Podesta emails

February 27, 2019 – Cohen testifies Trump had prior knowledge of Wikileaks release of the DNC emails…and so did the rest of the world

(…) “Cohen came to the hearing loaded for bear, alleging in the opening minutes that Trump knew in advance that WikiLeaks planned in July 2016 to release a batch of emails damaging to Hillary Clinton.

Cohen testified that he overheard a phone call from Trump’s longtime friend and confidante Roger Stone in which Stone, in July 2016, allegedly informed Trump he had spoken by telephone with WikiLeaks founder Julian Assange and learned that the anti-secrecy group would be publishing a “massive dump” of Clinton emails within days.

Cohen said he could hear the call because Trump had put Stone on speaker phone — a common practice of Trump’s, he said — and estimated that the call took place on July 18 or 19. Prosecutors have said that WikiLeaks confirmed to an online persona operated by Russian military intelligence officers on July 18 that it had received “the 1GB or so archive” of stolen material and would make the documents public that week.” (Washington Post, 2/28/2019)

While Cohen is still testifying, Wikileaks tweets about Julian Assange discussing their plan to republish Clinton’s emails in March, 2016. The State Department originally published Clinton’s emails in an unsearchable format. Wikileaks was kind enough to reformat the emails to make them searchable.

Julian Assange was also interviewed on June 12, 2016, stating he would soon be releasing emails related to Hillary Clinton, long before the presumable phone call Michael Cohen overheard between President Trump and Roger Stone.

Matt Taibbi understands the entire world knew about the upcoming Wikileaks release, long before the phone call Michael Cohen claims he overheard in July, 2016.

 

(Credit: Twitter)

Jimmy Dore breaks it down:

July 13, 2018 – Mueller’s indictment of Russian intelligence officers, contradicts evidence in the public domain

“On July 13th, 2018, an indictment was filed by Special Counsel Robert Swan Mueller III.

This author is responding to the indictment because it features claims about Guccifer 2.0 that are inconsistent with what has been discovered about the persona, including the following:

Evidence was found over 500 days ago relating to the Guccifer 2.0 persona that showed they had deliberately manipulated files to have Russian metadata. We know the process used to construct the documents was not due to accidental mistakes during the creation process.

The original template document that Guccifer 2.0 used has been identified. It is also the source of the presence of Warren Flood’s name and can be found attached to one of Podesta’s emails (it has RSIDs matching with Guccifer 2.0’s first couple of documents).

The Trump opposition research, which CrowdStrike claimed was targeted at the DNC, apparently in late April 2016, isn’t what Guccifer 2.0 actually presented to reporters. It also didn’t come from the DNC but was an attached file on one of John Podesta’s emails – not the DNC’s. This specific copy appears to have been edited by Tony Carrk shortly before it was sent to Podesta. The fact that Guccifer 2.0’s initial releases were Podesta email attachments was even conceded by a former DNC official.

It appears that Guccifer 2.0 fabricated evidence on June 15, 2016, that coincidentally dovetailed with multiple claims made by CrowdStrike executives that had been published the previous day.

Guccifer 2.0 went to considerable effort to make sure Russian error messages appeared in copies of files given to the press.

Evidence – which Guccifer 2.0 couldn’t manipulate due to being logged by third parties – suggests he was operating in the US.

Additional evidence, which Guccifer 2.0 would have been unlikely to realize “he” was leaving, indicated that the persona was archiving files in US time zones before release, with email headers giving him away early on.

Virtually everything that has been claimed to indicate Guccifer 2.0 was Russian was based on something he chose to do.

Considering that Guccifer 2.0 had access to Podesta’s emails, yet never leaked anything truly damaging to the Clinton campaign even though he would have had access to it, is highly suspicious. In fact, Guccifer 2.0 never referenced any of the scandals that would later explode when the DNC emails and Podesta email collections were published by WikiLeaks.” (Read more: Adam Carter, Disobedient Media, 7/15/2018)

October 31, 2017 – Editorial: The Papadopoulos Case

Andrew C. McCarthy (Credit: National Review)

By: Andrew C. McCarthy

(…) “Papadopoulos is a climber who was clearly trying to push his way into Trump World. We recall that much of the Republican foreign-policy clerisy shunned Trump during the campaign. Thus did comparatively obscure people like Carter Page get seats at the table. George Papadopoulos was another of these: a 30-year-old who graduated from DePaul in 2009, later got an M.A. from the London School of Economics, and did sporadic work for the Hudson Institute between 2011 and 2014.

While living in London in early March 2016, he spoke with an unidentified Trump-campaign official and learned he would be designated a foreign-policy adviser to the campaign. These arrangements are very loose. Papadopoulos was a fringe figure, not plugged into Trump’s inner circle.

