Israel Perfecting Surveillance Tech

By Philip Giraldi

Source

Israel’s external spy organization Mossad and its internal espionage equivalent Shin Bet have reputations that are much larger than their actual successes, but the one area where they have excelled is electronic intelligence gathering. Recent electronic spying around the White House and other federal buildings in Washington carried out by the Israeli Embassy demonstrates that Israel does not differentiate much between friends and enemies when it conducts espionage. In fact, spying targeting the U.S. is probably its number one priority due to the fact that the Jewish state is so heavily dependent on American support that it feels compelled to learn what discussions relating to it are taking place behind closed doors.

Israeli penetration of U.S. telecommunications began in the 1990s, when American companies like AT&T and Verizon, the chief conduits of the National Security Agency (NSA) for communications surveillance, began to use Israeli-produced hardware, particularly for law enforcement-related surveillance and clandestine recording. The devices had a so-called back door, which meant that everything they did was shared with Israel. Israeli cyber-specialists even broke into classified networks with the NSA and FBI aware of what was going on but unwilling to confront “America’s best ally.” President Bill Clinton once quipped to Monica Lewinski that they should avoid using the Oval Office phone because someone might be listening in. He was referring to Israel.

To be sure, the Jewish state’s high-tech sector has been much assisted in its effort by “own goals” provided by the United States, which allows Israel to bid on government contracts relating to national security, virtually guaranteeing that any technical innovations will be stolen and re-exported by Israeli high-tech companies. Major technology innovators like Intel, which works with the NSA, have set up shop in Israel and have publicly stated, “We think of ourselves as an Israeli company as much as a U.S. company.” Vulture capitalist Zionist billionaire Paul Singer has recently been accused of steering highly paid U.S. tech sector jobs to Israel, jobs that are lost to the American economy forever.

So, Israel is a leader in using electronic resources to carry out espionage and collect information on various targets of interest. Israel is also an innovator, and its close relationship with the U.S. intelligence community (IC), most particularly the NSA, means that technologies and procedures developed by the Jewish state will inevitably show up in America.

The U.S. is in any event working hard on its own tools for managing the public, spurred by Covid-19 hysteria. Special ID cards could help track the health status of individuals. This status would be recorded and updated on a chip readable by government scanners that, by some accounts, might be either carried or even permanently embedded in everyone’s body. Another plan being promoted in a joint venture by Apple and Google that appears to have White House support involves “add[ing] technology to their smartphone platforms that will alert users if they have come into contact with a person with Covid-19. People must opt into the system, but it has the potential to monitor about a third of the world’s population” with monitoring done by central computers. Once the legal principle is established that phones can be manipulated to do what is now an “illegal search,” there are no technical or practical limits to what other tasks could also be performed.

Developments in Israel

With those steps being taken to control the movements of possibly infected citizens in mind, some recent developments in Israel are, to put it mildly, ominous. The Jewish state is currently achieving multi-level 24/7 surveillance of everyone residing in the country conducted in real time. Investigative reporter and peace activist Richard Silverstein describes in some detail why it is happening now, what it means, and how it works.

Per Silverstein, Israel, like every other authoritarian state, is currently taking advantage of the distraction caused by the coronavirus pandemic. Prime Minister Benjamin Netanyahu, whose political fortunes seemed to be on the wane due to three hung elections, exploited the fear of the virus to assume emergency powers and obtain Knesset approval to use a highly classified national database “compiled by the Shin Bet and comprising private personal data on every Israeli citizen, both Jewish and Palestinian. In the aftermath of 9/11, Israel’s Knesset secretly assigned its domestic intelligence agency the task of creating the database, which was ostensibly meant as a counterterrorism measure.”

The database, nicknamed “The Tool,” includes names, addresses, phone numbers, employment, and educational information but it goes well beyond that in using phone tracking data to record every phone call made by the individual to include names and numbers of those called and the geo-location of where the call was made from. Phone tracking also enabled Shin Bet to create a log of where the caller traveled in Israel and the occupied territories. Internet use, if active on the phone, was also recorded. It is as complete and total surveillance of an individual as is possible to obtain and it does not involve any human participation at all, every bit of it being done by computer.

Netanyahu publicly proclaimed his intention to use the database, stating that it would be employed to combat the coronavirus, which he described as a threat to national survival. As a result of the claimed crisis, he and his principal opponent, Blue and White party leader Benny Gantz, were able to come to terms on April 20 to form a “national emergency unity government” with Netanyahu as prime minister yet again.

The exploitation of the fear of the virus plus that revelation about Israel’s powerful technical tool to thwart it produced a victory for Netanyahu, who effectively portrayed himself as a strong and indispensable leader, erasing the stigma resulting from his pending trial on charges of massive corruption while in office. One of the first steps Netanyahu will reportedly take is to replace the attorney general and state prosecutor who were seeking to send him to prison, effectively taking away the threat that he might go to prison.

The exposure of the existence of the database inevitably led to charges that Netanyahu had, for personal gain, revealed Israel’s most powerful counterterrorism weapon. There were also concerns about the significance of the huge body of personal information collected by Shin Bet, to include suggestions that it constituted a gross violation of civil liberties. But carefully stoked fear of the virus combined with some political deals and maneuvers meant that use of the data was eventually approved by the Knesset security committee at the end of March.

Israel, which has closed its borders, and which still has a relatively low level of coronavirus infections and deaths, has already started using the Shin Bet database while also turning the attempts to deal with the disease as something like an intelligence war. The information obtained from “The Tool” enables the police and military to determine if someone were standing near someone else for more than a few minutes. If the contact included someone already infected, all parties are placed under quarantine. Any attempt to evade controls leads to arrest and punishment of a six-month prison term plus a $1,500 fine. Armed soldiers patrolling the streets are empowered to question anyone who is out and about.

Mossad is also involved in fighting the virus, boasting of having “stolen” 100,000 face masks and also respirators from a neighboring country presumed to be the United Arab Emirates. Silverstein observes that “Israel’s far-right government has militarized the contagion. Just as a hammer never met a nail it didn’t want to pound, it is only natural for a national security state like Israel to see Covid-19 as a security threat just as much or more than a health threat.” And when it comes to bioweapons, Israel is no parvenu. Ironically, the hidden story behind the “war on the coronavirus” is that Israel is itself one of the most advanced states in developing and testing biological weapons at its lab at Nes Tziona.

Returning to the emergence of “The Tool,” hardline Defense Minister Naftali Bennett has also suggested monetizing the product by selling a “civilian version of it,” to include its operating system, analytic capabilities, and setup details to foreign countries, including the United States. Israel has already successfully marketed to security agencies and governments a similar product called Pegasus, which has been described as the most sophisticated malware on the market.

Like The Tool, Pegasus does data mining and real-time analysis of individuals based on a range of collection techniques. The Israeli cyber company NSO Group that markets Pegasus was recently involved in an attempt to hack Facebook-owned secure communications system Whats-App, targeting journalists and political activists, on behalf of an unknown client. Ironically, it is believed that Facebook had earlier used NSO Group’s somewhat shadowy services. Perhaps more notoriously, Pegasus was also used to monitor contacts and establish physical location in the case of journalist Jamal Khashoggi, who was murdered by Saudi intelligence agents in Istanbul.

So, Americans should beware when confronted by the new cyber-security software being promoted by Israel because the Jewish state is also exporting its own vision of a centrally controlled militarized state where all rights are potentially sacrificed for security. As whistleblower Edward Snowden has already revealed, the NSA has the capability to collect vast amounts of information on citizens. If the United States government falls for the bait and moves in the Israeli direction, using that data to enable the surveillance and manage all the people all the time, the temptation will be great to employ the new capability even if its use is not strictly speaking warranted.

And there will be no one there to say nay to the new powers, not in Congress, on the Supreme Court or in the White House. And the media will be on board, too, arguing that security against external and internal threats requires some infringements of individual rights. It is one of the ironies of history that the United States of America, with its vast resources, large population and legacy of individual freedom, has been becoming more like its tiny militarized client state Israel. It is a tendency that must be resisted at all costs by every American who cares about fundamental liberties.

Whither Coronavirus? When Will It End and What Will Happen Along the Way

Whither Coronavirus? When Will It End and What Will Happen Along ...

Philip Giraldi March 26, 2020

The coronavirus story has generated a number of major subplots. First is the origin of the virus. Did it occur naturally or was it created in a Chinese, American or Israeli weapons lab? If bioengineered, did it somehow escape or was it deliberately released? As the governments that might have been involved in the process have become very tight lipped and the mainstream media is reluctant to embrace conspiracy theories, we the public may never know the answer.

Second is the nature of the virus itself. There are inevitably skeptics who choose to compare the affliction to a common head cold or normal winter flu and are able to cherry pick so-called experts to support their case. Many Americans are unwilling to submit to a lockdown or isolation and are flaunting their willingness to go out in public and mix freely while others are claiming that the whole thing is a hoax designed to create a panic that will benefit certain constituencies. There are press reports of teenagers going to supermarkets and faking a sneeze or a cough in the produce section to show their indifference to the infection avoidance guidelines now being promoted by the media and government. Some critics have also commented regarding the deaths of hundreds of Italians daily, suggesting that in Italy’s health care system old people were deliberately being allowed to die.

The fact is that when critically ill people die in hospitals it is sometimes attributable to triage. Triage arises when there are only limited resources to treat the sick, as in the case recently in the Italian Lombard city of Bergamo where hospitals were overwhelmed. Doctors must make the decision to treat those who are ill who are likely to survive as a first priority, meaning that others will only receive limited treatment. Italy has roughly the same number of hospital beds as does the United States per capita and it has more ventilators capable of being used to treat the advanced stages of the virus. It also is receiving assistance from both China and Russia on testing supplies and additional ventilators and masks. Italy has conducted far more coronavirus tests than has the U.S. The northern Italian medical services system was up to European standards, better than what prevails in the U.S., but it has been broken by the virus. Spain is heading the same way and there are similar concerns about France.

In spite of all the ideologically driven background clutter, genuinely knowledgeable medical authorities come down overwhelmingly promoting the view that the virus is highly contagious and capable of spreading rapidly, making it a pandemic, and it can be exceptionally lethal to certain demographics, including the elderly and those with weakened immune systems. The way of combatting it also appears to be agreed upon by most genuine experts i.e. that testing must be widespread to determine who is infected and those individuals should be isolated from contact with others for at least two weeks to limit the spread of the contagion. For those whose conditions worsen, hospitalization and treatment for possible respiratory failure are warranted.

The third big issue is the apparently deliberate failure of the Trump Administration to respond proactively to limit the spread of the virus. Seeking to protect the stock market more than the American public, President Donald Trump initially downplayed the impact of the virus, even calling it a “hoax” during January and February when it first appeared on U.S. soil. It turned out that several institutes affiliated to the Center for Disease Control to deal with epidemics had been dismantled by the Administration and, in spite of the warning provided by what was occurring in Wuhan, the U.S. made no effort to increase its supply of testing kits, masks or ventilators. Meanwhile, congressmen were receiving dire warnings of what was coming from the intelligence community in private briefings, leading to a number of senators selling their stock in anticipation of a market collapse. That is something called insider trading and it is illegal. It is also a measure of the corruption of America’s ruling class.

The fourth major subplot relates to what will come out of the pandemic once it is over, if it is indeed defeated at all. Critics rightly observe that the government response both at federal and state levels might well be a major overreaction to a health crisis that could possibly be dealt with using a lighter hand. Donald Trump has now called himself a “wartime president,” a particularly odd conceit in that America’s chief executive officer dodged the Vietnam war draft.  Trump is now providing daily rambling briefings emphasizing that his administration deserves a “10 out or 10” for its yeoman’s work against coronavirus. The real story is that the president personally inhibited initial efforts to respond to the disease and he is now attempting to regain lost ground by supporting draconian measures to include cash payments to all American residents, even to people who do not need the money. The money itself will have to be borrowed or printed, putting the United States even deeper in debt.

Based on his wartime status, the president and his cabinet are poised to exploit Civil War and Korean War legislation to assume powers over the economy and will likely arrange bailouts of some industries that will then acquire the government as a partner. The now declared “national emergency” will undoubtedly come to include some forms of martial law to enforce the isolation of targeted populations and it is also being reported that the Justice Department has asked Congress to allow judges to detain people indefinitely without trial during the “emergency.” As we have learned from the Patriot Act, Military Commissions Act and the Authorization to Use Military Force, allegedly temporary powers acquired by the executive branch have frequently become permanent. Unrestrained power in the hands of a Trump or Biden should frighten anyone who is still interested in voting in November.

There is some speculation that Trump might well follow the example being set by Prime Minister Benjamin Netanyahu of Israel. Israel has banned foreign visitors, is under 24 hours curfew and is effectively in lockdown. It is using cell phone intercepts provided by the intelligence services to track the comings and goings of Israeli residents. The monitoring is being justified as a mechanism to create a record of who is meeting whom and where to support isolation and lockdown efforts. A similar program is already active in the suburbs around Washington. The National Security Agency (NSA) already has the technical ability in place that would permit monitoring of the movements of much of the U.S. population. It would be an intelligence community dream and would fit quite nicely with Congress’s recent efforts to re-authorization certain Patriot Act aspects of the Foreign Intelligence Surveillance Act (FISA).

Fifth and finally, there is the politicization aspect of coronavirus. The virus is being “blamed” on China, a global competitor of the United States. As is often the case, Trump has gotten the ball rolling through his usual verbal toxicity, calling the virus the Chinese Virus or Wuhan Virus. Other Republicans have picked up on the theme, leading to the inevitably Democratic progressive wing complaints that such language was “racist.” The fact it, there is no evidence whatsoever that China in any deliberate way either created or unleashed the virus.

And, of course, there is Russia. It would almost seem an old joke that is no longer amusing to blame something new and menacing on Moscow and congress has so far largely refrained from doing so. But that does not mean that the Deep State establishment is holding the Kremlin and President Vladimir Putin blameless. The U.S. intelligence community, through its preferred propaganda sheet the New York Times, is now reporting that Russia is taking advantage of the coronavirus crisis to spread disinformation through Europe and also in the U.S. In particular, Putin has escalated a campaign-by-innuendo to reduce confidence in the outcome of the upcoming 2020 presidential election. In any event, the Russians are too late as the Democratic and Republican parties’ behavior has already convinced many Americans that voting in November will be a waste of time.

Donald Trump’s Ukraine Server- How the FBI and ODNI hacked and influenced the American psyche

March 21, 2020

By GH Eliason for The Saker Blog
Server, server, who has the Trump-Ukraine server? The answers won’t leave room for doubt on this question.
This is part one of a 3 part series showing the FBI and US Intel agency heads are complicit in the DNC hack after the fact and 2016 election interference. Early on, the FBI and Mueller found the real hackers and worked to hide them from justice and exposure in media. Without the FBI and US Intel community help, the Russia saga would have never happened and unbelievable amounts of corruption would have been exposed early on.
Part 2 will expose the identities of the DNC hackers and where they fit in the Information Operation (IO) to indict and impeach US President Donald Trump and destroy 2016 Democratic candidate Bernie Sanders as agents of Russia or under Russian influence. The US and UK Intel superstars that helped them and some of the projects they worked on including destroying US media platforms not supporting the Clinton campaign in 2016 will be exposed.
Part 3 will conclude analyzing media complicity with corporate contractors, US Intel, and law enforcement.
The only thing that matters are facts and provable evidence. 
When the NYT, 60 Minutes NY, and other outlets contacted me as the original source for what Donald Trump knows about Ukraine’s involvement in 2016 election interference and the DNC hacks, apparently they were correct. It was the only thing they got right about the events even with Pulitzer Prizes and Emmy Awards.  I’ll show why in Part 3 of the series.
Let’s start by solving the DNC hacks in a few paragraphs. If this isn’t the most conclusive evidence you’ve seen for the purpose of getting to the real hackers, don’t read any further afterward.
Shaltay Boltay (Shaltai Boltai) is the group, Robert Mueller indicted for the DNC hacks. Shaltay Boltay leaders who were in the FSB are the people Comey, Clapper, and Mueller they investigated, indicted, and proclaim guilty of the DNC hack and 2016 election influence.
The story of why Mueller and the FBI, ODNI, and NSA couldn’t prove it shows how deep corruption and criminal abetting are rooted in US government agencies and political parties today. The indicted group has a relationship with Dimitry Alperovitch and Crowdstrike, the Atlantic Council, and secondary relationships to Hillary Clinton through the DNC and the RNC through people like Senator John McCain.
Until Crowdstrike’s report late in 2016, the tools Fancy Bear used were proprietary identifiers. Even into 2017, the use of these tools was limited to Fancy Bear and Cozy Bear. These same distinct tools were used to hack the group the ODNI, FBI, and Robert Mueller identified as the DNC hacking groups, Fancy Bear/Cozy Bear.
In a security white paper entitled En Route with Sednit Part 1: Approaching the Target Version 1.0 October 2016 by ESET LLC, Shaltai Boltai was hacked by Fancy Bear in late October 2016. ESET made this attribution based on a set of specialized hacking software specific to the group Fancy Bear.
According to RFE/RLRUH8 (Ukraine Cyber Alliance) credits “mostly CyberHunta” with the Surkov e-mail theft and says it was not the result of a spear-phishing scam but rather what he describes cryptically as “special software.” He claims the malware allowed CyberHunta not only to retrieve Surkov’s e-mail but to “take the entire [Russian] presidential administration system under their control, and they gathered information right from the computers.”
This is verified by Ukraine’s SBU. “And the information that is available in these letters, and which were extracted by” Cyberhunt “, are extremely similar. That is, the methods of execution of all these things – on those documents that officially appear in the materials of criminal proceedings, “- said the head of the SBU.
Lastly,
From Forbes “For example, in October of 2016 “Fancy Bear” was accused of hacking (Shaltai Boltai) Humpty Dumpty.- Paul Roderick Gregory a contributor at CyberHunta sister publication euromaidanpress.com
What’s unique about this is Shaltay Boltay leader Anikeev “Lewis” is the actual hacker for what is known as the Surkov leaks. The hacked material was released in two parts. The first, Lewis released himself on the CyberHunta website. This hacked material was then taken directly to the Atlantic Council.
Other victims of Shaltay Boltay include the head of News Media, Aram Gabrelyanov , presenter Dmitry Kiselev , retired o􀄶cer Igor Strelkov- Girkin , presidential aide Vladislav Surkov , Prime Minister Dmitry Medvedev.
While they are not quite on the Russian FSB to-do list, they fall nicely into Ukraine’s.
         The first information dump in the Surkov hack (administrative assistant might have been hacked) Shaltay Boltay posted the information on Ukraine’s Cyberhunta website(you need a password to post on a hacker website).
         After the first information dump was released by Shaltay Boltay leader Anikeev through the CyberHunta web platform, they were authenticated by the Atlantic Council on the 25th of October, 2016.
         Anikeev was tricked into leaving Ukraine in late October by the FSB. He went to Moscow where he was arrested and charged with treason.
         Shaltay Boltay was hacked by Fancy Bear (identified by specific tools Dimitry Alperovitch said were as strong as DNA evidence) and the hacked information (2nd Surkov dump) was released by Ukraine’s CyberHunta.
Shaltay Boltay was part of CyberHunta which was why they could post material on the Ukrainian website. Ukraine’s CyberHunta and Cyber Alliance work for the Ukrainian Information Ministry as Ukrainian cyber Intel and the DNC as opposition researchers in 2016 through Roman Burko and Christina Dobrovolska.
Cyber Alliance hackers are Ukrainian nationalists that did not work directly with Shaltay Boltay. They were hired by Alexandra Chalupa. Shaltay Boltay (Mueller’s DNC hackers) was hacked by Fancy Bear in Ukraine even though according to Mueller they were Fancy Bear…from Ukraine.
From the Ukrainian hackers own webportal InformNapalm– InformNapalm volunteer intelligence community was the original publisher of the analysis and the actual dumps of Surkov’s correspondence provided by Ukrainian Cyber ​​Alliance (UCA) in October 2016 (second Surkov dump)… A few days ago, a number of Russian news agencies published a story about the arrest of FSB officers responsible for information security, the head of department at Kaspersky Lab (Department of cybercrime investigations), and one Vladimir Anikeev who testified against another FSB employee.
Anikeev is believed to be “Lewis”, the spokesperson for Anonymous International. FSB recently decided to confuse the matters by using the discovery on Anikeev’s computer of #SurkovLeaks files, which had been obtained and published by #UCA, and had already been in the public domain.
As the speaker for #UCA, I categorically deny any connections between Ukrainian Cyber Alliance and Anonymous International. I will now try to unravel this KGB tangle.
According to RUH8 “Shaltai Boltai people post “samples” of letters of influential, but nonpublic
people, virtually without comment. And they also offer information for sale. But did any of the
allegedly sold correspondences surface anywhere? Why not? Because a complete dump would inflict a
tremendous damage on Moscow, whereas the real goal is to pull some strings and rein in a competitor for power.” .-RUH8
As you’ll see in a second, we found our DNC hackers. The same hacker (RUH8) that gave Ukraine’s CyberHunta credit for the Surkov hack and the first part of the document dump takes credit for the second document dump his group hacked from CyberHunta/Shaltay Boltay’s Anikeev after his arrest.
Notice as much as he hates Anikeev, the Ukrainian nationalist RUH8 denies a connection to the FSB regarding Shaltay Boltay’s work.
“Sometimes they get hacking help from their Russian friends, he says. “There are people there who are so angry at their own government that they are risking spy charges and passing information to us,” RUH8 explains.”- Inside The Ukrainian ‘Hacktivist’ Network Cyberbattling The Kremlin-RFERL
RUH8, the proud Russian hating Ukrainian nationalist is clear. Shaltay Boltay, its members Mueller indicted, WERE NOT working for the Russian government when this combined group hacked the 2016 US election. They were working for Ukraine.
 Initial reports out of Russian media tied Mikhailov to a group of hackers in Ukraine and Thailand called Shaltay Boltay, which means Humpty Dumpty. The group is reportedly affiliated with Anonymous, who released damaging documents on high-level Russians in 2014 and the Kremlin alleges that the arrests are related to this act, as Markov told The Daily Beast that Mikhailov: “definitely controlled Shaltay Boltay,” which “cooperated with the Ukrainian SBU [security service], which is the same as working for the CIA; he worked with them, which is obviously treason.”-Paste Magazine
What if… Hillary Clinton’s go-to guy accessing the servers to see who was “leaking DNC and Team Hillary communications” was from the cyber experts Alexandra Chalupa hired for opposition research from Ukraine?
Think about this for a second because it’s a sensible scenario. Chalupa checks in with her go-to gal Christina Dobrovolska who doubles as Ukraine’s Cyber spy manager.
Christina checks to see who’s available in Ukraine and it’s the guy whose work the entire Russian election influence narrative was based on. He’s ok because he works with Ukraine’s CyberHunta. Who cares that he hacked Huma Abedin’s Yahoo account is a wanted criminal or works for a foreign Intel service.
“At the same time her aides were creating “loyalty scores”, Clinton, “instructed a trusted aide to access the campaign’s server and download the messages sent and received by top staffers. She believed her campaign had failed her—not the other way around—and she wanted ‘to see who was talking to who, who was leaking to who.”-Jonathan Allen and Amy Parnes. Shattered: Inside Hillary Clinton’s Doomed Campaign
“In particular, he says, spear-phishing — using messages that mimic those of legitimate companies along with a request and link to change personal security information — “is quite efficient.”
 RUH8 credits “mostly CyberHunta” with the Surkov e-mail theft and says it was not the result of a spear-phishing scam but rather what he describes cryptically as “special software.”- RUH8 Ukraine Cyber Alliance- RFE/RL
The lights go on and the bell sounds. The DNC Russian hacker narrative begins. Que Alexandra Chalupa.
 “In an interview this month, Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists, government officials and private intelligence operatives. “While her consulting work at the DNC this past election cycle centered on mobilizing ethnic communities — including Ukrainian-Americans — she said that, when Trump’s unlikely presidential campaign began surging in late 2015, she began focusing more on the research, and expanded it to include Trump’s ties to Russia, as well.”-Politico 2017 interview with Alexandra Chalupa
It turns out that Ukrainian cyber Intel RUH8’s special Russian friend in Cyberhunta is the same guy Crowdstrike, Comey, Clapper, and Mueller investigated for the DNC hack and the Yahoo hack.
There’s only one problem with the above. The Russian group Shaltay Boltay has never been caught with the Fancy Bear tools. RUH8 and Ukraine’s Cyber Alliance and Cyberhunta had them and used them and used them on Shaltay Boltay. Because the hackers outed themselves by hacking each other with Fancy Bear tools, we have the entire group and subgroups Intel operatives as Chalupa called them in Ukraine.
“So the help of the USA… I don’t know, why would we need it? We have all the talent and special means
for this. And I don’t think that the USA or any NATO country would make such sharp movements in
international politics.” We have no Need of CIA Help Ukrainian Hackers of #Surkov Leaks-RUH8 Ukraine Cyber Alliance, Cyberhunta, Shaltay Boltay, Fancy Bear, Cozy Bear
Reread RUH8’s statements. This is a guy that is dying to do a book and movie deal to finally get the acclaim he thinks he deserves. Let’s give him one- Capturing the DNC Hackers.
After everything was said and done by Comey, Clapper, and Mueller about Russian hackers and influence, Shaltay Boltay’s archives (aka Fancy Bear servers) had to be retrieved from UKRAINE.
“Anonymous International founder, who is now in jail, reported that he had stored his databases with stolen information in a Kiev apartment. Thanks to Anikeev’s testimony, the investigators found out that the information carriers (servers) with the hacked archives are stored in Kiev.”

Why did Ukrainian Intel operatives do all this?

Dimitry Alperovitch of Crowdstrike has an ongoing “Twitter buddy” relationship with Ukraine’s Cyber Alliance, RUH8, and Cyberhunta, which includes Shaltay Boltay dating back to at least 2016.
“Hey. I am the press secretary, a simple Ukrainian hacker, more precisely: we are hackers, but imagine a masked man who speaks to you. I do not do OSINT, I do not tell schoolchildren how to hack websites, I do not care about who and what agreed, I’m not an army or a hundred, I do not obey orders and do not follow a ceasefire, build democracy and fight for justice, I am a hacker, and my goal is to break!
 To break, spoil, rob, entangle, blackmail, frighten, divulge, mock and mock the defenselessness of the victims. Because I can. Hate is my name. I will harm the Russian Federation. And I do not care who you are – a liberal or a guardian, Russians must suffer. Traitors and spongers of Russian invaders must suffer. Pensioners and functionaries, Buryats and October, must suffer. If I find a way how to harm you, even for a penny, I immediately use it. Do you live in Russia? Bad luck. I will not tolerate, will not be merciful, I do not forget and do not forgive.- RUH8
C:\Users\GH\Desktop\spy for hire\CYBER TERROR PART 6 REAL TERRORISM\photos used\threat\RUH8 PROTECTING PEOPLE PRAVY SEKTOR CUTS-twitter.com-2019.04.28-01-33-28.png
Ukraine’s Cyber Alliance (RUH8) and Cyberhunta (including Shaltay Boltay) work under the flag of Dimitro Yarosh’s Pravy Sektor Ukrainian nationalism. The groups and their web platforms were started by former Pravy Sektor spokesman Sviatoslav Yurash. Yurash was also the spokesman for the 2014 EuroMaidan coup, the Ukrainian military, and is the liaison between the ultra-nationalists and the Ukrainian Diaspora through his position as Deputy Director of the Ukrainian World Congress affiliate in Kiev.
All of this started as an Influence Operation in Ukraine that resulted in the 2014 coup and subsequent move to hard Ukrainian nationalism. It bled into the United States as the 2016 election season heated up.
Suffice to say, means, motive, method, and opportunity have been established by the hackers themselves. Sources friendly to their efforts and neutral mainstream sources including RFERL verify it.
If you’re not convinced now, read no further.
         They (as a foreign Intel service) interfered in the 2016 US election.
         They, along with members of the US Intel community tried to destabilize the government in Russia and the USA.
         They shaped and promoted a false narrative that shipwrecked US and Russia relations.
         Their work helped Crowdstrike shape the Fancy Bear-Cozy Bear narrative.
         They shape the US Intel view of what’s going on in Ukraine allowing for crimes against humanity in Donbass (LNR &DNR) to go unaddressed.
         Later in the series, I’ll show these same groups (Ukraine Cyber Alliance, RUH8, Cyberhunta-Fancy Bear/Cozy Bear) were used to manufacture evidence that will be used in the #MH17 trial at the Hague in conjunction with Bellingcat.
         US Intel for hire superstars used the Fancy Bear groups in conjunction with the #Propornot project illegally to identify and take down news and commentary platforms in the US and EU that published stories against the narratives, they were developing and promoting.
         They illegally targeted people expressing social and political opinions. All of this was with the blessing of period ODNI and FBI leadership.

The Disproven Conspiracy Theories about the DNC Hack and 2016 Russian Election Interference

The disproven conspiracy theories about Trump-Russia and Russian election interference is the ones that were proven baseless in court, not the court of opinion. The evidence was fabricated or just not there, to begin with. The FBI’s criminality hiding the real criminals is examined below.
But, these fake stories are still promulgated in an ongoing effort to sabotage the 2020 election cycle and tear the US social fabric apart. Examples of this are- Why Trump Still Believes (wrongly) that Ukraine Hacked the D.N.C.The Conspiracy Theory So Far Out There Even Trump’s Biggest Defenders Are Walking Away From It and @ScottShaneNYT How a Fringe Theory About Ukraine Took Root in the White House.

This article is going to open up the potentially wide-ranging crimes at the FBI aiding and abetting criminals for purely political reasons.

 There are only two possible reactions you can have to this. There are some people that will react emotionally or politically and the consequences be damned. As long as it happens to someone they are sure they hate, why care?
When precedents are set, they work both ways. When political leaders like Trump or Sanders are tried in the court of opinion and declared loyal to a foreign government because the other party doesn’t like them. The method is set for every other person that graces the social or political stage.
Look further into the distance and realize this flows downhill. If it’s fine for political leaders, don’t be surprised when it’s your turn at bat because someone doesn’t like you. This kind of lawlessness spreads quickly as we’ve seen since 2016.
Or maybe it’s time to objectively look at the facts and see where the evidence leads in an unbiased way. That’s it. That’s all.
All of the common knowledge stories rely on readers to assume ODNI head James Clapper’s 2017 report was conclusive and the Mueller investigations were successful. Neither of them was, nor could they ever be.
James Clapper was responsible for the evidence Intel agencies presented in the January 2017 report trying to hamstring the newly elected Trump administration for political reasons.
If ODNI chief Clapper believed the 17 Intel Agency strong report, why couldn’t he stand by the same fact-base in 2018? Clapper no longer cited his iron-clad evidence he presented as proof of Russian interference or the DNC hacks.
In 2018, former ODNI head Clapper’s solid proof of Russian interference in the 2016 election became 78,000 people voted against Hillary Clinton and she lost Wisconsin, Pennsylvania, and Michigan. Notice Jimmy Clapper wasn’t quoting his solid gold January 2017 report anymore.
Who were these 78,000 Clinton haters that cost the DNC the election in 2016?
Back when there was a real Clinton administration, First Lady Hillary Rodman Clinton demanded the US get involved in the Bosnian war. Hillary Clinton supported KLA terrorists and extremists through a bombing campaign. US bombers drove the families of these voters into the arms of murderers so extreme, they were cutting organs out of living people to sell on the black market. Clinton had them taken off the official terrorist lists to the frustration of negotiators trying to make peace during the war.
The Serbian Diaspora voters in Wisconsin, Michigan, and Pennsylvania usually votes for the Democratic ticket, that is, unless your name is Hillary Clinton. This was a bloc vote against Hillary Clinton who they hold responsible for the murder of their families at the hand of terrorists. It’s why Clinton ignored those states campaigning. Clinton mistakenly thought having all the major Diaspora votes in swing-states would be enough.
The problem with the evidence of the Russian government interference in 2016 is it had to be manufactured and repeated by a compliant media to exist.
What will be shown through mainstream sources is the Russian FSB and GRU attacks on the American psyche was produced by domestic and foreign criminals that were hostile to the Russian government for nearly a decade before the DNC hacks. The hackers who are IO specialists were targeting Russian politics, not the US.
Robert Mueller and James Comey are accessories after the fact. They tried feverishly and unsuccessfully to incriminate the wrong people because the facts expose large scale political corruption well beyond what is currently known and it all revolves around Ukraine.
According to PNAS (Proceedings of the National Academy of Sciences of the United States of America) in a study titled Assessing the Russian Internet Research Agency’s impact on the political attitudes and behaviors of American Twitter users in late 2017 there was no Russian impact on the election and they used 6 research standards to measure it.
If you don’t trust official studies done under the Trump administration tenure, Jon Solomon had this to write after uncovering 2016-17 FBI memos: The piecemeal release of FBI files in the Russia collusion investigation has masked an essential fact: James Comey’s G-men had substantially debunked the theory that Donald Trump’s campaign conspired with Moscow by the time the 45th president was settling into the Oval Office, according to declassified memos, court filings and interviews.
And that means a nascent presidency and an entire nation were put through two more years of lacerating debate over an issue that was mostly resolved in January 2017 inside the bureau’s own evidence files. The proof is now sitting in plain view.- FBI’s Russia collusion case fell apart in first month of Trump presidency, memos show
This is why James Clapper changed his tune so radically. When you look at the above, Hillary was taken out behind the woodshed in 2016 for good reasons. Ask yourself what does it have to do with Russians, Russia, or Vladimir Putin or Donald Trump and Bernie Sanders? The only scenario all the evidence supports is Hillary Clinton stepped on a proverbial rake and made herself unelectable in 2016.

FBI, CIA, and ODNI criminal conspiracy against the United States

Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution– Information available as of 29 December 2016 was used in the preparation of this product.
Scope
This report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies. It covers the motivation and scope of Moscow’s intentions regarding US elections and Moscow’s use of cyber tools and media campaigns to influence US public opinion. The assessment focuses on activities aimed at the 2016 US presidential election and draws on our understanding of previous Russian influence operations. When we use the term “we” it refers to an assessment by all three agencies.
I refuse to give James Clapper, James Comey, John Brennan, or Robert Mueller the benefit of the doubt and call them ignorant little men.  They acted with full knowledge of what they were doing. Along with all of the agencies’ department heads, these men used their offices trying to try to overthrow the election of the President of the United States and change the fabric of US society by creating irreparable political and social division.
American officials, sworn to defend the USA used their power to fabricate a political narrative they called Intelligence to create their own foreign policy (Russia/Ukraine)and domestic policy(including media, political norms and policy) for the United States.
As late as 2018, #JamesComey was clear when he dismissed a House intelligence committee report that found no collusion between Russia and the Trump campaign as a “political document”. When the ODNI report was written, he knew there was no evidence of Donald Trump-Russia collusion. They all knew.
ODNI Clapper, FBI Comey, John Brennan and Special Counsel Mueller knew in 2017 that the US Intel community conceded there was no coordinated effort by Russia to influence the 2016 election months before.
They successfully divided the United States socially and politically in ways Orwell would be proud of.

Why did US political activism by sworn officials cross a bridge too far?

It all started falling into place after 9-11. Congress decided the FBI needed to get into the Intelligence business. At the time, the FBI fought the changes saying it would hurt their criminal investigation mandate. Because the CIA legally can’t operate domestically, the FBI was rebooted to do the job.
The 2000s version of the FBI was right. The FBI went from being the world’s premier criminal investigation agency to one of the worst imitations of a private sector  CIA domestically and around the world.
The same man the FBI called a nuisance and danger to national security after the twin towers collapsed in New York networked intelligently enough to become the trainer of choice for the FBI, Homeland Security, CIA, NATO, et al.
This new mandate from Congress created over 5000 new Intel positions right away inside the FBI that were filled with outside contractors.
Today’s Intel agency leaders including Homeland Security and FBI department heads were his students from the early 2000s onward. The rise and risk of Intelligence for hire is detailed in U.S. Intelligence Crisis Poses a Threat to the World (Part 1)
This particular agency trainer almost singlehandedly started the US side of the social-political Russian collusion storyline by himself labeling anyone outside his narrative Kremlin trolls and pro-Russian influencers.  He made looking for pro-Russian collaborators fashionable in a post-2016 world in a way that would make Joe McCarthy tingly.
He personally is why media came under so much scrutiny and groups like Propornot were formed to destroy media that didn’t agree to the McCarthy-like narrative, alternative media sources that spoke against the Clinton campaign and post-2014 Ukraine. Watch as it starts again as the 2020 election cycle heats up.
Along with the other US Intel actors, he aided and abetted the murder of journalists in Ukraine by providing the tools, training, means, and method to set it up. It’s quite an embarrassment for Brennan, Comey, Clapper, Mueller, and the agencies, et al.
Imagine, one of the rock-stars of modern Intel being found in that position after your agencies were trained to look at information like him for over a decade. It’s no wonder they hand-fed the current Russia policy narrative he developed to MSM.
In part2, I’ll detail who he is, many of the crimes, along with the real identities of the DNC hackers.
Fusion GPS and Patterning the Trump-Sanders Accusations and Russia Investigation
If the ODNI and FBI engaged in consistent patterns of activity for political reasons that tear the societal fabric of the USA to support corruption that destroy the lives of US citizens, change foreign policy, and erode citizen’s rights, should it be investigated?
It started with Bernie Sanders during the 2016 primaries. This bled into the 2020 primaries.
Sander’s accusations started with “Adam Parkhomenko, a former aide to Hillary Clinton who has repeatedly suggested that Senator Bernie Sanders owes his popularity to Russian support, backed the attorney’s abortive bid for president.”- NYMag
Sander’s accusations of Russia collusion ended with –“A 37-page indictment resulting from special counsel Robert Mueller’s investigation shows that Russian nationals and businesses also worked to boost the campaigns of Vermont Sen. Bernie Sanders and Green party nominee Jill Stein in an effort to damage Democrat Hillary Clinton”-USA Today
Robert Mueller’s investigation into Bernie Sanders started with a tweeted accusation. Most of the Russian nationals not named were publishers and journalists that support Bernie Sanders and were listed by the FBI trainer who started accusing American web portals of being influencers for the Russian government.

