About Me

My photo
SEEKONK, MASSACHUSETTS, United States

Thursday, January 19, 2023

RUSSIAGATE PART 6: REMEMBER THIS? 2016 PUTIN INSTALLS TRUMP IN WHITE HOUSE, AFTER RUSSIA CORRUPTS PRESIDENTIAL ELECTION. PART 6.

 

BREAKING DOWN THE MUELLER REPORT: FOR ANSWERS, LOOK IN THE RIGHT PLACES.




(Any words that are colored RED represent portions of the Transcript that were BLACKED OUT, 
AND COULD NOT BE READ.WORDS LIKE "INVESTIGATIVE TECHNIQUE" OR "HARM TO ON GOING MATTER", ARE NOT MY CREATION, BUT WERE PLACED OVER BLACKED OUT AREAS.)


As you go through the MUELLER REPORT, there is one very important detail that must be acknowledged: IT IS THE STORY OF TWO INVESTIGATIONS. Why do I say this? BECAUSE CONCLUSIONS DRAWN WERE NOT ARRIVED AT BY THE SAME PROCESS,WITH JUST ONE AGENCY, DEPARTMENT OR INDIVIDUAL RESPONSIBLE FOR EVALUATING EACH EVENT, AND THE VALUE OF THE CORRESPONDING EVIDENCE.

WHAT DO I MEAN? CONSIDER THE FOLLOWING EXCERPTS, TAKEN 
DIRECTLY FROM THE TEXT. (IN ITALICS)

The Russian government interfered in the 2016 presidential election in sweeping and systematic fashion. Evidence of Russian government operations began to surface in mid-2016. 

As set forth in detail in this report, the Special Counsel's investigation established that Russia interfered in the 2016 presidential election principally through two operations.


First, a Russian entity carried out a social media campaign that favored presidential candidate Donald J. Trump and disparaged presidential candidate Hillary Clinton. 

RUSSIAN SOCIAL MEDIA CAMPAIGN. 

(HERE ARE SOME EXCERPTS FROM THE BODY OF THE TEXT.)

Internet Research Agency (IRA) carried out the earliest Russian interference operations identified by the investigation. A social media campaign designed to provoke and amplify political and social discord in the United States.

- The IRA was based in St. Petersburg, Russia, and received funding from Russian oligarch Yevgeniy Prigozhin and companies he controlled. Pri ozhin is widely reported to have ties to Russian President Vladimir Putin. HARM TO ONGOING MATTER.

- The campaign evolved from a generalized program designed in 2014 and 2015 to undermine the U.S. electoral system, to a targeted operation that by early 2016 favored candidate Trump and disparaged candidate Clinton. 


- The IRA later used social media accounts and interest groups to sow discord in the U.S. political system through what it termed "information warfare." 


 The IRA' s operation also included the purchase of political advertisements on social media in the names of U.S. persons and entities, as well as the staging of political rallies inside the United States. To organize those rallies, IRA employees posed as U.S. grassroots entities and persons and made contact with Trump supporters and Trump Campaign officials in the United States. 
-


Second, a Russian intelligence service conducted computer-intrusion operations against entities, employees, and volunteers working on the Clinton Campaign and then released the stolen documents. 


RUSSIAN HACKING OPERATIONS. 
(HERE ARE SOME EXCERPTS FROM THE BODY OF THE TEXT.)

At the same time that the IRA operation began to focus ·on supporting candidate Trump in early 2016, the Russian government employed a second form of interference: cyber intrusions (hacking) and releases of hacked materials damaging to the Clinton Campaign. The Russian intelligence service known as the Main Intelligence Directorate of the General Staff of the Russian Army (GRU) carried out these operations. In March 2016, the GRU began hacking the email accounts of Clinton Campaign. 


In March 2016, the GRU began hacking the email accounts of Clinton Campaign volunteers and employees....the GRU hacked into the computer networks of the Democratic Congressional Campaign Committee (DCCC) and the Democratic National Committee (DNC). The GRU stole hundreds of thousands of documents from the compromised email accounts and networks. Around the time that the DNC announced in mid-June 2016 the Russian government's role in hacking its network, the GRU began disseminating stolen materials through the fictitious online personas "DCLeaks" and "Guccifer 2.0." The GRU later released additional materials through the organization WikiLeaks. 

The presidential campaign of Donald J. Trump ("Trump Campaign" or "Campaign") showed interest in WikiLeaks' s releases of documents and welcomed their Potential to damage candidate Clinton. Beginning in June 2016, HARM TO ONGOING MATTER forecast to senior Campaign officials that WikiLeaks would release information damaging to candidate Clinton. WikiLeaks' s first release came in July 2016. 




Now, the Investigation into the above 2 categories provided enough evidence to the committee that
made them confident in drawing definite conclusions, and in some cases, filing Criminal Charges. I will cover these in more depth at a later time, but there is one more category to cover. What you read below may seem to be a part of the RUSSIAN HACKING OPERATION...

...BUT THERE IS ONE MAJOR DIFFERENCE.


EXCERPTS FROM THE BODY OF THE TEXT.

In addition to targeting individuals involved in the Clinton Campaign, GRU officers also targeted individuals and entities involved in the administration of the elections. Victims included U.S. state and local entities, such as state boards of elections (SBOEs), secretaries of state, and county governments, as well as individuals who worked for those entities. 186 The GRU also targeted private technology firms responsible for manufacturing and administering election-related software and hardware, such as voter registration software and electronic polling stations.187 The GRU continued to target these victims through the elections in November 2016. While the investigation identified evidence that the GRU targeted these individuals and entities, the Office did not investigate further. The Office did not, for instance, obtain or examine servers or other relevant items belonging to these victims. The Office understands that the FBI, the U.S. Department of Homeland Security, and the states have separately investigated that activity. 

By at least the summer of 2016, GRU officers sought access to state and local computer networks by exploiting known software vulnerabilities on websites of state and local governmental entities. GRU officers, for example, targeted state and local databases of registered voters using a technique known as "SQL injection," by which malicious code was sent to the state or local website in order to run commands (such as exfiltrating the database contents). 188 In one instance in approximately June 2016, the GRU compromised the computer network of the Illinois State Board of Elections by exploiting a vulnerability in the SBOE's website. The GRU then gained access to a database containing information on millions of registered Illinois voters, 189 and extracted data related to thousands of U.S. voters before the malicious activity was identified.


GRU officers INVESTIGATIVE TECHNIQUE scanned state and local websites for vunerabilities. For example, over a two day period in july 2016, GRU OFFICERS INVESTIGATVE TECHNIQUE
for vulnerabilities on websites of two dozen states. INVESTIGATIVE TECHNIQUE.

Unit 74455 also sent spearphishing emails to public officials involved in election

administration and personnel at companies involved in voting technology. In August 2016, GRU officers targeted employees of **** ,a voting technology company that developed software used by numerous U.S. counties to manage voter rolls, and installed malware on the company network. Similarly, in November 2016, the GRU sent spearphishing emails to over 120 email accounts used by Florida county officials responsible for administering the 2016 U.S. election. 191 The spearphishing emails contained an attached Word document coded with malicious software (commonly referred to as a Trojan) that permitted the GRU to access the infected computer.192 The FBI was separately responsible for this investigation. We understand the FBI believes that this operation enabled the GRU to gain access to the network of at least one Florida county government. The Office did not independently verify that belief and, as explained above, did not undertake the investigative steps that would have been necessary to do so.



The Hacking operations that included the following:

- Individuals and entities involved in the administration of the elections.


- U.S. state and local entities, such as state boards of elections (SBOEs), secretaries of state, and county governments, as well 
as individuals who worked for those entities.

- Private technology firms responsible for manufacturing and administering election-related software and hardware, such 
as voter registration software and electronic polling stations.

- Employees of **** ,a voting technology company that developed software used by numerous U.S. counties to manage voter rolls, and installed malware on the company network. 


- Florida county officials responsible for administering the 2016 U.S. election...


WERE NOT EVALUATED, IN TERMS OF THE QUALITY OF THE EVIDENCE, BY THE OFFICE OF THE SPECIAL COUNSEL.


FROM THE TEXT:
"While the investigation identified evidence that the GRU targeted these individuals and entities, the Office did not investigate further. The Office did not, for instance, obtain or examine servers or other relevant items belonging to these victims. The Office understands that the FBI, the U.S. Department of Homeland Security, and the states have separately investigated that activity." 


"The Office did not independently verify that belief and, as explained above, did not undertake the investigative steps that would have been necessary to do so."


WHAT DOES THIS MEAN? WHILE THE OFFICE OF THE SPECIAL COUNSEL IDENTIFIED EVIDENCE THAT THE GRU"TARGETED THESE INDIVIDUALS AND ENTITIES", NO FURTHER INVESTIGATION WAS DONE.

WHY?

"The Office understands that the FBI, the U.S. Department of Homeland Security, and the states have separately investigated that activity."


"The Office did not independently verify that belief and, as explained above, did not undertake the investigative steps that would have been necessary to do so."

Well this answers the question: "Who is exonerated by the Mueller Report?"
ANSWER: NO ONE. The Evaluation of the
most important information regarding fraud in 
the 2016 election was not part of their 
responsibility. They couldn't exonerate anyone
even if they wanted to. 

Wednesday, January 18, 2023

BUSY DAY ON TWITTER.

 TRUMPS RETURN TO TWITTER:


Trump returning to twitter? So what? This will end the fantasy that MUSK AND TRUMP WERE EVER ENEMIES. They are two of a kind. Mankind is to be used and abused for their Desires and Amusements. There is no Lie too Big, No Betrayal too Deep, No Prejudice too Vile to bother them.

Truth Social was nothing more than a charade to get trump back on twitter. Did you really think MUSKS No Censorship Ever campaign was actually about Censorship? It was to give Trump Carte Blanche to say anything he wants. It was never about NO CENSORSHIP, IT WAS NO STANDARDS.

FROM EPOCH TIMES AND TRUMP


MY RESPONSE:

You mean they blocked a report filled with Rumors, Innuendo, Slurs., etc. that didn't vaguely resemble a competent and professional news report? Oh, I keep forgetting who I'm talking to. Rumors, Innuendo, Slurs., etc., isn't that the EPOCH TIMES MANTRA?



MY RESPONSE:

EVIDENCE. DATE. SUBJECT. SHOW US A COPY. THE FUNNY THING, WHEN PROGRESSIVES GO AFTER TRUMPIANS, WE DO PROVIDE EVIDENCE, AND BACK IT UP. YOU MUST HATE THAT. SORRY FOR THAT DER FUEHRER TRUMP, YOU TOO VLADIMIR.


1) … a doctor who argued that natural immunity was superior to vaccination. #Twitter suppressed the tweet, even though the doctor was correct.

2) … , who argued against school closures. 3) … over his criticism of Dr. #AnthonyFauci.

MY RESPONSE:

The DOCTOR was correct? Really? The source of that conclusion was from where? Please show us the EVIDENCE THAT TWITTER SUPPRESSED VALUABLE\MEDICAL INFO. that contradicted what we now know to be true. CITE SOURCES. Or did TWITTER remove BOGUS MEDICAL QUACKERY?

Tuesday, January 17, 2023

MY EVALUATION. PART 3: FINAL REPORT Select Committee to Investigate the January 6th Attack on the United States Capitol.



EXECUTIVE SUMMARY.

DEVELOPING EVIDENCE.

On election night 2020, the election returns were reported in almost exactly the way that Stepien and other Trump Campaign experts predicted, with the counting of mail-in and absentee ballots gradually diminishing President Trump’s perceived lead...

...advised him that the results of the election would not be known for some time, and that he could not truthfully declare victory. “It was far too early to be making any calls like that. Ballots—ballots were still being counted. Ballots were still going to be counted for days.” 

Campaign Senior Advisor Jason Miller told the Select Committee that he argued against declaring victory at that time as well, because “it was too early to say one way [or] the other” who had won. Stepien advised Trump to say that “votes were still being counted. It’s too early to tell, too early to call the race but, you know, we are proud of the race we run

President Trump refused, and instead said this in his public remarks that evening: “This is a fraud on the American public. This is an embarrassment to our country. We were getting ready to win this election. Frankly, we did win this election. We did win this election . . . . We want all voting to stop.” And on the morning of November 5th, he tweeted “STOP THE COUNT!” Halting the counting of votes at that point would have violated both State and Federal laws.

MY ANALYSIS: Obviously, when it became clear that Trump was not going to win easily, and the Race could not be called either way, TRUMP WITH NO EVIDENCE DECLARED IT A FRAUD. HE CALLED FOR THE VOTE COUNTING TO BE STOPPED. IT DIDN'T MATTER THAT WOULD BE A VIOLATION OF ELECTION LAWS.

President Trump’s decision to declare victory falsely on election night and, unlawfully, to call for the vote counting to stop, was not a spontaneous decision. It was premeditated. The Committee has assembled a range of evidence of President Trump’s preplanning for a false declaration of victory.

This includes multiple written communications on October 31 and November 3, 2020, to the White House by Judicial Watch President Tom Fitton. This evidence demonstrates that Fitton was in direct contact with President Trump and understood that President Trump would falsely declare victory on election night and call for vote counting to stop...

The evidence also includes an audio recording of President Trump’s advisor Steve Bannon, who said this on October 31, 2020, to a group of his associates from China: 

"And what Trump’s gonna do is just declare victory, right? He’s gonna declare victory. But that doesn’t mean he’s a winner. He’s just gonna say he’s a winner . . . The Democrats—more of our people vote early that count. Theirs vote in mail. And so they’re gonna have a natural disadvantage, and Trump’s going to take advantage of it—that’s our strategy. He’s gonna declare himself a winner. So when you wake up Wednesday morning, it’s going to be a firestorm . . . . Also, if Trump, if Trump is losing, by 10 or 11 o’clock at night, it’s going to be even crazier. No, because he’s gonna sit right there and say “They stole it. I’m directing the Attorney General to shut down all ballot places in all 50 states.” 

Also in advance of the election, Roger Stone, another outside advisor to President Trump, made this statement: I really do suspect it will still be up in the air. When that happens, the key thing to do is to claim victory. Possession is nine-tenths of the law. No, we won. Fuck you, Sorry. Over. We won. You’re wrong. Fuck you

MY ANALYSIS; The Evidence shows Donald Trump had no intention of losing this election, and he laid out to others; In this case, Tom Fitton and Steve Bannon, his decision to declare fraud Days before the Election was to take place if things didn't go his way. 

It is also clear that Roger Stone encouraged Trump to Declare Victory, no matter what the results were, and shut down the process. This was an actual recommendation to Trump that he should commit TREASON. STONE WAS AN ACTIVE PART OF THE CONSPIRACY TO VIOLATE ELECTION LAW, AND SEIZE CONTROL OF THE GOVERNMENT.

TO BE CONTINUED...

A SHORT TWITTER EXCHANGE ON ECONOMICS.






It's time for the federal government to do the same thing.



MY RESPONSE:
Or you might say: Your income has decreased by... if you want to spend more on things you consider important, you need to increase the amount you earn. Look for sources of income that you may have had in the past, and see if you can tap into that again. Government should try it.