Bombshell book in Germany revives 9/11 as a business model

Bombshell book in Germany revives 9/11 as a business model

April 06, 2021

By Pepe Escobar – Book Review for The Saker Blog

Nearly 20 years after 9/11, Germany and the German-speaking world are being hit by a formidable one-two.

A ground-breaking study by gifted independent financial journalist Lars Schall, Denken wie der Feind – 20 Jahre Ausnahmezustand 9/11 und die Geopolitik des Terrors 

(“Thinking Like the Enemy – 20 Years State of Emergency, 9/11 and the Geopolitics of Terror”) is being published in Germany in two books.

The first one – Das Erdöl, der Dollar und die Drogen (“The Oil, The Dollar and The Drugs”) – is out this week. Volume II will be out next week.

Nomi Prins, formerly from Goldman Sachs, has described Schall’s “investigation of 9/11 insider trading” as “stunning”. Marshall Auerback, researcher at the Levy Institute in the U.S., noted how “most of the MSM still refuse to tackle the broader, more controversial aspects of the 9/11 tragedy”. Schall, he adds, “provides a healthy corrective”.

A sample of Schall’s work, already published by The Saker blog, is this interview on 9/11 terror trading.

I’ve had the pleasure to write the introduction for the German one-two. Here it is – hoping that such an extraordinary achievement may find its way in many other languages, especially across the Global South

9/11, or “The Owls Are Not What They Seem”

Until COVID-19 showed up on the scene in the Spring of 2020, nearly two decades after the fact, the world remained hostage to 9/11. This was the ultimate geopolitical game-changer that set the tone for the young 21st century. The book you have in your hands asks the ultimate question: why 9/11 matters.

Follow the money. It’s quite fitting that this meticulous investigation is conducted by a gifted, extremely serious financial journalist – and, in an unprecedented way, presents a mass of information previously unavailable in German.

I’ve known Lars Schall, virtually, for years – exchanging correspondence on politics and economics. When we met in person in Berlin in 2015, we finally had time, live, to also indulge in our number one pop culture mutual passion: David Lynch’s Twin Peaks. Lars may be a German incarnation of FBI Special Agent Dale Cooper. Or, better yet, the compassionate version of Albert Rosenfield, the sarcastic pathologist in Twin Peaks.

Take for instance this dialogue from Twin Peaks:

Albert Rosenfield: We sent a portrait of your long-haired man to every agency from NASA to DEA and came up empty. This cat is in nobody’s database. 

 Special Agent Dale Cooper: A man that four of us have seen here in Twin Peaks. 

 Albert Rosenfield: [smiling] Sure. Oh, by the way, you were shot with a Walther PPK. It’s James Bond’s gun, did you know that?

So what you have in your hands is 9/11 dissected by a thoroughly working pathologist, who had “a lot of cutting and pasting to do”. He was aware of myriad red lines from the start, as well as myriad vanishing acts and false non sequiturs. 9/11 may be the ultimate illustration of one of Twin Peaks’ legendary one-liners: “The owls are not what they seem”.

Our pathologist had in fact to disassemble a humongous matryoshka to break it down into smaller dolls. This process had some surprises in store: by following-the-money approach regarding 9/11, for instance, our pathologist was in the end confronted with the case of an anal prolapse at Guantanamo Bay. You don’t believe it? Just wait and read the research.

This journey will take you through hundreds of pages of text and myriads of endnotes, over 2,400 of them, quite a few dealing with many different sources, as well as selected sensitive documents treated by professional translators.

The double volume details the interconnected implications of extremely complex dossiers: the US national energy policy group chaired by former Vice-President Dick Cheney, in secrecy, only four days after the start of the Bush administration; the ramifications of Peak Oil; the interest by the Council on Foreign Relations (CFR) on Middle East oil, especially Iraq; the CIA’s major role in the drug trade business; the Saudi-U.S. alliance related to the protection of al-Qaeda; what happened with the U.S. air defense on 9/11; and last but not least, insider trading on 9/11, especially anomalies in the option and bond markets.

The nearly mythical computer software program PROMIS, created in the 1970s by former NSA analyst Bill Hamilton, plays a sort of Rosebud role in this narrative – complete with a trail of unexplained deaths and disappearing files that renders some of its avatars, especially those containing backdoor eavesdropping capabilities enhanced by artificial intelligence (AI) almost impervious to investigation.

As a matter of fact, Lars had been contacted by Bill Hamilton, who asked him if he could help in relation to the PROMIS affair. It was this request – which took place in the Spring of 2012 after Lars had just published a 9/11-Insider Trading article at Asia Times – that has been the spark which started the investigation you are about to read.

For the German reader, one of the firsts of this sprawling analysis is to take what is considered in the U.S. as a “conspiracy theory” – Mike Ruppert’s seminal 2004 book “Crossing the Rubicon” – and, in Lars’s words, “figure out how far it can be proven correct, more than 15 years after it was published.”

Lars shows in detail how 9/11 enabled a state of emergency, a permanent Continuity of Government (COG) in the U.S. and mass surveillance of U.S. citizens – connecting the dots all the way from missing trillions of dollars in the Pentagon to NSA data mining and leading U.S. neocons. The latter had been praying for a “Pearl Harbor” to reorient US foreign policy since 1997. Their prayers were answered beyond their wildest dreams.

The investigation eventually displays a startling road map: the war on terror as a business model. However, as Lars also shows, in the end, much to the despair of U.S. neocons, all the combined sound and fury of 9/11 and the Global War on Terror, in nearly two decades, ended up bringing about a Russia-China strategic partnership in Eurasia.

It’s fair to ask the author what did he learn as he juggled for years with this immense mass of information. Lars points to the familiarity he acquired with the work of Peter Dale Scott – author, among others of “The Road to 9/11”, and a specialist in the origins of the U.S. Deep State – which is diametrically opposed to the sanitized narrative privileged by the Beltway and U.S. corporate media. Lars presents information by Peter Dale Scott that had never been translated into German before.

Special Agent Lars Cooper / Lars Rosenfield had in effect to kiss goodbye to a career as a journalist, because “I’ll be forever scorned as a ‘conspiracy theorist’,” as he told me. So a stark choice was in play; fearlessness, or a comfortable career as a corporate hack. In the end, Lars chose fearlessness.

In Twin Peaks, Special Agent Dale Cooper has ultimately to confront himself. He knows he’s lost if he tries to run away from his dark self – who is “the dweller on the threshold.” Our Special Agent Lars Cooper definitely did not run away from the dweller on the threshold this time around. He dared to cross to the other side to stare at the abyss. And now he’s back to tell us in a book what it looks like.

Denken wie der Feind – 20 Jahre Ausnahmezustand 9/11 und die Geopolitik des Terrors 

(“Thinking Like the Enemy – 20 Years State of Emergency, 9/11 and the Geopolitics of Terror”), by Lars Schall

Book 1: Das Erdöl, der Dollar und die Drogen

(The Oil, The Dollar and The Drugs)

Via Books on Demand (BOD):

ISBN for the book: 9783753442938. For the e-Book: 9783753414737

Book 2:  Das “Pearl Harbor” des 21. Jahrhunderts (The “Pearl Harbor “ of the 21st Century)

Via Books on Demand (BOD):

ISBN for the book: 9783753460796. For the e-book:  9783753433882

Washington’s Bastille

Washington’s Bastille

January 16, 2021

by Jimmie Moglia for the Saker Blog

Trump’s supporters, having found the vanity of conjecture and inefficacy of expectations, resolved to prove their own existence, if not by violence, at least by physical presence.

They came forth into the crowded capital with an almost juvenile ambition that their numbers would be counted, their voice heard and their presence noticed.

But every upheaval, from Spartacus to the Bastille, is subject to unexpected developments. However peaceful the intents may be, the man involved in a turmoil is forced to act without deliberation, and obliged to choose before he can examine. He is surprised by sudden alterations of the state of things, and changes his measures according to superficial appearances.

Still, the corporate media, whose intestinal refuse is paraded as news, triumphs in every discovery of failure and ignores any evidence of success.

But, revolutionarily speaking, the storming of Washington was a success. And Trump did not expect, inspired or willed the unfortunate deaths.

If and when some reliable evidence will be produced, it will be probably found that parasitic elements, with dubious sponsors and of dubious character, joined the crowd.

This would only surprise the unawareness of the thoughtless. Even in Kiev, the ‘revolutionaries’ included characters who actually shot into the crowd from sundry buildings – as documented, in an intercepted phone call, by a then female president-of-something in the European Union.

Yet, when all is said and done, Washington may prove more eventful than the actual Bastille. For the date of the Bastille’s capture (July 14, 1789), became a French national commemorative event only through a convenient historical post-scriptum.

The punctilious historian may remember that the Bastille, like the Capitol dome in Washington, was visible from all of Paris – a medieval fortress, 100 ft high. At the time of the riot it only held seven prisoners, nor the mob gathered to free them. They wanted the ammunitions stored inside the wall.

When the prison governor refused, the mob charged and killed him. His head was carried round the streets on a spike.

Of the seven liberated prisoners one, a mentally-ill, white-bearded old man was paraded through the streets while he waved at the crowd, four were forgers who disappeared among the rabble, another, also mentally ill, was later re-incarcerated into an asylum. The only nobleman, and potentially an ‘enemy of the people’, was the Count de Soulange, who had been imprisoned at the request of his family for sexual misconduct.

The irony continues. Insensible to its possible historical value, the revolutionaries contracted with an enterprising bourgeois to demolish the tower.

After subduing the revolution Napoleon did not like the suggestive ideological connotations of the Place de la Bastille and thought of building there his ‘Arc de Triomphe’ (the one now in the ‘Etoile’), but that did not prove popular.

Therefore he ordered, instead, to build a huge bronze statue of an imperial elephant. A plaster model, a facsimile of the future finished product was built and inaugurated, but the wars made funding difficult. Waterloo and the Restoration did not help either. The plaster elephant stood in the iconic square from 1814 to 1848 when irreparable decay prompted its demolition.

But I digress.

As for the Washington’s Bastille, the related and subsequent events have openly shown the essentially unlimited power of the swamp, which, Don Quixote-like, Trump said he would attempt to drain.

Most of us know that the UUABLPPTH [Unmentionables Unless Accompanied By Lavish Praise plus their lackeys – hereinafter referred to as the ‘unmentionables’] make up the core of the swamp. I will return to them later, but the massively falsified elections, incontrovertibly show, among other things, how much the unmentionables hate the deplorables – in the instance and probably 60% of the nation.

Generally speaking and under often-recurrent conditions, elections are a rite enabling citizens to believe or continue to pretend that they live in a democracy rather than in an authoritarian regime.

By tradition, the absolute obedience of the population to absurd and incoherent decrees (“Patriot Act” et als.) has repeatedly reassured the masters that whatever they impose, the deplorables will accept.

For example, the Vietnam war protesters of old, plus peace-loving, cultural-marxists and amphetamines-laden youths met with policemen and waved flowers under their nose as an act of rebellion. But the war only ended seven years later. Meanwhile the richer and/or well-heeled dodged the draft, while the poorer didn’t. Besides, that ‘flower-inspired’ rebellion was not aimed at ending the war (or the war would have ended), but at turning upside down universally accepted ethics, and with ethics, perhaps unbeknown to them, the world as we know it.

Nevertheless I don’t think we should single out Americans for blame. Already in 1552, the young Frenchman Etienne de la Boetie wrote his “The Discourse of Voluntary Servitude” to address the central problem of political philosophy, namely the mystery of civil obedience.

Why do people, asked Etienne, in all times and all places obey the commands of the government, which always constitutes a small minority of the society? To him the spectacle of general consent to despotism (or in the recent American case, to fraud) is puzzling and appalling. “All this havoc – says he – descends upon you not from alien foes, but from the one enemy whom you yourself render as powerful as he is, for whom you go bravely to war, for whose greatness you do not refuse to offer your own bodies unto death. He who thus domineers over you has only two eyes, only two hands, only one body, no more than is possessed by the least man among the infinite numbers dwelling in our cities. He has indeed nothing more than the power that you confer upon him to destroy you. Where has he acquired enough eyes to spy upon you, if you do not provide them yourselves?”

Good question, we may say, but the problem remains. It is understandable in general, but only confusedly answerable in detail, due to the infinite intricacies of our individual lives. Therefore, a blanket indictment of the deplorables for letting themselves be driven by the unmentionables is theoretically logical but practically unjustified.

Still, during the Washington’s Bastille and for the first time that I recall, the unmentionables felt some concern for their ass. It is tragic that some of the revolutionaries died, because, as we know, the intent of the rally was peaceful and nothing compared to what was witnessed throughout America in 2020.
The lackeys’ official horror and concern for ‘democracy’ show that there is no vice so simple but assumes some mark of virtue on its outward parts. All that wringing of arms and shows of deprecation are falser than oaths made in wine. For none of the Capitoline lords would answer why they didn’t want to recount the votes. Leading the average deplorable to conclude that there is no more faith in them (as a lot) than in a stewed prune. For their intoxication with themselves will give no way to reason.

Equally, the Washington’s Bastille brought to the attention of many how much the Constitution has sunk under the feet of the unmentionables. Here is but one example – not to repeat what the readers already know, but to show the arrogance associated with the systems of censure the country is subjected to.

After the death of Ms. Ashly Babbit, shot by a policeman, an Internet friend of mine published the following post on his FB account, along with her picture.

“This is Ashly Babbitt. She was shot and killed by law enforcement during a protest in America. No one will take the knee for her. There will be no murals in her honor. The media will not mourn her death. She is white therefore her life does not matter for the establishment.”

FB returned this message,

“Your account has been restricted for 30 days because your post did not follow community standards.”

To comment on FB’s response the author said, “Mourning the death of this woman on Facebook is banned. Yet we have spent many months mourning the death of a drug addict, a criminal, an abuser, a man who broke into a woman’s home and put a gun to her stomach in order to extort money out of her. We have been paying our respect to this man all over the world for the best part of last year. And this woman who proudly served her country, she is now dead and you cannot even pay your respects to her own social media.”

The restraint and politeness of the censored statement are beyond question. And its censuring should make us pause. For it shows the scorn of the enemy for the rest of us. A scorn that should include the concurrent barrage of nauseating platitudes and the unrestrained bubbling to the surface of a diabolical hatred, no-longer disguised but steeped deep in history.

The Internet is yesterday’s telephone and Zion did not invent the Internet, nor computers, computing and communication software. Yet, the communication engines and components, companies and operations, Google, Twitter, Facebook and Youtube are owned and controlled by the unmentionables.

From his soul in hell, Coudenhove-Kalergi must be laughing his head off. His predicted new world, made up of ancient-Egyptians-looking deplorables lorded over by the unmentionables, cannot any longer be branded as a conspiracy theory. Under our own eyes there is the shape of things to come at large.

For he who controls speech controls opinion. Opinion molds thought and thought drives action. Therefore monopoly of opinion leads to control of action, and action includes just about every aspect of life and liberty.

Besides, free speech is ultimately vital to being human. It is the most important aspect of everything we refer to as freedom. Lack of freedom is the triumph of tyranny. And the train of tyranny drags in tow injustice, repression, murder, corruption, unjust and unnecessary wars.

Even earlier and more primitive media, newspapers and radio, controlled by a few, were the engines of persuasion and coercion to drive millions into quasi-genocidal world wars.

As an aside and in this respect, Germans owe a debt of historical gratitude to the Soviet Union. For it was fear of the Soviets that prevented the implementation of the “Morgentau Plan”, already signed by Roosevelt and Churchill, to be carried out after the end of WW2 – a plan that included the sterilization of all Germans. Disbelievers may wish to consult the details of the plan, as well as the book, “Germany Must Perish” printed in the US during the war.

Restricting free speech is necessary in every war and every tyranny. And we can identify tyranny by how much freedom of speech we have and by how much we can criticize the rulers. For reason and truth can outweigh lies and corruption. But massive suppression and an avalanche of lies and propaganda can make a mockery of factual truth and stuff the ears of men with false reports. Many, sick of show and weary of noise, turn off the set, how many we know not.

In this respect, technology and the power of global corporations to corrupt the minds have never been more powerful and ominous, in all history.

Furthermore, media of all types can now control feelings as well as the more primitive emotional parts of the brain. Never has government been bigger and more able to repress freedom with an infrastructure that includes the FBI, CIA, NSA and their counterparts in individual states and nations.

Never past tyrants better controlled their subjects than the globalists today. The threat to the freedom of the western peoples of the world is the greatest threat to their existence. Suppression of freedom of speech is exampled in the attitude of a controlled media, which is totally against the common feelings of the majority.

Most peoples of the world and nations want to preserve their nationality, country, customs, habits, religion and way of life. None of the corporate channels reflect these beliefs and objectives.

The axis of movies, Zionist Hollywood, ever since the abolition of the “Motion Pictures Production Code” act (1954), has been an extremely powerful engine of persuasion and shaper of belief, custom, habits and action, as well as an inculcator of hatred, let alone depravity. For reference read this article [ https://www.theoccidentalobserver.net/2021/01/14/the-jewish-role-in-promoting-cannabis-and-why-its-bad-for-you/ ]

The sum of these forces led to the US summer of 2020. Which was not a summer of discontent, but an extended season of Hollywood and media-inspired hatred. And mass hatred, as opposed to individual hatred, is an organized phenomenon.

The current biggest shapers of thought and human action are the networks of social media, primary tools for sharing ideas and learning things.

Owning and controlling these organizations are a few people, whose ethnic affiliation is undisputed and unmentionable. They can decide what the world can see, say, hear and consequently think.

Dismissing the reality and the consequences of this ideological monopoly as a ‘conspiracy theory’ is an insult to the minds of millions.

The conspiratorial element of a theory depends on identifiable circumstances and hypotheses. Even historically sanctified characters such as president Franklin Roosevelt stated as follows,

“In politics, nothing happens by accident. If it happens, you can bet it was planned that way…” The point is that many of the major world events that shape our destinies occur because there is a plan behind them.”

In the same line of thought, if we were merely dealing with the law of averages, half of the events affecting a nation’s well-being should be good for that nation. If it were just a matter of incompetence, the leaders should occasionally make a mistake in favor of the deplorables. Instead it is planning and foresight that form the shape of things to come at large.

Not that chance is necessarily ruled out. According to his biographers, even Hitler firmly believed in grasping at fleeting opportunities. In a speech or lecture to his adjutants given in 1938 he said, “There is but one moment when the goddess of fortune wafts by, and if you don’t grab her then by the hem you won’t to get a second chance.”

The quote came to mind in thinking about the disparagers who have compared Trump with Hitler. Stupidity is sometimes invincible but, probably unbeknown to his detractors, Trump as a president, shared some characteristics associated with leaders who reach power outside the canonical paths – canonical paths that often include corruption, opportunistic servitude and/or crime.

For one, by all appearances Trump had far less authority on his advisers and subordinates than what we think a president has – an authority that seemingly weakened with each passing year. Also, a characteristic of heads of state who over-rely on advisers is a conscious desire ‘not to know.’ Even if they are later deemed directly responsible for what happened.

It is total speculation but the assassination of the Iranian General Suleimani may be one such instance. Though in other cases the reverse is true. The opening towards Kim Yong Sun of North Korea fits with Trump’s general style.

On the other hand, the policy towards Venezuela, though justified imperialistically, does not fit the profile. The ‘self-proclaimed’ Guaido’ is a puppet worthy of a Simpsons cartoon. Based on what I know of the country (readers may also consult my article “Don’t Cry for Me Venezuela”), the regime is anything but what described by the unmentionable media. The tight economic sanctions, the equivalent of a war, the arbitrary freezing of Venezuela’s gold reserves in London, the theft of CITGO, (the Venezuelan oil company operating in the US), the placing a bounty of 15 million $ on the head of Maduro, the many failed coups d’etat – quite open in planning and gross in execution – do not seem consistent with Trump’s character, at least as displayed in his general demeanor and other occasions.

Incidentally, the two ‘ambassadors’ of the Guaido’ puppet, in the US and Britain, are unmentionables. And there is an extant recording of the UK ‘ambassador’ Newman where she discusses assigning the Esequibo mineral-rich area – disputed between Venezuela with Guyana since the early 1800 – to an Exxon consortium of sorts.

Besides, in my view and independently of ideological convictions, in oratory, consistence, intelligence and demeanor Maduro towers over all former and latter members of the Trump administration put together. A remarkable achievement, I think, for someone who started as a bus driver and union leader to become the president of Venezuela. And although I cannot, of course, verify its accuracy, there is information among some Venezuelan sources that Trump expressed a secret admiration for Maduro.

To conclude, most records of history are but narratives of successive villainies, treasons and usurpations, massacres and wars – of which professional historians explain causes and effects.

As a non professional historian but a rude mechanical who earns his bread upon the Athenian walls I offer here an extremely arbitrary theory. On the ground that, just as a right line describes the shortest passage from point to point, a plausible historical explanation is that which connects distant truths by the shortest of intermediate propositions.

Therefore I select few key events – constituting an arbitrary beginning and its connecting causal links to the present. In the instance, fractional banking, 1968, Reagan and the Washington Bastille.

Fractional banking is a generally familiar idea whose implications, I think, are not sufficiently realized due to the apparently neutral effect of the term ‘fractional’. Risking the contempt of professionals and economists I will reduce the notion to its core with an example.

A bank that owns, says, 10 k$ in gold can loan out 100 k$ in money that does not exist – at say, 10% yearly interest.

After one year, globally, the borrowers return 110 k$ to the bank, (loans plus interest). Of the globally returned 110 k$, 100k$ are the money that did not exist, but the 10 k$ paid as interest correspond to the labor expended by the borrowers.

Let’s for a moment overlook where the borrowers got the additional 10k$ from, because for the purpose of this demonstration, the point is not important.

The bottom line is that with an investment of 10 kS of actual money (gold for example) the banker realizes an interest of a real 10k$ or 100%. Now with 20 k$ of actual money he can lend out 200k$ of non-existing money and so on.

It follows that the bank’s wealth increases exponentially. Consequently, sooner or later, the bank or banking system will essentially own and control – directly and indirectly – everything that has a demonstrable commercial value.

Fractional banking became the operating system of the first modern capitalism only at the end of the 17th century, with the establishment of the Bank of England. Which, unknown to many, was a private bank that lent money to the crown for conducting business and waging wars. Money paid back from the taxes on citizens.

The system is so brilliant in its simplicity that we must wonder why was it not applied centuries before.

And here we meet again with the unmentionables. Christianity, as well as Islam for that matter, considered interest usury and usury a sin.

The philosophical tricks by which Christian rulers tried to skirt the issue are ingenious and often amusing. Suffice to say, with a gross generalization, that it was found more expedient to let the unmentionables handle the matter. From thereon begin their path to unstoppable power.

As for 1968 – the second selected event – there took place a brilliant ideological operation, and again I generalize for simplicity. For the 1968 ‘revolution’ launched the ideology aimed at the deconstruction and destruction of the family, customs, traditions and gender distinctions. Destruction leading eventually to the assault on nationalities and ethnicities.

That destruction is in progress. I suspect without proof that the unmentionables’ hatred for Trump stems from his effort, however feeble, to mount an opposition. Opposition to a new world order where humans become merchantable individual atoms, drifting on the smooth world plane of exchangeable merchandise.

As for Reagan, with his background as a Coca-Cola cowboy, he was the perfect president for cutting the taxes of the rich, under the now all-but-forgotten theory of ‘trickle-down economics.’ Perhaps a thinly-disguised reference to the parable of the rich Epulon, from whose table fell the crumbs for the starving deplorables of the time.
From then on and on a planetary scale the already exorbitant assets of the overclass, began to increase immeasurably. And deregulation triggered a race to the concentration of capital and activities. Resulting in the stratospheric wealth of the few, with which they can buy everybody and everything, and become a dominant power over the traditional states, as even the events of the last few weeks unquestionably prove.

Remember Reagan’s, “The state is not the solution of problems, the state is the problem”. And now the state, the law and even health (e.g. Covid) are turning into a mockery of themselves.

In the end and in my view, the Washington’s Bastille was but the externation of long repressed and related feelings of helplessness.

To those who cannot but feel nauseated by the means used to impose the current presidential ticket on the rest of us, I will quote the answer, attributed to the wife of a Turkish diplomat at the court of King Lois XV. A courtier was asking her what happiness consisted in. “My lord – she replied – our happiness depends on the circulation of the blood.” [… ma foi, Monsieur, notre bonheur depend de la facon que notre sang circule.]

The others may reflect that, after all, man is little more than an instrument in an orchestra directed by the muse of history.

Kim No-VAX does DARPA

Kim No-VAX does DARPA

December 20, 2020

A Back to the Future exercise: time-traveling to survey the sci-tech scene in the mid-1980s

by Pepe Escobar with permission and first posted at Asia Times

HAL9000_I’m_Sorry_Dave, Motivational Poster. Wikimedia Commons

I have been going through my Asia Times archives selecting reports and columns for a new e-book on the Forever Wars – Afghanistan and Iraq. But then, out of the blue, I found this palimpsest, originally published by Asia Times in February 2014. It happened to be a Back to the Future exercise – traveling in time to survey the scene in the mid-1980s across Silicon Valley, MIT’s AI lab, DARPA and the NSA, weaving an intersection of themes, and a fabulous cast of characters, which prefigure the Brave New Techno World we’re now immersed in, especially concerning the role of artificial intelligence. So this might be read today as a sort of preamble, or a background companion piece, to No Escape from our Techno-Feudal World, published early this month. Incidentally, everything that takes place in this account was happening 18 years before the end of the Pentagon’s LifeLog project, run by DARPA, and the simultaneous launch of Facebook. Enjoy the time travel.

In the spring of 1986, Back to the Future, the Michael J Fox blockbuster featuring a time-traveling DeLorean car, was less than a year old. The Apple Macintosh, launched via a single, iconic ad directed by Ridley (Blade Runner) Scott, was less than two years old. Ronald Reagan, immortalized by Gore Vidal as “the acting president,” was hailing the mujahideen in Afghanistan as “freedom fighters.”

The world was mired in Cyber Cold War mode; the talk was all about electronic counter-measures, with American C3s (command, control, communications) programmed to destroy Soviet C3s, and both the US and the USSR under MAD (mutually assured destruction) nuclear policies being able to destroy the earth 100 times over. Edward Snowden was not yet a three-year-old.

It was in this context that I set out to do a special report for a now-defunct magazine about artificial intelligence (AI), roving from the Computer Museum in Boston to Apple in Cupertino and Pixar in San Rafael, and then to the campuses of Stanford, Berkeley and MIT.

AI had been “inaugurated” in 1956 by Stanford’s John McCarthy and Marvin Minsky, a future MIT professor who at the time had been a student at Harvard. The basic idea, according to Minsky, was that any intelligence trait could be described so precisely that a machine could be created to simulate it.

My trip inevitably involved meeting a fabulous cast of characters. At MIT’s AI lab, there was Minsky and also an inveterate iconoclast, Joseph Weizenbaum, who had coined the term “artificial intelligentsia” and believed computers could never “think” just like a human being.

Joseph Weizenbaum. Source: Chatbots

At Stanford, there was Edward Feigenbaum, absolutely paranoid about Japanese scientific progress; he believed that if the Japanese developed a fifth-generation computer, based on artificial intelligence, that could think, reason and speak even such a difficult language as Japanese “the US will be able to bill itself as the first great post-industrial agrarian society.”

And at Berkeley, still under the flame of hippie utopian populism, I found Robert Wilensky – Brooklyn accent, Yale gloss, California overtones; and philosopher Hubert Dreyfus, a tireless enemy of AI who got his kicks delivering lectures such as “Conventional AI as a Paradigm of Degenerated Research.”

Meet Kim No-VAX

Soon I was deep into Minsky’s “frames” – a basic concept to organize every subsequent AI program – and the Chomsky paradigm: the notion that language is at the root of knowledge, and that formal syntax is at the root of language. That was the Bible of cognitive science at MIT.

Marvin Minsky at MIT Lab. Photo: Massachusetts Institute of Technology

At the MIT cafeteria, Minsky delivered a futurist rap without in the least resembling Dr Emmett Brown in Back to the Future:

I believe that in less than five centuries we will be producing machines very similar to us, representing our thoughts and point of view. If we can build a miniaturized human brain weighing, let’s say, one gram, we can lodge it in a spaceship and make it travel at the speed of light. It would be very hard to build a spaceship to carry an astronaut and all his food for 10,000 years of travel …

With Professor Feigenbaum, in Stanford’s philosophical garden, the only space available was for the coming yellow apocalypse. But then one day I crossed Berkeley’s post-hippie Rubicon and opened the door of the fourth floor of Evans Hall, where I met none other than Kim No-VAX.

No, that was not the Hitchcock blonde and Vertigo icon; it was an altered hardware computer (No-VAX because it had moved beyond Digital Equpment Corporation’s VAX line of supercomputers), financed by the mellifluously acronymed Pentagon military agency DARPA, decorated with a photo of Kim Novak and humming with the sexy vibration of – at the time immense – 2,900 megabytes of electronic data spread over its body.

The US government’s Defense Advanced Research Projects Agency – or DARPA – was all about computer science. In the mid-1980s, DARPA was immersed in a very ambitious program linking microelectronics, computer architecture and AI way beyond a mere military program. That was comparable to the Japanese fifth generation computer program. At MIT, the overwhelming majority of scientists were huge DARPA cheerleaders, stressing how the agency was leading research. Yet Terry Winograd, a computer science professor at Stanford, warned that had DARPA been a civilian agency, “I believe we would have made much more progress”.

It was up to Professor Dreyfus to provide the voice of reason amidst so much cyber-euphoria: “Computers cannot think like human beings because there’s no way to represent all retrospective knowledge of an average human life – that is, ‘common sense’ – in a form that a computer may apprehend.” Dreyfus’s drift was that with the boom of computer science, philosophy was dead – and he was a philosopher: “Heidegger said that philosophy ended because it reached its apex in technology. Philosophy in fact reached its limit with AI. They, the scientists, inherited our questions. What is the mind? Now they have to answer for it. Philosophy is over.”

Hubert Dreyfus. Source: Berkeley Campus News

Yet Dreyfus was still teaching. Likewise at MIT, Weizenbaum was condemning AI as a racket for “lunatics and psychopaths” – but still continued to work at the AI lab.

NSA’s wet web dream

In no time, helped by these brilliant minds, I figured out that the AI “secret” would be a military affair, and that meant the National Security Agency – already in the mid-1980s vaguely known as “no such agency,” with double the CIA’s annual budget to pay for snooping on the whole planet. The mission back then was to penetrate and monitor the global electronic net – that was years before all the hype over the “information highway” – and at the same time reassure the Pentagon over the inviolability of its lines of communication. For those comrades – remember, the Cold War, even with Gorbachev in power in the USSR, was still on – AI was a gift from God (beating Pope Francis by almost three decades).

So what was the Pentagon/NSA up to, at the height of the star wars hype, and over a decade and a half before the revolution in military affairs and the full spectrum dominance doctrine?

They already wanted to control their ships and planes and heavy weapons with their voices, not their hands; voice command a la Hal, the star computer in Stanley Kubrick’s 2001: A Space Odyssey. Still, that was a faraway dream. Minsky believed that “only in the next century” would we be able to talk to a computer. Others believed that would never happen. Anyway, IBM was already working on a system accepting dictation; and MIT on another system that identified words spoken by different people; while Intel was developing a special chip for all this.

Although, predictably, prevented from visiting the NSA, I soon learned that the Pentagon was expecting to possess “intelligent” computing systems by the 1990s; Hollywood, after all, already had unleashed the Terminator series. It was up to Professor Wilensky, in Berkeley, to sound the alarm bells:

Human beings don’t have the appropriate engineering for the society they developed. Over a million years of evolution, the instinct of getting together in small communities, belligerent and compact, turned out to be correct. But then, in the 20th century, man ceased to adapt. Technology overtook evolution. The brain of an ancestral creature, like a rat, which sees provocation in the face of every stranger, is the brain that now controls the earth’s destiny.

It was as if Wilensky was describing the NSA as it would be 28 years later. Some questions still remain unanswered; for instance, if our race does not fit anymore the society it built, who’d guarantee that its machines are properly engineered? Who’d guarantee that intelligent machines act in our interest?

What was already clear by then was that “intelligent” computers would not end a global arms race. And it would be a long time, up to the Snowden revelations in 2013, for most of the planet to have a clearer idea of how the NSA orchestrates the Orwellian-Panopticon complex. As for my back to the future trip, in the end I did not manage to uncover the “secret” of AI. But I’ll always remain very fond of Kim No-VAX.

Who’s World Order??

Who’s World Order??
Matthew Ehret is the Editor-in-Chief of the Canadian Patriot Review , Senior Fellow at the American University in Moscow, BRI Expert on Tactical talk, and has authored 3 volumes of ‘Untold History of Canada’ book series. In 2019 he co-founded the Montreal-based Rising Tide Foundation. He can be reached at matt.ehret@tutamail.com

November 16, 2020

By Matthew Ehret for the Saker Blog

In his Foreign Policy article of April 2020, Biden states that he will reverse Trump’s embarrassing foreign policy record by standing up to both China, Russia and other totalitarian nations which represent the three-fold plague of “authoritarianism, nationalism and illiberalism” and “once more have America lead the world”.

Biden went further promising to undo the harm Trump has done to NATO by re-enforcing the military body, extending its influence to the Pacific (which sounds a lot like the Esper/Pompeo doctrine for the Pacific), and even demanded that NATO go harder on Russia stating that “the Kremlin fears a strong NATO, the most effective political military alliance in modern history.”

Considering Biden’s nearly 45 year political record supporting every military intervention in American history, opposing de-segregation, eulogizing pro-KKK Senator Strom Thurmond, passing bills that incarcerated petty drug dealers for life on behalf of the cheap labor prison industrial complex and supported the rampant growth of both Wall Street, Big Pharma and the Big Tech run surveillance state, we should think twice before celebrating this man’s possible entry into the halls of the highest office in the USA.

Biden’s call for renewing the NATO alliance in opposition to Russia and China, his support for reversing Trump’s calls for military reduction in the Middle East and his support for extending NATO in the Pacific mixed with his lifelong track record, forces us to ask if Glen Greenwald was right when he quit the Intercept on November 1 saying:

“If Biden wins, that’s going to be the power structure: A democratic party fully united with neocons, Bush/Cheney operatives, CIA/FBI/NSA Wall Street and Silicon Valley: presenting itself as the only protection against fascism. And much of the left will continue marching behind it.”

As it turns out, Greenwald’s warning was absolutely on point, as the entire intelligence apparatus, Big Tech and mainstream media complex which worked desperately to oust President Trump for 4 years and is currently running a vast voting fraud operation as this is written has given its full backing to the narrative of “an inevitable of a Biden presidency”.

In a Nov. 11 article from Antiwar.com entitled Biden’s Pentagon Transition Team Members Funded by the Arms Industry, journalist Dave DeCamp demonstrates that of the 23 members of Biden’s Pentagon Transition Team, over one third are directly tied to NATO and the Military Industrial Complex.

As facts continue to emerge of the corrupt deep state structure which totally dominates the geriatric hologram known as Joe Biden, it has become obvious that even the few positive remarks Biden made in support of renewing the START treaty with Russia carry little weight.

Ignoring the very real danger of a new civil war due to the fact that either result will be denied its legitimacy by half of the nation, the question must be asked: If Trump is replaced by a Biden Presidency on January 20th, then what will be the effects both on world stability and US-Russia-China relations?

It is good that Biden supports START’s renewal, but an increasing majority of the nations are opting for a multipolar alliance premised on the defense of national sovereignty, the right to use protectionism, and the construction of large scale megaprojects such as the New Silk Road, Polar Silk Road, advanced space exploration and North South Transportation Corridor.

The very protectionist measures which allowed the USA (and every nation of the world for that matter) to build up their industrial base and economic sovereignty are attacked directly by Biden who demands the “taking down of trade barriers and resisting dangerous global slide toward protectionism” (which he goes so far as to assert without evidence “caused the great depression” and “lead to World War II”).

Attacking Trump for being soft on China’s imperial Belt and Road Initiative which Biden states is only an “outsourcer of pollution to other countries by financing billions of dollars worth of dirty fossil fuel energy projects”, Biden then asks: “who writes the rules that govern trade?” and answers: “the United States, not China, should be leading that effort.”

Beyond carbon reduction plans, and information technology investments (AI, 5G, Quantum Computing), there is very little in Biden’s “development outlook” that brings the USA into harmony with this multipolar consensus. His program to support cutting America’s carbon emissions to net zero by 2050 as outlined by the Green New Deal and Great Reset crowd at Davos might appear on the surface to be pro-infrastructure, professing to “create 10 million good new jobs”, but the reality on further inspection is very different.

The sorts of large scale BRI-oriented development projects now transforming more than half of the world which is increasingly operating under a completely different non-US dominated banking paradigm, are based on capital intensive heavy industry, the use of fossil fuels and also nuclear power.

Without these energy sources, then the New Silk Road and its’ sister projects could never work (much like Modi’s anti-BRI OSOWOG doppelganger has proven a total failure both scientifically and economically).

The sort of “green energy revolution” which the Davos technocrats running Biden want to impose onto the world might create short term jobs, but once the solar panels and windmills are built, the quality of energy available to nations stupid enough to walk into this cage will forever suffocate their capacity to sustain their populations and growth potential. In short, it is a green mirage obscuring a very ugly design.

In opposition to this depopulation agenda, Trump’s tendency support for space exploration, reviving protectionism to rebuild America’s lost manufacturing and his supporting large scale infrastructure programs in resolving conflict abroad (including his support for building rail in the Arctic, rail in Serbia and Kosovo, nuclear power in South Africa and Poland etc) is certainly synergistic with the multipolar system led by Russia and China and undeniably brings the USA into harmony with its own better traditions.

Additionally, Trump’s defunding of color revolutionary “civil society” groups in Hong Kong and Belarus won him many enemies from both sides of the pro-Soros isle while supporting the concept of national sovereignty which were major steps towards stability and trust-building with nations of the world who demand their sovereignty be respected as outlined in the UN Charter itself.

