Intel Vets Challenge "Russia Hack" Evidence

Tyler Durden's picture

Via ConsortiumNews.com,

In a memo to President Trump, a group of former U.S. intelligence officers, including NSA specialists, cite new forensic studies to challenge the claim of the key Jan. 6 “assessment” that Russia “hacked” Democratic emails last year.

MEMORANDUM FOR: The President

FROM: Veteran Intelligence Professionals for Sanity (VIPS)

SUBJECT: Was the “Russian Hack” an Inside Job?

Executive Summary

Forensic studies of “Russian hacking” into Democratic National Committee computers last year reveal that on July 5, 2016, data was leaked (not hacked) by a person with physical access to DNC computers, and then doctored to incriminate Russia.


Director of National Intelligence James Clapper (right) talks with President Barack Obama in the Oval Office, with John Brennan and other national security aides present. (Photo credit: Office of Director of National Intelligence)

After examining metadata from the “Guccifer 2.0” July 5, 2016 intrusion into the DNC server, independent cyber investigators have concluded that an insider copied DNC data onto an external storage device, and that “telltale signs” implicating Russia were then inserted.

Key among the findings of the independent forensic investigations is the conclusion that the DNC data was copied onto a storage device at a speed that far exceeds an Internet capability for a remote hack. Of equal importance, the forensics show that the copying and doctoring were performed on the East coast of the U.S. Thus far, mainstream media have ignored the findings of these independent studies [see here and here].

Independent analyst Skip Folden, a retired IBM Program Manager for Information Technology US, who examined the recent forensic findings, is a co-author of this Memorandum. He has drafted a more detailed technical report titled “Cyber-Forensic Investigation of ‘Russian Hack’ and Missing Intelligence Community Disclaimers,” and sent it to the offices of the Special Counsel and the Attorney General. VIPS member William Binney, a former Technical Director at the National Security Agency, and other senior NSA “alumni” in VIPS attest to the professionalism of the independent forensic findings.

The recent forensic studies fill in a critical gap. Why the FBI neglected to perform any independent forensics on the original “Guccifer 2.0” material remains a mystery – as does the lack of any sign that the “hand-picked analysts” from the FBI, CIA, and NSA, who wrote the “Intelligence Community Assessment” dated January 6, 2017, gave any attention to forensics.

NOTE: There has been so much conflation of charges about hacking that we wish to make very clear the primary focus of this Memorandum. We focus specifically on the July 5, 2016 alleged Guccifer 2.0 “hack” of the DNC server. In earlier VIPS memoranda we addressed the lack of any evidence connecting the Guccifer 2.0 alleged hacks and WikiLeaks, and we asked President Obama specifically to disclose any evidence that WikiLeaks received DNC data from the Russians [see here and here].

Addressing this point at his last press conference (January 18), he described “the conclusions of the intelligence community” as “not conclusive,” even though the Intelligence Community Assessment of January 6 expressed “high confidence” that Russian intelligence “relayed material it acquired from the DNC … to WikiLeaks.”

Obama’s admission came as no surprise to us. It has long been clear to us that the reason the U.S. government lacks conclusive evidence of a transfer of a “Russian hack” to WikiLeaks is because there was no such transfer. Based mostly on the cumulatively unique technical experience of our ex-NSA colleagues, we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).

From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:

-(1) an inside leak to WikiLeaks before Julian Assange announced on June 12, 2016, that he had DNC documents and planned to publish them (which he did on July 22) – the presumed objective being to expose strong DNC bias toward the Clinton candidacy; and

-(2) a separate leak on July 5, 2016, to pre-emptively taint anything WikiLeaks might later publish by “showing” it came from a “Russian hack.”

*  *  *

Mr. President:

This is our first VIPS Memorandum for you, but we have a history of letting U.S. Presidents know when we think our former intelligence colleagues have gotten something important wrong, and why. For example, our first such memorandum, a same-day commentary for President George W. Bush on Colin Powell’s U.N. speech on February 5, 2003, warned that the “unintended consequences were likely to be catastrophic,” should the U.S. attack Iraq and “justfy” the war on intelligence that we retired intelligence officers could readily see as fraudulent and driven by a war agenda.


Secretary of State Colin Powell addressed the United Nations on Feb. 5. 2003, citing satellite photos which supposedly proved that Iraq had WMD, but the evidence proved bogus.

The January 6 “Intelligence Community Assessment” by “hand-picked” analysts from the FBI, CIA, and NSA seems to fit into the same agenda-driven category. It is largely based on an “assessment,” not supported by any apparent evidence, that a shadowy entity with the moniker “Guccifer 2.0” hacked the DNC on behalf of Russian intelligence and gave DNC emails to WikiLeaks.

The recent forensic findings mentioned above have put a huge dent in that assessment and cast serious doubt on the underpinnings of the extraordinarily successful campaign to blame the Russian government for hacking. The pundits and politicians who have led the charge against Russian “meddling” in the U.S. election can be expected to try to cast doubt on the forensic findings, if they ever do bubble up into the mainstream media. But the principles of physics don’t lie; and the technical limitations of today’s Internet are widely understood. We are prepared to answer any substantive challenges on their merits.

You may wish to ask CIA Director Mike Pompeo what he knows about this. Our own lengthy intelligence community experience suggests that it is possible that neither former CIA Director John Brennan, nor the cyber-warriors who worked for him, have been completely candid with their new director regarding how this all went down.

Copied, Not Hacked

As indicated above, the independent forensic work just completed focused on data copied (not hacked) by a shadowy persona named “Guccifer 2.0.” The forensics reflect what seems to have been a desperate effort to “blame the Russians” for publishing highly embarrassing DNC emails three days before the Democratic convention last July. Since the content of the DNC emails reeked of pro-Clinton bias, her campaign saw an overriding need to divert attention from content to provenance – as in, who “hacked” those DNC emails? The campaign was enthusiastically supported by a compliant “mainstream” media; they are still on a roll.

“The Russians” were the ideal culprit. And, after WikiLeaks editor Julian Assange announced on June 12, 2016, “We have emails related to Hillary Clinton which are pending publication,” her campaign had more than a month before the convention to insert its own “forensic facts” and prime the media pump to put the blame on “Russian meddling.” Mrs. Clinton’s PR chief Jennifer Palmieri has explained how she used golf carts to make the rounds at the convention. She wrote that her “mission was to get the press to focus on something even we found difficult to process: the prospect that Russia had not only hacked and stolen emails from the DNC, but that it had done so to help Donald Trump and hurt Hillary Clinton.”


Democratic presidential nominee Hillary Clinton at the third debate with Republican nominee Donald Trump. (Photo credit: hillaryclinton.com)

Independent cyber-investigators have now completed the kind of forensic work that the intelligence assessment did not do. Oddly, the “hand-picked” intelligence analysts contented themselves with “assessing” this and “assessing” that. In contrast, the investigators dug deep and came up with verifiable evidence from metadata found in the record of the alleged Russian hack.

They found that the purported “hack” of the DNC by Guccifer 2.0 was not a hack, by Russia or anyone else. Rather it originated with a copy (onto an external storage device – a thumb drive, for example) by an insider. The data was leaked after being doctored with a cut-and-paste job to implicate Russia. We do not know who or what the murky Guccifer 2.0 is. You may wish to ask the FBI.

The Time Sequence

June 12, 2016: Assange announces WikiLeaks is about to publish “emails related to Hillary Clinton.”

June 15, 2016: DNC contractor Crowdstrike, (with a dubious professional record and multiple conflicts of interest) announces that malware has been found on the DNC server and claims there is evidence it was injected by Russians.

June 15, 2016: On the same day, “Guccifer 2.0” affirms the DNC statement; claims responsibility for the “hack;” claims to be a WikiLeaks source; and posts a document that the forensics show was synthetically tainted with “Russian fingerprints.”

We do not think that the June 12 & 15 timing was pure coincidence. Rather, it suggests the start of a pre-emptive move to associate Russia with anything WikiLeaks might have been about to publish and to “show” that it came from a Russian hack.

The Key Event

July 5, 2016: In the early evening, Eastern Daylight Time, someone working in the EDT time zone with a computer directly connected to the DNC server or DNC Local Area Network, copied 1,976 MegaBytes of data in 87 seconds onto an external storage device. That speed is many times faster than what is physically possible with a hack.

It thus appears that the purported “hack” of the DNC by Guccifer 2.0 (the self-proclaimed WikiLeaks source) was not a hack by Russia or anyone else, but was rather a copy of DNC data onto an external storage device. Moreover, the forensics performed on the metadata reveal there was a subsequent synthetic insertion – a cut-and-paste job using a Russian template, with the clear aim of attributing the data to a “Russian hack.” This was all performed in the East Coast time zone.

“Obfuscation & De-obfuscation”

Mr. President, the disclosure described below may be related. Even if it is not, it is something we think you should be made aware of in this general connection. On March 7, 2017, WikiLeaks began to publish a trove of original CIA documents that WikiLeaks labeled “Vault 7.” WikiLeaks said it got the trove from a current or former CIA contractor and described it as comparable in scale and significance to the information Edward Snowden gave to reporters in 2013.

No one has challenged the authenticity of the original documents of Vault 7, which disclosed a vast array of cyber warfare tools developed, probably with help from NSA, by CIA’s Engineering Development Group. That Group was part of the sprawling CIA Directorate of Digital Innovation – a growth industry established by John Brennan in 2015.

Scarcely imaginable digital tools – that can take control of your car and make it race over 100 mph, for example, or can enable remote spying through a TV – were described and duly reported in the New York Times and other media throughout March. But the Vault 7, part 3 release on March 31 that exposed the “Marble Framework” program apparently was judged too delicate to qualify as “news fit to print” and was kept out of the Times.


WikiLeaks founder Julian Assange at a media conference in Copenhagen, Denmark. (Photo credit: New Media Days / Peter Erichsen)

The Washington Post’s Ellen Nakashima, it seems, “did not get the memo” in time. Her March 31 article bore the catching (and accurate) headline: “WikiLeaks’ latest release of CIA cyber-tools could blow the cover on agency hacking operations.”

The WikiLeaks release indicated that Marble was designed for flexible and easy-to-use “obfuscation,” and that Marble source code includes a “deobfuscator” to reverse CIA text obfuscation.

More important, the CIA reportedly used Marble during 2016. In her Washington Post report, Nakashima left that out, but did include another significant point made by WikiLeaks; namely, that the obfuscation tool could be used to conduct a “forensic attribution double game” or false-flag operation because it included test samples in Chinese, Russian, Korean, Arabic and Farsi.

The CIA’s reaction was neuralgic. Director Mike Pompeo lashed out two weeks later, calling Assange and his associates “demons,” and insisting, “It’s time to call out WikiLeaks for what it really is, a non-state hostile intelligence service, often abetted by state actors like Russia.”

Mr. President, we do not know if CIA’s Marble Framework, or tools like it, played some kind of role in the campaign to blame Russia for hacking the DNC. Nor do we know how candid the denizens of CIA’s Digital Innovation Directorate have been with you and with Director Pompeo. These are areas that might profit from early White House review.

Putin and the Technology

We also do not know if you have discussed cyber issues in any detail with President Putin. In his interview with NBC’s Megyn Kelly, he seemed quite willing – perhaps even eager – to address issues related to the kind of cyber tools revealed in the Vault 7 disclosures, if only to indicate he has been briefed on them. Putin pointed out that today’s technology enables hacking to be “masked and camouflaged to an extent that no one can understand the origin” [of the hack] … And, vice versa, it is possible to set up any entity or any individual that everyone will think that they are the exact source of that attack.”

“Hackers may be anywhere,” he said. “There may be hackers, by the way, in the United States who very craftily and professionally passed the buck to Russia. Can’t you imagine such a scenario? … I can.”

Full Disclosure: Over recent decades the ethos of our intelligence profession has eroded in the public mind to the point that agenda-free analysis is deemed well nigh impossible. Thus, we add this disclaimer, which applies to everything we in VIPS say and do: We have no political agenda; our sole purpose is to spread truth around and, when necessary, hold to account our former intelligence colleagues.

We speak and write without fear or favor. Consequently, any resemblance between what we say and what presidents, politicians and pundits say is purely coincidental. The fact we find it is necessary to include that reminder speaks volumes about these highly politicized times. This is our 50th VIPS Memorandum since the afternoon of Powell’s speech at the UN. Live links to the 49 past memos can be found at https://consortiumnews.com/vips-memos/.

FOR THE STEERING GROUP, VETERAN INTELLIGENCE PROFESSIONALS FOR SANITY

William Binney, former NSA Technical Director for World Geopolitical & Military Analysis; Co-founder of NSA’s Signals Intelligence Automation Research Center

Skip Folden, independent analyst, retired IBM Program Manager for Information Technology US (Associate VIPS)

Matthew Hoh, former Capt., USMC, Iraq & Foreign Service Officer, Afghanistan (associate VIPS)

Larry C Johnson, CIA & State Department (ret.)

Michael S. Kearns, Air Force Intelligence Officer (Ret.), Master SERE Resistance to Interrogation Instructor

John Kiriakou, Former CIA Counterterrorism Officer and former Senior Investigator, Senate Foreign Relations Committee

Linda Lewis, WMD preparedness policy analyst, USDA (ret.)

Lisa Ling, TSgt USAF (ret.) (associate VIPS)

Edward Loomis, Jr., former NSA Technical Director for the Office of Signals Processing

David MacMichael, National Intelligence Council (ret.)

Ray McGovern, former U.S. Army Infantry/Intelligence officer and CIA analyst

Elizabeth Murray, former Deputy National Intelligence Officer for Middle East, CIA

Coleen Rowley, FBI Special Agent and former Minneapolis Division Legal Counsel (ret.)

Cian Westmoreland, former USAF Radio Frequency Transmission Systems Technician and Unmanned Aircraft Systems whistleblower (Associate VIPS)

Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA

Sarah G. Wilton, Intelligence Officer, DIA (ret.); Commander, US Naval Reserve (ret.)

Ann Wright, U.S. Army Reserve Colonel (ret) and former U.S. Diplomat

image_pdf

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
JesusUp's picture

Arrest Brennan now!

silverer's picture

After arresting Brennan, all the guys that presented this evidence should be put in charge of the NSA.

Looney's picture

 

0bama new that there was no hacking – it was an insider job – and so did Hillary and her goons.

THAT’S WHY SETH RICH IS DEAD.

Looney

Creepy_Azz_Crackaah's picture

Hillary did it. Put her in jail.

espirit's picture

It's pretty obvious there are treasonous and seditionist parties within our U.S. government, in which most agree.

Voting out is useless, only to be replaced by fresh faced polistitutes serving unto the same pimp, and we the Deplorable Johns.

Has the Event Horizon truly passed, and should we just say 'fuck it' ? 

 

Never One Roach's picture

Too bad these Vets for sanity don't have a hit team who can perhaps straighten things out in DC swamp creatures and anti-Americans fast.

Got The Wrong No's picture

Good versus evil. Good is inherently handicapped against evil. I say it is time to remove the handicaps. Eye for an eye.

Liberty2012's picture

Good appears handicapped in that good hesitates to strike.

The hesitation is handicap in the short run, not in the long run.

StarGate's picture

There is always a new Horizon.
Sun up. Sun down.
Nature of reality.

Retreat for the moment - if best strategy.
But never, voluntarily, relinquish completely.

Life of Illusion's picture

WHO CARES WHO LEAKED, GO AFTER THE CRIMINALS

 

we have been saying for almost a year that the DNC data reached WikiLeaks via a copy/leak by a DNC insider (but almost certainly not the same person who copied DNC data on July 5, 2016).

From the information available, we conclude that the same inside-DNC, copy/leak process was used at two different times, by two different entities, for two distinctly different purposes:

Erek's picture

CNN: This just in - Putin may have links to Russia.

Newsboy's picture

I done it. I hacked y'all. All by myself.

electrically-signed: Bladimir Putin

The First Rule's picture

So the whole Russia hacking thing was made up.

 

Surprise. Surprise.

 

Democrats are the scum of this Earth.

Anteater's picture

In all this HACK, HACK fewfaw, never ONCE is it repeated,

that the Pentagon was successully hacked in 2012 of all

its military and civilian employee PII identity data. All of it.

Then in 2013, the Pentagon was successfully hacked of

all its defense contractor data, all the contracts and accounts.

 

TO THIS DAY, the Pentagon Payroll and Procurement Office

has NO IDEA WHERE ALL THE $100Bs ARE DISAPPEARING!

They just burned through their 2017 budget in only 7 months!

Congress had to plug the dike with $74 B moar of our savings.

 

A TOTAL BLEEDOUT of the US Treasury SS/MC Trust Funds!

Where is our MAGA President? NOT ONE WORD ON THIS.

Instead he's busy selling $112B of US arms to the al-Saud

Wahhabi-ISIS terrorist head-choppers,. NOT ONE KOPEK

of that $112B will ever appear on the US Treasury ledgers.

It's all going to the Khazar mafiya that runs WADC-NOVA.

 

"You're gonna need a foreign bank account from all the winning!"

Dirty Red Donald

 

decon's picture

Got a link for the 2017 Defense Budget overrun?

THORAX's picture

And more will be revealed! 

EuroPox's picture

and they didn't even mention Seth Rich...

FreeEarCandy's picture

Could have very well been those IT specialist that had Debbie Wasserman Schultz password and had access to the many other computers of top officals. Some are suggesting these fellows were blackmailing the officials who hired them with the files they lifted during their usual maintenance work.  Perhaps they tried to blackmail Hillary and she didn't pay. Hence, they leaked their booty to wikileaks.

EuroPox's picture

You mean the Awan brothers?  They were paid $4m for IT services - surely if they tried blackmail they would be dead by now...

FreeEarCandy's picture

You mean the Awan brothers? 

Yes. The Awan brothers. I'll have to remember their names, because I think we will be hearing more about these fellows sometime down the road. 

They did leave the country and refuse to come back for questioning. I also hear they left a lot of broken government equipment behind, which I think is now in the hands of the FBI-according to the article I read. 

EuroPox's picture

Saw a similar article - pity it's in the hands of the FBI and not some law enforcement agency.

FreeEarCandy's picture

 pity it's in the hands of the FBI and not some law enforcement agency.


Ha! I'll leave it at that.=(:O)

Thomas Paine's picture

The Awans dropped tools and lit out for pakistan with their ass on fire.

Give Me Some Truth's picture

Good for this group. And good for ZH for publishing this. Now let's see if the NYT does or the Washington Post. Will "NBC Nightly News" run a big piece on this tonight? Will "Sixty Minutes" devote a segment to this group's findings on Sunday?

Will the Intelligence Committee of Congress invite these people to testify?

Questions I ask but already know the answer to.

bigsexy's picture

Good point.  More to it though, I am begining to see that narrative is ALL that matters.  In Washington, the voice of the left and deep state is the loudest at all times.  The rhinos are scrared shitless and cannont fathom challenging any of it.  I assume its the cascading money they all seem to reap combined with the lefts new mantra of anything said by anyone else is racist, hateful, unfair and if you do that we will yell and scream and throw bottles.   The "right" in D.C. are useless.  This will not be addressed.  The common person that is not a ZH reader will never know.  More of the same until someone/some group gets some balls and takes it all on.  It will not be pretty and will result in violence far beyond the simple Bill/Hillary/Podesta and Co. murders....  Unfortunately, I don't think we are the tipping yet.

StarGate's picture

The hundredth (100th) Monkey ultimately figures it out.
Then ALL Monkeys know.

We're probably at Monkey 88.
MSM power days are over.

Canary Paint's picture

And finally... Will someone put this memo in bullet points so that Trump will read it?

HRClinton's picture

Someone with my name would argue that this is a mysoginst, paranoid product of sexist, male, Alt-Right Deplorables. 

It's not HRC's fault.  It's everyone else's. 

Reminds me of Hitler, trapped in his Berlin bunker, and having psychological breakdowns, while blaming the entire nation for Germany's defeat.

If she won't or can't come to terms, she needs to take the same Exit as Adolf. Bam!  (ZHers could probably loan a handgun, ammo and personal engraving of 'affection' for the job.)

otschelnik's picture

Why did they send the memo to the president?   Better to send it to Rachel Madcow, Shillery, CrowdStrike, Tom Perez, Bill Mahler and Seth Rich's parents.  

FreeEarCandy's picture

Now that is some beautiful stuff. Finally a respectable argument against the Russian fairy tale.   

Tenshin Headache's picture

What recent forensic studies?

Did these folks somehow get their hands on the DNC server? (I doubt it)

otschelnik's picture

No, they got it from the DNC data published from the very first dump "NGP-VAN" from Guccifer 2.0.  That was the first published internal docs from the DNC.   This news has been around for some time.  An anonomous source called the "Forensicator" proved that the download speed was too fast to be a remote device, and was an inside job.  

http://disobedientmedia.com/2017/07/new-research-shows-guccifer-2-0-file...

 

 

bigkahuna's picture

There was no sign of network intrusion ever published to make this look like a remote hack. All evidence has always pointed to an inside job. Thats why the network logs and hardware that this data was exfiltratd from was never made available. Simply put - there is no evidence now, nor has there ever been evidence for any intrusion in this DNC case.

As for shill and molesta - apparantly they had such horrendously easy passwords to hack - their data was available to even the novice basement dwelling hacker. Anyone who wanted their stuff lined up and helped themselves. It is funny, these supposed hacks are the ones that could have some type of attribution - but they have not even bothered to present the evidence in these cases. Things like, time of intrusion, supposed IP of intruder - not everyone uses a jump or a spoof to disguise themselves, and many of the sophisticated jumps and spoofs are known methodologies for known actors. If they were not complete morons, they would know at least some of the people who got through on these 2 issues (molesta the murdera and shill).

Any technical professional worth their salt can figure this stuff out. This is how you know that all of these accusations that wasserwoman, shill, and molesta are making are absolute unadulterated crap.

WTFUD's picture

Ok so, disband the 17 so-called Intelligence Agencies and recruit just the 17 or so Intellectuals/Professionals above to do real spook work, thereby saving $billions on the Public Purse.

trailer park boys's picture

And who would you believe concerning Russian interference in the US election?

A)  2 dozen intel agents from the corrupted and politicized CIA, FBI and NSA, hand picked for this specific job by neocon nutcase Russia foamer James Clapper, head of the DNI. Whose resultant 'assessment' of Russian collusion was based on 0 facts.

B)  A fact driven tech based report from a highly esteemed collection of former intel agents, a kind of Myth Busters group of experts presenting Truth to Power since             2003?

 

 

 

 

 

 

Give Me Some Truth's picture

There are plenty of "intelligence professionals" who obviously know the truth - on "Russian hacking" and "Assad dropping Sarin bombs on his own people." 

They know that the "official story" is BS and implausible. And yet they remain silent and are too afraid to become whistleblowers. It turns out that the Edward Snowdens of the world are about 1 in 350,000. 

It takes some courage - and some strong convictions about the way one's government should comport itself - to go against the Deep State and the Establishment. 

People with "true grit" are truely lacking. Just when we need them more than ever.

P.S. Kudos to this group though. I note that they sign their names too. Of course all of these people seem to be retired or not working directly with intelligence agencies.

south40_dreams's picture

The deep state is thrashing and trashing

TheLastTrump's picture

Meanwhile, NOBODY is talking about WHAT was found, just how...

 

They want to impeach the president for election tampering?

 

We have solid fucking PROOF that Debbie & the DNfuckingC tampered with our election.

 

Bill of Rights's picture

GET OVER IT ASSHOLES YOU LOST!

 

But Schumer assures me, the "NEW " and improved Democrat party has Special Special programs for 2018... fucken retards.

trailer park boys's picture

After many polls and much testing, the DNC has come to the conclusion that the ' Flyover Deplorables ' actually do count. Back to the DNC drawing board.

Seth_Rich's picture

If I find anything interesting, i'll copy it off and get it to the Trumpster.

Arg, Nevermind. I'm dead!!!

DuneCreature's picture

This will get us nowhere.

Not squat. ... No, no, wait, make that, LESS THAN SQUAT!

It will probably get some of the Wrong People(tm) thrown in jail.

~~~~~^^~~~~^^~~~~^^~~~~^^~~~~^^~~~~^^~~~~^^~~~~^^~~~~^^~~~~~~

~~00)).. The USA Suffers From The Three C Infection ..((00~~

George Webb just keeps piling up, leads, evidence, tips to LE and suspects of EXTREMELY illegal, immoral, repugnant behavior.

Treason, Theft and War Crimes x 10 (tm). ... Go! George, go!

Awan and a Two = https://www.youtube.com/watch?v=ginMf-vkPP0

BUT...........

Any evidence presented or turned over to the 'investigating agency of the day' disappears into the Law Enforcement Black Hole (tm).

For those unfamiliar with black holes in astrophysical terms; They are points in space so dense that all matter, energy and light itself gets sucked in and never comes out. ...... Ever. ... (Well, not in your lifetime anyway. ... Or your kids, or their kids, or their kids, kids, etc.)

It all becomes a Big National Security Fucking Secret (tm) and gets classified into the 'JFK Assassination / 911 Vault Of No-Tell Ev-va'.

Nothing will come of any of this because we are infected with = The Crooks Are The Cops And The Courts (The 3C Disease (tm))

That is the problem in a nutshell.

Oh, and anyone who mentions the 3C infection fact is an Enemy Of The Criminal State.

Live Hard, Sometimes Short And Simple = Truth, Die Free

~ DC v7.4

StarGate's picture

Pessimism is its own reward.

Each step takes you higher up the ladder.
Each puzzle piece reveals more of the big picture.

Why throw away one puzzle piece because it does not show the whole pic?

Mike Masr's picture

I don't believe ANYTHING the deep state controlled government tells me!!! 

Fucking CNN is more credible if that tells you anything.

trailer park boys's picture

Come on, Mike - CNN IS a Deep State media outlet. 

DutchMadness's picture

This report should be sent to the special prosecutor.

trailer park boys's picture

Won't happen. The Special Prosecutor Robert Mueller would rather get 'assessments' from his old corrupt, politicized intel buddies. ASSESSMENTS=NO PROOF.