Missing from the Mueller Report became #1 bestseller in multiple categories on Amazon. The full Mueller report confirms and reinforces in the book, so far.
||My book Missing from the Mueller Report (Edition 1.5) is updated and available on Amazon in paperback and e-book formats. The most important part of the Mueller Report is not what it contains, but what it omits. The report has not been made public yet, but the conduct of the investigation combined with the AG summary provide enough information to answer this question. There has never been an investigation more absurd, corrupt, or harmful to the nation than that of Mueller’s against President Trump.
Continue reading Missing from the Mueller Report
At least three versions of the “Steele dossier” were floating around Washington just before the elections:
- what the FBI was receiving directly from Steele — a liar, a charlatan, and a contractor with Fusion GPS working for the DNC
- a version introduced by Nellie (Fusion GPS) and Bruce Ohr (DOJ) to the FBI
- a version that James A. Baker accepted from Mother Jones’ journalist David Corn
From the interview of James A. Baker (FBI General Counsel) before a House Committee: Continue reading Steele dossier floated in three versions
This post expands my article “Russian Interference” Didn’t Happen in the American Thinker.
The DNC Used its Hack to Entrap Trump
The DNC and CrowdStrike Destroyed Evidence in June 2016
The Support for the “Russian Hacking” Theory Came from EU Intel
Steele was Known to the State Department as an Unreliable Source
The DNC, Hillary’s Campaign & FBI Colluded with Ukraine against Trump
The DNC, Hillary’s Campaign & the Obama administration attempted to Collude with Russia
The Obama Administration Hid its “Russian” Activities from Congressional Republicans
Misc Continue reading Sources on How the DNC Faked “Russian Interference”
This case of Karim Baratov is another refutation of the conspiracy theory of cyber incident attribution. This theory lamps together multiple network security breaches, performed by many unrelated individuals or small groups. Then it attributes these breaches to a small number of alleged government backed hacker groups. This theory was introduced by CrowdStrike, and promoted by CrowdStrike and FireEye (FEYE). One of apparently decent attribution criterias is use of the same network infrastructure — domain names and/or IP addresses — in multiple breaches. But even this criteria doesn’t work, because cyber criminals specialize and divide labor vertically. Spear-phishing incidents using the same deceptive domain and/or IP address are not necessarily connected to a single beneficiary entity. An owner of the domain name can steal passwords from many victims for many unrelated clients, knowing nothing about the clients, like this case. Continue reading Karim Baratov and cyber incidents misattribution
Update 2019-02-13: Finally, Trump’s former attorney John Dowd calls the conduct of the FBI brass and Mueller a coup:
““Little did I know that it appears that they were all in it together,” Dowd said. “I mean Rosenstein, Comey, Mueller, McCabe, the whole crowd and they were out to get this president no matter what. I don’t think they sincerely believed anything about Russia.””
““This is our worst nightmare that someone with that kind of power would then decide to go after the President. I mean it’s a coup,” Dowd said. “That’s what it is an attempted coup by Comey and his crowd. And the evidence is all over there. I take the New York Times article as an admission of their bad behavior.”” Continue reading Robert Mueller – More Conflicts of Interest
CNN’s ‘Information Warfare Expert’ Duped by Twitter Bot Pushing … (PJ Media)
“McKew is a former Podesta Group “specialist” and the CEO of Fianna Strategies. Up until the election of Donald Trump, she served as a registered foreign agent for opposition parties in Georgia and Moldova.
Having lost her foreign clients after the 2016 election, she has since refashioned herself as a Russian disinformation expert and a go-to source for media on Trump-Russia conspiracy theories. McKew has even testified before a congressional committee.
Yet like an amateur, she was just duped by a Twitter bot on a politically charged incident.”
Jan 23, 2019
Continue reading From the Web, May 2018 – Jan 2019
Since June 2016, WaPo has been the main firebrand of the Trump-Russia and Russian election interference conspiracy theories. Multiple WaPo “reporters” were Democratic campaign operatives (Greg Sargent et al.). Unbelievably , this operation was financed by the same power that paid Robert Mueller and the law firm WilmerHale. This firm employed Robert Mueller and four (!) other lawyers he employed in the investigation of Trump (the “Russia investigation” pretext has just disappeared). From the Daily Caller (October 2015), China, Russia Pay Washington Post To Publish Their Propaganda:
“Chinese and Russian propaganda supplements are regularly included in The Washington Post, but the widely read newspaper won’t say how much money it gets on the deals.