Fusion GPS and the Steele Dossier

Glenn Simpson and Peter Fritsch, the co-founders of the private investigative firm Fusion GPS never tried to vet any of the information Christopher Steele gave them in the infamous and tantalizing Steele Dossier.
The closest anyone has come to a real source is an unknown Russian émigré in the US provided the narrative for Christopher Steele (foreign Intel agent) about events he/she had no first-hand knowledge of.
“Yet, Simpson allegedly acknowledged that most of the information Fusion GPS and British intelligence operative Christopher Steele developed did not come from sources inside Moscow. “Much of the collection about the Trump campaign ties to Russia comes from a former Russian intelligence officer (? not entirely clear) who lives in the U.S.,” Ohr scribbled in his notes.”- The Hill
Is it possible for investigative journalists like Simpson and Fritsch not be even remotely curious about the legitimacy of such scandalous information? This Intel is about an elected US President and they claim they were acting patriotically.
Fusion GPS Founders On Russian Efforts To Sow Discord: ‘They Have Succeeded’. This is quite a statement considering when asked, they admitted they knew absolutely nothing about Steele’s politically motivated fiction.
It’s easy to see why such an appalling politically driven fantasy fell apart after it was given a real examination. But, that’s not the point.
Simpson and Fritsch turned around and gave the Steele Dossier to Republican Senator John McCain (the anti-Trump), knowing full well if he acted in character the Dossier would be made public.  Why McCain’s office? The answer is included below.
“The Washington Times first disclosed the document on April 25, 2017. Republicans later told the Justice Department the filing should have set off alarm bells inside the FBI about Mr. Steele’s credibility, given his admission he had accepted gossip.”-The Washington Times
“The top judge on the federal court overseeing the U.S. government’s surveillance activities accused the FBI on Tuesday of providing false and misleading information about Carter Page in applications to wiretap the former Trump campaign adviser.”– The National Interest
“Before evaluating the media component of this scandal, the FBI’s gross abuse of its power – its serial deceit – is so grave and manifest that it requires little effort to demonstrate it. In sum, the IG Report documents multiple instances in which the FBI – in order to convince a FISA court to allow it spy on former Trump campaign operative Carter Page during the 2016 election – manipulated documents, concealed crucial exonerating evidence, and touted what it knew were unreliable if not outright false claims.
If you don’t consider FBI lying, concealment of evidence, and manipulation of documents in order to spy on a U.S. citizen in the middle of a presidential campaign to be a major scandal, what is?”– The Intercept

ODNI, FBI Hacked and Influenced the American Psyche

Throughout the entire hack and election influence saga US Intel officials acted like spokesmodels for Ukrainian –American Diaspora leader Alexandra Chalupa. They constantly acted for the benefit of private citizen groups and companies who wanted to change US foreign policy and the fabric of society in the USA.
The following is from a man that knows the facts. How can you get such a senior position otherwise? Here’s his big media sound bite;
“FEINSTEIN: And what would those goals have been?
PRIESTAP: I think the primary goal, in my mind, was to sow discord, and to try to delegitimize our free and fair election process. I also think another of their goals, which the entire United States intelligence community stands behind, was to denigrate Secretary Clinton and to try to help then — current President Trump.”- Vox
“Russia, for years, has conducted influence operations targeting our elections,” an FBI agent told Congress on Wednesday. But what made 2016 different was the degree of interference, facilitated by the Internet, said Bill Priestap, the assistant director of the FBI’s Counterintelligence Division.”.-(CNSNews.com)
And here are Bill Priestap’s conclusions after the media turn away and he’s forced to put on his big boy pants and own up to the evidence the FBI has after years of investigation.
“Further, all three witnesses in that hearing—Ms.Manfra, Dr. Files, and FBI Assistant Director for Counterintelligence Bill Priestap—agreed that they had no evidence that votes themselves were changed in any way in the 2016 election.”- REPORT OF THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE ON RUSSIAN ACTIVE MEASURES CAMPAIGNS AND INTERFERENCE IN THE 2016 U.S. ELECTION VOLUME 1: RUSSIAN EFFORTS AGAINST ELECTION INFRASTRUCTURE WITH ADDITIONAL VIEWS
Therein lays the crux of the problem. The FBI wanted the election interference story to resonate publically but under oath, there was never any evidence.
According to the IG Report, FBI leaders, lawyers, and investigators were pulling out all stops to derail Donald Trump before and after the 2016 election. How did this organized, continuous, multi-faceted, and multi-event war play on the American psyche? You tell me.
FBI Tried to Influence the Trump Campaign“While the results of any physical searches related to Page are unknown, what is known is that federal spying on the Trump campaign through Page went further. Prior to the FISA surveillance orders, the FBI tasked informant Stefan Halper with targeting Page. (Another agency may have as well.) The IG report revealed that in targeting Page, Halper sought specific details from Page related to the Trump campaign, and fed Page unsolicited (and potentially illegal) advice concerning campaign strategy.”-The Federalist
The only thing to consider is the FBI may have conducted the biggest set of serial crimes of this decade by a law enforcement agency.
This effectively divided every American on a social and political basis. It wasn’t a single event but a continuing policy surrounding the election, foreign policy, and the lengths federal investigators could go to hamstring the executive branch for political reasons.
Before the December 2016 ODNI-FBI GRIZZLY STEPPE – Russian Malicious Cyber Activity JAR, there was no proof of Russian intervention except what came out of the Clinton camp. James Comey denied it. After the ODNI JAR, there was no evidence of Russian intervention in the 2016 election.
The report itself and the actions surrounding it were nothing short of a successful politically charged foreign policy intervention by the FBI and ODNI. How can I say this?
Mueller indicted a Russian company called Concord Management & Consulting LLC for being the vehicle the Russian government used to interfere in the 2016 election. All the information Robert Mueller, James Comey, and James Clapper had to go on came from the indicted DNC hacking group themselves.
After establishing this, we’ll look at the ongoing relationship between the investigators and the criminal hacking groups to reshape American politics, cover-up enormous corruption in the Obama administration, Clinton campaign, and hamstring an elected US President.
The other company called the Internet Research Agency was part of Concord Management.
“In 2014, according to Russian media, Internet Research Ltd. (Russian: «Интернет исследования») was founded in March 2014, joined IRA’s activity. The newspaper Novaya Gazeta reported that this company is a successor of Internet Research Agency Ltd. Internet Research Ltd. is considered to be linked to Yevgeny Prigozhin, head of the holding company Concord Management and Consulting. The “Trolls of Olgino” are considered to be his project. As of October 2014, the company belonged to Mikhail Bystrov, who had been the head of the police station at Moscow district of Saint Petersburg.
Russian media point out that according to documents, published by hackers from Anonymous International, Concord Management is directly involved with trolling administration through the agency. Researchers cite e-mail correspondence, in which Concord Management gives instructions to trolls and receives reports on accomplished work. According to journalists, Concord Management organized banquets in the Kremlin and also cooperated with Voentorg and the Russian Ministry of Defense.”-Wikipedia
This information is well documented enough to have an almost accurate Wikipedia listing barring one glaring point Mueller, Comey, and Clapper needed to ignore to build their Trump-Russia collusion, Russian election interference, and Russian hacking narrative.
Scott Humor at the Saker.is researched the Internet Research Agency extensively. In an article entitled “A Brief History of the Kremlin Trolls,” he shows clearly the Internet Research Agency only existed on paper. Even then, it ceased to exist in 2015. It was liquidated and the company emerged as a construction retail company called TEKA.
This brings us to the foreign policy objective the US Intel community and US Intel agencies hacked the American psyche very successfully to reach:
“On 29 December 2016, the White House accused and sanctioned the FSB and several other Russian companies for what the US intelligence agencies said was their role in helping the Russian military intelligence service, the Main Intelligence Directorate (GRU) disrupt and spread disinformation during the 2016 US presidential election. In addition, the State Department also declared 35 Russian diplomats and officials persona non grata and denied Russian government officials access to two Russian-owned installations in Maryland and New York.”- Wikipedia
Here’s the fun part. Everything we know about 2016 Russian involvement stems from this same small group that ODNI and FBI had to embellish by magnitudes to link them to a Russian government operation and then indict.
While they were the hackers and Information Operators the FBI investigated and Robert Mueller indicted, the hacking groups weren’t working for the Russian government for the Yahoo hack or the DNC hack and 2016election hacks.
Dmitry Dokuchaev used his position to commit crimes against Russia and the USA which helped the FBI to build the one narrative they needed to fabricate official Russian government involvement.
         U.S. v. Dmitry Dokuchaev, et al.
         “Dokuchaev is a former hacker from Yekaterinburg. He was reportedly blackmailed into joining the FSB, Russia’s domestic intelligence agency, after his private exploits became known to the service, but then built a successful career, rising to the rank of major. The Russian investigation appears to link him to a group called Shaltai Boltai, or Humpty Dumpty, which broke into electronic mailboxes, mostly of Russian officials and business people, obtained compromising information about them and then either sold or published it. The group’s work was a combination of blackmail, competitive intelligence and public relations; Dokuchaev’s alleged role was to direct the group toward particular victims and cover up its activities while pretending to investigate it.”- Bloomberg- What the Yahoo Hack Says About Russian Spies-The 2014 hack appears to have been a business scheme run by Russian intelligence officers
The FSB agency mandate is limited by law to work inside Russia, not outside. This alone makes it illegal for the FSB to engage in state-level espionage and hacking operations outside.
The FSB has an incredible amount of legal authority to surveil all information passed on or through Russian servers.
Jeff Carr noted the Russian Law on the FSB (article 15) states that “all individuals and legal entities in Russia, providing postal services, telecommunications of all kinds, including systems, data communication, satellite communications, are obliged at the request of the Federal Security Service to include in the extra hardware equipment and software, as well as create other conditions necessary for the operational and technical measures by the Federal Security Service.”
And yet;
In case you missed it, the FSB through Dmitry Dokuchaev’s Shaltay Boltay was accused of illegally hacking accounts of Russian officials. Why would the FSB hack these officials it legally had almost unlimited jurisdiction to the information without hacking?
For anyone clinging to the Yahoo or DNC hacks with a purely political mindset; this is the same as walking into a bank vault with $1 billion dollars in it. You know you have the legal right to walk away with any or all of it. But, just for giggles, you hire a foreign criminal to rob the place which makes you liable for bank robbery, conspiracy, and treason.
And in the real world case of Yahoo, you get caught because the Canadian hacker you illegally hired for the Yahoo hack broke the Canadian criminal code of silence when he testified against you.
To put it delicately, this would have to be the most inept crime of all time. For this to be true, Dokuchaev must have just fallen off the turnip truck and hit his head. Got whacked with the ole’ ugly stick at the same time he stepped on a rake as he was laughed at by a 12-year-old girl who wound up and kicked him in the…….Seriously? That’s as insulting as it is injurious.
Instead, what we have is a group of Russian criminals (Shaltai Boltai) who are not working for the Russian government and continually try to hack Russian officials for blackmail. According to Stratfor, “In a 2015 interview, the leader of Shaltai Boltai, code-named “Lewis,” said his group was driven purely by money, not ideology… The narrative linking Shaltai Boltai to the FSB officers came just three days after the initial stories suggesting the FSB officers were the sources of leaks to U.S. intelligence.”
But were Dokuchaev and Shaltai Boltai (Shaltay Boltay) feeding US Intelligence information? If so, what kind of information?
The “Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution” the Office of the Director of National Intelligence ODNI quotes Shaltay Boltay because this group is the primary source of information about both events because they created what we know about them.

Dokuchaev, Shaltay Boltay, the FBI, and Robert Mueller

Summary:
The FBI interviewed members of Shaltay Boltay groups and asked for help writing the 2016 election hacking and influence story. Shaltay Boltay could play the heroes and the villains. They were heroes because they created the influence story about a non-existent company that no one could find that Putin ordered to influence the 2016 election in favor of Donald Trump.
They were the villains because they were the DNC hackers. If Shaltay Boltay cooperated to implicate Trump and Putin, US citizenship and jobs were waiting for them.
Dokuchaev and his working group Shaltai Boltai (Shaltay Boltay), otherwise known as Anonymous International or Humpty Dumpty  are the source for everything known about the Russian Internet Agency (IRA), Russian election interference, and provides the Russian FSB-GRU connection through Dokuchaev needed to make the Russia-DNC hack narrative almost work.
Shaltay Boltay are the Yahoo hackers that stole Huma Abedin’ State Department logins. This is important because it also separates them from being Russian government operatives.
More importantly, their own self described claim to fame was creating realities. Shaltay Boltay primary work is in Information Operations. The founder of the elusive Shaltai Boltai hacker group has been uncovered as Vladimir Anikeyev, a native Dagestani and expert in “black PR.”
It’s no secret today Comey’s FBI and the Mueller investigation were working hard to grasp at any straw they could to derail the Trump presidency. Even though they knew there was no collusion, their teams worked overtime to prove it by pushing half-truths in an invented narrative.
What brings the FBI investigators and Comey’s behavior to a collusion, harboring, and abetting threshold is they identified the leaders of the hacking groups early on, the hackers, and ignored them to hide corruption.

Was the ODNI and Comey’s FBI an accessory after the fact to the DNC Hacks and murder? – Harboring Criminals

Comey’s Russian collusion team and the Mueller probes pushed the 2016 investigations away from the criminals they were supposed to be investigating.
         The FBI, Comey, and Mueller knew Shaltay Boltay (Shaltai Boltai) were part of a higher level group. While this group worked for money, not politics, the higher-level group are extreme nationalists.
The big question if their entire history is blackmailing Russians, who are they working for in relation to the US election?
         The FBI knew this group fabricated the only basis used for a Russia election interference investigation. The FBI knew they did this from Ukraine.
The reason the FBI and Mueller knew the Russian government FSB-GRU connection to the hacks was fabricated was the leaders of Shaltay Boltay were extremely clear and public about hurting the Russian government and Russians.
         The FBI, Comey, and Mueller knew from 2014- late 2016, the indicted and ignored involved leaders and US oriented parts of Shaltay Boltay were located in Kiev, Ukraine.
Shaltay Boltay leaders were wanted criminals and worked against the Russian government 2014-2016 when they fled to Kiev. This is evidenced by the so-called Surkov hack. The emails were released through the working group Shaltay Boltay was with 2014-16.
         The FBI and Mueller had this group’s IP addresses which Mueller used in his indictments and the willing cooperation of the server company that hosted them.
“If we consider the situation from the other side, it is unclear why the FBI and related experts are talking only about our company,” said Fomenko. “After all, the U.S. intelligence report says that the hacking was staged from eight IP addresses, six of them belonging to our company (the criminals used our equipment), and two other companies being not connected with us in any way. One of them is located in the Netherlands, I don’t know about the other. But it’s all just about us. What is this? Prejudice?”-RBTH
         The FBI and Mueller refused to investigate or interview the owner of the server (King Servers) the DNC hackers used who wanted to testify. Yet, Shaltay Boltay’s IP addresses were considered key evidence anyway. Apparently, the DNC hackers owed him money.
The FBI knew the groups involved physical location and concealed it to shield them from the investigation by constantly attributing the DNC and subsequent hacks to Russia.
         The FBI and Mueller purposefully stayed away from the main group and targeted sub-groups, outliers, and used false accusations that protected the Executive branch from being dragged into the investigation. At the very least, all of this happened as the direct result of Obama’s Ukraine and Russia policies.
Shaltai Boltai’s Yevgeny Nikulin was interviewed by the FBI. According to Disobedient Media’s Adam Carter “Nikulin has stated in a letter, passed to his lawyer Martin Sadilek and reported by Moscow Times, that, after his arrest on October 5, 2016, he was visited by the FBI several times, the first of which was on 14-15 November, 2016.
From the Bell– In it, he also mentions attacks on the servers of the Democratic Party committee. Kozlovsky writes that he was engaged in them on behalf of the FSB officer, whom he calls “Ilya.” Later, the hacker began to claim that under the pseudonym “Ilya” he was supervised by FSB Major Dmitry Dokuchaev.
         The FBI investigators allegedly offered payment for information implicating Donald Trump and Vladimir Putin.
On 5/11/17 Newsweek ran an article headlined FBI PROBE INTO CLINTON EMAILS PROMPTED OFFER OF CASH, CITIZENSHIP FOR CONFESSION, RUSSIAN HACKER CLAIMS.“[They told me:] you will have to confess to breaking into Clinton’s inbox for [U.S. President Donald Trump] on behalf of [Russian President Vladimir Putin],” Nikulin wrote, according to The Moscow Times.”
         The FBI, Comey, and Mueller knew Shaltay Boltay was part of a foreign Intel structure whose goal since 2014 has been to disrupt US-Russia relations.
         The FBI knew Shaltay Boltay as part of Ukrainian CyberHunta worked for the Hillary Clinton campaign as opposition researchers through the DNC.
Alexandra Chalupa used private/public Ukrainian Cyber Intel groups Ukraine Cyber Alliance and CyberHunta(part of the Ukrainian Ministry of Information) to do opposition research. Roman Burko and Christina Dobrovolska (US State Department contractor, liaison to the US-Ukrainian Diaspora) led the groups under the Information Ministry.
         The FBI knew the main workgroup also worked in conjunction with Crowdstrike, the Atlantic Council, and members of the US Intel community. The groups were used to fabricate anti-Russian narratives for NATO and statements delivered to US Congressional committees voting on support for Ukraine.
The Daily Beast-The deputy head of its now-defunct Center for Information Security, Sergei Mikhailov, was arrested, along with two colleagues and an employee of the cybersecurity firm Kaspersky, Ruslan Stoyanov, for allegedly passing secret information to Western intelligence agencies.
         The FBI knew only Crowdstrike, Ukraine’s Cyber Alliance (RUH8) and Cyberhunta had possession of key component tools of the DNC hack that Crowdstrike’s Dimitry Alperovitch stated were like DNA evidence.
The FBI knew Crowdstrike relied on information they shared with the Ukrainian Intel groups.
         According to Wikileaks, the phishing attack on Podesta originated in Ukraine.
         The FBI and Mueller knew the groups labeled Fancy Bear/Cozy Bear along with American and British Intel community members were involved in setting up the Ukrainian Information Ministry’s murder for hire platform Myrotvorets beginning very in early 2015.
These same groups protected by the FBI worked with US & UK Intel Community superstars to set up and refine Myrotvorets. This was Ukraine’s hit-for-hire listings that named the enemies of post-Maidan Ukraine. It started with the murder of journalist Olez Buzina one month after the webplatform went live. At the time it went live, I predicted the first murder would soon follow. Unfortunately, it did.
         The FBI knows the core members responsible for all this and that can answer for it are the ones they concealed from the investigation still operate in Ukraine.
Under 18 U.S.C. § 1071, anyone who “harbors or conceals” a person to prevent their “discovery and arrest” is guilty of a crime.

TheTrump-Ukraine Servers

Servers, servers, let’s see who has the Trump-Ukraine server. I chose the following article quote from @benshapiro out of the all the rest of the barrel for the colorful language he uses. Imagine a lone DNC server determined to live its life in peace and solitude makes the arduous journey to Kiev, Ukraine. This is a story of triumph over adversity. It’s a real tear-jerker.
He begins by introducing part of the conversation between Presidents Trump and Zelensky.
 “The Phone Call
According to the transcript of the July 25 phone call between Trump and Ukrainian president Volodymyr Zelensky released by the White House, Trump asks Zelensky for a favor, “because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say Crowdstrike. . . . I guess you have one of your wealthy people. . . . The server, they say Ukraine has it. . . . They say a lot of it started with Ukraine. Whatever you can do, it’s very important that you do it if that’s possible.”
Here, Trump is referring to the baseless conspiracy theory that Russia was framed by Ukraine for the 2016 hack and subsequent release of a damaging tranche of Democratic National Committee emails, which involves a supposed “secret” DNC server being spirited away to and hidden in Ukraine. He seems to be asking Zelensky to investigate the conspiracy theory, presumably in hopes that it would remove the taint of Russian interference from his 2016 victory.”- The Two Theories of Trump’s Actions in the Ukraine Affair By BEN SHAPIRO October 25, 2019 11:01 AM-  National Review
What the wondrous barrel of articles and colorful tales ignore is this is the 21st century and your computer doesn’t need to plug directly into a server. Many people across the world use US hosting services (servers) and vice versa.
Let’s add facts into this and dispense with hyperbole.
Alexandra Chalupa told Politico part of her Oppo-research team was Ukrainian “private Intel.” She hired Ukraine’s Cyber Alliance, RUH8, and Cyberhunta (which included Shaltay Boltay at the time). These groups work for the Ukrainian Information Ministry, SBU (Ukraine’s version of the CIA), the US State Department under Obama, and are Ukraine’s front line Cyber hacking, spy, and Information Operations unit against Russia, Bernie Sanders, and Donald Trump.
Would you have foreign hackers running rampant on your servers based in the United States which fall under the direct legal purview of election law, Constitutional law, and Federal law?
Of course not. If you were in a gray area where your candidate for US President could be taken to the carpet and impeached for using foreign spy services to build the campaign, the best move would be having questionable work or workers that can be questioned on safe ground to begin with.
If you were working for another country’s spy services, would you want a direct fingerprint inside the election of a US president? Again the answer is no. The ramifications to your own country could be enormous once a better than the barrel investigative journalist gets a whiff of it.
If you do your work through a safe server in your own country, you remain anonymous, have a better chance of success, and might get a medal for it.
The above limits the number of servers in the world that could be used to just 4 or 5. Remember, security is everything. These groups are part of the Ukrainian security infrastructure and realistically would need to be able to scale up to nation-state level actions.
1.       Shaltay Boltay’s server where they stored their archive.
2.       The servers RUH8, Cyber Alliance, and Cyberhunta use.
3.       The Ministry of Information servers because all the hackers including Shaltay Boltay (credited with the DNC hack) worked for them
4.       According to the Kiev Post-Ukrainian special services looking into disappearance of servers from presidential office’s situational room because of former Ukrainian President Petr Poroshenko gutted the server room claiming the servers belonged to someone else and had to be returned. He paid for this out of his own pocket instead of Ukrainian state funds. This is almost blasphemy for a graft guy like Poroshenko. The former Ukrainian president is adamant that even though they were the most protected servers in Ukraine, no Ukraine state business was conducted on them.
The reason for this shortlist instead of a particular DNC server is their servers will catalog all their crimes. Not just the DNC hack adventure. It will also catalog all their contacts. This part is important to pursue criminal and civil investigations for crimes and damages they did to news and analytical platforms, public people, journalists, and citizens of the US, Russia, EU, as well as their own country, Ukraine.
In case you haven’t realized it yet, the sites that were hacked in association to #Propornot and lost income, jobs, or reputation, are entitled to restitution. Crimes have been committed against the American, Russian, and EU people, Democratic party members, the Trump administration, Bernie Sanders campaign 2016.
Will the FBI, ODNI, and private Intel companies be held accountable for allowing and protecting foreign spy agencies to operate freely inside US infrastructure?
The politicization of the ODNI, FBI, and CIA needs to cease. This can only be done by phasing out private money from the Intel and law enforcement game. The FBI has no business in the Intel game because the change of mandate is what corrupted a world-renown criminal investigation agency in the first place.
Next up in the series: Outing the DNC hackers
Donald Trump’s Ukraine Server- How the FBI and ODNI hacked and influenced the American psyche
Server, server, who has the Trump-Ukraine server? The answers won’t leave room for doubt on this question.
This is part one of a 3 part series showing the FBI and US Intel agency heads are complicit in the DNC hack after the fact and 2016 election interference. Early on, the FBI and Mueller found the real hackers and worked to hide them from justice and exposure in media. Without the FBI and US Intel community help, the Russia saga would have never happened and unbelievable amounts of corruption would have been exposed early on.
Part 2 will expose the identities of the DNC hackers and where they fit in the Information Operation (IO) to indict and impeach US President Donald Trump and destroy 2016 Democratic candidate Bernie Sanders as agents of Russia or under Russian influence. The US and UK Intel superstars that helped them and some of the projects they worked on including destroying US media platforms not supporting the Clinton campaign in 2016 will be exposed.
Part 3 will conclude analyzing media complicity with corporate contractors, US Intel, and law enforcement.
The only thing that matters are facts and provable evidence. 
When the NYT, 60 Minutes NY, and other outlets contacted me as the original source for what Donald Trump knows about Ukraine’s involvement in 2016 election interference and the DNC hacks, apparently they were correct. It was the only thing they got right about the events even with Pulitzer Prizes and Emmy Awards.  I’ll show why in Part 3 of the series.
Let’s start by solving the DNC hacks in a few paragraphs. If this isn’t the most conclusive evidence you’ve seen for the purpose of getting to the real hackers, don’t read any further afterward.
Shaltay Boltay (Shaltai Boltai) is the group, Robert Mueller indicted for the DNC hacks. Shaltay Boltay leaders who were in the FSB are the people Comey, Clapper, and Mueller they investigated, indicted, and proclaim guilty of the DNC hack and 2016 election influence.
The story of why Mueller and the FBI, ODNI, and NSA couldn’t prove it shows how deep corruption and criminal abetting are rooted in US government agencies and political parties today. The indicted group has a relationship with Dimitry Alperovitch and Crowdstrike, the Atlantic Council, and secondary relationships to Hillary Clinton through the DNC and the RNC through people like Senator John McCain.
Until Crowdstrike’s report late in 2016, the tools Fancy Bear used were proprietary identifiers. Even into 2017, the use of these tools was limited to Fancy Bear and Cozy Bear. These same distinct tools were used to hack the group the ODNI, FBI, and Robert Mueller identified as the DNC hacking groups, Fancy Bear/Cozy Bear.
In a security white paper entitled En Route with Sednit Part 1: Approaching the Target Version 1.0 October 2016 by ESET LLC, Shaltai Boltai was hacked by Fancy Bear in late October 2016. ESET made this attribution based on a set of specialized hacking software specific to the group Fancy Bear.
According to RFE/RLRUH8 (Ukraine Cyber Alliance) credits “mostly CyberHunta” with the Surkov e-mail theft and says it was not the result of a spear-phishing scam but rather what he describes cryptically as “special software.” He claims the malware allowed CyberHunta not only to retrieve Surkov’s e-mail but to “take the entire [Russian] presidential administration system under their control, and they gathered information right from the computers.”
This is verified by Ukraine’s SBU. “And the information that is available in these letters, and which were extracted by” Cyberhunt “, are extremely similar. That is, the methods of execution of all these things – on those documents that officially appear in the materials of criminal proceedings, “- said the head of the SBU.
Lastly,
From Forbes “For example, in October of 2016 “Fancy Bear” was accused of hacking (Shaltai Boltai) Humpty Dumpty.- Paul Roderick Gregory a contributor at CyberHunta sister publication euromaidanpress.com
What’s unique about this is Shaltay Boltay leader Anikeev “Lewis” is the actual hacker for what is known as the Surkov leaks. The hacked material was released in two parts. The first, Lewis released himself on the CyberHunta website. This hacked material was then taken directly to the Atlantic Council.
Other victims of Shaltay Boltay include the head of News Media, Aram Gabrelyanov , presenter Dmitry Kiselev , retired o􀄶cer Igor Strelkov- Girkin , presidential aide Vladislav Surkov , Prime Minister Dmitry Medvedev.
While they are not quite on the Russian FSB to-do list, they fall nicely into Ukraine’s.
         The first information dump in the Surkov hack (administrative assistant might have been hacked) Shaltay Boltay posted the information on Ukraine’s Cyberhunta website(you need a password to post on a hacker website).
         After the first information dump was released by Shaltay Boltay leader Anikeev through the CyberHunta web platform, they were authenticated by the Atlantic Council on the 25th of October, 2016.
         Anikeev was tricked into leaving Ukraine in late October by the FSB. He went to Moscow where he was arrested and charged with treason.
         Shaltay Boltay was hacked by Fancy Bear (identified by specific tools Dimitry Alperovitch said were as strong as DNA evidence) and the hacked information (2nd Surkov dump) was released by Ukraine’s CyberHunta.
Shaltay Boltay was part of CyberHunta which was why they could post material on the Ukrainian website. Ukraine’s CyberHunta and Cyber Alliance work for the Ukrainian Information Ministry as Ukrainian cyber Intel and the DNC as opposition researchers in 2016 through Roman Burko and Christina Dobrovolska.
Cyber Alliance hackers are Ukrainian nationalists that did not work directly with Shaltay Boltay. They were hired by Alexandra Chalupa. Shaltay Boltay (Mueller’s DNC hackers) was hacked by Fancy Bear in Ukraine even though according to Mueller they were Fancy Bear…from Ukraine.
From the Ukrainian hackers own webportal InformNapalm– InformNapalm volunteer intelligence community was the original publisher of the analysis and the actual dumps of Surkov’s correspondence provided by Ukrainian Cyber ​​Alliance (UCA) in October 2016 (second Surkov dump)… A few days ago, a number of Russian news agencies published a story about the arrest of FSB officers responsible for information security, the head of department at Kaspersky Lab (Department of cybercrime investigations), and one Vladimir Anikeev who testified against another FSB employee.
Anikeev is believed to be “Lewis”, the spokesperson for Anonymous International. FSB recently decided to confuse the matters by using the discovery on Anikeev’s computer of #SurkovLeaks files, which had been obtained and published by #UCA, and had already been in the public domain.
 As the speaker for #UCA, I categorically deny any connections between Ukrainian Cyber Alliance and Anonymous International. I will now try to unravel this KGB tangle.
According to RUH8 “Shaltai Boltai people post “samples” of letters of influential, but nonpublic
people, virtually without comment. And they also offer information for sale. But did any of the
allegedly sold correspondences surface anywhere? Why not? Because a complete dump would inflict a
tremendous damage on Moscow, whereas the real goal is to pull some strings and rein in a competitor for power.” .-RUH8
As you’ll see in a second, we found our DNC hackers. The same hacker (RUH8) that gave Ukraine’s CyberHunta credit for the Surkov hack and the first part of the document dump takes credit for the second document dump his group hacked from CyberHunta/Shaltay Boltay’s Anikeev after his arrest.
Notice as much as he hates Anikeev, the Ukrainian nationalist RUH8 denies a connection to the FSB regarding Shaltay Boltay’s work.
“Sometimes they get hacking help from their Russian friends, he says. “There are people there who are so angry at their own government that they are risking spy charges and passing information to us,” RUH8 explains.”- Inside The Ukrainian ‘Hacktivist’ Network Cyberbattling The Kremlin-RFERL
RUH8, the proud Russian hating Ukrainian nationalist is clear. Shaltay Boltay, its members Mueller indicted, WERE NOT working for the Russian government when this combined group hacked the 2016 US election. They were working for Ukraine.
Initial reports out of Russian media tied Mikhailov to a group of hackers in Ukraine and Thailand called Shaltay Boltay, which means Humpty Dumpty. The group is reportedly affiliated with Anonymous, who released damaging documents on high-level Russians in 2014 and the Kremlin alleges that the arrests are related to this act, as Markov told The Daily Beast that Mikhailov: “definitely controlled Shaltay Boltay,” which “cooperated with the Ukrainian SBU [security service], which is the same as working for the CIA; he worked with them, which is obviously treason.”-Paste Magazine
What if… Hillary Clinton’s go-to guy accessing the servers to see who was “leaking DNC and Team Hillary communications” was from the cyber experts Alexandra Chalupa hired for opposition research from Ukraine?
Think about this for a second because it’s a sensible scenario. Chalupa checks in with her go-to gal Christina Dobrovolska who doubles as Ukraine’s Cyber spy manager.
Christina checks to see who’s available in Ukraine and it’s the guy whose work the entire Russian election influence narrative was based on. He’s ok because he works with Ukraine’s CyberHunta. Who cares that he hacked Huma Abedin’s Yahoo account is a wanted criminal or works for a foreign Intel service.
“At the same time her aides were creating “loyalty scores”, Clinton, “instructed a trusted aide to access the campaign’s server and download the messages sent and received by top staffers. She believed her campaign had failed her—not the other way around—and she wanted ‘to see who was talking to who, who was leaking to who.”-Jonathan Allen and Amy Parnes. Shattered: Inside Hillary Clinton’s Doomed Campaign
“In particular, he says, spear-phishing — using messages that mimic those of legitimate companies along with a request and link to change personal security information — “is quite efficient.”
RUH8 credits “mostly CyberHunta” with the Surkov e-mail theft and says it was not the result of a spear-phishing scam but rather what he describes cryptically as “special software.”- RUH8 Ukraine Cyber Alliance- RFE/RL
The lights go on and the bell sounds. The DNC Russian hacker narrative begins. Que Alexandra Chalupa.
“In an interview this month, Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists, government officials and private intelligence operatives. “While her consulting work at the DNC this past election cycle centered on mobilizing ethnic communities — including Ukrainian-Americans — she said that, when Trump’s unlikely presidential campaign began surging in late 2015, she began focusing more on the research, and expanded it to include Trump’s ties to Russia, as well.”-Politico 2017 interview with Alexandra Chalupa
It turns out that Ukrainian cyber Intel RUH8’s special Russian friend in Cyberhunta is the same guy Crowdstrike, Comey, Clapper, and Mueller investigated for the DNC hack and the Yahoo hack.
There’s only one problem with the above. The Russian group Shaltay Boltay has never been caught with the Fancy Bear tools. RUH8 and Ukraine’s Cyber Alliance and Cyberhunta had them and used them and used them on Shaltay Boltay. Because the hackers outed themselves by hacking each other with Fancy Bear tools, we have the entire group and subgroups Intel operatives as Chalupa called them in Ukraine.
“So the help of the USA… I don’t know, why would we need it? We have all the talent and special means
for this. And I don’t think that the USA or any NATO country would make such sharp movements in
international politics.” We have no Need of CIA Help Ukrainian Hackers of #Surkov Leaks-RUH8 Ukraine Cyber Alliance, Cyberhunta, Shaltay Boltay, Fancy Bear, Cozy Bear
Reread RUH8’s statements. This is a guy that is dying to do a book and movie deal to finally get the acclaim he thinks he deserves. Let’s give him one- Capturing the DNC Hackers.
After everything was said and done by Comey, Clapper, and Mueller about Russian hackers and influence, Shaltay Boltay’s archives (aka Fancy Bear servers) had to be retrieved from UKRAINE.
“Anonymous International founder, who is now in jail, reported that he had stored his databases with stolen information in a Kiev apartment. Thanks to Anikeev’s testimony, the investigators found out that the information carriers (servers) with the hacked archives are stored in Kiev.”

Why did Ukrainian Intel operatives do all this?

Dimitry Alperovitch of Crowdstrike has an ongoing “Twitter buddy” relationship with Ukraine’s Cyber Alliance, RUH8, and Cyberhunta, which includes Shaltay Boltay dating back to at least 2016.
“Hey. I am the press secretary, a simple Ukrainian hacker, more precisely: we are hackers, but imagine a masked man who speaks to you. I do not do OSINT, I do not tell schoolchildren how to hack websites, I do not care about who and what agreed, I’m not an army or a hundred, I do not obey orders and do not follow a ceasefire, build democracy and fight for justice, I am a hacker, and my goal is to break!
 To break, spoil, rob, entangle, blackmail, frighten, divulge, mock and mock the defenselessness of the victims. Because I can. Hate is my name. I will harm the Russian Federation. And I do not care who you are – a liberal or a guardian, Russians must suffer. Traitors and spongers of Russian invaders must suffer. Pensioners and functionaries, Buryats and October, must suffer. If I find a way how to harm you, even for a penny, I immediately use it. Do you live in Russia? Bad luck. I will not tolerate, will not be merciful, I do not forget and do not forgive.- RUH8
C:\Users\GH\Desktop\spy for hire\CYBER TERROR PART 6 REAL TERRORISM\photos used\threat\RUH8 PROTECTING PEOPLE PRAVY SEKTOR CUTS-twitter.com-2019.04.28-01-33-28.png
Ukraine’s Cyber Alliance (RUH8) and Cyberhunta (including Shaltay Boltay) work under the flag of Dimitro Yarosh’s Pravy Sektor Ukrainian nationalism. The groups and their web platforms were started by former Pravy Sektor spokesman Sviatoslav Yurash. Yurash was also the spokesman for the 2014 EuroMaidan coup, the Ukrainian military, and is the liaison between the ultra-nationalists and the Ukrainian Diaspora through his position as Deputy Director of the Ukrainian World Congress affiliate in Kiev.
All of this started as an Influence Operation in Ukraine that resulted in the 2014 coup and subsequent move to hard Ukrainian nationalism. It bled into the United States as the 2016 election season heated up.
Suffice to say, means, motive, method, and opportunity have been established by the hackers themselves. Sources friendly to their efforts and neutral mainstream sources including RFERL verify it.
If you’re not convinced now, read no further.
         They (as a foreign Intel service) interfered in the 2016 US election.
         They, along with members of the US Intel community tried to destabilize the government in Russia and the USA.
         They shaped and promoted a false narrative that shipwrecked US and Russia relations.
         Their work helped Crowdstrike shape the Fancy Bear-Cozy Bear narrative.
         They shape the US Intel view of what’s going on in Ukraine allowing for crimes against humanity in Donbass (LNR &DNR) to go unaddressed.
         Later in the series, I’ll show these same groups (Ukraine Cyber Alliance, RUH8, Cyberhunta-Fancy Bear/Cozy Bear) were used to manufacture evidence that will be used in the #MH17 trial at the Hague in conjunction with Bellingcat.
         US Intel for hire superstars used the Fancy Bear groups in conjunction with the #Propornot project illegally to identify and take down news and commentary platforms in the US and EU that published stories against the narratives, they were developing and promoting.
         They illegally targeted people expressing social and political opinions. All of this was with the blessing of period ODNI and FBI leadership.

