The Syria Strikes: A Conspiracy Theory

[Editor’s Note]

For those seeking additional information that show holes in the official narrative large enough to ferry the Titanic through, please read Jon Rappoport’s piece below [NoMoreFakeNews.com & JonRappoport.wordpress.com]:

Top Ten Reasons To Doubt Official Story On Assad Poison Gas Attack

Source: TheCorbettReport
April 14, 2017

The truth, the whole truth, and nothing but the truth about the Syria Strikes from the truth-telling truth-tellers in the truthful government and true mainstream news!…in under 5 minutes!!

Top Ten Reasons To Doubt Official Story On Assad Poison-Gas Attack

fakenews
Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
Jon Rappoport
April 13, 2017

The sarin-gas attack story prompted the US missile strike on a Syrian runway. Here are the top ten reasons for doubting that story, and instead calling it a convenient pretext:

ONE: Photos show rescue workers treating/decontaminating people injured or killed in the gas attack. The workers aren’t wearing gloves or protective gear. Only the clueless or crazy would expose themselves to sarin residue, which can be fatal.

TWO: MIT professor Thomas Postol told RT, “I believe it can be shown, without doubt, that the [US intelligence] document does not provide any evidence whatsoever that the US government has concrete knowledge that the government of Syria was the source of the chemical attack in Khan Shaykhun…Any competent analyst would have had questions about whether the debris in the crater was staged or real. No competent analyst would miss the fact that the alleged sarin canister was forcefully crushed from above, rather than exploded by a munition within it.” How would a canister purportedly dropped from an Assad-ordered plane incur “crushing from above?”

THREE: Why would President Assad, supported by Russia, scoring victory after victory against ISIS, moving closer to peace negotiations, suddenly risk all his gains by dropping sarin gas on his own people?

FOUR: In an interview with Scott Horton, ex-CIA officer Philip Giraldi states that his intelligence and military sources indicate Assad didn’t attack his own people with poison gas.

FIVE: Ex-CIA officer Ray McGovern states that his military sources report an Assad air strike did hit a chemical plant, and the fallout killed people, but the attack was not planned for that purpose. There was no knowledge the chemicals were lethal.

SIX: At consortiumnews.com, journalist Robert Parry writes, “There is a dark mystery behind the White House-released photo showing President Trump and more than a dozen advisers meeting at his estate in Mar-a-Lago after his decision to strike Syria with Tomahawk missiles: Where are CIA Director Mike Pompeo and other top intelligence officials?”

“Before the photo was released on Friday, a source told me that Pompeo had personally briefed Trump on April 6 about the CIA’s belief that Syrian President Bashar al-Assad was likely not responsible for the lethal poison-gas incident in northern Syria two days earlier — and thus Pompeo was excluded from the larger meeting as Trump reached a contrary decision.”

“After the attack, Secretary of State Tillerson, who is not an institutional intelligence official and has little experience with the subtleties of intelligence, was the one to claim that the U.S. intelligence community assessed with a ‘high degree of confidence’ that the Syrian government had dropped a poison gas bomb on civilians in Idlib province.”

“While Tillerson’s comment meshed with Official Washington’s hastily formed groupthink of Assad’s guilt, it is hard to believe that CIA analysts would have settled on such a firm conclusion so quickly, especially given the remote location of the incident and the fact that the initial information was coming from pro-rebel (or Al Qaeda) sources.”

“Thus, a serious question arises whether President Trump did receive that ‘high degree of confidence’ assessment from the intelligence community or whether he shunted Pompeo aside to eliminate an obstacle to his desire to launch the April 6 rocket attack.”

SEVEN: As soon as the Assad gas attack was reported, the stage was set for a US missile strike. No comprehensive investigation of the purported gas attack was undertaken.

EIGHT: There are, of course, precedents for US wars based on false evidence—the missing WMDs in Iraq, the claims of babies being pushed out of incubators in Kuwait, to name just two.

NINE: Who benefits from the sarin gas story? Assad? Or US neocons; the US military-industrial complex; Pentagon generals who want a huge increase in their military budget; Trump and his team, who are suddenly praised in the press, after a year of being pilloried at every turn; and ISIS?