Compare this with Biden’s statement that we must “stand with Russian civil society which has bravely stood up time and again against President Vladimir Putin’s kleptocratic authoritarian system” and Biden’s call to host “a global summit for democracy” featuring “civil society organizations from around the world that stand on the frontlines of democracy” including “the private sector, technology companies and social media giants.”

These are the same “Big tech, and media giants” that have given their full backing to the imposition of Biden into the Presidency which have also been used to overthrow nationally elected governments in color revolutionary regime change operations for decades. These the same networks that have suppressed all evidence of systemic vote fraud in the American elections of 2020 and are stoking the fires of a potential new civil war and regime change inside the republic itself.

Whatever the case may be, the coming weeks and months will feature fierce battles that will shape the outcome of world history.

First Comes A Rolling Civil War

November 09, 2020

First Comes A Rolling Civil War

By Pepe Escobar posted with permission and first posted at Asia Times

The massive psyops is ongoing. Everyone familiar with the Transition Integrity Project (TIP) knew how this would imperatively play out. I chose to frame it as a think tank gaming exercise in my Banana Follies column. This is a live exercise. Yet no one knows exactly how it will end.

US intel is very much aware of well-documented instances of election fraud. Among them: NSA software that infiltrates any network, as previously detailed by Edward Snowden, and capable of altering vote counts; the Hammer supercomputer and its Scorecard app that hacks computers at the transfer points of state election computer systems and outside third party election data vaults; the Dominion software system, known to have serious security issues since 2000, but still used in 30 states, including every swing state; those by now famous vertical jumps to Biden in both Michigan and Wisconsin at 4am on November 4 (AFP unconvincingly tried to debunk Wisconsin and didn’t even try with Michigan); multiple instances of Dead Men Do Vote.

The key actor is the Deep State, which decides what happens next. They have weighed the pros and cons of placing as candidate a senile, stage 2 dementia, neocon warmonger and possible extorsionist (along with son) as “leader of the free world”, campaigning from a basement, incapable of filling a parking lot in his rallies, and seconded by someone with so little support in the Dem primaries that she was the first to drop out.

The optics, especially seen from vast swathes of the imperial-interfered Global South, may be somewhat terrible. Dodgy elections are a prerogative of Bolivia and Belarus. Yet only the Empire is able to legitimize a dodgy election – especially in its own backyard.

Welcome to the New Resistance

The GOP is in a very comfortable position. They hold the Senate and may end up picking up as may as 12 seats in the House. They also know that any attempt by Biden-Harris to legislate via Executive Orders will have…consequences.

The Fox News/ New York Post angle is particularly enticing. Why are they suddenly supporting Biden? Way beyond internal family squabbles worthy of the Succession saga, Rupert Murdoch made it very clear, via the laptop from hell caper, that he has all sorts of kompromat on the Biden family. So they will do whatever he wants. Murdoch does not need Trump anymore.

Nor, in theory, does the GOP. Former CIA insiders assure of serious backroom shenanigans going on between GOP honchos and the Biden-Harris gang. Trade-offs bypassing Trump – which most of the GOP hates with a vengeance. The most important man in Washington will be in fact GOP Senate majority leader Mitch McConnell.

Still, to clear any lingering doubts, a vote recount would be absolutely necessary in all 6 contested states – WI, MI, PA, GA, NV and AZ. Through hand counting. One by one. The DoJ would need to act on it, immediately. Not gonna happen. Recounts cost a ton of money. There’s no evidence Team Trump – on top of it short of funds and manpower – will be able to convince Daddy Bush asset William Barr to go for it.

While relentlessly demonizing Trump for spreading “a torrent of misinformation” and “trying to undermine the legitimacy of the US election”, mainstream media and Big Tech have declared a winner – a classic case of pre-programming the sheep multitudes.

Yet what really matters is the letter of the law. State legislatures decide whose electors go to the Electoral College to appoint the President.

Here it is – Article II, Section 1, Clause 2: Each state shall appoint electors “in such Manner as the Legislature Thereof May Direct.”

So this has nothing to do with governors, not to mention the media. It’s up to GOP state legislatures to act accordingly. The drama may roll out for weeks. The first step of the Electoral College procedure takes place on December 14. The final determination will only happen in early January.

Meanwhile, talk of a New Resistance is spreading like wildfire.

Trumpism, with 71 million + votes, is firmly established as a mass movement. No one in the GOP commands this kind of popular appeal. By sidelining Trumpism, the GOP may be committing seppuku.

So what will Deplorables do?

The always indispensable Alastair Crooke hits the nail on the head in a powerful essay: Trump is the President of Red America. And depending on how the scripted (s)election tragicomedy develops next, the Deplorables are bound to become The Ungovernables.

Crooke references a crucial parallel evoked by historian Mike Vlahos, who shows how the current American saga mirrors Ancient Rome in the last century of the Republic, pitting the Roman elite against the Populares – which today are represented by Red (Trumpist) America:

“This was a new world, in which the great landowners, with their latifundia [the slave-land source of wealth], who had been the ‘Big Men’ leading the various factions in the civil wars, became the senatorial archons that dominated Roman life for the next five centuries — while the People, the Populares, were ground into a passive — not helpless — but generally dependent and non-participating element of Roman governance: This sapped away at the creative life of Rome, and eventually led to its coming apart.”

So as much as the Dem machine had wanted it, Trump is not yet Imperator Caesar Augustus, whom the Greeks called Autokrator (autocrat), but was a de facto monarch. The American Augustus, Tiberius and most of all Caligula is still further on down the road. He will definitely be a benign, humanitarian imperialist.

In the meantime, what will imperial Big Capital do?

The West, and especially the American Rome, is on the edge of a double precipice: the worst economic depression ever, coupled with imminent, myriad, uncontrollable explosions of social rage.

So the Deep State is reasoning that with Biden – or, sooner rather than later, Supreme shakti and Commander-in-Chief Maa Durga Kamala – the path gets smoother towards the Davos Great Reset. After all, to reset the chess pieces, first the chessboard must be knocked over. This will be one step beyond Dark Winter – which not accidentally was evoked by teleprompter-reading Biden himself on the final presidential debate. The script gets ominously closer to the Rockefelller Foundation’s 2010 Lock Step.

Meanwhile, Plan B is kept in ready, steady, go mode: the lineaments of a global rampage, focused on “malign” Russia’s sphere of influence to satisfy a “revived” NATO and the military-industrial complex, which selected the now media-appointed President-Elect in the first place because he’s no more than a pliant cardboard figure.

Why the FBI and CIA Are the Real Threats to “National Security”

‘My name is Nancy Pelosi, and I’m currently holding on’

October 19, 2020

By Cynthia Chung for the Saker Blog

Today we see the continuation of the over seven decade’s long ruse, the targeting of individuals as Russian agents without any basis, in order to remove them from the political arena. The present effort to declassify the Russiagate papers and exonerate Michael Flynn, so that he may freely speak of the intelligence he knows, is not a threat to national security, it is a threat to those who have committed treason against their country.

On Oct. 6th, 2020, President Trump ordered the declassification of the Russia Probe documents along with the classified documents on the findings concerning the Hillary Clinton emails. The release of these documents threatens to expose the entrapment of the Trump campaign by the Clinton campaign with help of the US intelligence agencies.

The Director of National Intelligence John Ratcliffe released some of these documents recently, including former CIA Director John Brennan’s handwritten notes for a meeting with former President Obama, the notes revealing that Hillary Clinton approved a plan to “vilify Donald Trump by stirring up scandal claiming interference by the Russian security service.”

Trey Gowdy, who was Chair of the House Oversight Committee from June 13th, 2017 – Jan. 3rd, 2019, has stated in an interview on Oct. 7th, 2020 that he has never seen these documents. Devin Nunes, who was Chair of the House Intelligence Committee from Jan. 3rd, 2015 – Jan. 3rd, 2019, has also said in a recent interview that he has never seen these documents.

And yet, both the FBI and CIA were aware and had access to these documents and sat on them for four years, withholding their release from several government-led investigations that were looking into the Russiagate scandal and who were requesting relevant material that was in the possession of both intelligence bureaus.

Do these intelligence bureaus sound like they are working for the “national security” of the American people?

The CIA’s Long Battle against “Soviet propaganda”

In order to combat the “threat” of Soviet “propaganda” entering the U.S. and seducing Americans, Operation Mockingbird was created as a form of “control” over information dissemination during the period of McCarthyism. Operation Mockingbird was an “alleged” CIA program that was started in the early 1950s in order to control the narrative of the news. Though this role has never been confirmed entirely, in the CIA Family Jewels report compiled in the mid-1970s, it is confirmed that Project Mockingbird did exist as a CIA operation and that it was guilty of wire-tapping journalists in Washington.

At the helm of this project was none other than CIA Director Allen Dulles, an enemy of JFK, who by the early 1950s “allegedly” oversaw the media network and had major influence over 25 newspapers and wire agencies. Its function was to have the CIA write reports that would be used by a network of cooperating “credible” reporters. By these “credible” reporters spreading the CIA dictated narrative, it would be parroted by unwitting reporters (mockingbirds) and a successful echo chamber would be created across the world.

The Office of Policy Coordination (OPC), originally named Office of Special Projects but that was thought too conspicuous, was a covert operation wing of the CIA and was created by the United States National Security Council (NSC). For those who are unfamiliar with the origins of the NSC and its close relationship with the CIA, who was born on the same day, refer to my paper on the subject.

According to Deborah Davis’ biography of Katherine Graham (the owner of Washington Post), the OPC created Operation Mockingbird in response to addressing Soviet propaganda and included as part of its CIA contingency respected members from Washington Post, The New York Times, Newsweek, CBS and others.

The Family Jewels report was an investigation made by the CIA to investigate…the CIA, spurred in response to the Watergate Scandal and the CIA’s unconstitutional role in the whole affair. The investigation of the CIA would include any other actions that were deemed illegal or inappropriate spanning from the 1950s-mid 1970s.

We are told “most” of the report was declassified on June 25, 2007 (30 years later) hoping that people would have lost interest in the whole brouhaha. Along with the release of the redacted report was included a six-page summary with the following introduction:

The Central Intelligence Agency violated its charter for 25 years until revelations of illegal wiretapping, domestic surveillance, assassination plots, and human experimentation led to official investigations and reforms in the 1970s.” [emphasis added]

The most extensive investigation of the CIA relations with news media was conducted by the Church Committee, a U.S. Senate select committee in 1975 that investigated the abuses committed by the CIA, NSA, FBI, and IRS. The Church Committee report confirmed abundant CIA ties in both foreign and domestic news media.

It is very useful that there exists an official recognition that false news was not only being encouraged by the CIA under the overseeing of the NSC during the Cold War period, but that the CIA was complicit in actually detailing the specific narrative that they wanted disseminated, and often going so far as to write the narrative and have a “credible” reporter’s name stamped on it.

But the question begs, “Did the Cold War ever end?” and if not, why should we believe that the CIA’s involvement in such activities is buried in its past and that it has “reformed” its old ways?

Henry Kissinger’s Purge of American Intelligence: The Deep State is Born

For us to get a better understanding of how we ended up in this situation, that is so stark that Devin Nunes, the ranking member of the House Intelligence Committee, has recently stated that the intelligence bureaus may need to be overhauled due to withholding evidence from federal inquiries, we need to go back a few decades and review how Henry Kissinger largely set this whole affair into motion.

From the moment Kissinger assumed the post of National Security Advisor to Nixon, he set out to centralize all intelligence estimates, diplomatic initiatives, and covert operations over figuratively and sometimes literal dead bodies of members of the CIA, Joint Chiefs of Staff, State Department and Congress.

According to John Ranelagh in his book The Agency: The Rise and Decline of the CIA:

Very early in the Nixon administration, it became clear that the President wanted Henry Kissinger to run intelligence for him and that the NSC staff in the White House under Kissinger would control the intelligence community. This was the beginning of a shift of power away from the CIA to a new center: the growing NSC staff.”

Kissinger would use the Watergate scandal, where the CIA was caught by Congress directly implicated in treasonous activities, as the impetus needed to form a new CIA, a secret branch away from the scrutiny of Congress.

In 1978, Kissinger would launch the Intelligence Reorganization and Reform Act, which essentially worked to “clean house” of the intelligence community.

In 1982, under the direction of Kissinger, President Reagan would sign NSDD 77 under Cold War duress, which would launch Project Democracy, a sardonic name for a Trojan Horse.

NSDD 77 allowed Project Democracy the reins over “covert action on a broad scale” as well as overt public actions later to be associated with the National Endowment for Democracy (NED). The directive ordered the CIA to stay out of both the overt and covert part of Project Democracy, thus giving free reign to the Kissingerian “NSC apparatus”.

Almost one year later, the uninformed and naïve Congress passed the NED Act in Oct 1983, and effectively signed off on wrapping duct tape around their heads.

The structure of the NED essentially functions as a private CIA political operations arm of an invisible, secret government beyond accountability and beyond the reach of the law.

Kissinger’s purge of American intelligence would be the last purge of sane patriotic leadership within the intelligence community, left to the hyenas and jackals to run from thenceforth, those who still had a degree of humanity as members of the intelligence community, and had survived the Kissinger purge, were simply kept in the dark about the cloak and dagger operations of the secret government branch.

In a 1991 interview, then NED President David Ignatius arrogantly stated “a lot of what we do today was done covertly 25 years ago by the CIA…The biggest difference is that when such activities are done overtly, the flap potential is close to zero. Openness is its own protection”.

The failure of the nation state is not a natural phenomenon but rather is the outcome of a fascist coup; involving a banker’s dictatorshipeconomic looting and permanent warfare (the Cold War never ended) to hinder national industrial growth.

Among the most effective strategies towards this end has been color revolutions, which just so happens to be the NED’s specialty practice and has included, to name a few, the nations of Yugoslavia, Belarus, Georgia, Iraq, Lebanon, Burma, Iran, Egypt, Thailand, Ukraine and the Hong Kong protests.

Wherever this strategy has unfolded, the target state is told by the international community that it has no right to intervene and is told to stand by as its nation is ransacked by locusts and its government ‘reorganised’.

Secret Intelligence’s Countering of “Anti-American” Propaganda

The Countering Foreign Propaganda and Disinformation Act is a bipartisan bill that was passed into law in December 2016, it was initially called Countering Information Warfare Act. It was included together with the National Defense Authorization Act (NDAA). This bill was brought into effect just weeks before Trump was to enter office….hmmm, foreshadowing much?

Soon after the 2016 U.S. election, the Washington Post led the charge asserting that it was due to Russian propaganda that the U.S. elections turned out the way it did, that is, that Hillary had somehow, inconceivably, lost to Donald Trump and that the American people had been turned against her like a child caught in the middle of a messy divorce case. But there is no need here to set the record straight on Hillary, when Hillary herself has done suffice damage to any illusion of credibility she once had. That ultimately not even Hillary could hide the fact that her closet full of skeletons turned out to be the size of a catacomb.

But we are told that citizens do not know what is best for one’s self. That they cannot be trusted with “sensitive” information and in accordance act in a “responsible” manner, that is, to have a strong enough stomach to do what is “best” for their country.

And therefore, fear not subjects of the land, for the Global Engagement Center (GEC) is here to make those hard decisions for you. Don’t know what to think about a complicated subject? GEC will tell you the right way!

The National Defense Authorization Act (NDAA) would allow for the Secretary of State to collaborate with the Secretary of Defense, and other Federal agencies in the year 2017 to create the Global Engagement Center (GEC). The GEC’s purpose in life is to fight propaganda from foreign governments and publicize the nature of ongoing foreign propaganda and disinformation operations against the U.S. and other countries.

Let us all take a moment to thank the GEC for such a massive task in the cause for justice all around the world.

The GEC had a very slow start in its first year, however, it has been gaining momentum in the last year under Secretary of State Mike Pompeo, who seems especially excited over the hiring of Lea Gabrielle as special envoy and coordinator of GEC.

Mike Pompeo was the CIA Director from 2017-2018. On April 15, 2019, Pompeo participated in a discussion at the Texas A&M University where he voluntarily offered the admission that though West Points’ cadet motto is “You will not lie, cheat, or steal, or tolerate those who do.”, his training under the CIA was the very opposite, stating “I was the CIA Director. We lied, we cheated, we stole. It was like we had entire training courses. (long pause) It reminds you of the glory of the American experiment”.

This is apparently the man for the job of dealing with matters of “truth” and “justice”.

Lea Gabrielle was approved for her position by Mike Pompeo, what are her “qualifications”? Well, Gabrielle is also CIA trained, and while assigned to the Defense Intelligence Agency (DIA), she “directed and conducted global clandestine strategic intelligence collection operations.” Gabrielle also “deployed in tactical anti-terrorist operations in hostile environments”. After 12 years of active duty service, Lea Gabrielle became a television news journalist, who worked at NBC and FOX News.

The CIA really does not have the best track record for their role in “managing” foreign wars and counter-insurgency activities. In fact, they have been caught rather red handed in fueling such crisis situations. And these are the people who are deciding what information is fit for the American public, and western public in general, and what is not fit for their ears.

When the Matter of “Truth” Becomes a Threat to “National Security”

When the matter of truth is depicted as a possible threat to those that govern a country, you no longer have a democratic state. True, not everything can be disclosed to the public in real time, but we are sitting on a mountain of classified intelligence material that goes back more than 60 years.

How much time needs to elapse before the American people have the right to know the truth behind what their government agencies have been doing within their own country and abroad in the name of the “free” world?

From this recognition, the whole matter of declassifying material around the Russigate scandal in real time, and not highly redacted 50 years from now, is essential to addressing this festering putrefaction that has been bubbling over since the heinous assassination of President Kennedy on Nov. 22nd, 1963 and to which we are still waiting for full disclosure of classified papers 57 years later.

If the American people really want to finally see who is standing behind that curtain in Oz, now is the time.

These intelligence bureaus need to be reviewed for what kind of method and standard they are upholding in collecting their “intelligence,” that has supposedly justified the Mueller investigation and the never-ending Flynn investigation which have provided zero conclusive evidence to back up their allegations and which have massively infringed on the elected government’s ability to make the changes that they had committed to the American people.

Just like the Iraq and Libya war that was based off of cooked British intelligence (refer here and here), Russiagate appears to have also had its impetus from our friends over at MI6 as well. It is no surprise that Sir Richard Dearlove, who was then MI6 chief (1999-2004) and who oversaw and stood by the fraudulent intelligence on Iraq stating they bought uranium from Niger to build a nuclear weapon, is the very same Sir Richard Dearlove who promoted the Christopher Steele dossier as something “credible” to American intelligence.

In other words, the same man who is largely responsible for encouraging the illegal invasion of Iraq, which set off the never-ending wars on “terror,” that was justified with cooked British intelligence is also responsible for encouraging the Russian spook witch-hunt that has been occurring within the U.S. for the last four years…over more cooked British intelligence, and the FBI and CIA are knowingly complicit in this.

Neither the American people, nor the world as a whole, can afford to suffer any more of the so-called “mistaken” intelligence bumblings. It is time that these intelligence bureaus are held accountable for at best criminal negligence, at worst, treason against their own country.


Cynthia Chung writes for Strategic Culture Foundation and is the President and co-founder of the Rising Tide Foundation

The author can be reached at cynthiachung@tutanota.com

John Lennon at 80: One Man Against the Deep State ‘Monster’

By John Whitehead

Source

“You gotta remember, establishment, it’s just a name for evil. The monster doesn’t care whether it kills all the students or whether there’s a revolution. It’s not thinking logically, it’s out of control.”—John Lennon (1969)

John Lennon, born 80 years ago on October 9, 1940, was a musical genius and pop cultural icon.

He was also a vocal peace protester and anti-war activist, and a high-profile example of the lengths to which the Deep State will go to persecute those who dare to challenge its authority.

Long before Julian Assange, Edward Snowden and Chelsea Manning were being castigated for blowing the whistle on the government’s war crimes and the National Security Agency’s abuse of its surveillance powers, it was Lennon who was being singled out for daring to speak truth to power about the government’s warmongering, his phone calls monitored and data files illegally collected on his activities and associations.

For a while, at least, Lennon became enemy number one in the eyes of the U.S. government.

Years after Lennon’s assassination it would be revealed that the FBI had collected 281 pages of files on him, including song lyrics. J. Edgar Hoover, head of the FBI at the time, directed the agency to spy on the musician. There were also various written orders calling on government agents to frame Lennon for a drug bust. “The FBI’s files on Lennon … read like the writings of a paranoid goody-two-shoes,” observed reporter Jonathan Curiel.

Document with portions of text blacked out, dated 1972.

Confidential (here declassified and censored) letter by J. Edgar Hoover about FBI surveillance of John Lennon (Public Domain)

As the New York Times notes, “Critics of today’s domestic surveillance object largely on privacy grounds. They have focused far less on how easily government surveillance can become an instrument for the people in power to try to hold on to power. ‘The U.S. vs. John Lennon’ … is the story not only of one man being harassed, but of a democracy being undermined.”

Indeed, all of the many complaints we have about government today—surveillance, militarism, corruption, harassment, SWAT team raids, political persecution, spying, overcriminalization, etc.—were present in Lennon’s day and formed the basis of his call for social justice, peace and a populist revolution.

For all of these reasons, the U.S. government was obsessed with Lennon, who had learned early on that rock music could serve a political end by proclaiming a radical message. More importantly, Lennon saw that his music could mobilize the public and help to bring about change. Lennon believed in the power of the people. Unfortunately, as Lennon recognized: “The trouble with government as it is, is that it doesn’t represent the people. It controls them.”

However, as Martin Lewis writing for Time notes: “John Lennon was not God. But he earned the love and admiration of his generation by creating a huge body of work that inspired and led. The appreciation for him deepened because he then instinctively decided to use his celebrity as a bully pulpit for causes greater than his own enrichment or self-aggrandizement.”

For instance, in December 1971 at a concert in Ann Arbor, Mich., Lennon took to the stage and in his usual confrontational style belted out “John Sinclair,” a song he had written about a man sentenced to 10 years in prison for possessing two marijuana cigarettes. Within days of Lennon’s call for action, the Michigan Supreme Court ordered Sinclair released.

What Lennon did not know at the time was that government officials had been keeping strict tabs on the ex-Beatle they referred to as “Mr. Lennon.” Incredibly, FBI agents were in the audience at the Ann Arbor concert, “taking notes on everything from the attendance (15,000) to the artistic merits of his new song.”

The U.S. government, steeped in paranoia, was spying on Lennon.

By March 1971, when his “Power to the People” single was released, it was clear where Lennon stood. Having moved to New York City that same year, Lennon was ready to participate in political activism against the U. S. government, the “monster” that was financing the war in Vietnam.

The release of Lennon’s Sometime in New York City album, which contained a radical anti-government message in virtually every song and depicted President Richard Nixon and Chinese Chairman Mao Tse-tung dancing together nude on the cover, only fanned the flames of the conflict to come.

The official U.S. war against Lennon began in earnest in 1972 after rumors surfaced that Lennon planned to embark on a U.S. concert tour that would combine rock music with antiwar organizing and voter registration. Nixon, fearing Lennon’s influence on about 11 million new voters (1972 was the first year that 18-year-olds could vote), had the ex-Beatle served with deportation orders “in an effort to silence him as a voice of the peace movement.”

Then again, the FBI has had a long history of persecuting, prosecuting and generally harassing activists, politicians, and cultural figures. Most notably among the latter are such celebrated names as folk singer Pete Seeger, painter Pablo Picasso, comic actor and filmmaker Charlie Chaplin, comedian Lenny Bruce and poet Allen Ginsberg.

Among those most closely watched by the FBI was Martin Luther King Jr., a man labeled by the FBI as “the most dangerous and effective Negro leader in the country.” With wiretaps and electronic bugs planted in his home and office, King was kept under constant surveillance by the FBI with the aim of “neutralizing” him. He even received letters written by FBI agents suggesting that he either commit suicide or the details of his private life would be revealed to the public. The FBI kept up its pursuit of King until he was felled by a hollow-point bullet to the head in 1968.

Lennon and Ono sit in front of flowers and placards bearing the word "peace." Lennon is only partly visible, and he holds an acoustic guitar. Ono wears a white dress, and there is a hanging microphone in front of her. In the foreground of the image are three men, one of them a guitarist facing away, and a woman.

Recording “Give Peace a Chance” during the Bed-In for Peace at the Queen Elizabeth Hotel, Montreal (CC BY 2.5/Roy Kerwood)

While Lennon was not—as far as we know—being blackmailed into suicide, he was the subject of a four-year campaign of surveillance and harassment by the U.S. government (spearheaded by FBI Director J. Edgar Hoover), an attempt by President Richard Nixon to have him “neutralized” and deported. As Adam Cohen of the New York Times points out, “The F.B.I.’s surveillance of Lennon is a reminder of how easily domestic spying can become unmoored from any legitimate law enforcement purpose. What is more surprising, and ultimately more unsettling, is the degree to which the surveillance turns out to have been intertwined with electoral politics.”

As Lennon’s FBI file shows, memos and reports about the FBI’s surveillance of the anti-war activist had been flying back and forth between Hoover, the Nixon White House, various senators, the FBI and the U.S. Immigration Office.

Nixon’s pursuit of Lennon was relentless and in large part based on the misperception that Lennon and his comrades were planning to disrupt the 1972 Republican National Convention. The government’s paranoia, however, was misplaced.

Left-wing activists who were on government watch lists and who shared an interest in bringing down the Nixon Administration had been congregating at Lennon’s New York apartment. But when they revealed that they were planning to cause a riot, Lennon balked. As he recounted in a 1980 interview, “We said, We ain’t buying this. We’re not going to draw children into a situation to create violence so you can overthrow what? And replace it with what? . . . It was all based on this illusion, that you can create violence and overthrow what is, and get communism or get some right-wing lunatic or a left-wing lunatic. They’re all lunatics.”

Despite the fact that Lennon was not part of the “lunatic” plot, the government persisted in its efforts to have him deported. Equally determined to resist, Lennon dug in and fought back. Every time he was ordered out of the country, his lawyers delayed the process by filing an appeal. Finally, in 1976, Lennon won the battle to stay in the country when he was granted a green card. As he said afterwards, “I have a love for this country…. This is where the action is. I think we’ll just go home, open a tea bag, and look at each other.”

Lennon’s time of repose didn’t last long, however. By 1980, he had re-emerged with a new album and plans to become politically active again.

The old radical was back and ready to cause trouble. In his final interview on Dec. 8, 1980, Lennon mused, “The whole map’s changed and we’re going into an unknown future, but we’re still all here, and while there’s life there’s hope.”

The Deep State has a way of dealing with troublemakers, unfortunately. On Dec. 8, 1980, Mark David Chapman was waiting in the shadows when Lennon returned to his New York apartment building. As Lennon stepped outside the car to greet the fans congregating outside, Chapman, in an eerie echo of the FBI’s moniker for Lennon, called out, “Mr. Lennon!”

Lennon turned and was met with a barrage of gunfire as Chapman—dropping into a two-handed combat stance—emptied his .38-caliber pistol and pumped four hollow-point bullets into his back and left arm. Lennon stumbled, staggered forward and, with blood pouring from his mouth and chest, collapsed to the ground.

John Lennon was pronounced dead on arrival at the hospital. He had finally been “neutralized.”

Yet where those who neutralized the likes of John Lennon, Martin Luther King Jr., John F. Kennedy, Malcolm X, Robert Kennedy and others go wrong is in believing that you can murder a movement with a bullet and a madman.

Lennon and Ono performing at the John Sinclair Freedom Rally in December 1971 (Public Domain)

Thankfully, Lennon’s legacy lives on in his words, his music and his efforts to speak truth to power. As Yoko Ono shared in a 2014 letter to the parole board tasked with determining whether Chapman should be released: “A man of humble origin, [John Lennon] brought light and hope to the whole world with his words and music. He tried to be a good power for the world, and he was. He gave encouragement, inspiration and dreams to people regardless of their race, creed and gender.”

Sadly, not much has changed for the better in the world since Lennon walked among us.

Peace remains out of reach. Activism and whistleblowers continue to be prosecuted for challenging the government’s authority. Militarism is on the rise, with local police dressed like the military, all the while the governmental war machine continues to wreak havoc on innocent lives across the globe.

For those of us who joined with John Lennon to imagine a world of peace, it’s getting harder to reconcile that dream with the reality of the American police state.

Meanwhile, as I point out in my book Battlefield America: The War on the American People, those who dare to speak up are labeled dissidents, troublemakers, terrorists, lunatics, or mentally ill and tagged for surveillance, censorship, involuntary detention or, worse, even shot and killed in their own homes by militarized police.

As Lennon shared in a 1968 interview:

“I think all our society is run by insane people for insane objectives… I think we’re being run by maniacs for maniacal means. If anybody can put on paper what our government and the American government and the Russian… Chinese… what they are actually trying to do, and what they think they’re doing, I’d be very pleased to know what they think they’re doing. I think they’re all insane. But I’m liable to be put away as insane for expressing that. That’s what’s insane about it.”

So what’s the answer?

Lennon had a multitude of suggestions.

“If everyone demanded peace instead of another television set, then there’d be peace.”

“War is over if you want it.”

“Produce your own dream…. It’s quite possible to do anything, but not to put it on the leaders…. You have to do it yourself. That’s what the great masters and mistresses have been saying ever since time began. They can point the way, leave signposts and little instructions in various books that are now called holy and worshipped for the cover of the book and not for what it says, but the instructions are all there for all to see, have always been and always will be. There’s nothing new under the sun. All the roads lead to Rome. And people cannot provide it for you. I can’t wake you up. You can wake you up. I can’t cure you. You can cure you.”

“Peace is not something you wish for; It’s something you make, Something you do, Something you are, And something you give away.”

“If you want peace, you won’t get it with violence.”

And my favorite advice of all:

“Say you want a revolution / We better get on right away / Well you get on your feet / And out on the street / Singing power to the people.”

What Will Lula Do?

What Will Lula Do?

July 27, 2020

by Pepe Escobar – cross posted with Consortium News

A version of this article first appeared on The Asia Times.

Decades after the fact, a political earthquake that should be rocking Brazil is being met with thunderous silence.

What is now described as the Banestado leaks and CC5gate is straight out of vintage WikiLeaks: a list, published for the first time in full, naming names and detailing what is one of the biggest corruption and money laundering cases in the world for the past three decades.

This scandal allows for what Michel Foucault characterized as the archeology of knowledge. Without understanding these leaks, it’s impossible to place in the proper context the sophisticated Hybrid War unleashed by Washington on Brazil initially via NSA spying on President Dilma Roussef’s first term (2010-2014), all the way to the subsequent Car Wash corruption investigation that jailed former President Luiz Inácio Lula da Silva and opened the way for the election of neofascist patsy Jair Bolsonaro as president.

The scoop on this George-Orwell-does-Hybrid War plot belongs, once again, to independent media: the small website Duplo Expresso, led by a young, daring Bern-based international lawyer named Romulus Maya, which first published the list.

An epic, five-hour podcast brought together the three key protagonists who denounced the scandal in the first place, back in the late 1990s, and now are able to analyze it anew: then governor of Parana state, Roberto Requiao; federal prosecutor Celso Tres; and police superintendent, now retired, Jose Castilho Neto.

In an earlier podcast, Maya and anthropologist Piero Leirner, Brazil’s foremost analyst of Hybrid War, briefed me on the the myriad political intricacies of the leaks while we discussed geopolitics in the Global South.

The CC5 lists are herehere , and here . Let’s see what makes them so special.

The Mechanism

Brazil’s central bank in Brasilia. (Senado Federal, CC BY 2.0, Wikimedia Commons)

Way back in 1969, the Brazilian Central Bank created what was described as a “CC5 account” to facilitate foreign companies and executives to legally wire assets overseas. For many years the cash flow in these accounts was not significant. Then everything changed in the 1990s – with the emergence of a massive, complex criminal racket centered on money laundering.

The original Banco do Estado do Parana (Banestado) investigation started in 1997. Federal prosecutor Celso Tres was stunned to find that from 1991 to 1996 no less than $124 billion in Brazilian currency was wired overseas. Between 1991 and 2002 that ballooned to a whopping $219 billion – placing Banestado as one of the largest money laundering schemes in history.

Tres’ report led to a federal investigation focused in Foz do Iguacu in southern Brazil, strategically located right at the Tri-Border Area of Brazil, Argentina and Paraguay, where local banks were laundering vast amounts of funds through their CC5 accounts.

This is how it worked. U.S. dollar dealers in the black market, linked to bank and government employees, used a vast network of bank accounts under the name of unsuspecting ”smurfs” and phantom companies to launder illegal funds from public corruption, tax fraud and organized crime, mainly through the Banco do Estado do Parana branch in Foz do Iguacu. Hence it is called the Banestado case.

The federal investigation was going nowhere until 2001, when police superintendent Castilho ascertained that most of the funds were actually landing in accounts at the Banestado branch in New York. Castilho arrived in New York in January 2002 to turbo-charge the necessary international money tracking.

Through a court order, Castilho and his team reviewed 137 accounts at Banestado New York, tracking $14.9 billion. Though the CC5 accounts were meant only for foreigners to use, in quite a few cases, the beneficiaries had the same name of Brazilian politicians then serving in Congress, cabinet ministers and even former presidents.

After a month in New York, Castilho was back in Brazil carrying a hefty 400-page report. Yet, despite the overwhelming evidence, he was dropped out of the investigation, which was then put on hold for at least a year. When the new Lula government took power in early 2003, Castilho was back in business.

In April 2003, Castilho identified a particularly interesting Chase Manhattan account named “Tucano” – the nickname of the Partido da Social Democracia Brasileira (PSDB) led by former President Fernando Henrique Cardoso, who was in power before Lula and always kept very close ties to the Clinton and Blair political machines.

President Luiz Inácio Lula da Silva and wife Marisa Letícia, President Fernando Henrique Cardoso and wife Ruth Cardoso, Jan. 1, 2003 at Lula’s inauguration. (Marcello Casal Jr., Agência Brasil, CC BY 3.0, Wikimedia Commons)

Castilho was instrumental in setting up a parliamentary inquiry commission over the Banestado case. But again, this commission led nowhere – not even a vote on a final report. Most companies involved negotiated a deal with the Brazilian Internal Revenue Service and thus ended any possibility of legal action in regard to tax evasion.

Banestado Meets Car Wash

In a nutshell, the two largest political parties – Cardoso’s neoliberal PSDB and Lula’s Workers’ Party (which never really faced down imperial machinations and the Brazilian rentier class) actively buried an in-depth investigation. Moreover Lula, coming right after Cardoso, and mindful of preserving a minimum of governability, made a strategic decision to not investigate PSDB, or “Tucano,” corruption, including a slew of dodgy privatizations.

New York prosecutors duly prepared a special Banestado list for Castilho of what really mattered for a criminal prosecution to proceed:  the full circle of the money laundering scheme, with

(i) funds first illegally remitted out of Brazil using the CC5 accounts,

(ii) passing through the New York branches of the Brazilian banks involved,

(iii) reaching offshore bank accounts and trusts in tax havens (e.g., Cayman, Jersey, Switzerland) and then finally

(iv) going back to Brazil as – fully laundered – “foreign investment,” for the actual use and enjoyment of the final beneficiaries who first got the unaccounted-for money out of the country using the CC5 accounts.

But Brazilian Justice Minister Marcio Thomaz Bastos, appointed by Lula, then nixed it. As superintendent Castilho metaphorically put it,  “This, deliberately, prevented me from going back to Brazil with the murdered body.”

While Castilho never got hold of the critical list, at least two Brazilian congressmen, two senators and two federal prosecutors, who would later rise to fame as Car Wash investigation “stars,” Vladimir Aras and Carlos Fernando dos Santos Lima,  did get the list.

Why and how the list (let’s call it the “body bag”) never found its way into the criminal proceedings back in Brazil is an extra mystery wrapped up inside the enigma.

Meanwhile, there are “unconfirmed” reports (several sources would not go on record on this) that the list might have been used for outright extortion of the individuals, mostly billionaires, featured on it.

Extra sauce in the judicial sphere comes from the fact that the provincial judge in charge of burying the Banestado case was none other than Sergio Moro, the self-serving Elliot Ness figure who in the next decade would rise to superstar status as the capo di tutti i capi of the massive Car Wash investigation and subsequent justice minister under Bolsonaro. Moro ended up resigning and is now, de facto, already campaigning for president in 2022.

Sérgio Moro holding a press conference in September 2015. (Marcos Oliveira/Agência Senado, Wikimedia Commons)

Here is where we find the toxic Banestado-Car Wash connection. Considering what is already public domain about Moro’s modus operandi on Car Wash, as he altered names in documents with the single-minded objective of sending Lula to jail, the challenge now would be to prove how Moro “sold” non-convictions related to Banestado.  He has a very convenient legal out: no “body” was found (or formally brought back to criminal proceedings in Brazil), so no one could be found guilty of murder.

As we plunge into excruciating details, Banestado increasingly looks and feels like the Ariadne’s thread that may lead to the beginning of the destruction of Brazil’s sovereignty. It is a tale full of lessons to be learned by the whole Global South.

The Black Market Dollar King

Castilho, in that epic podcast, rang alarm bells when he referred to $17 million that had transited the Banestado branch in New York and then was sent, of all places, to Pakistan. Castilho and his team discovered that a few months after 9/11. He told me his investigators would dig it all up again and that a report exists indicating the origin of these funds.

This is the first time such information has surfaced – and the ramifications may be explosive. We’re talking about dodgy funds, arguably from drugs and weapons operations, leaving the Triple Border Area – Brazil, Argentina, Paraguay – which happens historically to be a top site for CIA and Mossad black ops.

Financing may have been provided by the so-called King of The Black Market Dollars, Dario Messer, via CC5 accounts. It’s no secret that black market operators at the Tri-Border Area are connected to cocaine trafficking via Paraguay – and also to evangelicals. That is the basis of what Maya, Leirner and I have already described as Cocaine Evangelistan.

View from the Argentine side of the Triple Border Area. (Wikimedia Commons)

Messer is an indispensable cog in the recycling mechanism inbuilt into drug trafficking. Money travels to fiscal paradises under imperial protection, is duly laundered, and gloriously resurrects on Wall Street and the City of London, with the extra bonus of the U.S. easing some of its current account deficit. Cue Wall Street’s “irrational exuberance.”