The Disproven Conspiracy Theories about the DNC Hack and 2016 Russian Election Interference

The disproven conspiracy theories about Trump-Russia and Russian election interference is the ones that were proven baseless in court, not the court of opinion. The evidence was fabricated or just not there, to begin with. The FBI’s criminality hiding the real criminals is examined below.
But, these fake stories are still promulgated in an ongoing effort to sabotage the 2020 election cycle and tear the US social fabric apart. Examples of this are- Why Trump Still Believes (wrongly) that Ukraine Hacked the D.N.C.The Conspiracy Theory So Far Out There Even Trump’s Biggest Defenders Are Walking Away From It and @ScottShaneNYT How a Fringe Theory About Ukraine Took Root in the White House.

This article is going to open up the potentially wide-ranging crimes at the FBI aiding and abetting criminals for purely political reasons.

 There are only two possible reactions you can have to this. There are some people that will react emotionally or politically and the consequences be damned. As long as it happens to someone they are sure they hate, why care?
When precedents are set, they work both ways. When political leaders like Trump or Sanders are tried in the court of opinion and declared loyal to a foreign government because the other party doesn’t like them. The method is set for every other person that graces the social or political stage.
Look further into the distance and realize this flows downhill. If it’s fine for political leaders, don’t be surprised when it’s your turn at bat because someone doesn’t like you. This kind of lawlessness spreads quickly as we’ve seen since 2016.
Or maybe it’s time to objectively look at the facts and see where the evidence leads in an unbiased way. That’s it. That’s all.
All of the common knowledge stories rely on readers to assume ODNI head James Clapper’s 2017 report was conclusive and the Mueller investigations were successful. Neither of them was, nor could they ever be.
James Clapper was responsible for the evidence Intel agencies presented in the January 2017 report trying to hamstring the newly elected Trump administration for political reasons.
If ODNI chief Clapper believed the 17 Intel Agency strong report, why couldn’t he stand by the same fact-base in 2018? Clapper no longer cited his iron-clad evidence he presented as proof of Russian interference or the DNC hacks.
In 2018, former ODNI head Clapper’s solid proof of Russian interference in the 2016 election became 78,000 people voted against Hillary Clinton and she lost Wisconsin, Pennsylvania, and Michigan. Notice Jimmy Clapper wasn’t quoting his solid gold January 2017 report anymore.
Who were these 78,000 Clinton haters that cost the DNC the election in 2016?
Back when there was a real Clinton administration, First Lady Hillary Rodman Clinton demanded the US get involved in the Bosnian war. Hillary Clinton supported KLA terrorists and extremists through a bombing campaign. US bombers drove the families of these voters into the arms of murderers so extreme, they were cutting organs out of living people to sell on the black market. Clinton had them taken off the official terrorist lists to the frustration of negotiators trying to make peace during the war.
The Serbian Diaspora voters in Wisconsin, Michigan, and Pennsylvania usually votes for the Democratic ticket, that is, unless your name is Hillary Clinton. This was a bloc vote against Hillary Clinton who they hold responsible for the murder of their families at the hand of terrorists. It’s why Clinton ignored those states campaigning. Clinton mistakenly thought having all the major Diaspora votes in swing-states would be enough.
The problem with the evidence of the Russian government interference in 2016 is it had to be manufactured and repeated by a compliant media to exist.
What will be shown through mainstream sources is the Russian FSB and GRU attacks on the American psyche was produced by domestic and foreign criminals that were hostile to the Russian government for nearly a decade before the DNC hacks. The hackers who are IO specialists were targeting Russian politics, not the US.
Robert Mueller and James Comey are accessories after the fact. They tried feverishly and unsuccessfully to incriminate the wrong people because the facts expose large scale political corruption well beyond what is currently known and it all revolves around Ukraine.
According to PNAS (Proceedings of the National Academy of Sciences of the United States of America) in a study titled Assessing the Russian Internet Research Agency’s impact on the political attitudes and behaviors of American Twitter users in late 2017 there was no Russian impact on the election and they used 6 research standards to measure it.
If you don’t trust official studies done under the Trump administration tenure, Jon Solomon had this to write after uncovering 2016-17 FBI memos: The piecemeal release of FBI files in the Russia collusion investigation has masked an essential fact: James Comey’s G-men had substantially debunked the theory that Donald Trump’s campaign conspired with Moscow by the time the 45th president was settling into the Oval Office, according to declassified memos, court filings and interviews.
And that means a nascent presidency and an entire nation were put through two more years of lacerating debate over an issue that was mostly resolved in January 2017 inside the bureau’s own evidence files. The proof is now sitting in plain view.- FBI’s Russia collusion case fell apart in first month of Trump presidency, memos show
This is why James Clapper changed his tune so radically. When you look at the above, Hillary was taken out behind the woodshed in 2016 for good reasons. Ask yourself what does it have to do with Russians, Russia, or Vladimir Putin or Donald Trump and Bernie Sanders? The only scenario all the evidence supports is Hillary Clinton stepped on a proverbial rake and made herself unelectable in 2016.

FBI, CIA, and ODNI criminal conspiracy against the United States

Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution– Information available as of 29 December 2016 was used in the preparation of this product.
Scope
This report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies. It covers the motivation and scope of Moscow’s intentions regarding US elections and Moscow’s use of cyber tools and media campaigns to influence US public opinion. The assessment focuses on activities aimed at the 2016 US presidential election and draws on our understanding of previous Russian influence operations. When we use the term “we” it refers to an assessment by all three agencies.
I refuse to give James Clapper, James Comey, John Brennan, or Robert Mueller the benefit of the doubt and call them ignorant little men.  They acted with full knowledge of what they were doing. Along with all of the agencies’ department heads, these men used their offices trying to try to overthrow the election of the President of the United States and change the fabric of US society by creating irreparable political and social division.
American officials, sworn to defend the USA used their power to fabricate a political narrative they called Intelligence to create their own foreign policy (Russia/Ukraine)and domestic policy(including media, political norms and policy) for the United States.
As late as 2018, #JamesComey was clear when he dismissed a House intelligence committee report that found no collusion between Russia and the Trump campaign as a “political document”. When the ODNI report was written, he knew there was no evidence of Donald Trump-Russia collusion. They all knew.
ODNI Clapper, FBI Comey, John Brennan and Special Counsel Mueller knew in 2017 that the US Intel community conceded there was no coordinated effort by Russia to influence the 2016 election months before.
They successfully divided the United States socially and politically in ways Orwell would be proud of.

Why did US political activism by sworn officials cross a bridge too far?

It all started falling into place after 9-11. Congress decided the FBI needed to get into the Intelligence business. At the time, the FBI fought the changes saying it would hurt their criminal investigation mandate. Because the CIA legally can’t operate domestically, the FBI was rebooted to do the job.
The 2000s version of the FBI was right. The FBI went from being the world’s premier criminal investigation agency to one of the worst imitations of a private sector  CIA domestically and around the world.
The same man the FBI called a nuisance and danger to national security after the twin towers collapsed in New York networked intelligently enough to become the trainer of choice for the FBI, Homeland Security, CIA, NATO, et al.
This new mandate from Congress created over 5000 new Intel positions right away inside the FBI that were filled with outside contractors.
Today’s Intel agency leaders including Homeland Security and FBI department heads were his students from the early 2000s onward. The rise and risk of Intelligence for hire is detailed in U.S. Intelligence Crisis Poses a Threat to the World (Part 1)
This particular agency trainer almost singlehandedly started the US side of the social-political Russian collusion storyline by himself labeling anyone outside his narrative Kremlin trolls and pro-Russian influencers.  He made looking for pro-Russian collaborators fashionable in a post-2016 world in a way that would make Joe McCarthy tingly.
He personally is why media came under so much scrutiny and groups like Propornot were formed to destroy media that didn’t agree to the McCarthy-like narrative, alternative media sources that spoke against the Clinton campaign and post-2014 Ukraine. Watch as it starts again as the 2020 election cycle heats up.
Along with the other US Intel actors, he aided and abetted the murder of journalists in Ukraine by providing the tools, training, means, and method to set it up. It’s quite an embarrassment for Brennan, Comey, Clapper, Mueller, and the agencies, et al.
Imagine, one of the rock-stars of modern Intel being found in that position after your agencies were trained to look at information like him for over a decade. It’s no wonder they hand-fed the current Russia policy narrative he developed to MSM.
In part2, I’ll detail who he is, many of the crimes, along with the real identities of the DNC hackers.
Fusion GPS and Patterning the Trump-Sanders Accusations and Russia Investigation
If the ODNI and FBI engaged in consistent patterns of activity for political reasons that tear the societal fabric of the USA to support corruption that destroy the lives of US citizens, change foreign policy, and erode citizen’s rights, should it be investigated?
It started with Bernie Sanders during the 2016 primaries. This bled into the 2020 primaries.
Sander’s accusations started with “Adam Parkhomenko, a former aide to Hillary Clinton who has repeatedly suggested that Senator Bernie Sanders owes his popularity to Russian support, backed the attorney’s abortive bid for president.”- NYMag
Sander’s accusations of Russia collusion ended with –“A 37-page indictment resulting from special counsel Robert Mueller’s investigation shows that Russian nationals and businesses also worked to boost the campaigns of Vermont Sen. Bernie Sanders and Green party nominee Jill Stein in an effort to damage Democrat Hillary Clinton”-USA Today
Robert Mueller’s investigation into Bernie Sanders started with a tweeted accusation. Most of the Russian nationals not named were publishers and journalists that support Bernie Sanders and were listed by the FBI trainer who started accusing American web portals of being influencers for the Russian government.

Fusion GPS and the Steele Dossier

Glenn Simpson and Peter Fritsch, the co-founders of the private investigative firm Fusion GPS never tried to vet any of the information Christopher Steele gave them in the infamous and tantalizing Steele Dossier.
The closest anyone has come to a real source is an unknown Russian émigré in the US provided the narrative for Christopher Steele (foreign Intel agent) about events he/she had no first-hand knowledge of.
“Yet, Simpson allegedly acknowledged that most of the information Fusion GPS and British intelligence operative Christopher Steele developed did not come from sources inside Moscow. “Much of the collection about the Trump campaign ties to Russia comes from a former Russian intelligence officer (? not entirely clear) who lives in the U.S.,” Ohr scribbled in his notes.”- The Hill
Is it possible for investigative journalists like Simpson and Fritsch not be even remotely curious about the legitimacy of such scandalous information? This Intel is about an elected US President and they claim they were acting patriotically.
Fusion GPS Founders On Russian Efforts To Sow Discord: ‘They Have Succeeded’. This is quite a statement considering when asked, they admitted they knew absolutely nothing about Steele’s politically motivated fiction.
It’s easy to see why such an appalling politically driven fantasy fell apart after it was given a real examination. But, that’s not the point.
Simpson and Fritsch turned around and gave the Steele Dossier to Republican Senator John McCain (the anti-Trump), knowing full well if he acted in character the Dossier would be made public.  Why McCain’s office? The answer is included below.
“The Washington Times first disclosed the document on April 25, 2017. Republicans later told the Justice Department the filing should have set off alarm bells inside the FBI about Mr. Steele’s credibility, given his admission he had accepted gossip.”-The Washington Times
“The top judge on the federal court overseeing the U.S. government’s surveillance activities accused the FBI on Tuesday of providing false and misleading information about Carter Page in applications to wiretap the former Trump campaign adviser.”– The National Interest
“Before evaluating the media component of this scandal, the FBI’s gross abuse of its power – its serial deceit – is so grave and manifest that it requires little effort to demonstrate it. In sum, the IG Report documents multiple instances in which the FBI – in order to convince a FISA court to allow it spy on former Trump campaign operative Carter Page during the 2016 election – manipulated documents, concealed crucial exonerating evidence, and touted what it knew were unreliable if not outright false claims.
If you don’t consider FBI lying, concealment of evidence, and manipulation of documents in order to spy on a U.S. citizen in the middle of a presidential campaign to be a major scandal, what is?”– The Intercept

ODNI, FBI Hacked and Influenced the American Psyche

Throughout the entire hack and election influence saga US Intel officials acted like spokesmodels for Ukrainian –American Diaspora leader Alexandra Chalupa. They constantly acted for the benefit of private citizen groups and companies who wanted to change US foreign policy and the fabric of society in the USA.
The following is from a man that knows the facts. How can you get such a senior position otherwise? Here’s his big media sound bite;
“FEINSTEIN: And what would those goals have been?
PRIESTAP: I think the primary goal, in my mind, was to sow discord, and to try to delegitimize our free and fair election process. I also think another of their goals, which the entire United States intelligence community stands behind, was to denigrate Secretary Clinton and to try to help then — current President Trump.”- Vox
“Russia, for years, has conducted influence operations targeting our elections,” an FBI agent told Congress on Wednesday. But what made 2016 different was the degree of interference, facilitated by the Internet, said Bill Priestap, the assistant director of the FBI’s Counterintelligence Division.”.-(CNSNews.com)
And here are Bill Priestap’s conclusions after the media turn away and he’s forced to put on his big boy pants and own up to the evidence the FBI has after years of investigation.
“Further, all three witnesses in that hearing—Ms.Manfra, Dr. Files, and FBI Assistant Director for Counterintelligence Bill Priestap—agreed that they had no evidence that votes themselves were changed in any way in the 2016 election.”- REPORT OF THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE ON RUSSIAN ACTIVE MEASURES CAMPAIGNS AND INTERFERENCE IN THE 2016 U.S. ELECTION VOLUME 1: RUSSIAN EFFORTS AGAINST ELECTION INFRASTRUCTURE WITH ADDITIONAL VIEWS
Therein lays the crux of the problem. The FBI wanted the election interference story to resonate publically but under oath, there was never any evidence.
According to the IG Report, FBI leaders, lawyers, and investigators were pulling out all stops to derail Donald Trump before and after the 2016 election. How did this organized, continuous, multi-faceted, and multi-event war play on the American psyche? You tell me.
FBI Tried to Influence the Trump Campaign“While the results of any physical searches related to Page are unknown, what is known is that federal spying on the Trump campaign through Page went further. Prior to the FISA surveillance orders, the FBI tasked informant Stefan Halper with targeting Page. (Another agency may have as well.) The IG report revealed that in targeting Page, Halper sought specific details from Page related to the Trump campaign, and fed Page unsolicited (and potentially illegal) advice concerning campaign strategy.”-The Federalist
The only thing to consider is the FBI may have conducted the biggest set of serial crimes of this decade by a law enforcement agency.
This effectively divided every American on a social and political basis. It wasn’t a single event but a continuing policy surrounding the election, foreign policy, and the lengths federal investigators could go to hamstring the executive branch for political reasons.
Before the December 2016 ODNI-FBI GRIZZLY STEPPE – Russian Malicious Cyber Activity JAR, there was no proof of Russian intervention except what came out of the Clinton camp. James Comey denied it. After the ODNI JAR, there was no evidence of Russian intervention in the 2016 election.
The report itself and the actions surrounding it were nothing short of a successful politically charged foreign policy intervention by the FBI and ODNI. How can I say this?
Mueller indicted a Russian company called Concord Management & Consulting LLC for being the vehicle the Russian government used to interfere in the 2016 election. All the information Robert Mueller, James Comey, and James Clapper had to go on came from the indicted DNC hacking group themselves.
After establishing this, we’ll look at the ongoing relationship between the investigators and the criminal hacking groups to reshape American politics, cover-up enormous corruption in the Obama administration, Clinton campaign, and hamstring an elected US President.
The other company called the Internet Research Agency was part of Concord Management.
“In 2014, according to Russian media, Internet Research Ltd. (Russian: «Интернет исследования») was founded in March 2014, joined IRA’s activity. The newspaper Novaya Gazeta reported that this company is a successor of Internet Research Agency Ltd. Internet Research Ltd. is considered to be linked to Yevgeny Prigozhin, head of the holding company Concord Management and Consulting. The “Trolls of Olgino” are considered to be his project. As of October 2014, the company belonged to Mikhail Bystrov, who had been the head of the police station at Moscow district of Saint Petersburg.
Russian media point out that according to documents, published by hackers from Anonymous International, Concord Management is directly involved with trolling administration through the agency. Researchers cite e-mail correspondence, in which Concord Management gives instructions to trolls and receives reports on accomplished work. According to journalists, Concord Management organized banquets in the Kremlin and also cooperated with Voentorg and the Russian Ministry of Defense.”-Wikipedia
This information is well documented enough to have an almost accurate Wikipedia listing barring one glaring point Mueller, Comey, and Clapper needed to ignore to build their Trump-Russia collusion, Russian election interference, and Russian hacking narrative.
Scott Humor at the Saker.is researched the Internet Research Agency extensively. In an article entitled “A Brief History of the Kremlin Trolls,” he shows clearly the Internet Research Agency only existed on paper. Even then, it ceased to exist in 2015. It was liquidated and the company emerged as a construction retail company called TEKA.
This brings us to the foreign policy objective the US Intel community and US Intel agencies hacked the American psyche very successfully to reach:
“On 29 December 2016, the White House accused and sanctioned the FSB and several other Russian companies for what the US intelligence agencies said was their role in helping the Russian military intelligence service, the Main Intelligence Directorate (GRU) disrupt and spread disinformation during the 2016 US presidential election. In addition, the State Department also declared 35 Russian diplomats and officials persona non grata and denied Russian government officials access to two Russian-owned installations in Maryland and New York.”- Wikipedia
Here’s the fun part. Everything we know about 2016 Russian involvement stems from this same small group that ODNI and FBI had to embellish by magnitudes to link them to a Russian government operation and then indict.
While they were the hackers and Information Operators the FBI investigated and Robert Mueller indicted, the hacking groups weren’t working for the Russian government for the Yahoo hack or the DNC hack and 2016election hacks.
Dmitry Dokuchaev used his position to commit crimes against Russia and the USA which helped the FBI to build the one narrative they needed to fabricate official Russian government involvement.
         U.S. v. Dmitry Dokuchaev, et al.
         “Dokuchaev is a former hacker from Yekaterinburg. He was reportedly blackmailed into joining the FSB, Russia’s domestic intelligence agency, after his private exploits became known to the service, but then built a successful career, rising to the rank of major. The Russian investigation appears to link him to a group called Shaltai Boltai, or Humpty Dumpty, which broke into electronic mailboxes, mostly of Russian officials and business people, obtained compromising information about them and then either sold or published it. The group’s work was a combination of blackmail, competitive intelligence and public relations; Dokuchaev’s alleged role was to direct the group toward particular victims and cover up its activities while pretending to investigate it.”- Bloomberg- What the Yahoo Hack Says About Russian Spies-The 2014 hack appears to have been a business scheme run by Russian intelligence officers
The FSB agency mandate is limited by law to work inside Russia, not outside. This alone makes it illegal for the FSB to engage in state-level espionage and hacking operations outside.
The FSB has an incredible amount of legal authority to surveil all information passed on or through Russian servers.
Jeff Carr noted the Russian Law on the FSB (article 15) states that “all individuals and legal entities in Russia, providing postal services, telecommunications of all kinds, including systems, data communication, satellite communications, are obliged at the request of the Federal Security Service to include in the extra hardware equipment and software, as well as create other conditions necessary for the operational and technical measures by the Federal Security Service.”
And yet;
In case you missed it, the FSB through Dmitry Dokuchaev’s Shaltay Boltay was accused of illegally hacking accounts of Russian officials. Why would the FSB hack these officials it legally had almost unlimited jurisdiction to the information without hacking?
For anyone clinging to the Yahoo or DNC hacks with a purely political mindset; this is the same as walking into a bank vault with $1 billion dollars in it. You know you have the legal right to walk away with any or all of it. But, just for giggles, you hire a foreign criminal to rob the place which makes you liable for bank robbery, conspiracy, and treason.
And in the real world case of Yahoo, you get caught because the Canadian hacker you illegally hired for the Yahoo hack broke the Canadian criminal code of silence when he testified against you.
To put it delicately, this would have to be the most inept crime of all time. For this to be true, Dokuchaev must have just fallen off the turnip truck and hit his head. Got whacked with the ole’ ugly stick at the same time he stepped on a rake as he was laughed at by a 12-year-old girl who wound up and kicked him in the…….Seriously? That’s as insulting as it is injurious.
Instead, what we have is a group of Russian criminals (Shaltai Boltai) who are not working for the Russian government and continually try to hack Russian officials for blackmail. According to Stratfor, “In a 2015 interview, the leader of Shaltai Boltai, code-named “Lewis,” said his group was driven purely by money, not ideology… The narrative linking Shaltai Boltai to the FSB officers came just three days after the initial stories suggesting the FSB officers were the sources of leaks to U.S. intelligence.”
But were Dokuchaev and Shaltai Boltai (Shaltay Boltay) feeding US Intelligence information? If so, what kind of information?
The “Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution” the Office of the Director of National Intelligence ODNI quotes Shaltay Boltay because this group is the primary source of information about both events because they created what we know about them.

Dokuchaev, Shaltay Boltay, the FBI, and Robert Mueller

Summary:
The FBI interviewed members of Shaltay Boltay groups and asked for help writing the 2016 election hacking and influence story. Shaltay Boltay could play the heroes and the villains. They were heroes because they created the influence story about a non-existent company that no one could find that Putin ordered to influence the 2016 election in favor of Donald Trump.
They were the villains because they were the DNC hackers. If Shaltay Boltay cooperated to implicate Trump and Putin, US citizenship and jobs were waiting for them.
Dokuchaev and his working group Shaltai Boltai (Shaltay Boltay), otherwise known as Anonymous International or Humpty Dumpty  are the source for everything known about the Russian Internet Agency (IRA), Russian election interference, and provides the Russian FSB-GRU connection through Dokuchaev needed to make the Russia-DNC hack narrative almost work.
Shaltay Boltay are the Yahoo hackers that stole Huma Abedin’ State Department logins. This is important because it also separates them from being Russian government operatives.
More importantly, their own self described claim to fame was creating realities. Shaltay Boltay primary work is in Information Operations. The founder of the elusive Shaltai Boltai hacker group has been uncovered as Vladimir Anikeyev, a native Dagestani and expert in “black PR.”
It’s no secret today Comey’s FBI and the Mueller investigation were working hard to grasp at any straw they could to derail the Trump presidency. Even though they knew there was no collusion, their teams worked overtime to prove it by pushing half-truths in an invented narrative.
What brings the FBI investigators and Comey’s behavior to a collusion, harboring, and abetting threshold is they identified the leaders of the hacking groups early on, the hackers, and ignored them to hide corruption.

Was the ODNI and Comey’s FBI an accessory after the fact to the DNC Hacks and murder? – Harboring Criminals

Comey’s Russian collusion team and the Mueller probes pushed the 2016 investigations away from the criminals they were supposed to be investigating.
         The FBI, Comey, and Mueller knew Shaltay Boltay (Shaltai Boltai) were part of a higher level group. While this group worked for money, not politics, the higher-level group are extreme nationalists.
The big question if their entire history is blackmailing Russians, who are they working for in relation to the US election?
         The FBI knew this group fabricated the only basis used for a Russia election interference investigation. The FBI knew they did this from Ukraine.
The reason the FBI and Mueller knew the Russian government FSB-GRU connection to the hacks was fabricated was the leaders of Shaltay Boltay were extremely clear and public about hurting the Russian government and Russians.
         The FBI, Comey, and Mueller knew from 2014- late 2016, the indicted and ignored involved leaders and US oriented parts of Shaltay Boltay were located in Kiev, Ukraine.
Shaltay Boltay leaders were wanted criminals and worked against the Russian government 2014-2016 when they fled to Kiev. This is evidenced by the so-called Surkov hack. The emails were released through the working group Shaltay Boltay was with 2014-16.
         The FBI and Mueller had this group’s IP addresses which Mueller used in his indictments and the willing cooperation of the server company that hosted them.
“If we consider the situation from the other side, it is unclear why the FBI and related experts are talking only about our company,” said Fomenko. “After all, the U.S. intelligence report says that the hacking was staged from eight IP addresses, six of them belonging to our company (the criminals used our equipment), and two other companies being not connected with us in any way. One of them is located in the Netherlands, I don’t know about the other. But it’s all just about us. What is this? Prejudice?”-RBTH
         The FBI and Mueller refused to investigate or interview the owner of the server (King Servers) the DNC hackers used who wanted to testify. Yet, Shaltay Boltay’s IP addresses were considered key evidence anyway. Apparently, the DNC hackers owed him money.
The FBI knew the groups involved physical location and concealed it to shield them from the investigation by constantly attributing the DNC and subsequent hacks to Russia.
         The FBI and Mueller purposefully stayed away from the main group and targeted sub-groups, outliers, and used false accusations that protected the Executive branch from being dragged into the investigation. At the very least, all of this happened as the direct result of Obama’s Ukraine and Russia policies.
Shaltai Boltai’s Yevgeny Nikulin was interviewed by the FBI. According to Disobedient Media’s Adam Carter “Nikulin has stated in a letter, passed to his lawyer Martin Sadilek and reported by Moscow Times, that, after his arrest on October 5, 2016, he was visited by the FBI several times, the first of which was on 14-15 November, 2016.
From the Bell– In it, he also mentions attacks on the servers of the Democratic Party committee. Kozlovsky writes that he was engaged in them on behalf of the FSB officer, whom he calls “Ilya.” Later, the hacker began to claim that under the pseudonym “Ilya” he was supervised by FSB Major Dmitry Dokuchaev.
         The FBI investigators allegedly offered payment for information implicating Donald Trump and Vladimir Putin.
On 5/11/17 Newsweek ran an article headlined FBI PROBE INTO CLINTON EMAILS PROMPTED OFFER OF CASH, CITIZENSHIP FOR CONFESSION, RUSSIAN HACKER CLAIMS.“[They told me:] you will have to confess to breaking into Clinton’s inbox for [U.S. President Donald Trump] on behalf of [Russian President Vladimir Putin],” Nikulin wrote, according to The Moscow Times.”
         The FBI, Comey, and Mueller knew Shaltay Boltay was part of a foreign Intel structure whose goal since 2014 has been to disrupt US-Russia relations.
         The FBI knew Shaltay Boltay as part of Ukrainian CyberHunta worked for the Hillary Clinton campaign as opposition researchers through the DNC.
Alexandra Chalupa used private/public Ukrainian Cyber Intel groups Ukraine Cyber Alliance and CyberHunta(part of the Ukrainian Ministry of Information) to do opposition research. Roman Burko and Christina Dobrovolska (US State Department contractor, liaison to the US-Ukrainian Diaspora) led the groups under the Information Ministry.
         The FBI knew the main workgroup also worked in conjunction with Crowdstrike, the Atlantic Council, and members of the US Intel community. The groups were used to fabricate anti-Russian narratives for NATO and statements delivered to US Congressional committees voting on support for Ukraine.
The Daily Beast-The deputy head of its now-defunct Center for Information Security, Sergei Mikhailov, was arrested, along with two colleagues and an employee of the cybersecurity firm Kaspersky, Ruslan Stoyanov, for allegedly passing secret information to Western intelligence agencies.
         The FBI knew only Crowdstrike, Ukraine’s Cyber Alliance (RUH8) and Cyberhunta had possession of key component tools of the DNC hack that Crowdstrike’s Dimitry Alperovitch stated were like DNA evidence.
The FBI knew Crowdstrike relied on information they shared with the Ukrainian Intel groups.
         According to Wikileaks, the phishing attack on Podesta originated in Ukraine.
         The FBI and Mueller knew the groups labeled Fancy Bear/Cozy Bear along with American and British Intel community members were involved in setting up the Ukrainian Information Ministry’s murder for hire platform Myrotvorets beginning very in early 2015.
These same groups protected by the FBI worked with US & UK Intel Community superstars to set up and refine Myrotvorets. This was Ukraine’s hit-for-hire listings that named the enemies of post-Maidan Ukraine. It started with the murder of journalist Olez Buzina one month after the webplatform went live. At the time it went live, I predicted the first murder would soon follow. Unfortunately, it did.
         The FBI knows the core members responsible for all this and that can answer for it are the ones they concealed from the investigation still operate in Ukraine.
Under 18 U.S.C. § 1071, anyone who “harbors or conceals” a person to prevent their “discovery and arrest” is guilty of a crime.

TheTrump-Ukraine Servers

Servers, servers, let’s see who has the Trump-Ukraine server. I chose the following article quote from @benshapiro out of the all the rest of the barrel for the colorful language he uses. Imagine a lone DNC server determined to live its life in peace and solitude makes the arduous journey to Kiev, Ukraine. This is a story of triumph over adversity. It’s a real tear-jerker.
He begins by introducing part of the conversation between Presidents Trump and Zelensky.
 “The Phone Call
According to the transcript of the July 25 phone call between Trump and Ukrainian president Volodymyr Zelensky released by the White House, Trump asks Zelensky for a favor, “because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say Crowdstrike. . . . I guess you have one of your wealthy people. . . . The server, they say Ukraine has it. . . . They say a lot of it started with Ukraine. Whatever you can do, it’s very important that you do it if that’s possible.”
Here, Trump is referring to the baseless conspiracy theory that Russia was framed by Ukraine for the 2016 hack and subsequent release of a damaging tranche of Democratic National Committee emails, which involves a supposed “secret” DNC server being spirited away to and hidden in Ukraine. He seems to be asking Zelensky to investigate the conspiracy theory, presumably in hopes that it would remove the taint of Russian interference from his 2016 victory.”- The Two Theories of Trump’s Actions in the Ukraine Affair By BEN SHAPIRO October 25, 2019 11:01 AM-  National Review
What the wondrous barrel of articles and colorful tales ignore is this is the 21st century and your computer doesn’t need to plug directly into a server. Many people across the world use US hosting services (servers) and vice versa.
Let’s add facts into this and dispense with hyperbole.
Alexandra Chalupa told Politico part of her Oppo-research team was Ukrainian “private Intel.” She hired Ukraine’s Cyber Alliance, RUH8, and Cyberhunta (which included Shaltay Boltay at the time). These groups work for the Ukrainian Information Ministry, SBU (Ukraine’s version of the CIA), the US State Department under Obama, and are Ukraine’s front line Cyber hacking, spy, and Information Operations unit against Russia, Bernie Sanders, and Donald Trump.
Would you have foreign hackers running rampant on your servers based in the United States which fall under the direct legal purview of election law, Constitutional law, and Federal law?
Of course not. If you were in a gray area where your candidate for US President could be taken to the carpet and impeached for using foreign spy services to build the campaign, the best move would be having questionable work or workers that can be questioned on safe ground to begin with.
If you were working for another country’s spy services, would you want a direct fingerprint inside the election of a US president? Again the answer is no. The ramifications to your own country could be enormous once a better than the barrel investigative journalist gets a whiff of it.
If you do your work through a safe server in your own country, you remain anonymous, have a better chance of success, and might get a medal for it.
The above limits the number of servers in the world that could be used to just 4 or 5. Remember, security is everything. These groups are part of the Ukrainian security infrastructure and realistically would need to be able to scale up to nation-state level actions.
1.       Shaltay Boltay’s server where they stored their archive.
2.       The servers RUH8, Cyber Alliance, and Cyberhunta use.
3.       The Ministry of Information servers because all the hackers including Shaltay Boltay (credited with the DNC hack) worked for them
4.       According to the Kiev Post-Ukrainian special services looking into disappearance of servers from presidential office’s situational room because of former Ukrainian President Petr Poroshenko gutted the server room claiming the servers belonged to someone else and had to be returned. He paid for this out of his own pocket instead of Ukrainian state funds. This is almost blasphemy for a graft guy like Poroshenko. The former Ukrainian president is adamant that even though they were the most protected servers in Ukraine, no Ukraine state business was conducted on them.
The reason for this shortlist instead of a particular DNC server is their servers will catalog all their crimes. Not just the DNC hack adventure. It will also catalog all their contacts. This part is important to pursue criminal and civil investigations for crimes and damages they did to news and analytical platforms, public people, journalists, and citizens of the US, Russia, EU, as well as their own country, Ukraine.
In case you haven’t realized it yet, the sites that were hacked in association to #Propornot and lost income, jobs, or reputation, are entitled to restitution. Crimes have been committed against the American, Russian, and EU people, Democratic party members, the Trump administration, Bernie Sanders campaign 2016.
Will the FBI, ODNI, and private Intel companies be held accountable for allowing and protecting foreign spy agencies to operate freely inside US infrastructure?
The politicization of the ODNI, FBI, and CIA needs to cease. This can only be done by phasing out private money from the Intel and law enforcement game. The FBI has no business in the Intel game because the change of mandate is what corrupted a world-renown criminal investigation agency in the first place.
Next up in the series: Outing the DNC hackers

Pro Tip: Mentally Replace All Uses of “Conspiracy Theorist” with “Iraq Rememberer”

By Caitlin Johnstone

Source

Powel Iraq 3c62d

I watched the film Official Secrets the other day, which I highly recommend doing if you want to rekindle your rage about the unforgivable evil that was the Iraq invasion.

Which is a good thing to do, in my opinion. Absolutely nothing was ever done to address the fact that a million people were murdered with the assistance of government lies just a few short years ago; no new laws were passed mandating more government transparency or accountability with its military operations, no war crimes tribunals took place, no new policies were put into place. No one even got fired. In fact we’ve seen the exact opposite: the people responsible for unleashing that horror upon our species have been given prestigious jobs in government and media and the US government is currently collaborating with the UK to set the legal precedent for charging under the Espionage Act any journalist in the world who exposes US war crimes.

The corrupt mechanisms which gave rise to the Iraq invasion still exist currently, stronger than ever, and its consequences continue to ravage the region to this very day. The Iraq war isn’t some event that happened in the past; everything about it is still here with us, right now. So we should still be enraged. You don’t forgive and forget something that hasn’t even stopped, let alone been rectified.

Apart from the howling rage surging through my veins during the film, the other thing I experienced was the recurring thought, “This was a conspiracy. This is the thing that a conspiracy is.”

And, I mean, of course it is. How weird is it that we don’t use that word to describe what the architects of that war did? Conspiracy is defined as “a secret plan by a group to do something unlawful or harmful.” From the secret plan between the NSA and GCHQ to spy on and blackmail UN members into supporting the illegal invasion which is the subject of Official Secrets, to the mountain of other schemes and manipulations used by other government bodies to deceive the world about Iraq, it’s absolutely insane that that word is never used to describe the conspiracy within the Bush and Blair governments to manufacture the case for war.

The engineering of the Iraq war was a conspiracy, per any conceivable definition. So why isn’t that word reflexively used by everyone who talks about it?

Easy. Because we haven’t been trained to.

The use of the word “conspiracy” is studiously avoided by the narrative managers of the political/media class who are tasked with the assignment of teaching us how to think about our world, except when it is to be employed for its intended and authorised use: smearing skeptics of establishment narratives. The pejorative “conspiracy theory” has been such a useful weapon in inoculating the herd from dissident wrongthink that the propagandists do everything they can to avoid tainting their brand, even if it means refraining from using words for the things that they refer to.

This is why the word “collusion” was continuously and uniformly used throughout the entire Russiagate saga, for example. It was a narrative about a secret conspiracy between the highest levels of the US government and the Russian government to subvert the interests of the American people, yet the word “conspiracy” was meticulously replaced with “collusion” by everyone peddling that story.

Max Blumenthal

@MaxBlumenthal

A self-described “former Rolling Stone fact-checker” called me (what else?) a “conspiracy theorist.” But when challenged, this was the best she could do. 🤣 https://twitter.com/MeredithLClark/status/1200447148858445827 

Syria narrative managers on Twitter have been in meltdown for a week ever since the Rolling Stone podcast Useful Idiots featured oppositional journalist Max Blumenthal talking about the US-centralized empire’s involvement in the Syrian war and its pervasive propaganda campaign against that nation. The entire site has been swarming with high-visibility blue-checkmarked thought police demanding the heads of the show’s hosts Matt Taibbi and Katie Halper for giving this evil “conspiracy theorist” a platform to say we’re being deceived about yet another US-led regime change intervention in yet another Middle Eastern nation.

Narrative managers use the “conspiracy theorist” pejorative to shove skepticism of establishment narratives into the margins of political discourse, far away where it can’t contaminate the mainstream herd. Whenever you see a dissenting interpretation of events getting too close to mainstream circles, as with Blumenthal appearing on a Rolling Stone podcast, Tulsi Gabbard saying on national television that the US government has armed terrorists, or Tucker Carlson interviewing Jonathan Steele about the OPCW leaks, you see an intense campaign of shrieking outrage and public shaming geared at shoving those dissident narratives as far into the fringe as possible by branding them “conspiracy theories”.