TEN: For those who doubt that ISIS has ever used poison gas, see the NY Times (11/21/2016). While claiming that Assad has deployed chemical attacks, the article also states that ISIS has deployed chemical weapons 52 times since 2014.

I’m not claiming these ten reasons definitely and absolutely rule out the possibility of an Assad-ordered chemical attack. But they do add up to a far more believable conclusion than the quickly assembled “Assad-did-it” story.

These ten reasons starkly point to the lack of a rational and complete investigation of the “gas attack.”

And this lack throws a monkey wrench into Trump’s claim that he was ordering the missile strike based on “a high degree of confidence.”

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

An Unusual “Job Opportunity” In Germany


Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
April 5, 2017

This article was shared with me, and I am foregoing my usual practice of thanking that individual by initials, the reasons for which I am sure will become self-evident when one reads the article. The “article” in question appeared in Germany and is, of course, in German, but, as one will readily appreciate, is not an article at all, but a “job opportunity”. Here’s the original German “job opportunity: that appeared in Berlin:

http://www.berlin.de/special/jobs-und-ausbildung/stellenangebote/index.php/de/detail/10000-1152039603-S

And if one plugs all this into Google translate, one gets this:

Jobs in
Helper / assistant in the event service
Details.

Type of employment:
Workplace
Date of entry:
26.04.2017
Time limit:
Unlimited
Location:

Earnings:
88.40 to 120.- € / day
Working hours – Additional information:
The bets take place for about 2 weeks (including weekend). The continuous participation in a complete assignment is urgently necessary. Accommodation and meals are provided on the spot.

Job Description

Russian – Rollers for US Army exercises wanted

  1. Background

We are looking for extras for roll-out games at the U.S. Army training courses. Through the extras, the civilian population is represented in crises. This results in a realistic training scenario for the soldiers and thus an optimal preparation for their foreign missions.

We are particularly looking for employees with German and English skills.

  1. Timing and arrival

The assignments take place continuously (including weekend) at the Hohenfelder training camp (between Nuremberg and Regensburg). The continuous participation in a complete assignment is urgently necessary. The final dates will be communicated to participants about 4 weeks in advance.
The arrival is by bus in the evening before the first day of the employment, the departure in the evening on the last day of employment (both free of charge). The exact departure times and places of the buses will be communicated to the participants in writing.
An introductory and training session will take place for the participants on the first two days of the event.

  1. Conditions of Participation

Good English and German skills are required for all participants. In addition, good language skills in Russian, Polish or Czech are of great advantage.
Foreign applicants must bring a valid residence permit and work permit. All participants must bring a valid identity card or passport with their copy at Optronic.
Payroll is made exclusively on the payroll tax card. This must be present at the beginning of the event together with the fully completed personnel questionnaire at Optronic.

  1. Conditions on site

Accommodation takes place in bunk beds in soldiers accommodation or houses and tents on the practice ground. Separate toilets and showers for ladies and gentlemen are available. It is not possible to leave the barracks area during the entire duration of the event (exception: doctor’s visit). The houses in the villages are equipped with heating and electricity and usually also with water connection (toilets, laundry facilities).
For safety reasons, the carrying of mobile telephones as well as (mobile) personal computers etc. on the premises of the troops is prohibited. For urgent messages and emergencies, a local radio network and emergency numbers are available.
All rooms are cleaned. They must be kept clean by the participants themselves for the period of the use and left at the end in perfect condition. Cleaning material is provided.
The daily routine usually starts with getting up: 5 o’clock, breakfast: 6 o’clock, start of the operation: 7 o’clock.
The meals include 3 meals per day (the meals are served in a cafeteria, as a field kitchen and / or as field rations). Adequate drinking water is also provided.
During the entire stay at the Hohenfelde training camp there is a strict alcohol ban which is also checked by the Military Police by means of breath alcohol tests. Of course, all drugs of any kind are strictly prohibited. Violations will be punished with immediate notice and the reprimand from the military premises (4.III).

  1. Activity description

The participants play small extras such as a cattle breeder, shopkeeper or even the mayor of a village in Afghanistan, which occasionally mediates and negotiates with the present U.S. armed forces. On the training grounds, up to 10 villages are artificially laid out, each consisting of 10 to 30 houses.

So, they’re advertising for “jobs” seeking people that speak English, German, Polish, and Czech, subjecting them to “roll-playing” in “villages” subject to strict military protocols, which includes not being able to leave the premises, and shutting off all outside contact via phones or computers which Google translate renders the German Sicherheitsgrunden as “for safety reasons” which is one of the most laughable translations I’ve read yet to come out of Google. A much more accurate rendering would be “for security reasons” or “on the grounds of security“. Ok, that’s understandable, except this also means the participants are cut off from being able to communicate with the outside world.

I don’t know about you, but this certainly raises my eyebrows.

And what’s all this for? Why, to play “small extras, such as a cattle breeder, shopkeeper, or even the mayor of a village in Afghanistan,” all rolls for which German, English, Polish, Russian, and Czech are well-suited. One could understand, of course, German and English, even Czech, for Afghan roll-players who need to be told where to go and what to do by American or German army officers. But Polish? Russian?

This is one of those “you tell me” sorts of stories, but in the back of my mind I cannot help but think that “drills” are for the purpose of gaming out scenarios, and if recent history is any guide, oftentimes drills are “flipped live” by an actual “operation”, and it’s worth noting that this is the way Google translate chose to translate “Einsatzbeginn“.

See you on the flip side…

Read More At: GizaDeathStar.com
________________________________________________

About Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

Credibility of Cyber Firm that Claimed Russia Hacked the DNC Comes Under Serious Question


Source: LibertyBlitzkrieg.com
Michael Krieger
March 23, 2017

Before I get to the meat of this post, we need to revisit a little history. The cyber security firm hired to inspect the DNC hack and determine who was responsible is a firm called Crowdstrike. Its conclusion that Russia was responsible was released last year, but several people began to call its analysis into question upon further inspection.

Jeffrey Carr was one of the most prominent cynics, and as he noted in his December post, FBI/DHS Joint Analysis Report: A Fatally Flawed Effort:

The FBI/DHS Joint Analysis Report (JAR) “Grizzly Steppe” was released yesterday as part of the White House’s response to alleged Russian government interference in the 2016 election process. It adds nothing to the call for evidence that the Russian government was responsible for hacking the DNC, the DCCC, the email accounts of Democratic party officials, or for delivering the content of those hacks to Wikileaks.

It merely listed every threat group ever reported on by a commercial cybersecurity company that is suspected of being Russian-made and lumped them under the heading of Russian Intelligence Services (RIS) without providing any supporting evidence that such a connection exists.

Unlike Crowdstrike, ESET doesn’t assign APT28/Fancy Bear/Sednit to a Russian Intelligence Service or anyone else for a very simple reason. Once malware is deployed, it is no longer under the control of the hacker who deployed it or the developer who created it. It can be reverse-engineered, copied, modified, shared and redeployed again and again by anyone. In other words — malware deployed is malware enjoyed!

If ESET could do it, so can others. It is both foolish and baseless to claim, as Crowdstrike does, that X-Agent is used solely by the Russian government when the source code is there for anyone to find and use at will.

If the White House had unclassified evidence that tied officials in the Russian government to the DNC attack, they would have presented it by now. The fact that they didn’t means either that the evidence doesn’t exist or that it is classified.

If it’s classified, an independent commission should review it because this entire assignment of blame against the Russian government is looking more and more like a domestic political operation run by the White House that relied heavily on questionable intelligence generated by a for-profit cybersecurity firm with a vested interest in selling “attribution-as-a-service”.

Nevertheless, countless people, including the entirety of the corporate media, put total faith in the analysis of Crowdstrike despite the fact that the FBI was denied access to perform its own analysis. Which makes me wonder, did the U.S. government do any real analysis of its own on the DNC hack, or did it just copy/paste Crowdstrike?

As The Hill reported in January:

The FBI requested direct access to the Democratic National Committee’s (DNC) hacked computer servers but was denied, Director James Comey told lawmakers on Tuesday.

The bureau made “multiple requests at different levels,” according to Comey, but ultimately struck an agreement with the DNC that a “highly respected private company” would get access and share what it found with investigators.

“We’d always prefer to have access hands-on ourselves if that’s possible,” Comey said, noting that he didn’t know why the DNC rebuffed the FBI’s request.

This is nuts. Are all U.S. government agencies simply listening to what Crowdstike said in coming to their “independent” conclusions that Russia hacked the DNC? If so, that’s a huge problem. Particularly considering what Voice of America published yesterday in a piece titled, Cyber Firm at Center of Russian Hacking Charges Misread Data:

An influential British think tank and Ukraine’s military are disputing a report that the U.S. cybersecurity firm CrowdStrike has used to buttress its claims of Russian hacking in the presidential election.

The CrowdStrike report, released in December, asserted that Russians hacked into a Ukrainian artillery app, resulting in heavy losses of howitzers in Ukraine’s war with Russian-backed separatists.

But the International Institute for Strategic Studies (IISS) told VOA that CrowdStrike erroneously used IISS data as proof of the intrusion. IISS disavowed any connection to the CrowdStrike report. Ukraine’s Ministry of Defense also has claimed combat losses and hacking never happened.

The challenges to CrowdStrike’s credibility are significant because the firm was the first to link last year’s hacks of Democratic Party computers to Russian actors, and because CrowdStrike co-founder Dimiti Alperovitch has trumpeted its Ukraine report as more evidence of Russian election tampering.

How is this not the biggest story in America right now?

Yaroslav Sherstyuk, maker of the Ukrainian military app in question, called the company’s report “delusional” in a Facebook post. CrowdStrike never contacted him before or after its report was published, he told VOA.

VOA first contacted IISS in February to verify the alleged artillery losses. Officials there initially were unaware of the CrowdStrike assertions. After investigating, they determined that CrowdStrike misinterpreted their data and hadn’t reached out beforehand for comment or clarification.

In a statement to VOA, the institute flatly rejected the assertion of artillery combat losses.

“The CrowdStrike report uses our data, but the inferences and analysis drawn from that data belong solely to the report’s authors,” the IISS said. “The inference they make that reductions in Ukrainian D-30 artillery holdings between 2013 and 2016 were primarily the result of combat losses is not a conclusion that we have ever suggested ourselves, nor one we believe to be accurate.”

In early January, the Ukrainian Ministry of Defense issued a statement saying artillery losses from the ongoing fighting with separatists are “several times smaller than the number reported by [CrowdStrike] and are not associated with the specified cause” of Russian hacking.

But Ukraine’s denial did not get the same attention as CrowdStrike’s report. Its release was widely covered by news media reports as further evidence of Russian hacking in the U.S. election.

In interviews, Alperovitch helped foster that impression by connecting the Ukraine and Democratic campaign hacks, which CrowdStrike said involved the same Russian-linked hacking group—Fancy Bear—and versions of X-Agent malware the group was known to use.

“The fact that they would be tracking and helping the Russian military kill Ukrainian army personnel in eastern Ukraine and also intervening in the U.S. election is quite chilling,” Alperovitch said in a December 22 story by The Washington Post.

The same day, Alperovitch told the PBS NewsHour: “And when you think about, well, who would be interested in targeting Ukraine artillerymen in eastern Ukraine? Who has interest in hacking the Democratic Party? [The] Russia government comes to mind, but specifically, [it’s the] Russian military that would have operational [control] over forces in the Ukraine and would target these artillerymen.”

Alperovitch, a Russian expatriate and senior fellow at the Atlantic Council policy research center in Washington, co-founded CrowdStrike in 2011. The firm has employed two former FBI heavyweights: Shawn Henry, who oversaw global cyber investigations at the agency, and Steven Chabinsky, who was the agency’s top cyber lawyer and served on a White House cybersecurity commission. Chabinsky left CrowdStrike last year.

CrowdStrike declined to answer VOA’s written questions about the Ukraine report, and Alperovitch canceled a March 15 interview on the topic. In a December statement to VOA’s Ukrainian Service, spokeswoman Ilina Dimitrova defended the company’s conclusions.

In its report last June attributing the Democratic hacks, CrowdStrike said it was long familiar with the methods used by Fancy Bear and another group with ties to Russian intelligence nicknamed Cozy Bear. Soon after, U.S. cybersecurity firms Fidelis and Mandiant endorsed CrowdStrike’s conclusions. The FBI and Homeland Security report reached the same conclusion about the two groups.

If the company’s analysis was “delusional” when it came to Ukraine, why should we have any confidence that its analysis on Russia and the DNC is more sound?

Answer: We shouldn’t.

Read More At: LibertyBlitzkrieg.com

The Op: Unelected Agents Now Infiltrating ‘Critical Infrastructures’

Massive Collection Of Data
A covert op for the ages: Technocracy United
Technocracy: “control of society by a technical elite”

technocracy
Source: NoMoreFakeNews.com
Jon Rappoport
January 9, 2017

Note to readers: the people in charge of, yes, running the future are counting on a populace who can’t think beyond a few weeks or months. That’s their ace in the hole. The long-term future must always seem blurry and vague—and a waste of time to consider. Why? It’s obvious. The people in charge are always building the long-term future, brick by brick, and if very few citizens can grasp what it looks like, how can they object or resist or sound an alarm?

If you want to illegally take over an area, you need to invent an external threat justifying the takeover. We’ve been seeing exactly that recently, as Russia has suddenly been painted as a hostile force trying to destroy our “open democracy.”

Therefore, the Department of Homeland Security is now in charge of US elections, to “combat the Russian hackers.”

And it isn’t only elections.

In the release, last Friday, that gave control of US elections to the Department of Homeland Security (a naked coup), we also have this, from ABC News:

“A 2013 presidential directive identified 16 sectors as critical infrastructures, including energy, financial services, health care, transportation, food and agriculture and communications.”

“The designation announced Friday places responsibilities on the Homeland Security secretary to identify and prioritize those sectors, considering physical and cyber threats against them. The secretary is also required to conduct security checks and provide information about emerging and imminent threats.”

ABC got it wrong. The responsibilities (excluding elections) placed on the head of Homeland Security weren’t invented last Friday. They kicked off in 2013, and they represent a technocratic op to infiltrate and exert power over every aspect of American life.

The 2013 Policy Directive, issued by President Obama, was titled: “Critical Infrastructure Security and Review.” It enumerated no less than 16 areas of so-called US “critical infrastructure” where Homeland Security would muscle in:

Chemical; Commercial Facilities; Communications; Critical Manufacturing; Dams; Defense Industrial Base; Emergency Services; Energy; Final Services; Food and Agriculture; Government Facilities; Healthcare and Public Health; Information Technology; Nuclear Reactors, Materials, and Waste; Transportation Systems; Water and Wastewater Systems.

These are the areas where the head of Homeland Security is expected to “manage risk and strengthen security.” HS will also, of course, take charge of integrating and monitoring ALL the data networks of these 16 sectors.

It sounds reasonable to the average person. But the true theme is control. Planning, control, execution. Move in on these areas and exert operational command from the top.

This IS, in fact, the technocratic blueprint for global management of a new system. We’re talking about the re-engineering of society.

Capturing the 16 areas (and their data) above was always the long-term aim, when the Department of Homeland Security was invented in the wake of the 9/11 attacks. If you recall, there was considerable grousing then about the word “Homeland,” because it emitted a strong whiff of Fascism.

If the goal is engineering a new society—and it is—all systems of data collection, communication, and surveillance must be gathered under one roof.

The social and political engineer (aka the technocrat) views every person (unit) as a biological machine that must be profiled six ways from Sunday, for the purpose of inserting him into an overall pattern. As Patrick Wood explains in his brilliant book, Technocracy Rising, “[technology] is being rapidly implemented…to exhaustively monitor, measure and control every facet of individual activity and every ampere of energy delivered and consumed in the life of such individual[s].”

In truth, the Dept. of Homeland Security is spearheading a movement to connect, cross reference, and integrate every major apparatus of data- collection in both the private and public sectors.

This is the ongoing op.

It is not partisan. It flies the banner of no political party. It pretends to protect the citizenry.

But, in fact, it is the major long-term threat to the citizenry.

It is planning a national and global civilization that does not ask for permission to exist.

No one is voting, because if a vote were required, and people were informed about what is really happening, they would overwhelmingly reject technocracy.

Which is why new enemies must be invented on a continuous basis—to justify the “proactive measures that will keep us safe.”