China Watch – a China Daily publication – and Russia Beyond The Headlines – a Rossiyskaya Gazeta publication – have both appeared in the Post for years as paid advertising supplements. Both foreign periodicals are owned and operated by their respective governments.” Continue reading Aided by WaPo, China Interfered in the 2016 Elections For Hillary Against Trump
Initially, the Obama administration and the DNC accepted the outcome of the 2016 national elections and prepared to transfer power to the elected President. A New Yorker article, promoting the Russian interference conspiracy theory, referred to the first week of December 2016 as the time “when Obama was [still] intent on an orderly transfer of power.” But something “interfered” with Obama’s intent on December 9. He became the first president in more than 200 years to fail to properly transfer power to the elected President.
The following events might be critical to understanding what changed. It seems that elements of the Obama administration, together with foreign intelligence services, launched the putsch that continues today, openly spearheaded by Robert Mueller. The most likely cause was and still is Trump’s refusal to follow the western European Union countries on their suicidal path. This is the relevant timeline (it hints at the causation, which should be accepted cautiously; other events unknown to the author may have played a large role). Continue reading ObamaPutsch (Dec 2016 – Jan 2019). The Beginning.
Google’s suppression of “undesirable” speech went beyond conservative, Republican, and scientific opinions. Google also muzzled opinions in order to promote its products, eliminate potential competition, and manipulate (inflate) its stock price, including the suppression of
In its attempts to suppress conservative and Republican speech, as well as scientific, cyber-security, and medical research and information, Google went far beyond banning, de-ranking, and demonetizing content in its own search results, YouTube, and other platforms. Google also
- Developed and deployed an ad blocker, designed to selectively block ads on pro-Trump political websites. The targeted websites include Breitbart, American Thinker, and DailyCaller, and the scientific website WattsUpWithThat. The move was so insidious that even its victims missed the motive behind such an illogical and self-harming act by a company that depends on ads for almost all of its revenues.
- Persecuted conservative employees for their political views, in violation of California laws, resulting in a chilling effect on the speech of other Google employees and the employees of its actual and potential partners and vendors. Google managers compiled and disseminated lists of conservative employees. See James Damore lawsuit against Google.
Contrary to popular assumptions, Google, Facebook, and Twitter are likely not protected by Section 230 for hiding, de-ranking, and banning conservative, pro-Trump, climate realism and other “adversary” content. Section 230 provides protection to them only for: Continue reading Google Ad Blocker and Suppression of Non-Political Speech
Jeffrey Carr is a cyber-security expert, and one of few open skeptics of the narrative that the leaked DNC and/or DCCC internal documents came from hacking by Russia. Few remarkable quotes from his posts, mostly from 2016-2017.
Can Facts Slow The DNC Breach Runaway Train?
“Here’s my nightmare. Every time a claim of attribution is made — right or wrong — it becomes part of a permanent record; an un-verifiable provenance that is built upon by the next security researcher or startup who wants to grab a headline, and by the one after him, and the one after her. The most sensational of those claims are almost assured of international media attention, and if they align with U.S. policy interests, they rapidly move from unverified theory to fact.
Because each headline is informed by a report, and because indicators of compromise and other technical details are shared between vendors worldwide, any State or non-State actor in the world will soon have the ability to imitate an APT group with State attribution, launch an attack against another State, and generate sufficient harmful effects to trigger an international incident. All because some commercial cybersecurity companies are compelled to chase headlines with sensational claims of attribution that cannot be verified.”
Why aren’t there more skeptics in InfoSec?
“There’s a cost to being too critical. One infosec company threatened to sue a researcher if he didn’t make substantive changes to a published paper that was critical of their report. Many employers don’t allow their employees to express controversial opinions that could hurt the company’s business or reputation. And if the company or organization that you’re critical of has influential connections in Washington D.C., your professional reputation may suffer as well.” Continue reading Jeffrey Carr, the “Russian Hacking” Skeptic
On or around October 31, 2017, Twitter testified about so-called Russian activities related to the 2016 U.S. presidential election. This and consequent testimonies were slanted to support the Democratic conspiracy theory of “Russian interference.” It might have been prepared together with congressional Democrats.
Even with this understanding, a closer look at Twitter testimonies reveals surprising findings:
- Twitter and the DNC interpreted the word Russian as a reference to the native language and/or place of birth of an individual, not employment by the Russian government or even Russian citizenship. Large part (possibly most) of the so-called Russian-linked accounts belong to American citizens with no relation to the Russian government. At the same time, Twitter elected to disregard accounts making election related tweets from indeterminate locations, and likely to represent foreign governments and other entities.
- Answering questions from senators, Twitter repeatedly used the term automated account as a synonym of a bot, thus dehumanizing Twitter users. The use of automation is allowed and even encouraged by Twitter, which provides a special Application Programming Interface (API) for this purpose. The automation might be as simple as manually scheduling tweets for a later time or auto-responding when the user is away from his or her computer.
Continue reading Twitter Labeled Trump Supporters “Russian-linked,” Mixed Humans with Bots
Earlier, Google banned my SHFi AdWords account. After overcoming some obstacles, I created a personal account, intended to support Ted Cruz and Republicans. Google refused to display my messages and links with a message “Disapproved: Election advertising in the United States.” Continue reading Google, Twitter Suppress Conservative Voice in Election
2018-10-14 Update: Added clarifications and remarks on the relationships of the Mueller’s law firm WilmerHale with the government of China are added near the end. Also, the words “expectation of future business with China” were changed to “expectation of future income contingent on approval of Chinese government” to better reflect the structure of his compensation in WilmerHale.
In March 2017, two months before his appointment as Special Counsel, Robert Mueller received $24,000 (~ ¥130,000) from a firm owned by a top official of the Chinese government and the Communist Party of China. Almost certainly, he had expectation of future income contingent on approval of Chinese government. In exchange, he accepted, articulated, and publicly committed himself to the DNC conspiracy theory that “Russia had hacked the democracy”. Russia has hacked neither democracy nor the Democrats (despite them being near opposites). The DNC had an incompetent information systems team and an unprotected network that could have been hacked by anybody. For eight months the DNC fought FBI attempts to help, while possibly being suspicious of the FBI because of Hillary’s bathroom server. Persons who published the DNC’s dirty laundry or gave it to WikiLeaks are likely not connected to Russia at all and might be Americans. We don’t know their names because the Democratic Party made up the narrative that Putin ordered the DNC hacking and leaking of documents to aid Trump. Obama administration sent the FBI, CIA, DHS, and ODNI to confirm this narrative, rather than to investigate who had accessed the DNC voter’s database, believed to contain very detailed personal profiles of almost all adult Americans. The conspiracy theory of a Trump-Russia collusion was built on top of this narrative.
The firm that paid Mueller his ¥130k is the International Data Group (IDG), a subsidiary of China Oceanwide Holdings Group. Continue reading Mueller Investigation was Bought for more than ¥130k
It’s almost funny that the so-called Intelligence Community Assessment (January 6, 2017, Assessing Russian Activities and Intentions in Recent US Elections) claimed that the Russian interference had been against Hillary and in favor of Trump, although most of the evidence in it demonstrated the opposite. RT (Russia Today TV) and IRA (Internet Research Agency, a “troll farm” in Saint Petersburg) agitated in favor of Hillary and the policies of the Democratic Party, and against Trump and the policies of the Republican Party.
RT was anti-Trump in the 2016 elections (from The Nation)
The Nation is far from being pro-Trump. I think it might be called an Old New Left. This is what it says on the subject, with the links to the RT footage. The following are long quotes from The Nation.
RT America Was Not ‘Pro-Trump’
The problem with the claim that RT America is pro-Trump is that it is simply false. Many of the channel’s biggest names were either ardently anti-Trump or highly skeptical of what a Trump presidency might mean for America. Continue reading Russian Activities in 2016 Elections were anti-Trump
Hillary presidential campaign chairwoman Donna Brazile’s book Hacks: The Inside Story of the Break-ins and Breakdowns That Put Donald Trump in the White House can be retold in one sentence:
The Russians have hacked the elections and poisoned my dog Chip.
Nevertheless, the book reveals some information concealed by Hillary and the DNC loyalists in FBI.