My suggestion then is this: whenever you see the label “conspiracy theorist” being applied to anyone who questions an establishment narrative about Syria, Russia, Iran or wherever, just mentally swap it out for the term “Iraq rememberer”. When you see anyone shouting about “conspiracy theories”, mentally replace it with “Iraq remembering”. It makes it much easier to see what’s really going on: “Oh those damn Iraq rememberers! Why can’t they just trust their media and government about what’s happening in Syria instead of indulging in Iraq remembering?”

Rania Khalek

@RaniaKhalek

The regime changers have been melting down for days bc @kthalps and @mtaibbi interviewed @MaxBlumenthal on their @RollingStone podcast. They can’t stand seeing an antiwar voice anywhere near the mainstream. Check out the episode that’s driving them mad https://youtu.be/5Pb7Q5aSmi0 

Powerful people and institutions secretly coordinating with each other to do evil things is the absolute worst-case scenario for the rest of the population; it is precisely the thing we fear when we allow people and institutions to have power over us. We need to be able to talk about that worst-case scenario occurring, especially since we know for a fact that it does indeed happen. Powerful people do conspire to inflict evil things upon the rest of us, and we do need to use thoughts and ideas to discuss how that might be happening. We are not meant to think about this, which is why we’re meant to forget about Iraq.

The Iraq invasion was like if a family were sitting around the dinner table one night, then the father stood up, decapitated his daughter with a steak knife, then sat back down and continued eating and everyone just went back to their meals and never talked about what happened. That’s how absolutely creepy and weird it is that the news churn just moved on after a conspiracy within the most powerful government in the world led to the murder of a million human beings, and now we’re all somehow only supposed to care about Trump’s rude tweets.

Never forget the Iraq war conspiracy, no matter how hard they try to make you. They did it before, they’ve done it again in Libya and Syria, and they’ll continue to attempt it in the future. When you sound the alarm about this they will call you a conspiracy theorist. All they’re really saying is that you’re one of those annoying pests who just won’t shut up and forget about Iraq.

Deep State Coup D’Etat: Subverting the U.S. Presidency from JFK to Trump

Global Research, November 24, 2019

On the Global Research News Hour we do our best to cover a wide spectrum of topics from the environmental crisis to economic and geopolitical analysis to debunking war pre-text narratives.

We welcome listener support to maintain and improve the quality of our regular broadcasts. Please consider a donation. Go to Global Research’s main donation page and tag your gift ‘GRNH.’

LISTEN TO THE SHOW

Click to download the audio (MP3 format)

“The President of the United States is a transient official in the regard of the warfare conglomerate. His assignment is to act as master of ceremonies in the awarding of posthumous medals, to serve when needed as a salesman for the military hardware manufacturers and to speak as often as possible about the nation’s desire for peace. He is not free to trespass on the preserve of the war interests nor even to acknowledge that such an organism exists.” – Jim Garrison (May 27, 1969) [1]

The murder of President John F. Kennedy on November 22, 1963 is widely recognized as a pivotal moment in U.S. history.

It was the first assassination of a U.S. president in the television age. The death of Kennedy enabled Cold Warriors within Washington to pursue their pillaging of the African, South American and Asian continents with substantially less resistance. But perhaps just as significantly, it marked an important chapter in a long-standing power struggle between big moneyed interests in America along with their intelligence operatives, and recognizable constitutional government, made up of representatives elected by the people and accountable to the public.

It was in direct response to inconvenient questions around the first Kennedy assassination that the CIA weaponized the term ‘conspiracy theory,’ a thought-stopping ad-hominem attack intended to disarm truth-seekers challenging the crimes that a controlled media fail to thoroughly investigate.

The existence of Wall Street overlords acting in tandem with military-intelligence figures as a kind of shadow government or ‘Deep State’ to appropriate the foreign policy and war-making apparatus of a country puts in doubt any assertions of America as a properly functioning democracy with power overseen and exercised by duly appointed representatives.

There have been several examples of similar State Crimes Against Democracy deliberately concealed and covered up so as to protect unaccountable elites. The assassinations of John Kennedy’s brother RobertMartin Luther King, and Malcolm X, as well as the (false flag) terrorist attack known as 9/11 being among the more famous examples.

Against this backdrop, we witness the spectacle of President Trump having his authority challenged in an exhaustively publicized impeachment proceeding. Considering documented war crimes and other malfeasance committed by presidents spanning the last half century, one wonders why the particular allegations against Trump are being pursued so relentlessly, and not others. At the end of the day, impeachment or no, will the people end up with a marginally more accountable government, or will the unaccountable power behind the throne have been reinforced by this 21st Century Kabuki theater?

This week’s episode of the Global Research News Hour radio program is as much an attempt to view the current impeachment proceedings against Donald Trump through the lens of ‘deep politics’ as an anniversary commemoration of the assassination of one of America’s most popular presidents. We have taken the liberty to reach out to two authoritative scholars of events like the Kennedy assassinations and 9/11 to get their insights into what the Trump impeachment drama might mean from the stand-point of entrenched unaccountable power within the USA.

In our first half hour. We hear from writer, researcher and frequent guest Mark Robinowitz. He discloses his thoughts about how and why earnest investigators into clandestine operations implicating the Deep State get side-tracked and typically fail to achieve the changes in the political and legal system that should, in a fair world, spring from revelations of truths implicating high officials.

In our second half hour, legendary ‘Deep State’ researcher and author Professor Peter Dale Scott joins us to describe some of the characteristics all of these events have in common, he locates the commonalities between Trump and former Presidents Nixon and Kennedy, and tracks the evolution of the National Security State’s grip on power since that fatal shooting in Dallas 56 years ago.

Mark Robinowitz is a writer, political activist and ecological campaigner. He manages the sites oilempire.us and jfkmoon.org which look into the Deep Political events and how they intersect with politics, economics and ecology. He is based in Eugene, Oregon.

Peter Dale Scott is a former Canadian diplomat, Professor of English at the University of California, Berkeley, co-founder of the Peace and Conflict Studies program at Berkeley, poet, and 2002 recipient of the Lannan Poetry Award. His political books include American War Machine: Deep Politics, the CIA Global Drug Connection, and the Road to Afghanistan  (2010), The American Deep State: Wall Street, Big Oil, and the Attack on U.S. Democracy (2014) and  Dallas ’63: The First Deep State Revolt Against the White House (2015). He is a Research Associate of the Centre for Research on Globalization. His website is http://www.peterdalescott.net.

(Global Research News Hour episode 278)

LISTEN TO THE SHOW

Click to download the audio (MP3 format)

The Global Research News Hour airs every Friday at 1pm CT on CKUW 95.9FM out of the University of Winnipeg. The programme is also podcast at globalresearch.ca .

The Global Research News Hour now airs Fridays at 6pm PST, 8pm CST and 9pm EST on Alternative Current Radio (alternativecurrentradio.com)

Community Radio Stations carrying the Global Research News Hour:

CHLY 101.7fm in Nanaimo, B.C – Thursdays at 1pm PT

Port Perry Radio in Port Perry, Ontario –1  Thursdays at 1pm ET

Burnaby Radio Station CJSF out of Simon Fraser University. 90.1FM to most of Greater Vancouver, from Langley to Point Grey and from the North Shore to the US Border.

It is also available on 93.9 FM cable in the communities of SFU, Burnaby, New Westminister, Coquitlam, Port Coquitlam, Port Moody, Surrey and Delta, in British Columbia, Canada. – Tune in  at its new time – Wednesdays at 4pm PT.

Radio station CFUV 101.9FM based at the University of Victoria airs the Global Research News Hour every Sunday from 7 to 8am PT.

CORTES COMMUNITY RADIO CKTZ  89.5 out of Manson’s Landing, B.C airs the show Tuesday mornings at 10am Pacific time.

Cowichan Valley Community Radio CICV 98.7 FM serving the Cowichan Lake area of Vancouver Island, BC airs the program Thursdays at 6am pacific time.

Campus and community radio CFMH 107.3fm in  Saint John, N.B. airs the Global Research News Hour Fridays at 10am.

Caper Radio CJBU 107.3FM in Sydney, Cape Breton, Nova Scotia airs the Global Research News Hour starting Wednesday Morning from 8:00 to 9:00am. Find more details at www.caperradio.ca

RIOT RADIO, the visual radio station based out of Durham College in Oshawa, Ontario has begun airing the Global Research News Hour on an occasional basis. Tune in at dcstudentsinc.ca/services/riot-radio/

Radio Fanshawe: Fanshawe’s 106.9 The X (CIXX-FM) out of London, Ontario airs the Global Research News Hour Sundays at 6am with an encore at 3pm.

Los Angeles, California based Thepowerofvoices.com airs the Global Research News Hour every Monday from 6-7pm Pacific time.

Notes:

  1. Interview with Jim Garrison, District Attorney for Parish of Orleans, Louisiana. File Reproduced at the National Archives and released June 7, 2004; 200https://statick2k-5f2f.kxcdn.com/images/pdf/garrison-interview-05-27-1969.pdf
Related

Rethinking National Security: CIA and FBI Are Corrupt, but What About Congress?

Image result for Rethinking National Security: CIA and FBI Are Corrupt, but What About Congress?
Philip Giraldi
November 21, 2019

The developing story about how the US intelligence and national security agencies may have conspired to influence and possibly even reverse the results of the 2016 presidential election is compelling, even if one is disinclined to believe that such a plot would be possible to execute. Not surprisingly perhaps there have been considerable introspection among former and current officials who have worked in those and related government positions, many of whom would agree that there is urgent need for a considerable restructuring and reining in of the 17 government agencies that have some intelligence or law enforcement function. Most would also agree that much of the real damage that has been done has been the result of the unending global war on terror launched by George W. Bush and Dick Cheney, which has showered the agencies with resources and money while also politicizing their leadership and freeing them from restraints on their behavior.

If the tens of billions of dollars lavished on the intelligence community together with a “gloves off” approach towards oversight that allowed them to run wild had produced good results, it might be possible to argue that it was all worth it. But the fact is that intelligence gathering has always been a bad investment even if it is demonstrably worse at the present. One might argue that the CIA’s notorious Soviet Estimate prolonged the Cold War and that the failure to connect dots and pay attention to what junior officers were observing allowed 9/11 to happen. And then there was the empowerment of al-Qaeda during the Soviet-Afghan war followed by failure to penetrate the group once it began to carry out operations.

More recently there have been Guantanamo, torture in black prisons, renditions of terror suspects to be tortured elsewhere, killing of US citizens by drone, turning Libya into a failed state and terrorist haven, arming militants in Syria, and, of course, the Iraqi alleged WMDs, the biggest foreign policy disaster in American history. And the bad stuff happened in bipartisan fashion, under Democrats and Republicans, with both neocons and liberal interventionists all playing leading roles. The only one punished for the war crimes was former CIA officer and whistleblower John Kiriakou, who exposed some of what was going on.

Colonel Pat Lang, a colleague and friend who directed the Defense Intelligence Agency HUMINT (human intelligence) program after years spent on the ground in special ops and foreign liaison, thinks that strong medicine is needed and has initiated a discussion based on the premise that the FBI and CIA are dysfunctional relics that should be dismantled, as he puts it “burned to the ground,” so that the federal government can start over again and come up with something better.

Lang cites numerous examples of “incompetence and malfeasance in the leadership of the 17 agencies of the Intelligence Community and the Federal Bureau of Investigation,” to include the examples cited above plus the failure to predict the collapse of the Soviet Union. On the domestic front, he cites his personal observation of efforts by the Department of Justice and the FBI to corruptly “frame” people tried in federal courts on national security issues as well as the intelligence/law enforcement community conspiracy to “get Trump.”

Colonel Lang asks “Tell me, pilgrims, why should we put up with such nonsense? Why should we pay the leaders of these agencies for the privilege of having them abuse us? We are free men and women. Let us send these swine to their just deserts in a world where they have to work hard for whatever money they earn.” He then recommends stripping CIA of its responsibility for being the lead agency in spying as well as in covert action, which is a legacy of the Cold War and the area in which it has demonstrated a particular incompetence. As for the FBI, it was created by J. Edgar Hoover to maintain dossiers on politicians and it is time that it be replaced by a body that operates in a fashion “more reflective of our collective nation[al] values.”

Others in the intelligence community understandably have different views. Many believe that the FBI and CIA have grown too large and have been asked to do too many things unrelated to national security, so there should be a major reduction-in-force (RIF) followed by the compulsory retirement of senior officers who have become too cozy with and obligated to politicians. The new-CIA should collect information, period, what it was founded to do in 1947, and not meddle in foreign elections or engage in regime change. The FBI should provide only police services that are national in nature and that are not covered by the state and local jurisdictions. And it should operate in as transparent a fashion as possible, not as a national secret police force.

But the fundamental problem may not be with the police and intelligence services themselves. There are a lot of idiots running around loose in Washington. Witness for example the impeachment hearings ludicrous fact free opening statement by House Intelligence Committee chairman Adam Schiff (with my emphasis) “In 2014, Russia invaded a United States ally, Ukraine, to reverse that nation’s embrace of the West, and to fulfill Vladimir Putin’s desire to rebuild a Russian empire.”

And the press is no better, note the following excerpt from The New York Times lead editorial on the hearings, including remarks of the two State Department officers who testified, on the following day: “They came across not as angry Democrats or Deep State conspirators, but as men who have devoted their lives to serving their country, and for whom defending Ukraine against Russian aggression is more important to the national interest than any partisan jockeying…

“At another point, Mr. Taylor said he had been critical of the Obama administration’s reluctance to supply Ukraine with anti-tank missiles and other lethal defensive weapons in its fight with Russia, and that he was pleased when the Trump administration agreed to do so

“What clearly concerned both witnesses wasn’t simply the abuse of power by the president, but the harm it inflicted on Ukraine, a critical ally under constant assault by Russian forces. ‘Even as we sit here today, the Russians are attacking Ukrainian soldiers in their own country and have been for the last four years…’ Mr. Taylor said.”

Schiff and the Times should get their facts straight. And so should the two American foreign service officers who were clearly seeing the situation only from the Ukrainian perspective, a malady prevalent among US diplomats often described as “going native.” They were pushing a particular agenda, i.e. possible war with Russia on behalf of Ukraine, in furtherance of a US national interest that they fail to define. One of them, George Kent, eulogized the Ukrainian militiamen fighting the Russians as the modern day equivalent of the Massachusetts Minutemen in 1776, not exactly a neutral assessment, and also euphemized Washington-provided lethal offensive weapons as “security assistance.”

Another former intelligence community friend Ray McGovern has constructed a time line of developments in Ukraine which demolishes the establishment view on display in Congress relating to the alleged Russian threat. First of all, Ukraine was no American ally in 2014 and is no “critical ally” today. Also, the Russian reaction to western supported rioting in Kiev, a vital interest, only came about after the United States spent $5 billion destabilizing and then replacing the pro-Kremlin government. Since that time Moscow has resumed control of the Crimea, which is historically part of Russia, and is active in the Donbas region which has a largely Russian population.

It should really be quite simple. The national security state should actually be engaged in national security. Its size and budget should be commensurate with what it actually does, nothing more. It should not be roaming the world looking for trouble and should instead only respond to actual threats. And it should operate with oversight. If Congress is afraid to do it, set up a separate body that is non-partisan and actually has the teeth to do the job. If the United States of America comes out of the process as something like a normal nation the entire world will be a much happier place.

The Terrorists Among US8- Trump Whistle Blower & the ODNI FBI CIA DOD NATO-COE

September 26, 2019

The Terrorists Among US8- Trump Whistle Blower & the ODNI FBI CIA DOD NATO-COE

by George Eliason special correspondent of the Saker blog in Novorussia

Let’s explore the top of the chain in the Information Operation and Intel community coup against the presidency. The same private contractors responsible for the 2014 coup in Ukraine brought it home to the US in time to get involved in the election. Losing that bid, they have been working to alter the fabric of the country forever. No one likes to lose.

Enough information has come in about the whistleblower what group is a secondary source to determine who the primary sources of information against President Donald Trump is.

At the bottom of this article you’ll find the names of people overseeing the primary sources and why they were found so easily. If you have followed parts 1-7 in this series, you’ll walk away feeling like I somehow scripted the Trump-Zelenskiy whistleblower narrative.

The bigger questions of why is all this happening right now need to be answered. If you haven’t read The Terrorists Among US – The Coup Against the Presidency I suggest you start there because it shows a blow by blow of the coup in progress up to this point.

So, what if US Intel capabilities were under the control of a few extremely rich families that served their own political goals and those of their clientele? I’m seriously suggesting and going to prove that at the agency level, the US government no longer controls its own spies.

When we look at the concept of terrorists among the US, the ultimate betrayal is from people whose families became enriched because they positioned themselves as the first line of defense protecting the American way of life.

They were able to replace the work they did leading government agencies after they left with the work they were doing in the private sector. This is because they led all the agencies out of the post 9/11 world into a digital age no one knew anything about.

They are the same group hiring over 4 million people to work in the Intel, Information Operation, hacking, boots on the ground, and media, to change the world to their liking and that of their clients.

When that reality sinks in, remember, the US already has the entire digital world in net so tight that nothing slips by. Those 4 million undertrained people are for the benefit of the contractors described below.

The people leading these companies can’t make money in a normal world where diplomacy and mutual respect are the coin of the realm. Their profits and egos only exist where chaos and uncertainty reign. Even today it’s estimated that more than 70% of Intel workers are not government employees. This is what created the problem of privatized terrorism that exists today.

In a 2007 Washington Post OpEd entitled “The Value of Private Spies”, DNI McConnell conceded there was a huge danger in using private companies for intelligence and direct action work. Because of this he claimed “Our workforce has recovered to the point that we can begin to shed some contract personnel or shift them away from core mission areas, and the CIA is leading the way in this,” the ODNI stated.”

In 2007, CBS noted Defense Intelligence Agency (DIA) lawyers revealed at a conference in May that contractors make up 51 percent of the staff in DIA offices. At the CIA, the situation is similar. Between 50 and 60 percent of the workforce of the CIA’s most important directorate, the National Clandestine Service (NCS), responsible for the gathering of human intelligence, is composed of employees of for-profit corporations.

After 9/11 the U.S. government shortened the learning curve by hiring contractors in droves. According to John Pike of GlobalSecurity.org in 2007 America’s spy network would soon resemble NASA’s mission control room in Houston.

Most people, when they see that room, think they’re looking at a bunch of NASA people,” Pike notes. “But it’s 90 percent contractors.”

As discussed in US Intelligence Poses a Threat to the World, as early as 2004, more than 50% of Intel services were manned by private contractors. By, 2007, 70 percent of the Pentagon’s Counterintelligence Field Activity (CIFA) unit is staffed by contractors, known as ‘green badgers.

Private Intel contractors trained the agency starting after 9/11. Soon it became the contractors that had the oversight. Managers left government service to work for private contractors and came back under lucrative corporate contracts.

Effective control, support, and management functions are in the hands of people that care more about a bottom line, politics, and a business forecast model.

The line between inherently governmental work and private contracting was smashed. While the lawman tries to bring the criminal in for justice, the bounty hunter brings back a body so he can be paid.

The New York Times headlined Private Surveillance Is a Lethal Weapon Anybody Can Buy Is it too late to rein it in? By Sharon WeinbergerJuly 19, 2019

The real 1% are Cyber

In a 2015 article at The Nation titled “How Private Contractors Have Created a Shadow NSA,” Tim Shorrock describes what he calls “the cyberintelligence ruling class.”

“Over the last 15 years, thousands of former high-ranking intelligence officials and operatives have left their government posts and taken up senior positions at military contractors, consultancies, law firms, and private-equity firms. In their new jobs, they replicate what they did in government—often for the same agencies they left. But this time, their mission is strictly for-profit,” Shorrock wrote.

Many of the principal figures come from America’s wealthiest families. Although the wealthiest have always had a lead in filling policy and cabinet positions, this time the public service aspect is missing.

 Shorrock goes on to detail how the same 1% Americans claim to be fighting is the cyberintelligence elite that controls the media.  Mathew Olsen is an example as the former National Counterterrorism Center director and current IronNet Corp. president. He joined ABC as a commentator. He goes further and shows how this is the rule and not the exception.

This is going on all across media channels. Every network has their own cyberintelligence “expert” to explain complicated topics, but their conflicts of interest almost always remain hidden.”

War and peace is no longer in the hands of governments. Until governments push back, your sons and daughters die grossly and openly for the highest paying lobbyist or business.

Michael Chertoff from 2005-2009 ran the massive Department of Homeland Security, where he was criticized for exempting the DHS from following laws on everything from the environment to religious freedom. A report issued by the Congressional Research Service said at the time that the delegation of unchecked powers to Chertoff was unprecedented. He was also known for railing against international law, warning that treaties such as the Geneva Conventions were placing undue constraints on U.S. actions abroad. As a long-time insider – in both the public and private sector – he is one of the top figures in the U.S. intelligence-security complex.

Private sector services mirror what they do for government including Intel-for-Hire, espionage, information operations, direct action, and state-sized propaganda operations. This is work that the government has stated on many occasions needs to remain with the agencies that can be held responsible to the public – and not to private companies that aren’t. .- From Mint News “How Intel for Hire Undermines US Intelligence

Intel Community Betrayal at Every Level

When we look at the Intel community as a whole and the agencies under the ODNI, how are we not betrayed? While there are real public servants in the Intelligence services, the trend is toward criminality and the leadership that deceived the public and violated their oaths of office.

As an example, DNI James Clapper’s admission the only proof he had of Russian influence on the 2016 election was Hillary Clinton (HRC) losing Michigan, Wisconsin, and Pennsylvania. It stretches credulity to conclude that Russian activity didn’t swing voter decisions.”

That’s it that’s all. It would have been better if there was collusion if there was a Russian hack. Instead, it was part of an Information Operation that US Intelligence agency heads were in on.

The Information Operation (IO) detailed in the last installment is the single largest example of this known today. If you want to know what collusion is, start there.

Private contractors and political activists have taken it upon themselves to change the government in the United States of America. The private contractors are in the Intelligence field and work both for the government and the conspirators trying to overthrow the type of government the United States currently has.

How else can the existence of the IO coup be explained? The most extensive regime change operation by private contractors is going on in the US for 3 years and the ODNI, CIA, FBI, DOD, NSA, with budgets bigger than the next largest countries militaries, can’t find it or figure out what happened?

What is billed as the crime of the century is swept under the rug as far as investigations go? The DNC hack and Russian influence game tore at the fabric of the country. Is it because former FBI head Robert Mueller’s protégé started the newest dilettante mega-corporation in the spy game? Shawn Henry’s Crowdstrike just happened to be in a position to fabricate extensive and childish fables about the DNC, Podesta, and RNC hacks.

Remember, before it was Ruskies, according to Crowdstrike, it was Bernie Sanders stepping on HRC servers.

Let’s reverse the angle and expose the criminals.

If those crimes did happen under their watch Comey, Clapper and company should have been fired for incompetence because of all the information available to them at the time.

When did an actual crime occur according to ODNI agencies about the 2016 election? The crime occurred in December 2018 when the agency heads figured out their welcome was worn out with the incoming administration.

The above named were already working for the privatized 1% while still on government payrolls. They may not have gotten paid but they turned around and towed the narrative from that period forward. The wiretaps at Trump towers are ample proof of this.

Because HRC lost an election in states that had swing populations of bloc voters that hate HRC, the Russians did it, Mr. Clapper?

Reality dictates Clapper along with Comey, McCabe, Page, and company was willfully part of a conspiracy paid for by the lobbyist groups working to benefit a politician and supported by a foreign country (Ukraine) to overthrow the 2016 US elections. This started during the primaries and continued in the background throughout the election.

When this didn’t work out, the plan switched gears and became a full-court press to discredit and overthrow the presidency itself. Now keep in mind the infrastructure for the coup was put in place before Donald Trump declared his candidacy. It is a coup against the presidency.

The private Intel corporations that brought us the failed Hamilton 68 Russian catcher (courtesy of Michael Chertoff) and other media information war games are the only game in town for the likes of James Clapper, meaning there has to be some kind of lucrative life for a master spy.

The ODNI under Clapper and FBI leadership under Comey went all in for the conspiracy to overthrow the presidency after November 2016.

Why this happened and how this happened is the most dangerous game on the planet today. With the background articles 1-7 of the series in place, the explanation of why they did it became a matter of understanding process and people.

Like Joel Harding, they wanted more action but by playing the private spy game they didn’t have to color inside the lines anymore. Private Intel, IO, Espionage, and boots on the ground companies paint the lines as they go and pay for the lines to be moved as needed.

Those in the agencies or companies that went along with this because it was their job or worse, knowing they could make money lying to the press, public, and the in the PDB, must be investigated and dealt with in the harshest terms.

The reason is simple. You are the game they play. There aren’t enough bad guy countries on ten planet earths to support the game or generate the revenues consistently. That’s on September 26, 2019.

The agencies tasked with spying, IO, Infowar, Cyberwar, war, diplomacy, etc are all beyond compromised. Add in the almost complete ownership of media by stakeholders in these companies and you have a recipe for the end of everything we know.

Right now, they are keen on overthrowing the presidency. If successful, it won’t matter which party is seated in the Oval Office. Just take a position they don’t like.

Right now, they are set on controlling public opinion and political ideology. Most of the people gravitating into these fields in the private sector are politically and emotionally undeveloped. They understand the violence they are willing to bring the populace and the rush it gives them.

War and Peace

While all this is going on, at the same time, the agencies staffed with the same contractors are delivering intelligence that is supposed to be filtered. A neutral report is supposed to be written by the agency in charge before it is delivered into the presidential daily briefing (PDB). The PDB is the most important document produced because of its impact on the world daily.

From the PDB, the president of the United States decides:

•           Who is the enemy?

•           Who is friendly (or are there really any friends out there)?

•           Who is a danger and how?

•           Why are they a danger?

•           What is their motivation?

•           What steps will the US need to take to stop them, turn them in a different direction, or make peace with them?

What happens when the PDB is written by agency personnel or private contractors that want to destroy or embarrass the United States or the sitting president?

How bad does your politics have to be to be OK with starting wars for the sake of your undeveloped ego? It’s going on as we speak.

Jameel Jaffer, deputy legal director at the American Civil Liberties Union, said the reported incidents of NSA employees’ violations of the law are likely “the tip of the iceberg” of lax data safeguards. The laws guiding the NSA’s spying authority in the first place are a bigger issue, he said. “If you only focus on instances in which the NSA violated those laws, you’re missing the forest for the trees,” Jaffer said. “The bigger concern is not with willful violations of the law but rather with what the law itself allows.”

The US government must bring these services back in house. The stakes are too high for the entire world not to. Americans are first on the plate for private Intel today. If you don’t think so, disagree with one of them.

Whistle Blowing Ukrainians

In what turns out to be one of the most fortuitous events in recent history, Donald Trump’s whistleblower source is in Ukraine. The whistleblower, according to a Ukrainian SBU source is Ukrainian. Lightning has struck again in the same spot for the thousandth time.

The same Ukrainian Intel and hacking groups are at it again.

According to the Hill, A whistleblower complaint released by the House Intelligence Committee on Thursday alleges that President Trump sought to enlist Ukraine’s help in the 2020 election by mounting a corruption investigation against former Vice President Joe Biden.

The declassified version of the whistleblower complaint details the government insider’s worries about Trump’s contacts with Ukraine’s leader, revelations of which on Tuesday triggered a formal impeachment inquiry against the president.

Now that we have the charge in place, the actual phone call showed…Ukraine’s Zelenskiy is about to have difficult days in Kiev with the nationalists there. US President Trump had a phone call and made no threats or conveyed anything to intimidate Zelenskiy.

September 24, 2019 MEMORANDUM OPINION FOR THE GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE

Rather, the complaint arises out of a confidential diplomatic communication between the

President and a foreign leader that the intelligence-community complainant received secondhandAn “employee of an element of the intelligence community” (or an

intelligence-community contractor)…

The complainant describes a hearsay report that the President, who is not a member of the intelligence community, abused his authority or acted

unlawfully in connection with foreign diplomacy.

According to the New York Times– The whistle-blower who revealed that President Trump sought foreign help for his re-election and that the White House sought to cover it up is a C.I.A. officer who was detailed to work at the White House at one point, according to three people familiar with his identity.

The man has since returned to the C.I.A., the people said. Little else is known about him. His complaint made public Thursday suggested he was an analyst by training and made clear he was steeped in details of American foreign policy toward Europe, demonstrating a sophisticated understanding of Ukrainian politics and at least some knowledge of the law.

The C.I.A. officer did not work on the communications team that handles calls with foreign leaders, according to the people familiar with his identity. He learned about Mr. Trump’s conduct “in the course of official interagency business,” according to the complaint, which was dotted with footnotes about machinations in Kiev and reinforced with public comments by senior Ukrainian officials.

What seems to be the common denominators pertinent to the larger story? We have a lone gun Intel guy working on his own listening to rumors spun by whom?

It seems he was talking to Ukrainians in Kiev. There are a lot of Ukrainians in Kiev and quite a few in the Ukrainian government.

What we need to do to find the original source of the rumor is answer a couple simple questions.

Who in Kiev wants to destroy US President Donald Trump as a favor to Democratic Party allies they work with?

Who in Kiev wants to destroy newly elected president of Ukraine Zelenskiy?

Who in Kiev has the Intel capabilities and sophistication to listen in on government phone calls?

Those questions narrow the field down considerably. There is the opportunity aspect to consider with this too. How many people can listen in on a phone call with a foreign leader?

Lucky for us there is an international Information Operation (IO) going on to unseat US President Trump. This simplifies the field and cuts it down to anyone in Milestone March 1, 2014 from the Coup Against the President article.

That narrows it down to a small handful of disgruntled ultra-nationalist Ukrainians. To get to the absolute right person all that needs to happen is to extradite InformNapalm publisher Roman Burko, Deputy Information Minister Dimitri Zolotukin, and Christina Dobrovolska who supervise them. Christina left the operation 2 months ago but she has a lot of insight and likes visiting the USA.

Eliot Higgins of Bellingcat can be taken into custody as a material witness because of the vast amount of work his firm does the Ukrainian hacker Intel groups in Ukraine and Syria.

Aric Toler is in the US and will definitely provide useful insight although he’s a little timid around the most likely candidate for this, a hacker that goes by @UCA_ruhate_.

RUH8 or UCA_ruhate_  has been very vocal about his disdain for Zelenskiy and wants to hurt his presidency. These groups are familiar with how the US Congress works because they already have testimony on the Congressional record. Refer to Benchmark DNC Hacks

Alexandra Chalupa has a lot of experience with the same Intel groups. She used them to do OppoResearch for the 2016 election as shown in Milestone June 2016.

I’m sure with this caliber of help, all the information needed will come out.

The next thing to look at is who’s pushing the defense fund page for the unknown informer? It is the Ukrainian Diaspora Democratic party HRC advisor @AdamParkhomenko among other Diaspora members.

Adam worked with the Ukrainian hacker Intel groups at team Hillary and the Atlantic Council digital Sherlock program. His stint with Bellingcat and the Ukrainian hackers made memories to last a lifetime.

In the interest of justice for people of all political stripes and a return to sanity, the Intel community monster needs to be put in a glass cage isolated from society. Criminals among them have to be prosecuted.

Bolton Gone: Improved Peace Prospects?

Image result for Bolton Gone: Improved Peace Prospects?

September 13, 2019
The departure of John Bolton as US National Security Adviser is a good step towards decreasing international tensions by the Trump administration. But a lot more is needed from President Donald Trump to indicate a serious pivot to normalizing relations with Russia, Iran and others.

When Trump gave Bolton his marching orders earlier this week, the president said he “strongly disagreed” with his erstwhile security adviser over a range of foreign policy issues. Trump had also expressed frustration with Bolton’s incorrigible militarist tendencies.

There is no doubt Bolton was an odious figure in the White House cabinet. One of our SCF authors, Martin Sieff, wrote this excoriating commentary on Bolton’s nefarious record of warmongering dating as far back as the launching of US wars in Afghanistan in 2001 and Iraq in 2003, when the mustachioed maverick served then as a chief neocon ideologue in the GW Bush administration.

One wonders why Trump brought such a war hawk into his administration when he appointed Bolton as NSA in April 2018. Perhaps, as another of our writers, Robert Bridge, surmised in a separate commentary this week, Trump was using hardliner Bolton as a foil to deflect opponents from within the Washington establishment who have been trying to undermine the president as “soft on foreign enemies”. A ruse by Trump of keeping “your enemies close”, it is averred.

Bolton certainly did his best to hamper Trump’s seeming attempts at scaling back US foreign military interventions. He opposed the plan to withdraw American troops from Syria. The reckless Bolton also wound up a policy of aggression and regime change against Venezuela, which Trump has latterly seemed to grow wary of as a futile debacle.

In regard to Russia, Bolton carried heaps of Cold War baggage which made Trump’s declared intentions of normalizing relations with Moscow more difficult.

The shameless warmonger Bolton openly advocated for regime change in Iran, which seemed to contradict Trump’s oft-stated position of not seeking regime change in Tehran, despite the president’s own animosity towards Iran.

The former NSA also opposed any attempt by Trump to engage in detente with North Korean leader Kim Jong-un. Reportedly, it was Bolton who derailed the incipient efforts at opening up dialogue with Pyongyang.

It is also thought that Bolton used his influence to impede Trump’s recent bid to host Taliban leaders at Camp David earlier this month which was aimed at trust-building for a proposed peace deal to withdraw US troops from that country after nearly 18 years of disastrous war.

That said, however, President Trump has not shown himself to be exactly a dovish figure. He has overseen countless sanctions being imposed on Russia, the abandoning of the Intermediate-range Nuclear Forces treaty, and ongoing military support for the anti-Russia regime in Kiev.

Too, it was Trump who ordered the US collapse of the 2015 international nuclear accord with Iran in May 2018 and the re-imposition of harsh sanctions on Tehran. So, it would be misplaced to paint Bolton as the sole malign actor in the White House. Trump is personally responsible for aggravating tensions with Iran, as well as with Russia, Venezuela and others.

Nevertheless, it is to be welcomed that an inveterate war hawk like Bolton no longer has the president’s ear. Perhaps Trump can be freer to act on his instincts as a pragmatic deal-maker. One thing that the president deserves credit for is his unconventional style of engaging with nations and leaders who are designated as foes of America.

Russia this week gave a reserved response to the sacking of Bolton. The Kremlin said it would make assessments of a positive change in US policy based on actions, not mere announcements, such as the firing of Bolton. Time will tell.

It seems significant that immediately after Bolton was relieved of his post, Trump hinted to reporters that he was considering lifting sanctions off Iran if such a move persuaded Iranian President Hassan Rouhani to hold a face-to-face meeting with Trump at the United Nations general assembly in New York later this month.

Iran has repeatedly stated categorically that there will be no talks with Trump unless his administration revokes sanctions and returns to abiding by the nuclear accord. If there is a serious pivot to normal diplomacy by the White House, then what Trump does about sanctions on Iran will be a litmus test.

The same can be said about US sanctions on Russia. If Trump is earnest about a genuine reset in bilateral relations, then he must get rid of the raft of sanctions that Washington has piled on Moscow since the 2014 Ukraine crisis amid the many spurious allegations leveled against Russia.

Bolton banished is but a small step towards a more diplomatically engaged US administration. But it would be unwise to expect the departure of this one figure as being a portent for progress and a more peaceful policy emerging in Washington.

The Washington establishment, the deep state and the bipartisan War Party, with its entrenched Cold War ideology, seems to have an endemic sway over policy which may thwart Trump’s efforts to direct a less belligerent US.

To illustrate the twisted nature of the US establishment, one only had to read the way sections of the American corporate-controlled media lamented the departure of Bolton. The New York Times, which is a dutiful conduit for deep state intelligence and the foreign policy establishment, actually bemoaned the ouster of Bolton, calling him a “voice of restraint”.

The NY Times commented, with approval, on how Bolton “objected to attempts to pursue diplomatic avenues with players considered American enemies. And he angered Trump with a last-minute battle against a peace agreement with the Taliban… whether it was inviting the Taliban to Camp David or cooperating with Russia, he [Bolton] was the national security adviser who said no.”

In another piece this week, the NY Times commented, again approvingly of Bolton: “Mr Bolton strongly opposed detente with Iran, and his unceremonious ouster has reignited concerns among some Republicans [and Democrats] in Congress about the White House’s declining projection of American military power around the world.”

Can you believe it? The so-called US “newspaper of record” is somehow valorizing an out-and-out warmonger in the form of Bolton, and appears to be advocating “projection of American military power around the world”. The latter phrase being but an Orwellian euphemism for imperialism and war.

The sobering conclusion is that Bolton’s departure hardly heralds a new beginning of diplomacy and engagement by Trump, if we assume to give this president the benefit of doubt for good intentions. Bolton may be gone, but there are formidable political forces in the US establishment which will work to ensure Trump’s room for maneuver remains heavily compressed. The Cold War ideology is so ingrained in Washington, it is much bigger than just one man, whether that is the vile personage of Bolton or the more flexible Trump.

The views of individual contributors do not necessarily represent those of the Strategic Culture Foundation.

The Russiagate hoax is now fully exposed.

by Eric Zuesse for The Saker Blog

The Russiagate hoax is now fully exposed.

The last leg of the Russiagate hoax to become exposed was on August 16th, when Gareth Porter bannered at The American Conservative“U.S. States: We Weren’t Hacked by Russians in 2016”. He revealed there that, “A ‘bombshell’ Senate Intelligence Committee report released in July repeated the familiar claim that Russia targeted the electoral websites of at least 21 states — but statements from the states themselves effectively undermine that narrative,” and NONE of the states was claiming that even a possibility had existed that its vote-counts had been affected, at all, by any hacker, anywhere. However, in one case, that of Illinois, there actually had been a hack; but it might have been by a criminal in order to sell the information, and not by any politically involved entity.