What really matters is free circulation of cocaine — hidden in the odd soya cargo, something that comes with the extra benefit of securing the well being of agro-business. That’s a mirror image of the CIA heroin ratline in Afghanistan I detailed here.

Most of all, politically, Messer is the notorious missing link to judge Moro. Even mainstream O Globo newspaper was forced to admit, last November, that Messer’s shadowy businesses were “monitored” nonstop for two decades by different U.S. agencies out of Asuncion and Ciudad del Este in Paraguay. Moro for his part is had very close relationships with the FBI, CIA and the Department of Justice.

Messer may be the joker in this convoluted plot. But then there’s the Maltese Falcon: There’s only one Maltese Falcon, as the John Huston classic immortalized it.  And it’s currently lying in a safe in Switzerland.

I’m referring to the original, official documents submitted by construction giant Odebrecht to the Car Wash investigation, which have been undisputedly “manipulated,” “allegedly” by the company itself, possibly in collusion with (then) Judge Moro and the prosecution team led by Deltan Dallagnol.

Roberto Requiao. (From his Twitter account)

This was done possibly for the purpose of incriminating Lula and persons close to him, but also – crucially – to delete individuals’ names who should never be brought to light, or justice.

The first serious political impact after the release of the Banestado leaks by Duplo Expresso is that Lula’s lawyers Cristiano and Valeska Zanin have finally requested Swiss authorities to hand over the originals.

Ex-Senator and former Governor Robert Requiao of Paraná state was the only Brazilian politician to publicly ask Lula, back in February, to go for the documents with the list in Switzerland. It is no surprise that Requiao was the first public figure in Brazil to now ask Lula to make all this content public once the former president gets hold of it.

The real, not adulterated Odebrecht list of people involved in corruption revealed by Duplo Expresso is crammed with big names – including the judiciary elite.

By comparing the two versions, Lula’s lawyers may finally be able to demonstrate the falsification of “evidence” that led to the jailing of Lula but also, among other developments, the exile of Ecuador’s former President Rafael Correa; the imprisonment of Correa’s vice president, Jorge Glas; the imprisonment of Peru’s former President Ollanta Humala and wife and, most dramatically, the suicide of Peru’s former two-time President Alan Garcia.

Peru’s Alan García, at left, in 2010 with Brazil’s Luiz Inácio Lula da Silva. (Ministerio de Relaciones Exteriores from Perú, CC BY-SA 2.0, Wikimedia Commons)

The Brazilian Patriot Act

The big political question now is not in fact to uncover the master manipulator who buried the Banestado scandal two decades ago.  Rather, as anthropologist Leirner details it, what matters most is that the leaked CC5 accounts focus on how the corrupted Brazilian bourgeoisie, with the help of their political and judicial partners, both national and foreign,  solidifies itself as a rentier class, while remaining submissive and kept in check by “secret,” imperial files.

The Banestado leaks and the CC5 accounts should be seen as a political opening for Lula to go for broke. This is all-out (Hybrid) War. Blinking is not an option. The geo-political and geo-economic project of destroying Brazilian sovereignty and turning it into an imperial sub-colony is winning – hands down.

A measure of the explosiveness of the Banestado leaks and CC5gate has been the reaction by assorted limited hangouts: a thundering silence that encompasses leftist parties and alternative, supposedly progressive media. Mainstream media, for whom judge Moro is a sacred cow, at best spins it as “old story,” “fake news” and even a “hoax.”

This image has an empty alt attribute; its file name is Odebrecht_s%C3%A3o_paulo-281x500.jpg
Odebrecht headquarters in São Paulo.
(Luiz Gonzaga da Silva Filho,

It’s now clear that creditors of the Brazilian state were, originally, debtors. Comparing different accounts, it’s possible to square the circle on Brazil’s legendary “fiscal imbalance” – exactly as this plague is brought up, once again, with the intent of decimating the assets of the ailing Brazilian state. Finance Minister Paulo Guedes, a neo-Pinochetist and Milton Friedman cheerleader, has already warned he’ll keep selling state companies like there’s no tomorrow.

Lula’s plan B would be to clinch some sort of deal that would bury the whole dossier — just like the original Banestado investigation was buried two decades ago — to preserve the leadership of the Workers’ Party as domesticated opposition, and without touching on the absolutely essential issue: how Finance Minister Guedes is selling out Brazil.

That would be the line favored by Fernando Haddad, who lost the presidential election to Bolsonaro in 2018: a sort of Brazilian Michelle Bachelet (Chile’s former president), an ashamed neoliberal sacrificing everything to have yet another shot at power possibly in 2026.

Were Plan B to happen it would galvanize the wrath of trade unions and social movements – the flesh and blood of Brazilian working classes that are on the verge of being totally decimated by neoliberalism on steroids with the toxic combination of the U.S.-inspired, Brazilian version of the Patriot Act, replete with military schemes to profit from “Cocaine Evangelistan”.

All this after Washington – successfully – nearly destroyed national champion Petrobras, an initial objective of the NSA spying. Zanin, Lula’s lawyer, also adds – maybe too late – that the “informal cooperation” between Washington and the Car Wash op was in fact illegal (according to decree number 3.810/2001).

What Will Lula Do?

Luiz Inácio Lula da Silva (Lula) sworn in as chief of staff by President Dilma Rousseff, March 17, 2016. (José Cruz, Agência Brasil, CC BY 3.0, Wikimedia Commons)

Included in the leaked list is Banestado “VIP list.” It includes the current president of the Supreme Electoral Tribunal, Supreme Court Justice Luis Roberto Barroso, bankers, media tycoons and industrialists. Car Wash prosecutor Deltan Dallagnol is very close to Barroso, the neoliberal Supreme Court justice in question.

The VIP list should be read as a road map of the money laundering practices of the Brazilian 0.01 percent  – roughly estimated to be 20,000 families who own the close to $1 trillion of Brazilian internal debt. A great deal of those funds had been recycled back to Brazil as “foreign investment” through the CC5 scheme back in the 1990s. And that’s exactly how Brazil’s internal debt exploded.

Still no one knows where the Banestado-enabled torrent of dodgy money actually landed. The “body bag” was never formally acknowledged to have been brought back from New York and never made its way into the criminal proceedings. Yet money laundering is still in progress – and thus the statute of limitation does not apply – so somebody, anybody would have to be thrown in the slammer. It doesn’t seem that will be the case anytime soon, though.

Meanwhile, enabled by the U.S. Deep State, transnational finance and local comprador elites, some in uniform and some in robes, the slow motion Hybrid War coup against Brazil keeps rambling on. And day by day inching closer to full spectrum dominance.

The key question is: what will Lula do about it?

America’s Sicilian Expedition

Source

July 10, 2020

America’s Sicilian Expedition

by Francis Lee for the Saker Blog

Of all the enemies to public liberty, war is, perhaps, the most to be dreaded, because it comprises and develops the germ of every other. War is the parent of armies; and from these proceed debt and taxes; and armies, and debts, are taxes of the known instruments for bringing the many under the domination of the few … no nation could reserve its freedom in the midst of continual warfare.’’ (My emphasis – FL) (1)

Thus was the initial warning by James Madison to the possible development (and dangers) which lie ahead of the great social and political experiment in what was to become the American Republic. In fact these militaristic/ imperial proclivities were also noted by the more astute members and chroniclers of American history and repeated by Alexis De Tocqueville in 1835. He wrote that:

Among democratic nations the wealthiest, best educated, and ablest men seldom adopt a military profession, the army taken collectively, eventually forms a new nation by itself where the mind is less enlarged, and habits are made rude than in the nation at large. Now this small and uncivilized nation has arms in its possession and also knows how to use them; (My emphasis – FL) for indeed the pacific temper of the community increases the danger to which a democratic people is exposed from the military and the turbulent spirit of the Army. Nothing is so dangerous as an army in the midst of an unwarlike nation; the excessive love of the whole community for quiet puts the Constitution at the mercy of the soldiery. (2)

‘Unwarlike’? Well the Republic was to become very warlike for most of its history. Things got started in earnest in 1846-48 with the US/Mexican conflict. This marked the first U.S. armed conflict chiefly fought on foreign soil. It pitted a politically divided and militarily unprepared Mexico against the expansionist-minded administration of U.S. President James K. Polk, who believed the United States had a “manifest destiny” to spread across the continent to the Pacific Ocean. A border skirmish along the Rio Grande started off the fighting and was followed by a series of U.S. victories. When the dust cleared, Mexico had lost about one-third of its territory, including nearly all of present-day California, Utah, Nevada, Arizona, and New Mexico. So the US got the taste of imperial hubris and easy victories early on. This was the beginning of a will to global expansion which has seen the US develop a penchant for global hegemony.

What could be more apposite and sombre of these measured warnings to the present time and the leadership thereof. The United States has transmuted from being an experimental national democracy into a rampaging imperial juggernaut with all the attendant features of empire. In general and in more recent times these imperial conflicts have been wars of choice. No-body had attacked the US since the half-hearted British attempt in 1812 and the Japanese in 1941. The only war of any significance since independence was the internal conflict between the industrial north and the agrarian south.

The Rise of Empire

This awakening of US imperialism was later extended to the Spanish/American war of the late 19th century. New territories in Latin America and East Asia were added through their annexation. The US had thus become the latest newcomer to the imperialist club although it always insisted (rather unconvincingly) that it was different to the more established British, French, Spanish and Portuguese exploitative models. There was a belief, presumably mandated by the deity, in America’s manifest destiny to rule the world. This is the same patter, which is now trotted out by the neo-cons, the Deep State, NSA, MIC, MSM, and political parties. Whether they actually believe in this is something of a moot point.

Yet now the United States finds itself everywhere in a situation of endless simultaneous wars, occupations, blockades (whoops, I mean sanctions), economic warfare, surveillance warfare and one-sided alliances whereby its ‘allies’ are in many ways worse treated than its chosen enemies and are becoming increasingly disenchanted with their subaltern role. This is particularly instanced in the American German falling out over the question of Russian Gas and Nordstream2. Germany has its own national interests which conflict with those of the US. How exactly is this going to play out? It should be understood in this respect that the US does not have ‘allies’ in the generally accepted understanding of the term, but subaltern hierarchies of the ‘Me Tarzan – You Jane’ variety. The ‘Jane’ in the situation are the assembled and invertebrate species of EU vassal regimes who up to this point in their history have always been willing to prostrate themselves at the command of their transatlantic masters.

One of the stranger anomalies of this US global military-economic posture is the influence of Israel – Israel this tiny country, with its tiny population, in the middle east must be obeyed at all costs. And making sure that it is obeyed are the various interest groups in the US which inter alia includes the American Israeli Public Affairs Committee (AIPAC) the Anti-Deformation League (ADL) the Jewish Institute for National Security Affairs (JINSA). Most, if not all, of the senior members of these organizations are Jewish, Zionists and/or neo-conservatives. To give an example of their influence and reach take the case of uber-hawk and Zionist lackey Lindsey Graham of South Carolina

Amidst the general routine and prevalent corruption in American political and corporate life the Las Vegas gambling magnate Sheldon Adelson – staunch supporter of his particular interests and the Israeli cause – began throwing around tens of millions of dollars to push legislation to ban internet gambling in order to protect his billion dollar oligopoly casino interests against competition. It wasn’t long before Graham introduced a bill to ban internet gambling. When asked about the curious coincidence of timing Graham said that his Southern Baptist constituents in South Carolina (SC) shared Adelson’s aversion to internet gambling so there was no quid pro quo involved.

It should be borne in mind, however, that Graham had held Federal Office in SC since 1995, and yet he had felt no driving urge to introduce such legislation until 2014. This took place when Graham had apparently undergone a Damascene Conversion precisely at the time that Mr Adelson began to shower him with monies. Graham’s transaction with his benefactor apparently did not meet the Supreme Court’s chief Justice, John Roberts’s, narrow definition of an illegal quid pro quo as expressed in the Court’s 2010 Citizens United Decision.

In another unrelated instance involving Graham, which might be considered as being questionable, there were his political liaisons with a foreign state and its leader – Benjamin Netanyahu – whose policies Graham would be disposed to imbibe and support whatever the policies the Israeli Prime Minster might propose, an arresting statement in light of the Senator’s oath to the American Constitution and the voters he represents. (3)

Yet another instance of a corrupt American official in the pocket of Israeli interests. Moreover, it is not merely lower rank officials who willingly take the knee to Israel, the process reaches up to the highest levels of the US political establishment; so much so that It seems difficult to exactly work out who is whose client state in the US/Israel relationship.

Various right-wing think-tanks (see above) most importantly the American Enterprise Institution, or to give it its full name, The American Enterprise Institute for Public Policy Research is a Washington, D.C. based think-tank which researches government, politics, economics, and social welfare. AEI is an independent non-profit organization supported primarily by grants and contributions from foundationscorporations, and individuals. This of course is a rather misleading description of what it actually does, and what its alleged goals are, in what is a vehemently pro-Zionist neo-con outfit. Leading figures include Richard Perle, Douglas Feith, Mr and Mrs Wurmser as well as the rest of the Zionist neo-con gang whose entire raison d’etre seems to be unconditional support for Israel. This was instanced in the policy statement, A Clean Break: A New Strategy for Securing the Realm (commonly known as the “Clean Break” report) was a policy document that was prepared in 1996 by a study group led by Richard Perle and Douglas Feith  for Benjamin Netanyahu, the then Prime Minister of Israel. The report explained a new approach to solving Israel‘s security problems in the Middle East with an emphasis on “Western values” (i.e., naked imperialism). It has widely been criticized for advocating an aggressive new policy including the removal and murder of Saddam Hussein in Iraq and the ongoing war and annexation of parts of Syria by engaging in proxy and actual warfare and highlighting Iraq’s alleged possession of mythical “weapons of mass destruction”.

It would not be an exaggeration to surmise that US foreign policy is now, and has been for some time, subsumed under Israel’s strategic interests and policies in the middle-east. Exactly what the United States gets out of this relationship is not clear other than the mollycoddling and financing of the Zionist apartheid state for no apparent returns.

The US foreign policy enigma:

I think it was Winston Churchill who once described the foreign policy of the Soviet Union as being ‘’ … a riddle wrapped in a mystery inside an enigma; but perhaps there is a key. That key is Russian national interest.’’ It seems that much the same is true of the United States and its foreign policy. The cornerstone of the policy was put in place in the 1990s with the collapse of the Soviet Union, the dismemberment of Yugoslavia and the expansion of NATO up to Russia’s western frontier and the first and second Iraq wars, as well as the destruction of Libya, ably assisted by the British and French. This period of triumphalism for the Anglo-Zionist empire is ending with the imperial overstretch eventuating from 9/11. This episode has been subject to a myriad of various theories and has never been definitively demonstrated as to who were the brains behind this event. That being said the consequences of the event had deep-going ramifications. As one commentator has noted.

‘’The September 11, 2001, terrorist attack and the botched response to it delivered a twofold lesson: first, perpetual intervention in conflicts abroad is likely to spawn what the CIA calls ’’blowback’’ an unintended negative consequences of an intervention suffered by the party that intervenes. It is irrefutable that America’s funding and arming of religious based (i.e., Jihadis- FL) resistance to the Soviet invasion of Afghanistan created a Frankenstein’s monster that little more than a decade later brought the war back to the United States. But we have been largely unwilling to join the dots beyond that. Invading Iraq in 2003 spawned further instability in the middle-east and the emergence of more terrorist groups. Why is it that so few of our pundits have noticed the obvious fact that the civil war in Syria and the rise of ISIS are the direct results of our actions in Iraq? Beyond that the United State’s government’s ham-fisted meddling in internal Ukrainian politics helped to set in motion a predictable chain of events that has sparked a new cold war. Actions such as this have drained our Treasury and destabilized large areas of the World. (4)

It also seems pertinent to enquire as to what extent is the United States carrying out policies which could be defined as being the pursuit of its national interests; this as opposed to the interests of internal and itinerant cosmopolitan groups in the US whose sympathies and interests lie elsewhere in overseas climes and not in the US heartlands. But this should be expected from the aims and objectives of these footloose globalist oligarchies in the key positions at the apex of American institutions and exerting what amounts to a stranglehold on policy-making.

Overstretch, Hubris and Messianism

Generally speaking all empires have recognisable contours of development, maturity, and decline; and there is no reason to suppose that America and its empire will be an exception to this general rule. For all that the American ruling class has taken it upon itself to deny these fundamental conditions and processes of empire. A case study was the fate of the British Empire. At the end of WW2 Britain could no longer bear the costs of holding down 25% of the worlds surface. Moreover the populations of empire – particularly in India – did not wish to be held down. Post 1945 the jig was up: the UK was effectively bankrupt, and the US took full advantage of this.

‘’The US concept of multilateralism was expressed in the Lend-Lease programme in its dealings with the UK. The British loan of 1946 and the Bretton Woods Agreements called for the dollar to supplant sterling as the world’s reserve currency. In effect the Sterling Area was to be absorbed into what would be the dollar area which would be extended throughout the world. Britain was to remain in a weakened position in which it found itself at the end of the war … with barely any free monetary reserves and dependent on dollar borrowings to meet its current obligations. The United States would gain access to Britain’s pre-war markets in Latin America, Africa, the middle-east and the far east … the Anglo-American Loan Agreement spelt the end of Britain as a Great Power.’’ (5)

This is the way empires die, new empires arise, decline, and they in their turn also die, and this process admits of no exceptions.

The Big Push

From a geopolitical viewpoint the most important developments in recent years have been the relative decline of America in economic, political, and cultural terms, the rise of China, and the recovery of Russia from the disastrous years of the Yeltsin ascendancy. That being said it should be acknowledged that America is the most powerful global economic and military alliance – but there has been the undermining of this pre-eminence which is symptomatic of its present state. I remember the scene in the film Apocalypse Now with Martin Sheen playing Captain Willard who sums up his (and America’s) dilemma: ‘’Every minute I stay in this room, I get weaker, and every minute Charlie squats in the bush, he gets stronger.’’ That pretty much sums up the situation facing America then and now. As for the $ dominance well that worked provided advantage was not taken of its privileged position, but of course, human nature being what it is, advantage was taken. Moreover, the reserve status of the dollar isn’t, as many suppose, a one-way gravy train. Given that the dollar is the world’s global currency demand will fluctuate. Increased demand will push up the value of the greenback meaning that goods and services exported to the US will become cheaper. However a strong dollar will push up the costs of America’s export producers and lead to a hollowing out of US industry. Hence the Rust Belt. The absurdity of having a domestic currency serve as the global reserve currency means that the US monetary authorities need to engineer a situation whereby an equilibrium match of dollar inflows to dollar outflows is attained. A difficult if not impossible trick to perform. Please see the Triffin Paradox.

This is a situation which the US cannot endure. It must act now to reverse its own decline and prevent the rise of other great powers. The ‘Big Push’ mentality whereby the final victorious outcome against an entrenched enemy became a feature of military ‘thinking’ (sic) during WW1. The British and French offensives on the western front, the battles of the Somme 1916, Ypres III 1917 (Wipers 3 as the British soldiers’ called it) and the Nivelle offensives 1917, did not succeed in bringing about a victory over embedded German opposition and cost hundreds of thousands of casualties for a few blood-soaked hundred meters of gain. The situation was reversed in 1918 when the Germans went on the offensive, but the result was a successful counter-offensive by the British, French, and newly arrived American divisions and finally the Armistice of 1918.

Be that as it may this ‘Big Push’ mentality has seemingly insinuated itself into current US’s strategic thinking. This in spite of the fact that the rather inconsistent results of such past policies does not offer a particularly feasible option – but they may just do it anyway. Who knows?

Thumbing through the history books is always a good guide to how the decision makers behave at the inflexion points of history.

The Sicilian Expedition

In the History of the Peloponnesian War the Greek Historian, Thucydides, gives an account of the key moment in the ongoing wars between Sparta and Athens. This was the invasion of Sicily by Athens or more commonly known as the Sicilian Expedition. The view of Pericles in 430 BC was the status quo option: neither expand the Athenian empire nor diminish it. No withdrawal from Afghanistan.

… do not imagine that what we are fighting for is simply the question of freedom or slavery; there is also involved the loss of empire and dangers arising from the hatred we have incurred in the administration of it. Nor is it any longer possible to give up this empire – though there maybe some people in a mood of panic and in the spirit of political apathy actually think that this would be a fine and noble thing to do. Your empire is now like a tyranny; it may have been wrong to take it; it is certainly dangerous to let it go. (6)

Sound familiar? After the acquisition of empire, the costs of this enterprise start to roll in; the process then begins to move and then stagnate under the weight of its own slowing momentum and popular resistance. But like today’s neo-cons the Athenian war party nonetheless prevailed: the empire must at all costs be preserved. In terms of a modern cost-benefit analysis this would in purely rational business terms conclude that the maintenance of empire was not sustainable; it was a loss-making operation.

Sceptics about the wisdom of the Sicilian adventure including Nicias warned about the irrational exuberance of the war party as follows:

It is true that this assembly was called to deal with the preparations to be made for sailing to Sicily. Yet I still think that this is a question that requires further thought … is it really a good thing to send the ships at all? I think that we ought not to give just hasty consideration to so important a matter which does not concern us … I shall therefore confine myself to showing you that this is the wrong time for such adventures and that the objects of your ambitions are not to be gained easily. What I say is this: In going to Sicily you are leaving many enemies behind you, and you apparently want to make new ones there and have them also on your hands. It is with real alarm that I see this young man’s party (i.e., the war party FL) sitting at his (Alcibiades) side in this assembly all called in to support him and I and my side call for the support of the older men among you. If any one of you sits next to one of his supporters do not allow yourself to be browbeaten or frightened of being called a coward if you do not vote for war. (7)

But such reasoned arguments did not move the war party who gave Nicias’ arguments noticeably short shrift. The war party was on heat and there was no stopping the momentum of war pumped up by an adrenalin of mass psychosis. But this was not the end of the matter.

The war 415-413 BC itself turned out to be an absolute disaster for Athens. After achieving early successes the Athenians were checked by the arrival Spartan general, Gylippus, who galvanized the local inhabitants into action. From that point forward, however, as the Athenians ceded the initiative to their newly energized opponents, the tide of the conflict shifted. A massive reinforcing armada from Athens briefly gave the Athenians the upper hand once more, but a disastrous failed assault on a strategic high point and several crippling naval defeats damaged the Athenian soldiers’ ability to continue fighting and also their morale. The Athenians attempted a last-ditch evacuation from Syracuse. The evacuation failed, and nearly the entire expedition were captured or were destroyed in Sicily. Athens never really recovered after this strategic rout.

The whole sorry episode seems remarkably familiar: deadly examples of overestimating your own strength and underestimating the strength of the opposition. This policy (or lack of) has turned out to be a leitmotif in the US wars of choice against small but determined adversaries. The results of deploying the same playbook operationalised by the same incorrigible Neanderthals in the deep state with the same utterly predictable results. This present ongoing American attempt to construct a world empire through political, economic, and military means seems to be gearing up and preparing to launch its own Sicilian Expedition and this process has already been started. A classic example of imperial overreach. Nevertheless, the policy must go on; and it must be soon or never. One is reminded of Einstein’s famous dictum applicable to the PTB who are in charge of US policy. (8) But do the Americans really believe that they can carry this off? Are they actually crazy? Or is the whole thing nothing more than a brilliant bluff. Time will tell.

NOTES

(1) James Madison – ‘Political Observations’ – 1795. Letters and Writings of James Madison – 1865 – Volume IV

(2) Alexis de Tocqueville – Democracy in America – Volume 2 – pp.282/283

(3) ‘Senator Lindsey Graham – Meeting in Israel with PM Netanyahu – Fox News – 27 December 2014.

(4) Mike Lofgren – The Deep State – p.43

(5) Michael Hudson – Super Imperialism – pp.268/269

(6)Thucydides – History of the Peloponnesian War – The Policy of Pericles – Book 2 – 63

(7) Thucydides – Ibid – Launching of the Sicilian Expedition Book 6 – 8, 9, 10

(8)  “The definition of insanity is doing the same thing over and over again but expecting different results.”

Israel Perfecting Surveillance Tech

By Philip Giraldi

Source

Israel’s external spy organization Mossad and its internal espionage equivalent Shin Bet have reputations that are much larger than their actual successes, but the one area where they have excelled is electronic intelligence gathering. Recent electronic spying around the White House and other federal buildings in Washington carried out by the Israeli Embassy demonstrates that Israel does not differentiate much between friends and enemies when it conducts espionage. In fact, spying targeting the U.S. is probably its number one priority due to the fact that the Jewish state is so heavily dependent on American support that it feels compelled to learn what discussions relating to it are taking place behind closed doors.

Israeli penetration of U.S. telecommunications began in the 1990s, when American companies like AT&T and Verizon, the chief conduits of the National Security Agency (NSA) for communications surveillance, began to use Israeli-produced hardware, particularly for law enforcement-related surveillance and clandestine recording. The devices had a so-called back door, which meant that everything they did was shared with Israel. Israeli cyber-specialists even broke into classified networks with the NSA and FBI aware of what was going on but unwilling to confront “America’s best ally.” President Bill Clinton once quipped to Monica Lewinski that they should avoid using the Oval Office phone because someone might be listening in. He was referring to Israel.

To be sure, the Jewish state’s high-tech sector has been much assisted in its effort by “own goals” provided by the United States, which allows Israel to bid on government contracts relating to national security, virtually guaranteeing that any technical innovations will be stolen and re-exported by Israeli high-tech companies. Major technology innovators like Intel, which works with the NSA, have set up shop in Israel and have publicly stated, “We think of ourselves as an Israeli company as much as a U.S. company.” Vulture capitalist Zionist billionaire Paul Singer has recently been accused of steering highly paid U.S. tech sector jobs to Israel, jobs that are lost to the American economy forever.

So, Israel is a leader in using electronic resources to carry out espionage and collect information on various targets of interest. Israel is also an innovator, and its close relationship with the U.S. intelligence community (IC), most particularly the NSA, means that technologies and procedures developed by the Jewish state will inevitably show up in America.

The U.S. is in any event working hard on its own tools for managing the public, spurred by Covid-19 hysteria. Special ID cards could help track the health status of individuals. This status would be recorded and updated on a chip readable by government scanners that, by some accounts, might be either carried or even permanently embedded in everyone’s body. Another plan being promoted in a joint venture by Apple and Google that appears to have White House support involves “add[ing] technology to their smartphone platforms that will alert users if they have come into contact with a person with Covid-19. People must opt into the system, but it has the potential to monitor about a third of the world’s population” with monitoring done by central computers. Once the legal principle is established that phones can be manipulated to do what is now an “illegal search,” there are no technical or practical limits to what other tasks could also be performed.

Developments in Israel

With those steps being taken to control the movements of possibly infected citizens in mind, some recent developments in Israel are, to put it mildly, ominous. The Jewish state is currently achieving multi-level 24/7 surveillance of everyone residing in the country conducted in real time. Investigative reporter and peace activist Richard Silverstein describes in some detail why it is happening now, what it means, and how it works.

Per Silverstein, Israel, like every other authoritarian state, is currently taking advantage of the distraction caused by the coronavirus pandemic. Prime Minister Benjamin Netanyahu, whose political fortunes seemed to be on the wane due to three hung elections, exploited the fear of the virus to assume emergency powers and obtain Knesset approval to use a highly classified national database “compiled by the Shin Bet and comprising private personal data on every Israeli citizen, both Jewish and Palestinian. In the aftermath of 9/11, Israel’s Knesset secretly assigned its domestic intelligence agency the task of creating the database, which was ostensibly meant as a counterterrorism measure.”

The database, nicknamed “The Tool,” includes names, addresses, phone numbers, employment, and educational information but it goes well beyond that in using phone tracking data to record every phone call made by the individual to include names and numbers of those called and the geo-location of where the call was made from. Phone tracking also enabled Shin Bet to create a log of where the caller traveled in Israel and the occupied territories. Internet use, if active on the phone, was also recorded. It is as complete and total surveillance of an individual as is possible to obtain and it does not involve any human participation at all, every bit of it being done by computer.

Netanyahu publicly proclaimed his intention to use the database, stating that it would be employed to combat the coronavirus, which he described as a threat to national survival. As a result of the claimed crisis, he and his principal opponent, Blue and White party leader Benny Gantz, were able to come to terms on April 20 to form a “national emergency unity government” with Netanyahu as prime minister yet again.

The exploitation of the fear of the virus plus that revelation about Israel’s powerful technical tool to thwart it produced a victory for Netanyahu, who effectively portrayed himself as a strong and indispensable leader, erasing the stigma resulting from his pending trial on charges of massive corruption while in office. One of the first steps Netanyahu will reportedly take is to replace the attorney general and state prosecutor who were seeking to send him to prison, effectively taking away the threat that he might go to prison.

The exposure of the existence of the database inevitably led to charges that Netanyahu had, for personal gain, revealed Israel’s most powerful counterterrorism weapon. There were also concerns about the significance of the huge body of personal information collected by Shin Bet, to include suggestions that it constituted a gross violation of civil liberties. But carefully stoked fear of the virus combined with some political deals and maneuvers meant that use of the data was eventually approved by the Knesset security committee at the end of March.

Israel, which has closed its borders, and which still has a relatively low level of coronavirus infections and deaths, has already started using the Shin Bet database while also turning the attempts to deal with the disease as something like an intelligence war. The information obtained from “The Tool” enables the police and military to determine if someone were standing near someone else for more than a few minutes. If the contact included someone already infected, all parties are placed under quarantine. Any attempt to evade controls leads to arrest and punishment of a six-month prison term plus a $1,500 fine. Armed soldiers patrolling the streets are empowered to question anyone who is out and about.

Mossad is also involved in fighting the virus, boasting of having “stolen” 100,000 face masks and also respirators from a neighboring country presumed to be the United Arab Emirates. Silverstein observes that “Israel’s far-right government has militarized the contagion. Just as a hammer never met a nail it didn’t want to pound, it is only natural for a national security state like Israel to see Covid-19 as a security threat just as much or more than a health threat.” And when it comes to bioweapons, Israel is no parvenu. Ironically, the hidden story behind the “war on the coronavirus” is that Israel is itself one of the most advanced states in developing and testing biological weapons at its lab at Nes Tziona.

Returning to the emergence of “The Tool,” hardline Defense Minister Naftali Bennett has also suggested monetizing the product by selling a “civilian version of it,” to include its operating system, analytic capabilities, and setup details to foreign countries, including the United States. Israel has already successfully marketed to security agencies and governments a similar product called Pegasus, which has been described as the most sophisticated malware on the market.

Like The Tool, Pegasus does data mining and real-time analysis of individuals based on a range of collection techniques. The Israeli cyber company NSO Group that markets Pegasus was recently involved in an attempt to hack Facebook-owned secure communications system Whats-App, targeting journalists and political activists, on behalf of an unknown client. Ironically, it is believed that Facebook had earlier used NSO Group’s somewhat shadowy services. Perhaps more notoriously, Pegasus was also used to monitor contacts and establish physical location in the case of journalist Jamal Khashoggi, who was murdered by Saudi intelligence agents in Istanbul.

So, Americans should beware when confronted by the new cyber-security software being promoted by Israel because the Jewish state is also exporting its own vision of a centrally controlled militarized state where all rights are potentially sacrificed for security. As whistleblower Edward Snowden has already revealed, the NSA has the capability to collect vast amounts of information on citizens. If the United States government falls for the bait and moves in the Israeli direction, using that data to enable the surveillance and manage all the people all the time, the temptation will be great to employ the new capability even if its use is not strictly speaking warranted.

And there will be no one there to say nay to the new powers, not in Congress, on the Supreme Court or in the White House. And the media will be on board, too, arguing that security against external and internal threats requires some infringements of individual rights. It is one of the ironies of history that the United States of America, with its vast resources, large population and legacy of individual freedom, has been becoming more like its tiny militarized client state Israel. It is a tendency that must be resisted at all costs by every American who cares about fundamental liberties.

Whither Coronavirus? When Will It End and What Will Happen Along the Way

Whither Coronavirus? When Will It End and What Will Happen Along ...

Philip Giraldi March 26, 2020

The coronavirus story has generated a number of major subplots. First is the origin of the virus. Did it occur naturally or was it created in a Chinese, American or Israeli weapons lab? If bioengineered, did it somehow escape or was it deliberately released? As the governments that might have been involved in the process have become very tight lipped and the mainstream media is reluctant to embrace conspiracy theories, we the public may never know the answer.

Second is the nature of the virus itself. There are inevitably skeptics who choose to compare the affliction to a common head cold or normal winter flu and are able to cherry pick so-called experts to support their case. Many Americans are unwilling to submit to a lockdown or isolation and are flaunting their willingness to go out in public and mix freely while others are claiming that the whole thing is a hoax designed to create a panic that will benefit certain constituencies. There are press reports of teenagers going to supermarkets and faking a sneeze or a cough in the produce section to show their indifference to the infection avoidance guidelines now being promoted by the media and government. Some critics have also commented regarding the deaths of hundreds of Italians daily, suggesting that in Italy’s health care system old people were deliberately being allowed to die.

The fact is that when critically ill people die in hospitals it is sometimes attributable to triage. Triage arises when there are only limited resources to treat the sick, as in the case recently in the Italian Lombard city of Bergamo where hospitals were overwhelmed. Doctors must make the decision to treat those who are ill who are likely to survive as a first priority, meaning that others will only receive limited treatment. Italy has roughly the same number of hospital beds as does the United States per capita and it has more ventilators capable of being used to treat the advanced stages of the virus. It also is receiving assistance from both China and Russia on testing supplies and additional ventilators and masks. Italy has conducted far more coronavirus tests than has the U.S. The northern Italian medical services system was up to European standards, better than what prevails in the U.S., but it has been broken by the virus. Spain is heading the same way and there are similar concerns about France.

In spite of all the ideologically driven background clutter, genuinely knowledgeable medical authorities come down overwhelmingly promoting the view that the virus is highly contagious and capable of spreading rapidly, making it a pandemic, and it can be exceptionally lethal to certain demographics, including the elderly and those with weakened immune systems. The way of combatting it also appears to be agreed upon by most genuine experts i.e. that testing must be widespread to determine who is infected and those individuals should be isolated from contact with others for at least two weeks to limit the spread of the contagion. For those whose conditions worsen, hospitalization and treatment for possible respiratory failure are warranted.

The third big issue is the apparently deliberate failure of the Trump Administration to respond proactively to limit the spread of the virus. Seeking to protect the stock market more than the American public, President Donald Trump initially downplayed the impact of the virus, even calling it a “hoax” during January and February when it first appeared on U.S. soil. It turned out that several institutes affiliated to the Center for Disease Control to deal with epidemics had been dismantled by the Administration and, in spite of the warning provided by what was occurring in Wuhan, the U.S. made no effort to increase its supply of testing kits, masks or ventilators. Meanwhile, congressmen were receiving dire warnings of what was coming from the intelligence community in private briefings, leading to a number of senators selling their stock in anticipation of a market collapse. That is something called insider trading and it is illegal. It is also a measure of the corruption of America’s ruling class.

The fourth major subplot relates to what will come out of the pandemic once it is over, if it is indeed defeated at all. Critics rightly observe that the government response both at federal and state levels might well be a major overreaction to a health crisis that could possibly be dealt with using a lighter hand. Donald Trump has now called himself a “wartime president,” a particularly odd conceit in that America’s chief executive officer dodged the Vietnam war draft.  Trump is now providing daily rambling briefings emphasizing that his administration deserves a “10 out or 10” for its yeoman’s work against coronavirus. The real story is that the president personally inhibited initial efforts to respond to the disease and he is now attempting to regain lost ground by supporting draconian measures to include cash payments to all American residents, even to people who do not need the money. The money itself will have to be borrowed or printed, putting the United States even deeper in debt.

Based on his wartime status, the president and his cabinet are poised to exploit Civil War and Korean War legislation to assume powers over the economy and will likely arrange bailouts of some industries that will then acquire the government as a partner. The now declared “national emergency” will undoubtedly come to include some forms of martial law to enforce the isolation of targeted populations and it is also being reported that the Justice Department has asked Congress to allow judges to detain people indefinitely without trial during the “emergency.” As we have learned from the Patriot Act, Military Commissions Act and the Authorization to Use Military Force, allegedly temporary powers acquired by the executive branch have frequently become permanent. Unrestrained power in the hands of a Trump or Biden should frighten anyone who is still interested in voting in November.

There is some speculation that Trump might well follow the example being set by Prime Minister Benjamin Netanyahu of Israel. Israel has banned foreign visitors, is under 24 hours curfew and is effectively in lockdown. It is using cell phone intercepts provided by the intelligence services to track the comings and goings of Israeli residents. The monitoring is being justified as a mechanism to create a record of who is meeting whom and where to support isolation and lockdown efforts. A similar program is already active in the suburbs around Washington. The National Security Agency (NSA) already has the technical ability in place that would permit monitoring of the movements of much of the U.S. population. It would be an intelligence community dream and would fit quite nicely with Congress’s recent efforts to re-authorization certain Patriot Act aspects of the Foreign Intelligence Surveillance Act (FISA).

Fifth and finally, there is the politicization aspect of coronavirus. The virus is being “blamed” on China, a global competitor of the United States. As is often the case, Trump has gotten the ball rolling through his usual verbal toxicity, calling the virus the Chinese Virus or Wuhan Virus. Other Republicans have picked up on the theme, leading to the inevitably Democratic progressive wing complaints that such language was “racist.” The fact it, there is no evidence whatsoever that China in any deliberate way either created or unleashed the virus.

And, of course, there is Russia. It would almost seem an old joke that is no longer amusing to blame something new and menacing on Moscow and congress has so far largely refrained from doing so. But that does not mean that the Deep State establishment is holding the Kremlin and President Vladimir Putin blameless. The U.S. intelligence community, through its preferred propaganda sheet the New York Times, is now reporting that Russia is taking advantage of the coronavirus crisis to spread disinformation through Europe and also in the U.S. In particular, Putin has escalated a campaign-by-innuendo to reduce confidence in the outcome of the upcoming 2020 presidential election. In any event, the Russians are too late as the Democratic and Republican parties’ behavior has already convinced many Americans that voting in November will be a waste of time.