- In August, seeing CrowdStrike’s helplessness, the DNC invited real cyber security people to form a competent network security team that the book calls the Hacker House, or HH. This contradicts the DNC official story that CrowdStrike was doing a fabulous job.
- HH found out that the DNC network was unprotected, and that anybody could have hacked into it
- HH informed DNC and Hillary’s campaign leadership of this fact and spent most of its time training DNC networking administrators
- HH was asked, but refused to support allegations that the DNC network had been penetrated by “Russians.” HH also had run-ins with CrowdStrike.
- The DNC, Hillary, and the Obama administration disregarded and suppressed this information. They continued their electoral campaign strategy: worsening relations with Russia, accusing Trump of collusion with Putin, and using the FBI, CIA, DHS, and ODNI to sabotage Trump’s campaign. During the transition period, John Brennan and other Obama/Clinton loyalists used false allegations of the “Russian hacking” to attempt something like a coup d’état. The coup was not a complete failure – the angry Democrats have nearly wrestled control of the DOJ away from the elected president.
Continue reading CrowdStrike, MIS Department, and the DNC
The enlightened Silicon Valley has apparently created a totalitarian dystopia. Here, the term Silicon Valley includes Google, Facebook, Twitter, Microsoft, and Apple (“GFTMA”), even as Microsoft is headquartered in Washington state.
GFTMA have developed tools for nearly total speech control and deployed them against conservatives and other opponents of the Left. They tied themselves to the Left under the Obama administration. The political censorship and discrimination against the “right of left” authors and readers is well documented. This article focuses on the scientific and technical human potential of this country, a large part of which is computer and network engineers, scientists, businessmen, and other specialists affected by Silicon Valley. Continue reading Silicon Valley Totalitarian Dystopia
Needs update! (See The Real Origination Story of the Trump-Russia Investigation and more recently published evidence)
2018-09-18. It’s possible that the DNC and/or Hillary campaign started preparing the “Russian collusion” story immediately after the initial attribution of the DNC network breach to Russia by CrowdStrike on May 6 (rather than on June 12, as assumed in the article.) That better explains the hiring of Christopher Steele in early June, the issuing of a visa to Natalia Veselnitskaya on June 1, the strange text of the email introducing Veselnitskaya to Trump Jr., and the meetings between Glenn Simpson of Fusion GPS with her immediately before and after her meeting with Trump Jr. Continue reading Origin of Operation “Crossfire Hurricane”
The Official Attribution of Network Breaches is Based on Conspiracy Theories
The DNC has not been hacked by the Russian hacking groups Fancy Bear (APT28) or Cozy Bear (APT29) for one simple reason: neither of these groups exists or existed at any time.
APT (Advanced Persistent Threat) was a code name for Chinese Espionage. There were attempts to detect specific groups under the broad umbrella of the APT. Then Mandiant (later acquired by FireEye) attempted to generalize the definition to include putative state-sponsored hacker groups from other countries. But such generalization cannot work. The attribution of cyber-security incidents to state backed sophisticated hacker groups worked only for China because it was a cyber-fortress surrounded by the Great Firewall of China. Continue reading Voodoo Attributions in Cyber Security
APT [Advanced Persistent Threat] is a term to refer to Chinese espionage
without saying Chinese espionage. Full stop.
Scott J Roberts, APT is a Who not a What …
The full quote:
“This classified intelligence was a problem. … These DoD/IC teams wanted to help, but couldn’t disclose classified information. They came up with a compromise: sharing indicators and information without disclosing the actual actor behind it. Specifically APT, supposedly coined by Colonel Greg Rattray, was a couple groups of actors primarily operating out of mainland China and believed to be members of the People’s Liberation Army. We now know these groups today as APT1, Anchor Panda, and Elderwood, as well as other private designations.
APT is a term to refer to Chinese espionage without saying Chinese espionage. Full stop.”
Continue reading What is the ‘Advanced Persistent Threat’?
Corrected on 2018-08-26: 70,000 is the number of total deaths from drug overdose. Fentanyl and other synthetic opioids account for 40% of them.
There were more than 70,000 deaths from drug overdose in the U.S. in 2017. About 30,000 of them involved fentanyl or similar synthetic opioids many times stronger than heroin. Most illegally purchased synthetic opiods are manufactured in China. Online shops in China used to receive payments from Americans through Mastercard and Visa to ship these deadly drugs by mail. The number of overdose deaths involving synthetic opioids skyrocketed 10x since 2013: Continue reading Mastercard, Jihad, and Fentanyl
Updated. These are some of the scientists who actively oppose climate alarmism (or opposed it through the last days of their lives):
Dr. Ivar Giaever, Nobel Laureate in physics:
Dr. Kary Mulls, Nobel Laureate in chemistry, one of the signers of the Oregon Petition (added on Aug 14, 2018):
Continue reading Scientists Against Climate Alarmism
What a tangled web we weave …
Continues Origin of Operation “Crossfire Hurricane”
Update: Steele might have learnt what the DNC wanted him to write about Trump directly from the DNC, rather than indirectly through MSM. DOJ official Bruce Ohr reportedly communicated with Steele in the time when his wife Nellie Ohr worked for Fusion GPS that hired and worked with Steele.
The leaked “opposition research” (mostly smear) on Trump consisted of 230 pages. Only one short paragraph was devoted to allegations about Trump’s relations and attitudes towards Russia. Thus, neither the DNC nor Hillary campaign believed around May 2016 that there was even a small impropriety in Trump’s connections with Russia. The opposition research file was apparently dated December 2015, but the DNC allowed it to leak between late April to early June of 2016 (likely on June 12-14), then advertised it in the WaPo article on June 14, 2016.
The liberal media attitude toward Putin changed from lukewarm to hostile almost overnight between July 16 and July 21, simultaneously with the creation and adoption of the Trump-Putin conspiracy theory as a major part of the Democratic Party line. Continue reading All “Evidence” of “Russian Meddling” Came from the DNC
GFT censors not only conservatives, but other dissidents from the EU left and anti-Trump narratives, as well as their own adversaries.
Twitter subjected to Quality Filter Discrimination (QFD shadowban) not only expected targets, such as @cernovich, but also Trump Republicans, a walking away liberal Brandon Straka (@usminority), and even Adam Carter (@with_integrity). Adam Carter is one of the leading researchers who refuted Hillary’s conspiracy theory that Russia had been behind the leaks of the 2016 election campaign. This conspiracy theory has been built on false claims by CrowdStrike, in which Google is a major investor. The QFD shadowbans were observed on Twitter from July 23 to 24. Continue reading Censorship by GOOG,FB, TWTR is Alive and Well
Since the misattribution of a suspected breach into the DNC network in early 2016 to Russia, CrowdStrike has been boosted by:
- DNC loyalists in the FBI, CIA, DHS, and DNI
- the fawning coverage by mainstream media
- NBC News employing Shawn Henry, a CrowdStrike top officer and former executive assistant to FBI Director Robert Mueller, as a cyber security consultant
- $300M investments by Google and Silicon Valley VCs
Continue reading CrowdStrike: Crooked, Shrill, Unashamed
07-17-28 Update: Shawn Henry serves as a consultant to NBC News.
Continuing Dangerous Pseudo-Science in Cyber Security, just published in WUWT. All major news organizations except for Breitbart and CNBC run ads by CrowdStrike, the Mueller-linked cyber-security firm that has incorrectly attributed the 2016 DNC leaks to the Russian government.
In 2012-2016, CrowdStrike became famous for its audacious and unsupported attributions of computer network breaches and data leaks to foreign state actors. CrowdStrike incorrectly attributed the 2016 DNC data leaks to Russia, and possibly participated in destroying actual evidence of the outside intrusion or internal leak. Later investigations and assessments relied entirely on the data, which was provided by CrowdStrike. Continue reading CrowdStrike and MSM: Pay for Ads, Get Fawning Articles Free
Update. A Google team, working under SVP Urs Hölzle of WWF, refused to implement a feature improving Google Cloud security necessary to bid on military contracts (according to Bloomberg). Earlier, Google announced it would not work with the US military on Artificial Intelligence projects. But this feature is not related to AI. Thus, Google refuses to aid the US military at all. Meanwhile, Google services (including Google Maps and Google AI) are available to terrorist organizations and hostile armed forces worldwide. In 2013, Google’s Chairman Eric Schmidt visited North Korea where he aided the North Korean military. Continue reading Google Aided North Korean Military, Spurns Pentagon
Big Tech is the new Big Tobacco!
In fact, it is much worse. Big Tech has committed much worse fraud on its consumers than the Big Tobacco has been accused. Worse, Big Tech funded groups intimidating its opponents, and even lawmakers and government officials. Big Tech also uses its control of the communications line to silence its critics.
Jun 4, 2018 – Google (GOOG, GOOGL), Facebook (FB), and Twitter (TWTR) use their internet gatekeepers’ positions to manipulate (inflate) their stock prices. Continue reading Big Tech is the new Big Tobacco, plus …
The conservative media keeps tripping itself over lies invented by the left-stream media. I cannot blame it. People know the left-stream media lies, but still read it and take in much of what is written there. This time, conservatives fell for the fake news that Guccifer 2.0 (who took credit for release of the damning internal DNC documents) revealed as a GRU officer.
On or around March 21, 2018, The Daily Beast, a leftist tabloid on the lower end of the spectrum, published an “exclusive”: “‘Lone DNC Hacker’ Guccifer 2.0 Slipped Up and Revealed He Was a Russian Intelligence Officer.” Continue reading Why has FBI Accepted DNC’s “Russian Hacking” Claims?
An ugly phenomenon has been spreading widely in the last few years. Small groups linked to the DNC, or even being far left from it, declared boycotts of conservative speakers, journalists, or publications, and demanded advertisers to sever ties with them. And many advertisers have been glad to oblige.
Recently, an insolent pup called to boycott Laura Ingraham, a Fox News personality: “Soooo @IngrahamAngle what are your biggest advertisers …“. That youngster is a victim of a mass schooling under the Obama regime, and such behavior might have been expected. But advertising executives are mature men and women that should recall the times when threats and attempts to silence the opponent in a political debate were unacceptable. Make America Great Again means that these norms of debate are coming back, among others. Continue reading Advertisers Boycotts – Think Before You Jump
The idea of government regulations of ISPs for net neutrality, expressed by Tim Wu in 2003 and mostly adopted by the FCC in 2005, turned on its head under Obama’s administration, which turned it from a user’s right to an obligation. This mandatory net neutrality (Obamanet) was probably the worst violation of the First Amendment since the passage of the Bill of Rights. The supporters of MNN usually claim that it protects users against abuse by their ISPs. In fact, it “protects” users from exercising choice regarding content. The idea that ISPs have strong incentives to mistreat their paying customers is foolish. But even if an ISP does that, the customers have a large set of consumer protection laws on their side. Most cases cited by MNN supporters are lies or misinterpretations. Somehow, consumer protection laws seem to fail (or are not applied) to protect consumers against Google, Facebook, Twitter, Microsoft, etc.
We access the internet media under absurd rules, unprecedented for any other media: a typical user paying annual internet access fees of $1,000 cannot choose toward what internet content and services this money would be applied! Obama’s FCC has already made the choice for us. And the choice reflects influence of the far-left groups. Continue reading The Web Without Mandatory Net Neutrality
Mark Morano has published on WUWT a bonus chapter that was too strong to make it into his The Politically Incorrect Guide to Climate Change! From Intimidating the “Deniers” to Enforce the “Consensus”:
… why don’t more scientists buck the “consensus?” The answer is simple:
Anyone who questions the climate change scare is attacked and threatened. Continue reading Intimidating the “Deniers” to Enforce the “Consensus”
Update. The controlling legal precedent seems to be the following quote from the Supreme Court Decision:
“To determine whether an actor’s conduct possesses “sufficient communicative elements to bring the First Amendment into play,” the Supreme Court has asked whether “[a]n intent to convey a particularized message was present and [whether] the likelihood was great that the message would be understood by those who viewed it.””
Texas v. Johnson, 491 U.S. 397, 404 (1989) (quoting Spence v. Washington, 418 U.S. 405, 410-11 (1974) (per curiam)).
When Google eliminates climate realist or conservative websites from its top search results, the “message” is certainly not understood by those who view it. Further, this is the main purpose of this conduct – to suppress speech without other people understanding that. Google also flatly denies that it conveys any message in its search results. It claims impartiality and attempts to provide “the most useful and relevant” search results. Thus, intentional distortion of the search results by Google does not even bring the First Amendment into play. It is really fraud, not speech.
Google Search is a commercial service that Google provides to its users. Google must provide this service in good faith and in accordance with other applicable laws. Google search is service, not “speech.” Continue reading Google Search Fraud