In London, Papadopoulos met an unidentified Russian academic (referred to as “the Professor”), who claimed to have significant ties to Putin-regime officials and who took an interest in Papadopoulos only because he boasted of having Trump-campaign connections. There appears to be no small amount of puffery on all sides: Papadopoulos suggesting to the Russians that he could make a Trump meeting with Putin happen, and suggesting to the campaign that he could make a Putin meeting with Trump happen; the Professor putting Papadopoulos in touch with a woman who Papadopoulos was led to believe was Putin’s niece (she apparently is not); and lots and lots of talk about potential high- and low-level meetings between Trump-campaign and Putin-regime officials that never actually came to pass.

In the most important meeting, in London on April 26, 2016, the Professor told Papadopoulos that he (the Prof) had just learned that top Russian-government officials had obtained “dirt” on then-putative Democratic presidential nominee Hillary Clinton. The dirt is said to include “thousands of emails” — “emails of Clinton.” The suggestion, of course, was that the Russians were keen to give this information to the Trump campaign.

This may raise the hopes of the “collusion with Russia” enthusiasts. But there are two problems here.

First, Papadopoulos was given enough misinformation that we can’t be confident (at least from what Mueller has revealed here) that the Professor was telling Papadopoulos the truth. Remember, by April 2016, it had been known for over a year that Hillary Clinton had used a private email system for public business and had tried to delete and destroy tens of thousands of emails. The Russians could well have been making up a story around that public reporting in order further to cultivate the relationship with Papadopoulos (whom they appear to have seen as potentially useful). Note that the Professor suggested the Russians had Clinton’s own emails. But the emails we know were hacked were not Clinton’s — they were the DNC’s and John Podesta’s (Hillary is on almost none of them). So, Papadopoulos’s Russian interlocutors could well have been weaving a tale based on what had been reported, rather than on what was actually hacked and ultimately released by WikiLeaks.

Second, and more significant: If the proof, at best, implies that the Russians acquired thousands of Clinton emails and then had to inform a tangential Trump campaign figure of this fact so he could pass it along to the campaign, that would mean Trump and his campaign had nothing to do with the acquisition of the emails.”  (Read more: National Review, 10/31/2017)

February 13, 2017 – Clinton and her aide, Philippe Reines, troll General Flynn and his son with a reference to Pizzagate

Hillary Clinton is putting her newly-found extra free time to good use and trolls General Flynn and his son via Twitter.

The two-time failed presidential candidate responds to a tweet from long-time confidante Phillipe Reines directed at General Michael Flynn and his son saying what goes around ‘COMETS’ around, a reference to the Pizzagate scandal.

Reines tweets late in the evening on the same day General Flynn resigns as President Trump’s national security advisor:

A few minutes later, Reines retweets Clinton’s quick response to his tweet:

Reines is referencing a tweet that Flynn posted in December 2016.

(The tweet has since been deleted)

December 12, 2016 – US Intel vets dispute Russia hacking claims because the evidence should be there and is absent

“As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans.

Veteran Intelligence Professionals for Sanity

MEMORANDUM

Allegations of Hacking Election Are Baseless

Seal of the National Security Agency (Credit: NSA)

A New York Times report alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else.

Monday’s Washington Post reports that Sen. James Lankford, R-Oklahoma, a member of the Senate Intelligence Committee, has joined other senators in calling for a bipartisan investigation of suspected cyber-intrusion by Russia. Reading our short memo could save the Senate from endemic partisanship, expense and unnecessary delay.

In what follows, we draw on decades of senior-level experience – with emphasis on cyber-intelligence and security – to cut through uninformed, largely partisan fog. Far from hiding behind anonymity, we are proud to speak out with the hope of gaining an audience appropriate to what we merit – given our long labors in government and other areas of technology. And corny though it may sound these days, our ethos as intelligence professionals remains, simply, to tell it like it is – without fear or favor.

We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking:

Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did.

Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data.

All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient.

In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.

Awesome Technical Capabilities

Former National Security Agency contractor Edward Snowden. (Photo credit: The Guardian)

Again, NSA is able to identify both the sender and recipient when hacking is involved. Thanks largely to the material released by Edward Snowden, we can provide a full picture of NSA’s extensive domestic data-collection network including Upstream programs like Fairview, Stormbrew and Blarney. These include at least 30 companies in the U.S. operating the fiber networks that carry the Public Switched Telephone Network as well as the World Wide Web. This gives NSA unparalleled access to data flowing within the U.S. and data going out to the rest of the world, as well as data transiting the U.S.

In other words, any data that is passed from the servers of the Democratic National Committee (DNC) or of Hillary Rodham Clinton (HRC) – or any other server in the U.S. – is collected by the NSA.  These data transfers carry destination addresses in what are called packets, which enable the transfer to be traced and followed through the network.

Packets: Emails being passed across the World Wide Web are broken down into smaller segments called packets. These packets are passed into the network to be delivered to a recipient. This means the packets need to be reassembled at the receiving end.

To accomplish this, all the packets that form a message are assigned an identifying number that enables the receiving end to collect them for reassembly. Moreover, each packet carries the originator and ultimate receiver Internet protocol number (either IPV4 or IPV6) that enables the network to route data.

When email packets leave the U.S., the other “Five Eyes” countries (the U.K., Canada, Australia, and New Zealand) and the seven or eight additional countries participating with the U.S. in bulk-collection of everything on the planet would also have a record of where those email packets went after leaving the U.S.

These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources.

The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.

The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked.

The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.” (Read more: Consortium News, December 12, 2016)

November 4, 2016 – The Clinton Foundation confirms Qatar’s $1 million gift for Bill’s 65th birthday, while Hillary was at State Dept

“The Clinton Foundation has confirmed it accepted a $1 million gift from Qatar while Hillary Clinton was U.S. secretary of state without informing the State Department, even though she had promised to let the agency review new or significantly increased support from foreign governments.

(Credit: Brian Snyder/Reuters)

Qatari officials pledged the money in 2011 to mark the 65th birthday of Bill Clinton, Hillary Clinton’s husband and sought to meet the former U.S. president in person the following year to present him the check, according to an email from a foundation official to Hillary Clinton’s presidential campaign chairman, John Podesta. The email, among thousands hacked from Podesta’s account, was published last month by WikiLeaks.

(…) Clinton Foundation officials last month declined to confirm the Qatar donation. In response to additional questions, a foundation spokesman, Brian Cookstra, this week said that it accepted the $1 million gift from Qatar, but this did not amount to a “material increase” in the Gulf country’s support for the charity. Cookstra declined to say whether Qatari officials received their requested meeting with Bill Clinton.

(…) Foundation officials told Reuters last year that they did not always comply with central provisions of the agreement with President Barack Obama’s administration, blaming oversights in some cases.

At least eight other countries besides Qatar gave new or increased funding to the foundation, in most cases to fund its health project, without the State Department being informed, according to foundation and agency records. They include Algeria, which gave for the first time in 2010, and the United Kingdom, which nearly tripled its support for the foundation’s health project to $11.2 million between 2009 and 2012.

Foundation officials have said some of those donations, including Algeria, were oversights and should have been flagged, while others, such as the UK increase, did not qualify as material increases.” (Read more: Reuters, 11/04/2016)  (Archive)

September 2016 – August 10, 2018 – Opinion: Conservative Treehouse details the true Russian collusion during the 2016 Election

(…) “In essence, Christopher Steele was interested in getting Oleg Deripaska a new VISA to enter the U.S.  Steele was very persistent on this endeavor and was soliciting Bruce Ohr for any assistance.  This also sets up a quid-pro-quo probability where the DOJ/FBI agrees to remove travel restrictions on Deripaska in exchange for cooperation on ‘other matters.’

Now we skip ahead a little bit to where Deripaska gained an entry visa, and one of Oleg Deripaska’s lawyers and lobbyists Adam Waldman was representing his interests in the U.S. to politicians and officials.  In May of 2018, John Solomon was contacted by Adam Waldman with a story about how the FBI contacted Deripaska for help in their Trump Russia investigation in September of 2016.

(Credit: Conservative Treehouse)

Keep in mind, this is Waldman contacting Solomon with a story.

Waldman told Solomon a story about how his client Oleg Deripaska was approached by the FBI in September of 2016 and asked for help with information about Paul Manafort and by extension Donald Trump.  Within the backstory for the FBI and Deripaska was a prior connection between Robert Mueller and Deripaska in 2009.

Again, as you read the recap, remember this is Waldman contacting Solomon.  Article Link Here – and my summary below:

In 2009 the FBI, then headed by Robert Mueller, requested the assistance of Russian billionaire Oleg Deripaska in an operation to retrieve former FBI officer and CIA resource Robert Levinson who was captured in Iran two years earlier.  The agent assigned to engage Deripaska was Andrew McCabe; the primary FBI need was financing and operational support.  Deripaska spent around $25 million and would have succeeded except the U.S. State Department, then headed by Hillary Clinton, backed out.

In September of 2016 Andrew McCabe is now Deputy Director of the FBI, when two FBI agents approached Deripaska in New York – again asking for his help.  This time the FBI request was for Deripaska to outline Trump’s former campaign manager Paul Manafort as a tool of the Kremlin.  Deripaska once hired Manafort as a political adviser and invested money with him in a business venture that went bad. Deripaska sued Manafort, alleging he stole money. However, according to the article, despite Deripaska’s disposition toward Manafort he viewed the request as absurd. He laughed the FBI away, telling them: “You are trying to create something out of nothing.”

This story, as told from the perspective of Adam Waldman, Deripaska’s lawyer/lobbyist, is important because it highlights a connection between Robert Mueller and Oleg Deripaska; a connection Mueller and the DOJ/FBI never revealed on their own.

I wrote about the ramifications of the Solomon story HERE.  Again, hopefully most will review; because there’s a larger story now visible with the new communication between Christopher Steele and Bruce Ohr.

It is likely that Oleg’s 2016 entry into the U.S. was facilitated as part of a quid-pro-quo; either agreed in advance, or, more likely, planned by the DOJ/FBI for later use in their 2016 Trump operation; as evidenced in the September 2016 FBI request.  Regardless of the planning aspect, billionaire Deripaska is connected to Chris Steele, a source for Chris Steele, and likely even the employer of Chris Steele.

The FBI used Oleg Deripaska (source), and Oleg Deripaska used the FBI (visa).

Here’s where it gets interesting….

In that May article John Solomon reports that Deripaska wanted to testify to congress last year (2017), without any immunity request, but was rebuked. Who blocked his testimony?

(…) “Now, think about this….  Yes, with Oleg Deripaska in the picture there was indeed Russian meddling in the 2016 election; only, it wasn’t the type of meddling currently being sold.  The FBI/DOJ were using Russian Deripaska to frame their Russian conspiracy narrative. It is almost a certainty that Deripaska was one of Chris Steeles sources for the dossier.

Now, put yourself in Deripaska’s shoes and think about what happens AFTER candidate Donald Trump surprisingly wins the election.

All of a sudden Deripaska the asset becomes a risk to the corrupt Scheme Team (DOJ/FBI et al); especially as the DOJ/FBI then execute the “insurance policy” effort against Donald Trump and eventually enlist Robert Mueller.

It is entirely possible for a Russian to be blackmailing someone, but it ain’t Trump vulnerable to blackmail; it’s the conspiracy crew within the DOJ and FBI.  Deripaska now has blackmail material on Comey, McCabe and crew.

After the 2017 (first year) failure of the “insurance policy” it now seems more likely President Trump will outlive the soft coup.  In May 2018, Oleg tells Waldman to call John Solomon and tell him the story from a perspective favorable to Deripaska.

As the story is told, in 2017, Oleg [Deripaska] was more than willing to testify to congress…likely laughing the entire time. But the corrupt participants within congress damned sure couldn’t let Deripaska testify.  Enter corrupt (SSCI) Vice-Chairman, Mark Warner:

Senator Mark Warner (l) and Senator Richard Burr confer at a Senate Intelligence Committee meeting. (Credit: public domain)

The Russians (Deripaska) really do have leverage and blackmail…but it ain’t over Trump. Oleg has blackmail on Comey,  McCabe and conspiracy crew.  Oleg Deripaska must be kept away from congress and away from exposing the scheme.

Guess who else must be controlled and/or kept away from congress?

Julian Assange.

Assange has evidence the Russians didn’t hack the DNC.

Between Deripaska’s first-hand knowledge of the DOJ/FBI work on both the Dossier and the DOJ/FBI intention for his use as a witness; and Julian Assange’s first-hand knowledge of who actually took the DNC email communication…well, the entire Russian narrative could explode in their faces.

Control is needed.

You can almost hear the corrupt U.S. intelligence officials calling their U.K. GCHQ partners in Britain and yelling at them to do something, anything, and for the love of God, shut down Assange’s access to the internet STAT.  Yeah, funny that.

Now, who moves into position to control Julian Assange?

BREAKING: US Senate Intelligence Committee calls editor @JulianAssange to testify. Letter delivered via US embassy in London. WikiLeaks’ legal team say they are “considering the offer but the conditions must conform to a high ethical standard”. Also: https://t.co/pPf0GTjTlp pic.twitter.com/gQIUstbGbq

— WikiLeaks (@wikileaks) August 8,2018

Apparently the SSCI wants to interview WikiLeaks founder Julian Assange, in a closed session.  Signed by none-other than our corrupt-o-crats Richard Burr and Mark Warner.  Yeah, funny that.

Lest anyone need a reminder, the most corrupt part of congress is the Senate Select Committee on Intelligence (SSCI). The SSCI is the center of the deepest part of the Deep State swamp. The SSCI never, ever, E.V.E.R…does anything that does not protect and advance the self-interest of the corrupt Washington DC professional political class.” (Read much more: Conservative Treehouse, 8/10/2018)