Donald Trump’s Ukraine Server- How the FBI and ODNI hacked and influenced the American psyche

March 21, 2020

By GH Eliason for The Saker Blog
Server, server, who has the Trump-Ukraine server? The answers won’t leave room for doubt on this question.
This is part one of a 3 part series showing the FBI and US Intel agency heads are complicit in the DNC hack after the fact and 2016 election interference. Early on, the FBI and Mueller found the real hackers and worked to hide them from justice and exposure in media. Without the FBI and US Intel community help, the Russia saga would have never happened and unbelievable amounts of corruption would have been exposed early on.
Part 2 will expose the identities of the DNC hackers and where they fit in the Information Operation (IO) to indict and impeach US President Donald Trump and destroy 2016 Democratic candidate Bernie Sanders as agents of Russia or under Russian influence. The US and UK Intel superstars that helped them and some of the projects they worked on including destroying US media platforms not supporting the Clinton campaign in 2016 will be exposed.
Part 3 will conclude analyzing media complicity with corporate contractors, US Intel, and law enforcement.
The only thing that matters are facts and provable evidence. 
When the NYT, 60 Minutes NY, and other outlets contacted me as the original source for what Donald Trump knows about Ukraine’s involvement in 2016 election interference and the DNC hacks, apparently they were correct. It was the only thing they got right about the events even with Pulitzer Prizes and Emmy Awards.  I’ll show why in Part 3 of the series.
Let’s start by solving the DNC hacks in a few paragraphs. If this isn’t the most conclusive evidence you’ve seen for the purpose of getting to the real hackers, don’t read any further afterward.
Shaltay Boltay (Shaltai Boltai) is the group, Robert Mueller indicted for the DNC hacks. Shaltay Boltay leaders who were in the FSB are the people Comey, Clapper, and Mueller they investigated, indicted, and proclaim guilty of the DNC hack and 2016 election influence.
The story of why Mueller and the FBI, ODNI, and NSA couldn’t prove it shows how deep corruption and criminal abetting are rooted in US government agencies and political parties today. The indicted group has a relationship with Dimitry Alperovitch and Crowdstrike, the Atlantic Council, and secondary relationships to Hillary Clinton through the DNC and the RNC through people like Senator John McCain.
Until Crowdstrike’s report late in 2016, the tools Fancy Bear used were proprietary identifiers. Even into 2017, the use of these tools was limited to Fancy Bear and Cozy Bear. These same distinct tools were used to hack the group the ODNI, FBI, and Robert Mueller identified as the DNC hacking groups, Fancy Bear/Cozy Bear.
In a security white paper entitled En Route with Sednit Part 1: Approaching the Target Version 1.0 October 2016 by ESET LLC, Shaltai Boltai was hacked by Fancy Bear in late October 2016. ESET made this attribution based on a set of specialized hacking software specific to the group Fancy Bear.
According to RFE/RLRUH8 (Ukraine Cyber Alliance) credits “mostly CyberHunta” with the Surkov e-mail theft and says it was not the result of a spear-phishing scam but rather what he describes cryptically as “special software.” He claims the malware allowed CyberHunta not only to retrieve Surkov’s e-mail but to “take the entire [Russian] presidential administration system under their control, and they gathered information right from the computers.”
This is verified by Ukraine’s SBU. “And the information that is available in these letters, and which were extracted by” Cyberhunt “, are extremely similar. That is, the methods of execution of all these things – on those documents that officially appear in the materials of criminal proceedings, “- said the head of the SBU.
Lastly,
From Forbes “For example, in October of 2016 “Fancy Bear” was accused of hacking (Shaltai Boltai) Humpty Dumpty.- Paul Roderick Gregory a contributor at CyberHunta sister publication euromaidanpress.com
What’s unique about this is Shaltay Boltay leader Anikeev “Lewis” is the actual hacker for what is known as the Surkov leaks. The hacked material was released in two parts. The first, Lewis released himself on the CyberHunta website. This hacked material was then taken directly to the Atlantic Council.
Other victims of Shaltay Boltay include the head of News Media, Aram Gabrelyanov , presenter Dmitry Kiselev , retired o􀄶cer Igor Strelkov- Girkin , presidential aide Vladislav Surkov , Prime Minister Dmitry Medvedev.
While they are not quite on the Russian FSB to-do list, they fall nicely into Ukraine’s.
         The first information dump in the Surkov hack (administrative assistant might have been hacked) Shaltay Boltay posted the information on Ukraine’s Cyberhunta website(you need a password to post on a hacker website).
         After the first information dump was released by Shaltay Boltay leader Anikeev through the CyberHunta web platform, they were authenticated by the Atlantic Council on the 25th of October, 2016.
         Anikeev was tricked into leaving Ukraine in late October by the FSB. He went to Moscow where he was arrested and charged with treason.
         Shaltay Boltay was hacked by Fancy Bear (identified by specific tools Dimitry Alperovitch said were as strong as DNA evidence) and the hacked information (2nd Surkov dump) was released by Ukraine’s CyberHunta.
Shaltay Boltay was part of CyberHunta which was why they could post material on the Ukrainian website. Ukraine’s CyberHunta and Cyber Alliance work for the Ukrainian Information Ministry as Ukrainian cyber Intel and the DNC as opposition researchers in 2016 through Roman Burko and Christina Dobrovolska.
Cyber Alliance hackers are Ukrainian nationalists that did not work directly with Shaltay Boltay. They were hired by Alexandra Chalupa. Shaltay Boltay (Mueller’s DNC hackers) was hacked by Fancy Bear in Ukraine even though according to Mueller they were Fancy Bear…from Ukraine.
From the Ukrainian hackers own webportal InformNapalm– InformNapalm volunteer intelligence community was the original publisher of the analysis and the actual dumps of Surkov’s correspondence provided by Ukrainian Cyber ​​Alliance (UCA) in October 2016 (second Surkov dump)… A few days ago, a number of Russian news agencies published a story about the arrest of FSB officers responsible for information security, the head of department at Kaspersky Lab (Department of cybercrime investigations), and one Vladimir Anikeev who testified against another FSB employee.
Anikeev is believed to be “Lewis”, the spokesperson for Anonymous International. FSB recently decided to confuse the matters by using the discovery on Anikeev’s computer of #SurkovLeaks files, which had been obtained and published by #UCA, and had already been in the public domain.
As the speaker for #UCA, I categorically deny any connections between Ukrainian Cyber Alliance and Anonymous International. I will now try to unravel this KGB tangle.
According to RUH8 “Shaltai Boltai people post “samples” of letters of influential, but nonpublic
people, virtually without comment. And they also offer information for sale. But did any of the
allegedly sold correspondences surface anywhere? Why not? Because a complete dump would inflict a
tremendous damage on Moscow, whereas the real goal is to pull some strings and rein in a competitor for power.” .-RUH8
As you’ll see in a second, we found our DNC hackers. The same hacker (RUH8) that gave Ukraine’s CyberHunta credit for the Surkov hack and the first part of the document dump takes credit for the second document dump his group hacked from CyberHunta/Shaltay Boltay’s Anikeev after his arrest.
Notice as much as he hates Anikeev, the Ukrainian nationalist RUH8 denies a connection to the FSB regarding Shaltay Boltay’s work.
“Sometimes they get hacking help from their Russian friends, he says. “There are people there who are so angry at their own government that they are risking spy charges and passing information to us,” RUH8 explains.”- Inside The Ukrainian ‘Hacktivist’ Network Cyberbattling The Kremlin-RFERL
RUH8, the proud Russian hating Ukrainian nationalist is clear. Shaltay Boltay, its members Mueller indicted, WERE NOT working for the Russian government when this combined group hacked the 2016 US election. They were working for Ukraine.
 Initial reports out of Russian media tied Mikhailov to a group of hackers in Ukraine and Thailand called Shaltay Boltay, which means Humpty Dumpty. The group is reportedly affiliated with Anonymous, who released damaging documents on high-level Russians in 2014 and the Kremlin alleges that the arrests are related to this act, as Markov told The Daily Beast that Mikhailov: “definitely controlled Shaltay Boltay,” which “cooperated with the Ukrainian SBU [security service], which is the same as working for the CIA; he worked with them, which is obviously treason.”-Paste Magazine
What if… Hillary Clinton’s go-to guy accessing the servers to see who was “leaking DNC and Team Hillary communications” was from the cyber experts Alexandra Chalupa hired for opposition research from Ukraine?
Think about this for a second because it’s a sensible scenario. Chalupa checks in with her go-to gal Christina Dobrovolska who doubles as Ukraine’s Cyber spy manager.
Christina checks to see who’s available in Ukraine and it’s the guy whose work the entire Russian election influence narrative was based on. He’s ok because he works with Ukraine’s CyberHunta. Who cares that he hacked Huma Abedin’s Yahoo account is a wanted criminal or works for a foreign Intel service.
“At the same time her aides were creating “loyalty scores”, Clinton, “instructed a trusted aide to access the campaign’s server and download the messages sent and received by top staffers. She believed her campaign had failed her—not the other way around—and she wanted ‘to see who was talking to who, who was leaking to who.”-Jonathan Allen and Amy Parnes. Shattered: Inside Hillary Clinton’s Doomed Campaign
“In particular, he says, spear-phishing — using messages that mimic those of legitimate companies along with a request and link to change personal security information — “is quite efficient.”
 RUH8 credits “mostly CyberHunta” with the Surkov e-mail theft and says it was not the result of a spear-phishing scam but rather what he describes cryptically as “special software.”- RUH8 Ukraine Cyber Alliance- RFE/RL
The lights go on and the bell sounds. The DNC Russian hacker narrative begins. Que Alexandra Chalupa.
 “In an interview this month, Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists, government officials and private intelligence operatives. “While her consulting work at the DNC this past election cycle centered on mobilizing ethnic communities — including Ukrainian-Americans — she said that, when Trump’s unlikely presidential campaign began surging in late 2015, she began focusing more on the research, and expanded it to include Trump’s ties to Russia, as well.”-Politico 2017 interview with Alexandra Chalupa
It turns out that Ukrainian cyber Intel RUH8’s special Russian friend in Cyberhunta is the same guy Crowdstrike, Comey, Clapper, and Mueller investigated for the DNC hack and the Yahoo hack.
There’s only one problem with the above. The Russian group Shaltay Boltay has never been caught with the Fancy Bear tools. RUH8 and Ukraine’s Cyber Alliance and Cyberhunta had them and used them and used them on Shaltay Boltay. Because the hackers outed themselves by hacking each other with Fancy Bear tools, we have the entire group and subgroups Intel operatives as Chalupa called them in Ukraine.
“So the help of the USA… I don’t know, why would we need it? We have all the talent and special means
for this. And I don’t think that the USA or any NATO country would make such sharp movements in
international politics.” We have no Need of CIA Help Ukrainian Hackers of #Surkov Leaks-RUH8 Ukraine Cyber Alliance, Cyberhunta, Shaltay Boltay, Fancy Bear, Cozy Bear
Reread RUH8’s statements. This is a guy that is dying to do a book and movie deal to finally get the acclaim he thinks he deserves. Let’s give him one- Capturing the DNC Hackers.
After everything was said and done by Comey, Clapper, and Mueller about Russian hackers and influence, Shaltay Boltay’s archives (aka Fancy Bear servers) had to be retrieved from UKRAINE.
“Anonymous International founder, who is now in jail, reported that he had stored his databases with stolen information in a Kiev apartment. Thanks to Anikeev’s testimony, the investigators found out that the information carriers (servers) with the hacked archives are stored in Kiev.”

Why did Ukrainian Intel operatives do all this?

Dimitry Alperovitch of Crowdstrike has an ongoing “Twitter buddy” relationship with Ukraine’s Cyber Alliance, RUH8, and Cyberhunta, which includes Shaltay Boltay dating back to at least 2016.
“Hey. I am the press secretary, a simple Ukrainian hacker, more precisely: we are hackers, but imagine a masked man who speaks to you. I do not do OSINT, I do not tell schoolchildren how to hack websites, I do not care about who and what agreed, I’m not an army or a hundred, I do not obey orders and do not follow a ceasefire, build democracy and fight for justice, I am a hacker, and my goal is to break!
 To break, spoil, rob, entangle, blackmail, frighten, divulge, mock and mock the defenselessness of the victims. Because I can. Hate is my name. I will harm the Russian Federation. And I do not care who you are – a liberal or a guardian, Russians must suffer. Traitors and spongers of Russian invaders must suffer. Pensioners and functionaries, Buryats and October, must suffer. If I find a way how to harm you, even for a penny, I immediately use it. Do you live in Russia? Bad luck. I will not tolerate, will not be merciful, I do not forget and do not forgive.- RUH8
C:\Users\GH\Desktop\spy for hire\CYBER TERROR PART 6 REAL TERRORISM\photos used\threat\RUH8 PROTECTING PEOPLE PRAVY SEKTOR CUTS-twitter.com-2019.04.28-01-33-28.png
Ukraine’s Cyber Alliance (RUH8) and Cyberhunta (including Shaltay Boltay) work under the flag of Dimitro Yarosh’s Pravy Sektor Ukrainian nationalism. The groups and their web platforms were started by former Pravy Sektor spokesman Sviatoslav Yurash. Yurash was also the spokesman for the 2014 EuroMaidan coup, the Ukrainian military, and is the liaison between the ultra-nationalists and the Ukrainian Diaspora through his position as Deputy Director of the Ukrainian World Congress affiliate in Kiev.
All of this started as an Influence Operation in Ukraine that resulted in the 2014 coup and subsequent move to hard Ukrainian nationalism. It bled into the United States as the 2016 election season heated up.
Suffice to say, means, motive, method, and opportunity have been established by the hackers themselves. Sources friendly to their efforts and neutral mainstream sources including RFERL verify it.
If you’re not convinced now, read no further.
         They (as a foreign Intel service) interfered in the 2016 US election.
         They, along with members of the US Intel community tried to destabilize the government in Russia and the USA.
         They shaped and promoted a false narrative that shipwrecked US and Russia relations.
         Their work helped Crowdstrike shape the Fancy Bear-Cozy Bear narrative.
         They shape the US Intel view of what’s going on in Ukraine allowing for crimes against humanity in Donbass (LNR &DNR) to go unaddressed.
         Later in the series, I’ll show these same groups (Ukraine Cyber Alliance, RUH8, Cyberhunta-Fancy Bear/Cozy Bear) were used to manufacture evidence that will be used in the #MH17 trial at the Hague in conjunction with Bellingcat.
         US Intel for hire superstars used the Fancy Bear groups in conjunction with the #Propornot project illegally to identify and take down news and commentary platforms in the US and EU that published stories against the narratives, they were developing and promoting.
         They illegally targeted people expressing social and political opinions. All of this was with the blessing of period ODNI and FBI leadership.

The Disproven Conspiracy Theories about the DNC Hack and 2016 Russian Election Interference

The disproven conspiracy theories about Trump-Russia and Russian election interference is the ones that were proven baseless in court, not the court of opinion. The evidence was fabricated or just not there, to begin with. The FBI’s criminality hiding the real criminals is examined below.
But, these fake stories are still promulgated in an ongoing effort to sabotage the 2020 election cycle and tear the US social fabric apart. Examples of this are- Why Trump Still Believes (wrongly) that Ukraine Hacked the D.N.C.The Conspiracy Theory So Far Out There Even Trump’s Biggest Defenders Are Walking Away From It and @ScottShaneNYT How a Fringe Theory About Ukraine Took Root in the White House.

This article is going to open up the potentially wide-ranging crimes at the FBI aiding and abetting criminals for purely political reasons.

 There are only two possible reactions you can have to this. There are some people that will react emotionally or politically and the consequences be damned. As long as it happens to someone they are sure they hate, why care?
When precedents are set, they work both ways. When political leaders like Trump or Sanders are tried in the court of opinion and declared loyal to a foreign government because the other party doesn’t like them. The method is set for every other person that graces the social or political stage.
Look further into the distance and realize this flows downhill. If it’s fine for political leaders, don’t be surprised when it’s your turn at bat because someone doesn’t like you. This kind of lawlessness spreads quickly as we’ve seen since 2016.
Or maybe it’s time to objectively look at the facts and see where the evidence leads in an unbiased way. That’s it. That’s all.
All of the common knowledge stories rely on readers to assume ODNI head James Clapper’s 2017 report was conclusive and the Mueller investigations were successful. Neither of them was, nor could they ever be.
James Clapper was responsible for the evidence Intel agencies presented in the January 2017 report trying to hamstring the newly elected Trump administration for political reasons.
If ODNI chief Clapper believed the 17 Intel Agency strong report, why couldn’t he stand by the same fact-base in 2018? Clapper no longer cited his iron-clad evidence he presented as proof of Russian interference or the DNC hacks.
In 2018, former ODNI head Clapper’s solid proof of Russian interference in the 2016 election became 78,000 people voted against Hillary Clinton and she lost Wisconsin, Pennsylvania, and Michigan. Notice Jimmy Clapper wasn’t quoting his solid gold January 2017 report anymore.
Who were these 78,000 Clinton haters that cost the DNC the election in 2016?
Back when there was a real Clinton administration, First Lady Hillary Rodman Clinton demanded the US get involved in the Bosnian war. Hillary Clinton supported KLA terrorists and extremists through a bombing campaign. US bombers drove the families of these voters into the arms of murderers so extreme, they were cutting organs out of living people to sell on the black market. Clinton had them taken off the official terrorist lists to the frustration of negotiators trying to make peace during the war.
The Serbian Diaspora voters in Wisconsin, Michigan, and Pennsylvania usually votes for the Democratic ticket, that is, unless your name is Hillary Clinton. This was a bloc vote against Hillary Clinton who they hold responsible for the murder of their families at the hand of terrorists. It’s why Clinton ignored those states campaigning. Clinton mistakenly thought having all the major Diaspora votes in swing-states would be enough.
The problem with the evidence of the Russian government interference in 2016 is it had to be manufactured and repeated by a compliant media to exist.
What will be shown through mainstream sources is the Russian FSB and GRU attacks on the American psyche was produced by domestic and foreign criminals that were hostile to the Russian government for nearly a decade before the DNC hacks. The hackers who are IO specialists were targeting Russian politics, not the US.
Robert Mueller and James Comey are accessories after the fact. They tried feverishly and unsuccessfully to incriminate the wrong people because the facts expose large scale political corruption well beyond what is currently known and it all revolves around Ukraine.
According to PNAS (Proceedings of the National Academy of Sciences of the United States of America) in a study titled Assessing the Russian Internet Research Agency’s impact on the political attitudes and behaviors of American Twitter users in late 2017 there was no Russian impact on the election and they used 6 research standards to measure it.
If you don’t trust official studies done under the Trump administration tenure, Jon Solomon had this to write after uncovering 2016-17 FBI memos: The piecemeal release of FBI files in the Russia collusion investigation has masked an essential fact: James Comey’s G-men had substantially debunked the theory that Donald Trump’s campaign conspired with Moscow by the time the 45th president was settling into the Oval Office, according to declassified memos, court filings and interviews.
And that means a nascent presidency and an entire nation were put through two more years of lacerating debate over an issue that was mostly resolved in January 2017 inside the bureau’s own evidence files. The proof is now sitting in plain view.- FBI’s Russia collusion case fell apart in first month of Trump presidency, memos show
This is why James Clapper changed his tune so radically. When you look at the above, Hillary was taken out behind the woodshed in 2016 for good reasons. Ask yourself what does it have to do with Russians, Russia, or Vladimir Putin or Donald Trump and Bernie Sanders? The only scenario all the evidence supports is Hillary Clinton stepped on a proverbial rake and made herself unelectable in 2016.

FBI, CIA, and ODNI criminal conspiracy against the United States

Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution– Information available as of 29 December 2016 was used in the preparation of this product.
Scope
This report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies. It covers the motivation and scope of Moscow’s intentions regarding US elections and Moscow’s use of cyber tools and media campaigns to influence US public opinion. The assessment focuses on activities aimed at the 2016 US presidential election and draws on our understanding of previous Russian influence operations. When we use the term “we” it refers to an assessment by all three agencies.
I refuse to give James Clapper, James Comey, John Brennan, or Robert Mueller the benefit of the doubt and call them ignorant little men.  They acted with full knowledge of what they were doing. Along with all of the agencies’ department heads, these men used their offices trying to try to overthrow the election of the President of the United States and change the fabric of US society by creating irreparable political and social division.
American officials, sworn to defend the USA used their power to fabricate a political narrative they called Intelligence to create their own foreign policy (Russia/Ukraine)and domestic policy(including media, political norms and policy) for the United States.
As late as 2018, #JamesComey was clear when he dismissed a House intelligence committee report that found no collusion between Russia and the Trump campaign as a “political document”. When the ODNI report was written, he knew there was no evidence of Donald Trump-Russia collusion. They all knew.
ODNI Clapper, FBI Comey, John Brennan and Special Counsel Mueller knew in 2017 that the US Intel community conceded there was no coordinated effort by Russia to influence the 2016 election months before.
They successfully divided the United States socially and politically in ways Orwell would be proud of.

Why did US political activism by sworn officials cross a bridge too far?

It all started falling into place after 9-11. Congress decided the FBI needed to get into the Intelligence business. At the time, the FBI fought the changes saying it would hurt their criminal investigation mandate. Because the CIA legally can’t operate domestically, the FBI was rebooted to do the job.
The 2000s version of the FBI was right. The FBI went from being the world’s premier criminal investigation agency to one of the worst imitations of a private sector  CIA domestically and around the world.
The same man the FBI called a nuisance and danger to national security after the twin towers collapsed in New York networked intelligently enough to become the trainer of choice for the FBI, Homeland Security, CIA, NATO, et al.
This new mandate from Congress created over 5000 new Intel positions right away inside the FBI that were filled with outside contractors.
Today’s Intel agency leaders including Homeland Security and FBI department heads were his students from the early 2000s onward. The rise and risk of Intelligence for hire is detailed in U.S. Intelligence Crisis Poses a Threat to the World (Part 1)
This particular agency trainer almost singlehandedly started the US side of the social-political Russian collusion storyline by himself labeling anyone outside his narrative Kremlin trolls and pro-Russian influencers.  He made looking for pro-Russian collaborators fashionable in a post-2016 world in a way that would make Joe McCarthy tingly.
He personally is why media came under so much scrutiny and groups like Propornot were formed to destroy media that didn’t agree to the McCarthy-like narrative, alternative media sources that spoke against the Clinton campaign and post-2014 Ukraine. Watch as it starts again as the 2020 election cycle heats up.
Along with the other US Intel actors, he aided and abetted the murder of journalists in Ukraine by providing the tools, training, means, and method to set it up. It’s quite an embarrassment for Brennan, Comey, Clapper, Mueller, and the agencies, et al.
Imagine, one of the rock-stars of modern Intel being found in that position after your agencies were trained to look at information like him for over a decade. It’s no wonder they hand-fed the current Russia policy narrative he developed to MSM.
In part2, I’ll detail who he is, many of the crimes, along with the real identities of the DNC hackers.
Fusion GPS and Patterning the Trump-Sanders Accusations and Russia Investigation
If the ODNI and FBI engaged in consistent patterns of activity for political reasons that tear the societal fabric of the USA to support corruption that destroy the lives of US citizens, change foreign policy, and erode citizen’s rights, should it be investigated?
It started with Bernie Sanders during the 2016 primaries. This bled into the 2020 primaries.
Sander’s accusations started with “Adam Parkhomenko, a former aide to Hillary Clinton who has repeatedly suggested that Senator Bernie Sanders owes his popularity to Russian support, backed the attorney’s abortive bid for president.”- NYMag
Sander’s accusations of Russia collusion ended with –“A 37-page indictment resulting from special counsel Robert Mueller’s investigation shows that Russian nationals and businesses also worked to boost the campaigns of Vermont Sen. Bernie Sanders and Green party nominee Jill Stein in an effort to damage Democrat Hillary Clinton”-USA Today
Robert Mueller’s investigation into Bernie Sanders started with a tweeted accusation. Most of the Russian nationals not named were publishers and journalists that support Bernie Sanders and were listed by the FBI trainer who started accusing American web portals of being influencers for the Russian government.

Fusion GPS and the Steele Dossier

Glenn Simpson and Peter Fritsch, the co-founders of the private investigative firm Fusion GPS never tried to vet any of the information Christopher Steele gave them in the infamous and tantalizing Steele Dossier.
The closest anyone has come to a real source is an unknown Russian émigré in the US provided the narrative for Christopher Steele (foreign Intel agent) about events he/she had no first-hand knowledge of.
“Yet, Simpson allegedly acknowledged that most of the information Fusion GPS and British intelligence operative Christopher Steele developed did not come from sources inside Moscow. “Much of the collection about the Trump campaign ties to Russia comes from a former Russian intelligence officer (? not entirely clear) who lives in the U.S.,” Ohr scribbled in his notes.”- The Hill
Is it possible for investigative journalists like Simpson and Fritsch not be even remotely curious about the legitimacy of such scandalous information? This Intel is about an elected US President and they claim they were acting patriotically.
Fusion GPS Founders On Russian Efforts To Sow Discord: ‘They Have Succeeded’. This is quite a statement considering when asked, they admitted they knew absolutely nothing about Steele’s politically motivated fiction.
It’s easy to see why such an appalling politically driven fantasy fell apart after it was given a real examination. But, that’s not the point.
Simpson and Fritsch turned around and gave the Steele Dossier to Republican Senator John McCain (the anti-Trump), knowing full well if he acted in character the Dossier would be made public.  Why McCain’s office? The answer is included below.
“The Washington Times first disclosed the document on April 25, 2017. Republicans later told the Justice Department the filing should have set off alarm bells inside the FBI about Mr. Steele’s credibility, given his admission he had accepted gossip.”-The Washington Times
“The top judge on the federal court overseeing the U.S. government’s surveillance activities accused the FBI on Tuesday of providing false and misleading information about Carter Page in applications to wiretap the former Trump campaign adviser.”– The National Interest
“Before evaluating the media component of this scandal, the FBI’s gross abuse of its power – its serial deceit – is so grave and manifest that it requires little effort to demonstrate it. In sum, the IG Report documents multiple instances in which the FBI – in order to convince a FISA court to allow it spy on former Trump campaign operative Carter Page during the 2016 election – manipulated documents, concealed crucial exonerating evidence, and touted what it knew were unreliable if not outright false claims.
If you don’t consider FBI lying, concealment of evidence, and manipulation of documents in order to spy on a U.S. citizen in the middle of a presidential campaign to be a major scandal, what is?”– The Intercept

ODNI, FBI Hacked and Influenced the American Psyche

Throughout the entire hack and election influence saga US Intel officials acted like spokesmodels for Ukrainian –American Diaspora leader Alexandra Chalupa. They constantly acted for the benefit of private citizen groups and companies who wanted to change US foreign policy and the fabric of society in the USA.
The following is from a man that knows the facts. How can you get such a senior position otherwise? Here’s his big media sound bite;
“FEINSTEIN: And what would those goals have been?
PRIESTAP: I think the primary goal, in my mind, was to sow discord, and to try to delegitimize our free and fair election process. I also think another of their goals, which the entire United States intelligence community stands behind, was to denigrate Secretary Clinton and to try to help then — current President Trump.”- Vox
“Russia, for years, has conducted influence operations targeting our elections,” an FBI agent told Congress on Wednesday. But what made 2016 different was the degree of interference, facilitated by the Internet, said Bill Priestap, the assistant director of the FBI’s Counterintelligence Division.”.-(CNSNews.com)
And here are Bill Priestap’s conclusions after the media turn away and he’s forced to put on his big boy pants and own up to the evidence the FBI has after years of investigation.
“Further, all three witnesses in that hearing—Ms.Manfra, Dr. Files, and FBI Assistant Director for Counterintelligence Bill Priestap—agreed that they had no evidence that votes themselves were changed in any way in the 2016 election.”- REPORT OF THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE ON RUSSIAN ACTIVE MEASURES CAMPAIGNS AND INTERFERENCE IN THE 2016 U.S. ELECTION VOLUME 1: RUSSIAN EFFORTS AGAINST ELECTION INFRASTRUCTURE WITH ADDITIONAL VIEWS
Therein lays the crux of the problem. The FBI wanted the election interference story to resonate publically but under oath, there was never any evidence.
According to the IG Report, FBI leaders, lawyers, and investigators were pulling out all stops to derail Donald Trump before and after the 2016 election. How did this organized, continuous, multi-faceted, and multi-event war play on the American psyche? You tell me.
FBI Tried to Influence the Trump Campaign“While the results of any physical searches related to Page are unknown, what is known is that federal spying on the Trump campaign through Page went further. Prior to the FISA surveillance orders, the FBI tasked informant Stefan Halper with targeting Page. (Another agency may have as well.) The IG report revealed that in targeting Page, Halper sought specific details from Page related to the Trump campaign, and fed Page unsolicited (and potentially illegal) advice concerning campaign strategy.”-The Federalist
The only thing to consider is the FBI may have conducted the biggest set of serial crimes of this decade by a law enforcement agency.
This effectively divided every American on a social and political basis. It wasn’t a single event but a continuing policy surrounding the election, foreign policy, and the lengths federal investigators could go to hamstring the executive branch for political reasons.
Before the December 2016 ODNI-FBI GRIZZLY STEPPE – Russian Malicious Cyber Activity JAR, there was no proof of Russian intervention except what came out of the Clinton camp. James Comey denied it. After the ODNI JAR, there was no evidence of Russian intervention in the 2016 election.
The report itself and the actions surrounding it were nothing short of a successful politically charged foreign policy intervention by the FBI and ODNI. How can I say this?
Mueller indicted a Russian company called Concord Management & Consulting LLC for being the vehicle the Russian government used to interfere in the 2016 election. All the information Robert Mueller, James Comey, and James Clapper had to go on came from the indicted DNC hacking group themselves.
After establishing this, we’ll look at the ongoing relationship between the investigators and the criminal hacking groups to reshape American politics, cover-up enormous corruption in the Obama administration, Clinton campaign, and hamstring an elected US President.
The other company called the Internet Research Agency was part of Concord Management.
“In 2014, according to Russian media, Internet Research Ltd. (Russian: «Интернет исследования») was founded in March 2014, joined IRA’s activity. The newspaper Novaya Gazeta reported that this company is a successor of Internet Research Agency Ltd. Internet Research Ltd. is considered to be linked to Yevgeny Prigozhin, head of the holding company Concord Management and Consulting. The “Trolls of Olgino” are considered to be his project. As of October 2014, the company belonged to Mikhail Bystrov, who had been the head of the police station at Moscow district of Saint Petersburg.
Russian media point out that according to documents, published by hackers from Anonymous International, Concord Management is directly involved with trolling administration through the agency. Researchers cite e-mail correspondence, in which Concord Management gives instructions to trolls and receives reports on accomplished work. According to journalists, Concord Management organized banquets in the Kremlin and also cooperated with Voentorg and the Russian Ministry of Defense.”-Wikipedia
This information is well documented enough to have an almost accurate Wikipedia listing barring one glaring point Mueller, Comey, and Clapper needed to ignore to build their Trump-Russia collusion, Russian election interference, and Russian hacking narrative.
Scott Humor at the Saker.is researched the Internet Research Agency extensively. In an article entitled “A Brief History of the Kremlin Trolls,” he shows clearly the Internet Research Agency only existed on paper. Even then, it ceased to exist in 2015. It was liquidated and the company emerged as a construction retail company called TEKA.
This brings us to the foreign policy objective the US Intel community and US Intel agencies hacked the American psyche very successfully to reach:
“On 29 December 2016, the White House accused and sanctioned the FSB and several other Russian companies for what the US intelligence agencies said was their role in helping the Russian military intelligence service, the Main Intelligence Directorate (GRU) disrupt and spread disinformation during the 2016 US presidential election. In addition, the State Department also declared 35 Russian diplomats and officials persona non grata and denied Russian government officials access to two Russian-owned installations in Maryland and New York.”- Wikipedia
Here’s the fun part. Everything we know about 2016 Russian involvement stems from this same small group that ODNI and FBI had to embellish by magnitudes to link them to a Russian government operation and then indict.
While they were the hackers and Information Operators the FBI investigated and Robert Mueller indicted, the hacking groups weren’t working for the Russian government for the Yahoo hack or the DNC hack and 2016election hacks.
Dmitry Dokuchaev used his position to commit crimes against Russia and the USA which helped the FBI to build the one narrative they needed to fabricate official Russian government involvement.
         U.S. v. Dmitry Dokuchaev, et al.
         “Dokuchaev is a former hacker from Yekaterinburg. He was reportedly blackmailed into joining the FSB, Russia’s domestic intelligence agency, after his private exploits became known to the service, but then built a successful career, rising to the rank of major. The Russian investigation appears to link him to a group called Shaltai Boltai, or Humpty Dumpty, which broke into electronic mailboxes, mostly of Russian officials and business people, obtained compromising information about them and then either sold or published it. The group’s work was a combination of blackmail, competitive intelligence and public relations; Dokuchaev’s alleged role was to direct the group toward particular victims and cover up its activities while pretending to investigate it.”- Bloomberg- What the Yahoo Hack Says About Russian Spies-The 2014 hack appears to have been a business scheme run by Russian intelligence officers
The FSB agency mandate is limited by law to work inside Russia, not outside. This alone makes it illegal for the FSB to engage in state-level espionage and hacking operations outside.
The FSB has an incredible amount of legal authority to surveil all information passed on or through Russian servers.
Jeff Carr noted the Russian Law on the FSB (article 15) states that “all individuals and legal entities in Russia, providing postal services, telecommunications of all kinds, including systems, data communication, satellite communications, are obliged at the request of the Federal Security Service to include in the extra hardware equipment and software, as well as create other conditions necessary for the operational and technical measures by the Federal Security Service.”
And yet;
In case you missed it, the FSB through Dmitry Dokuchaev’s Shaltay Boltay was accused of illegally hacking accounts of Russian officials. Why would the FSB hack these officials it legally had almost unlimited jurisdiction to the information without hacking?
For anyone clinging to the Yahoo or DNC hacks with a purely political mindset; this is the same as walking into a bank vault with $1 billion dollars in it. You know you have the legal right to walk away with any or all of it. But, just for giggles, you hire a foreign criminal to rob the place which makes you liable for bank robbery, conspiracy, and treason.
And in the real world case of Yahoo, you get caught because the Canadian hacker you illegally hired for the Yahoo hack broke the Canadian criminal code of silence when he testified against you.
To put it delicately, this would have to be the most inept crime of all time. For this to be true, Dokuchaev must have just fallen off the turnip truck and hit his head. Got whacked with the ole’ ugly stick at the same time he stepped on a rake as he was laughed at by a 12-year-old girl who wound up and kicked him in the…….Seriously? That’s as insulting as it is injurious.
Instead, what we have is a group of Russian criminals (Shaltai Boltai) who are not working for the Russian government and continually try to hack Russian officials for blackmail. According to Stratfor, “In a 2015 interview, the leader of Shaltai Boltai, code-named “Lewis,” said his group was driven purely by money, not ideology… The narrative linking Shaltai Boltai to the FSB officers came just three days after the initial stories suggesting the FSB officers were the sources of leaks to U.S. intelligence.”
But were Dokuchaev and Shaltai Boltai (Shaltay Boltay) feeding US Intelligence information? If so, what kind of information?
The “Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution” the Office of the Director of National Intelligence ODNI quotes Shaltay Boltay because this group is the primary source of information about both events because they created what we know about them.

Dokuchaev, Shaltay Boltay, the FBI, and Robert Mueller

Summary:
The FBI interviewed members of Shaltay Boltay groups and asked for help writing the 2016 election hacking and influence story. Shaltay Boltay could play the heroes and the villains. They were heroes because they created the influence story about a non-existent company that no one could find that Putin ordered to influence the 2016 election in favor of Donald Trump.
They were the villains because they were the DNC hackers. If Shaltay Boltay cooperated to implicate Trump and Putin, US citizenship and jobs were waiting for them.
Dokuchaev and his working group Shaltai Boltai (Shaltay Boltay), otherwise known as Anonymous International or Humpty Dumpty  are the source for everything known about the Russian Internet Agency (IRA), Russian election interference, and provides the Russian FSB-GRU connection through Dokuchaev needed to make the Russia-DNC hack narrative almost work.
Shaltay Boltay are the Yahoo hackers that stole Huma Abedin’ State Department logins. This is important because it also separates them from being Russian government operatives.
More importantly, their own self described claim to fame was creating realities. Shaltay Boltay primary work is in Information Operations. The founder of the elusive Shaltai Boltai hacker group has been uncovered as Vladimir Anikeyev, a native Dagestani and expert in “black PR.”
It’s no secret today Comey’s FBI and the Mueller investigation were working hard to grasp at any straw they could to derail the Trump presidency. Even though they knew there was no collusion, their teams worked overtime to prove it by pushing half-truths in an invented narrative.
What brings the FBI investigators and Comey’s behavior to a collusion, harboring, and abetting threshold is they identified the leaders of the hacking groups early on, the hackers, and ignored them to hide corruption.

Was the ODNI and Comey’s FBI an accessory after the fact to the DNC Hacks and murder? – Harboring Criminals

Comey’s Russian collusion team and the Mueller probes pushed the 2016 investigations away from the criminals they were supposed to be investigating.
         The FBI, Comey, and Mueller knew Shaltay Boltay (Shaltai Boltai) were part of a higher level group. While this group worked for money, not politics, the higher-level group are extreme nationalists.
The big question if their entire history is blackmailing Russians, who are they working for in relation to the US election?
         The FBI knew this group fabricated the only basis used for a Russia election interference investigation. The FBI knew they did this from Ukraine.
The reason the FBI and Mueller knew the Russian government FSB-GRU connection to the hacks was fabricated was the leaders of Shaltay Boltay were extremely clear and public about hurting the Russian government and Russians.
         The FBI, Comey, and Mueller knew from 2014- late 2016, the indicted and ignored involved leaders and US oriented parts of Shaltay Boltay were located in Kiev, Ukraine.
Shaltay Boltay leaders were wanted criminals and worked against the Russian government 2014-2016 when they fled to Kiev. This is evidenced by the so-called Surkov hack. The emails were released through the working group Shaltay Boltay was with 2014-16.
         The FBI and Mueller had this group’s IP addresses which Mueller used in his indictments and the willing cooperation of the server company that hosted them.
“If we consider the situation from the other side, it is unclear why the FBI and related experts are talking only about our company,” said Fomenko. “After all, the U.S. intelligence report says that the hacking was staged from eight IP addresses, six of them belonging to our company (the criminals used our equipment), and two other companies being not connected with us in any way. One of them is located in the Netherlands, I don’t know about the other. But it’s all just about us. What is this? Prejudice?”-RBTH
         The FBI and Mueller refused to investigate or interview the owner of the server (King Servers) the DNC hackers used who wanted to testify. Yet, Shaltay Boltay’s IP addresses were considered key evidence anyway. Apparently, the DNC hackers owed him money.
The FBI knew the groups involved physical location and concealed it to shield them from the investigation by constantly attributing the DNC and subsequent hacks to Russia.
         The FBI and Mueller purposefully stayed away from the main group and targeted sub-groups, outliers, and used false accusations that protected the Executive branch from being dragged into the investigation. At the very least, all of this happened as the direct result of Obama’s Ukraine and Russia policies.
Shaltai Boltai’s Yevgeny Nikulin was interviewed by the FBI. According to Disobedient Media’s Adam Carter “Nikulin has stated in a letter, passed to his lawyer Martin Sadilek and reported by Moscow Times, that, after his arrest on October 5, 2016, he was visited by the FBI several times, the first of which was on 14-15 November, 2016.
From the Bell– In it, he also mentions attacks on the servers of the Democratic Party committee. Kozlovsky writes that he was engaged in them on behalf of the FSB officer, whom he calls “Ilya.” Later, the hacker began to claim that under the pseudonym “Ilya” he was supervised by FSB Major Dmitry Dokuchaev.
         The FBI investigators allegedly offered payment for information implicating Donald Trump and Vladimir Putin.
On 5/11/17 Newsweek ran an article headlined FBI PROBE INTO CLINTON EMAILS PROMPTED OFFER OF CASH, CITIZENSHIP FOR CONFESSION, RUSSIAN HACKER CLAIMS.“[They told me:] you will have to confess to breaking into Clinton’s inbox for [U.S. President Donald Trump] on behalf of [Russian President Vladimir Putin],” Nikulin wrote, according to The Moscow Times.”
         The FBI, Comey, and Mueller knew Shaltay Boltay was part of a foreign Intel structure whose goal since 2014 has been to disrupt US-Russia relations.
         The FBI knew Shaltay Boltay as part of Ukrainian CyberHunta worked for the Hillary Clinton campaign as opposition researchers through the DNC.
Alexandra Chalupa used private/public Ukrainian Cyber Intel groups Ukraine Cyber Alliance and CyberHunta(part of the Ukrainian Ministry of Information) to do opposition research. Roman Burko and Christina Dobrovolska (US State Department contractor, liaison to the US-Ukrainian Diaspora) led the groups under the Information Ministry.
         The FBI knew the main workgroup also worked in conjunction with Crowdstrike, the Atlantic Council, and members of the US Intel community. The groups were used to fabricate anti-Russian narratives for NATO and statements delivered to US Congressional committees voting on support for Ukraine.
The Daily Beast-The deputy head of its now-defunct Center for Information Security, Sergei Mikhailov, was arrested, along with two colleagues and an employee of the cybersecurity firm Kaspersky, Ruslan Stoyanov, for allegedly passing secret information to Western intelligence agencies.
         The FBI knew only Crowdstrike, Ukraine’s Cyber Alliance (RUH8) and Cyberhunta had possession of key component tools of the DNC hack that Crowdstrike’s Dimitry Alperovitch stated were like DNA evidence.
The FBI knew Crowdstrike relied on information they shared with the Ukrainian Intel groups.
         According to Wikileaks, the phishing attack on Podesta originated in Ukraine.
         The FBI and Mueller knew the groups labeled Fancy Bear/Cozy Bear along with American and British Intel community members were involved in setting up the Ukrainian Information Ministry’s murder for hire platform Myrotvorets beginning very in early 2015.
These same groups protected by the FBI worked with US & UK Intel Community superstars to set up and refine Myrotvorets. This was Ukraine’s hit-for-hire listings that named the enemies of post-Maidan Ukraine. It started with the murder of journalist Olez Buzina one month after the webplatform went live. At the time it went live, I predicted the first murder would soon follow. Unfortunately, it did.
         The FBI knows the core members responsible for all this and that can answer for it are the ones they concealed from the investigation still operate in Ukraine.
Under 18 U.S.C. § 1071, anyone who “harbors or conceals” a person to prevent their “discovery and arrest” is guilty of a crime.

TheTrump-Ukraine Servers

Servers, servers, let’s see who has the Trump-Ukraine server. I chose the following article quote from @benshapiro out of the all the rest of the barrel for the colorful language he uses. Imagine a lone DNC server determined to live its life in peace and solitude makes the arduous journey to Kiev, Ukraine. This is a story of triumph over adversity. It’s a real tear-jerker.
He begins by introducing part of the conversation between Presidents Trump and Zelensky.
 “The Phone Call
According to the transcript of the July 25 phone call between Trump and Ukrainian president Volodymyr Zelensky released by the White House, Trump asks Zelensky for a favor, “because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say Crowdstrike. . . . I guess you have one of your wealthy people. . . . The server, they say Ukraine has it. . . . They say a lot of it started with Ukraine. Whatever you can do, it’s very important that you do it if that’s possible.”
Here, Trump is referring to the baseless conspiracy theory that Russia was framed by Ukraine for the 2016 hack and subsequent release of a damaging tranche of Democratic National Committee emails, which involves a supposed “secret” DNC server being spirited away to and hidden in Ukraine. He seems to be asking Zelensky to investigate the conspiracy theory, presumably in hopes that it would remove the taint of Russian interference from his 2016 victory.”- The Two Theories of Trump’s Actions in the Ukraine Affair By BEN SHAPIRO October 25, 2019 11:01 AM-  National Review
What the wondrous barrel of articles and colorful tales ignore is this is the 21st century and your computer doesn’t need to plug directly into a server. Many people across the world use US hosting services (servers) and vice versa.
Let’s add facts into this and dispense with hyperbole.
Alexandra Chalupa told Politico part of her Oppo-research team was Ukrainian “private Intel.” She hired Ukraine’s Cyber Alliance, RUH8, and Cyberhunta (which included Shaltay Boltay at the time). These groups work for the Ukrainian Information Ministry, SBU (Ukraine’s version of the CIA), the US State Department under Obama, and are Ukraine’s front line Cyber hacking, spy, and Information Operations unit against Russia, Bernie Sanders, and Donald Trump.
Would you have foreign hackers running rampant on your servers based in the United States which fall under the direct legal purview of election law, Constitutional law, and Federal law?
Of course not. If you were in a gray area where your candidate for US President could be taken to the carpet and impeached for using foreign spy services to build the campaign, the best move would be having questionable work or workers that can be questioned on safe ground to begin with.
If you were working for another country’s spy services, would you want a direct fingerprint inside the election of a US president? Again the answer is no. The ramifications to your own country could be enormous once a better than the barrel investigative journalist gets a whiff of it.
If you do your work through a safe server in your own country, you remain anonymous, have a better chance of success, and might get a medal for it.
The above limits the number of servers in the world that could be used to just 4 or 5. Remember, security is everything. These groups are part of the Ukrainian security infrastructure and realistically would need to be able to scale up to nation-state level actions.
1.       Shaltay Boltay’s server where they stored their archive.
2.       The servers RUH8, Cyber Alliance, and Cyberhunta use.
3.       The Ministry of Information servers because all the hackers including Shaltay Boltay (credited with the DNC hack) worked for them
4.       According to the Kiev Post-Ukrainian special services looking into disappearance of servers from presidential office’s situational room because of former Ukrainian President Petr Poroshenko gutted the server room claiming the servers belonged to someone else and had to be returned. He paid for this out of his own pocket instead of Ukrainian state funds. This is almost blasphemy for a graft guy like Poroshenko. The former Ukrainian president is adamant that even though they were the most protected servers in Ukraine, no Ukraine state business was conducted on them.
The reason for this shortlist instead of a particular DNC server is their servers will catalog all their crimes. Not just the DNC hack adventure. It will also catalog all their contacts. This part is important to pursue criminal and civil investigations for crimes and damages they did to news and analytical platforms, public people, journalists, and citizens of the US, Russia, EU, as well as their own country, Ukraine.
In case you haven’t realized it yet, the sites that were hacked in association to #Propornot and lost income, jobs, or reputation, are entitled to restitution. Crimes have been committed against the American, Russian, and EU people, Democratic party members, the Trump administration, Bernie Sanders campaign 2016.
Will the FBI, ODNI, and private Intel companies be held accountable for allowing and protecting foreign spy agencies to operate freely inside US infrastructure?
The politicization of the ODNI, FBI, and CIA needs to cease. This can only be done by phasing out private money from the Intel and law enforcement game. The FBI has no business in the Intel game because the change of mandate is what corrupted a world-renown criminal investigation agency in the first place.
Next up in the series: Outing the DNC hackers
Donald Trump’s Ukraine Server- How the FBI and ODNI hacked and influenced the American psyche
Server, server, who has the Trump-Ukraine server? The answers won’t leave room for doubt on this question.
This is part one of a 3 part series showing the FBI and US Intel agency heads are complicit in the DNC hack after the fact and 2016 election interference. Early on, the FBI and Mueller found the real hackers and worked to hide them from justice and exposure in media. Without the FBI and US Intel community help, the Russia saga would have never happened and unbelievable amounts of corruption would have been exposed early on.
Part 2 will expose the identities of the DNC hackers and where they fit in the Information Operation (IO) to indict and impeach US President Donald Trump and destroy 2016 Democratic candidate Bernie Sanders as agents of Russia or under Russian influence. The US and UK Intel superstars that helped them and some of the projects they worked on including destroying US media platforms not supporting the Clinton campaign in 2016 will be exposed.
Part 3 will conclude analyzing media complicity with corporate contractors, US Intel, and law enforcement.
The only thing that matters are facts and provable evidence. 
When the NYT, 60 Minutes NY, and other outlets contacted me as the original source for what Donald Trump knows about Ukraine’s involvement in 2016 election interference and the DNC hacks, apparently they were correct. It was the only thing they got right about the events even with Pulitzer Prizes and Emmy Awards.  I’ll show why in Part 3 of the series.
Let’s start by solving the DNC hacks in a few paragraphs. If this isn’t the most conclusive evidence you’ve seen for the purpose of getting to the real hackers, don’t read any further afterward.
Shaltay Boltay (Shaltai Boltai) is the group, Robert Mueller indicted for the DNC hacks. Shaltay Boltay leaders who were in the FSB are the people Comey, Clapper, and Mueller they investigated, indicted, and proclaim guilty of the DNC hack and 2016 election influence.
The story of why Mueller and the FBI, ODNI, and NSA couldn’t prove it shows how deep corruption and criminal abetting are rooted in US government agencies and political parties today. The indicted group has a relationship with Dimitry Alperovitch and Crowdstrike, the Atlantic Council, and secondary relationships to Hillary Clinton through the DNC and the RNC through people like Senator John McCain.
Until Crowdstrike’s report late in 2016, the tools Fancy Bear used were proprietary identifiers. Even into 2017, the use of these tools was limited to Fancy Bear and Cozy Bear. These same distinct tools were used to hack the group the ODNI, FBI, and Robert Mueller identified as the DNC hacking groups, Fancy Bear/Cozy Bear.
In a security white paper entitled En Route with Sednit Part 1: Approaching the Target Version 1.0 October 2016 by ESET LLC, Shaltai Boltai was hacked by Fancy Bear in late October 2016. ESET made this attribution based on a set of specialized hacking software specific to the group Fancy Bear.
According to RFE/RLRUH8 (Ukraine Cyber Alliance) credits “mostly CyberHunta” with the Surkov e-mail theft and says it was not the result of a spear-phishing scam but rather what he describes cryptically as “special software.” He claims the malware allowed CyberHunta not only to retrieve Surkov’s e-mail but to “take the entire [Russian] presidential administration system under their control, and they gathered information right from the computers.”
This is verified by Ukraine’s SBU. “And the information that is available in these letters, and which were extracted by” Cyberhunt “, are extremely similar. That is, the methods of execution of all these things – on those documents that officially appear in the materials of criminal proceedings, “- said the head of the SBU.
Lastly,
From Forbes “For example, in October of 2016 “Fancy Bear” was accused of hacking (Shaltai Boltai) Humpty Dumpty.- Paul Roderick Gregory a contributor at CyberHunta sister publication euromaidanpress.com
What’s unique about this is Shaltay Boltay leader Anikeev “Lewis” is the actual hacker for what is known as the Surkov leaks. The hacked material was released in two parts. The first, Lewis released himself on the CyberHunta website. This hacked material was then taken directly to the Atlantic Council.
Other victims of Shaltay Boltay include the head of News Media, Aram Gabrelyanov , presenter Dmitry Kiselev , retired o􀄶cer Igor Strelkov- Girkin , presidential aide Vladislav Surkov , Prime Minister Dmitry Medvedev.
While they are not quite on the Russian FSB to-do list, they fall nicely into Ukraine’s.
         The first information dump in the Surkov hack (administrative assistant might have been hacked) Shaltay Boltay posted the information on Ukraine’s Cyberhunta website(you need a password to post on a hacker website).
         After the first information dump was released by Shaltay Boltay leader Anikeev through the CyberHunta web platform, they were authenticated by the Atlantic Council on the 25th of October, 2016.
         Anikeev was tricked into leaving Ukraine in late October by the FSB. He went to Moscow where he was arrested and charged with treason.
         Shaltay Boltay was hacked by Fancy Bear (identified by specific tools Dimitry Alperovitch said were as strong as DNA evidence) and the hacked information (2nd Surkov dump) was released by Ukraine’s CyberHunta.
Shaltay Boltay was part of CyberHunta which was why they could post material on the Ukrainian website. Ukraine’s CyberHunta and Cyber Alliance work for the Ukrainian Information Ministry as Ukrainian cyber Intel and the DNC as opposition researchers in 2016 through Roman Burko and Christina Dobrovolska.
Cyber Alliance hackers are Ukrainian nationalists that did not work directly with Shaltay Boltay. They were hired by Alexandra Chalupa. Shaltay Boltay (Mueller’s DNC hackers) was hacked by Fancy Bear in Ukraine even though according to Mueller they were Fancy Bear…from Ukraine.
From the Ukrainian hackers own webportal InformNapalm– InformNapalm volunteer intelligence community was the original publisher of the analysis and the actual dumps of Surkov’s correspondence provided by Ukrainian Cyber ​​Alliance (UCA) in October 2016 (second Surkov dump)… A few days ago, a number of Russian news agencies published a story about the arrest of FSB officers responsible for information security, the head of department at Kaspersky Lab (Department of cybercrime investigations), and one Vladimir Anikeev who testified against another FSB employee.
Anikeev is believed to be “Lewis”, the spokesperson for Anonymous International. FSB recently decided to confuse the matters by using the discovery on Anikeev’s computer of #SurkovLeaks files, which had been obtained and published by #UCA, and had already been in the public domain.
 As the speaker for #UCA, I categorically deny any connections between Ukrainian Cyber Alliance and Anonymous International. I will now try to unravel this KGB tangle.
According to RUH8 “Shaltai Boltai people post “samples” of letters of influential, but nonpublic
people, virtually without comment. And they also offer information for sale. But did any of the
allegedly sold correspondences surface anywhere? Why not? Because a complete dump would inflict a
tremendous damage on Moscow, whereas the real goal is to pull some strings and rein in a competitor for power.” .-RUH8
As you’ll see in a second, we found our DNC hackers. The same hacker (RUH8) that gave Ukraine’s CyberHunta credit for the Surkov hack and the first part of the document dump takes credit for the second document dump his group hacked from CyberHunta/Shaltay Boltay’s Anikeev after his arrest.
Notice as much as he hates Anikeev, the Ukrainian nationalist RUH8 denies a connection to the FSB regarding Shaltay Boltay’s work.
“Sometimes they get hacking help from their Russian friends, he says. “There are people there who are so angry at their own government that they are risking spy charges and passing information to us,” RUH8 explains.”- Inside The Ukrainian ‘Hacktivist’ Network Cyberbattling The Kremlin-RFERL
RUH8, the proud Russian hating Ukrainian nationalist is clear. Shaltay Boltay, its members Mueller indicted, WERE NOT working for the Russian government when this combined group hacked the 2016 US election. They were working for Ukraine.
Initial reports out of Russian media tied Mikhailov to a group of hackers in Ukraine and Thailand called Shaltay Boltay, which means Humpty Dumpty. The group is reportedly affiliated with Anonymous, who released damaging documents on high-level Russians in 2014 and the Kremlin alleges that the arrests are related to this act, as Markov told The Daily Beast that Mikhailov: “definitely controlled Shaltay Boltay,” which “cooperated with the Ukrainian SBU [security service], which is the same as working for the CIA; he worked with them, which is obviously treason.”-Paste Magazine
What if… Hillary Clinton’s go-to guy accessing the servers to see who was “leaking DNC and Team Hillary communications” was from the cyber experts Alexandra Chalupa hired for opposition research from Ukraine?
Think about this for a second because it’s a sensible scenario. Chalupa checks in with her go-to gal Christina Dobrovolska who doubles as Ukraine’s Cyber spy manager.
Christina checks to see who’s available in Ukraine and it’s the guy whose work the entire Russian election influence narrative was based on. He’s ok because he works with Ukraine’s CyberHunta. Who cares that he hacked Huma Abedin’s Yahoo account is a wanted criminal or works for a foreign Intel service.
“At the same time her aides were creating “loyalty scores”, Clinton, “instructed a trusted aide to access the campaign’s server and download the messages sent and received by top staffers. She believed her campaign had failed her—not the other way around—and she wanted ‘to see who was talking to who, who was leaking to who.”-Jonathan Allen and Amy Parnes. Shattered: Inside Hillary Clinton’s Doomed Campaign
“In particular, he says, spear-phishing — using messages that mimic those of legitimate companies along with a request and link to change personal security information — “is quite efficient.”
RUH8 credits “mostly CyberHunta” with the Surkov e-mail theft and says it was not the result of a spear-phishing scam but rather what he describes cryptically as “special software.”- RUH8 Ukraine Cyber Alliance- RFE/RL
The lights go on and the bell sounds. The DNC Russian hacker narrative begins. Que Alexandra Chalupa.
“In an interview this month, Chalupa told Politico she had developed a network of sources in Kiev and Washington, including investigative journalists, government officials and private intelligence operatives. “While her consulting work at the DNC this past election cycle centered on mobilizing ethnic communities — including Ukrainian-Americans — she said that, when Trump’s unlikely presidential campaign began surging in late 2015, she began focusing more on the research, and expanded it to include Trump’s ties to Russia, as well.”-Politico 2017 interview with Alexandra Chalupa
It turns out that Ukrainian cyber Intel RUH8’s special Russian friend in Cyberhunta is the same guy Crowdstrike, Comey, Clapper, and Mueller investigated for the DNC hack and the Yahoo hack.
There’s only one problem with the above. The Russian group Shaltay Boltay has never been caught with the Fancy Bear tools. RUH8 and Ukraine’s Cyber Alliance and Cyberhunta had them and used them and used them on Shaltay Boltay. Because the hackers outed themselves by hacking each other with Fancy Bear tools, we have the entire group and subgroups Intel operatives as Chalupa called them in Ukraine.
“So the help of the USA… I don’t know, why would we need it? We have all the talent and special means
for this. And I don’t think that the USA or any NATO country would make such sharp movements in
international politics.” We have no Need of CIA Help Ukrainian Hackers of #Surkov Leaks-RUH8 Ukraine Cyber Alliance, Cyberhunta, Shaltay Boltay, Fancy Bear, Cozy Bear
Reread RUH8’s statements. This is a guy that is dying to do a book and movie deal to finally get the acclaim he thinks he deserves. Let’s give him one- Capturing the DNC Hackers.
After everything was said and done by Comey, Clapper, and Mueller about Russian hackers and influence, Shaltay Boltay’s archives (aka Fancy Bear servers) had to be retrieved from UKRAINE.
“Anonymous International founder, who is now in jail, reported that he had stored his databases with stolen information in a Kiev apartment. Thanks to Anikeev’s testimony, the investigators found out that the information carriers (servers) with the hacked archives are stored in Kiev.”

Why did Ukrainian Intel operatives do all this?

Dimitry Alperovitch of Crowdstrike has an ongoing “Twitter buddy” relationship with Ukraine’s Cyber Alliance, RUH8, and Cyberhunta, which includes Shaltay Boltay dating back to at least 2016.
“Hey. I am the press secretary, a simple Ukrainian hacker, more precisely: we are hackers, but imagine a masked man who speaks to you. I do not do OSINT, I do not tell schoolchildren how to hack websites, I do not care about who and what agreed, I’m not an army or a hundred, I do not obey orders and do not follow a ceasefire, build democracy and fight for justice, I am a hacker, and my goal is to break!
 To break, spoil, rob, entangle, blackmail, frighten, divulge, mock and mock the defenselessness of the victims. Because I can. Hate is my name. I will harm the Russian Federation. And I do not care who you are – a liberal or a guardian, Russians must suffer. Traitors and spongers of Russian invaders must suffer. Pensioners and functionaries, Buryats and October, must suffer. If I find a way how to harm you, even for a penny, I immediately use it. Do you live in Russia? Bad luck. I will not tolerate, will not be merciful, I do not forget and do not forgive.- RUH8
C:\Users\GH\Desktop\spy for hire\CYBER TERROR PART 6 REAL TERRORISM\photos used\threat\RUH8 PROTECTING PEOPLE PRAVY SEKTOR CUTS-twitter.com-2019.04.28-01-33-28.png
Ukraine’s Cyber Alliance (RUH8) and Cyberhunta (including Shaltay Boltay) work under the flag of Dimitro Yarosh’s Pravy Sektor Ukrainian nationalism. The groups and their web platforms were started by former Pravy Sektor spokesman Sviatoslav Yurash. Yurash was also the spokesman for the 2014 EuroMaidan coup, the Ukrainian military, and is the liaison between the ultra-nationalists and the Ukrainian Diaspora through his position as Deputy Director of the Ukrainian World Congress affiliate in Kiev.
All of this started as an Influence Operation in Ukraine that resulted in the 2014 coup and subsequent move to hard Ukrainian nationalism. It bled into the United States as the 2016 election season heated up.
Suffice to say, means, motive, method, and opportunity have been established by the hackers themselves. Sources friendly to their efforts and neutral mainstream sources including RFERL verify it.
If you’re not convinced now, read no further.
         They (as a foreign Intel service) interfered in the 2016 US election.
         They, along with members of the US Intel community tried to destabilize the government in Russia and the USA.
         They shaped and promoted a false narrative that shipwrecked US and Russia relations.
         Their work helped Crowdstrike shape the Fancy Bear-Cozy Bear narrative.
         They shape the US Intel view of what’s going on in Ukraine allowing for crimes against humanity in Donbass (LNR &DNR) to go unaddressed.
         Later in the series, I’ll show these same groups (Ukraine Cyber Alliance, RUH8, Cyberhunta-Fancy Bear/Cozy Bear) were used to manufacture evidence that will be used in the #MH17 trial at the Hague in conjunction with Bellingcat.
         US Intel for hire superstars used the Fancy Bear groups in conjunction with the #Propornot project illegally to identify and take down news and commentary platforms in the US and EU that published stories against the narratives, they were developing and promoting.
         They illegally targeted people expressing social and political opinions. All of this was with the blessing of period ODNI and FBI leadership.

The Disproven Conspiracy Theories about the DNC Hack and 2016 Russian Election Interference

The disproven conspiracy theories about Trump-Russia and Russian election interference is the ones that were proven baseless in court, not the court of opinion. The evidence was fabricated or just not there, to begin with. The FBI’s criminality hiding the real criminals is examined below.
But, these fake stories are still promulgated in an ongoing effort to sabotage the 2020 election cycle and tear the US social fabric apart. Examples of this are- Why Trump Still Believes (wrongly) that Ukraine Hacked the D.N.C.The Conspiracy Theory So Far Out There Even Trump’s Biggest Defenders Are Walking Away From It and @ScottShaneNYT How a Fringe Theory About Ukraine Took Root in the White House.

This article is going to open up the potentially wide-ranging crimes at the FBI aiding and abetting criminals for purely political reasons.

 There are only two possible reactions you can have to this. There are some people that will react emotionally or politically and the consequences be damned. As long as it happens to someone they are sure they hate, why care?
When precedents are set, they work both ways. When political leaders like Trump or Sanders are tried in the court of opinion and declared loyal to a foreign government because the other party doesn’t like them. The method is set for every other person that graces the social or political stage.
Look further into the distance and realize this flows downhill. If it’s fine for political leaders, don’t be surprised when it’s your turn at bat because someone doesn’t like you. This kind of lawlessness spreads quickly as we’ve seen since 2016.
Or maybe it’s time to objectively look at the facts and see where the evidence leads in an unbiased way. That’s it. That’s all.
All of the common knowledge stories rely on readers to assume ODNI head James Clapper’s 2017 report was conclusive and the Mueller investigations were successful. Neither of them was, nor could they ever be.
James Clapper was responsible for the evidence Intel agencies presented in the January 2017 report trying to hamstring the newly elected Trump administration for political reasons.
If ODNI chief Clapper believed the 17 Intel Agency strong report, why couldn’t he stand by the same fact-base in 2018? Clapper no longer cited his iron-clad evidence he presented as proof of Russian interference or the DNC hacks.
In 2018, former ODNI head Clapper’s solid proof of Russian interference in the 2016 election became 78,000 people voted against Hillary Clinton and she lost Wisconsin, Pennsylvania, and Michigan. Notice Jimmy Clapper wasn’t quoting his solid gold January 2017 report anymore.
Who were these 78,000 Clinton haters that cost the DNC the election in 2016?
Back when there was a real Clinton administration, First Lady Hillary Rodman Clinton demanded the US get involved in the Bosnian war. Hillary Clinton supported KLA terrorists and extremists through a bombing campaign. US bombers drove the families of these voters into the arms of murderers so extreme, they were cutting organs out of living people to sell on the black market. Clinton had them taken off the official terrorist lists to the frustration of negotiators trying to make peace during the war.
The Serbian Diaspora voters in Wisconsin, Michigan, and Pennsylvania usually votes for the Democratic ticket, that is, unless your name is Hillary Clinton. This was a bloc vote against Hillary Clinton who they hold responsible for the murder of their families at the hand of terrorists. It’s why Clinton ignored those states campaigning. Clinton mistakenly thought having all the major Diaspora votes in swing-states would be enough.
The problem with the evidence of the Russian government interference in 2016 is it had to be manufactured and repeated by a compliant media to exist.
What will be shown through mainstream sources is the Russian FSB and GRU attacks on the American psyche was produced by domestic and foreign criminals that were hostile to the Russian government for nearly a decade before the DNC hacks. The hackers who are IO specialists were targeting Russian politics, not the US.
Robert Mueller and James Comey are accessories after the fact. They tried feverishly and unsuccessfully to incriminate the wrong people because the facts expose large scale political corruption well beyond what is currently known and it all revolves around Ukraine.
According to PNAS (Proceedings of the National Academy of Sciences of the United States of America) in a study titled Assessing the Russian Internet Research Agency’s impact on the political attitudes and behaviors of American Twitter users in late 2017 there was no Russian impact on the election and they used 6 research standards to measure it.
If you don’t trust official studies done under the Trump administration tenure, Jon Solomon had this to write after uncovering 2016-17 FBI memos: The piecemeal release of FBI files in the Russia collusion investigation has masked an essential fact: James Comey’s G-men had substantially debunked the theory that Donald Trump’s campaign conspired with Moscow by the time the 45th president was settling into the Oval Office, according to declassified memos, court filings and interviews.
And that means a nascent presidency and an entire nation were put through two more years of lacerating debate over an issue that was mostly resolved in January 2017 inside the bureau’s own evidence files. The proof is now sitting in plain view.- FBI’s Russia collusion case fell apart in first month of Trump presidency, memos show
This is why James Clapper changed his tune so radically. When you look at the above, Hillary was taken out behind the woodshed in 2016 for good reasons. Ask yourself what does it have to do with Russians, Russia, or Vladimir Putin or Donald Trump and Bernie Sanders? The only scenario all the evidence supports is Hillary Clinton stepped on a proverbial rake and made herself unelectable in 2016.

FBI, CIA, and ODNI criminal conspiracy against the United States

Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution– Information available as of 29 December 2016 was used in the preparation of this product.
Scope
This report includes an analytic assessment drafted and coordinated among The Central Intelligence Agency (CIA), The Federal Bureau of Investigation (FBI), and The National Security Agency (NSA), which draws on intelligence information collected and disseminated by those three agencies. It covers the motivation and scope of Moscow’s intentions regarding US elections and Moscow’s use of cyber tools and media campaigns to influence US public opinion. The assessment focuses on activities aimed at the 2016 US presidential election and draws on our understanding of previous Russian influence operations. When we use the term “we” it refers to an assessment by all three agencies.
I refuse to give James Clapper, James Comey, John Brennan, or Robert Mueller the benefit of the doubt and call them ignorant little men.  They acted with full knowledge of what they were doing. Along with all of the agencies’ department heads, these men used their offices trying to try to overthrow the election of the President of the United States and change the fabric of US society by creating irreparable political and social division.
American officials, sworn to defend the USA used their power to fabricate a political narrative they called Intelligence to create their own foreign policy (Russia/Ukraine)and domestic policy(including media, political norms and policy) for the United States.
As late as 2018, #JamesComey was clear when he dismissed a House intelligence committee report that found no collusion between Russia and the Trump campaign as a “political document”. When the ODNI report was written, he knew there was no evidence of Donald Trump-Russia collusion. They all knew.
ODNI Clapper, FBI Comey, John Brennan and Special Counsel Mueller knew in 2017 that the US Intel community conceded there was no coordinated effort by Russia to influence the 2016 election months before.
They successfully divided the United States socially and politically in ways Orwell would be proud of.

Why did US political activism by sworn officials cross a bridge too far?

It all started falling into place after 9-11. Congress decided the FBI needed to get into the Intelligence business. At the time, the FBI fought the changes saying it would hurt their criminal investigation mandate. Because the CIA legally can’t operate domestically, the FBI was rebooted to do the job.
The 2000s version of the FBI was right. The FBI went from being the world’s premier criminal investigation agency to one of the worst imitations of a private sector  CIA domestically and around the world.
The same man the FBI called a nuisance and danger to national security after the twin towers collapsed in New York networked intelligently enough to become the trainer of choice for the FBI, Homeland Security, CIA, NATO, et al.
This new mandate from Congress created over 5000 new Intel positions right away inside the FBI that were filled with outside contractors.
Today’s Intel agency leaders including Homeland Security and FBI department heads were his students from the early 2000s onward. The rise and risk of Intelligence for hire is detailed in U.S. Intelligence Crisis Poses a Threat to the World (Part 1)
This particular agency trainer almost singlehandedly started the US side of the social-political Russian collusion storyline by himself labeling anyone outside his narrative Kremlin trolls and pro-Russian influencers.  He made looking for pro-Russian collaborators fashionable in a post-2016 world in a way that would make Joe McCarthy tingly.
He personally is why media came under so much scrutiny and groups like Propornot were formed to destroy media that didn’t agree to the McCarthy-like narrative, alternative media sources that spoke against the Clinton campaign and post-2014 Ukraine. Watch as it starts again as the 2020 election cycle heats up.
Along with the other US Intel actors, he aided and abetted the murder of journalists in Ukraine by providing the tools, training, means, and method to set it up. It’s quite an embarrassment for Brennan, Comey, Clapper, Mueller, and the agencies, et al.
Imagine, one of the rock-stars of modern Intel being found in that position after your agencies were trained to look at information like him for over a decade. It’s no wonder they hand-fed the current Russia policy narrative he developed to MSM.
In part2, I’ll detail who he is, many of the crimes, along with the real identities of the DNC hackers.
Fusion GPS and Patterning the Trump-Sanders Accusations and Russia Investigation
If the ODNI and FBI engaged in consistent patterns of activity for political reasons that tear the societal fabric of the USA to support corruption that destroy the lives of US citizens, change foreign policy, and erode citizen’s rights, should it be investigated?
It started with Bernie Sanders during the 2016 primaries. This bled into the 2020 primaries.
Sander’s accusations started with “Adam Parkhomenko, a former aide to Hillary Clinton who has repeatedly suggested that Senator Bernie Sanders owes his popularity to Russian support, backed the attorney’s abortive bid for president.”- NYMag
Sander’s accusations of Russia collusion ended with –“A 37-page indictment resulting from special counsel Robert Mueller’s investigation shows that Russian nationals and businesses also worked to boost the campaigns of Vermont Sen. Bernie Sanders and Green party nominee Jill Stein in an effort to damage Democrat Hillary Clinton”-USA Today
Robert Mueller’s investigation into Bernie Sanders started with a tweeted accusation. Most of the Russian nationals not named were publishers and journalists that support Bernie Sanders and were listed by the FBI trainer who started accusing American web portals of being influencers for the Russian government.