Homeland Security, with its 240,000 employees and its 24 agencies, is in the business of securing untold trillions…

Continue Reading At: JonRappoport.wordpress.com
______________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

The Alleged “Russian Hacking” Story Changes AGAIN

fakenews

Source: ZeroHedge.com
January 5, 2017

Today at 9:30 am, senior U.S. intelligence officials face questions at a Senate hearing that will be dominated by the intelligence community’s assessment that Russia meddled in the presidential election to help Donald Trump win. Participating will be James R. Clapper, Jr., Director Of National Intelligence. Marcel J. Lettre II, Under Secretary Of Defense For Intelligence and Admiral Michael S. Rogers, USN, Commander, United States Cyber Command.

The Armed Services Committee’s cyber threats hearing on Thursday comes a day before the president-elect is to be briefed by the CIA and FBI directors — along with the director of national intelligence — on the investigation into Russia’s alleged hacking efforts. Trump has been deeply critical of their findings, even appearing to back controversial WikiLeaks founder Julian Assange’s contention that Russia did not provide him with hacked Democratic emails.

The committee’s session is the first in a series aimed at investigating purported Russian cyber-attacks against U.S. interests and developing defenses sturdy enough to blunt future intrusions. “We will obviously be talking about the hacking, but the main thing is the whole issue of cybersecurity,” the committee’s Republican chairman, Sen. John McCain of Arizona, said ahead of the hearing. “Right now we have no policy, no strategy to counter cyberattacks.”

More importantly, however, the hearing comes hours after Reuters reported overnight that U.S. intelligence agencies obtained what they considered to be conclusive evidence after the November election that Russia provided hacked material from the Democratic National Committee to WikiLeaks. However, in the latest change of the narrative, this time the allegation is that Russia provided the hacked data through a third party, three U.S. officials said on Wednesday.

Wikieaks was quick to highlight that according to the report, US officials admitted that the Wikileaks “source” was not Russia, and that the goal posts now shifted to the source’s source:

In keeping with the theme of providing no proof to the general public, the officials declined to describe the intelligence obtained about the involvement of a third-party in passing on leaked material to WikiLeaks, saying they did not want to reveal how the U.S. government had obtained the information. So just trust them, please.

The shift in the narrative is curious because as a reminder, officials had concluded “months earlier” that Russian intelligence agencies had directed the hacking, but had been less certain that they could prove Russia also had controlled the release of information damaging to Democratic presidential candidate Hillary Clinton. It now appears that along with lack of evidence, the attention has shifted to an “intermediary” as being the responsible party .

In an interview with Fox News, WikiLeaks founder Julian Assange said he did not receive emails stolen from the DNC and top Hillary Clinton aide John Podesta from “a state party.” Assange did not rule out the possibility that he got the material from a third party.

Trump on Wednesday sided with Assange and again questioned the U.S. intelligence community’s conclusion that Russia tried to help his candidacy and hurt Clinton’s.

Concern by U.S. officials over the hacking first spiked in August, when intelligence agencies concluded that Russian intelligence, with the direction of President Vladimir Putin, had been trying to disrupt and discredit the presidential and congressional elections. Obama in August rejected recommendations from some of his advisors to disclose the Russian link and take some limited covert action as “a shot across Putin’s bow to knock it off,” one official with knowledge of the matter said. Instead, Obama warned Putin privately, arguing that a similar private message to Chinese President Xi Jinping had reduced Chinese hacking into U.S. agencies and companies.

Ultimately, the additional intelligence informed U.S. President Barack Obama’s decision to retaliate on Dec. 29 by expelling 35 suspected Russian spies and sanctioning two Russian spy agencies, four intelligence officers and three companies, a decision that capped four months of debate at the White House about how to respond.

So far not a shred of evidence has been provided confirming the Kremlin’s involvement in the matter, aside from some Ukrainian malware code exposed in a 13-page joint DHS/FBI report which could be purchased by anyone online.

The Russian Hacking Meme: Trump & A Coming Showdown With The CIA?

Source: GizaDeathStar.com
Dr. Joseph P. Farrell PhD
January 7, 2017

In the last two News and Views from the Nefarium I’ve been concentrating not only on the geopolitical realignments that the coming year(s) portend, but also on the international and domestic realignments that are concomitant with them, including what I have been calling “international mafia wars,” as the neo-con globalist-Atlanticist factions within various great powers attempt to hold on to power and chorale and channel their unanticipated opposition into policies acceptable to them. In that  vein, consider the following stories shared by various readers here:

Trump on Alleged Russian Hacking: I know things others don’t

As this RT article citing Sean Spicer points out, the Russian hacking meme has been getting all the attention – no doubt in part in an attempt to de-legitimize the election results – while Chinese hacking has been downplayed, if it is mentioned at all:

Political retribution? Trump press sec questions Russia sanctions, brings up unanswered ‘China hack’

And finally, these articles from our friends at  The Daily Bell about a possible looming battle between the incoming Trump administration and the CIA:

Supposed Russian Hack Further Illustrates the Divide Between CIA and Trump

http://www.thedailybell.com/news-analysis/supposed-russian-hack-further-illustrates-the-divide-between-cia-and-trump/embed/#?secret=5OOGExhWeM

A similar story is being reported by Zero Hedge:

Trump Is Working On A Plan To Restructure, Pare Back The CIA And America’s Top Spy Agency

And finally, this find, by one alert reader of this website:

US Govt Data Shows Russia Used Outdated Ukrainian PHP Malware

https://www.wordfence.com/blog/2016/12/russia-malware-ip-hack/embed/#?secret=irF84cJ0qg

Note the conclusion of the last article:

The IP addresses that DHS provided may have been used for an attack by a state actor like Russia. But they don’t appear to provide any association with Russia. They are probably used by a wide range of other malicious actors, especially the 15% of IP addresses that are Tor exit nodes.

The malware sample is old, widely used and appears to be Ukrainian. It has no apparent relationship with Russian intelligence and it would be an indicator of compromise for any website.

The relationship of the malware sample, originating from the Ukraine, raises unpleasant but necessary questions: since it it widely known that the USA was a main sponsor of the events in the Ukraine that overthrew a legitimate (if corrupt) government with a new (and even more corrupt) government. That question is rather obvious: could the entire hacking meme have been an attempt at a “cyber false flag” originating in the West to embarrass Russia? Possibly, but here our criticism of the hacking meme and a Russian origin for the hacking, works in reverse: if the Russians were unlikely to have used such a clumsy method, perhaps the West would be to. And as the conclusions point out, the mere use of addresses in Russia does not, as any hacker knows, mean that Russia is the one using them. In effect, it proves nothing.  And we must hold out the possibility of non-state actors, and such a possibility would fit well with my “emergent international Mafia wars” hypothesis, as factions of Globaloneyists and the fascist sympathizers in various nations’ deep states close ranks.

In my high octane speculation of the day, it appears that what is looming here is a showdown between Mr. Trump and his deep state supporters, and the neo-con factions within the American intelligence community, represented by the CIA (which, let it be noted, is not a monolithic anti-Trump agency either, if one takes the pre-election revelations of Dr. Steve Pieczenik at face value). The Daily Bell suggests this looking showdown:

It seems obvious at this point that the CIA and Trump have entirely different positions when it comes to Russian maliciousness, which Trump downplays while the CIA works to advertise it.

But the issue is even more serious than that.

The larger issue is one we’ve been talking about for 15 years or more. The CIA is accountable to overseas banking interests in the City of London, not to American intelligence operations. The latter accountability is just a smokescreen.

The split has now become public knowledge and Trump is being directly threatened as a result.

Such statements strongly imply a showdown is looming, and give even more credence to those stories that Mr. Trump has retained his private security for protection, and of course, they give credence to those rumors that perhaps even Russian speznaz units are running security interference for Mr. Trump without his knowledge or involvement. If so, then this means that Mr. Trump is very aware of the power blocs aligned domestically against him, and give strong support to those rumors that he, like Mr. Kennedy, may be planning to reign in the agency. Unlike Mr. Kennedy, it appears that Mr. Trump is not so naive to believe he can do so without his own private and trusted security.

Time of course, will tell, and this is definitely a case of “you tell me.”

See you on the flip side.

Read More At: GizaDeathStar.com
_____________________________________________

About Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.