Porter reported:

The states’ own summary responses contained in the report show that, with one exception, they found either no effort to penetrate any of their election-related sites or merely found scanning and probing associated with an IP address that the FBI had warned about ahead of the 2016 election. Hardly a slam dunk.

Federal authorities, including Independent Counsel Robert Mueller, later claimed that the Russians used that IP address to hack into the Illinois state election systems and access some 200,000 voter records, though Mueller provided no additional evidence for that in his report. Nor was there any evidence that any data was tampered with, or a single vote changed.

About the same time, in August 2016, it was reported that Arizona state election systems were also breached, and it was widely speculated afterward that the Russians were behind it. But the Senate committee itself acknowledged that it was a criminal matter, and didn’t involve the Russians.

The “Russian” hack on the Illinois website, however, eventually became part of conventional wisdom, mainly because of Special Counsel Robert Mueller’s indictment of 12 GRU (Russia’s foreign intelligence agency) officers for allegedly carrying it out. 

But the overarching reality here is that there was no real penetration anywhere else. As for outside “probing” and “testing of vulnerabilities” (which, when closely read, makes up the vast majority of the “targeting” cited in the Senate report), that is something that states contend with every day at the hands of an untold number of potential hackers, including, but not limited to, foreign actors.

As Lisa Vasa, Oregon’s chief information security officer, explained to The Washington Post, the state blocks “upwards of 14 million attempts to access our network every day.” And Colorado Secretary of State Wayne Williams told the Post that the kind of scanning that was discussed by DHS “happens hundreds, if not thousands, of times per day.”  

Furthermore, not all federal officials buy into the theory that the Illinois intrusion was political — rather than criminal — in nature. In fact, DHS Assistant Secretary for Cyber Security and Communications Andy Ozment testified in late September 2016 that the aim of the hackers in the Illinois case was “possibly for the purpose of selling personal information,” since they had stolen the data but made no effort to alter it online.

The Senate Intelligence Committee, DHS, and the intelligence community nevertheless chose to omit that reality from consideration, presumably because it would have interfered with their desired conclusion regarding the Russian cyber attacks on the 2016 election.

——

Prior to that revelation, here were highlights from the major news-reports which had exposed other fraudulent aspects of the “Russiagate” accusations:

——

The Real Russiagate Scandal”

9 May, 2019  in Uncategorized by craig View Comments

Robert Mueller is either a fool, or deeply corrupt. I do not think he is a fool.

I did not comment instantly on the Mueller Report as I was so shocked by it, I have been waiting to see if any other facts come to light in justification. Nothing has. I limit myself here to that area of which I have personal knowledge – the leak of DNC and Podesta emails to Wikileaks. On the wider question of the corrupt Russian 1% having business dealings with the corrupt Western 1%, all I have to say is that if you believe that is limited in the USA by party political boundaries, you are a fool.

On the DNC leak, Mueller started with the prejudice that it was “the Russians” and he deliberately and systematically excluded from evidence anything that contradicted that view.

Mueller, as a matter of determined policy, omitted key steps which any honest investigator would undertake. He did not commission any forensic examination of the DNC servers. He did not interview Bill Binney. He did not interview Julian Assange. His failure to do any of those obvious things renders his report worthless.

There has never been, by any US law enforcement or security service body, a forensic examination of the DNC servers, despite the fact that the claim those servers were hacked is the very heart of the entire investigation. Instead, the security services simply accepted the “evidence” provided by the DNC’s own IT security consultants, Crowdstrike, a company which is politically aligned to the Clintons.

That is precisely the equivalent of the police receiving a phone call saying:

Hello? My husband has just been murdered. He had a knife in his back with the initials of the Russian man who lives next door engraved on it in Cyrillic script. I have employed a private detective who will send you photos of the body and the knife. No, you don’t need to see either of them.”

There is no honest policeman in the world who would agree to that proposition, and neither would Mueller, were he remotely an honest man.

Two facts compound this failure.

The first is the absolutely key word of Bill Binney, former Technical Director of the NSA, the USA’s $14 billion a year surveillance organisation. Bill Binney is an acknowledged world leader in cyber surveillance, and is infinitely more qualified than Crowdstrike. Bill states that the download rates for the “hack” given by Crowdstrike are at a speed – 41 Megabytes per second – that could not even nearly be attained remotely at the location: thus the information must have been downloaded to a local device, eg a memory stick. Binney has further evidence regarding formatting which supports this. …

——

US Govt’s Entire Russia-DNC Hacking Narrative Based On Redacted Draft Of Crowdstrike Report”

17 June 2019

It’s been known for some time that the US Government based its conclusion that Russia hacked the Democratic National Committee (DNC) on a report by cybersecurity firm Crowdstrike, which the DNC paid over a million dollarsto conduct forensic analysis and other work on servers they refused to hand over to the FBI. 

CrowdStrike’s report made its way into a joint FBI/DHS report on an Russia’s “Grizzly Steppe“, which concluded Russia hacked the DNC’s servers. At the time, Crowdstrike’s claim drew much scrutiny from cybersecurity expertsaccording to former Breitbart reporter Lee Stranahan. 

Now, thanks to a new court filing by longtime Trump adviser Roger Stone requesting the full Crowdstrike analysis, we find out that the US government was given a redacted version of the report marked “Draft,” 

——

“CrowdStrikeOut: Mueller’s Own Report Undercuts Its Core Russia-Meddling Claims”

5 July 2019 By Aaron Maté, RealClearInvestigations, 6,539 words

Mueller’s other “central allegation” regards a “Russian ‘Active Measures’ Social Media Campaign” with the aim of “sowing discord” and helping to elect Trump.

In fact, Mueller does not directly attribute that campaign to the Russian government, and makes only the barest attempt to imply a Kremlin connection. According to Mueller, the social media “form of Russian election influence came principally from the Internet Research Agency, LLC (IRA), a Russian organization funded by Yevgeniy Viktorovich Prigozhin and companies he controlled.” 

After two years and $35 million, Mueller apparently failed to uncover any direct evidence linking the Prigozhin-controlled IRA’s activities to the Kremlin. …

——

“Judge dismisses DNC lawsuit”

W. 31 July 2019 by Eric London

US federal court exposes Democratic Party conspiracy against Assange and WikiLeaks

In a ruling published late Tuesday, Judge John Koeltl of the US District Court for the Southern District of New York delivered a devastating blow to the US-led conspiracy against WikiLeaks founder Julian Assange.

In his ruling, Judge Koeltl, a Bill Clinton nominee and former assistant special prosecutor for the Watergate Special Prosecution Force, dismissed “with prejudice” a civil lawsuit filed in April 2018 by the Democratic National Committee (DNC) alleging WikiLeaks was civilly liable for conspiring with the Russian government to steal DNC emails and data and leak them to the public.

Jennifer Robinson, a leading lawyer for Assange, and other WikiLeaks attorneys welcomed the ruling as “an important win for free speech.”

The decision exposes the Democratic Party in a conspiracy of its own to attack free speech and cover up the crimes of US imperialism and the corrupt activities of the two parties of Wall Street. Judge Koeltl stated:

If WikiLeaks could be held liable for publishing documents concerning the DNC’s political financial and voter-engagement strategies simply because the DNC labels them ‘secret’ and trade secrets, then so could any newspaper or other media outlet. But that would impermissibly elevate a purely private privacy interest to override the First Amendment interest in the publication of matters of the highest public concern. The DNC’s published internal communications allowed the American electorate to look behind the curtain of one of the two major political parties in the United States during a presidential election. This type of information is plainly of the type entitled to the strongest protection that the First Amendment offers. …

——

In the World of Truth and Fact, Russiagate is Dead. In the World of the Political Establishment, it is Still the New”

4 Aug, 2019 

Douglas Adams famously suggested that the answer to life, the universe and everything is 42. In the world of the political elite, the answer is Russiagate. What has caused the electorate to turn on the political elite, to defeat Hillary and to rush to Brexit? Why, the evil Russians, of course, are behind it all.

It was the Russians who hacked the DNC and published Hillary’s emails, thus causing her to lose the election because… the Russians, dammit, who cares what was in the emails? It was the Russians. It is the Russians who are behind Wikileaks, and Julian Assange is a Putin agent (as is that evil Craig Murray). It was the Russians who swayed the 1,300,000,000 dollar Presidential election campaign result with 100,000 dollars worth of Facebook advertising. It was the evil Russians who once did a dodgy trade deal with Aaron Banks then did something improbable with Cambridge Analytica that hypnotised people en masse via Facebook into supporting Brexit.

All of this is known to be true by every Blairite, every Clintonite, by the BBC, by CNN, by the Guardian, the New York Times and the Washington Post. “The Russians did it” is the article of faith for the political elite who cannot understand why the electorate rejected the triangulated “consensus” the elite constructed and sold to us, where the filthy rich get ever richer and the rest of us have falling incomes, low employment rights and scanty welfare benefits. You don’t like that system? You have been hypnotised and misled by evil Russian trolls and hackers.

Except virtually none of this is true. Mueller’s inability to defend in person his deeply flawed report took a certain amount of steam out of the blame Russia campaign. But what should have killed off “Russiagate” forever is the judgement of Judge John G Koeltl of the Federal District Court of New York.

In a lawsuit brought by the Democratic National Committee against Russia and against Wikileaks, and against inter alia Donald Trump Jr, Jared Kushner, Paul Manafort and Julian Assange, for the first time the claims of collusion between Trump and Russia were subjected to actual scrutiny in a court of law. And Judge Koeltl concluded that, quite simply, the claims made as the basis of Russiagate are insufficient to even warrant a hearing.

The judgement is 81 pages long, but if you want to understand the truth about the entire “Russiagate” spin it is well worth reading it in full. Otherwise let me walk you through it. …

The key finding is this. Even accepting the DNC’s evidence at face value, the judge ruled that it provides no evidence of collusion between Russia, Wikileaks or any of the named parties to hack the DNC’s computers. It is best expressed here in this dismissal of the charge that a property violation was committed, but in fact the same ruling by the judge that no evidence has been presented of any collusion for an illegal purpose, runs through the dismissal of each and every one of the varied charges put forward by the DNC as grounds for their suit.

Judge Koeltl goes further and asserts that Wikileaks, as a news organisation, had every right to obtain and publish the emails in exercise of a fundamental First Amendment right. The judge also specifically notes that no evidence has been put forward by the DNC that shows any relationship between Russia and Wikileaks. Wikileaks, accepting the DNC’s version of events, merely contacted the website that first leaked some of the emails, in order to ask to publish them.

Judge Koeltl also notes firmly that while various contacts are alleged by the DNC between individuals from Trump’s campaign and individuals allegedly linked to the Russian government, no evidence at all has been put forward to show that the content of any of those meetings had anything to do with either Wikileaks or the DNC’s emails.

In short, Koeltl dismissed the case entirely because simply no evidence has been produced of the existence of any collusion between Wikileaks, the Trump campaign and Russia. That does not mean that the evidence has been seen and is judged unconvincing. In a situation where the judge is duty bound to give credence to the plaintiff’s evidence and not judge its probability, there simply was no evidence of collusion to which he could give credence. The entire Russia-Wikileaks-Trump fabrication is a total nonsense. But I don’t suppose that fact will kill it off. …

And in conclusion, I should state emphatically that while Judge Koeltl was obliged to accept for the time being the allegation that the Russians had hacked the DNC as alleged, in fact this never happened. The emails came from a leak not a hack. The Mueller Inquiry’s refusal to take evidence from the actual publisher of the leaks, Julian Assange, in itself discredits his report. Mueller should also have taken crucial evidence from Bill Binney, former Technical Director of the NSA, who has explained in detail why an outside hack was technically impossible based on the forensic evidence provided.

The other key point that proves Mueller’s Inquiry was never a serious search for truth is that at no stage was any independent forensic independence taken from the DNC’s servers, instead the word of the DNC’s own security consultants was simply accepted as true. Finally no progress has been made – or is intended to be made – on the question of who killed Seth Rich, while the pretend police investigation has “lost” his laptop.

Though why anybody would believe Robert Mueller about anything is completely beyond me.

So there we have it. Russiagate as a theory is as completely exploded as the appalling Guardian front page lie published by Kath Viner and Luke Harding fabricating the “secret meetings” between Paul Manafort and Julian Assange in the Ecuadorean Embassy. But the political class and the mainstream media, both in the service of billionaires, have moved on to a stage where truth is irrelevant, and I do not doubt that Russiagate stories will thus persist. They are so useful for the finances of the armaments and security industries, and in keeping the population in fear and jingoist politicians in power.

——

Did Russian Interference Affect the 2016 Election Results?”

8 August 2019  Alan I. Abramowitz, Senior Columnist, Sabato’s Crystal Ball

KEY POINTS FROM THIS ARTICLE

— Special Counsel Robert Mueller’s recent testimony was a reminder that Russia attempted to influence the outcome of the 2016 election and very well may try to do so again in 2020.

— This begs the question: Is there any evidence that Russian interference may have impacted the results, particularly in key states?

— The following analysis suggests that the 2016 results can be explained almost entirely based on the political and demographic characteristics of those states. So from that standpoint, the answer seems to be no.

What explains the 2016 results?

Special Counsel Robert Mueller’s recent testimony before the House Judiciary and Intelligence Committees, and the Mueller Report itself, make it very clear that the Russian government made a major effort to help Donald Trump win the 2016 U.S. presidential election. What the Mueller Report did not determine, however, was whether that effort was successful. In this article, I try to answer that question by examining whether there are any indications from the 2016 results that Russian interference efforts may have played a clear role in the outcome. One such indication would be if Trump did better in key swing states than a range of demographic, partisan, and historical factors would have predicted.

We know from the Mueller Report that Trump campaign manager Paul Manafort briefed a longtime associate who the FBI believes had ties with Russian intelligence about campaign strategy and, according to Manafort deputy Rick Gates, discussed decisive battleground states such as Michigan, Pennsylvania, and Wisconsin. Manafort also directed Gates to share internal polling data, which may have influenced Russian operations.

In order to address the question of whether the Russian interference effort worked, I conducted a multiple regression analysis of the election results at the state level. The dependent variable in this analysis was the Trump margin. My independent variables were the 2012 Mitt Romney margin, to control for traditional state partisanship, state ideology measured by the Gallup Poll (the percentage of conservatives minus the percentage of liberals), the percentage of a state’s population made up of whites without college degrees, the estimated turnout of eligible voters in the state, the state unemployment rate in November 2016 (to measure economic conditions), the number of Trump campaign rallies in the state, the number of Clinton campaign rallies in the state, a dummy variable for the state of Utah to control for the large vote share won by an independent conservative Mormon candidate from that state, Evan McMullin, and, finally, a dummy variable for swing states. The swing states included Arizona, Colorado, Florida, Iowa, Minnesota, Nevada, New Hampshire, Ohio, and Virginia, in addition to Michigan, Pennsylvania, and Wisconsin. The results of the regression analysis are displayed in Table 1 along with a scatterplot of the actual and predicted results in Figure 1.

Table 1: Results of regression analysis of Trump margin in the states

Source: Data compiled by author.

Figure 1: Scatterplot of actual Trump margin by predicted Trump margin in the states

Note: Alaska and District of Columbia omitted due to lack of state ideology data.

Source: Data compiled by author.

The regression equation proved to be extremely successful in predicting the election results, explaining a remarkable 98% of the variance in Trump vote margin in the states. Several of the independent variables had very powerful effects including the 2012 Romney margin, state ideology, and the percentage of non-college whites in the state. Even after controlling for traditional state partisanship and ideology, the size of the non-college white population in a state was a strong predictor of support for Donald Trump. The data in Table 1 also show that Evan McMullin’s candidacy dramatically reduced Trump’s vote share in Utah — although Trump still carried the state easily. In addition, the results show that voter turnout had a modest but highly significant effect on the results — the higher the turnout in a state, the lower the vote share for Trump. These results seem to confirm the conventional wisdom that higher voter turnout generally helps Democrats.

In addition to showing what mattered in explaining the results of the 2016 presidential election in the states, the data in Table 1 also show what did not matter. Economic conditions at the state level, at least as measured by state unemployment, did not matter. The number of campaign rallies held by the candidates in a state did not matter. Finally, and perhaps most importantly from the standpoint of estimating the impact of Russian interference, Donald Trump did no better than expected in the swing states. The coefficient for the swing state dummy variable is extremely small and in the wrong direction: Trump actually did slightly worse than expected in the swing states based on their other characteristics.

Table 2: Predicted and actual Trump margin in key swing states

Source: Data compiled by author.

This can also be seen in Table 2, which compares the actual and predicted results in the three swing states that ultimately decided the outcome of the election: Michigan, Pennsylvania, and Wisconsin. What is most striking about the data in this table is that Donald Trump actually slightly under-performed the model’s predictions in all three states. He did about one point worse than predicted in Michigan, about two points worse than predicted in Pennsylvania, and between two and three points worse than predicted in Wisconsin. There is no evidence here that Russian interference, to the extent that it occurred, did anything to help Trump in these three states.

Conclusions

I find no evidence that Russian attempts to target voters in key swing states had any effect on the election results in those states. …

——

Overstock CEO Turned Over Docs To DOJ ‘In Greatest Political Scandal In US History’”

12 August 2019

Via SaraACarter.com,

Overstock CEO Patrick Byrne delivered to the Department of Justice a number of documents, including emails and text messages, in April, regarding both the origins of the Russian investigation, and an FBI operation into Hillary Clinton with which he was personally involved during the first months of 2016, according to a U.S. official who spoke SaraACarter.com.

Byrne has also confirmed the account.

Byrne claims the documents, which have not been made public and are currently under investigation by the DOJ, are allegedly communications he had with the FBI concerning both the Clinton investigation and the origins of the Russian investigation. …

I gave to the DOJ documents concerning both the origin of the Russian probe and the probe into Hillary Clinton, both of which I was involved in, and both of which turned out to be less about law enforcement than they were about political espionage,” Byrne told SaraACarter.com Monday. …

This is going to become the greatest political scandal in US history,” he said. …

Byrne said the investigation into Clinton was one of the main reasons he came forward. …

Here’s the bottom line. There is a deep state like a submarine lurking just beneath the waves of the periscope depth watching our shipping lanes. …

I think we’re about to see the biggest scandal in American history as a result. But it was all political. …

It’s all a cover-up. It was all political espionage.” …

——

The Russiagate hoax was used by Obama’s successor, Trump — who, of course, had been one of the two targets of the Obama-initiated hoax — in order to step up actions against Russia. Here is one example of that:

——

https://www.nytimes.com/2019/

http://archive.is/ek04S

http://web.archive.org/web/

U.S. Escalates Online Attacks on Russia’s Power Grid”

By David E. Sanger and Nicole Perlroth June 15, 2019 front page Sunday 16 June 2019

WASHINGTON — The United States is stepping up digital incursions into Russia’s electric power grid in a warning to President Vladimir V. Putin and a demonstration of how the Trump administration is using new authorities to deploy cybertools more aggressively, current and former government officials said.

In interviews over the past three months, the officials described the previously unreported deployment of American computer code inside Russia’s grid and other targets as a classified companion to more publicly discussed action directed at Moscow’s disinformation and hacking units around the 2018 midterm elections.

Advocates of the more aggressive strategy said it was long overdue, after years of public warnings from the Department of Homeland Security and the F.B.I. that Russia has inserted malware that could sabotage American power plants, oil and gas pipelines, or water supplies in any future conflict with the United States.

But it also carries significant risk of escalating the daily digital Cold War between Washington and Moscow.

The administration declined to describe specific actions it was taking under the new authorities, which were granted separately by the White House and Congress last year to United States Cyber Command, the arm of the Pentagon that runs the military’s offensive and defensive operations in the online world.

But in a public appearance on Tuesday, President Trump’s national security adviser, John R. Bolton, said the United States was now taking a broader view of potential digital targets as part of an effort “to say to Russia, or anybody else that’s engaged in cyberoperations against us, ‘You will pay a price.’”

Power grids have been a low-intensity battleground for years. …

——

MY CONCLUSION: Both the liberal (Democratic) and conservative (Republican) wings of the U.S. aristocracy hate and want to conquer Russia’s Government. The real question now is whether that fact will cause the book on this matter to be closed as being unprofitable for both sides of the U.S. aristocracy; or, alternatively, which of those two sides will succeed in skewering the other over this matter. At the present stage, the Republican billionaires seem likelier to win if this internal battle between the two teams of billionaires’ political agents continues on. If they do, and Trump wins re-election by having exposed the scandal of the Obama Administration’s having manufactured the fake Russiagate-Trump scandal, then Obama himself could end up being convicted. However, if Trump loses — as is widely expected — then Obama is safe, and Trump will likely be prosecuted on unassociated criminal charges. To be President of the United States is now exceedingly dangerous. Of course, assassination is the bigger danger; but, now, there will also be the danger of imprisonment. A politician’s selling out to billionaires in order to reach the top can become especially risky when billionaires are at war against each other — and not merely against some foreign (‘enemy’) aristocracy. At this stage of American ‘democracy’, the public are irrelevant. But the political battle might be even hotter than ever, without the gloves, than when the public were the gloves.

—————

Investigative historian Eric Zuesse is the author, most recently, of  They’re Not Even Close: The Democratic vs. Republican Economic Records, 1910-2010, and of  CHRIST’S VENTRILOQUISTS: The Event that Created Christianity.

The Terrorists Among US- Cyber War and Privateers are the true Domestic Terrorists

August 14, 2019

by George Eliason for The Saker Blog

The Terrorists Among US- Cyber War and Privateers are the true Domestic Terrorists

What are Cyber Privateers and should you be afraid of them? Cyber privateers and cyber bounty hunters are criminals that are not covered under international law as government agents. In reality, this almost nullifies the chance for war to start over any particular hacking or compromised data event.

The problems hired or volunteer contractors create include a projectable legal attribution. You don’t have to be able to prove a country was behind a cyber attack or hack as long as you meet certain conditions. You can literally project the blame entirely to a different entity. The legal aspects will be covered in the next article.

It also nullifies the myth cyber privateers/ bounty hunters can use government tools on civilian or otherwise protected classes of people and infrastructure at will. International law doesn’t give people hired or volunteering to commit crimes under any auspices a free pass.

This is a new class of terrorism which separates a cowardly criminal element from the victim the same way a remotely detonated explosive would when used at a shopping mall. This criminal activity is spreading at a rate that raises alarm bells especially with the projection of 3 million untrained new hires over the next few years.

In the last article, I introduced you to Jimmy and Gary. After three difficult months of online Youtube training, both of our heroes were ready to take on careers as international men of mystery.

The absolute risk this presents to international peace and security should be obvious regardless of what accepted policy is. Everybody gets to spy or nobody gets to spy is the mantra this generation of Intel managers was brought along with. Most of the tools in the NSA arsenal have their start or at the very least a counterpart that is freeware.

Disgruntled people have access to software that can literally trigger a heart attack for someone with a pacemaker, cause a seizure, or even take control of your car.

More than 70 percent of the Pentagon’s Counterintelligence Field Activity: CIFA is staffed by green badge contractors. The majority of personnel at the DIA, the CIA National Clandestine Service, the National Counter Terrorism Center, and more than 80% of the NSA budget goes to private contractors.

All of the agencies are filled with what amounts to day labor. How many of them already have the keys to the barn that potentially starts the 4 Horsemen of the Apocalypse on their way?

State sized tools give emotionally inadequate and politically repulsive people the ability to illegally mimic or ply actions that are inherently governmental in nature. These same disgruntled overpaid groups fill out the do not fly lists. They are putting people on domestic terrorist watch lists. They are deplatforming journalists and people expressing opinions contrary to their employers and taking over social media and opinion for their employers.

The same groups are hacking websites and stealing financial account information. They gain access to bank accounts through phishing exploits and siphon your account dry. One group I am writing about did this to a family member of mine because of the exposure I’m giving. I’ll get back to that later in the series.

Over the last five years, I’ve not only described the role cyber privateers are playing in world affairs, but have been documenting the players and the damage they are causing.

This article will describe the now accepted US cyber policies that were written by cybercriminals to give themselves cover so they can use the American people and people of the world as their own personal cash cow or reservoir. If they don’t like you, no need to wonder who gets to pay for that.

The inherent problem with cyber privateers is covered in the job description as well as their rather fanciful notion they are anything but criminals.

Privateers operate as sanctioned pirates. These throwbacks pretend to operate like their 18th century inspirations did. Back in the day, the sponsor country allowed them to make money attacking merchant and military vessels they didn’t like but didn’t necessarily want a war with. When mistakes were made, privateers supposedly made reparations to the groups they victimized. They had to identify themselves and offer a remedy for damages.

The 2019 cyber privateer or bounty hunter is under no such compunction. They don’t identify themselves and their victims rarely know who hit them. In fact, when they do identify themselves, it’s just to gloat. They do it in a setting that implies the message that needs to get across without confessions that would hold up in a court.

If this sounds wordy, cutesy, or alarmist, private contractors have interrupted the power grid in Venezuela and hacked into Iran’s nuclear infrastructure. They are penetrating the power grid in Russia. This is an ongoing problem that’s exasperated by the fact legislators rely on the terrorists to draft the laws to protect them from everyone else.

Think of it this way, if Joey, going by the cool hacker name HedCh33z3, decides he doesn’t like Latvia, can he disrupt their electrical infrastructure, medical infrastructure, or elections?

The fact is they move in and out of government service so often, they never bother to switch hats or status. Think of it this way, Joey works for the NSA for a week under a subcontractor and picks up a ton of tools to stalk his Ex and sadistically destroy her life piece by piece.  This is what happens when people assume the right to government powers without the authority or responsibility to use them.

Are you willing to send your kid to war or go yourself because Joey HedCh33z3’s ex-girlfriend’s family thinks he’s a creep and they are from XXX country? Yet, we are now snugly very close to being put in this horrific position by politically and emotionally stunted people.

Privateers are Terrorists

So, where do they get the right to do this? Starting right after September 11, 2001, OSINT and cyber started as a serious money-making cottage industry. In the last article, we closed with the DOD actively hiring cyber Bounty Hunters to hack into foreign countries infrastructure.

This practice didn’t just start yesterday. Since 2001, there have been many attempts to codify US hiring of cyber privateers or bounty hunters into law. What this has done is enshrine it in US cyber-policy. The DOD use of subcontractors says a lot.

  • What are cyber bounty hunters and cyber privateers and what do they actually do?
  • Work with direct action military subcontractors
  • Work for NGOs, corporations, lobby groups
  • Work for US government agencies like the FBI, CIA, DIA, DOD, DNI
  • Work for political parties and causes
  • Work for foreign governments like Ukraine as shown in this series against the interests of the American people
  • Work for themselves

They provide Intel through OSINT and hacking. They provide direct action through hacking and Information Operations. Today, they are taking on inherently governmental responsibilities and making decisions they don’t have the authority to make and they make decisions that belong to State agencies.

  • Who is the enemy?
  • Who is friendly (or are there really any friends out there)?
  • Who is a danger and how?
  • Why are they a danger?
  • What is their motivation?
  • What steps will the US need to take to stop them, turn them in a different direction, or make peace with them?

One attempt to legalize this activity is called the Morgan Doctrine.

You’re aware that the U.S. Secretary of State is actually dumb enough to host her own email server. Even if you’re a third-world country without the infrastructure to create serious cyber attacks yourself, a few thousand dollars in Bitcoins to Hackers-R-US will get you zero-day exploits to crack just about any individual server. Either way, you’re going to OWN that server before the next national holiday (pick your country, pick your holiday).

The Morgan Doctrine states simply that if you attack my computers (or my banking assets held in US-based computers), then under a certain set of well-defined conditions, a licensed and bonded “cyber privateer” may attack you in your home country and split the proceeds with the U.S. government…You raid our bank accounts, we raid yours. You make money from off-shore child pornography, we’re going to loot your bank accounts and, with some REALLY creative black hat operations, you will be taken off the grid worldwide to the extent that you’ll not even complete a cell phone conversation for the remainder of your miserable depraved life.- The Morgan Doctrine

Who decides what is right, legal, or legally binding? Is it right when someone who gets paid to find you and accuse you also makes his money from destroying your life and reputation, or directly by stealing money directly from you?

According to the Morgan doctrine blogger who does this kind of work for Oracle, Salesforce.com, BIGFIX, and other technology companies, the answer is a big yes.

The USA followed by Ukraine makes up the highest percentage of over 50,000 readers which reflects the numbers the Ukrainian Diaspora hired to create the illusion of Russian aggression in Ukraine and the 2016 election interference meme. This is a serious attempt to push legislators for legal cover for what is accepted at the policy level.

Let’s spell this out. If a cyber bounty hunter or cyber privateer say you work for Russia while they work against Russia, according to this, you picked your side in the war they get paid to fight. It doesn’t matter if you don’t know you’re in one.

When they work for NGOs, foreign governments, political parties, and companies, they are given cover. They found out along the way they are entitled to your bank account as part of their payment as well as the joy of ruining your life every way they can. It means no more than a video game to them.

In the private sector they now illegally, harass, stalk, and locate people with no legal justification. They are trying to facilitate renditions and executions. Let’s be clear, these are your neighbors doing this to your neighbors.

Aric Toler and Bellingcat helped set up the functionality of Ukraine’s hit for hire website Myrotvorets (peacemaker). The only goal of the site is to publish personal and contact information of anyone they consider standing against Ukrainian nationalism so they can be dealt with by private parties.

toler go get him.JPG

The above clipped from Christelle Neant’s article should be clear enough to understand on its own and she asks the right questions. Bellingcat’s work with privateer groups has included trying to leverage their collective expertise and locate and rendition me.

Almost every time I’ve been threatened by Ukraine, it’s an American collaborator making the threat for them. The linked article shows one such person who also designed Ukraine’s Information Policy. He also wrote the policy paper for the US government’s cyber policy.

The people that testify for the US Congress on cyber and OSINT are the same people doing these things. They are training and setting up groups in multiple countries and under different auspices.

More than one of them trained the full spectrum of alphabet agencies. CIA, NSA, DIA, FBI, DNI, DOD, and we can keep going across the board.

They were behind setting up the policy that guided the Tallinn Manual defining cyberwar and international law. We’ll be opening that up within a couple of articles.

As a testament of their cyber mojo, they spent the last few years collectively trying to locate someone who didn’t change locations often and used normal communications and social media. I publish articles in 5 or 6 publications regularly. I have 4 or 5 different social platform accounts.

helfire missile targeter.jpg

They couldn’t figure out that I was where I said I was for the last 5 years. This spring I wrote a Victory Day article with local video and interviews. Even though I clearly showed my location, they still weren’t too sure.

The one thing you can say about them and their ally Bellingcat is they are consistent. Consistently wrong that is. In Ukraine, Bellingcat’s chief source of Intel is Ukrainian Intelligence. This includes the Ukrainian State hackers that contacted me after my sister was hacked. Journalism from the Donbass side of the contact line is a crime against Ukrainian sensibilities.

This group supplies Intel to NATO and individual EU countries and makes the rounds in Congress. Bellingcat’s work in Syria is chiefly supplied by the other side of Bellingcat’s Intel fabricators who also work for Ukraine.

We now have Americans working with foreign Intel stalking Americans and foreign citizens/ journalists for foreign countries they know will be tortured and killed. This clearly falls under terrorist activity.

One side of the group that works for Ukrainian Intel contacted me for the first time the day after the bank account was hacked and cleaned out using the hacker’s preferred method. What was the reason for the sudden communication? He wanted me to know how smart he really was.

Yet, these same so-called super spies claim to be able to find information about things people are actively trying to hide like weapons systems, motive. Most of the time they don’t speak the language of the country they claim to have expertise for. They decide guilt even though reality shows they aren’t able to actually do the job. Strange, isn’t it?

It was US policy to make them extra-legal but not illegal in the US after 9-11. Congress worked with these groups to write laws that refuse to criminalize what they do when it’s done on citizens. In fact, it no longer matters which side of the spectrum holds the reins, they feel empowered and will continue to do so until laws are written regulating their industry.

Over the last articles, I developed a slow-burn look into the world of the private spy. The idea that in less than 4 years the industry wants to hire 3 million unlicensed, unbonded, and untrained experts to work both government and corporate Intel and spy gigs should scare the hell out of you.

Can you give me a reason why the US which already collects and analyzes every piece of data on the internet needs so many more of what amounts to interns working with state sized software packages?

That’s 82 US citizens per new hire private sector OSINT agent. They have to literally spend 4 days on each person they investigate (82 per year including babies) just to get a full year’s worth of work because of the existing DNI, FBI, CIA, DIA, DOD OSINT agents have the rest of the world covered.

How serious is the information I’m providing? The EU Computer Emergency Response Team (CERT-EU) sent the articles to the EU institutions, agencies and bodies as well as outside governments and agencies. This means the EU has real concerns about the practice, laws, and policies allowing the practice because of the inherent damage so-called bit-players in private Intel and Information Operations (IO) can do at home and abroad not to mention diplomatically.

cert-eu for article.JPG

After you grasp the magnitude of the problem and begin unwinding the moving parts it can become manageable again through lawfare. Legal and societal protections you take for granted no matter where you live went out the window as soon as these practices became the norm.

Even from street level, people can make large sweeping changes to the world. Before you poo-poo, the idea, look at the CERT-EU screenshot again. I believe this can be done because I have already done it.

Towards the bottom of the article, we’ll get into the international policy for cyberwar and non-war situations. The same people that I’ve been writing about for the last 5 years exposing how they go after groups with protected status also wrote the policy for the US Government, all the agencies. While they didn’t write international policy directly, people they trained or work with closely did.

Four years ago, I exposed a flaw that exposes them to justice in the Tallinn Manual and threatened to pursue it. I did this because to win, I needed that gap closed. Tallinn is about applying the laws of war to cyber. It is something that otherwise would get no mention at all because it’s not considered a gap in any other context.

They closed that specific gap verbosely and gave me the opportunity to show how sordid this mess is. This also paves the way to provide a real resolution from private spies attacking civilians, social groups, political groups, journalists and other protected parties. Myrotvorets and Propornot should take note as should the other better and lesser-known companies and personalities.

No one has the right to use what they, themselves, rightfully label as Al Qaeda tactics on civilian populations, social activists, journalists, and other protected groups without assuming the legal definition of a terrorist, i.e. cyber terrorist.

Should lawfare (legal activism) fail to provide a remedy, the penalties for cyber assault (terrorism) and the right to a vigorous defense against perpetrators is what can make the laws change-FAST. Terrorism is terrorism is terrorism.

Once that fact is established anyone supporting them or hiring them in any way shape or form is guilty of material or direct support of terrorist activities against their own nation. Congressman, what say ye?

Law and policy makers fell in love with this power they never had before because it gives them the ability to shape policy they have no right to change for the sake of constituent and lobbyist cash and gift donations. They create loopholes in the cyber laws they write with the help of the companies and practitioners engaged in criminal behavior (under every other circumstance). Today, they hire the same criminals to help them with elections.  Oppo-research, reputation management, Information Operations, and even projecting their (congressman’s private) own foreign policy agenda into the international arena.

Imagine Congress asking a cybercriminal what kind of regulation or oversight their industry needed? What if Congress then asked the same societal deviants to write the laws that define the limit to what is legal they would agree to. Real criminals decided what the laws protecting their victims should be. They decided what the penalties should be if they got caught.

The tradeoff is this same Congress that was never allowed access to Top Secret information unless they have security clearance on their committee can get the actionable Intel before it’s marked “secret” if it’s gathered through OSINT by a private contractor working for US Intel agencies. That loophole makes it ok for anybody to move information before it’s been vetted and resell it.

Imagine these same legislators hiring you because you’re the expert they trust and they knowingly wink at the crimes you’re committing against your own people. They haven’t updated labeling the new twist on criminal law yet, and they won’t because you don’t want them to. And hardly anyone is referencing the same crimes using older precedent as a reference for prosecution or lawsuits.

This creates huge gray zones in the law. Gray zones are areas of law where even though something is illegal, there is no law on the books against a specific method of a known crime. Stalking is the easiest example. If someone is stalking you, follows you, and threatens you, we can all agree a crime was committed.

So is stalking a crime? Not if you are an OSINT practitioner doing it online because there is no legal or regulatory system you have to justify yourself to.

The gray zone, in this case, exists in a couple of areas. The first is attribution or identifying the perpetrator. This isn’t a small thing. The person with the Twitter handle “little ice cream girl” could actually be Stan from Milwaukee who was hired to sway the vote for his candidate. You annoyed him. The state sized software package he inherited working for XXX contractor that was working for the CIA toppling Antarctica is going to come in handy wrecking your life as thoroughly as the preverbal bull in the china shop.

The second is time and distance. Money concerns aside, if you are stalked, harassed, or threatened from the other side of the country or globe, what local prosecutor can even get his head around this new dimension of law?

Last year when I was originally going to publish this series, I spoke to an attorney specializing in international law. He listened for a short time and told me to stop. He didn’t want to hear any more. It wasn’t because of a lack of proof. His reasoned that the substance of what I was saying would put him in a very dangerous position.

It wasn’t his first rodeo and he claimed the last time around, his own national government refused to give him any cover or come to his aid. In his words, his government views taking on private Intel contractors as akin to taking on the CIA directly. And they weren’t willing to do that.

