifer 2.0 apparently being in the Central US timezone), Guccifer 2.0 claimed that DCLeaks was a “sub-project” of WikiLeaks.

There’s no evidence to support this. “Envoy le” is also a mistake as standard French emails read: “Envoye le.” Claims allegedly made by Guccifer 2.0 in a Twitter DM to DCLeaks on September 15, 2016 suggest that he knew this was nonsense:

There was no evidence of WikiLeaks mentioning this to Guccifer 2.0 nor any reason for why WikiLeaks couldn’t just send a DM to DCLeaks themselves if they had wanted to.

(It should also be noted that this Twitter DM activity between DCLeaks and Guccifer 2.0 is alleged by Mueller to be communications between officers within the same unit of the GRU, who, for some unknown reason, decided to use Twitter DMs to relay such information rather than just communicate face to face or securely via their own local network.)

Guccifer 2.0 lied about DCLeaks being a sub-project of WikiLeaks and then, over two months later, was seen trying to encourage DCLeaks to communicate with WikiLeaks by relaying an alleged request from WikiLeaks that there is no record of WikiLeaks ever making (and which WikiLeaks could have done themselves, directly, if they had wanted to).

The ‘About 1GB’ / ‘1Gb or So’ Archive

On July 4, 2016, Guccifer 2.0 contacted WikiLeaks:

@GUCCIFER_2: hi there, check up r email, waiting for reply.

This was followed up on July 6, 2016 with the following conversation:

@GUCCIFER_2: have you received my parcel?

@WikiLeaks: Not unless it was very recent. [we haven’ t checked in 24h].

@GUCCIFER_2: I sent it yesterday, an archive of about 1 gb. via [website link]. and check your email.

@WikiLeaks: Wil[l] check, thanks.

@GUCCIFER_2: let me know the results.

@WikiLeaks: Please don’t make anything you send to us public. It’s a lot of work to go through it and the impact is severely reduced if we are not the first to publish.

@GUCCIFER_2: agreed. How much time will it take?

@WikiLeaks: likely sometime today.

@GUCCIFER_2: will u announce a publication? and what about 3 docs sent u earlier?

@WikiLeaks: I don’t believe we received them. Nothing on ‘Brexit’ for example.

@GUCCIFER_2: wow. have you checked ur mail?

@WikiLeaks: At least not as of 4 days ago . . . . For security reasons mail cannot be checked for some hours.

@GUCCIFER_2: fuck, sent 4 docs on brexit on jun 29, an archive in gpg ur submission form is too fucking slow, spent the whole day uploading 1 gb.

@WikiLeaks: We can arrange servers 100x as fast. The speed restrictions are to anonymise the path. Just ask for custom fast upload point in an email.

@GUCCIFER_2: will u be able to check ur email?

@WikiLeaks: We’re best with very large data sets. e.g. 200gb. these prove themselves since they’re too big to fake.

@GUCCIFER_2: or shall I send brexit docs via submission once again?

@WikiLeaks: to be safe, send via [web link]

@GUCCIFER_2: can u confirm u received dnc emails?

@WikiLeaks: for security reasons we can’ t confirm what we’ve received here. e.g., in case your account has been taken over by us intelligence and is probing to see what we have.

@GUCCIFER_2: then send me an encrypted email.

@WikiLeaks: we can do that. but the security people are in another time zone so it will need to wait some hours.

@WikiLeaks: what do you think about the FBl’ s failure to charge? To our mind the clinton foundation investigation has always been the more serious. we would be very interested in all the emails/docs from there. She set up quite a lot of front companies. e.g in sweden.

@GUCCIFER_2: ok, i’ll be waiting for confirmation. as for investigation, they have everything settled, or else I don’t know how to explain that they found a hundred classified docs but fail to charge her.

@WikiLeaks: She’s too powerful to charge at least without something stronger. s far as we know, the investigation into the clinton foundation remains open e hear the FBI are unhappy with Loretta Lynch over meeting Bill, because he’s a target in that investigation.

@GUCCIFER_2: do you have any info about marcel lazar? There’ve been a lot of rumors of late.

@WikiLeaks: the death? [A] fake story.

@WikiLeaks: His 2013 screen shots of Max Blumenthal’s inbox prove that Hillary secretly deleted at least one email about Libya that was meant to be handed over to Congress. So we were very interested in his co-operation with the FBI.

@GUCCIFER_2: some dirty games behind the scenes believe Can you send me an email now?

@WikiLeaks: No; we have not been able to activate the people who handle it. Still trying.

@GUCCIFER_2: what about tor submission? [W]ill u receive a doc now?

@WikiLeaks: We will get everything sent on [weblink].” [A]s long as you see \”upload succseful\” at the end. [I]f you have anything hillary related we want it in the next tweo [sic] days prefable [sic] because the DNC is approaching and she will solidify bernie supporters behind her after.

@GUCCIFER_2: ok. I see.

@WikiLeaks: [W]e think the public interest is greatest now and in early october.

@GUCCIFER_2: do u think a lot of people will attend bernie fans rally in philly? Will it affect the dnc anyhow?

@WikiLeaks: bernie is trying to make his own faction leading up to the DNC. [S]o he can push for concessions (positions/policies) or, at the outside, if hillary has a stroke, is arrested etc, he can take over the nomination. [T]he question is this: can bemies supporters+staff keep their coherency until then (and after). [O]r will they dis[s]olve into hillary’ s camp? [P]resently many of them are looking to damage hilary [sic] inorder [sic] to increase their unity and bargaining power at the DNC. Doubt one rally is going to be that significant in the bigger scheme. [I]t seems many of them will vote for hillary just to prevent trump from winning.

@GUCCIFER_2: sent brexit docs successfully.

@WikiLeaks: :))).

@WikiLeaks: we think trump has only about a 25% chance of winning against hillary so conflict between bernie and hillary is interesting.

@GUCCIFER_2: so it is.

@WikiLeaks: also, it’ s important to consider what type of president hillary might be. If bernie and trump retain their groups past 2016 in significant number, then they are a restraining force on hillary.

[Note: This was over a week after the Brexit referendum had taken place, so this will not have had any impact on the results of that. It also doesn’t appear that WikiLeaks released any Brexit content around this time.]

On July 14, 2016, Guccifer 2.0 sent an email to WikiLeaks, this was covered in the Mueller report:

It should be noted that while the attachment sent was encrypted, the email wasn’t and both the email contents and name of the file were readable.

The persona then opted, once again, for insecure communications via Twitter DMs:

@GUCCIFER_2: ping. Check ur email. sent u a link to a big archive and a pass.

@WikiLeaks: great, thanks; can’t check until tomorrow though.

On July 17, 2016, the persona contacted WikiLeaks again:

@GUCCIFER_2: what bout now?

On July 18, 2016, WikiLeaks responded and more was discussed:

@WikiLeaks: have the 1 Gb or so archive.

@GUCCIFER_2: have u managed to extract the files?

@WikiLeaks: yes. turkey coup has delayed us a couple of days. [O]therwise all ready[.]

@GUCCIFER_2: so when r u about to make a release?

@WikiLeaks: this week. [D]o you have any bigger datasets? [D]id you get our fast transfer details?

@GUCCIFER_2: i’ll check it. did u send it via email?

@WikiLeaks: yes.

@GUCCIFER_2: to [web link]. [I] got nothing.

@WikiLeaks: check your other mail? this was over a week ago.

@GUCCIFER_2:oh, that one, yeah, [I] got it.

@WikiLeaks: great. [D]id it work?

@GUCCIFER_2:[I] haven’ t tried yet.

@WikiLeaks: Oh. We arranged that server just for that purpose. Nothing bigger?

@GUCCIFER_2: let’s move step by step, u have released nothing of what [I] sent u yet.

@WikiLeaks: How about you transfer it all to us encrypted. [T]hen when you are happy, you give us the decrypt key. [T]his way we can move much faster. (A]lso it is protective for you if we already have everything because then there is no point in trying to shut you up.

@GUCCIFER_2: ok, i’ll ponder it

Again, we see a reference to the file being approximately one gigabyte in size.

Guccifer 2.0’s “so when r u about to make a release?” seems to be a question about his files. However, it could have been inferred as generally relating to what WikiLeaks had or even material relating to the “Turkey Coup” that WikiLeaks had mentioned in the previous sentence and that were published by the following day (July 19, 2016).

The way this is reported in the Mueller report, though, prevented this potential ambiguity being known (by not citing the exact question that Guccifer 2.0 had asked and the context immediately preceding it.

Four days later, WikiLeaks published the DNC emails.

Later that same day, Guccifer 2.0 tweeted: “@wikileaks published #DNCHack docs I’d given them!!!”.

Guccifer 2.0 chose to use insecure communications to ask WikiLeaks to confirm receipt of “DNC emails” on July 6, 2016. Confirmation of this was not provided at that time but WikiLeaks did confirm receipt of a “1gb or so” archive on July 18, 2016.

Guccifer 2.0’s emails to WikiLeaks were also sent insecurely.

We cannot be certain that WikiLeaks statement about making a release was in relation to Guccifer 2.0’s material and there is even a possibility that this could have been in reference to the Erdogan leaks published by WikiLeaks on July 19, 2016.

Ulterior Motives?

While the above seems troubling there are a few points worth considering:

Considering all of this and the fact Guccifer 2.0 effectively covered itself in “Made In Russia” labels (by plastering files in Russian metadata and choosing to use a Russian VPN service and a proxy in Moscow for it’s activities) on the same day it first attributed itself to WikiLeaks, it’s fair to suspect that Guccifer 2.0 had malicious intent towards WikiLeaks from the outset.

If this was the case, Guccifer 2.0 may have known about the DNC emails by June 30, 2016 as this is when the persona first started publishing attachments from those emails.

Seth Rich Mentioned By Both Parties

WikiLeaks Offers Reward

On August 9, 2016, WikiLeaks tweeted:

ANNOUNCE: WikiLeaks has decided to issue a US$20k reward for information leading to conviction for the murder of DNC staffer Seth Rich.

— WikiLeaks (@wikileaks) August 9, 2016

In an interview with Nieuwsuur that was posted the same day, Julian Assange explained that the reward was for a DNC staffer who he said had been “shot in the back, murdered”. When the interviewer suggested it was a robbery Assange disputed it and stated that there were no findings.

When the interviewer asked if Seth Rich was a source, Assange stated, “We don’t comment on who our sources are”.

When pressed to explain WikiLeaks actions, Assange stated that the reward was being offered because WikiLeaks‘ sources were concerned by the incident. He also stated that WikiLeaks were investigating.

Speculation and theories about Seth Rich being a source for WikiLeaks soon propagated to several sites and across social media.

Guccifer 2.0 Claims Seth Rich As His Source

On August 25, 2016, approximately three weeks after the reward was offered, Julian Assange was due to be interviewed on Fox News on the topic of Seth Rich.

On that same day, in a DM conversation with the actress Robbin Young, Guccifer 2.0 claimed that Seth was his source (despite previously claiming he obtained his material by hacking the DNC).

Why did Guccifer 2.0 feel the need to attribute itself to Seth at this time?

[Note: I am not advocating for any theory and am simply reporting on Guccifer 2.0’s effort to attribute itself to Seth Rich following the propagation of Rich-WikiLeaks association theories online.]

Special Counsel Claims

In Spring, 2019, Special Counsel Robert Mueller, who was named to investigate Russian interference in the 2016 U.S. general election, delivered his final report.

It claimed:

Guccifer 2.0 contradicted his own hacking claims to allege that Seth Rich was his source and did so on the same day that Julian Assange was due to be interviewed by Fox News (in relation to Seth Rich).

No communications between Guccifer 2.0 and Seth Rich have ever been reported.

Suggesting Assange Connected To Russians

In the same conversation Guccifer 2.0 had with Robbin Young where Rich’s name is mentioned (on August 25, 2016), the persona also provided a very interesting response to Young mentioning “Julian” (in reference to Julian Assange):

The alleged GRU officer we are told was part of an operation to deflect from Russian culpability suggested that Assange “may be connected with Russians”.

Guccifer 2.0’s Mentions of WikiLeaks and Assange

Guccifer 2.0 mentioned WikiLeaks or associated himself with their output on several occasions:

  1. June 15, 2016: claiming to have sent WikiLeaks material on his blog.
  2. June 27, 2016: when he claimed DCLeaks was a sub-project of WikiLeaks.
  3. July 13, 2016: Joe Uchill of The Hill reported that Guccifer 2.0 had contacted the publication and stated: “The press gradually forget about me, [W]ikileaks is playing for time and have some more docs.”
  4. July 22nd, 2016: claimed credit when WikiLeaks published the DNC leaks.
  5. August 12, 2016: It was reported in The Hill that Guccifer 2.0 had released material to the publication. They reported: “The documents released to The Hill are only the first section of a much larger cache. The bulk, the hacker said, will be released on WikiLeaks.”
  6. August 12, 2016: Tweeted that he would “send the major trove of the #DCCC materials and emails to #wikileaks“.
  7. September 15, 2016: telling DCLeaks that WikiLeaks wanted to get in contact with them.
  8. October 4, 2016: Congratulating WikiLeaks on their 10th anniversary via its blog. Also states: “Julian, you are really cool! Stay safe and sound!”. (This was the same day on which Guccifer 2.0 published his “Clinton Foundation” files that were clearly not from the Clinton Foundation.)
  9. October 17, 2016: via Twitter, stating “i’m here and ready for new releases. already changed my location thanks @wikileaks for a good job!”

Guccifer 2.0 also made some statements in response to WikiLeaks or Assange being mentioned:

  1. June 17, 2016: in response to The Smoking Gun asking if Assange would publish the same material it was publishing, Guccifer 2.0 stated: “I gave WikiLeaks the greater part of the files, but saved some for myself,”
  2. August 22, 2016: in response to Raphael Satter suggesting that Guccifer 2.0 send leaks to WikiLeaks, the persona stated: “I gave wikileaks a greater part of docs”.
  3. August 25, 2016: in response to Julian Assange’s name being mentioned in a conversation with Robbin Young, Guccifer 2.0 stated: “he may be connected with Russians”.
  4. October 18, 2016: a BBC reported asked Guccifer 2.0 if he was upset that WikiLeaks had “stole his thunder” and “do you still support Assange?”. Guccifer 2.0 responded: “i’m glad, together we’ll make America great again.”.

Guccifer 2.0 fabricated evidence to claim credit for hacking the DNC, covered itself (and its files) in what were essentially a collection of “Made In Russia” labels through deliberate processes and decisions made by the persona, and, then, it attributed itself to WikiLeaks with a claim that was contradicted by subsequent communications between both parties.

Guccifer 2.0 then went on to lie about WikiLeaks, contradicted its own hacking claims to attribute itself to Seth Rich and even alleged that Julian Assange “may be connected with Russians”.

While we are expected to accept that Guccifer 2.0’s efforts between July 6 and July 18 were a sincere effort to get leaks to WikiLeaks, considering everything we now know about the persona, it seems fair to question whether Guccifer 2.0’s intentions towards WikiLeaks may have instead been malicious.


xxx 2 minutes ago (Edited)

Everything involving the Russian hoax was set up by the Deep States around the world. Implicate, discredit and destroy all those like Rich, Assange, Flynn and those who knew the truth. Kill the messenger....literally.

xxx 10 minutes ago

here's what really happened:

an American hacker breached Podesta's gmail on March 13 2016 and then uploaded it to Wikileaks via Tor sometime between April and May.

the NSA and CIA have hacked into Wikileaks' Tor file server to watch for new leaks to stay ahead of them to prepare. they saw Podesta's emails leaked and launched a counter infowar operation.

Brennan's CIA created the Guccifer 2.0 persona, with phony Russian metadata artifacts, using digital forgery techniques seen in Vault7. Crowdstrike was already on the premises of DNC since 2015, with their overly expensive security scanner watching the DNC network. Crowdstrike had access to any DNC files they wanted. CIA, FBI and Crowdstrike colluded to create a fake leak of DNC docs through their Guccifer 2.0 cutout. they didn't leak any docs of high importance, which is why we never saw any smoking guns from DNC leaks or DCLeaks.

you have to remember, the whole point of this CIAFBINSA operation has nothing to do with Hillary or Trump or influencing the election. the point was to fabricate criminal evidence to use against Assange to finally arrest him and extradite him as well as smear Wikileaks ahead of the looming leak of Podesta's emails.

if CIAFBINSA can frame Assange and Wikileaks as being criminal hackers and/or Russian assets ahead of the Podesta leaks, then they can craft a narrative for the MSM to ignore or distrust most of the Podesta emails. and that is exactly what happened, such as when Chris Cuomo said on CNN that it was illegal for you to read Wikileaks, but not CNN, so you should let CNN tell you what to think about Wikileaks instead of looking at evidence yourself.

this explains why Guccifer 2.0 was so sloppy leaving a trail of Twitter DMs to incriminate himself and Assange along with him.

if this CIAFBINSA entrapment/frame operation ever leaks, it will guarantee the freedom of Assange.

xxx 11 minutes ago

According to Wikipedia, "Guccifer" is Marcel Lazar Lehel, a Rumanian born in 1972, but "Guccifer 2.0" is someone else entirely.

Is that so?

xxx 20 minutes ago (Edited)

The guy from Cyrptome always asserted Assange was some type of deep state puppet, that he was connected somehow. This wouldn't be news to me and its probably why he was scared as hell. The guy is as good as dead, like S. Hussein. Seth Rich was just a puppet that got caught in the wrong game. He was expendable obviously too because well he had a big mouth, he was expendable from the beginning. Somebody mapped this whole **** out, thats for sure.

xxx 28 minutes ago

I am sick and tired of these Deep State and CIA-linked operations trying to put a wrench in the prosecution of people who were engaged in a coup d'etat.

xxx 29 minutes ago

********

xxx 33 minutes ago

At this point what difference does it make? We are all convinced since 2016. It is not going to convince the TDS cases roaming the wilderness.

No arrests, no subpoenas, no warrants, no barging in at 3 am, no perp walks, no tv glare...

Pres. Trump is playing a very risky game. Arrest now, or regret later. And you won't have much time to regret.

The swamp is dark, smelly and deep,

And it has grudges to keep.

xxx 37 minutes ago

Meanwhile- Guccifer 1.0 is still?

- In prison?

- Released?

- 48 month sentence in 2016. Obv no good behavior.

Nice article. Brennan is the dolt he appears.

xxx 41 minutes ago

+1,000 on the investigative work and analyzing it.

Sadly, none of the guilty are in jail. Instead. Assange sits there rotting away.

xxx 44 minutes ago

Why would an alleged GRU officer - supposedly part of an operation to deflect Russian culpability - suggest that Assange "may be connected with Russians?"

Because the AXIS powers of the CIA, Brit secret police and Israeli secret police pay for the campaign to tie Assange to the Russians...

xxx 45 minutes ago

@realDonaldTrump

A lot of interest in this story about Psycho Joe Scarborough. So a young marathon runner just happened to faint in his office, hit her head on his desk, & die? I would think there is a lot more to this story than that? An affair? What about the so-called investigator? Read story!

xxx 45 minutes ago

Why make it harder than it is? Guccifer II = Crowdstrike

xxx 51 minutes ago

Guccifer 2.0 was always John Brennan 1.0

xxx 58 minutes ago (Edited)

Was Guccifer II part of the Stefan Halper organization that lured Papadopoulos and maliciously maligned others?

xxx 1 hour ago

"His name was Seth Rich." The unofficial motto of ZeroHedge...

xxx 1 hour ago

James Guccifer Clapper.

xxx 1 hour ago

Mossad. And their subsidiary CIA.

xxx 1 hour ago

Crowd Strike CEO'S admission under oath that they had no evidence the DNC was hacked by the Russians should make the Russian Hoax predicate abundantly clear.

Justice for Seth Rich!

xxx 1 hour ago

Any influence Assange had on the election was so small that it wouldn't move the needle either way. The real influence and election tampering in the US has always come from the scores of lobbyists and their massive donations that fund the candidates election runs coupled with the wildly inaccurate and agenda driven collusive effort by the MSM. Anyone pointing fingers at the Russians is beyond blind to the unparalleled influence and power these entities have on swaying American minds.

xxx 1 hour ago

ObamaGate.

xxx 1 hour ago (Edited)

Uugh ONCE AGAIN... 4chan already proved guccifer 2.0 was a larp, and the files were not "hacked", they were leaked by Seth Rich. The metadata from the guccifer files is different from the metadata that came from the seth rich files. The dumb fuckers thought they were smart by modifying the author name of the files to make it look like it came from a russian source. They were so ******* inept, they must have forgot (or not have known) to modify the unique 16 digit hex key assigned to the author of the files when they were created..... The ones that seth rich copied had the system administrators name (Warren Flood) as the author and the 16 digit hex key from both file sources were the same - the one assigned to warren flood.

Really sloppy larp!!!

xxx 1 hour ago

This link has all the detail to show Guccifer 2.0 was not Russia. I believe Guccifer 2.0 was created by the CIA to falsely pin blame on the Russians for info that Seth Rich gave to WikiLeaks. Read for yourself: http://g-2.space/

xxx 1 hour ago

This is what people are. Now the species has more power than it can control and that it knows what to do with.

What do you think the result will be?

As for these games of Secret - it's more game than anything truly significant. The significant exists in the bunkers, with the mobile units, in the submarines. Et. al.

But this is a game in which some of the players die - or wish they were dead.

xxx 1 hour ago

And.....?

Public figures and political parties warrant public scrutiny. And didn't his expose in their own words expose the democrats, the mass media, the bureaucracy to the corrupt frauds that they are?

xxx 1 hour ago

Other than the fact that they didn't steal the emails (unless you believe whistleblowers are thief's, one mans source is another mans thief, it's all about who's ox is being gored and you love "leaks" don't you? As long as they work in your favor. Stop with the piety.

xxx 15 minutes ago

That's not the story at all. Did you just read this article?

The democrats were super duper corrupt (before all of this).

They fucked around to ice Bernie out of the primary.

A young staffer Seth Rich knew it and didn't like it. He made the decision to leak the info to the most reputable org for leaks in the world Wikileaks.

IF the DNC had been playing fair, Seth Rich wouldn't have felt the need to leak.

So, the democrats did it to themselves.

And then they created Russiagate to cover it all up.

And murdered a young brave man ... as we know.

xxx 1 hour ago

Assange, another problem Trump failed to fix.

xxx 1 hour ago

Sounds like it came from the same source as the Trump dossier ... MI5.

[May 24, 2020] Guccifer 2.0's Hidden Agenda : looks like Gussifer 2.0 was a false flag operation designed to smear WikiLeaks and distract from the content of the stolen by Seth Rich or some other insider DNC emails

Highly recommended!
Notable quotes:
"... With the entirety of Russigate finally collapsing under the enormous weight and stench of its own BS, the picture that is beginning to emerge for me is one of an insider deep-state psy-op designed to cover for the crimes committed by the DNC, the Clinton Foundation and the 2016 Hillary campaign; kill for the foreseeable future any progressive threat to the neo-liberal world order; and take down a president that the bipartisan DC and corporate media elite fear and loathe. And why do they fear him? Because he is free to call them out on certain aspects of their criminality and corruption, and has. ..."
"... Hubris, cynicism and a basic belief in the stupidity of the US public all seem to have played a part in all this, enabled by a corporate media with a profit motive and a business model that depends on duping the masses. ..."
"... Anyone who still believes in democracy in the USA has his head in the sand (or someplace a lot smellier). ..."
"... The corruption in the USA is wide and deep and trump is NOT draining the swamp. ..."
"... A further point: the Mueller report insinuates that G2.0 had transferred the DNC emails to Wikileaks as of July 18th, and Wikileaks then published them on July 22nd. This is absurd for two reasons: There is no way in hell that Wikileaks could have processed the entire volume of those emails and attachments to insure their complete authenticity in 4 days. ..."
"... Indeed, when Crowdstrike's Shawn Henry had been chief of counterintelligence under Robert Mueller, he had tried to set Assange up by sending Wikileaks fraudulent material; fortunately, Wikileaks was too careful to take the bait. ..."
May 24, 2020 | consortiumnews.com

Daniel P , May 23, 2020 at 13:34

Fascinating, important and ultimately deeply disturbing. This is why I come to Consortium News.

With the entirety of Russigate finally collapsing under the enormous weight and stench of its own BS, the picture that is beginning to emerge for me is one of an insider deep-state psy-op designed to cover for the crimes committed by the DNC, the Clinton Foundation and the 2016 Hillary campaign; kill for the foreseeable future any progressive threat to the neo-liberal world order; and take down a president that the bipartisan DC and corporate media elite fear and loathe. And why do they fear him? Because he is free to call them out on certain aspects of their criminality and corruption, and has.

Hubris, cynicism and a basic belief in the stupidity of the US public all seem to have played a part in all this, enabled by a corporate media with a profit motive and a business model that depends on duping the masses.

Anonymous , May 22, 2020 at 12:01

These convos alone look like a script kiddie on IRC doing their low functioning version of sock puppetry. Didn't know anyone at all fell for that

Ash , May 22, 2020 at 17:21

Because smooth liars in expensive suits told them it was true in their authoritative TV voices? Sadly they don't even really need to try hard anymore, as people will evidently believe anything they're told.

Bob Herrschaft , May 22, 2020 at 12:00

The article goes a long way toward congealing evidence that Guccifer 2.0 was a shill meant to implicate Wikileaks in a Russian hack. The insinuation about Assange's Russian connection was over the top if Guccifer 2.0 was supposed to be a GRU agent and the mention of Seth Rich only contradicts his claims.

OlyaPola , May 22, 2020 at 10:40

Spectacles are popular.Although less popular, the framing and derivations of plausible belief are of more significance; hence the cloak of plausible denial over under-garments of plausible belief, in facilitation of revolutions of immersion in spectacles facilitating spectacles' popularity.

Some promoters of spectacles believe that the benefits of spectacles accrue solely to themselves, and when expectations appear to vary from outcomes, they resort to one-trick-ponyness illuminated by peering in the mirror.

Skip Scott , May 22, 2020 at 08:35

This is a great article. I think the most obvious conclusion is that Guccifer 2.0 was a creation to smear wikileaks and distract from the CONTENT of the DNC emails. The MSM spent the next 3 years obsessed by RussiaGate, and spent virtually no effort on the DNC and Hillary's collusion in subverting the Sander's campaign, among other crimes.

I think back to how many of my friends were obsessed with Rachel Madcow during this period, and how she and the rest of the MSM served the Empire with their propaganda campaign. Meanwhile, Julian is still in Belmarsh as the head of a "non-state hostile intelligence service," the Hillary camp still runs the DNC and successfully sabotaged Bernie yet again (along with Tulsi), and the public gets to choose between corporate sponsored warmonger from column A or B in 2020.

Anyone who still believes in democracy in the USA has his head in the sand (or someplace a lot smellier).

Guy , May 22, 2020 at 12:19

Totally agree .The corruption in the USA is wide and deep and trump is NOT draining the swamp.

Cal Lash , May 22, 2020 at 01:20

I take it the mentioned time zones are consistent with Langley.

treeinanotherlife , May 22, 2020 at 00:34

"Are there only HRC emails? Or some other docs? Are there any DNC docs?"

G2 is fishing to see if Wiki has DNC docs. Does not say "any DNC docs I sent you". And like most at time thought Assange's "related to hillary" phrase likely (hopefully for some) meant Hillary's missing private server emails. For certain G2 is not an FBI agent>s/he knows difference between HRC and DNC emails.

Thank you for fantastic work.

Mark McCarty , May 21, 2020 at 22:24

A further point: the Mueller report insinuates that G2.0 had transferred the DNC emails to Wikileaks as of July 18th, and Wikileaks then published them on July 22nd. This is absurd for two reasons: There is no way in hell that Wikileaks could have processed the entire volume of those emails and attachments to insure their complete authenticity in 4 days.

Indeed, it is reasonable to expect that Wikileaks had been processing those emails since at least June 12, when Assange announced their impending publication. (I recall waiting expectantly for a number of weeks as Wikileaks processed the Podesta emails.) Wikileaks was well aware that, if a single one of the DNC emails they released had been proved to have been fraudulent, their reputation would have been toast. Indeed, when Crowdstrike's Shawn Henry had been chief of counterintelligence under Robert Mueller, he had tried to set Assange up by sending Wikileaks fraudulent material; fortunately, Wikileaks was too careful to take the bait.

Secondly, it is inconceivable that a journalist as careful as Julian would, on June 12th, have announced the impending publication of documents he hadn't even seen yet. And of course there is no record of G2.0 having had any contact with Wikileaks prior to that date.

It is a great pleasure to see "Adam Carter"'s work at long last appear in such a distinguished venue as Consortium News. It does credit to them both.

Skip Edwards , May 22, 2020 at 12:33

How can we expect justice when there is no justification for what is being done by the US and British governments to Julian Assange!

[May 14, 2020] NYT Falsely Blames Russia For Cyberattack Committed By British Hacker

Chancellor Angela Merkel that stupid? "Chancellor Angela Merkel used strong words on Wednesday condemning an "outrageous" cyberattack by Russia's foreign intelligence service on the German Parliament, her personal email account included. Russia, she said, was pursuing "a strategy of hybrid warfare."
Notable quotes:
"... That alleged attack happened in 2015. The attribution to Russia is as shoddy as all attributions of cyberattacks are. ..."
"... Intelligence officials had long suspected Russian operatives were behind the attack, but they took five years to collect the evidence, which was presented in a report given to Ms. Merkel's office just last week. ..."
"... This is really funny because we recently learned that the company which investigated the alleged DNC intrusion, CrowdStrike, had found no evidence , as in zero, that a Russian hacker group had targeted the DNC or that DNC emails were exfiltrated over the Internet: ..."
"... CrowdStrike, the private cyber-security firm that first accused Russia of hacking Democratic Party emails and served as a critical source for U.S. intelligence officials in the years-long Trump-Russia probe, acknowledged to Congress more than two years ago that it had no concrete evidence that Russian hackers stole emails from the Democratic National Committee's server. ..."
"... The DNC emails were most likely stolen by its local network administrator, Seth Rich , who provided them to Wikileaks before he was killed in a suspicious 'robbery' during which nothing was taken. ..."
"... The whole attribution of case of the stolen DNC emails to Russia is based on exactly nothing but intelligence rumors and CrowdStrike claims for which it had no evidence. As there is no evidence at all that the DNC was attacked by a Russian cybergroup what does that mean for the attribution of the attack on the German Bundestag to the very same group? ..."
May 14, 2020 | www.moonofalabama.org

The New York Times continues its anti-Russia campaign with a report about an old cyberattack on German parliament which also targeted the parliament office of Chancellor Angela Merkel.

Merkel Is 'Outraged' by Russian Hack but Struggling to Respond
Patience with President Vladimir Putin is running thin in Berlin. But Germany needs Russia's help on several geopolitical fronts from Syria to Ukraine.

NYT Berlin correspondent Katrin Bennhold writes:

Chancellor Angela Merkel used strong words on Wednesday condemning an "outrageous" cyberattack by Russia's foreign intelligence service on the German Parliament, her personal email account included. Russia, she said, was pursuing "a strategy of hybrid warfare."

But asked how Berlin intended to deal with recent revelations implicating the Russians, Ms. Merkel was less forthcoming.

"We always reserve the right to take measures," she said in Parliament, then immediately added, "Nevertheless, I will continue to strive for a good relationship with Russia, because I believe that there is every reason to always continue these diplomatic efforts."

That alleged attack happened in 2015. The attribution to Russia is as shoddy as all attributions of cyberattacks are.

Intelligence officials had long suspected Russian operatives were behind the attack, but they took five years to collect the evidence, which was presented in a report given to Ms. Merkel's office just last week.

Officials say the report traced the attack to the same Russian hacker group that targeted the Democratic Party during the U.S. presidential election campaign in 2016.

This is really funny because we recently learned that the company which investigated the alleged DNC intrusion, CrowdStrike, had found no evidence , as in zero, that a Russian hacker group had targeted the DNC or that DNC emails were exfiltrated over the Internet:

CrowdStrike, the private cyber-security firm that first accused Russia of hacking Democratic Party emails and served as a critical source for U.S. intelligence officials in the years-long Trump-Russia probe, acknowledged to Congress more than two years ago that it had no concrete evidence that Russian hackers stole emails from the Democratic National Committee's server.
...
[CrowdStrike President Shawn] Henry personally led the remediation and forensics analysis of the DNC server after being warned of a breach in late April 2016; his work was paid for by the DNC, which refused to turn over its server to the FBI. Asked for the date when alleged Russian hackers stole data from the DNC server, Henry testified that CrowdStrike did not in fact know if such a theft occurred at all : "We did not have concrete evidence that the data was exfiltrated [moved electronically] from the DNC, but we have indicators that it was exfiltrated," Henry said.

The DNC emails were most likely stolen by its local network administrator, Seth Rich , who provided them to Wikileaks before he was killed in a suspicious 'robbery' during which nothing was taken.

The whole attribution of case of the stolen DNC emails to Russia is based on exactly nothing but intelligence rumors and CrowdStrike claims for which it had no evidence. As there is no evidence at all that the DNC was attacked by a Russian cybergroup what does that mean for the attribution of the attack on the German Bundestag to the very same group?

While the NYT also mentions that NSA actually snooped on Merkel's private phonecalls it tries to keep the spotlight on Russia:

As such, Germany's democracy has been a target of very different kinds of Russian intelligence operations, officials say. In December 2016, 900,000 Germans lost access to internet and telephone services following a cyberattack traced to Russia.

bigger

Ahem. No!

That mass attack on internet home routers, which by the way happened in November 2016 not in December, was done with the Mirai worm :

More than 900,000 customers of German ISP Deutsche Telekom (DT) were knocked offline this week after their Internet routers got infected by a new variant of a computer worm known as Mirai. The malware wriggled inside the routers via a newly discovered vulnerability in a feature that allows ISPs to remotely upgrade the firmware on the devices. But the new Mirai malware turns that feature off once it infests a device, complicating DT's cleanup and restoration efforts.
...
This new variant of Mirai builds on malware source code released at the end of September . That leak came a little more a week after a botnet based on Mirai was used in a record-sized attack that caused KrebsOnSecurity to go offline for several days . Since then, dozens of new Mirai botnets have emerged , all competing for a finite pool of vulnerable IoT systems that can be infected.

The attack has not been attributed to Russia but to a British man who offered attacks as a service. He was arrested in February 2017:

A 29-year-old man has been arrested at Luton airport by the UK's National Crime Agency (NCA) in connection with a massive internet attack that disrupted telephone, television and internet services in Germany last November. As regular readers of We Live Security will recall, over 900,000 Deutsche Telekom broadband customers were knocked offline last November as an alleged attempt was made to hijack their routers into a destructive botnet.
...
The NCA arrested the British man under a European Arrest Warrant issued by Germany's Federal Criminal Police Office (BKA) who have described the attack as a threat to Germany's national communication infrastructure.

According to German prosecutors, the British man allegedly offered to sell access to the botnet on the computer underground. Agencies are planning to extradite the man to Germany, where – if convicted – he could face up to ten years imprisonment.

The British man, one Daniel Kaye, plead guilty in court and was sentenced to 18 month imprisonment :

During the trial, Daniel admitted that he never intended for the routers to cease functioning. He only wanted to silently control them so he can use them as part of a DDoS botnet to increase his botnet firepower. As discussed earlier he also confessed being paid by competitors to takedown Lonestar.

In Aug 2017 Daniel was extradited back to the UK to face extortion charges after attempting to blackmail Lloyds and Barclays banks. According to press reports, he asked the Lloyds to pay about £75,000 in bitcoins for the attack to be called off.

The Mirai attack is widely known to have been attributed to Kaye. The case has been discussed at length . IT security journalist Brian Krebs, who's site was also attacked by a Mirai bot net, has written several stories about it. It was never 'traced to Russia' or attributed it to anyone else but Daniel Kaye.

Besides that Kennhold writes of "Russia's foreign intelligence service, known as the G.R.U.". The real Russian foreign intelligence services is the SVR. The military intelligence agency of Russia was once called GRU but has been renamed to GU.

The New York Times just made up the claim about Russia hacking in Germany from absolutely nothing. The whole piece was published without even the most basic research and fact checking.

It seems that for the Times anything can be blamed on Russia completely independent of what the actually facts say.

Posted by b on May 14, 2020 at 14:38 UTC | Permalink


J Swift , May 14 2020 15:05 utc | 1

Good article!

Along the same lines, it always bothered me that among all the (mostly contrived) arguments about who might have been responsible for the alleged "hacking" of DNC as well as Clinton's emails, we never heard mentioned one single time the one third party that we absolutely KNOW had intercepted and collected all of those emails--the NSA! Never a peep about how US intelligence services could be tempted to mischief when in possession of everyone's sensitive, personal information.

Petri Krohn , May 14 2020 15:26 utc | 2
The "Fancy Bear" group (also knowns as advanced persistent threat 28) that is claimed to be behind the hacks is likely little more than the collection of hacking tools shared on the open and hidden parts of RuNet or Russian-speaking Internet. Many of these Russian-speaking hackers are actually Ukrainians .

Some of the Russian hackers also worked for the FSB, like the members of Shaltai Boltai group that were later arrested for treason. George Eliason claims Shaltai Boltai actually worked for Ukrainians. For a short version of the story read this:

Cyberanalyst George Eliason Claims that the "Fancy Bear" Who Hacked the DNC Server is Ukrainian Intelligence – In League with the Atlantic Council and Crowdstrike

Cyberanalyst George Eliason has written some intriguing blogs recently claiming that the "Fancy Bear" which hacked the DNC server in mid-2016 was in fact a branch of Ukrainian intelligence linked to the Atlantic Council and Crowdstrike. I invite you to have a go at one of his recent essays...

Patrick Armstrong , May 14 2020 15:27 utc | 3 Wow! You've done it again. I was just writing my Sitrep and thinking what an amazing coincidence it is that, just as the Russian pipelaying ship arrived to finish Nord Stream, Merkel is told that them nasty Russkies are doing nasty things. I come here and you've already solved it. Yet another scoop. Congratulations.
Brendan , May 14 2020 15:41 utc | 4
The NYT has removed that sentence about the attack on internet/phone access:

"Correction: May 14, 2020

An earlier version of this article incorrectly attributed responsibility for a 2016 cyberattack in which 900,000 Germans lost access to internet and telephone services. The attack was carried out by a British citizen, not Russia. The article also misstated when the attack took place. It was in November, not December. The sentence has been removed from the article. "

That was there for at least 13 hours from yesterday evening onwards. The page was archived this morning though before that edit:
https://web.archive.org/web/20200513221700/https://www.nytimes.com/2020/05/13/world/europe/merkel-russia-cyberattack.html

Norwegian , May 14 2020 15:45 utc | 5
From this we can learn that anything can be blamed by MSM, completely independent of what the facts are. It is not limited to allegations related to Russia or China, but any and all claims by MSM that have no direct reference to provable fact.
james , May 14 2020 15:45 utc | 6
great coverage b... thank you... facts don't matter.. what matters is taking down any positive image of russia, or better - putting up a constantly negative one... of this the intel and usa msm are consistent... the sad reality is a lot of people will believe this bullshit too...

i was just reading paul robinsons blog last night - #DEMOCRACY RIP AND THE NARCISSISM OF RUSSIAGATE .. even paul is starting to getting pissed off on the insanity of the media towards russia which is rare from what i have read from him!

@ 3 patrick armstrong.. keep up the good work!! thanks for your work..

Brendan , May 14 2020 15:48 utc | 7
OK I don't know how to fix the formatting in my last link but you can look up https://www.nytimes.com/2020/05/13/world/europe/merkel-russia-cyberattack.html on https://web.archive.org for 10:46 May 14 2020
m droy , May 14 2020 15:51 utc | 8
There is already a correction made to the DT attack - someone reads MofA! Shame they don't get more of their new interpretation form here.

Whole piece reads here like it started as a Merkel gets close to Russia piece, shown around to colleagues and politicians for feedback, and a ton of fake "why Merkel actually hates the Russians" nonsense was added in.

After all pretty much everyone has tapped Merkel's phone by now.

tucenz , May 14 2020 16:22 utc | 9
Fairy tales told by Danny Kaye....

[May 11, 2020] Tucker: Adam Schiff should resign

This is nationwide gaslighting by Clinton gang of neoliberals who attempted coup d'état, and Adam Schiff was just one of the key figures in this coupe d'état, king of modern Joe McCarthy able and willing to destroy a person using false evidence
What is interesting is that Tucker attacked Republicans for aiding and abetting the coup d'état against Trump
May 11, 2020 | www.youtube.com

RionE23 , 2 days ago

I'm sick of politicians getting a free pass by "resigning" no, they break the law they go to jail.. just like the rest of us.

shannon11590 , 1 day ago

Adam Schiff simply needs to be criminally prosecuted and imprisoned for the countless number of criminal acts that he committed while in Congress.

[Mar 21, 2020] Why Is CrowdStrike Confused On 11 Key Details About The DNC 'Hack'

Mar 21, 2020 | www.zerohedge.com

Why Is CrowdStrike Confused On 11 Key Details About The DNC 'Hack'? by Tyler Durden Sat, 03/21/2020 - 21:20 Authored by Larry Johnson via Sic Semper Tyrannis blog,

Here is the bottom-line - despite being hired in late April (or early May) of 2016 to stop an unauthorized intrusion into the DNC, CrowdStrike, the cyber firm hired by the DNC's law firm to solve the problem, failed abysmally. More than 30,000 emails were taken from the DNC server between 22 and 25 May 2016 and given to Wikileaks. Crowdstrike blamed Russia for the intrusion but claimed that only two files were taken. A nd CrowdStrike inexplicably waited until 10 June 2016 to reboot the DNC network.

CrowdStrike, a cyber-security company hired by a Perkins Coie lawyer retained by the DNC, provided the narrative to the American public of the alledged hack of the DNC, But the Crowdstrike explanation is inconsistent, contradictory and implausible. Despite glaring oddities in the CrowdStrike account of that event, CrowdStrike subsequently traded on its fame in the investigation of the so-called Russian hack of the DNC and became a publicly traded company. Was CrowdStrike's fame for "discovering" the alleged Russian hack of the DNC a critical factor in its subsequent launch as a publicly traded company?

The Crowdstrike account of the hack is very flawed. There are 11 contradictions, inconsistencies or oddities in the public narrative about CrowdStrike's role in uncovering and allegedly mitigating a Russian intrusion (note--the underlying facts for these conclusions are found in Ellen Nakashima's Washington Post story , Vicki Ward's Esquire story , the Mueller Report and the blog of Crowdstrike founder Dmitri Alperovitch):

  1. Two different dates -- 30 April or 6 May -- are reported by Nakashima and Ward respectively as the date CrowdStrike was hired to investigate an intrusion into the DNC computer network.
  2. There are on the record contradictions about who hired Crowdstrike. Nakashima reports that the DNC called Michael Sussman of the law firm, Perkins Coie, who in turn contacted Crowdtrike's CEO Shawn Henry. Crowdstrike founder Dmitri Alperovitch tells Nakashima a different story, stating our "Incident Response group, was called by the Democratic National Committee (DNC).
  3. CrowdStrike claims it discovered within 24 hours the "Russians" were responsible for the "intrusion" into the DNC network.
  4. CrowdStrike's installation of Falcon (its proprietary software to stop breaches) on the DNC on the 1st of May or the 6th of May would have alerted to intruders that they had been detected.
  5. CrowdStrike officials told the Washington Post's Ellen Nakashima that they were, "not sure how the hackers got in" and didn't "have hard evidence."
  6. In a blog posting by CrowdStrike's founder, Dmitri Alperovitch, on the same day that Nakashima's article was published in the Washington Post, wrote that the intrusion into the DNC was done by two separate Russian intelligence organizations using malware identified as Fancy Bear (APT28) and Cozy Bear (APT29).
  7. But, Alperovitch admits his team found no evidence the two Russian organizations were coordinating their "attack" or even knew of each other's presence on the DNC network.
  8. There is great confusion over what the "hackers" obtained. DNC sources claim the hackers gained access to the entire database of opposition research on GOP presidential candidate Donald Trump. DNC sources and CrowdStrike claimed the intruders, "read all email and chat traffic." Yet, DNC officials insisted, "that no financial, donor or personal information appears to have been accessed or taken." However, CrowdStrike states, "The hackers stole two files."
  9. Crowdstrike's Alperovitch, in his blog posting, does not specify whether it was Cozy Bear or Fancy Bear that took the files.
  10. Wikileaks published DNC emails in July 2016 that show the last message taken from the DNC was dated 25 May 2016. This was much more than "two files."
  11. CrowdStrike, in complete disregard to basic security practice when confronted with an intrusion, waited five weeks to disconnect the DNC computers from the network and sanitize them.

Let us start with the very contradictory public accounts attributed to Crowdstrke's founder, Dmitri Alperovitch. The 14 June 2016 story by Ellen Nakashima of the Washington Post and the October 2016 piece by Vicki Ward in Esquire magazine offer two different dates for the start of the investigation:

When did the DNC learn of the "intrusion"?

Ellen Nakashima claims it was the end of April:

"DNC leaders were tipped to the hack in late April . Chief executive Amy Dacey got a call from her operations chief saying that their information technology team had noticed some unusual network activity... That evening, she spoke with Michael Sussmann, a DNC lawyer who is a partner with Perkins Coie in Washington. Soon after, Sussmann, a former federal prosecutor who handled computer crime cases, called Henry, whom he has known for many years. Within 24 hours, CrowdStrike had installed software on the DNC's computers so that it could analyze data that could indicate who had gained access, when and how.

Ward's timeline, citing Alperovitch, reports the alert came later, on 6 May 2016:

At six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. . . . late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.

This is a significant and troubling discrepancy because it marks the point in time when CrowdStrike installed its Falcon software on the DNC server. It is one thing to confuse the 30th of April with the 1st of May. But Alperovitch gave two different reporters two different dates.

What did the "hackers" take from the DNC?

Ellen Nakashima's reporting is contradictory and wrong. Initially, she is told that the hackers got access to the entire Donald Trump database and that all emails and chats could be read. But then she is assured that only two files were taken. This was based on Crowdstrike's CEO's assurance, which was proven subsequently to be spectacularly wrong when Wikileaks published 35,813 DNC emails. How did Crowdstrike miss that critical detail? Here is Nakashima's reporting:

Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.

The intruders so thoroughly compromised the DNC's system that they also were able to read all email and chat traffic, said DNC officials and the security experts. . . .

The DNC said that no financial, donor or personal information appears to have been accessed or taken, suggesting that the breach was traditional espionage, not the work of criminal hackers.

One group, which CrowdStrike had dubbed Cozy Bear, had gained access last summer (2015) and was monitoring the DNC's email and chat communications, Alperovitch said.

The other, which the firm had named Fancy Bear, broke into the network in late April and targeted the opposition research files. It was this breach that set off the alarm. The hackers stole two files, Henry said. And they had access to the computers of the entire research staff -- an average of about several dozen on any given day. . . .

CrowdStrike is continuing the forensic investigation, said Sussmann, the DNC lawyer. "But at this time, it appears that no financial information or sensitive employee, donor or voter information was accessed by the Russian attackers," he said.

The DNC emails that are posted on the Wikileaks website and the metadata shows that these emails were removed from the DNC server starting the late on the 22nd of May and continuing thru the 23rd of May. The last tranche occurred late in the morning (Washington, DC time) of the 25th of May 2016. Crowdstrike's CEO, Shawn Henry, insisted on the 14th of June 2016 that "ONLY TWO FILES" had been taken. This is demonstrably not true. Besides the failure of Crowdstrike to detect the removal of more than 35,000 emails, there is another important and unanswered question -- why did Crowdstrike wait until the 10th of June 2016 to start disconnecting the DNC server when they allegedly knew on the 6th of May that the Russians had entered the DNC network?

Crowdstrike accused Russia of the DNC breach but lacked concrete proof.

Ellen Nakashima's report reveals that Crowdstrike relied exclusively on circumstantial evidence for its claim that the Russian Government hacked the DNC server. According to Nakashima:

CrowdStrike is not sure how the hackers got in. The firm suspects they may have targeted DNC employees with "spearphishing" emails. These are communications that appear legitimate -- often made to look like they came from a colleague or someone trusted -- but that contain links or attachments that when clicked on deploy malicious software that enables a hacker to gain access to a computer. " But we don't have hard evidence, " Alperovitch said.

There is a word in English for the phrases, "Not sure" and "No hard evidence"--that word is, "assumption." Assuming that the Russians did it is not the same as proving, based on evidence, that the Russians were culpable. But that is exactly what CrowdStrike did.

The so-called "proof" of the Russian intrusions is the presence of Fancy Bear and Cozy Bear?

At first glance, Dmitri Alperovitch's blog postin g describing the Fancy Bear and Cozy Bear "intrusions" appears quite substantive. But cyber security professionals quickly identified a variety of shortcomings with the Alperovitch account. For example, this malware is not unique nor proprietary to Russia. Other countries and hackers have access to APT28 and have used it.

Skip Folden offers one of the best comprehensive analyses of the problems with the Alperovitch explanation :

No basis whatsoever :

APT28, aka Fancy Bear, Sofacy, Strontium, Pawn Storm, Sednit, etc., and APT29, aka Cozy Bear, Cozy Duke, Monkeys, CozyCar,The Dukes, etc., are used as 'proof' of Russia 'hacking' by Russian Intelligence agencies GRU and FSB respectively.

There is no basis whatsoever to attribute the use of known intrusion elements to Russia, not even if they were once reverse routed to Russia, which claim has never been made by NSA or any other of our IC.

On June 15, 2016 Dmitri Alperovitch himself, in an Atlantic Council article, gave only "medium-level of confidence that Fancy Bear is GRU" and "low-level of confidence that Cozy Bear is FSB." These assessments, from the main source himself, that either APT is Russian intelligence, averages 37%-38% [(50 + 25) / 2].

Exclusivity :

None of the technical indicators, e.g., intrusion tools (such as X-Agent, X-Tunnel), facilities, tactics, techniques, or procedures, etc., of the 28 and 29 APTs can be uniquely attributed to Russia, even if one or more had ever been trace routed to Russia. Once an element of a set of intrusion tools is used in the public domain it can be reverse-engineered and used by other groups which precludes the assumption of exclusivity in future use. The proof that any of these tools have never been reverse engineered and used by others is left to the student - or prosecutor.

Using targets :

Also, targets have been used as basis for attributing intrusions to Russia, and that is pure nonsense. Both many state and non-state players have deep interests in the same targets and have the technical expertise to launch intrusions. In Grizzly Steppe, page 2, second paragraph, beginning with, "Both groups have historically targeted ...," is there anything in that paragraph which can be claimed as unique to Russia or which excludes all other major state players in the world or any of the non-state organizations? No.

Key-Logger Consideration :

On the subject of naming specific GRU officers initiating specific actions on GRU Russian facilities on certain dates / times, other than via implanted ID chips under the finger tips of these named GRU officers, the logical assumption would be by installed key logger capabilities, physical or malware, on one or more GRU Russian computers.

The GRU is a highly advanced Russian intelligence unit. It would be very surprising were the GRU open to any method used to install key logger capabilities. It would be even more surprising, if not beyond comprehension that the GRU did not scan all systems upon start-up and in real time, including key logger protection and anomalies of performance degradation and data transmissions.

Foreign intelligence source :

Other option would be via a foreign intelligence unit source with local GRU access. Any such would be quite anti-Russian and be another nail in the coffin of any chain of evidence / custody validity at Russian site.

Stated simply, Dmitri Alperovitch's conclusion that "the Russians did it" are not supported by the forensic evidence. Instead, he relies on the assumption that the presence of APT28 and APT29 prove Moscow's covert hand. What is even more striking is that the FBI accepted this explanation without demanding forensic evidence.

Former FBI Director James Comey and former NSA Director Mike Rogers testified under oath before Congress that neither agency ever received access to the DNC server. All information the FBI used in its investigation was supplied by CrowdStrike. The Hill reported :

The FBI requested direct access to the Democratic National Committee's (DNC) hacked computer servers but was denied, Director James Comey told lawmakers on Tuesday.

The bureau made "multiple requests at different levels," according to Comey, but ultimately struck an agreement with the DNC that a "highly respected private company" would get access and share what it found with investigators.

The foregoing facts raise major questions about the validity of the Crowdstrike methodology and conclusions with respect to what happened on the DNC network. This is not a conspiracy theory. It is a set of facts that, as of today, have no satisfactory explanation. The American public deserve answers.

[Mar 12, 2020] Did Joe Biden's Former IT Guy Masquerade as Guccifer 2.0 by Larry C Johnson

Highly recommended!
Notable quotes:
"... The computer used to create the original Warren Document (dated 2008) was a US Government computer issued to the Obama Presidential Transition Team by the General Services Administration. ..."
"... The Warren Document and the 1.DOC were created in the United States using Microsoft Word software (2007) that is registered to the GSA. ..."
"... The author of both 1.doc and the PDF version is identified as "WARREN FLOOD." ..."
"... "Russian" fingerprints were deliberately inserted into the text and the meta data of "1.doc." ..."
"... This begs a very important question. Did Warren Flood actually create these documents or was someone masquerading as Warren Flood? Unfortunately, neither the Intelligence Community nor the Mueller Special Counsel investigators provided any evidence to show they examined this forensic data. More troubling is the fact that the Microsoft Word processing software being used is listed as a GSA product. ..."
"... If this was truly a Russian GRU operation (as claimed by Mueller), why was the cyber spy tradecraft so sloppy? ..."
"... The name of Warren Flood, an Obama Democrat activist and Joe Biden's former Director of Information Technology, appears in at least three iterations of these documents. Did he actually masquerade as Guccifer 2.0? If so, did he do it on his own or was he hired by someone else? These remain open questions that deserve to be investigated by John Durham, the prosecutor investigating the attempted coup against Donald Trump, and/or relevant committees of the Congress. ..."
"... There are other critical unanswered questions. Obama's Attorney General, Loretta Lynch, sent a letter to James come on July 26, 2016 about the the DNC hack. Lynch wrote concerning press reports that Russia attacked the DNC: ..."
"... A genuine investigation of the DNC hack/leak should have included interviews with all DNC staff, John Podesta, Warren Flood and Ellen Nakashima, The Washington Post reporter who broke the story of the DNC hack. Based on what is now in the public record, the FBI failed to do a proper investigation. ..."
"... Resolving who was behind Guccifer 2.0 and DCLeaks seems to me to be a rather simple investigative exercise. That is, somebody registered and bought the names of G2 and DCL. One can't have a Wordpress blog without purchasing a url. So, there is a record of this registration, right? Simply subpoena the company who sold/rented the url. ..."
"... It's now obvious that we don't have a functioning intel/justice apparatus in the U.S. This is the message sent and received by the intel/justice shops over and again. They no longer work for Americans rather they work against us. ..."
Mar 12, 2020 | turcopolier.typepad.com

Why does the name of Joe Biden's former Internet Technology guru, Warren Flood, appear in the meta data of documents posted on the internet by Guccifer 2.0? In case you do not recall, Guccifer 2.0 was identified as someone tied to Russian intelligence who played a direct role in stealing emails from John Podesta. The meta data in question indicates the name of the person who actually copied the original document. We have this irrefutable fact in the documents unveiled by Guccifer 2.0--Warren Flood's name appears prominently in the meta data of several documents attributed to "Guccifer 2.0." When this transpired, Flood was working as the CEO of his own company, BRIGHT BLUE DATA. (brightbluedata.com). Was Flood tasked to masquerade as a Russian operative?

Give Flood some props if that is true--he fooled our Intelligence Community and the entire team of Mueller prosecutors into believing that Guccifer was part of a Russian military intelligence cyber attack. But a careful examination of the documents shows that it is highly unlikely that this was an official Russian cyber operation. Here's what the U.S. Intelligence Community wrote about Guccifer 2.0 in their very flawed January 2017 Intelligence Community Assessment:

We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data obtained in cyber operations publicly and in exclusives to media outlets.

The laxity of the Intelligence Community in dealing with empirical evidence was matched by a disturbing lack of curiosity on the part of the Mueller investigators and prosecutors. Here's the tall tale they spun about Guccifer 2.0:

On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents. In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as "Fancy Bear") were responsible for the breach. Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona Guccifer 2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into a Moscow-based server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including "some hundred sheets," "illuminati," and "worldwide known." Approximately two hours after the last of those searches, Guccifer 2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that the GRU officers had searched for that day.

[Apelbaum note--According to Crowdstrike and Special Counsel Mueller, both were present, APT28 AKA "Fancy Bear" and APT29 AKA "Cozy Bear".]

The claims by both the Intelligence Community and the Mueller team about Guccifer 2.0 are an astounding, incredible denial of critical evidence pointing to a U.S. actor, not a Russian or Romanian. No one in this "august" group took the time to examine the metadata on the documents posted by "Guccifer 2.0" to his website on June 15, 2016.

I wish I could claim credit for the following forensic analysis, but the honors are due to Yaacov Apelbaum. While there are many documents in the Podesta haul that match the following pattern, this analysis focuses only on a document originally created by the DNC's Director of Research, Lauren Dillon. This document is the Trump Opposition Report document.

According to Apelbaum , the Trump Opposition Report document, which was "published" by Guccifer 2.0, shows clear evidence of digital manipulation:

  1. A US based user (hereafter referred to as G2 ) operating initially from the West coast and then, subsequently, from the East coast, changes the MS Word 2007 and Operating System language settings to Russian.
  2. G2 opens and saves a document with the file name, "12192015 Trump Report - for dist-4.docx". The document bears the title, "Donald Trump Report" (which was originally composed by Lauren Dillon aka DILLON REPORT) as an RTF file and opens it again.
  3. G2 opens a second document that was attached to an email sent on December 21, 2008 to John Podesta from [email protected]. This WORD document lists prospective nominees for posts in the Department of Agriculture for the upcoming Obama Administration. It was generated by User--Warren Flood--on a computer registered to the General Services Administration (aka GSA) named "Slate_-_Domestic_-_USDA_-_2008-12-20-3.doc", which was kept by Podesta on his private Gmail account. (I refer to this as the "WARREN DOCUMENT" in this analysis.)
  4. G2 deletes the content of the 2008 Warren Document and saves the empty file as a RTF, and opens it again.
  5. G2 copies the content of the 'Dillon Report' (which is an RTF document) and pastes it into the 2008 Warren Document template, i.e. the empty RTF document.
  6. G2 user makes several modifications to the content of this document. For example, the Warren Document contained the watermark--"CONFIDENTIAL DRAFT". G2 deleted the word "DRAFT" but kept the "CONFIDENTIAL" watermark.
  7. G2 saves this document into a file called "1.doc". This document now contains the text of the original Lauren Dillon "Donald Trump Report" document, but also contains Russian language URL links that generate error messages.
  8. G2's 1.DOC (the Word version of the document) shows the following meta data authors:
    • Created at 6/15/2016 at 1:38pm by "WARREN FLOOD"
    • Last Modified at 6/15/2016 at 1:45pm by "Феликс Эдмундович" (Felix Edmundovich, the first and middle name of Dzerzhinsky, the creator of the predecessor of the KGB. It is assumed the Felix Edmundovich refers to Dzerzhinsky.)
  9. G2 also produces a pdf version of this document almost four hours later. It is created at 6/15/201`6 at 5:54:15pm by "WARREN FLOOD."
  10. G2 first publishes "1.doc" to various media outlets and then uploads a copy to the Guccifer 2.0 WordPress website (which is hosted in the United States).

There are several critical facts from the metadata that destroy the claim that Guccifer 2.0 was a Romanian or a Russian.

This begs a very important question. Did Warren Flood actually create these documents or was someone masquerading as Warren Flood? Unfortunately, neither the Intelligence Community nor the Mueller Special Counsel investigators provided any evidence to show they examined this forensic data. More troubling is the fact that the Microsoft Word processing software being used is listed as a GSA product.

If this was truly a Russian GRU operation (as claimed by Mueller), why was the cyber spy tradecraft so sloppy? A covert cyber operation is no different from a conventional human covert operation, which means the first and guiding principle is to not leave any fingerprints that would point to the origin of the operation. In other words, you do not mistakenly leave flagrant Russian fingerprints in the document text or metadata. A good cyber spy also will not use computers and servers based in the United States and then claim it is the work of a hacker ostensibly in Romania.

None of the Russians indicted by Mueller in his case stand accused of doing the Russian hacking while physically in the United States. No intelligence or evidence has been cited to indicate that the Russians stole a U.S. Government computer or used a GSA supplied copy of Microsoft Word to produce the G2 documents.

The name of Warren Flood, an Obama Democrat activist and Joe Biden's former Director of Information Technology, appears in at least three iterations of these documents. Did he actually masquerade as Guccifer 2.0? If so, did he do it on his own or was he hired by someone else? These remain open questions that deserve to be investigated by John Durham, the prosecutor investigating the attempted coup against Donald Trump, and/or relevant committees of the Congress.

There are other critical unanswered questions. Obama's Attorney General, Loretta Lynch, sent a letter to James come on July 26, 2016 about the the DNC hack. Lynch wrote concerning press reports that Russia attacked the DNC:

If foreign intelligence agencies are attempting to undermine that process, the U.S. government should treat such efforts even more seriously than standard espionage. These types ofcyberattacks are significant and pernicious crimes. Our government must do all that it can to stop such attacks and to seek justice for the attacks that have already occurred.

We are writing to request more information on this cyberattack in particular and more information in general on how the Justice Department, FBI, and NCIJTF attempt to prevent and punish these types ofcyberattacks. Accordingly, please respond to the following by August 9, 2016:

  1. When did the Department of Justice, FBI, and NCIJTF first learn of the DNC hack? Was the government aware ofthe intrusion prior to the media reporting it?
  2. Has the FBI deployed its Cyber Action Team to determine who hacked the DNC?
  3. Has the FBI determined whether the Russian government, or any other foreign
    government, was involved in the hack?
  4. In general, what actions, if any, do the Justice Department, FBI, and NCIJTF take to prevent cyberattacks on non-governmental political organizations in the U.S., such as campaigns and political parties? Does the government consult or otherwise communicate with the organizations to inform them ofpotential threats, relay best practices, or inform them ofdetected cyber intrusions.
  5. Does the Justice Department believe that existing statutes provide an adequate basis for addressing hacking crimes of this nature, in which foreign governments hack seemingly in order to affect our electoral processes?

So far no document from Comey to Lynch has been made available to the public detailing the FBI's response to Lynch's questions. Why was the Cyber Action Team not deployed to determine who hacked the DNC? A genuine investigation of the DNC hack/leak should have included interviews with all DNC staff, John Podesta, Warren Flood and Ellen Nakashima, The Washington Post reporter who broke the story of the DNC hack. Based on what is now in the public record, the FBI failed to do a proper investigation.

Recent Comments

h | 12 March 2020 at 12:08 PM

Of course sleepy Joe was in on the overall RussiaGate operation. And now another reasonable question by sleuth extraordinaire will fall into the memory hole b/c no one who has the authority and the power in DC is ever going to address, let alone, clean up and hold accountable any who created this awful mess.

Resolving who was behind Guccifer 2.0 and DCLeaks seems to me to be a rather simple investigative exercise. That is, somebody registered and bought the names of G2 and DCL. One can't have a Wordpress blog without purchasing a url. So, there is a record of this registration, right? Simply subpoena the company who sold/rented the url.

What's troubling to me is that even the most simplest investigative acts to find answers never seems to happen. Instead, more than three years later we're playing 'Whodunit.'

It's been over 3 years now and if we had a truly functioning intel/justice apparatus this simple act would have been done long ago and then made public. Yet, here we are more than three years later trying to unravel, figure out or resolve the trail of clues via metadata the pranksters left behind.

It's now obvious that we don't have a functioning intel/justice apparatus in the U.S. This is the message sent and received by the intel/justice shops over and again. They no longer work for Americans rather they work against us.

[Feb 29, 2020] CrowdStrike s Dmitri Alperovitch by William F. Jasper

Highly recommended!
Notable quotes:
"... Clinton and her Democratic National Committee allies — which appear to have included virtually all the top-tier DNC officials — decided the best defense would be an aggressive offense. They would make a pre-emptive damage-control strike to shift media and public attention away from the content of the e-mails (which they knew would be damning) to the provenance of the e-mails. They would divert the focus away from the embarrassing, unethical, and illegal actions revealed in the e-mails to how they were obtained and by whom. ..."
"... The following day, on June 15, the “Russian hacking” narrative was reinforced by “Guccifer 2.0,” an anonymous Internet persona, who claimed that the forensics of the DNC server showed it had been tainted with “Russian fingerprints.” ..."
"... All of the above organizations — most especially the CFR — have longstanding, troubling ties to the Deep State intelligence services . Notwithstanding Alperovitch’s many elitist ties listed above, it is his connections to the Atlantic Council that are especially noteworthy, as they illustrate the extensive and dangerous interconnectedness of these private globalist organizations with think tanks, major corporations, intelligence agencies, national governments, the United Nations, and other intergovernmental organizations. These private globalist organizations form the top level of the pyramid of power of the state-within-the-state — the Deep State — and they consider themselves above the rule of law and all that stuff meant for lower mortals. ..."
"... The Atlantic Council is a staunch opponent of the Brexit, President Donald Trump, nationalist-populist movements, and the burgeoning independent media. ..."
"... The Ukrainian civil war was well orchestrated by Obama and Hillary's Deep State along with Russian Mafioso and Ukrainian neo-Nazi Stefano Bandera operatives, a dubious mercurial cult from WWII who operated for both Hitler and Stalin's armies, being responsible for the penetration of the OPC's (precursor to the CIA) early Cold War operations behind the Iron Curtain. Every freedom fighter we trained behind the Iron Curtain was immediately identified and assassinated by the KGB because of Belorussian and Ukrainian double agents trained by the OPC-CIA: ..."
"... Crowdstrike is just another US based start-up getting high on the hog of government contracts, and was keen to be there at the beginning of the Clinton presidency. The evidence from "Adam Carter" shows that Guccifer 2.0 was almost certainly a creation of Crowdstrike, in order to manufacture the story that it was a Russian hacker and not a disgruntled DNC leaker. ..."
"... The setup was in the media. On June 15 2016, Crowdstrike announced that the DNC had been hacked by the two "bears", but the only thing missing was opposition research on Donald Trump. The next day, G2 appears, "leaking" the very boring "Trump research". The problem is, that that document didn't come from the DNC leak, it came from the Podesta email leak, yet that was never revealed at the time. How did Crowdstrike know on the 15th, to say that the DNC hackers took the Trump research, and G2 appears the next day claiming to release the document, when in actuality, G2 got the "Trump" file off Podesta's machine? ..."
www.theamericanconservative.com

Dmitri Alperovitch has played a key role in diverting attention from Hillary Clinton's documented unethical, illegal, and treasonous activities with Putin to allegations of ties between Donald Trump and Putin, for which no evidence has been forthcoming. Is Alperovitch, in reality, one of Putin's best deep-cover agents?

Before the WikiLeaks announcement in 2016 that it would be releasing thousands of e-mails from the Democratic National Committee, few Americans had heard of the cybersecurity firm CrowdStrike or Dmitri Alperovitch (shown), its Russian-Ukranian cofounder and chief technology officer. He is still far from being a household name, but he remains a central figure in the ongoing “Trump-Russia collusion” investigations by Senate and House committees and Special Counsel Robert Mueller.

That WikiLeaks announcement, by the whistleblowing organization’s spokesman Julian Assange, came on June 12, a little over a month before the 2016 Democratic National Convention in Philadelphia. The Hillary Clinton campaign, still facing an insurgency from staunch Bernie Sanders supporters, was thrown into a panic. The WikiLeaks release was seen as something that could seriously sabotage her march to the White House. Clinton and her Democratic National Committee allies — which appear to have included virtually all the top-tier DNC officials — decided the best defense would be an aggressive offense. They would make a pre-emptive damage-control strike to shift media and public attention away from the content of the e-mails (which they knew would be damning) to the provenance of the e-mails. They would divert the focus away from the embarrassing, unethical, and illegal actions revealed in the e-mails to how they were obtained and by whom.

As mentioned above, the WikiLeaks announcement came on June 12. Two days later, on June 14, DNC contractor CrowdStrike announced (via the Washington Post) that its forensic analysis of the DNC server had determined malware had been injected into the server — and it had been done by Russians. Not just any Russians, mind you, but agents of Vladimir Putin. Alperovitch and CrowdStrike’s Shawn Henry (a former FBI executive under Director Robert Mueller and President Obama) told the Post that their investigation revealed the DNC server had been hacked by the cyber-espionage groups known as “Fancy Bear,” allegedly associated with the Russian GRU (military intelligence) and “Cozy Bear,” allegedly associated with the FSB (the successor to the infamous Soviet KGB).

The following day, on June 15, the “Russian hacking” narrative was reinforced by “Guccifer 2.0,” an anonymous Internet persona, who claimed that the forensics of the DNC server showed it had been tainted with “Russian fingerprints.”

Hillary Clinton and her campaign chairman John Podesta, along with their DNC auxiliaries, immediately launched their brazen Russia-bashing program, claiming that Putin was interfering in our presidential election to keep her out of the White House and put his “puppet,” Donald Trump, into the Oval Office. It was precisely the kind of audacious response one would expect from Podesta, who earned notoriety as a shrewd and ruthless political operative while serving as chief of staff to President Bill Clinton. In that post, he proved his worth as the master of damage control, handling Bill Clinton’s scandals du jour cavalcade: Chinagate, Troopergate, Coffeegate, Bimbogate, etc. Besides diverting attention from the e-mails released by WikiLeaks, the Russia-Trump collusion accusations served other purposes as well. Certainly among the foremost of those purposes was that accusing Trump of colluding with Russia would bolster Hillary’s image as an anti-Putin hardliner. This was not only a move calculated to counter Hillary’s and the Democrats’ images as historically “soft on communism” and “soft on national security/national defense,” but calculated also to serve as a sort of immunity against investigation and prosecution of Bill and Hillary Clinton, John Podesta, and many others in their circle for their own well-documented corrupt, illegal, and treasonous dealings with Putin and Russia, which we have reported on extensively over many years (see here, here, and here, for example).

However, the “Trump-Russia collusion” meme would not have taken hold and could not have continued causing the political distraction and upheaval more than a year into the Trump administration simply on the strength of Clinton, Podesta, and the DNC. The ongoing campaign against President Trump has only remained viable because of the continuous support and connivance of Deep State operatives in the intelligence community and the major media.

This connivance was apparent from the start, when the DNC and CrowdStrike refused to allow official analysts from the FBI, CIA, NSA, and other agencies to examine the DNC server that was supposedly hacked by the Russians. One might expect that, in response, the “rebuffed” intelligence and law-enforcement agencies would refrain from endorsing the conclusions of a report that was obviously serving a partisan political purpose and that was based on evidence that they had not seen, because it had been purposely withheld from them. But no, the politically appointed intel chiefs lined up to parrot the Clinton/DNC/CrowdStrike line that Putin had interfered in the U.S. presidential election to torpedo Hillary Clinton and aid Donald Trump.

Phony “Fingerprints,” Phony “Hack”

Like the phony “Russia dossier” on Trump produced by Christopher Steele and Fusion GPS for Hillary Clinton and the DNC, the CrowdStrike “analysis” quickly came unraveled under expert examination. Among the many authoritative refutations of CrowdStrike’s claims are an early analysis by former top IBM executive Skip Folden, entitled “Non-Existent Foundation for Russian Hacking Charge” and “Intel Vets Challenge ‘Russia Hack’ Evidence" by Veteran Intelligence Professionals for Sanity (VIPS). The VIPS study, led by the legendary Dr. William Binney, a former technical director at the NSA, also benefitted from the input of VIPS members who were cybersecurity experts with the NSA, CIA, DIA, FBI, and military intelligence.

Among their most important finds are these two critical points:

1) The claimed “Russian fingerprints” provide no trace routing to prove that any “hacking” was done by Russian intelligence operatives. The software and methods allegedly used are commonly available and commonly used by many private individuals, criminal syndicates, and state actors. Moreover, the “Russian” traces are so crude as to be obvious plants pointing to the Russians, whereas, if Putin’s cyberspooks had actually done it, they would have done a more professional job of covering their tracks, the experts say, and;

2) The “hack” of the DNC was actually a leak, not a hack. The technical analysis of the security breach shows that the DNC e-mails were copied onto a USB device, such as a thumb drive, by someone physically at the DNC headquarters, not downloaded via a remote connection on the Internet. Thus it was a leak by someone at the DNC, not Russian hackers, who provided the data to WikiLeaks. That’s not an insignificant distinction!

In addition to the Folden and VIPS reports, other top-grade technical experts who have challenged and discredited the faux “intelligence community consensus” on the DNC hacking include:

In short, what we have is very credible technical analysis that challenges the claim of “Russian hacking” vs. a Clinton-DNC contractor who has a motive to produce a scenario that his employer is demanding. We also have the unexplained refusal of the Clinton-DNC “victims” to provide the evidence of the supposed crime to law-enforcement and intelligence authorities. Finally, and most suspiciously, we have the intelligence community (IC) that fails to demand seeing the evidence before endorsing the DNC/CrowdStrike verdict — a verdict that is obviously politically expedient.

In addition to the technical forensic analysis that discredits the “Russian hacking” charges, we also have the claims of two WikiLeaks principals involved in the DNC e-mail breach who insist that the data was obtained via an inside leak, not a Russian Hack. WikiLeaks spokesman Julian Assange has repeatedly and emphatically stated that neither Russia nor anyone associated with Russia had anything to do with providing WikiLeaks with the DNC e-mails. For many people, however, Assange’s denials are barely more credible than those of Vladimir Putin himself, even though Assange and WikiLeaks have — time after time — reliably delivered precisely what they promised and have been non-partisan, exposing wrongdoing regardless of the wrongdoers’ political affiliations. Assange is not alone, though, in denying a Russian source connection.

Craig Murray, the human-rights whistleblower and former British ambassador to Uzbekistan, has said in interviews with two British newspapers, The Guardian and Daily Mail Online, that he personally flew to Washington, D.C., and met with the DNC employee who provided him with the DNC e-mails to give to WikiLeaks. “I’ve met the person who leaked them,” Murray told The Guardian, “and they are certainly not Russian and it’s an insider. It’s a leak, not a hack.” Ambassador Murray’s career has shown him to be a credible witness, as well as heroically courageous. In exposing the brutal communist dictatorship of Uzbek President Islam Karimov, he also stood up to the British Foreign Office, which was covering for Karimov, and in so doing, sacrificed his diplomatic career and drew down on himself a vicious campaign of character assassination aimed at destroying his reputation.

Thus, we have highly credible technical analysis that asserts the DNC e-mails were obtained by leak, not hack, and we have a credible witness/participant who testifies that he received the DNC data from a DNC “insider” and delivered them to WikiLeaks.

Who is Dmitri Alperovitch?

Who is Dmitri Alperovitch, and why is his highly suspect CrowdStrike analysis accepted as gospel by the DNC, Hillary Clinton, Barack Obama, the IC, and the IC-tainted Big Media “Mockingbirds”? Dmitri Alperovitch was born in Moscow in 1980, which is to say, during the latter years of the Soviet Union. There seem to be large gaps in his curriculum vitae concerning his life before emigrating to the U.S., making his background somewhat mysterious, which, some might think, would be problematical for someone who is reputed to be a top go-to guy on cyber security. But it certainly doesn’t seem to be problematic for major investors such as CapitalG (formerly Google Capital), which led a $100 million capital drive for CrowdStrike in 2015. By May of 2017, Business Insider reported, Alperovitch’s startup had attracted over $256 million and its stock was valued at just under $1 billion.

Billionaire Eric Schmidt, the longtime CEO of Google (and its parent company, Alphabet, Inc.) is, of course, a big-time DNC donor, and was a major supporter of both Barack Obama and Hillary Clinton, as were many other Google executives. Schmidt was a principal investor in The Groundwork, a start-up tech company formed to assist Hillary Clinton’s presidential campaign. Besides Google, CrowdStrike has benefitted from cash infusions from Warburg Pincus, Accel Partners, Telstra, and March Capital Partners.

Just as interesting as Alperovitch’s apparent Midas touch is his cachet with the elite media and the great and the good of the globalist one-world set. He has been the subject of flattering profiles at Esquire, Fortune, Politico, the Washington Post, NPR, CNBC, and many other media herd venues. He is also featured as an anointed expert at such exclusive insider assemblages as the Council on Foreign Relations (CFR), the World Economic Forum, the Aspen Institute, the Brookings Institution, the Center for Strategic and International Studies, the Atlantic Council (where he is a senior fellow), and the Belfer Center for Science and International Affairs at Harvard University (where he is also a senior fellow).

All of the above organizations — most especially the CFR — have longstanding, troubling ties to the Deep State intelligence services. Notwithstanding Alperovitch’s many elitist ties listed above, it is his connections to the Atlantic Council that are especially noteworthy, as they illustrate the extensive and dangerous interconnectedness of these private globalist organizations with think tanks, major corporations, intelligence agencies, national governments, the United Nations, and other intergovernmental organizations. These private globalist organizations form the top level of the pyramid of power of the state-within-the-state — the Deep State — and they consider themselves above the rule of law and all that stuff meant for lower mortals.

The Atlantic Council is subsidized by taxpayers through its government-related funding partners, which include the U.S. State Department; the European Union; the European Investment Bank; NATO; and the governments of Norway, Sweden, Japan, Finland, Lithuania, South Korea, Cyprus, Latvia, and Slovakia; among others. The Atlantic Council’s corporate sponsors include JPMorgan Chase, the Blackstone Group, Bank of America, Airbus, Chevron, ExxonMobil, Ford, Saab, Zurich, Walmart Stores, Inc., Lockheed Martin, 21st Century Fox, Arab Bank, Boeing, CIGNA Corporation, Coca-Cola Company, Raytheon, Pfizer, and many others. Besides the Rockefeller and Soros foundations, the Atlantic Council also receives generous handouts from the usual establishment tax-exempt foundations that fund globalist and leftwing causes.

The Atlantic Council’s website tells us, “In 1961, former Secretaries of State Dean Acheson and Christian Herter, with Will Clayton, William Foster, Theodore Achilles and other distinguished Americans, recommended the consolidation of the U.S. citizens groups supporting the Atlantic Alliance into the Atlantic Council of the United States.”

What the Atlantic Council’s website doesn’t mention is that all of these founders were also leading members of the CFR, the principal organization pushing for world government and the annihilation of national sovereignty for most of the past century. Virtually all of the individuals populating the Atlantic Council’s historical roster of its current and past chairmen, presidents, and directors are/were also prominent CFR members. The Atlantic Council represents and projects the CFR globalist agenda on a multitude of political and economic issues, as, for instance, in its support for the TTIP (Transatlantic Trade and Investment Partnersip), the UN Climate treaty, increased Muslim migration into Europe, expanded EU control over its member states, expanded funding and powers for the United Nations and NATO, and much more. The Atlantic Council is a staunch opponent of the Brexit, President Donald Trump, nationalist-populist movements, and the burgeoning independent media.

It is the Atlantic Council’s involvement in launching an insidious campaign to stamp out the growing Internet-based independent media that is our main concern here, and the area where Dmitri Alperovitch appears to be a central character. A key instrument in that effort is a group of anonymous national security and cybersecurity “experts” who claim to be fighting Russian propaganda in the alternative media.

The group, which goes by the name “Is It Propaganda Or Not?” or "PropOrNot" (www.propornot.com), joined up with Snopes, Politifact, Fake News Watch, Fort Liberty Hoax Sites, and other left-leaning groups to attack conservative and libertarian news sites. It has been boosted in this treacherous attack on the First Amendment by the Washington Post, the New Republic, and other members of the Fourth Estate with deep ties to the Deep State.

This danger has been amplified by the efforts of Google, Facebook, Twitter, and other tech giants to censor politically incorrect speech on the Internet. We first wrote about PropOrNot in a December 2016 article, “FAKE NEWS: Media Hysteria Over Irrelevant Fake Websites Masks More Sinister Agenda.”

In a forthcoming article, we will be examining the threat to our freedom of speech posed by the PropOrNot-Deep State complex and the roles of Alperovitch, CrowdStrike, Google, CFR-Atlantic Council, and the “intelligence community” in that ongoing dangerous attack on liberty.

Image: screenshot from YouTube video of CBS News interview with Dmitri Alperovitch

Related articles:

Rachel Verdon 2 years ago • edited ,

William Jasper, asking "Is Alperovitch, in reality, one of Putin's best deep-cover agents," has every right to be suspicious about Dmitri Alperovitch and his ties to the Atlantic Council of the Ukraine. Alperovitch hates President Putin and the new Russian Federation. Alperovitch was involved in toppling the legitimate Ukrainian presidency of Viktor Yanukovych who favored aligning with Russia instead of the European Union, according to an article in CounterPunch on March 23, 2017:

"Cybersecurity Firm That Attributed DNC Hacks to Russia May Have Fabricated Russia Hacking in Ukraine" by Michael J. Sainato
http://www.counterpunch.org...

The Ukrainian civil war was well orchestrated by Obama and Hillary's Deep State along with Russian Mafioso and Ukrainian neo-Nazi Stefano Bandera operatives, a dubious mercurial cult from WWII who operated for both Hitler and Stalin's armies, being responsible for the penetration of the OPC's (precursor to the CIA) early Cold War operations behind the Iron Curtain. Every freedom fighter we trained behind the Iron Curtain was immediately identified and assassinated by the KGB because of Belorussian and Ukrainian double agents trained by the OPC-CIA:

Brett Harris paul dinatale a year ago ,

I don't see how Alperovich is connected to Russia, he arrived in the US as a 15year old, and has been working hand in glove with the Obama Administration, especially during the Ukraine coup in 2014. Crowdstrike has already been caught using the same techniques as in the DNC, to "prove" that Russia hacked Ukranian artillery guidance computers. The Ukrainian military has come out and explicitly denied that any artillery was infected, and has been independently verified.

Crowdstrike is just another US based start-up getting high on the hog of government contracts, and was keen to be there at the beginning of the Clinton presidency. The evidence from "Adam Carter" shows that Guccifer 2.0 was almost certainly a creation of Crowdstrike, in order to manufacture the story that it was a Russian hacker and not a disgruntled DNC leaker.

The setup was in the media. On June 15 2016, Crowdstrike announced that the DNC had been hacked by the two "bears", but the only thing missing was opposition research on Donald Trump. The next day, G2 appears, "leaking" the very boring "Trump research". The problem is, that that document didn't come from the DNC leak, it came from the Podesta email leak, yet that was never revealed at the time. How did Crowdstrike know on the 15th, to say that the DNC hackers took the Trump research, and G2 appears the next day claiming to release the document, when in actuality, G2 got the "Trump" file off Podesta's machine?

Plenty of Ukrainian collusion with the DNC, along with British and Australian collusion to undermine Trump, no "collusion" or any other evidence that Russia hacked anyone.

[Feb 19, 2020] One bonfire that refuses to die and flamed up again today - Crowdstrike and the media's total refusal to even mention its name, which was the really critical part of the Ukrainian phone call. Not their phony quid pro quo.

Feb 19, 2020 | turcopolier.typepad.com

D , 16 February 2020 at 01:06 PM

One bonfire that refuses to die and flamed up again today - Crowdstrike and the media's total refusal to even mention its name, which was the really critical part of the Ukrainian phone call. Not their phony quid pro quo.

All Democrat candidates need to questioned about Crowdstrike, since it led to two failed major Democrat-led actions against President Trump - The Mueller investigation and the Democrat impeachment.

Following article underscores what Larry Johnson has been reporting for years:

https://thenationalsentinel.com/2020/02/15/crowdstrike-claim-that-russia-hacked-dnc-server-remains-at-center-of-2016-spygate-scandal-hoax/

[Dec 22, 2019] Gussifer 2.0 released nothing remotely damaging to the DNC and is arguably US based (timestamps), and is either CIA or Crowdstrike.

Dec 22, 2019 | turcopolier.typepad.com

Ed Snack , 21 December 2019 at 01:41 PM

Other points to note:

1.

Ed Snack , 20 December 2019 at 10:56 PM
Other points to note:

1. G2 released nothing remotely damaging to the DNC, the first document was even the DNC's oppo file on DJT
2. G2 did some copying and compress/decompress on files. Imbedded timestamps strongly suggest a US Timezone location
3. G2 released some files claiming to be from the DNC, but which demonstrably came from John Podesta's account
4. G2 did not claim to be involved with the Podesta account, which was phished and not hacked as such
5. As an aside, both the Fancy and Cosy Bear packages had been available for third parties to obtain since 2013-4 or so. So their use is not proof of Russian involvement. One or other has been used in bank exploits before 2016.

I believe that G2 is arguably US based (the timestamps are reasonably conclusive), and is either CIA or Crowdstrike. The existence of G2 is a diversionary one to strengthen the case for blaming the Russians. It may be connected to wanting to divert attention from Seth Rich and his subsequent murder, but may not be - that is Seth Rich's death may be just an unfortunate coincidence, we have inadequate information to conclude either way.

[Dec 22, 2019] So US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks. That's when the stratagem of attributing the impending Wikileaks release to a Russian hack was born -- distracting from the incriminating content of the emails, while vilifying the Deep State's favorite enemies, Assange and Russia, all in one neat scam

Highly recommended!
Looks like Brennan ears are all over this false flag operation...
Dec 22, 2019 | turcopolier.typepad.com

Mark McCarty , 21 December 2019 at 02:34 PM

Here's a key point - on June 12, Assange announces that Wikileaks will soon be releasing info pertinent to Hillary. HE DOES NOT SAY THAT HE WILL BE RELEASING DNC EMAILS.

And yet, on June 14, Crowdstrike reports a Russian hack of the DNC servers - and a day later, Guccifer 2.0 emerges and proclaims himself to be the hacker, takes credit for the upcoming Wikileaks DNC releases, publishes the Trump oppo research which Crowdstrike claimed he had taken, and intentionally adds "Russian footprints" to his metadata.

So how did Crowdstrike and G2.0 know that DNC EMAILS would be released?

Because, as Larry postulates, the US intelligence community had intercepted communications between Seth Rich and Wikileaks in which Seth had offered the DNC emails (consistent with the report of Sy Hersh's source within the FBI).

So US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks.

That's when the stratagem of attributing the impending Wikileaks release to a Russian hack was born - distracting from the incriminating content of the emails, while vilifying the Deep State's favorite enemies, Assange and Russia, all in one neat scam.

[Dec 20, 2019] Did John Brennan's CIA Create Guccifer 2.0 and DCLeaks by Larry C Johnson

Highly recommended!
Gossufer2.0 and CrowdStrike are the weakest links in this sordid story. CrowdStrike was nothing but FBI/CIA contractor.
So the hypothesis that CrowdStrike employees implanted malware to implicate Russians and created fake Gussifer 2.0 personality is pretty logical.
Notable quotes:
"... Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU--Guccifer 2.0 persona and DCLeaks.com. Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of then CIA Director John Brennan ..."
"... In October 2015 John Brennan reorganized the CIA . As part of that reorganization he created a new directorate--DIRECTORATE OF DIGITAL INNOVATION. Its mission was to "manipulate digital footprints." In other words, this was the Directorate that did the work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust. ..."
"... We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it appear like it was done by a foreign entity. Wikipedia describes the Vault 7 documents : ..."
"... Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside the file shows it was last edited by someone using the computer name "Феликс Эдмундович." That means the computer was configured to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, "Феликс Эдмундович" is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.) ..."
"... Why would the CIA do this? The CIA knew that Podesta's emails had been hacked and were circulating on the internet. But they had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA. ..."
"... The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich. Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign, would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia. ..."
"... The only source for the claim that Russia hacked the DNC is a private cyber security firm, CrowdStrike. ..."
"... Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch, but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June. That is 34 days of inexcusable inaction. ..."
"... The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham's team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham should be looking into as a potential act of "Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU. ..."
"... LJ bottom line: "The only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU." ..."
"... ICA which seemed to have been framed to allow journalists or the unwary to link the ICA with more rigorous standards used by more authentic assessments? ..."
"... With the Russians not having the advantages that the NSA does (back doors in all US-designed network hardware/software and taps all over the internet), would Russia reveal anything unless it involved an immediate major national security threat. I doubt that would cover Trump. ..."
Dec 20, 2019 | turcopolier.typepad.com

Special Counsel Robert Mueller's report insists that Guccifer 2.0 and DCLeaks were created by Russia's military intelligence organization, the GRU, as part of a Russian plot to meddle in the U.S. 2016 Presidential Election. But this is a lie. Guccifer 2.0 and DCLeaks were created by Brennan's CIA and this action by the CIA should be a target of U.S. Attorney John Durham's investigation. Let me explain why.

Let us start with the January 2017 Intelligence Community Assessment aka ICA. Only three agencies of the 17 in the U.S. intelligence community contributed to and coordinated on the ICA--the FBI, the CIA and NSA. In the preamble to the ICA, you can read the following explanation about methodology:

When Intelligence Community analysts use words such as "we assess" or "we judge," they are conveying an analytic assessment or judgment

To be clear, the phrase,"We assess", is intel community jargon for "opinion". If there was actual evidence or source material for a judgment the writer of the assessment would state, "According to a reliable source" or "knowledgeable source" or "documentary evidence."

Pay close attention to what the analysts writing the ICA stated about the GRU and Guccifer 2.0 and DCLeaks:

We assess with high confidence that the GRU used the Guccifer 2.0 persona, DCLeaks.com, and WikiLeaks to release US victim data obtained in cyber operations publicly and in exclusives to media outlets.

We assess with high confidence that the GRU relayed material it acquired from the DNC and senior Democratic officials to WikiLeaks. Moscow most likely chose WikiLeaks because of its self-proclaimed reputation for authenticity. Disclosures through WikiLeaks did not contain any evident forgeries.

Not one piece of corroborating intelligence. It is all based on opinion and strong belief. There was no human source report or electronic intercept pointing to a relationship between the GRU and the two alleged creations of the GRU--Guccifer 2.0 persona and DCLeaks.com. Now consider the spin that Robert Mueller put on this opinion in his report on possible collusion between the Trump campaign and the Russians. Mueller bluffs the unsuspecting reader into believing that it is a proven fact that Guccifer 2.0 and DCLeaks were Russian assets. But he is relying on a mere opinion from a handpicked group of intel analysts working under the direction of then CIA Director John Brennan.

Here's Mueller's take (I apologize for the lengthy quote but it is important that you read how the Mueller team presents this):

DCLeaks

"The GRU began planning the releases at least as early as April 19, 2016, when Unit 26165 registered the domain dcleaks.com through a service that anonymized the registrant.137 Unit 26165 paid for the registration using a pool of bitcoin that it had mined.138 The dcleaks.com landing page pointed to different tranches of stolen documents, arranged by victim or subject matter. Other dcleaks.com pages contained indexes of the stolen emails that were being released (bearing the sender, recipient, and date of the email). To control access and the timing of releases, pages were sometimes password-protected for a period of time and later made unrestricted to the public.


Starting in June 2016, the GRU posted stolen documents onto the website dcleaks.com, including documents stolen from a number of individuals associated with the Clinton Campaign. These documents appeared to have originated from personal email accounts (in particular, Google and Microsoft accounts), rather than the DNC and DCCC computer networks. DCLeaks victims included an advisor to the Clinton Campaign, a former DNC employee and Clinton Campaign employee, and four other campaign volunteers.139 The GRU released through dcleaks.com thousands of documents, including personal identifying and financial information, internal correspondence related to the"Clinton Campaign and prior political jobs, and fundraising files and information.140


GRU officers operated a Facebook page under the DCLeaks moniker, which they primarily used to promote releases of materials.141 The Facebook page was administered through a small number of preexisting GRU-controlled Facebook accounts.142


GRU officers also used the DCLeaks Facebook account, the Twitter account @dcleaks__, and the email account [email protected] to communicate privately with reporters and other U.S. persons. GRU officers using the DCLeaks persona gave certain reporters early access to archives of leaked files by sending them links and passwords to pages on the dcleaks.com website that had not yet become public. For example, on July 14, 2016, GRU officers operating under the DCLeaks persona sent a link and password for a non-public DCLeaks webpage to a U.S. reporter via the Facebook account.143 Similarly, on September 14, 2016, GRU officers sent reporters Twitter direct messages from @dcleaks_, with a password to another non-public part of the dcleaks.com website.144


The dcleaks.com website remained operational and public until March 2017."

Guccifer 2.0

On June 14, 2016, the DNC and its cyber-response team announced the breach of the DNC network and suspected theft of DNC documents. In the statements, the cyber-response team alleged that Russian state-sponsored actors (which they referred to as "Fancy Bear") were responsible for the breach.145 Apparently in response to that announcement, on June 15, 2016, GRU officers using the persona Guccifer 2.0 created a WordPress blog. In the hours leading up to the launch of that WordPress blog, GRU officers logged into a Moscow-based server used and managed by Unit 74455 and searched for a number of specific words and phrases in English, including "some hundred sheets," "illuminati," and "worldwide known." Approximately two hours after the last of those searches, Guccifer 2.0 published its first post, attributing the DNC server hack to a lone Romanian hacker and using several of the unique English words and phrases that the GRU officers had searched for that day.146

That same day, June 15, 2016, the GRU also used the Guccifer 2.0 WordPress blog to begin releasing to the public documents stolen from the DNC and DCCC computer networks.

The Guccifer 2.0 persona ultimately released thousands of documents stolen from the DNC and DCCC in a series of blog posts between June 15, 2016 and October 18, 2016.147 Released documents included opposition research performed by the DNC (including a memorandum analyzing potential criticisms of candidate Trump), internal policy documents (such as recommendations on how to address politically sensitive issues), analyses of specific congressional races, and fundraising documents. Releases were organized around thematic issues, such as specific states (e.g., Florida and Pennsylvania) that were perceived as competitive in the 2016 U.S. presidential election.

Beginning in late June 2016, the GRU also used the Guccifer 2.0 persona to release documents directly to reporters and other interested individuals. Specifically, on June 27, 2016, Guccifer 2.0 sent an email to the news outlet The Smoking Gun offering to provide "exclusive access to some leaked emails linked [to] Hillary Clinton's staff."148 The GRU later sent the reporter a password and link to a locked portion of the dcleaks.com website that contained an archive of emails stolen by Unit 26165 from a Clinton Campaign volunteer in March 2016.149 "That the Guccifer 2.0 persona provided reporters access to a restricted portion of the DCLeaks website tends to indicate that both personas were operated by the same or a closely-related group of people.150

The GRU continued its release efforts through Guccifer 2.0 into August 2016. For example, on August 15, 2016, the Guccifer 2.0 persona sent a candidate for the U.S. Congress documents related to the candidate's opponent.151 On August 22, 2016, the Guccifer 2.0 persona transferred approximately 2.5 gigabytes of Florida-related data stolen from the DCCC to a U.S. blogger covering Florida politics.152 On August 22, 2016, the Guccifer 2.0 persona sent a U.S. reporter documents stolen from the DCCC pertaining to the Black Lives Matter movement.153"

Wow. Sounds pretty convincing. The documents referencing communications by DCLeaks or Guccifer 2.0 with Wikileaks are real. What is not true is that these entities were GRU assets.

In October 2015 John Brennan reorganized the CIA . As part of that reorganization he created a new directorate--DIRECTORATE OF DIGITAL INNOVATION. Its mission was to "manipulate digital footprints." In other words, this was the Directorate that did the work of creating Guccifer 2.0 and DCLeaks. One of their specialties, creating Digital Dust.

We also know, thanks to Wikileaks, that the CIA was using software specifically designed to mask CIA activity and make it appear like it was done by a foreign entity. Wikipedia describes the Vault 7 documents :

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, that detail activities and capabilities of the United States' Central Intelligence Agency to perform electronic surveillance and cyber warfare. The files, dated from 2013–2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs,[1] web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera Software ASA),[2][3][4] and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux[5][6

One of the tools in Vault 7 carries the innocuous name, MARBLE. Hackernews explains the purpose and function of MARBLE:

Dubbed "Marble," the part 3 of CIA files contains 676 source code files of a secret anti-forensic Marble Framework, which is basically an obfuscator or a packer used to hide the true source of CIA malware.
The CIA's Marble Framework tool includes a variety of different algorithm with foreign language text intentionally inserted into the malware source code to fool security analysts and falsely attribute attacks to the wrong nation.

Marble is used to hamper[ing] forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA," says the whistleblowing site.

"...for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion," WikiLeaks explains.

So guess what gullible techies "discovered" in mid-June 2016? The meta data in the Guccifer 2.0 communications had "Russian fingerprints."

We still don't know who he is or whether he works for the Russian government, but one thing is for sure: Guccifer 2.0 -- the nom de guerre of the person claiming he hacked the Democratic National Committee and published hundreds of pages that appeared to prove it -- left behind fingerprints implicating a Russian-speaking person with a nostalgia for the country's lost Soviet era.

Exhibit A in the case is this document created and later edited in the ubiquitous Microsoft Word format. Metadata left inside the file shows it was last edited by someone using the computer name "Феликс Эдмундович." That means the computer was configured to use the Russian language and that it was connected to a Russian-language keyboard. More intriguing still, "Феликс Эдмундович" is the colloquial name that translates to Felix Dzerzhinsky, the 20th Century Russian statesman who is best known for founding the Soviet secret police. (The metadata also shows that the purported DNC strategy memo was originally created by someone named Warren Flood, which happens to be the name of a LinkedIn user claiming to provide strategy and data analytics services to Democratic candidates.)

Just use your common sense. If the Russians were really trying to carry out a covert cyberattack, do you really think they are so sloppy and incompetent to insert the name of the creator of the Soviet secret police in the metadata? No. The Russians are not clowns. This was a clumsy attempt to frame the Russians.

Why would the CIA do this? The CIA knew that Podesta's emails had been hacked and were circulating on the internet. But they had no evidence about the identity of the culprit. If they had such evidence, they would have cited it in the 2017 ICA.

The U.S. intelligence community became aware around May 26, 2016 that someone with access to the DNC network was offering those emails to Julian Assange and Wikileaks. Julian Assange and people who spoke to him indicate that the person was Seth Rich. Whether or not it was Seth, the Trump Task Force at CIA was aware that the emails, which would be embarrassing to the Clinton campaign, would be released at some time in the future. Hence the motive to create Guccifer 2.0 and pin the blame on Russia.

It is essential to recall the timeline of the alleged Russian intrusion into the DNC network. The only source for the claim that Russia hacked the DNC is a private cyber security firm, CrowdStrike. Here is the timeline for the DNC "hack."

Here are the facts on the public record. They are at odds with the claims of the Intelligence Community:

  1. It was 29 April 2016 , when the DNC claims it became aware its servers had been penetrated. No claim yet about who was responsible. And no claim that there had been a prior warning by the FBI of a penetration of the DNC by Russian military intelligence.
  2. According to CrowdStrike founder , Dimitri Alperovitch, his company first supposedly detected the Russians mucking around inside the DNC server on 6 May 2016. A CrowdStrike intelligence analyst reportedly told Alperovitch that:
    • Falcon had identified not one but two Russian intruders: Cozy Bear, a group CrowdStrike's experts believed was affiliated with the FSB, Russia's answer to the CIA; and Fancy Bear, which they had linked to the GRU, Russian military intelligence.
  3. The Wikileaks data shows that the last message copied from the DNC network is dated Wed, 25 May 2016 08:48:35.
  4. 10 June 2016 --CrowdStrike waited until 10 June 2016 to take concrete steps to clean up the DNC network. Alperovitch told Esquire's Vicky Ward that: 'Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10, all DNC employees were instructed to leave their laptops in the office."
  5. On June 14, 2016 , Ellen Nakamura, a Washington Post reporter who had been briefed by computer security company hired by the DNC -- Crowdstrike--, wrote:
    • Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach.
    • The intruders so thoroughly compromised the DNC's system that they also were able to read all email and chat traffic, said DNC officials and the security experts.
    • The intrusion into the DNC was one of several targeting American political organizations. The networks of presidential candidates Hillary Clinton and Donald Trump were also targeted by Russian spies, as were the computers of some Republican political action committees, U.S. officials said. But details on those cases were not available.
  6. 15 June, 2016 , an internet "personality" self-described as Guccifer 2.0 surfaces and claims to be responsible for the hacks but denies being Russian. The people/entity behind Guccifer 2.0:

The only thing that the Guccifer 2.0 character did not do to declare its Russian heritage was to take out full page ads in the New York Times and Washington Post. But the "forensic" fingerprints that Guccifer 2.0 was leaving behind is not the only inexplicable event.

Time for the common sense standard again. Crowdstrike detected the Russians on the 6th of May, according to CEO Dimitri Alperovitch, but took no steps to shutdown the network, eliminate the malware and clean the computers until 34 days later, i.e., the 10th of June. That is 34 days of inexcusable inaction.

It is only AFTER Julian Assange announces on 12 June 2016 that WikiLeaks has emails relating to Hillary Clinton that DCLeaks or Guccifer 2.0 try to contact Assange.

The actions attributed to DCLeaks and Guccifer 2.0 should be priority investigative targets for U.S. Attorney John Durham's team of investigators. This potential use of a known CIA tool, developed under Brennan with the sole purpose to obfuscate the source of intrusions, pointing to another nation, as a false flag operation, is one of the actions and issues that U.S. Attorney John Durham should be looking into as a potential act of "Seditious conspiracy. It needs to be done. To quote the CIA, I strongly assess that the only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU.

Posted at 02:13 PM in Larry Johnson , Russiagate | Permalink


Factotum , 20 December 2019 at 02:45 PM

LJ bottom line: "The only intelligence agency that evidence indicates was meddling via cyber attacks in the 2016 Presidential election was the CIA, not the GRU."
Paul Damascene , 20 December 2019 at 02:54 PM
Larry, thanks -- vital clarifications and reminders. In your earlier presentation of this material did you not also distinguish between the way actually interagency assessments are titled, and ICA which seemed to have been framed to allow journalists or the unwary to link the ICA with more rigorous standards used by more authentic assessments?
walrus , 20 December 2019 at 03:51 PM
Thank you Larry. You have discovered one more vital key to the conspiracy. We now need the evidence of Julian Assange. He is kept incommunicado and He is being tortured by the British in jail and will be murdered by the American judicial system if he lasts long enough to be extradited.

You can be sure he will be "Epsteined" before he appears in open court because he knows the source of what Wikileaks published. Once he is gone, mother Clinton is in the clear.

Ghost Ship , 20 December 2019 at 04:04 PM
I can understand the GRU or SVR hacking the DNC and other e-mail servers because as intelligence services that is their job, but can anyone think of any examples of Russia (or the Soviet Union) using such information to take overt action?

With the Russians not having the advantages that the NSA does (back doors in all US-designed network hardware/software and taps all over the internet), would Russia reveal anything unless it involved an immediate major national security threat. I doubt that would cover Trump.

[Dec 06, 2019] Reminder No intelligence agency ever saw the evidence of the alleged russian hacking reported by CrowdStrike

Dec 06, 2019 | www.investmentwatchblog.com

October 3, 2019 by IWB Facebook 0 Twitter Email RSS feed - Syndicate IWB Subscribe To Our Newsletter

by datascientist36

CrowdStrike had 2 people that used to work for Mueller and one was part of the Atlantic Council. Atlantic Council has ties to Burisma Group (Hunter Biden), Big Clinton donors and Ukraine.

https://www.dianomi.com/smartads.epl?id=3387

No intel agency ever saw the evidence. They only saw a redacted report provided by CrowdStrike.

Proof:
Official Court Document – Short version

Official Court Document – Full Version


Proof that multiple members of the CrowdStrike team worked for Mueller and Atlantic Council –

Source

Dimitry Alperovich – Co-Founder and CTO. Crowdstrike "investigated" the hacking of the DNC's servers. The FBI was refused access to independently examine the DNC servers. Former NSA experts later claim it wasn't a hack, but a leak by someone with access to the DNC's system. Alperovich is a Non-Resident Senior Fellow at the Atlantic Council. Former McAfee Executive.

George Kurtz – Co-Founder and Chief Executive Officer. Former McAfee Executive.

Steven Chabinsky – Former General Counsel and Chief Risk Officer (9/12-4/16). Appointed by Obama to the Commission on Enhancing National Cybersecurity on April 18, 2016 – two months before Crowdstrike report. Former Deputy Assistant Director of the FBI's Cyber Division and FBI's top cyber lawyer during Mueller's tenure as FBI Director. Now a Partner at White & Case – a D.C. law firm.

Shawn Henry – CSO and President of Crowdstrike Services since April 2012. Previously the FBI's Executive Assistant Director of the Criminal, Cyber, Response, and Services Branch – appointed by FBI Director Mueller.

Robert Johnston – Principal Consultant & Incident Response Expert. Lead investigator on the DNC server investigation. Previously, Marine Corps captain in U.S. Cyber Command. Team Lead of 81 National Cyber Protection Team. Left Crowdstrike in August 2016 and co-founded cybersecurity firm Adlumin. The FBI has never spoken with Johnston.


Burisma Group and Atlantic Council connection proof –
Burisma Group Website

The Atlantic Council of the United States and Burisma Group, an independent gas producer in Ukraine, have announced a cooperative agreement. Atlantic Council will develop programs with Burisma's support to strengthen transatlantic relations, including a focus on energy security and related issues.


This is the company that Hunter Biden had connections too and this is the company that was being investigated by the Ukraine Prosecutor that Biden got removed due to bribing the Ukraine with $1B.

en.wikipedia.org/wiki/Hunter_Biden

Biden served on the board of Burisma Holdings, a major Ukrainian natural gas producer, from 2014 to 2019.

Proof of Biden bribing them –
Video where he admits to it and brags about it
Memo from the prosecutor that was removed


Atlantic Council –

International Advisory Board

Mr. Victor Pinchuk, Founder, East One Ltd.

Clinton Foundation's Deep Financial Ties to Ukrainian Oligarch Revealed

https://www.dianomi.com/smartads.epl?id=3387

Between 2009 and 2013, including when Mrs. Clinton was secretary of state, the Clinton Foundation received at least $8.6 million from the Victor Pinchuk Foundation, according to that foundation, which is based in Kiev, Ukraine.

Schiff Staffer recently made an august visit to Ukraine. Sponsored by the Atlantic Council

The Schiff staffer, Thomas Eager, is also currently one of 19 fellows at the Atlantic Council's Eurasia Congressional Fellowship, a bipartisan program that says it "educates congressional staff on current events in the Eurasia region."

Eager's trip to Ukraine last month was part of the fellowship program and included nine other House employees. The bi-partisan visit, from August 24 to August 31, was billed as a "Ukraine Study Trip," and culminated in a meeting with former Ukrainian President Petro Poroshenko.

The dates of the pre-planned trip are instructive. Eager's visit to Ukraine sponsored by the Burisma-funded Atlantic Council began 12 days after the so-called whistleblower officially filed his August 12 complaint about President Donald Trump's phone call with Ukrainian President Volodymyr Zelensky.


FYI: This is why the media and the dems have been doing everything they can to spin the narratives to distract from all this. Most of this info people don't know about so it needed to be shared.

What Is CrowdStrike And How Are They Connected To Ukraine?

The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated. This left the FBI no choice but to rely upon a third-party for information. These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier,"

The CrowdStrike report implicated Russia for the DNC hack, leading to the two-plus years of Russiagate–but there's more. To this day neither the DOJ nor the FBI has a complete copy of the CrowdStrike report According to the Department of Justice, in its response to the Roger Stone defense asking for a copy of the CrowdStrike report, lawyers for the DNC and DCCC provided redacted draft copies of the CrowdStrike report "to the government." They never saw the full report.

Perhaps the FBI trusted CrowdStrike's report because the company's executive Shawn Henry, who led the forensics team that ultimately blamed Russia for the DNC hack served as assistant director at the FBI under Mueller.

CrowdStrike has ties to the Obama team, is friends with Hillary Clinton, former Ukraine president Petro Poroshenko, and connected to Ukrainian oligarch Victor Pinchuk, another friend of the DNC and someone who donated $10 million to the Clinton Foundation.

Tying it all together, the CrowdStrike document (if the full report ever existed) may have been one more element of the DNC/Deep State effort to end the Trump Presidency before it started If everything was above board -- why didn't the FBI demand to examine the DNC server or the entire CrowdStrike report?

Why is the Media Ignoring Obama's Role in the Biden-Ukraine Controversy?

The simplest answer may be that there isn't really much "conservative" media left to care.

But we do and Obama's fingerprints are all over this too.

Everything Biden does lately seems to be done without much thought of potential consequences, but that's the subject of another article.

Examine this quote from Joe Biden :

Trending: National Media Blackout: Florida Daycare Worker Caught Breaking the Legs of 4 Different Toddlers in the Same Day

"They were walking out to a press conference. I said, nah, we're not going to give you the billion dollars. They said, 'You have no authority. You're not the president -- the president said' I said, 'Call him.' I said, 'I'm telling you, you're not getting the billion dollars.' I said, you're not getting the billion. I looked at them and said, 'I'm leaving in six hours. If the prosecutor is not fired, you're not getting the money.' Well, son of a b -- -. He got fired. And they put in place someone who was solid at the time."

[Dec 05, 2019] American Intelligence Media

Dec 05, 2019 | aim4truth.org

....Also discussed at length is connection between the Ukrainian Atlantic Council to the DNC, Clintons, NATO, Evelyn Farkas, George Soros, and the globalist gangsters . The anti-Russian propaganda of NATO's Cold War machine (Atlantic Council) used Dmitri Alperovitch's Crowdstrike to disrupt the U. S. Presidential election and Ukrainian/Russian relations. Additional resources to support the audio discussion are:

The official Director of National Intelligence Agency report on Russian hacking (meddling) in the U. S. presidential election is hyperlinked below – thirteen pages of a big "nothing burger" that does not have a single piece of evidence. This is an embarrassing waste of U.S. taxpayer dollars. .

Note that the entire "evidence" on Russian hacking of the DNC server is one paragraph containing zero evidence.

Background to "Assessing Russian Activities and Intentions in Recent US Elections": The Analytic Process and CyberIncident Attribution

Another fake intelligence report claims to describe how Dmitri Alperovitch's Cozy Bear and Fancy Bear work in cyberspace. This report is another sad, expensive report that is nothing more than a disinformation piece produced and published by two U.S. intelligence agencies – the FBI and Department of Homeland Security – to propagandize Americans. What the report actually describes is well-known and freely available Ukrainian malware that is old and has nothing to do with Russia.

GRIZZLY STEPPE – Russian Malicious Cyber Activity

The report does not prove that Russia hacked the 2016 U.S. election, but it does reveal that the PHP malware sample that the government provided from the CrowdStrike report is:

Wordfence (cyber analysis company) analyzed the IP addresses available in the declassified report and demonstrated that they are in 61 countries, belong to over 380 organizations and many of those organizations are well known website hosting providers from where many attacks originate. There is nothing in the IP data that points to Russia specifically.

Furthermore, the report claims to contain technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence services to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities.

If you read this report, remember that it is propaganda, and the authors assume that you know nothing about anything and count on you "believing" multiple U.S. intelligence agencies who really work for the Deep State and not the American people.

  1. 10 Trump's Kabuki STING: Part 37: EXPOSED: THE BRITISH ARE RUNNING A COUP OPERATION AGAINST THE PRESIDENT OF THE UNITED STATES AGAIN. – American on January 16, 2019 at 8:44 pm
  2. 11 Canada's Peter Downing, #WEXIT & George Soros (Seriously) | Europe Reloaded on November 24, 2019 at 7:15 am

[Dec 05, 2019] Dmitri Alperovitch Archives - The Clinton Foundation Timeline

Notable quotes:
"... In many accounts of the incident (e.g. Wikipedia here ), it's been reported that "both groups of intruders were successfully expelled from the systems within hours after detection". This was not the case, as Ritter pointed out: data continued to be exfiltrated AFTER the installation of Crowdstrike software, including the emails that ultimately brought down Wasserman-Schultz: ..."
"... There were no fewer than 14409 emails in the Wikileaks archive dating after Crowdstrike's installation of its security software. In fact, more emails were hacked after Crowdstrike's discovery on May 6 than before . Whatever actions were taken by Crowdstrike on May 6 , they did nothing to stem the exfiltration of emails from the DNC. (Read more: Climate Audit/Steve McIntire, 9/02/2017) ..."
Dec 05, 2019 | clintonfoundationtimeline.com
March 23, 2017 – Crowdstrike co-founder and donor to the Clinton Foundation, Dmitri Alperovitch, is a senior fellow at the Atlantic Council, a think tank with openly anti-Russian sentiments

"The cyber security firm outsourced by the Democratic National Committee , CrowdStrike, reportedly misread data, falsely attributing a hacking in Ukraine to the Russians in December 2016 . Voice of America , a US Government funded media outlet, reported, "the CrowdStrike report , released in December , asserted that Russians hacked into a Ukrainian artillery app, resulting in heavy losses of howitzers in Ukraine's war with Russian-backed separatists. But the International Institute for Strategic Studies (IISS) told VOA that CrowdStrike erroneously used IISS data as proof of the intrusion. IISS disavowed any connection to the CrowdStrike report.

( ) The investigation methods used to come to the conclusion that the Russian Government led the hacks of the DNC , Clinton Campaign Chair John Podesta, and the DCCC were further called into question by a recent BuzzFeed report by Jason Leopold, who has developed a notable reputation from leading several non-partisan Freedom of Information Act lawsuits for investigative journalism purposes. On March 15 that the Department of Homeland Security released just two heavily redacted pages of unclassified information in response to an FOIA request for definitive evidence of Russian election interference allegations. Leopold wrote, "what the agency turned over to us and Ryan Shapiro, a PhD candidate at MIT and a research affiliate at Harvard University, is truly bizarre: a two-page intelligence assessment of the incident, dated Aug. 22, 2016, that contains information DHS culled from the internet. It's all unclassified -- yet DHS covered nearly everything in wide swaths of black ink. Why? Not because it would threaten national security, but because it would reveal the methods DHS uses to gather intelligence, methods that may amount to little more than using Google."

Hillary Clinton accepts the Atlantic Council's 2013 Distinguished International Leadership Award. (Credit: YouTube)

In lieu of substantive evidence provided to the public that the alleged hacks which led to Wikileaks releases of DNC and Clinton Campaign Manager John Podesta's emails were orchestrated by the Russian Government, CrowdStrike's bias has been cited as undependable in its own assessment, in addition to its skeptical methods and conclusions. The firm's CTO and co-founder, Dmitri Alperovitch, is a senior fellow at the Atlantic Council, a think tank with openly anti-Russian sentiments that is funded by Ukrainian billionaire Victor Pinchuk, who also happened to donate at least $10 million to the Clinton Foundation .

In 2013 , the Atlantic Council awarded Hillary Clinton it's Distinguished International Leadership Award. In 2014 , the Atlantic Council hosted one of several events with former Ukrainian Prime Minister Arseniy Yatsenyuk , who took over after pro-Russian President Viktor Yanukovych was ousted in early 2014 , who now lives in exile in Russia." (Read more: CounterPunch, 3/23/2017)

Share this: December 30, 2016 – The credibility of cyber firm Crowdstrike, claiming Russia hacked the DNC, comes under serious question

Jeffrey Carr (Credit: Vimeo)

"The cyber security firm hired to inspect the DNC hack and determine who was responsible is a firm called Crowdstrike. Its conclusion that Russia was responsible was released last year, but several people began to call its analysis into question upon further inspection.

Jeffrey Carr was one of the most prominent cynics, and as he noted in his December post, FBI/DHS Joint Analysis Report: A Fatally Flawed Effort :

The FBI/DHS Joint Analysis Report (JAR) " Grizzly Steppe " was released yesterday as part of the White House's response to alleged Russian government interference in the 2016 election process. It adds nothing to the call for evidence that the Russian government was responsible for hacking the DNC, the DCCC, the email accounts of Democratic party officials, or for delivering the content of those hacks to Wikileaks.

It merely listed every threat group ever reported on by a commercial cybersecurity company that is suspected of being Russian-made and lumped them under the heading of Russian Intelligence Services (RIS) without providing any supporting evidence that such a connection exists.

Unlike Crowdstrike, ESET doesn't assign APT28/Fancy Bear/Sednit to a Russian Intelligence Service or anyone else for a very simple reason. Once malware is deployed, it is no longer under the control of the hacker who deployed it or the developer who created it. It can be reverse-engineered, copied, modified, shared and redeployed again and again by anyone. In other words  --  malware deployed is malware enjoyed!

If ESET could do it, so can others. It is both foolish and baseless to claim, as Crowdstrike does, that X-Agent is used solely by the Russian government when the source code is there for anyone to find and use at will.

If the White House had unclassified evidence that tied officials in the Russian government to the DNC attack, they would have presented it by now. The fact that they didn't means either that the evidence doesn't exist or that it is classified.

If it's classified, an independent commission should review it because this entire assignment of blame against the Russian government is looking more and more like a domestic political operation run by the White House that relied heavily on questionable intelligence generated by a for-profit cybersecurity firm with a vested interest in selling "attribution-as-a-service".

Nevertheless, countless people, including the entirety of the corporate media, put total faith in the analysis of Crowdstrike despite the fact that the FBI was denied access to perform its own analysis. Which makes me wonder, did the U.S. government do any real analysis of its own on the DNC hack, or did it just copy/paste Crowdstrike?

As The Hill reported in January :

The FBI requested direct access to the Democratic National Committee's (DNC) hacked computer servers but was denied, Director James Comey told lawmakers on Tuesday.

The bureau made "multiple requests at different levels," according to Comey, but ultimately struck an agreement with the DNC that a "highly respected private company" would get access and share what it found with investigators.

"We'd always prefer to have access hands-on ourselves if that's possible," Comey said, noting that he didn't know why the DNC rebuffed the FBI's request.

This is nuts. Are all U.S. government agencies simply listening to what Crowdstike said in coming to their "independent" conclusions that Russia hacked the DNC? If so, that's a huge problem. Particularly considering what Voice of America published yesterday in a piece titled, Cyber Firm at Center of Russian Hacking Charges Misread Data :

An influential British think tank and Ukraine's military are disputing a report that the U.S. cybersecurity firm CrowdStrike has used to buttress its claims of Russian hacking in the presidential election.

The CrowdStrike report , released in December , asserted that Russians hacked into a Ukrainian artillery app, resulting in heavy losses of howitzers in Ukraine's war with Russian-backed separatists.

But the International Institute for Strategic Studies (IISS) told VOA that CrowdStrike erroneously used IISS data as proof of the intrusion. IISS disavowed any connection to the CrowdStrike report. Ukraine's Ministry of Defense also has claimed combat losses and hacking never happened.

The challenges to CrowdStrike's credibility are significant because the firm was the first to link last year's hacks of Democratic Party computers to Russian actors, and because CrowdStrike co-founder Dimiti Alperovitch has trumpeted its Ukraine report as more evidence of Russian election tampering. "

(Read more: Michael Krieger/Liberty Blitzkrieg, 3/22/2017)

Share this: December 29, 2016 – Tech experts disagree with Crowdstrike's assessment and are critical of the FBI/DHS Joint Analysis Report (JAR)

( ) " Breitbart News has interviewed tech experts who do not agree with the CrowdStrike assessment or Obama administration's claims that the DNC/DCCC hacks clearly committed by Russian state actors, with much criticism aimed at the FBI/DHS Joint Analysis Report (JAR) "Grizzly Steppe" that was released at the end of December . As ZDNet reported after the JAR report was released by the Obama administration on the same day that they announced sanctions against Russia:

Mark Maunder, CEO, Wordfence (Credit: public domain)

The JAR included "specific indicators of compromise, including IP addresses and a PHP malware sample." But what does this really prove? Wordfence, a WordPress security company specializing in analyzing PHP malware, examined these indicators and didn't find any hard evidence of Russian involvement. Instead, Wordfence found the attack software was P.AS. 3.1.0, an out-of-date, web-shell hacking tool. The newest version, 4.1.1b, is more sophisticated. Its website claims it was written in the Ukraine.

Mark Maunder, Wordfence's CEO, concluded that since the attacks were made "several versions behind the most current version of P.A.S sic which is 4.1.1b. One might reasonably expect Russian intelligence operatives to develop their own tools or at least use current malicious tools from outside sources."

Rob Graham, CEO of Errata Security (Credit: public domain)

True, as Errata Security CEO Rob Graham pointed out in a blog post, P.A.S is popular among Russia/Ukraine hackers. But it's "used by hundreds if not thousands of hackers, mostly associated with Russia, but also throughout the rest of the world." In short, just because the attackers used P.A.S., that's not enough evidence to blame it on the Russian government.

Independent cybersecurity experts, such as Jeffrey Carr , have cited numerous errors that the media and CrowdStrike have made in discussing the hacking in what Carr refers to as a " runaway train " of misinformation.

For example, CrowdStrike has named a threat group that they have given the name "Fancy Bear" for the hacks and then said this threat group is Russian intelligence. In December 2016 , Carr wrote in a post on Medium :

A common misconception of "threat group" is that [it] refers to a group of people. It doesn't. Here's how ESET describes SEDNIT, one of the names for the threat group known as APT28, Fancy Bear, etc. This definition is found on p.12 of part two "En Route with Sednit: Observing the Comings and Goings":

As security researchers, what we call "the Sednit group" is merely a set of software and the related network infrastructure, which we can hardly correlate with any specific organization.

Unlike CrowdStrike, ESET doesn't assign APT28/Fancy Bear/Sednit to a Russian Intelligence Service or anyone else for a very simple reason. Once malware is deployed, it is no longer under the control of the hacker who deployed it or the developer who created it. It can be reverse-engineered, copied, modified, shared and redeployed again and again by anyone.

Despite these and other criticisms from technical experts with no political ax to grind, the House Intelligence Committee has called no independent cybersecurity professionals to challenge the Democrats' claims of "Russian hacking" that have been repeated ad naseum by the media.

Instead of presenting counter-arguments to allow the general public to make up their own minds, the House committee has invited Shawn Henry and Dmitri Alperovitch from CrowdStrike. (Read more: Breitbart, 3/09/2017)

Share this: January 2015 – May 25, 2016: There are 14,409 emails in the Wikileaks DNC email archive that are taken after Crowdstrike installs their security software

"Yesterday, Scott Ritter published a savage and thorough critique of the role of Dmitri Alperovitch and Crowdstrike, who are uniquely responsible for the attribution of the DNC hack to Russia. Ritter calls it "one of the greatest cons in modern American history". Ritter's article gives a fascinating account of an earlier questionable incident in which Alperovitch first rose to prominence – his attribution of the "Shady Rat" malware to the Chinese government at a time when there was a political appetite for such an attribution. Ritter portrays the DNC incident as Shady Rat 2. Read the article.

My post today is a riff on a single point in the Ritter article, using analysis that I had in inventory but not written up. I've analysed the dates of the emails in the Wikileaks DNC email archive: the pattern (to my knowledge) has never been analysed. The results are a surprise – standard descriptions of the incident are misleading.

Nov 7, 2017 : story picked up by Luke Rosniak at Daily Caller here

On April 29 , DNC IT staff noticed anomalous activity and brought it to the attention of senior DNC officials: Chairwoman of the DNC, Debbie Wasserman-Schultz, DNC's Chief Executive, Amy Dacey, the DNC's Technology Director, Andrew Brown, and Michael Sussman, a lawyer for Perkins Coie, a Washington, DC law firm that represented the DNC. After dithering for a few days, on May 4, the DNC (Sussman) contacted Crowdstrike (Shawn Henry), who installed their software on May 5 .

Dmitri Alperovich sits before a Crowdstrike/DNC timeline published by Esquire, with one addition by an observant viewer. (Credit: Christopher Leaman/Esquire)

According to a hagiography of Crowdstrike's detection by Thomas Rid last year, Crowdstrike detected "Russia" in the network in the early morning of May 6 :

At six o'clock on the morning of May 6 , Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network.

In many accounts of the incident (e.g. Wikipedia here ), it's been reported that "both groups of intruders were successfully expelled from the systems within hours after detection". This was not the case, as Ritter pointed out: data continued to be exfiltrated AFTER the installation of Crowdstrike software, including the emails that ultimately brought down Wasserman-Schultz:

Moreover, the performance of CrowdStrike's other premier product, Overwatch, in the DNC breach leaves much to be desired. Was CrowdStrike aware that the hackers continued to exfiltrate data (some of which ultimately proved to be the undoing of the DNC Chairwoman, Debbie Wasserman Schultz, and the entire DNC staff) throughout the month of May 2016, while Overwatch was engaged?

This is an important and essentially undiscussed question.

Distribution of Dates

The DNC Leak emails are generally said to commence in January 2015 (e.g. CNN here ) and continue until the Crowdstrike expulsion. In other email leak archives (e.g Podesta emails; Climategate), the number of emails per month tends to be relatively uniform (at least to one order of magnitude). However, this is not the case for the DNC Leak as shown in the below graphic of the number of emails per day:

Figure 1. Number of emails per day in Wikileaks DNC archive from Jan 1, 2015 to June 30, 2016. Calculated from monthly data through March 31, 2016 , then weekly until April 15 , then daily. No emails after May 25, 2016 .

There are only a couple of emails per month (~1/day) through 2015 and up to April 18, 2016 . Nearly all of these early emails were non-confidential emails involving DNCPress or innocuous emails to/from Jordan Kaplan of the DNC. There is a sudden change on April 19, 2016 when 425 emails in the archive. This is also the first day on which emails from hillaryclinton.com occur in the archive – a point that is undiscussed, but relevant given the ongoing controversy about security of the Clinton server (the current version of which was never examined by the FBI) The following week, the number of daily emails in the archive exceeded 1000, reaching a maximum daily rate of nearly 1500 in the third week of May . There is a pronounced weekly cycle to the archive (quieter on the week-ends).

Rid's Esquire hagiography described a belated cleansing of the DNC computer system on June 10-12 , following which Crowdstrike celebrated:

Ultimately, the teams decided it was necessary to replace the software on every computer at the DNC. Until the network was clean, secrecy was vital. On the afternoon of Friday, June 10 , all DNC employees were instructed to leave their laptops in the office. Alperovitch told me that a few people worried that Hillary Clinton, the presumptive Democratic nominee, was clearinghouse. "Those poor people thought they were getting fired," he says. For the next two days, three CrowdStrike employees worked inside DNC headquarters, replacing the software and setting up new login credentials using what Alperovitch considers to be the most secure means of choosing a password: flipping through the dictionary at random. (After this article was posted online, Alperovitch noted that the passwords included random characters in addition to the words.) The Overwatch team kept an eye on Falcon to ensure there were no new intrusions. On Sunday night, once the operation was complete, Alperovitch took his team to celebrate at the Brazilian steakhouse Fogo de Chão.

Curiously, the last email in the archive was noon, May 25 – about 14 days before Crowdstrike changed all the passwords on the week-end of June 10-12 . Two days later ( June 14 ), the DNC arranged for a self-serving article in the Washington Post in which they announced the hack and blamed it on the Russians. Crowdstrike published a technical report purporting to support the analysis and the story went viral.

There were no fewer than 14409 emails in the Wikileaks archive dating after Crowdstrike's installation of its security software. In fact, more emails were hacked after Crowdstrike's discovery on May 6 than before . Whatever actions were taken by Crowdstrike on May 6 , they did nothing to stem the exfiltration of emails from the DNC. (Read more: Climate Audit/Steve McIntire, 9/02/2017)

Share this:

[Dec 04, 2019] CrowdStrikeOut: Mueller's Own Report Undercuts Its Core Russia Meddling Claims

The possibility of CrowdStrike central role in creation of Russiagate might be one reason that Congressional Democrats (and Republicans) were trying to swipe under the carpet the part of Trump conversation where he asked Zelenski to help to recover server images CrowdStrike shipped to Ukraine.
Another question is that now it is possible that one of CrowdStrike employees or Alperovich himself played the role of Gussifer 2.0
Notable quotes:
"... There is strong reason to doubt Mueller's suggestion that an alleged Russian cutout called Guccifer 2.0 supplied the stolen emails to Assange. ..."
"... Mueller's decision not to interview Assange – a central figure who claims Russia was not behind the hack – suggests an unwillingness to explore avenues of evidence on fundamental questions. ..."
"... the government allowed CrowdStrike and the Democratic Party's legal counsel to submit redacted records, meaning CrowdStrike and not the government decided what could be revealed or not regarding evidence of hacking. ..."
"... John Brennan, then director of the CIA, played a seminal and overlooked role in all facets of what became Mueller's investigation: the suspicions that triggered the initial collusion probe; the allegations of Russian interference; and the intelligence assessment that purported to validate the interference allegations that Brennan himself helped generate. Yet Brennan has since revealed himself to be, like CrowdStrike and Steele, hardly a neutral party -- in fact a partisan with a deep animus toward Trump. ..."
Jul 09, 2019 | turcopolier.typepad.com

Which brings me to the newest piece to drop, CrowdStrikeOut: Mueller's Own Report Undercuts Its Core Russia Meddling Claims .

Most of the material in this article will be familiar to regular readers of SST because I wrote about it first. Here are the key conclusions:

I encourage you to read the piece. It is well written and provides an excellent overview of critical events in the flawed investigation.

[Dec 04, 2019] The central question of Ukrainegate is whether CrowdStrike actions on DNC leak were a false flag operation designed to open Russiagate and what was the level of participation of Poroshenko government and Ukrainian Security services in this false flag operation by Factotum

Highly recommended!
Highly recommended !
Republicans are afraid to raise this key question. Democrats are afraid of even mentioning CrowdStrike in Ukrainegate hearings. The Deep State wants to suppress this matter entirely.
Alperovisch connections to Ukraine and his Russophobia are well known. Did Alperovich people played the role of "Fancy Bear"? Or Ukrainian SBU was engaged? George Eliason clams that "I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators." ... "Since there is so much crap surrounding the supposed hack such as law enforcement teams never examining the DNC server or maintaining control of it as evidence, could the hacks have been a cover-up?"
Notable quotes:
"... So far at least I cannot rule out the possibility that that this could have involved an actual 'false flag' hack. A possible calculation would have been that this could have made it easier for Alperovitch and 'CrowdStrike', if more people had asked serious questions about the evidence they claimed supported the 'narrative' of GRU responsibility. ..."
"... What she suggested was that the FBI had found evidence, after his death, of a hack of Rich's laptop, designed as part of a 'false flag' operation. ..."
"... On this, see his 8 October, 'Motion for Discovery and Motion to Accept Supplemental Evidence' in Clevenger's own case against the DOJ, document 44 on the relevant 'Courtlistener' pages, and his 'Unopposed Motion for Stay', document 48. Both are short, and available without a 'PACER' subscription, and should be compulsory reading for anyone seriously interested in ascertaining the truth about 'Russiagate.' (See https://www.courtlistener.com/docket/6775665/clevenger-v-us-department-of-justice/ .) ..."
"... And here, is is also material that he may have had more than one laptop, that 'hard drives' can be changed, and that the level of computer skills that can be found throughout the former Soviet Union is very high. Another matter of some importance is that Ed Butowsky's 'Debunking Rod Wheeler's Claims' site is back up online. (See http://debunkingrodwheelersclaims.net ) ..."
"... The question of whether the 'timeline' produced by Hersh's FBI informant was accurate, or a deliberate attempt to disguise the fact that all kinds of people were well aware of Rich's involvement before his murder, and well aware of the fact of a leak before he was identified as its source, is absolutely central to how one interprets 'Russiagate.' ..."
"... Why did Crowdstrike conclude it was a "Russian breach", when other evidence does show it was an internal download. What was Crowdstrike's method and motivation to reach the "Russian" conclusion instead. Why has that methodology been sealed? ..."
"... Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers. ..."
"... What were the relationships between Crowdstrike, DNC, FBI and the Mueller team that conspired to reach this Russian conclusion. ..."
"... Why did the Roger Stone judge, who just sent Stone away for life, refuse Stone's evidentiary demand to ascertain how exactly Crowdstrike reached its Russsian hacking conclusion, that the court then linked to Stone allegedly lying about this Russian link ..."
"... Indeed, let's set out with full transparency the Ukraine -- Crowsdtrike player links and loyalties to see if there are any smoking guns yet undisclosed. Trump was asking for more information about Crowdstrike like a good lawyer - never ask a question when you don't already know the right answer. Crowdstrike is owned by a Ukrainian by birth ..."
"... Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike. ..."
"... In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives. ..."
"... His role in what we may define as "converting DNC leak into DNC hack" (I would agree with you that this probably was a false flag operation), which was supposedly designed to implicated Russians, and possibly involved Ukrainian security services, is very suspicious indeed. ..."
"... Mueller treatment of Crowdstrike with "kid gloves" may suggest that Alperovich actions were part of a larger scheme. After all Crowdstike was a FBI contactor at the time. ..."
Dec 04, 2019 | turcopolier.typepad.com

Originally from: The Intelligence Whistleblower protection Act did not apply to the phone call ... Reposted - Sic Semper Tyrannis


Factotum , 20 November 2019 at 01:02 PM

The favor was for Ukraine to investigate Crowdstrike and the 2016 DNC computer breach.

Reliance on Crowdstrike to investigate the DNC computer, and not an independent FBI investigation, was tied very closely to the years long anti-Trump Russiagate hoax and waste of US taxpayer time and money.

Why is this issue ignored by both the media and the Democrats. The ladies doth protest far too much.

vig -> Factotum... , 21 November 2019 at 11:00 AM
what exactly, to the extend I recall, could the Ukraine contribute the the DNC's server/"fake malware" troubles? Beyond, that I seem to vaguely recall, the supposed malware was distributed via an Ukrainan address.

On the other hand, there seems to be the (consensus here?) argument there was no malware breach at all, simply an insider copying files on a USB stick.

It seems to either or. No?

What basics am I missing?

David Habakkuk -> vig... , 21 November 2019 at 12:53 PM
vig,

There is no reason why it should be 'either/or'.

If people discovered there had been a leak, it would perfectly natural that in order to give 'resilience' to their cover-up strategies, they could have organised a planting of evidence on the servers, in conjunction with elements in Ukraine.

So far at least I cannot rule out the possibility that that this could have involved an actual 'false flag' hack. A possible calculation would have been that this could have made it easier for Alperovitch and 'CrowdStrike', if more people had asked serious questions about the evidence they claimed supported the 'narrative' of GRU responsibility.

The issues involved become all the more important, in the light of the progress of Ty Clevenger's attempts to exploit the clear contradiction between the claims by the FBI, in response to FOIA requests, to have no evidence relating to Seth Rich, and the remarks by Ms. Deborah Sines quoted by Michael Isikoff.

What she suggested was that the FBI had found evidence, after his death, of a hack of Rich's laptop, designed as part of a 'false flag' operation.

On this, see his 8 October, 'Motion for Discovery and Motion to Accept Supplemental Evidence' in Clevenger's own case against the DOJ, document 44 on the relevant 'Courtlistener' pages, and his 'Unopposed Motion for Stay', document 48. Both are short, and available without a 'PACER' subscription, and should be compulsory reading for anyone seriously interested in ascertaining the truth about 'Russiagate.' (See https://www.courtlistener.com/docket/6775665/clevenger-v-us-department-of-justice/ .)

It is eminently possible that Ms. Hines has simply made an 'unforced error.'

However, I do not – yet – feel able totally to discount the possibility that what is actually at issue is a 'ruse', produced as a contingency plan to ensure that if it becomes impossible to maintain the cover-up over Rich's involvement in its original form, his laptop shows 'evidence' compatible with the 'Russiagate' narrative.

And here, is is also material that he may have had more than one laptop, that 'hard drives' can be changed, and that the level of computer skills that can be found throughout the former Soviet Union is very high. Another matter of some importance is that Ed Butowsky's 'Debunking Rod Wheeler's Claims' site is back up online. (See http://debunkingrodwheelersclaims.net )

Looking at it from the perspective of an old television current affairs hack, I do think that, while it is very helpful to have some key material available in a single place, it would useful if more attention was paid to presentation.

In particular, it would be a most helpful 'teaching aid', if a full and accurate transcript was made of the conversation with Seymour Hersh which Ed Butowsky covertly recorded. What seems clear is that both these figures ended up in very difficult positions, and that the latter clearly engaged in 'sleight of hand' in relation to his dealings with the former. That said, the fact that Butowsky's claims about his grounds for believing that Hersh's FBI informant was Andrew McCabe are clearly disingenuous does not justify the conclusion that he is wrong.

It is absolutely clear to me – despite what 'TTG', following that 'Grub Street' hack Folkenflik, claimed – that when Hersh talked to Butowsky, he believed he had been given accurate information. Indeed, I have difficulty seeing how anyone whose eyes were not hopelessly blinded by prejudice, a\nd possibly fear of where a quest for the truth might lead, could not see that, in this conversation, both men were telling the truth, as they saw it.

However, all of us, including the finest and most honourable of journalists can, from time to time, fall for disinformation. (If anyone says they can always spot when they are being played, all I can say is, if you're right, you're clearly Superman, but it is more likely that you are a fool or knave, if not both.)

The question of whether the 'timeline' produced by Hersh's FBI informant was accurate, or a deliberate attempt to disguise the fact that all kinds of people were well aware of Rich's involvement before his murder, and well aware of the fact of a leak before he was identified as its source, is absolutely central to how one interprets 'Russiagate.'

Factotum -> vig... , 21 November 2019 at 01:45 PM
Several loose end issues about Crowdstrike:

1. Why did Crowdstrike conclude it was a "Russian breach", when other evidence does show it was an internal download. What was Crowdstrike's method and motivation to reach the "Russian" conclusion instead. Why has that methodology been sealed?

2. Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers.

3. What were the relationships between Crowdstrike, DNC, FBI and the Mueller team that conspired to reach this Russian conclusion.

4. Why did the Roger Stone judge, who just sent Stone away for life, refuse Stone's evidentiary demand to ascertain how exactly Crowdstrike reached its Russsian hacking conclusion, that the court then linked to Stone allegedly lying about this Russian link .

5. Indeed, let's set out with full transparency the Ukraine -- Crowsdtrike player links and loyalties to see if there are any smoking guns yet undisclosed. Trump was asking for more information about Crowdstrike like a good lawyer - never ask a question when you don't already know the right answer. Crowdstrike is owned by a Ukrainian by birth .

likbez said in reply to Factotum... , 04 December 2019 at 01:29 AM

Hi Factotum,
Why did Mueller wholly accept the Crowdstrike Russian conclusion, with no further or independent investigation and prominently put this Crowdstrike generated conclusion in his Russiagate report? Which also included the conclusion the "Russians" wanted to help Trump and harm Clinton. Heavy stuff, based upon a DNC proprietary investigation of their own and unavailable computers.

Alperovich is really a very suspicious figure. Rumors are that he was involved in compromising PGP while in MacAfee( June 2nd, 2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams - YouTube ):

Investigative Journalist George Webb worked at MacAfee and Network Solutions in 2000 when the CEO Bill Larsen bought a small, Moscow based, hacking and virus writing company to move to Silicon Valley.

MacAfee also purchased PGP, an open source encryption software developed by privacy advocate to reduce NSA spying on the public.
The two simultaneous purchase of PGP and the Moscow hacking team by Metwork Solutions was sponsored by the CIA and FBI in order to crack encrypted communications to write a back door for law enforcement.

Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike.

In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives.

His role in what we may define as "converting DNC leak into DNC hack" (I would agree with you that this probably was a false flag operation), which was supposedly designed to implicated Russians, and possibly involved Ukrainian security services, is very suspicious indeed.

Mueller treatment of Crowdstrike with "kid gloves" may suggest that Alperovich actions were part of a larger scheme. After all Crowdstike was a FBI contactor at the time.

While all this DNC hack saga is completely unclear due to lack of facts and the access to the evidence, there are some stories on Internet that indirectly somewhat strengthen your hypothesis:

Enjoy and Happy Cyber Week shopping :-)

[Dec 04, 2019] Common Funding Themes Link 'Whistleblower' Complaint and CrowdStrike Firm Certifying DNC Russia 'Hack' by Aaron Klein

Highly recommended!
Notable quotes:
"... Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council, which takes a hawkish approach toward Russia. The Council in turn is financed by Google Inc. ..."
"... In a perhaps unexpected development, another Atlantic Council funder is Burisma, the natural gas company at the center of allegations regarding Joe Biden and his son, Hunter Biden. Those allegations were the subject of Trump's inquiry with Zelemsky related to Biden. The Biden allegations concern significant questions about Biden's role in Ukraine policy under the Obama administration. This took place during a period when Hunter Biden received $50,000 a month from Burisma. ..."
"... Google, Soros's Open Society Foundations, the Rockefeller Fund and an agency of the State Department each also finance a self-described investigative journalism organization repeatedly referenced as a source of information in the so-called whistleblower's complaint alleging Trump was "using the power of his office to solicit interference from a foreign country" in the 2020 presidential race. ..."
"... Another listed OCCRP funder is the Omidyar Network, which is the nonprofit for liberal billionaire eBay founder Pierre Omidyar. ..."
"... Together with Soros's Open Society, Omidyar also funds the Poynter Institute for Media Studies, which hosts the International Fact-Checking Network that partnered with Facebook to help determine whether news stories are "disputed." ..."
Sep 28, 2019 | www.breitbart.com

There are common threads that run through an organization repeatedly relied upon in the so-called whistleblower's complaint about President Donald Trump and CrowdStrike, the outside firm utilized to conclude that Russia hacked the Democratic National Committee's servers since the DNC would not allow the U.S. government to inspect the servers.

One of several themes is financing tied to Google, whose Google Capital led a $100 million funding drive that financed Crowdstrike. Google Capital, which now goes by the name of CapitalG, is an arm of Alphabet Inc., Google's parent company. Eric Schmidt, the chairman of Alphabet, has been a staunch and active supporter of Hillary Clinton and is a longtime donor to the Democratic Party.

CrowdStrike was mentioned by Trump in his call with Ukranian President Volodymyr Zelensky. Perkins Coie, the law firm that represented the DNC and Hillary Clinton's campaign, reportedly helped draft CrowdStrike to aid with the DNC's allegedly hacked server.

On behalf of the DNC and Clinton's campaign, Perkins Coie also paid the controversial Fusion GPS firm to produce the infamous, largely-discredited anti-Trump dossier compiled by former British spy Christopher Steele.

CrowdStrike is a California-based cybersecurity technology company co-founded by Dmitri Alperovitch.

Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council, which takes a hawkish approach toward Russia. The Council in turn is financed by Google Inc.

In a perhaps unexpected development, another Atlantic Council funder is Burisma, the natural gas company at the center of allegations regarding Joe Biden and his son, Hunter Biden. Those allegations were the subject of Trump's inquiry with Zelemsky related to Biden. The Biden allegations concern significant questions about Biden's role in Ukraine policy under the Obama administration. This took place during a period when Hunter Biden received $50,000 a month from Burisma.

Besides Google and Burisma funding, the Council is also financed by billionaire activist George Soros's Open Society Foundations as well as the Rockefeller Brothers Fund, Inc. and the U.S. State Department.

Google, Soros's Open Society Foundations, the Rockefeller Fund and an agency of the State Department each also finance a self-described investigative journalism organization repeatedly referenced as a source of information in the so-called whistleblower's complaint alleging Trump was "using the power of his office to solicit interference from a foreign country" in the 2020 presidential race.

The charges in the July 22 report referenced in the whistleblower's document and released by the Google and Soros-funded organization, the Organized Crime and Corruption Reporting Project (OCCRP), seem to be the public precursors for a lot of the so-called whistleblower's own claims, as Breitbart News documented .

One key section of the so-called whistleblower's document claims that "multiple U.S. officials told me that Mr. Giuliani had reportedly privately reached out to a variety of other Zelensky advisers, including Chief of Staff Andriy Bohdan and Acting Chairman of the Security Service of Ukraine Ivan Bakanov."

This was allegedly to follow up on Trump's call with Zelensky in order to discuss the "cases" mentioned in that call, according to the so-called whistleblower's narrative. The complainer was clearly referencing Trump's request for Ukraine to investigate the Biden corruption allegations.

Even though the statement was written in first person – "multiple U.S. officials told me" – it contains a footnote referencing a report by the Organized Crime and Corruption Reporting Project (OCCRP).

That footnote reads:

In a report published by the Organized Crime and Corruption Reporting Project (OCCRP) on 22 July, two associates of Mr. Giuliani reportedly traveled to Kyiv in May 2019 and met with Mr. Bakanov and another close Zelensky adviser, Mr. Serhiy Shefir.

The so-called whistleblower's account goes on to rely upon that same OCCRP report on three more occasions. It does so to:

Write that Ukraine's Prosecutor General Yuriy Lutsenko "also stated that he wished to communicate directly with Attorney General Barr on these matters." Document that Trump adviser Rudi Giuliani "had spoken in late 2018 to former Prosecutor General Shokin, in a Skype call arranged by two associates of Mr. Giuliani." Bolster the charge that, "I also learned from a U.S. official that 'associates' of Mr. Giuliani were trying to make contact with the incoming Zelenskyy team." The so-called whistleblower then relates in another footnote, "I do not know whether these associates of Mr. Giuliani were the same individuals named in the 22 July report by OCCRP, referenced above."

The OCCRP report repeatedly referenced is actually a "joint investigation by the Organized Crime and Corruption Reporting Project (OCCRP) and BuzzFeed News, based on interviews and court and business records in the United States and Ukraine."

BuzzFeed infamously also first published the full anti-Trump dossier alleging unsubstantiated collusion between Trump's presidential campaign and Russia. The dossier was paid for by Hillary Clinton's campaign and the Democratic National Committee and was produced by the Fusion GPS opposition dirt outfit.

The OCCRP and BuzzFeed "joint investigation" resulted in both OCCRP and BuzzFeed publishing similar lengthy pieces on July 22 claiming that Giuliani was attempting to use connections to have Ukraine investigate Trump's political rivals.

The so-called whistleblower's document, however, only mentions the largely unknown OCCRP and does not reference BuzzFeed, which has faced scrutiny over its reporting on the Russia collusion claims.

Another listed OCCRP funder is the Omidyar Network, which is the nonprofit for liberal billionaire eBay founder Pierre Omidyar.

Together with Soros's Open Society, Omidyar also funds the Poynter Institute for Media Studies, which hosts the International Fact-Checking Network that partnered with Facebook to help determine whether news stories are "disputed."

Like OCCRP, the Poynter Institute's so-called news fact-checking project is openly funded by not only Soros' Open Society Foundations but also Google and the National Endowment for Democracy.

CrowdStrike and DNC servers

CrowdStrike, meanwhile, was brought up by Trump in his phone call with Zelensky. According to the transcript, Trump told Zelensky, "I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike I guess you have one of your wealthy people The server, they say Ukraine has it."

In his extensive report , Special Counsel Robert S. Mueller notes that his investigative team did not "obtain or examine" the servers of the DNC in determining whether those servers were hacked by Russia.

The DNC famously refused to allow the FBI to access its servers to verify the allegation that Russia carried out a hack during the 2016 presidential campaign. Instead, the DNC reached an arrangement with the FBI in which CrowdStrike conducted forensics on the server and shared details with the FBI.

In testimony before the Senate Intelligence Committee in January 2017, then-FBI Director James Comey confirmed that the FBI registered "multiple requests at different levels," to review the DNC's hacked servers. Ultimately, the DNC and FBI came to an agreement in which a "highly respected private company" -- a reference to CrowdStrike -- would carry out forensics on the servers and share any information that it discovered with the FBI, Comey testified.

A senior law enforcement official stressed the importance of the FBI gaining direct access to the servers, a request that was denied by the DNC.

"The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated," the official was quoted by the news media as saying.

"This left the FBI no choice but to rely upon a third party for information. These actions caused significant delays and inhibited the FBI from addressing the intrusion earlier," the official continued.

... ... ...

Aaron Klein is Breitbart's Jerusalem bureau chief and senior investigative reporter. He is a New York Times bestselling author and hosts the popular weekend talk radio program, " Aaron Klein Investigative Radio ." Follow him on Twitter @AaronKleinShow. Follow him on Facebook.

Joshua Klein contributed research to this article.

[Dec 04, 2019] DNC Russian Hackers Found! You Won't Believe Who They Really Work For by the Anonymous Patriots

Highly recommended!
Jan 01, 2017 | themillenniumreport.com

"If someone steals your keys to encrypt the data, it doesn't matter how secure the algorithms are."

Dmitri Alperovitch, founder of CrowdStrike.

By the Anonymous Patriots
SOTN Exclusive

Russians did not hack the DNC system, a Russian named Dmitri Alperovitch is the hacker and he works for President Obama. In the last five years the Obama administration has turned exclusively to one Russian to solve every major cyber-attack in America, whether the attack was on the U.S. government or a corporation. Only one "super-hero cyber-warrior" seems to "have the codes" to figure out "if" a system was hacked and by "whom."

Dmitri's company, CrowdStrike has been called in by Obama to solve mysterious attacks on many high level government agencies and American corporations, including: German Bundestag, Democratic National Committee, Democratic Congressional Campaign Committee (DCCC), the White House, the State Department, SONY, and many others.

CrowdStrike's philosophy is: "You don't have a malware problem; you have an adversary problem."

CrowdStrike has played a critical role in the development of America's cyber-defense policy. Dmitri Alperovitch and George Kurtz, a former head of the FBI cyberwarfare unit founded CrowdStrike. Shawn Henry, former executive assistant director at the FBI is now CrowdStrike's president of services. The company is crawling with former U.S. intelligence agents.

Before Alperovitch founded CrowdStrike in 2011, he was working in Atlanta as the chief threat officer at the antivirus software firm McAfee, owned by Intel (a DARPA company). During that time, he "discovered" the Chinese had compromised at least seventy-one companies and organizations, including thirteen defense contractors, three electronics firms, and the International Olympic Committee. He was the only person to notice the biggest cyberattack in history! Nothing suspicious about that.

Alperovitch and the DNC

After CrowdStrike was hired as an independent "vendor" by the DNC to investigate a possible cyberattack on their system, Alperovitch sent the DNC a proprietary software package called Falcon that monitors the networks of its clients in real time. According to Alperovitch, Falcon "lit up," within ten seconds of being installed at the DNC. Alperovitch had his "proof" in TEN SECONDS that Russia was in the network. This "alleged" evidence of Russian hacking has yet to be shared with anyone.

As Donald Trump has pointed out, the FBI, the agency that should have been immediately involved in hacking that effects "National Security," has yet to even examine the DNC system to begin an investigation. Instead, the FBI and 16 other U.S. "intelligence" agencies simply "agree" with Obama's most trusted "cyberwarfare" expert Dmitri Alperovitch's "TEN SECOND" assessment that produced no evidence to support the claim.

Also remember that it is only Alperovitch and CrowdStrike that claim to have evidence that it was Russian hackers . In fact, only two hackers were found to have been in the system and were both identified by Alperovitch as Russian FSB (CIA) and the Russian GRU (DoD). It is only Alperovitch who claims that he knows that it is Putin behind these two hackers.

Alperovitch failed to mention in his conclusive "TEN SECOND" assessment that Guccifer 2.0 had already hacked the DNC and made available to the public the documents he hacked – before Alperovitch did his ten second assessment. Alperovitch reported that no other hackers were found, ignoring the fact that Guccifer 2.0 had already hacked and released DNC documents to the public. Alperovitch's assessment also goes directly against Julian Assange's repeated statements that the DNC leaks did not come from the Russians.

The ridiculously fake cyber-attack assessment done by Alperovitch and CrowdStrike naïvely flies in the face of the fact that a DNC insider admitted that he had released the DNC documents. Julian Assange implied in an interview that the murdered Democratic National Committee staffer, Seth Rich, was the source of a trove of damaging emails the website posted just days before the party's convention. Seth was on his way to testify about the DNC leaks to the FBI when he was shot dead in the street.

It is also absurd to hear Alperovitch state that the Russian FSB (equivalent to the CIA) had been monitoring the DNC site for over a year and had done nothing. No attack, no theft, and no harm was done to the system by this "false-flag cyber-attack" on the DNC – or at least, Alperovitch "reported" there was an attack. The second hacker, the supposed Russian military (GRU – like the U.S. DoD) hacker, had just entered the system two weeks before and also had done "nothing" but observe.

It is only Alperovitch's word that reports that the Russian FSB was "looking for files on Donald Trump."

It is only this false claim that spuriously ties Trump to the "alleged" attack. It is also only Alperovitch who believes that this hack that was supposedly "looking for Trump files" was an attempt to "influence" the election. No files were found about Trump by the second hacker, as we know from Wikileaks and Guccifer 2.0's leaks. To confabulate that "Russian's hacked the DNC to influence the elections" is the claim of one well-known Russian spy. Then, 17 U.S. intelligence agencies unanimously confirm that Alperovitch is correct – even though there is no evidence and no investigation was ever conducted .

How does Dmitri Alperovitch have such power? Why did Obama again and again use Alperovitch's company, CrowdStrike, when they have miserably failed to stop further cyber-attacks on the systems they were hired to protect? Why should anyone believe CrowdStrikes false-flag report?

After documents from the DNC continued to leak, and Guccifer 2.0 and Wikileaks made CrowdStrike's report look foolish, Alperovitch decided the situation was far worse than he had reported. He single-handedly concluded that the Russians were conducting an "influence operation" to help win the election for Trump . This false assertion had absolutely no evidence to back it up.

On July 22, three days before the Democratic convention in Philadelphia, WikiLeaks dumped a massive cache of emails that had been "stolen" (not hacked) from the DNC. Reporters soon found emails suggesting that the DNC leadership had favored Hillary Clinton in her primary race against Bernie Sanders, which led Debbie Wasserman Schultz, the DNC chair, along with three other officials, to resign.

Just days later, it was discovered that the Democratic Congressional Campaign Committee (DCCC) had been hacked. CrowdStrike was called in again and once again, Alperovitch immediately "believed" that Russia was responsible. A lawyer for the DCCC gave Alperovitch permission to confirm the leak and to name Russia as the suspected author. Two weeks later, files from the DCCC began to appear on Guccifer 2.0's website. This time Guccifer released information about Democratic congressional candidates who were running close races in Florida, Ohio, Illinois, and Pennsylvania. On August 12, Guccifer went further, publishing a spreadsheet that included the personal email addresses and phone numbers of nearly two hundred Democratic members of Congress.

Once again, Guccifer 2.0 proved Alperovitch and CrowdStrike's claims to be grossly incorrect about the hack originating from Russia, with Putin masterminding it all. Nancy Pelosi offered members of Congress Alperovitch's suggestion of installing Falcon , the system that failed to stop cyberattacks at the DNC, on all congressional laptops.

Key Point: Once Falcon was installed on the computers of members of the U.S. Congress, CrowdStrike had even further full access into U.S. government accounts.

Alperovitch's "Unbelievable" History

Dmitri was born in 1980 in Moscow where his father, Michael, was a nuclear physicist, (so Dmitri claims). Dmitri's father was supposedly involved at the highest levels of Russian nuclear science. He also claims that his father taught him to write code as a child.

In 1990, his father was sent to Maryland as part of a nuclear-safety training program for scientists. In 1994, Michael Alperovitch was granted a visa to Canada, and a year later the family moved to Chattanooga, where Michael took a job with the Tennessee Valley Authority.

While Dmitri Alperovitch was still in high school, he and his father started an encryption-technology business. Dmitri studied computer science at Georgia Tech and went on to work at an antispam software firm. It was at this time that he realized that cyber-defense was more about psychology than it was about technology. A very odd thing to conclude.

Dmitri Alperovitch posed as a "Russian gangster" on spam discussion forums which brought his illegal activity to the attention of the FBI – as a criminal. In 2005, Dmitri flew to Pittsburgh to meet an FBI agent named Keith Mularski, who had been asked to lead an undercover operation against a vast Russian credit-card-theft syndicate. Alperovitch worked closely with Mularski's sting operation which took two years, but it ultimately brought about fifty-six arrests. Dmitri Alperovitch then became a pawn of the FBI and CIA.

In 2010, while he was at McAfee, the head of cybersecurity at Google told Dmitri that Gmail accounts belonging to human-rights activists in China had been breached. Google suspected the Chinese government. Alperovitch found that the breach was unprecedented in scale; it affected more than a dozen of McAfee's clients and involved the Chinese government. Three days after his supposed discovery, Alperovitch was on a plane to Washington where he had been asked to vet a paragraph in a speech by the secretary of state, Hillary Clinton.

2014, Sony called in CrowdStrike to investigate a breach of its network. Alperovitch needed just "two hours" to identify North Korea as the adversary. Executives at Sony asked Alperovitch to go public with the information immediately, but it took the FBI another three weeks before it confirmed the attribution.

Alperovitch then developed a list of "usual suspects" who were well-known hackers who had identifiable malware that they commonly used. Many people use the same malware and Alperovitch's obsession with believing he has the only accurate list of hackers in the world is plain idiocy exacerbated by the U.S. government's belief in his nonsense. Alperovitch even speaks like a "nut-case" in his personal Twitters, which generally have absolutely no references to the technology he is supposedly the best at in the entire world.

Dmitri – Front Man for His Father's Russian Espionage Mission

After taking a close look at the disinformation around Dmitri and his father, it is clear to see that Michael Alperovitch became a CIA operative during his first visit to America. Upon his return to Russia, he stole the best Russian encryption codes that were used to protect the top-secret work of nuclear physics in which his father is alleged to have been a major player. Upon surrendering the codes to the CIA when he returned to Canada, the CIA made it possible for a Russian nuclear scientist to become an American citizen overnight and gain a top-secret security clearance to work at the Oakridge plant, one of the most secure and protected nuclear facilities in America . Only the CIA can transform a Russian into an American with a top-secret clearance overnight.

We can see on Michael Alperovitch's Linked In page that he went from one fantastically top-secret job to the next without a break from the time he entered America. He seemed to be on a career path to work in every major U.S. agency in America. In every job he was hired as the top expert in the field and the leader of the company. All of these jobs after the first one were in cryptology, not nuclear physics. As a matter of fact, Michael became the top expert in America overnight and has stayed the top expert to this day.

Most of the work of cyber-security is creating secure interactions on a non-secure system like the Internet. The cryptologist who assigns the encryption codes controls the system from that point on .

Key Point: Cryptologists are well known for leaving a "back-door" in the base-code so that they can always have over-riding control.

Michael Alperovitch essentially has the "codes" for all Department of Defense sites, the Treasury, the State Department, cell-phones, satellites, and public media . There is hardly any powerful agency or company that he has not written the "codes" for. One might ask, why do American companies and the U.S. government use his particular codes? What are so special about Michael's codes?

Stolen Russian Codes

In December, Obama ordered the U.S. military to conduct cyberattacks against Russia in retaliation for the alleged DNC hacks. All of the attempts to attack Russia's military and intelligence agencies failed miserably. Russia laughed at Obama's attempts to hack their systems. Even the Russian companies targeted by the attacks were not harmed by Obama's cyber-attacks. Hardly any news of these massive and embarrassing failed cyber-attacks were reported by the Main Stream Media. The internet has been scrubbed clean of the reports that said Russia's cyber-defenses were impenetrable due to the sophistication of their encryption codes.

Michael Alperovitch was in possession of those impenetrable codes when he was a top scientist in Russia. It was these very codes that he shared with the CIA on his first trip to America . These codes got him spirited into America and "turned into" the best cryptologist in the world. Michael is simply using the effective codes of Russia to design his codes for the many systems he has created in America for the CIA .

KEY POINT: It is crucial to understand at this junction that the CIA is not solely working for America . The CIA works for itself and there are three branches to the CIA – two of which are hostile to American national interests and support globalism.

Michael and Dmitri Alperovitch work for the CIA (and international intelligence corporations) who support globalism . They, and the globalists for whom they work, are not friends of America or Russia. It is highly likely that the criminal activities of Dmitri, which were supported and sponsored by the FBI, created the very hackers who he often claims are responsible for cyberattacks. None of these supposed "attackers" have ever been found or arrested; they simply exist in the files of CrowdStrike and are used as the "usual culprits" when the FBI or CIA calls in Dmitri to give the one and only opinion that counts. Only Dmitri's "suspicions" are offered as evidence and yet 17 U.S. intelligence agencies stand behind the CrowdStrike report and Dmitri's suspicions.

Michael Alperovitch – Russian Spy with the Crypto-Keys

Essentially, Michael Alperovitch flies under the false-flag of being a cryptologist who works with PKI. A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repository and revokes them if needed. Public key cryptography is a cryptographic technique that enables entities to securely communicate on an insecure public network (the Internet), and reliably verify the identity of an entity via digital signatures . Digital signatures use Certificate Authorities to digitally sign and publish the public key bound to a given user. This is done using the CIA's own private key, so that trust in the user key relies on one's trust in the validity of the CIA's key. Michael Alperovitch is considered to be the number one expert in America on PKI and essentially controls the market .

Michael's past is clouded in confusion and lies. Dmitri states that his father was a nuclear physicist and that he came to America the first time in a nuclear based shared program between America and Russia. But if we look at his current personal Linked In page, Michael claims he has a Master Degree in Applied Mathematics from Gorky State University. From 1932 to 1956, its name was State University of Gorky. Now it is known as Lobachevsky State University of Nizhni Novgorod – National Research University (UNN), also known as Lobachevsky University. Does Michael not even know the name of the University he graduated from? And when does a person with a Master's Degree become a leading nuclear physicist who comes to "visit" America. In Michael's Linked In page there is a long list of his skills and there is no mention of nuclear physics.

Also on Michael Alperovitch's Linked In page we find some of his illustrious history that paints a picture of either the most brilliant mind in computer security, encryption, and cyberwarfare, or a CIA/FBI backed Russian spy. Imagine that out of all the people in the world to put in charge of the encryption keys for the Department of Defense, the U.S. Treasury, U.S. military satellites, the flow of network news, cell phone encryption, the Pathfire (media control) Program, the Defense Information Systems Agency, the Global Information Grid, and TriCipher Armored Credential System among many others, the government hires a Russian spy . Go figure.

Michael Alperovitch's Linked In Page

Education:

Gorky State University, Russia, MS in Applied Mathematics

Work History:

Sr. Security Architect

VT IDirect -2014 – Designing security architecture for satellite communications including cryptographic protocols, authentication.

Principal SME (Contractor)

DISA -Defense Information Systems Agency (Manager of the Global Information Grid) – 2012-2014 – Worked on PKI and identity management projects for DISA utilizing Elliptic Curve Cryptography. Performed application security and penetration testing.

Technical Lead (Contractor)

U.S. Department of the Treasury – 2011 – Designed enterprise validation service architecture for PKI certificate credentials with Single Sign On authentication.

Principal Software Engineer

Comtech Mobile Datacom – 2007-2010 – Subject matter expert on latest information security practices, including authentication, encryption and key management.

Sr. Software Engineer

TriCipher – 2006-2007 – Designed and developed security architecture for TriCipher Armored Credential Authentication System.

Lead Software Engineer

BellSouth – 2003-2006 – Designed and built server-side Jabber-based messaging platform with Single Sign On authentication.

Principal Software Research Engineer

Pathfire – 2001-2002 – Designed and developed Digital Rights Management Server for Video on Demand and content distribution applications. Pathfire provides digital media distribution and management solutions to the television, media, and entertainment industries. The company offers Digital Media Gateway, a digital IP store-and-forward platform, delivering news stories, syndicated programming, advertising spots, and video news releases to broadcasters. It provides solutions for content providers and broadcasters, as well as station solutions.

Obama – No Friend of America

Obama is no friend of America in the war against cyber-attacks. The very agencies and departments being defended by Michael Alperovitch's "singular and most brilliant" ability to write encryption codes have all been successfully attacked and compromised since Michael set up the codes. But we shouldn't worry, because if there is a cyberattack in the Obama administration, Michael's son Dmitri is called in to "prove" that it isn't the fault of his father's codes. It was the "damn Russians", or even "Putin himself" who attacked American networks.

Not one of the 17 U.S. intelligence agencies is capable of figuring out a successful cyberattack against America without Michael and Dmitri's help. Those same 17 U.S. intelligence agencies were not able to effectively launch a successful cyberattack against Russia. It seems like the Russian's have strong codes and America has weak codes. We can thank Michael and Dmitri Alperovitch for that.

It is clear that there was no DNC hack beyond Guccifer 2.0. Dmitri Alperovitch is a "frontman" for his father's encryption espionage mission.

Is it any wonder that Trump says that he has "his own people" to deliver his intelligence to him that is outside of the infiltrated U.S. government intelligence agencies and the Obama administration ? Isn't any wonder that citizens have to go anywhere BUT the MSM to find real news or that the new administration has to go to independent news to get good intel?

It is hard to say anything more damnable than to again quote Dmitri on these very issues:
"If someone steals your keys to encrypt the data, it doesn't matter how secure the algorithms are." Dmitri Alperovitch, founder of CrowdStrike

Originally posted at: http://stateofthenation2012.com/?p=62536

[Dec 04, 2019] June 4th, 2017 Crowdstrike Was at the DNC Six Weeks by George Webb

Highly recommended!
A short YouTube with the handwritten timeline
Nov 27, 2019 | www.youtube.com
AwanContra - George Webb, Investigative Journalist

[Dec 04, 2019] Cyberanalyst George Eliason Claims that the "Fancy Bear" Who Hacked the DNC Server is Ukrainian Intelligence – In League with the Atlantic Council and Crowdstrike

Highly recommended!
Notable quotes:
"... And RUH8 is allied with the Atlantic Council and Crowdstrike. ..."
"... Russia was probably not one of the hacking groups. The willful destruction of evidence by the DNC themselves probably points to Russia not being one of the those groups. The DNC wouldn't destroy evidence that supported their position. Also, government spy agencies keep info like that closely held. They might leak out tidbits, but they don't do wholesale dumps, like, ever. ..."
"... That's what the DNC is lying about. Not that hacks happened (they undoubtedly did), but about who did them (probably not Russian gov), and if hacks mattered (they didn't since everything was getting leaked anyway). ..."
"... The DNC/Mueller/etc are lying, but like most practiced liars they're mixing the lies with half-truths and unrelated facts to muddy the waters: ..."
"... An interesting question is, since it's basically guaranteed the DNC got hacked, but probably not by the Russians, is, what groups did hack the DNC, and why did the DNC scramble madly to hide their identities? ..."
"... And while you think about that question, consider the close parallel with the Awan case, where Dems were ostensibly the victims, but they again scrambled to cover up for the people who supposedly harmed them. level 2 ..."
"... DNC wasn't even hacked. Emails were leaked. They didn't even examine the server. Any "evidence" produced is spoofable from CIA cybertools that we know about from wikileaks. It's important to know how each new lie is a lie. But man I am just so done with all this Russia shit. level 2 ..."
"... Crowdstrike claims that malware was found on DNC server. I agree that this has nothing to do with the Wikileaks releases. What I am wondering is whether Crowdstrike may have arranged for the DNC to be hacked so that Russia could be blamed. Continue this thread level 1 ..."
"... George Eliason promises additional essays: *The next articles, starting with one about Fancy Bear's hot/cold ongoing relationship with Bellingcat which destroys the JIT investigation, will showcase the following: Fancy Bear worked with Bellingcat and the Ukrainian government providing Information War material as evidence for MH17: ..."
"... Fancy Bear is an inside unit of the Atlantic Council and their Digital Forensics Lab ..."
Dec 04, 2018 | www.reddit.com

Cyberanalyst George Eliason has written some intriguing blogs recently claiming that the "Fancy Bear" which hacked the DNC server in mid-2016 was in fact a branch of Ukrainian intelligence linked to the Atlantic Council and Crowdstrike. I invite you to have a go at one of his recent essays:

https://off-guardian.org/2018/06/25/who-is-fancy-bear-and-who-are-they-working-for/

Since I am not very computer savvy and don't know much about the world of hackers - added to the fact that Eliason's writing is too cute and convoluted - I have difficulty navigating Eliason's thought. Nonetheless, here is what I can make of Eliasons' claims, as supported by independent literature:

Russian hacker Konstantin Kozlovsky, in Moscow court filings, has claimed that he did the DNC hack – and can prove it, because he left some specific code on the DNC server.

http://thehill.com/policy/cybersecurity/366696-russian-hacker-claims-he-can-prove-he-hacked-dnc

Kozlovsky states that he did so by order of Dimitry Dokuchaev (formerly of the FSB, and currently in prison in Russia on treason charges) who works with the Russian traitor hacker group Shaltai Boltai.

https://www.newsweek.com/russian-hacker-stealing-clintons-emailshacking-dnc-putinsfsb-745555 (Note that Newsweek's title is an overt lie.)

According to Eliason, Shaltai Boltai works in collaboration with the Ukrainian hacker group RUH8, a group of neo-Nazis (Privat Sektor) who are affiliated with Ukrainian intelligence. And RUH8 is allied with the Atlantic Council and Crowdstrike.

https://off-guardian.org/2018/06/25/who-is-fancy-bear-and-who-are-they-working-for/

Cyberexpert Jeffrey Carr has stated that RUH8 has the X-Agent malware which our intelligence community has erroneously claimed is possessed only by Russian intelligence, and used by "Fancy Bear".

https://medium.com/@jeffreyscarr/the-gru-ukraine-artillery-hack-that-may-never-have-happened-820960bbb02d

Eliason has concluded that RUH8 is Fancy Bear.

This might help explain why Adam Carter has determined that some of the malware found on the DNC server was compiled AFTER Crowdstrike was working on the DNC server – Crowdstrike was in collusion with Fancy Bear (RUH8).

In other words, Crowdstrike likely arranged for a hack by Ukrainian intelligence that they could then attribute to Russia.

As far as I can tell, none of this is pertinent to how Wikileaks obtained their DNC emails, which most likely were leaked.

How curious that our Deep State and the recent Mueller indictment have had nothing to say about Kozlovsky's confession - whom I tend to take seriously because he offers a simple way to confirm his claim. Also interesting that the FBI has shown no interest in looking at the DNC server to check whether Kozlovsky's code is there.

I will ask Adam Carter for his opinion on this. 19 comments 84% Upvoted This thread is archived New comments cannot be posted and votes cannot be cast Sort by View discussions in 1 other community level 1



zer0mas 1 point · 1 year ago

Its worth noting that Dimitri Alperovich's (Crowdstrike) hatred of Putin is second only to Hillary's hatred for taking responsibility for her actions. level 1

veganmark 2 points · 1 year ago

Thanks - I'll continue to follow Eliason's work. The thesis that Ukrainian intelligence is hacking a number of targets so that Russia gets blamed for it has intuitive appeal. level 1

alskdmv-nosleep4u -1 points · 1 year ago

I see things like this:

DNC wasn't even hacked.

and have to cringe. Any hacks weren't related to Wikileaks, who got their info from leakers, but that is not the same thing as no hack. Leaks and hacks aren't mutually exclusive. They actually occur together pretty commonly.

DNC's security was utter shit. Systems with shit security and obviously valuable info usually get hacked by multiple groups. In the case of the DNC, Hillary's email servers, etc., it's basically impossible they weren't hacked by dozens of intruders. A plastic bag of 100s will not sit untouched on a NYC street corner for 4 weeks. Not. fucking. happening.

Interestingly, Russia was probably not one of the hacking groups. The willful destruction of evidence by the DNC themselves probably points to Russia not being one of the those groups. The DNC wouldn't destroy evidence that supported their position. Also, government spy agencies keep info like that closely held. They might leak out tidbits, but they don't do wholesale dumps, like, ever.

That's what the DNC is lying about. Not that hacks happened (they undoubtedly did), but about who did them (probably not Russian gov), and if hacks mattered (they didn't since everything was getting leaked anyway).

The DNC/Mueller/etc are lying, but like most practiced liars they're mixing the lies with half-truths and unrelated facts to muddy the waters:

Any "evidence" produced is spoofable from CIA cybertools

Yes, but that spoofed 'evidence' is not the direct opposite of the truth, like I see people assuming. Bad assumption, and the establishment plays on that to make critic look bad. The spoofed evidence is just mud.


An interesting question is, since it's basically guaranteed the DNC got hacked, but probably not by the Russians, is, what groups did hack the DNC, and why did the DNC scramble madly to hide their identities?

And while you think about that question, consider the close parallel with the Awan case, where Dems were ostensibly the victims, but they again scrambled to cover up for the people who supposedly harmed them. level 2

alskdmv-nosleep4u 2 points · 1 year ago

What's hilarious about the 2 down-votes is I can't tell if their from pro-Russiagate trolls, or from people who who can't get past binary thinking. level 1

Honztastic 2 points · 1 year ago

DNC wasn't even hacked. Emails were leaked. They didn't even examine the server. Any "evidence" produced is spoofable from CIA cybertools that we know about from wikileaks. It's important to know how each new lie is a lie. But man I am just so done with all this Russia shit. level 2

veganmark 2 points · 1 year ago

Crowdstrike claims that malware was found on DNC server. I agree that this has nothing to do with the Wikileaks releases. What I am wondering is whether Crowdstrike may have arranged for the DNC to be hacked so that Russia could be blamed. Continue this thread level 1

Inuma I take the headspace of idiots 9 points · 1 year ago

So you mean to tell me that WWIII is being prepared by Mueller and it was manufactured consent?

I'd be shocked, but this only proves that the "Deep State" only cares about their power, consequences be damned. level 1

veganmark 8 points · 1 year ago

George Eliason promises additional essays: *The next articles, starting with one about Fancy Bear's hot/cold ongoing relationship with Bellingcat which destroys the JIT investigation, will showcase the following: Fancy Bear worked with Bellingcat and the Ukrainian government providing Information War material as evidence for MH17:

HillaryBrokeTheLaw Long live dead poets 10 points · 1 year ago

Nice.

I'm glad you're still following this. Crowdstrike is shady af. level 1

[Dec 04, 2019] Fancy Bear - Conservapedia

Highly recommended!
Dec 04, 2019 | www.conservapedia.com

Fancy Bear (also know as Strontium Group, or APT28) is a Ukrainian cyber espionage group. Cybersecurity firm CrowdStrike incorrectly has said with a medium level of confidence that it is associated with the Russian military intelligence agency GRU . CrowdStrike founder, Dmitri Alperovitch , has colluded with Fancy Bear. American journalist George Eliason has written extensively on the subject.

There are a couple of caveats that need to be made when identifying the Fancy Bear hackers. The first is the identifier used by Mueller as Russian FSB and GRU may have been true- 10 years ago. This group was on the run trying to stay a step ahead of Russian law enforcement until October 2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and possibly former Russian state security. The majority of the group are Ukrainians making up Ukraine's Cyber Warfare groups.

Eliason lives and works in Donbass. He has been interviewed by and provided analysis for RT, the BBC , and Press-TV. His articles have been published in the Security Assistance Monitor, Washingtons Blog, OpedNews, the Saker, RT, Global Research, and RINF, and the Greanville Post among others. He has been cited and republished by various academic blogs including Defending History, Michael Hudson, SWEDHR, Counterpunch, the Justice Integrity Project, among others.

Contents [ hide ] Fancy Bear is Ukrainian Intelligence Shaltai Boltai

The "Fancy Bear hackers" may have been given the passwords to get into the servers at the DNC because they were part of the Team Clinton opposition research team. It was part of their job.

According to Politico ,

"In an interview this month, at the DNC this past election cycle centered on mobilizing ethnic communities -- including Ukrainian-Americans -- she said that, when Trump's unlikely presidential campaign. Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists, government officials and private intelligence operatives. While her consulting work began surging in late 2015, she began focusing more on the research, and expanded it to include Trump's ties to Russia, as well." [1]

The only investigative journalists, government officials, and private intelligence operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and the Ministry of Information.

All of these hacking and information operation groups work for Andrea Chalupa with EuroMaidanPR and Irena Chalupa at the Atlantic Council. Both Chalupa sisters work directly with the Ukrainian government's intelligence and propaganda arms.

Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage , terrorist , counter-terrorism, cyber, propaganda , and info war channels officially recognized and directed by Ukraine's Information Ministry. Along with their American colleagues, they populate the hit-for-hire website Myrotvorets with people who stand against Ukraine's criminal activities.

The hackers, OSINT, Cyber, spies, terrorists, etc. call themselves volunteers to keep safe from State level retaliation, even though a child can follow the money. As volunteers motivated by politics and patriotism they are protected to a degree from retribution.

They don't claim State sponsorship or governance and the level of attack falls below the threshold of military action. Special Counsel Robert Mueller had a lot of latitude for making the attribution Russian, even though the attacks came from Ukrainian Intelligence. Based on how the rules of the Tallinn Manual 2.0 on the International Law Applicable to Cyber are written, because the few members of the coalition from Shaltai Boltai are Russian in nationality, Fancy Bear can be attributed as a Russian entity for the purposes of retribution. The caveat is if the attribution is proven wrong, the US will be liable for damages caused to the State which in this case is Russia.

How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they have the ability to research and work in over 30 different languages.

This can be considered an Information Operation against the people of the United States and of course Russia. After 2013, Shaltay Boltay was no longer physically available to work for Russia. The Russian hackers were in Ukraine working for the Ukrainian government's Information Ministry which is in charge of the cyber war. They were in Ukraine until October 2016 when they were tricked to return to Moscow and promptly arrested for treason.

From all this information we know the Russian component of Team Fancy Bear is Shaltai Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian Intelligence. We know they are grouped with InformNapalm which is Ukraine's OSINT unit. We know their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above work directly with the Atlantic Council and Crowdstrike's Dimitry Alperovich.

In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged data from the Surkov leak.

But during 2014, 2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and CyberHunta went to work for the DNC as opposition researchers .

The First Time Shaltai Boltai was Handed the Keys to US Gov Servers

The setup to this happened long before the partnership with Ukrainian Intel hackers and Russia's Shaltai Boltai was forged. The hack that gained access to US top-secret servers happened just after the partnership was cemented after Euro-Maidan.

In August 2009 Hillary Clinton's Deputy Chief of Staff at the State Department Huma Abedin sent the passwords to her Government laptop to her Yahoo mail account. On August 16, 2010, Abedin received an email titled "Re: Your yahoo account. We can see where this is going, can't we?

"After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin's associates to access email accounts into 2015 and 2016."

Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo hack.

The time frame has to be noted. The hack happened in 2014. Access to the email accounts continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai Boltai was working from Kiev, Ukraine.

So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with looking at the time frame. Ukraine had the keys already in hand in 2014.

Chalupa collusion with Ukrainian Intelligence
See also: Ukrainian collusion and Ukrainian collusion timeline

Alexandra Chalupa hired this particular hacking terrorist group, which Dimitry Alperovich and Crowdstrike dubbed "Fancy Bear", in 2015 at the latest. While the Ukrainian hackers worked for the DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the state of the projects they were working on. Let's face it, once you're in, setting up your Fancy Bear toolkit doesn't get any easier. This is why I said the DNC hack isn't the big crime. It's a big con and all the parties were in on it.

Hillary Clinton exposed secrets to hacking threats by using private email instead of secured servers. Given the information provided she was probably being monitored by our intrepid Ruskie-Ukie union made in hell hackers. Anthony Weiner exposed himself and his wife Huma Abedin using Weiner's computer for top-secret State Department emails. And of course Huma Abedin exposed herself along with her top-secret passwords at Yahoo and it looks like the hackers the DNC hired to do opposition research hacked her.

Here's a question. Did Huma Abedin have Hillary Clinton's passwords for her private email server? It would seem logical given her position with Clinton at the State Department and afterward. This means that Hillary Clinton and the US government top secret servers were most likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using legitimate passwords.

Dobrovolska

Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former staff from 2013 through prepping for the 2016 election. [2] [3] Alexandra Chalupa was running a research department that is rich in (foreign) Ukrainian Intelligence operatives, hackers, terrorists, and a couple Ruskie traitors.

Kristina Dobrovolska was acting as a handler and translator for the US State Department in 2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to Washington to meet with Chalupa.

Alexandra types in her password to show Dobrovolska something she found and her eager to please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the Fancy Bear crew about it and they immediately get to work looking for Trump material on the US secret servers with legitimate access. I mean, what else could they do with this? Turn over sensitive information to the ever corrupt Ukrainian government?

According to the Politico article, Alexandra Chalupa was meeting with the Ukrainian embassy in June of 2016 to discuss getting more help sticking it to candidate Trump. At the same time she was meeting, the embassy had a reception that highlighted female Ukrainian leaders.

Four Verkhovna Rada [parlaiment] deputies there for the event included: Viktoriia Y. Ptashnyk, Anna A. Romanova, Alyona I. Shkrum, and Taras T. Pastukh. [4]

According to CNN , [5] DNC sources said Chalupa told DNC operatives the Ukrainian government would be willing to deliver damaging information against Trump's campaign. Later, Chalupa would lead the charge to try to unseat president-elect Trump starting on Nov 10, 2016.

Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison and translator who escorted the delegates from Kyiv during their visits to Albany and Washington.

Kristina Dobrovolska is the handler manager working with Ukraine's DNC Fancy Bear Hackers. [6] She took the Rada [parliament] members to dinner to meet Joel Harding who designed Ukraine's infamous Information Policy which opened up their kill-for-hire-website Myrotvorets. Then she took them to meet the Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the surviving nephew to the infamous torturer The WWII OUNb leader, Mykola Lebed.

Fancy Bear's Second Chance at Top Secret Passwords From Team Clinton

One very successful method of hacking is called social engineering . You gain access to the office space and any related properties and physically locate the passwords or clues to get you into the hardware you want to hack. This includes something as simple as looking over the shoulder of the person typing in passwords.

The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC opposition research. On different occasions, Fancy Bear handler Kristina Dobrovolska traveled to the US to meet the Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea Chalupa, US Dept of State personnel, and most likely Crowdstrike's Dimitry Alperovich. Alperovich was working with the hackers in 2015-16. In 2016, the only groups known to have Fancy Bear's signature tools called X-tunnel and X-Agent were Alperovich, Crowdstrike, and Fancy Bear (Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does explain a few things.

Alleged DNC hack

There were multiple DNC hacks. There is also clear proof supporting the download to a USB stick and subsequent information exchange (leak) to Wikileaks . All are separate events.

At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It is a matter of public record that Team Clinton provided the DNC hackers with passwords to State Department servers on at least 2 occasions, one wittingly and one not. Fancy Bear hackers are Ukrainian Intelligence Operators.

If the leak came through Seth Rich , it may have been because he saw foreign Intel operatives given this access from the presumed winners of the 2016 US presidential election . The leaker may have been trying to do something about it. I'm curious what information Wikileaks might have.

Alperovitch and Fancy Bear

George Eliason, Washingtonsblog: Why Crowdstrike's Russian Hacking Story Fell Apart- Say Hello to Fancy Bear. investigated. [7]

  • In the wake of the JAR-16-20296 dated December 29, 2016 about hacking and influencing the 2016 election, the need for real evidence is clear. The joint report adds nothing substantial to the October 7th report. It relies on proofs provided by the cyber security firm Crowdstrike that is clearly not on par with intelligence findings or evidence. At the top of the report is an "as is" statement showing this.
  • The difference bet enough evidence is provided to warrant an investigation of specific parties for the DNC hacks. The real story involves specific anti-American actors that need to be investigated for real crimes. For instance, the malware used was an out-dated version just waiting to be found. The one other interesting point is that the Russian malware called Grizzly Steppe is from Ukraine. How did Crowdstrike miss this when it is their business to know?
  • The bar for identification set by Crowdstrike has never been able to get beyond words like probably, maybe, could be, or should be, in their attribution. The bar Dimitri Alperovitch set for identifying the hackers involved is that low. Other than asking America to trust them, how many solid facts has Alperovitch provided to back his claim of Russian involvement?
  • information from outside intelligence agencies has the value of rumor or unsubstantiated information at best according to policy. Usable intelligence needs to be free from partisan politics and verifiable. Intel agencies noted back in the early 90's that every private actor in the information game was radically political.
  • Alperovitch first gained notice when he was the VP in charge of threat research with McAfee. Asked to comment on Alperovitch's discovery of Russian hacks on Larry King, John McAfee had this to say. "Based on all of his experience, McAfee does not believe that Russians were behind the hacks on the Democratic National Committee (DNC), John Podesta's emails, and the Hillary Clinton presidential campaign. As he told RT, "if it looks like the Russians did it, then I can guarantee you it was not the Russians."
  • How does Crowdstrike's story part with reality? First is the admission that it is probably, maybe, could be Russia hacking the DNC. "Intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to Wiki Leaks." The public evidence never goes beyond the word possibility. While never going beyond that or using facts, Crowdstrike insists that it's Russia behind both Clinton's and the Ukrainian losses.
  • NBC carried the story because one of the partners in Crowdstrike is also a consultant for NBC. According to NBC the story reads like this."The company, Crowdstrike, was hired by the DNC to investigate the hack and issued a report publicly attributing it to Russian intelligence. One of Crowdstrike's senior executives is Shawn Henry , a former senior FBI official who consults for NBC News.
  • In June, Crowdstrike went public with its findings that two separate Russian intelligence agencies had hacked the DNC. One, which Crowdstrike and other researchers call Cozy Bear, is believed to be linked to Russia's CIA, known as the FSB. The other, known as Fancy Bear, is believed to be tied to the military intelligence agency, called the GRU." The information is so certain the level of proof never rises above "believed to be." According to the December 12th Intercept article "Most importantly, the Post adds that "intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to WikiLeaks."
  • The SBU, Olexander Turchinov, and the Ukrainian Ministry of Defense all agree that Crowdstrike is dead wrong in this assessment. Although subtitles aren't on it, the former Commandant of Ukrainian Army Headquarters thanks God Russia never invaded or Ukraine would have been in deep trouble. How could Dimitri Alperovitch and Crowdstrike be this wrong on easily checked detail and still get this much media attention?
  • Crowdstrike CEO Dmitri Alperovitch story about Russian hacks that cost Hillary Clinton the election was broadsided by the SBU (Ukrainian Intelligence and Security) in Ukraine. If Dimitri Alperovitch is working for Ukrainian Intelligence and is providing intelligence to 17 US Intelligence Agencies is it a conflict of interest?
  • Is giving misleading or false information to 17 US Intelligence Agencies a crime? If it's done by a cyber security industry leader like Crowdstrike should that be investigated? If unwinding the story from the "targeting of Ukrainian volunteers" side isn't enough, we should look at this from the American perspective. How did the Russia influencing the election and DNC hack story evolve? Who's involved? Does this pose conflicts of interest for Dmitri Alperovitch and Crowdstrike? And let's face it, a hacking story isn't complete until real hackers with the skills, motivation, and reason are exposed.
  • According to journalist and DNC activist Andrea Chalupa on her Facebook page "After Chalupa sent the email to Miranda (which mentions that she had invited this reporter to a meeting with Ukrainian journalists in Washington), it triggered high-level concerns within the DNC, given the sensitive nature of her work. "That's when we knew it was the Russians," said a Democratic Party source who has been directly involved in the internal probe into the hacked emails. In order to stem the damage, the source said, "we told her to stop her research."" July 25, 2016
  • If she was that close to the investigation Crowdstrike did how credible is she? Her sister Alexandra was named one of 16 people that shaped the election by Yahoo news. The DNC hacking investigation done by Crowdstrike concluded hacking was done by Russian actors based on the work done by Alexandra Chalupa ? That is the conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the Russian government connection.
  • How close is Dimitri Alperovitch to DNC officials? Close enough professionally he should have stepped down from an investigation that had the chance of throwing a presidential election in a new direction. According to Esquire.com, Alperovitch has vetted speeches for Hillary Clinton about cyber security issues in the past. Because of his work on the Sony hack, President Barrack Obama personally called and said the measures taken were directly because of his work.
  • Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian propagandists, and Ukrainian state supported hackers [show a conflict of interest]. When it all adds up and you see it together, we have found a Russian that tried hard to influence the outcome of the US presidential election in 2016.
  • The Chalupas are not Democrat or Republican. They are OUNb. The OUNb worked hard to start a war between the USA and Russia for the last 50 years. According to the Ukrainian Weekly in a rare open statement of their existence in 2011, "Other statements were issued in the Ukrainian language by the leadership of the Organization of Ukrainian Nationalists (B) and the International Conference in Support of Ukraine. The OUN (Bandera wing) called for" What is OUNb Bandera? They follow the same political policy and platform that was developed in the 1930's by Stepan Bandera . When these people go to a Holocaust memorial they are celebrating both the dead and the OUNb SS that killed. [8] There is no getting around this fact. The OUNb have no concept of democratic values and want an authoritarian fascism .
  • Alexandra Chalupa- According to the Ukrainian Weekly , [9]
"The effort, known as Digital Miadan, gained momentum following the initial Twitter storms. Leading the effort were: Lara Chelak, Andrea Chalupa, Alexandra Chalupa, Constatin Kostenko and others." The Digital Maidan was also how they raised money for the coup. This was how the Ukrainian emigres bought the bullets that were used on Euromaidan. Ukraine's chubby nazi, Dima Yarosh stated openly he was taking money from the Ukrainian emigres during Euromaidan and Pravy Sektor still fundraises openly in North America. The "Sniper Massacre" on the Maidan in Ukraine by Dr. Ivan Katchanovski, University of Ottowa shows clearly detailed evidence how the massacre happened. It has Pravy Sektor confessions that show who created the "heavenly hundred. Their admitted involvement as leaders of Digital Maidan by both Chalupas is a clear violation of the Neutrality Act and has up to a 25 year prison sentence attached to it because it ended in a coup.
  • Andrea Chalupa-2014, in a Huff Post article Sept. 1 2016, Andrea Chalupa described Sviatoslav Yurash as one of Ukraine's important "dreamers." He is a young activist that founded Euromaidan Press. Beyond the gushing glow what she doesn't say is who he actually is. Sviatoslav Yurash was Dmitri Yarosh's spokesman just after Maidan. He is a hardcore Ukrainian nationalist and was rewarded with the Deputy Director position for the UWC (Ukrainian World Congress) in Kiev.
  • In January, 2014 when he showed up at the Maidan protests he was 17 years old. He became the foreign language media representative for Vitali Klitschko, Arseni Yatsenyuk, and Oleh Tyahnybok. All press enquiries went through Yurash. To meet Dimitri Yurash you had to go through Sviatoslav Yurash as a Macleans reporter found out.
  • At 18 years old, Sviatoslav Yurash became the spokesman for Ministry of Defense of Ukraine under Andrei Paruby. He was Dimitri Yarosh's spokesman and can be seen either behind Yarosh on videos at press conferences or speaking ahead of him to reporters. From January 2014 onward, to speak to Dimitri Yarosh, you set up an appointment with Yurash.
  • Andrea Chalupa has worked with Yurash's Euromaidan Press which is associated with Informnapalm.org and supplies the state level hackers for Ukraine.
  • Irene Chalupa- Another involved Chalupa we need to cover to do the story justice is Irene Chalupa. From her bio– Irena Chalupa is a nonresident fellow with the Atlantic Council's Dinu Patriciu Eurasia Center. She is also a senior correspondent at Radio Free Europe/Radio Liberty (RFE/RL), where she has worked for more than twenty years. Ms. Chalupa previously served as an editor for the Atlantic Council, where she covered Ukraine and Eastern Europe. Irena Chalupa is also the news anchor for Ukraine's propaganda channel org She is also a Ukrainian emigre leader.
  • According to Robert Parry's article [10] At the forefront of people that would have taken senior positions in a Clinton administration and especially in foreign policy are the Atlantic Council . Their main goal is still a major confrontation with nuclear-armed Russia.
  • The Atlantic Council is the think tank associated and supported by the CEEC (Central and Eastern European Coalition). The CEEC has only one goal which is war with Russia. Their question to candidates looking for their support in the election was "Are you willing to go to war with Russia?" Hillary Clinton has received their unqualified support throughout the campaign.
  • What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the Atlantic Council would have taken senior cabinet and policy positions, his own fellowship status at the Atlantic Council and relationship with Irene Chalupa creates a definite conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or Homeland Security?
  • When you put someone that has so much to gain in charge of an investigation that could change an election, that is a conflict of interest. If the think tank is linked heavily to groups that want war with Russia like the Atlantic Council and the CEEC, it opens up criminal conspiracy.
  • If the person in charge of the investigation is a fellow at the think tank that wants a major conflict with Russia it is a definite conflict of interest. Both the Atlantic Council and clients stood to gain Cabinet and Policy positions based on how the result of his work affects the election. It clouds the results of the investigation. In Dmitri Alperovitch's case, he found the perpetrator before he was positive there was a crime.
  • Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence groups is where things really heat up. Noted above she works with Euromaidanpress.com and Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers.
  • When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and its hackers individually. There is a mutual relationship. When you add up his work for the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be investigated to see if Ukraine is conspiring against the US government. Crowdstrike is also following their hack of a Russian government official after the DNC hack. It closely resembles the same method used with the DNC because it was an email hack.
  • Crowdstrike's product line includes Falcon Host, Falcon Intelligence, Falcon Overwatch and Falcon DNS. Is it possible the hackers in Falcons Flame are another service Crowdstrike offers?
  • In an interview with Euromaidanpress these hackers say they have no need for the CIA. [11] They consider the CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance is a quasi-organization with the participation of several groups – RUH8, Trinity, Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the Myrotvorets site, Informnapalm analytical agency."
Although this profile says Virginia, tweets are from the Sofia, Bulgaria time zone and he writes in Russian. Another curiosity considering the Fancy Bear source code is in Russian. This image shows Crowdstrike in their network. Crowdstrike is part of Ukrainian nationalist hacker network. In the image it shows a network diagram of Crowdstrike following the Surkov leaks. The network communication goes through a secondary source. Although OSINT Academy sounds fairly innocuous, it's the official twitter account for Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence. The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates journalists and other people for assassination. If you disagree with OUNb politics, you could be on the list.
  • Should someone tell Dimitri Alperovitch that Gerashchenko, who is now in charge of Peacekeeper recently threatened president-elect Donald Trump that he would put him on his "Peacemaker" site as a target? The same has been done with Silvio Berscaloni in the past.
  • Trying not to be obvious, the Head of Ukraine's Information Ministry (UA Intelligence) tweeted something interesting that ties Alperovitch and Crowdstrike to the Ukrainian Intelligence hackers and the Information Ministry even tighter. This single tweet on a network chart shows that out of all the Ukrainian Ministry of Information Minister's following, he only wanted the 3 hacking groups associated with both him and Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be shared heavily. If it was a victory for the hacking squad, it would be smart to keep it to themselves and not draw unwanted attention.
  • These same hackers are associated with Alexandra, Andrea, and Irene Chalupa through the portals and organizations they work with through their OUNb. The hackers are funded and directed by or through the same OUNb channels that Alperovitch is working for and with to promote the story of Russian hacking.
  • When you look at the image for the hacking group in the euromaidanpress article, one of the hackers identifies themselves as one of Dimitri Yarosh's Pravy Sektor members by the Pravy Sektor sweatshirt they have on. Noted above, Pravy Sektor admitted to killing the people at the Maidan protest and sparked the coup.
  • Going further with the linked Euromaidanpress article the hackers say "Let's understand that Ukrainian hackers and Russian hackers once constituted a single very powerful group. Ukrainian hackers have a rather high level of work. So the help of the USA I don't know, why would we need it? We have all the talent and special means for this. And I don't think that the USA or any NATO country would make such sharp movements in international politics."
  • What sharp movements in international politics have been made lately? Let me spell it out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored, Russian language hackers in Eastern European time zones have shown with the Surkov hack they have the tools and experience to hack states that are looking out for it. They are also laughing at US intel efforts.
  • The hackers also made it clear that they will do anything to serve Ukraine. Starting a war between Russia and the USA is the one way they could serve Ukraine best, and hurt Russia worst. Given those facts, if the DNC hack was according to the criteria given by Alperovitch, both he and these hackers need to be investigated.
  • According to the Esquire interview "Alperovitch was deeply frustrated: He thought the government should tell the world what it knew. There is, of course, an element of the personal in his battle cry. "A lot of people who are born here don't appreciate the freedoms we have, the opportunities we have, because they've never had it any other way," he told me. "I have."
  • While I agree patriotism is a great thing, confusing it with this kind of nationalism is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering a conflict with Russia that is against American interests, he's a patriot. He isn't serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to Ukraine.
  • The evidence presented deserves investigation because it looks like the case for conflict of interest is the least Dimitri Alperovitch should look forward to. If these hackers are the real Cozy Bear and Fancy Bear, they really did make sharp movements in international politics. By pawning it off on Russia, they made a worldwide embarrassment of an outgoing President of the United States and made the President Elect the suspect of rumor.
Obama, Brazile, Comey, and CrowdStrike

According to Obama the hacks continued until September 2016. According to ABC, Donna Brazile says the hacks didn't stop until after the elections in 2016. According to Crowdstrike the hacks continued into November.

Democratic National Committee Chair Donna Brazile said Russian hackers persisted in trying to break into the organization's computers "daily, hourly" until after the election -- contradicting President Obama's assertion that the hacking stopped in September after he warned Russian President Vladimir Putin to "cut it out."-ABC

This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney , the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best.

The DNC fiasco isn't that important of a crime. The reason I say this is the FBI would have taken control over material evidence right away. No law enforcement agency or Intel agency ever did. This means none of them considered it a crime Comey should have any part of investigating. That by itself presents the one question mark which destroys any hope Mueller has proving law enforcement maintained a chain of custody for any evidence he introduces.

It also says the US government under Barrack Obama and the victimized DNC saw this as a purely political event. They didn't want this prosecuted or they didn't think it was prosecutable.

Once proven it shows a degree of criminality that makes treason almost too light a charge in federal court. Rest assured this isn't a partisan accusation. Team Clinton and the DNC gets the spotlight but there are Republicans involved.

Further reading

[Dec 04, 2019] June 2nd, 2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams by George Webb

Highly recommended!
Nov 27, 2019 | www.youtube.com

Investigative Jouralist George Webb worked at MacAfee and Network Solutions in 2000 when the CEO Bill Larsen bought a small, Moscow based, hacking and virus writing company to move to Silicon Valley.

MacAfee also purchased PGP, an open source encryption software developed by privacy advocate to reduce NSA spying on the public.

The two simultaneous purchase of PGP and the Moscow hacking team by Metwork Solutions was sponsored by the CIA and FBI in order to crack encrypted communications to write a back door for law enforcement.

Among the 12 engineers assigned to writing a PGP backdoor was the son of a KGB officer named Dmitri Alperovich who would go on to be the CTO at a company involved in the DNC Hacking scandal - Crowdstrike.

In addition to writing a back door for PGP, Alperovich also ported PGP to the blackberry platform to provide encrypted communications for covert action operatives.

[Nov 30, 2019] CrowdStrike: a Conspiracy Wrapped in a Conspiracy Inside a Conspiracy by Oleg Atbashian

Highly recommended!
Notable quotes:
"... Only a computer illiterate would think that CrowdStrike needed to take the physical DNC server to Ukraine in order to analyze it. Any computer can be cloned and its digital image can be sent within minutes anywhere on the planet in the form of ones and zeroes. It can also exist in multiple digital copies, carrying not just confidential archives, but also history logs and other content that can reveal to an expert whether the hacking occurred, and if so, by whom. ..."
"... The copies of the DNC server on CrowdStrike computers are likely to hold the key to understanding what really happened during the 2016 election, the origin of the anti-Trump witch hunt, and the toxic cloud of lies that had been hanging over the world and poisoning minds during the last three years. ..."
"... And now the new Ukrainian government might subpoena these copies from CrowdStrike and finally pass them to FBI experts, which should've been done three years ago. The danger of this happening is a much greater incentive for the Democrats to preemptively destroy Trump than all the dirt Joe Biden had been rolling in as Obama's vice president. ..."
"... I would like you to do us a favor though because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike... I guess you have one of your wealthy people... The server, they say Ukraine has it. There are a lot of things that went on, the whole situation. ..."
"... The fraudulent "CrowdStrike conspiracy" deflection is not a show of the Democrats' strength. Instead, It betrays their desperation and panic, which tells us that Trump is squarely over the target. ..."
"... Yet DOJ Mueller conclusively signed off on the unsubtaniated fact the Russians had hacked the DNC computers in his final Weissman Report. Just one more part of the curious Mueller report that was far more a CYA hit piece against future claims of Obama crimes, than an investigation of past Trump ones. ..."
Nov 29, 2019 | www.frontpagemag.com

The conspiracy theory that exposes the Democrats' desperation and panic.

Fri Nov 29, 2019 Oleg Atbashian 133 In the last few days, media talking heads have been saying the word "CrowdStrike" a lot, defining it as a wild conspiracy theory originating in Moscow. They were joined by Chris Wallace at Fox News, who informed us that president Trump and his ill-informed fans believe in a crazy idea that the DNC wasn't hacked by the Russians but by some Ukrainian group named CrowdStrike that stole the DNC server and brought it to Ukraine , and that it was Ukraine that meddled in our 2016 election and not Russia.

A crazy idea indeed. Except that neither Trump nor his fans had ever heard of it until the Democrat-media complex condescendingly informed them that these are their beliefs.

Let's look at the facts:

None of these facts was ever disputed by anyone. The media largely ignored them except for the part about the Russian hackers, which boosted their own, now debunked, wild conspiracy theory that Trump was a Russian agent.

Now that Trump had asked the newly elected Ukrainian president Zelensky to look into CrowdStrike during that fateful July phone call, the media all at once started telling us that "CrowdStrike" is a code word for a conspiracy theory so insane that only Trump could believe in it, which is just more proof of how insane he is.

But if Trump had really said what Mr. Wallace and the media claim, Ukrainians would be the first to call him on it and the impeachment would've been over by now. Instead, Ukrainians back Trump every step of the way.

So where did this pretzel-shaped fake news come from, and why is it being peddled now ?

Note this is a classic case study of propaganda and media manipulation:

  1. Take an idea or a story that you wish to go away and make up an obviously bogus story with the same names and details as the real one.
  2. Start planting it simultaneously on media channels until the fake story supplants the real one, while claiming this is what your opponents really believe.
  3. Have various fact-checking outlets debunk your fake story as an absurd conspiracy theory. Ridicule those who allegedly believe in it. Better yet, have late night comedians do it for you.
  4. Once your opponent is brought down, mercilessly plant your boot on his face and never let up.

This mass manipulation technology had been tested and perfected by the Soviet propaganda machine, both domestically and overseas, where it was successfully deployed by the KGB. The Kremlin still uses it, although it can no longer afford it on the same grandiose scale. In this sense, the Democratic think tanks are the true successors of the KGB in deviousness, scope, and worldwide reach of fake narratives. How they inherited these methods from the KGB is a story for another day.

For a long time this technology was allowing the Democrats to delegitimize opposition by convincing large numbers of Americans that Republicans are

The Soviet communists had aptly named it "disinformation," which a cut above the English word "misinformation." It includes a variety of methods for a variety of needs, from bringing down an opponent to revising history to creating a new historical reality altogether. In this sense, most Hollywood movies on historical subjects today disinform us about history, supplanting it with a bogus "progressive" narrative. The Soviet term for such art was "socialist realism."

Long story short, the Democrat-media complex has successfully convinced one half of the world that Trump is a Russian agent. Now they're acting as if they'd spent the last three years in a coma, unaware of any bombshell stories about collusion. And bombshell stories without any continuation are a telltale sign of fake narratives. The only consequence of these bombshells is mass amnesia among the foot soldiers.

The Trump-Russian outrage is dead, long live the Trump-Ukraine outrage. And when that outrage is dead, the next outrage that will be just outrageous.

The current impeachment narrative alleges that Trump used military aid as leverage in asking Ukraine to dig up dirt on Joe Biden (which implies the Democrats know Biden is dirty, otherwise why bother?). What's not in this picture is CrowdStrike. Even though Trump mentioned it in the phone call, it has nothing to do with the Bidens nor the Javelin missiles. CrowdStrike has nothing to do with impeachment. We're told it's just a silly conspiracy theory in Trump's head, that it's a nonissue.

But then why fabricate fake news about it and plant blatant lies simultaneously in all media outlets from Mother Jones to Fox News? Why risk being exposed over such a nonissue? Perhaps because it's more important than the story suggests.

Only a computer illiterate would think that CrowdStrike needed to take the physical DNC server to Ukraine in order to analyze it. Any computer can be cloned and its digital image can be sent within minutes anywhere on the planet in the form of ones and zeroes. It can also exist in multiple digital copies, carrying not just confidential archives, but also history logs and other content that can reveal to an expert whether the hacking occurred, and if so, by whom.

The copies of the DNC server on CrowdStrike computers are likely to hold the key to understanding what really happened during the 2016 election, the origin of the anti-Trump witch hunt, and the toxic cloud of lies that had been hanging over the world and poisoning minds during the last three years.

And now the new Ukrainian government might subpoena these copies from CrowdStrike and finally pass them to FBI experts, which should've been done three years ago. The danger of this happening is a much greater incentive for the Democrats to preemptively destroy Trump than all the dirt Joe Biden had been rolling in as Obama's vice president.

This gives the supposedly innocuous reference to CrowdStrike during Trump's call a lot more gravity and the previously incoherent part of the transcript begins to make sense.

PRESIDENT TRUMP: I would like you to do us a favor though because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike... I guess you have one of your wealthy people... The server, they say Ukraine has it. There are a lot of things that went on, the whole situation.

If you read the transcript on the day it was released, you probably didn't understand what Trump was even talking about, let alone what had caused such a disproportionate outrage, complete with whistle blowing and calls for impeachment. What in that mild conversation could possibly terrify the Democrats so much? They were terrified because, unlike most Americans, the Democrats knew exactly what Trump was talking about. And now you know, too.

The fraudulent "CrowdStrike conspiracy" deflection is not a show of the Democrats' strength. Instead, It betrays their desperation and panic, which tells us that Trump is squarely over the target.

It also helps us to see who at Fox News can be trusted to tell us the truth. And it ain't Chris Wallace.


NAHALKIDES a day ago ,

Fine dissection of the CrowdStrike story. Of course if the DNC was serious about finding out who breached their security they would have allowed the FBI to investigate. They didn't - which means they're covering something up.

coolit10 NAHALKIDES a day ago ,

And who doesn't have at least one backup system running constantly, I have two and am just a home user and the DNC would not have been dumb enough not to have one on the premises and one off site for safety and preservation and the FBI could have gotten to either one if they wanted to. DWS was involved in something very similar and the FBI backed off again. I thought the DNC and the FBI were on the same page and would have liked to find out how the "transfer" happened?

🕊jr🕊 " Deep State Target " coolit10 13 hours ago ,

Let's be honest, that FBI made no attempt to investigate it in the first place as they were as culpable in this crime as the DNC.

Herman Young 🕊jr🕊 " Deep State Target " 12 hours ago ,

Yet DOJ Mueller conclusively signed off on the unsubtaniated fact the Russians had hacked the DNC computers in his final Weissman Report. Just one more part of the curious Mueller report that was far more a CYA hit piece against future claims of Obama crimes, than an investigation of past Trump ones.

SteveTn6b NAHALKIDES 16 hours ago ,

They know who breached their security. He'd dead!

Herman Young SteveTn6b 12 hours ago ,

Seth Rich - paper trail to Wikilinks needs to come out in any Senate impeachment trail since Democrats claim the Ukraine phone call was Trump's alleged downfall. CROWDSTRIKE was the only favor Trumps asked for.

Karen Herman Young 9 hours ago ,

We all know it was Seth Rich

Clasvi SteveTn6b 13 hours ago ,

you are spot on. it is amazing how they shut down the Seth Rich murder. The media was all to happy to shut it down.

Karen Clasvi 9 hours ago ,

Fox helped with that cover up

undrprsr Clasvi 6 hours ago ,

Yep, and Donna Brazile wrote in her book she feared for her life after Seth Rich was murdered, why's that if it was just a random attack?

El Cid NAHALKIDES 15 hours ago ,

There are two important facts to glean from this article:

1) Crowdstrike, the DNC contractor, is Ukrainian
2) that the famous server may have been backed up in Ukraine and not tampered with.

From the MSM we were given the 'interpretation' that Trump is an idiot who believes that the DNC shipped the server with no changes to the Ukraine. No folks. He 'gets' technology and security. He actual ran a business! (imagine).

I'd love to hear that in Hillary's own voice. :) You know, cleaned with a cloth?

Joe Clear NAHALKIDES 12 hours ago ,

They sure are, that being the killing of Seth Rich who copied the data to flash drive and gave it to Wikileaks.

stanley castleberry NAHALKIDES 12 hours ago ,

They found out right away. Hence Rich was assassinated.

Herman Young NAHALKIDES 12 hours ago • edited ,

That pretty much sums it up. MSM in total cahoots on this too since they put the entire topic of the CROWDSTRIKE part of the phone call into the cone of silence.

No Bread or Circuses a day ago ,

The Left and media (One and the same within the "Deep State") have been playing "Three Card Monte" with America for a while; it stops now!

The "Impeachment" media show being run by the Lefty tool cretins in the House has NOTHING to do with wrong doing by President Trump. It has EVERYTHING to do with the fear that President Trump will expose the depth of the swamp and bring the criminals on the Left down to Justice!

We are s close to getting to the bottom of the conspiracies that threaten our nation. Time to make the America haters pay for the harm they have done to our nation!

We need open and in depth prosecution of the criminal activities of the Left. There needs to be LONG prison sentences and, yes, even executions for those that seek to undermine our nation.

People need to know that there our GRAVE penalties for betraying our nation!

God Bless President Trump!
God Bless America!

Anacleto Mitraglia 21 hours ago • edited ,

In fact, when I first heard this story - that is: very recently - I was puzzled: why should a major party in the Country that invented IT and is still at its leading edge, ask an obscure firm of a crumbling, remote foreign State to do their IT security research? I'm not saying that Ukraine is a s++thole Country, but... you get me.

Either they have very much to hide, or they fear some closeted rightwing geek that works in any of the many leftist US technofirms. Or, CrowdStrike were involved from the beginning of the story, from the Steele dossier perhaps?

Herman Young Anacleto Mitraglia 12 hours ago ,

The whole Crowdstrike fiasco has been around for years - plus became a solid CYA part of the Mueller report too - just in case the Democrats needed to bury it later.

El Cid Anacleto Mitraglia 15 hours ago • edited ,

don't you get it? The DNC is completely infiltrated by Ukrainian graft. Even Joe Biden was on the take. Why won't they run their IT? (there is no Research in IT here, just office software)

Cynthia Campbell 19 hours ago ,

If you want to sell and deliver State Secrets and Intel to our enemies, then you (Obama, the Clintons, the DNC) simply make it easier for THEM to access. They have done this for years, and this is why they had to fill the DOJ, the FBI and the State Department with traitors and haters of America and American principles. Barack Hussein Obama, the Clintons, their evil administrations and even two-faced RINOS like McCain, Romney, and Jeff Sessions were actively involved. This is treason pure and simple, and all of the above could be legitimately and justifiably hung or shot without recourse, and rightly so!

doc_who_cuts 20 hours ago ,

not seizing the DNC and hillary servers is the clearest case of OBSTRUCTION OF JUSTICE I know of in the last few years.

Herman Young doc_who_cuts 12 hours ago ,

Isn't it ironic, the Dems accuse Trump of "obstruction of justice".

FRANCES LOUISE a day ago ,

I have known about "Crowdstrike" since Dec. 2017. Pres. Trump is just subtlety introducing background on what will be the biggest story of treachery, subversion, treason and corruption ever. QAnon that the fakenews tries to vilify as a LARP has been dropping crumbs about "Crowdstrike", Perkins Coir, Fusion GPS, FVEY and so much more! Crowdstrike mentioned 7x in the last 2 years. I can't urge people enough to actually investigate the Q posts for themselves! You will be stunned at what you have been missing. Q which says "future proves past" and "news will unlock" what I see in the media now is old news to those of us following Q. Q told us that "Senate was the prize" "Senate meant more" that the investigations started in the House would now move to the Senate and all this that the Dems and Rinos have been trying to hide is going to be exposed. Fakenews corporate media has litterally written hundreds of hit pieces against Q - me knows "they doth protest to much" - Recent Q post told "Chairman Graham its time. Senate was the target"

Keep up with the Q posts and Pres. Trump's tweets in once place: https://qmap.pub/ - And if you are still having a hard time believing this is legit Pres. Trump himself has confirmed Q posts by "Zero Delta" drops - if you think this is fake - try and tweet within 1 minute of when Pres. Trump does BUT your tweet has to anticipate his! YOU have to tweet first and HE has to follow you within 1 minute. MATHEMATICAL IMPOSSIBILITY UNLESS you are in the same immediate space or communicating at the time of the tweets! To all you doubters that think Q is just a by chance scam - NO WAY. There have been MANY, MANY of these ZERO DELTA PROOFS over the last 2 years. The most recent was Nov. 20th.

Link will show you how much attention has been given to "debunking" Q - gotta wonder why
https://cdn.qmap.pub/images...

elephant4life FRANCES LOUISE 19 hours ago ,

Perkins-Coie is the real-world Milton, Chadwick & Waters. I'm willing to bet their industrial-sized shredders are working overtime.

Herman Young elephant4life 12 hours ago ,

Unless Bleach-Bit got there first.

Herman Young FRANCES LOUISE 12 hours ago ,

Crowdstrike in the dog who did not bark. The Democrat cone of silence they put on even the mention of the word has been the most damning clue this is where the real action is.

Grant Hodges a day ago ,

The assertion that a digital image of the computer can be transmitted quickly all around the world is not necessarily correct in my experience as a cyber security analyst. I'm not an upper echelon type, but I am aware that it can take up to weeks to transmit such images depending on the hard disk, where it is, and the connections/network to your device creating the image. The FBI should have physically taken the device since there was a suspicion of wrong doing by Hillary Clinton. Had it been Donald Trump's computer I do not doubt the FBI would either have imaged it on the spot or taken the device.

coolit10 Grant Hodges a day ago ,

Last night I completely removed Catalina-Safari on my older Mac Book Air and re-installed Mohave-Safari from my backup to the day before I installed Catalina including the data and system just like it was before. It took around 5 hours and was cabled and not on Wi-Fi and it was perfect and reset the clock, my old e-mails and the newer ones as well. I can't believe being hooked into real broadband or fiber couldn't do the same in a relatively short period of time, but still significantly longer than a thumb drive or external hard drive.

Grant Hodges coolit10 a day ago ,

One variable is how big your hard drive is. If it is a big drive at a remote location, say somewhere in California to the Midwest, it can take weeks for a forensic backup. I only say that because . . . well, I'm not allowed to say. But you get it.

El Cid Grant Hodges 14 hours ago • edited ,

The assertion is a figure of speech. Today's IT infrastructure companies sell the service of maintaining clones in real-time in two or more locations for safety purposes. VMware and other off-the-shelf products makes this kind of setup easy to deploy. Did Crowdstrike offer that service and did the DNC buy it, that is the question? And, if so, did Crowdstrike keep the image on their backups in Ukraine?

(Note: it is not obvious that such a setup would preserve the forensic data the FBI would be looking for, but its a start).

[Nov 30, 2019] American Intelligence Media

Nov 30, 2019 | aim4truth.org

In January 2017, after much hullabaloo from the Democrats about Russian hacking of the 2016 election, the Anonymous Patriots set out to get the record straight about who was hacking who. Using basic internet research, along with our ability to separate fake media narrative from actual truth, we posted a citizen intelligence report entitled: Russian Hackers Found

In this article, we disclosed that Dmitri Alperovitch is the Russian DNC hacker . Yet to date, the corporate media remains silent on our report and intelligence agencies have not updated the lame report that they originally provided as evidence of Russian hacking (see PDF link below). While the Deep State operatives in the media and intelligence agencies continue to suppress vital intelligence that the American people need to make America great again , the American Intelligence Media has moved on to disclose more about Alperovitch and the Crowdstrike operations.

As we have discussed in several audios, Barack Obama's favorite cyberwarlord was Dmitri Alperovitch, whose loyalty to the United States is certainly questionable. Is it odd to you that Alperovitch, known as the best criminal Russian hacker in the world, was at one time arrested by the FBI? If James Comey is the "D.C. Fixer" for the political elite, then Dimitri Alperovitch is the "Cyber-Fixer" for the Deep State. Whether it's Russian, Korean, or Chinese "hacking" in American, it is always Dmitri who is the only expert the Deep State calls on to quickly examine the evidence and then hide or destroy it.

Also discussed at length is connection between the Ukrainian Atlantic Council to the DNC, Clintons, NATO, Evelyn Farkas, George Soros, and the globalist gangsters . The anti-Russian propaganda of NATO's Cold War machine (Atlantic Council) used Dmitri Alperovitch's Crowdstrike to disrupt the U. S. Presidential election and Ukrainian/Russian relations. Additional resources to support the audio discussion are:

Why Crowdstrike's Russian Hacking Story Fell Apart- Say Hello to Fancy Bear

.

Why Crowdstrike's Russian Hacking Story Fell Apart 2 The DNI Report Faked Sources

.

Ukraine Tried to Tip the Election in Clinton's Favor

.

What is CrowdStrike? Firm Hired by DNC has Ties to Hillary Clinton, a Ukrainian Billionaire and Google

.

The official Director of National Intelligence Agency report on Russian hacking (meddling) in the U. S. presidential election is hyperlinked below – thirteen pages of a big "nothing burger" that does not have a single piece of evidence. This is an embarrassing waste of U.S. taxpayer dollars. .

Note that the entire "evidence" on Russian hacking of the DNC server is one paragraph containing zero evidence.
Background to "Assessing Russian Activities and Intentions
in Recent US Elections": The Analytic Process and Cyber
Incident Attribution

Another fake intelligence report claims to describe how Dmitri Alperovitch's Cozy Bear and Fancy Bear work in cyberspace. This report is another sad, expensive report that is nothing more than a disinformation piece produced and published by two U.S. intelligence agencies – the FBI and Department of Homeland Security – to propagandize Americans. What the report actually describes is well-known and freely available Ukrainian malware that is old and has nothing to do with Russia.

GRIZZLY STEPPE – Russian Malicious Cyber Activity

The report does not prove that Russia hacked the 2016 U.S. election, but it does reveal that the PHP malware sample that the government provided from the CrowdStrike report is:

Wordfence (cyber analysis company) analyzed the IP addresses available in the declassified report and demonstrated that they are in 61 countries, belong to over 380 organizations and many of those organizations are well known website hosting providers from where many attacks originate. There is nothing in the IP data that points to Russia specifically.

Furthermore, the report claims to contain technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence services to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities.

If you read this report, remember that it is propaganda, and the authors assume that you know nothing about anything and count on you "believing" multiple U.S. intelligence agencies who really work for the Deep State and not the American people.

[Nov 30, 2019] Beyond The DNC - Leaks, Hacks, and Treason by George Eliason George Eliason

Notable quotes:
"... This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney, the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best. ..."
Nov 30, 2019 | www.mintpressnews.com

Here's what's different in the information I've compiled.

At the same time this story developed, it overshadowed the Hillary Clinton email scandal. It is a matter of public record that Team Clinton provided the DNC hackers with passwords to State Department servers on at least 2 occasions, one wittingly and one not. I have already clearly shown the Fancy Bear hackers are Ukrainian Intelligence Operators.

This gives some credence to the Seth Rich leak (DNC leak story) as an act of patriotism. If the leak came through Seth Rich, it may have been because he saw foreign Intel operatives given this access from the presumed winners of the 2016 US presidential election. No political operative is going to argue with the presumed president-elect over foreign policy. The leaker may have been trying to do something about it. I'm curious what information Wikileaks might have.

The real crime of the DNC hack wasn't the hack.

If only half of the following proved true in context and it's a matter of public record, that makes the argument to stop funding for Ukraine immediately barring an investigation of high crimes by Ukrainian Diaspora, Democrat, and Republican leaders in Congress, private Intel for hire, and Ukrainian Intel's attacks on the US government and political processes.

Perhaps it's time Donald J. Trump @realDonaldTrump should consider treason investigations across the board. Make America great again by bringing justice and civility back.

DNC Hack – High Crimes or Misdemeanors?

So what went on at the DNC way back in 2016? Do you know? Was it a hack or a leak? Does it matter?

Recently, an investigative journalist who writes under the name Adam Carter was raked over the coals. Carter writes at Disobedient Media and has been providing a lot of evidence supporting the DNC leak story former Ambassador Craig Murray and Wikileaks claim happened.

When the smear article came out and apparently it's blossoming into a campaign, a few people that read both of us wrote to the effect "looks like your work is the only thing left standing." I immediately rebuffed the idea and said Carter's work stands on its own . It has nothing to do with anything I've written, researched, or plan to.

I'd say the same about Scott Humor , Lee Stranahan , Garland Nixon , Petri Krohn , or Steve McIntyre . And there are many others. There has been a lot of good work on the DNC hacks and 2016 election interference. Oftentimes, what looks like contradictory information is complimentary because what each journalist is working on shows the story from a different angle.

https://www.youtube-nocookie.com/embed/q9W3QsO75mM?rel=0&showinfo=0

There are a lot of moving parts to the story and even a small change in focus brings an entirely new story because it comes from a different direction.

Here's what I mean. If the DNC hack was really a leak, does that kill the "hack" story? No, it doesn't and I blame a lot of activist journalists for making the assumption that it has to work this way. If Seth Rich gave Ambassador Craig Murray a USB stick with all the "hacked info," it doesn't change an iota of what I've written and the evidence you are about to read stands on its own. But, this has divided people into camps before the whole situation could be scrutinized and that's still not done yet.

If for example you have a leak on Jan 5th , can you have "a hack" on Jan 6th , 7th, or 8th? Since there is so much crap surrounding the supposed hack such as law enforcement teams never examining the DNC server or maintaining control of it as evidence, could the hacks have been a cover-up?

Hang em' High

According to Obama the hacks continued until September 2016. According to ABC, Donna Brazile says the hacks didn't stop until after the elections in 2016. According to Crowdstrike the hacks continued into November.

Democratic National Committee Chair Donna Brazile said Russian hackers persisted in trying to break into the organization's computers "daily, hourly" until after the election -- contradicting President Obama's assertion that the hacking stopped in September after he warned Russian President Vladimir Putin to "cut it out."-ABC

This time frame gives a lot of latitude to both hacks and leaks happening on that server and still agrees with the Veteran Intelligence Professionals for Sanity (VIPs). According to Bill Binney, the former Technical Director for the NSA, the only way that data could move off the server that fast was through a download to a USB stick. The transfer rate of the file does not agree with a Guciffer 2.0 hack and the information surrounding Guciffer 2.0 is looking ridiculous and impossible at best.

https://www.youtube-nocookie.com/embed/L3cDZU9Tp7w?rel=0&showinfo=0

The DNC fiasco isn't that important of a crime. The reason I say this is the FBI would have taken control over material evidence right away. No law enforcement agency or Intel agency ever did. This means none of them considered it a crime Comey should have any part of investigating. That by itself presents the one question mark which destroys any hope Mueller has proving law enforcement maintained a chain of custody for any evidence he introduces.

It also says the US government under Barrack Obama and the victimized DNC saw this as a purely political event. They didn't want this prosecuted or they didn't think it was prosecutable.

Once proven it shows a degree of criminality that makes treason almost too light a charge in federal court. Rest assured this isn't a partisan accusation. Team Clinton and the DNC gets the spotlight but there are Republicans involved.

Identifying Team Fancy Bear

There are a couple of caveats that need to be made when identifying the Fancy Bear hackers . The first is the identifier used by Mueller as Russian FSB and GRU may have been true- 10 years ago. This group was on the run trying to stay a step ahead of Russian law enforcement until October 2016. So we have part of the Fancy bear hacking group identified as Ruskie traitors and possibly former Russian state security. The majority of the group are Ukrainians making up Ukraine's Cyber Warfare groups.

Identifying the hackers as FSB or GRU today is as helpful and has the same validity as identifying Special Prosecutor Mueller as a cashier at McDonalds because he worked there during school. It's insulting and self-defeating, so stop it.

How Mueller is Making a Russian Attribution for the DNC Hackers

If you look at the attribution section for the Tallinn Manual 2.0 on the International Law Applicable to Cyber and specifically the section that deals with peacetime attributions of a non-state actor/ hacker we have an answer.

The hackers, OSINT, Cyber, spies, terrorists, etc call themselves volunteers to keep safe from State level retaliation, even though a child can follow the money. As volunteers motivated by politics and patriotism they are protected to a degree from retribution.

They don't claim State sponsorship or governance and the level of attack falls below the threshold of military action. Mueller has a lot of latitude for making the attribution Russian, even though the attacks came from Ukrainian Intel. Based on how the rules are written, because the few members of the coalition from Shaltai Boltai are Russian in nationality, Fancy Bear can be attributed as a Russian entity for the purposes of retribution. The caveat is if the attribution is proven wrong, the US will be liable for damages caused to the State which in this case is Russia.

How large is the Fancy Bear unit? According to their propaganda section InformNapalm, they have the ability to research and work in over 30 different languages.

This can be considered an Information Operation against the people of the United States and of course Russia. We'll get to why shortly.

After 2013, Shaltay Boltay was no longer physically available to work for Russia . The Russian hackers were in Ukraine working for the Ukrainian government's Information Ministry which is in charge of the cyber war. They were in Ukraine until October 2016 when they were tricked to return to Moscow and promptly arrested for treason.

From all this information we know the Russian component of Team Fancy Bear is Shaltai Boltai. We know the Ukrainian Intel component is called CyberHunta and Ukraine Cyber Alliance which includes the hacker group RUH8. We know both groups work/ worked for Ukrainian Intelligence. We know they are grouped with InformNapalm which is Ukraine's OSINT unit. We know their manager is a Ukrainian named Kristina Dobrovolska. And lastly, all of the above work directly with the Atlantic Council and Crowdstrike's Dimitry Alperovich.

In short, the Russian-Ukrainian partnership that became Fancy Bear started in late 2013 to very early 2014 and ended in October 2016 in what appears to be a squabble over the alleged data from the Surkov leak.

But during 2014,2015, and 2016 Shaltai Boltai, the Ukrainian Cyber Alliance, and CyberHunta went to work for the DNC as opposition researchers.

The First Time Shaltai Boltai was Handed the Keys to US Gov Servers

The setup to this happened long before the partnership with Ukrainian Intel hackers and Russia's Shaltai Boltai was forged. The hack that gained access to US top-secret servers happened just after the partnership was cemented after Euro-Maidan.

In August 2009 Hillary Clinton's Deputy Chief of Staff at the State Department Huma Abedin sent the passwords to her Government laptop to her Yahoo mail account. On August 16, 2010, Abedin received an email titled "Re: Your yahoo account. We can see where this is going, can't we?

"After Abedin sent an unspecified number of sensitive emails to her Yahoo account, half a billion Yahoo accounts were hacked by Russian cybersecurity expert and Russian intelligence agent, Igor Sushchin, in 2014. The hack, one of the largest in history, allowed Sushchin's associates to access email accounts into 2015 and 2016."

Igor Sushchin was part of the Shaltai Boltai hacking group that is charged with the Yahoo hack.

The time frame has to be noted. The hack happened in 2014. Access to the email accounts continued through 2016. The Ukrainian Intel partnership was already blossoming and Shaltai Boltai was working from Kiev, Ukraine.

So when we look at the INFRASTRUCTURE HACKS, WHITE HOUSE HACKS, CONGRESS, start with looking at the time frame. Ukraine had the keys already in hand in 2014.

The DNC's Team Fancy Bear

The "Fancy Bear hackers" may have been given the passwords to get into the servers at the DNC because they were part of the Team Clinton opposition research team. It was part of their job. Let that concept settle in for a moment.

According to Politico "In an interview this month, Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists , government officials and private intelligence operatives . While her consulting work at the DNC this past election cycle centered on mobilizing ethnic communities -- including Ukrainian-Americans -- she said that, when Trump's unlikely presidential campaign began surging in late 2015, she began focusing more on the research, and expanded it to include Trump's ties to Russia, as well ."

me title=

The only investigative journalists, government officials, and private intelligence operatives that work together in 2014-2015-2016 Ukraine are Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and the Ministry of Information.

All of these hacking and information operation groups work for Andrea Chalupa with EuroMaidanPR and Irena Chalupa at the Atlantic Council . Both C halupa sisters work directly with the Ukrainian government's Intel and propaganda arms.

Since 2014 in Ukraine, these are the only OSINT, hacking, Intel, espionage, terrorist, counter-terrorism, cyber, propaganda, and info war channels officially recognized and directed by Ukraine's Information Ministry. Along with their American colleagues, they populate the hit-for-hire website Myrotvorets with people who stand against Ukraine's criminal activities.

Alexandra Chalupa hired this particular hacking terrorist group called Fancy Bear by Dimitry Alperovich and Crowdstrike at the latest in 2015. While the Ukrainian hackers worked for the DNC, Fancy Bear had to send in progress reports, turn in research, and communicate on the state of the projects they were working on. Let's face it, once you're in, setting up your Fancy Bear toolkit doesn't get any easier. This is why I said the DNC hack isn't the big crime. It's a big con and all the parties were in on it.

Indict Team Clinton for the DNC Hacks and RNC Hack

Hillary Clinton exposed secrets to hacking threats by using private email instead of secured servers. Given the information provided she was probably being monitored by our intrepid Ruskie-Ukie union made in hell hackers. Anthony Weiner exposed himself and his wife Huma Abedin using Weiner's computer for top-secret State Department emails. And of course Huma Abedin exposed herself along with her top-secret passwords at Yahoo and it looks like the hackers the DNC hired to do opposition research hacked her.

Here's a question. Did Huma Abedin have Hillary Clinton's passwords for her private email server? It would seem logical given her position with Clinton at the State Department and afterward. This means that Hillary Clinton and the US government top secret servers were most likely compromised by Fancy Bear before the DNC and Team Clinton hired them by using legitimate passwords.

The RNC Hack

According to the Washington Post , "Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach."

In January 2017 , criminal proceedings started for Edward Nedelyaev under articles 335 'spying' and 343

'inciting hatred or enmity." He was a member of the Aidar battalion. Aidar members have been cited for torture and murder. Although the translation isn't available on the linked video the MGB (LNR equivalent to the FBI) ask Aidar's Nedelyaev about his relationship with Ukraine's SBU. The SBU asked him to hack US presidential candidate Donald Trump's election headquarters and he refused. Asked if this was through convictions, he says no, explaining that he is not a hacker. The video was published on January 10, 2017 .

Taken at face value it really does show the ineptness of the SBU after 2014. This is why Ukraine relied (s) on the Diaspora financed Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, RUH8, Bellingcat, Webradius, InformNapalm and associated parties.

The Ukrainians were hired to get the goods on Trump. Part of that is knowing where to start isn't it?

Fancy Bear's Second Chance at Top Secret Passwords From Team Clinton

How stupid would the Fancy Bear teams of Shaltai Boltai, CyberHunta, Ukrainian Cyber Alliance, and RUH8 be if they had access to the DNC servers which makes it easier to get into the US State servers and not do that if it was their goal?

One very successful method of hacking is called social engineering. You gain access to the office space and any related properties and physically locate the passwords or clues to get you into the hardware you want to hack. This includes something as simple as looking over the shoulder of the person typing in passwords.

Let's be clear. The Fancy Bear hackers were hired by Alexandra Chalupa to work for DNC opposition research. On different occasions, Fancy Bear handler Kristina Dobrovolska traveled to the US to meet the Diaspora leaders, her boss Alexandra Chalupa, Irena Chalupa, Andrea Chalupa, US Dept of State personnel, and most likely Crowdstrike's Dimitry Alperovich. Alperovich was working with the hackers in 2015-16. In 2016, the only groups known to have Fancy Bear's signature tools called X-tunnel and X-Agent were Alperovich, Crowdstrike, and Fancy Bear (Shaltai Boltai, CyberHunta, Ukraine Cyber Alliance, and RUH8/RUX8. Yes, that does explain a few things.

Here is where it goes from bad to outright Fancy Bear ugly. Hillary Clinton retained State Dept. top secret clearance passwords for 6 of her former staff for research purposes from 2013 through prepping for the 2016 election. Were any foreigners part of the opposition research team for Team Hillary in 2014-2015-2016? The Clinton's don't have a history of vetting security issues well.

Let's recap. Clinton keeps 6 top secret passwords for research staff. Alexandra Chalupa is running a research department that is rich in (foreign) Ukrainian Intelligence operatives, hackers, terrorists, and a couple Ruskie traitors.

Kristina Dobrovolska was acting as a handler and translator for the US State Department in 2016. She is the Fancy Bear *opposition researcher handler manager. Kristina goes to Washington to meet with Chalupa.

Alexandra types in her password to show Dobrovolska something she found and her eager to please Ukrainian apprentice finds the keystrokes are seared into her memory. She tells the Fancy Bear crew about it and they immediately get to work looking for Trump material on the US secret servers with legitimate access. I mean, what else could they do with this? Turn over sensitive information to the ever corrupt Ukrainian government?

According to the Politico article , Alexandra Chalupa was meeting with the Ukrainian embassy in June of 2016 to discuss getting more help sticking it to candidate Trump. At the same time she was meeting, the embassy had a reception that highlighted female Ukrainian leaders.

Four Verkhovna Rada deputies there for the event included: Viktoriia Y. Ptashnyk, Anna A. Romanova, Alyona I. Shkrum, and Taras T. Pastukh.

According to CNN, DNC sources said Chalupa told DNC operatives the Ukrainian government would be willing to deliver damaging information against Trump's campaign . Later, Chalupa would lead the charge to try to unseat president-elect Trump starting on Nov 10, 2016.

Accompanying them Kristina Dobrovolska who was a U.S. Embassy-assigned government liaison and translator who escorted the delegates from Kyiv during their visits to Albany and Washington.

Kristina Dobrovolska is the handler manager working with Ukraine's DNC Fancy Bear Hackers . She took the Rada members to dinner to meet Joel Harding who designed Ukraine's infamous Information Policy which opened up their kill-for-hire-website Myrotvorets. Then she took them to meet the Ukrainian Diaspora leader doing the hiring. Nestor Paslawsky is the surviving nephew to the infamous torturer The WWII OUNb leader, Mykola Lebed.

The Podesta Hack – Don't Mess with OUNb Parkhomenko

I have no interest in reviewing his history except for a few points. Adam Parkhomenko, a Diaspora Ukrainian nationalist almost gained a position in the presumed Clinton White House. As a Ukrainian nationalist, his first loyalty, like any other Ukrainian nationalist, is to a fascist model of Ukraine which Stepan Bandera devised but with a win it would be in America.

During the 2016 primaries, it was Parkhomenko who accused Bernie Sanders of working for Vladimir Putin. Parkhomenko has never really had a job outside the Clinton campaign.

Adam Parkhomenko <img src="https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11.png" alt="Adam Parkhomenko" width="355" height="454" srcset="https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11.png 355w, https://www.mintpressnews.com/wp-content/uploads/2018/08/PARKHOMENKO-twitter.com-2018.08.14-04-34-11-235x300.png 235w" sizes="(max-width: 355px) 100vw, 355px" /> Before Clinton declared her candidacy, Parkhomenko started a PAC for Hillary Clinton with the goal of getting millions of people email lists so the support was ready for a Clinton run. After she declared her candidacy, Robby Mook, Hillary's campaign manager decided to sideline Parkhomenko and didn't take on his full staff as promised. He reduced Parkomenko to a quiet menial position when he was brought onboard.

Ultimately, Podesta became responsible for this because he gave Parkhomenko assurances that his staff would be brought on and there would be no gaps in their paycheck. Many of them including Parkhomenko's family moved to Brooklyn. And of course, that didn't happen. Podesta was hacked in March and the Ukrainian nationalist Adam Parkhomenko was hired April 1st .

Today, Parkhomenko is working as a #DigitalSherlock with the Atlantic Council along with the Fancy Bear hackers and many of the people associated with them. Why could this be a revenge hack?

The Ukrainian Intel hackers are Pravy Sektor Ukrainian nationalists. Alexandra Chalupa is also an OUNb Bandera Ukrainian nationalist. This Ukrainian nationalist was on his way to becoming one of the most powerful people in America. That's why.

The DNC Leak- A Patriotic Act

At the same time her aides were creating "loyalty scores ", Clinton, "instructed a trusted aide to access the campaign's server and download the messages sent and received by top staffers. She believed her campaign had failed her -- not the other way around -- and she wanted 'to see who was talking to who, who was leaking to who.2'" After personally reading the email correspondence of her staffers, she called them into interviews for the 2016 campaign, where she confronted them with some of the revelations."-

Forget about the DNC. The hackers may have spent months surfing the US secret servers downloading and delivering top secret diplomatic files to their own government. The people entrusted with this weren't just sloppy with security, this is beyond treason.

It doesn't matter if it was Seth Rich, though I hope it was ( for identification's sake), who downloaded data from the DNC servers. The reasons supporting a leak are described by the Veteran Intelligence Professionals for Sanity (VIPS). This shows clearly why the leak to Wikileaks is much more plausible than a hack for the files taken in what is commonly called the DNC hack. This leak was one "hack" of many that was going on.

Imagine being this person inside the situations described above with the reality hitting you that things were very wrong. Even if they only saw parts of it, how much is too much? US government secrets were being accessed and we know this because the passwords were given out to the research teams the hackers were on.

It is very possible that giving the files to Wikileaks was the only safe way to be a whistleblower with a Democrat president supporting Team Hillary even as Team Hillary was cannibalizing itself. For detail on how the leak happened, refer to Adam Carter at DisobedientMedia.com and the VIPS themselves.

Today, this isn't a Democrat problem. It could just as easily been an establishment Republican.

Ukraine needs to pay for what their Intel Operators/ hackers have done. Stop funding Ukraine other than verifiable humanitarian aid. Call your Congressional Rep.

Next up – We are going to look at who has oversight over this operation and who's footing the bills.

Over the last 4 years, I've researched and written many stories that are still breaking in media today. Over the past 7 months we:

If you want to support investigative research with a lot of depth, please support my Patreon page. You can also support my work through PayPal as we expand in new directions over the coming year. For the last 4 years, it's been almost entirely self-supportive effort which is something when you consider I live in Donbass.

Top Photo | Former Democratic National Committee chair Donna Brazile holds a copy of her book Hacks, detailing the hacking of the DNC, during a meeting of The Commonwealth Club, Nov. 9, 2017, in San Francisco. Marcio Jose Sanchez | AP

George Eliason is an American journalist that lives and works in Donbass. He has been interviewed by and provided analysis for RT, the BBC, and Press-TV. His articles have been published in the Security Assistance Monitor, Washingtons Blog, OpedNews, the Saker, RT, Global Research, and RINF, and the Greanville Post among others. He has been cited and republished by various academic blogs including Defending History, Michael Hudson, SWEDHR, Counterpunch, the Justice Integrity Project, among others.

Republish our stories! MintPress News is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 International License.

[Nov 28, 2019] Guccifer 2.0 certainly didn't make a genuine effort to "conceal a Russian identity," far from it

Nov 28, 2019 | www.reddit.com

Posted by u/PropagandaBot1 1 day ago

Guccifer 2.0 certainly didn't make a genuine effort to "conceal a Russian identity," far from it.

The persona made decisions that would leave behind a demonstrable trail of Russian-themed breadcrumbs, examples include: US politics (domestic)

PropagandaBot1 -1 points · 1 day ago

http://www.softpanorama.org/Skeptics/Political_skeptic/Neocons/Hillary/guccifer20_false_flag_operation.shtml

[Nov 22, 2019] CROWDSTRIKE's role in the Democrat impeachment smokescreen needs to keep moving forward because, it is not going away.

Highly recommended!
Nov 22, 2019 | turcopolier.typepad.com

Factotum , 17 November 2019 at 05:40 PM

Just as important, where is the proof the Russians hacked the DNC computers (hat tip always to LJ) - since Roger Stone was banned from getting this information by the judge who just sent him away for life.

CROWDSTRIKE's role in the Democrat impeachment smokescreen needs to keep moving forward because, it is not going away. Democrats refusal to even mention it, let alone their obsession trying to relentless label nameless CROWDSTRIKE as a loony, right wing conspiracy theory simply does not pass the smell test.

Particularly since Schiff does his very best to deep six even mention of Trump's requested Ukraine CROWDSTRIKE investigation. https://illicitinfo.com/?p=13576

Deep state CROWDSTRIKE collusion is starting to walk like a duck, quack like a duck and look like a duck.

[Nov 11, 2019] I Caught The Swamp - CrowdStrike Server, DNC-NATO Blackberries, OCONUS Lures

An interesting video. Was Crowdstrike server in Ukraine used to perform false flag attack on DNC which they later attributed to Russia ?
Nov 11, 2019 | www.youtube.com

Someone Unknown , 27 minutes ago

Think Adam Schiff will have the courage to hang himself?

Davida G , 24 minutes ago

Thank you George , may the right ears be listening to your very informed words. Blessings from Europe 🙏🙏🙏

Madam Mortified , 25 minutes ago

I am so glad you came up on my feed...it's been a few years. Thanks for the findings.

Eli Redshirt , 8 minutes ago

Thank you sir!

Sharon Seal , 17 minutes ago (edited) div tabindex="0" role="

article"> Ellen Ratner (sister of Bruce) was allegedly involved in some of this. Here is what I have, mostly from the Butowsky lawsuit that was filed. Most interesting in this data is the fact that Ellen Ratner met with Assange for 6 hours after a return flight from Berlin. May 11 Wikileaks lawyer Michael Ratner died of cancer He had a sister Ellen Ratner, a news analyst for Fox News and the White House correspondent for Talk Media News. Aug 26 2016 Ellen Ratner interview on Tom Hartmann. During their discussion Ellen shares news she has heard regarding Julian Assange and his threats of releasing hacked data that will send Hillary Clinton to prison (data that was either obtained by Russian hacker groups or DNC staffer Seth Rich - who HRC had murdered for his betrayal). "Julian Assange is saying he's going to do a new leak from WikiLeaks. Now, I have to tell you something, my brother Michael was Julian Assange's attorney before he died (that's before Michael died, Julian Assange is still alive)... and a lot of people think that what Julian Assange is actually doing is, he has made a bet that he's going to do better under Trump than Hillary Clinton, so he's going after Hillary Clinton." Nov 5 2016 Butowsky Lawsuit: "Mr. Butowsky stumbled into the RCH crosshairs after Ellen Ratner, a news analyst for Fox News and the White House correspondent for Talk Media News, contacted him in the Fall of 2016 about a meeting she had with Mr. Assange. Ms. Ratner's brother, the late Michael Ratner, was an attorney who had represented Mr. Assange. According to Ms. Ratner, she made a stop in London during a return flight from Berlin, and she met with Mr. Assange for approximately six hours in the Ecuadorean embassy. Ms. Ratner said Mr. Assange told her that Seth Rich and his brother, Aaron, were responsible for releasing the DNC emails to Wikileaks. Ms. Ratner said Mr. Assange wanted the information relayed to Seth's parents, as it might explain the motive for Seth's murder." Dec 17 2016 Butowsky Lawsuit: "On December 17, 2016, at the instigation of Ms. Ratner, Mr. Butowsky finally contacted Joel and Mary Rich, the parents of Seth, and he relayed the information about Ms. Ratner's meeting with Mr. Assange. During that conversation, Mr. Rich told Mr. Butowsky that he already knew that his sons were involved in the DNC email leak, but he and his wife just wanted to know who murdered Seth. Mr. Rich said he was reluctant to go public with Seth's and Aaron's role in leaking the emails because "we don't want anyone to think our sons were responsible for getting Trump elected." Mr. Rich said he did not have enough money to hire a private investigator, so Mr. Butowsky offered to pay for one. Mr. Rich accepted the offer and thanked Mr. Butowsky in an email. Dec 29 2016 Butowsky Lawsuit: On December 29, 2016 at 1:51 p.m., Mr. Butowsky sent an email to Ms. Ratner from his iPad: "If the person you met with truly said what he did, is their [sic] a reason you we aren't reporting it ?" At 3:48 p.m. that afternoon, Ms. Ratner responded as follows: "because--- it was a family meeting---- I would have to get his permission-- will ask his new lawyer, my sister-in-law."

JustAnotherPaddy , 1 minute ago div tabindex="0" role="articl

e"> Go to Quantico and learn how to glow. And this term 'OCONUS lures'...that just burns me. These terms they use to attempt to sterilize and normalize something that is absolutely Pimping and trafficking by design. How can this legitimately be FBI and DoJ policy? You're bringing women into the country to sex up and spy on schmucks for blackmail, profit and control. Words mean things. It's like government 'Authorities' at all levels of gov calling us 'civilians'? Think about that. A local cop, who is a citizen, calling you a civilian. Like you are collateral meat in a war zone. You and the officer - are citizens of this country. That word was inserted to separate you from your rights here. It changes the thought and perspective of you...and the officer. And they are not the nebulous 'Authorities'! They are public servants lent certain limited powers and all the responsibility that comes with it. Rant off, but it just bothers me...this double speak. Words mean things and using woman for 'operations' isn't ok at all. The people that fall for them? Just amazing dumb. As an adult, you should have formed so idea of the people you can reasonably attract. If some 11 rated super model rolls up to you in a bar and you've been mostly dating 5-7 range people, know that there's a reason your punching above your weight class. Your a target. If it's too good to be true, it absolutely is. Lures are drawing a check from our government for sex. What do we call that downtown? This should be prosecuted...and stopped.

Jean Burk , 16 minutes ago (edited)

Seth Rich was the source of the thumb drive(s). So I guess we have to disagree. Otherwise why was he killed? WHY would Podesta say to make an example of whoever got into the emails? Maybe Seth complained, went to (Donna? Debbie W-S?) about the cheating of Bernie Sanders. I don't believe a thing Mueller says. Kamphuis would know. Why was he killed?

[Nov 09, 2019] The Media's Obsession With Personalities Consortiumnews

Notable quotes:
"... Earlier in Stone's legal process his lawyers filed a motion to try to prove that Russia did not hack the DNC and Podesta emails. The motion revealed that CrowdStrike, the cybersecurity firm hired by the DNC and Clinton campaign, never completed its report, and only gave a redacted draft to the FBI blaming Russia. The FBI was never allowed to examine the DNC server itself. ..."
"... Faced now with a criminal investigation into how the Russiagate conspiracy theory originated intelligence officers and their accomplices in the media and in the Democratic Party are mounting a defense by launching an offensive in the form of impeachment proceedings against Trump that is based on an allegation of conducting routine, corrupt U.S. foreign policy. ..."
"... Consortium News ..."
Nov 09, 2019 | consortiumnews.com

Earlier in Stone's legal process his lawyers filed a motion to try to prove that Russia did not hack the DNC and Podesta emails. The motion revealed that CrowdStrike, the cybersecurity firm hired by the DNC and Clinton campaign, never completed its report, and only gave a redacted draft to the FBI blaming Russia. The FBI was never allowed to examine the DNC server itself.

In the end, though, it doesn't matter if it were a hack or a leak by an insider. That's because the emails WikiLeaks released were accurate. When documents check out it is irrelevant who the source is. That's why WikiLeaks set up an anonymous drop box, copied by big media like The Wall Street Journal and others . Had the emails been counterfeit and disinformation was inserted into a U.S. election by a foreign power that would be sabotage. But that is not what happened.

The attempt to stir up the thoroughly discredited charge of collusion appears to be part of the defense strategy of those whose reputations were thoroughly discredited by maniacally pushing that false charge for more than two years. This includes legions of journalists. But principal among them are intelligence agency officials who laundered this "collusion" disinformation campaign through the mainstream media.

Faced now with a criminal investigation into how the Russiagate conspiracy theory originated intelligence officers and their accomplices in the media and in the Democratic Party are mounting a defense by launching an offensive in the form of impeachment proceedings against Trump that is based on an allegation of conducting routine, corrupt U.S. foreign policy.

Stone may be just a footnote to this historic partisan battle that may scar the nation for a generation. But he has the personality to be the poster boy for the Democrats' lost cause.

Joe Lauria is editor-in-chief of Consortium News and a former correspondent for T he Wall Street Journal, Boston Globe , Sunday Times of London and numerous other newspapers. He can be reached at [email protected] and followed on Twitter @unjoe .

[Nov 03, 2019] Little mentioned is the server in Ukraine which was brought up in the phone call. Barr's investigation has become a criminal investigation and interested in a server in Ukraine. The impeachment farce is trying to put the focus on Biden, but the server may be what they are trying to protect

Nov 03, 2019 | www.moonofalabama.org

Peter AU 1 , Nov 2 2019 1:00 utc | 82

Petri Krohn's comment @37 "ERIC CIARAMELLA IS NOT A WHISTLEBLOWER - HE IS A SUSPECT"

Little mentioned is the server in Ukraine which was brought up in the phone call. Barr's investigation has become a criminal investigation and interested in a server in Ukraine.

The impeachment farce is trying to put the focus on Biden, but the server may be what they are trying to protect.

This impeachment show looks to be a rearguard or defensive action to try and stop the Barr criminal investigation into russiagate.

[Oct 27, 2019] Biden's Intervention In Ukraine And Ukraine's 2016 Election Meddling Are Matters of Fact

Notable quotes:
"... On February 2 Shokin confiscated four large houses Zlochevsky owned plus a Rolls-Royce Phantom and a "Knott 924-5014 trainer". (Anyone know what that is?) Ten days later Biden goes into overdrive to get him fired. Within one week he personally calls Poroshenko three times with only one major aim: to get Shokin fired. ..."
"... Zlochevsky had hired Joe Biden's son Hunter for at least $50,000 per month. In 2015 Shokin started to investigate him in two cases. During the fall of 2015 Joe Biden's team begins to lobby against him. On February 2 Shokin seizes Zlochevsky's houses. Shortly afterwards the Biden camp goes berserk with Biden himself making nearly daily phonecalls. Shokin goes on vacation while Poroshenko (falsely) claims that he resigned. When Shokin comes back into office Biden again takes to the phone. A week later Shokin is out. ..."
"... Biden got the new prosecutor general he wanted. The new guy made a bit of show and then closed the case against Zlochevsky. ..."
"... Is the "conspiracy theory" about Ukrainian interference in the U.S. election really "debunked"? It is, of course, not. The facts show that the interference happened. It was requested by the Democratic National Committee and was willingly provided by Ukrainian officials. ..."
"... Ukrainian government officials tried to help Hillary Clinton and undermine Trump by publicly questioning his fitness for office. They also disseminated documents implicating a top Trump aide in corruption and suggested they were investigating the matter, only to back away after the election. And they helped Clinton's allies research damaging information on Trump and his advisers, a Politico investigation found. ..."
"... A Ukrainian-American operative who was consulting for the Democratic National Committee met with top officials in the Ukrainian Embassy in Washington in an effort to expose ties between Trump, top campaign aide Paul Manafort and Russia , according to people with direct knowledge of the situation. ..."
"... In March 2016 Chalupa went to the Ukrainian embassy in Washington DC and requested help from the Ukrainian ambassador to go after Trump's campaign manager Paul Manafort. In August 2016 the Ukrainians delivered a secret "black ledger" that allegedly showed that Manafort had illegally received money for his previous work for the campaign of the former Ukrainian president Yanukovych. ..."
"... Serhin A. Leshchenko, the member of the Ukrainian parliament who published the dubious ledger, was rabidly anti-Trump. Shortly after providing the "secret ledger" he talked with the Financial Times and promised to continue to meddle in the U.S. election. The FT headline emphasized the fact: ..."
"... insisting on innocence of Biden will have a political cost. ..."
"... That term "conspiracy theory" has been so widely abused that, to me at least, it now means something that the author wishes were not true but almost certainly is. ..."
"... Joe Biden needs to STFU, and go away. He and his ilk are part of the problem, not the solution. The rulers of America insist on pushing this sycophant for the empire down our throats. And, he can take HRC and her crowd with him. It's high time for some new blood, IF, TPTB, will even allow that to happen, which I very much doubt.... ..."
"... If you were referring to Trump's convo with Zelensky specifically, reasonable people might disagree over whether that was an abuse of power or sleazy and dumb (in being unnecessary)--which of course shouldn't mean the Bidens get a pass here, which none of these young journalists are suggesting. ..."
"... Well, there you have it--proof that BigLie Media indeed specializes in publishing Big Lies that ought to reduce such outlets to the status of Tabloids. Of course, the media is free to lie all it wants within the limits of slander and libel, but most people don't like being lied to particularly over matters of importance. ..."
"... Larry Johnson has a piece at SST on a CIA task force set up to compromise Trump and prevent him becoming president. That Trump avoided all the traps set for him (even the Mueller investigation could pin nothing on Trump) and won the election says a bit for Trump ..."
"... Alexandra Chalupa's connection to the thinktank The Atlantic Council should be borne in mind in the developing discussion in the comments forum. Her sister Irena is or has been a non-resident Senior Fellow there. Irena Chalupa has also been a senior editor at Radio Free Europe/Radio Liberty. ..."
"... Also the founder and CEO of the Crowdstrike company in charge of cybersecurity for the DNC during the 2016 presidential election campaign was Dmitri Alperovich who is a Senior Fellow at The Atlantic Council. It was Crowdstrike who came up with the idea that Trump had to be under the Kremlin's thumb and from there the hysterical witch-hunt and associated actions known as Russiagate began. ..."
"... I'm surprised that at this point in time, Bellingcat has not been included in digging up "dirt" on Trump ..."
"... Lee Stranahan of Radio Sputnik has been reporting on Alexandra Chalupa's role for a number of years now. I hope he gets proper credit as this story comes out. ..."
"... It seems some corners are coming unglued if the ZH link below is any indication: https://www.zerohedge.com/political/fbi-entrapped-flynn-manipulated-evidence-clapper-allegedly-issued-kill-shot-order ..."
"... The take away quote from a Matt Taibbi twit "LOL. Barack Obama is going to love this interview his former DIA James Clapper just gave to CNN about the Durham probe: "It's frankly disconcerting to be investigated for having done... what we were told to do by the president of the United States." ..."
"... Prescient observation by Aaron Mate : "When CNN & MSNBC now cover the criminal inquiry into conduct of intel officials in Russia probe, they are literally covering their employees -- John Brennan (MSNBC); James Clapper, Andrew McCabe, James Baker (CNN). I avoid the term, but it's appropriate here: Deep State TV." ..."
"... The take away quote: "Joe Biden intervened at least two times on matters his son Hunter's firms was being paid to lobby on, according to government records reviewed by the Washington Examiner." ..."
"... Indeed, the guilty are hiding in plain sight. It appears sinister, and is, but I think its a positive development of late, as it would suggest that big media are scrambling to preserve the status quo by legitimising these deep state actors. ..."
"... Obama orchestrated the regime change operation in Ukraine. As we know from Wayne Madsen's little book, "The Manufacturing of a President", Obama has been a CIA asset since he was a suckling babe. To promote containment of the Russian menace, the US got in bed with Ukrainian fascists and successfully exploited political tensions in that country resulting in the removal of the duly elected Yanukovitch. A right wing billionaire then took the reigns and Putin orchestrated a referendum in Crimea in retaliation that resulted in its return to Russia. The Crimeans were and continue to be happy, happier than the rest of Ukrainians under Kiev neo-fascist free market exploitation. ..."
"... It is natural that neo-fascist Ukrainians would express their disapproval of Trump, who was making nice with Putin. No matter what his motives were, he was bucking US anti-Russian policy. I liked Trump at that time for this willingness to end a Cold War policy sponsored by the US military industrial complex. You can cal it "deep state" if you like. It's not deep and it's not a shadow government. It's the war party. It's the elite profiting from weapons manufacture. Trump has no principles except expedience and his pro-Russian stance is likely owing to the money laundering he's been doing for Russian criminals since he is such a lousy business man. ..."
"... The general charge against Trump is that he was "digging up dirt" on opponents. Well laddy-dah. So what. Welcome to Politics 101. ..."
"... Empires don't act on facts: they are all-powerful, so they sculpt reality as they see fit. What determines this is class struggle: the inner contradictions of a society that results in a given consensus, thus forming a hegemony. ..."
"... Again, not surprised at all. Pro-democratic/anti-Trump media write articles (obviously made-to-order) to whitewash already badly discredited Biden, and present all the arguments in favor of his dark connections with Ukraine as a kind of "conspiracy theory". This is a common practice. Not having sufficient competence to reasonably refute the arguments of opponents, MSM (as well as all sorts of "experts") immediately mark the position of opponents with "conspiracy theory" (there are also other options to choose from: "Putin's agent", "Putin's useful idiot", "Kremlin's agent", "pro-Russian propaganda", etc.). It is assumed that this makes unnecessary/optional (and even "toxic") all further conversations with the opponent (that is, there is no need to answer him, to prove something with facts, etc.), because his position is a "conspiracy theory". ..."
"... Western MSM are actively using this simplest propaganda technique of information warfare. For example, this was the case when reporting on events in Syria - those journalists, the media, experts who did not agree with the lie of MSM about Assad's use of the chemical weapons were declared "conspiracy theorists" (and also "Assad apologists"). This method was also used to cover "the Skripal case" - those who questioned the British authorities' version of the "Novichok poisoning" were declared "conspiracy theorists". ..."
"... This is the way the controlled media works. They provide half a story, half truths, straw-man facts, selective quotes and 'expert' comment, opinion and unwarranted assumption presented as fact that all together cover the spectrum from black to white, spread across the many titles. ..."
"... They also disseminate a fine dusting of lies and actual truth here and there. The result is the public have a dozen 'truths' to pick from, none of which are real, while the outright lies and actual truths get dismissed as not credible and the half-truths and straw-man truths appear to carry some validity. ..."
"... If Obama was CIA, and GW Bush was CIA (via daddy Bush), and Clinton was CIA (via Arkansas drug-running and the Presidency), and Bush Sr was CIA ... then what can we conclude about Trump? 1) he's also CIA, or 2) he's a willing stooge. ..."
"... as Caitlin Johnstone lets to say - who gets to decide what the narrative is here? i don't have an answer for this, but those who appear to be taking a side in all of this - including you with the quote i make - seem to think that it has to be the issue of trumps extortion of Ukraine, verses what appears to me the CIA - Dem party extortion of the ordinary USA persons mind... ..."
"... Has mccarthyism version 2 come to life since the advent of what happened in the Ukraine from 2014 onward?? is the issue of a new cold war with Russia been on the burner for at least 5 or more years here and began before trump was even considered a potential candidate for the republican party? did Russia take back Crimea, which wasn't supposed to happen? is this good for military industrial complex sales? and etc. etc. ..."
"... i am sure biden is small potatoes in the bigger picture here, but if taking a closer examination of what took place in ukraine leading into 2014, with the victoria nulands and geoffrey pyatts and etc. etc. of usa diplomatic corps, usa dept of state and etc. could lead to a better understanding of how the usa has went down the road it has for the past 60 years of foreign policy on the world stage, it would be a good start... so, to me - it ain't about trump.. it is about usa foreign policy and how it has sucked the big one on the world stage for at least since the time of vietnam when i was a teenager.. ..."
Oct 27, 2019 | www.moonofalabama.org

Several mainstream media have made claims that Joe Biden's intervention in the Ukraine and the Ukrainian interference in the U.S. election are "conspiracy theories" and "debunked". The public record proves them wrong. By ignoring or even contradicting the facts the media create an opening for Trump to rightfully accuse them of providing "fake news".

On October 04 a New Yorker piece, headlined The Invention of the Conspiracy Theory on Biden and Ukraine , asserted:

[In late 2018], Giuliani began speaking to current and former Ukrainian officials about the Biden conspiracy theory, and meeting with them repeatedly in New York and Europe. Among those officials was Viktor Shokin, a former top Ukrainian prosecutor who was sacked in March, 2016, after European and U.S. officials, including Joe Biden, complained that he was lax in curbing corruption. Shokin claimed that he had lost his powerful post not because of his poor performance but rather because Biden wanted to stop his investigation of Burisma, in order to protect his son. The facts didn't back this up. The Burisma investigation had been dormant under Shokin.

Several other media outlets also made the highlighted claim to debunk the "conspiracy theory". But is it correct?

We have looked into the claim that Shorkin's investigation against Burisma owner Zlochevsky was dormant, as the New Yorker says, and found it to be false :

The above accounts are incorrect. Shokin did go after Zlochevsky. He opened two cases against him in 2015. After he did that Biden and his crew started to lobby for his firing. Shokin was aggressively pursuing the case. He did so just before Biden's campaign against him went into a frenzy.
...
On February 2 Shokin confiscated four large houses Zlochevsky owned plus a Rolls-Royce Phantom and a "Knott 924-5014 trainer". (Anyone know what that is?) Ten days later Biden goes into overdrive to get him fired. Within one week he personally calls Poroshenko three times with only one major aim: to get Shokin fired.
...
Zlochevsky had hired Joe Biden's son Hunter for at least $50,000 per month. In 2015 Shokin started to investigate him in two cases. During the fall of 2015 Joe Biden's team begins to lobby against him. On February 2 Shokin seizes Zlochevsky's houses. Shortly afterwards the Biden camp goes berserk with Biden himself making nearly daily phonecalls. Shokin goes on vacation while Poroshenko (falsely) claims that he resigned. When Shokin comes back into office Biden again takes to the phone. A week later Shokin is out.

Biden got the new prosecutor general he wanted. The new guy made a bit of show and then closed the case against Zlochevsky.

It is quite astonishing that the false claims, that Shokin did not go after Burisma owner Zlochevsky, is repeated again and again despite the fact that the public record , in form of a report by Interfax-Ukraine , contradicts it.


bigger


On Thursday Buzzfeed News wrote about a different Ukrainian prosecutor who in early 2019 was approached to set up meetings with President Donald Trump's private lawyer Rudy Giuliani:

[Gyunduz] Mamedov's role was key. He was an intermediary in Giuliani's efforts to press Ukraine to open investigations into former vice president Joe Biden and the debunked conspiracy theory about the country's interference in the 2016 presidential election , a collaboration between BuzzFeed News, NBC News, and the Organized Crime and Corruption Reporting Project (OCCRP) can reveal.

The OCCRP is funded by the UK Foreign Office, the US State Dept, USAID, Omidyar Network, Soros' Open Society, the Rockefeller Brothers Fund and others. Most of these entities were involved in the 2014 coup against the elected government of the Ukraine.

Is the "conspiracy theory" about Ukrainian interference in the U.S. election really "debunked"? It is, of course, not. The facts show that the interference happened. It was requested by the Democratic National Committee and was willingly provided by Ukrainian officials.

As Politico reported shortly after Trump had won the election, it was the Democratic Party organization, the DNC, which had asked the Ukrainians for dirt that could be used against the campaign on Donald Trump:

Ukrainian government officials tried to help Hillary Clinton and undermine Trump by publicly questioning his fitness for office. They also disseminated documents implicating a top Trump aide in corruption and suggested they were investigating the matter, only to back away after the election. And they helped Clinton's allies research damaging information on Trump and his advisers, a Politico investigation found.

A Ukrainian-American operative who was consulting for the Democratic National Committee met with top officials in the Ukrainian Embassy in Washington in an effort to expose ties between Trump, top campaign aide Paul Manafort and Russia , according to people with direct knowledge of the situation.

The Ukrainian efforts had an impact in the race, helping to force Manafort's resignation and advancing the narrative that Trump's campaign was deeply connected to Ukraine's foe to the east, Russia.

The Ukrainian-American who was the go between the DNC and the government of Ukraine had earlier worked for the Clinton administration:

Manafort's work for Yanukovych caught the attention of a veteran Democratic operative named Alexandra Chalupa, who had worked in the White House Office of Public Liaison during the Clinton administration. Chalupa went on to work as a staffer, then as a consultant, for Democratic National Committee. The DNC paid her $412,000 from 2004 to June 2016, according to Federal Election Commission records, though she also was paid by other clients during that time, including Democratic campaigns and the DNC's arm for engaging expatriate Democrats around the world.

In March 2016 Chalupa went to the Ukrainian embassy in Washington DC and requested help from the Ukrainian ambassador to go after Trump's campaign manager Paul Manafort. In August 2016 the Ukrainians delivered a secret "black ledger" that allegedly showed that Manafort had illegally received money for his previous work for the campaign of the former Ukrainian president Yanukovych.

Handwritten ledgers show $12.7 million in undisclosed cash payments designated for Mr. Manafort from Mr. Yanukovych's pro-Russian political party from 2007 to 2012, according to Ukraine's newly formed National Anti-Corruption Bureau. Investigators assert that the disbursements were part of an illegal off-the-books system whose recipients also included election officials.

"Paul Manafort is among those names on the list of so-called 'black accounts of the Party of Regions,' which the detectives of the National Anti-Corruption Bureau of Ukraine are investigating," the statement said. "We emphasize that the presence of P. Manafort's name in the list does not mean that he actually got the money, because the signatures that appear in the column of recipients could belong to other people."

The provenance of the ledger is highly dubious. It was allegedly found in a burned out office of Yanukovych's old party:

The papers, known in Ukraine as the "black ledger," are a chicken-scratch of Cyrillic covering about 400 pages taken from books once kept in a third-floor room in the former Party of Regions headquarters on Lipskaya Street in Kiev.
...
The accounting records surfaced this year, when Serhiy A. Leshchenko, a member of Parliament who said he had received a partial copy from a source he did not identify, published line items covering six months of outlays in 2012 totaling $66 million. In an interview, Mr. Leshchenko said another source had provided the entire multiyear ledger to Viktor M. Trepak, a former deputy director of the domestic intelligence agency of Ukraine, the S.B.U., who passed it to the National Anti-Corruption Bureau.

Anti-corruption groups in Ukraine said the black ledger detailing payments was probably seized when protesters ransacked the Party of Regions headquarters in February 2014.

The pages from the ledger, which had come from anonymous sources probably supported by John Brennan's CIA , were never proven to be genuine. But the claims were strong enough to get Manafort fired as campaign manager for Donald Trump. He was later sentenced for unrelated cases of tax evasion.

Serhin A. Leshchenko, the member of the Ukrainian parliament who published the dubious ledger, was rabidly anti-Trump. Shortly after providing the "secret ledger" he talked with the Financial Times and promised to continue to meddle in the U.S. election. The FT headline emphasized the fact:

Ukraine's leaders campaign against 'pro-Putin' Trump ( screenshots ):

The prospect of Mr Trump, who has praised Ukraine's arch-enemy Vladimir Putin, becoming leader of the country's biggest ally has spurred not just Mr Leshchenko but Kiev's wider political leadership to do something they would never have attempted before: intervene, however indirectly, in a U.S. election.
...
Mr. Leshchenko and other political actors in Kiev say they will continue with their efforts to prevent a candidate - who recently suggested Russia might keep Crimea, which it annexed two years ago - from reaching the summit of American political power.

"A Trump presidency would change the pro-Ukrainian agenda in American foreign policy," Mr Leshchenko, an investigative journalist turned MP, told the Financial Times. "For me it was important to show not only the corruption aspect, but that he is [a] pro-Russian candidate who can break the geopolitical balance in the world."
...
If the Republican candidate loses in November, some observers suggest Kiev's action may have played at least a small role.

A Democratic Party operative asked the Ukrainian ambassador to find dirt on Trump's campaign manger Paul Manafort. A few month later a secret "black ledger" emerges from nowhere into the hands of dubious Ukrainian actors including a 'former' domestic intelligence director.

The ledger may or may not show that Manafort received money from Yanukovych's party. It was never verified. But it left Trump no choice but to fire Manafort. Ukrainian figures who were involved in the stunt openly admitted that they had meddled in the U.S. election, promised to do more of it and probably did.

The Ukrainian interference in the 2016 election is well documented. How the Buzzfeed News author can claim that it is a "debunked conspiracy theory" is beyond me.

In 1998 the U.S. and the Ukraine signed a Treaty on Mutual Legal Assistance in Criminal Matters (pdf). I came into force in February 2001. Article I defines the wide scope of assistance:

1. The Contracting States shall provide mutual assistance, in accordance with the provisions of this Treaty, in connection with the investigation, prosecution, and prevention of offenses, and in proceedings related to criminal matters.

2. Assistance shall include: (a) taking the testimony or statements of persons; (b) providing documents, records, and other items; (c) locating or identifying persons or items; (d) serving documents; (e) transferring persons in custody for testimony or other purposes; (f) executing searches and seizures; (g) assisting in proceedings related to immobilization and forfeiture of assets, restitution, and collection of fines; and (h) any other form of assistance not prohibited by the laws of the Requested State.

3. Assistance shall be provided without regard to whether the conduct that is the subject of the investigation, prosecution, or proceeding in the Requesting State would constitute an offense under the laws of the Requested State.

When Trump asked the current Ukrainian President Zelensky to help with an investigation into the above matters he acted well within the law and within the framework of the treaty. It was certainly not illegitimate to do that.

But when mainstream media deny that Biden's interference in Ukraine's prosecutor office is suspect, or claim that the Ukraine did not interfere in the U.S. elections, they make it look as if Trump did something crazy or illegal. He does plenty of that but not in this case. To use it a basis of an 'impeachment inquiry' is political bullshit.

Making these false claims will come back to haunt those media outlets. Sooner or later the public will recognize that those claims are false. It will lessen the already low trust in the media even more.

Posted by b on October 26, 2019 at 17:51 UTC | Permalink


Piotr Berman , Oct 26 2019 18:16 utc | 1

"Sooner or later the public will recognize that those claims are false. It will lessen the already low trust in the media even more."

More precisely, there exit Trump-friendly media with millions of followers, so insisting on innocence of Biden will have a political cost. Not to mention leftist media reminiscing how Senator Biden championed the cause of MBNA (credit cart giant) when it was also a generous employer of his dear son. Of course, given the size of Delaware, it could be just a coincidence.

corkie , Oct 26 2019 18:27 utc | 3
Thanks b for providing the nitty gritty details of this sorry saga. That term "conspiracy theory" has been so widely abused that, to me at least, it now means something that the author wishes were not true but almost certainly is.
Maracatu , Oct 26 2019 18:30 utc | 4
What is certain is that if Biden is selected as the Dem candidate and ends up as President, the GOP (if it retains influence in Congress) will open an investigation into his actions on behalf of his son. Russia-gate is the gift that keeps on giving!
ben , Oct 26 2019 18:34 utc | 5
Thanks b, for the reality check. Joe Biden needs to STFU, and go away. He and his ilk are part of the problem, not the solution. The rulers of America insist on pushing this sycophant for the empire down our throats. And, he can take HRC and her crowd with him. It's high time for some new blood, IF, TPTB, will even allow that to happen, which I very much doubt....
ben , Oct 26 2019 18:39 utc | 6
P. S. DJT, IMO, is ALSO in the same category with Biden, HRC and other scum-bags that need to "go away", if not imprisoned..
Ort , Oct 26 2019 18:56 utc | 8
Thanks for another informative and insightful commentary, B. It's like a drink of cool, clean water after staggering through a volcanic landscape full of fumaroles belching sulfurous plumes of superheated gas.

Sometimes my hobby horses merrily hop along under me without any effort on my part. I just hang onto the reins and howl. So: it's bad enough that the US mass-media consent-manufacturers, aka the CIA/Deep State's "Mighty Wurlitzer", gin up endless propaganda to discredit the facts you mention; their mission is to fool enough of the public that there's no "there" there, and prop up Biden's presidential campaign in the bargain.

But what increasingly bugs me is so-called "alternative" news outlets and independent journalists buying into the spin that Trump and his associates are using the pretext of investigating corruption as a means to illegally and illicitly "dig up dirt on political rivals". Put the other way around, they concede that Biden and other Team Obama honchos are indeed "dirty", and that their Ukraine adventure was reprehensibly illicit or illegal and self-serving-- but they return to faulting Trump for impermissibly exploiting these circumstances in order to gain political advantage.

It doesn't surprise me that talented but co-opted journalists like Matt Taibbi are careful to affirm that Trump et al 's conduct is manifestly an abuse of power. But, sadly, even journalists like Aaron Maté, Max Blumenthal, Ben Norton, and Michael Tracey have echoed this rote condemnation.

My guess is that this arises from two acronyms: incipient TDS, which compels even "alternative" US journalists to regard Trump as the "heel" in the staged "professional"-wrestling scam of US electoral politics. Also, CYA; I suspect that these relatively young, professionally vulnerable journalists are terrified of coming off as "defending" or "excusing" Trump, lest they trigger wrathful excoriation from their peers and the hordes of social-media users whose custom they cultivate.

This is why I appreciate your clarity and forthrightness on this fraught topic.

Paul Damascene , Oct 26 2019 19:26 utc | 10
Ort @ 8 --

Rereading your post, and agreeing with some it, I find I disagree less with its conclusions than on first reading.

If you were referring to Trump's convo with Zelensky specifically, reasonable people might disagree over whether that was an abuse of power or sleazy and dumb (in being unnecessary)--which of course shouldn't mean the Bidens get a pass here, which none of these young journalists are suggesting.

But where I would disagree is if you were suggesting that Taibbi, Mate and Blumenthal are making obligatory objections to Trump more generally, in order to curry favour with their peers. I think each of them would readily reel off lists of things (more substantive than Ukrainegate -- and probably not including Russia collusion) that they think Trump should be castigated, impeached and perhaps prosecuted for.

karlof1 , Oct 26 2019 19:32 utc | 11
Well, there you have it--proof that BigLie Media indeed specializes in publishing Big Lies that ought to reduce such outlets to the status of Tabloids. Of course, the media is free to lie all it wants within the limits of slander and libel, but most people don't like being lied to particularly over matters of importance.
Peter AU 1 , Oct 26 2019 19:39 utc | 12
Larry Johnson has a piece at SST on a CIA task force set up to compromise Trump and prevent him becoming president. That Trump avoided all the traps set for him (even the Mueller investigation could pin nothing on Trump) and won the election says a bit for Trump. He definitely is more than the twitter reality TV persona that he puts up as a public face.

With the Barr investigation, it looks like the non Trump section of the swamp will be drained in the near future.

jasmin , Oct 26 2019 19:43 utc | 13
Possibly an irrelevant point, but Shokin's replacement Lutsenko was the prosecutor who resurrected the "deceased", self declared journalist, Arkady Babchenko. The story was full of plot twists, involving a Boris German/Herman, who was Russian. B kept Us regaled with events. I'd post a link, but have witnessed too many thread expansions too risk it.
dh , Oct 26 2019 19:45 utc | 14
I think a lot of people give the MSM too much credit. Of course editorials etc. can influence people's thinking but the media, and journalists in general, are loathed by the people who voted for Trump. It's a big reason he was elected.
ben , Oct 26 2019 19:45 utc | 15
Ort @ 8 said;"It doesn't surprise me that talented but co-opted journalists like Matt Taibbi are careful to affirm that Trump et al's conduct is manifestly an abuse of power."

Co-Opted, or truthful, depending on what you believe. You, have every right to your opinion, but, when push comes to shove, think I'll give my opinion being swayed or not, by giving more credibility to the five names you've decided to "shade".

DJT has a record of behavior, and so do the five you've mentioned. My choice is clear, I'll believe the five..

Jen , Oct 26 2019 19:56 utc | 16
Alexandra Chalupa's connection to the thinktank The Atlantic Council should be borne in mind in the developing discussion in the comments forum. Her sister Irena is or has been a non-resident Senior Fellow there. Irena Chalupa has also been a senior editor at Radio Free Europe/Radio Liberty.

Also the founder and CEO of the Crowdstrike company in charge of cybersecurity for the DNC during the 2016 presidential election campaign was Dmitri Alperovich who is a Senior Fellow at The Atlantic Council. It was Crowdstrike who came up with the idea that Trump had to be under the Kremlin's thumb and from there the hysterical witch-hunt and associated actions known as Russiagate began.

I'm surprised that at this point in time, Bellingcat has not been included in digging up "dirt" on Trump, Manafort or anyone Manafort supposedly had connections with who is also mentioned in the "black ledger" but maybe that's because with the garbage that Bellingcat has so delivered, Eliot Higgins and company can't be trusted any more. Their masters should have known though, that when you give your subordinates base material to work with, they can only come up with base results: garbage in, garbage out.

psychohistorian , Oct 26 2019 19:57 utc | 17
Thanks for your ongoing documentation of the political criminality in the US b. The recent events are playing out like a two-bit soap opera rerun in a nursing home for America's brainwashed. Maybe Trump could start a new TV game show called Apprentice Corruption and instead of saying "Your Fired!" it could be "Your Guilty!"

As an American it is difficult to watch the country that I was taught such good things about in school be exposed as a criminal enterprise running cover for the elite cult that owns global private finance and manipulates Western not-so-civilized culture.

I hope all this BS we are going through wakes up enough of the semi-literate public to overthrow the criminal sect and restore the Founding Fathers motto and concept of E Pluribus Unum.

lysias , Oct 26 2019 20:09 utc | 18
Lee Stranahan of Radio Sputnik has been reporting on Alexandra Chalupa's role for a number of years now. I hope he gets proper credit as this story comes out.
karlof1 , Oct 26 2019 20:35 utc | 19
Given the fact that she got a first hand look at the Outlaw US Empire's injustice system and its tie-in with BigLie Media, the comments by the now back in Russia Maria Butina carry some legitimate weight that're worth reading: "'I believe that the Americans are wonderful people, but they have lost their legal system,' Butina said. 'What is more, they are routinely losing their country. They will lose it unless they do something'.... "'I am very proud of my country, of my origin,' Butina stressed. 'And I come to realize it more and more.'"

Should I bold the following, maybe make the lettering red, and put it in all caps:

"They are routinely losing their country."

I know this is an international bar, but the general focus has long been on the Outlaw US Empire. IMO, Maria Butina is 100% correct. The topic of this thread is just further proof of that fact. As I tirelessly point out, the federal government has routinely violated its own fundamental law daily since October 1945. The media goes along with it robotically. And aside from myself, I know of no other US citizen that's raised the issue--not Chomsky, not Zinn, not anyone with more credentials and public accessibility than I. I sorta feel like Winston Smith: Am I the only one who sees and understands what's actually happening?! Well, I've shared what I know, so I'm no longer alone. But that's not very satisfying, nor is it satisfactory.

psychohistorian , Oct 26 2019 21:00 utc | 22
It seems some corners are coming unglued if the ZH link below is any indication: https://www.zerohedge.com/political/fbi-entrapped-flynn-manipulated-evidence-clapper-allegedly-issued-kill-shot-order

The take away quote from a Matt Taibbi twit "LOL. Barack Obama is going to love this interview his former DIA James Clapper just gave to CNN about the Durham probe: "It's frankly disconcerting to be investigated for having done... what we were told to do by the president of the United States."
"

karlof1 , Oct 26 2019 21:00 utc | 23
Prescient observation by Aaron Mate : "When CNN & MSNBC now cover the criminal inquiry into conduct of intel officials in Russia probe, they are literally covering their employees -- John Brennan (MSNBC); James Clapper, Andrew McCabe, James Baker (CNN). I avoid the term, but it's appropriate here: Deep State TV."

Sure, he sees it, many of us barflies see it, but it's the public within the Outlaw US Empire that must see and understand this dynamic. If they don't or won't, then Butina's words are even more correct--They are losing their country.

Brian_J , Oct 26 2019 21:07 utc | 24
Here are some more Biden & Biden lobbying revelations going back to 2008 from the Washington Examiner from before Biden became VP: https://www.washingtonexaminer.com/politics/biden-outreach-to-dhs-and-doj-overlapped-with-work-by-son-hunters-lobbying-firm
psychohistorian , Oct 26 2019 21:08 utc | 25
Below is another ZH link (still can't do HTML....sigh) about more Biden perfidy re his son Hunter: https://www.zerohedge.com/political/busted-joe-biden-intervened-help-hunters-lobbying-efforts-multiple-occasions

The take away quote: "Joe Biden intervened at least two times on matters his son Hunter's firms was being paid to lobby on, according to government records reviewed by the Washington Examiner."

uncle tungsten , Oct 26 2019 21:10 utc | 26
steven t johnson #20

Excuses from the Trump lovers should be dismissed out of hand.

They usually are dismissed around this bar stj. As are the excuses from the Dem lovers.

How do you excuse this ?

MadMax2 , Oct 26 2019 21:27 utc | 28
maracatu 4

The merry-go-round scenario you post would indicate a broken state. Biden's been in office for 43 years, Trump 3 yrs... the potential for dirt is large, mix it with even larger GOP vengeance should that scenario arise and this will drag on through the decades.

'A republic, if you can keep it.' ~Franklin

paul , Oct 26 2019 21:35 utc | 29
What Trump did was corrupt. Normal corruption. What Biden did was corrupt. A lot more corrupt. And rather brazen.
Peter AU 1 , Oct 26 2019 21:46 utc | 30
"They are routinely losing their country."

Part and parcel of democracy. Western style democracy at least. Perhaps others can set theirs up better, though allways, the achilles heel of democracy is information, or media. Who oversees ensuring voters recieve accurate information.

The oz state of NSW had something that broke through this for a bit. ICAC https://en.wikipedia.org/wiki/Independent_Commission_Against_Corruption_(New_South_Wales)

It took complaints from the public and investigated them. They did not have power to bring charges, but for a time findings were made public. Once it got onto a money trail it would keep following and that would lead to other money trails. It was a state agency and had to stop at state borders but most money trails led to federal politics. It was defanged when they came too close to federal politics.

Something like this in a countries constitution could work though it could be corrupted the same as anything else.

MadMax2 , Oct 26 2019 21:49 utc | 31
@karlof 23

Indeed, the guilty are hiding in plain sight. It appears sinister, and is, but I think its a positive development of late, as it would suggest that big media are scrambling to preserve the status quo by legitimising these deep state actors.

It wasn't so long ago these deep state types would rather steer clear of the media. Now they are out there earning bread driving the narrative. Are these deep state media faces a tactical last resort...?

jadan , Oct 26 2019 22:13 utc | 32
Obama orchestrated the regime change operation in Ukraine. As we know from Wayne Madsen's little book, "The Manufacturing of a President", Obama has been a CIA asset since he was a suckling babe. To promote containment of the Russian menace, the US got in bed with Ukrainian fascists and successfully exploited political tensions in that country resulting in the removal of the duly elected Yanukovitch. A right wing billionaire then took the reigns and Putin orchestrated a referendum in Crimea in retaliation that resulted in its return to Russia. The Crimeans were and continue to be happy, happier than the rest of Ukrainians under Kiev neo-fascist free market exploitation.

It is natural that neo-fascist Ukrainians would express their disapproval of Trump, who was making nice with Putin. No matter what his motives were, he was bucking US anti-Russian policy. I liked Trump at that time for this willingness to end a Cold War policy sponsored by the US military industrial complex. You can cal it "deep state" if you like. It's not deep and it's not a shadow government. It's the war party. It's the elite profiting from weapons manufacture. Trump has no principles except expedience and his pro-Russian stance is likely owing to the money laundering he's been doing for Russian criminals since he is such a lousy business man. Putin and other Russian kleptocrats saved Trump boy's bacon. So it's very confusing when bed actors do good things.

Biden is no doubt quite corrupt. But that's got little to do with Trumps quid pro quo with Ukraine. You say that Ukrainian interference in US elections is well documented. You don't offer any documents, b. Anti-Putin Ukrainians were naturally anti-Trump. So what? Where's the beef? Show me how that little piss ant country that can't even pay its fuel bills and gave the world Chernobyl, interfered in US elections.

Your defense of Trump is getting tiresome. He's a criminal with no respect for the US Constitution and he deserves to be impeached. This is not to say that Joe Biden or his drug addict son are not also shit stains. I am just dismayed that you, an ostensibly intelligent independent commentator would go to bat for an ignoramus like Trump.

Don Bacon , Oct 26 2019 22:16 utc | 33
The general charge against Trump is that he was "digging up dirt" on opponents. Well laddy-dah. So what. Welcome to Politics 101.

President Harry Truman probably received as much flak as any politician ever did, especially after he canned war-hero General MacArthur. But Truman wasn't a candy-ass current politician complaining about dirt-digging. No, he gave back more than he got, in spades.

What was "give-em-hell" Harry Truman's attitude? Some Truman quotes:
--"I never did give anybody hell. I just told the truth, and they thought it was hell."
--"It's the fellows who go to West Point and are trained to think they're gods in uniform that I plan to take apart"
--"I didn't fire him [General MacArthur] because he was a dumb son of a bitch, although he was, but that's not against the law for generals. If it was, half to three quarters of them would be in jail."
-- "I'll stand by [you] but if you can't take the heat, get out of the kitchen ."

That's what Trump is doing and will probably continue to do with fake news. (And he coined the phrase.)

vk , Oct 26 2019 22:19 utc | 34
I'll repeat what I posted here some days ago: this is not a battle between truth vs lies, but between which is the truth that will guide the USA for the forseeable future.

Empires don't act on facts: they are all-powerful, so they sculpt reality as they see fit. What determines this is class struggle: the inner contradictions of a society that results in a given consensus, thus forming a hegemony.

It's not that the liberals deny Biden did what he did, but that they disagree with Trump's interpretation over what he did. This is what the doctrine of the vital center is all about: some facts are more facts than others, prevailing the one which maintains the cohesion of the empire.

There's a battle for America's soul; the American elite is in flux: Russia or China?

vk , Oct 26 2019 22:25 utc | 35
It seems Jeff Bezos is angry he didn't get that USD 10 billion cloud contract from the Pentagon: Company with ties to Trump's brother Robert awarded $33 million government contract
karlof1 , Oct 26 2019 22:26 utc | 36
MadMax2 @31--

In 1984 , the narrative was now 100% in your face and everything had to be manipulated to match it, which apparently hadn't been needed previously. But we aren't told if that was done as a "last resort." I would think not given continuing polls showing ongoing distrust of media, thus the difficulty of manufacturing consent. Look at the great popularity enjoyed by Sanders amongst 18-30 year-olds who get most of their information online or via social media and the measures being taken to try and manipulate those realms. Then there're efforts to counter the misinformation and manipulation by numerous activists, many of which get cited here.

Another thought: They're out front now because the Establishment's deemed the fight to control the narrative's being lost, and they've been drafted to rectify the situation. If correct, they ought to keep failing.

uncle tungsten , Oct 26 2019 22:27 utc | 37
karlof1 #19

The international nature of this bar and its many flies is that mostly (from what I read) they have an immense respect for the rule of law. It is this singular concept that we trust will transcend religion and the quasi religiosity of political allegiances.

The rule of law is a deity-like singularity that embraces all beings equally, or should. Assaulting that legitimate expectation of the law applying equally is what confronts us daily in so many ways and when it is observed being assaulted by the highest office bearers in political and corporate life that we barflies get mighty annoyed. The gross vista of assumed immunity demonstrated by Nixon is equaled by the antics of the Clinton foundation and its Directors. Each and every one of them.

But it is far worse than that as the assault on the rule of law is daily carried out by the mafias that infest our societies, the corrupt and violent police that cant/wont protect our citizens, the international warmongering criminal classes that propagandise us to accept warring as a legitimate exercise of power even though we recognise it as a crime against humanity.

So when we see the deplorable state of media and jurisprudence and fairness we can only think as Maria Butina does "that we are routinely losing our countries" and I would add our civil societies. The latter is vastly more concerning than the former IMO.

alaff , Oct 26 2019 22:47 utc | 38
Again, not surprised at all. Pro-democratic/anti-Trump media write articles (obviously made-to-order) to whitewash already badly discredited Biden, and present all the arguments in favor of his dark connections with Ukraine as a kind of "conspiracy theory". This is a common practice. Not having sufficient competence to reasonably refute the arguments of opponents, MSM (as well as all sorts of "experts") immediately mark the position of opponents with "conspiracy theory" (there are also other options to choose from: "Putin's agent", "Putin's useful idiot", "Kremlin's agent", "pro-Russian propaganda", etc.). It is assumed that this makes unnecessary/optional (and even "toxic") all further conversations with the opponent (that is, there is no need to answer him, to prove something with facts, etc.), because his position is a "conspiracy theory".

Western MSM are actively using this simplest propaganda technique of information warfare. For example, this was the case when reporting on events in Syria - those journalists, the media, experts who did not agree with the lie of MSM about Assad's use of the chemical weapons were declared "conspiracy theorists" (and also "Assad apologists"). This method was also used to cover "the Skripal case" - those who questioned the British authorities' version of the "Novichok poisoning" were declared "conspiracy theorists".

When I see words like "conspiracy theory" in the headlines and see what media use them, then, you know, it's all clear. No chance for such articles/media to be taken seriously.

james , Oct 26 2019 22:59 utc | 39
@32 jadan quote "Show me how that little piss ant country that can't even pay its fuel bills...." are you familiar with the name porkoshenko, or any other one of the numbers of kleptomaniacs in positions of power in the ukraine? how do you think they got their, if ''that little piss ant country' can't even pay it's bills? i am sure you are capable of adding 2 + 2...

b isn't defending trump here.. he's highlighting how corrupt the msm is! it looks like you missed that.. check the headline..

Peter Charles , Oct 26 2019 23:02 utc | 40
This is the way the controlled media works. They provide half a story, half truths, straw-man facts, selective quotes and 'expert' comment, opinion and unwarranted assumption presented as fact that all together cover the spectrum from black to white, spread across the many titles.

They also disseminate a fine dusting of lies and actual truth here and there. The result is the public have a dozen 'truths' to pick from, none of which are real, while the outright lies and actual truths get dismissed as not credible and the half-truths and straw-man truths appear to carry some validity. If you look for it you can find it applying in almost every bit of 'news', if it is in any way controversial, whether it is partisan politics, Climate Change or Brexit to give examples.

Jackrabbit , Oct 26 2019 23:51 utc | 41
jadan @32:
As we know from Wayne Madsen's little book, "The Manufacturing of a President", Obama has been a CIA asset since he was a suckling babe.
If Obama was CIA, and GW Bush was CIA (via daddy Bush), and Clinton was CIA (via Arkansas drug-running and the Presidency), and Bush Sr was CIA ... then what can we conclude about Trump? 1) he's also CIA, or 2) he's a willing stooge.
Jackrabbit , Oct 26 2019 23:51 utc | 42
uncle tungsten @37: rule of law

If the people get the government they deserve then they also get the laws/order they deserve. Voting alone is unlikely to fix that. We need Movements.

Michael Droyd , Oct 27 2019 0:12 utc | 43
Ukraine was just one hell of a honey pot that too many couldn't resist visiting. Kind of like Russia (Uranium One and HRC) or China (Biden for a start). Giulani is going to be very busy - he still hasn't produced anything that wasn't already published, but I bet he has much more.

And then there is this: https://www.unz.com/ishamir/the-plundering-of-ukraine/

ben , Oct 27 2019 0:47 utc | 48
DB @ 33 said; Trump coined the phrase "fake news".

Horse puckey DB, check this out: https://www.psychologytoday.com/us/blog/head-in-the-cloud/201611/brief-history-fake-news

ben , Oct 27 2019 0:54 utc | 49
And this; https://www.1843magazine.com/technology/rewind/the-true-history-of-fake-news
evilempire , Oct 27 2019 0:56 utc | 50
Burisma investigated by SFO for money laundering: https://therearenosunglasses.wordpress.com/2019/04/07/the-hunt-for-burisma-pt-1/
Jackrabbit , Oct 27 2019 1:12 utc | 51
Glenn Brown @46:
... smart enough to understand and agree that they needed someone like Trump?
Yes, I do think they are smart enough and agreed to act in their collective best interest. Kissinger first wrote of MAGA in a WSJ Op-Ed in August 2014. Trump entered the race in June 2015, IIRC.

Do you think that Trump - who failed at multiple businesses - just woke up one day and became a political and geopolitical genius? As a candidate he said he'd "take the oil" and now, more than 3 years later, he has! LOL.

And JUST AFTER the Mueller investigation formally ends, Trump ONCE AGAIN solicits a foreign power to interfere in a US election. The biggest beneficiary? Deep State BIDEN! Who now gets all the media attention.

FYI Wm Gruff makes your same point often: that Deep State mistakes demonstrate that they couldn't possible pull of a Trump win (if that's what they wanted). I disagree.

<> <> <> <> <> <>

I very much doubt that anyone will go to jail - or serve any meaningful jail time if they do - over the Deep State shenanigans. Nor will people 'wake up' and see how they've been played anytime soon. Even the smarter, more savvy denizens of the moa bar have much difficulty connecting dots. Dots that they don't want to see.

Jackrabbit !!

Jackrabbit , Oct 27 2019 2:14 utc | 55
The Deep State at work:

But they would NEVER interfere in a Presidential election.

LOL

Jackrabbit !!

jadan , Oct 27 2019 2:44 utc | 56
@41 Jackrabbit

If Obama was CIA, and GW Bush was CIA (via daddy Bush), and Clinton was CIA (via Arkansas drug-running and the Presidency), and Bush Sr was CIA ... then what can we conclude about Trump? 1) he's also CIA, or 2) he's a willing stooge

Trump at first threw down the gauntlet to the spies and proclaimed his autocratic prerogative when God held off the rain for his inauguration (!) but now he would gladly get on his knees between Gina Haspel's legs if the CIA would only help him stay in power.

What distinguishes Obama from other presidents is the degree to which he was manufactured. He made it to the WH without much of a political base. Control of the political context, media and process, launched Obama to the top. It was fulfillment of the liberal American dream. It was a great coup. Talk about the "deep state"! It's staring us all in the face.

Jackrabbit , Oct 27 2019 2:45 utc | 57
Oh, but Deep State DID interfere. FACT: Deep Stater Hillary colluded with DNC against Sanders. ( But she would NEVER participate in collusion that caused her to lose an election./sarc LOL)

And now pro-Trump people say Clapper, Brennan, and Comey interfered in the 2016 election OR committed treason by trying to unseat the President!

So we can talk about Deep State interference . . . as long as it follows the partisan narrative that's been established for us.

Jackrabbit !!

uncle tungsten , Oct 27 2019 3:26 utc | 58
jadan #54

I have news for you. USA Presidents use strong coercive persuasive arguments or means of speech ALL THE TIME. And always have. Sometimes they can be subtle and allude to an action that might make them happy and sometimes they can be blunt. Its a presidential thing. It is what statespeople do when they 'negotiate' for their desired outcome.

It is not illegal or corrupt. It is power nakedly exercised. Just because Biden is a candidate for the same presidential role does not confer immunity for Biden's graft in favor of his son a few years back. You make a mockery of your position.

One USA President visited Australia once and when confronted with a roadblock of demonstrators seeking peace in Vietnam demanded of the Australian Premier to "drive over the bastards". That didn't happen but the President continued to drive all over the Vietnamese innocents.

Trump may be a grifter and a scumbag but there are warmongers well ahead of him in the cue for justice. Take Hillary Clinton for example. She is a ruthless killer and the greatest breach of USA national Security ever with her Secretary of State emails held on an unsecured server in her closet.

ben , Oct 27 2019 3:30 utc | 59
The same powers some call "deep state," are the same powers that have given us ALL modern day presidents, probably from FDR on. IMO, they are nothing more, nothing less than the "captains of commerce", who, through the vast accumulation of wealth by monopoly, buy our "representatives" to legislate rules and regulations to benefit themselves.

Our so-called "leaders" work for them, with very few exceptions, and transcends all political parties, and now also the Supreme Court.

$ has been ruled speech, unlimited $ is allowed to be given to politicians for elections. How could anything but massive corruption take place under this kind of system?

restlelss94110 , Oct 27 2019 3:34 utc | 60
they make it look as if Trump did something crazy or illegal. He does plenty of that but not in this case. You suffer from TDS. What on Earth are you talking about here? Plenty of that? Say what? Why do you undercut your entire point in your article with this little piece of utter nonsense?

Name one thing that Trump that has done that is illegal. Name one thing that is crazy. Stop apologizing to the crazies by denigrating Trump. Your entire article was all about how none of the bs is true. And then you put your own brand of bs in there at the end. Cut it out.

james , Oct 27 2019 3:44 utc | 61
@ 54 jadan... thanks for your comments... i am feeling more philosophical tonight, as i don't have a gig and have some time to express myself a bit more here.. first off, i don't like any of these characters - trump, biden, and etc. etc.. i have no horse in the game here, and it sounds like you don't either.. your comment- "The issue is Trump's extortion of Ukraine, not Biden's extortion of Ukraine." i can go along with that until i reflect back onto what increasingly looks like an agenda to get trump even prior to when he was elected, at which point i want to say why are we only examining trump in all of this? who gets to decide what the issue is, or as Caitlin Johnstone lets to say - who gets to decide what the narrative is here? i don't have an answer for this, but those who appear to be taking a side in all of this - including you with the quote i make - seem to think that it has to be the issue of trumps extortion of Ukraine, verses what appears to me the CIA - Dem party extortion of the ordinary USA persons mind...

let me back up... Has mccarthyism version 2 come to life since the advent of what happened in the Ukraine from 2014 onward?? is the issue of a new cold war with Russia been on the burner for at least 5 or more years here and began before trump was even considered a potential candidate for the republican party? did Russia take back Crimea, which wasn't supposed to happen? is this good for military industrial complex sales? and etc. etc..

so, i don't think it is fair to only consider the latest boneheaded thing trump did when i consider the bigger picture unfolding here.. now, maybe you think i am a trump apologist... i am just saying what the backdrop looks like to me here.. i am sure biden is small potatoes in the bigger picture here, but if taking a closer examination of what took place in ukraine leading into 2014, with the victoria nulands and geoffrey pyatts and etc. etc. of usa diplomatic corps, usa dept of state and etc. could lead to a better understanding of how the usa has went down the road it has for the past 60 years of foreign policy on the world stage, it would be a good start... so, to me - it ain't about trump.. it is about usa foreign policy and how it has sucked the big one on the world stage for at least since the time of vietnam when i was a teenager..

i suppose it depends on the time frame one wants to take.. my time frame will be considered an evasion of the moment to some, but it is how i see it.. sure, trump is scum, but the bigger issue to me is the usa's foreign policy agenda.. anything that can pull back the covers on that would be an extremely good thing... now, perhaps this is the straw that broke trumps back and the deep state will not tolerate being scrutinized.. that i could understand, but i am not going to be putting it all on trump as the reason the covers have to remain on all the shit the usa has been responsible for on the world stage to date and especially the past 10 years.. i am not able to blame trump for all of that.. and as you can see, i would prefer to get down to the nitty gritty of who is zooming who here... the msm for all intensive purposes is complicit in duping the american public.. that to me is the gist of b's comment here, not that he is cheer-leading for trump.. i just don't see it that way...i'm definitely not!

[Oct 19, 2019] Trump seemed far more determined in that conversation to find out what happened in the Ukraine that caused the 2016/17/18 Russia hoax.

Oct 19, 2019 | www.unz.com

anastasia , says: October 8, 2019 at 3:57 pm GMT

Yeah, but look what happened to JFK. And we are pretty well know who did it.

Looks like they are going to try to put Trump out of commission too, one way or the other.

anastasia , says: October 8, 2019 at 4:04 pm GMT
Biden did not figure "prominently" in the transcript of the conversation. He figured "prominently" only in the minds of the people trying to impeach Trump. . Trump seemed far more determined in that conversation to find out what happened in the Ukraine that caused the 2016/17/18 Russia hoax.
anon [113] Disclaimer , says: October 8, 2019 at 5:16 pm GMT
@anastasia Right, and Biden figured prominantly in what happened in the Ukraine that caused the 2016/17/18 Russia hoax.
Michael888 , says: October 14, 2019 at 5:04 pm GMT
@Ozymandias A dictator arising in the banana republic that is the US would most likely be from an Intelligence Agency, such as Brennan. The MSM clearly worships such authority, which is why we have had an evidence-free coup in motion since 2016. Elections no longer are even pretended to matter.
Michael888 , says: October 14, 2019 at 5:28 pm GMT
@TellTheTruth-2 The bigger issue which no one in the MSM wants to touch is Crowdstrike. Supposedly Crowdstrike "made its reputation' by showing that the Russians hacked the Ukraine artillery, then later found the same type of evidence that the Russians hacked the DNC. Although it turned out that there was no Russian hack of the Ukrainian artillery, and likely no Russian hack of the DNC. There is a reason the 17 Intelligence Agencies have never showed any evidence; Crowdstrike and New Knowledge seem to be "the Russians".

[Sep 28, 2019] In his phone call with Zelensky, President Trump mentioned two subjects in particular which are Kryptonite to the Democrats: Crowdstrike and "the server," meaning the DNC server which was never forensically examined by the FBI.

Sep 28, 2019 | www.unz.com

Buck Ransom , says: September 27, 2019 at 12:51 am GMT

In his phone call with Zelensky, President Trump mentioned two subjects in particular which are Kryptonite to the Democrats: Crowdstrike and "the server," meaning the DNC server which was never forensically examined by the FBI. Pulling on these two threads may be even more interesting than the stuff about the big-bucks shakedowns of foreign governments by Joe Biden & Son, Inc. Just for starters: what the fcuk is the DNC server doing in Ukraine?

[Sep 27, 2019] Did Crowdstrite transrefered DNC disk images to Ukraine for the analysys?

Sep 27, 2019 | southfront.org

Another point was CrowdStrike, hired by Democratic National Committee (DNC) during the last election to analyze an infiltration of DNC email networks. He asked if the CrowdStrike servers are in Ukraine.

"Trump: I would like you to do us a favor though because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike I guess you have one of your wealthy people The server, they say Ukraine has it. There are a lot of things that went on, the whole situation."

"Zelenskiy: Well yes, to tell you the truth, we are trying to work hard because we wanted to drain the swamp here in our country. We brought in many many new people. Not the old politicians, not the typical politicians, because we want to have a new format and a new type of government You are a great teacher for us and in that."

"Zelenskiy: Actually last time I traveled to the United States, I stayed in New York near Central Park and I stayed at the Trump Tower. I will talk to them and I hope to see them again in the future. I also wanted to thank you for your invitation to visit the United States, specifically Washington DC. On the other hand, I also want to assure you that we will be very serious about the case and will work on the investigation."

Zelensky was applying the tried and true formula of flattering Trump until he agrees to fulfill a request. The summary of the conversation is quite limited, and US Congress asked for the whistleblower complaint to also be unclassified.

[Jul 29, 2019] CrowdStrikeOut Mueller's Own Report Undercuts Its Core Russia-Meddling Claims by Aaron Maté

Notable quotes:
"... The US elite jump up and down with moral indignation about an evidence-free allegation of foreign interference in its domestic politics, whilst ignoring actual evidenced foreign interference in its domestic affairs, and all the while constantly interfering in the domestic affairs of foreign countries and boasting about it. ..."
"... The Mueller Report is proof positive that the US is equally adept as Blair and Campbell in producing Dodgy Dossiers. ..."
"... It was a novel idea to outsource the investigation to Crowdstrike. There's a lot to be said for privatisation. Most commendable. Maybe the next time there's a high profile criminal investigation the FBI will outsource the murder investigation to Sam Spade, Ace Gumshoe. ..."
"... The fundamental flaw in the whole "Russiagate" thing is the failure to differentiate between Russia, the state and its government, and Russians, individuals who are Russian nationals. This failure is a direct result of an inability to recognize that the Cold War finished 30 years ago, a failure highlighted by the breathless Tom Clancy style of reporting and reinforced by a huge military/industrial complex that recognizes that in the absence of war or threats or war their business is a bust. ..."
Jul 25, 2019 | off-guardian.org
Vaska
Originally by Aaron Maté, July 5, 2019 First published by RealClearInvestigations .

At a May press conference capping his tenure as special counsel, Robert Mueller emphasized what he called "the central allegation" of the two-year Russia probe. The Russian government, Mueller sternly declared, engaged in "multiple, systematic efforts to interfere in our election, and that allegation deserves the attention of every American." Mueller's comments echoed a January 2017 Intelligence Community Assessment (ICA) asserting with "high confidence" that Russia conducted a sweeping 2016 election influence campaign. "I don't think we've ever encountered a more aggressive or direct campaign to interfere in our election process," then-Director of National Intelligence James Clapper told a Senate hearing.

While the 448-page Mueller report found no conspiracy between Donald Trump's campaign and Russia, it offered voluminous details to support the sweeping conclusion that the Kremlin worked to secure Trump's victory. The report claims that the interference operation occurred "principally" on two fronts: Russian military intelligence officers hacked and leaked embarrassing Democratic Party documents, and a government-linked troll farm orchestrated a sophisticated and far-reaching social media campaign that denigrated Hillary Clinton and promoted Trump.

But a close examination of the report shows that none of those headline assertions are supported by the report's evidence or other publicly available sources. They are further undercut by investigative shortcomings and the conflicts of interest of key players involved:

The report uses qualified and vague language to describe key events, indicating that Mueller and his investigators do not actually know for certain whether Russian intelligence officers stole Democratic Party emails, or how those emails were transferred to WikiLeaks. The report's timeline of events appears to defy logic. According to its narrative, WikiLeaks founder Julian Assange announced the publication of Democratic Party emails not only before he received the documents but before he even communicated with the source that provided them. There is strong reason to doubt Mueller's suggestion that an alleged Russian cutout called Guccifer 2.0 supplied the stolen emails to Assange. Mueller's decision not to interview Assange – a central figure who claims Russia was not behind the hack – suggests an unwillingness to explore avenues of evidence on fundamental questions. U.S. intelligence officials cannot make definitive conclusions about the hacking of the Democratic National Committee computer servers because they did not analyze those servers themselves. Instead, they relied on the forensics of CrowdStrike, a private contractor for the DNC that was not a neutral party, much as "Russian dossier" compiler Christopher Steele, also a DNC contractor, was not a neutral party. This puts two Democrat-hired contractors squarely behind underlying allegations in the affair – a key circumstance that Mueller ignores. Further, the government allowed CrowdStrike and the Democratic Party's legal counsel to submit redacted records, meaning CrowdStrike and not the government decided what could be revealed or not regarding evidence of hacking. Mueller's report conspicuously does not allege that the Russian government carried out the social media campaign. Instead it blames, as Mueller said in his closing remarks, "a private Russian entity" known as the Internet Research Agency (IRA). Mueller also falls far short of proving that the Russian social campaign was sophisticated, or even more than minimally related to the 2016 election. As with the collusion and Russian hacking allegations, Democratic officials had a central and overlooked hand in generating the alarm about Russian social media activity. John Brennan, then director of the CIA, played a seminal and overlooked role in all facets of what became Mueller's investigation: the suspicions that triggered the initial collusion probe; the allegations of Russian interference; and the intelligence assessment that purported to validate the interference allegations that Brennan himself helped generate. Yet Brennan has since revealed himself to be, like CrowdStrike and Steele, hardly a neutral party -- in fact a partisan with a deep animus toward Trump.

None of this means that the Mueller report's core finding of "sweeping and systematic" Russian government election interference is necessarily false. But his report does not present sufficient evidence to substantiate it. This shortcoming has gone overlooked in the partisan battle over two more highly charged aspects of Mueller's report: potential Trump-Russia collusion and Trump's potential obstruction of the resulting investigation. As Mueller prepares to testify before House committees later this month, the questions surrounding his claims of a far-reaching Russian influence campaign are no less important. They raise doubts about the genesis and perpetuation of Russiagate and the performance of those tasked with investigating it.

Uncertainty Over Who Stole the Emails

The Mueller report's narrative of Russian hacking and leaking was initially laid out in a July 2018 indictment of 12 Russian intelligence officers and is detailed further in the report. According to Mueller, operatives at Russia's main intelligence agency, the GRU, broke into Clinton campaign Chairman John Podesta's emails in March 2016. The hackers infiltrated Podesta's account with a common tactic called spear-phishing, duping him with a phony security alert that led him to enter his password. The GRU then used stolen Democratic Party credentials to hack into the DNC and Democratic Congressional Campaign Committee (DCCC) servers beginning in April 2016. Beginning in June 2016, the report claims, the GRU created two online personas, "DCLeaks" and "Guccifer 2.0," to begin releasing the stolen material. After making contact later that month, Guccifer 2.0 apparently transferred the DNC emails to the whistleblowing, anti-secrecy publisher WikiLeaks, which released the first batch on July 22 ahead of the Democratic National Convention.

The report presents this narrative with remarkable specificity: It describes in detail how GRU officers installed malware, leased U.S.-based computers, and used cryptocurrencies to carry out their hacking operation. The intelligence that caught the GRU hackers is portrayed as so invasive and precise that it even captured the keystrokes of individual Russian officers, including their use of search engines.

In fact, the report contains crucial gaps in the evidence that might support that authoritative account. Here is how it describes the core crime under investigation, the alleged GRU theft of DNC emails:

Between approximately May 25, 2016 and June 1, 2016, GRU officers accessed the DNC's mail server from a GRU-controlled computer leased inside the United States. During these connections, Unit 26165 officers appear to have stolen thousands of emails and attachments, which were later released by WikiLeaks in July 2016. [ Italics added for emphasis.]

The report's use of that one word, "appear," undercuts its suggestions that Mueller possesses convincing evidence that GRU officers stole "thousands of emails and attachments" from DNC servers. It is a departure from the language used in his July 2018 indictment , which contained no such qualifier:

"It's certainly curious as to why this discrepancy exists between the language of Mueller's indictment and the extra wiggle room inserted into his report a year later," says former FBI Special Agent Coleen Rowley. "It may be an example of this and other existing gaps that are inherent with the use of circumstantial information. With Mueller's exercise of quite unprecedented (but politically expedient) extraterritorial jurisdiction to indict foreign intelligence operatives who were never expected to contest his conclusing assertions in court, he didn't have to worry about precision. I would guess, however, that even though NSA may be able to track some hacking operations, it would be inherently difficult, if not impossible, to connect specific individuals to the computer transfer operations in question."

The report also concedes that Mueller's team did not determine another critical component of the crime it alleges: how the stolen Democratic material was transferred to WikiLeaks. The July 2018 indictment of GRU officers suggested – without stating outright – that WikiLeaks published the Democratic Party emails after receiving them from Guccifer 2.0 in a file named "wk dnc linkI .txt.gpg" on or around July 14, 2016. But now the report acknowledges that Mueller has not actually established how WikiLeaks acquired the stolen information: "The Office cannot rule out that stolen documents were transferred to WikiLeaks through intermediaries who visited during the summer of 2016."

Another partially redacted passage also suggests that Mueller cannot trace exactly how WikiLeaks received the stolen emails. Given how the sentence is formulated, the redacted portion could reflect Mueller's uncertainty:

Contrary to Mueller's sweeping conclusions, the report itself is, at best, suggesting that the GRU, via its purported cutout Guccifer 2.0, may have transferred the stolen emails to WikiLeaks.

A Questionable Timeline

Mueller's uncertainty over the theft and transfer of Democratic Party emails isn't the only gap in his case. Another is his timeline of events – a critical component of any criminal investigation. The report's timeline defies logic: According to its account, WikiLeaks founder Julian Assange announced the publication of the emails not only before he received the documents, but before he even communicated with the source that provided them.

As the Mueller report confirms, on June 12, 2016, Assange told an interviewer, "We have upcoming leaks in relation to Hillary Clinton, which is great." But Mueller reports that "WikiLeaks's First Contact With Guccifer 2.0 and DC Leaks" comes two days after that announcement:

If Assange's "First Contact" with DC Leaks came on June 14, and with Guccifer 2.0 on June 22, then what was Assange talking about on June 12? It is possible that Assange heard from another supposed Russian source before then; but if so, Mueller doesn't know it. Instead the report offers the implausible scenario that their first contact came after Assange's announcement.

There is another issue with the report's Guccifer 2.0-WikiLeaks timeline. Assange would have been announcing the pending release of stolen emails not just before he heard from the source , but also before he received the stolen emails . As noted earlier, Mueller suggested that WikiLeaks received the stolen material from Guccifer 2.0 "on or around" July 14 – a full month after Assange publicly announced that he had them.

In yet one more significant inconsistency, Mueller asserts that the two Russian outfits running the Kremlin-backed operation -- Guccifer 2.0 and DC Leaks – communicated about their covert activities over Twitter. Mueller reports that on Sept. 15, 2016:

The Twitter account@guccifer_2 sent @dcleaks_ a direct message, which is the first known contact between the personas. During subsequent communications, the Guccifer 2.0 persona informed DCLeaks that WikiLeaks was trying to contact DCLeaks and arrange for a way to speak through encrypted emails.

Why would Russian intelligence cutouts running a sophisticated interference campaign communicate over an easily monitored social media platform? In one of many such instances throughout the report, Mueller shows no curiosity in pursuing this obvious question.

For his part, Assange has repeatedly claimed that Russia was not his source and that the U.S. government does not know who was. "The U.S. intelligence community is not aware of when WikiLeaks obtained its material or when the sequencing of our material was done or how we obtained our material directly," Assange said in January 2017. "WikiLeaks sources in relation to the Podesta emails and the DNC leak are not members of any government. They are not state parties. They do not come from the Russian government."

Guccifer 2.0: A Sketchy Source

While Mueller admits he does not know for certain how the DNC emails were stolen or how they were transmitted to WikiLeaks, the report creates the impression that Russian intelligence cutout Guccifer 2.0 supplied the stolen material to Assange.

In fact, there are strong grounds for doubt. To begin with, Guccifer 2.0 – who was unknown until June 2016 – burst onto the scene to demand credit as WikiLeaks' source. This publicity-seeking is not standard spycraft.

More important, as Raffi Khatchadourian has reported for The New Yorker, the documents Guccifer 2.0 released directly were nowhere near the quality of the material published by WikiLeaks. For example, on June 18, Guccifer 2.0 released documents that it claimed were from the DNC, "but which were almost surely not," Khatchadourian notes. Neither was the material Guccifer 2.0 teased as a "dossier on Hillary Clinton from DNC." The material Guccifer 2.0 initially promoted in June also contained easily discoverable Russian metadata. The computer that created it was configured for the Russian language, and the username was "Felix Dzerzhinsky," the Bolshevik-era founder of the first Soviet secret police.

WikiLeaks only made contact with Guccifer 2.0 after the latter publicly invited journalists "to send me their questions via Twitter Direct Messages." And, more problematic given the central role the report assigned to Guccifer 2.0, there is no direct evidence that WikiLeaks actually released anything that Guccifer 2.0 provided. In a 2017 interview, Assange said he "didn't publish" any material from that source because much of it had been published elsewhere and because "we didn't have the resources to independently verify."

Mueller Didn't Speak With Assange

Some of these issues might have been resolved had Mueller not declined to interview Assange, despite Assange's multiple efforts.

According to a 2018 report by John Solomon in The Hill, Assange told the Justice Department the previous year that he "was willing to discuss technical evidence ruling out certain parties" in the leaking of Democratic Party emails to WikiLeaks. Given Assange's previous denials of Russia's involvement, that seems to indicate he was willing to provide evidence that Moscow was not his source. But he never got the chance. According to Solomon, FBI Director James Comey personally intervened with an order that U.S. officials "stand down," setting off a chain of events that scuttled the talks.

Assange also made public offers to testify before Congress. The Mueller report makes no mention of these overtures, though it does cite and dismiss "media reports" that "Assange told a U.S. congressman that the DNC hack was an 'inside job,' and purported to have 'physical proof' that Russians did not give materials to Assange."

Mueller does not explain why he included Assange's comments as reported by media outlets in his report but decided not to speak with Assange directly, or ask to see his "physical proof," during a two-year investigation.

No Server Inspection, Reliance on CrowdStrike

Before he nixed U.S. government contacts with Assange, Comey was implicated in another key investigative lapse – the FBI's failure to conduct its own investigation of the DNC's servers, which housed the record of alleged intrusions and malware used to steal information. As Comey told Congress in March 2017, the FBI "never got direct access to the machines themselves." Instead, he explained, the bureau relied on CrowdStrike, a cybersecurity firm hired by the DNC, which "shared with us their forensics from their review of the system."

While acknowledging that the FBI would "always prefer to have access hands-on ourselves, if that's possible," Comey emphasized his confidence in the information provided by CrowdStrike, which he called "a highly respected private company" and "a high-class entity."

CrowdStrike's accuracy is far from a given. Days after Comey's testimony, CrowdStrike was forced to retract its claim that Russian software was used to hack Ukrainian military hardware. CrowdStrike's error is especially relevant because it had accused the GRU of using that same software in hacking the DNC.

There is also reason to question CrowdStrike's impartiality. Its co-founder, Dmitri Alperovitch, is a nonresident senior fellow at the Atlantic Council, the preeminent Washington think tank that aggressively promotes a hawkish posture towards Russia. CrowdStrike executive Shawn Henry, who led the forensics team that ultimately blamed Russia for the DNC breach, previously served as assistant director at the FBI under Mueller.

And CrowdStrike was hired to perform the analysis of the DNC servers by Perkins Coie – the law firm that also was responsible for contracting Fusion GPS, the Washington, D.C.-based opposition research firm that produced the now discredited Steele dossier alleging salacious misconduct by Trump in Russia and his susceptibility to blackmail.

A CrowdStrike spokesperson declined a request for comment on its role in the Russia investigation.

The picture is further clouded by the conflicting accounts regarding the servers. A DNC spokesperson told BuzzFeed in early January 2017 that "the FBI never requested access to the DNC's computer servers." But Comey told the Senate Select Intelligence Committee days later that the FBI made "multiple requests at different levels," but for unknown reasons, he explained, those requests were denied.

While failing to identify the "different levels" he consulted, Comey never explained why the FBI took no for an answer. As part of a criminal investigation, the FBI could have seized the servers to ensure a proper chain of evidentiary custody. In investigating a crime, alleged victims do not get to dictate to law enforcement how they can inspect the crime scene.

The report fails to address any of this, suggesting a lack of interest in even fundamental questions if they might reflect poorly on the FBI.

The Mueller report states that "as part of its investigation, the FBI later received images of DNC servers and copies of relevant traffic logs." But it does not specify how much "later" it received those server images or who provided them. Based on the statements of Comey and other U.S. officials, it is quite likely that they came from CrowdStrike, though the company gets only passing mention in the redacted report.

Asked for comment, Special Counsel spokesman Peter Carr declined to answer whether the Mueller team relied on CrowdStrike for its allegations against the GRU. Carr referred queries to the Justice Department's National Security Division, which declined to comment, and to the U.S. Western District of Pennsylvania, which did not respond.

If CrowdStrike's role in the investigation raises a red flag, the potential exclusion of another entity raises an equally glaring one. According to former NSA Technical Director Bill Binney, the NSA is the only U.S. agency that could conclusively determine the source of the alleged DNC email hacks. "If this was really an internet hack, the NSA could easily tell us when the information was taken and the route it took after being removed from the [DNC] server," Binney says. But given Mueller's qualified language and his repeated use of "in or around" rather than outlining specific, down-to-the-second timestamps – which the NSA could provide -- Binney is skeptical that NSA intelligence was included in the GRU indictment and the report.

There has been no public confirmation that intelligence acquired by the NSA was used in the Mueller probe. Asked whether any of its information had been used in the allegations against the GRU, or had been declassified for public release in Mueller's investigation, a spokesperson for the National Security Agency declined to comment.

Redacted CrowdStrike Reports

While the extent of the FBI's reliance on CrowdStrike remains unclear, critical details are beginning to emerge via an unlikely source: the legal case of Roger Stone – the Trump adviser Mueller indicted for, among other things, allegedly lying to Congress about his failed efforts to learn about WikiLeaks' plans regarding Clinton's emails.

Lawyers for Stone discovered that CrowdStrike submitted three forensic reports to the FBI that were redacted and in draft form. When Stone asked to see CrowdStrike's un-redacted versions, prosecutors made the explosive admission that the U.S. government does not have them. "The government does not possess the information the defendant seeks," prosecutor Jessie Liu wrote. This is because, Liu explained , CrowdStrike itself redacted the reports that it provided to the government:

At the direction of the DNC and DCCC's legal counsel, CrowdStrike prepared three draft reports. Copies of these reports were subsequently produced voluntarily to the government by counsel for the DNC and DCCC. At the time of the voluntary production, counsel for the DNC told the government that the redacted material concerned steps taken to remediate the attack and to harden the DNC and DCCC systems against future attack. According to counsel, no redacted information concerned the attribution of the attack to Russian actors.

In other words, the government allowed CrowdStrike and the Democratic Party's legal counsel to decide what it could and could not see in reports on Russian hacking, thereby surrendering the ability to independently vet their claims. The government also took CrowdStrike's word that "no redacted information concerned the attribution of the attack to Russian actors."

According to an affidavit filed for Stone's defense by Binney, the speed transfer rate and the file formatting of the DNC data indicate that they were moved on to a storage device, not hacked over the Internet. In a rebuttal, Stone's prosecutors said that the file information flagged by Binney "would be equally consistent with Russia intelligence officers using a thumb drive to transfer hacked materials among themselves after the hack took place." In an interview with RealClearInvestigations, Binney could not rule out that possibility. But conversely, the evidence laid out by Mueller is so incomplete and uncertain that Binney's theory cannot be ruled out either. The very fact that DoJ prosecutors, in their response to Binney, do not rule out his theory that a thumb drive was used to transfer the material is an acknowledgment in that direction.

The lack of clarity around Mueller's intelligence community sourcing might appear inconsequential given the level of detail in his account of alleged Russian hacking. But in light of the presence of potentially biased and politically conflicted sources like CrowdStrike, and the absence of certainty revealed in Mueller's lengthy account, the fact that his sourcing remains an open question makes it difficult to accept that he has delivered definitive answers. If Mueller had the invasive window into Russian intelligence that he claims to, it seems incongruous that he would temper his purported descriptions of their actions with tentative, qualified language. Mueller's hedging suggests a broader conclusion at odds with the report's own findings: that the U.S. government does not have ironclad proof about who hacked the DNC.

Social Media Campaign

Mueller's other "central allegation" regards a "Russian 'Active Measures' Social Media Campaign" with the aim of "sowing discord" and helping to elect Trump.

In fact, Mueller does not directly attribute that campaign to the Russian government, and makes only the barest attempt to imply a Kremlin connection. According to Mueller, the social media "form of Russian election influence came principally from the Internet Research Agency, LLC (IRA), a Russian organization funded by Yevgeniy Viktorovich Prigozhin and companies he controlled."

After two years and $35 million, Mueller apparently failed to uncover any direct evidence linking the Prigozhin-controlled IRA's activities to the Kremlin. His best evidence is that "[n]umerous media sources have reported on Prigozhin's ties to Putin, and the two have appeared together in public photographs." The footnote for this references a lone article in the New York Times. (Both the Times and the Washington Post are cited frequently throughout the report. The two outlets received and published intelligence community leaks throughout the Russia probe.)

Further, in a newly unsealed July 1 ruling , a federal judge rebuked Mueller and the Justice Department for having "improperly suggested a link" between the IRA and the Russian government. U.S. District Judge Dabney Friedrich said Mueller's February 2018 indictment "does not link the [IRA] to the Russian government" and alleges "only private conduct by private actors." The judge added the government's statements violate a prohibiting lawyers from making claims that would prejudice a case.

Even putting aside the complete absence of a Kremlin role, the case that the Russian government sought to influence the U.S. election via a social media campaign is hard to grasp given how minuscule it was. Mueller says the IRA spent $100,000 between 2015 and 2017. Of that, just $46,000 was spent on Russian-linked Facebook ads before the 2016 election. That amounts to about 0.05% of the $81 million spent on Facebook ads by the Clinton and Trump campaigns combined -- which is itself a tiny fraction of the estimated $2 billion spent by the candidates and their supporting PACS.

Then there is the fact that so little of this supposed election interference campaign content actually concerned the election. Mueller himself cites a review by Twitter of tweets from "accounts associated with the IRA" in the 10 weeks before the 2016 election, which found that "approximately 8.4% were election-related." This tracks with a report commissioned by the U.S. Senate that found that "explicitly political content was a small percentage" of the content attributed to the IRA. The IRA's posts "were minimally about the candidates," with "roughly 6% of tweets, 18% of Instagram posts, and 7% of Facebook posts" having "mentioned Trump or Clinton by name."

Yet Mueller circumvents this with what sound like impressive figures:

IRA-controlled Twitter accounts separately had tens of thousands of followers, including multiple U.S. political figures who retweeted IRA-created content. In November 2017, a Facebook representative testified that Facebook had identified 470 IRA-controlled Facebook accounts that collectively made 80,000 posts between January 2015 and August 2017. Facebook estimated the IRA reached as many as 126 million persons through its Facebook accounts. In January 2018, Twitter announced that it had identified 3,814 IRA-controlled Twitter accounts and notified approximately 1.4 million people Twitter believed may have been in contact with an IRA-controlled account.

Upon scrutiny, Mueller's figures are exaggerated, to say the least. Take Mueller's claim that Russian posts reached "as many as 126 million" Facebook users. That figure is in fact a spin on Facebook's own guess, as articulated by Facebook general counsel Colin Stretch's congressional testimony in October 2017. "Our best estimate ," Stretch told lawmakers, "is that approximately 126 million people may have been served content from a page associated with the IRA at some point during the two-year period ." And the "two-year period" extends far beyond the 2016 election, to August 2017. Overall, Stretch added, posts from suspected Russian accounts showing up in Facebook's News Feed comprised "approximately 1 out of [every] 23,000 pieces of content."

Yet another reason to question the Russian operation's sophistication is the quality of its content. The IRA's most shared pre-election Facebook post was a cartoon of a gun-wielding Yosemite Sam . On Instagram, the best-received image urged users to give it a "Like" if they believe in Jesus. The top IRA post on Facebook before the election that mentioned Hillary Clinton was a conspiratorial screed about voter fraud . Another ad featured Jesus consoling a dejected young man by telling him: "Struggling with the addiction to masturbation? Reach out to me and we will beat it together."

Mueller also reports that the IRA successfully organized "dozens" of rallies "while posing as U.S. grassroots activists." Sounds impressive, but the most successful effort appears to have been in Houston, where Russian trolls allegedly organized dueling rallies pitting a dozen white supremacists against several dozen counter-protesters outside an Islamic center. Elsewhere, the IRA had underwhelming results, according to media reports: At several rallies in Florida " it's unclear if anyone attended ," the Daily Beast later noted; "no people showed up to at least one," and "ragtag groups" showed up at others , the Washington Post reported, including one where video footage captured a crowd of eight people .

Far from exposing a sophisticated propaganda campaign, the reports suggest that Russian troll farm workers engaged in futile efforts to spark contentious rallies in a handful of states. When it comes to the ads, they may have been engaging in clickbait capitalism: targeting unique demographics like African Americans or evangelicals in a bid to attract large audiences for commercial purposes. Reporters who have profiled the IRA have commonly described it as " a social media marketing campaign ." Mueller's February 2018 indictment of the IRA disclosed that it sold "promotions and advertisements" on its pages that generally sold in the $25-$50 range. "This strategy," a Senate report from Oxford University's Computational Propaganda Project observes, "is not an invention for politics and foreign intrigue, it is consistent with techniques used in digital marketing."

That, in fact, was Facebook's initial conclusion. As the Washington Post first reported , Facebook's initial review of Russian social media activity in late 2016 and early 2017 found that the troll farm's pages "had clear financial motives, which suggested that they weren't working for a foreign government." That view only changed, the Post added, after "aides to Hillary Clinton and Obama" developed "theories" to help them "explain what they saw as an unnatural turn of events" in their loss of the 2016 election. Among these theories: "Russian operatives who were directed by the Kremlin to support Trump may have taken advantage of Facebook and other social media platforms to direct their messages to American voters in key demographic areas." Despite the fact that "these former advisers didn't have hard evidence," the Democratic aides found a receptive audience in both congressional intelligence committees. Democrat Mark Warner, the Senate intel vice chairman, personally flew out to Facebook headquarters in California to press the case. Not long after, in the summer of 2017, Facebook went public with its new "findings" about Russian trolls. Mueller has followed their lead – just as the FBI followed the leads of other Democratic sources in pursuing both the collusion (Fusion GPS) and Russian hacking (CrowdStrike) allegations.

John Brennan and the ICA

As it falls short of proving its case for a "sweeping and systematic" Russian interference campaign, the Mueller report also fails to support its claim regarding the motive behind such efforts. In the introduction to Volume I, Mueller states that "the investigation established that the Russian government perceived it would benefit from a Trump presidency and worked to secure that outcome." But nowhere in the ensuing 440 pages does Mueller produce any evidence to substantiate that central claim.

Instead Mueller appears to be relying on the intelligence community assessment (ICA) released in January 2017 – four months before his appointment – that accused the Russian government of running an "influence campaign" that aimed "to undermine public faith in the U.S. democratic process," and hurt Hillary Clinton's "electability and potential presidency" as part of what it called Russia's "clear preference for President-elect Trump."

But the ICA itself produced no evidence for any of these assertions. Its equivocation is even more blunt than Mueller's: The ICA report's conclusions, it states, are "not intended to imply that we have proof that shows something to be a fact."

On the core conclusion that Russia aimed to help Trump, there is not even uniformity: While the FBI and CIA claim to have "high confidence" in that judgment, the NSA makes a conspicuous deviation in expressing that it has only "moderate confidence."

As it casts doubt on a core allegation of Russia's alleged motives, the NSA's dissent debunks the oft-repeated claim that the ICA represented the consensus view of all 17 U.S. intelligence agencies.

Moreover, it would even be misleading to portray the ICA as the product of the three agencies that produced it – the CIA, FBI, and NSA. Instead, there are multiple indications that the ICA is primarily the work of one person, who would spend the next two years accusing Trump of treason: then-CIA Director John Brennan.

A March 2018 report from Republicans on the House Intelligence Committee says that Brennan personally oversaw the entire ICA process from start to finish. In December 2016, the GOP report recounts, President Obama "directed Brennan to conduct a review of all intelligence relating to Russian involvement in the 2016 elections." The resulting ICA "was drafted by CIA analysts" and merely " coordinated with the NSA and the FBI." The GOP report observes that Brennan's CIA analysts were "subjected to an unusually constrained review and coordination process, which deviated from established CIA practice ."[ Italics added for emphasis.] A lengthy Democratic rebuttal to the GOP members' report does not refute any of these findings.

Echoing the NSA's dissent, the House GOP questions the ICA's conclusion that Putin interfered to secure Trump's victory. The committee, they write, "identified significant intelligence tradecraft failings that undermine confidence in the ICA judgments regarding Russian President Vladimir Putin's strategic objectives for disrupting the U.S. election." [ Italics added for emphasis.]

The Brennan-run process may have also excluded dissenting views from other agencies. Jack Matlock, the former U.S. Ambassador to Russia, has claimed that a "senior official" from the State Department's intelligence wing, the Bureau of Intelligence and Research (INR), informed him that it had reached a different conclusion about alleged Russian meddling, "but was not allowed to express it." An INR spokesperson declined a request for comment.

The ICA's production schedule also raises a red flag: The outgoing Obama administration tasked Brennan with churning it out in seemingly unprecedented time. "Ordinarily, the kind of assessment that you're talking about, there would be something that would take well over a year to do, certainly many months to do," former federal prosecutor Andrew McCarthy told the House Intelligence Committee in June. " [S]eems to me, in this instance, there was a rush to get that out within a matter of days."

But even if Brennan had been given all the time in the world, the very fact that he was placed in charge of the intelligence assessment was a massive conflict of interest. Brennan was handed the opportunity to validate, without independent scrutiny or oversight from unbiased sources, serious allegations that he himself helped generate.

Efforts to reach Brennan through MSNBC, where he is a commentator, were unsuccessful.

Months before he oversaw the intelligence assessment, Brennan played a critical role in the FBI's decision to open the probe of Trump-Russia collusion. "I was aware of intelligence and information about contacts between Russian officials and U.S. persons that raised concerns in my mind about whether or not those individuals were cooperating with the Russians, either in a witting or unwitting fashion," Brennan told Congress in March 2017, "and it served as the basis for the FBI investigation to determine whether such collusion-cooperation occurred."

On top of his self-described role in generating the investigation of possible Trump-Russia collusion, Brennan also played a critical role in generating the claim that the Russian government was waging an influence campaign. According to the book "The Apprentice" by the Washington Post's Greg Miller, the CIA unit known as "Russia House" was "the point of origin" for the U.S. intelligence community's conclusion during the presidential campaign that "the Kremlin was actively seeking to elect Trump." Brennan sequestered himself in his office to pore over the CIA's material , "staying so late that the glow through his office windows remained visible deep into the night." Brennan "ordered up," not just vetted, "'finished' assessments – analytic reports that had gone through layers of review and revision," Miller adds, but also "what agency veterans call the 'raw stuff' – the unprocessed underlying material."

Anyone familiar with how cherry-picked, false intelligence made the case for the Iraq War will recognize "raw material" as a red flag. Here's another: According to Miller, one piece of intelligence that was "a particular source of alarm to Brennan," was the "bombshell" from "sourcing deep inside the Kremlin" that Putin himself had "authorized a covert operation" in order to, "in his own words damage Clinton and help elect Trump" via "a cyber campaign to disrupt and discredit the U.S. presidential race." A former CIA operative described that sourcing as "the espionage equivalent of 'the Holy Grail.'"

Undoubtedly, a mole within Putin's inner circle – able to capture his exact orders – would indeed fit that description. But that raises the obvious question: If such a crown jewel of espionage exists, why would anyone in U.S. intelligence allow it to be revealed? And why hadn't that "Holy Grail" source been able to forewarn its American intelligence handlers of any number of Putin's actions that have caught the U.S. off-guard, from the annexation of Crimea to the Russian intervention in Syria?

Brennan was the first to alert President Obama of a Russian interference campaign, and subsequently oversaw the U.S. intelligence response.

Since leaving office, Brennan has laid bare his personal animus towards Trump, going so far as to call him "treasonous" – an unprecedented charge for a former top intelligence official to make about a sitting president. In the weeks before Mueller issued his final report, Brennan was still predicting that members of Trump's inner circle, including family members, would be indicted. Given Brennan's bias and consistent patterns of errors, Mueller's unquestioning, apparent reliance on a Brennan-run process is suspect.

Although Mueller seemed to accept the ICA's explosive claims at face value, Brennan's work product is now facing Justice Department scrutiny. The New York Times reported on June 12 that Attorney General William Barr is "interested in how the C.I.A. drew its conclusions about Russia's election sabotage, particularly the judgment that Mr. Putin ordered that operatives help Mr. Trump." In what is most likely a direct reference to Brennan, the Times adds that Barr "wants to know more about the C.I.A. sources who helped inform its understanding of the details of the Russian interference campaign," as well as about "the intelligence that flowed from the C.I.A. to the F.B.I. in the summer of 2016."

Until Barr completes his review of the Russia probe, the April 2018 report from GOP members of the House Intelligence Committee remains the only publicly available assessment of the Brennan-controlled ICA's methodology. One reason for this is the fact that President Obama personally quashed a proposed bipartisan commission of inquiry into alleged Russian interference that would have inevitably subjected Brennan and other top intelligence officials to scrutiny. According to the Washington Post, in the aftermath of the November election, Obama administration officials discussed forming such a commission to conduct a sweeping probe of the alleged Russian interference effort and the U.S. response. But after Obama's then chief-of-staff, Denis McDonough, introduced the proposal, he:

began criticizing it, arguing that it would be perceived as partisan and almost certainly blocked by Congress. Obama then echoed McDonough's critique, effectively killing any chance that a Russia commission would be formed.

With Obama having killed "any chance that a Russia commission would be formed," there has been no thorough, independent oversight of the intelligence process that alleged an interference campaign by Russia and triggered an all-consuming investigation of the Trump campaign's potential complicity.

New Opportunities to Answer Unresolved Questions

Barr's ongoing review, and Mueller's pending appearance before Congress, offer fresh opportunities to re-examine the affair's fundamental inconsistencies. Authorized by the president to declassify documents, Barr could shed light on the role that CrowdStrike and other sources played in informing Mueller and the Brennan-directed ICA's claims of a Russian interference campaign. When he appears before lawmakers, Mueller will likely face questions on other matters: from Democrats, his decision to punt on obstruction; from Republicans, his decision to carry out a prolonged investigation of Trump-Russia collusion despite likely knowing quite early on that there was no such case to make.

If the U.S. government does not have a solid case to make against Russia, then the origins of Russiagate, and its subsequent predominance of U.S. political and media focus, are potentially even more suspect. Given that allegation's importance, and Mueller's own uncertainty and inconsistencies, the special counsel and his aides deserve scrutiny for making a "central allegation" that they have yet to substantiate.

Correction:


Steve Hayes

The US elite jump up and down with moral indignation about an evidence-free allegation of foreign interference in its domestic politics, whilst ignoring actual evidenced foreign interference in its domestic affairs, and all the while constantly interfering in the domestic affairs of foreign countries and boasting about it.
Tim Jenkins
That's an excellent brief summary description of events ongoing, Steve & very telling. I have the feeling that most of the moral indignation is from those with most to hide !
Roberto
The takeaway of 2 1/2 years of nonsense, succinct version:

The congressman asks:
"When you talk about the firm that produced the Steele reporting, the name of the firm that produced that was Fusion GPS. Is that correct?"
"I am not familiar with – with that," Mueller replied.
"It was. It's not a trick question. It was Fusion GPS," Chabot retorted.
The Congressman then asked whether Mueller was familiar with the owner of Fusion GPS.
"That's outside my purview," Mueller replied."

Tim Jenkins
It seems likely, that Trump planned to discredit Robert Mueller's integrity, from the very beginning. Think about it: Robert (d'Mule) Mueller and his history:-

1) Heavy involvement in Uranium One deal, with the Russians.

2) Cover up of all investigations 9/11, as FBI Boss.

3) Clean up of Epstein's abhorrent dealings, last time around.

4) The Great Russia-Hoax, by Magic Mueller & Co.

For my mind, I can imagine BTO -"You ain't seen nothin', yet "

GRAFT
But the lunatics still believe millions upon millions of people believe it still
Cesca
This is just one of the events where the psychopathic scum show how divorced they are from humane consciousness.

They are thick as sh.t when it comes to hiding what they do, have the power to make it hard to find the truth tho.

Tim Jenkins
Coulter was calling for him to be in solitary in a 'SuperMax', as if that would protect him. Meanwhile, Priti Patel wants to bring back the death sentence
(stoooopid woman, not interested in learning, better said, in others learning) 😉

Off with their heads: Final Solutions ? Judge Priti Patel ?

Personally, i'd love to see Epstein in a safe cell, in between Cardinal sinner George d'Pedo Pell & Harvey Weinstein: all with webcams & wifi LIVE & pay per view:-

VIP Big Bro. Chokey & the Bandits, (online Live 🙂 )

I would actually pay to view that, even if only briefly on the BBC, though I've never given a penny to the BBC, since 1979 I swear m8 🙂

mark
The Mueller Report is proof positive that the US is equally adept as Blair and Campbell in producing Dodgy Dossiers.

The poor chap is obviously suffering from advanced Alzheimer's. You'd think they could come up with a better front man for their conspiracy theory.

It was a novel idea to outsource the investigation to Crowdstrike. There's a lot to be said for privatisation. Most commendable. Maybe the next time there's a high profile criminal investigation the FBI will outsource the murder investigation to Sam Spade, Ace Gumshoe.

Roberto
It wasn't [the dreaded, one-day] Alzheimer's. It's a Modified Limited Hangout version of 'I don't recall', 'What page is that on?', 'What page?', 'Oh I see it now', 'Can you repeat the question?', and 'It depends on what the meaning of 'is' is' (well, OK, everything except that – it's copyrighted).
Add dozens of 'That's not my purview' or some variation of it, and 5 hours magically shrinks.
Question This
Why not write an article why so much time, effort & money has been wasted on this subject. Is it a surprise to anyone that competing super powers (I use the term loosely) attempt to interfere in election results? Frankly i take it as given that Russia, USA & US of Europe do so at any & all possible opportunity.

And asking if politicians are corrupt is like asking what colors the sky, we all know the answer.

binra
The lie accuses its own sin in the other – as intent at sustainability of power by deceit. Unravelling to source is the nature of a true harvest.
Each unto its own.
UreKismet
Well IMO you'd be wrong. English elites have been saying "the evil russian other" for at least 200 years. Even in the islands no one sees as a good earner, Aotearoa, has an 'anti russian fort" It was built in the 1880's when some pommie pols beat up a "Russia is trying to steal our empire" scare.
Tim Jenkins
Get Mifsud, Now !
****************

"Mueller does not explain why he included Assange's comments as reported by media outlets in his report but decided not to speak with Assange directly, or ask to see his "physical proof," during a two-year investigation." with an unlimited budget to investigate !

What more than that did you need to know ? Alles Klar and if you are still unsure, then just ask yourself why Bill Binney & Kurt Weibe, ex NSA programmers of "Parallel Platforms", have NOT been called to testify, either ! The technical end 'stuff' proves that Mueller has been lying all along on his 'Witch Hunt' & Russia-Hoax and has NOT been addressing any one of the most important questions & problems that lead to further investigations & indictments of many key figures: which include potentially prosecuting the murderer of Seth Rich and why Mueller charged all others for lying to him during his pathetic investigation, but NOT Jo' MIFSUD ! Mueller himself should be prosecuted for his omissions & failure to prosecute Mifsud & question Richard Dearlove more intensively !

Get Mifsud under Oath immediately: he started all this who the hell is MIFSUD? Why is MIFSUD being protected? What the Fuck were Steele & Mifsud & Dearlove thinking to conspire & concoct on behalf of Deep State Governors & Operatives, who transcend both the USUK Governments combined ! ? !

This is an old article that helps you comprehend something of the background of the lies & deceptions of Mueller's pathetic efforts, & yesterday's statements confirm that he never intended to reveal anything at all, including yesterday, but why do we not have some brief qualification of Mueller's Testimony just yesterday, as an addendum here @OffG ?

How does OffG expect the Brits. to keep up to speed ? Especially, what will happen next with Boris Johnson and his dilemmas @home with GCHQ ? Coz' GCHQ were wholly involved in this TREASON USA attempt & Russia-Hoax, as were Italian Secret Services and the Ukrainian S.S. !

These matters can no longer be resolved behind closed doors, unless you wish to live continuously & forever onwards, under a corporate Fascist Dictatorship of "Parallel Platforms" & Pedophile Politicians ! it's that simple, so take 5 minutes and listen to Jim Jordan cross question Mueller, just yesterday, and you'll begin to see that Mifsud is being protected and we need to know WHY? HOW? & What from ? & by whom Logic, the wholly zionist owned & controlled mainstream media, surely! Coz' the ball is still rolling and it will not stop @Mifsud's desk, nor the boss of GCHQ's desk heads are gonna' roll, when this ball gets finally kicked into the annals of a very pissy secret service "History of the National Security State" and BoJo has some serious thinking to do about how he deals with the nameless cnuts in the British not so civil service, who used orphans kids in Ireland to entrap politicians and leverage any future political discussions with British Pedophile Politicians fully controlled !!!
E.G. GARY HOY !

It should be noted that yesterday, before Bill Barr stepped into his bullet proof vehicle, after answering a few questions to journalists, he beamed the biggest smile I ever saw on his public face and uttered the words "it goes with the territory". Bill Barr has clearly grown more comfortable with where he stands, today and he has no intention of kicking this can of worms down the road, including Jeffrey Epstein & Ghislaine Maxwell, charges will be brought, thankfully finally and Boris Johnson will be forced to reveal much more than he would likely wish regarding "The History of the National Security State" and it will help mask his inevitable blunders, down the road.

https://www.youtube.com/embed/KNIipT35Eh4

You should have, after watching Mueller !

I have pasted three links deliberately so that Admin must read this 😉

DunGroanin
Superb post Tim and a great catch! I missed David Nunes bit yesterday. The PM of GB and Mifsud in full colour! Lol

The Guardian live reporting missed every mention of Steele, Dearlove, a 'Russian' how very suspicious! Lol

I do believe the Russian State is capable of hacking – as is every such capable state in the world. I surmise they did hack – that is the most likely source of the Integrity Initiative / Institute of Statecraft material.

We will see how many independent news sites and bloggers actually exist by their journalism and blogging on this revealed conspiracy.

Tim Jenkins
My pleasure, thanks DG & I honestly 'almost choked' early morning, when sifting through the guardian script writers & their video editing efforts for today's 'damage limitation': (no doubt, on command of GCHQ), just how much key info. was truly omitted, scandalous clearly, 'The Lobby' is working hard on distractions, for not just all the government politicians, but also all journalists & editors: and therefore, Operation Charlemagne never gets mentioned, so that the 'Mifsud confusion' prevails and a disconnect is established from GCHQ, Steele & Treason USA & Epstein Island & Ghislaine Maxwell's historic sexual endeavours to control key political figures' future decision making: which includes Judges, down the line, as well as key figures working on "Parallel Platforms" of computing, within the National Security State throughout NATO nations !
And this all presents a prime opportunity for OffGuardian. 🙂
It will be a tough ole' cookie for Kit to crack: maybe in bite sized pieces, step by step

It's a very real tangled web that transcends borders of governance and forces one to not shy away from the words Corporate Fascist Dictatorship, with zero privacy & total control of all flows of Knowledge,

Not just Scientific . . .
Mercer & Cambridge Analytica ? the tip of the iceberg,
as UreKismet rightly points out below, Carole d'Cad certainly has much to answer for, in the biggest internet Psyop sting & string of distractions from the Key issues of programming our futures, collectively.

UreKismet
AFAIK there is zero evidence that the russian state was involved in the pathetic beauty contest which the US elites use to distract the more credulous citizens every 4 years. Why would they? They know damn well this quadrennial farce is a crooked game from start to finish. A game that only allows the same two contestants, the republican tweedledee and the democrat tweedledum to compete – both sides cheat like f++k on a massive scale so whatever skullduggery the Russian state could insert into that rigged crapshoot would have two chances of success, Buckley's and none.

But more important than even that is, even if the Russian State – oops sorry. . . "Putin" {said quickly with all emphasis on vowels none on consonants so it sounds more like a hoick & spit than a word} by some miracle did succeed so what? You cannot push a decent spliff skin between the dems & rethugs on the stuff which really matters.

Disagree? Check out the Tufts alumni diary entry for yesterday . The article tells us how the Senate Foreign Relations committee, who are the mob allegedly responsible for devising and implementing amerika's foreign policy, actually had a falling out on monday, a disagreement between a dem senator and a rethug member of the old boys steamroom and bar club.

This was the first public contretemps in decades. Wow I bet that was over something vital!

Nah, the dispute was over the murder of that Kashoggi creep, they reckon the dems wanted to slap Saudi with a wet bus ticket, whereas the rethugs preferred a damp feather as the instrument of corporal punishment.

Why on earth would anyone who hadn't bought a seat at the table e.g. the invaders of occupied Palestine waste energy, let alone the $30,000 that crowdstrike claimed Russia had spent on a forlorn hope of trying to get something up like sanctions relief, when everyone knows the correct way to do it is to bribe both sides with tens of millions?

Now "tens of millions" may seem a lot until you understand you will get it all back plus a lot extra for the hassle. Yep the amerikan pols become dependent on your 'donation' real quick. So from then on out, they find a way to give you money for some nonsense program which you then give back to 'em all as donations – less about 95% for expenses natch – but everyone is cool with that, they know there are considerable overheads in the lobbying biz.

That is why just about all of them plan on getting into lobbying themselves – just as soon as their little black books are chocka with the foibles of all the other congress-creeps and senate-slugs.

I watched the netflix doco "The Great Hack" which tries a camera eye view of the Cambridge Analytica investigation. IMO It reveals graun contractor Carole Cadwalladr to be the sort of deeply dedicated journo not too proud to let the facts stand in the way of a good beat up/fit up.

Shockingly for the graun, the target of this character assassination is a 'sister', yep another member of the victimised by patriarchy club.

A young woman by the name of Brittany Kaiser whose parents were financially destroyed by the cfc. After the family home was seized in 2014 she had to quit being an unpaid worker for the dems in DC & took an extremely well paid gig (VP) with CA. Apparently her conscience got the better of her so when the stories about what they and facebook had been doing came out she whistle blew in the US inquiry and the english parliament enquiry.

Too bad Cadwalladr decided she (Kaiser) would be useful in yet another graun attack on Julian Assange.

Kaiser had sent Wikileaks a couple bit coins back in the noughties when she was an idealistic Obama intern and bit coins weren't worth much. Years later she visited Julian at the Ecuador embassy on CA business and she insists that neither Russia or H Clinton's email were discussed, but Cadwalladr ran this article claiming she did both, without a scintalla of watchamacallit – evidence, proof whatsoever.

Of course in reality Kaiser may be nothing like the possum trapped in the headlights she presents as; this is a TV show (all over the torrent and usenet sites if like me, people prefer not to pay for the fibs they are told) in which both Cadwalladr & Kaiser get lots of time. For me Kaiser came across as someone acting more like a human than, the bigger the front, the smaller the back, Cadwalladr did.

None of us can ever know for sure who did what to whom during prez 2016, so we are left with considering the mountains of bulldust using our sense of humanity mixed with the few facts we can be sure of. In that light IMO, it makes zero sense for the Russian state to try on something that is so obviously doomed to fail, so they didn't.

Antonym
Good to see a factually well informed author here ATL void of ideology or theory. Mueller has bended truth when ordered since decades while looking like Eliot Ness. A good fella.
Martin Usher
The fundamental flaw in the whole "Russiagate" thing is the failure to differentiate between Russia, the state and its government, and Russians, individuals who are Russian nationals. This failure is a direct result of an inability to recognize that the Cold War finished 30 years ago, a failure highlighted by the breathless Tom Clancy style of reporting and reinforced by a huge military/industrial complex that recognizes that in the absence of war or threats or war their business is a bust.

I've always maintained that any connections Trump has with Russia are going to be based on money. As in "there are people who have lots of money who need some kind of investment vehicle to launder it" and "a tangled web of casinos and real estate holdings is a perfect laundromat for money of dubious origins". This doesn't automatically suggest that Trump's a money launderer for the Russian mob but rather there's no clear cut line between what's clearly criminal and what's clearly totally legal and a lot of businesses operate in the gray between the two.

(Politically, though, the last word on Trump support was spoken to me by a Hungarian/American colleague who intended to vote for him. He lived in Budapest and his interest wasn't in US domestic politics so much as not being caught in WW3. He thought Hilary was going to start a war, Trump would keep us out. I thought he was being a bit naive (and have been proven right) but you couldn't blame him for exercising an abundance of caution.)

[Jul 09, 2019] Crowdstrike - Cashing in on a scam

Notable quotes:
"... Maybe you saw this recent headline. The Democratic National Committee famously "rebuffed" a request from the FBI to examine its email server after it was allegedly hacked by Russia during the 2016 election. You probably remember that, but you've probably forgotten this ..."
"... Do private companies normally withhold access from the FBI to a crime scene, when that company already contracts with the FBI? What would be their motivation? ..."
"... Ignoring that for a moment, look at how competent Crowdstrike is since the DNC hack ..."
"... So in the past three years Crowdstrike: ..."
"... a) detected the DNC server hack, but failed to stop it b) falsely accused the Russians of hacking Ukrainian artillery c) failed to prevent the NRCC from being hacked, even though that was why they were hired ..."
"... In other words, Crowdstrike is really bad at their job. In addition, Crowdstrike is really bad at business too. CrowdStrike recorded a net loss last year of $140 million on revenue of $249.8 million, and negative free cash flow of roughly $59 million. ..."
"... CS denied the FBI access to their DNC paid for "analysis" without redaction. Why redact their own document? I cannot conceive of even a stupid reason to do this, let alone a plausible one ..."
"... Wonder if they were worried they would have to explain and testify under oath for or be asked if they could actually prove something ..."
"... It just goes to show that "getting it right" is not the same thing as "doing a good job." ..."
"... If you tell the right people what they want to hear, the money will take care of itself. ..."
Jul 09, 2019 | caucus99percent.com

gjohnsit on Tue, 07/09/2019 - 12:09am

Maybe you saw this recent headline. The Democratic National Committee famously "rebuffed" a request from the FBI to examine its email server after it was allegedly hacked by Russia during the 2016 election. You probably remember that, but you've probably forgotten this .

TYT can report that at the same time CrowdStrike was working on behalf of the DNC, the company was also under contract with the FBI for unspecified technical services. According to a US federal government spending database, CrowdStrike's "period of performance" on behalf of the FBI was between July 2015 and July 2016. CrowdStrike's findings regarding the DNC server breach -- which continue to this day to be cited as authoritative by everyone from former FBI Director James Comey, to NBC anchor Megyn Kelly -- were issued in June 2016, when the contract was still active.

OK. Nothing suspicious here. Just a harmless coincidence. NOT! Do private companies normally withhold access from the FBI to a crime scene, when that company already contracts with the FBI? What would be their motivation?

Ignoring that for a moment, look at how competent Crowdstrike is since the DNC hack.

The National Republican Congressional Committee was hacked during the 2018 election after hiring CrowdStrike, the cyber-firm that the Democratic National Committee employed that allowed DNC emails to be stolen even after the 2016 hack was detected.

The emails of four top NRCC officials were stolen in a major hack that was detected in April -- eight months ago, Politico reported Tuesday.

So in the past three years Crowdstrike:

a) detected the DNC server hack, but failed to stop it
b) falsely accused the Russians of hacking Ukrainian artillery
c) failed to prevent the NRCC from being hacked, even though that was why they were hired

In other words, Crowdstrike is really bad at their job. In addition, Crowdstrike is really bad at business too. CrowdStrike recorded a net loss last year of $140 million on revenue of $249.8 million, and negative free cash flow of roughly $59 million.

So what does a cybersecurity company that is hemorrhaging money and can't protect it's clients do? It does an IPO .

It just goes to show that "getting it right" is not the same thing as "doing a good job." If you tell the right people what they want to hear, the money will take care of itself.

Alligator Ed on Tue, 07/09/2019 - 2:23am
CS neither got it right nor did a good job

CS denied the FBI access to their DNC paid for "analysis" without redaction. Why redact their own document? I cannot conceive of even a stupid reason to do this, let alone a plausible one.

gj, with your trove of sources, why do you think CS redacted their own report--it's all fiction anyway?

Inquiring gators want to know.

Dalum Woulu on Tue, 07/09/2019 - 2:47am
Wonder if they were worried they would have to explain and testify under oath for or be asked if they could actually prove something.
Alligator Ed on Tue, 07/09/2019 - 2:49am
Good point

@Dalum Woulu Now if only Adam Schiff would subpoena CS and make them testify as to this...and then unicorns will graze on the grass in my back lawn.

Dr. John Carpenter on Tue, 07/09/2019 - 7:06am
I think this is most of the IT biz right here

It just goes to show that "getting it right" is not the same thing as "doing a good job."

If you tell the right people what they want to hear, the money will take care of itself.

It's all about making the people at the top feel smart for having hired you and assuring them they don't need to waste their beautiful minds trying to understand what it is you do.

Whoops, you got hacked? Gee, nothing we could have done. More money please!

[Jul 09, 2019] So what does a cybersecurity company that is hemorrhaging money and can't protect it's clients do? It does an IPO

Notable quotes:
"... So in the past three years Crowdstrike: ..."
"... a) detected the DNC server hack, but failed to stop it b) falsely accused the Russians of hacking Ukrainian artillery c) failed to prevent the NRCC from being hacked, even though that was why they were hired ..."
"... In other words, Crowdstrike is really bad at their job. In addition, Crowdstrike is really bad at business too. CrowdStrike recorded a net loss last year of $140 million on revenue of $249.8 million, and negative free cash flow of roughly $59 million. ..."
Jul 09, 2019 | caucus99percent.com

So in the past three years Crowdstrike:

a) detected the DNC server hack, but failed to stop it
b) falsely accused the Russians of hacking Ukrainian artillery
c) failed to prevent the NRCC from being hacked, even though that was why they were hired

In other words, Crowdstrike is really bad at their job. In addition, Crowdstrike is really bad at business too. CrowdStrike recorded a net loss last year of $140 million on revenue of $249.8 million, and negative free cash flow of roughly $59 million.

So what does a cybersecurity company that is hemorrhaging money and can't protect it's clients do? It does an IPO .

It just goes to show that "getting it right" is not the same thing as "doing a good job." If you tell the right people what they want to hear, the money will take care of itself.

[Jul 09, 2019] Crowdstrike mode of operation:

Jul 09, 2019 | caucus99percent.com

Whoops, you got hacked? Gee, nothing we could have done. More money please!

I think this is most of the IT biz right here

It just goes to show that "getting it right" is not the same thing as "doing a good job."

If you tell the right people what they want to hear, the money will take care of itself.

It's all about making the people at the top feel smart for having hired you and assuring them they don't need to waste their beautiful minds trying to understand what it is you do.

Whoops, you got hacked? Gee, nothing we could have done. More money please!

[Jun 20, 2019] FBI Never Saw CrowdStrike Unredacted or Final Report on Alleged Russian Hacking Because None was Produced – Consortiumnews

Notable quotes:
"... Yes, but in this particular witch hunt there were no "blind assumptions", as the process was agenda driven from the get-go. The task: Keep/Get Trump out of the White House by any means possible, blame the Russians, divert attention away from the leaked documents, and while you're at it, bury all the crime scene evidence we left lying around because we were so sure Hillary was going to be president. ..."
"... "In total, the amount of new controversies specifically exposed by Guccifer2.0's actions – was very little. The documents he posted online were a mixture of some from the public domain (eg. already been published by OpenSecrets.org in 2009), were manipulated copies of research documents originally created by Lauren Dillon (see attachments) and others or were legitimate, unique documents that were of little significant damage to the DNC. (Such as the DCCC documents) ..."
"... Of particular importance in this regard are the Forensicator's brilliant deductions that G2.0 has at various times been working in time zones corresponding to the US East Coast, West Coast, and Central Zone. (I note that Crowdstrike has facilities in Sunnyvale, CA, St.Louis and Minneapolis – and that the DNC servers are of course on the East Coast.) These findings are complementary to – and in my judgment, more compellingly definitive in dismissing the notion that G2.0 is Russian – than the discoveries highlighted by Bill Binney pointing to transferals by G2.0 and the source of the DNC Wikileaks emails passing through thumbdrives. ..."
"... You emphasize the important fact that G2.0 himself – supposedly a Russian hacker bent on destroying Hillary – posted nothing truly harmful to Hillary's campaign. ..."
"... Adam's linguistic analyses – endorsed by a professor who is expert in this regard – indicate that G2.0 has done a very poor and inconsistent job of mimicking the grammatical errors one would expect from a native Russian speaker communicating in English. ..."
Jun 20, 2019 | consortiumnews.com

Eric32 , June 19, 2019 at 16:04

I don't think this all that hard to understand.

1) The available metadata on the email files showing Hillary/Democrat election corruption that Wikileaks received indicates an in-office leak (maybe copying to a USB thumb drive drive), not an internet hack. That's what Binney is talking about, and he points out that as such, there is no EVIDENCE of Russian intelligence passing the email files showing Hillary/Demo party election corruption to Wikileaks.
Therefore, there is no EVIDENCE of Russia and evil Putin doing this "act of war on the US", as numerous media and politicized fools have claimed.
In normal human dealings, EVIDENCE, not just an accusation, is required before making judgments of guilt and invoking punishments.

2) If that metadata on the subject email files was faked to make it look like an in-office leak (by the Russians), then the FBI could request that NSA make available its data on hacked internet trace routes of packets of data from DNC servers to Russia, then show internet trace routes of packets of data from Russia to Wikileaks.
But apparently, Comey's FBI "investigation" didn't want to do that.

3) The subject DNC computer(s) were never turned over to the FBI. The first thing done in most investigations nowadays by local police, Federal authorities etc., is to seize relevant computers or any other comm. devices for forensic analysis.
No valid FBI investigation dealing with matters of national security, election hacking, validity of the election of a President, would hand off the computer forensics analysis to a company paid by and subject to retaliation by an entity (the Clinton machine, Democrat party) with a huge political stake in the results of the investigation, as was done in this "investigation".

4) The FBI wants leverage over the people they interview in criminal investigations – they have had enormous leverage over Assange, but they never interviewed Assange, who knew how the emails came into Wikileak's hands. They never interviewed Craig Murray, who says he knows a lot of what went on in the matter.

5) Hillary Clinton, the Democrat party, the FBI, the CIA had roles in paying British intelligence agent Steele (and others?), generate a fake dossier about Trump having Russian prostitues urinate on a bed the Obamas had used during a visit Russia, and depravely rolling around in it.
Top level FBI people used that fake dossier to get a FISA court judge to issue surrveilance warrants on Trump campaign/administration personnel in order to spy on them in hope of getting incriminating evidence. Among other things, that's a felony – that is, unless we live in a degenerated police state. That dossier was also leaked to the information media, which then widely gave it wide airing.

6) The attempted destruction of George Papadopoulos, a former Trump campaign adviser, by assorted intelligence operatives and the FBI, brings things down to an individual level.
Papadopoulos has been doing some interesting interviews. Here's one:
https://www.youtube.com/watch?v=ggNWpNZJjNg

hetro , June 19, 2019 at 20:21

Thank you for this:

We have Comey, close to the Crowdstrike chief forensics man (ex-FBI), we have Brennan pushing the Steele Dossier as THE evidence. And we have Mueller using these as main sources while being highly selective with witnesses. And we have FBI agents with Russian origin/double agents working people like Papadoupolis. Given Mueller must have known it was all going nowhere two years ago why the delay? Well, for one thing that delay certainly assisted brainwashing the American public into this hoax.

Bill , June 19, 2019 at 02:59

It looks like Mueller used the Crowdstrike report and just assumed it to be true.

John , June 19, 2019 at 14:57

The crowdstrike report was reviewer and verified by many IT security firms, and their conclusions were collaborated by the CIA, NSA, and every other national security agency in the country. What reason would he have had to doubt it?

Skip Scott , June 20, 2019 at 08:30

You're still trying to sell the "17 agencies" lie too? Unbelievable.

CitizenOne , June 19, 2019 at 01:11

Yup. In the game of disinformation what single characteristic of electronic documents would purveyors of disinformation make sure they did? Would it be to make sure they spell checked the document? Perhaps but more importantly they would be concerned about the ability to test the document by exploring the metadata. In fact since metadata is seldom questioned and is used as evidence for a documents origin it would naturally be a chief concern of the purveyors of disinformation. To not care about it would be the same possible misstep of a person that used a gun in some capacity which required forensic analysis of the weapon to determine who fired it.

Since everybody and their grandma knows that law enforcement looks for fingerprints on the recovered weapon there is generally not anybody who commits an illegal act with a gun who also does not scrupulously wipe down the weapon so it is sure to be free of any fingerprints. The actual occurrence of finding fingerprints on a weapon used in a crime is extremely low approaching zero.

The reason is everybody knows they have to wipe off the gun after firing it to remove their fingerprints. It is the same with metadata which are the electronic fingerprints on a document. Before publishing a document to be attributed to another party everybody knows that the metadata must be dealt with to pull off the con job. To leave this step out is the same thing as leaving ones fingerprints all over the document. Thus it would be a priority in any protocol to deal with this problem and I am sure there are folks in the government intelligence agencies that are skilled at manipulating the metadata on a bit by bit level to wipe off the real origin and to place fake electronic "fingerprints" on the document in order to attribute it to some other author or source.

Any investigation that concludes that a document comes from one source versus another based on metadata overlooks the similar capacity of a man with a gun that shoots another man killing him and then wipes off his fingerprints from the weapon, places the gun in the hands of the victim and claims after a "careful investigation" that the death was a suicide based on the fingerprints found on the gun.

Knowing this is possible the conclusions based on the metadata either assume that the author was an ignorant idiot lacking even the most basic understanding of criminal investigations not even knowing that the electronic fingerprints would get them in trouble or vastly more likely would have known such basic information about how electronic documents are tagged and would do their best to hide the truth by messing with the little ones and zeroes in the document to hide their involvement. They would even likely try to frame the victim as the perpetrator.

We call these situations kangaroo trials or witch hunts. They ignore the plausible reasons for the observed facts and just railroad the process with blind assumptions that the evidence presented is factual like believing a child that accuses the defendant "the bad witch" who cast a spell on her instead of looking at the possible ability and motives of the child to lie and then place appropriate weight on what are essentially unprovable accusations for what they are; impossible to prove.

Maxwell Quest , June 19, 2019 at 13:28

Yes, but in this particular witch hunt there were no "blind assumptions", as the process was agenda driven from the get-go. The task: Keep/Get Trump out of the White House by any means possible, blame the Russians, divert attention away from the leaked documents, and while you're at it, bury all the crime scene evidence we left lying around because we were so sure Hillary was going to be president.

Just like the evening news, this requires the expertise of keeping any facts which do not support your goals safely locked away, while others are manipulated or created out of thin air.

Curious , June 19, 2019 at 00:38

I am no fan of Mr Stone, but I wonder if his attorneys have the authority as a defense, to bring in Crowdstrike personnel and talk about their funding (I can hear the judge say 'inadmissible) and their full unredacted report. To whom did they give their research? Are the FBI that stupid or are they part of the plan?

While they are at it, bring in William Binney as a witness to talk about hacking in general, and the DNC servers in specific. Bring in Guccifer 2.0 himself as a witness, what the heck. Have a witness clarify on the record the very people Mueller never interviewed and make some very valid points as to why he didn't.

If Mr Stone wanted to spend some of his ill-gotten gains by blowing this ruse wide open I'm for it. He would probably recoup a lot of his money on a GoFundMe account if he did it correctly.

Of course he is against a corrupt judge who probably will not let it get that far, but why not try?

hetro , June 18, 2019 at 15:36

Many thanks to Ray's persistence; plus to Norumbega and Mark McCarty in comments below.

Particularly important (updated June 9, 2019), thanks for this link Mark McCarty!

http://g-2.space/

As to the puzzle of Guccifer 2.0 as false GRU hacker revealing damaging info on Clinton (a seeming inconsistency) I found the following (from the link just sited) helpful:

"In total, the amount of new controversies specifically exposed by Guccifer2.0's actions – was very little.
The documents he posted online were a mixture of some from the public domain (eg. already been published by OpenSecrets.org in 2009), were manipulated copies of research documents originally created by Lauren Dillon (see attachments) and others or were legitimate, unique documents that were of little significant damage to the DNC. (Such as the DCCC documents)

"The DCCC documents didn't reveal anything particularly damaging. It did include a list of fundraisers/bundlers but that wasn't likely to cause controversy (the fundraising totals, etc. are likely to end up on sites like OpenSecrets, etc within a year anyway). – It did however trigger 4chan to investigate and a correlation was found between the DNC's best performing bundlers and ambassadorships. – This revelation though, is to be credited to 4chan. – The leaked financial data wasn't, in itself, damaging – and some of the key data will be disclosed publicly in future anyway.

"All of his 'leaks' have been over-hyped non-controversies or were already in the public domain – the only exception being the apparent leaking of personal contact numbers and email addresses of 200 Democrats – and really that was more damaging to the reputation of Wikileaks than causing any real problems for Democrats. – Ultimately, it only really served to give the mainstream press the opportunity to announce that 'leaked emails include personal details of 200 Democrats', again, seemingly an effort to undermine other leaks being released at the same time by legitimate leak publishers."

Mark McCarty , June 18, 2019 at 18:32

Thanks for drawing further attention to Adam Carter's work and wonderful website – he has done a really heroic job of cataloging multiple lines of evidence pointing to Guccifer 2.0 being the furthest thing from a GRU hacker.

Of particular importance in this regard are the Forensicator's brilliant deductions that G2.0 has at various times been working in time zones corresponding to the US East Coast, West Coast, and Central Zone. (I note that Crowdstrike has facilities in Sunnyvale, CA, St.Louis and Minneapolis – and that the DNC servers are of course on the East Coast.) These findings are complementary to – and in my judgment, more compellingly definitive in dismissing the notion that G2.0 is Russian – than the discoveries highlighted by Bill Binney pointing to transferals by G2.0 and the source of the DNC Wikileaks emails passing through thumbdrives.

You emphasize the important fact that G2.0 himself – supposedly a Russian hacker bent on destroying Hillary – posted nothing truly harmful to Hillary's campaign.

Adam's linguistic analyses – endorsed by a professor who is expert in this regard – indicate that G2.0 has done a very poor and inconsistent job of mimicking the grammatical errors one would expect from a native Russian speaker communicating in English.

Adams' website also includes the Forensicator's discoveries showing that G2.0 intentionally placed "Russian fingerprints" in the meta-data of some of his postings. Beyond all this, if a GRU hacker were responsible for the Wikileaks releases, why on earth would he emerge publicly to brag about his exploit while intentionally leaving clues of his Russian origin? Would the GRU employ total nutcases?! Whereas G2.0's behavior makes perfect sense if his intention was to falsely incriminate Russia as the source of the Wikileaks releases.

I have to confess that I have little expertise in computer science, and hence would be susceptible to being bamboozled in this regard by propagandists. It's therefore important to note that I have gained the impression that both Adam Carter and Forensicator are functioning as honest scientific analysts, ready and indeed eager to disavow any of their previous conclusions when they realize they have erred. Intellectual integrity is a very valuable commodity, and my sad observation over the last several years is that it is far, far rarer than intelligence. So I commend Adam's website to those who seek an in-depth understanding on these matters, and are willing to cope with a measure of technical complexity.

John , June 19, 2019 at 00:42

Adam Carter and Foresnicator are frauds.
– "Forensicator" and Adam carter are both fake ID's created by created by a right-wing activist named Tim Leonard with a long history of working on disinformation campaigns.
– The "analysis" he did was gobbledygook to any seasoned IT engineer: Presumption of use of methods, tools and techniques nobody actually uses; essential variables glossed over, etc.
– The data file he "analyzed" was fabricated after the fact
– its creator also posted instructions on how to use it to "prove it wasn't a hack".
– The website where Leonard got the file from was managed by the GRU.

hetro , June 19, 2019 at 12:32

I would be very interested in following you information on this matter, so no need to hesitate longer on presenting whatever it is you have with the details we need to evaluate what you're saying, including links to authoritative sources. And–just a suggestion–leaving off the name-calling and overall emotional presentation you're offering would be a tad more persuasive. At this point, sorry to say, your arguments are thin and unconvincing.

Adam Carter , June 20, 2019 at 08:04

You're citing debunked bullshit invented by Duncan Campbell.

1. I'm left-libertarian, not right-wing.
2. Foreniscator is an American, I am a Brit. Although I write for a US audience, British spellings do sometimes slip into my articles. This doesn't happen in Foreniscator's work. An objective analysis of corpuses of both our work will make clear we're separate people.
3. Campbell is yet to actually debunk Forensicator's work as where Forensicator has debunked Campbell's "Forensicator Fraud" conspiracy theory and just recently dismantled Campbell's "Timestamp Tampering" technical theory too.
4. The NGP-VAN archive has long been available as a torrent (since the time the files were announced/released at a security conference in London), you're reference to "fabricated" here can only relate to Guccifer 2.0's releasing that evidence (though Campbell does try to engage in wordplay to mislead readers into thinking Forensicator or I may have fabricated something and even distorts Binney's testimony to try to make it look like Binney was accusing me of that – it's not true and, thankfully, Binney has cleared this up in an interview for anyone interested in reality.)
5. I got my copy of the NGP-VAN archive from a torrent posted to PirateBay, I don't think the GRU operate TPB.

For full details on how Campbell's nonsense has fallen to pieces, see: http://d3f.uk/duncan-campbell.html

hetro , June 19, 2019 at 15:39

Yes, it is saddening to see the intellectual integrity you speak of disappearing. In this respect I would like to acknowledge one more commenter below, deep in this thread–Eric32.

Seems to me Eric's statement here pierces the façade we've been discussing very well:

"No valid FBI investigation dealing with matters of national security, election hacking, validity of election of a President, would hand off the computer forensics analysis to a company paid by and subject to retaliation by the entity (the Democrat party) with a huge political stake in the results of the investigation."

geeyp , June 18, 2019 at 19:36

hetro – I just got to this material. Does any of it mention what happened to the man who was originally arrested as Guccifer 1.0?

hetro , June 19, 2019 at 12:33

It's my understanding that the original "Guccifer"–at just that, Guccifer, there is no 1.0 on it–, a Romanian, has been in jail for several years and is about to be released, or perhaps has been released. Someone may know.

As an aside (for some amusement only) I can't help noticing in studying this site indications the impersonator G2 was behaving a lot like David Atlee Philips, for those of you who have been looking into the JFK murder, and realize the significance of that name. Philips was fond of theatrics, as was G2 here according to the info on the site. This might suggest CIA creativity in play for this persona.

Again the site is:

http://g-2.space/

geeyp , June 20, 2019 at 00:15

hetro – Yes, I know there is no 1.0 on the original Guccifer's name. I only put it that way to make clear the individual I was timelining (look, I also just made up a new word).

geeyp , June 20, 2019 at 00:19

And ahh, yes. David Atlee Philips. A name that I recall quite well. I started my research into the JFK assassination in 1966.

DW Bartoo , June 18, 2019 at 15:15

The many excellent, informed and very educational, comments on this thread are much appreciated.

Reasoned, comprehensive, and thorough comments, fashioned by articulate, considerate commenters are stellar hallmarks of this site.

My deepest respect to all who contribute to maintaining such standards.

DW Bartoo , June 18, 2019 at 16:15

Especially, I thank, Adam Carter, Mark McCarty, and Norumbega for the education and insights you have provided on this thread and through other links.

Ray McGovern , June 18, 2019 at 21:06

Thanks, DW Bartoo.

And I add my thanks to what you have just expressed for the excellent, data-filled comments appearing under my article. I find the comments rich and instructive and, not for the first time, have learned a lot from them. Even most of the technical info comes through loud and clear to what Bill Binney calls, with sympathy, a "history major."

Dare I express -- again -- my frustration that we cannot get this story into any media that most folks access for their "news" about what's going on. Clearly, there are a lot of smart, knowledgeable people commenting here. Are none of us smart enough to figure out a way to get this story up and out?

I mean, DOJ, in an official Court filing, has just soaked James Comey in deep kimchi; THERE IS NO EVIDENCE THE RUSSIANS HACKED THE DNC. And we can't get that info out? Forgive me, but I fear the fault may not be so much in the stars, as in ourselves.

Let's address this key challenge like right here.

Ray

DW Bartoo , June 19, 2019 at 08:03

Ray, I read your response to my comment rather late last evening, well after eleven, and decided that although I quite agree with you, that the fault may very well be in ourselves and not our stars, that I ought sleep on it.

Odd as this may seem, for well over a decade, I have been chastising myself for having failed in the task I set for myself some sixty years ago.

I have long held it my responsibility to encourage people to think, not what to think or even how, but why, as human beings, living a finite life, on a planet that, for our purposes is paradise, we must engage in thought and consideration, not occasionally, not simply while in school or at work, but as our fundamental expression of consciousness.

Many of us, of a certain age have witnessed the harm our species may inflict upon the air, the water, the very soil around us.

Yet many are unable or unwilling to consider the the inner terrain may be as readily savaged, as callously ignored, as superficially dismissed as extraneous, as some internal "externality", if the thrust of society is dominance, unfettered acquisition, and narcissistic egoism.

Yes, you are absolutely correct, the current "narrative" that Russian hordes, genetically warped and mindlessly indifferent to all that is good, noble, and exceptional, have wrest "control" away from our natural betters, have infiltrated the empty minds of the deplorable, susceptible many, and hijacked the throne away from the anointed one, has led to a plethora of outrageous consequences.

Clearly, to some of us, this is obviously absurdity, but to those whose paychecks depend upon maintaining the tottering status quo, of Full Spectrum Dominance, over all aspects of life and especially over the thought processes of the many, this canard is as necessary as breathing if they are to go on with the comforts and perks of life they have come to depend upon, not merely for bodily well-being, but as proof that they are special, that they deserve to rule and lord it over the many.

So pervasive is this "sensibility", so deliberately inculcated is this sense of righteousness, this "right" to dominate and control,that it is nothing less than pathological.

That means that the larger narratives are shaped by a media owned by a handful of corporations, not just in the U$, but over much of the world, even as corporations, again a small and shrinking number, "own" and control governments, including the legal systems of those governments, readily control institutions of higher learning and so on.

Corporations control the voting systems of our pretend democracy making mock of the very notion of democracy itself, permitting a rising chorus to sing that the very idea of democracy is foolish.

In other words, our culture, our very language is being used to circumscribe thought, to delimit imagination and the formation of new, different, or alternative narratives of how to construct and maintain a sane, humane, and sustainable human future.

Frankly, in the U$, we have no longer even the pretense of an intellectual heritage, of any true openness to new thoughts or perspectives, and those who would dare expose the larger, more pervasive corruption that permits and sustains false narratives such as "Russia did it!", such as Julian Assange, Chelsea Manning, and others, not least the members of VIPS and the commenters here are, at worst, hounded, threatened, imprisioned, at best ignored, maligned, and dismissed as "too negative", or "conspiracy theorists".

Nonetheless.

I see few give up or knuckle under.

I have known more than a few who have died, while still trying.

Yet we still are, overall, a few.

So, what shall we do?

Realizing that our task is neither financially nor socially rewarding, how shall we become more effective at getting some necessary messages across or through walls of fear, indifference and, frankly, induced ignorance?

What, specifically, is our goal?

Is it "simply" to find some way past Mark Twain's observation that it is easier to fool people than to convince them they have been fooled, about some specific narrative?

Or does it require some broader examination of the means by which such narratives are induced, promulgated, and enforced?

Is it both these things and more?

If the inner terrain of consciousness is exploited, savaged, and ravaged, then how shall there be healing sufficient to combat the "learned helplessness" which is the overall intent of those who seek to control, generally not with outward brutality, but with subtle psychological coercion, the many?

It would seem, it would appear, that what we face, the manipulation of consciousness, the internalization of submission, dressed up to appear like patriotism or "common sense" that cannot, rationally, be argued with, an inculcated mesmerization of compliance and diminished curiosity, these things require far more than simply pointing out fallacious narratives to a society convinced that it is so special that it is beyond question of any sort, no matter what might be done in the name of the many.

What do we do?

Perhaps we should try to actually get together, meet each other, sit down and talk to one another.

For are we not vulnerable if we use an electronic, digital media subject to the control of those who may "ban" us, "de-platform" us, determine that we are unworthy of even having a voice, especially as larger "authority" moves to undercut the rule of law to such a degree as to render "law" into an empty form with which it may bludgeon any or all of us into silence whenever it feels like doing so?

Further, if we debunk narratives that need such debunking, what narratives of a better future have we prepared, have we honed, that might inspire a willingness to explore the possibilities of meaningful and vitally necessary change?

Who has coherent ideas about creating a more healthy and rewarding society based on something more like common empathy and mutual support?

Who is articulating visions that might encourage the young to feel that this world that we bequeath them is not royally fucked for the dubious benefit of a mere handful of individuals who care about nothing but themselves.

Certainly it must be appallingly obvious that those who seek dominance and wealth at the expense of others are not the best and brightest, that they are among the least able and least compassionate, in fact, the very ones whose pathology is detrimental to the continued existence of the human species, and that of many other species, as well.

How do we undo the madness, disarm the learned hostility and violence?

Do we simply TALK LOUDER?

Do we simply TOOT OUR OWN HORNS or BEAT OUR OWN DRUMS more obnoxiously?

Or, do we dare continue on, seeking ever more effective connection, ever more opportunities of one to one conversations, where we not only talk, but also, listen?

I agree, let us not curse our stars.

Let us not blame fickle fate, as so often do those who lead the many into war or privation, into precarity, or famine.

Let us not claim that the deteriorating environment is caused by Sun Spots or desperate peoples driven to the brink by exploitation and avarice.

However, let us not imagine that the many who still are comfortable, who still believe the nonsense, may not yet succumb to the siren calls for war, for punishment, however brutal, of those who would expose the secrets of power while exposing the comfortable to their own complicity – which might well be what the still-comfortable might consider to be the greater "crime".

Do I have answers?

No. However I do have questions that might suggest some ideas.

I am very certain that the same is true for most every one of us.

Let us share these ideas, even as we seek to debunk the deceits, as we provide the elite with opportunities to expose and reveal their lies and corruption.

No single one of us will solve much of anything. No one has all the answers.

Those who await saviors, wait in vain.

Our future is very iffy.

If someone has a theory or a plan, beyond keeping on, then please share it.

Do not prattle on about "hope".

Do not say, "Well, we have always muddled through before, and shall do so again."

For we are in territory, outwardly, because of our "abilities" to destroy ourselves unlike anything our species has confronted heretofore.

Yes, "Russiagate" must be debunked before it leads to war.

Yes, humanity is fast approaching a place where it can take no more ..,
for granted and without thought, from a finite world.

Neither can our species long endure further empires of brute power or subtle manipulation.

Do not say, "Well, that is just human nature", for it is learned attitude and prejudice to claim so.

To continue such excuse, for that is what it is, ensures extinction, even for the idiots who "get off" the First Strike.

Now, my intent is not to depress, nor to impress, merely to suggest that such future as we might have is up to us.

So, it might be of worth to not spend too much time cursing ourselves for failing to make much headway.

It might take calamity to shake the complacent from their happy stupor, it may well require catastrophe.

Perhaps, just perhaps, patient reason might prepare the way for changing minds.

It is the internal terrain that must be pondered, quite as much as the outer manifestations of behavioral absurdity.

Why do so many believe absolute nonsense?

Perhaps they simply cannot access enough imagination to consider anything else, especially if the external mythologies bolster their internal emptiness?

What do you think?

Pissedoffalese , June 20, 2019 at 03:01

You write well. A rarity.

Mark McCarty , June 19, 2019 at 17:20

The challenge we face, Ray, is that most MSM simply will refuse to report FACTS that contradict the official Russophobic Deep State-driven narrative. Note, for example, that the recent revelation that the OPCW censored its own technical experts in preparing its politically-biased conclusions on the Douma "gassing" incident, simply isn't being reported in MSM. Our MSM are now practicing a type of criminality that one would have expected from the "journalists" in Nazi Germany.

There may be one small ray of hope. Tucker Carlson at Fox has been notably contrarian on some issues, and has featured such luminaries as Aaron Mate, Glenn Greenwald, Michael Tracey, and Tulsi Gabbard. Tucker is definitely skeptical about arguments driving us into needless wars and conflicts – he got Iraq wrong, and, unlike most of the journalists who did, he is sincerely penitent – and just a couple of nights ago he actually dared to question whether there is real evidence supporting the "Russian meddling" claim, reporting the essence of THIS ESSAY of YOURS! It is not inconceivable to me that you or Bill Binney might be able to get onto his show. And this might become more likely if prosecutor John Durham begins to look seriously at the "evidence" which Brennan, Clapper, and Comey used to justify their fraudulent ICA.

Tucker's show has the highest ratings on Fox, and he is very skeptical of the rampant Russophobia of our day – he views China as a truer rival. I have no idea how you might get through to him, but perhaps Mate, Greenwald, or Tracey – all major Russiagate skeptics – might have some insights.

And let me take his opportunity to offer my heartfelt thanks for your wonderful essays and your political activism over the years. I've been following your work diligently ever since VIPS emerged in the run up to the Iraq catastrophe.

Fazsha , June 18, 2019 at 13:54

The corruption is well documented on the internet- Comey is immoral.

Carolyn , June 18, 2019 at 09:24

Guccifer 2.0 was another trick of the Dems, created to provide substantiation of Russian hacking of DNC computers. It was the Democrats who produced Guccifer 2.0.

John , June 18, 2019 at 09:51

By that logic, it was the Democrats who sabotaged Hillary Clinton's Convention by releasing supposedly anti-Clinton documents on Wikileaks a day before. That makes no sense.

Skip Scott , June 18, 2019 at 12:41

It makes complete sense, and is the origin of "RussiaGate". They knew Wikileaks was going to release the data they got from a LEAK, so they made up G2 to shift the story and blame it on Russia. With their MSM lackeys playing along it worked like a charm. No MSM ever mentions the damning CONTENTS of the DNC and Podesta emails, just RUSSIA, RUSSIA, RUSSIA! Only I think it was Brennan's baby, with DNC complicity.

DW Bartoo , June 18, 2019 at 16:50

Guccifer 2.0 may well have been Brennan's baby, Skip Scott, although I am more inclined to consider 'twas Crowdstrike which hatched the wee tyke, though Brennan could well have been Godfather.

John , June 19, 2019 at 00:22

Does anyone here have any evidence that Crowdstrike or Brennan created G2?

Stygg , June 19, 2019 at 15:15

Does anyone have any evidence that they didn't? If he's real, surely his existence rests on solid ground.

Adam Carter , June 20, 2019 at 08:20

CrowdStrike claimed Russians hacked in and grabbed opposition research from DNC. Next day Guccifer 2.0 turns up with the opposition research (with files apparently tainted by Russian metadata).

However we learned that the research (and the other document it was mangled with) really came from Podesta's attachments rather than the DNC and we know the Cyrillic metadata/stylesheet entries/etc were introduced through a process that was deliberate and not the result of simply mishandling the files.

So we know Guccifer 2.0 was fabricating evidence and doing so in accordance with the claims CrowdStrike had made the previous day.

Not hard proof but certainly a strange symbiosis. <img alt='' src='https://secure.gravatar.com/avatar/8343f58fddad1153baafd2f05fa5c098?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/8343f58fddad1153baafd2f05fa5c098?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Fazsha , June 18, 2019 at 13:56

Two words: Seth Rich.

Bob Van Noy , June 18, 2019 at 11:08

You're right Carolyn, and Bill Binney can prove it. See video in previous post

DW Bartoo , June 18, 2019 at 16:40

Clearly, Carolyn, Guccifer 2.0 was a confection. If not of the DNC, then, most likely, of CrowdStrike.

Just as clearly, Guccifer 2.0's announcement of being the "hacker" would be mightily useful for those claiming Russia did it, especially if incriminating little identity clues pointing toward unprofessional clumsiness, "Oh my Gawd! The Russians are hacking!", could be strewn about.

Determining such things, seizing upon contrived "sloppiness" and such things, is well beyond my knowledge base. However, imagining the means, the subterfuge that would be used to psychologically manipulate the many, especially considering both "manufactured consent" and "learned helplessness" are both part of the "methodology", we have all long observed, comes far more readily to mind.

Bob Van Noy , June 18, 2019 at 08:34

This article is also available at information clearinghouse and accompanied by a valuable video presentation and exchange that further clarifies what has happened. It also includes yet more insight by William Binney

http://www.informationclearinghouse.info/51776.htm

Bob Van Noy , June 18, 2019 at 08:48

Bill Binney, in that video, makes two very important points 1) That it's important to realize that when this began the opposition research assembled by the Hillary team was being assembled against all possible opposition including the Democrats own Bernie Sanders. And 2) Bill Binney extends the ultimate blame way back to President Ford pardoning Richard Nixon for his Crimes, thus creating the concept of pardoning all previous administrations of guilt. Keep in mind that Cheney and Rumsfeld were on that staff

DW Bartoo , June 18, 2019 at 13:24

Thank you for the link to that Bill Binney – Larry Johnson interview, Bob Van Noy.

It is absolutely a must-view history of what occurred around the Russiagate idiocy that was intentionally contrived to mislead, not only US citizens, but also British subjects and Europeans generally, with the deliberate intention of rekindling the Cold War and building a lock-step willingness among the people to engage in official hostile behavior by the governments involved toward Russia, specifically, but China as well, from the imposition of sanctions and tariffs, to the claims of the "necessity" of First Strike "options", all the way to nuclear warfare.

Beyond that, there are substantive questions that raise issues of criminal behavior, on the part of US intelligence officers, and others, ranging from the sedition of an attempted coup to outright treason.

Yes, it is that serious.

The CIA, the FBI, Brit intelligence, and possibly other "friendly" foreign intelligence agencies, "very likely", conspired to undermine the US election process of 2016 to ensure the election of Hillary Clinton, which many of the actors obviously considered would be a "slam dunk". Meaning simply that their illegal and unConstitutional activities would never be discovered or held to account.

My continuing appreciation to the members of VIPS, to Consortium News, and to other sites that have consistently dared examine, consider, and seek to hold to account those, including members of the political class, who have sought to undermine truth, justice, democracy, and trust for political power and financial gain. The degree of corruption, which must be exposed, held to account, AND punished, is of such a level and destructiveness that, were our society to fail to do these things, we would guarantee the likelihood of our future being nasty, brutish, and short.

OlyaPola , June 18, 2019 at 01:24

" the unintended consequence of poorly executed foreign policy could be the potential end of the U.S. dollar as the world's currency of choice in international trade as nations around the world attempt to minimize the impact of Washington's sanctions."

Unintended consequences are functions of both formulation and implementation both of which do not necessarily restrict the unintended consequences to the " the potential end of the U.S. dollar as the world's currency of choice", a component part of formulation being predicated on notions that " the U.S. dollar (was/is) as the world's currency of choice (rather than a function of coercion in myriad forms).

"Unintended consequences" are consequently functions of intended consequences – an example of the mantra that "The United States sometimes does bad things, but always with good intentions".

John Drake , June 17, 2019 at 21:03

Good follow up on your previous revelations Ray.
"I was making decisions in an environment where Hillary Clinton was sure to be the next president."(Comey) Certainly demonstrates the FBI director's lack of integrity and objectivity. A ladder climber not a real cop, only interested in his career trajectory; willing to fix the intelligence to get along.
So much for serving his country; but it speaks also to the incredible negative influence the Clintons have had on our nation.

David G , June 17, 2019 at 20:51

Has anyone ever asked Comey whether he sought, or why he didn't seek, a court order to seize the DNC server and other relevant hardware? Even the members of Congress who seem inclined to interrogate him a little on this subject are content to let him act like some helpless guy who would've liked to have gotten the computers, but aw shucks, he just couldn't swing it.

(I'm not sure a court order would even have been necessary: cops and the FBI take custody of evidence at crime scenes all the time on their own authority.)

jeffmontanye , June 17, 2019 at 22:46

the fbi also claims, to this day, that it never looked at seth rich's phone or computer.

John , June 18, 2019 at 09:16

You mean, "Why didn't the FBI try to cripple the DNC, but not the RNC, several weeks before a Presidential election, by seizing all the computer systems the national party uses to coordinate political activity and communicate with state party workers?"

Or do you mean seize them after the election, when the systems were already cleaned and/or wiped and rebuilt, all viable evidence long gone?

David G , June 18, 2019 at 12:06

I mean what I asked: why has no one ever put the question directly to Comey?

I'm not sure if your answers to the question I would like to see put to Comey make sense, but they're not an explanation of why he has been spared the effort of supplying such rationales (or possibly better ones) on his own.

David G , June 18, 2019 at 12:42

While you evaded the question I actually asked, your answers might be something like what Comey would say if he were ever confronted on the subject. Of course the only way to find out for sure

In any case, while they're not ridiculous answers, especially compared to what Russia-gate has accustomed us, I'm not ready to buy them either.

The Clinton campaign in its final weeks wasn't being run out of the DNC HQ in DC. It was being run from – brace yourself – the Clinton campaign HQ in Brooklyn (albeit dysfunctionally). The DNC fulfilled its key role months earlier when they rigged the race against Sanders. If you think some disruption at the DNC in the final weeks of the race would have unfairly crippled Hillary's campaign, you should explain exactly how.

For your second point, part of what one might ask Comey is why he didn't get a court order forbidding the DNC from having their systems "cleaned and/or wiped and rebuilt" before the FBI could get a look at them. I don't suppose any operation wants to keep malware (assuming such actually was present) on the premises, but law enforcement isn't known for being super solicitous about such inconveniences when conducting investigations, and the DNC are big boys and girls with more resources than most would have had to draw on to keep the lights on in a pinch – especially if it was for the *patriotic* cause of gathering evidence of the dastardly attack on Democracy Itself by the nefarious, onion-domed, Muscovite menace bearing down on every apple pie and baseball game in the land!

John , June 18, 2019 at 23:46

I didn't evade squat. I answered your implied comment, because your explicit "why didn't Comey" question had no explicit answer.
– No third-party can realistically know "why" anyone does anything, unless that person tells you. Comey didn't. And you asked the question at US, not him.
– Since the explicit question was unanswerable, that meant your question only had implicit answers.

When you asked why didn't Comey try to get a court order to seize the DNC computers, you implied he SHOULD HAVE attempted to seize them, (with a lesser implication that only some guilt or nefarious purpose was behind Comey's decision not to.)
– I simply provided some of the very realistic reasons why the FBI should NOT have atttempted the acts you implied Comey should have done.

John , June 19, 2019 at 00:00

And let me remind you – the DNC was not just assisting with the Clinton campaign.
– They were supporting Congressional, State and even local elections up-and-down the ticket.
– They were coordinating canvasing groups, running polls and supplying resources to all sorts of down-ticket efforts.

So your FBI seizing the DNC computers would have hamstrung EVERY Democratic candidate, not just Clinton.

And all your "big boys and girls" comments disregards the big problem – the DNC would have be DOWN. For a while.

DW Bartoo , June 19, 2019 at 11:40

Interesting assertion, John, that Hillary and the DNC were supporting local and state committees and candidates.

Likely you have neither seen nor heard of FEC (Federal Election Commission) records which paint a rather different picture?

The "Hillary Victory Fund" claimed that Clinton raised big "bundled" checks of $350,000.00, and more, some $84 million in total, of which the states got to keep 1% (such an elite number), according to the FEC, which regarded this money as "laundered" through "legal loopholes", using the state committees to pass the cash on to the Clinton Campaign.

Further, the FEC, revealed that the DNC has paid Clinton $1.65 million to rent access to her email list, voter data, and software produced by "Hillary For America" during her 2016 presidential campaign.

Now, you can argue an number of things.

You can just say, "It ain't so!", offering nothing to support your contentions, thus implying that the Legacy Political Parties AND the status quo are simply above question or reproach. That such parties are not only above the law, but owe no allegiance, in any way, to the many, that these two parties are Private Clubs, not public institutions, and can do, or not do, anything that they wish.

Or, you could say that the DNC owes Hillary because she financed the DNC, in 2016, and that the "Victory" funds and the "rental fee" are merely her due.

Of course, were you to claim the latter, then you would have to make clear that such financing involved neither control nor guid pro quo, that it was simple generosity in theone instance and merely "business", in the other.

Following on with quo, do you imagine, "looking forward", that Biden will win in 2020?

Should the Dems seriously fight for medical care (not insurance) for all?

Should the Dems call for an end to endless war, or go all in for drone, AI, and robots to further "humanitarian interevention" (of course, we have to kill some folks, how else to ensure peace)?

Should the Dems have interest in preserving the environment (you know, for the kids)?

Should the Dems be for an actual, functioning rule of law (not lip service; think Julian Assange and Chelsea Manning, are the receiving justice)?

Or, should the Dems just run on, "We ain't him!"

I realize that you would likely not wish to presume what the Dems should or should not do, that being speculative and not "normal"
procedure.

Having said all that, John, and realizing that your perspective differs greatly from the perspectives of many, here, I appreciate the civility of your comments. <img alt='' src='https://secure.gravatar.com/avatar/41a9461a080acb5ce5be55f471100a9e?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/41a9461a080acb5ce5be55f471100a9e?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

John , June 19, 2019 at 12:49

Nice cherry picking and misrepresentation, DW Bartoo.

The DNC did a whole bunch of other fundrasing besides the "Hillary Victory Fund".
– The "Hillary Victory Fund" was setup to take money excplicitly just for Clinton, and raise ~$85 million.
– However the DNC in total raised about $350 million for the 2016 campaign. The rest of the money went elsewhere.
– You cherry-picked the "Hillary Victory Fund" spending and made it look like it represented the entire DNC spending, when it didn't.

Misrepresnetations like this do nothing to boost your credibility. <img alt='' src='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

DW Bartoo , June 19, 2019 at 14:01

So, John, you are going with, "It just ain't so!".

Yet you have nothing to say about the Democrats being a Private Club which has no allegiance, of any sort, to the many?

That is the essential aspect which 2016 revealed.

2020 presents a perfect vision of total failure for the Di$mal Dollar Dem$.

A rallying cry of, "We ain't Trump, we Biden!",
will take you, all, down and out.

The Dustbin of History awaits, truly s most well-deserved, well-earned fate.

BTW, your accusatory comment, some distance up-thread, reveals not skill in honest debate, the factual refutation of or challenge to the perspective of others, but the slander of
ad-hominem assault. <img alt='' src='https://secure.gravatar.com/avatar/b6aff30e494a12fc94f4a2e6847c27b0?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/b6aff30e494a12fc94f4a2e6847c27b0?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Skip Scott , June 19, 2019 at 14:24

With the resources the DNC had at its disposal, the down time could have been minimal. Your telling me they couldn't afford to replace the equipment and have it set up and keep the down time to a matter of hours or less? <img alt='' src='https://secure.gravatar.com/avatar/113284c81cd9a82e0d194ce5f7039233?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/113284c81cd9a82e0d194ce5f7039233?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

philnc , June 19, 2019 at 18:31

" the DNC would have been DOWN. FOr a while." Doubtful. Any enterprise of the DNC's size, whatever e-mail service it uses, should maintain (or contract for) regular backups of their data and have a DR (Disaster Recovery) plan to restore service in the event the existing servers go offline without warning. If they failed to take those measures then it should raise questions about whether there was anything "big" about the people running that operation. <img alt='' src='https://secure.gravatar.com/avatar/e4ddc63bb6791a32d847a14c7f904a41?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/e4ddc63bb6791a32d847a14c7f904a41?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Pissedoffalese , June 20, 2019 at 03:35

I love you, the way you write anyway. Yer probably a one-toothed old shit living out in the middle of Kentucky, but you turn a nice phrase.

tom , June 19, 2019 at 16:24

Wasnt that a crime scene?

Mark McCarty , June 17, 2019 at 17:28

With respect to the creation of the Marble Framework program, I would like to ask: What can be the legal or ethical basis of creation of a tool that enables hacks to be falsely attributable to others? Such an action, even if used against a foe, would be intolerably vile. I suggest that anyone who engaged in the creation of this program should be fired, stripped of all pensions, indicted, tried, and sentenced to a lengthy prison term. Indeed, anyone in our government who would tolerate such conduct should be finding another line of work.

jeffmontanye , June 17, 2019 at 22:48

i'm willing to wait on that trial if we can expedite the mass murder trials of 9-11. trump has said it was bombs not planes that destroyed the wtc.

geeyp , June 18, 2019 at 19:43

Good one, Jeff. We should start where this all started.

Norumbega , June 18, 2019 at 06:08

To my understanding Marble Framework was a subset of tools within the what has been called Vault 7. One of the tools within that subset, I forget what its name actually is, is the language "obfuscation" tool that everybody talks about.

I would say "it just goes with the territory". Hacking as such is illegal by definition and it stands to reason that hackers will take what steps they can to disguise their own identity. Conversely, solid attribution to particular actors is said to be generally very difficult.

But see my reply to John, below, reporting a new discovery of fraud in the malware samples CrowdStrike put in its report. If confirmed, that would indeed be vile and shocking conduct. We're talking about ratcheting up tensions toward war as a result of this, and fundamentally deceiving the American people.

And see my reply to John A giving my opinion that the focus on Vault 7 misdirects attention that would better be directed toward the actual steps that were used to put those "Russian fingerprints" into some Guccifer 2.0 metadata, as already fairly well understood by analysts like Adam Carter.

Pissedoffalese , June 20, 2019 at 03:44

FIRED???

Firing SQUAD more like.

That'd be MY pleasure, but I'm kinda warped.

Jim Glover , June 17, 2019 at 16:54

Well this helps explain why Pelosi knows that Impeachment of Trump will not only fail but blow up in their face.

Andrew Thomas , June 17, 2019 at 18:53

Only because of their utterly imbecilic reliance on this made-up scenario. The Dems are obviously convinced that the made up crap about Muslims that has led to the outrage of the Muslim ban, the lies about the border emergency, the savaging of all of our laws by ICE on the border, the self-dealing, etc. etc. ad infinitum, though obviously impeachable offenses, wouldn't play well among soccer moms or hockey dads or whatever group it is counting on in 2020.

jeffmontanye , June 17, 2019 at 22:50

donald trump is a lucky man, but perhaps his greatest good fortune is history's choice of his opponents.

Eric32 , June 17, 2019 at 16:29

The Federal "justice" system can create crimes that never happened, avoid collecting evidence that would prove these crimes didn't happen, issue subpoenas and warrants, force people into bankruptcy hiring lawyers, interrogate people until they can entrap them in statements and actions that they can pretend are lies or obstructions to "justice", put innocent people in lockups with violent street criminals, into solitary confinement to debilitate them mentally and physically.

And why not? If you can publicly murder a President and then obviously cover it up and pin it on a patsy, with no consequences, then the Clinton coverups and political destruction operations are a small thing.

Washington networks have long deep histories.
Or is it just a coincidence that Mueller's wife is from the Cabell family – one of whom was the assistant CIA director who John Kennedy fired after the failed Bay of Pigs operation, and whose brother was mayor of Dallas when Kennedy was ambushed in rifle attacks, and was revealed in FOIA document releases to have been a CIA associate.

jaycee , June 17, 2019 at 16:26

From manufacturing consent to manufacturing reality There's been a determined effort to use portions of the Mueller Report to not just buttress the notion that an official Russian government operation indeed "hacked" the DNC to support the opposition candidate, but to assume this information as Established Fact. The revelation that the US government investigators relied entirely on a redacted draft from a private firm with huge conflicts of interest severely challenges this concept, and this obvious weak link now joins the sad list of unprofessional conduct including use of the Steele dossier to establish surveillance on a political campaign, and the description of a State Dept informant as a GRU agent even though Mueller's office had the proper information.

As exhibited in comments below, the partisan divide in America is as wide as it has ever been, with two camps hurling insults while believing only what they want to believe irregardless of factual evidence, and a third camp just trying to navigate through what can be objectively determined. In my observation, commentary over the past three years on this story by groups like VIPS have held up pretty well, while most of the legacy media and partisan bloggers such as empty wheel have embarrassed themselves.

Abby , June 18, 2019 at 01:53

The funny thing is that people who buy into this Russian propaganda nonsense is that they excuse Hillary for actually working with people from foreign countries. Steele who wrote the dossier is from the U.K.. He worked with people in Russia and elsewhere to create it. Hillary paid for him to get 'dirt' on her opponent which is against the law. Taking information or anything from a foreign country to advance her campaign. But the biggest stink here is that she used her party's intelligence agencies to spy on her opponent. This sure seems like shades of what Nixon did

But her supporters don't have any problem with that

Abe , June 17, 2019 at 16:18

Google has a cozy $100 million "shared kindred spirit" with "best in class" Crowdstrike.

In this video, Google Capital's Gene Frantz and Dmitri Alperovitch's buddy George Kurtz discuss what led to Google's decision to back Alperovitch and the Keystone Cops at Crowdstrike.
https://www.youtube.com/watch?v=CRMPZp70WVI

CrowdStrike received funding of $156 million from Google Capital, Accel Partners, and private equity firm Warburg Pincus.

According to the company, CrowdStrike customers include three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. CrowdStrike also keeps "Partners" like Amazon Web Services (AWS) and Google Cloud Platform out of the clutches of invisible bears.

CrowdStrike still "stands fully by its analysis and findings" (aka evidence-free allegations) of "Russian intelligence-affiliated adversaries present in the DNC network" in 2016.

Crowdstrike and Bellingcat benefactor Google, the company that runs the most visited website in the world, the company that owns YouTube, is very snugly in bed with the US military-industrial-surveillance complex.

In fact, Google was seed funded by the US National Security Agency (NSA) and Central Intelligence Agency (CIA). The company now enjoys lavish "partnerships" with military contractors like SAIC, Northrop Grumman and Blackbird.

Meanwhile, Crowdstrike is growing very fast. It achieved $250 million in revenue in fiscal year 2019 compared to $119 million in fiscal year 2018, 110% year-over-year growth.

In May 2019, Crowdstrike, filed a SEC Form S-1 to raise $100 million for their initial public offering. It is the first American cybersecurity company to file and IPO in 2019 and second overall after the Israeli company Tufin.

Crowdstrike believes it is creating a new category called the "security cloud."

Given the enormous cloud of smoke blown by Alperovitch and Crowdstrike, there definitely is truth in advertising.

David Otness , June 17, 2019 at 23:53

Thanks, Abe. Keep the truth coming -- while we are yet able.

"The funding of "The Trust Project" -- coming largely from big tech companies like Google; government-connected tech oligarchs like Pierre Omidyar; and the Knight Foundation, a key Newsguard investor -- suggests that an ulterior motive in its tireless promotion of "traditional" mainstream media outlets is to limit the success of dissenting alternatives.
Of particular importance is the fact that the Trust Project's "trust indicators" are already being used to control what news is promoted and suppressed by top search engines like Google and Bing and massive social-media networks like Facebook. Though the descriptions of these "trust indicators" -- eight of which are currently in use -- are publicly available, the way they are being used by major tech and social media companies is not."
" .Even if its effort to promote "trust" in establishment media fail, its embedded-code hidden within participating news sites allow those establishment outlets to skirt the same algorithms currently targeting their independent competition, making such issues of "trust" largely irrelevant as it moves to homogenize the online media landscape in favor of mainstream media."
https://www.mintpressnews.com/the-trust-project-big-media-and-silicon-valleys-weaponized-algorithms-silence-dissent/259030/?fbclid=IwAR26cfboaHlUptEt4Lnt4NToqFRRLfmC5xzqqJx6DAAgZTqZD8PDSJADwvQ

michael , June 18, 2019 at 07:17

Their more competent (and dangerous) partner:
https://www.nytimes.com/2019/01/13/business/media/democrats-disinformation-election-interference.html

https://techcrunch.com/2018/08/28/new-knowledge-just-raised-11-million-more-to-flag-and-fight-social-media-disinformation-meant-to-bring-down-companies/

hetro , June 17, 2019 at 15:58

The trolls/propagandists are arriving again with their silly BS about being patriots and not "communists" etc. plus assuming they're in a nest of Trump supporters and Putin lovers. Their ignorance of CN, and the pathetic, childlike quality of these comments, resembles the five year old disappointed with his birthday party.

I'm looking forward to a complete narrative of details on what has been revealed, piece by piece, going back to at least when Assange announced he had a leak on the Podesta emails and the DNC.

The case, in general, and putting it mildly, indicates Official Bias to discredit Trump–clung to, expanded, drummed home in the daily news, and given the semblance of seriousness by an already compromised Mueller investigation.

I realize that to want this case detailed, as part of the question what US official credibility is left, if any? is to be a horrible commie freak SOB supporter of Putin, when I should be saluting the flag and genuflecting toward Washington.

Abe , June 17, 2019 at 15:50

Actual espionage and infiltration of election systems by Israeli intelligence, not to mention direct interference in US electoral politics by the pro-Israel Lobby organizations backed by the Israeli government is being assiduously ignored by most mainstream and independent journalists, as well as veteran intelligence professionals.

Not a peep, nary a whisper from our vaunted VIPS about such matters as this:

"Following the 2016 election and the heavily promoted concerns about 'Russian hackers' infiltrating election systems, federal agencies like the NSA have used that threat to lobby for greater control over American democracy. For instance, during a 2017 hearing then-NSA Director Adm. Mike Rogers stated:

"'If we define election infrastructure as critical to the nation and we are directed by the president or the secretary, I can apply our capabilities in partnership with others – because we won't be the only ones, the Department of Homeland Security, the FBI – I can apply those capabilities proactively with some of the owners of those systems.'

"With Rogers – who is now employed by the Microsoft-funded and Israeli military intelligence-connected company Team8 – having lobbied for the direct involvement of U.S. government agencies, including the NSA and DHS, in supervising elections, it seems likely that ElectionGuard will help enable those agencies to surveill U.S. elections with particular ease, especially given Microsoft's past of behind-the-scenes collaboration with the NSA.

"Given that ElectionGuard's system as currently described is neither as 'secure' nor as 'verifiable' as Microsoft is claiming, it seems clear that the conflicts of interests of its developers, particularly their connections to the U.S. and Israeli militaries, are a recipe for disaster and tantamount to a takeover of the American election system by the military-industrial complex."

Microsoft's ElectionGuard a Trojan Horse for a Military-Industrial Takeover of US Elections
By Whitney Webb
https://www.mintpressnews.com/microsoft-electionguard-a-trojan-horse-for-a-military-industrial-takeover-of-us-elections/258732/

Skip Scott , June 18, 2019 at 07:29

Remember when Karl Rove (aka turd blossom) had his meltdown on fox news over the Ohio vote count. He just knew Romney was going to win that state, but somehow his fix got "unfixed" by the counter hacking group "anonymous". Well, now our so-called "Intelligence" agencies and their corporate sidekicks are going to make sure there are no more surprises. Elections are going to be even more of a useless show than they already are. Zappa was truly prescient when he said "politics is the entertainment division of the Military Industrial Complex."

Here's a good story on Rove in 2012:
https://truthout.org/articles/anonymous-karl-rove-and-2012-election-fix/

Realist , June 18, 2019 at 16:25

Good recollection, Skip. I had completely forgotten that little nugget, as probably did most other people. Our brains are so slipshod, we create our own memory holes big enough for the villains to drive a dumptruck through.

I can also appreciate your caution about all further elections. Will they be entirely orchestrated by the string pullers who make the final choice by simply creating the numbers out of thin air? If so, will the candidates themselves also be clued in to prevent a meltdown like Hillary Clinton's never-ending tirade?

John Hawk , June 17, 2019 at 15:06

Comey: lying through his butthole!, longtime bagman for the Demorat elites and a traitor to boot!

Abe , June 17, 2019 at 15:02

"Thousands of emails from the DNC server were published by WikiLeaks in July 2016 revealing that the DNC interfered in the Democratic primary process to favor former Secretary of State Hillary Clinton over Senator Bernie Sanders for the party's presidential nomination" notes veteran intelligence professional Ray McGovern.

Can't Say Why:

Two weeks ahead of the Democratic National Convention, celebrating a "revolution" worthy of the CIA, sheepdog Bernie pledged his fealty to Hillary: "I intend to do everything I can to make certain she will be the next president of the United States."

Hillary crowed, "Senator Sanders has brought people off the sidelines and into the political process. He has energized and inspired a generation of young people who care deeply about our country."

She imperiously declared, "To everyone here and everyone cross the country who poured your heart and soul into Senator Sanders' campaign: Thank you."

Bernie had performed his sheepdog function by exciting the Democratic Party's liberal base and winning young voters by large margins during the primary.

The Sanders campaign won primaries and caucuses in 22 states.

But Bernie spat in the face of his "revolution" by not energetically fighting efforts at black voter suppression, and not effectively contesting the votes in states like California and Arizona, as was his campaign's right by law.

Long after Hillary clinched the nomination with California, sheepdog Bernie continued to hold rallies and advocate for his "revolution", which not only served the interests of the Trump campaign, but very effectively delayed incensed Sanders supporters from migrating to third party tickets.

Green Party leader Jill Stein correctly remarked: "A revolution that goes back under Hillary Clinton's wing is not a revolution."

Black Agenda Report editor Glen Ford described the debacle:

"Bernie Sanders did not lie to his followers; they deceived themselves, just as most of them – the ones that were old enough – had fooled themselves into believing that Barack Obama was a peace candidate and a political progressive back in 2008, although Obama's actual record and policy pronouncements showed him clearly to be a corporate imperialist warmonger – a political twin of his principal primary election opponent, Hillary Clinton and her philandering, huckster husband.

"Back then, phony leftists like Bill Fletcher and Tom Hayden swore on their mothers' honor that Obama's campaign was really a people's movement, a prelude to revolution – as if the Democrats, a militarist corporate political party, could give birth to an anti-corporate, anti-militarist people's revolution.

"Real Fascist vs. Trump Cartoon Version

"Bernie Sanders threw around the word 'revolution' quite a bit. He was still using it in his surrender speech on Tuesday [July 12, 2016], assuring his flock that the revolution would continue as he marched arm in arm with the most dangerous person in the world, today – far more dangerous than Donald Trump [ ] Sanders' job is to shepherd his flock into a little leftwing corner of Hillary's Big Tent, right next to the latrine and alongside her loyal Black Democrats, who are so meek in the presence of power that they won't even complain about the smell."

https://www.blackagendareport.com/bernie_endorses_greatest_evil

Bernie's own behavior during and after the "revolution" belies this prattle about CIA "derailment" of a "Sanders insurgency".

A guy who once urged once urged abolishing CIA, Bernie now can't get enough of fact-free claims by "intelligence agencies".

Bloviating with Wolf Blitzer in CNN's Situation Room on 10 May 2017, Bernie declared: "Our intelligence agencies all agree that [Russia] interfered significantly in the American election."

"This is an investigation that has to go forward," he said.

Bernie wasn't so keen on investigation when American votes were at stake during the "revolution" in 2016.

To summarize:

What better way for the CIA to thwart a "revolution" against "intelligence agencies" than to have the Dems front an "insurgent" sheepdog candidate who would not only throw the "fight" at critical moments, but turn around and praise the BS produced by the very "intelligence agencies" he previously sought to abolish.

Put that in your vape and smoke it, kids.

And why is it that all these "intelligence agencies" have nothing whatsoever to say about Israeli intelligence operatives and Israeli interference in the US electoral process?

Let's hear our vaunted veteran intelligence professionals 'splain' that.

David Otness , June 18, 2019 at 00:01

Again, Abe -- Keep bringing it while we still can.
Thanks for your courage and honesty.

Abby , June 18, 2019 at 02:14

Outstanding comment, Abe! This is exactly who and what Bernie is and here he is doing it again. People who were upset with him doing that last time are once again getting ready to back his candidacy and when he betrays them again they will wonder why.

Bernie has signed on to the Russian interference nonsense and tells people that Vlad is controlling Trump and he also says that Madura must step down. He was asked after the election if Hillary had won it fair and square and he said yes knowing damn well that she rigged it against him.

As for the big elephant in the room no one ever talks about how Israel has congress in its pocket.

Maxwell Quest , June 18, 2019 at 23:03

Abe, thanks so much for ripping off Bernie's little revolutionary fig leaf and stomping it into the dirt. It really made my day.

EchoDelta , June 17, 2019 at 14:55

Garbage, embarrassing garbage and magical thinking from an Ahab with a fan club.

Address why Roger Stone is now claiming Russians did hack the DNC? And https://www.emptywheel.net/2019/05/15/cloud-computing-and-the-single-server/ splain this?

Otherwise admit you're a red hat brownshirt or profiteering like Alex Jones from gullible chuckleheads.

well oh boy , June 17, 2019 at 15:22

Emptywheel? Isn't this the same person who still thinks Russia elected Trump..? The one who revealed her source to the FBI? Doesn't seem like a journalist at all. What are her credentials?

certainquirk , June 17, 2019 at 15:28

Troll. Starve.

nwwoods , June 17, 2019 at 17:32

Indisputable fact:
Comey has committed purgery under oath
Clapper has commited purgery under oath
Brennan has commited purgery under oath
This is a matter of public record that is beyond dispute.
Your faith-based belief in the Russiagate conspiracy theory is entirely grounded in the baseless assertions of three confirmed liars who have provided precisely zero evidence in support of their claims.

Andrew Thomas , June 17, 2019 at 18:34

That is a completely inappropriate comment. Stone's lawyers filed a discovery request for the documents. That is not the same thing as expecting to believe their contents.

Anne Jaclard , June 17, 2019 at 18:58

This is a garbage comment. @EmptyWheel is just another blue-check pseudo-left journalist who outright promoted the idea that Trump is Putin's puppet before the Mueller Report revealed that to be untrue https://mobile.twitter.com/emptywheel/status/821348649108205569 . I don't know how much CN pays but I'm sure Ray isn't making the big bucks of conspiracy theorist Jones, let alone conspiracy theorists David Corn and Rachel Maddow.

Even the Democratic Party is focusing on propping up their neoliberal leader, Biden, and is not wishing to defend a failed theory exploited by the DNC as an excuse for why they failed to defeat Donald Trump. Their rigging of the primaries, detailed in the WikiLeaks documents, ensured a Trump victory which has seen massive ecological devistation, right-wing ghouls appointed to the Supreme Court, and multiple wars or war scares. I get that they want to hide their and Hillary's personal responsibility, and that the elite as a whole wants to cover up the failed system they have established, but we should be focused on the Sanders campaign and beating Trump in 2020, or grassroots work on saving the environment and helping organize working people.

I thought RussiaGate was false from the moment Hillary blamed Putin for the leaks this time three years ago. It's good to be vindicated, but I'm not really interested in the Trump-Barr counterinvestigation, either, I, like probably most other people, just want the whole thing to be over with.

But the fact that this fake narrative continues to be perpetuated makes me have second thoughts, sometimes.

Robbin Milne , June 17, 2019 at 19:37

Empty wheel Marcy wheeler isn't a credible source.

Michael Keenan , June 17, 2019 at 19:46

She forgot to keep her chastity belt on when she went to Mueller. Still not sure why.

Michael Keenan , June 17, 2019 at 19:39

No such claim dimwit.

Abby , June 18, 2019 at 02:17

lol! You're quoting emptywheel? Oh boy she is so far out there on this Russian propaganda nonsense I don't recognize her from when she was sane back on daily kos. But then they have bought into too.

I think that you are the one who needs to wake up. Tell us what evidence Mueller or anyone has shown us that proves Russia did the deed? I'll wait

DW Bartoo , June 18, 2019 at 18:14

Actually, Echo Delta, according to a link Realist has provided on the thread of a later article, here at CN, Stone and his attorneys are insisting that the government must provide actual proof that Russia hacked the DNC, and the government is claiming, apparently, that it is not subject to any such burden as providing actual proof.

This will be very interesting to observe.

Either the rule of law demands actual proof, or the "rule" has become so very bent that it has broken and disappeared entirely, leaving behind merely an empty nothing that may be shaped, twisted, or sculpted into whatever "authority" may wish, to whatever ends power desires or insists upon.

Vera Gottlieb , June 17, 2019 at 14:28

Oh, enough of this already. Keep distracting people so as not to pay attention to more important matters. Enough!

jmg , June 17, 2019 at 17:07

Vera, "this" is what started the "Russia has attacked us!" hysteria, the new McCarthyist xenophobia, the new Cold War, the new arms race, the Doomsday Clock's current "two minutes to midnight" (first time since 1953), etc. So, if in fact Russia didn't attack, it has some importance.

David G , June 17, 2019 at 20:21

Ikr? And this when people have already stopped arguing about the Game of Thrones finale. Get your priorities straight, everybody talking about things corporate media isn't instructing you to!

bjd , June 18, 2019 at 06:33

Go away and be an obedient believer then.

jb , June 17, 2019 at 13:33

Has VIPS said anything about the possibility of a hack first, followed by a leak? (The Nation?)

Michael Keenan , June 17, 2019 at 19:23

Password was used to enter DCCC and then DNC. George Webbs theory. So that would put us somewhere in between a hack and leak?
https://www.youtube.com/watch?v=sFbCiVzbVYE&t=426s

John , June 17, 2019 at 22:30

In fact, VIPS had some evidence (since discredited as falsified) of a possible leak. They hyped it as "disproving" any hack. If you want nuanced analysis, don't go to VIPS.

David Otness , June 18, 2019 at 00:06

"YOU" say–without any backup to your assertion.
Nice.
New around here, aincha?
I wonder why

Adam Carter , June 18, 2019 at 13:05

Some parties did make broad and sweeping assertions on evidence that really only related to Guccifer 2.0's releases and they probably should have been more cautious.

However, the underlying research (showing that Guccifer 2.0 moved files around via thumbdrive and then archived them almost 2 months later with Eastern timezone settings in effect) has not been discredited as falsified.

Someone did cook up a highly speculative conspiracy theory and a flawed technical theory to try to support the premise that there was a conspiracy and that files were tampered with but it didn't work out too well for them. (Forensicator debunked their primary conspiratorial claims within a month and just recently dismantled their timestamp tampering theory too.) :)

John , June 19, 2019 at 01:04

Tim Leonard (real name for Adam Carter): The "research" was gobbledygook.
– Even if someone believed every word of your "analysis", it still disregards many variables about how data is handle, and presumes that people used tools, methods and communication techniques no one actually uses in real life, making it stink to high heaven.
– And,of course, nothing can be realistically "proven" from a data file whose source cannot be verified.

And stop referring to yourself as "forensicator" in the third person. It's embarrassing.

Adam Carter , June 20, 2019 at 08:32

As my other response to your defamation here made clear. Forensicator and I are separate people and even a basic corpus analysis of our work outputs would make that clear.

Also, where have I (or Forensicator) "presumed that people used tools, methods and communication techniques no one actually uses in real life" specifically? <img alt='' src='https://secure.gravatar.com/avatar/60bc797ed7bf0b955e33c4c30a8cd58d?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/60bc797ed7bf0b955e33c4c30a8cd58d?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Eric32 , June 18, 2019 at 13:53

You're not very good at this.

The NSA probably has the greatest computer forensics capability in the world – Comey's FBI investigation never asked them to analyze these leaks?/hacks? by internet tracking and hard drive analysis.

No real investigation would depend on consultants paid by interested parties when it could do it itself or through the NSA.

As for hard drive forensic analysis, people who actually know about computer forensics say that the way to make hard disk data irretrievable is to PHYSICALLY destroy the HD plates. Drilling multiple holes through the HD including all the plates is what most of them do. "Cleaning"? No.

John , June 19, 2019 at 01:22

Actually A LOT of investigations rely heavily on computer security consultants and non-FBI security staff. It happen every day. Banks hand off forensic data collected by consultants all the time to the FBI. The word for it in court is "expert witness".

And while the only surefire way to destroy data is to destroy the HD, simply deleting and overwriting it would mangle the **** out of it, making it hard to determine what file the scraps of data are from, when they were written, and if they were ever executed. Basically making it useless to anyone wanting to build a case with it.

Eric32 , June 19, 2019 at 12:51

No, what you're saying does not hold up to analysis or common sense.
There's no big mystery about this – Binney and his retired intelligence associates figured it out early on.

No valid FBI investigation dealing with matters of national security, election hacking, validity of election of a President, would hand off the computer forensics analysis to a company paid by and subject to retaliation by the entity (the Democrat party) with a huge political stake in the results of the investigation.

The Clinton / Democrat party story line was Russian hacking, Russian influenced President Trump, poor victim Hillary.

Private businesses often do leak/hack investigations through private consultants because they fear the (business) consequences of the investigative information becoming public or into criminal prosecution, just like the people controlling the Democrat party feared having the actual method of the email data showing Clinton corruption and Democrat party corruption becoming public was due to an internal leak, not an over the internet hack.

The FBI wants leverage over the people they interview for info – they had enormous leverage over Assange, but they never interviewed Assange, who knew how the emails came into Wikileak's hands. They never interviewed Craig Murray, who says he knows lot of what went on in the matter.

There's no big mystery about this – Binney and his retired intelligence associates figured it out early on. <img alt='' src='https://secure.gravatar.com/avatar/fc8854fd58bb283290bad6a933dca5bd?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/fc8854fd58bb283290bad6a933dca5bd?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Curious , June 19, 2019 at 00:48

If it was a hack, or even a partial hack the NSA would have the forensics and the copies. Please explain why they have not released this information to anyone in authority.

Pancho Vanilla , June 17, 2019 at 13:20

Seth Rich

Lorri Strawser , June 17, 2019 at 13:18

If I hide someone who is being sought for murder, I will still be charged with harboring a fugitive, even if they later decide that the person Ic was hiding, didn't do it.
And instruction is Justice, is obstruction of Justice, no matter how the lawyers and politicians try to spin it.

LJ , June 17, 2019 at 19:22

Bill Walton, NBA Hall of Fame, sports announcer, dad and all that was once heard to utter on National Television, shortly after winning an NBA Title with the Portland Trailblazers, regarding possible guests of an A-Frame he owned out in the sticks somewhere (As I recall regarding SLA alums Jake and Emily Harris >), " I would never Co-operate with a Fascistic Organization like the CIA". Oh the Times they are a Changin' and have been for what 45 years now.

Pablo Diablo , June 17, 2019 at 11:45

All of this has been an effective distraction to WHAT was in those emails. Far worse than WHO hacked/leaked them.

AnneR , June 17, 2019 at 12:34

So very true, Pablo. And distraction from the content – so well managed by the MSM – was the intent behind this whole lying farrago.

Pancho Vanilla , June 17, 2019 at 13:21

Amen!

Ruth , June 17, 2019 at 14:04

That is so true.

David G , June 17, 2019 at 20:16

Can't be said too often. And the media misdirection began immediately after the DNC docs were published, largely crowding out coverage of the substance from then until today. Among other things, this is why it's so wrong to even credit/blame Wikileaks for Trump's victory.

Debbie Wasserman Schultz and Donna Brazile took one for the team, but the big story of DNC dishonesty was relegated to the vast sea of true things that, as Harold Pinter put it, "never happened".

John , June 18, 2019 at 09:56

WHAT was in those emails was basically nothing. No coordination with Clinton, no orders or actions to deliberately sabotage Sanders. Just a handful of snarky comments by a few staffers.

Linda Wood , June 18, 2019 at 13:52

No. DNC emails evidence crimes of money laundering and entering into agreements with state officials to close polling places in order to disadvantage Sanders voters.

http://thefederalist.com/2018/04/24/bombshell-fec-records-indicate-hillary-campaign-illegally-laundered-84-million

https://www.mockingbirdpaper.com/content/leaked-emails-prove-dnc-suppressed-voters-favor-clinton-rhode-island

http://linkis.com/wikileaks.org/dnc-em/zxSHn

Sent: Monday, April 25, 2016 6:30 PM To: CaucusGroup; Wilson, Erin; Wei, Shu-Yen; Miranda, Luis; Pratt Wiley; Jefferson, Deshundra Subject: Problem brewing in Rhode Island New report shows RI gov't opening only a fraction of polling locations: http://www.bustle.com/articles/156771-why-is-rhode-island-closing-its-primary-polls-voters-need-to-check-their-polling-locations Bernie leads Hillary by 4 in the latest poll: http://www.publicpolicypolling.com/main/2016/04/clinton-sanders-close-in-ctpari-trump-headed-for-big-wins.html If she outperforms this polling, the Bernie camp will go nuts and allege misconduct. They'll probably complain regardless, actually. We might want to get out in front of this one with an inquiry to the RI Gov, even though she's one of ours.

Linda Wood , June 18, 2019 at 15:03

The DNC emails include evidence of crimes of money laundering and of entering into agreements with state officials to close polling places in order to disadvantage Sanders voters.

http://thefederalist.com/2018/04/24/bombshell-fec-records-indicate-hillary-campaign-illegally-laundered-84-million

http://linkis.com/wikileaks.org/dnc-em/zxSHn

Skip Scott , June 19, 2019 at 06:55

John-

This comment, more than any other, exposes your goal to obfuscate the truth and further a propaganda narrative. They were not "basically nothing". They showed that Clinton holds "private" positions separate from her "public" positions, and is therefore a self-confessed liar. They showed that she used her position as SoS to get large donations from foreigners for the Clinton Foundation. They showed she was involved in cheating and given debate questions ahead of the actual debates. They showed coordination with the DNC to sabotage the Sanders campaign. They showed she had inside connections to quash the investigation into the use of her private server and mishandling of classified information as SoS. They showed her own staff was worried about her health and found her "often confused". I could go on. Here is a link with some of the more serious findings thanks to Wikileaks.

http://www.trueactivist.com/the-20-most-damning-revelations-from-wikileaks/2/

Skip Scott , June 20, 2019 at 05:38

HEY JOHN .. HEY JOHN .. Crickets.

John , June 17, 2019 at 11:06

Did anyone here actually read Crowdstrike's publicly issued report? The traffic patterns, malware examples and code samples were MORE than enough to conclude Russia did the hacking.

I doubt Crowdstrike even MADE a "unredacted" report everyone here is asking for.

Some data may have been excluded, like sniffed usernames and passwords, but a good security company never publishes use4rnames and passwords of their clients.

Ruth the Truth , June 17, 2019 at 12:58

RE: your question, "Did anyone read Crowdstrike's report?" Ray McGovern read it and so did the rest of VIPS, Veteran Intelligence Professionals for Sanity. I read parts of it, but don't know anything about computer hacking, so I have to depend on what experts say about it. You say you've seen enough evidence, can you help me understand how you know that Crowdstrike did not plant that evidence? I'm skeptical. Doesn't it bother you that the FBI did not do their own investigation? Why not? It seems to me that it's like me telling the police, "My house was robbed, and I know the Russian guys who live next door did it" "My evidence? Well, I destroyed the actual evidence, but I do have this report from my own private security company and they are really reliable. The best people." I'm sure in that instance, you would not accept my word for it- how is this situation different? I don't understand how a private security firms report is evidence. Why weren't the servers examined by law enforcement, which the FBI admits would have been best? Why wasn't Assange interviewed? There was not a thorough investigation-why not? I still need more evidence to draw a conclusion-Can you answer my questions?

michael , June 17, 2019 at 13:43

Essentially the DNC destroyed any evidence of a crime. As Hillary herself has said "No evidence, no crime". As federal judge Zloch noted, the DNC is not a government agency, it is not a public company, it is essentially like a yacht club or country club (that can do whatever it wants as far as backstabbing members and determining candidates). It follows that any crime against such a club is inconsequential, or the Federal Bureau of Investigation would have been all over it. Since it was trivial, why bother?
And Crowdstrike may not have had the skills to mimic Russian hacking, they sound like total incompetents (perfect for muddying the water).
But New Knowledge, which was reported by the New York Times to have interfered in the Alabama Senate Election by pretending to be Russian hackers, DID have the skills, as well as having former NSA employees familiar with Vault 7 tools. They're likely Guccifer 2.o and possibly the "only Russians" involved.

Ruth the Truth , June 17, 2019 at 14:08

Thank you. I'll google more about "New Knowledge" and Alabama Senate Election.

Skip Scott , June 17, 2019 at 14:37

Notice how John ignores questions he has no answer for. Typical acute TDS. Also examine who Crowdstrike is and ask yourself how they could ever be trusted.

John , June 17, 2019 at 14:12

I am exactly ZERO surprised the servers were not sent to the FBI.
– In 25 years of IT security and many virus/hack cleanups, I have NEVER NEVER NEVER seen servers shipped to the FBI for investigation.
– IN ALL CASES the hacked equipment was cleaned and reused. Even at Microsoft. THIS IS THE NORM.

I can't imaging the DNC shutting down all their systems, spending piles of money on new duplicate hardware, and terminating all campaign operations for a week while they recover on new hardware, weeks before a Presidential election.
– Especially since the systems were ALREADY CLEANED, and there was essentially nothing new for the FBI to learn from them.

Eric32 , June 17, 2019 at 17:11

LOL. From the FBI's site:

Computer Forensic Science

Computer forensic science was created to address the specific and articulated needs of law enforcement to make the most of this new form of electronic evidence. Computer forensic science is the science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media. As a forensic discipline, nothing since DNA technology has had such a large potential effect on specific types of investigations and prosecutions as computer forensic science.

Computer forensic science is, at its core, different from most traditional forensic disciplines. The computer material that is examined and the techniques available to the examiner are products of a market-driven private sector. Furthermore, in contrast to traditional forensic analyses, there commonly is a requirement to perform computer examinations at virtually any physical location, not only in a controlled laboratory setting. Rather than producing interpretative conclusions, as in many forensic disciplines, computer forensic science produces direct information and data that may have significance in a case. This type of direct data collection has wide-ranging implications for both the relationship between the investigator and the forensic scientist and the work product of the forensic computer examination

Piotr Berman , June 17, 2019 at 17:23

If the virus/hack cleanups you have witnessed lead to indictments. then I imagine it would be imperative to establish a custody chain for evidence. As a semi-layman, I imagine that it would suffice if FBI made copies of the content of the storage, confirmed that it has "hack signature" described by the private experts and made their own determination if this signature does constitute a proof. However, tracing a hacker is usually pointless and fruitless, so the systems are cleaned and that is that. NEVERTHELESS, Mueller made indictments based on the evidence that had no chain of custody but rather was "hearsay".

At least some elements of the "signature" were very suspicious to me. For example, using name Felix which is not a Russian name, but which belongs to Feliks Dzier?y?ski, a Pole who was the first head of a Soviet internal security and who died in 1926. Far a young Russian hacker it would be somewhat improbable, but to a foreigner who knows very few facts about Russia, Felix is easy to remember. Same with Bear. It was totally a trademark how a Western foreigner images Russians to behave. Same with switching from Latin to Cyrillic keyboard mode in the middle of coding to type a single Russian word.

Anne Jaclard , June 17, 2019 at 19:00

Hell, Felix's name is probably known among many hardcore Sanders supporters as a key Soviet socialist figure. <img alt='' src='https://secure.gravatar.com/avatar/41a9461a080acb5ce5be55f471100a9e?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/41a9461a080acb5ce5be55f471100a9e?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

John , June 17, 2019 at 23:01

Crowdstrike's technology for tracking hackers is impressive.
– They can follow every single command and data flow between hackers' command systems and the hacking victim's systems and security log it with timestamps in audited and access-controlled systems.
– Those logs follow chain-of-custody rules, and constitute some of the most powerful evidence a hacking victim can bring to court. <img alt='' src='https://secure.gravatar.com/avatar/11a4450c3a58a847d47fe0242886a044?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/11a4450c3a58a847d47fe0242886a044?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

David G , June 17, 2019 at 19:57

Those may be reasons the DNC wouldn't have wanted to give their hardware to the FBI, but they aren't reasons for the FBI not to have sought a court order and seized it.

John , June 18, 2019 at 09:21

So, if the FBI had crippled the DNC a few weeks before the election by seizing all the computers running their email systems, calendars, contacts, planning and legal documents, group schedules and coordination plans with state and local party workers, you would have happier? <img alt='' src='https://secure.gravatar.com/avatar/76bb487d22067fb08deace74db4f7c27?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/76bb487d22067fb08deace74db4f7c27?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Will , June 17, 2019 at 20:47

stop making sense John.

Andy W , June 17, 2019 at 21:10

You're missing the point, John. This has been portrayed as "an act of war against the United States of America" on par with the 9/11 terrorist attacks or the Japanese bombing of Pearl Harbor. The normal procedures for virus/hack cleanups don't apply because this isn't a normal event.

This isn't about some clown planting malware to mine bitcoins. This is supposed to be a dire threat to our national security, and it calls for a different response.

This isn't about normal IT work like removing malware and patching vulnerabilities so everybody can get back to work. This is about attribution and accurately identifying the hackers -- and since a nuclear superpower is the suspected culprit it's especially important that we get this right.

The investigation should have been led by the FBI, not by CrowdStrike. The FBI should have been the one sharing images of the DNC's servers with CrowdStrike, not the other way around. The FBI should have been the one sharing it's redacted findings with CrowdStrike, not the other way around.

John , June 17, 2019 at 22:40

Wrong – the behaviour of the DNC, Crowdstrike, and the FBI was completely about "normal IT work" for several quite a while.

It was not until WEEKS later, when Wikileaks began publishing internal DNC documents the day before the Convention that this became an issue.

HINDSITE IS 20/20. <img alt='' src='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

DW Bartoo , June 18, 2019 at 14:49

On April 11, 2019, NPR,
Nation Public Radio, carried story about WikiLeaks and Julian Assange by David Welna.

"12 Years of Disruption:
A WikiLeaks Timeline".

I am curious about your perspective about Jillian Assange, primarily because you said this.

"It was not until WEEKS later, when WikiLeaks began publishing internal DNC documents the day before the convention that this became an issue."

Would "this" be what you consider to be "normal IT work", John?

Essentially that any rigorous examination of the claim of "Russian hacking", BY the FBI, would have hindered what might be termed, based on your assertion, "business as usual"?

Especially, if the computers were to be considered evidence, as that, if I understand your grave concern, would have cost Crowdstrike too much time and money and would have harmed Hillary and the DNC, is that the gist of it?

Frankly, that seems quite akin to notion of "too big", too important, to be treated to an actual rule of law, reminiscent of "too big to fail, too big to jail".

Of course, as soon as the claim was made, not by WikiLeaks, but by politicians, that Russia had "hacked" those computers, some later even called the alleged "hack" an "act of war", then, at the moment of the assertion, the comfortable (and convenient) "normal IT work" perspective has, and had, no validity.

Under a functioning rule of law, a chain of evidence, not hearsay, is required.

Unless we accept either an empty form of law or a multi-tiered legal system, both of which make mock of rule of law, then evidence, genuine and actual, must take precedence over comfort, convenience, or convention.

The lack of substantive evidence regarding the "hack" is quite as destructive to the whole Russia did it BS as is the use of the Steele Dossier to establish "collusion".

For both taint the two cases, long held to be so related as to be conjoined.

The lack of evidence of hacking, cannot be made something by mere assertion, and the Dossier is evidence of what is known as a "poison tree" and all things growing from are known as "fruits of the poison tree.

So, John, my question for you is this.

Should Jullian Assange be locked up, not merely for offending official authority, but also for causing so much embarrassment for "normal IT work"? <img alt='' src='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/73f13f648f68941a417b4ff445d911ec?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

DW Bartoo , June 18, 2019 at 14:51

The comment above is addressed to, John. <img alt='' src='https://secure.gravatar.com/avatar/b9764e24a3ebbd21a94e2ab7bdb4ff3b?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/b9764e24a3ebbd21a94e2ab7bdb4ff3b?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Andy W , June 18, 2019 at 17:32

@John – No hindsight was needed. The DNC should have brought in the FBI the second they realized their internal files and communications had been compromised regardless of who did it or why. The theft of this data is the digital equivalent of Watergate, and the Democrats should have turned the matter over to the FBI to figure out who was responsible, not to some private IT company that they paid for themselves.

What if the shoe was on the other foot? What if internal documents from the Trump Organization had shown-up on Wikileaks. Suppose Donald Trump said the Democrats stole the documents and used that accusation to justify punitive measures against them. Then suppose Trump wiped his servers so the only evidence anyone had to go on was what a private cyber security company that he was paying provided. And suppose the co-founder of Trump's private cyber security company also happened to be a senior member of the Heritage Foundation. Would any of that arouse your suspicion, because that's basically what we're looking at here.

CrowdStrike's co-founder is a senior fellow at the Atlantic Council, which has a long standing animus towards Russia. CrowdStrike's findings are being used to justify sanctions and other punitive measures against Russia and nobody can independently corroborate CrowdStrike's findings because the servers have been wiped.

The Democratic party is a political organization with a political agenda, and so is the Atlantic Council. You can't just take them or their surrogates at their word. <img alt='' src='https://secure.gravatar.com/avatar/9950659fea3b1c6f3208f41c8cf53d42?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/9950659fea3b1c6f3208f41c8cf53d42?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

bjd , June 18, 2019 at 06:41

If you clean and reuse, you lose the license to make statements and allegations based on what you just bleachbitted.
Nice try to shift focus.
You're a believer and are out of line here on VIPS.
You're not even a competent IT professional, with your 'clean' and 'reuse'-mantra.

John , June 18, 2019 at 10:59

Actually, just telling you what I see. Nobody spends the money to buy new hardware after a hack attack.
– To my knowledge, only a handful of multi-billion dollar banks and defense contractors have ever preserved hardware after an attack, and only in exceptionally rare cases.
– Even when I have recommended full rebuild on new hardware, I was overridden by the customer or management.

Seeing something nefarious in the DNC having acted just like any other organization of its size in a similar situation is a sign you don't understand the subject. <img alt='' src='https://secure.gravatar.com/avatar/91a95ef8eb08348e0e20b1824a4f4a42?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/91a95ef8eb08348e0e20b1824a4f4a42?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

LJ , June 18, 2019 at 15:53

Oh brother? Are you a clown? Don't be silly. That is a leap of faith when Bill and Hillary were meeting publicly on a plane on a tarmac with Attorney General Lynch after an investigation was in progress. The reason there was an immediate investigation going on and Comey was compelled to intervene and whitewash the situation was to try and save the validity of the electoral process , the credibity of the Department of Justice and the credibility and objectivity of investigations by the FBI. And just what of the precedence of using an absurd and obviously phony and unverifiable dossier attributed to a BRIT Clown from MI6, hired by the Clinton Campaign, to secure a FISA warrant to investigate and hopefully discredit the campaign of the presumptive, no the actual nominee of the opposition party? Let's just forget all that. Your point is ridiculous and your experience is of no value in the real world that we all witnessed in real time. No doubt, the people and corporations that paid for your services and expertise knew what they were getting when they hired you and I have no doubt you did a bang up job. Keep it in your own lane. It's safe there. We don't want none of that Seth Rich business unless it is absolutely unavoidable.

Deniz , June 18, 2019 at 19:19

My guess is that John is here to protect the value of his stock options. <img alt='' src='https://secure.gravatar.com/avatar/00d3a299e0c6a14584450a161456a6e8?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/00d3a299e0c6a14584450a161456a6e8?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

David Otness , June 17, 2019 at 18:43

Bravo, Ruth. (I got a good chuckle from your straight-ahead, quite civil rebuke of what *John* posits.)
Now will he respond at all, let alone without deflection and/or obfuscation?
Yer move, Johnny

John , June 19, 2019 at 14:51

I am fairly confident Crowdstrike did NOT falsify claims or evidence based on a combination of the following reasons:
– Their reports, analysis and conclusions were made public, and were reviewed by several competing security firms. No firm with experience in IT forensics disagreed.
– Their report on tools and files found, infection and control methods and pwershell coding were technically viable and reasonable for a hacking attack. No "Where did they get this" moments you find in flimsier analyses.
– The reports were fat with background and supporting info to read as a "evidence leads to conclusions" report instead "conclusions lead to evidence" reports which tend to be fat with conclusions and skimpy on background info.
– There have been no murmurs or leaks of "they faked this" from inside Crowdstrike. All the "faking" claims are coming from people far outside the company with no security expertise.
– IT Security people tend to be pretty libertarian, so I doubt Crowdstrike could have actually "faked" anything without generating a mini-revolt by the people involved.
– Crowdstrike has MASSIVE incentives to deal honestly in the IT Security field. They do criminal and fraud investigation work for banks, and anything that risks that would be very stupid. (Note: motive evidence tends to be weak, but I included it anyway.)

Now if someone can present evidence that DID fake it, beyond association or speculation about motive, I'm willing to listen.

John A , June 17, 2019 at 14:08

Traffic patterns as in how Wikileaks has already shown the CIA can create false trails?

Norumbega , June 17, 2019 at 16:48

The CIA's ability to "create false trails" maybe somewhat interesting in itself, but I would urge caution in drawing a connection, even just a speculative one, between this capability and the "Russian fingerprints" in the metadata of some of the files released by Guccifer 2.0. As far as I can see, the two situations are completely different. This is a point on which I disagree with Ray McGovern, insofar as his repeated emphasis on the point has the effect of misleading many into looking in a direction which is very unlikely to be related to the actual solution of the Guccifer 2.0 "Russian fingerprints" issue. Most of the rest of his excellent article I agree with.

The CIA clearly has computer hacking capabilities. And one of the tools in its Marble Framework toolbox is software specifically engineered to _disguise its own hacking activities_ by leaving accompanying "clues" in several foreign languages (namely, ones spoken in so-considered adversary states).

With the G-2 materials, are we then possibly presented with something that was actually hacked by the CIA, the said hack having been disguised as the work of Russia by means of "Russian fingerprints" added by means of the automated software program revealed in Vault 7?

I cannot see how this could be so, given that I don't believe that the G-2 materials were obtained by means of a remote hack (even though Guccifer 2.0 did _claim_ to be a "lone hacker" and to have obtained his materials by that means). And if the G-2 materials were not obtained by a hack at all, then ipso facto they were not obtained by a CIA hack. Furthermore, although I am not an expert, it seems to me that researchers like Adam Carter have analyzed the series of steps that were actually taken to produce the "Russian fingerprints" in the metadata of the documents that G-2 released, and produced a plausible account of how this was done. This account does not include anything that relates to Vault 7 software. In my opinion, Ray McGovern would do well to direct people toward Adam Carter's work instead of misdirecting them toward Vault 7.

Norumbega , June 17, 2019 at 16:12

Are you aware that Bruce Leidl has claimed in the last few days to have discovered clear evidence that the malware samples CrowdStrike produced were fraudulently recycled from an earlier hack of the Joint Chiefs of Staff?

He wrote on Twitter, June 12: "There was no APT29 hack of the DNC at all. I know this because crowdstrike produced fraudulent malware samples, you know, like they always do."

"The seaduke samples are recycled from the joint chiefs incident. I (and others) know bc they dun goofed stripping the relevant metadata."

And (June 12): "I'll be deleting this tweet and the prior one soon due to suspected lurks on my TL. It's too late in the game for me to sock up."

"The samples were compiled (by cozybear) on 7/30/15 and 8/4/15"

"JCS email hack was 7/25/15 – 8/6/15"

"Not much room for plausible deniability there."

There followed some exchanges with Stephen McIntyre and Larry Beech, which may be of interest to people with technical backgrounds.

There are many other public reasons to suspect that something is amiss in the official version of the timeline, notably the highly implausible claim that WikiLeaks only received the supposedly hacked emails from Guccifer 2.0 during July 14 -18, 2016, leaving far too little time for WikiLeaks to review them for authenticity and publication value before they actually did release them on July 22, and after Julian Assange had already announced more than a month earlier that WikiLeaks already at that time possessed "leaks" related to Hillary Clinton, in the form of "emails" which it planned to publish.

Mark McCarty , June 17, 2019 at 18:45

For those who are technically proficient, this essay by Adam Carter provides evidence that 2/3 of the "Fancy Bear (APT28)" malware which Crowdstrike claimed had been implanted in the DNC in spring of 2016 had in fact been compiled AFTER the date on which Crowdstrike was brought into the DNC servers in early May 2016. In other words, this suggests that Crowdstrike may have created this supposed hack.

https://disobedientmedia.com/2017/12/fancy-frauds-bogus-bears-malware-mimicry/

Crowdstrike's claims also appear absurd in light of the fact that the latest DNC email published by Wikileaks was written on April 25 – three weeks AFTER Crowdstrike installed its Falcon anti-hacking program on the DNC computers.

I reason as follows: Adam Carter, Forensicator, and VIPS have provided a range of compelling evidence that, far from being a GRU hacker, Guccifer 2.0 was a construct, operating within US time zones and most likely controlled by Crowdstrike, intended to falsely incriminate Russian hackers as the source of the DNC emails subsequently released by Wikileaks.

http://g-2.space/

As Norumbega indicates, Mueller's tale of how G2.0 allegedly transferred the DNC emails to Wikileaks is absurd on its face.

https://caucus99percent.com/content/mueller%E2%80%99s-new-indictment%E2%80%8A%E2%80%94%E2%80%8Ado-feds-take-us-idiots

But there is a conundrum – Assange stated on June 12 that Wikileaks would soon be releasing "material related to Hillary" . But he did not indicate that this material was DNC emails (indeed, many may have thought he was referring to Hillary's erased SOS private server emails). It is clear that, when Crowdstrike and G2.0 made claims in the next 2-3 days that the DNC server had been hacked and that G2.0 had provided the hacked emails to Wikileaks (note the inconsistency with Mueller's claims!), that they had GUESSED that Assange had been referring to DNC emails. I propose that this was a very educated guess, and that our intelligence agencies had tipped the DNC off to the fact that someone at the DNC was proposing to send leaked emails to Wikileaks. This indeed seems likely if Sy Hersh's informant inside the FBI is correct, and Seth Rich had offered sample emails to Wikileaks, asking for payment for a subsequent large trove. It's reasonable to suspect that the NSA had been attempting to capture all communications to and from Wikileaks, and thus could have intercepted this communication. They could then have informed the DNC that someone on their staff was planning to leak to Wikileaks. That's when Crowdstrike was brought in, and the strategem hatched to fake a GRU hack and attribute the subsequent Wikileaks release to the Russian state.

https://caucus99percent.com/content/how-did-crowdstrikeguccifer-20-know-wikileaks-was-planning-release-dnc-emails

This scenario makes sense only if the DNC was not initially informed that Seth Rich was the source of the impending leak, presumably because he had not been legally unmasked at the time. Otherwise, Seth would have been summarily fired.

The creators of the G2.0 farce were betting Hillary's campaign on it. Which means that the real source of the leak would have to be silenced to prevent unmasking of their hoax. If the perpetrators of the hoax subsequently learned that Seth was the source, eliminating him would have been a high priority.

If someone has an alternative explanation of these facts, of equal or greater plausibility, I would be pleased to read it.

Skip Scott , June 18, 2019 at 08:06

Norumbega and Mark-

Thank you for your comments. I have seen this "John" around here before, and he always tries to make the case for Crowdstrike. I also notice that whenever there is something he can't account for he goes silent, or just goes back to regurgitating the same garbage.

One of the underlying themes of RussiaGate is that those evil Ruskies made Trump president, and that he is somehow beholden to them. This is an obvious psy-op with the purpose of distracting from the CONTENTS of the emails, which are mind blowing for their exposure of the shameless duplicity of the Hillary campaign and the DNC. And of course the secondary purpose is to prevent Trump from seeking detente with Russia. In my opinion, even if the Russians were the source, we'd owe them a big THANK YOU.

I believe in freedom of speech, and I think I should be free to speak my mind to anyone on any subject. I also believe that even the Russians have the same right. There is no way that freedom of speech can subvert democracy. In fact, it is essential.

The MSM's job is to control the narrative, and the internet is giving them fits. Sites like CN are a big thorn in their side. Thanks for being part of it. Your comments are invaluable.

Mark F. McCarty , June 18, 2019 at 11:21

Many thanks Skip. You make a point that I've also raised.

As you can imagine, I've quite a number of times been labeled a "Putin puppet" or "Russian troll" while trying to shed some light on the Russiagate hoax on social media. My response is that, if in fact I were in thrall to "the Russians", then I would be eager to give them CREDIT for doing the job that our MSM failed to do, revealing the crass bias of the DNC against Bernie. But I only give credit where credit is due! I suspect our thanks are due to poor Seth Rich.

As to all the "progressives" who are so enraged about the DNC/Podesta Wikileaks releases, may they rot in Hell. The REAL reason that Trump was elected was not the journalism of Wikileaks – revealing TRUTH that the public was entitled to – but to the DNC's efforts to ram Hillary – the most blood-drenched woman in history, a mega-grifter lacking in any intellectual integrity whatever, reviled by a high proportion of the American public – down the throats of the Democratic Party and the American people <img alt='' src='https://secure.gravatar.com/avatar/8f568de5ac740a16f5812668b8c4be09?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/8f568de5ac740a16f5812668b8c4be09?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Norumbega , June 18, 2019 at 21:46

These are interesting speculations, worth thinking about.

Two quick thoughts:

Bruce Leidl and Larry Beech are working on the hypothesis that the people behind G-2 didn't actually know (or have) what was in WikiLeaks' possession, until just prior to July 14, when the FBI reported results of its examination of SR's computer.

About possible NSA involvement and possible use of "masked" records. I would consider what we are now hearing regarding NSA database abuses by private FBI contractors, and their use in "unmaskings" of US citizens. I have even read one claim that CrowdStrike was among those private FBI contractors. The names are redacted in Judge Rosemary Collyer's April 26, 2017 FISA court opinion.

Skip Scott , June 20, 2019 at 05:47

I think this is a very important point, and explains motive for SR's murder, and for the timing of the creation of the G-2 propaganda ploy. If Barr really does pursue all possible leads, I think it will end up tying into SR's murder. However, I've seen this type of play before, and I expect more theater and very little truth from Barr. I pray I'm wrong. <img alt='' src='https://secure.gravatar.com/avatar/a0f545087d25ad6fe70115f62665de86?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/a0f545087d25ad6fe70115f62665de86?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Adam Carter , June 20, 2019 at 08:48

The first shift to using attachments that were later found in WikiLeaks' DNC emails observed in Guccifer 2.0's releases came at the very end of June 2016.

A few days later (July 6, 2016) he published a batch that was entirely DNC email attachments (including a document that revealed it had been edited using LibreOffice 6 by someone with Eastern timezone settings in effect). ;)

Source attribution and leak attachment correlation information is available at: https://theforensicator.wordpress.com/guccifer-2s-russian-breadcrumbs/ <img alt='' src='https://secure.gravatar.com/avatar/a0f545087d25ad6fe70115f62665de86?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/a0f545087d25ad6fe70115f62665de86?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Adam Carter , June 18, 2019 at 13:52

There were a bunch of out-of-context IOCs produced by CrowdStrike and when researching the malware samples, we learned most of the APT28 malware was compiled while CrowdStrike were installing Falcon at the DNC.

Putting questions that raises aside, the existence of the Marble framework shows us that relying on code and malware samples for attribution alone isn't entirely reliable.

More significant than all the above, though, is that we saw no incident specific evidence (evidence relating to email exfiltration events) or even had confirmation of the dates on which exfiltration of the DNC's emails occurred and these are things that CS, with Falcon installed across the network, should have recorded and been able to accurately report on.

The report lacked critical information regarding events and any observed/recorded malware activity (not much beyond identifying presence/discovery and what the malware was theoretically capable of).

Brian James , June 17, 2019 at 10:49

May 26, 2019 Trump Scares Swamp with Declassification Move

Ohr-Fusion GPS caught deleting emails; and yet ANOTHER Clinton email cover-up .Latest Judicial Watch Update

https://www.investmentwatchblog.com/trump-scares-swamp-with-declassification-move-ohr-fusion-gps-caught-deleting-emails-and-yet-another-clinton-email-cover-up-latest-judicial-watch-update/

Jeff Harrison , June 17, 2019 at 10:12

So much for the so-called "rule of law". The government has been playing Calvinball for some time now. Making up the rules as they went to make sure that they win and you lose.

dag , June 17, 2019 at 09:45

Regardless what people might think about Russia, Vladimir Putin, WikiLeaks, Donald Trump, Roger Stone or anyone else, it should be a major cause of concern that the FBI's "investigation" relied completely on the incomplete findings of a private tech company contracted by the DNC.

Had anyone even heard of CrowdStrike before Election 2016? It's absurd that some unknown IT company would be trusted to do forensic analysis of an alleged crime of any sort, much less one that has been described as an "act of war" by a "foreign adversary" and has sent the US political system into a perpetual state of crisis.

James Comey testified that "best practices" would have dictated that the FBI actually physically access the computers. That's the understatement of the century. In fact I would call it gross misconduct and malpractice for the FBI to outsource this responsibility to a private contractor paid for by the DNC. It calls the entire premise of Russiagate into question and anyone who can't see that is being willfully obtuse.

Thanks Ray McGovern for this report and keeping this fundamental issue in the spotlight.

worldblee , June 17, 2019 at 13:22

Like Bellingcat, the genius of CrowdStrike is that they can instantly confirm the results their paymasters have requested. It's so much more efficient than, you know, actually investigating evidence and following the information to an unbiased conclusion.

Noncomunist American Patriot , June 17, 2019 at 13:28

That doesn't change the fact that the Internet Research Agency (kept closely inline with Putin's wishes) interfered with the election, to help Trump and hurt Clinton, as well as the fact that Trumps campaign welcomed the help and had more secretive encounters with Russian agents than all other campaigns combined.
I remember when the Republicans DIDN'T like Russian meddling, and deeply distrusted Russian intentions. Yet less than a year after Russia HELPED Trump get elected – president Trump announces his great new epiphany to put Russia incharge of American cyber security?
Come on, let's elect a president who promises to brown nose our greatest enemy and hand them all of our greatest Intel!
Vote Trump/Putin for 2020!!

John A , June 17, 2019 at 14:11

You call yourself a noncomunist. What is a comunist?

AnneR , June 17, 2019 at 15:52

I think he/she cannot spell. But he/she clearly is Russophobic as well as being ahistorical, not seeming to be aware that Russia is no longer communist, no longer the USSR. But in that he/she hardly differs from the rest of the neo-liberal, Demrat/Republirat crowd.

Ruth the Truth , June 17, 2019 at 15:01

I don't see Russia as "our greatest enemy" and this Russia hysteria is a kind of resurgence of neo-McCarthyism. I think "Russian meddling" was a very minor issue compared to problems that exist within our own system. I'm more worried about voter suppression via "Cross Check", gerrymandering, etc. I'm more worried about campaign financing, and the fact that our elections are controlled by two political parties that apparently are under no obligation to hold fair and open primary elections. I think the Russian threat has been exaggerated and it distracts us from other issues with our election process. I couldn't find anything when I googled "Trump puts Russia in charge of American cyber security" Can you tell me more about this?

AnneR , June 17, 2019 at 16:14

Absolutely, Ruth the Truth. And that's even assuming that Russia did meddle (Russia, of course, seeming to "mean" the Kremlin always).

Yes, voter suppression, especially in the usual southern states is appallingly undemocratic (even assuming that what exists in the western world is, in fact democracy, which is questionable); gerrymandering, too.

And the corporate-capitalists together with two other nations, well, three, in fact: SA, IS and the UK, have far too much sway, one way or another the former two via money the latter via the cozy relationship between the secret services in our politics (and those of other nations).

The money should be stripped away – no lobbying, no donations, none of that. Simply a certain and small sum of money per candidate from the taxes and an electioneering period that is short. And candidates picked by the people, *not* by the party insiders.

David Otness , June 18, 2019 at 21:12

https://www.counterpunch.org/2018/07/27/the-grand-illusion-of-imperial-power/ <img alt='' src='https://secure.gravatar.com/avatar/ddfc8fe9d7877c2e0343c8f07d16df5f?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/ddfc8fe9d7877c2e0343c8f07d16df5f?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

AnneR , June 17, 2019 at 16:04

Your proof that the "IRA" interfered with the election in the Strumpet's favor?

Clearly you would seem to think that dearest Killary would have won but for the Russians – never mind that she ignored the three crucial swing states that determined the Electoral College outcome which in its turn decided which candidate won. The problem lies in both Killary's court and in the existence of the Electoral College – a deliberate stumbling block, erected by those much fawned over FFs to ensure that the great bewildered herd would *not* be the ones to decide, ultimately, who won the presidency.

Your proof that Russia is "our greatest enemy"?

Oh – they're Russian and they won't allow us, god's gift to humanity, to plunder and pillage their natural resources for our benefit not theirs. They want a multi-polar world in which every nation state is sovereign and not at under the hegemonic boot of the Anglo-Americans. Of course, they're our enemy, silly me for thinking that they have sensible people in their government and we have bloodthirsty, hypocritical psychopaths who are all linked arm in arm with the corporate-capitalist elites in ours.

And – talking about interfering in our election??? The sheer hypocrisy of menacing Russia over something that this country has done on a regular basis to other nations is, well, bloody mind-blowing.

Paul Merrell , June 17, 2019 at 17:54

@ "That doesn't change the fact that the Internet Research Agency (kept closely inline with Putin's wishes) interfered with the election, to help Trump and hurt Clinton "

Why so? Robert Mueller has a huge credibility problem and particularly so in his Internet Research Agency ("IRA") indictment, from the day of its announcement. See e.g., https://www.moonofalabama.org/2018/02/mueller-indictement-the-russian-influence-is-a-commercial-marketing-scheme.html

It was downhill from there. Mueller apparently assumed he would never have to prove his case since the U.S. has no extradition treaty with Russia and the indictment charged only 13 Russians and 3 Russian corporations. But surprise for him! One of the Russian corporations (Concord Management and Consulting ("Concord") showed up in court and asked to plead not guilty. Mueller immediately began backspinning, arguing that the court could not accept the plea because Concord had not been served with the indictment. The Court had no difficulty shutting down that spurious argument, properly ruling that it could attain jurisdiction over the defendant by accepting its not guilty plea.

Then Mueller began trying to avoid providing mandatory discovery allegedly because of an alleged threat to national security and because counsel for Concord might show the documents to other defendants who had not been served (more likely because he could not prove his case). That effort to deny discovery is still continuing. See e.g., government's June 12 motion. https://www.courtlistener.com/recap/gov.uscourts.dcd.193580/gov.uscourts.dcd.193580.24.0.pdf

Then it turned out that another of the charged corporations did not even exist. Mueller had indicted the proverbial ham sandwich.

No one yet knows how that case will turn out, but I would certainly not bet that Mueller got it right, particularly in a case he never thought he would have to prosecute.

@ "Come on, let's elect a president who promises to brown nose our greatest enemy and hand them all of our greatest Intel!"

Has it ever occurred to you that Russia is only our "greatest enemy" because our government has made it so? The fact that the Democratic Party has teamed with the Deep State and military/industrial complex in a glaringly obvious propaganda campaign against Russia counsels restraint and suspicion in regarding Russia as an enemy, unless, of course, you're an unwitting target of the propaganda.

Or didn't you get the memo from Mueller about no collusion with the Russians?

Michael Keenan , June 17, 2019 at 19:30

Not to mention that those charged Russians showed up in court to the surprise of Mueller.

Matt , June 17, 2019 at 23:40

Yes, the IRA agency ran the Face Book Ads that did encourage Democrats to "stay home." But this is not an election "hack," it is a very successful influence campaign. I find it incredulous that Mueller failed to follow the money to the most obvious entity that purchased the services of IRA in the first place- maybe the guy that bought the firm that created the FB targeting algorithm . used to select very specifically the right voters in the right states?

Cambridge Analytica Bannon Mercer

It might be uncomfortable to admit that American Oligarchs and their henchmen exerted the lions share of election "influence."

David G , June 17, 2019 at 19:46

Indeed! When will the free peoples be rid of Putin and the plague of cute puppy pictures he loosed on the poor, helpless U.S.?

https://consortiumnews.com/2017/10/04/the-mystery-of-the-russia-gate-puppies/

bjd , June 18, 2019 at 06:49

In case you hadn't noticed, this isn't exactly the place for dimwits.

David Otness , June 17, 2019 at 19:50

So much of Comey's schtick is predicated on his Boy Scout image that he has cultivated in his many years as an insider Beltway creature and the same goes for Mueller. At least insofar as Mueller can pull off the choirboy effect with his own physical countenance.
As both are former Fibbie Directors (and significantly, buddies,) just think of what kind of dirt they likely hold over so many D.C. pols in their toolkits. J. Edgar Hoover showed the way for his successors and in incestuous D.C. its top sharks always win. Between them they likely have a threatening wherewithal that many careerists in Foggy Bottom fear. And in that incestuous temple we have Comey's brother employed as an attorney with the firm that's keeping financial score for Clinton Inc -- a "charitable" swamp of its own that has broken virtually every rule on what constitutes a legal U.S. non-profit.

It is patently absurd that an FBI Director would allow an outside entity to substitute for the Bureau's criminal investigation authority and its unparalleled means to attain "honest" and complete answers. If it were indeed 'justice' being sought.
Comey's time at the ultra-crooked HSBC bank must have yielded an interesting harvest of favors owed as well, let alone his $ six million dollar salary for his one year working for Lockheed-Martin.

Both of these guys are cover-up artists, 'fixers' frequently in demand, and for good reason, so the powerful can continue their systematic, multi-generational pillage of not only the U.S., but the world as well.
I think this is one of the largest scandals ever in the history of the United States, along with the Kennedy brothers' assassinations, and that of Martin Luther King. The knaves of both parties with their asses hanging out are going all-out to keep the lid on it. Because what's at stake here is the sanctity of the Empire's Matrix of Woo. Our perception of "exceptionalism" and all that rah-rah jazz. For if the believers that glue this country together get wind of the magnitude of its interior rot and far-advanced decline
A lot of people are doing anything and everything (inventing and exacerbating, inviting and callously so) even potential nuclear destruction in a craven attempt to salvage their dubious-already reputations and their place in their lifespan's pecking order. It's screw us and screw the country; and while they're at it: screw the world too.

https://www.counterpunch.org/2017/06/08/comey-and-mueller-russiagates-mythical-heroes/

https://digwithin.net/2018/04/08/muellers-history/

hetro , June 17, 2019 at 09:18

Also take a look at:

"And as the Conservative Treehouse notes: 'This means the FBI and DOJ, and all of the downstream claims by the intelligence apparatus; including the December 2016 Joint Analysis Report and January 2017 Intelligence Community Assessment, all the way to the Weissmann/Mueller report and the continued claims therein; were based on the official intelligence agencies of the U.S. government and the U.S. Department of Justice taking the word of a hired contractor for the Democrat party .. despite their inability to examine the server and/or actually see an unredacted technical forensic report from the investigating contractor'."

And:

"Meanwhile, the Crowdstrike analyst who led forensics on the DNC servers is a former FBI employee who Robert Mueller promoted while head of the agency. It should also be noted that the government of Ukraine admonished Crowdstrike for a report they later retracted and amended, claiming that Russia hacked Ukrainian military."

https://www.zerohedge.com/news/2019-06-16/us-governments-entire-russia-dnc-hacking-narrative-based-redacted-draft-crowdstrike

Skip Scott , June 17, 2019 at 09:01

I am trying to figure out how Julian Assange could prove that it was not Russia without revealing Wikileaks' source for the DNC emails. It is simple enough to prove that it was a leak instead of a hack, but how do you prove the person wasn't a Russian agent without disclosing their identity?

If they could prove that Guccifer 2's stuff was an intelligence agency "vault 7" ploy, it would lend a lot of credibility to the real leak being a disgruntled DNC employee, probably Seth Rich.

Ron , June 17, 2019 at 10:33

Silly. It was Seth Rich who leaked -- the LATE Seth Rich, killed as he recovered from Clinton/Podesta's assassin in an ICU unit that was invaded by a suspicious SWAT team. Craig Murray has broadly hinted so; so has Kim Dotcom.

Skip Scott , June 17, 2019 at 11:44

I am not saying that I believe it was a Russian spy, I am asking how anyone would prove it without divulging the actual leaker, which Wikileaks has claimed they will never do. How do you prove a negative?

Norumbega , June 18, 2019 at 06:39

Skip: Julian Assange could provide evidence that WikiLeaks possessed the DNC emails it published already early June 2016, i.e. by the time he announced that WikiLeaks would soon be publishing leaked emails related to Hillary Clinton.

He could provide internal WikiLeaks communications documenting that work was being done to review these materials for publication between early June and the July 22 release (and specifically prior to their alleged transfer by G-2 on July 14).

These could be done even if the lawyers for Seth's brother Aaron Rich refuse to release Assange from confidentiality obligations, as requested by Ed Butowski's attorney Ty Clevenger.

And, yes, exposure of the persons behind G-2 would certainly help, though I doubt WL will be the one to do that. But people need to stop thinking of "Vault 7 ploys" in this connection, and look instead at the actual work on G-2. My reasons are elaborated in a previous response to John A, above.

Skip Scott , June 18, 2019 at 12:52

I understand that revealing the timing would undercut the G2 story, but without identifying the source how could they prove that the leaker wasn't a Russian spy who infiltrated the DNC staff? I haven't heard them try to sell that one yet, but they might try it when the G2 story and the hacking story falls apart.

Norumbega , June 19, 2019 at 07:22

Comey has already testified that they "think" the "Russians" used a "cut-out". The Mueller report admits in passing that emails (in that context the Podesta emails or the second batch of DNC emails) may have been passed to WikiLeaks by an intermediary in the late summer of 2016. So some, at least may be contemplating such an allegation as a way out. Nevertheless, further information that underlined the falsity of the official timeline would be significant, I think.

Sally Snyder , June 17, 2019 at 07:44

As shown in this article, the entire anti-Russia narrative was built on a lie:

https://viableopposition.blogspot.com/2019/06/washingtons-duplicitous-approach-to.html

Here are, however, serious repercussions that are a result of this lie; the unintended consequence of poorly executed foreign policy could be the potential end of the U.S. dollar as the world's currency of choice in international trade as nations around the world attempt to minimize the impact of Washington's sanctions.

[Jun 19, 2019] Mueller and Russiagate story: The Eternal Witch-hunt

Apr 12, 2019 | counterpunch.org

Mueller looks more and more like a man looking in a black room for a black cat that isn't there, and finding it.

[Jun 18, 2019] Crowdstrike Never Produced Final Report on Alleged Russian Hacking by Ray McGovern

Jun 18, 2019
Notable quotes:
"... In other words CrowdStrike, upon which the FBI relied to conclude that Russia hacked the DNC, never completed a final report and only turned over three redacted drafts to the government. ..."
"... In Stone's motion his lawyers argued: "If the Russian state did not hack the DNC, DCCC, or [Clinton campaign chairman John] Podesta's servers, then Roger Stone was prosecuted for obstructing a congressional investigation into an unproven Russian state hacking conspiracy The issue of whether or not the DNC was hacked is central to the Defendant's defense." ..."
"... Suspicions grew as Comey started referring to CrowdStrike as the "pros that they hired." Doubts became more intense when he referred to CrowdStrike as "a high-class entity." In fact the company had a tarnished reputation for reliability and objectivity well before it was hired by the DNC. ..."
"... Dimitri Alperovitch, a CrowdStrike co-founder, is an opponent of Russian President Vladimir Putin and a senior fellow at the anti-Russian Atlantic Council think tank in Washington. CrowdStrike said it determined that Russia had hacked the DNC server because it found Cyrillic letters in the metadata, as well as the name of the first Soviet intelligence chief – clues an amateur might leave. ..."
"... But the software CrowdStrike used to blame Russia for hacking the DNC server was later revealed to be so faulty it had to be rewritten . ..."
"... VIPS does not believe the June 12, 14, & 15 timing was pure coincidence. Rather, it suggests the start of a preemptive move to associate Russia with anything WikiLeaks might have been about to publish and to "show" that it came from a Russian hack. ..."
"... Why did FBI Director James Comey not simply insist on access to the DNC computers? Surely he could have gotten the appropriate authorization. In early January 2017, reacting to media reports that the FBI never asked for access, Comey told the Senate Intelligence Committee there were "multiple requests at different levels" for access to the DNC servers. "Ultimately what was agreed to is the private company would share with us what they saw," he said. Comey described CrowdStrike as a "highly respected" cybersecurity company. ..."
"... More telling was earlier questioning by House Intelligence Committee member, Rep. Will Hurd (R-TX), who had been a CIA officer for a decade. On March 20, 2017 while he was still FBI director, Comey evidenced some considerable discomfort as he tried to explain to the committee why the FBI did not insist on getting physical access to the DNC computers and do its own forensics: ..."
"... On March 31, 2017 WikiLeaks released the most damaging disclosure up to that point from what it called "Vault 7" – a treasure trove of CIA cybertools leaked from CIA files. This disclosure featured the tool "Marble Framework," which enabled the CIA to hack into computers, disguise who hacked in, and falsely attribute the hack to someone else by leaving so-called telltale signs – like Cyrillic, for example. ..."
"... The CIA documents also showed that the "Marble" tool had been employed in 2016. ..."
"... As Russia-gate transmogrifies into Deep State-gate, the DOJ is launching a probe into the origins of Russia-gate and the intelligence agencies alleged role in it. It remains to be seen whether US Attorney for the District of Connecticut John Durham, who is leading the probe, will interview Assange, unlike Special Counsel Robert Mueller, who did not. ..."
Jun 18, 2019 | original.antiwar.com

The revelation came in a court filing by the government in the pretrial phase of Roger Stone, a longtime Republican operative who had an unofficial role in the campaign of candidate Donald Trump. Stone has been charged with misleading Congress, obstructing justice and intimidating a witness.

The filing was in response to a motion by Stone's lawyers asking for "unredacted reports" from CrowdStrike in an effort to get the government to prove that Russia hacked the DNC server. "The government does not possess the information the defendant seeks," the filing says.

In his motion, Stone's lawyers said he had only been given three redacted drafts. In a startling footnote in the government's response, the DOJ admits the drafts are all that exist. "Although the reports produced to the defendant are marked 'draft,' counsel for the DNC and DCCC informed the government that they are the last version of the report produced," the footnote says.

In other words CrowdStrike, upon which the FBI relied to conclude that Russia hacked the DNC, never completed a final report and only turned over three redacted drafts to the government.

These drafts were "voluntarily" given to the FBI by DNC lawyers, the filing says. "No redacted information concerned the attribution of the attack to Russian actors," the filing quotes DNC lawyers as saying.

In Stone's motion his lawyers argued: "If the Russian state did not hack the DNC, DCCC, or [Clinton campaign chairman John] Podesta's servers, then Roger Stone was prosecuted for obstructing a congressional investigation into an unproven Russian state hacking conspiracy The issue of whether or not the DNC was hacked is central to the Defendant's defense."

The DOJ responded: "The government does not need to prove at the defendant's trial that the Russians hacked the DNC in order to prove the defendant made false statements, tampered with a witness, and obstructed justice into a congressional investigation regarding election interference."

Thousands of emails from the DNC server were published by WikiLeaks in July 2016 revealing that the DNC interfered in the Democratic primary process to favor former Secretary of State Hillary Clinton over Senator Bernie Sanders for the party's presidential nomination. The U.S. indicted 12 Russian military intelligence agents in 2018 for allegedly hacking the DNC server and giving the emails to WikiLeaks.

Comey Can't Say Why

At a time of high tension in the 2016 presidential campaign, when the late Sen. John McCain and others were calling Russian "hacking" an "act of war," the FBI settled for three redacted "draft reports" from CrowdStrike rather than investigate the alleged hacking itself, the court document shows.

Then FBI Director James Comey admitted in congressional testimony that he chose not to take control of the DNC's "hacked" computers, and did not dispatch FBI computer experts to inspect them, but has had trouble explaining why.

In his testimony, he conceded that "best practices" would have dictated that forensic experts gain physical access to the computers. Nevertheless, the FBI decided to rely on forensics performed by a firm being paid for by the DNC.

Suspicions grew as Comey started referring to CrowdStrike as the "pros that they hired." Doubts became more intense when he referred to CrowdStrike as "a high-class entity." In fact the company had a tarnished reputation for reliability and objectivity well before it was hired by the DNC.

Dimitri Alperovitch, a CrowdStrike co-founder, is an opponent of Russian President Vladimir Putin and a senior fellow at the anti-Russian Atlantic Council think tank in Washington. CrowdStrike said it determined that Russia had hacked the DNC server because it found Cyrillic letters in the metadata, as well as the name of the first Soviet intelligence chief – clues an amateur might leave.

But the software CrowdStrike used to blame Russia for hacking the DNC server was later revealed to be so faulty it had to be rewritten .

CrowdStrike's Early Role

In a Memorandum for the President on July 24, 2017, Veteran Intelligence Professionals for Sanity referred prominently to this instructive time sequence:

VIPS does not believe the June 12, 14, & 15 timing was pure coincidence. Rather, it suggests the start of a preemptive move to associate Russia with anything WikiLeaks might have been about to publish and to "show" that it came from a Russian hack.

Bill Binney, a former NSA technical director and a VIPs member, filed an affidavit in Stone's case. Binney said: "WikiLeaks did not receive stolen data from the Russian government. Intrinsic metadata in the publicly available files on WikiLeaks demonstrates that the files acquired by WikiLeaks were delivered in a medium such as a thumb drive."

Preferring CrowdStrike; ' Splaining to Congress

Why did FBI Director James Comey not simply insist on access to the DNC computers? Surely he could have gotten the appropriate authorization. In early January 2017, reacting to media reports that the FBI never asked for access, Comey told the Senate Intelligence Committee there were "multiple requests at different levels" for access to the DNC servers. "Ultimately what was agreed to is the private company would share with us what they saw," he said. Comey described CrowdStrike as a "highly respected" cybersecurity company.

Asked by committee Chairman Richard Burr (R-NC) whether direct access to the servers and devices would have helped the FBI in their investigation, Comey said it would have. "Our forensics folks would always prefer to get access to the original device or server that's involved, so it's the best evidence," he said.

Five months later, after Comey had been fired, Burr gave him a Mulligan in the form of a few kid-gloves, clearly well-rehearsed, questions:

BURR: And the FBI, in this case, unlike other cases that you might investigate – did you ever have access to the actual hardware that was hacked? Or did you have to rely on a third party to provide you the data that they had collected?

COMEY: In the case of the DNC, we did not have access to the devices themselves. We got relevant forensic information from a private party, a high-class entity, that had done the work. But we didn't get direct access.

BURR: But no content?

COMEY: Correct.

BURR: Isn't content an important part of the forensics from a counterintelligence standpoint?

COMEY: It is, although what was briefed to me by my folks – the people who were my folks at the time is that they had gotten the information from the private party that they needed to understand the intrusion by the spring of 2016.

More telling was earlier questioning by House Intelligence Committee member, Rep. Will Hurd (R-TX), who had been a CIA officer for a decade. On March 20, 2017 while he was still FBI director, Comey evidenced some considerable discomfort as he tried to explain to the committee why the FBI did not insist on getting physical access to the DNC computers and do its own forensics:

HURD: So there was about a year between the FBI's first notification of some potential problems with the DNC network and then that information getting on – getting on WikiLeaks.

COMEY: Yes, sir.

HURD: when did the DNC provide access for – to the FBI for your technical folks to review what happened?

COMEY: Well we never got direct access to the machines themselves. The DNC in the spring of 2016 hired a firm that ultimately shared with us their forensics from their review of the system.

HURD: So, Director FBI notified the DNC early, before any information was put on WikiLeaks and when – you have still been – never been given access to any of the technical or the physical machines that were – that were hacked by the Russians.

COMEY: That's correct although we got the forensics from the pros that they hired which – again, best practice is always to get access to the machines themselves, but this – my folks tell me was an appropriate substitute.

Comey Spikes Deal With Assange

Director Comey's March 20, 2017 testimony to the House Intelligence Committee came at the same time he was scuttling months-long negotiations between Assange and lawyers representing the DOJ and CIA to grant some limited immunity for the WikiLeaks founder. In return, Assange offered to: (1) redact "some classified CIA information he might release in the future," and (2) "provide technical evidence and discussion regarding who did not engage in the DNC releases."

Investigative journalist John Solomon, quoting WikiLeaks ' intermediary with the government, broke this story, based on "interviews and a trove of internal DOJ documents turned over to Senate investigators. It would be a safe assumption that Assange was offering to prove that Russia was not WikiLeaks ' source of the DNC emails, something Assange has repeatedly said.

That, of course, would have been the last thing Comey would have wanted.

On March 31, 2017 WikiLeaks released the most damaging disclosure up to that point from what it called "Vault 7" – a treasure trove of CIA cybertools leaked from CIA files. This disclosure featured the tool "Marble Framework," which enabled the CIA to hack into computers, disguise who hacked in, and falsely attribute the hack to someone else by leaving so-called telltale signs – like Cyrillic, for example.

The CIA documents also showed that the "Marble" tool had been employed in 2016.

Two weeks later, then CIA Director Mike Pompeo branded WikiLeaks a "non-state hostile intelligence service," and the U.S. put pressure on Ecuador, which had given Assange asylum, to expel him from its London embassy. He was on April 11 when British police arrested him. On the same day he was convicted of skipping bail on a Swedish investigation that had since been dropped. Assange was sentenced to 50 weeks in London's max-security Belmarsh prison.

Comey, it seems a safe bet, still worries that Assange or one of his associates, will provide "technical evidence" enough to prove "who did not engage in the DNC releases."

What Were They Thinking?

At the March 20, 2017 House Intelligence Committee hearing, Congressman Trey Gowdy heaped effusive praise on then-FBI Director Comey, calling him "incredibly respected." At that early stage, no doubt Gowdy meant no double entendre . He might now.

As Russia-gate transmogrifies into Deep State-gate, the DOJ is launching a probe into the origins of Russia-gate and the intelligence agencies alleged role in it. It remains to be seen whether US Attorney for the District of Connecticut John Durham, who is leading the probe, will interview Assange, unlike Special Counsel Robert Mueller, who did not.

It is proving very difficult for some of my old FBI friends and others to believe that Comey and other justice, intelligence, and security officials at the very top could have played fast and loose with the Constitution and the law and lived a lie over the past few years.

"How did they ever think they could get away with it?" they ask. The answer is deceivingly simple. Comey himself has explained it in a moment of seemingly unintentional candor in his pretentious book, "A Higher Loyalty." He wrote, "I was making decisions in an environment where Hillary Clinton was sure to be the next president."

There would be no problem, of course, if Mrs. Clinton had won the election. That's what they all thought; and that probably explains their lack of care in keeping their activities off the written record and out of computers. Elementary tradecraft goes out the window with these upper-echelon, "high-class-entity" officials, when they are sure that she, and they, are going to be the inevitable winners – with promotions, not indictments in store for them.

Additional reporting by Joe Lauria

Background Reading on Deep State-Gate

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. His 27-year career as a CIA analyst includes serving as Chief of the Soviet Foreign Policy Branch and preparer/briefer of the President's Daily Brief. He is co-founder of Veteran Intelligence Professionals for Sanity (VIPS). This originally appeared at Consortium News .

Author: Ray McGovern

Ray McGovern works with Tell the Word, the publishing arm of the ecumenical Church of the Saviour in inner-city Washington. In the Sixties he served as an infantry/intelligence officer and then became a CIA analyst for the next 27 years. He is on the Steering Group of Veteran Intelligence Professionals for Sanity (VIPS). View all posts by Ray McGovern

[Jun 16, 2019] US Govt's Entire Russia-DNC Hacking Narrative Based On Redacted Draft Of Crowdstrike Report

Jun 16, 2019 | www.zerohedge.com

It's been known for some time that the US Government based its conclusion that Russia hacked the Democratic National Committee (DNC) on a report by cybersecurity firm Crowdstrike, which the DNC paid over a million dollars to conduct forensic analysis and other work on servers they refused to hand over to the FBI.

CrowdStrike's report made its way into a joint FBI/DHS report on an Russia's " Grizzly Steppe ", which concluded Russia hacked the DNC's servers. At the time, Crowdstrike's claim drew much scrutiny from cybersecurity experts according to former Breitbart reporter Lee Stranahan.

Now, thanks to a new court filing by longtime Trump adviser Roger Stone requesting the full Crowdstrike analysis, we find out that the US government was given a redacted version of the report marked "Draft, " as reported by the Conservative Treehouse .

What makes the whole thing even more hokey is a footnote admitting that "counsel for the DNC and DCCC informed the government that they are the last version of the report produced. "

So to be clear - the entire narrative that Russia hacked the DNC is based on a redacted draft of a report which Crowdstrike appears not to have even finalized.

me title=

And as the Conservative Treehouse notes: "This means the FBI and DOJ, and all of the downstream claims by the intelligence apparatus; including the December 2016 Joint Analysis Report and January 2017 Intelligence Community Assessment, all the way to the Weissmann/Mueller report and the continued claims therein; were based on the official intelligence agencies of the U.S. government and the U.S. Department of Justice taking the word of a hired contractor for the Democrat party .. despite their inability to examine the server and/or actually see an unredacted technical forensic report from the investigating contractor."

The entire apparatus of the U.S. government just took their word for it

and used the claim therein as an official position .

which led to a subsequent government claim, in court, of absolute certainty that Russia hacked the DNC.

Think about that for a few minutes. - Conservative Treehouse

Meanwhile, the Crowdstrike analyst who led forensics on the DNC servers is a former FBI employee who Robert Mueller promoted while head of the agency. It should also be noted that the government of Ukraine admonished Crowdstrike for a report they later retracted and amended , claiming that Russia hacked Ukrainian military.

Sign in to comment filter_list Viewing Options arrow_drop_down

General Titus , 10 seconds ago link

Remember when Fugly Debbie " I Know Nothing" Sgt Shultz Washerwoman threatened that Chief of Police?

4medicinalpurposesonly , 17 seconds ago link

Amazing how the Dems are able to commit cyber spying yet Hillary and Lois Lerner lose all of their emails including back ups

Helg Saracen , 1 minute ago link

Oy wey! Do not make my **** laugh (I myself have long been unable to laugh from all this circus). Guys - not tired yet?

:)

Catullus , 5 minutes ago link

Remember that one time Hillary Clinton said on national television during a presidential debate that Russia needed to be held accountable for this? That 17 intelligence agreed they did it. And that we should take action to provoke a nuclear power. On TV.

All because we got to see how corrupt the DNC nomination process is.

brokebackbuck , 23 seconds ago link

its a very simple scheme. its what any child would do hide that they cheated and get out of trouble:

1) stop trumpo
2) fabricate the foreign meddling narrative to implicate trump as LONG as possible, so long it makes people sick to hear foreign meddling, even though it was the DNC that actually paid british people to fabricate compromat.
3) blame russia for everything

Mike Rotsch , 8 minutes ago link

Anyone remember that very brief news story about a California Senator returning from London with "bombshell" information that he had to get to the POTUS immediately? I waited to see if anything would ever come of that. Instead . . .

. . . scrubbed from the internet.

pHObuk0wrEHob71Suwr2 , 10 minutes ago link

Hooty Hoo

https://twitter.com/JakeWharton/status/1092425961361022976

MrBoompi , 12 minutes ago link

If it says Factual Background, it must be true. We are dealing with super trustworthy folks here, remember. How many more "factual reports" will we see that don't mention Seth Rich? The murderers are still running free.

yerfej , 13 minutes ago link

The bureaucracy owns the media, courts, and academia so naturally they can shape the law to meet their personal needs. The average taxpayer is just a tool to allow the bureaucrats to consolidate and maintain their ownership of everyone and everything.

RussianSniper , 13 minutes ago link

Trump enjoys drama and treats this entire treasonous coup as a television drama.

The issue is that ordinary American citizens are sick and tired of the powerful and wealthy having two sets of rules, theirs and those for everyone else.

I stopped watching television except for local sports and NHL.

I rarely look at ZH anymore.

Never watch Fox anymore

Would not consider any paper

My point is that the people who once were concerned, are losing interest.

Those who treat politics as religion will continue to treat those who disagree as criminals and cast offs.

What used to be a great country that a availed opportunity to all who tried, is now a kleptocracy and a club for leftist religious fanatics.

lisa.roy39 , 14 minutes ago link

𝐈'𝐦 ­­­­­­­­­ 𝐦𝐚𝐤𝐢𝐧𝐠 ­­­­­­­­­𝐨𝐯𝐞𝐫­­­­­­­­­ $𝟏𝟑𝐤­­­­­­­­­ 𝐢𝐧 𝐨𝐧𝐞 𝐦𝐨𝐧𝐭𝐡­­­­­­­­­ 𝐰𝐨𝐫𝐤𝐢𝐧𝐠­­­­­­­­­ 𝐩𝐚𝐫𝐭 ­­­­­­­­­𝐭𝐢𝐦𝐞. 𝐈 ­­­­­­­­­𝐤𝐞𝐩𝐭 ­­­­­­­­­𝐡𝐞𝐚𝐫𝐢𝐧𝐠 ­­­­­­­­­𝐨𝐭𝐡𝐞𝐫 ­­­­­­­­­𝐩𝐞𝐨𝐩𝐥𝐞 ­­­­­­­­­𝐭𝐞𝐥𝐥 ­­­­­­­­­𝐦𝐞 𝐡𝐨𝐰 𝐦𝐮𝐜𝐡 ­­­­­­­­­𝐦𝐨𝐧𝐞𝐲 ­­­­­­­­­𝐭𝐡𝐞𝐲 ­­­­­­­­­𝐜𝐚𝐧 ­­­­­­­­­𝐦𝐚𝐤𝐞 ­­­­­­­­­𝐨𝐧𝐥𝐢𝐧𝐞 𝐬𝐨 𝐈 ­­­­­­­­­𝐝𝐞𝐜𝐢𝐝𝐞𝐝 𝐭𝐨 𝐥𝐨𝐨𝐤­­­­­­­­­ 𝐢𝐧𝐭𝐨 𝐢𝐭. ­­­­­­­­­𝐖𝐞𝐥𝐥, 𝐢𝐭 𝐰𝐚𝐬­­­­­­­­­ 𝐚𝐥𝐥 𝐭𝐫𝐮𝐞­­­­­­­­­ 𝐚𝐧𝐝 𝐡𝐚𝐬 𝐭𝐨𝐭𝐚𝐥𝐥𝐲 ­­­­­­­­­𝐜𝐡𝐚𝐧𝐠𝐞𝐝 𝐦𝐲 ­­­­­­­­­𝐥𝐢𝐟𝐞.­­­­­­­­­𝐥𝐚𝐬𝐭 𝐦𝐨𝐧𝐭𝐡­­­­­­­­­ 𝐦𝐲 ­­­­­­­­­𝐩𝐚𝐲 𝐜­­­­­­­­­𝐡𝐞𝐜𝐤 𝐰𝐚𝐬 ­­­­­­­­­$𝟏𝟐𝟕𝟏𝟐 ­­­­­­­­­𝐣𝐮𝐬𝐭 ­­­­­­­­­𝐰𝐨𝐫𝐤𝐢𝐧𝐠 𝐨𝐧 𝐭𝐡𝐞 ­­­­­­­­­𝐥𝐚𝐩𝐭𝐨𝐩 𝐟𝐨𝐫­­­­­­­­­ 𝐚 𝐟𝐞𝐰 𝐡𝐨𝐮𝐫𝐬.𝐄𝐯𝐞𝐫𝐲 𝐩𝐞𝐫𝐬𝐨𝐧 𝐜𝐚𝐧 𝐧𝐨𝐰 𝐦𝐚𝐤𝐞𝐬 𝐠𝐨𝐨𝐝 𝐢𝐧𝐜𝐨𝐦𝐞 𝐨𝐧𝐥𝐢𝐧𝐞 𝐞𝐚𝐬𝐢𝐥𝐲 𝐛𝐲 𝐣𝐮𝐬𝐭 𝐟𝐨𝐥𝐥𝐨𝐰 𝐢𝐧𝐬𝐭𝐫𝐮𝐜𝐭𝐢𝐨𝐧𝐬 𝐨𝐧 𝐭𝐡𝐢𝐬 𝐥𝐢𝐧𝐤.....

click this link════►►► http://www.todaysfox.com

Bricker , 18 minutes ago link

#Resist will guarantee Trumps re-election, unless the 15 states who are going to use their pact to send their votes towards popular vote.

The United States of America is turning into a shithole Banana Republic with the ******* democrats.

This should be headline news on conservative stations, not including the new liberal news station, Fox News.

glenlloyd , 6 minutes ago link

I don't think states can arbitrarily decide to ignore the electoral college if they want to. Something tells me federal law governs national elections and they can whine and cry and act like triggered embiciles all they want but it doesn't change the law.

The Carbonator , 3 minutes ago link

It would end up going to SCOTUS. Lets hope that Trump gets the honor of replacing that treasonous bitch with a real constitutional judge. Lets keep hope alive!

Pussy Biscuit , 19 minutes ago link

That disgusting *** should be liquidated.

scaleindependent , 21 minutes ago link

Whatever we blame Russia for doing, we are in fact doing.

For example, we blame them for hacking our electrical grid. No proof was given, yet this morning we have evidence we have been messing and hacking Russia's electrical grid.

We blame them for interfering in our elections, when in fact we have been interfering in the world's elections and sovereign governments.


The ultimate hypocrites.

freedommusic , 21 minutes ago link

DEFENSE ATTORNEY: Agent Smith, you testified that the Russians hacked the DNC computers, is that correct?

FBI AGENT JOHN SMITH: That is correct.

DEF ATT: Upon what information did you base your testimony?

AGENT: Information found in reports analyzing the breach of the computers.

DEF ATT: So, the FBI prepared these reports?

AGENT: (cough) . (shift in seat) No, a cyber security contractor with the FBI.

DEF ATT: Pardon me, why would a contractor be preparing these reports? Do these contractors run the FBI laboratories where the server was examined?

AGENT: No.

DEF ATT: No? No what? These contractors don't run the FBI Laboratries?

AGENT: No. The laboratories are staffed by FBI personnel.

DEF ATT: Well I don't understand. Why would contractors be writing reports about computers that are forensically examined in FBI laboratories?

AGENT: Well, the servers were not examined in the FBI laboratory.

(silence)

DEF ATT: Oh, so the FBI examined the servers on site to determine who had hacked them and what was taken?

AGENT: Uh .. no.

DEF ATT: They didn't examine them on site?

AGENT: No.

DEF ATT: Well, where did they examine them?

AGENT: Well, uh .. the FBI did not examine them.

DEF ATT: What?

AGENT: The FBI did not directly examine the servers.

DEF ATT: Agent Smith, the FBI has presented to the Grand Jury and to this court and SWORN AS FACT that the Russians hacked the DNC computers. You are basing your SWORN testimony on a report given to you by a contractor, while the FBI has NEVER actually examined the computer hardware?

AGENT: That is correct.

DEF ATT: Agent Smith, who prepared the analysis reports that the FBI relied on to give this sworn testimony?

AGENT: Crowdstrike, Inc.

DEF ATT: So, which Crowdstrike employee gave you the report?

AGENT: We didn't receive the report directly from Crowdstrike.

DEF ATT: What?

AGENT: We did not receive the report directly from Crowdstrike.

DEF ATT: Well, where did you find this report?

AGENT: It was given to us by the people who hired Crowdstrike to examine and secure their computer network and hardware.

DEF ATT: Oh, so the report was given to you by the technical employees for the company that hired Crowdstrike to examine their servers?

AGENT: No.

DEF ATT: Well, who gave you the report?

AGENT: Legal counsel for the company that hired Crowdstrike.

DEF ATT: Why would legal counsel be the ones giving you the report?

AGENT: I don't know.

DEF ATT: Well, what company hired Crowdstrike?

AGENT: The Democratic National Committee.

DEF ATT: Wait a minute. Let me get this straight. You are giving SWORN testimony to this court that Russia hacked the servers of the Democratic National Committee. And you are basing that testimony on a report given to you by the LAWYERS for the Democratic National Committee. And you, the FBI, never actually saw or examined the computer servers?

AGENT: That is correct.

DEF ATT: Well, can you provide a copy of the technical report produced by Crowdstrike for the Democratic National Committee?

AGENT: No, I cannot.

DEF ATT: Well, can you go back to your office and get a copy of the report?

AGENT: No.

DEF ATT: Why? Are you locked out of your office?

AGENT: No.

DEF ATT: I don't understand. Why can you not provide a copy of this report?

AGENT: Because I do not have a copy of the report.

DEF ATT: Did you lose it?

AGENT: No.

DEF ATT: Why do you not have a copy of the report?

AGENT: Because we were never given a final copy of the report.

DEF ATT: Agent Smith, if you didn't get a copy of the report, upon what information are you basing your testimony?

AGENT: On a draft copy of the report.

DEF ATT: A draft copy?

AGENT: Yes.

DEF ATT: Was a final report ever delivered to the FBI?

AGENT: No.

DEF ATT: Agent Smith, did you get to read the entire report?

AGENT: No.

DEF ATT: Why not?

AGENT: Because large portions were redacted.

DEF ATT: Agent Smith, let me get this straight. The FBI is claiming that the Russians hacked the DNC servers. But the FBI never actually saw the computer hardware, nor examined it? Is that correct?

AGENT: That is correct.

DEF ATT: And the FBI never actually examined the log files or computer email or any aspect of the data from the servers? Is that correct?

AGENT: That is correct.

DEF ATT: And you are basing your testimony on the word of Counsel for the Democratic National Committee, the people who provided you with a REDACTED copy of a DRAFT report, not on the actual technical personnel who supposedly examined the servers?

AGENT: That is correct.

DEF ATT: Your honor, I have a few motions I would like to make at this time.

PRESIDING JUDGE: I'm sure you do, Counselor. (as he turns toward the prosecutors) And I feel like I am in a mood to grant them.

( source )

hooligan2009 , 14 minutes ago link

Brilliant! that sums it up nicely. of course, if the servers were not hacked and were instead "thumbnailed" that leads to a whole pile of other questions (including asking wiileaks for their source and about the murder of seth rich).

GALLGE , 1 minute ago link

There's no way to sweep it under the official rug at this point. Even kicking off WWIII as a distraction will flop.

Thebighouse , 22 minutes ago link

Lying demon-rats........liars liars liars.........just like cnn, and their affiliates...nbc, cbs abc msnbc...........all weaponized propaganda outlets........should lose fcc licenses and HANG THEIR LYING COLLUDING ANCHORS....hang 'em high........liars

DEDA CVETKO , 23 minutes ago link

As the ring of known Russiagate conspirators gets narrower and narrower, this anti-russian (which also happens to be anti-american and anti-world) clique's collective characteristics and traits are getting easier and easier to discern and quantify because their contours - previously carefully concealed by multiple layers of opaque veils and drapes - are now fully visible.

These people are all (A) privileged elites and dynastic social castes (B) share, more or less, the same social and divine cosmology (no, not Buddhist) (C) do not recognize ethics and morals as having any meaning or significance except on a purely nominal and declarative level, which - of course - applies to others, but not to themselves (D) firmly believe in survival of the fittest, law of the jungle and might-makes-right (E) are all members of the secret frats (F) performed important state functions and aspire to perform some more because, after all, greed is good and so is unlimited ambition (they also seem to enjoy very much their hard-earned social status and prominence) (G) belong to the same "liberal interventionist" war club (H) believe in Keynesian economics, but - absurdly, and in the same breath - in Ayn Rand's right-wing ideological nonsense, depending on what suits them the best at any given moment, (I) typically have background in banking or finance, corporate management or government lobbying (J) prefer to remain anonymous at any cost (K) have a very fluid and elastic perception of human sexuality and libidinal urges (L) Own Panama-or Cayman Islands- chartered tax havens (M) do not mingle with the non-elites or unwashed masses (N) firmly believe in their divine chosenness and messianic role (O) show pronounced, sustained propensity to Groupthink and consistent absence of any creative and constructive thought; (P) are always "centrists", "middle of the road" and "bipartisan" and never tend to stick out in any social milieu, preferring instead to dictate from the opaque deep end, (Q) maintain extremely high fake media visibility (R) do not believe in forgiveness, penitence or remorse - only in never-ending, bloody revenge.

This profile of humans cannot be properly socialized or resocialized, because the social ethos that created them made amply sure that they cannot be adjusted, bettered, improved or otherwise socially tweaked at any point in their lives: in essence, their characters and personalities are cast in stone, cemented unto all eternity and permanently immutable.. The best that we, the normal people, can do is kindly and gently quarantine them to a place where they can't inflict any significant damage and prevent them from rising to the top, which may turn out to be very different because they control (and have every intention of controlling in the future) every road that leads to the top.

hooligan2009 , 11 minutes ago link

well put sir/madam/it!!!

Amy G. Dala , 23 minutes ago link

So, the FBI "asked" the DNC for the servers, and the DNC said they never heard from the FBI.

Guess James Comey musta got Seth Rich on the line.

charliebrown , 24 minutes ago link

Treason including a coup against democracy

ATM , 22 minutes ago link

against the Republic.

Democracy is pure evil.

Government needs you to pay taxes , 24 minutes ago link

Rule of law in Murrika is kaput.

DirtySanchez , 26 minutes ago link

The entirety of the USA government, including the intel agencies, the judiciary, state dept, justice dept, congress, and the growing bureaucracy has been hijacked by a treacherous tribe of people, intent on destroying the nation from within.

Kill the tyrants before they kill you!

Thebighouse , 20 minutes ago link

Punish the tyrants and look at that well organized community...........if you don't think leggo-obummer didn't have a huge hand in this, you are very mis-informed.

ACMeCorporations , 27 minutes ago link

Perkins Coie, Perkins Coie, Perkins Coie. Follow the money. Perkins Coie paid Fusion GPS and CrowdStrike. Raid them like Michael Cohen was raided.

hooligan2009 , 26 minutes ago link

bang on!

SummerSausage , 20 minutes ago link

Raid them like Roger Stone was raided!

BIWEEE , 28 minutes ago link

Wasserman-Schultz = Khazar!!!

hooligan2009 , 25 minutes ago link

= futt bugly mowler honkey

Black Dog 32 , 30 minutes ago link

Crowdstrike just ipo'd this week. Cashing in. I think it was up 100% first day.

natxlaw , 30 minutes ago link

I'm bored, when is someone going to jail. I won't be sharing this information with blue pill normies they would not get it. Trump, you listening?

Joebloinvestor , 32 minutes ago link

The FBI was so "in the bag" with the DNC it is laughable.

Now you know why they wanted the Smollet investigation handed off to the FBI.

Bunch of ******* dirty corrupt cops.

hooligan2009 , 34 minutes ago link

just remember that, aside from the weaponization of federal agencies for political purposes by obama, biden and clinton (which merits waterboarding in guantanamo) - there are hundreds if not thousands of INNOCENTS who have been prosecuted and GUILTY still walking the streets.

the prosecution of the innocent and the releaseof the guilty may have been going on for decades, but, but now, it should be apparet, that in true KGB style, it ballooned to extreme proportions under Obama/Biden and Clinton.

and this is what the howler moneys in the clown car want to inflict on the US in 2020. after all, it's their turn right?

honk honk.

schroedingersrat , 32 minutes ago link

And it got much worse under Trump hiring all the war criminals form yesteryears back into office.

hooligan2009 , 23 minutes ago link

truth is a good way of triggering howler monkeys

Creative_Destruct , 35 minutes ago link

"....based on the official intelligence agencies of the U.S. government and the U.S. Department of Justice taking the word of a hired contractor for the Democrat party"

Hey, when you (the FBI, the entire executive branch) are partisan Never Trumpers and it's your party what else should we expect? After all, gotta concoct all the propaganda possible under the guise of an "objective" investigation for that "insurance policy."

novictim , 37 minutes ago link

Totally believable. The corruption is just as bad as the most pessimistic analysis has suggested.

We live in a time of universal lies and a press that supports illegal activities by treasonous elements of the US Government.

How do we turn this around without an honest Press rallying the public?

Amy G. Dala , 27 minutes ago link

Easy. Apply responsibilities that are commensurate with their constitutional right to publish. It's been three years of ******** and unsourced stories.

At a minimum, when a confidential source provides information that is demonstrated to be false, then that reporter is legally bound to identify them. Fuckers should be in jail.

Look at Assange. He publishes truth, and he's in jail. Tapper/Seltzer/et. al. are millionaire celebrities.

Thordoom , 38 minutes ago link

Why Russians who were sanctioned by US over this hoax are not suing US and asking for huge reparations is beyond me.

schroedingersrat , 37 minutes ago link

Most Russian sanctions are based on lies. Have a look at the Magnitsky Act :)

Thordoom , 36 minutes ago link

I know i follow Lee Stranahan's work about that hoax too for years.

Bill Browder blocked me on twater.

Ruff_Roll , 18 minutes ago link

Maybe they're blocked by sovereign immunity.

pparalegal , 39 minutes ago link

Another day another Hillary crowd-strikes.

[Jun 14, 2019] Our old acquaintance Crowdstrike has gone public, and in its IPO debut, the stock surged to a market cap of over $12 Billion

Notable quotes:
"... Surprisingly, Crowdstrike's CEO – George Kurtz – does not have a background in the national intelligence services, or none that is immediately apparent. He seems to have worked mostly in private security, having gotten into it fairly early on, and is an accountant by trade; he seems to be the public face of the firm, and to be mostly involved in marketing. ..."
"... However, their president of services, Shawn Henry, is a former executive assistant director of the FBI, and I imagine its employees include quite a few former government spooks and ideologues. ..."
"... The other co-founder, though, is Dmitry Alperovitch. ..."
"... He's a Senior Fellow at the Atlantic Council think tank, a direct adviser to the US Department of Defense, connected to Hillary Clinton and runs a new corporation whose startup cash came from Google. There's something even bigger than Google – corporations now seem more and more to be merging into what are essentially mini-states within the state itself – and it is called Alphabet Capital, Google's parent company. The Chairman of Alphabet Capital is Eric Schmidt, and he was actively working for Hillary Clinton during the last election when she spectacularly failed to make the cut. ..."
"... Google, allegedly, is becoming more and more an arm of the Democratic Party in the USA. ..."
"... Wheels within wheels, and connections seen and unseen. Several security professionals and software developers have alluded to Crowdstrike's reports on international hacking as being full of shit – but the American enforcement and intelligence services seem content to outsource their cyber work more or less exclusively to Crowdstrike. And the results of its IPO suggest high confidence on the part of investors that it is going to become ever-more-closely allied to the US government, font of government grants and funding which can be hard to trace. ..."
"... For what it's worth, the Crowdstrike story that Russian cyber-meddling had knocked out 80% of Ukrainian artillery systems was deemed bogus by several other sources, including the Ukrainian Army. At its most basic, artillery systems are large ballistic rifles that drop artillery shells on a predetermined position by looking the reference up on a gridded map and inputting corrections for elevation and azimuth; there is nothing computer-connected about them. Somewhere near the nearest elevated position in relation to the target there is a spotter, who notes the fall of shot and calls the corrections; "left two, up fifty", or "in line, on for range; fire for effect". The latter would be followed by a barrage on what the spotter had identified as a direct hit by the spotting rounds. ..."
Jun 14, 2019 | thenewkremlinstooge.wordpress.com

Mark Chapman June 12, 2019 at 10:31 am

Well, well; look at that. Our old acquaintance Crowdstrike has gone public, and in its IPO debut, the stock surged to a market cap of over $12 Billion – worth nearly as much as Symantec, which has been around for nearly 40 years. Up 83% in a single day. Gee; I wonder who's buying in? I guess we can look forward to more whispering about Russian cybercrime and internet invasion in the days to come. Stealing elections, even, maybe, hmmm?

https://www.cnbc.com/2019/06/12/crowdstrike-ipo-stock-starts-trading-on-the-nasdaq.html

Surprisingly, Crowdstrike's CEO – George Kurtz – does not have a background in the national intelligence services, or none that is immediately apparent. He seems to have worked mostly in private security, having gotten into it fairly early on, and is an accountant by trade; he seems to be the public face of the firm, and to be mostly involved in marketing.

However, their president of services, Shawn Henry, is a former executive assistant director of the FBI, and I imagine its employees include quite a few former government spooks and ideologues.

https://www.crowdstrike.com/about-crowdstrike/executive-team/george-kurtz/

The other co-founder, though, is Dmitry Alperovitch.

https://www.breitbart.com/politics/2017/01/06/dnc-russian-hacking-conclusion-comes-google-linked-firm/

He's a Senior Fellow at the Atlantic Council think tank, a direct adviser to the US Department of Defense, connected to Hillary Clinton and runs a new corporation whose startup cash came from Google. There's something even bigger than Google – corporations now seem more and more to be merging into what are essentially mini-states within the state itself – and it is called Alphabet Capital, Google's parent company. The Chairman of Alphabet Capital is Eric Schmidt, and he was actively working for Hillary Clinton during the last election when she spectacularly failed to make the cut.

https://www.zerohedge.com/news/2017-03-24/what-crowdstrike-firm-hired-dnc-has-ties-hillary-clinton-ukrainian-billionaire-and-g

Google, allegedly, is becoming more and more an arm of the Democratic Party in the USA.

There is also another gap in play: The shrinking distance between Google and the Democratic Party. Former Google executive Stephanie Hannon is the Clinton campaign's chief technology officer, and a host of ex-Googlers are currently employed as high-ranking technical staff at the Obama White House. Schmidt, for his part, is one of the most powerful donors in the Democratic Party -- and his influence does not stem only from his wealth, estimated by Forbes at more than $10 billion.

Wheels within wheels, and connections seen and unseen. Several security professionals and software developers have alluded to Crowdstrike's reports on international hacking as being full of shit – but the American enforcement and intelligence services seem content to outsource their cyber work more or less exclusively to Crowdstrike. And the results of its IPO suggest high confidence on the part of investors that it is going to become ever-more-closely allied to the US government, font of government grants and funding which can be hard to trace.

Mark Chapman June 12, 2019 at 4:25 pm
Here's a colorful account of Crowdstrike's exploits and their alleged track record of coming up with convenient narratives on demand.

https://blogs.timesofisrael.com/the-russian-collusion-delusion-in-a-nutshell/

For what it's worth, the Crowdstrike story that Russian cyber-meddling had knocked out 80% of Ukrainian artillery systems was deemed bogus by several other sources, including the Ukrainian Army. At its most basic, artillery systems are large ballistic rifles that drop artillery shells on a predetermined position by looking the reference up on a gridded map and inputting corrections for elevation and azimuth; there is nothing computer-connected about them. Somewhere near the nearest elevated position in relation to the target there is a spotter, who notes the fall of shot and calls the corrections; "left two, up fifty", or "in line, on for range; fire for effect". The latter would be followed by a barrage on what the spotter had identified as a direct hit by the spotting rounds.

Kaspersky Labs also took Crowdstrike apart,

https://therearenosunglasses.wordpress.com/2017/01/31/kasperskys-war-on-crowdstrike-evangelist-dmitri-alperovitch/

and mention of Kaspersky reminded me the US government had used 'advice' from its security experts to determine Kaspersky products constituted a threat to US national security just like Huawei, a connection I have not seen made yet elsewhere.

Mmmm .I wonder if Crowdstrike is not being set up specifically to provide the US government with substantiation for banning technical products which have the potential to achieve dominant market share, but cannot be manipulated by Washington because they are owned by non-aligned countries?

[Jun 14, 2019] This is Crystal Clear -- Find the Creator of the Guccifer 2.0 Hoax, and You Find the Murderer of Seth Rich by veganmark

Notable quotes:
"... Let's start with this very reasonable supposition: Guccifer 2.0 is an entity operating within US time zones who has gone out of his way to pose as a Russian hacker who was the source for the Wikileaks DNC/Podesta releases. ..."
"... villain du jour ..."
"... The subsequent mysterious death of Shawn Lucas by a weird drug cocktail might also be related. Shawn had been the process server for the class-action lawsuit against the DNC. According to Sy Hersh's FBI source, Seth indicated that he had allies who were aware of the drop box he was providing Wikileaks. It would have been necessary to eliminate these allies. Was Shawn one of these allies, and did the creator of G2.0 know this? Shawn, who was not known to be a drug user, died suddenly about a month after Seth. ..."
"... So who created G2.0? G2.0 appears to have worked in coordination with Crowdstrike. One day after Crowdstrike announced that the DNC had been hacked (with Russia the chief suspect) and that the hackers had grabbed a file of Trump Opposition Research, G2.0 makes his first public appearance, claiming to be the hacker, posting Trump Opposition Research -- and purposely leaving "Russian fingerprints" on the meta-data of his release. ..."
"... Crowdstrike was also in a position to concoct the "Russian hack" that they claimed to be investigating. Cyberanalysts have determined that two-thirds of the allegedly "Russian malware" which Crowdstrike "found" on the DNC servers had in fact been compiled subsequent to the date that Crowdstrike was brought in to investigate the "hack". In other words, there is reason to believe that Crowdstrike itself concocted this "hack" -- likely because they had been warned that Wikileaks was going to release leaked DNC emails. ..."
"... Also notable is the fact that Shawn Henry, co-founder of Crowdstrike, is a master of cyberfuckery. Prior to founding Crowdstrike, Henry served under Robert Mueller as head of FBI counterintelligence -- in which capacity he engaged in efforts to entrap and discredit Julian Assange. Indeed, others have suspected that Henry was behind G2.0, in light of the fact that G2.0's behavior was reminiscent of that of "Sabu" (Hector Monsignor), a hacker who, after secretly being arrested by the FBI during Henry's tenure there, worked under FBI direction to entrap other hackers. And the G2.0 hoax is clearly another - so far, highly successful - attempt to smear Assange. ..."
"... @The Voice In the Wilderness ..."
"... After the Popodouplous interview by Mark Steyn, there was clarity after following Russiagate since it really started before the election of 2016. The deep state actors were trying to setup some significant figure in the Trump as having ties with the Russian government. ..."
"... The irony is that we have McCarthyism once again and not one Russian is guilty of what they are being accused of. They were set up as the fall guys, and of course in the future nuclear war. ..."
Jun 14, 2019 | caucus99percent.com

Let's start with this very reasonable supposition: Guccifer 2.0 is an entity operating within US time zones who has gone out of his way to pose as a Russian hacker who was the source for the Wikileaks DNC/Podesta releases. The notion that this absurdly preening entity is a GRU hacker is idiotic.

The Mueller report's tale of how G2.0 allegedly transferred the DNC emails to Wikileaks is absurd on its face -- which is to say, Mueller is acting as an accomplice to G2.0 in his fraud.

The evident purpose of the G2.0 fraud was to detract attention from the incriminating content of the DNC/Podesta releases, by blaming those releases on Russian government hackers operating in cahoots with Julian Assange. This accomplishes 3 goals dear to the hearts of the Deep State actors behind G2.0: minimizing the damage to Hillary's campaign inflicted by the released emails; smearing the reputation of Assange, who has made an unparalleled contribution to unmasking the egregious crimes of the Western Deep State; and further defaming "the Russians", the villain du jour which our Military-Industrial-Congressional-Intelligence-Media-Academia-Think Tank* complex needs to justify the continuing rape of American taxpayers on behalf of our grotesque overspending on military hardware and our bloated global military empire.

But what was the evident fly-in-the-ointment for this brilliantly diabolic plan? The ACTUAL source of the Wikileaks releases could have blown it sky high. And if G2.0 and the Russian hacking tale had been unmasked prior to the election, the blowback on Hillary's campaign would have been enormous. Which is why the creators of G2.0 needed to eliminate the source.

There are a number of reasons to suspect that Seth Rich was the source, or a confederate of the source:

Hints dropped by Assange;

Award for info on Seth's killer offered by Wikileaks;

Wikileaks re-tweeting essays speculating that Seth was the leaker;

Craig Murray's repeated assurances that DNC/Podesta releases resulted from leaks, not hacks;

Kim Dotcom's claim that he helped Seth with the leak;

Sy Hersh's secretly recorded phone call in which he stated that a trusted source within the FBI claims to have seen an FBI memo describing an FBI analysis of Seth's laptop -- this revealed that Seth had offered to sell DNC emails to Wikileaks, and subsequently conveyed the docs to Wikileaks via drop box;

Claims by Ed Butowsky, Larry Johnson, and Bill Binney indicating that they have sources inside the intel community verifying that Seth was the leaker -- in conjunction with brother Aaron;

Jared Beck's claim that both Seth and Shawn Lucas were planning to testify in the class-action lawsuit against the DNC -- speaks to Seth's possible motive for leaking;

Claim by Rod Wheeler that, according to a source inside the DC police, the police have been ordered to "stand down" on the Seth Rich investigation;

Frenzied reaction of Donna Brazile on learning that Wheeler was investigating the Seth Rich murder - and her overt lie regarding her whereabouts on the morning of the murder.

https://caucus99percent.com/content/why-did-donna-lie-again

Some have speculated that, in line with an email by John Podesta, Seth was murdered "to make an example of him". I reject this explanation. They could have made an example by firing him and suing him. As it stands, no example was made, as the DNC claims that Russians, not Seth, were responsible for the Wikileaks DNC releases.

If the puppetmaster of G2.0 knew or believed that Seth was the leaker, Seth had to be murdered to insure success of the G2.0 hoax.

(The alternative is that G2.0 did not know that, and that Seth was beaten up and murdered in a robbery so "botched" that no valuables were taken. Yeah, right!)

The subsequent mysterious death of Shawn Lucas by a weird drug cocktail might also be related. Shawn had been the process server for the class-action lawsuit against the DNC. According to Sy Hersh's FBI source, Seth indicated that he had allies who were aware of the drop box he was providing Wikileaks. It would have been necessary to eliminate these allies. Was Shawn one of these allies, and did the creator of G2.0 know this? Shawn, who was not known to be a drug user, died suddenly about a month after Seth.

Curiously, the day after Seth died, and again the day after Shawn died, the DNC made payments of about $100K to Crowdstrike. Sheer coincidence? Maybe.

So who created G2.0? G2.0 appears to have worked in coordination with Crowdstrike. One day after Crowdstrike announced that the DNC had been hacked (with Russia the chief suspect) and that the hackers had grabbed a file of Trump Opposition Research, G2.0 makes his first public appearance, claiming to be the hacker, posting Trump Opposition Research -- and purposely leaving "Russian fingerprints" on the meta-data of his release. Unfortunately, this little dog-and-pony show turned out to be a screw-up, as it was subsequently revealed that (by the DNC itself!) that the Opposition Research document had been an attachment in Podesta's emails, and hadn't been hacked from the DNC. It is also notable that releasing Trump Opposition Research would do nothing to damage the chances of Hillary -- the alleged intent of the mythical Russian hackers. Indeed, nothing that G2.0 subsequently released was notably harmful to Hillary.

Crowdstrike was also in a position to concoct the "Russian hack" that they claimed to be investigating. Cyberanalysts have determined that two-thirds of the allegedly "Russian malware" which Crowdstrike "found" on the DNC servers had in fact been compiled subsequent to the date that Crowdstrike was brought in to investigate the "hack". In other words, there is reason to believe that Crowdstrike itself concocted this "hack" -- likely because they had been warned that Wikileaks was going to release leaked DNC emails.

https://caucus99percent.com/content/how-did-crowdstrikeguccifer-20-know-...

It bears repeating that the latest dated DNC email which Wikileaks published was written on April 25th -- several weeks after Crowdstrike had been brought in to investigate the alleged hack. Anti-hacking programs do not stop leaks .

Also notable is the fact that Shawn Henry, co-founder of Crowdstrike, is a master of cyberfuckery. Prior to founding Crowdstrike, Henry served under Robert Mueller as head of FBI counterintelligence -- in which capacity he engaged in efforts to entrap and discredit Julian Assange. Indeed, others have suspected that Henry was behind G2.0, in light of the fact that G2.0's behavior was reminiscent of that of "Sabu" (Hector Monsignor), a hacker who, after secretly being arrested by the FBI during Henry's tenure there, worked under FBI direction to entrap other hackers. And the G2.0 hoax is clearly another - so far, highly successful - attempt to smear Assange.

https://caucus99percent.com/content/shawn-henry-crowdstrike-was-fingered...

Whether or not Crowdstrike concocted G2.0, we need to find out who did -- the answer should be highly pertinent to unraveling Seth's murder.

And let's bear in mind that the creator of G2.0 has also played an integral role in concocting a Second Cold War with Russia - luring an entire generation of "leftists" into hating both Russia and Wikileaks, on completely spurious grounds. The evil of that is HUGE.

*Ray McGovern's brilliant formulation.


Linda Wood on Tue, 06/11/2019 - 2:56pm

I think your assertiveness

about hammering on these points is productive of narrowing in on the truth, whatever it may be. That's my awkward way of saying that you're not just on to something but that your precision, where you're hammering, is getting to the truth. I say that as a person who isn't convinced that Seth Rich was the DNC leaker, but who thinks he may have been murdered because he was a potential witness in a DNC voter suppression lawsuit , which amounts to the same thing really.

The strength of your outlook for me is that you emphasize the stupidity of the G2.0 revelations, the stupidity of Russian cyber-fingerprints, the vapidity of the released Opposition Research, and the timeliness of this junk evidence. It matches in tone and stupidity the evidence used to convince the American people that Saddam gave the anthrax to Mohamed Atta in Prague. Turns out Atta was not in Prague, turns out the anthrax was not Saddam's, but ours, turns out the Vice President of the United States lied about it on camera. Doesn't matter. Once the scene of the transfer to Atta was fixed in the minds of some American people, even if just a few Americans half believed it, the narrative was written.

The other strength of your essay for me is your hammering on Seth Rich's murder as eliminating a possible contradiction of the Russia narrative. The death of his associate Lucas only adds to that possibility. Clearly Seth Rich's murder was timely and important. It could very well have been a random street crime, but why he was out on the street in the middle of the night just before the filing of a lawsuit that could have involved him and the DNC is worth asking. The problem is that the media, and as far as we can tell, our government, are not asking.

I just want to thank you again for focusing on the weak points of the narrative. Each time you do, I think you bring us closer to the truth.

Here is a good report on the false evidence generated on the anthrax attack.

https://www.youtube.com/watch?v=BP2G-cejYhI

The Voice In th... on Tue, 06/11/2019 - 5:30pm
Murder seems to follow Her Highness around, doesn't it?

up 11 users have voted.

Bob In Portland on Wed, 06/12/2019 - 2:30pm
@The Voice In the Wilderness Yes, but I'd suggest it's

@The Voice In the Wilderness

Yes, but I'd suggest it's because she's lived a career in the Deep State. Hilz never really was a Dem. She was an undercover Republican/CIA when she started out. In 1968 she started the year as a volunteer for Clean Gene McCarthy, the "anti-Vietnam" Dem candidate who went on to endorse Ronald Reagan.

She then went to the the Republican convention in Miami, then spent that summer as an intern for House Republicans, where she wrote a speech about Vietnam for Representative Melvin Laird. Melvin Laird was Nixon's Secretary of Defense, who oversaw a lot of the bludgeoning of Southeast Asia.

So when she was anti-war with McCarthy was she really anti-war (subsequently there have been stories about how infiltrated McCarthy's '68 campaign was riddled with CIA infiltrators), or was she pro-war, writing speeches for Mel Laird? I suggest she never gave a shit about all those napalmed deplorables in Southeast Asia. It was a pose. I'd don't think that Bill was anti-war either. Like a lot of future politicians he didn't want his ass shot there.

She and Bill worked their way up the ladder among CIA-owned politicians. Ultimately, they were in place to deliver the Democratic Party to the Agency.

[comment:body]

MrWebster on Tue, 06/11/2019 - 9:04pm
The unwilling patsy are the Russians

After the Popodouplous interview by Mark Steyn, there was clarity after following Russiagate since it really started before the election of 2016. The deep state actors were trying to setup some significant figure in the Trump as having ties with the Russian government.

This include Flynn, the meeting at Trump Towers, and Popodouplos. So many details now fall in place like the Russian lawyer Natalia Veselnitskaya meeting with Fusion after the Trump Tower meeting. Say what?

Or just bullshit like US intelligence found out GRU agents were doing the hacking because some GRU master computer jock forgot to login into his VPN. G2 does seem to be an invention.

The irony is that we have McCarthyism once again and not one Russian is guilty of what they are being accused of. They were set up as the fall guys, and of course in the future nuclear war.

As for Seth Rich all I can speculate is that he was involved somehow. And if his murder was not random, he was about to blow apart the entire conspiracy to such a level, action had to be taken against him.

[Jun 13, 2019] A loyal servant of empire -- Crowdstrike CEO -- is well-rewarded for his role in creating Russiagate hysteria by Caitlin Johnstone

Notable quotes:
"... Never mind that to this day the DNC servers have not been examined by the FBI, nor indeed were they examined by the Special Counsel of Robert " Iraq has WMD " Mueller, preferring instead to go with the analyses of this extremely shady outfit with extensive and well-documented ties with the oligarchic leaders of the US-centralized empire. ..."
"... When the Romanian REAL Guccifer got Podesta password (password) by phishing, exposing his pizza and walnut sauce perversions, the US had him jailed. When WikiLeaks made a DNC dump, CrowdStrike concocted Guccifer 2.0, then more leaks Fancy Bear, and more leaks Cozy Bear. All these CrowdStrike fabrications used CIA Vault 7 fingerprints to frame Russia. It is time to execute our ruling demonic warlords. ..."
Jun 13, 2019 | caitlinjohnstone.com

A new article by Forbes reports that the CEO of Crowdstrike, the extremely shady cybersecurity corporation which was foundational in the construction of the official CIA/CNN Russian hacking narrative, is now a billionaire. George Kurtz ascended to the billionaire rankings on the back of soaring stocks immediately after the company went public, carried no doubt on the winds of the international fame it gained from its central protagonistic role in the most well-known hacking news story of all time.

A loyal servant of empire well-rewarded. Never mind that US government insiders like Hillary Clinton had been prepping for escalations against Russia well in advance of the 2016 elections, and that their preexisting agendas to shove a geostrategic obstacle off the world stage benefitted from the hacking narrative as much as George Kurtz did.

Never mind that Crowdstrike is tied to the NATO narrative management firm known as the Atlantic Council, which receives funding from the US government, the EU, NATO, Gulf states and powerful international oligarchs. Never mind either that Crowdstrike was financed with a whopping $100 million from Google , which has had a cozy relationship with US intelligence agencies since its very inception .

Never mind that to this day the DNC servers have not been examined by the FBI, nor indeed were they examined by the Special Counsel of Robert " Iraq has WMD " Mueller, preferring instead to go with the analyses of this extremely shady outfit with extensive and well-documented ties with the oligarchic leaders of the US-centralized empire.

Also never mind that the Crowdstrike analyst who led forensics on those DNC servers had in fact worked for and was promoted by Robert Mueller while the two were in the FBI.

The CEO of the Atlantic Council-tied Crowdstrike, which formed the foundation of the official CIA/CNN Russian hacking narrative, is now a billionaire. I'm telling you, the real underlying currency of this world is narrative and the ability to control it. https://t.co/XsBCvkIDzJ -- Caitlin Johnstone ⏳ (@caitoz) June 12, 2019
As I never tire of saying, the real underlying currency in our world is not gold, nor bureaucratic fiat, nor even raw military might.

The real underlying currency of our world is narrative, and the ability to control it.

As soon as you really grok this dynamic, you start noticing it everywhere.

George Kurtz is one clear example today of narrative control's central role in the maintenance and expansion of existing power structures, as well as an illustration of how the empire is wired to reward those who advance pro-empire narratives and punish those who damage them...

... ... ...

Joseph Olson / June 13, 2019
When the Romanian REAL Guccifer got Podesta password (password) by phishing, exposing his pizza and walnut sauce perversions, the US had him jailed. When WikiLeaks made a DNC dump, CrowdStrike concocted Guccifer 2.0, then more leaks Fancy Bear, and more leaks Cozy Bear. All these CrowdStrike fabrications used CIA Vault 7 fingerprints to frame Russia. It is time to execute our ruling demonic warlords.

[May 23, 2019] Guccifer 2.0 Was Not a Russian Creation by Larry C Johnson

Notable quotes:
"... The Word documents published in June 2016 by Guccifer 2 also show a "last saved as" user id written in Cyrillic. The Anglicized name is " Felix Edmundovich ", aka "Iron Felix" (the infamous director of an early Soviet spy agency). If you are a Russian cyber spy trying to conduct a covert operation, why do you sign your document with the name of one of the most infamous leaders of Russian intelligence? Robert Mueller wants you to believe that this was just Russian audacity. ..."
"... The phrase "personal beliefs about the competence or incompetence of the Russians" catches something important. Whether it was the Russians or somebody else that did this, whoever did it was pretty sloppy. What this report describes is almost as pathetic when considered a false flag operation as it is as a sabotage operation. So any theory of who stole and published the documents has to explain a capability to access the data combined with blissful obliviousness about handling them. I know of no reason to think the Russian, US, Israeli, or other intelligence communities incapable of such a combination. All of them have brilliant dedicated people but also seemingly endless supplies of mediocre time-servers. ..."
"... Scenario? Shutdown, closing of words with documents being automatically saved? Ok, otherwise there is apparently no precise saving time stamp on Winwords latest version. How much changed since 2016? ..."
"... The Vault7 leak of CIA tools also contained information on how to select any language environment. It's really a standard practice, even for normal criminals. ..."
May 23, 2019 | turcopolier.typepad.com

Russia did not hack the DNC. This is not an opinion. It is a conclusion that flows from one very specific claim made by the Special Counsel -- i.e., Guccifer 2.0 was a fictional identity created by Russian Military Intelligence, the GRU. If Guccifer was in fact a creation or creature of the GRU, then the forensic evidence should show that this entity was operating from Russia or under the direct control of the GRU. The forensic evidence shows something quite different -- the meta data in the Guccifer 2.0 documents were manipulated deliberately to plant Russian fignerprints. This was not an accident nor an oversight due to carelessness.

What is meta data? This is the information recorded when a document is created. This data includes things such as the date and time the document was created or modified. It tells you who created the document. It is like the Wizard of Oz, it is the information behind the curtain.

Special Counsel Robert Mueller's is correct in stating that Guccifer 2.0 was a "fictious online persona. " He is wrong in attributing that action to Russian Military Intelligence. While Guccifer 2.0 was a "fictious" entity, the information recorded about when, how and who created the document show that deliberate choices were made to present the info as if it was created by someone Russian.

Let us first stipulate and agree that Russia and the United States engage in cyber espionage and covert action against each other. This has been the case since computers and the internet came into existence. Within the U.S. Intelligence Community these activities generally are labeled with the acronym, CNO -- Computer Network Operations. The Russians and the United States have cadres of cyber "warriors" who sit at computer terminals and engage in operations commonly known as hacking. Other countries, such as China, Iran and Ukraine do this as well.

CNOs are classified at the highest level in the United States and normally are handled within special restricted categories commonly known as SAPs (i.e, Special Access Programs). A critical element of these kinds of operations is to avoid leaving any fingerprints or clues that would enable the activity to be traced back to the United States. But this is not unique to the United States. All professional intelligence services around the world understand and practice this principle -- leave no evidence behind that proves you were there.

The case implicating Russia in the hack of the DNC and Clinton emails, including those of her campaign Manager, John Podesta, rests on suspect forensic computer evidence -- is present in the meta data in the documents posted on line by Guccifer 2.0. According to Disobedient Media , "the files that Guccifer 2.0 initially pushed to reporters contain Russian metadata, a Russian stylesheet entry and in some cases embedded Russian error messages."

Why would the Russians make such a mistake, especially in such a high stake operation (targeting a national election with covert action most certainly is a high stake operation). Mueller and the U.S. intelligence community want you to believe that the Russians are just sloppy and careless buffoons. Those ideologically opposed to the Russians readily embrace this nonsenses. But for those who actually have dealt with Russian civilian and military intelligence operatives and operations, the Russians are sophisticated and cautious.

But we do not have to rely on our personal beliefs about the competence or incompetence of the Russians. We simply need to look at the forensic evidence contained in the documents posted by Guccifer 2.0. We will take Robert Mueller and his investigators at their word:

An examination of those documents tells a very different story. While it does not reveal who or what was Guccifer 2.0, it does undermine Mueller's claim that it was the Russians who did these dastardly deeds.

One independent forensic computer investigator, who uses the name, "The Forensicator," examined the meta data in some of the documents posted by Guccifer 2.0 and discovered the following :

Guccifer 2.0 published a file on 13 September 2016 that was originally copied on 5 July 2016 at approximately 6:45 PM Eastern time. It was copied and appeared as the "NGP VAN" 7zip file.

The estimated speed of transfer was 23 MB/s. This means that this initial data transfer could have been done remotely over the Internet. Instead, it was likely done from a computer system that had direct access to the data. "By "direct access" we mean that the individual who was collecting the data either had physical access to the computer where the data was stored, or the data was copied over a local high-speed network (LAN)."

This initial copying activity was done on a system that used Eastern Daylight Time (EDT) settings and was likely initially copied to a computer running Linux, because the file last modified times all reflect the apparent time of the copy, which is a characteristic of the Linux 'cp' command (using default options).

On September 1, 2016, a subset of the initial large collection of DNC related content (the so-called NGP/VAN data), was transferred to working directories on a system running Windows. The .rar files included in the final 7zip file were built from those working directories.

The alleged Russian fingerprints appeared in the first document "leaked" by Guccifer 2.0-- 1.doc -- which was a report on Donald Trump . A forensic examination of the documents shows thatgiven the word processor program used to create the Donald Trump Document released by Guccifer 2.0, the author consciously and purposefully used formats that deliberately inserted "Russian fingerprints" into the document. In other words, the meta-data was purposely altered, and documents were pasted into a 'Russianified' word document with Russian language settings and style headings.

Here are the key facts:

The meta data shows that Slate_-_Domestic_-_USDA_-_2008-12-20.doc was the template for creating 1.doc , 2.doc and 3.doc . This template injected "Warren Flood" as the author value and "GSA" as the company value in those first three Word documents. This template also injected the title , the watermark and header/footer fields found in the final documents (with slight modifications).

The Word documents published in June 2016 by Guccifer 2 also show a "last saved as" user id written in Cyrillic. The Anglicized name is " Felix Edmundovich ", aka "Iron Felix" (the infamous director of an early Soviet spy agency). If you are a Russian cyber spy trying to conduct a covert operation, why do you sign your document with the name of one of the most infamous leaders of Russian intelligence? Robert Mueller wants you to believe that this was just Russian audacity.

But the meta data tells a different story. When we examine The Revision Session Identifiers aka 'RSID's, in the Guccifer document, we see the same Russian style-headings in 1.doc, 2.doc and 3.doc. The document creation timestamps on docs 1, 2 and 3 also are all identical.

Given that MS word assigns a new random 'RSID' with each save when an element is added or edited (this function allows one to track changes made to a Word document), the only way to obtain identical creation timestamps means that someone either directly edited the source document or that there was one empty document open and that individual documents were copy-pasted and saved-as (1.doc), then contents deleted and new doc pasted and saved-as (2.doc), etc. This process also explains identical style-sheet RSIDs .


joanna , 22 May 2019 at 08:54 AM

The document creation timestamps on docs 1, 2 and 3 also are all identical.

Curious, no doubt. But who of us did not consider Guccifer 2 curious. Put another way, what experts considered him solid proof for Russian involvement?

Are you suggesting Winword templates were used for the metadata?

As IT nitwit, how can I save three *doc files or their 2016 word equivalent at the same time? Any way to do that? Windows doesn't seem to have a solution to that.

Again: This is a nitwit user asking a question.

*******
I admittedly am not overly motivated to read the Mueller report. I'll read your contribution again to figure out what you may suggest in or between the lines.

fredw , 22 May 2019 at 09:26 AM
The phrase "personal beliefs about the competence or incompetence of the Russians" catches something important. Whether it was the Russians or somebody else that did this, whoever did it was pretty sloppy. What this report describes is almost as pathetic when considered a false flag operation as it is as a sabotage operation. So any theory of who stole and published the documents has to explain a capability to access the data combined with blissful obliviousness about handling them. I know of no reason to think the Russian, US, Israeli, or other intelligence communities incapable of such a combination. All of them have brilliant dedicated people but also seemingly endless supplies of mediocre time-servers.

Equally interesting is the fact that this analysis has come from such a private source. Surely all the major intelligence agencies have the skill to find the same indicators. And all have comparatively endless resources to apply to the analysis. But they all seem to not want to talk about it. For me the most suspicious thing about the handling of the theft was the FBI's near complete lack of interest in examining the server. I have always assumed that such indifference reflected that they already had all they needed in order to understand what happened. Maybe even watched the theft in real time. But this report demonstrates that you didn't need any special access to blow up the official story. (Note that the official story may be "true". It is just not proven by the cited evidence.)

Yet, whatever actually happened, nobody seems interested in challenging the narrative that Russians stole data and routed it through useful idiots to influence the 2016 elections. This report indicates that a persuasive challenge would not have been hard to produce.

Perhaps the false flag was intentionally clumsy, intended to be detected. Bait for a trap that no one wants to fall into. But I don't see where that thought leads.

joanna , 22 May 2019 at 09:58 AM
https://archive.fo/2dMfC#selection-683.213-687.434

This can be discovered by looking at things called 'rsid's or Revision Session Identifiers in Guccifer's document. In order to track changes, MS word assigns a new random 'rsid' with each save upon each element added or edited. The rsids for the Russian style-headings in 1.doc, 2.doc and 3.doc are all the same (styrsid11758497 in the raw source).

Moreover, the document creation timestamps on 1,2, and 3.docs are all identical too. This might imply there was one empty document open, with individual documents being copy-pasted and saved-as (1.doc), then contents deleted and new doc pasted and saved-as (2.doc), etc. This is the only way to go about obtaining identical creation timestamps short of direct editing of the source, and would also explain identical style-sheet RSIDs.

Scenario? Shutdown, closing of words with documents being automatically saved? Ok, otherwise there is apparently no precise saving time stamp on Winwords latest version. How much changed since 2016?

Empty doc open? What would that change?

But good to see that Winword now integrated some type of automatic saving option, didn't have it when I gave it up and shifted to Open Office. On the other hand, can I trust it to not confront me with an earlier revision version? I admittedly asked myself lately. In a 200 page file, mind you.

Karen Eliot , 22 May 2019 at 10:34 AM
As someone with a little bit of experience in that area I can assure you that language metadata artifacts are practically worthless for attribution. You would mention it in a report, but from it you can only conclude that

The Vault7 leak of CIA tools also contained information on how to select any language environment. It's really a standard practice, even for normal criminals.

Attribution is really hard and usually amounts to a lot of guessing who might be interested in the target of an attack, correlating information from other campaigns, and is only rarely based on hard evidence. Big state actors probably can do a little bit better when they have access to enough network taps. But in the end one bit looks like any other, and properties of static documents can always be forged and made to look real. Or simply buy a copy of MS Office in .

joanna said in reply to Karen Eliot... , 23 May 2019 at 09:51 AM
The document creation timestamps on docs 1, 2 and 3 also are all identical.

Ok doc creation times. Could one create a WinWord Macro? That does exactly that. ok, why would one do this? True. Minor detail, I know. But I see we have experts around now.

*******
More generally. Guccifer 2.0 was a bit of an odd occurrence, not least due to US intelligence considering Guccifer one or zero, if you like.

Fred , 23 May 2019 at 11:24 AM
fredw,

"..nobody seems interested in challenging the narrative that Russians..."

That's precisely what Larry has been doing for some time.

"Equally interesting is the fact that this analysis has come from such a private source."

How dare a private citizen challenge the narrative!

"Perhaps the false flag was intentionally clumsy..."

False flag, let's discuss that idea, brought up solely by you, and not discuss Larry's analysis.

[May 18, 2019] Daniel Lazare's recent work on Assange indicated via chronological sequencing it's much more likely Guccifer 2.0 was the phony he was suspected to be at the time

May 18, 2019 | consortiumnews.com

hetro , May 15, 2019 at 15:08

I found the first of these statements as "chilling" as the second:

"Schumer thus greeted Assange's April 11 arrest by tweeting his "hope [that] he will soon be held to account for his meddling in our elections on behalf of Putin and the Russian government," while, in a truly chilling statement, Democratic Sen. Joe Manchin of West Virginia declared that "[i]t will be really good to get him back on United States soil [so] we can get the facts and the truth from him."

Daniel Lazare's recent work on Assange indicated via chronological sequencing it's much more likely Guccifer 2.0 was the phony he was suspected to be at the time, let alone Assange's denial it was not the Russians, nor any State operation, plus as we have discussed pointing toward Seth Rich (an insider-as-leak interpretation subsequently buttressed by William Binney et al.)

In short, there is and has been ample information to suspend leaping to the hysterical tar and feather him approach mouthed by Schumer, spittle presumably flying out of his mouth at the time.

It is disgusting to see supposed leaders in the government advocating guilty until proved innocent in this lynch-mob manner in a country with supposedly an advanced system of justice. It reminds me of the Rosenberg case and the McCarthy era and the Salem witch trials before that.

"Monstrous offspring" indeed.

[May 11, 2019] Crowdstrike planted the malware on DNC systems, which they discovered later discovered and attributed to Russians later

Highly recommended!
Notable quotes:
"... Also note: Crowdstrike planted the malware on DNC systems, which they "discovered" later - https://disobedientmedia.com/2017/12/fancy-frauds-bogus-bears-malware-m ..."
"... And look who else sits on the Atlantic Council - http://www.atlanticcouncil.org/about/experts/list/irene-chalupa why it's the sister of Andrea Chalupa, unregistered foreign agent employed by the DNC as a "Consultant", whose entire family is tied to Ukraine Intelligence. ..."
"... Irena Chalupa is also the news anchor for Ukraine's propaganda channel Stopfake.org She is a Ukrainian Diaspora leader. The Chalupas are the first family of Ukrainian propaganda. She works with and for Ukrainian Intelligence through the Atlantic Council, Stopfake.org, and her sisters Andrea (EuromaidanPR) and Alexandra. ..."
Mar 03, 2018 | www.zerohedge.com

mc888 Fri, 03/02/2018 - 20:06 Permalink

Thanks Tyler.

Also note: Crowdstrike planted the malware on DNC systems, which they "discovered" later - https://disobedientmedia.com/2017/12/fancy-frauds-bogus-bears-malware-m

(if that's too 'in the weeds' for you, ask your tech guys to read and verify)

And look who else sits on the Atlantic Council - http://www.atlanticcouncil.org/about/experts/list/irene-chalupa why it's the sister of Andrea Chalupa, unregistered foreign agent employed by the DNC as a "Consultant", whose entire family is tied to Ukraine Intelligence.

http://theantimedia.org/propornot-2017-biggest-fake-news-story/

Irena Chalupa is also the news anchor for Ukraine's propaganda channel Stopfake.org She is a Ukrainian Diaspora leader. The Chalupas are the first family of Ukrainian propaganda. She works with and for Ukrainian Intelligence through the Atlantic Council, Stopfake.org, and her sisters Andrea (EuromaidanPR) and Alexandra.

and lest we forget crazy eyes #1

http://theduran.com/adam-schiffs-collusion-with-oligarch-ukrainian-arms

[May 11, 2019] Why Crowdstrike's Russian Hacking Story Fell Apart -- Say Hello to Fancy Bear

Highly recommended!
Notable quotes:
"... Ukraine has been screaming for the US to start a war with Russia for the past 2 1/2 years. ..."
"... Is Ukrainian Intelligence trying to invent a reason for the US to take a hard-line stance against Russia? Are they using Crowdstrike to carry this out? ..."
"... Meet the real Fancy Bear and Cozy Bear, part of the groups that are targeting Ukrainian positions for the Donetsk and Lugansk People's Republics. These people were so tech savvy they didn't know the Ukrainian SBU (Ukrainian CIA/internal security) records every phone call and most internet use in Ukraine and Donbass. Donbass still uses Ukrainian phone and internet services. ..."
"... This is a civil war and people supporting either side are on both sides of the contact line. The SBU is awestruck because there are hundreds if not thousands of people helping to target the private volunteer armies supported by Ukrainian-Americans. ..."
"... If she was that close to the investigation Crowdstrike did how credible is she? Her sister Alexandra was named one of 16 people that shaped the election by Yahoo news. The DNC hacking investigation done by Crowdstrike concluded hacking was done by Russian actors based on the work done by Alexandra Chalupa? That is the conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the Russian government connection. These words mirror Dimitri Alperovitch's identification process in his interview with PBS Judy Woodruff. ..."
"... How close is Dimitri Alperovitch to DNC officials? Close enough professionally he should have stepped down from an investigation that had the chance of throwing a presidential election in a new direction. ..."
"... According to Esquire.com , Alperovitch has vetted speeches for Hillary Clinton about cyber security issues in the past. Because of his work on the Sony hack, President Barrack Obama personally called and said the measures taken were directly because of his work. ..."
"... Still, this is not enough to show a conflict of interest. Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian propagandists, and Ukrainian state supported hackers do. When it all adds up and you see it together, we have found a Russian that tried hard to influence the outcome of the US presidential election in 2016. ..."
"... According to Robert Parry's article At the forefront of people that would have taken senior positions in a Clinton administration and especially in foreign policy are the Atlantic Council. Their main goal is still a major confrontation with nuclear-armed Russia. ..."
"... The Atlantic Council is the think tank associated and supported by the CEEC (Central and Eastern European Coalition). The CEEC has only one goal which is war with Russia. Their question to candidates looking for their support in the election was "Are you willing to go to war with Russia?" Hillary Clinton has received their unqualified support throughout the campaign. ..."
"... What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the Atlantic Council would have taken senior cabinet and policy positions, his own fellowship status at the Atlantic Council and relationship with Irene Chalupa creates a definite conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or Homeland Security? ..."
"... Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence groups is where things really heat up. Noted above she works with Euromaidanpress.com and Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers. ..."
"... When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and its hackers individually . There is a mutual relationship. When you add up his work for the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be investigated to see if Ukraine is conspiring against the US government. ..."
"... Alperovitch and Fancy Bear tweet each other? ..."
"... Crowdstrike is part of Ukrainian nationalist hacker network ..."
"... In an interview with Euromaidanpress these hackers say they have no need for the CIA. They consider the CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance is a quasi-organization with the participation of several groups – RUH8, Trinity, Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the Myrotvorets site, Informnapalm analytical agency." ..."
"... Although OSINT Academy sounds fairly innocuous, it's the official twitter account for Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence. The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates journalists and other people for assassination. If you disagree with OUNb politics, you could be on the list. ..."
"... This single tweet on a network chart shows that out of all the Ukrainian Ministry of Information Minister's following, he only wanted the 3 hacking groups associated with both him and Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be shared heavily. If it was a victory for the hacking squad, it would be smart to keep it to themselves and not draw unwanted attention. ..."
"... Pravy Sektor Hackers and Crowdstrike? ..."
"... What sharp movements in international politics have been made lately? Let me spell it out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored, Russian language hackers in Eastern European time zones have shown with the Surkov hack they have the tools and experience to hack states that are looking out for it. They are also laughing at US intel efforts. ..."
"... The hackers also made it clear that they will do anything to serve Ukraine. Starting a war between Russia and the USA is the one way they could serve Ukraine best, and hurt Russia worst. Given those facts, if the DNC hack was according to the criteria given by Alperovitch, both he and these hackers need to be investigated. ..."
"... According to the Esquire interview "Alperovitch was deeply frustrated: He thought the government should tell the world what it knew. There is, of course, an element of the personal in his battle cry. "A lot of people who are born here don't appreciate the freedoms we have, the opportunities we have, because they've never had it any other way," he told me. "I have." ..."
"... While I agree patriotism is a great thing, confusing it with this kind of nationalism is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering a conflict with Russia that is against American interests, he's a patriot. He isn't serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to Ukraine. ..."
Dec 29, 2017 | www.washingtonsblog.com

In the wake of the JAR-16-20296 dated December 29, 2016 about hacking and influencing the 2016 election, the need for real evidence is clear. The joint report adds nothing substantial to the October 7th report. It relies on proofs provided by the cyber security firm Crowdstrike that is clearly not on par with intelligence findings or evidence. At the top of the report is an "as is" statement showing this.

The difference between Dmitri Alperovitch's claims which are reflected in JAR-1620296 and this article is that enough evidence is provided to warrant an investigation of specific parties for the DNC hacks. The real story involves specific anti-American actors that need to be investigated for real crimes.

For instance, the malware used was an out-dated version just waiting to be found. The one other interesting point is that the Russian malware called Grizzly Steppe is from Ukraine . How did Crowdstrike miss this when it is their business to know?

Later in this article you'll meet and know a little more about the real "Fancy Bear and Cozy Bear." The bar for identification set by Crowdstrike has never been able to get beyond words like probably, maybe, could be, or should be, in their attribution.

The article is lengthy because the facts need to be in one place. The bar Dimitri Alperovitch set for identifying the hackers involved is that low. Other than asking America to trust them, how many solid facts has Alperovitch provided to back his claim of Russian involvement?

The December 29th JAR adds a flowchart that shows how a basic phishing hack is performed. It doesn't add anything significant beyond that. Noticeably, they use both their designation APT 28 and APT 29 as well as the Crowdstrike labels of Fancy Bear and Cozy Bear separately.

This is important because information from outside intelligence agencies has the value of rumor or unsubstantiated information at best according to policy. Usable intelligence needs to be free from partisan politics and verifiable. Intel agencies noted back in the early 90's that every private actor in the information game was radically political.

The Hill.com article about Russia hacking the electric grid is a perfect example of why this intelligence is political and not taken seriously. If any proof of Russian involvement existed, the US would be at war. Under current laws of war, there would be no difference between an attack on the power grid or a missile strike.

According to the Hill "Private security firms provided more detailed forensic analysis, which the FBI and DHS said Thursday correlated with the IC's findings.

"The Joint Analysis Report recognizes the excellent work undertaken by
security companies and private sector network owners and operators, and provides new indicators of compromise and malicious infrastructure
identified during the course of investigations and incident response," read a statement. The report identities two Russian intelligence groups already named by CrowdStrike and other private security firms."

In an interview with Washingtonsblog , William Binney, the creator of the NSA global surveillance system said "I expected to see the IP's or other signatures of APT's 28/29 [the entities which the U.S. claims hacked the Democratic emails] and where they were located and how/when the data got transferred to them from DNC/HRC [i.e. Hillary Rodham Clinton]/etc. They seem to have been following APT 28/29 since at least 2015, so, where are they?"

According to the latest Washington Post story, Crowdstrike's CEO tied a group his company dubbed "Fancy Bear" to targeting Ukrainian artillery positions in Debaltsevo as well as across the Ukrainian civil war front for the past 2 years.

Alperovitch states in many articles the Ukrainians were using an Android app to target the self-proclaimed Republics positions and that hacking this app was what gave targeting data to the armies in Donbass instead.

Alperovitch first gained notice when he was the VP in charge of threat research with McAfee. Asked to comment on Alperovitch's discovery of Russian hacks on Larry King, John McAfee had this to say. "Based on all of his experience, McAfee does not believe that Russians were behind the hacks on the Democratic National Committee (DNC), John Podesta's emails, and the Hillary Clinton presidential campaign. As he told RT, "if it looks like the Russians did it, then I can guarantee you it was not the Russians."

How does Crowdstrike's story part with reality? First is the admission that it is probably, maybe, could be Russia hacking the DNC. " Intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to Wiki Leaks."

The public evidence never goes beyond the word possibility. While never going beyond that or using facts, Crowdstrike insists that it's Russia behind both Clinton's and the Ukrainian losses. NBC carried the story because one of the partners in Crowdstrike is also a consultant for NBC.

According to NBC the story reads like this." The company, Crowdstrike, was hired by the DNC to investigate the hack and issued a report publicly attributing it to Russian intelligence. One of Crowdstrike's senior executives is Shawn Henry, a former senior FBI official who consults for NBC News.

"But the Russians used the app to turn the tables on their foes, Crowdstrike says. Once a Ukrainian soldier downloaded it on his Android phone, the Russians were able to eavesdrop on his communications and determine his position through geo-location.

In June, Crowdstrike went public with its findings that two separate Russian intelligence agencies had hacked the DNC. One, which Crowdstrike and other researchers call Cozy Bear, is believed to be linked to Russia's CIA, known as the FSB. The other, known as Fancy Bear, is believed to be tied to the military intelligence agency, called the GRU."

The information is so certain the level of proof never rises above "believed to be." According to the December 12th Intercept article "Most importantly, the Post adds that "intelligence agencies do not have specific intelligence showing officials in the Kremlin 'directing' the identified individuals to pass the Democratic emails to WikiLeaks."

Because Ukrainian soldiers are using a smartphone app they activate their geolocation to use it. Targeting is from location to location. The app would need the current user location to make it work.

In 2015 I wrote an article that showed many of the available open source tools that geolocate, and track people. They even show street view. This means that using simple means, someone with freeware or an online website, and not a military budget can look at what you are seeing at any given moment.

Where Crowdstrike fails is insisting people believe that the code they see is (a) an advanced way to geolocate and (b) it was how a state with large resources would do it. Would you leave a calling card where you would get caught and fined through sanctions or worse? If you use an anonymous online resource at least Crowdstrike won't believe you are Russian and possibly up to something.

" Using open source tools this has been going on for years in the private sector. For geolocation purposes, your smartphone is one of the greatest tools to use. Finding and following you has never been easier . Let's face it if you are going to stalk someone, "street view" on a map is the next best thing to being there. In the following video, the software hacks your modem. It's only one step from your phone or computer."

If you read that article and watch the video you'll see that using "geo-stalker" is a better choice if you are on a low budget or no budget. Should someone tell the Russians they overpaid?

According to Alperovitch, the smartphone app plotted targets in about 15 seconds . This means that there is only a small window to get information this way.

Using the open source tools I wrote about previously, you could track your targets all-day. In 2014, most Ukrainian forces were using social media regularly. It would be easy to maintain a map of their locations and track them individually.

From my research into those tools, someone using Python scripts would find it easy to take photos, listen to conversations, turn on GPS, or even turn the phone on when they chose to. Going a step further than Alperovitch, without the help of the Russian government, GRU, or FSB, anyone could take control of the drones Ukraine is fond of flying and land them. Or they could download the footage the drones are taking. It's copy and paste at that point. Would you bother the FSB, GRU, or Vladimir Putin with the details or just do it?

In the WaPo article Alperovitch states "The Fancy Bear crew evidently hacked the app, allowing the GRU to use the phone's GPS coordinates to track the Ukrainian troops' position.

In that way, the Russian military could then target the Ukrainian army with artillery and other weaponry. Ukrainian brigades operating in eastern Ukraine were on the front lines of the conflict with Russian-backed separatist forces during the early stages of the conflict in late 2014, CrowdStrike noted. By late 2014, Russian forces in the region numbered about 10,000. The Android app was useful in helping the Russian troops locate Ukrainian artillery positions."

In late 2014, I personally did the only invasive passport and weapons checks that I know of during the Ukrainian civil war. I spent days looking for the Russian army every major publication said were attacking Ukraine. The keyword Cyber Security industry leader Alperovitch used is "evidently." Crowdstrike noted that in late 2014, there were 10,000 Russian forces in the region.

When I did the passport and weapons check, it was under the condition there would be no telephone calls. We went where I wanted to go. We stopped when I said to stop. I checked the documents and the weapons with no obstacles. The weapons check was important because Ukraine was stating that Russia was giving Donbass modern weapons at the time. Each weapon is stamped with a manufacture date. The results are in the articles above.

The government in Kiev agreed with my findings throughout 2014 and 2015. There were and are no Russian troops fighting in Donbass regardless of what Mr. Alperovitch asserts. There are some Russian volunteers which I have covered in detail.

Based on my findings which the CIA would call hard evidence, almost all the fighters had Ukrainian passports. There are volunteers from other countries. In Debaltsevo today, I would question Alperovitch's assertion of Russian troops based on the fact the passports will be Ukrainian and reflect my earlier findings. There is no possibly, could be, might be, about it.

The SBU, Olexander Turchinov, and the Ukrainian Ministry of Defense all agree that Crowdstrike is dead wrong in this assessment . Although subtitles aren't on it, the former Commandant of Ukrainian Army Headquarters thanks God Russia never invaded or Ukraine would have been in deep trouble.

How could Dimitri Alperovitch and Crowdstrike be this wrong on easily checked detail and still get this much media attention? Could the investment made by Google and some very large players have anything to do with the media Crowdstrike is causing?

In an interview with PBS newshour on December 22nd 2016, Dmitri Alperovitch finally produced the hard evidence he has for Russian involvement clearly. To be fair, he did state it several times before. It just didn't resonate or the media and US intelligence agencies weren't listening.

According to Alperovitch, the CEO of a $150 million dollar cyber security company "And when you think about, well, who would be interested in targeting Ukraine artillerymen in eastern Ukraine who has interest in hacking the Democratic Party, Russia government comes to mind, but specifically, Russian military that would have operational over forces in the Ukraine and would target these artillerymen."

That statement is most of the proof of Russian involvement he has. That's it, that's all the CIA, FBI have to go on. It's why they can't certify the intelligence. It's why they can't get beyond the threshold of maybe.

Woodruff then asked two important questions. She asked if Crowdstrike was still working for the DNC. Alperovitch responded "We're protecting them going forward. The investigation is closed in terms of what happened there. But certainly, we've seen the campaigns, political organizations are continued to be targeted, and they continue to hire us and use our technology to protect themselves."

Based on the evidence he presented Woodruff, there is no need to investigate further? Obviously, there is no need, the money is rolling in.

Second and most important Judy Woodruff asked if there were any questions about conflicts of interest, how he would answer? This is where Dmitri Alperovitch's story starts to unwind.

His response was "Well, this report was not about the DNC. This report was about information we uncovered about what these Russian actors were doing in eastern Ukraine in terms of locating these artillery units of the Ukrainian army and then targeting them. So, what we just did is said that it looks exactly as the same to the evidence we've already uncovered from the DNC, linking the two together."

Why is this reasonable statement going to take his story off the rails? First, let's look at the facts surrounding his evidence and then look at the real conflicts of interest involved. While carefully evading the question, he neglects to state his conflicts of interest are worthy of a DOJ investigation. Can you mislead the federal government about national security issues and not get investigated yourself?

If Alperovitch's evidence is all there is, then the US government owes some large apologies to Russia.

After showing who is targeting Ukrainian artillerymen, we'll look at what might be a criminal conspiracy.

Crowdstrike CEO Dmitri Alperovitch story about Russian hacks that cost Hillary Clinton the election was broadsided by the SBU (Ukrainian Intelligence and Security) in Ukraine. If Dimitri Alperovitch is working for Ukrainian Intelligence and is providing intelligence to 17 US Intelligence Agencies is it a conflict of interest?

Ukraine has been screaming for the US to start a war with Russia for the past 2 1/2 years. Using facts accepted by leaders on both sides of the conflict, the main proof Crowdstrike shows for evidence doesn't just unravel, it falls apart. Is Ukrainian Intelligence trying to invent a reason for the US to take a hard-line stance against Russia? Are they using Crowdstrike to carry this out?

Real Fancy Bear?

Real Fancy Bear?

Meet the real Fancy Bear and Cozy Bear, part of the groups that are targeting Ukrainian positions for the Donetsk and Lugansk People's Republics. These people were so tech savvy they didn't know the Ukrainian SBU (Ukrainian CIA/internal security) records every phone call and most internet use in Ukraine and Donbass. Donbass still uses Ukrainian phone and internet services.

These are normal people fighting back against private volunteer armies that target their homes, schools, and hospitals. The private volunteer armies like Pravy Sektor, Donbas Battalion, Azov, and Aidar have been cited for atrocities like child rape, torture, murder, and kidnapping. That just gets the ball rolling. These are a large swath of the Ukrainian servicemen Crowdstrike hopes to protect.

This story which just aired on Ukrainian news channel TCN shows the SBU questioning and arresting some of what they call an army of people in the Ukrainian-controlled areas. This news video shows people in Toretsk that provided targeting information to Donbass and people probably caught up in the net accidentally.

This is a civil war and people supporting either side are on both sides of the contact line. The SBU is awestruck because there are hundreds if not thousands of people helping to target the private volunteer armies supported by Ukrainian-Americans.

The first person they show on the video is a woman named Olga Lubochka. On the video her voice is heard from a recorded call saying " In the field, on the left about 130 degrees. Aim and you'll get it." and then " Oh, you hit it so hard you leveled it to the ground.""Am I going to get a medal for this?"

Other people caught up in the raid claim and probably were only calling friends they know. It's common for people to call and tell their family about what is going on around them. This has been a staple in the war especially in outlying villages for people aligned with both sides of the conflict. A neighbor calls his friend and says "you won't believe what I just saw."

Another "fancy bear," Alexander Schevchenko was caught calling friends and telling them that armored personnel carriers had just driven by.

Anatoli Prima, father of a DNR(Donetsk People's Republic) soldier was asked to find out what unit was there and how many artillery pieces.

One woman providing information about fuel and incoming equipment has a husband fighting on the opposite side in Gorlovka. Gorlovka is a major city that's been under artillery attack since 2014. For the past 2 1/2 years, she has remained in their home in Toretsk. According to the video, he's vowed to take no prisoners when they rescue the area.

When asked why they hate Ukraine so much, one responded that they just wanted things to go back to what they were like before the coup in February 2014.

Another said they were born in the Soviet Union and didn't like what was going on in Kiev. At the heart of this statement is the anti- OUN, antinationalist sentiment that most people living in Ukraine feel. The OUNb Bandera killed millions of people in Ukraine, including starving 3 million Soviet soldiers to death. The new Ukraine was founded in 1991 by OUN nationalists outside the fledgling country.

Is giving misleading or false information to 17 US Intelligence Agencies a crime? If it's done by a cyber security industry leader like Crowdstrike should that be investigated? If unwinding the story from the "targeting of Ukrainian volunteers" side isn't enough, we should look at this from the American perspective. How did the Russia influencing the election and DNC hack story evolve? Who's involved? Does this pose conflicts of interest for Dmitri Alperovitch and Crowdstrike? And let's face it, a hacking story isn't complete until real hackers with the skills, motivation, and reason are exposed.

In the last article exploring the DNC hacks the focus was on the Chalupas . The article focused on Alexandra, Andrea, and Irene Chalupa. Their participation in the DNC hack story is what brought it to international attention in the first place.

According to journalist and DNC activist Andrea Chalupa on her Facebook page " After Chalupa sent the email to Miranda (which mentions that she had invited this reporter to a meeting with Ukrainian journalists in Washington), it triggered high-level concerns within the DNC, given the sensitive nature of her work. "That's when we knew it was the Russians," said a Democratic Party source who has been directly involved in the internal probe into the hacked emails. In order to stem the damage, the source said, "we told her to stop her research."" July 25, 2016

If she was that close to the investigation Crowdstrike did how credible is she? Her sister Alexandra was named one of 16 people that shaped the election by Yahoo news. The DNC hacking investigation done by Crowdstrike concluded hacking was done by Russian actors based on the work done by Alexandra Chalupa? That is the conclusion of her sister Andrea Chalupa and obviously enough for Crowdstrike to make the Russian government connection. These words mirror Dimitri Alperovitch's identification process in his interview with PBS Judy Woodruff.

How close is Dimitri Alperovitch to DNC officials? Close enough professionally he should have stepped down from an investigation that had the chance of throwing a presidential election in a new direction.

According to Esquire.com , Alperovitch has vetted speeches for Hillary Clinton about cyber security issues in the past. Because of his work on the Sony hack, President Barrack Obama personally called and said the measures taken were directly because of his work.

Still, this is not enough to show a conflict of interest. Alperovitch's relationships with the Chalupas, radical groups, think tanks, Ukrainian propagandists, and Ukrainian state supported hackers do. When it all adds up and you see it together, we have found a Russian that tried hard to influence the outcome of the US presidential election in 2016.

In my previous article I showed in detail how the Chalupas fit into this. A brief bullet point review looks like this.

In January, 2014 when he showed up at the Maidan protests he was 17 years old. He became the foreign language media representative for Vitali Klitschko, Arseni Yatsenyuk, and Oleh Tyahnybok. All press enquiries went through Yurash. To meet Dimitri Yurash you had to go through Sviatoslav Yurash as a Macleans reporter found out.

At 18 years old, Sviatoslav Yurash became the spokesman for Ministry of Defense of Ukraine under Andrei Paruby. He was Dimitri Yarosh's spokesman and can be seen either behind Yarosh on videos at press conferences or speaking ahead of him to reporters. From January 2014 onward, to speak to Dimitri Yarosh, you set up an appointment with Yurash.

Andrea Chalupa has worked with Yurash's Euromaidan Press which is associated with Informnapalm.org and supplies the state level hackers for Ukraine.

According to Robert Parry's article At the forefront of people that would have taken senior positions in a Clinton administration and especially in foreign policy are the Atlantic Council. Their main goal is still a major confrontation with nuclear-armed Russia.

The Atlantic Council is the think tank associated and supported by the CEEC (Central and Eastern European Coalition). The CEEC has only one goal which is war with Russia. Their question to candidates looking for their support in the election was "Are you willing to go to war with Russia?" Hillary Clinton has received their unqualified support throughout the campaign.

What does any of this have to do with Dimitri Alperovitch and Crowdstrike? Since the Atlantic Council would have taken senior cabinet and policy positions, his own fellowship status at the Atlantic Council and relationship with Irene Chalupa creates a definite conflict of interest for Crowdstrike's investigation. Trump's campaign was gaining ground and Clinton needed a boost. Had she won, would he have been in charge of the CIA, NSA, or Homeland Security?

When you put someone that has so much to gain in charge of an investigation that could change an election, that is a conflict of interest. If the think tank is linked heavily to groups that want war with Russia like the Atlantic Council and the CEEC, it opens up criminal conspiracy.

If the person in charge of the investigation is a fellow at the think tank that wants a major conflict with Russia it is a definite conflict of interest. Both the Atlantic Council and clients stood to gain Cabinet and Policy positions based on how the result of his work affects the election. It clouds the results of the investigation. In Dmitri Alperovitch's case, he found the perpetrator before he was positive there was a crime.

Alperovitch's relationship with Andrea Chalupa's efforts and Ukrainian intelligence groups is where things really heat up. Noted above she works with Euromaidanpress.com and Informnapalm.org which is the outlet for Ukrainian state-sponsored hackers.

When you look at Dimitri Alperovitch's twitter relationships, you have to ask why the CEO of a $150 million dollar company like Crowdstrike follows Ukrainian InformNapalm and its hackers individually . There is a mutual relationship. When you add up his work for the OUNb, Ukraine, support for Ukraine's Intelligence, and to the hackers it needs to be investigated to see if Ukraine is conspiring against the US government.

Alperovitch and Fancy Bear tweet each other?

Alperovitch and Fancy Bear tweet each other?

Crowdstrike is also following their hack of a Russian government official after the DNC hack. It closely resembles the same method used with the DNC because it was an email hack.

ff-twitter-com-2016-12-30-02-24-54

Crowdstrike's product line includes Falcon Host, Falcon Intelligence, Falcon Overwatch and Falcon DNS. Is it possible the hackers in Falcons Flame are another service Crowdstrike offers? Although this profile says Virginia, tweets are from the Sofia, Bulgaria time zone and he writes in Russian. Another curiosity considering the Fancy Bear source code is in Russian. This image shows Crowdstrike in their network.

Crowdstrike is part of Ukrainian nationalist hacker network

In an interview with Euromaidanpress these hackers say they have no need for the CIA. They consider the CIA amateurish. They also say they are not part of the Ukrainian military Cyberalliance is a quasi-organization with the participation of several groups – RUH8, Trinity, Falcon Flames, Cyberhunta. There are structures affiliated to the hackers – the Myrotvorets site, Informnapalm analytical agency."

In the image it shows a network diagram of Crowdstrike following the Surkov leaks. The network communication goes through a secondary source. This is something you do when you don't want to be too obvious. Here is another example of that.

Ukrainian Intelligence and the real Fancy Bear?

Ukrainian Intelligence and the real Fancy Bear?

Although OSINT Academy sounds fairly innocuous, it's the official twitter account for Ukraine's Ministry of Information head Dimitri Zolotukin. It is also Ukrainian Intelligence. The Ministry of Information started the Peacekeeper or Myrotvorets website that geolocates journalists and other people for assassination. If you disagree with OUNb politics, you could be on the list.

Should someone tell Dimitri Alperovitch that Gerashchenko, who is now in charge of Peacekeeper recently threatened president-elect Donald Trump that he would put him on his "Peacemaker" site as a target? The same has been done with Silvio Berscaloni in the past.

Trying not to be obvious, the Head of Ukraine's Information Ministry (UA Intelligence) tweeted something interesting that ties Alperovitch and Crowdstrike to the Ukrainian Intelligence hackers and the Information Ministry even tighter.

Trying to keep it hush hush?

Trying to keep it hush hush?

This single tweet on a network chart shows that out of all the Ukrainian Ministry of Information Minister's following, he only wanted the 3 hacking groups associated with both him and Alperovitch to get the tweet. Alperovitch's story was received and not retweeted or shared. If this was just Alperovitch's victory, it was a victory for Ukraine. It would be shared heavily. If it was a victory for the hacking squad, it would be smart to keep it to themselves and not draw unwanted attention.

These same hackers are associated with Alexandra, Andrea, and Irene Chalupa through the portals and organizations they work with through their OUNb. The hackers are funded and directed by or through the same OUNb channels that Alperovitch is working for and with to promote the story of Russian hacking.

Pravy Sektor Hackers and Crowdstrike?

Pravy Sektor Hackers and Crowdstrike?

When you look at the image for the hacking group in the euromaidanpress article, one of the hackers identifies themselves as one of Dimitri Yarosh's Pravy Sektor members by the Pravy Sektor sweatshirt they have on. Noted above, Pravy Sektor admitted to killing the people at the Maidan protest and sparked the coup.

Going further with the linked Euromaidanpress article the hackers say" Let's understand that Ukrainian hackers and Russian hackers once constituted a single very powerful group. Ukrainian hackers have a rather high level of work. So the help of the USA I don't know, why would we need it? We have all the talent and special means for this. And I don't think that the USA or any NATO country would make such sharp movements in international politics."

What sharp movements in international politics have been made lately? Let me spell it out for the 17 US Intelligence Agencies so there is no confusion. These state sponsored, Russian language hackers in Eastern European time zones have shown with the Surkov hack they have the tools and experience to hack states that are looking out for it. They are also laughing at US intel efforts.

The hackers also made it clear that they will do anything to serve Ukraine. Starting a war between Russia and the USA is the one way they could serve Ukraine best, and hurt Russia worst. Given those facts, if the DNC hack was according to the criteria given by Alperovitch, both he and these hackers need to be investigated.

According to the Esquire interview "Alperovitch was deeply frustrated: He thought the government should tell the world what it knew. There is, of course, an element of the personal in his battle cry. "A lot of people who are born here don't appreciate the freedoms we have, the opportunities we have, because they've never had it any other way," he told me. "I have."

While I agree patriotism is a great thing, confusing it with this kind of nationalism is not. Alperovitch seems to think by serving OUNb Ukraine's interests and delivering a conflict with Russia that is against American interests, he's a patriot. He isn't serving US interests. He's definitely a Ukrainian patriot. Maybe he should move to Ukraine.

The evidence presented deserves investigation because it looks like the case for conflict of interest is the least Dimitri Alperovitch should look forward to. If these hackers are the real Cozy Bear and Fancy Bear, they really did make sharp movements in international politics.

By pawning it off on Russia, they made a worldwide embarrassment of an outgoing President of the United States and made the President Elect the suspect of rumor.

From the Observer.com , " Andrea Chalupa -- the sister of DNC research staffer Alexandra Chalupa -- claimed on social media, without any evidence, that despite Clinton conceding the election to Trump, the voting results need to be audited to because Clinton couldn't have lost -- it must have been Russia. Chalupa hysterically tweeted to every politician on Twitter to audit the vote because of Russia and claimed the TV show The Americans , about two KGB spies living in America, is real."

Quite possibly now the former UK Ambassador Craig Murry's admission of being the involved party to "leaks" should be looked at. " Now both Julian Assange and I have stated definitively the leak does not come from Russia . Do we credibly have access? Yes, very obviously. Very, very few people can be said to definitely have access to the source of the leak. The people saying it is not Russia are those who do have access. After access, you consider truthfulness. Do Julian Assange and I have a reputation for truthfulness? Well in 10 years not one of the tens of thousands of documents WikiLeaks has released has had its authenticity successfully challenged. As for me, I have a reputation for inconvenient truth telling."


[May 10, 2019] Mueller Report - Expensive Estimations And Elusive Evidence by Adam Carter

Highly recommended!
Looks more and more like Crowdstrike conducted false flag operation to implicate Russians, not a real investigation.
I always assumed that #Guccifer2 was either a Crowdstryke construction at DNC request (that's probably why it was so badly, incompetently done) or a NSA construction (then, we somehow need to explain, why it was so badly done?). In both cases the goal was to implicate Russia in a DNC 'hack' ...
Craig Murray has stated he received the DNC files in Wash DC from a leaker. Mueller failed to interview him, which suggest the Mueller and his team were the part of cover-up, not the part of investigation.
Notable quotes:
"... We are told the GRU obtained files from the DNC network on April 22, 2016, (this is a little different to the Netyksho indictment that states the files were archived on April 22, 2016 and extracted later): ..."
"... The malware samples provided by CrowdStrike show that the earliest compile date of Fancy Bear malware reportedly discovered at the DNC was April 25, 2016 . ..."
"... Whoever was controlling the Guccifer 2.0 persona went out of their way to be perceived as Russian and made specious claims about having already sent WikiLeaks documents, even claiming that WikiLeaks would release them soon (all before Mueller records any initial contact between the parties) . ..."
"... The Special Counsel seems to have been impervious to critical pieces of countervailing evidence (some of which demonstrates that Guccifer 2.0 deliberately manufactured Russian breadcrumbs) and they have failed to accurately account for the acquisition of WikiLeaks' DNC emails (missing the date on which approximately 70% of them were collected) , which is, in itself, a stunning failure for a supposedly thorough investigation costing US taxpayers tens of millions of dollars. ..."
"... There should have been a proper, thorough, independent and impartial investigation into the Guccifer 2.0 persona. The Special Counsel certainly hasn't done that job and, in retrospect, looks to have been ill-equipped (and perhaps somewhat reluctant) to do so from the outset. ..."
May 06, 2019 | turcopolier.typepad.com

On April 18, 2019, a redacted version of Robert Mueller's report on "RussiaGate" related activities was released to the public.

This article focuses on Volume I Part III titled "Russian Hacking & Dumping Operations" and provides details of the errors made, critical omissions, lack of conclusive evidence and reliance on assumptions and speculation.

We will also look at problems relating to attribution methods used, countervailing evidence that has clearly been disregarded and other problems that are likely to have affected the quality of the investigation and the report.


The Mueller Report: Context & Contradiction

We start with a read-through of this section of the report, highlighting missing context, contradictions and errors.

Page 36

[To minimize repetition, we'll deal with statements made in this introduction where the basis is explained or details are provided on other pages ahead.]

Page 36

While the Netyksho indictment does provide details of intrusions and infrastructure used, it's still unclear how the infrastructure has been attributed back to individuals in the GRU and no conclusive evidence has been presented to support that in the indictment or the report.

Page 37

Some of the claims relating to state boards of elections are contradicted by the Department of Homeland Security , we'll return to this where it's covered in more detail later in the report.

Page 37

Whatever the sources are the GRU did their "learning" from they seem to have been outdated as many of the phishing emails were bounced due to being for individuals that were not involved in Clinton's 2016 campaign and that no longer had mailboxes on the relevant domains (they were involved in earlier campaigns in previous years) .

Page 39

In the Netyksho indictment it is stated that the "middle-servers" are overseas:

So, what was the point in having a US-based AMS Panel if you're using overseas servers as proxies?

This seems to be a needlessly noisy setup that somewhat defeats the purpose of having a US-based server for the AMS panel.

This setup makes the assets allegedly used by GRU officers subject to US laws, subject to Internet monitoring by US intelligence agencies and prone to being physically seized.

With the GRU using middle-servers, as alleged, there would have been absolutely no reason to have the AMS panel hosted on a server within the US and every reason to have it hosted elsewhere.

It almost seems like they wanted to get caught!

Page 40

We are told the GRU obtained files from the DNC network on April 22, 2016, (this is a little different to the Netyksho indictment that states the files were archived on April 22, 2016 and extracted later):

The problem with this is that it suggests the GRU had their implant on the DNC network earlier than what the available evidence supports.

The malware samples provided by CrowdStrike show that the earliest compile date of Fancy Bear malware reportedly discovered at the DNC was April 25, 2016 .

Perhaps they didn't discover all the malware until later? (Though, with their flagship product installed across the network, one would think they'd have detected all the malware present by the time they reported on discoveries).

Regarding the stolen opposition research, we've only seen the document as an attachment to one of Podesta's emails and a deliberately tainted version of the same document released by Guccifer 2.0.

The implication that this was stolen from the DNC is questionable due to this.

Going further, the story surrounding this changed in November 2017 when the Associated Press published a story titled " How Russians hacked the Democrats' emails " in which they cite an anonymous former DNC official who asserts that Guccifer 2.0's first document (the Trump opposition report) did not originate in the DNC as initially reported.

Another interesting point relating to this is the "HRC_pass.zip" archive released by Guccifer 2.0 on June 21, 2016 ( which also provided another US central timezone indication ) contained files with last modification dates of April 26, 2016. While this fits within the above timeframe, the transfer of the files individually, the apparent transfer speeds involved and the presence of FAT-like 2-second rounding artifacts ( noted elsewhere in Guccifer 2.0's releases ) when the files came from an NTFS system (and the ZIP implementation was not the cause) does not correlate well with what the report outlines.

In spite of its name ("HRC_pass.zip") this archive appears to contain files that can be sourced to the DNC. Out of 200 files, only one showed up as an attachment (in the Podesta emails) .

Regarding the May 25 - June 1 timeframe cited, this seems to exclude the date on which approximately 70% of the DNC's emails published on WikiLeaks' website were acquired (May 23, 2016)

What makes this interesting is that this is apparently being evaluated on evidence that was very likely to have been provided by CrowdStrike:

Page 40

How did Crowdstrike's evidence not inform the FBI and Special Counsel of the real initial acquisition date of WikiLeaks' DNC emails?

Was the May 23, 2016 activity not recorded?

Going back to the Netyksho indictment , we have also been told that Yermakov was searching for Powershell commands between the May 25 - June 1st period:

However, we know 70% of the DNC emails published by WikiLeaks had already been acquired prior to that time, before Yermakov had allegedly researched how to access and manage the Exchange server.

Page 41

We can tell from the use of "appear" here that the Special Counsel does not have conclusive evidence to demonstrate this.

Page 41

While the overlap between reported phishing victims and the output of DCLeaks cannot be denied, it is still unclear how bitcoin pools or leased infrastructure have been definitively tied back to any GRU officers or the GRU itself.

This isn't to say that there isn't evidence of it (I would assume there is some evidence or intelligence that supports the premise to some degree, at the very least) but we have no idea what that could be and there is no explanation of how associations to individual GRU officers were made (perhaps to protect HUMINT but this still leaves us completely in the dark as to how attributions were made) .

We know already that things are assumed by the Special Counsel on the basis of circumstantial evidence, so there is good reason to question whether the attributions made are based on conclusive evidence.

Page 42

This is the first point at which to recall Assange's announcement on 12 June that WikiLeaks was working on a release of "emails related to Hillary Clinton" - two days before the DNC goes public about being hacked by Russians, and three days before the appearance of Guccifer 2.0.

It's also approximately one month before Mueller says Guccifer 2.0 first successfully sent anything to WikiLeaks.

Whoever was controlling the Guccifer 2.0 persona went out of their way to be perceived as Russian and made specious claims about having already sent WikiLeaks documents, even claiming that WikiLeaks would release them soon (all before Mueller records any initial contact between the parties) .

While WikiLeaks did mention this via their Twitter feed on June 16, 2016, they were clearly skeptical of his claims to be a hacker and although they cite his claim about sending material to WikiLeaks, they don't confirm it:

It also seems a little odd that the GRU would do searches for already translated phrases (using Google translate to get English translations would be more understandable) and if it's Guccifer 2.0 doing it why did he not use the VPN he used for his other activities throughout the same day?

Why does the Mueller report not report on the IP address of the Moscow-based server from which searches occurred? It wouldn't really expose sources and methods to disclose it and it's unclear how it was determined to have been used and managed by a unit of the GRU. (Citation #146 references the Netyksho indictment, however, that fails to provide evidence or explanation of this too.)

Also, Guccifer 2.0 did not attribute the hack to a Romanian hacker in his first blog post , he didn't mention nationality until a week later (after he'd already gone out of his way to leave Russian breadcrumbs behind ) .

Page 43

The version of the opposition research document Guccifer 2.0 released was built using a prepared "Russian-tainted" template document .

The template was made by taking an attachment from one of John Podesta's emails (a document originally authored by Warren Flood in 2008) , stripping out the content, adding in Russian language stylesheet entries , altering "Confidential Draft" in the background of the document to "Confidential", altering the footer and then stripping out the body content.

The body content of a Trump Opposition research document (originally authored by Lauren Dillon) that was attached to another of Podesta's emails was then copied into the template document.

The document was saved (with a Russian author name), its body content cleared and this was then re-used to produce two further "Russia-tainted" documents.

It was no accident that led to the documents being tainted in the way that they were and it looks like Guccifer 2.0's version of the Trump opposition research didn't really come from the DNC.

Page 43

The email sent to The Smoking Gun revealed that Guccifer 2.0 appeared to be operating from somewhere in the central (US) time zone . It is one of several inexplicable examples of US timezone indications from Guccifer 2.0.

Page 43

It should be noted that the data referenced above was also unrelated to the general election and didn't have any noticeable impact on it (the 2.5Gb of data Guccifer 2.0 provided to Aaron Nevins was unlikely to have hurt the Clinton campaign or affect the outcome of the general election) .

In the states that the data related to, general election results didn't flip between the time of the publication of the documents and the election:

Page 43

Interesting to note that Guccifer 2.0 lied about DCLeaks being a "sub project" of WikiLeaks.

Page 44

The only materials Mueller alleges that WikiLeaks confirmed receipt of was a "1gb or so" archive, for which, instructions to access were communicated in an attached message (none-too-discreetly titled "wk dnc link1.txt.gpg") and sent by Guccifer 2 via unencrypted email.

It is an assumption that this was an archive of DNC emails (it could have contained other files Guccifer 2.0 subsequently released elsewhere).

We don't even know for sure whether WikiLeaks released what had been sent to them by either entity.

Even if, theoretically, the archive contained the emails, it couldn't have been the whole collection because the whole collection, when compressed, exceeds 2Gb of data .

This, of course, doesn't rule out the possibility of it being a portion of the overall collection but what the persona had sent to WikiLeaks could also easily have been other material relating to the DNC that we know Guccifer 2.0 later released or shared with other parties.

Page 45

This is the second point at which to recall Assange's 12 June TV announcement of upcoming "emails related to Hillary Clinton", coming two days before Guccifer 2.0's colleagues at DCLeaks reach out to WikiLeaks via unencrypted means on 14 June 2016 to offer "sensitive information" on Clinton.

Then, seven days after Guccifer 2 had already claimed to have sent material to WikiLeaks and stated that they'd soon release it (which made it sound as though he'd had confirmation back), we see that WikiLeaks reaches out to Guccifer 2.0 and suggests he sends material to them (as though there's never been any prior contact or provision of materials previously discussed) .

Page 45

How is it "clear" that both the DNC and Podesta documents were transferred from the GRU to WikiLeaks when there is only around a gigabyte of data acknowledged as received (and we don't even know what that data is) and little is known about the rest (and the report just speculates at possibilities) ?

Page 46

We aren't provided the full dialogue between WikiLeaks and Guccifer 2.0. Instead we have just a few words selected from the communication that could easily be out of context. The Netyksho indictment did exactly the same thing. Neither the indictment nor the report provide the full DM conversation in context.

(It certainly wouldn't harm HUMINT resources or expose methods if this evidence was released in full context.)

Would the GRU really engage in internal communications (eg GRU Guccifer 2.0 to GRU DCLeaks) via Twitter DMs? Maybe, but it seems insanely sloppy with regards to operational security of a clandestine organization communicating between its own staff.

The statement that concludes on the following page (see below) also seems a little bizarre. Would WikiLeaks really ask Guccifer 2.0 to DM DCLeaks to pass on such a message on their behalf?

Why doesn't Mueller provide the comms evidence of WikiLeaks asking Guccifer 2.0 for assistance in contacting DCLeaks?

As written, we are expected to take the words of Guccifer 2.0 (stating that the media organisation wished to talk to DCLeaks) at face value.

The problem with this is that we are talking about a persona who lied publicly about when he first sent material to WikiLeaks ( claiming to have done so already on the day appeared ) , lied about the relationship between WikiLeaks and DCLeaks and who had gone to a great deal of trouble to leave false Russian fingerprints in his work output.

Page 47

It was actually the last-modification date, not the creation date that was recorded as 19 September, 2016.

This wasn't necessarily the creation date and is only indicative of the last recorded write/copy operation (unless last modification date is preserved when copying but there's no way to determine that based on the available evidence) .

The gap between email file timestamps and attachment timestamps may simply be explained by WikiLeaks extracting the attachments from the EML files at a later stage. With the DNC emails we observed last-modifications dates as far back as May 23, 2016 but the attachments had last-modification dates that were much later (eg. July 21, 2016).

The wording is also worth noting: "Based on information about Assange's computer and its possible operating system" [emphasis mine] does not sound like it's based on reliable and factual information, it sounds like this is based on assessment/estimation. This also seems to be relying on an assumption that the only person handling files for WikiLeaks is Assange.

How have the Special Counsel cited WikiLeaks metadata for evidence where it's suited them yet, somehow, have managed to miss the May 23, 2016 date on which the DNC emails were initially being collected?

Going further, the report, based on speculation, suggests that the GRU staged releases in July (for DNC emails) and September (for Podesta emails). However, going off the same logic as the Special Counsel, with last-modification dates indicating when the email files are "staged", the evidence would theoretically point to the DNC emails being "staged" in May 2016).

It doesn't seem so reliable when the rule is applied multilaterally.

Of course, if both assumptions about staging dates are true, then we're left wondering what Julian Assange could have been talking about on June 12, 2016 when mentioning having emails relating to Hillary Clinton.

The speculation in the final paragraph of the above section also shows us that the Special Counsel lacks certainty on sources.

Page 48

Really, this correlation of dates (March 21, 2016 and the reported phishing incident relating to March 19, 2016) is one of the best arguments for saying that emails published by WikiLeaks were acquired through phishing or hacking incidents reported.

However, this merely suggests the method of acquisition, it says nothing of how the material got to WikiLeaks. We can make assumptions, but that's all we can do because the available evidence is circumstantial rather than conclusive.

Page 48

Far from "discredit[ing] WikiLeaks' claims about the source of the material it posted", the file transfer evidence doesn't conclusively demonstrate that WikiLeaks published anything sent to it by Guccifer 2.0 or DCLeaks.

Although there are hints that what was sent by Guccifer 2.0 related to the DNC, we don't know if this contained DNC emails or the other DNC related content he later released and shared with others.

"The statements about Seth Rich implied falsely that he had been the source of the stolen DNC emails" is itself a false statement. The reason Assange gave for offering a reward for information leading to the conviction of Seth Rich's killers was "Our sources take risks and they become concerned when they see things occurring like that [the death of DNC worker Seth Rich]... We have to understand how high the stakes are in the United States" ( source ) .

This implies WikiLeaks is offering the reward for info about Seth Rich at the behest of its actual source/s.

Page 49

By the time Trump had made the statements cited above, it was already assumed that Hillary had been hacked by the Russians, so Trump saying he hoped the Russians would find the emails seems more likely to have been in reference to what he assumed was already in their possession.

Finding those 30,000 emails also wouldn't be achieved through hacking at that point in time as the emails had already been deleted by Hillary Clinton's IT consultants in March 2015 .

Page 50

What is being described here is, to a considerable extent, just common exploit scanning on web services, scanning that will almost certainly have come from other nodes based in other nations too .

These scans are typically done via compromised machines, often with machines that are in nations completely separate to the nationality of those running the scanning effort.

The Department of Homeland Security threw cold water on this a long time ago.

DHS would not characterize these efforts as attacks, only "simple scanning ... which occurs all the time".

Page 51

There was no alteration of ballots or results at all anywhere as of a testimony by DHS Secretary Jeh Johnson on June 21 2017 nor since that time, according to Brian Krebs, to the date of a hearing on November 27, 2017 .

The remaining pages in this section of the report include a lot of redactions and mostly cover the actions of individuals in the US in relation to communications they had with or in relation to WikiLeaks. As this article is about the technical claims made in relation to hacking and so much is redacted, we'll only look at those really relevant to this.

Page 52

By the time Assange made the announcement referenced above, the Hillary Clinton emails obtained through FOIA had already been published by WikiLeaks.

Considering what WikiLeaks subsequently published, it would seem that Assange was making a reference to at least one of the upcoming leaks.

At this time, there was no record of contact between WikiLeaks and either of the parties alleged to be the GRU.

Page 58

Regarding the timing of the leaks and the Access Hollywood tape, it's important to note that journalist Stefani Maurizi, who had worked with WikiLeaks on the Podesta leaks, has stated publicly that she knew of WikiLeaks intention to publish on that date on the evening prior to it .

WikiLeaks stated the "timing conspiracy theory" was the other way round: " The [Access Hollywood] tape was moved forward to the day of our release, which WikiLeaks had been teasing " and was " well-documented ".

[The remaining pages in this section have little relevance to the technical aspects of this section of the report and/or acquisition of materials that this article is intended to cover.]


Circumstantial Evidence & Understandable Assumptions

While the above does show numerous issues with the report, it's important not to fall into the trap of outright dismissing as false anything for which evidence is lacking or assuming there is no evidence at all to support assertions.

However, without knowing what evidence exists we're left to make assumptions about whether it's conclusive or circumstantial, we don't know if the source of evidence is dependable and it's clear in the report that the Special Counsel has relied on assumptions and made numerous statements on the basis of presuppositions.

There is also a considerable amount of circumstantial evidence that, although it doesn't conclusively prove what the report tries to convince us of, it does at least raise questions about relationships between different entities, especially with regards to any overlaps in resources and infrastructure used.

For example, based on the cited evidence, it is perfectly understandable that people will assume Guccifer 2.0 provided DNC emails to WikiLeaks and will also assume that WikiLeaks published whatever it was that Guccifer 2.0 had sent them (especially with Mueller presenting that conversation in the form of a couple of words devoid of all context) .

The apparent overlap between a VPN service used by Guccifer 2.0 and by DCLeaks does suggest the two could be associated beyond Guccifer 2.0 just being a source of leaks for them.

Also, DCLeaks publishing some DNC emails that later appeared in the DNC email collection (though not necessarily from the same mailboxes) also suggests that DCLeaks and WikiLeaks could have had access to some of the same material and/or sources.

The same is true for Guccifer 2.0 releasing Podesta and DNC email attachments before WikiLeaks released both collections. Unless given good reason to consider any ulterior motive, the implied explanation, on the surface, seems to be that it was this persona that was a source for those emails. If nothing else, that's how it appears based on the little information typically made available to us by the mainstream press.

However, despite all of this, we still have not seen conclusive evidence showing that either of the entities was really controlled by the GRU and, when the countervailing evidence (which seems to have been completely ignored by the Special Counsel's investigation) is considered, there is reason to give consideration to Guccifer 2.0's efforts to not just associate himself with WikiLeaks and DCLeaks but also to associate third parties with each other through false claims.


The Mystery Of The May 23, 2016 Omission

One of the most notable omissions is the date on which emails from several mailboxes (including Luis Miranda's) were originally collected.

We know, from analysis of metadata of files hosted by WikiLeaks that this was May 23, 2016.

Not only is this prior to the May 25, 2016 - June 1, 2016 timeframe given for the DNC's exchange server being hacked, this activity is unmentioned throughout the entire report.

How has this failed to come to the surface when it should have been apparent in evidence CrowdStrike provided to the FBI and also apparent based on the WikiLeaks metadata? How is it the Special Counsel can cite some of the metadata in relation to WikiLeaks releases yet somehow manage to miss this?


Countervailing Evidence

What the Special Counsel's investigation also seems to have completely disregarded is the volume of countervailing evidence that has been discovered by several independent researchers in relation to the Guccifer 2.0 persona.

It's worth considering what evidence the Special Counsel has brought to the surface and comparing it with the evidence that has come to the surface as a result of discoveries being made by independent researchers over the past two years and the differences between the two sets of evidence (especially with regards to falsifiability and verifiability of evidence) .

Some excellent examples are covered in the following articles:


Reliability Of Attribution Methods

Skip Folden (who introduced me to VIPS members and has been a good friend ever since) recently shared with me his assessment of problems with the current attribution methods being relied on by the Special Counsel and others.

It covered several important points and was far more concise than anything I would have written, so, with his permission, I'm publishing his comments on this topic:

No basis whatsoever

APT28, aka Fancy Bear, Sofacy, Strontium, Pawn Storm, Sednit, etc., and APT29, aka Cozy Bear, Cozy Duke, Monkeys, CozyCar,The Dukes, etc., are used as 'proof' of Russia 'hacking' by Russian Intelligence agencies GRU and FSB respectively.

There is no basis whatsoever to attribute the use of known intrusion elements to Russia, not even if they were once reverse routed to Russia, which claim has never been made by NSA or any other of our IC.

On June 15, 2016 Dmitri Alperovitch himself, in an Atlantic Council article, gave only "medium-level of confidence that Fancy Bear is GRU" and "low-level of confidence that Cozy Bear is FSB." These assessments, from the main source himself, that either APT is Russian intelligence, averages 37%-38% [(50 + 25) / 2].

Exclusivity :

None of the technical indicators, e.g., intrusion tools (such as X-Agent, X-Tunnel), facilities, tactics, techniques, or procedures, etc., of the 28 and 29 APTs can be uniquely attributed to Russia, even if one or more had ever been trace routed to Russia. Once an element of a set of intrusion tools is used in the public domain it can be reverse-engineered and used by other groups which precludes the assumption of exclusivity in future use. The proof that any of these tools have never been reverse engineered and used by others is left to the student - or prosecutor.

Using targets

Also, targets have been used as basis for attributing intrusions to Russia, and that is pure nonsense. Both many state and non-state players have deep interests in the same targets and have the technical expertise to launch intrusions. In Grizzly Steppe, page 2, second paragraph, beginning with, "Both groups have historically targeted ...," is there anything in that paragraph which can be claimed as unique to Russia or which excludes all other major state players in the world or any of the non-state organizations? No.

Key Logger Consideration

On the subject of naming specific GRU officers initiating specific actions on GRU Russian facilities on certain dates / times, other than via implanted ID chips under the finger tips of these named GRU officers, the logical assumption would be by installed key logger capabilities, physical or malware, on one or more GRU Russian computers.

The GRU is a highly advanced Russian intelligence unit. It would be very surprising were the GRU open to any method used to install key logger capabilities. It would be even more surprising, if not beyond comprehension that the GRU did not scan all systems upon start-up and in real time, including key logger protection and anomalies of performance degradation and data transmissions.

Foreign intelligence source

Other option would be via a foreign intelligence unit source with local GRU access. Any such would be quite anti-Russian and be another nail in the coffin of any chain of evidence / custody validity at Russian site.


Chain Of Custody - Without An Anchor There Is No Chain

Another big problem with the whole RussiaGate investigation is the reliance on a private firm, hired by the DNC, to be the source of evidence.

As I don't have a good understanding of US law and processes surrounding evidence collection and handling, I will, again, defer to something that my aforementioned contact shared:

Chain of Evidence / Custody at US end, i.e., DNC and related computing facilities

Summary: There is no US end Chain of Evidence / Custody

The anchor of any chain of evidence custody is the on-site crime scene investigation of a jurisdictional law enforcement agency and neutral jurisdictional forensic team which investigate, discover, identify where possible, log, mark, package, seal, or takes images there of, of all identified elements of potential evidence as discovered at the scene of a crime by the authorized teams. The chain of this anchor is then the careful, documented movement of each element of captured evidence from crime scene to court.

In the case of the alleged series of intrusions into the DNC computing facilities, there is no anchor to any chain of evidence / custody.

There has been no claim that any jurisdictional law enforcement agency was allowed access to the DNC computing facilities. The FBI was denied access to DNC facilities, thereby supposedly denying the FBI the ability to conduct any on-site investigation of the alleged crime scene for discovery or collection of evidence.

Nor did the FBI exercise its authority to investigate the crime scene of a purported federal crime. Since when does the FBI need permission to investigate an alleged crime site where it is claimed a foreign government's intelligence attacked political files in order to interfere in a US presidential election?

Instead, the FBI accepted images of purported crime scene evidence from a contractor hired by and, therefore, working for the DNC. On July 05, 2017 a Crowdstrike statement said that they had provided "... forensic images of the DNC system to the FBI." It was not stated when these images were provided. Crowdstrike was working for the DNC as a contractor at the time.

This scenario is analogous to an employee of a crime scene owner telling law enforcement, "Trust me; I have examined the crime scene for you and here's what I've found. It's not necessary for you to see the crime scene."

Crowdstrike cannot be accepted as a neutral forensic organization. It was working for and being paid by the DNC. It is neither a law enforcement agency nor a federal forensic organization. Further Crowdstrike has serious conflicts of interest when it comes to any investigation of Russia.

Crowdstrike co-founder and Director of Technology, Dimitri Alperovitch, is a Nonresident Senior Fellow, Cyber Statecraft Initiative, of the Atlantic Council. Alperovitch has made it clear of his dislike of the government of Putin, and The Atlantic Council can not be considered neutral to Russia, receiving funding from many very staunch and outspoken enemies of Russia.

Summary: Not only was no federal jurisdictional law enforcement agency allowed to investigate the alleged crime scene, but the organization which allegedly collected and provided the 'evidence' was not neutral by being employed by the owner of the alleged crime scene, but seriously compromised by strong anti-Russian links.

This issue of this substitute for an anchor then leads us to our next problem: an apparent conflict of interest from the investigation's outset.


Conflict of Interest Inherent In The Investigation?

Would it seem like a conflict of interest if the person in charge of an investigation were friends with a witness and source of critical evidence relied upon by that investigation?

This is effectively the situation we have with the Special Counsel investigation because Robert Mueller and CrowdStrike's CSO (and President) Shawn Henry are former colleagues and friends.

Their history at the FBI is well known and their continued association after Henry had left the agency ( having dinner together at an executive retreat ) has been noted.

If nothing else, it's understandable for people to feel that the Special Counsel would have struggled to be truly impartial due to such relationships.


Conclusion

The Special Counsel seems to have been impervious to critical pieces of countervailing evidence (some of which demonstrates that Guccifer 2.0 deliberately manufactured Russian breadcrumbs) and they have failed to accurately account for the acquisition of WikiLeaks' DNC emails (missing the date on which approximately 70% of them were collected) , which is, in itself, a stunning failure for a supposedly thorough investigation costing US taxpayers tens of millions of dollars.

There should have been a proper, thorough, independent and impartial investigation into the Guccifer 2.0 persona. The Special Counsel certainly hasn't done that job and, in retrospect, looks to have been ill-equipped (and perhaps somewhat reluctant) to do so from the outset.


This article may be republished/reproduced in part or in full on condition that content above is unaltered and that the author is credited (or, alternatively, that a link to the full article is included).

[May 10, 2019] #Guccifer2 hashtag on Twitter

Notable quotes:
"... In both cases # Assange had announced the release before allegedly getting material from # Guccifer2 (aka GRU). There might be other sources other than # G2 . # MuellerReport pic.twitter.com/bPN7NHpM9N ..."
"... Good Lord, @ Birgittaj , not you as well? That timeline is rubbish. Ask yourself, how could # Assange tell UK TV on 12 June # WikiLeaks already had possession of # DNCLeaks if # Mueller says "source" # Guccifer2 didn't send anything to WL until 14 July? http://www. itv.com/news/update/20 16-06-12/assange-on-peston-on-sunday-more-clinton-leaks-to-come/ # SaySorry pic.twitter.com/B0WRAjv15G ..."
"... LINDSEY GRAHAM FORGOT TO MENTION THAT SPEAKER PAUL RYAN SHUT DOWN # HouseIntelInvestigations into # Awan # Guccifer2 and # ClintonEmails . ..."
"... Always assumed that # Guccifer2 was either a DNC construction (as it was so badly done) or a NSA construction ..."
"... Says VIPs analyzed the @ wikileaks docs; via metadata discovered it had to be a thumb drive download. 2 years ago VIPs said # Guccifer2 docs had that character. ? Mr. President -- Listen to Bill Binney. Russiagate is a Worse Hoax than You Thought https:// youtu.be/-9TyASfZV0c # RussiaGate ..."
May 10, 2019 | twitter.com

PamelaDrew ‏ 28 Dec 2018

Fab recap of the hoax behind # Guccifer2 with forensics to identify changes made to support false attribution for # Russia but trust the corp news who sold WMD lies because # CIA wouldn't use # Vault7 tools or deceive the public, right? https:// disobedientmedia.com/2018/12/guccif er-2-0-game-over-year-end-review/

Robbin Young ‏ 7:51 PM - 18 Apr 2019

# MuellerReport # Guccifer2 # SethRich # JulianAssange # Wikileaks # Russia # Russians 8/25/16 DMs: "his name is seth, he was my whistleblower" - Guccifer 2.0 "Can't you trust Julian?" - Robbin Young "he may be connected to russians, i don't like it though he's my hero" - Guccifer 2.0 pic.twitter.com/LlBo413q2h

4:27 PM - 4 May 2019

In April 2016, the # GRU hacked into the computers of the @ DCCC & @ DNC & stole 100s of 1000s of docs. In mid-June 2016 the GRU began disseminating stolen materials through the fictitious online personas " # DCLeaks " and " # Guccifer2 .0." and then through @ WikiLeaks . - # MuellerReport

Ferez Nallaseth ‏ 10:26 AM - 26 Jan 2019

# SpecialCounselMueller # Guccifer2 # 2016Elections # Law # Constitution # Justice # CompromisingDemocracyGlobally # Cybersecurity "The clear implication is that any truly incriminating communications would have been conducted in encrypted https:// lnkd.in/e4zvKYX https:// lnkd.in/eh-WJ-k

Emma Best (U//FOUO) ‏ 3:54 PM - 30 Jan 2019

This is an interesting thread. Also note that Mueller has already released portions of logs of communications between # WikiLeaks and # Guccifer2 , a contact first reported by @ KevinCollier using logs I provided. pic.twitter.com/lVjeq9nTA2

4:04 PM - 4 May 2019

The @ DNC , etc docs that # Guccifer2 .0 provided to @ wikileaks prove that Hillary promoted Trump because she thought she could beat him (mistake) and the @ DNC rigged the primary so Hillary would win the nomination (mistake). All of this is talked about in the # MuellerReport .

craig slingsby ‏ 2:53 AM - 29 Apr 2019

The Transaction for a year of VPN from the same Netyksho et al. Wallet indictment but not the guccifer 2.0 alleged VPN https://www. blockchain.com/en/btc/tx/e33a 3951183d86eb7e6c214fe1c320e6322774663a17b5bea3c74785f23477ad # RussiaInvestigation # bitcoin # Guccifer2

Cristiano Arienti ‏ 9:05 AM - 18 Apr 2019

# Mueller does not t offer clear cronology (how and when) @ wikileaks got the # DNCleak and the # Podestaemails .

In both cases # Assange had announced the release before allegedly getting material from # Guccifer2 (aka GRU). There might be other sources other than # G2 . # MuellerReport pic.twitter.com/bPN7NHpM9N

Augury IT ‏ 7:24 PM - 23 Apr 2019

"Among those who clicked on a bogus link in an email was Podesta, Clinton campaign chairman, along with several other junior campaign volunteers, informal campaign advisers and one DNC employee." https:// freebeacon.com/national-secur ity/gru-spearphishing-emails-fooled-democrats-clinton-campaign-in-2016/ # malware # Democrats # GRU # Guccifer2 # WikiLeaks # ITsecurity

Sharry Wilson ‏ 8:42 PM - 15 Feb 2019

Special counsel prosecutors say they have communications of Stone with WikiLeaks # RogerStone # WikiLeaks # JulianAssange # Guccifer2 .0 # RobertMueller # Russia # DNC # HillaryClinton # RussiaInvestigation # US https:// cnn.it/2SUSdXM

Bella Magnani 5:46 AM - 26 Apr 2019

Good Lord, @ Birgittaj , not you as well? That timeline is rubbish. Ask yourself, how could # Assange tell UK TV on 12 June # WikiLeaks already had possession of # DNCLeaks if # Mueller says "source" # Guccifer2 didn't send anything to WL until 14 July? http://www. itv.com/news/update/20 16-06-12/assange-on-peston-on-sunday-more-clinton-leaks-to-come/ # SaySorry pic.twitter.com/B0WRAjv15G

Oeishik M.G. C. JD ‏ 1:41 AM - 1 May 2019

# LessonsfromtheMuellerReport # Guccifer2 is a problem child. In other news, did they get the name by combining @ Gucci & # Lucifer ?? - If so, both parties have cause of action against @ KremlinRussia_E @ realDonaldTrump & all their poisonous branches.

#BlackWomenForBernie2020 ‏ 1:24 PM - 14 Mar 2019

LINDSEY GRAHAM FORGOT TO MENTION THAT SPEAKER PAUL RYAN SHUT DOWN # HouseIntelInvestigations into # Awan # Guccifer2 and # ClintonEmails .

THEN # ChristopherWray final FBI recommendation is to RETRAIN THE FBI TO NOT EMBARRASS THEMSELVES "cough" GOP for # WealthClass # COMEY ! # BERNITDOWN https:// twitter.com/thedailybeast/ status/1106286631173148673

Michael Holloway - Schroedinger's Cyclist ‏ 12:25 PM - 13 Mar 2019

Always assumed that # Guccifer2 was either a DNC construction (as it was so badly done) or a NSA construction (or 2 working together); in both cases designed to implicate Russia in a DNC 'hack' ...while @ CraigMurrayOrg has stated he received the DNC files in Wash DC from a leaker.

Are You Cardigan? ‏ 10 Dec 2018

# HisNameWasSethRich # itallbeginshere ... # Guccifer2 .0 # Wikileaks # Podesta # Clinton >>> JAIL >>> https://www. youtube.com/edit?o=U&video _id=VYdch94KC9E pic.twitter.com/PmecvFXxdX

Donny Deplorable ‏ 8:36 AM - 3 Dec 2018

# RogerStone admitted (bragged) that he was in contact with # Guccifer2 .0. His goose is already cooked @ realDonaldTrump https:// twitter.com/realDonaldTrum p/status/1069619316319035392

Michael Holloway - Schroedinger's Cyclist ‏ 12:17 PM - 13 Mar 2019

Says VIPs analyzed the @ wikileaks docs; via metadata discovered it had to be a thumb drive download. 2 years ago VIPs said # Guccifer2 docs had that character. ? Mr. President -- Listen to Bill Binney. Russiagate is a Worse Hoax than You Thought https:// youtu.be/-9TyASfZV0c # RussiaGate

Bella Magnani 6:18 AM - 26 Apr 2019

Ah, bad link. Try this one: https://www. youtube.com/watch?v=x7UvbE TwpwU # Assange announcing # WikiLeaks possession of # DNCLeaks on 12 June, which # Mueller says "source" # Guccifer2 didn't send until 14 July. Relevant now: see his comments on UK trying to foist his US extradition onto # EU (ie # Sweden )

5:07 PM - 4 May 2019

Did you read any of the dos that were leaked by # Guccifer2 .0, # DCLeaks , or @ Wikeleaks ? If not, let me hip you to something. Corrupt Dems in the @ DCCC and the @ DNC , as well as crooked @ HillaryClinton , are the main reasons Trump is in the White House. Dems blew it. Face the truth.

#BlackWomenForBernie2020 ‏ 3:17 PM - 14 Mar 2019

*cough* Former Speaker Paul Ryan closed down HOUSE INTEL INVESTIGATIONS. Including # AWAN and # GUCCIFER2

Bella Magnani 4:36 PM - 26 Apr 2019

LoL. You've really got that "classic hindsight bias" nailed there, @ KPoulsen . And tsk! you're supposed to be a 'tech editor' & you say "you've lost me there" when I link you the digital forensic evidence # WikiLeaks didn't get # DNCLeaks from # Guccifer2 ? https:// theforensicator.wordpress.com/sorting-the-wi kileaks-dnc-emails/

ᴘᴀᴛᴛɪᴇ ɢᴀʀᴅɴᴇʀ 2:32 PM - 30 Dec 2018

How did # Guccifer2 .0 get "I-T's" @ DNC "Leaks" from "we suspect" @ JohnBrennan & James Clapper [•] Reporting on # Unity4J @ Unity4J is @ raymcgovern in -plainspeak- To @ wikileaks ? "Thumb drive to @ AssangeDefence " https:// youtu.be/2moVxa2oGJI "break it into a thousand pieces..." # QAnon

Baba Yaga ‏ 8:54 PM - 18 Apr 2019

The 'Guccifer 2.0' Gaps in Mueller's Full Report via @ Consortiumnews Mueller indictments of GRU for # Guccifer2 & 13 # Russians with dank means lack evidence https:// consortiumnews.com/2019/04/18/the -guccifer-2-0-gaps-in-muellers-full-report/ @ mtracey @ mtaibbi @ aaronjmate # MuellerReport # MuellerGoofs

Thread Reader App ‏ 4:11 PM - 6 May 2019

Hello, the unroll you asked for: Thread by @ with_integrity : "The Mueller Report - Expensive Estimations And Elusive Evidence http:// g-2.space/muellerreport/ [ ]" # Guccifer2 # RussiaGate https:// threadreaderapp.com/thread/1125435 714563452929.html Talk to you soon.

̼ ̼̼̼̼̼̼̼ ̼̼̼̼̼̼̼ 1:49 AM - 27 Dec 2018

"the # Guccifer2 .0 # persona was operated by # someone that # fabricated # evidence & # falsified # claims in support of statements made by @ CrowdStrike executives. They # wanted to be perceived as # Russian & wanted to be attributed to @ WikiLeaks from the day they emerged" # RussiaGate ? pic.twitter.com/EIfiO9NuZ2

Baba Yaga ‏ 10:07 AM - 29 Apr 2019

Crowdstrike had to abandon claims about the same Russian hackers in Ukraine https:// theforensicator.wordpress.com/2019/04/29/mor e-evidence-that-guccifer-2-planted-his-russian-breadcrumbs/amp/?__twitter_impression=true # Guccifer2 # RussiaGate @ ggreenwald @ mtracey @ aaronjmate @ mtaibbi

watchful one ‏ 9:48 AM - 29 Apr 2019

will anything in Mueller's report stand the test of time? https:// theforensicator.wordpress.com/2019/04/29/mor e-evidence-that-guccifer-2-planted-his-russian-breadcrumbs/ (via @ with_integrity ) # Guccifer2

Adam Carter ‏ 9:40 AM - 29 Apr 2019

More Evidence That Guccifer 2 Planted His Russian Breadcrumbs https:// theforensicator.wordpress.com/2019/04/29/mor e-evidence-that-guccifer-2-planted-his-russian-breadcrumbs/ # Guccifer2 # Forensicator # MuellerReport # Russiagate

Adam Carter ‏ 1:13 PM - 28 Apr 2019

It has been 800 days since the first cracks really started to emerge in the # Guccifer2 facade: https:// archive.fo/2dMfC We now have more evidence pointing to the persona operating from within US timezones than elsewhere: http:// g-2.space/ustimezones Let's see what this week brings. pic.twitter.com/ZtEObd9hmk

Ophelia PGlasser #Bernie2020 ‏ 7:16 AM - 26 Apr 2019

On this discussion, here's Bill Binney & @ jimmy_dore on # MuellerReport & DNC lies & cover-ups by # Guccifer2 https:// twitter.com/opheliapg/stat us/1121778691032223746?s=21

[Apr 25, 2019] Much of CrowdStrike's role is not really to provide any sort of relevant technical expertise or investigation, but to serve as an outside "expert" to provides the "correct" claims to form the basis of a desired media narrative

Apr 25, 2019 | www.unz.com

James Forrestal , says: April 24, 2019 at 10:59 pm GMT

@annamaria

Your whole tirade was triggered by a reference to CrowdStrike.

Interesting observation -- and appears to be true.

needless defiant

The word choice is quite revealing here. His objection has nothing to do with truth. He views you as " defying " the officially-endorsed narrative; committing the unpardonable crime of unauthorized noticing .

All that the notorious "17 intelligence agencies" canard ever amounted to was the heads of the 3 major inteligence agencies lining up and chanting "We believe Alperovitch!" in unison. Kind of ironic that the entire "Russian hackers" trope was based on the unsupported claim of an actual Russian hacker.

Regardless of how the Trump administration is working out, the simple fact that no US law enforcement agency ever examined the DNC's servers -- and that the officially-promoted media narrative skips over this fact, and minimizes the role of Alperovitch and CrowdStrike, demonstrates the extent of the deception involved in that narrative.

https://www.zerohedge.com/news/2017-03-24/what-crowdstrike-firm-hired-dnc-has-ties-hillary-clinton-ukrainian-billionaire-and-g

"The firm's CTO and co-founder, Dmitri Alperovitch, is a senior fellow at the Atlantic Council, a think tank with openly anti-Russian sentiments that is funded by Ukrainian billionaire (((Victor Pinchuk))), who also happened to donate at least $10 million to the Clinton Foundation."

CrowdStrike was pretty tight with Obama as well as Hillary.

https://archive.fo/6PEuq

"CrowdStrike Inc. today announced that Steven Chabinsky, CrowdStrike's general counsel and chief risk officer, has been appointed by the President to the Commission on Enhancing National Cybersecurity."

Crowdstrike has never made a profit, and does not disclose sales figures, but seems to have little difficulty in raising venture capital, and somehow reached a (private) valuation of $1B in 2017 -- and $3B a year later:

http://fortune.com/2018/06/19/cybersecurity-crowdstrike-funding-value/

Their first major round of investment was in 2015, with Google Capital, Warburg Pincus, and Rackspace as the major investors.

CrowdStrike and Alperovitch have promoted some other rather strange and improbable allegations about alleged "hackers" and "hacking":

https://medium.com/@jeffreycarr/the-gru-ukraine-artillery-hack-that-may-never-have-happened-820960bbb02d
https://www.voanews.com/a/crowdstrike-comey-russia-hack-dnc-clinton-trump/3776067.html
http://themillenniumreport.com/2017/01/dnc-russian-hackers-found/

Look at the cover of the Crowdstrike "report" on the imaginary "Fancy Bear" Ukrainian artillery hack that they tried to promote:

https://www.crowdstrike.com/wp-content/brochures/FancyBearTracksUkrainianArtillery.pdf

Looks like a comic book cover. Clown world.

It's also interesting to note that the metadata for the Guccifer 2.0 files is not consistent with a "hack" over the interwebz from Romania -- since it was transferred at 23 MB/s:

https://theforensicator.wordpress.com/guccifer-2-ngp-van-metadata-analysis/

that's thumb drive or LAN -- an internal leak, not a "hack."

CrowdStrike's role in the Russia conspiracy theory hacking/ meddling/ colluding allegations was minimized in favor of the even more authoritative-sounding "37 intelligence agencies" claim, but a large part of their usual role seems to to serve as a sort of "SPLC" for hacking attributions. Just as the SPLC provides the appearance of an "independent," "authoritative" source to designate so-called "hate groups" and "hate crimes," much of CrowdStrike's role is not really to provide any sort of relevant technical expertise or investigation, but to serve as an outside "expert" to provides the "correct" claims to form the basis of a desired media narrative.

See also the "Syrian Observatory for Human Rights," the "White Helmets," Rita Katz's "SITE Intelligence," etc

[Apr 25, 2019] Why did the DNC not allow the FBI to investigate the so-called" Russian hacked" emails? Rather, they hire Crowd Strike

Most probably because there was no hack: it was created by Crowdstrike out of plain cloth to fuel Russiagate.
Apr 25, 2019 | consortiumnews.com

Johnny Ryan S , April 22, 2019 at 13:38

Why did the DNC not allow the FBI to investigate the so-called" Russian hacked" emails? Rather, they hire Crowd Strike did you know:
1)Obama Appoints CrowdStrike Officer To Admin Post Two Months Before June 2016 Report On Russia Hacking DNC
2) CrowdStrike Co-Founder Is Fellow On Russia Hawk Group, Has Connections To George Soros, Ukrainian Billionaire
3) DNC stayed that the FBI never asked to investigate the servers -- that is a lie.
4) CrowdStrike received $100 million in investments led by Google Capital (since re-branded as CapitalG) in 2015. CapitalG is owned by Alphabet, and Eric Schmidt, Alphabet's chairman, was a supporter of Hillary Clinton in the 2016 election. More than just supporting Clinton, leaked emails from Wikileaks in November 2016 showed that in 2014 he wanted to have an active role in the campaign.

-daily caller and dan bongino have been bringing these points up since 2016.

[Apr 24, 2019] Gaping holes in CrowdStrike's conclusions

Apr 24, 2019 | www.unz.com

Saoirse , says: April 24, 2019 at 2:30 am GMT

MEMORANDUM FOR : The President

FROM : Veteran Intelligence Professionals for Sanity (VIPS)

VIPS Fault Mueller Probe, Criticize Refusal to Interview Assange

" In that Memorandum we described the results of our own independent, agenda-free forensic investigation led by two former Technical Directors of the NSA, who avoid squishy "assessments," preferring to base their findings on fundamental principles of science and the scientific method . Our findings remain unchallenged; they reveal gaping holes in CrowdStrike's conclusions."

[ ]

"We recall that you were apprised of that Memorandum's key findings because you ordered then-CIA Director Mike Pompeo to talk to William Binney, one of our two former NSA Technical Directors and one of the principal authors of that Memorandum . On October 24, 2017, Pompeo began an hour-long meeting with Binney by explaining the genesis of the odd invitation to CIA Headquarters: " You are here because the president told me that if I really wanted to know about Russian hacking I needed to talk to you ."

"On the chance Pompeo has given you no report on his meeting with Binney, we can tell you that Binney, a plain-spoken, widely respected scientist, began by telling Pompeo that his (CIA) people were lying to him about Russian hacking and that he (Binney) could prove it . Pompeo reacted with disbelief, but then talked of following up with the FBI and NSA. We have no sign, though, that he followed through. And there is good reason to believe that Pompeo himself may have been reluctant to follow up with his subordinates in the Directorate of Digital Innovation created by CIA Director John Brennan in 2015. CIA malware and hacking tools are built by the Engineering Development Group, part of that relatively new Directorate. "

[ ]

William Binney , former Technical Director, World Geopolitical & Military Analysis, NSA; co-founder, SIGINT Automation Research Center (ret.)

Bogdan Dzakovic , former Team Leader of Federal Air Marshals and Red Team, FAA Security (ret.) (associate VIPS)

Philip Giraldi , CIA, Operations Officer (ret.)

Mike Gravel , former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator

James George Jatras , former U.S. diplomat and former foreign policy adviser to Senate leadership (Associate VIPS)

Larry Johnson , former CIA Intelligence Officer & former State Department Counter-Terrorism Official, (ret.)

Michael S. Kearns , Captain, USAF (ret.); ex-Master SERE Instructor for Strategic Reconnaissance Operations (NSA/DIA) and Special Mission Units (JSOC)

John Kiriakou , former CIA Counterterrorism Officer and former Senior Investigator, Senate Foreign Relations Committee

Karen Kwiatkowski , former Lt. Col., US Air Force (ret.), at Office of Secretary of Defense watching the manufacture of lies on Iraq, 2001-2003

Clement J. Laniewski , LTC, U.S. Army (ret.)

Linda Lewis , WMD preparedness policy analyst, USDA (ret.)

Edward Loomis , NSA Cryptologic Computer Scientist (ret.)

David MacMichael , former Senior Estimates Officer, National Intelligence Council (ret.)

Ray McGovern , former US Army infantry/intelligence officer & CIA presidential briefer (ret.)

Elizabeth Murray , former Deputy National Intelligence Officer for the Near East & CIA political analyst (ret.)

Todd E. Pierce , MAJ, US Army Judge Advocate (ret.)

Peter Van Buren ,U.S. Department of State, Foreign Service Officer (ret.) (associate VIPS)

Robert Wing , U.S. Department of State, Foreign Service Officer (former) (associate VIPS)

Ann Wright , U.S. Army Reserve Colonel (ret) and former U.S. Diplomat who resigned in 2003 in opposition to the Iraq War

https://consortiumnews.com/2019/04/16/vips-fault-mueller-probe-criticize-refusal-to-interview-assange/

{excerpt, emphasis added}

Skeptikal , says: April 24, 2019 at 2:32 am GMT
@Adrian E. Very interesting post.
tulsilookinggood , says: April 24, 2019 at 2:33 am GMT
Phil is on my wall of heroes
Saoirse , says: April 24, 2019 at 2:43 am GMT
@annamaria MEMORANDUM FOR: The Attorney General

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

"Recent forensic examination of the Wikileaks DNC files shows they were created on 23, 25 and 26 May 2016. (On June 12, Julian Assange announced he had them; WikiLeaks published them on July 22.) We recently discovered that the files reveal a FAT (File Allocation Table) system property. This shows that the data had been transferred to an external storage device, such as a thumb drive, before WikiLeaks posted them ."

"FAT is a simple file system named for its method of organization, the File Allocation Table. It is used for storage only and is not related to internet transfers like hacking. Were WikiLeaks to have received the DNC files via a hack, the last modified times on the files would be a random mixture of odd-and even-ending numbe rs."

"Why is that important? The evidence lies in the "last modified" time stamps on the Wikileaks files. When a file is stored under the FAT file system the software rounds the time to the nearest even-numbered second. Every single one of the time stamps in the DNC files on WikiLeaks' site ends in an even number. "

"We have examined 500 DNC email files stored on the Wikileaks site. All 500 files end in an even number -- 2, 4, 6, 8 or 0 . If those files had been hacked over the Internet, there would be an equal probability of the time stamp ending in an odd number . The random probability that FAT was not used is 1 chance in 2 to the 500th power . Thus, these data show that the DNC emails posted by WikiLeaks went through a storage device, like a thumb drive, and were physically moved before Wikileaks posted the emails on the World Wide Web ."

"This finding alone is enough to raise reasonable doubts, for example, about Mueller's indictment of 12 Russian intelligence officers for hacking the DNC emails given to WikiLeaks. A defense attorney could easily use the forensics to argue that someone copied the DNC files to a storage device like a USB thumb drive and got them physically to WikiLeaks -- not electronically via a hack."

Role of NSA

"For more than two years, we strongly suspected that the DNC emails were copied/leaked in that way, not hacked."

[ ]

For the steering group, Veteran Intelligence Professionals for Sanity:

William Binney, former NSA Technical Director for World Geopolitical & Military Analysis; Co-founder of NSA's Signals Intelligence Automation Research Center (ret.)

Richard H. Black, Senator of Virginia, 13th District; Colonel US Army (ret.); Former Chief, Criminal Law Division, Office of the Judge Advocate General, the Pentagon (associate VIPS)

Bogdan Dzakovic, former Team Leader of Federal Air Marshals and Red Team, FAA Security (ret.) (associate VIPS)

Philip Giraldi, CIA, Operations Officer (ret.)

Mike Gravel, former Adjutant, top secret control officer, Communications Intelligence Service; special agent of the Counter Intelligence Corps and former United States Senator

James George Jatras, former U.S. diplomat and former foreign policy adviser to Senate leadership (Associate VIPS)

Larry C. Johnson, former CIA and State Department Counter Terrorism officer

John Kiriakou, former CIA Counterterrorism Officer and former senior investigator, Senate Foreign Relations Committee

Karen Kwiatkowski, former Lt. Col., US Air Force (ret.), at Office of Secretary of Defense watching the manufacture of lies on Iraq, 2001-2003

Edward Loomis, Cryptologic Computer Scientist, former Technical Director at NSA (ret.)

David MacMichael, Ph.D., former senior estimates officer, National Intelligence Council (ret.)

Ray McGovern, former US Army infantry/intelligence officer & CIA analyst; CIA Presidential briefer (ret.)

Elizabeth Murray, former Deputy National Intelligence Officer for the Near East, National Intelligence Council & CIA political analyst (ret.)

Todd E. Pierce, MAJ, US Army Judge Advocate (ret.)

Peter Van Buren, US Department of State, Foreign Service Officer (ret.) (associate VIPS)

Sarah G. Wilton, CDR, USNR, (ret.); Defense Intelligence Agency (ret.)

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA

Ann Wright, retired U.S. Army reserve colonel and former U.S. diplomat who resigned in 2003 in opposition to the Iraq War

Veteran Intelligence Professionals for Sanity (VIPS) is made up of former intelligence officers, diplomats, military officers and congressional staffers. The organization, founded in 2002, was among the first critics of Washington's justifications for launching a war against Iraq. VIPS advocates a US foreign and national security policy based on genuine national interests rather than contrived threats promoted for largely political reasons. An archive of VIPS memoranda is available at Consortiumnews.com.

VIPS: Mueller's Forensics-Free Findings

https://consortiumnews.com/2019/03/13/vips-muellers-forensics-free-findings/

[Apr 23, 2019] Crowdstrike and the reprise of the Iraq-WMD Fiasco

Notable quotes:
"... In May, the company, Crowdstrike, determined that the hack was the work of the Russians. As one unnamed intelligence official told BuzzFeed, "CrowdStrike is pretty good. There's no reason to believe that anything that they have concluded is not accurate ..."
"... Perhaps not. Yet Crowdstrike is hardly a disinterested party when it comes to Russia. Crowdstrike's founder and chief technology officer, Dmitri Alperovitch , is also a senior fellow at the Washington think tank, The Atlantic Council, which has been at the forefront of escalating tensions with Russia. ..."
"... As I reported in The Nation in early January , the connection between Alperovitch and the Atlantic Council is highly relevant given that the Atlantic Council is funded in part by the State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk. In recent years, it has emerged as a leading voice calling for a new Cold War with Russia. ..."
"... But meanwhile the steady drumbeat of "blame Russia" is having an effect. According to a recent you.gov/Economist poll, 58 percent of Americans view Russia as "unfriendly/enemy" while also finding that 52 percent of Democrats believed Russia "tampered with vote tallies." ..."
Feb 03, 2017 | consortiumnews.com

Originally from: A Reprise of the Iraq-WMD Fiasco -- Consortiumnews

... ... ...

A Dangerous Replay?

Today something eerily similar to the pre-war debate over Iraq is taking place regarding the allegations of Russian interference in the U.S. presidential election. Assurances from the intelligence community and from anonymous Obama administration "senior officials" about the existence of evidence is being treated as, well, actual evidence.

State Department spokesman John Kirby told CNN that he is "100% certain" of the role that Russia played in U.S. election. The administration's expressions of certainty are then uncritically echoed by the mainstream media. Skeptics are likewise written off, slandered as " Kremlin cheerleaders " or worse.

Unsurprisingly, The Washington Post is reviving its Bush-era role as principal publicist for the government's case. Yet in its haste to do the government's bidding, the Post has published two widely debunked stories relating to Russia (one on the scourge of Russian inspired "fake news", the other on a non-existent Russian hack of a Vermont electric utility) onto which the paper has had to append "editor's notes" to correct the original stories.

Yet, those misguided stories have not deterred the Post's opinion page from being equally aggressive in its depiction of Russian malfeasance. In late December, the Post published an op-ed by Rep. Adam Schiff and former Rep. Jane Harmon claiming "Russia's theft and strategic leaking of emails and documents from the Democratic Party and other officials present a challenge to the U.S. political system unlike anything we've experienced."

On Dec. 30, the Post editorial board chastised President-elect Trump for seeming to dismiss "a brazen and unprecedented attempt by a hostile power to covertly sway the outcome of a U.S. presidential election." The Post described Russia's actions as a "cyber-Pearl Harbor."

On Jan. 1, the neoconservative columnist Josh Rogin told readers that the recent announcement of sanctions against Russia "brought home a shocking realization that Russia is using hybrid warfare in an aggressive attempt to disrupt and undermine our democracy."

Meanwhile, many of the same voices who were among the loudest cheerleaders for the war in Iraq have also been reprising their Bush-era roles in vouching for the solidity of the government's case.

Jonathan Chait, now a columnist for New York magazine, is clearly convinced by what the government has thus far provided. "That Russia wanted Trump to win has been obvious for months," writes Chait.

"Of course it all came from the Russians, I'm sure it's all there in the intel," Charles Krauthammer told Fox News on Jan. 2. Krauthammer is certain.

And Andrew Sullivan is certain as to the motive. "Trump and Putin's bromance," Sullivan told MSNBC's Chris Matthews on Jan. 2, "has one goal this year: to destroy the European Union and to undermine democracy in Western Europe."

David Frum, writing in The Atlantic , believes Trump "owes his office in considerable part to illegal clandestine activities in his favor conducted by a hostile, foreign spy service."

Jacob Weisberg agrees, tweeting: "Russian covert action threw the election to Donald Trump. It's that simple." Back in 2008, Weisberg wrote that "the first thing I hope I've learned from this experience of being wrong about Iraq is to be less trusting of expert opinion and received wisdom." So much for that.

Foreign Special Interests

Another, equally remarkable similarity to the period of 2002-3 is the role foreign lobbyists have played in helping to whip up a war fever. As readers will no doubt recall, Ahmed Chalabi, leader of the Iraqi National Congress, which served, in effect as an Iraqi government-in-exile, worked hand in hand with the Washington lobbying firm Black, Kelly, Scruggs & Healey (BKSH) to sell Bush's war on television and on the op-ed pages of major American newspapers.

Chalabi was also a trusted source of Judy Miller of the Times, which, in an apology to its readers on May 26, 2004, wrote : "The most prominent of the anti-Saddam campaigners, Ahmad Chalabi, has been named as an occasional source in Times articles since at least 1991, and has introduced reporters to other exiles. He became a favorite of hard-liners within the Bush administration and a paid broker of information from Iraqi exiles." The pro-war lobbying of the American Israel Public Affairs Committee has also been exhaustively documented .

Though we do not know how widespread the practice has been as of yet, something similar is taking place today. Articles calling for confrontation with Russia over its alleged "hybrid war" with the West are appearing with increasing regularity . Perhaps the most egregious example of this newly popular genre appeared on Jan. 1 in Politico magazine. That essay, which claims, among many other things, that "we're in a war" with Russia comes courtesy of one Molly McKew.

McKew is seemingly qualified to make such a pronouncement because she, according to her bio on the Politico website, served as an "adviser to Georgian President Saakashvili's government from 2009-2013, and to former Moldovan Prime Minister Filat in 2014-2015." Seems reasonable enough. That is until one discovers that McKew is actually registered with the Department of Justice as a lobbyist for two anti-Russian political parties, Georgia's UMN and Moldova's PLDM.

Records show her work for the consulting firm Fianna Strategies frequently takes her to Capitol Hill to lobby U.S. Senate and Congressional staffers, as well as prominent U.S. journalists at The Washington Post and The New York Times, on behalf of her Georgian and Moldovan clients.

"The truth," writes McKew, "is that fighting a new Cold War would be in America's interest. Russia teaches us a very important lesson: losing an ideological war without a fight will ruin you as a nation. The fight is the American way." Or, put another way: the truth is that fighting a new Cold War would be in McKew's interest -- but perhaps not America's.

While you wouldn't know it from the media coverage (or from reading deeply disingenuous pieces like McKew's) as things now stand, the case against Russia is far from certain. New developments are emerging almost daily. One of the latest is a report from the cyber-engineering company Wordfence, which concluded that "The IP addresses that DHS [Department of Homeland Security] provided may have been used for an attack by a state actor like Russia. But they don't appear to provide any association with Russia."

Indeed, according to Wordfence, "The malware sample is old, widely used and appears to be Ukrainian. It has no apparent relationship with Russian intelligence and it would be an indicator of compromise for any website."

On Jan. 4, BuzzFeed reported that, according to the DNC, the FBI never carried out a forensic examination on the email servers that were allegedly hacked by the Russian government. "The FBI," said DNC spokesman Eric Walker, "never requested access to the DNC's computer servers."

What the agency did do was rely on the findings of a private-sector, third-party vendor that was brought in by the DNC after the initial hack was discovered. In May, the company, Crowdstrike, determined that the hack was the work of the Russians. As one unnamed intelligence official told BuzzFeed, "CrowdStrike is pretty good. There's no reason to believe that anything that they have concluded is not accurate . "

Perhaps not. Yet Crowdstrike is hardly a disinterested party when it comes to Russia. Crowdstrike's founder and chief technology officer, Dmitri Alperovitch , is also a senior fellow at the Washington think tank, The Atlantic Council, which has been at the forefront of escalating tensions with Russia.

As I reported in The Nation in early January , the connection between Alperovitch and the Atlantic Council is highly relevant given that the Atlantic Council is funded in part by the State Department, NATO, the governments of Latvia and Lithuania, the Ukrainian World Congress, and the Ukrainian oligarch Victor Pinchuk. In recent years, it has emerged as a leading voice calling for a new Cold War with Russia.

Time to Rethink the 'Group Think'

And given the rather thin nature of the declassified evidence provided by the Obama administration, might it be time to consider an alternative theory of the case? William Binney, a 36-year veteran of the National Security Agency and the man responsible for creating many of its collection systems, thinks so. Binney believes that the DNC emails were leaked, not hacked, writing that "it is puzzling why NSA cannot produce hard evidence implicating the Russian government and WikiLeaks. Unless we are dealing with a leak from an insider, not a hack."

None of this is to say, of course, that Russia did not and could not have attempted to influence the U.S. presidential election. The intelligence community may have intercepted damning evidence of the Russian government's culpability. The government's hesitation to provide the public with more convincing evidence may stem from an understandable and wholly appropriate desire to protect the intelligence community's sources and methods. But as it now stands the publicly available evidence is open to question.

But meanwhile the steady drumbeat of "blame Russia" is having an effect. According to a recent you.gov/Economist poll, 58 percent of Americans view Russia as "unfriendly/enemy" while also finding that 52 percent of Democrats believed Russia "tampered with vote tallies."

With Congress back in session, Armed Services Committee chairman John McCain is set to hold a series of hearings focusing on Russian malfeasance, and the steady drip-drip-drip of allegations regarding Trump and Putin is only serving to box in the new President when it comes to pursuing a much-needed detente with Russia.

It also does not appear that a congressional inquiry will start from scratch and critically examine the evidence. On Friday, two senators -- Republican Lindsey Graham and Democrat Sheldon Whitehouse -- announced a Senate Judiciary subcommittee investigation into Russian interference in elections in the U.S. and elsewhere. But they already seemed to have made up their minds about the conclusion: "Our goal is simple," the senators said in a joint statement "To the fullest extent possible we want to shine a light on Russian activities to undermine democracy."

So, before the next round of Cold War posturing commences, now might be the time to stop, take a deep breath and ask: Could the rush into a new Cold War with Russia be as disastrous and consequential -- if not more so -- as was the rush to war with Iraq nearly 15 years ago? We may, unfortunately, find out.

James W Carden is a contributing writer for The Nation and editor of The American Committee for East-West Accord's eastwestaccord.com. He previously served as an advisor on Russia to the Special Representative for Global Inter-governmental Affairs at the US State Department.


Don G. , February 5, 2017 at 14:29

Questioning whether the Russians hacked or didn’t hack is playing into the US narrative to demonize Russia. (Putin)
It simple doesn’t matter as all nations hack as much as possible to enhance and protect their national interests. Surely Russia has hacked against the US no more than a tenth of what the US had done against Russia.

The narrative is nothing but a propaganda lie but it’s been accepted by the American people and mostly because of the fight that goes on due to domestic politics, one major party against the other.

There’s a very good reason to stop promoting the narrative because it only helps to bring Americans onside with more efforts to demonize Putin and to keep all sides in the US promoting their aggression worldwide. Americans are likely easily 90% prowar now and will show little or no resistance to the coming war on Iran. <img alt='' src='https://secure.gravatar.com/avatar/f05d2bb98b641e9e9ab8f3dc738e31a0?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/f05d2bb98b641e9e9ab8f3dc738e31a0?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

yugo , February 4, 2017 at 13:54

Hysteria has reached fever pitch. Russia’s fake news is apparently so beguiling that it even threatens western democratic discourse. Combine this with its cyber weaponry and Moscow, so we are told, may interfere in this year’s German elections to benefit the hard-right. Such incessant fear mongering has already prompted calls for the censorship of Russian propaganda. It won’t be long before a witch-hunt emerges, directed against ‘fellow travellers’, those who dare to doubt the Russian threat.

They insist the west made matters worse in Ukraine by not acknowledging that it was a classic example of a young state that didn’t naturally command the allegiance of all its peoples. Other examples are Georgia’s Abkhazians and South Ossetians, Moldova’s Trans-Dniester Slavs and Azerbaijan’s Nagorno-Karabakh Armenians.

They also doubt the Russian threat to the Baltic states. What is amazing is Moscow’s temperate response to Estonia and Latvia’s gross violation of international norms in denying citizenship to those of its Russian minority who are not conversant in Estonian and Latvian respectively. Nato and the EU turned a blind eye when membership was granted to these two states.

Fellow travellers furthermore claim the west will keep on floundering in the Middle East as long as it persists in treating Saudi Arabia as a valued ally, while viewing Iran as a permanent enemy. We have for far too long ignored Saudi Arabia’s promotion of Wahhabism and its playing of the destructive sectarian card against ‘apostate’ Shiites. Take the merciless attacks on Shiite worshippers by Sunni jihadis of a Wahhabist persuasion. It occurs with sickening regularity throughout the Middle East. The terrorists attacking westerners are invariably Sunni jihadis, not Shiites. Worse still, Saudi Arabia together with Nato member Turkey facilitated the emergence of Isis. We bizarrely gave priority to toppling Syria’s secular regime.

The first loyalty of these fellow travellers is to their nation state rather than unfettered globalism. No wonder the western elite disparage their national patriotism, calling it populism. It was, after all, the Achilles Heel of Homo Sovieticus. The elite fear the same fate awaits Homo Europaeus and globalist Homo Economicus.

Michael K Rohde , February 3, 2017 at 15:12

This is beginning to look exactly like Iraq 2 and why the same players that led us into that fake war which is still not paid for because the initiators made sure and get themselves a tax cut before they launched it are still being listened to makes it clear. Even with a change in administrations and party our government continues in the same wrong headed direction, to war with the enemies of Israel. When will it stop? When will we take back control of our foreign policy and destiny. <img alt='' src='https://secure.gravatar.com/avatar/cc900a84653501242923790946494dbc?s=60&#038;d=identicon&#038;r=pg' srcset='https://secure.gravatar.com/avatar/cc900a84653501242923790946494dbc?s=120&#038;d=identicon&#038;r=pg 2x' class='avatar avatar-60 photo' height='60' width='60' />

Michael Hoefler , February 3, 2017 at 23:29

As Ray McGovern said several times (not quoting): that Israel is the elephant in the room. Netayahu will not rest until he has all of the Arab states fighting among themselves. IMO he thinks that that will guarantee Israel protection.
IMO – all that does is put Israel into a continuing worse situation. There will always be someone stronger to come along to overcome them – someday – sometime. If they made peace with those nations and worked with them, traded with them – they would be much safer in the long run.

Banger , February 3, 2017 at 14:22

The mainstream media in th USA and, increasingly in the rest of the West are vehicles for propaganda from various factions within the Imperial Deep State. All these outlets are good for is to map the power relations between these factions at least this the case in the major issues of the day.

This misbehavior going on right now. One factions close to Trump wants to go to war with Iran because, of course there has to be war or the Deep State as a whole stuffers and the people will begin to look at their shakles. The other faction wishes to go to a brinksmanship sort of Cold War situation. The Trumpists believe that making friends with Russia and then destroying Iranian power is the best approach to controlling the MENA region by creating a loose alliance of KSA, Israel, Turkey and Russia in which a weak Iran would be forced to enter the Empire and Russia in return would be given more control of Ukraine and Eastern Europe. I suspect Trump may also want to undercut NATO and the EU. That is my guess. To put it another way, Russia is strong and well led and Iran is not.

stan , February 3, 2017 at 14:17

You can read chapter 6 of Mein Kampf if you want to see how this war propaganda stuff works. It is not group think or mistaken ideas. It is deliberate lies to scare you and a carefully crafted false narrative to make it all seem reasonable. People cannot believe that their leaders would tell such a big lie, and that’s why it works. The goal is murder and conquest to get territory, natural resources, and control of business and commerce. Controlling markets for drugs, gambling, and prostitution is for nickel and dime crooks. Controlling markets for natural resources, banking, and consumer and industrial goods is where the real money is. Think of governments as criminal business syndicates and you aren’t far off. Remember, President Obama had a hit list, flew around plane loads of secret cash to make illegal payoffs, and bragged about offing his opponent in the head and dumping his body in the river.

Jeremy , February 4, 2017 at 11:33

Yes, Stan,well put! you will never see this sort of talk in the articles here, as the consipiracy theorist label is always one to avoid, but I agree that when we think in terms of a group of people trying to attain “security” the same way any other gangster does, it becomes much less far fetched. George Carlin said, “It’s a big club, and you ain’t in it!” Men and women of power and wealth will always do what they have to in order to preserve that power and wealth for their children. There is really no conspiracy needed, just a bunch of people at the top looking after themselves and their families.

Tania Messina , February 3, 2017 at 14:13

Ah, yes, we’ve always needed a boogeyman to keep us all crazed with fear and the neocons busy with their destruction of society. If there is a crazy out there today, it is those neocons and their puppets who were so intent on destroying “seven countries in five years” and not being able to achieve that diabolical end as so neatly planned. And, now, they’re throwing temper tantrums, because, surprise of surprises! a non career politician comes along who uses common sense for a change and dares to say, “Why can’t we be friends with Russia?” With that comment many exhausted Americans perked up and listened while the Dulles boys turned somersaults in their graves!

The arrogance and superiority of those who constantly blame Russia for their alleged expansionist ambitions seem blinded to our own aggressions. Fifteen years in Iraq? We finally have a president who talks of peace and we demonize him as the warmonger ready to press the button, while I seem to remember that it was the other candidate who arrogantly referred to Putin as Hitler!

It is articles like this one by James Carden that we should be teaching in our schools, researching the facts and discussing in our classrooms so that hopefully a new generation might grow up with intelligent exchange rather than the brainwash that has been strangling our society for too many years.

Mark Thomason , February 3, 2017 at 13:04

This controversy is driven by Democratic denial of defeat, and infighting in which those defeated seek to hang on to power inside the Democratic Party. It is the Hillary crowd. It can be evidence free because it is driven by political calculation of private power needs, not truth.

And the WMD fiasco is a perfect comparison, because the same people drove the same sort of fact-free theme for private reasons, as Wolfowitz put it, the story around which varying separate interests could be rallied.

[Apr 20, 2019] The Guccifer 2.0 Gaps in Mueller s Full Report undermine the validity of findings

Apr 10, 2019 | consortiumnews.com

Originally from: The 'Guccifer 2.0' Gaps in Mueller's Full Report April 18, 2019 • 12 Commentsave

Like Team Mueller's indictment last July of Russian agents, the full report reveals questions about Wikileaks' role that much of the media has been ignoring, writes Daniel Lazare.

By Daniel Lazare
Special to Consortium News

<img src="https://consortiumnews.com/wp-content/uploads/2018/04/Daniel-Lazare-150x150.jpg" alt="" width="100" height="100" /> A s official Washington pores over the Gospel According to Saint Robert, an all-important fact about the Mueller report has gotten lost in the shuffle. Just as the Christian gospels were filled with holes , the latest version is too – particularly with regard to WikiLeaks and Julian Assange.

The five pages that the special prosecutor's report devotes to WikiLeaks are essentially lifted from Mueller's indictment last July of 12 members of the Russian military intelligence agency known as the GRU. It charges that after hacking the Democratic National Committee, the GRU used a specially-created online persona known as Guccifer 2.0 to transfer a gigabyte's worth of stolen emails to WikiLeaks just as the 2016 Democratic National Convention was approaching. Four days after opening the encrypted file, the indictment says, "Organization 1 [i.e. WikiLeaks] released over 20,000 emails and other documents stolen from the DNC network by the Conspirators [i.e. the GRU]."

<img aria-describedby="caption-attachment-35305" src="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM.png" alt="Barr holding press conference on full Mueller report, April 18, 2019. (YouTube)" width="1248" height="612" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM.png 848w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-400x196.png 400w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-768x377.png 768w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-700x343.png 700w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-5.00.53-PM-160x78.png 160w" sizes="(max-width: 1248px) 100vw, 1248px" />

Attorney General William Barr holding press conference on full Mueller report, April 18, 2019. (YouTube)

Mueller's report says the same thing, but with the added twist that Assange then tried to cover up the GRU's role by suggesting that murdered Democratic National Committee staffer Seth Rich may have been the source and by telling a congressman that the DNC email heist was an "inside job" and that he had "physical proof" that the material was not from Russian.

All of which is manna from heaven for corporate news outlets eager to pile on Assange, now behind bars in London. An April 11, 2019, New York Times news analysis , for instance, declared that "[c]ourt documents have revealed that it was Russian intelligence – using the Guccifer persona – that provided Mr. Assange thousands of emails hacked from the Democratic National Committee," while another Times article published shortly after his arrest accuses the WikiLeaks founder of "promoting a false cover story about the source of the leaks."

But there's a problem: it ain't necessarily so. The official story that the GRU is the source doesn't hold water, as a timeline from mid-2016 shows. Here are the key events based on the GRU indictment and the Mueller report:

June 12: Assange tells Britain's ITV that another round of Democratic Party disclosures is on the way: "We have upcoming leaks in relation to Hillary Clinton, which is great. WikiLeaks is having a very big year." June 14: The Democratic National Committee accuses Russia of hacking its computers. June 15: Guccifer 2.0 claims credit for the hack. "The main part of the papers, thousands of files and mails, I gave to WikiLeaks ," he brags . "They will publish them soon." June 22: WikiLeaks tells Guccifer via email: "Send any new material here for us to review and it will have a much higher impact than what you are doing." July 6: WikiLeaks sends Guccifer another email: "if you have anything hillary related we want it in the next tweo [ sic ] days prefable [ sic ] because the DNC [Democratic National Convention] is approaching and she will solidify bernie supporters behind her after."Replies Guccifer: "ok . . . i " July 14: Guccifer sends WikiLeaks an encrypted file titled "wk dnc link1.txt.gpg." July 18: WikiLeaks confirms it has opened "the 1Gb or so archive" and will release documents "this week." July 22: WikiLeaks releases more than 20,000 DNC emails and 8,000 other attachments.

According to Mueller and obsequious news outlets like the Times , the sequence is clear: Guccifer sends archive, WikiLeaks receives archive, WikiLeaks accesses archive, WikiLeaks publishes archive. Donald Trump may not have colluded with Russia, but Julian Assange plainly did. [Attorney General Will Barr, significantly calling WikiLeaks a publisher, said at his Thursday press conference: " Under applicable law, publication of these types of materials would not be criminal unless the publisher also participated in the underlying hacking conspiracy."]

<img aria-describedby="caption-attachment-35300" src="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM.png" alt="Deputy Attorney General Rod Rosenstein announcing in 2018 a grand jury indictment of 12 Russian intelligence officers for hacking offenses related to the 2016 U.S. presidential election. (Wikimedia Commons) " width="1236" height="611" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM.png 973w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-400x198.png 400w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-768x380.png 768w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-700x346.png 700w, https://consortiumnews.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-18-at-4.24.13-PM-160x79.png 160w" sizes="(max-width: 1236px) 100vw, 1236px" />

Deputy Attorney General Rod Rosenstein announcing in 2018 the grand jury indictment of 12 GRU agents. (Wikimedia Commons)

Avoiding Questions

The narrative raises questions that the press studiously avoids. Why, for instance, would Assange announce on June 12 that a big disclosure is on the way before hearing from the supposed source? Was there a prior communication that Mueller has not disclosed? What about the reference to "new material" on June 22 – does that mean Assange already had other material in hand? After opening the Guccifer file on July 18, why would he publish it just four days later? Would that give WikiLeaks enough time to review some 28,000 documents to insure they're genuine?

Honor Bob Parry's legacy by donating to our Spring Fund Drive.

"If a single one of those emails had been shown to be maliciously altered," blogger Mark F. McCarty observes , "Wikileaks' reputation would have been in tatters." There's also the question that an investigator known as Adam Carter poses in Disobedient Media : why would Guccifer brag about giving WikiLeaks "thousands of files" that he wouldn't send for another month?

The narrative doesn't make sense – a fact that is crucially important now that Assange is fighting for his freedom in the U.K. New Yorker staff writer Raffi Khatchadourian sounded a rare note of caution last summer when he warned that little about Guccifer 2.0 adds up. While claiming to be the source for some of WikiLeaks ' most explosive emails, the material he released on his own had proved mostly worthless – 20 documents that he "said were from the DNC but which were almost surely not," as Khatchadourian puts it, a purported Hillary Clinton dossier that "was nothing of the sort," screenshots of emails so blurry as to be "unreadable," and so forth.

<img aria-describedby="caption-attachment-35303" src="https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image.jpg" alt="John Podesta at the spin room of the second presidential debate of 2016. (Voice of America via Wikimedia Commons)" width="500" height="341" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image.jpg 650w, https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image-400x273.jpg 400w, https://consortiumnews.com/wp-content/uploads/2019/04/John_Podesta_at_2nd_debate_full_image-160x109.jpg 160w" sizes="(max-width: 500px) 100vw, 500px" />

John Podesta: Target of a phishing expedition. (Voice of America via Wikimedia Commons)

While insisting that "our source is not the Russian government and it is not a state party, Assange told Khatchadourian that the source was not Guccifer either. "We received quite a lot of submissions of material that was already published in the rest of the press, and people seemingly submitted the Guccifer archives," he said somewhat cryptically. "We didn't publish them. They were already published." When Khatchadourian asked why he didn't put the material out regardless, he replied that "the material from Guccifer 2.0 – or on WordPress – we didn't have the resources to independently verify."

No Time for Vetting

So four days was indeed too short a time to subject the Guccifer file to proper vetting. Of course, Mueller no doubt regards this as more "dissembling," as his report describes it. Yet WikiLeaks has never been caught in a lie for the simple reason that honesty and credibility are all-important for a group that promises to protect anonymous leakers who supply it with official secrets. (See "Inside WikiLeaks : Working with the Publisher that Changed the World," Consortium News , July 19, 2018.) Mueller, by contrast, has a rich history of mendacity going back to his days as FBI director when he sought to cover up the Saudi role in 9/11 and assured Congress on the eve of the 2003 invasion that Iraqi weapons of mass destruction pose "a clear threat to our national security."

<img aria-describedby="caption-attachment-35301" src="https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage.jpg" alt="Mueller with President George W. Bush on July 5, 2001, as he is being appointed FBI director. (White House)" width="501" height="373" srcset="https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage.jpg 600w, https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage-400x298.jpg 400w, https://consortiumnews.com/wp-content/uploads/2019/04/MuellerBushImage-160x119.jpg 160w" sizes="(max-width: 501px) 100vw, 501px" />

Mueller with President George W. Bush on July 5, 2001, as he is being appointed FBI director. (White House)

So if the Mueller narrative doesn't hold up, the charge of dissembling doesn't either. Indeed , as ex-federal prosecutor Andrew C. McCarthy observes in The National Review , the fact that the feds have charged Assange with unauthorized access to a government computer rather than conspiring with the Kremlin could be a sign that Team Mueller is less than confident it can prove collusion beyond a reasonable doubt. As he puts it, the GRU indictment "was more like a press release than a charging instrument" because the special prosecutor knew that the chances were zero that Russian intelligence agents would surrender to a U.S. court.

Indeed, when Mueller charged 13 employees and three companies owned by Russian businessman Yevgeny Prigozhin with interfering in the 2016 election, he clearly didn't expect them to surrender either. Thus , his team seemed taken aback when one of the alleged " troll farms " showed up in Washington asking to be heard. The prosecution's initial response, as McCarthy put it , was to seek a delay "on the astonishing ground that the defendant has not been properly served – notwithstanding that the defendant has shown up in court and asked to be arraigned." When that didn't work, prosecutors tried to limit Concord's access to some 3.2 million pieces of evidence on the grounds that the documents are too " sensitive " for Russian eyes to see. If they are again unsuccessful, they may have no choice but to drop the charges entirely, resulting in yet another " public relations disaster " for the Russia-gate investigation.

None of which bodes well for Mueller or the news organizations that worship at his shrine. After blowing the Russia-gate story all these years, why does the Times continue to slander the one news organization that tells the truth?

Daniel Lazare is the author of "The Frozen Republic: How the Constitution Is Paralyzing Democracy" (Harcourt Brace, 1996) and other books about American politics. He has written for a wide variety of publications from The Nation to Le Monde Diplomatique and blogs about the Constitution and related matters at D aniellazare.com .

[Apr 07, 2019] The story of Debbie Wasserman Schultz and an indicted IT staffer that's lighting up the right, explained by Amber Phillips

Notable quotes:
"... Six months later, the FBI arrests him as he's boarding a flight to Pakistan and charges him with bank fraud. ..."
"... The congresswoman says conservatives are making a big deal of this to distract from the much more real Russia investigation. "Undoubtedly, the easier path would have been to terminate Mr. Awan, despite the fact that I had not received any evidence of his alleged wrongdoing," she said in a statement issued last week, "but that is not the woman my constituents elected, and that is not the mother my children know me to be." ..."
"... February: Capitol Police accuse five IT staffers of trying to steal House equipment and violating House security policies, report BuzzFeed and Politico . They are shared employees who work for 30 or so members of Congress. Capitol Police ban the five from access to the House of Representatives network while it investigates. Investigators tell lawmakers that it's up to them to decide whether to fire the accused staffers. ..."
"... Awan is one of those staffers accused. Most of the others are related to him, including his wife, Hina Alvi. ..."
"... Wasserman Schultz remains quiet, other than to say Awan had been moved to an advisory role since he was no longer able to directly interact with the House network. She remains dubious about the accusations against Awan and does not see cause to fire him. She becomes increasingly concerned he was being singled out because of his religion. ..."
"... "When their investigation was reviewed with me, I was presented with no evidence of anything that they were being investigated for. And so that, in me, gave me great concern that his due process rights were being violated. That there were racial and ethnic profiling concerns that I had," she said. ..."
"... She later told the Sun-Sentinel she was asking about Awan's laptop: "He accidentally left it somewhere." ..."
"... Week of July 24: Awan's legal troubles deepen. The FBI arrests him at a D.C.-area airport on his way to Pakistan. Fox News's Chad Pergram first reports it, and conservative Daily Caller fleshes out the story . ..."
"... Awan was arrested while attempting to board a flight after wiring $283,00 to the country. His wife and their three children are already in Pakistan. An affidavit obtained by the Daily Caller alleges they tried to trick their bank, the Congressional Federal Credit Union, into giving them a second mortgage for a rental property by claiming it was their primary residency. ..."
"... Aug. 3 : Wasserman Schultz gives her first interview to the media. She tells the Fort Lauderdale Sun-Sentinel that she had initially only commented on the arrest via a spokesman since she had been on vacation. And she stands by her decision not to fire Awan after he was accused of stealing House equipment: "I believe that I did the right thing, and I would do it again," she says. ..."
"... Aug. 7: Wasserman Schultz's Democratic primary challenger, Tim Canova , accuses her of making "a lot of self-serving excuses for Awan." ..."
Aug 08, 2017 | www.washingtonpost.com

Here's one version of a story making headlines in conservative media over the past couple of weeks: A powerful Democratic congresswoman refuses to fire an information technology aide after he's accused of stealing House computer equipment and potentially breaching security protocols. Six months later, the FBI arrests him as he's boarding a flight to Pakistan and charges him with bank fraud.

Here's another version of the same topic, coming from Democratic lawmakers: Powerful Democratic congresswoman protects Muslim IT staffer from what she suspects is religious discrimination. She fires him after he is charged with a seemingly unrelated crime.

The case involving now-fired House Democratic information technology staffer Imran Awan and Rep. Debbie Wasserman Schultz (D-Fla.) underscores how easy it is to manipulate facts to suit one's political leaning.

The story has blown up on the right, with conservative website Daily Caller writing more than two dozen stories about it and Fox News hosts linking it, without any evidence, to the Russian WikiLeaks hack of DNC emails, which happened under Wasserman Schultz's tenure as chairwoman.

President Trump poured gasoline on the story when he retweeted a conservative site describing the "scandal engulfing" Wasserman Schultz and accusing the media of ignoring it.

Mainstream media outlets have covered the story, but not extensively. The Washington Post has published two articles: One reporting Awan's arrest and the other about a watchdog group seeking an investigation .

Left-leaning sites have either stayed away from it or defended Wasserman Schultz's account of it.

The congresswoman says conservatives are making a big deal of this to distract from the much more real Russia investigation. "Undoubtedly, the easier path would have been to terminate Mr. Awan, despite the fact that I had not received any evidence of his alleged wrongdoing," she said in a statement issued last week, "but that is not the woman my constituents elected, and that is not the mother my children know me to be."

Clearly, there are a lot of political accusations tied up in this nuanced story. Here's what we know about the timeline of accusations against Arwan, his arrest and his dismissal by Wasserman Schultz.

February: Capitol Police accuse five IT staffers of trying to steal House equipment and violating House security policies, report BuzzFeed and Politico . They are shared employees who work for 30 or so members of Congress. Capitol Police ban the five from access to the House of Representatives network while it investigates. Investigators tell lawmakers that it's up to them to decide whether to fire the accused staffers.

Awan is one of those staffers accused. Most of the others are related to him, including his wife, Hina Alvi.

February–March: Politico follows up on the fate of the staffers and finds some Democratic lawmakers have kept them on the payroll, Wasserman Schultz included. While Capitol Police claim there may have been potentially serious IT violations, these lawmakers see it differently.

The IT staffers have worked for many of the offices for more than a decade, and some Democratic lawmakers said they were concerned these staffers may have been targeted by Capitol investigators because they are Muslim and from Pakistan.

"As of right now, I don't see a smoking gun," Rep. Gregory W. Meeks (N.Y.) tells Politico , even as he confirms he has dismissed Alvi. "I wanted to be sure individuals are not being singled out because of their nationalities or their religion. We want to make sure everybody is entitled to due process."

Wasserman Schultz remains quiet, other than to say Awan had been moved to an advisory role since he was no longer able to directly interact with the House network. She remains dubious about the accusations against Awan and does not see cause to fire him. She becomes increasingly concerned he was being singled out because of his religion.

In an interview on Aug. 3 with the Fort Lauderdale Sun-Sentinel, she said she felt Awan had been nabbed on a technicality: He had been accused of using innocuous programs like Dropbox to transfer information, which doesn't clear House security protocols.

"When their investigation was reviewed with me, I was presented with no evidence of anything that they were being investigated for. And so that, in me, gave me great concern that his due process rights were being violated. That there were racial and ethnic profiling concerns that I had," she said.

A spokeswoman for Capitol Police declined to comment on the accusations, saying they do not comment on ongoing investigations. The police force is overseen by the congressionally appointed sergeant at arms, Congress itself and an inspector general.

May: In a budget hearing for Capitol Police, Wasserman Schultz starts asking Capitol Police Chief Matthew R. Verderosa why they confiscated a laptop related to the case and how she can get it back. "If the equipment belongs to the member, it has been lost, they say it's been lost and it's been identified as that member's, then the Capitol Police are supposed to return it." When the police chief says she can't have it back because there's an ongoing investigation related to it, she appears genuinely frustrated and says: "I think you're violating the rules when you conduct your business that way and you should expect that there will be consequences."

She later told the Sun-Sentinel she was asking about Awan's laptop: "He accidentally left it somewhere."

Week of July 24: Awan's legal troubles deepen. The FBI arrests him at a D.C.-area airport on his way to Pakistan. Fox News's Chad Pergram first reports it, and conservative Daily Caller fleshes out the story .

Awan was arrested while attempting to board a flight after wiring $283,00 to the country. His wife and their three children are already in Pakistan. An affidavit obtained by the Daily Caller alleges they tried to trick their bank, the Congressional Federal Credit Union, into giving them a second mortgage for a rental property by claiming it was their primary residency.

The FBI accuses Awan of trying to flee the country, but his lawyer later tells The Washington Post he had no intention of fleeing; he had bought a round-trip ticket and applied for unpaid leave from work. Awan pleads not guilty.

Same week: Immediately following the charges, Wasserman Schultz's office says Awan is fired.

Same week : The chairwoman of the Republican National Committee starts going on TV to question why Wasserman Schultz hadn't fired Awan earlier, when he was accused of stealing House equipment.

"Debbie Wasserman Schultz has obstructed at every level on something that affects potentially our national security," Ronna McDaniel says on Fox Business. She and other conservative groups call for Congress to hold hearings and Wasserman Schultz to testify.

The RNC sends emails to local media of the 30 Democratic lawmakers who had hired Awan or the other staffers, explaining the case and urging them to ask their lawmakers questions when they're back home for the August break.

Same week : Trump retweets this.

A week after Awan's arrest : A conservative group files a complaint with the House's independent ethics committee alleging Wasserman Schultz broke House rules by allowing Awan to stay on after he was banned from the House system.

Wasserman Schultz's office issues a statement calling the complaint "baseless" because they worked with House officials to make sure they were following the rules to keep him on to do things like help troubleshoot printers.

" It's no surprise that they would nonetheless file it, against one of Donald Trump's fiercest critics, at a time when the administration is trying to distract from its internal turmoil and destructive health care efforts," says Wasserman Schultz spokesman David Damron.

The Washington Post broke the story of the ethics complaint.

Aug. 3: Wall Street Journal columnist Kimberly Strassel calls attention to the drama by pointing out how much money Awan and his relatives were making. "The government, under the inattentive care of Democrats, may have been bilked for ages by a man the FBI has alleged to be a fraudster." Awan, his wife and their relatives were each making roughly $150,000 in annual salary working for more than two dozen House Democrats. Politico calculated Awan had earned more than $2 million since he started working for House Democrats in 2004.

Aug. 3 : Wasserman Schultz gives her first interview to the media. She tells the Fort Lauderdale Sun-Sentinel that she had initially only commented on the arrest via a spokesman since she had been on vacation. And she stands by her decision not to fire Awan after he was accused of stealing House equipment: "I believe that I did the right thing, and I would do it again," she says.

Meanwhile, Awan must stay within 50 miles of his Lorton home while he faces the bank fraud charges.

Aug. 7: Wasserman Schultz's Democratic primary challenger, Tim Canova , accuses her of making "a lot of self-serving excuses for Awan."

We will update this post as news develops.

[Apr 04, 2019] TEST IT YOURSELF, THE 2-SECOND-ROUNDING FACT PATTERN IN THE DNC EMAILS By William Binney and Larry Johnson

Highly recommended!
Notable quotes:
"... The random probability that FAT was not used is 1 chance in 2 to the 500th power or approximately 1 chance in 10 to the 150th power - in other words, an infinitely high order. ..."
Apr 04, 2019 | turcopolier.typepad.com

TEST IT YOURSELF, THE 2-SECOND-ROUNDING FACT PATTERN IN THE DNC EMAILS By William Binney and Larry Johnson Bill and I published a piece a few weeks back that provides actual evidence that challenges the claim that "Russia hacked the DNC." Yes, we know, the Mueller Report continues to insist that theft of emails from the DNC was done over the internet. But that conclusion rests on the opinion of third parties who offer no actual forensic evidence. We, by contrast, are offering up actual evidence that points to an alternative explanation. We do not ask you to take our word for it. Instead, we want to show you how you can test the data yourself ..

First, let's review our key findings from the original piece :

An examination of the Wikileaks DNC files shows they were created on 23 and 25 May and 26 August respectively. The fact that they appear in a FAT system format indicates the data was transfered to a storage device, such as a thumb drive.

How do we know? The truth lies in the "last modified" time stamps on the Wikileaks files. Every single one of these time stamps end in even numbers. If you are not familiar with the FAT file system, you need to understand that when a date is stored under this system the data rounds the time to the nearest even numbered second.

We have examined 500 DNC email files stored on Wikileaks and all 500 files end in an even number -- 2, 4, 6, 8 or 0. If a system other than FAT had been used, there would have been an equal probability of the time stamp ending with an odd number. But that is not the case with the data stored on the Wikileaks site. All end with an even number.

(For an overview of FAT please see this link-- http://www.ntfs.com/fat-systems.htm )

Here's what you need to do to replicate what we found.:

Step One -- Go to the Wikileaks DNC email database. Click here: https://wikileaks.org/dnc-emails/ ) Step Two -- Search the DNC database using the any word. We opted for "Clinton."

This will produce the following results (see link https://wikileaks.org/dnc-emails/?q=Clinton&mfrom=&mto=&title=&notitle=&date_from=&date_to=&nofrom=&noto=&count=50&sort=0#searchresult )

The first message in terms of "relevance" is number 100 (i.e., DOC ID 100)

Doc ID Date Subject From To
100 2016-05-23 21:17:55 +0000 POLITICO's 2016 Blast: Bernie's DNC concessions -- Hillary Clinton's fall preparations -- Trump and Clinton get personal again -- 5 Things You Need To Know [email protected] [email protected]

Step Three -- Go to the websniffer site and direct it to "get/100". https://websniffer.cc/?url=https://wikileaks.org/dnc-emails//get/100 ... This is computer speak telling the program to find message 100 (which is titled POLITICO's 2016 Blast: Bernie's DNC concessions -- Hillary Clinton's fall preparations -- Trump and Clinton get personal again -- 5 Things You Need To Know .")

Step Four--Click on submit. That will take you to the following document:

DNC Source Example

Step Five--scroll down to the "HTTP response headers" section where you will find the "Last-Modified" timestamp.

Message 100 shows a Last Modified Timestamp of 05:22:00 GMT.

That time equates to 01:22:00 Eastern Daylight Time.

It ends in 0, an even number. Our search and analysis of all the messages from the DNCin the first Wikileaks release published July 22, 2016" show that all end in an even number.

If you wish, you can search each of the 500 messages from the DNC that we have examined for yourself. You should get the same result. Just go to https://websniffer.cc/?url=https://wikileaks.org/dnc-emails//get/105 (or any other message number you wish).

We repeat our conclusion from the original article:

The random probability that FAT was not used is 1 chance in 2 to the 500th power or approximately 1 chance in 10 to the 150th power - in other words, an infinitely high order.

This data alone does not prove that the emails were copied at the DNC headquarters. But it does show that the data/emails posted by Wikileaks did go through a storage device on the 25 th of May, like a thumbdrive, before Wikileaks posted the emails on the World Wide Web.

We do not know if a person or persons with access to the DNC server accessed the emails from their home. That is possible. What is certain, however, is that email message 100 demonstrates forensic evidence that indicates the email was physically copied onto a storage device, like a thumb drive or CD-Rom, with a last modified date of 05:22:00 GMT on Wednesday the 25 th of May 2016, before it was published on the Wikileaks site. The fact that these messages are in FAT format is not evidence that supports Mueller's claim a "hack."

Perhaps Mueller's team of investigators turned up forensic data that proves a Russian hack. There was no such evidence, however, presented in June and July of 2016 when the initial claim was made blaming Russian intelligence operatives.

We also are confident that there was no solid forensic evidence available in January 2017 to substantiate the Intelligence Community Assessment attributing the "hack" to the Russian Government because NSA analysts only agreed that they had "moderate confidence" in that claim. We know from our prior experience in producting such assessments that if there existed actual forensic evidence, such as tracing the packets back to a server operated by the Russian Government then there would be "strong confidence" in the conclusion.

Who was the person or persons who had access to the DNC server that were copying these messages to a storage device, like a thumb drive, early in the morning on Wednesday the 25 th of May? We have an opinion, but our focus is not on speculation. Let us first deal with the hard forensic evidence. We are certain of one thing -- the available evidence does not support the claim that the DNC emails were "hacked" via an internet cyber attack.

Posted at 12:57 PM in Larry Johnson , Russiagate | Permalink

Eric Newhill , 5 hours ago

Larry,

Since Assange lives in an embassy, would there be any value to looking into who visited him or mailed something to him between Wednesday the 25thof May 2016 and the date Wikileaks published the material (July 22, 2016)? Would the embassy have those records?

Also, I may be mistaken, but wasn't the same material passed to, and published by, DCleaks around the same time as the Wikileaks release? If that is correct, why does no one talk about or analyze the DCleaks aspect of the case?

Finally, what do you think about the idea that multiple penetrations of the server could have been occurring simultaneously by different parties? It is a juicy target, after all, and apparently not well protected. Perhaps the Russians were in there, but were not the source of the DCLeaks and/or Wikileaks material.

[Mar 25, 2019] Spygate The True Story of Collusion (plus Infographic) by Jeff Carlson

Highly recommended!
This is probably the most comprehensive outline of the color revolution against Trump. Bravo, simply bravo !!!
Reads like Agatha Christi Murder on the Orient Express ;-) Rosenstein role is completely revised from a popular narrative. Brennan role clarifies and detailed. Obama personal role hinted. Victoria Nuland role and the role of the State Department in Russiagate is documented for the first time, I think.
Notable quotes:
"... The "insurance policy" appears to have been the effort to legitimize the Trump–Russia collusion narrative so that an FBI investigation, led by McCabe, could continue unhindered. ..."
"... Ohr, one of the highest-ranking officials in the DOJ, was communicating on an ongoing basis with Steele, whom he had known since at least 2006 , well into mid-2017. He is also married to Nellie Ohr, an expert on Russia and Eurasia who began working for Fusion GPS sometime in late 2015 . Nellie Ohr likely played a significant role in the construction of the dossier. ..."
"... The Obama administration provided a simultaneous layer of protection and facilitation for the entire effort. One example is provided by Section 2.3 of Executive Order 12333 , also known as Obama's data-sharing order . With the passage of the order, agencies and individuals were able to ask the NSA for access to specific surveillance simply by claiming the intercepts contained relevant information that was useful to a particular mission. ..."
"... Leaking, including felony leaking of classified information, has been widespread. The Carter Page FISA warrant -- likely the unredacted version -- has been in the possession of The Washington Post and The New York Times since March 2017. Traditionally, the intelligence community leaked to The Washington Post while the DOJ leaked to sources within The New York Times. This was a historical pattern that stood until this election. The leaking became so widespread, even this tradition was broken. ..."
"... The information contained within both articles likely came via felony leaks from James Wolfe, former director of security for the Senate Select Committee on Intelligence, who was arrested on June 7, 2018, and charged with one count of lying to the FBI. Wolfe's indictment alleges that he was leaking classified information to multiple reporters over an extended period of time. ..."
"... The Steele dossier was fed into U.S. channels through several different sources. One such source was Sir Andrew Wood, the former British ambassador to Russia, who had been briefed about the dossier by Steele. Wood later relayed information regarding the dossier to Sen. John McCain, who dispatched David Kramer, a fellow at the McCain Institute, to London to meet with Steele in November 2016. McCain would later admit in a Jan. 11, 2017, statement that he had personally passed on the dossier to then-FBI Director James Comey. ..."
"... Trump, after issuing an order for the declassification of documents and text messages related to the Russia-collusion investigations -- including parts of the Carter Page FISA warrant application -- received phone calls from two U.S. allies saying, "Please, can we talk." Those "allies" were almost certainly the UK and Australia. ..."
"... Questions to be asked are why is it that two of our allies would find themselves so opposed to the release of these classified documents that a coordinated plea would be made directly to the president? And why would these same allies have even the slightest idea of what was contained in these classified U.S. documents? ..."
Oct 12, 2018 | www.theepochtimes.com
Spygate: The True Story of Collusion [Infographic] How America's most powerful agencies were weaponized against President Donald Trump

Although the details remain complex, the structure underlying Spygate -- the creation of the false narrative that candidate Donald Trump colluded with Russia, and the spying on his presidential campaign -- remains surprisingly simple:

  1. CIA Director John Brennan, with some assistance from Director of National Intelligence James Clapper, gathered foreign intelligence and fed it throughout our domestic Intelligence Community.
  2. The FBI became the handler of Brennan's intelligence and engaged in the more practical elements of surveillance.
  3. The Department of Justice facilitated investigations by the FBI and legal maneuverings, while providing a crucial shield of nondisclosure.
  4. The Department of State became a mechanism of information dissemination and leaks.
  5. Hillary Clinton's presidential campaign and the Democratic National Committee provided funding, support, and media collusion.
  6. Obama administration officials were complicit, and engaged in unmasking and intelligence gathering and dissemination.
  7. The media was the most corrosive element in many respects. None of these events could have transpired without their willing participation. Stories were pushed, facts were ignored, and narratives were promoted.

Let's start with a simple premise: The candidacy of Trump presented both an opportunity and a threat.

Initially not viewed with any real seriousness, Trump's campaign was seen as an opportunistic wedge in the election process. At the same time, and particularly as the viability of his candidacy increased, Trump was seen as an existential threat to the established political system.

The sudden legitimacy of Trump's candidacy was not welcomed by the U.S. political establishment. Here was a true political outsider who held no traditional allegiances. He was brash and boastful, he ignored political correctness, he couldn't be bought, and he didn't care what others thought of him -- he trusted himself.

Governing bodies in Britain and the European Union were also worried. Candidate Trump was openly challenging monetary policy, regulations, and the power of special interests. He challenged Congress. He challenged the United Nations and the European Union. He questioned everything.

Brennan played a crucial role in the creation of the Russia-collusion narrative and the spying on the Trump campaign. (Don Emmert/AFP/Getty Images)

Brennan became the point man in the operation to stop a potential Trump presidency. It remains unclear whether his role was self-appointed or came from above. To embark on such a mission without direct presidential authority seems both a stretch of the imagination and particularly foolhardy.

Brennan took unofficial foreign intelligence compiled by contacts, colleagues, and associates -- primarily from the UK , but also from other Five Eyes members, such as Australia.

Individuals in official positions in UK intelligence, such as Robert Hannigan -- head of the UK Government Communications Headquarters (GCHQ, Britain's equivalent of the National Security Agency) -- partnered with former UK foreign intelligence members. Former MI6 head Sir Richard Dearlove , former Ambassador Sir Andrew Wood, and private UK intelligence firm Hakluyt all played a role.

In the summer of 2016, Hannigan traveled to Washington to meet with Brennan regarding alleged communications between the Trump campaign and Moscow. On Jan. 23, 2017 -- three days after Trump's inauguration -- Hannigan abruptly announced his retirement. The Guardian openly speculated that Hannigan's resignation was directly related to the sharing of UK intelligence.

One method used to help establish evidence of collusion was the employment of "spy traps." Prominent among these were ones set for Trump campaign advisers George Papadopoulos and Carter Page. The intent was to provide or establish connections between the Trump campaign and Russia. The content and context mattered little as long as a connection could be established that could then be publicized. The June 2016 Trump Tower meeting was another such attempt.

Western intelligence assets were used to initiate and establish these connections, particularly in the cases of Papadopoulos and Page.

Ultimately, Brennan formed an inter-agency task force comprising an estimated six agencies and/or government departments. The FBI, Treasury, and DOJ handled the domestic inquiry into Trump and possible Russia connections. The CIA, Office of the Director of National Intelligence, and the National Security Agency (NSA) handled foreign and intelligence aspects.

Brennan's inter-agency task force is not to be confused with the July 2016 FBI counterintelligence investigation, which was formed later at Brennan's urging.

During this time, Brennan also employed the use of reverse targeting , which relates to the targeting of a foreign individual with the intent of capturing data on a U.S. citizen. This effort was uncovered and made public by Rep. Devin Nunes (R-Calif.) in a March 2017 press conference :

"I have seen intelligence reports that clearly show the president-elect and his team were monitored and disseminated out in intelligence-reporting channels. Details about persons associated with the incoming administration, details with little apparent foreign-intelligence value were widely disseminated in intelligence community reporting.

"From what I know right now, it looks like incidental collection. We don't know exactly how that was picked up but we're trying to get to the bottom of it."

As this foreign intelligence -- unofficial in nature and outside of any traditional channels -- was gathered, Brennan began a process of feeding his gathered intelligence to the FBI. Repeated transfers of foreign intelligence from the CIA director pushed the FBI toward the establishment of a formal counterintelligence investigation. Brennan repeatedly noted this during a May 23, 2017, congressional testimony :

"I made sure that anything that was involving U.S. persons, including anything involving the individuals involved in the Trump campaign, was shared with the [FBI]."

Brennan also admitted that his intelligence helped establish the FBI investigation:

"I was aware of intelligence and information about contacts between Russian officials and U.S. persons that raised concerns in my mind about whether or not those individuals were cooperating with the Russians, either in a witting or unwitting fashion, and it served as the basis for the FBI investigation to determine whether such collusion [or] cooperation occurred."

This admission is important, as no official intelligence was used to open the FBI's investigation.

Once the FBI began its counterintelligence investigation on July 31, 2016, Brennan shifted his focus. Through a series of meetings in August and September 2016, Brennan informed the congressional Gang of Eight regarding intelligence and information he had gathered. Notably, each Gang of Eight member was briefed separately, calling into question whether each of the members received the same information. Efforts to block the release of the transcripts from each meeting remain ongoing.

The last major segment of Brennan's efforts involved a series of three reports and greater participation from Clapper. The first report, the "Joint Statement from the Department Of Homeland Security and Office of the Director of National Intelligence on Election Security ," was released on Oct. 7, 2016. The second report, "GRIZZLY STEPPE -- Russian Malicious Cyber Activity ," was released on Dec. 29, 2016. The third report, "Assessing Russian Activities and Intentions in Recent U.S. Elections " -- also known as the Intelligence Community Assessment (ICA) -- was released on Jan. 6, 2017.

This final report was used to continue pushing the Russia-collusion narrative following the election of President Donald Trump. Notably, Admiral Mike Rogers of the NSA publicly dissented from the findings of the ICA, assigning only a moderate confidence level.

https://www.youtube.com/embed/bMcNbum93cU?wmode=transparent&wmode=opaque

Federal Bureau of Investigation

Although the FBI is technically part of the DOJ, it is best for the purposes of this article that the FBI and DOJ be viewed as separate entities, each with its own related ties.

The FBI itself was comprised of various factions, with a particularly active element that has come to be known as the "insurance policy group." It appears that this faction was led by FBI Deputy Director Andrew McCabe and comprised other notable names such as FBI agent Peter Strzok, FBI lawyer Lisa Page, and FBI general counsel James Baker.

The FBI established the counterintelligence investigation into alleged Russia collusion with the Trump campaign on July 31, 2016. Comey initially refused to say whether the FBI was investigating possible connections between members of the Trump campaign and Russia. He would continue to refuse to provide answers until March 20, 2017, when he disclosed the existence of the FBI investigation during congressional testimony.

Comey also testified that he did not provide notification to the Gang of Eight until early March 2017 -- less than one month earlier. This admission was in stark contrast to actions taken by Brennan, who had notified members of the Gang of Eight individually during August and September 2016. It's likely that Brennan never informed Comey that he had briefed the Gang of Eight in 2016. Comey did note that the DOJ "had been aware" of the investigation all along.

Comey opened the counterintelligence investigation into Trump on the urging of CIA Director John Brennan.
Following Comey's firing on May 9, 2017, the FBI's investigation was transferred to special counsel Robert Mueller. The Mueller investigation remains ongoing.

The FBI's formal involvement with the Steele dossier began on July 5, 2016, when Mike Gaeta, an FBI agent and assistant legal attaché at the US Embassy in Rome, was dispatched to visit former MI6 spy Christopher Steele in London. Gaeta would return from this meeting with a copy of Steele's first memo. This memo was given to Victoria Nuland at the State Department, who passed it along to the FBI.

Gaeta, who also headed the FBI's Eurasian Organized Crime unit, had known Steele since at least 2010, when Steele had provided assistance to the FBI's investigation into the FIFA corruption scandal .

Prior to the London meeting, Gaeta may also have met on a less formal basis with Steele several weeks earlier. "In June, Steele flew to Rome to brief the FBI contact with whom he had cooperated over FIFA," The Guardian reported. "His information started to reach the bureau in Washington."

It's worth noting that there was no "dossier" until it was fully compiled in December 2016. There was only a sequence of documents from Steele -- documents that were passed on individually -- as they were created. Therefore, from the FBI's legal perspective, they didn't use the dossier. They used individual documents.

For the next month and a half, there appeared to be little contact between Steele and the FBI. However, the FBI's interest in the dossier suddenly accelerated in late August 2016, when the bureau asked Steele "for all information in his possession and for him to explain how the material had been gathered and to identify his sources."

In September 2016, Steele traveled back to Rome to meet with the FBI's Eurasian squad once again. It's likely that the meeting included several other FBI officials as well. According to a House Intelligence Committee minority memo , Steele's reporting reached the FBI counterintelligence team in mid-September 2016 -- the same time as Steele's September trip to Rome.

The reason for the FBI's renewed interest had to do with an adviser to the Trump campaign -- Carter Page -- who had been in contact with Stefan Halper, a CIA and FBI source, since July 2016. Halper arranged to meet with Page for the first time on July 11, 2016, at a Cambridge symposium , just three days after Page took a trip to Moscow. Speakers at the symposium included Madeleine Albright, Vin Webber, and Sir Richard Dearlove, the former head of MI6.

Page was now the FBI's chosen target for a FISA warrant that would be obtained on Oct. 21, 2016. The Steele dossier would be the primary evidence used in obtaining the FISA warrant, which would be renewed three separate times, including after Trump took office, finally expiring in September 2017.

Former volunteer Trump campaign adviser Carter Page on Nov. 2, 2017. The FBI obtained a retroactive FISA spy warrant on Page.

After being in contact with Page for 14 months, Halper stopped contact exactly as the final FISA warrant on Page expired. Page, who has steadfastly maintained his innocence, was never charged with any crime by the FBI. Efforts for the declassification of the Page FISA application are currently ongoing through the DOJ's Office of the Inspector General.

Peter Strzok and Lisa Page

Peter Strzok and Lisa Page were two prominent members of the FBI's "insurance policy" group. Strzok, a senior FBI agent, was the deputy assistant director of FBI's Counterintelligence Division. Lisa Page, an FBI lawyer, served as special counsel to FBI Deputy Director Andrew McCabe.

Strzok was in charge of the investigation into Hillary Clinton's use of a private email server for government business. He helped FBI Director James Comey draft the statement exonerating Clinton and was personally responsible for changing specific wording within that statement that reduced Clinton's legal liability. Specifically, Strzok changed the words "grossly negligent," which could be a criminal offense, to "extremely careless."

Strzok also personally led the FBI's counterintelligence investigation into the alleged Trump–Russia collusion and signed the documents that opened the investigation on July 31, 2016. He was one of the FBI agents who interviewed Trump's national security adviser, Gen. Michael Flynn. Strzok met multiple times with DOJ official Bruce Ohr and received information from Steele at those meetings.

Following the firing of FBI Director James Comey, Strzok would join the team of special counsel Robert Mueller. Two months later, he was removed from that team after the DOJ inspector general discovered a lengthy series of texts between Strzok and Page that contained politically charged messages. Strzok would be fired from the FBI in August 2018.

Both Strzok and Page engaged in strategic leaking to the press. Page did so at the direction of McCabe, who directly authorized Page to share information with Wall Street Journal reporter Devlin Barrett. That information was used in an Oct. 30, 2016, article headlined "FBI in Internal Feud Over Hillary Clinton Probe ." Page leaked to Barrett thinking she had been granted legal and official authorization to do so.

McCabe would later initially deny providing such authorization to the Office of Inspector General. Page, when confronted with McCabe's denials, produced texts refuting his statement. It was these texts that led to the inspector general uncovering the texts between Strzok and Page.

The two exchanged thousands of texts, some of them indicating surveillance activities, over a two-year period. Texts sent between Aug. 21, 2015, and June 25, 2017, have been made public . The series comes to an end with a final text by Page telling Strzok, "Don't ever text me again."

On Aug. 8, 2016, Stzrok wrote that they would prevent candidate Trump from becoming president:

Page: "[Trump is] not ever going to become president, right? Right?!"

Strzok: "No. No he won't. We'll stop it."

On Aug. 15, 2016, Strzok sent a text referring to an "insurance policy":

"I want to believe the path you threw out for consideration in Andy's office -- that there's no way [Trump] gets elected -- but I'm afraid we can't take that risk. It's like an insurance policy in the unlikely event you die before you're 40."

The "insurance policy" appears to have been the effort to legitimize the Trump–Russia collusion narrative so that an FBI investigation, led by McCabe, could continue unhindered.

Department of Justice

The Department of Justice, which comprises 60 agencies , was transformed during the Obama years. The department is forbidden by federal law from hiring employees based on political affiliation.

However, a series of investigative articles by PJ Media published during Eric Holder's tenure as attorney general revealed an unsettling pattern of ideological conformity among new hires at the DOJ: Only lawyers from the progressive left were hired. Not one single moderate or conservative lawyer made the cut. This is significant as the DOJ enjoys significant latitude in determining who will be subject to prosecution.

The DOJ's job in Spygate was to facilitate the legal side of surveillance while providing a protective layer of cover for all those involved. The department became a repository of information and provided a protective wall between the investigative efforts of the FBI and the legislative branch. Importantly, it also served as the firewall within the executive branch, serving as the insulating barrier between the FBI and Obama officials. The department had become legendary for its stonewalling tactics with Congress.

DOJ Official Bruce Ohr on Aug. 28, 2018. Ohr passed on information from Christopher Steele to the FBI.

The DOJ, which was fully aware of the actions being taken by James Comey and the FBI, also became an active element acting against members of the Trump campaign. Deputy Attorney General Sally Yates, along with Mary McCord, the head of the DOJ's National Security Division, was actively involved in efforts to remove Gen. Michael Flynn from his position as national security adviser to President Trump.

To this day, it remains unknown which individual was responsible for making public Flynn's call with the Russian ambassador. Flynn ultimately pleaded guilty to a process crime: lying to the FBI. There have been questions raised in Congress regarding the possible alteration of FD-302s, the written notes of Flynn's FBI interviews. Special counsel Robert Mueller has repeatedly deferred Flynn's sentencing hearing.

David Laufman, deputy assistant attorney general in charge of counterintelligence at the DOJ's National Security Division, played a key role in both the Clinton email server and Russia hacking investigations. Laufman is currently the attorney for Monica McLean, the long-time friend of Christine Blasey Ford, who recently accused Judge Brett Kavanaugh of sexually assaulting her while in high school. McLean was also employed by the FBI for 24 years.

Bruce Ohr was a significant DOJ official who played a key role in Spygate. Ohr held two important positions at the DOJ: associate deputy attorney general, and director of the Organized Crime Drug Enforcement Task Force. As associate deputy attorney general, Ohr was just four offices away from then-Deputy Attorney General Sally Yates, and he reported directly to her. As director of the task force, he was in charge of a program described as "the centerpiece of the attorney general's drug strategy."

Ohr, one of the highest-ranking officials in the DOJ, was communicating on an ongoing basis with Steele, whom he had known since at least 2006 , well into mid-2017. He is also married to Nellie Ohr, an expert on Russia and Eurasia who began working for Fusion GPS sometime in late 2015 . Nellie Ohr likely played a significant role in the construction of the dossier.

According to testimony from FBI agent Peter Strzok, he and Ohr met at least five times during 2016 and 2017. Strzok was working directly with then-Deputy FBI Director Andrew McCabe.

Additionally, Ohr met with the FBI at least 12 times between late November 2016 and May 2017 for a series of interviews. These meetings could have been used to transmit information from Steele to the FBI. This came after the FBI had formally severed contact with Steele in late October or early November 2016.

John Carlin is another notable figure with the DOJ. Carlin was an assistant attorney general and the head of the DOJ's National Security Division until October 2016. His role will be discussed below in the section on FISA abuse.

The Battle Between Rosenstein and McCabe

Deputy FBI Director Andrew McCabe held a pivotal role in what has become known as "Spygate." He directed the activities of Peter Strzok and Lisa Page and was involved in all aspects of the Russia investigation. He was also mentioned in the infamous "insurance policy" text message.

McCabe was a major component of the insurance policy.

On April 26, 2017, Rosenstein found himself appointed as the new deputy attorney general. He was placed into a somewhat chaotic situation, as Attorney General Jeff Sessions had recused himself from the ongoing Russia investigation a little less than two months earlier, on March 2, 2017. This effectively meant that no one in the Trump administration had any oversight of the ongoing investigation being conducted by the FBI and the DOJ.

Additionally, the leadership of then-FBI Director James Comey was coming under increased scrutiny as the result of actions taken leading up to and following the election, particularly Comey's handling of the Clinton email investigation.

On May 9, 2017, Rosenstein wrote a memorandum recommending that Comey be fired. The subject of the memo was "Restoring Public Confidence in the FBI." Comey was fired that day. McCabe was now the acting director of the FBI and was immediately under consideration for the permanent position.

On the same day Comey was fired, McCabe would lie during an interview with agents from the FBI's Inspection Division (INSD) regarding apparent leaks that were used in an Oct. 30, 2016, Wall Street Journal article, "FBI in Internal Feud Over Hillary Clinton Probe" by Devlin Barrett. This would later be disclosed in the inspector general report, "A Report of Investigation of Certain Allegations Relating to Former Deputy FBI Director Andrew McCabe."

At the time, nobody, including the INSD agents, knew that McCabe had lied, nor were the darker aspects of McCabe's role in Spygate fully known.

In late April or early May 2016, McCabe opened a federal criminal investigation on Sessions, regarding potential lack of candor before Congress in relation to Sessions's contacts with Russians. Sessions was unaware of the investigation.

Sessions would later be cleared of any wrongdoing by special counsel Robert Mueller.

On the morning of May 16, 2017, Rosenstein reportedly suggested to McCabe that he secretly record President Trump. This remark was reported in a New York Times article that was sourced from memos from the now-fired McCabe, along with testimony taken from former FBI general counsel James Baker, who relayed a conversation he had with McCabe about the occurrence. Rosenstein issued a statement denying the accusations.

The alleged comments by Rosenstein occurred at a meeting where McCabe was "pushing for the Justice Department to open an investigation into the president." An unnamed participant at the meeting, in comments to The Washington Post, framed the conversation somewhat differently, noting Rosenstein responded sarcastically to McCabe, saying, "What do you want to do, Andy, wire the president?"

Later, on the same day that Rosenstein had his meetings with McCabe, President Trump met with Mueller, reportedly as an interview for the FBI director job. On May 17, 2017, the day after President Trump's meeting with Mueller -- and the day after Rosenstein's encounters with McCabe -- Rosenstein appointed Mueller as special counsel.

The May 17 appointment of Mueller in effect shifted control of the Russia investigation from the FBI and McCabe to Mueller. Rosenstein would retain ultimate authority for the probe and any expansion of Mueller's investigation required authorization from Rosenstein.

Interestingly, without Comey's memo leaks, a special counsel might not have been appointed -- the FBI, and possibly McCabe, would have remained in charge of the Russia investigation. McCabe was probably not going to become the permanent FBI director, but he was reportedly under consideration. Regardless, without Comey's leak, McCabe would have retained direct involvement and the FBI would have retained control.

On July 28, 2017, McCabe lied to Inspector General Michael Horowitz while under oath regarding authorization of the leaking to The Wall Street Journal. At this point, Horowitz knew McCabe was lying, but did not yet know of the May 9 INSD interview with McCabe.

On Aug. 2, 2017, Rosenstein secretly issued Mueller a revised memo on "the scope of investigation and definition of authority" that remains heavily redacted. The full purpose of this memo remains unknown. On this same day, Christopher Wray was named as the new FBI director.

Two days later, on Aug. 4, 2017, Sessions announced that the FBI had created a new leaks investigation unit. Rosenstein and Wray were tasked with overseeing all leak investigations.

That Aug. 2 memo from Rosenstein to Mueller may have been specifically designed to remove any residual FBI influence -- specifically that of McCabe -- from the Russia investigation. The appointment of Wray as FBI director helped cement this. McCabe was finally completely neutralized.

On March 16, 2018, McCabe was fired for lying under oath at least three different times and is currently the subject of a grand jury investigation.

State Department

The State Department, with its many contacts within foreign governments, became a conduit for the flow of information. The transfer of Christopher Steele's first dossier memo was personally facilitated by Victoria Nuland, the assistant secretary of state for European and Eurasian affairs. Nuland gave approval for FBI agent Michael Gaeta to travel to London to obtain the memo from Steele. The memo may have passed directly from her to FBI leadership. Secretary of State John Kerry was also given a copy.

Steele was already well-known within the State Department. Following Steele's involvement in the FIFA scandal investigation, he began to provide reports informally to the State Department. The reports were written for a "private client" but were "shared widely within the U.S. State Department, and sent up to Secretary of State John Kerry and Assistant Secretary of State Victoria Nuland, who was in charge of the U.S. response to Putin's annexation of Crimea and covert invasion of eastern Ukraine," the Guardian reported.

Nuland passed on parts of the Steele dossier to the FBI. (Mark Wilson/Getty Images)

In July 2016, when the FBI wanted to send Gaeta to visit Steele in London, the bureau sought permission from the office of Nuland, who provided this version of events during a Feb. 4, 2018, appearance on CBS's "Face the Nation":

"In the middle of July, when [Steele] was doing this other work and became concerned, he passed two to four pages of short points of what he was finding and our immediate reaction to that was, this is not in our purview. This needs to go to the FBI if there is any concern here that one candidate or the election as a whole might be influenced by the Russian Federation. That's something for the FBI to investigate."

Steele also met with Jonathan Winer, a former deputy assistant secretary of state for international law enforcement and former special envoy for Libya. Steele and Winer had known each other since at least 2010. In an opinion article in The Washington Post, Winer wrote the following:

"In September 2016, Steele and I met in Washington and discussed the information now known as the 'dossier.' Steele's sources suggested that the Kremlin not only had been behind the hacking of the Democratic National Committee and the Hillary Clinton campaign but also had compromised Trump and developed ties with his associates and campaign."

In a strange turn of events, Winer also received a separate dossier , very similar to Steele's, from long-time Clinton confidant Sidney Blumenthal. This "second dossier" had been compiled by another longtime Clinton operative, former journalist Cody Shearer, and echoed claims made in the Steele dossier. Winer then met with Steele in late September 2016 and gave Steele a copy of the "second dossier." Steele went on to share this second dossier with the FBI, which may have used it to corroborate his dossier.

Winer passed on memos from Christopher Steele to Victoria Nuland. (State Department)

Other foreign officials also used conduits into the State Department. Alexander Downer, Australia's high commissioner to the UK, reportedly funneled his conversation with Trump campaign adviser George Papadopoulos -- later used as a reason to open the FBI's counterintelligence investigation -- directly to the U.S. Embassy in London.

"The Downer details landed with the embassy's then-chargé d'affaires, Elizabeth Dibble, who previously served as a principal deputy assistant secretary in Mrs. Clinton's State Department," The Wall Street Journal's Kimberley Strassel wrote in a May 31, 2018, article .

If true, this would mean that neither Australian intelligence nor the Australian government alerted the FBI to the Papadopoulos information. What happened with the Downer details, and to whom they were ultimately relayed, remains unknown.

Curiously, details surprisingly similar to the Papadopoulos–Downer conversation show up in the first memo written by Steele on June 20, 2016:

"A dossier of compromising information on Hillary Clinton has been collated by the Russian Intelligence Services over many years and mainly comprises bugged conversations she had on various visits to Russia and intercepted phone calls. It has not yet been distributed abroad, including to Trump."

Clinton Campaign and the DNC

The Clinton campaign and the Democratic National Committee both occupied a unique position. They had the most to gain but they also had the most to lose. And they stood willing and ready to do whatever was necessary to win. Hillary Clinton's campaign manager, Robby Mook, is credited with being the first to raise the specter of candidate Donald Trump's alleged collusion with Russia.

The entire Clinton campaign willfully promoted the narrative of Russia–Trump collusion despite the uncomfortable fact that they were the ones who had engaged the services of Fusion GPS and Christopher Steele through their law firm Perkins Coie. Information flowed from the campaign -- sometimes through Perkins Coie, other times through affiliates -- ultimately making its way into the media and sometimes to the FBI. Information from the Clinton campaign may also have ended up in the Steele dossier.

Jennifer Palmieri, the communications director for the Clinton campaign, in tandem with Jake Sullivan, the senior policy adviser to the campaign, took the lead in briefing the press on the Trump–Russia collusion story.

Another example of this behavior can be seen from an instance when Perkins Coie lawyer Michael Sussmann leaked information from Steele and Fusion GPS to Franklin Foer of Slate magazine. This event is described in the House Intelligence Committee's final report on Russian active measures , in footnote 43 on page 57. Foer then published the article "Was a Trump Server Communicating With Russia? " on Oct. 31, 2016. The article concerns allegations regarding a server in the Trump Tower.

The Slate article managed to attract the immediate attention of Clinton, who posted a tweet on the same day the article was published:

"Computer scientists have apparently uncovered a covert server linking the Trump Organization to a Russian-based bank."

Attached to her tweet was a statement from Sullivan:

"This could be the most direct link yet between Donald Trump and Moscow. Computer scientists have apparently uncovered a covert server linking the Trump Organization to a Russian-based bank.

"This secret hotline may be the key to unlocking the mystery of Trump's ties to Russia. It certainly seems the Trump Organization felt it had something to hide, given that it apparently took steps to conceal the link when it was discovered by journalists."

These statements, which were later proven to be incorrect, are all the more disturbing with the hindsight knowledge that it was a senior Clinton/DNC lawyer who helped plant the story. And given the prepared statement by Sullivan, the Clinton campaign knew this.

This type of behavior would be engaged in repeatedly -- damning leaks leading to media stories, followed by ready attacks from the Clinton campaign.

Alexandra Chalupa is a Ukrainian-American operative who was consulting for the Democratic National Committee. Chalupa met with top officials in the Ukrainian Embassy in Washington in an effort to expose ties between Trump, Paul Manafort, and Russia. Chalupa began investigating Manafort in 2014. In late 2015, Chalupa expanded her opposition research on Manafort to include Trump's ties to Russia. In January 2016, Chalupa shared her information with a senior DNC official.

Chalupa's meetings with DNC and Ukrainian officials would continue. On April 26, 2016, investigative reporter Michael Isikoff published a story on Yahoo News about Manafort's business dealings with Russian oligarch Oleg Deripaska. It was later learned from a DNC email leaked by Wikileaks that Chalupa had been working with Isikoff -- the same journalist Christopher Steele leaked to in September 2016. Manafort would later be indicted for Foreign Agents Registration Act violations that occurred during the Obama administration.

Perkins Coie

International law firm Perkins Coie served as the legal arm for both the Clinton campaign and the DNC. Ties to Perkins Coie extended beyond the DNC into the Obama White House.

Bob Bauer, a partner at the law firm and founder of its political law practice, served as White House counsel to President Barack Obama throughout 2010 and 2011. Bauer was also general counsel to Obama's campaign organization, Obama for America, in 2008 and 2012.

Perkins Coie partners Marc Elias and Michael Sussmann each played critical roles and were the ones who hired Fusion GPS and Steele. Sussmann personally handled the alleged hack of the DNC server. He also transmitted information, likely from Steele and Fusion GPS, to James Baker, then-chief counsel at the FBI, and to several members of the press.

Perkins Coie partner Michael Sussmann. Sussmann transmitted information to FBI chief counsel James Baker and several journalists. (Courtesy Perkins Coie)

According to a letter dated Oct. 24, 2017, written by Matthew Gehringer, general counsel at Perkins Coie, the firm was approached by Fusion GPS founder Glenn Simpson in early March 2016 regarding the possibility of hiring Fusion GPS to continue opposition research into the Trump campaign. Simpson's overtures were successful, and in April 2016, Perkins Coie hired Fusion GPS on behalf of the DNC.

Sometime in April or May 2016, Fusion GPS hired Christopher Steele. During this same period, Fusion also reportedly hired Nellie Ohr, the wife of Associate Deputy Attorney General Bruce Ohr. Steele would complete his first memo on June 20, 2016, and send it to Fusion via enciphered mail.

Perkins Coie appears to have also been acting as a conduit between the DNC and the FBI. Documents suggest that Sussmann was feeding information to FBI general counsel James Baker and at least one journalist ahead of the FBI's application for a FISA warrant on the Trump campaign.

The information provided by Sussmann may have been used by the FBI as "corroborating information."

Obama Administration

The Obama administration provided a simultaneous layer of protection and facilitation for the entire effort. One example is provided by Section 2.3 of Executive Order 12333 , also known as Obama's data-sharing order . With the passage of the order, agencies and individuals were able to ask the NSA for access to specific surveillance simply by claiming the intercepts contained relevant information that was useful to a particular mission.

Section 2.3 had been expected to be finalized by early to mid-2016. Instead, Director of National Intelligence James Clapper didn't sign off on Section 2.3 until Dec. 15, 2016. The order was finalized when Attorney General Loretta Lynch signed it on Jan. 3, 2017.

The reason for the delay could relate to the fact that while the executive order made it easier to share intelligence between agencies, it also limited certain types of information from going to the White House.

An example of this was provided by Evelyn Farkas during a March 2, 2017, MSNBC interview , where she detailed how the Obama administration gathered and disseminated intelligence on the Trump team:

"I was urging my former colleagues and, frankly speaking, the people on the Hill 'Get as much information as you can. Get as much intelligence as you can before President Obama leaves the administration.'

"The Trump folks, if they found out how we knew what we knew about the Trump staff's dealing with Russians, [they] would try to compromise those sources and methods, meaning we would no longer have access to that intelligence. That's why you have the leaking."

Deputy Assistant Secretary of Defense for Russia/Ukraine/Eurasia Evelyn Farkas on May 6, 2014. (Alex Wong/Getty Images)

Many of the Obama administration's efforts appear to have been structural in nature, such as establishing new procedures or creating impediments to oversight that enabled much of the surveillance abuse to occur.

DOJ Inspector General Michael Horowitz was appointed by Obama in 2011. From the very start, he found his duties throttled by the attorney general's office. According to congressional testimony by Horowitz:

"We got access to information up to 2010 in all of these categories. No law changed in 2010. No policy changed. It was simply a decision by the General Counsel's Office in 2010 that they viewed, now, the law differently. And as a result, they weren't going to give us that information."

These new restrictions were put in place by Attorney General Eric Holder and Deputy Attorney General James Cole.

On Aug. 5, 2014, Horowitz and other inspectors general sent a letter to Congress asking for unimpeded access to all records. Deputy Attorney General Sally Yates responded on July 20, 2015, with a 58-page memorandum . The memo specifically denied the inspector general access to any information collected under Title III -- including intercepted communications and national security letters.

The New York Times recently disclosed that national security letters were used in the surveillance of the Trump campaign.

At other times, the Obama administration's efforts were more direct. The Intelligence Community assessment was released internally on Jan. 5, 2017. On this same day, Obama held an undisclosed White House meeting to discuss the dossier with national security adviser Susan Rice, FBI Director James Comey, and Yates. Rice would later send herself an email documenting the meeting.

The following day, Brennan, Clapper, and Comey attached a written summary of the Steele dossier to the classified briefing they gave Obama. Comey then met with President-elect Trump to inform him of the dossier. This meeting took place just hours after Comey, Brennan, and Clapper formally briefed Obama on both the Intelligence Community assessment and the Steele dossier.

Comey would only inform Trump of the "salacious" details contained within the dossier. He later explained on CNN in an April 2018 interview why:

"Because that was the part that the leaders of the Intelligence Community agreed he needed to be told about."

Shortly after Comey's meeting with Trump, both the Trump–Comey meeting and the existence of the dossier were leaked to CNN. The significance of the meeting was material, as Comey noted in a Jan. 7 memo he wrote:

"Media like CNN had them and were looking for a news hook. I said it was important that we not give them the excuse to write that the FBI has the material."

Clapper leaked information to CNN, after which he publicly condemned the leaks. (Alex Wong/Getty Images)

The media had widely dismissed the dossier as unsubstantiated and, therefore, unreportable. It was only after learning that Comey briefed Trump that CNN reported on the dossier. It was later revealed that DNI James Clapper personally leaked Comey's meeting with Trump to CNN.

The Obama administration also directly participated in a series of intelligence unmaskings , the process whereby a U.S. citizen's identity is revealed from collected surveillance. U.S. Ambassador to the U.N. Samantha Power reportedly engaged in hundreds of unmasking requests. Rice has admitted to doing the same.

The Obama administration engaged in the ultimately successful effort to oust Trump's newly appointed national security adviser, Gen. Michael Flynn. Yates, along with Mary McCord, head of the DOJ's National Security Division, led that effort .

Executive Order 13762

President Barack Obama issued a last-minute executive order on Jan. 13, 2017, that altered the line of succession within the DOJ. The action was not done in consultation with the incoming Trump administration.

Acting Attorney General Sally Yates was fired on Jan. 30, 2017, by a newly inaugurated President Trump for refusing to uphold the president's executive order limiting travel from certain terror-prone countries. Yates was initially supposed to serve in her position until Jeff Sessions was confirmed as attorney general.

Obama's executive order placed the U.S. attorney for the District of Columbia next in line behind the department's senior leadership. The attorney at the time was Channing Phillips.

Phillips was first hired by former Attorney General Eric Holder in 1994 for a position in the D.C. U.S. attorney's office. Phillips, after serving as a senior adviser to Holder, stayed on after he was replaced by Attorney General Loretta Lynch.

It appears the Obama administration was hoping the Russia investigation would default to Channing in the event Sessions was forced to recuse himself from the investigation. Sessions, whose confirmation hearings began three days before the order, was already coming under intense scrutiny.

The implementation of the order may also tie into Yates's efforts to remove Gen. Michael Flynn over his call with the Russian ambassador.

Trump ignored the succession order, as he is legally allowed to do, and instead appointed Dana Boente, the U.S. attorney for the Eastern District of Virginia, as acting attorney general on Jan. 30, 2017, the same day Yates was fired.

Trump issued a new executive order on Feb. 9, 2017, the same day Sessions was sworn in, reversing Obama's prior order.

On March 10, 2017, Trump fired 46 Obama-era U.S. attorneys, including Preet Bharara, the U.S. attorney in Manhattan. These firings appear to have been unexpected.

Media

In some respects, the media has played the most disingenuous of roles. Areas of investigation that historically would have proven irresistible to reporters of the past have been steadfastly ignored. False narratives have been all-too-willingly promoted and facts ignored. Fusion GPS personally made a series of payments to several as-of-yet- unnamed reporters .

The majority of the mainstream media has represented positions of the DNC and the Clinton campaign.

Steele met with members of certain media with relative frequency. In September 2016 , he met with a number of U.S. journalists for "The New York Times, the Washington Post, Yahoo! News, the New Yorker and CNN," according to The Guardian. It was during this period that Steele met with Michael Isikoff of Yahoo News.

In mid-October 2016, Steele returned to New York and met with reporters again. Toward the end of October, Steele spoke via Skype with Mother Jones reporter David Corn.

Leaking, including felony leaking of classified information, has been widespread. The Carter Page FISA warrant -- likely the unredacted version -- has been in the possession of The Washington Post and The New York Times since March 2017. Traditionally, the intelligence community leaked to The Washington Post while the DOJ leaked to sources within The New York Times. This was a historical pattern that stood until this election. The leaking became so widespread, even this tradition was broken.

On April 3, 2017, BuzzFeed reporter Ali Watkins wrote the article " A Former Trump Adviser Met With a Russian Spy ." In the article, she identified "Male-1," referred to in court documents relating to the case of Russian spy Evgeny Buryakov, as Trump campaign adviser Carter Page, who had provided the FBI with assistance in the case. Just over a week later, on April 11, 2017, a Washington Post article, " FBI Obtained FISA Warrant to Monitor Former Trump Adviser Carter Page ," confirmed the existence of the October 2016 Page FISA warrant.

The information contained within both articles likely came via felony leaks from James Wolfe, former director of security for the Senate Select Committee on Intelligence, who was arrested on June 7, 2018, and charged with one count of lying to the FBI. Wolfe's indictment alleges that he was leaking classified information to multiple reporters over an extended period of time.

Reporter Ali Watkins likely received the undredacted FISA application on Carter Page from James Wolfe.
It appears probable that Wolfe leaked unredacted copies of the Page FISA application. According to the indictment , Wolfe exchanged 82 text messages with Watkins on March 17, 2017. That same evening they engaged in a 28-minute phone call. The original Page FISA application is 83 pages long, including one final signatory page.

In the public version of the application, there are 37 fully redacted pages. In addition to that, several other pages have redactions for all but the header. There are only two pages in the entire document that contain no redactions.

Why would Wolfe bother to send 37 pages of complete redactions? It seems more than plausible that Wolfe took pictures of the original unredacted FISA application and sent them by text to Watkins.

House Intelligence Committee Chairman Devin Nunes has repeatedly stated that evidence within the FISA application shows the counterintelligence agencies were abused by the Obama administration. Most of the mainstream media has known this.

Despite this, most major news organizations for over two years have promoted the Russia-collusion narrative. Despite ample evidence having come out to the contrary, they have not admitted they were wrong, likely because doing so would mean they would have to admit their complicity.

Foreign Intelligence

UK and Australian intelligence agencies also played meaningful roles during the 2016 presidential election.

Britain's GCHQ was involved in collecting information regarding then-candidate Trump and transmitting it to the United States. In the summer of 2016, Robert Hannigan, the head of GCHQ, flew from London to meet personally with then-CIA Director John Brennan, The Guardian reported.

Former GCHQ head Robert Hannigan in this file photo. Hannigan transmitted information regarding Donald Trump to John Brennan in the summer of 2016. (Romeo Gacad/AFP/Getty Images)

Hannigan's meeting was noteworthy because Brennan wasn't Hannigan's counterpart. That position belonged to NSA Director Mike Rogers. In the following year, Hannigan abruptly announced his retirement on Jan. 23, 2017 -- three days after Trump's inauguration.

As GCHQ was gathering intelligence, low-level Trump campaign foreign-policy adviser George Papadopoulos appears to have been targeted after a series of highly coincidental meetings. Maltese professor Josef Mifsud, Australian diplomat Alexander Downer, FBI informant Stefan Halper, and officials from the UK's Foreign and Commonwealth Office (FCO) all crossed paths with Papadopoulos -- some repeatedly so.

Christopher Steele, who authored the dossier on Trump, was an MI6 agent while the agency was headed by Sir Richard Dearlove. Steele retains close ties with Dearlove.

Dearlove has ties to most of the parties mentioned. It was he who advised Steele and his business partner, Chris Burrows, to work with a top British government official to pass along information to the FBI in the fall of 2016. He also was a speaker at the July 2016 Cambridge symposium that Halper invited Carter Page to attend.

Dearlove knows Halper through their mutual association at the Cambridge Intelligence Seminar. Dearlove also knows Sir Iain Lobban, a former head of GCHQ, who is an advisory board member at British strategic intelligence and advisory firm Hakluyt , which was founded by former MI6 members and retains close ties to UK intelligence services.

Halper has historical connections to Hakluyt through Jonathan Clarke, with whom he has co-authored two books.

Downer, who met Papadopoulos in a May 2016 meeting established through a chain of two intermediaries, served on the advisory board of Hakluyt from 2008 to 2014. He reportedly still maintains contact with Hakluyt officials. Information from his meeting with Papadopoulos was later used by the FBI to establish the bureau's counterintelligence investigation into Trump–Russia collusion. Downer has changed his version of events multiple times.

The Steele dossier was fed into U.S. channels through several different sources. One such source was Sir Andrew Wood, the former British ambassador to Russia, who had been briefed about the dossier by Steele. Wood later relayed information regarding the dossier to Sen. John McCain, who dispatched David Kramer, a fellow at the McCain Institute, to London to meet with Steele in November 2016. McCain would later admit in a Jan. 11, 2017, statement that he had personally passed on the dossier to then-FBI Director James Comey.

Trump, after issuing an order for the declassification of documents and text messages related to the Russia-collusion investigations -- including parts of the Carter Page FISA warrant application -- received phone calls from two U.S. allies saying, "Please, can we talk." Those "allies" were almost certainly the UK and Australia.

In a Twitter post , Trump wrote that the "key Allies called to ask not to release" the documents.

Questions to be asked are why is it that two of our allies would find themselves so opposed to the release of these classified documents that a coordinated plea would be made directly to the president? And why would these same allies have even the slightest idea of what was contained in these classified U.S. documents?

Britain and Australia appear to know full well what those documents contain, and their attempt to prevent their public release appears to be because they don't want their role in events surrounding the 2016 presidential election to be made public.

Fusion GPS/Orbis/Christopher Steele

Glenn Simpson, a former Wall Street Journal reporter, is co-founder of Fusion GPS, along with Peter Fritsch and Tom Catan. Fusion was hired by the DNC and the Clinton campaign through law firm Perkins Coie to produce and disseminate the Steele dossier used against Trump. The dossier would later be the primary evidence used to obtain a FISA warrant on Carter Page on Oct. 21, 2016.

The company was hired by the Clinton campaign and the DNC–through law firm Perkins Coie–to produce the dossier on Trump.

Christopher Steele, who retains close ties to UK intelligence, worked for MI6 from 1987 until his retirement in 2009, when he and his partner, Chris Burrows, founded Orbis Intelligence. Steele maintains contact with British intelligence, Sir Richard Dearlove , and UK intelligence firm Hakluyt.

Steele appears to have been represented by lawyer Adam Waldman, who also represented Russian oligarch Oleg Deripaska. We know this from texts sent by Waldman. On April 10, 2017, Waldman sent this to Sen. Mark Warner:

"Hi. Steele: would like to get a bi partisan letter from the committee; Assange: I convinced him to make serious and important concessions and am discussing those w DOJ; Deripaska: willing to testify to congress but interested in state of play w Manafort. I will be with him next tuesday for a week."

Steele also appears to have lobbied on behalf of Deripaska, who was discussed in emails between Bruce Ohr and Steele that were recently disclosed by the Washington Examiner:

"Steele said he was 'circulating some recent sensitive Orbis reporting' on Deripaska that suggested Deripaska was not a 'tool' of the Kremlin. Steele said he would send the reporting to a name that is redacted in the email."

Fusion GPS was also employed by Russian lawyer Natalia Veselnitskaya in a previous case. Veselnitskaya was involved in litigation pitting Russian firm Prevezon Holdings against British-American financier William Browder. Veselnitskaya hired U.S. law firm BakerHostetler, who, in turn, hired Fusion GPS to dig up dirt on Browder. Veselnitskaya was one of the participants at the June 2016 Trump Tower meeting, at which she discussed the Magnitsky Act .

Fox News reported on Nov. 9, 2017, that Simpson met with Veselnitskaya immediately before and after the Trump Tower meeting.

A declassified top-secret Foreign Intelligence Surveillance Court report released on April 26, 2017, revealed that government agencies, including the FBI, CIA, and NSA, had improperly accessed Americans' communications. The FBI specifically provided outside contractors with access to raw surveillance data on American citizens without proper oversight.

Communications and other data of members of the Trump campaign may have been accessed in this way.


Nellie Ohr, the wife of high-ranking DOJ official Bruce Ohr, was hired by Fusion GPS to work on the dossier on Trump.

Bruce and Nellie Ohr have known Simpson since at least 2010 and have known Steele since at least 2006. The Ohrs and Simpson worked together on a DOJ report in 2010 . In that report, Nellie Ohr's biography lists her as working for Open Source Works, which is part of the CIA. Simpson met with Bruce Ohr before and after the 2016 election.

Bruce Ohr had been in contact repeatedly with Steele during the 2016 presidential campaign -- while Steele was constructing his dossier. Ohr later actively shared information he received from Steele with the FBI, after the agency had terminated Steele as a source. Interactions between Ohr and Steele stretched for months into the first year of Trump's presidency and were documented in a number of FD-302s -- memos that summarize interviews with him by the FBI.

Spy Traps

In an effort to put forth evidence of collusion between the Trump campaign and Russia, it appears that several different spy traps were set, with varying degrees of success. Many of these efforts appear to center around Trump campaign adviser George Papadopoulos and involve London-based professor Joseph Mifsud, who has ties to Western intelligence, particularly in the UK.

Papadopoulos and Mifsud both worked at the London Centre of International Law Practice (LCILP). Mifsud appears to have joined LCILP around November 2015 . Papadopoulos reportedly joined LCILP sometime in late February 2016 after leaving Ben Carson's presidential campaign. However, some reports indicate Papadopoulos joined LCILP in November or December of 2015. Mifsud and Papadopoulos reportedly never crossed paths until March 14, 2016, in Italy.

Mifsud introduced Papadopoulos to several Russians, including Olga Polonskaya, whom Mifsud introduced as "Putin's niece," and Ivan Timofeev, an official at a state-sponsored think tank called the Russian International Affairs Council. Both Papadopoulos and Mifsud were interviewed by the FBI. Papadopoulos was ultimately charged with a process crime and was recently sentenced to 14 days in prison for lying to the FBI. Mifsud was never charged by the FBI.

Throughout this period, Papadopoulos continuously pushed for meetings between Trump campaign officials and Russian contacts but was ultimately unsuccessful in establishing any meetings.

Papadopoulos met with Australian diplomat Alexander Downer on May 10, 2016. The Papadopoulos–Downer meeting has been portrayed as a chance encounter in a bar. That does not appear to be the case.

Papadopoulos was introduced to Downer through a chain of two intermediaries who said Downer wanted to meet with Papadopoulos. Another individual happened to be in London at exactly the same time: the FBI's head of counterintelligence, Bill Priestap. The purpose of Priestap's visit remains unknown.

The Papadopoulos–Downer meeting was later used to establish the FBI's counterintelligence investigation into Trump–Russia collusion. It was repeatedly reported that Papadopoulos told Downer that Russia had Hillary Clinton's emails. This is incorrect.

Foreign policy adviser to the Trump campaign was approached by several individuals with ties to UK and U.S. intelligence agencies. (Mandel Ngan/AFP/Getty Images)

According to Downer, Papadopoulos at some point mentioned the Russians had damaging information on Hillary Clinton.

"During that conversation, he [Papadopoulos] mentioned the Russians might use material that they have on Hillary Clinton in the lead-up to the election, which may be damaging,'' Downer told The Australian about the Papadopoulos meeting in an April 2018 article. "He didn't say dirt, he said material that could be damaging to her. No, he said it would be damaging. He didn't say what it was."

Downer, while serving as Australia's foreign minister, was responsible for one of the largest foreign donations to the Clinton Foundation: $25 million from the Australian government.

Unconfirmed media reports, including a Jan. 12, 2017, BBC article , have suggested that the FBI attempted to obtain two FISA warrants in June and July 2016 that were denied by the FISA court. It's likely that Papadopoulos was an intended target of these failed FISAs.

Interestingly, there is no mention of Papadopoulos in the Steele dossier. Paul Manafort, Carter Page, former Trump lawyer Michael Cohen, Gen. Michael Flynn, and former Trump campaign manager Corey Lewandowski are all listed in the Steele dossier.

Papadopoulos may have started out assisting the FBI or CIA and later discovered that he was being set up for surveillance himself.

After failing to obtain a spy warrant on the Trump campaign using Papadopoulos, the FBI set its sights on campaign volunteer Carter Page. By this time, the counterintelligence investigation was in the process of being established, and we know now that it was formalized with no official intelligence. The FBI needed some sort of legal cover. They needed a retroactive warrant. And they got one on Oct. 21, 2016. The Page FISA warrant would be renewed three times and remain in force until September 2017.

Stefan Halper met with Page for the first time on July 11, 2016, at a Cambridge symposium , just three days after Page's July 2016 Moscow trip. As noted previously, former MI6 head Sir Richard Dearlove was a speaker at the symposium. Halper and Dearlove have known each other for years and maintain several mutual associations.

Page was already known to the FBI. The Page FISA warrant application references the Buryakov spy case and an FBI interview with Page. Current information suggests there was only one meeting between Page and the FBI in 2016. It happened on March 2, 2016. It was in relation to Victor Podobnyy, who was named in the Buryakov case.

Page, who cooperated with the FBI on the case, almost certainly was providing testimony or details against Podobnyy. Page had been contacted by Podobnyy in 2013 and had previously provided information to the FBI. Buryakov pleaded guilty on March 11, 2016 -- nine days after Page met with the FBI on the case -- and was sentenced to 30 months in prison on May 25, 2016. On April 5, 2017, Buryakov was granted early release and was deported to Russia.

FBI informant Stefan Halper approached Trump campaign advisers George Papadopoulos and Carter Page.

House Intelligence Committee Chairman Devin Nunes said in August that exculpatory evidence on Page exists that wasn't included by the DOJ and the FBI in the FISA application and subsequent renewals. The exculpatory evidence likely relates specifically to Page's role in the Buryakov case.

If the FBI failed to disclose Page's cooperation with the bureau or materially misrepresented his involvement in its application to the FISA Court, it means that the FBI's Woods procedures, which govern FISA applications, were violated.

Page has not been arrested or charged with any crime related to the investigation.

FISA Abuse

Admiral Mike Rogers, while director of the NSA, was personally responsible for uncovering an unprecedented level of FISA abuse that would later be documented in a 99-page unsealed FISA court ruling . As the FISA court noted in the April 26, 2017, ruling, the abuses had been occurring since at least November 2015:

"The FBI had disclosed raw FISA information, including but not limited to Section 702-acquired information, to private contractors.

"Private contractors had access to raw FISA information on FBI storage systems.

"Contractors had access to raw FISA information that went well beyond what was necessary to respond to the FBI's requests."

The FISA Court report is particularly focused on the FBI:

"The Court is concerned about the FBI's apparent disregard of minimization rules and whether the FBI may be engaging in similar disclosures of raw Section 702 information that have not been reported."

The FISA Court disclosed that illegal NSA database searches were endemic. Private contractors, employed by the FBI, were given full access to the NSA database. Once in the contractors' possession, the data couldn't be traced.

In April 2016, after Rogers became aware of improper contractor access to raw FISA data on March 9, 2016, he directed the NSA's Office of Compliance to conduct a "fundamental baseline review of compliance associated with 702."

On April 18, 2016, Rogers shut down all outside contractor access to raw FISA information -- specifically outside contractors working for the FBI.

Then-NSA Director Adm. Mike Rogers on May 23, 2017. Rogers uncovered widespread abuse of FISA data by the FBI. (Saul Loeb/AFP/Getty Images)

DOJ National Security Division (NSD) head John Carlin filed the government's proposed 2016 Section 702 certifications on Sept. 26, 2016. Carlin knew the general status of compliance review by Rogers. The NSD was part of the review. Carlin failed to disclose a critical Jan. 7, 2016, report by the Office of the Inspector General and associated FISA abuse to the FISA Court in his 2016 certification. Carlin also failed to disclose Rogers's ongoing Section 702 compliance review.

The following day, on Sept. 27, 2016, Carlin announced his resignation, effective Oct. 15, 2016.

After receiving a briefing by the NSA compliance officer on Oct. 20, 2016, detailing numerous "about query" violations from the 702 NSA compliance audit, Rogers shut down all "about query" activity the next day and reported his findings to the DOJ. "About queries" are searches based on communications containing a reference "about" a surveillance target but that are not "to" or "from" the target.

On Oct. 21, 2016, the DOJ and the FBI sought and received a Title I FISA probable-cause order authorizing electronic surveillance on Carter Page from the FISA Court.

At this point, the FISA Court was still unaware of the Section 702 violations.

On Oct. 24, 2016, Rogers verbally informed the FISA Court of his findings. On Oct. 26, 2016, Rogers appeared formally before the FISA Court and presented the written findings of his audit.

The FISA Court had been unaware of the query violations until they were presented to the court by Rogers.

Carlin didn't disclose his knowledge of FISA abuse in the annual Section 702 certifications in order to avoid raising suspicions at the FISA Court ahead of receiving the Page FISA warrant.

The FBI and the NSD were literally racing against Rogers's investigation in order to obtain a FISA warrant on Carter Page.

While all this was transpiring, DNI James Clapper and Defense Secretary Ash Carter submitted a recommendation that Rogers be removed from his post as NSA director.

The move to fire Rogers, which ultimately failed, originated sometime in mid-October 2016 -- exactly when Rogers was preparing to present his findings to the FISA Court.

The Insurance Policy

Ever since the release of FBI text messages revealing the existence of an "insurance policy," the term has been the subject of wide speculation.

Some observers have suggested that the insurance policy was the FISA spy warrant used to monitor Trump campaign adviser Carter Page and, by extension, other members of the Trump campaign. This interpretation is too narrow and fails to capture the underlying meaning of the text.

The insurance policy was the actual process of establishing the Trump–Russia collusion narrative.

It encompassed actions undertaken in late 2016 and early 2017, including the leaking of the Steele dossier and James Clapper's leaks of James Comey's briefing to President Trump. The intent behind these actions was simple. The legitimization of the investigation into the Trump campaign.

The strategy involved the recusal of Trump officials with the intent that Andrew McCabe would end up running the investigation.

The Steele dossier, which was paid for by the Clinton presidential campaign and the Democratic National Committee, served as the foundation for the Russia narrative.

The intelligence community, led by CIA Director John Brennan and DNI James Clapper, used the dossier as a launching pad for creating their Intelligence Community assessment.

This report, which was presented to Obama in December 2016, despite NSA Director Mike Rogers having only moderate confidence in its assessment, became one of the core pieces of the narrative that Russia interfered with the 2016 elections.

Through intelligence community leaks, and in collusion with willing media outlets, the narrative that Russia helped Trump win the elections was aggressively pushed throughout 2017.

Spygate

Spygate represents the biggest political scandal in our nation's history. A sitting administration actively colluded with a political campaign to affect the outcome of a U.S. presidential election. Government agencies were weaponized and a complicit media spread intelligence community leaks as facts.

But a larger question remains: How long has the United States been subject to interference from the intelligence community and our political agencies? Was the 2016 presidential election a one-time aberration, or is this episode symptomatic of a larger pattern extending back decades?

The intensity, scale, and coordination suggest something greater than overzealous actions taken during a single election. They represent a unified reaction of the establishment to a threat posed by a true outsider -- a reaction that has come to be known as Spygate.

Jeff Carlson is a regular contributor to The Epoch Times. He also runs the website TheMarketsWork.com and can be followed on Twitter @themarketswork.

[Mar 24, 2019] The manner in which Guccifer 2.0's English was broken, did not follow the typical errors one would expect if Guccifer 2.0's first language was Russian.

Highly recommended!
Notable quotes:
"... "After reading several articles, it seemed clear that key difficulties for Russians communicating in English include: definite and indefinite articles, the use of presuppositions and correct usage of say/tell and said/told. Throughout 2017, I constructed a corpus of Guccifer 2.0's communications and analyzed the frequency of different types of mistakes. The results of this work corroborate Professor Connolly's assessment. ..."
"... Overall, it appears Guccifer 2.0 could communicate in English quite well but chose to use inconsistently broken English at times in order to give the impression that it wasn't his primary language. The manner in which Guccifer 2.0's English was broken, did not follow the typical errors one would expect if Guccifer 2.0's first language was Russian. ..."
"... Access and motive . . .here are two who had both: Seth Rich and Imran Awan. That our fake news organizations have no interest in either, that should tell you something. ..."
Mar 24, 2019 | www.zerohedge.com

Tunga , 2 hours ago link

"I didn't really address the case that Russia hacked the DNC, content to stipulate it for now." - exce

The State Department paused its investigation of the Secretary's emails so as not to interfere with the Mueller investigation. Here we see Taibbi writes an exhaustive condemnation of the Western press while leaving out the very crux of the story, the very source of the stolen DNC emails was Clapper and Brennan pretending to be Guccifer 2.0.

Pitiful attempt at redemption there Matt. Seriously, go **** your self.

"After reading several articles, it seemed clear that key difficulties for Russians communicating in English include: definite and indefinite articles, the use of presuppositions and correct usage of say/tell and said/told. Throughout 2017, I constructed a corpus of Guccifer 2.0's communications and analyzed the frequency of different types of mistakes. The results of this work corroborate Professor Connolly's assessment.

Overall, it appears Guccifer 2.0 could communicate in English quite well but chose to use inconsistently broken English at times in order to give the impression that it wasn't his primary language. The manner in which Guccifer 2.0's English was broken, did not follow the typical errors one would expect if Guccifer 2.0's first language was Russian.

To date, Connolly's language study has not drawn any significant objections or criticism."

https://www.zerohedge.com/news/2018-12-25/guccifer-20-game-over-year-end-review-0

Any G Dala,

DNC emails were downloaded at 22.3Mbs, a speed which is not possible to achieve remotely, or even local. It is the exact download speed of a thumb drive.

All russian "fingerprints" were embedded in error codes, which had to be affirmatively copied. They were not an accident.

And please remind me, who exactly was it that examined the DNC servers and pointed at Russia?

Access and motive . . .here are two who had both: Seth Rich and Imran Awan. That our fake news organizations have no interest in either, that should tell you something.

[Mar 20, 2019] Wasserman Schultz Proves She's A Sociopath - Lies About Venezuela

Mar 20, 2019 | www.unz.com

Tina Smith 3 days ago Only reason she's not already in prison is because she's a useful Military Industrial Complex tool.

Cant_Touch_This 3 days ago DWS rigged in order to win her district just like she rigged against Bernie Sanders on behalf of Hilary Clinton.

Daniel Clint 3 days ago Remove the sanctions you psychopaths. DWS belongs in jail.

[Mar 17, 2019] Mueller uses the same old false flag scams, just different packaging of his forensics-free findings

Highly recommended!
Notable quotes:
"... It appears the FBI, CIA, and NSA have great difficulty in differentiating between Russians and Democrats posing as Russians. ..."
"... Maybe the VIPS should look into the murder of Seth Rich, the DNC staffer who had the security clearance required to access the DNC servers, and who was murdered in the same week as the emails were taken. In particular, they should ask why the police were told to stand down and close the murder case without further investigation. ..."
"... What a brilliant article, so logical, methodical & a forensic, scientific breakdown of the phony Russiagate project? And there's no doubt, this was a co-ordinated, determined Intelligence project to reverse the results of the 2016 Election by initiating a soft coup or Regime change op on a elected Leader, a very American Coup, something the American Intelligence Agencies specialise in, everywhere else, on a Global scale, too get Trump impeached & removed from the Whitehouse? ..."
"... Right. Since its purpose is to destroy Trump politically, the investigation should go on as long as Trump is in office. Alternatively, if at this point Trump has completely sold out, that would be another reason to stop the investigation. ..."
"... Nancy Pelosi's announcement two days ago that the Democrats will not seek impeachment for Trump suggests the emptiness of the Mueller investigation on the specific "collusion" issue. ..."
"... We know and Assange has confirmed Seth Rich, assassinated in D.C. for his deed, downloaded the emails and most likely passed them on to former British ambassador Craig Murray in a D.C. park for transport to Wikileaks. ..."
"... This so-called "Russiagate" narrative is an illustration of our "freedom of the press" failure in the US due to groupthink and self censorship. He who pays the piper is apt to call the tune. ..."
"... Barr, Sessions, every congressmen all the corporate MSM war profiteer mouth pieces. They all know that "Russia hacked the DNC" and "Russia meddled" is fabricated garbage. They don't care, because their chosen war beast corporate candidate couldn't beat Donald goofball Trump. So it has to be shown that the war beast only lost because of nefarious reasons. Because they're gonna run another war beast cut from the same cloth as Hillary in 2020. ..."
"... Mar 4, 2019 Tom Fitton: President Trump a 'Crime Victim' by Illegal Deep State DOJ & FBI Abuses: https://youtu.be/ixWMorWAC7c ..."
"... Trump is a willing player in this game. The anti-Russian Crusade was, quite simply, a stunningly reckless, short-sighted effort to overturn the 2016 election, removing Trump to install Hillary Clinton in office. ..."
"... Much ado about nothing. All the talk and chatter and media airplay about "Russian meddling" in the 2016 election only tells me that these liars think the American public is that stupid. ..."
"... Andrew Thomas I'm afraid that huge amounts of our History post 1947 is organized and propagandized disinformation. There is an incredible page that John Simpkin has organized over the years that specifically addresses individuals, click on a name and read about them. https://spartacus-educational.com/USAdisinformation.htm ..."
"... It's pretty astonishing that Mueller was more interested in Roger Stone and Jerome Corsi as credible sources about Wikileaks and the DNC release than Craig Murray! ..."
"... Yes, he has done his job. And his job was to bring his royal Orangeness to heel, and to make sure that detente and co-operation with Russia remained impossible. The forever war continues. Mission Accomplished. ..."
Mar 17, 2019 | consortiumnews.com

O Society , March 16, 2019 at 7:55 am

The Truth is Out There. I Want to Believe!

Same old scams, different packaging. That's New & Improved for you.

http://opensociet.org/2019/03/16/the-return-of-the-hidden-persuaders

Raymond Comeau , March 15, 2019 at 12:35 pm

I could not suffer through reading the whole article. This is mainly because I have watched the news daily about Mueller's Investigation and I sincerely believe that Mueller is Champion of the Democrats who are trying to depose President Donald Trump at any cost.

For what Mueller found any decent lawyer with a Degree and a few years of experience could have found what Mueller found for far far less money. Mueller only found common crimes AND NO COLLUSION BETWEEN PRESIDENT TRUMP AND PUTIN!

The Mueller Investigation should be given to an honest broker to review, and Mueller should be paid only what it would cost to produce the commonplace crimes Mueller, The Democrats, and CNN has tried to convince the people that indeed Trump COLLUDED with RUSSIA. Mueller is, a BIG NOTHING BURGER and THE DEMOCRATS AND CNN ARE MUELLER'S SINGING CANARYS! Mueller should be jailed.

Bogdan Miller , March 15, 2019 at 11:04 am

This article explains why the Mueller Report is already highly suspect. For another thing, we know that since before 2016, Democrats have been studying Russian Internet and hacking tactics, and posing as Russian Bots/Trolls on Facebook and other media outlets, all in an effort to harm President Trump.

It appears the FBI, CIA, and NSA have great difficulty in differentiating between Russians and Democrats posing as Russians.

B.J.M. Former Intelligence Analyst and Humint Collector

vinnieoh , March 15, 2019 at 8:17 am

Moving on: the US House yesterday voted UNANIMOUSLY (remember that word, so foreign these days to US governance?) to "urge" the new AG to release the complete Mueller report.

A non-binding resolution, but you would think that the Democrats can't see the diesel locomotive bearing down on their clown car, about to smash it to pieces. The new AG in turn says he will summarize the report and that is what we will see, not the entire report. And taxation without representation takes a new twist.

... ... ...

Raymond Comeau , March 15, 2019 at 12:38 pm

What else would you expect from two Political Parties who are really branches of the ONE Party which Represents DEEP STATE".

DWS , March 15, 2019 at 5:58 am

Maybe the VIPS should look into the murder of Seth Rich, the DNC staffer who had the security clearance required to access the DNC servers, and who was murdered in the same week as the emails were taken. In particular, they should ask why the police were told to stand down and close the murder case without further investigation.

Raymond Comeau , March 15, 2019 at 12:47 pm

EXACTLY! But, Deep State will not allow that. And, it would ruin the USA' plan to continue to invade more sovereign countries and steal their resources such as oil and Minerals. The people of the USA must be Ostriches or are so terrified that they accept anything their Criminal Governments tell them.

Eventually, the chickens will come home to roost and perhaps the USA voters will ROAST when the crimes of the USA sink the whole country. It is time for a few Brave Men and Women to find their backbones and throw out the warmongers and their leading Oligarchs!

KiwiAntz , March 14, 2019 at 6:44 pm

What a brilliant article, so logical, methodical & a forensic, scientific breakdown of the phony Russiagate project? And there's no doubt, this was a co-ordinated, determined Intelligence project to reverse the results of the 2016 Election by initiating a soft coup or Regime change op on a elected Leader, a very American Coup, something the American Intelligence Agencies specialise in, everywhere else, on a Global scale, too get Trump impeached & removed from the Whitehouse?

If you can't get him out via a Election, try & try again, like Maduro in Venezuela, to forcibly remove the targeted person by setting him up with fake, false accusations & fabricated evidence? How very predictable & how very American of Mueller & the Democratic Party. Absolute American Corruption, corrupts absolutely?

Brian Murphy , March 15, 2019 at 10:33 am

Right. Since its purpose is to destroy Trump politically, the investigation should go on as long as Trump is in office. Alternatively, if at this point Trump has completely sold out, that would be another reason to stop the investigation.

If the investigation wraps up and finds nothing, that means Trump has already completely sold out. If the investigation continues, it means someone important still thinks Trump retains some vestige of his balls.

DH Fabian , March 14, 2019 at 1:19 pm

By last June or July the Mueller investigation has resulted in roughly 150 indictments for perjury/financial crimes, and there was a handful of convictions to date. The report did not support the Clinton wing's anti-Russian allegations about the 2016 election, and was largely brushed aside by media. Mueller was then reportedly sent back in to "find something." presumably to support the anti-Russian claims.

mike k , March 14, 2019 at 12:57 pm

From the beginning of the Russia did it story, right after Trump's electoral victory, it was apparent that this was a fraud. The democratic party however has locked onto this preposterous story, and they will go to their graves denying this was a scam to deny their presidential defeat, and somehow reverse the result of Trump's election. My sincere hope is that this blatant lie will be an albatross around the party's neck, that will carry them down into oblivion. They have betrayed those of us who supported them for so many years. They are in many ways now worse than the republican scum they seek to replace.

DH Fabian , March 14, 2019 at 1:26 pm

Trump is almost certain to be re-elected in 2020, and we'll go through this all over again.

Tom , March 14, 2019 at 12:00 pm

The very fact that the FBI never had access to the servers and took the word of a private company that had a history of being anti-Russian is enough to throw the entire ruse out.

LJ , March 14, 2019 at 2:39 pm

Agreed!!!! and don't forget the FBI/Comey gave Hillary and her Campaign a head's up before they moved to seize the evidence. . So too, Comey said he stopped the Investigation , thereby rendering judgement of innocence, even though by his own words 'gross negligence' had a occurred (which is normally considered grounds for prosecution). In doing so he exceeded the FBI's investigative mandate. He rationalized that decision was appropriate because of the appearance of impropriety that resulted from Attorney General Lynch having a private meeting on a plane on a runway with Bill and Hillary . Where was the logic in that. Who called the meeting? All were Lawyers who had served as President, Senator, Attorney General and knew that the meeting was absolutely inappropriate. . Comey should be prosecuted if they want to prosecute anyone else because of this CRAP. PS Trump is an idiot. Uhinfortunately he is just a symptom of the disease at this point. Look at the cover of Rolling Stone magazine , carry a barf bag.

Jane Christ , March 14, 2019 at 6:51 pm

Exactly. This throws doubt on the ability of the FBI to work independently. They are working for those who want to cover -up the Hillary mess . She evidently has sufficient funds to pay them off. I am disgusted with the level of corruption.

hetro , March 14, 2019 at 10:50 am

Nancy Pelosi's announcement two days ago that the Democrats will not seek impeachment for Trump suggests the emptiness of the Mueller investigation on the specific "collusion" issue. If there were something hot and lingering and about to emerge, this decision is highly unlikely, especially with the reasoning she gave at "so as not to divide the American people." Dividing the people hasn't been of much concern throughout this bogus witch hunt on Trump, which has added to his incompetence in leavening a growing hysteria and confusion in this country. If there is something, anything at all, in the Mueller report to support the collusion theory, Pelosi would I'm sure gleefully trot it out to get a lesser candidate like Pence as opposition for 2020.

James Clooney , March 14, 2019 at 11:17 am

We know and Assange has confirmed Seth Rich, assassinated in D.C. for his deed, downloaded the emails and most likely passed them on to former British ambassador Craig Murray in a D.C. park for transport to Wikileaks.

We must also honor Shawn Lucas assassinated for serving DNC with a litigation notice exposing the DNC conspiracy against Sanders.

hetro , March 14, 2019 at 3:18 pm

Where has Assange confirmed this? Assange's long-standing position is NOT to reveal his sources. I believe he has continued to honor this position.

Skip Scott , March 15, 2019 at 7:15 am

It has merely been insinuated by the offering of a reward for info on Seth's murder. In one breath he says wikileaks will never divulge a source, and in the next he offers a $20k reward saying that sources take tremendous risk. Doesn't take much of a logical leap to connect A to B.

DH Fabian , March 14, 2019 at 1:30 pm

Are you aware that Democrats split apart their 0wn voting base in the 1990s, middle class vs. poor? The Obama years merely confirmed that this split is permanent. This is particularly relevant for Democrats, as their voting base had long consisted of the poor and middle class, for the common good. Ignoring this deep split hasn't made it go away.

hetro , March 14, 2019 at 3:24 pm

Even more important is how the Democrats have sold out to an Establishment view favoring neocon theory, since at least Bill Clinton. Pelosi's recent behavior with Ilhan Omar confirms this and the split you're talking about. My point is it is distinctly odd that Pelosi is discouraging impeachment on "dividing the Party" (already divided, of course, as you say), whereas the Russia-gate fantasy was so hot not that long ago. Again it points to a cynical opportunism and manipulation of the electorate. Both parties are a sad excuse to represent ordinary people's interests.

Skip Scott , March 15, 2019 at 7:21 am

She said "dividing the country", not the party. I think she may have concerns over Trump's heavily armed base. That said, the statement may have been a ruse. There are plenty of Republicans that would cross the line in favor of impeachment with the right "conclusions" by Mueller. Pelosi may be setting up for a "bombshell" conclusion by Mueller. One must never forget that we are watching theater, and that Trump was a "mistake" to be controlled or eliminated.

Cindy Haddix , March 14, 2019 at 8:04 am

Mueller should be ashamed that he has made President Trump his main concern!! If all this investigation would stop he could save America millions!!! He needs to quit this witch-hunt and worry about things that really need to be handled!!! If the democrats and Trump haters would stop pushing senseless lies hopefully this would stop ? It's so disgusting that his democrat friend was never really investigated ? stop the witch-hunt and move forward!!!!

torture this , March 14, 2019 at 7:29 am

According to this letter, mistakes might have been made on Rachel Maddow's show. I can't wait to read how she responds. I'd watch her show, myself except that it has the same effect on me as ipecac.

Zhu , March 14, 2019 at 3:37 am

People will cling to "Putin made Trump President!!!" much as many cling "Obama's a Kenyan Muslim! Not a real American!!!". Both nut theories are emotionally satisfying, no matter what the historical facts are. Many Americans just can't admit their mistakes and blaming a scapegoat is a way out.

O Society , March 14, 2019 at 2:03 am

Thank you VIPS for organizing this legit dissent consisting of experts in the field of intelligence and computer forensics.

This so-called "Russiagate" narrative is an illustration of our "freedom of the press" failure in the US due to groupthink and self censorship. He who pays the piper is apt to call the tune.

It is astounding how little skepticism and scientifically-informed reasoning goes on in our media. These folks show themselves to be native advertising rather than authentic journalists at every turn.

DH Fabian , March 14, 2019 at 1:33 pm

But it has been Democrats and the media that market to middle class Dems, who persist in trying to sell the Russian Tale. They excel at ignoring the evidence that utterly contradicts their claims.

O Society , March 15, 2019 at 3:50 pm

Oh, we're well beyond your "Blame the middle class Dems" stage.

The WINNING!!! team sports bullshit drowns the entire country now the latrine's sprung a leak. People pretend to live in bubbles made of blue or red quite like the Three Little Pigs, isn't it? Except instead of a house made of bricks saving the day for the littlepiggies, what we've got here is a purple puddle of piss.

Everyone's more than glad to project all our problems on "THEM" though, aren't we?

Meanwhile, the White House smells like a urinal not washed since the 1950s and simpletons still get their rocks off arguing about whether Mickey Mouse can beat up Ronald McDonald.

T'would be comic except what's so tragic is the desperate need Americans have to believe, oh just believe! in something. Never mind the sound of the jackhammer on your skull dear, there's an app for that or is it a pill?

I don't know, don't ask me, I'm busy watching TV. Have a cheeto.

https://opensociet.org/2018/12/18/the-disneyfication-of-america/

Sam F , March 13, 2019 at 6:45 pm

Very good analysis clearly stated, especially adding the FAT timestamps to the transmission speeds.

Minor corrections: "The emails were copied from the network" should be "from the much faster local network" because this is to Contradict the notion that they were copied over the internet network, which most readers will equate with "network." Also "reportedin" should be "reported in."

Michael , March 13, 2019 at 6:25 pm

It is likely that New Knowledge was actually "the Russians", possibly working in concert with Crowdstrike. Once an intelligence agency gets away with something like pretending to be Russian hackers and bots, they tend to re-use their model; it is too tempting to discard an effective model after a one-off accomplishment. New Knowledge was caught interfering/ determining the outcome in the Alabama Senate race on the side of Democrat Doug Jones, and claimed they were merely trying to mimic Russian methods to see if they worked (they did; not sure of their punishment?). Occam's razor would suggest that New Knowledge would be competent to mimic/ pretend to be "Russians" after the fact of wikileaks' publication of emails. New Knowledge has employees from the NSA and State department sympathetic to/ working with(?) Hillary, and were the "outside" agency hired to evaluate and report on the "Russian" hacking of the DNC emails/ servers.

DH Fabian , March 13, 2019 at 5:48 pm

Mueller released report last summer, which resulted in (the last I checked) roughly 150 indictments, a handful of convictions to date, all for perjury/financial (not political) crimes. This wasn't kept secret. It simply wasn't what Democrats wanted to hear, so although it was mentioned in some lib media (which overwhelmingly supported neoliberal Hillary Clinton), it was essentially swept under the carpet.

Billy , March 13, 2019 at 11:11 pm

Barr, Sessions, every congressmen all the corporate MSM war profiteer mouth pieces. They all know that "Russia hacked the DNC" and "Russia meddled" is fabricated garbage. They don't care, because their chosen war beast corporate candidate couldn't beat Donald goofball Trump. So it has to be shown that the war beast only lost because of nefarious reasons. Because they're gonna run another war beast cut from the same cloth as Hillary in 2020.

Realist , March 14, 2019 at 3:22 am

You betcha. Moreover, who but the Russians do these idiots have left to blame? Everybody else is now off limits due to political correctness. Sigh Those Catholics, Jews, "ethnics" and sundry "deviants" used to be such reliable scapegoats, to say nothing of the "undeveloped" world. As Clapper "authoritatively" says, only this vile lineage still carries the genes for the most extremes of human perfidy. Squirrels in your attic? It must be the damned Russkies! The bastards impudently tried to copy our democracy, economic system and free press and only besmirched those institutions, ruining all of Hillary's glorious plans for a worldwide benevolent dictatorship. All this might be humorous if it weren't so funny.

And those Chinese better not get to thinking they are somehow our equals just because all their trillions invested in U.S. Treasury bonds have paid for all our wars of choice and MIC boondoggles since before the turn of the century. Unless they start delivering Trump some "free stuff" the big man is gonna cut off their water. No more affordable manufactured goods for the American public! So there!

As to the article: impeccable research and analysis by the VIPS crew yet again. They've proven to me that, to a near certainty, the Easter Bunny is not likely to exist. Mueller won't read it. Clapper will still prance around a free man, as will Brennan. The Democrats won't care, that is until November of 2020. And Hillary will continue to skate, unhindered in larding up the Clinton Foundation to purposes one can only imagine.

Joe Tedesky , March 14, 2019 at 10:02 pm

Realist,

I have posted this article 'the Russia they Lost' before and from time to time but once again it seems appropriate to add this link to expound upon for what you've been saying. It's an article written by a Russian who in they're youth growing up in the USSR dreamed of living the American lifestyle if Russia were to ever ditch communism. But . Starting with Kosovo this Russian's youthful dream turned nightmarishly ugly and, as time went by with more and yet even more USA aggression this Russian author loss his admiration and desire for all things American to be proudly envied. This is a story where USA hard power destroyed any hope of American soft power for world unity. But hey that unity business was never part of the plan anyway.

https://slavyangrad.org/2014/09/24/the-russia-they-lost/

Realist , March 15, 2019 at 10:38 pm

right you are, joe. if america was smart rather than arrogant, it would have cooperated with china and russia to see the belt and road initiative succeed by perhaps building a bridge or tunnel from siberia to alaska, and by building its own fleet of icebreakers to open up its part of the northwest passage. but no, it only wants to sabotage what others propose. that's not being a leader, it's being a dick.

i'm gonna have to go on the disabled list here until the sudden neurological problem with my right hand clears up–it's like paralysed. too difficult to do this one-handed using hunt and peck. at least the problem was not in the old bean, according to the scans. carry on, sir.

Brian James , March 13, 2019 at 5:04 pm

Mar 4, 2019 Tom Fitton: President Trump a 'Crime Victim' by Illegal Deep State DOJ & FBI Abuses: https://youtu.be/ixWMorWAC7c

DH Fabian , March 13, 2019 at 5:55 pm

Trump is a willing player in this game. The anti-Russian Crusade was, quite simply, a stunningly reckless, short-sighted effort to overturn the 2016 election, removing Trump to install Hillary Clinton in office. Trump and the Republicans continue to win by default, as Democrats only drive more voters away.

Howard , March 13, 2019 at 4:36 pm

Thank you Ray McGovern and the Other 17 VIPS C0-Signers of your National Security Essay for Truth. Along with Craig Murray and Seymour Hirsch, former Sam Adams Award winners for "shining light into dark places", you are national resources for objectivity in critical survival information matters for our country. It is more than a pity that our mainstream media are so beholden to their corporate task masters that they cannot depart from the company line for fear of losing their livelihoods, and in the process we risk losing life on the planet because of unconstrained nuclear war on the part of the two main adversaries facing off in an atmosphere of fear and mistrust. Let me speak plainly. THEY SHOULD BE TALKING TO YOU AND NOT THE VESTED INTERESTS' MOUTHPIECES. Thank you for your continued leadership!

James Clooney , March 14, 2019 at 11:28 am

Roger Ailes founder of FOX news died, "falling down stairs" within a week of FOX news exposing to the world that the assassinated Seth Rich downloaded the DNC emails.

DH Fabian , March 13, 2019 at 6:03 pm

Google the Mueller investigation report from last June or July. When it was released, the public response was like a deflated balloon. It did not support the "Russian collusion" allegations -- the only thing Democrats still had left to sell. The report resulted in roughly 150 indictments for perjury/financial crimes (not political), and a handful of convictions to date -- none of which had anything to do with the election results.

Hank , March 13, 2019 at 6:19 pm

Much ado about nothing. All the talk and chatter and media airplay about "Russian meddling" in the 2016 election only tells me that these liars think the American public is that stupid. They are probably right, but the REAL reason that Hillary lost is because there ARE enough informed people now in this nation who are quite aware of the Clinton's sordid history where scandals seem to follow every where they go, but indictments and/or investigations don't. There IS an internet nowadays with lots of FACTUAL DOCUMENTED information. That's a lot more than I can say about the mainstream corporate-controlled media!

I know this won't ever happen, but an HONEST investigation into the Democratic Party and their actions during the 2016 election would make ANY collusion with ANY nation look like a mole hill next to a mountain! One of the problems with living in this nation is if you are truly informed and make an effort 24/7 to be that way by doing your own research, you more-than-likely can be considered an "island in a sea of ignorance".

Tom , March 14, 2019 at 12:13 pm

We know that the FBI never had access to the servers and a private company was allowed to handle the evidence. Wasnt it a crime scene? The evidence was tampered with And we will never know what was on the servers.

Mark McCarty , March 13, 2019 at 4:10 pm

As a complement to this excellent analysis, I would like to make 2 further points:

The Mueller indictment of Russian Intelligence for hacking the DNC and transferring their booty to Wikileaks is absurd on its face for this reason: Assange announced on June 12th the impending release of Hillary-related emails. Yet the indictment claims that Guccifer 2.0 did not succeed in transferring the DNC emails to Wikileaks until the time period of July 14-18th – after which they were released online on July 22nd. Are we to suppose that Assange, a publisher of impeccable integrity, publicly announced the publication of emails he had not yet seen, and which he was obtaining from a source of murky provenance? And are we further to suppose that Wikileaks could have processed 20K emails and 20K attachments to insure their genuineness in a period of only several days? As you will recall, Wikileaks subsequently took a number of weeks to process the Podesta emails they released in October.

And another peculiarity merits attention. Assange did not state on June 12th that he was releasing DNC emails – and yet Crowdstrike and the Guccifer 2.0 personna evidently knew that this was in store. A likely resolution of this conundrum is that US intelligence had been monitoring all communications to Wikileaks, and had informed the DNC that their hacked emails had been offered to Wikileaks. A further reasonable prospect is that US intelligence subsequently unmasked the leaker to the DNC; as Assange has strongly hinted, this likely was Seth Rich. This could explain Rich's subsequent murder, as Rich would have been in a position to unmask the Guccifer 2.0 hoax and the entire Russian hacking narrative.

https://medium.com/@markfmccarty/muellers-new-indictment-do-the-feds-take-us-for-idiots-5406ef955406

https://medium.com/@markfmccarty/how-did-crowdstrike-guccifer-2-0-know-that-wikileaks-was-planning-to-release-dnc-emails-42e6db334053

Sam F , March 13, 2019 at 7:06 pm

Curious that Assange has Not explicitly stated that the leaker was Seth Rich, if it was, as this would take pressure from himself and incriminate the DNC in the murder of Rich. Perhaps he doesn't know, and has the honor not to take the opportunity, or perhaps he knows that it was not Rich.

James Clooney , March 14, 2019 at 11:40 am

View the Dutch TV interview with Asssange and there is another interview available on youtube in which Assange DOES subtly confirmed it was Seth Rich.

Assange posted a $10,000 reward for Seth Rich's murders capture.

Abby , March 13, 2019 at 10:11 pm

Another mistaken issue with the "Russia hacked the DNC computers on Trump's command" is that he never asked Russia to do that. His words were, "Russia if you 'find' Hillary's missing emails let us know." He said that after she advised congress that she wouldn't be turning in all of the emails they asked for because she deleted 30,000 of them and said that they were personal.

But if Mueller or the FBI wants to look at all of them they can find them at the NYC FBI office because they are on Weiner's laptop. Why? Because Hillary's aid Huma Abedin, Weiner's wife sent them to it. Just another security risk that Hillary had because of her private email server. This is why Comey had to tell congress that more of them had been found 11 days before the election. If Comey hadn't done that then the FBI would have.

But did Comey or McCabe look at her emails there to see if any of them were classified? No they did not do that. And today we find out that Lisa Page told congress that it was Obama's decision not to charge Hillary for being grossly negligent on using her private email server. This has been known by congress for many months and now we know that the fix was always in for her to get off.

robert e williamson jr , March 13, 2019 at 3:26 pm

I want to thank you folks at VIPS. Like I have been saying for years now the relationship between CIA, NSA and DOJ is an incestuous one at best. A perverse corrupted bond to control the masses. A large group of religious fanatics who want things "ONE WAY". They are the facilitators for the rogue government known as the "DEEP STATE"!

Just ask billy barr.

More truth is a very good thing. I believe DOJ is supporting the intelligence community because of blackmail. They can't come clean because they all risk doing lots of time if a new judicial mechanism replaces them. We are in big trouble here.

Apparently the rule of law is not!

You folks that keep claiming we live in the post truth era! Get off me. Demand the truth and nothing else. Best be getting ready for the fight of your lives. The truth is you have to look yourself in the mirror every morning, deny that truth. The claim you are living in the post truth era is an admission your life is a lie. Now grab a hold of yourself pick a dogdamned side and stand for something,.

Thank You VIPS!

Joe Tedesky , March 13, 2019 at 2:58 pm

Hats off to the VIP's who have investigated this Russian hacking that wasn't a hacking for without them what would we news junkies have otherwise to lift open the hood of Mueller's never ending Russia-gate investigation. Although the one thing this Russia-gate nonsense has accomplished is it has destroyed with our freedom of speech when it comes to how we citizens gather our news. Much like everything else that has been done during these post 9/11 years of continual wars our civil rights have been marginalized down to zero or, a bit above if that's even still an argument to be made for the sake of numbers.

Watching the Manafort sentencing is quite interesting for the fact that Manafort didn't conclude in as much as he played fast and loose with his income. In fact maybe Manafort's case should have been prosecuted by the State Department or, how about the IRS? Also wouldn't it be worth investigating other Geopolitical Rain Makers like Manafort for similar crimes of financial wrongdoing? I mean is it possible Manafort is or was the only one of his type to do such dishonest things? In any case Manafort wasn't charged with concluding with any Russians in regard to the 2016 presidential election and, with that we all fall down.

I guess the best thing (not) that came out of this Russia-gate silliness is Rachel Maddow's tv ratings zoomed upwards. But I hate to tell you that the only ones buying what Ms Maddow is selling are the died in the wool Hillary supporters along with the chicken-hawks who rally to the MIC lobby for more war. It's all a game and yet there are many of us who just don't wish to play it but still we must because no one will listen to the sanity that gets ignored keep up the good work VIP's some of us are listening.

Andrew Thomas , March 13, 2019 at 12:42 pm

The article did not mention something called to my attention for the first time by one of the outstanding members of your commentariat just a couple of days ago- that Ambassador Murray stayed publicly, over two years ago, that he had been given the thumb drive by a go-between in D.C. and had somehow gotten it to Wikileaks. And, that he has NEVER BEEN INTERVIEWED by Mueller &Company. I was blown away by this, and found the original articles just by googling Murray. The excuse given is that Murray "lacks credibility ", or some such, because of his prior relationship with Assange and/or Wikileaks. This is so ludicrous I can't even get my head around it. And now, you have given me a new detail-the meeting with Pompeo, and the complete lack of follow-up thereafter. Here all this time I thought I was the most cynical SOB who existed, and now I feel as naive as when I was 13 and believed what Dean Rusk was saying like it was holy writ. I am in your debt.

Bob Van Noy , March 13, 2019 at 2:33 pm

Andrew Thomas I'm afraid that huge amounts of our History post 1947 is organized and propagandized disinformation. There is an incredible page that John Simpkin has organized over the years that specifically addresses individuals, click on a name and read about them. https://spartacus-educational.com/USAdisinformation.htm

Mark McCarty , March 13, 2019 at 4:18 pm

A small correction: the Daily Mail article regarding Murray claimed that Murray was given a thumbdrive which he subsequently carried back to Wikileaks. On his blog, Murray subsequently disputed this part of the story, indicating that, while he had met with a leaker or confederate of a leaker in Washington DC, the Podesta emails were already in possession of Wikileaks at the time. Murray refused to clarify the reason for his meeting with this source, but he is adamant in maintaining that the DNC and Podesta emails were leaked, not hacked.

And it is indeed ludicrous that Mueller, given the mandate to investigate the alleged Russian hacking of the DNC and Podesta, has never attempted to question either Assange or Murray. That in itself is enough for us to conclude that the Mueller investigation is a complete sham.

Ian Brown , March 13, 2019 at 4:43 pm

It's pretty astonishing that Mueller was more interested in Roger Stone and Jerome Corsi as credible sources about Wikileaks and the DNC release than Craig Murray!

LJ , March 13, 2019 at 12:29 pm

A guy comes in with a pedigree like that, """ former FBI head """ to examine and validate if possible an FBI sting manufactured off a phony FISA indictment based on the Steele Report, It immediately reminded me of the 9-11 Commission with Thomas Kean, former Board member of the National Endowment for Democracy, being appointed by GW Bush the Simple to head an investigation that he had previously said he did not want to authorize( and of course bi partisan yes man Lee Hamilton as #2, lest we forget) . Really this should be seen as another low point in our Democracy. Uncle Sam is the Limbo Man, How low can you go?

After Bill and Hillary and Monica and Paula Jones and Blue Dresses well, Golden Showers in a Moscow luxury hotel, I guess that make it just salacious enough.

Mueller looks just like what he is. He has that same phony self important air as Comey . In 2 years this will be forgotten.. I do not think this hurts Trumps chances at re-election as much as the Democrats are hurting themselves. This has already gone on way too long.

Drew Hunkins , March 13, 2019 at 11:59 am

Mueller has nothing and he well knows it. He was willingly roped into this whole pathetic charade and he's left grasping for anything remotely tied to Trump campaign officials and Russians.

Even the most tenuous connections and weak relationships are splashed across the mass media in breathless headlines. Meanwhile, NONE of the supposed skulduggery unearthed by Mueller has anything to do with the Kremlin "hacking" the election to favor Trump, which was the entire raison d'etre behind Rosenstein, Brennan, Podesta and Mueller's crusade on behalf of the deplorable DNC and Washington militarist-imperialists. It will be fascinating to witness how Mueller and his crew ultimately extricate themselves from this giant fraudulent edifice of deceit. Will they even be able to save the most rudimentary amount of face?

So sickening to see the manner in which many DNC sycophants obsequiously genuflect to their godlike Mueller. A damn prosecutor who was likely in bed with the Winter Hill Gang.

Jack , March 13, 2019 at 12:21 pm

You have failed. An investigation is just that, a finding of the facts. What would Mueller have to extricate himself from? If nothing is found, he has still done his job. You are a divisive idiot.

Skip Scott , March 13, 2019 at 1:13 pm

Yes, he has done his job. And his job was to bring his royal Orangeness to heel, and to make sure that detente and co-operation with Russia remained impossible. The forever war continues. Mission Accomplished.

Drew Hunkins , March 13, 2019 at 2:12 pm

@Jack,
Keep running cover for an out of control prosecutor, who, if he had any integrity, would have hit the bully pulpit mos ago declaring there's nothing of substance to one of the most potentially dangerous accusations in world history: the Kremlin hacking the election. Last I checked it puts two nuclear nation-states on the brink of potential war. And you call me divisive? Mueller's now a willing accomplice to this entire McCarthyite smear and disinformation campaign. It's all so pathetic that folks such as yourself try and mislead and feed half-truths to the people.

You're failing Jack, in more ways than you know.

Gregory Herr , March 13, 2019 at 9:13 pm

https://www.kcrw.com/culture/shows/scheer-intelligence/liberals-are-digging-their-own-grave-with-russiagate-2019-03-08

Drew, you might enjoy this discussion Robert Scheer has with Stephen Cohen and Katrina vanden Heuvel.

Realist , March 15, 2019 at 3:38 am

Moreover, as the Saker pointed out in his most recent column in the Unz Review, the entire Deep State conspiracy, in an ad hoc alliance with the embarrassed and embarrassing Democrats, have made an absolute sham of due process in their blatant witch hunt to bag the president. This reached an apex when his personal lawyer, Mr. Cohen, was trotted out before congress to violate Trump's confidentiality in every mortifying way he could even vaguely reconstruct. The man was expected to say anything to mitigate the anticipated tortures to come in the course of this modern day inquisition by our latter day Torquemada. To his credit though, even with his ass in a sling, he could simply not confabulate the smoking gun evidence for the alleged Russian collusion that this whole farce was built around.

Tom , March 14, 2019 at 12:30 pm

Mueller stood with Bush as he lied the world into war based on lies and illegally spied on America and tortured some folks.

George Collins , March 13, 2019 at 2:02 pm

QED: as to the nexus with the Winter Hill gang wasn't there litigation involving the Boston FBI, condonation of murder by the FBI and damages awarded to or on behalf of convicted parties that the FBI had reason to know were innocent? The malfeasance reportedly occurred during Mueller time. Further on the sanctified diligence of Mr. Mueller can be gleaned from the reports of Coleen Rowley, former FBI attorney stationed in Milwaukee??? when the DC FBI office was ignoring warnings sent about 9/11. See also Sibel Edmonds who knew to much and was court order muzzled about FBI mis/malfeasance in the aftermath of 9/11.

I'd say it's game, set, match VIPS and a pox on Clapper and the complicit intelligence folk complicit in the nuclear loaded Russia-gate fibs.

Kiers , March 13, 2019 at 11:47 am

How can we expect the DNC to "hand it " to Trumpf, when, behind the scenes, THEY ARE ONE PARTY. They are throwing faux-scary pillow bombs at each other because they are both complicit in a long chain of corruptions. Business as usual for the "principled" two party system! Democracy! Through the gauze of corporate media! You must be joking!

Skip Scott , March 13, 2019 at 11:28 am

"We believe that there are enough people of integrity in the Department of Justice to prevent the outright manufacture or distortion of "evidence," particularly if they become aware that experienced scientists have completed independent forensic study that yield very different conclusions."

I wish I shared this belief. However, as with Nancy Pelosi's recent statement regarding pursuing impeachment, I smell a rat. I believe with the help of what the late Robert Parry called "the Mighty Wurlitzer", Mueller is going to use coerced false testimony and fabricated forensics to drop a bombshell the size of 911. I think Nancy's statement was just a feint before throwing the knockout punch.

If reason ruled the day, we should have nothing to worry about. But considering all the perfidy that the so-called "Intelligence" Agencies and their MSM lackeys get away with daily, I think we are in for more theater; and I think VIPS will receive a cold shoulder outside of venues like CN.

I pray to God I'm wrong.

Sam F , March 13, 2019 at 7:32 pm

My extensive experience with DOJ and the federal judiciary establishes that at least 98% of them are dedicated career liars, engaged in organized crime to serve political gangs, and make only a fanatical pretense of patriotism or legality. They are loyal to money alone, deeply cynical and opposed to the US Constitution and laws, with no credibility at all beyond any real evidence.

Eric32 , March 14, 2019 at 4:24 pm

As near I can see, Federal Govt. careers at the higher levels depend on having dirt on other players, and helping, not hurting, the money/power schemes of the players above you.

The Clintons (through their foundation) apparently have a lot of corruption dirt on CIA, FBI etc. top players, some of whom somehow became multi-millionaires during their civil service careers.

Trump, who was only running for President as a name brand marketing ploy with little desire to actually win, apparently came into the Presidency with no dirt arsenal and little idea of where to go from there.

Bob Van Noy , March 13, 2019 at 11:09 am

I remember reading with dismay how Russians were propagandized by the Soviet Press Management only to find out later the depth of disbelief within the Russian population itself. We now know what that feels like. The good part of this disastrous scenario for America is that for careful readers, disinformation becomes revelatory. For instance, if one reads an editorial that refers to the Russian invasion of Ukraine, or continually refers to Russian interference in the last Presidential election, then one can immediately dismiss the article and question the motivation for the presentation. Of course the problem is how to establish truth in reporting

Jeff Harrison , March 13, 2019 at 10:41 am

Thank you, VIPs. Hopefully, you don't expect this to make a difference. The US has moved into a post truth, post reality existence best characterized by Karl Rove's declaration: "we're an empire now, when we act, we create our own reality." What Mr. Rove in his arrogance fails to appreciate is that it is his reality but not anyone else's. Thus Pompous can claim that Guaido is the democratic leader in Venezuela even though he's never been elected .

Gary Weglarz , March 13, 2019 at 10:21 am

Thank you. The next time one of my friends or family give me that glazed over stare and utters anymore of the "but, RUSSIA" nonsense I will refer them directly to this article. Your collective work and ethical stand on this matter is deeply appreciated by anyone who values the truth.

Russiagate stands with past government propaganda operations that were simply made up out of thin air: i.e. Kuwaiti incubator babies, WMD's, Gaddafi's viagra fueled rape camps, Assad can't sleep at night unless he's gassing his own people, to the latest, "Maduro can't sleep at night unless he's starving his own people."

The complete and utter amorality of the deep state remains on display for all to see with "Russiagate," which is as fact-free a propaganda campaign as any of those just mentioned.

Marc , March 13, 2019 at 10:13 am

I am a computer naif, so I am prepared to accept the VIPS analysis about FAT and transfer rates. However, the presentation here leaves me with several questions. First, do I understand correctly that the FAT rounding to even numbers is introduced by the thumb drive? And if so, does the FAT analysis show only that the DNC data passed through a thumb drive? That is, does the analysis distinguish whether the DNC data were directly transferred to a thumb drive, or whether the data were hacked and then transferred to a thumb drive, eg, to give a copy to Wikileaks? Second, although the transatlantic transfer rate is too slow to fit some time stamps, is it possible that the data were hacked onto a local computer that was under the control of some faraway agent?

Jeff Harrison , March 13, 2019 at 11:12 am

Not quite. FAT is the crappy storage system developed by Microsoft (and not used by UNIX). The metadata associated with any file gets rewritten when it gets moved. If that movement is to a storage device that uses FAT, the timestamp on the file will end in an even number. If it were moved to a unix server (and most of the major servers run Unix) it would be in the UFS (unix file system) and it would be the actual time from the system clock. Every storage device has a utility that tells it where to write the data and what to write. Since it's writing to a storage device using FAT, it'll round the numbers. To get to your real question, yes, you could hack and then transfer the data to a thumb drive but if you did that the dates wouldn't line up.

Skip Scott , March 14, 2019 at 8:05 am

Jeff-

Which dates wouldn't line up? Is there a history of metadata available, or just metadata for the most recent move?

David G , March 13, 2019 at 12:22 pm

Marc asks: "[D]oes the analysis distinguish whether the DNC data were directly transferred to a thumb drive, or whether the data were hacked and then transferred to a thumb drive, eg, to give a copy to Wikileaks?"

I asked that question in comments under a previous CN piece; other people have asked that question elsewhere.

To my knowledge, it hasn't been addressed directly by the VIPS, and I think they should do so. (If they already have, someone please enlighten me.)

Skip Scott , March 13, 2019 at 1:07 pm

I am no computer wiz, but Binney has repeatedly made the point that the NSA scoops up everything. If there had been a hack, they'd know it, and they wouldn't only have had "moderate" confidence in the Jan. assessment. I believe that although farfetched, an argument could be made that a Russian spy got into the DNC, loaded a thumb drive, and gave it to Craig Murray.

David G , March 13, 2019 at 3:31 pm

Respectfully, that's a separate point, which may or may not raise issues of its own.

But I think the question Marc posed stands.

Skip Scott , March 14, 2019 at 7:59 am

Hi David-

I don't see how it's separate. If the NSA scoops up everything, they'd have solid evidence of the hack, and wouldn't have only had "moderate" confidence, which Bill Binney says is equivalent to them saying "we don't have squat". They wouldn't even have needed Mueller at all, except to possibly build a "parallel case" due to classification issues. Also, the FBI not demanding direct access to the DNC server tells you something is fishy. They could easily have gotten a warrant to examine the server, but chose not to. They also purposely refuse to get testimony from Craig Murray and Julian Assange, which rings alarm bells on its own.

As for the technical aspect of Marc's question, I agree that I'd like to see Bill Binney directly answer it.

[Mar 17, 2019] VIPS- Mueller's Forensics-Free Findings

Highly recommended!
Mar 13, 2019 | Consortiumnews

The final Mueller report should be graded "incomplete," says VIPS, whose forensic work proves the speciousness of the story that DNC emails published by WikiLeaks came from Russian hacking.

MEMORANDUM FOR: The Attorney General

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Mueller's Forensics-Free Findings

Executive Summary

Media reports are predicting that Special Counsel Robert Mueller is about to give you the findings of his probe into any links and/or coordination between the Russian government and individuals associated with the campaign of President Donald Trump. If Mueller gives you his "completed" report anytime soon, it should be graded "incomplete."

Major deficiencies include depending on a DNC-hired cybersecurity company for forensics and failure to consult with those who have done original forensic work, including us and the independent forensic investigators with whom we have examined the data. We stand ready to help.

We veteran intelligence professionals (VIPS) have done enough detailed forensic work to prove the speciousness of the prevailing story that the DNC emails published by WikiLeaks came from Russian hacking. Given the paucity of evidence to support that story, we believe Mueller may choose to finesse this key issue and leave everyone hanging. That would help sustain the widespread belief that Trump owes his victory to President Vladimir Putin, and strengthen the hand of those who pay little heed to the unpredictable consequences of an increase in tensions with nuclear-armed Russia.

There is an overabundance of "assessments" but a lack of hard evidence to support that prevailing narrative. We believe that there are enough people of integrity in the Department of Justice to prevent the outright manufacture or distortion of "evidence," particularly if they become aware that experienced scientists have completed independent forensic study that yield very different conclusions. We know only too well -- and did our best to expose -- how our former colleagues in the intelligence community manufactured fraudulent "evidence" of weapons of mass destruction in Iraq.

We have scrutinized publicly available physical data -- the "trail" that every cyber operation leaves behind. And we have had support from highly experienced independent forensic investigators who, like us, have no axes to grind. We can prove that the conventional-wisdom story about Russian-hacking-DNC-emails-for-WikiLeaks is false. Drawing largely on the unique expertise of two VIPS scientists who worked for a combined total of 70 years at the National Security Agency and became Technical Directors there, we have regularly published our findings. But we have been deprived of a hearing in mainstream media -- an experience painfully reminiscent of what we had to endure when we exposed the corruption of intelligence before the attack on Iraq 16 years ago.

This time, with the principles of physics and forensic science to rely on, we are able to adduce solid evidence exposing mistakes and distortions in the dominant story. We offer you below -- as a kind of aide-memoire -- a discussion of some of the key factors related to what has become known as "Russia-gate." And we include our most recent findings drawn from forensic work on data associated with WikiLeaks' publication of the DNC emails.

We do not claim our conclusions are "irrefutable and undeniable," a la Colin Powell at the UN before the Iraq war. Our judgments, however, are based on the scientific method -- not "assessments." We decided to put this memorandum together in hopes of ensuring that you hear that directly from us.

If the Mueller team remains reluctant to review our work -- or even to interview willing witnesses with direct knowledge, like WikiLeaks' Julian Assange and former UK Ambassador Craig Murray, we fear that many of those yearning earnestly for the truth on Russia-gate will come to the corrosive conclusion that the Mueller investigation was a sham.

In sum, we are concerned that, at this point, an incomplete Mueller report will fall far short of the commitment made by then Acting Attorney General Rod Rosenstein "to ensure a full and thorough investigation," when he appointed Mueller in May 2017. Again, we are at your disposal.

Discussion

The centerpiece accusation of Kremlin "interference" in the 2016 presidential election was the charge that Russia hacked Democratic National Committee emails and gave them to WikiLeaks to embarrass Secretary Hillary Clinton and help Mr. Trump win. The weeks following the election witnessed multiple leak-based media allegations to that effect. These culminated on January 6, 2017 in an evidence-light, rump report misleadingly labeled "Intelligence Community Assessment (ICA)." Prepared by "handpicked analysts" from only three of the 17 U.S. intelligence agencies (CIA, FBI, and NSA), the assessment expressed "high confidence" in the Russia-hacking-to-WikiLeaks story, but lacked so much as a hint that the authors had sought access to independent forensics to support their "assessment."

The media immediately awarded the ICA the status of Holy Writ, choosing to overlook an assortment of banal, full-disclosure-type caveats included in the assessment itself -- such as:

" When Intelligence Community analysts use words such as 'we assess' or 'we judge,' they are conveying an analytic assessment or judgment. Judgments are not intended to imply that we have proof that shows something to be a fact. Assessments are based on collected information, which is often incomplete or fragmentary High confidence in a judgment does not imply that the assessment is a fact or a certainty; such judgments might be wrong."

To their credit, however, the authors of the ICA did make a highly germane point in introductory remarks on "cyber incident attribution." They noted: "The nature of cyberspace makes attribution of cyber operations difficult but not impossible. Every kind of cyber operation -- malicious or not -- leaves a trail." [Emphasis added.]

Forensics

The imperative is to get on that "trail" -- and quickly, before red herrings can be swept across it. The best way to establish attribution is to apply the methodology and processes of forensic science. Intrusions into computers leave behind discernible physical data that can be examined scientifically by forensic experts. Risk to "sources and methods" is normally not a problem.

Direct access to the actual computers is the first requirement -- the more so when an intrusion is termed "an act of war" and blamed on a nuclear-armed foreign government (the words used by the late Sen. John McCain and other senior officials). In testimony to the House Intelligence Committee in March 2017, former FBI Director James Comey admitted that he did not insist on physical access to the DNC computers even though, as he conceded, "best practices" dictate direct access.

In June 2017, Senate Intelligence Committee Chair Richard Burr asked Comey whether he ever had "access to the actual hardware that was hacked." Comey answered, "In the case of the DNC we did not have access to the devices themselves. We got relevant forensic information from a private party, a high-class entity, that had done the work. " Sen. Burr followed up: "But no content? Isn't content an important part of the forensics from a counterintelligence standpoint?" Comey: "It is, although what was briefed to me by my folks is that they had gotten the information from the private party that they needed to understand the intrusion by the spring of 2016."

The "private party/high-class entity" to which Comey refers is CrowdStrike, a cybersecurity firm of checkered reputation and multiple conflicts of interest, including very close ties to a number of key anti-Russian organizations. Comey indicated that the DNC hired CrowdStrike in the spring of 2016.

Given the stakes involved in the Russia-gate investigation – including a possible impeachment battle and greatly increased tension between Russia and the U.S. -- it is difficult to understand why Comey did not move quickly to seize the computer hardware so the FBI could perform an independent examination of what quickly became the major predicate for investigating election interference by Russia. Fortunately, enough data remain on the forensic "trail" to arrive at evidence-anchored conclusions. The work we have done shows the prevailing narrative to be false. We have been suggesting this for over two years. Recent forensic work significantly strengthens that conclusion.

We Do Forensics

Recent forensic examination of the Wikileaks DNC files shows they were created on 23, 25 and 26 May 2016. (On June 12, Julian Assange announced he had them; WikiLeaks published them on July 22.) We recently discovered that the files reveal a FAT (File Allocation Table) system property. This shows that the data had been transferred to an external storage device, such as a thumb drive, before WikiLeaks posted them.

FAT is a simple file system named for its method of organization, the File Allocation Table. It is used for storage only and is not related to internet transfers like hacking. Were WikiLeaks to have received the DNC files via a hack, the last modified times on the files would be a random mixture of odd-and even-ending numbers.

Why is that important? The evidence lies in the "last modified" time stamps on the Wikileaks files. When a file is stored under the FAT file system the software rounds the time to the nearest even-numbered second. Every single one of the time stamps in the DNC files on WikiLeaks' site ends in an even number.

We have examined 500 DNC email files stored on the Wikileaks site. All 500 files end in an even number -- 2, 4, 6, 8 or 0. If those files had been hacked over the Internet, there would be an equal probability of the time stamp ending in an odd number. The random probability that FAT was not used is 1 chance in 2 to the 500th power. Thus, these data show that the DNC emails posted by WikiLeaks went through a storage device, like a thumb drive, and were physically moved before Wikileaks posted the emails on the World Wide Web.

This finding alone is enough to raise reasonable doubts, for example, about Mueller's indictment of 12 Russian intelligence officers for hacking the DNC emails given to WikiLeaks. A defense attorney could easily use the forensics to argue that someone copied the DNC files to a storage device like a USB thumb drive and got them physically to WikiLeaks -- not electronically via a hack.

Role of NSA

For more than two years, we strongly suspected that the DNC emails were copied/leaked in that way, not hacked. And we said so. We remain intrigued by the apparent failure of NSA's dragnet, collect-it-all approach -- including "cast-iron" coverage of WikiLeaks -- to provide forensic evidence (as opposed to "assessments") as to how the DNC emails got to WikiLeaks and who sent them. Well before the telling evidence drawn from the use of FAT, other technical evidence led us to conclude that the DNC emails were not hacked over the network, but rather physically moved over, say, the Atlantic Ocean.

Is it possible that NSA has not yet been asked to produce the collected packets of DNC email data claimed to have been hacked by Russia? Surely, this should be done before Mueller competes his investigation. NSA has taps on all the transoceanic cables leaving the U.S. and would almost certainly have such packets if they exist. (The detailed slides released by Edward Snowden actually show the routes that trace the packets.)

The forensics we examined shed no direct light on who may have been behind the leak. The only thing we know for sure is that the person had to have direct access to the DNC computers or servers in order to copy the emails. The apparent lack of evidence from the most likely source, NSA, regarding a hack may help explain the FBI's curious preference for forensic data from CrowdStrike. No less puzzling is why Comey would choose to call CrowdStrike a "high-class entity."

Comey was one of the intelligence chiefs briefing President Obama on January 5, 2017 on the "Intelligence Community Assessment," which was then briefed to President-elect Trump and published the following day. That Obama found a key part of the ICA narrative less than persuasive became clear at his last press conference (January 18), when he told the media, "The conclusions of the intelligence community with respect to the Russian hacking were not conclusive as to how 'the DNC emails that were leaked' got to WikiLeaks.

Is Guccifer 2.0 a Fraud?

There is further compelling technical evidence that undermines the claim that the DNC emails were downloaded over the internet as a result of a spearphishing attack. William Binney, one of VIPS' two former Technical Directors at NSA, along with other former intelligence community experts, examined files posted by Guccifer 2.0 and discovered that those files could not have been downloaded over the internet. It is a simple matter of mathematics and physics.

There was a flurry of activity after Julian Assange announced on June 12, 2016: "We have emails relating to Hillary Clinton which are pending publication." On June 14, DNC contractor CrowdStrike announced that malware was found on the DNC server and claimed there was evidence it was injected by Russians. On June 15, the Guccifer 2.0 persona emerged on the public stage, affirmed the DNC statement, claimed to be responsible for hacking the DNC, claimed to be a WikiLeaks source, and posted a document that forensics show was synthetically tainted with "Russian fingerprints."

Our suspicions about the Guccifer 2.0 persona grew when G-2 claimed responsibility for a "hack" of the DNC on July 5, 2016, which released DNC data that was rather bland compared to what WikiLeaks published 17 days later (showing how the DNC had tipped the primary scales against Sen. Bernie Sanders). As VIPS reported in a wrap-up Memorandum for the President on July 24, 2017 (titled "Intel Vets Challenge 'Russia Hack' Evidence)," forensic examination of the July 5, 2016 cyber intrusion into the DNC showed it NOT to be a hack by the Russians or by anyone else, but rather a copy onto an external storage device. It seemed a good guess that the July 5 intrusion was a contrivance to preemptively taint anything WikiLeaks might later publish from the DNC, by "showing" it came from a "Russian hack." WikiLeaks published the DNC emails on July 22, three days before the Democratic convention.

As we prepared our July 24 memo for the President, we chose to begin by taking Guccifer 2.0 at face value; i. e., that the documents he posted on July 5, 2016 were obtained via a hack over the Internet. Binney conducted a forensic examination of the metadata contained in the posted documents and compared that metadata with the known capacity of Internet connection speeds at the time in the U.S. This analysis showed a transfer rate as high as 49.1 megabytes per second, which is much faster than was possible from a remote online Internet connection. The 49.1 megabytes speed coincided, though, with the rate that copying onto a thumb drive could accommodate.

Binney, assisted by colleagues with relevant technical expertise, then extended the examination and ran various forensic tests from the U.S. to the Netherlands, Albania, Belgrade and the UK. The fastest Internet rate obtained -- from a data center in New Jersey to a data center in the UK -- was 12 megabytes per second, which is less than a fourth of the capacity typical of a copy onto a thumb drive.

The findings from the examination of the Guccifer 2.0 data and the WikiLeaks data does not indicate who copied the information to an external storage device (probably a thumb drive). But our examination does disprove that G.2 hacked into the DNC on July 5, 2016. Forensic evidence for the Guccifer 2.0 data adds to other evidence that the DNC emails were not taken by an internet spearphishing attack. The data breach was local. The emails were copied from the network.

Presidential Interest

After VIPS' July 24, 2017 Memorandum for the President, Binney, one of its principal authors, was invited to share his insights with Mike Pompeo, CIA Director at the time. When Binney arrived in Pompeo's office at CIA Headquarters on October 24, 2017 for an hour-long discussion, the director made no secret of the reason for the invitation: "You are here because the President told me that if I really wanted to know about Russian hacking I needed to talk with you."

Binney warned Pompeo -- to stares of incredulity -- that his people should stop lying about the Russian hacking. Binney then started to explain the VIPS findings that had caught President Trump's attention. Pompeo asked Binney if he would talk to the FBI and NSA. Binney agreed, but has not been contacted by those agencies. With that, Pompeo had done what the President asked. There was no follow-up.

Confronting James Clapper on Forensics

We, the hoi polloi, do not often get a chance to talk to people like Pompeo -- and still less to the former intelligence chiefs who are the leading purveyors of the prevailing Russia-gate narrative. An exception came on November 13, when former National Intelligence Director James Clapper came to the Carnegie Endowment in Washington to hawk his memoir. Answering a question during the Q&A about Russian "hacking" and NSA, Clapper said:

" Well, I have talked with NSA a lot And in my mind, I spent a lot of time in the SIGINT business, the forensic evidence was overwhelming about what the Russians had done. There's absolutely no doubt in my mind whatsoever." [Emphasis added]

Clapper added: " as a private citizen, understanding the magnitude of what the Russians did and the number of citizens in our country they reached and the different mechanisms that, by which they reached them, to me it stretches credulity to think they didn't have a profound impact on election on the outcome of the election."

(A transcript of the interesting Q&A can be found here and a commentary on Clapper's performance at Carnegie, as well as on his longstanding lack of credibility, is here .)

Normally soft-spoken Ron Wyden, Democratic senator from Oregon, lost his patience with Clapper last week when he learned that Clapper is still denying that he lied to the Senate Intelligence Committee about the extent of NSA surveillance of U.S. citizens. In an unusual outburst, Wyden said: "James Clapper needs to stop making excuses for lying to the American people about mass surveillance. To be clear: I sent him the question in advance. I asked him to correct the record afterward. He chose to let the lie stand."

The materials brought out by Edward Snowden in June 2013 showed Clapper to have lied under oath to the committee on March 12, 2013; he was, nevertheless, allowed to stay on as Director of National Intelligence for three and half more years. Clapper fancies himself an expert on Russia, telling Meet the Press on May 28, 2017 that Russia's history shows that Russians are "typically, almost genetically driven to co-opt, penetrate, gain favor, whatever."

Clapper ought to be asked about the "forensics" he said were "overwhelming about what the Russians had done." And that, too, before Mueller completes his investigation.

For the steering group, Veteran Intelligence Professionals for Sanity:

Veteran Intelligence Professionals for Sanity (VIPS) is made up of former intelligence officers, diplomats, military officers and congressional staffers. The organization, founded in 2002, was among the first critics of Washington's justifications for launching a war against Iraq. VIPS advocates a US foreign and national security policy based on genuine national interests rather than contrived threats promoted for largely political reasons. An archive of VIPS memoranda is available at Consortiumnews.com.

image_pdf image_print 9280

Tags: Bill Binney Donald Trump Hillary Clinton James Clapper James Comey Mike Pompeo Robert Mueller Veteran Intelligence Professional for Sanity VIPS WikiLeaks


[Feb 16, 2019] Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA

Feb 16, 2019 | disobedientmedia.com

Paul E. Merrell, J.D. , May 31, 2018 at 4:53 am

Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA: https://disobedientmedia.com/2018/05/guccifer-2-0s-american-fingerprints-reveal-an-operation-made-in-the-usa/

[Jan 14, 2019] The Russia Hoax The Illicit Scheme to Clear Hillary Clinton and Frame Donald Trump by Gregg Jarrett

The books does not answer the key question: if it was not Russian influence, who of forign powers tried to influence the election: GB, Israel, Saudi, or all three. We have solid evidence of interference of British intelligence services into the election. Which means May government interference.
Also important to understand that FBI from the very beginning was apolitical tool. Nothing new here.
This dirty political witch hunt has one major goal to cement the cracks in neoliberal society that appear after 2008 Financial crash. This attempt failed and Pateigenosse Mueller is unable to change that. Confidence in the ruling neoliberal oligarchy collapsed and problem with the inequality laid now bare.
Jan 14, 2019 | www.amazon.com

KB from Illinois 5.0 out of 5 stars Very detailed. Raises many questions about politically motivated investigations. September 14, 2018 Format: Kindle Edition Verified Purchase

My interest in this book occurred by chance. Over the past couple years reading news stories on sites like Yahoo News I sensed a very overt stance against President Trump. It appeared very obvious to me, but I wanted some confirmation whether these views may have validity, or perhaps not. So I started to investigate other opinions via some of the conservative talk radio shows. Up until this time, I rarely listened to them. One was the Sean Hannity Show and Gregg Jarrett was sitting in for Sean on one of the shows. He mentioned his book and I thought it sounded interesting. My basic assumption even prior to reading this book was I never felt there was any illegal Trump/Russian collusion in our recent election. I couldn't see how it would ever be done in such a way that would actually affect the voting outcome (other than if it were some kind of ballot box type fraud). So I had doubts about all the related investigations. When this book was mentioned I figured it would offer some factual information to help me understand the investigations better. It did accomplish that. And much more awareness.

One of the major items about this book is that it is well researched and documented. This made me feel somewhat comfortable about its content. There is so much misinformation making its rounds today that knowing what is truthful and what isn't can become a real guessing game. I could even ask 'Did Mr. Jarrett fabricate his sources'? At this point I will go on faith that they are real.

Based on that assumption, he presents a very hard case about the Russian collusion investigation as not being quite what the U.S.A. people are being led to believe by the media outlets. So much so, I hope this book could be a catalyst for other investigations (assuming that isn't already being planned). As summarized in this book, a major point is about federal investigative departments having integrity in performing their duties, and doing so legally and without prejudice or political partisanship. This book does raise some real concerns.

The author states at the end of the book "The people who should read this book, probably won't". Unfortunately he is probably correct. As a country we seem so divided today politically. It is my impression that anti-Trumpers will probably not want to acknowledge any conflicting thoughts or facts to their beliefs. But this book could be a great exercise in broadening one's knowledge regarding the investigations on Trump. It would show a different viewpoint than that being touted by much of the media, and has the facts backing it up. At the very least, it can provide some food for thought.

Grady T. Birdsong 5.0 out of 5 stars Tells the honest truth about corruption in our Government November 23, 2018 Format: Hardcover Verified Purchase

As Gregg Jarrett states in the Epilogue of this book, "The people who should read this book, probably won't... they are intellectually dishonest in believing that the president must have committed some crime in connection with Russia...There was never any plausible evidence that Trump or his campaign collaborated with Russia to win the presidency... Comey's scheme to trigger the appointment of his friend as special counsel was a devious maneuver by an unscrupulous man..."
As many of these events unfolded I have watched closely and performed my own "tests of reasonableness" from facts presented. Utilizing logic and common sense I often wondered if I was missing something? What crystal ball would have predicted that Donald Trump would run for the presidency? One example: The press told us he had been a political asset for many years and had been exchanging Intel with the Russians...
Then I heard about this book, purchased it and began reading it... I could hardly put it down... The information in it is astonishing! It is all to clear now...
Jarrett has researched, compiled and formatted an almost air-tight legal case (within this book) for prosecuting these "weasels." The astonishing levels of corruption and crimes committed by those in the highest levels of the DOJ and FBI are unprecedented. He has compiled an extraordinary amount of source information to back up his many claims throughout the book. I am totally perplexed that our so-called leaders in Congress are allowing this abuse to go unpunished... baffling? This disgraceful abuse of power documented by Jarrett will come back to haunt us! A well written expose by Mr. Jarrett!

E. Christine Hess 5.0 out of 5 stars Mueller, Rosenstein & the members of the Special Council SHOULD be on trial! November 24, 2018 Format: Hardcover Verified Purchase

Gregg Jarrett's research leaves NO DOUBT that drastic action needs to be taken to hold these people- PRETENDING to represent the law- accountable & end their "assassination" tactics on our tax dollar.
This is not Halloween, not a play. This is REALITY with our laws running amok!
And our Congress - our elected officials, supposedly servants of We, the People, - is not taking action?
How is this possible?

Amazon Customer 5.0 out of 5 stars The deep bias rooted in the Deep State, better known now as The Swamp October 8, 2018 Format: Hardcover Verified Purchase

Incredibly well researched and well written book which explains methodically in an easy to read style the undeniable deep seated bias against President Trump at the highest levels of the Department of Justice and the FBI. They tried to first prevent him from being elected by exonerating Hillary Clinton of a long list of crimes committed during her tenure as Secretary of State and then smearing him with a politically motivated fake "Dossier". When that didn't work, they have tried to undermine his presidency from the start with an equally politically motivated Special Prosecutor investigating "Collusion with Russia" in an investigation which had no crime to investigate from the start. A must read for all Americans.

Andrew Maile 5.0 out of 5 stars A very informative, but yet digestible, read........ September 30, 2018 Format: Hardcover Verified Purchase

This author writes with a very smooth, easy, but detailed style. The book brings in much law for the reader to digest, but, somehow, does not get a reader tangled up in the weeds. As for the thrust of the book: A detailed 'tick tock' of the day by day events that have taken America to the point we are today on this entire question of Trump, Russia, and the 2016 election.
This book really is vivid proof that the 'deep state' does emphatically exist. Not as a structure or organization with secret meetings,rituals or handshakes. But as a mentality, or common political/social view of government, stemming from the longevity of bureaucracy to feel invulnerable to popular will because of their simple edict that 'we'll still be here after you're long gone'. And from this, these bureaucrats build liaisons with favoring political elites that lead to deep, hidden, obscure --shall we say 'deep state'-- actions to pervert the popular will for the ends of a few.
This book vividly displays why bureaucrats (whose lifeblood is to promote more government) so turn their collective hand to supporting Democrats, the party of government. Yates covering for Comey and the blackmailing of Gen. Flynn, Comey leaking to a friend in Academia that provokes the appointment of his (Comey's) close associate --indeed, his mentor-- Robert Mueller. Senior bureaucrats (McCabe, Strzok) playing inside baseball to maneuver themselves for promotion in the expected new (Democratic) administration that they so much support and wish for. Indeed friendships with FISA judges to assure bogus warrants can be obtained against political enemies.
Where money and power are traded as coin of the realm in a way that is so antiseptic and hidden. Nobody says 'How much money will it take'; instead it's 'I can help you fund raise'. Rod Blagojevich was foolish enough to call a bribe a bribe...well, he's in jail, but Strzok's wife isn't.
It just goes on and on................it's simple corruption!!! And the band plays on......the human comedy continues........

JG Kuhl 5.0 out of 5 stars How about a media complicity sequel? September 3, 2018 Format: Kindle Edition Verified Purchase

Excellent detailed and researched book that simply amazes me. Lynch, Comey, Clinton, Stzrok, Orr, Rosenstein, McCabe, Reid and Brennen all worked seamlessly to install Hillary and have a backup plan B to lay the groundwork to impeach Trump in case she doesn't make it. All under the oversight of Obama. Neat trick, but what follows is even more orchestrated: MEDIA COMPLICITY! You can't pull this off unless you have the full cooperation willingly or otherwise of: NBC, CBS, NPR, ABC, MSNBC, and most of all CNN, the New York Times, and Washington Post! Here's where the real story lies. The media and the Democrat party are simpatico, joint at the brain and mouth and one other orifice. This is the real story that Jarrett only pays passing attention to. Sequel maybe, I hope so. Jon Kuhl Papillion, NE & New England

Amazon Customer 5.0 out of 5 stars The Deep State Is Real September 14, 2018 Format: Kindle Edition Verified Purchase

This book is very thorough and completely exposes the Deep State. If there were any doubts about the conspiracy to depose President Trump before reading this book, there certainly aren't any afterwards. After reading the book, I am very disappointed and discouraged to find that our government has such liars and criminals in the FBI, the DOJ, and the Congress. I have completely lost any confidence I had in the U.S. government and will never believe in it again, unless there is a complete house-cleaning in the FBI and the DOJ.

S. Martin Shelton 4.0 out of 5 stars This attack to undermine our democracy is unparalleled in the history of our republic. October 1, 2018 Format: Hardcover Verified Purchase

Jarrett pens a comprehensive review of the Deep State's inordinate fraud on our Constitution -- perhaps the greatest attack on our constitutional republic in the history of our country. He writes in clear and empathetic style. His narrative evolves in a coherent and logical progression that details the conspirators' skullduggery in an "ABC" type of progression. He cites exactly who violated the relevant federal statute and why and how it was violated. Unfortunately, as of 30 September 2018 -- the date I'm preparing the review -- none of the miscreants have been indicted even though the documentation of evidence is ponderous.

Larry A. Whited 4.0 out of 5 stars One Less than Five Stars August 8, 2018 Format: Hardcover Verified Purchase

Gregg Jarrett's study -- and that is what this book is, a study -- covers two main aspects of recent history. First and foremost it is an in-depth look at the tactics and forces arrayed against President Trump. Intertwined with this comes by necessity a parallel look at Hillary Clinton's tenure as Secretary of State, her presidential run, as well as a broader look at the activities of the Clintons with the nearly full support of those same forces that are now aligned against the presidency of Donald Trump. The nature of the often overlapping issues and the personnel involved has resulted in a fair amount of repetition of key points. This was not a lazy attempt to achieve a book-length manuscript, as Jarrett's original copy by his own admission in the acknowledgments was a hefty 100,000 words before the publisher encouraged him to trim things down.

It is unfortunate that this book will be dismissed by so many who are unwilling to understand and accept that the pervasive high-level animosity against President Trump has evolved into a direct and active threat against our country -- and this threat is compounded by a complicit media that is eager to pounce. The rule of law has been twisted and contorted if not completely abandoned. Trump is the primary target, but whether by design or happenstance it is the U.S. Constitution that is being the most assaulted. The danger of this cannot be overemphasized -- we are at a critical crossroads. Gregg Jarret understands this and was motivated to bring this truth to light. He is no sycophant of President Trump. His loyalty is to the rule of law and to our Constitution rather than to political agendas on either side.

I withheld one star because a great opportunity was lost. This book will never appear in classrooms, and it will likely be stocked in few law libraries. It most certainly should be, and it needs to be read and studied. The flagrant abuses of power by the DOJ, the FBI, and others need to be brought out into a bright light and the corruption purged. As a people we need to get our head out of the sand and realize what has been going on behind closed doors -- our future is most definitely at stake. The lost opportunity that I am alluding to comes down to the expressed (albeit well deserved) disdain and disgust that Gregg Jarrett now has towards those who are participating in this hoax that he has so thoroughly revealed. I fear even the preface itself will turn away those who most need to read this book.

What will be perceived as bias before the facts are presented and developed will allow or even cause those who need to read this book to close their minds, giving them the excuse they want to dismiss the evidence. If strictly the evidence and history had alone been presented with Jarrett's (again, well-deserved) animosity being held in check and edited out, then perhaps this book could have become a classic for later generations to study assuming that we survive these perilously subversive times. I did the math, and there are 771 supporting references -- an average of 70 per chapter -- documenting Jarrett's research, plus 12 references even in the epilogue. Obviously, we are not talking about willfully blind opinion with no basis in fact.

The antagonists who post their 1-star reviews with almost all of them having obviously never read the book (Re. few verified purchases) reveal a dangerous willful ignorance that they are happy to embrace. Their mindset should concern us all.

[Jan 06, 2019] DNC Emails--A Seth Attack Not a Russian Hack by Publius Tacitus

CIApedia story is a complete fabrication. And there might be connection between Seth murder and Avan brothers.
Notable quotes:
"... Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange ..."
"... While the content of these documents remain classified for now, they may provide documentary proof that Seth Rich "dropped boxed" the emails to Julian. If these documents are declassified, a big hole could be blown in the claim that Russia hacked the DNC. ..."
"... Is it really plausible that the perps would kill one person, fail to get anything of value from the homicide, then say "Oh shucks, that didn't work, won't do that again."? ..."
"... Yet there is no discussion of this of which I am aware, and the Wikipedia editors controlling the Wikipedia page for the murder of Seth Rich absolutely prohibit discussion, even on their "Talk Page" of such questions. E.g., their deletion of the question I asked here, under the heading "Why the "conspiracy theory" pejorative?" (which resulted in not only being deleted but a "Sanction" against me for daring to ask the question). ..."
"... CIA/NSA is already watching wikileaks due to Manning, etc) and "sees' that Rich has passed files. ..."
"... Intel filters up to Obama, Brennan, NSA people, Clinton and others that Rich has passed info to Wikileaks and then wikileaks announces and publishes the material. ..."
"... The DNC + Obama and other leftist deep staters concoct the Russian hacking meme to distract from the content of the material as well as to begin discredit Trump (and perhaps even develop a means of deposing him should he actually be elected). ..."
"... There is a connection between Seth and the Pakistani guy who had free rein with a lot of dem congresspeople's computers!!! His protector, Lil Debbie WS!!! There is a Podesta email where he states something to the effect that the person be taught a lesson as an example, guilty or not! ..."
Oct 23, 2018 | turcopolier.typepad.com

If Russia had actually "hacked" the DNC emails then the National Security Agency would have had proof of such activity. In fact, the NSA could have tracked such activity. But they did not do that. That lack of evidence did not prevent a coordinated media campaign from spinning up to pin the blame on Russia for the "theft" and to portray Donald Trump as Putin's lackey and beneficiary.

Any effort to tell an alternative story has met with stout opposition. Fox News, for example, came under withering fire after it published an article in May 2017 claiming that Seth Rich, a young Democrat operative, had leaked DNC emails to Julian Assange at Wikileaks. The family of Seth Rich reacted with fury and sued Fox, Malia Zimmerman and Ed Butowsky, but that suit subsequently was dismissed.

Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange.

While the content of these documents remain classified for now, they may provide documentary proof that Seth Rich "dropped boxed" the emails to Julian. If these documents are declassified, a big hole could be blown in the claim that Russia hacked the DNC.


Keith Harbaugh , 2 months ago

There is a local angle to the Seth Rich murder story I have not seen discussed. Consider:
But the circumstances and facts surrounding the murder were strange. Seth was shot in the back. Nothing was taken from his body -- not his watch, not his wallet and not his credit cards.

The story promulgated by the MSM and Wikipedia is that the Washington DC MPD believe the crime was a botched robbery.

But attempted robberies are not normally a unique event. If it was a botched robbery, it seems almost certain that the perpetrator(s) would, having failed in this attempt, try again to execute a robbery.

And use the same MO (modus operandi). But I have seen no reports of other such homicide/robbery combinations. If this was truly a unique event, how would that be possible? Is it really plausible that the perps would kill one person, fail to get anything of value from the homicide, then say "Oh shucks, that didn't work, won't do that again."? There certainly are reports of serial robberies in Washington. Very hard to believe this is an exception.

Yet there is no discussion of this of which I am aware, and the Wikipedia editors controlling the Wikipedia page for the murder of Seth Rich absolutely prohibit discussion, even on their "Talk Page" of such questions. E.g., their deletion of the question I asked here, under the heading "Why the "conspiracy theory" pejorative?" (which resulted in not only being deleted but a "Sanction" against me for daring to ask the question).

Eric Newhill , 2 months ago
PT,

So is the theory, more or less, that

  1. As a Sanders supporter, Rich was appalled by how the DNC screwed Sanders (and maybe some other things he learned also contributed to his decision to engage in espionage against the DNC)
  2. Rich decides to expose DNC corruption.
  3. Rich downloads the files locally and then passes them to wikileaks.
  4. CIA/NSA is already watching wikileaks due to Manning, etc) and "sees' that Rich has passed files.
  5. Intel filters up to Obama, Brennan, NSA people, Clinton and others that Rich has passed info to Wikileaks and then wikileaks announces and publishes the material.
  6. The DNC + Obama and other leftist deep staters concoct the Russian hacking meme to distract from the content of the material as well as to begin discredit Trump (and perhaps even develop a means of deposing him should he actually be elected).
  7. Rich is the wild card. He could confess that he did it all by himself - and he could create a spectacle by explaining why.
  8. 8. They kill Rich to remove the only serious threat to their nefarious plot....?
Larry McDonald , 2 months ago
"Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange."

What's your source?

Publius Tacitus -> Larry McDonald , 2 months ago
The source is the letter that the lawyer, Ty Clevenger, received from the NSA. I have seen the letter.
Pat Lang Mod -> Larry McDonald , 2 months ago
You don't really expect him to tell you, do you?
KatieWeddington -> Larry McDonald , 2 months ago
Letter has been released. http://lawflog.com/?attachm...
Walrus , 2 months ago
Another case of "Arkancide"?
jnewman -> Walrus , 2 months ago
Vince Foster?
Pat Lang Mod -> Walrus , 2 months ago
The Serb?
amuncat -> Walrus , 2 months ago
There is a connection between Seth and the Pakistani guy who had free rein with a lot of dem congresspeople's computers!!! His protector, Lil Debbie WS!!! There is a Podesta email where he states something to the effect that the person be taught a lesson as an example, guilty or not!

[Jan 02, 2019] The malware sample claimed to Russian in DNC "hack" is actually appear to be Ukrainian and was possible planted by Crowstrike to implicate Russians

Notable quotes:
"... War or the threat of war is needed to distract attention from rapidly devolving societal bonds and immense economic inequality. ..."
Jan 02, 2019 | www.moonofalabama.org

Partisan , Feb 21, 2018 3:38:27 AM | link

https://www.wordfence.com/blog/2016/12/russia-malware-ip-hack/

Conclusion regarding IP address data: What we're seeing in this IP data is a wide range of countries and hosting providers. 15% of the IP addresses are Tor exit nodes. These exit nodes are used by anyone who wants to be anonymous online, including malicious actors.

Overall Conclusion: The IP addresses that DHS provided may have been used for an attack by a state actor like Russia. But they don't appear to provide any association with Russia. They are probably used by a wide range of other malicious actors, especially the 15% of IP addresses that are Tor exit nodes.

The malware sample is old, widely used and appears to be Ukrainian. It has no apparent relationship with Russian intelligence and it would be an indicator of compromise for any website.

WJ , Feb 21, 2018 6:38:11 AM | link
War or the threat of war is needed to distract attention from rapidly devolving societal bonds and immense economic inequality.
JC , Feb 21, 2018 9:20:58 AM | link
Interesting, too, that the Dark State appears to be sending out talking points this week to the effect that the alleged hacking of the DNC is an "act of war." IfI'm not mistaken, the US recently revised war policy to include cyber attacks, whether they actually happened or not, as being the same as a kinetic attack. Looks to me like we are seeing the beginning of a long-term pysop/PR campaign to build support for a "preemptive" strike against Russia and China that would, presumably, include nukes.

[Dec 20, 2018] One of the two CrowdStrike executives that had helped push the story to the press was a former department director at the FBI serving under Robert Mueller

Notable quotes:
"... (discovered in 2017 and 2018 but largely ignored by the press), ..."
Dec 20, 2018 | disobedientmedia.com

The CrowdStrike Connection

CrowdStrike is a high-profile cybersecurity firm that worked with the DNC (Democratic National Committee) in 2016 and was called in due to a suspected breach. However, CrowdStrike appears to have first started working with the DNC approximately five weeks prior to this and approximately just five days after John Podesta (Hillary Clinton's campaign manager for the 2016 election) had his Gmail account phished. Nothing was mentioned about this until after the five weeks had passed when the DNC published a press release stating that CrowdStrike had been at the DNC throughout that period to investigate the NGP-VAN issues (that had occurred three months before Podesta was phished).

Upon conclusion of those five weeks, CrowdStrike was immediately called back in to investigate a suspected breach. CrowdStrike's software was already installed on the DNC network when the DNC emails were acquired but CrowdStrike failed to prevent the emails from being acquired and didn't publish logs or incident-specific evidence of the acquisition event either, the latter of which is odd considering what their product's features were advertised to be even if they were just running it in a monitoring capacity .

There are additional questions to be asked about why Guccifer 2.0 went to the effort he did to fabricate Russian-themed evidence (discovered in 2017 and 2018 but largely ignored by the press), bizarrely supporting some of the most significant claims made by CrowdStrike just one day earlier.

If Mueller's attribution of Guccifer 2.0 to the GRU is correct, why would the GRU want to fabricate evidence to support CrowdStrike's allegations against Russia when another one of CrowdStrike's directors conceded they had no hard evidence at the time? This issue has not yet been adequately explained.

All of these oddities are relevant because one of the two CrowdStrike executives that had helped push the story to the press was a former department director at the FBI serving under Robert Mueller , and, judging on the fact they were dining together at an executive retreat after that individual had retired , it would seem that they are friends too.

[Dec 20, 2018] Forensicator Guccifer 2.0 Returns To The East Coast by Elizabeth Lea Vos

Once is happenstance. Twice is coincidence. Three times is enemy action. ~ Ian Fleming
Notable quotes:
"... We believe that in all three cases Guccifer 2 was unlikely to anticipate that this Eastern timezone setting could be derived from the metadata of the documents that he published. However, one vocal critic with significant media reach objected to our East Coast finding as it related to our analysis of the ngpvan .7z file. This critic concluded instead that Guccifer 2 deliberately planted that clue to implicate a DNC worker who would die under suspicious circumstances a few days later on July 10, 2016. ..."
"... Now, we have this additional East Coast indication, which appears just one day after the ngpvan.7z files were collected. This new East Coast indication is found in a completely different group of files that Guccifer 2 published on his blog site. Further, this East Coast finding has its own unique and equally unlikely method of derivation. ..."
"... If we apply our critic's logic, what do we now conclude? That Guccifer 2 also deliberately planted this new East Coast indication? To what end? We wonder: Will this new evidence compel our out-spoken critic to retract his unsubstantiated claims and accusations? ..."
Dec 20, 2018 | www.zerohedge.com
Elizabeth Lea Vos Tue, 12/18/2018 - 22:43 45 SHARES

Via Disobedient Media.

Editorial Note: The Forensicator recently published a report, titled " Guccifer 2 Returns To The East Coast ." Forensicator provided the following introduction to his latest findings, reproduced here with the permission of the author.

In this post, we announce a new finding that confirms our previous work and is the basis for an update that we recently made to Guccifer 2's Russian Breadcrumbs . In our original publication of that report, we posited that there were indications of a GMT+4 timezone offset (legacy Moscow DST) in a batch of files that Guccifer 2 posted on July 6, 2016. At the time, we viewed that as a "Russian breadcrumb" that Guccifer 2 intentionally planted.

Now, based on new information, we have revised that conclusion: The timezone offset was in fact GMT-4 (US Eastern DST) . Here, we will describe how we arrived at this new, surprising conclusion and relate it to our prior work.

A month/so after publication, Stephen McIntyre ( @ClimateAudit ) replicated our analysis. He ran a few experiments and found an error in our original conclusion.

We mistakenly interpreted the last modified time that LibreOffice wrote as "2015-08-25T23:07:00Z" as a GMT time value. Typically, the trailing "Z" means " Zulu Time ", but in this case, LibreOffice incorrectly added the "Z". McIntyre's tests confirm that LibreOffice records the "last modified" time as local time (not GMT). The following section describes the method that we used to determine the timezone offset in force when the document was saved.

LibreOffice Leaks the Time Zone Offset in Force when a Document was Last Written

Modern Microsoft Office documents are generally a collection of XML files and image files. This collection of files is packaged as a Zip file. LibreOffice can save documents in a Microsoft Office compatible format, but its file format differs in two important details: (1) the GMT time that the file was saved is recorded in the Zip file components that make up the final document and (2) the document internal last saved time is recorded as local time (unlike Microsoft Word, which records it as a GMT [UTC] value).

If we open up a document saved by Microsoft Office using the modern Office file format ( .docx or .xlsx ) as a Zip file, we see something like the following.

LibreOffice , as shown below, will record the GMT time that the document components were saved. This time will display as the same value independent of the time zone in force when the Zip file metadata is viewed.

For documents saved by LibreOffice we can compare the local "last saved" time recorded in the document's properties with the GMT time value recorded inside the document (when viewed as a Zip file). We demonstrate this derivation using the file named potus-briefing-05-18-16_as-edits.docx that Guccifer 2 changed using LibreOffice and then uploaded to his blog site on July 6, 2016 (along with several other files).

Above, we calculate a time zone offset of GMT-4 (EDT) was in force, by subtracting the last saved time expressed in GMT (2016-07-06 17:10:58) from the last saved time expressed as local time (2016-07-06 13:10:57).

We've Been Here Before

The Eastern timezone setting found in Guccifer 2's documents published on July 6, 2016 is significant, because as we showed in Guccifer 2.0 NGP/Van Metadata Analysis , Guccifer 2 was likely on the East Coast the previous day, when he collected the DNC-related files found in the ngpvan.7z Zip file. Also, recall that Guccifer 2 was likely on the East Coast a couple of months later on September 1, 2016 when he built the final ngpvan.7z file.

We believe that in all three cases Guccifer 2 was unlikely to anticipate that this Eastern timezone setting could be derived from the metadata of the documents that he published. However, one vocal critic with significant media reach objected to our East Coast finding as it related to our analysis of the ngpvan .7z file. This critic concluded instead that Guccifer 2 deliberately planted that clue to implicate a DNC worker who would die under suspicious circumstances a few days later on July 10, 2016.

Further, this critic accused the Forensicator (and Adam Carter ) of using this finding to amplify the impact of Forensicator's report in an effort to spread disinformation. He implied that Forensicator's report was supplied by Russian operatives via a so-called "tip-off file." The Forensicator addresses those baseless criticisms and accusations in The Campbell Conspiracy .

Now, we have this additional East Coast indication, which appears just one day after the ngpvan.7z files were collected. This new East Coast indication is found in a completely different group of files that Guccifer 2 published on his blog site. Further, this East Coast finding has its own unique and equally unlikely method of derivation.

If we apply our critic's logic, what do we now conclude? That Guccifer 2 also deliberately planted this new East Coast indication? To what end? We wonder: Will this new evidence compel our out-spoken critic to retract his unsubstantiated claims and accusations?

Closing Thought: Once is happenstance. Twice is coincidence. Three times is enemy action. ~ Ian Fleming


tion , 12 hours ago link

It is curious how those running vpn's often don't bother appropriately setting their device time zones.

Regarding the closing thought, that was my thinking regarding the Byzantine Vegetable 'ally' at /qr in a non-American time zone who repeatedly attacked me.

Perhaps I have shared some harsh words with you and William, but I do sincerely care for your well being and my appreciation for the work you both have done remains. The Optics have been understandably difficult to swallow for many, but I hope that in your own time, you both will be willing to take another look at Q.

Q is Stephen Miller, and Q+ is POTUS.

Best Wishes to you both.

Q's tion

Bastiat , 12 hours ago link

Interesting to see Fleming -- as time goes on, it is pretty clear that he was telling us a few things about how power really works--psychopathic oligarchs with private wetworkers. Of course now we have governments competing to hire the same mercenaries -- and the uniformed mercenaries working oligarchs with government complicity.

Etymology , 21 hours ago link

In short, not a Hack by "Ruski's" a leak by an insider due to the impossibility to data transfer rates.

When will we see a rational investigation and prosecution of these criminals?

boattrash , 13 hours ago link

" When will we see a rational investigation and prosecution of these criminals? "

40 years from now, when **** gets declassified, and the Globalists up in Yanktown have accomplished their mission of destruction.

[Oct 25, 2018] DNC Emails--A Seth Attack Not a Russian Hack by Publius Tacitus

Highly recommended!
Notable quotes:
"... Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange. While the content of these documents remain classified for now, they may provide documentary proof that Seth Rich "dropped boxed" the emails to Julian. If these documents are declassified, a big hole could be blown in the claim that Russia hacked the DNC. ..."
"... Another case of "Arkancide"? ..."
"... I came to this summary today after I had turned my T.V. off since all the news is now about the "bombs" being mailed to the Clintons and Obamas. (I was afraid a story line would soon continue that the bombs were from Russia via the White House. I can no longer feel certain that anything reported in the "news" is true and wonder what part of it is made up from thin air. ..."
"... And I am sad that such a huge number of American citizens simply no longer care what is true or what is not true. They believe only what they want to believe. Mostly I am sad that Seth Rich lived and died and few seem to want to know the facts surrounding his death. ..."
"... Guccifer 2.0 was nothing but an elaborate joke. ..."
Oct 25, 2018 | turcopolier.typepad.com

Tacitus01

If Russia had actually "hacked" the DNC emails then the National Security Agency would have had proof of such activity. In fact, the NSA could have tracked such activity. But they did not do that. That lack of evidence did not prevent a coordinated media campaign from spinning up to pin the blame on Russia for the "theft" and to portray Donald Trump as Putin's lackey and beneficiary.

Any effort to tell an alternative story has met with stout opposition. Fox News, for example, came under withering fire after it published an article in May 2017 claiming that Seth Rich, a young Democrat operative, had leaked DNC emails to Julian Assange at Wikileaks. The family of Seth Rich reacted with fury and sued Fox, Malia Zimmerman and Ed Butowsky, but that suit subsequently was dismissed.

Now there is new information, courtesy of the National Security Agency aka NSA, that confirms that the NSA has Top Secret and Secret documents that are responsive to a FOIA request for material on Seth Rich and his contacts with Julian Assange. While the content of these documents remain classified for now, they may provide documentary proof that Seth Rich "dropped boxed" the emails to Julian. If these documents are declassified, a big hole could be blown in the claim that Russia hacked the DNC.


Walrus , a day ago

Another case of "Arkancide"?
jnewman -> Walrus , 12 hours ago
Vince Foster?
DianaLC , 13 hours ago
PT, thank for the very detailed description of the entire story surrounding the supposed Russian hack of the DNC emails.

I always find myself screaming at the T.V. whenever a supposed reporter mentions the supposed Russian hack of the DNC computers as if such an event is settled history.

I came to this summary today after I had turned my T.V. off since all the news is now about the "bombs" being mailed to the Clintons and Obamas. (I was afraid a story line would soon continue that the bombs were from Russia via the White House. I can no longer feel certain that anything reported in the "news" is true and wonder what part of it is made up from thin air.

And I am sad that such a huge number of American citizens simply no longer care what is true or what is not true. They believe only what they want to believe. Mostly I am sad that Seth Rich lived and died and few seem to want to know the facts surrounding his death.

Snow Flake -> Lefty , 12 hours ago
Ellipsis, linguistically? Don't you automatically add what is omitted? ... Russia had (n't) anything ...

Guccifer 2.0 was nothing but an elaborate joke.

[Sep 19, 2018] Trump Says FBI Is A Cancer In Our Country

That's a bold statement but cancerous growth is typical of any intelligence agency, especially CIA: all of them want more and more budget money and try to influence both domestic and foreign policy. That's signs of cancel.
FBI actually has dual mandate: suppressing political dissent (STASI functions) and fight with criminals and organized crime.
The fact the President does not control his own administration, especially State Department isclearly visible now. He is more like a ceremonial figura that is allowed to rant on Twitter, but can't change any thing of substance in forign policy. and Is a typucal Repiblican in domenstic policy, betraying the electorate like Obama did
Notable quotes:
"... Sessions recused himself from the "Russia Collusion" investigation. Now that it is known to have been an extension of Democratic election rigging, and DC bureaucratic "Resistance," he could be initiate a broad sweep investigation into Washington, DC based bureaucratic bias and corruption. ..."
Sep 19, 2018 | www.zerohedge.com

Shifting from Sessions to the much-maligned FBI, Trump said the agency was "a cancer" and that uncovering deep-seated corruption in the FBI may be remembered as the "crowning achievement" of his administration, per the Hill .

"What we've done is a great service to the country, really," Trump said in a 45-minute, wide-ranging interview in the Oval Office.

"I hope to be able put this up as one of my crowning achievements that I was able to ... expose something that is truly a cancer in our country."

Moreover, Trump insisted that he never trusted former FBI Director James Comey, and that he had initially planned to fire Comey shortly after the inauguration, but had been talked out of it by his aides.

Trump also said he regretted not firing former FBI Director James Comey immediately instead of waiting until May 2017, confirming an account his lawyer, Rudy Giuliani, gave Hill.TV earlier in the day that Trump was dismayed in 2016 by the way Comey handled the Hillary Clinton email case and began discussing firing him well before he became president.

"If I did one mistake with Comey, I should have fired him before I got here. I should have fired him the day I won the primaries," Trump said. "I should have fired him right after the convention, say I don't want that guy. Or at least fired him the first day on the job. ... I would have been better off firing him or putting out a statement that I don't want him there when I get there."

The FISA Court judges who approved the initial requests allowing the FBI to surveil employees of the Trump Campaign also came in for some criticism, with Trump claiming they used "poor Carter Page, who nobody even knew, and who I feel very badly for...as a foil...to surveil a candidate or the presidency of the United States." Trump added that he felt the judges had been "misled" by the FBI.

He criticizing the Foreign Intelligence Surveillance Act (FISA) court's approval of the warrant that authorized surveillance of Carter Page, a low-level Trump campaign aide, toward the end of the 2016 election, suggesting the FBI misled the court.

"They know this is one of the great scandals in the history of our country because basically what they did is, they used Carter Page, who nobody even knew, who I feel very badly for, I think he's been treated very badly. They used Carter Page as a foil in order to surveil a candidate for the presidency of the United States."

As for the judges on the secret intelligence court: "It looks to me just based on your reporting, that they have been misled," the president said, citing a series of columns in The Hill newspaper identifying shortcomings in the FBI investigation. "I mean I don't think we have to go much further than to say that they've been misled."

"One of the things I'm disappointed in is that the judges in FISA didn't, don't seem to have done anything about it. I'm very disappointed in that Now, I may be wrong because, maybe as we sit here and talk, maybe they're well into it. We just don't know that because I purposely have not chosen to get involved," Trump said.

Trump continued the assault on Sessions during a brief conference with reporters Wednesday morning. When asked whether he was planning to fire Sessions, Trump replied that "we're looking into lots of different things."

To be sure, Sessions has managed to hang on thus far. And if he can somehow manage to survive past Nov. 6, his fate will perversely rest on the Democrats' success. Basically, if they wrest back control of the Senate (which, to be sure, is unlikely), Sessions chances of staying on would rise dramatically. But then again, how much abuse can a man realistically endure before he decides that the costs of staying outweigh the benefits of leaving?


DingleBarryObummer , 19 minutes ago

Sessions works for Trump, because Trump is running the uniparty russia-gate stormy-gate anti-trump show. Sessions was intentionally placed there to stonewall and make sure the kabuki goes on. Rosenstein is a Trump appointee. This **** garners sympathy for him as the persecuted underdog, rallies his base; and distracts from the obvious zio-bankster influence over his admin and his many unfulfilled campaign promises. He's deceiving you. Why do you think Giuliani acts like such a buffoon? It's because that's what he was hired for. All distractions and bullshit. He will not get impeached, Hillary is not going to jail, nothing will happen. The zio-Banksters will continue to stay at the top of the pyramid, because that's who trump works for, NOT you and me.

"While Trump's fascination with the White House still burned within him [re: 2011], he also had The Apprentice to deal with--and it wasn't as easy as you might think. He loved doing the show and was reluctant to give it up. At one point, he was actually thinking of hosting it from the oval office if he made it all the way to the White House. He even discussed it with Stephen Burke, the CEO at NBCUniversal, telling Burke he would reconsider running if the network was concerned about his candidacy." -Roger Stone

"To some people the notion of consciously playing power games-no matter how indirect-seems evil, asocial, a relic of the past. They believe they can opt out of the game by behaving in ways that have nothing to do with power. You must beware of such people, for while they express such opinions outwardly, they are often among the most adept players at power. They utilize strategies that cleverly disguise the nature of the manipulation involved. These types, for example, will often display their weakness and lack of power as a kind of moral virtue. But true powerlessness, without any motive of self-interest, would not publicize its weakness to gain sympathy or respect. Making a show of one's weakness is actually a very effective strategy, subtle and deceptive, in the game of power." -Robert Greene

Sparkey , 31 minutes ago

This is why the 'little' people love President 'The Donald' Trump, he says the things they would like to say, but have no platform to speak from, Mushroom man The Donald has no fear he has got Mushroom power, and he has my support in what ever he does!

Secret Weapon , 43 minutes ago

Is Sessions a Deep State firewall? Starting to look that way.

TrustbutVerify , 48 minutes ago

Sessions recused himself from the "Russia Collusion" investigation. Now that it is known to have been an extension of Democratic election rigging, and DC bureaucratic "Resistance," he could be initiate a broad sweep investigation into Washington, DC based bureaucratic bias and corruption.

I suspect Sessions will last until after the mid-term elections. Then Trump will fire him and bring someone like Gowdy in to head the DOJ and to bring about investigations.

And, my gosh, there seems to be so much to investigate. And to my mind prosecute.

loop, 49 minutes ago

"I've never seen a President - I don't care who he is - stand up to them (Israel). It just boggles the mind. They always get what they want. The Israelis know what is going on all the time. I got to the point where I wasn't writing anything down. If the American people understood what a grip these people have got on our government, they would rise up in arms.

Our citizens certainly don't have any idea what goes on."

- U.S. Navy Admiral and former head of the Joint Chiefs of Staff Thomas Moorer

mendigo, 59 minutes ago

Cool stuff. But really the cancer goes much deeper. That is the scary part. Trump is now largely controlled by the Borg.

Government employees and elected officials have a choice: can either play along and become wealthy and powerful or have their careers destroyed, or worse.

[Sep 16, 2018] Looks like the key players in Steele dossier were CIA assets

Highly recommended!
'Assume, for the sake of argument, that powerful, connected people in the intelligence community and in politics worried that a wildcard Trump presidency, unlike another Clinton or Bush, might expose a decade-plus of questionable practices. Disrupt long-established money channels. Reveal secret machinations that could arguably land some people in prison.
'What exactly might an "insurance policy" against Donald Trump look like?'
All this leads me back to the suspicion that Steele's involvement may have been less in crafting the dossier, than making it possible to conceal its actual origins while giving it an appearance of credibility. It could also be the case that Nellie Ohr's sudden interest in radio transmissions had to do with communications inside the United States, rather than with Steele.
Notable quotes:
"... A great deal of evidence, I think, suggests that practically all those involved in 'Russiagate' were caught totally unprepared by Trump's victory, that they then went rushing around like headless chickens, and that part of this process involved a decision being taken to publish the dossier, without consulting British intelligence. If people like Younger were not consulted, then it would seem to me unlikely that Steele was. ..."
"... And I have immense difficulty seeing how any competent media lawyer would not have recommended, at the minimum, the redaction of the names of Aleksej Gubarev and his company from the final December 2016 memorandum. This would have made legal action unlikely, without greatly diminishing the effect of the claims. ..."
"... But if this was so, and if what they thought was accurate information was actually disinformation, the likely conduit would not have been through Steele, but from FSB cybersecurity people to their FBI counterparts. ..."
"... It it is I think material that intelligence agencies commonly include a great variety of people, ranging from very able analysts and operators to complete dolts. So, the CIA has employed both Philip Giraldi and John Brennan, MI6 both Alastair Crooke and also Christopher Steele and Alex Younger. ..."
"... It is however somewhat revealing that one now finds Giraldi and Crooke appearing on a Russian site, 'Strategic Culture Foundation', while Brennan and Younger are treated as authoritative figures by the MSM. ..."
"... My strong suspicion is that 'Russiagate' is a kind of nemesis, arising from the fact that key figures in British and American intelligence have, over a protracted period of time, got involved in intrigues where they are way out of their depth. The unintended consequences of these have meant that people like Brennan and Younger, and also Hannigan, have ended up having to resort to desperate measures to cover their backsides. ..."
"... There are many aspects to this story that don't make any sense to me if one looks at it from a rational perspective. One of course being concerns about libel litigation and the related legal discovery that you note. The second being no real contingency planning in the event Hillary loses the election. Admittedly they must have bought the media line and Nate Silver's forecast of a greater than 75% probability of a Hillary win. ..."
"... The purported "arms length" relationships don't make any sense. There's Fusion GPS and Glenn Simpson playing a central role. They hire Nellie Ohr, a possible CIA asset and the wife of Bruce Ohr, the 4th highest ranking official at the DOJ. ..."
"... Glenn Simpson also hires Christopher Steele who he knows from previous "spook" associations. Steele had numerous and continuous communications including telephone, Skype, email and personal meetings with Bruce and Nellie Ohr during all this. ..."
"... Then there is Mifsud and Halper. Apparently both are CIA and FBI assets. ..."
"... You have Brennan ginning up concerns giving super secret and individual briefings to the Gang of 8 in Congress. There's Democratic Senator Mark Warner, the minority leader on the Senate Intelligence Committee texting and calling Adam Waldman, Deripaska's US attorney about setting up clandestine meetings with Steele. ..."
"... Not to be left behind there's Sen. McCain doing the same. His top aide even travels to London to meet Steele. And then there's Strzok and his mistress Lisa Page busily spending every waking moment texting each other about every twist and turn in all the political games being played. Of course there's Admiral Rogers investigating unusual searches by FBI officials and contractors on the NSA database. And he briefs President-elect Trump at Trump Tower which prompts the entire transition team to move to Trump's golf course in NJ. ..."
"... In fact the IG report on the Clinton "investigation" states that many at the FBI were accepting "gifts" from various media personalities for a quid pro quo ..."
"... There's Rod Rosenstein, Bruce Ohr's direct boss who testifies he knew nothing about Ohr being a conduit to Strzok for Steele. Of course he knew nothing but signed the FISA application on Carter Page. ..."
"... At this point I don't buy that Christopher Steele dug up real intelligence from his contacts at the highest levels of the Russian government, which caught Brennan, Clapper, Comey and Lynch's pants on fire, who then launched a formal investigation of Russia collusion with Trump. Many things just don't pass the smell test. Now of course I have no qualifications nor experience in spookdom. ..."
"... I agree that it (and Skripalmania) are almost impossible to make sense of unless you think of a bunch of highly politicised not very bright people sinking deeper and deeper into what looked like a bright idea at the time. ..."
"... I ask because, if one tries to look at it in a non-partisan way, the Western IC seemed to be a failure when it came to predicting Russian reactions in the Donbass, the Crimea, and it seems in Syria. I link this to various comments from Colonel Lang indicating that true experts were replaced over the years by less experienced and knowledgeable people. Does being "highly politicised" mean that they're not up to much when it comes to minding the shop? ..."
"... I thought I detected a protest against the politicisation of the US in the world some years ago. And we must not forget that Gen Flynn (DIA) and Adm Rogers (NSA) acted strongly against this. Flynn was the first casualty of the Trump/Russia hysteria and the Clapper claque tried to fire Rogers. ..."
"... I was born in the Depression and have seen vitriolic politics but never have seen such a massive opposition by the media, the pundits and the establishment of both parties. Over 500 print publications endorsed Hillary. Only some 20 endorsed Trump. Yet he confounds the pundits by winning the election. Clearly many voters are at odds with the political media class. ..."
"... I think there is an ideological background to this, on which the piece by Alastair Crooke – himself former MI6 – to which Patrick Armstrong links, and the piece by James George Jatras to which Crooke links, are both to the point. The 'end of history' crowd thought they were inhabiting a realised utopia, and cannot cope with the fact that their dream is collapsing. ..."
"... In relation to the millenarian undercurrents on which Crooke focuses, however, it is also worth noting that a traditional conservative suspicion has been that millenarianism is naturally linked to antinomianism: the belief that the moral law is not binding on the elect. ..."
"... It is obviously possible that Ohr did not report up the chain of command, and if so, he and his wife become pivotal figures in the conspiracy. Alternatively, it could be that Rosenstein is lying – in which case, we have large questions about who else is implicated, and specifically whether the termination of Steele by the FBI was anything more than a ruse. ..."
"... 'Yet, Simpson allegedly acknowledged that most of the information Fusion GPS and British intelligence operative Christopher Steele developed did not come from sources inside Moscow. "Much of the collection about the Trump campaign ties to Russia comes from a former Russian intelligence officer (? not entirely clear) who lives in the U.S.," Ohr scribbled in his notes.' ..."
"... And it confirms my strong suspicion that the dossier is actually a composite product, much of it assembled at Fusion, which could indeed contain material from a range of people from the former Soviet space, who could living in the United States, Britain, or elsewhere – Ukraine and the Baltics being obvious possibilities. ..."
"... So Sergei Skripal and Sergei Millian, neither of whom fit the description by Simpson, have been mentioned as possible sources, and there is also the very curiously ambiguous role of Rinat Akhmetshin. ..."
"... All these people, obviously, could simply have fabricated material or retailed gossip, and Steele himself was involved in fabricating material on an industrial scale to cover up what actually happened to Alexander Litvinenko. ..."
"... All this leads me back to the suspicion that Steele's involvement may have been less in crafting the dossier, than making it possible to conceal its actual origins while giving it an appearance of credibility. It could also be the case that Nellie Ohr's sudden interest in radio transmissions had to do with communications inside the United States, rather than with Steele. ..."
"... Apparently that organisation is doing rather well in sustaining the claiming that 'fair report privilege' could circumvent any requirement to prove truth – and a key question now is whether documents which the DOJ is being forced to produce will establish that the dossier was being used by officials in ways that would trigger the privilege as of 10 January 2017. ..."
"... That said, what Ohr reports Simpson as telling him raises fundamental questions about how anyone could have relied upon the dossier for anything – and should push people back to actually asking hard questions about its origins. ..."
"... To add: Steele was on the FBI's payroll, in addition to being on Fusion GPS's payroll. And on the payroll of Her Majesty's Government. After he got caught leaking to the media he was apparently "fired" by the FBI. But he was continuing to communicate and brief through Bruce Ohr at the DOJ. ..."
"... I think the circle of Glenn Simpson. Chris Steele, Bruce & Nellie Ohr, Adam Waldman. Peter Strzok, and Sen. Mark Warner will be very interesting to pursue. ..."
"... The other circle that should be investigated is the Brennan, Clapper, Lynch, Comey, Yates, Susan Rice. ..."
"... No investigation can exclude the active participation of key people from the media complex including people like Comey's good friend Benjamin Wittes. ..."
"... In its original version, the 'Statement of Principles' explained, among other things, that the Society: 'Believes that only modern liberal democratic states are truly legitimate, and that any international organization which admits undemocratic states on an equal basis is fundamentally flawed.' ..."
"... Ironically, it was shortly after the publication of the dossier that Anatol Lieven published in the 'National Interest' an article entitled 'Is America Becoming a Third World Country?' (See https://nationalinterest.or... .) ..."
"... Also in June, Sergei Karaganov published a piece in 'Russia in Global Affairs', of which he is publisher, entitled 'Ideology of Eastward Turn.' ..."
"... I do not think Karaganov's article is simply a reflection of changes in Russian attitudes. The changes, it seems to me, are global. ..."
"... I do think that we in the West really blew it. In 1990, we could have said, in all humility, that our way of life (IMO the key word is pluralism) had proven more survivable. So we should welcome the others into the tent. Instead, we were right and that was that. ..."
"... Just as you're asking about the origins of the dossier I wonder if it was orchestrated or something that evolved organically? If it was orchestrated, then who was the mastermind? Did Brennan, Clapper and Come sit down and hatch it or was Simpson the brains? What is astounding is the scale. So many people involved. Were they all motivated by ideology or by the need to protect their racket? ..."
"... It seems there are many sub-plots. There's the Deripaska, Steele, Waldman, Mueller, Sen. Warner angle. Then there's the Simpson, Steele, Ohr, Strzok, Page, McCabe angle. There's also the Simpson, Steele, media reporters angle. Then there's the whole Mifsud, Halper, Carter Page, Papadopolous, Downer bit. There's the Comey, Rosenstein, Yates, Strzok FISA application piece. Then there's all the stuff happening in the UK including Hannigan's resignation as soon as Trump is elected. Of course the whole Mueller appointment and the obstruction of justice thread to tie Trump's hand. There are so many elements. Who initiated and coordinated? Was each element separate? ..."
"... Together, these methods are likely to have produced a mass of information. It is important to remember, for example, that at the time of his mysterious death on 23 March 2013 Boris Berezovsky was negotiating to return to Russia, and that his head of security, Sergei Sokolov did return, with a 'cache' of documents. ..."
"... The purpose was to demonstrate that Alexei Navalny was the instrument of a 'régime change' plot in which William Browder was acting as an agent of MI6. ..."
"... An important role in the Apelbaum piece is played by the private security company Hakluyt. A quick look at the entries on Wikipedia and Powerbase will make clear that, if there is a British 'deep state', this is likely to be at its core. ..."
"... It is against this background that on has to see a specific claim which Apelbaum makes, for which I do not think any evidence is produced, about two figures whose role in 'Russiagate' is clearly central. So Luke Harding is described as 'A Guardian reporter and a Hakluyt and Orbis contractor' (note word.) Meanwhile, Edward Baumgartner is described as 'Co-founder of Edward Austin. Contractor at Orbis and Hakluyt.' ..."
"... That Harding is corrupt, as also Sir Robert Owen's 'Inquiry' into the death of the late Alexander Litvinenko, I can prove. When Owen's report was published in January 2016, a preliminary response by me was posted here on SST, which among other things listed some of the evidence establishing that the interviews supposedly recorded with Litvinenko by Detective Inspector Brent Hyatt immediately before his death were blatant forgeries. ..."
"... In relation to that part of the evidence discussed in my January 2016 post which exposes the fumbling attempts by Steele and his colleagues to cover up the truth about when and how Litvinenko travelled into central London on the day he was supposedly killed, most of this had been among a mass of material submitted by me to the Inquiry Team, which I have e-mails to prove was read. ..."
"... Further study of Owen's report has confirmed my suspicion that a strong 'prima facie case' of conspiracy to pervert the course of justice exists against very many of those involved in it. ..."
"... At the same time, materials produced on the Russian side have confirmed my suspicion that the reason why Steele and others have been able to get away with their cover-up is that the Russian intelligence services are no more enthusiastic than their British counterparts about having anything like the whole truth about how Litvinenko lived and died made public. ..."
"... Additionally, the text itself displays an odd parallelism with his assertion regarding the Steele Dossier- that is, the likelihood of multiple authors, of diverse origins. ..."
"... My curiosity about who Apelbaum might be is reinforced by the fact that the intimations he gives about his background in his responses to comments, while not incompatible with what he has said in the past, do not sit so easily with it. ..."
"... So, questions naturally arise about Apelbaum's intelligence career, in particular, who he is likely to have been employed by, and associated with, in the past, and whether he is still involved with any of those agencies which have employed him. ..."
"... 'Also, there is a large Hakluyt/Orbis "commercial intelligence" network in the US that regularly services political and federal agencies and has the power to summon Nazgûls the likes of John Brennan. So Steele is not the new kid on the block, he has been doing this type of work long before 2016. This is also why he has such a cozy relationship with the brass at the DOJ and state.' ..."
"... This is that he, the Ukrainian nationalist former KGB person Yuri Shvets, the convicted Italian disinformation peddler Mario Scaramella, and quite possibly the sometime key FBI expert on Mogilevich, Robert 'Bobby' Levinson, were involved in trying to suggest that Mogilevich was an instrument of a plot by Putin to equip Al Qaeda with a 'mini nuclear bomb.' ..."
"... In his prepared statement, Lugovoi claimed that his supposed victim used to say that everyone in Britain were ''retards', to use the translation submitted in evidence to Owen's Inquiry, or 'idiots', to use that by RT. And according to this version, the British believed in everything that 'we' – that is, the Berezovky group – said was happening in Russia. ..."
"... Whether or not Litvinenko expressed this cynical contempt, the credulity with which the claims of the 'information operations' people around Berezovsky have been accepted – well illustrated by Owen's report and perhaps most ludicrous in Harding's journalism – makes clear it is justified. ..."
"... Perhaps then, cartoons about Trump as a puppet, with the strings pulled by another puppet representing Manafort, whose strings are in turn pulled by Putin, should be replaced by ones in which Mueller is seen as a puppet manipulated by the ghost of Boris Berezovsky. ..."
"... But that is the irony. The relationship with Berezovsky blew up in the faces of all concerned, when in the wake of the successsful corruption of the investigation into the death of Litvinenko by him and his 'information operations' people, he attempted to recoup his fortunes by suing Roman Abramovich, and got taken to pieces by Lord Sumption. ..."
"... The 'Vesti Nedeli' piece uses what Elizaveta Berezovskaya says in support of the claim that Berezovsky was murdered by British 'special forces', because he was planning to return to Russia, and he 'knew too much about them.' ..."
"... One of the things I've never understood about the Trump Dossier story is the lack of any forensic analysis of its content and style anywhere in the media, even the alt media. Who was supposed to have actually written it? Steele? The style does not match someone of his background and education, and the formatting and syntax were atrocious. The font actually varied from "report" to "report." It certainly did not give me the impression of being the product of a high-end, Belgravia consultancy. ..."
"... I wonder whether it was produced by an American of one sort or another and then "laundered" by being accorded association with the UK firm. Given that Steele just happened to be hired by the USG to help in the anti-FIFA skulduggery, he and his firm seem very much to be a concern that does dirty little jobs that need discretely to be done, though in this case, the discretion was undermined. ..."
"... Most of the memos were issued before October and Fusion/Simpson authorized Steele to release information to the FBI starting in July. The question is why the memos were released after the election when a release before the election would have been enough to sink Trump. Instead the FBI and presumably those paying Fusion on Hillarys behalf sat on it, and Comey comes out days before the election ..."
"... Kind of looks like they all wanted Trump in office and the disclosure was to give Trump the excuse needed to back track on his promises to improve relations with Russia and blame that on pressure from the Deep State and Russia Gate. ..."
"... Looking at Trumps history with Sater (FBI/CIA asset) and his political aspirations that began following his Moscow visit in 1987 it seems likely Trump has been a Deep State asset for 30 years and fed intelligence to CIA/FBI on Russian oligarchs and mafia . Indeed he may well have duped Russians into believing he was working for them when in fact it was the CIA/FBI who had the best Kompromat with US RICO laws that could have beggared him ..."
"... One thing to remember about the FBI is Sy Hersh. Hersh claims the FBI has been sitting on a report for two years that fingers murdered DNC staffer Seth Rich as the Wikileaks DNC email leaker (or one of them, at least.) ..."
"... I suspect the decision to publish the dossier was political. It was required to enable Clapper, Brennan, and others to opine on national media and create further media hysteria prior to the vote as well as to justify the counter-intelligence investigations underway. They were throwing the kitchen sink to sink Trump's electoral chances. I don't think a lot of thought was given about the legal ramifications. ..."
"... This seems to be a pattern. Leak information. Then use the leaked story to justify actions like apply for a FISA warrant or fan the media flames. ..."
"... I find it incredulous that former leaders of the intelligence and law enforcement agencies have gained paid access to powerful media platforms and they have used it to launch vicious attacks on a POTUS. ..."
"... I find it amazing that McCabe and Peter Strzok are raising hundreds of thousands of dollars on social media platforms. ..."
"... If the GOP retains the House and Jim Jordan becomes speaker, then there may be a possibility that Sessions, Rosenstein and Wray may be fired and another special counsel appointed who will then convene a grand jury. ..."
Aug 23, 2018 | turcopolier.typepad.com

My strong impression is that nobody on the British side vetted the dossier for publication. A striking feature of the early news coverage is that there appeared to be total confusion, with some of the reporting suggesting that the sources quoted wanted to hang him out to dry, others that they wanted to defend him.

An interesting aspect is that not only were anonymous sources linked to MI6 quoted on both sides of the argument -- which could have been explained by disagreements within the organisation: in different stories, not however far apart in date, its head, Sir Alex Younger, was portrayed as holding radically different views.

When CNN publicised the existence of the dossier on 10 January 2017, the same day that it was published by 'BuzzFeed', it suggested that the author was British. The following day, the WSJ named Steele.

On 13 January, Martin Robinson, UK Chief Reporter for 'Mail Online', published a report whose headlines seem worth quoting in full:

'I introduced him to my wife as James Bond': Former spy Chris Steele's friends describe a "show-off" 007 figure but MI6 bosses brand him "an idiot" for an "appalling lack of judgement" over the Trump "dirty dossier": Intelligence expert Nigel West says friend is like Ian Fleming's famous character; He said: "He's James Bond. I actually introduced him to my wife as James Bond'; Mr West says Steele dislikes Putin and Kremlin for ignoring rules of espionage; Angry spy source calls him 'idiot' and blasts decision to take on the Trump work; Current MI6 boss Sir Alex Younger is said to be livid about reputation damage.'

(See http://www.dailymail.co.uk/... . )

On 15 January, however, Kim Sengupta, Defence Editor of the 'Independent', produced a report headlined: 'Head of MI6 used information from Trump dossier in first public speech; Warnings on cyberattacks show ex-spy's work is respected.'

(See https://www.independent.co.... .)

A great deal of evidence, I think, suggests that practically all those involved in 'Russiagate' were caught totally unprepared by Trump's victory, that they then went rushing around like headless chickens, and that part of this process involved a decision being taken to publish the dossier, without consulting British intelligence. If people like Younger were not consulted, then it would seem to me unlikely that Steele was.

This leads me on to another puzzle about the dossier to which I have been having a difficulty finding a solution. Long years ago I was reasonably familiar with libel law in relation to journalism. Anyone who 'served indentures', as very many of us did in those days, had to study it. Later, I got involved in a protracted libel suit -- successfully, I hasten to add -- in relation to a programme I made, and had the sobering experience of having a top-class libel barrister requiring me to justify every assertion I had made.

In the jargon then, a crucial question when an article, or programme, was being 'vetted' before publication was whether it represented a 'fair business risk.' This involved both the technical legal issues, and also judgements as to whether people were likely to sue, and how if they did the case would be likely to pan out.

On the face of things, one would not have expected that people at 'BuzzFeed' would have gone ahead and make the dossier public, without having it 'vetted' by competent lawyers. And I have difficulty seeing how, if they did, the advice could have been to publish what they published.

I have some difficulty seeing how the advice could have been to include the memorandum with the claims about the Alfa Group oligarchs, unless either these could be seriously defended or it was assumed that contesting them effectively would involve revealing more 'dirty linen' than these wanted to see aired in public.

And I have immense difficulty seeing how any competent media lawyer would not have recommended, at the minimum, the redaction of the names of Aleksej Gubarev and his company from the final December 2016 memorandum. This would have made legal action unlikely, without greatly diminishing the effect of the claims.

Trying to make sense of why such an obvious precaution was not taken, I find myself wondering whether, in fact, the reason may have been that the people responsible for the dossier may have actually believed this part of it at least.

If that is so, however, the most plausible explanation I can see is that while other claims in the dossier may well be total fabrication, either by the people at Fusion and Steele or by some of their questionable contacts, this information at least did come from what Glenn Simpson, Nellie Ohr et al thought were reliable Russian government sources.

But if this was so, and if what they thought was accurate information was actually disinformation, the likely conduit would not have been through Steele, but from FSB cybersecurity people to their FBI counterparts.

I think that the cases involving Karim Baratov and Dmitri Dokuchaev and his colleagues may be much more complex than is apparent from what looks to me like patent disinformation put out both on the Western and Russian sides.

It it is I think material that intelligence agencies commonly include a great variety of people, ranging from very able analysts and operators to complete dolts. So, the CIA has employed both Philip Giraldi and John Brennan, MI6 both Alastair Crooke and also Christopher Steele and Alex Younger.

It is however somewhat revealing that one now finds Giraldi and Crooke appearing on a Russian site, 'Strategic Culture Foundation', while Brennan and Younger are treated as authoritative figures by the MSM.

If you want to get a clear picture of quite how low-grade the latter figure is, incidentally, it is worth looking at the speech to which Kim Sengupta refers.

(See https://www.sis.gov.uk/medi... .)

A favourite line of mine comes in Younger's discussion of the -- actually largely mythical -- notion of 'hybrid warfare': 'In this arena, our opponents are often states whose very survival owes to the strength of their security capabilities; the work is complex and risky, often with the full weight of the State seeking to root us out.'

Leaving aside the fact that this is borderline illiterate, what it amazing is Younger's apparent blindness to clearly unintended implications of what he writes. If indeed, the 'very survival' of the Russian state 'owes to the strength of [its] security capabilities', the conclusions, seen from a Russian point of view, would seem rather obvious: vote Putin, and give medals to Patrushev and Bortnikov.

My strong suspicion is that 'Russiagate' is a kind of nemesis, arising from the fact that key figures in British and American intelligence have, over a protracted period of time, got involved in intrigues where they are way out of their depth. The unintended consequences of these have meant that people like Brennan and Younger, and also Hannigan, have ended up having to resort to desperate measures to cover their backsides.

Posted at 01:19 PM in Habakkuk , Intelligence | Permalink

Jack , 4 days ago

David

There are many aspects to this story that don't make any sense to me if one looks at it from a rational perspective. One of course being concerns about libel litigation and the related legal discovery that you note. The second being no real contingency planning in the event Hillary loses the election. Admittedly they must have bought the media line and Nate Silver's forecast of a greater than 75% probability of a Hillary win.

The purported "arms length" relationships don't make any sense. There's Fusion GPS and Glenn Simpson playing a central role. They hire Nellie Ohr, a possible CIA asset and the wife of Bruce Ohr, the 4th highest ranking official at the DOJ.

Glenn Simpson also hires Christopher Steele who he knows from previous "spook" associations. Steele had numerous and continuous communications including telephone, Skype, email and personal meetings with Bruce and Nellie Ohr during all this. They even have discussions about Deripaska and about his visa application to visit the US. Bruce is a conduit to Strzok at FBI. Glenn Simpson also is part of these discussions with Steele and the Ohrs.

Simpson also arranges for Steele to brief "reporters" like David Corn and others at the NY Times, WaPo, WSJ, Politico and others. Then there is Mifsud and Halper. Apparently both are CIA and FBI assets. They are communicating with Carter Page and Papadopolous, who in turn is drinking and yapping with Aussie ambassador Downer.

You have Brennan ginning up concerns giving super secret and individual briefings to the Gang of 8 in Congress. There's Democratic Senator Mark Warner, the minority leader on the Senate Intelligence Committee texting and calling Adam Waldman, Deripaska's US attorney about setting up clandestine meetings with Steele. There's Sen. Harry Reid passing on the Steele "dossier" to Comey.

Not to be left behind there's Sen. McCain doing the same. His top aide even travels to London to meet Steele. And then there's Strzok and his mistress Lisa Page busily spending every waking moment texting each other about every twist and turn in all the political games being played. Of course there's Admiral Rogers investigating unusual searches by FBI officials and contractors on the NSA database. And he briefs President-elect Trump at Trump Tower which prompts the entire transition team to move to Trump's golf course in NJ.

Oh, there is also Nellie Ohr setting up ham radio to avoid detection in her communications with Steele. Then we have everyone leaking and spinning to their "cohorts" in the premier media like the NY Times, CNN and WaPo.

Comey even has his buddy a professor and ostensibly his legal counsel on the payroll of the FBI as a contractor with access to all the sensitive databases leaking to the media.

Andy McCabe has his legal counsel Lisa Page spin stories around his wife's huge campaign contributions from Clinton consigliere McAuliffe.

In fact the IG report on the Clinton "investigation" states that many at the FBI were accepting "gifts" from various media personalities for a quid pro quo.

As if all this was not enough there's AG Loretta Lynch, meeting with Bill Clinton on a tarmac ostensibly to discuss their grandkids. Not to forget there were these "unmaskings" of surveillance information by Susan Rice, Samantha Power.

There's Rod Rosenstein, Bruce Ohr's direct boss who testifies he knew nothing about Ohr being a conduit to Strzok for Steele. Of course he knew nothing but signed the FISA application on Carter Page. Then there are the FISC judges who never believed their mandate required them to verify the evidence before issuing sweeping surveillance warrants. Now all this is what I as an old farmer and winemaker have read. Those more in tune would easily add to these convoluted machinations.

I don't know how to make sense of all this. All I see is the extent of effort to prevent Donald Trump from being elected and after he won from governing. The most obvious observation is that the leadership in our law enforcement and intelligence agencies are so busy politicking spinning and leaking they have neither the time or the inclination let alone competence to do their real job for which they get paid a handsome wage and sterling benefits.

At this point I don't buy that Christopher Steele dug up real intelligence from his contacts at the highest levels of the Russian government, which caught Brennan, Clapper, Comey and Lynch's pants on fire, who then launched a formal investigation of Russia collusion with Trump. Many things just don't pass the smell test. Now of course I have no qualifications nor experience in spookdom.

If you have any speculative theories that connects some of the dots it would be my great pleasure to read.

Patrick Armstrong -> Jack , 3 days ago

I agree that it (and Skripalmania) are almost impossible to make sense of unless you think of a bunch of highly politicised not very bright people sinking deeper and deeper into what looked like a bright idea at the time.

Confident that their horse is going to win the race and that the media will cover it all up and nobody will ever hear anything about anything. Now that the unexpected happened, they're just spinning and denying faster hoping the Dems win in Nov and stop all the investigations. And, they're getting nervous wondering who's going to sell out whom next. Up and down, around and around. Gerbils -- there really isn't anything very consistent, planned or thought-out.

In this respect, this piece attempts to make sense (on a very large scale) of their panic. https://www.strategic-cultu...

English Outsider -> Patrick Armstrong , a day ago

"I agree that it (and Skripalmania) are almost impossible to make sense of unless you think of a bunch of highly politicised not very bright people sinking deeper and deeper into what looked like a bright idea at the time."

I believe your summary of what's happening is more accurate than Alastair Crooke's as set out in the article linked to.

But bright or not, what are these people in the IC doing being "highly politicised"? Does that not render them considerably less efficient?

I ask because, if one tries to look at it in a non-partisan way, the Western IC seemed to be a failure when it came to predicting Russian reactions in the Donbass, the Crimea, and it seems in Syria. I link this to various comments from Colonel Lang indicating that true experts were replaced over the years by less experienced and knowledgeable people. Does being "highly politicised" mean that they're not up to much when it comes to minding the shop?

Patrick Armstrong -> English Outsider , 5 hours ago

I thought I detected a protest against the politicisation of the US in the world some years ago. And we must not forget that Gen Flynn (DIA) and Adm Rogers (NSA) acted strongly against this. Flynn was the first casualty of the Trump/Russia hysteria and the Clapper claque tried to fire Rogers.

https://russia-insider.com/...

Jack -> Patrick Armstrong , 3 days ago

Patrick

Usually the incumbent party loses the mid-term election. The Democrats lost big in Obama's first mid-term. The Republicans won the House and gained six senators. While the punditry claims a Blue Wave and Nate Silver is giving the Dems the odds. I'm not so sure. I think the GOP will increase their majority in the Senate putting any conviction of Trump out of question.

I was born in the Depression and have seen vitriolic politics but never have seen such a massive opposition by the media, the pundits and the establishment of both parties. Over 500 print publications endorsed Hillary. Only some 20 endorsed Trump. Yet he confounds the pundits by winning the election. Clearly many voters are at odds with the political media class.

Patrick Armstrong -> Jack , 2 days ago

Yeah. My bet is that the Repubs hold onto both. 1) the economy is getting better 2) what do the Dems have to offer other than this crazy Trump/Russia thing?

Rob -> Patrick Armstrong , a day ago

Economy will slow down sharply in 2019 but there should be enough momentum to help with the mid-terms. Trump needs to stop with the endless sanction stuff. The House does look like a close one.

Pat Lang Mod -> Rob , a day ago

what is the evidence for a slowdown in 2019?

Rob -> Pat Lang , a day ago

With all the caveats that apply to financial forecasting copper, monetary indicators and equity markets are all flagging a slowdown is upon us.

David Habakkuk -> Jack , 3 days ago

Jack,

At a very general level, a 'speculative theory' which I have been mulling over for some time was rather well set out in a commentary in 'The Hill' on 9 August by Sharyl Attkisson, which opens:

'Let's begin in the realm of the fanciful.

'Assume, for the sake of argument, that powerful, connected people in the intelligence community and in politics worried that a wildcard Trump presidency, unlike another Clinton or Bush, might expose a decade-plus of questionable practices. Disrupt long-established money channels. Reveal secret machinations that could arguably land some people in prison.

'What exactly might an "insurance policy" against Donald Trump look like?'

And Attkisson goes on to outline precisely the developments that appear to have happened.

(See http://thehill.com/opinion/... .)

I think there is an ideological background to this, on which the piece by Alastair Crooke – himself former MI6 – to which Patrick Armstrong links, and the piece by James George Jatras to which Crooke links, are both to the point. The 'end of history' crowd thought they were inhabiting a realised utopia, and cannot cope with the fact that their dream is collapsing.

In relation to the millenarian undercurrents on which Crooke focuses, however, it is also worth noting that a traditional conservative suspicion has been that millenarianism is naturally linked to antinomianism: the belief that the moral law is not binding on the elect. And in turn, according to a familiar skeptical view, antinomianism can easily end up in in straightforward rascality.

On the rascality – to which Attkisson is pointing – I am working on how parts of the picture can be fleshed out. A few preliminary points raised by your remarks.

As you note, 'There's Rod Rosenstein, Bruce Ohr's direct boss who testifies he knew nothing about Ohr being a conduit to Strzok for Steele.' So, we know that Ohr and Steele were conspiring together to ensure that the latter could continue to be intimately involved in the Mueller investigation, despite the FBI termination,

It is obviously possible that Ohr did not report up the chain of command, and if so, he and his wife become pivotal figures in the conspiracy. Alternatively, it could be that Rosenstein is lying – in which case, we have large questions about who else is implicated, and specifically whether the termination of Steele by the FBI was anything more than a ruse.

If, as seems to me likely, although not certain, the second possibility is closer to the truth than the former, then before Ohr testifies on 28 August before the House Judiciary and Oversight Committees he will have to consider whether he is prepared to 'take the rap' for his superiors, or 'sing sweetly.'

The fact that in a report in 'The Hill', I think on the same day as the Attkisson piece, John Solomon was quoting from Ohr's handwritten notes of a meeting with Glenn Simpson in December 2016 makes me wonder whether he may not already have made a decision. A key paragraph from the report:

'Yet, Simpson allegedly acknowledged that most of the information Fusion GPS and British intelligence operative Christopher Steele developed did not come from sources inside Moscow. "Much of the collection about the Trump campaign ties to Russia comes from a former Russian intelligence officer (? not entirely clear) who lives in the U.S.," Ohr scribbled in his notes.'

(See http://thehill.com/hilltv/r... .)

There is I think a need for caution here. There is no guarantee that Simpson was telling the literal truth to Ohr, or indeed the latter reproducing with absolute accuracy with he was told (handwritten notes can be disposed of easily, but they can also be rewritten.)

One is I think on firmer ground in relation to what it suggests was not the case – that there is any substance whatsoever in the ludicrous story of someone running a private security company in London sending out hired employees who then gain access to top Kremlin insiders, with these, of course, telling them precisely what they actually think.

And it confirms my strong suspicion that the dossier is actually a composite product, much of it assembled at Fusion, which could indeed contain material from a range of people from the former Soviet space, who could living in the United States, Britain, or elsewhere – Ukraine and the Baltics being obvious possibilities.

So Sergei Skripal and Sergei Millian, neither of whom fit the description by Simpson, have been mentioned as possible sources, and there is also the very curiously ambiguous role of Rinat Akhmetshin.

All these people, obviously, could simply have fabricated material or retailed gossip, and Steele himself was involved in fabricating material on an industrial scale to cover up what actually happened to Alexander Litvinenko.

That said, I continue to think it possible that both the second and final memoranda may incorporate some 'glitter', as well as 'chickenfeed' fed from FSB cybersecurity people to their FBI counterparts, to hark back to George Smiley says to the Minister, quite possibly included in the hope that the BS involved would be reproduced in contexts where it could provoke legal action.

All this leads me back to the suspicion that Steele's involvement may have been less in crafting the dossier, than making it possible to conceal its actual origins while giving it an appearance of credibility. It could also be the case that Nellie Ohr's sudden interest in radio transmissions had to do with communications inside the United States, rather than with Steele.

It could then be that Steele has been, in effect, hoist with his own petard, in that he is having to sustain the fiction that he had some kind of grounds for making the claims about Aleksej Gubarev and XBT. How far this matters, at least in relation to the action bought against 'BuzzFeed' in Florida, remains moot at the moment.

Apparently that organisation is doing rather well in sustaining the claiming that 'fair report privilege' could circumvent any requirement to prove truth – and a key question now is whether documents which the DOJ is being forced to produce will establish that the dossier was being used by officials in ways that would trigger the privilege as of 10 January 2017.

That said, what Ohr reports Simpson as telling him raises fundamental questions about how anyone could have relied upon the dossier for anything – and should push people back to actually asking hard questions about its origins.

fanto -> David Habakkuk , 2 days ago

Mr Habakkuk, you mention "ambiguous role of Rinat Akhmetshin" - I am not sure if you meant Akhmetov.

I am surprised and curious about you mentioning him - if you meant Akhmetov - because that is one name among all the oligarchs which has so far not been prominent. Thank you for your posts, these posts and the SST comments could and should serve as help to the congressional investigations and hearings.

blue peacock -> Jack , 4 days ago

Jack

To add: Steele was on the FBI's payroll, in addition to being on Fusion GPS's payroll. And on the payroll of Her Majesty's Government. After he got caught leaking to the media he was apparently "fired" by the FBI. But he was continuing to communicate and brief through Bruce Ohr at the DOJ.

I think the circle of Glenn Simpson. Chris Steele, Bruce & Nellie Ohr, Adam Waldman. Peter Strzok, and Sen. Mark Warner will be very interesting to pursue.

The other circle that should be investigated is the Brennan, Clapper, Lynch, Comey, Yates, Susan Rice.

No investigation can exclude the active participation of key people from the media complex including people like Comey's good friend Benjamin Wittes.

Patrick Armstrong , 3 days ago

Younger isn't the brightest bulb in the box, is he?

"If you doubt the link between legitimacy and effective counter-terrorism, then – albeit negatively – the unfolding tragedy in Syria will, I fear, provide proof. I believe the Russian conduct in Syria, allied with that of Assad's discredited regime, will, if they do not change course, provide a tragic example of the perils of forfeiting legitimacy. In defining as a terrorist anyone who opposes a brutal government, they alienate precisely that group that has to be on side if the extremists are to be defeated. Meanwhile, in Aleppo, Russia and the Syrian regime seek to make a desert and call it peace. The human tragedy is heart-breaking"

David Habakkuk -> Patrick Armstrong , 3 days ago

Patrick,

Those were indeed some of the most inane comments in an inane piece.

But then, if you read an interview given to Jay Elwes of 'Prospect' magazine in May last year by Younger's predecessor Sir Richard Dearlove, who looks to have been a significant background presence in what has been going on, you will find that, although he is much more coherent than than his successor, it is almost as inane.

(See https://www.prospectmagazin... . )

As it happens, Dearlove was one of the signatories of the 'Statement of Principles' of something called the 'Henry Jackson Society.'

This was founded in 2005, in Cambridge, by a group in whom acolytes of an historian called Maurice Cowling were prominent – Dearlove is himself a graduate in history from that university.

In its original version, the 'Statement of Principles' explained, among other things, that the Society: 'Believes that only modern liberal democratic states are truly legitimate, and that any international organization which admits undemocratic states on an equal basis is fundamentally flawed.'

(See https://en.wikipedia.org/wi... .)

Ironically, it was shortly after the publication of the dossier that Anatol Lieven published in the 'National Interest' an article entitled 'Is America Becoming a Third World Country?' (See https://nationalinterest.or... .)

Among other things, he harked back to the way that, in 1648, a century and a half of bloody ideological strife in Europe had been ended with a recognition that the legitimacy of different state forms had to be accepted, if a kind of 'war of all against all' was to be avoided.

And Lieven went on to reflect on the way that, at what was then widely seen as the end of the Cold War, the abandonment of universalisitic pretensions by Russia and China was interpreted as justifying an embrace of these by the the West.

This, he went on to argue, had actually had the paradoxical effect of relegitimising 'régimes' which do not conform to Western 'democratic' models, concluding by noting what appears to our new, quasi-Soviet, preference for not letting experience interfere with ideological dogma:

'Finally – even after the catastrophes of Iraq and Libya – there is almost no awareness among US policymakers of the fact that US attempts to change the regimes of other countries are likely to be seen not only by the elites of those countries but also by their populations as leading to – and intended to lead to – the destruction of the state itself, leading to disaster for its society and population. When the Communist regime in the USSR collapsed (though only in part under Western pressure), it took the Soviet state with it. The Russian state came close to following suit in the years that followed, Russia was reduced to impotence on the world stage, and large parts of the Russian and other populations suffered economic and social disaster. Remembering their own past experiences with state collapse, warlordism, famine and foreign invasion, Chinese people looked at this awful spectacle and huddled closer to the Chinese state – one that they may dislike in many ways, but which they certainly trust more than anything America has to offer – especially given the apparent decay of democracy throughout the West.'

( https://nationalinterest.or... .)

I read with interest your piece back in June entitled 'Putin Once Dreamed the American Dream', reprinting Charles Heberle's account of the 'Transforming Subjects Into Citizens' project, and the attitude of some people close to Putin to it.

(See https://patrickarmstrong.ca... .)

One of the things which struck me was that the question why the American Revolution succeeded, and so many others failed, which was concerning the intellectuals to whom Heberle talked, is one of the central questions of modern political thought, from Tocqueville on.

(Indeed, the question of the preconditions for what might be called 'constitutional' government, has been central to 'republican' thought, ever since it was revived by Italian thinkers, including prominently Machiavelli, when the 'Renaissance' made them reactivate and rework debates from ancient Rome and Greece.)

However, to hark back to the anxieties expressed by Lieven, nothing in the analysis of the great French thinker necessary guarantees that the success of 'Democracy in America' is stable and permanent, or indeed that the relatively civilised order of the post-war 'Pax Americana' is necessarily durable in Western Europe.

Also in June, Sergei Karaganov published a piece in 'Russia in Global Affairs', of which he is publisher, entitled 'Ideology of Eastward Turn.' A paragraph that struck me:

'Russian society should by no means abdicate from its mostly European culture. But it should certainly stop being afraid, let alone feel ashamed, of its Asianism. It should be remembered that from the standpoint of prevailing social mentality and society's attitude to the authorities Russia, just as China and many other Asian states, are offspring of Chengiss Khan's Empire. This is no reason for throwing up hands in despair or for beginning to despise one's own people, contrary to what many members of intelligencia sometimes do. It should be accepted as a fact of life and used as a strength. The more so, since amid the harsh competitive environment of the modern world the authoritarian type of government – in the context of a market economy and equitable military potentials – is certainly far more effective than modern democracy. This is what our Western partners find so worrisome. Of course, we should bear in mind that authoritarianism – just like democracy – may lead to stagnation and degradation. Russia is certainly confronted with such a risk.'

Unlike you, I cannot claim serious expertise on Russia. But, as a reasonably alert generalist television current affairs producer, I took note of the indications which were emerging in the course of 1987 that the Gorbachev 'new thinking' was underpinned by a realisation that Soviet institutions and ideas had become fundamentally dysfunctional, to which you have referred repeatedly over the years.

And, after long tedious months trying interest the powers that were in British broadcasting in what was happening, I ended up producing a couple of programmes for BBC Radio in February/March 1989 in which we interviewed some of the leading 'new thinkers', among them Karaganov's then immediate superior at the Institute of Europe, Vitaly Zhurkin.

At the Institute for the USA and Canada, by contrast, we did not interview its head, Georgiy Arbatov, but his deputy, Andrei Kokoshin, and one of the latter's mentors on military matters and collaborators General-Mayor Valentin Larionov, who I later realised had earlier been one of the foremost Soviet nuclear strategists. (At the Institute for World Economy and International Relations, we interviewed Arbatov's son, Alexei.)

Talking to these people we got a sense, although it had to be fleshed out later, of the scale of the disillusion with Soviet models, and indeed – which began to frighten me not long after – of the way many of them were romanticising the West.

What Karaganov now writes is I think a hardly very surprising reaction to the way that the Western powers responded to the 'new thinking.' Moreover, it seems to me that the disillusionment involved is in no sense particular Russian, but rather global.

If one regards 'democracy' as though it were quoted on the stock exchange, before 1914 there were very many buyers, including among the Russian élite. By 1931, in very many places, including large sections of the 'intelligentsia' in Western countries, it was a sellers' market, to put it mildly.

After 1945, a kind of long 'bull market' in 'democracy' started: for very good reasons.

The – largely but very far from entirely – peaceful retreat and collapse of Soviet power was to a very significant extent the product of this. The subsequent behaviour of Western élites has generated a vicious 'bear market', a fact they appear unable to understand.

I do not think Karaganov's article is simply a reflection of changes in Russian attitudes. The changes, it seems to me, are global.

Patrick Armstrong -> David Habakkuk , 3 days ago

I do think that we in the West really blew it. In 1990, we could have said, in all humility, that our way of life (IMO the key word is pluralism) had proven more survivable. So we should welcome the others into the tent. Instead, we were right and that was that.

PS, in light of the Henry Jackson society and all Younger's references to "values" this one rather stands out "A vital lesson I take from the Chilcot Report is the danger of group think."

Yeah. Group think, the very opposite of what I mean by pluralism.

Jack -> David Habakkuk , 3 days ago

David,

Sharyl Atkinson describes well the conspiracy. When one steps back and look at all the machinations we know now, it seems incredible.

Just as you're asking about the origins of the dossier I wonder if it was orchestrated or something that evolved organically? If it was orchestrated, then who was the mastermind? Did Brennan, Clapper and Come sit down and hatch it or was Simpson the brains? What is astounding is the scale. So many people involved. Were they all motivated by ideology or by the need to protect their racket?

It seems there are many sub-plots. There's the Deripaska, Steele, Waldman, Mueller, Sen. Warner angle. Then there's the Simpson, Steele, Ohr, Strzok, Page, McCabe angle. There's also the Simpson, Steele, media reporters angle. Then there's the whole Mifsud, Halper, Carter Page, Papadopolous, Downer bit. There's the Comey, Rosenstein, Yates, Strzok FISA application piece. Then there's all the stuff happening in the UK including Hannigan's resignation as soon as Trump is elected. Of course the whole Mueller appointment and the obstruction of justice thread to tie Trump's hand. There are so many elements. Who initiated and coordinated? Was each element separate?

There's no doubt a political thriller movie could be made.

FB -> Patrick Armstrong , 3 days ago

Thanks for the quote...LOL

I guess the comedy part is that there actually exist people with medically functioning brains, who are somehow able to contort such a worldview...Aleppo as peaceful 'desert' indeed...who knew that having bearded fanatics in charge is somehow 'better'...[and not 'heart-breaking']...

Michael Regan , 2 days ago

Some here may find blogpost from March of this year interesting as it speaks to the production of the Steele dossier. I have not seen it mentioned here before and a site search produced no results. https://apelbaum.wordpress.... Some sections seem to have gotten David Cay Johnston's hackles up.

David Habakkuk -> Michael Regan , a day ago

Michael Regan,

I had seen Yaacov Apelbaum's piece referred to by Clarice Feldman in a post on the 'American Thinker' site a few days back, but not looked at it properly.

It is indeed fascinating, and clearly repays a closer study than I have so far had time to give it. I was however relieved to find that what Apelbaum writes 'meshes' quite well with my own views of the likely authorship of the dossier.

A question I have is whether the monumental amount of labour involved in producing it can really be the work of a single IT person – however wide-ranging his abilities and interests. My suspicion is that there may be input from Russian intelligence.

This is not said in order to discredit Apelbaum's work. In matters where I have had occasion critically to examine claims from official Russian sources, I have found several unsurprising, but recurring, patterns. Sometimes, the information provided can be shown to be essentially accurate, and it is reasonably clear how it has been obtained.

At other times, claims are made which information from other sources suggests either are, or may well be, true, but the 'sources and methods' involved are deliberately obscured, making evaluation more difficult.

And then, there are many occasions when what one gets is quite patently a mixture of accurate information and disinformation. Analysing these can be very productive, if one can both sift out the accurate information, and attempt to see what the disinformation is designed to obscure.

One thing of which I am absolutely certain is that the networks which are outlined by Apelbaum are precisely those which Russian intelligence will have spent a great deal of time and ingenuity penetrating.

This will have been attempted by 'SIGINT' and surveillance methods, and also through infiltrating agents and turning people. (There are often grounds to suspect that some of those most vociferously denouncing Putin are colluding with Russian intelligence.)

Together, these methods are likely to have produced a mass of information. It is important to remember, for example, that at the time of his mysterious death on 23 March 2013 Boris Berezovsky was negotiating to return to Russia, and that his head of security, Sergei Sokolov did return, with a 'cache' of documents.

Some of these were used back in April 2016 in a 'Vesti Nedeli' edition presented by Dmitry Kiselyov, who manages Russia's informational programming resources, and an accompanying documentary on the 'Pervyi Kanal' station.

The purpose was to demonstrate that Alexei Navalny was the instrument of a 'régime change' plot in which William Browder was acting as an agent of MI6.

There is a good discussion of this, which highlights some of the problems with the documents, by Gilbert Doctorow, and Sokolov appears to have been involved in some murky activities since.

(See https://russia-insider.com/... ; https://en.crimerussia.com/... .)

But whatever the credibility or lack of it of the material, its appearance illustrates a general pattern, where the political disintegration of the London-based opposition to Putin has meant that more and more people involved in it have been supplying information to the Russians.

If, as I strongly suspect, there is fire beneath the smoke in those Russian television programmes, and if a great part of a series of projects of a related kind orchestrated in conjunction by elements in American and British intelligence were actually large run from this side, this will be creating headaches for people in Washington, as well as London.

An important role in the Apelbaum piece is played by the private security company Hakluyt. A quick look at the entries on Wikipedia and Powerbase will make clear that, if there is a British 'deep state', this is likely to be at its core.

(See https://en.wikipedia.org/wi... ; http://powerbase.info/index... .)

It is against this background that on has to see a specific claim which Apelbaum makes, for which I do not think any evidence is produced, about two figures whose role in 'Russiagate' is clearly central. So Luke Harding is described as 'A Guardian reporter and a Hakluyt and Orbis contractor' (note word.) Meanwhile, Edward Baumgartner is described as 'Co-founder of Edward Austin. Contractor at Orbis and Hakluyt.'

That Harding is corrupt, as also Sir Robert Owen's 'Inquiry' into the death of the late Alexander Litvinenko, I can prove. When Owen's report was published in January 2016, a preliminary response by me was posted here on SST, which among other things listed some of the evidence establishing that the interviews supposedly recorded with Litvinenko by Detective Inspector Brent Hyatt immediately before his death were blatant forgeries.

If this is the case, then questions are raised about how much of the apparently compelling forensic evidence is forged – and close examination suggests that key parts of it are.

(See http://turcopolier.typepad.... .)

In relation to that part of the evidence discussed in my January 2016 post which exposes the fumbling attempts by Steele and his colleagues to cover up the truth about when and how Litvinenko travelled into central London on the day he was supposedly killed, most of this had been among a mass of material submitted by me to the Inquiry Team, which I have e-mails to prove was read.

Likewise, also in January 2016, I sent the key relevant evidence on this crucial matter to Harding and senior figures at the 'Guardian', and have reason to believe it was read.

Further study of Owen's report has confirmed my suspicion that a strong 'prima facie case' of conspiracy to pervert the course of justice exists against very many of those involved in it.

At the same time, materials produced on the Russian side have confirmed my suspicion that the reason why Steele and others have been able to get away with their cover-up is that the Russian intelligence services are no more enthusiastic than their British counterparts about having anything like the whole truth about how Litvinenko lived and died made public.

Given the central role which Steele has now assumed in what looks like one of the biggest political scandals in American history, and the fact that in his book 'Collusion' Harding was again coming out in support of him, it would be of the greatest possible interest if indeed the latter had combined being a senior 'Guardian' correspondent with being paid by both Orbis and – even more important – Hakluyt.

And, particularly given the peculiar ambiguities of the role both of Fusion GPS and Baumgartner in the 'Trump Tower' meeting, it would be of great interest if the latter could be tied not only to Fusion, but to Orbis and – again even more important – Hakluyt.

This in turn might be relevant in trying to make sense of whether the fact that he and Simpson appear to have been working against Trump and Browder at the same time was or was not part of an elaborate ploy to give credibility to 'information operations' against the former.

There are accordingly two possibilities. It may be that, while much else in the Apelbaum material can be shown to be accurate, such accurate information is being used to give credibility to disinformation.

Alternatively, he is being used as a conduit for accurate and really explosive information about the British end of 'Russiagate', which he is unlikely to have unearthed all by himself, and the actual sources of which are – for very understandable reasons – being obscured.

Michael Regan -> David Habakkuk , a day ago

Mr Habakkuk-

Thank you for your reply. You have given me much to think about and I am very grateful that you took the time to respond in such a comprehensive manner, and that you have provided me and others here with some really compelling information and notions.

In particular, the issue of sources and methods you note seems spot on. The author(s)'s information gathering methodologies and expertise are certainly not those of the laiety. In fact in the comments below his post YA mentions intelligence work.

Additionally, the text itself displays an odd parallelism with his assertion regarding the Steele Dossier- that is, the likelihood of multiple authors, of diverse origins.

One thing that did catch my eye was a response he made to David Cay Johnston's pissy request for a retraction about Jacoby involvement. YA included a quote in Latin from Cicero's accusations against Cataline. Here is the English: What is there that you did last night, what the night before -- where is it that you were -- who was there that you summoned to meet you -- what design was there which was adopted by you, with which you think that any one of us is unacquainted?

While this sort of riposte isn't exactly hyper-erudite, it ain't chopped liver either. What I mean to say is that exceptional cyber skills, algorithm coding (I'm guessing crawlers) are not commonly coupled with that sort of classical formation. His recourse to various biblical quotes suggests an unusual level of education as well. And no way is he younger than 38 or so.

At any rate, thank you for the article and your kind and informative reply.

David Habakkuk -> Michael Regan , a day ago

Michael Regan,

Thanks. I have now read both a good few of Apelbaum's earlier posts, and also the comments on his discussion of the dossier. Given the importance of his analysis of that document closer study is clearly needed of all this material, but I have some preliminary reactions.

My curiosity about who Apelbaum might be is reinforced by the fact that the intimations he gives about his background in his responses to comments, while not incompatible with what he has said in the past, do not sit so easily with it.

In a July 2010 post, he explained that: 'In my previous life, I was a civil engineer. I worked for a large power marine construction company doing structural design and field engineering.' According to the account he gave then, he subsequently shifted to software development.

(See https://apelbaum.wordpress.... .)

What he now tells us is that: 'As far as how I first started, I do have an intelligence background and have been developing OSINT/cyber/intelligence platforms for many years.'

That makes sense in terms of the analysis, which – whatever other inputs there may or may not have been – looks to me like the work of someone who has a serious background in these kinds of methodology, and moreover, is clearly not any kind of 'Fachidiot.'

So, questions naturally arise about Apelbaum's intelligence career, in particular, who he is likely to have been employed by, and associated with, in the past, and whether he is still involved with any of those agencies which have employed him.

Even if he is not, questions would obviously rise about present connections arising from past work. This is in addition to the possibility that the logic of events may have provoked him to collaborate with those who might earlier have been his adversaries.

Reading Apelbaum's work, I am reminded of another interesting intervention in an embittered argument relating to the Middle East and the post-Soviet space, from what turned out to be an unexpected source.

In the period following the 'false flag' sarin attack at Ghouta on 21 August 2013 an incisive demolition of the conventional wisdom was provided in the 'crowdsourced' investigation masterminded by one 'sasa wawa' on a site entitled 'Who Attacked Ghouta?'

(See http://whoghouta.blogspot.com .)

And then, in December 2016, an Israeli high technology entrepreneur called Saar Wilf, a former employee of Unit 8200, that country's equivalent of the NSA or GCHQ, who had subsequently made a great deal of money when he and his partner sold their company to Paypal, co-founded a site called 'Rootclaim.'

(See https://www.rootclaim.com .)

The site, it was explained, was dedicated to applying Bayesian statistics to 'current affairs' problems. This is a methodology, whose modern form owes much to work done at Bletchley Park in the war, which is invaluable in 'SIGINT' analysis and also combating online fraud.

At the outset, 'Rootclaim' posted a recycled version of some of the key material from the 'Who Attacked Ghouta?' investigation. So, it seems likely, if not absolutely certain, that Saar Wilf and 'sasa wawa' are one and the same.

Following the Salisbury incident on 4 March, a blogger using the name 'sushi' produced a series of eleven posts under the title 'A Curious Incident' on the 'Vineyard of the Saker' blog.

(See https://thesaker.is/tag/sushi/ .)

Again, there are some very clear resemblances to 'sasa wawa' and Saar Wilf, which made me wonder whether the same person may be reappearing under yet another 'moniker.'

While the 'flavour' of Apelbaum seems to be different, the combination of what looks like serious technical expertise in IT techniques relating to intelligence with broad general intellectual interests looks to me similar.

I was amused by the combination of his quotation of the words from John 8:32 etched into the wall of the original CIA headquarters – 'And you shall know the truth and the truth shall make you free' – and the following remarks:

'The June 2016 start date of Steele's contract with Fusion GPS is the start of the "billable" activity, not the beginning of the research. Steele and Simpson/Jacoby have been collaborating on Trump/Russia going back to 2009.

'Also, there is a large Hakluyt/Orbis "commercial intelligence" network in the US that regularly services political and federal agencies and has the power to summon Nazgûls the likes of John Brennan. So Steele is not the new kid on the block, he has been doing this type of work long before 2016. This is also why he has such a cozy relationship with the brass at the DOJ and state.'

As it happens, I think that many of the collaborations involved may have started significantly earlier than this. In his response to David Cay Johnston, Apelbaum links to an April 2007' WSJ' article by Simpon and Jacoby which, among other things, deals with Semyon Mogilevich.

This is behind a paywall, but, fortunately, the fact that Ukrainian nationalists have had an obvious interest in treating it as a source of reliable information has meant that it is easily accessible.

(See www.madcowprod.com/wp-conte... )

It should I think be clear from my January 2016 post why I find this particularly interesting, in that it has to be interpreted in the context of a crucial 'key' to the mystery of the death of Alexander Litvinenko.

This is that he, the Ukrainian nationalist former KGB person Yuri Shvets, the convicted Italian disinformation peddler Mario Scaramella, and quite possibly the sometime key FBI expert on Mogilevich, Robert 'Bobby' Levinson, were involved in trying to suggest that Mogilevich was an instrument of a plot by Putin to equip Al Qaeda with a 'mini nuclear bomb.'

So, I then come back to the question of whether this notion of a 'large Haluyt/Orbis "commercial intelligence" network in the US', playing the role of Sauron with Brennan, perhaps, as the 'Witch-king of Angmar', does or does not have substance.

If it does, there would be very good reasons for a variety of people, with a range of different attitudes to events in the post-Soviet space and the Middle East, to think that they had an interest in collaborating with Russian intelligence against a common enemy.

If it does not, then there is a real possibility that Apelbaum may be involved in using accurate intelligence to disseminate inaccurate. (It seems to me that he is much too intelligent to be a plausible candidate for the role of 'useful idiot.')

One further point that may, or may not, be relevant. Many of the most influential American and British Jews, for reasons which I find somewhat hard to understand, seem to have decided that the heirs of the architects of the Lvov pogrom are nice and cuddly.

So, for example, Chrystia Freeland, the unrepentant granddaughter of the notorious Nazi collaborator Michael Chomiak, has been able to end up as Canadian Foreign Minister because made a successful journalistic career on the London 'Financial Times', a paper with a strong Jewish presence.

That the editorial staff of such a paper thought it appropriate to have someone like Freeland as their Moscow correspondent gives you a good insight into how moronic British élites have become. This may well be relevant, in trying to evaluate claims about Hakluyt and other matters.

In relation to Apelbaum, it may be quite beside the point that other Jews from a Russian/East European background, both in Russia, Israel, and the United States, have very different views on Ukraine, Russia, and the dangers posed – not least to Israel – by jihadists. It is however a fact which needs to be born in mind, when one comes across people whose views cut across conventional dividing lines in the United States and Britain.

Beside the point in relation to Apelbaum, I am confident, but also needing to be kept in mind, is the possibility that elements in the United States 'intelligence community', seeing the 'writing on the wall', may think it appropriate to shift from trying to pass the buck by blaming the Russians to doing so by blaming the Brits.

Michael Regan -> David Habakkuk , a day ago

It seems apparent that Putin's reordering of the Russian economy after the collapse of Long-Term Capital Management, Republic Bank's difficulites and the death of Edmund Safra left a bitter taste in the mouths of many who had hoped to exercise rentier rights over the Russian economy and resources. Why so much US resources and energy have been committed to recovering a contested deed is a real conundrum.

I was unaware of Freeland's grandfather and his lamentable CV. Thank you. It's funny that you mentioned both the Ghouta post and the Vineyard of the Saker. I recall reading those and thinking- this is not like common fare on the intertubes.

Your last points about failings in the quality of elite decision-making is extremely important. This dynamic of the dumb (US, UK, EU) at the wheel is, for me, the most frightening feature of the current state of play. In the worst moments I fear we are all on a bus driven by a drunk monkey, careening through the Andes. It's going to hurt all the way to the bottom.

Again, I am very grateful for your replies and all the great information and thought.

David Habakkuk -> Michael Regan , 2 hours ago

Michael Regan,

I think the question of why large elements in both American and British élites got so heavily invested, in essence, in supporting the oligarchs who refused Putin's terms in what turned into a kind of 'bare knuckles' struggle they were always likely to lose is a very interesting one.

It has long seemed to me that, even if one looked at matters from the most self-interested and cynical point of view, this represented a quite spectacular error of judgement. And, viewing the way in which 'international relations' are rearranging themselves, I am reasonably confident that this was one matter on which I got things right.

A central reason for this, I have come to think, is that Berezovsky and the 'information operations' people round him – Litvinenko is important, but the pivotal figure, the 'mastermind', if you will, was clearly Alex Goldfarb, and Yuri Shvets and Yuri Felshtinsky both played and still play important supporting roles – were telling people in the West what these wanted to hear.

It is a truth if not quite 'universally acknowledged', at least widely recognised by those who have acquired some 'worldly wisdom', that intellectually arrogant people, with limited experience of the world and a narrow education, can commonly be 'led by the nose' by figures who have more of the relevant kinds of intelligence and experience, and few scruples.

This rather basic fact is central to understanding the press conference on 31 May 2007 where the figure whom the Berezovsky group and Christopher Steele had framed in relation to the death of Litvinenko, Andrei Lugovoi, responded to the Crown Prosecution Service request for his extradition.

In his prepared statement, Lugovoi claimed that his supposed victim used to say that everyone in Britain were ''retards', to use the translation submitted in evidence to Owen's Inquiry, or 'idiots', to use that by RT. And according to this version, the British believed in everything that 'we' – that is, the Berezovky group – said was happening in Russia.

(For the RT translation, see https://www.rt.com/news/and... .)

Whether or not Litvinenko expressed this cynical contempt, the credulity with which the claims of the 'information operations' people around Berezovsky have been accepted – well illustrated by Owen's report and perhaps most ludicrous in Harding's journalism – makes clear it is justified.

What moreover became very evident, when Glenn Simpson testified to the House Intelligence and Senate Judiciary Committees, was that he was once again recycling the Berezovsky's group's version of Putin 'sistema' as the 'return of Karla.'

Given what has been emerging on the ways in which Fusion GPS and Steele were both integrated into networks involving top-level people in the FBI, DOJ, State Department and CIA, it seems clear that the 'retards'/'idiots' label is as applicable to people on your side as to people on ours.

Perhaps then, cartoons about Trump as a puppet, with the strings pulled by another puppet representing Manafort, whose strings are in turn pulled by Putin, should be replaced by ones in which Mueller is seen as a puppet manipulated by the ghost of Boris Berezovsky.

But that is the irony. The relationship with Berezovsky blew up in the faces of all concerned, when in the wake of the successsful corruption of the investigation into the death of Litvinenko by him and his 'information operations' people, he attempted to recoup his fortunes by suing Roman Abramovich, and got taken to pieces by Lord Sumption.

As to what happened next, a recent item on 'Russian Insider', providing a link to and transcript of a more recent piece presented by Dmitry Kiselyov on 'Vesti Nedeli is a good illustration of where accurate information and disinformation can be mixed in material from Russian sources.

(See https://russia-insider.com/... .)

The piece, which appeared in July, discusses, and quotes from, an interview given the previous month to Dmitry Gordon, who runs a Ukrainian nationalist site, by Berezovsky's daughter Elizaveta. Among other things, this deals with Berezovsky's death.

(See https://gordonua.com/public... . A little manipulation will get you a reasonably serviceable English translation, although it becomes comic because Berezovsky is referred to as 'pope'.)

The 'Vesti Nedeli' piece uses what Elizaveta Berezovskaya says in support of the claim that Berezovsky was murdered by British 'special forces', because he was planning to return to Russia, and he 'knew too much about them.'

As it happens, this is a patently tendentious reading of what she says. However, interesting features of the actual text of the interview are 1. that it does provide what to my mind is compelling evidence that her father was murdered, and 2. while she clearly suggests that this was covered up by the British, she is not suggesting that they were responsible – but also not making Putin 'prime suspect.'

Whether the suggestion by his daughter that her father might have been murdered by people who knew that by so doing they might get control of assets he might otherwise recoup has any merit I cannot say: I doubt it but cannot simply rule the possibility out.

What remains the case is that at that point there were very many people, including but in no way limited to elements in Western intelligence agencies, who had strong interests in avoiding a return by Berezovsky to Russia.

And the same people had the strongest possible interest in avoiding his being treated at the Inquest into Litvinenko's death by a competent barrister representing the Investigative Committee of the Russian Federation in the way he had been treated by Lord Sumption.

Ironically, it may have been partly because Lugovoi had made a dramatic announcement that he was withdrawing from the proceedings less than a fortnight before Berezovsky's death that before this happened a lot of people were staring at an absolutely worst-case scenario.

Time and again, in Owen's report, one finds matters where he recycles patent disinformation, which a well-briefed barrister acting for the ICRF could have easily ripped to shreds. At the same time, in this situation, the Russians could most probably have made a reasonable fist of coping with the multiple contradictions in claims made on their own side.

And, crucially, their patent weak suit – the need to obscure the actual role of Russian intelligence in the smuggling of the polonium into London, which had nothing to do with any murder plot – could have been reasonably well 'covered.'

Precisely because of these facts, the one scenario which can very easily be completely ruled out is that which is basic to the 'information operations' now coming out of London and Washington. In this, Berezovsky's death is portrayed as a key element in a systematic attempt by the Putin 'sistema' to eradicate the supposedly heroic opposition, much of it located in London.

That sustaining this fable is critical to defending the credibility of Steele, and therefore of the whole 'Russiagate' narrative, is quite evident from the 'From Russia With Blood' materials published by 'BuzzFeed' in July last year.

(See https://www.buzzfeed.com/he... .)

This, however, leads on to a paradox, which is highlighted by a piece posted by James George Jatras on the 'Strategic Culture Foundation' site on 18 August, entitled 'Have You Committed Your Three Felonies Today?'

(See https://www.strategic-cultu... .)

Among the points Jatras – who I think is an Orthodox Christian – makes is that the logic of contesting the 'Russiagate' narrative has had some strange consequences. Among these, there is one on which the actual history of the activities of Berezovsky and his 'information operations' people bears directly:

'Flipping the "Russians did it" narrative: Among the President's defenders, on say Fox News, no less than among his detractors, Russia is the enemy who (altogether now!) "interfered in our elections" in order to "undermine our democracy." Mitt Romney was right! The only argument is over who was the intended beneficiary of Muscovite mendacity, Trump or Hillary – that's the variable. The constant is that Putin is Hitler and only a traitor would want to get along with him. All sides agree that the Christopher Steele dossier is full of "Russian dirt" – though there's literally zero actual evidence of Kremlin involvement but a lot pointing to Britain's MI6 and GCHQ.'

(See https://www.strategic-cultu... .)

For reasons I have already discussed, I think what while Jatras is substantially right, 'zero evidence' is only partially correct: It seems to me that disinformation supplied by elements in Russian intelligence could quite possibly have found its way into the second and final memoranda.

That said, Jatras has pointed to a fundamental feature of the current situation, which involves multiple ironies.

The total destruction of Steele's credibility could easily be achieved by anyone who was interested in looking at the evidence about the life and death of the late Alexander Litvinenko seriously. However, because a central tactic of most of those who are attacking the 'Russiagate' narrative has generally been 'Flipping the "Russians did it" narrative', they are like people who ought to be able to see Steele's 'Achilles' heel', but in practice, often end up attacking him where his armour is, without being, not at its weakest.

Meanwhile, as I have already stressed, the ability of the Russian authorities to undermine the 'narrative' produced by the 'information operations' people around Berezovsky, of whom the most important are Alex Goldfarb and Yuri Shvets, is compromised by their fear of having to 'own up to' their actual role in the smuggling of the polonium into London in October-November 2007.

The person who had a strong interest in blowing this structure of illusion to pieces was actually Lugovoi. But it seems to me at least possible that there has been a kind of disguised covert conspiracy by elements in Western and Russian intelligence to ensure there was no risk of him doing so.

Steve Smith , 3 days ago

One of the things I've never understood about the Trump Dossier story is the lack of any forensic analysis of its content and style anywhere in the media, even the alt media. Who was supposed to have actually written it? Steele? The style does not match someone of his background and education, and the formatting and syntax were atrocious. The font actually varied from "report" to "report." It certainly did not give me the impression of being the product of a high-end, Belgravia consultancy.

I wonder whether it was produced by an American of one sort or another and then "laundered" by being accorded association with the UK firm. Given that Steele just happened to be hired by the USG to help in the anti-FIFA skulduggery, he and his firm seem very much to be a concern that does dirty little jobs that need discretely to be done, though in this case, the discretion was undermined.

Paul M , 3 days ago

Most of the memos were issued before October and Fusion/Simpson authorized Steele to release information to the FBI starting in July. The question is why the memos were released after the election when a release before the election would have been enough to sink Trump. Instead the FBI and presumably those paying Fusion on Hillarys behalf sat on it, and Comey comes out days before the election

Saying he was reopening the HC email investigation.

Kind of looks like they all wanted Trump in office and the disclosure was to give Trump the excuse needed to back track on his promises to improve relations with Russia and blame that on pressure from the Deep State and Russia Gate.

Looking at Trumps history with Sater (FBI/CIA asset) and his political aspirations that began following his Moscow visit in 1987 it seems likely Trump has been a Deep State asset for 30 years and fed intelligence to CIA/FBI on Russian oligarchs and mafia . Indeed he may well have duped Russians into believing he was working for them when in fact it was the CIA/FBI who had the best Kompromat with US RICO laws that could have beggared him

richardstevenhack , 3 days ago

One thing to remember about the FBI is Sy Hersh. Hersh claims the FBI has been sitting on a report for two years that fingers murdered DNC staffer Seth Rich as the Wikileaks DNC email leaker (or one of them, at least.)

Now can we imagine that not everyone in a senior position at the FBI knows about that report? I can't. Literally everyone from the supervisor of the Special Agent or computer forensic investigator who examined Rich's computer right up to the Director HAD to know that report exists - and covered it up.

That right there is obstruction of justice and conspiracy. Literally everyone at the FBI who can't PROVE he didn't know about that report will be going to jail. The entire top administration of the FBI is going to go down.

And how many people at the Department of Justice are aware of that report? Did Rosenstein know? Who else in the Obama administration knew?

That would be motivation for a lot of desperate maneuvering. Add to that who was really behind the Steele Dossier and even more people are likely to end up in jail.

Pat Lang Mod -> richardstevenhack , 3 days ago

What is the link for Hersh saying that?

richardstevenhack -> Pat Lang , 3 days ago

You haven't heard that yet? It's the infamous audio tape that Hersh was caught on discussing it. He's since obfuscated what he said, but the tape stands on its own, and he has never said that anything he said on the tape wasn't true, despite that a lot of Democrats and Trump-bashers claim he has.

Here's one source on Youtube:

Seymour Hersh discussing Wikileaks DNC leaks Seth Rich & FBI report

https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FgYzB96_EK7s%3Ffeature%3Doembed&url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DgYzB96_EK7s&image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FgYzB96_EK7s%2Fhqdefault.jpg&key=21d07d84db7f4d66a55297735025d6d1&type=text%2Fhtml&schema=youtube

Pat Lang Mod -> richardstevenhack , 3 days ago

I have told you several times and I will tell you again probably hopelessly that Hersh PERSONALLY has told me that the "tape" was made without his permission or knowledge when he was aimlessly speculating on possibilities.

richardstevenhack -> Pat Lang , 3 days ago

I am unaware of your explicitly telling me that he personally told you that the tape was "aimless speculation." My apologies if I missed that response.

Of course the tape was made without his permission. We all know that. It's irrelevant to what he said on the tape.

What I'm saying is that despite what he may have told you, nothing on that tape sounds like "aimless speculation".

When you consider that he has four good reasons for dissembling about the tape, I view it as far more likely that everything he said was true.

1) If what he said is true, he may have compromised his FBI contact. Not good for his line of work.

2) If what he said is true, compromising that contact may well make all his other contacts wary about talking to him in the future - a bad deal for a journalist who relies on his contacts.

3) If what he said is true, he may have compromised his ability to get his "long form journalism" article published - a problem he already has had in the past.

4) If what he said is true, he's accusing the FBI of sitting on that report for two years, which might well make him a target of retaliation in some way.

If you believe that everything he said on the tape is untrue and that is what he explicitly told you, fine. I'm waiting for his "long form journalism" report to explain it. So far everything he has said publicly about it has not contradicted what he said on the tape, but merely waved his hands about it.

Pat Lang Mod -> richardstevenhack , 3 days ago

Sy Hersh talks a lot both loudly and profanely. He never intended to tell Buttowski that there was more than a possibility that the FBI held more than a rumor that this might be true. He talked to Buttowski because a mutual friend of him and me asked him to do so for no good reason. Please go talk to all the other people you pester and not on SST. You are an argumentative nuisance.

Aukuu Makule -> Pat Lang , 3 days ago

I have no stake in the debate about Rich, DNC, wikileaks.
But I do notice some loose ends. Hersh may well have engaged in speculation, but it is interesting speculation:
quote:
55. During his conversation with Butowsky, Mr. Hersh claimed that he had received information from an "FBI report." Mr. Hersh had not seen the report himself, but explained: "I have somebody on the inside who will go and read a file for me. And I know this person is unbelievably accurate and careful. He's a very high level guy."

56. According to Mr. Hersh, his source told him that the FBI report states that, shortly after Seth Rich's murder, the D.C. police obtained a warrant to search his home. When they arrived at the home, the D.C. police found Seth Rich's computer, but were unable to access it.The computer was then provided to the D.C. police Cyber Unit, who also were unable to access the computer. At that point, the D.C. police contacted the Cyber Unit at the FBI's Washington D.C. field office. Again, according to the supposed FBI report, the Washington D.C. field office was able to get into the computer and found that in "late spring early summer [2016], [Seth Rich][made] contact with Wikileaks." "They found what he had done. He had submitted a series of documents, of emails. Some juicy emails from the DNC." Mr. Hersh told Butowsky that Seth Rich "offered a sample [to WikiLeaks][,] an extensive sample, you know I'm sure dozens, of emails, and said I want money."
. . .
"I hear gossip," Hersh tells NPR on Monday. "[Butowsky] took two and two and made 45 out of it."
. . .
The clip is definitely worth listening to in its entirety if you haven't already. Hersh is heard telling Butowsky that he had a high-level insider read him an FBI file confirming that Seth Rich was known to have been in contact with WikiLeaks prior to his death, which is not even a tiny bit remotely the same as having "heard rumors". Hersh's statements in the audio recording and his statement to NPR cannot both be true.
endquote
https://medium.com/@caityjo...

blue peacock , 3 days ago

All

An interview of Rep. John Ratcliffe who will lead the questioning of Bruce Ohr.

https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fqn23H0vMCsM%3Ffeature%3Doembed&url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dqn23H0vMCsM&image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fqn23H0vMCsM%2Fhqdefault.jpg&key=21d07d84db7f4d66a55297735025d6d1&type=text%2Fhtml&schema=youtube

Rob , 3 days ago

I suspect Buzzfeed were in the grip of Trump Derangement Syndrome, and perhaps you overestimate their professionalism.

David Habakkuk -> Rob , 3 days ago

Rob,

You may very well be right. There may be a large element of 'amateur night out' about this.

But then I come back to the question of who decided that the dossier be published, and who, if anyone, was consulted before the decision was made. For the reasons I gave, I am reasonably confident that those on this side who had been in one way or another complicit in its production and covert dissemination were taken aback by the publication.

It is not clear to me whether anything significant can be inferred from the publicly available evidence about whether those on your side who had been complicit were involved in the decision to publish without taking even elementary precautions, or whether the 'Buzzfeed' people just had a rush of blood to the head.

blue peacock -> David Habakkuk , 3 days ago

David

I suspect the decision to publish the dossier was political. It was required to enable Clapper, Brennan, and others to opine on national media and create further media hysteria prior to the vote as well as to justify the counter-intelligence investigations underway. They were throwing the kitchen sink to sink Trump's electoral chances. I don't think a lot of thought was given about the legal ramifications.

This seems to be a pattern. Leak information. Then use the leaked story to justify actions like apply for a FISA warrant or fan the media flames.

Cynthia Anne , 4 days ago

And now they are turning on one another. Hayden just slammed Clapper for making too much of losing the security clearance the he abuse for political reasons.

Pat Lang Mod -> Cynthia Anne , 4 days ago

Looks like both Clapper and Haydon made the same comment about Brennan. they said "his rhetoric was becoming a problem. Ah, the USAF intel rats are swimming for the shore. Lets see how many others (not all USAF) decide to try to save themselves.

blue peacock -> Pat Lang , 4 days ago

Col. Lang

I find it incredulous that former leaders of the intelligence and law enforcement agencies have gained paid access to powerful media platforms and they have used it to launch vicious attacks on a POTUS.

I find it amazing that McCabe and Peter Strzok are raising hundreds of thousands of dollars on social media platforms.

IMO, everyone on the list that Sarah Sanders noted, should not just lose their clearance but should be testifying to a grand jury.

MP98 -> blue peacock , 3 days ago

Not really incredulous. Just expected behavior from swamp creatures whose self-assumed importance and "rights" (that the rest of us peasants don't have) are coming under threat.

David Habakkuk -> blue peacock , 3 days ago

blue peacock

It seems to me absolutely appalling, and I am also appalled that people on this side appear to have been playing a central role in all this.

One question. It seems to me that if what seems likely to be true does prove true, a range of these people must have committed very serious offences indeed.

However, I am too ignorant to know what precisely those offences might be. If you, or anyone else, had a clear understanding, I would be interested.

English Outsider -> David Habakkuk , 3 days ago

"It seems to me absolutely appalling, and I am also appalled that people on this side appear to have been playing a central role in all this."

That says it all. We got the more discreditable side of the affair outsourced to us. Ugh. Is that all we're fit for now in the UK? White helmets and Khan Sheikhoun and Steele, all the scrubby stuff? Is that what the famous "Special Relationship" now consists of? We get to do the scrubby stuff because it's what we're fit for and we can be relied upon to keep it quiet?

Because at least on the American side there are people concerned about the political/PR involvement of parts of their own Intelligence Community, and seeking to have it looked into. Here - am I right? - it's dead silence.

I've been permitted to say before on SST that I don't think the Americans are going to resolve this affair satisfactorily until more light is cast on the UK side. But I also think that, for our own sakes, we should be looking at what exactly our IC does, and in particular, how much UK political involvement there was in what is now clear was a direct PR attack on an American President.

Pat Lang Mod -> English Outsider , 3 days ago

I strongly suspect that Steele has a future as a novelist.

blue peacock -> David Habakkuk , 3 days ago

David

I'm not a lawyer and have no experience with the federal criminal statutes. Having said that I suspect that the following could be considered crimes:

There may also be certain professional agreements with the government that may have been violated. The only way any of these people will face a grand jury is if Donald Trump chooses to take action. Left to the natural devices of the law enforcement institutions nothing will happen and they will sweep everything under the rug. The intensity of Trump's tweets and the accusations therein are rising. If the GOP retains the House and Jim Jordan becomes speaker, then there may be a possibility that Sessions, Rosenstein and Wray may be fired and another special counsel appointed who will then convene a grand jury.

Considering what has been uncovered by Congressional investigators and the DOJ IG, I am truly surprised that Sessions has resisted the appointment of a special counsel. But of course that could go the way of the Owens inquiry in your country.

[Sep 08, 2018] DNC Hacks Unproven by Gordon M. Hahn

Aug 14, 2018 | gordonhahn.com

Regarding the hacking of Democrats computers, nothing has been proven even on the margins or circumstantially on any of these counts. Moreover, the FBI failed to examine the affected computers, and we now know that FBI deputy head and other FBI top officials were scheming to undermine Trump in support of Hillary Clinton's election and that Clinton's campaign had colluded with the Russians to produce the Steele dossier, for which the FBI also paid for. Moreover still, independent research has demonstrated that the hack is most likely to have occurred from inside DNC headquarters.

Even if Russia did hack the DNC – and I am sure it has at least tried to hack US government computer systems as well – one needs to be beyond naïve to believe that US intelligence has not hacked Russian government computers. Indeed, the NSA has hacked the government computers of such close US allies as Germany and France (www.theguardian.com/world/2014/feb/04/us-nsa-gerhard-schroeder-surveillance and http://www.bbc.com/news/33248484 ). It is clear that much of the material in the recent indictment of 13 Russians was garnered by U.S. intelligence accessing Russian computer systems, perhaps some governmental systems. For example, the indictment references an intercepted email. One can be sure that some of the compromising materials on Russian officials that appear in American and perhaps even Russian media come from NSA hacking. Russian hacking is a drop in the bucket compared with the scale and scope of methods the West has used to target Russia and its allies in the former USSR since the end of the first cold war.

State Hacks Never Happened

All or most of the charges that the Kremlin hacked state voting systems have been retracted. Even if it did, ditto the previous paragraph.

Russia-Trump 'Collusion'

The Russia-Trump collusion charges have fallen flat on their face. The only semi-maningful result of former FBi Director Robert Mueller's 'counter-intelligence investigation' is that a one-time campaign advisor Paul Manafort was indicted for corrupt collusion with Ukraine's corrupt Viktor Yanukovych and his Party of Regions that occurred before Manafort was on Trump's campaign staff. Furthermore, contrary to the Western view, Yanukovych was anything but a 'Putin puppet.' This fact is well-illustrated by then Ukrainian president's willingness to sign the EU Association Agreement in November 2013, a signing which was only aborted by an exorbitant offer by Putin of $15 billion in loans and natural gas price reductions on the background of Ukraine being on the verge of bankruptcy and the EU offering far less.

Russia's Troll Farm – An Inconsequential Spontaneous Experiment

The newest sensation in the 'hunt for Red October' is the Kremlin-tied troll farm. Assuming that Putin's close associate and cook is indeed tied to this small effort, then the US government has finally found an incident of 'Russian interference in the 2016 presidential election' in the United States. Unfortunately, the effort was minimal and nothing to write home about or worth a multi-million government investigation. It is more on the level of a research report farmed out to one of the government-oriented and often-funded DC think tanks with a small $5-10,000 grant attached. Indeed, RFERL already had written about the very same operation as did an Internet news site based, in all places, in 'Putin's Russia.' The 13 indictments were handed down not for the troll activity under an operation called 'Lakhta' – 99 percent of which was merely posting advertisements and comments on the Internet from "around" May 2014 to several months after the US presidential campaign – but for other crimes such as money-laundering. To be sure, the effort to pit American against American by calling opposing radical groups to the same location for potentially explosive counter-demonstrations is nasty stuff. But such cases amounted to less than a handful.

Ultimately, operation Lakhta appears to have been a rather inconsequential experiment, since prior to the US presidential campaign it had focused almost exclusively on trolling Russian politics, expanding to foreign issues like Ukraine and then to the US. The FBI indictment sites the budget of 'Lakhta' was several million dollars per year. Elsewhere the indictment states that by September 2016 'Lakhta' had a monthly budget of $1.3 million ( www.justice.gov/file/1035477/download , pp. 5 and 7). Again, this is a drop in the bucket compared to Western disinformation operations in general and the US political campaign expenditures. This is equivalent to about 10 percent of the cost of congressional campaign, about 1 percent of the the amount Trump and Clinton spent on Internet activity (much of which was similar trolling with ads and comments), and a fraction of a percent of the billions of dollars the two candidates paid on their campaigns. Moreover, this tactical campaign amounts to far less than the routine, much more strategic disinformation communications carried out by the US government and allied media on a continuing basis since the first cold war's end (see, for example, https://gordonhahn.com/2015/09/19/putin-is-crazy-and-sick-the-lows-of-american-rusology/ and https://gordonhahn.com/2015/11/11/the-myth-of-an-imminent-anti-putin-coup-rusological-fail-or-stratcomm/ ).

Opposition-Promotion

In imitation and exacting revenge against past Western support for democratic and other opposition organizations and individuals in Russia and elsewhere under various and sundry democracy-promotion programs and much else, Russia has turned to cooperating with nationalist and populist opposition parties in the West. However, that effort is, again, very limited and gravely overstated by Western pundits and politicians. It amounts almost entirely to an alleged one-time contribution to Marie Le Pen's nationalist-populist National Front party in France. Some in the US are making much noise about a forum of legal European nationalist and populist parties hosted in 2015 in St. Petersburg, Russia (www.kommersant.ru/doc/2683403 and www.interpretermag.com/the-far-right-international-russian-conservative-forum-to-take-place-in-russia/ ). A second conference is scheduled there on 8 April 2018 ( http://realpatriot.ru/en/ ). Presumably, these conferences could be held elsewhere. Is it crucial that they are hosted by Russia? Does it matter where such conferences are held? As a US presidential candidate once said: "Where's the beef?" Does it matter more than US-government RFERL whitewashing jihadi Caucasus terrorists who killed thousands of Russians over some six years or falsifying the reality of the 20 February 2014 Maidan snipers' massacre in Kiev? Does it matter more than the fact that Europeans have produced such parties and why they have produced them? Should Europeans be absolved of their agency, so blame can be redirected onto Russia? Moreover, one researcher has convincingly demonstrated that Russia's cooperation with such parties has more to do with an overlap or "confluence" of interests and ideology between some in Moscow and the Western far-right rather than the former's influence on the latter (www.ponarseurasia.org/memo/russian-and-american-far-right-connections-confluence-not-influence).

Moreover, the radical jihadist organization Hizb ut-Tahrir, regarded by almost all terrorism experts as a precursor and recruitment organization for jihdism and jihadi groups, holds an annual convention and several other events in the United States every year ( https://hizb-america.org/events/ ), with similar operations across the West. Weeks ago one of America's leading conservative political organizations, the Conservative Political Action Committee or CPAC, had Marie Le Pen's daughter Marion Marechal`-Le Pen, the United Kingdom's Independent Party's populist firebrand and former leader Nigel Farage, among other European populists speak at their annual convention.

Russia may move into more threatening territory, if it begins to support rising ethno-national separatism in places in Europe or the West more generally like Catalonia. The foreign ministry of South Ossetiya, the Russian-backed breakaway region of Georgia, opened up a "representative office" in Catalonia in October (www.eng.kavkaz-uzel.eu/articles/41274/). This could be even more dangerous territory for Moscow's 'me-two-ism' to tread on. On the other hand, the West violated its own UN-sponsored resolution on Kosovo committing to Yugoslavia's territorial integrity.

Conclusion

Russia is using the tools of the West, those the latter has deployed against Russia since the collapse of the Berlin wall, the fall of the Soviet Union, and the dawn of the new world order and a 'united Europe from Vancouver to Vladivostok.' The West moved first to back anti-Russian parties in the former USSR and opposition parties in Russia, so Russia has now begun to back anti-American parties and opposition parties in the West. The West first used the Internet against Russia and its allies, and Russia followed suit using it against the West. The West interfered in Russian presidential campaigns and other aspects of Russia's internal political life and that of its allies, and Russia is responding in kind. The West has backed revolutions (a priori facto and ex post facto) and separatism, including jihadism, against Russia and its allies, and Russia began to do the same (minus the support for jihadists) against the West.

~~~~~~~~~~~~~~~~~~~~~~

About the Author – Gordon M. Hahn, Ph.D., Expert Analyst at Corr Analytics, http://www.canalyt.com and a Senior Researcher at the Center for Terrorism and Intelligence Studies (CETIS), Akribis Group, San Jose, California, www.cetisresearch.org .

Dr. Hahn is the author of Ukraine Over the Edge: Russia, the West, and the 'New Cold War (McFarland Publishers, 2017) and three previously and well-received books: Russia's Revolution From Above: Reform, Transition and Revolution in the Fall of the Soviet Communist Regime, 1985-2000 (Transaction Publishers, 2002); Russia's Islamic Threat (Yale University Press, 2007); and The Caucasus Emirate Mujahedin: Global Jihadism in Russia's North Caucasus and Beyond (McFarland Publishers, 2014).He has published numerous think tank reports, academic articles, analyses, and commentaries in both English and Russian language media and has served as a consultant and provided expert testimony to the U.S. government.

Dr. Hahn also has taught at Boston, American, Stanford, San Jose State, and San Francisco State Universities and as a Fulbright Scholar at Saint Petersburg State University, Russia. He has been a senior associate and visiting fellow at the Center for Strategic and International Studies and the Kennan Institute in Washington DC as well as the Hoover Institution at Stanford University.

[Aug 18, 2018] "DNC server hack" was an insider transfer. Insider dead. Dead men tell no tales and so far, neither does Wikileaks

Aug 18, 2018 | www.zerohedge.com

StarGate -> valjoux7750 Fri, 08/17/2018 - 06:41 Permalink

Double pronged exercise: 1) Start war with Russia, steal its oil, break into tiny States to destroy its power; 2) Destroy Trump as enemy of globalist world domination and USA disintegration plan.

MSM propaganda arm to sell (1) and (2).

These retired Intel specialists keep interfering in the game and interjecting inconvenient facts:

DNC server never hacked by Russia or anyone. It was an insider transfer. Insider dead. Dead men tell no tales and so far, neither does Wikileaks.

currency Thu, 08/16/2018 - 22:12 Permalink

VIPS is doing some excellent work and they show what really happened while Rosenstein is out to Lunch, Sessions is deaf dumb and blind - useless - both Sessions and Rosenstein need to go.

Muller does not care and he is not interested in the truth and is ignoring the facts and the corruption in the FBI/DOJ - Muller and his band of Clinton Loyalist are trying to frame Trump.

StarGate -> currency Fri, 08/17/2018 - 06:50 Permalink

Rosenstein and Mueller KNOW the DNC server was not hacked by Russia or by anyone. Insider transfer. So are they working for HilBarry? Or is this a magic act?

What Sessions is doing is unknown. He knows he was set up by Barry sending the Russian ambassador to his office and by (FBI? Spy) Paul Ericsson offering to connect campaign thru him to Russia. He had to recuse or be in the midst of the mess. Does he have a plan? - we don't know.

quasi_verbatim Thu, 08/16/2018 - 22:28 Permalink

It's not Russiagate, it's Americagate and it's your problem, not ours.

The only significant remaining question is whether you fade gracefully from the page of History or whether you take the Samson Option and we all go out flash-bang.

Taras Bulba Thu, 08/16/2018 - 22:28 Permalink

I have a ton of respect for Binney. Regardless as to how fucked up this country is and its govt, there are still people who will step up and try to set the record straight.

Cloud9.5 Thu, 08/16/2018 - 22:30 Permalink

Joseph Goebbels was indeed a genius. Tell a lie long enough and loud enough and it becomes the accepted truth.

TradingTroll -> Cloud9.5 Thu, 08/16/2018 - 22:42 Permalink

Not really true, that statement.

If you put a camera in front of a bunch of randomly selected Americans and ask them to state their name and where they live, before answering if they voted for Trump, you get a lot of No replies.

Now do the same questioning anonymously. The number of Nos drops.

This is the gaping hole in Goebbels argument. Anonymous polls can get closer to the truth. Then the "accepted truth" is challenged, as in 9-11.

Goebbels=too much hubris.

bh2 -> Cloud9.5 Thu, 08/16/2018 - 23:12 Permalink

It was Hitler who endorsed the Big Lie technique. Goebbels was much more subtle.

He would laugh at amateurs whose propaganda is so absurdly vulnerable to conclusive falsification by objective facts.

MrBoompi Thu, 08/16/2018 - 22:34 Permalink

"There has been much amateurish journalism, false reporting, misrepresentation, distortion, misquotation, and omission." In other words, the CIA was behind this.

hooligan2009 Thu, 08/16/2018 - 22:43 Permalink

so... the upshot is that G.2 and DCLeaks fabricated the leak as a hack AND the tools to do this and to fabricate signatures/date stamps etc existed in the CIA (proven here: https://wikileaks.org/ciav7p1/cms/index.html ) and possibly MI6, but not in Russia, or Romania?

the CIA has "stations" all over the world?

looks like a few facebook and twitter posts have resulted in the alphabet soup, deep state, DNC and MSM spending tens of billions of dollars pushing a false agenda against russia AND have caused hundreds of billions of exra dollars on military expenditure and extra security globally.

in which case, they have won by further diverting taxes away from taxpayers and increasing debt where insufficient taxes remain/ed.

bh2 -> hooligan2009 Thu, 08/16/2018 - 23:15 Permalink

Binney has said if the evidence shows the Russians did it, the Russians didn't do it.

This may be a good principle to apply even to things like Facebook ads, etc.

malcolmevans Fri, 08/17/2018 - 01:00 Permalink

The fact that the files were downloaded from the DNC computer, and not hacked from abroad, should be the key to unlocking Clinton conspiracies that would destroy large portions of the Democrat establishment if revealed.

schroedingersrat Fri, 08/17/2018 - 05:01 Permalink

I can achieve up to 1 Gbit/s up & downstream. The average up/downstream is probably quite a bit lower but +50mb/s is probably average. So i lol at the VIPS LOL

JerseyJoe -> schroedingersrat Fri, 08/17/2018 - 06:32 Permalink

Really!?! From what point to what point? Compressed or uncompressed? Fiber or Coax drop?

Laugh all you want - you come off as an idiot because you probably are.

Misean -> schroedingersrat Fri, 08/17/2018 - 15:13 Permalink

Ignorance is bliss. 1 Gb/s = 128MB/s. 50mb/s = 6.25MB/s.

http://www.netmeter.eu

Server:Russia Moscow

Download speed (down)

on 1 thread:0,64 Mbit/s (0,08 MB/s | 640,82 kbit/s)

on more threads:33,84 Mbit/s (4,23 MB/s | 33 838,65 kbit/s)

Upload speed (upload)

on 1 thread:8,47 Mbit/s (1,06 MB/s | 8 467,03 kbit/s)

Sorry dipshit. Just because a connection from your ISP to pr0nHub is fast doesn't make it fast worldwide. 8.47Mb/s = ~1MB/s.

VIPS is very clear they are talking MEGABYTES / s not megaBITS /s. 1BYTE = 8BITS.

Go pull your head out of your ass dumbf*ck

onasip123 Fri, 08/17/2018 - 07:18 Permalink

The Russia-gate narrative pushers aren't interested in the truth.

They're only interested in sowing discord and chaos to distract from crimes of sedition.

East Indian Fri, 08/17/2018 - 18:35 Permalink

The poison of partisan propaganda dumped into American polity to prevent the prosecution of the guilty (for illegally spying on Trump campaign and the assorted crimes associated with it, including the murder of Seth Rich) will continue to foul the atmosphere for decades. The fight is certainly between an unelected octopus that has captured all the three wings of American polity, and a determined if not well armed citizens. The end is not near.

There is a small, nice book by C Northecote Parkinson, "The Law and the Profits". He describes how in 1909 the British empire started a simultaneous course of welfare state and empire building warfare state bureacracy, and how it eventually bankrupted the people by 1945. America started its own version with L B Johnson's Great Society and Vietnam War. Since American economy was much bigger the dichotomous struggle has lasted much longer. But now the time to choose one over another is at hand. Candidate Trump advocated trimming the warfare state more and first. But President Trump is sending mixed signals.

The only saving grace is the self aware American citizenry and its capacity to reform itself.

[Aug 17, 2018] What is definitely conclusive is the Gucci 2 entity forged the inclusion of Russian fingerprints in the leaked version of the documents by pasting it into a Russian language Word template.

Notable quotes:
"... What is definitely conclusive is the Gucci 2 entity forged the inclusion of Russian fingerprints in the leaked version of the documents by pasting it into a Russian language Word template. With 70 years of experience in espionage, there is no way Russian spy agencies are that sloppy and moreover, and if they were it would be absolutely unprecedented. ..."
"... the central conclusion of William Binnery's forensic analysis: that Gucifer 2.0 was a fabrication, and that the DNC emails were downloaded, not hacked by Russia. ..."
"... Were Assange be allowed to testify before the Senate Intelligence Committee later this month, the lid could be blown off the entire sordid operation. ..."
"... From before the CIA's formation the US intelligence activities have been the province of the Republican Party (there are plenty of exceptions, but please follow). Allen Dulles and his ilk were friends with and shared goals with German industrialists long before World War II. These relationships continued through WWII and afterwards. The CIA has functioned as an international coal and iron police, overthrowing governments around the world that have stood in the way of corporate profits. ..."
"... This edition of Covert Action Information Bulletin, in 1990, happened just before a shift in Washington. Almost all of the operations run by our government to destabilize Eastern Europe and the USSR in 1990 were organized by the political right and run by people such as Paul Weyrich. But the nineties showed a rise in Democratic activity in these settings. I would guess that a mental image of this would be our then-First Lady lying about dodging bullets on an airstrip during the destruction of Yugoslavia. It marked the successful CIA takeover of the Democratic Party. ..."
"... The 2016 Russiagate hysteria has been an intelligence operation which has been by all measures successful. I presumed initially that the scam was done to put Hillary into the White House, but now wonder if having Trump as President was part of the long-term strategy. ..."
"... Please note that the DNC backed over fifty new candidates for Congress who have intelligence backgrounds. How do you think they will vote for the coming war resolution against Russia? ..."
"... Not sure about the theory of installing Trump in the WH is part of a long term strategy of the deep state, but the latter seems to be adapting to the disruption quite well. ..."
"... Additional info: Stephen Kinzer's "The Brothers" which documents the Dulles brother's creation of the Cold War mentality and activities. Shouldn't we add Carter and Zbigniew Brzezinski. ..."
"... Citing a book from almost 30 years ago that implicated ONLY the Republicans in the CIAs machinations ignores LBJ and the CIA's involvement in Vietnam and possibly in the JFK assassination. ..."
"... One suspects that the President has revealed far less than he knows, perhaps wary of being accused of "obstruction" by Mueller in concert with the controlled media. He actually requested that William Binney present his analysis to then CIA Director Pompeo, who has since sat on it. ..."
"... But actually, to your point, the reverse is true. If the DNC and Podesta were hacked by Russians, the NSA would have been able to demonstrate that fact through evidentiary proof, a point made repeatedly by Binney. ..."
"... No such proof was or has ever been offered. Instead the main document presented to the American public was the January 6, 2017 "assessment" by analysts hand-picked by John Brennan, who has played a key role in the illegal operation against President Trump. ..."
"... I was struck by one comment particularly, why not ask Assange about the leak. ..."
"... Keeping him incommunicado certainly serves the leaders of the lynch mob and thanks goes to the new Ecuadorian President. He was asked to shut the guy up and he did. ..."
"... Herman, Assange has been asked about the identity of the leaker and replied that he couldn't comment because Wikileaks has a strict policy of maintaining sources' confidentiality. No potential source would ever trust Assange if he violated that policy. Instead, Assange offered a $20,000 reward for information leading to the arrest and conviction of Seth Richards' murderer. So this was his way of answering the question indirectly. ..."
Aug 17, 2018 | consortiumnews.com

Paul N August 14, 2018 at 2:36 pm

I don't believe the Russians did this. I think there are perhaps millions of people in the US capable of carrying out this action and many more with motive. Furthermore, if they did, I am happy that the information was made available so I can't see why I would care.

That said, I am unconvinced by this evidence. I am quite familiar with file systems on different operating systems and I would at least need to know what device we are talking about here. Did it come from Assange? Why doesn't somebody say so? What sort of device is it? The simple fact that it was copied from a computer doesn't prove that the computer was the DNC server. It might have been copied from Putin's iMac. I believe in one reading the writer acknowledged that the dates on the drive could be manipulated and I am certain that this is true. While this may still leave it above the level of evidence that the FBI or "intelligence" agencies have presented (or even claimed to have) it is not conclusive. Reply

GM , August 14, 2018 at 5:10 pm

What is definitely conclusive is the Gucci 2 entity forged the inclusion of Russian fingerprints in the leaked version of the documents by pasting it into a Russian language Word template. With 70 years of experience in espionage, there is no way Russian spy agencies are that sloppy and moreover, and if they were it would be absolutely unprecedented.

Furthermore, I have no reason to disbelieve Craig Murray that the docs were handed to him directly and transferred by him to Wikileaks. Quite the contrary, in fact, since his reputation would undoubtedly be irreconcilably demolished for all time if the Russiagaters ever came up with hard proof to support their conspiracy theory.

GM , August 14, 2018 at 5:12 pm

Please forgive all the typos, posted on my little bitty phone :)

j. D. D. , August 14, 2018 at 2:21 pm

The crucial premise of the ongoing British-instigated coup against President Trump and the chief legal ground for Robert Mueller's operation against the President, is the claim that the Russians hacked the emails of the DNC and, John Podesta, and provided the results to WikiLeaks which published them. The authenticity of such emails showing Hillary Clinton to be a craven puppet of Wall Street who had cheated Bernie Sanders of the nomination were never disputed, by Clinton, or anyone else.

Nor has the central conclusion of William Binnery's forensic analysis: that Gucifer 2.0 was a fabrication, and that the DNC emails were downloaded, not hacked by Russia.

Furthermore, the only people who really know where and by whom the download occurred are Julian Assange, whose life is now in peril, and former British Ambassador Craig Murray.

Were Assange be allowed to testify before the Senate Intelligence Committee later this month, the lid could be blown off the entire sordid operation.

paul g. , August 14, 2018 at 3:03 pm

Craig stated he was merely a go between, who was given the data in the woods by American University by probably another go between. Lots of cut outs here but the data was transferred physically by thumb drive(s).

David G , August 15, 2018 at 8:27 am

"The crucial premise is the claim that the Russians hacked the emails of the DNC and, John Podesta, and provided the results to WikiLeaks which published them."

Don't forget about the Facebook puppy videos. https://consortiumnews.com/2017/10/04/the-mystery-of-the-russia-gate-puppies/

Bob In Portland , August 14, 2018 at 1:25 pm

I would like to call attention to a little slice of history of US the destabilization of Eastern Europe and the USSR that would help to explain what is happening today.

From before the CIA's formation the US intelligence activities have been the province of the Republican Party (there are plenty of exceptions, but please follow). Allen Dulles and his ilk were friends with and shared goals with German industrialists long before World War II. These relationships continued through WWII and afterwards. The CIA has functioned as an international coal and iron police, overthrowing governments around the world that have stood in the way of corporate profits.

Russ Bellant's book, Old Nazis, the New Right, and the Republican Party, points to the political relationship between the Republican Party and fascists around the world. You can read a short article by Bellant here: https://archive.org/details/CovertActionInformationBulletinNo35TheCIAInEasternEurope

This edition of Covert Action Information Bulletin, in 1990, happened just before a shift in Washington. Almost all of the operations run by our government to destabilize Eastern Europe and the USSR in 1990 were organized by the political right and run by people such as Paul Weyrich. But the nineties showed a rise in Democratic activity in these settings. I would guess that a mental image of this would be our then-First Lady lying about dodging bullets on an airstrip during the destruction of Yugoslavia. It marked the successful CIA takeover of the Democratic Party.

The 2016 Russiagate hysteria has been an intelligence operation which has been by all measures successful. I presumed initially that the scam was done to put Hillary into the White House, but now wonder if having Trump as President was part of the long-term strategy.

Please note that the DNC backed over fifty new candidates for Congress who have intelligence backgrounds. How do you think they will vote for the coming war resolution against Russia?

GM , August 14, 2018 at 5:16 pm

Not sure about the theory of installing Trump in the WH is part of a long term strategy of the deep state, but the latter seems to be adapting to the disruption quite well.

Diana Lee , August 14, 2018 at 8:52 pm

Additional info: Stephen Kinzer's "The Brothers" which documents the Dulles brother's creation of the Cold War mentality and activities.
Shouldn't we add Carter and Zbigniew Brzezinski.

michael , August 15, 2018 at 6:33 am

Citing a book from almost 30 years ago that implicated ONLY the Republicans in the CIAs machinations ignores LBJ and the CIA's involvement in Vietnam and possibly in the JFK assassination. Later, Carter was the only Democrat President who may or may not have been heavily involved with the CIA. The Clintons were likely involved with the CIA early on in their Mena, Arkansas drug-smuggling schemes, and the CIA was definitely closely involved in their presidential anti-Slavic foreign policy. The Clintons' neoliberal agenda fit well with the older neocons and consolidated the Duopoly support for the crazed think tank ideas in DC.

jeff montanye , August 17, 2018 at 7:45 am

all perhaps true, but the cia, etc. have terribly neglected their republican base (ftr: registered democrat, sanders and trump voter) and it is baying at their heels, drool swinging from gnashing fangs. that is a political change as profound and radical as anything i observed around the tear gas and batons of the sixties.

Dan Kuhn , August 14, 2018 at 1:19 pm

"They have passed the point of no return; there is no walking it back now. If it fails heads will roll, but most importantly these trusted institutions will have flushed their last vestiges of credibility down the drain. Then what?"

Then nothing. It puts one mind of the comment made by one of the Robber Barons when they were caught with their hands in the cookie jar. His comment " All that was lost was honour" In the present mess even if eventually it all comes to light no one is going to be held answerable. No one is going to jail. Truth does not matter. The propaganda is what matters. if it is proven wrong it is merely swept under the rug. With the short attention spans of Americans it would be forgotten in a New York Minute.

GM , August 14, 2018 at 5:19 pm

Perhaps this explains the need for the likely false flag poison attack in Britain and the fake Douma nerve gas attack. Russiagate hasn't really been panning out so well and too much info has been emerging to challenge the narrative.

David G , August 15, 2018 at 8:29 am

I fully agree.

Peter de Klerk , August 14, 2018 at 1:06 pm

If Russian hacking is a hoax, why has it not been exposed by all the Trump appointed intelligence and FBI heads? Trump's people could shut it down with a public single statement. Y'all are deep into a conspiracy theory that makes no sense.

AnthraxSleuth , August 14, 2018 at 1:27 pm

Pffft!

It was shown to be a hoax by Clinton's own campaign staff in their book released after the election titled "shattered".

"Within 24 hours of her concession speech, [campaign chair John Podesta and manager Robby Mook] assembled her communications team at the Brooklyn headquarters to engineer the case that the election wasn't entirely on the up-and-up. For a couple of hours, with Shake Shack containers littering the room, they went over the script they would pitch to the press and the public. Already, Russian hacking was the centerpiece of the argument."

The plan, according to the book, was to push journalists to cover how "Russian hacking was the major unreported story of the campaign," and it succeeded to a fare-thee-well. After the election, coverage of the Russian "collusion" story was relentless, and it helped pressure investigations and hearings on Capitol Hill and even the naming of a special counsel, which in turn has triggered virtually nonstop coverage.

https://nypost.com/2017/10/26/how-team-hillary-played-the-press-for-fools-on-russia/

Guess the only conspiracy theororist here is you. Goebbels would be so proud. You drank the kool-aid bruh!

Peter de Klerk , August 14, 2018 at 2:19 pm

My comment applies equally well to your response. Why doesn't Nunes, Pompeo, or Coates, etc ever say anything about these theories?

AnthraxSleuth , August 14, 2018 at 4:28 pm

It's no longer a theory when the conspirators confess to it in their own writing. Which I demonstrated to you in the previous post.

Peter de Klerk , August 14, 2018 at 6:18 pm

This very slanted article amplifies a few post-election statements. I'm sure Podesta and Mook wanted to play this up. Some of that was sour grapes but most people are inclined to think it was also true. These guys controlling most media outlets and most of the intelligence community seems absurd to me. But I guess we all believe what we want to believe now.

jdd , August 14, 2018 at 2:30 pm

One suspects that the President has revealed far less than he knows, perhaps wary of being accused of "obstruction" by Mueller in concert with the controlled media. He actually requested that William Binney present his analysis to then CIA Director Pompeo, who has since sat on it.

But actually, to your point, the reverse is true. If the DNC and Podesta were hacked by Russians, the NSA would have been able to demonstrate that fact through evidentiary proof, a point made repeatedly by Binney.

No such proof was or has ever been offered. Instead the main document presented to the American public was the January 6, 2017 "assessment" by analysts hand-picked by John Brennan, who has played a key role in the illegal operation against President Trump.

jeff montanye , August 17, 2018 at 7:54 am

And Donald Trump has more training in show business than most politicians or even internet commenters. I suspect there is a fall premiere of quite an extravaganza leading up to the midterm elections.

Herman , August 14, 2018 at 1:03 pm

Read half the most intelligent commentary and had to quick. I was struck by one comment particularly, why not ask Assange about the leak. Too simple but too much to ask, I guess. Keeping him incommunicado certainly serves the leaders of the lynch mob and thanks goes to the new Ecuadorian President. He was asked to shut the guy up and he did.

Modawg , August 14, 2018 at 3:28 pm

I think he has been asked and has politely refused to reveal. But his innuendo is that it was from inside the US and definitely not the Russkies.

alley cat , August 14, 2018 at 4:44 pm

Herman, Assange has been asked about the identity of the leaker and replied that he couldn't comment because Wikileaks has a strict policy of maintaining sources' confidentiality. No potential source would ever trust Assange if he violated that policy. Instead, Assange offered a $20,000 reward for information leading to the arrest and conviction of Seth Richards' murderer. So this was his way of answering the question indirectly.

A Solomonic solution that is technically not a violation of confidentiality

Andy Wilcoxson , August 14, 2018 at 12:36 pm

Can I play devil's advocate and ask a question. Can we rule out the possibility that a hacker in Russia, China, or wherever had remote control of a computer in the United States that they used to hack the DNC?

49.1 megabytes per second is almost 400 mbps, which is a very fast transfer speed, but there were one gigabit (1000 mbps) connections available in several US markets when these e-mails were stolen. You might not have been able to transfer the files directly from Washington D.C. to Russia at those speeds, but you certainly could have transferred them between computers within the United States at those speeds using gigabit internet connections.

Is there something I'm missing? How does the file transfer speed prove this was a USB download and not a hack when gigabit internet connections existed that could have accommodated those transfer speeds -- maybe not directly to Russia or Europe, but certainly to another US-based computer that foreign hackers may have have remotely controlled.

Desert Dave , August 14, 2018 at 6:09 pm

Actually a byte is 10 bits total because there is overhead (start and stop bits). So 49.1 MBps is about 491 Mbps. The question of whether the DNC server was attached to a network that fast would be easy to answer, if the FBI or anybody else wanted to check.

AnthraxSleuth , August 15, 2018 at 1:11 am

A byte is 8 bits.

[Jul 31, 2018] The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues.

Jul 31, 2018 | turcopolier.typepad.com

mlnw , 13 days ago

The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues. The Guccifer 2.0 metadata was analyzed for its transmission speed, and based on the internet speeds to and from numerous test locations abroad and in the U.S., it was determined to have been impossible for the so-called Guccifer 2.0 to have hacked the DNC computers over the internet. The transmission speed however did correspond to the speed of the transfer to a thumb drive. Additionally, it was found that the data had been manipulated and split into two parts to simulate a July and a September transfer, when in fact the parts merge perfectly as single file, and where, according to Binney, the probability of the split being a coincidence would be 100 to the 50th power.

As for the crude trace fingerprints (e.g. the referencing of Dzerzinsky), one of the Wikileaks data dumps (Vault 7 Marble) during a period when Assange was negotiating with the Administration - there were two at the time (Vault 7 Marble and Vault 7 Grasshopper), the release of which apparently enraged Mike Pompeo- was designed to obfuscate, fabricate and frame countries such as Russia, Iran or North Korea by pretending to be the target country, including in the use of target's alphabet and language.

VIPs has written numerous articles on this in Consortium News. See also the report by Patrick Lawrence Smith in The Nation at: https://www.thenation.com/a... . (It was apparently so hot at the time- and disputed by several other VIPs members- that The Nation sought an independent assessment by third party, though those comments were easily addressed and dismissed in seriatim by Binney in an annex to the article.)

Binney has explained his forensic analysis and conclusions at numerous forums, and in a sit-down with Secretary Pompeo in October, 2017- though Mueller, the FBI, and mainstream and some of the alternative press seem either deaf, dumb and blind to it all, or interested in discrediting the study. The irony is, I'd venture to guess, that Binney, with his 40 years of experience, including as Technical Director and technical guru at the NSA, is, even in retirement, more sophisticated in these matters than any one at the Agency, or the FBI, or CIA, or certainly, the Congressional Intelligence Committees. So, it is astounding that any or all of them could have, but did not, invite him to testify as an expert.

Moreover, the NSA has a record of every transmission, and also would have it on backup files. And, the FBI has been sitting on Seth Rich's computer and his communications with Wikileaks, and presumably has a report that it has not released. And of course, as Trump asked in his press conference, where's the DNC server, any or all of which would put this question to rest.

A recent interview with Binney can be found at:

Play Hide
mlnw -> mlnw , 11 days ago
The last clause of the first paragraph should have said: "according to Binney, the probability of the split being a coincidence would be one over 100 to the 50th power

[Jul 31, 2018] Guccifer 2.0 and GCHQ

Notable quotes:
"... There is a pattern of abuse of formerly well regarded institutions to achieve the propaganda aims of the Deep State establishment. The depths that were plumbed to push the Iraq WMD falsehoods are well known. Yet no one was held to account nor was there any honest accounting of the abuse. There have been pretenses like the Owen inquiry that you note. ..."
"... We see the same situation of sweeping under the rug malfeasance and even outright criminality through obfuscation and obstruction in the case of the meddling in the 2016 election by top officials in intelligence and law enforcement. Clearly less and less people are buying what the Deep State sells despite their overwhelming control of the media channels. ..."
"... What is to be gained by the leadership in Britain in promoting these biological weapons cases since Litvinenko? In the US it is quite apparent that the Deep State have become extremely powerful and the likelihood that Trump recognizes that resistance is futile is very high. Schumer may be proven right that they have six ways from Sunday to make you kowtow to their dictats. ..."
Jul 31, 2018 | turcopolier.typepad.com

If you look at the 'Lawfare' blog, in which a key figure is James Comey's crony Benjamin Wittes, you will find a long piece published last Friday, entitled 'Russia Indictment 2.0: What to Make of Mueller's Hacking Indictment.'

Among the authors, in addition to Wittes himself, is the sometime GCHQ employee Matt Tait. It appears that the former head of that organisation, the Blairite 'trusty' Robert Hannigan, who must know where a good few skeletons are buried, is a figure of some moment in the conspiracy.

(See https://www.lawfareblog.com... .)

It was Matt Tait who, using the 'Twitter' handle @pwnallthethings, identified the name and patronymic of Dzerzhinsky in the 'metadata' of the 'Guccifer 2.0' material on 15 June 2016, the day after Ellen Nakashima first disseminated the BS from 'CrowdStrike' in the 'WP.'

The story was picked up the following day in a report on the 'Ars Technica' site, and Tait's own account appeared on the 'Lawfare' site, to which he has been a regular contributor, on 28 July.

(See https://arstechnica.com/inf... ; https://www.lawfareblog.com... .)

According to the CV provided in conjunction with the new article:

'Matt Tait is a senior cybersecurity fellow at the Robert S. Strauss Center for International Security and Law at the University of Texas at Austin. Previously he was CEO of Capital Alpha Security, a consultancy in the UK, worked at Google Project Zero, was a principal security consultant for iSEC Partners, and NGS Secure, and worked as an information security specialist for GCHQ.'


blue peacock , 13 days ago

How does the objective truth get disclosed in an environment of extreme deceit by so many parties?

How to trust western intelligence when they have such a long and sordid track record of deceit, lies and propaganda? At the same time there is such a long history of Russian and Chinese intelligence and information operations against the west.

Then there is the nexus among the highest levels of US law enforcement and intelligence as well as political elites in both parties and key individuals in the media complex.

We are living in a hall of mirrors and it seems the trend is towards confirmation bias in information consumption.

richardstevenhack , 13 days ago
Excellent post, especially the debunking of the 'Gerasimov doctrine' which I always thought was more hand-waving and Russian mind-reading.

It's important to realize that there are a number of people in the infosec community who have biases against Russia, just as there are in the general population. Then there are more cautious people, who recognize the difficulty in attributing a hack to any specific person absent solid, incontrovertible, non-circumstantial and non-spoofable (and preferably offline) evidence.

Tait doesn't appear to be one of the latter. Thomas Rid would be another. There are others.

Jeffrey Carr is one of the latter, and his familiarity with intelligence matters is clear from his organization of the annual "Suits and Spooks" Conference. I believe he was the first to raise questions about the DNC hack which didn't pass his smell test.

There are also a number of companies in infosec who rely on latching onto a particular strain of hacker, the more publicly exploitable for PR purposes the better, as a means of keeping the company name in front of potential high-profile and highly billable clients. CrowdStrike and its Russia obsession isn't the only one that's been tagged with that propensity.

Mandiant could be referred to as the "Chinese, all the time" company, for example. Richard Bejtlich was at Fireeye and the became Chief Security Officer when they acquired Mandiant. He spent quite a bit of effort on his blog warning about the Chinese military buildup as a huge threat to the US. He's former USAF so perhaps that's not surprising.

Bottom line: Confirmation bias is a real thing.

Barbara Ann , 13 days ago
Glad David's comment has been reproduced as a post in its own right, this is a critically important topic.

IMO Matt Tait plays the role of midwife in this conspiracy. His Twitter thread

View Hide
mlnw , 13 days ago
The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues. The Guccifer 2.0 metadata was analyzed for its transmission speed, and based on the internet speeds to and from numerous test locations abroad and in the U.S., it was determined to have been impossible for the so-called Guccifer 2.0 to have hacked the DNC computers over the internet. The transmission speed however did correspond to the speed of the transfer to a thumb drive. Additionally, it was found that the data had been manipulated and split into two parts to simulate a July and a September transfer, when in fact the parts merge perfectly as single file, and where, according to Binney, the probability of the split being a coincidence would be 100 to the 50th power.

As for the crude trace fingerprints (e.g. the referencing of Dzerzinsky), one of the Wikileaks data dumps (Vault 7 Marble) during a period when Assange was negotiating with the Administration - there were two at the time (Vault 7 Marble and Vault 7 Grasshopper), the release of which apparently enraged Mike Pompeo- was designed to obfuscate, fabricate and frame countries such as Russia, Iran or North Korea by pretending to be the target country, including in the use of target's alphabet and language.

VIPs has written numerous articles on this in Consortium News. See also the report by Patrick Lawrence Smith in The Nation at: https://www.thenation.com/a... . (It was apparently so hot at the time- and disputed by several other VIPs members- that The Nation sought an independent assessment by third party, though those comments were easily addressed and dismissed in seriatim by Binney in an annex to the article.)

Binney has explained his forensic analysis and conclusions at numerous forums, and in a sit-down with Secretary Pompeo in October, 2017- though Mueller, the FBI, and mainstream and some of the alternative press seem either deaf, dumb and blind to it all, or interested in discrediting the study. The irony is, I'd venture to guess, that Binney, with his 40 years of experience, including as Technical Director and technical guru at the NSA, is, even in retirement, more sophisticated in these matters than any one at the Agency, or the FBI, or CIA, or certainly, the Congressional Intelligence Committees. So, it is astounding that any or all of them could have, but did not, invite him to testify as an expert.

Moreover, the NSA has a record of every transmission, and also would have it on backup files. And, the FBI has been sitting on Seth Rich's computer and his communications with Wikileaks, and presumably has a report that it has not released. And of course, as Trump asked in his press conference, where's the DNC server, any or all of which would put this question to rest.

A recent interview with Binney can be found at:

Play Hide
mlnw -> mlnw , 11 days ago
The last clause of the first paragraph should have said:
"according to Binney, the probability of the split being a coincidence would be one over 100 to the 50th power
David Habakkuk , 11 days ago
All,

More evidence for the at least passive complicity of GCHQ – for which Matt Tait used to work, and which Robert Hannigan used to run – in corrupt 'information operations' comes in a report yesterday on CNN.

(See https://edition.cnn.com/201... )

It opens:

'Police have identified two suspects in the poisoning of former Russian double agent Sergei Skripal and his daughter Yulia, a source with knowledge of the investigation told CNN on Thursday.

'The pair left the UK in the wake of the attack on what is believed to have been a commercial flight, the source added.

'Their departure was revealed in a coded Russian message to Moscow sent after the attack, which was intercepted by a British base in Cyprus, the source said. The British government blames the Skripals' poisoning on Russia.'

The base in question is high up in the Troodos mountains, and is formally run by the RAF but actually a key resource for both GCHQ and NSA in monitoring communications over a wide area. According to an internal document from the former organisation, it has 'long been regarded as a 'Jewel in the Crown' by NSA as it offers unique access to the Levant, North Africa, and Turkey'.

(See https://theintercept.com/20... .)

That the quote comes a report in 'The Intercept' in January 2016 revealing that one of the uses of the Troodos facility is to intercept live video feeds from Israeli drones and fighter jets brings out how paradoxical the world is. For it also appears to have emerged as an important resource in 'information operations' in support of 'Borgist' agendas.

The claim about intercepts incriminating the Russians over the Salisbury incident was first made in a piece by Marco Giannangeli in the Daily Express on 9 April, which followed up the claims which Colonel de Bretton-Gordon had been instrumental in disseminating, and was then widely picked up by the MSM.

(See https://www.express.co.uk/n... .)

It was headlined: 'REVEALED: The bombshell Russian message intercepted on DAY of Skripal poisonings,' and opened: 'AN ELECTRONIC message to Moscow sent on the day former Russian spy Sergei Skripal and his daughter Yulia were poisoned with a nerve agent in Salisbury included the phrase "the package has been delivered".'

Supposedly, this 'prompted a young Flight Lieutenant to recall a separate message that had been intercepted and discounted on the previous day.' The messages were 'understood to have formed "just one part" of the intelligence packet which later allowed Prime Minister Theresa May to state it was "highly likely" that Russia was behind the attacks.'

As it happens, the same writer – Marco Giannangeli – had disseminated a parallel piece of palpable fiction on 1 September 2013, in the 'Sunday Express', in relation to the Ghouta 'false flag.'

(See https://www.express.co.uk/n... .)

This one was headlined, even more melodramatically, 'Senior Syrian military chiefs tell captain: fire chemicals or be shot; BRITISH intelligence chiefs have intercepted radio messages in which senior Syrian military chiefs are heard ordering the use of chemical weapons.'

Part of the story of how bogus claims about 'smoking gun' evidence from 'SIGINT' were used to support the attempt to use the Ghouta 'false flag' to inveigle the British and Americans into destroying the Syrian government was told in my SST post on the incident. However, to mix metaphors, I only scratched the surface of a can of worms.

In a report on the 'Daily Caller' site on 29 August 2013, Kenneth Timmerman claimed that the sequence had started with an actual intercept by Unit 8200 – the Israeli equivalent of GCHQ and NSA.

(See http://dailycaller.com/2013... .)

Claiming to base his account on Western intelligence sources, he suggested that:

'According to these officers, who served in top positions in the United States, Britain, France, Israel, and Jordan, a Syrian military communication intercepted by Israel's famed Unit 8200 electronic intelligence outfit has been doctored so that it leads a reader to just the opposite conclusion reached by the original report.'

While I am not in a position to establish whether his claim is or is not accurate, an AP report on the same day quoted 'U.S. intelligence officials' explaining that 'an intercept of Syrian military officials discussing the strike was among low-level staff, with no direct evidence tying the attack back to an Assad insider or even a senior Syrian commander'.

(See https://www.salon.com/2013/... )

Meanwhile, Timmerman's claim that 'The doctored report was picked up on Israel's Channel 2 TV on Aug. 24, then by Focus magazine in Germany, the Times of Israel, and eventually by The Cable in Washington, DC' is supported by links to the relevant stories, which say what he claims they say.

Moreover, it seems clear that the 1 September 2013 report was an attempt to counter a – somewhat devastating – critique made in a 31 August post entitled 'The Troodos Conundrum' by the former British Ambassador Craig Murray, who had been closely involved with the facility during his time at the Foreign Office (and has written invaluable material on the Salisbury incident.)

(See https://www.craigmurray.org... .)

Precisely because of the closeness of the GCHQ/NSA collaboration, Murray brought out, there was indeed a major problem explaining why claims about 'SIGINT' had been central to the case made in the 'Government Assessment' released by the White House on 30 August 2013, but not even mentioned in the Joint Intelligence Community 'Assessment' produced two days before.

The answer, Murray suggested, was that the 'intelligence' came from Mossad, and so would not have been automatically shared with the British. But, given the superior capabilities of Troodos, if Mossad had it, the British should have also. So his claims 'meshed' with those by Timmerman and the AP, and the 'Express' report looks like a lame attempt at a cover-up.

Again however, one finds the world is a paradoxical place. As I noted in my SST post, detailed demolitions of the claims about 'SIGINT' in relation to Ghouta were provided both Seymour Hersh, in the 'Whose sarin?' article, and also on the 'Who Attacked Ghouta?' site masterminded by one 'sasa wawa.'

Later, it became clear that this was likely to be the Israeli technology entrepreneur Saar Wilf, a former employee of Unit 8200. So this may – or may not – be an indication of deep divisions within Israeli intelligence.

Between 18 March and 31 April, a fascinating series of posts on the Salisbury incident appeared on the 'Vineyard of the Saker' blog. The author, who used the name 'sushi', was a self-professed IT professsional, who had however obviously acquired an extensive familiarity with 'chemical forensics' and appeared to have some experience of 'SIGINT.'

(See https://thesaker.is/tag/sushi/ .)

In a 14 April post, 'sushi' produced a dismissal of the claims about 'SIGINT' implicating the Russians over the Salisbury incident quite as contemptuous as that which 'sasa wawa' had produced in relation to the claims about it incriminating the Syrian government over Ghouta. Pointing to the implausibility of the story disseminated by the 'Express', he remarked that:

'It is doubted that any message traffic is processed on Cyprus. It is more likely that the entire take is transmitted back to GCHQ in Cheltenham via a fibre optic link. There exabytes of take are processed, not by a bored flight lieutenant, but by banks of high speed computers.

'Clearly someone in Cheltenham has committed a programming error. Anyone with any knowledge of secret communications knows that the code phrase used to confirm a murder in Salisbury is "small pizza, no anchovies." '

Interestingly, another paper in the 'Express' group made a parallel claim in relation to the Khan Sheikhoun incident to that about the Ghouta incident, but the story was not picked up and may indeed have been suppressed.

On 9 April, the paper published a report headlined 'Brit spies' lead role in Syrian air strikes; RAF BASE IS 'WEAPON.' This claimed that 'within an hour of the airstrike', Troodos had intercepted communications revealing that nerve gas had been used, and had been delivered by jets from the Syrian Arab Air Force's Shayrat Air Base.

(See

View Hide
David Habakkuk , 12 days ago
All,

I was drafting a response to the comment by 'Barbara Ann' – thanks for the link to the recent posts by Adam Carter – before going out. Returning and reading some very interesting comments, I think what I wanted to say has more general relevance.

One reason I am reading so much into 'this Dzerzhinsky thing' is the body of accumulating evidence that people like Tait are part of a system of networks which combine sanctimoniousness, corruption and stupidity in about equal measures. So some more examples may be to the point.

Different cases in which I have taken an interest come together in a post by Tait on the 'Lawfare' site on 13 March, entitled 'U.K. Prime Minister's Speech on the Russian Poisoning of Sergei Skripal: Decoding the Signals.'

(See https://www.lawfareblog.com... .)

In support of the claim that in accusing Russia of a pioneering act of chemical terrorism Theresa May was relying upon accurate analysis from the 'U.K. intelligence community', Tait wrote that:

'May then explained that Skripal was poisoned by a "military-grade nerve agent of a type developed by Russia one of a group of nerve agents known as 'Novichok.'" She is laying out the basic groundwork for the government's attribution to a nation state and, more specifically, Russia. At Porton Down, the U.K. has one of the world's best forensic labs for analyzing chemical, biological and nuclear weapons. With the poisoning of Alexander Litvinenko in 2006, this lab not only established that Polonium-210 was used but also which reactor in Russia it came from.'

In the event, as is by now well know, Boris Johnson's claim that Porton Down scientists had told him that the agent which poisoned the Skripals came from Russia was specifically repudiated by the head of that organisation, Gary Aitkenhead, on 3 April. Our Foreign Secretary told a flagrant lie, and was exposed.

(See https://www.craigmurray.org... .)

As I have shown in previous posts on this site, the 'Inquiry' conducted by Sir Robert Owen into the death of Litvinenko was patently corrupt. Moreover, it seems highly likely that, in fabricating 'evidence' to cover up what actually happened, Christopher Steele was doing a 'dry-run' for the fabrication of material in the dossier published by 'BuzzFeed.'

In fact, however, Owen's report made quite clear that the role of Porton Down was marginal. Furthermore, 'Scientist A1' from the Atomic Weapons Establishment at Aldermaston quite specifically rejected the claim that 'impurity profiling' made it possible to establish that the source of the polonium was the Avangard facility at Sarov, her arguments being accepted by Owen. Either Tait has not bothered to read the report or very much of the coverage, or he is lying.

(For the report, see http://webarchive.nationala... . For some of the mass of evidence which Owen chose to ignore, see my discussions at http://turcopolier.typepad.... ; http://turcopolier.typepad....

What Porton Down did do was to use 'impurity profiling', which can produce 'spectra' identifying even the tiniest traces of substances, to frustrate the attempt to use the 'false flag' attack at Ghouta on 21 August 2013 to inveigle the American and British governments into destroying the Assad 'régime' and handing the country over to jihadists.

It may well be that this display of competence and integrity led to a 'clampdown' at the organisation, which encouraged Boris Johnson to believe he could get away with lying about what its scientists told him.

(See my defence and development of the crucial reporting by Seymour Hersh, at http://turcopolier.typepad.... .)

A general pattern which emerges is that the same small group of 'disinformation peddlers' resurfaces in different contexts – and the pattern whereby 'private security companies' are used to create a spurious impression of independence also recurs.

As I bring out in my piece on Ghouta, two figures who were critical in shaping the 'narrative' acccording to which Syrian government responsibility for the atrocity had been conclusively proved, were Colonel Hamish de Bretton-Gordon, formerly the former commanding officer of the UK Chemical, Biological, Radiological and Nuclear Regiment, and also NATO's Rapid Reaction CBRN Battalion, and Dan Kaszeta.

Immediately after the story of the poisoning of the Skripals on 4 March broke, the same duo reappeared, and have been as critical to shaping the 'narrative' about the later incident as they were to that about the former.

(For the piece by Kaszeta on 'Bellingcat' which introduced the 'Novichok' theme four days later, see https://www.bellingcat.com/... .)

This makes it particular interesting to look at the website of Kaszeta's consultancy, 'Strongpoint Security Limited', in conjunction with the 'Companies House' documentation on the company.

(See http://strongpointsecurity.... ; https://beta.companieshouse... .)

One would have thought from the website that his company was a small, but hardly insignificant, player, in the field of 'physical and operational security.' As it happens, having filed 'Total exemption small company accounts' since its incorporation in May 2011, last December it filed 'Micro company accounts' for the year to 31 May 2017.

With a turnover of £20,000, staff costs of a bit more than half of that, and a profit of £394, we can see that although unlike Matt Tait's, Kaszeta's company did trade, if indeed it was his sole source of income, this pivotal figure in Anglo-American 'disinformation operations' was living on something less than $15,000 a year, at current exchange rates. (Pull the other one, as we say in Britain.)

This is all the more ironic, as the website brings out quite how critical a figure Kaszeta has been in obscuring the truth. From the bio he gives, we learn that having started as a Chemical Officer in the U.S. Army, he worked for 12 years in the White House, dealing with CBRN matters, before moving to Britain in 2008.

Among the articles to which he links on the site, we see his response in 'NOW Lebanon' in December 2013 to Hersh's original 'Whose sarin?' piece on Ghouta, -- in which Kaszeta first introduced the famous 'hexamine hypothesis.'

This – patently preposterous – suggestion that the presence of a single 'impurity' is a 'smoking gun' incriminating the Syrian government has echoed on into the clearly corrupt OPCW documents purporting to demonstrate that it was responsible for the 4 April 2017 Khan Sheikhoun attack.

Of some interest in understanding where Kaszeta he is coming from is what he describes as his 'oldest (and most footnoted on Wikipedia)' piece, which is an article published in 1988 on a site called 'Lituanus', on 'Lithuanian Resistance to Foreign Occupation 1940-52.'

(See http://www.lituanus.org/198... .)

As to Colonel de Bretton-Gordon, it is of interest to look at the attempt to 'finger' the GRU over the Skripal poisoning published under the title 'UK Poisoning Inquiry turns to Russian Agency in Mueller Indictments' in the 'New York Times' last Sunday, and the response by the Russian Embassy in London to a question about it.

(See https://www.nytimes.com/201... ; https://www.rusemb.org.uk/f... .)

The response objects that 'while the British authorities keep concealing all information concerning the investigation into the Salisbury incident, the newspaper has quoted "one former US official familiar with the inquiry".'

It also asserts that that crucial evidence which has not been made available to the Russians – and here, as with Ghouta and Khan Sheikhoun, the results of 'impurity profiling' are critical – appears to have been shared not just with inappropriate Americans, but with all kinds of others.

And indeed, the Embassy is quite right in suggesting that the claim made by the supposed creator of 'Novichok', Vladimir Uglev, to the BBC in April about 'all the spectrum data I was sent recently' has neither been confirmed nor denied. This seems a general pattern – the 'spectra' which may actually be able to provide definitive answers to questions of responsibility are only provided to people who can be relied upon to give the 'right' answers.

The Embassy response also quite fairly refers to a report in the 'Times' also in April, about the 'intelligence' which had been 'used to persuade world leaders that Moscow was behind the poisoning' and that the 'Novichok' had been manufactured at the Shikhany facility at in southwest Russia, which stated that de Bretton-Gordon, 'who had seen the intelligence, called it very compelling.' He has a long history of lying about CW in Syria – so is obviously the right person to lie about them in the UK.

(See https://www.bbc.co.uk/news/... ; https://www.thetimes.co.uk/... .)

It thus becomes interesting to probe into what lies behind the opening of de Bretton-Gordon's entry on the 'Military Speakers' website ('Real Heroes; Real Stories.') According to this, he is 'Chief Operating Office of SecureBio Ltd a commercial company offering CBRN Resilience, consultancy and deployable capabilities.'

(See http://www.militaryspeakers... .)

From 'Companies House', we learn that the liquidation of 'Secure Bio', which started in in June 2015, was concluded in August last year. The really interesting thing about the records, however, is that at the time of the liquidation the company had very large debts, which were written off, of a kind and in a manner which suggested that de Bretton-Gordon's activities may have been largely funded by loans from untraceable sources which were not meant to be repaid.

(See https://beta.companieshouse... – in particular the 'Statement of affairs' dated 30 June 2015.)

Actually, with the 'NYT' report we come full circle. Among those quoted is Mark Galeotti – apparently his admission that he had totally misrepresented the thinking of the Russian General Staff has not him made more cautious about making extravagant claims about its Main Intelligence Directorate (misreported as Main Directorate by the 'NYT.')

Also quoted are two figures who play key roles in Owen's Report – the Soviet era-GRU defector 'Viktor Suvorov' (real name 'Vladimir Rezun') and the former KGB operative Yuri Shvets. Both of these feature prominently in the posts on the Litvinenko affair to which I have linked, and both were key members of the 'information operations' network centred around the late Boris Berezovsky. This now seems to have taken control of American policy, as of British.

The role of 'Suvorov'/Rezun in attempting to defend the interpretations of Stalin's policy put forward by MI6 in the run-up to the Second World War, and those asserted later by General Keitel, and the way he was demolished by the leading American historian of the War in the East, Colonel David Glantz, and the Israeli historian Gabriel Gorodetsky, is too large a subject to go into here.

(For a brief review, see https://networks.h-net.org/... .)

However, it provides further reason to wonder whether the misreadings of Stalin's policy which caused MI6 to give advice to Chamberlain which helped destroy the last chances of preventing the Nazi-Soviet Pact, may still be the 'house view' of that organisation. It was, obviously, the Pact which spelled 'curtains' both for Poland and the Baltics.

Jack -> David Habakkuk , 12 days ago
David

There is a pattern of abuse of formerly well regarded institutions to achieve the propaganda aims of the Deep State establishment. The depths that were plumbed to push the Iraq WMD falsehoods are well known. Yet no one was held to account nor was there any honest accounting of the abuse. There have been pretenses like the Owen inquiry that you note.

We see the same situation of sweeping under the rug malfeasance and even outright criminality through obfuscation and obstruction in the case of the meddling in the 2016 election by top officials in intelligence and law enforcement. Clearly less and less people are buying what the Deep State sells despite their overwhelming control of the media channels.

It seems that we are marching towards a credibility crisis similar to what was experienced in the Soviet Union when no one trusted the contents in Pravda.

What is to be gained by the leadership in Britain in promoting these biological weapons cases since Litvinenko? In the US it is quite apparent that the Deep State have become extremely powerful and the likelihood that Trump recognizes that resistance is futile is very high. Schumer may be proven right that they have six ways from Sunday to make you kowtow to their dictats.

Fred -> Jack , 12 days ago
Jack,

"Yet no one was held to account"

That was one of the changes being hoped for when Obama was first elected. Instead we got little, except for things such as bailed out bankers and the IRS scandal which lasted until the end of his 2nd term. The panic from the left over the 2016 election issues the are still going on is that the expected candidate isn't in office and they are being exposed. Whether they get prosecuted is another story.

http://taxprof.typepad.com/...

[Jul 31, 2018] Matt Tait may play the role of midwife in DNC hack conspiracy.

Notable quotes:
"... the error message in Cyrillic can only be generated via some technical contortions with the explicit intention of doing so. ..."
"... I would challenge anyone reading Adam Carter's work to conclude that the G2 persona is anything other than misdirection specifically designed to point to Russia. The indictment itself has zero new evidence that can be analyzed and I suspect all the GRU detail is aimed at giving it the appearance of authenticity - even when subject to scrutiny by the IC itself. I think John Helmer is closest to the truth when he says: "...it may be a signal that US cyber agents can fabricate Russian tracks to deceive other US cyber agents; Mueller too." ..."
Jul 31, 2018 | turcopolier.typepad.com
Barbara Ann , 13 days ago
Glad David's comment has been reproduced as a post in its own right, this is a critically important topic.

IMO Matt Tait plays the role of midwife in this conspiracy. His Twitter thread

View Hide

Now THIS is a really interesting development in #DncHack:
@Gawker has & is publishing the DNC's Trump oppo research

gawker.com/this-looks-lik...

4:33 PM - Jun 15, 2016

This Looks Like the DNC's Hacked Trump O...
A 200+ page document that appears to be a
Democratic anti-Trump playbook compiled by the
Democratic National Committee has leaked

gawker.com

Q? 398 Q 269 people are talking about this

of June 15th 2016 mentions several "opsec fail"s in respect of 'Russian' metadata which, as you say, were then picked up by Ars Technica & others. So the meme was born. A key claim is that an error message in Cyrillic script appeared because one of the leaked docs was converted to pdf before being sent to Gawker - one of 2 press outlets to get a preview before Guccifer 2.0 published the docs on his blog. Adam Carter (@with_integrity), at http://g-2.space/ citing theforensicator (link below) says this is not true and that the error message in Cyrillic can only be generated via some technical contortions with the explicit intention of doing so.

I would challenge anyone reading Adam Carter's work to conclude that the G2 persona is anything other than misdirection specifically designed to point to Russia. The indictment itself has zero new evidence that can be analyzed and I suspect all the GRU detail is aimed at giving it the appearance of authenticity - even when subject to scrutiny by the IC itself. I think John Helmer is closest to the truth when he says: "...it may be a signal that US cyber agents can fabricate Russian tracks to deceive other US cyber agents; Mueller too."

https://theforensicator.wor...

[Jul 31, 2018] Is not the Awan affair a grave insult to the US "Intelligence Community?

Highly recommended!
Jul 31, 2018 | consortiumnews.com

Nik , July 28, 2018 at 9:22 am

Is not the Awan affair a grave insult to the US "Intelligence Community?" http://turcopolier.typepad.com/sic_semper_tyrannis/2017/07/what-are-the-democrats-hiding-by-publius-tacitus.html

For several years, a family of foreign nationals (and not only Wassermannn-Schultz) has been surfing the congressional computers while having no security clearance.

Then there was a criminal negligence by H. Clinton who made her emails, filled with the highest-level classified information, available to Chinese (not the Russians). http://turcopolier.typepad.com/sic_semper_tyrannis/2018/07/httpstruepunditcomfbi-lisa-page-dimes-out-top-fbi-officials-during-classified-house-testimony-bureau-bos.html

Both Debbie and Hillary should be in federal prison already. Clinton used to be fond of droning Assange for divulging the criminal and illegal activities of the state. What Debbie and Hillary did has been much more dangerous to the US national security.

[Jul 29, 2018] FBI Never Inspected DNC Server - Seriously!

The difference between image and real server is that image is just a little bit more easy to manipulate. In other words it does not necessary truthfully reflect that hard drive information.
There are also subtle things like the ability to restore erased files which can be done only on physical hardware using special equipment. You still can see some erased files on the image if it was done byte wise (using dd) if the space was not reused)
Chain of custody is also important. As the requirement of working is not longer present, files and programs on it can more easily manipulated to prove whatever you need to prove even in such a way that would not work on a real server. If you want to stage false flag operation it is better to pass only images.
In reality neither real server not images proves anything. Both can be "staged" like fake video in poisoning false flag operations. Cyberspace is perfect environment for false flag operations. As soon as FBI was not the first to get to the servers and can be assured that nobody touched the server "in between" (which most easily is achieved by disconnected server from the network and shutting it done even if this wipes out memory on the server, all bets are off
Another relevant question is why Awan case was swiped undr the carpet.
Notable quotes:
"... the DNC servers were never inspected by the FBI and Crowdstrike's involvement is still suspect. ..."
"... Anyone who thinks that CrowdStrike; a group whose majority investor is Google's Eric Schmidt, who also formed "Groundwork," which was the tech group for the Clinton campaign; & whose co-founder (CrowdStrike) is a senior fellow of the openly anti-Russian Atlantic Council who is funded by Ukrainian billionaire who "donated" millions to the Clinton Foundation & even gave Hillary a frickin' award in 2013.....if you think that that group; who produced a report in exchange for money from the DNC at a time when we now know Clinton had control of DNC finances.....if you think that this report which aaaallllll this is based on would hold up in court.......you're out of your goddamn mind. ..."
"... Doing forensics on a physical machine is rarely encouraged because data can be corrupted, accidentally erased, etc, and that data is lost forever. An image can be copied and stored securely in case a forensics analysts makes a mistake, they can just restore the image and start again. Sorry Jimmy, I know you hate Russia-gate but this specific case is not a strong argument against it. ..."
Jul 20, 2018 | www.youtube.com

Despite recent claims by the media, and despite the fact Trump is parroting the same claims, the DNC servers were never inspected by the FBI and Crowdstrike's involvement is still suspect.


Brad Bloom , 4 hours ago

Anyone who thinks that CrowdStrike; a group whose majority investor is Google's Eric Schmidt, who also formed "Groundwork," which was the tech group for the Clinton campaign; & whose co-founder (CrowdStrike) is a senior fellow of the openly anti-Russian Atlantic Council who is funded by Ukrainian billionaire who "donated" millions to the Clinton Foundation & even gave Hillary a frickin' award in 2013.....if you think that that group; who produced a report in exchange for money from the DNC at a time when we now know Clinton had control of DNC finances.....if you think that this report which aaaallllll this is based on would hold up in court.......you're out of your goddamn mind. Keep up the good work Jim. #rEVOLution #NotMeUs #NinaBernie2020

Luke Moloney , 4 hours ago

The irony that the same people in the media crying 'Russian collusion' in regards to Trump do not have the integrity ( or are not allowed) to cry over Clinton/DNC collusion to railroad Bernie Sanders out of the Democratic Primary. George Orwell looks smarter everyday.

Mark LaDoux , 4 hours ago

As someone who works in IT, an image in this context is not a picture like you would take with your phone, but rather a perfect copy of the system state, which you could deal with forensically, or load up in a virtual machine. With that, there's no need to have the servers. You have a clone of the servers along with all their data and their memory state at the time the snapshot was taken. What that article says actually makes perfect sense to me, because by powering down machine, you destroy whatever exists only in RAM.

Patrick T , 4 hours ago

Jimmy, I have much love for your show and no love for the DNC, but you got this one wrong. An 'Image' in this context does not mean picture, it is a copy of the file system(s) on the machine (server in this case). Having done some digital forensics, this is the norm. Doing forensics on a physical machine is rarely encouraged because data can be corrupted, accidentally erased, etc, and that data is lost forever. An image can be copied and stored securely in case a forensics analysts makes a mistake, they can just restore the image and start again. Sorry Jimmy, I know you hate Russia-gate but this specific case is not a strong argument against it.

Erik Itter , 4 hours ago

Good example of people talking about things they have no idea what they are talking about... Most likely the "servers" where virtual servers meaning images are the closest thing to what you guys believe to be physical. Of course you could ask the provider to hand over the hosts. They would have to decide if flipping a bird or laughing out loud is more appropriate.

If you have no idea how applied computer science works today do not assume your intuition to be more appropriate than expert statements without asking another expert about it...

But doing nothing of that kind keeps the grounds for conspiracy theories intact, so just go on while I load another image in one of the by now several commonly used virtualization solutions (uuups, a "server" appears out of thin air... And if I click 140 times 140 "servers" will appear [and the swaping would kill this computer in no time...]).

[Jul 20, 2018] The Day That Guccifer 2.0 Quit Hacking The DNC

So the DNC announced Russia hacked them, and "proved" it with a file they say was stolen. But that file was not the DNC's. So the "proof" of Russia hacking the DNC is nonexistent.
Notable quotes:
"... they cite an anonymous former DNC official who asserts that Guccifer 2.0's first document (the Trump opposition report) did not originate in the DNC as initially reported. ..."
"... The importance of this contradiction, combined with earlier allegations of hacking the DNC made by Guccifer 2.0, cannot be overstated. ..."
"... " There were signs of dishonesty from the start. The first document Guccifer 2.0 published on June 15 came not from the DNC as advertised but from Podesta's inbox, according to a former DNC official who spoke on condition of anonymity because he was not authorized to speak to the press." ..."
"... By classifying Guccifer 2.0's claim to have obtained the Trump Opposition Report through a breach of the DNC as a sign of dishonesty, the Associated Press uses the Guccifer 2.0 persona's widely held claim as an example of contradiction with their new version of the 'official' Russian hacking narrative. In so doing, the AP makes the hacking allegations entirely nebulous: a fantasy narrative that can be neither proven nor disproven but easily edited and rearranged when convenient. Incredibly, the AP's article also contradicts the claims made by the DNC themselves, and so-called papers of record, including the Washington Post. ..."
"... [Fancy Bear] broke into the network in late April and targeted the opposition research files. It was this breach that set off the alarm. The hackers stole two files,[Shawn] Henry said." ..."
"... "Investigators would have been able to rapidly determine if there were textual differences between Guccifer 2.0's document and the DNC's. If there were no textual differences, an initial determination might have been difficult, because Guccifer 2.0 went to some trouble to obscure internal metadata, known as Revision Save ID's (RSID's), which can be used to uniquely identify sections of text that have been changed and added into a Word document. However, when the Podesta emails were published in October 2016, investigators should have been able to source Guccifer 2.0's document to the Podesta emails quickly. They would have been able to do this before the 2016 election, a full year ahead of the AP report." [Emphasis Added] ..."
"... Ultimately, it is the DNC's claim that they were breached by Russian hackers, who stole the Trump opposition report, which directly belies their allegation - because the document did not come from the DNC, but from John Podesta's emails. ..."
"... What is interesting here is that the AP admits that such elements of the document's publication had been fabricated, but did not then follow that realization by questioning other possibly fabricated elements of the documents, such as the Russian-language error messages. The AP certainly did not concern themselves with why a Russian state-sponsored hacker would benefit from airbrushing "confidential" onto such a report. Their claim that it was to attract media attention seems quite weak. ..."
"... AP surmised that Guccifer 2.0 "air-brush[ed]" the word "confidential" into the document to "catch the reporter's attention." Both Carter and the Forensicator have explained that Guccifer 2.0 used a complex process, involving an intermediate template document, to inject this "alluring" fake. The Forensicator told this author that they take the position that this intermediate template file (ostensibly needed to add "CONFIDENTIAL" to the document) had an additional purpose. ..."
"... The Forensicator explained that, for some readers and researchers, the copy/paste of an intermediate (RTF) copy of the Trump opposition report into a template document might be interpreted simply as an unconventional method for injecting "confidential" into 1.doc. However, the Forensicator added, it can also be interpreted as a "cover" for the final copy/paste operation which was a necessary step in the evolution of Guccifer 2.0's first document. It was needed to embed the Russian error messages into the final document (1.doc). ..."
"... In their full analysis, the Forensicator wrote that it was surprising that neither outlet reported on the easily viewed "Last Saved By" property, which listed "Феликс Эдмундович" (aka "Iron Felix") as the user who last saved the document. This unique name was noticed by various social media observers that same day and by Ars Technica the following day. How did the journalists miss this, and why? ..."
"... Both Gawker and The Smoking Gun published Guccifer 2.0's Trump opposition report in full as a PDF file. Their PDF files have the now infamous Cyrillic error messages in them; they appear in the last few pages of their PDF files. Ars Technica dubbed these error messages, "Russian fingerprints." ..."
"... Ars Technica reported on Guccifer 2.0's publication of the Trump Opposition Report the day after Guccifer 2.0 arrived on the scene. They quickly noted that there were Russian language error messages in the PDF file posted by Gawker. They also noticed that when they viewed 1.doc themselves, they didn't see the Russian error messages. The Forensicator told Disobedient Media that this was because Ars Technica used Word for Windows, which displayed the error messages in English. ..."
"... So the DNC announced Russia hacked them, and "proved" it with a file they say was stolen.But that file was not the DNC's. So the "proof" of Russia hacking the DNC is nonexistent. ..."
May 23, 2018 | www.zerohedge.com

Disobedient Media recently reported on discoveries made by the Forensicator in their report, Media Mishaps: Early Guccifer 2 Coverage . In our previous coverage of the Forensicator's work, we discussed the essential role played by the media in ensuring that the Guccifer 2.0 persona received wide recognition by successfully linking Guccifer 2.0's documents with the DNC's claims that Russian state-sponsored hackers had breached their servers.

This report will focus on an unreported story: After the fact, the DNC quietly changed an important theme in their Russian hacking narrative. Initially, the DNC passively supported the notion that Guccifer 2.0 stole a copy of a Trump opposition report by penetrating the DNC at the behest of the Russian state. Then over a year later, an un-named ex-DNC official tells us that this document in fact came from Podesta's emails, not the DNC. This single statement by a DNC official invalidated the circumstantial evidence that had been used to support the DNC's Russian hacking claims, and represents a groundbreaking contradiction that has gone unobserved by establishment press outlets.

This report will also discuss numerous mistakes made by various legacy press outlets in their obsessive focus on the Russian hacking narrative and their rush to judgment in the matter.

A Late (and Quiet) Change in the DNC Russian Hacking Narrative

In November 2017, the DNC changed their Russian hacking narrative via their proxies in the legacy media. The Associated Press published, Inside story: How Russians hacked the Democrats' emails ; they cite an anonymous former DNC official who asserts that Guccifer 2.0's first document (the Trump opposition report) did not originate in the DNC as initially reported.

The importance of this contradiction, combined with earlier allegations of hacking the DNC made by Guccifer 2.0, cannot be overstated.

The Associated Press wrote in November 2017:

" There were signs of dishonesty from the start. The first document Guccifer 2.0 published on June 15 came not from the DNC as advertised but from Podesta's inbox, according to a former DNC official who spoke on condition of anonymity because he was not authorized to speak to the press."

By classifying Guccifer 2.0's claim to have obtained the Trump Opposition Report through a breach of the DNC as a sign of dishonesty, the Associated Press uses the Guccifer 2.0 persona's widely held claim as an example of contradiction with their new version of the 'official' Russian hacking narrative. In so doing, the AP makes the hacking allegations entirely nebulous: a fantasy narrative that can be neither proven nor disproven but easily edited and rearranged when convenient. Incredibly, the AP's article also contradicts the claims made by the DNC themselves, and so-called papers of record, including the Washington Post.

By returning to the genesis of the Russian hacking narrative, we find that the AP's November report runs contrary to the DNC's initial claims, as reported by The Washington Post , in an article titled, Russian Government Hackers Penetrated DNC, Stole Opposition Research On Trump . When reviewing this early history of the matter, it becomes clear that it is logically impossible to separate the Guccifer 2.0 persona from the allegations of a Kremlin-backed hack of the DNC. Critical statements in that initial report by the Washington Post are highlighted below for emphasis:

"Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to the entire database of opposition research on GOP Presidential candidate Donald Trump, according to committee officials and security experts who responded to the breach

[Fancy Bear] broke into the network in late April and targeted the opposition research files. It was this breach that set off the alarm. The hackers stole two files,[Shawn] Henry said."

By taking this later (2017) stance, the Associated Press contradicts the "official" Russian hacking narrative involving Guccifer 2.0 (as implied by the DNC's own security firm) and which had, until that point, been characterized by the corporate press as Russian-hacking-gospel-truth. By seamlessly excising Guccifer 2.0 from culpability within a new timeline of events, the Associated Press makes the entire hacking story a fantasy narrative that can be neither proven nor disproven but must not be questioned.

The Forensicator explained to Disobedient Media:

"Investigators would have been able to rapidly determine if there were textual differences between Guccifer 2.0's document and the DNC's. If there were no textual differences, an initial determination might have been difficult, because Guccifer 2.0 went to some trouble to obscure internal metadata, known as Revision Save ID's (RSID's), which can be used to uniquely identify sections of text that have been changed and added into a Word document. However, when the Podesta emails were published in October 2016, investigators should have been able to source Guccifer 2.0's document to the Podesta emails quickly. They would have been able to do this before the 2016 election, a full year ahead of the AP report." [Emphasis Added]

The Forensicator then referred this author to a table in his report, depicting the metadata for Podesta's version of the Trump opposition report:

As we can see, the document was saved by Tony Carrk, who worked as Research Director for Hillary for America at the time. This document was attached to this Podesta email .

The Forensicator continued, saying: "We can see that Mr. Carrk made some change that took less than one minute to complete. If investigators compared Carrk's version of the document to the original DNC document, they should have been able to quickly determine that Guccifer 2's document is sourced from Podesta's emails and not directly from the DNC. For this, an RSID correlation would have probably been telling."

Why did the DNC, their security consultant firm Crowdstrike, and government investigators wait so long to tell us that Guccifer 2.0 did not obtain their copy of the Trump opposition report directly from the DNC? Why did Crowdstrike tell the Washington Post that the opposition report files had been stolen specifically from the DNC network if that were not the case?

The legacy press chorus had initially linked Guccifer 2.0's first document, and the "Russian fingerprints" therein to the Trump opposition report that the DNC claimed to have been stolen by Russian state-sponsored hackers. What prompted them to change their story, contradicting not only Guccifer 2.0 but the DNC themselves? Should we now assess the DNC's claim that the document had been taken by Russian hackers to be untrue?

Ultimately, it is the DNC's claim that they were breached by Russian hackers, who stole the Trump opposition report, which directly belies their allegation - because the document did not come from the DNC, but from John Podesta's emails.

Is it possible that Mueller's investigation may have taken a closer look into the origin of Guccifer 2.0's initial document, realizing that it was sourced from Podesta's email? The DNC and government investigators may have then decided that the best way to obscure the resulting contradictory evidence was by letting it quietly leak via a "former DNC official who spoke on the condition of anonymity," in the November 2017 article published by the Associated Press.

Given the repeated contradictions from the DNC and corporate media in their description of Russian interference in the 2016 US Presidential race, how can the public be expected to believe that their other claims have any legitimacy whatsoever?

The AP's November 2017 article also noticed that Guccifer 2.0's first published document contained the word CONFIDENTIAL, while the original document did not. This was old news to anyone who had been paying attention; Adam Carter analyzed this artifact nine months earlier:

What is interesting here is that the AP admits that such elements of the document's publication had been fabricated, but did not then follow that realization by questioning other possibly fabricated elements of the documents, such as the Russian-language error messages. The AP certainly did not concern themselves with why a Russian state-sponsored hacker would benefit from airbrushing "confidential" onto such a report. Their claim that it was to attract media attention seems quite weak.

AP surmised that Guccifer 2.0 "air-brush[ed]" the word "confidential" into the document to "catch the reporter's attention." Both Carter and the Forensicator have explained that Guccifer 2.0 used a complex process, involving an intermediate template document, to inject this "alluring" fake. The Forensicator told this author that they take the position that this intermediate template file (ostensibly needed to add "CONFIDENTIAL" to the document) had an additional purpose.

The Forensicator explained that, for some readers and researchers, the copy/paste of an intermediate (RTF) copy of the Trump opposition report into a template document might be interpreted simply as an unconventional method for injecting "confidential" into 1.doc. However, the Forensicator added, it can also be interpreted as a "cover" for the final copy/paste operation which was a necessary step in the evolution of Guccifer 2.0's first document. It was needed to embed the Russian error messages into the final document (1.doc).

Once again, establishment media failed to pursue their cited evidence with due diligence. This is a grave mistake, especially given the way in which Guccifer 2.0's alleged 'hacking' has been used as a major bolstering point for increased tensions between the United States and Russia.

Initially, Gawker and The Smoking Gun Didn't Notice Iron Felix

Guccifer 2.0 made his noisy debut on June 15, 2016 (the day after the DNC publicly claimed it had been breached by Russian state-sponsored hackers). It also appears that Guccifer 2.0 gave advanced copies of their doctored version of the Trump opposition report to two media outlets, The Smoking Gun and Gawker.

In their full analysis, the Forensicator wrote that it was surprising that neither outlet reported on the easily viewed "Last Saved By" property, which listed "Феликс Эдмундович" (aka "Iron Felix") as the user who last saved the document. This unique name was noticed by various social media observers that same day and by Ars Technica the following day. How did the journalists miss this, and why?

Initially, Gawker and The Smoking Gun Didn't Notice the Russian Error Messages

Both Gawker and The Smoking Gun published Guccifer 2.0's Trump opposition report in full as a PDF file. Their PDF files have the now infamous Cyrillic error messages in them; they appear in the last few pages of their PDF files. Ars Technica dubbed these error messages, "Russian fingerprints."

Although both outlets reviewed this document in some detail, neither outlet noticed the Russian error messages in their first reports. The Forensicator suggests that, given their choice of word processing applications, they would have seen the Russian error messages, if only they had viewed the last few pages of each file. That is, unless (perhaps) they received their PDF's directly from Guccifer 2.0 or another third party and they just passed them along.

Ars Technica was Confused When They Didn't See the Russian Error Messages in Guccifer 2.0's Word Document

Ars Technica reported on Guccifer 2.0's publication of the Trump Opposition Report the day after Guccifer 2.0 arrived on the scene. They quickly noted that there were Russian language error messages in the PDF file posted by Gawker. They also noticed that when they viewed 1.doc themselves, they didn't see the Russian error messages. The Forensicator told Disobedient Media that this was because Ars Technica used Word for Windows, which displayed the error messages in English.

Ars Technica suggested that The Smoking Gun's PDF may have been generated by Guccifer 2.0 on a system that had Russian language settings enabled.

While this explanation appears reasonable, it is surprising (if that was the case) that Gawker didn't tell us that their PDF came directly from Guccifer 2.0 . The Smoking Gun also published a PDF with Russian error messages in it. Are we to believe that The Smoking Gun also received their PDF from Guccifer 2.0 or a third party, and failed to report on this fact?

IVN: Did Gawker Outsource Their Analysis to Russia?

An obscure media outlet, Independent Voter Network , raised various theories on the initial reporting done by The Smoking Gun and Gawker. One of their wilder theories suggested that Gawker had outsourced their analysis to a Russian sub-contractor. The Forensicator evaluated that claim, ultimately concluding that Independent Voter Network had gone on a wild goose chase because the "clue" they followed pointed to Gawker's document management service known as "DocumentCloud." DocumentCloud uses a technology that they call "CloudCrowd," which is what IVN saw in the PDF that Gawker uploaded. The Forensicator referred to a DocumentCloud job advertisement for confirmation of his conclusion.

The Forensicator told Disobedient Media: "We found CloudCrowd; it is not an outsourcing company. Probably not Russian, either."

Business Insider: Did Guccifer 2.0 Photoshop "Confidential" Into his Document Screenshots?

When Business Insider noted the presence of "CONFIDENTIAL" in Guccifer 2.0's document, they claimed that Guccifer 2.0 might have "photoshopped" his screenshots (placed on his blog site) to create the watermark and page footer with "confidential" in them.

The Forensicator countered that claim by pointing out that the Business Insider journalist likely viewed the document with "Full-Screen Reading" selected.

This mode will disable the display of the watermark and page headers and footers when viewed by the journalist, but they will be displayed when printed to PDF. No Photoshop required.

Conclusion

The close timing of the DNC announcement and Guccifer 2.0's publication of the Trump report, as well as reports of "Russian fingerprints" in those documents, created a strong link between Guccifer 2.0 and the Russian hackers who allegedly stole DNC files. Over a year later, the Associated Press tells us that this first narrative was wrong, contradicting the DNC's claims as well as much of the early legacy press reports on the issue. Must we concurrently accept the narrative that Russians hacked the DNC if claims that they had done so were not only based on flimsy evidence but have now been contradicted completely?

As far as documented evidence of election interference goes, one does not have to stray far from the actors in the Russian hacking saga to discover that the DNC and establishment Democrats were, instead of victims of meddling, the perpetrators of such abuse of the American Democratic process. In 2017 the NYC Board of Elections admitted that it had illegally purged hundreds of thousands of Democratic voters from the election roles, preventing them from voting in the 2016 Democratic primaries. This abuse of power represents just one in a constellation of legitimate examples of abuse that took place at the hands of corporatized Democrats in order to unfairly and illegally ensure a Clinton nomination.


GunnyG Wed, 05/23/2018 - 18:28 Permalink

Podesta the Molesta gets the Vince Foster invitation to jog at Fort Marcy Park very soon.

honest injun Wed, 05/23/2018 - 18:57 Permalink

This is too complicated for the average demon rat nitwit to follow. They don't want to know this so showing them facts has to be dumbed down. Otherwise, all new revelations will be ignored.

DrLucindaX Wed, 05/23/2018 - 19:10 Permalink

Really good work and reporting here that will never be understood by the masses. Everything that's going on is far too complex, too many moving parts, too much compartmentalization. Trump is doing a good job dumbing it down.

Justapleb Wed, 05/23/2018 - 19:54 Permalink

So the DNC announced Russia hacked them, and "proved" it with a file they say was stolen.But that file was not the DNC's. So the "proof" of Russia hacking the DNC is nonexistent.

Gotta dumb it down.

[Jul 20, 2018] A comment from Spooks Spooking Themselves

Notable quotes:
"... Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA: https://disobedientmedia.com/2018/05/guccifer-2-0s-american-fingerprints-reveal-an-operation-made-in-the-usa/ ..."
"... Sez who, ask I? Sez the trustworthy American media that would never lie to the public, sez they. You know, professional paragons of virtue like Rachel Maddow and her merry band. ..."
"... These old pols recognise a good demonizing when they see it, especially when directed at them. ..."
"... our democracy WAS hijacked, but it was NOT by the Russians. ..."
Jun 09, 2018 | consortiumnews.com

Paul E. Merrell, J.D. , May 31, 2018 at 4:53 am

Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA: https://disobedientmedia.com/2018/05/guccifer-2-0s-american-fingerprints-reveal-an-operation-made-in-the-usa/

Realist , May 31, 2018 at 9:21 am

Unfortunately, what this guy says is what most Americans still seem to believe. When I ask people what is the actual hard evidence for "Russiagate" (because I don't know of any that has been corroborated), I get a response that there have been massive examples of Russian hacks, Russian posts, tweets and internet adverts–all meant to sabotage Hillary's candidacy, and very effective, mind you. Putin has been an evil genius worthy of a comic book villain (to date myself, a regular Lex Luthor). Sez who, ask I? Sez the trustworthy American media that would never lie to the public, sez they. You know, professional paragons of virtue like Rachel Maddow and her merry band.

Nobody seems aware of the recent findings about Halpern, none seem to have a realistic handle on the miniscule scope of the Russian "offenses" against American democracy. Rachel, the NY Times and WaPo have seen to that with their sins of both commission and omission. Even the Republican party is doing a half-hearted job of defending its own power base with rigorous and openly disseminated fact checking. It's like even many of the committee chairs with long seniority are reluctant to buck the conventional narrative peddled by the media. Many have chosen to retire rather than fight the media and the Deep State. What's a better interpretation of events? Or is one to believe that the silent voices, curious retirements and political heat generated by the Dems, the prosecutors and the media are all independent variables with no connections? These old pols recognise a good demonizing when they see it, especially when directed at them.

Personally, I think that not only the GOPers should be fighting like the devil to expose the truth (which should benefit them in this circumstance) but so should the media and all the watchdog agencies (ngo's) out there because our democracy WAS hijacked, but it was NOT by the Russians.

Worse than that, it was done by internal domestic enemies of the people who must be outed and punished to save the constitution and the republic, if it is not too late. All the misinformation by influential insiders and the purported purveyors of truth accompanied by the deliberate silence by those who should be chirping like birds suggests it may well be far too late.

[Jul 20, 2018] So many (ex-) MI6 operators (Steele, Tait, etc) involved in the story. It is interesting that the media don t question the intense involvement of the British in all this. And of course, the British haven t been laggards in adding fuel to the fire by the whole novichok hoax

Highly recommended!
So British were involved in fabricating of 'Guccifer 2.0' persona. Nice...
Notable quotes:
"... It was Matt Tait who, using the 'Twitter' handle @pwnallthethings, identified the name and patronymic of Dzerzhinsky in the 'metadata' of the 'Guccifer 2.0' material on 15 June 2016, the day after Ellen Nakashima first disseminated the BS from 'CrowdStrike' in the 'WP.' ..."
"... 'Matt Tait is a senior cybersecurity fellow at the Robert S. Strauss Center for International Security and Law at the University of Texas at Austin. Previously he was CEO of Capital Alpha Security, a consultancy in the UK, worked at Google Project Zero, was a principal security consultant for iSEC Partners, and NGS Secure, and worked as an information security specialist for GCHQ.' ..."
"... As I have noted before on SST, a cursory examination of records at 'Companies House' establishes that 'Capital Alpha Security', which was supposed to have provided Tait with an – independent – source of income at the time he unearthed this 'smoking gun' incriminating the GRU, never did any business at all. So, a question arises: how was Tait making ends meet at that time: busking on the London underground, perhaps? ..."
"... The document, when available, may clarify a few loose ends, but the general picture seems clear. Last November, Tait filed 'dormant company accounts' for the company's first year in existence, up until February 2017. One can only do this if one has absolutely no revenue, and absolutely no expenditure. Not even the smallest contract to sort out malware on someone's computer, or to buy equipment for the office. ..."
"... He then failed to file the 'Confirmation statement', which every company must is legally obliged to produce annually, if it is not to be struck off. This failure led to a 'First Gazette notice for compulsory strike-off' in May. ..."
"... However, Tait may well anticipate that there is there will never be any call for him to go back into the big wide world, as the large organisation in which he has now found employment is part of a 'Borgist' network. So much is evident from another entry on the 'Lawfare' site: ..."
"... Also relevant here is the fact that, rather transparently, this placing of the GRU centre stage is bound up with the attempt to suggest that there is some kind of 'Gerasimov doctrine', designed to undermine the West by 'hybrid warfare.' Unfortunately, the original author of this claptrap, Mark Galeotti, who, I regret to say, is, like Tait, British, has now recanted and confessed. In March, he published a piece on the 'Foreign Policy' site, under the title: 'I'm Sorry for Creating the 'Gerasimov Doctrine'; I was the first to write about Russia's infamous high-tech military strategy. One small problem: it doesn't exist.' ..."
"... Quite clearly, the 'Guccifer 2.0' persona is a crude fabrication by someone who has absolutely no understanding of, or indeed interest in, the bitter complexities of both of the history of Russia and of the 'borderlands', not only in the Soviet period but before and after. ..."
"... Jeffrey Carr is one of the latter, and his familiarity with intelligence matters is clear from his organization of the annual "Suits and Spooks" Conference. I believe he was the first to raise questions about the DNC hack which didn't pass his smell test. ..."
"... One quick way to know their bias is the AC test. Google their name plus "Atlantic Council". Ridd fails badly. ..."
"... The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues. The Guccifer 2.0 metadata was analyzed for its transmission speed, and based on the internet speeds to and from numerous test locations abroad and in the U.S., it was determined to have been impossible for the so-called Guccifer 2.0 to have hacked the DNC computers over the internet. The transmission speed however did correspond to the speed of the transfer to a thumb drive. Additionally, it was found that the data had been manipulated and split into two parts to simulate a July and a September transfer, when in fact the parts merge perfectly as single file, and where, according to Binney, the probability of the split being a coincidence would be 100 to the 50th power. ..."
"... There is a pattern of abuse of formerly well regarded institutions to achieve the propaganda aims of the Deep State establishment. The depths that were plumbed to push the Iraq WMD falsehoods are well known. Yet no one was held to account nor was there any honest accounting of the abuse. There have been pretenses like the Owen inquiry that you note. ..."
"... It seems that we are marching towards a credibility crisis similar to what was experienced in the Soviet Union when no one trusted the contents in Pravda. ..."
"... What is to be gained by the leadership in Britain in promoting these biological weapons cases since Litvinenko? In the US it is quite apparent that the Deep State have become extremely powerful and the likelihood that Trump recognizes that resistance is futile is very high. Schumer may be proven right that they have six ways from Sunday to make you kowtow to their dictats. ..."
"... I agree that taken by itself, the Dzerzinsky thing would be an anomaly only and could be dismissed as "black humor" of a kind often found in hackers. However, taken with all the other evidence produced by Adam Carter, it becomes much more obviously an attempt to support a false flag "Russian hacker" narrative that otherwise is porous. ..."
"... You want us to believe that the GRU are so sloppy and so inexperienced that they would launch a hack on the DNC and not take every measure to ensure there was no link whatsoever to anything Russian? Any former intel officer worth a damn knows that an operation to disrupt the election in a country the size of the United States would start with a risk/reward assessment, would require a team of at least 100 persons and would not be writing any code that could in any way be traced to Russia. ..."
"... Doctrine-mongering and repeating birth of new faux-academic "entities", such as a "hybrid war" (any war is hybrid by definition), is a distinct feature of the Western "political science-military history" establishment. Galeotti, who for some strange reason passes as Russia "expert" is a perfect example of such "expertise" and doctrine-mongering. Military professionals largely met this "hybrid warfare" BS with disdain. ..."
"... I have to say that the more I look into this whole Russiagate affair, which is mostly in the minds of democrats (and a few republicans) and the MSM, the more it seems that there is indeed a foreign conspiracy to meddle in the internal affairs of the US (and in the presidential elections) but the meddling entity is not Russia. It is the British! ..."
"... So many (ex-) MI6 operators (Steele, Tait, etc) involved in the story. It is interesting that the media don't question the intense involvement of the British in all this. And of course, the British haven't been laggards in adding fuel to the fire by the whole novichok hoax. ..."
Jul 20, 2018 | turcopolier.typepad.com

As some commenters on SST seem still to have difficulty grasping that the presence of 'metadata' alluding to 'Iron Felix' in the 'Guccifer 2.0' material is strong evidence that the GRU were being framed over a leak, rather than that they were responsible for a hack, an update on the British end of the conspiracy seems in order.

If you look at the 'Lawfare' blog, in which a key figure is James Comey's crony Benjamin Wittes, you will find a long piece published last Friday, entitled 'Russia Indictment 2.0: What to Make of Mueller's Hacking Indictment.'

Among the authors, in addition to Wittes himself, is the sometime GCHQ employee Matt Tait. It appears that the former head of that organisation, the Blairite 'trusty' Robert Hannigan, who must know where a good few skeletons are buried, is a figure of some moment in the conspiracy.

(See https://www.lawfareblog.com... .)

It was Matt Tait who, using the 'Twitter' handle @pwnallthethings, identified the name and patronymic of Dzerzhinsky in the 'metadata' of the 'Guccifer 2.0' material on 15 June 2016, the day after Ellen Nakashima first disseminated the BS from 'CrowdStrike' in the 'WP.'

The story was picked up the following day in a report on the 'Ars Technica' site, and Tait's own account appeared on the 'Lawfare' site, to which he has been a regular contributor, on 28 July.

(See https://arstechnica.com/inf... ; https://www.lawfareblog.com... .)

According to the CV provided in conjunction with the new article:

'Matt Tait is a senior cybersecurity fellow at the Robert S. Strauss Center for International Security and Law at the University of Texas at Austin. Previously he was CEO of Capital Alpha Security, a consultancy in the UK, worked at Google Project Zero, was a principal security consultant for iSEC Partners, and NGS Secure, and worked as an information security specialist for GCHQ.'

As I have noted before on SST, a cursory examination of records at 'Companies House' establishes that 'Capital Alpha Security', which was supposed to have provided Tait with an – independent – source of income at the time he unearthed this 'smoking gun' incriminating the GRU, never did any business at all. So, a question arises: how was Tait making ends meet at that time: busking on the London underground, perhaps?

(See https://beta.companieshouse... .)

Actually, there has been a recent update in the records. Somewhat prematurely perhaps, there is an entry dated 24 July 2018, entitled 'Final Gazette dissolved via compulsory strike-off. This document is being processed and will be available in 5 days.'

The document, when available, may clarify a few loose ends, but the general picture seems clear. Last November, Tait filed 'dormant company accounts' for the company's first year in existence, up until February 2017. One can only do this if one has absolutely no revenue, and absolutely no expenditure. Not even the smallest contract to sort out malware on someone's computer, or to buy equipment for the office.

He then failed to file the 'Confirmation statement', which every company must is legally obliged to produce annually, if it is not to be struck off. This failure led to a 'First Gazette notice for compulsory strike-off' in May.

It is, of course, possible that at the time Tait set up the company he was genuinely intending to try to make a go of a consultancy, and simply got sidetracked by other opportunities.

However – speaking from experience – people who have set up small 'one man band' companies to market skills learnt in large organisations, and then go back into such organisations, commonly think it worth their while to spend the minimal amount of time required to file the documentation required to keep the company alive.

If one sees any realistic prospect that one may either want to or need to go back into the big wide world again, this is the sensible course of action: particularly now when, with the internet, filing the relevant documentation takes about half an hour a year, and costs a trivial sum.

However, Tait may well anticipate that there is there will never be any call for him to go back into the big wide world, as the large organisation in which he has now found employment is part of a 'Borgist' network. So much is evident from another entry on the 'Lawfare' site:

'Bobby Chesney is the Charles I. Francis Professor in Law and Associate Dean for Academic Affairs at the University of Texas School of Law. He also serves as the Director of UT-Austin's interdisciplinary research center the Robert S. Strauss Center for International Security and Law. His scholarship encompasses a wide range of issues relating to national security and the law, including detention, targeting, prosecution, covert action, and the state secrets privilege; most of it is posted here. Along with Ben Wittes and Jack Goldsmith, he is one of the co-founders of the blog.'

(See https://www.lawfareblog.com... .)

Also relevant here is the fact that, rather transparently, this placing of the GRU centre stage is bound up with the attempt to suggest that there is some kind of 'Gerasimov doctrine', designed to undermine the West by 'hybrid warfare.' Unfortunately, the original author of this claptrap, Mark Galeotti, who, I regret to say, is, like Tait, British, has now recanted and confessed. In March, he published a piece on the 'Foreign Policy' site, under the title: 'I'm Sorry for Creating the 'Gerasimov Doctrine'; I was the first to write about Russia's infamous high-tech military strategy. One small problem: it doesn't exist.'

(See https://foreignpolicy.com/2... .)

If anyone wants to grasp what the Chief of the General Staff of the Armed Forces of the Russian Federation, General Valery Gerasimov, was actually saying in the crucial February 2013 article which Galeotti was discussing, and how his thinking has developed subsequently, the place to look is, as so often, the Foreign Military Studies Office at Fort Leavenworth.

Informed discussions by Charles Bartles and Roger McDermott are at https://www.armyupress.army... ; http://www.worldinwar.eu/wp... ; and https://jamestown.org/progr... .

In relation to the ongoing attempt to frame the GRU, it is material that, in his 2013 piece, Gerasimov harks back to two pivotal figures in the arguments of the interwar years. Of these, Georgy Isserson, the Jewish doctor's son from Kaunas who became a Civil War 'political commissar' and then a key associate of Mikhail Tukhachevsky, was the great pioneer theorist of 'deep operations.'

The ideas of the other, Aleksandr Svechin, the former Tsarist 'genstabist', born in Odessa into an ethnically Russian military family, who was the key opponent of Tukhachevky and Isserson in the arguments of the 'Twenties, provided key parts of the intellectual basis of the Gorbachev-era 'new thinking.'

The 'Ars Technica' article in which Tait's claims were initially disseminated opened:

'We still don't know who he is or whether he works for the Russian government, but one thing is for sure: Guccifer 2.0 – the nom de guerre of the person claiming he hacked the Democratic National Committee and published hundreds of pages that appeared to prove it – left behind fingerprints implicating a Russian-speaking person with a nostalgia for the country's lost Soviet era.'

In his 2013 article, Gerasimov harks back to the catastrophe which overcame the Red Army in June 1941. Ironically, this was the product of the Stalinist leadership's disregard of the cautions produced not only by Svechin, but by Isserson. In regard to the latter, the article remarks that:

'The fate of this "prophet of the Fatherland" unfolded tragically. Our country paid in great quantities of blood for not listening to the conclusions of this professor of the General Staff Academy.'

As it happens, while both Svechin and Tukhachevsky were shot by the heirs of 'Felix Edmundovich', the sentence of death on Isserson was commuted, and he spent the war in prison and labour camps, while others used his ideas to devastating effect against the Germans.

Quite clearly, the 'Guccifer 2.0' persona is a crude fabrication by someone who has absolutely no understanding of, or indeed interest in, the bitter complexities of both of the history of Russia and of the 'borderlands', not only in the Soviet period but before and after.

Using this criterion as a 'filter', the obvious candidates are traditional Anglo-Saxon 'Russophobes', like Sir Richard Dearlove and Christopher Steele, or the 'insulted and injured' of the erstwhile Russian and Soviet empires, so many of them from the 'borderlands', of the type of Victoria Nuland, or the various Poles, Ukrainians and Balts and Jews who have had so much influence on American policy.

(I should note that other Jews, not only in Russia, but outside, including in Israel, think quite differently, in particular as they are very well aware, as Isserson would have been, of the extent to which 'borderlands' nationalists were enthusiastic collaborators with the Germans in the 'Final Solution'. On this, there is a large and growing academic literature.)

It is not particularly surprising that many of the victims of the Russian and Soviet empires have enjoyed seeing the tables turned, and getting their own back. But it is rather far from clear that this makes for good intelligence or sound policy. We were unable to load Disqus. If you are a moderator please see our troubleshooting guide .


blue peacock , 2 days ago
How does the objective truth get disclosed in an environment of extreme deceit by so many parties?

How to trust western intelligence when they have such a long and sordid track record of deceit, lies and propaganda? At the same time there is such a long history of Russian and Chinese intelligence and information operations against the west.

Then there is the nexus among the highest levels of US law enforcement and intelligence as well as political elites in both parties and key individuals in the media complex.

We are living in a hall of mirrors and it seems the trend is towards confirmation bias in information consumption.

richardstevenhack , 2 days ago
Excellent post, especially the debunking of the 'Gerasimov doctrine' which I always thought was more hand-waving and Russian mind-reading.

It's important to realize that there are a number of people in the infosec community who have biases against Russia, just as there are in the general population. Then there are more cautious people, who recognize the difficulty in attributing a hack to any specific person absent solid, incontrovertible, non-circumstantial and non-spoofable (and preferably offline) evidence.

Tait doesn't appear to be one of the latter. Thomas Rid would be another. There are others.

Jeffrey Carr is one of the latter, and his familiarity with intelligence matters is clear from his organization of the annual "Suits and Spooks" Conference. I believe he was the first to raise questions about the DNC hack which didn't pass his smell test.

There are also a number of companies in infosec who rely on latching onto a particular strain of hacker, the more publicly exploitable for PR purposes the better, as a means of keeping the company name in front of potential high-profile and highly billable clients. CrowdStrike and its Russia obsession isn't the only one that's been tagged with that propensity.

Mandiant could be referred to as the "Chinese, all the time" company, for example. Richard Bejtlich was at Fireeye and the became Chief Security Officer when they acquired Mandiant. He spent quite a bit of effort on his blog warning about the Chinese military buildup as a huge threat to the US. He's former USAF so perhaps that's not surprising.

Bottom line: Confirmation bias is a real thing.

David Blake -> richardstevenhack , 5 hours ago
One quick way to know their bias is the AC test. Google their name plus "Atlantic Council". Ridd fails badly.
Barbara Ann , 2 days ago
Glad David's comment has been reproduced as a post in its own right, this is a critically important topic. IMO Matt Tait plays the role of midwife in this conspiracy. His Twitter thread

View Hide

mlnw , 2 days ago
The Comey, Brennan, Mueller claim - indeed a central one upon which the recent indictment rests- that Guccifer 2.0 was a Russian State agent that hacked the DNC- was discredited and put to rest last year by the forensics conducted by Bill Binney and his colleagues. The Guccifer 2.0 metadata was analyzed for its transmission speed, and based on the internet speeds to and from numerous test locations abroad and in the U.S., it was determined to have been impossible for the so-called Guccifer 2.0 to have hacked the DNC computers over the internet. The transmission speed however did correspond to the speed of the transfer to a thumb drive. Additionally, it was found that the data had been manipulated and split into two parts to simulate a July and a September transfer, when in fact the parts merge perfectly as single file, and where, according to Binney, the probability of the split being a coincidence would be 100 to the 50th power.

As for the crude trace fingerprints (e.g. the referencing of Dzerzinsky), one of the Wikileaks data dumps (Vault 7 Marble) during a period when Assange was negotiating with the Administration - there were two at the time (Vault 7 Marble and Vault 7 Grasshopper), the release of which apparently enraged Mike Pompeo- was designed to obfuscate, fabricate and frame countries such as Russia, Iran or North Korea by pretending to be the target country, including in the use of target's alphabet and language.

VIPs has written numerous articles on this in Consortium News. See also the report by Patrick Lawrence Smith in The Nation at: https://www.thenation.com/a... . (It was apparently so hot at the time- and disputed by several other VIPs members- that The Nation sought an independent assessment by third party, though those comments were easily addressed and dismissed in seriatim by Binney in an annex to the article.)

Binney has explained his forensic analysis and conclusions at numerous forums, and in a sit-down with Secretary Pompeo in October, 2017- though Mueller, the FBI, and mainstream and some of the alternative press seem either deaf, dumb and blind to it all, or interested in discrediting the study. The irony is, I'd venture to guess, that Binney, with his 40 years of experience, including as Technical Director and technical guru at the NSA, is, even in retirement, more sophisticated in these matters than any one at the Agency, or the FBI, or CIA, or certainly, the Congressional Intelligence Committees. So, it is astounding that any or all of them could have, but did not, invite him to testify as an expert.

Moreover, the NSA has a record of every transmission, and also would have it on backup files. And, the FBI has been sitting on Seth Rich's computer and his communications with Wikileaks, and presumably has a report that it has not released. And of course, as Trump asked in his press conference, where's the DNC server, any or all of which would put this question to rest.

A recent interview with Binney can be found at:

Play Hide
mlnw -> mlnw , 2 hours ago
The last clause of the first paragraph should have said: "according to Binney, the probability of the split being a coincidence would be one over 100 to the 50th power
Jack -> David Habakkuk , a day ago
David

There is a pattern of abuse of formerly well regarded institutions to achieve the propaganda aims of the Deep State establishment. The depths that were plumbed to push the Iraq WMD falsehoods are well known. Yet no one was held to account nor was there any honest accounting of the abuse. There have been pretenses like the Owen inquiry that you note.

We see the same situation of sweeping under the rug malfeasance and even outright criminality through obfuscation and obstruction in the case of the meddling in the 2016 election by top officials in intelligence and law enforcement. Clearly less and less people are buying what the Deep State sells despite their overwhelming control of the media channels.

It seems that we are marching towards a credibility crisis similar to what was experienced in the Soviet Union when no one trusted the contents in Pravda.

What is to be gained by the leadership in Britain in promoting these biological weapons cases since Litvinenko? In the US it is quite apparent that the Deep State have become extremely powerful and the likelihood that Trump recognizes that resistance is futile is very high. Schumer may be proven right that they have six ways from Sunday to make you kowtow to their dictats.

Fred -> Jack , a day ago
Jack,

"Yet no one was held to account"

That was one of the changes being hoped for when Obama was first elected. Instead we got little, except for things such as bailed out bankers and the IRS scandal which lasted until the end of his 2nd term. The panic from the left over the 2016 election issues the are still going on is that the expected candidate isn't in office and they are being exposed. Whether they get prosecuted is another story.

http://taxprof.typepad.com/...

TTG , a day ago
I think Matt Tait, David Habakkuk and many others are reading far more into this Dzerzinsky thing than what it warrants. The government dependent ID cards used by my family while I was working as a clandestine case officer overseas were signed by Robert Ludlum. Intelligence officers often have an odd sense of humor.

On a different note, I fully endorse David Habakkuk's recommendation of the writings of Bartles, McDermott and many others at the Foreign Military Studies Office at Fort Leavenworth. They are top notch. I learned a lot from Tim Thomas many years ago.

richardstevenhack -> TTG , a day ago
I agree that taken by itself, the Dzerzinsky thing would be an anomaly only and could be dismissed as "black humor" of a kind often found in hackers. However, taken with all the other evidence produced by Adam Carter, it becomes much more obviously an attempt to support a false flag "Russian hacker" narrative that otherwise is porous.

I believe there is a phrase going something like "an attempt to add verisimilitude to an otherwise bald and unconvincing narrative."

Publius Tacitus -> TTG , a day ago
TTG,

You want us to believe that the GRU are so sloppy and so inexperienced that they would launch a hack on the DNC and not take every measure to ensure there was no link whatsoever to anything Russian? Any former intel officer worth a damn knows that an operation to disrupt the election in a country the size of the United States would start with a risk/reward assessment, would require a team of at least 100 persons and would not be writing any code that could in any way be traced to Russia.

smoothieX12 . , a day ago
Unfortunately, the original author of this claptrap, Mark Galeotti, who, I regret to say, is, like Tait, British, has now recanted and confessed.

Doctrine-mongering and repeating birth of new faux-academic "entities", such as a "hybrid war" (any war is hybrid by definition), is a distinct feature of the Western "political science-military history" establishment. Galeotti, who for some strange reason passes as Russia "expert" is a perfect example of such "expertise" and doctrine-mongering. Military professionals largely met this "hybrid warfare" BS with disdain.

ancient archer , a day ago
I have to say that the more I look into this whole Russiagate affair, which is mostly in the minds of democrats (and a few republicans) and the MSM, the more it seems that there is indeed a foreign conspiracy to meddle in the internal affairs of the US (and in the presidential elections) but the meddling entity is not Russia. It is the British!

So many (ex-) MI6 operators (Steele, Tait, etc) involved in the story. It is interesting that the media don't question the intense involvement of the British in all this. And of course, the British haven't been laggards in adding fuel to the fire by the whole novichok hoax.

This needs to be looked at in more detail by the alternative media and well informed commentators like the host of this site.

[Jul 18, 2018] Crowdstrike brings up a couple of interesting questions.

Jul 18, 2018 | www.nakedcapitalism.com

Reply


begob , July 16, 2018 at 9:16 am

The best evidence rule should result in the DNC server being made available for inspection by the accused at the discovery stage. Naw gaw hap'n?

Besides, the Crowdstrike copy will have to qualify for a hearsay exception, and trustworthiness comes into issue.

Peter VE , July 16, 2018 at 4:51 pm

I am willing to bet money that those servers. or more accurately, their hard drives, will be found to have become mysteriously corrupted and no longer readable. The scene from The Big Easy comes to mind, when a heavy magnet is "accidentally" set next to the incriminating videotape in the police evidence room. That, of course, assumes that they will ever be subpoenaed.
Crowdstrike brings up a couple of interesting questions.
1) Were they so bumbling that they would wait a full month after evidence of "hacking" turned up at the DNC to take action to protect the network? They worked for the DNC, so it's possible.
or
2) Did they use that month to ensure that the proper evidence pointing to the GRU could be found on the duplicate copies of the hard drives which they supplied to the FBI, and set up redirecting intermediary steps somewhere on 3rd country servers? In which case, were they actually working for the FSB, (since we know from our own experience that the worst enemy of any intelligence agency are the ones you compete with for funding)?

Peter VE , July 16, 2018 at 9:46 am

Based on the incredible sloppiness of their work for the DNC, one can only assume that Crowdstrike is actually a GRU operation ;-)

Newton Finn , July 16, 2018 at 9:55 am

Good context here for all things Russophobic:

https://www.counterpunch.org/2018/07/16/when-did-russia-become-an-adversary/

YY , July 16, 2018 at 10:10 am

Bit of a slog but relevant
https://disobedientmedia.com/2018/07/muellers-latest-indictment-ignores-evidence-in-the-public-domain/

[Jul 18, 2018] Russiagate A CIA Concocted Hoax. Trump Knows It By Stephen Lendman

Notable quotes:
"... No Russian interference in America's political process occurred in 2016, earlier, or is being cooked up for the nation's November midterm elections. ..."
"... Trump knows it and said so in Helsinki. When asked if he holds Russia accountable for anything, he said: ..."
"... Stephen Lendman is a Research Associate of the CRG, Correspondent of Global Research based in Chicago. ..."
"... VISIT MY NEW WEB SITE: stephenlendman.org (Home – Stephen Lendman). Contact at [email protected]. My newest book as editor and contributor is titled "Flashpoint in Ukraine: How the US Drive for Hegemony Risks WW III." http://www.claritypress.com/LendmanIII.html ..."
Jul 18, 2018 | www.globalresearch.ca

No Russian interference in America's political process occurred in 2016, earlier, or is being cooked up for the nation's November midterm elections.

Trump knows it and said so in Helsinki. When asked if he holds Russia accountable for anything, he said:

"I hold both countries responsible (for dismal bilateral relations). I think that the United States has been foolish. I think we've all been foolish And I think we're all to blame."

Regarding election meddling, he said:

"There was no collusion at all. Everybody knows it. And people are being brought out to the fore. So far that I know, virtually none of it related to the campaign. And they're going to have to try really hard to find somebody that did relate to the campaign."

"My people came to me and some others (T)hey think it's Russia President Putin said it's not Russia. I will say this: I dont see any reason why it would be."

" President Putin was extremely strong and powerful in his denial today."

Trump is wrong about most things, not this. No evidence, nothing, proves Russian meddling in the US political process.

If it existed, it would have been revealed long ago. It never was and never will be because there's nothing credible to reveal, Big Lies alone.

Trump's above remarks were in Helsinki. In response to a raging Russophobic firestorm of criticism back home, he backtracked from his above comments, saying he misspoke abroad.

He accepts the intelligence community's claim about Russian US election meddling – knowing it didn't occur.

Russiagate was cooked up by Obama's thuggish Russophobic CIA director John Brennan , media keeping the Big Lie alive.

DNC/John Podesta emails were leaked, not hacked – an indisputable fact media scoundrels suppress to their disgrace.

Former UK ambassador to Uzbekistan Craig Murray earlier explained that

"(t)he source of these emails and leaks has nothing to do with Russia at all," adding:

"I discovered what the source was when I attended the Sam Adam's whistleblower award in Washington."

"The source of these emails (came) from within official circles in Washington DC. You should look to Washington, not to Moscow."

"WikiLeaks has never published any material received from the Russian government or from any proxy of the Russian government. It's simply a completely untrue claim designed to divert attention from the content of the material" and its true source.

The Big Lie alone matters when it's the official narrative. The Russian meddling hoax and mythical Kremlin threat to US security are central to maintaining adversarial relations with America's key invented enemy.

It's vital to unjustifiably justifying the nation's global empire of bases, its outrageous amount of military spending, its belligerence toward all sovereign independent states, its endless wars of aggression, its scorn for world peace and stability, its neoliberal harshness to pay for it all, along with transferring the nation's wealth from ordinary people to its privileged class.

America's deeply corrupted political process is far too debauched to fix, rigged to serve wealth, power and privilege exclusively, at war on humanity at home and abroad.

It's a tyrannical plutocracy and oligarchy, a police state, not a democracy, a cesspool of criminality, inequity and injustice, run by sinister dark forces – monied interests and bipartisan self-serving political scoundrels, wicked beyond redemption, threatening humanity's survival.

Today is the most perilous time in world history. What's going on should terrify everyone everywhere.

Washington's rage for global dominance, its military madness, its unparalleled recklessness, threatens world peace, stability, and survival.

*

Stephen Lendman is a Research Associate of the CRG, Correspondent of Global Research based in Chicago.

VISIT MY NEW WEB SITE: stephenlendman.org (Home – Stephen Lendman). Contact at [email protected].

My newest book as editor and contributor is titled "Flashpoint in Ukraine: How the US Drive for Hegemony Risks WW III."

http://www.claritypress.com/LendmanIII.html

[Jul 18, 2018] Mueller Grand Jury Indictment Does Not Prove Russia Hacked DNC caucus99percent

Notable quotes:
"... @chuckutzman ..."
Jul 18, 2018 | caucus99percent.com

Mueller Grand Jury Indictment Does Not Prove Russia Hacked DNC Steven D on Tue, 07/17/2018 - 1:37pm

="username">detroitmechworks
I'd disagree, since it's one singular action. @chuckutzman While the PTB want to think of it as OOOH, 12 indictments, when he actually just got one group of people to agree with him. Not even ALL of them. Just most of them. And he could get rid of any he didn't think were going to agree with him. Because of course he fucking can.

Ugh, I'll go with my own BS stories than the government's rather boring line of same old shit.

[Jul 18, 2018] Considerable evidence points to Guccifer 2,0 as being an affiliate of the DNC

Jul 18, 2018 | consortiumnews.com

Mark F. McCarty , July 14, 2018 at 9:48 am

At the crux of the indictment is an outright absurdity – Assange announced that he would be releasing Clinton-related material on June 10th, 2016, whereas the indictment claims that Guccifer 2.0 gave him access to the DNC emails on July 14th. Moreover, considerable evidence points to Guccifer 2,0 as being an affiliate of the DNC.

https://medium.com/@markfmccarty/muellers-new-indictment-do-the-feds-take-us-for-idiots-5406ef955406

https://www.reddit.com/r/WayOfTheBern/comments/8yri14/julian_assange_crowdstrike_and_the_russian_hack/

http://g-2.space/

[Jul 18, 2018] Fugitive Cop Says He's Behind the DNC Leaks

Notable quotes:
"... Webb (for what it's worth): "They're really not Trump's Russians; they're really not Putin's Russians -- they're really Rosenstein and Comey's Russians." ..."
Jul 18, 2018 | consortiumnews.com

Marko , July 14, 2018 at 6:40 am

How coincidental that just the day before the announcement of the indictments , The Daily Beast published an extensive hit-piece on John Mark Dougan , who has admitted setting up the DCLeaks website that was used to release some of the earlier leaks :

"Fugitive Cop Says He's Behind the DNC Leaks. It's His Latest Hoax. A Florida cop turned hacker who fled to Russia to escape the FBI claims Seth Rich leaked him DNC documents. But his story is full of holes."

https://www.thedailybeast.com/fugitive-cop-says-hes-behind-the-dnc-leaks-its-his-latest-hoax?ref=scroll

Also , True Pundit suspects some of the language used in the indictments was cribbed from a related lawsuit filed by George Webb :

"Mueller Plagiarizes Right-Wing YouTube Journalist's Lawsuit Against Podesta in New Russian Indictments; DOJ's Big Splash Appears Fabricated"

https://truepundit.com/mueller-plagiarizes-right-wing-youtube-journalists-lawsuit-against-podesta-in-new-russian-indictments-dojs-big-splash-appears-fabricated/

Gen Dao , July 14, 2018 at 8:09 am

George Webb is not a right-winger. He is a Bernie supporter. LOL. Still, the similarity of the wording suggests that the indictment is meant not only as an attempt to bolster the Russiagate fiction but also to defend Hillary and Podesta against charges of corruption, rigging the Dem primary, and incompetence and perhaps allow Hillary to run in 2020 or at lease to choose who the Dem candidate will be. It is also, of course, meant to sabotage detente with Russia and damage both Trump and Bernie Sanders. Sanders is probably regarded as even more dangerous than Trump by the deep state and by the corrupt, no-talent leaders of the pathetic Dem party -- just look at Shumer's ridiculous and unpatriotic demand that Trump cancel the summit. The current Dem leaders have absolutely nothing positive to offer the American people in terms of foreign policy and do nothing but repeat neocon nonsense, but the deep state supports the Dems at the moment because they want to see Trump impeached and Bernie make a fool of himself by criticizing Russia with no evidence. Bernie lost a lot of support with his recent uninformed Russophobic statement. The strong implied focus on defending Podesta and by further implication Hillary, obvious from the similarities with the Webb lawsuit, shows the real aim of the indictments. As Lauria points out, it's all for internal consumption. But there are several apparent contradictions in the indictment, and those contradictions will be no doubt be pointed out in the coming days by computer experts, so this indictment may have no lasting effect outside of people who are already True Believers in Russiagate. Even so, the failure to interview Assange and Craig Murray is truly shocking and disappointing.

Alcuin , July 14, 2018 at 10:49 am

George Webb has talked with Bill Binney and despite being somewhat eccentric should not be dismissed out of hand. He is rumored to be former Mossad. From his videos of the last three days (days 15, 16, 17) it appears that he thinks Russian-born hackers living in the USA were indeed involved, but that they were not working for the Russian government but rather for various Americans (including well-known American politicians), concentrating on economic espionage.

Remember that Assange when questioned repeatedly emphasized that that the emails did not come from Russian "state" actors. Putin recently seems to have wanted to imply the same point.
According to Webb the hackers received their training from Russian military intelligence.
Webb also ties the hacking and espionage to the wider picture of pipeline politics in Europe and the Middle East. Even if Webb is wrong, or if he represents Israeli interests, it's an interesting view that is worth investigating.

Alcuin , July 16, 2018 at 2:18 am

Webb (for what it's worth): "They're really not Trump's Russians; they're really not Putin's Russians -- they're really Rosenstein and Comey's Russians."

Ben , July 14, 2018 at 8:13 am

Forensic analysis from forensicator:

https://theforensicator.wordpress.com/
http://g-2.space/

His analysis of the metadata indicates the information was copied to a USB.

[Jul 17, 2018] IMHO believing in the Crowdstrike analysis is like believing in Santa Claus

Putin statement about $400 million 'donation' to Hillary Clinton by MI6-connected Bill Browder in his Helsinki presser is obviously of great interest. This has given some new insights into the DNC false flag operation dynamics.
Notable quotes:
"... The FBI would get info about these hackers through the CrowdStrike team's disk images, memory dumps, network logs and other reports. CrowdStrike's Robert Johnston also said he worked with FBI investigators during his work at the DNC so the FBI also got some of their info directly. ..."
"... IMHO believing in the Crowdstrike analysis is like believing in Santa Claus. They did propagate unsubstantiated "security porno" like a hack of Ukrainians for a while. After this incident, Dmitry Alperovich looks like a sleazy used car salesman, not like a real specialist and, in any case, his qualification is limited to the SMTP protocol. ..."
"... What if it was Crowdstrike which compiled and planted the malware using Vault 7 tools and then conducted full-scale false flag operation against Russians to deflect allegations that Bernie was thrown under the bus deliberately and unlawfully. They have motivation and means to do this. ..."
Jul 17, 2018 | turcopolier.typepad.com

Keith Harbaugh , a day ago

PT, regarding your questions: "How did the FBI obtain information about activity on the DNC and DCCC servers", "what is the source of the information?",
"how do they know what happened on specific dates as alleged in the complaint?", I believe the answers are implicit in the first part of this news article:

"The Perfect Weapon: How Russian Cyberpower Invaded the U.S." By Eric Lipton, David E. Sanger and Scott Shane, New York Times , 2016-12-13.

It describes in considerable detail how, STARTING IN SEPTEMBER 2015, the FBI tried strenuously to alert the DNC to the fact that it was being hacked by Russia, but the DNC, remarkably, chose to ignore these warnings.

Here's how the article begins:

When Special Agent Adrian Hawkins of the Federal Bureau of Investigation called the Democratic National Committee in September 2015 to pass along some troubling news about its computer network, he was transferred, naturally [ sic! ], to the help desk.

His message was brief, if alarming. At least one computer system belonging to the D.N.C. had been compromised by hackers federal investigators had named "the Dukes," a cyberespionage team linked to the Russian government.

The F.B.I. knew it well: The bureau had spent the last few years trying to kick the Dukes out of the unclassified email systems of the White House, the State Department and even the Joint Chiefs of Staff, one of the government's best-protected networks.

BTW, I sincerely thank TTG for providing this link in one of his previous comments.

TTG -> Keith Harbaugh , 8 hours ago
Keith et al,

The FBI warned the DNC of the Dukes (aka APT29, Cozy Bear) in September 2015. These are the hackers that the Dutch AIVD penetrated and warned the NSA in real time when they attacked Pentagon systems in 2015. Their goal seemed to be intelligence collection as one would expect as the Dutch said they are affiliated with the SVR.

The Fancy Bear hackers (aka APT28) are the ones referred to in the recent indictment of the GRU officers. They penetrated the DNC systems in April 2016 and weren't discovered until CrowdStrike identified them. They're the ones who took data and released it through DCLeaks, Guccifer 2.0 and Wikileaks as part of a coordinated information operation (IO). I'm not at all surprised that the GRU would lead this IO as a military operation. The FBI would get info about these hackers through the CrowdStrike team's disk images, memory dumps, network logs and other reports. CrowdStrike's Robert Johnston also said he worked with FBI investigators during his work at the DNC so the FBI also got some of their info directly. There is absolutely no need to take physical possession of the servers.

The detail of some of the GRU officers' online activity indicates their computers were penetrated by US or allied IC/LEA much like the Dutch AIVD penetrated the FSB computers. This was probably a main source for much of the indictment's evidence. That the IC would release information about this penetration for this indictment is extraordinary. Normally this stuff never sees the light of day. It sets the precedent for the release of further such intelligence information in future indictments.

Likbez -> TTG
TTG,

IMHO believing in the Crowdstrike analysis is like believing in Santa Claus. They did propagate unsubstantiated "security porno" like a hack of Ukrainians for a while. After this incident, Dmitry Alperovich looks like a sleazy used car salesman, not like a real specialist and, in any case, his qualification is limited to the SMTP protocol.

What if it was Crowdstrike which compiled and planted the malware using Vault 7 tools and then conducted full-scale false flag operation against Russians to deflect allegations that Bernie was thrown under the bus deliberately and unlawfully. They have motivation and means to do this.

Now we also see a DNC motivation of keeping the content of affected servers from FBI eyes -- Browder money.

[May 29, 2018] Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA by Elizabeth Lea Vos

Highly recommended!
May 29, 2018 | www.zerohedge.com

Authored by Elizabeth Lea Vos via Disobedient Media,

In his final report in a three-part series, Guccifer 2's West Coast Fingerprint , the Forensicator discovers evidence that at least one operator behind the Guccifer 2.0 persona worked from the West Coast of the United States.

The Forensicator's earlier findings stated that Guccifer 2.0's NGP-VAN files were accessed locally on the East Coast, and in another analysis they suggested that a file published by Guccifer 2.0 was created in the Central time zone of the United States. Most recently, a former DNC official refuted the DNC's initial allegations that Trump opposition files had been ex-filtrated from the DNC by Russian state-sponsored operatives.

So, if Guccifer 2.0's role was negated by the statements of the DNC's own former "official" in a 2017 report by the Associated Press , why do we now return our attention to the Guccifer 2.0 persona, as we reflect on the last section of new findings from the Forensicator?

The answer: Despite almost two years having passed since the appearance of the Guccifer 2.0 persona, legacy media is still trotting out the shambling corpse of Guccifer 2.0 to revive the legitimacy of the Russian hacking narrative. In other words, it is necessary to hammer the final nail into the coffin of the Guccifer 2.0 persona.

As previously noted, In his final report in a three-part series, the Forensicator discusses concrete evidence that at least one operator behind the Guccifer 2.0 persona worked from the West Coast of the United States. He writes:

"Finally, we look at one particular Word document that Guccifer 2 uploaded, which had "track changes" enabled. From the tracking metadata we deduce the timezone offset in effect when Guccifer 2 made that change -- we reach a surprising conclusion: The document was likely saved by Guccifer 2 on the West Coast, US ."

The Forensicator spends the first part of his report evaluating indications that Guccifer 2.0 may have operated out of Russia. Ultimately, the Forensicator discards those tentative results. He emphatically notes:

"The PDT finding draws into question the premise that Guccifer 2 was operating out of Russia, or any other region that would have had GMT+3 timezone offsets in force. Essentially, the Pacific Timezone finding invalidates the GMT+3 timezone findings previously described."

The Forensicator's new West Coast finding is not the first evidence to indicate that operators behind the Guccifer 2.0 persona were based in the US. Nine months ago, Disobedient Media , reported on the Forensicator's analysis , which showed (among other things) that Guccifer 2.0's "ngpvan" archive was created on the East Coast. While that report received the vast majority of attention from the public and legacy media, Disobedient Media later reported on another analysis done by the Forensicator, which found that a file published by Guccifer 2.0 (on a different occasion) was probably created in the Central Timezone of the US.

Adding to all of this, UK based analyst and independent journalist Adam Carter presented his own analysis which also showed that the Guccifer 2.0 Twitter persona interacted on a schedule which was best explained by having been based within the United States.

The chart above shows a box which spans regular working hours. It indicates that unless Guccifer 2.0 worked the night shift, they were likely working out of the US. Though this last data point is circumstantial, it is corroborated by the previously discussed pieces of independently verifiable hard evidence described by the Forensicator.

When taking all of these separate pieces into account, one observes a convergence of evidence that multiple US-based operators were behind the Guccifer 2.0 persona and its publications. This is incredibly significant because it is based on multiple pieces of concrete data; it does not rely on "anonymous sources within the government," nor contractors hired by the DNC. As a result, much of the prior legacy press coverage of Guccifer 2.0 as a Russia-based agent can be readily debunked.

Such tangible evidence stands in contrast to the claims made in a recently published Daily Beast article, which reads more like a gossip column than serious journalism. In the Daily Beast's recital, the outlet cites an anonymous source who claims that a Moscow-based GRU agent was behind the Guccifer 2.0 operation, writing :

"Guccifer 2.0, the "lone hacker" who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia's military intelligence directorate (GRU), The Daily Beast has learned. It's an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

But on one occasion, The Daily Beast has learned, Guccifer failed to activate the VPN client before logging on. As a result, he left a real, Moscow-based Internet Protocol address in the server logs of an American social media company, according to a source familiar with the government's Guccifer investigation.

Working off the IP address, U.S. investigators identified Guccifer 2.0 as a particular GRU officer working out of the agency's headquarters on Grizodubovoy Street in Moscow."

[The Daily Beast , March 22, 2018]

Clearly, the claim made in the Daily Beast's report is in direct contradiction with the growing mound of evidence suggesting that Guccifer 2.0 operated out of the United States. A detailed technical breakdown of the evidence confirming a West-Coast "last saved" time and how this counters the claims of the Daily Beast can be found in the Forensicator's work.

The Forensicator explained to Disobedient Media that their discovery process was initiated by the following Tweet by Matt Tait ( @pwnallthings ), a security blogger and journalist. Tait noticed a change revision entry in one of the Word documents published in Guccifer 2.0's second batch of documents, (uploaded 3 days after Guccifer 2.0 first appeared on the scene).

The Forensicator corrects Tait, stating that the timestamp is in "wall time," (local time) not UTC. The Forensicator explains that Tait's mistake is understandable because the "Z" suffix usually implies "Zulu" (GMT) time, but that isn't the case for "track changes" timestamps. The Forensicator writes that the document Tait refers to in his Tweet is named Hillary-for-America-fundraising-guidelines-from-agent-letter.docx ; it has Word's "track changes" feature enabled. Guccifer 2.0 made a trivial change to the document, using the pseudonym, "Ernesto Che," portrayed below:

The Forensicator correlated that timestamp ("12:56:00 AM") with the document's "last saved" timestamp expressed in GMT, as shown below courtesy of the Forensicator's study :

Based on the evidence discussed above, the Forensicator concludes that Guccifer 2.0 saved this file on a system that had a timezone offset of -7 hours (the difference between 0:56 AM and 7:56 AM GMT). Thus, the system where this document was last changed used Pacific Timezone settings.

The logical conclusion drawn from the preceding analysis is that Guccifer 2.0 was operating somewhere on the West Coast of the United States when they made their change to that document . This single finding throws into shambles any other conclusions that might indicate that Guccifer 2.0 was operating out of Russia. This latest finding also adds to the previously cited evidence that the persona was probably operated by multiple individuals located in the United States.

Taken all together, the factual basis of the Russian hacking story totally collapses. We are left instead with multiple traces of a US-based operation that created the appearance of evidence that Kremlin-allied hackers had breached the DNC network. Publicly available data suggests that Guccifer 2.0 is a US-based operation. To this, we add:

In the course of the last nine months this outlet has documented the work of the Forensicator, which has indicated that not only were Guccifer 2.0's "ngp-van" files accessed locally on the East Coast of the US, but also that several files published by the Guccifer 2.0 persona were altered and saved within the United States. The "Russian fingerprints" left on Guccifer 2.0's first document have been debunked, as has the claim that the file itself was extracted from the DNC network in the first place. On top of all this, a former DNC official withdrew the DNC's initial allegations that supported the "Russian hack" claim in the first place.

One hopes that with all of this information in mind, the long-suffering Guccifer 2.0 saga can be laid to rest once and for all, at least for unbiased and critically thinking observers.


Chris2 Tue, 05/29/2018 - 22:15 Permalink

Snowden talked about the NSA or is it CIA, had the ability to leave Russian fingerprints.

All of this was the "insurance" to frame Trump who they knew would win when they saw that Hillary rallies had 20 people only showing up few old lesbians and nobody else.

beemasters -> Chris2 Tue, 05/29/2018 - 22:18 Permalink

The hunt for the messenger has certainly proven to be an effective distraction.

LetThemEatRand Tue, 05/29/2018 - 22:16 Permalink

Meanwhile, Snowden risked his life and liberty to show us evidence that the NSA developed technology to make it appear even with expert analysis that NSA hacking originated from a foreign power.

[Mar 08, 2018] Several respected journalists have cast serious doubt on CrowdStrike s report on the DNC servers

Looks like Brennan was the architect of DNS false flag operation: "Hersh also told Butowsky that the DNC made up the Russian hacking story as a disinformation campaign -- directly pointing a finger at former CIA director (and now MSNBC/NBC contributor ) John Brennan as the architect."
Now all this staff started to remind me 9/11 investigation. Also by Mueller.
Notable quotes:
"... Notably, Crowdstrike has been considered by many to be discredited over their revision and retraction of a report over Russian hacking of Ukrainian military equipment ..."
"... Also notable is that Crowdstrike founder and anti-Putin Russian expat Dimitri Alperovitch sits on the Atlantic Council - which is funded by the US State Department, NATO, Latvia, Lithuania, and Ukranian Oligarch Victor Pinchuk. Who else is on the Atlantic Council? Evelyn Farkas - who slipped up during an MSNBC interview with Mika Brzezinski and disclosed that the Obama administration had been spying on the Trump campaign: ..."
"... Hersh also told Butowsky that the DNC made up the Russian hacking story as a disinformation campaign -- directly pointing a finger at former CIA director (and now MSNBC/NBC contributor ) John Brennan as the architect. ..."
"... I have a narrative of how that whole f*cking thing began. It's a Brennan operation, it was an American disinformation , and the fu*kin' President, at one point, they even started telling the press -- they were backfeeding the Press, the head of the NSA was going and telling the press, fu*king c*cksucker Rogers, was telling the press that we even know who in the Russian military intelligence service leaked it. ..."
"... Listen to Seymour Hersh leaked audio: https://www.youtube.com/embed/giuZdBAXVh0 (full transcription here and extended audio of the Hersh conversation here ) ..."
"... As we mentioned last week, Dotcom's assertion is backed up by an analysis done last year by a researcher who goes by the name Forensicator , who determined that the DNC files were copied at 22.6 MB/s - a speed virtually impossible to achieve from halfway around the world, much less over a local network - yet a speed typical of file transfers to a memory stick. ..."
"... Last but not least, let's not forget that Julian Assange heavily implied Seth Rich was a source: ..."
"... Given that a) the Russian hacking narrative hinges on Crowdstrikes's questionable reporting , and b) a mountain of evidence pointing to Seth Rich as the source of the leaked emails - it stands to reason that Congressional investigators and Special Counsel Robert Mueller should at minimum explore these leads. ..."
"... As retired U.S. Navy admiral James A. Lyons, Jr. asks: why aren't they? ..."
Mar 03, 2018 | www.zerohedge.com

... ... ...

In addition to several odd facts surrounding Rich's still unsolved murder - which officials have deemed a "botched robbery," forensic technical evidence has emerged which contradicts the Crowdstrike report. The Irvine, CA company partially funded by Google , was the only entity allowed to analyze the DNC servers in relation to claims of election hacking:

Notably, Crowdstrike has been considered by many to be discredited over their revision and retraction of a report over Russian hacking of Ukrainian military equipment - a report which the government of Ukraine said was fake news.

In connection with the emergence in some media reports which stated that the alleged "80% howitzer D-30 Armed Forces of Ukraine removed through scrapping Russian Ukrainian hackers software gunners," Land Forces Command of the Armed Forces of Ukraine informs that the said information is incorrect .

Ministry of Defence of Ukraine asks journalists to publish only verified information received from the competent official sources. Spreading false information leads to increased social tension in society and undermines public confidence in the Armed Forces of Ukraine. -- mil.gov.ua (translated) (1.6.2017)

In fact, several respected journalists have cast serious doubt on CrowdStrike's report on the DNC servers:

Pay attention, because Mueller is likely to use the Crowdstrike report to support the rumored upcoming charges against Russian hackers.

Also notable is that Crowdstrike founder and anti-Putin Russian expat Dimitri Alperovitch sits on the Atlantic Council - which is funded by the US State Department, NATO, Latvia, Lithuania, and Ukranian Oligarch Victor Pinchuk. Who else is on the Atlantic Council? Evelyn Farkas - who slipped up during an MSNBC interview with Mika Brzezinski and disclosed that the Obama administration had been spying on the Trump campaign:

The Trump folks, if they found out how we knew what we knew about the Trump staff dealing with Russians, that they would try to compromise those sources and methods , meaning we would not longer have access to that intelligence. - Evelyn Farkas

... ... ...

Brennan and Russian disinformation

Hersh also told Butowsky that the DNC made up the Russian hacking story as a disinformation campaign -- directly pointing a finger at former CIA director (and now MSNBC/NBC contributor ) John Brennan as the architect.

I have a narrative of how that whole f*cking thing began. It's a Brennan operation, it was an American disinformation , and the fu*kin' President, at one point, they even started telling the press -- they were backfeeding the Press, the head of the NSA was going and telling the press, fu*king c*cksucker Rogers, was telling the press that we even know who in the Russian military intelligence service leaked it.

Listen to Seymour Hersh leaked audio: https://www.youtube.com/embed/giuZdBAXVh0 (full transcription here and extended audio of the Hersh conversation here )

Hersh denied that he told Butowsky anything before the leaked audio emerged , telling NPR " I hear gossip [Butowsky] took two and two and made 45 out of it. "

Technical Evidence

As we mentioned last week, Dotcom's assertion is backed up by an analysis done last year by a researcher who goes by the name Forensicator , who determined that the DNC files were copied at 22.6 MB/s - a speed virtually impossible to achieve from halfway around the world, much less over a local network - yet a speed typical of file transfers to a memory stick.

The big hint

Last but not least, let's not forget that Julian Assange heavily implied Seth Rich was a source:

Given that a) the Russian hacking narrative hinges on Crowdstrikes's questionable reporting , and b) a mountain of evidence pointing to Seth Rich as the source of the leaked emails - it stands to reason that Congressional investigators and Special Counsel Robert Mueller should at minimum explore these leads.

As retired U.S. Navy admiral James A. Lyons, Jr. asks: why aren't they?

Liberal -> Stan522 Fri, 03/02/2018 - 21:26 Permalink

Relax you conspiracy theory-loving extremists. Our 336 spy agencies are just busy trying to solve the Michael Hasting's murder first. But it's just really hard to find the culprits because they're all hiding in Siberia.

[Mar 08, 2018] Given the CrowdStrike itself is a massively compromised organization due to its founder and CEO, those "certified true images" are themselves tainted evidence

Highly recommended!
Notable quotes:
"... To be precise, CrowdStrike did provide the FBI with allegedly "certified true images" of the DNC servers allegedly involved in the alleged "hack." They also allegedly provided these images to FireEye and Mandiant, IIRC ..."
"... Of course, given the CrowdStrike itself is a massively compromised organization due to its founder and CEO, those "certified true images" are themselves tainted evidence. ..."
"... In addition, regardless of whether the images were true or not, the evidence allegedly contained therein is painfully inadequate to confirm that APT28 or APT29 were involved, nor that the Russian government was involved, or even that there was a real hack involved, and even less evidence that any emails that might have been exfiltrated were given to Wikileaks as opposed to another leak such as that alleged by Sy Hersh to have been done by Seth Rich. ..."
Mar 08, 2018 | turcopolier.typepad.com

Richardstevenhack , 07 March 2018 at 06:23 PM

Re this: " In the case of Russian meddling there is no forensic evidence available to the IC because the Democratic National Committee did not permit the FBI to investigate and examine the computers and the network that was allegedly attacked."

To be precise, CrowdStrike did provide the FBI with allegedly "certified true images" of the DNC servers allegedly involved in the alleged "hack." They also allegedly provided these images to FireEye and Mandiant, IIRC .

All three allegedly examined those images and concurred with CrowdStrike's analysis.

Of course, given the CrowdStrike itself is a massively compromised organization due to its founder and CEO, those "certified true images" are themselves tainted evidence.

In addition, regardless of whether the images were true or not, the evidence allegedly contained therein is painfully inadequate to confirm that APT28 or APT29 were involved, nor that the Russian government was involved, or even that there was a real hack involved, and even less evidence that any emails that might have been exfiltrated were given to Wikileaks as opposed to another leak such as that alleged by Sy Hersh to have been done by Seth Rich.

The "assessment" that Putin ordered any of this is pure mind-reading and can be utterly dismissed absent any of the other evidence Publius points out as necessary.

The same applies to any "estimate" that the Russian government preferred Trump or wished to denigrate Clinton. Based on what I read in pro-Russian news outlets, Russian officials took great pains to not pick sides and Putin's comments were similarly very restrained. The main quote from Putin about Trump that emerged was mistranslated as approval whereas it was more an observation of Trump's personality. At no time did Putin ever say he favored Trump over Clinton, even though that was a likely probability given Clinton's "Hitler" comparison.

As an aside, I also recommend Scott Ritter's trashing of the ICA. Ritter is familiar with intelligence estimates and their reliability based on his previous service as a UN weapons inspector in Iraq and in Russia implementing arms control treaties.

Exposing The Man Behind The Curtain
https://www.huffingtonpost.com/entry/exposing-the-man-behind-the-curtain_us_5877887be4b05b7a465df6a4

Throwing a Curveball at 'Intelligence Community Consensus' on Russia
http://www.theamericanconservative.com/articles/did-17-intelligence-agencies-really-come-to-consensus-on-russia/

His analysis of the NSA document leaked by NSA contractor Reality Winner which supposedly supported the Russia theory is also relevant.

Leaked NSA Report Is Short on Facts, Proves Little in 'Russiagate' Case
https://www.truthdig.com/articles/leaked-nsa-report-is-short-on-facts-proves-little-in-russiagate-case/

[Feb 27, 2018] I still say Crowdstrike so called analysis is where the rubber really starts to hit the road with Wikileaks disclosure, saying it was the Russians

Feb 27, 2018 | www.youtube.com

Shell Shell, 2 days ago

So, the Democrats want to show that the FBI spying was due to Page and not the dossier because it came "first" so to speak?

This still doesn't excuse them using the dossier in FISA warrant without disclosing information about how it was obtained and it doesn't take away from the fact that he helped them nail Russians before.

How do they keep their reputation in tact by being "two faced", it appears to me to make their reputation worse so I really don't get the Democrats strategy on this, I suppose as it doesn't change what they have done.

I still say Crowdstrike so called "analysis" is where the rubber really starts to hit the road with Wikileaks disclosure, saying it was the "Russians".

[Feb 21, 2018] Thus, Putin-basher Clinton hired Putin-basher Alperovitch to investigate an alleged electronic heist, and to absolutely no one's surprise, his company concluded that guilty party was Vladimir Putin. Amazing!

Feb 21, 2018 | www.moonofalabama.org

Partisan | Feb 20, 2018 5:06:58 PM | 11

The whole piece is just hilarious and I laughed out loud all time while reading it.

https://consortiumnews.com/2018/02/16/nyts-really-weird-russiagate-story/

Since the FBI never inspected the DNC's computers first-hand, the only evidence comes from an Irvine, California, cyber-security firm known as CrowdStrike whose chief technical officer, Dmitri Alperovitch, a well-known Putin-phobe, is a fellow at the Atlantic Council, a Washington think tank that is also vehemently anti-Russian as well as a close Hillary Clinton ally.

Thus, Putin-basher Clinton hired Putin-basher Alperovitch to investigate an alleged electronic heist, and to absolutely no one's surprise, his company concluded that guilty party was Vladimir Putin. Amazing! Since then, a small army of internet critics has chipped away at CrowdStrike for praising the hackers as among the best in the business yet declaring in the same breath that they gave themselves away by uploading a document in the name of "Felix Edmundovich," i.e. Felix E. Dzerzhinsky, founder of the Soviet secret police.

As noted cyber-security expert Jeffrey Carr observed with regard to Russia's two main intelligence agencies: "Raise your hand if you think that a GRU or FSB officer would add Iron Felix's name to the metadata of a stolen document before he released it to the world while pretending to be a Romanian hacker. Someone clearly had a wicked sense of humor."

[Feb 20, 2018] Thus, Putin-basher Clinton hired Putin-basher Alperovitch to investigate an alleged electronic heist, and to absolutely no one's surprise, his company concluded that guilty party was Vladimir Putin. Amazing!

Feb 20, 2018 | www.moonofalabama.org

Partisan | Feb 20, 2018 5:06:58 PM | 11

The whole piece is just hilarious and I laughed out loud all time while reading it.

https://consortiumnews.com/2018/02/16/nyts-really-weird-russiagate-story/

Since the FBI never inspected the DNC's computers first-hand, the only evidence comes from an Irvine, California, cyber-security firm known as CrowdStrike whose chief technical officer, Dmitri Alperovitch, a well-known Putin-phobe, is a fellow at the Atlantic Council, a Washington think tank that is also vehemently anti-Russian as well as a close Hillary Clinton ally.

Thus, Putin-basher Clinton hired Putin-basher Alperovitch to investigate an alleged electronic heist, and to absolutely no one's surprise, his company concluded that guilty party was Vladimir Putin. Amazing! Since then, a small army of internet critics has chipped away at CrowdStrike for praising the hackers as among the best in the business yet declaring in the same breath that they gave themselves away by uploading a document in the name of "Felix Edmundovich," i.e. Felix E. Dzerzhinsky, founder of the Soviet secret police.

As noted cyber-security expert Jeffrey Carr observed with regard to Russia's two main intelligence agencies: "Raise your hand if you think that a GRU or FSB officer would add Iron Felix's name to the metadata of a stolen document before he released it to the world while pretending to be a Romanian hacker. Someone clearly had a wicked sense of humor."

[Feb 19, 2018] Kim Dotcom Let Me Assure You, The DNC Hack Wasn t Even A Hack Zero Hedge

Notable quotes:
"... All fucking Kabuki. All of it. ..."
"... The Deep State (Oligarchs and the MIC) is totally fucking loving this: they have Trump and the GOP giving them everything they ever wanted and they have the optics and distraction of an "embattled" president that claims to be against or a victim of the "deep state" and a base that rally's, circles the wagons around him, and falls for the narrative. ..."
"... They know exactly who it was with the memory stick, there is always video of one form or another either in the data center or near the premises that can indicate who it was. They either have a video of Seth Rich putting the stick into the server directly, or they at least have a video of his car entering and leaving the vicinity of the ex-filtration. ..."
"... This would have been an open and shut case if shillary was not involved. Since it was involved, you can all chalk it up to the Clinton body count. I pray that it gets justice. It and the country, the world - needs justice. ..."
Feb 19, 2018 | www.zerohedge.com

Kim Dotcom: "Let Me Assure You, The DNC Hack Wasn't Even A Hack"

by Tyler Durden Mon, 02/19/2018 - 07:51 3.4K SHARES

Kim Dotcom has once again chimed in on the DNC hack, following a Sunday morning tweet from President Trump clarifying his previous comments on Russian meddling in the 2016 election.

In response, Dotcom tweeted " Let me assure you, the DNC hack wasn't even a hack. It was an insider with a memory stick. I know this because I know who did it and why," adding "Special Counsel Mueller is not interested in my evidence. My lawyers wrote to him twice. He never replied. 360 pounds! " alluding of course to Trump's "400 pound genius" comment.

Dotcom's assertion is backed up by an analysis done last year by a researcher who goes by the name Forensicator , who determined that the DNC files were copied at 22.6 MB/s - a speed virtually impossible to achieve from halfway around the world, much less over a local network - yet a speed typical of file transfers to a memory stick.

The local transfer theory of course blows the Russian hacking narrative out of the water, lending credibility to the theory that the DNC "hack" was in fact an inside job, potentially implicating late DNC IT staffer, Seth Rich.

John Podesta's email was allegely successfully "hacked" (he fell victim to a phishing scam ) in March 2016, while the DNC reported suspicious activity (the suspected Seth Rich file transfer) in late April, 2016 according to the Washington Post.

On May 18, 2017, Dotcom proposed that if Congress includes the Seth Rich investigation in their Russia probe, he would provide written testimony with evidence that Seth Rich was WikiLeaks' source.

On May 19 2017 Dotcom tweeted "I knew Seth Rich. I was involved"

Three days later, Dotcom again released a guarded statement saying "I KNOW THAT SETH RICH WAS INVOLVED IN THE DNC LEAK," adding:

"I have consulted with my lawyers. I accept that my full statement should be provided to the authorities and I am prepared to do that so that there can be a full investigation. My lawyers will speak with the authorities regarding the proper process.

If my evidence is required to be given in the United States I would be prepared to do so if appropriate arrangements are made. I would need a guarantee from Special Counsel Mueller, on behalf of the United States, of safe passage from New Zealand to the United States and back. In the coming days we will be communicating with the appropriate authorities to make the necessary arrangements. In the meantime, I will make no further comment."

Dotcom knew.

While one could simply write off Dotcom's claims as an attention seeking stunt, he made several comments and a series of tweets hinting at the upcoming email releases prior to both the WikiLeaks dumps as well as the publication of the hacked DNC emails to a website known as "DCLeaks."

In a May 14, 2015 Bloomberg article entitled "Kim Dotcom: Julian Assange Will Be Hillary Clinton's Worst Nightmare In 2016 ": "I have to say it's probably more Julian," who threatens Hillary, Dotcom said. " But I'm aware of some of the things that are going to be roadblocks for her ."

Two days later, Dotcom tweeted this:

Around two months later, Kim asks a provocative question

Two weeks after that, Dotcom then tweeted "Mishandling classified info is a crime. When Hillary's emails eventually pop up on the internet who's going to jail?"

It should thus be fairly obvious to anyone that Dotcom was somehow involved, and therefore any evidence he claims to have, should be taken seriously as part of Mueller's investigation. Instead, as Dotcom tweeted, "Special Counsel Mueller is not interested in my evidence. My lawyers wrote to him twice. He never replied. "

chunga Sun, 02/18/2018 - 21:59 Permalink

Pffft...this guy sounds like the reds with their "blockbuster" memo. Honest Hill'rey is laughing!

SethPoor -> chunga Sun, 02/18/2018 - 22:00 Permalink

https://www.youtube.com/watch?v=5_8VaMbPjUU

Bes -> J S Bach Sun, 02/18/2018 - 22:17 Permalink

All fucking Kabuki. All of it.

The Deep State (Oligarchs and the MIC) is totally fucking loving this: they have Trump and the GOP giving them everything they ever wanted and they have the optics and distraction of an "embattled" president that claims to be against or a victim of the "deep state" and a base that rally's, circles the wagons around him, and falls for the narrative.

Meanwhile they keep enacting the most Pro Deep State/MIC/Police State/Zionist/Wall Street agenda possible. And they call it #winning

----

pathetic.

bigkahuna -> CheapBastard Mon, 02/19/2018 - 09:58 Permalink

"Had to be a Russian mole with a computer stick. MSM, DNC and Muller say so."

They know exactly who it was with the memory stick, there is always video of one form or another either in the data center or near the premises that can indicate who it was. They either have a video of Seth Rich putting the stick into the server directly, or they at least have a video of his car entering and leaving the vicinity of the ex-filtration.

This would have been an open and shut case if shillary was not involved. Since it was involved, you can all chalk it up to the Clinton body count. I pray that it gets justice. It and the country, the world - needs justice.

StarGate -> CheapBastard Mon, 02/19/2018 - 11:23 Permalink

Don't forget the "hack" analysis of Russian owned "Crowdstrike" since the FBI did and continues to, refuse to analyze the DNC computers.

KuriousKat -> CheapBastard Mon, 02/19/2018 - 13:26 Permalink

Isn't Alperovitch the Only Russian in there?.. When you rule out the impossible...whatever remains probable.. probably is..

wildbad -> IntercoursetheEU Mon, 02/19/2018 - 03:05 Permalink

Kim is great, Assange is great. Kim is playing a double game. He wants immunity from the US GUmmint overreach that destroyed his company and made him a prisoner in NZ.

Good on ya Kim.

His name was Seth Rich...and he will reach out from the grave and bury Killary who murdered him.

NumberNone -> wildbad Mon, 02/19/2018 - 10:04 Permalink

There are so many nuances to this and all are getting mentioned but the one that also stands out is that in an age of demands for gun control by the Dems, Seth Rich is never, ever mentioned. He should be the poster child for gun control. Young man, draped in a American flag, helping democracy, gunned down...it writes itself.

They either are afraid of the possible racial issues should it turn out to be a black man killing a white man (but why should that matter in a gun control debate?) or they just don't want people looking at this case. I go for #2.

Socratic Dog -> Buckaroo Banzai Mon, 02/19/2018 - 12:09 Permalink

Funny that George Webb can figure it out, but Trump, Leader of the Free World, is sitting there with his dick in his hand waiting for someone to save him.

Whatever he might turn out to be, this much is clear: Trump is a spineless weakling. He might be able to fuck starlets, but he hasn't got the balls to defend either himself or the Republic.

verumcuibono -> Buckaroo Banzai Mon, 02/19/2018 - 14:26 Permalink

Webb's research is also...managed. But a lot of it was/is really good (don't follow it anymore) and I agree re: SR piece of it.

I think SR is such an interesting case. It's not really an anomaly because SO many Bush-CFR-related hits end the same way and his had typical signatures. But his also squeels of a job done w/out much prior planning because I think SR surprised everyone. If, in fact, that was when he was killed. Everything regarding the family's demeanor suggests no.

verumcuibono -> NumberNone Mon, 02/19/2018 - 12:41 Permalink

MANY patterns in shootings: failure in law enforcement/intelligence who were notified of problem individuals ahead of time, ARs, mental health and SSRIs, and ongoing resistance to gun control in DC ----these are NOT coincidences. Nor are distractions in MSM's version of events w/ controlled propaganda.

Children will stop being killed when America wakes the fuck up and starts asking the right questions, making the right demands. It's time.

KJWqonfo7 -> wildbad Mon, 02/19/2018 - 11:15 Permalink

Kim is awesome to watch, I remember his old website of pics of him on yachts with hot girls and racing the Gumball Rally.

verumcuibono -> wildbad Mon, 02/19/2018 - 14:28 Permalink

I don't think you know how these hackers have nearly ALL been intercepted by CIA--for decades now. DS has had backdoor access to just about all of them. I agree that Kim is great, brilliant and was sabotaged but he's also cooperating. Otherwise he'd be dead.

StarGate -> Billy the Poet Mon, 02/19/2018 - 11:48 Permalink

Bes is either "disinfo plant" or energy draining pessimist. Result is the same - to deflate your power to create a new future.

Trump saw the goal of the Fed Reserve banksters decades ago and spoke often about it. Like Prez Kennedy he wants to return USA economy to silver or gold backed dollar then transition to new system away from the Black Magic fed reserve/ tax natl debt machine.

The Globalist Cabal has been working to destroy the US economy ever since they income tax April 15th Lincoln at the Ford theater. 125 years. But Bes claims because Trump cannot reverse 125 years of history in one year that it is kabuki.

Pessimism is its own reward.

[Feb 08, 2018] Was DNC hack a CIA Cyber False Flag

In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and détente between the United States and Russia.
Notable quotes:
"... It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies. ..."
"... the technological aspect regarding espionage is a specialty in which the CIA, as far as we know, excels. Hardware and software vendors that are complicit -- most of which are American, British or Israeli -- give the CIA the opportunity to achieve informational full-spectrum dominance, relegating privacy to extinction. ..."
"... The Washington Post ..."
"... The perverse interplay between media, spy agencies and politicians has compromised the very meaning of the much vaunted democracy of the land of the Stars and Stripes. The constant scandals that are beamed onto our screens now serve the sole purpose of advancing the deep interest of the Washington establishment. In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and détente between the United States and Russia. ..."
"... In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations based on the fact that Moscow, together with RT ..."
Feb 08, 2018 | wearechange.org

Article via Strategic-Culture

New revelations from Wikileaks' 'Vault 7' leak shed a disturbing light on the safeguarding of privacy. Something already known and largely suspected has now become documented by Wikileaks. It seems evident that the CIA is now a state within a state, an entity out of control that has even arrived at the point of creating its own hacking network in order to avoid the scrutiny of the NSA and other agencies.

Reading the revelations contained in the documents released by WikiLeaks and adding them to those already presented in recent years by Snowden, it now seems evident that the technological aspect regarding espionage is a specialty in which the CIA, as far as we know, excels. Hardware and software vendors that are complicit -- most of which are American, British or Israeli -- give the CIA the opportunity to achieve informational full-spectrum dominance, relegating privacy to extinction.

Such a convergence of power, money and technology entails major conflicts of interest, as can be seen in the case of Amazon AWS (Amazon's Cloud Service), cloud provider for the CIA , whose owner, Jeff Bezos, is also the owner of The Washington Post .

It is a clear overlap of private interests that conflicts with the theoretical need to declare uncomfortable truths without the need to consider orders numbering in the millions of dollars from clients like the CIA.

While it is just one example, there are thousands more out there. The perverse interplay between media, spy agencies and politicians has compromised the very meaning of the much vaunted democracy of the land of the Stars and Stripes. The constant scandals that are beamed onto our screens now serve the sole purpose of advancing the deep interest of the Washington establishment. In geopolitical terms, it is now more than obvious that the deep state has committed all available means toward sabotaging any dialogue and détente between the United States and Russia.

In terms of news, the Wikileaks revelations shed light on the methods used by US intelligence agencies like the CIA to place blame on the Kremlin, or networks associated with it, for the hacking that occurred during the American elections.

Perhaps this is too generous a depiction of matters, given that the general public has yet to see any evidence of the hacking of the DNC servers. In addition to this, we know that the origin of Podesta's email revelations stem from the loss of a smartphone and the low data-security measures employed by the chairman of Hillary Clinton's presidential campaign.

In general, when the 16 US spy agencies blamed Russia for the hacking of the elections, they were never specific in terms of forensic evidence. Simply put, the media, spies and politicians created false accusations based on the fact that Moscow, together with RT and other media (not directly linked to the Kremlin), finally enjoy a major presence in the mainstream media.

The biggest problem for the Washington establishment lies in the revelation of news that is counterproductive to the interests of the deep state. RT, Sputnik, this site and many others have diligently covered and reported to the general public every development concerning the Podesta revelations or the hacking of the DNC.

[Feb 08, 2018] CIA Dirty Cyber Tricks by Matthew Vadum

Notable quotes:
"... The Central Intelligence Agency now can mimic foreign intelligence agencies' hack attacks by leaving electronic "fingerprints" creating the false impression of a foreign intrusion into computer networks, according to claims accompanying a new WikiLeaks document dump. ..."
"... In other words, there may not be hard evidence that CIA operatives, say, used cyberspace to create a modern-day Reichstag fire to undermine the Trump administration, but it may be the case that the CIA has the technological capabilities to do such a thing, if it were so inclined. ..."
"... The Vault 7 collection is said to have come from a former U.S. government hacker or contractor associated with "an isolated, high-security network" within the CIA's Center for Cyber Intelligence in Langley, Va. The files made public don't include the actual cyber weapons themselves which WikiLeaks says it will not release for the time being. ..."
"... The idea behind Year Zero is that all culture and traditions within a society must be completely destroyed or discarded and a new revolutionary culture must replace it, starting from scratch. All history of a nation or people before Year Zero is deemed largely irrelevant, as it will ideally be purged and replaced from the ground up. In Cambodia, so-called New People -- teachers, artists, and intellectuals -- were especially singled out and executed during the purges accompanying Year Zero. ..."
"... According to WikiLeaks, "[t]he CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation." ..."
"... With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques. ..."
"... If this new information about "Umbrage" is accurate, this means that, as stated above, the CIA could hack people and institutions and then attribute the cyber-attacks to others in what amount to false-flag operations. For example, in order to create the impression that a foreign power favored one political candidate over another, the CIA or unseen rogue elements with access to "Umbrage," could have hacked into Hillary Clinton's campaign and the Democratic National Committee and made it appear that the intrusion was carried out by former KGB lieutenant colonel Vladimir Putin's operatives. ..."
"... given what we've learned about the CIA's anti-Trump shenanigans in recent months, it seems unwise to reflexively rule out the possibility that that's how things could have gone down. Espionage, after all, is all about deception and covering tracks. Things aren't what they seem and the motives of those creating an illusion aren't easily discerned. ..."
"... On the other hand, combine "Umbrage" with the seemingly invincible false narrative that President Donald Trump is a tool of Russian interests, and plenty of Americans would be willing to believe Trump really does have substantial ties to the Kremlin, something that has not been proven. Even now there is still no publicly available evidence the Trump campaign somehow colluded with the Russian government last year. Sources in newspaper articles are never identified. All that exists is the alleged ..."
Mar 08, 2017 | www.frontpagemag.com

Troubling questions about "Umbrage" and potential false-flag attacks. 53

The Central Intelligence Agency now can mimic foreign intelligence agencies' hack attacks by leaving electronic "fingerprints" creating the false impression of a foreign intrusion into computer networks, according to claims accompanying a new WikiLeaks document dump.

In other words, there may not be hard evidence that CIA operatives, say, used cyberspace to create a modern-day Reichstag fire to undermine the Trump administration, but it may be the case that the CIA has the technological capabilities to do such a thing, if it were so inclined.

This assertion that the CIA can hack computer networks and leave behind convincing evidence that somebody else did it, comes with the release by WikiLeaks of a huge collection of documents – 8,761 items in all – collectively dubbed the "Vault 7" leaks that purport to describe espionage techniques used by the CIA. The Vault 7 collection is said to have come from a former U.S. government hacker or contractor associated with "an isolated, high-security network" within the CIA's Center for Cyber Intelligence in Langley, Va. The files made public don't include the actual cyber weapons themselves which WikiLeaks says it will not release for the time being.

This documentary agglomeration covers "the entire hacking capacity of the CIA," Julian Assange's WikiLeaks claimed in a press release, and it is only the first in a series of what he calls the "Year Zero" leaks.

The Year Zero label has a decidedly sinister quality to it and may offer clues into what WikiLeaks hopes to accomplish with these new leaks, apparently the most significant and damaging to the U.S. intelligence community since former NSA contractor Edward Snowden handed over thousands of classified U.S. documents to journalists in 2013.

Year Zero was used by the bloodthirsty Khmer Rouge when it seized power in Cambodia in 1975. The term is analogous to Year One of the French Revolutionary calendar, which implied a violent break with the old system and the merciless leveling of existing institutions.

As one online resource states:

The idea behind Year Zero is that all culture and traditions within a society must be completely destroyed or discarded and a new revolutionary culture must replace it, starting from scratch. All history of a nation or people before Year Zero is deemed largely irrelevant, as it will ideally be purged and replaced from the ground up. In Cambodia, so-called New People -- teachers, artists, and intellectuals -- were especially singled out and executed during the purges accompanying Year Zero.

According to WikiLeaks, "[t]he CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation."

With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from. UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.

If this new information about "Umbrage" is accurate, this means that, as stated above, the CIA could hack people and institutions and then attribute the cyber-attacks to others in what amount to false-flag operations. For example, in order to create the impression that a foreign power favored one political candidate over another, the CIA or unseen rogue elements with access to "Umbrage," could have hacked into Hillary Clinton's campaign and the Democratic National Committee and made it appear that the intrusion was carried out by former KGB lieutenant colonel Vladimir Putin's operatives.

That Russians hacked Clinton and the DNC and gave Trump an unfair advantage in the election is precisely what Democrats allege. Is such a scenario in which U.S. operatives hack one political party to help another at least a little far-fetched?

You bet it is. But given what we've learned about the CIA's anti-Trump shenanigans in recent months, it seems unwise to reflexively rule out the possibility that that's how things could have gone down. Espionage, after all, is all about deception and covering tracks. Things aren't what they seem and the motives of those creating an illusion aren't easily discerned.

On the positive side, "Umbrage," if it is a real thing, is a powerful innovation in tradecraft and an indication that American cyberwarfare is soaring to dizzying new heights.

On the other hand, combine "Umbrage" with the seemingly invincible false narrative that President Donald Trump is a tool of Russian interests, and plenty of Americans would be willing to believe Trump really does have substantial ties to the Kremlin, something that has not been proven. Even now there is still no publicly available evidence the Trump campaign somehow colluded with the Russian government last year. Sources in newspaper articles are never identified. All that exists is the alleged say-so of faceless CIA spooks and people like former CIA employee and would-be presidential spoiler Evan McMullin whose motives are questionable.

It is hard to know what to believe.

And it opens the door to head-spinning possibilities and far-out theories.

As investigative journalist Jerome Corsi writes of Vault 7 and "Umbrage":

This revelation yields a "through the looking glass" possibility that the Obama administration obtained [Foreign Intelligence Surveillance Act] permission to conduct electronic surveillance on Russians believed to be coordinating with the Trump campaign based on intelligence the CIA planted to deceive the NSA into thinking there was actual contact between Russian agents and the Trump campaign.

Possibly, what the CIA was monitoring was not actual contacts between Russian agents and the Trump campaign, but CIA-created counter-espionage designed to implicate Trump and provide the legal context for the [Department of Justice] to have enough "evidence" to obtain a FISA green-light.

This kind of double-level thinking is enough to give anyone a throbbing headache.

Vault 7 also includes eye-opening developments worthy of James Bond 007 and Q Branch.

According to WikiLeaks, the CIA recently "lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized 'zero day' exploits, malware remote control systems and associated documentation." These cyber weapons can be used "against a wide range of U.S. and European company products, [including] Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones."

Something called "Weeping Angel" was created by the CIA's Embedded Devices Branch to infest smart televisions.

"After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server."

Another technique allows the CIA "to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the 'smart' phones that they run on and collecting audio and message traffic before encryption is applied."

"As of October 2014," WikiLeaks claims, "the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations."

Despite all this intrigue, it needs to be said that the CIA does some valuable work to advance U.S. interests in the world. It's a shame that it has come to be dominated by left-wingers over the years.

There is, though, a certain logic to the agency's slide to port. Not all self-styled do-gooders, after all, land jobs in the nonprofit sector. A leftist member of the intelligence community is fundamentally the same as a community organizer who is convinced he knows what is best for his fellow man.

And left-wingers in all occupations are willing to do whatever it takes to accomplish their objectives.

In the summer 2001 issue of Social Policy magazine, Association of Community Organizations for Reform Now (ACORN) founder Wade Rathke urged his comrades to get in on the ground floor of the cyber-warfare revolution:

Crazy, computer viruses are started by young kids around the world or hackers bored out of their skulls that live right down the street. As union organizers we are still doing 8 point difficulty dumpster dives for alpha lists of employees, when theoretically some good geeks could tap in, load up, and download the whole thing and throw it over our transom window. What a waste of talent when such a huge contribution could be made to the labor movement.

Maybe Rathke missed his calling.

Matthew Vadum, senior vice president at the investigative think tank Capital Research Center, is an award-winning investigative reporter and author of the book, " Subversion Inc.: How Obama's ACORN Red Shirts Are Still Terrorizing and Ripping Off American Taxpayers ."

[Feb 04, 2018] DNC collusion with Ukrainian IT Security company Crowdstrike tied to the Atlantic Council to push false narrative of DNC hack and malware to influence US election

Highly recommended!
Notable quotes:
"... An investigation of the State Dept should bring the focus around to issues of substance. ..."
"... DNC collusion with Ukrainian IT "Security" company Crowdstrike tied to the Atlantic Council to push false narrative of DNC hack and malware to influence US election ..."
"... DNC consultant Andrea Chalupa, unregistered foreign agent whose entire family is tied to Ukrainian Intelligence ..."
"... Further research revealed that Andrea Chalupa and her two siblings are actively involved with other sources of digital terrorism, disinformation and spamming, like TrolleyBust com, stopfake org, and informnapalm. ..."
"... Ms. Chalupa kept cooperating with the Khodorovky owned magazine "The Interpreter." Now, it's a part of RFE/RL run by the government funded Broadcasting Board of Governors (BBG) whose director, Dr. Leon Aron also a director of Russian Studies at the American Enterprise Institute ..."
Feb 04, 2018 | www.zerohedge.com

mc888 -> nmewn Feb 3, 2018 12:00 PM Permalink

Sessions is not recused from a Ukraine investigation. An investigation of the State Dept should bring the focus around to issues of substance.

Further research revealed that Andrea Chalupa and her two siblings are actively involved with other sources of digital terrorism, disinformation and spamming, like TrolleyBust com, stopfake org, and informnapalm.

Ms. Chalupa kept cooperating with the Khodorovky owned magazine "The Interpreter." Now, it's a part of RFE/RL run by the government funded Broadcasting Board of Governors (BBG) whose director, Dr. Leon Aron also a director of Russian Studies at the American Enterprise Institute.

http://thesaker.is/guess-whats-neither-meat-nor-fish-but-ms-chalupa-and

[Jan 22, 2018] Joe diGenova Brazen Plot to Frame Trump

Highly recommended!
Brilliant summary of the situation. You should listen this interview. False Russiagate was from the beginning a plot to derail and then depose Trump. They created false facts.
Brazen port to exonerate Hillary Clinton and then derail Trump
Notable quotes:
"... It is rare to see a man of integrity and a lawyer who speaks in plain English and speaks about facts and conclusions of law. The problem we face today is far too many lawyers with no integrity in positions of government that protect blatant criminals holding public office who are also lawyers. Lawyers always protect other lawyers, except this wonderful man! ..."
Jan 22, 2018 | www.youtube.com

Rick W , 1 day ago

It is rare to see a man of integrity and a lawyer who speaks in plain English and speaks about facts and conclusions of law. The problem we face today is far too many lawyers with no integrity in positions of government that protect blatant criminals holding public office who are also lawyers. Lawyers always protect other lawyers, except this wonderful man!

Charles H , 1 day ago

Breathtaking information. Thanks so much for airing.

Walter 1408 , 1 day ago

All those Clinton Foundation millions bought a lot of FBI agents. They need a major house cleaning.

Caleb Engineering, LLC , 1 day ago

The punishments should be harsh to deter future attempts to do the same to future presidents.

Patricia Herman , 1 day ago

Love Joe to bad he can't become the new AG and why isn't this interview on the news at least Fox, Hannity, Tucker, Laura. And we know CNN, MSNBC, and the rest are all in the bag for Obummer and Killary. 😎

Teddy Dunford , 1 day ago

Remember HRC said if he (( Trump )) wins we are all going to HANG and I hope this is one time the Satan worshiping witch told the truth .

The last iconoclast , 1 day ago

Three heroes will go down in history: Journalist Julian Asange Adm. Mike Rogers Rep. Devin Nunes

Elisabeth Vancamp , 1 day ago

I am speechless. Best cohesive explanation! Man reaps what he sows.

James Stamulis , 1 day ago

All because Trump is MAGA and that was not the cabals game plan.

eh10000 , 1 day ago

RELEASE THE MEMO

Peter Sprague , 1 day ago

NY Times Buzzfeed Washington Post CNN ABC CBS NBC are all complicit in perpetrating these lies Just watch Colbert Jimmy Farrel or Jimmy Kimmel These bad actors pretending to be entertainers need to hang

Wide Awake , 1 day ago

Never forget what Hilary said: If Trump wins, we'll all hang. And so they should.

Pat Defeo , 15 hours ago

Joe D should have been our AG he is tough and has the ability to explain WTH is going on in plain english

Robin Ricks , 1 day ago

Mueller carried the sample of Uranium to the Russians. Mueller was paid off, as was Comey. So glad President Trump can confiscate all their money. Now to catch Daddy Bush and Jr for having all those people in New York killed on 9/11! Go Trump!!

David Gray , 1 day ago

# Release The Memo.

FindLiberty , 1 day ago

OUTSTANDING RESCUE OF THE AMERICAN REPUBLIC - (...proceed to lock 'em all up)

Thomas Rocco , 1 day ago

Fantastic interview. Saw it's entirety

Jeffrey Robert-Dicken , 1 day ago

treason

Samuel Anderson , 1 day ago

There needs to be an arrest of ALL the top MSM owners and chairpeople of all the affiliates including those who stand in front of the camera pushing false information. Their license needs to be rescinded and taken away. Bankrupt the news affiliates and sell off their assets.

Jerk Joker , 1 day ago

This is a truly excellent and clear explanation of how our government was corrupted by Team Hillary. I reckon she needs to pay the Ultimate price: a thorough investigation into her crimes: A fair trial... and maybe execution, followed by her being reviled down the centuries as one of the most evil women in History. Every little girl should be told: Do not be like this woman!

John Brooks , 1 day ago

A hell storm is coming !!! People need to be tried and possibly executed to send a massage that ALL these swamp creatures will understand.

Jeffrey Robert-Dicken , 1 day ago

you have a jezabel clinton the most dangerous couple ever ...what happened to JFK junior ?

Giant Sequoia , 1 day ago

Excellent, excellent, excellent report Bill!!!

Rachael SOJ , 1 day ago

Thank you, Mr. Still, for reporting on this, it was a very informative video!💛

james goodwin , 1 day ago

Thank god she didn't win

FilthyMcDumpin'Clips , 1 day ago

Bill, don't forget to mention that those same entities also include those working for CNN and MSNBC who were funded by Clinton donations to push the false media on the country. Can you say lawsuits?

DrewTronics , 1 day ago

Holy wow, thanks for posting Bill!

Noel B , 1 day ago (edited)

What about Clapper and Brennan they started this before they were replaced. They also are to blame.

Granville Higgins , 1 day ago

Trump let them dig their own graves.

Suzie Smith , 1 day ago

Amazing piece! Pulls so many things together! Thank you!

snowbunny20328 , 1 day ago

What a very important review of what this country has endured!!! Thank you Joe!

Jeffrey Robert-Dicken , 1 day ago

can someone wake sessions up?

James Pope , 1 day ago

This is the guy who should be the Director of tbe FBI, or AG

Susan Bennett , 1 day ago

Hillary will NEVER be exonerated, or ANY of those treasonous swamp rat sycophants!!!

JUNITO84 , 1 day ago

Thank you very much admiral Rodgers! the american people love you and appreciate you stress/gutsy actions to do the right thing 🙂

Tom Smith , 1 day ago

The last thing Seth Rich saw before he was murdered was an FBI special agents badge.

AVALON DEJAVU , 1 day ago

THANKS for explaining this so clearly!!! #LockThemUp No JUSTICE No PEACE!

ak6781fan , 1 day ago

Mr. Still you are very astute and observant. Your statement that this is the darkest hour for our great country since the Civil War is spot-on.

Rich P , 1 day ago

Do you have any doubt these people are capable of genociding all who disagree with there Marxist agenda?

[Jan 22, 2018] Joe diGenova Brazen Plot to Frame Trump

You should listen this interview. As one commenter said "Three heroes will go down in history: Journalist Julian Asange, Adm. Mike Rogers, Rep. Devin Nunes"
False Russiagate was from the beginning a plot to derail and then depose Trump. They created false facts.
Jan 22, 2018 | www.youtube.com

Rick W , 1 day ago

It is rare to see a man of integrity and a lawyer who speaks in plain English and speaks about facts and conclusions of law. The problem we face today is far too many lawyers with no integrity in positions of government that protect blatant criminals holding public office who are also lawyers. Lawyers always protect other lawyers, except this wonderful man!

Charles H , 1 day ago

Breathtaking information. Thanks so much for airing.

Walter 1408 , 1 day ago

All those Clinton Foundation millions bought a lot of FBI agents. They need a major house cleaning.

Caleb Engineering, LLC , 1 day ago

The punishments should be harsh to deter future attempts to do the same to future presidents.

Patricia Herman , 1 day ago

Love Joe to bad he can't become the new AG and why isn't this interview on the news at least Fox, Hannity, Tucker, Laura. And we know CNN, MSNBC, and the rest are all in the bag for Obummer and Killary. 😎

Teddy Dunford , 1 day ago

Remember HRC said if he (( Trump )) wins we are all going to HANG and I hope this is one time the Satan worshiping witch told the truth .

The last iconoclast , 1 day ago

Three heroes will go down in history: Journalist Julian Asange Adm. Mike Rogers Rep. Devin Nunes

Elisabeth Vancamp , 1 day ago

I am speechless. Best cohesive explanation! Man reaps what he sows.

James Stamulis , 1 day ago

All because Trump is MAGA and that was not the cabals game plan.

eh10000 , 1 day ago

RELEASE THE MEMO

Peter Sprague , 1 day ago

NY Times Buzzfeed Washington Post CNN ABC CBS NBC are all complicit in perpetrating these lies Just watch Colbert Jimmy Farrel or Jimmy Kimmel These bad actors pretending to be entertainers need to hang

Wide Awake , 1 day ago

Never forget what Hilary said: If Trump wins, we'll all hang. And so they should.

Pat Defeo , 15 hours ago

Joe D should have been our AG he is tough and has the ability to explain WTH is going on in plain english

Robin Ricks , 1 day ago

Mueller carried the sample of Uranium to the Russians. Mueller was paid off, as was Comey. So glad President Trump can confiscate all their money. Now to catch Daddy Bush and Jr for having all those people in New York killed on 9/11! Go Trump!!

David Gray , 1 day ago

# Release The Memo.

FindLiberty , 1 day ago

OUTSTANDING RESCUE OF THE AMERICAN REPUBLIC - (...proceed to lock 'em all up)

Thomas Rocco , 1 day ago

Fantastic interview. Saw it's entirety

Jeffrey Robert-Dicken , 1 day ago

treason

Samuel Anderson , 1 day ago

There needs to be an arrest of ALL the top MSM owners and chairpeople of all the affiliates including those who stand in front of the camera pushing false information. Their license needs to be rescinded and taken away. Bankrupt the news affiliates and sell off their assets.

Jerk Joker , 1 day ago

This is a truly excellent and clear explanation of how our government was corrupted by Team Hillary. I reckon she needs to pay the Ultimate price: a thorough investigation into her crimes: A fair trial... and maybe execution, followed by her being reviled down the centuries as one of the most evil women in History. Every little girl should be told: Do not be like this woman!

John Brooks , 1 day ago

A hell storm is coming !!! People need to be tried and possibly executed to send a massage that ALL these swamp creatures will understand.

Jeffrey Robert-Dicken , 1 day ago

you have a jezabel clinton the most dangerous couple ever ...what happened to JFK junior ?

Giant Sequoia , 1 day ago

Excellent, excellent, excellent report Bill!!!

Rachael SOJ , 1 day ago

Thank you, Mr. Still, for reporting on this, it was a very informative video!💛

james goodwin , 1 day ago

Thank god she didn't win

FilthyMcDumpin'Clips , 1 day ago

Bill, don't forget to mention that those same entities also include those working for CNN and MSNBC who were funded by Clinton donations to push the false media on the country. Can you say lawsuits?

DrewTronics , 1 day ago

Holy wow, thanks for posting Bill!

Noel B , 1 day ago (edited)

What about Clapper and Brennan they started this before they were replaced. They also are to blame.

Granville Higgins , 1 day ago

Trump let them dig their own graves.

Suzie Smith , 1 day ago

Amazing piece! Pulls so many things together! Thank you!

snowbunny20328 , 1 day ago

What a very important review of what this country has endured!!! Thank you Joe!

Jeffrey Robert-Dicken , 1 day ago

can someone wake sessions up?

James Pope , 1 day ago

This is the guy who should be the Director of tbe FBI, or AG

Susan Bennett , 1 day ago

Hillary will NEVER be exonerated, or ANY of those treasonous swamp rat sycophants!!!

JUNITO84 , 1 day ago

Thank you very much admiral Rodgers! the american people love you and appreciate you stress/gutsy actions to do the right thing 🙂

Tom Smith , 1 day ago

The last thing Seth Rich saw before he was murdered was an FBI special agents badge.

AVALON DEJAVU , 1 day ago

THANKS for explaining this so clearly!!! #LockThemUp No JUSTICE No PEACE!

ak6781fan , 1 day ago

Mr. Still you are very astute and observant. Your statement that this is the darkest hour for our great country since the Civil War is spot-on.

Rich P , 1 day ago

Do you have any doubt these people are capable of genociding all who disagree with there Marxist agenda?

[Jan 02, 2018] Crowdstrike is responsible for Guccifer 2.0, at the behest of Hillary

Notable quotes:
"... I think Jack Rabbit's question hits the money in that they KNOW what happened. My question is how come the Clintons would have so much clout to control the story away from their shenanigans? It must leak over into significant parts of the Democratic Party itself. PS I may be wrong on this--Crowdstrike is responsible for Guccifer 2.0, at the behest of Hillary. ..."
Jan 02, 2018 | www.moonofalabama.org

Sid2 , Jan 1, 2018 8:19:39 PM | 31

@25 I don't mean to argue but would wonder on your second note in the chain, blaming Comey. Clinton was done far far before anything Comey could do at the last minute. In the summer. By then the emails had been released (however that release occurred) to show how she had twisted Sanders away from the nomination and had questions re The Clinton Foundation.

I think Jack Rabbit's question hits the money in that they KNOW what happened. My question is how come the Clintons would have so much clout to control the story away from their shenanigans? It must leak over into significant parts of the Democratic Party itself. PS I may be wrong on this--Crowdstrike is responsible for Guccifer 2.0, at the behest of Hillary.

Sid2 , Jan 1, 2018 8:34:37 PM | 33
@31 supplementary on Crowdstrike activity (intelligence service hired by Hillary Clinton after the leaks/hacks became public):

http://theduran.com/how-crowdstrike-placed-malware-in-the-dnc-server/

[Dec 29, 2017] Russian Hacker "Guccifer 2.0 Was Actually A DNC Tech Guy! We've Got The Names And The Proof!

Dec 29, 2017 | 50shadesofpissedoff.com

The alleged Russian computer Hacker named Guccifer 2.0 whom the Democrat National Committee has publicly blamed for hacking its emails and giving them to WIkiLeaks before the Election in order for Russia to help Donald Trump, was really a fiction created by an Obama White House Staffer in order to prevent the exposure of why DNC Staffer Seth Rich was murdered and also try to pin the exposure of DNC emails on Russia and Trump.

Democrat operatives had pushed the fictional Guccifer 2.0 story as the supposed Russian hacker who broke into DNC servers and downloaded thousands of emails, then sent them to the Russians, who then sent them to Wikileaks so Hilary Clinton could be defeated.

Never mind that it has now been proven beyond a shadow of a doubt that the download speed was far too great to have been done by anyone but a DNC insider like Seth Rich. Because Internet speeds are not nearly sufficient to support download speed that the meta data, embedded in the emails, reported.

Never mind that the same meta data shows that the download came from the eastern time zone of the US, not Romania or Russia.

A five minute video (below) proves Guccifer 2.0 was an invention of someone using a version of Microsoft Word that was originally registered to a DNC / White House Staffer named Warren Flood.

Here are two screen shots from warren floods Facebook page. Notice that warren worked for "Obama for America," the DNC, and the White House . He lives in LaGrange, GA.

The video below does a great job explaining who is behind the original Trump opposition research leaked via WikiLeaks AND the later (same) document allegedly obtained by Guccifer 2.0 by "hacking."

EVIDENCE OF DNC/WHITE HOUSE STAFFER BEING "RUSSIAN HACKER GUCCIFER 2.0″

If you have ever accidentally tried to open a Microsoft Word document in a simple text editor like Notepad, you can see the meta data behind each word document, including WHO that copy of Word belongs to.

The video below explains who the author of the original opposition research document was and how we know:

. . . it also includes who the AUTHOR of the document of is. It gets that information from the name that was entered when you installed your copy of Microsoft Office. Inside the original trump opposition research, the document later released by WikiLeaks, the author of the document is listed as Lauren Dillon , DNC Research Director.

This is Lauren Dillion from the DNC:

The metadata in the WikiLeaks release of Trump Opposition research shows that it was created by Lauren Dillon, as show below:

_______________

HOWEVER, that same document later released by Guccifer 2.0 shows a CHANGE in who authored Document; this later copy showing the Author as Warren Flood . . . . who worked in the White House!

Thus, the entire claim by Guccifer 2.0 that he was a Russian Hacker who stole the DNC emails, was a deliberate deception attributable to a staffer in the Obama White House: Warren Flood.

Here's the kicker, the version of Trump's opposition research file that was originally released by WikiLeaks, and later released to the Main-Stream-Media (MSM), was never attributed to the DNC, it was attributed to the Russian Hacker "Guccifer 2.0 -- A man jailed in Romania for hacking.

THE DNC/WHITE HOUSE "FATAL MISTAKE"

It just wouldn't do, to have the head of research for the DNC be the Leaker to WikiLeaks or to have the later Guccifer 2.0 release to come from a White House staffer, it had to be attributable to someone connected to the Russians. The Romanian guy was the FALL GUY.

The one fatal mistake the DNC and the Obama White House made was that no one remembered about the Microsoft Word metadata which reveals the owner of that particular copy of the Word software. So, according to the evidence, Guccifer 2.0 was actually DNC/White House Staffer, Warren Flood.

Yes, you read that correctly: EVIDENCE. Not speculation, or rumor, or innuendo. Actual real life, hard copy EVIDENCE.

Guccifer 2.0 was an invention of the DNC/White House to cover-up who the real leaker was; and at the same time start the Russian Hacking rumors that persist today.

INTERESTINGLY, the Wikipedia entry for Guccifer 2.0, describes an interview he did with MotherBoard via an online chat. Guccifer 2.0 insisted he was Romanian but, when pressed to use the Romanian language in an interview with an Interview with Motherboard via an online chat, he used such clunky grammar and terminology that experts believe he was using an online translator.

Bottom line: The Obama White House invention of Guccifer 2.0, apparently through its Staffer Warren Flood, accomplished three things:

1) It covered DNC research director Lauren Dillon. Whatever sort of opposition research she authored was later claimed by Guccifer 2.0.
2) It covered for Seth Rich. This is the BIG ONE, because he was killed in an obvious assassination staged to look like street robbery -- the only problem is, the robbers didn't take anything. He still had all his cash and his Rolex watch when police arrived. And Guccifer 2.0 took also credit for the Podesta emails which were actually downloaded by Seth Rich and given to WikiLeaks.

AND;

3) It created the conduit to "Russian Intelligence" to fortify the claim that it was the Russians who leaked the DNC emails to WikiLeaks, and therefore Trump "was in collusion with the Russians" to defeat Clinton.

The whole claim of "Russian Hacking" and "Trump colluding with Russians" has come unraveled because it was ALL a complete fraud.

What remains is how this fraud is STILL affecting our nation to this very day, and how the Congress of the United States, acting late last month upon this totally FALSE "Russian Hacking" claim, has now enacted further sanction upon Russia – sanctions that will very likely lead to war.

VIDEO EVIDENCE

Here is the video containing the EVIDENCE that the Wikileaks original Trump Opposition document was created by a user whose Microsoft Word software was registered to DNC Research Director Lauren Dillon, and the later exact same document, allegedly hacked by "GUccifer 2.0″ was done by DNC/White House Staffer William Flood

[Dec 28, 2017] Th>ere is one thing that is certain according to McAffee (the McAffee) If it looked like it was the Russians, then I can guarantee it WASN'T the Russians.

Notable quotes:
"... It's very interesting. But there is one thing that is certain according to McAffee (the McAffee) "If it looked like it was the Russians, then I can guarantee it WASN'T the Russians." ..."
"... Good comment and reading the last line, it has just reminded me of 'Vault 7' and what Wiki Leaks had to say. ..."
"... Vault 7 CIA Hacking Tools Revealed.docx... https://www.scribd.com/docu... ..."
Dec 28, 2017 | theduran.com

André De Koning , December 28, 2017 3:59 AM

Getting closer all the time, but Mueller's job will continue till the mid-term elections just to see if they can get away with their scheming. The tale within a tale: FBI investigates and discovers they themselves are also part of this tale. The story will have a tail: will it be a tragic, Shakespearean end or repentance by Hillary and Mueller (Duh...).

Trauma2000 -> André De Koning , December 28, 2017 4:28 AM

I love the forensics of all this. It's what gets me riveted to my computer screen.

For anyone who likes the forensics of this whole DNC Hack fiasco, you need to read this: https://50shadesofpissedoff...

It's about the date / time stamps on the files, and the HACKER (Guciffer 2.0) was acutely an Obama aid called: WARREN FLOOD. Warren Flood pretended to hack the DNC and made himself out to be Russian with an alias of Guciffer 2.0. That was the smoke screen the Democrats put out on top of the Crowdstrike false evidence job. It's excellent reading.

AM Hants -> Trauma2000 , December 28, 2017 6:53 AM

Thank you for the link and must admit it has made me laugh. A line I will use in the future. '50 Shades of Pissed Off' - no doubt I will use it as my Mantra for 2018.

André De Koning -> Trauma2000 , December 28, 2017 5:08 AM

Yes, that Guccifer 2.0 stuff and the clear evidence that it was not a hack was published before but you are now updating us by identifying the guy who did it, which should also change the process. Thanks for that!

Update: Just see what Libby and Trauma2000 mean: yes, that makes sense!

Trauma2000 -> André De Koning , December 28, 2017 5:23 AM

In actual fact, it was Seth Ritch who 'leaked' the material (if you believe that Huma Abdeen was the original leaker and used Seth as a 'go between' then that is up to you). When the DNC found out Seth was the leaker, the murdered him and had to 'think up a story' hence Guccifer 2.0. There are several DNC employees involved but Warren Flood is the 'fall guy' along with a girl (her name is out there) whom had her name on the software licenses that were used to doctor the emails.

It's very interesting. But there is one thing that is certain according to McAffee (the McAffee) "If it looked like it was the Russians, then I can guarantee it WASN'T the Russians."

AM Hants -> Trauma2000 , December 28, 2017 6:57 AM

Good comment and reading the last line, it has just reminded me of 'Vault 7' and what Wiki Leaks had to say.

Vault 7 CIA Hacking Tools Revealed.docx... https://www.scribd.com/docu...

Now why does CIA, Google, Crowd Strike, Clintons and Atlantic Council keep twerking around my grey cells?

André De Koning -> AM Hants , December 28, 2017 9:48 PM

For me it is because of the truth: there is not much point being on this or that "side", but when the truth is so twisted it becomes perversion and that should be uncovered.

libby -> André De Koning , December 28, 2017 5:11 AM

Flood wasn't involved directly.

see http://g-2.space

Trauma2000 -> libby , December 28, 2017 5:24 AM

Correct. He was just a 'foot soldier.' But he still left his name all over everything as a fall guy. Someone else used his computer.

EDIT: Actually, someone at the DNC used his computer. They were on the eastern seaboard of the U.$. according to the time stamp on the documents.

libby -> Trauma2000 , December 28, 2017 7:58 PM

Flood had already stopped working as Biden's IT director back in 2011, the only place he'd likely have had his name on a license under the company name GSA based on his work history - was there.

So, Guccifer 2.0's first docs were most likely constructed using a computer that had resided in the West Wing office on June 15, 2016 at the exact same time as Pyatt, Nuland and others (also connected to the Ukraine coup in 2014) were meeting there.

source: http://g-2.space
(the person behind it is the person who originally wrote this "Fancy Fraud, Bogus Bears..." article too)

RE: The Eastern timezone. - If referring to the NGP-VAN analysis, the timestamps themselves don't show timezones but the timezone can be evaluated due to how timestamps on files (that appear to be part of the same batch transfer on July 5, 2016) are displayed in the 7zip archive root versus those in various RAR files contained within (and the different methods of timestamp storage used by the different archive formats) and how this changes depending on what your computer's timezone is set to (the time changes in the 7zip but not in the RARs and the only timezone in which these have a close correlation is Eastern).

source: https://theforensicator.wor...

But I prefer your explanation as a TLDR version. :)

André De Koning -> libby , December 28, 2017 5:15 AM

Seth Rich was the one who leaked it and yes, makes sense to have distractions to cover up his murder.

AM Hants -> André De Koning , December 28, 2017 6:52 AM

There was an article, that I read, just before Christmas Day, that supports what you say. That Mueller has got to keep the narrative running, until they have sorted out the Mid-Term Elections, that the Dems believe will work to their advantage. Is it something to do with the Dems hoping to control Congress and managing to close any investigations that Trump is working on?

Gr8 White Caulk , December 28, 2017 8:34 AM

like Putin told Meghan Kelly, it could've been made to look like her 3 yr old daughter had hacked the dnc from her bedroom.

jmg , December 28, 2017 5:11 AM

More details. As mentioned before, it's technically verified as a whistleblower's leak, not a hack:

Intel Vets Challenge 'Russia Hack' Evidence - Consortium News
https://consortiumnews.com/...

A quick summary:

Ex-NSA official: Spies don't believe Russia collusion story - Fox News

https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FvA0HK_I-Hps%3Ffeature%3Doembed&url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DvA0HK_I-Hps&image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FvA0HK_I-Hps%2Fhqdefault.jpg&key=21d07d84db7f4d66a55297735025d6d1&type=text%2Fhtml&schema=youtube

AM Hants -> jmg , December 28, 2017 7:34 PM

Surprised with Fox. Considering old Murdoch has a problem with Russia, no doubt owing to his interests in Genie Energy. However, not complaining, Tucker Carlson, Sean Hannity and now the ex-NSA on Fox News. Nice.

André De Koning , December 28, 2017 5:06 AM

This is just the beginning: just read New Trump Executive Order Targets Clinton-Linked Individuals, Lobbyists And Perhaps Uranium One on Zerohedge.com

1. It will have huge consequences for all those who made shady deals with dictators and criminals (adding to the coffers of the Clinton Foundation etc.etc.). Perhaps this is what Trump was waiting for to start in the new year:his fireworks response to all the mud slung around?

2. Seth Rich and distraction by Guccifer 2.0: Trauma200 comments below is BIG and makes the connection to SETH RICH's murder, which also shows how Assange made it necessary for the complete the search and expose with evidence what was going on.

AM Hants -> André De Koning , December 28, 2017 7:31 PM

What I am curious about, is will he use it for that or will he go for any foreigner that Washington DC has a problem with. Such as anybody who is a friend of President Putin, just to cause problems, before the Russian Presidential Campaign.

Or am I being cynical. I seriously hope he uses it for the Russia Gate crowd and no doubt, he has good reason and he is not known to like being insulted, with no payback. However, I can also see him using it as another form of punishment on non-nationals.

André De Koning -> AM Hants , December 28, 2017 9:51 PM

He likes Putin but has to pretend for a while to be tough on him, so he'll probably limit it to the BS-ers (he is a maverick but does not like BS).

richardstevenhack , December 28, 2017 4:48 PM

Nice analysis.

One additional point: Thomas Rid and most of the mainstream media keeps saying that German intelligence fingered Russia for the German Parliament attacks. While this is partly true, German intelligence in fact never said directly that APT 29 or "Fancy Bear" WAS DEFINITELY Russian state sponsored. They said they ASSUMED Russia was conducting hacks on Germany.

See here:

Digital Attack on German Parliament: Investigative Report on the Hack of the Left Party Infrastructure in Bundestag
https://netzpolitik.org/201...

Jeffrey Carr made this point early on in his Medium article:

Can Facts Slow The DNC Breach Runaway Train?
https://medium.com/@jeffrey...

Quote

Thomas Rid wrote:

One of the strongest pieces of evidence linking GRU to the DNC hack is the equivalent of identical fingerprints found in two burglarized buildings: a reused command-and-control address  --  176.31.112[.]10  --  that was hard coded in a piece of malware found both in the German parliament as well as on the DNC's servers. Russian military intelligence was identified by the German domestic security agency BfV as the actor responsible for the Bundestag breach. The infrastructure behind the fake MIS Department domain was also linked to the Berlin intrusion through at least one other element, a shared SSL certificate.

This paragraph sounds quite damning if you take it at face value, but if you invest a little time into checking the source material, its carefully constructed narrative falls apart.

Problem #1:

The IP address 176.31.112[.]10 used in the Bundestag breach as a Command and Control server has never been connected to the Russian intelligence services. In fact, Claudio Guarnieri, a highly regarded security researcher, whose technical analysis was referenced by Rid, stated that "no evidence allows to tie the attacks to governments of any particular country."

Problem #2: The Command & Control server (176.31.112.10) was using an outdated version of OpenSSL vulnerable to Heartbleed attacks. Heartbleed allows attackers to exfiltrate data including private keys, usernames, passwords and other sensitive information.

The existence of a known security vulnerability that's trivial to exploit opens the door to the possibility that the systems in question were used by one rogue group, and then infiltrated by a second rogue group, making the attribution process even more complicated. At the very least, the C2 server should be considered a compromised indicator.

Problem #3: The BfV published a newsletter in January 2016 which assumes that the GRU and FSB are responsible because of technical indicators, not because of any classified finding; to wit: "Many of these attack campaigns have each other on technical similarities, such as malicious software families, and infrastructure  --  these are important indicators of the same authorship. It is assumed that both the Russian domestic intelligence service FSB and the military foreign intelligence service GRU run cyber operations."

Professor Rid's argument depended heavily on conveying hard attribution by the BfV even though the President of the BfV didn't disguise the fact that their attribution was based on an assumption and not hard evidence.

End Quote

André De Koning -> richardstevenhack , December 28, 2017 9:57 PM

Very good analysis! Thanks.

AM Hants , December 28, 2017 6:48 AM

Thanks for the article and reminding us of Crowd Strike. Must admit, I read an interesting article, over on Oped News, by George Eliason, with regards Crowd Strike. Plus a few other reminders.

Does anybody remember the Awan Brothers from Pakistan and what they were arrested for, with regards the DNC and computers?

BREAKING : Democrat Awan Brothers (NOT RUSSIANS) Allegedly Hacked Congress... http://truthfeed.com/breaki...

Then you have Google and Soros and their links into Crowd Strike. Hasn't the CEO of Google just stepped down, the same day that Trump signed a Presidential Order, that might prove a problem for some, in the future?

QANON EXPOSES DEM CONSPIRACY TO FRAME TRUMP, CLAIMS GOOGLE'S SCHMIDT PLAYED PIVOTAL ROLE
QAnon also claims Debbie Wasserman Schultz contracted MS-13 gang to kill Seth Rich... https://www.infowars.com/qa...

DNC 'Russian Hacking' Conclusion Comes from Google-Linked Firm... http://www.breitbart.com/bi...

Remember, Crowd Strike, Dmitry Alperovic and his links back to The Atlantic Council? Then you have the Ukrainian Oligarch Pinchuk, who happily invested $25 million in the Clinton Foundation. Remember his Yalta Summits and the one back in September 2013? Now who attended and what were the various topics that they discussed?

Then you have Obama giving Crowd Strike a White House Commission for Cyber Security. Plus, the DNC refusing the FBI access to their servers, but, having no problem giving Crowd Strike full access. Now why was that? Funny how often Ukraine comes up, when looking into Clinton, Fusion, Crowdstrike, Old Ukrainian Malware and The Trump Dossier? Coincidence or what?

Why Crowdstrike's Russian Hacking Story Fell Apart- Say Hello to Fancy Bear... http://www.washingtonsblog....

Another good article by George Eliason.

A Tale of 2 Ukraines- Health Care in War-Torn Lugansk and Peaceful Kiev... https://www.opednews.com/ar...

André De Koning -> AM Hants , December 28, 2017 9:56 PM

In their attack (best defense motto) the real truth is slowly unfolding and yes, the Awan brothers etc. are all part of it.

I think they arrested one of those Awans (?) but we have not heard about them much lately.

The plot thickens and the time for the démasqué is here....

[Dec 28, 2017] How CrowdStrike placed malware in DNC hacked servers by Alex Christoforou

Highly recommended!
If this is true, then this is definitely a sophisticated false flag operation. Was malware Alperovich people injected specifically designed to implicate Russians? In other words Crowdstrike=Fancy Bear
Images removed. For full content please thee the original source
One interesting corollary of this analysis is that installing Crowdstrike software is like inviting a wolf to guard your chicken. If they are so dishonest you take enormous risks. That might be true for some other heavily advertized "intrusion prevention" toolkits. So those criminals who use mistyped popular addresses or buy Google searches to drive lemmings to their site and then flash the screen that they detected a virus on your computer a, please call provided number and for a small amount of money your virus will be removed get a new more sinister life.
I suspected many of such firms (for example ISS which was bought by IBM in 2006) to be scams long ago.
Notable quotes:
"... Disobedient Media outlines the DNC server cover-up evidenced in CrowdStrike malware infusion ..."
"... In the article, they claim to have just been working on eliminating the last of the hackers from the DNC's network during the past weekend (conveniently coinciding with Assange's statement and being an indirect admission that their Falcon software had failed to achieve it's stated capabilities at that time , assuming their statements were accurate) . ..."
"... To date, CrowdStrike has not been able to show how the malware had relayed any emails or accessed any mailboxes. They have also not responded to inquiries specifically asking for details about this. In fact, things have now been discovered that bring some of their malware discoveries into question. ..."
"... there is a reason to think Fancy Bear didn't start some of its activity until CrowdStrike had arrived at the DNC. CrowdStrike, in the indiciators of compromise they reported, identified three pieces of malware relating to Fancy Bear: ..."
"... They found that generally, in a lot of cases, malware developers didn't care to hide the compile times and that while implausible timestamps are used, it's rare that these use dates in the future. It's possible, but unlikely that one sample would have a postdated timestamp to coincide with their visit by mere chance but seems extremely unlikely to happen with two or more samples. Considering the dates of CrowdStrike's activities at the DNC coincide with the compile dates of two out of the three pieces of malware discovered and attributed to APT-28 (the other compiled approximately 2 weeks prior to their visit), the big question is: Did CrowdStrike plant some (or all) of the APT-28 malware? ..."
"... The IP address, according to those articles, was disabled in June 2015, eleven months before the DNC emails were acquired – meaning those IP addresses, in reality, had no involvement in the alleged hacking of the DNC. ..."
"... The fact that two out of three of the Fancy Bear malware samples identified were compiled on dates within the apparent five day period CrowdStrike were apparently at the DNC seems incredibly unlikely to have occurred by mere chance. ..."
"... That all three malware samples were compiled within ten days either side of their visit – makes it clear just how questionable the Fancy Bear malware discoveries were. ..."
Dec 28, 2017 | theduran.com

Of course the DNC did not want to the FBI to investigate its "hacked servers". The plan was well underway to excuse Hillary's pathetic election defeat to Trump, and CrowdStrike would help out by planting evidence to pin on those evil "Russian hackers." Some would call this entire DNC server hack an "insurance policy."

... ... ...

[Sep 17, 2017] The So-called Russian Hack of the DNC Does Not Make Sense by Publius Tacitus

Highly recommended!
All signs of sophisticated false flag operation, which probably involved putting malware into DNC servers and then detecting and analyzing them
Notable quotes:
"... 6 May 2016 when CrowdStrike first detected what it assessed to be a Russian presence inside the DNC server. Follow me here. One week after realizing there had been a penetration, the DNC learns, courtesy of the computer security firm it hired, that the Russians are doing it. Okay. Does CrowdStrike shut down the penetration. Nope. The hacking apparently continues unabated. ..."
"... The Smoking Gun ..."
"... I introduce Seth Rich at this point because he represents an alternative hypothesis. Rich, who reportedly was a Bernie Sanders supporter, was in a position at the DNC that gave him access to the emails in question and the opportunity to download the emails and take them from the DNC headquarters. Worth noting that Julian Assange offered $20,000 for information leading to the arrest of Rich's killer or killers. 8. 22 July 2016. Wikileaks published the DNC emails starting on 22 July 2016. Bill Binney, a former senior official at NSA, insists that if such a hack and electronic transfer over the internet had occurred then the NSA has in it possession the intelligence data to prove that such activity had occurred. ..."
"... Notwithstanding the claim by CrowdStrike not a single piece of evidence has been provided to the public to support the conclusion that the emails were hacked and physically transferred to a server under the control of a Russian intelligence operative. ..."
"... Please do not try to post a comment stating that the "Intelligence Community" concluded as well that Russia was responsible. That claim is totally without one shred of actual forensic evidence. Also, Julian Assange insists that the emails did not come from a Russian source. ..."
"... Wikileaks, the protector of the accountability of the top, has announced a reward for finding the murderers of Seth Rich. In comparison, the DNC has not offered any reward to help the investigation of the murder of the DNC staffer, but the DNC found a well-connected lawyer to protect Imran Awan who is guilty (along with Debbie Wasserman-Schultz) in the greatest breach of national cybersecurity: http://dailycaller.com/2017/07/29/wasserman-schultz-seemingly-planned-to-pay-suspect-even-while-he-lived-in-pakistan/ ..."
"... I'm afraid you're behind the times. Wheeler is no longer relevant now that Sy Hersh has revealed an FBI report that explicitly says Rich was in contact with Wikileaks offering to sell them DNC documents. ..."
"... It's unfortunate for the Rich family, but now that the connection is pretty much confirmed, they're going to have to allow the truth to come out ..."
"... Mr. Dmitri Alperovitch, of Jewish descent (and an emigre from Russia), has been an "expert" at the Atlantic Council, the same organization that cherishes and provides for Mr. Eliot Higgins. These two gentlemen - and the directorate of Atlantic Council - are exhibit one of opportunism and intellectual dishonesty (though it is hard to think about Mr. Higgins in terms of "intellect"). ..."
"... Alperovitch is not just an incompetent "expert" in cybersecurity - he is a willing liar and war-mongering, for money. ..."
"... One could of course start earlier. What is the exact timeline of the larger cyberwar post 9/11, or at least the bits and pieces that surfaced for the nitwits among us, like: Stuxnet? ..."
"... Scott Ritter's article referenced in PT's post is terrific, covering a ton of issues related to CrowdStrike and the DNC hack. You need to read it, not just PT's timeline. In case you missed the link in PT's post: ..."
"... His article echoes and reinforces what Carr and others have said about the difficulty of attribution of infosec breaches. Namely that the basic problem of both intelligence and infosec operations is that there is too much obfuscation, manipulation, and misdirection involved to be sure of who or what is going on. ..."
"... The Seth Rich connection is pretty much a done deal, now that Sy Hersh has been caught on tape stating that he knows of an FBI report based on a forensic analysis of Rich's laptop that shows Rich was in direct contact with Wikileaks with an attempt to sell them DNC documents and that Wikileaks had access to Rich's DropBox account. Despite Hersh's subsequent denials - which everyone knows are his usual impatient deflections prior to putting out a sourced and organized article - it's pretty clear that Rich was at least one of the sources of the Wikileaks email dump and that there is zero connection to Russia. ..."
"... None of this proves that Russian intelligence - or Russians of some stripe - or for that matter hackers from literally anywhere - couldn't or didn't ALSO do a hack of the DNC. But it does prove that the iron-clad attribution of the source of Wikileaks email release to Russia is at best flawed, and at worst a deliberate cover up of a leak. ..."
Sep 05, 2017 | turcopolier.typepad.com

Notwithstanding the conventional wisdom that Russia hacked into the DNC computers, downloaded emails and a passed the stolen missives to Julian Assange's crew at Wikileaks, a careful examination of the timeline of events from 2016 shows that this story is simply not plausible.

Let me take you through the known facts:

1. 29 April 2016 , when the DNC became aware its servers had been penetrated (https://medium.com/homefront-rising/dumbstruck-how-crowdstrike-conned-america-on-the-hack-of-the-dnc-ecfa522ff44f). Note. They apparently did not know who was doing it. 2, 6 May 2016 when CrowdStrike first detected what it assessed to be a Russian presence inside the DNC server. Follow me here. One week after realizing there had been a penetration, the DNC learns, courtesy of the computer security firm it hired, that the Russians are doing it. Okay. Does CrowdStrike shut down the penetration. Nope. The hacking apparently continues unabated. 3. 25 May 2016. The messages published on Wikileaks from the DNC show that 26 May 2016 was the last date that emails were sent and received at the DNC. There are no emails in the public domain after that date. In other words, if the DNC emails were taken via a hacking operation, we can conclude from the fact that the last messages posted to Wikileaks show a date time group of 25 May 2016. Wikileaks has not reported nor posted any emails from the DNC after the 25th of May. I think it is reasonable to assume that was the day the dirty deed was done. 4. 12 June 2016, CrowdStrike purged the DNC server of all malware. Are you kidding me? 45 days after the DNC discovers that its serve has been penetrated the decision to purge the DNC server is finally made. What in the hell were they waiting for? But this also tells us that 18 days after the last email "taken" from the DNC, no additional emails were taken by this nasty malware. Here is what does not make sense to me. If the DNC emails were truly hacked and the malware was still in place on 11 June 2016 (it was not purged until the 12th) then why are there no emails from the DNC after 26 May 2016? an excellent analysis of Guccifer's role : Almost immediately after the one-two punch of the Washington Post article/CrowdStrike technical report went public, however, something totally unexpected happened -- someone came forward and took full responsibility for the DNC cyber attack. Moreover, this entity -- operating under the persona Guccifer 2.0 (ostensibly named after the original Guccifer , a Romanian hacker who stole the emails of a number of high-profile celebrities and who was arrested in 2014 and sentenced to 4 ½ years of prison in May 2016) -- did something no state actor has ever done before, publishing documents stolen from the DNC server as proof of his claims.
Hi. This is Guccifer 2.0 and this is me who hacked Democratic National Committee.

With that simple email, sent to the on-line news magazine, The Smoking Gun , Guccifer 2.0 stole the limelight away from Alperovitch. Over the course of the next few days, through a series of emails, online posts and interviews , Guccifer 2.0 openly mocked CrowdStrike and its Russian attribution. Guccifer 2.0 released a number of documents, including a massive 200-plus-missive containing opposition research on Donald Trump.

Guccifer 2.0 also directly contradicted the efforts on the part of the DNC to minimize the extent of the hacking, releasing the very donor lists the DNC specifically stated had not been stolen. More chilling, Guccifer 2.0 claimed to be in possession of "about 100 Gb of data" which had been passed on to the online publisher, Wikileaks, who "will publish them soon." 7. Seth Rich died on 10 July 2016. I introduce Seth Rich at this point because he represents an alternative hypothesis. Rich, who reportedly was a Bernie Sanders supporter, was in a position at the DNC that gave him access to the emails in question and the opportunity to download the emails and take them from the DNC headquarters. Worth noting that Julian Assange offered $20,000 for information leading to the arrest of Rich's killer or killers. 8. 22 July 2016. Wikileaks published the DNC emails starting on 22 July 2016. Bill Binney, a former senior official at NSA, insists that if such a hack and electronic transfer over the internet had occurred then the NSA has in it possession the intelligence data to prove that such activity had occurred. Notwithstanding the claim by CrowdStrike not a single piece of evidence has been provided to the public to support the conclusion that the emails were hacked and physically transferred to a server under the control of a Russian intelligence operative. Please do not try to post a comment stating that the "Intelligence Community" concluded as well that Russia was responsible. That claim is totally without one shred of actual forensic evidence. Also, Julian Assange insists that the emails did not come from a Russian source.

Fool , 05 September 2017 at 09:01 AM

Where was it reported that Rich was a Sanders supporter?
Publius Tacitus -> Fool... , 05 September 2017 at 09:15 AM
This is one of the reports, http://heavy.com/news/2016/08/seth-rich-julian-assange-source-wikileaks-wiki-dnc-emails-death-murder-reward-video-interview-hillary-clinton-shawn-lucas/.
Anna -> Publius Tacitus ... , 05 September 2017 at 10:56 AM
Wikileaks, the protector of the accountability of the top, has announced a reward for finding the murderers of Seth Rich. In comparison, the DNC has not offered any reward to help the investigation of the murder of the DNC staffer, but the DNC found a well-connected lawyer to protect Imran Awan who is guilty (along with Debbie Wasserman-Schultz) in the greatest breach of national cybersecurity: http://dailycaller.com/2017/07/29/wasserman-schultz-seemingly-planned-to-pay-suspect-even-while-he-lived-in-pakistan/
Stephanie -> Publius Tacitus ... , 06 September 2017 at 12:12 PM
Seth Rich's family have pleaded, and continue to plead, that the conspiracy theorists leave the death of their son alone and have said that those who continue to flog this nonsense around the internet are only serving to increase their pain. I suggest respectfully that some here may wish to consider their feelings. (Also, this stuff is nuts, you know.)

https://www.washingtonpost.com/opinions/were-seth-richs-parents-stop-politicizing-our-sons-murder/2017/05/23/164cf4dc-3fee-11e7-9869-bac8b446820a_story.html?utm_term=.b20208de48d3

"We also know that many people are angry at our government and want to see justice done in some way, somehow. We are asking you to please consider our feelings and words. There are people who are using our beloved Seth's memory and legacy for their own political goals, and they are using your outrage to perpetuate our nightmare."

http://www.businessinsider.com/seth-rich-family-response-lawsuit-rod-wheeler-2017-8

"Wheeler, a former Metropolitan Police Department officer, was a key figure in a series of debunked stories claiming that Rich had been in contact with Wikileaks before his death. Fox News, which reported the story online and on television, retracted it in June."

Richardstevenhack -> Stephanie... , 07 September 2017 at 07:43 PM
I'm afraid you're behind the times. Wheeler is no longer relevant now that Sy Hersh has revealed an FBI report that explicitly says Rich was in contact with Wikileaks offering to sell them DNC documents.

It's unfortunate for the Rich family, but now that the connection is pretty much confirmed, they're going to have to allow the truth to come out.

Anna , 05 September 2017 at 09:20 AM
Mr. Dmitri Alperovitch, of Jewish descent (and an emigre from Russia), has been an "expert" at the Atlantic Council, the same organization that cherishes and provides for Mr. Eliot Higgins. These two gentlemen - and the directorate of Atlantic Council - are exhibit one of opportunism and intellectual dishonesty (though it is hard to think about Mr. Higgins in terms of "intellect").

Here is an article by Alperovitch: http://www.atlanticcouncil.org/blogs/new-atlanticist/russian-cyber-attacks-in-the-united-states-will-intensify

Take note how Alperovitch coded the names of the supposed hackers: "Russian intelligence services hacked the Democratic National Committee's computer network and accessed opposition research on Donald Trump, according to the Atlantic Council's Dmitri Alperovitch.

Two Russian groups ! codenamed FancyBear and CozyBear ! have been identified as spearheading the DNC breach." Alperovitch is not just an incompetent "expert" in cybersecurity - he is a willing liar and war-mongering, for money.

The DNC hacking story has never been about national security; Alperovitch (and his handlers) have no loyalty to the US.

LeaNder , 05 September 2017 at 09:59 AM
PT, I make a short exception. Actually decided to stop babbling for a while. But: Just finished something successfully.

And since I usually need distraction by something far more interesting then matters at hand. I was close to your line of thought yesters.

But really: Shouldn't the timeline start in 2015, since that's supposedly the time someone got into the DNC's system?

One could of course start earlier. What is the exact timeline of the larger cyberwar post 9/11, or at least the bits and pieces that surfaced for the nitwits among us, like: Stuxnet?

But nevermind. Don't forget developments and recent events around Eugene or Jewgeni Walentinowitsch Kasperski?

LondonBob , 05 September 2017 at 03:27 PM
The Russia thing certainly seems to have gone quiet.

Bannon's chum says the issue with pursuing the Clinton email thing is that you would end up having to indict almost all of the last administration, including Obama, unseemly certainly. Still there might be a fall guy, maybe Comey, and obviously it serves Trump's purposes to keep this a live issue through the good work of Grassley and the occasional tweet.

Would be amusing if Trump pardoned Obama. Still think Brennan should pay a price though, can't really be allowed to get away with it

Richardstevenhack , 05 September 2017 at 06:23 PM
Scott Ritter's article referenced in PT's post is terrific, covering a ton of issues related to CrowdStrike and the DNC hack. You need to read it, not just PT's timeline. In case you missed the link in PT's post:

Dumbstruck: How CrowdStrike Conned America on the Hack of the DNC https://medium.com/homefront-rising/dumbstruck-how-crowdstrike-conned-america-on-the-hack-of-the-dnc-ecfa522ff44f

The article by Jeffrey Carr on CrowdStrike referenced from back in 2012 is also worth reading: Where's the "Strike" in CrowdStrike? https://jeffreycarr.blogspot.com/2012/09/wheres-strike-in-crowdstrike.html

Also, the article Carr references is very important for understanding the limits of malware analysis and "attribution". Written by Michael Tanji, whose credentials appear impressive: "spent nearly 20 years in the US intelligence community. Trained in both SIGINT and HUMINT disciplines he has worked at the Defense Intelligence Agency, the National Security Agency, and the National Reconnaissance Office. At various points in his career he served as an expert in information warfare, computer network operations, computer forensics, and indications and warning. A veteran of the US Army, Michael has served in both strategic and tactical assignments in the Pacific Theater, the Balkans, and the Middle East."

Malware Analysis: The Danger of Connecting the Dots: https://www.oodaloop.com/technology/2012/09/11/malware-analysis-the-danger-of-connecting-the-dots/

His article echoes and reinforces what Carr and others have said about the difficulty of attribution of infosec breaches. Namely that the basic problem of both intelligence and infosec operations is that there is too much obfuscation, manipulation, and misdirection involved to be sure of who or what is going on.

The Seth Rich connection is pretty much a done deal, now that Sy Hersh has been caught on tape stating that he knows of an FBI report based on a forensic analysis of Rich's laptop that shows Rich was in direct contact with Wikileaks with an attempt to sell them DNC documents and that Wikileaks had access to Rich's DropBox account. Despite Hersh's subsequent denials - which everyone knows are his usual impatient deflections prior to putting out a sourced and organized article - it's pretty clear that Rich was at least one of the sources of the Wikileaks email dump and that there is zero connection to Russia.

None of this proves that Russian intelligence - or Russians of some stripe - or for that matter hackers from literally anywhere - couldn't or didn't ALSO do a hack of the DNC. But it does prove that the iron-clad attribution of the source of Wikileaks email release to Russia is at best flawed, and at worst a deliberate cover up of a leak.

And Russiagate depends primarily on BOTH alleged "facts" being true: 1) that Russia hacked the DNC, and 2) that Russia was the source of Wikileaks release. And if the latter is not true, then one has to question why Russia hacked the DNC in the first place, other than for "normal" espionage operations. "Influencing the election" then becomes a far less plausible theory.

The general takeaway from an infosec point of view is that attribution by means of target identification, tools used, and "indicators of compromise" is a fatally flawed means of identifying, and thus being able to counter, the adversaries encountered in today's Internet world, as Tanji proves. Only HUMINT offers a way around this, just as it is really the only valid option in countering terrorism.

[Aug 24, 2017] Vault 7 release includes revelation of CIA capability to allow it to misdirect the attribution of cyber attacks leaving behind the fingerprints of the very groups that the attack techniques were stolen from

Aug 24, 2017 | www.moonofalabama.org

Robert Beal | Aug 24, 2017 12:47:02 PM | 17

"Only recently did the "collusion with Russia" nonsense suddenly die down."

My short letter to the editor of The New Yorker (see last sentence):

Raffi Katchadourian ("Julian Assange, a man without a country," Aug. 21, 2017) didn't mention Wikileak's Vault 7 release includes revelation of CIA capability to allow it to misdirect the attribution of cyber attacks. According to Wikileaks, the U.S. false-flag technology consists of "leaving behind the 'fingerprints' of the very groups that the attack techniques were stolen from."

Karchadourian's omission belies his assertion: "Whatever one thinks of Assange's election disclosures, accepting his contention that they shared no ties with the two Russian fronts requires willful blindness."

His article, of near-record length for the magazine, exhaustively attempts to resuscitate speculation about a Russian cyber connection to the Clinton meltdown.

[Jul 30, 2017] CrowdStrike Revises and Retracts Parts of Explosive Russian Hacking Report

Notable quotes:
"... Voice of America ..."
"... U.S. cybersecurity firm CrowdStrike has revised and retracted statements it used to buttress claims of Russian hacking during last year's American presidential election campaign. The shift followed a VOA report that the company misrepresented data published by an influential British think tank. ..."
"... In December, CrowdStrike said it found evidence that Russians hacked into a Ukrainian artillery app, contributing to heavy losses of howitzers in Ukraine's war with pro-Russian separatists. ..."
"... VOA reported Tuesday that the International Institute for Strategic Studies (IISS), which publishes an annual reference estimating the strength of world armed forces, disavowed the CrowdStrike report and said it had never been contacted by the company. ..."
"... CrowdStrike was first to link hacks of Democratic Party computers to Russian actors last year, but some cybersecurity experts have questioned its evidence. The company has come under fire from some Republicans who say charges of Kremlin meddling in the election are overblown. ..."
"... After CrowdStrike released its Ukraine report, company co-founder Dmitri Alperovitch claimed it provided added evidence of Russian election interference. In both hacks, he said, the company found malware used by "Fancy Bear," a group with ties to Russian intelligence agencies. ..."
"... CrowdStrike's claims of heavy Ukrainian artillery losses were widely circulated in U.S. media. ..."
"... On Thursday, CrowdStrike walked back key parts of its Ukraine report. ..."
"... The company removed language that said Ukraine's artillery lost 80 percent of the Soviet-era D-30 howitzers, which used aiming software that purportedly was hacked. Instead, the revised report cites figures of 15 to 20 percent losses in combat operations, attributing the figures to IISS. ..."
"... Finally, CrowdStrike deleted a statement saying "deployment of this malware-infected application may have contributed to the high-loss nature of this platform" -- meaning the howitzers -- and excised a link sourcing its IISS data to a blogger in Russia-occupied Crimea. ..."
"... In an email, CrowdStrike spokeswoman Ilina Dmitrova said the new estimates of Ukrainian artillery losses resulted from conversations with Henry Boyd, an IISS research associate for defense and military analysis. She declined to say what prompted the contact. ..."
"... Dmitrova noted that the FBI and the U.S. intelligence community have also concluded that Russia was behind the hacks of the Democratic National Committee, Democratic Congressional Campaign Committee and the email account of John Podesta, Hillary Clinton's campaign manager. ..."
"... In a hearing with the Senate Intelligence Committee Tuesday afternoon outlining the intelligence agencies' findings on Russian election interference, Comey said there were "multiple requests at different levels" for access to the Democratic servers, but that ultimately a "highly respected private company" was granted access and shared its findings with the FBI. ..."
"... If you enjoyed this post, and want to contribute to genuine, independent media, consider visiting our Support Page . ..."
"... Open-source reporting indicates losses of almost 50% of equipment in the last 2 years of conflict amongst Ukrainian artillery forces and over 80% of D-30 howitzers were lost, far more than any other piece of Ukrainian artillery ..."
"... excluding the Naval Infantry battalion in the Crimea which was effectively captured wholesale, the Ukrainian Armed Forces lost between 15% and 20% of their pre-war D–30 inventory in combat operations.' ..."
"... With direct access to an IISS expert, this report could be easily improved. All it would need is a chart or table showing D-30 and other artillery losse from 2007-2017, as well as IISS's attributions of the breakdown of the year-to-year inventory changes (combat losses, non-combat capture, sales, disrepair, etc). Then we could tell whether D-30 combat losses were abnormally high or not. ..."
Mar 28, 2017 | libertyblitzkrieg.com

Michael Krieger Posted Tuesday Mar 28, 2017 at 3:53 pm 3 Comments

Last week, I published two posts on cyber security firm CrowdStrike after becoming aware of inaccuracies in one of its key reports used to bolster the claim that operatives of the Russian government had hacked into the DNC. This is extremely important since the DNC hired CrowdStrike to look into its hack, and at the same time denied FBI access to its servers.

Before reading any further, you should read last week's articles if you missed them the first time.

Credibility of Cyber Firm that Claimed Russia Hacked the DNC Comes Under Serious Question

What is CrowdStrike? Firm Hired by DNC has Ties to Hillary Clinton, a Ukrainian Billionaire and Google

Now here are the latest developments courtesy of Voice of America :

U.S. cybersecurity firm CrowdStrike has revised and retracted statements it used to buttress claims of Russian hacking during last year's American presidential election campaign. The shift followed a VOA report that the company misrepresented data published by an influential British think tank.

In December, CrowdStrike said it found evidence that Russians hacked into a Ukrainian artillery app, contributing to heavy losses of howitzers in Ukraine's war with pro-Russian separatists.

VOA reported Tuesday that the International Institute for Strategic Studies (IISS), which publishes an annual reference estimating the strength of world armed forces, disavowed the CrowdStrike report and said it had never been contacted by the company.

CrowdStrike was first to link hacks of Democratic Party computers to Russian actors last year, but some cybersecurity experts have questioned its evidence. The company has come under fire from some Republicans who say charges of Kremlin meddling in the election are overblown.

After CrowdStrike released its Ukraine report, company co-founder Dmitri Alperovitch claimed it provided added evidence of Russian election interference. In both hacks, he said, the company found malware used by "Fancy Bear," a group with ties to Russian intelligence agencies.

CrowdStrike's claims of heavy Ukrainian artillery losses were widely circulated in U.S. media.

On Thursday, CrowdStrike walked back key parts of its Ukraine report.

The company removed language that said Ukraine's artillery lost 80 percent of the Soviet-era D-30 howitzers, which used aiming software that purportedly was hacked. Instead, the revised report cites figures of 15 to 20 percent losses in combat operations, attributing the figures to IISS.

Finally, CrowdStrike deleted a statement saying "deployment of this malware-infected application may have contributed to the high-loss nature of this platform" -- meaning the howitzers -- and excised a link sourcing its IISS data to a blogger in Russia-occupied Crimea.

In an email, CrowdStrike spokeswoman Ilina Dmitrova said the new estimates of Ukrainian artillery losses resulted from conversations with Henry Boyd, an IISS research associate for defense and military analysis. She declined to say what prompted the contact.

Dmitrova noted that the FBI and the U.S. intelligence community have also concluded that Russia was behind the hacks of the Democratic National Committee, Democratic Congressional Campaign Committee and the email account of John Podesta, Hillary Clinton's campaign manager.

Here's the problem. Yes, the FBI has agreed with CrowdStrike's conclusion, but the FBI did not analyze the DNC servers because the DNC specifically denied the FBI access. This was noteworthy in its own right, but it takes on vastly increased significance given the serious errors in a related hacking report produced by the company.

As such, serious questions need to be asked. Why did FBI head James Comey outsource his job to CrowdStrike, and why did he heap praise on the company? For instance, back in January, Comey referred to CrowdStrike as a "highly respected private company."

In a hearing with the Senate Intelligence Committee Tuesday afternoon outlining the intelligence agencies' findings on Russian election interference, Comey said there were "multiple requests at different levels" for access to the Democratic servers, but that ultimately a "highly respected private company" was granted access and shared its findings with the FBI.

Where does all this respect come from considering how badly it botched the Ukraine report?

Something stinks here, and the FBI needs to be held to account.

If you enjoyed this post, and want to contribute to genuine, independent media, consider visiting our Support Page .

In Liberty,
Michael Krieger

btn March 30, 2017 at 11:58 am

As someone that prefers to see all the evidence before drawing conclusions, the latest Crowdstrike report is a step backwards.

One claim has been changed from

"Open-source reporting indicates losses of almost 50% of equipment in the last 2 years of conflict amongst Ukrainian artillery forces and over 80% of D-30 howitzers were lost, far more than any other piece of Ukrainian artillery."
to
"(from Henry Boyd,IISS): 'excluding the Naval Infantry battalion in the Crimea which was effectively captured wholesale, the Ukrainian Armed Forces lost between 15% and 20% of their pre-war D–30 inventory in combat operations.' "

This leads to more questions than answers. There is an elephant in the room that is not addressed: what happened to the the 80% reduction in D-30 towed-artillery inventories?

Now a casual observer may infer that the 80% number has been revised to 15-20%. However, thsese numbers are measuring **different metrics**: overall inventory reductions (80%) vs combat losses (15-20%). More importantly, the original 80% number was ALSO provided by IISS (indirectly) and **has not been disputed** by them (to further muddy the water, Crowdstrike has deleted the reference to their original IISS data source from which the 80% loss was derived).

The only thing that has really changed is that Crowdstrike had originally attrtibuted 100% of the inventory decline to combat losses, while now they are going with the IISS assessment which attributes more than 75% of the inventory decline to non-combat reasons (including the capture of the Naval Infantry Battalion).

Also lost in the new report is any comparison of the D-30 howitzer losses to the losses for other artillery, so we have no way of knowing if this loss is proportionately higher than for other artillery pieces (which would support Crowdstrike's assertions about a compromised app).

With direct access to an IISS expert, this report could be easily improved. All it would need is a chart or table showing D-30 and other artillery losse from 2007-2017, as well as IISS's attributions of the breakdown of the year-to-year inventory changes (combat losses, non-combat capture, sales, disrepair, etc). Then we could tell whether D-30 combat losses were abnormally high or not.

[Jul 29, 2017] CrowdStrikes fake quotes and fake information about claimed Russia hack

At present, it looks a LOT like Shawn Henry & Dmitri Alperovitch (CrowdStrike executives), working for either the HRC campaign or DNC leadership were very likely to have been behind the Guccifer 2.0 operation
Notable quotes:
"... CrowdStrike were recently exposed with their misattribution of quotes and fake information. ..."
"... In other words, CrowdStrike lied to you. ..."
"... CrowdStrike, the cyber-security firm that initially claimed Russia hacked the DNC and tilted the 2016 election in Donald Trump's favor, is being accused of misattribution of quotes in a December report. CrowdStrike have since walked back key and central claims in said report, calling their credibility into serious question. ..."
"... "Michael Alperovitch – Russian Spy with the Crypto-Keys - Essentially, Michael Alperovitch flies under the false-flag of being a cryptologist who works with PKI. A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. ..."
"... The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repository and revokes them if needed. Public key cryptography is a cryptographic technique that enables entities to securely communicate on an insecure public network (the Internet), and reliably verify the identity of an entity via digital signatures. ..."
"... Digital signatures use Certificate Authorities to digitally sign and publish the public key bound to a given user. This is done using the CIA's own private key, so that trust in the user key relies on one's trust in the validity of the CIA's key. Michael Alperovitch is considered to be the number one expert in America on PKI and essentially controls the market." ..."
"... At present, it looks a LOT like Shawn Henry & Dmitri Alperovitch (CrowdStrike executives), working for either the HRC campaign or DNC leadership were very likely to have been behind the Guccifer 2.0 operation." ..."
Jul 29, 2017 | en.wikipedia.org
Voice of America (VOA) which is the largest U.S. international broadcaster and also according to the not-for-profit and independent Centre for Research on Globalization (CRG), CrowdStrike were recently exposed with their misattribution of quotes and fake information.

In other words, CrowdStrike lied to you.

CrowdStrike, the cyber-security firm that initially claimed Russia hacked the DNC and tilted the 2016 election in Donald Trump's favor, is being accused of misattribution of quotes in a December report. CrowdStrike have since walked back key and central claims in said report, calling their credibility into serious question.

Related articles and sources

Related video at https://www.youtube.com/watch?v=tKJ7SRJuz-A&feature=youtu.be

Francewhoa ( talk ) 22:57, 29 March 2017 (UTC)

That article doesn't mention Wikileaks at all, so this is not the really the best place to discuss it. But in any case, my response is: the VOA news article is a good source for the article Fancy Bear , where it is already appropriately cited.
The VOA article or something like it might also be appropriate for the CrowdStrike article, so long as we were extremely careful to follow the source and avoid undue emphasis . (We would, for instance, have to note CrowdStrike's defense, that its update to the report "does not in any way impact the core premise of the report...").
Citation in almost any other article (except maybe Russian military intervention in Ukraine (2014–present) , in which the original report isn't even mentioned) would be a violation of a whole bunch of principles, including, variously, WP:SYNTH , WP:UNDUE , and WP:COATRACK . Neutrality talk 00:00, 30 March 2017 (UTC)
Hi all :) For those interested to join or continue this discussion, I suggest we resume in that other talk page . This would centralize discussion related to that news about CrowdStrike who walked back some of their key and central claims. Thanks to contributor Neutrality for that suggestion :)
Francewhoa ( talk ) 01:25, 30 March 2017 (UTC)

Yes, this is a good place to discuss it because whether Wikileaks was specifically mentioned at all or not, the fact is it's a central component of what CrowdStrike was investigating so to say it's not appropriate to the article is ridiculous. As for "does not in any way impact the core premise"...) that's the typical dissembling by entities caught making false claims and conclusions. It's not a "defense." -- Preceding unsigned comment added by 72.239.232.139 ( talk ) 21:31, 16 May 2017 (UTC)

Michael Alperovitch/ Papa Bear/ Fancy Bear

[Jul 06, 2017] Bolton: Russia Hack May Have Been False Flag Operation

Notable quotes:
"... In an interview with Fox News' Eric Shawn, the former ambassador used the phrase "false flag operation" in reference to the CIA's purported assessment which concluded that Russia deliberately interfered with this year's US election to help Donald Trump secure the White House. ..."
"... "It is not at all clear to me, just viewing this from the outside, that this hacking into the DNC and the RNC was not a false flag operation," he told Fox News. ..."
"... The Washington Post's ..."
Dec 12, 2016 | dailywire.com

In an interview with Fox News' Eric Shawn, the former ambassador used the phrase "false flag operation" in reference to the CIA's purported assessment which concluded that Russia deliberately interfered with this year's US election to help Donald Trump secure the White House.

Suggesting that the Obama administration's lack of transparency makes it impossible to definitively conclude that the Russians were behind the hacking of US political parties, Bolton, who was reportedly appointed as Trump's deputy secretary of state (the second highest position at the State Department), appeared to break away from his characteristically national security-first philosophy to assert a theory about foul play at the highest levels of government,

"It is not at all clear to me, just viewing this from the outside, that this hacking into the DNC and the RNC was not a false flag operation," he told Fox News.

When asked to explain what he meant by the highly suggestive phrase "false flag," Bolton gave a hazy answer.

"We just don't know," stated Bolton, refusing to say whether the US government was purposely misleading the public, or worse, had a hand in the "false flag operation."

"But I believe that intelligence has been politicized in the Obama administration to a very significant degree," said Bolton, adding:

If you think the Russians did this, then why did they leave fingerprints

We would want to know who else might want to influence the election and why they would leave fingerprints that point to the Russians. That's why I say until we know more about how the intelligence community came to this conclusion we don't know whether it is Russian inspired or a false flag

Here's the transcript, detailing the relevant part of Bolton's interview with Eric Shawn:

Bolton's comments reflected echo the skeptical attitude of the Trump team in the wake of The Washington Post's report on the CIA's unsettling findings about Russia's interference during the presidential election. Trump, himself, called the CIA's assessment "ridiculous" in a pre-taped interview that aired Sunday.

"I think it's just another excuse. I don't believe it," the president-elect told Fox News' Chris Wallace. "Every week it's another excuse." Trumped added that "nobody really knows" who was behind the hacking of emails belonging to top Clinton advisors and DNC officials.

[Jun 14, 2017] Credibility Of Cyber Firm That Claimed Russia Hacked The DNC Comes Under Serious Question

Jun 14, 2017 | www.zerohedge.com
Before I get to the meat of this post, we need to revisit a little history. The cyber security firm hired to inspect the DNC hack and determine who was responsible is a firm called Crowdstrike. Its conclusion that Russia was responsible was released last year, but several people began to call its analysis into question upon further inspection.

Jeffrey Carr was one of the most prominent cynics, and as he noted in his December post, FBI/DHS Joint Analysis Report: A Fatally Flawed Effort :

The FBI/DHS Joint Analysis Report (JAR) " Grizzly Steppe " was released yesterday as part of the White House's response to alleged Russian government interference in the 2016 election process. It adds nothing to the call for evidence that the Russian government was responsible for hacking the DNC, the DCCC, the email accounts of Democratic party officials, or for delivering the content of those hacks to Wikileaks.

It merely listed every threat group ever reported on by a commercial cybersecurity company that is suspected of being Russian-made and lumped them under the heading of Russian Intelligence Services (RIS) without providing any supporting evidence that such a connection exists.

If ESET could do it, so can others. It is both foolish and baseless to claim, as Crowdstrike does, that X-Agent is used solely by the Russian government when the source code is there for anyone to find and use at will.

If the White House had unclassified evidence that tied officials in the Russian government to the DNC attack, they would have presented it by now. The fact that they didn't means either that the evidence doesn't exist or that it is classified.

Nevertheless, countless people, including the entirety of the corporate media, put total faith in the analysis of Crowdstrike despite the fact that the FBI was denied access to perform its own analysis. Which makes me wonder, did the U.S. government do any real analysis of its own on the DNC hack, or did it just copy/paste Crowdstrike?

As The Hill reported in January:

The FBI requested direct access to the Democratic National Committee's (DNC) hacked computer servers but was denied, Director James Comey told lawmakers on Tuesday.

The bureau made "multiple requests at different levels," according to Comey, but ultimately struck an agreement with the DNC that a "highly respected private company" would get access and share what it found with investigators.

"We'd always prefer to have access hands-on ourselves if that's possible," Comey said, noting that he didn't know why the DNC rebuffed the FBI's request.

This is nuts. Are all U.S. government agencies simply listening to what Crowdstike said in coming to their "independent" conclusions that Russia hacked the DNC? If so, that's a huge problem. Particularly considering what Voice of America published yesterday in a piece titled, Cyber Firm at Center of Russian Hacking Charges Misread Data :

An influential British think tank and Ukraine's military are disputing a report that the U.S. cybersecurity firm CrowdStrike has used to buttress its claims of Russian hacking in the presidential election.

The CrowdStrike report, released in December , asserted that Russians hacked into a Ukrainian artillery app, resulting in heavy losses of howitzers in Ukraine's war with Russian-backed separatists.

But the International Institute for Strategic Studies (IISS) told VOA that CrowdStrike erroneously used IISS data as proof of the intrusion. IISS disavowed any connection to the CrowdStrike report. Ukraine's Ministry of Defense also has claimed combat losses and hacking never happened.

The challenges to CrowdStrike's credibility are significant because the firm was the first to link last year's hacks of Democratic Party computers to Russian actors, and because CrowdStrike co-founder Dimiti Alperovitch has trumpeted its Ukraine report as more evidence of Russian election tampering.

How is this not the biggest story in America right now?

Yaroslav Sherstyuk, maker of the Ukrainian military app in question, called the company's report "delusional" in a Facebook post . CrowdStrike never contacted him before or after its report was published, he told VOA.

VOA first contacted IISS in February to verify the alleged artillery losses. Officials there initially were unaware of the CrowdStrike assertions. After investigating, they determined that CrowdStrike misinterpreted their data and hadn't reached out beforehand for comment or clarification.

In a statement to VOA, the institute flatly rejected the assertion of artillery combat losses.

"The CrowdStrike report uses our data, but the inferences and analysis drawn from that data belong solely to the report's authors," the IISS said. "The inference they make that reductions in Ukrainian D-30 artillery holdings between 2013 and 2016 were primarily the result of combat losses is not a conclusion that we have ever suggested ourselves, nor one we believe to be accurate."

In early January, the Ukrainian Ministry of Defense issued a statement saying artillery losses from the ongoing fighting with separatists are "several times smaller than the number reported by [CrowdStrike] and are not associated with the specified cause" of Russian hacking.

But Ukraine's denial did not get the same attention as CrowdStrike's report. Its release was widely covered by news media reports as further evidence of Russian hacking in the U.S. election.

In interviews, Alperovitch helped foster that impression by connecting the Ukraine and Democratic campaign hacks, which CrowdStrike said involved the same Russian-linked hacking group-Fancy Bear-and versions of X-Agent malware the group was known to use.

"The fact that they would be tracking and helping the Russian military kill Ukrainian army personnel in eastern Ukraine and also intervening in the U.S. election is quite chilling," Alperovitch said in a December 22 story by The Washington Post .

The same day, Alperovitch told the PBS NewsHour : "And when you think about, well, who would be interested in targeting Ukraine artillerymen in eastern Ukraine? Who has interest in hacking the Democratic Party? [The] Russia government comes to mind, but specifically, [it's the] Russian military that would have operational [control] over forces in the Ukraine and would target these artillerymen."

Alperovitch, a Russian expatriate and senior fellow at the Atlantic Council policy research center in Washington, co-founded CrowdStrike in 2011. The firm has employed two former FBI heavyweights: Shawn Henry, who oversaw global cyber investigations at the agency, and Steven Chabinsky, who was the agency's top cyber lawyer and served on a White House cybersecurity commission. Chabinsky left CrowdStrike last year.

CrowdStrike declined to answer VOA's written questions about the Ukraine report, and Alperovitch canceled a March 15 interview on the topic. In a December statement to VOA's Ukrainian Service, spokeswoman Ilina Dimitrova defended the company's conclusions.

In its report last June attributing the Democratic hacks, CrowdStrike said it was long familiar with the methods used by Fancy Bear and another group with ties to Russian intelligence nicknamed Cozy Bear. Soon after, U.S. cybersecurity firms Fidelis and Mandiant endorsed CrowdStrike's conclusions. The FBI and Homeland Security report reached the same conclusion about the two groups.

If the company's analysis was "delusional" when it came to Ukraine, why should we have any confidence that its analysis on Russia and the DNC is more sound?

Answer: We shouldn't.

[Jun 14, 2017] Now some fragments of the picture of DNC hack fall into place and one interesting hypothesis is that it was a false flag operation performed by the CrowdStrike, the same firm which were later assigned to investigate the hack.

Notable quotes:
"... So from now on any contact with Russians officials are assumed to be poisonous, a threat to the USA security, and should be reported to Intelligence services. Like in the USSR were contacts with Western officials. ..."
"... But now some fragments of the picture of DNC hack fall into place and one interesting hypothesis is that it was a false flag operation performed by the CrowdStrike, the same firm which were later assigned to investigate the hack. Which would be in best CIA traditions, stemming from JFK murder investigation and Warren commission. ..."
"... So I suspect all opinions of US intelligence agencies about this hack are just a part of color revolution scenario: the attempt to delegitimize the sitting government and install a new government via a coup d'état. ..."
"... The NSA document was very important. It basically proved, according to Scott Ritter, that the NSA had no real evidence of any Russian involvement, and relied on speculation from a single source: DNC contractor CrowdStrike, which recently had to retract a similar claim about Russian hacking of Ukrainian artillery. The real story behind 'Reality Winner' remains, I am sure, unknown. ..."
"... This makes the refusal of the DNC to let the FBI examine those servers even more suspect. OTOH, one can see the thought processes in the DNC: A breach was discovered. If we blame the Russians not only do we further the neo-con agenda, but we also get to call anyone who publishes or cites the material taken from the servers a Russian tool. ..."
"... In fact, if they knew they had internal leakers, it would still be worth claiming to have been hacked by the Russians, so that internally leaked material could be 'poisoned' as part of a Russian plot. ..."
"... Talking points to this effect were ubiquitous and apparently well coordinated, turning virtually every MSM discussion of the content of the leaks into a screed about stolen documents and Russian hackers. It also put a nice fresh coat of paint on the target painted on Assange, turning the undiscerning left against a once valuable ally. ..."
Jun 14, 2017 | economistsview.typepad.com

libezkova, June 14, 2017 at 11:20 AM

""I did not have communications with the Russians," Mr. Sessions said in response to a question no one asked - and despite the fact that he had, in fact, met with the Russian ambassador, Sergey Kislyak, at least twice during the 2016 presidential campaign. The omission raised questions not only about his honesty, but also about why he would not disclose those meetings in the first place."

That's neo-McCarthyism plain and simple. Congradulations! We got it. Now we need to fire all Russian sympathizers from the government service, assuming that they exist. A very nice 17th century witch-hunt.

The only thing we do not have is resurrected Senator McCarthy (McCain is not good enough -- he does not drink).

So from now on any contact with Russians officials are assumed to be poisonous, a threat to the USA security, and should be reported to Intelligence services. Like in the USSR were contacts with Western officials.

That means that the joke that Russia Foreign Ministry played on April 1 (Google it) about ordering Russian diplomat contact for your political opponent proved to be true.

But now some fragments of the picture of DNC hack fall into place and one interesting hypothesis is that it was a false flag operation performed by the CrowdStrike, the same firm which were later assigned to investigate the hack. Which would be in best CIA traditions, stemming from JFK murder investigation and Warren commission.

And I am now not surprised that nobody investigated Comey for outsourcing (or forced to outsource by threats) the "DNC hack" investigation to the very questionable firm with strong Ukrainian connections. Which might well be hired to perform the hack and blame it on Russian to hide Seth Rich story.

If Trump would not be such an idiot, he would site this as a reason of firing Comey (gross unprofessionalism and criminal negligence) and the level of fear in Clinton Mafia after that might help him to survive.

The truth is that FBI never has any access to DNC computers. None. Unlike in case of Hillary emailgate, they never were in possession of actual hardware. And they never explored Ukrainian connection, so to speak. They took all results from CrowdStrike investigation at face value.

So I suspect all opinions of US intelligence agencies about this hack are just a part of color revolution scenario: the attempt to delegitimize the sitting government and install a new government via a coup d'état.

The fighting against Russiagate is about the defense of remnants of Democracy in the USA.

Regurgitation of MSM stories, like Fred is doing, does not add much value to this blog. It is essentially a propaganda exercise. If your urge to share them is too strong, as Mr.Bill mentioned a simple link would be enough (actually the desire to read on this topic NYT might be considered as an early sign of dementia, or Alzheimer)

libezkova -> libezkova ... June 14, 2017 at 11:59 AM

An interesting comment from Naked Capitalism

http://www.nakedcapitalism.com/2017/06/200pm-water-cooler-6122017.html#comment-2829184

Skip Intro , June 12, 2017 at 4:36 pm

The NSA document was very important. It basically proved, according to Scott Ritter, that the NSA had no real evidence of any Russian involvement, and relied on speculation from a single source: DNC contractor CrowdStrike, which recently had to retract a similar claim about Russian hacking of Ukrainian artillery. The real story behind 'Reality Winner' remains, I am sure, unknown.

This might well be a ploy to undermine the anti-Russia hype, though the media cartel has trumpeted it uncritically for the short-term rush of goosing the Comey spectacle.

This makes the refusal of the DNC to let the FBI examine those servers even more suspect. OTOH, one can see the thought processes in the DNC: A breach was discovered. If we blame the Russians not only do we further the neo-con agenda, but we also get to call anyone who publishes or cites the material taken from the servers a Russian tool.

In fact, if they knew they had internal leakers, it would still be worth claiming to have been hacked by the Russians, so that internally leaked material could be 'poisoned' as part of a Russian plot.

Talking points to this effect were ubiquitous and apparently well coordinated, turning virtually every MSM discussion of the content of the leaks into a screed about stolen documents and Russian hackers. It also put a nice fresh coat of paint on the target painted on Assange, turning the undiscerning left against a once valuable ally.

[Jun 14, 2017] Strange Oversight by Comey tells us a lot by Ray McGovern

Notable quotes:
"... Given the stakes involved in the Russia-gate investigation – now including a possible impeachment battle over removing the President of the United States – wouldn't it seem logical for the FBI to insist on its own forensics for this fundamental predicate of the case? Or could Comey's hesitancy to demand access to the DNC's computers be explained by a fear that FBI technicians not fully briefed on CIA/NSA/FBI Deep State programs might uncover a lot more than he wanted? ..."
"... "In the case of the DNC, and, I believe, the DCCC, but I'm sure the DNC, we did not have access to the devices themselves. We got relevant forensic information from a private party, a high-class entity, that had done the work. But we didn't get direct access." ..."
"... "Isn't content an important part of the forensics from a counterintelligence standpoint?" ..."
"... "It is, although what was briefed to me by my folks – the people who were my folks at the time is that they had gotten the information from the private party that they needed to understand the intrusion by the spring of 2016." ..."
"... Burr demurred on asking Comey to explain what amounts to gross misfeasance, if not worse. Perhaps, NBC could arrange for Megyn Kelly to interview Burr to ask if he has a clue as to what Putin might have been referring to when he noted, "There may be hackers, by the way, in the United States who very craftily and professionally passed the buck to Russia." ..."
"... Given the congressional intelligence "oversight" committees' obsequiousness and repeated "high esteem" for the "intelligence community," there seems an even chance that – no doubt because of an oversight – the CIA/FBI/NSA deep-stage troika failed to brief the Senate "oversight committee" chairman on WikiLeaks "Vault 7" disclosures – even when WikiLeaks publishes original CIA documents. ..."
Jun 13, 2017 | original.antiwar.com

Given the stakes involved in the Russia-gate investigation – now including a possible impeachment battle over removing the President of the United States – wouldn't it seem logical for the FBI to insist on its own forensics for this fundamental predicate of the case? Or could Comey's hesitancy to demand access to the DNC's computers be explained by a fear that FBI technicians not fully briefed on CIA/NSA/FBI Deep State programs might uncover a lot more than he wanted?

Comey was asked again about this curious oversight on June 8 by Senate Intelligence Committee Chair Richard Burr:

BURR: "And the FBI, in this case, unlike other cases that you might investigate – did you ever have access to the actual hardware that was hacked? Or did you have to rely on a third party to provide you the data that they had collected?"

COMEY: "In the case of the DNC, and, I believe, the DCCC, but I'm sure the DNC, we did not have access to the devices themselves. We got relevant forensic information from a private party, a high-class entity, that had done the work. But we didn't get direct access."

BURR: "But no content?"

COMEY: "Correct."

BURR: "Isn't content an important part of the forensics from a counterintelligence standpoint?"

COMEY: "It is, although what was briefed to me by my folks – the people who were my folks at the time is that they had gotten the information from the private party that they needed to understand the intrusion by the spring of 2016."

Burr demurred on asking Comey to explain what amounts to gross misfeasance, if not worse. Perhaps, NBC could arrange for Megyn Kelly to interview Burr to ask if he has a clue as to what Putin might have been referring to when he noted, "There may be hackers, by the way, in the United States who very craftily and professionally passed the buck to Russia."

Given the congressional intelligence "oversight" committees' obsequiousness and repeated "high esteem" for the "intelligence community," there seems an even chance that – no doubt because of an oversight – the CIA/FBI/NSA deep-stage troika failed to brief the Senate "oversight committee" chairman on WikiLeaks "Vault 7" disclosures – even when WikiLeaks publishes original CIA documents.

Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. He was an Army Infantry/Intelligence officer and CIA analyst for a total of 30 years and now servers on the Steering Group of Veteran Intelligence Professionals for Sanity (VIPS). Reprinted with permission from Consortium News .

[Jun 10, 2017] CrowdStrike, The DNCs Security Firm, Was Under Contract With The FBI

Notable quotes:
"... After the alleged hacking, the DNC retained a private security firm - CrowdStrike - which made the determination that the Russian government was responsible, setting into motion a chain of Russia-related events that continue to unfold even now. ..."
"... TYT can report that at the same time CrowdStrike was working on behalf of the DNC, the company was also under contract with the FBI for unspecified technical services. ..."
"... The most prominent "private, non-partisan security firm" is CrowdStrike, and despite Kelly's use of the term "non-partisan" to describe the firm, its fiduciary relationship with the DNC suggests otherwise. As the journalist Yasha Levine wrote in The Baffler ..."
"... Far from establishing an airtight case for Russian espionage, CrowdStrike made a point of telling its DNC clients what it already knew they wanted to hear: after a cursory probe, it pronounced the Russians the culprits. Mainstream press outlets, primed for any faint whiff of great-power scandal and poorly versed in online threat detection, likewise treated the CrowdStrike report as all but incontrovertible. ..."
"... In April 2016, two months before the June report was issued, former President Barack Obama appointed Steven Chabinsky, "general counsel and Chief Risk officer" for CrowdStrike, to a presidential "Commission for Enhancing Cybersecurity," further demonstrating CrowdStrike's intermingling with powerful Democratic Party factions. ..."
"... Neither the FBI nor CrowdStrike responded to requests for comment on the nature of the services provided. As of yet, the only entity known to receive primary access to the DNC servers is CrowdStrike. At a Senate Intelligence Committee hearing in January, Comey testified that the FBI had been denied access to the servers by the DNC after repeated requests. And unnamed FBI officials told reporters , "The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated." ..."
"... Effectively, information that is now central to massively consequential geopolitical disputes has been "privatized" and held exclusively by a profit-seeking entity. CrowdStrike's findings continue to be repeated by journalists and politicians with unflinching certainty - despite the fact that it was forced to retract a central element of another report involving related malware attribution, raising doubts about the reliability of its DNC conclusions. As Jeffrey Carr, a security researcher who has been critical of CrowdStrike's methods, told me: "The foundation of placing the blame on Russia was false." ..."
"... Power to determine world events is increasingly being concentrated in the hands of a tiny group of self-proclaimed "experts" who aren't accountable to the public, but to clients and investors. CrowdStrike, evidently benefitting from the surge in PR, announced last month that it had been valued at one billion dollars. ..."
Jun 10, 2017 | medium.com

Claims of "Russian interference" have been ubiquitous in U.S. political discourse for almost a full year now; these often amount to a mélange of allegations ranging from "hacking" to "influence campaigns" to "online trolls" sent by the Kremlin to harangue unsuspecting Midwestern voters. "Hacking," however, remains the centerpiece of the narrative - the idea that Russian state actors "hacked" the Democratic National Committee and exfiltrated emails is routinely cited as the centerpiece of the overall "interference" thesis. After the alleged hacking, the DNC retained a private security firm - CrowdStrike - which made the determination that the Russian government was responsible, setting into motion a chain of Russia-related events that continue to unfold even now.

https://medium.com/media/b15fd1fe3dbf2ead20873d6331996555?postId=c6f884c34189

TYT can report that at the same time CrowdStrike was working on behalf of the DNC, the company was also under contract with the FBI for unspecified technical services. According to a US federal government spending database, CrowdStrike's "period of performance" on behalf of the FBI was between July 2015 and July 2016. CrowdStrike's findings regarding the DNC server breach - which continue to this day to be cited as authoritative by everyone from former FBI Director James Comey, to NBC anchor Megyn Kelly - were issued in June 2016, when the contract was still active.

Last week at a forum with Vladimir Putin, Kelly listed all the authoritative American entities which she claimed have corroborated the conclusion that Russian state actors "interfered" in the 2016 presidential election. (Notwithstanding its vagueness and imprecision, the term "interference" has come to be the standard term American media personalities invoke when seeking to describe how "Russians" maliciously undermined the sanctity of the 2016 US election process.) Querying Putin, Kelly repeated the canard that "17 intelligence agencies" had all independently concluded that Russia indeed "interfered" - whatever that means, exactly. She then continued: "Even private, non-partisan security firms say the same that Russia interfered with the US election."

The most prominent "private, non-partisan security firm" is CrowdStrike, and despite Kelly's use of the term "non-partisan" to describe the firm, its fiduciary relationship with the DNC suggests otherwise. As the journalist Yasha Levine wrote in The Baffler,

Far from establishing an airtight case for Russian espionage, CrowdStrike made a point of telling its DNC clients what it already knew they wanted to hear: after a cursory probe, it pronounced the Russians the culprits. Mainstream press outlets, primed for any faint whiff of great-power scandal and poorly versed in online threat detection, likewise treated the CrowdStrike report as all but incontrovertible.

In April 2016, two months before the June report was issued, former President Barack Obama appointed Steven Chabinsky, "general counsel and Chief Risk officer" for CrowdStrike, to a presidential "Commission for Enhancing Cybersecurity," further demonstrating CrowdStrike's intermingling with powerful Democratic Party factions.

Neither the FBI nor CrowdStrike responded to requests for comment on the nature of the services provided. As of yet, the only entity known to receive primary access to the DNC servers is CrowdStrike. At a Senate Intelligence Committee hearing in January, Comey testified that the FBI had been denied access to the servers by the DNC after repeated requests. And unnamed FBI officials told reporters , "The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated."

Comey's long-awaited Congressional testimony on Thursday may provide additional insight into the FBI's reliance on the firm.

Effectively, information that is now central to massively consequential geopolitical disputes has been "privatized" and held exclusively by a profit-seeking entity. CrowdStrike's findings continue to be repeated by journalists and politicians with unflinching certainty - despite the fact that it was forced to retract a central element of another report involving related malware attribution, raising doubts about the reliability of its DNC conclusions. As Jeffrey Carr, a security researcher who has been critical of CrowdStrike's methods, told me: "The foundation of placing the blame on Russia was false."

Power to determine world events is increasingly being concentrated in the hands of a tiny group of self-proclaimed "experts" who aren't accountable to the public, but to clients and investors. CrowdStrike, evidently benefitting from the surge in PR, announced last month that it had been valued at one billion dollars.

[Jun 08, 2017] DNC Caught; Fake Russian Hacker A CIA Contractor by Pet Rock

That's too simplistic: DNC leak did caused damage for Clinton campaign.
Notable quotes:
"... What is particularly suspicious is that CrowdStrike is the only cybersecurity entity that has ever been given unfettered access to the DNC servers. ..."
"... CrowdStrike can't even be trusted to perform illegal hacking proficiently, much less confirm the true source of the DNC email hack. Therefore, if CrowdStrike asserts that the hackers were Russian, we know that Russia had absolutely nothing to do with it. ..."
"... CTO Dmitri Alperovitch is a creation of Deep State , and was carefully set up as the point man for the hacking scheme. His entire family history reflects a pattern of double agents who were easily enlisted to work for the US government in order to maintain their "in-country status". All the evidence even points to Alperovitch working for Ukraine intelligence, which significantly demonstrates his motives to pin the hacking on the Kremlin.[1] ..."
Jun 08, 2017 | www.ashtarcommandcrew.net

CONFIRMED: DNC paid the 'Russian' founder of CrowdStrike to hack its server so it could be blamed on Russia!

DMITRI ALPEROVITCH, CTO, CrowdStrike

DNC Hackers Finally Identified

The Millennium Report

Would you trust this guy with technically verifying who perpetrated the alleged Russian hack? Believe it or not, the above photo of CTO Dmitri Alperovitch was taken directly from CrowdStrike's official website, the "American cybersecurity technology company" tasked with the digital sleuthing of the DNC server hack.

Key Point: CrowdStrike has since been proven to be a criminal hacking organization by Internet investigators. The shadowy cyber-firm was founded by a Russian-American so that the U.S. Intelligence Community could use it to perpetrate 'Russian' hacks. In this way, CrowdStrike methodically fabricates fake evidence on demand for the CIA/NSA/FBI which can then be blamed on Russia.

In the fictitious Russian election hack case, CrowdStrike was the CIA contractor paid to create digital evidence with fake Russian "signatures" in order to incriminate the Kremlin. This fabrication of evidence appears to have been perpetrated in collusion with the creators of Guccifer 2.0. Did Guccifer 2.0 Fake "Russian Fingerprints?"

Here's another fake report produced by CrowdStrike regarding a hacked "Ukrainian artillery app" during the Ukrainian War. It's important to note that the following mainstream media account was published by Voice of America (VOA) -- "a United States government-funded multimedia news outlet".

Cyber Firm Rewrites Part of Disputed Russian Hacking Report

What is particularly suspicious is that CrowdStrike is the only cybersecurity entity that has ever been given unfettered access to the DNC servers.

CrowdStrike can't even be trusted to perform illegal hacking proficiently, much less confirm the true source of the DNC email hack. Therefore, if CrowdStrike asserts that the hackers were Russian, we know that Russia had absolutely nothing to do with it.

As a matter of documented fact, it was actually CrowdStrike who hacked the DNC server before the 2016 election. The following exposé is a MUST READ for anyone who wants to know the real back story. DNC Russian Hackers Found!


HERE'S HOW THEY DID IT:

Source – " Bear Hunting: History and Attribution of Russian Intelligence Opera... " posted by CrowdStrike at slideshare.net

The plot to frame Russia -- for the DNC's own criminal conspiracy -- was closely coordinated between the DNC and the CIA and carried out with the full support of the Obama Administration. Given that the heads of virtually all 17 agencies within the U.S. Intelligence Community were ready and willing to support the necessary crime wave, it was an obvious brainchild of Deep State .

CTO Dmitri Alperovitch is a creation of Deep State , and was carefully set up as the point man for the hacking scheme. His entire family history reflects a pattern of double agents who were easily enlisted to work for the US government in order to maintain their "in-country status". All the evidence even points to Alperovitch working for Ukraine intelligence, which significantly demonstrates his motives to pin the hacking on the Kremlin.[1]

The preceding graphic delineates the time frame according to which CrowdStrike was stealthily employed by the DNC to eventually identify the fictitious 'Russian' hackers. They even named the alleged state actor COZY BEAR and FANCY BEAR. That's because all they do -- 24/7 -- is hunt Russian bear even where they don't exist.


BOTTOM LINE

There are very good reasons why this story will not go away, and only gets bigger with each passing day. When the CIA, DNC, CrowStrike et al. started off with such a flagra... Because this complex and convoluted criminal conspiracy is being used as a basis to instigate a war against Russia, it's really just another classic false flag operation. Such CIA-conceived black ops, that are then used as NSA-driven global PsyOps, can only come this far when Deep State so orders it. Their ultimate goal is to overthrow the Trump presidency before their New World Order agenda is thwarted any further.

CONCLUSION

Perhaps these highly radioactive details explain the now-notorious grin worn by Dmitri Alperovitch in his company photo posted above.

[Jun 07, 2017] CIA contractor-CrowdStrike owner is DNC Russian hacker...Works for the DNC

Jun 07, 2017 | www.puppetstringnews.com

​... ... ..

Key Point: CrowdStrike has since been proven to be a criminal hacking organization by Internet investigators. The shadowy cyber-firm was founded by a Russian-American so that the U.S. Intelligence Community could use it to perpetrate 'Russian' hacks. In this way, CrowdStrike methodically fabricates fake evidence on demand for the CIA/NSA/FBI which can then be blamed on Russia.

In the fictitious Russian election hack case, CrowdStrike was the CIA contractor paid to create digital evidence with fake Russian "signatures" in order to incriminate the Kremlin. This fabrication of evidence appears to have been perpetrated in collusion with the creators of Guccifer 2.0.

Well there you go America you have your Russian hacker, and it's a CIA contractor who is in charge of running the DNC computer system. This is how Democrats are claiming the Russian hack of the election and they're computer systems were rigged by Russia, because the owner of CrowdStrike who runs the DNC computer systems is Russian.

This officially destroys the Russia/Trump collusion Democrat conspiracy theory, because the DNC hired a Russian to run the parties computer system to make it look like a Russian hack just in case Trump won the election. Trump needs to bring up this man on Twitter, because the mentioning of this man by the President would absolutely destroy the Russia/Trump collusion. This kills the narrative by Democrats on Russia/Trump collusion for one reason only...The DNC has colluded with a Russian hacker to work on their computer system.

[Jun 07, 2017] CrowdStrike DNC s Private Cyber Security Firm Had A Contract With The FBI

Jun 07, 2017 | www.ashtarcommandcrew.net

TYT Politics reporter Michael Tracey (http://www.twitter.com/mtracey) reports that CrowdStrike, the cyber-security firm retained by the DNC to analyze its "hacked" servers, had a contract with the FBI.

[May 30, 2017] The Strata-Sphere DNCs Russian Hack NOT Investigated By FBI – But By DNC Contractor by AJStrata

So these guys had FBI contacts and they had Clinton contacts
Something was really wrong with Comey. Such an unprofessionalism is not excusable.
Notable quotes:
"... Three days after his discovery, Alperovitch was on a plane to Washington. He'd been asked to vet a paragraph in a speech by the secretary of state, Hillary Clinton . She'd decided, for the first time, to call out another country for a cyberattack. "In an interconnected world," she said, "an attack on one nation's networks can be an attack on all." ..."
"... Alperovitch removed the word China from his analysis, calling the operation Shady Rat instead. He told me that James's intervention accelerated his plans to leave Intel. ..."
"... So these guys had FBI contacts and they had Clinton contacts. What else did they have? Would anyone believe connections to DHS : ..."
"... To recap, all the claims of Russian involvement with DNC (and by extension Team Trump) is based on claims by a firm with roots back to the Obama FBI, to Secretary of State Hillary Clinton and to DHS? This is the only evidence we have of Russian efforts to tilt this election (as opposed to efforts by Democrat operatives in the Deep State to tilt the election)? ..."
"... note: this site is a bit tinfoil hat for me, but I liked the way these paragraphs summarized where we are on this ..."
"... In fact, only two hackers were found to have been in the system and were both identified by Alperovitch as Russian FSB (CIA) and the Russian GRU (DoD). It is only Alperovitch who claims that he knows that it is Putin behind these two hackers. ..."
"... The ridiculously fake cyber-attack assessment done by Alperovitch and CrowdStrike naïvely flies in the face of the fact that a DNC insider admitted that he had released the DNC documents. ..."
"... I just seems crazy that all this diversion by the news media and Democrats is based on the unsubstantiated claims of a company that epitomizes what it means to be part of the Political Industrial Complex ..."
"... The Political Industrial Complex encompasses all those elites whose livelihoods are predicated on central-control of resources and who determine who is allowed to succeed in society. It is a bipartisan exclusive club. It includes the Politicians and their career staffers. It includes crony donors and lobbyists who reap government windfalls and special treatment that average citizens cannot obtain. It includes the PIC industrial base of pollsters, consultants, etc. And it includes the pliant news media, whose success rest on access to those in power, and in return for access making sure no bad news will disrupt said power. ..."
Apr 02, 2017 | strata-sphere.com

The fantasy story line inside the Political Industrial Complex* (PIC) is that Team Trump colluded with Russia to tilt last year's election to Trump. Of course the endless screw ups by Team Clinton, and the high level of frustration across this great land with PIC and its elites, had nothing to do with the election results. It has to be those pesky Russkies!

The story goes that the FBI – and all 16 intelligence agencies – concur that the Russians were targeting the Democrats, and this began with the exposure of DNC emails prior to the Democrat convention last year.

Well, that's ONE STORY

A fuller picture is becoming evident. One where nearly all the conclusions of Russian influence are based upon a report from one company – a company contracted by the DNC --

On Thursday, a senior law enforcement official told CNN that the DNC "rebuffed" the agency's request to physically examine its computer servers after the alleged hacking. Instead, the FBI relied on CrowdStrike's assessment that the servers had most likely been hacked by Russian agents.

"The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed until well after the initial compromise had been mitigated," CNN quoted the senior law enforcement official as saying. "This left the FBI no choice but to rely upon a third party for information.

Sounds just like Hillary Clinton and her email server – where the government cannot do a real investigation of the actual computer evidence. If this sounds fishy, it is. Because this company is not a middle of the road, independent agent.

It is, in fact, a young start-up with much of its prior success tied to the Obama administration (less now than when it began 6 years ago), and of course its future rests in the hands of the Intelligence Community and the niche community of federal cyber-security specialists. All who make their living off the federal government in one way or the other. They know who is lining their bank accounts

One of the founders is Dmitri Alperovitch who was born in Moscow, Russia in 1980 and who moved with his family to the US in 1990. Clearly he had not forged nefarious ties to Putin's regime by the age of 10 when he emigrated, so his Russian background is not really of much interest. But he does have an interesting past, which I will get to in a second.

While I was attempting to do some digging on all this I discovered someone had done all the work already. So let me give credit where credit is due: CrowdStrike leadership has significant ties to Obama and the Democrats:

Founder Dmitri Alperovitch has been the best known face of CrowdStrike, partly due to the profile feature done on him by Esquire in late 2016. But his co-founder, George Kurtz – like Alperovitch, a former executive at McAfee – has had a high professional profile as well.

Worth noting at the outset is that Kurtz obtained a $26 million financing deal for the CrowdStrike start-up in February 2012 from equity giant Warburg Pincus , after Kurtz had been serving there as the "entrepreneur in residence."

This equity firm is where the initial seed money for CrowdStrike came from (Warburg was the only capital investor at the beginning; Google came in with the $100 million in 2015).

Warburg Pincus remains a primary investor in CrowdStrike, along with Google and Accel Partners . In 2016, Warburg, whose president since 2014 has been Tim Geithner , Obama's former secretary of the treasury, raised $29,709 for Hillary Clinton , the largest single recipient of campaign funds raised by Warburg employees and PACs. (No contributions were made through Warburg-related entities to Donald Trump.)

Then there's the linked-ness of the CrowdStrike executive stable. Steven Chabinsky, CrowdStrike's General Counsel and Chief Risk Officer, was named to Obama's Commission on Enhancing National Cybersecurity in April 2016 .

That's partly because Chabinsky was Deputy Assistant Director of the FBI's Cyber Division and Chief of the FBI's Cyber Intelligence Section before he left the Bureau for private life in 2012 (the year he joined CrowdStrike ).

But there's more. [Shawn] Henry is the president of CrowdStrike Services, and the Chief Security Officer (CSO) for the company. But when he came on with CrowdStrike, in April 2012 , he was coming off his final position with the FBI: Executive Assistant Director of the Criminal, Cyber, Response, and Service Branch. (Or, as he was usually referred to, the "FBI's top cyber official.")

In other words, CrowdStrike scored the FBI's two biggest Obama-era cybersecurity names – Henry and Chabinsky – the year it was formed as a start-up .

Strong ties to Obama's FBI, and one would assume FBI Director Comey. Hmmm .

Let's get back to Dimitri now, and his connections to the Democrats :

Alperovitch's first big break in cyberdefense came in 2010 , while he was at McAfee. The head of cybersecurity at Google told Alperovitch that Gmail accounts belonging to human-rights activists in China had been breached. Google suspected the Chinese government. Alperovitch found that the breach was unprecedented in scale; it affected more than a dozen of McAfee's clients.

Three days after his discovery, Alperovitch was on a plane to Washington. He'd been asked to vet a paragraph in a speech by the secretary of state, Hillary Clinton . She'd decided, for the first time, to call out another country for a cyberattack. "In an interconnected world," she said, "an attack on one nation's networks can be an attack on all."

Now just hold on one second here. How in the world does a nobody at MacAfee get on a plane to meet the Secretary of State in just 3 days? No vetting? No preliminaries with underlings? Just fly out to DC to review a single paragraph??

This has to be fictional drama.

BTW, earlier in the same article we have this contrary story line:

In 2011, he was working in Atlanta as the chief threat officer at the antivirus software firm McAfee. While sifting through server logs in his apartment one night, he discovered evidence of a hacking campaign by the Chinese government. Eventually he learned that the campaign had been going on undetected for five years, and that the Chinese had compromised at least seventy-one companies and organizations, including thirteen defense contractors, three electronics firms, and the International Olympic Committee.

While Alperovitch was writing up his report on the breach, he received a call from Renee James, an executive at Intel, which had recently purchased McAfee. According to Alperovitch, James told him, "Dmitri, Intel has a lot of business in China. You cannot call out China in this report."

Alperovitch removed the word China from his analysis, calling the operation Shady Rat instead. He told me that James's intervention accelerated his plans to leave Intel.

So which story-line is the right one? Not sure, but let's just say not just anyone gets called to review Hillary's speeches.

So these guys had FBI contacts and they had Clinton contacts. What else did they have? Would anyone believe connections to DHS :

Through their common roots in McAfee, Alperovitch and Kurtz have an extensive history with top cyber expert Phyllis Schneck, who appears in the Esquire piece from October. In fact, Alperovitch and Schneck were at Georgia Tech together (see the Esquire article), and later were vice presidents of McAfee at the same time Kurtz was McAfee's chief technology officer (CTO). Alperovitch has obviously had a close professional relationship with Schneck; their names are both on four separate patent applications .

What is Schneck doing today? Since 2013, she's been the Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate (NPPD) – i.e., the chief cybersecurity official for the Department of Homeland Security (DHS) .

To recap, all the claims of Russian involvement with DNC (and by extension Team Trump) is based on claims by a firm with roots back to the Obama FBI, to Secretary of State Hillary Clinton and to DHS? This is the only evidence we have of Russian efforts to tilt this election (as opposed to efforts by Democrat operatives in the Deep State to tilt the election)?

Some final perspectives on how this is all playing out [ note: this site is a bit tinfoil hat for me, but I liked the way these paragraphs summarized where we are on this ]

Also remember that it is only Alperovitch and CrowdStrike that claim to have evidence that it was Russian hackers . In fact, only two hackers were found to have been in the system and were both identified by Alperovitch as Russian FSB (CIA) and the Russian GRU (DoD). It is only Alperovitch who claims that he knows that it is Putin behind these two hackers.

The ridiculously fake cyber-attack assessment done by Alperovitch and CrowdStrike naïvely flies in the face of the fact that a DNC insider admitted that he had released the DNC documents.

It is also absurd to hear Alperovitch state that the Russian FSB (equivalent to the CIA) had been monitoring the DNC site for over a year and had done nothing. No attack, no theft, and no harm was done to the system by this "false-flag cyber-attack" on the DNC – or at least, Alperovitch "reported" there was an attack.

I just seems crazy that all this diversion by the news media and Democrats is based on the unsubstantiated claims of a company that epitomizes what it means to be part of the Political Industrial Complex*

* The Political Industrial Complex encompasses all those elites whose livelihoods are predicated on central-control of resources and who determine who is allowed to succeed in society. It is a bipartisan exclusive club. It includes the Politicians and their career staffers. It includes crony donors and lobbyists who reap government windfalls and special treatment that average citizens cannot obtain. It includes the PIC industrial base of pollsters, consultants, etc. And it includes the pliant news media, whose success rest on access to those in power, and in return for access making sure no bad news will disrupt said power.

Tags: Clinton , CrowdStrike , DNC , Obama , Russian Hack , Trump

[Apr 04, 2017] VIDEO Ex-Obama Staffer Who Urged Spying On Trump Predicted 'Quick' Impeachment Weeks Before Election

Notable quotes:
"... Farkas serves on the Atlantic Council alongside Dmitri Alperovitch, co-founder of CrowdStrike, the third-party company utilized by the FBI to make its assessment about alleged Russian hacking into the Democratic National Committee (DNC). Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council. ..."
Apr 04, 2017 | www.breitbart.com
Speaking at a conference two weeks before the 2016 presidential election, Evelyn Farkas, a former top Obama administration official, predicted that if Donald Trump won the presidency he would "be impeached pretty quickly or somebody else would have to take over government," Breitbart News has found.

Farkas served as deputy assistant secretary of defense under the Obama administration. She has been in the spotlight since the news media last week highlighted comments she made on television that seemed to acknowledge efforts by members of the Obama administration to collect intelligence on Trump and members of his campaign.

Now it has emerged that at on October 26, 2016, Farkas made remarks as a panelist at the annual Warsaw Security Forum predicting Trump's removal from office "pretty quickly."

Asked at the event to address the priorities of a future Hillary Clinton administration, Farkas stated:

It's not a done deal, as you said. And so, to the Americans in the audience please vote. And not only vote but get everybody to vote. Because I really believe we need a landslide. We need an absolute repudiation of everything. All of the policies that Donald Trump has put out there. I am not afraid to be political. I am not hiding who I am rooting for. And I think it's very important that we continue to press forward until election day and through election day to make sure that we have the right results.

I do agree however with General Breedlove that even if we have the wrong results from my perspective America is resilient. We have a lot of presidential historians who have put forward very coherent the argument – they have given us examples of all of our horrible presidents in the past and the fact that we have endured. And we do have a strong system of checks and balances. And actually, if Donald Trump were elected I believe he would be impeached pretty quickly or somebody else would have to take over government. And I am not even joking.

Farkas was referring to General Philip Mark Breedlove, another panelist at the conference who served as Supreme Allied Commander Europe (SACEUR) of NATO Allied Command Operations. The panel discussion was about what to expect following the Nov. 8 presidential election.

Farkas has also been in the news after remarks she made as a contributor on MSNBC on March 2 resurfaced last week. In the comments , she said that she told former Obama administration colleagues to collect intelligence on Trump and campaign officials.

"I was urging my former colleagues and, frankly speaking, the people on the Hill, it was more actually aimed at telling the Hill people, get as much information as you can, get as much intelligence as you can, before President Obama leaves the administration," stated Farkas.

She continued:

Because I had a fear that somehow that information would disappear with the senior [Obama] people who left, so it would be hidden away in the bureaucracy that the Trump folks – if they found out how we knew what we knew about their the Trump staff dealing with Russians – that they would try to compromise those sources and methods, meaning we no longer have access to that intelligence.

The White House has utilized Farkas's statements to bolster the charge that Trump was being illicitly surveilled during the campaign.

White House Spokesman Sean Spicer last week stated :

[I]f you look at Obama's Deputy Assistant Secretary of Defense that is out there, Evelyn Farkas, she made it clear that it was their goal to spread this information around, that they went around and did this.

They have admitted on the record that this was their goal - to leak stuff. And they literally - she said on the record "Trump's team." There are serious questions out there about what happened and why and who did it. And I think that's really where our focus is in making sure that that information gets out.

Farkas, a former adviser to Hillary Clinton's campaign, served as Deputy Assistant Secretary of Defense for Russia, Ukraine and Eurasia until she resigned in 2015.

She told the Daily Caller last week that she had no access to any intelligence. "I had no intelligence whatsoever, I wasn't in government anymore and didn't have access to any," she said.

Speaking to the Washington Post, Farkas denied being a source of any leaks.

The Post reported:

Farkas, in an interview with The Post, said she "didn't give anybody anything except advice," was not a source for any stories and had nothing to leak. Noting that she left government in October 2015, she said, "I was just watching like anybody else, like a regular spectator" as initial reports of Russia contacts began to surface after the election.

Farkas currently serves as a nonresident senior fellow at the Atlantic Council, which takes a hawkish approach toward Russia and has released numerous reports and briefs about Russian aggression.

The Council is funded by the Rockefeller Brothers Fund, Inc., the U.S. State Department, and NATO ACT. Another Council funder is the Ploughshares Fund, which in turn has received financing from billionaire George Soros' Open Society Foundations.

Farkas serves on the Atlantic Council alongside Dmitri Alperovitch, co-founder of CrowdStrike, the third-party company utilized by the FBI to make its assessment about alleged Russian hacking into the Democratic National Committee (DNC). Alperovitch is a nonresident senior fellow of the Cyber Statecraft Initiative at the Atlantic Council.

Last month, FBI Director James Comey confirmed that his agency never had direct access to the DNC's servers to confirm the hacking. "Well, we never got direct access to the machines themselves," he stated. "The DNC in the spring of 2016 hired a firm that ultimately shared with us their forensics from their review of the system."

National Security Agency Director Michael Rogers also stated the NSA never asked for access to the DNC hardware: "The NSA didn't ask for access. That's not in our job."

Recommended Links

Google matched content

Softpanorama Recommended

Top articles

[Aug 19, 2020] The Republican led Senate Select Committee on Intelligence repeats the lies about Guccifer 2.0 Published on Aug 19, 2020 | www.zerohedge.com

[Aug 16, 2020] CIA Behind Guccifer Russiagate A Plausible Scenario Published on Aug 16, 2020 | www.zerohedge.com

[Jun 03, 2020] Rule of law in Murrika is kaput Published on Jun 16, 2019 | www.zerohedge.com

[May 24, 2020] Guccifer 2.0 was always John Brennan 1.0 Published on May 24, 2020 | www.zerohedge.com

[May 24, 2020] Guccifer 2.0's Hidden Agenda : looks like Gussifer 2.0 was a false flag operation designed to smear WikiLeaks and distract from the content of the stolen by Seth Rich or some other insider DNC emails Published on May 24, 2020 | consortiumnews.com

[Mar 12, 2020] Did Joe Biden's Former IT Guy Masquerade as Guccifer 2.0 by Larry C Johnson Published on Mar 12, 2020 | turcopolier.typepad.com

[Feb 29, 2020] CrowdStrike s Dmitri Alperovitch by William F. Jasper Published on www.theamericanconservative.com

[Dec 22, 2019] So US intelligence tipped off the DNC that their emails were about to be leaked to Wikileaks. That's when the stratagem of attributing the impending Wikileaks release to a Russian hack was born -- distracting from the incriminating content of the emails, while vilifying the Deep State's favorite enemies, Assange and Russia, all in one neat scam Published on Dec 22, 2019 | turcopolier.typepad.com

[Dec 20, 2019] Did John Brennan's CIA Create Guccifer 2.0 and DCLeaks by Larry C Johnson Published on Dec 20, 2019 | turcopolier.typepad.com

[Dec 04, 2019] The central question of Ukrainegate is whether CrowdStrike actions on DNC leak were a false flag operation designed to open Russiagate and what was the level of participation of Poroshenko government and Ukrainian Security services in this false flag operation by Factotum Published on Dec 04, 2019 | turcopolier.typepad.com

[Dec 04, 2019] Common Funding Themes Link 'Whistleblower' Complaint and CrowdStrike Firm Certifying DNC Russia 'Hack' by Aaron Klein Published on Sep 28, 2019 | www.breitbart.com

[Dec 04, 2019] DNC Russian Hackers Found! You Won't Believe Who They Really Work For by the Anonymous Patriots Published on Jan 01, 2017 | themillenniumreport.com

[Dec 04, 2019] June 4th, 2017 Crowdstrike Was at the DNC Six Weeks by George Webb Published on Nov 27, 2019 | www.youtube.com

[Dec 04, 2019] Cyberanalyst George Eliason Claims that the "Fancy Bear" Who Hacked the DNC Server is Ukrainian Intelligence – In League with the Atlantic Council and Crowdstrike Published on Dec 04, 2018 | www.reddit.com

[Dec 04, 2019] Fancy Bear - Conservapedia Published on Dec 04, 2019 | www.conservapedia.com

[Dec 04, 2019] June 2nd, 2018 Alperovich's DNC Cover Stories Soon To Match With His Hacking Teams by George Webb Published on Nov 27, 2019 | www.youtube.com

[Nov 30, 2019] CrowdStrike: a Conspiracy Wrapped in a Conspiracy Inside a Conspiracy by Oleg Atbashian Published on Nov 29, 2019 | www.frontpagemag.com

[Nov 22, 2019] CROWDSTRIKE's role in the Democrat impeachment smokescreen needs to keep moving forward because, it is not going away. Published on Nov 22, 2019 | turcopolier.typepad.com

[May 11, 2019] Crowdstrike planted the malware on DNC systems, which they discovered later discovered and attributed to Russians later Published on Mar 03, 2018 | www.zerohedge.com

[May 11, 2019] Why Crowdstrike's Russian Hacking Story Fell Apart -- Say Hello to Fancy Bear Published on Dec 29, 2017 | www.washingtonsblog.com

[May 10, 2019] Mueller Report - Expensive Estimations And Elusive Evidence by Adam Carter Published on May 06, 2019 | turcopolier.typepad.com

[Apr 04, 2019] TEST IT YOURSELF, THE 2-SECOND-ROUNDING FACT PATTERN IN THE DNC EMAILS By William Binney and Larry Johnson Published on Apr 04, 2019 | turcopolier.typepad.com

[Mar 25, 2019] Spygate The True Story of Collusion (plus Infographic) by Jeff Carlson Published on Oct 12, 2018 | www.theepochtimes.com

[Mar 24, 2019] The manner in which Guccifer 2.0's English was broken, did not follow the typical errors one would expect if Guccifer 2.0's first language was Russian. Published on Mar 24, 2019 | www.zerohedge.com

[Mar 17, 2019] Mueller uses the same old false flag scams, just different packaging of his forensics-free findings Published on Mar 17, 2019 | consortiumnews.com

[Mar 17, 2019] VIPS- Mueller's Forensics-Free Findings Published on Mar 13, 2019 | Consortiumnews

[Oct 25, 2018] DNC Emails--A Seth Attack Not a Russian Hack by Publius Tacitus Published on Oct 25, 2018 | turcopolier.typepad.com

[Sep 16, 2018] Looks like the key players in Steele dossier were CIA assets Published on Aug 23, 2018 | turcopolier.typepad.com

[Jul 31, 2018] Is not the Awan affair a grave insult to the US "Intelligence Community? Published on Jul 31, 2018 | consortiumnews.com

[Jul 20, 2018] So many (ex-) MI6 operators (Steele, Tait, etc) involved in the story. It is interesting that the media don t question the intense involvement of the British in all this. And of course, the British haven t been laggards in adding fuel to the fire by the whole novichok hoax Published on Jul 20, 2018 | turcopolier.typepad.com

[May 29, 2018] Guccifer 2.0's American Fingerprints Reveal An Operation Made In The USA by Elizabeth Lea Vos Published on May 29, 2018 | www.zerohedge.com

[Mar 08, 2018] Given the CrowdStrike itself is a massively compromised organization due to its founder and CEO, those "certified true images" are themselves tainted evidence Published on Mar 08, 2018 | turcopolier.typepad.com

[Feb 04, 2018] DNC collusion with Ukrainian IT Security company Crowdstrike tied to the Atlantic Council to push false narrative of DNC hack and malware to influence US election Published on Feb 04, 2018 | www.zerohedge.com

[Jan 22, 2018] Joe diGenova Brazen Plot to Frame Trump Published on Jan 22, 2018 | www.youtube.com

[Dec 28, 2017] How CrowdStrike placed malware in DNC hacked servers by Alex Christoforou Published on Dec 28, 2017 | theduran.com

[Sep 17, 2017] The So-called Russian Hack of the DNC Does Not Make Sense by Publius Tacitus Published on Sep 05, 2017 | turcopolier.typepad.com

Sites

Why Crowdstrike's Russian Hacking Story Fell Apart- Say Hello to Fancy Bear

Why Crowdstrike's Russian Hacking Story Fell Apart 2 The DNI Report Faked Sources

Ukraine Tried to Tip the Election in Clinton's Favor

What is CrowdStrike? Firm Hired by DNC has Ties to Hillary Clinton, a Ukrainian Billionaire and Google

The CrowdStrike Story - YouTube

Crowstrike connections

"Conspiracy theories"

Wikileak

Alperovich presentations on YouTube

Crowdstrike products



Etc

Society

Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers :   Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism  : The Iron Law of Oligarchy : Libertarian Philosophy

Quotes

War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda  : SE quotes : Language Design and Programming Quotes : Random IT-related quotesSomerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose BierceBernard Shaw : Mark Twain Quotes

Bulletin:

Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 :  Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method  : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law

History:

Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds  : Larry Wall  : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOSProgramming Languages History : PL/1 : Simula 67 : C : History of GCC developmentScripting Languages : Perl history   : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history

Classic books:

The Peter Principle : Parkinson Law : 1984 : The Mythical Man-MonthHow to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite

Most popular humor pages:

Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor

The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D


Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.

FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.

This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...

You can use PayPal to to buy a cup of coffee for authors of this site

Disclaimer:

The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.

Last modified: July, 03, 2020