February 27, 2019 – Cohen testifies Trump had prior knowledge of Wikileaks release of the DNC emails…and so did the rest of the world
(…) “Cohen came to the hearing loaded for bear, alleging in the opening minutes that Trump knew in advance that WikiLeaks planned in July 2016 to release a batch of emails damaging to Hillary Clinton.
Cohen testified that he overheard a phone call from Trump’s longtime friend and confidante Roger Stone in which Stone, in July 2016, allegedly informed Trump he had spoken by telephone with WikiLeaks founder Julian Assange and learned that the anti-secrecy group would be publishing a “massive dump” of Clinton emails within days.
Cohen said he could hear the call because Trump had put Stone on speaker phone — a common practice of Trump’s, he said — and estimated that the call took place on July 18 or 19. Prosecutors have said that WikiLeaks confirmed to an online persona operated by Russian military intelligence officers on July 18 that it had received “the 1GB or so archive” of stolen material and would make the documents public that week.” (Washington Post, 2/28/2019)
While Cohen is still testifying, Wikileaks tweets about Julian Assange discussing their plan to republish Clinton’s emails in March, 2016. The State Department originally published Clinton’s emails in an unsearchable format. Wikileaks was kind enough to reformat the emails to make them searchable.
Julian Assange was also interviewed on June 12, 2016, stating he would soon be releasing emails related to Hillary Clinton, long before the presumable phone call Michael Cohen overheard between President Trump and Roger Stone.
— Free Thought (@FreeThought84) February 27, 2019
Matt Taibbi understands the entire world knew about the upcoming Wikileaks release, long before the phone call Michael Cohen claims he overheard in July, 2016.
Jimmy Dore breaks it down:
July 13, 2018 – Mueller’s Latest Indictment Contradicts Evidence In The Public Domain
“On July 13th, 2018, an indictment was filed by Special Counsel Robert Swan Mueller III.
This author is responding to the indictment because it features claims about Guccifer 2.0 that are inconsistent with what has been discovered about the persona, including the following:
Evidence was found over 500 days ago relating to the Guccifer 2.0 persona that showed they had deliberately manipulated files to have Russian metadata. We know the process used to construct the documents was not due to accidental mistakes during the creation process.
The original template document that Guccifer 2.0 used has been identified. It is also the source of the presence of Warren Flood’s name, and can be found attached to one of Podesta’s emails (it has RSIDs matching with .
The Trump opposition research, which CrowdStrike claimed was targeted at the DNC, apparently in late April 2016, isn’t what Guccifer 2.0 actually presented to reporters. It also didn’t come from the DNC, but was an attached file on one of John Podesta’s emails – not the DNC’s. This specific copy appears to have been edited by Tony Carrk shortly before it was sent to Podesta. The fact that Guccifer 2.0’s initial releases were Podesta email attachments was even conceded by a former DNC official.
It appears that Guccifer 2.0 fabricated evidence on June 15, 2016, that coincidentally dovetailed with multiple claims made by CrowdStrike executives that had been published the previous day.
Guccifer 2.0 went to considerable effort to make sure Russian error messages appeared in copies of files given to the press.
Evidence – which Guccifer 2.0 couldn’t manipulate due to being logged by third parties – suggests he was operating in the US.
Additional evidence, which Guccifer 2.0 would have been unlikely to realize “he” was leaving, indicated that the persona was archiving files in US time zones before release, with email headers giving him away early on.
Virtually everything that has been claimed to indicate Guccifer 2.0 was Russian was based on something he chose to do.
Considering that Guccifer 2.0 had access to Podesta’s emails, yet never leaked anything truly damaging to the Clinton campaign even though he would have had access to it, is highly suspicious. In fact, Guccifer 2.0 never referenced any of the scandals that would later explode when the DNC emails and Podesta email collections were published by WikiLeaks.” (Read more: Adam Carter, Disobedient Media, 7/15/2018)
December 12, 2016 – US Intel vets dispute Russia hacking claims because the evidence should be there and is absent
“As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans.
Veteran Intelligence Professionals for Sanity
Allegations of Hacking Election Are Baseless
A New York Times report alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else.
Monday’s Washington Post reports that Sen. James Lankford, R-Oklahoma, a member of the Senate Intelligence Committee, has joined other senators in calling for a bipartisan investigation of suspected cyber-intrusion by Russia. Reading our short memo could save the Senate from endemic partisanship, expense and unnecessary delay.
In what follows, we draw on decades of senior-level experience – with emphasis on cyber-intelligence and security – to cut through uninformed, largely partisan fog. Far from hiding behind anonymity, we are proud to speak out with the hope of gaining an audience appropriate to what we merit – given our long labors in government and other areas of technology. And corny though it may sound these days, our ethos as intelligence professionals remains, simply, to tell it like it is – without fear or favor.
We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking:
Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did.
Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data.
All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient.
In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.
Awesome Technical Capabilities
Again, NSA is able to identify both the sender and recipient when hacking is involved. Thanks largely to the material released by Edward Snowden, we can provide a full picture of NSA’s extensive domestic data-collection network including Upstream programs like Fairview, Stormbrew and Blarney. These include at least 30 companies in the U.S. operating the fiber networks that carry the Public Switched Telephone Network as well as the World Wide Web. This gives NSA unparalleled access to data flowing within the U.S. and data going out to the rest of the world, as well as data transiting the U.S.
In other words, any data that is passed from the servers of the Democratic National Committee (DNC) or of Hillary Rodham Clinton (HRC) – or any other server in the U.S. – is collected by the NSA. These data transfers carry destination addresses in what are called packets, which enable the transfer to be traced and followed through the network.
Packets: Emails being passed across the World Wide Web are broken down into smaller segments called packets. These packets are passed into the network to be delivered to a recipient. This means the packets need to be reassembled at the receiving end.
To accomplish this, all the packets that form a message are assigned an identifying number that enables the receiving end to collect them for reassembly. Moreover, each packet carries the originator and ultimate receiver Internet protocol number (either IPV4 or IPV6) that enables the network to route data.
When email packets leave the U.S., the other “Five Eyes” countries (the U.K., Canada, Australia, and New Zealand) and the seven or eight additional countries participating with the U.S. in bulk-collection of everything on the planet would also have a record of where those email packets went after leaving the U.S.
These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources.
The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.
The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked.
The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.” (Read more: Consortium News, December 12, 2016)
October 20, 2016 – Video: What harm did the DNC and Podesta emails do to the Clinton campaign, the DNC and the Democratic party overall?
This source/video by the Humanist Report gives the best explanation of what harm the DNC/Podesta emails did to Hillary Clinton’s campaign, the DNC and the Democratic party overall.
September 2016 – August 10, 2018 – Opinion: Conservative Treehouse details the true Russian collusion during the 2016 Election
(…) “In essence, Christopher Steele was interested in getting Oleg Deripaska a new VISA to enter the U.S. Steele was very persistent on this endeavor and was soliciting Bruce Ohr for any assistance. This also sets up a quid-pro-quo probability where the DOJ/FBI agrees to remove travel restrictions on Deripaska in exchange for cooperation on ‘other matters.’
Now we skip ahead a little bit to where Deripaska gained an entry visa, and one of Oleg Deripaska’s lawyers and lobbyists Adam Waldman was representing his interests in the U.S. to politicians and officials. In May of 2018, John Solomon was contacted by Adam Waldman with a story about how the FBI contacted Deripaska for help in their Trump Russia investigation in September of 2016.
Keep in mind, this is Waldman contacting Solomon with a story.
Waldman told Solomon a story about how his client Oleg Deripaska was approached by the FBI in September of 2016 and asked for help with information about Paul Manafort and by extension Donald Trump. Within the backstory for the FBI and Deripaska was a prior connection between Robert Mueller and Deripaska in 2009.
Again, as you read the recap, remember this is Waldman contacting Solomon. Article Link Here – and my summary below:
♦In 2009 the FBI, then headed by Robert Mueller, requested the assistance of Russian billionaire Oleg Deripaska in an operation to retrieve former FBI officer and CIA resource Robert Levinson who was captured in Iran two years earlier. The agent assigned to engage Deripaska was Andrew McCabe; the primary FBI need was financing and operational support. Deripaska spent around $25 million and would have succeeded except the U.S. State Department, then headed by Hillary Clinton, backed out.
♦In September of 2016 Andrew McCabe is now Deputy Director of the FBI, when two FBI agents approached Deripaska in New York – again asking for his help. This time the FBI request was for Deripaska to outline Trump’s former campaign manager Paul Manafort as a tool of the Kremlin. Deripaska once hired Manafort as a political adviser and invested money with him in a business venture that went bad. Deripaska sued Manafort, alleging he stole money. However, according to the article, despite Deripaska’s disposition toward Manafort he viewed the request as absurd. He laughed the FBI away, telling them: “You are trying to create something out of nothing.”
This story, as told from the perspective of Adam Waldman, Deripaska’s lawyer/lobbyist, is important because it highlights a connection between Robert Mueller and Oleg Deripaska; a connection Mueller and the DOJ/FBI never revealed on their own.