This is the attitude most people and even Congress takes. You can’t beat the deep state. But, the deep state ISN’T sworn-in law enforcement or agency personnel anymore. The illegal hiring practices for almost 2 decades gave private sector (green badges) oversight of agency personnel and projects. The problem multiplies because they trained the managers at the agencies and wield tremendous influence.

A fundamental truth is private industry cannot take on inherently governmental responsibilities legally or successfully. In the end, a company’s only consideration is their bottom line. Patriotism and companies part ways when it is no longer profitable. That’s just business.

What Congress and policymakers have done is to allow a huge gray area to be created where criminals are allowed to thrive because they provide political candy in the form of mostly fake Intel that supports whatever project a member of Congress needs to appease his pet cause lobbyists.

This could all be cleaned up by applying existing stalking and assault laws to online stalkers by making the punishment extreme. The same goes for political activists that are doing this under the cover written for them. As long as they volunteer, they are not targetable for retribution internationally. If they are provably working with a country or company working with a country, as soon as they stop, they can’t be touched. How’s that for a policy?

Fixes for Online Troll Remediation

Putting all these online Intel related cottage industries under rigid government oversight and forcing them to document what they are doing and to whom both domestically and internationally is the one way any type of privateer scenario that is already OK’d by the current policy can actually work. It also gives protected classes the opportunity to stop harassment and demand damages. This is precisely why it won’t happen unless it is pushed hard.

Congress could write and pass a one-page bill to write protection against this if they had the inclination. The crimes exist in the law already. The only expansion is applying them to technology. They won’t.

The other more realistic approach is to demand US president Donald Trump takes out his magic pen and write an executive order guaranteeing reasonable protections and appropriate punishment.

This is unlikely to happen because the move would literally box in this already metastasized invasive cancer commonly called the deep state. The celebrated work of the CIA and FBI infiltrating perfectly legal civil groups or dispersing propaganda through news platforms like the New York Times has been rendered child’s play in both scope and impact.

And we’re still waiting to see what kind of trouble 3 or 4 million unregulated new hires will bring domestically and internationally.

International Law and Policy for Online and Cyberattacks

Next, let’s establish a few things directly from Tallinn Manual I. From a 2015 article I’ll be highlighting a lot more in the next article I showed clearly that:

  • Civilians are a protected class.
  • If you work with a foreign country against their perceived enemies you are considered a military asset even if you work for a private contractor. You are targetable in every sense that word conveys.
  • If you work with a foreign country against their perceived enemies you are considered a military asset and attacks against civilians is a terrorist act.
  • To my knowledge no western country allows its citizens to make war on each other or citizens of other countries they are at peace with. The Black Letter Rules include: Rule 23.3 Cyber attacks against civilians is a war crime defined by rule 32.
  • Rule 26.7 The concept of “belonging to” defines whether you can be targeted or not. This rule defines civilians as off limits unless they are “engaged” in real war duties. It includes undeclared relationships where behavior makes it clear which side a person is fighting for.
  • Rule 26.9 Virtual online communities and people expressing opinions do not qualify as combatants.
  • Rule 30 defines a cyber attack as a non-kinetic attack reasonably expected to cause damage or death to persons resulting from the attack. If attacker mistakenly calls civilians lawful targets, the attack on civilians still occurred. It is a crime. This is an important consideration considering how interconnected the internet has made people.
  • Rule 31 Psy-Ops including leaflets, mass emails is not prohibited behavior.
  • Rule 33 If there is doubt to the status of a person, that person is to be considered a civilian and not targetable.
  • Rule 35.5 Gathering information for the military makes you a combatant.
  • Journalists are prohibited targets.
  • Once an attack is made, the retribution is legal and does not necessarily need to be in kind.

A cyber attack can be met with conventional weapons.

  • Rule 41 Means and Methods describes cyber weapons broadly as the means to carry out cyber war by use, or intended use of cyber “munitions” designed to cause damage, destruction, or death to its targets. The breadth of the rule is required because of the wide array of possible attacks through cyber means.

Now, the first loophole I wanted to be closed comes from an inverse look at a cyber war attack including stalking and targeting protected classes. Here’s how this can be elevated to war crimes.

Cyber can come from anywhere across the globe, anonymously, and stealthily (you may not even realize you were attacked). Because of today’s events people being attacked are from different parts of a given country and even spread across the globe.

This means if political or social activists are targeted, it may look like random events even though the numbers of victims could be in the hundreds of thousands or potentially millions. Here’s the two-minute example from one of the industry pioneers that attack civilians.

If the attack is considered as a single event because one single protected class or group is targeted even though they are physically at different geographical locations, we can reach the threshold for a cyber attack governed by the laws of war. Since it’s civilians, it would need to be litigated but the settlement would come from the offending country. Cha-ching!

Nevertheless, I collected a sample of 50+- IP addresses. Thank you, Mr. Justin, you are an eminently useful idiot.. . Also, many (most?) of the US readers were at work when they visited antiwar.com. Those US readers are concentrated in New York metro, Washington DC, greater Boston, the Bay Area, and Illinois (Chicago and main campus, U of I). Meanwhile, the Russian readers (there are only two in the dataset) are split between Moscow and Saint-Petersburg.”- Andrew Aaron Weisburd @webradius

https://www.opednews.com/populum/visuals/2015/10/2015-10-58313-500-ImagesAttr-populum_uploadnic_anti-war-10-15--jpg_58313_20151022-534.jpg

I ask why is this Info war agent that trained all the US Intel agencies, NATO, and works for Ukraine geolocating American citizens for Ukrainian purposes?

This group is a political social group reading and commenting at a media platform in a country that still has the 1st Amendment. It is a protected class.

THIS IS ONLY ONE STEP FROM A WAR CRIME. As soon as it’s established Weisburd is doing this for less than Ukraine’s hit for hire site Myrotvorets, we are in the neighborhood of WAR CRIMES. Interestingly, Weisburd helped spawn Myrotvorets and enhanced Ukraine’s geolocation abilities.

Secondly, if it doesn’t meet the war threshold, it is still a terrorist attack on protected groups. When I proposed that injured parties have the right to robust self-defense, Tallinn II closed up the language by barring civilians the right of redress, self-defense, or preemptive assault because this was the domain of nations.

But, that language also makes it imperative for them to persuade Congress to step up to bat and write restrictive laws or the future looks very bleak for private industry spies and IO working against the public interest.

But, that language also makes it an imperative for them to persuade Congress to step up to bat and write restrictive laws or the future looks very bleak for private industry spies and IO working against the public interest.

Did Andy Weisburd take that final step? Stay tuned, it’s detailed in the next articles. Next up, we’ll show the same small groups of OISINT and IO trailblazers are responsible for most fake news, bad Intel, and are covering up crimes against humanity.

Make no doubt about it, they are terrorists. They can be treated like terrorists and people have the right to robustly defend themselves.

Brazilgate is Turning into Russiagate 2.0

June 22, 2019

By Pepe Escobar – with permission and cross-posted with Consortium News

Brazilgate is Turning into Russiagate 2.0

It was a leak, not a hack. Yes: Brazilgate, unleashed by a series of game-changing bombshells published by The Intercept, may be turning into a tropical Russiagate.

The Intercept’s Deep Throat – an anonymous source — has finally revealed in detail what anyone with half a brain in Brazil already knew: that the judicial/lawfare machinery of the one-sided Car Wash anti-corruption investigation was in fact a massive farce and criminal racket bent on accomplishing four objectives.

  • Create the conditions for the impeachment of President Dilma Rousseff in 2016 and the subsequent ascension of her VP, elite-manipulated puppet, Michel Temer.
  •  Justify the imprisonment of former president Lula in 2018 – just as he was set to win the latest presidential election in a landslide.
  • Facilitate the ascension of the Brazilian extreme-right via Steve Bannon asset (he calls him “Captain”) Jair Bolsonaro.
  • Install former judge Sergio Moro as a justice minister on steroids capable of enacting a sort of Brazilian Patriot Act – heavy on espionage and light on civil liberties.

Moro, side by side with prosecutor Deltan Dallagnol, who was leading the Public Ministry’s 13-strong task force, are the vigilante stars of the lawfare racket. Over the past four years, hyper-concentrated Brazilian mainstream media, floundering in a swamp of fake news, duly glorified these two as Captain Marvel-worthy national heroes. Hubris finally caught up with the swamp.

The Brazilian Goodfellas

The Intercept has promised to release all the files in its possession; chats, audio, videos and pics, a treasure trove allegedly larger than Snowden’s. What has been published so far reveals Moro/Dallagnol as a strategic duo in synch, with Moro as a capo di tutti i capi, judge, jury and executioner rolled into one – replete with serial fabrications of evidence. This, in itself, is enough to nullify all the Car Wash cases in which he was involved – including Lula’s prosecution and successive convictions based on “evidence” that would never hold up in a serious court.

Moro: Installed as justice minister.
(Wikipedia/Marcos Oliveira/Agência Senado.)

In conjunction with a wealth of gory details, the Twin Peaks principle — the owls are not what they seem — fully applies to Brazilgate. Because the genesis of Car Wash involves none other than the United States government (USG). And not only the Department of Justice (DoJ) – as Lula has been stressing for years in every one of his interviews. The op was Deep State at its lowest.

WikiLeaks had already revealed it from the start, when the NSA started spying on energy giant Petrobras and even Rousseff’s smart phone. In parallel, countless nations and individuals have learned how the DoJ’s self-attributed extraterritoriality allows it to go after anyone, anyhow, anywhere.

It has never been about anti-corruption. Instead this is American “justice” interfering in the full geopolitical and geo-economic spheres. The most glaring, recent case, is Huawei’s.

Yet Mafiosi Moro/Dallagnol’s “malign behavior” (to invoke Pentagonese) reached a perverse new level in destroying the national economy of a powerful emerging nation, a BRICS member and acknowledged leader across the Global South.

Car Wash ravaged the chain of energy production in Brazil, which in turn generated the sale – below market prizes – of plenty of valuable pre-salt oil reserves, the biggest oil discovery of the 21stcentury.

Car Wash destroyed Brazilian national champions in engineering and civil construction as well as aeronautics (as in Boeing buying Embraer). And Car Wash fatally compromised important national security projects such as the construction of nuclear submarines, essential for the protection of the “Blue Amazon”.

For the Council of Americas – which Bolsonaro visited back in 2017 – as well as the Council on Foreign Relations—not to mention the “foreign investors”–to have neoliberal Chicago boy Paulo Guedes installed as finance minister was a wet dream. Guedes promised on the record to virtually put all of Brazil for sale. So far, his stint has been an unmitigated failure.

How to Wag the Dog

Mafiosi Moro/Dallagnol were “only a pawn in their game,” to quote Bob Dylan– a game both were oblivious to.

Lula has repeatedly stressed that the key question – for Brazil and the Global South – is sovereignty. Under Bolsonaro, Brazil has been reduced to the status of a banana neo-colony – with plenty of bananas. Leonardo Attuch, editor of the leading portal Brasil247, says “the plan was to destroy Lula, but what was destroyed was the nation.”

As it stands, the BRICS – a very dirty word in the Beltway – have lost their “B”. As much as they may treasure Brazil in Beijing and Moscow, what is delivering for the moment is the “RC” strategic partnership, although Putin and Xi are also doing their best to revive “RIC”, trying to show India’s Modi that Eurasian integration is the way to go, not playing a supporting role in Washington’s fuzzy Indo-Pacific strategy.

Dallagnol: Serial fabricator. (Wikimedia Commons/José Cruz/Agência Brasil)

And that brings us to the heart of the Brazilgate matter: how Brazil is the coveted prize in the master strategic narrative that conditions everything happening in the geopolitical chessboard for the foreseeable future—the no-holds-barred confrontation between the U.S. and Russia-China.

Already in the Obama era, the U.S. Deep State had identified that to cripple BRICS from the inside, the “weak” strategic node was Brazil. And yes; once again it’s the oil, stupid.

Brazil’s pre-salt oil reserves may be worth as much as a staggering $30 trillion. The point is not only that the USG wants a piece of the action; the point is how controlling most of Brazil’s oil ties up with interfering with powerful agribusiness interests. For the Deep State, control of Brazil’s oil flow to agribusiness equals containment/leverage against China.

The U.S., Brazil and Argentina, together, produce 82 percent of the world’s soybeans – and counting. China craves soybeans. These won’t come from Russia or Iran – which on the other hand may supply China with enough oil and natural gas (see, for instance, Power of Siberia I and II). Iran, after all, is one of the pillars of Eurasian integration. Russia may eventually become a soybean export power, but that may take as long as ten years.

The Brazilian military knows that close relations with China – their top trade partner, ahead of the U.S. — are essential, whatever Steve Bannon may rant about. But Russia is a completely different story. Vice-President Hamilton Mourao, in his recent visit to Beijing, where he met with Xi Jinping, sounded like he was reading from a Pentagon press release, telling Brazilian media that Russia is a “malign actor” deploying “hybrid war around the world.”

So the U.S. Deep State may be accomplishing at least part of the ultimate goal: to use Brazil in its Divide et Impera strategy of splitting the Russia-China strategic partnership.

It gets much spicier. Car Wash reconditioned as Leak Wash could also be decoded as a massive shadow play; a wag the dog, with the tail composed of two American assets.

Moro was a certified FBI, CIA, DoJ, Deep State asset. His uber-boss would ultimately be Robert Mueller (thus Russiagate). Yet for Team Trump, he would be easily expendable – even if he’s Captain Justice working under the real asset, Bannon boy Bolsonaro. If he falls, Moro would be assured the requisite golden parachute – complete with U.S. residency and talks in American universities.

The Intercept’s Greenwald is now celebrated by all strands of the Left as a sort of American/Brazilian Simon Bolivar on steroids – with and in may cases without any irony. Yet there’s a huge problem. The Intercept is owned by hardcore information-war practitioner Pierre Omidyar.

Whose Hybrid War?

The crucial question ahead is what the Brazilian military are really up to in this epic swamp – and how deep they are subordinated to Washington’s Divide et Impera.

It revolves around the all-powerful Cabinet of Institutional Security, known in Brazil by its acronym GSI. GSI stalwarts are all Washington consensus. After the “communist” Lula/Dilma years, these guys are now consolidating a Brazilian Deep State overseeing full spectrum political control, just like in the U.S..

GSI already controls the whole intel apparatus, as well as Foreign Policy and Defense, via a decree surreptitiously released in early June, only a few days before The Intercept’s bombshell. Even Captain Marvel Moro is subjected to the GSI; they must approve, for instance, everything Moro discusses with the DoJ and the U.S. Deep State.

As I’ve discussed with some of my top informed Brazilian interlocutors, crack anthropologist Piero Leirner, who knows in detail how the military think, and Swiss-based international lawyer and UN adviser Romulus Maya, the U.S. Deep Stateseems to be positioning itself as the spawning mechanism for the direct ascension of the Brazilian military to power, as well as their guarantors. As in, if you don’t follow our script to the letter – basic trade relations only with China; and isolation of Russia – we can swing the pendulum anytime.

After all, the only practical role the USG would see for the Brazilian military – in fact for all Latin America military – is as “war on drugs” shock troops.

 

Intercept Exclusive: Brazilian Judge in Car Wash Corruption Case Mocked Lula’s Defense and Secretly Directed Prosecutors’ Media Strategy During Trial.

There is no smoking gun – yet. But the scenario of Leak Wash as part of an extremely sophisticated, full spectrum dominance psyops, an advanced stage of Hybrid War, must be seriously considered.

For instance, the extreme-right, as well as powerful military sectors and the Globo media empire suddenly started spinning that The Intercept bombshell is a “Russian conspiracy.”

When one follows the premier military think tank website– featuring loads of stuff virtually copy and pasted straight from the U.S. Naval War College – it’s easy to be startled at how they fervently believe in a Russia-China Hybrid War against Brazil, where the beachhead is provided by “anti-national elements” such as the Left as a whole, Venezuelan Bolivarians, FARC, Hezbollah, LGBT, indigenous peoples, you name it.

After Leak Wash, a concerted fake news blitzkrieg blamed the Telegram app (“they are evil Russians!”) for hacking Moro and Dallagnol’s phones. Telegram officially debunked it in no time.

Then it surfaced that former president Dilma Rousseff and the current Workers’ Party president Gleisi Hoffmann paid a “secret” visit to Moscow only five days before the Leak Wash bombshell. I confirmed the visit with the Duma, as well as the fact that for the Kremlin, Brazil, at least for the moment, is not a priority. Eurasian integration is. That in itself debunks what the extreme-right in Brazil would spin as Dilma asking for Putin’s help, who then released his evil hackers.

Leak Wash – Car Wash’s season two – may be following the Netflix and HBO pattern. Remember that season three of True Detective was an absolute smash. We need Mahershala Ali-worthy trackers to sniff out patches of evidence suggesting the Brazilian military – with the full support of the U.S. Deep State – might be instrumentalizing a mix of Leak Wash and “the Russians” Hybrid War to criminalize the Left for good and orchestrate a silent coup to get rid of the Bolsonaro clan and their sub-zoology collective IQ. They want total control – no clownish intermediaries. Will they be biting more bananas than they can chew?

The Terrorists Among US- Traitors and Terror 3

June 21, 2019

by George Eliason for The Saker Blog

The Terrorists Among US- Traitors and Terror 3

The second part in this series showed clearly that the US Intel community has been overrun by untrainable and undependable people.

The more facts that come out, the worse the situation looks. We trust these people to dissect and analyze critical pieces of information and based on their experience advise the President of the United States whether or not diplomacy, spying, and covert action, sanctions, or even military engagement is warranted.

So, the big question in part 2 became, how do you induct over 3 million new employees with no previous experience into what is supposed to be one of the most complicated professions on the planet? Can this be done in less than 5 years? The answer is you can’t.

Most of the Intel the US is using right now comes from private sector sources. Over 80% of the current NSA budget goes to subcontractors that can hire and layoff on a per-project basis. There is no loyalty to employees or government service. Loyalties are bought and sold by the highest bidders as part of the daily grind to just make a living.

One day Jimmy the 1st year apprentice Intel guy might work for the US government. Two weeks later he might work for the Ukrainian lobby doing Oppo-research. Three weeks later he might work for a company that has both for clients. He takes all the software packages with him as well as insight into the data he’s gained or if it’s OSINT, the data itself can change hands if it does so before being labeled “secret.”- The Unthinkable Consequences of Outsourcing US Intel

Since 2015, I’ve watched the Intel industry go through radical changes in a very short time. This started long before I interviewed Michael Jasinski (MJ), the Assistant Professor Department of Political Science University of Wisconsin–Oshkosh about this.

The following is professor Jasinski’s remarks from the 2017 article and following that the interview we did the other day. In literally 2 years the Intel community hiring standards have gone from university researchers with at least some experience and education in the field down to Jimmy who used to work at Walmart and is now an intern at the CIA, FBI, DIA, DOD or fill in another agency of your choice.

Professor Jasinski had oversight over researchers that were later hired by US Intel agencies following 9/11 and provided evaluations of them prior to their employment.

MJ- “Considering how the intelligence community is depicted in the media or in the movies (and clearly CIA “outreach” plays a role here), you’d think Jedi Knights. The Justice League. Gandalf. But if you ever had personal contact with the “three-letter agencies” for any period of time, you’d think different. My most recent experience with the “intelligence” community was at MIIS, post-9/11 when the agencies were coming there to hire, and they were hiring big. They hired many of my research assistants–I was doing what might be termed “open-source intelligence” on WMD proliferation–and in the process, they’d ask me, their immediate supervisor, for my opinion. So I’d tell them point-blank: can’t read, can’t write, can’t analyze. I don’t care what their CV says, the only language they can function in at any level in English. No matter, they’d get hired anyway. Drug convictions? No matter, they’d get hired anyway (at least at the time, the CIA would hire you if you didn’t have any drug convictions within the last 3 years). Scary political views they wore on their sleeve? No matter, they’d get hired anyway. All of my good assistants went to work for the UN, IAEA, major NGOs. The dregs went to “intelligence.” So now when I see a) the “Russian interference” stories and b) the inability to safeguard, and presumably use responsibly, your own cyber-warfare arsenal, I can’t say I’m exactly surprised. But there are no shortcuts in this kind of work. If you rapidly expand at the cost of dramatically lowering standards, you (and the country) are going to pay a price. We’re paying it right now.”- The Private Contractors Using Vault 7 Tools for US Gov: US Intel Needs a Ground-Up Rebuild Part 1

GE– Professor Jasinski, how do you feel about the idea of can’t read, can’t write the language analyst types gaining NSA size tools and being sent to spy into Russian infrastructure as bounty hunters looking for threats?

MJ-It’s not unlike giving a monkey a live hand grenade, except that the monkey in question would not run the risk of causing major power war. I hope these reports are, essentially, disinformation, because NYT would never publish anything the intel community doesn’t want to see published. At the same time, it may well be Venezuela was thusly targeted, and the recent Latin American power outages could be the collateral damage. If that’s the case, one can imagine the potential scope for trouble. And wouldn’t it be something if a cyber-attack on Russia turned resulted in a major EU or Chinese power outage?

GE-How would you feel about these same analysts gaining manager positions in the agencies and as the private contractor counterparts?

MJ– If in supervisory positions, they will succumb to the First Law of Bureaucracy which is to protect and expand turf, which in practical terms means more and more cyber-ops which are probably already being touted as the new “smart bombs”– a perfect solution to every national security problem, real or imagined. There will be lobbying, policy papers, entire think tanks funded by agencies led by people interested in not only expanding cyber ops but specifically expanding their own agency’s responsibility for cyber ops and in order to do that, you have to have some “track record” of running cyber ops. So you can imagine the potential for rapid escalation.

GE-If this type of activity occurred in say Russia’s nuclear sector where bounty hunter hackers with rancid political views gained access, how bad could this be?

MJ-If you are paranoia-minded (and since I’m from Eastern Europe, I am), the Chernobyl HBO series may serve as an “informational preparation of the battlefield.” If a Russian nuclear power plant is hacked and results in an incident, any incident (it doesn’t need to be as extreme as the what happened at Chernobyl), it damages Russia’s power grid, the credibility of the Russian government and the Russian state (all kinds of “collapse of USSR” parallels would be drawn), and also the attractiveness of Russian nuclear power exports to third countries. Three major US foreign policy aims for the price of one! And all of it can be plausibly blamed on Russian nuclear butterfingers.

GE-Is there any governmental or industrial sector that is hiring private hackers, IO pros, and private spies which could prove beneficial and not cost the US its status in the world or have international repercussions?

MJ- I think this is relatively straightforward. Pretty much everyone will acquire a defensive cyberwar capability, but the problem is that it may be extremely difficult to prevent an offensive arms race from being initiated. What makes this worse than conventional or even nuclear arms races is that you never really know what others have and it’s extremely difficult to verify the elimination of a capability, since we are essentially talking about software tools in a world where everyone and their brother is writing code. And if there is an underlying mistrust among major powers, it will naturally promote the development of offensive capabilities (which will be described as retaliatory, of course), which then will have to be tested in some way.

GE-What is the potential of bounty hunter hackers, IO pros, and private spies fomenting war outside of all government policy or oversight?

MJ– This is a bit more complicated. If the tools really proliferate among non-state actors, it’s the equivalent of selling biowarfare kits in pharmacies all over the world. Anyone can get them, then launch anthrax/black plague/whatever attacks on whatever individual, organization, city, or country they don’t like at the moment. So that probably will not be allowed to happen, and we’ll see something like the de-facto ban on shoulder-launched SAMs from being sold or given to non-state actors. Even the war in Syria did not seem to break that taboo. The bigger problem is governments outsourcing cyberwar to quasi-private actors, in the same way, propaganda has been outsourced to the likes of Bellingcat, censorship to Google and Facebook, killing people to Eric Prince. So, for reasons of plausible deniability, you could set up a Dirty Dozen-style outfit of cybercriminals given suspended sentences in return for cooperating with the gov’t, then use them to stage cyber ops to benefit the US gov’t, or at least the intel community, and do it with considerable plausible deniability and moreover hide it in some “black” budget program. I do wonder who all these Cozy Bears and Fancy Bears really are.

Professor Jasinski’s point is well taken. What would the world be like if anyone could get their hands on aggressive NSA state-level tools and point them at their neighbor?

When he taught the people that would eventually become CIA and FBI OSINT agents and managers, the transition from State to privatized Intel was in its infancy. Part 2 of the series showed Richard Clarke made the US Agency transitions to the privatization of Intel. UK PM David Cameron labeled the man that got the job transitioning US agencies to privatized Intel an idiot. That was Steve Emerson and his sidekick and former gift shop cashier, the lovely Rita Katz.

From the 1990s into the 2000s and 2010s, all of the elite hack, defense, and attack tools were purposely labeled freeware for anyone that decided to pick them up. This means the scenario professor Jasinski labeled as a nightmare is already coming true.

A researcher made an elite hacking tool out of the info in the Vault 7 leak. And most of the tools in their primary form are available online free of charge.

Why did this happen?

The Guardian made the point in November 2014 with “Our choice isn’t between a world where either the good guy’s spy or the bad guy’s spy. It’s a choice of everybody gets to spy or nobody gets to spy.”

So said the security luminary Bruce Schneier at BBC Future’s World-Changing Ideas Summit in October…With so many cheap or free tools out there, it is easy for anyone to set up their own NSA-esque operations and collect all this data. – American Jihadi Starts Private NSA And Attacks America

This has been gradually developing into the norm in America. Your safety and the safety of your loved ones, not to mention the rest of the world is in the hands of otherwise unhireable people that are learning as they go to hack and attack foreign countries and domestic civilians.

“In a Sept. 2013 Reuters article, Jameel Jaffer, deputy legal director at the American Civil Liberties Union, said the reported incidents of NSA employees’ violations of the law are likely “the tip of the iceberg” of lax data safeguards. The laws guiding the NSA’s spying authority in the first place are a bigger issue, he said. “If you only focus on instances in which the NSA violated those laws, you’re missing the forest for the trees,” Jaffer said. “The bigger concern is not with willful violations of the law but rather with what the law itself allows.” –NSA staff used spy tools on spouses, ex-lovers: watchdog

The companies and individual actors sell information. For some, this is the basis of how they market their services. They spy on other companies – on regular people – commit espionage and run legally dubious information operations against civilians.

But because of the work they do for both the U.S. government and private corporations, few restrictions are placed on them. Where they are supposed to be supervised by the Director of National Intelligence (DNI), in some cases they are supervising themselves and other companies and training DNI agencies to act like them. –Intel-for-Hire Undermines U.S. Intelligence (Part 2)

It is only along this line, the NYT article U.S. Escalates Online Attacks on Russia’s Power Grid can be comprehended. Why is the military leaving the nation’s Commander in Chief blinded from what has the potential to spark a hot war? How?

While Jimmy works at the ODNI this week, the DOD uses 1st year Intel intern Jimmy’s brother Gary. Gary has a solid 6 months behind him as a privatized operator to carry out OSINT against Russian assets.

Do you think I’m exaggerating? My first thought is ole’ Gary made a mess the US government was going to get taken behind the shed for. But, why would the DOD get behind this hacking operation and alienate their Commander in Chief? Why not invoke plausible deniability? Do they think Trump will take the ODNI use of private sector apprentices to heart and fire them?

This is part of an ODNI and DOD Intel policy change. The DOD has been using private citizens like ole’ Gary for a while. Now, it almost seems like they bring these guys into a room and really chat them up before letting them loose to wreak havoc on society.

Ole’ Gary, you are a supa’ spy! Yes, you are. Yes, you are! Now go get me sum red Ruskies!

The US Needs Bounty Hunters For Cyber: Ex-DoD Officials Say

To defend 21st-century networks, should the US use the model of 18th-century privateers?

It seems Ole’ Gary and the Podunk crew received new and improved titles. They are bounty hunters and privateers. This is immensely important and will be the subject of the next article in the series.

All they need to do is go back to the room and get chatted up again and they can start their new careers. I’ve been researching this cottage industry and watching it develop since 2015. The Privatized NSA Army is Attacking YOU!

According to the DOD, this function is supposed to do exactly what the DOD just did. The problem is it is more of an embarrassment to let ole’ Gary and Jimmy loose in the press than it is to embarrass their direct commander and the highest executive according to the Constitution.

CIA morale plummets as Trump becomes president and CIA veterans say spat with Trump could have real-world consequences.

The problem is most of the morale slump is coming from private contractors that are doing the actual work. Contrary to popular belief, the CIA would be relegated to the level of Keystone Cops if they had real agents face forward online every day. So, what does this mean?

Ole Jimmy and Gary want to feel the part. They want to dress the part. They want to live the part. Their lack of GEDs just won’t allow it to happen. Sorry, Jimmy. Sorry, Gary. The CIA doesn’t offer apprenticeships. But, because they do work indirectly for the CIA, they pretend they are CIA and use their real CIA tools on their neighbors. We’ll get into that in the next article.

If U.S. intelligence is questionable and untrustworthy, there is no single greater threat to the planet today. Members of an intelligence community who try to circumvent the democratic process should be prosecuted no matter who they are or who they are trying to undermine.- U.S. Intelligence Crisis Poses a Threat to the World (Part 1)

It’s time for a quiz and let’s see who’s paying attention

Were Hackers Targeting Nuclear Facilities like Homeland Security Dept. and F.B.I. Say?

Or was it Jimmy and Gary again?

If you said yes, you may just win and the US goes back to the things we were all taught to value.

Agents like Jimmy and Gary provide most of the OSINT and Intel for the FBI and Homeland Security.

The next article in the series is mind-boggling because it opens up the reality of cyber privateering and bounty hunting. The reality of the situation and the deviant turns it’s taken make the dire predictions professor Jasinksi made look very tame and optimistic.

Trump’s Attempt to Weaponize NSA Against His Enemies

Trump’s Attempt to Weaponize NSA Against His Enemies

WAYNE MADSEN | 21.04.2019 | WORLD / AMERICAS

Trump’s Attempt to Weaponize NSA Against His Enemies

A few weeks after Donald Trump’s inauguration he blasted the US National Security Agency (NSA), falsely claiming the signals intelligence agency leaked classified information to the media. In February 2017, Trump tweeted: “Information is being illegally given to the failing @nytimes & @washingtonpost by the intelligence community (NSA and FBI?)… Just like Russia.” It was Trump’s second public attack on NSA. During the 2016 presidential election campaign, Trump accused NSA of withholding intercepted copies of his opponent Hillary Clinton’s emails.” Trump ranted, “Obviously they [NSA] don’t want to get them… they’re protecting her, they’re coddling her.”

Trump displayed for the world to see his ignorance about the role and mission of the NSA. Even after the agency’s intra-Five Eyes signals intelligence alliance warts were publicly exposed by the Edward Snowden leaks, Trump was making wild accusations about NSA that have only been the fodder for Hollywood movies like “Enemy Of The State.” “Mercury Rising,” “Sneakers,” and “Good Will Hunting.”

The recently-released heavily-redacted report by Justice Department Special Counsel Robert Mueller on foreign involvement in the 2016 presidential election contains a startling revelation: not since the Nixon administration has a US president flagrantly attempted to use the NSA to involve itself in a domestic law enforcement matter in pursuit of an Oval Office cover-up. According to Volume II of the “Report On The Investigation Into Russian Interference In The 2016 Presidential Election, President Trump attempted to involve the NSA in the FBI’s then-ongoing investigation into Trump’s campaign and his possible illegal activities as president.

Trump’s actions to misuse a US intelligence agency to protect him from criminal liability is an impeachable offense. The precedence was decided by the US House of Representatives in Article II of its impeachment resolution against Richard Nixon. The House found that, in the case of Nixon, he abused his office by misusing federal agencies in violation of their regulations. The article states that Nixon “repeatedly engaged in conduct violating the constitutional rights of citizens, impairing the due and proper administration of justice and the conduct of lawful inquiries, or contravening the laws governing agencies of the executive branch and the purposes of these agencies.”

Mueller’s investigation uncovered Trump’s possible use of NSA to assist him in stymying the FBI’s investigation of Trump’s 2016 campaign. The report states: “the President reached out to the Director of National Intelligence and the leaders of the Central Intelligence Agency (CIA) and the National Security Agency (NSA)” to involve them in his goal of suppressing the FBI’s investigation of him and his campaign.

The Mueller Report states, “On March 26, 2017, the day after the President called Coats [Director of National Intelligence Dan Coats], the President called NSA Director Admiral Michael Rogers. The President expressed frustration with the Russia investigation, saying it made relations with the Russians difficult.” Mueller’s investigation did not commence until May 17, 2017, so the investigation was still being handled by the Justice Department and FBI.

The Mueller Report continues: “The President told Rogers “the thing with the Russians [wa]s messing up” his ability to get things done with Russia. The President also said that the news stories linking him with Russia were not true and asked Rogers if he could do anything to refute the stories. Deputy Director of the NSA Richard Ledgett, who was present for the call, said it was the most unusual thing he had experienced in 40 years of government service. After the call concluded, Ledgett prepared a memorandum that he and Rogers both signed documenting the content of the conversation and the President’s request, and they placed the memorandum in a safe.”

Considering the fact that Ledgett revealed to Mueller’s investigators that he had never experienced anything like Trump’s request in 40 years of government service, it can be assumed that if Ledgett began his service in 1977 in the US Army in a signals intelligence-related role, followed by his joining the NSA in 1988, his 40 years of NSA or NSA-connected service was during the post-Foreign Intelligence Surveillance Act (FISA) era.

The FISA of 1978 was specifically enacted to prohibit the abuse of NSA or any other intelligence community agency for warrantless political purposes not approved by the Foreign Intelligence Surveillance Court. Between 1952 and 1974, using classified eavesdropping programs with codenames like SHAMROCK and MINARET, the NSA compiled files on 75,000 Americans, including civil rights and anti-war activists, members of Congress, journalists, and others. In 1970, Nixon submitted to the directors of the FBI, CIA, Defense Intelligence Agency, and NSA his infamous Huston Plan. The plan called for US intelligence agencies to engage in illegal surveillance of “radicals.” Nixon’s Attorney General, John Mitchell, later referred to the Huston Plan as “White House horrors.” Enactment of the FISA was a direct result of Nixon’s threatened Huston Plan. Did Trump ask Rogers and Ledgett to return to the “status quo ante” and illegally collect compromising information on his perceived enemies in Congress, the press – which he refers to as the “enemy of the people,” and others? Answering that question should be one of the top priorities of the House oversight committees.

The NSA director who implemented FISA throughout the US Signals Intelligence system was the no-nonsense Admiral Bobby Ray Inman. In only a few cases since Inman’s tenure has any NSA director veered from a commitment to the laws and regulations implementing FISA and constraining NSA’s authorization to eavesdrop on US citizens. George W. Bush’s operation STELLAR WIND, permitting warrantless surveillance, which was strenuously opposed by then-Attorney General John Ashcroft and his deputy, James Comey, is one notable exception.

Edward Snowden’s revelations about the NSA program codenamed PRISM may have whetted Trump’s appetite for the type of private communications NSA could harvest without abiding by current laws and regulations. Digging up compromising information on his enemies was Nixon’s most earnest desire when he developed his infamous “enemies’ list.”

Considering that Ledgett said he had never experienced anything like Trump’s request in his 40-years of Army and NSA service and felt compelled to commit the request to a memorandum and, with Rogers, sign it and place it in a safe in one of the most-secure facilities on the planet, Rogers’s insistence that Trump’s request was not “illegal, immoral, unethical, or inappropriate” does not hold logical water. Ledgett’s sudden decision to retire from government service on February 3, 2017, a few weeks after Trump’s inauguration, is also germane. So, too, is Trump’s initial reluctance to award the National Security Medal to Ledgett after his retirement from NSA. Trump was forced to award the medal to Ledgett after pressure was brought by then-National Security Adviser H.R. McMaster and DNI Coats.

Shortly after his election in November 2016, Trump summoned Rogers to Trump Tower for a meeting. Apparently, Rogers never informed Director of National Intelligence (DNI) James Clapper or anyone in the Obama administration about the Trump-requested meeting. While, it is true that the Obama administration was never happy with Rogers’s overall performance at NSA, there is no indication that he was to be fired during a lame-duck Obama administration. Whatever Trump asked Rogers, the admiral never revealed it prior to the end of his directorship on May 4, 2018. There are unconfirmed reports that Trump considered replacing Clapper as DNI. However, Trump chose Coats and Rogers retired in 2018 to go to work for the Israeli intelligence firm, Team8.

The Rogers-Ledgett Memorandum of March 26, 2017 may be one of the most important “smoking gun” evidentiary documents in the Trump scandal. Of the tapes of 64 Oval Office conversations of Nixon in Watergate, it was one particular tape – that of a conversation six days after the 1972 Watergate break-in – that sped up Nixon’s resignation from office. That tape, recorded on June 23, 1972, contained a conversation between Nixon and White House chief of staff H. R. Haldeman that revealed Nixon’s desire to use US intelligence agencies to cover-up the Watergate break-in. On the tape was “prima facie” evidence that Nixon decided that his White House officials should approach Richard Helms, the director of the CIA, and Vernon A. Walters, CIA deputy director, and convince them to contact L. Patrick Gray, the acting director of the FBI, and compel him to halt the bureau’s investigation of the Watergate burglary on “national security” grounds. Watergate Special Prosecutor Leon Jaworski, who replaced Archibald Cox – fired in the October 1973 “Saturday Night Massacre” purge of the Justice Department leadership by Nixon, believed that the President, by involving the CIA in the FBI’s investigation, initiated a criminal conspiracy to obstruct justice.

The exposure of the June 23, 1972 tape sank the Nixon presidency, just as the March 26, 2017 NSA memo could be striking enough in its actual content to show blatant obstruction of justice by Trump. Ledgett claims he never experienced anything like Trump’s request of NSA in his 40 years of government service. There is little chance that the memo merely concerns Trump’s request for the NSA to state publicly that Trump was innocent of any election campaign “collusion” with Russia. For Ledgett to memorialize the conversation in a memo points to Trump making a request that was violative of the law. The memo was written seven days after White House Press Secretary Sean Spicer made a wild accusation, based on a flimsy Fox News report, that President Obama had asked Britain’s NSA counterpart, Government Communications Headquarters (GCHQ), to spy on the Trump campaign. GCHQ and Rogers rejected the Fox report as nonsense. Past NSA directors and deputy directors have made comments supporting a president’s initiatives, for example, NSA’s public endorsement of President Bill Clinton’s cryptographic key escrow initiatives.

Donald Trump’s knowledge of NSA, as with other agencies of government, is extremely shallow and indicative of a school boy’s appreciation for the roles and responsibilities of agencies like the NSA, CIA, and FBI. Trump, a denizen of and product of pop culture, likely only knows about NSA from the movies and television shows that illustrate the signals intelligence agency as an eavesdropper of private telephone calls and email exchanges. Trump has no appreciation for US Signals Intelligence Directive (USSID 18), which implements the FISA and stipulates that all surveillance and intercepts of the communications of “US Persons” must be pursuant to a legitimate court order – under a FISA or Title III law enforcement predicate – or a compelling “ticking bomb” national security matter.

Trump may only know about NSA from his friend Jon Voight’s portrayal of Thomas Reynolds, a law-breaking renegade Deputy Director of the NSA, in the 1998 film “Enemy of the State.” Trump may have believed that Rogers and Ledgett were in positions to collect dirt on his political enemies. It would be hard to believe that Ledgett, a 40-year career NSA professional, would commit to written form a conversation between the two top NSA chiefs and the President unless the subject of Trump’s requests were in clear violation of FISA, USSID 18, and the Constitution. In other words, the Rogers-Ledgett Memo may be smoking gun evidence of obstruction by Trump on par with the June 23, 1972 Nixon tape.

The Deep State vs. WikiLeaks

Source

The Deep State vs. WikiLeaks

by Pepe Escobar (cross-posted with the Strategic Culture Foundation) by special agreement with the author)

The Made by FBI indictment of Julian Assange does look like a dead man walking. No evidence. No documents. No surefire testimony. Just a crossfire of conditionals.

But never underestimate the legalese contortionism of US government (USG) functionaries. As much as Assange may not be characterized as a journalist and publisher, the thrust of the affidavit is to accuse him of conspiring to commit espionage.

In fact the charge is not even that Assange hacked a USG computer and obtained classified information; it’s that he may have discussed it with Chelsea Manning and may have had the intention to go for a hack. Orwellian-style thought crime charges don’t get any better than that. Now the only thing missing is an AI software to detect them.

Assange legal adviser Geoffrey Robertson – who also happens to represent another stellar political prisoner, Brazil’s Lula – cut straight to the chase (at 19:22 minutes); “The justice he is facing is justice, or injustice, in America… I would hope the British judges would have enough belief in freedom of information to throw out the extradition request.”

That’s far from a done deal. Thus the inevitable consequence; Assange’s legal team is getting ready to prove, no holds barred, in a British court, that this USG indictment for conspiracy to commit computer hacking is just an hors d’oeuvre for subsequent espionage charges, in case Assange is extradited to US soil.

All about Vault 7

John Pilger, among few others, has already stressed how a plan to destroy WikiLeaks and Julian Assange was laid out as far back as 2008 – at the tail end of the Cheney regime – concocted by the Pentagon’s shady Cyber Counter-Intelligence Assessments Branch.

It was all about criminalizing WikiLeaks and personally smearing Assange, using “shock troops…enlisted in the media — those who are meant to keep the record straight and tell us the truth.”

This plan remains more than active – considering how Assange’s arrest has been covered by the bulk of US/UK mainstream media.

By 2012, already in the Obama era, WikiLeaks detailed the astonishing “scale of the US Grand Jury Investigation” of itself. The USG always denied such a grand jury existed.

“The US Government has stood up and coordinated a joint interagency criminal investigation of Wikileaks comprised of a partnership between the Department of Defense (DOD) including: CENTCOM; SOUTHCOM; the Defense Intelligence Agency (DIA); Defense Information Systems Agency (DISA); Headquarters Department of the Army (HQDA); US Army Criminal Investigation Division (CID) for USFI (US Forces Iraq) and 1st Armored Division (AD); US Army Computer Crimes Investigative Unit (CCIU); 2nd Army (US Army Cyber Command); Within that or in addition, three military intelligence investigations were conducted. Department of Justice (DOJ) Grand Jury and the Federal Bureau of Investigation (FBI), Department of State (DOS) and Diplomatic Security Service (DSS). In addition, Wikileaks has been investigated by the Office of the Director of National Intelligence (ODNI), Office of the National CounterIntelligence Executive (ONCIX), the Central Intelligence Agency (CIA); the House Oversight Committee; the National Security Staff Interagency Committee, and the PIAB (President’s Intelligence Advisory Board).”

But it was only in 2017, in the Trump era, that the Deep State went totally ballistic; that’s when WikiLeaks published the Vault 7 files – detailing the CIA’s vast hacking/cyber espionage repertoire.

This was the CIA as a Naked Emperor like never before – including the dodgy overseeing ops of the Center for Cyber Intelligence, an ultra-secret NSA counterpart.

WikiLeaks got Vault 7 in early 2017. At the time WikiLeaks had already published the DNC files – which the unimpeachable Veteran Intelligence Professionals for Sanity (VIPS) systematically proved was a leak, not a hack.

The monolithic narrative by the Deep State faction aligned with the Clinton machine was that “the Russians” hacked the DNC servers. Assange was always adamant; that was not the work of a state actor – and he could prove it technically.

There was some movement towards a deal, brokered by one of Assange’s lawyers; WikiLeaks would not publish the most damning Vault 7 information in exchange for Assange’s safe passage to be interviewed by the US Department of Justice (DoJ).

The DoJ wanted a deal – and they did make an offer to WikiLeaks. But then FBI director James Comey killed it. The question is why.

It’s a leak, not a hack

Some theoretically sound reconstructions of Comey’s move are available. But the key fact is Comey already knew – via his close connections to the top of the DNC – that this was not a hack; it was a leak.

Ambassador Craig Murray has stressed, over and over again (see here) how the DNC/Podesta files published by WikiLeaks came from two different US sources; one from within the DNC and the other from within US intel.

There was nothing for Comey to “investigate”. Or there would have, if Comey had ordered the FBI to examine the DNC servers. So why talk to Julian Assange?

The release by WikiLeaks in April 2017 of the malware mechanisms inbuilt in “Grasshopper” and the “Marble Framework” were indeed a bombshell. This is how the CIA inserts foreign language strings in source code to disguise them as originating from Russia, from Iran, or from China. The inestimable Ray McGovern, a VIPS member, stressed how Marble Framework “destroys this story about Russian hacking.”

No wonder then CIA director Mike Pompeo accused WikiLeaks of being a “non-state hostile intelligence agency”, usually manipulated by Russia.

Joshua Schulte, the alleged leaker of Vault 7, has not faced a US court yet. There’s no question he will be offered a deal by the USG if he aggress to testify against Julian Assange.

It’s a long and winding road, to be traversed in at least two years, if Julian Assange is ever to be extradited to the US. Two things for the moment are already crystal clear. The USG is obsessed to shut down WikiLeaks once and for all. And because of that, Julian Assange will never get a fair trial in the “so-called ‘Espionage Court’” of the Eastern District of Virginia, as detailed by former CIA counterterrorism officer and whistleblower John Kiriakou.

Meanwhile, the non-stop demonization of Julian Assange will proceed unabated, faithful to guidelines established over a decade ago. Assange is even accused of being a US intel op, and WikiLeaks a splinter Deep State deep cover op.

Maybe President Trump will maneuver the hegemonic Deep State into having Assange testify against the corruption of the DNC; or maybe Trump caved in completely to “hostile intelligence agency” Pompeo and his CIA gang baying for blood. It’s all ultra-high-stakes shadow play – and the show has not even begun.

Pepe Escobar: Empire of Chaos in Hybrid War Overdrive

SourcePepe Escobar: Empire of Chaos in Hybrid War Overdrive

March 28, 2019

The Trump administration’s foreign policy may be easily deconstructed as a crossover between The Sopranos and late-night comedy, writes Pepe Escobar.

by Pepe Escobar (cross-posted with Consortium News ) by special agreement with the author)

Is this the Age of Anxiety? The Age of Stupidity? The Age of Hybrid War? Or all of the above?

As right populism learns to use algorithms, artificial intelligence (AI) and media convergence, the Empire of Chaos, in parallel, is unleashing all-out hybrid and semiotic war.

Dick Cheney’s Global War on Terror (GWOT) is back, metastasized as a hybrid mongrel.

But GWOT would not be GWOT without a Wild West scarecrow. Enter Hamza bin Laden, son of Osama. On the same day the State Department announced a $1 million bounty on his head, the so- called “UN Security Council IS and Al-Qaeda Sanctions Committee” declared Hamza the next al-Qaeda leader.

Since January 2017, Hamza has been a Specially Designated Global Terrorist by the State Department – on par with his deceased Dad, back in the early 2000s. The Beltway intel community “believes” Hamza resides “in the Afghanistan-Pakistan region.”

Remember these are the same people who “believed” former Taliban leader Mullah Omar resided in Quetta, Baluchistan, when in fact he was safely ensconced only a few miles away from a massive U.S. military base in Zabul, Afghanistan.

Considering that Jabhat al-Nusra, or al-Qaeda in Syria, for all practical purposes, was defined as no more than “moderate rebels” by the Beltway intel community, it’s safe to infer that new scarecrow Hamza is also a “moderate”. And yet he’s more dangerous than vanished fake Caliph Abu Baqr al-Baghdadi. Talk about a masterful example of culture jamming.

Show Me The Big Picture

A hefty case can be made that the Empire of Chaos currently has no allies; it’s essentially surrounded by an assortment of vassals, puppets and comprador 5thcolumnist elites professing varied degrees of – sometimes reluctant – obedience.

The Trump administration’s foreign policy may be easily deconstructed as a crossover between The Sopranos and late-night comedy – as in the whole episode of designating State Department/CIA regime change, lab experiment Random Dude as President of Venezuela. Legendary cultural critic Walter Benjamin would have called it “the aestheticization of politics,” (turning politics into art), as he did about the Nazis, but this time it’s the Looney Tunes version.

To add to the conceptual confusion, despite countless “an offer you can’t refuse” antics unleashed by psychopaths of the John Bolton and Mike Pompeo variety, there’s this startling nugget. Former Iranian diplomat Amir Moussavi has revealed that Trump himself demanded to visit Tehran, and was duly rebuffed. “Two European states, two Arab countries and one Southeast Asian state” were mediating a series of messages relayed by Trump and his son-in-law Jared “of Arabia” Kushner, according to Moussavi.

Is there a method to this madness? An attempt at a Grand Narrative would go something like this: ISIS/Daesh may have been sidelined – for now; they are not useful anymore, so the U.S. must fight the larger “evil”: Tehran. GWOT has been revived, and though Hamza bin Laden has been designated the new Caliph, GWOT has shifted to Iran.

When we mix this with the recent India-Pakistan scuffle, a wider message emerges. There was absolutely no interest by Prime Minister Imran Kahn, the Pakistani Army and the Pakistani intelligence, ISI, to launch an attack on India in Kashmir. Pakistan was about to run out of money and about to be bolstered by the U.S., via Saudi Arabia with $20 billion and an IMF loan.

At the same time, there were two almost simultaneous terrorist attacks launched from Pakistan – against Iran and against India in mid-February. There’s no smoking gun yet, but these attacks may have been manipulated by a foreign intelligence agency. The Cui Bono riddle is which state would profit immensely from a war between Pakistan and Iran and/or a war between Pakistan and India.

The bottom line: hiding in the shadow of plausible deniability – according to which what we understand as reality is nothing but pure perception – the Empire of Chaos will resort to the chaos of no-holds-barred hybrid war to avoid “losing” the Eurasian heartland.

Show Me How Many Hybrid Plans You Got

What applies to the heartland of course also applies to the backyard.

The case of Venezuela shows that the “all options on the table” scenario has been de facto aborted by Russia, outlined in an astonishing briefing by Maria Zakharova, spokeswoman of the Russian Foreign Ministry, and then subsequently detailed by Russian Foreign Minister Sergey Lavrov.

Lavrov. (Wikimedia Commons)

Meeting with Chinese Foreign Minister Wang Yi and Indian Foreign Minister Sushma Swaraj at a crucial RIC (part of BRICS) summit in China,Lavrov said, “Russia keeps a close eye on brazen US attempts to create an artificial pretext for a military intervention in Venezuela… The actual implementation of these threats is pulling in military equipment and training [US] Special Forces.”

Lavrov explained how Washington was engaged in acquiring mortars and portable air defense systems “in an East European country, and mov(ing) them closer to Venezuela by an airline of a regime that is… rather absolutely obedient to Washington in the post-Soviet space.”

The U.S. attempt at regime change in Venezuela has been so far unsuccessful in several ways. Plan A – a classic color revolution -has miserably failed, in part because of a lack of decent local intelligence. Plan B was a soft version of humanitarian imperialism, with a resuscitation of the nefarious, Libya-tested responsibility to protect (R2P); it also failed, especially when the American tale that the Venezuelan government burnt humanitarian aid trucks at the border with Colombia was a lie, exposed by The New York Times, no less.

Plan C was a classic Hybrid War technique: a cyberattack, replete with a revival of Nitro Zeus, which shut down 80 percent of Venezuela’s electricity.

That plan had already been exposed by WikiLeaks, via a 2010 memo by a U.S.-funded, Belgrade-based color revolution scam that helped train self-proclaimed “President” Random Dude, when he was just known as Juan Guaidó. The leaked memo said that attacking the Venezuelan power grid would be a “watershed event” that “would likely have the impact of galvanizing public unrest in a way that no opposition group could ever hope to generate.”

But even that was not enough.

That leaves Plan D – which is essentially to try to starve the Venezuelan population to death via viciously lethal additional sanctions. Sanctioned Syria and sanctioned Iran didn’t collapse. Even boasting myriad comprador elites aggregated in the Lima group, exceptionalists may have to come to grips with the fact that deploying the Monroe doctrine essentially to contain China’s influence in the young 21stcentury is no “cakewalk.”

Plan E—for extreme—would be U.S. military action, which Bolton won’t take off the table.

Show Me the Way to the Next War Game

So where do all these myriad weaponizations of chaos theory leave us? Nowhere, if they don’t follow the money. Local comprador elites must be lavishly rewarded, otherwise you’re stuck in hybrid swamp territory. That was the case in Brazil – and that’s why the most sophisticated hybrid war case history so far has been a success.

In 2013, Edward Snowden and WikiLeaks revealed how the NSA was spying on Brazilian energy giant Petrobras and the Dilma Rousseff government beginning in 2010. Afterwards, a complex, rolling judicial-business-political-financial-media coup ended up reaching its two main objectives; in 2016, with the impeachment of Rousseff, and in 2018, with Lula thrown in jail.

Now comes arguably the juiciest piece of the puzzle. Petrobras was supposed to pay $853 million to the U.S. Department of Justice for not going to trial for crimes it was being accused of in America. But then a dodgy deal was struck according to which the fine will be transferred to a Brazilian fund as long as Petrobras commits to relay confidential information about its businesses to the United States government.

Mattis: Wrote on hybrid war in 2005.

Hybrid war against BRICS member Brazil worked like a charm, but trying it against nuclear superpower Russia is a completely different ball game. U.S. analysts, in another case of culture jamming, even accuse Russia itself of deploying hybrid war – a concept actually invented in the U.S. within a counter-terrorism context; applied during the occupation of Iraq and later metastasized across the color revolution spectrum; and featuring, among others, in an article co-authored by former Pentagon head James “Mad Dog” Mattis in 2005 when he was a mere lieutenant general.

At a recent conference about Russia’s military strategy, Chief of General Staff Gen. Valery Gerasimov stressed that the Russian armed forces must increase both their “classic” and “asymmetrical” potential. In the U.S. this is interpreted as subversion/propaganda hybrid war techniques as applied in Ukraine and in the largely debunked Russia-gate. Instead, Russian strategists refer to these techniques as “complex approach” and “new generation war”.

Santa Monica’s RAND Corporation still sticks to good ol’ hot war scenarios. They have been holding “Red on Blue” war games simulations since 1952 – modeling how the proverbial “existential threats” could use asymmetric strategies. The latest Red on Blue was not exactly swell. RAND analyst David Ochmanek famously said that with Blue representing the current U.S. military potential and Red representing Russia-China in a conventional war, “Blue gets its ass handed to it.”

None of this will convince Empire of Chaos functionary Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, who recently told a Senate Armed Services Committee that the Pentagon will continue to refuse a “no first use” nuclear strategy. Aspiring Dr. Strangeloves actually believe the U.S. can start a nuclear war and get away with it.

Talk about the Age of Hybrid Stupidity going out with a bang.

Pepe Escobar, a veteran Brazilian journalist, is the correspondent-at-large for Hong Kong-based Asia Times. His latest book is “2030.” Follow him on Facebook.

The Expanding Global Footprint of U.S. Special Operation

South Front

March 20, 2019

Written and produced by SF Team: Brian KalmanDaniel Deiss, Edwin Watson

This video is based on the text anlysis entitled “The Expanding Global Footprint of U.S. Special Operations“. It was originally released by SouthFront on February 2, 2019.

Introduction

With the possible U.S. military withdrawal from Syria in the news on a daily basis, the mainstream media has been quick to parrot the DOD’s claim that 2,000 troops, mostly special operations forces, are to be withdrawn from the country. Although the total number of U.S. special operators deployed to Syria may have approached as many as 5,000, the current headlines have not mentioned that the United States has special operations units deployed not just in Syria, but in a majority of the nations of the world. Over the past seventeen years, the forces at the disposal of U.S. Special Operations Command (SOCOM) have grown exponentially, more than doubling in size in numbers, with a budget that has also expanded four fold in that same period of time.

The Expanding Global Footprint of U.S. Special Operations

U.S. special operations forces on patrol in northern Syria. Although no concrete timeline has been publicly announced, the Trump administration has signaled its intention to pull U.S. military forces out of the country.

If U.S. SOF troops do pull out of Syria, they will still have a physical presence in over 70 nations on any given day. Although the public has an often vague and incomplete, unofficial explanation of the reasons behind these deployments, the Pentagon seems totally unwilling to explain the national defense rational or legality of these missions to anyone, including the U.S. Congress or the White House. Not only has SOCOM expanded in numbers, funding and weaponry since 2001 and the advent of the Global War on Terror (GWOT), but has acquired no small amount of political influence as well.

The U.S. special operations forces have become the darling of the military, praised by Congress, the White House, and the Media. They have willingly adopted a mythos that has been formulated and propagated by Hollywood on many levels. The U.S. public seems to worship this new class of soldier, while having little to no understanding of exactly what they do, nor any concept of how their actions might aid or hinder national security. An act has even been proposed by one state Representative to afford special income tax breaks to all SOF members.

Amidst all the praise about their prowess and successes on the battlefield, the media purposefully steers clear of reporting on their many failures. Although the U.S. has built the largest force of special operations in the world, this very fact has arguably proven to have only weakened the U.S. military as a whole. The White House, State Department and Pentagon have increasingly relied on special operations forces to bear the brunt of any and all military operations or covert actions in both acknowledged and secret areas of conflict across the globe. This over-emphasis on special operations as a military solution to all challenges has only weakened traditional, conventional forces.

While most of the public assumes that these new Spartans act to protect U.S. interests and “freedom and democracy” whenever and wherever it is deemed necessary, they have little to no understanding of how the SOF have changed since 2001, nor the increasing military and political influence that they now hold. Even fewer Americans have stopped to ponder the illegality of much of what this expanding military force is doing on a global scale, not to mention the constitutional implications of a new Praetorian class in its midst that is growing in power and influence. If history teaches us anything, it is that shadowy and unaccountable paramilitary forces do not strengthen societies that embrace democratic or constitutional governments.

The Expansion of SOF and the Rise of SOCOM

Since the inception of the “Global War on Terror” shortly following September 11, 2001, U.S. SOF have more than doubled from approximately 33,000 to almost 70,000 today. Today, Special Operations Command (SOCOM) has roughly twice the personnel at its disposal, but also four times the budget as it did in 2001. Joint Special Operations Command (JSOC), comprising perhaps the most elite and specialized of the SOF forces, numbered some 1,800 in 2001. Although quite secretive in nature, it is surmised by many analysts that JSOC may have grown to the size of SOCOM circa 2001, over the same 18 year period. If realistic, this estimation means that JSOC added its original number of 1,800 men each year, for eighteen years.

What reason was given by the U.S. DOD to justify such an expansion in a traditionally small and highly selective sub-set of conventional military forces? Special operations forces have existed since at least the Second World War. All major military powers, and even smaller nations that have not historically prioritized robust national defense postures, have invested in special operations forces to complement conventional military establishments. Special operations units are useful as a significant force multiplier in any conventional conflict, and are vital in responding to special circumstances such as anti-terrorism, hostage rescue, reconnaissance deep behind enemy lines, sabotage, and kill or capture missions.

The Pentagon has argued that terrorism has grown, with the number of internationally recognized terrorist organizations roughly doubling from 2001 to today, mostly due to the explosion of both al Qaeda and ISIS. Regardless of the facts that point to the CIA origins of al Qaeda, there is little argument that the organization has grown in concert with U.S. military intervention in the Middle East and Africa. The same can be said for the origin and spread of ISIS. There is also ample circumstantial evidence to support the theory that the CIA and SOCOM have both directly and indirectly supported both of these terrorist organizations in Syria. Regardless of whether SOCOM is directly or indirectly complicit in aiding the Islamic terrorist organizations it declares it is defending the nation against, there is a clear correlation between the growths of both, and surely SOCOM has benefitted on many levels from this relationship.

The annual declared budget for SOCOM is in the range of $12.3 billion today, up from just $3.1 billion in 2001. There is little doubt that a healthy slice of the annual Overseas Contingency Operations and Support (OCO) budget is consumed by SOCOM, as the organization is the most heavily engaged in operations on foreign soil. In 2018, U.S. Congress approved $67 billion USD for OCO, and a further $7 billion USD in mandatory appropriations. It is unclear how much funding SOCOM receives on an annual basis, as the Pentagon has proven to be largely beyond financial questioning or audit by any office of the civilian government. After failing its first audit in decades in 2018, the Pentagon shrugged off the event with humor, and no one seemed to notice.

SOCOM numbers roughly 70,000 soldiers, marines, airmen and sailors and has a declared budget of at least $12.3 billion USD. To put these numbers in perspective, SOCOM has more personnel than the entire national militaries of 120 of the 193 UN member states. Only 20 nations (including the U.S.) have a greater total defense budget than that of SOCOM. A simple cost benefit analysis would reveal that the U.S. is not making much headway in “winning” the GWOT militarily. The growth of SOCOM has done little to reduce the prevalence of terrorism in the world. It begs the question, is there any correlation at all, or is there another agenda afoot entirely?

Global Reach and Integration

The expansion in numbers and funding of America’s special operations forces is alarming in its own right, but their growing international footprint may be even more alarming. Not only were U.S. SOF deployed to at least 150 nations last year, but they have established professional alliances with national militaries in a majority of those nations. Nick Turse has documented and reported on the growing influence of SOCOM over the past few years, with his articles being widely published in major mainstream periodicals as well as online alternative media. He has established many reliable sources within the SOF community. In regular articles posted on Tom’s Dispatch, Nick has documented the growing influence of SOCOM, its expanding power, and it’s establishing of close ties to the special operations forces of nations across the globe.

The Expanding Global Footprint of U.S. Special Operations

U.S. Special Forces NCO instructing Malian counter-terrorism forces in patrolling and ambush small unit tactics in that West African nation.

It seems quite logical that the main area of focus for these forces immediately prior to the declaration of GWOT in 2001 would be in the Middle East; however, since as early as 2014 the United States began refocusing its deployment of special operations personnel to the African continent. More recently, since the coup in Ukraine and the civil war that erupted as a result, SOCOM has shifted much of its efforts to Europe. Although the DOD and State Department have stated that such deployments are directly connected to terrorist activities in Africa, in Europe the goal is confronting an “increasingly aggressive and assertive” Russia. In reality, deployments to Africa are largely responsive to an increased Chinese presence on the continent. Not publicly acknowledged until the official publication of the National Defense Strategy of the United States for 2018, the U.S. establishment had already come to view both Russia and China as the major threats to U.S. global hegemony.

The Expanding Global Footprint of U.S. Special Operations

U.S. special operations forces were deployed to an overwhelming majority of African nations in 2017.

In 2006, deployments to Africa accounted for a mere 1% of U.S. special operations foreign deployments. By the end of 2017 this number had jumped to almost 17%. What could account for such an increase? Spokesmen for the DOD have sighted the increased threat of Islamic militant groups such as Boko Haram and al Shabaab and their capability to disrupt and weaken local governments; however, SOCOM has not just deployed forces to Somalia, Libya, Mali, Burkina Faso, Nigeria and Cameroon, the traditional territories of operation of Boko Haram and African offshoots of al Qaeda. U.S. commandos deployed to 33 African countries in 2017. 61% of the nations of Africa hosted a U.S. special operations military presence to some degree. There is little doubt that terrorist groups such as Boko Haram present a destabilizing threat to African governments whom are hanging on by a threat in their efforts to govern in the best of times, yet there is little evidence to support the idea that the U.S. military is in Africa for altruistic purposes. The U.S. military, just like the French Military, is increasing its activities in Africa to protect their respective financial interests and maintain influence over African nations, and to increasingly confront the growing influence of China in the region.

The Expanding Global Footprint of U.S. Special Operations

The Chinese and Afghan governments have been engaged in the highest level negotiations regarding infrastructure development, transit rights and even the establishment of a Chinese military facility on the Afghan side of the Wakhan Corridor since at least late 2018.

Between the years 2009 and 2012, Chinese overseas foreign direct investment (OFDI) grew at an annual rate of 20.5%. Chinese President Xi Jinping pledged $60 billion USD in investments in Africa at the 4th Annual Investing in China Forum held in Beijing last September. The United States has often claimed that Chinese financial practices in Africa are predatory in nature. This is quite ironic coming from the country that has a controlling influence over the IMF and World Bank, two financial entities that have been responsible for indebting most of the developing world for the past half century. Neither nation is in Africa to help poor Africans, but to enrich themselves. The African continent is rich in rare earth minerals and metals used in the manufacture of modern electronics, batteries, cell phones and computers. China opened its first and largest overseas military base in Djibouti in August of 2017, located in the strategic Horn of Africa. It is just a stones throw from Camp Lemonnier, the largest U.S. military base on the continent. In a similar move, China is seeking to build a military base in Afghanistan, another nation rich in rare earth minerals where the U.S. military has struggled to maintain a viable presence for over 18 years. China plans to base at least one battalion of troops at a newly constructed facility in the northeastern province of Badakhshan, ostensibly to train Afghan security forces. Located close to the Wakhan Corridor, the base will help provide security to the One Belt One Road trade corridor through the region, and help solidify growing economic and security ties with the Central Asian nation. Coupled with the base in Djibouti and a planned PLAN naval base at Gwadar, Pakistan, China is establishing a viable defense infrastructure in the region. This directly undercuts long established U.S. interests in the region.

The Expanding Global Footprint of U.S. Special Operations

The Wakhan Corridor is a strategically important mountain pass, the control of which is of utmost importance to the Chinese government in securing the One Belt One Road logistics network.

While SOCOM has maintained a sizeable presence in Afghanistan and Africa to confront a growing Chinese presence in Central Asia and Africa, it has also increased operations in the European theatre as well. In 2006 only 3% of all SOF units were deployed to nations in Europe. By 2018 that percentage had grown to almost 17%. According to a statement made to Tom’s Dispatch, a spokesman for SOCEUR, Major Michael Weisman stated,

“Outside of Russia and Belarus we train with virtually every country in Europe either bilaterally of through various multinational events. The persistent presence of U.S. SOF alongside our allies sends a clear message of U.S. commitment to our allies and the defense of our NATO alliance.”

Since the disastrous failure of Petro Poroshenko’s Anti-terrorism Operation (ATO) to subdue the breakaway republics in eastern Ukraine, SOF deployments to nations bordering the Russian Federation have increased notably. As it was detailed in a previous article, SOCOM has established very close ties with Ukrainian special operations forces.

Over the past four years SOCOM has repeatedly deployed forces to Latvia, Estonia, Lithuania, Poland, Romania, Bulgaria, Moldova, Georgia, and even Finland. In 2016 alone, U.S. Special Operations Command (SOCOM) conducted no less than 37 Joint Combined Exchange Training (JCET) exercises on the European continent, with 18 such exercises in nations bordering Russia. Is SOCOM sending a reassuring message to allies, or an ominous message to Russia, the holder of the world’s largest nuclear arsenal? Is it wise defense policy to increasingly surround Russia, and back it into an increasingly tight corner? If Russian political and military leaders have learned one lesson throughout the centuries, it is that the concentration of foreign belligerent military forces on their national borders eventually leads to conflict and invasion.

The Expanding Global Footprint of U.S. Special Operations

Not only has SOCOM positioned itself in a majority of the nations across the globe, but increasingly along the borders of the Russian Federation and China.

The United States has become deeply entrenched in the conflict in Ukraine, having increased military aid to the ruling regime incrementally from 2014 to the present. After the disastrous Ukrainian Armed Forces winter offensive of 2015, culminating in the encirclement battle of Debaltseve, U.S. military aid kicked into high gear. Regular rotations of U.S. Army trainers teach UAF troops at the Yavoriv International Peace Keeping and Security Center modern combat skills with an increased emphasis on making the force more NATO interoperable. Ukrainian Special Forces have undergone a clear and striking transformation, and are now nearly indistinguishable from their U.S. and NATO counterparts. They are now wearing U.S. military issue Operational Camouflage Pattern (OCP) “multicam” battle dress uniforms and gear, and are increasingly using western manufactured firearm accessories, optics, and night vision equipment. More notably, the UAF special operations units have adopted a number of small arms and sniper weapons systems that utilize NATO standard ammunition such as the 5.56x45mm intermediate rifle round and the 7.62x51mm rifle round. Sniper rifles chambered in .308 Winchester and .338 Lapua have also been adopted in limited numbers.

The Expanding Global Footprint of U.S. Special Operations

U.S. Navy SEALs conducted a number of exercises with the Bulgarian military in the Black Sea in 2018, a clear message to Russia that the U.S. was prepared to escalate asymmetrical warfare targeting the Crimean Peninsula.

Speaking at a GEOInt (Geospatial Intelligence) annual symposium in 2014, former head of SOCOM, General Joseph Votel opined that “We want to be everywhere, know everything.” Clearly, SOCOM has increasingly pushed for the first part of his stated goal in the intervening years; however, the increased focus and funding of special operations over the past 18 years has left the U.S. military’s conventional forces in a state of atrophy and decline. The U.S. political establishment and military leadership have come to see SOCOM as the go-to solution provider for just about any scenario where military force is seen as an option. This has increased the reputation and clout of SOCOM, but this has increasingly come at the expense and detriment to more traditional conventional forces that chiefly serve the national interests of deterrence and defense.

Conventional Warfare Atrophy

In a detailed analysis posted late last year, “Why the U.S. Military is Woefully Unprepared for a Major Conventional Conflict”, I outlined the causes and effects of the decline in U.S. conventional warfare capabilities. There is undoubtedly a direct correlation between the reliance upon and exponential growth of U.S. special operations forces, and the decline in conventional force readiness and capability. This is evident in all service branches and has had a negative effect on the ability of the U.S. Armed Forces to carry out future offensive and defensive combat operations against peer adversaries. The U.S. military will have very little hope of achieving decisive military victories in either Russia’s or China’s backyard. Any assertion to the contrary is delusory.

The U.S. military obsession with counterinsurgency and occupation stemming from one U.S. invasion or regime change operation after another, has left a once cutting edge, combined-arms conventional force gutted materially and low in morale. Special operations forces were leveraged in a fight against popular uprisings, Islamic terrorist organizations, and often an alliance between the two. The overwhelming majority of the growing names on the U.S. enemies list found their genesis as a result of U.S. military adventurism. These various insurgencies were a direct reaction to heavy-handed U.S. “foreign policy” delivered at the barrel of a gun. The resulting struggles in the so called GWOT depended greatly on an ever expanding pool of special operations forces. SOF were prioritized over other traditional, conventional forces not meant for occupation and not skilled in counterinsurgency.

While the troops at the disposal of SOCOM ballooned to almost 70,000, the U.S. Army has struggled to replace armored vehicles first fielded in the 1960’s, the Navy witnessed the utter deterioration and exhaustion of its carrier air wings, and the Air Force struggled to retain pilots to fly aircraft that fell deeper into a state of disrepair. Although achieving battlefield successes, the Armed Forces of the United States have yet to decisively win any of the numerous conflicts embarked upon since 2001. The intervening years have revealed the U.S. military of today to be an organization riddled with major material shortcomings and inferiorities, while plagued with a leadership lacking sound judgement and brimming with both hubris and an unfounded superiority complex. This leadership has repeatedly decided to invest in special operations forces that are unable to win wars on their own, at the expense of conventional forces designed solely for that purpose.

Growing Political Power

SOCOM has not restricted its influence to the many battlefields across the globe, or the forging of ties with foreign militaries through training and advisory programs. Just as the CIA has stationed personnel at most U.S. embassies oversees, SOCOM has followed suit. Special Operations Liaison Officers (SOLO) are stationed at a growing number of embassies, including the NATO member countries the United Kingdom, France, Poland, Italy, Turkey and Canada. SOLOS can also be found in U.S. embassies in Australia, Brazil, Colombia, El Salvador, Peru, Israel, Jordan, and Kenya. SOCOM’s former head, General Joseph Votel, had announced the intention of putting a SOLO is at least forty U.S. embassies around the globe by 2019. This statement should be viewed with some skepticism, as SOCOM rarely speaks publicly about the extent of their operations and planning, so it is likely that SOLOs are already serving in many more U.S. embassies, especially those located in flash points or trouble spots in Africa, the Middle East, South America, and nations bordering the Russian Federation and China.

Not only should this development be worrying to host nations who may not be inclined to look at a foreign military presence on their soil as acceptable, but it also clearly exhibits closer ties between SOCOM and the Department of State. Not only has SOCOM fostered closer ties with the Department of State, but with the monolithic U.S. security apparatus as a whole. In an attempt to “be everywhere and know everything”, SOCOM has moved further away from its subordinate position in the Department of Defense, and pursued a more independent and unaccountable path, similar to that of the CIA or NSA, two organizations that it has increasingly worked closely with. SOCOM has even forged close ties with the Federal Bureau of Investigation, whose prevue is supposed to be limited to U.S. domestic crime investigations and the enforcement of federal laws.

There should be some apprehension at both the Pentagon and in the halls of Congress, of the growing power of this new military within the military. In a constitutional republic that clearly delineates, compartmentalizes, and limits government power, the growth of a largely unaccountable, secretive and influential new military organization should be viewed as a threat to the very foundations of political and social order. A number of former special operations members have run for political office in recent years and won. While electing retired soldiers into Congress and gubernatorial office will most likely bring a level of restraint to government military adventurism, with those individuals having seen and paid the price for war, there is also a chance that they will steer policy to aid the military industrial complex. The cautionary tale of Governor Eric Greitens is one such example that also signals another problem effecting the special operations community as a whole.

Scandals Tarnish the Mythology

A number of scandals involving U.S. special operations soldiers have hit the headlines in recent years, corresponding with the exponential growth of the force. In an attempt to expand the SOF, the Pentagon seems to have lowered physical, cognitive and moral standards in order to fill the ranks. The Hollywood-Pentagon alliance that has worked tirelessly to create and perpetuate the image of the invincibility of the Navy Seals, presenting them as modern day Spartans or Praetorians, has run into a minor set-back in recent years. The criminal conduct of the elite of the elite has recently tarnished a once proud and silent fraternity of soldiers.

On June 4, 2017 an Army Special Forces NCO was murdered by two Navy SEALs and two Marines “Raiders” in Mali. The original story put forward was that the soldiers accidentally killed their compatriot in an attempt to scare him into silence. The Green Beret, Staff Sergeant Logan Melgar, had uncovered gross criminal conduct by Chief Petty Officer Adam Matthews and Petty Officer Anthony DeDolph. The two SEALs had been embezzling money meant to pay off local informants, and had also been bringing local prostitutes back to the small unit’s “secret” safe house . Staff Sergeant Melgar was ambushed in the safe house, beaten and choked to death. It took military investigators roughly a year and a half to finally charge all four perpetrators with felony murder, involuntary manslaughter, conspiracy, obstruction of justice, hazing and burglary. The investigation found that the men killed Staff Sergeant Melgar while engaged in an act of burglary; however, it is not known if they were attempting to steal back or destroy evidence that the Army Staff Sergeant had collected against them.

Perhaps no better example of the meteoric rise and fall of a former Navy SEAL exists as a greater cautionary tale than that of disgraced former Missouri Governor Eric Greitens. Greitens had ridden the reputation of the SEALs into fame and political office, only to fall victim to his own despicable criminal mind. Greitens never served in combat and was not highly regarded by most rank and file SEAL members with combat experience. Many such members speaking off the record, regarded him as an overly ambitious ladder climber that intended to ride the SEAL reputation as far as it would take him. It was largely theorized that before accusations of criminal conduct started coming to the fore, that he fully intended to launch a U.S. presidential campaign. Thankfully, investigations revealed gross corruption in his political dealings and his personal life. Geitens had been listed as one of the 100 most influential people in the world by Time Magazine in 2013, and made the list of Fortune Magazine’s 50 greatest leaders in 2014. By May 29, 2017 he had resigned from political office in disgrace.

The Expanding Global Footprint of U.S. Special Operations

A still shot from a gubernatorial commercial promoting Eric Greitens in 2016. He ran on the collective reputation of the SEAL teams, much to the chagrin of many rank and file members.

A vocal critic of the new trend in special operations personnel seeking the spotlight and financial gain is Navy SEAL Lieutenant Forrest Crowell, who even wrote his post graduate thesis at the Naval Postgraduate School regarding the issue. While writing a detailed story on Governor Greitens in The New Yorker, Phil Klay summarized Lt. Crowell’s opinion put forward in his thesis:

“In it, he argued that the SEALs’ celebrity status had diverted their culture “away from the traditional SEAL Ethos of quiet professionalism to a Market Ethos of commercialization and self-promotion.” Crowell warned that the new approach incentivized “narcissistic and profit-oriented behavior” and undermined healthy civil-military relations by using “the credibility of special operations to push partisan politics. “The people of this nation should be suspicious of SEALs who speak too loudly about themselves,” Crowell wrote.”

Reversing the Trend

Although it remains to be seen whether or not U.S. special operations troops will be withdrawn from Syria or not, it is highly unlikely. The timetable for withdrawal continues to stretch into the future. It is also highly unlikely that SOCOM will reduce its global footprint, slow the tempo of joint military training with foreign militaries, or request a smaller budget for 2020. Like all U.S. federal government entities, it will promote itself at the expense of all others, and will resist any demands to lessen its power and influence.

President Trump has proven himself either incapable of challenging the military industrial complex, or totally complicit in the aim of that complex to perpetuate endless military conflict. There is very little sign that anyone in either the civilian government or the military leadership of the United States has the integrity or is willing to make the political sacrifice to alter the current course that the U.S. Armed Forces are embarked upon. The U.S. military has misallocated funds and priorities for the past two decades, engaged in misguided and disastrous regime change operations that have cost the nation trillions of dollars and thousands of lives. These military adventures have gutted the armed forces materially and morally. A generation of Americans have been left scarred physically and mentally. Hundreds of thousands of combatants and civilians in countries across the Middle East and Africa have lost their lives, while millions of refugees have fled the resultant chaos.

By 2019, SOCOM has reached a pinnacle in power and influence within the military industrial complex. It has garnered and fostered an almost mythical status in U.S. society. Yet it has not won and is incapable of winning any conflict that the government of the United States has seen fit to employ it in. Perhaps that is the very point. Special operations forces deployed across the globe, in almost every country you can imagine can help initiate, maintain and perpetuate conflict as long as the United States stays in a position of relatively unrivaled power in the world. The U.S. military industrial complex does not desire large winnable wars, but “low-intensity” conflicts that last as long as possible. That is how the system retains power, maintains profits, and remains relevant.

A strengthened SOCOM, deployed across the planet, establishing relationships with the foreign militaries of most of the world’s nations, and stationed in an ever growing number of U.S. embassies is a dream come true for the Deep State. There is little chance that SOCOM will reverse its course of expansion and accumulation of power at the expense of U.S. national security anytime in the immediate future. Just as the FBI, NSA and CIA have grown in power, influence and unaccountability since their creation, SOCOM seems poised to follow the same model to the detriment of the Republic that it was created to serve.

How Big Brother Grips Americans’ Minds to Support Invasions

By Eric Zuesse
Source

US-wars-US-military-budget-US-war-on-terror.png

On November 29th, Gallup headlined “Democrats Lead Surge in Belief US Should Be World Leader” and reported that “Three-fourths (75%) of Americans today think the United States has ‘a special responsibility to be the leading nation in world affairs,’ up from 66% in 2010. The surge is driven by Democrats, whose belief in this idea has increased from 61% eight years ago to 81% now.” This finding comes even after the lie-based and catastrophic US invasions of Iraq in 2003, and of Libya in 2011 (and of so many others, such as Afghanistan, where the US and Sauds created the Taliban in 1979). Americans — now even increasingly — want ‘their’ (which is actually America’s billionaires’) Government to be virtually the world’s government, policing the world. They want this nation’s Government to be determining what international laws will be enforced around the world, and to be enforcing them.

Most Americans don’t want the United Nations to have power over the US (its billionaires’) Government, but instead want the US Government (its billionaires) to have power over the United Nations (which didn’t authorize any of those evil, lie-based, US invasions).

Not only would doing this bankrupt all constructive domestic functions (health, education, infrastructure, etc.) of the US federal Government, but it would also increase the global carnage, as if the US Government hasn’t already been doing enough of that, for decades now.

The leadership for this supremacist craving comes straight from America’s top, not from the masses that are being sampled by the Gallup organization, who only reflect it — they are duped by their leaders. Here is how US President Barack Obama (a Nobel Peace Prize winner in 2009, for nothing at all but his ‘kindly’ but insincere verbiage when he had been a candidate) stated this widespread delusional American belief in American global moral supremacy, when addressing the graduating class at West Point Military Academy, on 28 May 2014:

The United States is and remains the one indispensable nation*. That has been true for the century passed and it will be true for the century to come…America must always lead on the world stage.

[*Every other nation is therefore ‘dispensable’; we therefore now have “Amerika, Amerika über alles, über alles in der Welt”.]

This had certainly not been the objective of US President Franklin Delano Roosevelt when he set up the U.N. just before his death in 1945; he instead wanted the U.N. to evolve into a democratic government of the world, with elected representatives of each and every one of the world’s governments — to evolve into becoming the global international republic — regardless of whether or not the US Government approves or disapproves of another nation’s government. The idea on which the U.N. was founded was not to involve the US Government in the internal affairs of other nations, not to be the judge jury and executioner of other governments that it doesn’t like, nor to dictate what other nations should or should not do within the given nation’s boundaries. FDR intended that there instead be democratically represented, at the U.N., each and every nation, and each and every people within that global government, where each of these national governments is (hopefully but not necessarily) a democracy.

FDR was just as opposed to dictatorship internationally, as he was opposed to dictatorship nationally, and he recognized that inevitably some governments will disapprove of other governments, but he was deeply committed to the view that a need exists for laws and law-enforcement between nations, on an international level, and not only within the individual nations, and that each nation is sacrosanct on its own internal laws. He respected national sovereignty, and opposed international empire. (This was his basic disagreement with Winston Churchill, then, and with American leaders such as Obama and Trump now.) Unlike President Obama (and evidently unlike the vast majority of today’s Americans) FDR didn’t want this international government to be an American function, but instead an entirely separate international governmental function, in which there is no international dictatorship whatsoever — not American, and not by any other country. He knew that this is the only stable basis for international peace, and for avoiding a world-annihilating World War III.

Barack Obama rejected FDR’s vision, and advocated for the United States as being (and even as if it already had been for a century) virtually the government over the entire world, which “must always lead on the world stage.” Adolf Hitler had had that very same international vision for his own country, Germany, “the Thousand-Year Reich,” but he lost World War II; and, then, when FDR died, Hitler’s vision increasingly took over in America, so that ideologically, FDR actually lost WW II, when Harry S. Truman took over the White House and increasingly thereafter, until today, when the US commits more invasions of foreign countries than do all other nations in the world combined. Americans (apparently, as shown in this and other polls) like this, and want more of it. Nobody else does.

For example, nobody (except the US and Saudi and Israeli aristocracies and their supporters worldwide, which are very few people) supports the US regime’s reinstitution of sanctions against Iran, which the US regime is imposing as the global dictator. America’s economic sanctions are like spitting into the face of FDR, who had opposed such imperialistic fascism in the more overtly military form when Hitler’s regime was imposing it. It’s also spitting at the U.N.

This latest Gallup finding displays an increase, but nothing that’s at all anomalous as compared to the decades-long reality of imperialistic US culture. For decades now, Gallup’s polling has shown that the most respected of all institutions by the American people is the nation’s military — more than the church, more than the Presidency, more than the US Supreme Court, more than the press, more than the schools, more than anything. America is invasion-nation. This is true even after the 2003 invasion of Iraq on the basis of blatant lies, which destroyed Iraq — a nation that had never invaded nor even threatened to invade the United States. The American people are, resolutely, bloodthirsty for conquest, even after having been fooled into that evilinvasion, and subsequent decades-long military occupation in Iraq, and after subsequent conquests or attempted conquests, in Libya, Syria, Yemen, and elsewhere — all destroying nations that had never invaded nor even threatened America. Why? How did this mass-insanity, of evil, come to be?

How is this aggressive nationalism even possible, in America’s ‘democracy’? It’s actually no democracy at all, and the public are being constantly fooled to think that it is a democracy, and this deception is essential in order for the public to tolerate this Government, and to tolerate the media that lie for it. This widespread deceit requires constant cooperation of the ‘news’-media — and these are the same ‘news’-media that hid from the public, in 2002, that the US Government was outright lying about “WMD in Iraq.”

The public simply do not learn. That’s a tragic fact. Largely, this fact results from reality being hidden by the ‘news’-media; but, even now, long after the fake ‘news’ in 2002, about the US regime’s having possessed secret and conclusive evidence of “Saddam’s WMD,” the published ‘history’ about that invasion still does not acknowledge the public’s having been lied-to at that time, by its Government, and by the ‘news’-media. So, the public live, and culturally swim, in an ongoing river of lies, both as its being ‘news’, and subsequently as its having been ‘history’. This is why the public do not learn: they are being constantly deceived. And they (as Gallup’s polls prove) tolerate being constantly deceived. The public do not rebel against it. They don’t reject either the politicians, or the ‘news’-media. They don’t demand that the American public control the American Government and that America’s billionaires lose that control — especially over the ‘news’-media.

Honesty is no longer an operative American value, if it ever was. That’s how, and why, Big Brother (the operation by the international-corporate billionaires) grips Americans’ minds to support foreign Invasions. Americans support liars, and it all comes from the top; it’s directed from the top. It is bipartisan, from both Democratic Party billionaires and Republican Party billionaires. National politicians will lose their seats if they disobey.

A good example, of this Big-Brother operation, is America’s Politifact, the online site which is at America’s crossover where ‘news’ and ‘history’ meet one-another. It’s controlled by billionaires such as the one who founded Craigslist. Millions of Americans go to Politifact in order to determine what is true and what is false that is being widely published about current events. The present writer sometimes links to their articles, where I have independently verified that there are no misrepresentations in an article. But, like the ‘news’-media that it judges, Politifact is also a propaganda-agency for the (US-Saud-Israeli) Deep State, and so it deceives on the most critically important international matters.

An example of this occurred right after the US regime had overthrown, in February 2014 in a bloody coup, the democratically elected Government of Ukraine, and replaced it by a rabidly anti-Russian racist fascist or nazi Government on Russia’s doorstep, a regime that was selected by the rabidly anti-Russian (but lying that it wasn’t) Obama regime. This Politifact article was dated 31 March 2014, right after over 90% of Crimeans had just voted in a referendum, to rejoin Russia, and to depart from Ukraine, which the Soviet dictator had transferred them to, separating them from Russia, in 1954. (None of that history of the matter was even mentioned by Politifact.)

The Politifact article was titled “Viral meme says United States has ‘invaded’ 22 countries in the past 20 years”, and it was designed to deceive readers into believing that “Russia’s recent annexation of Crimea” reflected the real instance of “invasion” that Americans should be outraged against — to deflect away from America’s recent history as being the world’s actual invasion-nation. This propaganda-article said nothing at all about either Crimea or Ukraine except in its opening line:

A Facebook meme argues that Americans are pretty two-faced when it comes to Russia’s recent annexation of Crimea.”

It then proceeded to document that the exact number of American invasions during the prior 20 years wasn’t 22, and so Politifact declared the allegation “false” (as if the exact number were really the entire issue or even the main one, and as if America’s scandalous recent history of invasions were not).

So, it’s on account of such drowning-in-propaganda, that the US public not only respect what US President Dwight Eisenhower derogatorily called the “military-industrial complex,” but respect it above even the US Presidency itself, and above all other US institutions (as Gallup’s constant polling demonstrates to be the case).

Here’s the reality: The same group of no more than a thousand super-wealthy Americans control both the United States Government and the weapons-manufacturing firms (such as Lockheed Martin), which are the only corporations whose only customers are the US Government and its chosen allied governments. So, these few people actually control the US Government’s foreign relations, and foreign policies. They create and control their own markets. This is the most politically active group of America’s super-rich, because they own America’s international corporations and because their business as owners of the military ones is military policy and also diplomatic policy, including the conjoining of both of those at the CIA and NSA, including the many coups that they (via their Government) engineer.

They also control all of the nation’s major news-media, which report international affairs in such a manner as to determine which foreign governments will be perceived by the mass of Americans to constitute the nation’s ‘enemies’ and therefore to be suitable targets for the US military and CIA to invade and conquer or otherwise “regime-change” — such as have been the lands of North Vietnam, Afghanistan, Iraq, Libya, Syria, Iran, North Korea, Yemen, Venezuela, etc., at various times.

The weapons-manufacturers won’t have any markets, at all, if there are no ‘enemy’ nations that are deemed by the public to be suitable targets for their weapons. ‘Enemy’ nations, and not only ‘allies’ (or ‘allied’ nations), are necessary, in order for the military business to produce the most profits. Overwhelmingly, if not totally, the chosen ‘enemies’ are nations that have never invaded nor even threatened to invade the United States; and, so, in order to keep this Government-funded business (the war-profiteering and associated international natural-resources extractions businesses) growing and thriving, what’s essential is continuing control over the nation’s ‘news’-media.

As Walter Lippmann wrote in 1921, “the manufacture of consent” is an essential part of this entire operation. It happens via the media. Even Germany’s Nazis needed to do that. Any modern capitalist dictatorship (otherwise called “fascism”) does. The US regime, being a capitalist dictatorship, certainly does.

Physically, Hitler lost, but his ideology won, he won even as nazism (racist fascism) instead of merely as fascism, and this racism is shown because the US regime is rabidly racist anti-Russian (not merely anti-communist), and has been so for at least a century. (Maybe it’s what Obama actually had secretly in mind when he said “That has been true for the century passed and it will be true for the century to come.” And Trump is no less a liar than Obama, and he continues this aim of ultimately conquering Russia.)

They say they’re only against Russia’s leader Vladimir Putin, but Putin shows in all polls of Russians, even in non-Russian polls, to be far more favorably viewed by Russians than either Barack Obama or Donald Trump are viewed by Americans. This is why regime-change-in-Russia is increasingly becoming dominated by US economic sanctions and military, and less dominated by CIA and other coup-organizers. The actual dictatorship is in America, and it requires participation by its ‘news’-media. Demonizing ‘the enemy’ is therefore crucial. It is crucial preparation for any invasion.

The United States Government spends at least as much money on its military as do all of the other governments in the world combined. Its ‘news’-media (that is to say, the media that are owned by, and that are advertised in by, the corporations that are controlled by, the same small group of billionaires — America’s billionaires — who fund the political campaigns of both the Democratic Party’s and the Republican Party’s nominees for the US Congress and the Presidency) may be partisan for one or the other of the nation’s two political Parties, but they all are unitedly partisan for the international corporations, such as Lockheed Martin, that America’s billionaires control, and that sell only to the US Government and to the foreign governments that are allied with the US Government. They also are partisan for the US-based oil and gas and mining international corporations, which need to extract at the lowest costs possible, no matter how much the given extractee-nation’s public might suffer from the deal. “Three-fourths (75%) of Americans today think the United States has ‘a special responsibility to be the leading nation in world affairs,’” and the actual beneficiaries of this mass-insanity are the owners of those US-based international corporations, the military and extraction giants.

Anthony Cordesman, at the Center for Strategic and International Studies, headlined on 15 August 2016, “US Wars in Iraq, Syria, Libya and Yemen: What Are The Endstates?” and he said,“Once again, the United States does not seem to be learning from its past. The real test of victory is never tactical success or even ending a war on favorable military terms, it is what comes next.”

But he ignored the main reason why these invasions had occurred. America’s weapons-manufacturers won’t have any markets, at all, if there are no ‘enemy’ nations that are deemed by the American public to be suitable targets for their weapons. Cordesman is there calculating success and failure on the basis of the myths (such as that the US Government cares about those “Endstates”), not of the realities (that it craves targets). The realities focus upon the desires of the owners and executives of the weapons-manufacturers and the extraction-firms, for ongoing and increased profits and executive bonuses, and not on the needs of America’s soldiers nor on the national security of the American people. Least of all, do they focus upon the needs — such as the welfare, freedom, or democracy — of the Iraqi people, or of the Syrian people, or of the Libyan people, or of the Yemenite people.

It’s all just lies, PR. Those invasions served their actual main functions when they were occurring. “The Endstates” there are almost irrelevant to those real purposes, the purposes for which the invasions were, and are, actually being done.

Here’s an ideal example of this mass mind-control: On 19 November 2017, Josh Rogin at the Washington Post headlined “The US must prepare for Iran’s next move in Syria” and reported that:

A task force of senior former US diplomatic and military officials has come up with suggestions for how Trump could prevent Iran from taking over what’s left of liberated Syria and fulfill his own promise to contain Iranian influence in the region.

“Most urgently…the United States must impose real obstacles to Tehran’s pursuit of total victory by the Assad regime in Syria,” the report by the Jewish Institute for National Security of America states. “Time is of the essence.”

The underlying presumption there was that the US regime has legitimate authorization to be occupying the parts of Syria it has invaded and now occupies, and that Iran does not. But the reality is that the US regime is occupying Syria instead of assisting Syria’s Government to defeat the US-Saud-Israeli invasion to overthrow and replace Syria’s Government, by stooges who will be selected by the Saud family who own Saudi Arabia, and the reality is that Iran’s forces there are invitees who are instead assisting Syria’s Government against the Saudi-Israeli-American invasion. In other words: this WP article is basically all lies. Furthermore, the Jewish Institute for National Security of America is a front-organization for the fascist regime that rules Israel, and the WP hid that fact, too, so its cited ‘expert’ was a mere PR agency for Israel’s aristocracy. So, this is Deep-State propaganda, parading as ‘news’.

Americans actually pay their private good money to subscribe to (subsidize) such bad public ‘news’papers as that. The billionaire who happens to own that particular ‘news’paper (the WP), Jeff Bezos, had founded and leads Amazon, which receives almost all of its profits from Amazon Web Services (AWS), the cloud-computing division, which supplies the US ‘Defense’ Department, CIA, and NSA.

For example, “without AWS and Prime, Amazon lost $2 billion in the 1st quarter of FY18. … These losses come from Amazon’s retail business. About 60% of Amazon’s revenue comes from retail and that’s where Amazon is losing money.” Amazon is profitable because of what it sells mainly to the Government, but also to other large US international corporations, and they all want to conquer Syria. None opposes that evil goal. Although Bezos doesn’t like the Sauds, he has actually been (at least until the Khashoggi matter) one of their main US media champions for the Sauds to take over Syria. It’s all just a fool-the-public game. It works, it succeeds, and that’s what Gallup’s polls are demonstrating. The public never learns. It’s a fact, which has been proven in many different ways.

This reality extends also to other nations, allies of the US aristocracy, and not only to the US regime itself. For example, on 27 November 2018, a whistleblowing former UK Ambassador, Craig Murray, who is a personal friend of Julian Assange, headlined “Assange Never Met Manafort. Luke Harding and the Guardian Publish Still More Blatant MI6 Lies”, and he proved that Britain’s Guardian had lied with total, and totally undocumented (and probably even totally non-credible), fabrications, alleging that Julian Assange of WikiLeaks had secretly met (in 2013, 2015, and 2016) with Paul Manafort of the Trump campaign.

The UK, of course, is a vassal-nation of the US aristocracy, and the Guardian is run by Democratic Party propagandists (paid indirectly by Democratic Party and conservative Tony-Blair-wing Labour Party billionaires) and therefore fabricates in order to assist those Parties’ efforts to impeach Trump and to dislodge Jeremy Corbyn from the Labour Party’s leadership. However, each of America’s two political parties (like the UK’s aristocracy itself) represents America’s aristocracy, which, like Britain’s aristocracy, is united in its determination to eliminate Assange — they are as determined to do that to him, just as Saudi Crown Prince Mohammed bin Salman al-Saud was determined to eliminate Jamal Khashoggi. ‘Democracy’? This? It is Big Brother.

Only if the population boycott lying individuals and organizations, is democracy even possible to exist in a nation. Democracy can’t possibly exist more than truth does. In political matters, deceit is always treachery; and its practitioners, whenever the evidence for it is overwhelming and irrefutable, should experience whatever the standard penalty is for treachery. Only in a land such as that, can democracy possibly exist. Elsewhere, it simply can’t. The only basis for democracy, is truth. Deceit is for dictators, not for democrats. And deceit reigns, in the US and in its allied countries. Is this really tolerable? Americans, at least, tolerate it.

When Obama was awarded the Nobel Peace Prize, the far-right Rupert Murdoch’s Wall Street Journal editorialized against Obama on 10 October 2009, by saying that “What this suggests to us — and to the Norwegians — is the end of what has been called ‘American exceptionalism’.”

Little did anyone then know that after winning re-election upon the basis of such war-mongering lies from Obama, as that “America remains the one indispensable nation”, Obama in February 2014 would go so far as to perpetrate a bloody coup overthrowing the democratically elected Government of one “dispensable” nation, Ukraine. And then, on 28 May of 2014, Obama would be telling America’s future generals, that “The United States is and remains the one indispensable nation” and that Obama would, in that speech, explicitly malign Ukraine’s neighbor Russia.

He did it, in this speech, which implicitly called all nations except the US “dispensable.” He had carefully planned and orchestrated Americans’ hostility toward Russia. His successor, Trump, lied saying that he wanted to reverse Obama’s policies on this, and Trump promptly, once becoming elected, increased and expanded those policies. Whatever a deceitfully war-mongering country like this might be, it’s certainly no democracy. Because democracy cannot be built upon a ceaseless string of lies.

The ‘fiancée’ and Gülen

WEDNESDAY, OCTOBER 24, 2018

The ‘fiancée’ and Gülen

Crown Prince “All Smiles” As Saudis Sign $50 Billion In Deals At “Davos In The Desert”” (Durden):

“It’s this river of capital that, more than anything else, should insulate MbS from any substantial blowback over the Khashoggi affair, just as it did when he imprisoned rival members of the royal family and women’s rights activists, or when he effectively kidnapped the prime minister of Lebanon, or as Saudi Arabia continues to wage a war of aggression against innocent civilians in Yemen, much to the international community’s bizarre silence.”

I’m betting on MbS weathering the storm, perhaps a little weakened.  If so, will there be repercussions?  The attack was obviously from Turkey, backed up by Big Jew (Sheldon) in America (guys like Corker don’t open their mouths without shekels).  The Israelis were terrified about this, and tried to ignore it, or even tried the ‘Khashoggi was a terrorist’ line (i.e., MbS did everybody a favor by bonesawing him).  Will we see a cooling in Saudi-Israeli relations as punishment for Sheldon’s attempted coup?

The ‘fiancée’ and Gülen!!!:  “Insights Into The Khashoggi Ordeal; Who And Why” (Kadi).  Once you start talking about Gülen you bring the CIA into the picture, and everything you think you know about this incident might be wrong!  I like the analysis where Kadi notes that what seems normal to us – going to a government office for a bureaucratic procedure – would not be normal for a Saudi guy of status like Khashoggi.  So what was he really doing?

Image result for Khashoggi fiancée

Was the ‘fiancée’ his intelligence handler?

Western Media Attacks Critics of the White Helmets. The New McCarthyism” (Sterling).

DNC Emails–A Seth Attack Not a Russian Hack by Publius Tacitus” (eight is new):

“So what do we know for certain?

First, no one in the Federal Governemnt—law enforcement or intelligence—was granted access to examine the computer servers and files on the DNC server even after the DNC claimed they had been hacked by a foreign government.

Second, the steps that Crowdstrike allegedly took to shutdown computer hacking by Russia do not match the timeline of the actual download of the documents from the DNC server.

Third, Seth Rich worked at the DNC and had access to the computer server and systems.

Fourth, Wikileaks founder Julian Assange identified Seth Rich as a “source” and posted a $20,000 reward for information concerning his murder.

Fifth, a Federal law enforcement agent told two witnesesses that Seth Rich had email exchanges with Wikileaks.

Sixth, two people with direct access to Julian Assange told three separate sources that Seth Rich was the source of the DNC material published by Wikileaks.

Seventh, the documents published by Guccifer contain meta data that establish that the documents were physically downloaded onto a device like a thumb drive.

Eighth, the NSA has confirmed that it has Top Secret and Secret documents responsive to a FOIA request for information concerning contact between Seth Rich and other people including Julian Assange.”

The EU Russia China Plan to Avert Iran Oil Sanctions” (Engdahl).  Blockchain versus dollar hegemony (thus avoiding NSA scrutiny and providing no target for secondary sanctions).  Of course, it seems pretty obvious that ‘Satoshi Nakamoto’ (Bitcoin/Silk Road are/were honeypots) is CIA or NSA (and Engdahl specifically refers to a Bitcoin competitor)!

Vladimir Putin: The Most Powerful Person in the World

Vladimir Putin: The Most Powerful Person in the World

EDITOR’S CHOICE | 14.06.2017

Vladimir Putin: The Most Powerful Person in the World

Paul Craig ROBERTS

Dear Friends, current problems with the website’s functionality, which are being addressed, are affecting the newsletter and email and, based on the light response to my quarterly call for donations, possibly donations as well.

In order to keep the content section functioning, the webmaster has turned off some of the other features until the problem has been fully identified and corrected. With the email down, I am unable to learn if any of you are encountering problems making donations. Some donations are being made, but the number is not comparable to past experience. Remember, this is your site. It depends on your support. If PropOrNot and the presstitutes convince you that I am a Russian Agent, you will be dependent on PropOrNot and presstitutes for your information and analysis.

Here is today’s column:

It must be wonderful being Vladimir Putin and being the most powerful person on earth. And not even have to say so yourself. The US Democratic Party is saying it for Putin along with the entirety of the Western presstitute media and the CIA and FBI also. The Russian media doesn’t have to brag about Putin’s power. Megyn Kelly, the Western presstitutes, and Western leaders are doing it for them:Putin is so powerful that he is able to place in office his choice for the President of the United States.

I mean, Wow! What power! Americans are simply out of the game. Americans, despite a massive intelligence budget and 16 separate intelligence services plus those of its NATO vassals, are no match whatsoever for Vladimir Putin.

I mean, really! What is the CIA for? What is the NSA for? What are the rest of them for? Americans would do better to close down these incompetent, but expensive, “intelligence services” and pay the money to Putin as a bribe not to select our president. Maybe the CIA should get down on its knees and beg Putin to stop electing the President of the United States. I mean, how humuiliating. I can hardly stand it. I thought we are the “world’s sole superpower, the uni-power, the exceptional, indispensable people.” It turns out that we are a nothing people, ruled by the President of Russia.

When the Democrats, CIA, and media decided to launch their PR campaign against Trump, they didn’t realize how inconsequential it would make the United States appear by putting American democracy into Putin’s pocket. What were they thinking? They weren’t. They were fixated on making sure Trump did not endanger the massive military/security complex budget by restoring normal relations with Russia.

There is no sign that American leadership in any area is actually capable of thought. Consider Wall Street and corporate leadership. To boost share prices Wall Street forced all corporations to desert their home country and move the production of goods and services sold to Americans offshore to where labor and regulatory costs were lower. The lower costs raised profits and share prices. Wall Street threatened resistant corporations with takeovers of the companies if they refused to move abroad in order to increase their profits.

Neither Wall Street nor corporate boards and CEOs were smart enough to understand that moving jobs offshore also moved US consumer incomes and purchasing power offshore. In other words, the financial and business leadership were too stupid to comprehend that without the incomes from high value-added, high productivity US jobs, the American consumer would not have the discretionary income to continue in his role as the economy’s driver.

The Federal Reserve caught on to Wall Street’s mistake. To rectify the mistake, the Fed expanded credit, allowing a buildup in consumer debt to keep the economy going on credit purchases. However, once consumer debt is high relative to income, the ability to buy more stuff departs. In other words, credit expansion is not a permanent fix for the lack of consumer income growth.

A country whose financial and business leadership is too stupid to understand that a population increasingly employed in part-time minimum wage jobs is not a big spending population is a country whose leadership has failed.

It is strictly impossible to boost profits by offshoring jobs without also offshoring US consumer incomes. Therefore, the profits from offshoring are temporary. Once enough jobs have been moved offshore that aggregate demand is stymied, the domestic market stagnates and then declines.

As I have demonstrated so many times for so many years, as has John Williams (shadowstats.com), the jobs reports from the US Bureau of Labor Statistics are nonsense. The jobs in the alleged recovery from June 2009 are largely low income domestic service jobs and the product of the theoretical birth/death model. The alleged recovery from the 2007-08 financial crisis is the first recovery in history in which the labor force participation rate declined. Labor force participation rates decline when the economy offers scant job opportunities, not when employment opportunities are rising.

What we know about US jobs is that the jobs are increasingly part-time minimum wage jobs. According to a presstitute news report that might or might not be true, there are only 12 counties in the entirety of the United States in which a person can rent a one-bedroom home on a minimum wage income.

In response to this report, a professor at Virginia Tech suggested that the government offer increased rental assistance and boost programs such as the National Housing Trust Fund, which invests in affordable housing.

In other words, taxpayers are to pick up the costs to Americans of US corporations deserting the US labor force. Those Americans who still have middle class incomes will be taxed to cover the lost incomes that the offshoring corporations and Wall Street have snatched away from American workers who can no longer earn enough to pay for their own housing.

In other words, capitalism has reached the point in its descent that it cannot exist without public subsidies for the people dispossessed by capitalism.

On a number of occasions I have written about how many costs of production are imposed on third parties, such as the environment. A significant percentage of the profits of capitalist corporations comes from the political and legal ability of the corporations to impose their costs of production on third parties. In other words, capitalism makes money because it can impose its costs of production on the environment and on people who do not share in the profits. I have provided many examples of this, especially in the area of real estate development. The developer is able to shift a large part of his costs to others.

This cost shifting has now reached the level of inducing Armaggedon. There is an effort to impeach Trump and put the warmonger VP Pence in the presidency. As Trump campaigned on restoring normal relations with Russia, a defeat of the attempt to reduce tensions would reinforce the recent conclusion of the Russian military high command that Washington is planning a first strike nuclear attack on Russia.

This is the risk that the entire world faces due to the dependence of the power and profit of the US military/security complex on war and enemies.

In other words, there is only one remaining rationale for the existence of the United States of America — the interests of the military/security complex — and these interests require a powerful enemy whether real or orchestrated.

Former CIA official John Stockwell wrote: “It is the function of the CIA to keep the world unstable, and to propagandize and teach the American people to hate, so we will let the Establishment spend any amount of money on arms.” The hatred and distrust of Russia that the West is currently being force-fed reflects Stockwell’s revelation, as does the orchestrated hatred and distrust of Muslims that has supported Washington’s destruction in whole or part of seven countries and trillions of dollars in new US war debt.

Globalism, that is, labor arbitrage across national boundaries, and financialization, the diversion of consumers’ incomes into interest and fees to banks, have wrecked the US economy. The “opportunity society” has vanished. Children have poorer economic prospects than their parents. The offshoring of manufacturing and professional service jobs such as IT and software engineering has collapsed the growth of aggregate demand in the US. The Federal Reserve’s credit expansion was only a temporary reprieve.

Formerly prosperous areas are in ruins. States’ budgets and pension systems are failing. There is no payoff to a university education. Americans’ economic prospects have been erased by globalism. Getting ahead requires connections as it did in the aristocratic systems. The high concentration of income and wealth has negated democracy. The government is only accountable to the rich.

American political and business leadership not only destroyed the image of US sovereignty by placing American democracy in Putin’s pocket, but also destroyed the formerly vibrant American economy, once the envy of the world.

Where can Americans find leadership? Certainly not in the Democratic Party, nor in the Republican Party, nor in the media, nor in the corporate community. How then does the US compete with Russia and China, two countries with good leadership? Is war the only answer to the question?

James Comey Is Losing His Game With Another Non-News Leak

May 17, 2017Moon of Alabama

This is a short follow up on yesterday’s false news stories topped with a Comey leak.

1. The New York Times tries to add to the story of the WannaCry ransom virus (which is based on NSA exploits),  hyping the unfounded claim that North Korea is behind it: Focus Turns to North Korea Sleeper Cells as Possible Culprits in Cyberattack. The story curiously does not even mention the nonsensical claim of a Google staffer that points to common code snippets in reused software stacks. Instead we get a long elaboration on how North Korea sends students abroad to be trained in IT and programming. In paragraph 4 the story asserts:

As evidence mounts that North Korean hackers may have links to the ransom assaults …

But no evidence, none at all, is cited in the piece. The “mounting evidence” is a molehill without the hill. Eleven paragraphs later we learn that:

It also is possible that North Korea had no role in the attacks,

Duh. Six NYT reporters collaborated in writing that twenty paragraph story which contains no reasonable news or information. What a waste.

2. The State Department claim that Syria built a crematorium inside a prison to burn executed prisoners saw no follow up. But it had consequences. The presented “evidence” was too thin to make it believable. Even the staunchly anti-Syrian SPIEGEL doubted it: USA bleiben Beweise für Assads Leichenöfen schuldig. Translated: “U.S. fails to give evidence for Assad crematorium claims.”

The State Department claim was presented in a special news conference by Stuart Jones, the acting assistant secretary of state for Near Eastern affairs. A day later Jones announced that he would retire:

Jones, 57, told colleagues the decision was his own and that he had not been pushed out or asked to leave the department.

Ahem. Sure. Maybe. Or Secretary of State Rex Tillerson disliked the lame propaganda shows Jones presented under the official State Department seal.

3. Yesterday’s “Trump revealed critical intelligence to Russia” nonsense is already dying down. Even regular NYT readers criticize their paper’s reporting of it:

It’s quite strange that the media is giving such prominence to and broadcasting so much detail about supposedly highly secret information and its source in order to show how irresponsible President Trump is.

It seem that of the two, the media and the President, the media is by far the most at fault for leaking state secrets. Strange indeed: it seems the goal of bringing down Trump overrides all other considerations.”

To recap – in March the U.S. and the UK had issued a ban on laptops for fights from certain Middle Eastern airports:

The U.S. officials said intelligence “indicates terrorist groups continue to target commercial aviation” by “smuggling explosive devices in various consumer items.”

It was known from other reports that the threat was from ISIS. Trump repeated this to the Russian Foreign Minister Lavrov and added that the origin of the treat is the ISIS capital Raqqa. Anyone would have guessed that. It was no secret. But “current and former officials” phoned up reporter after reporter to claim that Trump revealed critical intelligence because the Russians might now guess which country the information was coming from. A few hours later the Washington Post and the New York Times, not Trump, revealed that the original information came from Israel. It will be difficult to blame Trump for “leaking to the Russians” less information than “current and a former American official” leak to mainstream paper.

But as that smear against Trump and Russia has failed a new one is needed.

A week ago Trump unceremoniously fired FBI boss James Comey:

After six months of investigation the FBI had no evidence for any of the rumors about Russian interference [in the U.S.] that were thrown around. It should have closed the case with a clear recommendation not to prosecute the issue. That Comey kept the case open was political interference from his side. Hearings and public rumors about the case blocked the political calendar. Instead of following the facts, and deciding based upon them, he was himself running a political campaign.

Comey had hoped that he would not be fired as long as the investigation was running. Since Trump kicked him out Comey tried to get a public hearing in Congress to spill the beans and get some revenge. The Republican majority leaders smelled the trap and did not invite him. Today he upped his game: Comey Memo Says Trump Asked Him to End Flynn Investigation

President Trump asked the F.B.I. director, James B. Comey, to shut down the federal investigation into Mr. Trump’s former national security adviser, Michael T. Flynn, in an Oval Office meeting in February, according to a memo Mr. Comey wrote shortly after the meeting.“I hope you can let this go,” the president told Mr. Comey, according to the memo.

Comey leaked the memo to raise new allegations against Trump and to finally get his day in Congress. But Trump’s “I hope you can let this go” is not a clear interference in a judicial investigation. Trump just wished that the FBI would use its resources to look into other issues, like the extensive leaking of secret intelligence that occurred during recent months. Nothing nefarious can be constructed from that reasonable explanation. The investigation into Flynn, for violating the Foreign Agent Registration Act with relation to Turkey(!), continues. Trump has had no influence on it. If this talk has been so important as to possibly constitute a breach of law why did Comey wait months, until after he was fired, to leak it?

The Comey claim is another non-issue and non-story. The Republican congress leaders will not jump on Comey’s bandwagon (- or will they?) If this was the worst Comey can present he has lost the fight.

The deep-state, which opposes any collaboration with Russia and wants Trump impeached (RealNews vid), will now have to find a new angle for its attack.

Posted by b on May 17, 2017 at 05:17 AM | Permalink

%d bloggers like this: