myiW Current Conditions and Forecasts Community Forums Buy and Sell Services
 
Hi guest · myAccount · Log in
 SearchSearch   ProfileProfile   Log in to check your private messagesLog in to check your private messages   RegisterRegister 
Russiagate
Goto page Previous  1, 2, 3 ... 256, 257, 258 ... 279, 280, 281  Next
 
Post new topic   Reply to topic    iWindsurf Community Forum Index -> Politics, Off-Topic, Opinions
View previous topic :: View next topic  
Author Message
MalibuGuru



Joined: 11 Nov 1993
Posts: 9300

PostPosted: Fri May 17, 2019 11:05 pm    Post subject: Reply with quote

President Trump calls the Prime Minister of Italy about Mifsud's spying. He fires his Intelligence Chiefs. Papadopoulos says Italy flipped on Brennan. This is better than the Man from Uncle.
Back to top
View user's profile Send private message
MalibuGuru



Joined: 11 Nov 1993
Posts: 9300

PostPosted: Fri May 17, 2019 11:46 pm    Post subject: Reply with quote

By Barbara Boyd

In a Court filing on Friday, May 10 2019, Roger Stone, the long-time friend of Donald Trump targeted by Robert Mueller, and subsequently charged for lying, obstruction, and witness tampering in the Russiagate House Intelligence Committee investigation, has challenged the central premise of Russiagate, that the Russians hacked the DNC and thus “interfered” in the 2016 Presidential election to Donald Trump’s advantage. In a Motion to Suppress documents and evidence gathered as a result of search warrants issued in his and other cases, Stone has attached expert Declarations from former NSA Technical Director William E. Binney and widely recognized private cybersecurity expert, Peter Clay, challenging Russiagate’s foundation: that the Russian state hacked the computers of the DNC, John Podesta, and the DCCC and transferred the data to WikiLeaks for publication. Stone’s suppression motion states that this, in all probability, never happened.

His case is presently pending in the U.S. District Court for Washington, D.C. and a hearing to discuss this motion is scheduled for June 21, 2019, before Judge Amy Berman Jackson. In his motion, Stone requests an evidentiary hearing at that time. If Stone is successful, it will represent the first time the false narrative of the Russian hack of the 2016 election will be subject to actual adversarial testing and, most believe, the theory will be substantively disproved by being subjected to actual sunlight. Stone is also seeking unredacted copies of CrowdStrike’s forensic reports upon which the entire “Russia hacked the DNC and Podesta” narrative depends.

While the Washington Post had to cover this very significant filing, it censored the fact that the former Technical Director of the NSA, Bill Binney, supports Stone’s contention that the Russian hack has not been proven.

Stone is charged with false statements, allegedly made to the House Permanent Select Committee on Intelligence, about his efforts to find out what documents WikiLeaks had and when they would be published and with allegedly threatening a potential witness who Stone believed was lying to Mueller about Stone’s contacts with WikiLeaks. Many former prosecutors have argued that the actual charges against Stone could have been set forth in a few pages. But Mueller’s 23 page “speaking indictment” seeks to smear Stone by placing him in an overarching conspiracy, involving the Russian hack and the Trump Campaign and efforts to mislead Congressional and FBI investigators. As anticipated by Mueller’s partisan prosecutors, Stone’s indictment has been widely publicized. One of the specific statements cited by Mueller, under the heading, “Stone’s False Testimony to HPSCI” is that: “These hearings are largely based on a yet unproven allegation that the Russian state is responsible for the hacking of the DNC and John Podesta and the transfer of that information to WikiLeaks.” In addressing the House Committee, Stone stated that his testimony was intended to rebut allegations that he knew in advance about the hacking of the Clinton Campaign and that he had advance knowledge of the source or actual content of the WikiLeaks disclosures.

Mueller’s McCarthyite team used the indictment’s wandering narrative, to argue that Stone’s case is related, factually, to Mueller’s Russian GRU hacking case, United States v. Netyksho, No. 18-cr-215, currently assigned to Judge Jackson. While the Netyksho case indictment will never be tried since the individual GRU officials indicted for hacking the DNC and Podesta will never show up in a U.S. Court, Mueller’s team argued that the “factual” relationship of the cases necessitated the assignment of Stone’s case to Judge Jackson rather than a judge assigned by random draw, which is the normal procedure. Judge Jackson also presided over Paul Manafort’s case. Stone’s attorneys have challenged Mueller’s related case assignment of Judge Jackson as an abuse of the system.

According to Stone’s Motion to Suppress, the search warrant affidavits in Stone’s case and the Netyksho case, depend upon Mueller’s factually deficient narrative about the Russian hack and accuse Stone of a broad conspiracy with the Russians and WikiLeaks in the hack. The search affidavits state that Stone is being investigated for crimes which could only be derived from his participation as an active conspirator with the Russians and WikiLeaks in the alleged DNC, DCCC, and Podesta hacks. If it turns out, as Stone alleges, that the search warrant affidavits were false and intentionally or recklessly so, then everything seized from Stone as a result of the searches conducted based on the false affidavits, must be suppressed and cannot be used as evidence against Stone.

The Binney and Clay affidavits are identical in substance. Binney’s affidavit states, under the heading “Opinion,” that “WikiLeaks did not receive the stolen data from the Russian government. Intrinsic metadata in the publicly available files on Wikileaks demonstrates that the files that were acquired by WikiLeaks were delivered in a medium such as a thumb drive physically local to the DNC.” Binney backs up his expert opinion with facts derived from his forensic studies and experiments concerning WikiLeaks DNC files and the materials published by Guccifer 2.0, who Mueller alleges is a Russian GRU persona operating from Russia. Binney cites three main points: (1) all last modified dates and time stamps of the DNC data on the WikiLeaks site end in even numbers, consistent with data copied from a secure system to a physical medium such as a thumb drive, but inconsistent with files copied over the internet from one server to another system, such as used by hackers, (2) the time signatures on Guccifer 2.0’s posted files demonstrate that they were copied at speeds massively greater than internet speeds. The speeds are consistent with files copied directly and manually to a thumb drive inside the building, and (3) the WikiLeaks files were copied in three tranches on May 23, 25, and 26, 2016, skipping the 24th. “This would be more consistent with files that were covertly copied when opportunities presented themselves, as opposed to collection of files that had already been gathered and then transmitted as a collection to a destination such as WikiLeaks.” WikiLeaks has consistently insisted that they received the DNC and Podesta documents from an inside leaker in the United States and not from any Russian state actor.

Stone’s suppression motion also points out that the FBI and Mueller completely violated every forensic standard in the book by accepting the forensics of the DNC vendor, CrowdStrike, rather than securing and examining the alleged crime scene themselves. Now, it appears Mueller’s team is adding to the malfeasance. It has produced redacted copies of CrowdStrike’s forensics as part of the discovery to which Stone is entitled in the case. Why the government is redacting reports from the DNC’s vendor, a private company, in its productions to Stone’s defense, is a mystery.

CrowdStrike claimed that the Russians had hacked the DNC servers in June of 2016, a claim many believe was orchestrated by the Clinton Campaign to deflect from the truthful documents published by WikiLeaks demonstrating that the DNC was attempting to sabotage Bernie Sanders insurgent campaign for President. Stone’s motion does not recite CrowdStrike’s political hatred of the Russian government or that John Podesta, the Clinton Campaign Chairman, was planning, according to a liberated WikiLeaks Podesta document, to smear Donald Trump as a Russian pawn as early as December of 2015. The Mueller Report itself acknowledges a central flaw in the Russian Hack narrative concerning how the documents got to WikiLeaks. Mueller acknowledges that he cannot prove that the hacked documents were transmitted over the internet to WikiLeaks, stating at page 47 of his Report, “The Office cannot rule out that stolen documents were transferred to WikiLeaks through intermediaries who visited during the summer of 2016.”

Binney and the Veteran’s Intelligence Professionals for Sanity have repeatedly pointed to the complete lack of verifiable evidence concerning how the purported Russian hack resulted in the published WikiLeaks documents, and they have conducted independent forensic studies demonstrating that the narrative set forth by the intelligence community and Robert Muller is deeply flawed and false. As a result, President Trump asked CIA Director Mike Pompeo to meet with Binney and hear him out. The meeting was attended by Pompeo and what appeared to be two CIA analysts. Following that meeting, which occurred in October of 2017, there has been a substantial and systematic effort to block Binney’s analysis and other views disputing Mueller’ Russian hack analysis, from public view.
Back to top
View user's profile Send private message
real-human



Joined: 02 Jul 2011
Posts: 14877
Location: on earth

PostPosted: Sat May 18, 2019 12:01 am    Post subject: Reply with quote

ya the dems gave wikileaks the materials to damage their own campaign...... what a moron would believe that... oh malibu barfie and right wingers would...

how many convictions already by the most corrupt group ever... hahahah tens of millions recovered? Just manafort about 50 million...

soon trump will be forfeiting his inheritance for tax frauds that will also be discovered. remember trump the serial liar said he did it on his own with a million dollar loan he paid back.... yep his sister resigned because they would have found out her inheritance too was a fraud.

soon trumps top lawyers testimony will be public on his crimes.

_________________
when good people stay silent the right wing are the only ones heard.
Back to top
View user's profile Send private message
mac



Joined: 07 Mar 1999
Posts: 17747
Location: Berkeley, California

PostPosted: Sat May 18, 2019 1:54 pm    Post subject: Reply with quote

MalibuGuru wrote:
By Barbara Boyd

In a Court filing on Friday, May 10 2019, Roger Stone, the long-time friend of Donald Trump targeted by Robert Mueller, and subsequently charged for lying, obstruction, and witness tampering in the Russiagate House Intelligence Committee investigation, has challenged the central premise of Russiagate, that the Russians hacked the DNC and thus “interfered” in the 2016 Presidential election to Donald Trump’s advantage. In a Motion to Suppress documents and evidence gathered as a result of search warrants issued in his and other cases, Stone has attached expert Declarations from former NSA Technical Director William E. Binney and widely recognized private cybersecurity expert, Peter Clay, challenging Russiagate’s foundation: that the Russian state hacked the computers of the DNC, John Podesta, and the DCCC and transferred the data to WikiLeaks for publication. Stone’s suppression motion states that this, in all probability, never happened.

His case is presently pending in the U.S. District Court for Washington, D.C. and a hearing to discuss this motion is scheduled for June 21, 2019, before Judge Amy Berman Jackson. In his motion, Stone requests an evidentiary hearing at that time. If Stone is successful, it will represent the first time the false narrative of the Russian hack of the 2016 election will be subject to actual adversarial testing and, most believe, the theory will be substantively disproved by being subjected to actual sunlight. Stone is also seeking unredacted copies of CrowdStrike’s forensic reports upon which the entire “Russia hacked the DNC and Podesta” narrative depends.

While the Washington Post had to cover this very significant filing, it censored the fact that the former Technical Director of the NSA, Bill Binney, supports Stone’s contention that the Russian hack has not been proven.

Stone is charged with false statements, allegedly made to the House Permanent Select Committee on Intelligence, about his efforts to find out what documents WikiLeaks had and when they would be published and with allegedly threatening a potential witness who Stone believed was lying to Mueller about Stone’s contacts with WikiLeaks. Many former prosecutors have argued that the actual charges against Stone could have been set forth in a few pages. But Mueller’s 23 page “speaking indictment” seeks to smear Stone by placing him in an overarching conspiracy, involving the Russian hack and the Trump Campaign and efforts to mislead Congressional and FBI investigators. As anticipated by Mueller’s partisan prosecutors, Stone’s indictment has been widely publicized. One of the specific statements cited by Mueller, under the heading, “Stone’s False Testimony to HPSCI” is that: “These hearings are largely based on a yet unproven allegation that the Russian state is responsible for the hacking of the DNC and John Podesta and the transfer of that information to WikiLeaks.” In addressing the House Committee, Stone stated that his testimony was intended to rebut allegations that he knew in advance about the hacking of the Clinton Campaign and that he had advance knowledge of the source or actual content of the WikiLeaks disclosures.

Mueller’s McCarthyite team used the indictment’s wandering narrative, to argue that Stone’s case is related, factually, to Mueller’s Russian GRU hacking case, United States v. Netyksho, No. 18-cr-215, currently assigned to Judge Jackson. While the Netyksho case indictment will never be tried since the individual GRU officials indicted for hacking the DNC and Podesta will never show up in a U.S. Court, Mueller’s team argued that the “factual” relationship of the cases necessitated the assignment of Stone’s case to Judge Jackson rather than a judge assigned by random draw, which is the normal procedure. Judge Jackson also presided over Paul Manafort’s case. Stone’s attorneys have challenged Mueller’s related case assignment of Judge Jackson as an abuse of the system.

According to Stone’s Motion to Suppress, the search warrant affidavits in Stone’s case and the Netyksho case, depend upon Mueller’s factually deficient narrative about the Russian hack and accuse Stone of a broad conspiracy with the Russians and WikiLeaks in the hack. The search affidavits state that Stone is being investigated for crimes which could only be derived from his participation as an active conspirator with the Russians and WikiLeaks in the alleged DNC, DCCC, and Podesta hacks. If it turns out, as Stone alleges, that the search warrant affidavits were false and intentionally or recklessly so, then everything seized from Stone as a result of the searches conducted based on the false affidavits, must be suppressed and cannot be used as evidence against Stone.

The Binney and Clay affidavits are identical in substance. Binney’s affidavit states, under the heading “Opinion,” that “WikiLeaks did not receive the stolen data from the Russian government. Intrinsic metadata in the publicly available files on Wikileaks demonstrates that the files that were acquired by WikiLeaks were delivered in a medium such as a thumb drive physically local to the DNC.” Binney backs up his expert opinion with facts derived from his forensic studies and experiments concerning WikiLeaks DNC files and the materials published by Guccifer 2.0, who Mueller alleges is a Russian GRU persona operating from Russia. Binney cites three main points: (1) all last modified dates and time stamps of the DNC data on the WikiLeaks site end in even numbers, consistent with data copied from a secure system to a physical medium such as a thumb drive, but inconsistent with files copied over the internet from one server to another system, such as used by hackers, (2) the time signatures on Guccifer 2.0’s posted files demonstrate that they were copied at speeds massively greater than internet speeds. The speeds are consistent with files copied directly and manually to a thumb drive inside the building, and (3) the WikiLeaks files were copied in three tranches on May 23, 25, and 26, 2016, skipping the 24th. “This would be more consistent with files that were covertly copied when opportunities presented themselves, as opposed to collection of files that had already been gathered and then transmitted as a collection to a destination such as WikiLeaks.” WikiLeaks has consistently insisted that they received the DNC and Podesta documents from an inside leaker in the United States and not from any Russian state actor.

Stone’s suppression motion also points out that the FBI and Mueller completely violated every forensic standard in the book by accepting the forensics of the DNC vendor, CrowdStrike, rather than securing and examining the alleged crime scene themselves. Now, it appears Mueller’s team is adding to the malfeasance. It has produced redacted copies of CrowdStrike’s forensics as part of the discovery to which Stone is entitled in the case. Why the government is redacting reports from the DNC’s vendor, a private company, in its productions to Stone’s defense, is a mystery.

CrowdStrike claimed that the Russians had hacked the DNC servers in June of 2016, a claim many believe was orchestrated by the Clinton Campaign to deflect from the truthful documents published by WikiLeaks demonstrating that the DNC was attempting to sabotage Bernie Sanders insurgent campaign for President. Stone’s motion does not recite CrowdStrike’s political hatred of the Russian government or that John Podesta, the Clinton Campaign Chairman, was planning, according to a liberated WikiLeaks Podesta document, to smear Donald Trump as a Russian pawn as early as December of 2015. The Mueller Report itself acknowledges a central flaw in the Russian Hack narrative concerning how the documents got to WikiLeaks. Mueller acknowledges that he cannot prove that the hacked documents were transmitted over the internet to WikiLeaks, stating at page 47 of his Report, “The Office cannot rule out that stolen documents were transferred to WikiLeaks through intermediaries who visited during the summer of 2016.”

Binney and the Veteran’s Intelligence Professionals for Sanity have repeatedly pointed to the complete lack of verifiable evidence concerning how the purported Russian hack resulted in the published WikiLeaks documents, and they have conducted independent forensic studies demonstrating that the narrative set forth by the intelligence community and Robert Muller is deeply flawed and false. As a result, President Trump asked CIA Director Mike Pompeo to meet with Binney and hear him out. The meeting was attended by Pompeo and what appeared to be two CIA analysts. Following that meeting, which occurred in October of 2017, there has been a substantial and systematic effort to block Binney’s analysis and other views disputing Mueller’ Russian hack analysis, from public view.


It’s not easy to find out much about Barbara Boyd because she’s not much of a journalist. The other article she’s posted is in the Larouche newsletter. https://larouchepub.com/eiw/public/2018/eirv45n08-20180223/22-33_4508.pdf

So she winds her beanie propellor to the far right. In the toilets that bard bathes in.
Back to top
View user's profile Send private message
real-human



Joined: 02 Jul 2011
Posts: 14877
Location: on earth

PostPosted: Sat May 18, 2019 5:13 pm    Post subject: Reply with quote

Oh, dear...GOP Rep. Justin Amash (MI-3) comes out and endorses impeachment of the *resident.
_________________
when good people stay silent the right wing are the only ones heard.
Back to top
View user's profile Send private message
MalibuGuru



Joined: 11 Nov 1993
Posts: 9300

PostPosted: Mon May 20, 2019 8:54 pm    Post subject: Reply with quote

Loretta Lynch testified under oath that she never instructed James Comey to call the Clinton email investigation a "MATTER" even though James Comey testified that she did. Which one Lied to Congress?
Back to top
View user's profile Send private message
mac



Joined: 07 Mar 1999
Posts: 17747
Location: Berkeley, California

PostPosted: Mon May 20, 2019 9:25 pm    Post subject: Reply with quote

What, you’re not going to defend your Barbara Boyd fake news?
Back to top
View user's profile Send private message
real-human



Joined: 02 Jul 2011
Posts: 14877
Location: on earth

PostPosted: Mon May 20, 2019 10:13 pm    Post subject: Reply with quote

MalibuGuru wrote:
Loretta Lynch testified under oath that she never instructed James Comey to call the Clinton email investigation a "MATTER" even though James Comey testified that she did. Which one Lied to Congress?


didn't you get the memo today your sec of education has been violating the law using 5 different email accounts and some of the government emails are missing? remember now it is illegal, when Clinton was using her server it was legal and both condi and General Powel used their personal email accounts for government business.

added the trumps have been using their company account server for government emails. I think it was Ivanka that said no one told her she couldn't.

surely you would think they know better after daddy begged and serviced putin to get Hillaries emails and the GRU took action within hours of Trump on his hands and knees begging.

https://news.yahoo.com/ivanka-trump-and-jared-kushner-communications-may-have-broken-the-law-democrats-say-213621315.html

Democrats accuse Ivanka Trump and Jared Kushner of violating law with private emails
Quote:

President Trump’s daughter Ivanka Trump and son-in-law, Jared Kushner, have been using private email accounts and the messaging service WhatsApp to conduct official government business, the chairman of the House Oversight and Reform Committee said in a Thursday letter to the White House.

The use of private email and apps by two presidential advisers could violate the Presidential Records Act. It also would amount to the same activity that Republicans, led by Trump, campaigned on in 2016 as evidence of Hillary Clinton’s alleged criminality.

_________________
when good people stay silent the right wing are the only ones heard.
Back to top
View user's profile Send private message
MalibuGuru



Joined: 11 Nov 1993
Posts: 9300

PostPosted: Thu May 23, 2019 12:32 am    Post subject: Reply with quote

Mmm
Back to top
View user's profile Send private message
vientomas



Joined: 25 Apr 2000
Posts: 2343

PostPosted: Thu May 23, 2019 2:01 am    Post subject: Reply with quote

This is not the Bay of Pigs. Read a book.
Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic   Reply to topic    iWindsurf Community Forum Index -> Politics, Off-Topic, Opinions All times are GMT - 5 Hours
Goto page Previous  1, 2, 3 ... 256, 257, 258 ... 279, 280, 281  Next
Page 257 of 281

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum

myiW | Weather | Community | Membership | Support | Log in
like us on facebook
© Copyright 1999-2007 WeatherFlow, Inc Contact Us Ad Marketplace

Powered by phpBB © 2001, 2005 phpBB Group