Fusion GPS and the Steele Dossier

Glenn Simpson and Peter Fritsch, the co-founders of the private investigative firm Fusion GPS never tried to vet any of the information Christopher Steele gave them in the infamous and tantalizing Steele Dossier.
The closest anyone has come to a real source is an unknown Russian émigré in the US provided the narrative for Christopher Steele (foreign Intel agent) about events he/she had no first-hand knowledge of.
“Yet, Simpson allegedly acknowledged that most of the information Fusion GPS and British intelligence operative Christopher Steele developed did not come from sources inside Moscow. “Much of the collection about the Trump campaign ties to Russia comes from a former Russian intelligence officer (? not entirely clear) who lives in the U.S.,” Ohr scribbled in his notes.”- The Hill
Is it possible for investigative journalists like Simpson and Fritsch not be even remotely curious about the legitimacy of such scandalous information? This Intel is about an elected US President and they claim they were acting patriotically.
Fusion GPS Founders On Russian Efforts To Sow Discord: ‘They Have Succeeded’. This is quite a statement considering when asked, they admitted they knew absolutely nothing about Steele’s politically motivated fiction.
It’s easy to see why such an appalling politically driven fantasy fell apart after it was given a real examination. But, that’s not the point.
Simpson and Fritsch turned around and gave the Steele Dossier to Republican Senator John McCain (the anti-Trump), knowing full well if he acted in character the Dossier would be made public.  Why McCain’s office? The answer is included below.
“The Washington Times first disclosed the document on April 25, 2017. Republicans later told the Justice Department the filing should have set off alarm bells inside the FBI about Mr. Steele’s credibility, given his admission he had accepted gossip.”-The Washington Times
“The top judge on the federal court overseeing the U.S. government’s surveillance activities accused the FBI on Tuesday of providing false and misleading information about Carter Page in applications to wiretap the former Trump campaign adviser.”– The National Interest
“Before evaluating the media component of this scandal, the FBI’s gross abuse of its power – its serial deceit – is so grave and manifest that it requires little effort to demonstrate it. In sum, the IG Report documents multiple instances in which the FBI – in order to convince a FISA court to allow it spy on former Trump campaign operative Carter Page during the 2016 election – manipulated documents, concealed crucial exonerating evidence, and touted what it knew were unreliable if not outright false claims.
If you don’t consider FBI lying, concealment of evidence, and manipulation of documents in order to spy on a U.S. citizen in the middle of a presidential campaign to be a major scandal, what is?”– The Intercept

ODNI, FBI Hacked and Influenced the American Psyche

Throughout the entire hack and election influence saga US Intel officials acted like spokesmodels for Ukrainian –American Diaspora leader Alexandra Chalupa. They constantly acted for the benefit of private citizen groups and companies who wanted to change US foreign policy and the fabric of society in the USA.
The following is from a man that knows the facts. How can you get such a senior position otherwise? Here’s his big media sound bite;
“FEINSTEIN: And what would those goals have been?
PRIESTAP: I think the primary goal, in my mind, was to sow discord, and to try to delegitimize our free and fair election process. I also think another of their goals, which the entire United States intelligence community stands behind, was to denigrate Secretary Clinton and to try to help then — current President Trump.”- Vox
“Russia, for years, has conducted influence operations targeting our elections,” an FBI agent told Congress on Wednesday. But what made 2016 different was the degree of interference, facilitated by the Internet, said Bill Priestap, the assistant director of the FBI’s Counterintelligence Division.”.-(CNSNews.com)
And here are Bill Priestap’s conclusions after the media turn away and he’s forced to put on his big boy pants and own up to the evidence the FBI has after years of investigation.
“Further, all three witnesses in that hearing—Ms.Manfra, Dr. Files, and FBI Assistant Director for Counterintelligence Bill Priestap—agreed that they had no evidence that votes themselves were changed in any way in the 2016 election.”- REPORT OF THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE ON RUSSIAN ACTIVE MEASURES CAMPAIGNS AND INTERFERENCE IN THE 2016 U.S. ELECTION VOLUME 1: RUSSIAN EFFORTS AGAINST ELECTION INFRASTRUCTURE WITH ADDITIONAL VIEWS
Therein lays the crux of the problem. The FBI wanted the election interference story to resonate publically but under oath, there was never any evidence.
According to the IG Report, FBI leaders, lawyers, and investigators were pulling out all stops to derail Donald Trump before and after the 2016 election. How did this organized, continuous, multi-faceted, and multi-event war play on the American psyche? You tell me.
FBI Tried to Influence the Trump Campaign“While the results of any physical searches related to Page are unknown, what is known is that federal spying on the Trump campaign through Page went further. Prior to the FISA surveillance orders, the FBI tasked informant Stefan Halper with targeting Page. (Another agency may have as well.) The IG report revealed that in targeting Page, Halper sought specific details from Page related to the Trump campaign, and fed Page unsolicited (and potentially illegal) advice concerning campaign strategy.”-The Federalist
The only thing to consider is the FBI may have conducted the biggest set of serial crimes of this decade by a law enforcement agency.
This effectively divided every American on a social and political basis. It wasn’t a single event but a continuing policy surrounding the election, foreign policy, and the lengths federal investigators could go to hamstring the executive branch for political reasons.
Before the December 2016 ODNI-FBI GRIZZLY STEPPE – Russian Malicious Cyber Activity JAR, there was no proof of Russian intervention except what came out of the Clinton camp. James Comey denied it. After the ODNI JAR, there was no evidence of Russian intervention in the 2016 election.
The report itself and the actions surrounding it were nothing short of a successful politically charged foreign policy intervention by the FBI and ODNI. How can I say this?
Mueller indicted a Russian company called Concord Management & Consulting LLC for being the vehicle the Russian government used to interfere in the 2016 election. All the information Robert Mueller, James Comey, and James Clapper had to go on came from the indicted DNC hacking group themselves.
After establishing this, we’ll look at the ongoing relationship between the investigators and the criminal hacking groups to reshape American politics, cover-up enormous corruption in the Obama administration, Clinton campaign, and hamstring an elected US President.
The other company called the Internet Research Agency was part of Concord Management.
“In 2014, according to Russian media, Internet Research Ltd. (Russian: «Интернет исследования») was founded in March 2014, joined IRA’s activity. The newspaper Novaya Gazeta reported that this company is a successor of Internet Research Agency Ltd. Internet Research Ltd. is considered to be linked to Yevgeny Prigozhin, head of the holding company Concord Management and Consulting. The “Trolls of Olgino” are considered to be his project. As of October 2014, the company belonged to Mikhail Bystrov, who had been the head of the police station at Moscow district of Saint Petersburg.
Russian media point out that according to documents, published by hackers from Anonymous International, Concord Management is directly involved with trolling administration through the agency. Researchers cite e-mail correspondence, in which Concord Management gives instructions to trolls and receives reports on accomplished work. According to journalists, Concord Management organized banquets in the Kremlin and also cooperated with Voentorg and the Russian Ministry of Defense.”-Wikipedia
This information is well documented enough to have an almost accurate Wikipedia listing barring one glaring point Mueller, Comey, and Clapper needed to ignore to build their Trump-Russia collusion, Russian election interference, and Russian hacking narrative.
Scott Humor at the Saker.is researched the Internet Research Agency extensively. In an article entitled “A Brief History of the Kremlin Trolls,” he shows clearly the Internet Research Agency only existed on paper. Even then, it ceased to exist in 2015. It was liquidated and the company emerged as a construction retail company called TEKA.
This brings us to the foreign policy objective the US Intel community and US Intel agencies hacked the American psyche very successfully to reach:
“On 29 December 2016, the White House accused and sanctioned the FSB and several other Russian companies for what the US intelligence agencies said was their role in helping the Russian military intelligence service, the Main Intelligence Directorate (GRU) disrupt and spread disinformation during the 2016 US presidential election. In addition, the State Department also declared 35 Russian diplomats and officials persona non grata and denied Russian government officials access to two Russian-owned installations in Maryland and New York.”- Wikipedia
Here’s the fun part. Everything we know about 2016 Russian involvement stems from this same small group that ODNI and FBI had to embellish by magnitudes to link them to a Russian government operation and then indict.
While they were the hackers and Information Operators the FBI investigated and Robert Mueller indicted, the hacking groups weren’t working for the Russian government for the Yahoo hack or the DNC hack and 2016election hacks.
Dmitry Dokuchaev used his position to commit crimes against Russia and the USA which helped the FBI to build the one narrative they needed to fabricate official Russian government involvement.
         U.S. v. Dmitry Dokuchaev, et al.
         “Dokuchaev is a former hacker from Yekaterinburg. He was reportedly blackmailed into joining the FSB, Russia’s domestic intelligence agency, after his private exploits became known to the service, but then built a successful career, rising to the rank of major. The Russian investigation appears to link him to a group called Shaltai Boltai, or Humpty Dumpty, which broke into electronic mailboxes, mostly of Russian officials and business people, obtained compromising information about them and then either sold or published it. The group’s work was a combination of blackmail, competitive intelligence and public relations; Dokuchaev’s alleged role was to direct the group toward particular victims and cover up its activities while pretending to investigate it.”- Bloomberg- What the Yahoo Hack Says About Russian Spies-The 2014 hack appears to have been a business scheme run by Russian intelligence officers
The FSB agency mandate is limited by law to work inside Russia, not outside. This alone makes it illegal for the FSB to engage in state-level espionage and hacking operations outside.
The FSB has an incredible amount of legal authority to surveil all information passed on or through Russian servers.
Jeff Carr noted the Russian Law on the FSB (article 15) states that “all individuals and legal entities in Russia, providing postal services, telecommunications of all kinds, including systems, data communication, satellite communications, are obliged at the request of the Federal Security Service to include in the extra hardware equipment and software, as well as create other conditions necessary for the operational and technical measures by the Federal Security Service.”
And yet;
In case you missed it, the FSB through Dmitry Dokuchaev’s Shaltay Boltay was accused of illegally hacking accounts of Russian officials. Why would the FSB hack these officials it legally had almost unlimited jurisdiction to the information without hacking?
For anyone clinging to the Yahoo or DNC hacks with a purely political mindset; this is the same as walking into a bank vault with $1 billion dollars in it. You know you have the legal right to walk away with any or all of it. But, just for giggles, you hire a foreign criminal to rob the place which makes you liable for bank robbery, conspiracy, and treason.
And in the real world case of Yahoo, you get caught because the Canadian hacker you illegally hired for the Yahoo hack broke the Canadian criminal code of silence when he testified against you.
To put it delicately, this would have to be the most inept crime of all time. For this to be true, Dokuchaev must have just fallen off the turnip truck and hit his head. Got whacked with the ole’ ugly stick at the same time he stepped on a rake as he was laughed at by a 12-year-old girl who wound up and kicked him in the…….Seriously? That’s as insulting as it is injurious.
Instead, what we have is a group of Russian criminals (Shaltai Boltai) who are not working for the Russian government and continually try to hack Russian officials for blackmail. According to Stratfor, “In a 2015 interview, the leader of Shaltai Boltai, code-named “Lewis,” said his group was driven purely by money, not ideology… The narrative linking Shaltai Boltai to the FSB officers came just three days after the initial stories suggesting the FSB officers were the sources of leaks to U.S. intelligence.”
But were Dokuchaev and Shaltai Boltai (Shaltay Boltay) feeding US Intelligence information? If so, what kind of information?
The “Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution” the Office of the Director of National Intelligence ODNI quotes Shaltay Boltay because this group is the primary source of information about both events because they created what we know about them.

Dokuchaev, Shaltay Boltay, the FBI, and Robert Mueller

Summary:
The FBI interviewed members of Shaltay Boltay groups and asked for help writing the 2016 election hacking and influence story. Shaltay Boltay could play the heroes and the villains. They were heroes because they created the influence story about a non-existent company that no one could find that Putin ordered to influence the 2016 election in favor of Donald Trump.
They were the villains because they were the DNC hackers. If Shaltay Boltay cooperated to implicate Trump and Putin, US citizenship and jobs were waiting for them.
Dokuchaev and his working group Shaltai Boltai (Shaltay Boltay), otherwise known as Anonymous International or Humpty Dumpty  are the source for everything known about the Russian Internet Agency (IRA), Russian election interference, and provides the Russian FSB-GRU connection through Dokuchaev needed to make the Russia-DNC hack narrative almost work.
Shaltay Boltay are the Yahoo hackers that stole Huma Abedin’ State Department logins. This is important because it also separates them from being Russian government operatives.
More importantly, their own self described claim to fame was creating realities. Shaltay Boltay primary work is in Information Operations. The founder of the elusive Shaltai Boltai hacker group has been uncovered as Vladimir Anikeyev, a native Dagestani and expert in “black PR.”
It’s no secret today Comey’s FBI and the Mueller investigation were working hard to grasp at any straw they could to derail the Trump presidency. Even though they knew there was no collusion, their teams worked overtime to prove it by pushing half-truths in an invented narrative.
What brings the FBI investigators and Comey’s behavior to a collusion, harboring, and abetting threshold is they identified the leaders of the hacking groups early on, the hackers, and ignored them to hide corruption.

Was the ODNI and Comey’s FBI an accessory after the fact to the DNC Hacks and murder? – Harboring Criminals

Comey’s Russian collusion team and the Mueller probes pushed the 2016 investigations away from the criminals they were supposed to be investigating.
         The FBI, Comey, and Mueller knew Shaltay Boltay (Shaltai Boltai) were part of a higher level group. While this group worked for money, not politics, the higher-level group are extreme nationalists.
The big question if their entire history is blackmailing Russians, who are they working for in relation to the US election?
         The FBI knew this group fabricated the only basis used for a Russia election interference investigation. The FBI knew they did this from Ukraine.
The reason the FBI and Mueller knew the Russian government FSB-GRU connection to the hacks was fabricated was the leaders of Shaltay Boltay were extremely clear and public about hurting the Russian government and Russians.
         The FBI, Comey, and Mueller knew from 2014- late 2016, the indicted and ignored involved leaders and US oriented parts of Shaltay Boltay were located in Kiev, Ukraine.
Shaltay Boltay leaders were wanted criminals and worked against the Russian government 2014-2016 when they fled to Kiev. This is evidenced by the so-called Surkov hack. The emails were released through the working group Shaltay Boltay was with 2014-16.
         The FBI and Mueller had this group’s IP addresses which Mueller used in his indictments and the willing cooperation of the server company that hosted them.
“If we consider the situation from the other side, it is unclear why the FBI and related experts are talking only about our company,” said Fomenko. “After all, the U.S. intelligence report says that the hacking was staged from eight IP addresses, six of them belonging to our company (the criminals used our equipment), and two other companies being not connected with us in any way. One of them is located in the Netherlands, I don’t know about the other. But it’s all just about us. What is this? Prejudice?”-RBTH
         The FBI and Mueller refused to investigate or interview the owner of the server (King Servers) the DNC hackers used who wanted to testify. Yet, Shaltay Boltay’s IP addresses were considered key evidence anyway. Apparently, the DNC hackers owed him money.
The FBI knew the groups involved physical location and concealed it to shield them from the investigation by constantly attributing the DNC and subsequent hacks to Russia.
         The FBI and Mueller purposefully stayed away from the main group and targeted sub-groups, outliers, and used false accusations that protected the Executive branch from being dragged into the investigation. At the very least, all of this happened as the direct result of Obama’s Ukraine and Russia policies.
Shaltai Boltai’s Yevgeny Nikulin was interviewed by the FBI. According to Disobedient Media’s Adam Carter “Nikulin has stated in a letter, passed to his lawyer Martin Sadilek and reported by Moscow Times, that, after his arrest on October 5, 2016, he was visited by the FBI several times, the first of which was on 14-15 November, 2016.
From the Bell– In it, he also mentions attacks on the servers of the Democratic Party committee. Kozlovsky writes that he was engaged in them on behalf of the FSB officer, whom he calls “Ilya.” Later, the hacker began to claim that under the pseudonym “Ilya” he was supervised by FSB Major Dmitry Dokuchaev.
         The FBI investigators allegedly offered payment for information implicating Donald Trump and Vladimir Putin.
On 5/11/17 Newsweek ran an article headlined FBI PROBE INTO CLINTON EMAILS PROMPTED OFFER OF CASH, CITIZENSHIP FOR CONFESSION, RUSSIAN HACKER CLAIMS.“[They told me:] you will have to confess to breaking into Clinton’s inbox for [U.S. President Donald Trump] on behalf of [Russian President Vladimir Putin],” Nikulin wrote, according to The Moscow Times.”
         The FBI, Comey, and Mueller knew Shaltay Boltay was part of a foreign Intel structure whose goal since 2014 has been to disrupt US-Russia relations.
         The FBI knew Shaltay Boltay as part of Ukrainian CyberHunta worked for the Hillary Clinton campaign as opposition researchers through the DNC.
Alexandra Chalupa used private/public Ukrainian Cyber Intel groups Ukraine Cyber Alliance and CyberHunta(part of the Ukrainian Ministry of Information) to do opposition research. Roman Burko and Christina Dobrovolska (US State Department contractor, liaison to the US-Ukrainian Diaspora) led the groups under the Information Ministry.
         The FBI knew the main workgroup also worked in conjunction with Crowdstrike, the Atlantic Council, and members of the US Intel community. The groups were used to fabricate anti-Russian narratives for NATO and statements delivered to US Congressional committees voting on support for Ukraine.
The Daily Beast-The deputy head of its now-defunct Center for Information Security, Sergei Mikhailov, was arrested, along with two colleagues and an employee of the cybersecurity firm Kaspersky, Ruslan Stoyanov, for allegedly passing secret information to Western intelligence agencies.
         The FBI knew only Crowdstrike, Ukraine’s Cyber Alliance (RUH8) and Cyberhunta had possession of key component tools of the DNC hack that Crowdstrike’s Dimitry Alperovitch stated were like DNA evidence.
The FBI knew Crowdstrike relied on information they shared with the Ukrainian Intel groups.
         According to Wikileaks, the phishing attack on Podesta originated in Ukraine.
         The FBI and Mueller knew the groups labeled Fancy Bear/Cozy Bear along with American and British Intel community members were involved in setting up the Ukrainian Information Ministry’s murder for hire platform Myrotvorets beginning very in early 2015.
These same groups protected by the FBI worked with US & UK Intel Community superstars to set up and refine Myrotvorets. This was Ukraine’s hit-for-hire listings that named the enemies of post-Maidan Ukraine. It started with the murder of journalist Olez Buzina one month after the webplatform went live. At the time it went live, I predicted the first murder would soon follow. Unfortunately, it did.
         The FBI knows the core members responsible for all this and that can answer for it are the ones they concealed from the investigation still operate in Ukraine.
Under 18 U.S.C. § 1071, anyone who “harbors or conceals” a person to prevent their “discovery and arrest” is guilty of a crime.

TheTrump-Ukraine Servers

Servers, servers, let’s see who has the Trump-Ukraine server. I chose the following article quote from @benshapiro out of the all the rest of the barrel for the colorful language he uses. Imagine a lone DNC server determined to live its life in peace and solitude makes the arduous journey to Kiev, Ukraine. This is a story of triumph over adversity. It’s a real tear-jerker.
He begins by introducing part of the conversation between Presidents Trump and Zelensky.
 “The Phone Call
According to the transcript of the July 25 phone call between Trump and Ukrainian president Volodymyr Zelensky released by the White House, Trump asks Zelensky for a favor, “because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say Crowdstrike. . . . I guess you have one of your wealthy people. . . . The server, they say Ukraine has it. . . . They say a lot of it started with Ukraine. Whatever you can do, it’s very important that you do it if that’s possible.”
Here, Trump is referring to the baseless conspiracy theory that Russia was framed by Ukraine for the 2016 hack and subsequent release of a damaging tranche of Democratic National Committee emails, which involves a supposed “secret” DNC server being spirited away to and hidden in Ukraine. He seems to be asking Zelensky to investigate the conspiracy theory, presumably in hopes that it would remove the taint of Russian interference from his 2016 victory.”- The Two Theories of Trump’s Actions in the Ukraine Affair By BEN SHAPIRO October 25, 2019 11:01 AM-  National Review
What the wondrous barrel of articles and colorful tales ignore is this is the 21st century and your computer doesn’t need to plug directly into a server. Many people across the world use US hosting services (servers) and vice versa.
Let’s add facts into this and dispense with hyperbole.
Alexandra Chalupa told Politico part of her Oppo-research team was Ukrainian “private Intel.” She hired Ukraine’s Cyber Alliance, RUH8, and Cyberhunta (which included Shaltay Boltay at the time). These groups work for the Ukrainian Information Ministry, SBU (Ukraine’s version of the CIA), the US State Department under Obama, and are Ukraine’s front line Cyber hacking, spy, and Information Operations unit against Russia, Bernie Sanders, and Donald Trump.
Would you have foreign hackers running rampant on your servers based in the United States which fall under the direct legal purview of election law, Constitutional law, and Federal law?
Of course not. If you were in a gray area where your candidate for US President could be taken to the carpet and impeached for using foreign spy services to build the campaign, the best move would be having questionable work or workers that can be questioned on safe ground to begin with.
If you were working for another country’s spy services, would you want a direct fingerprint inside the election of a US president? Again the answer is no. The ramifications to your own country could be enormous once a better than the barrel investigative journalist gets a whiff of it.
If you do your work through a safe server in your own country, you remain anonymous, have a better chance of success, and might get a medal for it.
The above limits the number of servers in the world that could be used to just 4 or 5. Remember, security is everything. These groups are part of the Ukrainian security infrastructure and realistically would need to be able to scale up to nation-state level actions.
1.       Shaltay Boltay’s server where they stored their archive.
2.       The servers RUH8, Cyber Alliance, and Cyberhunta use.
3.       The Ministry of Information servers because all the hackers including Shaltay Boltay (credited with the DNC hack) worked for them
4.       According to the Kiev Post-Ukrainian special services looking into disappearance of servers from presidential office’s situational room because of former Ukrainian President Petr Poroshenko gutted the server room claiming the servers belonged to someone else and had to be returned. He paid for this out of his own pocket instead of Ukrainian state funds. This is almost blasphemy for a graft guy like Poroshenko. The former Ukrainian president is adamant that even though they were the most protected servers in Ukraine, no Ukraine state business was conducted on them.
The reason for this shortlist instead of a particular DNC server is their servers will catalog all their crimes. Not just the DNC hack adventure. It will also catalog all their contacts. This part is important to pursue criminal and civil investigations for crimes and damages they did to news and analytical platforms, public people, journalists, and citizens of the US, Russia, EU, as well as their own country, Ukraine.
In case you haven’t realized it yet, the sites that were hacked in association to #Propornot and lost income, jobs, or reputation, are entitled to restitution. Crimes have been committed against the American, Russian, and EU people, Democratic party members, the Trump administration, Bernie Sanders campaign 2016.
Will the FBI, ODNI, and private Intel companies be held accountable for allowing and protecting foreign spy agencies to operate freely inside US infrastructure?
The politicization of the ODNI, FBI, and CIA needs to cease. This can only be done by phasing out private money from the Intel and law enforcement game. The FBI has no business in the Intel game because the change of mandate is what corrupted a world-renown criminal investigation agency in the first place.
Next up in the series: Outing the DNC hackers

Pro Tip: Mentally Replace All Uses of “Conspiracy Theorist” with “Iraq Rememberer”

By Caitlin Johnstone

Source

Powel Iraq 3c62d

I watched the film Official Secrets the other day, which I highly recommend doing if you want to rekindle your rage about the unforgivable evil that was the Iraq invasion.

Which is a good thing to do, in my opinion. Absolutely nothing was ever done to address the fact that a million people were murdered with the assistance of government lies just a few short years ago; no new laws were passed mandating more government transparency or accountability with its military operations, no war crimes tribunals took place, no new policies were put into place. No one even got fired. In fact we’ve seen the exact opposite: the people responsible for unleashing that horror upon our species have been given prestigious jobs in government and media and the US government is currently collaborating with the UK to set the legal precedent for charging under the Espionage Act any journalist in the world who exposes US war crimes.

The corrupt mechanisms which gave rise to the Iraq invasion still exist currently, stronger than ever, and its consequences continue to ravage the region to this very day. The Iraq war isn’t some event that happened in the past; everything about it is still here with us, right now. So we should still be enraged. You don’t forgive and forget something that hasn’t even stopped, let alone been rectified.

Apart from the howling rage surging through my veins during the film, the other thing I experienced was the recurring thought, “This was a conspiracy. This is the thing that a conspiracy is.”

And, I mean, of course it is. How weird is it that we don’t use that word to describe what the architects of that war did? Conspiracy is defined as “a secret plan by a group to do something unlawful or harmful.” From the secret plan between the NSA and GCHQ to spy on and blackmail UN members into supporting the illegal invasion which is the subject of Official Secrets, to the mountain of other schemes and manipulations used by other government bodies to deceive the world about Iraq, it’s absolutely insane that that word is never used to describe the conspiracy within the Bush and Blair governments to manufacture the case for war.

The engineering of the Iraq war was a conspiracy, per any conceivable definition. So why isn’t that word reflexively used by everyone who talks about it?

Easy. Because we haven’t been trained to.

The use of the word “conspiracy” is studiously avoided by the narrative managers of the political/media class who are tasked with the assignment of teaching us how to think about our world, except when it is to be employed for its intended and authorised use: smearing skeptics of establishment narratives. The pejorative “conspiracy theory” has been such a useful weapon in inoculating the herd from dissident wrongthink that the propagandists do everything they can to avoid tainting their brand, even if it means refraining from using words for the things that they refer to.

This is why the word “collusion” was continuously and uniformly used throughout the entire Russiagate saga, for example. It was a narrative about a secret conspiracy between the highest levels of the US government and the Russian government to subvert the interests of the American people, yet the word “conspiracy” was meticulously replaced with “collusion” by everyone peddling that story.

Max Blumenthal

@MaxBlumenthal

A self-described “former Rolling Stone fact-checker” called me (what else?) a “conspiracy theorist.” But when challenged, this was the best she could do. 🤣 https://twitter.com/MeredithLClark/status/1200447148858445827 

Syria narrative managers on Twitter have been in meltdown for a week ever since the Rolling Stone podcast Useful Idiots featured oppositional journalist Max Blumenthal talking about the US-centralized empire’s involvement in the Syrian war and its pervasive propaganda campaign against that nation. The entire site has been swarming with high-visibility blue-checkmarked thought police demanding the heads of the show’s hosts Matt Taibbi and Katie Halper for giving this evil “conspiracy theorist” a platform to say we’re being deceived about yet another US-led regime change intervention in yet another Middle Eastern nation.

Narrative managers use the “conspiracy theorist” pejorative to shove skepticism of establishment narratives into the margins of political discourse, far away where it can’t contaminate the mainstream herd. Whenever you see a dissenting interpretation of events getting too close to mainstream circles, as with Blumenthal appearing on a Rolling Stone podcast, Tulsi Gabbard saying on national television that the US government has armed terrorists, or Tucker Carlson interviewing Jonathan Steele about the OPCW leaks, you see an intense campaign of shrieking outrage and public shaming geared at shoving those dissident narratives as far into the fringe as possible by branding them “conspiracy theories”.

My suggestion then is this: whenever you see the label “conspiracy theorist” being applied to anyone who questions an establishment narrative about Syria, Russia, Iran or wherever, just mentally swap it out for the term “Iraq rememberer”. When you see anyone shouting about “conspiracy theories”, mentally replace it with “Iraq remembering”. It makes it much easier to see what’s really going on: “Oh those damn Iraq rememberers! Why can’t they just trust their media and government about what’s happening in Syria instead of indulging in Iraq remembering?”

Rania Khalek

@RaniaKhalek

The regime changers have been melting down for days bc @kthalps and @mtaibbi interviewed @MaxBlumenthal on their @RollingStone podcast. They can’t stand seeing an antiwar voice anywhere near the mainstream. Check out the episode that’s driving them mad https://youtu.be/5Pb7Q5aSmi0 

Powerful people and institutions secretly coordinating with each other to do evil things is the absolute worst-case scenario for the rest of the population; it is precisely the thing we fear when we allow people and institutions to have power over us. We need to be able to talk about that worst-case scenario occurring, especially since we know for a fact that it does indeed happen. Powerful people do conspire to inflict evil things upon the rest of us, and we do need to use thoughts and ideas to discuss how that might be happening. We are not meant to think about this, which is why we’re meant to forget about Iraq.

The Iraq invasion was like if a family were sitting around the dinner table one night, then the father stood up, decapitated his daughter with a steak knife, then sat back down and continued eating and everyone just went back to their meals and never talked about what happened. That’s how absolutely creepy and weird it is that the news churn just moved on after a conspiracy within the most powerful government in the world led to the murder of a million human beings, and now we’re all somehow only supposed to care about Trump’s rude tweets.

Never forget the Iraq war conspiracy, no matter how hard they try to make you. They did it before, they’ve done it again in Libya and Syria, and they’ll continue to attempt it in the future. When you sound the alarm about this they will call you a conspiracy theorist. All they’re really saying is that you’re one of those annoying pests who just won’t shut up and forget about Iraq.

Deep State Coup D’Etat: Subverting the U.S. Presidency from JFK to Trump

Global Research, November 24, 2019

On the Global Research News Hour we do our best to cover a wide spectrum of topics from the environmental crisis to economic and geopolitical analysis to debunking war pre-text narratives.

We welcome listener support to maintain and improve the quality of our regular broadcasts. Please consider a donation. Go to Global Research’s main donation page and tag your gift ‘GRNH.’

LISTEN TO THE SHOW

Click to download the audio (MP3 format)

“The President of the United States is a transient official in the regard of the warfare conglomerate. His assignment is to act as master of ceremonies in the awarding of posthumous medals, to serve when needed as a salesman for the military hardware manufacturers and to speak as often as possible about the nation’s desire for peace. He is not free to trespass on the preserve of the war interests nor even to acknowledge that such an organism exists.” – Jim Garrison (May 27, 1969) [1]

The murder of President John F. Kennedy on November 22, 1963 is widely recognized as a pivotal moment in U.S. history.

It was the first assassination of a U.S. president in the television age. The death of Kennedy enabled Cold Warriors within Washington to pursue their pillaging of the African, South American and Asian continents with substantially less resistance. But perhaps just as significantly, it marked an important chapter in a long-standing power struggle between big moneyed interests in America along with their intelligence operatives, and recognizable constitutional government, made up of representatives elected by the people and accountable to the public.

It was in direct response to inconvenient questions around the first Kennedy assassination that the CIA weaponized the term ‘conspiracy theory,’ a thought-stopping ad-hominem attack intended to disarm truth-seekers challenging the crimes that a controlled media fail to thoroughly investigate.

The existence of Wall Street overlords acting in tandem with military-intelligence figures as a kind of shadow government or ‘Deep State’ to appropriate the foreign policy and war-making apparatus of a country puts in doubt any assertions of America as a properly functioning democracy with power overseen and exercised by duly appointed representatives.

There have been several examples of similar State Crimes Against Democracy deliberately concealed and covered up so as to protect unaccountable elites. The assassinations of John Kennedy’s brother RobertMartin Luther King, and Malcolm X, as well as the (false flag) terrorist attack known as 9/11 being among the more famous examples.

Against this backdrop, we witness the spectacle of President Trump having his authority challenged in an exhaustively publicized impeachment proceeding. Considering documented war crimes and other malfeasance committed by presidents spanning the last half century, one wonders why the particular allegations against Trump are being pursued so relentlessly, and not others. At the end of the day, impeachment or no, will the people end up with a marginally more accountable government, or will the unaccountable power behind the throne have been reinforced by this 21st Century Kabuki theater?

This week’s episode of the Global Research News Hour radio program is as much an attempt to view the current impeachment proceedings against Donald Trump through the lens of ‘deep politics’ as an anniversary commemoration of the assassination of one of America’s most popular presidents. We have taken the liberty to reach out to two authoritative scholars of events like the Kennedy assassinations and 9/11 to get their insights into what the Trump impeachment drama might mean from the stand-point of entrenched unaccountable power within the USA.

In our first half hour. We hear from writer, researcher and frequent guest Mark Robinowitz. He discloses his thoughts about how and why earnest investigators into clandestine operations implicating the Deep State get side-tracked and typically fail to achieve the changes in the political and legal system that should, in a fair world, spring from revelations of truths implicating high officials.

In our second half hour, legendary ‘Deep State’ researcher and author Professor Peter Dale Scott joins us to describe some of the characteristics all of these events have in common, he locates the commonalities between Trump and former Presidents Nixon and Kennedy, and tracks the evolution of the National Security State’s grip on power since that fatal shooting in Dallas 56 years ago.

Mark Robinowitz is a writer, political activist and ecological campaigner. He manages the sites oilempire.us and jfkmoon.org which look into the Deep Political events and how they intersect with politics, economics and ecology. He is based in Eugene, Oregon.

Peter Dale Scott is a former Canadian diplomat, Professor of English at the University of California, Berkeley, co-founder of the Peace and Conflict Studies program at Berkeley, poet, and 2002 recipient of the Lannan Poetry Award. His political books include American War Machine: Deep Politics, the CIA Global Drug Connection, and the Road to Afghanistan  (2010), The American Deep State: Wall Street, Big Oil, and the Attack on U.S. Democracy (2014) and  Dallas ’63: The First Deep State Revolt Against the White House (2015). He is a Research Associate of the Centre for Research on Globalization. His website is http://www.peterdalescott.net.

(Global Research News Hour episode 278)

LISTEN TO THE SHOW

Click to download the audio (MP3 format)

The Global Research News Hour airs every Friday at 1pm CT on CKUW 95.9FM out of the University of Winnipeg. The programme is also podcast at globalresearch.ca .

The Global Research News Hour now airs Fridays at 6pm PST, 8pm CST and 9pm EST on Alternative Current Radio (alternativecurrentradio.com)

Community Radio Stations carrying the Global Research News Hour:

CHLY 101.7fm in Nanaimo, B.C – Thursdays at 1pm PT

Port Perry Radio in Port Perry, Ontario –1  Thursdays at 1pm ET

Burnaby Radio Station CJSF out of Simon Fraser University. 90.1FM to most of Greater Vancouver, from Langley to Point Grey and from the North Shore to the US Border.

It is also available on 93.9 FM cable in the communities of SFU, Burnaby, New Westminister, Coquitlam, Port Coquitlam, Port Moody, Surrey and Delta, in British Columbia, Canada. – Tune in  at its new time – Wednesdays at 4pm PT.

Radio station CFUV 101.9FM based at the University of Victoria airs the Global Research News Hour every Sunday from 7 to 8am PT.

CORTES COMMUNITY RADIO CKTZ  89.5 out of Manson’s Landing, B.C airs the show Tuesday mornings at 10am Pacific time.

Cowichan Valley Community Radio CICV 98.7 FM serving the Cowichan Lake area of Vancouver Island, BC airs the program Thursdays at 6am pacific time.

Campus and community radio CFMH 107.3fm in  Saint John, N.B. airs the Global Research News Hour Fridays at 10am.

Caper Radio CJBU 107.3FM in Sydney, Cape Breton, Nova Scotia airs the Global Research News Hour starting Wednesday Morning from 8:00 to 9:00am. Find more details at www.caperradio.ca

RIOT RADIO, the visual radio station based out of Durham College in Oshawa, Ontario has begun airing the Global Research News Hour on an occasional basis. Tune in at dcstudentsinc.ca/services/riot-radio/

Radio Fanshawe: Fanshawe’s 106.9 The X (CIXX-FM) out of London, Ontario airs the Global Research News Hour Sundays at 6am with an encore at 3pm.

Los Angeles, California based Thepowerofvoices.com airs the Global Research News Hour every Monday from 6-7pm Pacific time.

Notes:

  1. Interview with Jim Garrison, District Attorney for Parish of Orleans, Louisiana. File Reproduced at the National Archives and released June 7, 2004; 200https://statick2k-5f2f.kxcdn.com/images/pdf/garrison-interview-05-27-1969.pdf
Related

Rethinking National Security: CIA and FBI Are Corrupt, but What About Congress?

Image result for Rethinking National Security: CIA and FBI Are Corrupt, but What About Congress?
Philip Giraldi
November 21, 2019

The developing story about how the US intelligence and national security agencies may have conspired to influence and possibly even reverse the results of the 2016 presidential election is compelling, even if one is disinclined to believe that such a plot would be possible to execute. Not surprisingly perhaps there have been considerable introspection among former and current officials who have worked in those and related government positions, many of whom would agree that there is urgent need for a considerable restructuring and reining in of the 17 government agencies that have some intelligence or law enforcement function. Most would also agree that much of the real damage that has been done has been the result of the unending global war on terror launched by George W. Bush and Dick Cheney, which has showered the agencies with resources and money while also politicizing their leadership and freeing them from restraints on their behavior.

If the tens of billions of dollars lavished on the intelligence community together with a “gloves off” approach towards oversight that allowed them to run wild had produced good results, it might be possible to argue that it was all worth it. But the fact is that intelligence gathering has always been a bad investment even if it is demonstrably worse at the present. One might argue that the CIA’s notorious Soviet Estimate prolonged the Cold War and that the failure to connect dots and pay attention to what junior officers were observing allowed 9/11 to happen. And then there was the empowerment of al-Qaeda during the Soviet-Afghan war followed by failure to penetrate the group once it began to carry out operations.

More recently there have been Guantanamo, torture in black prisons, renditions of terror suspects to be tortured elsewhere, killing of US citizens by drone, turning Libya into a failed state and terrorist haven, arming militants in Syria, and, of course, the Iraqi alleged WMDs, the biggest foreign policy disaster in American history. And the bad stuff happened in bipartisan fashion, under Democrats and Republicans, with both neocons and liberal interventionists all playing leading roles. The only one punished for the war crimes was former CIA officer and whistleblower John Kiriakou, who exposed some of what was going on.

Colonel Pat Lang, a colleague and friend who directed the Defense Intelligence Agency HUMINT (human intelligence) program after years spent on the ground in special ops and foreign liaison, thinks that strong medicine is needed and has initiated a discussion based on the premise that the FBI and CIA are dysfunctional relics that should be dismantled, as he puts it “burned to the ground,” so that the federal government can start over again and come up with something better.

Lang cites numerous examples of “incompetence and malfeasance in the leadership of the 17 agencies of the Intelligence Community and the Federal Bureau of Investigation,” to include the examples cited above plus the failure to predict the collapse of the Soviet Union. On the domestic front, he cites his personal observation of efforts by the Department of Justice and the FBI to corruptly “frame” people tried in federal courts on national security issues as well as the intelligence/law enforcement community conspiracy to “get Trump.”

Colonel Lang asks “Tell me, pilgrims, why should we put up with such nonsense? Why should we pay the leaders of these agencies for the privilege of having them abuse us? We are free men and women. Let us send these swine to their just deserts in a world where they have to work hard for whatever money they earn.” He then recommends stripping CIA of its responsibility for being the lead agency in spying as well as in covert action, which is a legacy of the Cold War and the area in which it has demonstrated a particular incompetence. As for the FBI, it was created by J. Edgar Hoover to maintain dossiers on politicians and it is time that it be replaced by a body that operates in a fashion “more reflective of our collective nation[al] values.”

Others in the intelligence community understandably have different views. Many believe that the FBI and CIA have grown too large and have been asked to do too many things unrelated to national security, so there should be a major reduction-in-force (RIF) followed by the compulsory retirement of senior officers who have become too cozy with and obligated to politicians. The new-CIA should collect information, period, what it was founded to do in 1947, and not meddle in foreign elections or engage in regime change. The FBI should provide only police services that are national in nature and that are not covered by the state and local jurisdictions. And it should operate in as transparent a fashion as possible, not as a national secret police force.

But the fundamental problem may not be with the police and intelligence services themselves. There are a lot of idiots running around loose in Washington. Witness for example the impeachment hearings ludicrous fact free opening statement by House Intelligence Committee chairman Adam Schiff (with my emphasis) “In 2014, Russia invaded a United States ally, Ukraine, to reverse that nation’s embrace of the West, and to fulfill Vladimir Putin’s desire to rebuild a Russian empire.”

And the press is no better, note the following excerpt from The New York Times lead editorial on the hearings, including remarks of the two State Department officers who testified, on the following day: “They came across not as angry Democrats or Deep State conspirators, but as men who have devoted their lives to serving their country, and for whom defending Ukraine against Russian aggression is more important to the national interest than any partisan jockeying…

“At another point, Mr. Taylor said he had been critical of the Obama administration’s reluctance to supply Ukraine with anti-tank missiles and other lethal defensive weapons in its fight with Russia, and that he was pleased when the Trump administration agreed to do so

“What clearly concerned both witnesses wasn’t simply the abuse of power by the president, but the harm it inflicted on Ukraine, a critical ally under constant assault by Russian forces. ‘Even as we sit here today, the Russians are attacking Ukrainian soldiers in their own country and have been for the last four years…’ Mr. Taylor said.”

Schiff and the Times should get their facts straight. And so should the two American foreign service officers who were clearly seeing the situation only from the Ukrainian perspective, a malady prevalent among US diplomats often described as “going native.” They were pushing a particular agenda, i.e. possible war with Russia on behalf of Ukraine, in furtherance of a US national interest that they fail to define. One of them, George Kent, eulogized the Ukrainian militiamen fighting the Russians as the modern day equivalent of the Massachusetts Minutemen in 1776, not exactly a neutral assessment, and also euphemized Washington-provided lethal offensive weapons as “security assistance.”

Another former intelligence community friend Ray McGovern has constructed a time line of developments in Ukraine which demolishes the establishment view on display in Congress relating to the alleged Russian threat. First of all, Ukraine was no American ally in 2014 and is no “critical ally” today. Also, the Russian reaction to western supported rioting in Kiev, a vital interest, only came about after the United States spent $5 billion destabilizing and then replacing the pro-Kremlin government. Since that time Moscow has resumed control of the Crimea, which is historically part of Russia, and is active in the Donbas region which has a largely Russian population.

It should really be quite simple. The national security state should actually be engaged in national security. Its size and budget should be commensurate with what it actually does, nothing more. It should not be roaming the world looking for trouble and should instead only respond to actual threats. And it should operate with oversight. If Congress is afraid to do it, set up a separate body that is non-partisan and actually has the teeth to do the job. If the United States of America comes out of the process as something like a normal nation the entire world will be a much happier place.

The Terrorists Among US8- Trump Whistle Blower & the ODNI FBI CIA DOD NATO-COE

September 26, 2019

The Terrorists Among US8- Trump Whistle Blower & the ODNI FBI CIA DOD NATO-COE

by George Eliason special correspondent of the Saker blog in Novorussia

Let’s explore the top of the chain in the Information Operation and Intel community coup against the presidency. The same private contractors responsible for the 2014 coup in Ukraine brought it home to the US in time to get involved in the election. Losing that bid, they have been working to alter the fabric of the country forever. No one likes to lose.

Enough information has come in about the whistleblower what group is a secondary source to determine who the primary sources of information against President Donald Trump is.

At the bottom of this article you’ll find the names of people overseeing the primary sources and why they were found so easily. If you have followed parts 1-7 in this series, you’ll walk away feeling like I somehow scripted the Trump-Zelenskiy whistleblower narrative.

The bigger questions of why is all this happening right now need to be answered. If you haven’t read The Terrorists Among US – The Coup Against the Presidency I suggest you start there because it shows a blow by blow of the coup in progress up to this point.

So, what if US Intel capabilities were under the control of a few extremely rich families that served their own political goals and those of their clientele? I’m seriously suggesting and going to prove that at the agency level, the US government no longer controls its own spies.

When we look at the concept of terrorists among the US, the ultimate betrayal is from people whose families became enriched because they positioned themselves as the first line of defense protecting the American way of life.

They were able to replace the work they did leading government agencies after they left with the work they were doing in the private sector. This is because they led all the agencies out of the post 9/11 world into a digital age no one knew anything about.

They are the same group hiring over 4 million people to work in the Intel, Information Operation, hacking, boots on the ground, and media, to change the world to their liking and that of their clients.

When that reality sinks in, remember, the US already has the entire digital world in net so tight that nothing slips by. Those 4 million undertrained people are for the benefit of the contractors described below.

The people leading these companies can’t make money in a normal world where diplomacy and mutual respect are the coin of the realm. Their profits and egos only exist where chaos and uncertainty reign. Even today it’s estimated that more than 70% of Intel workers are not government employees. This is what created the problem of privatized terrorism that exists today.

In a 2007 Washington Post OpEd entitled “The Value of Private Spies”, DNI McConnell conceded there was a huge danger in using private companies for intelligence and direct action work. Because of this he claimed “Our workforce has recovered to the point that we can begin to shed some contract personnel or shift them away from core mission areas, and the CIA is leading the way in this,” the ODNI stated.”

In 2007, CBS noted Defense Intelligence Agency (DIA) lawyers revealed at a conference in May that contractors make up 51 percent of the staff in DIA offices. At the CIA, the situation is similar. Between 50 and 60 percent of the workforce of the CIA’s most important directorate, the National Clandestine Service (NCS), responsible for the gathering of human intelligence, is composed of employees of for-profit corporations.

After 9/11 the U.S. government shortened the learning curve by hiring contractors in droves. According to John Pike of GlobalSecurity.org in 2007 America’s spy network would soon resemble NASA’s mission control room in Houston.

Most people, when they see that room, think they’re looking at a bunch of NASA people,” Pike notes. “But it’s 90 percent contractors.”

As discussed in US Intelligence Poses a Threat to the World, as early as 2004, more than 50% of Intel services were manned by private contractors. By, 2007, 70 percent of the Pentagon’s Counterintelligence Field Activity (CIFA) unit is staffed by contractors, known as ‘green badgers.

Private Intel contractors trained the agency starting after 9/11. Soon it became the contractors that had the oversight. Managers left government service to work for private contractors and came back under lucrative corporate contracts.

Effective control, support, and management functions are in the hands of people that care more about a bottom line, politics, and a business forecast model.

The line between inherently governmental work and private contracting was smashed. While the lawman tries to bring the criminal in for justice, the bounty hunter brings back a body so he can be paid.

The New York Times headlined Private Surveillance Is a Lethal Weapon Anybody Can Buy Is it too late to rein it in? By Sharon WeinbergerJuly 19, 2019

The real 1% are Cyber

In a 2015 article at The Nation titled “How Private Contractors Have Created a Shadow NSA,” Tim Shorrock describes what he calls “the cyberintelligence ruling class.”

“Over the last 15 years, thousands of former high-ranking intelligence officials and operatives have left their government posts and taken up senior positions at military contractors, consultancies, law firms, and private-equity firms. In their new jobs, they replicate what they did in government—often for the same agencies they left. But this time, their mission is strictly for-profit,” Shorrock wrote.

Many of the principal figures come from America’s wealthiest families. Although the wealthiest have always had a lead in filling policy and cabinet positions, this time the public service aspect is missing.

 Shorrock goes on to detail how the same 1% Americans claim to be fighting is the cyberintelligence elite that controls the media.  Mathew Olsen is an example as the former National Counterterrorism Center director and current IronNet Corp. president. He joined ABC as a commentator. He goes further and shows how this is the rule and not the exception.

This is going on all across media channels. Every network has their own cyberintelligence “expert” to explain complicated topics, but their conflicts of interest almost always remain hidden.”

War and peace is no longer in the hands of governments. Until governments push back, your sons and daughters die grossly and openly for the highest paying lobbyist or business.

Michael Chertoff from 2005-2009 ran the massive Department of Homeland Security, where he was criticized for exempting the DHS from following laws on everything from the environment to religious freedom. A report issued by the Congressional Research Service said at the time that the delegation of unchecked powers to Chertoff was unprecedented. He was also known for railing against international law, warning that treaties such as the Geneva Conventions were placing undue constraints on U.S. actions abroad. As a long-time insider – in both the public and private sector – he is one of the top figures in the U.S. intelligence-security complex.

Private sector services mirror what they do for government including Intel-for-Hire, espionage, information operations, direct action, and state-sized propaganda operations. This is work that the government has stated on many occasions needs to remain with the agencies that can be held responsible to the public – and not to private companies that aren’t. .- From Mint News “How Intel for Hire Undermines US Intelligence

Intel Community Betrayal at Every Level

When we look at the Intel community as a whole and the agencies under the ODNI, how are we not betrayed? While there are real public servants in the Intelligence services, the trend is toward criminality and the leadership that deceived the public and violated their oaths of office.

As an example, DNI James Clapper’s admission the only proof he had of Russian influence on the 2016 election was Hillary Clinton (HRC) losing Michigan, Wisconsin, and Pennsylvania. It stretches credulity to conclude that Russian activity didn’t swing voter decisions.”

That’s it that’s all. It would have been better if there was collusion if there was a Russian hack. Instead, it was part of an Information Operation that US Intelligence agency heads were in on.

The Information Operation (IO) detailed in the last installment is the single largest example of this known today. If you want to know what collusion is, start there.

Private contractors and political activists have taken it upon themselves to change the government in the United States of America. The private contractors are in the Intelligence field and work both for the government and the conspirators trying to overthrow the type of government the United States currently has.

How else can the existence of the IO coup be explained? The most extensive regime change operation by private contractors is going on in the US for 3 years and the ODNI, CIA, FBI, DOD, NSA, with budgets bigger than the next largest countries militaries, can’t find it or figure out what happened?

What is billed as the crime of the century is swept under the rug as far as investigations go? The DNC hack and Russian influence game tore at the fabric of the country. Is it because former FBI head Robert Mueller’s protégé started the newest dilettante mega-corporation in the spy game? Shawn Henry’s Crowdstrike just happened to be in a position to fabricate extensive and childish fables about the DNC, Podesta, and RNC hacks.

Remember, before it was Ruskies, according to Crowdstrike, it was Bernie Sanders stepping on HRC servers.

Let’s reverse the angle and expose the criminals.

If those crimes did happen under their watch Comey, Clapper and company should have been fired for incompetence because of all the information available to them at the time.

When did an actual crime occur according to ODNI agencies about the 2016 election? The crime occurred in December 2018 when the agency heads figured out their welcome was worn out with the incoming administration.

The above named were already working for the privatized 1% while still on government payrolls. They may not have gotten paid but they turned around and towed the narrative from that period forward. The wiretaps at Trump towers are ample proof of this.

Because HRC lost an election in states that had swing populations of bloc voters that hate HRC, the Russians did it, Mr. Clapper?

Reality dictates Clapper along with Comey, McCabe, Page, and company was willfully part of a conspiracy paid for by the lobbyist groups working to benefit a politician and supported by a foreign country (Ukraine) to overthrow the 2016 US elections. This started during the primaries and continued in the background throughout the election.

When this didn’t work out, the plan switched gears and became a full-court press to discredit and overthrow the presidency itself. Now keep in mind the infrastructure for the coup was put in place before Donald Trump declared his candidacy. It is a coup against the presidency.

The private Intel corporations that brought us the failed Hamilton 68 Russian catcher (courtesy of Michael Chertoff) and other media information war games are the only game in town for the likes of James Clapper, meaning there has to be some kind of lucrative life for a master spy.

The ODNI under Clapper and FBI leadership under Comey went all in for the conspiracy to overthrow the presidency after November 2016.

Why this happened and how this happened is the most dangerous game on the planet today. With the background articles 1-7 of the series in place, the explanation of why they did it became a matter of understanding process and people.

Like Joel Harding, they wanted more action but by playing the private spy game they didn’t have to color inside the lines anymore. Private Intel, IO, Espionage, and boots on the ground companies paint the lines as they go and pay for the lines to be moved as needed.

Those in the agencies or companies that went along with this because it was their job or worse, knowing they could make money lying to the press, public, and the in the PDB, must be investigated and dealt with in the harshest terms.

The reason is simple. You are the game they play. There aren’t enough bad guy countries on ten planet earths to support the game or generate the revenues consistently. That’s on September 26, 2019.

The agencies tasked with spying, IO, Infowar, Cyberwar, war, diplomacy, etc are all beyond compromised. Add in the almost complete ownership of media by stakeholders in these companies and you have a recipe for the end of everything we know.

Right now, they are keen on overthrowing the presidency. If successful, it won’t matter which party is seated in the Oval Office. Just take a position they don’t like.

Right now, they are set on controlling public opinion and political ideology. Most of the people gravitating into these fields in the private sector are politically and emotionally undeveloped. They understand the violence they are willing to bring the populace and the rush it gives them.

War and Peace

While all this is going on, at the same time, the agencies staffed with the same contractors are delivering intelligence that is supposed to be filtered. A neutral report is supposed to be written by the agency in charge before it is delivered into the presidential daily briefing (PDB). The PDB is the most important document produced because of its impact on the world daily.

From the PDB, the president of the United States decides:

•           Who is the enemy?

•           Who is friendly (or are there really any friends out there)?

•           Who is a danger and how?

•           Why are they a danger?

•           What is their motivation?

•           What steps will the US need to take to stop them, turn them in a different direction, or make peace with them?

What happens when the PDB is written by agency personnel or private contractors that want to destroy or embarrass the United States or the sitting president?

How bad does your politics have to be to be OK with starting wars for the sake of your undeveloped ego? It’s going on as we speak.

Jameel Jaffer, deputy legal director at the American Civil Liberties Union, said the reported incidents of NSA employees’ violations of the law are likely “the tip of the iceberg” of lax data safeguards. The laws guiding the NSA’s spying authority in the first place are a bigger issue, he said. “If you only focus on instances in which the NSA violated those laws, you’re missing the forest for the trees,” Jaffer said. “The bigger concern is not with willful violations of the law but rather with what the law itself allows.”

The US government must bring these services back in house. The stakes are too high for the entire world not to. Americans are first on the plate for private Intel today. If you don’t think so, disagree with one of them.

Whistle Blowing Ukrainians

In what turns out to be one of the most fortuitous events in recent history, Donald Trump’s whistleblower source is in Ukraine. The whistleblower, according to a Ukrainian SBU source is Ukrainian. Lightning has struck again in the same spot for the thousandth time.

The same Ukrainian Intel and hacking groups are at it again.

According to the Hill, A whistleblower complaint released by the House Intelligence Committee on Thursday alleges that President Trump sought to enlist Ukraine’s help in the 2020 election by mounting a corruption investigation against former Vice President Joe Biden.

The declassified version of the whistleblower complaint details the government insider’s worries about Trump’s contacts with Ukraine’s leader, revelations of which on Tuesday triggered a formal impeachment inquiry against the president.

Now that we have the charge in place, the actual phone call showed…Ukraine’s Zelenskiy is about to have difficult days in Kiev with the nationalists there. US President Trump had a phone call and made no threats or conveyed anything to intimidate Zelenskiy.

September 24, 2019 MEMORANDUM OPINION FOR THE GENERAL COUNSEL OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE

Rather, the complaint arises out of a confidential diplomatic communication between the

President and a foreign leader that the intelligence-community complainant received secondhandAn “employee of an element of the intelligence community” (or an

intelligence-community contractor)…

The complainant describes a hearsay report that the President, who is not a member of the intelligence community, abused his authority or acted

unlawfully in connection with foreign diplomacy.

According to the New York Times– The whistle-blower who revealed that President Trump sought foreign help for his re-election and that the White House sought to cover it up is a C.I.A. officer who was detailed to work at the White House at one point, according to three people familiar with his identity.

The man has since returned to the C.I.A., the people said. Little else is known about him. His complaint made public Thursday suggested he was an analyst by training and made clear he was steeped in details of American foreign policy toward Europe, demonstrating a sophisticated understanding of Ukrainian politics and at least some knowledge of the law.

The C.I.A. officer did not work on the communications team that handles calls with foreign leaders, according to the people familiar with his identity. He learned about Mr. Trump’s conduct “in the course of official interagency business,” according to the complaint, which was dotted with footnotes about machinations in Kiev and reinforced with public comments by senior Ukrainian officials.

What seems to be the common denominators pertinent to the larger story? We have a lone gun Intel guy working on his own listening to rumors spun by whom?

It seems he was talking to Ukrainians in Kiev. There are a lot of Ukrainians in Kiev and quite a few in the Ukrainian government.

What we need to do to find the original source of the rumor is answer a couple simple questions.

Who in Kiev wants to destroy US President Donald Trump as a favor to Democratic Party allies they work with?

Who in Kiev wants to destroy newly elected president of Ukraine Zelenskiy?

Who in Kiev has the Intel capabilities and sophistication to listen in on government phone calls?

Those questions narrow the field down considerably. There is the opportunity aspect to consider with this too. How many people can listen in on a phone call with a foreign leader?

Lucky for us there is an international Information Operation (IO) going on to unseat US President Trump. This simplifies the field and cuts it down to anyone in Milestone March 1, 2014 from the Coup Against the President article.

That narrows it down to a small handful of disgruntled ultra-nationalist Ukrainians. To get to the absolute right person all that needs to happen is to extradite InformNapalm publisher Roman Burko, Deputy Information Minister Dimitri Zolotukin, and Christina Dobrovolska who supervise them. Christina left the operation 2 months ago but she has a lot of insight and likes visiting the USA.

Eliot Higgins of Bellingcat can be taken into custody as a material witness because of the vast amount of work his firm does the Ukrainian hacker Intel groups in Ukraine and Syria.

Aric Toler is in the US and will definitely provide useful insight although he’s a little timid around the most likely candidate for this, a hacker that goes by @UCA_ruhate_.

RUH8 or UCA_ruhate_  has been very vocal about his disdain for Zelenskiy and wants to hurt his presidency. These groups are familiar with how the US Congress works because they already have testimony on the Congressional record. Refer to Benchmark DNC Hacks

Alexandra Chalupa has a lot of experience with the same Intel groups. She used them to do OppoResearch for the 2016 election as shown in Milestone June 2016.

I’m sure with this caliber of help, all the information needed will come out.

The next thing to look at is who’s pushing the defense fund page for the unknown informer? It is the Ukrainian Diaspora Democratic party HRC advisor @AdamParkhomenko among other Diaspora members.

Adam worked with the Ukrainian hacker Intel groups at team Hillary and the Atlantic Council digital Sherlock program. His stint with Bellingcat and the Ukrainian hackers made memories to last a lifetime.

In the interest of justice for people of all political stripes and a return to sanity, the Intel community monster needs to be put in a glass cage isolated from society. Criminals among them have to be prosecuted.

Bolton Gone: Improved Peace Prospects?

Image result for Bolton Gone: Improved Peace Prospects?

September 13, 2019
The departure of John Bolton as US National Security Adviser is a good step towards decreasing international tensions by the Trump administration. But a lot more is needed from President Donald Trump to indicate a serious pivot to normalizing relations with Russia, Iran and others.

When Trump gave Bolton his marching orders earlier this week, the president said he “strongly disagreed” with his erstwhile security adviser over a range of foreign policy issues. Trump had also expressed frustration with Bolton’s incorrigible militarist tendencies.

There is no doubt Bolton was an odious figure in the White House cabinet. One of our SCF authors, Martin Sieff, wrote this excoriating commentary on Bolton’s nefarious record of warmongering dating as far back as the launching of US wars in Afghanistan in 2001 and Iraq in 2003, when the mustachioed maverick served then as a chief neocon ideologue in the GW Bush administration.

One wonders why Trump brought such a war hawk into his administration when he appointed Bolton as NSA in April 2018. Perhaps, as another of our writers, Robert Bridge, surmised in a separate commentary this week, Trump was using hardliner Bolton as a foil to deflect opponents from within the Washington establishment who have been trying to undermine the president as “soft on foreign enemies”. A ruse by Trump of keeping “your enemies close”, it is averred.

Bolton certainly did his best to hamper Trump’s seeming attempts at scaling back US foreign military interventions. He opposed the plan to withdraw American troops from Syria. The reckless Bolton also wound up a policy of aggression and regime change against Venezuela, which Trump has latterly seemed to grow wary of as a futile debacle.

In regard to Russia, Bolton carried heaps of Cold War baggage which made Trump’s declared intentions of normalizing relations with Moscow more difficult.

The shameless warmonger Bolton openly advocated for regime change in Iran, which seemed to contradict Trump’s oft-stated position of not seeking regime change in Tehran, despite the president’s own animosity towards Iran.

The former NSA also opposed any attempt by Trump to engage in detente with North Korean leader Kim Jong-un. Reportedly, it was Bolton who derailed the incipient efforts at opening up dialogue with Pyongyang.

It is also thought that Bolton used his influence to impede Trump’s recent bid to host Taliban leaders at Camp David earlier this month which was aimed at trust-building for a proposed peace deal to withdraw US troops from that country after nearly 18 years of disastrous war.

That said, however, President Trump has not shown himself to be exactly a dovish figure. He has overseen countless sanctions being imposed on Russia, the abandoning of the Intermediate-range Nuclear Forces treaty, and ongoing military support for the anti-Russia regime in Kiev.

Too, it was Trump who ordered the US collapse of the 2015 international nuclear accord with Iran in May 2018 and the re-imposition of harsh sanctions on Tehran. So, it would be misplaced to paint Bolton as the sole malign actor in the White House. Trump is personally responsible for aggravating tensions with Iran, as well as with Russia, Venezuela and others.

Nevertheless, it is to be welcomed that an inveterate war hawk like Bolton no longer has the president’s ear. Perhaps Trump can be freer to act on his instincts as a pragmatic deal-maker. One thing that the president deserves credit for is his unconventional style of engaging with nations and leaders who are designated as foes of America.

Russia this week gave a reserved response to the sacking of Bolton. The Kremlin said it would make assessments of a positive change in US policy based on actions, not mere announcements, such as the firing of Bolton. Time will tell.

It seems significant that immediately after Bolton was relieved of his post, Trump hinted to reporters that he was considering lifting sanctions off Iran if such a move persuaded Iranian President Hassan Rouhani to hold a face-to-face meeting with Trump at the United Nations general assembly in New York later this month.

Iran has repeatedly stated categorically that there will be no talks with Trump unless his administration revokes sanctions and returns to abiding by the nuclear accord. If there is a serious pivot to normal diplomacy by the White House, then what Trump does about sanctions on Iran will be a litmus test.

The same can be said about US sanctions on Russia. If Trump is earnest about a genuine reset in bilateral relations, then he must get rid of the raft of sanctions that Washington has piled on Moscow since the 2014 Ukraine crisis amid the many spurious allegations leveled against Russia.

Bolton banished is but a small step towards a more diplomatically engaged US administration. But it would be unwise to expect the departure of this one figure as being a portent for progress and a more peaceful policy emerging in Washington.

The Washington establishment, the deep state and the bipartisan War Party, with its entrenched Cold War ideology, seems to have an endemic sway over policy which may thwart Trump’s efforts to direct a less belligerent US.

To illustrate the twisted nature of the US establishment, one only had to read the way sections of the American corporate-controlled media lamented the departure of Bolton. The New York Times, which is a dutiful conduit for deep state intelligence and the foreign policy establishment, actually bemoaned the ouster of Bolton, calling him a “voice of restraint”.

The NY Times commented, with approval, on how Bolton “objected to attempts to pursue diplomatic avenues with players considered American enemies. And he angered Trump with a last-minute battle against a peace agreement with the Taliban… whether it was inviting the Taliban to Camp David or cooperating with Russia, he [Bolton] was the national security adviser who said no.”

In another piece this week, the NY Times commented, again approvingly of Bolton: “Mr Bolton strongly opposed detente with Iran, and his unceremonious ouster has reignited concerns among some Republicans [and Democrats] in Congress about the White House’s declining projection of American military power around the world.”

Can you believe it? The so-called US “newspaper of record” is somehow valorizing an out-and-out warmonger in the form of Bolton, and appears to be advocating “projection of American military power around the world”. The latter phrase being but an Orwellian euphemism for imperialism and war.

The sobering conclusion is that Bolton’s departure hardly heralds a new beginning of diplomacy and engagement by Trump, if we assume to give this president the benefit of doubt for good intentions. Bolton may be gone, but there are formidable political forces in the US establishment which will work to ensure Trump’s room for maneuver remains heavily compressed. The Cold War ideology is so ingrained in Washington, it is much bigger than just one man, whether that is the vile personage of Bolton or the more flexible Trump.

The views of individual contributors do not necessarily represent those of the Strategic Culture Foundation.

The Russiagate hoax is now fully exposed.

by Eric Zuesse for The Saker Blog

The Russiagate hoax is now fully exposed.

The last leg of the Russiagate hoax to become exposed was on August 16th, when Gareth Porter bannered at The American Conservative“U.S. States: We Weren’t Hacked by Russians in 2016”. He revealed there that, “A ‘bombshell’ Senate Intelligence Committee report released in July repeated the familiar claim that Russia targeted the electoral websites of at least 21 states — but statements from the states themselves effectively undermine that narrative,” and NONE of the states was claiming that even a possibility had existed that its vote-counts had been affected, at all, by any hacker, anywhere. However, in one case, that of Illinois, there actually had been a hack; but it might have been by a criminal in order to sell the information, and not by any politically involved entity.

Porter reported:

The states’ own summary responses contained in the report show that, with one exception, they found either no effort to penetrate any of their election-related sites or merely found scanning and probing associated with an IP address that the FBI had warned about ahead of the 2016 election. Hardly a slam dunk.

Federal authorities, including Independent Counsel Robert Mueller, later claimed that the Russians used that IP address to hack into the Illinois state election systems and access some 200,000 voter records, though Mueller provided no additional evidence for that in his report. Nor was there any evidence that any data was tampered with, or a single vote changed.

About the same time, in August 2016, it was reported that Arizona state election systems were also breached, and it was widely speculated afterward that the Russians were behind it. But the Senate committee itself acknowledged that it was a criminal matter, and didn’t involve the Russians.

The “Russian” hack on the Illinois website, however, eventually became part of conventional wisdom, mainly because of Special Counsel Robert Mueller’s indictment of 12 GRU (Russia’s foreign intelligence agency) officers for allegedly carrying it out. 

But the overarching reality here is that there was no real penetration anywhere else. As for outside “probing” and “testing of vulnerabilities” (which, when closely read, makes up the vast majority of the “targeting” cited in the Senate report), that is something that states contend with every day at the hands of an untold number of potential hackers, including, but not limited to, foreign actors.

As Lisa Vasa, Oregon’s chief information security officer, explained to The Washington Post, the state blocks “upwards of 14 million attempts to access our network every day.” And Colorado Secretary of State Wayne Williams told the Post that the kind of scanning that was discussed by DHS “happens hundreds, if not thousands, of times per day.”  

Furthermore, not all federal officials buy into the theory that the Illinois intrusion was political — rather than criminal — in nature. In fact, DHS Assistant Secretary for Cyber Security and Communications Andy Ozment testified in late September 2016 that the aim of the hackers in the Illinois case was “possibly for the purpose of selling personal information,” since they had stolen the data but made no effort to alter it online.

The Senate Intelligence Committee, DHS, and the intelligence community nevertheless chose to omit that reality from consideration, presumably because it would have interfered with their desired conclusion regarding the Russian cyber attacks on the 2016 election.

——

Prior to that revelation, here were highlights from the major news-reports which had exposed other fraudulent aspects of the “Russiagate” accusations:

——

The Real Russiagate Scandal”

9 May, 2019  in Uncategorized by craig View Comments

Robert Mueller is either a fool, or deeply corrupt. I do not think he is a fool.

I did not comment instantly on the Mueller Report as I was so shocked by it, I have been waiting to see if any other facts come to light in justification. Nothing has. I limit myself here to that area of which I have personal knowledge – the leak of DNC and Podesta emails to Wikileaks. On the wider question of the corrupt Russian 1% having business dealings with the corrupt Western 1%, all I have to say is that if you believe that is limited in the USA by party political boundaries, you are a fool.

On the DNC leak, Mueller started with the prejudice that it was “the Russians” and he deliberately and systematically excluded from evidence anything that contradicted that view.

Mueller, as a matter of determined policy, omitted key steps which any honest investigator would undertake. He did not commission any forensic examination of the DNC servers. He did not interview Bill Binney. He did not interview Julian Assange. His failure to do any of those obvious things renders his report worthless.

There has never been, by any US law enforcement or security service body, a forensic examination of the DNC servers, despite the fact that the claim those servers were hacked is the very heart of the entire investigation. Instead, the security services simply accepted the “evidence” provided by the DNC’s own IT security consultants, Crowdstrike, a company which is politically aligned to the Clintons.

That is precisely the equivalent of the police receiving a phone call saying:

Hello? My husband has just been murdered. He had a knife in his back with the initials of the Russian man who lives next door engraved on it in Cyrillic script. I have employed a private detective who will send you photos of the body and the knife. No, you don’t need to see either of them.”

There is no honest policeman in the world who would agree to that proposition, and neither would Mueller, were he remotely an honest man.

Two facts compound this failure.

The first is the absolutely key word of Bill Binney, former Technical Director of the NSA, the USA’s $14 billion a year surveillance organisation. Bill Binney is an acknowledged world leader in cyber surveillance, and is infinitely more qualified than Crowdstrike. Bill states that the download rates for the “hack” given by Crowdstrike are at a speed – 41 Megabytes per second – that could not even nearly be attained remotely at the location: thus the information must have been downloaded to a local device, eg a memory stick. Binney has further evidence regarding formatting which supports this. …

——

US Govt’s Entire Russia-DNC Hacking Narrative Based On Redacted Draft Of Crowdstrike Report”

17 June 2019

It’s been known for some time that the US Government based its conclusion that Russia hacked the Democratic National Committee (DNC) on a report by cybersecurity firm Crowdstrike, which the DNC paid over a million dollarsto conduct forensic analysis and other work on servers they refused to hand over to the FBI. 

CrowdStrike’s report made its way into a joint FBI/DHS report on an Russia’s “Grizzly Steppe“, which concluded Russia hacked the DNC’s servers. At the time, Crowdstrike’s claim drew much scrutiny from cybersecurity expertsaccording to former Breitbart reporter Lee Stranahan. 

Now, thanks to a new court filing by longtime Trump adviser Roger Stone requesting the full Crowdstrike analysis, we find out that the US government was given a redacted version of the report marked “Draft,” 

——

“CrowdStrikeOut: Mueller’s Own Report Undercuts Its Core Russia-Meddling Claims”

5 July 2019 By Aaron Maté, RealClearInvestigations, 6,539 words

Mueller’s other “central allegation” regards a “Russian ‘Active Measures’ Social Media Campaign” with the aim of “sowing discord” and helping to elect Trump.

In fact, Mueller does not directly attribute that campaign to the Russian government, and makes only the barest attempt to imply a Kremlin connection. According to Mueller, the social media “form of Russian election influence came principally from the Internet Research Agency, LLC (IRA), a Russian organization funded by Yevgeniy Viktorovich Prigozhin and companies he controlled.” 

After two years and $35 million, Mueller apparently failed to uncover any direct evidence linking the Prigozhin-controlled IRA’s activities to the Kremlin. …

——

“Judge dismisses DNC lawsuit”

W. 31 July 2019 by Eric London

US federal court exposes Democratic Party conspiracy against Assange and WikiLeaks

In a ruling published late Tuesday, Judge John Koeltl of the US District Court for the Southern District of New York delivered a devastating blow to the US-led conspiracy against WikiLeaks founder Julian Assange.

In his ruling, Judge Koeltl, a Bill Clinton nominee and former assistant special prosecutor for the Watergate Special Prosecution Force, dismissed “with prejudice” a civil lawsuit filed in April 2018 by the Democratic National Committee (DNC) alleging WikiLeaks was civilly liable for conspiring with the Russian government to steal DNC emails and data and leak them to the public.

Jennifer Robinson, a leading lawyer for Assange, and other WikiLeaks attorneys welcomed the ruling as “an important win for free speech.”

The decision exposes the Democratic Party in a conspiracy of its own to attack free speech and cover up the crimes of US imperialism and the corrupt activities of the two parties of Wall Street. Judge Koeltl stated:

If WikiLeaks could be held liable for publishing documents concerning the DNC’s political financial and voter-engagement strategies simply because the DNC labels them ‘secret’ and trade secrets, then so could any newspaper or other media outlet. But that would impermissibly elevate a purely private privacy interest to override the First Amendment interest in the publication of matters of the highest public concern. The DNC’s published internal communications allowed the American electorate to look behind the curtain of one of the two major political parties in the United States during a presidential election. This type of information is plainly of the type entitled to the strongest protection that the First Amendment offers. …

——

In the World of Truth and Fact, Russiagate is Dead. In the World of the Political Establishment, it is Still the New”

4 Aug, 2019 

Douglas Adams famously suggested that the answer to life, the universe and everything is 42. In the world of the political elite, the answer is Russiagate. What has caused the electorate to turn on the political elite, to defeat Hillary and to rush to Brexit? Why, the evil Russians, of course, are behind it all.

It was the Russians who hacked the DNC and published Hillary’s emails, thus causing her to lose the election because… the Russians, dammit, who cares what was in the emails? It was the Russians. It is the Russians who are behind Wikileaks, and Julian Assange is a Putin agent (as is that evil Craig Murray). It was the Russians who swayed the 1,300,000,000 dollar Presidential election campaign result with 100,000 dollars worth of Facebook advertising. It was the evil Russians who once did a dodgy trade deal with Aaron Banks then did something improbable with Cambridge Analytica that hypnotised people en masse via Facebook into supporting Brexit.

All of this is known to be true by every Blairite, every Clintonite, by the BBC, by CNN, by the Guardian, the New York Times and the Washington Post. “The Russians did it” is the article of faith for the political elite who cannot understand why the electorate rejected the triangulated “consensus” the elite constructed and sold to us, where the filthy rich get ever richer and the rest of us have falling incomes, low employment rights and scanty welfare benefits. You don’t like that system? You have been hypnotised and misled by evil Russian trolls and hackers.

Except virtually none of this is true. Mueller’s inability to defend in person his deeply flawed report took a certain amount of steam out of the blame Russia campaign. But what should have killed off “Russiagate” forever is the judgement of Judge John G Koeltl of the Federal District Court of New York.

In a lawsuit brought by the Democratic National Committee against Russia and against Wikileaks, and against inter alia Donald Trump Jr, Jared Kushner, Paul Manafort and Julian Assange, for the first time the claims of collusion between Trump and Russia were subjected to actual scrutiny in a court of law. And Judge Koeltl concluded that, quite simply, the claims made as the basis of Russiagate are insufficient to even warrant a hearing.

The judgement is 81 pages long, but if you want to understand the truth about the entire “Russiagate” spin it is well worth reading it in full. Otherwise let me walk you through it. …

The key finding is this. Even accepting the DNC’s evidence at face value, the judge ruled that it provides no evidence of collusion between Russia, Wikileaks or any of the named parties to hack the DNC’s computers. It is best expressed here in this dismissal of the charge that a property violation was committed, but in fact the same ruling by the judge that no evidence has been presented of any collusion for an illegal purpose, runs through the dismissal of each and every one of the varied charges put forward by the DNC as grounds for their suit.

Judge Koeltl goes further and asserts that Wikileaks, as a news organisation, had every right to obtain and publish the emails in exercise of a fundamental First Amendment right. The judge also specifically notes that no evidence has been put forward by the DNC that shows any relationship between Russia and Wikileaks. Wikileaks, accepting the DNC’s version of events, merely contacted the website that first leaked some of the emails, in order to ask to publish them.

Judge Koeltl also notes firmly that while various contacts are alleged by the DNC between individuals from Trump’s campaign and individuals allegedly linked to the Russian government, no evidence at all has been put forward to show that the content of any of those meetings had anything to do with either Wikileaks or the DNC’s emails.

In short, Koeltl dismissed the case entirely because simply no evidence has been produced of the existence of any collusion between Wikileaks, the Trump campaign and Russia. That does not mean that the evidence has been seen and is judged unconvincing. In a situation where the judge is duty bound to give credence to the plaintiff’s evidence and not judge its probability, there simply was no evidence of collusion to which he could give credence. The entire Russia-Wikileaks-Trump fabrication is a total nonsense. But I don’t suppose that fact will kill it off. …

And in conclusion, I should state emphatically that while Judge Koeltl was obliged to accept for the time being the allegation that the Russians had hacked the DNC as alleged, in fact this never happened. The emails came from a leak not a hack. The Mueller Inquiry’s refusal to take evidence from the actual publisher of the leaks, Julian Assange, in itself discredits his report. Mueller should also have taken crucial evidence from Bill Binney, former Technical Director of the NSA, who has explained in detail why an outside hack was technically impossible based on the forensic evidence provided.

The other key point that proves Mueller’s Inquiry was never a serious search for truth is that at no stage was any independent forensic independence taken from the DNC’s servers, instead the word of the DNC’s own security consultants was simply accepted as true. Finally no progress has been made – or is intended to be made – on the question of who killed Seth Rich, while the pretend police investigation has “lost” his laptop.

Though why anybody would believe Robert Mueller about anything is completely beyond me.

So there we have it. Russiagate as a theory is as completely exploded as the appalling Guardian front page lie published by Kath Viner and Luke Harding fabricating the “secret meetings” between Paul Manafort and Julian Assange in the Ecuadorean Embassy. But the political class and the mainstream media, both in the service of billionaires, have moved on to a stage where truth is irrelevant, and I do not doubt that Russiagate stories will thus persist. They are so useful for the finances of the armaments and security industries, and in keeping the population in fear and jingoist politicians in power.

——

Did Russian Interference Affect the 2016 Election Results?”

8 August 2019  Alan I. Abramowitz, Senior Columnist, Sabato’s Crystal Ball

KEY POINTS FROM THIS ARTICLE

— Special Counsel Robert Mueller’s recent testimony was a reminder that Russia attempted to influence the outcome of the 2016 election and very well may try to do so again in 2020.

— This begs the question: Is there any evidence that Russian interference may have impacted the results, particularly in key states?

— The following analysis suggests that the 2016 results can be explained almost entirely based on the political and demographic characteristics of those states. So from that standpoint, the answer seems to be no.

What explains the 2016 results?

Special Counsel Robert Mueller’s recent testimony before the House Judiciary and Intelligence Committees, and the Mueller Report itself, make it very clear that the Russian government made a major effort to help Donald Trump win the 2016 U.S. presidential election. What the Mueller Report did not determine, however, was whether that effort was successful. In this article, I try to answer that question by examining whether there are any indications from the 2016 results that Russian interference efforts may have played a clear role in the outcome. One such indication would be if Trump did better in key swing states than a range of demographic, partisan, and historical factors would have predicted.

We know from the Mueller Report that Trump campaign manager Paul Manafort briefed a longtime associate who the FBI believes had ties with Russian intelligence about campaign strategy and, according to Manafort deputy Rick Gates, discussed decisive battleground states such as Michigan, Pennsylvania, and Wisconsin. Manafort also directed Gates to share internal polling data, which may have influenced Russian operations.

In order to address the question of whether the Russian interference effort worked, I conducted a multiple regression analysis of the election results at the state level. The dependent variable in this analysis was the Trump margin. My independent variables were the 2012 Mitt Romney margin, to control for traditional state partisanship, state ideology measured by the Gallup Poll (the percentage of conservatives minus the percentage of liberals), the percentage of a state’s population made up of whites without college degrees, the estimated turnout of eligible voters in the state, the state unemployment rate in November 2016 (to measure economic conditions), the number of Trump campaign rallies in the state, the number of Clinton campaign rallies in the state, a dummy variable for the state of Utah to control for the large vote share won by an independent conservative Mormon candidate from that state, Evan McMullin, and, finally, a dummy variable for swing states. The swing states included Arizona, Colorado, Florida, Iowa, Minnesota, Nevada, New Hampshire, Ohio, and Virginia, in addition to Michigan, Pennsylvania, and Wisconsin. The results of the regression analysis are displayed in Table 1 along with a scatterplot of the actual and predicted results in Figure 1.

Table 1: Results of regression analysis of Trump margin in the states

Source: Data compiled by author.

Figure 1: Scatterplot of actual Trump margin by predicted Trump margin in the states

Note: Alaska and District of Columbia omitted due to lack of state ideology data.

Source: Data compiled by author.

The regression equation proved to be extremely successful in predicting the election results, explaining a remarkable 98% of the variance in Trump vote margin in the states. Several of the independent variables had very powerful effects including the 2012 Romney margin, state ideology, and the percentage of non-college whites in the state. Even after controlling for traditional state partisanship and ideology, the size of the non-college white population in a state was a strong predictor of support for Donald Trump. The data in Table 1 also show that Evan McMullin’s candidacy dramatically reduced Trump’s vote share in Utah — although Trump still carried the state easily. In addition, the results show that voter turnout had a modest but highly significant effect on the results — the higher the turnout in a state, the lower the vote share for Trump. These results seem to confirm the conventional wisdom that higher voter turnout generally helps Democrats.

In addition to showing what mattered in explaining the results of the 2016 presidential election in the states, the data in Table 1 also show what did not matter. Economic conditions at the state level, at least as measured by state unemployment, did not matter. The number of campaign rallies held by the candidates in a state did not matter. Finally, and perhaps most importantly from the standpoint of estimating the impact of Russian interference, Donald Trump did no better than expected in the swing states. The coefficient for the swing state dummy variable is extremely small and in the wrong direction: Trump actually did slightly worse than expected in the swing states based on their other characteristics.

Table 2: Predicted and actual Trump margin in key swing states

Source: Data compiled by author.

This can also be seen in Table 2, which compares the actual and predicted results in the three swing states that ultimately decided the outcome of the election: Michigan, Pennsylvania, and Wisconsin. What is most striking about the data in this table is that Donald Trump actually slightly under-performed the model’s predictions in all three states. He did about one point worse than predicted in Michigan, about two points worse than predicted in Pennsylvania, and between two and three points worse than predicted in Wisconsin. There is no evidence here that Russian interference, to the extent that it occurred, did anything to help Trump in these three states.

Conclusions

I find no evidence that Russian attempts to target voters in key swing states had any effect on the election results in those states. …

——

Overstock CEO Turned Over Docs To DOJ ‘In Greatest Political Scandal In US History’”

12 August 2019

Via SaraACarter.com,

Overstock CEO Patrick Byrne delivered to the Department of Justice a number of documents, including emails and text messages, in April, regarding both the origins of the Russian investigation, and an FBI operation into Hillary Clinton with which he was personally involved during the first months of 2016, according to a U.S. official who spoke SaraACarter.com.

Byrne has also confirmed the account.

Byrne claims the documents, which have not been made public and are currently under investigation by the DOJ, are allegedly communications he had with the FBI concerning both the Clinton investigation and the origins of the Russian investigation. …

I gave to the DOJ documents concerning both the origin of the Russian probe and the probe into Hillary Clinton, both of which I was involved in, and both of which turned out to be less about law enforcement than they were about political espionage,” Byrne told SaraACarter.com Monday. …

This is going to become the greatest political scandal in US history,” he said. …

Byrne said the investigation into Clinton was one of the main reasons he came forward. …

Here’s the bottom line. There is a deep state like a submarine lurking just beneath the waves of the periscope depth watching our shipping lanes. …

I think we’re about to see the biggest scandal in American history as a result. But it was all political. …

It’s all a cover-up. It was all political espionage.” …

——

The Russiagate hoax was used by Obama’s successor, Trump — who, of course, had been one of the two targets of the Obama-initiated hoax — in order to step up actions against Russia. Here is one example of that:

——

https://www.nytimes.com/2019/

http://archive.is/ek04S

http://web.archive.org/web/

U.S. Escalates Online Attacks on Russia’s Power Grid”

By David E. Sanger and Nicole Perlroth June 15, 2019 front page Sunday 16 June 2019

WASHINGTON — The United States is stepping up digital incursions into Russia’s electric power grid in a warning to President Vladimir V. Putin and a demonstration of how the Trump administration is using new authorities to deploy cybertools more aggressively, current and former government officials said.

In interviews over the past three months, the officials described the previously unreported deployment of American computer code inside Russia’s grid and other targets as a classified companion to more publicly discussed action directed at Moscow’s disinformation and hacking units around the 2018 midterm elections.

Advocates of the more aggressive strategy said it was long overdue, after years of public warnings from the Department of Homeland Security and the F.B.I. that Russia has inserted malware that could sabotage American power plants, oil and gas pipelines, or water supplies in any future conflict with the United States.

But it also carries significant risk of escalating the daily digital Cold War between Washington and Moscow.

The administration declined to describe specific actions it was taking under the new authorities, which were granted separately by the White House and Congress last year to United States Cyber Command, the arm of the Pentagon that runs the military’s offensive and defensive operations in the online world.

But in a public appearance on Tuesday, President Trump’s national security adviser, John R. Bolton, said the United States was now taking a broader view of potential digital targets as part of an effort “to say to Russia, or anybody else that’s engaged in cyberoperations against us, ‘You will pay a price.’”

Power grids have been a low-intensity battleground for years. …

——

MY CONCLUSION: Both the liberal (Democratic) and conservative (Republican) wings of the U.S. aristocracy hate and want to conquer Russia’s Government. The real question now is whether that fact will cause the book on this matter to be closed as being unprofitable for both sides of the U.S. aristocracy; or, alternatively, which of those two sides will succeed in skewering the other over this matter. At the present stage, the Republican billionaires seem likelier to win if this internal battle between the two teams of billionaires’ political agents continues on. If they do, and Trump wins re-election by having exposed the scandal of the Obama Administration’s having manufactured the fake Russiagate-Trump scandal, then Obama himself could end up being convicted. However, if Trump loses — as is widely expected — then Obama is safe, and Trump will likely be prosecuted on unassociated criminal charges. To be President of the United States is now exceedingly dangerous. Of course, assassination is the bigger danger; but, now, there will also be the danger of imprisonment. A politician’s selling out to billionaires in order to reach the top can become especially risky when billionaires are at war against each other — and not merely against some foreign (‘enemy’) aristocracy. At this stage of American ‘democracy’, the public are irrelevant. But the political battle might be even hotter than ever, without the gloves, than when the public were the gloves.

—————

Investigative historian Eric Zuesse is the author, most recently, of  They’re Not Even Close: The Democratic vs. Republican Economic Records, 1910-2010, and of  CHRIST’S VENTRILOQUISTS: The Event that Created Christianity.

The Terrorists Among US- Cyber War and Privateers are the true Domestic Terrorists

August 14, 2019

by George Eliason for The Saker Blog

The Terrorists Among US- Cyber War and Privateers are the true Domestic Terrorists

What are Cyber Privateers and should you be afraid of them? Cyber privateers and cyber bounty hunters are criminals that are not covered under international law as government agents. In reality, this almost nullifies the chance for war to start over any particular hacking or compromised data event.

The problems hired or volunteer contractors create include a projectable legal attribution. You don’t have to be able to prove a country was behind a cyber attack or hack as long as you meet certain conditions. You can literally project the blame entirely to a different entity. The legal aspects will be covered in the next article.

It also nullifies the myth cyber privateers/ bounty hunters can use government tools on civilian or otherwise protected classes of people and infrastructure at will. International law doesn’t give people hired or volunteering to commit crimes under any auspices a free pass.

This is a new class of terrorism which separates a cowardly criminal element from the victim the same way a remotely detonated explosive would when used at a shopping mall. This criminal activity is spreading at a rate that raises alarm bells especially with the projection of 3 million untrained new hires over the next few years.

In the last article, I introduced you to Jimmy and Gary. After three difficult months of online Youtube training, both of our heroes were ready to take on careers as international men of mystery.

The absolute risk this presents to international peace and security should be obvious regardless of what accepted policy is. Everybody gets to spy or nobody gets to spy is the mantra this generation of Intel managers was brought along with. Most of the tools in the NSA arsenal have their start or at the very least a counterpart that is freeware.

Disgruntled people have access to software that can literally trigger a heart attack for someone with a pacemaker, cause a seizure, or even take control of your car.

More than 70 percent of the Pentagon’s Counterintelligence Field Activity: CIFA is staffed by green badge contractors. The majority of personnel at the DIA, the CIA National Clandestine Service, the National Counter Terrorism Center, and more than 80% of the NSA budget goes to private contractors.

All of the agencies are filled with what amounts to day labor. How many of them already have the keys to the barn that potentially starts the 4 Horsemen of the Apocalypse on their way?

State sized tools give emotionally inadequate and politically repulsive people the ability to illegally mimic or ply actions that are inherently governmental in nature. These same disgruntled overpaid groups fill out the do not fly lists. They are putting people on domestic terrorist watch lists. They are deplatforming journalists and people expressing opinions contrary to their employers and taking over social media and opinion for their employers.

The same groups are hacking websites and stealing financial account information. They gain access to bank accounts through phishing exploits and siphon your account dry. One group I am writing about did this to a family member of mine because of the exposure I’m giving. I’ll get back to that later in the series.

Over the last five years, I’ve not only described the role cyber privateers are playing in world affairs, but have been documenting the players and the damage they are causing.

This article will describe the now accepted US cyber policies that were written by cybercriminals to give themselves cover so they can use the American people and people of the world as their own personal cash cow or reservoir. If they don’t like you, no need to wonder who gets to pay for that.

The inherent problem with cyber privateers is covered in the job description as well as their rather fanciful notion they are anything but criminals.

Privateers operate as sanctioned pirates. These throwbacks pretend to operate like their 18th century inspirations did. Back in the day, the sponsor country allowed them to make money attacking merchant and military vessels they didn’t like but didn’t necessarily want a war with. When mistakes were made, privateers supposedly made reparations to the groups they victimized. They had to identify themselves and offer a remedy for damages.

The 2019 cyber privateer or bounty hunter is under no such compunction. They don’t identify themselves and their victims rarely know who hit them. In fact, when they do identify themselves, it’s just to gloat. They do it in a setting that implies the message that needs to get across without confessions that would hold up in a court.

If this sounds wordy, cutesy, or alarmist, private contractors have interrupted the power grid in Venezuela and hacked into Iran’s nuclear infrastructure. They are penetrating the power grid in Russia. This is an ongoing problem that’s exasperated by the fact legislators rely on the terrorists to draft the laws to protect them from everyone else.

Think of it this way, if Joey, going by the cool hacker name HedCh33z3, decides he doesn’t like Latvia, can he disrupt their electrical infrastructure, medical infrastructure, or elections?

The fact is they move in and out of government service so often, they never bother to switch hats or status. Think of it this way, Joey works for the NSA for a week under a subcontractor and picks up a ton of tools to stalk his Ex and sadistically destroy her life piece by piece.  This is what happens when people assume the right to government powers without the authority or responsibility to use them.

Are you willing to send your kid to war or go yourself because Joey HedCh33z3’s ex-girlfriend’s family thinks he’s a creep and they are from XXX country? Yet, we are now snugly very close to being put in this horrific position by politically and emotionally stunted people.

Privateers are Terrorists

So, where do they get the right to do this? Starting right after September 11, 2001, OSINT and cyber started as a serious money-making cottage industry. In the last article, we closed with the DOD actively hiring cyber Bounty Hunters to hack into foreign countries infrastructure.

This practice didn’t just start yesterday. Since 2001, there have been many attempts to codify US hiring of cyber privateers or bounty hunters into law. What this has done is enshrine it in US cyber-policy. The DOD use of subcontractors says a lot.

  • What are cyber bounty hunters and cyber privateers and what do they actually do?
  • Work with direct action military subcontractors
  • Work for NGOs, corporations, lobby groups
  • Work for US government agencies like the FBI, CIA, DIA, DOD, DNI
  • Work for political parties and causes
  • Work for foreign governments like Ukraine as shown in this series against the interests of the American people
  • Work for themselves

They provide Intel through OSINT and hacking. They provide direct action through hacking and Information Operations. Today, they are taking on inherently governmental responsibilities and making decisions they don’t have the authority to make and they make decisions that belong to State agencies.

  • Who is the enemy?
  • Who is friendly (or are there really any friends out there)?
  • Who is a danger and how?
  • Why are they a danger?
  • What is their motivation?
  • What steps will the US need to take to stop them, turn them in a different direction, or make peace with them?

One attempt to legalize this activity is called the Morgan Doctrine.

You’re aware that the U.S. Secretary of State is actually dumb enough to host her own email server. Even if you’re a third-world country without the infrastructure to create serious cyber attacks yourself, a few thousand dollars in Bitcoins to Hackers-R-US will get you zero-day exploits to crack just about any individual server. Either way, you’re going to OWN that server before the next national holiday (pick your country, pick your holiday).

The Morgan Doctrine states simply that if you attack my computers (or my banking assets held in US-based computers), then under a certain set of well-defined conditions, a licensed and bonded “cyber privateer” may attack you in your home country and split the proceeds with the U.S. government…You raid our bank accounts, we raid yours. You make money from off-shore child pornography, we’re going to loot your bank accounts and, with some REALLY creative black hat operations, you will be taken off the grid worldwide to the extent that you’ll not even complete a cell phone conversation for the remainder of your miserable depraved life.- The Morgan Doctrine

Who decides what is right, legal, or legally binding? Is it right when someone who gets paid to find you and accuse you also makes his money from destroying your life and reputation, or directly by stealing money directly from you?

According to the Morgan doctrine blogger who does this kind of work for Oracle, Salesforce.com, BIGFIX, and other technology companies, the answer is a big yes.

The USA followed by Ukraine makes up the highest percentage of over 50,000 readers which reflects the numbers the Ukrainian Diaspora hired to create the illusion of Russian aggression in Ukraine and the 2016 election interference meme. This is a serious attempt to push legislators for legal cover for what is accepted at the policy level.

Let’s spell this out. If a cyber bounty hunter or cyber privateer say you work for Russia while they work against Russia, according to this, you picked your side in the war they get paid to fight. It doesn’t matter if you don’t know you’re in one.

When they work for NGOs, foreign governments, political parties, and companies, they are given cover. They found out along the way they are entitled to your bank account as part of their payment as well as the joy of ruining your life every way they can. It means no more than a video game to them.

In the private sector they now illegally, harass, stalk, and locate people with no legal justification. They are trying to facilitate renditions and executions. Let’s be clear, these are your neighbors doing this to your neighbors.

Aric Toler and Bellingcat helped set up the functionality of Ukraine’s hit for hire website Myrotvorets (peacemaker). The only goal of the site is to publish personal and contact information of anyone they consider standing against Ukrainian nationalism so they can be dealt with by private parties.

toler go get him.JPG

The above clipped from Christelle Neant’s article should be clear enough to understand on its own and she asks the right questions. Bellingcat’s work with privateer groups has included trying to leverage their collective expertise and locate and rendition me.

Almost every time I’ve been threatened by Ukraine, it’s an American collaborator making the threat for them. The linked article shows one such person who also designed Ukraine’s Information Policy. He also wrote the policy paper for the US government’s cyber policy.

The people that testify for the US Congress on cyber and OSINT are the same people doing these things. They are training and setting up groups in multiple countries and under different auspices.

More than one of them trained the full spectrum of alphabet agencies. CIA, NSA, DIA, FBI, DNI, DOD, and we can keep going across the board.

They were behind setting up the policy that guided the Tallinn Manual defining cyberwar and international law. We’ll be opening that up within a couple of articles.

As a testament of their cyber mojo, they spent the last few years collectively trying to locate someone who didn’t change locations often and used normal communications and social media. I publish articles in 5 or 6 publications regularly. I have 4 or 5 different social platform accounts.

helfire missile targeter.jpg

They couldn’t figure out that I was where I said I was for the last 5 years. This spring I wrote a Victory Day article with local video and interviews. Even though I clearly showed my location, they still weren’t too sure.

The one thing you can say about them and their ally Bellingcat is they are consistent. Consistently wrong that is. In Ukraine, Bellingcat’s chief source of Intel is Ukrainian Intelligence. This includes the Ukrainian State hackers that contacted me after my sister was hacked. Journalism from the Donbass side of the contact line is a crime against Ukrainian sensibilities.

This group supplies Intel to NATO and individual EU countries and makes the rounds in Congress. Bellingcat’s work in Syria is chiefly supplied by the other side of Bellingcat’s Intel fabricators who also work for Ukraine.

We now have Americans working with foreign Intel stalking Americans and foreign citizens/ journalists for foreign countries they know will be tortured and killed. This clearly falls under terrorist activity.

One side of the group that works for Ukrainian Intel contacted me for the first time the day after the bank account was hacked and cleaned out using the hacker’s preferred method. What was the reason for the sudden communication? He wanted me to know how smart he really was.

Yet, these same so-called super spies claim to be able to find information about things people are actively trying to hide like weapons systems, motive. Most of the time they don’t speak the language of the country they claim to have expertise for. They decide guilt even though reality shows they aren’t able to actually do the job. Strange, isn’t it?

It was US policy to make them extra-legal but not illegal in the US after 9-11. Congress worked with these groups to write laws that refuse to criminalize what they do when it’s done on citizens. In fact, it no longer matters which side of the spectrum holds the reins, they feel empowered and will continue to do so until laws are written regulating their industry.

Over the last articles, I developed a slow-burn look into the world of the private spy. The idea that in less than 4 years the industry wants to hire 3 million unlicensed, unbonded, and untrained experts to work both government and corporate Intel and spy gigs should scare the hell out of you.

Can you give me a reason why the US which already collects and analyzes every piece of data on the internet needs so many more of what amounts to interns working with state sized software packages?

That’s 82 US citizens per new hire private sector OSINT agent. They have to literally spend 4 days on each person they investigate (82 per year including babies) just to get a full year’s worth of work because of the existing DNI, FBI, CIA, DIA, DOD OSINT agents have the rest of the world covered.

How serious is the information I’m providing? The EU Computer Emergency Response Team (CERT-EU) sent the articles to the EU institutions, agencies and bodies as well as outside governments and agencies. This means the EU has real concerns about the practice, laws, and policies allowing the practice because of the inherent damage so-called bit-players in private Intel and Information Operations (IO) can do at home and abroad not to mention diplomatically.

cert-eu for article.JPG

After you grasp the magnitude of the problem and begin unwinding the moving parts it can become manageable again through lawfare. Legal and societal protections you take for granted no matter where you live went out the window as soon as these practices became the norm.

Even from street level, people can make large sweeping changes to the world. Before you poo-poo, the idea, look at the CERT-EU screenshot again. I believe this can be done because I have already done it.

Towards the bottom of the article, we’ll get into the international policy for cyberwar and non-war situations. The same people that I’ve been writing about for the last 5 years exposing how they go after groups with protected status also wrote the policy for the US Government, all the agencies. While they didn’t write international policy directly, people they trained or work with closely did.

Four years ago, I exposed a flaw that exposes them to justice in the Tallinn Manual and threatened to pursue it. I did this because to win, I needed that gap closed. Tallinn is about applying the laws of war to cyber. It is something that otherwise would get no mention at all because it’s not considered a gap in any other context.

They closed that specific gap verbosely and gave me the opportunity to show how sordid this mess is. This also paves the way to provide a real resolution from private spies attacking civilians, social groups, political groups, journalists and other protected parties. Myrotvorets and Propornot should take note as should the other better and lesser-known companies and personalities.

No one has the right to use what they, themselves, rightfully label as Al Qaeda tactics on civilian populations, social activists, journalists, and other protected groups without assuming the legal definition of a terrorist, i.e. cyber terrorist.

Should lawfare (legal activism) fail to provide a remedy, the penalties for cyber assault (terrorism) and the right to a vigorous defense against perpetrators is what can make the laws change-FAST. Terrorism is terrorism is terrorism.

Once that fact is established anyone supporting them or hiring them in any way shape or form is guilty of material or direct support of terrorist activities against their own nation. Congressman, what say ye?

Law and policy makers fell in love with this power they never had before because it gives them the ability to shape policy they have no right to change for the sake of constituent and lobbyist cash and gift donations. They create loopholes in the cyber laws they write with the help of the companies and practitioners engaged in criminal behavior (under every other circumstance). Today, they hire the same criminals to help them with elections.  Oppo-research, reputation management, Information Operations, and even projecting their (congressman’s private) own foreign policy agenda into the international arena.

Imagine Congress asking a cybercriminal what kind of regulation or oversight their industry needed? What if Congress then asked the same societal deviants to write the laws that define the limit to what is legal they would agree to. Real criminals decided what the laws protecting their victims should be. They decided what the penalties should be if they got caught.

The tradeoff is this same Congress that was never allowed access to Top Secret information unless they have security clearance on their committee can get the actionable Intel before it’s marked “secret” if it’s gathered through OSINT by a private contractor working for US Intel agencies. That loophole makes it ok for anybody to move information before it’s been vetted and resell it.

Imagine these same legislators hiring you because you’re the expert they trust and they knowingly wink at the crimes you’re committing against your own people. They haven’t updated labeling the new twist on criminal law yet, and they won’t because you don’t want them to. And hardly anyone is referencing the same crimes using older precedent as a reference for prosecution or lawsuits.

This creates huge gray zones in the law. Gray zones are areas of law where even though something is illegal, there is no law on the books against a specific method of a known crime. Stalking is the easiest example. If someone is stalking you, follows you, and threatens you, we can all agree a crime was committed.

So is stalking a crime? Not if you are an OSINT practitioner doing it online because there is no legal or regulatory system you have to justify yourself to.

The gray zone, in this case, exists in a couple of areas. The first is attribution or identifying the perpetrator. This isn’t a small thing. The person with the Twitter handle “little ice cream girl” could actually be Stan from Milwaukee who was hired to sway the vote for his candidate. You annoyed him. The state sized software package he inherited working for XXX contractor that was working for the CIA toppling Antarctica is going to come in handy wrecking your life as thoroughly as the preverbal bull in the china shop.

The second is time and distance. Money concerns aside, if you are stalked, harassed, or threatened from the other side of the country or globe, what local prosecutor can even get his head around this new dimension of law?

Last year when I was originally going to publish this series, I spoke to an attorney specializing in international law. He listened for a short time and told me to stop. He didn’t want to hear any more. It wasn’t because of a lack of proof. His reasoned that the substance of what I was saying would put him in a very dangerous position.

It wasn’t his first rodeo and he claimed the last time around, his own national government refused to give him any cover or come to his aid. In his words, his government views taking on private Intel contractors as akin to taking on the CIA directly. And they weren’t willing to do that.

This is the attitude most people and even Congress takes. You can’t beat the deep state. But, the deep state ISN’T sworn-in law enforcement or agency personnel anymore. The illegal hiring practices for almost 2 decades gave private sector (green badges) oversight of agency personnel and projects. The problem multiplies because they trained the managers at the agencies and wield tremendous influence.

A fundamental truth is private industry cannot take on inherently governmental responsibilities legally or successfully. In the end, a company’s only consideration is their bottom line. Patriotism and companies part ways when it is no longer profitable. That’s just business.

What Congress and policymakers have done is to allow a huge gray area to be created where criminals are allowed to thrive because they provide political candy in the form of mostly fake Intel that supports whatever project a member of Congress needs to appease his pet cause lobbyists.

This could all be cleaned up by applying existing stalking and assault laws to online stalkers by making the punishment extreme. The same goes for political activists that are doing this under the cover written for them. As long as they volunteer, they are not targetable for retribution internationally. If they are provably working with a country or company working with a country, as soon as they stop, they can’t be touched. How’s that for a policy?

Fixes for Online Troll Remediation

Putting all these online Intel related cottage industries under rigid government oversight and forcing them to document what they are doing and to whom both domestically and internationally is the one way any type of privateer scenario that is already OK’d by the current policy can actually work. It also gives protected classes the opportunity to stop harassment and demand damages. This is precisely why it won’t happen unless it is pushed hard.

Congress could write and pass a one-page bill to write protection against this if they had the inclination. The crimes exist in the law already. The only expansion is applying them to technology. They won’t.

The other more realistic approach is to demand US president Donald Trump takes out his magic pen and write an executive order guaranteeing reasonable protections and appropriate punishment.

This is unlikely to happen because the move would literally box in this already metastasized invasive cancer commonly called the deep state. The celebrated work of the CIA and FBI infiltrating perfectly legal civil groups or dispersing propaganda through news platforms like the New York Times has been rendered child’s play in both scope and impact.

And we’re still waiting to see what kind of trouble 3 or 4 million unregulated new hires will bring domestically and internationally.

International Law and Policy for Online and Cyberattacks

Next, let’s establish a few things directly from Tallinn Manual I. From a 2015 article I’ll be highlighting a lot more in the next article I showed clearly that:

  • Civilians are a protected class.
  • If you work with a foreign country against their perceived enemies you are considered a military asset even if you work for a private contractor. You are targetable in every sense that word conveys.
  • If you work with a foreign country against their perceived enemies you are considered a military asset and attacks against civilians is a terrorist act.
  • To my knowledge no western country allows its citizens to make war on each other or citizens of other countries they are at peace with. The Black Letter Rules include: Rule 23.3 Cyber attacks against civilians is a war crime defined by rule 32.
  • Rule 26.7 The concept of “belonging to” defines whether you can be targeted or not. This rule defines civilians as off limits unless they are “engaged” in real war duties. It includes undeclared relationships where behavior makes it clear which side a person is fighting for.
  • Rule 26.9 Virtual online communities and people expressing opinions do not qualify as combatants.
  • Rule 30 defines a cyber attack as a non-kinetic attack reasonably expected to cause damage or death to persons resulting from the attack. If attacker mistakenly calls civilians lawful targets, the attack on civilians still occurred. It is a crime. This is an important consideration considering how interconnected the internet has made people.
  • Rule 31 Psy-Ops including leaflets, mass emails is not prohibited behavior.
  • Rule 33 If there is doubt to the status of a person, that person is to be considered a civilian and not targetable.
  • Rule 35.5 Gathering information for the military makes you a combatant.
  • Journalists are prohibited targets.
  • Once an attack is made, the retribution is legal and does not necessarily need to be in kind.

A cyber attack can be met with conventional weapons.

  • Rule 41 Means and Methods describes cyber weapons broadly as the means to carry out cyber war by use, or intended use of cyber “munitions” designed to cause damage, destruction, or death to its targets. The breadth of the rule is required because of the wide array of possible attacks through cyber means.

Now, the first loophole I wanted to be closed comes from an inverse look at a cyber war attack including stalking and targeting protected classes. Here’s how this can be elevated to war crimes.

Cyber can come from anywhere across the globe, anonymously, and stealthily (you may not even realize you were attacked). Because of today’s events people being attacked are from different parts of a given country and even spread across the globe.

This means if political or social activists are targeted, it may look like random events even though the numbers of victims could be in the hundreds of thousands or potentially millions. Here’s the two-minute example from one of the industry pioneers that attack civilians.

If the attack is considered as a single event because one single protected class or group is targeted even though they are physically at different geographical locations, we can reach the threshold for a cyber attack governed by the laws of war. Since it’s civilians, it would need to be litigated but the settlement would come from the offending country. Cha-ching!

Nevertheless, I collected a sample of 50+- IP addresses. Thank you, Mr. Justin, you are an eminently useful idiot.. . Also, many (most?) of the US readers were at work when they visited antiwar.com. Those US readers are concentrated in New York metro, Washington DC, greater Boston, the Bay Area, and Illinois (Chicago and main campus, U of I). Meanwhile, the Russian readers (there are only two in the dataset) are split between Moscow and Saint-Petersburg.”- Andrew Aaron Weisburd @webradius

https://www.opednews.com/populum/visuals/2015/10/2015-10-58313-500-ImagesAttr-populum_uploadnic_anti-war-10-15--jpg_58313_20151022-534.jpg

I ask why is this Info war agent that trained all the US Intel agencies, NATO, and works for Ukraine geolocating American citizens for Ukrainian purposes?

This group is a political social group reading and commenting at a media platform in a country that still has the 1st Amendment. It is a protected class.

THIS IS ONLY ONE STEP FROM A WAR CRIME. As soon as it’s established Weisburd is doing this for less than Ukraine’s hit for hire site Myrotvorets, we are in the neighborhood of WAR CRIMES. Interestingly, Weisburd helped spawn Myrotvorets and enhanced Ukraine’s geolocation abilities.

Secondly, if it doesn’t meet the war threshold, it is still a terrorist attack on protected groups. When I proposed that injured parties have the right to robust self-defense, Tallinn II closed up the language by barring civilians the right of redress, self-defense, or preemptive assault because this was the domain of nations.

But, that language also makes it imperative for them to persuade Congress to step up to bat and write restrictive laws or the future looks very bleak for private industry spies and IO working against the public interest.

But, that language also makes it an imperative for them to persuade Congress to step up to bat and write restrictive laws or the future looks very bleak for private industry spies and IO working against the public interest.

Did Andy Weisburd take that final step? Stay tuned, it’s detailed in the next articles. Next up, we’ll show the same small groups of OISINT and IO trailblazers are responsible for most fake news, bad Intel, and are covering up crimes against humanity.

Make no doubt about it, they are terrorists. They can be treated like terrorists and people have the right to robustly defend themselves.

Brazilgate is Turning into Russiagate 2.0

June 22, 2019

By Pepe Escobar – with permission and cross-posted with Consortium News

Brazilgate is Turning into Russiagate 2.0

It was a leak, not a hack. Yes: Brazilgate, unleashed by a series of game-changing bombshells published by The Intercept, may be turning into a tropical Russiagate.

The Intercept’s Deep Throat – an anonymous source — has finally revealed in detail what anyone with half a brain in Brazil already knew: that the judicial/lawfare machinery of the one-sided Car Wash anti-corruption investigation was in fact a massive farce and criminal racket bent on accomplishing four objectives.

  • Create the conditions for the impeachment of President Dilma Rousseff in 2016 and the subsequent ascension of her VP, elite-manipulated puppet, Michel Temer.
  •  Justify the imprisonment of former president Lula in 2018 – just as he was set to win the latest presidential election in a landslide.
  • Facilitate the ascension of the Brazilian extreme-right via Steve Bannon asset (he calls him “Captain”) Jair Bolsonaro.
  • Install former judge Sergio Moro as a justice minister on steroids capable of enacting a sort of Brazilian Patriot Act – heavy on espionage and light on civil liberties.

Moro, side by side with prosecutor Deltan Dallagnol, who was leading the Public Ministry’s 13-strong task force, are the vigilante stars of the lawfare racket. Over the past four years, hyper-concentrated Brazilian mainstream media, floundering in a swamp of fake news, duly glorified these two as Captain Marvel-worthy national heroes. Hubris finally caught up with the swamp.

The Brazilian Goodfellas

The Intercept has promised to release all the files in its possession; chats, audio, videos and pics, a treasure trove allegedly larger than Snowden’s. What has been published so far reveals Moro/Dallagnol as a strategic duo in synch, with Moro as a capo di tutti i capi, judge, jury and executioner rolled into one – replete with serial fabrications of evidence. This, in itself, is enough to nullify all the Car Wash cases in which he was involved – including Lula’s prosecution and successive convictions based on “evidence” that would never hold up in a serious court.

Moro: Installed as justice minister.
(Wikipedia/Marcos Oliveira/Agência Senado.)

In conjunction with a wealth of gory details, the Twin Peaks principle — the owls are not what they seem — fully applies to Brazilgate. Because the genesis of Car Wash involves none other than the United States government (USG). And not only the Department of Justice (DoJ) – as Lula has been stressing for years in every one of his interviews. The op was Deep State at its lowest.

WikiLeaks had already revealed it from the start, when the NSA started spying on energy giant Petrobras and even Rousseff’s smart phone. In parallel, countless nations and individuals have learned how the DoJ’s self-attributed extraterritoriality allows it to go after anyone, anyhow, anywhere.

It has never been about anti-corruption. Instead this is American “justice” interfering in the full geopolitical and geo-economic spheres. The most glaring, recent case, is Huawei’s.

Yet Mafiosi Moro/Dallagnol’s “malign behavior” (to invoke Pentagonese) reached a perverse new level in destroying the national economy of a powerful emerging nation, a BRICS member and acknowledged leader across the Global South.

Car Wash ravaged the chain of energy production in Brazil, which in turn generated the sale – below market prizes – of plenty of valuable pre-salt oil reserves, the biggest oil discovery of the 21stcentury.

Car Wash destroyed Brazilian national champions in engineering and civil construction as well as aeronautics (as in Boeing buying Embraer). And Car Wash fatally compromised important national security projects such as the construction of nuclear submarines, essential for the protection of the “Blue Amazon”.

For the Council of Americas – which Bolsonaro visited back in 2017 – as well as the Council on Foreign Relations—not to mention the “foreign investors”–to have neoliberal Chicago boy Paulo Guedes installed as finance minister was a wet dream. Guedes promised on the record to virtually put all of Brazil for sale. So far, his stint has been an unmitigated failure.

How to Wag the Dog

Mafiosi Moro/Dallagnol were “only a pawn in their game,” to quote Bob Dylan– a game both were oblivious to.

Lula has repeatedly stressed that the key question – for Brazil and the Global South – is sovereignty. Under Bolsonaro, Brazil has been reduced to the status of a banana neo-colony – with plenty of bananas. Leonardo Attuch, editor of the leading portal Brasil247, says “the plan was to destroy Lula, but what was destroyed was the nation.”

As it stands, the BRICS – a very dirty word in the Beltway – have lost their “B”. As much as they may treasure Brazil in Beijing and Moscow, what is delivering for the moment is the “RC” strategic partnership, although Putin and Xi are also doing their best to revive “RIC”, trying to show India’s Modi that Eurasian integration is the way to go, not playing a supporting role in Washington’s fuzzy Indo-Pacific strategy.

Dallagnol: Serial fabricator. (Wikimedia Commons/José Cruz/Agência Brasil)

And that brings us to the heart of the Brazilgate matter: how Brazil is the coveted prize in the master strategic narrative that conditions everything happening in the geopolitical chessboard for the foreseeable future—the no-holds-barred confrontation between the U.S. and Russia-China.

Already in the Obama era, the U.S. Deep State had identified that to cripple BRICS from the inside, the “weak” strategic node was Brazil. And yes; once again it’s the oil, stupid.

Brazil’s pre-salt oil reserves may be worth as much as a staggering $30 trillion. The point is not only that the USG wants a piece of the action; the point is how controlling most of Brazil’s oil ties up with interfering with powerful agribusiness interests. For the Deep State, control of Brazil’s oil flow to agribusiness equals containment/leverage against China.

The U.S., Brazil and Argentina, together, produce 82 percent of the world’s soybeans – and counting. China craves soybeans. These won’t come from Russia or Iran – which on the other hand may supply China with enough oil and natural gas (see, for instance, Power of Siberia I and II). Iran, after all, is one of the pillars of Eurasian integration. Russia may eventually become a soybean export power, but that may take as long as ten years.

The Brazilian military knows that close relations with China – their top trade partner, ahead of the U.S. — are essential, whatever Steve Bannon may rant about. But Russia is a completely different story. Vice-President Hamilton Mourao, in his recent visit to Beijing, where he met with Xi Jinping, sounded like he was reading from a Pentagon press release, telling Brazilian media that Russia is a “malign actor” deploying “hybrid war around the world.”

So the U.S. Deep State may be accomplishing at least part of the ultimate goal: to use Brazil in its Divide et Impera strategy of splitting the Russia-China strategic partnership.

It gets much spicier. Car Wash reconditioned as Leak Wash could also be decoded as a massive shadow play; a wag the dog, with the tail composed of two American assets.

Moro was a certified FBI, CIA, DoJ, Deep State asset. His uber-boss would ultimately be Robert Mueller (thus Russiagate). Yet for Team Trump, he would be easily expendable – even if he’s Captain Justice working under the real asset, Bannon boy Bolsonaro. If he falls, Moro would be assured the requisite golden parachute – complete with U.S. residency and talks in American universities.

The Intercept’s Greenwald is now celebrated by all strands of the Left as a sort of American/Brazilian Simon Bolivar on steroids – with and in may cases without any irony. Yet there’s a huge problem. The Intercept is owned by hardcore information-war practitioner Pierre Omidyar.

Whose Hybrid War?

The crucial question ahead is what the Brazilian military are really up to in this epic swamp – and how deep they are subordinated to Washington’s Divide et Impera.

It revolves around the all-powerful Cabinet of Institutional Security, known in Brazil by its acronym GSI. GSI stalwarts are all Washington consensus. After the “communist” Lula/Dilma years, these guys are now consolidating a Brazilian Deep State overseeing full spectrum political control, just like in the U.S..

GSI already controls the whole intel apparatus, as well as Foreign Policy and Defense, via a decree surreptitiously released in early June, only a few days before The Intercept’s bombshell. Even Captain Marvel Moro is subjected to the GSI; they must approve, for instance, everything Moro discusses with the DoJ and the U.S. Deep State.

As I’ve discussed with some of my top informed Brazilian interlocutors, crack anthropologist Piero Leirner, who knows in detail how the military think, and Swiss-based international lawyer and UN adviser Romulus Maya, the U.S. Deep Stateseems to be positioning itself as the spawning mechanism for the direct ascension of the Brazilian military to power, as well as their guarantors. As in, if you don’t follow our script to the letter – basic trade relations only with China; and isolation of Russia – we can swing the pendulum anytime.

After all, the only practical role the USG would see for the Brazilian military – in fact for all Latin America military – is as “war on drugs” shock troops.

 

Intercept Exclusive: Brazilian Judge in Car Wash Corruption Case Mocked Lula’s Defense and Secretly Directed Prosecutors’ Media Strategy During Trial.

There is no smoking gun – yet. But the scenario of Leak Wash as part of an extremely sophisticated, full spectrum dominance psyops, an advanced stage of Hybrid War, must be seriously considered.

For instance, the extreme-right, as well as powerful military sectors and the Globo media empire suddenly started spinning that The Intercept bombshell is a “Russian conspiracy.”

When one follows the premier military think tank website– featuring loads of stuff virtually copy and pasted straight from the U.S. Naval War College – it’s easy to be startled at how they fervently believe in a Russia-China Hybrid War against Brazil, where the beachhead is provided by “anti-national elements” such as the Left as a whole, Venezuelan Bolivarians, FARC, Hezbollah, LGBT, indigenous peoples, you name it.

After Leak Wash, a concerted fake news blitzkrieg blamed the Telegram app (“they are evil Russians!”) for hacking Moro and Dallagnol’s phones. Telegram officially debunked it in no time.

Then it surfaced that former president Dilma Rousseff and the current Workers’ Party president Gleisi Hoffmann paid a “secret” visit to Moscow only five days before the Leak Wash bombshell. I confirmed the visit with the Duma, as well as the fact that for the Kremlin, Brazil, at least for the moment, is not a priority. Eurasian integration is. That in itself debunks what the extreme-right in Brazil would spin as Dilma asking for Putin’s help, who then released his evil hackers.

Leak Wash – Car Wash’s season two – may be following the Netflix and HBO pattern. Remember that season three of True Detective was an absolute smash. We need Mahershala Ali-worthy trackers to sniff out patches of evidence suggesting the Brazilian military – with the full support of the U.S. Deep State – might be instrumentalizing a mix of Leak Wash and “the Russians” Hybrid War to criminalize the Left for good and orchestrate a silent coup to get rid of the Bolsonaro clan and their sub-zoology collective IQ. They want total control – no clownish intermediaries. Will they be biting more bananas than they can chew?

%d bloggers like this: