Mueller Investigation – more than ¥130k

2021-01-05 Update:

Robert Mueller’s was in contact with Facebook since 2011, lectured in Stanford University in Silicon Valley, and served  Big Tech clients of WilmerHale, including Apple, in 2013-2017. Apple depends more on the government of China than on all of its consumers in the US taken together. Apparently, taking money originating with unfriendly powers became natural for Mueller.

Mueller’s clients also transferred technology to Russia in Skolkovo.

In March 2017, two months before his appointment as Special Counsel, Robert Mueller received $24,000 (~ ¥130,000) from a firm owned by a top official of the Chinese government and the Communist Party of China. Almost certainly, he had expectation of future income contingent on approval of Chinese government. In exchange, he accepted, articulated, and publicly committed himself to the DNC conspiracy theory that “Russia had hacked the democracy”. Russia has hacked neither democracy nor the Democrats (despite them being near opposites). The DNC had an incompetent information systems team and an unprotected network that could have been hacked by anybody. For eight months the DNC fought FBI attempts to help, while possibly being suspicious of the FBI because of Hillary’s bathroom server. Persons who published the DNC’s dirty laundry or gave it to WikiLeaks are likely not connected to Russia at all and might be Americans. We don’t know their names because the Democratic Party made up the narrative that Putin ordered the DNC hacking and leaking of documents to aid Trump. Obama administration sent the FBI, CIA, DHS, and ODNI to confirm this narrative, rather than to investigate who had accessed the DNC voter’s database, believed to contain very detailed personal profiles of almost all adult Americans. The conspiracy theory of a Trump-Russia collusion was built on top of this narrative.

The firm that paid Mueller his ¥130k is the International Data Group (IDG), a subsidiary of China Oceanwide Holdings Group. Continue reading Mueller Investigation – more than ¥130k

FBI/DHS Report GRIZZLY STEPPE was Junk

The GRIZZLY STEPPE – Russian Malicious Cyber Activity released jointly by FBI and DHS on December 29, 2016 was an update on another propaganda piece — the Joint Statement from DHS and ODNI on Election Security, published by the Obama administration on October 7 to aid Hillary and other fellow democrats in the elections.

GRIZZLY STEPPE was so incompetent that even convinced partisans laughed it off. Continue reading FBI/DHS Report GRIZZLY STEPPE was Junk

CrowdStrike, MIS Department, and the DNC

Hillary presidential campaign chairwoman Donna Brazile’s book Hacks: The Inside Story of the Break-ins and Breakdowns That Put Donald Trump in the White House can be retold in one sentence:

The Russians have hacked the elections and poisoned my dog Chip.

Nevertheless, the book reveals some information concealed by Hillary and the DNC loyalists in FBI.

  • In August, seeing CrowdStrike’s helplessness, the DNC invited real cyber security people to form a competent network security team that the book calls the Hacker House, or HH. This contradicts the DNC official story that CrowdStrike was doing a fabulous job
  • HH found out that the DNC network was unprotected, and that anybody could have hacked into it 
  • HH informed DNC and Hillary’s campaign leadership of this fact and spent most of its time training DNC networking administrators
  • HH was asked, but refused to support allegations that the DNC network had been penetrated by “Russians.” HH also had run-ins with CrowdStrike.
  • The DNC, Hillary, and the Obama administration disregarded and suppressed this information. They continued their electoral campaign strategy: worsening relations with Russia, accusing Trump of collusion with Putin, and using the FBI, CIA, DHS, and ODNI to sabotage Trump’s campaign.  During the transition period, John Brennan and other Obama/Clinton loyalists used false allegations of the “Russian hacking” to attempt something like a coup d’état. The coup was not a complete failure – the angry Democrats have nearly wrestled control of the DOJ away from the elected president.

Continue reading CrowdStrike, MIS Department, and the DNC

A Review of the “Intelligence Community Assessment”

2018-10-03 update: I have just noticed that the declassified ICA text was published only a few hours before the joint session of Congress that certified Trump as the next president. James Clapper spent the previous day falsely alleging that the Assessment had been done by the U.S. Intelligence Community, pushed an exaggerated version of its conclusions, and leaked parts of it to the media. In his testimony before the Senate Armed Services Committee, Clapper made repeated assaults on the president-elect. When referring to Trump’s sober reaction to the alleged assessment, Clapper uttered the following: “I’ve received many expressions of concern from foreign counterparts of what has been interpreted as disparagement of the intelligence community.” The Assessment and even the published-the-next-day ICA text were still classified and hidden from the president-elect! Now that seems like a last ditch effort to prevent Trump’s inauguration. BTW, who were his ‘foreign counterparts’ and why was he so concerned about their opinions?

Attached is a review of the declassified version of the notorious Intelligence Community Assessment, published on 01/06/2017. The declassified ICA text (“the ICA text” or “the text”, referring to the public version of the alleged assessment) regurgitates the Democratic talking points and allegations that Putin ordered interference in the 2016 elections, including claims that the alleged interference was directed against electing Hillary and in favor of electing Trump as president. The latter statement was supported only by the FBI and CIA, not by the NSA. The ICA demonstrated an extreme partisan bias in favor of Hillary Clinton and the Democratic Party. The ICA text contains no declassified information. It repeats the same allegations over and over either without evidence, or with evidence refuting them. A quarter of the text is devoted to proving the obvious: that RT is controlled or directed by the Russian government.

Download

Continue reading A Review of the “Intelligence Community Assessment”

Silicon Valley Totalitarian Dystopia

The enlightened Silicon Valley has apparently created a totalitarian dystopia. Here, the term Silicon Valley includes Google, Facebook, Twitter, Microsoft, and Apple (“GFTMA”), even as Microsoft is headquartered in Washington state.

GFTMA have developed tools for nearly total speech control and deployed them against conservatives and other opponents of the Left. They tied themselves to the Left under the Obama administration. The political censorship and discrimination against the “right of left” authors and readers is well documented. This article focuses on the scientific and technical human potential of this country, a large part of which is computer and network engineers, scientists, businessmen, and other specialists affected by Silicon Valley. Continue reading Silicon Valley Totalitarian Dystopia

Climate Alarmism Kills

Massachusetts has been hit by a series of natural gas explosions. The main cause of this disaster is aging and deteriorating infrastructure, natural gas pipelines in this case.  Massachusetts (and New York, California, and few other deep blue states) diverted necessary funds from maintaining and upgrading infrastructure to climate change propaganda as well as subsidies to cronies in “renewable energy” and “carbon free” financing. Massachusetts Democrats were so prejudiced against pipelines that the state elected to import LNG from Russia. Continue reading Climate Alarmism Kills

Voodoo Attributions in Cyber Security

The Official Attribution of Network Breaches is Based on Conspiracy Theories

The DNC has not been hacked by the Russian hacking groups Fancy Bear (APT28) or Cozy Bear (APT29) for one simple reason: neither of these groups exists or existed at any time.

APT (Advanced Persistent Threat) was a code name for Chinese Espionage. There were attempts to detect specific groups under the broad umbrella of the APT. Then Mandiant (later acquired by FireEye) attempted to generalize the definition to include putative state-sponsored hacker groups from other countries. But such generalization cannot work. The attribution of cyber-security incidents to state backed sophisticated hacker groups worked only for China because it was a cyber-fortress surrounded by the Great Firewall of China. Continue reading Voodoo Attributions in Cyber Security

What is the ‘Advanced Persistent Threat’?

APT [Advanced Persistent Threat] is a term to refer to Chinese espionage
without saying Chinese espionage. Full stop.
Scott J Roberts
, APT is a Who not a What …

(disappeared; available as APT is a Who not a What… And Why it doesnt Matter – Scott J Roberts – Medium)

The full quote:

“This classified intelligence was a problem. … These DoD/IC teams wanted to help, but couldn’t disclose classified information. They came up with a compromise: sharing indicators and information without disclosing the actual actor behind it. Specifically APT, supposedly coined by Colonel Greg Rattray, was a couple groups of actors primarily operating out of mainland China and believed to be members of the People’s Liberation Army. We now know these groups today as APT1Anchor Panda, and Elderwood, as well as other private designations.

APT is a term to refer to Chinese espionage without saying Chinese espionage. Full stop.”

Continue reading What is the ‘Advanced Persistent Threat’?