Top FBI Attorney Provided ‘Explosive’ Testimony Regarding Trump-Russia Probe

On a day that saw the latest nonsensical claims from the UK government about Russian government culpability for the Skripal assassination attempt back in March, we came across a story which shows how the other great “It’s The Russians fabricated narrative is falling apart.

While NATO governments were getting their knickers in a right old twist about the discovery of some Russian citizens found in possession of laptop computers, smartphones

The Russians are alleged to have launched a cyber attack on the headquarters of global chemical weapons watchdog OPCW while it was investigating the Salisbury spy poisoning, the British and Dutch security services have revealed. No evidence has been offered to link the action to the Skripal case.

Authorities in the Netherlands have named four GRU operatives who, it is claimed, travelled to Amsterdam and attempted to hack into the Organisation for the Prohibition of Chemical Weapons network directly.

The four men – named as Alexei Moronets, Evgeni Serebriakov, Oleg Sotnikov and Alexei Minin – flew from Moscow to Amsterdam on April 10 on official passports, where they were met by a Russian embassy official.

Three days later, they parked in a rental car outside a hotel near the OPCW building, with specialist technical equipment in the back of the vehicle designed to hack into the watchdog’s network.

If you are quite web savvy you might, as I have, understand how ludicrous it would be to try to hack the OPCW network while sitting outside in a car, with all your hacking equipment visible to passing pedestrians. And can we believe the Russians would expect an organisation like OPCW would have omitted to secure their Wi Fi network?

Well if you have believed all or any of the story about the Russians hacking the US election systems to hand the presidency to Trump, you are probably naive enough to believe this latest shite.

Meanwhile in America …

from The Daily Caller

A former top lawyer at the FBI provided “explosive” testimony to Congress on Wednesday regarding the FBI’s Trump-Russia investigation, lawmakers said. James Baker, who served as the FBI’s general counsel until May, told Congress that a previously unidentified source provided information to the FBI for its investigation, which began on July 31, 2016.

“During the time that the FBI was putting — that [the Department of Justice] and FBI were putting together the [Foreign Intelligence Surveillance Act surveillance warrant] during the time prior to the election — there was another source giving information directly to the FBI, which we found the source to be pretty explosive,” Ohio GOP Rep. Jim Jordan said after a hearing, according to Fox News.

As the FBI’s top attorney, Baker was directly involved in handling applications for the FISA warrants granted against former Trump campaign adviser Carter Page.

Baker was interviewed behind closed doors as part of a congressional task force’s investigation into the FBI’s possible abuse of the FISA process. Republican lawmakers have expressed concerns that the Page FISAs relied heavily on the unverified Steele dossier.

The document, which was funded by former Secretary of State Hillary Clinton’s campaign and the Democratic National Committee, was cited extensively in the FBI’s applications to spy on Page.

“Some of the things that were shared were explosive in nature,” North Carolina GOP Rep. Mark Meadows told Fox regarding Baker’s interview. “This witness confirmed that things were done in an abnormal fashion. That’s extremely troubling.”

 

(RELATED: Undercover FBI Sources Taped Trump Campaign)

 

US Dept. of Homeland Security Created Fake narrative On Russian Interference In Elections.

Picture: ConsortiumNews.com

The narrative of Russian intelligence attacking state and local election boards and interfering with the outcome of U.S. elections has achieved near-universal acceptance among establishment media and political organisations.  And now it has been accepted by the Trump administration’s intelligence chief, Dan Coats, as well.

But the real story behind that narrative reveals that the Department of Homeland Security (DHS) created and developed an account of events that was designed deliberately to spread false information and cause fear and panic. 

DHS staff, in collusion with people whose involvement in industrial espionage, compiled a report suggesting hackers linked to the Russian government could have targeted voter-related websites in many states and then leaked a sensational story of Russian attacks on those sites. Had it been made clear that the whole thing was fabricated, yes they COULD have hacked the system, security was lax at best, but there is no evidence anyone did interfere with voting. The facts would have revealed a different story. When state election officials began asking questions, they discovered that the DHS claims were false and, in at least one case, laughable.

The National Security Agency and special counsel Robert Mueller’s investigating team, which has been conducting a witch hunt against the Trump administration since shortly after the election in 2016, have also claimed evidence that Russian military intelligence was behind election infrastructure hacking, but on closer examination, those claims turn out to be speculative and misleading as well. Mueller’s indictment of 12 GRU military intelligence officers does not cite any violations of U.S. election laws though it claims Russia interfered with the 2016 election.

On Sept. 29, 2016, a few weeks after the hacking of political websites in Illinois and Arizona, ABC News sensationalised the story with a headline: “Russian Hackers Targeted Nearly Half of States’ Voter Registration Systems, Successfully Infiltrated 4.” The story itself reported that “more than 20 state election systems” had been hacked, and four states had been “breached” by hackers suspected of working for the Russian government. The story cited only sources “knowledgeable” about the matter, hinting that those who were pushing the story were eager to hide the institutional origins of the information. Again no evidence was offered to support the allegations.

Behind that sensational headline the real story was of a government department playing inter – departmental politics by seeking to establish its supremacy within the national security state apparatus on cybersecurity, despite its limited resources for such responsibility.

RELATED:


Media’s hyping of Russia threat a ‘grotesque absurdity’ says veteran investigative reporter John Pilger

NYU Accidentally Exposed NSA Encryption Busting Code To The World

So how did that global cyber attack happen? I can’t tell you with any certainty but the evidence points to its having originated in the USA (and don’t rule out a false flag explanation because the military – industrial complex are now desperate for an escalation of conflict in the middle east, so if some new terrorist group with a scary sounding name like Al Evilastard death-to-the-infidel Cunt Front claims responsibility be suspicious, very suspicious.

What I can tell you is that the attempts by leftie – loonys to blame Teresa May, claiming it was her decision not to upgrade NHS operating systems when she was Home Secretary is a typically inept and idiotic leftie lie. First, the Home Secretary would not be responsible for decisions on health department information technology systems (the Treasury runs the Government Data Network, the Health Department is responsible for deciding on systems.)

Second, the claim made by the Bolshevik Broadcasting Corporation that the malware attacked Windows 7 was fake news. The worm attacks Windows versions from 7 on, Apple and Linux operating systems. It was developed by the US National Security Agency (NSA) for fuck’s sake, not a bunch of amateur script kiddies.

Here’s the full story of how the virus was released into the piblic domain from The Intercept

In early December 2016, Adam was doing what he’s always doing, somewhere between hobby and profession: looking for things that are on the internet that shouldn’t be. That week, he came across a server inside New York University’s famed Institute for Mathematics and Advanced Supercomputing, headed by the brilliant Chudnovsky brothers, David and Gregory. The server appeared to be an internet-connected backup drive. But instead of being filled with family photos and spreadsheets, this drive held confidential information on an advanced code-breaking machine that had never before been described in public. Dozens of documents spanning hundreds of pages detailed the project, a joint supercomputing initiative administered by NYU, the Department of Defense, and IBM. And they were available for the entire world to download.

The supercomputer described in the trove, “WindsorGreen,” was a system designed to excel at the sort of complex mathematics that underlies encryption, the technology that keeps data private, and almost certainly intended for use by the Defense Department’s signals intelligence wing, the National Security Agency. WindsorGreen was the successor to another password-cracking machine used by the NSA, “WindsorBlue,” which was also  documented in the material leaked from NYU and which had been previously described in the Norwegian press thanks to a document provided by National Security Agency whistleblower Edward Snowden. Both systems were intended for use by the Pentagon and a select few other Western governments, including Canada and Norway.

Adam, an American digital security researcher, requested that his real name not be published out of fear of losing his day job. Although he deals constantly with digital carelessness, Adam was nonetheless stunned by what NYU had made available to the world. “The fact that this software, these spec sheets, and all the manuals to go with it were sitting out in the open for anyone to copy is just simply mind blowing,” he said.

He described to The Intercept how easy it would have been for someone to obtain the material, which was marked with warnings like “DISTRIBUTION LIMITED TO U.S. GOVERNMENT AGENCIES ONLY,” “REQUESTS FOR THIS DOCUMENT MUST BE REFERRED TO AND APPROVED BY THE DOD,” and “IBM Confidential.” At the time of his discovery, Adam wrote to me in an email:

All of this leaky data is courtesy of what I can only assume are misconfigurations in the IMAS (Institute for Mathematics and Advanced Supercomputing) department at NYU. Not even a single username or password separates these files from the public internet right now. It’s absolute insanity.

The files were taken down after Adam notified NYU.

Intelligence agencies like the NSA hide code-breaking advances like WindsorGreen because their disclosure might accelerate what has become a cryptographic arms race. Encrypting information on a computer used to be a dark art shared between militaries and mathematicians. But advances in cryptography, and rapidly swelling interest in privacy in the wake of Snowden, have helped make encryption tech an effortless, everyday commodity for consumers. Web connections are increasingly shielded using the HTTPS protocol, end-to-end encryption has come to popular chat platforms like WhatsApp, and secure phone calls can now be enabled simply by downloading some software to your device. The average person viewing their checking account online or chatting on iMessage might not realize the mathematical complexity that’s gone into making eavesdropping impractical.

The spread of encryption is a good thing — unless you’re the one trying to eavesdrop. Spy shops like the NSA can sometimes thwart encryption by going around it, finding flaws in the way programmers build their apps or taking advantage of improperly configured devices.

Read full article >>>

RELATED POSTS:

Is Bilderberg A Sinister Group That Runs The World Or Just A Tea Party For Rich And Powerful People
Are the Bilderberg Group meeting, this weekend in Dresden, Germany, really The Shadow Government (the New World Order, The Illuminati,) that rules the world?

US-EU Privacy Shield Data-Sharing Agreement Blasted as Inadequate
The issue arises from the strict EU laws — enshrined in the Charter of Fundamental Rights of the European Union — to the privacy of citizens personal data. As we all know thanks to the material leaked by Ed Snowden and others the United States National Security Agency (NSA) does not regard anything as private,
New German Government Smartphone Spyware Will Monitor Citizens’ Calls, Typing AND See Through Their Camera Lenses
The German Interior Ministry has revealed a new “Bundestrojaner” or government trojan horse software that will enable security agencies to track the smartphone activities of anyone who downloads it. We understand Chancellor Merkel’s government has also adopted an “off the shelf” tool from a company which is said to help authoritarian regimes track their citizens …

Latest NSA Spying Scandal: White House Spied On US Congress.
During the aftermath of Ed Snowden’s NSA snooping revelations which revealed the US had been spying on its closest allies for years, Barack Hussein Obama announced he had banned eavesdropping by U.S. government agencies on leaders of US allies and promised he would begin to curtail the collection of Americans’ phone data in a series of limited reforms. Unsurprisingly the president was lying,

Big Data and The Surveillance Society
We kill people based on metadata. – Gen. Michael Hayden, former head of the NSA and CIA. Bene vixit, bene qui latuit. (To live well is to live concealed) – – Ovid (43 BC – 18 AD)The most sacred thing is to be able to shut your own door. – G.K. Chesterton (1874 – 1936). I don’t know why people are so keen to put the details of their private lives in public; they forget that invisibility is a superpower. – Banksy (2006)

New IBM software lets banks and retailers spy on Social Media Activities
Last Thursday (May 28) IBM launched 20 new applications with built in predictive analytics capabilities that will make it easier and faster for corporations to repond to what is revealed by your internet browsing habits.


John Kerry Calls For The Internet To Be Placed Under The Authority Of The United Nations

US Secretary of State John Kerry, speaking earlier this week in South Korea, said that the Internet “needs rules to be able to flourish and work properly.” This, according to Kerry, is necessary even for “a technology founded on freedom.” Kerry made his remarks in the context of talking about how international law is applicable to the Internet.


Whistleblower Exposes USA regine’s torture of it’s citizens

Just a couple of days ago we picked up a story from one of our favourite Whistleblower sites about a US Government Homeland Security site in Chicago where very strage things were going on. Our report compared it to The Ministry Of Love in Gorge Orwell’s novel 1984.

We Predicted An Orwellian Nightmare. Now Obama’s Ministry Of Love Is Identified
Back in 2008 we predicted pretty accurately how things would turn out under Presdident Barack Obama. We were not totally correct (well we are a British site) but where we erred it was on the side of caution. For example while it was easy enough to be aware that the egomaniacal

Thousands To Make Legal Stand Againt UK & US Government Surveillance.
Human rights organisation launches legal action to halt electronic mass surveillance. You can join them and be one of the names sueing GCHQ and the NSA. Learn how and read the full story of the Privacy International action below.

Secret ‘BADASS’ Intelligence Program Used To Spy On Smartphones.
Oh what a laugh, what a grin, those kool dudes who strut around with their iPhones clamped to their ear to show us that they paid $500 for a phone they could hsve bought for $150 had they been willing to do without the little Apple logo, and those who bought smart phones because, well everybody who is anybody has one, have been well and truly had.

Virtual ID has arrived – why you should resist taking it up
We told you some years ago when our publication appeared under a different name that the then Labour Government’s plan for compulsory electronic ID cards was the step that would take us over the line from a seblance of liberal democracy into oligarchic fascism. Labour’s plan was derailed by public opposition but now it has been rehashed and is presented with fluffy window dressing. A vote for Labour, Conservative Or Liberal Democrat is a vote for fascism. You have been warned.

Virtual ID has arrived – why you should resist taking it up
We told you some years ago when our publication appeared under a different name that the then Labour Government’s plan for compulsory electronic ID cards was the step that would take us over the line from a seblance of liberal democracy into oligarchic fascism. Labour’s plan was derailed by public opposition but now it has been rehashed and is presented with fluffy window dressing. A vote for Labour, Conservative Or Liberal Democrat is a vote for fascism. You have been warned.

Big Brother Is Right Behind You And He Knows What you Are Up To
No doubt the smug complacent bourgeois fools will shouth conspiracy theirist and the emotionally needy leftist Sheeple will

bleat “racist bigot” (they always bleat “racist bigot” but it is not alarmist to say the UK is slowly becoming a totalitarian state. What else can we calli our nation if anti – terror laws are being used prosecute people for low-level offences such as Television licence dodging.

Greenteeth Elsewhere:
[ The Original Boggart Blog] … [ Writerbeat ] … [ Daily Stirrer.shtml ]…[Little Nicky Machiavelli]… [ Ian’s Authorsden Pages ]… [ It’s Bollocks My Dears, All Bollocks ] [Scribd]…[Wikinut] … [ Boggart Abroad] … [ Grenteeth Bites ] … [ Latest Posts ] [Ian Thorpe at Flickr ] … [Latest Posts] … [ Tumblr ] … [ Authorsden blog ] … [Daily Stirrer Headlines]
[ Ian at Facebook ]

What’s All The Fuss About?

Heavy day’s telly watching Mr. Murdoch trying out his Uriah Heap impersonation and also being attacked by an interloper armed with a custard pie! Well done that man!

The saner, or perhaps more cynical, amongst us do wonder what all the fuss is about. If anybody thinks private detectives, journalists and police officers, to name but three as they are the ones surfing the tide of scandal hysteria at the moment, will not go to any ends by whatever means to turn a dishonest buck, then they probably believe all the bullshit the apprentice contestants come out with too.

The whole thing was put into a timely perespective last night in the new drama series The Hour.
Thrusting young journalist happens upon a report of a mysterious death, being treated as a robbery with violence.
Along he goes to the police station, slips the desk sergeant a fiver, it is set in 1956, and weigh hey, he’s looking at the corpse, discovering it still has its wallet on it and is hot on the trail of a mystery.

Now either the writer was particularly prescient or this stuff goes on all the time. Which do you think?
Answers with the entry fee of £25, in a brown paper bag, down the back of the cistern, gents toilets, platform one, Barnsley Central.

RELATED POSTS:
The Apprentice: The Roman CFircus Is backNews International Phone Hacking Scandal Spreads To USA
Don’t Call Me A Conspiracy Theorist

The Sensible Peoples’ Newspaper Today Is ……….. The Daily Mail

Yes, you did read that headline correctly, today as the broadsheets and red tops alike whip themselves into a frenzy like so many Roman revellers at Saturnalia over the resignation of ginger minge Rebekah Brooks and the latest revelations in the News International phone hacking, cop bunging, bin raiding and baby bugging (we might have made that one up)crimes of people working for the News of the World and The Currant Bun, it is left to the Daily Mail to say:

“Hey folks, while television news and the papers are obsessing over this story that we all knew about for years, aren’t we forgetting the Euro single currency is falling apart, inflation is up, employment is down and upshitcreekness abounds.

Well done to The Daily Mail for sounding a note of sanity.

It is always possible of course that the Mail did not have any new dirt on the News International scandal. But it would be curmudgeonly of us to suggest such a thin so we will not mention it.

RELATED POSTS:
Creating Wealth
The Two Minutes Hate

A good day to bury Huffinton Post

Yesterday (or was it the day before) the US website Huffington Post launched it’s UK edition amid much fanfare, ballyhoo and popping of champagme corks that was supposed to get it blanket coverage in the press and on TV and radio news.

Huffington Post is the future of news in the new media, some arse declared when the UK venture was announced.

Did you notice any mention at all of this ‘media event of the century’?

I think not. But I’d be willing to bet you heard plenty about the News of the World hacking case, who was going to get fired from The Apprentice (goodbye Medoly – only borderline eye candy but ruthless enough to be interesting) and the new Harry Potter film.

Old media is not finished yet, it seems.

Apprentices (comic verse)

A Hack A Day Makes A Student Straight A

The Sundays rang with indignation and approbation at the fact that the winner of The Apprentice, Lee McQueen had lied on his CV about his educational background. McQueen claimed to have attended university(?) for two years, when in fact he had lasted 4 months.
Good job he didn’t try the same stunt as Omar Khan of Orange County, L.A.
The 18 year old student is charged with breaking into his high school and hacking into the computer’s admin system in order to change his and his friend’s grades, in some case from F (for Fail) to A. He also stole test questions and answers which he e-mailed to friends. If convicted on all 69 counts he faces up to 38 years in jail.
But there again, once he gets onto the prison’s computers that will probably change to 38days, if it doesn’t disappear altogether.