I wrote about the ramifications of the Solomon story HERE. Again, hopefully most will review; because there’s a larger story now visible with the new communication between Christopher Steele and Bruce Ohr.
It is likely that Oleg’s 2016 entry into the U.S. was facilitated as part of a quid-pro-quo; either agreed in advance, or, more likely, planned by the DOJ/FBI for later use in their 2016 Trump operation; as evidenced in the September 2016 FBI request. Regardless of the planning aspect, billionaire Deripaska is connected to Chris Steele, a source for Chris Steele, and likely even the employer of Chris Steele.
The FBI used Oleg Deripaska (source), and Oleg Deripaska used the FBI (visa).
Here’s where it gets interesting….
In that May article John Solomon reports that Deripaska wanted to testify to congress last year (2017), without any immunity request, but was rebuked. Who blocked his testimony?
(…) “Now, think about this…. Yes, with Oleg Deripaska in the picture there was indeed Russian meddling in the 2016 election; only, it wasn’t the type of meddling currently being sold. The FBI/DOJ were using Russian Deripaska to frame their Russian conspiracy narrative. It is almost a certainty that Deripaska was one of Chris Steeles sources for the dossier.
Now, put yourself in Deripaska’s shoes and think about what happens AFTER candidate Donald Trump surprisingly wins the election.
All of a sudden Deripaska the asset becomes a risk to the corrupt Scheme Team (DOJ/FBI et al); especially as the DOJ/FBI then execute the “insurance policy” effort against Donald Trump and eventually enlist Robert Mueller.
It is entirely possible for a Russian to be blackmailing someone, but it ain’t Trump vulnerable to blackmail; it’s the conspiracy crew within the DOJ and FBI. Deripaska now has blackmail material on Comey, McCabe and crew.
After the 2017 (first year) failure of the “insurance policy” it now seems more likely President Trump will outlive the soft coup. In May 2018, Oleg tells Waldman to call John Solomon and tell him the story from a perspective favorable to Deripaska.
As the story is told, in 2017, Oleg [Deripaska] was more than willing to testify to congress…likely laughing the entire time. But the corrupt participants within congress damned sure couldn’t let Deripaska testify. Enter corrupt (SSCI) Vice-Chairman, Mark Warner:
The Russians (Deripaska) really do have leverage and blackmail…but it ain’t over Trump. Oleg has blackmail on Comey, McCabe and conspiracy crew. Oleg Deripaska must be kept away from congress and away from exposing the scheme.
Guess who else must be controlled and/or kept away from congress?
Assange has evidence the Russians didn’t hack the DNC.
Between Deripaska’s first-hand knowledge of the DOJ/FBI work on both the Dossier and the DOJ/FBI intention for his use as a witness; and Julian Assange’s first-hand knowledge of who actually took the DNC email communication…well, the entire Russian narrative could explode in their faces.
You can almost hear the corrupt U.S. intelligence officials calling their U.K. GCHQ partners in Britain and yelling at them to do something, anything, and for the love of God, shut down Assange’s access to the internet STAT. Yeah, funny that.
Now, who moves into position to control Julian Assange?
March 19, 2016 – The phishing email that hacks the account of John Podesta
“This appears to be the phishing email that hacked Clinton campaign chairman John Podesta’s Gmail account. Further, The Clinton campaign’s own computer help desk thought it was real email sent by Google, even though the email address had a suspicious “googlemail.com” extension.”
The email, with the subject line “*Someone has your password,*” greeted Podesta, “Hi John” and then said, “Someone just used your password to try to sign into your Google Account email@example.com.” Then it offered a time stamp and an IP address in “Location: Ukraine.”
“Google stopped this sign-in attempt. You should change your password immediately.” And it then offered a link to change his password.
“This is a legitimate email,” Charles Delevan at the HFA help desk wrote to Podesta’s chief of staff, Sara Latham. “John needs to change his password immediately, and ensure that two-factor authentication is turned on his account.”
Delevan included the Gmail link that would be used to change a user’s password, but whoever changed Podesta’s password instead clicked on the shortened URL that was in the original phishing email. This is the same technique used to hack Colin Powell’s emails and the Democratic National Committee emails, according to the website Motherboard.” (Read more: CBS News, 10/28/2016) (Wikileaks – Podesta Emails)
December 21, 2015 – Hill columnist, Brent Budowsky, emails John Podesta with advice for Clinton about Obama, Syria, ISIS and to “slaughter Donald for his bromance w/Putin”
Hill columnist, Brent Budowsky, sends an email to John Podesta on December 21, 2015, titled “HRC, Obama and ISIS.” Wikileaks exposes other emails from Budowsky (and dozens of other journalists), in support of Hillary’s candidacy throughout the 2016 Democratic primary and general election.
In this Podesta email released by Wikileaks, Budowsky shares advice for Hillary Clinton on Israel, Syria, Russian president Vladimir Putin, Syrian president Bashar al-Assad, the United Nations and Daesh, also known as ISIL/ISIS. Last but not least, he also mentions “slaughtering Donald for his bromance with Putin.”
December 21, 2015 – Brent Budowsky advises John Podesta that Clinton should link Putin with Donald Trump in an apparent bid to distract voters from her strategy on ISIS in Syria
“Newly leaked emails show that Hillary Clinton’s campaign team was advised to link Russian President Vladimir Putin with Donald Trump in an apparent bid to distract voters from Clinton’s strategy on Islamic State (IS, formerly ISIS/ISIL).
The exchange of emails between Clinton campaign chair John Podesta and Clinton ally and columnist Brent Budowsky was among the batch of around 1,000 emails from Podesta’s account released by WikiLeaks on Saturday.
In a December 21, 2015 email, Budowsky slates Clinton’s position on fighting ISIS before advising Podesta to draw Putin into her attacks on US presidential election rival Trump.
Budowsky’s email follows a discussion with Podesta on how to best position the former secretary of state on the issue of tackling ISIS.
Budowsky warns that Clinton is not coming down strongly enough on fighting ISIS and that her support for President Barack Obama’s approach is a potential “death ray to her candidacy in a general election.”
“Walk back and escape from her statement that ‘finally we are where we need to be’ against ISIS. We are not where we need to be, we are far from it, most voters do not believe it, and when the next terror attack comes in America – which it certainly will – she will be branded in hot iron with that statement,” Budowski warns.
“She will never state what I believe we need to do – at least 20,000 ground troops with 3,000 American and at least 10,000 from Sunni Muslim nations – because she is consumed with keeping Obama’s goodwill and afraid of liberal backlash.”
Podesta counters: “Her reference was not to ISIS but to going after Assad diplomatically because of UNSC resolution passed Friday. We will make that clear. She has given two major speeches about how we are NOT where we need to be on ISIS.”
“That’s good, sooner it’s clarified the better, and the stronger the better,” Budowski replies, later adding: “Best approach is to slaughter Donald for his bromance with Putin, but not go too far betting on Putin re Syria.”
Speaking to RT after the emails were released by WikiLeaks on Saturday, Budowsky suggested that parts of the emails had been fabricated, denying that he ever wrote anything about “branding with a hot iron.”
“I don’t talk that way; I wouldn’t say that, and that was not in any of the emails,” he said. “So whoever added that, fabricated that.”
“As far as ‘slaughtering Donald Trump,’ about it, yes, I said that,” Budowsky added. “And the rest of it – fundamentally – does reflect my point of view.”
May 19, 2015 – Emails suggest the Justice Department communicates with Hillary Clinton’s campaign as the administration deals with fallout from her use of a private server
(…) “Brian Fallon, Clinton’s campaign spokesman and a Justice Department alum, wrote in May 2015 that “DOJ folks” had tipped him off to an upcoming status hearing in a high-profile lawsuit that threatened to expose Clinton’s 30,000 work-related emails to the public.
When Fallon informed Clinton confidantes that the Justice Department “filed a briefing saying the gov’t proposes releasing HRC’s cache of work-related emails in January 2016,” Cheryl Mils, a board member at the Clinton Foundation, reacted with surprise.
The conversation is one of many that shed light on the Clinton campaign’s efforts to stay ahead of a controversy that progressed rapidly during the early months of her White House bid.” (Read more: Washington Examiner, 10/11/2016)
November 11, 2011 – An email between John Podesta and Chelsea Clinton reveals another private email account and possible Chinese hacking
“Another private email address surfaces in the Wikileaks Podesta emails, and it apparently belongs to Chelsea Clinton aka Anna James. Most notable in her conversation with John Podesta right before Thanksgiving, 2011, is an admission to their “technology was all compromised” during a recent visit to China.
In June 2011, Google Inc. publicly warned that hackers based in China were targeting the Gmail email accounts of senior US officials. (The Wall Street Journal, 6/2/2011
On July 26, 2011, Clinton shows awareness of the problem through a joke.
Another State Department official sends Clinton an email, and some confusion results about the official’s two email accounts.
Clinton writes, “I just checked and I do have your state but not your Gmail – so how did that happen. Must be the Chinese!”